]> git.proxmox.com Git - mirror_qemu.git/blame - trace-events
block/iscsi: dont leave allocmap in an invalid state on UNMAP failure
[mirror_qemu.git] / trace-events
CommitLineData
94a420b1
SH
1# Trace events for debugging and performance instrumentation
2#
3# This file is processed by the tracetool script during the build.
4#
5# To add a new trace event:
6#
7# 1. Choose a name for the trace event. Declare its arguments and format
8# string.
9#
10# 2. Call the trace event from code using trace_##name, e.g. multiwrite_cb() ->
11# trace_multiwrite_cb(). The source file must #include "trace.h".
12#
13# Format of a trace event:
14#
1e2cf2bc 15# [disable] <name>(<type1> <arg1>[, <type2> <arg2>] ...) "<format-string>"
94a420b1 16#
a74cd8cc 17# Example: g_malloc(size_t size) "size %zu"
94a420b1 18#
1e2cf2bc 19# The "disable" keyword will build without the trace event.
1e2cf2bc 20#
94a420b1
SH
21# The <name> must be a valid as a C function name.
22#
23# Types should be standard C types. Use void * for pointers because the trace
24# system may not have the necessary headers included.
25#
26# The <format-string> should be a sprintf()-compatible format string.
cd245a19 27
bd3c9aa5 28# ioport.c
db73ee4b
VSO
29cpu_in(unsigned int addr, char size, unsigned int val) "addr 0x%x(%c) value %u"
30cpu_out(unsigned int addr, char size, unsigned int val) "addr 0x%x(%c) value %u"
62dd89de
PS
31
32# balloon.c
33# Since requests are raised via monitor, not many tracepoints are needed.
47f08d7a 34balloon_event(void *opaque, unsigned long addr) "opaque %p addr %lu"
d8023f31 35
94b0b5ff 36# vl.c
47f08d7a 37vm_state_notify(int running, int reason) "running %d reason %d"
4524051c 38load_file(const char *name, const char *path) "name %s location %s"
7e866003 39runstate_set(int new_state) "new state %d"
4fed9421 40system_wakeup_request(int reason) "reason=%d"
cf83f140 41qemu_system_shutdown_request(int reason) "reason=%d"
bc78cff9 42qemu_system_powerdown_request(void) ""
298800ca 43
89bd820a 44# monitor.c
93f8f982 45monitor_protocol_event_handler(uint32_t event, void *qdict) "event=%d data=%p"
afeecec2 46monitor_protocol_event_emit(uint32_t event, void *data) "event=%d data=%p"
93f8f982 47monitor_protocol_event_queue(uint32_t event, void *qdict, uint64_t rate) "event=%d data=%p rate=%" PRId64
79cad8b4 48handle_hmp_command(void *mon, const char *cmdline) "mon %p cmdline: %s"
b097efc0 49handle_qmp_command(void *mon, const char *req) "mon %p req: %s"
342407fd 50
c57c4658 51# dma-helpers.c
cbe0ed62 52dma_blk_io(void *dbs, void *bs, int64_t offset, bool to_dev) "dbs=%p bs=%p offset=%" PRId64 " to_dev=%d"
c57c4658
KW
53dma_aio_cancel(void *dbs) "dbs=%p"
54dma_complete(void *dbs, int ret, void *cb) "dbs=%p ret=%d cb=%p"
4be74634 55dma_blk_cb(void *dbs, int ret) "dbs=%p ret=%d"
c57c4658 56dma_map_wait(void *dbs) "dbs=%p"
cdbc19dd 57
55d5d048 58# memory.c
db73ee4b
VSO
59memory_region_ops_read(int cpu_index, void *mr, uint64_t addr, uint64_t value, unsigned size) "cpu %d mr %p addr 0x%"PRIx64" value 0x%"PRIx64" size %u"
60memory_region_ops_write(int cpu_index, void *mr, uint64_t addr, uint64_t value, unsigned size) "cpu %d mr %p addr 0x%"PRIx64" value 0x%"PRIx64" size %u"
61memory_region_subpage_read(int cpu_index, void *mr, uint64_t offset, uint64_t value, unsigned size) "cpu %d mr %p offset 0x%"PRIx64" value 0x%"PRIx64" size %u"
62memory_region_subpage_write(int cpu_index, void *mr, uint64_t offset, uint64_t value, unsigned size) "cpu %d mr %p offset 0x%"PRIx64" value 0x%"PRIx64" size %u"
63memory_region_tb_read(int cpu_index, uint64_t addr, uint64_t value, unsigned size) "cpu %d addr 0x%"PRIx64" value 0x%"PRIx64" size %u"
64memory_region_tb_write(int cpu_index, uint64_t addr, uint64_t value, unsigned size) "cpu %d addr 0x%"PRIx64" value 0x%"PRIx64" size %u"
65memory_region_ram_device_read(int cpu_index, void *mr, uint64_t addr, uint64_t value, unsigned size) "cpu %d mr %p addr 0x%"PRIx64" value 0x%"PRIx64" size %u"
66memory_region_ram_device_write(int cpu_index, void *mr, uint64_t addr, uint64_t value, unsigned size) "cpu %d mr %p addr 0x%"PRIx64" value 0x%"PRIx64" size %u"
02d9651d
PB
67flatview_new(FlatView *view, MemoryRegion *root) "%p (root %p)"
68flatview_destroy(FlatView *view, MemoryRegion *root) "%p (root %p)"
69flatview_destroy_rcu(FlatView *view, MemoryRegion *root) "%p (root %p)"
55d5d048 70
dcdaadb6
LV
71### Guest events, keep at bottom
72
b9d72215
LV
73
74## vCPU
75
76# Hot-plug a new virtual (guest) CPU
77#
f5e2b3be 78# Mode: user, softmmu
b9d72215
LV
79# Targets: all
80vcpu guest_cpu_enter(void)
81
a47e8715
LV
82# Hot-unplug a virtual (guest) CPU
83#
84# Mode: user, softmmu
85# Targets: all
86vcpu guest_cpu_exit(void)
87
2cc2d082
LV
88# Reset the state of a virtual (guest) CPU
89#
f5e2b3be 90# Mode: user, softmmu
2cc2d082
LV
91# Targets: all
92vcpu guest_cpu_reset(void)
93
dcdaadb6
LV
94# @vaddr: Access' virtual address.
95# @info : Access' information (see below).
96#
97# Start virtual memory access (before any potential access violation).
98#
99# Does not include memory accesses performed by devices.
100#
101# Access information can be parsed as:
102#
103# struct mem_info {
104# uint8_t size_shift : 2; /* interpreted as "1 << size_shift" bytes */
105# bool sign_extend: 1; /* sign-extended */
106# uint8_t endianness : 1; /* 0: little, 1: big */
107# bool store : 1; /* wheter it's a store operation */
108# };
109#
43e21e49 110# Mode: user, softmmu
dcdaadb6 111# Targets: TCG(all)
5caa262f 112vcpu tcg guest_mem_before(TCGv vaddr, uint8_t info) "info=%d", "vaddr=0x%016"PRIx64" info=%d"
9c15e700
LV
113
114# @num: System call number.
115# @arg*: System call argument value.
116#
117# Start executing a guest system call in syscall emulation mode.
118#
43e21e49 119# Mode: user
9c15e700 120# Targets: TCG(all)
5caa262f 121vcpu guest_user_syscall(uint64_t num, uint64_t arg1, uint64_t arg2, uint64_t arg3, uint64_t arg4, uint64_t arg5, uint64_t arg6, uint64_t arg7, uint64_t arg8) "num=0x%016"PRIx64" arg1=0x%016"PRIx64" arg2=0x%016"PRIx64" arg3=0x%016"PRIx64" arg4=0x%016"PRIx64" arg5=0x%016"PRIx64" arg6=0x%016"PRIx64" arg7=0x%016"PRIx64" arg8=0x%016"PRIx64
9c15e700
LV
122
123# @num: System call number.
124# @ret: System call result value.
125#
126# Finish executing a guest system call in syscall emulation mode.
127#
43e21e49 128# Mode: user
9c15e700 129# Targets: TCG(all)
5caa262f 130vcpu guest_user_syscall_ret(uint64_t num, uint64_t ret) "num=0x%016"PRIx64" ret=0x%016"PRIx64