| //===--- amdgpu/impl/system.cpp ----------------------------------- C++ -*-===// |
| // |
| // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. |
| // See https://llvm.org/LICENSE.txt for license information. |
| // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception |
| // |
| //===----------------------------------------------------------------------===// |
| #include <libelf.h> |
| |
| #include <cassert> |
| #include <sstream> |
| #include <string> |
| |
| #include "internal.h" |
| #include "rt.h" |
| |
| #include "msgpack.h" |
| |
| namespace hsa { |
| // Wrap HSA iterate API in a shim that allows passing general callables |
| template <typename C> |
| hsa_status_t executable_iterate_symbols(hsa_executable_t executable, C cb) { |
| auto L = [](hsa_executable_t executable, hsa_executable_symbol_t symbol, |
| void *data) -> hsa_status_t { |
| C *unwrapped = static_cast<C *>(data); |
| return (*unwrapped)(executable, symbol); |
| }; |
| return hsa_executable_iterate_symbols(executable, L, |
| static_cast<void *>(&cb)); |
| } |
| } // namespace hsa |
| |
| typedef unsigned char *address; |
| /* |
| * Note descriptors. |
| */ |
| // FreeBSD already declares Elf_Note (indirectly via <libelf.h>) |
| #if !defined(__FreeBSD__) |
| typedef struct { |
| uint32_t n_namesz; /* Length of note's name. */ |
| uint32_t n_descsz; /* Length of note's value. */ |
| uint32_t n_type; /* Type of note. */ |
| // then name |
| // then padding, optional |
| // then desc, at 4 byte alignment (not 8, despite being elf64) |
| } Elf_Note; |
| #endif |
| |
| class KernelArgMD { |
| public: |
| enum class ValueKind { |
| HiddenGlobalOffsetX, |
| HiddenGlobalOffsetY, |
| HiddenGlobalOffsetZ, |
| HiddenNone, |
| HiddenPrintfBuffer, |
| HiddenDefaultQueue, |
| HiddenCompletionAction, |
| HiddenMultiGridSyncArg, |
| HiddenHostcallBuffer, |
| Unknown |
| }; |
| |
| KernelArgMD() |
| : name_(std::string()), size_(0), offset_(0), |
| valueKind_(ValueKind::Unknown) {} |
| |
| // fields |
| std::string name_; |
| uint32_t size_; |
| uint32_t offset_; |
| ValueKind valueKind_; |
| }; |
| |
| static const std::map<std::string, KernelArgMD::ValueKind> ArgValueKind = { |
| // v3 |
| // {"by_value", KernelArgMD::ValueKind::ByValue}, |
| // {"global_buffer", KernelArgMD::ValueKind::GlobalBuffer}, |
| // {"dynamic_shared_pointer", |
| // KernelArgMD::ValueKind::DynamicSharedPointer}, |
| // {"sampler", KernelArgMD::ValueKind::Sampler}, |
| // {"image", KernelArgMD::ValueKind::Image}, |
| // {"pipe", KernelArgMD::ValueKind::Pipe}, |
| // {"queue", KernelArgMD::ValueKind::Queue}, |
| {"hidden_global_offset_x", KernelArgMD::ValueKind::HiddenGlobalOffsetX}, |
| {"hidden_global_offset_y", KernelArgMD::ValueKind::HiddenGlobalOffsetY}, |
| {"hidden_global_offset_z", KernelArgMD::ValueKind::HiddenGlobalOffsetZ}, |
| {"hidden_none", KernelArgMD::ValueKind::HiddenNone}, |
| {"hidden_printf_buffer", KernelArgMD::ValueKind::HiddenPrintfBuffer}, |
| {"hidden_default_queue", KernelArgMD::ValueKind::HiddenDefaultQueue}, |
| {"hidden_completion_action", |
| KernelArgMD::ValueKind::HiddenCompletionAction}, |
| {"hidden_multigrid_sync_arg", |
| KernelArgMD::ValueKind::HiddenMultiGridSyncArg}, |
| {"hidden_hostcall_buffer", KernelArgMD::ValueKind::HiddenHostcallBuffer}, |
| }; |
| |
| namespace core { |
| |
| hsa_status_t callbackEvent(const hsa_amd_event_t *event, void *data) { |
| if (event->event_type == HSA_AMD_GPU_MEMORY_FAULT_EVENT) { |
| hsa_amd_gpu_memory_fault_info_t memory_fault = event->memory_fault; |
| // memory_fault.agent |
| // memory_fault.virtual_address |
| // memory_fault.fault_reason_mask |
| // fprintf("[GPU Error at %p: Reason is ", memory_fault.virtual_address); |
| std::stringstream stream; |
| stream << std::hex << (uintptr_t)memory_fault.virtual_address; |
| std::string addr("0x" + stream.str()); |
| |
| std::string err_string = "[GPU Memory Error] Addr: " + addr; |
| err_string += " Reason: "; |
| if (!(memory_fault.fault_reason_mask & 0x00111111)) { |
| err_string += "No Idea! "; |
| } else { |
| if (memory_fault.fault_reason_mask & 0x00000001) |
| err_string += "Page not present or supervisor privilege. "; |
| if (memory_fault.fault_reason_mask & 0x00000010) |
| err_string += "Write access to a read-only page. "; |
| if (memory_fault.fault_reason_mask & 0x00000100) |
| err_string += "Execute access to a page marked NX. "; |
| if (memory_fault.fault_reason_mask & 0x00001000) |
| err_string += "Host access only. "; |
| if (memory_fault.fault_reason_mask & 0x00010000) |
| err_string += "ECC failure (if supported by HW). "; |
| if (memory_fault.fault_reason_mask & 0x00100000) |
| err_string += "Can't determine the exact fault address. "; |
| } |
| fprintf(stderr, "%s\n", err_string.c_str()); |
| return HSA_STATUS_ERROR; |
| } |
| return HSA_STATUS_SUCCESS; |
| } |
| |
| hsa_status_t atl_init_gpu_context() { |
| hsa_status_t err = hsa_amd_register_system_event_handler(callbackEvent, NULL); |
| if (err != HSA_STATUS_SUCCESS) { |
| printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, |
| "Registering the system for memory faults", get_error_string(err)); |
| return HSA_STATUS_ERROR; |
| } |
| |
| return HSA_STATUS_SUCCESS; |
| } |
| |
| static bool isImplicit(KernelArgMD::ValueKind value_kind) { |
| switch (value_kind) { |
| case KernelArgMD::ValueKind::HiddenGlobalOffsetX: |
| case KernelArgMD::ValueKind::HiddenGlobalOffsetY: |
| case KernelArgMD::ValueKind::HiddenGlobalOffsetZ: |
| case KernelArgMD::ValueKind::HiddenNone: |
| case KernelArgMD::ValueKind::HiddenPrintfBuffer: |
| case KernelArgMD::ValueKind::HiddenDefaultQueue: |
| case KernelArgMD::ValueKind::HiddenCompletionAction: |
| case KernelArgMD::ValueKind::HiddenMultiGridSyncArg: |
| case KernelArgMD::ValueKind::HiddenHostcallBuffer: |
| return true; |
| default: |
| return false; |
| } |
| } |
| |
| static std::pair<unsigned char *, unsigned char *> |
| find_metadata(void *binary, size_t binSize) { |
| std::pair<unsigned char *, unsigned char *> failure = {nullptr, nullptr}; |
| |
| Elf *e = elf_memory(static_cast<char *>(binary), binSize); |
| if (elf_kind(e) != ELF_K_ELF) { |
| return failure; |
| } |
| |
| size_t numpHdrs; |
| if (elf_getphdrnum(e, &numpHdrs) != 0) { |
| return failure; |
| } |
| |
| Elf64_Phdr *pHdrs = elf64_getphdr(e); |
| for (size_t i = 0; i < numpHdrs; ++i) { |
| Elf64_Phdr pHdr = pHdrs[i]; |
| |
| // Look for the runtime metadata note |
| if (pHdr.p_type == PT_NOTE && pHdr.p_align >= sizeof(int)) { |
| // Iterate over the notes in this segment |
| address ptr = (address)binary + pHdr.p_offset; |
| address segmentEnd = ptr + pHdr.p_filesz; |
| |
| while (ptr < segmentEnd) { |
| Elf_Note *note = reinterpret_cast<Elf_Note *>(ptr); |
| address name = (address)¬e[1]; |
| |
| if (note->n_type == 7 || note->n_type == 8) { |
| return failure; |
| } else if (note->n_type == 10 /* NT_AMD_AMDGPU_HSA_METADATA */ && |
| note->n_namesz == sizeof "AMD" && |
| !memcmp(name, "AMD", note->n_namesz)) { |
| // code object v2 uses yaml metadata, no longer supported |
| return failure; |
| } else if (note->n_type == 32 /* NT_AMDGPU_METADATA */ && |
| note->n_namesz == sizeof "AMDGPU" && |
| !memcmp(name, "AMDGPU", note->n_namesz)) { |
| |
| // n_descsz = 485 |
| // value is padded to 4 byte alignment, may want to move end up to |
| // match |
| size_t offset = sizeof(uint32_t) * 3 /* fields */ |
| + sizeof("AMDGPU") /* name */ |
| + 1 /* padding to 4 byte alignment */; |
| |
| // Including the trailing padding means both pointers are 4 bytes |
| // aligned, which may be useful later. |
| unsigned char *metadata_start = (unsigned char *)ptr + offset; |
| unsigned char *metadata_end = |
| metadata_start + core::alignUp(note->n_descsz, 4); |
| return {metadata_start, metadata_end}; |
| } |
| ptr += sizeof(*note) + core::alignUp(note->n_namesz, sizeof(int)) + |
| core::alignUp(note->n_descsz, sizeof(int)); |
| } |
| } |
| } |
| |
| return failure; |
| } |
| |
| namespace { |
| int map_lookup_array(msgpack::byte_range message, const char *needle, |
| msgpack::byte_range *res, uint64_t *size) { |
| unsigned count = 0; |
| struct s : msgpack::functors_defaults<s> { |
| s(unsigned &count, uint64_t *size) : count(count), size(size) {} |
| unsigned &count; |
| uint64_t *size; |
| const unsigned char *handle_array(uint64_t N, msgpack::byte_range bytes) { |
| count++; |
| *size = N; |
| return bytes.end; |
| } |
| }; |
| |
| msgpack::foreach_map(message, |
| [&](msgpack::byte_range key, msgpack::byte_range value) { |
| if (msgpack::message_is_string(key, needle)) { |
| // If the message is an array, record number of |
| // elements in *size |
| msgpack::handle_msgpack<s>(value, {count, size}); |
| // return the whole array |
| *res = value; |
| } |
| }); |
| // Only claim success if exactly one key/array pair matched |
| return count != 1; |
| } |
| |
| int map_lookup_string(msgpack::byte_range message, const char *needle, |
| std::string *res) { |
| unsigned count = 0; |
| struct s : public msgpack::functors_defaults<s> { |
| s(unsigned &count, std::string *res) : count(count), res(res) {} |
| unsigned &count; |
| std::string *res; |
| void handle_string(size_t N, const unsigned char *str) { |
| count++; |
| *res = std::string(str, str + N); |
| } |
| }; |
| msgpack::foreach_map(message, |
| [&](msgpack::byte_range key, msgpack::byte_range value) { |
| if (msgpack::message_is_string(key, needle)) { |
| msgpack::handle_msgpack<s>(value, {count, res}); |
| } |
| }); |
| return count != 1; |
| } |
| |
| int map_lookup_uint64_t(msgpack::byte_range message, const char *needle, |
| uint64_t *res) { |
| unsigned count = 0; |
| msgpack::foreach_map(message, |
| [&](msgpack::byte_range key, msgpack::byte_range value) { |
| if (msgpack::message_is_string(key, needle)) { |
| msgpack::foronly_unsigned(value, [&](uint64_t x) { |
| count++; |
| *res = x; |
| }); |
| } |
| }); |
| return count != 1; |
| } |
| |
| int array_lookup_element(msgpack::byte_range message, uint64_t elt, |
| msgpack::byte_range *res) { |
| int rc = 1; |
| uint64_t i = 0; |
| msgpack::foreach_array(message, [&](msgpack::byte_range value) { |
| if (i == elt) { |
| *res = value; |
| rc = 0; |
| } |
| i++; |
| }); |
| return rc; |
| } |
| |
| int populate_kernelArgMD(msgpack::byte_range args_element, |
| KernelArgMD *kernelarg) { |
| using namespace msgpack; |
| int error = 0; |
| foreach_map(args_element, [&](byte_range key, byte_range value) -> void { |
| if (message_is_string(key, ".name")) { |
| foronly_string(value, [&](size_t N, const unsigned char *str) { |
| kernelarg->name_ = std::string(str, str + N); |
| }); |
| } else if (message_is_string(key, ".size")) { |
| foronly_unsigned(value, [&](uint64_t x) { kernelarg->size_ = x; }); |
| } else if (message_is_string(key, ".offset")) { |
| foronly_unsigned(value, [&](uint64_t x) { kernelarg->offset_ = x; }); |
| } else if (message_is_string(key, ".value_kind")) { |
| foronly_string(value, [&](size_t N, const unsigned char *str) { |
| std::string s = std::string(str, str + N); |
| auto itValueKind = ArgValueKind.find(s); |
| if (itValueKind != ArgValueKind.end()) { |
| kernelarg->valueKind_ = itValueKind->second; |
| } |
| }); |
| } |
| }); |
| return error; |
| } |
| } // namespace |
| |
| static hsa_status_t get_code_object_custom_metadata( |
| void *binary, size_t binSize, |
| std::map<std::string, atl_kernel_info_t> &KernelInfoTable) { |
| // parse code object with different keys from v2 |
| // also, the kernel name is not the same as the symbol name -- so a |
| // symbol->name map is needed |
| |
| std::pair<unsigned char *, unsigned char *> metadata = |
| find_metadata(binary, binSize); |
| if (!metadata.first) { |
| return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; |
| } |
| |
| uint64_t kernelsSize = 0; |
| int msgpack_errors = 0; |
| msgpack::byte_range kernel_array; |
| msgpack_errors = |
| map_lookup_array({metadata.first, metadata.second}, "amdhsa.kernels", |
| &kernel_array, &kernelsSize); |
| if (msgpack_errors != 0) { |
| printf("[%s:%d] %s failed\n", __FILE__, __LINE__, |
| "kernels lookup in program metadata"); |
| return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; |
| } |
| |
| for (size_t i = 0; i < kernelsSize; i++) { |
| assert(msgpack_errors == 0); |
| std::string kernelName; |
| std::string symbolName; |
| |
| msgpack::byte_range element; |
| msgpack_errors += array_lookup_element(kernel_array, i, &element); |
| if (msgpack_errors != 0) { |
| printf("[%s:%d] %s failed\n", __FILE__, __LINE__, |
| "element lookup in kernel metadata"); |
| return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; |
| } |
| |
| msgpack_errors += map_lookup_string(element, ".name", &kernelName); |
| msgpack_errors += map_lookup_string(element, ".symbol", &symbolName); |
| if (msgpack_errors != 0) { |
| printf("[%s:%d] %s failed\n", __FILE__, __LINE__, |
| "strings lookup in kernel metadata"); |
| return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; |
| } |
| |
| // Make sure that kernelName + ".kd" == symbolName |
| if ((kernelName + ".kd") != symbolName) { |
| printf("[%s:%d] Kernel name mismatching symbol: %s != %s + .kd\n", |
| __FILE__, __LINE__, symbolName.c_str(), kernelName.c_str()); |
| return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; |
| } |
| |
| atl_kernel_info_t info = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0}; |
| |
| uint64_t sgpr_count, vgpr_count, sgpr_spill_count, vgpr_spill_count; |
| msgpack_errors += map_lookup_uint64_t(element, ".sgpr_count", &sgpr_count); |
| if (msgpack_errors != 0) { |
| printf("[%s:%d] %s failed\n", __FILE__, __LINE__, |
| "sgpr count metadata lookup in kernel metadata"); |
| return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; |
| } |
| |
| info.sgpr_count = sgpr_count; |
| |
| msgpack_errors += map_lookup_uint64_t(element, ".vgpr_count", &vgpr_count); |
| if (msgpack_errors != 0) { |
| printf("[%s:%d] %s failed\n", __FILE__, __LINE__, |
| "vgpr count metadata lookup in kernel metadata"); |
| return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; |
| } |
| |
| info.vgpr_count = vgpr_count; |
| |
| msgpack_errors += |
| map_lookup_uint64_t(element, ".sgpr_spill_count", &sgpr_spill_count); |
| if (msgpack_errors != 0) { |
| printf("[%s:%d] %s failed\n", __FILE__, __LINE__, |
| "sgpr spill count metadata lookup in kernel metadata"); |
| return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; |
| } |
| |
| info.sgpr_spill_count = sgpr_spill_count; |
| |
| msgpack_errors += |
| map_lookup_uint64_t(element, ".vgpr_spill_count", &vgpr_spill_count); |
| if (msgpack_errors != 0) { |
| printf("[%s:%d] %s failed\n", __FILE__, __LINE__, |
| "vgpr spill count metadata lookup in kernel metadata"); |
| return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; |
| } |
| |
| info.vgpr_spill_count = vgpr_spill_count; |
| |
| size_t kernel_explicit_args_size = 0; |
| uint64_t kernel_segment_size; |
| msgpack_errors += map_lookup_uint64_t(element, ".kernarg_segment_size", |
| &kernel_segment_size); |
| if (msgpack_errors != 0) { |
| printf("[%s:%d] %s failed\n", __FILE__, __LINE__, |
| "kernarg segment size metadata lookup in kernel metadata"); |
| return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; |
| } |
| |
| bool hasHiddenArgs = false; |
| if (kernel_segment_size > 0) { |
| uint64_t argsSize; |
| size_t offset = 0; |
| |
| msgpack::byte_range args_array; |
| msgpack_errors += |
| map_lookup_array(element, ".args", &args_array, &argsSize); |
| if (msgpack_errors != 0) { |
| printf("[%s:%d] %s failed\n", __FILE__, __LINE__, |
| "kernel args metadata lookup in kernel metadata"); |
| return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; |
| } |
| |
| for (size_t i = 0; i < argsSize; ++i) { |
| KernelArgMD lcArg; |
| |
| msgpack::byte_range args_element; |
| msgpack_errors += array_lookup_element(args_array, i, &args_element); |
| if (msgpack_errors != 0) { |
| printf("[%s:%d] %s failed\n", __FILE__, __LINE__, |
| "iterate args map in kernel args metadata"); |
| return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; |
| } |
| |
| msgpack_errors += populate_kernelArgMD(args_element, &lcArg); |
| if (msgpack_errors != 0) { |
| printf("[%s:%d] %s failed\n", __FILE__, __LINE__, |
| "iterate args map in kernel args metadata"); |
| return HSA_STATUS_ERROR_INVALID_CODE_OBJECT; |
| } |
| // v3 has offset field and not align field |
| size_t new_offset = lcArg.offset_; |
| size_t padding = new_offset - offset; |
| offset = new_offset; |
| DP("Arg[%lu] \"%s\" (%u, %u)\n", i, lcArg.name_.c_str(), lcArg.size_, |
| lcArg.offset_); |
| offset += lcArg.size_; |
| |
| // check if the arg is a hidden/implicit arg |
| // this logic assumes that all hidden args are 8-byte aligned |
| if (!isImplicit(lcArg.valueKind_)) { |
| info.explicit_argument_count++; |
| kernel_explicit_args_size += lcArg.size_; |
| } else { |
| info.implicit_argument_count++; |
| hasHiddenArgs = true; |
| } |
| kernel_explicit_args_size += padding; |
| } |
| } |
| |
| // TODO: Probably don't want this arithmetic |
| info.kernel_segment_size = |
| (hasHiddenArgs ? kernel_explicit_args_size : kernel_segment_size); |
| DP("[%s: kernarg seg size] (%lu --> %u)\n", kernelName.c_str(), |
| kernel_segment_size, info.kernel_segment_size); |
| |
| // kernel received, now add it to the kernel info table |
| KernelInfoTable[kernelName] = info; |
| } |
| |
| return HSA_STATUS_SUCCESS; |
| } |
| |
| static hsa_status_t |
| populate_InfoTables(hsa_executable_symbol_t symbol, |
| std::map<std::string, atl_kernel_info_t> &KernelInfoTable, |
| std::map<std::string, atl_symbol_info_t> &SymbolInfoTable) { |
| hsa_symbol_kind_t type; |
| |
| uint32_t name_length; |
| hsa_status_t err; |
| err = hsa_executable_symbol_get_info(symbol, HSA_EXECUTABLE_SYMBOL_INFO_TYPE, |
| &type); |
| if (err != HSA_STATUS_SUCCESS) { |
| printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, |
| "Symbol info extraction", get_error_string(err)); |
| return err; |
| } |
| DP("Exec Symbol type: %d\n", type); |
| if (type == HSA_SYMBOL_KIND_KERNEL) { |
| err = hsa_executable_symbol_get_info( |
| symbol, HSA_EXECUTABLE_SYMBOL_INFO_NAME_LENGTH, &name_length); |
| if (err != HSA_STATUS_SUCCESS) { |
| printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, |
| "Symbol info extraction", get_error_string(err)); |
| return err; |
| } |
| char *name = reinterpret_cast<char *>(malloc(name_length + 1)); |
| err = hsa_executable_symbol_get_info(symbol, |
| HSA_EXECUTABLE_SYMBOL_INFO_NAME, name); |
| if (err != HSA_STATUS_SUCCESS) { |
| printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, |
| "Symbol info extraction", get_error_string(err)); |
| return err; |
| } |
| // remove the suffix .kd from symbol name. |
| name[name_length - 3] = 0; |
| |
| atl_kernel_info_t info; |
| std::string kernelName(name); |
| // by now, the kernel info table should already have an entry |
| // because the non-ROCr custom code object parsing is called before |
| // iterating over the code object symbols using ROCr |
| if (KernelInfoTable.find(kernelName) == KernelInfoTable.end()) { |
| DP("amdgpu internal consistency error\n"); |
| return HSA_STATUS_ERROR; |
| } |
| // found, so assign and update |
| info = KernelInfoTable[kernelName]; |
| |
| /* Extract dispatch information from the symbol */ |
| err = hsa_executable_symbol_get_info( |
| symbol, HSA_EXECUTABLE_SYMBOL_INFO_KERNEL_OBJECT, |
| &(info.kernel_object)); |
| if (err != HSA_STATUS_SUCCESS) { |
| printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, |
| "Extracting the symbol from the executable", |
| get_error_string(err)); |
| return err; |
| } |
| err = hsa_executable_symbol_get_info( |
| symbol, HSA_EXECUTABLE_SYMBOL_INFO_KERNEL_GROUP_SEGMENT_SIZE, |
| &(info.group_segment_size)); |
| if (err != HSA_STATUS_SUCCESS) { |
| printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, |
| "Extracting the group segment size from the executable", |
| get_error_string(err)); |
| return err; |
| } |
| err = hsa_executable_symbol_get_info( |
| symbol, HSA_EXECUTABLE_SYMBOL_INFO_KERNEL_PRIVATE_SEGMENT_SIZE, |
| &(info.private_segment_size)); |
| if (err != HSA_STATUS_SUCCESS) { |
| printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, |
| "Extracting the private segment from the executable", |
| get_error_string(err)); |
| return err; |
| } |
| |
| DP("Kernel %s --> %lx symbol %u group segsize %u pvt segsize %u bytes " |
| "kernarg\n", |
| kernelName.c_str(), info.kernel_object, info.group_segment_size, |
| info.private_segment_size, info.kernel_segment_size); |
| |
| // assign it back to the kernel info table |
| KernelInfoTable[kernelName] = info; |
| free(name); |
| } else if (type == HSA_SYMBOL_KIND_VARIABLE) { |
| err = hsa_executable_symbol_get_info( |
| symbol, HSA_EXECUTABLE_SYMBOL_INFO_NAME_LENGTH, &name_length); |
| if (err != HSA_STATUS_SUCCESS) { |
| printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, |
| "Symbol info extraction", get_error_string(err)); |
| return err; |
| } |
| char *name = reinterpret_cast<char *>(malloc(name_length + 1)); |
| err = hsa_executable_symbol_get_info(symbol, |
| HSA_EXECUTABLE_SYMBOL_INFO_NAME, name); |
| if (err != HSA_STATUS_SUCCESS) { |
| printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, |
| "Symbol info extraction", get_error_string(err)); |
| return err; |
| } |
| name[name_length] = 0; |
| |
| atl_symbol_info_t info; |
| |
| err = hsa_executable_symbol_get_info( |
| symbol, HSA_EXECUTABLE_SYMBOL_INFO_VARIABLE_ADDRESS, &(info.addr)); |
| if (err != HSA_STATUS_SUCCESS) { |
| printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, |
| "Symbol info address extraction", get_error_string(err)); |
| return err; |
| } |
| |
| err = hsa_executable_symbol_get_info( |
| symbol, HSA_EXECUTABLE_SYMBOL_INFO_VARIABLE_SIZE, &(info.size)); |
| if (err != HSA_STATUS_SUCCESS) { |
| printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, |
| "Symbol info size extraction", get_error_string(err)); |
| return err; |
| } |
| |
| DP("Symbol %s = %p (%u bytes)\n", name, (void *)info.addr, info.size); |
| SymbolInfoTable[std::string(name)] = info; |
| free(name); |
| } else { |
| DP("Symbol is an indirect function\n"); |
| } |
| return HSA_STATUS_SUCCESS; |
| } |
| |
| hsa_status_t RegisterModuleFromMemory( |
| std::map<std::string, atl_kernel_info_t> &KernelInfoTable, |
| std::map<std::string, atl_symbol_info_t> &SymbolInfoTable, |
| void *module_bytes, size_t module_size, hsa_agent_t agent, |
| hsa_status_t (*on_deserialized_data)(void *data, size_t size, |
| void *cb_state), |
| void *cb_state, std::vector<hsa_executable_t> &HSAExecutables) { |
| hsa_status_t err; |
| hsa_executable_t executable = {0}; |
| hsa_profile_t agent_profile; |
| |
| err = hsa_agent_get_info(agent, HSA_AGENT_INFO_PROFILE, &agent_profile); |
| if (err != HSA_STATUS_SUCCESS) { |
| printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, |
| "Query the agent profile", get_error_string(err)); |
| return HSA_STATUS_ERROR; |
| } |
| // FIXME: Assume that every profile is FULL until we understand how to build |
| // GCN with base profile |
| agent_profile = HSA_PROFILE_FULL; |
| /* Create the empty executable. */ |
| err = hsa_executable_create(agent_profile, HSA_EXECUTABLE_STATE_UNFROZEN, "", |
| &executable); |
| if (err != HSA_STATUS_SUCCESS) { |
| printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, |
| "Create the executable", get_error_string(err)); |
| return HSA_STATUS_ERROR; |
| } |
| |
| bool module_load_success = false; |
| do // Existing control flow used continue, preserve that for this patch |
| { |
| { |
| // Some metadata info is not available through ROCr API, so use custom |
| // code object metadata parsing to collect such metadata info |
| |
| err = get_code_object_custom_metadata(module_bytes, module_size, |
| KernelInfoTable); |
| if (err != HSA_STATUS_SUCCESS) { |
| DP("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, |
| "Getting custom code object metadata", get_error_string(err)); |
| continue; |
| } |
| |
| // Deserialize code object. |
| hsa_code_object_t code_object = {0}; |
| err = hsa_code_object_deserialize(module_bytes, module_size, NULL, |
| &code_object); |
| if (err != HSA_STATUS_SUCCESS) { |
| DP("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, |
| "Code Object Deserialization", get_error_string(err)); |
| continue; |
| } |
| assert(0 != code_object.handle); |
| |
| // Mutating the device image here avoids another allocation & memcpy |
| void *code_object_alloc_data = |
| reinterpret_cast<void *>(code_object.handle); |
| hsa_status_t impl_err = |
| on_deserialized_data(code_object_alloc_data, module_size, cb_state); |
| if (impl_err != HSA_STATUS_SUCCESS) { |
| printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, |
| "Error in deserialized_data callback", |
| get_error_string(impl_err)); |
| return impl_err; |
| } |
| |
| /* Load the code object. */ |
| err = |
| hsa_executable_load_code_object(executable, agent, code_object, NULL); |
| if (err != HSA_STATUS_SUCCESS) { |
| DP("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, |
| "Loading the code object", get_error_string(err)); |
| continue; |
| } |
| |
| // cannot iterate over symbols until executable is frozen |
| } |
| module_load_success = true; |
| } while (0); |
| DP("Modules loaded successful? %d\n", module_load_success); |
| if (module_load_success) { |
| /* Freeze the executable; it can now be queried for symbols. */ |
| err = hsa_executable_freeze(executable, ""); |
| if (err != HSA_STATUS_SUCCESS) { |
| printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, |
| "Freeze the executable", get_error_string(err)); |
| return HSA_STATUS_ERROR; |
| } |
| |
| err = hsa::executable_iterate_symbols( |
| executable, |
| [&](hsa_executable_t, hsa_executable_symbol_t symbol) -> hsa_status_t { |
| return populate_InfoTables(symbol, KernelInfoTable, SymbolInfoTable); |
| }); |
| if (err != HSA_STATUS_SUCCESS) { |
| printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__, |
| "Iterating over symbols for execuatable", get_error_string(err)); |
| return HSA_STATUS_ERROR; |
| } |
| |
| // save the executable and destroy during finalize |
| HSAExecutables.push_back(executable); |
| return HSA_STATUS_SUCCESS; |
| } else { |
| return HSA_STATUS_ERROR; |
| } |
| } |
| |
| } // namespace core |