Olivier Deprez | 157378f | 2022-04-04 15:47:50 +0200 | [diff] [blame^] | 1 | // SPDX-License-Identifier: GPL-2.0 |
| 2 | /* |
| 3 | * Copyright © 2018 Intel Corporation. |
| 4 | * |
| 5 | * Authors: Gayatri Kammela <gayatri.kammela@intel.com> |
| 6 | * Sohil Mehta <sohil.mehta@intel.com> |
| 7 | * Jacob Pan <jacob.jun.pan@linux.intel.com> |
| 8 | * Lu Baolu <baolu.lu@linux.intel.com> |
| 9 | */ |
| 10 | |
| 11 | #include <linux/debugfs.h> |
| 12 | #include <linux/dmar.h> |
| 13 | #include <linux/intel-iommu.h> |
| 14 | #include <linux/pci.h> |
| 15 | |
| 16 | #include <asm/irq_remapping.h> |
| 17 | |
| 18 | #include "pasid.h" |
| 19 | |
| 20 | struct tbl_walk { |
| 21 | u16 bus; |
| 22 | u16 devfn; |
| 23 | u32 pasid; |
| 24 | struct root_entry *rt_entry; |
| 25 | struct context_entry *ctx_entry; |
| 26 | struct pasid_entry *pasid_tbl_entry; |
| 27 | }; |
| 28 | |
| 29 | struct iommu_regset { |
| 30 | int offset; |
| 31 | const char *regs; |
| 32 | }; |
| 33 | |
| 34 | #define IOMMU_REGSET_ENTRY(_reg_) \ |
| 35 | { DMAR_##_reg_##_REG, __stringify(_reg_) } |
| 36 | |
| 37 | static const struct iommu_regset iommu_regs_32[] = { |
| 38 | IOMMU_REGSET_ENTRY(VER), |
| 39 | IOMMU_REGSET_ENTRY(GCMD), |
| 40 | IOMMU_REGSET_ENTRY(GSTS), |
| 41 | IOMMU_REGSET_ENTRY(FSTS), |
| 42 | IOMMU_REGSET_ENTRY(FECTL), |
| 43 | IOMMU_REGSET_ENTRY(FEDATA), |
| 44 | IOMMU_REGSET_ENTRY(FEADDR), |
| 45 | IOMMU_REGSET_ENTRY(FEUADDR), |
| 46 | IOMMU_REGSET_ENTRY(PMEN), |
| 47 | IOMMU_REGSET_ENTRY(PLMBASE), |
| 48 | IOMMU_REGSET_ENTRY(PLMLIMIT), |
| 49 | IOMMU_REGSET_ENTRY(ICS), |
| 50 | IOMMU_REGSET_ENTRY(PRS), |
| 51 | IOMMU_REGSET_ENTRY(PECTL), |
| 52 | IOMMU_REGSET_ENTRY(PEDATA), |
| 53 | IOMMU_REGSET_ENTRY(PEADDR), |
| 54 | IOMMU_REGSET_ENTRY(PEUADDR), |
| 55 | }; |
| 56 | |
| 57 | static const struct iommu_regset iommu_regs_64[] = { |
| 58 | IOMMU_REGSET_ENTRY(CAP), |
| 59 | IOMMU_REGSET_ENTRY(ECAP), |
| 60 | IOMMU_REGSET_ENTRY(RTADDR), |
| 61 | IOMMU_REGSET_ENTRY(CCMD), |
| 62 | IOMMU_REGSET_ENTRY(AFLOG), |
| 63 | IOMMU_REGSET_ENTRY(PHMBASE), |
| 64 | IOMMU_REGSET_ENTRY(PHMLIMIT), |
| 65 | IOMMU_REGSET_ENTRY(IQH), |
| 66 | IOMMU_REGSET_ENTRY(IQT), |
| 67 | IOMMU_REGSET_ENTRY(IQA), |
| 68 | IOMMU_REGSET_ENTRY(IRTA), |
| 69 | IOMMU_REGSET_ENTRY(PQH), |
| 70 | IOMMU_REGSET_ENTRY(PQT), |
| 71 | IOMMU_REGSET_ENTRY(PQA), |
| 72 | IOMMU_REGSET_ENTRY(MTRRCAP), |
| 73 | IOMMU_REGSET_ENTRY(MTRRDEF), |
| 74 | IOMMU_REGSET_ENTRY(MTRR_FIX64K_00000), |
| 75 | IOMMU_REGSET_ENTRY(MTRR_FIX16K_80000), |
| 76 | IOMMU_REGSET_ENTRY(MTRR_FIX16K_A0000), |
| 77 | IOMMU_REGSET_ENTRY(MTRR_FIX4K_C0000), |
| 78 | IOMMU_REGSET_ENTRY(MTRR_FIX4K_C8000), |
| 79 | IOMMU_REGSET_ENTRY(MTRR_FIX4K_D0000), |
| 80 | IOMMU_REGSET_ENTRY(MTRR_FIX4K_D8000), |
| 81 | IOMMU_REGSET_ENTRY(MTRR_FIX4K_E0000), |
| 82 | IOMMU_REGSET_ENTRY(MTRR_FIX4K_E8000), |
| 83 | IOMMU_REGSET_ENTRY(MTRR_FIX4K_F0000), |
| 84 | IOMMU_REGSET_ENTRY(MTRR_FIX4K_F8000), |
| 85 | IOMMU_REGSET_ENTRY(MTRR_PHYSBASE0), |
| 86 | IOMMU_REGSET_ENTRY(MTRR_PHYSMASK0), |
| 87 | IOMMU_REGSET_ENTRY(MTRR_PHYSBASE1), |
| 88 | IOMMU_REGSET_ENTRY(MTRR_PHYSMASK1), |
| 89 | IOMMU_REGSET_ENTRY(MTRR_PHYSBASE2), |
| 90 | IOMMU_REGSET_ENTRY(MTRR_PHYSMASK2), |
| 91 | IOMMU_REGSET_ENTRY(MTRR_PHYSBASE3), |
| 92 | IOMMU_REGSET_ENTRY(MTRR_PHYSMASK3), |
| 93 | IOMMU_REGSET_ENTRY(MTRR_PHYSBASE4), |
| 94 | IOMMU_REGSET_ENTRY(MTRR_PHYSMASK4), |
| 95 | IOMMU_REGSET_ENTRY(MTRR_PHYSBASE5), |
| 96 | IOMMU_REGSET_ENTRY(MTRR_PHYSMASK5), |
| 97 | IOMMU_REGSET_ENTRY(MTRR_PHYSBASE6), |
| 98 | IOMMU_REGSET_ENTRY(MTRR_PHYSMASK6), |
| 99 | IOMMU_REGSET_ENTRY(MTRR_PHYSBASE7), |
| 100 | IOMMU_REGSET_ENTRY(MTRR_PHYSMASK7), |
| 101 | IOMMU_REGSET_ENTRY(MTRR_PHYSBASE8), |
| 102 | IOMMU_REGSET_ENTRY(MTRR_PHYSMASK8), |
| 103 | IOMMU_REGSET_ENTRY(MTRR_PHYSBASE9), |
| 104 | IOMMU_REGSET_ENTRY(MTRR_PHYSMASK9), |
| 105 | IOMMU_REGSET_ENTRY(VCCAP), |
| 106 | IOMMU_REGSET_ENTRY(VCMD), |
| 107 | IOMMU_REGSET_ENTRY(VCRSP), |
| 108 | }; |
| 109 | |
| 110 | static int iommu_regset_show(struct seq_file *m, void *unused) |
| 111 | { |
| 112 | struct dmar_drhd_unit *drhd; |
| 113 | struct intel_iommu *iommu; |
| 114 | unsigned long flag; |
| 115 | int i, ret = 0; |
| 116 | u64 value; |
| 117 | |
| 118 | rcu_read_lock(); |
| 119 | for_each_active_iommu(iommu, drhd) { |
| 120 | if (!drhd->reg_base_addr) { |
| 121 | seq_puts(m, "IOMMU: Invalid base address\n"); |
| 122 | ret = -EINVAL; |
| 123 | goto out; |
| 124 | } |
| 125 | |
| 126 | seq_printf(m, "IOMMU: %s Register Base Address: %llx\n", |
| 127 | iommu->name, drhd->reg_base_addr); |
| 128 | seq_puts(m, "Name\t\t\tOffset\t\tContents\n"); |
| 129 | /* |
| 130 | * Publish the contents of the 64-bit hardware registers |
| 131 | * by adding the offset to the pointer (virtual address). |
| 132 | */ |
| 133 | raw_spin_lock_irqsave(&iommu->register_lock, flag); |
| 134 | for (i = 0 ; i < ARRAY_SIZE(iommu_regs_32); i++) { |
| 135 | value = dmar_readl(iommu->reg + iommu_regs_32[i].offset); |
| 136 | seq_printf(m, "%-16s\t0x%02x\t\t0x%016llx\n", |
| 137 | iommu_regs_32[i].regs, iommu_regs_32[i].offset, |
| 138 | value); |
| 139 | } |
| 140 | for (i = 0 ; i < ARRAY_SIZE(iommu_regs_64); i++) { |
| 141 | value = dmar_readq(iommu->reg + iommu_regs_64[i].offset); |
| 142 | seq_printf(m, "%-16s\t0x%02x\t\t0x%016llx\n", |
| 143 | iommu_regs_64[i].regs, iommu_regs_64[i].offset, |
| 144 | value); |
| 145 | } |
| 146 | raw_spin_unlock_irqrestore(&iommu->register_lock, flag); |
| 147 | seq_putc(m, '\n'); |
| 148 | } |
| 149 | out: |
| 150 | rcu_read_unlock(); |
| 151 | |
| 152 | return ret; |
| 153 | } |
| 154 | DEFINE_SHOW_ATTRIBUTE(iommu_regset); |
| 155 | |
| 156 | static inline void print_tbl_walk(struct seq_file *m) |
| 157 | { |
| 158 | struct tbl_walk *tbl_wlk = m->private; |
| 159 | |
| 160 | seq_printf(m, "%02x:%02x.%x\t0x%016llx:0x%016llx\t0x%016llx:0x%016llx\t", |
| 161 | tbl_wlk->bus, PCI_SLOT(tbl_wlk->devfn), |
| 162 | PCI_FUNC(tbl_wlk->devfn), tbl_wlk->rt_entry->hi, |
| 163 | tbl_wlk->rt_entry->lo, tbl_wlk->ctx_entry->hi, |
| 164 | tbl_wlk->ctx_entry->lo); |
| 165 | |
| 166 | /* |
| 167 | * A legacy mode DMAR doesn't support PASID, hence default it to -1 |
| 168 | * indicating that it's invalid. Also, default all PASID related fields |
| 169 | * to 0. |
| 170 | */ |
| 171 | if (!tbl_wlk->pasid_tbl_entry) |
| 172 | seq_printf(m, "%-6d\t0x%016llx:0x%016llx:0x%016llx\n", -1, |
| 173 | (u64)0, (u64)0, (u64)0); |
| 174 | else |
| 175 | seq_printf(m, "%-6d\t0x%016llx:0x%016llx:0x%016llx\n", |
| 176 | tbl_wlk->pasid, tbl_wlk->pasid_tbl_entry->val[2], |
| 177 | tbl_wlk->pasid_tbl_entry->val[1], |
| 178 | tbl_wlk->pasid_tbl_entry->val[0]); |
| 179 | } |
| 180 | |
| 181 | static void pasid_tbl_walk(struct seq_file *m, struct pasid_entry *tbl_entry, |
| 182 | u16 dir_idx) |
| 183 | { |
| 184 | struct tbl_walk *tbl_wlk = m->private; |
| 185 | u8 tbl_idx; |
| 186 | |
| 187 | for (tbl_idx = 0; tbl_idx < PASID_TBL_ENTRIES; tbl_idx++) { |
| 188 | if (pasid_pte_is_present(tbl_entry)) { |
| 189 | tbl_wlk->pasid_tbl_entry = tbl_entry; |
| 190 | tbl_wlk->pasid = (dir_idx << PASID_PDE_SHIFT) + tbl_idx; |
| 191 | print_tbl_walk(m); |
| 192 | } |
| 193 | |
| 194 | tbl_entry++; |
| 195 | } |
| 196 | } |
| 197 | |
| 198 | static void pasid_dir_walk(struct seq_file *m, u64 pasid_dir_ptr, |
| 199 | u16 pasid_dir_size) |
| 200 | { |
| 201 | struct pasid_dir_entry *dir_entry = phys_to_virt(pasid_dir_ptr); |
| 202 | struct pasid_entry *pasid_tbl; |
| 203 | u16 dir_idx; |
| 204 | |
| 205 | for (dir_idx = 0; dir_idx < pasid_dir_size; dir_idx++) { |
| 206 | pasid_tbl = get_pasid_table_from_pde(dir_entry); |
| 207 | if (pasid_tbl) |
| 208 | pasid_tbl_walk(m, pasid_tbl, dir_idx); |
| 209 | |
| 210 | dir_entry++; |
| 211 | } |
| 212 | } |
| 213 | |
| 214 | static void ctx_tbl_walk(struct seq_file *m, struct intel_iommu *iommu, u16 bus) |
| 215 | { |
| 216 | struct context_entry *context; |
| 217 | u16 devfn, pasid_dir_size; |
| 218 | u64 pasid_dir_ptr; |
| 219 | |
| 220 | for (devfn = 0; devfn < 256; devfn++) { |
| 221 | struct tbl_walk tbl_wlk = {0}; |
| 222 | |
| 223 | /* |
| 224 | * Scalable mode root entry points to upper scalable mode |
| 225 | * context table and lower scalable mode context table. Each |
| 226 | * scalable mode context table has 128 context entries where as |
| 227 | * legacy mode context table has 256 context entries. So in |
| 228 | * scalable mode, the context entries for former 128 devices are |
| 229 | * in the lower scalable mode context table, while the latter |
| 230 | * 128 devices are in the upper scalable mode context table. |
| 231 | * In scalable mode, when devfn > 127, iommu_context_addr() |
| 232 | * automatically refers to upper scalable mode context table and |
| 233 | * hence the caller doesn't have to worry about differences |
| 234 | * between scalable mode and non scalable mode. |
| 235 | */ |
| 236 | context = iommu_context_addr(iommu, bus, devfn, 0); |
| 237 | if (!context) |
| 238 | return; |
| 239 | |
| 240 | if (!context_present(context)) |
| 241 | continue; |
| 242 | |
| 243 | tbl_wlk.bus = bus; |
| 244 | tbl_wlk.devfn = devfn; |
| 245 | tbl_wlk.rt_entry = &iommu->root_entry[bus]; |
| 246 | tbl_wlk.ctx_entry = context; |
| 247 | m->private = &tbl_wlk; |
| 248 | |
| 249 | if (dmar_readq(iommu->reg + DMAR_RTADDR_REG) & DMA_RTADDR_SMT) { |
| 250 | pasid_dir_ptr = context->lo & VTD_PAGE_MASK; |
| 251 | pasid_dir_size = get_pasid_dir_size(context); |
| 252 | pasid_dir_walk(m, pasid_dir_ptr, pasid_dir_size); |
| 253 | continue; |
| 254 | } |
| 255 | |
| 256 | print_tbl_walk(m); |
| 257 | } |
| 258 | } |
| 259 | |
| 260 | static void root_tbl_walk(struct seq_file *m, struct intel_iommu *iommu) |
| 261 | { |
| 262 | unsigned long flags; |
| 263 | u16 bus; |
| 264 | |
| 265 | spin_lock_irqsave(&iommu->lock, flags); |
| 266 | seq_printf(m, "IOMMU %s: Root Table Address: 0x%llx\n", iommu->name, |
| 267 | (u64)virt_to_phys(iommu->root_entry)); |
| 268 | seq_puts(m, "B.D.F\tRoot_entry\t\t\t\tContext_entry\t\t\t\tPASID\tPASID_table_entry\n"); |
| 269 | |
| 270 | /* |
| 271 | * No need to check if the root entry is present or not because |
| 272 | * iommu_context_addr() performs the same check before returning |
| 273 | * context entry. |
| 274 | */ |
| 275 | for (bus = 0; bus < 256; bus++) |
| 276 | ctx_tbl_walk(m, iommu, bus); |
| 277 | |
| 278 | spin_unlock_irqrestore(&iommu->lock, flags); |
| 279 | } |
| 280 | |
| 281 | static int dmar_translation_struct_show(struct seq_file *m, void *unused) |
| 282 | { |
| 283 | struct dmar_drhd_unit *drhd; |
| 284 | struct intel_iommu *iommu; |
| 285 | u32 sts; |
| 286 | |
| 287 | rcu_read_lock(); |
| 288 | for_each_active_iommu(iommu, drhd) { |
| 289 | sts = dmar_readl(iommu->reg + DMAR_GSTS_REG); |
| 290 | if (!(sts & DMA_GSTS_TES)) { |
| 291 | seq_printf(m, "DMA Remapping is not enabled on %s\n", |
| 292 | iommu->name); |
| 293 | continue; |
| 294 | } |
| 295 | root_tbl_walk(m, iommu); |
| 296 | seq_putc(m, '\n'); |
| 297 | } |
| 298 | rcu_read_unlock(); |
| 299 | |
| 300 | return 0; |
| 301 | } |
| 302 | DEFINE_SHOW_ATTRIBUTE(dmar_translation_struct); |
| 303 | |
| 304 | static inline unsigned long level_to_directory_size(int level) |
| 305 | { |
| 306 | return BIT_ULL(VTD_PAGE_SHIFT + VTD_STRIDE_SHIFT * (level - 1)); |
| 307 | } |
| 308 | |
| 309 | static inline void |
| 310 | dump_page_info(struct seq_file *m, unsigned long iova, u64 *path) |
| 311 | { |
| 312 | seq_printf(m, "0x%013lx |\t0x%016llx\t0x%016llx\t0x%016llx\t0x%016llx\t0x%016llx\n", |
| 313 | iova >> VTD_PAGE_SHIFT, path[5], path[4], |
| 314 | path[3], path[2], path[1]); |
| 315 | } |
| 316 | |
| 317 | static void pgtable_walk_level(struct seq_file *m, struct dma_pte *pde, |
| 318 | int level, unsigned long start, |
| 319 | u64 *path) |
| 320 | { |
| 321 | int i; |
| 322 | |
| 323 | if (level > 5 || level < 1) |
| 324 | return; |
| 325 | |
| 326 | for (i = 0; i < BIT_ULL(VTD_STRIDE_SHIFT); |
| 327 | i++, pde++, start += level_to_directory_size(level)) { |
| 328 | if (!dma_pte_present(pde)) |
| 329 | continue; |
| 330 | |
| 331 | path[level] = pde->val; |
| 332 | if (dma_pte_superpage(pde) || level == 1) |
| 333 | dump_page_info(m, start, path); |
| 334 | else |
| 335 | pgtable_walk_level(m, phys_to_virt(dma_pte_addr(pde)), |
| 336 | level - 1, start, path); |
| 337 | path[level] = 0; |
| 338 | } |
| 339 | } |
| 340 | |
| 341 | static int show_device_domain_translation(struct device *dev, void *data) |
| 342 | { |
| 343 | struct dmar_domain *domain = find_domain(dev); |
| 344 | struct seq_file *m = data; |
| 345 | u64 path[6] = { 0 }; |
| 346 | |
| 347 | if (!domain) |
| 348 | return 0; |
| 349 | |
| 350 | seq_printf(m, "Device %s with pasid %d @0x%llx\n", |
| 351 | dev_name(dev), domain->default_pasid, |
| 352 | (u64)virt_to_phys(domain->pgd)); |
| 353 | seq_puts(m, "IOVA_PFN\t\tPML5E\t\t\tPML4E\t\t\tPDPE\t\t\tPDE\t\t\tPTE\n"); |
| 354 | |
| 355 | pgtable_walk_level(m, domain->pgd, domain->agaw + 2, 0, path); |
| 356 | seq_putc(m, '\n'); |
| 357 | |
| 358 | return 0; |
| 359 | } |
| 360 | |
| 361 | static int domain_translation_struct_show(struct seq_file *m, void *unused) |
| 362 | { |
| 363 | unsigned long flags; |
| 364 | int ret; |
| 365 | |
| 366 | spin_lock_irqsave(&device_domain_lock, flags); |
| 367 | ret = bus_for_each_dev(&pci_bus_type, NULL, m, |
| 368 | show_device_domain_translation); |
| 369 | spin_unlock_irqrestore(&device_domain_lock, flags); |
| 370 | |
| 371 | return ret; |
| 372 | } |
| 373 | DEFINE_SHOW_ATTRIBUTE(domain_translation_struct); |
| 374 | |
| 375 | static void invalidation_queue_entry_show(struct seq_file *m, |
| 376 | struct intel_iommu *iommu) |
| 377 | { |
| 378 | int index, shift = qi_shift(iommu); |
| 379 | struct qi_desc *desc; |
| 380 | int offset; |
| 381 | |
| 382 | if (ecap_smts(iommu->ecap)) |
| 383 | seq_puts(m, "Index\t\tqw0\t\t\tqw1\t\t\tqw2\t\t\tqw3\t\t\tstatus\n"); |
| 384 | else |
| 385 | seq_puts(m, "Index\t\tqw0\t\t\tqw1\t\t\tstatus\n"); |
| 386 | |
| 387 | for (index = 0; index < QI_LENGTH; index++) { |
| 388 | offset = index << shift; |
| 389 | desc = iommu->qi->desc + offset; |
| 390 | if (ecap_smts(iommu->ecap)) |
| 391 | seq_printf(m, "%5d\t%016llx\t%016llx\t%016llx\t%016llx\t%016x\n", |
| 392 | index, desc->qw0, desc->qw1, |
| 393 | desc->qw2, desc->qw3, |
| 394 | iommu->qi->desc_status[index]); |
| 395 | else |
| 396 | seq_printf(m, "%5d\t%016llx\t%016llx\t%016x\n", |
| 397 | index, desc->qw0, desc->qw1, |
| 398 | iommu->qi->desc_status[index]); |
| 399 | } |
| 400 | } |
| 401 | |
| 402 | static int invalidation_queue_show(struct seq_file *m, void *unused) |
| 403 | { |
| 404 | struct dmar_drhd_unit *drhd; |
| 405 | struct intel_iommu *iommu; |
| 406 | unsigned long flags; |
| 407 | struct q_inval *qi; |
| 408 | int shift; |
| 409 | |
| 410 | rcu_read_lock(); |
| 411 | for_each_active_iommu(iommu, drhd) { |
| 412 | qi = iommu->qi; |
| 413 | shift = qi_shift(iommu); |
| 414 | |
| 415 | if (!qi || !ecap_qis(iommu->ecap)) |
| 416 | continue; |
| 417 | |
| 418 | seq_printf(m, "Invalidation queue on IOMMU: %s\n", iommu->name); |
| 419 | |
| 420 | raw_spin_lock_irqsave(&qi->q_lock, flags); |
| 421 | seq_printf(m, " Base: 0x%llx\tHead: %lld\tTail: %lld\n", |
| 422 | (u64)virt_to_phys(qi->desc), |
| 423 | dmar_readq(iommu->reg + DMAR_IQH_REG) >> shift, |
| 424 | dmar_readq(iommu->reg + DMAR_IQT_REG) >> shift); |
| 425 | invalidation_queue_entry_show(m, iommu); |
| 426 | raw_spin_unlock_irqrestore(&qi->q_lock, flags); |
| 427 | seq_putc(m, '\n'); |
| 428 | } |
| 429 | rcu_read_unlock(); |
| 430 | |
| 431 | return 0; |
| 432 | } |
| 433 | DEFINE_SHOW_ATTRIBUTE(invalidation_queue); |
| 434 | |
| 435 | #ifdef CONFIG_IRQ_REMAP |
| 436 | static void ir_tbl_remap_entry_show(struct seq_file *m, |
| 437 | struct intel_iommu *iommu) |
| 438 | { |
| 439 | struct irte *ri_entry; |
| 440 | unsigned long flags; |
| 441 | int idx; |
| 442 | |
| 443 | seq_puts(m, " Entry SrcID DstID Vct IRTE_high\t\tIRTE_low\n"); |
| 444 | |
| 445 | raw_spin_lock_irqsave(&irq_2_ir_lock, flags); |
| 446 | for (idx = 0; idx < INTR_REMAP_TABLE_ENTRIES; idx++) { |
| 447 | ri_entry = &iommu->ir_table->base[idx]; |
| 448 | if (!ri_entry->present || ri_entry->p_pst) |
| 449 | continue; |
| 450 | |
| 451 | seq_printf(m, " %-5d %02x:%02x.%01x %08x %02x %016llx\t%016llx\n", |
| 452 | idx, PCI_BUS_NUM(ri_entry->sid), |
| 453 | PCI_SLOT(ri_entry->sid), PCI_FUNC(ri_entry->sid), |
| 454 | ri_entry->dest_id, ri_entry->vector, |
| 455 | ri_entry->high, ri_entry->low); |
| 456 | } |
| 457 | raw_spin_unlock_irqrestore(&irq_2_ir_lock, flags); |
| 458 | } |
| 459 | |
| 460 | static void ir_tbl_posted_entry_show(struct seq_file *m, |
| 461 | struct intel_iommu *iommu) |
| 462 | { |
| 463 | struct irte *pi_entry; |
| 464 | unsigned long flags; |
| 465 | int idx; |
| 466 | |
| 467 | seq_puts(m, " Entry SrcID PDA_high PDA_low Vct IRTE_high\t\tIRTE_low\n"); |
| 468 | |
| 469 | raw_spin_lock_irqsave(&irq_2_ir_lock, flags); |
| 470 | for (idx = 0; idx < INTR_REMAP_TABLE_ENTRIES; idx++) { |
| 471 | pi_entry = &iommu->ir_table->base[idx]; |
| 472 | if (!pi_entry->present || !pi_entry->p_pst) |
| 473 | continue; |
| 474 | |
| 475 | seq_printf(m, " %-5d %02x:%02x.%01x %08x %08x %02x %016llx\t%016llx\n", |
| 476 | idx, PCI_BUS_NUM(pi_entry->sid), |
| 477 | PCI_SLOT(pi_entry->sid), PCI_FUNC(pi_entry->sid), |
| 478 | pi_entry->pda_h, pi_entry->pda_l << 6, |
| 479 | pi_entry->vector, pi_entry->high, |
| 480 | pi_entry->low); |
| 481 | } |
| 482 | raw_spin_unlock_irqrestore(&irq_2_ir_lock, flags); |
| 483 | } |
| 484 | |
| 485 | /* |
| 486 | * For active IOMMUs go through the Interrupt remapping |
| 487 | * table and print valid entries in a table format for |
| 488 | * Remapped and Posted Interrupts. |
| 489 | */ |
| 490 | static int ir_translation_struct_show(struct seq_file *m, void *unused) |
| 491 | { |
| 492 | struct dmar_drhd_unit *drhd; |
| 493 | struct intel_iommu *iommu; |
| 494 | u64 irta; |
| 495 | u32 sts; |
| 496 | |
| 497 | rcu_read_lock(); |
| 498 | for_each_active_iommu(iommu, drhd) { |
| 499 | if (!ecap_ir_support(iommu->ecap)) |
| 500 | continue; |
| 501 | |
| 502 | seq_printf(m, "Remapped Interrupt supported on IOMMU: %s\n", |
| 503 | iommu->name); |
| 504 | |
| 505 | sts = dmar_readl(iommu->reg + DMAR_GSTS_REG); |
| 506 | if (iommu->ir_table && (sts & DMA_GSTS_IRES)) { |
| 507 | irta = virt_to_phys(iommu->ir_table->base); |
| 508 | seq_printf(m, " IR table address:%llx\n", irta); |
| 509 | ir_tbl_remap_entry_show(m, iommu); |
| 510 | } else { |
| 511 | seq_puts(m, "Interrupt Remapping is not enabled\n"); |
| 512 | } |
| 513 | seq_putc(m, '\n'); |
| 514 | } |
| 515 | |
| 516 | seq_puts(m, "****\n\n"); |
| 517 | |
| 518 | for_each_active_iommu(iommu, drhd) { |
| 519 | if (!cap_pi_support(iommu->cap)) |
| 520 | continue; |
| 521 | |
| 522 | seq_printf(m, "Posted Interrupt supported on IOMMU: %s\n", |
| 523 | iommu->name); |
| 524 | |
| 525 | if (iommu->ir_table) { |
| 526 | irta = virt_to_phys(iommu->ir_table->base); |
| 527 | seq_printf(m, " IR table address:%llx\n", irta); |
| 528 | ir_tbl_posted_entry_show(m, iommu); |
| 529 | } else { |
| 530 | seq_puts(m, "Interrupt Remapping is not enabled\n"); |
| 531 | } |
| 532 | seq_putc(m, '\n'); |
| 533 | } |
| 534 | rcu_read_unlock(); |
| 535 | |
| 536 | return 0; |
| 537 | } |
| 538 | DEFINE_SHOW_ATTRIBUTE(ir_translation_struct); |
| 539 | #endif |
| 540 | |
| 541 | void __init intel_iommu_debugfs_init(void) |
| 542 | { |
| 543 | struct dentry *intel_iommu_debug = debugfs_create_dir("intel", |
| 544 | iommu_debugfs_dir); |
| 545 | |
| 546 | debugfs_create_file("iommu_regset", 0444, intel_iommu_debug, NULL, |
| 547 | &iommu_regset_fops); |
| 548 | debugfs_create_file("dmar_translation_struct", 0444, intel_iommu_debug, |
| 549 | NULL, &dmar_translation_struct_fops); |
| 550 | debugfs_create_file("domain_translation_struct", 0444, |
| 551 | intel_iommu_debug, NULL, |
| 552 | &domain_translation_struct_fops); |
| 553 | debugfs_create_file("invalidation_queue", 0444, intel_iommu_debug, |
| 554 | NULL, &invalidation_queue_fops); |
| 555 | #ifdef CONFIG_IRQ_REMAP |
| 556 | debugfs_create_file("ir_translation_struct", 0444, intel_iommu_debug, |
| 557 | NULL, &ir_translation_struct_fops); |
| 558 | #endif |
| 559 | } |