Based on kernel version 6.11
. Page generated on 2024-09-24 08:21 EST
.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 | What: /sys/kernel/debug/iommu/intel/iommu_regset Date: December 2023 Contact: Jingqi Liu <Jingqi.liu@intel.com> Description: This file dumps all the register contents for each IOMMU device. Example in Kabylake: :: $ sudo cat /sys/kernel/debug/iommu/intel/iommu_regset IOMMU: dmar0 Register Base Address: 26be37000 Name Offset Contents VER 0x00 0x0000000000000010 GCMD 0x18 0x0000000000000000 GSTS 0x1c 0x00000000c7000000 FSTS 0x34 0x0000000000000000 FECTL 0x38 0x0000000000000000 [...] IOMMU: dmar1 Register Base Address: fed90000 Name Offset Contents VER 0x00 0x0000000000000010 GCMD 0x18 0x0000000000000000 GSTS 0x1c 0x00000000c7000000 FSTS 0x34 0x0000000000000000 FECTL 0x38 0x0000000000000000 [...] IOMMU: dmar2 Register Base Address: fed91000 Name Offset Contents VER 0x00 0x0000000000000010 GCMD 0x18 0x0000000000000000 GSTS 0x1c 0x00000000c7000000 FSTS 0x34 0x0000000000000000 FECTL 0x38 0x0000000000000000 [...] What: /sys/kernel/debug/iommu/intel/ir_translation_struct Date: December 2023 Contact: Jingqi Liu <Jingqi.liu@intel.com> Description: This file dumps the table entries for Interrupt remapping and Interrupt posting. Example in Kabylake: :: $ sudo cat /sys/kernel/debug/iommu/intel/ir_translation_struct Remapped Interrupt supported on IOMMU: dmar0 IR table address:100900000 Entry SrcID DstID Vct IRTE_high IRTE_low 0 00:0a.0 00000080 24 0000000000040050 000000800024000d 1 00:0a.0 00000001 ef 0000000000040050 0000000100ef000d Remapped Interrupt supported on IOMMU: dmar1 IR table address:100300000 Entry SrcID DstID Vct IRTE_high IRTE_low 0 00:02.0 00000002 26 0000000000040010 000000020026000d [...] **** Posted Interrupt supported on IOMMU: dmar0 IR table address:100900000 Entry SrcID PDA_high PDA_low Vct IRTE_high IRTE_low What: /sys/kernel/debug/iommu/intel/dmar_translation_struct Date: December 2023 Contact: Jingqi Liu <Jingqi.liu@intel.com> Description: This file dumps Intel IOMMU DMA remapping tables, such as root table, context table, PASID directory and PASID table entries in debugfs. For legacy mode, it doesn't support PASID, and hence PASID field is defaulted to '-1' and other PASID related fields are invalid. Example in Kabylake: :: $ sudo cat /sys/kernel/debug/iommu/intel/dmar_translation_struct IOMMU dmar1: Root Table Address: 0x103027000 B.D.F Root_entry 00:02.0 0x0000000000000000:0x000000010303e001 Context_entry 0x0000000000000102:0x000000010303f005 PASID PASID_table_entry -1 0x0000000000000000:0x0000000000000000:0x0000000000000000 IOMMU dmar0: Root Table Address: 0x103028000 B.D.F Root_entry 00:0a.0 0x0000000000000000:0x00000001038a7001 Context_entry 0x0000000000000000:0x0000000103220e7d PASID PASID_table_entry 0 0x0000000000000000:0x0000000000800002:0x00000001038a5089 [...] What: /sys/kernel/debug/iommu/intel/invalidation_queue Date: December 2023 Contact: Jingqi Liu <Jingqi.liu@intel.com> Description: This file exports invalidation queue internals of each IOMMU device. Example in Kabylake: :: $ sudo cat /sys/kernel/debug/iommu/intel/invalidation_queue Invalidation queue on IOMMU: dmar0 Base: 0x10022e000 Head: 20 Tail: 20 Index qw0 qw1 qw2 0 0000000000000014 0000000000000000 0000000000000000 1 0000000200000025 0000000100059c04 0000000000000000 2 0000000000000014 0000000000000000 0000000000000000 qw3 status 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 [...] Invalidation queue on IOMMU: dmar1 Base: 0x10026e000 Head: 32 Tail: 32 Index qw0 qw1 status 0 0000000000000004 0000000000000000 0000000000000000 1 0000000200000025 0000000100059804 0000000000000000 2 0000000000000011 0000000000000000 0000000000000000 [...] What: /sys/kernel/debug/iommu/intel/dmar_perf_latency Date: December 2023 Contact: Jingqi Liu <Jingqi.liu@intel.com> Description: This file is used to control and show counts of execution time ranges for various types per DMAR. Firstly, write a value to /sys/kernel/debug/iommu/intel/dmar_perf_latency to enable sampling. The possible values are as follows: * 0 - disable sampling all latency data * 1 - enable sampling IOTLB invalidation latency data * 2 - enable sampling devTLB invalidation latency data * 3 - enable sampling intr entry cache invalidation latency data Next, read /sys/kernel/debug/iommu/intel/dmar_perf_latency gives a snapshot of sampling result of all enabled monitors. Examples in Kabylake: :: 1) Disable sampling all latency data: $ sudo echo 0 > /sys/kernel/debug/iommu/intel/dmar_perf_latency 2) Enable sampling IOTLB invalidation latency data $ sudo echo 1 > /sys/kernel/debug/iommu/intel/dmar_perf_latency $ sudo cat /sys/kernel/debug/iommu/intel/dmar_perf_latency IOMMU: dmar0 Register Base Address: 26be37000 <0.1us 0.1us-1us 1us-10us 10us-100us 100us-1ms inv_iotlb 0 0 0 0 0 1ms-10ms >=10ms min(us) max(us) average(us) inv_iotlb 0 0 0 0 0 [...] IOMMU: dmar2 Register Base Address: fed91000 <0.1us 0.1us-1us 1us-10us 10us-100us 100us-1ms inv_iotlb 0 0 18 0 0 1ms-10ms >=10ms min(us) max(us) average(us) inv_iotlb 0 0 2 2 2 3) Enable sampling devTLB invalidation latency data $ sudo echo 2 > /sys/kernel/debug/iommu/intel/dmar_perf_latency $ sudo cat /sys/kernel/debug/iommu/intel/dmar_perf_latency IOMMU: dmar0 Register Base Address: 26be37000 <0.1us 0.1us-1us 1us-10us 10us-100us 100us-1ms inv_devtlb 0 0 0 0 0 >=10ms min(us) max(us) average(us) inv_devtlb 0 0 0 0 [...] What: /sys/kernel/debug/iommu/intel/<bdf>/domain_translation_struct Date: December 2023 Contact: Jingqi Liu <Jingqi.liu@intel.com> Description: This file dumps a specified page table of Intel IOMMU in legacy mode or scalable mode. For a device that only supports legacy mode, dump its page table by the debugfs file in the debugfs device directory. e.g. /sys/kernel/debug/iommu/intel/0000:00:02.0/domain_translation_struct. For a device that supports scalable mode, dump the page table of specified pasid by the debugfs file in the debugfs pasid directory. e.g. /sys/kernel/debug/iommu/intel/0000:00:02.0/1/domain_translation_struct. Examples in Kabylake: :: 1) Dump the page table of device "0000:00:02.0" that only supports legacy mode. $ sudo cat /sys/kernel/debug/iommu/intel/0000:00:02.0/domain_translation_struct Device 0000:00:02.0 @0x1017f8000 IOVA_PFN PML5E PML4E 0x000000008d800 | 0x0000000000000000 0x00000001017f9003 0x000000008d801 | 0x0000000000000000 0x00000001017f9003 0x000000008d802 | 0x0000000000000000 0x00000001017f9003 PDPE PDE PTE 0x00000001017fa003 0x00000001017fb003 0x000000008d800003 0x00000001017fa003 0x00000001017fb003 0x000000008d801003 0x00000001017fa003 0x00000001017fb003 0x000000008d802003 [...] 2) Dump the page table of device "0000:00:0a.0" with PASID "1" that supports scalable mode. $ sudo cat /sys/kernel/debug/iommu/intel/0000:00:0a.0/1/domain_translation_struct Device 0000:00:0a.0 with pasid 1 @0x10c112000 IOVA_PFN PML5E PML4E 0x0000000000000 | 0x0000000000000000 0x000000010df93003 0x0000000000001 | 0x0000000000000000 0x000000010df93003 0x0000000000002 | 0x0000000000000000 0x000000010df93003 PDPE PDE PTE 0x0000000106ae6003 0x0000000104b38003 0x0000000147c00803 0x0000000106ae6003 0x0000000104b38003 0x0000000147c01803 0x0000000106ae6003 0x0000000104b38003 0x0000000147c02803 [...] |