Details | Last modification | View Log | RSS feed
| Rev | Author | Line No. | Line |
|---|---|---|---|
| 14 | pmbaty | 1 | //===- ExecutorProcessControl.h - Executor process control APIs -*- C++ -*-===// |
| 2 | // |
||
| 3 | // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. |
||
| 4 | // See https://llvm.org/LICENSE.txt for license information. |
||
| 5 | // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception |
||
| 6 | // |
||
| 7 | //===----------------------------------------------------------------------===// |
||
| 8 | // |
||
| 9 | // Utilities for interacting with the executor processes. |
||
| 10 | // |
||
| 11 | //===----------------------------------------------------------------------===// |
||
| 12 | |||
| 13 | #ifndef LLVM_EXECUTIONENGINE_ORC_EXECUTORPROCESSCONTROL_H |
||
| 14 | #define LLVM_EXECUTIONENGINE_ORC_EXECUTORPROCESSCONTROL_H |
||
| 15 | |||
| 16 | #include "llvm/ADT/StringRef.h" |
||
| 17 | #include "llvm/ADT/Triple.h" |
||
| 18 | #include "llvm/ExecutionEngine/JITLink/JITLinkMemoryManager.h" |
||
| 19 | #include "llvm/ExecutionEngine/Orc/Shared/ExecutorAddress.h" |
||
| 20 | #include "llvm/ExecutionEngine/Orc/Shared/TargetProcessControlTypes.h" |
||
| 21 | #include "llvm/ExecutionEngine/Orc/Shared/WrapperFunctionUtils.h" |
||
| 22 | #include "llvm/ExecutionEngine/Orc/SymbolStringPool.h" |
||
| 23 | #include "llvm/ExecutionEngine/Orc/TaskDispatch.h" |
||
| 24 | #include "llvm/Support/DynamicLibrary.h" |
||
| 25 | #include "llvm/Support/MSVCErrorWorkarounds.h" |
||
| 26 | |||
| 27 | #include <future> |
||
| 28 | #include <mutex> |
||
| 29 | #include <vector> |
||
| 30 | |||
| 31 | namespace llvm { |
||
| 32 | namespace orc { |
||
| 33 | |||
| 34 | class ExecutionSession; |
||
| 35 | class SymbolLookupSet; |
||
| 36 | |||
| 37 | /// ExecutorProcessControl supports interaction with a JIT target process. |
||
| 38 | class ExecutorProcessControl { |
||
| 39 | friend class ExecutionSession; |
||
| 40 | public: |
||
| 41 | |||
| 42 | /// A handler or incoming WrapperFunctionResults -- either return values from |
||
| 43 | /// callWrapper* calls, or incoming JIT-dispatch requests. |
||
| 44 | /// |
||
| 45 | /// IncomingWFRHandlers are constructible from |
||
| 46 | /// unique_function<void(shared::WrapperFunctionResult)>s using the |
||
| 47 | /// runInPlace function or a RunWithDispatch object. |
||
| 48 | class IncomingWFRHandler { |
||
| 49 | friend class ExecutorProcessControl; |
||
| 50 | public: |
||
| 51 | IncomingWFRHandler() = default; |
||
| 52 | explicit operator bool() const { return !!H; } |
||
| 53 | void operator()(shared::WrapperFunctionResult WFR) { H(std::move(WFR)); } |
||
| 54 | private: |
||
| 55 | template <typename FnT> IncomingWFRHandler(FnT &&Fn) |
||
| 56 | : H(std::forward<FnT>(Fn)) {} |
||
| 57 | |||
| 58 | unique_function<void(shared::WrapperFunctionResult)> H; |
||
| 59 | }; |
||
| 60 | |||
| 61 | /// Constructs an IncomingWFRHandler from a function object that is callable |
||
| 62 | /// as void(shared::WrapperFunctionResult). The function object will be called |
||
| 63 | /// directly. This should be used with care as it may block listener threads |
||
| 64 | /// in remote EPCs. It is only suitable for simple tasks (e.g. setting a |
||
| 65 | /// future), or for performing some quick analysis before dispatching "real" |
||
| 66 | /// work as a Task. |
||
| 67 | class RunInPlace { |
||
| 68 | public: |
||
| 69 | template <typename FnT> |
||
| 70 | IncomingWFRHandler operator()(FnT &&Fn) { |
||
| 71 | return IncomingWFRHandler(std::forward<FnT>(Fn)); |
||
| 72 | } |
||
| 73 | }; |
||
| 74 | |||
| 75 | /// Constructs an IncomingWFRHandler from a function object by creating a new |
||
| 76 | /// function object that dispatches the original using a TaskDispatcher, |
||
| 77 | /// wrapping the original as a GenericNamedTask. |
||
| 78 | /// |
||
| 79 | /// This is the default approach for running WFR handlers. |
||
| 80 | class RunAsTask { |
||
| 81 | public: |
||
| 82 | RunAsTask(TaskDispatcher &D) : D(D) {} |
||
| 83 | |||
| 84 | template <typename FnT> |
||
| 85 | IncomingWFRHandler operator()(FnT &&Fn) { |
||
| 86 | return IncomingWFRHandler( |
||
| 87 | [&D = this->D, Fn = std::move(Fn)] |
||
| 88 | (shared::WrapperFunctionResult WFR) mutable { |
||
| 89 | D.dispatch( |
||
| 90 | makeGenericNamedTask( |
||
| 91 | [Fn = std::move(Fn), WFR = std::move(WFR)]() mutable { |
||
| 92 | Fn(std::move(WFR)); |
||
| 93 | }, "WFR handler task")); |
||
| 94 | }); |
||
| 95 | } |
||
| 96 | private: |
||
| 97 | TaskDispatcher &D; |
||
| 98 | }; |
||
| 99 | |||
| 100 | /// APIs for manipulating memory in the target process. |
||
| 101 | class MemoryAccess { |
||
| 102 | public: |
||
| 103 | /// Callback function for asynchronous writes. |
||
| 104 | using WriteResultFn = unique_function<void(Error)>; |
||
| 105 | |||
| 106 | virtual ~MemoryAccess(); |
||
| 107 | |||
| 108 | virtual void writeUInt8sAsync(ArrayRef<tpctypes::UInt8Write> Ws, |
||
| 109 | WriteResultFn OnWriteComplete) = 0; |
||
| 110 | |||
| 111 | virtual void writeUInt16sAsync(ArrayRef<tpctypes::UInt16Write> Ws, |
||
| 112 | WriteResultFn OnWriteComplete) = 0; |
||
| 113 | |||
| 114 | virtual void writeUInt32sAsync(ArrayRef<tpctypes::UInt32Write> Ws, |
||
| 115 | WriteResultFn OnWriteComplete) = 0; |
||
| 116 | |||
| 117 | virtual void writeUInt64sAsync(ArrayRef<tpctypes::UInt64Write> Ws, |
||
| 118 | WriteResultFn OnWriteComplete) = 0; |
||
| 119 | |||
| 120 | virtual void writeBuffersAsync(ArrayRef<tpctypes::BufferWrite> Ws, |
||
| 121 | WriteResultFn OnWriteComplete) = 0; |
||
| 122 | |||
| 123 | Error writeUInt8s(ArrayRef<tpctypes::UInt8Write> Ws) { |
||
| 124 | std::promise<MSVCPError> ResultP; |
||
| 125 | auto ResultF = ResultP.get_future(); |
||
| 126 | writeUInt8sAsync(Ws, |
||
| 127 | [&](Error Err) { ResultP.set_value(std::move(Err)); }); |
||
| 128 | return ResultF.get(); |
||
| 129 | } |
||
| 130 | |||
| 131 | Error writeUInt16s(ArrayRef<tpctypes::UInt16Write> Ws) { |
||
| 132 | std::promise<MSVCPError> ResultP; |
||
| 133 | auto ResultF = ResultP.get_future(); |
||
| 134 | writeUInt16sAsync(Ws, |
||
| 135 | [&](Error Err) { ResultP.set_value(std::move(Err)); }); |
||
| 136 | return ResultF.get(); |
||
| 137 | } |
||
| 138 | |||
| 139 | Error writeUInt32s(ArrayRef<tpctypes::UInt32Write> Ws) { |
||
| 140 | std::promise<MSVCPError> ResultP; |
||
| 141 | auto ResultF = ResultP.get_future(); |
||
| 142 | writeUInt32sAsync(Ws, |
||
| 143 | [&](Error Err) { ResultP.set_value(std::move(Err)); }); |
||
| 144 | return ResultF.get(); |
||
| 145 | } |
||
| 146 | |||
| 147 | Error writeUInt64s(ArrayRef<tpctypes::UInt64Write> Ws) { |
||
| 148 | std::promise<MSVCPError> ResultP; |
||
| 149 | auto ResultF = ResultP.get_future(); |
||
| 150 | writeUInt64sAsync(Ws, |
||
| 151 | [&](Error Err) { ResultP.set_value(std::move(Err)); }); |
||
| 152 | return ResultF.get(); |
||
| 153 | } |
||
| 154 | |||
| 155 | Error writeBuffers(ArrayRef<tpctypes::BufferWrite> Ws) { |
||
| 156 | std::promise<MSVCPError> ResultP; |
||
| 157 | auto ResultF = ResultP.get_future(); |
||
| 158 | writeBuffersAsync(Ws, |
||
| 159 | [&](Error Err) { ResultP.set_value(std::move(Err)); }); |
||
| 160 | return ResultF.get(); |
||
| 161 | } |
||
| 162 | }; |
||
| 163 | |||
| 164 | /// A pair of a dylib and a set of symbols to be looked up. |
||
| 165 | struct LookupRequest { |
||
| 166 | LookupRequest(tpctypes::DylibHandle Handle, const SymbolLookupSet &Symbols) |
||
| 167 | : Handle(Handle), Symbols(Symbols) {} |
||
| 168 | tpctypes::DylibHandle Handle; |
||
| 169 | const SymbolLookupSet &Symbols; |
||
| 170 | }; |
||
| 171 | |||
| 172 | /// Contains the address of the dispatch function and context that the ORC |
||
| 173 | /// runtime can use to call functions in the JIT. |
||
| 174 | struct JITDispatchInfo { |
||
| 175 | ExecutorAddr JITDispatchFunction; |
||
| 176 | ExecutorAddr JITDispatchContext; |
||
| 177 | }; |
||
| 178 | |||
| 179 | ExecutorProcessControl(std::shared_ptr<SymbolStringPool> SSP, |
||
| 180 | std::unique_ptr<TaskDispatcher> D) |
||
| 181 | : SSP(std::move(SSP)), D(std::move(D)) {} |
||
| 182 | |||
| 183 | virtual ~ExecutorProcessControl(); |
||
| 184 | |||
| 185 | /// Return the ExecutionSession associated with this instance. |
||
| 186 | /// Not callable until the ExecutionSession has been associated. |
||
| 187 | ExecutionSession &getExecutionSession() { |
||
| 188 | assert(ES && "No ExecutionSession associated yet"); |
||
| 189 | return *ES; |
||
| 190 | } |
||
| 191 | |||
| 192 | /// Intern a symbol name in the SymbolStringPool. |
||
| 193 | SymbolStringPtr intern(StringRef SymName) { return SSP->intern(SymName); } |
||
| 194 | |||
| 195 | /// Return a shared pointer to the SymbolStringPool for this instance. |
||
| 196 | std::shared_ptr<SymbolStringPool> getSymbolStringPool() const { return SSP; } |
||
| 197 | |||
| 198 | TaskDispatcher &getDispatcher() { return *D; } |
||
| 199 | |||
| 200 | /// Return the Triple for the target process. |
||
| 201 | const Triple &getTargetTriple() const { return TargetTriple; } |
||
| 202 | |||
| 203 | /// Get the page size for the target process. |
||
| 204 | unsigned getPageSize() const { return PageSize; } |
||
| 205 | |||
| 206 | /// Get the JIT dispatch function and context address for the executor. |
||
| 207 | const JITDispatchInfo &getJITDispatchInfo() const { return JDI; } |
||
| 208 | |||
| 209 | /// Return a MemoryAccess object for the target process. |
||
| 210 | MemoryAccess &getMemoryAccess() const { |
||
| 211 | assert(MemAccess && "No MemAccess object set."); |
||
| 212 | return *MemAccess; |
||
| 213 | } |
||
| 214 | |||
| 215 | /// Return a JITLinkMemoryManager for the target process. |
||
| 216 | jitlink::JITLinkMemoryManager &getMemMgr() const { |
||
| 217 | assert(MemMgr && "No MemMgr object set"); |
||
| 218 | return *MemMgr; |
||
| 219 | } |
||
| 220 | |||
| 221 | /// Returns the bootstrap symbol map. |
||
| 222 | const StringMap<ExecutorAddr> &getBootstrapSymbolsMap() const { |
||
| 223 | return BootstrapSymbols; |
||
| 224 | } |
||
| 225 | |||
| 226 | /// For each (ExecutorAddr&, StringRef) pair, looks up the string in the |
||
| 227 | /// bootstrap symbols map and writes its address to the ExecutorAddr if |
||
| 228 | /// found. If any symbol is not found then the function returns an error. |
||
| 229 | Error getBootstrapSymbols( |
||
| 230 | ArrayRef<std::pair<ExecutorAddr &, StringRef>> Pairs) const { |
||
| 231 | for (const auto &KV : Pairs) { |
||
| 232 | auto I = BootstrapSymbols.find(KV.second); |
||
| 233 | if (I == BootstrapSymbols.end()) |
||
| 234 | return make_error<StringError>("Symbol \"" + KV.second + |
||
| 235 | "\" not found " |
||
| 236 | "in bootstrap symbols map", |
||
| 237 | inconvertibleErrorCode()); |
||
| 238 | |||
| 239 | KV.first = I->second; |
||
| 240 | } |
||
| 241 | return Error::success(); |
||
| 242 | } |
||
| 243 | |||
| 244 | /// Load the dynamic library at the given path and return a handle to it. |
||
| 245 | /// If LibraryPath is null this function will return the global handle for |
||
| 246 | /// the target process. |
||
| 247 | virtual Expected<tpctypes::DylibHandle> loadDylib(const char *DylibPath) = 0; |
||
| 248 | |||
| 249 | /// Search for symbols in the target process. |
||
| 250 | /// |
||
| 251 | /// The result of the lookup is a 2-dimentional array of target addresses |
||
| 252 | /// that correspond to the lookup order. If a required symbol is not |
||
| 253 | /// found then this method will return an error. If a weakly referenced |
||
| 254 | /// symbol is not found then it be assigned a '0' value. |
||
| 255 | virtual Expected<std::vector<tpctypes::LookupResult>> |
||
| 256 | lookupSymbols(ArrayRef<LookupRequest> Request) = 0; |
||
| 257 | |||
| 258 | /// Run function with a main-like signature. |
||
| 259 | virtual Expected<int32_t> runAsMain(ExecutorAddr MainFnAddr, |
||
| 260 | ArrayRef<std::string> Args) = 0; |
||
| 261 | |||
| 262 | // TODO: move this to ORC runtime. |
||
| 263 | /// Run function with a int (*)(void) signature. |
||
| 264 | virtual Expected<int32_t> runAsVoidFunction(ExecutorAddr VoidFnAddr) = 0; |
||
| 265 | |||
| 266 | // TODO: move this to ORC runtime. |
||
| 267 | /// Run function with a int (*)(int) signature. |
||
| 268 | virtual Expected<int32_t> runAsIntFunction(ExecutorAddr IntFnAddr, |
||
| 269 | int Arg) = 0; |
||
| 270 | |||
| 271 | /// Run a wrapper function in the executor. The given WFRHandler will be |
||
| 272 | /// called on the result when it is returned. |
||
| 273 | /// |
||
| 274 | /// The wrapper function should be callable as: |
||
| 275 | /// |
||
| 276 | /// \code{.cpp} |
||
| 277 | /// CWrapperFunctionResult fn(uint8_t *Data, uint64_t Size); |
||
| 278 | /// \endcode{.cpp} |
||
| 279 | virtual void callWrapperAsync(ExecutorAddr WrapperFnAddr, |
||
| 280 | IncomingWFRHandler OnComplete, |
||
| 281 | ArrayRef<char> ArgBuffer) = 0; |
||
| 282 | |||
| 283 | /// Run a wrapper function in the executor using the given Runner to dispatch |
||
| 284 | /// OnComplete when the result is ready. |
||
| 285 | template <typename RunPolicyT, typename FnT> |
||
| 286 | void callWrapperAsync(RunPolicyT &&Runner, ExecutorAddr WrapperFnAddr, |
||
| 287 | FnT &&OnComplete, ArrayRef<char> ArgBuffer) { |
||
| 288 | callWrapperAsync( |
||
| 289 | WrapperFnAddr, Runner(std::forward<FnT>(OnComplete)), ArgBuffer); |
||
| 290 | } |
||
| 291 | |||
| 292 | /// Run a wrapper function in the executor. OnComplete will be dispatched |
||
| 293 | /// as a GenericNamedTask using this instance's TaskDispatch object. |
||
| 294 | template <typename FnT> |
||
| 295 | void callWrapperAsync(ExecutorAddr WrapperFnAddr, FnT &&OnComplete, |
||
| 296 | ArrayRef<char> ArgBuffer) { |
||
| 297 | callWrapperAsync(RunAsTask(*D), WrapperFnAddr, |
||
| 298 | std::forward<FnT>(OnComplete), ArgBuffer); |
||
| 299 | } |
||
| 300 | |||
| 301 | /// Run a wrapper function in the executor. The wrapper function should be |
||
| 302 | /// callable as: |
||
| 303 | /// |
||
| 304 | /// \code{.cpp} |
||
| 305 | /// CWrapperFunctionResult fn(uint8_t *Data, uint64_t Size); |
||
| 306 | /// \endcode{.cpp} |
||
| 307 | shared::WrapperFunctionResult callWrapper(ExecutorAddr WrapperFnAddr, |
||
| 308 | ArrayRef<char> ArgBuffer) { |
||
| 309 | std::promise<shared::WrapperFunctionResult> RP; |
||
| 310 | auto RF = RP.get_future(); |
||
| 311 | callWrapperAsync( |
||
| 312 | RunInPlace(), WrapperFnAddr, |
||
| 313 | [&](shared::WrapperFunctionResult R) { |
||
| 314 | RP.set_value(std::move(R)); |
||
| 315 | }, ArgBuffer); |
||
| 316 | return RF.get(); |
||
| 317 | } |
||
| 318 | |||
| 319 | /// Run a wrapper function using SPS to serialize the arguments and |
||
| 320 | /// deserialize the results. |
||
| 321 | template <typename SPSSignature, typename RunPolicyT, typename SendResultT, |
||
| 322 | typename... ArgTs> |
||
| 323 | void callSPSWrapperAsync(RunPolicyT &&Runner, ExecutorAddr WrapperFnAddr, |
||
| 324 | SendResultT &&SendResult, const ArgTs &...Args) { |
||
| 325 | shared::WrapperFunction<SPSSignature>::callAsync( |
||
| 326 | [this, WrapperFnAddr, Runner = std::move(Runner)] |
||
| 327 | (auto &&SendResult, const char *ArgData, size_t ArgSize) mutable { |
||
| 328 | this->callWrapperAsync(std::move(Runner), WrapperFnAddr, |
||
| 329 | std::move(SendResult), |
||
| 330 | ArrayRef<char>(ArgData, ArgSize)); |
||
| 331 | }, |
||
| 332 | std::forward<SendResultT>(SendResult), Args...); |
||
| 333 | } |
||
| 334 | |||
| 335 | /// Run a wrapper function using SPS to serialize the arguments and |
||
| 336 | /// deserialize the results. |
||
| 337 | template <typename SPSSignature, typename SendResultT, typename... ArgTs> |
||
| 338 | void callSPSWrapperAsync(ExecutorAddr WrapperFnAddr, SendResultT &&SendResult, |
||
| 339 | const ArgTs &...Args) { |
||
| 340 | callSPSWrapperAsync<SPSSignature>(RunAsTask(*D), WrapperFnAddr, |
||
| 341 | std::forward<SendResultT>(SendResult), |
||
| 342 | Args...); |
||
| 343 | } |
||
| 344 | |||
| 345 | /// Run a wrapper function using SPS to serialize the arguments and |
||
| 346 | /// deserialize the results. |
||
| 347 | /// |
||
| 348 | /// If SPSSignature is a non-void function signature then the second argument |
||
| 349 | /// (the first in the Args list) should be a reference to a return value. |
||
| 350 | template <typename SPSSignature, typename... WrapperCallArgTs> |
||
| 351 | Error callSPSWrapper(ExecutorAddr WrapperFnAddr, |
||
| 352 | WrapperCallArgTs &&...WrapperCallArgs) { |
||
| 353 | return shared::WrapperFunction<SPSSignature>::call( |
||
| 354 | [this, WrapperFnAddr](const char *ArgData, size_t ArgSize) { |
||
| 355 | return callWrapper(WrapperFnAddr, ArrayRef<char>(ArgData, ArgSize)); |
||
| 356 | }, |
||
| 357 | std::forward<WrapperCallArgTs>(WrapperCallArgs)...); |
||
| 358 | } |
||
| 359 | |||
| 360 | /// Disconnect from the target process. |
||
| 361 | /// |
||
| 362 | /// This should be called after the JIT session is shut down. |
||
| 363 | virtual Error disconnect() = 0; |
||
| 364 | |||
| 365 | protected: |
||
| 366 | |||
| 367 | std::shared_ptr<SymbolStringPool> SSP; |
||
| 368 | std::unique_ptr<TaskDispatcher> D; |
||
| 369 | ExecutionSession *ES = nullptr; |
||
| 370 | Triple TargetTriple; |
||
| 371 | unsigned PageSize = 0; |
||
| 372 | JITDispatchInfo JDI; |
||
| 373 | MemoryAccess *MemAccess = nullptr; |
||
| 374 | jitlink::JITLinkMemoryManager *MemMgr = nullptr; |
||
| 375 | StringMap<ExecutorAddr> BootstrapSymbols; |
||
| 376 | }; |
||
| 377 | |||
| 378 | /// A ExecutorProcessControl instance that asserts if any of its methods are |
||
| 379 | /// used. Suitable for use is unit tests, and by ORC clients who haven't moved |
||
| 380 | /// to ExecutorProcessControl-based APIs yet. |
||
| 381 | class UnsupportedExecutorProcessControl : public ExecutorProcessControl { |
||
| 382 | public: |
||
| 383 | UnsupportedExecutorProcessControl( |
||
| 384 | std::shared_ptr<SymbolStringPool> SSP = nullptr, |
||
| 385 | std::unique_ptr<TaskDispatcher> D = nullptr, |
||
| 386 | const std::string &TT = "", unsigned PageSize = 0) |
||
| 387 | : ExecutorProcessControl(SSP ? std::move(SSP) |
||
| 388 | : std::make_shared<SymbolStringPool>(), |
||
| 389 | D ? std::move(D) |
||
| 390 | : std::make_unique<InPlaceTaskDispatcher>()) { |
||
| 391 | this->TargetTriple = Triple(TT); |
||
| 392 | this->PageSize = PageSize; |
||
| 393 | } |
||
| 394 | |||
| 395 | Expected<tpctypes::DylibHandle> loadDylib(const char *DylibPath) override { |
||
| 396 | llvm_unreachable("Unsupported"); |
||
| 397 | } |
||
| 398 | |||
| 399 | Expected<std::vector<tpctypes::LookupResult>> |
||
| 400 | lookupSymbols(ArrayRef<LookupRequest> Request) override { |
||
| 401 | llvm_unreachable("Unsupported"); |
||
| 402 | } |
||
| 403 | |||
| 404 | Expected<int32_t> runAsMain(ExecutorAddr MainFnAddr, |
||
| 405 | ArrayRef<std::string> Args) override { |
||
| 406 | llvm_unreachable("Unsupported"); |
||
| 407 | } |
||
| 408 | |||
| 409 | Expected<int32_t> runAsVoidFunction(ExecutorAddr VoidFnAddr) override { |
||
| 410 | llvm_unreachable("Unsupported"); |
||
| 411 | } |
||
| 412 | |||
| 413 | Expected<int32_t> runAsIntFunction(ExecutorAddr IntFnAddr, int Arg) override { |
||
| 414 | llvm_unreachable("Unsupported"); |
||
| 415 | } |
||
| 416 | |||
| 417 | void callWrapperAsync(ExecutorAddr WrapperFnAddr, |
||
| 418 | IncomingWFRHandler OnComplete, |
||
| 419 | ArrayRef<char> ArgBuffer) override { |
||
| 420 | llvm_unreachable("Unsupported"); |
||
| 421 | } |
||
| 422 | |||
| 423 | Error disconnect() override { return Error::success(); } |
||
| 424 | }; |
||
| 425 | |||
| 426 | /// A ExecutorProcessControl implementation targeting the current process. |
||
| 427 | class SelfExecutorProcessControl |
||
| 428 | : public ExecutorProcessControl, |
||
| 429 | private ExecutorProcessControl::MemoryAccess { |
||
| 430 | public: |
||
| 431 | SelfExecutorProcessControl( |
||
| 432 | std::shared_ptr<SymbolStringPool> SSP, std::unique_ptr<TaskDispatcher> D, |
||
| 433 | Triple TargetTriple, unsigned PageSize, |
||
| 434 | std::unique_ptr<jitlink::JITLinkMemoryManager> MemMgr); |
||
| 435 | |||
| 436 | /// Create a SelfExecutorProcessControl with the given symbol string pool and |
||
| 437 | /// memory manager. |
||
| 438 | /// If no symbol string pool is given then one will be created. |
||
| 439 | /// If no memory manager is given a jitlink::InProcessMemoryManager will |
||
| 440 | /// be created and used by default. |
||
| 441 | static Expected<std::unique_ptr<SelfExecutorProcessControl>> |
||
| 442 | Create(std::shared_ptr<SymbolStringPool> SSP = nullptr, |
||
| 443 | std::unique_ptr<TaskDispatcher> D = nullptr, |
||
| 444 | std::unique_ptr<jitlink::JITLinkMemoryManager> MemMgr = nullptr); |
||
| 445 | |||
| 446 | Expected<tpctypes::DylibHandle> loadDylib(const char *DylibPath) override; |
||
| 447 | |||
| 448 | Expected<std::vector<tpctypes::LookupResult>> |
||
| 449 | lookupSymbols(ArrayRef<LookupRequest> Request) override; |
||
| 450 | |||
| 451 | Expected<int32_t> runAsMain(ExecutorAddr MainFnAddr, |
||
| 452 | ArrayRef<std::string> Args) override; |
||
| 453 | |||
| 454 | Expected<int32_t> runAsVoidFunction(ExecutorAddr VoidFnAddr) override; |
||
| 455 | |||
| 456 | Expected<int32_t> runAsIntFunction(ExecutorAddr IntFnAddr, int Arg) override; |
||
| 457 | |||
| 458 | void callWrapperAsync(ExecutorAddr WrapperFnAddr, |
||
| 459 | IncomingWFRHandler OnComplete, |
||
| 460 | ArrayRef<char> ArgBuffer) override; |
||
| 461 | |||
| 462 | Error disconnect() override; |
||
| 463 | |||
| 464 | private: |
||
| 465 | void writeUInt8sAsync(ArrayRef<tpctypes::UInt8Write> Ws, |
||
| 466 | WriteResultFn OnWriteComplete) override; |
||
| 467 | |||
| 468 | void writeUInt16sAsync(ArrayRef<tpctypes::UInt16Write> Ws, |
||
| 469 | WriteResultFn OnWriteComplete) override; |
||
| 470 | |||
| 471 | void writeUInt32sAsync(ArrayRef<tpctypes::UInt32Write> Ws, |
||
| 472 | WriteResultFn OnWriteComplete) override; |
||
| 473 | |||
| 474 | void writeUInt64sAsync(ArrayRef<tpctypes::UInt64Write> Ws, |
||
| 475 | WriteResultFn OnWriteComplete) override; |
||
| 476 | |||
| 477 | void writeBuffersAsync(ArrayRef<tpctypes::BufferWrite> Ws, |
||
| 478 | WriteResultFn OnWriteComplete) override; |
||
| 479 | |||
| 480 | static shared::CWrapperFunctionResult |
||
| 481 | jitDispatchViaWrapperFunctionManager(void *Ctx, const void *FnTag, |
||
| 482 | const char *Data, size_t Size); |
||
| 483 | |||
| 484 | std::unique_ptr<jitlink::JITLinkMemoryManager> OwnedMemMgr; |
||
| 485 | char GlobalManglingPrefix = 0; |
||
| 486 | }; |
||
| 487 | |||
| 488 | } // end namespace orc |
||
| 489 | } // end namespace llvm |
||
| 490 | |||
| 491 | #endif // LLVM_EXECUTIONENGINE_ORC_EXECUTORPROCESSCONTROL_H |