1 //===-RTLs/nec-aurora/src/rtl.cpp - Target RTLs Implementation - C++ -*-======// 2 // 3 // The LLVM Compiler Infrastructure 4 // 5 // This file is dual licensed under the MIT and the University of Illinois Open 6 // Source Licenses. See LICENSE.txt for details. 7 // 8 //===----------------------------------------------------------------------===// 9 // 10 // RTL for NEC Aurora TSUBASA machines 11 // 12 //===----------------------------------------------------------------------===// 13 14 #include <algorithm> 15 #include <cassert> 16 #include <cerrno> 17 #include <cstring> 18 #include <list> 19 #include <stdlib.h> 20 #include <string> 21 #include <sys/stat.h> 22 #include <ve_offload.h> 23 #include <vector> 24 #include <veosinfo/veosinfo.h> 25 26 #include "Debug.h" 27 #include "omptargetplugin.h" 28 29 #ifndef TARGET_NAME 30 #define TARGET_NAME VE 31 #endif 32 33 #define DEBUG_PREFIX "Target " GETNAME(TARGET_NAME) " RTL" 34 35 #ifndef TARGET_ELF_ID 36 #define TARGET_ELF_ID 0 37 #endif 38 39 #include "../../common/elf_common.c" 40 41 struct DynLibTy { 42 char *FileName; 43 uint64_t VeoLibHandle; 44 }; 45 46 /// Keep entries table per device. 47 struct FuncOrGblEntryTy { 48 __tgt_target_table Table; 49 std::vector<__tgt_offload_entry> Entries; 50 }; 51 52 class RTLDeviceInfoTy { 53 std::vector<std::list<FuncOrGblEntryTy>> FuncOrGblEntry; 54 55 public: 56 std::vector<struct veo_proc_handle *> ProcHandles; 57 std::vector<struct veo_thr_ctxt *> Contexts; 58 std::vector<uint64_t> LibraryHandles; 59 std::list<DynLibTy> DynLibs; 60 // Maps OpenMP device Ids to Ve nodeids 61 std::vector<int> NodeIds; 62 63 void buildOffloadTableFromHost(int32_t device_id, uint64_t VeoLibHandle, 64 __tgt_offload_entry *HostBegin, 65 __tgt_offload_entry *HostEnd) { 66 FuncOrGblEntry[device_id].emplace_back(); 67 std::vector<__tgt_offload_entry> &T = 68 FuncOrGblEntry[device_id].back().Entries; 69 T.clear(); 70 for (__tgt_offload_entry *i = HostBegin; i != HostEnd; ++i) { 71 char *SymbolName = i->name; 72 // we have not enough access to the target memory to conveniently parse 73 // the offload table there so we need to lookup every symbol with the host 74 // table 75 DP("Looking up symbol: %s\n", SymbolName); 76 uint64_t SymbolTargetAddr = 77 veo_get_sym(ProcHandles[device_id], VeoLibHandle, SymbolName); 78 __tgt_offload_entry Entry; 79 80 if (!SymbolTargetAddr) { 81 DP("Symbol %s not found in target image\n", SymbolName); 82 Entry = {NULL, NULL, 0, 0, 0}; 83 } else { 84 DP("Found symbol %s successfully in target image (addr: %p)\n", 85 SymbolName, reinterpret_cast<void *>(SymbolTargetAddr)); 86 Entry = { reinterpret_cast<void *>(SymbolTargetAddr), 87 i->name, 88 i->size, 89 i->flags, 90 0 }; 91 } 92 93 T.push_back(Entry); 94 } 95 96 FuncOrGblEntry[device_id].back().Table.EntriesBegin = &T.front(); 97 FuncOrGblEntry[device_id].back().Table.EntriesEnd = &T.back() + 1; 98 } 99 100 __tgt_target_table *getOffloadTable(int32_t device_id) { 101 return &FuncOrGblEntry[device_id].back().Table; 102 } 103 104 RTLDeviceInfoTy() { 105 106 struct ve_nodeinfo node_info; 107 ve_node_info(&node_info); 108 109 // Build a predictable mapping between VE node ids and OpenMP device ids. 110 // This is necessary, because nodes can be missing or offline and (active) 111 // node ids are thus not consecutive. The entries in ve_nodeinfo may also 112 // not be in the order of their node ids. 113 for (int i = 0; i < node_info.total_node_count; ++i) { 114 if (node_info.status[i] == 0) { 115 NodeIds.push_back(node_info.nodeid[i]); 116 } 117 } 118 119 // Because the entries in ve_nodeinfo may not be in the order of their node 120 // ids, we sort NodeIds to get a predictable mapping. 121 std::sort(NodeIds.begin(), NodeIds.end()); 122 123 int NumDevices = NodeIds.size(); 124 DP("Found %i VE devices\n", NumDevices); 125 ProcHandles.resize(NumDevices, NULL); 126 Contexts.resize(NumDevices, NULL); 127 FuncOrGblEntry.resize(NumDevices); 128 LibraryHandles.resize(NumDevices); 129 } 130 131 ~RTLDeviceInfoTy() { 132 for (auto &ctx : Contexts) { 133 if (ctx != NULL) { 134 if (veo_context_close(ctx) != 0) { 135 DP("Failed to close VEO context.\n"); 136 } 137 } 138 } 139 140 for (auto &hdl : ProcHandles) { 141 if (hdl != NULL) { 142 veo_proc_destroy(hdl); 143 } 144 } 145 146 for (auto &lib : DynLibs) { 147 if (lib.FileName) { 148 remove(lib.FileName); 149 } 150 } 151 } 152 }; 153 154 static RTLDeviceInfoTy DeviceInfo; 155 156 static int target_run_function_wait(uint32_t DeviceID, uint64_t FuncAddr, 157 struct veo_args *args, uint64_t *RetVal) { 158 DP("Running function with entry point %p\n", 159 reinterpret_cast<void *>(FuncAddr)); 160 uint64_t RequestHandle = 161 veo_call_async(DeviceInfo.Contexts[DeviceID], FuncAddr, args); 162 if (RequestHandle == VEO_REQUEST_ID_INVALID) { 163 DP("Execution of entry point %p failed\n", 164 reinterpret_cast<void *>(FuncAddr)); 165 return OFFLOAD_FAIL; 166 } 167 168 DP("Function at address %p called (VEO request ID: %" PRIu64 ")\n", 169 reinterpret_cast<void *>(FuncAddr), RequestHandle); 170 171 int ret = veo_call_wait_result(DeviceInfo.Contexts[DeviceID], RequestHandle, 172 RetVal); 173 if (ret != 0) { 174 DP("Waiting for entry point %p failed (Error code %d)\n", 175 reinterpret_cast<void *>(FuncAddr), ret); 176 return OFFLOAD_FAIL; 177 } 178 return OFFLOAD_SUCCESS; 179 } 180 181 182 // Return the number of available devices of the type supported by the 183 // target RTL. 184 int32_t __tgt_rtl_number_of_devices(void) { return DeviceInfo.NodeIds.size(); } 185 186 // Return an integer different from zero if the provided device image can be 187 // supported by the runtime. The functionality is similar to comparing the 188 // result of __tgt__rtl__load__binary to NULL. However, this is meant to be a 189 // lightweight query to determine if the RTL is suitable for an image without 190 // having to load the library, which can be expensive. 191 int32_t __tgt_rtl_is_valid_binary(__tgt_device_image *Image) { 192 #if TARGET_ELF_ID < 1 193 return 0; 194 #else 195 return elf_check_machine(Image, TARGET_ELF_ID); 196 #endif 197 } 198 199 // Initialize the specified device. In case of success return 0; otherwise 200 // return an error code. 201 int32_t __tgt_rtl_init_device(int32_t ID) { 202 DP("Available VEO version: %i\n", veo_api_version()); 203 204 // At the moment we do not really initialize (i.e. create a process or 205 // context on) the device here, but in "__tgt_rtl_load_binary". 206 // The reason for this is, that, when we create a process for a statically 207 // linked binary, the VEO api needs us to already supply the binary (but we 208 // can load a dynamically linked binary later, after we create the process). 209 // At this stage, we cannot check if we have a dynamically or statically 210 // linked binary so we defer process creation until we know. 211 return OFFLOAD_SUCCESS; 212 } 213 214 // Pass an executable image section described by image to the specified 215 // device and prepare an address table of target entities. In case of error, 216 // return NULL. Otherwise, return a pointer to the built address table. 217 // Individual entries in the table may also be NULL, when the corresponding 218 // offload region is not supported on the target device. 219 __tgt_target_table *__tgt_rtl_load_binary(int32_t ID, 220 __tgt_device_image *Image) { 221 DP("Dev %d: load binary from " DPxMOD " image\n", ID, 222 DPxPTR(Image->ImageStart)); 223 224 assert(ID >= 0 && "bad dev id"); 225 226 size_t ImageSize = (size_t)Image->ImageEnd - (size_t)Image->ImageStart; 227 size_t NumEntries = (size_t)(Image->EntriesEnd - Image->EntriesBegin); 228 DP("Expecting to have %zd entries defined.\n", NumEntries); 229 230 // load dynamic library and get the entry points. We use the dl library 231 // to do the loading of the library, but we could do it directly to avoid the 232 // dump to the temporary file. 233 // 234 // 1) Create tmp file with the library contents. 235 // 2) Use dlopen to load the file and dlsym to retrieve the symbols. 236 char tmp_name[] = "/tmp/tmpfile_XXXXXX"; 237 int tmp_fd = mkstemp(tmp_name); 238 239 if (tmp_fd == -1) { 240 return NULL; 241 } 242 243 FILE *ftmp = fdopen(tmp_fd, "wb"); 244 245 if (!ftmp) { 246 DP("fdopen() for %s failed. Could not write target image\n", tmp_name); 247 return NULL; 248 } 249 250 fwrite(Image->ImageStart, ImageSize, 1, ftmp); 251 252 // at least for the static case we need to change the permissions 253 chmod(tmp_name, 0700); 254 255 DP("Wrote target image to %s. ImageSize=%zu\n", tmp_name, ImageSize); 256 257 fclose(ftmp); 258 259 // See comment in "__tgt_rtl_init_device" 260 bool is_dyn = true; 261 if (DeviceInfo.ProcHandles[ID] == NULL) { 262 struct veo_proc_handle *proc_handle; 263 is_dyn = elf_is_dynamic(Image); 264 // If we have a dynamically linked image, we create the process handle, then 265 // the thread, and then load the image. 266 // If we have a statically linked image, we need to create the process 267 // handle and load the image at the same time with veo_proc_create_static(). 268 if (is_dyn) { 269 proc_handle = veo_proc_create(DeviceInfo.NodeIds[ID]); 270 if (!proc_handle) { 271 DP("veo_proc_create() failed for device %d\n", ID); 272 return NULL; 273 } 274 } else { 275 proc_handle = veo_proc_create_static(DeviceInfo.NodeIds[ID], tmp_name); 276 if (!proc_handle) { 277 DP("veo_proc_create_static() failed for device %d, image=%s\n", ID, 278 tmp_name); 279 return NULL; 280 } 281 } 282 DeviceInfo.ProcHandles[ID] = proc_handle; 283 } 284 285 if (DeviceInfo.Contexts[ID] == NULL) { 286 struct veo_thr_ctxt *ctx = veo_context_open(DeviceInfo.ProcHandles[ID]); 287 288 if (!ctx) { 289 DP("veo_context_open() failed: %s\n", std::strerror(errno)); 290 return NULL; 291 } 292 293 DeviceInfo.Contexts[ID] = ctx; 294 } 295 296 DP("Aurora device successfully initialized with loaded binary: " 297 "proc_handle=%p, ctx=%p\n", 298 DeviceInfo.ProcHandles[ID], DeviceInfo.Contexts[ID]); 299 300 uint64_t LibHandle = 0UL; 301 if (is_dyn) { 302 LibHandle = veo_load_library(DeviceInfo.ProcHandles[ID], tmp_name); 303 304 if (!LibHandle) { 305 DP("veo_load_library() failed: LibHandle=%" PRIu64 306 " Name=%s. Set env VEORUN_BIN for static linked target code.\n", 307 LibHandle, tmp_name); 308 return NULL; 309 } 310 311 DP("Successfully loaded library dynamically\n"); 312 } else { 313 DP("Symbol table is expected to have been created by " 314 "veo_create_proc_static()\n"); 315 } 316 317 DynLibTy Lib = {tmp_name, LibHandle}; 318 DeviceInfo.DynLibs.push_back(Lib); 319 DeviceInfo.LibraryHandles[ID] = LibHandle; 320 321 DeviceInfo.buildOffloadTableFromHost(ID, LibHandle, Image->EntriesBegin, 322 Image->EntriesEnd); 323 324 return DeviceInfo.getOffloadTable(ID); 325 } 326 327 // Allocate data on the particular target device, of the specified size. 328 // HostPtr is a address of the host data the allocated target data 329 // will be associated with (HostPtr may be NULL if it is not known at 330 // allocation time, like for example it would be for target data that 331 // is allocated by omp_target_alloc() API). Return address of the 332 // allocated data on the target that will be used by libomptarget.so to 333 // initialize the target data mapping structures. These addresses are 334 // used to generate a table of target variables to pass to 335 // __tgt_rtl_run_region(). The __tgt_rtl_data_alloc() returns NULL in 336 // case an error occurred on the target device. 337 void *__tgt_rtl_data_alloc(int32_t ID, int64_t Size, void *HostPtr) { 338 int ret; 339 uint64_t addr; 340 341 if (DeviceInfo.ProcHandles[ID] == NULL) { 342 struct veo_proc_handle *proc_handle; 343 proc_handle = veo_proc_create(DeviceInfo.NodeIds[ID]); 344 if (!proc_handle) { 345 DP("veo_proc_create() failed for device %d\n", ID); 346 return NULL; 347 } 348 DeviceInfo.ProcHandles[ID] = proc_handle; 349 DP("Aurora device successfully initialized: proc_handle=%p", proc_handle); 350 } 351 352 ret = veo_alloc_mem(DeviceInfo.ProcHandles[ID], &addr, Size); 353 DP("Allocate target memory: device=%d, target addr=%p, size=%" PRIu64 "\n", 354 ID, reinterpret_cast<void *>(addr), Size); 355 if (ret != 0) { 356 DP("veo_alloc_mem(%d, %p, %" PRIu64 ") failed with error code %d\n", 357 ID, reinterpret_cast<void *>(addr), Size, ret); 358 return NULL; 359 } 360 361 return reinterpret_cast<void *>(addr); 362 } 363 364 // Pass the data content to the target device using the target address. 365 // In case of success, return zero. Otherwise, return an error code. 366 int32_t __tgt_rtl_data_submit(int32_t ID, void *TargetPtr, void *HostPtr, 367 int64_t Size) { 368 int ret = veo_write_mem(DeviceInfo.ProcHandles[ID], (uint64_t)TargetPtr, 369 HostPtr, (size_t)Size); 370 if (ret != 0) { 371 DP("veo_write_mem() failed with error code %d\n", ret); 372 return OFFLOAD_FAIL; 373 } 374 return OFFLOAD_SUCCESS; 375 } 376 377 // Retrieve the data content from the target device using its address. 378 // In case of success, return zero. Otherwise, return an error code. 379 int32_t __tgt_rtl_data_retrieve(int32_t ID, void *HostPtr, void *TargetPtr, 380 int64_t Size) { 381 int ret = veo_read_mem(DeviceInfo.ProcHandles[ID], HostPtr, 382 (uint64_t)TargetPtr, Size); 383 if (ret != 0) { 384 DP("veo_read_mem() failed with error code %d\n", ret); 385 return OFFLOAD_FAIL; 386 } 387 return OFFLOAD_SUCCESS; 388 } 389 390 // De-allocate the data referenced by target ptr on the device. In case of 391 // success, return zero. Otherwise, return an error code. 392 int32_t __tgt_rtl_data_delete(int32_t ID, void *TargetPtr) { 393 int ret = veo_free_mem(DeviceInfo.ProcHandles[ID], (uint64_t)TargetPtr); 394 395 if (ret != 0) { 396 DP("veo_free_mem() failed with error code %d\n", ret); 397 return OFFLOAD_FAIL; 398 } 399 return OFFLOAD_SUCCESS; 400 } 401 402 // Similar to __tgt_rtl_run_target_region, but additionally specify the 403 // number of teams to be created and a number of threads in each team. 404 int32_t __tgt_rtl_run_target_team_region(int32_t ID, void *Entry, void **Args, 405 ptrdiff_t *Offsets, int32_t NumArgs, 406 int32_t NumTeams, int32_t ThreadLimit, 407 uint64_t loop_tripcount) { 408 int ret; 409 410 // ignore team num and thread limit. 411 std::vector<void *> ptrs(NumArgs); 412 413 struct veo_args *TargetArgs; 414 TargetArgs = veo_args_alloc(); 415 416 if (TargetArgs == NULL) { 417 DP("Could not allocate VEO args\n"); 418 return OFFLOAD_FAIL; 419 } 420 421 for (int i = 0; i < NumArgs; ++i) { 422 ret = veo_args_set_u64(TargetArgs, i, (intptr_t)Args[i]); 423 424 if (ret != 0) { 425 DP("veo_args_set_u64() has returned %d for argnum=%d and value %p\n", 426 ret, i, Args[i]); 427 return OFFLOAD_FAIL; 428 } 429 } 430 431 uint64_t RetVal; 432 if (target_run_function_wait(ID, reinterpret_cast<uint64_t>(Entry), 433 TargetArgs, &RetVal) != OFFLOAD_SUCCESS) { 434 veo_args_free(TargetArgs); 435 return OFFLOAD_FAIL; 436 } 437 veo_args_free(TargetArgs); 438 return OFFLOAD_SUCCESS; 439 } 440 441 // Transfer control to the offloaded entry Entry on the target device. 442 // Args and Offsets are arrays of NumArgs size of target addresses and 443 // offsets. An offset should be added to the target address before passing it 444 // to the outlined function on device side. In case of success, return zero. 445 // Otherwise, return an error code. 446 int32_t __tgt_rtl_run_target_region(int32_t ID, void *Entry, void **Args, 447 ptrdiff_t *Offsets, int32_t NumArgs) { 448 return __tgt_rtl_run_target_team_region(ID, Entry, Args, Offsets, NumArgs, 1, 449 1, 0); 450 } 451