1 //===--- amdgpu/impl/system.cpp ----------------------------------- C++ -*-===// 2 // 3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. 4 // See https://llvm.org/LICENSE.txt for license information. 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 6 // 7 //===----------------------------------------------------------------------===// 8 #include <libelf.h> 9 10 #include <cassert> 11 #include <sstream> 12 #include <string> 13 14 #include "internal.h" 15 #include "rt.h" 16 17 #include "msgpack.h" 18 19 namespace hsa { 20 // Wrap HSA iterate API in a shim that allows passing general callables 21 template <typename C> 22 hsa_status_t executable_iterate_symbols(hsa_executable_t executable, C cb) { 23 auto L = [](hsa_executable_t executable, hsa_executable_symbol_t symbol, 24 void *data) -> hsa_status_t { 25 C *unwrapped = static_cast<C *>(data); 26 return (*unwrapped)(executable, symbol); 27 }; 28 return hsa_executable_iterate_symbols(executable, L, 29 static_cast<void *>(&cb)); 30 } 31 } // namespace hsa 32 33 typedef unsigned char *address; 34 /* 35 * Note descriptors. 36 */ 37 // FreeBSD already declares Elf_Note (indirectly via <libelf.h>) 38 #if !defined(__FreeBSD__) 39 typedef struct { 40 uint32_t n_namesz; /* Length of note's name. */ 41 uint32_t n_descsz; /* Length of note's value. */ 42 uint32_t n_type; /* Type of note. */ 43 // then name 44 // then padding, optional 45 // then desc, at 4 byte alignment (not 8, despite being elf64) 46 } Elf_Note; 47 #endif 48 49 class KernelArgMD { 50 public: 51 enum class ValueKind { 52 HiddenGlobalOffsetX, 53 HiddenGlobalOffsetY, 54 HiddenGlobalOffsetZ, 55 HiddenNone, 56 HiddenPrintfBuffer, 57 HiddenDefaultQueue, 58 HiddenCompletionAction, 59 HiddenMultiGridSyncArg, 60 HiddenHostcallBuffer, 61 Unknown 62 }; 63 64 KernelArgMD() 65 : name_(std::string()), size_(0), offset_(0), 66 valueKind_(ValueKind::Unknown) {} 67 68 // fields 69 std::string name_; 70 uint32_t size_; 71 uint32_t offset_; 72 ValueKind valueKind_; 73 }; 74 75 static const std::map<std::string, KernelArgMD::ValueKind> ArgValueKind = { 76 // v3 77 // {"by_value", KernelArgMD::ValueKind::ByValue}, 78 // {"global_buffer", KernelArgMD::ValueKind::GlobalBuffer}, 79 // {"dynamic_shared_pointer", 80 // KernelArgMD::ValueKind::DynamicSharedPointer}, 81 // {"sampler", KernelArgMD::ValueKind::Sampler}, 82 // {"image", KernelArgMD::ValueKind::Image}, 83 // {"pipe", KernelArgMD::ValueKind::Pipe}, 84 // {"queue", KernelArgMD::ValueKind::Queue}, 85 {"hidden_global_offset_x", KernelArgMD::ValueKind::HiddenGlobalOffsetX}, 86 {"hidden_global_offset_y", KernelArgMD::ValueKind::HiddenGlobalOffsetY}, 87 {"hidden_global_offset_z", KernelArgMD::ValueKind::HiddenGlobalOffsetZ}, 88 {"hidden_none", KernelArgMD::ValueKind::HiddenNone}, 89 {"hidden_printf_buffer", KernelArgMD::ValueKind::HiddenPrintfBuffer}, 90 {"hidden_default_queue", KernelArgMD::ValueKind::HiddenDefaultQueue}, 91 {"hidden_completion_action", 92 KernelArgMD::ValueKind::HiddenCompletionAction}, 93 {"hidden_multigrid_sync_arg", 94 KernelArgMD::ValueKind::HiddenMultiGridSyncArg}, 95 {"hidden_hostcall_buffer", KernelArgMD::ValueKind::HiddenHostcallBuffer}, 96 }; 97 98 namespace core { 99 100 hsa_status_t callbackEvent(const hsa_amd_event_t *event, void *data) { 101 if (event->event_type == HSA_AMD_GPU_MEMORY_FAULT_EVENT) { 102 hsa_amd_gpu_memory_fault_info_t memory_fault = event->memory_fault; 103 // memory_fault.agent 104 // memory_fault.virtual_address 105 // memory_fault.fault_reason_mask 106 // fprintf("[GPU Error at %p: Reason is ", memory_fault.virtual_address); 107 std::stringstream stream; 108 stream << std::hex << (uintptr_t)memory_fault.virtual_address; 109 std::string addr("0x" + stream.str()); 110 111 std::string err_string = "[GPU Memory Error] Addr: " + addr; 112 err_string += " Reason: "; 113 if (!(memory_fault.fault_reason_mask & 0x00111111)) { 114 err_string += "No Idea! "; 115 } else { 116 if (memory_fault.fault_reason_mask & 0x00000001) 117 err_string += "Page not present or supervisor privilege. "; 118 if (memory_fault.fault_reason_mask & 0x00000010) 119 err_string += "Write access to a read-only page. "; 120 if (memory_fault.fault_reason_mask & 0x00000100) 121 err_string += "Execute access to a page marked NX. "; 122 if (memory_fault.fault_reason_mask & 0x00001000) 123 err_string += "Host access only. "; 124 if (memory_fault.fault_reason_mask & 0x00010000) 125 err_string += "ECC failure (if supported by HW). "; 126 if (memory_fault.fault_reason_mask & 0x00100000) 127 err_string += "Can't determine the exact fault address. "; 128 } 129 fprintf(stderr, "%s\n", err_string.c_str()); 130 return HSA_STATUS_ERROR; 131 } 132 return HSA_STATUS_SUCCESS; 133 } 134 135 hsa_status_t atl_init_gpu_context() { 136 hsa_status_t err = hsa_amd_register_system_event_handler(callbackEvent, NULL); 137 if (err != HSA_STATUS_SUCCESS) { 138 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 139 "Registering the system for memory faults", get_error_string(err)); 140 return HSA_STATUS_ERROR; 141 } 142 143 return HSA_STATUS_SUCCESS; 144 } 145 146 static bool isImplicit(KernelArgMD::ValueKind value_kind) { 147 switch (value_kind) { 148 case KernelArgMD::ValueKind::HiddenGlobalOffsetX: 149 case KernelArgMD::ValueKind::HiddenGlobalOffsetY: 150 case KernelArgMD::ValueKind::HiddenGlobalOffsetZ: 151 case KernelArgMD::ValueKind::HiddenNone: 152 case KernelArgMD::ValueKind::HiddenPrintfBuffer: 153 case KernelArgMD::ValueKind::HiddenDefaultQueue: 154 case KernelArgMD::ValueKind::HiddenCompletionAction: 155 case KernelArgMD::ValueKind::HiddenMultiGridSyncArg: 156 case KernelArgMD::ValueKind::HiddenHostcallBuffer: 157 return true; 158 default: 159 return false; 160 } 161 } 162 163 static std::pair<unsigned char *, unsigned char *> 164 find_metadata(void *binary, size_t binSize) { 165 std::pair<unsigned char *, unsigned char *> failure = {nullptr, nullptr}; 166 167 Elf *e = elf_memory(static_cast<char *>(binary), binSize); 168 if (elf_kind(e) != ELF_K_ELF) { 169 return failure; 170 } 171 172 size_t numpHdrs; 173 if (elf_getphdrnum(e, &numpHdrs) != 0) { 174 return failure; 175 } 176 177 Elf64_Phdr *pHdrs = elf64_getphdr(e); 178 for (size_t i = 0; i < numpHdrs; ++i) { 179 Elf64_Phdr pHdr = pHdrs[i]; 180 181 // Look for the runtime metadata note 182 if (pHdr.p_type == PT_NOTE && pHdr.p_align >= sizeof(int)) { 183 // Iterate over the notes in this segment 184 address ptr = (address)binary + pHdr.p_offset; 185 address segmentEnd = ptr + pHdr.p_filesz; 186 187 while (ptr < segmentEnd) { 188 Elf_Note *note = reinterpret_cast<Elf_Note *>(ptr); 189 address name = (address)¬e[1]; 190 191 if (note->n_type == 7 || note->n_type == 8) { 192 return failure; 193 } else if (note->n_type == 10 /* NT_AMD_AMDGPU_HSA_METADATA */ && 194 note->n_namesz == sizeof "AMD" && 195 !memcmp(name, "AMD", note->n_namesz)) { 196 // code object v2 uses yaml metadata, no longer supported 197 return failure; 198 } else if (note->n_type == 32 /* NT_AMDGPU_METADATA */ && 199 note->n_namesz == sizeof "AMDGPU" && 200 !memcmp(name, "AMDGPU", note->n_namesz)) { 201 202 // n_descsz = 485 203 // value is padded to 4 byte alignment, may want to move end up to 204 // match 205 size_t offset = sizeof(uint32_t) * 3 /* fields */ 206 + sizeof("AMDGPU") /* name */ 207 + 1 /* padding to 4 byte alignment */; 208 209 // Including the trailing padding means both pointers are 4 bytes 210 // aligned, which may be useful later. 211 unsigned char *metadata_start = (unsigned char *)ptr + offset; 212 unsigned char *metadata_end = 213 metadata_start + core::alignUp(note->n_descsz, 4); 214 return {metadata_start, metadata_end}; 215 } 216 ptr += sizeof(*note) + core::alignUp(note->n_namesz, sizeof(int)) + 217 core::alignUp(note->n_descsz, sizeof(int)); 218 } 219 } 220 } 221 222 return failure; 223 } 224 225 namespace { 226 int map_lookup_array(msgpack::byte_range message, const char *needle, 227 msgpack::byte_range *res, uint64_t *size) { 228 unsigned count = 0; 229 struct s : msgpack::functors_defaults<s> { 230 s(unsigned &count, uint64_t *size) : count(count), size(size) {} 231 unsigned &count; 232 uint64_t *size; 233 const unsigned char *handle_array(uint64_t N, msgpack::byte_range bytes) { 234 count++; 235 *size = N; 236 return bytes.end; 237 } 238 }; 239 240 msgpack::foreach_map(message, 241 [&](msgpack::byte_range key, msgpack::byte_range value) { 242 if (msgpack::message_is_string(key, needle)) { 243 // If the message is an array, record number of 244 // elements in *size 245 msgpack::handle_msgpack<s>(value, {count, size}); 246 // return the whole array 247 *res = value; 248 } 249 }); 250 // Only claim success if exactly one key/array pair matched 251 return count != 1; 252 } 253 254 int map_lookup_string(msgpack::byte_range message, const char *needle, 255 std::string *res) { 256 unsigned count = 0; 257 struct s : public msgpack::functors_defaults<s> { 258 s(unsigned &count, std::string *res) : count(count), res(res) {} 259 unsigned &count; 260 std::string *res; 261 void handle_string(size_t N, const unsigned char *str) { 262 count++; 263 *res = std::string(str, str + N); 264 } 265 }; 266 msgpack::foreach_map(message, 267 [&](msgpack::byte_range key, msgpack::byte_range value) { 268 if (msgpack::message_is_string(key, needle)) { 269 msgpack::handle_msgpack<s>(value, {count, res}); 270 } 271 }); 272 return count != 1; 273 } 274 275 int map_lookup_uint64_t(msgpack::byte_range message, const char *needle, 276 uint64_t *res) { 277 unsigned count = 0; 278 msgpack::foreach_map(message, 279 [&](msgpack::byte_range key, msgpack::byte_range value) { 280 if (msgpack::message_is_string(key, needle)) { 281 msgpack::foronly_unsigned(value, [&](uint64_t x) { 282 count++; 283 *res = x; 284 }); 285 } 286 }); 287 return count != 1; 288 } 289 290 int array_lookup_element(msgpack::byte_range message, uint64_t elt, 291 msgpack::byte_range *res) { 292 int rc = 1; 293 uint64_t i = 0; 294 msgpack::foreach_array(message, [&](msgpack::byte_range value) { 295 if (i == elt) { 296 *res = value; 297 rc = 0; 298 } 299 i++; 300 }); 301 return rc; 302 } 303 304 int populate_kernelArgMD(msgpack::byte_range args_element, 305 KernelArgMD *kernelarg) { 306 using namespace msgpack; 307 int error = 0; 308 foreach_map(args_element, [&](byte_range key, byte_range value) -> void { 309 if (message_is_string(key, ".name")) { 310 foronly_string(value, [&](size_t N, const unsigned char *str) { 311 kernelarg->name_ = std::string(str, str + N); 312 }); 313 } else if (message_is_string(key, ".size")) { 314 foronly_unsigned(value, [&](uint64_t x) { kernelarg->size_ = x; }); 315 } else if (message_is_string(key, ".offset")) { 316 foronly_unsigned(value, [&](uint64_t x) { kernelarg->offset_ = x; }); 317 } else if (message_is_string(key, ".value_kind")) { 318 foronly_string(value, [&](size_t N, const unsigned char *str) { 319 std::string s = std::string(str, str + N); 320 auto itValueKind = ArgValueKind.find(s); 321 if (itValueKind != ArgValueKind.end()) { 322 kernelarg->valueKind_ = itValueKind->second; 323 } 324 }); 325 } 326 }); 327 return error; 328 } 329 } // namespace 330 331 static hsa_status_t get_code_object_custom_metadata( 332 void *binary, size_t binSize, 333 std::map<std::string, atl_kernel_info_t> &KernelInfoTable) { 334 // parse code object with different keys from v2 335 // also, the kernel name is not the same as the symbol name -- so a 336 // symbol->name map is needed 337 338 std::pair<unsigned char *, unsigned char *> metadata = 339 find_metadata(binary, binSize); 340 if (!metadata.first) { 341 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 342 } 343 344 uint64_t kernelsSize = 0; 345 int msgpack_errors = 0; 346 msgpack::byte_range kernel_array; 347 msgpack_errors = 348 map_lookup_array({metadata.first, metadata.second}, "amdhsa.kernels", 349 &kernel_array, &kernelsSize); 350 if (msgpack_errors != 0) { 351 printf("[%s:%d] %s failed\n", __FILE__, __LINE__, 352 "kernels lookup in program metadata"); 353 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 354 } 355 356 for (size_t i = 0; i < kernelsSize; i++) { 357 assert(msgpack_errors == 0); 358 std::string kernelName; 359 std::string symbolName; 360 361 msgpack::byte_range element; 362 msgpack_errors += array_lookup_element(kernel_array, i, &element); 363 if (msgpack_errors != 0) { 364 printf("[%s:%d] %s failed\n", __FILE__, __LINE__, 365 "element lookup in kernel metadata"); 366 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 367 } 368 369 msgpack_errors += map_lookup_string(element, ".name", &kernelName); 370 msgpack_errors += map_lookup_string(element, ".symbol", &symbolName); 371 if (msgpack_errors != 0) { 372 printf("[%s:%d] %s failed\n", __FILE__, __LINE__, 373 "strings lookup in kernel metadata"); 374 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 375 } 376 377 // Make sure that kernelName + ".kd" == symbolName 378 if ((kernelName + ".kd") != symbolName) { 379 printf("[%s:%d] Kernel name mismatching symbol: %s != %s + .kd\n", 380 __FILE__, __LINE__, symbolName.c_str(), kernelName.c_str()); 381 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 382 } 383 384 atl_kernel_info_t info = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0}; 385 386 uint64_t sgpr_count, vgpr_count, sgpr_spill_count, vgpr_spill_count; 387 msgpack_errors += map_lookup_uint64_t(element, ".sgpr_count", &sgpr_count); 388 if (msgpack_errors != 0) { 389 printf("[%s:%d] %s failed\n", __FILE__, __LINE__, 390 "sgpr count metadata lookup in kernel metadata"); 391 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 392 } 393 394 info.sgpr_count = sgpr_count; 395 396 msgpack_errors += map_lookup_uint64_t(element, ".vgpr_count", &vgpr_count); 397 if (msgpack_errors != 0) { 398 printf("[%s:%d] %s failed\n", __FILE__, __LINE__, 399 "vgpr count metadata lookup in kernel metadata"); 400 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 401 } 402 403 info.vgpr_count = vgpr_count; 404 405 msgpack_errors += 406 map_lookup_uint64_t(element, ".sgpr_spill_count", &sgpr_spill_count); 407 if (msgpack_errors != 0) { 408 printf("[%s:%d] %s failed\n", __FILE__, __LINE__, 409 "sgpr spill count metadata lookup in kernel metadata"); 410 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 411 } 412 413 info.sgpr_spill_count = sgpr_spill_count; 414 415 msgpack_errors += 416 map_lookup_uint64_t(element, ".vgpr_spill_count", &vgpr_spill_count); 417 if (msgpack_errors != 0) { 418 printf("[%s:%d] %s failed\n", __FILE__, __LINE__, 419 "vgpr spill count metadata lookup in kernel metadata"); 420 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 421 } 422 423 info.vgpr_spill_count = vgpr_spill_count; 424 425 size_t kernel_explicit_args_size = 0; 426 uint64_t kernel_segment_size; 427 msgpack_errors += map_lookup_uint64_t(element, ".kernarg_segment_size", 428 &kernel_segment_size); 429 if (msgpack_errors != 0) { 430 printf("[%s:%d] %s failed\n", __FILE__, __LINE__, 431 "kernarg segment size metadata lookup in kernel metadata"); 432 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 433 } 434 435 bool hasHiddenArgs = false; 436 if (kernel_segment_size > 0) { 437 uint64_t argsSize; 438 size_t offset = 0; 439 440 msgpack::byte_range args_array; 441 msgpack_errors += 442 map_lookup_array(element, ".args", &args_array, &argsSize); 443 if (msgpack_errors != 0) { 444 printf("[%s:%d] %s failed\n", __FILE__, __LINE__, 445 "kernel args metadata lookup in kernel metadata"); 446 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 447 } 448 449 for (size_t i = 0; i < argsSize; ++i) { 450 KernelArgMD lcArg; 451 452 msgpack::byte_range args_element; 453 msgpack_errors += array_lookup_element(args_array, i, &args_element); 454 if (msgpack_errors != 0) { 455 printf("[%s:%d] %s failed\n", __FILE__, __LINE__, 456 "iterate args map in kernel args metadata"); 457 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 458 } 459 460 msgpack_errors += populate_kernelArgMD(args_element, &lcArg); 461 if (msgpack_errors != 0) { 462 printf("[%s:%d] %s failed\n", __FILE__, __LINE__, 463 "iterate args map in kernel args metadata"); 464 return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; 465 } 466 // v3 has offset field and not align field 467 size_t new_offset = lcArg.offset_; 468 size_t padding = new_offset - offset; 469 offset = new_offset; 470 DP("Arg[%lu] \"%s\" (%u, %u)\n", i, lcArg.name_.c_str(), lcArg.size_, 471 lcArg.offset_); 472 offset += lcArg.size_; 473 474 // check if the arg is a hidden/implicit arg 475 // this logic assumes that all hidden args are 8-byte aligned 476 if (!isImplicit(lcArg.valueKind_)) { 477 info.explicit_argument_count++; 478 kernel_explicit_args_size += lcArg.size_; 479 } else { 480 info.implicit_argument_count++; 481 hasHiddenArgs = true; 482 } 483 kernel_explicit_args_size += padding; 484 } 485 } 486 487 // TODO: Probably don't want this arithmetic 488 info.kernel_segment_size = 489 (hasHiddenArgs ? kernel_explicit_args_size : kernel_segment_size); 490 DP("[%s: kernarg seg size] (%lu --> %u)\n", kernelName.c_str(), 491 kernel_segment_size, info.kernel_segment_size); 492 493 // kernel received, now add it to the kernel info table 494 KernelInfoTable[kernelName] = info; 495 } 496 497 return HSA_STATUS_SUCCESS; 498 } 499 500 static hsa_status_t 501 populate_InfoTables(hsa_executable_symbol_t symbol, 502 std::map<std::string, atl_kernel_info_t> &KernelInfoTable, 503 std::map<std::string, atl_symbol_info_t> &SymbolInfoTable) { 504 hsa_symbol_kind_t type; 505 506 uint32_t name_length; 507 hsa_status_t err; 508 err = hsa_executable_symbol_get_info(symbol, HSA_EXECUTABLE_SYMBOL_INFO_TYPE, 509 &type); 510 if (err != HSA_STATUS_SUCCESS) { 511 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 512 "Symbol info extraction", get_error_string(err)); 513 return err; 514 } 515 DP("Exec Symbol type: %d\n", type); 516 if (type == HSA_SYMBOL_KIND_KERNEL) { 517 err = hsa_executable_symbol_get_info( 518 symbol, HSA_EXECUTABLE_SYMBOL_INFO_NAME_LENGTH, &name_length); 519 if (err != HSA_STATUS_SUCCESS) { 520 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 521 "Symbol info extraction", get_error_string(err)); 522 return err; 523 } 524 char *name = reinterpret_cast<char *>(malloc(name_length + 1)); 525 err = hsa_executable_symbol_get_info(symbol, 526 HSA_EXECUTABLE_SYMBOL_INFO_NAME, name); 527 if (err != HSA_STATUS_SUCCESS) { 528 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 529 "Symbol info extraction", get_error_string(err)); 530 return err; 531 } 532 // remove the suffix .kd from symbol name. 533 name[name_length - 3] = 0; 534 535 atl_kernel_info_t info; 536 std::string kernelName(name); 537 // by now, the kernel info table should already have an entry 538 // because the non-ROCr custom code object parsing is called before 539 // iterating over the code object symbols using ROCr 540 if (KernelInfoTable.find(kernelName) == KernelInfoTable.end()) { 541 DP("amdgpu internal consistency error\n"); 542 return HSA_STATUS_ERROR; 543 } 544 // found, so assign and update 545 info = KernelInfoTable[kernelName]; 546 547 /* Extract dispatch information from the symbol */ 548 err = hsa_executable_symbol_get_info( 549 symbol, HSA_EXECUTABLE_SYMBOL_INFO_KERNEL_OBJECT, 550 &(info.kernel_object)); 551 if (err != HSA_STATUS_SUCCESS) { 552 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 553 "Extracting the symbol from the executable", 554 get_error_string(err)); 555 return err; 556 } 557 err = hsa_executable_symbol_get_info( 558 symbol, HSA_EXECUTABLE_SYMBOL_INFO_KERNEL_GROUP_SEGMENT_SIZE, 559 &(info.group_segment_size)); 560 if (err != HSA_STATUS_SUCCESS) { 561 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 562 "Extracting the group segment size from the executable", 563 get_error_string(err)); 564 return err; 565 } 566 err = hsa_executable_symbol_get_info( 567 symbol, HSA_EXECUTABLE_SYMBOL_INFO_KERNEL_PRIVATE_SEGMENT_SIZE, 568 &(info.private_segment_size)); 569 if (err != HSA_STATUS_SUCCESS) { 570 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 571 "Extracting the private segment from the executable", 572 get_error_string(err)); 573 return err; 574 } 575 576 DP("Kernel %s --> %lx symbol %u group segsize %u pvt segsize %u bytes " 577 "kernarg\n", 578 kernelName.c_str(), info.kernel_object, info.group_segment_size, 579 info.private_segment_size, info.kernel_segment_size); 580 581 // assign it back to the kernel info table 582 KernelInfoTable[kernelName] = info; 583 free(name); 584 } else if (type == HSA_SYMBOL_KIND_VARIABLE) { 585 err = hsa_executable_symbol_get_info( 586 symbol, HSA_EXECUTABLE_SYMBOL_INFO_NAME_LENGTH, &name_length); 587 if (err != HSA_STATUS_SUCCESS) { 588 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 589 "Symbol info extraction", get_error_string(err)); 590 return err; 591 } 592 char *name = reinterpret_cast<char *>(malloc(name_length + 1)); 593 err = hsa_executable_symbol_get_info(symbol, 594 HSA_EXECUTABLE_SYMBOL_INFO_NAME, name); 595 if (err != HSA_STATUS_SUCCESS) { 596 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 597 "Symbol info extraction", get_error_string(err)); 598 return err; 599 } 600 name[name_length] = 0; 601 602 atl_symbol_info_t info; 603 604 err = hsa_executable_symbol_get_info( 605 symbol, HSA_EXECUTABLE_SYMBOL_INFO_VARIABLE_ADDRESS, &(info.addr)); 606 if (err != HSA_STATUS_SUCCESS) { 607 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 608 "Symbol info address extraction", get_error_string(err)); 609 return err; 610 } 611 612 err = hsa_executable_symbol_get_info( 613 symbol, HSA_EXECUTABLE_SYMBOL_INFO_VARIABLE_SIZE, &(info.size)); 614 if (err != HSA_STATUS_SUCCESS) { 615 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 616 "Symbol info size extraction", get_error_string(err)); 617 return err; 618 } 619 620 DP("Symbol %s = %p (%u bytes)\n", name, (void *)info.addr, info.size); 621 SymbolInfoTable[std::string(name)] = info; 622 free(name); 623 } else { 624 DP("Symbol is an indirect function\n"); 625 } 626 return HSA_STATUS_SUCCESS; 627 } 628 629 hsa_status_t RegisterModuleFromMemory( 630 std::map<std::string, atl_kernel_info_t> &KernelInfoTable, 631 std::map<std::string, atl_symbol_info_t> &SymbolInfoTable, 632 void *module_bytes, size_t module_size, hsa_agent_t agent, 633 hsa_status_t (*on_deserialized_data)(void *data, size_t size, 634 void *cb_state), 635 void *cb_state, std::vector<hsa_executable_t> &HSAExecutables) { 636 hsa_status_t err; 637 hsa_executable_t executable = {0}; 638 hsa_profile_t agent_profile; 639 640 err = hsa_agent_get_info(agent, HSA_AGENT_INFO_PROFILE, &agent_profile); 641 if (err != HSA_STATUS_SUCCESS) { 642 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 643 "Query the agent profile", get_error_string(err)); 644 return HSA_STATUS_ERROR; 645 } 646 // FIXME: Assume that every profile is FULL until we understand how to build 647 // GCN with base profile 648 agent_profile = HSA_PROFILE_FULL; 649 /* Create the empty executable. */ 650 err = hsa_executable_create(agent_profile, HSA_EXECUTABLE_STATE_UNFROZEN, "", 651 &executable); 652 if (err != HSA_STATUS_SUCCESS) { 653 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 654 "Create the executable", get_error_string(err)); 655 return HSA_STATUS_ERROR; 656 } 657 658 bool module_load_success = false; 659 do // Existing control flow used continue, preserve that for this patch 660 { 661 { 662 // Some metadata info is not available through ROCr API, so use custom 663 // code object metadata parsing to collect such metadata info 664 665 err = get_code_object_custom_metadata(module_bytes, module_size, 666 KernelInfoTable); 667 if (err != HSA_STATUS_SUCCESS) { 668 DP("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 669 "Getting custom code object metadata", get_error_string(err)); 670 continue; 671 } 672 673 // Deserialize code object. 674 hsa_code_object_t code_object = {0}; 675 err = hsa_code_object_deserialize(module_bytes, module_size, NULL, 676 &code_object); 677 if (err != HSA_STATUS_SUCCESS) { 678 DP("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 679 "Code Object Deserialization", get_error_string(err)); 680 continue; 681 } 682 assert(0 != code_object.handle); 683 684 // Mutating the device image here avoids another allocation & memcpy 685 void *code_object_alloc_data = 686 reinterpret_cast<void *>(code_object.handle); 687 hsa_status_t impl_err = 688 on_deserialized_data(code_object_alloc_data, module_size, cb_state); 689 if (impl_err != HSA_STATUS_SUCCESS) { 690 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 691 "Error in deserialized_data callback", 692 get_error_string(impl_err)); 693 return impl_err; 694 } 695 696 /* Load the code object. */ 697 err = 698 hsa_executable_load_code_object(executable, agent, code_object, NULL); 699 if (err != HSA_STATUS_SUCCESS) { 700 DP("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 701 "Loading the code object", get_error_string(err)); 702 continue; 703 } 704 705 // cannot iterate over symbols until executable is frozen 706 } 707 module_load_success = true; 708 } while (0); 709 DP("Modules loaded successful? %d\n", module_load_success); 710 if (module_load_success) { 711 /* Freeze the executable; it can now be queried for symbols. */ 712 err = hsa_executable_freeze(executable, ""); 713 if (err != HSA_STATUS_SUCCESS) { 714 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 715 "Freeze the executable", get_error_string(err)); 716 return HSA_STATUS_ERROR; 717 } 718 719 err = hsa::executable_iterate_symbols( 720 executable, 721 [&](hsa_executable_t, hsa_executable_symbol_t symbol) -> hsa_status_t { 722 return populate_InfoTables(symbol, KernelInfoTable, SymbolInfoTable); 723 }); 724 if (err != HSA_STATUS_SUCCESS) { 725 printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, 726 "Iterating over symbols for execuatable", get_error_string(err)); 727 return HSA_STATUS_ERROR; 728 } 729 730 // save the executable and destroy during finalize 731 HSAExecutables.push_back(executable); 732 return HSA_STATUS_SUCCESS; 733 } else { 734 return HSA_STATUS_ERROR; 735 } 736 } 737 738 } // namespace core 739