1 //===--- amdgpu/impl/system.cpp ----------------------------------- C++ -*-===//
2 //
3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4 // See https://llvm.org/LICENSE.txt for license information.
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6 //
7 //===----------------------------------------------------------------------===//
8 #include <libelf.h>
9 
10 #include <cassert>
11 #include <sstream>
12 #include <string>
13 
14 #include "internal.h"
15 #include "rt.h"
16 
17 #include "msgpack.h"
18 
19 namespace hsa {
20 // Wrap HSA iterate API in a shim that allows passing general callables
21 template <typename C>
22 hsa_status_t executable_iterate_symbols(hsa_executable_t executable, C cb) {
23   auto L = [](hsa_executable_t executable, hsa_executable_symbol_t symbol,
24               void *data) -> hsa_status_t {
25     C *unwrapped = static_cast<C *>(data);
26     return (*unwrapped)(executable, symbol);
27   };
28   return hsa_executable_iterate_symbols(executable, L,
29                                         static_cast<void *>(&cb));
30 }
31 } // namespace hsa
32 
33 typedef unsigned char *address;
34 /*
35  * Note descriptors.
36  */
37 // FreeBSD already declares Elf_Note (indirectly via <libelf.h>)
38 #if !defined(__FreeBSD__)
39 typedef struct {
40   uint32_t n_namesz; /* Length of note's name. */
41   uint32_t n_descsz; /* Length of note's value. */
42   uint32_t n_type;   /* Type of note. */
43   // then name
44   // then padding, optional
45   // then desc, at 4 byte alignment (not 8, despite being elf64)
46 } Elf_Note;
47 #endif
48 
49 // The following include file and following structs/enums
50 // have been replicated on a per-use basis below. For example,
51 // llvm::AMDGPU::HSAMD::Kernel::Metadata has several fields,
52 // but we may care only about kernargSegmentSize_ for now, so
53 // we just include that field in our KernelMD implementation. We
54 // chose this approach to replicate in order to avoid forcing
55 // a dependency on LLVM_INCLUDE_DIR just to compile the runtime.
56 // #include "llvm/Support/AMDGPUMetadata.h"
57 // typedef llvm::AMDGPU::HSAMD::Metadata CodeObjectMD;
58 // typedef llvm::AMDGPU::HSAMD::Kernel::Metadata KernelMD;
59 // typedef llvm::AMDGPU::HSAMD::Kernel::Arg::Metadata KernelArgMD;
60 // using llvm::AMDGPU::HSAMD::AccessQualifier;
61 // using llvm::AMDGPU::HSAMD::AddressSpaceQualifier;
62 // using llvm::AMDGPU::HSAMD::ValueKind;
63 // using llvm::AMDGPU::HSAMD::ValueType;
64 
65 class KernelArgMD {
66 public:
67   enum class ValueKind {
68     HiddenGlobalOffsetX,
69     HiddenGlobalOffsetY,
70     HiddenGlobalOffsetZ,
71     HiddenNone,
72     HiddenPrintfBuffer,
73     HiddenDefaultQueue,
74     HiddenCompletionAction,
75     HiddenMultiGridSyncArg,
76     HiddenHostcallBuffer,
77     Unknown
78   };
79 
80   KernelArgMD()
81       : name_(std::string()), typeName_(std::string()), size_(0), offset_(0),
82         align_(0), valueKind_(ValueKind::Unknown) {}
83 
84   // fields
85   std::string name_;
86   std::string typeName_;
87   uint32_t size_;
88   uint32_t offset_;
89   uint32_t align_;
90   ValueKind valueKind_;
91 };
92 
93 class KernelMD {
94 public:
95   KernelMD() : kernargSegmentSize_(0ull) {}
96 
97   // fields
98   uint64_t kernargSegmentSize_;
99 };
100 
101 static const std::map<std::string, KernelArgMD::ValueKind> ArgValueKind = {
102     //    Including only those fields that are relevant to the runtime.
103     //    {"ByValue", KernelArgMD::ValueKind::ByValue},
104     //    {"GlobalBuffer", KernelArgMD::ValueKind::GlobalBuffer},
105     //    {"DynamicSharedPointer",
106     //    KernelArgMD::ValueKind::DynamicSharedPointer},
107     //    {"Sampler", KernelArgMD::ValueKind::Sampler},
108     //    {"Image", KernelArgMD::ValueKind::Image},
109     //    {"Pipe", KernelArgMD::ValueKind::Pipe},
110     //    {"Queue", KernelArgMD::ValueKind::Queue},
111     {"HiddenGlobalOffsetX", KernelArgMD::ValueKind::HiddenGlobalOffsetX},
112     {"HiddenGlobalOffsetY", KernelArgMD::ValueKind::HiddenGlobalOffsetY},
113     {"HiddenGlobalOffsetZ", KernelArgMD::ValueKind::HiddenGlobalOffsetZ},
114     {"HiddenNone", KernelArgMD::ValueKind::HiddenNone},
115     {"HiddenPrintfBuffer", KernelArgMD::ValueKind::HiddenPrintfBuffer},
116     {"HiddenDefaultQueue", KernelArgMD::ValueKind::HiddenDefaultQueue},
117     {"HiddenCompletionAction", KernelArgMD::ValueKind::HiddenCompletionAction},
118     {"HiddenMultiGridSyncArg", KernelArgMD::ValueKind::HiddenMultiGridSyncArg},
119     {"HiddenHostcallBuffer", KernelArgMD::ValueKind::HiddenHostcallBuffer},
120     // v3
121     //    {"by_value", KernelArgMD::ValueKind::ByValue},
122     //    {"global_buffer", KernelArgMD::ValueKind::GlobalBuffer},
123     //    {"dynamic_shared_pointer",
124     //    KernelArgMD::ValueKind::DynamicSharedPointer},
125     //    {"sampler", KernelArgMD::ValueKind::Sampler},
126     //    {"image", KernelArgMD::ValueKind::Image},
127     //    {"pipe", KernelArgMD::ValueKind::Pipe},
128     //    {"queue", KernelArgMD::ValueKind::Queue},
129     {"hidden_global_offset_x", KernelArgMD::ValueKind::HiddenGlobalOffsetX},
130     {"hidden_global_offset_y", KernelArgMD::ValueKind::HiddenGlobalOffsetY},
131     {"hidden_global_offset_z", KernelArgMD::ValueKind::HiddenGlobalOffsetZ},
132     {"hidden_none", KernelArgMD::ValueKind::HiddenNone},
133     {"hidden_printf_buffer", KernelArgMD::ValueKind::HiddenPrintfBuffer},
134     {"hidden_default_queue", KernelArgMD::ValueKind::HiddenDefaultQueue},
135     {"hidden_completion_action",
136      KernelArgMD::ValueKind::HiddenCompletionAction},
137     {"hidden_multigrid_sync_arg",
138      KernelArgMD::ValueKind::HiddenMultiGridSyncArg},
139     {"hidden_hostcall_buffer", KernelArgMD::ValueKind::HiddenHostcallBuffer},
140 };
141 
142 namespace core {
143 
144 hsa_status_t callbackEvent(const hsa_amd_event_t *event, void *data) {
145 #if (ROCM_VERSION_MAJOR >= 3) ||                                               \
146     (ROCM_VERSION_MAJOR >= 2 && ROCM_VERSION_MINOR >= 3)
147   if (event->event_type == HSA_AMD_GPU_MEMORY_FAULT_EVENT) {
148 #else
149   if (event->event_type == GPU_MEMORY_FAULT_EVENT) {
150 #endif
151     hsa_amd_gpu_memory_fault_info_t memory_fault = event->memory_fault;
152     // memory_fault.agent
153     // memory_fault.virtual_address
154     // memory_fault.fault_reason_mask
155     // fprintf("[GPU Error at %p: Reason is ", memory_fault.virtual_address);
156     std::stringstream stream;
157     stream << std::hex << (uintptr_t)memory_fault.virtual_address;
158     std::string addr("0x" + stream.str());
159 
160     std::string err_string = "[GPU Memory Error] Addr: " + addr;
161     err_string += " Reason: ";
162     if (!(memory_fault.fault_reason_mask & 0x00111111)) {
163       err_string += "No Idea! ";
164     } else {
165       if (memory_fault.fault_reason_mask & 0x00000001)
166         err_string += "Page not present or supervisor privilege. ";
167       if (memory_fault.fault_reason_mask & 0x00000010)
168         err_string += "Write access to a read-only page. ";
169       if (memory_fault.fault_reason_mask & 0x00000100)
170         err_string += "Execute access to a page marked NX. ";
171       if (memory_fault.fault_reason_mask & 0x00001000)
172         err_string += "Host access only. ";
173       if (memory_fault.fault_reason_mask & 0x00010000)
174         err_string += "ECC failure (if supported by HW). ";
175       if (memory_fault.fault_reason_mask & 0x00100000)
176         err_string += "Can't determine the exact fault address. ";
177     }
178     fprintf(stderr, "%s\n", err_string.c_str());
179     return HSA_STATUS_ERROR;
180   }
181   return HSA_STATUS_SUCCESS;
182 }
183 
184 hsa_status_t atl_init_gpu_context() {
185   hsa_status_t err;
186   err = hsa_init();
187   if (err != HSA_STATUS_SUCCESS)
188     return HSA_STATUS_ERROR;
189 
190   err = hsa_amd_register_system_event_handler(callbackEvent, NULL);
191   if (err != HSA_STATUS_SUCCESS) {
192     printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
193            "Registering the system for memory faults", get_error_string(err));
194     return HSA_STATUS_ERROR;
195   }
196 
197   return HSA_STATUS_SUCCESS;
198 }
199 
200 static bool isImplicit(KernelArgMD::ValueKind value_kind) {
201   switch (value_kind) {
202   case KernelArgMD::ValueKind::HiddenGlobalOffsetX:
203   case KernelArgMD::ValueKind::HiddenGlobalOffsetY:
204   case KernelArgMD::ValueKind::HiddenGlobalOffsetZ:
205   case KernelArgMD::ValueKind::HiddenNone:
206   case KernelArgMD::ValueKind::HiddenPrintfBuffer:
207   case KernelArgMD::ValueKind::HiddenDefaultQueue:
208   case KernelArgMD::ValueKind::HiddenCompletionAction:
209   case KernelArgMD::ValueKind::HiddenMultiGridSyncArg:
210   case KernelArgMD::ValueKind::HiddenHostcallBuffer:
211     return true;
212   default:
213     return false;
214   }
215 }
216 
217 static std::pair<unsigned char *, unsigned char *>
218 find_metadata(void *binary, size_t binSize) {
219   std::pair<unsigned char *, unsigned char *> failure = {nullptr, nullptr};
220 
221   Elf *e = elf_memory(static_cast<char *>(binary), binSize);
222   if (elf_kind(e) != ELF_K_ELF) {
223     return failure;
224   }
225 
226   size_t numpHdrs;
227   if (elf_getphdrnum(e, &numpHdrs) != 0) {
228     return failure;
229   }
230 
231   Elf64_Phdr *pHdrs = elf64_getphdr(e);
232   for (size_t i = 0; i < numpHdrs; ++i) {
233     Elf64_Phdr pHdr = pHdrs[i];
234 
235     // Look for the runtime metadata note
236     if (pHdr.p_type == PT_NOTE && pHdr.p_align >= sizeof(int)) {
237       // Iterate over the notes in this segment
238       address ptr = (address)binary + pHdr.p_offset;
239       address segmentEnd = ptr + pHdr.p_filesz;
240 
241       while (ptr < segmentEnd) {
242         Elf_Note *note = reinterpret_cast<Elf_Note *>(ptr);
243         address name = (address)&note[1];
244 
245         if (note->n_type == 7 || note->n_type == 8) {
246           return failure;
247         } else if (note->n_type == 10 /* NT_AMD_AMDGPU_HSA_METADATA */ &&
248                    note->n_namesz == sizeof "AMD" &&
249                    !memcmp(name, "AMD", note->n_namesz)) {
250           // code object v2 uses yaml metadata, no longer supported
251           return failure;
252         } else if (note->n_type == 32 /* NT_AMDGPU_METADATA */ &&
253                    note->n_namesz == sizeof "AMDGPU" &&
254                    !memcmp(name, "AMDGPU", note->n_namesz)) {
255 
256           // n_descsz = 485
257           // value is padded to 4 byte alignment, may want to move end up to
258           // match
259           size_t offset = sizeof(uint32_t) * 3 /* fields */
260                           + sizeof("AMDGPU")   /* name */
261                           + 1 /* padding to 4 byte alignment */;
262 
263           // Including the trailing padding means both pointers are 4 bytes
264           // aligned, which may be useful later.
265           unsigned char *metadata_start = (unsigned char *)ptr + offset;
266           unsigned char *metadata_end =
267               metadata_start + core::alignUp(note->n_descsz, 4);
268           return {metadata_start, metadata_end};
269         }
270         ptr += sizeof(*note) + core::alignUp(note->n_namesz, sizeof(int)) +
271                core::alignUp(note->n_descsz, sizeof(int));
272       }
273     }
274   }
275 
276   return failure;
277 }
278 
279 namespace {
280 int map_lookup_array(msgpack::byte_range message, const char *needle,
281                      msgpack::byte_range *res, uint64_t *size) {
282   unsigned count = 0;
283   struct s : msgpack::functors_defaults<s> {
284     s(unsigned &count, uint64_t *size) : count(count), size(size) {}
285     unsigned &count;
286     uint64_t *size;
287     const unsigned char *handle_array(uint64_t N, msgpack::byte_range bytes) {
288       count++;
289       *size = N;
290       return bytes.end;
291     }
292   };
293 
294   msgpack::foreach_map(message,
295                        [&](msgpack::byte_range key, msgpack::byte_range value) {
296                          if (msgpack::message_is_string(key, needle)) {
297                            // If the message is an array, record number of
298                            // elements in *size
299                            msgpack::handle_msgpack<s>(value, {count, size});
300                            // return the whole array
301                            *res = value;
302                          }
303                        });
304   // Only claim success if exactly one key/array pair matched
305   return count != 1;
306 }
307 
308 int map_lookup_string(msgpack::byte_range message, const char *needle,
309                       std::string *res) {
310   unsigned count = 0;
311   struct s : public msgpack::functors_defaults<s> {
312     s(unsigned &count, std::string *res) : count(count), res(res) {}
313     unsigned &count;
314     std::string *res;
315     void handle_string(size_t N, const unsigned char *str) {
316       count++;
317       *res = std::string(str, str + N);
318     }
319   };
320   msgpack::foreach_map(message,
321                        [&](msgpack::byte_range key, msgpack::byte_range value) {
322                          if (msgpack::message_is_string(key, needle)) {
323                            msgpack::handle_msgpack<s>(value, {count, res});
324                          }
325                        });
326   return count != 1;
327 }
328 
329 int map_lookup_uint64_t(msgpack::byte_range message, const char *needle,
330                         uint64_t *res) {
331   unsigned count = 0;
332   msgpack::foreach_map(message,
333                        [&](msgpack::byte_range key, msgpack::byte_range value) {
334                          if (msgpack::message_is_string(key, needle)) {
335                            msgpack::foronly_unsigned(value, [&](uint64_t x) {
336                              count++;
337                              *res = x;
338                            });
339                          }
340                        });
341   return count != 1;
342 }
343 
344 int array_lookup_element(msgpack::byte_range message, uint64_t elt,
345                          msgpack::byte_range *res) {
346   int rc = 1;
347   uint64_t i = 0;
348   msgpack::foreach_array(message, [&](msgpack::byte_range value) {
349     if (i == elt) {
350       *res = value;
351       rc = 0;
352     }
353     i++;
354   });
355   return rc;
356 }
357 
358 int populate_kernelArgMD(msgpack::byte_range args_element,
359                          KernelArgMD *kernelarg) {
360   using namespace msgpack;
361   int error = 0;
362   foreach_map(args_element, [&](byte_range key, byte_range value) -> void {
363     if (message_is_string(key, ".name")) {
364       foronly_string(value, [&](size_t N, const unsigned char *str) {
365         kernelarg->name_ = std::string(str, str + N);
366       });
367     } else if (message_is_string(key, ".type_name")) {
368       foronly_string(value, [&](size_t N, const unsigned char *str) {
369         kernelarg->typeName_ = std::string(str, str + N);
370       });
371     } else if (message_is_string(key, ".size")) {
372       foronly_unsigned(value, [&](uint64_t x) { kernelarg->size_ = x; });
373     } else if (message_is_string(key, ".offset")) {
374       foronly_unsigned(value, [&](uint64_t x) { kernelarg->offset_ = x; });
375     } else if (message_is_string(key, ".value_kind")) {
376       foronly_string(value, [&](size_t N, const unsigned char *str) {
377         std::string s = std::string(str, str + N);
378         auto itValueKind = ArgValueKind.find(s);
379         if (itValueKind != ArgValueKind.end()) {
380           kernelarg->valueKind_ = itValueKind->second;
381         }
382       });
383     }
384   });
385   return error;
386 }
387 } // namespace
388 
389 static hsa_status_t get_code_object_custom_metadata(
390     void *binary, size_t binSize,
391     std::map<std::string, atl_kernel_info_t> &KernelInfoTable) {
392   // parse code object with different keys from v2
393   // also, the kernel name is not the same as the symbol name -- so a
394   // symbol->name map is needed
395 
396   std::pair<unsigned char *, unsigned char *> metadata =
397       find_metadata(binary, binSize);
398   if (!metadata.first) {
399     return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
400   }
401 
402   uint64_t kernelsSize = 0;
403   int msgpack_errors = 0;
404   msgpack::byte_range kernel_array;
405   msgpack_errors =
406       map_lookup_array({metadata.first, metadata.second}, "amdhsa.kernels",
407                        &kernel_array, &kernelsSize);
408   if (msgpack_errors != 0) {
409     printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
410            "kernels lookup in program metadata");
411     return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
412   }
413 
414   for (size_t i = 0; i < kernelsSize; i++) {
415     assert(msgpack_errors == 0);
416     std::string kernelName;
417     std::string symbolName;
418 
419     msgpack::byte_range element;
420     msgpack_errors += array_lookup_element(kernel_array, i, &element);
421     if (msgpack_errors != 0) {
422       printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
423              "element lookup in kernel metadata");
424       return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
425     }
426 
427     msgpack_errors += map_lookup_string(element, ".name", &kernelName);
428     msgpack_errors += map_lookup_string(element, ".symbol", &symbolName);
429     if (msgpack_errors != 0) {
430       printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
431              "strings lookup in kernel metadata");
432       return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
433     }
434 
435     // Make sure that kernelName + ".kd" == symbolName
436     if ((kernelName + ".kd") != symbolName) {
437       printf("[%s:%d] Kernel name mismatching symbol: %s != %s + .kd\n",
438              __FILE__, __LINE__, symbolName.c_str(), kernelName.c_str());
439       return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
440     }
441 
442     atl_kernel_info_t info = {0, 0, 0, 0, 0, 0, 0, 0, 0, {}, {}, {}};
443 
444     uint64_t sgpr_count, vgpr_count, sgpr_spill_count, vgpr_spill_count;
445     msgpack_errors += map_lookup_uint64_t(element, ".sgpr_count", &sgpr_count);
446     if (msgpack_errors != 0) {
447       printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
448              "sgpr count metadata lookup in kernel metadata");
449       return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
450     }
451 
452     info.sgpr_count = sgpr_count;
453 
454     msgpack_errors += map_lookup_uint64_t(element, ".vgpr_count", &vgpr_count);
455     if (msgpack_errors != 0) {
456       printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
457              "vgpr count metadata lookup in kernel metadata");
458       return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
459     }
460 
461     info.vgpr_count = vgpr_count;
462 
463     msgpack_errors +=
464         map_lookup_uint64_t(element, ".sgpr_spill_count", &sgpr_spill_count);
465     if (msgpack_errors != 0) {
466       printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
467              "sgpr spill count metadata lookup in kernel metadata");
468       return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
469     }
470 
471     info.sgpr_spill_count = sgpr_spill_count;
472 
473     msgpack_errors +=
474         map_lookup_uint64_t(element, ".vgpr_spill_count", &vgpr_spill_count);
475     if (msgpack_errors != 0) {
476       printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
477              "vgpr spill count metadata lookup in kernel metadata");
478       return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
479     }
480 
481     info.vgpr_spill_count = vgpr_spill_count;
482 
483     size_t kernel_explicit_args_size = 0;
484     uint64_t kernel_segment_size;
485     msgpack_errors += map_lookup_uint64_t(element, ".kernarg_segment_size",
486                                           &kernel_segment_size);
487     if (msgpack_errors != 0) {
488       printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
489              "kernarg segment size metadata lookup in kernel metadata");
490       return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
491     }
492 
493     bool hasHiddenArgs = false;
494     if (kernel_segment_size > 0) {
495       uint64_t argsSize;
496       size_t offset = 0;
497 
498       msgpack::byte_range args_array;
499       msgpack_errors +=
500           map_lookup_array(element, ".args", &args_array, &argsSize);
501       if (msgpack_errors != 0) {
502         printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
503                "kernel args metadata lookup in kernel metadata");
504         return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
505       }
506 
507       info.num_args = argsSize;
508 
509       for (size_t i = 0; i < argsSize; ++i) {
510         KernelArgMD lcArg;
511 
512         msgpack::byte_range args_element;
513         msgpack_errors += array_lookup_element(args_array, i, &args_element);
514         if (msgpack_errors != 0) {
515           printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
516                  "iterate args map in kernel args metadata");
517           return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
518         }
519 
520         msgpack_errors += populate_kernelArgMD(args_element, &lcArg);
521         if (msgpack_errors != 0) {
522           printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
523                  "iterate args map in kernel args metadata");
524           return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
525         }
526         // populate info with sizes and offsets
527         info.arg_sizes.push_back(lcArg.size_);
528         // v3 has offset field and not align field
529         size_t new_offset = lcArg.offset_;
530         size_t padding = new_offset - offset;
531         offset = new_offset;
532         info.arg_offsets.push_back(lcArg.offset_);
533         DEBUG_PRINT("Arg[%lu] \"%s\" (%u, %u)\n", i, lcArg.name_.c_str(),
534                     lcArg.size_, lcArg.offset_);
535         offset += lcArg.size_;
536 
537         // check if the arg is a hidden/implicit arg
538         // this logic assumes that all hidden args are 8-byte aligned
539         if (!isImplicit(lcArg.valueKind_)) {
540           kernel_explicit_args_size += lcArg.size_;
541         } else {
542           hasHiddenArgs = true;
543         }
544         kernel_explicit_args_size += padding;
545       }
546     }
547 
548     // add size of implicit args, e.g.: offset x, y and z and pipe pointer, but
549     // in ATMI, do not count the compiler set implicit args, but set your own
550     // implicit args by discounting the compiler set implicit args
551     info.kernel_segment_size =
552         (hasHiddenArgs ? kernel_explicit_args_size : kernel_segment_size) +
553         sizeof(atmi_implicit_args_t);
554     DEBUG_PRINT("[%s: kernarg seg size] (%lu --> %u)\n", kernelName.c_str(),
555                 kernel_segment_size, info.kernel_segment_size);
556 
557     // kernel received, now add it to the kernel info table
558     KernelInfoTable[kernelName] = info;
559   }
560 
561   return HSA_STATUS_SUCCESS;
562 }
563 
564 static hsa_status_t
565 populate_InfoTables(hsa_executable_symbol_t symbol,
566                     std::map<std::string, atl_kernel_info_t> &KernelInfoTable,
567                     std::map<std::string, atl_symbol_info_t> &SymbolInfoTable) {
568   hsa_symbol_kind_t type;
569 
570   uint32_t name_length;
571   hsa_status_t err;
572   err = hsa_executable_symbol_get_info(symbol, HSA_EXECUTABLE_SYMBOL_INFO_TYPE,
573                                        &type);
574   if (err != HSA_STATUS_SUCCESS) {
575     printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
576            "Symbol info extraction", get_error_string(err));
577     return err;
578   }
579   DEBUG_PRINT("Exec Symbol type: %d\n", type);
580   if (type == HSA_SYMBOL_KIND_KERNEL) {
581     err = hsa_executable_symbol_get_info(
582         symbol, HSA_EXECUTABLE_SYMBOL_INFO_NAME_LENGTH, &name_length);
583     if (err != HSA_STATUS_SUCCESS) {
584       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
585              "Symbol info extraction", get_error_string(err));
586       return err;
587     }
588     char *name = reinterpret_cast<char *>(malloc(name_length + 1));
589     err = hsa_executable_symbol_get_info(symbol,
590                                          HSA_EXECUTABLE_SYMBOL_INFO_NAME, name);
591     if (err != HSA_STATUS_SUCCESS) {
592       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
593              "Symbol info extraction", get_error_string(err));
594       return err;
595     }
596     // remove the suffix .kd from symbol name.
597     name[name_length - 3] = 0;
598 
599     atl_kernel_info_t info;
600     std::string kernelName(name);
601     // by now, the kernel info table should already have an entry
602     // because the non-ROCr custom code object parsing is called before
603     // iterating over the code object symbols using ROCr
604     if (KernelInfoTable.find(kernelName) == KernelInfoTable.end()) {
605       if (HSA_STATUS_ERROR_INVALID_CODE_OBJECT != HSA_STATUS_SUCCESS) {
606         printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
607                "Finding the entry kernel info table",
608                get_error_string(HSA_STATUS_ERROR_INVALID_CODE_OBJECT));
609         exit(1);
610       }
611     }
612     // found, so assign and update
613     info = KernelInfoTable[kernelName];
614 
615     /* Extract dispatch information from the symbol */
616     err = hsa_executable_symbol_get_info(
617         symbol, HSA_EXECUTABLE_SYMBOL_INFO_KERNEL_OBJECT,
618         &(info.kernel_object));
619     if (err != HSA_STATUS_SUCCESS) {
620       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
621              "Extracting the symbol from the executable",
622              get_error_string(err));
623       return err;
624     }
625     err = hsa_executable_symbol_get_info(
626         symbol, HSA_EXECUTABLE_SYMBOL_INFO_KERNEL_GROUP_SEGMENT_SIZE,
627         &(info.group_segment_size));
628     if (err != HSA_STATUS_SUCCESS) {
629       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
630              "Extracting the group segment size from the executable",
631              get_error_string(err));
632       return err;
633     }
634     err = hsa_executable_symbol_get_info(
635         symbol, HSA_EXECUTABLE_SYMBOL_INFO_KERNEL_PRIVATE_SEGMENT_SIZE,
636         &(info.private_segment_size));
637     if (err != HSA_STATUS_SUCCESS) {
638       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
639              "Extracting the private segment from the executable",
640              get_error_string(err));
641       return err;
642     }
643 
644     DEBUG_PRINT(
645         "Kernel %s --> %lx symbol %u group segsize %u pvt segsize %u bytes "
646         "kernarg\n",
647         kernelName.c_str(), info.kernel_object, info.group_segment_size,
648         info.private_segment_size, info.kernel_segment_size);
649 
650     // assign it back to the kernel info table
651     KernelInfoTable[kernelName] = info;
652     free(name);
653   } else if (type == HSA_SYMBOL_KIND_VARIABLE) {
654     err = hsa_executable_symbol_get_info(
655         symbol, HSA_EXECUTABLE_SYMBOL_INFO_NAME_LENGTH, &name_length);
656     if (err != HSA_STATUS_SUCCESS) {
657       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
658              "Symbol info extraction", get_error_string(err));
659       return err;
660     }
661     char *name = reinterpret_cast<char *>(malloc(name_length + 1));
662     err = hsa_executable_symbol_get_info(symbol,
663                                          HSA_EXECUTABLE_SYMBOL_INFO_NAME, name);
664     if (err != HSA_STATUS_SUCCESS) {
665       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
666              "Symbol info extraction", get_error_string(err));
667       return err;
668     }
669     name[name_length] = 0;
670 
671     atl_symbol_info_t info;
672 
673     err = hsa_executable_symbol_get_info(
674         symbol, HSA_EXECUTABLE_SYMBOL_INFO_VARIABLE_ADDRESS, &(info.addr));
675     if (err != HSA_STATUS_SUCCESS) {
676       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
677              "Symbol info address extraction", get_error_string(err));
678       return err;
679     }
680 
681     err = hsa_executable_symbol_get_info(
682         symbol, HSA_EXECUTABLE_SYMBOL_INFO_VARIABLE_SIZE, &(info.size));
683     if (err != HSA_STATUS_SUCCESS) {
684       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
685              "Symbol info size extraction", get_error_string(err));
686       return err;
687     }
688 
689     DEBUG_PRINT("Symbol %s = %p (%u bytes)\n", name, (void *)info.addr,
690                 info.size);
691     SymbolInfoTable[std::string(name)] = info;
692     free(name);
693   } else {
694     DEBUG_PRINT("Symbol is an indirect function\n");
695   }
696   return HSA_STATUS_SUCCESS;
697 }
698 
699 hsa_status_t RegisterModuleFromMemory(
700     std::map<std::string, atl_kernel_info_t> &KernelInfoTable,
701     std::map<std::string, atl_symbol_info_t> &SymbolInfoTable,
702     void *module_bytes, size_t module_size, hsa_agent_t agent,
703     hsa_status_t (*on_deserialized_data)(void *data, size_t size,
704                                          void *cb_state),
705     void *cb_state, std::vector<hsa_executable_t> &HSAExecutables) {
706   hsa_status_t err;
707   hsa_executable_t executable = {0};
708   hsa_profile_t agent_profile;
709 
710   err = hsa_agent_get_info(agent, HSA_AGENT_INFO_PROFILE, &agent_profile);
711   if (err != HSA_STATUS_SUCCESS) {
712     printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
713            "Query the agent profile", get_error_string(err));
714     return HSA_STATUS_ERROR;
715   }
716   // FIXME: Assume that every profile is FULL until we understand how to build
717   // GCN with base profile
718   agent_profile = HSA_PROFILE_FULL;
719   /* Create the empty executable.  */
720   err = hsa_executable_create(agent_profile, HSA_EXECUTABLE_STATE_UNFROZEN, "",
721                               &executable);
722   if (err != HSA_STATUS_SUCCESS) {
723     printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
724            "Create the executable", get_error_string(err));
725     return HSA_STATUS_ERROR;
726   }
727 
728   bool module_load_success = false;
729   do // Existing control flow used continue, preserve that for this patch
730   {
731     {
732       // Some metadata info is not available through ROCr API, so use custom
733       // code object metadata parsing to collect such metadata info
734 
735       err = get_code_object_custom_metadata(module_bytes, module_size,
736                                             KernelInfoTable);
737       if (err != HSA_STATUS_SUCCESS) {
738         DEBUG_PRINT("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
739                     "Getting custom code object metadata",
740                     get_error_string(err));
741         continue;
742       }
743 
744       // Deserialize code object.
745       hsa_code_object_t code_object = {0};
746       err = hsa_code_object_deserialize(module_bytes, module_size, NULL,
747                                         &code_object);
748       if (err != HSA_STATUS_SUCCESS) {
749         DEBUG_PRINT("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
750                     "Code Object Deserialization", get_error_string(err));
751         continue;
752       }
753       assert(0 != code_object.handle);
754 
755       // Mutating the device image here avoids another allocation & memcpy
756       void *code_object_alloc_data =
757           reinterpret_cast<void *>(code_object.handle);
758       hsa_status_t atmi_err =
759           on_deserialized_data(code_object_alloc_data, module_size, cb_state);
760       if (atmi_err != HSA_STATUS_SUCCESS) {
761         printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
762                "Error in deserialized_data callback",
763                get_error_string(atmi_err));
764         return atmi_err;
765       }
766 
767       /* Load the code object.  */
768       err =
769           hsa_executable_load_code_object(executable, agent, code_object, NULL);
770       if (err != HSA_STATUS_SUCCESS) {
771         DEBUG_PRINT("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
772                     "Loading the code object", get_error_string(err));
773         continue;
774       }
775 
776       // cannot iterate over symbols until executable is frozen
777     }
778     module_load_success = true;
779   } while (0);
780   DEBUG_PRINT("Modules loaded successful? %d\n", module_load_success);
781   if (module_load_success) {
782     /* Freeze the executable; it can now be queried for symbols.  */
783     err = hsa_executable_freeze(executable, "");
784     if (err != HSA_STATUS_SUCCESS) {
785       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
786              "Freeze the executable", get_error_string(err));
787       return HSA_STATUS_ERROR;
788     }
789 
790     err = hsa::executable_iterate_symbols(
791         executable,
792         [&](hsa_executable_t, hsa_executable_symbol_t symbol) -> hsa_status_t {
793           return populate_InfoTables(symbol, KernelInfoTable, SymbolInfoTable);
794         });
795     if (err != HSA_STATUS_SUCCESS) {
796       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
797              "Iterating over symbols for execuatable", get_error_string(err));
798       return HSA_STATUS_ERROR;
799     }
800 
801     // save the executable and destroy during finalize
802     HSAExecutables.push_back(executable);
803     return HSA_STATUS_SUCCESS;
804   } else {
805     return HSA_STATUS_ERROR;
806   }
807 }
808 
809 } // namespace core
810