diff options
author | vitalyisaev <vitalyisaev@yandex-team.com> | 2023-06-29 10:00:50 +0300 |
---|---|---|
committer | vitalyisaev <vitalyisaev@yandex-team.com> | 2023-06-29 10:00:50 +0300 |
commit | 6ffe9e53658409f212834330e13564e4952558f6 (patch) | |
tree | 85b1e00183517648b228aafa7c8fb07f5276f419 /contrib/libs/llvm14/lib/ExecutionEngine/Orc/ExecutorProcessControl.cpp | |
parent | 726057070f9c5a91fc10fde0d5024913d10f1ab9 (diff) | |
download | ydb-6ffe9e53658409f212834330e13564e4952558f6.tar.gz |
YQ Connector: support managed ClickHouse
Со стороны dqrun можно обратиться к инстансу коннектора, который работает на streaming стенде, и извлечь данные из облачного CH.
Diffstat (limited to 'contrib/libs/llvm14/lib/ExecutionEngine/Orc/ExecutorProcessControl.cpp')
-rw-r--r-- | contrib/libs/llvm14/lib/ExecutionEngine/Orc/ExecutorProcessControl.cpp | 197 |
1 files changed, 197 insertions, 0 deletions
diff --git a/contrib/libs/llvm14/lib/ExecutionEngine/Orc/ExecutorProcessControl.cpp b/contrib/libs/llvm14/lib/ExecutionEngine/Orc/ExecutorProcessControl.cpp new file mode 100644 index 0000000000..2eb835551a --- /dev/null +++ b/contrib/libs/llvm14/lib/ExecutionEngine/Orc/ExecutorProcessControl.cpp @@ -0,0 +1,197 @@ +//===---- ExecutorProcessControl.cpp -- Executor process control APIs -----===// +// +// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. +// See https://llvm.org/LICENSE.txt for license information. +// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception +// +//===----------------------------------------------------------------------===// + +#include "llvm/ExecutionEngine/Orc/ExecutorProcessControl.h" + +#include "llvm/ExecutionEngine/Orc/Core.h" +#include "llvm/ExecutionEngine/Orc/TargetProcess/TargetExecutionUtils.h" +#include "llvm/Support/FormatVariadic.h" +#include "llvm/Support/Host.h" +#include "llvm/Support/Process.h" + +#define DEBUG_TYPE "orc" + +namespace llvm { +namespace orc { + +ExecutorProcessControl::MemoryAccess::~MemoryAccess() {} + +ExecutorProcessControl::~ExecutorProcessControl() {} + +SelfExecutorProcessControl::SelfExecutorProcessControl( + std::shared_ptr<SymbolStringPool> SSP, std::unique_ptr<TaskDispatcher> D, + Triple TargetTriple, unsigned PageSize, + std::unique_ptr<jitlink::JITLinkMemoryManager> MemMgr) + : ExecutorProcessControl(std::move(SSP), std::move(D)) { + + OwnedMemMgr = std::move(MemMgr); + if (!OwnedMemMgr) + OwnedMemMgr = std::make_unique<jitlink::InProcessMemoryManager>( + sys::Process::getPageSizeEstimate()); + + this->TargetTriple = std::move(TargetTriple); + this->PageSize = PageSize; + this->MemMgr = OwnedMemMgr.get(); + this->MemAccess = this; + this->JDI = {ExecutorAddr::fromPtr(jitDispatchViaWrapperFunctionManager), + ExecutorAddr::fromPtr(this)}; + if (this->TargetTriple.isOSBinFormatMachO()) + GlobalManglingPrefix = '_'; +} + +Expected<std::unique_ptr<SelfExecutorProcessControl>> +SelfExecutorProcessControl::Create( + std::shared_ptr<SymbolStringPool> SSP, + std::unique_ptr<TaskDispatcher> D, + std::unique_ptr<jitlink::JITLinkMemoryManager> MemMgr) { + + if (!SSP) + SSP = std::make_shared<SymbolStringPool>(); + + if (!D) { +#if LLVM_ENABLE_THREADS + D = std::make_unique<DynamicThreadPoolTaskDispatcher>(); +#else + D = std::make_unique<InPlaceTaskDispatcher>(); +#endif + } + + auto PageSize = sys::Process::getPageSize(); + if (!PageSize) + return PageSize.takeError(); + + Triple TT(sys::getProcessTriple()); + + return std::make_unique<SelfExecutorProcessControl>( + std::move(SSP), std::move(D), std::move(TT), *PageSize, + std::move(MemMgr)); +} + +Expected<tpctypes::DylibHandle> +SelfExecutorProcessControl::loadDylib(const char *DylibPath) { + std::string ErrMsg; + auto Dylib = std::make_unique<sys::DynamicLibrary>( + sys::DynamicLibrary::getPermanentLibrary(DylibPath, &ErrMsg)); + if (!Dylib->isValid()) + return make_error<StringError>(std::move(ErrMsg), inconvertibleErrorCode()); + DynamicLibraries.push_back(std::move(Dylib)); + return pointerToJITTargetAddress(DynamicLibraries.back().get()); +} + +Expected<std::vector<tpctypes::LookupResult>> +SelfExecutorProcessControl::lookupSymbols(ArrayRef<LookupRequest> Request) { + std::vector<tpctypes::LookupResult> R; + + for (auto &Elem : Request) { + auto *Dylib = jitTargetAddressToPointer<sys::DynamicLibrary *>(Elem.Handle); + assert(llvm::any_of(DynamicLibraries, + [=](const std::unique_ptr<sys::DynamicLibrary> &DL) { + return DL.get() == Dylib; + }) && + "Invalid handle"); + + R.push_back(std::vector<JITTargetAddress>()); + for (auto &KV : Elem.Symbols) { + auto &Sym = KV.first; + std::string Tmp((*Sym).data() + !!GlobalManglingPrefix, + (*Sym).size() - !!GlobalManglingPrefix); + void *Addr = Dylib->getAddressOfSymbol(Tmp.c_str()); + if (!Addr && KV.second == SymbolLookupFlags::RequiredSymbol) { + // FIXME: Collect all failing symbols before erroring out. + SymbolNameVector MissingSymbols; + MissingSymbols.push_back(Sym); + return make_error<SymbolsNotFound>(SSP, std::move(MissingSymbols)); + } + R.back().push_back(pointerToJITTargetAddress(Addr)); + } + } + + return R; +} + +Expected<int32_t> +SelfExecutorProcessControl::runAsMain(ExecutorAddr MainFnAddr, + ArrayRef<std::string> Args) { + using MainTy = int (*)(int, char *[]); + return orc::runAsMain(MainFnAddr.toPtr<MainTy>(), Args); +} + +void SelfExecutorProcessControl::callWrapperAsync(ExecutorAddr WrapperFnAddr, + IncomingWFRHandler SendResult, + ArrayRef<char> ArgBuffer) { + using WrapperFnTy = + shared::CWrapperFunctionResult (*)(const char *Data, size_t Size); + auto *WrapperFn = WrapperFnAddr.toPtr<WrapperFnTy>(); + SendResult(WrapperFn(ArgBuffer.data(), ArgBuffer.size())); +} + +Error SelfExecutorProcessControl::disconnect() { + D->shutdown(); + return Error::success(); +} + +void SelfExecutorProcessControl::writeUInt8sAsync( + ArrayRef<tpctypes::UInt8Write> Ws, WriteResultFn OnWriteComplete) { + for (auto &W : Ws) + *W.Addr.toPtr<uint8_t *>() = W.Value; + OnWriteComplete(Error::success()); +} + +void SelfExecutorProcessControl::writeUInt16sAsync( + ArrayRef<tpctypes::UInt16Write> Ws, WriteResultFn OnWriteComplete) { + for (auto &W : Ws) + *W.Addr.toPtr<uint16_t *>() = W.Value; + OnWriteComplete(Error::success()); +} + +void SelfExecutorProcessControl::writeUInt32sAsync( + ArrayRef<tpctypes::UInt32Write> Ws, WriteResultFn OnWriteComplete) { + for (auto &W : Ws) + *W.Addr.toPtr<uint32_t *>() = W.Value; + OnWriteComplete(Error::success()); +} + +void SelfExecutorProcessControl::writeUInt64sAsync( + ArrayRef<tpctypes::UInt64Write> Ws, WriteResultFn OnWriteComplete) { + for (auto &W : Ws) + *W.Addr.toPtr<uint64_t *>() = W.Value; + OnWriteComplete(Error::success()); +} + +void SelfExecutorProcessControl::writeBuffersAsync( + ArrayRef<tpctypes::BufferWrite> Ws, WriteResultFn OnWriteComplete) { + for (auto &W : Ws) + memcpy(W.Addr.toPtr<char *>(), W.Buffer.data(), W.Buffer.size()); + OnWriteComplete(Error::success()); +} + +shared::CWrapperFunctionResult +SelfExecutorProcessControl::jitDispatchViaWrapperFunctionManager( + void *Ctx, const void *FnTag, const char *Data, size_t Size) { + + LLVM_DEBUG({ + dbgs() << "jit-dispatch call with tag " << FnTag << " and " << Size + << " byte payload.\n"; + }); + + std::promise<shared::WrapperFunctionResult> ResultP; + auto ResultF = ResultP.get_future(); + static_cast<SelfExecutorProcessControl *>(Ctx) + ->getExecutionSession() + .runJITDispatchHandler( + [ResultP = std::move(ResultP)]( + shared::WrapperFunctionResult Result) mutable { + ResultP.set_value(std::move(Result)); + }, + pointerToJITTargetAddress(FnTag), {Data, Size}); + + return ResultF.get().release(); +} + +} // end namespace orc +} // end namespace llvm |