iommu/iommu-debug: Add file for profiling fast mapper

We'd like to understand the performance of the fast page table mapper,
which only supports 4K page sizes.  Add a debugfs file to profile the
new mapper.

CRs-Fixed: 997751
Change-Id: I5adc3c3ecd432552386b600b9e66e3db42e73138
Signed-off-by: Mitchel Humpherys <mitchelh@codeaurora.org>
This commit is contained in:
Mitchel Humpherys 2015-10-05 14:44:58 -07:00 committed by Jeevan Shriram
parent 932536587e
commit b7d9fb96e0

View file

@ -21,10 +21,57 @@
#include <linux/platform_device.h> #include <linux/platform_device.h>
#include <linux/slab.h> #include <linux/slab.h>
#include <linux/uaccess.h> #include <linux/uaccess.h>
#include <linux/dma-contiguous.h>
#include <soc/qcom/secure_buffer.h> #include <soc/qcom/secure_buffer.h>
#include <linux/qcom_iommu.h> #include <linux/qcom_iommu.h>
#include <linux/module.h> #include <linux/module.h>
static const char *iommu_debug_attr_to_string(enum iommu_attr attr)
{
switch (attr) {
case DOMAIN_ATTR_GEOMETRY:
return "DOMAIN_ATTR_GEOMETRY";
case DOMAIN_ATTR_PAGING:
return "DOMAIN_ATTR_PAGING";
case DOMAIN_ATTR_WINDOWS:
return "DOMAIN_ATTR_WINDOWS";
case DOMAIN_ATTR_FSL_PAMU_STASH:
return "DOMAIN_ATTR_FSL_PAMU_STASH";
case DOMAIN_ATTR_FSL_PAMU_ENABLE:
return "DOMAIN_ATTR_FSL_PAMU_ENABLE";
case DOMAIN_ATTR_FSL_PAMUV1:
return "DOMAIN_ATTR_FSL_PAMUV1";
case DOMAIN_ATTR_NESTING:
return "DOMAIN_ATTR_NESTING";
case DOMAIN_ATTR_COHERENT_HTW_DISABLE:
return "DOMAIN_ATTR_COHERENT_HTW_DISABLE";
case DOMAIN_ATTR_PT_BASE_ADDR:
return "DOMAIN_ATTR_PT_BASE_ADDR";
case DOMAIN_ATTR_SECURE_VMID:
return "DOMAIN_ATTR_SECURE_VMID";
case DOMAIN_ATTR_ATOMIC:
return "DOMAIN_ATTR_ATOMIC";
case DOMAIN_ATTR_CONTEXT_BANK:
return "DOMAIN_ATTR_CONTEXT_BANK";
case DOMAIN_ATTR_TTBR0:
return "DOMAIN_ATTR_TTBR0";
case DOMAIN_ATTR_CONTEXTIDR:
return "DOMAIN_ATTR_CONTEXTIDR";
case DOMAIN_ATTR_PROCID:
return "DOMAIN_ATTR_PROCID";
case DOMAIN_ATTR_DYNAMIC:
return "DOMAIN_ATTR_DYNAMIC";
case DOMAIN_ATTR_NON_FATAL_FAULTS:
return "DOMAIN_ATTR_NON_FATAL_FAULTS";
case DOMAIN_ATTR_S1_BYPASS:
return "DOMAIN_ATTR_S1_BYPASS";
case DOMAIN_ATTR_FAST:
return "DOMAIN_ATTR_FAST";
default:
return "Unknown attr!";
}
}
#ifdef CONFIG_IOMMU_DEBUG_TRACKING #ifdef CONFIG_IOMMU_DEBUG_TRACKING
static DEFINE_MUTEX(iommu_debug_attachments_lock); static DEFINE_MUTEX(iommu_debug_attachments_lock);
@ -461,6 +508,10 @@ static const char * const _size_to_string(unsigned long size)
switch (size) { switch (size) {
case SZ_4K: case SZ_4K:
return "4K"; return "4K";
case SZ_8K:
return "8K";
case SZ_16K:
return "16K";
case SZ_64K: case SZ_64K:
return "64K"; return "64K";
case SZ_2M: case SZ_2M:
@ -493,16 +544,16 @@ DEFINE_SIMPLE_ATTRIBUTE(iommu_debug_nr_iters_ops,
nr_iters_get, nr_iters_set, "%llu\n"); nr_iters_get, nr_iters_set, "%llu\n");
static void iommu_debug_device_profiling(struct seq_file *s, struct device *dev, static void iommu_debug_device_profiling(struct seq_file *s, struct device *dev,
bool secure) enum iommu_attr attrs[],
void *attr_values[], int nattrs,
const unsigned long sizes[])
{ {
unsigned long sizes[] = { SZ_4K, SZ_64K, SZ_2M, SZ_1M * 12, int i;
SZ_1M * 20, 0 }; const unsigned long *sz;
unsigned long *sz;
struct iommu_domain *domain; struct iommu_domain *domain;
struct bus_type *bus; struct bus_type *bus;
unsigned long iova = 0x10000; unsigned long iova = 0x10000;
phys_addr_t paddr = 0xa000; phys_addr_t paddr = 0xa000;
int htw_disable = 1, atomic_domain = 1;
bus = msm_iommu_get_bus(dev); bus = msm_iommu_get_bus(dev);
if (!bus) if (!bus)
@ -514,26 +565,18 @@ static void iommu_debug_device_profiling(struct seq_file *s, struct device *dev,
return; return;
} }
if (iommu_domain_set_attr(domain, DOMAIN_ATTR_COHERENT_HTW_DISABLE, seq_puts(s, "Domain attributes: [ ");
&htw_disable)) { for (i = 0; i < nattrs; ++i) {
seq_puts(s, "Couldn't disable coherent htw\n"); /* not all attrs are ints, but this will get us by for now */
goto out_domain_free; seq_printf(s, "%s=%d%s", iommu_debug_attr_to_string(attrs[i]),
*((int *)attr_values[i]),
i < nattrs ? " " : "");
} }
seq_puts(s, "]\n");
if (iommu_domain_set_attr(domain, DOMAIN_ATTR_ATOMIC, for (i = 0; i < nattrs; ++i) {
&atomic_domain)) { if (iommu_domain_set_attr(domain, attrs[i], attr_values[i])) {
seq_printf(s, "Couldn't set atomic_domain to %d\n", seq_printf(s, "Couldn't set %d to the value at %p\n",
atomic_domain); attrs[i], attr_values[i]);
goto out_domain_free;
}
if (secure) {
int secure_vmid = VMID_CP_PIXEL;
if (iommu_domain_set_attr(domain, DOMAIN_ATTR_SECURE_VMID,
&secure_vmid)) {
seq_printf(s, "Couldn't set secure vmid to %d\n",
secure_vmid);
goto out_domain_free; goto out_domain_free;
} }
} }
@ -663,8 +706,17 @@ out_domain_free:
static int iommu_debug_profiling_show(struct seq_file *s, void *ignored) static int iommu_debug_profiling_show(struct seq_file *s, void *ignored)
{ {
struct iommu_debug_device *ddev = s->private; struct iommu_debug_device *ddev = s->private;
const unsigned long sizes[] = { SZ_4K, SZ_64K, SZ_2M, SZ_1M * 12,
SZ_1M * 20, 0 };
enum iommu_attr attrs[] = {
DOMAIN_ATTR_COHERENT_HTW_DISABLE,
DOMAIN_ATTR_ATOMIC,
};
int htw_disable = 1, atomic = 1;
void *attr_values[] = { &htw_disable, &atomic };
iommu_debug_device_profiling(s, ddev->dev, false); iommu_debug_device_profiling(s, ddev->dev, attrs, attr_values,
ARRAY_SIZE(attrs), sizes);
return 0; return 0;
} }
@ -684,8 +736,19 @@ static const struct file_operations iommu_debug_profiling_fops = {
static int iommu_debug_secure_profiling_show(struct seq_file *s, void *ignored) static int iommu_debug_secure_profiling_show(struct seq_file *s, void *ignored)
{ {
struct iommu_debug_device *ddev = s->private; struct iommu_debug_device *ddev = s->private;
const unsigned long sizes[] = { SZ_4K, SZ_64K, SZ_2M, SZ_1M * 12,
SZ_1M * 20, 0 };
iommu_debug_device_profiling(s, ddev->dev, true); enum iommu_attr attrs[] = {
DOMAIN_ATTR_COHERENT_HTW_DISABLE,
DOMAIN_ATTR_ATOMIC,
DOMAIN_ATTR_SECURE_VMID,
};
int one = 1, secure_vmid = VMID_CP_PIXEL;
void *attr_values[] = { &one, &one, &secure_vmid };
iommu_debug_device_profiling(s, ddev->dev, attrs, attr_values,
ARRAY_SIZE(attrs), sizes);
return 0; return 0;
} }
@ -704,6 +767,38 @@ static const struct file_operations iommu_debug_secure_profiling_fops = {
.release = single_release, .release = single_release,
}; };
static int iommu_debug_profiling_fast_show(struct seq_file *s, void *ignored)
{
struct iommu_debug_device *ddev = s->private;
size_t sizes[] = {SZ_4K, SZ_8K, SZ_16K, SZ_64K, 0};
enum iommu_attr attrs[] = {
DOMAIN_ATTR_FAST,
DOMAIN_ATTR_COHERENT_HTW_DISABLE,
DOMAIN_ATTR_ATOMIC,
};
int one = 1;
void *attr_values[] = { &one, &one, &one };
iommu_debug_device_profiling(s, ddev->dev, attrs, attr_values,
ARRAY_SIZE(attrs), sizes);
return 0;
}
static int iommu_debug_profiling_fast_open(struct inode *inode,
struct file *file)
{
return single_open(file, iommu_debug_profiling_fast_show,
inode->i_private);
}
static const struct file_operations iommu_debug_profiling_fast_fops = {
.open = iommu_debug_profiling_fast_open,
.read = seq_read,
.llseek = seq_lseek,
.release = single_release,
};
static int iommu_debug_attach_do_attach(struct iommu_debug_device *ddev, static int iommu_debug_attach_do_attach(struct iommu_debug_device *ddev,
int val, bool is_secure) int val, bool is_secure)
{ {
@ -1096,6 +1191,13 @@ static int snarf_iommu_devices(struct device *dev, const char *name)
goto err_rmdir; goto err_rmdir;
} }
if (!debugfs_create_file("profiling_fast", S_IRUSR, dir, ddev,
&iommu_debug_profiling_fast_fops)) {
pr_err("Couldn't create iommu/devices/%s/profiling_fast debugfs file\n",
name);
goto err_rmdir;
}
if (!debugfs_create_file("attach", S_IRUSR, dir, ddev, if (!debugfs_create_file("attach", S_IRUSR, dir, ddev,
&iommu_debug_attach_fops)) { &iommu_debug_attach_fops)) {
pr_err("Couldn't create iommu/devices/%s/attach debugfs file\n", pr_err("Couldn't create iommu/devices/%s/attach debugfs file\n",