1 // SPDX-License-Identifier: GPL-2.0 OR MIT 2 /* 3 * Copyright 2014-2022 Advanced Micro Devices, Inc. 4 * 5 * Permission is hereby granted, free of charge, to any person obtaining a 6 * copy of this software and associated documentation files (the "Software"), 7 * to deal in the Software without restriction, including without limitation 8 * the rights to use, copy, modify, merge, publish, distribute, sublicense, 9 * and/or sell copies of the Software, and to permit persons to whom the 10 * Software is furnished to do so, subject to the following conditions: 11 * 12 * The above copyright notice and this permission notice shall be included in 13 * all copies or substantial portions of the Software. 14 * 15 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 16 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 17 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL 18 * THE COPYRIGHT HOLDER(S) OR AUTHOR(S) BE LIABLE FOR ANY CLAIM, DAMAGES OR 19 * OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, 20 * ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR 21 * OTHER DEALINGS IN THE SOFTWARE. 22 */ 23 24 #include <linux/mutex.h> 25 #include <linux/log2.h> 26 #include <linux/sched.h> 27 #include <linux/sched/mm.h> 28 #include <linux/sched/task.h> 29 #include <linux/mmu_context.h> 30 #include <linux/slab.h> 31 #include <linux/amd-iommu.h> 32 #include <linux/notifier.h> 33 #include <linux/compat.h> 34 #include <linux/mman.h> 35 #include <linux/file.h> 36 #include <linux/pm_runtime.h> 37 #include "amdgpu_amdkfd.h" 38 #include "amdgpu.h" 39 40 struct mm_struct; 41 42 #include "kfd_priv.h" 43 #include "kfd_device_queue_manager.h" 44 #include "kfd_iommu.h" 45 #include "kfd_svm.h" 46 #include "kfd_smi_events.h" 47 #include "kfd_debug.h" 48 49 /* 50 * List of struct kfd_process (field kfd_process). 51 * Unique/indexed by mm_struct* 52 */ 53 DEFINE_HASHTABLE(kfd_processes_table, KFD_PROCESS_TABLE_SIZE); 54 DEFINE_MUTEX(kfd_processes_mutex); 55 56 DEFINE_SRCU(kfd_processes_srcu); 57 58 /* For process termination handling */ 59 static struct workqueue_struct *kfd_process_wq; 60 61 /* Ordered, single-threaded workqueue for restoring evicted 62 * processes. Restoring multiple processes concurrently under memory 63 * pressure can lead to processes blocking each other from validating 64 * their BOs and result in a live-lock situation where processes 65 * remain evicted indefinitely. 66 */ 67 static struct workqueue_struct *kfd_restore_wq; 68 69 static struct kfd_process *find_process(const struct task_struct *thread, 70 bool ref); 71 static void kfd_process_ref_release(struct kref *ref); 72 static struct kfd_process *create_process(const struct task_struct *thread); 73 74 static void evict_process_worker(struct work_struct *work); 75 static void restore_process_worker(struct work_struct *work); 76 77 static void kfd_process_device_destroy_cwsr_dgpu(struct kfd_process_device *pdd); 78 79 struct kfd_procfs_tree { 80 struct kobject *kobj; 81 }; 82 83 static struct kfd_procfs_tree procfs; 84 85 /* 86 * Structure for SDMA activity tracking 87 */ 88 struct kfd_sdma_activity_handler_workarea { 89 struct work_struct sdma_activity_work; 90 struct kfd_process_device *pdd; 91 uint64_t sdma_activity_counter; 92 }; 93 94 struct temp_sdma_queue_list { 95 uint64_t __user *rptr; 96 uint64_t sdma_val; 97 unsigned int queue_id; 98 struct list_head list; 99 }; 100 101 static void kfd_sdma_activity_worker(struct work_struct *work) 102 { 103 struct kfd_sdma_activity_handler_workarea *workarea; 104 struct kfd_process_device *pdd; 105 uint64_t val; 106 struct mm_struct *mm; 107 struct queue *q; 108 struct qcm_process_device *qpd; 109 struct device_queue_manager *dqm; 110 int ret = 0; 111 struct temp_sdma_queue_list sdma_q_list; 112 struct temp_sdma_queue_list *sdma_q, *next; 113 114 workarea = container_of(work, struct kfd_sdma_activity_handler_workarea, 115 sdma_activity_work); 116 117 pdd = workarea->pdd; 118 if (!pdd) 119 return; 120 dqm = pdd->dev->dqm; 121 qpd = &pdd->qpd; 122 if (!dqm || !qpd) 123 return; 124 /* 125 * Total SDMA activity is current SDMA activity + past SDMA activity 126 * Past SDMA count is stored in pdd. 127 * To get the current activity counters for all active SDMA queues, 128 * we loop over all SDMA queues and get their counts from user-space. 129 * 130 * We cannot call get_user() with dqm_lock held as it can cause 131 * a circular lock dependency situation. To read the SDMA stats, 132 * we need to do the following: 133 * 134 * 1. Create a temporary list of SDMA queue nodes from the qpd->queues_list, 135 * with dqm_lock/dqm_unlock(). 136 * 2. Call get_user() for each node in temporary list without dqm_lock. 137 * Save the SDMA count for each node and also add the count to the total 138 * SDMA count counter. 139 * Its possible, during this step, a few SDMA queue nodes got deleted 140 * from the qpd->queues_list. 141 * 3. Do a second pass over qpd->queues_list to check if any nodes got deleted. 142 * If any node got deleted, its SDMA count would be captured in the sdma 143 * past activity counter. So subtract the SDMA counter stored in step 2 144 * for this node from the total SDMA count. 145 */ 146 INIT_LIST_HEAD(&sdma_q_list.list); 147 148 /* 149 * Create the temp list of all SDMA queues 150 */ 151 dqm_lock(dqm); 152 153 list_for_each_entry(q, &qpd->queues_list, list) { 154 if ((q->properties.type != KFD_QUEUE_TYPE_SDMA) && 155 (q->properties.type != KFD_QUEUE_TYPE_SDMA_XGMI)) 156 continue; 157 158 sdma_q = kzalloc(sizeof(struct temp_sdma_queue_list), GFP_KERNEL); 159 if (!sdma_q) { 160 dqm_unlock(dqm); 161 goto cleanup; 162 } 163 164 INIT_LIST_HEAD(&sdma_q->list); 165 sdma_q->rptr = (uint64_t __user *)q->properties.read_ptr; 166 sdma_q->queue_id = q->properties.queue_id; 167 list_add_tail(&sdma_q->list, &sdma_q_list.list); 168 } 169 170 /* 171 * If the temp list is empty, then no SDMA queues nodes were found in 172 * qpd->queues_list. Return the past activity count as the total sdma 173 * count 174 */ 175 if (list_empty(&sdma_q_list.list)) { 176 workarea->sdma_activity_counter = pdd->sdma_past_activity_counter; 177 dqm_unlock(dqm); 178 return; 179 } 180 181 dqm_unlock(dqm); 182 183 /* 184 * Get the usage count for each SDMA queue in temp_list. 185 */ 186 mm = get_task_mm(pdd->process->lead_thread); 187 if (!mm) 188 goto cleanup; 189 190 kthread_use_mm(mm); 191 192 list_for_each_entry(sdma_q, &sdma_q_list.list, list) { 193 val = 0; 194 ret = read_sdma_queue_counter(sdma_q->rptr, &val); 195 if (ret) { 196 pr_debug("Failed to read SDMA queue active counter for queue id: %d", 197 sdma_q->queue_id); 198 } else { 199 sdma_q->sdma_val = val; 200 workarea->sdma_activity_counter += val; 201 } 202 } 203 204 kthread_unuse_mm(mm); 205 mmput(mm); 206 207 /* 208 * Do a second iteration over qpd_queues_list to check if any SDMA 209 * nodes got deleted while fetching SDMA counter. 210 */ 211 dqm_lock(dqm); 212 213 workarea->sdma_activity_counter += pdd->sdma_past_activity_counter; 214 215 list_for_each_entry(q, &qpd->queues_list, list) { 216 if (list_empty(&sdma_q_list.list)) 217 break; 218 219 if ((q->properties.type != KFD_QUEUE_TYPE_SDMA) && 220 (q->properties.type != KFD_QUEUE_TYPE_SDMA_XGMI)) 221 continue; 222 223 list_for_each_entry_safe(sdma_q, next, &sdma_q_list.list, list) { 224 if (((uint64_t __user *)q->properties.read_ptr == sdma_q->rptr) && 225 (sdma_q->queue_id == q->properties.queue_id)) { 226 list_del(&sdma_q->list); 227 kfree(sdma_q); 228 break; 229 } 230 } 231 } 232 233 dqm_unlock(dqm); 234 235 /* 236 * If temp list is not empty, it implies some queues got deleted 237 * from qpd->queues_list during SDMA usage read. Subtract the SDMA 238 * count for each node from the total SDMA count. 239 */ 240 list_for_each_entry_safe(sdma_q, next, &sdma_q_list.list, list) { 241 workarea->sdma_activity_counter -= sdma_q->sdma_val; 242 list_del(&sdma_q->list); 243 kfree(sdma_q); 244 } 245 246 return; 247 248 cleanup: 249 list_for_each_entry_safe(sdma_q, next, &sdma_q_list.list, list) { 250 list_del(&sdma_q->list); 251 kfree(sdma_q); 252 } 253 } 254 255 /** 256 * kfd_get_cu_occupancy - Collect number of waves in-flight on this device 257 * by current process. Translates acquired wave count into number of compute units 258 * that are occupied. 259 * 260 * @attr: Handle of attribute that allows reporting of wave count. The attribute 261 * handle encapsulates GPU device it is associated with, thereby allowing collection 262 * of waves in flight, etc 263 * @buffer: Handle of user provided buffer updated with wave count 264 * 265 * Return: Number of bytes written to user buffer or an error value 266 */ 267 static int kfd_get_cu_occupancy(struct attribute *attr, char *buffer) 268 { 269 int cu_cnt; 270 int wave_cnt; 271 int max_waves_per_cu; 272 struct kfd_node *dev = NULL; 273 struct kfd_process *proc = NULL; 274 struct kfd_process_device *pdd = NULL; 275 276 pdd = container_of(attr, struct kfd_process_device, attr_cu_occupancy); 277 dev = pdd->dev; 278 if (dev->kfd2kgd->get_cu_occupancy == NULL) 279 return -EINVAL; 280 281 cu_cnt = 0; 282 proc = pdd->process; 283 if (pdd->qpd.queue_count == 0) { 284 pr_debug("Gpu-Id: %d has no active queues for process %d\n", 285 dev->id, proc->pasid); 286 return snprintf(buffer, PAGE_SIZE, "%d\n", cu_cnt); 287 } 288 289 /* Collect wave count from device if it supports */ 290 wave_cnt = 0; 291 max_waves_per_cu = 0; 292 dev->kfd2kgd->get_cu_occupancy(dev->adev, proc->pasid, &wave_cnt, 293 &max_waves_per_cu, 0); 294 295 /* Translate wave count to number of compute units */ 296 cu_cnt = (wave_cnt + (max_waves_per_cu - 1)) / max_waves_per_cu; 297 return snprintf(buffer, PAGE_SIZE, "%d\n", cu_cnt); 298 } 299 300 static ssize_t kfd_procfs_show(struct kobject *kobj, struct attribute *attr, 301 char *buffer) 302 { 303 if (strcmp(attr->name, "pasid") == 0) { 304 struct kfd_process *p = container_of(attr, struct kfd_process, 305 attr_pasid); 306 307 return snprintf(buffer, PAGE_SIZE, "%d\n", p->pasid); 308 } else if (strncmp(attr->name, "vram_", 5) == 0) { 309 struct kfd_process_device *pdd = container_of(attr, struct kfd_process_device, 310 attr_vram); 311 return snprintf(buffer, PAGE_SIZE, "%llu\n", READ_ONCE(pdd->vram_usage)); 312 } else if (strncmp(attr->name, "sdma_", 5) == 0) { 313 struct kfd_process_device *pdd = container_of(attr, struct kfd_process_device, 314 attr_sdma); 315 struct kfd_sdma_activity_handler_workarea sdma_activity_work_handler; 316 317 INIT_WORK(&sdma_activity_work_handler.sdma_activity_work, 318 kfd_sdma_activity_worker); 319 320 sdma_activity_work_handler.pdd = pdd; 321 sdma_activity_work_handler.sdma_activity_counter = 0; 322 323 schedule_work(&sdma_activity_work_handler.sdma_activity_work); 324 325 flush_work(&sdma_activity_work_handler.sdma_activity_work); 326 327 return snprintf(buffer, PAGE_SIZE, "%llu\n", 328 (sdma_activity_work_handler.sdma_activity_counter)/ 329 SDMA_ACTIVITY_DIVISOR); 330 } else { 331 pr_err("Invalid attribute"); 332 return -EINVAL; 333 } 334 335 return 0; 336 } 337 338 static void kfd_procfs_kobj_release(struct kobject *kobj) 339 { 340 kfree(kobj); 341 } 342 343 static const struct sysfs_ops kfd_procfs_ops = { 344 .show = kfd_procfs_show, 345 }; 346 347 static const struct kobj_type procfs_type = { 348 .release = kfd_procfs_kobj_release, 349 .sysfs_ops = &kfd_procfs_ops, 350 }; 351 352 void kfd_procfs_init(void) 353 { 354 int ret = 0; 355 356 procfs.kobj = kfd_alloc_struct(procfs.kobj); 357 if (!procfs.kobj) 358 return; 359 360 ret = kobject_init_and_add(procfs.kobj, &procfs_type, 361 &kfd_device->kobj, "proc"); 362 if (ret) { 363 pr_warn("Could not create procfs proc folder"); 364 /* If we fail to create the procfs, clean up */ 365 kfd_procfs_shutdown(); 366 } 367 } 368 369 void kfd_procfs_shutdown(void) 370 { 371 if (procfs.kobj) { 372 kobject_del(procfs.kobj); 373 kobject_put(procfs.kobj); 374 procfs.kobj = NULL; 375 } 376 } 377 378 static ssize_t kfd_procfs_queue_show(struct kobject *kobj, 379 struct attribute *attr, char *buffer) 380 { 381 struct queue *q = container_of(kobj, struct queue, kobj); 382 383 if (!strcmp(attr->name, "size")) 384 return snprintf(buffer, PAGE_SIZE, "%llu", 385 q->properties.queue_size); 386 else if (!strcmp(attr->name, "type")) 387 return snprintf(buffer, PAGE_SIZE, "%d", q->properties.type); 388 else if (!strcmp(attr->name, "gpuid")) 389 return snprintf(buffer, PAGE_SIZE, "%u", q->device->id); 390 else 391 pr_err("Invalid attribute"); 392 393 return 0; 394 } 395 396 static ssize_t kfd_procfs_stats_show(struct kobject *kobj, 397 struct attribute *attr, char *buffer) 398 { 399 if (strcmp(attr->name, "evicted_ms") == 0) { 400 struct kfd_process_device *pdd = container_of(attr, 401 struct kfd_process_device, 402 attr_evict); 403 uint64_t evict_jiffies; 404 405 evict_jiffies = atomic64_read(&pdd->evict_duration_counter); 406 407 return snprintf(buffer, 408 PAGE_SIZE, 409 "%llu\n", 410 jiffies64_to_msecs(evict_jiffies)); 411 412 /* Sysfs handle that gets CU occupancy is per device */ 413 } else if (strcmp(attr->name, "cu_occupancy") == 0) { 414 return kfd_get_cu_occupancy(attr, buffer); 415 } else { 416 pr_err("Invalid attribute"); 417 } 418 419 return 0; 420 } 421 422 static ssize_t kfd_sysfs_counters_show(struct kobject *kobj, 423 struct attribute *attr, char *buf) 424 { 425 struct kfd_process_device *pdd; 426 427 if (!strcmp(attr->name, "faults")) { 428 pdd = container_of(attr, struct kfd_process_device, 429 attr_faults); 430 return sysfs_emit(buf, "%llu\n", READ_ONCE(pdd->faults)); 431 } 432 if (!strcmp(attr->name, "page_in")) { 433 pdd = container_of(attr, struct kfd_process_device, 434 attr_page_in); 435 return sysfs_emit(buf, "%llu\n", READ_ONCE(pdd->page_in)); 436 } 437 if (!strcmp(attr->name, "page_out")) { 438 pdd = container_of(attr, struct kfd_process_device, 439 attr_page_out); 440 return sysfs_emit(buf, "%llu\n", READ_ONCE(pdd->page_out)); 441 } 442 return 0; 443 } 444 445 static struct attribute attr_queue_size = { 446 .name = "size", 447 .mode = KFD_SYSFS_FILE_MODE 448 }; 449 450 static struct attribute attr_queue_type = { 451 .name = "type", 452 .mode = KFD_SYSFS_FILE_MODE 453 }; 454 455 static struct attribute attr_queue_gpuid = { 456 .name = "gpuid", 457 .mode = KFD_SYSFS_FILE_MODE 458 }; 459 460 static struct attribute *procfs_queue_attrs[] = { 461 &attr_queue_size, 462 &attr_queue_type, 463 &attr_queue_gpuid, 464 NULL 465 }; 466 ATTRIBUTE_GROUPS(procfs_queue); 467 468 static const struct sysfs_ops procfs_queue_ops = { 469 .show = kfd_procfs_queue_show, 470 }; 471 472 static const struct kobj_type procfs_queue_type = { 473 .sysfs_ops = &procfs_queue_ops, 474 .default_groups = procfs_queue_groups, 475 }; 476 477 static const struct sysfs_ops procfs_stats_ops = { 478 .show = kfd_procfs_stats_show, 479 }; 480 481 static const struct kobj_type procfs_stats_type = { 482 .sysfs_ops = &procfs_stats_ops, 483 .release = kfd_procfs_kobj_release, 484 }; 485 486 static const struct sysfs_ops sysfs_counters_ops = { 487 .show = kfd_sysfs_counters_show, 488 }; 489 490 static const struct kobj_type sysfs_counters_type = { 491 .sysfs_ops = &sysfs_counters_ops, 492 .release = kfd_procfs_kobj_release, 493 }; 494 495 int kfd_procfs_add_queue(struct queue *q) 496 { 497 struct kfd_process *proc; 498 int ret; 499 500 if (!q || !q->process) 501 return -EINVAL; 502 proc = q->process; 503 504 /* Create proc/<pid>/queues/<queue id> folder */ 505 if (!proc->kobj_queues) 506 return -EFAULT; 507 ret = kobject_init_and_add(&q->kobj, &procfs_queue_type, 508 proc->kobj_queues, "%u", q->properties.queue_id); 509 if (ret < 0) { 510 pr_warn("Creating proc/<pid>/queues/%u failed", 511 q->properties.queue_id); 512 kobject_put(&q->kobj); 513 return ret; 514 } 515 516 return 0; 517 } 518 519 static void kfd_sysfs_create_file(struct kobject *kobj, struct attribute *attr, 520 char *name) 521 { 522 int ret; 523 524 if (!kobj || !attr || !name) 525 return; 526 527 attr->name = name; 528 attr->mode = KFD_SYSFS_FILE_MODE; 529 sysfs_attr_init(attr); 530 531 ret = sysfs_create_file(kobj, attr); 532 if (ret) 533 pr_warn("Create sysfs %s/%s failed %d", kobj->name, name, ret); 534 } 535 536 static void kfd_procfs_add_sysfs_stats(struct kfd_process *p) 537 { 538 int ret; 539 int i; 540 char stats_dir_filename[MAX_SYSFS_FILENAME_LEN]; 541 542 if (!p || !p->kobj) 543 return; 544 545 /* 546 * Create sysfs files for each GPU: 547 * - proc/<pid>/stats_<gpuid>/ 548 * - proc/<pid>/stats_<gpuid>/evicted_ms 549 * - proc/<pid>/stats_<gpuid>/cu_occupancy 550 */ 551 for (i = 0; i < p->n_pdds; i++) { 552 struct kfd_process_device *pdd = p->pdds[i]; 553 554 snprintf(stats_dir_filename, MAX_SYSFS_FILENAME_LEN, 555 "stats_%u", pdd->dev->id); 556 pdd->kobj_stats = kfd_alloc_struct(pdd->kobj_stats); 557 if (!pdd->kobj_stats) 558 return; 559 560 ret = kobject_init_and_add(pdd->kobj_stats, 561 &procfs_stats_type, 562 p->kobj, 563 stats_dir_filename); 564 565 if (ret) { 566 pr_warn("Creating KFD proc/stats_%s folder failed", 567 stats_dir_filename); 568 kobject_put(pdd->kobj_stats); 569 pdd->kobj_stats = NULL; 570 return; 571 } 572 573 kfd_sysfs_create_file(pdd->kobj_stats, &pdd->attr_evict, 574 "evicted_ms"); 575 /* Add sysfs file to report compute unit occupancy */ 576 if (pdd->dev->kfd2kgd->get_cu_occupancy) 577 kfd_sysfs_create_file(pdd->kobj_stats, 578 &pdd->attr_cu_occupancy, 579 "cu_occupancy"); 580 } 581 } 582 583 static void kfd_procfs_add_sysfs_counters(struct kfd_process *p) 584 { 585 int ret = 0; 586 int i; 587 char counters_dir_filename[MAX_SYSFS_FILENAME_LEN]; 588 589 if (!p || !p->kobj) 590 return; 591 592 /* 593 * Create sysfs files for each GPU which supports SVM 594 * - proc/<pid>/counters_<gpuid>/ 595 * - proc/<pid>/counters_<gpuid>/faults 596 * - proc/<pid>/counters_<gpuid>/page_in 597 * - proc/<pid>/counters_<gpuid>/page_out 598 */ 599 for_each_set_bit(i, p->svms.bitmap_supported, p->n_pdds) { 600 struct kfd_process_device *pdd = p->pdds[i]; 601 struct kobject *kobj_counters; 602 603 snprintf(counters_dir_filename, MAX_SYSFS_FILENAME_LEN, 604 "counters_%u", pdd->dev->id); 605 kobj_counters = kfd_alloc_struct(kobj_counters); 606 if (!kobj_counters) 607 return; 608 609 ret = kobject_init_and_add(kobj_counters, &sysfs_counters_type, 610 p->kobj, counters_dir_filename); 611 if (ret) { 612 pr_warn("Creating KFD proc/%s folder failed", 613 counters_dir_filename); 614 kobject_put(kobj_counters); 615 return; 616 } 617 618 pdd->kobj_counters = kobj_counters; 619 kfd_sysfs_create_file(kobj_counters, &pdd->attr_faults, 620 "faults"); 621 kfd_sysfs_create_file(kobj_counters, &pdd->attr_page_in, 622 "page_in"); 623 kfd_sysfs_create_file(kobj_counters, &pdd->attr_page_out, 624 "page_out"); 625 } 626 } 627 628 static void kfd_procfs_add_sysfs_files(struct kfd_process *p) 629 { 630 int i; 631 632 if (!p || !p->kobj) 633 return; 634 635 /* 636 * Create sysfs files for each GPU: 637 * - proc/<pid>/vram_<gpuid> 638 * - proc/<pid>/sdma_<gpuid> 639 */ 640 for (i = 0; i < p->n_pdds; i++) { 641 struct kfd_process_device *pdd = p->pdds[i]; 642 643 snprintf(pdd->vram_filename, MAX_SYSFS_FILENAME_LEN, "vram_%u", 644 pdd->dev->id); 645 kfd_sysfs_create_file(p->kobj, &pdd->attr_vram, 646 pdd->vram_filename); 647 648 snprintf(pdd->sdma_filename, MAX_SYSFS_FILENAME_LEN, "sdma_%u", 649 pdd->dev->id); 650 kfd_sysfs_create_file(p->kobj, &pdd->attr_sdma, 651 pdd->sdma_filename); 652 } 653 } 654 655 void kfd_procfs_del_queue(struct queue *q) 656 { 657 if (!q) 658 return; 659 660 kobject_del(&q->kobj); 661 kobject_put(&q->kobj); 662 } 663 664 int kfd_process_create_wq(void) 665 { 666 if (!kfd_process_wq) 667 kfd_process_wq = alloc_workqueue("kfd_process_wq", 0, 0); 668 if (!kfd_restore_wq) 669 kfd_restore_wq = alloc_ordered_workqueue("kfd_restore_wq", 0); 670 671 if (!kfd_process_wq || !kfd_restore_wq) { 672 kfd_process_destroy_wq(); 673 return -ENOMEM; 674 } 675 676 return 0; 677 } 678 679 void kfd_process_destroy_wq(void) 680 { 681 if (kfd_process_wq) { 682 destroy_workqueue(kfd_process_wq); 683 kfd_process_wq = NULL; 684 } 685 if (kfd_restore_wq) { 686 destroy_workqueue(kfd_restore_wq); 687 kfd_restore_wq = NULL; 688 } 689 } 690 691 static void kfd_process_free_gpuvm(struct kgd_mem *mem, 692 struct kfd_process_device *pdd, void **kptr) 693 { 694 struct kfd_node *dev = pdd->dev; 695 696 if (kptr && *kptr) { 697 amdgpu_amdkfd_gpuvm_unmap_gtt_bo_from_kernel(mem); 698 *kptr = NULL; 699 } 700 701 amdgpu_amdkfd_gpuvm_unmap_memory_from_gpu(dev->adev, mem, pdd->drm_priv); 702 amdgpu_amdkfd_gpuvm_free_memory_of_gpu(dev->adev, mem, pdd->drm_priv, 703 NULL); 704 } 705 706 /* kfd_process_alloc_gpuvm - Allocate GPU VM for the KFD process 707 * This function should be only called right after the process 708 * is created and when kfd_processes_mutex is still being held 709 * to avoid concurrency. Because of that exclusiveness, we do 710 * not need to take p->mutex. 711 */ 712 static int kfd_process_alloc_gpuvm(struct kfd_process_device *pdd, 713 uint64_t gpu_va, uint32_t size, 714 uint32_t flags, struct kgd_mem **mem, void **kptr) 715 { 716 struct kfd_node *kdev = pdd->dev; 717 int err; 718 719 err = amdgpu_amdkfd_gpuvm_alloc_memory_of_gpu(kdev->adev, gpu_va, size, 720 pdd->drm_priv, mem, NULL, 721 flags, false); 722 if (err) 723 goto err_alloc_mem; 724 725 err = amdgpu_amdkfd_gpuvm_map_memory_to_gpu(kdev->adev, *mem, 726 pdd->drm_priv); 727 if (err) 728 goto err_map_mem; 729 730 err = amdgpu_amdkfd_gpuvm_sync_memory(kdev->adev, *mem, true); 731 if (err) { 732 pr_debug("Sync memory failed, wait interrupted by user signal\n"); 733 goto sync_memory_failed; 734 } 735 736 if (kptr) { 737 err = amdgpu_amdkfd_gpuvm_map_gtt_bo_to_kernel( 738 (struct kgd_mem *)*mem, kptr, NULL); 739 if (err) { 740 pr_debug("Map GTT BO to kernel failed\n"); 741 goto sync_memory_failed; 742 } 743 } 744 745 return err; 746 747 sync_memory_failed: 748 amdgpu_amdkfd_gpuvm_unmap_memory_from_gpu(kdev->adev, *mem, pdd->drm_priv); 749 750 err_map_mem: 751 amdgpu_amdkfd_gpuvm_free_memory_of_gpu(kdev->adev, *mem, pdd->drm_priv, 752 NULL); 753 err_alloc_mem: 754 *mem = NULL; 755 *kptr = NULL; 756 return err; 757 } 758 759 /* kfd_process_device_reserve_ib_mem - Reserve memory inside the 760 * process for IB usage The memory reserved is for KFD to submit 761 * IB to AMDGPU from kernel. If the memory is reserved 762 * successfully, ib_kaddr will have the CPU/kernel 763 * address. Check ib_kaddr before accessing the memory. 764 */ 765 static int kfd_process_device_reserve_ib_mem(struct kfd_process_device *pdd) 766 { 767 struct qcm_process_device *qpd = &pdd->qpd; 768 uint32_t flags = KFD_IOC_ALLOC_MEM_FLAGS_GTT | 769 KFD_IOC_ALLOC_MEM_FLAGS_NO_SUBSTITUTE | 770 KFD_IOC_ALLOC_MEM_FLAGS_WRITABLE | 771 KFD_IOC_ALLOC_MEM_FLAGS_EXECUTABLE; 772 struct kgd_mem *mem; 773 void *kaddr; 774 int ret; 775 776 if (qpd->ib_kaddr || !qpd->ib_base) 777 return 0; 778 779 /* ib_base is only set for dGPU */ 780 ret = kfd_process_alloc_gpuvm(pdd, qpd->ib_base, PAGE_SIZE, flags, 781 &mem, &kaddr); 782 if (ret) 783 return ret; 784 785 qpd->ib_mem = mem; 786 qpd->ib_kaddr = kaddr; 787 788 return 0; 789 } 790 791 static void kfd_process_device_destroy_ib_mem(struct kfd_process_device *pdd) 792 { 793 struct qcm_process_device *qpd = &pdd->qpd; 794 795 if (!qpd->ib_kaddr || !qpd->ib_base) 796 return; 797 798 kfd_process_free_gpuvm(qpd->ib_mem, pdd, &qpd->ib_kaddr); 799 } 800 801 struct kfd_process *kfd_create_process(struct task_struct *thread) 802 { 803 struct kfd_process *process; 804 int ret; 805 806 if (!(thread->mm && mmget_not_zero(thread->mm))) 807 return ERR_PTR(-EINVAL); 808 809 /* Only the pthreads threading model is supported. */ 810 if (thread->group_leader->mm != thread->mm) { 811 mmput(thread->mm); 812 return ERR_PTR(-EINVAL); 813 } 814 815 /* 816 * take kfd processes mutex before starting of process creation 817 * so there won't be a case where two threads of the same process 818 * create two kfd_process structures 819 */ 820 mutex_lock(&kfd_processes_mutex); 821 822 if (kfd_is_locked()) { 823 mutex_unlock(&kfd_processes_mutex); 824 pr_debug("KFD is locked! Cannot create process"); 825 return ERR_PTR(-EINVAL); 826 } 827 828 /* A prior open of /dev/kfd could have already created the process. */ 829 process = find_process(thread, false); 830 if (process) { 831 pr_debug("Process already found\n"); 832 } else { 833 process = create_process(thread); 834 if (IS_ERR(process)) 835 goto out; 836 837 if (!procfs.kobj) 838 goto out; 839 840 process->kobj = kfd_alloc_struct(process->kobj); 841 if (!process->kobj) { 842 pr_warn("Creating procfs kobject failed"); 843 goto out; 844 } 845 ret = kobject_init_and_add(process->kobj, &procfs_type, 846 procfs.kobj, "%d", 847 (int)process->lead_thread->pid); 848 if (ret) { 849 pr_warn("Creating procfs pid directory failed"); 850 kobject_put(process->kobj); 851 goto out; 852 } 853 854 kfd_sysfs_create_file(process->kobj, &process->attr_pasid, 855 "pasid"); 856 857 process->kobj_queues = kobject_create_and_add("queues", 858 process->kobj); 859 if (!process->kobj_queues) 860 pr_warn("Creating KFD proc/queues folder failed"); 861 862 kfd_procfs_add_sysfs_stats(process); 863 kfd_procfs_add_sysfs_files(process); 864 kfd_procfs_add_sysfs_counters(process); 865 866 init_waitqueue_head(&process->wait_irq_drain); 867 } 868 out: 869 if (!IS_ERR(process)) 870 kref_get(&process->ref); 871 mutex_unlock(&kfd_processes_mutex); 872 mmput(thread->mm); 873 874 return process; 875 } 876 877 struct kfd_process *kfd_get_process(const struct task_struct *thread) 878 { 879 struct kfd_process *process; 880 881 if (!thread->mm) 882 return ERR_PTR(-EINVAL); 883 884 /* Only the pthreads threading model is supported. */ 885 if (thread->group_leader->mm != thread->mm) 886 return ERR_PTR(-EINVAL); 887 888 process = find_process(thread, false); 889 if (!process) 890 return ERR_PTR(-EINVAL); 891 892 return process; 893 } 894 895 static struct kfd_process *find_process_by_mm(const struct mm_struct *mm) 896 { 897 struct kfd_process *process; 898 899 hash_for_each_possible_rcu(kfd_processes_table, process, 900 kfd_processes, (uintptr_t)mm) 901 if (process->mm == mm) 902 return process; 903 904 return NULL; 905 } 906 907 static struct kfd_process *find_process(const struct task_struct *thread, 908 bool ref) 909 { 910 struct kfd_process *p; 911 int idx; 912 913 idx = srcu_read_lock(&kfd_processes_srcu); 914 p = find_process_by_mm(thread->mm); 915 if (p && ref) 916 kref_get(&p->ref); 917 srcu_read_unlock(&kfd_processes_srcu, idx); 918 919 return p; 920 } 921 922 void kfd_unref_process(struct kfd_process *p) 923 { 924 kref_put(&p->ref, kfd_process_ref_release); 925 } 926 927 /* This increments the process->ref counter. */ 928 struct kfd_process *kfd_lookup_process_by_pid(struct pid *pid) 929 { 930 struct task_struct *task = NULL; 931 struct kfd_process *p = NULL; 932 933 if (!pid) { 934 task = current; 935 get_task_struct(task); 936 } else { 937 task = get_pid_task(pid, PIDTYPE_PID); 938 } 939 940 if (task) { 941 p = find_process(task, true); 942 put_task_struct(task); 943 } 944 945 return p; 946 } 947 948 static void kfd_process_device_free_bos(struct kfd_process_device *pdd) 949 { 950 struct kfd_process *p = pdd->process; 951 void *mem; 952 int id; 953 int i; 954 955 /* 956 * Remove all handles from idr and release appropriate 957 * local memory object 958 */ 959 idr_for_each_entry(&pdd->alloc_idr, mem, id) { 960 961 for (i = 0; i < p->n_pdds; i++) { 962 struct kfd_process_device *peer_pdd = p->pdds[i]; 963 964 if (!peer_pdd->drm_priv) 965 continue; 966 amdgpu_amdkfd_gpuvm_unmap_memory_from_gpu( 967 peer_pdd->dev->adev, mem, peer_pdd->drm_priv); 968 } 969 970 amdgpu_amdkfd_gpuvm_free_memory_of_gpu(pdd->dev->adev, mem, 971 pdd->drm_priv, NULL); 972 kfd_process_device_remove_obj_handle(pdd, id); 973 } 974 } 975 976 /* 977 * Just kunmap and unpin signal BO here. It will be freed in 978 * kfd_process_free_outstanding_kfd_bos() 979 */ 980 static void kfd_process_kunmap_signal_bo(struct kfd_process *p) 981 { 982 struct kfd_process_device *pdd; 983 struct kfd_node *kdev; 984 void *mem; 985 986 kdev = kfd_device_by_id(GET_GPU_ID(p->signal_handle)); 987 if (!kdev) 988 return; 989 990 mutex_lock(&p->mutex); 991 992 pdd = kfd_get_process_device_data(kdev, p); 993 if (!pdd) 994 goto out; 995 996 mem = kfd_process_device_translate_handle( 997 pdd, GET_IDR_HANDLE(p->signal_handle)); 998 if (!mem) 999 goto out; 1000 1001 amdgpu_amdkfd_gpuvm_unmap_gtt_bo_from_kernel(mem); 1002 1003 out: 1004 mutex_unlock(&p->mutex); 1005 } 1006 1007 static void kfd_process_free_outstanding_kfd_bos(struct kfd_process *p) 1008 { 1009 int i; 1010 1011 for (i = 0; i < p->n_pdds; i++) 1012 kfd_process_device_free_bos(p->pdds[i]); 1013 } 1014 1015 static void kfd_process_destroy_pdds(struct kfd_process *p) 1016 { 1017 int i; 1018 1019 for (i = 0; i < p->n_pdds; i++) { 1020 struct kfd_process_device *pdd = p->pdds[i]; 1021 1022 pr_debug("Releasing pdd (topology id %d) for process (pasid 0x%x)\n", 1023 pdd->dev->id, p->pasid); 1024 1025 kfd_process_device_destroy_cwsr_dgpu(pdd); 1026 kfd_process_device_destroy_ib_mem(pdd); 1027 1028 if (pdd->drm_file) { 1029 amdgpu_amdkfd_gpuvm_release_process_vm( 1030 pdd->dev->adev, pdd->drm_priv); 1031 fput(pdd->drm_file); 1032 } 1033 1034 if (pdd->qpd.cwsr_kaddr && !pdd->qpd.cwsr_base) 1035 free_pages((unsigned long)pdd->qpd.cwsr_kaddr, 1036 get_order(KFD_CWSR_TBA_TMA_SIZE)); 1037 1038 bitmap_free(pdd->qpd.doorbell_bitmap); 1039 idr_destroy(&pdd->alloc_idr); 1040 1041 kfd_free_process_doorbells(pdd->dev->kfd, pdd->doorbell_index); 1042 1043 if (pdd->dev->kfd->shared_resources.enable_mes) 1044 amdgpu_amdkfd_free_gtt_mem(pdd->dev->adev, 1045 pdd->proc_ctx_bo); 1046 /* 1047 * before destroying pdd, make sure to report availability 1048 * for auto suspend 1049 */ 1050 if (pdd->runtime_inuse) { 1051 pm_runtime_mark_last_busy(adev_to_drm(pdd->dev->adev)->dev); 1052 pm_runtime_put_autosuspend(adev_to_drm(pdd->dev->adev)->dev); 1053 pdd->runtime_inuse = false; 1054 } 1055 1056 kfree(pdd); 1057 p->pdds[i] = NULL; 1058 } 1059 p->n_pdds = 0; 1060 } 1061 1062 static void kfd_process_remove_sysfs(struct kfd_process *p) 1063 { 1064 struct kfd_process_device *pdd; 1065 int i; 1066 1067 if (!p->kobj) 1068 return; 1069 1070 sysfs_remove_file(p->kobj, &p->attr_pasid); 1071 kobject_del(p->kobj_queues); 1072 kobject_put(p->kobj_queues); 1073 p->kobj_queues = NULL; 1074 1075 for (i = 0; i < p->n_pdds; i++) { 1076 pdd = p->pdds[i]; 1077 1078 sysfs_remove_file(p->kobj, &pdd->attr_vram); 1079 sysfs_remove_file(p->kobj, &pdd->attr_sdma); 1080 1081 sysfs_remove_file(pdd->kobj_stats, &pdd->attr_evict); 1082 if (pdd->dev->kfd2kgd->get_cu_occupancy) 1083 sysfs_remove_file(pdd->kobj_stats, 1084 &pdd->attr_cu_occupancy); 1085 kobject_del(pdd->kobj_stats); 1086 kobject_put(pdd->kobj_stats); 1087 pdd->kobj_stats = NULL; 1088 } 1089 1090 for_each_set_bit(i, p->svms.bitmap_supported, p->n_pdds) { 1091 pdd = p->pdds[i]; 1092 1093 sysfs_remove_file(pdd->kobj_counters, &pdd->attr_faults); 1094 sysfs_remove_file(pdd->kobj_counters, &pdd->attr_page_in); 1095 sysfs_remove_file(pdd->kobj_counters, &pdd->attr_page_out); 1096 kobject_del(pdd->kobj_counters); 1097 kobject_put(pdd->kobj_counters); 1098 pdd->kobj_counters = NULL; 1099 } 1100 1101 kobject_del(p->kobj); 1102 kobject_put(p->kobj); 1103 p->kobj = NULL; 1104 } 1105 1106 /* No process locking is needed in this function, because the process 1107 * is not findable any more. We must assume that no other thread is 1108 * using it any more, otherwise we couldn't safely free the process 1109 * structure in the end. 1110 */ 1111 static void kfd_process_wq_release(struct work_struct *work) 1112 { 1113 struct kfd_process *p = container_of(work, struct kfd_process, 1114 release_work); 1115 1116 kfd_process_dequeue_from_all_devices(p); 1117 pqm_uninit(&p->pqm); 1118 1119 /* Signal the eviction fence after user mode queues are 1120 * destroyed. This allows any BOs to be freed without 1121 * triggering pointless evictions or waiting for fences. 1122 */ 1123 dma_fence_signal(p->ef); 1124 1125 kfd_process_remove_sysfs(p); 1126 kfd_iommu_unbind_process(p); 1127 1128 kfd_process_kunmap_signal_bo(p); 1129 kfd_process_free_outstanding_kfd_bos(p); 1130 svm_range_list_fini(p); 1131 1132 kfd_process_destroy_pdds(p); 1133 dma_fence_put(p->ef); 1134 1135 kfd_event_free_process(p); 1136 1137 kfd_pasid_free(p->pasid); 1138 mutex_destroy(&p->mutex); 1139 1140 put_task_struct(p->lead_thread); 1141 1142 kfree(p); 1143 } 1144 1145 static void kfd_process_ref_release(struct kref *ref) 1146 { 1147 struct kfd_process *p = container_of(ref, struct kfd_process, ref); 1148 1149 INIT_WORK(&p->release_work, kfd_process_wq_release); 1150 queue_work(kfd_process_wq, &p->release_work); 1151 } 1152 1153 static struct mmu_notifier *kfd_process_alloc_notifier(struct mm_struct *mm) 1154 { 1155 int idx = srcu_read_lock(&kfd_processes_srcu); 1156 struct kfd_process *p = find_process_by_mm(mm); 1157 1158 srcu_read_unlock(&kfd_processes_srcu, idx); 1159 1160 return p ? &p->mmu_notifier : ERR_PTR(-ESRCH); 1161 } 1162 1163 static void kfd_process_free_notifier(struct mmu_notifier *mn) 1164 { 1165 kfd_unref_process(container_of(mn, struct kfd_process, mmu_notifier)); 1166 } 1167 1168 static void kfd_process_notifier_release_internal(struct kfd_process *p) 1169 { 1170 int i; 1171 1172 cancel_delayed_work_sync(&p->eviction_work); 1173 cancel_delayed_work_sync(&p->restore_work); 1174 1175 for (i = 0; i < p->n_pdds; i++) { 1176 struct kfd_process_device *pdd = p->pdds[i]; 1177 1178 /* re-enable GFX OFF since runtime enable with ttmp setup disabled it. */ 1179 if (!kfd_dbg_is_rlc_restore_supported(pdd->dev) && p->runtime_info.ttmp_setup) 1180 amdgpu_gfx_off_ctrl(pdd->dev->adev, true); 1181 } 1182 1183 /* Indicate to other users that MM is no longer valid */ 1184 p->mm = NULL; 1185 kfd_dbg_trap_disable(p); 1186 1187 if (atomic_read(&p->debugged_process_count) > 0) { 1188 struct kfd_process *target; 1189 unsigned int temp; 1190 int idx = srcu_read_lock(&kfd_processes_srcu); 1191 1192 hash_for_each_rcu(kfd_processes_table, temp, target, kfd_processes) { 1193 if (target->debugger_process && target->debugger_process == p) { 1194 mutex_lock_nested(&target->mutex, 1); 1195 kfd_dbg_trap_disable(target); 1196 mutex_unlock(&target->mutex); 1197 if (atomic_read(&p->debugged_process_count) == 0) 1198 break; 1199 } 1200 } 1201 1202 srcu_read_unlock(&kfd_processes_srcu, idx); 1203 } 1204 1205 mmu_notifier_put(&p->mmu_notifier); 1206 } 1207 1208 static void kfd_process_notifier_release(struct mmu_notifier *mn, 1209 struct mm_struct *mm) 1210 { 1211 struct kfd_process *p; 1212 1213 /* 1214 * The kfd_process structure can not be free because the 1215 * mmu_notifier srcu is read locked 1216 */ 1217 p = container_of(mn, struct kfd_process, mmu_notifier); 1218 if (WARN_ON(p->mm != mm)) 1219 return; 1220 1221 mutex_lock(&kfd_processes_mutex); 1222 /* 1223 * Do early return if table is empty. 1224 * 1225 * This could potentially happen if this function is called concurrently 1226 * by mmu_notifier and by kfd_cleanup_pocesses. 1227 * 1228 */ 1229 if (hash_empty(kfd_processes_table)) { 1230 mutex_unlock(&kfd_processes_mutex); 1231 return; 1232 } 1233 hash_del_rcu(&p->kfd_processes); 1234 mutex_unlock(&kfd_processes_mutex); 1235 synchronize_srcu(&kfd_processes_srcu); 1236 1237 kfd_process_notifier_release_internal(p); 1238 } 1239 1240 static const struct mmu_notifier_ops kfd_process_mmu_notifier_ops = { 1241 .release = kfd_process_notifier_release, 1242 .alloc_notifier = kfd_process_alloc_notifier, 1243 .free_notifier = kfd_process_free_notifier, 1244 }; 1245 1246 /* 1247 * This code handles the case when driver is being unloaded before all 1248 * mm_struct are released. We need to safely free the kfd_process and 1249 * avoid race conditions with mmu_notifier that might try to free them. 1250 * 1251 */ 1252 void kfd_cleanup_processes(void) 1253 { 1254 struct kfd_process *p; 1255 struct hlist_node *p_temp; 1256 unsigned int temp; 1257 HLIST_HEAD(cleanup_list); 1258 1259 /* 1260 * Move all remaining kfd_process from the process table to a 1261 * temp list for processing. Once done, callback from mmu_notifier 1262 * release will not see the kfd_process in the table and do early return, 1263 * avoiding double free issues. 1264 */ 1265 mutex_lock(&kfd_processes_mutex); 1266 hash_for_each_safe(kfd_processes_table, temp, p_temp, p, kfd_processes) { 1267 hash_del_rcu(&p->kfd_processes); 1268 synchronize_srcu(&kfd_processes_srcu); 1269 hlist_add_head(&p->kfd_processes, &cleanup_list); 1270 } 1271 mutex_unlock(&kfd_processes_mutex); 1272 1273 hlist_for_each_entry_safe(p, p_temp, &cleanup_list, kfd_processes) 1274 kfd_process_notifier_release_internal(p); 1275 1276 /* 1277 * Ensures that all outstanding free_notifier get called, triggering 1278 * the release of the kfd_process struct. 1279 */ 1280 mmu_notifier_synchronize(); 1281 } 1282 1283 int kfd_process_init_cwsr_apu(struct kfd_process *p, struct file *filep) 1284 { 1285 unsigned long offset; 1286 int i; 1287 1288 if (p->has_cwsr) 1289 return 0; 1290 1291 for (i = 0; i < p->n_pdds; i++) { 1292 struct kfd_node *dev = p->pdds[i]->dev; 1293 struct qcm_process_device *qpd = &p->pdds[i]->qpd; 1294 1295 if (!dev->kfd->cwsr_enabled || qpd->cwsr_kaddr || qpd->cwsr_base) 1296 continue; 1297 1298 offset = KFD_MMAP_TYPE_RESERVED_MEM | KFD_MMAP_GPU_ID(dev->id); 1299 qpd->tba_addr = (int64_t)vm_mmap(filep, 0, 1300 KFD_CWSR_TBA_TMA_SIZE, PROT_READ | PROT_EXEC, 1301 MAP_SHARED, offset); 1302 1303 if (IS_ERR_VALUE(qpd->tba_addr)) { 1304 int err = qpd->tba_addr; 1305 1306 pr_err("Failure to set tba address. error %d.\n", err); 1307 qpd->tba_addr = 0; 1308 qpd->cwsr_kaddr = NULL; 1309 return err; 1310 } 1311 1312 memcpy(qpd->cwsr_kaddr, dev->kfd->cwsr_isa, dev->kfd->cwsr_isa_size); 1313 1314 kfd_process_set_trap_debug_flag(qpd, p->debug_trap_enabled); 1315 1316 qpd->tma_addr = qpd->tba_addr + KFD_CWSR_TMA_OFFSET; 1317 pr_debug("set tba :0x%llx, tma:0x%llx, cwsr_kaddr:%p for pqm.\n", 1318 qpd->tba_addr, qpd->tma_addr, qpd->cwsr_kaddr); 1319 } 1320 1321 p->has_cwsr = true; 1322 1323 return 0; 1324 } 1325 1326 static int kfd_process_device_init_cwsr_dgpu(struct kfd_process_device *pdd) 1327 { 1328 struct kfd_node *dev = pdd->dev; 1329 struct qcm_process_device *qpd = &pdd->qpd; 1330 uint32_t flags = KFD_IOC_ALLOC_MEM_FLAGS_GTT 1331 | KFD_IOC_ALLOC_MEM_FLAGS_NO_SUBSTITUTE 1332 | KFD_IOC_ALLOC_MEM_FLAGS_EXECUTABLE; 1333 struct kgd_mem *mem; 1334 void *kaddr; 1335 int ret; 1336 1337 if (!dev->kfd->cwsr_enabled || qpd->cwsr_kaddr || !qpd->cwsr_base) 1338 return 0; 1339 1340 /* cwsr_base is only set for dGPU */ 1341 ret = kfd_process_alloc_gpuvm(pdd, qpd->cwsr_base, 1342 KFD_CWSR_TBA_TMA_SIZE, flags, &mem, &kaddr); 1343 if (ret) 1344 return ret; 1345 1346 qpd->cwsr_mem = mem; 1347 qpd->cwsr_kaddr = kaddr; 1348 qpd->tba_addr = qpd->cwsr_base; 1349 1350 memcpy(qpd->cwsr_kaddr, dev->kfd->cwsr_isa, dev->kfd->cwsr_isa_size); 1351 1352 kfd_process_set_trap_debug_flag(&pdd->qpd, 1353 pdd->process->debug_trap_enabled); 1354 1355 qpd->tma_addr = qpd->tba_addr + KFD_CWSR_TMA_OFFSET; 1356 pr_debug("set tba :0x%llx, tma:0x%llx, cwsr_kaddr:%p for pqm.\n", 1357 qpd->tba_addr, qpd->tma_addr, qpd->cwsr_kaddr); 1358 1359 return 0; 1360 } 1361 1362 static void kfd_process_device_destroy_cwsr_dgpu(struct kfd_process_device *pdd) 1363 { 1364 struct kfd_node *dev = pdd->dev; 1365 struct qcm_process_device *qpd = &pdd->qpd; 1366 1367 if (!dev->kfd->cwsr_enabled || !qpd->cwsr_kaddr || !qpd->cwsr_base) 1368 return; 1369 1370 kfd_process_free_gpuvm(qpd->cwsr_mem, pdd, &qpd->cwsr_kaddr); 1371 } 1372 1373 void kfd_process_set_trap_handler(struct qcm_process_device *qpd, 1374 uint64_t tba_addr, 1375 uint64_t tma_addr) 1376 { 1377 if (qpd->cwsr_kaddr) { 1378 /* KFD trap handler is bound, record as second-level TBA/TMA 1379 * in first-level TMA. First-level trap will jump to second. 1380 */ 1381 uint64_t *tma = 1382 (uint64_t *)(qpd->cwsr_kaddr + KFD_CWSR_TMA_OFFSET); 1383 tma[0] = tba_addr; 1384 tma[1] = tma_addr; 1385 } else { 1386 /* No trap handler bound, bind as first-level TBA/TMA. */ 1387 qpd->tba_addr = tba_addr; 1388 qpd->tma_addr = tma_addr; 1389 } 1390 } 1391 1392 bool kfd_process_xnack_mode(struct kfd_process *p, bool supported) 1393 { 1394 int i; 1395 1396 /* On most GFXv9 GPUs, the retry mode in the SQ must match the 1397 * boot time retry setting. Mixing processes with different 1398 * XNACK/retry settings can hang the GPU. 1399 * 1400 * Different GPUs can have different noretry settings depending 1401 * on HW bugs or limitations. We need to find at least one 1402 * XNACK mode for this process that's compatible with all GPUs. 1403 * Fortunately GPUs with retry enabled (noretry=0) can run code 1404 * built for XNACK-off. On GFXv9 it may perform slower. 1405 * 1406 * Therefore applications built for XNACK-off can always be 1407 * supported and will be our fallback if any GPU does not 1408 * support retry. 1409 */ 1410 for (i = 0; i < p->n_pdds; i++) { 1411 struct kfd_node *dev = p->pdds[i]->dev; 1412 1413 /* Only consider GFXv9 and higher GPUs. Older GPUs don't 1414 * support the SVM APIs and don't need to be considered 1415 * for the XNACK mode selection. 1416 */ 1417 if (!KFD_IS_SOC15(dev)) 1418 continue; 1419 /* Aldebaran can always support XNACK because it can support 1420 * per-process XNACK mode selection. But let the dev->noretry 1421 * setting still influence the default XNACK mode. 1422 */ 1423 if (supported && KFD_SUPPORT_XNACK_PER_PROCESS(dev)) 1424 continue; 1425 1426 /* GFXv10 and later GPUs do not support shader preemption 1427 * during page faults. This can lead to poor QoS for queue 1428 * management and memory-manager-related preemptions or 1429 * even deadlocks. 1430 */ 1431 if (KFD_GC_VERSION(dev) >= IP_VERSION(10, 1, 1)) 1432 return false; 1433 1434 if (dev->kfd->noretry) 1435 return false; 1436 } 1437 1438 return true; 1439 } 1440 1441 void kfd_process_set_trap_debug_flag(struct qcm_process_device *qpd, 1442 bool enabled) 1443 { 1444 if (qpd->cwsr_kaddr) { 1445 uint64_t *tma = 1446 (uint64_t *)(qpd->cwsr_kaddr + KFD_CWSR_TMA_OFFSET); 1447 tma[2] = enabled; 1448 } 1449 } 1450 1451 /* 1452 * On return the kfd_process is fully operational and will be freed when the 1453 * mm is released 1454 */ 1455 static struct kfd_process *create_process(const struct task_struct *thread) 1456 { 1457 struct kfd_process *process; 1458 struct mmu_notifier *mn; 1459 int err = -ENOMEM; 1460 1461 process = kzalloc(sizeof(*process), GFP_KERNEL); 1462 if (!process) 1463 goto err_alloc_process; 1464 1465 kref_init(&process->ref); 1466 mutex_init(&process->mutex); 1467 process->mm = thread->mm; 1468 process->lead_thread = thread->group_leader; 1469 process->n_pdds = 0; 1470 process->queues_paused = false; 1471 INIT_DELAYED_WORK(&process->eviction_work, evict_process_worker); 1472 INIT_DELAYED_WORK(&process->restore_work, restore_process_worker); 1473 process->last_restore_timestamp = get_jiffies_64(); 1474 err = kfd_event_init_process(process); 1475 if (err) 1476 goto err_event_init; 1477 process->is_32bit_user_mode = in_compat_syscall(); 1478 process->debug_trap_enabled = false; 1479 process->debugger_process = NULL; 1480 process->exception_enable_mask = 0; 1481 atomic_set(&process->debugged_process_count, 0); 1482 sema_init(&process->runtime_enable_sema, 0); 1483 1484 process->pasid = kfd_pasid_alloc(); 1485 if (process->pasid == 0) { 1486 err = -ENOSPC; 1487 goto err_alloc_pasid; 1488 } 1489 1490 err = pqm_init(&process->pqm, process); 1491 if (err != 0) 1492 goto err_process_pqm_init; 1493 1494 /* init process apertures*/ 1495 err = kfd_init_apertures(process); 1496 if (err != 0) 1497 goto err_init_apertures; 1498 1499 /* Check XNACK support after PDDs are created in kfd_init_apertures */ 1500 process->xnack_enabled = kfd_process_xnack_mode(process, false); 1501 1502 err = svm_range_list_init(process); 1503 if (err) 1504 goto err_init_svm_range_list; 1505 1506 /* alloc_notifier needs to find the process in the hash table */ 1507 hash_add_rcu(kfd_processes_table, &process->kfd_processes, 1508 (uintptr_t)process->mm); 1509 1510 /* Avoid free_notifier to start kfd_process_wq_release if 1511 * mmu_notifier_get failed because of pending signal. 1512 */ 1513 kref_get(&process->ref); 1514 1515 /* MMU notifier registration must be the last call that can fail 1516 * because after this point we cannot unwind the process creation. 1517 * After this point, mmu_notifier_put will trigger the cleanup by 1518 * dropping the last process reference in the free_notifier. 1519 */ 1520 mn = mmu_notifier_get(&kfd_process_mmu_notifier_ops, process->mm); 1521 if (IS_ERR(mn)) { 1522 err = PTR_ERR(mn); 1523 goto err_register_notifier; 1524 } 1525 BUG_ON(mn != &process->mmu_notifier); 1526 1527 kfd_unref_process(process); 1528 get_task_struct(process->lead_thread); 1529 1530 INIT_WORK(&process->debug_event_workarea, debug_event_write_work_handler); 1531 1532 return process; 1533 1534 err_register_notifier: 1535 hash_del_rcu(&process->kfd_processes); 1536 svm_range_list_fini(process); 1537 err_init_svm_range_list: 1538 kfd_process_free_outstanding_kfd_bos(process); 1539 kfd_process_destroy_pdds(process); 1540 err_init_apertures: 1541 pqm_uninit(&process->pqm); 1542 err_process_pqm_init: 1543 kfd_pasid_free(process->pasid); 1544 err_alloc_pasid: 1545 kfd_event_free_process(process); 1546 err_event_init: 1547 mutex_destroy(&process->mutex); 1548 kfree(process); 1549 err_alloc_process: 1550 return ERR_PTR(err); 1551 } 1552 1553 static int init_doorbell_bitmap(struct qcm_process_device *qpd, 1554 struct kfd_dev *dev) 1555 { 1556 unsigned int i; 1557 int range_start = dev->shared_resources.non_cp_doorbells_start; 1558 int range_end = dev->shared_resources.non_cp_doorbells_end; 1559 1560 if (!KFD_IS_SOC15(dev)) 1561 return 0; 1562 1563 qpd->doorbell_bitmap = bitmap_zalloc(KFD_MAX_NUM_OF_QUEUES_PER_PROCESS, 1564 GFP_KERNEL); 1565 if (!qpd->doorbell_bitmap) 1566 return -ENOMEM; 1567 1568 /* Mask out doorbells reserved for SDMA, IH, and VCN on SOC15. */ 1569 pr_debug("reserved doorbell 0x%03x - 0x%03x\n", range_start, range_end); 1570 pr_debug("reserved doorbell 0x%03x - 0x%03x\n", 1571 range_start + KFD_QUEUE_DOORBELL_MIRROR_OFFSET, 1572 range_end + KFD_QUEUE_DOORBELL_MIRROR_OFFSET); 1573 1574 for (i = 0; i < KFD_MAX_NUM_OF_QUEUES_PER_PROCESS / 2; i++) { 1575 if (i >= range_start && i <= range_end) { 1576 __set_bit(i, qpd->doorbell_bitmap); 1577 __set_bit(i + KFD_QUEUE_DOORBELL_MIRROR_OFFSET, 1578 qpd->doorbell_bitmap); 1579 } 1580 } 1581 1582 return 0; 1583 } 1584 1585 struct kfd_process_device *kfd_get_process_device_data(struct kfd_node *dev, 1586 struct kfd_process *p) 1587 { 1588 int i; 1589 1590 for (i = 0; i < p->n_pdds; i++) 1591 if (p->pdds[i]->dev == dev) 1592 return p->pdds[i]; 1593 1594 return NULL; 1595 } 1596 1597 struct kfd_process_device *kfd_create_process_device_data(struct kfd_node *dev, 1598 struct kfd_process *p) 1599 { 1600 struct kfd_process_device *pdd = NULL; 1601 int retval = 0; 1602 1603 if (WARN_ON_ONCE(p->n_pdds >= MAX_GPU_INSTANCE)) 1604 return NULL; 1605 pdd = kzalloc(sizeof(*pdd), GFP_KERNEL); 1606 if (!pdd) 1607 return NULL; 1608 1609 if (init_doorbell_bitmap(&pdd->qpd, dev->kfd)) { 1610 pr_err("Failed to init doorbell for process\n"); 1611 goto err_free_pdd; 1612 } 1613 1614 pdd->dev = dev; 1615 INIT_LIST_HEAD(&pdd->qpd.queues_list); 1616 INIT_LIST_HEAD(&pdd->qpd.priv_queue_list); 1617 pdd->qpd.dqm = dev->dqm; 1618 pdd->qpd.pqm = &p->pqm; 1619 pdd->qpd.evicted = 0; 1620 pdd->qpd.mapped_gws_queue = false; 1621 pdd->process = p; 1622 pdd->bound = PDD_UNBOUND; 1623 pdd->already_dequeued = false; 1624 pdd->runtime_inuse = false; 1625 pdd->vram_usage = 0; 1626 pdd->sdma_past_activity_counter = 0; 1627 pdd->user_gpu_id = dev->id; 1628 atomic64_set(&pdd->evict_duration_counter, 0); 1629 1630 if (dev->kfd->shared_resources.enable_mes) { 1631 retval = amdgpu_amdkfd_alloc_gtt_mem(dev->adev, 1632 AMDGPU_MES_PROC_CTX_SIZE, 1633 &pdd->proc_ctx_bo, 1634 &pdd->proc_ctx_gpu_addr, 1635 &pdd->proc_ctx_cpu_ptr, 1636 false); 1637 if (retval) { 1638 pr_err("failed to allocate process context bo\n"); 1639 goto err_free_pdd; 1640 } 1641 memset(pdd->proc_ctx_cpu_ptr, 0, AMDGPU_MES_PROC_CTX_SIZE); 1642 } 1643 1644 p->pdds[p->n_pdds++] = pdd; 1645 if (kfd_dbg_is_per_vmid_supported(pdd->dev)) 1646 pdd->spi_dbg_override = pdd->dev->kfd2kgd->disable_debug_trap( 1647 pdd->dev->adev, 1648 false, 1649 0); 1650 1651 /* Init idr used for memory handle translation */ 1652 idr_init(&pdd->alloc_idr); 1653 1654 return pdd; 1655 1656 err_free_pdd: 1657 kfree(pdd); 1658 return NULL; 1659 } 1660 1661 /** 1662 * kfd_process_device_init_vm - Initialize a VM for a process-device 1663 * 1664 * @pdd: The process-device 1665 * @drm_file: Optional pointer to a DRM file descriptor 1666 * 1667 * If @drm_file is specified, it will be used to acquire the VM from 1668 * that file descriptor. If successful, the @pdd takes ownership of 1669 * the file descriptor. 1670 * 1671 * If @drm_file is NULL, a new VM is created. 1672 * 1673 * Returns 0 on success, -errno on failure. 1674 */ 1675 int kfd_process_device_init_vm(struct kfd_process_device *pdd, 1676 struct file *drm_file) 1677 { 1678 struct amdgpu_fpriv *drv_priv; 1679 struct amdgpu_vm *avm; 1680 struct kfd_process *p; 1681 struct kfd_node *dev; 1682 int ret; 1683 1684 if (!drm_file) 1685 return -EINVAL; 1686 1687 if (pdd->drm_priv) 1688 return -EBUSY; 1689 1690 ret = amdgpu_file_to_fpriv(drm_file, &drv_priv); 1691 if (ret) 1692 return ret; 1693 avm = &drv_priv->vm; 1694 1695 p = pdd->process; 1696 dev = pdd->dev; 1697 1698 ret = amdgpu_amdkfd_gpuvm_acquire_process_vm(dev->adev, avm, 1699 &p->kgd_process_info, 1700 &p->ef); 1701 if (ret) { 1702 pr_err("Failed to create process VM object\n"); 1703 return ret; 1704 } 1705 pdd->drm_priv = drm_file->private_data; 1706 atomic64_set(&pdd->tlb_seq, 0); 1707 1708 ret = kfd_process_device_reserve_ib_mem(pdd); 1709 if (ret) 1710 goto err_reserve_ib_mem; 1711 ret = kfd_process_device_init_cwsr_dgpu(pdd); 1712 if (ret) 1713 goto err_init_cwsr; 1714 1715 ret = amdgpu_amdkfd_gpuvm_set_vm_pasid(dev->adev, avm, p->pasid); 1716 if (ret) 1717 goto err_set_pasid; 1718 1719 pdd->drm_file = drm_file; 1720 1721 return 0; 1722 1723 err_set_pasid: 1724 kfd_process_device_destroy_cwsr_dgpu(pdd); 1725 err_init_cwsr: 1726 kfd_process_device_destroy_ib_mem(pdd); 1727 err_reserve_ib_mem: 1728 pdd->drm_priv = NULL; 1729 amdgpu_amdkfd_gpuvm_destroy_cb(dev->adev, avm); 1730 1731 return ret; 1732 } 1733 1734 /* 1735 * Direct the IOMMU to bind the process (specifically the pasid->mm) 1736 * to the device. 1737 * Unbinding occurs when the process dies or the device is removed. 1738 * 1739 * Assumes that the process lock is held. 1740 */ 1741 struct kfd_process_device *kfd_bind_process_to_device(struct kfd_node *dev, 1742 struct kfd_process *p) 1743 { 1744 struct kfd_process_device *pdd; 1745 int err; 1746 1747 pdd = kfd_get_process_device_data(dev, p); 1748 if (!pdd) { 1749 pr_err("Process device data doesn't exist\n"); 1750 return ERR_PTR(-ENOMEM); 1751 } 1752 1753 if (!pdd->drm_priv) 1754 return ERR_PTR(-ENODEV); 1755 1756 /* 1757 * signal runtime-pm system to auto resume and prevent 1758 * further runtime suspend once device pdd is created until 1759 * pdd is destroyed. 1760 */ 1761 if (!pdd->runtime_inuse) { 1762 err = pm_runtime_get_sync(adev_to_drm(dev->adev)->dev); 1763 if (err < 0) { 1764 pm_runtime_put_autosuspend(adev_to_drm(dev->adev)->dev); 1765 return ERR_PTR(err); 1766 } 1767 } 1768 1769 err = kfd_iommu_bind_process_to_device(pdd); 1770 if (err) 1771 goto out; 1772 1773 /* 1774 * make sure that runtime_usage counter is incremented just once 1775 * per pdd 1776 */ 1777 pdd->runtime_inuse = true; 1778 1779 return pdd; 1780 1781 out: 1782 /* balance runpm reference count and exit with error */ 1783 if (!pdd->runtime_inuse) { 1784 pm_runtime_mark_last_busy(adev_to_drm(dev->adev)->dev); 1785 pm_runtime_put_autosuspend(adev_to_drm(dev->adev)->dev); 1786 } 1787 1788 return ERR_PTR(err); 1789 } 1790 1791 /* Create specific handle mapped to mem from process local memory idr 1792 * Assumes that the process lock is held. 1793 */ 1794 int kfd_process_device_create_obj_handle(struct kfd_process_device *pdd, 1795 void *mem) 1796 { 1797 return idr_alloc(&pdd->alloc_idr, mem, 0, 0, GFP_KERNEL); 1798 } 1799 1800 /* Translate specific handle from process local memory idr 1801 * Assumes that the process lock is held. 1802 */ 1803 void *kfd_process_device_translate_handle(struct kfd_process_device *pdd, 1804 int handle) 1805 { 1806 if (handle < 0) 1807 return NULL; 1808 1809 return idr_find(&pdd->alloc_idr, handle); 1810 } 1811 1812 /* Remove specific handle from process local memory idr 1813 * Assumes that the process lock is held. 1814 */ 1815 void kfd_process_device_remove_obj_handle(struct kfd_process_device *pdd, 1816 int handle) 1817 { 1818 if (handle >= 0) 1819 idr_remove(&pdd->alloc_idr, handle); 1820 } 1821 1822 /* This increments the process->ref counter. */ 1823 struct kfd_process *kfd_lookup_process_by_pasid(u32 pasid) 1824 { 1825 struct kfd_process *p, *ret_p = NULL; 1826 unsigned int temp; 1827 1828 int idx = srcu_read_lock(&kfd_processes_srcu); 1829 1830 hash_for_each_rcu(kfd_processes_table, temp, p, kfd_processes) { 1831 if (p->pasid == pasid) { 1832 kref_get(&p->ref); 1833 ret_p = p; 1834 break; 1835 } 1836 } 1837 1838 srcu_read_unlock(&kfd_processes_srcu, idx); 1839 1840 return ret_p; 1841 } 1842 1843 /* This increments the process->ref counter. */ 1844 struct kfd_process *kfd_lookup_process_by_mm(const struct mm_struct *mm) 1845 { 1846 struct kfd_process *p; 1847 1848 int idx = srcu_read_lock(&kfd_processes_srcu); 1849 1850 p = find_process_by_mm(mm); 1851 if (p) 1852 kref_get(&p->ref); 1853 1854 srcu_read_unlock(&kfd_processes_srcu, idx); 1855 1856 return p; 1857 } 1858 1859 /* kfd_process_evict_queues - Evict all user queues of a process 1860 * 1861 * Eviction is reference-counted per process-device. This means multiple 1862 * evictions from different sources can be nested safely. 1863 */ 1864 int kfd_process_evict_queues(struct kfd_process *p, uint32_t trigger) 1865 { 1866 int r = 0; 1867 int i; 1868 unsigned int n_evicted = 0; 1869 1870 for (i = 0; i < p->n_pdds; i++) { 1871 struct kfd_process_device *pdd = p->pdds[i]; 1872 1873 kfd_smi_event_queue_eviction(pdd->dev, p->lead_thread->pid, 1874 trigger); 1875 1876 r = pdd->dev->dqm->ops.evict_process_queues(pdd->dev->dqm, 1877 &pdd->qpd); 1878 /* evict return -EIO if HWS is hang or asic is resetting, in this case 1879 * we would like to set all the queues to be in evicted state to prevent 1880 * them been add back since they actually not be saved right now. 1881 */ 1882 if (r && r != -EIO) { 1883 pr_err("Failed to evict process queues\n"); 1884 goto fail; 1885 } 1886 n_evicted++; 1887 } 1888 1889 return r; 1890 1891 fail: 1892 /* To keep state consistent, roll back partial eviction by 1893 * restoring queues 1894 */ 1895 for (i = 0; i < p->n_pdds; i++) { 1896 struct kfd_process_device *pdd = p->pdds[i]; 1897 1898 if (n_evicted == 0) 1899 break; 1900 1901 kfd_smi_event_queue_restore(pdd->dev, p->lead_thread->pid); 1902 1903 if (pdd->dev->dqm->ops.restore_process_queues(pdd->dev->dqm, 1904 &pdd->qpd)) 1905 pr_err("Failed to restore queues\n"); 1906 1907 n_evicted--; 1908 } 1909 1910 return r; 1911 } 1912 1913 /* kfd_process_restore_queues - Restore all user queues of a process */ 1914 int kfd_process_restore_queues(struct kfd_process *p) 1915 { 1916 int r, ret = 0; 1917 int i; 1918 1919 for (i = 0; i < p->n_pdds; i++) { 1920 struct kfd_process_device *pdd = p->pdds[i]; 1921 1922 kfd_smi_event_queue_restore(pdd->dev, p->lead_thread->pid); 1923 1924 r = pdd->dev->dqm->ops.restore_process_queues(pdd->dev->dqm, 1925 &pdd->qpd); 1926 if (r) { 1927 pr_err("Failed to restore process queues\n"); 1928 if (!ret) 1929 ret = r; 1930 } 1931 } 1932 1933 return ret; 1934 } 1935 1936 int kfd_process_gpuidx_from_gpuid(struct kfd_process *p, uint32_t gpu_id) 1937 { 1938 int i; 1939 1940 for (i = 0; i < p->n_pdds; i++) 1941 if (p->pdds[i] && gpu_id == p->pdds[i]->user_gpu_id) 1942 return i; 1943 return -EINVAL; 1944 } 1945 1946 int 1947 kfd_process_gpuid_from_node(struct kfd_process *p, struct kfd_node *node, 1948 uint32_t *gpuid, uint32_t *gpuidx) 1949 { 1950 int i; 1951 1952 for (i = 0; i < p->n_pdds; i++) 1953 if (p->pdds[i] && p->pdds[i]->dev == node) { 1954 *gpuid = p->pdds[i]->user_gpu_id; 1955 *gpuidx = i; 1956 return 0; 1957 } 1958 return -EINVAL; 1959 } 1960 1961 static void evict_process_worker(struct work_struct *work) 1962 { 1963 int ret; 1964 struct kfd_process *p; 1965 struct delayed_work *dwork; 1966 1967 dwork = to_delayed_work(work); 1968 1969 /* Process termination destroys this worker thread. So during the 1970 * lifetime of this thread, kfd_process p will be valid 1971 */ 1972 p = container_of(dwork, struct kfd_process, eviction_work); 1973 WARN_ONCE(p->last_eviction_seqno != p->ef->seqno, 1974 "Eviction fence mismatch\n"); 1975 1976 /* Narrow window of overlap between restore and evict work 1977 * item is possible. Once amdgpu_amdkfd_gpuvm_restore_process_bos 1978 * unreserves KFD BOs, it is possible to evicted again. But 1979 * restore has few more steps of finish. So lets wait for any 1980 * previous restore work to complete 1981 */ 1982 flush_delayed_work(&p->restore_work); 1983 1984 pr_debug("Started evicting pasid 0x%x\n", p->pasid); 1985 ret = kfd_process_evict_queues(p, KFD_QUEUE_EVICTION_TRIGGER_TTM); 1986 if (!ret) { 1987 dma_fence_signal(p->ef); 1988 dma_fence_put(p->ef); 1989 p->ef = NULL; 1990 queue_delayed_work(kfd_restore_wq, &p->restore_work, 1991 msecs_to_jiffies(PROCESS_RESTORE_TIME_MS)); 1992 1993 pr_debug("Finished evicting pasid 0x%x\n", p->pasid); 1994 } else 1995 pr_err("Failed to evict queues of pasid 0x%x\n", p->pasid); 1996 } 1997 1998 static void restore_process_worker(struct work_struct *work) 1999 { 2000 struct delayed_work *dwork; 2001 struct kfd_process *p; 2002 int ret = 0; 2003 2004 dwork = to_delayed_work(work); 2005 2006 /* Process termination destroys this worker thread. So during the 2007 * lifetime of this thread, kfd_process p will be valid 2008 */ 2009 p = container_of(dwork, struct kfd_process, restore_work); 2010 pr_debug("Started restoring pasid 0x%x\n", p->pasid); 2011 2012 /* Setting last_restore_timestamp before successful restoration. 2013 * Otherwise this would have to be set by KGD (restore_process_bos) 2014 * before KFD BOs are unreserved. If not, the process can be evicted 2015 * again before the timestamp is set. 2016 * If restore fails, the timestamp will be set again in the next 2017 * attempt. This would mean that the minimum GPU quanta would be 2018 * PROCESS_ACTIVE_TIME_MS - (time to execute the following two 2019 * functions) 2020 */ 2021 2022 p->last_restore_timestamp = get_jiffies_64(); 2023 /* VMs may not have been acquired yet during debugging. */ 2024 if (p->kgd_process_info) 2025 ret = amdgpu_amdkfd_gpuvm_restore_process_bos(p->kgd_process_info, 2026 &p->ef); 2027 if (ret) { 2028 pr_debug("Failed to restore BOs of pasid 0x%x, retry after %d ms\n", 2029 p->pasid, PROCESS_BACK_OFF_TIME_MS); 2030 ret = queue_delayed_work(kfd_restore_wq, &p->restore_work, 2031 msecs_to_jiffies(PROCESS_BACK_OFF_TIME_MS)); 2032 WARN(!ret, "reschedule restore work failed\n"); 2033 return; 2034 } 2035 2036 ret = kfd_process_restore_queues(p); 2037 if (!ret) 2038 pr_debug("Finished restoring pasid 0x%x\n", p->pasid); 2039 else 2040 pr_err("Failed to restore queues of pasid 0x%x\n", p->pasid); 2041 } 2042 2043 void kfd_suspend_all_processes(void) 2044 { 2045 struct kfd_process *p; 2046 unsigned int temp; 2047 int idx = srcu_read_lock(&kfd_processes_srcu); 2048 2049 WARN(debug_evictions, "Evicting all processes"); 2050 hash_for_each_rcu(kfd_processes_table, temp, p, kfd_processes) { 2051 cancel_delayed_work_sync(&p->eviction_work); 2052 flush_delayed_work(&p->restore_work); 2053 2054 if (kfd_process_evict_queues(p, KFD_QUEUE_EVICTION_TRIGGER_SUSPEND)) 2055 pr_err("Failed to suspend process 0x%x\n", p->pasid); 2056 dma_fence_signal(p->ef); 2057 dma_fence_put(p->ef); 2058 p->ef = NULL; 2059 } 2060 srcu_read_unlock(&kfd_processes_srcu, idx); 2061 } 2062 2063 int kfd_resume_all_processes(void) 2064 { 2065 struct kfd_process *p; 2066 unsigned int temp; 2067 int ret = 0, idx = srcu_read_lock(&kfd_processes_srcu); 2068 2069 hash_for_each_rcu(kfd_processes_table, temp, p, kfd_processes) { 2070 if (!queue_delayed_work(kfd_restore_wq, &p->restore_work, 0)) { 2071 pr_err("Restore process %d failed during resume\n", 2072 p->pasid); 2073 ret = -EFAULT; 2074 } 2075 } 2076 srcu_read_unlock(&kfd_processes_srcu, idx); 2077 return ret; 2078 } 2079 2080 int kfd_reserved_mem_mmap(struct kfd_node *dev, struct kfd_process *process, 2081 struct vm_area_struct *vma) 2082 { 2083 struct kfd_process_device *pdd; 2084 struct qcm_process_device *qpd; 2085 2086 if ((vma->vm_end - vma->vm_start) != KFD_CWSR_TBA_TMA_SIZE) { 2087 pr_err("Incorrect CWSR mapping size.\n"); 2088 return -EINVAL; 2089 } 2090 2091 pdd = kfd_get_process_device_data(dev, process); 2092 if (!pdd) 2093 return -EINVAL; 2094 qpd = &pdd->qpd; 2095 2096 qpd->cwsr_kaddr = (void *)__get_free_pages(GFP_KERNEL | __GFP_ZERO, 2097 get_order(KFD_CWSR_TBA_TMA_SIZE)); 2098 if (!qpd->cwsr_kaddr) { 2099 pr_err("Error allocating per process CWSR buffer.\n"); 2100 return -ENOMEM; 2101 } 2102 2103 vm_flags_set(vma, VM_IO | VM_DONTCOPY | VM_DONTEXPAND 2104 | VM_NORESERVE | VM_DONTDUMP | VM_PFNMAP); 2105 /* Mapping pages to user process */ 2106 return remap_pfn_range(vma, vma->vm_start, 2107 PFN_DOWN(__pa(qpd->cwsr_kaddr)), 2108 KFD_CWSR_TBA_TMA_SIZE, vma->vm_page_prot); 2109 } 2110 2111 void kfd_flush_tlb(struct kfd_process_device *pdd, enum TLB_FLUSH_TYPE type) 2112 { 2113 struct amdgpu_vm *vm = drm_priv_to_vm(pdd->drm_priv); 2114 uint64_t tlb_seq = amdgpu_vm_tlb_seq(vm); 2115 struct kfd_node *dev = pdd->dev; 2116 uint32_t xcc_mask = dev->xcc_mask; 2117 int xcc = 0; 2118 2119 /* 2120 * It can be that we race and lose here, but that is extremely unlikely 2121 * and the worst thing which could happen is that we flush the changes 2122 * into the TLB once more which is harmless. 2123 */ 2124 if (atomic64_xchg(&pdd->tlb_seq, tlb_seq) == tlb_seq) 2125 return; 2126 2127 if (dev->dqm->sched_policy == KFD_SCHED_POLICY_NO_HWS) { 2128 /* Nothing to flush until a VMID is assigned, which 2129 * only happens when the first queue is created. 2130 */ 2131 if (pdd->qpd.vmid) 2132 amdgpu_amdkfd_flush_gpu_tlb_vmid(dev->adev, 2133 pdd->qpd.vmid); 2134 } else { 2135 for_each_inst(xcc, xcc_mask) 2136 amdgpu_amdkfd_flush_gpu_tlb_pasid( 2137 dev->adev, pdd->process->pasid, type, xcc); 2138 } 2139 } 2140 2141 /* assumes caller holds process lock. */ 2142 int kfd_process_drain_interrupts(struct kfd_process_device *pdd) 2143 { 2144 uint32_t irq_drain_fence[8]; 2145 uint8_t node_id = 0; 2146 int r = 0; 2147 2148 if (!KFD_IS_SOC15(pdd->dev)) 2149 return 0; 2150 2151 pdd->process->irq_drain_is_open = true; 2152 2153 memset(irq_drain_fence, 0, sizeof(irq_drain_fence)); 2154 irq_drain_fence[0] = (KFD_IRQ_FENCE_SOURCEID << 8) | 2155 KFD_IRQ_FENCE_CLIENTID; 2156 irq_drain_fence[3] = pdd->process->pasid; 2157 2158 /* 2159 * For GFX 9.4.3, send the NodeId also in IH cookie DW[3] 2160 */ 2161 if (KFD_GC_VERSION(pdd->dev->kfd) == IP_VERSION(9, 4, 3)) { 2162 node_id = ffs(pdd->dev->interrupt_bitmap) - 1; 2163 irq_drain_fence[3] |= node_id << 16; 2164 } 2165 2166 /* ensure stale irqs scheduled KFD interrupts and send drain fence. */ 2167 if (amdgpu_amdkfd_send_close_event_drain_irq(pdd->dev->adev, 2168 irq_drain_fence)) { 2169 pdd->process->irq_drain_is_open = false; 2170 return 0; 2171 } 2172 2173 r = wait_event_interruptible(pdd->process->wait_irq_drain, 2174 !READ_ONCE(pdd->process->irq_drain_is_open)); 2175 if (r) 2176 pdd->process->irq_drain_is_open = false; 2177 2178 return r; 2179 } 2180 2181 void kfd_process_close_interrupt_drain(unsigned int pasid) 2182 { 2183 struct kfd_process *p; 2184 2185 p = kfd_lookup_process_by_pasid(pasid); 2186 2187 if (!p) 2188 return; 2189 2190 WRITE_ONCE(p->irq_drain_is_open, false); 2191 wake_up_all(&p->wait_irq_drain); 2192 kfd_unref_process(p); 2193 } 2194 2195 struct send_exception_work_handler_workarea { 2196 struct work_struct work; 2197 struct kfd_process *p; 2198 unsigned int queue_id; 2199 uint64_t error_reason; 2200 }; 2201 2202 static void send_exception_work_handler(struct work_struct *work) 2203 { 2204 struct send_exception_work_handler_workarea *workarea; 2205 struct kfd_process *p; 2206 struct queue *q; 2207 struct mm_struct *mm; 2208 struct kfd_context_save_area_header __user *csa_header; 2209 uint64_t __user *err_payload_ptr; 2210 uint64_t cur_err; 2211 uint32_t ev_id; 2212 2213 workarea = container_of(work, 2214 struct send_exception_work_handler_workarea, 2215 work); 2216 p = workarea->p; 2217 2218 mm = get_task_mm(p->lead_thread); 2219 2220 if (!mm) 2221 return; 2222 2223 kthread_use_mm(mm); 2224 2225 q = pqm_get_user_queue(&p->pqm, workarea->queue_id); 2226 2227 if (!q) 2228 goto out; 2229 2230 csa_header = (void __user *)q->properties.ctx_save_restore_area_address; 2231 2232 get_user(err_payload_ptr, (uint64_t __user **)&csa_header->err_payload_addr); 2233 get_user(cur_err, err_payload_ptr); 2234 cur_err |= workarea->error_reason; 2235 put_user(cur_err, err_payload_ptr); 2236 get_user(ev_id, &csa_header->err_event_id); 2237 2238 kfd_set_event(p, ev_id); 2239 2240 out: 2241 kthread_unuse_mm(mm); 2242 mmput(mm); 2243 } 2244 2245 int kfd_send_exception_to_runtime(struct kfd_process *p, 2246 unsigned int queue_id, 2247 uint64_t error_reason) 2248 { 2249 struct send_exception_work_handler_workarea worker; 2250 2251 INIT_WORK_ONSTACK(&worker.work, send_exception_work_handler); 2252 2253 worker.p = p; 2254 worker.queue_id = queue_id; 2255 worker.error_reason = error_reason; 2256 2257 schedule_work(&worker.work); 2258 flush_work(&worker.work); 2259 destroy_work_on_stack(&worker.work); 2260 2261 return 0; 2262 } 2263 2264 struct kfd_process_device *kfd_process_device_data_by_id(struct kfd_process *p, uint32_t gpu_id) 2265 { 2266 int i; 2267 2268 if (gpu_id) { 2269 for (i = 0; i < p->n_pdds; i++) { 2270 struct kfd_process_device *pdd = p->pdds[i]; 2271 2272 if (pdd->user_gpu_id == gpu_id) 2273 return pdd; 2274 } 2275 } 2276 return NULL; 2277 } 2278 2279 int kfd_process_get_user_gpu_id(struct kfd_process *p, uint32_t actual_gpu_id) 2280 { 2281 int i; 2282 2283 if (!actual_gpu_id) 2284 return 0; 2285 2286 for (i = 0; i < p->n_pdds; i++) { 2287 struct kfd_process_device *pdd = p->pdds[i]; 2288 2289 if (pdd->dev->id == actual_gpu_id) 2290 return pdd->user_gpu_id; 2291 } 2292 return -EINVAL; 2293 } 2294 2295 #if defined(CONFIG_DEBUG_FS) 2296 2297 int kfd_debugfs_mqds_by_process(struct seq_file *m, void *data) 2298 { 2299 struct kfd_process *p; 2300 unsigned int temp; 2301 int r = 0; 2302 2303 int idx = srcu_read_lock(&kfd_processes_srcu); 2304 2305 hash_for_each_rcu(kfd_processes_table, temp, p, kfd_processes) { 2306 seq_printf(m, "Process %d PASID 0x%x:\n", 2307 p->lead_thread->tgid, p->pasid); 2308 2309 mutex_lock(&p->mutex); 2310 r = pqm_debugfs_mqds(m, &p->pqm); 2311 mutex_unlock(&p->mutex); 2312 2313 if (r) 2314 break; 2315 } 2316 2317 srcu_read_unlock(&kfd_processes_srcu, idx); 2318 2319 return r; 2320 } 2321 2322 #endif 2323