Subversion Repositories QNX 8.QNX8 LLVM/Clang compiler suite

Rev

Details | Last modification | View Log | RSS feed

Rev Author Line No. Line
14 pmbaty 1
//===- ExecutorProcessControl.h - Executor process control APIs -*- C++ -*-===//
2
//
3
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4
// See https://llvm.org/LICENSE.txt for license information.
5
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6
//
7
//===----------------------------------------------------------------------===//
8
//
9
// Utilities for interacting with the executor processes.
10
//
11
//===----------------------------------------------------------------------===//
12
 
13
#ifndef LLVM_EXECUTIONENGINE_ORC_EXECUTORPROCESSCONTROL_H
14
#define LLVM_EXECUTIONENGINE_ORC_EXECUTORPROCESSCONTROL_H
15
 
16
#include "llvm/ADT/StringRef.h"
17
#include "llvm/ADT/Triple.h"
18
#include "llvm/ExecutionEngine/JITLink/JITLinkMemoryManager.h"
19
#include "llvm/ExecutionEngine/Orc/Shared/ExecutorAddress.h"
20
#include "llvm/ExecutionEngine/Orc/Shared/TargetProcessControlTypes.h"
21
#include "llvm/ExecutionEngine/Orc/Shared/WrapperFunctionUtils.h"
22
#include "llvm/ExecutionEngine/Orc/SymbolStringPool.h"
23
#include "llvm/ExecutionEngine/Orc/TaskDispatch.h"
24
#include "llvm/Support/DynamicLibrary.h"
25
#include "llvm/Support/MSVCErrorWorkarounds.h"
26
 
27
#include <future>
28
#include <mutex>
29
#include <vector>
30
 
31
namespace llvm {
32
namespace orc {
33
 
34
class ExecutionSession;
35
class SymbolLookupSet;
36
 
37
/// ExecutorProcessControl supports interaction with a JIT target process.
38
class ExecutorProcessControl {
39
  friend class ExecutionSession;
40
public:
41
 
42
  /// A handler or incoming WrapperFunctionResults -- either return values from
43
  /// callWrapper* calls, or incoming JIT-dispatch requests.
44
  ///
45
  /// IncomingWFRHandlers are constructible from
46
  /// unique_function<void(shared::WrapperFunctionResult)>s using the
47
  /// runInPlace function or a RunWithDispatch object.
48
  class IncomingWFRHandler {
49
    friend class ExecutorProcessControl;
50
  public:
51
    IncomingWFRHandler() = default;
52
    explicit operator bool() const { return !!H; }
53
    void operator()(shared::WrapperFunctionResult WFR) { H(std::move(WFR)); }
54
  private:
55
    template <typename FnT> IncomingWFRHandler(FnT &&Fn)
56
      : H(std::forward<FnT>(Fn)) {}
57
 
58
    unique_function<void(shared::WrapperFunctionResult)> H;
59
  };
60
 
61
  /// Constructs an IncomingWFRHandler from a function object that is callable
62
  /// as void(shared::WrapperFunctionResult). The function object will be called
63
  /// directly. This should be used with care as it may block listener threads
64
  /// in remote EPCs. It is only suitable for simple tasks (e.g. setting a
65
  /// future), or for performing some quick analysis before dispatching "real"
66
  /// work as a Task.
67
  class RunInPlace {
68
  public:
69
    template <typename FnT>
70
    IncomingWFRHandler operator()(FnT &&Fn) {
71
      return IncomingWFRHandler(std::forward<FnT>(Fn));
72
    }
73
  };
74
 
75
  /// Constructs an IncomingWFRHandler from a function object by creating a new
76
  /// function object that dispatches the original using a TaskDispatcher,
77
  /// wrapping the original as a GenericNamedTask.
78
  ///
79
  /// This is the default approach for running WFR handlers.
80
  class RunAsTask {
81
  public:
82
    RunAsTask(TaskDispatcher &D) : D(D) {}
83
 
84
    template <typename FnT>
85
    IncomingWFRHandler operator()(FnT &&Fn) {
86
      return IncomingWFRHandler(
87
          [&D = this->D, Fn = std::move(Fn)]
88
          (shared::WrapperFunctionResult WFR) mutable {
89
              D.dispatch(
90
                makeGenericNamedTask(
91
                    [Fn = std::move(Fn), WFR = std::move(WFR)]() mutable {
92
                      Fn(std::move(WFR));
93
                    }, "WFR handler task"));
94
          });
95
    }
96
  private:
97
    TaskDispatcher &D;
98
  };
99
 
100
  /// APIs for manipulating memory in the target process.
101
  class MemoryAccess {
102
  public:
103
    /// Callback function for asynchronous writes.
104
    using WriteResultFn = unique_function<void(Error)>;
105
 
106
    virtual ~MemoryAccess();
107
 
108
    virtual void writeUInt8sAsync(ArrayRef<tpctypes::UInt8Write> Ws,
109
                                  WriteResultFn OnWriteComplete) = 0;
110
 
111
    virtual void writeUInt16sAsync(ArrayRef<tpctypes::UInt16Write> Ws,
112
                                   WriteResultFn OnWriteComplete) = 0;
113
 
114
    virtual void writeUInt32sAsync(ArrayRef<tpctypes::UInt32Write> Ws,
115
                                   WriteResultFn OnWriteComplete) = 0;
116
 
117
    virtual void writeUInt64sAsync(ArrayRef<tpctypes::UInt64Write> Ws,
118
                                   WriteResultFn OnWriteComplete) = 0;
119
 
120
    virtual void writeBuffersAsync(ArrayRef<tpctypes::BufferWrite> Ws,
121
                                   WriteResultFn OnWriteComplete) = 0;
122
 
123
    Error writeUInt8s(ArrayRef<tpctypes::UInt8Write> Ws) {
124
      std::promise<MSVCPError> ResultP;
125
      auto ResultF = ResultP.get_future();
126
      writeUInt8sAsync(Ws,
127
                       [&](Error Err) { ResultP.set_value(std::move(Err)); });
128
      return ResultF.get();
129
    }
130
 
131
    Error writeUInt16s(ArrayRef<tpctypes::UInt16Write> Ws) {
132
      std::promise<MSVCPError> ResultP;
133
      auto ResultF = ResultP.get_future();
134
      writeUInt16sAsync(Ws,
135
                        [&](Error Err) { ResultP.set_value(std::move(Err)); });
136
      return ResultF.get();
137
    }
138
 
139
    Error writeUInt32s(ArrayRef<tpctypes::UInt32Write> Ws) {
140
      std::promise<MSVCPError> ResultP;
141
      auto ResultF = ResultP.get_future();
142
      writeUInt32sAsync(Ws,
143
                        [&](Error Err) { ResultP.set_value(std::move(Err)); });
144
      return ResultF.get();
145
    }
146
 
147
    Error writeUInt64s(ArrayRef<tpctypes::UInt64Write> Ws) {
148
      std::promise<MSVCPError> ResultP;
149
      auto ResultF = ResultP.get_future();
150
      writeUInt64sAsync(Ws,
151
                        [&](Error Err) { ResultP.set_value(std::move(Err)); });
152
      return ResultF.get();
153
    }
154
 
155
    Error writeBuffers(ArrayRef<tpctypes::BufferWrite> Ws) {
156
      std::promise<MSVCPError> ResultP;
157
      auto ResultF = ResultP.get_future();
158
      writeBuffersAsync(Ws,
159
                        [&](Error Err) { ResultP.set_value(std::move(Err)); });
160
      return ResultF.get();
161
    }
162
  };
163
 
164
  /// A pair of a dylib and a set of symbols to be looked up.
165
  struct LookupRequest {
166
    LookupRequest(tpctypes::DylibHandle Handle, const SymbolLookupSet &Symbols)
167
        : Handle(Handle), Symbols(Symbols) {}
168
    tpctypes::DylibHandle Handle;
169
    const SymbolLookupSet &Symbols;
170
  };
171
 
172
  /// Contains the address of the dispatch function and context that the ORC
173
  /// runtime can use to call functions in the JIT.
174
  struct JITDispatchInfo {
175
    ExecutorAddr JITDispatchFunction;
176
    ExecutorAddr JITDispatchContext;
177
  };
178
 
179
  ExecutorProcessControl(std::shared_ptr<SymbolStringPool> SSP,
180
                         std::unique_ptr<TaskDispatcher> D)
181
    : SSP(std::move(SSP)), D(std::move(D)) {}
182
 
183
  virtual ~ExecutorProcessControl();
184
 
185
  /// Return the ExecutionSession associated with this instance.
186
  /// Not callable until the ExecutionSession has been associated.
187
  ExecutionSession &getExecutionSession() {
188
    assert(ES && "No ExecutionSession associated yet");
189
    return *ES;
190
  }
191
 
192
  /// Intern a symbol name in the SymbolStringPool.
193
  SymbolStringPtr intern(StringRef SymName) { return SSP->intern(SymName); }
194
 
195
  /// Return a shared pointer to the SymbolStringPool for this instance.
196
  std::shared_ptr<SymbolStringPool> getSymbolStringPool() const { return SSP; }
197
 
198
  TaskDispatcher &getDispatcher() { return *D; }
199
 
200
  /// Return the Triple for the target process.
201
  const Triple &getTargetTriple() const { return TargetTriple; }
202
 
203
  /// Get the page size for the target process.
204
  unsigned getPageSize() const { return PageSize; }
205
 
206
  /// Get the JIT dispatch function and context address for the executor.
207
  const JITDispatchInfo &getJITDispatchInfo() const { return JDI; }
208
 
209
  /// Return a MemoryAccess object for the target process.
210
  MemoryAccess &getMemoryAccess() const {
211
    assert(MemAccess && "No MemAccess object set.");
212
    return *MemAccess;
213
  }
214
 
215
  /// Return a JITLinkMemoryManager for the target process.
216
  jitlink::JITLinkMemoryManager &getMemMgr() const {
217
    assert(MemMgr && "No MemMgr object set");
218
    return *MemMgr;
219
  }
220
 
221
  /// Returns the bootstrap symbol map.
222
  const StringMap<ExecutorAddr> &getBootstrapSymbolsMap() const {
223
    return BootstrapSymbols;
224
  }
225
 
226
  /// For each (ExecutorAddr&, StringRef) pair, looks up the string in the
227
  /// bootstrap symbols map and writes its address to the ExecutorAddr if
228
  /// found. If any symbol is not found then the function returns an error.
229
  Error getBootstrapSymbols(
230
      ArrayRef<std::pair<ExecutorAddr &, StringRef>> Pairs) const {
231
    for (const auto &KV : Pairs) {
232
      auto I = BootstrapSymbols.find(KV.second);
233
      if (I == BootstrapSymbols.end())
234
        return make_error<StringError>("Symbol \"" + KV.second +
235
                                           "\" not found "
236
                                           "in bootstrap symbols map",
237
                                       inconvertibleErrorCode());
238
 
239
      KV.first = I->second;
240
    }
241
    return Error::success();
242
  }
243
 
244
  /// Load the dynamic library at the given path and return a handle to it.
245
  /// If LibraryPath is null this function will return the global handle for
246
  /// the target process.
247
  virtual Expected<tpctypes::DylibHandle> loadDylib(const char *DylibPath) = 0;
248
 
249
  /// Search for symbols in the target process.
250
  ///
251
  /// The result of the lookup is a 2-dimentional array of target addresses
252
  /// that correspond to the lookup order. If a required symbol is not
253
  /// found then this method will return an error. If a weakly referenced
254
  /// symbol is not found then it be assigned a '0' value.
255
  virtual Expected<std::vector<tpctypes::LookupResult>>
256
  lookupSymbols(ArrayRef<LookupRequest> Request) = 0;
257
 
258
  /// Run function with a main-like signature.
259
  virtual Expected<int32_t> runAsMain(ExecutorAddr MainFnAddr,
260
                                      ArrayRef<std::string> Args) = 0;
261
 
262
  // TODO: move this to ORC runtime.
263
  /// Run function with a int (*)(void) signature.
264
  virtual Expected<int32_t> runAsVoidFunction(ExecutorAddr VoidFnAddr) = 0;
265
 
266
  // TODO: move this to ORC runtime.
267
  /// Run function with a int (*)(int) signature.
268
  virtual Expected<int32_t> runAsIntFunction(ExecutorAddr IntFnAddr,
269
                                             int Arg) = 0;
270
 
271
  /// Run a wrapper function in the executor. The given WFRHandler will be
272
  /// called on the result when it is returned.
273
  ///
274
  /// The wrapper function should be callable as:
275
  ///
276
  /// \code{.cpp}
277
  ///   CWrapperFunctionResult fn(uint8_t *Data, uint64_t Size);
278
  /// \endcode{.cpp}
279
  virtual void callWrapperAsync(ExecutorAddr WrapperFnAddr,
280
                                IncomingWFRHandler OnComplete,
281
                                ArrayRef<char> ArgBuffer) = 0;
282
 
283
  /// Run a wrapper function in the executor using the given Runner to dispatch
284
  /// OnComplete when the result is ready.
285
  template <typename RunPolicyT, typename FnT>
286
  void callWrapperAsync(RunPolicyT &&Runner, ExecutorAddr WrapperFnAddr,
287
                        FnT &&OnComplete, ArrayRef<char> ArgBuffer) {
288
    callWrapperAsync(
289
        WrapperFnAddr, Runner(std::forward<FnT>(OnComplete)), ArgBuffer);
290
  }
291
 
292
  /// Run a wrapper function in the executor. OnComplete will be dispatched
293
  /// as a GenericNamedTask using this instance's TaskDispatch object.
294
  template <typename FnT>
295
  void callWrapperAsync(ExecutorAddr WrapperFnAddr, FnT &&OnComplete,
296
                        ArrayRef<char> ArgBuffer) {
297
    callWrapperAsync(RunAsTask(*D), WrapperFnAddr,
298
                     std::forward<FnT>(OnComplete), ArgBuffer);
299
  }
300
 
301
  /// Run a wrapper function in the executor. The wrapper function should be
302
  /// callable as:
303
  ///
304
  /// \code{.cpp}
305
  ///   CWrapperFunctionResult fn(uint8_t *Data, uint64_t Size);
306
  /// \endcode{.cpp}
307
  shared::WrapperFunctionResult callWrapper(ExecutorAddr WrapperFnAddr,
308
                                            ArrayRef<char> ArgBuffer) {
309
    std::promise<shared::WrapperFunctionResult> RP;
310
    auto RF = RP.get_future();
311
    callWrapperAsync(
312
        RunInPlace(), WrapperFnAddr,
313
        [&](shared::WrapperFunctionResult R) {
314
          RP.set_value(std::move(R));
315
        }, ArgBuffer);
316
    return RF.get();
317
  }
318
 
319
  /// Run a wrapper function using SPS to serialize the arguments and
320
  /// deserialize the results.
321
  template <typename SPSSignature, typename RunPolicyT, typename SendResultT,
322
            typename... ArgTs>
323
  void callSPSWrapperAsync(RunPolicyT &&Runner, ExecutorAddr WrapperFnAddr,
324
                           SendResultT &&SendResult, const ArgTs &...Args) {
325
    shared::WrapperFunction<SPSSignature>::callAsync(
326
        [this, WrapperFnAddr, Runner = std::move(Runner)]
327
        (auto &&SendResult, const char *ArgData, size_t ArgSize) mutable {
328
          this->callWrapperAsync(std::move(Runner), WrapperFnAddr,
329
                                 std::move(SendResult),
330
                                 ArrayRef<char>(ArgData, ArgSize));
331
        },
332
        std::forward<SendResultT>(SendResult), Args...);
333
  }
334
 
335
  /// Run a wrapper function using SPS to serialize the arguments and
336
  /// deserialize the results.
337
  template <typename SPSSignature, typename SendResultT, typename... ArgTs>
338
  void callSPSWrapperAsync(ExecutorAddr WrapperFnAddr, SendResultT &&SendResult,
339
                           const ArgTs &...Args) {
340
    callSPSWrapperAsync<SPSSignature>(RunAsTask(*D), WrapperFnAddr,
341
                                      std::forward<SendResultT>(SendResult),
342
                                      Args...);
343
  }
344
 
345
  /// Run a wrapper function using SPS to serialize the arguments and
346
  /// deserialize the results.
347
  ///
348
  /// If SPSSignature is a non-void function signature then the second argument
349
  /// (the first in the Args list) should be a reference to a return value.
350
  template <typename SPSSignature, typename... WrapperCallArgTs>
351
  Error callSPSWrapper(ExecutorAddr WrapperFnAddr,
352
                       WrapperCallArgTs &&...WrapperCallArgs) {
353
    return shared::WrapperFunction<SPSSignature>::call(
354
        [this, WrapperFnAddr](const char *ArgData, size_t ArgSize) {
355
          return callWrapper(WrapperFnAddr, ArrayRef<char>(ArgData, ArgSize));
356
        },
357
        std::forward<WrapperCallArgTs>(WrapperCallArgs)...);
358
  }
359
 
360
  /// Disconnect from the target process.
361
  ///
362
  /// This should be called after the JIT session is shut down.
363
  virtual Error disconnect() = 0;
364
 
365
protected:
366
 
367
  std::shared_ptr<SymbolStringPool> SSP;
368
  std::unique_ptr<TaskDispatcher> D;
369
  ExecutionSession *ES = nullptr;
370
  Triple TargetTriple;
371
  unsigned PageSize = 0;
372
  JITDispatchInfo JDI;
373
  MemoryAccess *MemAccess = nullptr;
374
  jitlink::JITLinkMemoryManager *MemMgr = nullptr;
375
  StringMap<ExecutorAddr> BootstrapSymbols;
376
};
377
 
378
/// A ExecutorProcessControl instance that asserts if any of its methods are
379
/// used. Suitable for use is unit tests, and by ORC clients who haven't moved
380
/// to ExecutorProcessControl-based APIs yet.
381
class UnsupportedExecutorProcessControl : public ExecutorProcessControl {
382
public:
383
  UnsupportedExecutorProcessControl(
384
      std::shared_ptr<SymbolStringPool> SSP = nullptr,
385
      std::unique_ptr<TaskDispatcher> D = nullptr,
386
      const std::string &TT = "", unsigned PageSize = 0)
387
      : ExecutorProcessControl(SSP ? std::move(SSP)
388
                               : std::make_shared<SymbolStringPool>(),
389
                               D ? std::move(D)
390
                               : std::make_unique<InPlaceTaskDispatcher>()) {
391
    this->TargetTriple = Triple(TT);
392
    this->PageSize = PageSize;
393
  }
394
 
395
  Expected<tpctypes::DylibHandle> loadDylib(const char *DylibPath) override {
396
    llvm_unreachable("Unsupported");
397
  }
398
 
399
  Expected<std::vector<tpctypes::LookupResult>>
400
  lookupSymbols(ArrayRef<LookupRequest> Request) override {
401
    llvm_unreachable("Unsupported");
402
  }
403
 
404
  Expected<int32_t> runAsMain(ExecutorAddr MainFnAddr,
405
                              ArrayRef<std::string> Args) override {
406
    llvm_unreachable("Unsupported");
407
  }
408
 
409
  Expected<int32_t> runAsVoidFunction(ExecutorAddr VoidFnAddr) override {
410
    llvm_unreachable("Unsupported");
411
  }
412
 
413
  Expected<int32_t> runAsIntFunction(ExecutorAddr IntFnAddr, int Arg) override {
414
    llvm_unreachable("Unsupported");
415
  }
416
 
417
  void callWrapperAsync(ExecutorAddr WrapperFnAddr,
418
                        IncomingWFRHandler OnComplete,
419
                        ArrayRef<char> ArgBuffer) override {
420
    llvm_unreachable("Unsupported");
421
  }
422
 
423
  Error disconnect() override { return Error::success(); }
424
};
425
 
426
/// A ExecutorProcessControl implementation targeting the current process.
427
class SelfExecutorProcessControl
428
    : public ExecutorProcessControl,
429
      private ExecutorProcessControl::MemoryAccess {
430
public:
431
  SelfExecutorProcessControl(
432
      std::shared_ptr<SymbolStringPool> SSP, std::unique_ptr<TaskDispatcher> D,
433
      Triple TargetTriple, unsigned PageSize,
434
      std::unique_ptr<jitlink::JITLinkMemoryManager> MemMgr);
435
 
436
  /// Create a SelfExecutorProcessControl with the given symbol string pool and
437
  /// memory manager.
438
  /// If no symbol string pool is given then one will be created.
439
  /// If no memory manager is given a jitlink::InProcessMemoryManager will
440
  /// be created and used by default.
441
  static Expected<std::unique_ptr<SelfExecutorProcessControl>>
442
  Create(std::shared_ptr<SymbolStringPool> SSP = nullptr,
443
         std::unique_ptr<TaskDispatcher> D = nullptr,
444
         std::unique_ptr<jitlink::JITLinkMemoryManager> MemMgr = nullptr);
445
 
446
  Expected<tpctypes::DylibHandle> loadDylib(const char *DylibPath) override;
447
 
448
  Expected<std::vector<tpctypes::LookupResult>>
449
  lookupSymbols(ArrayRef<LookupRequest> Request) override;
450
 
451
  Expected<int32_t> runAsMain(ExecutorAddr MainFnAddr,
452
                              ArrayRef<std::string> Args) override;
453
 
454
  Expected<int32_t> runAsVoidFunction(ExecutorAddr VoidFnAddr) override;
455
 
456
  Expected<int32_t> runAsIntFunction(ExecutorAddr IntFnAddr, int Arg) override;
457
 
458
  void callWrapperAsync(ExecutorAddr WrapperFnAddr,
459
                        IncomingWFRHandler OnComplete,
460
                        ArrayRef<char> ArgBuffer) override;
461
 
462
  Error disconnect() override;
463
 
464
private:
465
  void writeUInt8sAsync(ArrayRef<tpctypes::UInt8Write> Ws,
466
                        WriteResultFn OnWriteComplete) override;
467
 
468
  void writeUInt16sAsync(ArrayRef<tpctypes::UInt16Write> Ws,
469
                         WriteResultFn OnWriteComplete) override;
470
 
471
  void writeUInt32sAsync(ArrayRef<tpctypes::UInt32Write> Ws,
472
                         WriteResultFn OnWriteComplete) override;
473
 
474
  void writeUInt64sAsync(ArrayRef<tpctypes::UInt64Write> Ws,
475
                         WriteResultFn OnWriteComplete) override;
476
 
477
  void writeBuffersAsync(ArrayRef<tpctypes::BufferWrite> Ws,
478
                         WriteResultFn OnWriteComplete) override;
479
 
480
  static shared::CWrapperFunctionResult
481
  jitDispatchViaWrapperFunctionManager(void *Ctx, const void *FnTag,
482
                                       const char *Data, size_t Size);
483
 
484
  std::unique_ptr<jitlink::JITLinkMemoryManager> OwnedMemMgr;
485
  char GlobalManglingPrefix = 0;
486
};
487
 
488
} // end namespace orc
489
} // end namespace llvm
490
 
491
#endif // LLVM_EXECUTIONENGINE_ORC_EXECUTORPROCESSCONTROL_H