1 //===--- amdgpu/impl/system.cpp ----------------------------------- C++ -*-===//
2 //
3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4 // See https://llvm.org/LICENSE.txt for license information.
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6 //
7 //===----------------------------------------------------------------------===//
8 #include <libelf.h>
9 
10 #include <cassert>
11 #include <sstream>
12 #include <string>
13 
14 #include "internal.h"
15 #include "rt.h"
16 
17 #include "msgpack.h"
18 
19 namespace hsa {
20 // Wrap HSA iterate API in a shim that allows passing general callables
21 template <typename C>
22 hsa_status_t executable_iterate_symbols(hsa_executable_t executable, C cb) {
23   auto L = [](hsa_executable_t executable, hsa_executable_symbol_t symbol,
24               void *data) -> hsa_status_t {
25     C *unwrapped = static_cast<C *>(data);
26     return (*unwrapped)(executable, symbol);
27   };
28   return hsa_executable_iterate_symbols(executable, L,
29                                         static_cast<void *>(&cb));
30 }
31 } // namespace hsa
32 
33 typedef unsigned char *address;
34 /*
35  * Note descriptors.
36  */
37 // FreeBSD already declares Elf_Note (indirectly via <libelf.h>)
38 #if !defined(__FreeBSD__)
39 typedef struct {
40   uint32_t n_namesz; /* Length of note's name. */
41   uint32_t n_descsz; /* Length of note's value. */
42   uint32_t n_type;   /* Type of note. */
43   // then name
44   // then padding, optional
45   // then desc, at 4 byte alignment (not 8, despite being elf64)
46 } Elf_Note;
47 #endif
48 
49 class KernelArgMD {
50 public:
51   enum class ValueKind {
52     HiddenGlobalOffsetX,
53     HiddenGlobalOffsetY,
54     HiddenGlobalOffsetZ,
55     HiddenNone,
56     HiddenPrintfBuffer,
57     HiddenDefaultQueue,
58     HiddenCompletionAction,
59     HiddenMultiGridSyncArg,
60     HiddenHostcallBuffer,
61     Unknown
62   };
63 
64   KernelArgMD()
65       : name_(std::string()),  size_(0), offset_(0),
66         valueKind_(ValueKind::Unknown) {}
67 
68   // fields
69   std::string name_;
70   uint32_t size_;
71   uint32_t offset_;
72   ValueKind valueKind_;
73 };
74 
75 static const std::map<std::string, KernelArgMD::ValueKind> ArgValueKind = {
76     // v3
77     //    {"by_value", KernelArgMD::ValueKind::ByValue},
78     //    {"global_buffer", KernelArgMD::ValueKind::GlobalBuffer},
79     //    {"dynamic_shared_pointer",
80     //    KernelArgMD::ValueKind::DynamicSharedPointer},
81     //    {"sampler", KernelArgMD::ValueKind::Sampler},
82     //    {"image", KernelArgMD::ValueKind::Image},
83     //    {"pipe", KernelArgMD::ValueKind::Pipe},
84     //    {"queue", KernelArgMD::ValueKind::Queue},
85     {"hidden_global_offset_x", KernelArgMD::ValueKind::HiddenGlobalOffsetX},
86     {"hidden_global_offset_y", KernelArgMD::ValueKind::HiddenGlobalOffsetY},
87     {"hidden_global_offset_z", KernelArgMD::ValueKind::HiddenGlobalOffsetZ},
88     {"hidden_none", KernelArgMD::ValueKind::HiddenNone},
89     {"hidden_printf_buffer", KernelArgMD::ValueKind::HiddenPrintfBuffer},
90     {"hidden_default_queue", KernelArgMD::ValueKind::HiddenDefaultQueue},
91     {"hidden_completion_action",
92      KernelArgMD::ValueKind::HiddenCompletionAction},
93     {"hidden_multigrid_sync_arg",
94      KernelArgMD::ValueKind::HiddenMultiGridSyncArg},
95     {"hidden_hostcall_buffer", KernelArgMD::ValueKind::HiddenHostcallBuffer},
96 };
97 
98 namespace core {
99 
100 hsa_status_t callbackEvent(const hsa_amd_event_t *event, void *data) {
101   if (event->event_type == HSA_AMD_GPU_MEMORY_FAULT_EVENT) {
102     hsa_amd_gpu_memory_fault_info_t memory_fault = event->memory_fault;
103     // memory_fault.agent
104     // memory_fault.virtual_address
105     // memory_fault.fault_reason_mask
106     // fprintf("[GPU Error at %p: Reason is ", memory_fault.virtual_address);
107     std::stringstream stream;
108     stream << std::hex << (uintptr_t)memory_fault.virtual_address;
109     std::string addr("0x" + stream.str());
110 
111     std::string err_string = "[GPU Memory Error] Addr: " + addr;
112     err_string += " Reason: ";
113     if (!(memory_fault.fault_reason_mask & 0x00111111)) {
114       err_string += "No Idea! ";
115     } else {
116       if (memory_fault.fault_reason_mask & 0x00000001)
117         err_string += "Page not present or supervisor privilege. ";
118       if (memory_fault.fault_reason_mask & 0x00000010)
119         err_string += "Write access to a read-only page. ";
120       if (memory_fault.fault_reason_mask & 0x00000100)
121         err_string += "Execute access to a page marked NX. ";
122       if (memory_fault.fault_reason_mask & 0x00001000)
123         err_string += "Host access only. ";
124       if (memory_fault.fault_reason_mask & 0x00010000)
125         err_string += "ECC failure (if supported by HW). ";
126       if (memory_fault.fault_reason_mask & 0x00100000)
127         err_string += "Can't determine the exact fault address. ";
128     }
129     fprintf(stderr, "%s\n", err_string.c_str());
130     return HSA_STATUS_ERROR;
131   }
132   return HSA_STATUS_SUCCESS;
133 }
134 
135 hsa_status_t atl_init_gpu_context() {
136   hsa_status_t err = hsa_amd_register_system_event_handler(callbackEvent, NULL);
137   if (err != HSA_STATUS_SUCCESS) {
138     printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
139            "Registering the system for memory faults", get_error_string(err));
140     return HSA_STATUS_ERROR;
141   }
142 
143   return HSA_STATUS_SUCCESS;
144 }
145 
146 static bool isImplicit(KernelArgMD::ValueKind value_kind) {
147   switch (value_kind) {
148   case KernelArgMD::ValueKind::HiddenGlobalOffsetX:
149   case KernelArgMD::ValueKind::HiddenGlobalOffsetY:
150   case KernelArgMD::ValueKind::HiddenGlobalOffsetZ:
151   case KernelArgMD::ValueKind::HiddenNone:
152   case KernelArgMD::ValueKind::HiddenPrintfBuffer:
153   case KernelArgMD::ValueKind::HiddenDefaultQueue:
154   case KernelArgMD::ValueKind::HiddenCompletionAction:
155   case KernelArgMD::ValueKind::HiddenMultiGridSyncArg:
156   case KernelArgMD::ValueKind::HiddenHostcallBuffer:
157     return true;
158   default:
159     return false;
160   }
161 }
162 
163 static std::pair<unsigned char *, unsigned char *>
164 find_metadata(void *binary, size_t binSize) {
165   std::pair<unsigned char *, unsigned char *> failure = {nullptr, nullptr};
166 
167   Elf *e = elf_memory(static_cast<char *>(binary), binSize);
168   if (elf_kind(e) != ELF_K_ELF) {
169     return failure;
170   }
171 
172   size_t numpHdrs;
173   if (elf_getphdrnum(e, &numpHdrs) != 0) {
174     return failure;
175   }
176 
177   Elf64_Phdr *pHdrs = elf64_getphdr(e);
178   for (size_t i = 0; i < numpHdrs; ++i) {
179     Elf64_Phdr pHdr = pHdrs[i];
180 
181     // Look for the runtime metadata note
182     if (pHdr.p_type == PT_NOTE && pHdr.p_align >= sizeof(int)) {
183       // Iterate over the notes in this segment
184       address ptr = (address)binary + pHdr.p_offset;
185       address segmentEnd = ptr + pHdr.p_filesz;
186 
187       while (ptr < segmentEnd) {
188         Elf_Note *note = reinterpret_cast<Elf_Note *>(ptr);
189         address name = (address)&note[1];
190 
191         if (note->n_type == 7 || note->n_type == 8) {
192           return failure;
193         } else if (note->n_type == 10 /* NT_AMD_AMDGPU_HSA_METADATA */ &&
194                    note->n_namesz == sizeof "AMD" &&
195                    !memcmp(name, "AMD", note->n_namesz)) {
196           // code object v2 uses yaml metadata, no longer supported
197           return failure;
198         } else if (note->n_type == 32 /* NT_AMDGPU_METADATA */ &&
199                    note->n_namesz == sizeof "AMDGPU" &&
200                    !memcmp(name, "AMDGPU", note->n_namesz)) {
201 
202           // n_descsz = 485
203           // value is padded to 4 byte alignment, may want to move end up to
204           // match
205           size_t offset = sizeof(uint32_t) * 3 /* fields */
206                           + sizeof("AMDGPU")   /* name */
207                           + 1 /* padding to 4 byte alignment */;
208 
209           // Including the trailing padding means both pointers are 4 bytes
210           // aligned, which may be useful later.
211           unsigned char *metadata_start = (unsigned char *)ptr + offset;
212           unsigned char *metadata_end =
213               metadata_start + core::alignUp(note->n_descsz, 4);
214           return {metadata_start, metadata_end};
215         }
216         ptr += sizeof(*note) + core::alignUp(note->n_namesz, sizeof(int)) +
217                core::alignUp(note->n_descsz, sizeof(int));
218       }
219     }
220   }
221 
222   return failure;
223 }
224 
225 namespace {
226 int map_lookup_array(msgpack::byte_range message, const char *needle,
227                      msgpack::byte_range *res, uint64_t *size) {
228   unsigned count = 0;
229   struct s : msgpack::functors_defaults<s> {
230     s(unsigned &count, uint64_t *size) : count(count), size(size) {}
231     unsigned &count;
232     uint64_t *size;
233     const unsigned char *handle_array(uint64_t N, msgpack::byte_range bytes) {
234       count++;
235       *size = N;
236       return bytes.end;
237     }
238   };
239 
240   msgpack::foreach_map(message,
241                        [&](msgpack::byte_range key, msgpack::byte_range value) {
242                          if (msgpack::message_is_string(key, needle)) {
243                            // If the message is an array, record number of
244                            // elements in *size
245                            msgpack::handle_msgpack<s>(value, {count, size});
246                            // return the whole array
247                            *res = value;
248                          }
249                        });
250   // Only claim success if exactly one key/array pair matched
251   return count != 1;
252 }
253 
254 int map_lookup_string(msgpack::byte_range message, const char *needle,
255                       std::string *res) {
256   unsigned count = 0;
257   struct s : public msgpack::functors_defaults<s> {
258     s(unsigned &count, std::string *res) : count(count), res(res) {}
259     unsigned &count;
260     std::string *res;
261     void handle_string(size_t N, const unsigned char *str) {
262       count++;
263       *res = std::string(str, str + N);
264     }
265   };
266   msgpack::foreach_map(message,
267                        [&](msgpack::byte_range key, msgpack::byte_range value) {
268                          if (msgpack::message_is_string(key, needle)) {
269                            msgpack::handle_msgpack<s>(value, {count, res});
270                          }
271                        });
272   return count != 1;
273 }
274 
275 int map_lookup_uint64_t(msgpack::byte_range message, const char *needle,
276                         uint64_t *res) {
277   unsigned count = 0;
278   msgpack::foreach_map(message,
279                        [&](msgpack::byte_range key, msgpack::byte_range value) {
280                          if (msgpack::message_is_string(key, needle)) {
281                            msgpack::foronly_unsigned(value, [&](uint64_t x) {
282                              count++;
283                              *res = x;
284                            });
285                          }
286                        });
287   return count != 1;
288 }
289 
290 int array_lookup_element(msgpack::byte_range message, uint64_t elt,
291                          msgpack::byte_range *res) {
292   int rc = 1;
293   uint64_t i = 0;
294   msgpack::foreach_array(message, [&](msgpack::byte_range value) {
295     if (i == elt) {
296       *res = value;
297       rc = 0;
298     }
299     i++;
300   });
301   return rc;
302 }
303 
304 int populate_kernelArgMD(msgpack::byte_range args_element,
305                          KernelArgMD *kernelarg) {
306   using namespace msgpack;
307   int error = 0;
308   foreach_map(args_element, [&](byte_range key, byte_range value) -> void {
309     if (message_is_string(key, ".name")) {
310       foronly_string(value, [&](size_t N, const unsigned char *str) {
311         kernelarg->name_ = std::string(str, str + N);
312       });
313     } else if (message_is_string(key, ".size")) {
314       foronly_unsigned(value, [&](uint64_t x) { kernelarg->size_ = x; });
315     } else if (message_is_string(key, ".offset")) {
316       foronly_unsigned(value, [&](uint64_t x) { kernelarg->offset_ = x; });
317     } else if (message_is_string(key, ".value_kind")) {
318       foronly_string(value, [&](size_t N, const unsigned char *str) {
319         std::string s = std::string(str, str + N);
320         auto itValueKind = ArgValueKind.find(s);
321         if (itValueKind != ArgValueKind.end()) {
322           kernelarg->valueKind_ = itValueKind->second;
323         }
324       });
325     }
326   });
327   return error;
328 }
329 } // namespace
330 
331 static hsa_status_t get_code_object_custom_metadata(
332     void *binary, size_t binSize,
333     std::map<std::string, atl_kernel_info_t> &KernelInfoTable) {
334   // parse code object with different keys from v2
335   // also, the kernel name is not the same as the symbol name -- so a
336   // symbol->name map is needed
337 
338   std::pair<unsigned char *, unsigned char *> metadata =
339       find_metadata(binary, binSize);
340   if (!metadata.first) {
341     return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
342   }
343 
344   uint64_t kernelsSize = 0;
345   int msgpack_errors = 0;
346   msgpack::byte_range kernel_array;
347   msgpack_errors =
348       map_lookup_array({metadata.first, metadata.second}, "amdhsa.kernels",
349                        &kernel_array, &kernelsSize);
350   if (msgpack_errors != 0) {
351     printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
352            "kernels lookup in program metadata");
353     return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
354   }
355 
356   for (size_t i = 0; i < kernelsSize; i++) {
357     assert(msgpack_errors == 0);
358     std::string kernelName;
359     std::string symbolName;
360 
361     msgpack::byte_range element;
362     msgpack_errors += array_lookup_element(kernel_array, i, &element);
363     if (msgpack_errors != 0) {
364       printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
365              "element lookup in kernel metadata");
366       return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
367     }
368 
369     msgpack_errors += map_lookup_string(element, ".name", &kernelName);
370     msgpack_errors += map_lookup_string(element, ".symbol", &symbolName);
371     if (msgpack_errors != 0) {
372       printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
373              "strings lookup in kernel metadata");
374       return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
375     }
376 
377     // Make sure that kernelName + ".kd" == symbolName
378     if ((kernelName + ".kd") != symbolName) {
379       printf("[%s:%d] Kernel name mismatching symbol: %s != %s + .kd\n",
380              __FILE__, __LINE__, symbolName.c_str(), kernelName.c_str());
381       return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
382     }
383 
384     atl_kernel_info_t info = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0};
385 
386     uint64_t sgpr_count, vgpr_count, sgpr_spill_count, vgpr_spill_count;
387     msgpack_errors += map_lookup_uint64_t(element, ".sgpr_count", &sgpr_count);
388     if (msgpack_errors != 0) {
389       printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
390              "sgpr count metadata lookup in kernel metadata");
391       return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
392     }
393 
394     info.sgpr_count = sgpr_count;
395 
396     msgpack_errors += map_lookup_uint64_t(element, ".vgpr_count", &vgpr_count);
397     if (msgpack_errors != 0) {
398       printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
399              "vgpr count metadata lookup in kernel metadata");
400       return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
401     }
402 
403     info.vgpr_count = vgpr_count;
404 
405     msgpack_errors +=
406         map_lookup_uint64_t(element, ".sgpr_spill_count", &sgpr_spill_count);
407     if (msgpack_errors != 0) {
408       printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
409              "sgpr spill count metadata lookup in kernel metadata");
410       return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
411     }
412 
413     info.sgpr_spill_count = sgpr_spill_count;
414 
415     msgpack_errors +=
416         map_lookup_uint64_t(element, ".vgpr_spill_count", &vgpr_spill_count);
417     if (msgpack_errors != 0) {
418       printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
419              "vgpr spill count metadata lookup in kernel metadata");
420       return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
421     }
422 
423     info.vgpr_spill_count = vgpr_spill_count;
424 
425     size_t kernel_explicit_args_size = 0;
426     uint64_t kernel_segment_size;
427     msgpack_errors += map_lookup_uint64_t(element, ".kernarg_segment_size",
428                                           &kernel_segment_size);
429     if (msgpack_errors != 0) {
430       printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
431              "kernarg segment size metadata lookup in kernel metadata");
432       return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
433     }
434 
435     bool hasHiddenArgs = false;
436     if (kernel_segment_size > 0) {
437       uint64_t argsSize;
438       size_t offset = 0;
439 
440       msgpack::byte_range args_array;
441       msgpack_errors +=
442           map_lookup_array(element, ".args", &args_array, &argsSize);
443       if (msgpack_errors != 0) {
444         printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
445                "kernel args metadata lookup in kernel metadata");
446         return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
447       }
448 
449       for (size_t i = 0; i < argsSize; ++i) {
450         KernelArgMD lcArg;
451 
452         msgpack::byte_range args_element;
453         msgpack_errors += array_lookup_element(args_array, i, &args_element);
454         if (msgpack_errors != 0) {
455           printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
456                  "iterate args map in kernel args metadata");
457           return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
458         }
459 
460         msgpack_errors += populate_kernelArgMD(args_element, &lcArg);
461         if (msgpack_errors != 0) {
462           printf("[%s:%d] %s failed\n", __FILE__, __LINE__,
463                  "iterate args map in kernel args metadata");
464           return HSA_STATUS_ERROR_INVALID_CODE_OBJECT;
465         }
466         // v3 has offset field and not align field
467         size_t new_offset = lcArg.offset_;
468         size_t padding = new_offset - offset;
469         offset = new_offset;
470         DP("Arg[%lu] \"%s\" (%u, %u)\n", i, lcArg.name_.c_str(), lcArg.size_,
471            lcArg.offset_);
472         offset += lcArg.size_;
473 
474         // check if the arg is a hidden/implicit arg
475         // this logic assumes that all hidden args are 8-byte aligned
476         if (!isImplicit(lcArg.valueKind_)) {
477           info.explicit_argument_count++;
478           kernel_explicit_args_size += lcArg.size_;
479         } else {
480           info.implicit_argument_count++;
481           hasHiddenArgs = true;
482         }
483         kernel_explicit_args_size += padding;
484       }
485     }
486 
487     // TODO: Probably don't want this arithmetic
488     info.kernel_segment_size =
489         (hasHiddenArgs ? kernel_explicit_args_size : kernel_segment_size);
490     DP("[%s: kernarg seg size] (%lu --> %u)\n", kernelName.c_str(),
491        kernel_segment_size, info.kernel_segment_size);
492 
493     // kernel received, now add it to the kernel info table
494     KernelInfoTable[kernelName] = info;
495   }
496 
497   return HSA_STATUS_SUCCESS;
498 }
499 
500 static hsa_status_t
501 populate_InfoTables(hsa_executable_symbol_t symbol,
502                     std::map<std::string, atl_kernel_info_t> &KernelInfoTable,
503                     std::map<std::string, atl_symbol_info_t> &SymbolInfoTable) {
504   hsa_symbol_kind_t type;
505 
506   uint32_t name_length;
507   hsa_status_t err;
508   err = hsa_executable_symbol_get_info(symbol, HSA_EXECUTABLE_SYMBOL_INFO_TYPE,
509                                        &type);
510   if (err != HSA_STATUS_SUCCESS) {
511     printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
512            "Symbol info extraction", get_error_string(err));
513     return err;
514   }
515   DP("Exec Symbol type: %d\n", type);
516   if (type == HSA_SYMBOL_KIND_KERNEL) {
517     err = hsa_executable_symbol_get_info(
518         symbol, HSA_EXECUTABLE_SYMBOL_INFO_NAME_LENGTH, &name_length);
519     if (err != HSA_STATUS_SUCCESS) {
520       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
521              "Symbol info extraction", get_error_string(err));
522       return err;
523     }
524     char *name = reinterpret_cast<char *>(malloc(name_length + 1));
525     err = hsa_executable_symbol_get_info(symbol,
526                                          HSA_EXECUTABLE_SYMBOL_INFO_NAME, name);
527     if (err != HSA_STATUS_SUCCESS) {
528       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
529              "Symbol info extraction", get_error_string(err));
530       return err;
531     }
532     // remove the suffix .kd from symbol name.
533     name[name_length - 3] = 0;
534 
535     atl_kernel_info_t info;
536     std::string kernelName(name);
537     // by now, the kernel info table should already have an entry
538     // because the non-ROCr custom code object parsing is called before
539     // iterating over the code object symbols using ROCr
540     if (KernelInfoTable.find(kernelName) == KernelInfoTable.end()) {
541       DP("amdgpu internal consistency error\n");
542       return HSA_STATUS_ERROR;
543     }
544     // found, so assign and update
545     info = KernelInfoTable[kernelName];
546 
547     /* Extract dispatch information from the symbol */
548     err = hsa_executable_symbol_get_info(
549         symbol, HSA_EXECUTABLE_SYMBOL_INFO_KERNEL_OBJECT,
550         &(info.kernel_object));
551     if (err != HSA_STATUS_SUCCESS) {
552       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
553              "Extracting the symbol from the executable",
554              get_error_string(err));
555       return err;
556     }
557     err = hsa_executable_symbol_get_info(
558         symbol, HSA_EXECUTABLE_SYMBOL_INFO_KERNEL_GROUP_SEGMENT_SIZE,
559         &(info.group_segment_size));
560     if (err != HSA_STATUS_SUCCESS) {
561       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
562              "Extracting the group segment size from the executable",
563              get_error_string(err));
564       return err;
565     }
566     err = hsa_executable_symbol_get_info(
567         symbol, HSA_EXECUTABLE_SYMBOL_INFO_KERNEL_PRIVATE_SEGMENT_SIZE,
568         &(info.private_segment_size));
569     if (err != HSA_STATUS_SUCCESS) {
570       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
571              "Extracting the private segment from the executable",
572              get_error_string(err));
573       return err;
574     }
575 
576     DP("Kernel %s --> %lx symbol %u group segsize %u pvt segsize %u bytes "
577        "kernarg\n",
578        kernelName.c_str(), info.kernel_object, info.group_segment_size,
579        info.private_segment_size, info.kernel_segment_size);
580 
581     // assign it back to the kernel info table
582     KernelInfoTable[kernelName] = info;
583     free(name);
584   } else if (type == HSA_SYMBOL_KIND_VARIABLE) {
585     err = hsa_executable_symbol_get_info(
586         symbol, HSA_EXECUTABLE_SYMBOL_INFO_NAME_LENGTH, &name_length);
587     if (err != HSA_STATUS_SUCCESS) {
588       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
589              "Symbol info extraction", get_error_string(err));
590       return err;
591     }
592     char *name = reinterpret_cast<char *>(malloc(name_length + 1));
593     err = hsa_executable_symbol_get_info(symbol,
594                                          HSA_EXECUTABLE_SYMBOL_INFO_NAME, name);
595     if (err != HSA_STATUS_SUCCESS) {
596       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
597              "Symbol info extraction", get_error_string(err));
598       return err;
599     }
600     name[name_length] = 0;
601 
602     atl_symbol_info_t info;
603 
604     err = hsa_executable_symbol_get_info(
605         symbol, HSA_EXECUTABLE_SYMBOL_INFO_VARIABLE_ADDRESS, &(info.addr));
606     if (err != HSA_STATUS_SUCCESS) {
607       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
608              "Symbol info address extraction", get_error_string(err));
609       return err;
610     }
611 
612     err = hsa_executable_symbol_get_info(
613         symbol, HSA_EXECUTABLE_SYMBOL_INFO_VARIABLE_SIZE, &(info.size));
614     if (err != HSA_STATUS_SUCCESS) {
615       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
616              "Symbol info size extraction", get_error_string(err));
617       return err;
618     }
619 
620     DP("Symbol %s = %p (%u bytes)\n", name, (void *)info.addr, info.size);
621     SymbolInfoTable[std::string(name)] = info;
622     free(name);
623   } else {
624     DP("Symbol is an indirect function\n");
625   }
626   return HSA_STATUS_SUCCESS;
627 }
628 
629 hsa_status_t RegisterModuleFromMemory(
630     std::map<std::string, atl_kernel_info_t> &KernelInfoTable,
631     std::map<std::string, atl_symbol_info_t> &SymbolInfoTable,
632     void *module_bytes, size_t module_size, hsa_agent_t agent,
633     hsa_status_t (*on_deserialized_data)(void *data, size_t size,
634                                          void *cb_state),
635     void *cb_state, std::vector<hsa_executable_t> &HSAExecutables) {
636   hsa_status_t err;
637   hsa_executable_t executable = {0};
638   hsa_profile_t agent_profile;
639 
640   err = hsa_agent_get_info(agent, HSA_AGENT_INFO_PROFILE, &agent_profile);
641   if (err != HSA_STATUS_SUCCESS) {
642     printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
643            "Query the agent profile", get_error_string(err));
644     return HSA_STATUS_ERROR;
645   }
646   // FIXME: Assume that every profile is FULL until we understand how to build
647   // GCN with base profile
648   agent_profile = HSA_PROFILE_FULL;
649   /* Create the empty executable.  */
650   err = hsa_executable_create(agent_profile, HSA_EXECUTABLE_STATE_UNFROZEN, "",
651                               &executable);
652   if (err != HSA_STATUS_SUCCESS) {
653     printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
654            "Create the executable", get_error_string(err));
655     return HSA_STATUS_ERROR;
656   }
657 
658   bool module_load_success = false;
659   do // Existing control flow used continue, preserve that for this patch
660   {
661     {
662       // Some metadata info is not available through ROCr API, so use custom
663       // code object metadata parsing to collect such metadata info
664 
665       err = get_code_object_custom_metadata(module_bytes, module_size,
666                                             KernelInfoTable);
667       if (err != HSA_STATUS_SUCCESS) {
668         DP("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
669            "Getting custom code object metadata", get_error_string(err));
670         continue;
671       }
672 
673       // Deserialize code object.
674       hsa_code_object_t code_object = {0};
675       err = hsa_code_object_deserialize(module_bytes, module_size, NULL,
676                                         &code_object);
677       if (err != HSA_STATUS_SUCCESS) {
678         DP("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
679            "Code Object Deserialization", get_error_string(err));
680         continue;
681       }
682       assert(0 != code_object.handle);
683 
684       // Mutating the device image here avoids another allocation & memcpy
685       void *code_object_alloc_data =
686           reinterpret_cast<void *>(code_object.handle);
687       hsa_status_t impl_err =
688           on_deserialized_data(code_object_alloc_data, module_size, cb_state);
689       if (impl_err != HSA_STATUS_SUCCESS) {
690         printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
691                "Error in deserialized_data callback",
692                get_error_string(impl_err));
693         return impl_err;
694       }
695 
696       /* Load the code object.  */
697       err =
698           hsa_executable_load_code_object(executable, agent, code_object, NULL);
699       if (err != HSA_STATUS_SUCCESS) {
700         DP("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
701            "Loading the code object", get_error_string(err));
702         continue;
703       }
704 
705       // cannot iterate over symbols until executable is frozen
706     }
707     module_load_success = true;
708   } while (0);
709   DP("Modules loaded successful? %d\n", module_load_success);
710   if (module_load_success) {
711     /* Freeze the executable; it can now be queried for symbols.  */
712     err = hsa_executable_freeze(executable, "");
713     if (err != HSA_STATUS_SUCCESS) {
714       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
715              "Freeze the executable", get_error_string(err));
716       return HSA_STATUS_ERROR;
717     }
718 
719     err = hsa::executable_iterate_symbols(
720         executable,
721         [&](hsa_executable_t, hsa_executable_symbol_t symbol) -> hsa_status_t {
722           return populate_InfoTables(symbol, KernelInfoTable, SymbolInfoTable);
723         });
724     if (err != HSA_STATUS_SUCCESS) {
725       printf("[%s:%d] %s failed: %s\n", __FILE__, __LINE__,
726              "Iterating over symbols for execuatable", get_error_string(err));
727       return HSA_STATUS_ERROR;
728     }
729 
730     // save the executable and destroy during finalize
731     HSAExecutables.push_back(executable);
732     return HSA_STATUS_SUCCESS;
733   } else {
734     return HSA_STATUS_ERROR;
735   }
736 }
737 
738 } // namespace core
739