xentrace man page on SuSE

Man page or keyword search:  
man Server   14857 pages
apropos Keyword Search (all sections)
Output format
SuSE logo
[printable version]

XENTRACE(8)							   XENTRACE(8)

NAME
       xentrace - capture Xen trace buffer data

SYNOPSIS
       xentrace [ OPTIONS ] [ FILE ]

DESCRIPTION
       xentrace	 is  used  to capture trace buffer data from Xen.  The data is
       output in the following binary format (host endian):

	   CPU(uint) TSC(u64) EVENT(u32) D1 D2 D3 D4 D5 (all u32)

       Where CPU is the processor number, TSC is the record's  timestamp  (the
       value  of the CPU cycle counter), EVENT is the event ID and D1...D5 are
       the trace data.

       Data is dumped onto the standard output (which must not be a TTY) or  a
       FILE specified on the command line.

       The  output  should be parsed using the tool xentrace_format, which can
       produce human-readable output in ASCII format.

   Options
       -t, --log-thresh=l
	      set the threshold number, l, of new records required to  trigger
	      a write of all new records to the output

       -s, --poll-sleep=p
	      set  the time, p, (in milliseconds) to sleep between polling the
	      buffers for new data.

       -c, --cpu-mask=c
	      set cpu-mask

       -e, --evt-mask=e
	      set evt-mask

       -?, --help
	      Give this help list

       --usage
	      Give a short usage message

       -V, --version
	      Print program version

   Event Classes (Masks)
       The following event classes (masks) can be used to  filter  the	events
       being gathered by xentrace:

	       ID		   Description

	       0x0001f000	   TRC_GEN
	       0x0002f000	   TRC_SCHED
	       0x0004f000	   TRC_DOM0OP
	       0x0008f000	   TRC_HVM
	       0x0010f000	   TRC_MEM
	       0xfffff000	   TRC_ALL

   Event Subclasses (More Masks)
       The  following  event subclasses (masks) can also be used to filter the
       events being gathered by xentrace:

	       ID		   Description

	       0x00081000	   TRC_HVM_ENTRYEXIT
	       0x00082000	   TRC_HVM_HANDLER

   Events
       xentrace collects the following events from the trace buffer:

	       ID		 Description

	       0x0001f001	  TRC_LOST_RECORDS
	       0x0002f001	  TRC_SCHED_DOM_ADD
	       0x0002f002	  TRC_SCHED_DOM_REM
	       0x0002f003	  TRC_SCHED_SLEEP
	       0x0002f004	  TRC_SCHED_WAKE
	       0x0002f005	  TRC_SCHED_YIELD
	       0x0002f006	  TRC_SCHED_BLOCK
	       0x0002f007	  TRC_SCHED_SHUTDOWN
	       0x0002f008	  TRC_SCHED_CTL
	       0x0002f009	  TRC_SCHED_ADJDOM
	       0x0002f010	  TRC_SCHED_SWITCH
	       0x0002f011	  TRC_SCHED_S_TIMER_FN
	       0x0002f012	  TRC_SCHED_T_TIMER_FN
	       0x0002f013	  TRC_SCHED_DOM_TIMER_FN
	       0x0002f014	  TRC_SCHED_SWITCH_INFPREV
	       0x0002f015	  TRC_SCHED_SWITCH_INFNEXT

	       0x00081001	  TRC_HVM_VMENTRY
	       0x00081002	  TRC_HVM_VMEXIT
	       0x00082001	  TRC_HVM_PF_XEN
	       0x00082002	  TRC_HVM_PF_INJECT
	       0x00082003	  TRC_HVM_INJ_EXC
	       0x00082004	  TRC_HVM_INJ_VIRQ
	       0x00082005	  TRC_HVM_REINJ_VIRQ
	       0x00082006	  TRC_HVM_IO_READ
	       0x00082007	  TRC_HVM_IO_WRITE
	       0x00082008	  TRC_HVM_CR_READ
	       0x00082009	  TRC_HVM_CR_WRITE
	       0x0008200A	  TRC_HVM_DR_READ
	       0x0008200B	  TRC_HVM_DR_WRITE
	       0x0008200C	  TRC_HVM_MSR_READ
	       0x0008200D	  TRC_HVM_MSR_WRITE
	       0x0008200E	  TRC_HVM_CPUID
	       0x0008200F	  TRC_HVM_INTR
	       0x00082010	  TRC_HVM_NMI
	       0x00082011	  TRC_HVM_SMI
	       0x00082012	  TRC_HVM_VMMCALL
	       0x00082013	  TRC_HVM_HLT
	       0x00082014	  TRC_HVM_INVLPG

	       0x0010f001	  TRC_MEM_PAGE_GRANT_MAP
	       0x0010f002	  TRC_MEM_PAGE_GRANT_UNMAP
	       0x0010f003	  TRC_MEM_PAGE_GRANT_TRANSFER

AUTHOR
       Mark A. Williamson <mark.a.williamson@intel.com>

SEE ALSO
       xentrace_format(1)

Xen domain 0 utils	       22 February 2007			   XENTRACE(8)
[top]

List of man pages available for SuSE

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net