Received: by 2002:ab2:60d1:0:b0:1f7:5705:b850 with SMTP id i17csp1934594lqm; Fri, 3 May 2024 10:23:23 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCXj0jXFaONq1HhLtOuMbqP/kCtHftrqDMYxLaFI4Sy0T3ZJIjcbLkMgr4gefRU/OrvDQOSJ3ipjY6kuC+ZPcXFxOWqUhtaPHBjxswbBrA== X-Google-Smtp-Source: AGHT+IH0av/c976RGF/yQzydm+bNN33f7cCf24o6cOopfDM0MoZjw2QCQoMvax6vsaC2QUeg13hy X-Received: by 2002:a05:622a:5488:b0:43a:18ae:ea94 with SMTP id ep8-20020a05622a548800b0043a18aeea94mr3627506qtb.7.1714757003046; Fri, 03 May 2024 10:23:23 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1714757003; cv=pass; d=google.com; s=arc-20160816; b=kqNpRgQ92E5UFtbSvazlzgSIf1QUVGScaFWQfEM/0H7Rk0u+s0DBWBMyzNV31a70LV ltZJmhMb7l4nFXy5DyFEWJIABM6RS5hwX2mQdgxoDpnprrD5dpk57fJVUIn+RC4YIz05 IWuh4vihgaptDNTFTwKGl+wD9fGIbxbRoLrgka+ieFof1zR4CENmYdlyaNkQSEiU/SjI CRSyBDEW1zsXrMMEC/L5zCYkK6emwq1N+o9buRC7Vv9wBtJaHTgrmdsRcLRHvBYWDmD4 JIb42b40PPIw3gpF0CbmU1m1zkApfCtXaZivUkhfz2/RnNfk1MKD1axax7G3jkIpWZab Pjng== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:organization:references :in-reply-to:message-id:subject:cc:to:from:date:dkim-signature; bh=V3OrTUI28CNlZu9KmOJDYU9bB/HyQeSnOjtAeaHpXL4=; fh=Cz43ut31w7k0EwD44vs4Kq0yyOp785Rj5jBhhLWIB0I=; b=bQIWooOjKesgDpr6ElpCJXdwL9unuLds9m0fjJm7dbh8bmU8Lut9Pz/laBkw5ACaW0 cqqyaT/OO1XXfljRpXXBB8avAZAn4vwQXhL8yV6dNw8V7gK9rcvNvVdR22alPsvzqjsS ZzywQy0SyRBYpGrGdL7W70jF9h47ANTRU6/cmOhI5Vwqoc30tNZw+ahefUOlvsMyocXg cVlBjw4YBD3bBcqpqlIaicQjGWHr2VJomn9lijYdSmqpPNHFhO2EAF/4iYPv6QAZl2XL npLEPb6+5rJPZxiD4mjDQ6Qu9xZfkuL6J0xzG7TvPAvYYYHTGZPUzOKsYLxJaHHokzOS gQJQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=eIqVOkTT; arc=pass (i=1 spf=pass spfdomain=redhat.com dkim=pass dkdomain=redhat.com dmarc=pass fromdomain=redhat.com); spf=pass (google.com: domain of linux-kernel+bounces-167974-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-167974-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id d12-20020ac85d8c000000b0043784e9d69dsi3777251qtx.496.2024.05.03.10.23.22 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 03 May 2024 10:23:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-167974-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=eIqVOkTT; arc=pass (i=1 spf=pass spfdomain=redhat.com dkim=pass dkdomain=redhat.com dmarc=pass fromdomain=redhat.com); spf=pass (google.com: domain of linux-kernel+bounces-167974-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-167974-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 19C3E1C22F9A for ; Fri, 3 May 2024 17:23:21 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id CC674158208; Fri, 3 May 2024 17:21:30 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b="eIqVOkTT" Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 1BE72157E9D for ; Fri, 3 May 2024 17:21:26 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=170.10.129.124 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714756889; cv=none; b=a9/U5WfXSLa0OQxzTnZM8CbJ8n+XyDe0ekuSA7f8BBc1W1NXtgvxEVqGLRxqpwVIBKcbBnAQ8/NK417kr8WVbb15kBy1fY1fek8fIdeuzLCUoarz5KQ+XkWpD7pPJaV55AapmfD7oRgMzedu3Q/NpyhX+3Ech6Kpp9e/T1pbIWc= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714756889; c=relaxed/simple; bh=YmgCTy98MWBMo45+ZA0QcBZPnzevO17EjRl+kiTMpek=; h=Date:From:To:Cc:Subject:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=pFaGhZIJhaYY2eFwmcc6bgXnxpOW99Az6ENtgBROuM6R4FYGPE7tOyckHX79Q3uKP3g5dKozc8A0bSXWXTPEHubfCioqwHtMvGOkR1wxLM1WS5DHkVPKcR9VlB9pQq5PvZe2Ccai+6Z/PRv2RVbfZrAX7P4YLTw3TQ9wBT3q8Fk= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com; spf=pass smtp.mailfrom=redhat.com; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b=eIqVOkTT; arc=none smtp.client-ip=170.10.129.124 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=redhat.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1714756886; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=V3OrTUI28CNlZu9KmOJDYU9bB/HyQeSnOjtAeaHpXL4=; b=eIqVOkTTDzecR7HuDpuB+uzJQj0qaedJSk021aC0FQcT3RYzUpJIAA42wMF/4Dh0dX/AvN UEnpc2H8f3sdclnyu0wldGNsAdZ2laFmXHbbScfjShjSyFMSg0kxROSv4Z1pFFTAR8847h vkBtSlJWewur7zYswun1kDz6t6wM298= Received: from mail-io1-f70.google.com (mail-io1-f70.google.com [209.85.166.70]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-97-lDrfpk94NO-KiVvlHyQhsA-1; Fri, 03 May 2024 13:21:24 -0400 X-MC-Unique: lDrfpk94NO-KiVvlHyQhsA-1 Received: by mail-io1-f70.google.com with SMTP id ca18e2360f4ac-7dece1fa472so570496339f.0 for ; Fri, 03 May 2024 10:21:24 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1714756884; x=1715361684; h=content-transfer-encoding:mime-version:organization:references :in-reply-to:message-id:subject:cc:to:from:date:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=V3OrTUI28CNlZu9KmOJDYU9bB/HyQeSnOjtAeaHpXL4=; b=Hae6t6+uvkNpwlA8GhmAeoOruMe0jOB1Q709mMtWYRsU+sl1NRceprwjfiYCTdyEzZ mzlKnqhmAP9zZZ33ktJcQ/t9MOAaiQv8MCGeoRyioizqvu9Z5Vs7gKldviXxt28DsKXH X+dvosqqCXNHCsLuuAk8IBACXVR6IorSPeoiuy0pBG9YyBQMDUAgOi3imn2OKpDWqoCm xVEcSVryIxVM2jiQFt/+KVVmAjvw+dEo6uhJnMRKuPVkvSDt7/uvXbGMo0iDfNefUNwL ArjD0sPcapkoPMrPf2Q0TE6kpAK2ajWWFktj5rwsTytexpE2byuZSTIvp0m6aTbCF7JE x9Rg== X-Forwarded-Encrypted: i=1; AJvYcCVISvIMRsd8TYBRCnwLObLZh3l63nyBPuv27a61zD4sLe85lhhomPYgn3kmyhoCEbC4VqWUCV81bWfVSZ9bYBRmTPLQemuqRB/MuFqb X-Gm-Message-State: AOJu0Yxjp9/QlyRLXfHYKy/0t4IYfkpYn/zLdmooI34ClmQrnOgIfJNT FP8gKftA7aB2UNF5CFExzvoERDkJpJlmGDu9HCj6w42OEAP52UEy0gwcIjWr/1B6o4HejD4sCVJ /SlVGDvdxWP1YBjBBdWMaaf9SA0Q0rmIcqxme33h6CRUxMu/EOspgXgKkw8jsrA== X-Received: by 2002:a05:6602:2dc9:b0:7de:e432:fd27 with SMTP id l9-20020a0566022dc900b007dee432fd27mr3677499iow.13.1714756883642; Fri, 03 May 2024 10:21:23 -0700 (PDT) X-Received: by 2002:a05:6602:2dc9:b0:7de:e432:fd27 with SMTP id l9-20020a0566022dc900b007dee432fd27mr3677447iow.13.1714756883060; Fri, 03 May 2024 10:21:23 -0700 (PDT) Received: from redhat.com ([38.15.36.11]) by smtp.gmail.com with ESMTPSA id z2-20020a056638318200b0048764f010c0sm896839jak.46.2024.05.03.10.21.22 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 03 May 2024 10:21:22 -0700 (PDT) Date: Fri, 3 May 2024 11:21:20 -0600 From: Alex Williamson To: Longfang Liu Cc: , , , , , Subject: Re: [PATCH v6 4/5] hisi_acc_vfio_pci: register debugfs for hisilicon migration driver Message-ID: <20240503112120.3740da24.alex.williamson@redhat.com> In-Reply-To: <20240425132322.12041-5-liulongfang@huawei.com> References: <20240425132322.12041-1-liulongfang@huawei.com> <20240425132322.12041-5-liulongfang@huawei.com> Organization: Red Hat Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit On Thu, 25 Apr 2024 21:23:21 +0800 Longfang Liu wrote: > On the debugfs framework of VFIO, if the CONFIG_VFIO_DEBUGFS macro is > enabled, the debug function is registered for the live migration driver > of the HiSilicon accelerator device. > > After registering the HiSilicon accelerator device on the debugfs > framework of live migration of vfio, a directory file "hisi_acc" > of debugfs is created, and then three debug function files are > created in this directory: > > vfio > | > +--- > | +---migration > | +--state > | +--hisi_acc > | +--dev_data > | +--migf_data > | +--cmd_state > | > +--- > +---migration > +--state > +--hisi_acc > +--dev_data > +--migf_data > +--cmd_state > > dev_data file: read device data that needs to be migrated from the > current device in real time > migf_data file: read the migration data of the last live migration > from the current driver. > cmd_state: used to get the cmd channel state for the device. > > +----------------+ +--------------+ +---------------+ > | migration dev | | src dev | | dst dev | > +-------+--------+ +------+-------+ +-------+-------+ > | | | > | +------v-------+ +-------v-------+ > | | saving_mif | | resuming_migf | > read | | file | | file | > | +------+-------+ +-------+-------+ > | | copy | > | +------------+----------+ > | | > +-------v---------+ +-------v--------+ > | data buffer | | debug_migf | > +-------+---------+ +-------+--------+ > | | > cat | cat | > +-------v--------+ +-------v--------+ > | dev_data | | migf_data | > +----------------+ +----------------+ > > When accessing debugfs, user can obtain the real-time status data > of the device through the "dev_data" file. It will directly read > the device status data and will not affect the live migration > function. Its data is stored in the allocated memory buffer, > and the memory is released after data returning to user mode. > > To obtain the data of the last complete migration, user need to > obtain it through the "migf_data" file. Since the live migration > data only exists during the migration process, it is destroyed > after the migration is completed. > In order to save this data, a debug_migf file is created in the > driver. At the end of the live migration process, copy the data > to debug_migf. > > Signed-off-by: Longfang Liu > --- > .../vfio/pci/hisilicon/hisi_acc_vfio_pci.c | 225 ++++++++++++++++++ > .../vfio/pci/hisilicon/hisi_acc_vfio_pci.h | 7 + > 2 files changed, 232 insertions(+) > > diff --git a/drivers/vfio/pci/hisilicon/hisi_acc_vfio_pci.c b/drivers/vfio/pci/hisilicon/hisi_acc_vfio_pci.c > index bf358ba94b5d..656b3d975940 100644 > --- a/drivers/vfio/pci/hisilicon/hisi_acc_vfio_pci.c > +++ b/drivers/vfio/pci/hisilicon/hisi_acc_vfio_pci.c > @@ -627,15 +627,33 @@ static void hisi_acc_vf_disable_fd(struct hisi_acc_vf_migration_file *migf) > mutex_unlock(&migf->lock); > } > > +static void hisi_acc_debug_migf_copy(struct hisi_acc_vf_core_device *hisi_acc_vdev, > + struct hisi_acc_vf_migration_file *src_migf) > +{ > + struct hisi_acc_vf_migration_file *dst_migf = hisi_acc_vdev->debug_migf; > + > + if (!dst_migf) > + return; > + > + mutex_lock(&hisi_acc_vdev->enable_mutex); > + dst_migf->disabled = src_migf->disabled; > + dst_migf->total_length = src_migf->total_length; > + memcpy(&dst_migf->vf_data, &src_migf->vf_data, > + sizeof(struct acc_vf_data)); > + mutex_unlock(&hisi_acc_vdev->enable_mutex); > +} > + > static void hisi_acc_vf_disable_fds(struct hisi_acc_vf_core_device *hisi_acc_vdev) > { > if (hisi_acc_vdev->resuming_migf) { > + hisi_acc_debug_migf_copy(hisi_acc_vdev, hisi_acc_vdev->resuming_migf); > hisi_acc_vf_disable_fd(hisi_acc_vdev->resuming_migf); > fput(hisi_acc_vdev->resuming_migf->filp); > hisi_acc_vdev->resuming_migf = NULL; > } > > if (hisi_acc_vdev->saving_migf) { > + hisi_acc_debug_migf_copy(hisi_acc_vdev, hisi_acc_vdev->saving_migf); > hisi_acc_vf_disable_fd(hisi_acc_vdev->saving_migf); > fput(hisi_acc_vdev->saving_migf->filp); > hisi_acc_vdev->saving_migf = NULL; > @@ -1144,6 +1162,7 @@ static int hisi_acc_vf_qm_init(struct hisi_acc_vf_core_device *hisi_acc_vdev) > if (!vf_qm->io_base) > return -EIO; > > + mutex_init(&hisi_acc_vdev->enable_mutex); > vf_qm->fun_type = QM_HW_VF; > vf_qm->pdev = vf_dev; > mutex_init(&vf_qm->mailbox_lock); > @@ -1294,6 +1313,203 @@ static long hisi_acc_vfio_pci_ioctl(struct vfio_device *core_vdev, unsigned int > return vfio_pci_core_ioctl(core_vdev, cmd, arg); > } > > +static int hisi_acc_vf_debug_check(struct seq_file *seq, struct vfio_device *vdev) > +{ > + struct hisi_acc_vf_core_device *hisi_acc_vdev = hisi_acc_get_vf_dev(vdev); > + struct hisi_qm *vf_qm = &hisi_acc_vdev->vf_qm; > + struct device *dev = vdev->dev; > + int ret; > + > + if (!vdev->mig_ops) { > + dev_err(dev, "device does not support live migration!\n"); Sorry, every error path should not spam dmesg with dev_err(). I'm going to wait until your co-maintainer approves this before looking at any further iterations of this series. Thanks, Alex > + return -EINVAL; > + } > + > + /** > + * When the device is not opened, the io_base is not mapped. > + * The driver cannot perform device read and write operations. > + */ > + if (!hisi_acc_vdev->dev_opened) { > + dev_err(dev, "device not opened!\n"); > + return -EINVAL; > + } > + > + ret = qm_wait_dev_not_ready(vf_qm); > + if (ret) { > + dev_err(dev, "VF device not ready!\n"); > + return -EBUSY; > + } > + > + return 0; > +} > + > +static int hisi_acc_vf_debug_cmd(struct seq_file *seq, void *data) > +{ > + struct device *vf_dev = seq->private; > + struct vfio_pci_core_device *core_device = dev_get_drvdata(vf_dev); > + struct vfio_device *vdev = &core_device->vdev; > + struct hisi_acc_vf_core_device *hisi_acc_vdev = hisi_acc_get_vf_dev(vdev); > + struct hisi_qm *vf_qm = &hisi_acc_vdev->vf_qm; > + u64 value; > + int ret; > + > + mutex_lock(&hisi_acc_vdev->enable_mutex); > + ret = hisi_acc_vf_debug_check(seq, vdev); > + if (ret) { > + mutex_unlock(&hisi_acc_vdev->enable_mutex); > + return ret; > + } > + > + value = readl(vf_qm->io_base + QM_MB_CMD_SEND_BASE); > + if (value == QM_MB_CMD_NOT_READY) { > + mutex_unlock(&hisi_acc_vdev->enable_mutex); > + dev_err(vf_dev, "mailbox cmd channel not ready!\n"); > + return -EINVAL; > + } > + mutex_unlock(&hisi_acc_vdev->enable_mutex); > + dev_err(vf_dev, "mailbox cmd channel state is OK!\n"); > + > + return 0; > +} > + > +static int hisi_acc_vf_dev_read(struct seq_file *seq, void *data) > +{ > + struct device *vf_dev = seq->private; > + struct vfio_pci_core_device *core_device = dev_get_drvdata(vf_dev); > + struct vfio_device *vdev = &core_device->vdev; > + struct hisi_acc_vf_core_device *hisi_acc_vdev = hisi_acc_get_vf_dev(vdev); > + size_t vf_data_sz = offsetofend(struct acc_vf_data, padding); > + struct hisi_acc_vf_migration_file *migf = NULL; > + int ret; > + > + migf = kzalloc(sizeof(struct hisi_acc_vf_migration_file), GFP_KERNEL); > + if (!migf) > + return -ENOMEM; > + > + mutex_lock(&hisi_acc_vdev->enable_mutex); > + ret = hisi_acc_vf_debug_check(seq, vdev); > + if (ret) { > + mutex_unlock(&hisi_acc_vdev->enable_mutex); > + goto migf_err; > + } > + > + migf->vf_data.vf_qm_state = hisi_acc_vdev->vf_qm_state; > + ret = vf_qm_read_data(&hisi_acc_vdev->vf_qm, &migf->vf_data); > + if (ret) { > + mutex_unlock(&hisi_acc_vdev->enable_mutex); > + dev_err(vf_dev, "failed to read device data!\n"); > + goto migf_err; > + } > + mutex_unlock(&hisi_acc_vdev->enable_mutex); > + > + if (hisi_acc_vdev->resuming_migf) > + migf->disabled = hisi_acc_vdev->resuming_migf->disabled; > + else if (hisi_acc_vdev->saving_migf) > + migf->disabled = hisi_acc_vdev->saving_migf->disabled; > + else > + migf->disabled = true; > + migf->total_length = sizeof(struct acc_vf_data); > + > + seq_hex_dump(seq, "Dev Data:", DUMP_PREFIX_OFFSET, 16, 1, > + (unsigned char *)&migf->vf_data, > + vf_data_sz, false); > + > + seq_printf(seq, > + "acc device:\n" > + "device ready: %u\n" > + "device opened: %d\n" > + "data valid: %d\n" > + "data size: %lu\n", > + hisi_acc_vdev->vf_qm_state, > + hisi_acc_vdev->dev_opened, > + migf->disabled, > + migf->total_length); > + > +migf_err: > + kfree(migf); > + > + return ret; > +} > + > +static int hisi_acc_vf_migf_read(struct seq_file *seq, void *data) > +{ > + struct device *vf_dev = seq->private; > + struct vfio_pci_core_device *core_device = dev_get_drvdata(vf_dev); > + struct vfio_device *vdev = &core_device->vdev; > + struct hisi_acc_vf_core_device *hisi_acc_vdev = hisi_acc_get_vf_dev(vdev); > + size_t vf_data_sz = offsetofend(struct acc_vf_data, padding); > + struct hisi_acc_vf_migration_file *debug_migf = hisi_acc_vdev->debug_migf; > + > + /* Check whether the live migration operation has been performed */ > + if (debug_migf->total_length < vf_data_sz) { > + dev_err(vf_dev, "device not migrated!\n"); > + return -EAGAIN; > + } > + > + seq_hex_dump(seq, "Mig Data:", DUMP_PREFIX_OFFSET, 16, 1, > + (unsigned char *)&debug_migf->vf_data, > + vf_data_sz, false); > + > + seq_printf(seq, > + "acc device:\n" > + "device ready: %u\n" > + "device opened: %d\n" > + "data valid: %d\n" > + "data size: %lu\n", > + hisi_acc_vdev->vf_qm_state, > + hisi_acc_vdev->dev_opened, > + debug_migf->disabled, > + debug_migf->total_length); > + > + return 0; > +} > + > +static int hisi_acc_vfio_debug_init(struct hisi_acc_vf_core_device *hisi_acc_vdev) > +{ > + struct vfio_device *vdev = &hisi_acc_vdev->core_device.vdev; > + struct dentry *vfio_dev_migration = NULL; > + struct dentry *vfio_hisi_acc = NULL; > + struct device *dev = vdev->dev; > + void *migf = NULL; > + > + if (!debugfs_initialized() || > + !IS_ENABLED(CONFIG_VFIO_DEBUGFS)) > + return 0; > + > + migf = kzalloc(sizeof(struct hisi_acc_vf_migration_file), GFP_KERNEL); > + if (!migf) > + return -ENOMEM; > + hisi_acc_vdev->debug_migf = migf; > + > + vfio_dev_migration = debugfs_lookup("migration", vdev->debug_root); > + if (!vfio_dev_migration) { > + kfree(migf); > + hisi_acc_vdev->debug_migf = NULL; > + dev_err(dev, "failed to lookup migration debugfs file!\n"); > + return -ENODEV; > + } > + > + vfio_hisi_acc = debugfs_create_dir("hisi_acc", vfio_dev_migration); > + debugfs_create_devm_seqfile(dev, "dev_data", vfio_hisi_acc, > + hisi_acc_vf_dev_read); > + debugfs_create_devm_seqfile(dev, "migf_data", vfio_hisi_acc, > + hisi_acc_vf_migf_read); > + debugfs_create_devm_seqfile(dev, "cmd_state", vfio_hisi_acc, > + hisi_acc_vf_debug_cmd); > + > + return 0; > +} > + > +static void hisi_acc_vf_debugfs_exit(struct hisi_acc_vf_core_device *hisi_acc_vdev) > +{ > + if (!debugfs_initialized() || > + !IS_ENABLED(CONFIG_VFIO_DEBUGFS)) > + return; > + > + if (hisi_acc_vdev->debug_migf) > + kfree(hisi_acc_vdev->debug_migf); > +} > + > static int hisi_acc_vfio_pci_open_device(struct vfio_device *core_vdev) > { > struct hisi_acc_vf_core_device *hisi_acc_vdev = hisi_acc_get_vf_dev(core_vdev); > @@ -1311,9 +1527,11 @@ static int hisi_acc_vfio_pci_open_device(struct vfio_device *core_vdev) > return ret; > } > hisi_acc_vdev->mig_state = VFIO_DEVICE_STATE_RUNNING; > + hisi_acc_vdev->dev_opened = true; > } > > vfio_pci_core_finish_enable(vdev); > + > return 0; > } > > @@ -1322,7 +1540,10 @@ static void hisi_acc_vfio_pci_close_device(struct vfio_device *core_vdev) > struct hisi_acc_vf_core_device *hisi_acc_vdev = hisi_acc_get_vf_dev(core_vdev); > struct hisi_qm *vf_qm = &hisi_acc_vdev->vf_qm; > > + hisi_acc_vdev->dev_opened = false; > + mutex_lock(&hisi_acc_vdev->enable_mutex); > iounmap(vf_qm->io_base); > + mutex_unlock(&hisi_acc_vdev->enable_mutex); > vfio_pci_core_close_device(core_vdev); > } > > @@ -1413,6 +1634,9 @@ static int hisi_acc_vfio_pci_probe(struct pci_dev *pdev, const struct pci_device > ret = vfio_pci_core_register_device(&hisi_acc_vdev->core_device); > if (ret) > goto out_put_vdev; > + > + if (ops == &hisi_acc_vfio_pci_migrn_ops) > + hisi_acc_vfio_debug_init(hisi_acc_vdev); > return 0; > > out_put_vdev: > @@ -1425,6 +1649,7 @@ static void hisi_acc_vfio_pci_remove(struct pci_dev *pdev) > struct hisi_acc_vf_core_device *hisi_acc_vdev = hisi_acc_drvdata(pdev); > > vfio_pci_core_unregister_device(&hisi_acc_vdev->core_device); > + hisi_acc_vf_debugfs_exit(hisi_acc_vdev); > vfio_put_device(&hisi_acc_vdev->core_device.vdev); > } > > diff --git a/drivers/vfio/pci/hisilicon/hisi_acc_vfio_pci.h b/drivers/vfio/pci/hisilicon/hisi_acc_vfio_pci.h > index f887ab98581c..93ee8bef32a1 100644 > --- a/drivers/vfio/pci/hisilicon/hisi_acc_vfio_pci.h > +++ b/drivers/vfio/pci/hisilicon/hisi_acc_vfio_pci.h > @@ -32,6 +32,7 @@ > #define QM_SQC_VFT_BASE_MASK_V2 GENMASK(15, 0) > #define QM_SQC_VFT_NUM_SHIFT_V2 45 > #define QM_SQC_VFT_NUM_MASK_V2 GENMASK(9, 0) > +#define QM_MB_CMD_NOT_READY 0xffffffff > > /* RW regs */ > #define QM_REGS_MAX_LEN 7 > @@ -114,5 +115,11 @@ struct hisi_acc_vf_core_device { > int vf_id; > struct hisi_acc_vf_migration_file *resuming_migf; > struct hisi_acc_vf_migration_file *saving_migf; > + > + /* To make sure the device is enabled */ > + struct mutex enable_mutex; > + bool dev_opened; > + /* To save migration data */ > + struct hisi_acc_vf_migration_file *debug_migf; > }; > #endif /* HISI_ACC_VFIO_PCI_H */