1 /* 2 * Copyright 2014 Advanced Micro Devices, Inc. 3 * 4 * Permission is hereby granted, free of charge, to any person obtaining a 5 * copy of this software and associated documentation files (the "Software"), 6 * to deal in the Software without restriction, including without limitation 7 * the rights to use, copy, modify, merge, publish, distribute, sublicense, 8 * and/or sell copies of the Software, and to permit persons to whom the 9 * Software is furnished to do so, subject to the following conditions: 10 * 11 * The above copyright notice and this permission notice shall be included in 12 * all copies or substantial portions of the Software. 13 * 14 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 15 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 16 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL 17 * THE COPYRIGHT HOLDER(S) OR AUTHOR(S) BE LIABLE FOR ANY CLAIM, DAMAGES OR 18 * OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, 19 * ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR 20 * OTHER DEALINGS IN THE SOFTWARE. 21 */ 22 23 #include <linux/mutex.h> 24 #include <linux/log2.h> 25 #include <linux/sched.h> 26 #include <linux/sched/mm.h> 27 #include <linux/sched/task.h> 28 #include <linux/slab.h> 29 #include <linux/amd-iommu.h> 30 #include <linux/notifier.h> 31 #include <linux/compat.h> 32 #include <linux/mman.h> 33 #include <linux/file.h> 34 #include "amdgpu_amdkfd.h" 35 36 struct mm_struct; 37 38 #include "kfd_priv.h" 39 #include "kfd_device_queue_manager.h" 40 #include "kfd_dbgmgr.h" 41 #include "kfd_iommu.h" 42 43 /* 44 * List of struct kfd_process (field kfd_process). 45 * Unique/indexed by mm_struct* 46 */ 47 DEFINE_HASHTABLE(kfd_processes_table, KFD_PROCESS_TABLE_SIZE); 48 static DEFINE_MUTEX(kfd_processes_mutex); 49 50 DEFINE_SRCU(kfd_processes_srcu); 51 52 /* For process termination handling */ 53 static struct workqueue_struct *kfd_process_wq; 54 55 /* Ordered, single-threaded workqueue for restoring evicted 56 * processes. Restoring multiple processes concurrently under memory 57 * pressure can lead to processes blocking each other from validating 58 * their BOs and result in a live-lock situation where processes 59 * remain evicted indefinitely. 60 */ 61 static struct workqueue_struct *kfd_restore_wq; 62 63 static struct kfd_process *find_process(const struct task_struct *thread); 64 static void kfd_process_ref_release(struct kref *ref); 65 static struct kfd_process *create_process(const struct task_struct *thread); 66 static int kfd_process_init_cwsr_apu(struct kfd_process *p, struct file *filep); 67 68 static void evict_process_worker(struct work_struct *work); 69 static void restore_process_worker(struct work_struct *work); 70 71 struct kfd_procfs_tree { 72 struct kobject *kobj; 73 }; 74 75 static struct kfd_procfs_tree procfs; 76 77 static ssize_t kfd_procfs_show(struct kobject *kobj, struct attribute *attr, 78 char *buffer) 79 { 80 int val = 0; 81 82 if (strcmp(attr->name, "pasid") == 0) { 83 struct kfd_process *p = container_of(attr, struct kfd_process, 84 attr_pasid); 85 val = p->pasid; 86 } else { 87 pr_err("Invalid attribute"); 88 return -EINVAL; 89 } 90 91 return snprintf(buffer, PAGE_SIZE, "%d\n", val); 92 } 93 94 static void kfd_procfs_kobj_release(struct kobject *kobj) 95 { 96 kfree(kobj); 97 } 98 99 static const struct sysfs_ops kfd_procfs_ops = { 100 .show = kfd_procfs_show, 101 }; 102 103 static struct kobj_type procfs_type = { 104 .release = kfd_procfs_kobj_release, 105 .sysfs_ops = &kfd_procfs_ops, 106 }; 107 108 void kfd_procfs_init(void) 109 { 110 int ret = 0; 111 112 procfs.kobj = kfd_alloc_struct(procfs.kobj); 113 if (!procfs.kobj) 114 return; 115 116 ret = kobject_init_and_add(procfs.kobj, &procfs_type, 117 &kfd_device->kobj, "proc"); 118 if (ret) { 119 pr_warn("Could not create procfs proc folder"); 120 /* If we fail to create the procfs, clean up */ 121 kfd_procfs_shutdown(); 122 } 123 } 124 125 void kfd_procfs_shutdown(void) 126 { 127 if (procfs.kobj) { 128 kobject_del(procfs.kobj); 129 kobject_put(procfs.kobj); 130 procfs.kobj = NULL; 131 } 132 } 133 134 int kfd_process_create_wq(void) 135 { 136 if (!kfd_process_wq) 137 kfd_process_wq = alloc_workqueue("kfd_process_wq", 0, 0); 138 if (!kfd_restore_wq) 139 kfd_restore_wq = alloc_ordered_workqueue("kfd_restore_wq", 0); 140 141 if (!kfd_process_wq || !kfd_restore_wq) { 142 kfd_process_destroy_wq(); 143 return -ENOMEM; 144 } 145 146 return 0; 147 } 148 149 void kfd_process_destroy_wq(void) 150 { 151 if (kfd_process_wq) { 152 destroy_workqueue(kfd_process_wq); 153 kfd_process_wq = NULL; 154 } 155 if (kfd_restore_wq) { 156 destroy_workqueue(kfd_restore_wq); 157 kfd_restore_wq = NULL; 158 } 159 } 160 161 static void kfd_process_free_gpuvm(struct kgd_mem *mem, 162 struct kfd_process_device *pdd) 163 { 164 struct kfd_dev *dev = pdd->dev; 165 166 amdgpu_amdkfd_gpuvm_unmap_memory_from_gpu(dev->kgd, mem, pdd->vm); 167 amdgpu_amdkfd_gpuvm_free_memory_of_gpu(dev->kgd, mem); 168 } 169 170 /* kfd_process_alloc_gpuvm - Allocate GPU VM for the KFD process 171 * This function should be only called right after the process 172 * is created and when kfd_processes_mutex is still being held 173 * to avoid concurrency. Because of that exclusiveness, we do 174 * not need to take p->mutex. 175 */ 176 static int kfd_process_alloc_gpuvm(struct kfd_process_device *pdd, 177 uint64_t gpu_va, uint32_t size, 178 uint32_t flags, void **kptr) 179 { 180 struct kfd_dev *kdev = pdd->dev; 181 struct kgd_mem *mem = NULL; 182 int handle; 183 int err; 184 185 err = amdgpu_amdkfd_gpuvm_alloc_memory_of_gpu(kdev->kgd, gpu_va, size, 186 pdd->vm, &mem, NULL, flags); 187 if (err) 188 goto err_alloc_mem; 189 190 err = amdgpu_amdkfd_gpuvm_map_memory_to_gpu(kdev->kgd, mem, pdd->vm); 191 if (err) 192 goto err_map_mem; 193 194 err = amdgpu_amdkfd_gpuvm_sync_memory(kdev->kgd, mem, true); 195 if (err) { 196 pr_debug("Sync memory failed, wait interrupted by user signal\n"); 197 goto sync_memory_failed; 198 } 199 200 /* Create an obj handle so kfd_process_device_remove_obj_handle 201 * will take care of the bo removal when the process finishes. 202 * We do not need to take p->mutex, because the process is just 203 * created and the ioctls have not had the chance to run. 204 */ 205 handle = kfd_process_device_create_obj_handle(pdd, mem); 206 207 if (handle < 0) { 208 err = handle; 209 goto free_gpuvm; 210 } 211 212 if (kptr) { 213 err = amdgpu_amdkfd_gpuvm_map_gtt_bo_to_kernel(kdev->kgd, 214 (struct kgd_mem *)mem, kptr, NULL); 215 if (err) { 216 pr_debug("Map GTT BO to kernel failed\n"); 217 goto free_obj_handle; 218 } 219 } 220 221 return err; 222 223 free_obj_handle: 224 kfd_process_device_remove_obj_handle(pdd, handle); 225 free_gpuvm: 226 sync_memory_failed: 227 kfd_process_free_gpuvm(mem, pdd); 228 return err; 229 230 err_map_mem: 231 amdgpu_amdkfd_gpuvm_free_memory_of_gpu(kdev->kgd, mem); 232 err_alloc_mem: 233 *kptr = NULL; 234 return err; 235 } 236 237 /* kfd_process_device_reserve_ib_mem - Reserve memory inside the 238 * process for IB usage The memory reserved is for KFD to submit 239 * IB to AMDGPU from kernel. If the memory is reserved 240 * successfully, ib_kaddr will have the CPU/kernel 241 * address. Check ib_kaddr before accessing the memory. 242 */ 243 static int kfd_process_device_reserve_ib_mem(struct kfd_process_device *pdd) 244 { 245 struct qcm_process_device *qpd = &pdd->qpd; 246 uint32_t flags = ALLOC_MEM_FLAGS_GTT | 247 ALLOC_MEM_FLAGS_NO_SUBSTITUTE | 248 ALLOC_MEM_FLAGS_WRITABLE | 249 ALLOC_MEM_FLAGS_EXECUTABLE; 250 void *kaddr; 251 int ret; 252 253 if (qpd->ib_kaddr || !qpd->ib_base) 254 return 0; 255 256 /* ib_base is only set for dGPU */ 257 ret = kfd_process_alloc_gpuvm(pdd, qpd->ib_base, PAGE_SIZE, flags, 258 &kaddr); 259 if (ret) 260 return ret; 261 262 qpd->ib_kaddr = kaddr; 263 264 return 0; 265 } 266 267 struct kfd_process *kfd_create_process(struct file *filep) 268 { 269 struct kfd_process *process; 270 struct task_struct *thread = current; 271 int ret; 272 273 if (!thread->mm) 274 return ERR_PTR(-EINVAL); 275 276 /* Only the pthreads threading model is supported. */ 277 if (thread->group_leader->mm != thread->mm) 278 return ERR_PTR(-EINVAL); 279 280 /* 281 * take kfd processes mutex before starting of process creation 282 * so there won't be a case where two threads of the same process 283 * create two kfd_process structures 284 */ 285 mutex_lock(&kfd_processes_mutex); 286 287 /* A prior open of /dev/kfd could have already created the process. */ 288 process = find_process(thread); 289 if (process) { 290 pr_debug("Process already found\n"); 291 } else { 292 process = create_process(thread); 293 if (IS_ERR(process)) 294 goto out; 295 296 ret = kfd_process_init_cwsr_apu(process, filep); 297 if (ret) { 298 process = ERR_PTR(ret); 299 goto out; 300 } 301 302 if (!procfs.kobj) 303 goto out; 304 305 process->kobj = kfd_alloc_struct(process->kobj); 306 if (!process->kobj) { 307 pr_warn("Creating procfs kobject failed"); 308 goto out; 309 } 310 ret = kobject_init_and_add(process->kobj, &procfs_type, 311 procfs.kobj, "%d", 312 (int)process->lead_thread->pid); 313 if (ret) { 314 pr_warn("Creating procfs pid directory failed"); 315 goto out; 316 } 317 318 process->attr_pasid.name = "pasid"; 319 process->attr_pasid.mode = KFD_SYSFS_FILE_MODE; 320 sysfs_attr_init(&process->attr_pasid); 321 ret = sysfs_create_file(process->kobj, &process->attr_pasid); 322 if (ret) 323 pr_warn("Creating pasid for pid %d failed", 324 (int)process->lead_thread->pid); 325 } 326 out: 327 mutex_unlock(&kfd_processes_mutex); 328 329 return process; 330 } 331 332 struct kfd_process *kfd_get_process(const struct task_struct *thread) 333 { 334 struct kfd_process *process; 335 336 if (!thread->mm) 337 return ERR_PTR(-EINVAL); 338 339 /* Only the pthreads threading model is supported. */ 340 if (thread->group_leader->mm != thread->mm) 341 return ERR_PTR(-EINVAL); 342 343 process = find_process(thread); 344 if (!process) 345 return ERR_PTR(-EINVAL); 346 347 return process; 348 } 349 350 static struct kfd_process *find_process_by_mm(const struct mm_struct *mm) 351 { 352 struct kfd_process *process; 353 354 hash_for_each_possible_rcu(kfd_processes_table, process, 355 kfd_processes, (uintptr_t)mm) 356 if (process->mm == mm) 357 return process; 358 359 return NULL; 360 } 361 362 static struct kfd_process *find_process(const struct task_struct *thread) 363 { 364 struct kfd_process *p; 365 int idx; 366 367 idx = srcu_read_lock(&kfd_processes_srcu); 368 p = find_process_by_mm(thread->mm); 369 srcu_read_unlock(&kfd_processes_srcu, idx); 370 371 return p; 372 } 373 374 void kfd_unref_process(struct kfd_process *p) 375 { 376 kref_put(&p->ref, kfd_process_ref_release); 377 } 378 379 static void kfd_process_device_free_bos(struct kfd_process_device *pdd) 380 { 381 struct kfd_process *p = pdd->process; 382 void *mem; 383 int id; 384 385 /* 386 * Remove all handles from idr and release appropriate 387 * local memory object 388 */ 389 idr_for_each_entry(&pdd->alloc_idr, mem, id) { 390 struct kfd_process_device *peer_pdd; 391 392 list_for_each_entry(peer_pdd, &p->per_device_data, 393 per_device_list) { 394 if (!peer_pdd->vm) 395 continue; 396 amdgpu_amdkfd_gpuvm_unmap_memory_from_gpu( 397 peer_pdd->dev->kgd, mem, peer_pdd->vm); 398 } 399 400 amdgpu_amdkfd_gpuvm_free_memory_of_gpu(pdd->dev->kgd, mem); 401 kfd_process_device_remove_obj_handle(pdd, id); 402 } 403 } 404 405 static void kfd_process_free_outstanding_kfd_bos(struct kfd_process *p) 406 { 407 struct kfd_process_device *pdd; 408 409 list_for_each_entry(pdd, &p->per_device_data, per_device_list) 410 kfd_process_device_free_bos(pdd); 411 } 412 413 static void kfd_process_destroy_pdds(struct kfd_process *p) 414 { 415 struct kfd_process_device *pdd, *temp; 416 417 list_for_each_entry_safe(pdd, temp, &p->per_device_data, 418 per_device_list) { 419 pr_debug("Releasing pdd (topology id %d) for process (pasid 0x%x)\n", 420 pdd->dev->id, p->pasid); 421 422 if (pdd->drm_file) { 423 amdgpu_amdkfd_gpuvm_release_process_vm( 424 pdd->dev->kgd, pdd->vm); 425 fput(pdd->drm_file); 426 } 427 else if (pdd->vm) 428 amdgpu_amdkfd_gpuvm_destroy_process_vm( 429 pdd->dev->kgd, pdd->vm); 430 431 list_del(&pdd->per_device_list); 432 433 if (pdd->qpd.cwsr_kaddr && !pdd->qpd.cwsr_base) 434 free_pages((unsigned long)pdd->qpd.cwsr_kaddr, 435 get_order(KFD_CWSR_TBA_TMA_SIZE)); 436 437 kfree(pdd->qpd.doorbell_bitmap); 438 idr_destroy(&pdd->alloc_idr); 439 440 kfree(pdd); 441 } 442 } 443 444 /* No process locking is needed in this function, because the process 445 * is not findable any more. We must assume that no other thread is 446 * using it any more, otherwise we couldn't safely free the process 447 * structure in the end. 448 */ 449 static void kfd_process_wq_release(struct work_struct *work) 450 { 451 struct kfd_process *p = container_of(work, struct kfd_process, 452 release_work); 453 454 /* Remove the procfs files */ 455 if (p->kobj) { 456 sysfs_remove_file(p->kobj, &p->attr_pasid); 457 kobject_del(p->kobj); 458 kobject_put(p->kobj); 459 p->kobj = NULL; 460 } 461 462 kfd_iommu_unbind_process(p); 463 464 kfd_process_free_outstanding_kfd_bos(p); 465 466 kfd_process_destroy_pdds(p); 467 dma_fence_put(p->ef); 468 469 kfd_event_free_process(p); 470 471 kfd_pasid_free(p->pasid); 472 kfd_free_process_doorbells(p); 473 474 mutex_destroy(&p->mutex); 475 476 put_task_struct(p->lead_thread); 477 478 kfree(p); 479 } 480 481 static void kfd_process_ref_release(struct kref *ref) 482 { 483 struct kfd_process *p = container_of(ref, struct kfd_process, ref); 484 485 INIT_WORK(&p->release_work, kfd_process_wq_release); 486 queue_work(kfd_process_wq, &p->release_work); 487 } 488 489 static void kfd_process_free_notifier(struct mmu_notifier *mn) 490 { 491 kfd_unref_process(container_of(mn, struct kfd_process, mmu_notifier)); 492 } 493 494 static void kfd_process_notifier_release(struct mmu_notifier *mn, 495 struct mm_struct *mm) 496 { 497 struct kfd_process *p; 498 struct kfd_process_device *pdd = NULL; 499 500 /* 501 * The kfd_process structure can not be free because the 502 * mmu_notifier srcu is read locked 503 */ 504 p = container_of(mn, struct kfd_process, mmu_notifier); 505 if (WARN_ON(p->mm != mm)) 506 return; 507 508 mutex_lock(&kfd_processes_mutex); 509 hash_del_rcu(&p->kfd_processes); 510 mutex_unlock(&kfd_processes_mutex); 511 synchronize_srcu(&kfd_processes_srcu); 512 513 cancel_delayed_work_sync(&p->eviction_work); 514 cancel_delayed_work_sync(&p->restore_work); 515 516 mutex_lock(&p->mutex); 517 518 /* Iterate over all process device data structures and if the 519 * pdd is in debug mode, we should first force unregistration, 520 * then we will be able to destroy the queues 521 */ 522 list_for_each_entry(pdd, &p->per_device_data, per_device_list) { 523 struct kfd_dev *dev = pdd->dev; 524 525 mutex_lock(kfd_get_dbgmgr_mutex()); 526 if (dev && dev->dbgmgr && dev->dbgmgr->pasid == p->pasid) { 527 if (!kfd_dbgmgr_unregister(dev->dbgmgr, p)) { 528 kfd_dbgmgr_destroy(dev->dbgmgr); 529 dev->dbgmgr = NULL; 530 } 531 } 532 mutex_unlock(kfd_get_dbgmgr_mutex()); 533 } 534 535 kfd_process_dequeue_from_all_devices(p); 536 pqm_uninit(&p->pqm); 537 538 /* Indicate to other users that MM is no longer valid */ 539 p->mm = NULL; 540 541 mutex_unlock(&p->mutex); 542 543 mmu_notifier_put(&p->mmu_notifier); 544 } 545 546 static const struct mmu_notifier_ops kfd_process_mmu_notifier_ops = { 547 .release = kfd_process_notifier_release, 548 .free_notifier = kfd_process_free_notifier, 549 }; 550 551 static int kfd_process_init_cwsr_apu(struct kfd_process *p, struct file *filep) 552 { 553 unsigned long offset; 554 struct kfd_process_device *pdd; 555 556 list_for_each_entry(pdd, &p->per_device_data, per_device_list) { 557 struct kfd_dev *dev = pdd->dev; 558 struct qcm_process_device *qpd = &pdd->qpd; 559 560 if (!dev->cwsr_enabled || qpd->cwsr_kaddr || qpd->cwsr_base) 561 continue; 562 563 offset = KFD_MMAP_TYPE_RESERVED_MEM | KFD_MMAP_GPU_ID(dev->id); 564 qpd->tba_addr = (int64_t)vm_mmap(filep, 0, 565 KFD_CWSR_TBA_TMA_SIZE, PROT_READ | PROT_EXEC, 566 MAP_SHARED, offset); 567 568 if (IS_ERR_VALUE(qpd->tba_addr)) { 569 int err = qpd->tba_addr; 570 571 pr_err("Failure to set tba address. error %d.\n", err); 572 qpd->tba_addr = 0; 573 qpd->cwsr_kaddr = NULL; 574 return err; 575 } 576 577 memcpy(qpd->cwsr_kaddr, dev->cwsr_isa, dev->cwsr_isa_size); 578 579 qpd->tma_addr = qpd->tba_addr + KFD_CWSR_TMA_OFFSET; 580 pr_debug("set tba :0x%llx, tma:0x%llx, cwsr_kaddr:%p for pqm.\n", 581 qpd->tba_addr, qpd->tma_addr, qpd->cwsr_kaddr); 582 } 583 584 return 0; 585 } 586 587 static int kfd_process_device_init_cwsr_dgpu(struct kfd_process_device *pdd) 588 { 589 struct kfd_dev *dev = pdd->dev; 590 struct qcm_process_device *qpd = &pdd->qpd; 591 uint32_t flags = ALLOC_MEM_FLAGS_GTT | 592 ALLOC_MEM_FLAGS_NO_SUBSTITUTE | ALLOC_MEM_FLAGS_EXECUTABLE; 593 void *kaddr; 594 int ret; 595 596 if (!dev->cwsr_enabled || qpd->cwsr_kaddr || !qpd->cwsr_base) 597 return 0; 598 599 /* cwsr_base is only set for dGPU */ 600 ret = kfd_process_alloc_gpuvm(pdd, qpd->cwsr_base, 601 KFD_CWSR_TBA_TMA_SIZE, flags, &kaddr); 602 if (ret) 603 return ret; 604 605 qpd->cwsr_kaddr = kaddr; 606 qpd->tba_addr = qpd->cwsr_base; 607 608 memcpy(qpd->cwsr_kaddr, dev->cwsr_isa, dev->cwsr_isa_size); 609 610 qpd->tma_addr = qpd->tba_addr + KFD_CWSR_TMA_OFFSET; 611 pr_debug("set tba :0x%llx, tma:0x%llx, cwsr_kaddr:%p for pqm.\n", 612 qpd->tba_addr, qpd->tma_addr, qpd->cwsr_kaddr); 613 614 return 0; 615 } 616 617 /* 618 * On return the kfd_process is fully operational and will be freed when the 619 * mm is released 620 */ 621 static struct kfd_process *create_process(const struct task_struct *thread) 622 { 623 struct kfd_process *process; 624 int err = -ENOMEM; 625 626 process = kzalloc(sizeof(*process), GFP_KERNEL); 627 if (!process) 628 goto err_alloc_process; 629 630 kref_init(&process->ref); 631 mutex_init(&process->mutex); 632 process->mm = thread->mm; 633 process->lead_thread = thread->group_leader; 634 INIT_LIST_HEAD(&process->per_device_data); 635 INIT_DELAYED_WORK(&process->eviction_work, evict_process_worker); 636 INIT_DELAYED_WORK(&process->restore_work, restore_process_worker); 637 process->last_restore_timestamp = get_jiffies_64(); 638 kfd_event_init_process(process); 639 process->is_32bit_user_mode = in_compat_syscall(); 640 641 process->pasid = kfd_pasid_alloc(); 642 if (process->pasid == 0) 643 goto err_alloc_pasid; 644 645 if (kfd_alloc_process_doorbells(process) < 0) 646 goto err_alloc_doorbells; 647 648 err = pqm_init(&process->pqm, process); 649 if (err != 0) 650 goto err_process_pqm_init; 651 652 /* init process apertures*/ 653 err = kfd_init_apertures(process); 654 if (err != 0) 655 goto err_init_apertures; 656 657 /* Must be last, have to use release destruction after this */ 658 process->mmu_notifier.ops = &kfd_process_mmu_notifier_ops; 659 err = mmu_notifier_register(&process->mmu_notifier, process->mm); 660 if (err) 661 goto err_register_notifier; 662 663 get_task_struct(process->lead_thread); 664 hash_add_rcu(kfd_processes_table, &process->kfd_processes, 665 (uintptr_t)process->mm); 666 667 return process; 668 669 err_register_notifier: 670 kfd_process_free_outstanding_kfd_bos(process); 671 kfd_process_destroy_pdds(process); 672 err_init_apertures: 673 pqm_uninit(&process->pqm); 674 err_process_pqm_init: 675 kfd_free_process_doorbells(process); 676 err_alloc_doorbells: 677 kfd_pasid_free(process->pasid); 678 err_alloc_pasid: 679 mutex_destroy(&process->mutex); 680 kfree(process); 681 err_alloc_process: 682 return ERR_PTR(err); 683 } 684 685 static int init_doorbell_bitmap(struct qcm_process_device *qpd, 686 struct kfd_dev *dev) 687 { 688 unsigned int i; 689 int range_start = dev->shared_resources.non_cp_doorbells_start; 690 int range_end = dev->shared_resources.non_cp_doorbells_end; 691 692 if (!KFD_IS_SOC15(dev->device_info->asic_family)) 693 return 0; 694 695 qpd->doorbell_bitmap = 696 kzalloc(DIV_ROUND_UP(KFD_MAX_NUM_OF_QUEUES_PER_PROCESS, 697 BITS_PER_BYTE), GFP_KERNEL); 698 if (!qpd->doorbell_bitmap) 699 return -ENOMEM; 700 701 /* Mask out doorbells reserved for SDMA, IH, and VCN on SOC15. */ 702 pr_debug("reserved doorbell 0x%03x - 0x%03x\n", range_start, range_end); 703 pr_debug("reserved doorbell 0x%03x - 0x%03x\n", 704 range_start + KFD_QUEUE_DOORBELL_MIRROR_OFFSET, 705 range_end + KFD_QUEUE_DOORBELL_MIRROR_OFFSET); 706 707 for (i = 0; i < KFD_MAX_NUM_OF_QUEUES_PER_PROCESS / 2; i++) { 708 if (i >= range_start && i <= range_end) { 709 set_bit(i, qpd->doorbell_bitmap); 710 set_bit(i + KFD_QUEUE_DOORBELL_MIRROR_OFFSET, 711 qpd->doorbell_bitmap); 712 } 713 } 714 715 return 0; 716 } 717 718 struct kfd_process_device *kfd_get_process_device_data(struct kfd_dev *dev, 719 struct kfd_process *p) 720 { 721 struct kfd_process_device *pdd = NULL; 722 723 list_for_each_entry(pdd, &p->per_device_data, per_device_list) 724 if (pdd->dev == dev) 725 return pdd; 726 727 return NULL; 728 } 729 730 struct kfd_process_device *kfd_create_process_device_data(struct kfd_dev *dev, 731 struct kfd_process *p) 732 { 733 struct kfd_process_device *pdd = NULL; 734 735 pdd = kzalloc(sizeof(*pdd), GFP_KERNEL); 736 if (!pdd) 737 return NULL; 738 739 if (init_doorbell_bitmap(&pdd->qpd, dev)) { 740 pr_err("Failed to init doorbell for process\n"); 741 kfree(pdd); 742 return NULL; 743 } 744 745 pdd->dev = dev; 746 INIT_LIST_HEAD(&pdd->qpd.queues_list); 747 INIT_LIST_HEAD(&pdd->qpd.priv_queue_list); 748 pdd->qpd.dqm = dev->dqm; 749 pdd->qpd.pqm = &p->pqm; 750 pdd->qpd.evicted = 0; 751 pdd->process = p; 752 pdd->bound = PDD_UNBOUND; 753 pdd->already_dequeued = false; 754 list_add(&pdd->per_device_list, &p->per_device_data); 755 756 /* Init idr used for memory handle translation */ 757 idr_init(&pdd->alloc_idr); 758 759 return pdd; 760 } 761 762 /** 763 * kfd_process_device_init_vm - Initialize a VM for a process-device 764 * 765 * @pdd: The process-device 766 * @drm_file: Optional pointer to a DRM file descriptor 767 * 768 * If @drm_file is specified, it will be used to acquire the VM from 769 * that file descriptor. If successful, the @pdd takes ownership of 770 * the file descriptor. 771 * 772 * If @drm_file is NULL, a new VM is created. 773 * 774 * Returns 0 on success, -errno on failure. 775 */ 776 int kfd_process_device_init_vm(struct kfd_process_device *pdd, 777 struct file *drm_file) 778 { 779 struct kfd_process *p; 780 struct kfd_dev *dev; 781 int ret; 782 783 if (pdd->vm) 784 return drm_file ? -EBUSY : 0; 785 786 p = pdd->process; 787 dev = pdd->dev; 788 789 if (drm_file) 790 ret = amdgpu_amdkfd_gpuvm_acquire_process_vm( 791 dev->kgd, drm_file, p->pasid, 792 &pdd->vm, &p->kgd_process_info, &p->ef); 793 else 794 ret = amdgpu_amdkfd_gpuvm_create_process_vm(dev->kgd, p->pasid, 795 &pdd->vm, &p->kgd_process_info, &p->ef); 796 if (ret) { 797 pr_err("Failed to create process VM object\n"); 798 return ret; 799 } 800 801 amdgpu_vm_set_task_info(pdd->vm); 802 803 ret = kfd_process_device_reserve_ib_mem(pdd); 804 if (ret) 805 goto err_reserve_ib_mem; 806 ret = kfd_process_device_init_cwsr_dgpu(pdd); 807 if (ret) 808 goto err_init_cwsr; 809 810 pdd->drm_file = drm_file; 811 812 return 0; 813 814 err_init_cwsr: 815 err_reserve_ib_mem: 816 kfd_process_device_free_bos(pdd); 817 if (!drm_file) 818 amdgpu_amdkfd_gpuvm_destroy_process_vm(dev->kgd, pdd->vm); 819 pdd->vm = NULL; 820 821 return ret; 822 } 823 824 /* 825 * Direct the IOMMU to bind the process (specifically the pasid->mm) 826 * to the device. 827 * Unbinding occurs when the process dies or the device is removed. 828 * 829 * Assumes that the process lock is held. 830 */ 831 struct kfd_process_device *kfd_bind_process_to_device(struct kfd_dev *dev, 832 struct kfd_process *p) 833 { 834 struct kfd_process_device *pdd; 835 int err; 836 837 pdd = kfd_get_process_device_data(dev, p); 838 if (!pdd) { 839 pr_err("Process device data doesn't exist\n"); 840 return ERR_PTR(-ENOMEM); 841 } 842 843 err = kfd_iommu_bind_process_to_device(pdd); 844 if (err) 845 return ERR_PTR(err); 846 847 err = kfd_process_device_init_vm(pdd, NULL); 848 if (err) 849 return ERR_PTR(err); 850 851 return pdd; 852 } 853 854 struct kfd_process_device *kfd_get_first_process_device_data( 855 struct kfd_process *p) 856 { 857 return list_first_entry(&p->per_device_data, 858 struct kfd_process_device, 859 per_device_list); 860 } 861 862 struct kfd_process_device *kfd_get_next_process_device_data( 863 struct kfd_process *p, 864 struct kfd_process_device *pdd) 865 { 866 if (list_is_last(&pdd->per_device_list, &p->per_device_data)) 867 return NULL; 868 return list_next_entry(pdd, per_device_list); 869 } 870 871 bool kfd_has_process_device_data(struct kfd_process *p) 872 { 873 return !(list_empty(&p->per_device_data)); 874 } 875 876 /* Create specific handle mapped to mem from process local memory idr 877 * Assumes that the process lock is held. 878 */ 879 int kfd_process_device_create_obj_handle(struct kfd_process_device *pdd, 880 void *mem) 881 { 882 return idr_alloc(&pdd->alloc_idr, mem, 0, 0, GFP_KERNEL); 883 } 884 885 /* Translate specific handle from process local memory idr 886 * Assumes that the process lock is held. 887 */ 888 void *kfd_process_device_translate_handle(struct kfd_process_device *pdd, 889 int handle) 890 { 891 if (handle < 0) 892 return NULL; 893 894 return idr_find(&pdd->alloc_idr, handle); 895 } 896 897 /* Remove specific handle from process local memory idr 898 * Assumes that the process lock is held. 899 */ 900 void kfd_process_device_remove_obj_handle(struct kfd_process_device *pdd, 901 int handle) 902 { 903 if (handle >= 0) 904 idr_remove(&pdd->alloc_idr, handle); 905 } 906 907 /* This increments the process->ref counter. */ 908 struct kfd_process *kfd_lookup_process_by_pasid(unsigned int pasid) 909 { 910 struct kfd_process *p, *ret_p = NULL; 911 unsigned int temp; 912 913 int idx = srcu_read_lock(&kfd_processes_srcu); 914 915 hash_for_each_rcu(kfd_processes_table, temp, p, kfd_processes) { 916 if (p->pasid == pasid) { 917 kref_get(&p->ref); 918 ret_p = p; 919 break; 920 } 921 } 922 923 srcu_read_unlock(&kfd_processes_srcu, idx); 924 925 return ret_p; 926 } 927 928 /* This increments the process->ref counter. */ 929 struct kfd_process *kfd_lookup_process_by_mm(const struct mm_struct *mm) 930 { 931 struct kfd_process *p; 932 933 int idx = srcu_read_lock(&kfd_processes_srcu); 934 935 p = find_process_by_mm(mm); 936 if (p) 937 kref_get(&p->ref); 938 939 srcu_read_unlock(&kfd_processes_srcu, idx); 940 941 return p; 942 } 943 944 /* process_evict_queues - Evict all user queues of a process 945 * 946 * Eviction is reference-counted per process-device. This means multiple 947 * evictions from different sources can be nested safely. 948 */ 949 int kfd_process_evict_queues(struct kfd_process *p) 950 { 951 struct kfd_process_device *pdd; 952 int r = 0; 953 unsigned int n_evicted = 0; 954 955 list_for_each_entry(pdd, &p->per_device_data, per_device_list) { 956 r = pdd->dev->dqm->ops.evict_process_queues(pdd->dev->dqm, 957 &pdd->qpd); 958 if (r) { 959 pr_err("Failed to evict process queues\n"); 960 goto fail; 961 } 962 n_evicted++; 963 } 964 965 return r; 966 967 fail: 968 /* To keep state consistent, roll back partial eviction by 969 * restoring queues 970 */ 971 list_for_each_entry(pdd, &p->per_device_data, per_device_list) { 972 if (n_evicted == 0) 973 break; 974 if (pdd->dev->dqm->ops.restore_process_queues(pdd->dev->dqm, 975 &pdd->qpd)) 976 pr_err("Failed to restore queues\n"); 977 978 n_evicted--; 979 } 980 981 return r; 982 } 983 984 /* process_restore_queues - Restore all user queues of a process */ 985 int kfd_process_restore_queues(struct kfd_process *p) 986 { 987 struct kfd_process_device *pdd; 988 int r, ret = 0; 989 990 list_for_each_entry(pdd, &p->per_device_data, per_device_list) { 991 r = pdd->dev->dqm->ops.restore_process_queues(pdd->dev->dqm, 992 &pdd->qpd); 993 if (r) { 994 pr_err("Failed to restore process queues\n"); 995 if (!ret) 996 ret = r; 997 } 998 } 999 1000 return ret; 1001 } 1002 1003 static void evict_process_worker(struct work_struct *work) 1004 { 1005 int ret; 1006 struct kfd_process *p; 1007 struct delayed_work *dwork; 1008 1009 dwork = to_delayed_work(work); 1010 1011 /* Process termination destroys this worker thread. So during the 1012 * lifetime of this thread, kfd_process p will be valid 1013 */ 1014 p = container_of(dwork, struct kfd_process, eviction_work); 1015 WARN_ONCE(p->last_eviction_seqno != p->ef->seqno, 1016 "Eviction fence mismatch\n"); 1017 1018 /* Narrow window of overlap between restore and evict work 1019 * item is possible. Once amdgpu_amdkfd_gpuvm_restore_process_bos 1020 * unreserves KFD BOs, it is possible to evicted again. But 1021 * restore has few more steps of finish. So lets wait for any 1022 * previous restore work to complete 1023 */ 1024 flush_delayed_work(&p->restore_work); 1025 1026 pr_debug("Started evicting pasid 0x%x\n", p->pasid); 1027 ret = kfd_process_evict_queues(p); 1028 if (!ret) { 1029 dma_fence_signal(p->ef); 1030 dma_fence_put(p->ef); 1031 p->ef = NULL; 1032 queue_delayed_work(kfd_restore_wq, &p->restore_work, 1033 msecs_to_jiffies(PROCESS_RESTORE_TIME_MS)); 1034 1035 pr_debug("Finished evicting pasid 0x%x\n", p->pasid); 1036 } else 1037 pr_err("Failed to evict queues of pasid 0x%x\n", p->pasid); 1038 } 1039 1040 static void restore_process_worker(struct work_struct *work) 1041 { 1042 struct delayed_work *dwork; 1043 struct kfd_process *p; 1044 int ret = 0; 1045 1046 dwork = to_delayed_work(work); 1047 1048 /* Process termination destroys this worker thread. So during the 1049 * lifetime of this thread, kfd_process p will be valid 1050 */ 1051 p = container_of(dwork, struct kfd_process, restore_work); 1052 pr_debug("Started restoring pasid 0x%x\n", p->pasid); 1053 1054 /* Setting last_restore_timestamp before successful restoration. 1055 * Otherwise this would have to be set by KGD (restore_process_bos) 1056 * before KFD BOs are unreserved. If not, the process can be evicted 1057 * again before the timestamp is set. 1058 * If restore fails, the timestamp will be set again in the next 1059 * attempt. This would mean that the minimum GPU quanta would be 1060 * PROCESS_ACTIVE_TIME_MS - (time to execute the following two 1061 * functions) 1062 */ 1063 1064 p->last_restore_timestamp = get_jiffies_64(); 1065 ret = amdgpu_amdkfd_gpuvm_restore_process_bos(p->kgd_process_info, 1066 &p->ef); 1067 if (ret) { 1068 pr_debug("Failed to restore BOs of pasid 0x%x, retry after %d ms\n", 1069 p->pasid, PROCESS_BACK_OFF_TIME_MS); 1070 ret = queue_delayed_work(kfd_restore_wq, &p->restore_work, 1071 msecs_to_jiffies(PROCESS_BACK_OFF_TIME_MS)); 1072 WARN(!ret, "reschedule restore work failed\n"); 1073 return; 1074 } 1075 1076 ret = kfd_process_restore_queues(p); 1077 if (!ret) 1078 pr_debug("Finished restoring pasid 0x%x\n", p->pasid); 1079 else 1080 pr_err("Failed to restore queues of pasid 0x%x\n", p->pasid); 1081 } 1082 1083 void kfd_suspend_all_processes(void) 1084 { 1085 struct kfd_process *p; 1086 unsigned int temp; 1087 int idx = srcu_read_lock(&kfd_processes_srcu); 1088 1089 hash_for_each_rcu(kfd_processes_table, temp, p, kfd_processes) { 1090 cancel_delayed_work_sync(&p->eviction_work); 1091 cancel_delayed_work_sync(&p->restore_work); 1092 1093 if (kfd_process_evict_queues(p)) 1094 pr_err("Failed to suspend process 0x%x\n", p->pasid); 1095 dma_fence_signal(p->ef); 1096 dma_fence_put(p->ef); 1097 p->ef = NULL; 1098 } 1099 srcu_read_unlock(&kfd_processes_srcu, idx); 1100 } 1101 1102 int kfd_resume_all_processes(void) 1103 { 1104 struct kfd_process *p; 1105 unsigned int temp; 1106 int ret = 0, idx = srcu_read_lock(&kfd_processes_srcu); 1107 1108 hash_for_each_rcu(kfd_processes_table, temp, p, kfd_processes) { 1109 if (!queue_delayed_work(kfd_restore_wq, &p->restore_work, 0)) { 1110 pr_err("Restore process %d failed during resume\n", 1111 p->pasid); 1112 ret = -EFAULT; 1113 } 1114 } 1115 srcu_read_unlock(&kfd_processes_srcu, idx); 1116 return ret; 1117 } 1118 1119 int kfd_reserved_mem_mmap(struct kfd_dev *dev, struct kfd_process *process, 1120 struct vm_area_struct *vma) 1121 { 1122 struct kfd_process_device *pdd; 1123 struct qcm_process_device *qpd; 1124 1125 if ((vma->vm_end - vma->vm_start) != KFD_CWSR_TBA_TMA_SIZE) { 1126 pr_err("Incorrect CWSR mapping size.\n"); 1127 return -EINVAL; 1128 } 1129 1130 pdd = kfd_get_process_device_data(dev, process); 1131 if (!pdd) 1132 return -EINVAL; 1133 qpd = &pdd->qpd; 1134 1135 qpd->cwsr_kaddr = (void *)__get_free_pages(GFP_KERNEL | __GFP_ZERO, 1136 get_order(KFD_CWSR_TBA_TMA_SIZE)); 1137 if (!qpd->cwsr_kaddr) { 1138 pr_err("Error allocating per process CWSR buffer.\n"); 1139 return -ENOMEM; 1140 } 1141 1142 vma->vm_flags |= VM_IO | VM_DONTCOPY | VM_DONTEXPAND 1143 | VM_NORESERVE | VM_DONTDUMP | VM_PFNMAP; 1144 /* Mapping pages to user process */ 1145 return remap_pfn_range(vma, vma->vm_start, 1146 PFN_DOWN(__pa(qpd->cwsr_kaddr)), 1147 KFD_CWSR_TBA_TMA_SIZE, vma->vm_page_prot); 1148 } 1149 1150 void kfd_flush_tlb(struct kfd_process_device *pdd) 1151 { 1152 struct kfd_dev *dev = pdd->dev; 1153 const struct kfd2kgd_calls *f2g = dev->kfd2kgd; 1154 1155 if (dev->dqm->sched_policy == KFD_SCHED_POLICY_NO_HWS) { 1156 /* Nothing to flush until a VMID is assigned, which 1157 * only happens when the first queue is created. 1158 */ 1159 if (pdd->qpd.vmid) 1160 f2g->invalidate_tlbs_vmid(dev->kgd, pdd->qpd.vmid); 1161 } else { 1162 f2g->invalidate_tlbs(dev->kgd, pdd->process->pasid); 1163 } 1164 } 1165 1166 #if defined(CONFIG_DEBUG_FS) 1167 1168 int kfd_debugfs_mqds_by_process(struct seq_file *m, void *data) 1169 { 1170 struct kfd_process *p; 1171 unsigned int temp; 1172 int r = 0; 1173 1174 int idx = srcu_read_lock(&kfd_processes_srcu); 1175 1176 hash_for_each_rcu(kfd_processes_table, temp, p, kfd_processes) { 1177 seq_printf(m, "Process %d PASID 0x%x:\n", 1178 p->lead_thread->tgid, p->pasid); 1179 1180 mutex_lock(&p->mutex); 1181 r = pqm_debugfs_mqds(m, &p->pqm); 1182 mutex_unlock(&p->mutex); 1183 1184 if (r) 1185 break; 1186 } 1187 1188 srcu_read_unlock(&kfd_processes_srcu, idx); 1189 1190 return r; 1191 } 1192 1193 #endif 1194 1195