msm_cvp_debug.c 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631
  1. // SPDX-License-Identifier: GPL-2.0-only
  2. /*
  3. * Copyright (c) 2018-2021, The Linux Foundation. All rights reserved.
  4. * Copyright (c) 2023 Qualcomm Innovation Center, Inc. All rights reserved.
  5. */
  6. #include <linux/debugfs.h>
  7. #include "msm_cvp_debug.h"
  8. #include "msm_cvp_common.h"
  9. #include "cvp_core_hfi.h"
  10. #include "cvp_hfi_api.h"
  11. #include "msm_cvp_dsp.h"
  12. #define CREATE_TRACE_POINTS
  13. #define MAX_SSR_STRING_LEN 10
  14. int msm_cvp_debug = CVP_ERR | CVP_WARN | CVP_FW;
  15. EXPORT_SYMBOL(msm_cvp_debug);
  16. int msm_cvp_debug_out = CVP_OUT_PRINTK;
  17. EXPORT_SYMBOL(msm_cvp_debug_out);
  18. int msm_cvp_fw_debug = 0x18;
  19. int msm_cvp_fw_debug_mode = 1;
  20. int msm_cvp_fw_low_power_mode = 1;
  21. bool msm_cvp_fw_coverage = !true;
  22. bool msm_cvp_auto_pil = true;
  23. bool msm_cvp_cacheop_enabled = true;
  24. bool msm_cvp_thermal_mitigation_disabled = !true;
  25. bool msm_cvp_cacheop_disabled = !true;
  26. int msm_cvp_clock_voting = !1;
  27. bool msm_cvp_syscache_disable = !true;
  28. bool msm_cvp_dsp_disable = !true;
  29. #ifdef CVP_MMRM_ENABLED
  30. bool msm_cvp_mmrm_enabled = true;
  31. #else
  32. bool msm_cvp_mmrm_enabled = !true;
  33. #endif
  34. bool msm_cvp_dcvs_disable = !true;
  35. int msm_cvp_minidump_enable = !1;
  36. int cvp_kernel_fence_enabled = 2;
  37. int msm_cvp_hw_wd_recovery = 1;
  38. #define MAX_DBG_BUF_SIZE 4096
  39. struct cvp_core_inst_pair {
  40. struct msm_cvp_core *core;
  41. struct msm_cvp_inst *inst;
  42. };
  43. static int core_info_open(struct inode *inode, struct file *file)
  44. {
  45. file->private_data = inode->i_private;
  46. dprintk(CVP_INFO, "%s: Enter\n", __func__);
  47. return 0;
  48. }
  49. static u32 write_str(char *buffer,
  50. size_t size, const char *fmt, ...)
  51. {
  52. va_list args;
  53. u32 len;
  54. va_start(args, fmt);
  55. len = vscnprintf(buffer, size, fmt, args);
  56. va_end(args);
  57. return len;
  58. }
  59. static ssize_t core_info_read(struct file *file, char __user *buf,
  60. size_t count, loff_t *ppos)
  61. {
  62. struct msm_cvp_core *core = file->private_data;
  63. struct cvp_hfi_device *hdev;
  64. struct cvp_hal_fw_info fw_info = { {0} };
  65. char *dbuf, *cur, *end;
  66. int i = 0, rc = 0;
  67. ssize_t len = 0;
  68. if (!core || !core->device) {
  69. dprintk(CVP_ERR, "Invalid params, core: %pK\n", core);
  70. return 0;
  71. }
  72. dbuf = kzalloc(MAX_DBG_BUF_SIZE, GFP_KERNEL);
  73. if (!dbuf) {
  74. dprintk(CVP_ERR, "%s: Allocation failed!\n", __func__);
  75. return -ENOMEM;
  76. }
  77. cur = dbuf;
  78. end = cur + MAX_DBG_BUF_SIZE;
  79. hdev = core->device;
  80. cur += write_str(cur, end - cur, "===============================\n");
  81. cur += write_str(cur, end - cur, "CORE %d: %pK\n", 0, core);
  82. cur += write_str(cur, end - cur, "===============================\n");
  83. cur += write_str(cur, end - cur, "Core state: %d\n", core->state);
  84. rc = call_hfi_op(hdev, get_fw_info, hdev->hfi_device_data, &fw_info);
  85. if (rc) {
  86. dprintk(CVP_WARN, "Failed to read FW info\n");
  87. goto err_fw_info;
  88. }
  89. cur += write_str(cur, end - cur,
  90. "FW version : %s\n", &fw_info.version);
  91. cur += write_str(cur, end - cur,
  92. "base addr: 0x%x\n", fw_info.base_addr);
  93. cur += write_str(cur, end - cur,
  94. "register_base: 0x%x\n", fw_info.register_base);
  95. cur += write_str(cur, end - cur,
  96. "register_size: %u\n", fw_info.register_size);
  97. cur += write_str(cur, end - cur, "irq: %u\n", fw_info.irq);
  98. err_fw_info:
  99. for (i = SYS_MSG_START; i < SYS_MSG_END; i++) {
  100. cur += write_str(cur, end - cur, "completions[%d]: %s\n", i,
  101. completion_done(&core->completions[SYS_MSG_INDEX(i)]) ?
  102. "pending" : "done");
  103. }
  104. len = simple_read_from_buffer(buf, count, ppos,
  105. dbuf, cur - dbuf);
  106. kfree(dbuf);
  107. return len;
  108. }
  109. static const struct file_operations core_info_fops = {
  110. .open = core_info_open,
  111. .read = core_info_read,
  112. };
  113. static int trigger_ssr_open(struct inode *inode, struct file *file)
  114. {
  115. file->private_data = inode->i_private;
  116. dprintk(CVP_INFO, "%s: Enter\n", __func__);
  117. return 0;
  118. }
  119. static ssize_t trigger_ssr_write(struct file *filp, const char __user *buf,
  120. size_t count, loff_t *ppos)
  121. {
  122. unsigned long ssr_trigger_val = 0;
  123. int rc = 0;
  124. struct msm_cvp_core *core = filp->private_data;
  125. size_t size = MAX_SSR_STRING_LEN;
  126. char kbuf[MAX_SSR_STRING_LEN + 1] = {0};
  127. if (!buf)
  128. return -EINVAL;
  129. if (!count)
  130. goto exit;
  131. if (count < size)
  132. size = count;
  133. if (copy_from_user(kbuf, buf, size)) {
  134. dprintk(CVP_WARN, "%s User memory fault\n", __func__);
  135. rc = -EFAULT;
  136. goto exit;
  137. }
  138. rc = kstrtoul(kbuf, 0, &ssr_trigger_val);
  139. if (rc) {
  140. dprintk(CVP_WARN, "returning error err %d\n", rc);
  141. rc = -EINVAL;
  142. } else {
  143. msm_cvp_trigger_ssr(core, ssr_trigger_val);
  144. rc = count;
  145. }
  146. exit:
  147. return rc;
  148. }
  149. static const struct file_operations ssr_fops = {
  150. .open = trigger_ssr_open,
  151. .write = trigger_ssr_write,
  152. };
  153. static int cvp_power_get(void *data, u64 *val)
  154. {
  155. struct cvp_hfi_device *hfi_ops;
  156. struct msm_cvp_core *core;
  157. struct iris_hfi_device *hfi_device;
  158. core = cvp_driver->cvp_core;
  159. if (!core)
  160. return 0;
  161. hfi_ops = core->device;
  162. if (!hfi_ops)
  163. return 0;
  164. hfi_device = hfi_ops->hfi_device_data;
  165. if (!hfi_device)
  166. return 0;
  167. *val = hfi_device->power_enabled;
  168. return 0;
  169. }
  170. #define MIN_PC_INTERVAL 1000
  171. #define MAX_PC_INTERVAL 1000000
  172. static int cvp_power_set(void *data, u64 val)
  173. {
  174. struct cvp_hfi_device *hfi_ops;
  175. struct msm_cvp_core *core;
  176. struct iris_hfi_device *hfi_device;
  177. int rc = 0;
  178. core = cvp_driver->cvp_core;
  179. if (!core)
  180. return -EINVAL;
  181. hfi_ops = core->device;
  182. if (!hfi_ops)
  183. return -EINVAL;
  184. hfi_device = hfi_ops->hfi_device_data;
  185. if (!hfi_device)
  186. return -EINVAL;
  187. if (val >= MAX_PC_INTERVAL) {
  188. hfi_device->res->sw_power_collapsible = 0;
  189. } else if (val > MIN_PC_INTERVAL) {
  190. hfi_device->res->sw_power_collapsible = 1;
  191. hfi_device->res->msm_cvp_pwr_collapse_delay =
  192. (unsigned int)val;
  193. }
  194. if (core->state == CVP_CORE_UNINIT)
  195. return -EINVAL;
  196. if (val > 0) {
  197. rc = call_hfi_op(hfi_ops, resume, hfi_ops->hfi_device_data);
  198. if (rc)
  199. dprintk(CVP_ERR, "debugfs fail to power on cvp\n");
  200. }
  201. return rc;
  202. }
  203. DEFINE_DEBUGFS_ATTRIBUTE(cvp_pwr_fops, cvp_power_get, cvp_power_set, "%llu\n");
  204. struct dentry *msm_cvp_debugfs_init_drv(void)
  205. {
  206. struct dentry *dir = NULL;
  207. dir = debugfs_create_dir("msm_cvp", NULL);
  208. if (IS_ERR_OR_NULL(dir)) {
  209. dir = NULL;
  210. goto failed_create_dir;
  211. }
  212. debugfs_create_x32("debug_level", 0644, dir, &msm_cvp_debug);
  213. debugfs_create_x32("fw_level", 0644, dir, &msm_cvp_fw_debug);
  214. debugfs_create_u32("fw_debug_mode", 0644, dir, &msm_cvp_fw_debug_mode);
  215. debugfs_create_u32("fw_low_power_mode", 0644, dir,
  216. &msm_cvp_fw_low_power_mode);
  217. debugfs_create_u32("debug_output", 0644, dir, &msm_cvp_debug_out);
  218. debugfs_create_u32("minidump_enable", 0644, dir,
  219. &msm_cvp_minidump_enable);
  220. debugfs_create_bool("fw_coverage", 0644, dir, &msm_cvp_fw_coverage);
  221. debugfs_create_bool("auto_pil", 0644, dir, &msm_cvp_auto_pil);
  222. debugfs_create_u32("kernel_fence", 0644, dir, &cvp_kernel_fence_enabled);
  223. debugfs_create_bool("disable_thermal_mitigation", 0644, dir,
  224. &msm_cvp_thermal_mitigation_disabled);
  225. debugfs_create_bool("enable_cacheop", 0644, dir,
  226. &msm_cvp_cacheop_enabled);
  227. debugfs_create_bool("disable_cvp_syscache", 0644, dir,
  228. &msm_cvp_syscache_disable);
  229. debugfs_create_bool("disable_dcvs", 0644, dir,
  230. &msm_cvp_dcvs_disable);
  231. debugfs_create_file("cvp_power", 0644, dir, NULL, &cvp_pwr_fops);
  232. return dir;
  233. failed_create_dir:
  234. if (dir)
  235. debugfs_remove_recursive(cvp_driver->debugfs_root);
  236. dprintk(CVP_WARN, "Failed to create debugfs\n");
  237. return NULL;
  238. }
  239. static int _clk_rate_set(void *data, u64 val)
  240. {
  241. struct msm_cvp_core *core;
  242. struct cvp_hfi_device *dev;
  243. struct allowed_clock_rates_table *tbl = NULL;
  244. unsigned int tbl_size, i;
  245. core = cvp_driver->cvp_core;
  246. dev = core->device;
  247. tbl = core->resources.allowed_clks_tbl;
  248. tbl_size = core->resources.allowed_clks_tbl_size;
  249. if (val == 0) {
  250. struct iris_hfi_device *hdev = dev->hfi_device_data;
  251. msm_cvp_clock_voting = 0;
  252. call_hfi_op(dev, scale_clocks, hdev, hdev->clk_freq);
  253. return 0;
  254. }
  255. for (i = 0; i < tbl_size; i++)
  256. if (val <= tbl[i].clock_rate)
  257. break;
  258. if (i == tbl_size)
  259. msm_cvp_clock_voting = tbl[tbl_size-1].clock_rate;
  260. else
  261. msm_cvp_clock_voting = tbl[i].clock_rate;
  262. dprintk(CVP_WARN, "Override cvp_clk_rate with %d\n",
  263. msm_cvp_clock_voting);
  264. call_hfi_op(dev, scale_clocks, dev->hfi_device_data,
  265. msm_cvp_clock_voting);
  266. return 0;
  267. }
  268. static int _clk_rate_get(void *data, u64 *val)
  269. {
  270. struct msm_cvp_core *core;
  271. struct iris_hfi_device *hdev;
  272. core = cvp_driver->cvp_core;
  273. hdev = core->device->hfi_device_data;
  274. if (msm_cvp_clock_voting)
  275. *val = msm_cvp_clock_voting;
  276. else
  277. *val = hdev->clk_freq;
  278. return 0;
  279. }
  280. DEFINE_DEBUGFS_ATTRIBUTE(clk_rate_fops, _clk_rate_get, _clk_rate_set, "%llu\n");
  281. static int _dsp_dbg_set(void *data, u64 val)
  282. {
  283. gfa_cv.debug_mask = (uint32_t)val;
  284. cvp_dsp_send_debug_mask();
  285. return 0;
  286. }
  287. static int _dsp_dbg_get(void *data, u64 *val)
  288. {
  289. *val = gfa_cv.debug_mask;
  290. return 0;
  291. }
  292. DEFINE_DEBUGFS_ATTRIBUTE(dsp_debug_fops, _dsp_dbg_get, _dsp_dbg_set, "%llu\n");
  293. static int _max_ssr_set(void *data, u64 val)
  294. {
  295. struct msm_cvp_core *core;
  296. core = cvp_driver->cvp_core;
  297. if (core) {
  298. if (val < 1) {
  299. dprintk(CVP_WARN,
  300. "Invalid max_ssr_allowed value %llx\n", val);
  301. return 0;
  302. }
  303. core->resources.max_ssr_allowed = (unsigned int)val;
  304. }
  305. return 0;
  306. }
  307. static int _max_ssr_get(void *data, u64 *val)
  308. {
  309. struct msm_cvp_core *core;
  310. core = cvp_driver->cvp_core;
  311. if (core)
  312. *val = core->resources.max_ssr_allowed;
  313. return 0;
  314. }
  315. DEFINE_DEBUGFS_ATTRIBUTE(max_ssr_fops, _max_ssr_get, _max_ssr_set, "%llu\n");
  316. static int _ssr_stall_set(void *data, u64 val)
  317. {
  318. struct msm_cvp_core *core;
  319. core = cvp_driver->cvp_core;
  320. if (core)
  321. core->resources.fatal_ssr = (val >= 1) ? true : false;
  322. return 0;
  323. }
  324. static int _ssr_stall_get(void *data, u64 *val)
  325. {
  326. struct msm_cvp_core *core;
  327. core = cvp_driver->cvp_core;
  328. if (core)
  329. *val = core->resources.fatal_ssr ? 1 : 0;
  330. return 0;
  331. }
  332. DEFINE_DEBUGFS_ATTRIBUTE(ssr_stall_fops, _ssr_stall_get, _ssr_stall_set, "%llu\n");
  333. struct dentry *msm_cvp_debugfs_init_core(struct msm_cvp_core *core,
  334. struct dentry *parent)
  335. {
  336. struct dentry *dir = NULL;
  337. char debugfs_name[MAX_DEBUGFS_NAME];
  338. if (!core) {
  339. dprintk(CVP_ERR, "Invalid params, core: %pK\n", core);
  340. goto failed_create_dir;
  341. }
  342. snprintf(debugfs_name, MAX_DEBUGFS_NAME, "core%d", 0);
  343. dir = debugfs_create_dir(debugfs_name, parent);
  344. if (IS_ERR_OR_NULL(dir)) {
  345. dir = NULL;
  346. dprintk(CVP_ERR, "Failed to create debugfs for msm_cvp\n");
  347. goto failed_create_dir;
  348. }
  349. if (!debugfs_create_file("info", 0444, dir, core, &core_info_fops)) {
  350. dprintk(CVP_ERR, "debugfs_create_file: fail\n");
  351. goto failed_create_dir;
  352. }
  353. if (!debugfs_create_file("trigger_ssr", 0200,
  354. dir, core, &ssr_fops)) {
  355. dprintk(CVP_ERR, "debugfs_create_file: fail\n");
  356. goto failed_create_dir;
  357. }
  358. if (!debugfs_create_file("clock_rate", 0644, dir,
  359. NULL, &clk_rate_fops)) {
  360. dprintk(CVP_ERR, "debugfs_create_file: clock_rate fail\n");
  361. goto failed_create_dir;
  362. }
  363. if (!debugfs_create_file("dsp_debug_level", 0644, dir,
  364. NULL, &dsp_debug_fops)) {
  365. dprintk(CVP_ERR, "debugfs_create: dsp_debug_level fail\n");
  366. goto failed_create_dir;
  367. }
  368. if (!debugfs_create_file("max_ssr_allowed", 0644, dir,
  369. NULL, &max_ssr_fops)) {
  370. dprintk(CVP_ERR, "debugfs_create: max_ssr_allowed fail\n");
  371. goto failed_create_dir;
  372. }
  373. if (!debugfs_create_file("ssr_stall", 0644, dir,
  374. NULL, &ssr_stall_fops)) {
  375. dprintk(CVP_ERR, "debugfs_create: ssr_stall fail\n");
  376. goto failed_create_dir;
  377. }
  378. debugfs_create_u32("hw_wd_recovery", 0644, dir,
  379. &msm_cvp_hw_wd_recovery);
  380. failed_create_dir:
  381. return dir;
  382. }
  383. static int inst_info_open(struct inode *inode, struct file *file)
  384. {
  385. dprintk(CVP_INFO, "Open inode ptr: %pK\n", inode->i_private);
  386. file->private_data = inode->i_private;
  387. return 0;
  388. }
  389. static int publish_unreleased_reference(struct msm_cvp_inst *inst,
  390. char **dbuf, char *end)
  391. {
  392. dprintk(CVP_SESS, "%s deprecated function\n", __func__);
  393. return 0;
  394. }
  395. static void put_inst_helper(struct kref *kref)
  396. {
  397. struct msm_cvp_inst *inst;
  398. if (!kref)
  399. return;
  400. inst = container_of(kref, struct msm_cvp_inst, kref);
  401. msm_cvp_destroy(inst);
  402. }
  403. static ssize_t inst_info_read(struct file *file, char __user *buf,
  404. size_t count, loff_t *ppos)
  405. {
  406. struct cvp_core_inst_pair *idata = file->private_data;
  407. struct msm_cvp_core *core;
  408. struct msm_cvp_inst *inst, *temp = NULL;
  409. char *dbuf, *cur, *end;
  410. int i;
  411. ssize_t len = 0;
  412. if (!idata || !idata->core || !idata->inst) {
  413. dprintk(CVP_ERR, "%s: Invalid params\n", __func__);
  414. return 0;
  415. }
  416. core = idata->core;
  417. inst = idata->inst;
  418. mutex_lock(&core->lock);
  419. list_for_each_entry(temp, &core->instances, list) {
  420. if (temp == inst)
  421. break;
  422. }
  423. inst = ((temp == inst) && kref_get_unless_zero(&inst->kref)) ?
  424. inst : NULL;
  425. mutex_unlock(&core->lock);
  426. if (!inst) {
  427. dprintk(CVP_ERR, "%s: Instance has become obsolete", __func__);
  428. return 0;
  429. }
  430. dbuf = kzalloc(MAX_DBG_BUF_SIZE, GFP_KERNEL);
  431. if (!dbuf) {
  432. dprintk(CVP_ERR, "%s: Allocation failed!\n", __func__);
  433. len = -ENOMEM;
  434. goto failed_alloc;
  435. }
  436. cur = dbuf;
  437. end = cur + MAX_DBG_BUF_SIZE;
  438. cur += write_str(cur, end - cur, "==============================\n");
  439. cur += write_str(cur, end - cur, "INSTANCE: %pK (%s)\n", inst,
  440. inst->session_type == MSM_CVP_USER ? "User" : "Kernel");
  441. cur += write_str(cur, end - cur, "==============================\n");
  442. cur += write_str(cur, end - cur, "core: %pK\n", inst->core);
  443. cur += write_str(cur, end - cur, "state: %d\n", inst->state);
  444. cur += write_str(cur, end - cur, "secure: %d\n",
  445. !!(inst->flags & CVP_SECURE));
  446. for (i = SESSION_MSG_START; i < SESSION_MSG_END; i++) {
  447. cur += write_str(cur, end - cur, "completions[%d]: %s\n", i,
  448. completion_done(&inst->completions[SESSION_MSG_INDEX(i)]) ?
  449. "pending" : "done");
  450. }
  451. publish_unreleased_reference(inst, &cur, end);
  452. len = simple_read_from_buffer(buf, count, ppos,
  453. dbuf, cur - dbuf);
  454. kfree(dbuf);
  455. failed_alloc:
  456. kref_put(&inst->kref, put_inst_helper);
  457. return len;
  458. }
  459. static int inst_info_release(struct inode *inode, struct file *file)
  460. {
  461. dprintk(CVP_INFO, "Release inode ptr: %pK\n", inode->i_private);
  462. file->private_data = NULL;
  463. return 0;
  464. }
  465. static const struct file_operations inst_info_fops = {
  466. .open = inst_info_open,
  467. .read = inst_info_read,
  468. .release = inst_info_release,
  469. };
  470. struct dentry *msm_cvp_debugfs_init_inst(struct msm_cvp_inst *inst,
  471. struct dentry *parent)
  472. {
  473. struct dentry *dir = NULL, *info = NULL;
  474. char debugfs_name[MAX_DEBUGFS_NAME];
  475. struct cvp_core_inst_pair *idata = NULL;
  476. if (!inst) {
  477. dprintk(CVP_ERR, "Invalid params, inst: %pK\n", inst);
  478. goto exit;
  479. }
  480. snprintf(debugfs_name, MAX_DEBUGFS_NAME, "inst_%pK", inst);
  481. idata = kzalloc(sizeof(*idata), GFP_KERNEL);
  482. if (!idata) {
  483. dprintk(CVP_ERR, "%s: Allocation failed!\n", __func__);
  484. goto exit;
  485. }
  486. idata->core = inst->core;
  487. idata->inst = inst;
  488. dir = debugfs_create_dir(debugfs_name, parent);
  489. if (IS_ERR_OR_NULL(dir)) {
  490. dir = NULL;
  491. dprintk(CVP_ERR, "Failed to create debugfs for msm_cvp\n");
  492. goto failed_create_dir;
  493. }
  494. info = debugfs_create_file("info", 0444, dir,
  495. idata, &inst_info_fops);
  496. if (!info) {
  497. dprintk(CVP_ERR, "debugfs_create_file: info fail\n");
  498. goto failed_create_file;
  499. }
  500. dir->d_inode->i_private = info->d_inode->i_private;
  501. inst->debug.pdata[FRAME_PROCESSING].sampling = true;
  502. return dir;
  503. failed_create_file:
  504. debugfs_remove_recursive(dir);
  505. dir = NULL;
  506. failed_create_dir:
  507. kfree(idata);
  508. exit:
  509. return dir;
  510. }
  511. void msm_cvp_debugfs_deinit_inst(struct msm_cvp_inst *inst)
  512. {
  513. struct dentry *dentry = NULL;
  514. if (!inst || !inst->debugfs_root)
  515. return;
  516. dentry = inst->debugfs_root;
  517. if (dentry->d_inode) {
  518. dprintk(CVP_INFO, "Destroy %pK\n", dentry->d_inode->i_private);
  519. kfree(dentry->d_inode->i_private);
  520. dentry->d_inode->i_private = NULL;
  521. }
  522. debugfs_remove_recursive(dentry);
  523. inst->debugfs_root = NULL;
  524. }