1 // SPDX-License-Identifier: GPL-2.0
3 * Copyright © 2018 Intel Corporation.
11 #include <linux/debugfs.h>
12 #include <linux/dmar.h>
13 #include <linux/intel-iommu.h>
14 #include <linux/pci.h>
16 #include <asm/irq_remapping.h>
25 struct root_entry *rt_entry;
26 struct context_entry *ctx_entry;
27 struct pasid_entry *pasid_tbl_entry;
35 #define DEBUG_BUFFER_SIZE 1024
36 static char debug_buf[DEBUG_BUFFER_SIZE];
38 #define IOMMU_REGSET_ENTRY(_reg_) \
39 { DMAR_##_reg_##_REG, __stringify(_reg_) }
41 static const struct iommu_regset iommu_regs_32[] = {
42 IOMMU_REGSET_ENTRY(VER),
43 IOMMU_REGSET_ENTRY(GCMD),
44 IOMMU_REGSET_ENTRY(GSTS),
45 IOMMU_REGSET_ENTRY(FSTS),
46 IOMMU_REGSET_ENTRY(FECTL),
47 IOMMU_REGSET_ENTRY(FEDATA),
48 IOMMU_REGSET_ENTRY(FEADDR),
49 IOMMU_REGSET_ENTRY(FEUADDR),
50 IOMMU_REGSET_ENTRY(PMEN),
51 IOMMU_REGSET_ENTRY(PLMBASE),
52 IOMMU_REGSET_ENTRY(PLMLIMIT),
53 IOMMU_REGSET_ENTRY(ICS),
54 IOMMU_REGSET_ENTRY(PRS),
55 IOMMU_REGSET_ENTRY(PECTL),
56 IOMMU_REGSET_ENTRY(PEDATA),
57 IOMMU_REGSET_ENTRY(PEADDR),
58 IOMMU_REGSET_ENTRY(PEUADDR),
61 static const struct iommu_regset iommu_regs_64[] = {
62 IOMMU_REGSET_ENTRY(CAP),
63 IOMMU_REGSET_ENTRY(ECAP),
64 IOMMU_REGSET_ENTRY(RTADDR),
65 IOMMU_REGSET_ENTRY(CCMD),
66 IOMMU_REGSET_ENTRY(AFLOG),
67 IOMMU_REGSET_ENTRY(PHMBASE),
68 IOMMU_REGSET_ENTRY(PHMLIMIT),
69 IOMMU_REGSET_ENTRY(IQH),
70 IOMMU_REGSET_ENTRY(IQT),
71 IOMMU_REGSET_ENTRY(IQA),
72 IOMMU_REGSET_ENTRY(IRTA),
73 IOMMU_REGSET_ENTRY(PQH),
74 IOMMU_REGSET_ENTRY(PQT),
75 IOMMU_REGSET_ENTRY(PQA),
76 IOMMU_REGSET_ENTRY(MTRRCAP),
77 IOMMU_REGSET_ENTRY(MTRRDEF),
78 IOMMU_REGSET_ENTRY(MTRR_FIX64K_00000),
79 IOMMU_REGSET_ENTRY(MTRR_FIX16K_80000),
80 IOMMU_REGSET_ENTRY(MTRR_FIX16K_A0000),
81 IOMMU_REGSET_ENTRY(MTRR_FIX4K_C0000),
82 IOMMU_REGSET_ENTRY(MTRR_FIX4K_C8000),
83 IOMMU_REGSET_ENTRY(MTRR_FIX4K_D0000),
84 IOMMU_REGSET_ENTRY(MTRR_FIX4K_D8000),
85 IOMMU_REGSET_ENTRY(MTRR_FIX4K_E0000),
86 IOMMU_REGSET_ENTRY(MTRR_FIX4K_E8000),
87 IOMMU_REGSET_ENTRY(MTRR_FIX4K_F0000),
88 IOMMU_REGSET_ENTRY(MTRR_FIX4K_F8000),
89 IOMMU_REGSET_ENTRY(MTRR_PHYSBASE0),
90 IOMMU_REGSET_ENTRY(MTRR_PHYSMASK0),
91 IOMMU_REGSET_ENTRY(MTRR_PHYSBASE1),
92 IOMMU_REGSET_ENTRY(MTRR_PHYSMASK1),
93 IOMMU_REGSET_ENTRY(MTRR_PHYSBASE2),
94 IOMMU_REGSET_ENTRY(MTRR_PHYSMASK2),
95 IOMMU_REGSET_ENTRY(MTRR_PHYSBASE3),
96 IOMMU_REGSET_ENTRY(MTRR_PHYSMASK3),
97 IOMMU_REGSET_ENTRY(MTRR_PHYSBASE4),
98 IOMMU_REGSET_ENTRY(MTRR_PHYSMASK4),
99 IOMMU_REGSET_ENTRY(MTRR_PHYSBASE5),
100 IOMMU_REGSET_ENTRY(MTRR_PHYSMASK5),
101 IOMMU_REGSET_ENTRY(MTRR_PHYSBASE6),
102 IOMMU_REGSET_ENTRY(MTRR_PHYSMASK6),
103 IOMMU_REGSET_ENTRY(MTRR_PHYSBASE7),
104 IOMMU_REGSET_ENTRY(MTRR_PHYSMASK7),
105 IOMMU_REGSET_ENTRY(MTRR_PHYSBASE8),
106 IOMMU_REGSET_ENTRY(MTRR_PHYSMASK8),
107 IOMMU_REGSET_ENTRY(MTRR_PHYSBASE9),
108 IOMMU_REGSET_ENTRY(MTRR_PHYSMASK9),
109 IOMMU_REGSET_ENTRY(VCCAP),
110 IOMMU_REGSET_ENTRY(VCMD),
111 IOMMU_REGSET_ENTRY(VCRSP),
114 static int iommu_regset_show(struct seq_file *m, void *unused)
116 struct dmar_drhd_unit *drhd;
117 struct intel_iommu *iommu;
123 for_each_active_iommu(iommu, drhd) {
124 if (!drhd->reg_base_addr) {
125 seq_puts(m, "IOMMU: Invalid base address\n");
130 seq_printf(m, "IOMMU: %s Register Base Address: %llx\n",
131 iommu->name, drhd->reg_base_addr);
132 seq_puts(m, "Name\t\t\tOffset\t\tContents\n");
134 * Publish the contents of the 64-bit hardware registers
135 * by adding the offset to the pointer (virtual address).
137 raw_spin_lock_irqsave(&iommu->register_lock, flag);
138 for (i = 0 ; i < ARRAY_SIZE(iommu_regs_32); i++) {
139 value = dmar_readl(iommu->reg + iommu_regs_32[i].offset);
140 seq_printf(m, "%-16s\t0x%02x\t\t0x%016llx\n",
141 iommu_regs_32[i].regs, iommu_regs_32[i].offset,
144 for (i = 0 ; i < ARRAY_SIZE(iommu_regs_64); i++) {
145 value = dmar_readq(iommu->reg + iommu_regs_64[i].offset);
146 seq_printf(m, "%-16s\t0x%02x\t\t0x%016llx\n",
147 iommu_regs_64[i].regs, iommu_regs_64[i].offset,
150 raw_spin_unlock_irqrestore(&iommu->register_lock, flag);
158 DEFINE_SHOW_ATTRIBUTE(iommu_regset);
160 static inline void print_tbl_walk(struct seq_file *m)
162 struct tbl_walk *tbl_wlk = m->private;
164 seq_printf(m, "%02x:%02x.%x\t0x%016llx:0x%016llx\t0x%016llx:0x%016llx\t",
165 tbl_wlk->bus, PCI_SLOT(tbl_wlk->devfn),
166 PCI_FUNC(tbl_wlk->devfn), tbl_wlk->rt_entry->hi,
167 tbl_wlk->rt_entry->lo, tbl_wlk->ctx_entry->hi,
168 tbl_wlk->ctx_entry->lo);
171 * A legacy mode DMAR doesn't support PASID, hence default it to -1
172 * indicating that it's invalid. Also, default all PASID related fields
175 if (!tbl_wlk->pasid_tbl_entry)
176 seq_printf(m, "%-6d\t0x%016llx:0x%016llx:0x%016llx\n", -1,
177 (u64)0, (u64)0, (u64)0);
179 seq_printf(m, "%-6d\t0x%016llx:0x%016llx:0x%016llx\n",
180 tbl_wlk->pasid, tbl_wlk->pasid_tbl_entry->val[2],
181 tbl_wlk->pasid_tbl_entry->val[1],
182 tbl_wlk->pasid_tbl_entry->val[0]);
185 static void pasid_tbl_walk(struct seq_file *m, struct pasid_entry *tbl_entry,
188 struct tbl_walk *tbl_wlk = m->private;
191 for (tbl_idx = 0; tbl_idx < PASID_TBL_ENTRIES; tbl_idx++) {
192 if (pasid_pte_is_present(tbl_entry)) {
193 tbl_wlk->pasid_tbl_entry = tbl_entry;
194 tbl_wlk->pasid = (dir_idx << PASID_PDE_SHIFT) + tbl_idx;
202 static void pasid_dir_walk(struct seq_file *m, u64 pasid_dir_ptr,
205 struct pasid_dir_entry *dir_entry = phys_to_virt(pasid_dir_ptr);
206 struct pasid_entry *pasid_tbl;
209 for (dir_idx = 0; dir_idx < pasid_dir_size; dir_idx++) {
210 pasid_tbl = get_pasid_table_from_pde(dir_entry);
212 pasid_tbl_walk(m, pasid_tbl, dir_idx);
218 static void ctx_tbl_walk(struct seq_file *m, struct intel_iommu *iommu, u16 bus)
220 struct context_entry *context;
221 u16 devfn, pasid_dir_size;
224 for (devfn = 0; devfn < 256; devfn++) {
225 struct tbl_walk tbl_wlk = {0};
228 * Scalable mode root entry points to upper scalable mode
229 * context table and lower scalable mode context table. Each
230 * scalable mode context table has 128 context entries where as
231 * legacy mode context table has 256 context entries. So in
232 * scalable mode, the context entries for former 128 devices are
233 * in the lower scalable mode context table, while the latter
234 * 128 devices are in the upper scalable mode context table.
235 * In scalable mode, when devfn > 127, iommu_context_addr()
236 * automatically refers to upper scalable mode context table and
237 * hence the caller doesn't have to worry about differences
238 * between scalable mode and non scalable mode.
240 context = iommu_context_addr(iommu, bus, devfn, 0);
244 if (!context_present(context))
248 tbl_wlk.devfn = devfn;
249 tbl_wlk.rt_entry = &iommu->root_entry[bus];
250 tbl_wlk.ctx_entry = context;
251 m->private = &tbl_wlk;
253 if (dmar_readq(iommu->reg + DMAR_RTADDR_REG) & DMA_RTADDR_SMT) {
254 pasid_dir_ptr = context->lo & VTD_PAGE_MASK;
255 pasid_dir_size = get_pasid_dir_size(context);
256 pasid_dir_walk(m, pasid_dir_ptr, pasid_dir_size);
264 static void root_tbl_walk(struct seq_file *m, struct intel_iommu *iommu)
269 spin_lock_irqsave(&iommu->lock, flags);
270 seq_printf(m, "IOMMU %s: Root Table Address: 0x%llx\n", iommu->name,
271 (u64)virt_to_phys(iommu->root_entry));
272 seq_puts(m, "B.D.F\tRoot_entry\t\t\t\tContext_entry\t\t\t\tPASID\tPASID_table_entry\n");
275 * No need to check if the root entry is present or not because
276 * iommu_context_addr() performs the same check before returning
279 for (bus = 0; bus < 256; bus++)
280 ctx_tbl_walk(m, iommu, bus);
282 spin_unlock_irqrestore(&iommu->lock, flags);
285 static int dmar_translation_struct_show(struct seq_file *m, void *unused)
287 struct dmar_drhd_unit *drhd;
288 struct intel_iommu *iommu;
292 for_each_active_iommu(iommu, drhd) {
293 sts = dmar_readl(iommu->reg + DMAR_GSTS_REG);
294 if (!(sts & DMA_GSTS_TES)) {
295 seq_printf(m, "DMA Remapping is not enabled on %s\n",
299 root_tbl_walk(m, iommu);
306 DEFINE_SHOW_ATTRIBUTE(dmar_translation_struct);
308 static inline unsigned long level_to_directory_size(int level)
310 return BIT_ULL(VTD_PAGE_SHIFT + VTD_STRIDE_SHIFT * (level - 1));
314 dump_page_info(struct seq_file *m, unsigned long iova, u64 *path)
316 seq_printf(m, "0x%013lx |\t0x%016llx\t0x%016llx\t0x%016llx\t0x%016llx\t0x%016llx\n",
317 iova >> VTD_PAGE_SHIFT, path[5], path[4],
318 path[3], path[2], path[1]);
321 static void pgtable_walk_level(struct seq_file *m, struct dma_pte *pde,
322 int level, unsigned long start,
327 if (level > 5 || level < 1)
330 for (i = 0; i < BIT_ULL(VTD_STRIDE_SHIFT);
331 i++, pde++, start += level_to_directory_size(level)) {
332 if (!dma_pte_present(pde))
335 path[level] = pde->val;
336 if (dma_pte_superpage(pde) || level == 1)
337 dump_page_info(m, start, path);
339 pgtable_walk_level(m, phys_to_virt(dma_pte_addr(pde)),
340 level - 1, start, path);
345 static int show_device_domain_translation(struct device *dev, void *data)
347 struct dmar_domain *domain = find_domain(dev);
348 struct seq_file *m = data;
354 seq_printf(m, "Device %s with pasid %d @0x%llx\n",
355 dev_name(dev), domain->default_pasid,
356 (u64)virt_to_phys(domain->pgd));
357 seq_puts(m, "IOVA_PFN\t\tPML5E\t\t\tPML4E\t\t\tPDPE\t\t\tPDE\t\t\tPTE\n");
359 pgtable_walk_level(m, domain->pgd, domain->agaw + 2, 0, path);
365 static int domain_translation_struct_show(struct seq_file *m, void *unused)
370 spin_lock_irqsave(&device_domain_lock, flags);
371 ret = bus_for_each_dev(&pci_bus_type, NULL, m,
372 show_device_domain_translation);
373 spin_unlock_irqrestore(&device_domain_lock, flags);
377 DEFINE_SHOW_ATTRIBUTE(domain_translation_struct);
379 static void invalidation_queue_entry_show(struct seq_file *m,
380 struct intel_iommu *iommu)
382 int index, shift = qi_shift(iommu);
383 struct qi_desc *desc;
386 if (ecap_smts(iommu->ecap))
387 seq_puts(m, "Index\t\tqw0\t\t\tqw1\t\t\tqw2\t\t\tqw3\t\t\tstatus\n");
389 seq_puts(m, "Index\t\tqw0\t\t\tqw1\t\t\tstatus\n");
391 for (index = 0; index < QI_LENGTH; index++) {
392 offset = index << shift;
393 desc = iommu->qi->desc + offset;
394 if (ecap_smts(iommu->ecap))
395 seq_printf(m, "%5d\t%016llx\t%016llx\t%016llx\t%016llx\t%016x\n",
396 index, desc->qw0, desc->qw1,
397 desc->qw2, desc->qw3,
398 iommu->qi->desc_status[index]);
400 seq_printf(m, "%5d\t%016llx\t%016llx\t%016x\n",
401 index, desc->qw0, desc->qw1,
402 iommu->qi->desc_status[index]);
406 static int invalidation_queue_show(struct seq_file *m, void *unused)
408 struct dmar_drhd_unit *drhd;
409 struct intel_iommu *iommu;
415 for_each_active_iommu(iommu, drhd) {
417 shift = qi_shift(iommu);
419 if (!qi || !ecap_qis(iommu->ecap))
422 seq_printf(m, "Invalidation queue on IOMMU: %s\n", iommu->name);
424 raw_spin_lock_irqsave(&qi->q_lock, flags);
425 seq_printf(m, " Base: 0x%llx\tHead: %lld\tTail: %lld\n",
426 (u64)virt_to_phys(qi->desc),
427 dmar_readq(iommu->reg + DMAR_IQH_REG) >> shift,
428 dmar_readq(iommu->reg + DMAR_IQT_REG) >> shift);
429 invalidation_queue_entry_show(m, iommu);
430 raw_spin_unlock_irqrestore(&qi->q_lock, flags);
437 DEFINE_SHOW_ATTRIBUTE(invalidation_queue);
439 #ifdef CONFIG_IRQ_REMAP
440 static void ir_tbl_remap_entry_show(struct seq_file *m,
441 struct intel_iommu *iommu)
443 struct irte *ri_entry;
447 seq_puts(m, " Entry SrcID DstID Vct IRTE_high\t\tIRTE_low\n");
449 raw_spin_lock_irqsave(&irq_2_ir_lock, flags);
450 for (idx = 0; idx < INTR_REMAP_TABLE_ENTRIES; idx++) {
451 ri_entry = &iommu->ir_table->base[idx];
452 if (!ri_entry->present || ri_entry->p_pst)
455 seq_printf(m, " %-5d %02x:%02x.%01x %08x %02x %016llx\t%016llx\n",
456 idx, PCI_BUS_NUM(ri_entry->sid),
457 PCI_SLOT(ri_entry->sid), PCI_FUNC(ri_entry->sid),
458 ri_entry->dest_id, ri_entry->vector,
459 ri_entry->high, ri_entry->low);
461 raw_spin_unlock_irqrestore(&irq_2_ir_lock, flags);
464 static void ir_tbl_posted_entry_show(struct seq_file *m,
465 struct intel_iommu *iommu)
467 struct irte *pi_entry;
471 seq_puts(m, " Entry SrcID PDA_high PDA_low Vct IRTE_high\t\tIRTE_low\n");
473 raw_spin_lock_irqsave(&irq_2_ir_lock, flags);
474 for (idx = 0; idx < INTR_REMAP_TABLE_ENTRIES; idx++) {
475 pi_entry = &iommu->ir_table->base[idx];
476 if (!pi_entry->present || !pi_entry->p_pst)
479 seq_printf(m, " %-5d %02x:%02x.%01x %08x %08x %02x %016llx\t%016llx\n",
480 idx, PCI_BUS_NUM(pi_entry->sid),
481 PCI_SLOT(pi_entry->sid), PCI_FUNC(pi_entry->sid),
482 pi_entry->pda_h, pi_entry->pda_l << 6,
483 pi_entry->vector, pi_entry->high,
486 raw_spin_unlock_irqrestore(&irq_2_ir_lock, flags);
490 * For active IOMMUs go through the Interrupt remapping
491 * table and print valid entries in a table format for
492 * Remapped and Posted Interrupts.
494 static int ir_translation_struct_show(struct seq_file *m, void *unused)
496 struct dmar_drhd_unit *drhd;
497 struct intel_iommu *iommu;
502 for_each_active_iommu(iommu, drhd) {
503 if (!ecap_ir_support(iommu->ecap))
506 seq_printf(m, "Remapped Interrupt supported on IOMMU: %s\n",
509 sts = dmar_readl(iommu->reg + DMAR_GSTS_REG);
510 if (iommu->ir_table && (sts & DMA_GSTS_IRES)) {
511 irta = virt_to_phys(iommu->ir_table->base);
512 seq_printf(m, " IR table address:%llx\n", irta);
513 ir_tbl_remap_entry_show(m, iommu);
515 seq_puts(m, "Interrupt Remapping is not enabled\n");
520 seq_puts(m, "****\n\n");
522 for_each_active_iommu(iommu, drhd) {
523 if (!cap_pi_support(iommu->cap))
526 seq_printf(m, "Posted Interrupt supported on IOMMU: %s\n",
529 if (iommu->ir_table) {
530 irta = virt_to_phys(iommu->ir_table->base);
531 seq_printf(m, " IR table address:%llx\n", irta);
532 ir_tbl_posted_entry_show(m, iommu);
534 seq_puts(m, "Interrupt Remapping is not enabled\n");
542 DEFINE_SHOW_ATTRIBUTE(ir_translation_struct);
545 static void latency_show_one(struct seq_file *m, struct intel_iommu *iommu,
546 struct dmar_drhd_unit *drhd)
550 seq_printf(m, "IOMMU: %s Register Base Address: %llx\n",
551 iommu->name, drhd->reg_base_addr);
553 ret = dmar_latency_snapshot(iommu, debug_buf, DEBUG_BUFFER_SIZE);
555 seq_puts(m, "Failed to get latency snapshot");
557 seq_puts(m, debug_buf);
561 static int latency_show(struct seq_file *m, void *v)
563 struct dmar_drhd_unit *drhd;
564 struct intel_iommu *iommu;
567 for_each_active_iommu(iommu, drhd)
568 latency_show_one(m, iommu, drhd);
574 static int dmar_perf_latency_open(struct inode *inode, struct file *filp)
576 return single_open(filp, latency_show, NULL);
579 static ssize_t dmar_perf_latency_write(struct file *filp,
580 const char __user *ubuf,
581 size_t cnt, loff_t *ppos)
583 struct dmar_drhd_unit *drhd;
584 struct intel_iommu *iommu;
591 if (copy_from_user(&buf, ubuf, cnt))
596 if (kstrtoint(buf, 0, &counting))
602 for_each_active_iommu(iommu, drhd) {
603 dmar_latency_disable(iommu, DMAR_LATENCY_INV_IOTLB);
604 dmar_latency_disable(iommu, DMAR_LATENCY_INV_DEVTLB);
605 dmar_latency_disable(iommu, DMAR_LATENCY_INV_IEC);
606 dmar_latency_disable(iommu, DMAR_LATENCY_PRQ);
612 for_each_active_iommu(iommu, drhd)
613 dmar_latency_enable(iommu, DMAR_LATENCY_INV_IOTLB);
618 for_each_active_iommu(iommu, drhd)
619 dmar_latency_enable(iommu, DMAR_LATENCY_INV_DEVTLB);
624 for_each_active_iommu(iommu, drhd)
625 dmar_latency_enable(iommu, DMAR_LATENCY_INV_IEC);
630 for_each_active_iommu(iommu, drhd)
631 dmar_latency_enable(iommu, DMAR_LATENCY_PRQ);
642 static const struct file_operations dmar_perf_latency_fops = {
643 .open = dmar_perf_latency_open,
644 .write = dmar_perf_latency_write,
647 .release = single_release,
650 void __init intel_iommu_debugfs_init(void)
652 struct dentry *intel_iommu_debug = debugfs_create_dir("intel",
655 debugfs_create_file("iommu_regset", 0444, intel_iommu_debug, NULL,
657 debugfs_create_file("dmar_translation_struct", 0444, intel_iommu_debug,
658 NULL, &dmar_translation_struct_fops);
659 debugfs_create_file("domain_translation_struct", 0444,
660 intel_iommu_debug, NULL,
661 &domain_translation_struct_fops);
662 debugfs_create_file("invalidation_queue", 0444, intel_iommu_debug,
663 NULL, &invalidation_queue_fops);
664 #ifdef CONFIG_IRQ_REMAP
665 debugfs_create_file("ir_translation_struct", 0444, intel_iommu_debug,
666 NULL, &ir_translation_struct_fops);
668 debugfs_create_file("dmar_perf_latency", 0644, intel_iommu_debug,
669 NULL, &dmar_perf_latency_fops);