Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp15012876rwd; Sun, 25 Jun 2023 08:27:38 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ4pGKbkEksBdSZpyctkLG1iE1e3hRSaVR2JZFKEbipkhk2ONTqu5sre4m+ej7pf5OEpxCvN X-Received: by 2002:a17:906:684c:b0:98e:4c96:6e16 with SMTP id a12-20020a170906684c00b0098e4c966e16mr1189296ejs.5.1687706858324; Sun, 25 Jun 2023 08:27:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1687706858; cv=none; d=google.com; s=arc-20160816; b=Id/rEYaEJ3RP9ytwLc3v9Vz0wXkyAekStsA6heAZyb3psIRUKUlXPaXPryhn/M9gx7 3whlRx8eEm/kjakJZFqlYeclTEM4Bbu8FeSnWL7aQ7/wWjyVsK4UfX1SZlkbNUhiWT0u 9OahfaCh2b58Z4oGt9NQg+7QIys4ZtnU9zNcX+LoGvgcN4YQ7JyaZTBO7ClPL5EQL7ls XJe1WeVp+h8QuM1eC96tnZLcsTWxTdcmzlMRSNbZ03zmVXqBcFfg1T5saWyfRoR0L1Y1 hE6WdgLmuz+1rHiAUs9jAhHO0XZNigDr4VK4/Xl68s4nJPI27AqYGb3OkdKKZxJFGZGs kQoA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=BXFBiFnlVbiAOhJ58lMGp2QZFZ1cSS8mfB583vCwZrE=; fh=XFDRxS7z/mPiLWcvDFNXxtez86tw5VSUEAZ1VPulNcQ=; b=jUkibyFsc4OwPRz6dUdm/EGLOtigMWjjmlvvUh9Qp3QNHO2bpLW7wDzkXzg+KdSANP zQ0o1mc5LxEL8K5y6AlLzUvEeadNH+RJMIJh42c39jD5+oKs1ysCEBqB88CcrfI6U1Uj t0Jykyljg7EO3LcLCXEcr88fseE3mavjSyv8sjl7W3tzksSQEjB2zI0BkV4dC81NlmFT V3cKN+07t7sJx075DyNiXDVgL5PUXlYNqLI7vdP4KjCBjTuIaWIUp75d72LrsXlvqUGQ naAOeucNPk6lMShftj3SuCRn2zpfFo237rzobSWAiP6FoSKeTcwhRrobeXJnvQLTAy2G Yfiw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=BuhHa6EG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id br9-20020a170906d14900b0098fe62ea896si379986ejb.71.2023.06.25.08.27.12; Sun, 25 Jun 2023 08:27:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=BuhHa6EG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229886AbjFYPSE (ORCPT + 99 others); Sun, 25 Jun 2023 11:18:04 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35028 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229471AbjFYPSD (ORCPT ); Sun, 25 Jun 2023 11:18:03 -0400 Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 07E971B7 for ; Sun, 25 Jun 2023 08:18:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1687706281; x=1719242281; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=j4LsgGtbcDlEquzSrXQqZtax80fRhe6Atz2zhoKJYhU=; b=BuhHa6EGIgs99KzDO1/pHEusewDfCOCV9OYy4IjlO7fyL1r+oDX3wzi7 vBvFMkK+oo4Lw27h4bjJ7V5MiadGxoDOD67pm5/EH9L3KEZt0vWk7Cpcq x+VW6cDds0wmvd4+duCwhS2FhOs+s3Z073ruTNm4bpWJiViWYsA8Gz2Yn PAbk9Qg3WbTRGVyPIVP7TCeWczyKd3gM+cL6p5OljWYHsGDarQ06EL6y6 l+vMES4c69ZMso97QPbs7UMA/vm/ueEnPXdvS7SRmd7jMANuMRDFPCARf u8g3Az0HMwVIOHg6S7eK+mkOKJPtFTRO/ymbrXhMVJSvjmmumxjcEmgYW g==; X-IronPort-AV: E=McAfee;i="6600,9927,10752"; a="391255040" X-IronPort-AV: E=Sophos;i="6.01,157,1684825200"; d="scan'208";a="391255040" Received: from orsmga004.jf.intel.com ([10.7.209.38]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 25 Jun 2023 08:18:01 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10752"; a="840004511" X-IronPort-AV: E=Sophos;i="6.01,157,1684825200"; d="scan'208";a="840004511" Received: from cascade.sh.intel.com ([10.239.48.162]) by orsmga004.jf.intel.com with ESMTP; 25 Jun 2023 08:17:58 -0700 From: Jingqi Liu To: iommu@lists.linux.dev, Lu Baolu , Tian Kevin , Joerg Roedel , Will Deacon , Robin Murphy Cc: linux-kernel@vger.kernel.org, Jingqi Liu Subject: [PATCH 0/5] iommu/vt-d: debugfs: Enhancements to IOMMU debugfs Date: Sun, 25 Jun 2023 23:04:37 +0800 Message-Id: <20230625150442.42197-1-Jingqi.liu@intel.com> X-Mailer: git-send-email 2.21.3 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The original debugfs only dumps all IOMMU page tables without pasid supported. It traverses all devices on the pci bus, then dumps all page tables based on device domains. This traversal is from software perspective. This series dumps page tables by traversing root tables, context tables, pasid directories and pasid tables from hardware perspective. By specifying source identifier and PASID, it supports dumping specified page table or all page tables in legacy mode or scalable mode. For a device that only supports legacy mode, specify the source identifier, and search the root table and context table to dump its page table. It does not support to specify PASID. For a device that supports scalable mode, specify a {source identifier, PASID} pair and search the root table, context table and pasid table to dump its page table. If the pasid is not specified, it is set to RID_PASID. Switch to dump all page tables by specifying "auto". Examples are as follows: 1) Dump the page table of device "00:1f.0" that only supports legacy mode. $ sudo echo 00:1f.0 > /sys/kernel/debug/iommu/intel/domain_translation_struct $ sudo cat /sys/kernel/debug/iommu/intel/domain_translation_struct Device 0000:00:1f.0 @0x105407000 IOVA_PFN PML5E PML4E 0x0000000000000 | 0x0000000000000000 0x0000000105408003 0x0000000000001 | 0x0000000000000000 0x0000000105408003 0x0000000000002 | 0x0000000000000000 0x0000000105408003 0x0000000000003 | 0x0000000000000000 0x0000000105408003 PDPE PDE PTE 0x0000000105409003 0x000000010540a003 0x0000000000000003 0x0000000105409003 0x000000010540a003 0x0000000000001003 0x0000000105409003 0x000000010540a003 0x0000000000002003 0x0000000105409003 0x000000010540a003 0x0000000000003003 [...] 2) Dump the page table of device "00:0a.0" with pasid "2". $ sudo echo 00:0a.0,2 > /sys/kernel/debug/iommu/intel/domain_translation_struct $ sudo cat /sys/kernel/debug/iommu/intel/domain_translation_struct Device 0000:00:0a.0 with pasid 2 @0x1083d7000 IOVA_PFN PML5E PML4E 0x0000000000000 | 0x0000000000000000 0x0000000106aaa003 0x0000000000001 | 0x0000000000000000 0x0000000106aaa003 0x0000000000002 | 0x0000000000000000 0x0000000106aaa003 0x0000000000003 | 0x0000000000000000 0x0000000106aaa003 PDPE PDE PTE 0x000000010a819003 0x000000010a7aa003 0x0000000129800003 0x000000010a819003 0x000000010a7aa003 0x0000000129801003 0x000000010a819003 0x000000010a7aa003 0x0000000129802003 0x000000010a819003 0x000000010a7aa003 0x0000000129803003 [...] 3) Dump all page tables: $ sudo echo "auto" > /sys/kernel/debug/iommu/intel/domain_translation_struct $ sudo cat /sys/kernel/debug/iommu/intel/domain_translation_struct [...] Device 0000:00:02.0 @0x103072000 IOVA_PFN PML5E PML4E 0x000000008d800 | 0x0000000000000000 0x0000000103073003 0x000000008d801 | 0x0000000000000000 0x0000000103073003 PDPE PDE PTE 0x0000000103074003 0x0000000103075003 0x000000008d800003 0x0000000103074003 0x0000000103075003 0x000000008d801003 [...] Device 0000:00:0a.0 with pasid 2 @0x10a0b6000 IOVA_PFN PML5E PML4E 0x0000000000000 | 0x0000000000000000 0x00000001072d2003 0x0000000000001 | 0x0000000000000000 0x00000001072d2003 PDPE PDE PTE 0x0000000107d6e003 0x00000001161d4003 0x00000001bdc00003 0x0000000107d6e003 0x00000001161d4003 0x00000001bdc01003 [...] Thanks, Jingqi Jingqi Liu (5): iommu/vt-d: debugfs: Define domain_translation_struct file ops iommu/vt-d: debugfs: Support specifying source identifier and PASID iommu/vt-d: debugfs: Dump the corresponding page table of a pasid iommu/vt-d: debugfs: Support dumping a specified page table iommu/vt-d: debugfs: Dump entry pointing to huge page drivers/iommu/intel/debugfs.c | 361 ++++++++++++++++++++++++++++++---- 1 file changed, 326 insertions(+), 35 deletions(-) -- 2.21.3