1 //===--- amdgpu/impl/system.cpp ----------------------------------- C++ -*-===//
2 //
3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4 // See https://llvm.org/LICENSE.txt for license information.
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6 //
7 //===----------------------------------------------------------------------===//
8 #include <libelf.h>
9 
10 #include <cassert>
11 #include <sstream>
12 #include <string>
13 
14 #include "internal.h"
15 #include "rt.h"
16 
17 #include "msgpack.h"
18 
19 namespace hsa {
20 // Wrap HSA iterate API in a shim that allows passing general callables
21 template <typename C>
22 hsa_status_t executable_iterate_symbols(hsa_executable_t executable, C cb) {
23   auto L = [](hsa_executable_t executable, hsa_executable_symbol_t symbol,
24               void *data) -> hsa_status_t {
25     C *unwrapped = static_cast<C *>(data);
26     return (*unwrapped)(executable, symbol);
27   };
28   return hsa_executable_iterate_symbols(executable, L,
29                                         static_cast<void *>(&cb));
30 }
31 } // namespace hsa
32 
33 typedef unsigned char *address;
34 /*
35  * Note descriptors.
36  */
37 // FreeBSD already declares Elf_Note (indirectly via <libelf.h>)
38 #if !defined(__FreeBSD__)
39 typedef struct {
40   uint32_t n_namesz; /* Length of note's name. */
41   uint32_t n_descsz; /* Length of note's value. */
42   uint32_t n_type;   /* Type of note. */
43   // then name
44   // then padding, optional
45   // then desc, at 4 byte alignment (not 8, despite being elf64)
46 } Elf_Note;
47 #endif
48 
49 class KernelArgMD {
50 public:
51   enum class ValueKind {
52     HiddenGlobalOffsetX,
53     HiddenGlobalOffsetY,
54     HiddenGlobalOffsetZ,
55     HiddenNone,
56     HiddenPrintfBuffer,
57     HiddenDefaultQueue,
58     HiddenCompletionAction,
59     HiddenMultiGridSyncArg,
60     HiddenHostcallBuffer,
61     Unknown
62   };
63 
64   KernelArgMD()
65       : name_(std::string()), typeName_(std::string()), size_(0), offset_(0),
66         align_(0), valueKind_(ValueKind::Unknown) {}
67 
68   // fields
69   std::string name_;
70   std::string typeName_;
71   uint32_t size_;
72   uint32_t offset_;
73   uint32_t align_;
74   ValueKind valueKind_;
75 };
76 
77 class KernelMD {
78 public:
79   KernelMD() : kernargSegmentSize_(0ull) {}
80 
81   // fields
82   uint64_t kernargSegmentSize_;
83 };
84 
85 static const std::map<std::string, KernelArgMD::ValueKind> ArgValueKind = {
86     // v3
87     //    {"by_value", KernelArgMD::ValueKind::ByValue},
88     //    {"global_buffer", KernelArgMD::ValueKind::GlobalBuffer},
89     //    {"dynamic_shared_pointer",
90     //    KernelArgMD::ValueKind::DynamicSharedPointer},
91     //    {"sampler", KernelArgMD::ValueKind::Sampler},
92     //    {"image", KernelArgMD::ValueKind::Image},
93     //    {"pipe", KernelArgMD::ValueKind::Pipe},
94     //    {"queue", KernelArgMD::ValueKind::Queue},
95     {"hidden_global_offset_x", KernelArgMD::ValueKind::HiddenGlobalOffsetX},
96     {"hidden_global_offset_y", KernelArgMD::ValueKind::HiddenGlobalOffsetY},
97     {"hidden_global_offset_z", KernelArgMD::ValueKind::HiddenGlobalOffsetZ},
98     {"hidden_none", KernelArgMD::ValueKind::HiddenNone},
99     {"hidden_printf_buffer", KernelArgMD::ValueKind::HiddenPrintfBuffer},
100     {"hidden_default_queue", KernelArgMD::ValueKind::HiddenDefaultQueue},
101     {"hidden_completion_action",
102      KernelArgMD::ValueKind::HiddenCompletionAction},
103     {"hidden_multigrid_sync_arg",
104      KernelArgMD::ValueKind::HiddenMultiGridSyncArg},
105     {"hidden_hostcall_buffer", KernelArgMD::ValueKind::HiddenHostcallBuffer},
106 };
107 
108 namespace core {
109 
110 hsa_status_t callbackEvent(const hsa_amd_event_t *event, void *data) {
111   if (event->event_type == HSA_AMD_GPU_MEMORY_FAULT_EVENT) {
112     hsa_amd_gpu_memory_fault_info_t memory_fault = event->memory_fault;
113     // memory_fault.agent
114     // memory_fault.virtual_address
115     // memory_fault.fault_reason_mask
116     // fprintf("[GPU Error at %p: Reason is ", memory_fault.virtual_address);
117     std::stringstream stream;
118     stream << std::hex << (uintptr_t)memory_fault.virtual_address;
119     std::string addr("0x" + stream.str());
120 
121     std::string err_string = "[GPU Memory Error] Addr: " + addr;
122     err_string += " Reason: ";
123     if (!(memory_fault.fault_reason_mask & 0x00111111)) {
124       err_string += "No Idea! ";
125     } else {
126       if (memory_fault.fault_reason_mask & 0x00000001)
127         err_string += "Page not present or supervisor privilege. ";
128       if (memory_fault.fault_reason_mask & 0x00000010)
129         err_string += "Write access to a read-only page. ";
130       if (memory_fault.fault_reason_mask & 0x00000100)
131         err_string += "Execute access to a page marked NX. ";
132       if (memory_fault.fault_reason_mask & 0x00001000)
133         err_string += "Host access only. ";
134       if (memory_fault.fault_reason_mask & 0x00010000)
135         err_string += "ECC failure (if supported by HW). ";
136       if (memory_fault.fault_reason_mask & 0x00100000)
137         err_string += "Can't determine the exact fault address. ";
138     }
139     fprintf(stderr, "%s\n", err_string.c_str());
140     return HSA_STATUS_ERROR;
141   }
142   return HSA_STATUS_SUCCESS;
143 }
144 
145 hsa_status_t atl_init_gpu_context() {
146   hsa_status_t err = hsa_amd_register_system_event_handler(callbackEvent, NULL);
147   if (err != HSA_STATUS_SUCCESS) {
148     printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
149            "Registering the system for memory faults", get_error_string(err));
150     return HSA_STATUS_ERROR;
151   }
152 
153   return HSA_STATUS_SUCCESS;
154 }
155 
156 static bool isImplicit(KernelArgMD::ValueKind value_kind) {
157   switch (value_kind) {
158   case KernelArgMD::ValueKind::HiddenGlobalOffsetX:
159   case KernelArgMD::ValueKind::HiddenGlobalOffsetY:
160   case KernelArgMD::ValueKind::HiddenGlobalOffsetZ:
161   case KernelArgMD::ValueKind::HiddenNone:
162   case KernelArgMD::ValueKind::HiddenPrintfBuffer:
163   case KernelArgMD::ValueKind::HiddenDefaultQueue:
164   case KernelArgMD::ValueKind::HiddenCompletionAction:
165   case KernelArgMD::ValueKind::HiddenMultiGridSyncArg:
166   case KernelArgMD::ValueKind::HiddenHostcallBuffer:
167     return true;
168   default:
169     return false;
170   }
171 }
172 
173 static std::pair<unsigned char *, unsigned char *>
174 find_metadata(void *binary, size_t binSize) {
175   std::pair<unsigned char *, unsigned char *> failure = {nullptr, nullptr};
176 
177   Elf *e = elf_memory(static_cast<char *>(binary), binSize);
178   if (elf_kind(e) != ELF_K_ELF) {
179     return failure;
180   }
181 
182   size_t numpHdrs;
183   if (elf_getphdrnum(e, &numpHdrs) != 0) {
184     return failure;
185   }
186 
187   Elf64_Phdr *pHdrs = elf64_getphdr(e);
188   for (size_t i = 0; i < numpHdrs; ++i) {
189     Elf64_Phdr pHdr = pHdrs[i];
190 
191     // Look for the runtime metadata note
192     if (pHdr.p_type == PT_NOTE && pHdr.p_align >= sizeof(int)) {
193       // Iterate over the notes in this segment
194       address ptr = (address)binary + pHdr.p_offset;
195       address segmentEnd = ptr + pHdr.p_filesz;
196 
197       while (ptr < segmentEnd) {
198         Elf_Note *note = reinterpret_cast<Elf_Note *>(ptr);
199         address name = (address)&note[1];
200 
201         if (note->n_type == 7 || note->n_type == 8) {
202           return failure;
203         } else if (note->n_type == 10 /* NT_AMD_AMDGPU_HSA_METADATA */ &&
204                    note->n_namesz == sizeof "AMD" &&
205                    !memcmp(name, "AMD", note->n_namesz)) {
206           // code object v2 uses yaml metadata, no longer supported
207           return failure;
208         } else if (note->n_type == 32 /* NT_AMDGPU_METADATA */ &&
209                    note->n_namesz == sizeof "AMDGPU" &&
210                    !memcmp(name, "AMDGPU", note->n_namesz)) {
211 
212           // n_descsz = 485
213           // value is padded to 4 byte alignment, may want to move end up to
214           // match
215           size_t offset = sizeof(uint32_t) * 3 /* fields */
216                           + sizeof("AMDGPU")   /* name */
217                           + 1 /* padding to 4 byte alignment */;
218 
219           // Including the trailing padding means both pointers are 4 bytes
220           // aligned, which may be useful later.
221           unsigned char *metadata_start = (unsigned char *)ptr + offset;
222           unsigned char *metadata_end =
223               metadata_start + core::alignUp(note->n_descsz, 4);
224           return {metadata_start, metadata_end};
225         }
226         ptr += sizeof(*note) + core::alignUp(note->n_namesz, sizeof(int)) +
227                core::alignUp(note->n_descsz, sizeof(int));
228       }
229     }
230   }
231 
232   return failure;
233 }
234 
235 namespace {
236 int map_lookup_array(msgpack::byte_range message, const char *needle,
237                      msgpack::byte_range *res, uint64_t *size) {
238   unsigned count = 0;
239   struct s : msgpack::functors_defaults<s> {
240     s(unsigned &count, uint64_t *size) : count(count), size(size) {}
241     unsigned &count;
242     uint64_t *size;
243     const unsigned char *handle_array(uint64_t N, msgpack::byte_range bytes) {
244       count++;
245       *size = N;
246       return bytes.end;
247     }
248   };
249 
250   msgpack::foreach_map(message,
251                        [&](msgpack::byte_range key, msgpack::byte_range value) {
252                          if (msgpack::message_is_string(key, needle)) {
253                            // If the message is an array, record number of
254                            // elements in *size
255                            msgpack::handle_msgpack<s>(value, {count, size});
256                            // return the whole array
257                            *res = value;
258                          }
259                        });
260   // Only claim success if exactly one key/array pair matched
261   return count != 1;
262 }
263 
264 int map_lookup_string(msgpack::byte_range message, const char *needle,
265                       std::string *res) {
266   unsigned count = 0;
267   struct s : public msgpack::functors_defaults<s> {
268     s(unsigned &count, std::string *res) : count(count), res(res) {}
269     unsigned &count;
270     std::string *res;
271     void handle_string(size_t N, const unsigned char *str) {
272       count++;
273       *res = std::string(str, str + N);
274     }
275   };
276   msgpack::foreach_map(message,
277                        [&](msgpack::byte_range key, msgpack::byte_range value) {
278                          if (msgpack::message_is_string(key, needle)) {
279                            msgpack::handle_msgpack<s>(value, {count, res});
280                          }
281                        });
282   return count != 1;
283 }
284 
285 int map_lookup_uint64_t(msgpack::byte_range message, const char *needle,
286                         uint64_t *res) {
287   unsigned count = 0;
288   msgpack::foreach_map(message,
289                        [&](msgpack::byte_range key, msgpack::byte_range value) {
290                          if (msgpack::message_is_string(key, needle)) {
291                            msgpack::foronly_unsigned(value, [&](uint64_t x) {
292                              count++;
293                              *res = x;
294                            });
295                          }
296                        });
297   return count != 1;
298 }
299 
300 int array_lookup_element(msgpack::byte_range message, uint64_t elt,
301                          msgpack::byte_range *res) {
302   int rc = 1;
303   uint64_t i = 0;
304   msgpack::foreach_array(message, [&](msgpack::byte_range value) {
305     if (i == elt) {
306       *res = value;
307       rc = 0;
308     }
309     i++;
310   });
311   return rc;
312 }
313 
314 int populate_kernelArgMD(msgpack::byte_range args_element,
315                          KernelArgMD *kernelarg) {
316   using namespace msgpack;
317   int error = 0;
318   foreach_map(args_element, [&](byte_range key, byte_range value) -> void {
319     if (message_is_string(key, ".name")) {
320       foronly_string(value, [&](size_t N, const unsigned char *str) {
321         kernelarg->name_ = std::string(str, str + N);
322       });
323     } else if (message_is_string(key, ".type_name")) {
324       foronly_string(value, [&](size_t N, const unsigned char *str) {
325         kernelarg->typeName_ = std::string(str, str + N);
326       });
327     } else if (message_is_string(key, ".size")) {
328       foronly_unsigned(value, [&](uint64_t x) { kernelarg->size_ = x; });
329     } else if (message_is_string(key, ".offset")) {
330       foronly_unsigned(value, [&](uint64_t x) { kernelarg->offset_ = x; });
331     } else if (message_is_string(key, ".value_kind")) {
332       foronly_string(value, [&](size_t N, const unsigned char *str) {
333         std::string s = std::string(str, str + N);
334         auto itValueKind = ArgValueKind.find(s);
335         if (itValueKind != ArgValueKind.end()) {
336           kernelarg->valueKind_ = itValueKind->second;
337         }
338       });
339     }
340   });
341   return error;
342 }
343 } // namespace
344 
345 static hsa_status_t get_code_object_custom_metadata(
346     void *binary, size_t binSize,
347     std::map<std::string, atl_kernel_info_t> &KernelInfoTable) {
348   // parse code object with different keys from v2
349   // also, the kernel name is not the same as the symbol name -- so a
350   // symbol->name map is needed
351 
352   std::pair<unsigned char *, unsigned char *> metadata =
353       find_metadata(binary, binSize);
354   if (!metadata.first) {
355     return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
356   }
357 
358   uint64_t kernelsSize = 0;
359   int msgpack_errors = 0;
360   msgpack::byte_range kernel_array;
361   msgpack_errors =
362       map_lookup_array({metadata.first, metadata.second}, "amdhsa.kernels",
363                        &kernel_array, &kernelsSize);
364   if (msgpack_errors != 0) {
365     printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
366            "kernels lookup in program metadata");
367     return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
368   }
369 
370   for (size_t i = 0; i < kernelsSize; i++) {
371     assert(msgpack_errors == 0);
372     std::string kernelName;
373     std::string symbolName;
374 
375     msgpack::byte_range element;
376     msgpack_errors += array_lookup_element(kernel_array, i, &element);
377     if (msgpack_errors != 0) {
378       printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
379              "element lookup in kernel metadata");
380       return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
381     }
382 
383     msgpack_errors += map_lookup_string(element, ".name", &kernelName);
384     msgpack_errors += map_lookup_string(element, ".symbol", &symbolName);
385     if (msgpack_errors != 0) {
386       printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
387              "strings lookup in kernel metadata");
388       return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
389     }
390 
391     // Make sure that kernelName + ".kd" == symbolName
392     if ((kernelName + ".kd") != symbolName) {
393       printf("[%s:%d] Kernel name mismatching symbol: %s != %s + .kd\n",
394              __FILE__, __LINE__, symbolName.c_str(), kernelName.c_str());
395       return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
396     }
397 
398     atl_kernel_info_t info = {0, 0, 0, 0, 0, 0, 0, 0, 0, {}, {}, {}};
399 
400     uint64_t sgpr_count, vgpr_count, sgpr_spill_count, vgpr_spill_count;
401     msgpack_errors += map_lookup_uint64_t(element, ".sgpr_count", &sgpr_count);
402     if (msgpack_errors != 0) {
403       printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
404              "sgpr count metadata lookup in kernel metadata");
405       return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
406     }
407 
408     info.sgpr_count = sgpr_count;
409 
410     msgpack_errors += map_lookup_uint64_t(element, ".vgpr_count", &vgpr_count);
411     if (msgpack_errors != 0) {
412       printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
413              "vgpr count metadata lookup in kernel metadata");
414       return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
415     }
416 
417     info.vgpr_count = vgpr_count;
418 
419     msgpack_errors +=
420         map_lookup_uint64_t(element, ".sgpr_spill_count", &sgpr_spill_count);
421     if (msgpack_errors != 0) {
422       printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
423              "sgpr spill count metadata lookup in kernel metadata");
424       return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
425     }
426 
427     info.sgpr_spill_count = sgpr_spill_count;
428 
429     msgpack_errors +=
430         map_lookup_uint64_t(element, ".vgpr_spill_count", &vgpr_spill_count);
431     if (msgpack_errors != 0) {
432       printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
433              "vgpr spill count metadata lookup in kernel metadata");
434       return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
435     }
436 
437     info.vgpr_spill_count = vgpr_spill_count;
438 
439     size_t kernel_explicit_args_size = 0;
440     uint64_t kernel_segment_size;
441     msgpack_errors += map_lookup_uint64_t(element, ".kernarg_segment_size",
442                                           &kernel_segment_size);
443     if (msgpack_errors != 0) {
444       printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
445              "kernarg segment size metadata lookup in kernel metadata");
446       return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
447     }
448 
449     bool hasHiddenArgs = false;
450     if (kernel_segment_size > 0) {
451       uint64_t argsSize;
452       size_t offset = 0;
453 
454       msgpack::byte_range args_array;
455       msgpack_errors +=
456           map_lookup_array(element, ".args", &args_array, &argsSize);
457       if (msgpack_errors != 0) {
458         printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
459                "kernel args metadata lookup in kernel metadata");
460         return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
461       }
462 
463       info.num_args = argsSize;
464 
465       for (size_t i = 0; i < argsSize; ++i) {
466         KernelArgMD lcArg;
467 
468         msgpack::byte_range args_element;
469         msgpack_errors += array_lookup_element(args_array, i, &args_element);
470         if (msgpack_errors != 0) {
471           printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
472                  "iterate args map in kernel args metadata");
473           return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
474         }
475 
476         msgpack_errors += populate_kernelArgMD(args_element, &lcArg);
477         if (msgpack_errors != 0) {
478           printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
479                  "iterate args map in kernel args metadata");
480           return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
481         }
482         // populate info with sizes and offsets
483         info.arg_sizes.push_back(lcArg.size_);
484         // v3 has offset field and not align field
485         size_t new_offset = lcArg.offset_;
486         size_t padding = new_offset - offset;
487         offset = new_offset;
488         info.arg_offsets.push_back(lcArg.offset_);
489         DP("Arg[%lu] \"%s\" (%u, %u)\n", i, lcArg.name_.c_str(), lcArg.size_,
490            lcArg.offset_);
491         offset += lcArg.size_;
492 
493         // check if the arg is a hidden/implicit arg
494         // this logic assumes that all hidden args are 8-byte aligned
495         if (!isImplicit(lcArg.valueKind_)) {
496           kernel_explicit_args_size += lcArg.size_;
497         } else {
498           hasHiddenArgs = true;
499         }
500         kernel_explicit_args_size += padding;
501       }
502     }
503 
504     // add size of implicit args, e.g.: offset x, y and z and pipe pointer, but
505     // do not count the compiler set implicit args, but set your own implicit
506     // args by discounting the compiler set implicit args
507     info.kernel_segment_size =
508         (hasHiddenArgs ? kernel_explicit_args_size : kernel_segment_size) +
509         sizeof(impl_implicit_args_t);
510     DP("[%s: kernarg seg size] (%lu --> %u)\n", kernelName.c_str(),
511        kernel_segment_size, info.kernel_segment_size);
512 
513     // kernel received, now add it to the kernel info table
514     KernelInfoTable[kernelName] = info;
515   }
516 
517   return HSA_STATUS_SUCCESS;
518 }
519 
520 static hsa_status_t
521 populate_InfoTables(hsa_executable_symbol_t symbol,
522                     std::map<std::string, atl_kernel_info_t> &KernelInfoTable,
523                     std::map<std::string, atl_symbol_info_t> &SymbolInfoTable) {
524   hsa_symbol_kind_t type;
525 
526   uint32_t name_length;
527   hsa_status_t err;
528   err = hsa_executable_symbol_get_info(symbol, HSA_EXECUTABLE_SYMBOL_INFO_TYPE,
529                                        &type);
530   if (err != HSA_STATUS_SUCCESS) {
531     printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
532            "Symbol info extraction", get_error_string(err));
533     return err;
534   }
535   DP("Exec Symbol type: %d\n", type);
536   if (type == HSA_SYMBOL_KIND_KERNEL) {
537     err = hsa_executable_symbol_get_info(
538         symbol, HSA_EXECUTABLE_SYMBOL_INFO_NAME_LENGTH, &name_length);
539     if (err != HSA_STATUS_SUCCESS) {
540       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
541              "Symbol info extraction", get_error_string(err));
542       return err;
543     }
544     char *name = reinterpret_cast<char *>(malloc(name_length + 1));
545     err = hsa_executable_symbol_get_info(symbol,
546                                          HSA_EXECUTABLE_SYMBOL_INFO_NAME, name);
547     if (err != HSA_STATUS_SUCCESS) {
548       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
549              "Symbol info extraction", get_error_string(err));
550       return err;
551     }
552     // remove the suffix .kd from symbol name.
553     name[name_length - 3] = 0;
554 
555     atl_kernel_info_t info;
556     std::string kernelName(name);
557     // by now, the kernel info table should already have an entry
558     // because the non-ROCr custom code object parsing is called before
559     // iterating over the code object symbols using ROCr
560     if (KernelInfoTable.find(kernelName) == KernelInfoTable.end()) {
561       DP("amdgpu internal consistency error\n");
562       return HSA_STATUS_ERROR;
563     }
564     // found, so assign and update
565     info = KernelInfoTable[kernelName];
566 
567     /* Extract dispatch information from the symbol */
568     err = hsa_executable_symbol_get_info(
569         symbol, HSA_EXECUTABLE_SYMBOL_INFO_KERNEL_OBJECT,
570         &(info.kernel_object));
571     if (err != HSA_STATUS_SUCCESS) {
572       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
573              "Extracting the symbol from the executable",
574              get_error_string(err));
575       return err;
576     }
577     err = hsa_executable_symbol_get_info(
578         symbol, HSA_EXECUTABLE_SYMBOL_INFO_KERNEL_GROUP_SEGMENT_SIZE,
579         &(info.group_segment_size));
580     if (err != HSA_STATUS_SUCCESS) {
581       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
582              "Extracting the group segment size from the executable",
583              get_error_string(err));
584       return err;
585     }
586     err = hsa_executable_symbol_get_info(
587         symbol, HSA_EXECUTABLE_SYMBOL_INFO_KERNEL_PRIVATE_SEGMENT_SIZE,
588         &(info.private_segment_size));
589     if (err != HSA_STATUS_SUCCESS) {
590       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
591              "Extracting the private segment from the executable",
592              get_error_string(err));
593       return err;
594     }
595 
596     DP("Kernel %s --> %lx symbol %u group segsize %u pvt segsize %u bytes "
597        "kernarg\n",
598        kernelName.c_str(), info.kernel_object, info.group_segment_size,
599        info.private_segment_size, info.kernel_segment_size);
600 
601     // assign it back to the kernel info table
602     KernelInfoTable[kernelName] = info;
603     free(name);
604   } else if (type == HSA_SYMBOL_KIND_VARIABLE) {
605     err = hsa_executable_symbol_get_info(
606         symbol, HSA_EXECUTABLE_SYMBOL_INFO_NAME_LENGTH, &name_length);
607     if (err != HSA_STATUS_SUCCESS) {
608       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
609              "Symbol info extraction", get_error_string(err));
610       return err;
611     }
612     char *name = reinterpret_cast<char *>(malloc(name_length + 1));
613     err = hsa_executable_symbol_get_info(symbol,
614                                          HSA_EXECUTABLE_SYMBOL_INFO_NAME, name);
615     if (err != HSA_STATUS_SUCCESS) {
616       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
617              "Symbol info extraction", get_error_string(err));
618       return err;
619     }
620     name[name_length] = 0;
621 
622     atl_symbol_info_t info;
623 
624     err = hsa_executable_symbol_get_info(
625         symbol, HSA_EXECUTABLE_SYMBOL_INFO_VARIABLE_ADDRESS, &(info.addr));
626     if (err != HSA_STATUS_SUCCESS) {
627       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
628              "Symbol info address extraction", get_error_string(err));
629       return err;
630     }
631 
632     err = hsa_executable_symbol_get_info(
633         symbol, HSA_EXECUTABLE_SYMBOL_INFO_VARIABLE_SIZE, &(info.size));
634     if (err != HSA_STATUS_SUCCESS) {
635       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
636              "Symbol info size extraction", get_error_string(err));
637       return err;
638     }
639 
640     DP("Symbol %s = %p (%u bytes)\n", name, (void *)info.addr, info.size);
641     SymbolInfoTable[std::string(name)] = info;
642     free(name);
643   } else {
644     DP("Symbol is an indirect function\n");
645   }
646   return HSA_STATUS_SUCCESS;
647 }
648 
649 hsa_status_t RegisterModuleFromMemory(
650     std::map<std::string, atl_kernel_info_t> &KernelInfoTable,
651     std::map<std::string, atl_symbol_info_t> &SymbolInfoTable,
652     void *module_bytes, size_t module_size, hsa_agent_t agent,
653     hsa_status_t (*on_deserialized_data)(void *data, size_t size,
654                                          void *cb_state),
655     void *cb_state, std::vector<hsa_executable_t> &HSAExecutables) {
656   hsa_status_t err;
657   hsa_executable_t executable = {0};
658   hsa_profile_t agent_profile;
659 
660   err = hsa_agent_get_info(agent, HSA_AGENT_INFO_PROFILE, &agent_profile);
661   if (err != HSA_STATUS_SUCCESS) {
662     printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
663            "Query the agent profile", get_error_string(err));
664     return HSA_STATUS_ERROR;
665   }
666   // FIXME: Assume that every profile is FULL until we understand how to build
667   // GCN with base profile
668   agent_profile = HSA_PROFILE_FULL;
669   /* Create the empty executable.  */
670   err = hsa_executable_create(agent_profile, HSA_EXECUTABLE_STATE_UNFROZEN, "",
671                               &executable);
672   if (err != HSA_STATUS_SUCCESS) {
673     printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
674            "Create the executable", get_error_string(err));
675     return HSA_STATUS_ERROR;
676   }
677 
678   bool module_load_success = false;
679   do // Existing control flow used continue, preserve that for this patch
680   {
681     {
682       // Some metadata info is not available through ROCr API, so use custom
683       // code object metadata parsing to collect such metadata info
684 
685       err = get_code_object_custom_metadata(module_bytes, module_size,
686                                             KernelInfoTable);
687       if (err != HSA_STATUS_SUCCESS) {
688         DP("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
689            "Getting custom code object metadata", get_error_string(err));
690         continue;
691       }
692 
693       // Deserialize code object.
694       hsa_code_object_t code_object = {0};
695       err = hsa_code_object_deserialize(module_bytes, module_size, NULL,
696                                         &code_object);
697       if (err != HSA_STATUS_SUCCESS) {
698         DP("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
699            "Code Object Deserialization", get_error_string(err));
700         continue;
701       }
702       assert(0 != code_object.handle);
703 
704       // Mutating the device image here avoids another allocation & memcpy
705       void *code_object_alloc_data =
706           reinterpret_cast<void *>(code_object.handle);
707       hsa_status_t impl_err =
708           on_deserialized_data(code_object_alloc_data, module_size, cb_state);
709       if (impl_err != HSA_STATUS_SUCCESS) {
710         printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
711                "Error in deserialized_data callback",
712                get_error_string(impl_err));
713         return impl_err;
714       }
715 
716       /* Load the code object.  */
717       err =
718           hsa_executable_load_code_object(executable, agent, code_object, NULL);
719       if (err != HSA_STATUS_SUCCESS) {
720         DP("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
721            "Loading the code object", get_error_string(err));
722         continue;
723       }
724 
725       // cannot iterate over symbols until executable is frozen
726     }
727     module_load_success = true;
728   } while (0);
729   DP("Modules loaded successful? %d\n", module_load_success);
730   if (module_load_success) {
731     /* Freeze the executable; it can now be queried for symbols.  */
732     err = hsa_executable_freeze(executable, "");
733     if (err != HSA_STATUS_SUCCESS) {
734       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
735              "Freeze the executable", get_error_string(err));
736       return HSA_STATUS_ERROR;
737     }
738 
739     err = hsa::executable_iterate_symbols(
740         executable,
741         [&](hsa_executable_t, hsa_executable_symbol_t symbol) -> hsa_status_t {
742           return populate_InfoTables(symbol, KernelInfoTable, SymbolInfoTable);
743         });
744     if (err != HSA_STATUS_SUCCESS) {
745       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
746              "Iterating over symbols for execuatable", get_error_string(err));
747       return HSA_STATUS_ERROR;
748     }
749 
750     // save the executable and destroy during finalize
751     HSAExecutables.push_back(executable);
752     return HSA_STATUS_SUCCESS;
753   } else {
754     return HSA_STATUS_ERROR;
755   }
756 }
757 
758 } // namespace core
759