1 //===--- amdgpu/impl/system.cpp ----------------------------------- C++ -*-===// 2 // 3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. 4 // See https://llvm.org/LICENSE.txt for license information. 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 6 // 7 //===----------------------------------------------------------------------===// 8 #include <libelf.h> 9 10 #include <cassert> 11 #include <sstream> 12 #include <string> 13 14 #include "internal.h" 15 #include "rt.h" 16 17 #include "msgpack.h" 18 19 namespace hsa { 20 // Wrap HSA iterate API in a shim that allows passing general callables 21 template <typename C> 22 hsa_status_t executable_iterate_symbols(hsa_executable_t executable, C cb) { 23 auto L = [](hsa_executable_t executable, hsa_executable_symbol_t symbol, 24 void *data) -> hsa_status_t { 25 C *unwrapped = static_cast<C *>(data); 26 return (*unwrapped)(executable, symbol); 27 }; 28 return hsa_executable_iterate_symbols(executable, L, 29 static_cast<void *>(&cb)); 30 } 31 } // namespace hsa 32 33 typedef unsigned char *address; 34 /* 35 * Note descriptors. 36 */ 37 // FreeBSD already declares Elf_Note (indirectly via <libelf.h>) 38 #if !defined(__FreeBSD__) 39 typedef struct { 40 uint32_t n_namesz; /* Length of note's name. */ 41 uint32_t n_descsz; /* Length of note's value. */ 42 uint32_t n_type; /* Type of note. */ 43 // then name 44 // then padding, optional 45 // then desc, at 4 byte alignment (not 8, despite being elf64) 46 } Elf_Note; 47 #endif 48 49 // The following include file and following structs/enums 50 // have been replicated on a per-use basis below. For example, 51 // llvm::AMDGPU::HSAMD::Kernel::Metadata has several fields, 52 // but we may care only about kernargSegmentSize_ for now, so 53 // we just include that field in our KernelMD implementation. We 54 // chose this approach to replicate in order to avoid forcing 55 // a dependency on LLVM_INCLUDE_DIR just to compile the runtime. 56 // #include "llvm/Support/AMDGPUMetadata.h" 57 // typedef llvm::AMDGPU::HSAMD::Metadata CodeObjectMD; 58 // typedef llvm::AMDGPU::HSAMD::Kernel::Metadata KernelMD; 59 // typedef llvm::AMDGPU::HSAMD::Kernel::Arg::Metadata KernelArgMD; 60 // using llvm::AMDGPU::HSAMD::AccessQualifier; 61 // using llvm::AMDGPU::HSAMD::AddressSpaceQualifier; 62 // using llvm::AMDGPU::HSAMD::ValueKind; 63 // using llvm::AMDGPU::HSAMD::ValueType; 64 65 class KernelArgMD { 66 public: 67 enum class ValueKind { 68 HiddenGlobalOffsetX, 69 HiddenGlobalOffsetY, 70 HiddenGlobalOffsetZ, 71 HiddenNone, 72 HiddenPrintfBuffer, 73 HiddenDefaultQueue, 74 HiddenCompletionAction, 75 HiddenMultiGridSyncArg, 76 HiddenHostcallBuffer, 77 Unknown 78 }; 79 80 KernelArgMD() 81 : name_(std::string()), typeName_(std::string()), size_(0), offset_(0), 82 align_(0), valueKind_(ValueKind::Unknown) {} 83 84 // fields 85 std::string name_; 86 std::string typeName_; 87 uint32_t size_; 88 uint32_t offset_; 89 uint32_t align_; 90 ValueKind valueKind_; 91 }; 92 93 class KernelMD { 94 public: 95 KernelMD() : kernargSegmentSize_(0ull) {} 96 97 // fields 98 uint64_t kernargSegmentSize_; 99 }; 100 101 static const std::map<std::string, KernelArgMD::ValueKind> ArgValueKind = { 102 // Including only those fields that are relevant to the runtime. 103 // {"ByValue", KernelArgMD::ValueKind::ByValue}, 104 // {"GlobalBuffer", KernelArgMD::ValueKind::GlobalBuffer}, 105 // {"DynamicSharedPointer", 106 // KernelArgMD::ValueKind::DynamicSharedPointer}, 107 // {"Sampler", KernelArgMD::ValueKind::Sampler}, 108 // {"Image", KernelArgMD::ValueKind::Image}, 109 // {"Pipe", KernelArgMD::ValueKind::Pipe}, 110 // {"Queue", KernelArgMD::ValueKind::Queue}, 111 {"HiddenGlobalOffsetX", KernelArgMD::ValueKind::HiddenGlobalOffsetX}, 112 {"HiddenGlobalOffsetY", KernelArgMD::ValueKind::HiddenGlobalOffsetY}, 113 {"HiddenGlobalOffsetZ", KernelArgMD::ValueKind::HiddenGlobalOffsetZ}, 114 {"HiddenNone", KernelArgMD::ValueKind::HiddenNone}, 115 {"HiddenPrintfBuffer", KernelArgMD::ValueKind::HiddenPrintfBuffer}, 116 {"HiddenDefaultQueue", KernelArgMD::ValueKind::HiddenDefaultQueue}, 117 {"HiddenCompletionAction", KernelArgMD::ValueKind::HiddenCompletionAction}, 118 {"HiddenMultiGridSyncArg", KernelArgMD::ValueKind::HiddenMultiGridSyncArg}, 119 {"HiddenHostcallBuffer", KernelArgMD::ValueKind::HiddenHostcallBuffer}, 120 // v3 121 // {"by_value", KernelArgMD::ValueKind::ByValue}, 122 // {"global_buffer", KernelArgMD::ValueKind::GlobalBuffer}, 123 // {"dynamic_shared_pointer", 124 // KernelArgMD::ValueKind::DynamicSharedPointer}, 125 // {"sampler", KernelArgMD::ValueKind::Sampler}, 126 // {"image", KernelArgMD::ValueKind::Image}, 127 // {"pipe", KernelArgMD::ValueKind::Pipe}, 128 // {"queue", KernelArgMD::ValueKind::Queue}, 129 {"hidden_global_offset_x", KernelArgMD::ValueKind::HiddenGlobalOffsetX}, 130 {"hidden_global_offset_y", KernelArgMD::ValueKind::HiddenGlobalOffsetY}, 131 {"hidden_global_offset_z", KernelArgMD::ValueKind::HiddenGlobalOffsetZ}, 132 {"hidden_none", KernelArgMD::ValueKind::HiddenNone}, 133 {"hidden_printf_buffer", KernelArgMD::ValueKind::HiddenPrintfBuffer}, 134 {"hidden_default_queue", KernelArgMD::ValueKind::HiddenDefaultQueue}, 135 {"hidden_completion_action", 136 KernelArgMD::ValueKind::HiddenCompletionAction}, 137 {"hidden_multigrid_sync_arg", 138 KernelArgMD::ValueKind::HiddenMultiGridSyncArg}, 139 {"hidden_hostcall_buffer", KernelArgMD::ValueKind::HiddenHostcallBuffer}, 140 }; 141 142 namespace core { 143 144 hsa_status_t callbackEvent(const hsa_amd_event_t *event, void *data) { 145 #if (ROCM_VERSION_MAJOR >= 3) || \ 146 (ROCM_VERSION_MAJOR >= 2 && ROCM_VERSION_MINOR >= 3) 147 if (event->event_type == HSA_AMD_GPU_MEMORY_FAULT_EVENT) { 148 #else 149 if (event->event_type == GPU_MEMORY_FAULT_EVENT) { 150 #endif 151 hsa_amd_gpu_memory_fault_info_t memory_fault = event->memory_fault; 152 // memory_fault.agent 153 // memory_fault.virtual_address 154 // memory_fault.fault_reason_mask 155 // fprintf("[GPU Error at %p: Reason is ", memory_fault.virtual_address); 156 std::stringstream stream; 157 stream << std::hex << (uintptr_t)memory_fault.virtual_address; 158 std::string addr("0x" + stream.str()); 159 160 std::string err_string = "[GPU Memory Error] Addr: " + addr; 161 err_string += " Reason: "; 162 if (!(memory_fault.fault_reason_mask & 0x00111111)) { 163 err_string += "No Idea! "; 164 } else { 165 if (memory_fault.fault_reason_mask & 0x00000001) 166 err_string += "Page not present or supervisor privilege. "; 167 if (memory_fault.fault_reason_mask & 0x00000010) 168 err_string += "Write access to a read-only page. "; 169 if (memory_fault.fault_reason_mask & 0x00000100) 170 err_string += "Execute access to a page marked NX. "; 171 if (memory_fault.fault_reason_mask & 0x00001000) 172 err_string += "Host access only. "; 173 if (memory_fault.fault_reason_mask & 0x00010000) 174 err_string += "ECC failure (if supported by HW). "; 175 if (memory_fault.fault_reason_mask & 0x00100000) 176 err_string += "Can't determine the exact fault address. "; 177 } 178 fprintf(stderr, "%s\n", err_string.c_str()); 179 return HSA_STATUS_ERROR; 180 } 181 return HSA_STATUS_SUCCESS; 182 } 183 184 hsa_status_t atl_init_gpu_context() { 185 hsa_status_t err; 186 err = hsa_init(); 187 if (err != HSA_STATUS_SUCCESS) 188 return HSA_STATUS_ERROR; 189 190 err = hsa_amd_register_system_event_handler(callbackEvent, NULL); 191 if (err != HSA_STATUS_SUCCESS) { 192 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 193 "Registering the system for memory faults", get_error_string(err)); 194 return HSA_STATUS_ERROR; 195 } 196 197 return HSA_STATUS_SUCCESS; 198 } 199 200 static bool isImplicit(KernelArgMD::ValueKind value_kind) { 201 switch (value_kind) { 202 case KernelArgMD::ValueKind::HiddenGlobalOffsetX: 203 case KernelArgMD::ValueKind::HiddenGlobalOffsetY: 204 case KernelArgMD::ValueKind::HiddenGlobalOffsetZ: 205 case KernelArgMD::ValueKind::HiddenNone: 206 case KernelArgMD::ValueKind::HiddenPrintfBuffer: 207 case KernelArgMD::ValueKind::HiddenDefaultQueue: 208 case KernelArgMD::ValueKind::HiddenCompletionAction: 209 case KernelArgMD::ValueKind::HiddenMultiGridSyncArg: 210 case KernelArgMD::ValueKind::HiddenHostcallBuffer: 211 return true; 212 default: 213 return false; 214 } 215 } 216 217 static std::pair<unsigned char *, unsigned char *> 218 find_metadata(void *binary, size_t binSize) { 219 std::pair<unsigned char *, unsigned char *> failure = {nullptr, nullptr}; 220 221 Elf *e = elf_memory(static_cast<char *>(binary), binSize); 222 if (elf_kind(e) != ELF_K_ELF) { 223 return failure; 224 } 225 226 size_t numpHdrs; 227 if (elf_getphdrnum(e, &numpHdrs) != 0) { 228 return failure; 229 } 230 231 Elf64_Phdr *pHdrs = elf64_getphdr(e); 232 for (size_t i = 0; i < numpHdrs; ++i) { 233 Elf64_Phdr pHdr = pHdrs[i]; 234 235 // Look for the runtime metadata note 236 if (pHdr.p_type == PT_NOTE && pHdr.p_align >= sizeof(int)) { 237 // Iterate over the notes in this segment 238 address ptr = (address)binary + pHdr.p_offset; 239 address segmentEnd = ptr + pHdr.p_filesz; 240 241 while (ptr < segmentEnd) { 242 Elf_Note *note = reinterpret_cast<Elf_Note *>(ptr); 243 address name = (address)¬e[1]; 244 245 if (note->n_type == 7 || note->n_type == 8) { 246 return failure; 247 } else if (note->n_type == 10 /* NT_AMD_AMDGPU_HSA_METADATA */ && 248 note->n_namesz == sizeof "AMD" && 249 !memcmp(name, "AMD", note->n_namesz)) { 250 // code object v2 uses yaml metadata, no longer supported 251 return failure; 252 } else if (note->n_type == 32 /* NT_AMDGPU_METADATA */ && 253 note->n_namesz == sizeof "AMDGPU" && 254 !memcmp(name, "AMDGPU", note->n_namesz)) { 255 256 // n_descsz = 485 257 // value is padded to 4 byte alignment, may want to move end up to 258 // match 259 size_t offset = sizeof(uint32_t) * 3 /* fields */ 260 + sizeof("AMDGPU") /* name */ 261 + 1 /* padding to 4 byte alignment */; 262 263 // Including the trailing padding means both pointers are 4 bytes 264 // aligned, which may be useful later. 265 unsigned char *metadata_start = (unsigned char *)ptr + offset; 266 unsigned char *metadata_end = 267 metadata_start + core::alignUp(note->n_descsz, 4); 268 return {metadata_start, metadata_end}; 269 } 270 ptr += sizeof(*note) + core::alignUp(note->n_namesz, sizeof(int)) + 271 core::alignUp(note->n_descsz, sizeof(int)); 272 } 273 } 274 } 275 276 return failure; 277 } 278 279 namespace { 280 int map_lookup_array(msgpack::byte_range message, const char *needle, 281 msgpack::byte_range *res, uint64_t *size) { 282 unsigned count = 0; 283 struct s : msgpack::functors_defaults<s> { 284 s(unsigned &count, uint64_t *size) : count(count), size(size) {} 285 unsigned &count; 286 uint64_t *size; 287 const unsigned char *handle_array(uint64_t N, msgpack::byte_range bytes) { 288 count++; 289 *size = N; 290 return bytes.end; 291 } 292 }; 293 294 msgpack::foreach_map(message, 295 [&](msgpack::byte_range key, msgpack::byte_range value) { 296 if (msgpack::message_is_string(key, needle)) { 297 // If the message is an array, record number of 298 // elements in *size 299 msgpack::handle_msgpack<s>(value, {count, size}); 300 // return the whole array 301 *res = value; 302 } 303 }); 304 // Only claim success if exactly one key/array pair matched 305 return count != 1; 306 } 307 308 int map_lookup_string(msgpack::byte_range message, const char *needle, 309 std::string *res) { 310 unsigned count = 0; 311 struct s : public msgpack::functors_defaults<s> { 312 s(unsigned &count, std::string *res) : count(count), res(res) {} 313 unsigned &count; 314 std::string *res; 315 void handle_string(size_t N, const unsigned char *str) { 316 count++; 317 *res = std::string(str, str + N); 318 } 319 }; 320 msgpack::foreach_map(message, 321 [&](msgpack::byte_range key, msgpack::byte_range value) { 322 if (msgpack::message_is_string(key, needle)) { 323 msgpack::handle_msgpack<s>(value, {count, res}); 324 } 325 }); 326 return count != 1; 327 } 328 329 int map_lookup_uint64_t(msgpack::byte_range message, const char *needle, 330 uint64_t *res) { 331 unsigned count = 0; 332 msgpack::foreach_map(message, 333 [&](msgpack::byte_range key, msgpack::byte_range value) { 334 if (msgpack::message_is_string(key, needle)) { 335 msgpack::foronly_unsigned(value, [&](uint64_t x) { 336 count++; 337 *res = x; 338 }); 339 } 340 }); 341 return count != 1; 342 } 343 344 int array_lookup_element(msgpack::byte_range message, uint64_t elt, 345 msgpack::byte_range *res) { 346 int rc = 1; 347 uint64_t i = 0; 348 msgpack::foreach_array(message, [&](msgpack::byte_range value) { 349 if (i == elt) { 350 *res = value; 351 rc = 0; 352 } 353 i++; 354 }); 355 return rc; 356 } 357 358 int populate_kernelArgMD(msgpack::byte_range args_element, 359 KernelArgMD *kernelarg) { 360 using namespace msgpack; 361 int error = 0; 362 foreach_map(args_element, [&](byte_range key, byte_range value) -> void { 363 if (message_is_string(key, ".name")) { 364 foronly_string(value, [&](size_t N, const unsigned char *str) { 365 kernelarg->name_ = std::string(str, str + N); 366 }); 367 } else if (message_is_string(key, ".type_name")) { 368 foronly_string(value, [&](size_t N, const unsigned char *str) { 369 kernelarg->typeName_ = std::string(str, str + N); 370 }); 371 } else if (message_is_string(key, ".size")) { 372 foronly_unsigned(value, [&](uint64_t x) { kernelarg->size_ = x; }); 373 } else if (message_is_string(key, ".offset")) { 374 foronly_unsigned(value, [&](uint64_t x) { kernelarg->offset_ = x; }); 375 } else if (message_is_string(key, ".value_kind")) { 376 foronly_string(value, [&](size_t N, const unsigned char *str) { 377 std::string s = std::string(str, str + N); 378 auto itValueKind = ArgValueKind.find(s); 379 if (itValueKind != ArgValueKind.end()) { 380 kernelarg->valueKind_ = itValueKind->second; 381 } 382 }); 383 } 384 }); 385 return error; 386 } 387 } // namespace 388 389 static hsa_status_t get_code_object_custom_metadata( 390 void *binary, size_t binSize, 391 std::map<std::string, atl_kernel_info_t> &KernelInfoTable) { 392 // parse code object with different keys from v2 393 // also, the kernel name is not the same as the symbol name -- so a 394 // symbol->name map is needed 395 396 std::pair<unsigned char *, unsigned char *> metadata = 397 find_metadata(binary, binSize); 398 if (!metadata.first) { 399 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 400 } 401 402 uint64_t kernelsSize = 0; 403 int msgpack_errors = 0; 404 msgpack::byte_range kernel_array; 405 msgpack_errors = 406 map_lookup_array({metadata.first, metadata.second}, "amdhsa.kernels", 407 &kernel_array, &kernelsSize); 408 if (msgpack_errors != 0) { 409 printf("[%s:%d] %s failed\n", __FILE__, __LINE__, 410 "kernels lookup in program metadata"); 411 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 412 } 413 414 for (size_t i = 0; i < kernelsSize; i++) { 415 assert(msgpack_errors == 0); 416 std::string kernelName; 417 std::string symbolName; 418 419 msgpack::byte_range element; 420 msgpack_errors += array_lookup_element(kernel_array, i, &element); 421 if (msgpack_errors != 0) { 422 printf("[%s:%d] %s failed\n", __FILE__, __LINE__, 423 "element lookup in kernel metadata"); 424 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 425 } 426 427 msgpack_errors += map_lookup_string(element, ".name", &kernelName); 428 msgpack_errors += map_lookup_string(element, ".symbol", &symbolName); 429 if (msgpack_errors != 0) { 430 printf("[%s:%d] %s failed\n", __FILE__, __LINE__, 431 "strings lookup in kernel metadata"); 432 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 433 } 434 435 // Make sure that kernelName + ".kd" == symbolName 436 if ((kernelName + ".kd") != symbolName) { 437 printf("[%s:%d] Kernel name mismatching symbol: %s != %s + .kd\n", 438 __FILE__, __LINE__, symbolName.c_str(), kernelName.c_str()); 439 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 440 } 441 442 atl_kernel_info_t info = {0, 0, 0, 0, 0, 0, 0, 0, 0, {}, {}, {}}; 443 444 uint64_t sgpr_count, vgpr_count, sgpr_spill_count, vgpr_spill_count; 445 msgpack_errors += map_lookup_uint64_t(element, ".sgpr_count", &sgpr_count); 446 if (msgpack_errors != 0) { 447 printf("[%s:%d] %s failed\n", __FILE__, __LINE__, 448 "sgpr count metadata lookup in kernel metadata"); 449 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 450 } 451 452 info.sgpr_count = sgpr_count; 453 454 msgpack_errors += map_lookup_uint64_t(element, ".vgpr_count", &vgpr_count); 455 if (msgpack_errors != 0) { 456 printf("[%s:%d] %s failed\n", __FILE__, __LINE__, 457 "vgpr count metadata lookup in kernel metadata"); 458 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 459 } 460 461 info.vgpr_count = vgpr_count; 462 463 msgpack_errors += 464 map_lookup_uint64_t(element, ".sgpr_spill_count", &sgpr_spill_count); 465 if (msgpack_errors != 0) { 466 printf("[%s:%d] %s failed\n", __FILE__, __LINE__, 467 "sgpr spill count metadata lookup in kernel metadata"); 468 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 469 } 470 471 info.sgpr_spill_count = sgpr_spill_count; 472 473 msgpack_errors += 474 map_lookup_uint64_t(element, ".vgpr_spill_count", &vgpr_spill_count); 475 if (msgpack_errors != 0) { 476 printf("[%s:%d] %s failed\n", __FILE__, __LINE__, 477 "vgpr spill count metadata lookup in kernel metadata"); 478 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 479 } 480 481 info.vgpr_spill_count = vgpr_spill_count; 482 483 size_t kernel_explicit_args_size = 0; 484 uint64_t kernel_segment_size; 485 msgpack_errors += map_lookup_uint64_t(element, ".kernarg_segment_size", 486 &kernel_segment_size); 487 if (msgpack_errors != 0) { 488 printf("[%s:%d] %s failed\n", __FILE__, __LINE__, 489 "kernarg segment size metadata lookup in kernel metadata"); 490 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 491 } 492 493 bool hasHiddenArgs = false; 494 if (kernel_segment_size > 0) { 495 uint64_t argsSize; 496 size_t offset = 0; 497 498 msgpack::byte_range args_array; 499 msgpack_errors += 500 map_lookup_array(element, ".args", &args_array, &argsSize); 501 if (msgpack_errors != 0) { 502 printf("[%s:%d] %s failed\n", __FILE__, __LINE__, 503 "kernel args metadata lookup in kernel metadata"); 504 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 505 } 506 507 info.num_args = argsSize; 508 509 for (size_t i = 0; i < argsSize; ++i) { 510 KernelArgMD lcArg; 511 512 msgpack::byte_range args_element; 513 msgpack_errors += array_lookup_element(args_array, i, &args_element); 514 if (msgpack_errors != 0) { 515 printf("[%s:%d] %s failed\n", __FILE__, __LINE__, 516 "iterate args map in kernel args metadata"); 517 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 518 } 519 520 msgpack_errors += populate_kernelArgMD(args_element, &lcArg); 521 if (msgpack_errors != 0) { 522 printf("[%s:%d] %s failed\n", __FILE__, __LINE__, 523 "iterate args map in kernel args metadata"); 524 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 525 } 526 // populate info with sizes and offsets 527 info.arg_sizes.push_back(lcArg.size_); 528 // v3 has offset field and not align field 529 size_t new_offset = lcArg.offset_; 530 size_t padding = new_offset - offset; 531 offset = new_offset; 532 info.arg_offsets.push_back(lcArg.offset_); 533 DEBUG_PRINT("Arg[%lu] \"%s\" (%u, %u)\n", i, lcArg.name_.c_str(), 534 lcArg.size_, lcArg.offset_); 535 offset += lcArg.size_; 536 537 // check if the arg is a hidden/implicit arg 538 // this logic assumes that all hidden args are 8-byte aligned 539 if (!isImplicit(lcArg.valueKind_)) { 540 kernel_explicit_args_size += lcArg.size_; 541 } else { 542 hasHiddenArgs = true; 543 } 544 kernel_explicit_args_size += padding; 545 } 546 } 547 548 // add size of implicit args, e.g.: offset x, y and z and pipe pointer, but 549 // in ATMI, do not count the compiler set implicit args, but set your own 550 // implicit args by discounting the compiler set implicit args 551 info.kernel_segment_size = 552 (hasHiddenArgs ? kernel_explicit_args_size : kernel_segment_size) + 553 sizeof(atmi_implicit_args_t); 554 DEBUG_PRINT("[%s: kernarg seg size] (%lu --> %u)\n", kernelName.c_str(), 555 kernel_segment_size, info.kernel_segment_size); 556 557 // kernel received, now add it to the kernel info table 558 KernelInfoTable[kernelName] = info; 559 } 560 561 return HSA_STATUS_SUCCESS; 562 } 563 564 static hsa_status_t 565 populate_InfoTables(hsa_executable_symbol_t symbol, 566 std::map<std::string, atl_kernel_info_t> &KernelInfoTable, 567 std::map<std::string, atl_symbol_info_t> &SymbolInfoTable) { 568 hsa_symbol_kind_t type; 569 570 uint32_t name_length; 571 hsa_status_t err; 572 err = hsa_executable_symbol_get_info(symbol, HSA_EXECUTABLE_SYMBOL_INFO_TYPE, 573 &type); 574 if (err != HSA_STATUS_SUCCESS) { 575 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 576 "Symbol info extraction", get_error_string(err)); 577 return err; 578 } 579 DEBUG_PRINT("Exec Symbol type: %d\n", type); 580 if (type == HSA_SYMBOL_KIND_KERNEL) { 581 err = hsa_executable_symbol_get_info( 582 symbol, HSA_EXECUTABLE_SYMBOL_INFO_NAME_LENGTH, &name_length); 583 if (err != HSA_STATUS_SUCCESS) { 584 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 585 "Symbol info extraction", get_error_string(err)); 586 return err; 587 } 588 char *name = reinterpret_cast<char *>(malloc(name_length + 1)); 589 err = hsa_executable_symbol_get_info(symbol, 590 HSA_EXECUTABLE_SYMBOL_INFO_NAME, name); 591 if (err != HSA_STATUS_SUCCESS) { 592 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 593 "Symbol info extraction", get_error_string(err)); 594 return err; 595 } 596 // remove the suffix .kd from symbol name. 597 name[name_length - 3] = 0; 598 599 atl_kernel_info_t info; 600 std::string kernelName(name); 601 // by now, the kernel info table should already have an entry 602 // because the non-ROCr custom code object parsing is called before 603 // iterating over the code object symbols using ROCr 604 if (KernelInfoTable.find(kernelName) == KernelInfoTable.end()) { 605 if (HSA_STATUS_ERROR_INVALID_CODE_OBJECT != HSA_STATUS_SUCCESS) { 606 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 607 "Finding the entry kernel info table", 608 get_error_string(HSA_STATUS_ERROR_INVALID_CODE_OBJECT)); 609 exit(1); 610 } 611 } 612 // found, so assign and update 613 info = KernelInfoTable[kernelName]; 614 615 /* Extract dispatch information from the symbol */ 616 err = hsa_executable_symbol_get_info( 617 symbol, HSA_EXECUTABLE_SYMBOL_INFO_KERNEL_OBJECT, 618 &(info.kernel_object)); 619 if (err != HSA_STATUS_SUCCESS) { 620 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 621 "Extracting the symbol from the executable", 622 get_error_string(err)); 623 return err; 624 } 625 err = hsa_executable_symbol_get_info( 626 symbol, HSA_EXECUTABLE_SYMBOL_INFO_KERNEL_GROUP_SEGMENT_SIZE, 627 &(info.group_segment_size)); 628 if (err != HSA_STATUS_SUCCESS) { 629 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 630 "Extracting the group segment size from the executable", 631 get_error_string(err)); 632 return err; 633 } 634 err = hsa_executable_symbol_get_info( 635 symbol, HSA_EXECUTABLE_SYMBOL_INFO_KERNEL_PRIVATE_SEGMENT_SIZE, 636 &(info.private_segment_size)); 637 if (err != HSA_STATUS_SUCCESS) { 638 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 639 "Extracting the private segment from the executable", 640 get_error_string(err)); 641 return err; 642 } 643 644 DEBUG_PRINT( 645 "Kernel %s --> %lx symbol %u group segsize %u pvt segsize %u bytes " 646 "kernarg\n", 647 kernelName.c_str(), info.kernel_object, info.group_segment_size, 648 info.private_segment_size, info.kernel_segment_size); 649 650 // assign it back to the kernel info table 651 KernelInfoTable[kernelName] = info; 652 free(name); 653 } else if (type == HSA_SYMBOL_KIND_VARIABLE) { 654 err = hsa_executable_symbol_get_info( 655 symbol, HSA_EXECUTABLE_SYMBOL_INFO_NAME_LENGTH, &name_length); 656 if (err != HSA_STATUS_SUCCESS) { 657 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 658 "Symbol info extraction", get_error_string(err)); 659 return err; 660 } 661 char *name = reinterpret_cast<char *>(malloc(name_length + 1)); 662 err = hsa_executable_symbol_get_info(symbol, 663 HSA_EXECUTABLE_SYMBOL_INFO_NAME, name); 664 if (err != HSA_STATUS_SUCCESS) { 665 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 666 "Symbol info extraction", get_error_string(err)); 667 return err; 668 } 669 name[name_length] = 0; 670 671 atl_symbol_info_t info; 672 673 err = hsa_executable_symbol_get_info( 674 symbol, HSA_EXECUTABLE_SYMBOL_INFO_VARIABLE_ADDRESS, &(info.addr)); 675 if (err != HSA_STATUS_SUCCESS) { 676 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 677 "Symbol info address extraction", get_error_string(err)); 678 return err; 679 } 680 681 err = hsa_executable_symbol_get_info( 682 symbol, HSA_EXECUTABLE_SYMBOL_INFO_VARIABLE_SIZE, &(info.size)); 683 if (err != HSA_STATUS_SUCCESS) { 684 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 685 "Symbol info size extraction", get_error_string(err)); 686 return err; 687 } 688 689 DEBUG_PRINT("Symbol %s = %p (%u bytes)\n", name, (void *)info.addr, 690 info.size); 691 SymbolInfoTable[std::string(name)] = info; 692 free(name); 693 } else { 694 DEBUG_PRINT("Symbol is an indirect function\n"); 695 } 696 return HSA_STATUS_SUCCESS; 697 } 698 699 hsa_status_t RegisterModuleFromMemory( 700 std::map<std::string, atl_kernel_info_t> &KernelInfoTable, 701 std::map<std::string, atl_symbol_info_t> &SymbolInfoTable, 702 void *module_bytes, size_t module_size, hsa_agent_t agent, 703 hsa_status_t (*on_deserialized_data)(void *data, size_t size, 704 void *cb_state), 705 void *cb_state, std::vector<hsa_executable_t> &HSAExecutables) { 706 hsa_status_t err; 707 hsa_executable_t executable = {0}; 708 hsa_profile_t agent_profile; 709 710 err = hsa_agent_get_info(agent, HSA_AGENT_INFO_PROFILE, &agent_profile); 711 if (err != HSA_STATUS_SUCCESS) { 712 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 713 "Query the agent profile", get_error_string(err)); 714 return HSA_STATUS_ERROR; 715 } 716 // FIXME: Assume that every profile is FULL until we understand how to build 717 // GCN with base profile 718 agent_profile = HSA_PROFILE_FULL; 719 /* Create the empty executable. */ 720 err = hsa_executable_create(agent_profile, HSA_EXECUTABLE_STATE_UNFROZEN, "", 721 &executable); 722 if (err != HSA_STATUS_SUCCESS) { 723 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 724 "Create the executable", get_error_string(err)); 725 return HSA_STATUS_ERROR; 726 } 727 728 bool module_load_success = false; 729 do // Existing control flow used continue, preserve that for this patch 730 { 731 { 732 // Some metadata info is not available through ROCr API, so use custom 733 // code object metadata parsing to collect such metadata info 734 735 err = get_code_object_custom_metadata(module_bytes, module_size, 736 KernelInfoTable); 737 if (err != HSA_STATUS_SUCCESS) { 738 DEBUG_PRINT("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 739 "Getting custom code object metadata", 740 get_error_string(err)); 741 continue; 742 } 743 744 // Deserialize code object. 745 hsa_code_object_t code_object = {0}; 746 err = hsa_code_object_deserialize(module_bytes, module_size, NULL, 747 &code_object); 748 if (err != HSA_STATUS_SUCCESS) { 749 DEBUG_PRINT("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 750 "Code Object Deserialization", get_error_string(err)); 751 continue; 752 } 753 assert(0 != code_object.handle); 754 755 // Mutating the device image here avoids another allocation & memcpy 756 void *code_object_alloc_data = 757 reinterpret_cast<void *>(code_object.handle); 758 hsa_status_t atmi_err = 759 on_deserialized_data(code_object_alloc_data, module_size, cb_state); 760 if (atmi_err != HSA_STATUS_SUCCESS) { 761 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 762 "Error in deserialized_data callback", 763 get_error_string(atmi_err)); 764 return atmi_err; 765 } 766 767 /* Load the code object. */ 768 err = 769 hsa_executable_load_code_object(executable, agent, code_object, NULL); 770 if (err != HSA_STATUS_SUCCESS) { 771 DEBUG_PRINT("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 772 "Loading the code object", get_error_string(err)); 773 continue; 774 } 775 776 // cannot iterate over symbols until executable is frozen 777 } 778 module_load_success = true; 779 } while (0); 780 DEBUG_PRINT("Modules loaded successful? %d\n", module_load_success); 781 if (module_load_success) { 782 /* Freeze the executable; it can now be queried for symbols. */ 783 err = hsa_executable_freeze(executable, ""); 784 if (err != HSA_STATUS_SUCCESS) { 785 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 786 "Freeze the executable", get_error_string(err)); 787 return HSA_STATUS_ERROR; 788 } 789 790 err = hsa::executable_iterate_symbols( 791 executable, 792 [&](hsa_executable_t, hsa_executable_symbol_t symbol) -> hsa_status_t { 793 return populate_InfoTables(symbol, KernelInfoTable, SymbolInfoTable); 794 }); 795 if (err != HSA_STATUS_SUCCESS) { 796 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 797 "Iterating over symbols for execuatable", get_error_string(err)); 798 return HSA_STATUS_ERROR; 799 } 800 801 // save the executable and destroy during finalize 802 HSAExecutables.push_back(executable); 803 return HSA_STATUS_SUCCESS; 804 } else { 805 return HSA_STATUS_ERROR; 806 } 807 } 808 809 } // namespace core 810