You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
TODO: any way to show the actualy disassembled instruction executed directly from there? Possible with <<qemu-d-tracing>>.
8228
+
8218
8229
Enable other specific trace events:
8219
8230
8220
8231
....
@@ -8276,7 +8287,25 @@ IN:
8276
8287
8277
8288
TODO: after `IN:`, symbol names are meant to show, which is awesome, but I don't get any. I do see them however when running a bare metal example from: https://github.com/cirosantilli/newlib-examples/tree/900a9725947b1f375323c7da54f69e8049158881
8278
8289
8279
-
TODO: what is the point of having two mechanisms, `-trace` and `-d`? `-d` tracing is cool because it does not require a messy recompile, and it can also show symbols.
8290
+
TODO: what is the point of having two mechanisms, `-trace` and `-d`? `-d` tracing is cool because it does not require a messy recompile, and it can also show symbols.
8291
+
8292
+
==== QEMU trace register values
8293
+
8294
+
TODO: is it possible to show the register values for each instruction?
8295
+
8296
+
This would include the memory values read into the registers.
PANDA can list memory addresses, so I bet it can also decode the instructions: https://github.com/panda-re/panda/blob/883c85fa35f35e84a323ed3d464ff40030f06bd6/panda/docs/LINE_Censorship.md I wonder why they don't just upstream those things to QEMU's tracing: https://github.com/panda-re/panda/issues/290
8307
+
8308
+
gem5 can do it: <<gem5-tracing>>.
8280
8309
8281
8310
==== Trace source lines
8282
8311
@@ -8422,18 +8451,6 @@ TODO: is there any way to distinguish which instruction runs on each core? Doing
8422
8451
8423
8452
just appears to output both cores intertwined without any clear differentiation.
8424
8453
8425
-
==== QEMU trace decode instructions
8426
-
8427
-
TODO: is is possible to show which instructions ran at each point in time, in addition to the address of the instruction with `exec_tb` shows? Hopefully dissembled, not just the instruction memory.
8428
-
8429
-
PANDA can list memory addresses, so I bet it can also decode the instructions: https://github.com/panda-re/panda/blob/883c85fa35f35e84a323ed3d464ff40030f06bd6/panda/docs/LINE_Censorship.md I wonder why they don't just upstream those things to QEMU's tracing: https://github.com/panda-re/panda/issues/290
8430
-
8431
-
Memory access on vanilla seem impossible due to optimizations that QEMU does:
0 commit comments