1 /* 2 * Copyright 2014 Advanced Micro Devices, Inc. 3 * 4 * Permission is hereby granted, free of charge, to any person obtaining a 5 * copy of this software and associated documentation files (the "Software"), 6 * to deal in the Software without restriction, including without limitation 7 * the rights to use, copy, modify, merge, publish, distribute, sublicense, 8 * and/or sell copies of the Software, and to permit persons to whom the 9 * Software is furnished to do so, subject to the following conditions: 10 * 11 * The above copyright notice and this permission notice shall be included in 12 * all copies or substantial portions of the Software. 13 * 14 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 15 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 16 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL 17 * THE COPYRIGHT HOLDER(S) OR AUTHOR(S) BE LIABLE FOR ANY CLAIM, DAMAGES OR 18 * OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, 19 * ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR 20 * OTHER DEALINGS IN THE SOFTWARE. 21 */ 22 23 #include <linux/mutex.h> 24 #include <linux/log2.h> 25 #include <linux/sched.h> 26 #include <linux/sched/mm.h> 27 #include <linux/sched/task.h> 28 #include <linux/slab.h> 29 #include <linux/amd-iommu.h> 30 #include <linux/notifier.h> 31 #include <linux/compat.h> 32 #include <linux/mman.h> 33 #include <linux/file.h> 34 #include "amdgpu_amdkfd.h" 35 36 struct mm_struct; 37 38 #include "kfd_priv.h" 39 #include "kfd_device_queue_manager.h" 40 #include "kfd_dbgmgr.h" 41 #include "kfd_iommu.h" 42 43 /* 44 * List of struct kfd_process (field kfd_process). 45 * Unique/indexed by mm_struct* 46 */ 47 DEFINE_HASHTABLE(kfd_processes_table, KFD_PROCESS_TABLE_SIZE); 48 static DEFINE_MUTEX(kfd_processes_mutex); 49 50 DEFINE_SRCU(kfd_processes_srcu); 51 52 /* For process termination handling */ 53 static struct workqueue_struct *kfd_process_wq; 54 55 /* Ordered, single-threaded workqueue for restoring evicted 56 * processes. Restoring multiple processes concurrently under memory 57 * pressure can lead to processes blocking each other from validating 58 * their BOs and result in a live-lock situation where processes 59 * remain evicted indefinitely. 60 */ 61 static struct workqueue_struct *kfd_restore_wq; 62 63 static struct kfd_process *find_process(const struct task_struct *thread); 64 static void kfd_process_ref_release(struct kref *ref); 65 static struct kfd_process *create_process(const struct task_struct *thread); 66 static int kfd_process_init_cwsr_apu(struct kfd_process *p, struct file *filep); 67 68 static void evict_process_worker(struct work_struct *work); 69 static void restore_process_worker(struct work_struct *work); 70 71 struct kfd_procfs_tree { 72 struct kobject *kobj; 73 }; 74 75 static struct kfd_procfs_tree procfs; 76 77 static ssize_t kfd_procfs_show(struct kobject *kobj, struct attribute *attr, 78 char *buffer) 79 { 80 int val = 0; 81 82 if (strcmp(attr->name, "pasid") == 0) { 83 struct kfd_process *p = container_of(attr, struct kfd_process, 84 attr_pasid); 85 val = p->pasid; 86 } else { 87 pr_err("Invalid attribute"); 88 return -EINVAL; 89 } 90 91 return snprintf(buffer, PAGE_SIZE, "%d\n", val); 92 } 93 94 static void kfd_procfs_kobj_release(struct kobject *kobj) 95 { 96 kfree(kobj); 97 } 98 99 static const struct sysfs_ops kfd_procfs_ops = { 100 .show = kfd_procfs_show, 101 }; 102 103 static struct kobj_type procfs_type = { 104 .release = kfd_procfs_kobj_release, 105 .sysfs_ops = &kfd_procfs_ops, 106 }; 107 108 void kfd_procfs_init(void) 109 { 110 int ret = 0; 111 112 procfs.kobj = kfd_alloc_struct(procfs.kobj); 113 if (!procfs.kobj) 114 return; 115 116 ret = kobject_init_and_add(procfs.kobj, &procfs_type, 117 &kfd_device->kobj, "proc"); 118 if (ret) { 119 pr_warn("Could not create procfs proc folder"); 120 /* If we fail to create the procfs, clean up */ 121 kfd_procfs_shutdown(); 122 } 123 } 124 125 void kfd_procfs_shutdown(void) 126 { 127 if (procfs.kobj) { 128 kobject_del(procfs.kobj); 129 kobject_put(procfs.kobj); 130 procfs.kobj = NULL; 131 } 132 } 133 134 int kfd_process_create_wq(void) 135 { 136 if (!kfd_process_wq) 137 kfd_process_wq = alloc_workqueue("kfd_process_wq", 0, 0); 138 if (!kfd_restore_wq) 139 kfd_restore_wq = alloc_ordered_workqueue("kfd_restore_wq", 0); 140 141 if (!kfd_process_wq || !kfd_restore_wq) { 142 kfd_process_destroy_wq(); 143 return -ENOMEM; 144 } 145 146 return 0; 147 } 148 149 void kfd_process_destroy_wq(void) 150 { 151 if (kfd_process_wq) { 152 destroy_workqueue(kfd_process_wq); 153 kfd_process_wq = NULL; 154 } 155 if (kfd_restore_wq) { 156 destroy_workqueue(kfd_restore_wq); 157 kfd_restore_wq = NULL; 158 } 159 } 160 161 static void kfd_process_free_gpuvm(struct kgd_mem *mem, 162 struct kfd_process_device *pdd) 163 { 164 struct kfd_dev *dev = pdd->dev; 165 166 amdgpu_amdkfd_gpuvm_unmap_memory_from_gpu(dev->kgd, mem, pdd->vm); 167 amdgpu_amdkfd_gpuvm_free_memory_of_gpu(dev->kgd, mem); 168 } 169 170 /* kfd_process_alloc_gpuvm - Allocate GPU VM for the KFD process 171 * This function should be only called right after the process 172 * is created and when kfd_processes_mutex is still being held 173 * to avoid concurrency. Because of that exclusiveness, we do 174 * not need to take p->mutex. 175 */ 176 static int kfd_process_alloc_gpuvm(struct kfd_process_device *pdd, 177 uint64_t gpu_va, uint32_t size, 178 uint32_t flags, void **kptr) 179 { 180 struct kfd_dev *kdev = pdd->dev; 181 struct kgd_mem *mem = NULL; 182 int handle; 183 int err; 184 185 err = amdgpu_amdkfd_gpuvm_alloc_memory_of_gpu(kdev->kgd, gpu_va, size, 186 pdd->vm, &mem, NULL, flags); 187 if (err) 188 goto err_alloc_mem; 189 190 err = amdgpu_amdkfd_gpuvm_map_memory_to_gpu(kdev->kgd, mem, pdd->vm); 191 if (err) 192 goto err_map_mem; 193 194 err = amdgpu_amdkfd_gpuvm_sync_memory(kdev->kgd, mem, true); 195 if (err) { 196 pr_debug("Sync memory failed, wait interrupted by user signal\n"); 197 goto sync_memory_failed; 198 } 199 200 /* Create an obj handle so kfd_process_device_remove_obj_handle 201 * will take care of the bo removal when the process finishes. 202 * We do not need to take p->mutex, because the process is just 203 * created and the ioctls have not had the chance to run. 204 */ 205 handle = kfd_process_device_create_obj_handle(pdd, mem); 206 207 if (handle < 0) { 208 err = handle; 209 goto free_gpuvm; 210 } 211 212 if (kptr) { 213 err = amdgpu_amdkfd_gpuvm_map_gtt_bo_to_kernel(kdev->kgd, 214 (struct kgd_mem *)mem, kptr, NULL); 215 if (err) { 216 pr_debug("Map GTT BO to kernel failed\n"); 217 goto free_obj_handle; 218 } 219 } 220 221 return err; 222 223 free_obj_handle: 224 kfd_process_device_remove_obj_handle(pdd, handle); 225 free_gpuvm: 226 sync_memory_failed: 227 kfd_process_free_gpuvm(mem, pdd); 228 return err; 229 230 err_map_mem: 231 amdgpu_amdkfd_gpuvm_free_memory_of_gpu(kdev->kgd, mem); 232 err_alloc_mem: 233 *kptr = NULL; 234 return err; 235 } 236 237 /* kfd_process_device_reserve_ib_mem - Reserve memory inside the 238 * process for IB usage The memory reserved is for KFD to submit 239 * IB to AMDGPU from kernel. If the memory is reserved 240 * successfully, ib_kaddr will have the CPU/kernel 241 * address. Check ib_kaddr before accessing the memory. 242 */ 243 static int kfd_process_device_reserve_ib_mem(struct kfd_process_device *pdd) 244 { 245 struct qcm_process_device *qpd = &pdd->qpd; 246 uint32_t flags = ALLOC_MEM_FLAGS_GTT | 247 ALLOC_MEM_FLAGS_NO_SUBSTITUTE | 248 ALLOC_MEM_FLAGS_WRITABLE | 249 ALLOC_MEM_FLAGS_EXECUTABLE; 250 void *kaddr; 251 int ret; 252 253 if (qpd->ib_kaddr || !qpd->ib_base) 254 return 0; 255 256 /* ib_base is only set for dGPU */ 257 ret = kfd_process_alloc_gpuvm(pdd, qpd->ib_base, PAGE_SIZE, flags, 258 &kaddr); 259 if (ret) 260 return ret; 261 262 qpd->ib_kaddr = kaddr; 263 264 return 0; 265 } 266 267 struct kfd_process *kfd_create_process(struct file *filep) 268 { 269 struct kfd_process *process; 270 struct task_struct *thread = current; 271 int ret; 272 273 if (!thread->mm) 274 return ERR_PTR(-EINVAL); 275 276 /* Only the pthreads threading model is supported. */ 277 if (thread->group_leader->mm != thread->mm) 278 return ERR_PTR(-EINVAL); 279 280 /* 281 * take kfd processes mutex before starting of process creation 282 * so there won't be a case where two threads of the same process 283 * create two kfd_process structures 284 */ 285 mutex_lock(&kfd_processes_mutex); 286 287 /* A prior open of /dev/kfd could have already created the process. */ 288 process = find_process(thread); 289 if (process) { 290 pr_debug("Process already found\n"); 291 } else { 292 process = create_process(thread); 293 if (IS_ERR(process)) 294 goto out; 295 296 ret = kfd_process_init_cwsr_apu(process, filep); 297 if (ret) { 298 process = ERR_PTR(ret); 299 goto out; 300 } 301 302 if (!procfs.kobj) 303 goto out; 304 305 process->kobj = kfd_alloc_struct(process->kobj); 306 if (!process->kobj) { 307 pr_warn("Creating procfs kobject failed"); 308 goto out; 309 } 310 ret = kobject_init_and_add(process->kobj, &procfs_type, 311 procfs.kobj, "%d", 312 (int)process->lead_thread->pid); 313 if (ret) { 314 pr_warn("Creating procfs pid directory failed"); 315 goto out; 316 } 317 318 process->attr_pasid.name = "pasid"; 319 process->attr_pasid.mode = KFD_SYSFS_FILE_MODE; 320 sysfs_attr_init(&process->attr_pasid); 321 ret = sysfs_create_file(process->kobj, &process->attr_pasid); 322 if (ret) 323 pr_warn("Creating pasid for pid %d failed", 324 (int)process->lead_thread->pid); 325 } 326 out: 327 mutex_unlock(&kfd_processes_mutex); 328 329 return process; 330 } 331 332 struct kfd_process *kfd_get_process(const struct task_struct *thread) 333 { 334 struct kfd_process *process; 335 336 if (!thread->mm) 337 return ERR_PTR(-EINVAL); 338 339 /* Only the pthreads threading model is supported. */ 340 if (thread->group_leader->mm != thread->mm) 341 return ERR_PTR(-EINVAL); 342 343 process = find_process(thread); 344 if (!process) 345 return ERR_PTR(-EINVAL); 346 347 return process; 348 } 349 350 static struct kfd_process *find_process_by_mm(const struct mm_struct *mm) 351 { 352 struct kfd_process *process; 353 354 hash_for_each_possible_rcu(kfd_processes_table, process, 355 kfd_processes, (uintptr_t)mm) 356 if (process->mm == mm) 357 return process; 358 359 return NULL; 360 } 361 362 static struct kfd_process *find_process(const struct task_struct *thread) 363 { 364 struct kfd_process *p; 365 int idx; 366 367 idx = srcu_read_lock(&kfd_processes_srcu); 368 p = find_process_by_mm(thread->mm); 369 srcu_read_unlock(&kfd_processes_srcu, idx); 370 371 return p; 372 } 373 374 void kfd_unref_process(struct kfd_process *p) 375 { 376 kref_put(&p->ref, kfd_process_ref_release); 377 } 378 379 static void kfd_process_device_free_bos(struct kfd_process_device *pdd) 380 { 381 struct kfd_process *p = pdd->process; 382 void *mem; 383 int id; 384 385 /* 386 * Remove all handles from idr and release appropriate 387 * local memory object 388 */ 389 idr_for_each_entry(&pdd->alloc_idr, mem, id) { 390 struct kfd_process_device *peer_pdd; 391 392 list_for_each_entry(peer_pdd, &p->per_device_data, 393 per_device_list) { 394 if (!peer_pdd->vm) 395 continue; 396 amdgpu_amdkfd_gpuvm_unmap_memory_from_gpu( 397 peer_pdd->dev->kgd, mem, peer_pdd->vm); 398 } 399 400 amdgpu_amdkfd_gpuvm_free_memory_of_gpu(pdd->dev->kgd, mem); 401 kfd_process_device_remove_obj_handle(pdd, id); 402 } 403 } 404 405 static void kfd_process_free_outstanding_kfd_bos(struct kfd_process *p) 406 { 407 struct kfd_process_device *pdd; 408 409 list_for_each_entry(pdd, &p->per_device_data, per_device_list) 410 kfd_process_device_free_bos(pdd); 411 } 412 413 static void kfd_process_destroy_pdds(struct kfd_process *p) 414 { 415 struct kfd_process_device *pdd, *temp; 416 417 list_for_each_entry_safe(pdd, temp, &p->per_device_data, 418 per_device_list) { 419 pr_debug("Releasing pdd (topology id %d) for process (pasid 0x%x)\n", 420 pdd->dev->id, p->pasid); 421 422 if (pdd->drm_file) { 423 amdgpu_amdkfd_gpuvm_release_process_vm( 424 pdd->dev->kgd, pdd->vm); 425 fput(pdd->drm_file); 426 } 427 else if (pdd->vm) 428 amdgpu_amdkfd_gpuvm_destroy_process_vm( 429 pdd->dev->kgd, pdd->vm); 430 431 list_del(&pdd->per_device_list); 432 433 if (pdd->qpd.cwsr_kaddr && !pdd->qpd.cwsr_base) 434 free_pages((unsigned long)pdd->qpd.cwsr_kaddr, 435 get_order(KFD_CWSR_TBA_TMA_SIZE)); 436 437 kfree(pdd->qpd.doorbell_bitmap); 438 idr_destroy(&pdd->alloc_idr); 439 440 kfree(pdd); 441 } 442 } 443 444 /* No process locking is needed in this function, because the process 445 * is not findable any more. We must assume that no other thread is 446 * using it any more, otherwise we couldn't safely free the process 447 * structure in the end. 448 */ 449 static void kfd_process_wq_release(struct work_struct *work) 450 { 451 struct kfd_process *p = container_of(work, struct kfd_process, 452 release_work); 453 454 /* Remove the procfs files */ 455 if (p->kobj) { 456 sysfs_remove_file(p->kobj, &p->attr_pasid); 457 kobject_del(p->kobj); 458 kobject_put(p->kobj); 459 p->kobj = NULL; 460 } 461 462 kfd_iommu_unbind_process(p); 463 464 kfd_process_free_outstanding_kfd_bos(p); 465 466 kfd_process_destroy_pdds(p); 467 dma_fence_put(p->ef); 468 469 kfd_event_free_process(p); 470 471 kfd_pasid_free(p->pasid); 472 kfd_free_process_doorbells(p); 473 474 mutex_destroy(&p->mutex); 475 476 put_task_struct(p->lead_thread); 477 478 kfree(p); 479 } 480 481 static void kfd_process_ref_release(struct kref *ref) 482 { 483 struct kfd_process *p = container_of(ref, struct kfd_process, ref); 484 485 INIT_WORK(&p->release_work, kfd_process_wq_release); 486 queue_work(kfd_process_wq, &p->release_work); 487 } 488 489 static void kfd_process_free_notifier(struct mmu_notifier *mn) 490 { 491 kfd_unref_process(container_of(mn, struct kfd_process, mmu_notifier)); 492 } 493 494 static void kfd_process_notifier_release(struct mmu_notifier *mn, 495 struct mm_struct *mm) 496 { 497 struct kfd_process *p; 498 struct kfd_process_device *pdd = NULL; 499 500 /* 501 * The kfd_process structure can not be free because the 502 * mmu_notifier srcu is read locked 503 */ 504 p = container_of(mn, struct kfd_process, mmu_notifier); 505 if (WARN_ON(p->mm != mm)) 506 return; 507 508 mutex_lock(&kfd_processes_mutex); 509 hash_del_rcu(&p->kfd_processes); 510 mutex_unlock(&kfd_processes_mutex); 511 synchronize_srcu(&kfd_processes_srcu); 512 513 cancel_delayed_work_sync(&p->eviction_work); 514 cancel_delayed_work_sync(&p->restore_work); 515 516 mutex_lock(&p->mutex); 517 518 /* Iterate over all process device data structures and if the 519 * pdd is in debug mode, we should first force unregistration, 520 * then we will be able to destroy the queues 521 */ 522 list_for_each_entry(pdd, &p->per_device_data, per_device_list) { 523 struct kfd_dev *dev = pdd->dev; 524 525 mutex_lock(kfd_get_dbgmgr_mutex()); 526 if (dev && dev->dbgmgr && dev->dbgmgr->pasid == p->pasid) { 527 if (!kfd_dbgmgr_unregister(dev->dbgmgr, p)) { 528 kfd_dbgmgr_destroy(dev->dbgmgr); 529 dev->dbgmgr = NULL; 530 } 531 } 532 mutex_unlock(kfd_get_dbgmgr_mutex()); 533 } 534 535 kfd_process_dequeue_from_all_devices(p); 536 pqm_uninit(&p->pqm); 537 538 /* Indicate to other users that MM is no longer valid */ 539 p->mm = NULL; 540 541 mutex_unlock(&p->mutex); 542 543 mmu_notifier_put(&p->mmu_notifier); 544 } 545 546 static const struct mmu_notifier_ops kfd_process_mmu_notifier_ops = { 547 .release = kfd_process_notifier_release, 548 .free_notifier = kfd_process_free_notifier, 549 }; 550 551 static int kfd_process_init_cwsr_apu(struct kfd_process *p, struct file *filep) 552 { 553 unsigned long offset; 554 struct kfd_process_device *pdd; 555 556 list_for_each_entry(pdd, &p->per_device_data, per_device_list) { 557 struct kfd_dev *dev = pdd->dev; 558 struct qcm_process_device *qpd = &pdd->qpd; 559 560 if (!dev->cwsr_enabled || qpd->cwsr_kaddr || qpd->cwsr_base) 561 continue; 562 563 offset = (KFD_MMAP_TYPE_RESERVED_MEM | KFD_MMAP_GPU_ID(dev->id)) 564 << PAGE_SHIFT; 565 qpd->tba_addr = (int64_t)vm_mmap(filep, 0, 566 KFD_CWSR_TBA_TMA_SIZE, PROT_READ | PROT_EXEC, 567 MAP_SHARED, offset); 568 569 if (IS_ERR_VALUE(qpd->tba_addr)) { 570 int err = qpd->tba_addr; 571 572 pr_err("Failure to set tba address. error %d.\n", err); 573 qpd->tba_addr = 0; 574 qpd->cwsr_kaddr = NULL; 575 return err; 576 } 577 578 memcpy(qpd->cwsr_kaddr, dev->cwsr_isa, dev->cwsr_isa_size); 579 580 qpd->tma_addr = qpd->tba_addr + KFD_CWSR_TMA_OFFSET; 581 pr_debug("set tba :0x%llx, tma:0x%llx, cwsr_kaddr:%p for pqm.\n", 582 qpd->tba_addr, qpd->tma_addr, qpd->cwsr_kaddr); 583 } 584 585 return 0; 586 } 587 588 static int kfd_process_device_init_cwsr_dgpu(struct kfd_process_device *pdd) 589 { 590 struct kfd_dev *dev = pdd->dev; 591 struct qcm_process_device *qpd = &pdd->qpd; 592 uint32_t flags = ALLOC_MEM_FLAGS_GTT | 593 ALLOC_MEM_FLAGS_NO_SUBSTITUTE | ALLOC_MEM_FLAGS_EXECUTABLE; 594 void *kaddr; 595 int ret; 596 597 if (!dev->cwsr_enabled || qpd->cwsr_kaddr || !qpd->cwsr_base) 598 return 0; 599 600 /* cwsr_base is only set for dGPU */ 601 ret = kfd_process_alloc_gpuvm(pdd, qpd->cwsr_base, 602 KFD_CWSR_TBA_TMA_SIZE, flags, &kaddr); 603 if (ret) 604 return ret; 605 606 qpd->cwsr_kaddr = kaddr; 607 qpd->tba_addr = qpd->cwsr_base; 608 609 memcpy(qpd->cwsr_kaddr, dev->cwsr_isa, dev->cwsr_isa_size); 610 611 qpd->tma_addr = qpd->tba_addr + KFD_CWSR_TMA_OFFSET; 612 pr_debug("set tba :0x%llx, tma:0x%llx, cwsr_kaddr:%p for pqm.\n", 613 qpd->tba_addr, qpd->tma_addr, qpd->cwsr_kaddr); 614 615 return 0; 616 } 617 618 /* 619 * On return the kfd_process is fully operational and will be freed when the 620 * mm is released 621 */ 622 static struct kfd_process *create_process(const struct task_struct *thread) 623 { 624 struct kfd_process *process; 625 int err = -ENOMEM; 626 627 process = kzalloc(sizeof(*process), GFP_KERNEL); 628 if (!process) 629 goto err_alloc_process; 630 631 kref_init(&process->ref); 632 mutex_init(&process->mutex); 633 process->mm = thread->mm; 634 process->lead_thread = thread->group_leader; 635 INIT_LIST_HEAD(&process->per_device_data); 636 INIT_DELAYED_WORK(&process->eviction_work, evict_process_worker); 637 INIT_DELAYED_WORK(&process->restore_work, restore_process_worker); 638 process->last_restore_timestamp = get_jiffies_64(); 639 kfd_event_init_process(process); 640 process->is_32bit_user_mode = in_compat_syscall(); 641 642 process->pasid = kfd_pasid_alloc(); 643 if (process->pasid == 0) 644 goto err_alloc_pasid; 645 646 if (kfd_alloc_process_doorbells(process) < 0) 647 goto err_alloc_doorbells; 648 649 err = pqm_init(&process->pqm, process); 650 if (err != 0) 651 goto err_process_pqm_init; 652 653 /* init process apertures*/ 654 err = kfd_init_apertures(process); 655 if (err != 0) 656 goto err_init_apertures; 657 658 /* Must be last, have to use release destruction after this */ 659 process->mmu_notifier.ops = &kfd_process_mmu_notifier_ops; 660 err = mmu_notifier_register(&process->mmu_notifier, process->mm); 661 if (err) 662 goto err_register_notifier; 663 664 get_task_struct(process->lead_thread); 665 hash_add_rcu(kfd_processes_table, &process->kfd_processes, 666 (uintptr_t)process->mm); 667 668 return process; 669 670 err_register_notifier: 671 kfd_process_free_outstanding_kfd_bos(process); 672 kfd_process_destroy_pdds(process); 673 err_init_apertures: 674 pqm_uninit(&process->pqm); 675 err_process_pqm_init: 676 kfd_free_process_doorbells(process); 677 err_alloc_doorbells: 678 kfd_pasid_free(process->pasid); 679 err_alloc_pasid: 680 mutex_destroy(&process->mutex); 681 kfree(process); 682 err_alloc_process: 683 return ERR_PTR(err); 684 } 685 686 static int init_doorbell_bitmap(struct qcm_process_device *qpd, 687 struct kfd_dev *dev) 688 { 689 unsigned int i; 690 int range_start = dev->shared_resources.non_cp_doorbells_start; 691 int range_end = dev->shared_resources.non_cp_doorbells_end; 692 693 if (!KFD_IS_SOC15(dev->device_info->asic_family)) 694 return 0; 695 696 qpd->doorbell_bitmap = 697 kzalloc(DIV_ROUND_UP(KFD_MAX_NUM_OF_QUEUES_PER_PROCESS, 698 BITS_PER_BYTE), GFP_KERNEL); 699 if (!qpd->doorbell_bitmap) 700 return -ENOMEM; 701 702 /* Mask out doorbells reserved for SDMA, IH, and VCN on SOC15. */ 703 pr_debug("reserved doorbell 0x%03x - 0x%03x\n", range_start, range_end); 704 pr_debug("reserved doorbell 0x%03x - 0x%03x\n", 705 range_start + KFD_QUEUE_DOORBELL_MIRROR_OFFSET, 706 range_end + KFD_QUEUE_DOORBELL_MIRROR_OFFSET); 707 708 for (i = 0; i < KFD_MAX_NUM_OF_QUEUES_PER_PROCESS / 2; i++) { 709 if (i >= range_start && i <= range_end) { 710 set_bit(i, qpd->doorbell_bitmap); 711 set_bit(i + KFD_QUEUE_DOORBELL_MIRROR_OFFSET, 712 qpd->doorbell_bitmap); 713 } 714 } 715 716 return 0; 717 } 718 719 struct kfd_process_device *kfd_get_process_device_data(struct kfd_dev *dev, 720 struct kfd_process *p) 721 { 722 struct kfd_process_device *pdd = NULL; 723 724 list_for_each_entry(pdd, &p->per_device_data, per_device_list) 725 if (pdd->dev == dev) 726 return pdd; 727 728 return NULL; 729 } 730 731 struct kfd_process_device *kfd_create_process_device_data(struct kfd_dev *dev, 732 struct kfd_process *p) 733 { 734 struct kfd_process_device *pdd = NULL; 735 736 pdd = kzalloc(sizeof(*pdd), GFP_KERNEL); 737 if (!pdd) 738 return NULL; 739 740 if (init_doorbell_bitmap(&pdd->qpd, dev)) { 741 pr_err("Failed to init doorbell for process\n"); 742 kfree(pdd); 743 return NULL; 744 } 745 746 pdd->dev = dev; 747 INIT_LIST_HEAD(&pdd->qpd.queues_list); 748 INIT_LIST_HEAD(&pdd->qpd.priv_queue_list); 749 pdd->qpd.dqm = dev->dqm; 750 pdd->qpd.pqm = &p->pqm; 751 pdd->qpd.evicted = 0; 752 pdd->process = p; 753 pdd->bound = PDD_UNBOUND; 754 pdd->already_dequeued = false; 755 list_add(&pdd->per_device_list, &p->per_device_data); 756 757 /* Init idr used for memory handle translation */ 758 idr_init(&pdd->alloc_idr); 759 760 return pdd; 761 } 762 763 /** 764 * kfd_process_device_init_vm - Initialize a VM for a process-device 765 * 766 * @pdd: The process-device 767 * @drm_file: Optional pointer to a DRM file descriptor 768 * 769 * If @drm_file is specified, it will be used to acquire the VM from 770 * that file descriptor. If successful, the @pdd takes ownership of 771 * the file descriptor. 772 * 773 * If @drm_file is NULL, a new VM is created. 774 * 775 * Returns 0 on success, -errno on failure. 776 */ 777 int kfd_process_device_init_vm(struct kfd_process_device *pdd, 778 struct file *drm_file) 779 { 780 struct kfd_process *p; 781 struct kfd_dev *dev; 782 int ret; 783 784 if (pdd->vm) 785 return drm_file ? -EBUSY : 0; 786 787 p = pdd->process; 788 dev = pdd->dev; 789 790 if (drm_file) 791 ret = amdgpu_amdkfd_gpuvm_acquire_process_vm( 792 dev->kgd, drm_file, p->pasid, 793 &pdd->vm, &p->kgd_process_info, &p->ef); 794 else 795 ret = amdgpu_amdkfd_gpuvm_create_process_vm(dev->kgd, p->pasid, 796 &pdd->vm, &p->kgd_process_info, &p->ef); 797 if (ret) { 798 pr_err("Failed to create process VM object\n"); 799 return ret; 800 } 801 802 amdgpu_vm_set_task_info(pdd->vm); 803 804 ret = kfd_process_device_reserve_ib_mem(pdd); 805 if (ret) 806 goto err_reserve_ib_mem; 807 ret = kfd_process_device_init_cwsr_dgpu(pdd); 808 if (ret) 809 goto err_init_cwsr; 810 811 pdd->drm_file = drm_file; 812 813 return 0; 814 815 err_init_cwsr: 816 err_reserve_ib_mem: 817 kfd_process_device_free_bos(pdd); 818 if (!drm_file) 819 amdgpu_amdkfd_gpuvm_destroy_process_vm(dev->kgd, pdd->vm); 820 pdd->vm = NULL; 821 822 return ret; 823 } 824 825 /* 826 * Direct the IOMMU to bind the process (specifically the pasid->mm) 827 * to the device. 828 * Unbinding occurs when the process dies or the device is removed. 829 * 830 * Assumes that the process lock is held. 831 */ 832 struct kfd_process_device *kfd_bind_process_to_device(struct kfd_dev *dev, 833 struct kfd_process *p) 834 { 835 struct kfd_process_device *pdd; 836 int err; 837 838 pdd = kfd_get_process_device_data(dev, p); 839 if (!pdd) { 840 pr_err("Process device data doesn't exist\n"); 841 return ERR_PTR(-ENOMEM); 842 } 843 844 err = kfd_iommu_bind_process_to_device(pdd); 845 if (err) 846 return ERR_PTR(err); 847 848 err = kfd_process_device_init_vm(pdd, NULL); 849 if (err) 850 return ERR_PTR(err); 851 852 return pdd; 853 } 854 855 struct kfd_process_device *kfd_get_first_process_device_data( 856 struct kfd_process *p) 857 { 858 return list_first_entry(&p->per_device_data, 859 struct kfd_process_device, 860 per_device_list); 861 } 862 863 struct kfd_process_device *kfd_get_next_process_device_data( 864 struct kfd_process *p, 865 struct kfd_process_device *pdd) 866 { 867 if (list_is_last(&pdd->per_device_list, &p->per_device_data)) 868 return NULL; 869 return list_next_entry(pdd, per_device_list); 870 } 871 872 bool kfd_has_process_device_data(struct kfd_process *p) 873 { 874 return !(list_empty(&p->per_device_data)); 875 } 876 877 /* Create specific handle mapped to mem from process local memory idr 878 * Assumes that the process lock is held. 879 */ 880 int kfd_process_device_create_obj_handle(struct kfd_process_device *pdd, 881 void *mem) 882 { 883 return idr_alloc(&pdd->alloc_idr, mem, 0, 0, GFP_KERNEL); 884 } 885 886 /* Translate specific handle from process local memory idr 887 * Assumes that the process lock is held. 888 */ 889 void *kfd_process_device_translate_handle(struct kfd_process_device *pdd, 890 int handle) 891 { 892 if (handle < 0) 893 return NULL; 894 895 return idr_find(&pdd->alloc_idr, handle); 896 } 897 898 /* Remove specific handle from process local memory idr 899 * Assumes that the process lock is held. 900 */ 901 void kfd_process_device_remove_obj_handle(struct kfd_process_device *pdd, 902 int handle) 903 { 904 if (handle >= 0) 905 idr_remove(&pdd->alloc_idr, handle); 906 } 907 908 /* This increments the process->ref counter. */ 909 struct kfd_process *kfd_lookup_process_by_pasid(unsigned int pasid) 910 { 911 struct kfd_process *p, *ret_p = NULL; 912 unsigned int temp; 913 914 int idx = srcu_read_lock(&kfd_processes_srcu); 915 916 hash_for_each_rcu(kfd_processes_table, temp, p, kfd_processes) { 917 if (p->pasid == pasid) { 918 kref_get(&p->ref); 919 ret_p = p; 920 break; 921 } 922 } 923 924 srcu_read_unlock(&kfd_processes_srcu, idx); 925 926 return ret_p; 927 } 928 929 /* This increments the process->ref counter. */ 930 struct kfd_process *kfd_lookup_process_by_mm(const struct mm_struct *mm) 931 { 932 struct kfd_process *p; 933 934 int idx = srcu_read_lock(&kfd_processes_srcu); 935 936 p = find_process_by_mm(mm); 937 if (p) 938 kref_get(&p->ref); 939 940 srcu_read_unlock(&kfd_processes_srcu, idx); 941 942 return p; 943 } 944 945 /* process_evict_queues - Evict all user queues of a process 946 * 947 * Eviction is reference-counted per process-device. This means multiple 948 * evictions from different sources can be nested safely. 949 */ 950 int kfd_process_evict_queues(struct kfd_process *p) 951 { 952 struct kfd_process_device *pdd; 953 int r = 0; 954 unsigned int n_evicted = 0; 955 956 list_for_each_entry(pdd, &p->per_device_data, per_device_list) { 957 r = pdd->dev->dqm->ops.evict_process_queues(pdd->dev->dqm, 958 &pdd->qpd); 959 if (r) { 960 pr_err("Failed to evict process queues\n"); 961 goto fail; 962 } 963 n_evicted++; 964 } 965 966 return r; 967 968 fail: 969 /* To keep state consistent, roll back partial eviction by 970 * restoring queues 971 */ 972 list_for_each_entry(pdd, &p->per_device_data, per_device_list) { 973 if (n_evicted == 0) 974 break; 975 if (pdd->dev->dqm->ops.restore_process_queues(pdd->dev->dqm, 976 &pdd->qpd)) 977 pr_err("Failed to restore queues\n"); 978 979 n_evicted--; 980 } 981 982 return r; 983 } 984 985 /* process_restore_queues - Restore all user queues of a process */ 986 int kfd_process_restore_queues(struct kfd_process *p) 987 { 988 struct kfd_process_device *pdd; 989 int r, ret = 0; 990 991 list_for_each_entry(pdd, &p->per_device_data, per_device_list) { 992 r = pdd->dev->dqm->ops.restore_process_queues(pdd->dev->dqm, 993 &pdd->qpd); 994 if (r) { 995 pr_err("Failed to restore process queues\n"); 996 if (!ret) 997 ret = r; 998 } 999 } 1000 1001 return ret; 1002 } 1003 1004 static void evict_process_worker(struct work_struct *work) 1005 { 1006 int ret; 1007 struct kfd_process *p; 1008 struct delayed_work *dwork; 1009 1010 dwork = to_delayed_work(work); 1011 1012 /* Process termination destroys this worker thread. So during the 1013 * lifetime of this thread, kfd_process p will be valid 1014 */ 1015 p = container_of(dwork, struct kfd_process, eviction_work); 1016 WARN_ONCE(p->last_eviction_seqno != p->ef->seqno, 1017 "Eviction fence mismatch\n"); 1018 1019 /* Narrow window of overlap between restore and evict work 1020 * item is possible. Once amdgpu_amdkfd_gpuvm_restore_process_bos 1021 * unreserves KFD BOs, it is possible to evicted again. But 1022 * restore has few more steps of finish. So lets wait for any 1023 * previous restore work to complete 1024 */ 1025 flush_delayed_work(&p->restore_work); 1026 1027 pr_debug("Started evicting pasid 0x%x\n", p->pasid); 1028 ret = kfd_process_evict_queues(p); 1029 if (!ret) { 1030 dma_fence_signal(p->ef); 1031 dma_fence_put(p->ef); 1032 p->ef = NULL; 1033 queue_delayed_work(kfd_restore_wq, &p->restore_work, 1034 msecs_to_jiffies(PROCESS_RESTORE_TIME_MS)); 1035 1036 pr_debug("Finished evicting pasid 0x%x\n", p->pasid); 1037 } else 1038 pr_err("Failed to evict queues of pasid 0x%x\n", p->pasid); 1039 } 1040 1041 static void restore_process_worker(struct work_struct *work) 1042 { 1043 struct delayed_work *dwork; 1044 struct kfd_process *p; 1045 int ret = 0; 1046 1047 dwork = to_delayed_work(work); 1048 1049 /* Process termination destroys this worker thread. So during the 1050 * lifetime of this thread, kfd_process p will be valid 1051 */ 1052 p = container_of(dwork, struct kfd_process, restore_work); 1053 pr_debug("Started restoring pasid 0x%x\n", p->pasid); 1054 1055 /* Setting last_restore_timestamp before successful restoration. 1056 * Otherwise this would have to be set by KGD (restore_process_bos) 1057 * before KFD BOs are unreserved. If not, the process can be evicted 1058 * again before the timestamp is set. 1059 * If restore fails, the timestamp will be set again in the next 1060 * attempt. This would mean that the minimum GPU quanta would be 1061 * PROCESS_ACTIVE_TIME_MS - (time to execute the following two 1062 * functions) 1063 */ 1064 1065 p->last_restore_timestamp = get_jiffies_64(); 1066 ret = amdgpu_amdkfd_gpuvm_restore_process_bos(p->kgd_process_info, 1067 &p->ef); 1068 if (ret) { 1069 pr_debug("Failed to restore BOs of pasid 0x%x, retry after %d ms\n", 1070 p->pasid, PROCESS_BACK_OFF_TIME_MS); 1071 ret = queue_delayed_work(kfd_restore_wq, &p->restore_work, 1072 msecs_to_jiffies(PROCESS_BACK_OFF_TIME_MS)); 1073 WARN(!ret, "reschedule restore work failed\n"); 1074 return; 1075 } 1076 1077 ret = kfd_process_restore_queues(p); 1078 if (!ret) 1079 pr_debug("Finished restoring pasid 0x%x\n", p->pasid); 1080 else 1081 pr_err("Failed to restore queues of pasid 0x%x\n", p->pasid); 1082 } 1083 1084 void kfd_suspend_all_processes(void) 1085 { 1086 struct kfd_process *p; 1087 unsigned int temp; 1088 int idx = srcu_read_lock(&kfd_processes_srcu); 1089 1090 hash_for_each_rcu(kfd_processes_table, temp, p, kfd_processes) { 1091 cancel_delayed_work_sync(&p->eviction_work); 1092 cancel_delayed_work_sync(&p->restore_work); 1093 1094 if (kfd_process_evict_queues(p)) 1095 pr_err("Failed to suspend process 0x%x\n", p->pasid); 1096 dma_fence_signal(p->ef); 1097 dma_fence_put(p->ef); 1098 p->ef = NULL; 1099 } 1100 srcu_read_unlock(&kfd_processes_srcu, idx); 1101 } 1102 1103 int kfd_resume_all_processes(void) 1104 { 1105 struct kfd_process *p; 1106 unsigned int temp; 1107 int ret = 0, idx = srcu_read_lock(&kfd_processes_srcu); 1108 1109 hash_for_each_rcu(kfd_processes_table, temp, p, kfd_processes) { 1110 if (!queue_delayed_work(kfd_restore_wq, &p->restore_work, 0)) { 1111 pr_err("Restore process %d failed during resume\n", 1112 p->pasid); 1113 ret = -EFAULT; 1114 } 1115 } 1116 srcu_read_unlock(&kfd_processes_srcu, idx); 1117 return ret; 1118 } 1119 1120 int kfd_reserved_mem_mmap(struct kfd_dev *dev, struct kfd_process *process, 1121 struct vm_area_struct *vma) 1122 { 1123 struct kfd_process_device *pdd; 1124 struct qcm_process_device *qpd; 1125 1126 if ((vma->vm_end - vma->vm_start) != KFD_CWSR_TBA_TMA_SIZE) { 1127 pr_err("Incorrect CWSR mapping size.\n"); 1128 return -EINVAL; 1129 } 1130 1131 pdd = kfd_get_process_device_data(dev, process); 1132 if (!pdd) 1133 return -EINVAL; 1134 qpd = &pdd->qpd; 1135 1136 qpd->cwsr_kaddr = (void *)__get_free_pages(GFP_KERNEL | __GFP_ZERO, 1137 get_order(KFD_CWSR_TBA_TMA_SIZE)); 1138 if (!qpd->cwsr_kaddr) { 1139 pr_err("Error allocating per process CWSR buffer.\n"); 1140 return -ENOMEM; 1141 } 1142 1143 vma->vm_flags |= VM_IO | VM_DONTCOPY | VM_DONTEXPAND 1144 | VM_NORESERVE | VM_DONTDUMP | VM_PFNMAP; 1145 /* Mapping pages to user process */ 1146 return remap_pfn_range(vma, vma->vm_start, 1147 PFN_DOWN(__pa(qpd->cwsr_kaddr)), 1148 KFD_CWSR_TBA_TMA_SIZE, vma->vm_page_prot); 1149 } 1150 1151 void kfd_flush_tlb(struct kfd_process_device *pdd) 1152 { 1153 struct kfd_dev *dev = pdd->dev; 1154 const struct kfd2kgd_calls *f2g = dev->kfd2kgd; 1155 1156 if (dev->dqm->sched_policy == KFD_SCHED_POLICY_NO_HWS) { 1157 /* Nothing to flush until a VMID is assigned, which 1158 * only happens when the first queue is created. 1159 */ 1160 if (pdd->qpd.vmid) 1161 f2g->invalidate_tlbs_vmid(dev->kgd, pdd->qpd.vmid); 1162 } else { 1163 f2g->invalidate_tlbs(dev->kgd, pdd->process->pasid); 1164 } 1165 } 1166 1167 #if defined(CONFIG_DEBUG_FS) 1168 1169 int kfd_debugfs_mqds_by_process(struct seq_file *m, void *data) 1170 { 1171 struct kfd_process *p; 1172 unsigned int temp; 1173 int r = 0; 1174 1175 int idx = srcu_read_lock(&kfd_processes_srcu); 1176 1177 hash_for_each_rcu(kfd_processes_table, temp, p, kfd_processes) { 1178 seq_printf(m, "Process %d PASID 0x%x:\n", 1179 p->lead_thread->tgid, p->pasid); 1180 1181 mutex_lock(&p->mutex); 1182 r = pqm_debugfs_mqds(m, &p->pqm); 1183 mutex_unlock(&p->mutex); 1184 1185 if (r) 1186 break; 1187 } 1188 1189 srcu_read_unlock(&kfd_processes_srcu, idx); 1190 1191 return r; 1192 } 1193 1194 #endif 1195 1196