1 /*
2  * Copyright 2014 Advanced Micro Devices, Inc.
3  *
4  * Permission is hereby granted, free of charge, to any person obtaining a
5  * copy of this software and associated documentation files (the "Software"),
6  * to deal in the Software without restriction, including without limitation
7  * the rights to use, copy, modify, merge, publish, distribute, sublicense,
8  * and/or sell copies of the Software, and to permit persons to whom the
9  * Software is furnished to do so, subject to the following conditions:
10  *
11  * The above copyright notice and this permission notice shall be included in
12  * all copies or substantial portions of the Software.
13  *
14  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
15  * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
16  * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.  IN NO EVENT SHALL
17  * THE COPYRIGHT HOLDER(S) OR AUTHOR(S) BE LIABLE FOR ANY CLAIM, DAMAGES OR
18  * OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
19  * ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
20  * OTHER DEALINGS IN THE SOFTWARE.
21  */
22 
23 #include <linux/mutex.h>
24 #include <linux/log2.h>
25 #include <linux/sched.h>
26 #include <linux/sched/mm.h>
27 #include <linux/sched/task.h>
28 #include <linux/slab.h>
29 #include <linux/amd-iommu.h>
30 #include <linux/notifier.h>
31 #include <linux/compat.h>
32 #include <linux/mman.h>
33 #include <linux/file.h>
34 #include "amdgpu_amdkfd.h"
35 
36 struct mm_struct;
37 
38 #include "kfd_priv.h"
39 #include "kfd_device_queue_manager.h"
40 #include "kfd_dbgmgr.h"
41 #include "kfd_iommu.h"
42 
43 /*
44  * List of struct kfd_process (field kfd_process).
45  * Unique/indexed by mm_struct*
46  */
47 DEFINE_HASHTABLE(kfd_processes_table, KFD_PROCESS_TABLE_SIZE);
48 static DEFINE_MUTEX(kfd_processes_mutex);
49 
50 DEFINE_SRCU(kfd_processes_srcu);
51 
52 /* For process termination handling */
53 static struct workqueue_struct *kfd_process_wq;
54 
55 /* Ordered, single-threaded workqueue for restoring evicted
56  * processes. Restoring multiple processes concurrently under memory
57  * pressure can lead to processes blocking each other from validating
58  * their BOs and result in a live-lock situation where processes
59  * remain evicted indefinitely.
60  */
61 static struct workqueue_struct *kfd_restore_wq;
62 
63 static struct kfd_process *find_process(const struct task_struct *thread);
64 static void kfd_process_ref_release(struct kref *ref);
65 static struct kfd_process *create_process(const struct task_struct *thread);
66 static int kfd_process_init_cwsr_apu(struct kfd_process *p, struct file *filep);
67 
68 static void evict_process_worker(struct work_struct *work);
69 static void restore_process_worker(struct work_struct *work);
70 
71 struct kfd_procfs_tree {
72 	struct kobject *kobj;
73 };
74 
75 static struct kfd_procfs_tree procfs;
76 
77 static ssize_t kfd_procfs_show(struct kobject *kobj, struct attribute *attr,
78 			       char *buffer)
79 {
80 	int val = 0;
81 
82 	if (strcmp(attr->name, "pasid") == 0) {
83 		struct kfd_process *p = container_of(attr, struct kfd_process,
84 						     attr_pasid);
85 		val = p->pasid;
86 	} else {
87 		pr_err("Invalid attribute");
88 		return -EINVAL;
89 	}
90 
91 	return snprintf(buffer, PAGE_SIZE, "%d\n", val);
92 }
93 
94 static void kfd_procfs_kobj_release(struct kobject *kobj)
95 {
96 	kfree(kobj);
97 }
98 
99 static const struct sysfs_ops kfd_procfs_ops = {
100 	.show = kfd_procfs_show,
101 };
102 
103 static struct kobj_type procfs_type = {
104 	.release = kfd_procfs_kobj_release,
105 	.sysfs_ops = &kfd_procfs_ops,
106 };
107 
108 void kfd_procfs_init(void)
109 {
110 	int ret = 0;
111 
112 	procfs.kobj = kfd_alloc_struct(procfs.kobj);
113 	if (!procfs.kobj)
114 		return;
115 
116 	ret = kobject_init_and_add(procfs.kobj, &procfs_type,
117 				   &kfd_device->kobj, "proc");
118 	if (ret) {
119 		pr_warn("Could not create procfs proc folder");
120 		/* If we fail to create the procfs, clean up */
121 		kfd_procfs_shutdown();
122 	}
123 }
124 
125 void kfd_procfs_shutdown(void)
126 {
127 	if (procfs.kobj) {
128 		kobject_del(procfs.kobj);
129 		kobject_put(procfs.kobj);
130 		procfs.kobj = NULL;
131 	}
132 }
133 
134 int kfd_process_create_wq(void)
135 {
136 	if (!kfd_process_wq)
137 		kfd_process_wq = alloc_workqueue("kfd_process_wq", 0, 0);
138 	if (!kfd_restore_wq)
139 		kfd_restore_wq = alloc_ordered_workqueue("kfd_restore_wq", 0);
140 
141 	if (!kfd_process_wq || !kfd_restore_wq) {
142 		kfd_process_destroy_wq();
143 		return -ENOMEM;
144 	}
145 
146 	return 0;
147 }
148 
149 void kfd_process_destroy_wq(void)
150 {
151 	if (kfd_process_wq) {
152 		destroy_workqueue(kfd_process_wq);
153 		kfd_process_wq = NULL;
154 	}
155 	if (kfd_restore_wq) {
156 		destroy_workqueue(kfd_restore_wq);
157 		kfd_restore_wq = NULL;
158 	}
159 }
160 
161 static void kfd_process_free_gpuvm(struct kgd_mem *mem,
162 			struct kfd_process_device *pdd)
163 {
164 	struct kfd_dev *dev = pdd->dev;
165 
166 	amdgpu_amdkfd_gpuvm_unmap_memory_from_gpu(dev->kgd, mem, pdd->vm);
167 	amdgpu_amdkfd_gpuvm_free_memory_of_gpu(dev->kgd, mem);
168 }
169 
170 /* kfd_process_alloc_gpuvm - Allocate GPU VM for the KFD process
171  *	This function should be only called right after the process
172  *	is created and when kfd_processes_mutex is still being held
173  *	to avoid concurrency. Because of that exclusiveness, we do
174  *	not need to take p->mutex.
175  */
176 static int kfd_process_alloc_gpuvm(struct kfd_process_device *pdd,
177 				   uint64_t gpu_va, uint32_t size,
178 				   uint32_t flags, void **kptr)
179 {
180 	struct kfd_dev *kdev = pdd->dev;
181 	struct kgd_mem *mem = NULL;
182 	int handle;
183 	int err;
184 
185 	err = amdgpu_amdkfd_gpuvm_alloc_memory_of_gpu(kdev->kgd, gpu_va, size,
186 						 pdd->vm, &mem, NULL, flags);
187 	if (err)
188 		goto err_alloc_mem;
189 
190 	err = amdgpu_amdkfd_gpuvm_map_memory_to_gpu(kdev->kgd, mem, pdd->vm);
191 	if (err)
192 		goto err_map_mem;
193 
194 	err = amdgpu_amdkfd_gpuvm_sync_memory(kdev->kgd, mem, true);
195 	if (err) {
196 		pr_debug("Sync memory failed, wait interrupted by user signal\n");
197 		goto sync_memory_failed;
198 	}
199 
200 	/* Create an obj handle so kfd_process_device_remove_obj_handle
201 	 * will take care of the bo removal when the process finishes.
202 	 * We do not need to take p->mutex, because the process is just
203 	 * created and the ioctls have not had the chance to run.
204 	 */
205 	handle = kfd_process_device_create_obj_handle(pdd, mem);
206 
207 	if (handle < 0) {
208 		err = handle;
209 		goto free_gpuvm;
210 	}
211 
212 	if (kptr) {
213 		err = amdgpu_amdkfd_gpuvm_map_gtt_bo_to_kernel(kdev->kgd,
214 				(struct kgd_mem *)mem, kptr, NULL);
215 		if (err) {
216 			pr_debug("Map GTT BO to kernel failed\n");
217 			goto free_obj_handle;
218 		}
219 	}
220 
221 	return err;
222 
223 free_obj_handle:
224 	kfd_process_device_remove_obj_handle(pdd, handle);
225 free_gpuvm:
226 sync_memory_failed:
227 	kfd_process_free_gpuvm(mem, pdd);
228 	return err;
229 
230 err_map_mem:
231 	amdgpu_amdkfd_gpuvm_free_memory_of_gpu(kdev->kgd, mem);
232 err_alloc_mem:
233 	*kptr = NULL;
234 	return err;
235 }
236 
237 /* kfd_process_device_reserve_ib_mem - Reserve memory inside the
238  *	process for IB usage The memory reserved is for KFD to submit
239  *	IB to AMDGPU from kernel.  If the memory is reserved
240  *	successfully, ib_kaddr will have the CPU/kernel
241  *	address. Check ib_kaddr before accessing the memory.
242  */
243 static int kfd_process_device_reserve_ib_mem(struct kfd_process_device *pdd)
244 {
245 	struct qcm_process_device *qpd = &pdd->qpd;
246 	uint32_t flags = ALLOC_MEM_FLAGS_GTT |
247 			 ALLOC_MEM_FLAGS_NO_SUBSTITUTE |
248 			 ALLOC_MEM_FLAGS_WRITABLE |
249 			 ALLOC_MEM_FLAGS_EXECUTABLE;
250 	void *kaddr;
251 	int ret;
252 
253 	if (qpd->ib_kaddr || !qpd->ib_base)
254 		return 0;
255 
256 	/* ib_base is only set for dGPU */
257 	ret = kfd_process_alloc_gpuvm(pdd, qpd->ib_base, PAGE_SIZE, flags,
258 				      &kaddr);
259 	if (ret)
260 		return ret;
261 
262 	qpd->ib_kaddr = kaddr;
263 
264 	return 0;
265 }
266 
267 struct kfd_process *kfd_create_process(struct file *filep)
268 {
269 	struct kfd_process *process;
270 	struct task_struct *thread = current;
271 	int ret;
272 
273 	if (!thread->mm)
274 		return ERR_PTR(-EINVAL);
275 
276 	/* Only the pthreads threading model is supported. */
277 	if (thread->group_leader->mm != thread->mm)
278 		return ERR_PTR(-EINVAL);
279 
280 	/*
281 	 * take kfd processes mutex before starting of process creation
282 	 * so there won't be a case where two threads of the same process
283 	 * create two kfd_process structures
284 	 */
285 	mutex_lock(&kfd_processes_mutex);
286 
287 	/* A prior open of /dev/kfd could have already created the process. */
288 	process = find_process(thread);
289 	if (process) {
290 		pr_debug("Process already found\n");
291 	} else {
292 		process = create_process(thread);
293 		if (IS_ERR(process))
294 			goto out;
295 
296 		ret = kfd_process_init_cwsr_apu(process, filep);
297 		if (ret) {
298 			process = ERR_PTR(ret);
299 			goto out;
300 		}
301 
302 		if (!procfs.kobj)
303 			goto out;
304 
305 		process->kobj = kfd_alloc_struct(process->kobj);
306 		if (!process->kobj) {
307 			pr_warn("Creating procfs kobject failed");
308 			goto out;
309 		}
310 		ret = kobject_init_and_add(process->kobj, &procfs_type,
311 					   procfs.kobj, "%d",
312 					   (int)process->lead_thread->pid);
313 		if (ret) {
314 			pr_warn("Creating procfs pid directory failed");
315 			goto out;
316 		}
317 
318 		process->attr_pasid.name = "pasid";
319 		process->attr_pasid.mode = KFD_SYSFS_FILE_MODE;
320 		sysfs_attr_init(&process->attr_pasid);
321 		ret = sysfs_create_file(process->kobj, &process->attr_pasid);
322 		if (ret)
323 			pr_warn("Creating pasid for pid %d failed",
324 					(int)process->lead_thread->pid);
325 	}
326 out:
327 	mutex_unlock(&kfd_processes_mutex);
328 
329 	return process;
330 }
331 
332 struct kfd_process *kfd_get_process(const struct task_struct *thread)
333 {
334 	struct kfd_process *process;
335 
336 	if (!thread->mm)
337 		return ERR_PTR(-EINVAL);
338 
339 	/* Only the pthreads threading model is supported. */
340 	if (thread->group_leader->mm != thread->mm)
341 		return ERR_PTR(-EINVAL);
342 
343 	process = find_process(thread);
344 	if (!process)
345 		return ERR_PTR(-EINVAL);
346 
347 	return process;
348 }
349 
350 static struct kfd_process *find_process_by_mm(const struct mm_struct *mm)
351 {
352 	struct kfd_process *process;
353 
354 	hash_for_each_possible_rcu(kfd_processes_table, process,
355 					kfd_processes, (uintptr_t)mm)
356 		if (process->mm == mm)
357 			return process;
358 
359 	return NULL;
360 }
361 
362 static struct kfd_process *find_process(const struct task_struct *thread)
363 {
364 	struct kfd_process *p;
365 	int idx;
366 
367 	idx = srcu_read_lock(&kfd_processes_srcu);
368 	p = find_process_by_mm(thread->mm);
369 	srcu_read_unlock(&kfd_processes_srcu, idx);
370 
371 	return p;
372 }
373 
374 void kfd_unref_process(struct kfd_process *p)
375 {
376 	kref_put(&p->ref, kfd_process_ref_release);
377 }
378 
379 static void kfd_process_device_free_bos(struct kfd_process_device *pdd)
380 {
381 	struct kfd_process *p = pdd->process;
382 	void *mem;
383 	int id;
384 
385 	/*
386 	 * Remove all handles from idr and release appropriate
387 	 * local memory object
388 	 */
389 	idr_for_each_entry(&pdd->alloc_idr, mem, id) {
390 		struct kfd_process_device *peer_pdd;
391 
392 		list_for_each_entry(peer_pdd, &p->per_device_data,
393 				    per_device_list) {
394 			if (!peer_pdd->vm)
395 				continue;
396 			amdgpu_amdkfd_gpuvm_unmap_memory_from_gpu(
397 				peer_pdd->dev->kgd, mem, peer_pdd->vm);
398 		}
399 
400 		amdgpu_amdkfd_gpuvm_free_memory_of_gpu(pdd->dev->kgd, mem);
401 		kfd_process_device_remove_obj_handle(pdd, id);
402 	}
403 }
404 
405 static void kfd_process_free_outstanding_kfd_bos(struct kfd_process *p)
406 {
407 	struct kfd_process_device *pdd;
408 
409 	list_for_each_entry(pdd, &p->per_device_data, per_device_list)
410 		kfd_process_device_free_bos(pdd);
411 }
412 
413 static void kfd_process_destroy_pdds(struct kfd_process *p)
414 {
415 	struct kfd_process_device *pdd, *temp;
416 
417 	list_for_each_entry_safe(pdd, temp, &p->per_device_data,
418 				 per_device_list) {
419 		pr_debug("Releasing pdd (topology id %d) for process (pasid 0x%x)\n",
420 				pdd->dev->id, p->pasid);
421 
422 		if (pdd->drm_file) {
423 			amdgpu_amdkfd_gpuvm_release_process_vm(
424 					pdd->dev->kgd, pdd->vm);
425 			fput(pdd->drm_file);
426 		}
427 		else if (pdd->vm)
428 			amdgpu_amdkfd_gpuvm_destroy_process_vm(
429 				pdd->dev->kgd, pdd->vm);
430 
431 		list_del(&pdd->per_device_list);
432 
433 		if (pdd->qpd.cwsr_kaddr && !pdd->qpd.cwsr_base)
434 			free_pages((unsigned long)pdd->qpd.cwsr_kaddr,
435 				get_order(KFD_CWSR_TBA_TMA_SIZE));
436 
437 		kfree(pdd->qpd.doorbell_bitmap);
438 		idr_destroy(&pdd->alloc_idr);
439 
440 		kfree(pdd);
441 	}
442 }
443 
444 /* No process locking is needed in this function, because the process
445  * is not findable any more. We must assume that no other thread is
446  * using it any more, otherwise we couldn't safely free the process
447  * structure in the end.
448  */
449 static void kfd_process_wq_release(struct work_struct *work)
450 {
451 	struct kfd_process *p = container_of(work, struct kfd_process,
452 					     release_work);
453 
454 	/* Remove the procfs files */
455 	if (p->kobj) {
456 		sysfs_remove_file(p->kobj, &p->attr_pasid);
457 		kobject_del(p->kobj);
458 		kobject_put(p->kobj);
459 		p->kobj = NULL;
460 	}
461 
462 	kfd_iommu_unbind_process(p);
463 
464 	kfd_process_free_outstanding_kfd_bos(p);
465 
466 	kfd_process_destroy_pdds(p);
467 	dma_fence_put(p->ef);
468 
469 	kfd_event_free_process(p);
470 
471 	kfd_pasid_free(p->pasid);
472 	kfd_free_process_doorbells(p);
473 
474 	mutex_destroy(&p->mutex);
475 
476 	put_task_struct(p->lead_thread);
477 
478 	kfree(p);
479 }
480 
481 static void kfd_process_ref_release(struct kref *ref)
482 {
483 	struct kfd_process *p = container_of(ref, struct kfd_process, ref);
484 
485 	INIT_WORK(&p->release_work, kfd_process_wq_release);
486 	queue_work(kfd_process_wq, &p->release_work);
487 }
488 
489 static void kfd_process_free_notifier(struct mmu_notifier *mn)
490 {
491 	kfd_unref_process(container_of(mn, struct kfd_process, mmu_notifier));
492 }
493 
494 static void kfd_process_notifier_release(struct mmu_notifier *mn,
495 					struct mm_struct *mm)
496 {
497 	struct kfd_process *p;
498 	struct kfd_process_device *pdd = NULL;
499 
500 	/*
501 	 * The kfd_process structure can not be free because the
502 	 * mmu_notifier srcu is read locked
503 	 */
504 	p = container_of(mn, struct kfd_process, mmu_notifier);
505 	if (WARN_ON(p->mm != mm))
506 		return;
507 
508 	mutex_lock(&kfd_processes_mutex);
509 	hash_del_rcu(&p->kfd_processes);
510 	mutex_unlock(&kfd_processes_mutex);
511 	synchronize_srcu(&kfd_processes_srcu);
512 
513 	cancel_delayed_work_sync(&p->eviction_work);
514 	cancel_delayed_work_sync(&p->restore_work);
515 
516 	mutex_lock(&p->mutex);
517 
518 	/* Iterate over all process device data structures and if the
519 	 * pdd is in debug mode, we should first force unregistration,
520 	 * then we will be able to destroy the queues
521 	 */
522 	list_for_each_entry(pdd, &p->per_device_data, per_device_list) {
523 		struct kfd_dev *dev = pdd->dev;
524 
525 		mutex_lock(kfd_get_dbgmgr_mutex());
526 		if (dev && dev->dbgmgr && dev->dbgmgr->pasid == p->pasid) {
527 			if (!kfd_dbgmgr_unregister(dev->dbgmgr, p)) {
528 				kfd_dbgmgr_destroy(dev->dbgmgr);
529 				dev->dbgmgr = NULL;
530 			}
531 		}
532 		mutex_unlock(kfd_get_dbgmgr_mutex());
533 	}
534 
535 	kfd_process_dequeue_from_all_devices(p);
536 	pqm_uninit(&p->pqm);
537 
538 	/* Indicate to other users that MM is no longer valid */
539 	p->mm = NULL;
540 
541 	mutex_unlock(&p->mutex);
542 
543 	mmu_notifier_put(&p->mmu_notifier);
544 }
545 
546 static const struct mmu_notifier_ops kfd_process_mmu_notifier_ops = {
547 	.release = kfd_process_notifier_release,
548 	.free_notifier = kfd_process_free_notifier,
549 };
550 
551 static int kfd_process_init_cwsr_apu(struct kfd_process *p, struct file *filep)
552 {
553 	unsigned long  offset;
554 	struct kfd_process_device *pdd;
555 
556 	list_for_each_entry(pdd, &p->per_device_data, per_device_list) {
557 		struct kfd_dev *dev = pdd->dev;
558 		struct qcm_process_device *qpd = &pdd->qpd;
559 
560 		if (!dev->cwsr_enabled || qpd->cwsr_kaddr || qpd->cwsr_base)
561 			continue;
562 
563 		offset = KFD_MMAP_TYPE_RESERVED_MEM | KFD_MMAP_GPU_ID(dev->id);
564 		qpd->tba_addr = (int64_t)vm_mmap(filep, 0,
565 			KFD_CWSR_TBA_TMA_SIZE, PROT_READ | PROT_EXEC,
566 			MAP_SHARED, offset);
567 
568 		if (IS_ERR_VALUE(qpd->tba_addr)) {
569 			int err = qpd->tba_addr;
570 
571 			pr_err("Failure to set tba address. error %d.\n", err);
572 			qpd->tba_addr = 0;
573 			qpd->cwsr_kaddr = NULL;
574 			return err;
575 		}
576 
577 		memcpy(qpd->cwsr_kaddr, dev->cwsr_isa, dev->cwsr_isa_size);
578 
579 		qpd->tma_addr = qpd->tba_addr + KFD_CWSR_TMA_OFFSET;
580 		pr_debug("set tba :0x%llx, tma:0x%llx, cwsr_kaddr:%p for pqm.\n",
581 			qpd->tba_addr, qpd->tma_addr, qpd->cwsr_kaddr);
582 	}
583 
584 	return 0;
585 }
586 
587 static int kfd_process_device_init_cwsr_dgpu(struct kfd_process_device *pdd)
588 {
589 	struct kfd_dev *dev = pdd->dev;
590 	struct qcm_process_device *qpd = &pdd->qpd;
591 	uint32_t flags = ALLOC_MEM_FLAGS_GTT |
592 		ALLOC_MEM_FLAGS_NO_SUBSTITUTE | ALLOC_MEM_FLAGS_EXECUTABLE;
593 	void *kaddr;
594 	int ret;
595 
596 	if (!dev->cwsr_enabled || qpd->cwsr_kaddr || !qpd->cwsr_base)
597 		return 0;
598 
599 	/* cwsr_base is only set for dGPU */
600 	ret = kfd_process_alloc_gpuvm(pdd, qpd->cwsr_base,
601 				      KFD_CWSR_TBA_TMA_SIZE, flags, &kaddr);
602 	if (ret)
603 		return ret;
604 
605 	qpd->cwsr_kaddr = kaddr;
606 	qpd->tba_addr = qpd->cwsr_base;
607 
608 	memcpy(qpd->cwsr_kaddr, dev->cwsr_isa, dev->cwsr_isa_size);
609 
610 	qpd->tma_addr = qpd->tba_addr + KFD_CWSR_TMA_OFFSET;
611 	pr_debug("set tba :0x%llx, tma:0x%llx, cwsr_kaddr:%p for pqm.\n",
612 		 qpd->tba_addr, qpd->tma_addr, qpd->cwsr_kaddr);
613 
614 	return 0;
615 }
616 
617 /*
618  * On return the kfd_process is fully operational and will be freed when the
619  * mm is released
620  */
621 static struct kfd_process *create_process(const struct task_struct *thread)
622 {
623 	struct kfd_process *process;
624 	int err = -ENOMEM;
625 
626 	process = kzalloc(sizeof(*process), GFP_KERNEL);
627 	if (!process)
628 		goto err_alloc_process;
629 
630 	kref_init(&process->ref);
631 	mutex_init(&process->mutex);
632 	process->mm = thread->mm;
633 	process->lead_thread = thread->group_leader;
634 	INIT_LIST_HEAD(&process->per_device_data);
635 	INIT_DELAYED_WORK(&process->eviction_work, evict_process_worker);
636 	INIT_DELAYED_WORK(&process->restore_work, restore_process_worker);
637 	process->last_restore_timestamp = get_jiffies_64();
638 	kfd_event_init_process(process);
639 	process->is_32bit_user_mode = in_compat_syscall();
640 
641 	process->pasid = kfd_pasid_alloc();
642 	if (process->pasid == 0)
643 		goto err_alloc_pasid;
644 
645 	if (kfd_alloc_process_doorbells(process) < 0)
646 		goto err_alloc_doorbells;
647 
648 	err = pqm_init(&process->pqm, process);
649 	if (err != 0)
650 		goto err_process_pqm_init;
651 
652 	/* init process apertures*/
653 	err = kfd_init_apertures(process);
654 	if (err != 0)
655 		goto err_init_apertures;
656 
657 	/* Must be last, have to use release destruction after this */
658 	process->mmu_notifier.ops = &kfd_process_mmu_notifier_ops;
659 	err = mmu_notifier_register(&process->mmu_notifier, process->mm);
660 	if (err)
661 		goto err_register_notifier;
662 
663 	get_task_struct(process->lead_thread);
664 	hash_add_rcu(kfd_processes_table, &process->kfd_processes,
665 			(uintptr_t)process->mm);
666 
667 	return process;
668 
669 err_register_notifier:
670 	kfd_process_free_outstanding_kfd_bos(process);
671 	kfd_process_destroy_pdds(process);
672 err_init_apertures:
673 	pqm_uninit(&process->pqm);
674 err_process_pqm_init:
675 	kfd_free_process_doorbells(process);
676 err_alloc_doorbells:
677 	kfd_pasid_free(process->pasid);
678 err_alloc_pasid:
679 	mutex_destroy(&process->mutex);
680 	kfree(process);
681 err_alloc_process:
682 	return ERR_PTR(err);
683 }
684 
685 static int init_doorbell_bitmap(struct qcm_process_device *qpd,
686 			struct kfd_dev *dev)
687 {
688 	unsigned int i;
689 	int range_start = dev->shared_resources.non_cp_doorbells_start;
690 	int range_end = dev->shared_resources.non_cp_doorbells_end;
691 
692 	if (!KFD_IS_SOC15(dev->device_info->asic_family))
693 		return 0;
694 
695 	qpd->doorbell_bitmap =
696 		kzalloc(DIV_ROUND_UP(KFD_MAX_NUM_OF_QUEUES_PER_PROCESS,
697 				     BITS_PER_BYTE), GFP_KERNEL);
698 	if (!qpd->doorbell_bitmap)
699 		return -ENOMEM;
700 
701 	/* Mask out doorbells reserved for SDMA, IH, and VCN on SOC15. */
702 	pr_debug("reserved doorbell 0x%03x - 0x%03x\n", range_start, range_end);
703 	pr_debug("reserved doorbell 0x%03x - 0x%03x\n",
704 			range_start + KFD_QUEUE_DOORBELL_MIRROR_OFFSET,
705 			range_end + KFD_QUEUE_DOORBELL_MIRROR_OFFSET);
706 
707 	for (i = 0; i < KFD_MAX_NUM_OF_QUEUES_PER_PROCESS / 2; i++) {
708 		if (i >= range_start && i <= range_end) {
709 			set_bit(i, qpd->doorbell_bitmap);
710 			set_bit(i + KFD_QUEUE_DOORBELL_MIRROR_OFFSET,
711 				qpd->doorbell_bitmap);
712 		}
713 	}
714 
715 	return 0;
716 }
717 
718 struct kfd_process_device *kfd_get_process_device_data(struct kfd_dev *dev,
719 							struct kfd_process *p)
720 {
721 	struct kfd_process_device *pdd = NULL;
722 
723 	list_for_each_entry(pdd, &p->per_device_data, per_device_list)
724 		if (pdd->dev == dev)
725 			return pdd;
726 
727 	return NULL;
728 }
729 
730 struct kfd_process_device *kfd_create_process_device_data(struct kfd_dev *dev,
731 							struct kfd_process *p)
732 {
733 	struct kfd_process_device *pdd = NULL;
734 
735 	pdd = kzalloc(sizeof(*pdd), GFP_KERNEL);
736 	if (!pdd)
737 		return NULL;
738 
739 	if (init_doorbell_bitmap(&pdd->qpd, dev)) {
740 		pr_err("Failed to init doorbell for process\n");
741 		kfree(pdd);
742 		return NULL;
743 	}
744 
745 	pdd->dev = dev;
746 	INIT_LIST_HEAD(&pdd->qpd.queues_list);
747 	INIT_LIST_HEAD(&pdd->qpd.priv_queue_list);
748 	pdd->qpd.dqm = dev->dqm;
749 	pdd->qpd.pqm = &p->pqm;
750 	pdd->qpd.evicted = 0;
751 	pdd->process = p;
752 	pdd->bound = PDD_UNBOUND;
753 	pdd->already_dequeued = false;
754 	list_add(&pdd->per_device_list, &p->per_device_data);
755 
756 	/* Init idr used for memory handle translation */
757 	idr_init(&pdd->alloc_idr);
758 
759 	return pdd;
760 }
761 
762 /**
763  * kfd_process_device_init_vm - Initialize a VM for a process-device
764  *
765  * @pdd: The process-device
766  * @drm_file: Optional pointer to a DRM file descriptor
767  *
768  * If @drm_file is specified, it will be used to acquire the VM from
769  * that file descriptor. If successful, the @pdd takes ownership of
770  * the file descriptor.
771  *
772  * If @drm_file is NULL, a new VM is created.
773  *
774  * Returns 0 on success, -errno on failure.
775  */
776 int kfd_process_device_init_vm(struct kfd_process_device *pdd,
777 			       struct file *drm_file)
778 {
779 	struct kfd_process *p;
780 	struct kfd_dev *dev;
781 	int ret;
782 
783 	if (pdd->vm)
784 		return drm_file ? -EBUSY : 0;
785 
786 	p = pdd->process;
787 	dev = pdd->dev;
788 
789 	if (drm_file)
790 		ret = amdgpu_amdkfd_gpuvm_acquire_process_vm(
791 			dev->kgd, drm_file, p->pasid,
792 			&pdd->vm, &p->kgd_process_info, &p->ef);
793 	else
794 		ret = amdgpu_amdkfd_gpuvm_create_process_vm(dev->kgd, p->pasid,
795 			&pdd->vm, &p->kgd_process_info, &p->ef);
796 	if (ret) {
797 		pr_err("Failed to create process VM object\n");
798 		return ret;
799 	}
800 
801 	amdgpu_vm_set_task_info(pdd->vm);
802 
803 	ret = kfd_process_device_reserve_ib_mem(pdd);
804 	if (ret)
805 		goto err_reserve_ib_mem;
806 	ret = kfd_process_device_init_cwsr_dgpu(pdd);
807 	if (ret)
808 		goto err_init_cwsr;
809 
810 	pdd->drm_file = drm_file;
811 
812 	return 0;
813 
814 err_init_cwsr:
815 err_reserve_ib_mem:
816 	kfd_process_device_free_bos(pdd);
817 	if (!drm_file)
818 		amdgpu_amdkfd_gpuvm_destroy_process_vm(dev->kgd, pdd->vm);
819 	pdd->vm = NULL;
820 
821 	return ret;
822 }
823 
824 /*
825  * Direct the IOMMU to bind the process (specifically the pasid->mm)
826  * to the device.
827  * Unbinding occurs when the process dies or the device is removed.
828  *
829  * Assumes that the process lock is held.
830  */
831 struct kfd_process_device *kfd_bind_process_to_device(struct kfd_dev *dev,
832 							struct kfd_process *p)
833 {
834 	struct kfd_process_device *pdd;
835 	int err;
836 
837 	pdd = kfd_get_process_device_data(dev, p);
838 	if (!pdd) {
839 		pr_err("Process device data doesn't exist\n");
840 		return ERR_PTR(-ENOMEM);
841 	}
842 
843 	err = kfd_iommu_bind_process_to_device(pdd);
844 	if (err)
845 		return ERR_PTR(err);
846 
847 	err = kfd_process_device_init_vm(pdd, NULL);
848 	if (err)
849 		return ERR_PTR(err);
850 
851 	return pdd;
852 }
853 
854 struct kfd_process_device *kfd_get_first_process_device_data(
855 						struct kfd_process *p)
856 {
857 	return list_first_entry(&p->per_device_data,
858 				struct kfd_process_device,
859 				per_device_list);
860 }
861 
862 struct kfd_process_device *kfd_get_next_process_device_data(
863 						struct kfd_process *p,
864 						struct kfd_process_device *pdd)
865 {
866 	if (list_is_last(&pdd->per_device_list, &p->per_device_data))
867 		return NULL;
868 	return list_next_entry(pdd, per_device_list);
869 }
870 
871 bool kfd_has_process_device_data(struct kfd_process *p)
872 {
873 	return !(list_empty(&p->per_device_data));
874 }
875 
876 /* Create specific handle mapped to mem from process local memory idr
877  * Assumes that the process lock is held.
878  */
879 int kfd_process_device_create_obj_handle(struct kfd_process_device *pdd,
880 					void *mem)
881 {
882 	return idr_alloc(&pdd->alloc_idr, mem, 0, 0, GFP_KERNEL);
883 }
884 
885 /* Translate specific handle from process local memory idr
886  * Assumes that the process lock is held.
887  */
888 void *kfd_process_device_translate_handle(struct kfd_process_device *pdd,
889 					int handle)
890 {
891 	if (handle < 0)
892 		return NULL;
893 
894 	return idr_find(&pdd->alloc_idr, handle);
895 }
896 
897 /* Remove specific handle from process local memory idr
898  * Assumes that the process lock is held.
899  */
900 void kfd_process_device_remove_obj_handle(struct kfd_process_device *pdd,
901 					int handle)
902 {
903 	if (handle >= 0)
904 		idr_remove(&pdd->alloc_idr, handle);
905 }
906 
907 /* This increments the process->ref counter. */
908 struct kfd_process *kfd_lookup_process_by_pasid(unsigned int pasid)
909 {
910 	struct kfd_process *p, *ret_p = NULL;
911 	unsigned int temp;
912 
913 	int idx = srcu_read_lock(&kfd_processes_srcu);
914 
915 	hash_for_each_rcu(kfd_processes_table, temp, p, kfd_processes) {
916 		if (p->pasid == pasid) {
917 			kref_get(&p->ref);
918 			ret_p = p;
919 			break;
920 		}
921 	}
922 
923 	srcu_read_unlock(&kfd_processes_srcu, idx);
924 
925 	return ret_p;
926 }
927 
928 /* This increments the process->ref counter. */
929 struct kfd_process *kfd_lookup_process_by_mm(const struct mm_struct *mm)
930 {
931 	struct kfd_process *p;
932 
933 	int idx = srcu_read_lock(&kfd_processes_srcu);
934 
935 	p = find_process_by_mm(mm);
936 	if (p)
937 		kref_get(&p->ref);
938 
939 	srcu_read_unlock(&kfd_processes_srcu, idx);
940 
941 	return p;
942 }
943 
944 /* process_evict_queues - Evict all user queues of a process
945  *
946  * Eviction is reference-counted per process-device. This means multiple
947  * evictions from different sources can be nested safely.
948  */
949 int kfd_process_evict_queues(struct kfd_process *p)
950 {
951 	struct kfd_process_device *pdd;
952 	int r = 0;
953 	unsigned int n_evicted = 0;
954 
955 	list_for_each_entry(pdd, &p->per_device_data, per_device_list) {
956 		r = pdd->dev->dqm->ops.evict_process_queues(pdd->dev->dqm,
957 							    &pdd->qpd);
958 		if (r) {
959 			pr_err("Failed to evict process queues\n");
960 			goto fail;
961 		}
962 		n_evicted++;
963 	}
964 
965 	return r;
966 
967 fail:
968 	/* To keep state consistent, roll back partial eviction by
969 	 * restoring queues
970 	 */
971 	list_for_each_entry(pdd, &p->per_device_data, per_device_list) {
972 		if (n_evicted == 0)
973 			break;
974 		if (pdd->dev->dqm->ops.restore_process_queues(pdd->dev->dqm,
975 							      &pdd->qpd))
976 			pr_err("Failed to restore queues\n");
977 
978 		n_evicted--;
979 	}
980 
981 	return r;
982 }
983 
984 /* process_restore_queues - Restore all user queues of a process */
985 int kfd_process_restore_queues(struct kfd_process *p)
986 {
987 	struct kfd_process_device *pdd;
988 	int r, ret = 0;
989 
990 	list_for_each_entry(pdd, &p->per_device_data, per_device_list) {
991 		r = pdd->dev->dqm->ops.restore_process_queues(pdd->dev->dqm,
992 							      &pdd->qpd);
993 		if (r) {
994 			pr_err("Failed to restore process queues\n");
995 			if (!ret)
996 				ret = r;
997 		}
998 	}
999 
1000 	return ret;
1001 }
1002 
1003 static void evict_process_worker(struct work_struct *work)
1004 {
1005 	int ret;
1006 	struct kfd_process *p;
1007 	struct delayed_work *dwork;
1008 
1009 	dwork = to_delayed_work(work);
1010 
1011 	/* Process termination destroys this worker thread. So during the
1012 	 * lifetime of this thread, kfd_process p will be valid
1013 	 */
1014 	p = container_of(dwork, struct kfd_process, eviction_work);
1015 	WARN_ONCE(p->last_eviction_seqno != p->ef->seqno,
1016 		  "Eviction fence mismatch\n");
1017 
1018 	/* Narrow window of overlap between restore and evict work
1019 	 * item is possible. Once amdgpu_amdkfd_gpuvm_restore_process_bos
1020 	 * unreserves KFD BOs, it is possible to evicted again. But
1021 	 * restore has few more steps of finish. So lets wait for any
1022 	 * previous restore work to complete
1023 	 */
1024 	flush_delayed_work(&p->restore_work);
1025 
1026 	pr_debug("Started evicting pasid 0x%x\n", p->pasid);
1027 	ret = kfd_process_evict_queues(p);
1028 	if (!ret) {
1029 		dma_fence_signal(p->ef);
1030 		dma_fence_put(p->ef);
1031 		p->ef = NULL;
1032 		queue_delayed_work(kfd_restore_wq, &p->restore_work,
1033 				msecs_to_jiffies(PROCESS_RESTORE_TIME_MS));
1034 
1035 		pr_debug("Finished evicting pasid 0x%x\n", p->pasid);
1036 	} else
1037 		pr_err("Failed to evict queues of pasid 0x%x\n", p->pasid);
1038 }
1039 
1040 static void restore_process_worker(struct work_struct *work)
1041 {
1042 	struct delayed_work *dwork;
1043 	struct kfd_process *p;
1044 	int ret = 0;
1045 
1046 	dwork = to_delayed_work(work);
1047 
1048 	/* Process termination destroys this worker thread. So during the
1049 	 * lifetime of this thread, kfd_process p will be valid
1050 	 */
1051 	p = container_of(dwork, struct kfd_process, restore_work);
1052 	pr_debug("Started restoring pasid 0x%x\n", p->pasid);
1053 
1054 	/* Setting last_restore_timestamp before successful restoration.
1055 	 * Otherwise this would have to be set by KGD (restore_process_bos)
1056 	 * before KFD BOs are unreserved. If not, the process can be evicted
1057 	 * again before the timestamp is set.
1058 	 * If restore fails, the timestamp will be set again in the next
1059 	 * attempt. This would mean that the minimum GPU quanta would be
1060 	 * PROCESS_ACTIVE_TIME_MS - (time to execute the following two
1061 	 * functions)
1062 	 */
1063 
1064 	p->last_restore_timestamp = get_jiffies_64();
1065 	ret = amdgpu_amdkfd_gpuvm_restore_process_bos(p->kgd_process_info,
1066 						     &p->ef);
1067 	if (ret) {
1068 		pr_debug("Failed to restore BOs of pasid 0x%x, retry after %d ms\n",
1069 			 p->pasid, PROCESS_BACK_OFF_TIME_MS);
1070 		ret = queue_delayed_work(kfd_restore_wq, &p->restore_work,
1071 				msecs_to_jiffies(PROCESS_BACK_OFF_TIME_MS));
1072 		WARN(!ret, "reschedule restore work failed\n");
1073 		return;
1074 	}
1075 
1076 	ret = kfd_process_restore_queues(p);
1077 	if (!ret)
1078 		pr_debug("Finished restoring pasid 0x%x\n", p->pasid);
1079 	else
1080 		pr_err("Failed to restore queues of pasid 0x%x\n", p->pasid);
1081 }
1082 
1083 void kfd_suspend_all_processes(void)
1084 {
1085 	struct kfd_process *p;
1086 	unsigned int temp;
1087 	int idx = srcu_read_lock(&kfd_processes_srcu);
1088 
1089 	hash_for_each_rcu(kfd_processes_table, temp, p, kfd_processes) {
1090 		cancel_delayed_work_sync(&p->eviction_work);
1091 		cancel_delayed_work_sync(&p->restore_work);
1092 
1093 		if (kfd_process_evict_queues(p))
1094 			pr_err("Failed to suspend process 0x%x\n", p->pasid);
1095 		dma_fence_signal(p->ef);
1096 		dma_fence_put(p->ef);
1097 		p->ef = NULL;
1098 	}
1099 	srcu_read_unlock(&kfd_processes_srcu, idx);
1100 }
1101 
1102 int kfd_resume_all_processes(void)
1103 {
1104 	struct kfd_process *p;
1105 	unsigned int temp;
1106 	int ret = 0, idx = srcu_read_lock(&kfd_processes_srcu);
1107 
1108 	hash_for_each_rcu(kfd_processes_table, temp, p, kfd_processes) {
1109 		if (!queue_delayed_work(kfd_restore_wq, &p->restore_work, 0)) {
1110 			pr_err("Restore process %d failed during resume\n",
1111 			       p->pasid);
1112 			ret = -EFAULT;
1113 		}
1114 	}
1115 	srcu_read_unlock(&kfd_processes_srcu, idx);
1116 	return ret;
1117 }
1118 
1119 int kfd_reserved_mem_mmap(struct kfd_dev *dev, struct kfd_process *process,
1120 			  struct vm_area_struct *vma)
1121 {
1122 	struct kfd_process_device *pdd;
1123 	struct qcm_process_device *qpd;
1124 
1125 	if ((vma->vm_end - vma->vm_start) != KFD_CWSR_TBA_TMA_SIZE) {
1126 		pr_err("Incorrect CWSR mapping size.\n");
1127 		return -EINVAL;
1128 	}
1129 
1130 	pdd = kfd_get_process_device_data(dev, process);
1131 	if (!pdd)
1132 		return -EINVAL;
1133 	qpd = &pdd->qpd;
1134 
1135 	qpd->cwsr_kaddr = (void *)__get_free_pages(GFP_KERNEL | __GFP_ZERO,
1136 					get_order(KFD_CWSR_TBA_TMA_SIZE));
1137 	if (!qpd->cwsr_kaddr) {
1138 		pr_err("Error allocating per process CWSR buffer.\n");
1139 		return -ENOMEM;
1140 	}
1141 
1142 	vma->vm_flags |= VM_IO | VM_DONTCOPY | VM_DONTEXPAND
1143 		| VM_NORESERVE | VM_DONTDUMP | VM_PFNMAP;
1144 	/* Mapping pages to user process */
1145 	return remap_pfn_range(vma, vma->vm_start,
1146 			       PFN_DOWN(__pa(qpd->cwsr_kaddr)),
1147 			       KFD_CWSR_TBA_TMA_SIZE, vma->vm_page_prot);
1148 }
1149 
1150 void kfd_flush_tlb(struct kfd_process_device *pdd)
1151 {
1152 	struct kfd_dev *dev = pdd->dev;
1153 	const struct kfd2kgd_calls *f2g = dev->kfd2kgd;
1154 
1155 	if (dev->dqm->sched_policy == KFD_SCHED_POLICY_NO_HWS) {
1156 		/* Nothing to flush until a VMID is assigned, which
1157 		 * only happens when the first queue is created.
1158 		 */
1159 		if (pdd->qpd.vmid)
1160 			f2g->invalidate_tlbs_vmid(dev->kgd, pdd->qpd.vmid);
1161 	} else {
1162 		f2g->invalidate_tlbs(dev->kgd, pdd->process->pasid);
1163 	}
1164 }
1165 
1166 #if defined(CONFIG_DEBUG_FS)
1167 
1168 int kfd_debugfs_mqds_by_process(struct seq_file *m, void *data)
1169 {
1170 	struct kfd_process *p;
1171 	unsigned int temp;
1172 	int r = 0;
1173 
1174 	int idx = srcu_read_lock(&kfd_processes_srcu);
1175 
1176 	hash_for_each_rcu(kfd_processes_table, temp, p, kfd_processes) {
1177 		seq_printf(m, "Process %d PASID 0x%x:\n",
1178 			   p->lead_thread->tgid, p->pasid);
1179 
1180 		mutex_lock(&p->mutex);
1181 		r = pqm_debugfs_mqds(m, &p->pqm);
1182 		mutex_unlock(&p->mutex);
1183 
1184 		if (r)
1185 			break;
1186 	}
1187 
1188 	srcu_read_unlock(&kfd_processes_srcu, idx);
1189 
1190 	return r;
1191 }
1192 
1193 #endif
1194 
1195