Merge branch 'core-objtool-for-linus' of git://git.kernel.org/pub/scm/linux/kernel...
[linux-block.git] / drivers / iommu / intel-iommu-debugfs.c
CommitLineData
ee2636b8
SM
1// SPDX-License-Identifier: GPL-2.0
2/*
3 * Copyright © 2018 Intel Corporation.
4 *
5 * Authors: Gayatri Kammela <gayatri.kammela@intel.com>
6 * Sohil Mehta <sohil.mehta@intel.com>
7 * Jacob Pan <jacob.jun.pan@linux.intel.com>
e2726dae 8 * Lu Baolu <baolu.lu@linux.intel.com>
ee2636b8
SM
9 */
10
11#include <linux/debugfs.h>
12#include <linux/dmar.h>
13#include <linux/intel-iommu.h>
14#include <linux/pci.h>
15
16#include <asm/irq_remapping.h>
17
dd5142ca
SPP
18#include "intel-pasid.h"
19
ea09506c
SPP
20struct tbl_walk {
21 u16 bus;
22 u16 devfn;
dd5142ca 23 u32 pasid;
ea09506c
SPP
24 struct root_entry *rt_entry;
25 struct context_entry *ctx_entry;
dd5142ca 26 struct pasid_entry *pasid_tbl_entry;
ea09506c
SPP
27};
28
6825d3ea
GK
29struct iommu_regset {
30 int offset;
31 const char *regs;
32};
33
34#define IOMMU_REGSET_ENTRY(_reg_) \
35 { DMAR_##_reg_##_REG, __stringify(_reg_) }
ba3b01d7
MD
36
37static const struct iommu_regset iommu_regs_32[] = {
6825d3ea 38 IOMMU_REGSET_ENTRY(VER),
6825d3ea
GK
39 IOMMU_REGSET_ENTRY(GCMD),
40 IOMMU_REGSET_ENTRY(GSTS),
6825d3ea
GK
41 IOMMU_REGSET_ENTRY(FSTS),
42 IOMMU_REGSET_ENTRY(FECTL),
43 IOMMU_REGSET_ENTRY(FEDATA),
44 IOMMU_REGSET_ENTRY(FEADDR),
45 IOMMU_REGSET_ENTRY(FEUADDR),
6825d3ea
GK
46 IOMMU_REGSET_ENTRY(PMEN),
47 IOMMU_REGSET_ENTRY(PLMBASE),
48 IOMMU_REGSET_ENTRY(PLMLIMIT),
ba3b01d7
MD
49 IOMMU_REGSET_ENTRY(ICS),
50 IOMMU_REGSET_ENTRY(PRS),
51 IOMMU_REGSET_ENTRY(PECTL),
52 IOMMU_REGSET_ENTRY(PEDATA),
53 IOMMU_REGSET_ENTRY(PEADDR),
54 IOMMU_REGSET_ENTRY(PEUADDR),
55};
56
57static const struct iommu_regset iommu_regs_64[] = {
58 IOMMU_REGSET_ENTRY(CAP),
59 IOMMU_REGSET_ENTRY(ECAP),
60 IOMMU_REGSET_ENTRY(RTADDR),
61 IOMMU_REGSET_ENTRY(CCMD),
62 IOMMU_REGSET_ENTRY(AFLOG),
6825d3ea
GK
63 IOMMU_REGSET_ENTRY(PHMBASE),
64 IOMMU_REGSET_ENTRY(PHMLIMIT),
65 IOMMU_REGSET_ENTRY(IQH),
66 IOMMU_REGSET_ENTRY(IQT),
67 IOMMU_REGSET_ENTRY(IQA),
6825d3ea
GK
68 IOMMU_REGSET_ENTRY(IRTA),
69 IOMMU_REGSET_ENTRY(PQH),
70 IOMMU_REGSET_ENTRY(PQT),
71 IOMMU_REGSET_ENTRY(PQA),
6825d3ea
GK
72 IOMMU_REGSET_ENTRY(MTRRCAP),
73 IOMMU_REGSET_ENTRY(MTRRDEF),
74 IOMMU_REGSET_ENTRY(MTRR_FIX64K_00000),
75 IOMMU_REGSET_ENTRY(MTRR_FIX16K_80000),
76 IOMMU_REGSET_ENTRY(MTRR_FIX16K_A0000),
77 IOMMU_REGSET_ENTRY(MTRR_FIX4K_C0000),
78 IOMMU_REGSET_ENTRY(MTRR_FIX4K_C8000),
79 IOMMU_REGSET_ENTRY(MTRR_FIX4K_D0000),
80 IOMMU_REGSET_ENTRY(MTRR_FIX4K_D8000),
81 IOMMU_REGSET_ENTRY(MTRR_FIX4K_E0000),
82 IOMMU_REGSET_ENTRY(MTRR_FIX4K_E8000),
83 IOMMU_REGSET_ENTRY(MTRR_FIX4K_F0000),
84 IOMMU_REGSET_ENTRY(MTRR_FIX4K_F8000),
85 IOMMU_REGSET_ENTRY(MTRR_PHYSBASE0),
86 IOMMU_REGSET_ENTRY(MTRR_PHYSMASK0),
87 IOMMU_REGSET_ENTRY(MTRR_PHYSBASE1),
88 IOMMU_REGSET_ENTRY(MTRR_PHYSMASK1),
89 IOMMU_REGSET_ENTRY(MTRR_PHYSBASE2),
90 IOMMU_REGSET_ENTRY(MTRR_PHYSMASK2),
91 IOMMU_REGSET_ENTRY(MTRR_PHYSBASE3),
92 IOMMU_REGSET_ENTRY(MTRR_PHYSMASK3),
93 IOMMU_REGSET_ENTRY(MTRR_PHYSBASE4),
94 IOMMU_REGSET_ENTRY(MTRR_PHYSMASK4),
95 IOMMU_REGSET_ENTRY(MTRR_PHYSBASE5),
96 IOMMU_REGSET_ENTRY(MTRR_PHYSMASK5),
97 IOMMU_REGSET_ENTRY(MTRR_PHYSBASE6),
98 IOMMU_REGSET_ENTRY(MTRR_PHYSMASK6),
99 IOMMU_REGSET_ENTRY(MTRR_PHYSBASE7),
100 IOMMU_REGSET_ENTRY(MTRR_PHYSMASK7),
101 IOMMU_REGSET_ENTRY(MTRR_PHYSBASE8),
102 IOMMU_REGSET_ENTRY(MTRR_PHYSMASK8),
103 IOMMU_REGSET_ENTRY(MTRR_PHYSBASE9),
104 IOMMU_REGSET_ENTRY(MTRR_PHYSMASK9),
105 IOMMU_REGSET_ENTRY(VCCAP),
106 IOMMU_REGSET_ENTRY(VCMD),
107 IOMMU_REGSET_ENTRY(VCRSP),
108};
109
110static int iommu_regset_show(struct seq_file *m, void *unused)
111{
112 struct dmar_drhd_unit *drhd;
113 struct intel_iommu *iommu;
114 unsigned long flag;
115 int i, ret = 0;
116 u64 value;
117
118 rcu_read_lock();
119 for_each_active_iommu(iommu, drhd) {
120 if (!drhd->reg_base_addr) {
121 seq_puts(m, "IOMMU: Invalid base address\n");
122 ret = -EINVAL;
123 goto out;
124 }
125
126 seq_printf(m, "IOMMU: %s Register Base Address: %llx\n",
127 iommu->name, drhd->reg_base_addr);
128 seq_puts(m, "Name\t\t\tOffset\t\tContents\n");
129 /*
130 * Publish the contents of the 64-bit hardware registers
131 * by adding the offset to the pointer (virtual address).
132 */
133 raw_spin_lock_irqsave(&iommu->register_lock, flag);
ba3b01d7
MD
134 for (i = 0 ; i < ARRAY_SIZE(iommu_regs_32); i++) {
135 value = dmar_readl(iommu->reg + iommu_regs_32[i].offset);
136 seq_printf(m, "%-16s\t0x%02x\t\t0x%016llx\n",
137 iommu_regs_32[i].regs, iommu_regs_32[i].offset,
138 value);
139 }
140 for (i = 0 ; i < ARRAY_SIZE(iommu_regs_64); i++) {
141 value = dmar_readq(iommu->reg + iommu_regs_64[i].offset);
6825d3ea 142 seq_printf(m, "%-16s\t0x%02x\t\t0x%016llx\n",
ba3b01d7 143 iommu_regs_64[i].regs, iommu_regs_64[i].offset,
6825d3ea
GK
144 value);
145 }
146 raw_spin_unlock_irqrestore(&iommu->register_lock, flag);
147 seq_putc(m, '\n');
148 }
149out:
150 rcu_read_unlock();
151
152 return ret;
153}
154DEFINE_SHOW_ATTRIBUTE(iommu_regset);
155
ea09506c 156static inline void print_tbl_walk(struct seq_file *m)
18f99c9b 157{
ea09506c 158 struct tbl_walk *tbl_wlk = m->private;
18f99c9b 159
dd5142ca 160 seq_printf(m, "%02x:%02x.%x\t0x%016llx:0x%016llx\t0x%016llx:0x%016llx\t",
ea09506c
SPP
161 tbl_wlk->bus, PCI_SLOT(tbl_wlk->devfn),
162 PCI_FUNC(tbl_wlk->devfn), tbl_wlk->rt_entry->hi,
163 tbl_wlk->rt_entry->lo, tbl_wlk->ctx_entry->hi,
164 tbl_wlk->ctx_entry->lo);
dd5142ca
SPP
165
166 /*
167 * A legacy mode DMAR doesn't support PASID, hence default it to -1
168 * indicating that it's invalid. Also, default all PASID related fields
169 * to 0.
170 */
171 if (!tbl_wlk->pasid_tbl_entry)
172 seq_printf(m, "%-6d\t0x%016llx:0x%016llx:0x%016llx\n", -1,
173 (u64)0, (u64)0, (u64)0);
174 else
175 seq_printf(m, "%-6d\t0x%016llx:0x%016llx:0x%016llx\n",
7f6cade5 176 tbl_wlk->pasid, tbl_wlk->pasid_tbl_entry->val[2],
dd5142ca 177 tbl_wlk->pasid_tbl_entry->val[1],
7f6cade5 178 tbl_wlk->pasid_tbl_entry->val[0]);
dd5142ca
SPP
179}
180
181static void pasid_tbl_walk(struct seq_file *m, struct pasid_entry *tbl_entry,
182 u16 dir_idx)
183{
184 struct tbl_walk *tbl_wlk = m->private;
185 u8 tbl_idx;
186
187 for (tbl_idx = 0; tbl_idx < PASID_TBL_ENTRIES; tbl_idx++) {
188 if (pasid_pte_is_present(tbl_entry)) {
189 tbl_wlk->pasid_tbl_entry = tbl_entry;
190 tbl_wlk->pasid = (dir_idx << PASID_PDE_SHIFT) + tbl_idx;
191 print_tbl_walk(m);
192 }
193
194 tbl_entry++;
195 }
196}
197
198static void pasid_dir_walk(struct seq_file *m, u64 pasid_dir_ptr,
199 u16 pasid_dir_size)
200{
201 struct pasid_dir_entry *dir_entry = phys_to_virt(pasid_dir_ptr);
202 struct pasid_entry *pasid_tbl;
203 u16 dir_idx;
204
205 for (dir_idx = 0; dir_idx < pasid_dir_size; dir_idx++) {
206 pasid_tbl = get_pasid_table_from_pde(dir_entry);
207 if (pasid_tbl)
208 pasid_tbl_walk(m, pasid_tbl, dir_idx);
209
210 dir_entry++;
211 }
ea09506c
SPP
212}
213
214static void ctx_tbl_walk(struct seq_file *m, struct intel_iommu *iommu, u16 bus)
215{
216 struct context_entry *context;
dd5142ca
SPP
217 u16 devfn, pasid_dir_size;
218 u64 pasid_dir_ptr;
18f99c9b
SM
219
220 for (devfn = 0; devfn < 256; devfn++) {
ea09506c
SPP
221 struct tbl_walk tbl_wlk = {0};
222
dd5142ca
SPP
223 /*
224 * Scalable mode root entry points to upper scalable mode
225 * context table and lower scalable mode context table. Each
226 * scalable mode context table has 128 context entries where as
227 * legacy mode context table has 256 context entries. So in
228 * scalable mode, the context entries for former 128 devices are
229 * in the lower scalable mode context table, while the latter
230 * 128 devices are in the upper scalable mode context table.
231 * In scalable mode, when devfn > 127, iommu_context_addr()
232 * automatically refers to upper scalable mode context table and
233 * hence the caller doesn't have to worry about differences
234 * between scalable mode and non scalable mode.
235 */
18f99c9b
SM
236 context = iommu_context_addr(iommu, bus, devfn, 0);
237 if (!context)
238 return;
239
240 if (!context_present(context))
241 continue;
242
ea09506c
SPP
243 tbl_wlk.bus = bus;
244 tbl_wlk.devfn = devfn;
245 tbl_wlk.rt_entry = &iommu->root_entry[bus];
246 tbl_wlk.ctx_entry = context;
247 m->private = &tbl_wlk;
248
bfeaec7f 249 if (dmar_readq(iommu->reg + DMAR_RTADDR_REG) & DMA_RTADDR_SMT) {
dd5142ca
SPP
250 pasid_dir_ptr = context->lo & VTD_PAGE_MASK;
251 pasid_dir_size = get_pasid_dir_size(context);
252 pasid_dir_walk(m, pasid_dir_ptr, pasid_dir_size);
253 continue;
254 }
255
ea09506c 256 print_tbl_walk(m);
18f99c9b
SM
257 }
258}
259
ea09506c 260static void root_tbl_walk(struct seq_file *m, struct intel_iommu *iommu)
18f99c9b
SM
261{
262 unsigned long flags;
ea09506c 263 u16 bus;
18f99c9b
SM
264
265 spin_lock_irqsave(&iommu->lock, flags);
ea09506c 266 seq_printf(m, "IOMMU %s: Root Table Address: 0x%llx\n", iommu->name,
18f99c9b 267 (u64)virt_to_phys(iommu->root_entry));
dd5142ca 268 seq_puts(m, "B.D.F\tRoot_entry\t\t\t\tContext_entry\t\t\t\tPASID\tPASID_table_entry\n");
18f99c9b 269
ea09506c
SPP
270 /*
271 * No need to check if the root entry is present or not because
272 * iommu_context_addr() performs the same check before returning
273 * context entry.
274 */
275 for (bus = 0; bus < 256; bus++)
276 ctx_tbl_walk(m, iommu, bus);
18f99c9b 277
18f99c9b
SM
278 spin_unlock_irqrestore(&iommu->lock, flags);
279}
280
281static int dmar_translation_struct_show(struct seq_file *m, void *unused)
282{
283 struct dmar_drhd_unit *drhd;
284 struct intel_iommu *iommu;
1da8347d 285 u32 sts;
18f99c9b
SM
286
287 rcu_read_lock();
288 for_each_active_iommu(iommu, drhd) {
1da8347d
MD
289 sts = dmar_readl(iommu->reg + DMAR_GSTS_REG);
290 if (!(sts & DMA_GSTS_TES)) {
291 seq_printf(m, "DMA Remapping is not enabled on %s\n",
292 iommu->name);
293 continue;
294 }
ea09506c 295 root_tbl_walk(m, iommu);
18f99c9b
SM
296 seq_putc(m, '\n');
297 }
298 rcu_read_unlock();
299
300 return 0;
301}
302DEFINE_SHOW_ATTRIBUTE(dmar_translation_struct);
303
e2726dae
LB
304static inline unsigned long level_to_directory_size(int level)
305{
306 return BIT_ULL(VTD_PAGE_SHIFT + VTD_STRIDE_SHIFT * (level - 1));
307}
308
309static inline void
310dump_page_info(struct seq_file *m, unsigned long iova, u64 *path)
311{
312 seq_printf(m, "0x%013lx |\t0x%016llx\t0x%016llx\t0x%016llx\t0x%016llx\t0x%016llx\n",
313 iova >> VTD_PAGE_SHIFT, path[5], path[4],
314 path[3], path[2], path[1]);
315}
316
317static void pgtable_walk_level(struct seq_file *m, struct dma_pte *pde,
318 int level, unsigned long start,
319 u64 *path)
320{
321 int i;
322
323 if (level > 5 || level < 1)
324 return;
325
326 for (i = 0; i < BIT_ULL(VTD_STRIDE_SHIFT);
327 i++, pde++, start += level_to_directory_size(level)) {
328 if (!dma_pte_present(pde))
329 continue;
330
331 path[level] = pde->val;
332 if (dma_pte_superpage(pde) || level == 1)
333 dump_page_info(m, start, path);
334 else
335 pgtable_walk_level(m, phys_to_virt(dma_pte_addr(pde)),
336 level - 1, start, path);
337 path[level] = 0;
338 }
339}
340
341static int show_device_domain_translation(struct device *dev, void *data)
342{
343 struct dmar_domain *domain = find_domain(dev);
344 struct seq_file *m = data;
345 u64 path[6] = { 0 };
346
347 if (!domain)
348 return 0;
349
350 seq_printf(m, "Device %s with pasid %d @0x%llx\n",
351 dev_name(dev), domain->default_pasid,
352 (u64)virt_to_phys(domain->pgd));
353 seq_puts(m, "IOVA_PFN\t\tPML5E\t\t\tPML4E\t\t\tPDPE\t\t\tPDE\t\t\tPTE\n");
354
355 pgtable_walk_level(m, domain->pgd, domain->agaw + 2, 0, path);
356 seq_putc(m, '\n');
357
358 return 0;
359}
360
361static int domain_translation_struct_show(struct seq_file *m, void *unused)
362{
363 unsigned long flags;
364 int ret;
365
366 spin_lock_irqsave(&device_domain_lock, flags);
367 ret = bus_for_each_dev(&pci_bus_type, NULL, m,
368 show_device_domain_translation);
369 spin_unlock_irqrestore(&device_domain_lock, flags);
370
371 return ret;
372}
373DEFINE_SHOW_ATTRIBUTE(domain_translation_struct);
374
a6d268c6
SM
375#ifdef CONFIG_IRQ_REMAP
376static void ir_tbl_remap_entry_show(struct seq_file *m,
377 struct intel_iommu *iommu)
378{
379 struct irte *ri_entry;
380 unsigned long flags;
381 int idx;
382
383 seq_puts(m, " Entry SrcID DstID Vct IRTE_high\t\tIRTE_low\n");
384
385 raw_spin_lock_irqsave(&irq_2_ir_lock, flags);
386 for (idx = 0; idx < INTR_REMAP_TABLE_ENTRIES; idx++) {
387 ri_entry = &iommu->ir_table->base[idx];
388 if (!ri_entry->present || ri_entry->p_pst)
389 continue;
390
391 seq_printf(m, " %-5d %02x:%02x.%01x %08x %02x %016llx\t%016llx\n",
392 idx, PCI_BUS_NUM(ri_entry->sid),
393 PCI_SLOT(ri_entry->sid), PCI_FUNC(ri_entry->sid),
394 ri_entry->dest_id, ri_entry->vector,
395 ri_entry->high, ri_entry->low);
396 }
397 raw_spin_unlock_irqrestore(&irq_2_ir_lock, flags);
398}
399
400static void ir_tbl_posted_entry_show(struct seq_file *m,
401 struct intel_iommu *iommu)
402{
403 struct irte *pi_entry;
404 unsigned long flags;
405 int idx;
406
407 seq_puts(m, " Entry SrcID PDA_high PDA_low Vct IRTE_high\t\tIRTE_low\n");
408
409 raw_spin_lock_irqsave(&irq_2_ir_lock, flags);
410 for (idx = 0; idx < INTR_REMAP_TABLE_ENTRIES; idx++) {
411 pi_entry = &iommu->ir_table->base[idx];
412 if (!pi_entry->present || !pi_entry->p_pst)
413 continue;
414
415 seq_printf(m, " %-5d %02x:%02x.%01x %08x %08x %02x %016llx\t%016llx\n",
416 idx, PCI_BUS_NUM(pi_entry->sid),
417 PCI_SLOT(pi_entry->sid), PCI_FUNC(pi_entry->sid),
418 pi_entry->pda_h, pi_entry->pda_l << 6,
419 pi_entry->vector, pi_entry->high,
420 pi_entry->low);
421 }
422 raw_spin_unlock_irqrestore(&irq_2_ir_lock, flags);
423}
424
425/*
426 * For active IOMMUs go through the Interrupt remapping
427 * table and print valid entries in a table format for
428 * Remapped and Posted Interrupts.
429 */
430static int ir_translation_struct_show(struct seq_file *m, void *unused)
431{
432 struct dmar_drhd_unit *drhd;
433 struct intel_iommu *iommu;
434 u64 irta;
1da8347d 435 u32 sts;
a6d268c6
SM
436
437 rcu_read_lock();
438 for_each_active_iommu(iommu, drhd) {
439 if (!ecap_ir_support(iommu->ecap))
440 continue;
441
442 seq_printf(m, "Remapped Interrupt supported on IOMMU: %s\n",
443 iommu->name);
444
1da8347d
MD
445 sts = dmar_readl(iommu->reg + DMAR_GSTS_REG);
446 if (iommu->ir_table && (sts & DMA_GSTS_IRES)) {
a6d268c6
SM
447 irta = virt_to_phys(iommu->ir_table->base);
448 seq_printf(m, " IR table address:%llx\n", irta);
449 ir_tbl_remap_entry_show(m, iommu);
450 } else {
451 seq_puts(m, "Interrupt Remapping is not enabled\n");
452 }
453 seq_putc(m, '\n');
454 }
455
456 seq_puts(m, "****\n\n");
457
458 for_each_active_iommu(iommu, drhd) {
459 if (!cap_pi_support(iommu->cap))
460 continue;
461
462 seq_printf(m, "Posted Interrupt supported on IOMMU: %s\n",
463 iommu->name);
464
465 if (iommu->ir_table) {
466 irta = virt_to_phys(iommu->ir_table->base);
467 seq_printf(m, " IR table address:%llx\n", irta);
468 ir_tbl_posted_entry_show(m, iommu);
469 } else {
470 seq_puts(m, "Interrupt Remapping is not enabled\n");
471 }
472 seq_putc(m, '\n');
473 }
474 rcu_read_unlock();
475
476 return 0;
477}
478DEFINE_SHOW_ATTRIBUTE(ir_translation_struct);
479#endif
480
ee2636b8
SM
481void __init intel_iommu_debugfs_init(void)
482{
6825d3ea
GK
483 struct dentry *intel_iommu_debug = debugfs_create_dir("intel",
484 iommu_debugfs_dir);
485
486 debugfs_create_file("iommu_regset", 0444, intel_iommu_debug, NULL,
487 &iommu_regset_fops);
18f99c9b
SM
488 debugfs_create_file("dmar_translation_struct", 0444, intel_iommu_debug,
489 NULL, &dmar_translation_struct_fops);
e2726dae
LB
490 debugfs_create_file("domain_translation_struct", 0444,
491 intel_iommu_debug, NULL,
492 &domain_translation_struct_fops);
a6d268c6
SM
493#ifdef CONFIG_IRQ_REMAP
494 debugfs_create_file("ir_translation_struct", 0444, intel_iommu_debug,
495 NULL, &ir_translation_struct_fops);
496#endif
ee2636b8 497}