]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - arch/x86/kvm/mmutrace.h
KVM: MMU: support disable/enable mmu audit dynamicly
[mirror_ubuntu-bionic-kernel.git] / arch / x86 / kvm / mmutrace.h
CommitLineData
07420171
AK
1#if !defined(_TRACE_KVMMMU_H) || defined(TRACE_HEADER_MULTI_READ)
2#define _TRACE_KVMMMU_H
3
4#include <linux/tracepoint.h>
f691fe1d 5#include <linux/ftrace_event.h>
07420171
AK
6
7#undef TRACE_SYSTEM
8#define TRACE_SYSTEM kvmmmu
07420171 9
f691fe1d
AK
10#define KVM_MMU_PAGE_FIELDS \
11 __field(__u64, gfn) \
12 __field(__u32, role) \
13 __field(__u32, root_count) \
df2fb6e7 14 __field(bool, unsync)
f691fe1d
AK
15
16#define KVM_MMU_PAGE_ASSIGN(sp) \
17 __entry->gfn = sp->gfn; \
18 __entry->role = sp->role.word; \
19 __entry->root_count = sp->root_count; \
20 __entry->unsync = sp->unsync;
21
22#define KVM_MMU_PAGE_PRINTK() ({ \
23 const char *ret = p->buffer + p->len; \
24 static const char *access_str[] = { \
25 "---", "--x", "w--", "w-x", "-u-", "-ux", "wu-", "wux" \
26 }; \
27 union kvm_mmu_page_role role; \
28 \
29 role.word = __entry->role; \
30 \
87bc3bf9 31 trace_seq_printf(p, "sp gfn %llx %u%s q%u%s %s%s" \
f691fe1d 32 " %snxe root %u %s%c", \
5b7e0102
AK
33 __entry->gfn, role.level, \
34 role.cr4_pae ? " pae" : "", \
f691fe1d
AK
35 role.quadrant, \
36 role.direct ? " direct" : "", \
37 access_str[role.access], \
38 role.invalid ? " invalid" : "", \
f691fe1d
AK
39 role.nxe ? "" : "!", \
40 __entry->root_count, \
41 __entry->unsync ? "unsync" : "sync", 0); \
42 ret; \
43 })
44
07420171
AK
45#define kvm_mmu_trace_pferr_flags \
46 { PFERR_PRESENT_MASK, "P" }, \
47 { PFERR_WRITE_MASK, "W" }, \
48 { PFERR_USER_MASK, "U" }, \
49 { PFERR_RSVD_MASK, "RSVD" }, \
50 { PFERR_FETCH_MASK, "F" }
51
52/*
53 * A pagetable walk has started
54 */
55TRACE_EVENT(
56 kvm_mmu_pagetable_walk,
57 TP_PROTO(u64 addr, int write_fault, int user_fault, int fetch_fault),
58 TP_ARGS(addr, write_fault, user_fault, fetch_fault),
59
60 TP_STRUCT__entry(
61 __field(__u64, addr)
62 __field(__u32, pferr)
63 ),
64
65 TP_fast_assign(
66 __entry->addr = addr;
67 __entry->pferr = (!!write_fault << 1) | (!!user_fault << 2)
68 | (!!fetch_fault << 4);
69 ),
70
71 TP_printk("addr %llx pferr %x %s", __entry->addr, __entry->pferr,
72 __print_flags(__entry->pferr, "|", kvm_mmu_trace_pferr_flags))
73);
74
75
76/* We just walked a paging element */
77TRACE_EVENT(
78 kvm_mmu_paging_element,
79 TP_PROTO(u64 pte, int level),
80 TP_ARGS(pte, level),
81
82 TP_STRUCT__entry(
83 __field(__u64, pte)
84 __field(__u32, level)
85 ),
86
87 TP_fast_assign(
88 __entry->pte = pte;
89 __entry->level = level;
90 ),
91
92 TP_printk("pte %llx level %u", __entry->pte, __entry->level)
93);
94
85f2067c
XG
95DECLARE_EVENT_CLASS(kvm_mmu_set_bit_class,
96
07420171 97 TP_PROTO(unsigned long table_gfn, unsigned index, unsigned size),
85f2067c 98
07420171
AK
99 TP_ARGS(table_gfn, index, size),
100
101 TP_STRUCT__entry(
102 __field(__u64, gpa)
85f2067c 103 ),
07420171
AK
104
105 TP_fast_assign(
106 __entry->gpa = ((u64)table_gfn << PAGE_SHIFT)
107 + index * size;
108 ),
109
110 TP_printk("gpa %llx", __entry->gpa)
111);
112
85f2067c
XG
113/* We set a pte accessed bit */
114DEFINE_EVENT(kvm_mmu_set_bit_class, kvm_mmu_set_accessed_bit,
115
07420171 116 TP_PROTO(unsigned long table_gfn, unsigned index, unsigned size),
07420171 117
85f2067c
XG
118 TP_ARGS(table_gfn, index, size)
119);
07420171 120
85f2067c
XG
121/* We set a pte dirty bit */
122DEFINE_EVENT(kvm_mmu_set_bit_class, kvm_mmu_set_dirty_bit,
07420171 123
85f2067c
XG
124 TP_PROTO(unsigned long table_gfn, unsigned index, unsigned size),
125
126 TP_ARGS(table_gfn, index, size)
07420171
AK
127);
128
129TRACE_EVENT(
130 kvm_mmu_walker_error,
131 TP_PROTO(u32 pferr),
132 TP_ARGS(pferr),
133
134 TP_STRUCT__entry(
135 __field(__u32, pferr)
136 ),
137
138 TP_fast_assign(
139 __entry->pferr = pferr;
140 ),
141
142 TP_printk("pferr %x %s", __entry->pferr,
143 __print_flags(__entry->pferr, "|", kvm_mmu_trace_pferr_flags))
144);
145
f691fe1d
AK
146TRACE_EVENT(
147 kvm_mmu_get_page,
148 TP_PROTO(struct kvm_mmu_page *sp, bool created),
149 TP_ARGS(sp, created),
150
151 TP_STRUCT__entry(
152 KVM_MMU_PAGE_FIELDS
153 __field(bool, created)
154 ),
155
156 TP_fast_assign(
157 KVM_MMU_PAGE_ASSIGN(sp)
158 __entry->created = created;
159 ),
160
161 TP_printk("%s %s", KVM_MMU_PAGE_PRINTK(),
162 __entry->created ? "new" : "existing")
163);
164
85f2067c
XG
165DECLARE_EVENT_CLASS(kvm_mmu_page_class,
166
f691fe1d
AK
167 TP_PROTO(struct kvm_mmu_page *sp),
168 TP_ARGS(sp),
169
170 TP_STRUCT__entry(
171 KVM_MMU_PAGE_FIELDS
85f2067c 172 ),
f691fe1d
AK
173
174 TP_fast_assign(
175 KVM_MMU_PAGE_ASSIGN(sp)
85f2067c 176 ),
f691fe1d
AK
177
178 TP_printk("%s", KVM_MMU_PAGE_PRINTK())
179);
180
85f2067c 181DEFINE_EVENT(kvm_mmu_page_class, kvm_mmu_sync_page,
f691fe1d 182 TP_PROTO(struct kvm_mmu_page *sp),
f691fe1d 183
85f2067c 184 TP_ARGS(sp)
f691fe1d
AK
185);
186
85f2067c 187DEFINE_EVENT(kvm_mmu_page_class, kvm_mmu_unsync_page,
f691fe1d 188 TP_PROTO(struct kvm_mmu_page *sp),
f691fe1d 189
85f2067c
XG
190 TP_ARGS(sp)
191);
f691fe1d 192
7775834a 193DEFINE_EVENT(kvm_mmu_page_class, kvm_mmu_prepare_zap_page,
85f2067c 194 TP_PROTO(struct kvm_mmu_page *sp),
f691fe1d 195
85f2067c 196 TP_ARGS(sp)
f691fe1d 197);
8b1fe17c
XG
198
199TRACE_EVENT(
200 kvm_mmu_audit,
201 TP_PROTO(struct kvm_vcpu *vcpu, int audit_point),
202 TP_ARGS(vcpu, audit_point),
203
204 TP_STRUCT__entry(
205 __field(struct kvm_vcpu *, vcpu)
206 __field(int, audit_point)
207 ),
208
209 TP_fast_assign(
210 __entry->vcpu = vcpu;
211 __entry->audit_point = audit_point;
212 ),
213
214 TP_printk("vcpu:%d %s", __entry->vcpu->cpu,
215 audit_point_name[__entry->audit_point])
216);
07420171
AK
217#endif /* _TRACE_KVMMMU_H */
218
2ed152af
XG
219#undef TRACE_INCLUDE_PATH
220#define TRACE_INCLUDE_PATH .
221#undef TRACE_INCLUDE_FILE
222#define TRACE_INCLUDE_FILE mmutrace
223
07420171
AK
224/* This part must be outside protection */
225#include <trace/define_trace.h>