blob: 035f3d570d8600c7de838659541375cf32a8118e [file] [log] [blame]
Stefano Garzarellad0fb9652021-05-17 17:16:58 +02001# See docs/devel/tracing.rst for syntax documentation.
Stefan Hajnoczi94a420b2010-05-22 17:52:39 +01002#
3# This file is processed by the tracetool script during the build.
4#
5# To add a new trace event:
6#
7# 1. Choose a name for the trace event. Declare its arguments and format
8# string.
9#
10# 2. Call the trace event from code using trace_##name, e.g. multiwrite_cb() ->
11# trace_multiwrite_cb(). The source file must #include "trace.h".
12#
13# Format of a trace event:
14#
Stefan Hajnoczi1e2cf2b2010-05-24 11:32:09 +010015# [disable] <name>(<type1> <arg1>[, <type2> <arg2>] ...) "<format-string>"
Stefan Hajnoczi94a420b2010-05-22 17:52:39 +010016#
Frediano Ziglioa74cd8c2011-08-31 09:25:35 +020017# Example: g_malloc(size_t size) "size %zu"
Stefan Hajnoczi94a420b2010-05-22 17:52:39 +010018#
Stefan Hajnoczi1e2cf2b2010-05-24 11:32:09 +010019# The "disable" keyword will build without the trace event.
Stefan Hajnoczi1e2cf2b2010-05-24 11:32:09 +010020#
Stefan Hajnoczi94a420b2010-05-22 17:52:39 +010021# The <name> must be a valid as a C function name.
22#
23# Types should be standard C types. Use void * for pointers because the trace
24# system may not have the necessary headers included.
25#
26# The <format-string> should be a sprintf()-compatible format string.
Stefan Hajnoczicd245a12010-05-22 18:09:25 +010027
Richard Hendersonad1a7062021-07-01 08:10:53 -070028# cpu.c
29breakpoint_insert(int cpu_index, uint64_t pc, int flags) "cpu=%d pc=0x%" PRIx64 " flags=0x%x"
30breakpoint_remove(int cpu_index, uint64_t pc, int flags) "cpu=%d pc=0x%" PRIx64 " flags=0x%x"
31breakpoint_singlestep(int cpu_index, int enabled) "cpu=%d enable=%d"
32
Kevin Wolfc57c4652011-11-24 06:15:28 -050033# dma-helpers.c
Paolo Bonzinicbe0ed62016-05-23 14:54:05 +020034dma_blk_io(void *dbs, void *bs, int64_t offset, bool to_dev) "dbs=%p bs=%p offset=%" PRId64 " to_dev=%d"
Kevin Wolfc57c4652011-11-24 06:15:28 -050035dma_aio_cancel(void *dbs) "dbs=%p"
36dma_complete(void *dbs, int ret, void *cb) "dbs=%p ret=%d cb=%p"
Markus Armbruster4be74632014-10-07 13:59:18 +020037dma_blk_cb(void *dbs, int ret) "dbs=%p ret=%d"
Kevin Wolfc57c4652011-11-24 06:15:28 -050038dma_map_wait(void *dbs) "dbs=%p"
Alon Levycdbc19d2012-03-11 18:11:26 +020039
Dr. David Alan Gilbertdb144f72018-03-12 17:20:56 +000040# exec.c
Dr. David Alan Gilbert154cc9e2018-01-05 17:01:37 +000041find_ram_offset(uint64_t size, uint64_t offset) "size: 0x%" PRIx64 " @ 0x%" PRIx64
42find_ram_offset_loop(uint64_t size, uint64_t candidate, uint64_t offset, uint64_t next, uint64_t mingap) "trying size: 0x%" PRIx64 " @ 0x%" PRIx64 ", offset: 0x%" PRIx64" next: 0x%" PRIx64 " mingap: 0x%" PRIx64
Dr. David Alan Gilbertdb144f72018-03-12 17:20:56 +000043ram_block_discard_range(const char *rbname, void *hva, size_t length, bool need_madvise, bool need_fallocate, int ret) "%s@%p + 0x%zx: madvise: %d fallocate: %d ret: %d"
Markus Armbrusterb15e4022020-08-06 16:13:34 +020044
45# accel/tcg/cputlb.c
Richard Henderson6e050d42019-09-18 03:39:56 +000046memory_notdirty_write_access(uint64_t vaddr, uint64_t ram_addr, unsigned size) "0x%" PRIx64 " ram_addr 0x%" PRIx64 " size %u"
47memory_notdirty_set_dirty(uint64_t vaddr) "0x%" PRIx64
Dr. David Alan Gilbert154cc9e2018-01-05 17:01:37 +000048
Kevin Wolfa50c2ab2018-04-13 17:19:31 +020049# job.c
50job_state_transition(void *job, int ret, const char *legal, const char *s0, const char *s1) "job %p (ret: %d) attempting %s transition (%s-->%s)"
51job_apply_verb(void *job, const char *state, const char *verb, const char *legal) "job %p in state %s; applying verb %s (%s)"
John Snow404ff282018-08-29 21:57:33 -040052job_completed(void *job, int ret) "job %p ret %d"
Kevin Wolfa50c2ab2018-04-13 17:19:31 +020053
Kevin Wolf1a90bc82018-05-03 19:01:14 +020054# job-qmp.c
55qmp_job_cancel(void *job) "job %p"
56qmp_job_pause(void *job) "job %p"
57qmp_job_resume(void *job) "job %p"
58qmp_job_complete(void *job) "job %p"
59qmp_job_finalize(void *job) "job %p"
60qmp_job_dismiss(void *job) "job %p"
61
62
Lluís Vilanovadcdaadb2016-06-09 19:31:47 +020063### Guest events, keep at bottom
64
Lluís Vilanovab9d72212016-09-19 14:55:13 +020065
66## vCPU
67
Markus Armbrusterdec97762019-03-14 19:09:29 +010068# trace/control-target.c
69
Lluís Vilanovab9d72212016-09-19 14:55:13 +020070# Hot-plug a new virtual (guest) CPU
71#
Lluís Vilanovaf5e2b3b2016-10-05 14:03:29 +020072# Mode: user, softmmu
Lluís Vilanovab9d72212016-09-19 14:55:13 +020073# Targets: all
74vcpu guest_cpu_enter(void)
75
Markus Armbrusterdec97762019-03-14 19:09:29 +010076# trace/control.c
77
Lluís Vilanovaa47e8712016-12-26 22:24:46 +010078# Hot-unplug a virtual (guest) CPU
79#
80# Mode: user, softmmu
81# Targets: all
82vcpu guest_cpu_exit(void)
83
Markus Armbruster2e5b09f2019-07-09 17:20:52 +020084# hw/core/cpu.c
Markus Armbrusterdec97762019-03-14 19:09:29 +010085
Lluís Vilanova2cc2d082016-09-19 14:55:18 +020086# Reset the state of a virtual (guest) CPU
87#
Lluís Vilanovaf5e2b3b2016-10-05 14:03:29 +020088# Mode: user, softmmu
Lluís Vilanova2cc2d082016-09-19 14:55:18 +020089# Targets: all
90vcpu guest_cpu_reset(void)
91
Markus Armbrusterb15e4022020-08-06 16:13:34 +020092# include/user/syscall-trace.h
Markus Armbrusterdec97762019-03-14 19:09:29 +010093
Lluís Vilanova9c15e702016-06-21 15:52:04 +020094# @num: System call number.
95# @arg*: System call argument value.
96#
97# Start executing a guest system call in syscall emulation mode.
98#
Lluís Vilanova43e21e42016-09-22 20:40:21 +020099# Mode: user
Lluís Vilanova9c15e702016-06-21 15:52:04 +0200100# Targets: TCG(all)
Lluís Vilanova5caa2622017-07-04 10:54:52 +0200101vcpu guest_user_syscall(uint64_t num, uint64_t arg1, uint64_t arg2, uint64_t arg3, uint64_t arg4, uint64_t arg5, uint64_t arg6, uint64_t arg7, uint64_t arg8) "num=0x%016"PRIx64" arg1=0x%016"PRIx64" arg2=0x%016"PRIx64" arg3=0x%016"PRIx64" arg4=0x%016"PRIx64" arg5=0x%016"PRIx64" arg6=0x%016"PRIx64" arg7=0x%016"PRIx64" arg8=0x%016"PRIx64
Lluís Vilanova9c15e702016-06-21 15:52:04 +0200102
103# @num: System call number.
104# @ret: System call result value.
105#
106# Finish executing a guest system call in syscall emulation mode.
107#
Lluís Vilanova43e21e42016-09-22 20:40:21 +0200108# Mode: user
Lluís Vilanova9c15e702016-06-21 15:52:04 +0200109# Targets: TCG(all)
Lluís Vilanova5caa2622017-07-04 10:54:52 +0200110vcpu guest_user_syscall_ret(uint64_t num, uint64_t ret) "num=0x%016"PRIx64" ret=0x%016"PRIx64