1 //===--- amdgpu/impl/system.cpp ----------------------------------- C++ -*-===// 2 // 3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. 4 // See https://llvm.org/LICENSE.txt for license information. 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 6 // 7 //===----------------------------------------------------------------------===// 8 #include <libelf.h> 9 10 #include <cassert> 11 #include <sstream> 12 #include <string> 13 14 #include "internal.h" 15 #include "rt.h" 16 17 #include "msgpack.h" 18 19 namespace hsa { 20 // Wrap HSA iterate API in a shim that allows passing general callables 21 template <typename C> 22 hsa_status_t executable_iterate_symbols(hsa_executable_t executable, C cb) { 23 auto L = [](hsa_executable_t executable, hsa_executable_symbol_t symbol, 24 void *data) -> hsa_status_t { 25 C *unwrapped = static_cast<C *>(data); 26 return (*unwrapped)(executable, symbol); 27 }; 28 return hsa_executable_iterate_symbols(executable, L, 29 static_cast<void *>(&cb)); 30 } 31 } // namespace hsa 32 33 typedef unsigned char *address; 34 /* 35 * Note descriptors. 36 */ 37 // FreeBSD already declares Elf_Note (indirectly via <libelf.h>) 38 #if !defined(__FreeBSD__) 39 typedef struct { 40 uint32_t n_namesz; /* Length of note's name. */ 41 uint32_t n_descsz; /* Length of note's value. */ 42 uint32_t n_type; /* Type of note. */ 43 // then name 44 // then padding, optional 45 // then desc, at 4 byte alignment (not 8, despite being elf64) 46 } Elf_Note; 47 #endif 48 49 class KernelArgMD { 50 public: 51 enum class ValueKind { 52 HiddenGlobalOffsetX, 53 HiddenGlobalOffsetY, 54 HiddenGlobalOffsetZ, 55 HiddenNone, 56 HiddenPrintfBuffer, 57 HiddenDefaultQueue, 58 HiddenCompletionAction, 59 HiddenMultiGridSyncArg, 60 HiddenHostcallBuffer, 61 Unknown 62 }; 63 64 KernelArgMD() 65 : name_(std::string()), typeName_(std::string()), size_(0), offset_(0), 66 align_(0), valueKind_(ValueKind::Unknown) {} 67 68 // fields 69 std::string name_; 70 std::string typeName_; 71 uint32_t size_; 72 uint32_t offset_; 73 uint32_t align_; 74 ValueKind valueKind_; 75 }; 76 77 class KernelMD { 78 public: 79 KernelMD() : kernargSegmentSize_(0ull) {} 80 81 // fields 82 uint64_t kernargSegmentSize_; 83 }; 84 85 static const std::map<std::string, KernelArgMD::ValueKind> ArgValueKind = { 86 // v3 87 // {"by_value", KernelArgMD::ValueKind::ByValue}, 88 // {"global_buffer", KernelArgMD::ValueKind::GlobalBuffer}, 89 // {"dynamic_shared_pointer", 90 // KernelArgMD::ValueKind::DynamicSharedPointer}, 91 // {"sampler", KernelArgMD::ValueKind::Sampler}, 92 // {"image", KernelArgMD::ValueKind::Image}, 93 // {"pipe", KernelArgMD::ValueKind::Pipe}, 94 // {"queue", KernelArgMD::ValueKind::Queue}, 95 {"hidden_global_offset_x", KernelArgMD::ValueKind::HiddenGlobalOffsetX}, 96 {"hidden_global_offset_y", KernelArgMD::ValueKind::HiddenGlobalOffsetY}, 97 {"hidden_global_offset_z", KernelArgMD::ValueKind::HiddenGlobalOffsetZ}, 98 {"hidden_none", KernelArgMD::ValueKind::HiddenNone}, 99 {"hidden_printf_buffer", KernelArgMD::ValueKind::HiddenPrintfBuffer}, 100 {"hidden_default_queue", KernelArgMD::ValueKind::HiddenDefaultQueue}, 101 {"hidden_completion_action", 102 KernelArgMD::ValueKind::HiddenCompletionAction}, 103 {"hidden_multigrid_sync_arg", 104 KernelArgMD::ValueKind::HiddenMultiGridSyncArg}, 105 {"hidden_hostcall_buffer", KernelArgMD::ValueKind::HiddenHostcallBuffer}, 106 }; 107 108 namespace core { 109 110 hsa_status_t callbackEvent(const hsa_amd_event_t *event, void *data) { 111 if (event->event_type == HSA_AMD_GPU_MEMORY_FAULT_EVENT) { 112 hsa_amd_gpu_memory_fault_info_t memory_fault = event->memory_fault; 113 // memory_fault.agent 114 // memory_fault.virtual_address 115 // memory_fault.fault_reason_mask 116 // fprintf("[GPU Error at %p: Reason is ", memory_fault.virtual_address); 117 std::stringstream stream; 118 stream << std::hex << (uintptr_t)memory_fault.virtual_address; 119 std::string addr("0x" + stream.str()); 120 121 std::string err_string = "[GPU Memory Error] Addr: " + addr; 122 err_string += " Reason: "; 123 if (!(memory_fault.fault_reason_mask & 0x00111111)) { 124 err_string += "No Idea! "; 125 } else { 126 if (memory_fault.fault_reason_mask & 0x00000001) 127 err_string += "Page not present or supervisor privilege. "; 128 if (memory_fault.fault_reason_mask & 0x00000010) 129 err_string += "Write access to a read-only page. "; 130 if (memory_fault.fault_reason_mask & 0x00000100) 131 err_string += "Execute access to a page marked NX. "; 132 if (memory_fault.fault_reason_mask & 0x00001000) 133 err_string += "Host access only. "; 134 if (memory_fault.fault_reason_mask & 0x00010000) 135 err_string += "ECC failure (if supported by HW). "; 136 if (memory_fault.fault_reason_mask & 0x00100000) 137 err_string += "Can't determine the exact fault address. "; 138 } 139 fprintf(stderr, "%s\n", err_string.c_str()); 140 return HSA_STATUS_ERROR; 141 } 142 return HSA_STATUS_SUCCESS; 143 } 144 145 hsa_status_t atl_init_gpu_context() { 146 hsa_status_t err = hsa_amd_register_system_event_handler(callbackEvent, NULL); 147 if (err != HSA_STATUS_SUCCESS) { 148 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 149 "Registering the system for memory faults", get_error_string(err)); 150 return HSA_STATUS_ERROR; 151 } 152 153 return HSA_STATUS_SUCCESS; 154 } 155 156 static bool isImplicit(KernelArgMD::ValueKind value_kind) { 157 switch (value_kind) { 158 case KernelArgMD::ValueKind::HiddenGlobalOffsetX: 159 case KernelArgMD::ValueKind::HiddenGlobalOffsetY: 160 case KernelArgMD::ValueKind::HiddenGlobalOffsetZ: 161 case KernelArgMD::ValueKind::HiddenNone: 162 case KernelArgMD::ValueKind::HiddenPrintfBuffer: 163 case KernelArgMD::ValueKind::HiddenDefaultQueue: 164 case KernelArgMD::ValueKind::HiddenCompletionAction: 165 case KernelArgMD::ValueKind::HiddenMultiGridSyncArg: 166 case KernelArgMD::ValueKind::HiddenHostcallBuffer: 167 return true; 168 default: 169 return false; 170 } 171 } 172 173 static std::pair<unsigned char *, unsigned char *> 174 find_metadata(void *binary, size_t binSize) { 175 std::pair<unsigned char *, unsigned char *> failure = {nullptr, nullptr}; 176 177 Elf *e = elf_memory(static_cast<char *>(binary), binSize); 178 if (elf_kind(e) != ELF_K_ELF) { 179 return failure; 180 } 181 182 size_t numpHdrs; 183 if (elf_getphdrnum(e, &numpHdrs) != 0) { 184 return failure; 185 } 186 187 Elf64_Phdr *pHdrs = elf64_getphdr(e); 188 for (size_t i = 0; i < numpHdrs; ++i) { 189 Elf64_Phdr pHdr = pHdrs[i]; 190 191 // Look for the runtime metadata note 192 if (pHdr.p_type == PT_NOTE && pHdr.p_align >= sizeof(int)) { 193 // Iterate over the notes in this segment 194 address ptr = (address)binary + pHdr.p_offset; 195 address segmentEnd = ptr + pHdr.p_filesz; 196 197 while (ptr < segmentEnd) { 198 Elf_Note *note = reinterpret_cast<Elf_Note *>(ptr); 199 address name = (address)¬e[1]; 200 201 if (note->n_type == 7 || note->n_type == 8) { 202 return failure; 203 } else if (note->n_type == 10 /* NT_AMD_AMDGPU_HSA_METADATA */ && 204 note->n_namesz == sizeof "AMD" && 205 !memcmp(name, "AMD", note->n_namesz)) { 206 // code object v2 uses yaml metadata, no longer supported 207 return failure; 208 } else if (note->n_type == 32 /* NT_AMDGPU_METADATA */ && 209 note->n_namesz == sizeof "AMDGPU" && 210 !memcmp(name, "AMDGPU", note->n_namesz)) { 211 212 // n_descsz = 485 213 // value is padded to 4 byte alignment, may want to move end up to 214 // match 215 size_t offset = sizeof(uint32_t) * 3 /* fields */ 216 + sizeof("AMDGPU") /* name */ 217 + 1 /* padding to 4 byte alignment */; 218 219 // Including the trailing padding means both pointers are 4 bytes 220 // aligned, which may be useful later. 221 unsigned char *metadata_start = (unsigned char *)ptr + offset; 222 unsigned char *metadata_end = 223 metadata_start + core::alignUp(note->n_descsz, 4); 224 return {metadata_start, metadata_end}; 225 } 226 ptr += sizeof(*note) + core::alignUp(note->n_namesz, sizeof(int)) + 227 core::alignUp(note->n_descsz, sizeof(int)); 228 } 229 } 230 } 231 232 return failure; 233 } 234 235 namespace { 236 int map_lookup_array(msgpack::byte_range message, const char *needle, 237 msgpack::byte_range *res, uint64_t *size) { 238 unsigned count = 0; 239 struct s : msgpack::functors_defaults<s> { 240 s(unsigned &count, uint64_t *size) : count(count), size(size) {} 241 unsigned &count; 242 uint64_t *size; 243 const unsigned char *handle_array(uint64_t N, msgpack::byte_range bytes) { 244 count++; 245 *size = N; 246 return bytes.end; 247 } 248 }; 249 250 msgpack::foreach_map(message, 251 [&](msgpack::byte_range key, msgpack::byte_range value) { 252 if (msgpack::message_is_string(key, needle)) { 253 // If the message is an array, record number of 254 // elements in *size 255 msgpack::handle_msgpack<s>(value, {count, size}); 256 // return the whole array 257 *res = value; 258 } 259 }); 260 // Only claim success if exactly one key/array pair matched 261 return count != 1; 262 } 263 264 int map_lookup_string(msgpack::byte_range message, const char *needle, 265 std::string *res) { 266 unsigned count = 0; 267 struct s : public msgpack::functors_defaults<s> { 268 s(unsigned &count, std::string *res) : count(count), res(res) {} 269 unsigned &count; 270 std::string *res; 271 void handle_string(size_t N, const unsigned char *str) { 272 count++; 273 *res = std::string(str, str + N); 274 } 275 }; 276 msgpack::foreach_map(message, 277 [&](msgpack::byte_range key, msgpack::byte_range value) { 278 if (msgpack::message_is_string(key, needle)) { 279 msgpack::handle_msgpack<s>(value, {count, res}); 280 } 281 }); 282 return count != 1; 283 } 284 285 int map_lookup_uint64_t(msgpack::byte_range message, const char *needle, 286 uint64_t *res) { 287 unsigned count = 0; 288 msgpack::foreach_map(message, 289 [&](msgpack::byte_range key, msgpack::byte_range value) { 290 if (msgpack::message_is_string(key, needle)) { 291 msgpack::foronly_unsigned(value, [&](uint64_t x) { 292 count++; 293 *res = x; 294 }); 295 } 296 }); 297 return count != 1; 298 } 299 300 int array_lookup_element(msgpack::byte_range message, uint64_t elt, 301 msgpack::byte_range *res) { 302 int rc = 1; 303 uint64_t i = 0; 304 msgpack::foreach_array(message, [&](msgpack::byte_range value) { 305 if (i == elt) { 306 *res = value; 307 rc = 0; 308 } 309 i++; 310 }); 311 return rc; 312 } 313 314 int populate_kernelArgMD(msgpack::byte_range args_element, 315 KernelArgMD *kernelarg) { 316 using namespace msgpack; 317 int error = 0; 318 foreach_map(args_element, [&](byte_range key, byte_range value) -> void { 319 if (message_is_string(key, ".name")) { 320 foronly_string(value, [&](size_t N, const unsigned char *str) { 321 kernelarg->name_ = std::string(str, str + N); 322 }); 323 } else if (message_is_string(key, ".type_name")) { 324 foronly_string(value, [&](size_t N, const unsigned char *str) { 325 kernelarg->typeName_ = std::string(str, str + N); 326 }); 327 } else if (message_is_string(key, ".size")) { 328 foronly_unsigned(value, [&](uint64_t x) { kernelarg->size_ = x; }); 329 } else if (message_is_string(key, ".offset")) { 330 foronly_unsigned(value, [&](uint64_t x) { kernelarg->offset_ = x; }); 331 } else if (message_is_string(key, ".value_kind")) { 332 foronly_string(value, [&](size_t N, const unsigned char *str) { 333 std::string s = std::string(str, str + N); 334 auto itValueKind = ArgValueKind.find(s); 335 if (itValueKind != ArgValueKind.end()) { 336 kernelarg->valueKind_ = itValueKind->second; 337 } 338 }); 339 } 340 }); 341 return error; 342 } 343 } // namespace 344 345 static hsa_status_t get_code_object_custom_metadata( 346 void *binary, size_t binSize, 347 std::map<std::string, atl_kernel_info_t> &KernelInfoTable) { 348 // parse code object with different keys from v2 349 // also, the kernel name is not the same as the symbol name -- so a 350 // symbol->name map is needed 351 352 std::pair<unsigned char *, unsigned char *> metadata = 353 find_metadata(binary, binSize); 354 if (!metadata.first) { 355 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 356 } 357 358 uint64_t kernelsSize = 0; 359 int msgpack_errors = 0; 360 msgpack::byte_range kernel_array; 361 msgpack_errors = 362 map_lookup_array({metadata.first, metadata.second}, "amdhsa.kernels", 363 &kernel_array, &kernelsSize); 364 if (msgpack_errors != 0) { 365 printf("[%s:%d] %s failed\n", __FILE__, __LINE__, 366 "kernels lookup in program metadata"); 367 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 368 } 369 370 for (size_t i = 0; i < kernelsSize; i++) { 371 assert(msgpack_errors == 0); 372 std::string kernelName; 373 std::string symbolName; 374 375 msgpack::byte_range element; 376 msgpack_errors += array_lookup_element(kernel_array, i, &element); 377 if (msgpack_errors != 0) { 378 printf("[%s:%d] %s failed\n", __FILE__, __LINE__, 379 "element lookup in kernel metadata"); 380 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 381 } 382 383 msgpack_errors += map_lookup_string(element, ".name", &kernelName); 384 msgpack_errors += map_lookup_string(element, ".symbol", &symbolName); 385 if (msgpack_errors != 0) { 386 printf("[%s:%d] %s failed\n", __FILE__, __LINE__, 387 "strings lookup in kernel metadata"); 388 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 389 } 390 391 // Make sure that kernelName + ".kd" == symbolName 392 if ((kernelName + ".kd") != symbolName) { 393 printf("[%s:%d] Kernel name mismatching symbol: %s != %s + .kd\n", 394 __FILE__, __LINE__, symbolName.c_str(), kernelName.c_str()); 395 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 396 } 397 398 atl_kernel_info_t info = {0, 0, 0, 0, 0, 0, 0, 0, 0, {}, {}, {}}; 399 400 uint64_t sgpr_count, vgpr_count, sgpr_spill_count, vgpr_spill_count; 401 msgpack_errors += map_lookup_uint64_t(element, ".sgpr_count", &sgpr_count); 402 if (msgpack_errors != 0) { 403 printf("[%s:%d] %s failed\n", __FILE__, __LINE__, 404 "sgpr count metadata lookup in kernel metadata"); 405 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 406 } 407 408 info.sgpr_count = sgpr_count; 409 410 msgpack_errors += map_lookup_uint64_t(element, ".vgpr_count", &vgpr_count); 411 if (msgpack_errors != 0) { 412 printf("[%s:%d] %s failed\n", __FILE__, __LINE__, 413 "vgpr count metadata lookup in kernel metadata"); 414 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 415 } 416 417 info.vgpr_count = vgpr_count; 418 419 msgpack_errors += 420 map_lookup_uint64_t(element, ".sgpr_spill_count", &sgpr_spill_count); 421 if (msgpack_errors != 0) { 422 printf("[%s:%d] %s failed\n", __FILE__, __LINE__, 423 "sgpr spill count metadata lookup in kernel metadata"); 424 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 425 } 426 427 info.sgpr_spill_count = sgpr_spill_count; 428 429 msgpack_errors += 430 map_lookup_uint64_t(element, ".vgpr_spill_count", &vgpr_spill_count); 431 if (msgpack_errors != 0) { 432 printf("[%s:%d] %s failed\n", __FILE__, __LINE__, 433 "vgpr spill count metadata lookup in kernel metadata"); 434 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 435 } 436 437 info.vgpr_spill_count = vgpr_spill_count; 438 439 size_t kernel_explicit_args_size = 0; 440 uint64_t kernel_segment_size; 441 msgpack_errors += map_lookup_uint64_t(element, ".kernarg_segment_size", 442 &kernel_segment_size); 443 if (msgpack_errors != 0) { 444 printf("[%s:%d] %s failed\n", __FILE__, __LINE__, 445 "kernarg segment size metadata lookup in kernel metadata"); 446 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 447 } 448 449 bool hasHiddenArgs = false; 450 if (kernel_segment_size > 0) { 451 uint64_t argsSize; 452 size_t offset = 0; 453 454 msgpack::byte_range args_array; 455 msgpack_errors += 456 map_lookup_array(element, ".args", &args_array, &argsSize); 457 if (msgpack_errors != 0) { 458 printf("[%s:%d] %s failed\n", __FILE__, __LINE__, 459 "kernel args metadata lookup in kernel metadata"); 460 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 461 } 462 463 info.num_args = argsSize; 464 465 for (size_t i = 0; i < argsSize; ++i) { 466 KernelArgMD lcArg; 467 468 msgpack::byte_range args_element; 469 msgpack_errors += array_lookup_element(args_array, i, &args_element); 470 if (msgpack_errors != 0) { 471 printf("[%s:%d] %s failed\n", __FILE__, __LINE__, 472 "iterate args map in kernel args metadata"); 473 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 474 } 475 476 msgpack_errors += populate_kernelArgMD(args_element, &lcArg); 477 if (msgpack_errors != 0) { 478 printf("[%s:%d] %s failed\n", __FILE__, __LINE__, 479 "iterate args map in kernel args metadata"); 480 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 481 } 482 // populate info with sizes and offsets 483 info.arg_sizes.push_back(lcArg.size_); 484 // v3 has offset field and not align field 485 size_t new_offset = lcArg.offset_; 486 size_t padding = new_offset - offset; 487 offset = new_offset; 488 info.arg_offsets.push_back(lcArg.offset_); 489 DP("Arg[%lu] \"%s\" (%u, %u)\n", i, lcArg.name_.c_str(), lcArg.size_, 490 lcArg.offset_); 491 offset += lcArg.size_; 492 493 // check if the arg is a hidden/implicit arg 494 // this logic assumes that all hidden args are 8-byte aligned 495 if (!isImplicit(lcArg.valueKind_)) { 496 kernel_explicit_args_size += lcArg.size_; 497 } else { 498 hasHiddenArgs = true; 499 } 500 kernel_explicit_args_size += padding; 501 } 502 } 503 504 // add size of implicit args, e.g.: offset x, y and z and pipe pointer, but 505 // do not count the compiler set implicit args, but set your own implicit 506 // args by discounting the compiler set implicit args 507 info.kernel_segment_size = 508 (hasHiddenArgs ? kernel_explicit_args_size : kernel_segment_size) + 509 sizeof(impl_implicit_args_t); 510 DP("[%s: kernarg seg size] (%lu --> %u)\n", kernelName.c_str(), 511 kernel_segment_size, info.kernel_segment_size); 512 513 // kernel received, now add it to the kernel info table 514 KernelInfoTable[kernelName] = info; 515 } 516 517 return HSA_STATUS_SUCCESS; 518 } 519 520 static hsa_status_t 521 populate_InfoTables(hsa_executable_symbol_t symbol, 522 std::map<std::string, atl_kernel_info_t> &KernelInfoTable, 523 std::map<std::string, atl_symbol_info_t> &SymbolInfoTable) { 524 hsa_symbol_kind_t type; 525 526 uint32_t name_length; 527 hsa_status_t err; 528 err = hsa_executable_symbol_get_info(symbol, HSA_EXECUTABLE_SYMBOL_INFO_TYPE, 529 &type); 530 if (err != HSA_STATUS_SUCCESS) { 531 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 532 "Symbol info extraction", get_error_string(err)); 533 return err; 534 } 535 DP("Exec Symbol type: %d\n", type); 536 if (type == HSA_SYMBOL_KIND_KERNEL) { 537 err = hsa_executable_symbol_get_info( 538 symbol, HSA_EXECUTABLE_SYMBOL_INFO_NAME_LENGTH, &name_length); 539 if (err != HSA_STATUS_SUCCESS) { 540 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 541 "Symbol info extraction", get_error_string(err)); 542 return err; 543 } 544 char *name = reinterpret_cast<char *>(malloc(name_length + 1)); 545 err = hsa_executable_symbol_get_info(symbol, 546 HSA_EXECUTABLE_SYMBOL_INFO_NAME, name); 547 if (err != HSA_STATUS_SUCCESS) { 548 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 549 "Symbol info extraction", get_error_string(err)); 550 return err; 551 } 552 // remove the suffix .kd from symbol name. 553 name[name_length - 3] = 0; 554 555 atl_kernel_info_t info; 556 std::string kernelName(name); 557 // by now, the kernel info table should already have an entry 558 // because the non-ROCr custom code object parsing is called before 559 // iterating over the code object symbols using ROCr 560 if (KernelInfoTable.find(kernelName) == KernelInfoTable.end()) { 561 DP("amdgpu internal consistency error\n"); 562 return HSA_STATUS_ERROR; 563 } 564 // found, so assign and update 565 info = KernelInfoTable[kernelName]; 566 567 /* Extract dispatch information from the symbol */ 568 err = hsa_executable_symbol_get_info( 569 symbol, HSA_EXECUTABLE_SYMBOL_INFO_KERNEL_OBJECT, 570 &(info.kernel_object)); 571 if (err != HSA_STATUS_SUCCESS) { 572 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 573 "Extracting the symbol from the executable", 574 get_error_string(err)); 575 return err; 576 } 577 err = hsa_executable_symbol_get_info( 578 symbol, HSA_EXECUTABLE_SYMBOL_INFO_KERNEL_GROUP_SEGMENT_SIZE, 579 &(info.group_segment_size)); 580 if (err != HSA_STATUS_SUCCESS) { 581 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 582 "Extracting the group segment size from the executable", 583 get_error_string(err)); 584 return err; 585 } 586 err = hsa_executable_symbol_get_info( 587 symbol, HSA_EXECUTABLE_SYMBOL_INFO_KERNEL_PRIVATE_SEGMENT_SIZE, 588 &(info.private_segment_size)); 589 if (err != HSA_STATUS_SUCCESS) { 590 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 591 "Extracting the private segment from the executable", 592 get_error_string(err)); 593 return err; 594 } 595 596 DP("Kernel %s --> %lx symbol %u group segsize %u pvt segsize %u bytes " 597 "kernarg\n", 598 kernelName.c_str(), info.kernel_object, info.group_segment_size, 599 info.private_segment_size, info.kernel_segment_size); 600 601 // assign it back to the kernel info table 602 KernelInfoTable[kernelName] = info; 603 free(name); 604 } else if (type == HSA_SYMBOL_KIND_VARIABLE) { 605 err = hsa_executable_symbol_get_info( 606 symbol, HSA_EXECUTABLE_SYMBOL_INFO_NAME_LENGTH, &name_length); 607 if (err != HSA_STATUS_SUCCESS) { 608 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 609 "Symbol info extraction", get_error_string(err)); 610 return err; 611 } 612 char *name = reinterpret_cast<char *>(malloc(name_length + 1)); 613 err = hsa_executable_symbol_get_info(symbol, 614 HSA_EXECUTABLE_SYMBOL_INFO_NAME, name); 615 if (err != HSA_STATUS_SUCCESS) { 616 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 617 "Symbol info extraction", get_error_string(err)); 618 return err; 619 } 620 name[name_length] = 0; 621 622 atl_symbol_info_t info; 623 624 err = hsa_executable_symbol_get_info( 625 symbol, HSA_EXECUTABLE_SYMBOL_INFO_VARIABLE_ADDRESS, &(info.addr)); 626 if (err != HSA_STATUS_SUCCESS) { 627 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 628 "Symbol info address extraction", get_error_string(err)); 629 return err; 630 } 631 632 err = hsa_executable_symbol_get_info( 633 symbol, HSA_EXECUTABLE_SYMBOL_INFO_VARIABLE_SIZE, &(info.size)); 634 if (err != HSA_STATUS_SUCCESS) { 635 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 636 "Symbol info size extraction", get_error_string(err)); 637 return err; 638 } 639 640 DP("Symbol %s = %p (%u bytes)\n", name, (void *)info.addr, info.size); 641 SymbolInfoTable[std::string(name)] = info; 642 free(name); 643 } else { 644 DP("Symbol is an indirect function\n"); 645 } 646 return HSA_STATUS_SUCCESS; 647 } 648 649 hsa_status_t RegisterModuleFromMemory( 650 std::map<std::string, atl_kernel_info_t> &KernelInfoTable, 651 std::map<std::string, atl_symbol_info_t> &SymbolInfoTable, 652 void *module_bytes, size_t module_size, hsa_agent_t agent, 653 hsa_status_t (*on_deserialized_data)(void *data, size_t size, 654 void *cb_state), 655 void *cb_state, std::vector<hsa_executable_t> &HSAExecutables) { 656 hsa_status_t err; 657 hsa_executable_t executable = {0}; 658 hsa_profile_t agent_profile; 659 660 err = hsa_agent_get_info(agent, HSA_AGENT_INFO_PROFILE, &agent_profile); 661 if (err != HSA_STATUS_SUCCESS) { 662 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 663 "Query the agent profile", get_error_string(err)); 664 return HSA_STATUS_ERROR; 665 } 666 // FIXME: Assume that every profile is FULL until we understand how to build 667 // GCN with base profile 668 agent_profile = HSA_PROFILE_FULL; 669 /* Create the empty executable. */ 670 err = hsa_executable_create(agent_profile, HSA_EXECUTABLE_STATE_UNFROZEN, "", 671 &executable); 672 if (err != HSA_STATUS_SUCCESS) { 673 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 674 "Create the executable", get_error_string(err)); 675 return HSA_STATUS_ERROR; 676 } 677 678 bool module_load_success = false; 679 do // Existing control flow used continue, preserve that for this patch 680 { 681 { 682 // Some metadata info is not available through ROCr API, so use custom 683 // code object metadata parsing to collect such metadata info 684 685 err = get_code_object_custom_metadata(module_bytes, module_size, 686 KernelInfoTable); 687 if (err != HSA_STATUS_SUCCESS) { 688 DP("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 689 "Getting custom code object metadata", get_error_string(err)); 690 continue; 691 } 692 693 // Deserialize code object. 694 hsa_code_object_t code_object = {0}; 695 err = hsa_code_object_deserialize(module_bytes, module_size, NULL, 696 &code_object); 697 if (err != HSA_STATUS_SUCCESS) { 698 DP("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 699 "Code Object Deserialization", get_error_string(err)); 700 continue; 701 } 702 assert(0 != code_object.handle); 703 704 // Mutating the device image here avoids another allocation & memcpy 705 void *code_object_alloc_data = 706 reinterpret_cast<void *>(code_object.handle); 707 hsa_status_t impl_err = 708 on_deserialized_data(code_object_alloc_data, module_size, cb_state); 709 if (impl_err != HSA_STATUS_SUCCESS) { 710 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 711 "Error in deserialized_data callback", 712 get_error_string(impl_err)); 713 return impl_err; 714 } 715 716 /* Load the code object. */ 717 err = 718 hsa_executable_load_code_object(executable, agent, code_object, NULL); 719 if (err != HSA_STATUS_SUCCESS) { 720 DP("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 721 "Loading the code object", get_error_string(err)); 722 continue; 723 } 724 725 // cannot iterate over symbols until executable is frozen 726 } 727 module_load_success = true; 728 } while (0); 729 DP("Modules loaded successful? %d\n", module_load_success); 730 if (module_load_success) { 731 /* Freeze the executable; it can now be queried for symbols. */ 732 err = hsa_executable_freeze(executable, ""); 733 if (err != HSA_STATUS_SUCCESS) { 734 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 735 "Freeze the executable", get_error_string(err)); 736 return HSA_STATUS_ERROR; 737 } 738 739 err = hsa::executable_iterate_symbols( 740 executable, 741 [&](hsa_executable_t, hsa_executable_symbol_t symbol) -> hsa_status_t { 742 return populate_InfoTables(symbol, KernelInfoTable, SymbolInfoTable); 743 }); 744 if (err != HSA_STATUS_SUCCESS) { 745 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 746 "Iterating over symbols for execuatable", get_error_string(err)); 747 return HSA_STATUS_ERROR; 748 } 749 750 // save the executable and destroy during finalize 751 HSAExecutables.push_back(executable); 752 return HSA_STATUS_SUCCESS; 753 } else { 754 return HSA_STATUS_ERROR; 755 } 756 } 757 758 } // namespace core 759