From nobody Fri Dec 19 20:57:06 2025 Received: from szxga08-in.huawei.com (szxga08-in.huawei.com [45.249.212.255]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 0E5021C37B6; Tue, 6 Aug 2024 12:37:18 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=45.249.212.255 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1722947842; cv=none; b=DrLip8rHcvEPVHJGG/Adr++TtgjKAIBSrRObiAwjkCpWOO0bxJP/TEcfl4Tn98/Jlm9BWlEAAlu5gIxdHIVRDH2OXfuRiz+3fN/MzXdqEYB8ga1+GgfSKOdtjk0IGYb09OdyiP76AlVFfhhUghWqt28leRJ7LPnJWWBRaYEBpfY= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1722947842; c=relaxed/simple; bh=7/bLKEZtRgvn0DdJ7LYQQ86YmnRWh017t5fcXWej4bk=; h=From:To:CC:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=CpAfjtkInku/ILVT3oDyM91ErTzISLQxRVDOJKBGM+hEPnWq5fYa8ONDht5PSuM9MwTRj42vw3YgzxzHRqEgXbLm0dKROzr5fUWNQJreuM6w4/5+dtFkP2N/tUl4Wh/4LTIp7GP5IFpSlO764N5FT+Hn1wf16F2OY0xH0tAj5Ng= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=huawei.com; spf=pass smtp.mailfrom=huawei.com; arc=none smtp.client-ip=45.249.212.255 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=huawei.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=huawei.com Received: from mail.maildlp.com (unknown [172.19.162.254]) by szxga08-in.huawei.com (SkyGuard) with ESMTP id 4WdXql457Fz1L9qG; Tue, 6 Aug 2024 20:36:51 +0800 (CST) Received: from kwepemm600005.china.huawei.com (unknown [7.193.23.191]) by mail.maildlp.com (Postfix) with ESMTPS id D3748180106; Tue, 6 Aug 2024 20:37:10 +0800 (CST) Received: from huawei.com (10.50.165.33) by kwepemm600005.china.huawei.com (7.193.23.191) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.39; Tue, 6 Aug 2024 20:37:10 +0800 From: Longfang Liu To: , , , CC: , , , Subject: [PATCH v8 3/4] hisi_acc_vfio_pci: register debugfs for hisilicon migration driver Date: Tue, 6 Aug 2024 20:29:27 +0800 Message-ID: <20240806122928.46187-4-liulongfang@huawei.com> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20240806122928.46187-1-liulongfang@huawei.com> References: <20240806122928.46187-1-liulongfang@huawei.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-ClientProxiedBy: dggems705-chm.china.huawei.com (10.3.19.182) To kwepemm600005.china.huawei.com (7.193.23.191) Content-Type: text/plain; charset="utf-8" On the debugfs framework of VFIO, if the CONFIG_VFIO_DEBUGFS macro is enabled, the debug function is registered for the live migration driver of the HiSilicon accelerator device. After registering the HiSilicon accelerator device on the debugfs framework of live migration of vfio, a directory file "hisi_acc" of debugfs is created, and then three debug function files are created in this directory: vfio | +--- | +---migration | +--state | +--hisi_acc | +--dev_data | +--migf_data | +--cmd_state | +--- +---migration +--state +--hisi_acc +--dev_data +--migf_data +--cmd_state dev_data file: read device data that needs to be migrated from the current device in real time migf_data file: read the migration data of the last live migration from the current driver. cmd_state: used to get the cmd channel state for the device. +----------------+ +--------------+ +---------------+ | migration dev | | src dev | | dst dev | +-------+--------+ +------+-------+ +-------+-------+ | | | | +------v-------+ +-------v-------+ | | saving_migf | | resuming_migf | read | | file | | file | | +------+-------+ +-------+-------+ | | copy | | +------------+----------+ | | +-------v--------+ +-------v--------+ | data buffer | | debug_migf | +-------+--------+ +-------+--------+ | | cat | cat | +-------v--------+ +-------v--------+ | dev_data | | migf_data | +----------------+ +----------------+ When accessing debugfs, user can obtain the most recent status data of the device through the "dev_data" file. It can read recent complete status data of the device. If the current device is being migrated, it will wait for it to complete. The data for the last completed migration function will be stored in debug_migf. Users can read it via "migf_data". Signed-off-by: Longfang Liu --- .../vfio/pci/hisilicon/hisi_acc_vfio_pci.c | 209 ++++++++++++++++++ .../vfio/pci/hisilicon/hisi_acc_vfio_pci.h | 6 + 2 files changed, 215 insertions(+) diff --git a/drivers/vfio/pci/hisilicon/hisi_acc_vfio_pci.c b/drivers/vfio/= pci/hisilicon/hisi_acc_vfio_pci.c index a8c53952d82e..379657904f86 100644 --- a/drivers/vfio/pci/hisilicon/hisi_acc_vfio_pci.c +++ b/drivers/vfio/pci/hisilicon/hisi_acc_vfio_pci.c @@ -627,15 +627,30 @@ static void hisi_acc_vf_disable_fd(struct hisi_acc_vf= _migration_file *migf) mutex_unlock(&migf->lock); } =20 +static void hisi_acc_debug_migf_copy(struct hisi_acc_vf_core_device *hisi_= acc_vdev, + struct hisi_acc_vf_migration_file *src_migf) +{ + struct hisi_acc_vf_migration_file *dst_migf =3D hisi_acc_vdev->debug_migf; + + if (!dst_migf) + return; + + dst_migf->total_length =3D src_migf->total_length; + memcpy(&dst_migf->vf_data, &src_migf->vf_data, + sizeof(struct acc_vf_data)); +} + static void hisi_acc_vf_disable_fds(struct hisi_acc_vf_core_device *hisi_a= cc_vdev) { if (hisi_acc_vdev->resuming_migf) { + hisi_acc_debug_migf_copy(hisi_acc_vdev, hisi_acc_vdev->resuming_migf); hisi_acc_vf_disable_fd(hisi_acc_vdev->resuming_migf); fput(hisi_acc_vdev->resuming_migf->filp); hisi_acc_vdev->resuming_migf =3D NULL; } =20 if (hisi_acc_vdev->saving_migf) { + hisi_acc_debug_migf_copy(hisi_acc_vdev, hisi_acc_vdev->saving_migf); hisi_acc_vf_disable_fd(hisi_acc_vdev->saving_migf); fput(hisi_acc_vdev->saving_migf->filp); hisi_acc_vdev->saving_migf =3D NULL; @@ -1294,6 +1309,191 @@ static long hisi_acc_vfio_pci_ioctl(struct vfio_dev= ice *core_vdev, unsigned int return vfio_pci_core_ioctl(core_vdev, cmd, arg); } =20 +static int hisi_acc_vf_debug_check(struct seq_file *seq, struct vfio_devic= e *vdev) +{ + struct hisi_acc_vf_core_device *hisi_acc_vdev =3D hisi_acc_get_vf_dev(vde= v); + struct hisi_qm *vf_qm =3D &hisi_acc_vdev->vf_qm; + int ret; + + lockdep_assert_held(&hisi_acc_vdev->state_mutex); + if (!vdev->mig_ops) { + seq_printf(seq, "%s\n", "device does not support live migration!\n"); + return -EINVAL; + } + + /* + * When the device is not opened, the io_base is not mapped. + * The driver cannot perform device read and write operations. + */ + if (!hisi_acc_vdev->dev_opened) { + seq_printf(seq, "%s\n", "device not opened!\n"); + return -EINVAL; + } + + ret =3D qm_wait_dev_not_ready(vf_qm); + if (ret) { + seq_printf(seq, "%s\n", "VF device not ready!\n"); + return -EBUSY; + } + + return 0; +} + +static int hisi_acc_vf_debug_cmd(struct seq_file *seq, void *data) +{ + struct device *vf_dev =3D seq->private; + struct vfio_pci_core_device *core_device =3D dev_get_drvdata(vf_dev); + struct vfio_device *vdev =3D &core_device->vdev; + struct hisi_acc_vf_core_device *hisi_acc_vdev =3D hisi_acc_get_vf_dev(vde= v); + struct hisi_qm *vf_qm =3D &hisi_acc_vdev->vf_qm; + u64 value; + int ret; + + mutex_lock(&hisi_acc_vdev->state_mutex); + ret =3D hisi_acc_vf_debug_check(seq, vdev); + if (ret) { + mutex_unlock(&hisi_acc_vdev->state_mutex); + return ret; + } + + value =3D readl(vf_qm->io_base + QM_MB_CMD_SEND_BASE); + if (value =3D=3D QM_MB_CMD_NOT_READY) { + mutex_unlock(&hisi_acc_vdev->state_mutex); + seq_printf(seq, "mailbox cmd channel not ready!\n"); + return -EINVAL; + } + mutex_unlock(&hisi_acc_vdev->state_mutex); + seq_printf(seq, "mailbox cmd channel ready!\n"); + + return 0; +} + +static int hisi_acc_vf_dev_read(struct seq_file *seq, void *data) +{ + struct device *vf_dev =3D seq->private; + struct vfio_pci_core_device *core_device =3D dev_get_drvdata(vf_dev); + struct vfio_device *vdev =3D &core_device->vdev; + struct hisi_acc_vf_core_device *hisi_acc_vdev =3D hisi_acc_get_vf_dev(vde= v); + size_t vf_data_sz =3D offsetofend(struct acc_vf_data, padding); + struct acc_vf_data *vf_data =3D NULL; + int ret; + + vf_data =3D kzalloc(sizeof(struct acc_vf_data), GFP_KERNEL); + if (!vf_data) + return -ENOMEM; + + mutex_lock(&hisi_acc_vdev->state_mutex); + ret =3D hisi_acc_vf_debug_check(seq, vdev); + if (ret) { + mutex_unlock(&hisi_acc_vdev->state_mutex); + goto migf_err; + } + + vf_data->vf_qm_state =3D hisi_acc_vdev->vf_qm_state; + ret =3D vf_qm_read_data(&hisi_acc_vdev->vf_qm, vf_data); + if (ret) { + mutex_unlock(&hisi_acc_vdev->state_mutex); + goto migf_err; + } + + mutex_unlock(&hisi_acc_vdev->state_mutex); + + seq_hex_dump(seq, "Dev Data:", DUMP_PREFIX_OFFSET, 16, 1, + (unsigned char *)vf_data, + vf_data_sz, false); + + seq_printf(seq, + "acc device:\n" + "device ready: %u\n" + "device opened: %d\n" + "data size: %lu\n", + hisi_acc_vdev->vf_qm_state, + hisi_acc_vdev->dev_opened, + sizeof(struct acc_vf_data)); + +migf_err: + kfree(vf_data); + + return ret; +} + +static int hisi_acc_vf_migf_read(struct seq_file *seq, void *data) +{ + struct device *vf_dev =3D seq->private; + struct vfio_pci_core_device *core_device =3D dev_get_drvdata(vf_dev); + struct vfio_device *vdev =3D &core_device->vdev; + struct hisi_acc_vf_core_device *hisi_acc_vdev =3D hisi_acc_get_vf_dev(vde= v); + size_t vf_data_sz =3D offsetofend(struct acc_vf_data, padding); + struct hisi_acc_vf_migration_file *debug_migf =3D hisi_acc_vdev->debug_mi= gf; + + /* Check whether the live migration operation has been performed */ + if (debug_migf->total_length < QM_MATCH_SIZE) { + seq_printf(seq, "%s\n", "device not migrated!\n"); + return -EAGAIN; + } + + seq_hex_dump(seq, "Mig Data:", DUMP_PREFIX_OFFSET, 16, 1, + (unsigned char *)&debug_migf->vf_data, + vf_data_sz, false); + + seq_printf(seq, + "acc device:\n" + "device ready: %u\n" + "device opened: %d\n" + "data size: %lu\n", + hisi_acc_vdev->vf_qm_state, + hisi_acc_vdev->dev_opened, + debug_migf->total_length); + + return 0; +} + +static int hisi_acc_vfio_debug_init(struct hisi_acc_vf_core_device *hisi_a= cc_vdev) +{ + struct vfio_device *vdev =3D &hisi_acc_vdev->core_device.vdev; + struct dentry *vfio_dev_migration =3D NULL; + struct dentry *vfio_hisi_acc =3D NULL; + struct device *dev =3D vdev->dev; + void *migf =3D NULL; + + if (!debugfs_initialized() || + !IS_ENABLED(CONFIG_VFIO_DEBUGFS)) + return 0; + + migf =3D kzalloc(sizeof(struct hisi_acc_vf_migration_file), GFP_KERNEL); + if (!migf) + return -ENOMEM; + hisi_acc_vdev->debug_migf =3D migf; + + vfio_dev_migration =3D debugfs_lookup("migration", vdev->debug_root); + if (!vfio_dev_migration) { + kfree(migf); + hisi_acc_vdev->debug_migf =3D NULL; + dev_err(dev, "failed to lookup migration debugfs file!\n"); + return -ENODEV; + } + + vfio_hisi_acc =3D debugfs_create_dir("hisi_acc", vfio_dev_migration); + debugfs_create_devm_seqfile(dev, "dev_data", vfio_hisi_acc, + hisi_acc_vf_dev_read); + debugfs_create_devm_seqfile(dev, "migf_data", vfio_hisi_acc, + hisi_acc_vf_migf_read); + debugfs_create_devm_seqfile(dev, "cmd_state", vfio_hisi_acc, + hisi_acc_vf_debug_cmd); + + return 0; +} + +static void hisi_acc_vf_debugfs_exit(struct hisi_acc_vf_core_device *hisi_= acc_vdev) +{ + if (!debugfs_initialized() || + !IS_ENABLED(CONFIG_VFIO_DEBUGFS)) + return; + + if (hisi_acc_vdev->debug_migf) + kfree(hisi_acc_vdev->debug_migf); +} + static int hisi_acc_vfio_pci_open_device(struct vfio_device *core_vdev) { struct hisi_acc_vf_core_device *hisi_acc_vdev =3D hisi_acc_get_vf_dev(cor= e_vdev); @@ -1311,9 +1511,11 @@ static int hisi_acc_vfio_pci_open_device(struct vfio= _device *core_vdev) return ret; } hisi_acc_vdev->mig_state =3D VFIO_DEVICE_STATE_RUNNING; + hisi_acc_vdev->dev_opened =3D true; } =20 vfio_pci_core_finish_enable(vdev); + return 0; } =20 @@ -1322,7 +1524,10 @@ static void hisi_acc_vfio_pci_close_device(struct vf= io_device *core_vdev) struct hisi_acc_vf_core_device *hisi_acc_vdev =3D hisi_acc_get_vf_dev(cor= e_vdev); struct hisi_qm *vf_qm =3D &hisi_acc_vdev->vf_qm; =20 + mutex_lock(&hisi_acc_vdev->state_mutex); + hisi_acc_vdev->dev_opened =3D false; iounmap(vf_qm->io_base); + mutex_unlock(&hisi_acc_vdev->state_mutex); vfio_pci_core_close_device(core_vdev); } =20 @@ -1413,6 +1618,9 @@ static int hisi_acc_vfio_pci_probe(struct pci_dev *pd= ev, const struct pci_device ret =3D vfio_pci_core_register_device(&hisi_acc_vdev->core_device); if (ret) goto out_put_vdev; + + if (ops =3D=3D &hisi_acc_vfio_pci_migrn_ops) + hisi_acc_vfio_debug_init(hisi_acc_vdev); return 0; =20 out_put_vdev: @@ -1425,6 +1633,7 @@ static void hisi_acc_vfio_pci_remove(struct pci_dev *= pdev) struct hisi_acc_vf_core_device *hisi_acc_vdev =3D hisi_acc_drvdata(pdev); =20 vfio_pci_core_unregister_device(&hisi_acc_vdev->core_device); + hisi_acc_vf_debugfs_exit(hisi_acc_vdev); vfio_put_device(&hisi_acc_vdev->core_device.vdev); } =20 diff --git a/drivers/vfio/pci/hisilicon/hisi_acc_vfio_pci.h b/drivers/vfio/= pci/hisilicon/hisi_acc_vfio_pci.h index 5bab46602fad..f86f3b88b09e 100644 --- a/drivers/vfio/pci/hisilicon/hisi_acc_vfio_pci.h +++ b/drivers/vfio/pci/hisilicon/hisi_acc_vfio_pci.h @@ -32,6 +32,7 @@ #define QM_SQC_VFT_BASE_MASK_V2 GENMASK(15, 0) #define QM_SQC_VFT_NUM_SHIFT_V2 45 #define QM_SQC_VFT_NUM_MASK_V2 GENMASK(9, 0) +#define QM_MB_CMD_NOT_READY 0xffffffff =20 /* RW regs */ #define QM_REGS_MAX_LEN 7 @@ -111,5 +112,10 @@ struct hisi_acc_vf_core_device { int vf_id; struct hisi_acc_vf_migration_file *resuming_migf; struct hisi_acc_vf_migration_file *saving_migf; + + /* To make sure the device is opened */ + bool dev_opened; + /* To save migration data */ + struct hisi_acc_vf_migration_file *debug_migf; }; #endif /* HISI_ACC_VFIO_PCI_H */ --=20 2.24.0