1 //===- ExecutorProcessControl.h - Executor process control APIs -*- C++ -*-===//
2 //
3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4 // See https://llvm.org/LICENSE.txt for license information.
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6 //
7 //===----------------------------------------------------------------------===//
8 //
9 // Utilities for interacting with the executor processes.
10 //
11 //===----------------------------------------------------------------------===//
12 
13 #ifndef LLVM_EXECUTIONENGINE_ORC_EXECUTORPROCESSCONTROL_H
14 #define LLVM_EXECUTIONENGINE_ORC_EXECUTORPROCESSCONTROL_H
15 
16 #include "llvm/ADT/StringRef.h"
17 #include "llvm/ADT/Triple.h"
18 #include "llvm/ExecutionEngine/JITLink/JITLinkMemoryManager.h"
19 #include "llvm/ExecutionEngine/Orc/Shared/ExecutorAddress.h"
20 #include "llvm/ExecutionEngine/Orc/Shared/TargetProcessControlTypes.h"
21 #include "llvm/ExecutionEngine/Orc/Shared/WrapperFunctionUtils.h"
22 #include "llvm/ExecutionEngine/Orc/SymbolStringPool.h"
23 #include "llvm/ExecutionEngine/Orc/TaskDispatch.h"
24 #include "llvm/Support/DynamicLibrary.h"
25 #include "llvm/Support/MSVCErrorWorkarounds.h"
26 
27 #include <future>
28 #include <mutex>
29 #include <vector>
30 
31 namespace llvm {
32 namespace orc {
33 
34 class ExecutionSession;
35 class SymbolLookupSet;
36 
37 /// ExecutorProcessControl supports interaction with a JIT target process.
38 class ExecutorProcessControl {
39   friend class ExecutionSession;
40 public:
41 
42   /// A handler or incoming WrapperFunctionResults -- either return values from
43   /// callWrapper* calls, or incoming JIT-dispatch requests.
44   ///
45   /// IncomingWFRHandlers are constructible from
46   /// unique_function<void(shared::WrapperFunctionResult)>s using the
47   /// runInPlace function or a RunWithDispatch object.
48   class IncomingWFRHandler {
49     friend class ExecutorProcessControl;
50   public:
51     IncomingWFRHandler() = default;
52     explicit operator bool() const { return !!H; }
53     void operator()(shared::WrapperFunctionResult WFR) { H(std::move(WFR)); }
54   private:
55     template <typename FnT> IncomingWFRHandler(FnT &&Fn)
56       : H(std::forward<FnT>(Fn)) {}
57 
58     unique_function<void(shared::WrapperFunctionResult)> H;
59   };
60 
61   /// Constructs an IncomingWFRHandler from a function object that is callable
62   /// as void(shared::WrapperFunctionResult). The function object will be called
63   /// directly. This should be used with care as it may block listener threads
64   /// in remote EPCs. It is only suitable for simple tasks (e.g. setting a
65   /// future), or for performing some quick analysis before dispatching "real"
66   /// work as a Task.
67   class RunInPlace {
68   public:
69     template <typename FnT>
70     IncomingWFRHandler operator()(FnT &&Fn) {
71       return IncomingWFRHandler(std::forward<FnT>(Fn));
72     }
73   };
74 
75   /// Constructs an IncomingWFRHandler from a function object by creating a new
76   /// function object that dispatches the original using a TaskDispatcher,
77   /// wrapping the original as a GenericNamedTask.
78   ///
79   /// This is the default approach for running WFR handlers.
80   class RunAsTask {
81   public:
82     RunAsTask(TaskDispatcher &D) : D(D) {}
83 
84     template <typename FnT>
85     IncomingWFRHandler operator()(FnT &&Fn) {
86       return IncomingWFRHandler(
87           [&D = this->D, Fn = std::move(Fn)]
88           (shared::WrapperFunctionResult WFR) mutable {
89               D.dispatch(
90                 makeGenericNamedTask(
91                     [Fn = std::move(Fn), WFR = std::move(WFR)]() mutable {
92                       Fn(std::move(WFR));
93                     }, "WFR handler task"));
94           });
95     }
96   private:
97     TaskDispatcher &D;
98   };
99 
100   /// APIs for manipulating memory in the target process.
101   class MemoryAccess {
102   public:
103     /// Callback function for asynchronous writes.
104     using WriteResultFn = unique_function<void(Error)>;
105 
106     virtual ~MemoryAccess();
107 
108     virtual void writeUInt8sAsync(ArrayRef<tpctypes::UInt8Write> Ws,
109                                   WriteResultFn OnWriteComplete) = 0;
110 
111     virtual void writeUInt16sAsync(ArrayRef<tpctypes::UInt16Write> Ws,
112                                    WriteResultFn OnWriteComplete) = 0;
113 
114     virtual void writeUInt32sAsync(ArrayRef<tpctypes::UInt32Write> Ws,
115                                    WriteResultFn OnWriteComplete) = 0;
116 
117     virtual void writeUInt64sAsync(ArrayRef<tpctypes::UInt64Write> Ws,
118                                    WriteResultFn OnWriteComplete) = 0;
119 
120     virtual void writeBuffersAsync(ArrayRef<tpctypes::BufferWrite> Ws,
121                                    WriteResultFn OnWriteComplete) = 0;
122 
123     Error writeUInt8s(ArrayRef<tpctypes::UInt8Write> Ws) {
124       std::promise<MSVCPError> ResultP;
125       auto ResultF = ResultP.get_future();
126       writeUInt8sAsync(Ws,
127                        [&](Error Err) { ResultP.set_value(std::move(Err)); });
128       return ResultF.get();
129     }
130 
131     Error writeUInt16s(ArrayRef<tpctypes::UInt16Write> Ws) {
132       std::promise<MSVCPError> ResultP;
133       auto ResultF = ResultP.get_future();
134       writeUInt16sAsync(Ws,
135                         [&](Error Err) { ResultP.set_value(std::move(Err)); });
136       return ResultF.get();
137     }
138 
139     Error writeUInt32s(ArrayRef<tpctypes::UInt32Write> Ws) {
140       std::promise<MSVCPError> ResultP;
141       auto ResultF = ResultP.get_future();
142       writeUInt32sAsync(Ws,
143                         [&](Error Err) { ResultP.set_value(std::move(Err)); });
144       return ResultF.get();
145     }
146 
147     Error writeUInt64s(ArrayRef<tpctypes::UInt64Write> Ws) {
148       std::promise<MSVCPError> ResultP;
149       auto ResultF = ResultP.get_future();
150       writeUInt64sAsync(Ws,
151                         [&](Error Err) { ResultP.set_value(std::move(Err)); });
152       return ResultF.get();
153     }
154 
155     Error writeBuffers(ArrayRef<tpctypes::BufferWrite> Ws) {
156       std::promise<MSVCPError> ResultP;
157       auto ResultF = ResultP.get_future();
158       writeBuffersAsync(Ws,
159                         [&](Error Err) { ResultP.set_value(std::move(Err)); });
160       return ResultF.get();
161     }
162   };
163 
164   /// A pair of a dylib and a set of symbols to be looked up.
165   struct LookupRequest {
166     LookupRequest(tpctypes::DylibHandle Handle, const SymbolLookupSet &Symbols)
167         : Handle(Handle), Symbols(Symbols) {}
168     tpctypes::DylibHandle Handle;
169     const SymbolLookupSet &Symbols;
170   };
171 
172   /// Contains the address of the dispatch function and context that the ORC
173   /// runtime can use to call functions in the JIT.
174   struct JITDispatchInfo {
175     ExecutorAddr JITDispatchFunction;
176     ExecutorAddr JITDispatchContext;
177   };
178 
179   ExecutorProcessControl(std::shared_ptr<SymbolStringPool> SSP,
180                          std::unique_ptr<TaskDispatcher> D)
181     : SSP(std::move(SSP)), D(std::move(D)) {}
182 
183   virtual ~ExecutorProcessControl();
184 
185   /// Return the ExecutionSession associated with this instance.
186   /// Not callable until the ExecutionSession has been associated.
187   ExecutionSession &getExecutionSession() {
188     assert(ES && "No ExecutionSession associated yet");
189     return *ES;
190   }
191 
192   /// Intern a symbol name in the SymbolStringPool.
193   SymbolStringPtr intern(StringRef SymName) { return SSP->intern(SymName); }
194 
195   /// Return a shared pointer to the SymbolStringPool for this instance.
196   std::shared_ptr<SymbolStringPool> getSymbolStringPool() const { return SSP; }
197 
198   TaskDispatcher &getDispatcher() { return *D; }
199 
200   /// Return the Triple for the target process.
201   const Triple &getTargetTriple() const { return TargetTriple; }
202 
203   /// Get the page size for the target process.
204   unsigned getPageSize() const { return PageSize; }
205 
206   /// Get the JIT dispatch function and context address for the executor.
207   const JITDispatchInfo &getJITDispatchInfo() const { return JDI; }
208 
209   /// Return a MemoryAccess object for the target process.
210   MemoryAccess &getMemoryAccess() const {
211     assert(MemAccess && "No MemAccess object set.");
212     return *MemAccess;
213   }
214 
215   /// Return a JITLinkMemoryManager for the target process.
216   jitlink::JITLinkMemoryManager &getMemMgr() const {
217     assert(MemMgr && "No MemMgr object set");
218     return *MemMgr;
219   }
220 
221   /// Returns the bootstrap symbol map.
222   const StringMap<ExecutorAddr> &getBootstrapSymbolsMap() const {
223     return BootstrapSymbols;
224   }
225 
226   /// For each (ExecutorAddr&, StringRef) pair, looks up the string in the
227   /// bootstrap symbols map and writes its address to the ExecutorAddr if
228   /// found. If any symbol is not found then the function returns an error.
229   Error getBootstrapSymbols(
230       ArrayRef<std::pair<ExecutorAddr &, StringRef>> Pairs) const {
231     for (auto &KV : Pairs) {
232       auto I = BootstrapSymbols.find(KV.second);
233       if (I == BootstrapSymbols.end())
234         return make_error<StringError>("Symbol \"" + KV.second +
235                                            "\" not found "
236                                            "in bootstrap symbols map",
237                                        inconvertibleErrorCode());
238 
239       KV.first = I->second;
240     }
241     return Error::success();
242   }
243 
244   /// Load the dynamic library at the given path and return a handle to it.
245   /// If LibraryPath is null this function will return the global handle for
246   /// the target process.
247   virtual Expected<tpctypes::DylibHandle> loadDylib(const char *DylibPath) = 0;
248 
249   /// Search for symbols in the target process.
250   ///
251   /// The result of the lookup is a 2-dimentional array of target addresses
252   /// that correspond to the lookup order. If a required symbol is not
253   /// found then this method will return an error. If a weakly referenced
254   /// symbol is not found then it be assigned a '0' value.
255   virtual Expected<std::vector<tpctypes::LookupResult>>
256   lookupSymbols(ArrayRef<LookupRequest> Request) = 0;
257 
258   /// Run function with a main-like signature.
259   virtual Expected<int32_t> runAsMain(ExecutorAddr MainFnAddr,
260                                       ArrayRef<std::string> Args) = 0;
261 
262   /// Run a wrapper function in the executor. The given WFRHandler will be
263   /// called on the result when it is returned.
264   ///
265   /// The wrapper function should be callable as:
266   ///
267   /// \code{.cpp}
268   ///   CWrapperFunctionResult fn(uint8_t *Data, uint64_t Size);
269   /// \endcode{.cpp}
270   virtual void callWrapperAsync(ExecutorAddr WrapperFnAddr,
271                                 IncomingWFRHandler OnComplete,
272                                 ArrayRef<char> ArgBuffer) = 0;
273 
274   /// Run a wrapper function in the executor using the given Runner to dispatch
275   /// OnComplete when the result is ready.
276   template <typename RunPolicyT, typename FnT>
277   void callWrapperAsync(RunPolicyT &&Runner, ExecutorAddr WrapperFnAddr,
278                         FnT &&OnComplete, ArrayRef<char> ArgBuffer) {
279     callWrapperAsync(
280         WrapperFnAddr, Runner(std::forward<FnT>(OnComplete)), ArgBuffer);
281   }
282 
283   /// Run a wrapper function in the executor. OnComplete will be dispatched
284   /// as a GenericNamedTask using this instance's TaskDispatch object.
285   template <typename FnT>
286   void callWrapperAsync(ExecutorAddr WrapperFnAddr, FnT &&OnComplete,
287                         ArrayRef<char> ArgBuffer) {
288     callWrapperAsync(RunAsTask(*D), WrapperFnAddr,
289                      std::forward<FnT>(OnComplete), ArgBuffer);
290   }
291 
292   /// Run a wrapper function in the executor. The wrapper function should be
293   /// callable as:
294   ///
295   /// \code{.cpp}
296   ///   CWrapperFunctionResult fn(uint8_t *Data, uint64_t Size);
297   /// \endcode{.cpp}
298   shared::WrapperFunctionResult callWrapper(ExecutorAddr WrapperFnAddr,
299                                             ArrayRef<char> ArgBuffer) {
300     std::promise<shared::WrapperFunctionResult> RP;
301     auto RF = RP.get_future();
302     callWrapperAsync(
303         RunInPlace(), WrapperFnAddr,
304         [&](shared::WrapperFunctionResult R) {
305           RP.set_value(std::move(R));
306         }, ArgBuffer);
307     return RF.get();
308   }
309 
310   /// Run a wrapper function using SPS to serialize the arguments and
311   /// deserialize the results.
312   template <typename SPSSignature, typename RunPolicyT, typename SendResultT,
313             typename... ArgTs>
314   void callSPSWrapperAsync(RunPolicyT &&Runner, ExecutorAddr WrapperFnAddr,
315                            SendResultT &&SendResult, const ArgTs &...Args) {
316     shared::WrapperFunction<SPSSignature>::callAsync(
317         [this, WrapperFnAddr, Runner = std::move(Runner)]
318         (auto &&SendResult, const char *ArgData, size_t ArgSize) mutable {
319           this->callWrapperAsync(std::move(Runner), WrapperFnAddr,
320                                  std::move(SendResult),
321                                  ArrayRef<char>(ArgData, ArgSize));
322         },
323         std::forward<SendResultT>(SendResult), Args...);
324   }
325 
326   /// Run a wrapper function using SPS to serialize the arguments and
327   /// deserialize the results.
328   template <typename SPSSignature, typename SendResultT, typename... ArgTs>
329   void callSPSWrapperAsync(ExecutorAddr WrapperFnAddr, SendResultT &&SendResult,
330                            const ArgTs &...Args) {
331     callSPSWrapperAsync<SPSSignature>(RunAsTask(*D), WrapperFnAddr,
332                                       std::forward<SendResultT>(SendResult),
333                                       Args...);
334   }
335 
336   /// Run a wrapper function using SPS to serialize the arguments and
337   /// deserialize the results.
338   ///
339   /// If SPSSignature is a non-void function signature then the second argument
340   /// (the first in the Args list) should be a reference to a return value.
341   template <typename SPSSignature, typename... WrapperCallArgTs>
342   Error callSPSWrapper(ExecutorAddr WrapperFnAddr,
343                        WrapperCallArgTs &&...WrapperCallArgs) {
344     return shared::WrapperFunction<SPSSignature>::call(
345         [this, WrapperFnAddr](const char *ArgData, size_t ArgSize) {
346           return callWrapper(WrapperFnAddr, ArrayRef<char>(ArgData, ArgSize));
347         },
348         std::forward<WrapperCallArgTs>(WrapperCallArgs)...);
349   }
350 
351   /// Disconnect from the target process.
352   ///
353   /// This should be called after the JIT session is shut down.
354   virtual Error disconnect() = 0;
355 
356 protected:
357 
358   std::shared_ptr<SymbolStringPool> SSP;
359   std::unique_ptr<TaskDispatcher> D;
360   ExecutionSession *ES = nullptr;
361   Triple TargetTriple;
362   unsigned PageSize = 0;
363   JITDispatchInfo JDI;
364   MemoryAccess *MemAccess = nullptr;
365   jitlink::JITLinkMemoryManager *MemMgr = nullptr;
366   StringMap<ExecutorAddr> BootstrapSymbols;
367 };
368 
369 /// A ExecutorProcessControl instance that asserts if any of its methods are
370 /// used. Suitable for use is unit tests, and by ORC clients who haven't moved
371 /// to ExecutorProcessControl-based APIs yet.
372 class UnsupportedExecutorProcessControl : public ExecutorProcessControl {
373 public:
374   UnsupportedExecutorProcessControl(
375       std::shared_ptr<SymbolStringPool> SSP = nullptr,
376       std::unique_ptr<TaskDispatcher> D = nullptr,
377       const std::string &TT = "", unsigned PageSize = 0)
378       : ExecutorProcessControl(SSP ? std::move(SSP)
379                                : std::make_shared<SymbolStringPool>(),
380                                D ? std::move(D)
381                                : std::make_unique<InPlaceTaskDispatcher>()) {
382     this->TargetTriple = Triple(TT);
383     this->PageSize = PageSize;
384   }
385 
386   Expected<tpctypes::DylibHandle> loadDylib(const char *DylibPath) override {
387     llvm_unreachable("Unsupported");
388   }
389 
390   Expected<std::vector<tpctypes::LookupResult>>
391   lookupSymbols(ArrayRef<LookupRequest> Request) override {
392     llvm_unreachable("Unsupported");
393   }
394 
395   Expected<int32_t> runAsMain(ExecutorAddr MainFnAddr,
396                               ArrayRef<std::string> Args) override {
397     llvm_unreachable("Unsupported");
398   }
399 
400   void callWrapperAsync(ExecutorAddr WrapperFnAddr,
401                         IncomingWFRHandler OnComplete,
402                         ArrayRef<char> ArgBuffer) override {
403     llvm_unreachable("Unsupported");
404   }
405 
406   Error disconnect() override { return Error::success(); }
407 };
408 
409 /// A ExecutorProcessControl implementation targeting the current process.
410 class SelfExecutorProcessControl
411     : public ExecutorProcessControl,
412       private ExecutorProcessControl::MemoryAccess {
413 public:
414   SelfExecutorProcessControl(
415       std::shared_ptr<SymbolStringPool> SSP, std::unique_ptr<TaskDispatcher> D,
416       Triple TargetTriple, unsigned PageSize,
417       std::unique_ptr<jitlink::JITLinkMemoryManager> MemMgr);
418 
419   /// Create a SelfExecutorProcessControl with the given symbol string pool and
420   /// memory manager.
421   /// If no symbol string pool is given then one will be created.
422   /// If no memory manager is given a jitlink::InProcessMemoryManager will
423   /// be created and used by default.
424   static Expected<std::unique_ptr<SelfExecutorProcessControl>>
425   Create(std::shared_ptr<SymbolStringPool> SSP = nullptr,
426          std::unique_ptr<TaskDispatcher> D = nullptr,
427          std::unique_ptr<jitlink::JITLinkMemoryManager> MemMgr = nullptr);
428 
429   Expected<tpctypes::DylibHandle> loadDylib(const char *DylibPath) override;
430 
431   Expected<std::vector<tpctypes::LookupResult>>
432   lookupSymbols(ArrayRef<LookupRequest> Request) override;
433 
434   Expected<int32_t> runAsMain(ExecutorAddr MainFnAddr,
435                               ArrayRef<std::string> Args) override;
436 
437   void callWrapperAsync(ExecutorAddr WrapperFnAddr,
438                         IncomingWFRHandler OnComplete,
439                         ArrayRef<char> ArgBuffer) override;
440 
441   Error disconnect() override;
442 
443 private:
444   void writeUInt8sAsync(ArrayRef<tpctypes::UInt8Write> Ws,
445                         WriteResultFn OnWriteComplete) override;
446 
447   void writeUInt16sAsync(ArrayRef<tpctypes::UInt16Write> Ws,
448                          WriteResultFn OnWriteComplete) override;
449 
450   void writeUInt32sAsync(ArrayRef<tpctypes::UInt32Write> Ws,
451                          WriteResultFn OnWriteComplete) override;
452 
453   void writeUInt64sAsync(ArrayRef<tpctypes::UInt64Write> Ws,
454                          WriteResultFn OnWriteComplete) override;
455 
456   void writeBuffersAsync(ArrayRef<tpctypes::BufferWrite> Ws,
457                          WriteResultFn OnWriteComplete) override;
458 
459   static shared::CWrapperFunctionResult
460   jitDispatchViaWrapperFunctionManager(void *Ctx, const void *FnTag,
461                                        const char *Data, size_t Size);
462 
463   std::unique_ptr<jitlink::JITLinkMemoryManager> OwnedMemMgr;
464   char GlobalManglingPrefix = 0;
465   std::vector<std::unique_ptr<sys::DynamicLibrary>> DynamicLibraries;
466 };
467 
468 } // end namespace orc
469 } // end namespace llvm
470 
471 #endif // LLVM_EXECUTIONENGINE_ORC_EXECUTORPROCESSCONTROL_H
472