1 /* 2 * Copyright 2020 Advanced Micro Devices, Inc. 3 * 4 * Permission is hereby granted, free of charge, to any person obtaining a 5 * copy of this software and associated documentation files (the "Software"), 6 * to deal in the Software without restriction, including without limitation 7 * the rights to use, copy, modify, merge, publish, distribute, sublicense, 8 * and/or sell copies of the Software, and to permit persons to whom the 9 * Software is furnished to do so, subject to the following conditions: 10 * 11 * The above copyright notice and this permission notice shall be included in 12 * all copies or substantial portions of the Software. 13 * 14 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 15 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 16 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL 17 * THE COPYRIGHT HOLDER(S) OR AUTHOR(S) BE LIABLE FOR ANY CLAIM, DAMAGES OR 18 * OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, 19 * ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR 20 * OTHER DEALINGS IN THE SOFTWARE. 21 */ 22 23 #include <linux/poll.h> 24 #include <linux/wait.h> 25 #include <linux/anon_inodes.h> 26 #include <uapi/linux/kfd_ioctl.h> 27 #include "amdgpu.h" 28 #include "amdgpu_vm.h" 29 #include "kfd_priv.h" 30 #include "kfd_smi_events.h" 31 32 struct kfd_smi_client { 33 struct list_head list; 34 struct kfifo fifo; 35 wait_queue_head_t wait_queue; 36 /* events enabled */ 37 uint64_t events; 38 struct kfd_dev *dev; 39 spinlock_t lock; 40 }; 41 42 #define MAX_KFIFO_SIZE 1024 43 44 static __poll_t kfd_smi_ev_poll(struct file *, struct poll_table_struct *); 45 static ssize_t kfd_smi_ev_read(struct file *, char __user *, size_t, loff_t *); 46 static ssize_t kfd_smi_ev_write(struct file *, const char __user *, size_t, 47 loff_t *); 48 static int kfd_smi_ev_release(struct inode *, struct file *); 49 50 static const char kfd_smi_name[] = "kfd_smi_ev"; 51 52 static const struct file_operations kfd_smi_ev_fops = { 53 .owner = THIS_MODULE, 54 .poll = kfd_smi_ev_poll, 55 .read = kfd_smi_ev_read, 56 .write = kfd_smi_ev_write, 57 .release = kfd_smi_ev_release 58 }; 59 60 static __poll_t kfd_smi_ev_poll(struct file *filep, 61 struct poll_table_struct *wait) 62 { 63 struct kfd_smi_client *client = filep->private_data; 64 __poll_t mask = 0; 65 66 poll_wait(filep, &client->wait_queue, wait); 67 68 spin_lock(&client->lock); 69 if (!kfifo_is_empty(&client->fifo)) 70 mask = EPOLLIN | EPOLLRDNORM; 71 spin_unlock(&client->lock); 72 73 return mask; 74 } 75 76 static ssize_t kfd_smi_ev_read(struct file *filep, char __user *user, 77 size_t size, loff_t *offset) 78 { 79 int ret; 80 size_t to_copy; 81 struct kfd_smi_client *client = filep->private_data; 82 unsigned char *buf; 83 84 buf = kmalloc(MAX_KFIFO_SIZE * sizeof(*buf), GFP_KERNEL); 85 if (!buf) 86 return -ENOMEM; 87 88 /* kfifo_to_user can sleep so we can't use spinlock protection around 89 * it. Instead, we kfifo out as spinlocked then copy them to the user. 90 */ 91 spin_lock(&client->lock); 92 to_copy = kfifo_len(&client->fifo); 93 if (!to_copy) { 94 spin_unlock(&client->lock); 95 ret = -EAGAIN; 96 goto ret_err; 97 } 98 to_copy = min3(size, sizeof(buf), to_copy); 99 ret = kfifo_out(&client->fifo, buf, to_copy); 100 spin_unlock(&client->lock); 101 if (ret <= 0) { 102 ret = -EAGAIN; 103 goto ret_err; 104 } 105 106 ret = copy_to_user(user, buf, to_copy); 107 if (ret) { 108 ret = -EFAULT; 109 goto ret_err; 110 } 111 112 kfree(buf); 113 return to_copy; 114 115 ret_err: 116 kfree(buf); 117 return ret; 118 } 119 120 static ssize_t kfd_smi_ev_write(struct file *filep, const char __user *user, 121 size_t size, loff_t *offset) 122 { 123 struct kfd_smi_client *client = filep->private_data; 124 uint64_t events; 125 126 if (!access_ok(user, size) || size < sizeof(events)) 127 return -EFAULT; 128 if (copy_from_user(&events, user, sizeof(events))) 129 return -EFAULT; 130 131 WRITE_ONCE(client->events, events); 132 133 return sizeof(events); 134 } 135 136 static int kfd_smi_ev_release(struct inode *inode, struct file *filep) 137 { 138 struct kfd_smi_client *client = filep->private_data; 139 struct kfd_dev *dev = client->dev; 140 141 spin_lock(&dev->smi_lock); 142 list_del_rcu(&client->list); 143 spin_unlock(&dev->smi_lock); 144 145 synchronize_rcu(); 146 kfifo_free(&client->fifo); 147 kfree(client); 148 149 return 0; 150 } 151 152 static void add_event_to_kfifo(struct kfd_dev *dev, unsigned long long smi_event, 153 char *event_msg, int len) 154 { 155 struct kfd_smi_client *client; 156 157 rcu_read_lock(); 158 159 list_for_each_entry_rcu(client, &dev->smi_clients, list) { 160 if (!(READ_ONCE(client->events) & smi_event)) 161 continue; 162 spin_lock(&client->lock); 163 if (kfifo_avail(&client->fifo) >= len) { 164 kfifo_in(&client->fifo, event_msg, len); 165 wake_up_all(&client->wait_queue); 166 } else { 167 pr_debug("smi_event(EventID: %llu): no space left\n", 168 smi_event); 169 } 170 spin_unlock(&client->lock); 171 } 172 173 rcu_read_unlock(); 174 } 175 176 void kfd_smi_event_update_thermal_throttling(struct kfd_dev *dev, 177 uint32_t throttle_bitmask) 178 { 179 struct amdgpu_device *adev = (struct amdgpu_device *)dev->kgd; 180 /* 181 * ThermalThrottle msg = throttle_bitmask(8): 182 * thermal_interrupt_count(16): 183 * 16 bytes event + 1 byte space + 8 byte throttle_bitmask + 184 * 1 byte : + 16 byte thermal_interupt_counter + 1 byte \n + 185 * 1 byte \0 = 44 186 */ 187 char fifo_in[44]; 188 int len; 189 190 if (list_empty(&dev->smi_clients)) 191 return; 192 193 len = snprintf(fifo_in, 44, "%x %x:%llx\n", 194 KFD_SMI_EVENT_THERMAL_THROTTLE, throttle_bitmask, 195 atomic64_read(&adev->smu.throttle_int_counter)); 196 197 add_event_to_kfifo(dev, KFD_SMI_EVENT_THERMAL_THROTTLE, fifo_in, len); 198 } 199 200 void kfd_smi_event_update_vmfault(struct kfd_dev *dev, uint16_t pasid) 201 { 202 struct amdgpu_device *adev = (struct amdgpu_device *)dev->kgd; 203 struct amdgpu_task_info task_info; 204 /* VmFault msg = (hex)uint32_pid(8) + :(1) + task name(16) = 25 */ 205 /* 16 bytes event + 1 byte space + 25 bytes msg + 1 byte \n = 43 206 */ 207 char fifo_in[43]; 208 int len; 209 210 if (list_empty(&dev->smi_clients)) 211 return; 212 213 memset(&task_info, 0, sizeof(struct amdgpu_task_info)); 214 amdgpu_vm_get_task_info(adev, pasid, &task_info); 215 /* Report VM faults from user applications, not retry from kernel */ 216 if (!task_info.pid) 217 return; 218 219 len = snprintf(fifo_in, 43, "%x %x:%s\n", KFD_SMI_EVENT_VMFAULT, 220 task_info.pid, task_info.task_name); 221 222 add_event_to_kfifo(dev, KFD_SMI_EVENT_VMFAULT, fifo_in, len); 223 } 224 225 int kfd_smi_event_open(struct kfd_dev *dev, uint32_t *fd) 226 { 227 struct kfd_smi_client *client; 228 int ret; 229 230 client = kzalloc(sizeof(struct kfd_smi_client), GFP_KERNEL); 231 if (!client) 232 return -ENOMEM; 233 INIT_LIST_HEAD(&client->list); 234 235 ret = kfifo_alloc(&client->fifo, MAX_KFIFO_SIZE, GFP_KERNEL); 236 if (ret) { 237 kfree(client); 238 return ret; 239 } 240 241 ret = anon_inode_getfd(kfd_smi_name, &kfd_smi_ev_fops, (void *)client, 242 O_RDWR); 243 if (ret < 0) { 244 kfifo_free(&client->fifo); 245 kfree(client); 246 return ret; 247 } 248 *fd = ret; 249 250 init_waitqueue_head(&client->wait_queue); 251 spin_lock_init(&client->lock); 252 client->events = 0; 253 client->dev = dev; 254 255 spin_lock(&dev->smi_lock); 256 list_add_rcu(&client->list, &dev->smi_clients); 257 spin_unlock(&dev->smi_lock); 258 259 return 0; 260 } 261