cc9e49d35b
Since the page fault report and response have been tracked by ftrace, the users can easily calculate the time used for a page fault handling. There's no need to expose the similar functionality in debugfs. Hence, remove the corresponding operations in debugfs. Signed-off-by: Jingqi Liu <Jingqi.liu@intel.com> Link: https://lore.kernel.org/r/20240308103811.76744-2-Jingqi.liu@intel.com Signed-off-by: Lu Baolu <baolu.lu@linux.intel.com> Signed-off-by: Joerg Roedel <jroedel@suse.de>
811 lines
22 KiB
C
811 lines
22 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
/*
|
|
* Copyright © 2018 Intel Corporation.
|
|
*
|
|
* Authors: Gayatri Kammela <gayatri.kammela@intel.com>
|
|
* Sohil Mehta <sohil.mehta@intel.com>
|
|
* Jacob Pan <jacob.jun.pan@linux.intel.com>
|
|
* Lu Baolu <baolu.lu@linux.intel.com>
|
|
*/
|
|
|
|
#include <linux/debugfs.h>
|
|
#include <linux/dmar.h>
|
|
#include <linux/pci.h>
|
|
|
|
#include <asm/irq_remapping.h>
|
|
|
|
#include "iommu.h"
|
|
#include "pasid.h"
|
|
#include "perf.h"
|
|
|
|
struct tbl_walk {
|
|
u16 bus;
|
|
u16 devfn;
|
|
u32 pasid;
|
|
struct root_entry *rt_entry;
|
|
struct context_entry *ctx_entry;
|
|
struct pasid_entry *pasid_tbl_entry;
|
|
};
|
|
|
|
struct iommu_regset {
|
|
int offset;
|
|
const char *regs;
|
|
};
|
|
|
|
#define DEBUG_BUFFER_SIZE 1024
|
|
static char debug_buf[DEBUG_BUFFER_SIZE];
|
|
|
|
#define IOMMU_REGSET_ENTRY(_reg_) \
|
|
{ DMAR_##_reg_##_REG, __stringify(_reg_) }
|
|
|
|
static const struct iommu_regset iommu_regs_32[] = {
|
|
IOMMU_REGSET_ENTRY(VER),
|
|
IOMMU_REGSET_ENTRY(GCMD),
|
|
IOMMU_REGSET_ENTRY(GSTS),
|
|
IOMMU_REGSET_ENTRY(FSTS),
|
|
IOMMU_REGSET_ENTRY(FECTL),
|
|
IOMMU_REGSET_ENTRY(FEDATA),
|
|
IOMMU_REGSET_ENTRY(FEADDR),
|
|
IOMMU_REGSET_ENTRY(FEUADDR),
|
|
IOMMU_REGSET_ENTRY(PMEN),
|
|
IOMMU_REGSET_ENTRY(PLMBASE),
|
|
IOMMU_REGSET_ENTRY(PLMLIMIT),
|
|
IOMMU_REGSET_ENTRY(ICS),
|
|
IOMMU_REGSET_ENTRY(PRS),
|
|
IOMMU_REGSET_ENTRY(PECTL),
|
|
IOMMU_REGSET_ENTRY(PEDATA),
|
|
IOMMU_REGSET_ENTRY(PEADDR),
|
|
IOMMU_REGSET_ENTRY(PEUADDR),
|
|
};
|
|
|
|
static const struct iommu_regset iommu_regs_64[] = {
|
|
IOMMU_REGSET_ENTRY(CAP),
|
|
IOMMU_REGSET_ENTRY(ECAP),
|
|
IOMMU_REGSET_ENTRY(RTADDR),
|
|
IOMMU_REGSET_ENTRY(CCMD),
|
|
IOMMU_REGSET_ENTRY(AFLOG),
|
|
IOMMU_REGSET_ENTRY(PHMBASE),
|
|
IOMMU_REGSET_ENTRY(PHMLIMIT),
|
|
IOMMU_REGSET_ENTRY(IQH),
|
|
IOMMU_REGSET_ENTRY(IQT),
|
|
IOMMU_REGSET_ENTRY(IQA),
|
|
IOMMU_REGSET_ENTRY(IRTA),
|
|
IOMMU_REGSET_ENTRY(PQH),
|
|
IOMMU_REGSET_ENTRY(PQT),
|
|
IOMMU_REGSET_ENTRY(PQA),
|
|
IOMMU_REGSET_ENTRY(MTRRCAP),
|
|
IOMMU_REGSET_ENTRY(MTRRDEF),
|
|
IOMMU_REGSET_ENTRY(MTRR_FIX64K_00000),
|
|
IOMMU_REGSET_ENTRY(MTRR_FIX16K_80000),
|
|
IOMMU_REGSET_ENTRY(MTRR_FIX16K_A0000),
|
|
IOMMU_REGSET_ENTRY(MTRR_FIX4K_C0000),
|
|
IOMMU_REGSET_ENTRY(MTRR_FIX4K_C8000),
|
|
IOMMU_REGSET_ENTRY(MTRR_FIX4K_D0000),
|
|
IOMMU_REGSET_ENTRY(MTRR_FIX4K_D8000),
|
|
IOMMU_REGSET_ENTRY(MTRR_FIX4K_E0000),
|
|
IOMMU_REGSET_ENTRY(MTRR_FIX4K_E8000),
|
|
IOMMU_REGSET_ENTRY(MTRR_FIX4K_F0000),
|
|
IOMMU_REGSET_ENTRY(MTRR_FIX4K_F8000),
|
|
IOMMU_REGSET_ENTRY(MTRR_PHYSBASE0),
|
|
IOMMU_REGSET_ENTRY(MTRR_PHYSMASK0),
|
|
IOMMU_REGSET_ENTRY(MTRR_PHYSBASE1),
|
|
IOMMU_REGSET_ENTRY(MTRR_PHYSMASK1),
|
|
IOMMU_REGSET_ENTRY(MTRR_PHYSBASE2),
|
|
IOMMU_REGSET_ENTRY(MTRR_PHYSMASK2),
|
|
IOMMU_REGSET_ENTRY(MTRR_PHYSBASE3),
|
|
IOMMU_REGSET_ENTRY(MTRR_PHYSMASK3),
|
|
IOMMU_REGSET_ENTRY(MTRR_PHYSBASE4),
|
|
IOMMU_REGSET_ENTRY(MTRR_PHYSMASK4),
|
|
IOMMU_REGSET_ENTRY(MTRR_PHYSBASE5),
|
|
IOMMU_REGSET_ENTRY(MTRR_PHYSMASK5),
|
|
IOMMU_REGSET_ENTRY(MTRR_PHYSBASE6),
|
|
IOMMU_REGSET_ENTRY(MTRR_PHYSMASK6),
|
|
IOMMU_REGSET_ENTRY(MTRR_PHYSBASE7),
|
|
IOMMU_REGSET_ENTRY(MTRR_PHYSMASK7),
|
|
IOMMU_REGSET_ENTRY(MTRR_PHYSBASE8),
|
|
IOMMU_REGSET_ENTRY(MTRR_PHYSMASK8),
|
|
IOMMU_REGSET_ENTRY(MTRR_PHYSBASE9),
|
|
IOMMU_REGSET_ENTRY(MTRR_PHYSMASK9),
|
|
};
|
|
|
|
static struct dentry *intel_iommu_debug;
|
|
|
|
static int iommu_regset_show(struct seq_file *m, void *unused)
|
|
{
|
|
struct dmar_drhd_unit *drhd;
|
|
struct intel_iommu *iommu;
|
|
unsigned long flag;
|
|
int i, ret = 0;
|
|
u64 value;
|
|
|
|
rcu_read_lock();
|
|
for_each_active_iommu(iommu, drhd) {
|
|
if (!drhd->reg_base_addr) {
|
|
seq_puts(m, "IOMMU: Invalid base address\n");
|
|
ret = -EINVAL;
|
|
goto out;
|
|
}
|
|
|
|
seq_printf(m, "IOMMU: %s Register Base Address: %llx\n",
|
|
iommu->name, drhd->reg_base_addr);
|
|
seq_puts(m, "Name\t\t\tOffset\t\tContents\n");
|
|
/*
|
|
* Publish the contents of the 64-bit hardware registers
|
|
* by adding the offset to the pointer (virtual address).
|
|
*/
|
|
raw_spin_lock_irqsave(&iommu->register_lock, flag);
|
|
for (i = 0 ; i < ARRAY_SIZE(iommu_regs_32); i++) {
|
|
value = dmar_readl(iommu->reg + iommu_regs_32[i].offset);
|
|
seq_printf(m, "%-16s\t0x%02x\t\t0x%016llx\n",
|
|
iommu_regs_32[i].regs, iommu_regs_32[i].offset,
|
|
value);
|
|
}
|
|
for (i = 0 ; i < ARRAY_SIZE(iommu_regs_64); i++) {
|
|
value = dmar_readq(iommu->reg + iommu_regs_64[i].offset);
|
|
seq_printf(m, "%-16s\t0x%02x\t\t0x%016llx\n",
|
|
iommu_regs_64[i].regs, iommu_regs_64[i].offset,
|
|
value);
|
|
}
|
|
raw_spin_unlock_irqrestore(&iommu->register_lock, flag);
|
|
seq_putc(m, '\n');
|
|
}
|
|
out:
|
|
rcu_read_unlock();
|
|
|
|
return ret;
|
|
}
|
|
DEFINE_SHOW_ATTRIBUTE(iommu_regset);
|
|
|
|
static inline void print_tbl_walk(struct seq_file *m)
|
|
{
|
|
struct tbl_walk *tbl_wlk = m->private;
|
|
|
|
seq_printf(m, "%02x:%02x.%x\t0x%016llx:0x%016llx\t0x%016llx:0x%016llx\t",
|
|
tbl_wlk->bus, PCI_SLOT(tbl_wlk->devfn),
|
|
PCI_FUNC(tbl_wlk->devfn), tbl_wlk->rt_entry->hi,
|
|
tbl_wlk->rt_entry->lo, tbl_wlk->ctx_entry->hi,
|
|
tbl_wlk->ctx_entry->lo);
|
|
|
|
/*
|
|
* A legacy mode DMAR doesn't support PASID, hence default it to -1
|
|
* indicating that it's invalid. Also, default all PASID related fields
|
|
* to 0.
|
|
*/
|
|
if (!tbl_wlk->pasid_tbl_entry)
|
|
seq_printf(m, "%-6d\t0x%016llx:0x%016llx:0x%016llx\n", -1,
|
|
(u64)0, (u64)0, (u64)0);
|
|
else
|
|
seq_printf(m, "%-6d\t0x%016llx:0x%016llx:0x%016llx\n",
|
|
tbl_wlk->pasid, tbl_wlk->pasid_tbl_entry->val[2],
|
|
tbl_wlk->pasid_tbl_entry->val[1],
|
|
tbl_wlk->pasid_tbl_entry->val[0]);
|
|
}
|
|
|
|
static void pasid_tbl_walk(struct seq_file *m, struct pasid_entry *tbl_entry,
|
|
u16 dir_idx)
|
|
{
|
|
struct tbl_walk *tbl_wlk = m->private;
|
|
u8 tbl_idx;
|
|
|
|
for (tbl_idx = 0; tbl_idx < PASID_TBL_ENTRIES; tbl_idx++) {
|
|
if (pasid_pte_is_present(tbl_entry)) {
|
|
tbl_wlk->pasid_tbl_entry = tbl_entry;
|
|
tbl_wlk->pasid = (dir_idx << PASID_PDE_SHIFT) + tbl_idx;
|
|
print_tbl_walk(m);
|
|
}
|
|
|
|
tbl_entry++;
|
|
}
|
|
}
|
|
|
|
static void pasid_dir_walk(struct seq_file *m, u64 pasid_dir_ptr,
|
|
u16 pasid_dir_size)
|
|
{
|
|
struct pasid_dir_entry *dir_entry = phys_to_virt(pasid_dir_ptr);
|
|
struct pasid_entry *pasid_tbl;
|
|
u16 dir_idx;
|
|
|
|
for (dir_idx = 0; dir_idx < pasid_dir_size; dir_idx++) {
|
|
pasid_tbl = get_pasid_table_from_pde(dir_entry);
|
|
if (pasid_tbl)
|
|
pasid_tbl_walk(m, pasid_tbl, dir_idx);
|
|
|
|
dir_entry++;
|
|
}
|
|
}
|
|
|
|
static void ctx_tbl_walk(struct seq_file *m, struct intel_iommu *iommu, u16 bus)
|
|
{
|
|
struct context_entry *context;
|
|
u16 devfn, pasid_dir_size;
|
|
u64 pasid_dir_ptr;
|
|
|
|
for (devfn = 0; devfn < 256; devfn++) {
|
|
struct tbl_walk tbl_wlk = {0};
|
|
|
|
/*
|
|
* Scalable mode root entry points to upper scalable mode
|
|
* context table and lower scalable mode context table. Each
|
|
* scalable mode context table has 128 context entries where as
|
|
* legacy mode context table has 256 context entries. So in
|
|
* scalable mode, the context entries for former 128 devices are
|
|
* in the lower scalable mode context table, while the latter
|
|
* 128 devices are in the upper scalable mode context table.
|
|
* In scalable mode, when devfn > 127, iommu_context_addr()
|
|
* automatically refers to upper scalable mode context table and
|
|
* hence the caller doesn't have to worry about differences
|
|
* between scalable mode and non scalable mode.
|
|
*/
|
|
context = iommu_context_addr(iommu, bus, devfn, 0);
|
|
if (!context)
|
|
return;
|
|
|
|
if (!context_present(context))
|
|
continue;
|
|
|
|
tbl_wlk.bus = bus;
|
|
tbl_wlk.devfn = devfn;
|
|
tbl_wlk.rt_entry = &iommu->root_entry[bus];
|
|
tbl_wlk.ctx_entry = context;
|
|
m->private = &tbl_wlk;
|
|
|
|
if (dmar_readq(iommu->reg + DMAR_RTADDR_REG) & DMA_RTADDR_SMT) {
|
|
pasid_dir_ptr = context->lo & VTD_PAGE_MASK;
|
|
pasid_dir_size = get_pasid_dir_size(context);
|
|
pasid_dir_walk(m, pasid_dir_ptr, pasid_dir_size);
|
|
continue;
|
|
}
|
|
|
|
print_tbl_walk(m);
|
|
}
|
|
}
|
|
|
|
static void root_tbl_walk(struct seq_file *m, struct intel_iommu *iommu)
|
|
{
|
|
u16 bus;
|
|
|
|
spin_lock(&iommu->lock);
|
|
seq_printf(m, "IOMMU %s: Root Table Address: 0x%llx\n", iommu->name,
|
|
(u64)virt_to_phys(iommu->root_entry));
|
|
seq_puts(m, "B.D.F\tRoot_entry\t\t\t\tContext_entry\t\t\t\tPASID\tPASID_table_entry\n");
|
|
|
|
/*
|
|
* No need to check if the root entry is present or not because
|
|
* iommu_context_addr() performs the same check before returning
|
|
* context entry.
|
|
*/
|
|
for (bus = 0; bus < 256; bus++)
|
|
ctx_tbl_walk(m, iommu, bus);
|
|
spin_unlock(&iommu->lock);
|
|
}
|
|
|
|
static int dmar_translation_struct_show(struct seq_file *m, void *unused)
|
|
{
|
|
struct dmar_drhd_unit *drhd;
|
|
struct intel_iommu *iommu;
|
|
u32 sts;
|
|
|
|
rcu_read_lock();
|
|
for_each_active_iommu(iommu, drhd) {
|
|
sts = dmar_readl(iommu->reg + DMAR_GSTS_REG);
|
|
if (!(sts & DMA_GSTS_TES)) {
|
|
seq_printf(m, "DMA Remapping is not enabled on %s\n",
|
|
iommu->name);
|
|
continue;
|
|
}
|
|
root_tbl_walk(m, iommu);
|
|
seq_putc(m, '\n');
|
|
}
|
|
rcu_read_unlock();
|
|
|
|
return 0;
|
|
}
|
|
DEFINE_SHOW_ATTRIBUTE(dmar_translation_struct);
|
|
|
|
static inline unsigned long level_to_directory_size(int level)
|
|
{
|
|
return BIT_ULL(VTD_PAGE_SHIFT + VTD_STRIDE_SHIFT * (level - 1));
|
|
}
|
|
|
|
static inline void
|
|
dump_page_info(struct seq_file *m, unsigned long iova, u64 *path)
|
|
{
|
|
seq_printf(m, "0x%013lx |\t0x%016llx\t0x%016llx\t0x%016llx",
|
|
iova >> VTD_PAGE_SHIFT, path[5], path[4], path[3]);
|
|
if (path[2]) {
|
|
seq_printf(m, "\t0x%016llx", path[2]);
|
|
if (path[1])
|
|
seq_printf(m, "\t0x%016llx", path[1]);
|
|
}
|
|
seq_putc(m, '\n');
|
|
}
|
|
|
|
static void pgtable_walk_level(struct seq_file *m, struct dma_pte *pde,
|
|
int level, unsigned long start,
|
|
u64 *path)
|
|
{
|
|
int i;
|
|
|
|
if (level > 5 || level < 1)
|
|
return;
|
|
|
|
for (i = 0; i < BIT_ULL(VTD_STRIDE_SHIFT);
|
|
i++, pde++, start += level_to_directory_size(level)) {
|
|
if (!dma_pte_present(pde))
|
|
continue;
|
|
|
|
path[level] = pde->val;
|
|
if (dma_pte_superpage(pde) || level == 1)
|
|
dump_page_info(m, start, path);
|
|
else
|
|
pgtable_walk_level(m, phys_to_virt(dma_pte_addr(pde)),
|
|
level - 1, start, path);
|
|
path[level] = 0;
|
|
}
|
|
}
|
|
|
|
static int domain_translation_struct_show(struct seq_file *m,
|
|
struct device_domain_info *info,
|
|
ioasid_t pasid)
|
|
{
|
|
bool scalable, found = false;
|
|
struct dmar_drhd_unit *drhd;
|
|
struct intel_iommu *iommu;
|
|
u16 devfn, bus, seg;
|
|
|
|
bus = info->bus;
|
|
devfn = info->devfn;
|
|
seg = info->segment;
|
|
|
|
rcu_read_lock();
|
|
for_each_active_iommu(iommu, drhd) {
|
|
struct context_entry *context;
|
|
u64 pgd, path[6] = { 0 };
|
|
u32 sts, agaw;
|
|
|
|
if (seg != iommu->segment)
|
|
continue;
|
|
|
|
sts = dmar_readl(iommu->reg + DMAR_GSTS_REG);
|
|
if (!(sts & DMA_GSTS_TES)) {
|
|
seq_printf(m, "DMA Remapping is not enabled on %s\n",
|
|
iommu->name);
|
|
continue;
|
|
}
|
|
if (dmar_readq(iommu->reg + DMAR_RTADDR_REG) & DMA_RTADDR_SMT)
|
|
scalable = true;
|
|
else
|
|
scalable = false;
|
|
|
|
/*
|
|
* The iommu->lock is held across the callback, which will
|
|
* block calls to domain_attach/domain_detach. Hence,
|
|
* the domain of the device will not change during traversal.
|
|
*
|
|
* Traversing page table possibly races with the iommu_unmap()
|
|
* interface. This could be solved by RCU-freeing the page
|
|
* table pages in the iommu_unmap() path.
|
|
*/
|
|
spin_lock(&iommu->lock);
|
|
|
|
context = iommu_context_addr(iommu, bus, devfn, 0);
|
|
if (!context || !context_present(context))
|
|
goto iommu_unlock;
|
|
|
|
if (scalable) { /* scalable mode */
|
|
struct pasid_entry *pasid_tbl, *pasid_tbl_entry;
|
|
struct pasid_dir_entry *dir_tbl, *dir_entry;
|
|
u16 dir_idx, tbl_idx, pgtt;
|
|
u64 pasid_dir_ptr;
|
|
|
|
pasid_dir_ptr = context->lo & VTD_PAGE_MASK;
|
|
|
|
/* Dump specified device domain mappings with PASID. */
|
|
dir_idx = pasid >> PASID_PDE_SHIFT;
|
|
tbl_idx = pasid & PASID_PTE_MASK;
|
|
|
|
dir_tbl = phys_to_virt(pasid_dir_ptr);
|
|
dir_entry = &dir_tbl[dir_idx];
|
|
|
|
pasid_tbl = get_pasid_table_from_pde(dir_entry);
|
|
if (!pasid_tbl)
|
|
goto iommu_unlock;
|
|
|
|
pasid_tbl_entry = &pasid_tbl[tbl_idx];
|
|
if (!pasid_pte_is_present(pasid_tbl_entry))
|
|
goto iommu_unlock;
|
|
|
|
/*
|
|
* According to PASID Granular Translation Type(PGTT),
|
|
* get the page table pointer.
|
|
*/
|
|
pgtt = (u16)(pasid_tbl_entry->val[0] & GENMASK_ULL(8, 6)) >> 6;
|
|
agaw = (u8)(pasid_tbl_entry->val[0] & GENMASK_ULL(4, 2)) >> 2;
|
|
|
|
switch (pgtt) {
|
|
case PASID_ENTRY_PGTT_FL_ONLY:
|
|
pgd = pasid_tbl_entry->val[2];
|
|
break;
|
|
case PASID_ENTRY_PGTT_SL_ONLY:
|
|
case PASID_ENTRY_PGTT_NESTED:
|
|
pgd = pasid_tbl_entry->val[0];
|
|
break;
|
|
default:
|
|
goto iommu_unlock;
|
|
}
|
|
pgd &= VTD_PAGE_MASK;
|
|
} else { /* legacy mode */
|
|
pgd = context->lo & VTD_PAGE_MASK;
|
|
agaw = context->hi & 7;
|
|
}
|
|
|
|
seq_printf(m, "Device %04x:%02x:%02x.%x ",
|
|
iommu->segment, bus, PCI_SLOT(devfn), PCI_FUNC(devfn));
|
|
|
|
if (scalable)
|
|
seq_printf(m, "with pasid %x @0x%llx\n", pasid, pgd);
|
|
else
|
|
seq_printf(m, "@0x%llx\n", pgd);
|
|
|
|
seq_printf(m, "%-17s\t%-18s\t%-18s\t%-18s\t%-18s\t%-s\n",
|
|
"IOVA_PFN", "PML5E", "PML4E", "PDPE", "PDE", "PTE");
|
|
pgtable_walk_level(m, phys_to_virt(pgd), agaw + 2, 0, path);
|
|
|
|
found = true;
|
|
iommu_unlock:
|
|
spin_unlock(&iommu->lock);
|
|
if (found)
|
|
break;
|
|
}
|
|
rcu_read_unlock();
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int dev_domain_translation_struct_show(struct seq_file *m, void *unused)
|
|
{
|
|
struct device_domain_info *info = (struct device_domain_info *)m->private;
|
|
|
|
return domain_translation_struct_show(m, info, IOMMU_NO_PASID);
|
|
}
|
|
DEFINE_SHOW_ATTRIBUTE(dev_domain_translation_struct);
|
|
|
|
static int pasid_domain_translation_struct_show(struct seq_file *m, void *unused)
|
|
{
|
|
struct dev_pasid_info *dev_pasid = (struct dev_pasid_info *)m->private;
|
|
struct device_domain_info *info = dev_iommu_priv_get(dev_pasid->dev);
|
|
|
|
return domain_translation_struct_show(m, info, dev_pasid->pasid);
|
|
}
|
|
DEFINE_SHOW_ATTRIBUTE(pasid_domain_translation_struct);
|
|
|
|
static void invalidation_queue_entry_show(struct seq_file *m,
|
|
struct intel_iommu *iommu)
|
|
{
|
|
int index, shift = qi_shift(iommu);
|
|
struct qi_desc *desc;
|
|
int offset;
|
|
|
|
if (ecap_smts(iommu->ecap))
|
|
seq_puts(m, "Index\t\tqw0\t\t\tqw1\t\t\tqw2\t\t\tqw3\t\t\tstatus\n");
|
|
else
|
|
seq_puts(m, "Index\t\tqw0\t\t\tqw1\t\t\tstatus\n");
|
|
|
|
for (index = 0; index < QI_LENGTH; index++) {
|
|
offset = index << shift;
|
|
desc = iommu->qi->desc + offset;
|
|
if (ecap_smts(iommu->ecap))
|
|
seq_printf(m, "%5d\t%016llx\t%016llx\t%016llx\t%016llx\t%016x\n",
|
|
index, desc->qw0, desc->qw1,
|
|
desc->qw2, desc->qw3,
|
|
iommu->qi->desc_status[index]);
|
|
else
|
|
seq_printf(m, "%5d\t%016llx\t%016llx\t%016x\n",
|
|
index, desc->qw0, desc->qw1,
|
|
iommu->qi->desc_status[index]);
|
|
}
|
|
}
|
|
|
|
static int invalidation_queue_show(struct seq_file *m, void *unused)
|
|
{
|
|
struct dmar_drhd_unit *drhd;
|
|
struct intel_iommu *iommu;
|
|
unsigned long flags;
|
|
struct q_inval *qi;
|
|
int shift;
|
|
|
|
rcu_read_lock();
|
|
for_each_active_iommu(iommu, drhd) {
|
|
qi = iommu->qi;
|
|
shift = qi_shift(iommu);
|
|
|
|
if (!qi || !ecap_qis(iommu->ecap))
|
|
continue;
|
|
|
|
seq_printf(m, "Invalidation queue on IOMMU: %s\n", iommu->name);
|
|
|
|
raw_spin_lock_irqsave(&qi->q_lock, flags);
|
|
seq_printf(m, " Base: 0x%llx\tHead: %lld\tTail: %lld\n",
|
|
(u64)virt_to_phys(qi->desc),
|
|
dmar_readq(iommu->reg + DMAR_IQH_REG) >> shift,
|
|
dmar_readq(iommu->reg + DMAR_IQT_REG) >> shift);
|
|
invalidation_queue_entry_show(m, iommu);
|
|
raw_spin_unlock_irqrestore(&qi->q_lock, flags);
|
|
seq_putc(m, '\n');
|
|
}
|
|
rcu_read_unlock();
|
|
|
|
return 0;
|
|
}
|
|
DEFINE_SHOW_ATTRIBUTE(invalidation_queue);
|
|
|
|
#ifdef CONFIG_IRQ_REMAP
|
|
static void ir_tbl_remap_entry_show(struct seq_file *m,
|
|
struct intel_iommu *iommu)
|
|
{
|
|
struct irte *ri_entry;
|
|
unsigned long flags;
|
|
int idx;
|
|
|
|
seq_puts(m, " Entry SrcID DstID Vct IRTE_high\t\tIRTE_low\n");
|
|
|
|
raw_spin_lock_irqsave(&irq_2_ir_lock, flags);
|
|
for (idx = 0; idx < INTR_REMAP_TABLE_ENTRIES; idx++) {
|
|
ri_entry = &iommu->ir_table->base[idx];
|
|
if (!ri_entry->present || ri_entry->p_pst)
|
|
continue;
|
|
|
|
seq_printf(m, " %-5d %02x:%02x.%01x %08x %02x %016llx\t%016llx\n",
|
|
idx, PCI_BUS_NUM(ri_entry->sid),
|
|
PCI_SLOT(ri_entry->sid), PCI_FUNC(ri_entry->sid),
|
|
ri_entry->dest_id, ri_entry->vector,
|
|
ri_entry->high, ri_entry->low);
|
|
}
|
|
raw_spin_unlock_irqrestore(&irq_2_ir_lock, flags);
|
|
}
|
|
|
|
static void ir_tbl_posted_entry_show(struct seq_file *m,
|
|
struct intel_iommu *iommu)
|
|
{
|
|
struct irte *pi_entry;
|
|
unsigned long flags;
|
|
int idx;
|
|
|
|
seq_puts(m, " Entry SrcID PDA_high PDA_low Vct IRTE_high\t\tIRTE_low\n");
|
|
|
|
raw_spin_lock_irqsave(&irq_2_ir_lock, flags);
|
|
for (idx = 0; idx < INTR_REMAP_TABLE_ENTRIES; idx++) {
|
|
pi_entry = &iommu->ir_table->base[idx];
|
|
if (!pi_entry->present || !pi_entry->p_pst)
|
|
continue;
|
|
|
|
seq_printf(m, " %-5d %02x:%02x.%01x %08x %08x %02x %016llx\t%016llx\n",
|
|
idx, PCI_BUS_NUM(pi_entry->sid),
|
|
PCI_SLOT(pi_entry->sid), PCI_FUNC(pi_entry->sid),
|
|
pi_entry->pda_h, pi_entry->pda_l << 6,
|
|
pi_entry->vector, pi_entry->high,
|
|
pi_entry->low);
|
|
}
|
|
raw_spin_unlock_irqrestore(&irq_2_ir_lock, flags);
|
|
}
|
|
|
|
/*
|
|
* For active IOMMUs go through the Interrupt remapping
|
|
* table and print valid entries in a table format for
|
|
* Remapped and Posted Interrupts.
|
|
*/
|
|
static int ir_translation_struct_show(struct seq_file *m, void *unused)
|
|
{
|
|
struct dmar_drhd_unit *drhd;
|
|
struct intel_iommu *iommu;
|
|
u64 irta;
|
|
u32 sts;
|
|
|
|
rcu_read_lock();
|
|
for_each_active_iommu(iommu, drhd) {
|
|
if (!ecap_ir_support(iommu->ecap))
|
|
continue;
|
|
|
|
seq_printf(m, "Remapped Interrupt supported on IOMMU: %s\n",
|
|
iommu->name);
|
|
|
|
sts = dmar_readl(iommu->reg + DMAR_GSTS_REG);
|
|
if (iommu->ir_table && (sts & DMA_GSTS_IRES)) {
|
|
irta = virt_to_phys(iommu->ir_table->base);
|
|
seq_printf(m, " IR table address:%llx\n", irta);
|
|
ir_tbl_remap_entry_show(m, iommu);
|
|
} else {
|
|
seq_puts(m, "Interrupt Remapping is not enabled\n");
|
|
}
|
|
seq_putc(m, '\n');
|
|
}
|
|
|
|
seq_puts(m, "****\n\n");
|
|
|
|
for_each_active_iommu(iommu, drhd) {
|
|
if (!cap_pi_support(iommu->cap))
|
|
continue;
|
|
|
|
seq_printf(m, "Posted Interrupt supported on IOMMU: %s\n",
|
|
iommu->name);
|
|
|
|
if (iommu->ir_table) {
|
|
irta = virt_to_phys(iommu->ir_table->base);
|
|
seq_printf(m, " IR table address:%llx\n", irta);
|
|
ir_tbl_posted_entry_show(m, iommu);
|
|
} else {
|
|
seq_puts(m, "Interrupt Remapping is not enabled\n");
|
|
}
|
|
seq_putc(m, '\n');
|
|
}
|
|
rcu_read_unlock();
|
|
|
|
return 0;
|
|
}
|
|
DEFINE_SHOW_ATTRIBUTE(ir_translation_struct);
|
|
#endif
|
|
|
|
static void latency_show_one(struct seq_file *m, struct intel_iommu *iommu,
|
|
struct dmar_drhd_unit *drhd)
|
|
{
|
|
int ret;
|
|
|
|
seq_printf(m, "IOMMU: %s Register Base Address: %llx\n",
|
|
iommu->name, drhd->reg_base_addr);
|
|
|
|
ret = dmar_latency_snapshot(iommu, debug_buf, DEBUG_BUFFER_SIZE);
|
|
if (ret < 0)
|
|
seq_puts(m, "Failed to get latency snapshot");
|
|
else
|
|
seq_puts(m, debug_buf);
|
|
seq_puts(m, "\n");
|
|
}
|
|
|
|
static int latency_show(struct seq_file *m, void *v)
|
|
{
|
|
struct dmar_drhd_unit *drhd;
|
|
struct intel_iommu *iommu;
|
|
|
|
rcu_read_lock();
|
|
for_each_active_iommu(iommu, drhd)
|
|
latency_show_one(m, iommu, drhd);
|
|
rcu_read_unlock();
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int dmar_perf_latency_open(struct inode *inode, struct file *filp)
|
|
{
|
|
return single_open(filp, latency_show, NULL);
|
|
}
|
|
|
|
static ssize_t dmar_perf_latency_write(struct file *filp,
|
|
const char __user *ubuf,
|
|
size_t cnt, loff_t *ppos)
|
|
{
|
|
struct dmar_drhd_unit *drhd;
|
|
struct intel_iommu *iommu;
|
|
int counting;
|
|
char buf[64];
|
|
|
|
if (cnt > 63)
|
|
cnt = 63;
|
|
|
|
if (copy_from_user(&buf, ubuf, cnt))
|
|
return -EFAULT;
|
|
|
|
buf[cnt] = 0;
|
|
|
|
if (kstrtoint(buf, 0, &counting))
|
|
return -EINVAL;
|
|
|
|
switch (counting) {
|
|
case 0:
|
|
rcu_read_lock();
|
|
for_each_active_iommu(iommu, drhd) {
|
|
dmar_latency_disable(iommu, DMAR_LATENCY_INV_IOTLB);
|
|
dmar_latency_disable(iommu, DMAR_LATENCY_INV_DEVTLB);
|
|
dmar_latency_disable(iommu, DMAR_LATENCY_INV_IEC);
|
|
}
|
|
rcu_read_unlock();
|
|
break;
|
|
case 1:
|
|
rcu_read_lock();
|
|
for_each_active_iommu(iommu, drhd)
|
|
dmar_latency_enable(iommu, DMAR_LATENCY_INV_IOTLB);
|
|
rcu_read_unlock();
|
|
break;
|
|
case 2:
|
|
rcu_read_lock();
|
|
for_each_active_iommu(iommu, drhd)
|
|
dmar_latency_enable(iommu, DMAR_LATENCY_INV_DEVTLB);
|
|
rcu_read_unlock();
|
|
break;
|
|
case 3:
|
|
rcu_read_lock();
|
|
for_each_active_iommu(iommu, drhd)
|
|
dmar_latency_enable(iommu, DMAR_LATENCY_INV_IEC);
|
|
rcu_read_unlock();
|
|
break;
|
|
default:
|
|
return -EINVAL;
|
|
}
|
|
|
|
*ppos += cnt;
|
|
return cnt;
|
|
}
|
|
|
|
static const struct file_operations dmar_perf_latency_fops = {
|
|
.open = dmar_perf_latency_open,
|
|
.write = dmar_perf_latency_write,
|
|
.read = seq_read,
|
|
.llseek = seq_lseek,
|
|
.release = single_release,
|
|
};
|
|
|
|
void __init intel_iommu_debugfs_init(void)
|
|
{
|
|
intel_iommu_debug = debugfs_create_dir("intel", iommu_debugfs_dir);
|
|
|
|
debugfs_create_file("iommu_regset", 0444, intel_iommu_debug, NULL,
|
|
&iommu_regset_fops);
|
|
debugfs_create_file("dmar_translation_struct", 0444, intel_iommu_debug,
|
|
NULL, &dmar_translation_struct_fops);
|
|
debugfs_create_file("invalidation_queue", 0444, intel_iommu_debug,
|
|
NULL, &invalidation_queue_fops);
|
|
#ifdef CONFIG_IRQ_REMAP
|
|
debugfs_create_file("ir_translation_struct", 0444, intel_iommu_debug,
|
|
NULL, &ir_translation_struct_fops);
|
|
#endif
|
|
debugfs_create_file("dmar_perf_latency", 0644, intel_iommu_debug,
|
|
NULL, &dmar_perf_latency_fops);
|
|
}
|
|
|
|
/*
|
|
* Create a debugfs directory for each device, and then create a
|
|
* debugfs file in this directory for users to dump the page table
|
|
* of the default domain. e.g.
|
|
* /sys/kernel/debug/iommu/intel/0000:00:01.0/domain_translation_struct
|
|
*/
|
|
void intel_iommu_debugfs_create_dev(struct device_domain_info *info)
|
|
{
|
|
info->debugfs_dentry = debugfs_create_dir(dev_name(info->dev), intel_iommu_debug);
|
|
|
|
debugfs_create_file("domain_translation_struct", 0444, info->debugfs_dentry,
|
|
info, &dev_domain_translation_struct_fops);
|
|
}
|
|
|
|
/* Remove the device debugfs directory. */
|
|
void intel_iommu_debugfs_remove_dev(struct device_domain_info *info)
|
|
{
|
|
debugfs_remove_recursive(info->debugfs_dentry);
|
|
}
|
|
|
|
/*
|
|
* Create a debugfs directory per pair of {device, pasid}, then create the
|
|
* corresponding debugfs file in this directory for users to dump its page
|
|
* table. e.g.
|
|
* /sys/kernel/debug/iommu/intel/0000:00:01.0/1/domain_translation_struct
|
|
*
|
|
* The debugfs only dumps the page tables whose mappings are created and
|
|
* destroyed by the iommu_map/unmap() interfaces. Check the mapping type
|
|
* of the domain before creating debugfs directory.
|
|
*/
|
|
void intel_iommu_debugfs_create_dev_pasid(struct dev_pasid_info *dev_pasid)
|
|
{
|
|
struct device_domain_info *info = dev_iommu_priv_get(dev_pasid->dev);
|
|
char dir_name[10];
|
|
|
|
sprintf(dir_name, "%x", dev_pasid->pasid);
|
|
dev_pasid->debugfs_dentry = debugfs_create_dir(dir_name, info->debugfs_dentry);
|
|
|
|
debugfs_create_file("domain_translation_struct", 0444, dev_pasid->debugfs_dentry,
|
|
dev_pasid, &pasid_domain_translation_struct_fops);
|
|
}
|
|
|
|
/* Remove the device pasid debugfs directory. */
|
|
void intel_iommu_debugfs_remove_dev_pasid(struct dev_pasid_info *dev_pasid)
|
|
{
|
|
debugfs_remove_recursive(dev_pasid->debugfs_dentry);
|
|
}
|