Message ID | 20231013090441.36417-2-liulongfang@huawei.com |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:612c:2908:b0:403:3b70:6f57 with SMTP id ib8csp1756199vqb; Fri, 13 Oct 2023 02:08:12 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHG4P2Pe4FNM2O5W5+inhD6hM5rEj9clXSy2+QtT31SpU+45yLadTd/e02WsvKMO2mJSMUz X-Received: by 2002:a05:6870:17a4:b0:1b3:8cfd:fecf with SMTP id r36-20020a05687017a400b001b38cfdfecfmr29499071oae.0.1697188092650; Fri, 13 Oct 2023 02:08:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1697188092; cv=none; d=google.com; s=arc-20160816; b=lTGOvEJOk4LXkqj1q5Jok++zkQ0BoAoQb2lzi5Qpz1bLUuUZcr2ssNR99L92WoUAIX VAudBq2TRPifri81fAPN3Pr6LEWFqhESZUAUAUeB5mFHqVKL7e/Hx3gqq9N7a1a3BZs4 HYCPvf+fyDy7H3R1gJFS3lW0WNMfM53AJG/q1HbZWnMiyn4WzrM2/jEGOQGPeV75orPs b4BKOlw2fKDwICmN8mAe3swDV/zfGrhwvvQz7xuvtYrQcVF4680UAcZlePEF/gW2pwQt Vxm0pUPtI7UBH6bbjKXjgmNFikDi49V/zZgTov2+28K2Tz8iFyWe4wmIL90gTbwSteC1 ByTw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=277+CV/r5937SZiDIZ95yposUcG+/kLJAeRflJ7bug4=; fh=6RjYAQ34uDeYKm0rLOoNcFiQikSk6+SaiM0Axnq7aoY=; b=Va9Tydzux/F2Vu4i/fAaGwnv1fQYK/L+H1lH2Y2gFqNKDKJ/nJHw0gJqQbOPQ/wudc 3igiUtNyniQoXtZ3dUjw1kxB83rP61McdPyqEz+g77jsJrU5Dk5GQGyD+He0JXb/goZP D9b4W2HtCMyEcffK6auKrqVh/7sLpq1IgUUVj2KVD3IkiecjnfD3tnVFcxEK9et2xNKH nn9Z2xyJqOL4d1dUGb4xcEI0feclAuSZFZhecyopZFxB93HcRjsCTIs4wDr2Zb9W2J7y lLmri5C9ce5v+zVrlM6n3ALkuWBxcqvHKHKHXDWa5tBI/LsZBpW9ixX+EOoZVqMJeurL ZrDQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: from snail.vger.email (snail.vger.email. [2620:137:e000::3:7]) by mx.google.com with ESMTPS id f10-20020a63dc4a000000b0057458518e20si1811000pgj.164.2023.10.13.02.08.12 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 13 Oct 2023 02:08:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) client-ip=2620:137:e000::3:7; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id E05DE82F348F; Fri, 13 Oct 2023 02:08:11 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230392AbjJMJII (ORCPT <rfc822;rua109.linux@gmail.com> + 19 others); Fri, 13 Oct 2023 05:08:08 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49102 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230374AbjJMJIH (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Fri, 13 Oct 2023 05:08:07 -0400 Received: from szxga02-in.huawei.com (szxga02-in.huawei.com [45.249.212.188]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 87833BE; Fri, 13 Oct 2023 02:08:05 -0700 (PDT) Received: from kwepemm000005.china.huawei.com (unknown [172.30.72.53]) by szxga02-in.huawei.com (SkyGuard) with ESMTP id 4S6LCn73bhzLqcp; Fri, 13 Oct 2023 17:04:05 +0800 (CST) Received: from huawei.com (10.50.163.32) by kwepemm000005.china.huawei.com (7.193.23.27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.31; Fri, 13 Oct 2023 17:08:02 +0800 From: Longfang Liu <liulongfang@huawei.com> To: <alex.williamson@redhat.com>, <jgg@nvidia.com>, <shameerali.kolothum.thodi@huawei.com>, <jonathan.cameron@huawei.com> CC: <bcreeley@amd.com>, <kvm@vger.kernel.org>, <linux-kernel@vger.kernel.org>, <linuxarm@openeuler.org>, <liulongfang@huawei.com> Subject: [PATCH v17 1/2] vfio/migration: Add debugfs to live migration driver Date: Fri, 13 Oct 2023 17:04:40 +0800 Message-ID: <20231013090441.36417-2-liulongfang@huawei.com> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20231013090441.36417-1-liulongfang@huawei.com> References: <20231013090441.36417-1-liulongfang@huawei.com> MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [10.50.163.32] X-ClientProxiedBy: dggems705-chm.china.huawei.com (10.3.19.182) To kwepemm000005.china.huawei.com (7.193.23.27) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00, RCVD_IN_DNSWL_BLOCKED,RCVD_IN_MSPIKE_H5,RCVD_IN_MSPIKE_WL, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Fri, 13 Oct 2023 02:08:11 -0700 (PDT) X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1779630701231035385 X-GMAIL-MSGID: 1779630701231035385 |
Series |
add debugfs to migration driver
|
|
Commit Message
liulongfang
Oct. 13, 2023, 9:04 a.m. UTC
There are multiple devices, software and operational steps involved
in the process of live migration. An error occurred on any node may
cause the live migration operation to fail.
This complex process makes it very difficult to locate and analyze
the cause when the function fails.
In order to quickly locate the cause of the problem when the
live migration fails, I added a set of debugfs to the vfio
live migration driver.
+-------------------------------------------+
| |
| |
| QEMU |
| |
| |
+---+----------------------------+----------+
| ^ | ^
| | | |
| | | |
v | v |
+---------+--+ +---------+--+
|src vfio_dev| |dst vfio_dev|
+--+---------+ +--+---------+
| ^ | ^
| | | |
v | | |
+-----------+----+ +-----------+----+
|src dev debugfs | |dst dev debugfs |
+----------------+ +----------------+
The entire debugfs directory will be based on the definition of
the CONFIG_DEBUG_FS macro. If this macro is not enabled, the
interfaces in vfio.h will be empty definitions, and the creation
and initialization of the debugfs directory will not be executed.
vfio
|
+---<dev_name1>
| +---migration
| +--state
|
+---<dev_name2>
+---migration
+--state
debugfs will create a public root directory "vfio" file.
then create a dev_name() file for each live migration device.
First, create a unified state acquisition file of "migration"
in this device directory.
Then, create a public live migration state lookup file "state".
Signed-off-by: Longfang Liu <liulongfang@huawei.com>
---
drivers/vfio/Kconfig | 10 +++++
drivers/vfio/Makefile | 1 +
drivers/vfio/debugfs.c | 90 +++++++++++++++++++++++++++++++++++++++
drivers/vfio/vfio.h | 14 ++++++
drivers/vfio/vfio_main.c | 14 +++++-
include/linux/vfio.h | 7 +++
include/uapi/linux/vfio.h | 1 +
7 files changed, 135 insertions(+), 2 deletions(-)
create mode 100644 drivers/vfio/debugfs.c
Comments
Hello Longfang, On 10/13/23 11:04, Longfang Liu wrote: > There are multiple devices, software and operational steps involved > in the process of live migration. An error occurred on any node may > cause the live migration operation to fail. > This complex process makes it very difficult to locate and analyze > the cause when the function fails. > > In order to quickly locate the cause of the problem when the > live migration fails, I added a set of debugfs to the vfio > live migration driver. > > +-------------------------------------------+ > | | > | | > | QEMU | > | | > | | > +---+----------------------------+----------+ > | ^ | ^ > | | | | > | | | | > v | v | > +---------+--+ +---------+--+ > |src vfio_dev| |dst vfio_dev| > +--+---------+ +--+---------+ > | ^ | ^ > | | | | > v | | | > +-----------+----+ +-----------+----+ > |src dev debugfs | |dst dev debugfs | > +----------------+ +----------------+ > > The entire debugfs directory will be based on the definition of > the CONFIG_DEBUG_FS macro. If this macro is not enabled, the > interfaces in vfio.h will be empty definitions, and the creation > and initialization of the debugfs directory will not be executed. > > vfio > | > +---<dev_name1> > | +---migration > | +--state > | > +---<dev_name2> > +---migration > +--state > > debugfs will create a public root directory "vfio" file. > then create a dev_name() file for each live migration device. > First, create a unified state acquisition file of "migration" > in this device directory. > Then, create a public live migration state lookup file "state". > > Signed-off-by: Longfang Liu <liulongfang@huawei.com> > --- > drivers/vfio/Kconfig | 10 +++++ > drivers/vfio/Makefile | 1 + > drivers/vfio/debugfs.c | 90 +++++++++++++++++++++++++++++++++++++++ > drivers/vfio/vfio.h | 14 ++++++ > drivers/vfio/vfio_main.c | 14 +++++- > include/linux/vfio.h | 7 +++ > include/uapi/linux/vfio.h | 1 + > 7 files changed, 135 insertions(+), 2 deletions(-) > create mode 100644 drivers/vfio/debugfs.c > > diff --git a/drivers/vfio/Kconfig b/drivers/vfio/Kconfig > index 6bda6dbb4878..ceae52fd7586 100644 > --- a/drivers/vfio/Kconfig > +++ b/drivers/vfio/Kconfig > @@ -80,6 +80,16 @@ config VFIO_VIRQFD > select EVENTFD > default n > > +config VFIO_DEBUGFS > + bool "Export VFIO internals in DebugFS" > + depends on DEBUG_FS > + help > + Allows exposure of VFIO device internals. This option enables > + the use of debugfs by VFIO drivers as required. The device can > + cause the VFIO code create a top-level debug/vfio directory > + during initialization, and then populate a subdirectory with > + entries as required. > + > source "drivers/vfio/pci/Kconfig" > source "drivers/vfio/platform/Kconfig" > source "drivers/vfio/mdev/Kconfig" > diff --git a/drivers/vfio/Makefile b/drivers/vfio/Makefile > index c82ea032d352..d43a699d55b1 100644 > --- a/drivers/vfio/Makefile > +++ b/drivers/vfio/Makefile > @@ -8,6 +8,7 @@ vfio-$(CONFIG_VFIO_GROUP) += group.o > vfio-$(CONFIG_IOMMUFD) += iommufd.o > vfio-$(CONFIG_VFIO_CONTAINER) += container.o > vfio-$(CONFIG_VFIO_VIRQFD) += virqfd.o > +vfio-$(CONFIG_VFIO_DEBUGFS) += debugfs.o > > obj-$(CONFIG_VFIO_IOMMU_TYPE1) += vfio_iommu_type1.o > obj-$(CONFIG_VFIO_IOMMU_SPAPR_TCE) += vfio_iommu_spapr_tce.o > diff --git a/drivers/vfio/debugfs.c b/drivers/vfio/debugfs.c > new file mode 100644 > index 000000000000..ae53d6110f47 > --- /dev/null > +++ b/drivers/vfio/debugfs.c > @@ -0,0 +1,90 @@ > +// SPDX-License-Identifier: GPL-2.0-only > +/* > + * Copyright (c) 2023, HiSilicon Ltd. > + */ > + > +#include <linux/device.h> > +#include <linux/debugfs.h> > +#include <linux/seq_file.h> > +#include <linux/vfio.h> > +#include "vfio.h" > + > +static struct dentry *vfio_debugfs_root; > + > +static int vfio_device_state_read(struct seq_file *seq, void *data) > +{ > + struct device *vf_dev = seq->private; > + struct vfio_device *vdev = container_of(vf_dev, struct vfio_device, device); > + enum vfio_device_mig_state state; > + int ret; > + > + BUILD_BUG_ON(VFIO_DEVICE_STATE_NR != > + VFIO_DEVICE_STATE_PRE_COPY_P2P + 1); > + > + ret = vdev->mig_ops->migration_get_state(vdev, &state); > + if (ret) > + return -EINVAL; > + > + switch (state) { > + case VFIO_DEVICE_STATE_ERROR: > + seq_printf(seq, "%s\n", "ERROR"); > + break; > + case VFIO_DEVICE_STATE_STOP: > + seq_printf(seq, "%s\n", "STOP"); > + break; > + case VFIO_DEVICE_STATE_RUNNING: > + seq_printf(seq, "%s\n", "RUNNING"); > + break; > + case VFIO_DEVICE_STATE_STOP_COPY: > + seq_printf(seq, "%s\n", "STOP_COPY"); > + break; > + case VFIO_DEVICE_STATE_RESUMING: > + seq_printf(seq, "%s\n", "RESUMING"); > + break; > + case VFIO_DEVICE_STATE_RUNNING_P2P: > + seq_printf(seq, "%s\n", "RUNNING_P2P"); > + break; > + case VFIO_DEVICE_STATE_PRE_COPY: > + seq_printf(seq, "%s\n", "PRE_COPY"); > + break; > + case VFIO_DEVICE_STATE_PRE_COPY_P2P: > + seq_printf(seq, "%s\n", "PRE_COPY_P2P"); > + break; > + default: > + seq_printf(seq, "%s\n", "Invalid"); seq_puts() is more appropriate than seq_printf() above. I would suggest to add an array or some helper, that the VFIO drivers could use to debug the migration flow with pr_* primitives. It can be done later. > + } > + > + return 0; > +} > + > +void vfio_device_debugfs_init(struct vfio_device *vdev) > +{ > + struct device *dev = &vdev->device; > + > + vdev->debug_root = debugfs_create_dir(dev_name(vdev->dev), vfio_debugfs_root); > + > + if (vdev->mig_ops) { > + struct dentry *vfio_dev_migration = NULL; mig_dir maybe ? It would be easier to understand the nature of the variable IMHO. > + > + vfio_dev_migration = debugfs_create_dir("migration", vdev->debug_root); > + debugfs_create_devm_seqfile(dev, "state", vfio_dev_migration, > + vfio_device_state_read); > + } > +} > + > +void vfio_device_debugfs_exit(struct vfio_device *vdev) > +{ > + debugfs_remove_recursive(vdev->debug_root); > +} > + > +void vfio_debugfs_create_root(void) > +{ > + vfio_debugfs_root = debugfs_create_dir("vfio", NULL); > +} > + > +void vfio_debugfs_remove_root(void) > +{ > + debugfs_remove_recursive(vfio_debugfs_root); > + vfio_debugfs_root = NULL; > +} > + > diff --git a/drivers/vfio/vfio.h b/drivers/vfio/vfio.h > index 307e3f29b527..bde84ad344e5 100644 > --- a/drivers/vfio/vfio.h > +++ b/drivers/vfio/vfio.h > @@ -448,4 +448,18 @@ static inline void vfio_device_put_kvm(struct vfio_device *device) > } > #endif > > +#ifdef CONFIG_VFIO_DEBUGFS > +void vfio_debugfs_create_root(void); > +void vfio_debugfs_remove_root(void); > + > +void vfio_device_debugfs_init(struct vfio_device *vdev); > +void vfio_device_debugfs_exit(struct vfio_device *vdev); > +#else > +static inline void vfio_debugfs_create_root(void) { } > +static inline void vfio_debugfs_remove_root(void) { } > + > +static inline void vfio_device_debugfs_init(struct vfio_device *vdev) { } > +static inline void vfio_device_debugfs_exit(struct vfio_device *vdev) { } > +#endif /* CONFIG_VFIO_DEBUGFS */ > + > #endif > diff --git a/drivers/vfio/vfio_main.c b/drivers/vfio/vfio_main.c > index e31e1952d7b8..9aec4c22f051 100644 > --- a/drivers/vfio/vfio_main.c > +++ b/drivers/vfio/vfio_main.c > @@ -309,7 +309,6 @@ static int __vfio_register_dev(struct vfio_device *device, > > /* Refcounting can't start until the driver calls register */ > refcount_set(&device->refcount, 1); > - superfluous change. > vfio_device_group_register(device); > > return 0; > @@ -320,7 +319,15 @@ static int __vfio_register_dev(struct vfio_device *device, > > int vfio_register_group_dev(struct vfio_device *device) > { > - return __vfio_register_dev(device, VFIO_IOMMU); > + int ret; > + > + ret = __vfio_register_dev(device, VFIO_IOMMU); > + if (ret) > + return ret; > + > + vfio_device_debugfs_init(device); Can it be called from __vfio_register_dev() instead ? and mdev devices would get debugfs support also. Thanks, C. > + > + return 0; > } > EXPORT_SYMBOL_GPL(vfio_register_group_dev); > > @@ -378,6 +385,7 @@ void vfio_unregister_group_dev(struct vfio_device *device) > } > } > > + vfio_device_debugfs_exit(device); > /* Balances vfio_device_set_group in register path */ > vfio_device_remove_group(device); > } > @@ -1676,6 +1684,7 @@ static int __init vfio_init(void) > if (ret) > goto err_alloc_dev_chrdev; > > + vfio_debugfs_create_root(); > pr_info(DRIVER_DESC " version: " DRIVER_VERSION "\n"); > return 0; > > @@ -1691,6 +1700,7 @@ static int __init vfio_init(void) > > static void __exit vfio_cleanup(void) > { > + vfio_debugfs_remove_root(); > ida_destroy(&vfio.device_ida); > vfio_cdev_cleanup(); > class_destroy(vfio.device_class); > diff --git a/include/linux/vfio.h b/include/linux/vfio.h > index 454e9295970c..769d7af86225 100644 > --- a/include/linux/vfio.h > +++ b/include/linux/vfio.h > @@ -69,6 +69,13 @@ struct vfio_device { > u8 iommufd_attached:1; > #endif > u8 cdev_opened:1; > +#ifdef CONFIG_DEBUG_FS > + /* > + * debug_root is a static property of the vfio_device > + * which must be set prior to registering the vfio_device. > + */ > + struct dentry *debug_root; > +#endif > }; > > /** > diff --git a/include/uapi/linux/vfio.h b/include/uapi/linux/vfio.h > index 7f5fb010226d..2b68e6cdf190 100644 > --- a/include/uapi/linux/vfio.h > +++ b/include/uapi/linux/vfio.h > @@ -1219,6 +1219,7 @@ enum vfio_device_mig_state { > VFIO_DEVICE_STATE_RUNNING_P2P = 5, > VFIO_DEVICE_STATE_PRE_COPY = 6, > VFIO_DEVICE_STATE_PRE_COPY_P2P = 7, > + VFIO_DEVICE_STATE_NR, > }; > > /**
On 2023/10/16 23:17, Cédric Le Goater wrote: > Hello Longfang, > > On 10/13/23 11:04, Longfang Liu wrote: >> There are multiple devices, software and operational steps involved >> in the process of live migration. An error occurred on any node may >> cause the live migration operation to fail. >> This complex process makes it very difficult to locate and analyze >> the cause when the function fails. >> >> In order to quickly locate the cause of the problem when the >> live migration fails, I added a set of debugfs to the vfio >> live migration driver. >> >> +-------------------------------------------+ >> | | >> | | >> | QEMU | >> | | >> | | >> +---+----------------------------+----------+ >> | ^ | ^ >> | | | | >> | | | | >> v | v | >> +---------+--+ +---------+--+ >> |src vfio_dev| |dst vfio_dev| >> +--+---------+ +--+---------+ >> | ^ | ^ >> | | | | >> v | | | >> +-----------+----+ +-----------+----+ >> |src dev debugfs | |dst dev debugfs | >> +----------------+ +----------------+ >> >> The entire debugfs directory will be based on the definition of >> the CONFIG_DEBUG_FS macro. If this macro is not enabled, the >> interfaces in vfio.h will be empty definitions, and the creation >> and initialization of the debugfs directory will not be executed. >> >> vfio >> | >> +---<dev_name1> >> | +---migration >> | +--state >> | >> +---<dev_name2> >> +---migration >> +--state >> >> debugfs will create a public root directory "vfio" file. >> then create a dev_name() file for each live migration device. >> First, create a unified state acquisition file of "migration" >> in this device directory. >> Then, create a public live migration state lookup file "state". >> >> Signed-off-by: Longfang Liu <liulongfang@huawei.com> >> --- >> drivers/vfio/Kconfig | 10 +++++ >> drivers/vfio/Makefile | 1 + >> drivers/vfio/debugfs.c | 90 +++++++++++++++++++++++++++++++++++++++ >> drivers/vfio/vfio.h | 14 ++++++ >> drivers/vfio/vfio_main.c | 14 +++++- >> include/linux/vfio.h | 7 +++ >> include/uapi/linux/vfio.h | 1 + >> 7 files changed, 135 insertions(+), 2 deletions(-) >> create mode 100644 drivers/vfio/debugfs.c >> >> diff --git a/drivers/vfio/Kconfig b/drivers/vfio/Kconfig >> index 6bda6dbb4878..ceae52fd7586 100644 >> --- a/drivers/vfio/Kconfig >> +++ b/drivers/vfio/Kconfig >> @@ -80,6 +80,16 @@ config VFIO_VIRQFD >> select EVENTFD >> default n >> +config VFIO_DEBUGFS >> + bool "Export VFIO internals in DebugFS" >> + depends on DEBUG_FS >> + help >> + Allows exposure of VFIO device internals. This option enables >> + the use of debugfs by VFIO drivers as required. The device can >> + cause the VFIO code create a top-level debug/vfio directory >> + during initialization, and then populate a subdirectory with >> + entries as required. >> + >> source "drivers/vfio/pci/Kconfig" >> source "drivers/vfio/platform/Kconfig" >> source "drivers/vfio/mdev/Kconfig" >> diff --git a/drivers/vfio/Makefile b/drivers/vfio/Makefile >> index c82ea032d352..d43a699d55b1 100644 >> --- a/drivers/vfio/Makefile >> +++ b/drivers/vfio/Makefile >> @@ -8,6 +8,7 @@ vfio-$(CONFIG_VFIO_GROUP) += group.o >> vfio-$(CONFIG_IOMMUFD) += iommufd.o >> vfio-$(CONFIG_VFIO_CONTAINER) += container.o >> vfio-$(CONFIG_VFIO_VIRQFD) += virqfd.o >> +vfio-$(CONFIG_VFIO_DEBUGFS) += debugfs.o >> obj-$(CONFIG_VFIO_IOMMU_TYPE1) += vfio_iommu_type1.o >> obj-$(CONFIG_VFIO_IOMMU_SPAPR_TCE) += vfio_iommu_spapr_tce.o >> diff --git a/drivers/vfio/debugfs.c b/drivers/vfio/debugfs.c >> new file mode 100644 >> index 000000000000..ae53d6110f47 >> --- /dev/null >> +++ b/drivers/vfio/debugfs.c >> @@ -0,0 +1,90 @@ >> +// SPDX-License-Identifier: GPL-2.0-only >> +/* >> + * Copyright (c) 2023, HiSilicon Ltd. >> + */ >> + >> +#include <linux/device.h> >> +#include <linux/debugfs.h> >> +#include <linux/seq_file.h> >> +#include <linux/vfio.h> >> +#include "vfio.h" >> + >> +static struct dentry *vfio_debugfs_root; >> + >> +static int vfio_device_state_read(struct seq_file *seq, void *data) >> +{ >> + struct device *vf_dev = seq->private; >> + struct vfio_device *vdev = container_of(vf_dev, struct vfio_device, device); >> + enum vfio_device_mig_state state; >> + int ret; >> + >> + BUILD_BUG_ON(VFIO_DEVICE_STATE_NR != >> + VFIO_DEVICE_STATE_PRE_COPY_P2P + 1); >> + >> + ret = vdev->mig_ops->migration_get_state(vdev, &state); >> + if (ret) >> + return -EINVAL; >> + >> + switch (state) { >> + case VFIO_DEVICE_STATE_ERROR: >> + seq_printf(seq, "%s\n", "ERROR"); >> + break; >> + case VFIO_DEVICE_STATE_STOP: >> + seq_printf(seq, "%s\n", "STOP"); >> + break; >> + case VFIO_DEVICE_STATE_RUNNING: >> + seq_printf(seq, "%s\n", "RUNNING"); >> + break; >> + case VFIO_DEVICE_STATE_STOP_COPY: >> + seq_printf(seq, "%s\n", "STOP_COPY"); >> + break; >> + case VFIO_DEVICE_STATE_RESUMING: >> + seq_printf(seq, "%s\n", "RESUMING"); >> + break; >> + case VFIO_DEVICE_STATE_RUNNING_P2P: >> + seq_printf(seq, "%s\n", "RUNNING_P2P"); >> + break; >> + case VFIO_DEVICE_STATE_PRE_COPY: >> + seq_printf(seq, "%s\n", "PRE_COPY"); >> + break; >> + case VFIO_DEVICE_STATE_PRE_COPY_P2P: >> + seq_printf(seq, "%s\n", "PRE_COPY_P2P"); >> + break; >> + default: >> + seq_printf(seq, "%s\n", "Invalid"); > > seq_puts() is more appropriate than seq_printf() above. > There is no difference between seq_puts() and seq_printf() here, no need to modify it. > I would suggest to add an array or some helper, that the VFIO drivers > could use to debug the migration flow with pr_* primitives. It can be > done later. > If you want to debug this migration process in the VFIO driver, you can refer to vdev->mig_ops->migration_get_state() to read the status. > >> + } >> + >> + return 0; >> +} >> + >> +void vfio_device_debugfs_init(struct vfio_device *vdev) >> +{ >> + struct device *dev = &vdev->device; >> + >> + vdev->debug_root = debugfs_create_dir(dev_name(vdev->dev), vfio_debugfs_root); >> + >> + if (vdev->mig_ops) { >> + struct dentry *vfio_dev_migration = NULL; > > mig_dir maybe ? > "vfio_dev_migration " will not affect the readability of the code. > It would be easier to understand the nature of the variable IMHO. > >> + >> + vfio_dev_migration = debugfs_create_dir("migration", vdev->debug_root); >> + debugfs_create_devm_seqfile(dev, "state", vfio_dev_migration, >> + vfio_device_state_read); >> + } >> +} >> + >> +void vfio_device_debugfs_exit(struct vfio_device *vdev) >> +{ >> + debugfs_remove_recursive(vdev->debug_root); >> +} >> + >> +void vfio_debugfs_create_root(void) >> +{ >> + vfio_debugfs_root = debugfs_create_dir("vfio", NULL); >> +} >> + >> +void vfio_debugfs_remove_root(void) >> +{ >> + debugfs_remove_recursive(vfio_debugfs_root); >> + vfio_debugfs_root = NULL; >> +} >> + >> diff --git a/drivers/vfio/vfio.h b/drivers/vfio/vfio.h >> index 307e3f29b527..bde84ad344e5 100644 >> --- a/drivers/vfio/vfio.h >> +++ b/drivers/vfio/vfio.h >> @@ -448,4 +448,18 @@ static inline void vfio_device_put_kvm(struct vfio_device *device) >> } >> #endif >> +#ifdef CONFIG_VFIO_DEBUGFS >> +void vfio_debugfs_create_root(void); >> +void vfio_debugfs_remove_root(void); >> + >> +void vfio_device_debugfs_init(struct vfio_device *vdev); >> +void vfio_device_debugfs_exit(struct vfio_device *vdev); >> +#else >> +static inline void vfio_debugfs_create_root(void) { } >> +static inline void vfio_debugfs_remove_root(void) { } >> + >> +static inline void vfio_device_debugfs_init(struct vfio_device *vdev) { } >> +static inline void vfio_device_debugfs_exit(struct vfio_device *vdev) { } >> +#endif /* CONFIG_VFIO_DEBUGFS */ >> + >> #endif >> diff --git a/drivers/vfio/vfio_main.c b/drivers/vfio/vfio_main.c >> index e31e1952d7b8..9aec4c22f051 100644 >> --- a/drivers/vfio/vfio_main.c >> +++ b/drivers/vfio/vfio_main.c >> @@ -309,7 +309,6 @@ static int __vfio_register_dev(struct vfio_device *device, >> /* Refcounting can't start until the driver calls register */ >> refcount_set(&device->refcount, 1); >> - > > superfluous change. > A blank line here is to separate it from the comment above. Makes it easier to be read. >> vfio_device_group_register(device); >> return 0; >> @@ -320,7 +319,15 @@ static int __vfio_register_dev(struct vfio_device *device, >> int vfio_register_group_dev(struct vfio_device *device) >> { >> - return __vfio_register_dev(device, VFIO_IOMMU); >> + int ret; >> + >> + ret = __vfio_register_dev(device, VFIO_IOMMU); >> + if (ret) >> + return ret; >> + >> + vfio_device_debugfs_init(device); > > Can it be called from __vfio_register_dev() instead ? and mdev devices > would get debugfs support also. > This is for symmetry in function calls. The need for symmetry was mentioned in the previous review. > Thanks, > > C. > Thanks, Longfang. >> + >> + return 0; >> } >> EXPORT_SYMBOL_GPL(vfio_register_group_dev); >> @@ -378,6 +385,7 @@ void vfio_unregister_group_dev(struct vfio_device *device) >> } >> } >> + vfio_device_debugfs_exit(device); >> /* Balances vfio_device_set_group in register path */ >> vfio_device_remove_group(device); >> } >> @@ -1676,6 +1684,7 @@ static int __init vfio_init(void) >> if (ret) >> goto err_alloc_dev_chrdev; >> + vfio_debugfs_create_root(); >> pr_info(DRIVER_DESC " version: " DRIVER_VERSION "\n"); >> return 0; >> @@ -1691,6 +1700,7 @@ static int __init vfio_init(void) >> static void __exit vfio_cleanup(void) >> { >> + vfio_debugfs_remove_root(); >> ida_destroy(&vfio.device_ida); >> vfio_cdev_cleanup(); >> class_destroy(vfio.device_class); >> diff --git a/include/linux/vfio.h b/include/linux/vfio.h >> index 454e9295970c..769d7af86225 100644 >> --- a/include/linux/vfio.h >> +++ b/include/linux/vfio.h >> @@ -69,6 +69,13 @@ struct vfio_device { >> u8 iommufd_attached:1; >> #endif >> u8 cdev_opened:1; >> +#ifdef CONFIG_DEBUG_FS >> + /* >> + * debug_root is a static property of the vfio_device >> + * which must be set prior to registering the vfio_device. >> + */ >> + struct dentry *debug_root; >> +#endif >> }; >> /** >> diff --git a/include/uapi/linux/vfio.h b/include/uapi/linux/vfio.h >> index 7f5fb010226d..2b68e6cdf190 100644 >> --- a/include/uapi/linux/vfio.h >> +++ b/include/uapi/linux/vfio.h >> @@ -1219,6 +1219,7 @@ enum vfio_device_mig_state { >> VFIO_DEVICE_STATE_RUNNING_P2P = 5, >> VFIO_DEVICE_STATE_PRE_COPY = 6, >> VFIO_DEVICE_STATE_PRE_COPY_P2P = 7, >> + VFIO_DEVICE_STATE_NR, >> }; >> /** > > . >
On 10/19/23 10:03, liulongfang wrote: > On 2023/10/16 23:17, Cédric Le Goater wrote: >> Hello Longfang, >> >> On 10/13/23 11:04, Longfang Liu wrote: >>> There are multiple devices, software and operational steps involved >>> in the process of live migration. An error occurred on any node may >>> cause the live migration operation to fail. >>> This complex process makes it very difficult to locate and analyze >>> the cause when the function fails. >>> >>> In order to quickly locate the cause of the problem when the >>> live migration fails, I added a set of debugfs to the vfio >>> live migration driver. >>> >>> +-------------------------------------------+ >>> | | >>> | | >>> | QEMU | >>> | | >>> | | >>> +---+----------------------------+----------+ >>> | ^ | ^ >>> | | | | >>> | | | | >>> v | v | >>> +---------+--+ +---------+--+ >>> |src vfio_dev| |dst vfio_dev| >>> +--+---------+ +--+---------+ >>> | ^ | ^ >>> | | | | >>> v | | | >>> +-----------+----+ +-----------+----+ >>> |src dev debugfs | |dst dev debugfs | >>> +----------------+ +----------------+ >>> >>> The entire debugfs directory will be based on the definition of >>> the CONFIG_DEBUG_FS macro. If this macro is not enabled, the >>> interfaces in vfio.h will be empty definitions, and the creation >>> and initialization of the debugfs directory will not be executed. >>> >>> vfio >>> | >>> +---<dev_name1> >>> | +---migration >>> | +--state >>> | >>> +---<dev_name2> >>> +---migration >>> +--state >>> >>> debugfs will create a public root directory "vfio" file. >>> then create a dev_name() file for each live migration device. >>> First, create a unified state acquisition file of "migration" >>> in this device directory. >>> Then, create a public live migration state lookup file "state". >>> >>> Signed-off-by: Longfang Liu <liulongfang@huawei.com> >>> --- >>> drivers/vfio/Kconfig | 10 +++++ >>> drivers/vfio/Makefile | 1 + >>> drivers/vfio/debugfs.c | 90 +++++++++++++++++++++++++++++++++++++++ >>> drivers/vfio/vfio.h | 14 ++++++ >>> drivers/vfio/vfio_main.c | 14 +++++- >>> include/linux/vfio.h | 7 +++ >>> include/uapi/linux/vfio.h | 1 + >>> 7 files changed, 135 insertions(+), 2 deletions(-) >>> create mode 100644 drivers/vfio/debugfs.c >>> >>> diff --git a/drivers/vfio/Kconfig b/drivers/vfio/Kconfig >>> index 6bda6dbb4878..ceae52fd7586 100644 >>> --- a/drivers/vfio/Kconfig >>> +++ b/drivers/vfio/Kconfig >>> @@ -80,6 +80,16 @@ config VFIO_VIRQFD >>> select EVENTFD >>> default n >>> +config VFIO_DEBUGFS >>> + bool "Export VFIO internals in DebugFS" >>> + depends on DEBUG_FS >>> + help >>> + Allows exposure of VFIO device internals. This option enables >>> + the use of debugfs by VFIO drivers as required. The device can >>> + cause the VFIO code create a top-level debug/vfio directory >>> + during initialization, and then populate a subdirectory with >>> + entries as required. >>> + >>> source "drivers/vfio/pci/Kconfig" >>> source "drivers/vfio/platform/Kconfig" >>> source "drivers/vfio/mdev/Kconfig" >>> diff --git a/drivers/vfio/Makefile b/drivers/vfio/Makefile >>> index c82ea032d352..d43a699d55b1 100644 >>> --- a/drivers/vfio/Makefile >>> +++ b/drivers/vfio/Makefile >>> @@ -8,6 +8,7 @@ vfio-$(CONFIG_VFIO_GROUP) += group.o >>> vfio-$(CONFIG_IOMMUFD) += iommufd.o >>> vfio-$(CONFIG_VFIO_CONTAINER) += container.o >>> vfio-$(CONFIG_VFIO_VIRQFD) += virqfd.o >>> +vfio-$(CONFIG_VFIO_DEBUGFS) += debugfs.o >>> obj-$(CONFIG_VFIO_IOMMU_TYPE1) += vfio_iommu_type1.o >>> obj-$(CONFIG_VFIO_IOMMU_SPAPR_TCE) += vfio_iommu_spapr_tce.o >>> diff --git a/drivers/vfio/debugfs.c b/drivers/vfio/debugfs.c >>> new file mode 100644 >>> index 000000000000..ae53d6110f47 >>> --- /dev/null >>> +++ b/drivers/vfio/debugfs.c >>> @@ -0,0 +1,90 @@ >>> +// SPDX-License-Identifier: GPL-2.0-only >>> +/* >>> + * Copyright (c) 2023, HiSilicon Ltd. >>> + */ >>> + >>> +#include <linux/device.h> >>> +#include <linux/debugfs.h> >>> +#include <linux/seq_file.h> >>> +#include <linux/vfio.h> >>> +#include "vfio.h" >>> + >>> +static struct dentry *vfio_debugfs_root; >>> + >>> +static int vfio_device_state_read(struct seq_file *seq, void *data) >>> +{ >>> + struct device *vf_dev = seq->private; >>> + struct vfio_device *vdev = container_of(vf_dev, struct vfio_device, device); >>> + enum vfio_device_mig_state state; >>> + int ret; >>> + >>> + BUILD_BUG_ON(VFIO_DEVICE_STATE_NR != >>> + VFIO_DEVICE_STATE_PRE_COPY_P2P + 1); >>> + >>> + ret = vdev->mig_ops->migration_get_state(vdev, &state); >>> + if (ret) >>> + return -EINVAL; >>> + >>> + switch (state) { >>> + case VFIO_DEVICE_STATE_ERROR: >>> + seq_printf(seq, "%s\n", "ERROR"); >>> + break; >>> + case VFIO_DEVICE_STATE_STOP: >>> + seq_printf(seq, "%s\n", "STOP"); >>> + break; >>> + case VFIO_DEVICE_STATE_RUNNING: >>> + seq_printf(seq, "%s\n", "RUNNING"); >>> + break; >>> + case VFIO_DEVICE_STATE_STOP_COPY: >>> + seq_printf(seq, "%s\n", "STOP_COPY"); >>> + break; >>> + case VFIO_DEVICE_STATE_RESUMING: >>> + seq_printf(seq, "%s\n", "RESUMING"); >>> + break; >>> + case VFIO_DEVICE_STATE_RUNNING_P2P: >>> + seq_printf(seq, "%s\n", "RUNNING_P2P"); >>> + break; >>> + case VFIO_DEVICE_STATE_PRE_COPY: >>> + seq_printf(seq, "%s\n", "PRE_COPY"); >>> + break; >>> + case VFIO_DEVICE_STATE_PRE_COPY_P2P: >>> + seq_printf(seq, "%s\n", "PRE_COPY_P2P"); >>> + break; >>> + default: >>> + seq_printf(seq, "%s\n", "Invalid"); >> >> seq_puts() is more appropriate than seq_printf() above. >> > > There is no difference between seq_puts() and seq_printf() here, > no need to modify it. seq_puts is simply preferred for unformatted output. >> I would suggest to add an array or some helper, that the VFIO drivers >> could use to debug the migration flow with pr_* primitives. It can be >> done later. >> > > If you want to debug this migration process in the VFIO driver, > you can refer to vdev->mig_ops->migration_get_state() to read the status. > >> >>> + } >>> + >>> + return 0; >>> +} >>> + >>> +void vfio_device_debugfs_init(struct vfio_device *vdev) >>> +{ >>> + struct device *dev = &vdev->device; >>> + >>> + vdev->debug_root = debugfs_create_dir(dev_name(vdev->dev), vfio_debugfs_root); >>> + >>> + if (vdev->mig_ops) { >>> + struct dentry *vfio_dev_migration = NULL; >> >> mig_dir maybe ? >> > > "vfio_dev_migration " will not affect the readability of the code. > >> It would be easier to understand the nature of the variable IMHO. >> >>> + >>> + vfio_dev_migration = debugfs_create_dir("migration", vdev->debug_root); >>> + debugfs_create_devm_seqfile(dev, "state", vfio_dev_migration, >>> + vfio_device_state_read); >>> + } >>> +} >>> + >>> +void vfio_device_debugfs_exit(struct vfio_device *vdev) >>> +{ >>> + debugfs_remove_recursive(vdev->debug_root); >>> +} >>> + >>> +void vfio_debugfs_create_root(void) >>> +{ >>> + vfio_debugfs_root = debugfs_create_dir("vfio", NULL); >>> +} >>> + >>> +void vfio_debugfs_remove_root(void) >>> +{ >>> + debugfs_remove_recursive(vfio_debugfs_root); >>> + vfio_debugfs_root = NULL; >>> +} >>> + >>> diff --git a/drivers/vfio/vfio.h b/drivers/vfio/vfio.h >>> index 307e3f29b527..bde84ad344e5 100644 >>> --- a/drivers/vfio/vfio.h >>> +++ b/drivers/vfio/vfio.h >>> @@ -448,4 +448,18 @@ static inline void vfio_device_put_kvm(struct vfio_device *device) >>> } >>> #endif >>> +#ifdef CONFIG_VFIO_DEBUGFS >>> +void vfio_debugfs_create_root(void); >>> +void vfio_debugfs_remove_root(void); >>> + >>> +void vfio_device_debugfs_init(struct vfio_device *vdev); >>> +void vfio_device_debugfs_exit(struct vfio_device *vdev); >>> +#else >>> +static inline void vfio_debugfs_create_root(void) { } >>> +static inline void vfio_debugfs_remove_root(void) { } >>> + >>> +static inline void vfio_device_debugfs_init(struct vfio_device *vdev) { } >>> +static inline void vfio_device_debugfs_exit(struct vfio_device *vdev) { } >>> +#endif /* CONFIG_VFIO_DEBUGFS */ >>> + >>> #endif >>> diff --git a/drivers/vfio/vfio_main.c b/drivers/vfio/vfio_main.c >>> index e31e1952d7b8..9aec4c22f051 100644 >>> --- a/drivers/vfio/vfio_main.c >>> +++ b/drivers/vfio/vfio_main.c >>> @@ -309,7 +309,6 @@ static int __vfio_register_dev(struct vfio_device *device, >>> /* Refcounting can't start until the driver calls register */ >>> refcount_set(&device->refcount, 1); >>> - >> >> superfluous change. >> > > A blank line here is to separate it from the comment above. > Makes it easier to be read. > >>> vfio_device_group_register(device); >>> return 0; >>> @@ -320,7 +319,15 @@ static int __vfio_register_dev(struct vfio_device *device, >>> int vfio_register_group_dev(struct vfio_device *device) >>> { >>> - return __vfio_register_dev(device, VFIO_IOMMU); >>> + int ret; >>> + >>> + ret = __vfio_register_dev(device, VFIO_IOMMU); >>> + if (ret) >>> + return ret; >>> + >>> + vfio_device_debugfs_init(device); >> >> Can it be called from __vfio_register_dev() instead ? and mdev devices >> would get debugfs support also. >> > > This is for symmetry in function calls. > The need for symmetry was mentioned in the previous review. yes. But this is also exluding the mdev devices which is a large VFIO family. Thanks, C. > >> Thanks, >> >> C. >> > Thanks, > Longfang. > >>> + >>> + return 0; >>> } >>> EXPORT_SYMBOL_GPL(vfio_register_group_dev); >>> @@ -378,6 +385,7 @@ void vfio_unregister_group_dev(struct vfio_device *device) >>> } >>> } >>> + vfio_device_debugfs_exit(device); >>> /* Balances vfio_device_set_group in register path */ >>> vfio_device_remove_group(device); >>> } >>> @@ -1676,6 +1684,7 @@ static int __init vfio_init(void) >>> if (ret) >>> goto err_alloc_dev_chrdev; >>> + vfio_debugfs_create_root(); >>> pr_info(DRIVER_DESC " version: " DRIVER_VERSION "\n"); >>> return 0; >>> @@ -1691,6 +1700,7 @@ static int __init vfio_init(void) >>> static void __exit vfio_cleanup(void) >>> { >>> + vfio_debugfs_remove_root(); >>> ida_destroy(&vfio.device_ida); >>> vfio_cdev_cleanup(); >>> class_destroy(vfio.device_class); >>> diff --git a/include/linux/vfio.h b/include/linux/vfio.h >>> index 454e9295970c..769d7af86225 100644 >>> --- a/include/linux/vfio.h >>> +++ b/include/linux/vfio.h >>> @@ -69,6 +69,13 @@ struct vfio_device { >>> u8 iommufd_attached:1; >>> #endif >>> u8 cdev_opened:1; >>> +#ifdef CONFIG_DEBUG_FS >>> + /* >>> + * debug_root is a static property of the vfio_device >>> + * which must be set prior to registering the vfio_device. >>> + */ >>> + struct dentry *debug_root; >>> +#endif >>> }; >>> /** >>> diff --git a/include/uapi/linux/vfio.h b/include/uapi/linux/vfio.h >>> index 7f5fb010226d..2b68e6cdf190 100644 >>> --- a/include/uapi/linux/vfio.h >>> +++ b/include/uapi/linux/vfio.h >>> @@ -1219,6 +1219,7 @@ enum vfio_device_mig_state { >>> VFIO_DEVICE_STATE_RUNNING_P2P = 5, >>> VFIO_DEVICE_STATE_PRE_COPY = 6, >>> VFIO_DEVICE_STATE_PRE_COPY_P2P = 7, >>> + VFIO_DEVICE_STATE_NR, >>> }; >>> /** >> >> . >> >
On Thu, 19 Oct 2023 10:30:53 +0200 Cédric Le Goater <clegoate@redhat.com> wrote: > On 10/19/23 10:03, liulongfang wrote: > > On 2023/10/16 23:17, Cédric Le Goater wrote: > >> Hello Longfang, > >> > >> On 10/13/23 11:04, Longfang Liu wrote: > >>> There are multiple devices, software and operational steps involved > >>> in the process of live migration. An error occurred on any node may > >>> cause the live migration operation to fail. > >>> This complex process makes it very difficult to locate and analyze > >>> the cause when the function fails. > >>> > >>> In order to quickly locate the cause of the problem when the > >>> live migration fails, I added a set of debugfs to the vfio > >>> live migration driver. > >>> > >>> +-------------------------------------------+ > >>> | | > >>> | | > >>> | QEMU | > >>> | | > >>> | | > >>> +---+----------------------------+----------+ > >>> | ^ | ^ > >>> | | | | > >>> | | | | > >>> v | v | > >>> +---------+--+ +---------+--+ > >>> |src vfio_dev| |dst vfio_dev| > >>> +--+---------+ +--+---------+ > >>> | ^ | ^ > >>> | | | | > >>> v | | | > >>> +-----------+----+ +-----------+----+ > >>> |src dev debugfs | |dst dev debugfs | > >>> +----------------+ +----------------+ > >>> > >>> The entire debugfs directory will be based on the definition of > >>> the CONFIG_DEBUG_FS macro. If this macro is not enabled, the > >>> interfaces in vfio.h will be empty definitions, and the creation > >>> and initialization of the debugfs directory will not be executed. > >>> > >>> vfio > >>> | > >>> +---<dev_name1> > >>> | +---migration > >>> | +--state > >>> | > >>> +---<dev_name2> > >>> +---migration > >>> +--state > >>> > >>> debugfs will create a public root directory "vfio" file. > >>> then create a dev_name() file for each live migration device. > >>> First, create a unified state acquisition file of "migration" > >>> in this device directory. > >>> Then, create a public live migration state lookup file "state". > >>> > >>> Signed-off-by: Longfang Liu <liulongfang@huawei.com> > >>> --- > >>> drivers/vfio/Kconfig | 10 +++++ > >>> drivers/vfio/Makefile | 1 + > >>> drivers/vfio/debugfs.c | 90 +++++++++++++++++++++++++++++++++++++++ > >>> drivers/vfio/vfio.h | 14 ++++++ > >>> drivers/vfio/vfio_main.c | 14 +++++- > >>> include/linux/vfio.h | 7 +++ > >>> include/uapi/linux/vfio.h | 1 + > >>> 7 files changed, 135 insertions(+), 2 deletions(-) > >>> create mode 100644 drivers/vfio/debugfs.c > >>> > >>> diff --git a/drivers/vfio/Kconfig b/drivers/vfio/Kconfig > >>> index 6bda6dbb4878..ceae52fd7586 100644 > >>> --- a/drivers/vfio/Kconfig > >>> +++ b/drivers/vfio/Kconfig > >>> @@ -80,6 +80,16 @@ config VFIO_VIRQFD > >>> select EVENTFD > >>> default n > >>> +config VFIO_DEBUGFS > >>> + bool "Export VFIO internals in DebugFS" > >>> + depends on DEBUG_FS > >>> + help > >>> + Allows exposure of VFIO device internals. This option enables > >>> + the use of debugfs by VFIO drivers as required. The device can > >>> + cause the VFIO code create a top-level debug/vfio directory > >>> + during initialization, and then populate a subdirectory with > >>> + entries as required. > >>> + > >>> source "drivers/vfio/pci/Kconfig" > >>> source "drivers/vfio/platform/Kconfig" > >>> source "drivers/vfio/mdev/Kconfig" > >>> diff --git a/drivers/vfio/Makefile b/drivers/vfio/Makefile > >>> index c82ea032d352..d43a699d55b1 100644 > >>> --- a/drivers/vfio/Makefile > >>> +++ b/drivers/vfio/Makefile > >>> @@ -8,6 +8,7 @@ vfio-$(CONFIG_VFIO_GROUP) += group.o > >>> vfio-$(CONFIG_IOMMUFD) += iommufd.o > >>> vfio-$(CONFIG_VFIO_CONTAINER) += container.o > >>> vfio-$(CONFIG_VFIO_VIRQFD) += virqfd.o > >>> +vfio-$(CONFIG_VFIO_DEBUGFS) += debugfs.o > >>> obj-$(CONFIG_VFIO_IOMMU_TYPE1) += vfio_iommu_type1.o > >>> obj-$(CONFIG_VFIO_IOMMU_SPAPR_TCE) += vfio_iommu_spapr_tce.o > >>> diff --git a/drivers/vfio/debugfs.c b/drivers/vfio/debugfs.c > >>> new file mode 100644 > >>> index 000000000000..ae53d6110f47 > >>> --- /dev/null > >>> +++ b/drivers/vfio/debugfs.c > >>> @@ -0,0 +1,90 @@ > >>> +// SPDX-License-Identifier: GPL-2.0-only > >>> +/* > >>> + * Copyright (c) 2023, HiSilicon Ltd. > >>> + */ > >>> + > >>> +#include <linux/device.h> > >>> +#include <linux/debugfs.h> > >>> +#include <linux/seq_file.h> > >>> +#include <linux/vfio.h> > >>> +#include "vfio.h" > >>> + > >>> +static struct dentry *vfio_debugfs_root; > >>> + > >>> +static int vfio_device_state_read(struct seq_file *seq, void *data) > >>> +{ > >>> + struct device *vf_dev = seq->private; > >>> + struct vfio_device *vdev = container_of(vf_dev, struct vfio_device, device); > >>> + enum vfio_device_mig_state state; > >>> + int ret; > >>> + > >>> + BUILD_BUG_ON(VFIO_DEVICE_STATE_NR != > >>> + VFIO_DEVICE_STATE_PRE_COPY_P2P + 1); > >>> + > >>> + ret = vdev->mig_ops->migration_get_state(vdev, &state); > >>> + if (ret) > >>> + return -EINVAL; > >>> + > >>> + switch (state) { > >>> + case VFIO_DEVICE_STATE_ERROR: > >>> + seq_printf(seq, "%s\n", "ERROR"); > >>> + break; > >>> + case VFIO_DEVICE_STATE_STOP: > >>> + seq_printf(seq, "%s\n", "STOP"); > >>> + break; > >>> + case VFIO_DEVICE_STATE_RUNNING: > >>> + seq_printf(seq, "%s\n", "RUNNING"); > >>> + break; > >>> + case VFIO_DEVICE_STATE_STOP_COPY: > >>> + seq_printf(seq, "%s\n", "STOP_COPY"); > >>> + break; > >>> + case VFIO_DEVICE_STATE_RESUMING: > >>> + seq_printf(seq, "%s\n", "RESUMING"); > >>> + break; > >>> + case VFIO_DEVICE_STATE_RUNNING_P2P: > >>> + seq_printf(seq, "%s\n", "RUNNING_P2P"); > >>> + break; > >>> + case VFIO_DEVICE_STATE_PRE_COPY: > >>> + seq_printf(seq, "%s\n", "PRE_COPY"); > >>> + break; > >>> + case VFIO_DEVICE_STATE_PRE_COPY_P2P: > >>> + seq_printf(seq, "%s\n", "PRE_COPY_P2P"); > >>> + break; > >>> + default: > >>> + seq_printf(seq, "%s\n", "Invalid"); > >> > >> seq_puts() is more appropriate than seq_printf() above. > >> > > > > There is no difference between seq_puts() and seq_printf() here, > > no need to modify it. > > seq_puts is simply preferred for unformatted output. Agreed, thanks for pointing this out. I think Documentation/filesystems/seq_file.rst suggests this as well and it's also a bit silly anyway to use %s for a fixed string. > >> I would suggest to add an array or some helper, that the VFIO drivers > >> could use to debug the migration flow with pr_* primitives. It can be > >> done later. > >> > > > > If you want to debug this migration process in the VFIO driver, > > you can refer to vdev->mig_ops->migration_get_state() to read the status. > > > >> > >>> + } > >>> + > >>> + return 0; > >>> +} > >>> + > >>> +void vfio_device_debugfs_init(struct vfio_device *vdev) > >>> +{ > >>> + struct device *dev = &vdev->device; > >>> + > >>> + vdev->debug_root = debugfs_create_dir(dev_name(vdev->dev), vfio_debugfs_root); > >>> + > >>> + if (vdev->mig_ops) { > >>> + struct dentry *vfio_dev_migration = NULL; > >> > >> mig_dir maybe ? > >> > > > > "vfio_dev_migration " will not affect the readability of the code. > > > >> It would be easier to understand the nature of the variable IMHO. I don't know that we need to impose a specific style here, but the variable has a very limited scope, so it doesn't really need a super descriptive name. > >>> + > >>> + vfio_dev_migration = debugfs_create_dir("migration", vdev->debug_root); > >>> + debugfs_create_devm_seqfile(dev, "state", vfio_dev_migration, > >>> + vfio_device_state_read); > >>> + } > >>> +} > >>> + > >>> +void vfio_device_debugfs_exit(struct vfio_device *vdev) > >>> +{ > >>> + debugfs_remove_recursive(vdev->debug_root); > >>> +} > >>> + > >>> +void vfio_debugfs_create_root(void) > >>> +{ > >>> + vfio_debugfs_root = debugfs_create_dir("vfio", NULL); > >>> +} > >>> + > >>> +void vfio_debugfs_remove_root(void) > >>> +{ > >>> + debugfs_remove_recursive(vfio_debugfs_root); > >>> + vfio_debugfs_root = NULL; > >>> +} > >>> + > >>> diff --git a/drivers/vfio/vfio.h b/drivers/vfio/vfio.h > >>> index 307e3f29b527..bde84ad344e5 100644 > >>> --- a/drivers/vfio/vfio.h > >>> +++ b/drivers/vfio/vfio.h > >>> @@ -448,4 +448,18 @@ static inline void vfio_device_put_kvm(struct vfio_device *device) > >>> } > >>> #endif > >>> +#ifdef CONFIG_VFIO_DEBUGFS > >>> +void vfio_debugfs_create_root(void); > >>> +void vfio_debugfs_remove_root(void); > >>> + > >>> +void vfio_device_debugfs_init(struct vfio_device *vdev); > >>> +void vfio_device_debugfs_exit(struct vfio_device *vdev); > >>> +#else > >>> +static inline void vfio_debugfs_create_root(void) { } > >>> +static inline void vfio_debugfs_remove_root(void) { } > >>> + > >>> +static inline void vfio_device_debugfs_init(struct vfio_device *vdev) { } > >>> +static inline void vfio_device_debugfs_exit(struct vfio_device *vdev) { } > >>> +#endif /* CONFIG_VFIO_DEBUGFS */ > >>> + > >>> #endif > >>> diff --git a/drivers/vfio/vfio_main.c b/drivers/vfio/vfio_main.c > >>> index e31e1952d7b8..9aec4c22f051 100644 > >>> --- a/drivers/vfio/vfio_main.c > >>> +++ b/drivers/vfio/vfio_main.c > >>> @@ -309,7 +309,6 @@ static int __vfio_register_dev(struct vfio_device *device, > >>> /* Refcounting can't start until the driver calls register */ > >>> refcount_set(&device->refcount, 1); > >>> - > >> > >> superfluous change. > >> > > > > A blank line here is to separate it from the comment above. > > Makes it easier to be read. This sounds more like a justification for keeping the blank line than for removing it. The original intent was to provide some logical separation. Regardless, introducing unrelated formatting changes while implementing something else is generally considered poor form. > >>> vfio_device_group_register(device); > >>> return 0; > >>> @@ -320,7 +319,15 @@ static int __vfio_register_dev(struct vfio_device *device, > >>> int vfio_register_group_dev(struct vfio_device *device) > >>> { > >>> - return __vfio_register_dev(device, VFIO_IOMMU); > >>> + int ret; > >>> + > >>> + ret = __vfio_register_dev(device, VFIO_IOMMU); > >>> + if (ret) > >>> + return ret; > >>> + > >>> + vfio_device_debugfs_init(device); > >> > >> Can it be called from __vfio_register_dev() instead ? and mdev devices > >> would get debugfs support also. > >> > > > > This is for symmetry in function calls. > > The need for symmetry was mentioned in the previous review. > > yes. But this is also exluding the mdev devices which is a large VFIO family. +1 It needs to support mdev as well. In fact the previous comments related to symmetry suggested it be placed at the end of __vfio_register_dev(), moving it to only cover the VFIO_IOMMU path is a bug. Thanks, Alex > >>> + > >>> + return 0; > >>> } > >>> EXPORT_SYMBOL_GPL(vfio_register_group_dev); > >>> @@ -378,6 +385,7 @@ void vfio_unregister_group_dev(struct vfio_device *device) > >>> } > >>> } > >>> + vfio_device_debugfs_exit(device); > >>> /* Balances vfio_device_set_group in register path */ > >>> vfio_device_remove_group(device); > >>> } > >>> @@ -1676,6 +1684,7 @@ static int __init vfio_init(void) > >>> if (ret) > >>> goto err_alloc_dev_chrdev; > >>> + vfio_debugfs_create_root(); > >>> pr_info(DRIVER_DESC " version: " DRIVER_VERSION "\n"); > >>> return 0; > >>> @@ -1691,6 +1700,7 @@ static int __init vfio_init(void) > >>> static void __exit vfio_cleanup(void) > >>> { > >>> + vfio_debugfs_remove_root(); > >>> ida_destroy(&vfio.device_ida); > >>> vfio_cdev_cleanup(); > >>> class_destroy(vfio.device_class); > >>> diff --git a/include/linux/vfio.h b/include/linux/vfio.h > >>> index 454e9295970c..769d7af86225 100644 > >>> --- a/include/linux/vfio.h > >>> +++ b/include/linux/vfio.h > >>> @@ -69,6 +69,13 @@ struct vfio_device { > >>> u8 iommufd_attached:1; > >>> #endif > >>> u8 cdev_opened:1; > >>> +#ifdef CONFIG_DEBUG_FS > >>> + /* > >>> + * debug_root is a static property of the vfio_device > >>> + * which must be set prior to registering the vfio_device. > >>> + */ > >>> + struct dentry *debug_root; > >>> +#endif > >>> }; > >>> /** > >>> diff --git a/include/uapi/linux/vfio.h b/include/uapi/linux/vfio.h > >>> index 7f5fb010226d..2b68e6cdf190 100644 > >>> --- a/include/uapi/linux/vfio.h > >>> +++ b/include/uapi/linux/vfio.h > >>> @@ -1219,6 +1219,7 @@ enum vfio_device_mig_state { > >>> VFIO_DEVICE_STATE_RUNNING_P2P = 5, > >>> VFIO_DEVICE_STATE_PRE_COPY = 6, > >>> VFIO_DEVICE_STATE_PRE_COPY_P2P = 7, > >>> + VFIO_DEVICE_STATE_NR, > >>> }; > >>> /** > >> > >> . > >> > > >
On 2023/10/19 16:30, Cédric Le Goater wrote: > On 10/19/23 10:03, liulongfang wrote: >> On 2023/10/16 23:17, Cédric Le Goater wrote: >>> Hello Longfang, >>> >>> On 10/13/23 11:04, Longfang Liu wrote: >>>> There are multiple devices, software and operational steps involved >>>> in the process of live migration. An error occurred on any node may >>>> cause the live migration operation to fail. >>>> This complex process makes it very difficult to locate and analyze >>>> the cause when the function fails. >>>> >>>> In order to quickly locate the cause of the problem when the >>>> live migration fails, I added a set of debugfs to the vfio >>>> live migration driver. >>>> >>>> +-------------------------------------------+ >>>> | | >>>> | | >>>> | QEMU | >>>> | | >>>> | | >>>> +---+----------------------------+----------+ >>>> | ^ | ^ >>>> | | | | >>>> | | | | >>>> v | v | >>>> +---------+--+ +---------+--+ >>>> |src vfio_dev| |dst vfio_dev| >>>> +--+---------+ +--+---------+ >>>> | ^ | ^ >>>> | | | | >>>> v | | | >>>> +-----------+----+ +-----------+----+ >>>> |src dev debugfs | |dst dev debugfs | >>>> +----------------+ +----------------+ >>>> >>>> The entire debugfs directory will be based on the definition of >>>> the CONFIG_DEBUG_FS macro. If this macro is not enabled, the >>>> interfaces in vfio.h will be empty definitions, and the creation >>>> and initialization of the debugfs directory will not be executed. >>>> >>>> vfio >>>> | >>>> +---<dev_name1> >>>> | +---migration >>>> | +--state >>>> | >>>> +---<dev_name2> >>>> +---migration >>>> +--state >>>> >>>> debugfs will create a public root directory "vfio" file. >>>> then create a dev_name() file for each live migration device. >>>> First, create a unified state acquisition file of "migration" >>>> in this device directory. >>>> Then, create a public live migration state lookup file "state". >>>> >>>> Signed-off-by: Longfang Liu <liulongfang@huawei.com> >>>> --- >>>> drivers/vfio/Kconfig | 10 +++++ >>>> drivers/vfio/Makefile | 1 + >>>> drivers/vfio/debugfs.c | 90 +++++++++++++++++++++++++++++++++++++++ >>>> drivers/vfio/vfio.h | 14 ++++++ >>>> drivers/vfio/vfio_main.c | 14 +++++- >>>> include/linux/vfio.h | 7 +++ >>>> include/uapi/linux/vfio.h | 1 + >>>> 7 files changed, 135 insertions(+), 2 deletions(-) >>>> create mode 100644 drivers/vfio/debugfs.c >>>> >>>> diff --git a/drivers/vfio/Kconfig b/drivers/vfio/Kconfig >>>> index 6bda6dbb4878..ceae52fd7586 100644 >>>> --- a/drivers/vfio/Kconfig >>>> +++ b/drivers/vfio/Kconfig >>>> @@ -80,6 +80,16 @@ config VFIO_VIRQFD >>>> select EVENTFD >>>> default n >>>> +config VFIO_DEBUGFS >>>> + bool "Export VFIO internals in DebugFS" >>>> + depends on DEBUG_FS >>>> + help >>>> + Allows exposure of VFIO device internals. This option enables >>>> + the use of debugfs by VFIO drivers as required. The device can >>>> + cause the VFIO code create a top-level debug/vfio directory >>>> + during initialization, and then populate a subdirectory with >>>> + entries as required. >>>> + >>>> source "drivers/vfio/pci/Kconfig" >>>> source "drivers/vfio/platform/Kconfig" >>>> source "drivers/vfio/mdev/Kconfig" >>>> diff --git a/drivers/vfio/Makefile b/drivers/vfio/Makefile >>>> index c82ea032d352..d43a699d55b1 100644 >>>> --- a/drivers/vfio/Makefile >>>> +++ b/drivers/vfio/Makefile >>>> @@ -8,6 +8,7 @@ vfio-$(CONFIG_VFIO_GROUP) += group.o >>>> vfio-$(CONFIG_IOMMUFD) += iommufd.o >>>> vfio-$(CONFIG_VFIO_CONTAINER) += container.o >>>> vfio-$(CONFIG_VFIO_VIRQFD) += virqfd.o >>>> +vfio-$(CONFIG_VFIO_DEBUGFS) += debugfs.o >>>> obj-$(CONFIG_VFIO_IOMMU_TYPE1) += vfio_iommu_type1.o >>>> obj-$(CONFIG_VFIO_IOMMU_SPAPR_TCE) += vfio_iommu_spapr_tce.o >>>> diff --git a/drivers/vfio/debugfs.c b/drivers/vfio/debugfs.c >>>> new file mode 100644 >>>> index 000000000000..ae53d6110f47 >>>> --- /dev/null >>>> +++ b/drivers/vfio/debugfs.c >>>> @@ -0,0 +1,90 @@ >>>> +// SPDX-License-Identifier: GPL-2.0-only >>>> +/* >>>> + * Copyright (c) 2023, HiSilicon Ltd. >>>> + */ >>>> + >>>> +#include <linux/device.h> >>>> +#include <linux/debugfs.h> >>>> +#include <linux/seq_file.h> >>>> +#include <linux/vfio.h> >>>> +#include "vfio.h" >>>> + >>>> +static struct dentry *vfio_debugfs_root; >>>> + >>>> +static int vfio_device_state_read(struct seq_file *seq, void *data) >>>> +{ >>>> + struct device *vf_dev = seq->private; >>>> + struct vfio_device *vdev = container_of(vf_dev, struct vfio_device, device); >>>> + enum vfio_device_mig_state state; >>>> + int ret; >>>> + >>>> + BUILD_BUG_ON(VFIO_DEVICE_STATE_NR != >>>> + VFIO_DEVICE_STATE_PRE_COPY_P2P + 1); >>>> + >>>> + ret = vdev->mig_ops->migration_get_state(vdev, &state); >>>> + if (ret) >>>> + return -EINVAL; >>>> + >>>> + switch (state) { >>>> + case VFIO_DEVICE_STATE_ERROR: >>>> + seq_printf(seq, "%s\n", "ERROR"); >>>> + break; >>>> + case VFIO_DEVICE_STATE_STOP: >>>> + seq_printf(seq, "%s\n", "STOP"); >>>> + break; >>>> + case VFIO_DEVICE_STATE_RUNNING: >>>> + seq_printf(seq, "%s\n", "RUNNING"); >>>> + break; >>>> + case VFIO_DEVICE_STATE_STOP_COPY: >>>> + seq_printf(seq, "%s\n", "STOP_COPY"); >>>> + break; >>>> + case VFIO_DEVICE_STATE_RESUMING: >>>> + seq_printf(seq, "%s\n", "RESUMING"); >>>> + break; >>>> + case VFIO_DEVICE_STATE_RUNNING_P2P: >>>> + seq_printf(seq, "%s\n", "RUNNING_P2P"); >>>> + break; >>>> + case VFIO_DEVICE_STATE_PRE_COPY: >>>> + seq_printf(seq, "%s\n", "PRE_COPY"); >>>> + break; >>>> + case VFIO_DEVICE_STATE_PRE_COPY_P2P: >>>> + seq_printf(seq, "%s\n", "PRE_COPY_P2P"); >>>> + break; >>>> + default: >>>> + seq_printf(seq, "%s\n", "Invalid"); >>> >>> seq_puts() is more appropriate than seq_printf() above. >>> >> >> There is no difference between seq_puts() and seq_printf() here, >> no need to modify it. > > seq_puts is simply preferred for unformatted output. > I think there is nothing wrong with using "seq_printf". >>> I would suggest to add an array or some helper, that the VFIO drivers >>> could use to debug the migration flow with pr_* primitives. It can be >>> done later. >>> >> >> If you want to debug this migration process in the VFIO driver, >> you can refer to vdev->mig_ops->migration_get_state() to read the status. >> >>> >>>> + } >>>> + >>>> + return 0; >>>> +} >>>> + >>>> +void vfio_device_debugfs_init(struct vfio_device *vdev) >>>> +{ >>>> + struct device *dev = &vdev->device; >>>> + >>>> + vdev->debug_root = debugfs_create_dir(dev_name(vdev->dev), vfio_debugfs_root); >>>> + >>>> + if (vdev->mig_ops) { >>>> + struct dentry *vfio_dev_migration = NULL; >>> >>> mig_dir maybe ? >>> >> >> "vfio_dev_migration " will not affect the readability of the code. >> >>> It would be easier to understand the nature of the variable IMHO. >>> >>>> + >>>> + vfio_dev_migration = debugfs_create_dir("migration", vdev->debug_root); >>>> + debugfs_create_devm_seqfile(dev, "state", vfio_dev_migration, >>>> + vfio_device_state_read); >>>> + } >>>> +} >>>> + >>>> +void vfio_device_debugfs_exit(struct vfio_device *vdev) >>>> +{ >>>> + debugfs_remove_recursive(vdev->debug_root); >>>> +} >>>> + >>>> +void vfio_debugfs_create_root(void) >>>> +{ >>>> + vfio_debugfs_root = debugfs_create_dir("vfio", NULL); >>>> +} >>>> + >>>> +void vfio_debugfs_remove_root(void) >>>> +{ >>>> + debugfs_remove_recursive(vfio_debugfs_root); >>>> + vfio_debugfs_root = NULL; >>>> +} >>>> + >>>> diff --git a/drivers/vfio/vfio.h b/drivers/vfio/vfio.h >>>> index 307e3f29b527..bde84ad344e5 100644 >>>> --- a/drivers/vfio/vfio.h >>>> +++ b/drivers/vfio/vfio.h >>>> @@ -448,4 +448,18 @@ static inline void vfio_device_put_kvm(struct vfio_device *device) >>>> } >>>> #endif >>>> +#ifdef CONFIG_VFIO_DEBUGFS >>>> +void vfio_debugfs_create_root(void); >>>> +void vfio_debugfs_remove_root(void); >>>> + >>>> +void vfio_device_debugfs_init(struct vfio_device *vdev); >>>> +void vfio_device_debugfs_exit(struct vfio_device *vdev); >>>> +#else >>>> +static inline void vfio_debugfs_create_root(void) { } >>>> +static inline void vfio_debugfs_remove_root(void) { } >>>> + >>>> +static inline void vfio_device_debugfs_init(struct vfio_device *vdev) { } >>>> +static inline void vfio_device_debugfs_exit(struct vfio_device *vdev) { } >>>> +#endif /* CONFIG_VFIO_DEBUGFS */ >>>> + >>>> #endif >>>> diff --git a/drivers/vfio/vfio_main.c b/drivers/vfio/vfio_main.c >>>> index e31e1952d7b8..9aec4c22f051 100644 >>>> --- a/drivers/vfio/vfio_main.c >>>> +++ b/drivers/vfio/vfio_main.c >>>> @@ -309,7 +309,6 @@ static int __vfio_register_dev(struct vfio_device *device, >>>> /* Refcounting can't start until the driver calls register */ >>>> refcount_set(&device->refcount, 1); >>>> - >>> >>> superfluous change. >>> >> >> A blank line here is to separate it from the comment above. >> Makes it easier to be read. >> >>>> vfio_device_group_register(device); >>>> return 0; >>>> @@ -320,7 +319,15 @@ static int __vfio_register_dev(struct vfio_device *device, >>>> int vfio_register_group_dev(struct vfio_device *device) >>>> { >>>> - return __vfio_register_dev(device, VFIO_IOMMU); >>>> + int ret; >>>> + >>>> + ret = __vfio_register_dev(device, VFIO_IOMMU); >>>> + if (ret) >>>> + return ret; >>>> + >>>> + vfio_device_debugfs_init(device); >>> >>> Can it be called from __vfio_register_dev() instead ? and mdev devices >>> would get debugfs support also. >>> >> >> This is for symmetry in function calls. >> The need for symmetry was mentioned in the previous review. > > yes. But this is also exluding the mdev devices which is a large VFIO family. > Here it is symmetrically encoded like this. Are there any problems when using it in mdev? Thanks, Longfang. > Thanks, > > C. > >> >>> Thanks, >>> >>> C. >>> >> Thanks, >> Longfang. >> >>>> + >>>> + return 0; >>>> } >>>> EXPORT_SYMBOL_GPL(vfio_register_group_dev); >>>> @@ -378,6 +385,7 @@ void vfio_unregister_group_dev(struct vfio_device *device) >>>> } >>>> } >>>> + vfio_device_debugfs_exit(device); >>>> /* Balances vfio_device_set_group in register path */ >>>> vfio_device_remove_group(device); >>>> } >>>> @@ -1676,6 +1684,7 @@ static int __init vfio_init(void) >>>> if (ret) >>>> goto err_alloc_dev_chrdev; >>>> + vfio_debugfs_create_root(); >>>> pr_info(DRIVER_DESC " version: " DRIVER_VERSION "\n"); >>>> return 0; >>>> @@ -1691,6 +1700,7 @@ static int __init vfio_init(void) >>>> static void __exit vfio_cleanup(void) >>>> { >>>> + vfio_debugfs_remove_root(); >>>> ida_destroy(&vfio.device_ida); >>>> vfio_cdev_cleanup(); >>>> class_destroy(vfio.device_class); >>>> diff --git a/include/linux/vfio.h b/include/linux/vfio.h >>>> index 454e9295970c..769d7af86225 100644 >>>> --- a/include/linux/vfio.h >>>> +++ b/include/linux/vfio.h >>>> @@ -69,6 +69,13 @@ struct vfio_device { >>>> u8 iommufd_attached:1; >>>> #endif >>>> u8 cdev_opened:1; >>>> +#ifdef CONFIG_DEBUG_FS >>>> + /* >>>> + * debug_root is a static property of the vfio_device >>>> + * which must be set prior to registering the vfio_device. >>>> + */ >>>> + struct dentry *debug_root; >>>> +#endif >>>> }; >>>> /** >>>> diff --git a/include/uapi/linux/vfio.h b/include/uapi/linux/vfio.h >>>> index 7f5fb010226d..2b68e6cdf190 100644 >>>> --- a/include/uapi/linux/vfio.h >>>> +++ b/include/uapi/linux/vfio.h >>>> @@ -1219,6 +1219,7 @@ enum vfio_device_mig_state { >>>> VFIO_DEVICE_STATE_RUNNING_P2P = 5, >>>> VFIO_DEVICE_STATE_PRE_COPY = 6, >>>> VFIO_DEVICE_STATE_PRE_COPY_P2P = 7, >>>> + VFIO_DEVICE_STATE_NR, >>>> }; >>>> /** >>> >>> . >>> >> > > . >
diff --git a/drivers/vfio/Kconfig b/drivers/vfio/Kconfig index 6bda6dbb4878..ceae52fd7586 100644 --- a/drivers/vfio/Kconfig +++ b/drivers/vfio/Kconfig @@ -80,6 +80,16 @@ config VFIO_VIRQFD select EVENTFD default n +config VFIO_DEBUGFS + bool "Export VFIO internals in DebugFS" + depends on DEBUG_FS + help + Allows exposure of VFIO device internals. This option enables + the use of debugfs by VFIO drivers as required. The device can + cause the VFIO code create a top-level debug/vfio directory + during initialization, and then populate a subdirectory with + entries as required. + source "drivers/vfio/pci/Kconfig" source "drivers/vfio/platform/Kconfig" source "drivers/vfio/mdev/Kconfig" diff --git a/drivers/vfio/Makefile b/drivers/vfio/Makefile index c82ea032d352..d43a699d55b1 100644 --- a/drivers/vfio/Makefile +++ b/drivers/vfio/Makefile @@ -8,6 +8,7 @@ vfio-$(CONFIG_VFIO_GROUP) += group.o vfio-$(CONFIG_IOMMUFD) += iommufd.o vfio-$(CONFIG_VFIO_CONTAINER) += container.o vfio-$(CONFIG_VFIO_VIRQFD) += virqfd.o +vfio-$(CONFIG_VFIO_DEBUGFS) += debugfs.o obj-$(CONFIG_VFIO_IOMMU_TYPE1) += vfio_iommu_type1.o obj-$(CONFIG_VFIO_IOMMU_SPAPR_TCE) += vfio_iommu_spapr_tce.o diff --git a/drivers/vfio/debugfs.c b/drivers/vfio/debugfs.c new file mode 100644 index 000000000000..ae53d6110f47 --- /dev/null +++ b/drivers/vfio/debugfs.c @@ -0,0 +1,90 @@ +// SPDX-License-Identifier: GPL-2.0-only +/* + * Copyright (c) 2023, HiSilicon Ltd. + */ + +#include <linux/device.h> +#include <linux/debugfs.h> +#include <linux/seq_file.h> +#include <linux/vfio.h> +#include "vfio.h" + +static struct dentry *vfio_debugfs_root; + +static int vfio_device_state_read(struct seq_file *seq, void *data) +{ + struct device *vf_dev = seq->private; + struct vfio_device *vdev = container_of(vf_dev, struct vfio_device, device); + enum vfio_device_mig_state state; + int ret; + + BUILD_BUG_ON(VFIO_DEVICE_STATE_NR != + VFIO_DEVICE_STATE_PRE_COPY_P2P + 1); + + ret = vdev->mig_ops->migration_get_state(vdev, &state); + if (ret) + return -EINVAL; + + switch (state) { + case VFIO_DEVICE_STATE_ERROR: + seq_printf(seq, "%s\n", "ERROR"); + break; + case VFIO_DEVICE_STATE_STOP: + seq_printf(seq, "%s\n", "STOP"); + break; + case VFIO_DEVICE_STATE_RUNNING: + seq_printf(seq, "%s\n", "RUNNING"); + break; + case VFIO_DEVICE_STATE_STOP_COPY: + seq_printf(seq, "%s\n", "STOP_COPY"); + break; + case VFIO_DEVICE_STATE_RESUMING: + seq_printf(seq, "%s\n", "RESUMING"); + break; + case VFIO_DEVICE_STATE_RUNNING_P2P: + seq_printf(seq, "%s\n", "RUNNING_P2P"); + break; + case VFIO_DEVICE_STATE_PRE_COPY: + seq_printf(seq, "%s\n", "PRE_COPY"); + break; + case VFIO_DEVICE_STATE_PRE_COPY_P2P: + seq_printf(seq, "%s\n", "PRE_COPY_P2P"); + break; + default: + seq_printf(seq, "%s\n", "Invalid"); + } + + return 0; +} + +void vfio_device_debugfs_init(struct vfio_device *vdev) +{ + struct device *dev = &vdev->device; + + vdev->debug_root = debugfs_create_dir(dev_name(vdev->dev), vfio_debugfs_root); + + if (vdev->mig_ops) { + struct dentry *vfio_dev_migration = NULL; + + vfio_dev_migration = debugfs_create_dir("migration", vdev->debug_root); + debugfs_create_devm_seqfile(dev, "state", vfio_dev_migration, + vfio_device_state_read); + } +} + +void vfio_device_debugfs_exit(struct vfio_device *vdev) +{ + debugfs_remove_recursive(vdev->debug_root); +} + +void vfio_debugfs_create_root(void) +{ + vfio_debugfs_root = debugfs_create_dir("vfio", NULL); +} + +void vfio_debugfs_remove_root(void) +{ + debugfs_remove_recursive(vfio_debugfs_root); + vfio_debugfs_root = NULL; +} + diff --git a/drivers/vfio/vfio.h b/drivers/vfio/vfio.h index 307e3f29b527..bde84ad344e5 100644 --- a/drivers/vfio/vfio.h +++ b/drivers/vfio/vfio.h @@ -448,4 +448,18 @@ static inline void vfio_device_put_kvm(struct vfio_device *device) } #endif +#ifdef CONFIG_VFIO_DEBUGFS +void vfio_debugfs_create_root(void); +void vfio_debugfs_remove_root(void); + +void vfio_device_debugfs_init(struct vfio_device *vdev); +void vfio_device_debugfs_exit(struct vfio_device *vdev); +#else +static inline void vfio_debugfs_create_root(void) { } +static inline void vfio_debugfs_remove_root(void) { } + +static inline void vfio_device_debugfs_init(struct vfio_device *vdev) { } +static inline void vfio_device_debugfs_exit(struct vfio_device *vdev) { } +#endif /* CONFIG_VFIO_DEBUGFS */ + #endif diff --git a/drivers/vfio/vfio_main.c b/drivers/vfio/vfio_main.c index e31e1952d7b8..9aec4c22f051 100644 --- a/drivers/vfio/vfio_main.c +++ b/drivers/vfio/vfio_main.c @@ -309,7 +309,6 @@ static int __vfio_register_dev(struct vfio_device *device, /* Refcounting can't start until the driver calls register */ refcount_set(&device->refcount, 1); - vfio_device_group_register(device); return 0; @@ -320,7 +319,15 @@ static int __vfio_register_dev(struct vfio_device *device, int vfio_register_group_dev(struct vfio_device *device) { - return __vfio_register_dev(device, VFIO_IOMMU); + int ret; + + ret = __vfio_register_dev(device, VFIO_IOMMU); + if (ret) + return ret; + + vfio_device_debugfs_init(device); + + return 0; } EXPORT_SYMBOL_GPL(vfio_register_group_dev); @@ -378,6 +385,7 @@ void vfio_unregister_group_dev(struct vfio_device *device) } } + vfio_device_debugfs_exit(device); /* Balances vfio_device_set_group in register path */ vfio_device_remove_group(device); } @@ -1676,6 +1684,7 @@ static int __init vfio_init(void) if (ret) goto err_alloc_dev_chrdev; + vfio_debugfs_create_root(); pr_info(DRIVER_DESC " version: " DRIVER_VERSION "\n"); return 0; @@ -1691,6 +1700,7 @@ static int __init vfio_init(void) static void __exit vfio_cleanup(void) { + vfio_debugfs_remove_root(); ida_destroy(&vfio.device_ida); vfio_cdev_cleanup(); class_destroy(vfio.device_class); diff --git a/include/linux/vfio.h b/include/linux/vfio.h index 454e9295970c..769d7af86225 100644 --- a/include/linux/vfio.h +++ b/include/linux/vfio.h @@ -69,6 +69,13 @@ struct vfio_device { u8 iommufd_attached:1; #endif u8 cdev_opened:1; +#ifdef CONFIG_DEBUG_FS + /* + * debug_root is a static property of the vfio_device + * which must be set prior to registering the vfio_device. + */ + struct dentry *debug_root; +#endif }; /** diff --git a/include/uapi/linux/vfio.h b/include/uapi/linux/vfio.h index 7f5fb010226d..2b68e6cdf190 100644 --- a/include/uapi/linux/vfio.h +++ b/include/uapi/linux/vfio.h @@ -1219,6 +1219,7 @@ enum vfio_device_mig_state { VFIO_DEVICE_STATE_RUNNING_P2P = 5, VFIO_DEVICE_STATE_PRE_COPY = 6, VFIO_DEVICE_STATE_PRE_COPY_P2P = 7, + VFIO_DEVICE_STATE_NR, }; /**