1 //===--- amdgpu/impl/system.cpp ----------------------------------- C++ -*-===//
2 //
3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4 // See https://llvm.org/LICENSE.txt for license information.
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6 //
7 //===----------------------------------------------------------------------===//
8 #include <libelf.h>
9 
10 #include <cassert>
11 #include <sstream>
12 #include <string>
13 
14 #include "internal.h"
15 #include "rt.h"
16 
17 #include "msgpack.h"
18 
19 namespace hsa {
20 // Wrap HSA iterate API in a shim that allows passing general callables
21 template <typename C>
22 hsa_status_t executable_iterate_symbols(hsa_executable_t executable, C cb) {
23   auto L = [](hsa_executable_t executable, hsa_executable_symbol_t symbol,
24               void *data) -> hsa_status_t {
25     C *unwrapped = static_cast<C *>(data);
26     return (*unwrapped)(executable, symbol);
27   };
28   return hsa_executable_iterate_symbols(executable, L,
29                                         static_cast<void *>(&cb));
30 }
31 } // namespace hsa
32 
33 typedef unsigned char *address;
34 /*
35  * Note descriptors.
36  */
37 // FreeBSD already declares Elf_Note (indirectly via <libelf.h>)
38 #if !defined(__FreeBSD__)
39 typedef struct {
40   uint32_t n_namesz; /* Length of note's name. */
41   uint32_t n_descsz; /* Length of note's value. */
42   uint32_t n_type;   /* Type of note. */
43   // then name
44   // then padding, optional
45   // then desc, at 4 byte alignment (not 8, despite being elf64)
46 } Elf_Note;
47 #endif
48 
49 class KernelArgMD {
50 public:
51   enum class ValueKind {
52     HiddenGlobalOffsetX,
53     HiddenGlobalOffsetY,
54     HiddenGlobalOffsetZ,
55     HiddenNone,
56     HiddenPrintfBuffer,
57     HiddenDefaultQueue,
58     HiddenCompletionAction,
59     HiddenMultiGridSyncArg,
60     HiddenHostcallBuffer,
61     HiddenHeapV1,
62     Unknown
63   };
64 
65   KernelArgMD()
66       : name_(std::string()),  size_(0), offset_(0),
67         valueKind_(ValueKind::Unknown) {}
68 
69   // fields
70   std::string name_;
71   uint32_t size_;
72   uint32_t offset_;
73   ValueKind valueKind_;
74 };
75 
76 static const std::map<std::string, KernelArgMD::ValueKind> ArgValueKind = {
77     // v3
78     //    {"by_value", KernelArgMD::ValueKind::ByValue},
79     //    {"global_buffer", KernelArgMD::ValueKind::GlobalBuffer},
80     //    {"dynamic_shared_pointer",
81     //    KernelArgMD::ValueKind::DynamicSharedPointer},
82     //    {"sampler", KernelArgMD::ValueKind::Sampler},
83     //    {"image", KernelArgMD::ValueKind::Image},
84     //    {"pipe", KernelArgMD::ValueKind::Pipe},
85     //    {"queue", KernelArgMD::ValueKind::Queue},
86     {"hidden_global_offset_x", KernelArgMD::ValueKind::HiddenGlobalOffsetX},
87     {"hidden_global_offset_y", KernelArgMD::ValueKind::HiddenGlobalOffsetY},
88     {"hidden_global_offset_z", KernelArgMD::ValueKind::HiddenGlobalOffsetZ},
89     {"hidden_none", KernelArgMD::ValueKind::HiddenNone},
90     {"hidden_printf_buffer", KernelArgMD::ValueKind::HiddenPrintfBuffer},
91     {"hidden_default_queue", KernelArgMD::ValueKind::HiddenDefaultQueue},
92     {"hidden_completion_action",
93      KernelArgMD::ValueKind::HiddenCompletionAction},
94     {"hidden_multigrid_sync_arg",
95      KernelArgMD::ValueKind::HiddenMultiGridSyncArg},
96     {"hidden_hostcall_buffer", KernelArgMD::ValueKind::HiddenHostcallBuffer},
97     {"hidden_heap_v1", KernelArgMD::ValueKind::HiddenHeapV1}
98 };
99 
100 namespace core {
101 
102 hsa_status_t callbackEvent(const hsa_amd_event_t *event, void *data) {
103   if (event->event_type == HSA_AMD_GPU_MEMORY_FAULT_EVENT) {
104     hsa_amd_gpu_memory_fault_info_t memory_fault = event->memory_fault;
105     // memory_fault.agent
106     // memory_fault.virtual_address
107     // memory_fault.fault_reason_mask
108     // fprintf("[GPU Error at %p: Reason is ", memory_fault.virtual_address);
109     std::stringstream stream;
110     stream << std::hex << (uintptr_t)memory_fault.virtual_address;
111     std::string addr("0x" + stream.str());
112 
113     std::string err_string = "[GPU Memory Error] Addr: " + addr;
114     err_string += " Reason: ";
115     if (!(memory_fault.fault_reason_mask & 0x00111111)) {
116       err_string += "No Idea! ";
117     } else {
118       if (memory_fault.fault_reason_mask & 0x00000001)
119         err_string += "Page not present or supervisor privilege. ";
120       if (memory_fault.fault_reason_mask & 0x00000010)
121         err_string += "Write access to a read-only page. ";
122       if (memory_fault.fault_reason_mask & 0x00000100)
123         err_string += "Execute access to a page marked NX. ";
124       if (memory_fault.fault_reason_mask & 0x00001000)
125         err_string += "Host access only. ";
126       if (memory_fault.fault_reason_mask & 0x00010000)
127         err_string += "ECC failure (if supported by HW). ";
128       if (memory_fault.fault_reason_mask & 0x00100000)
129         err_string += "Can't determine the exact fault address. ";
130     }
131     fprintf(stderr, "%s\n", err_string.c_str());
132     return HSA_STATUS_ERROR;
133   }
134   return HSA_STATUS_SUCCESS;
135 }
136 
137 hsa_status_t atl_init_gpu_context() {
138   hsa_status_t err = hsa_amd_register_system_event_handler(callbackEvent, NULL);
139   if (err != HSA_STATUS_SUCCESS) {
140     printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
141            "Registering the system for memory faults", get_error_string(err));
142     return HSA_STATUS_ERROR;
143   }
144 
145   return HSA_STATUS_SUCCESS;
146 }
147 
148 static bool isImplicit(KernelArgMD::ValueKind value_kind) {
149   switch (value_kind) {
150   case KernelArgMD::ValueKind::HiddenGlobalOffsetX:
151   case KernelArgMD::ValueKind::HiddenGlobalOffsetY:
152   case KernelArgMD::ValueKind::HiddenGlobalOffsetZ:
153   case KernelArgMD::ValueKind::HiddenNone:
154   case KernelArgMD::ValueKind::HiddenPrintfBuffer:
155   case KernelArgMD::ValueKind::HiddenDefaultQueue:
156   case KernelArgMD::ValueKind::HiddenCompletionAction:
157   case KernelArgMD::ValueKind::HiddenMultiGridSyncArg:
158   case KernelArgMD::ValueKind::HiddenHostcallBuffer:
159   case KernelArgMD::ValueKind::HiddenHeapV1:
160     return true;
161   default:
162     return false;
163   }
164 }
165 
166 static std::pair<unsigned char *, unsigned char *>
167 find_metadata(void *binary, size_t binSize) {
168   std::pair<unsigned char *, unsigned char *> failure = {nullptr, nullptr};
169 
170   Elf *e = elf_memory(static_cast<char *>(binary), binSize);
171   if (elf_kind(e) != ELF_K_ELF) {
172     return failure;
173   }
174 
175   size_t numpHdrs;
176   if (elf_getphdrnum(e, &numpHdrs) != 0) {
177     return failure;
178   }
179 
180   Elf64_Phdr *pHdrs = elf64_getphdr(e);
181   for (size_t i = 0; i < numpHdrs; ++i) {
182     Elf64_Phdr pHdr = pHdrs[i];
183 
184     // Look for the runtime metadata note
185     if (pHdr.p_type == PT_NOTE && pHdr.p_align >= sizeof(int)) {
186       // Iterate over the notes in this segment
187       address ptr = (address)binary + pHdr.p_offset;
188       address segmentEnd = ptr + pHdr.p_filesz;
189 
190       while (ptr < segmentEnd) {
191         Elf_Note *note = reinterpret_cast<Elf_Note *>(ptr);
192         address name = (address)&note[1];
193 
194         if (note->n_type == 7 || note->n_type == 8) {
195           return failure;
196         } else if (note->n_type == 10 /* NT_AMD_AMDGPU_HSA_METADATA */ &&
197                    note->n_namesz == sizeof "AMD" &&
198                    !memcmp(name, "AMD", note->n_namesz)) {
199           // code object v2 uses yaml metadata, no longer supported
200           return failure;
201         } else if (note->n_type == 32 /* NT_AMDGPU_METADATA */ &&
202                    note->n_namesz == sizeof "AMDGPU" &&
203                    !memcmp(name, "AMDGPU", note->n_namesz)) {
204 
205           // n_descsz = 485
206           // value is padded to 4 byte alignment, may want to move end up to
207           // match
208           size_t offset = sizeof(uint32_t) * 3 /* fields */
209                           + sizeof("AMDGPU")   /* name */
210                           + 1 /* padding to 4 byte alignment */;
211 
212           // Including the trailing padding means both pointers are 4 bytes
213           // aligned, which may be useful later.
214           unsigned char *metadata_start = (unsigned char *)ptr + offset;
215           unsigned char *metadata_end =
216               metadata_start + core::alignUp(note->n_descsz, 4);
217           return {metadata_start, metadata_end};
218         }
219         ptr += sizeof(*note) + core::alignUp(note->n_namesz, sizeof(int)) +
220                core::alignUp(note->n_descsz, sizeof(int));
221       }
222     }
223   }
224 
225   return failure;
226 }
227 
228 namespace {
229 int map_lookup_array(msgpack::byte_range message, const char *needle,
230                      msgpack::byte_range *res, uint64_t *size) {
231   unsigned count = 0;
232   struct s : msgpack::functors_defaults<s> {
233     s(unsigned &count, uint64_t *size) : count(count), size(size) {}
234     unsigned &count;
235     uint64_t *size;
236     const unsigned char *handle_array(uint64_t N, msgpack::byte_range bytes) {
237       count++;
238       *size = N;
239       return bytes.end;
240     }
241   };
242 
243   msgpack::foreach_map(message,
244                        [&](msgpack::byte_range key, msgpack::byte_range value) {
245                          if (msgpack::message_is_string(key, needle)) {
246                            // If the message is an array, record number of
247                            // elements in *size
248                            msgpack::handle_msgpack<s>(value, {count, size});
249                            // return the whole array
250                            *res = value;
251                          }
252                        });
253   // Only claim success if exactly one key/array pair matched
254   return count != 1;
255 }
256 
257 int map_lookup_string(msgpack::byte_range message, const char *needle,
258                       std::string *res) {
259   unsigned count = 0;
260   struct s : public msgpack::functors_defaults<s> {
261     s(unsigned &count, std::string *res) : count(count), res(res) {}
262     unsigned &count;
263     std::string *res;
264     void handle_string(size_t N, const unsigned char *str) {
265       count++;
266       *res = std::string(str, str + N);
267     }
268   };
269   msgpack::foreach_map(message,
270                        [&](msgpack::byte_range key, msgpack::byte_range value) {
271                          if (msgpack::message_is_string(key, needle)) {
272                            msgpack::handle_msgpack<s>(value, {count, res});
273                          }
274                        });
275   return count != 1;
276 }
277 
278 int map_lookup_uint64_t(msgpack::byte_range message, const char *needle,
279                         uint64_t *res) {
280   unsigned count = 0;
281   msgpack::foreach_map(message,
282                        [&](msgpack::byte_range key, msgpack::byte_range value) {
283                          if (msgpack::message_is_string(key, needle)) {
284                            msgpack::foronly_unsigned(value, [&](uint64_t x) {
285                              count++;
286                              *res = x;
287                            });
288                          }
289                        });
290   return count != 1;
291 }
292 
293 int array_lookup_element(msgpack::byte_range message, uint64_t elt,
294                          msgpack::byte_range *res) {
295   int rc = 1;
296   uint64_t i = 0;
297   msgpack::foreach_array(message, [&](msgpack::byte_range value) {
298     if (i == elt) {
299       *res = value;
300       rc = 0;
301     }
302     i++;
303   });
304   return rc;
305 }
306 
307 int populate_kernelArgMD(msgpack::byte_range args_element,
308                          KernelArgMD *kernelarg) {
309   using namespace msgpack;
310   int error = 0;
311   foreach_map(args_element, [&](byte_range key, byte_range value) -> void {
312     if (message_is_string(key, ".name")) {
313       foronly_string(value, [&](size_t N, const unsigned char *str) {
314         kernelarg->name_ = std::string(str, str + N);
315       });
316     } else if (message_is_string(key, ".size")) {
317       foronly_unsigned(value, [&](uint64_t x) { kernelarg->size_ = x; });
318     } else if (message_is_string(key, ".offset")) {
319       foronly_unsigned(value, [&](uint64_t x) { kernelarg->offset_ = x; });
320     } else if (message_is_string(key, ".value_kind")) {
321       foronly_string(value, [&](size_t N, const unsigned char *str) {
322         std::string s = std::string(str, str + N);
323         auto itValueKind = ArgValueKind.find(s);
324         if (itValueKind != ArgValueKind.end()) {
325           kernelarg->valueKind_ = itValueKind->second;
326         }
327       });
328     }
329   });
330   return error;
331 }
332 } // namespace
333 
334 static hsa_status_t get_code_object_custom_metadata(
335     void *binary, size_t binSize,
336     std::map<std::string, atl_kernel_info_t> &KernelInfoTable) {
337   // parse code object with different keys from v2
338   // also, the kernel name is not the same as the symbol name -- so a
339   // symbol->name map is needed
340 
341   std::pair<unsigned char *, unsigned char *> metadata =
342       find_metadata(binary, binSize);
343   if (!metadata.first) {
344     return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
345   }
346 
347   uint64_t kernelsSize = 0;
348   int msgpack_errors = 0;
349   msgpack::byte_range kernel_array;
350   msgpack_errors =
351       map_lookup_array({metadata.first, metadata.second}, "amdhsa.kernels",
352                        &kernel_array, &kernelsSize);
353   if (msgpack_errors != 0) {
354     printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
355            "kernels lookup in program metadata");
356     return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
357   }
358 
359   for (size_t i = 0; i < kernelsSize; i++) {
360     assert(msgpack_errors == 0);
361     std::string kernelName;
362     std::string symbolName;
363 
364     msgpack::byte_range element;
365     msgpack_errors += array_lookup_element(kernel_array, i, &element);
366     if (msgpack_errors != 0) {
367       printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
368              "element lookup in kernel metadata");
369       return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
370     }
371 
372     msgpack_errors += map_lookup_string(element, ".name", &kernelName);
373     msgpack_errors += map_lookup_string(element, ".symbol", &symbolName);
374     if (msgpack_errors != 0) {
375       printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
376              "strings lookup in kernel metadata");
377       return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
378     }
379 
380     // Make sure that kernelName + ".kd" == symbolName
381     if ((kernelName + ".kd") != symbolName) {
382       printf("[%s:%d] Kernel name mismatching symbol: %s != %s + .kd\n",
383              __FILE__, __LINE__, symbolName.c_str(), kernelName.c_str());
384       return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
385     }
386 
387     atl_kernel_info_t info = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0};
388 
389     uint64_t sgpr_count, vgpr_count, sgpr_spill_count, vgpr_spill_count;
390     msgpack_errors += map_lookup_uint64_t(element, ".sgpr_count", &sgpr_count);
391     if (msgpack_errors != 0) {
392       printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
393              "sgpr count metadata lookup in kernel metadata");
394       return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
395     }
396 
397     info.sgpr_count = sgpr_count;
398 
399     msgpack_errors += map_lookup_uint64_t(element, ".vgpr_count", &vgpr_count);
400     if (msgpack_errors != 0) {
401       printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
402              "vgpr count metadata lookup in kernel metadata");
403       return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
404     }
405 
406     info.vgpr_count = vgpr_count;
407 
408     msgpack_errors +=
409         map_lookup_uint64_t(element, ".sgpr_spill_count", &sgpr_spill_count);
410     if (msgpack_errors != 0) {
411       printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
412              "sgpr spill count metadata lookup in kernel metadata");
413       return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
414     }
415 
416     info.sgpr_spill_count = sgpr_spill_count;
417 
418     msgpack_errors +=
419         map_lookup_uint64_t(element, ".vgpr_spill_count", &vgpr_spill_count);
420     if (msgpack_errors != 0) {
421       printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
422              "vgpr spill count metadata lookup in kernel metadata");
423       return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
424     }
425 
426     info.vgpr_spill_count = vgpr_spill_count;
427 
428     size_t kernel_explicit_args_size = 0;
429     uint64_t kernel_segment_size;
430     msgpack_errors += map_lookup_uint64_t(element, ".kernarg_segment_size",
431                                           &kernel_segment_size);
432     if (msgpack_errors != 0) {
433       printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
434              "kernarg segment size metadata lookup in kernel metadata");
435       return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
436     }
437 
438     bool hasHiddenArgs = false;
439     if (kernel_segment_size > 0) {
440       uint64_t argsSize;
441       size_t offset = 0;
442 
443       msgpack::byte_range args_array;
444       msgpack_errors +=
445           map_lookup_array(element, ".args", &args_array, &argsSize);
446       if (msgpack_errors != 0) {
447         printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
448                "kernel args metadata lookup in kernel metadata");
449         return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
450       }
451 
452       for (size_t i = 0; i < argsSize; ++i) {
453         KernelArgMD lcArg;
454 
455         msgpack::byte_range args_element;
456         msgpack_errors += array_lookup_element(args_array, i, &args_element);
457         if (msgpack_errors != 0) {
458           printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
459                  "iterate args map in kernel args metadata");
460           return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
461         }
462 
463         msgpack_errors += populate_kernelArgMD(args_element, &lcArg);
464         if (msgpack_errors != 0) {
465           printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
466                  "iterate args map in kernel args metadata");
467           return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
468         }
469         // v3 has offset field and not align field
470         size_t new_offset = lcArg.offset_;
471         size_t padding = new_offset - offset;
472         offset = new_offset;
473         DP("Arg[%lu] \"%s\" (%u, %u)\n", i, lcArg.name_.c_str(), lcArg.size_,
474            lcArg.offset_);
475         offset += lcArg.size_;
476 
477         // check if the arg is a hidden/implicit arg
478         // this logic assumes that all hidden args are 8-byte aligned
479         if (!isImplicit(lcArg.valueKind_)) {
480           info.explicit_argument_count++;
481           kernel_explicit_args_size += lcArg.size_;
482         } else {
483           info.implicit_argument_count++;
484           hasHiddenArgs = true;
485         }
486         kernel_explicit_args_size += padding;
487       }
488     }
489 
490     // TODO: Probably don't want this arithmetic
491     info.kernel_segment_size =
492         (hasHiddenArgs ? kernel_explicit_args_size : kernel_segment_size);
493     DP("[%s: kernarg seg size] (%lu --> %u)\n", kernelName.c_str(),
494        kernel_segment_size, info.kernel_segment_size);
495 
496     // kernel received, now add it to the kernel info table
497     KernelInfoTable[kernelName] = info;
498   }
499 
500   return HSA_STATUS_SUCCESS;
501 }
502 
503 static hsa_status_t
504 populate_InfoTables(hsa_executable_symbol_t symbol,
505                     std::map<std::string, atl_kernel_info_t> &KernelInfoTable,
506                     std::map<std::string, atl_symbol_info_t> &SymbolInfoTable) {
507   hsa_symbol_kind_t type;
508 
509   uint32_t name_length;
510   hsa_status_t err;
511   err = hsa_executable_symbol_get_info(symbol, HSA_EXECUTABLE_SYMBOL_INFO_TYPE,
512                                        &type);
513   if (err != HSA_STATUS_SUCCESS) {
514     printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
515            "Symbol info extraction", get_error_string(err));
516     return err;
517   }
518   DP("Exec Symbol type: %d\n", type);
519   if (type == HSA_SYMBOL_KIND_KERNEL) {
520     err = hsa_executable_symbol_get_info(
521         symbol, HSA_EXECUTABLE_SYMBOL_INFO_NAME_LENGTH, &name_length);
522     if (err != HSA_STATUS_SUCCESS) {
523       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
524              "Symbol info extraction", get_error_string(err));
525       return err;
526     }
527     char *name = reinterpret_cast<char *>(malloc(name_length + 1));
528     err = hsa_executable_symbol_get_info(symbol,
529                                          HSA_EXECUTABLE_SYMBOL_INFO_NAME, name);
530     if (err != HSA_STATUS_SUCCESS) {
531       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
532              "Symbol info extraction", get_error_string(err));
533       return err;
534     }
535     // remove the suffix .kd from symbol name.
536     name[name_length - 3] = 0;
537 
538     atl_kernel_info_t info;
539     std::string kernelName(name);
540     // by now, the kernel info table should already have an entry
541     // because the non-ROCr custom code object parsing is called before
542     // iterating over the code object symbols using ROCr
543     if (KernelInfoTable.find(kernelName) == KernelInfoTable.end()) {
544       DP("amdgpu internal consistency error\n");
545       return HSA_STATUS_ERROR;
546     }
547     // found, so assign and update
548     info = KernelInfoTable[kernelName];
549 
550     /* Extract dispatch information from the symbol */
551     err = hsa_executable_symbol_get_info(
552         symbol, HSA_EXECUTABLE_SYMBOL_INFO_KERNEL_OBJECT,
553         &(info.kernel_object));
554     if (err != HSA_STATUS_SUCCESS) {
555       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
556              "Extracting the symbol from the executable",
557              get_error_string(err));
558       return err;
559     }
560     err = hsa_executable_symbol_get_info(
561         symbol, HSA_EXECUTABLE_SYMBOL_INFO_KERNEL_GROUP_SEGMENT_SIZE,
562         &(info.group_segment_size));
563     if (err != HSA_STATUS_SUCCESS) {
564       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
565              "Extracting the group segment size from the executable",
566              get_error_string(err));
567       return err;
568     }
569     err = hsa_executable_symbol_get_info(
570         symbol, HSA_EXECUTABLE_SYMBOL_INFO_KERNEL_PRIVATE_SEGMENT_SIZE,
571         &(info.private_segment_size));
572     if (err != HSA_STATUS_SUCCESS) {
573       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
574              "Extracting the private segment from the executable",
575              get_error_string(err));
576       return err;
577     }
578 
579     DP("Kernel %s --> %lx symbol %u group segsize %u pvt segsize %u bytes "
580        "kernarg\n",
581        kernelName.c_str(), info.kernel_object, info.group_segment_size,
582        info.private_segment_size, info.kernel_segment_size);
583 
584     // assign it back to the kernel info table
585     KernelInfoTable[kernelName] = info;
586     free(name);
587   } else if (type == HSA_SYMBOL_KIND_VARIABLE) {
588     err = hsa_executable_symbol_get_info(
589         symbol, HSA_EXECUTABLE_SYMBOL_INFO_NAME_LENGTH, &name_length);
590     if (err != HSA_STATUS_SUCCESS) {
591       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
592              "Symbol info extraction", get_error_string(err));
593       return err;
594     }
595     char *name = reinterpret_cast<char *>(malloc(name_length + 1));
596     err = hsa_executable_symbol_get_info(symbol,
597                                          HSA_EXECUTABLE_SYMBOL_INFO_NAME, name);
598     if (err != HSA_STATUS_SUCCESS) {
599       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
600              "Symbol info extraction", get_error_string(err));
601       return err;
602     }
603     name[name_length] = 0;
604 
605     atl_symbol_info_t info;
606 
607     err = hsa_executable_symbol_get_info(
608         symbol, HSA_EXECUTABLE_SYMBOL_INFO_VARIABLE_ADDRESS, &(info.addr));
609     if (err != HSA_STATUS_SUCCESS) {
610       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
611              "Symbol info address extraction", get_error_string(err));
612       return err;
613     }
614 
615     err = hsa_executable_symbol_get_info(
616         symbol, HSA_EXECUTABLE_SYMBOL_INFO_VARIABLE_SIZE, &(info.size));
617     if (err != HSA_STATUS_SUCCESS) {
618       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
619              "Symbol info size extraction", get_error_string(err));
620       return err;
621     }
622 
623     DP("Symbol %s = %p (%u bytes)\n", name, (void *)info.addr, info.size);
624     SymbolInfoTable[std::string(name)] = info;
625     free(name);
626   } else {
627     DP("Symbol is an indirect function\n");
628   }
629   return HSA_STATUS_SUCCESS;
630 }
631 
632 hsa_status_t RegisterModuleFromMemory(
633     std::map<std::string, atl_kernel_info_t> &KernelInfoTable,
634     std::map<std::string, atl_symbol_info_t> &SymbolInfoTable,
635     void *module_bytes, size_t module_size, hsa_agent_t agent,
636     hsa_status_t (*on_deserialized_data)(void *data, size_t size,
637                                          void *cb_state),
638     void *cb_state, std::vector<hsa_executable_t> &HSAExecutables) {
639   hsa_status_t err;
640   hsa_executable_t executable = {0};
641   hsa_profile_t agent_profile;
642 
643   err = hsa_agent_get_info(agent, HSA_AGENT_INFO_PROFILE, &agent_profile);
644   if (err != HSA_STATUS_SUCCESS) {
645     printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
646            "Query the agent profile", get_error_string(err));
647     return HSA_STATUS_ERROR;
648   }
649   // FIXME: Assume that every profile is FULL until we understand how to build
650   // GCN with base profile
651   agent_profile = HSA_PROFILE_FULL;
652   /* Create the empty executable.  */
653   err = hsa_executable_create(agent_profile, HSA_EXECUTABLE_STATE_UNFROZEN, "",
654                               &executable);
655   if (err != HSA_STATUS_SUCCESS) {
656     printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
657            "Create the executable", get_error_string(err));
658     return HSA_STATUS_ERROR;
659   }
660 
661   bool module_load_success = false;
662   do // Existing control flow used continue, preserve that for this patch
663   {
664     {
665       // Some metadata info is not available through ROCr API, so use custom
666       // code object metadata parsing to collect such metadata info
667 
668       err = get_code_object_custom_metadata(module_bytes, module_size,
669                                             KernelInfoTable);
670       if (err != HSA_STATUS_SUCCESS) {
671         DP("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
672            "Getting custom code object metadata", get_error_string(err));
673         continue;
674       }
675 
676       // Deserialize code object.
677       hsa_code_object_t code_object = {0};
678       err = hsa_code_object_deserialize(module_bytes, module_size, NULL,
679                                         &code_object);
680       if (err != HSA_STATUS_SUCCESS) {
681         DP("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
682            "Code Object Deserialization", get_error_string(err));
683         continue;
684       }
685       assert(0 != code_object.handle);
686 
687       // Mutating the device image here avoids another allocation & memcpy
688       void *code_object_alloc_data =
689           reinterpret_cast<void *>(code_object.handle);
690       hsa_status_t impl_err =
691           on_deserialized_data(code_object_alloc_data, module_size, cb_state);
692       if (impl_err != HSA_STATUS_SUCCESS) {
693         printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
694                "Error in deserialized_data callback",
695                get_error_string(impl_err));
696         return impl_err;
697       }
698 
699       /* Load the code object.  */
700       err =
701           hsa_executable_load_code_object(executable, agent, code_object, NULL);
702       if (err != HSA_STATUS_SUCCESS) {
703         DP("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
704            "Loading the code object", get_error_string(err));
705         continue;
706       }
707 
708       // cannot iterate over symbols until executable is frozen
709     }
710     module_load_success = true;
711   } while (0);
712   DP("Modules loaded successful? %d\n", module_load_success);
713   if (module_load_success) {
714     /* Freeze the executable; it can now be queried for symbols.  */
715     err = hsa_executable_freeze(executable, "");
716     if (err != HSA_STATUS_SUCCESS) {
717       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
718              "Freeze the executable", get_error_string(err));
719       return HSA_STATUS_ERROR;
720     }
721 
722     err = hsa::executable_iterate_symbols(
723         executable,
724         [&](hsa_executable_t, hsa_executable_symbol_t symbol) -> hsa_status_t {
725           return populate_InfoTables(symbol, KernelInfoTable, SymbolInfoTable);
726         });
727     if (err != HSA_STATUS_SUCCESS) {
728       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
729              "Iterating over symbols for execuatable", get_error_string(err));
730       return HSA_STATUS_ERROR;
731     }
732 
733     // save the executable and destroy during finalize
734     HSAExecutables.push_back(executable);
735     return HSA_STATUS_SUCCESS;
736   } else {
737     return HSA_STATUS_ERROR;
738   }
739 }
740 
741 } // namespace core
742