aboutsummaryrefslogtreecommitdiff
path: root/trace-events
diff options
context:
space:
mode:
authorLluís Vilanova <vilanova@ac.upc.edu>2016-09-22 20:40:21 +0200
committerStefan Hajnoczi <stefanha@redhat.com>2016-09-28 19:17:55 +0100
commit43e21e4907a009d87f6aef44663d9e1f7b181b8d (patch)
treec631520ddaaaea1b9db49fc669bcfa7c0e64f962 /trace-events
parent2cc2d082b52ef0aa9bffff512ce552391405ce9f (diff)
downloadqemu-43e21e4907a009d87f6aef44663d9e1f7b181b8d.zip
qemu-43e21e4907a009d87f6aef44663d9e1f7b181b8d.tar.gz
qemu-43e21e4907a009d87f6aef44663d9e1f7b181b8d.tar.bz2
trace: Document the execution mode of guest events
Explicitly state in which execution mode (user, softmmu, all) are guest events available for tracing. Signed-off-by: Lluís Vilanova <vilanova@ac.upc.edu> Message-id: 147456962135.11114.6146034359114598596.stgit@fimbulvetr.bsc.es Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
Diffstat (limited to 'trace-events')
-rw-r--r--trace-events3
1 files changed, 3 insertions, 0 deletions
diff --git a/trace-events b/trace-events
index fb96f6c..1a4e092 100644
--- a/trace-events
+++ b/trace-events
@@ -169,6 +169,7 @@ vcpu guest_cpu_reset(void)
# bool store : 1; /* wheter it's a store operation */
# };
#
+# Mode: user, softmmu
# Targets: TCG(all)
disable vcpu tcg guest_mem_before(TCGv vaddr, uint8_t info) "info=%d", "vaddr=0x%016"PRIx64" info=%d"
@@ -177,6 +178,7 @@ disable vcpu tcg guest_mem_before(TCGv vaddr, uint8_t info) "info=%d", "vaddr=0x
#
# Start executing a guest system call in syscall emulation mode.
#
+# Mode: user
# Targets: TCG(all)
disable vcpu guest_user_syscall(uint64_t num, uint64_t arg1, uint64_t arg2, uint64_t arg3, uint64_t arg4, uint64_t arg5, uint64_t arg6, uint64_t arg7, uint64_t arg8) "num=0x%016"PRIx64" arg1=0x%016"PRIx64" arg2=0x%016"PRIx64" arg3=0x%016"PRIx64" arg4=0x%016"PRIx64" arg5=0x%016"PRIx64" arg6=0x%016"PRIx64" arg7=0x%016"PRIx64" arg8=0x%016"PRIx64
@@ -185,5 +187,6 @@ disable vcpu guest_user_syscall(uint64_t num, uint64_t arg1, uint64_t arg2, uint
#
# Finish executing a guest system call in syscall emulation mode.
#
+# Mode: user
# Targets: TCG(all)
disable vcpu guest_user_syscall_ret(uint64_t num, uint64_t ret) "num=0x%016"PRIx64" ret=0x%016"PRIx64