mirror of
https://github.com/NVIDIA/open-gpu-kernel-modules.git
synced 2024-12-11 09:24:15 +01:00
1150 lines
43 KiB
C
1150 lines
43 KiB
C
/*******************************************************************************
|
|
Copyright (c) 2015-2021 NVIDIA Corporation
|
|
|
|
Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
of this software and associated documentation files (the "Software"), to
|
|
deal in the Software without restriction, including without limitation the
|
|
rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
|
|
sell copies of the Software, and to permit persons to whom the Software is
|
|
furnished to do so, subject to the following conditions:
|
|
|
|
The above copyright notice and this permission notice shall be
|
|
included in all copies or substantial portions of the Software.
|
|
|
|
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
|
|
THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
|
FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
|
|
DEALINGS IN THE SOFTWARE.
|
|
|
|
*******************************************************************************/
|
|
|
|
#include "uvm_api.h"
|
|
#include "uvm_global.h"
|
|
#include "uvm_gpu_replayable_faults.h"
|
|
#include "uvm_tools_init.h"
|
|
#include "uvm_lock.h"
|
|
#include "uvm_test.h"
|
|
#include "uvm_va_space.h"
|
|
#include "uvm_va_range.h"
|
|
#include "uvm_va_block.h"
|
|
#include "uvm_tools.h"
|
|
#include "uvm_common.h"
|
|
#include "uvm_linux_ioctl.h"
|
|
#include "uvm_hmm.h"
|
|
#include "uvm_mem.h"
|
|
|
|
#define NVIDIA_UVM_DEVICE_NAME "nvidia-uvm"
|
|
|
|
static dev_t g_uvm_base_dev;
|
|
static struct cdev g_uvm_cdev;
|
|
|
|
// List of fault service contexts for CPU faults
|
|
static LIST_HEAD(g_cpu_service_block_context_list);
|
|
|
|
static uvm_spinlock_t g_cpu_service_block_context_list_lock;
|
|
|
|
NV_STATUS uvm_service_block_context_init(void)
|
|
{
|
|
unsigned num_preallocated_contexts = 4;
|
|
|
|
uvm_spin_lock_init(&g_cpu_service_block_context_list_lock, UVM_LOCK_ORDER_LEAF);
|
|
|
|
// Pre-allocate some fault service contexts for the CPU and add them to the global list
|
|
while (num_preallocated_contexts-- > 0) {
|
|
uvm_service_block_context_t *service_context = uvm_kvmalloc(sizeof(*service_context));
|
|
if (!service_context)
|
|
return NV_ERR_NO_MEMORY;
|
|
|
|
list_add(&service_context->cpu_fault.service_context_list, &g_cpu_service_block_context_list);
|
|
}
|
|
|
|
return NV_OK;
|
|
}
|
|
|
|
void uvm_service_block_context_exit(void)
|
|
{
|
|
uvm_service_block_context_t *service_context, *service_context_tmp;
|
|
|
|
// Free fault service contexts for the CPU and add clear the global list
|
|
list_for_each_entry_safe(service_context, service_context_tmp, &g_cpu_service_block_context_list,
|
|
cpu_fault.service_context_list) {
|
|
uvm_kvfree(service_context);
|
|
}
|
|
INIT_LIST_HEAD(&g_cpu_service_block_context_list);
|
|
}
|
|
|
|
// Get a fault service context from the global list or allocate a new one if there are no
|
|
// available entries
|
|
static uvm_service_block_context_t *uvm_service_block_context_cpu_alloc(void)
|
|
{
|
|
uvm_service_block_context_t *service_context;
|
|
|
|
uvm_spin_lock(&g_cpu_service_block_context_list_lock);
|
|
|
|
service_context = list_first_entry_or_null(&g_cpu_service_block_context_list, uvm_service_block_context_t,
|
|
cpu_fault.service_context_list);
|
|
|
|
if (service_context)
|
|
list_del(&service_context->cpu_fault.service_context_list);
|
|
|
|
uvm_spin_unlock(&g_cpu_service_block_context_list_lock);
|
|
|
|
if (!service_context)
|
|
service_context = uvm_kvmalloc(sizeof(*service_context));
|
|
|
|
return service_context;
|
|
}
|
|
|
|
// Put a fault service context in the global list
|
|
static void uvm_service_block_context_cpu_free(uvm_service_block_context_t *service_context)
|
|
{
|
|
uvm_spin_lock(&g_cpu_service_block_context_list_lock);
|
|
|
|
list_add(&service_context->cpu_fault.service_context_list, &g_cpu_service_block_context_list);
|
|
|
|
uvm_spin_unlock(&g_cpu_service_block_context_list_lock);
|
|
}
|
|
|
|
static int uvm_open(struct inode *inode, struct file *filp)
|
|
{
|
|
NV_STATUS status = uvm_global_get_status();
|
|
|
|
if (status == NV_OK) {
|
|
if (!uvm_down_read_trylock(&g_uvm_global.pm.lock))
|
|
return -EAGAIN;
|
|
|
|
status = uvm_va_space_create(inode, filp);
|
|
|
|
uvm_up_read(&g_uvm_global.pm.lock);
|
|
}
|
|
|
|
return -nv_status_to_errno(status);
|
|
}
|
|
|
|
static int uvm_open_entry(struct inode *inode, struct file *filp)
|
|
{
|
|
UVM_ENTRY_RET(uvm_open(inode, filp));
|
|
}
|
|
|
|
static void uvm_release_deferred(void *data)
|
|
{
|
|
uvm_va_space_t *va_space = data;
|
|
|
|
// Since this function is only scheduled to run when uvm_release() fails
|
|
// to trylock-acquire the pm.lock, the following acquisition attempt
|
|
// is expected to block this thread, and cause it to remain blocked until
|
|
// uvm_resume() releases the lock. As a result, the deferred release
|
|
// kthread queue may stall for long periods of time.
|
|
uvm_down_read(&g_uvm_global.pm.lock);
|
|
|
|
uvm_va_space_destroy(va_space);
|
|
|
|
uvm_up_read(&g_uvm_global.pm.lock);
|
|
}
|
|
|
|
static int uvm_release(struct inode *inode, struct file *filp)
|
|
{
|
|
uvm_va_space_t *va_space = uvm_va_space_get(filp);
|
|
int ret;
|
|
|
|
filp->private_data = NULL;
|
|
filp->f_mapping = NULL;
|
|
|
|
// Because the kernel discards the status code returned from this release
|
|
// callback, early exit in case of a pm.lock acquisition failure is not
|
|
// an option. Instead, the teardown work normally performed synchronously
|
|
// needs to be scheduled to run after uvm_resume() releases the lock.
|
|
if (uvm_down_read_trylock(&g_uvm_global.pm.lock)) {
|
|
uvm_va_space_destroy(va_space);
|
|
uvm_up_read(&g_uvm_global.pm.lock);
|
|
}
|
|
else {
|
|
// Remove references to this inode from the address_space. This isn't
|
|
// strictly necessary, as any CPU mappings of this file have already
|
|
// been destroyed, and va_space->mapping won't be used again. Still,
|
|
// the va_space survives the inode if its destruction is deferred, in
|
|
// which case the references are rendered stale.
|
|
address_space_init_once(&va_space->mapping);
|
|
|
|
nv_kthread_q_item_init(&va_space->deferred_release_q_item, uvm_release_deferred, va_space);
|
|
ret = nv_kthread_q_schedule_q_item(&g_uvm_global.deferred_release_q, &va_space->deferred_release_q_item);
|
|
UVM_ASSERT(ret != 0);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int uvm_release_entry(struct inode *inode, struct file *filp)
|
|
{
|
|
UVM_ENTRY_RET(uvm_release(inode, filp));
|
|
}
|
|
|
|
static void uvm_destroy_vma_managed(struct vm_area_struct *vma, bool make_zombie)
|
|
{
|
|
uvm_va_range_t *va_range, *va_range_next;
|
|
NvU64 size = 0;
|
|
|
|
uvm_assert_rwsem_locked_write(&uvm_va_space_get(vma->vm_file)->lock);
|
|
uvm_for_each_va_range_in_vma_safe(va_range, va_range_next, vma) {
|
|
// On exit_mmap (process teardown), current->mm is cleared so
|
|
// uvm_va_range_vma_current would return NULL.
|
|
UVM_ASSERT(uvm_va_range_vma(va_range) == vma);
|
|
UVM_ASSERT(va_range->node.start >= vma->vm_start);
|
|
UVM_ASSERT(va_range->node.end < vma->vm_end);
|
|
size += uvm_va_range_size(va_range);
|
|
if (make_zombie)
|
|
uvm_va_range_zombify(va_range);
|
|
else
|
|
uvm_va_range_destroy(va_range, NULL);
|
|
}
|
|
|
|
if (vma->vm_private_data) {
|
|
uvm_vma_wrapper_destroy(vma->vm_private_data);
|
|
vma->vm_private_data = NULL;
|
|
}
|
|
UVM_ASSERT(size == vma->vm_end - vma->vm_start);
|
|
}
|
|
|
|
static void uvm_destroy_vma_semaphore_pool(struct vm_area_struct *vma)
|
|
{
|
|
uvm_va_space_t *va_space;
|
|
uvm_va_range_t *va_range;
|
|
|
|
va_space = uvm_va_space_get(vma->vm_file);
|
|
uvm_assert_rwsem_locked(&va_space->lock);
|
|
va_range = uvm_va_range_find(va_space, vma->vm_start);
|
|
UVM_ASSERT(va_range &&
|
|
va_range->node.start == vma->vm_start &&
|
|
va_range->node.end + 1 == vma->vm_end &&
|
|
va_range->type == UVM_VA_RANGE_TYPE_SEMAPHORE_POOL);
|
|
|
|
uvm_mem_unmap_cpu_user(va_range->semaphore_pool.mem);
|
|
}
|
|
|
|
// If a fault handler is not set, paths like handle_pte_fault in older kernels
|
|
// assume the memory is anonymous. That would make debugging this failure harder
|
|
// so we force it to fail instead.
|
|
static vm_fault_t uvm_vm_fault_sigbus(struct vm_area_struct *vma, struct vm_fault *vmf)
|
|
{
|
|
UVM_DBG_PRINT_RL("Fault to address 0x%lx in disabled vma\n", nv_page_fault_va(vmf));
|
|
return VM_FAULT_SIGBUS;
|
|
}
|
|
|
|
static vm_fault_t uvm_vm_fault_sigbus_entry(struct vm_area_struct *vma, struct vm_fault *vmf)
|
|
{
|
|
UVM_ENTRY_RET(uvm_vm_fault_sigbus(vma, vmf));
|
|
}
|
|
|
|
static vm_fault_t uvm_vm_fault_sigbus_wrapper(struct vm_fault *vmf)
|
|
{
|
|
#if defined(NV_VM_OPS_FAULT_REMOVED_VMA_ARG)
|
|
return uvm_vm_fault_sigbus(vmf->vma, vmf);
|
|
#else
|
|
return uvm_vm_fault_sigbus(NULL, vmf);
|
|
#endif
|
|
}
|
|
|
|
static vm_fault_t uvm_vm_fault_sigbus_wrapper_entry(struct vm_fault *vmf)
|
|
{
|
|
UVM_ENTRY_RET(uvm_vm_fault_sigbus_wrapper(vmf));
|
|
}
|
|
|
|
static struct vm_operations_struct uvm_vm_ops_disabled =
|
|
{
|
|
#if defined(NV_VM_OPS_FAULT_REMOVED_VMA_ARG)
|
|
.fault = uvm_vm_fault_sigbus_wrapper_entry
|
|
#else
|
|
.fault = uvm_vm_fault_sigbus_entry
|
|
#endif
|
|
};
|
|
|
|
static void uvm_disable_vma(struct vm_area_struct *vma)
|
|
{
|
|
// In the case of fork, the kernel has already copied the old PTEs over to
|
|
// the child process, so an access in the child might succeed instead of
|
|
// causing a fault. To force a fault we'll unmap it directly here.
|
|
//
|
|
// Note that since the unmap works on file offset, not virtual address, this
|
|
// unmaps both the old and new vmas.
|
|
//
|
|
// In the case of a move (mremap), the kernel will copy the PTEs over later,
|
|
// so it doesn't matter if we unmap here. However, the new vma's open will
|
|
// immediately be followed by a close on the old vma. We call
|
|
// unmap_mapping_range for the close, which also unmaps the new vma because
|
|
// they have the same file offset.
|
|
unmap_mapping_range(vma->vm_file->f_mapping,
|
|
vma->vm_pgoff << PAGE_SHIFT,
|
|
vma->vm_end - vma->vm_start,
|
|
1);
|
|
|
|
vma->vm_ops = &uvm_vm_ops_disabled;
|
|
|
|
if (vma->vm_private_data) {
|
|
uvm_vma_wrapper_destroy(vma->vm_private_data);
|
|
vma->vm_private_data = NULL;
|
|
}
|
|
}
|
|
|
|
// We can't return an error from uvm_vm_open so on failed splits
|
|
// we'll disable *both* vmas. This isn't great behavior for the
|
|
// user, but we don't have many options. We could leave the old VA
|
|
// range in place but that breaks the model of vmas always
|
|
// completely covering VA ranges. We'd have to be very careful
|
|
// handling later splits and closes of both that partially-covered
|
|
// VA range, and of the vmas which might or might not cover it any
|
|
// more.
|
|
//
|
|
// A failure likely means we're in OOM territory, so this should not
|
|
// be common by any means, and the process might die anyway.
|
|
static void uvm_vm_open_failure(struct vm_area_struct *original,
|
|
struct vm_area_struct *new)
|
|
{
|
|
uvm_va_space_t *va_space = uvm_va_space_get(new->vm_file);
|
|
static const bool make_zombie = false;
|
|
|
|
UVM_ASSERT(va_space == uvm_va_space_get(original->vm_file));
|
|
uvm_assert_rwsem_locked_write(&va_space->lock);
|
|
|
|
uvm_destroy_vma_managed(original, make_zombie);
|
|
uvm_disable_vma(original);
|
|
uvm_disable_vma(new);
|
|
}
|
|
|
|
// vm_ops->open cases:
|
|
//
|
|
// 1) Parent vma is dup'd (fork)
|
|
// This is undefined behavior in the UVM Programming Model. For convenience
|
|
// the parent will continue operating properly, but the child is not
|
|
// guaranteed access to the range.
|
|
//
|
|
// 2) Original vma is split (munmap, mprotect, mremap, mbind, etc)
|
|
// The UVM Programming Model supports mbind always and supports mprotect if
|
|
// HMM is present. Supporting either of those means all such splitting cases
|
|
// must be handled. This involves splitting the va_range covering the split
|
|
// location. Note that the kernel will never merge us back on two counts: we
|
|
// set VM_MIXEDMAP and we have a ->close callback.
|
|
//
|
|
// 3) Original vma is moved (mremap)
|
|
// This is undefined behavior in the UVM Programming Model. We'll get an open
|
|
// on the new vma in which we disable operations on the new vma, then a close
|
|
// on the old vma.
|
|
//
|
|
// Note that since we set VM_DONTEXPAND on the vma we're guaranteed that the vma
|
|
// will never increase in size, only shrink/split.
|
|
static void uvm_vm_open_managed(struct vm_area_struct *vma)
|
|
{
|
|
uvm_va_space_t *va_space = uvm_va_space_get(vma->vm_file);
|
|
uvm_va_range_t *va_range;
|
|
struct vm_area_struct *original;
|
|
NV_STATUS status;
|
|
NvU64 new_end;
|
|
|
|
// This is slightly ugly. We need to know the parent vma of this new one,
|
|
// but we can't use the range tree to look up the original because that
|
|
// doesn't handle a vma move operation.
|
|
//
|
|
// However, all of the old vma's fields have been copied into the new vma,
|
|
// and open of the new vma is always called before close of the old (in
|
|
// cases where close will be called immediately afterwards, like move).
|
|
// vma->vm_private_data will thus still point to the original vma that we
|
|
// set in mmap or open.
|
|
//
|
|
// Things to watch out for here:
|
|
// - For splits, the old vma hasn't been adjusted yet so its vm_start and
|
|
// vm_end region will overlap with this vma's start and end.
|
|
//
|
|
// - For splits and moves, the new vma has not yet been inserted into the
|
|
// mm's list so vma->vm_prev and vma->vm_next cannot be used, nor will
|
|
// the new vma show up in find_vma and friends.
|
|
original = ((uvm_vma_wrapper_t*)vma->vm_private_data)->vma;
|
|
vma->vm_private_data = NULL;
|
|
// On fork or move we want to simply disable the new vma
|
|
if (vma->vm_mm != original->vm_mm ||
|
|
(vma->vm_start != original->vm_start && vma->vm_end != original->vm_end)) {
|
|
uvm_disable_vma(vma);
|
|
return;
|
|
}
|
|
|
|
// At this point we are guaranteed that the mmap_lock is held in write
|
|
// mode.
|
|
uvm_record_lock_mmap_lock_write(current->mm);
|
|
|
|
// Split vmas should always fall entirely within the old one, and be on one
|
|
// side.
|
|
UVM_ASSERT(vma->vm_start >= original->vm_start && vma->vm_end <= original->vm_end);
|
|
UVM_ASSERT(vma->vm_start == original->vm_start || vma->vm_end == original->vm_end);
|
|
|
|
// The vma is splitting, so create a new range under this vma if necessary.
|
|
// The kernel handles splits in the middle of the vma by doing two separate
|
|
// splits so we just have to handle one vma splitting in two here.
|
|
if (vma->vm_start == original->vm_start)
|
|
new_end = vma->vm_end - 1; // Left split (new_end is inclusive)
|
|
else
|
|
new_end = vma->vm_start - 1; // Right split (new_end is inclusive)
|
|
|
|
uvm_va_space_down_write(va_space);
|
|
|
|
vma->vm_private_data = uvm_vma_wrapper_alloc(vma);
|
|
if (!vma->vm_private_data) {
|
|
uvm_vm_open_failure(original, vma);
|
|
goto out;
|
|
}
|
|
|
|
// There can be multiple va_ranges under the vma already. Check if one spans
|
|
// the new split boundary. If so, split it.
|
|
va_range = uvm_va_range_find(va_space, new_end);
|
|
UVM_ASSERT(va_range);
|
|
UVM_ASSERT(uvm_va_range_vma_current(va_range) == original);
|
|
if (va_range->node.end != new_end) {
|
|
status = uvm_va_range_split(va_range, new_end, NULL);
|
|
if (status != NV_OK) {
|
|
UVM_DBG_PRINT("Failed to split VA range, destroying both: %s. "
|
|
"original vma [0x%lx, 0x%lx) new vma [0x%lx, 0x%lx)\n",
|
|
nvstatusToString(status),
|
|
original->vm_start, original->vm_end,
|
|
vma->vm_start, vma->vm_end);
|
|
uvm_vm_open_failure(original, vma);
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
// Point va_ranges to the new vma
|
|
uvm_for_each_va_range_in_vma(va_range, vma) {
|
|
UVM_ASSERT(uvm_va_range_vma_current(va_range) == original);
|
|
va_range->managed.vma_wrapper = vma->vm_private_data;
|
|
}
|
|
|
|
out:
|
|
uvm_va_space_up_write(va_space);
|
|
uvm_record_unlock_mmap_lock_write(current->mm);
|
|
}
|
|
|
|
static void uvm_vm_open_managed_entry(struct vm_area_struct *vma)
|
|
{
|
|
UVM_ENTRY_VOID(uvm_vm_open_managed(vma));
|
|
}
|
|
|
|
static void uvm_vm_close_managed(struct vm_area_struct *vma)
|
|
{
|
|
uvm_va_space_t *va_space = uvm_va_space_get(vma->vm_file);
|
|
uvm_gpu_t *gpu;
|
|
bool make_zombie = false;
|
|
|
|
if (current->mm != NULL)
|
|
uvm_record_lock_mmap_lock_write(current->mm);
|
|
|
|
UVM_ASSERT(uvm_va_space_initialized(va_space) == NV_OK);
|
|
|
|
// current->mm will be NULL on process teardown, in which case we have
|
|
// special handling.
|
|
if (current->mm == NULL) {
|
|
make_zombie = (va_space->initialization_flags & UVM_INIT_FLAGS_MULTI_PROCESS_SHARING_MODE);
|
|
if (!make_zombie) {
|
|
// If we're not in multi-process mode, then we want to stop all user
|
|
// channels before unmapping the managed allocations to avoid
|
|
// spurious MMU faults in the system log. If we have a va_space_mm
|
|
// then this must've already happened as part of
|
|
// uvm_va_space_mm_shutdown. Otherwise we need to handle it here.
|
|
if (uvm_va_space_mm_enabled(va_space) && current->mm == va_space->va_space_mm.mm) {
|
|
UVM_ASSERT(atomic_read(&va_space->user_channels_stopped));
|
|
}
|
|
else {
|
|
// Stopping channels involves making RM calls, so we have to do
|
|
// that with the VA space lock in read mode.
|
|
uvm_va_space_down_read_rm(va_space);
|
|
if (!atomic_read(&va_space->user_channels_stopped))
|
|
uvm_va_space_stop_all_user_channels(va_space);
|
|
uvm_va_space_up_read_rm(va_space);
|
|
}
|
|
}
|
|
}
|
|
|
|
// See uvm_mmap for why we need this in addition to mmap_lock
|
|
uvm_va_space_down_write(va_space);
|
|
|
|
uvm_destroy_vma_managed(vma, make_zombie);
|
|
|
|
// Notify GPU address spaces that the fault buffer needs to be flushed to avoid finding stale entries
|
|
// that can be attributed to new VA ranges reallocated at the same address
|
|
for_each_va_space_gpu_in_mask(gpu, va_space, &va_space->registered_gpu_va_spaces) {
|
|
uvm_gpu_va_space_t *gpu_va_space = uvm_gpu_va_space_get(va_space, gpu);
|
|
UVM_ASSERT(gpu_va_space);
|
|
|
|
gpu_va_space->needs_fault_buffer_flush = true;
|
|
}
|
|
uvm_va_space_up_write(va_space);
|
|
|
|
if (current->mm != NULL)
|
|
uvm_record_unlock_mmap_lock_write(current->mm);
|
|
}
|
|
|
|
static void uvm_vm_close_managed_entry(struct vm_area_struct *vma)
|
|
{
|
|
UVM_ENTRY_VOID(uvm_vm_close_managed(vma));
|
|
}
|
|
|
|
static vm_fault_t uvm_vm_fault(struct vm_area_struct *vma, struct vm_fault *vmf)
|
|
{
|
|
uvm_va_space_t *va_space = uvm_va_space_get(vma->vm_file);
|
|
uvm_va_block_t *va_block;
|
|
NvU64 fault_addr = nv_page_fault_va(vmf);
|
|
bool is_write = vmf->flags & FAULT_FLAG_WRITE;
|
|
NV_STATUS status = uvm_global_get_status();
|
|
bool tools_enabled;
|
|
bool major_fault = false;
|
|
uvm_service_block_context_t *service_context;
|
|
uvm_global_processor_mask_t gpus_to_check_for_ecc;
|
|
|
|
if (status != NV_OK)
|
|
goto convert_error;
|
|
|
|
// TODO: Bug 2583279: Lock tracking is disabled for the power management
|
|
// lock in order to suppress reporting of a lock policy violation.
|
|
// The violation consists in acquiring the power management lock multiple
|
|
// times, and it is manifested as an error during release. The
|
|
// re-acquisition of the power management locks happens upon re-entry in the
|
|
// UVM module, and it is benign on itself, but when combined with certain
|
|
// power management scenarios, it is indicative of a potential deadlock.
|
|
// Tracking will be re-enabled once the power management locking strategy is
|
|
// modified to avoid deadlocks.
|
|
if (!uvm_down_read_trylock_no_tracking(&g_uvm_global.pm.lock)) {
|
|
status = NV_ERR_BUSY_RETRY;
|
|
goto convert_error;
|
|
}
|
|
|
|
service_context = uvm_service_block_context_cpu_alloc();
|
|
if (!service_context) {
|
|
status = NV_ERR_NO_MEMORY;
|
|
goto unlock;
|
|
}
|
|
|
|
service_context->cpu_fault.wakeup_time_stamp = 0;
|
|
|
|
// The mmap_lock might be held in write mode, but the mode doesn't matter
|
|
// for the purpose of lock ordering and we don't rely on it being in write
|
|
// anywhere so just record it as read mode in all cases.
|
|
uvm_record_lock_mmap_lock_read(vma->vm_mm);
|
|
|
|
do {
|
|
bool do_sleep = false;
|
|
if (status == NV_WARN_MORE_PROCESSING_REQUIRED) {
|
|
NvU64 now = NV_GETTIME();
|
|
if (now < service_context->cpu_fault.wakeup_time_stamp)
|
|
do_sleep = true;
|
|
|
|
if (do_sleep)
|
|
uvm_tools_record_throttling_start(va_space, fault_addr, UVM_ID_CPU);
|
|
|
|
// Drop the VA space lock while we sleep
|
|
uvm_va_space_up_read(va_space);
|
|
|
|
// usleep_range is preferred because msleep has a 20ms granularity
|
|
// and udelay uses a busy-wait loop. usleep_range uses high-resolution
|
|
// timers and, by adding a range, the Linux scheduler may coalesce
|
|
// our wakeup with others, thus saving some interrupts.
|
|
if (do_sleep) {
|
|
unsigned long nap_us = (service_context->cpu_fault.wakeup_time_stamp - now) / 1000;
|
|
|
|
usleep_range(nap_us, nap_us + nap_us / 2);
|
|
}
|
|
}
|
|
|
|
uvm_va_space_down_read(va_space);
|
|
|
|
if (do_sleep)
|
|
uvm_tools_record_throttling_end(va_space, fault_addr, UVM_ID_CPU);
|
|
|
|
status = uvm_va_block_find_create_managed(va_space, fault_addr, &va_block);
|
|
if (status != NV_OK) {
|
|
UVM_ASSERT_MSG(status == NV_ERR_NO_MEMORY, "status: %s\n", nvstatusToString(status));
|
|
break;
|
|
}
|
|
|
|
// Watch out, current->mm might not be vma->vm_mm
|
|
UVM_ASSERT(vma == uvm_va_range_vma(va_block->va_range));
|
|
|
|
// Loop until thrashing goes away.
|
|
status = uvm_va_block_cpu_fault(va_block, fault_addr, is_write, service_context);
|
|
} while (status == NV_WARN_MORE_PROCESSING_REQUIRED);
|
|
|
|
if (status != NV_OK) {
|
|
UvmEventFatalReason reason;
|
|
|
|
reason = uvm_tools_status_to_fatal_fault_reason(status);
|
|
UVM_ASSERT(reason != UvmEventFatalReasonInvalid);
|
|
|
|
uvm_tools_record_cpu_fatal_fault(va_space, fault_addr, is_write, reason);
|
|
}
|
|
|
|
tools_enabled = va_space->tools.enabled;
|
|
|
|
if (status == NV_OK) {
|
|
uvm_va_space_global_gpus_in_mask(va_space,
|
|
&gpus_to_check_for_ecc,
|
|
&service_context->cpu_fault.gpus_to_check_for_ecc);
|
|
uvm_global_mask_retain(&gpus_to_check_for_ecc);
|
|
}
|
|
|
|
uvm_va_space_up_read(va_space);
|
|
uvm_record_unlock_mmap_lock_read(vma->vm_mm);
|
|
|
|
if (status == NV_OK) {
|
|
status = uvm_global_mask_check_ecc_error(&gpus_to_check_for_ecc);
|
|
uvm_global_mask_release(&gpus_to_check_for_ecc);
|
|
}
|
|
|
|
if (tools_enabled)
|
|
uvm_tools_flush_events();
|
|
|
|
// Major faults involve I/O in order to resolve the fault.
|
|
// If any pages were DMA'ed between the GPU and host memory, that makes it a major fault.
|
|
// A process can also get statistics for major and minor faults by calling readproc().
|
|
major_fault = service_context->cpu_fault.did_migrate;
|
|
uvm_service_block_context_cpu_free(service_context);
|
|
|
|
unlock:
|
|
// TODO: Bug 2583279: See the comment above the matching lock acquisition
|
|
uvm_up_read_no_tracking(&g_uvm_global.pm.lock);
|
|
|
|
convert_error:
|
|
switch (status) {
|
|
case NV_OK:
|
|
case NV_ERR_BUSY_RETRY:
|
|
return VM_FAULT_NOPAGE | (major_fault ? VM_FAULT_MAJOR : 0);
|
|
case NV_ERR_NO_MEMORY:
|
|
return VM_FAULT_OOM;
|
|
default:
|
|
return VM_FAULT_SIGBUS;
|
|
}
|
|
}
|
|
|
|
|
|
static vm_fault_t uvm_vm_fault_entry(struct vm_area_struct *vma, struct vm_fault *vmf)
|
|
{
|
|
UVM_ENTRY_RET(uvm_vm_fault(vma, vmf));
|
|
}
|
|
|
|
static vm_fault_t uvm_vm_fault_wrapper(struct vm_fault *vmf)
|
|
{
|
|
#if defined(NV_VM_OPS_FAULT_REMOVED_VMA_ARG)
|
|
return uvm_vm_fault(vmf->vma, vmf);
|
|
#else
|
|
return uvm_vm_fault(NULL, vmf);
|
|
#endif
|
|
}
|
|
|
|
static vm_fault_t uvm_vm_fault_wrapper_entry(struct vm_fault *vmf)
|
|
{
|
|
UVM_ENTRY_RET(uvm_vm_fault_wrapper(vmf));
|
|
}
|
|
|
|
static struct vm_operations_struct uvm_vm_ops_managed =
|
|
{
|
|
.open = uvm_vm_open_managed_entry,
|
|
.close = uvm_vm_close_managed_entry,
|
|
|
|
#if defined(NV_VM_OPS_FAULT_REMOVED_VMA_ARG)
|
|
.fault = uvm_vm_fault_wrapper_entry,
|
|
.page_mkwrite = uvm_vm_fault_wrapper_entry,
|
|
#else
|
|
.fault = uvm_vm_fault_entry,
|
|
.page_mkwrite = uvm_vm_fault_entry,
|
|
#endif
|
|
};
|
|
|
|
// vm operations on semaphore pool allocations only control CPU mappings. Unmapping GPUs,
|
|
// freeing the allocation, and destroying the va_range are handled by UVM_FREE.
|
|
static void uvm_vm_open_semaphore_pool(struct vm_area_struct *vma)
|
|
{
|
|
struct vm_area_struct *origin_vma = (struct vm_area_struct *)vma->vm_private_data;
|
|
uvm_va_space_t *va_space = uvm_va_space_get(origin_vma->vm_file);
|
|
uvm_va_range_t *va_range;
|
|
bool is_fork = (vma->vm_mm != origin_vma->vm_mm);
|
|
NV_STATUS status;
|
|
|
|
uvm_record_lock_mmap_lock_write(current->mm);
|
|
|
|
uvm_va_space_down_write(va_space);
|
|
|
|
va_range = uvm_va_range_find(va_space, origin_vma->vm_start);
|
|
UVM_ASSERT(va_range);
|
|
UVM_ASSERT_MSG(va_range->type == UVM_VA_RANGE_TYPE_SEMAPHORE_POOL &&
|
|
va_range->node.start == origin_vma->vm_start &&
|
|
va_range->node.end + 1 == origin_vma->vm_end,
|
|
"origin vma [0x%llx, 0x%llx); va_range [0x%llx, 0x%llx) type %d\n",
|
|
(NvU64)origin_vma->vm_start, (NvU64)origin_vma->vm_end, va_range->node.start,
|
|
va_range->node.end + 1, va_range->type);
|
|
|
|
// Semaphore pool vmas do not have vma wrappers, but some functions will
|
|
// assume vm_private_data is a wrapper.
|
|
vma->vm_private_data = NULL;
|
|
|
|
if (is_fork) {
|
|
// If we forked, leave the parent vma alone.
|
|
uvm_disable_vma(vma);
|
|
|
|
// uvm_disable_vma unmaps in the parent as well; clear the uvm_mem CPU
|
|
// user mapping metadata and then remap.
|
|
uvm_mem_unmap_cpu_user(va_range->semaphore_pool.mem);
|
|
|
|
status = uvm_mem_map_cpu_user(va_range->semaphore_pool.mem, va_range->va_space, origin_vma);
|
|
if (status != NV_OK) {
|
|
UVM_DBG_PRINT("Failed to remap semaphore pool to CPU for parent after fork; status = %d (%s)",
|
|
status, nvstatusToString(status));
|
|
origin_vma->vm_ops = &uvm_vm_ops_disabled;
|
|
}
|
|
}
|
|
else {
|
|
origin_vma->vm_private_data = NULL;
|
|
origin_vma->vm_ops = &uvm_vm_ops_disabled;
|
|
vma->vm_ops = &uvm_vm_ops_disabled;
|
|
uvm_mem_unmap_cpu_user(va_range->semaphore_pool.mem);
|
|
}
|
|
|
|
uvm_va_space_up_write(va_space);
|
|
|
|
uvm_record_unlock_mmap_lock_write(current->mm);
|
|
}
|
|
|
|
static void uvm_vm_open_semaphore_pool_entry(struct vm_area_struct *vma)
|
|
{
|
|
UVM_ENTRY_VOID(uvm_vm_open_semaphore_pool(vma));
|
|
}
|
|
|
|
// vm operations on semaphore pool allocations only control CPU mappings. Unmapping GPUs,
|
|
// freeing the allocation, and destroying the va_range are handled by UVM_FREE.
|
|
static void uvm_vm_close_semaphore_pool(struct vm_area_struct *vma)
|
|
{
|
|
uvm_va_space_t *va_space = uvm_va_space_get(vma->vm_file);
|
|
|
|
if (current->mm != NULL)
|
|
uvm_record_lock_mmap_lock_write(current->mm);
|
|
|
|
uvm_va_space_down_read(va_space);
|
|
|
|
uvm_destroy_vma_semaphore_pool(vma);
|
|
|
|
uvm_va_space_up_read(va_space);
|
|
|
|
if (current->mm != NULL)
|
|
uvm_record_unlock_mmap_lock_write(current->mm);
|
|
}
|
|
|
|
static void uvm_vm_close_semaphore_pool_entry(struct vm_area_struct *vma)
|
|
{
|
|
UVM_ENTRY_VOID(uvm_vm_close_semaphore_pool(vma));
|
|
}
|
|
|
|
static struct vm_operations_struct uvm_vm_ops_semaphore_pool =
|
|
{
|
|
.open = uvm_vm_open_semaphore_pool_entry,
|
|
.close = uvm_vm_close_semaphore_pool_entry,
|
|
|
|
#if defined(NV_VM_OPS_FAULT_REMOVED_VMA_ARG)
|
|
.fault = uvm_vm_fault_sigbus_wrapper_entry,
|
|
#else
|
|
.fault = uvm_vm_fault_sigbus_entry,
|
|
#endif
|
|
};
|
|
|
|
static int uvm_mmap(struct file *filp, struct vm_area_struct *vma)
|
|
{
|
|
uvm_va_space_t *va_space = uvm_va_space_get(filp);
|
|
uvm_va_range_t *va_range;
|
|
NV_STATUS status = uvm_global_get_status();
|
|
int ret = 0;
|
|
bool vma_wrapper_allocated = false;
|
|
|
|
if (status != NV_OK)
|
|
return -nv_status_to_errno(status);
|
|
|
|
status = uvm_va_space_initialized(va_space);
|
|
if (status != NV_OK)
|
|
return -EBADFD;
|
|
|
|
// When the VA space is associated with an mm, all vmas under the VA space
|
|
// must come from that mm.
|
|
if (uvm_va_space_mm_enabled(va_space)) {
|
|
UVM_ASSERT(va_space->va_space_mm.mm);
|
|
if (va_space->va_space_mm.mm != current->mm)
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
// UVM mappings are required to set offset == VA. This simplifies things
|
|
// since we don't have to worry about address aliasing (except for fork,
|
|
// handled separately) and it makes unmap_mapping_range simpler.
|
|
if (vma->vm_start != (vma->vm_pgoff << PAGE_SHIFT)) {
|
|
UVM_DBG_PRINT_RL("vm_start 0x%lx != vm_pgoff 0x%lx\n", vma->vm_start, vma->vm_pgoff << PAGE_SHIFT);
|
|
return -EINVAL;
|
|
}
|
|
|
|
// Enforce shared read/writable mappings so we get all fault callbacks
|
|
// without the kernel doing COW behind our backs. The user can still call
|
|
// mprotect to change protections, but that will only hurt user space.
|
|
if ((vma->vm_flags & (VM_SHARED|VM_READ|VM_WRITE)) !=
|
|
(VM_SHARED|VM_READ|VM_WRITE)) {
|
|
UVM_DBG_PRINT_RL("User requested non-shared or non-writable mapping\n");
|
|
return -EINVAL;
|
|
}
|
|
|
|
// If the PM lock cannot be acquired, disable the VMA and report success
|
|
// to the caller. The caller is expected to determine whether the
|
|
// map operation succeeded via an ioctl() call. This is necessary to
|
|
// safely handle MAP_FIXED, which needs to complete atomically to prevent
|
|
// the loss of the virtual address range.
|
|
if (!uvm_down_read_trylock(&g_uvm_global.pm.lock)) {
|
|
uvm_disable_vma(vma);
|
|
return 0;
|
|
}
|
|
|
|
uvm_record_lock_mmap_lock_write(current->mm);
|
|
|
|
// VM_MIXEDMAP Required to use vm_insert_page
|
|
//
|
|
// VM_DONTEXPAND mremap can grow a vma in place without giving us any
|
|
// callback. We need to prevent this so our ranges stay
|
|
// up-to-date with the vma. This flag doesn't prevent
|
|
// mremap from moving the mapping elsewhere, nor from
|
|
// shrinking it. We can detect both of those cases however
|
|
// with vm_ops->open() and vm_ops->close() callbacks.
|
|
//
|
|
// Using VM_DONTCOPY would be nice, but madvise(MADV_DOFORK) can reset that
|
|
// so we have to handle vm_open on fork anyway. We could disable MADV_DOFORK
|
|
// with VM_IO, but that causes other mapping issues.
|
|
vma->vm_flags |= VM_MIXEDMAP | VM_DONTEXPAND;
|
|
|
|
vma->vm_ops = &uvm_vm_ops_managed;
|
|
|
|
// This identity assignment is needed so uvm_vm_open can find its parent vma
|
|
vma->vm_private_data = uvm_vma_wrapper_alloc(vma);
|
|
if (!vma->vm_private_data) {
|
|
ret = -ENOMEM;
|
|
goto out;
|
|
}
|
|
vma_wrapper_allocated = true;
|
|
|
|
// The kernel has taken mmap_lock in write mode, but that doesn't prevent
|
|
// this va_space from being modified by the GPU fault path or from the ioctl
|
|
// path where we don't have this mm for sure, so we have to lock the VA
|
|
// space directly.
|
|
uvm_va_space_down_write(va_space);
|
|
|
|
// uvm_va_range_create_mmap will catch collisions. Below are some example
|
|
// cases which can cause collisions. There may be others.
|
|
// 1) An overlapping range was previously created with an ioctl, for example
|
|
// for an external mapping.
|
|
// 2) This file was passed to another process via a UNIX domain socket
|
|
status = uvm_va_range_create_mmap(va_space, current->mm, vma->vm_private_data, NULL);
|
|
|
|
if (status == NV_ERR_UVM_ADDRESS_IN_USE) {
|
|
// If the mmap is for a semaphore pool, the VA range will have been
|
|
// allocated by a previous ioctl, and the mmap just creates the CPU
|
|
// mapping.
|
|
va_range = uvm_va_range_find(va_space, vma->vm_start);
|
|
if (va_range && va_range->node.start == vma->vm_start &&
|
|
va_range->node.end + 1 == vma->vm_end &&
|
|
va_range->type == UVM_VA_RANGE_TYPE_SEMAPHORE_POOL) {
|
|
uvm_vma_wrapper_destroy(vma->vm_private_data);
|
|
vma_wrapper_allocated = false;
|
|
vma->vm_private_data = vma;
|
|
vma->vm_ops = &uvm_vm_ops_semaphore_pool;
|
|
status = uvm_mem_map_cpu_user(va_range->semaphore_pool.mem, va_range->va_space, vma);
|
|
}
|
|
}
|
|
|
|
if (status != NV_OK) {
|
|
UVM_DBG_PRINT_RL("Failed to create or map VA range for vma [0x%lx, 0x%lx): %s\n",
|
|
vma->vm_start, vma->vm_end, nvstatusToString(status));
|
|
ret = -nv_status_to_errno(status);
|
|
}
|
|
|
|
uvm_va_space_up_write(va_space);
|
|
|
|
out:
|
|
if (ret != 0 && vma_wrapper_allocated)
|
|
uvm_vma_wrapper_destroy(vma->vm_private_data);
|
|
|
|
uvm_record_unlock_mmap_lock_write(current->mm);
|
|
|
|
uvm_up_read(&g_uvm_global.pm.lock);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int uvm_mmap_entry(struct file *filp, struct vm_area_struct *vma)
|
|
{
|
|
UVM_ENTRY_RET(uvm_mmap(filp, vma));
|
|
}
|
|
|
|
static NV_STATUS uvm_api_initialize(UVM_INITIALIZE_PARAMS *params, struct file *filp)
|
|
{
|
|
return uvm_va_space_initialize(uvm_va_space_get(filp), params->flags);
|
|
}
|
|
|
|
static NV_STATUS uvm_api_pageable_mem_access(UVM_PAGEABLE_MEM_ACCESS_PARAMS *params, struct file *filp)
|
|
{
|
|
uvm_va_space_t *va_space = uvm_va_space_get(filp);
|
|
params->pageableMemAccess = uvm_va_space_pageable_mem_access_supported(va_space) ? NV_TRUE : NV_FALSE;
|
|
return NV_OK;
|
|
}
|
|
|
|
static long uvm_ioctl(struct file *filp, unsigned int cmd, unsigned long arg)
|
|
{
|
|
switch (cmd)
|
|
{
|
|
case UVM_DEINITIALIZE:
|
|
return 0;
|
|
|
|
UVM_ROUTE_CMD_STACK_NO_INIT_CHECK(UVM_INITIALIZE, uvm_api_initialize);
|
|
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_PAGEABLE_MEM_ACCESS, uvm_api_pageable_mem_access);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_PAGEABLE_MEM_ACCESS_ON_GPU, uvm_api_pageable_mem_access_on_gpu);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_REGISTER_GPU, uvm_api_register_gpu);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_UNREGISTER_GPU, uvm_api_unregister_gpu);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_CREATE_RANGE_GROUP, uvm_api_create_range_group);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_DESTROY_RANGE_GROUP, uvm_api_destroy_range_group);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_ENABLE_PEER_ACCESS, uvm_api_enable_peer_access);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_DISABLE_PEER_ACCESS, uvm_api_disable_peer_access);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_SET_RANGE_GROUP, uvm_api_set_range_group);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_CREATE_EXTERNAL_RANGE, uvm_api_create_external_range);
|
|
UVM_ROUTE_CMD_ALLOC_INIT_CHECK(UVM_MAP_EXTERNAL_ALLOCATION, uvm_api_map_external_allocation);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_MAP_EXTERNAL_SPARSE, uvm_api_map_external_sparse);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_FREE, uvm_api_free);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_PREVENT_MIGRATION_RANGE_GROUPS, uvm_api_prevent_migration_range_groups);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_ALLOW_MIGRATION_RANGE_GROUPS, uvm_api_allow_migration_range_groups);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_SET_PREFERRED_LOCATION, uvm_api_set_preferred_location);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_UNSET_PREFERRED_LOCATION, uvm_api_unset_preferred_location);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_SET_ACCESSED_BY, uvm_api_set_accessed_by);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_UNSET_ACCESSED_BY, uvm_api_unset_accessed_by);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_REGISTER_GPU_VASPACE, uvm_api_register_gpu_va_space);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_UNREGISTER_GPU_VASPACE, uvm_api_unregister_gpu_va_space);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_REGISTER_CHANNEL, uvm_api_register_channel);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_UNREGISTER_CHANNEL, uvm_api_unregister_channel);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_ENABLE_READ_DUPLICATION, uvm_api_enable_read_duplication);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_DISABLE_READ_DUPLICATION, uvm_api_disable_read_duplication);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_MIGRATE, uvm_api_migrate);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_ENABLE_SYSTEM_WIDE_ATOMICS, uvm_api_enable_system_wide_atomics);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_DISABLE_SYSTEM_WIDE_ATOMICS, uvm_api_disable_system_wide_atomics);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_TOOLS_READ_PROCESS_MEMORY, uvm_api_tools_read_process_memory);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_TOOLS_WRITE_PROCESS_MEMORY, uvm_api_tools_write_process_memory);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_TOOLS_GET_PROCESSOR_UUID_TABLE, uvm_api_tools_get_processor_uuid_table);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_MAP_DYNAMIC_PARALLELISM_REGION, uvm_api_map_dynamic_parallelism_region);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_UNMAP_EXTERNAL, uvm_api_unmap_external);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_MIGRATE_RANGE_GROUP, uvm_api_migrate_range_group);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_TOOLS_FLUSH_EVENTS, uvm_api_tools_flush_events);
|
|
UVM_ROUTE_CMD_ALLOC_INIT_CHECK(UVM_ALLOC_SEMAPHORE_POOL, uvm_api_alloc_semaphore_pool);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_CLEAN_UP_ZOMBIE_RESOURCES, uvm_api_clean_up_zombie_resources);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_POPULATE_PAGEABLE, uvm_api_populate_pageable);
|
|
UVM_ROUTE_CMD_STACK_INIT_CHECK(UVM_VALIDATE_VA_RANGE, uvm_api_validate_va_range);
|
|
}
|
|
|
|
// Try the test ioctls if none of the above matched
|
|
return uvm_test_ioctl(filp, cmd, arg);
|
|
}
|
|
|
|
static long uvm_unlocked_ioctl(struct file *filp, unsigned int cmd, unsigned long arg)
|
|
{
|
|
long ret;
|
|
|
|
if (!uvm_down_read_trylock(&g_uvm_global.pm.lock))
|
|
return -EAGAIN;
|
|
|
|
ret = uvm_ioctl(filp, cmd, arg);
|
|
|
|
uvm_up_read(&g_uvm_global.pm.lock);
|
|
|
|
uvm_thread_assert_all_unlocked();
|
|
|
|
return ret;
|
|
}
|
|
|
|
static long uvm_unlocked_ioctl_entry(struct file *filp, unsigned int cmd, unsigned long arg)
|
|
{
|
|
UVM_ENTRY_RET(uvm_unlocked_ioctl(filp, cmd, arg));
|
|
}
|
|
|
|
static const struct file_operations uvm_fops =
|
|
{
|
|
.open = uvm_open_entry,
|
|
.release = uvm_release_entry,
|
|
.mmap = uvm_mmap_entry,
|
|
.unlocked_ioctl = uvm_unlocked_ioctl_entry,
|
|
#if NVCPU_IS_X86_64
|
|
.compat_ioctl = uvm_unlocked_ioctl_entry,
|
|
#endif
|
|
.owner = THIS_MODULE,
|
|
};
|
|
|
|
bool uvm_file_is_nvidia_uvm(struct file *filp)
|
|
{
|
|
return (filp != NULL) && (filp->f_op == &uvm_fops);
|
|
}
|
|
|
|
NV_STATUS uvm_test_register_unload_state_buffer(UVM_TEST_REGISTER_UNLOAD_STATE_BUFFER_PARAMS *params, struct file *filp)
|
|
{
|
|
long ret;
|
|
int write = 1;
|
|
int force = 0;
|
|
struct page *page;
|
|
NV_STATUS status = NV_OK;
|
|
|
|
if (!IS_ALIGNED(params->unload_state_buf, sizeof(NvU64)))
|
|
return NV_ERR_INVALID_ADDRESS;
|
|
|
|
// Hold mmap_lock to call get_user_pages(), the UVM locking helper functions
|
|
// are not used because unload_state_buf may be a managed memory pointer and
|
|
// therefore a locking assertion from the CPU fault handler could be fired.
|
|
nv_mmap_read_lock(current->mm);
|
|
ret = NV_GET_USER_PAGES(params->unload_state_buf, 1, write, force, &page, NULL);
|
|
nv_mmap_read_unlock(current->mm);
|
|
|
|
if (ret < 0)
|
|
return errno_to_nv_status(ret);
|
|
UVM_ASSERT(ret == 1);
|
|
|
|
uvm_mutex_lock(&g_uvm_global.global_lock);
|
|
|
|
if (g_uvm_global.unload_state.ptr) {
|
|
put_page(page);
|
|
status = NV_ERR_IN_USE;
|
|
goto error;
|
|
}
|
|
|
|
g_uvm_global.unload_state.page = page;
|
|
g_uvm_global.unload_state.ptr = (NvU64 *)((char *)kmap(page) + (params->unload_state_buf & ~PAGE_MASK));
|
|
*g_uvm_global.unload_state.ptr = 0;
|
|
|
|
error:
|
|
uvm_mutex_unlock(&g_uvm_global.global_lock);
|
|
|
|
return status;
|
|
}
|
|
|
|
static void uvm_test_unload_state_exit(void)
|
|
{
|
|
if (g_uvm_global.unload_state.ptr) {
|
|
kunmap(g_uvm_global.unload_state.page);
|
|
put_page(g_uvm_global.unload_state.page);
|
|
}
|
|
}
|
|
|
|
static int uvm_chardev_create(void)
|
|
{
|
|
dev_t uvm_dev;
|
|
|
|
int ret = alloc_chrdev_region(&g_uvm_base_dev,
|
|
0,
|
|
NVIDIA_UVM_NUM_MINOR_DEVICES,
|
|
NVIDIA_UVM_DEVICE_NAME);
|
|
if (ret != 0) {
|
|
UVM_ERR_PRINT("alloc_chrdev_region failed: %d\n", ret);
|
|
return ret;
|
|
}
|
|
uvm_dev = MKDEV(MAJOR(g_uvm_base_dev), NVIDIA_UVM_PRIMARY_MINOR_NUMBER);
|
|
|
|
uvm_init_character_device(&g_uvm_cdev, &uvm_fops);
|
|
ret = cdev_add(&g_uvm_cdev, uvm_dev, 1);
|
|
if (ret != 0) {
|
|
UVM_ERR_PRINT("cdev_add (major %u, minor %u) failed: %d\n", MAJOR(uvm_dev), MINOR(uvm_dev), ret);
|
|
unregister_chrdev_region(g_uvm_base_dev, NVIDIA_UVM_NUM_MINOR_DEVICES);
|
|
return ret;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void uvm_chardev_exit(void)
|
|
{
|
|
cdev_del(&g_uvm_cdev);
|
|
unregister_chrdev_region(g_uvm_base_dev, NVIDIA_UVM_NUM_MINOR_DEVICES);
|
|
}
|
|
|
|
static int uvm_init(void)
|
|
{
|
|
bool initialized_globals = false;
|
|
bool added_device = false;
|
|
int ret;
|
|
|
|
NV_STATUS status = uvm_global_init();
|
|
if (status != NV_OK) {
|
|
UVM_ERR_PRINT("uvm_global_init() failed: %s\n", nvstatusToString(status));
|
|
ret = -ENODEV;
|
|
goto error;
|
|
}
|
|
initialized_globals = true;
|
|
|
|
ret = uvm_chardev_create();
|
|
if (ret != 0) {
|
|
UVM_ERR_PRINT("uvm_chardev_create failed: %d\n", ret);
|
|
goto error;
|
|
}
|
|
added_device = true;
|
|
|
|
ret = uvm_tools_init(g_uvm_base_dev);
|
|
if (ret != 0) {
|
|
UVM_ERR_PRINT("uvm_tools_init() failed: %d\n", ret);
|
|
goto error;
|
|
}
|
|
|
|
pr_info("Loaded the UVM driver, major device number %d.\n", MAJOR(g_uvm_base_dev));
|
|
|
|
if (uvm_enable_builtin_tests)
|
|
pr_info("Built-in UVM tests are enabled. This is a security risk.\n");
|
|
|
|
|
|
// After Open RM is released, both the enclosing "#if" and this comment
|
|
// block should be removed, because the uvm_hmm_is_enabled_system_wide()
|
|
// check is both necessary and sufficient for reporting functionality.
|
|
// Until that time, however, we need to avoid advertisting UVM's ability to
|
|
// enable HMM functionality.
|
|
|
|
if (uvm_hmm_is_enabled_system_wide())
|
|
UVM_INFO_PRINT("HMM (Heterogeneous Memory Management) is enabled in the UVM driver.\n");
|
|
|
|
|
|
return 0;
|
|
|
|
error:
|
|
if (added_device)
|
|
uvm_chardev_exit();
|
|
|
|
if (initialized_globals)
|
|
uvm_global_exit();
|
|
|
|
UVM_ERR_PRINT("uvm init failed: %d\n", ret);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int __init uvm_init_entry(void)
|
|
{
|
|
UVM_ENTRY_RET(uvm_init());
|
|
}
|
|
|
|
static void uvm_exit(void)
|
|
{
|
|
uvm_tools_exit();
|
|
uvm_chardev_exit();
|
|
|
|
uvm_global_exit();
|
|
|
|
uvm_test_unload_state_exit();
|
|
|
|
pr_info("Unloaded the UVM driver.\n");
|
|
}
|
|
|
|
static void __exit uvm_exit_entry(void)
|
|
{
|
|
UVM_ENTRY_VOID(uvm_exit());
|
|
}
|
|
|
|
module_init(uvm_init_entry);
|
|
module_exit(uvm_exit_entry);
|
|
|
|
MODULE_LICENSE("Dual MIT/GPL");
|
|
MODULE_INFO(supported, "external");
|
|
|