]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - arch/x86/kvm/mmutrace.h
KVM: MMU: trace fast page fault
[mirror_ubuntu-bionic-kernel.git] / arch / x86 / kvm / mmutrace.h
CommitLineData
07420171
AK
1#if !defined(_TRACE_KVMMMU_H) || defined(TRACE_HEADER_MULTI_READ)
2#define _TRACE_KVMMMU_H
3
4#include <linux/tracepoint.h>
f691fe1d 5#include <linux/ftrace_event.h>
07420171
AK
6
7#undef TRACE_SYSTEM
8#define TRACE_SYSTEM kvmmmu
07420171 9
f691fe1d
AK
10#define KVM_MMU_PAGE_FIELDS \
11 __field(__u64, gfn) \
12 __field(__u32, role) \
13 __field(__u32, root_count) \
df2fb6e7 14 __field(bool, unsync)
f691fe1d
AK
15
16#define KVM_MMU_PAGE_ASSIGN(sp) \
17 __entry->gfn = sp->gfn; \
18 __entry->role = sp->role.word; \
19 __entry->root_count = sp->root_count; \
20 __entry->unsync = sp->unsync;
21
22#define KVM_MMU_PAGE_PRINTK() ({ \
23 const char *ret = p->buffer + p->len; \
24 static const char *access_str[] = { \
25 "---", "--x", "w--", "w-x", "-u-", "-ux", "wu-", "wux" \
26 }; \
27 union kvm_mmu_page_role role; \
28 \
29 role.word = __entry->role; \
30 \
87bc3bf9 31 trace_seq_printf(p, "sp gfn %llx %u%s q%u%s %s%s" \
f691fe1d 32 " %snxe root %u %s%c", \
5b7e0102
AK
33 __entry->gfn, role.level, \
34 role.cr4_pae ? " pae" : "", \
f691fe1d
AK
35 role.quadrant, \
36 role.direct ? " direct" : "", \
37 access_str[role.access], \
38 role.invalid ? " invalid" : "", \
f691fe1d
AK
39 role.nxe ? "" : "!", \
40 __entry->root_count, \
41 __entry->unsync ? "unsync" : "sync", 0); \
42 ret; \
43 })
44
07420171
AK
45#define kvm_mmu_trace_pferr_flags \
46 { PFERR_PRESENT_MASK, "P" }, \
47 { PFERR_WRITE_MASK, "W" }, \
48 { PFERR_USER_MASK, "U" }, \
49 { PFERR_RSVD_MASK, "RSVD" }, \
50 { PFERR_FETCH_MASK, "F" }
51
52/*
53 * A pagetable walk has started
54 */
55TRACE_EVENT(
56 kvm_mmu_pagetable_walk,
57 TP_PROTO(u64 addr, int write_fault, int user_fault, int fetch_fault),
58 TP_ARGS(addr, write_fault, user_fault, fetch_fault),
59
60 TP_STRUCT__entry(
61 __field(__u64, addr)
62 __field(__u32, pferr)
63 ),
64
65 TP_fast_assign(
66 __entry->addr = addr;
67 __entry->pferr = (!!write_fault << 1) | (!!user_fault << 2)
68 | (!!fetch_fault << 4);
69 ),
70
71 TP_printk("addr %llx pferr %x %s", __entry->addr, __entry->pferr,
72 __print_flags(__entry->pferr, "|", kvm_mmu_trace_pferr_flags))
73);
74
75
76/* We just walked a paging element */
77TRACE_EVENT(
78 kvm_mmu_paging_element,
79 TP_PROTO(u64 pte, int level),
80 TP_ARGS(pte, level),
81
82 TP_STRUCT__entry(
83 __field(__u64, pte)
84 __field(__u32, level)
85 ),
86
87 TP_fast_assign(
88 __entry->pte = pte;
89 __entry->level = level;
90 ),
91
92 TP_printk("pte %llx level %u", __entry->pte, __entry->level)
93);
94
85f2067c
XG
95DECLARE_EVENT_CLASS(kvm_mmu_set_bit_class,
96
07420171 97 TP_PROTO(unsigned long table_gfn, unsigned index, unsigned size),
85f2067c 98
07420171
AK
99 TP_ARGS(table_gfn, index, size),
100
101 TP_STRUCT__entry(
102 __field(__u64, gpa)
85f2067c 103 ),
07420171
AK
104
105 TP_fast_assign(
106 __entry->gpa = ((u64)table_gfn << PAGE_SHIFT)
107 + index * size;
108 ),
109
110 TP_printk("gpa %llx", __entry->gpa)
111);
112
85f2067c
XG
113/* We set a pte accessed bit */
114DEFINE_EVENT(kvm_mmu_set_bit_class, kvm_mmu_set_accessed_bit,
115
07420171 116 TP_PROTO(unsigned long table_gfn, unsigned index, unsigned size),
07420171 117
85f2067c
XG
118 TP_ARGS(table_gfn, index, size)
119);
07420171 120
85f2067c
XG
121/* We set a pte dirty bit */
122DEFINE_EVENT(kvm_mmu_set_bit_class, kvm_mmu_set_dirty_bit,
07420171 123
85f2067c
XG
124 TP_PROTO(unsigned long table_gfn, unsigned index, unsigned size),
125
126 TP_ARGS(table_gfn, index, size)
07420171
AK
127);
128
129TRACE_EVENT(
130 kvm_mmu_walker_error,
131 TP_PROTO(u32 pferr),
132 TP_ARGS(pferr),
133
134 TP_STRUCT__entry(
135 __field(__u32, pferr)
136 ),
137
138 TP_fast_assign(
139 __entry->pferr = pferr;
140 ),
141
142 TP_printk("pferr %x %s", __entry->pferr,
143 __print_flags(__entry->pferr, "|", kvm_mmu_trace_pferr_flags))
144);
145
f691fe1d
AK
146TRACE_EVENT(
147 kvm_mmu_get_page,
148 TP_PROTO(struct kvm_mmu_page *sp, bool created),
149 TP_ARGS(sp, created),
150
151 TP_STRUCT__entry(
152 KVM_MMU_PAGE_FIELDS
153 __field(bool, created)
154 ),
155
156 TP_fast_assign(
157 KVM_MMU_PAGE_ASSIGN(sp)
158 __entry->created = created;
159 ),
160
161 TP_printk("%s %s", KVM_MMU_PAGE_PRINTK(),
162 __entry->created ? "new" : "existing")
163);
164
85f2067c
XG
165DECLARE_EVENT_CLASS(kvm_mmu_page_class,
166
f691fe1d
AK
167 TP_PROTO(struct kvm_mmu_page *sp),
168 TP_ARGS(sp),
169
170 TP_STRUCT__entry(
171 KVM_MMU_PAGE_FIELDS
85f2067c 172 ),
f691fe1d
AK
173
174 TP_fast_assign(
175 KVM_MMU_PAGE_ASSIGN(sp)
85f2067c 176 ),
f691fe1d
AK
177
178 TP_printk("%s", KVM_MMU_PAGE_PRINTK())
179);
180
85f2067c 181DEFINE_EVENT(kvm_mmu_page_class, kvm_mmu_sync_page,
f691fe1d 182 TP_PROTO(struct kvm_mmu_page *sp),
f691fe1d 183
85f2067c 184 TP_ARGS(sp)
f691fe1d
AK
185);
186
85f2067c 187DEFINE_EVENT(kvm_mmu_page_class, kvm_mmu_unsync_page,
f691fe1d 188 TP_PROTO(struct kvm_mmu_page *sp),
f691fe1d 189
85f2067c
XG
190 TP_ARGS(sp)
191);
f691fe1d 192
7775834a 193DEFINE_EVENT(kvm_mmu_page_class, kvm_mmu_prepare_zap_page,
85f2067c 194 TP_PROTO(struct kvm_mmu_page *sp),
f691fe1d 195
85f2067c 196 TP_ARGS(sp)
f691fe1d 197);
8b1fe17c 198
4f022648
XG
199DEFINE_EVENT(kvm_mmu_page_class, kvm_mmu_delay_free_pages,
200 TP_PROTO(struct kvm_mmu_page *sp),
201
202 TP_ARGS(sp)
203);
204
205TRACE_EVENT(
206 mark_mmio_spte,
207 TP_PROTO(u64 *sptep, gfn_t gfn, unsigned access),
208 TP_ARGS(sptep, gfn, access),
209
210 TP_STRUCT__entry(
211 __field(void *, sptep)
212 __field(gfn_t, gfn)
213 __field(unsigned, access)
214 ),
215
216 TP_fast_assign(
217 __entry->sptep = sptep;
218 __entry->gfn = gfn;
219 __entry->access = access;
220 ),
221
222 TP_printk("sptep:%p gfn %llx access %x", __entry->sptep, __entry->gfn,
223 __entry->access)
224);
225
226TRACE_EVENT(
227 handle_mmio_page_fault,
228 TP_PROTO(u64 addr, gfn_t gfn, unsigned access),
229 TP_ARGS(addr, gfn, access),
230
231 TP_STRUCT__entry(
232 __field(u64, addr)
233 __field(gfn_t, gfn)
234 __field(unsigned, access)
235 ),
236
237 TP_fast_assign(
238 __entry->addr = addr;
239 __entry->gfn = gfn;
240 __entry->access = access;
241 ),
242
243 TP_printk("addr:%llx gfn %llx access %x", __entry->addr, __entry->gfn,
244 __entry->access)
245);
a72faf25
XG
246
247#define __spte_satisfied(__spte) \
248 (__entry->retry && is_writable_pte(__entry->__spte))
249
250TRACE_EVENT(
251 fast_page_fault,
252 TP_PROTO(struct kvm_vcpu *vcpu, gva_t gva, u32 error_code,
253 u64 *sptep, u64 old_spte, bool retry),
254 TP_ARGS(vcpu, gva, error_code, sptep, old_spte, retry),
255
256 TP_STRUCT__entry(
257 __field(int, vcpu_id)
258 __field(gva_t, gva)
259 __field(u32, error_code)
260 __field(u64 *, sptep)
261 __field(u64, old_spte)
262 __field(u64, new_spte)
263 __field(bool, retry)
264 ),
265
266 TP_fast_assign(
267 __entry->vcpu_id = vcpu->vcpu_id;
268 __entry->gva = gva;
269 __entry->error_code = error_code;
270 __entry->sptep = sptep;
271 __entry->old_spte = old_spte;
272 __entry->new_spte = *sptep;
273 __entry->retry = retry;
274 ),
275
276 TP_printk("vcpu %d gva %lx error_code %s sptep %p old %#llx"
277 " new %llx spurious %d fixed %d", __entry->vcpu_id,
278 __entry->gva, __print_flags(__entry->error_code, "|",
279 kvm_mmu_trace_pferr_flags), __entry->sptep,
280 __entry->old_spte, __entry->new_spte,
281 __spte_satisfied(old_spte), __spte_satisfied(new_spte)
282 )
283);
07420171
AK
284#endif /* _TRACE_KVMMMU_H */
285
2ed152af
XG
286#undef TRACE_INCLUDE_PATH
287#define TRACE_INCLUDE_PATH .
288#undef TRACE_INCLUDE_FILE
289#define TRACE_INCLUDE_FILE mmutrace
290
07420171
AK
291/* This part must be outside protection */
292#include <trace/define_trace.h>