Details | Last modification | View Log | RSS feed
Rev | Author | Line No. | Line |
---|---|---|---|
14 | pmbaty | 1 | //===- ExecutorProcessControl.h - Executor process control APIs -*- C++ -*-===// |
2 | // |
||
3 | // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. |
||
4 | // See https://llvm.org/LICENSE.txt for license information. |
||
5 | // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception |
||
6 | // |
||
7 | //===----------------------------------------------------------------------===// |
||
8 | // |
||
9 | // Utilities for interacting with the executor processes. |
||
10 | // |
||
11 | //===----------------------------------------------------------------------===// |
||
12 | |||
13 | #ifndef LLVM_EXECUTIONENGINE_ORC_EXECUTORPROCESSCONTROL_H |
||
14 | #define LLVM_EXECUTIONENGINE_ORC_EXECUTORPROCESSCONTROL_H |
||
15 | |||
16 | #include "llvm/ADT/StringRef.h" |
||
17 | #include "llvm/ADT/Triple.h" |
||
18 | #include "llvm/ExecutionEngine/JITLink/JITLinkMemoryManager.h" |
||
19 | #include "llvm/ExecutionEngine/Orc/Shared/ExecutorAddress.h" |
||
20 | #include "llvm/ExecutionEngine/Orc/Shared/TargetProcessControlTypes.h" |
||
21 | #include "llvm/ExecutionEngine/Orc/Shared/WrapperFunctionUtils.h" |
||
22 | #include "llvm/ExecutionEngine/Orc/SymbolStringPool.h" |
||
23 | #include "llvm/ExecutionEngine/Orc/TaskDispatch.h" |
||
24 | #include "llvm/Support/DynamicLibrary.h" |
||
25 | #include "llvm/Support/MSVCErrorWorkarounds.h" |
||
26 | |||
27 | #include <future> |
||
28 | #include <mutex> |
||
29 | #include <vector> |
||
30 | |||
31 | namespace llvm { |
||
32 | namespace orc { |
||
33 | |||
34 | class ExecutionSession; |
||
35 | class SymbolLookupSet; |
||
36 | |||
37 | /// ExecutorProcessControl supports interaction with a JIT target process. |
||
38 | class ExecutorProcessControl { |
||
39 | friend class ExecutionSession; |
||
40 | public: |
||
41 | |||
42 | /// A handler or incoming WrapperFunctionResults -- either return values from |
||
43 | /// callWrapper* calls, or incoming JIT-dispatch requests. |
||
44 | /// |
||
45 | /// IncomingWFRHandlers are constructible from |
||
46 | /// unique_function<void(shared::WrapperFunctionResult)>s using the |
||
47 | /// runInPlace function or a RunWithDispatch object. |
||
48 | class IncomingWFRHandler { |
||
49 | friend class ExecutorProcessControl; |
||
50 | public: |
||
51 | IncomingWFRHandler() = default; |
||
52 | explicit operator bool() const { return !!H; } |
||
53 | void operator()(shared::WrapperFunctionResult WFR) { H(std::move(WFR)); } |
||
54 | private: |
||
55 | template <typename FnT> IncomingWFRHandler(FnT &&Fn) |
||
56 | : H(std::forward<FnT>(Fn)) {} |
||
57 | |||
58 | unique_function<void(shared::WrapperFunctionResult)> H; |
||
59 | }; |
||
60 | |||
61 | /// Constructs an IncomingWFRHandler from a function object that is callable |
||
62 | /// as void(shared::WrapperFunctionResult). The function object will be called |
||
63 | /// directly. This should be used with care as it may block listener threads |
||
64 | /// in remote EPCs. It is only suitable for simple tasks (e.g. setting a |
||
65 | /// future), or for performing some quick analysis before dispatching "real" |
||
66 | /// work as a Task. |
||
67 | class RunInPlace { |
||
68 | public: |
||
69 | template <typename FnT> |
||
70 | IncomingWFRHandler operator()(FnT &&Fn) { |
||
71 | return IncomingWFRHandler(std::forward<FnT>(Fn)); |
||
72 | } |
||
73 | }; |
||
74 | |||
75 | /// Constructs an IncomingWFRHandler from a function object by creating a new |
||
76 | /// function object that dispatches the original using a TaskDispatcher, |
||
77 | /// wrapping the original as a GenericNamedTask. |
||
78 | /// |
||
79 | /// This is the default approach for running WFR handlers. |
||
80 | class RunAsTask { |
||
81 | public: |
||
82 | RunAsTask(TaskDispatcher &D) : D(D) {} |
||
83 | |||
84 | template <typename FnT> |
||
85 | IncomingWFRHandler operator()(FnT &&Fn) { |
||
86 | return IncomingWFRHandler( |
||
87 | [&D = this->D, Fn = std::move(Fn)] |
||
88 | (shared::WrapperFunctionResult WFR) mutable { |
||
89 | D.dispatch( |
||
90 | makeGenericNamedTask( |
||
91 | [Fn = std::move(Fn), WFR = std::move(WFR)]() mutable { |
||
92 | Fn(std::move(WFR)); |
||
93 | }, "WFR handler task")); |
||
94 | }); |
||
95 | } |
||
96 | private: |
||
97 | TaskDispatcher &D; |
||
98 | }; |
||
99 | |||
100 | /// APIs for manipulating memory in the target process. |
||
101 | class MemoryAccess { |
||
102 | public: |
||
103 | /// Callback function for asynchronous writes. |
||
104 | using WriteResultFn = unique_function<void(Error)>; |
||
105 | |||
106 | virtual ~MemoryAccess(); |
||
107 | |||
108 | virtual void writeUInt8sAsync(ArrayRef<tpctypes::UInt8Write> Ws, |
||
109 | WriteResultFn OnWriteComplete) = 0; |
||
110 | |||
111 | virtual void writeUInt16sAsync(ArrayRef<tpctypes::UInt16Write> Ws, |
||
112 | WriteResultFn OnWriteComplete) = 0; |
||
113 | |||
114 | virtual void writeUInt32sAsync(ArrayRef<tpctypes::UInt32Write> Ws, |
||
115 | WriteResultFn OnWriteComplete) = 0; |
||
116 | |||
117 | virtual void writeUInt64sAsync(ArrayRef<tpctypes::UInt64Write> Ws, |
||
118 | WriteResultFn OnWriteComplete) = 0; |
||
119 | |||
120 | virtual void writeBuffersAsync(ArrayRef<tpctypes::BufferWrite> Ws, |
||
121 | WriteResultFn OnWriteComplete) = 0; |
||
122 | |||
123 | Error writeUInt8s(ArrayRef<tpctypes::UInt8Write> Ws) { |
||
124 | std::promise<MSVCPError> ResultP; |
||
125 | auto ResultF = ResultP.get_future(); |
||
126 | writeUInt8sAsync(Ws, |
||
127 | [&](Error Err) { ResultP.set_value(std::move(Err)); }); |
||
128 | return ResultF.get(); |
||
129 | } |
||
130 | |||
131 | Error writeUInt16s(ArrayRef<tpctypes::UInt16Write> Ws) { |
||
132 | std::promise<MSVCPError> ResultP; |
||
133 | auto ResultF = ResultP.get_future(); |
||
134 | writeUInt16sAsync(Ws, |
||
135 | [&](Error Err) { ResultP.set_value(std::move(Err)); }); |
||
136 | return ResultF.get(); |
||
137 | } |
||
138 | |||
139 | Error writeUInt32s(ArrayRef<tpctypes::UInt32Write> Ws) { |
||
140 | std::promise<MSVCPError> ResultP; |
||
141 | auto ResultF = ResultP.get_future(); |
||
142 | writeUInt32sAsync(Ws, |
||
143 | [&](Error Err) { ResultP.set_value(std::move(Err)); }); |
||
144 | return ResultF.get(); |
||
145 | } |
||
146 | |||
147 | Error writeUInt64s(ArrayRef<tpctypes::UInt64Write> Ws) { |
||
148 | std::promise<MSVCPError> ResultP; |
||
149 | auto ResultF = ResultP.get_future(); |
||
150 | writeUInt64sAsync(Ws, |
||
151 | [&](Error Err) { ResultP.set_value(std::move(Err)); }); |
||
152 | return ResultF.get(); |
||
153 | } |
||
154 | |||
155 | Error writeBuffers(ArrayRef<tpctypes::BufferWrite> Ws) { |
||
156 | std::promise<MSVCPError> ResultP; |
||
157 | auto ResultF = ResultP.get_future(); |
||
158 | writeBuffersAsync(Ws, |
||
159 | [&](Error Err) { ResultP.set_value(std::move(Err)); }); |
||
160 | return ResultF.get(); |
||
161 | } |
||
162 | }; |
||
163 | |||
164 | /// A pair of a dylib and a set of symbols to be looked up. |
||
165 | struct LookupRequest { |
||
166 | LookupRequest(tpctypes::DylibHandle Handle, const SymbolLookupSet &Symbols) |
||
167 | : Handle(Handle), Symbols(Symbols) {} |
||
168 | tpctypes::DylibHandle Handle; |
||
169 | const SymbolLookupSet &Symbols; |
||
170 | }; |
||
171 | |||
172 | /// Contains the address of the dispatch function and context that the ORC |
||
173 | /// runtime can use to call functions in the JIT. |
||
174 | struct JITDispatchInfo { |
||
175 | ExecutorAddr JITDispatchFunction; |
||
176 | ExecutorAddr JITDispatchContext; |
||
177 | }; |
||
178 | |||
179 | ExecutorProcessControl(std::shared_ptr<SymbolStringPool> SSP, |
||
180 | std::unique_ptr<TaskDispatcher> D) |
||
181 | : SSP(std::move(SSP)), D(std::move(D)) {} |
||
182 | |||
183 | virtual ~ExecutorProcessControl(); |
||
184 | |||
185 | /// Return the ExecutionSession associated with this instance. |
||
186 | /// Not callable until the ExecutionSession has been associated. |
||
187 | ExecutionSession &getExecutionSession() { |
||
188 | assert(ES && "No ExecutionSession associated yet"); |
||
189 | return *ES; |
||
190 | } |
||
191 | |||
192 | /// Intern a symbol name in the SymbolStringPool. |
||
193 | SymbolStringPtr intern(StringRef SymName) { return SSP->intern(SymName); } |
||
194 | |||
195 | /// Return a shared pointer to the SymbolStringPool for this instance. |
||
196 | std::shared_ptr<SymbolStringPool> getSymbolStringPool() const { return SSP; } |
||
197 | |||
198 | TaskDispatcher &getDispatcher() { return *D; } |
||
199 | |||
200 | /// Return the Triple for the target process. |
||
201 | const Triple &getTargetTriple() const { return TargetTriple; } |
||
202 | |||
203 | /// Get the page size for the target process. |
||
204 | unsigned getPageSize() const { return PageSize; } |
||
205 | |||
206 | /// Get the JIT dispatch function and context address for the executor. |
||
207 | const JITDispatchInfo &getJITDispatchInfo() const { return JDI; } |
||
208 | |||
209 | /// Return a MemoryAccess object for the target process. |
||
210 | MemoryAccess &getMemoryAccess() const { |
||
211 | assert(MemAccess && "No MemAccess object set."); |
||
212 | return *MemAccess; |
||
213 | } |
||
214 | |||
215 | /// Return a JITLinkMemoryManager for the target process. |
||
216 | jitlink::JITLinkMemoryManager &getMemMgr() const { |
||
217 | assert(MemMgr && "No MemMgr object set"); |
||
218 | return *MemMgr; |
||
219 | } |
||
220 | |||
221 | /// Returns the bootstrap symbol map. |
||
222 | const StringMap<ExecutorAddr> &getBootstrapSymbolsMap() const { |
||
223 | return BootstrapSymbols; |
||
224 | } |
||
225 | |||
226 | /// For each (ExecutorAddr&, StringRef) pair, looks up the string in the |
||
227 | /// bootstrap symbols map and writes its address to the ExecutorAddr if |
||
228 | /// found. If any symbol is not found then the function returns an error. |
||
229 | Error getBootstrapSymbols( |
||
230 | ArrayRef<std::pair<ExecutorAddr &, StringRef>> Pairs) const { |
||
231 | for (const auto &KV : Pairs) { |
||
232 | auto I = BootstrapSymbols.find(KV.second); |
||
233 | if (I == BootstrapSymbols.end()) |
||
234 | return make_error<StringError>("Symbol \"" + KV.second + |
||
235 | "\" not found " |
||
236 | "in bootstrap symbols map", |
||
237 | inconvertibleErrorCode()); |
||
238 | |||
239 | KV.first = I->second; |
||
240 | } |
||
241 | return Error::success(); |
||
242 | } |
||
243 | |||
244 | /// Load the dynamic library at the given path and return a handle to it. |
||
245 | /// If LibraryPath is null this function will return the global handle for |
||
246 | /// the target process. |
||
247 | virtual Expected<tpctypes::DylibHandle> loadDylib(const char *DylibPath) = 0; |
||
248 | |||
249 | /// Search for symbols in the target process. |
||
250 | /// |
||
251 | /// The result of the lookup is a 2-dimentional array of target addresses |
||
252 | /// that correspond to the lookup order. If a required symbol is not |
||
253 | /// found then this method will return an error. If a weakly referenced |
||
254 | /// symbol is not found then it be assigned a '0' value. |
||
255 | virtual Expected<std::vector<tpctypes::LookupResult>> |
||
256 | lookupSymbols(ArrayRef<LookupRequest> Request) = 0; |
||
257 | |||
258 | /// Run function with a main-like signature. |
||
259 | virtual Expected<int32_t> runAsMain(ExecutorAddr MainFnAddr, |
||
260 | ArrayRef<std::string> Args) = 0; |
||
261 | |||
262 | // TODO: move this to ORC runtime. |
||
263 | /// Run function with a int (*)(void) signature. |
||
264 | virtual Expected<int32_t> runAsVoidFunction(ExecutorAddr VoidFnAddr) = 0; |
||
265 | |||
266 | // TODO: move this to ORC runtime. |
||
267 | /// Run function with a int (*)(int) signature. |
||
268 | virtual Expected<int32_t> runAsIntFunction(ExecutorAddr IntFnAddr, |
||
269 | int Arg) = 0; |
||
270 | |||
271 | /// Run a wrapper function in the executor. The given WFRHandler will be |
||
272 | /// called on the result when it is returned. |
||
273 | /// |
||
274 | /// The wrapper function should be callable as: |
||
275 | /// |
||
276 | /// \code{.cpp} |
||
277 | /// CWrapperFunctionResult fn(uint8_t *Data, uint64_t Size); |
||
278 | /// \endcode{.cpp} |
||
279 | virtual void callWrapperAsync(ExecutorAddr WrapperFnAddr, |
||
280 | IncomingWFRHandler OnComplete, |
||
281 | ArrayRef<char> ArgBuffer) = 0; |
||
282 | |||
283 | /// Run a wrapper function in the executor using the given Runner to dispatch |
||
284 | /// OnComplete when the result is ready. |
||
285 | template <typename RunPolicyT, typename FnT> |
||
286 | void callWrapperAsync(RunPolicyT &&Runner, ExecutorAddr WrapperFnAddr, |
||
287 | FnT &&OnComplete, ArrayRef<char> ArgBuffer) { |
||
288 | callWrapperAsync( |
||
289 | WrapperFnAddr, Runner(std::forward<FnT>(OnComplete)), ArgBuffer); |
||
290 | } |
||
291 | |||
292 | /// Run a wrapper function in the executor. OnComplete will be dispatched |
||
293 | /// as a GenericNamedTask using this instance's TaskDispatch object. |
||
294 | template <typename FnT> |
||
295 | void callWrapperAsync(ExecutorAddr WrapperFnAddr, FnT &&OnComplete, |
||
296 | ArrayRef<char> ArgBuffer) { |
||
297 | callWrapperAsync(RunAsTask(*D), WrapperFnAddr, |
||
298 | std::forward<FnT>(OnComplete), ArgBuffer); |
||
299 | } |
||
300 | |||
301 | /// Run a wrapper function in the executor. The wrapper function should be |
||
302 | /// callable as: |
||
303 | /// |
||
304 | /// \code{.cpp} |
||
305 | /// CWrapperFunctionResult fn(uint8_t *Data, uint64_t Size); |
||
306 | /// \endcode{.cpp} |
||
307 | shared::WrapperFunctionResult callWrapper(ExecutorAddr WrapperFnAddr, |
||
308 | ArrayRef<char> ArgBuffer) { |
||
309 | std::promise<shared::WrapperFunctionResult> RP; |
||
310 | auto RF = RP.get_future(); |
||
311 | callWrapperAsync( |
||
312 | RunInPlace(), WrapperFnAddr, |
||
313 | [&](shared::WrapperFunctionResult R) { |
||
314 | RP.set_value(std::move(R)); |
||
315 | }, ArgBuffer); |
||
316 | return RF.get(); |
||
317 | } |
||
318 | |||
319 | /// Run a wrapper function using SPS to serialize the arguments and |
||
320 | /// deserialize the results. |
||
321 | template <typename SPSSignature, typename RunPolicyT, typename SendResultT, |
||
322 | typename... ArgTs> |
||
323 | void callSPSWrapperAsync(RunPolicyT &&Runner, ExecutorAddr WrapperFnAddr, |
||
324 | SendResultT &&SendResult, const ArgTs &...Args) { |
||
325 | shared::WrapperFunction<SPSSignature>::callAsync( |
||
326 | [this, WrapperFnAddr, Runner = std::move(Runner)] |
||
327 | (auto &&SendResult, const char *ArgData, size_t ArgSize) mutable { |
||
328 | this->callWrapperAsync(std::move(Runner), WrapperFnAddr, |
||
329 | std::move(SendResult), |
||
330 | ArrayRef<char>(ArgData, ArgSize)); |
||
331 | }, |
||
332 | std::forward<SendResultT>(SendResult), Args...); |
||
333 | } |
||
334 | |||
335 | /// Run a wrapper function using SPS to serialize the arguments and |
||
336 | /// deserialize the results. |
||
337 | template <typename SPSSignature, typename SendResultT, typename... ArgTs> |
||
338 | void callSPSWrapperAsync(ExecutorAddr WrapperFnAddr, SendResultT &&SendResult, |
||
339 | const ArgTs &...Args) { |
||
340 | callSPSWrapperAsync<SPSSignature>(RunAsTask(*D), WrapperFnAddr, |
||
341 | std::forward<SendResultT>(SendResult), |
||
342 | Args...); |
||
343 | } |
||
344 | |||
345 | /// Run a wrapper function using SPS to serialize the arguments and |
||
346 | /// deserialize the results. |
||
347 | /// |
||
348 | /// If SPSSignature is a non-void function signature then the second argument |
||
349 | /// (the first in the Args list) should be a reference to a return value. |
||
350 | template <typename SPSSignature, typename... WrapperCallArgTs> |
||
351 | Error callSPSWrapper(ExecutorAddr WrapperFnAddr, |
||
352 | WrapperCallArgTs &&...WrapperCallArgs) { |
||
353 | return shared::WrapperFunction<SPSSignature>::call( |
||
354 | [this, WrapperFnAddr](const char *ArgData, size_t ArgSize) { |
||
355 | return callWrapper(WrapperFnAddr, ArrayRef<char>(ArgData, ArgSize)); |
||
356 | }, |
||
357 | std::forward<WrapperCallArgTs>(WrapperCallArgs)...); |
||
358 | } |
||
359 | |||
360 | /// Disconnect from the target process. |
||
361 | /// |
||
362 | /// This should be called after the JIT session is shut down. |
||
363 | virtual Error disconnect() = 0; |
||
364 | |||
365 | protected: |
||
366 | |||
367 | std::shared_ptr<SymbolStringPool> SSP; |
||
368 | std::unique_ptr<TaskDispatcher> D; |
||
369 | ExecutionSession *ES = nullptr; |
||
370 | Triple TargetTriple; |
||
371 | unsigned PageSize = 0; |
||
372 | JITDispatchInfo JDI; |
||
373 | MemoryAccess *MemAccess = nullptr; |
||
374 | jitlink::JITLinkMemoryManager *MemMgr = nullptr; |
||
375 | StringMap<ExecutorAddr> BootstrapSymbols; |
||
376 | }; |
||
377 | |||
378 | /// A ExecutorProcessControl instance that asserts if any of its methods are |
||
379 | /// used. Suitable for use is unit tests, and by ORC clients who haven't moved |
||
380 | /// to ExecutorProcessControl-based APIs yet. |
||
381 | class UnsupportedExecutorProcessControl : public ExecutorProcessControl { |
||
382 | public: |
||
383 | UnsupportedExecutorProcessControl( |
||
384 | std::shared_ptr<SymbolStringPool> SSP = nullptr, |
||
385 | std::unique_ptr<TaskDispatcher> D = nullptr, |
||
386 | const std::string &TT = "", unsigned PageSize = 0) |
||
387 | : ExecutorProcessControl(SSP ? std::move(SSP) |
||
388 | : std::make_shared<SymbolStringPool>(), |
||
389 | D ? std::move(D) |
||
390 | : std::make_unique<InPlaceTaskDispatcher>()) { |
||
391 | this->TargetTriple = Triple(TT); |
||
392 | this->PageSize = PageSize; |
||
393 | } |
||
394 | |||
395 | Expected<tpctypes::DylibHandle> loadDylib(const char *DylibPath) override { |
||
396 | llvm_unreachable("Unsupported"); |
||
397 | } |
||
398 | |||
399 | Expected<std::vector<tpctypes::LookupResult>> |
||
400 | lookupSymbols(ArrayRef<LookupRequest> Request) override { |
||
401 | llvm_unreachable("Unsupported"); |
||
402 | } |
||
403 | |||
404 | Expected<int32_t> runAsMain(ExecutorAddr MainFnAddr, |
||
405 | ArrayRef<std::string> Args) override { |
||
406 | llvm_unreachable("Unsupported"); |
||
407 | } |
||
408 | |||
409 | Expected<int32_t> runAsVoidFunction(ExecutorAddr VoidFnAddr) override { |
||
410 | llvm_unreachable("Unsupported"); |
||
411 | } |
||
412 | |||
413 | Expected<int32_t> runAsIntFunction(ExecutorAddr IntFnAddr, int Arg) override { |
||
414 | llvm_unreachable("Unsupported"); |
||
415 | } |
||
416 | |||
417 | void callWrapperAsync(ExecutorAddr WrapperFnAddr, |
||
418 | IncomingWFRHandler OnComplete, |
||
419 | ArrayRef<char> ArgBuffer) override { |
||
420 | llvm_unreachable("Unsupported"); |
||
421 | } |
||
422 | |||
423 | Error disconnect() override { return Error::success(); } |
||
424 | }; |
||
425 | |||
426 | /// A ExecutorProcessControl implementation targeting the current process. |
||
427 | class SelfExecutorProcessControl |
||
428 | : public ExecutorProcessControl, |
||
429 | private ExecutorProcessControl::MemoryAccess { |
||
430 | public: |
||
431 | SelfExecutorProcessControl( |
||
432 | std::shared_ptr<SymbolStringPool> SSP, std::unique_ptr<TaskDispatcher> D, |
||
433 | Triple TargetTriple, unsigned PageSize, |
||
434 | std::unique_ptr<jitlink::JITLinkMemoryManager> MemMgr); |
||
435 | |||
436 | /// Create a SelfExecutorProcessControl with the given symbol string pool and |
||
437 | /// memory manager. |
||
438 | /// If no symbol string pool is given then one will be created. |
||
439 | /// If no memory manager is given a jitlink::InProcessMemoryManager will |
||
440 | /// be created and used by default. |
||
441 | static Expected<std::unique_ptr<SelfExecutorProcessControl>> |
||
442 | Create(std::shared_ptr<SymbolStringPool> SSP = nullptr, |
||
443 | std::unique_ptr<TaskDispatcher> D = nullptr, |
||
444 | std::unique_ptr<jitlink::JITLinkMemoryManager> MemMgr = nullptr); |
||
445 | |||
446 | Expected<tpctypes::DylibHandle> loadDylib(const char *DylibPath) override; |
||
447 | |||
448 | Expected<std::vector<tpctypes::LookupResult>> |
||
449 | lookupSymbols(ArrayRef<LookupRequest> Request) override; |
||
450 | |||
451 | Expected<int32_t> runAsMain(ExecutorAddr MainFnAddr, |
||
452 | ArrayRef<std::string> Args) override; |
||
453 | |||
454 | Expected<int32_t> runAsVoidFunction(ExecutorAddr VoidFnAddr) override; |
||
455 | |||
456 | Expected<int32_t> runAsIntFunction(ExecutorAddr IntFnAddr, int Arg) override; |
||
457 | |||
458 | void callWrapperAsync(ExecutorAddr WrapperFnAddr, |
||
459 | IncomingWFRHandler OnComplete, |
||
460 | ArrayRef<char> ArgBuffer) override; |
||
461 | |||
462 | Error disconnect() override; |
||
463 | |||
464 | private: |
||
465 | void writeUInt8sAsync(ArrayRef<tpctypes::UInt8Write> Ws, |
||
466 | WriteResultFn OnWriteComplete) override; |
||
467 | |||
468 | void writeUInt16sAsync(ArrayRef<tpctypes::UInt16Write> Ws, |
||
469 | WriteResultFn OnWriteComplete) override; |
||
470 | |||
471 | void writeUInt32sAsync(ArrayRef<tpctypes::UInt32Write> Ws, |
||
472 | WriteResultFn OnWriteComplete) override; |
||
473 | |||
474 | void writeUInt64sAsync(ArrayRef<tpctypes::UInt64Write> Ws, |
||
475 | WriteResultFn OnWriteComplete) override; |
||
476 | |||
477 | void writeBuffersAsync(ArrayRef<tpctypes::BufferWrite> Ws, |
||
478 | WriteResultFn OnWriteComplete) override; |
||
479 | |||
480 | static shared::CWrapperFunctionResult |
||
481 | jitDispatchViaWrapperFunctionManager(void *Ctx, const void *FnTag, |
||
482 | const char *Data, size_t Size); |
||
483 | |||
484 | std::unique_ptr<jitlink::JITLinkMemoryManager> OwnedMemMgr; |
||
485 | char GlobalManglingPrefix = 0; |
||
486 | }; |
||
487 | |||
488 | } // end namespace orc |
||
489 | } // end namespace llvm |
||
490 | |||
491 | #endif // LLVM_EXECUTIONENGINE_ORC_EXECUTORPROCESSCONTROL_H |