Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp5961819rwb; Mon, 5 Dec 2022 06:22:48 -0800 (PST) X-Google-Smtp-Source: AA0mqf5QydWaxZ9mSSqcPR1CzQ1e7Xp28nqvpGGvLa1HBAN/+rvd8bNBK9ji/XzmyUpB//Fnrpt1 X-Received: by 2002:a5d:4b04:0:b0:242:3d08:1c08 with SMTP id v4-20020a5d4b04000000b002423d081c08mr10724230wrq.415.1670250168322; Mon, 05 Dec 2022 06:22:48 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1670250168; cv=none; d=google.com; s=arc-20160816; b=HScHR9pceUxeNo2lqzJ2slC8Ek+N+VbUlbR6aUtQreO4ebRoeZ1M4pHwerw6Oy2X/v 9WOa2wv/GHFPtmWJlPxYiajhOXD4NlGQRAY7kNoIDGcd88B2/K+b8czy+Vazgo35Hmjy fu1A5/dcdaqMr8X+krFoYWLPnjUelY3DICta6Gn+k2x1M8fh5xi7ffie9Eqv2MdrL7wV KwNfAKM2CKG1iLq/zaPeUTFMZPHm2op6ABcMO8MM0nmwEYyrcaTjgHkGXXFvKF6kGsWG pZZS3KJk/mDW2QSfmDLPmaLWfo3/6DuK1/Rz+qilvs3JiDXDcd040DCKrQHk66bO31Wt oeEg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to :mime-version:user-agent:date:message-id:from:references:cc:to :subject; bh=SoF9XmvfXImAj4kGUpFITbxWYSJtMWqBs/2Pj8X4/CU=; b=x+1K+ry7DxRt2l2ermD6G5K8zeZYpLilx9aEFuQy0wtIDgi4smVZvySRbEtHqoSWCN ClAyKrGNgeFVxPIowVMqFyou8dpXGrK8BKacaY3epOynPhNYXdmtgsOdiggcQnXbWn9N p0lxhNxU9VDzbJP2mwQn7wLebfYX8Z9E4IeDPGBRxJRaHV88EOxF+jMixgiItOpFzGY1 M0RxqLmuJDFans2swQlFG2uSk1gsKM9/S65o0NniVTxms8E1ZORwkovzKjpVgTpV3IQx V9QzvTomJM6uiYvANOTX8YzB0gqIp28LzsoAoWBpNx3qvToNFkQ1WP6yAkb+yXmPwIMp N/UQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id dt14-20020a170907728e00b007acbaeed9besi12193287ejc.398.2022.12.05.06.22.28; Mon, 05 Dec 2022 06:22:48 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231601AbiLENpZ (ORCPT + 81 others); Mon, 5 Dec 2022 08:45:25 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38278 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231345AbiLENpF (ORCPT ); Mon, 5 Dec 2022 08:45:05 -0500 Received: from szxga02-in.huawei.com (szxga02-in.huawei.com [45.249.212.188]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4D2AB1DA5C for ; Mon, 5 Dec 2022 05:44:30 -0800 (PST) Received: from kwepemm600005.china.huawei.com (unknown [172.30.72.53]) by szxga02-in.huawei.com (SkyGuard) with ESMTP id 4NQlBN2C1hzFpdD; Mon, 5 Dec 2022 21:43:40 +0800 (CST) Received: from [10.67.103.158] (10.67.103.158) by kwepemm600005.china.huawei.com (7.193.23.191) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Mon, 5 Dec 2022 21:44:26 +0800 Subject: Re: [PATCH v4 3/5] hisi_acc_vfio_pci: register debugfs for hisilicon migration driver To: Jason Gunthorpe CC: , , , , , References: <20221202092625.35075-1-liulongfang@huawei.com> <20221202092625.35075-4-liulongfang@huawei.com> From: liulongfang Message-ID: <6b3a0220-2a17-fabf-4aed-9ad91bf071f5@huawei.com> Date: Mon, 5 Dec 2022 21:44:26 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="gbk" Content-Transfer-Encoding: 7bit X-Originating-IP: [10.67.103.158] X-ClientProxiedBy: dggems704-chm.china.huawei.com (10.3.19.181) To kwepemm600005.china.huawei.com (7.193.23.191) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.5 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2022/12/2 23:21, Jason Gunthorpe wrote: > On Fri, Dec 02, 2022 at 05:26:23PM +0800, Longfang Liu wrote: >> On the debugfs framework of VFIO, register the debug function >> for the live migration driver of the hisilicon accelerator device. >> >> On the basis of the original public debug function, a private debug >> function is added, so that the single-step debugging function >> during live migration can be realized. >> >> Signed-off-by: Longfang Liu >> --- >> .../vfio/pci/hisilicon/hisi_acc_vfio_pci.c | 250 ++++++++++++++++++ >> .../vfio/pci/hisilicon/hisi_acc_vfio_pci.h | 9 + >> drivers/vfio/pci/vfio_pci_debugfs.c | 10 +- >> 3 files changed, 268 insertions(+), 1 deletion(-) >> >> diff --git a/drivers/vfio/pci/hisilicon/hisi_acc_vfio_pci.c b/drivers/vfio/pci/hisilicon/hisi_acc_vfio_pci.c >> index eb18edffbd5f..0f35cde6e8ec 100644 >> --- a/drivers/vfio/pci/hisilicon/hisi_acc_vfio_pci.c >> +++ b/drivers/vfio/pci/hisilicon/hisi_acc_vfio_pci.c >> @@ -15,6 +15,7 @@ >> #include >> >> #include "hisi_acc_vfio_pci.h" >> +#include "../vfio_pci_debugfs.h" >> >> /* Return 0 on VM acc device ready, -ETIMEDOUT hardware timeout */ >> static int qm_wait_dev_not_ready(struct hisi_qm *qm) >> @@ -609,6 +610,18 @@ hisi_acc_check_int_state(struct hisi_acc_vf_core_device *hisi_acc_vdev) >> } >> } >> >> +static void hisi_acc_vf_migf_save(struct hisi_acc_vf_migration_file *src_migf, >> + struct hisi_acc_vf_migration_file *dst_migf) >> +{ >> + if (!dst_migf) >> + return; >> + >> + dst_migf->disabled = false; >> + dst_migf->total_length = src_migf->total_length; >> + memcpy(&dst_migf->vf_data, &src_migf->vf_data, >> + sizeof(struct acc_vf_data)); >> +} >> + >> static void hisi_acc_vf_disable_fd(struct hisi_acc_vf_migration_file *migf) >> { >> mutex_lock(&migf->lock); >> @@ -621,12 +634,16 @@ static void hisi_acc_vf_disable_fd(struct hisi_acc_vf_migration_file *migf) >> static void hisi_acc_vf_disable_fds(struct hisi_acc_vf_core_device *hisi_acc_vdev) >> { >> if (hisi_acc_vdev->resuming_migf) { >> + hisi_acc_vf_migf_save(hisi_acc_vdev->resuming_migf, >> + hisi_acc_vdev->debug_migf); >> hisi_acc_vf_disable_fd(hisi_acc_vdev->resuming_migf); >> fput(hisi_acc_vdev->resuming_migf->filp); >> hisi_acc_vdev->resuming_migf = NULL; >> } >> >> if (hisi_acc_vdev->saving_migf) { >> + hisi_acc_vf_migf_save(hisi_acc_vdev->saving_migf, >> + hisi_acc_vdev->debug_migf); >> hisi_acc_vf_disable_fd(hisi_acc_vdev->saving_migf); >> fput(hisi_acc_vdev->saving_migf->filp); >> hisi_acc_vdev->saving_migf = NULL; >> @@ -1188,6 +1205,231 @@ static long hisi_acc_vfio_pci_ioctl(struct vfio_device *core_vdev, unsigned int >> return vfio_pci_core_ioctl(core_vdev, cmd, arg); >> } >> >> +static int hisi_acc_vf_debug_io(struct vfio_device *vdev) >> +{ >> + struct hisi_acc_vf_core_device *hisi_acc_vdev = hisi_acc_get_vf_dev(vdev); >> + struct hisi_qm *vf_qm = &hisi_acc_vdev->vf_qm; >> + struct device *dev = vdev->dev; >> + u64 data; >> + int ret; >> + >> + data = readl(vf_qm->io_base + QM_MB_CMD_SEND_BASE); >> + dev_info(dev, "debug mailbox val: 0x%llx\n", data); >> + >> + ret = qm_wait_dev_not_ready(vf_qm); >> + if (ret) >> + dev_err(dev, "VF device not ready!\n"); > > debugfs has helpers for this, you should use debugfs_print_regs32() > Yes, it is now possible to use this public interface in debugfs to implement this read register function. Thanks, Longfang. >> +static int hisi_acc_vf_debug_resume(struct vfio_device *vdev) >> +{ >> + struct hisi_acc_vf_core_device *hisi_acc_vdev = hisi_acc_get_vf_dev(vdev); >> + struct hisi_acc_vf_migration_file *migf = hisi_acc_vdev->debug_migf; >> + struct device *dev = vdev->dev; >> + int ret; >> + >> + ret = vf_qm_state_save(hisi_acc_vdev, migf); >> + if (ret) { >> + dev_err(dev, "failed to save device data!\n"); >> + return -EINVAL; >> + } >> + >> + ret = vf_qm_check_match(hisi_acc_vdev, migf); >> + if (ret) { >> + dev_err(dev, "failed to match the VF!\n"); >> + return -EINVAL; >> + } >> + >> + ret = vf_qm_load_data(hisi_acc_vdev, migf); >> + if (ret) { >> + dev_err(dev, "failed to recover the VF!\n"); >> + return -EINVAL; >> + } >> + >> + vf_qm_fun_reset(&hisi_acc_vdev->vf_qm); >> + dev_info(dev, "successful to resume device data!\n"); >> + >> + return 0; >> +} > > This doesn't seem like it belongs in debugfs at all, please just write > a test progam using normal vfio ioctls to do these steps and put in > the kernel selftests directory. > >> +static int hisi_acc_vf_debug_save(struct vfio_device *vdev) >> +{ >> + struct hisi_acc_vf_core_device *hisi_acc_vdev = hisi_acc_get_vf_dev(vdev); >> + struct hisi_acc_vf_migration_file *migf = hisi_acc_vdev->debug_migf; >> + struct device *dev = vdev->dev; >> + int ret; >> + >> + ret = vf_qm_state_save(hisi_acc_vdev, migf); >> + if (ret) { >> + dev_err(dev, "failed to save device data!\n"); >> + return -EINVAL; >> + } >> + dev_info(dev, "successful to save device data!\n"); >> + >> + return 0; >> +} > > Ditto, I don't think debugfs should be accessing the device state > independently of the main FSM. > > Jason > . >