xref: /freebsd/contrib/llvm-project/compiler-rt/lib/orc/macho_platform.cpp (revision 1db9f3b21e39176dd5b67cf8ac378633b172463e)
1 //===- macho_platform.cpp -------------------------------------------------===//
2 //
3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4 // See https://llvm.org/LICENSE.txt for license information.
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6 //
7 //===----------------------------------------------------------------------===//
8 //
9 // This file contains code required to load the rest of the MachO runtime.
10 //
11 //===----------------------------------------------------------------------===//
12 
13 #include "macho_platform.h"
14 #include "bitmask_enum.h"
15 #include "common.h"
16 #include "debug.h"
17 #include "error.h"
18 #include "interval_map.h"
19 #include "wrapper_function_utils.h"
20 
21 #include <algorithm>
22 #include <ios>
23 #include <map>
24 #include <mutex>
25 #include <sstream>
26 #include <string_view>
27 #include <unordered_map>
28 #include <unordered_set>
29 #include <vector>
30 
31 #define DEBUG_TYPE "macho_platform"
32 
33 using namespace __orc_rt;
34 using namespace __orc_rt::macho;
35 
36 // Declare function tags for functions in the JIT process.
37 ORC_RT_JIT_DISPATCH_TAG(__orc_rt_macho_push_initializers_tag)
38 ORC_RT_JIT_DISPATCH_TAG(__orc_rt_macho_push_symbols_tag)
39 
40 struct objc_image_info;
41 struct mach_header;
42 
43 // Objective-C registration functions.
44 // These are weakly imported. If the Objective-C runtime has not been loaded
45 // then code containing Objective-C sections will generate an error.
46 extern "C" void
47 _objc_map_images(unsigned count, const char *const paths[],
48                  const mach_header *const mhdrs[]) ORC_RT_WEAK_IMPORT;
49 
50 extern "C" void _objc_load_image(const char *path,
51                                  const mach_header *mh) ORC_RT_WEAK_IMPORT;
52 
53 // Libunwind prototypes.
54 struct unw_dynamic_unwind_sections {
55   uintptr_t dso_base;
56   uintptr_t dwarf_section;
57   size_t dwarf_section_length;
58   uintptr_t compact_unwind_section;
59   size_t compact_unwind_section_length;
60 };
61 
62 typedef int (*unw_find_dynamic_unwind_sections)(
63     uintptr_t addr, struct unw_dynamic_unwind_sections *info);
64 
65 extern "C" int __unw_add_find_dynamic_unwind_sections(
66     unw_find_dynamic_unwind_sections find_dynamic_unwind_sections)
67     ORC_RT_WEAK_IMPORT;
68 
69 extern "C" int __unw_remove_find_dynamic_unwind_sections(
70     unw_find_dynamic_unwind_sections find_dynamic_unwind_sections)
71     ORC_RT_WEAK_IMPORT;
72 
73 namespace {
74 
75 struct MachOJITDylibDepInfo {
76   bool Sealed = false;
77   std::vector<ExecutorAddr> DepHeaders;
78 };
79 
80 using MachOJITDylibDepInfoMap =
81     std::unordered_map<ExecutorAddr, MachOJITDylibDepInfo>;
82 
83 } // anonymous namespace
84 
85 namespace __orc_rt {
86 
87 using SPSMachOObjectPlatformSectionsMap =
88     SPSSequence<SPSTuple<SPSString, SPSExecutorAddrRange>>;
89 
90 using SPSMachOJITDylibDepInfo = SPSTuple<bool, SPSSequence<SPSExecutorAddr>>;
91 
92 using SPSMachOJITDylibDepInfoMap =
93     SPSSequence<SPSTuple<SPSExecutorAddr, SPSMachOJITDylibDepInfo>>;
94 
95 template <>
96 class SPSSerializationTraits<SPSMachOJITDylibDepInfo, MachOJITDylibDepInfo> {
97 public:
98   static size_t size(const MachOJITDylibDepInfo &JDI) {
99     return SPSMachOJITDylibDepInfo::AsArgList::size(JDI.Sealed, JDI.DepHeaders);
100   }
101 
102   static bool serialize(SPSOutputBuffer &OB, const MachOJITDylibDepInfo &JDI) {
103     return SPSMachOJITDylibDepInfo::AsArgList::serialize(OB, JDI.Sealed,
104                                                          JDI.DepHeaders);
105   }
106 
107   static bool deserialize(SPSInputBuffer &IB, MachOJITDylibDepInfo &JDI) {
108     return SPSMachOJITDylibDepInfo::AsArgList::deserialize(IB, JDI.Sealed,
109                                                            JDI.DepHeaders);
110   }
111 };
112 
113 struct UnwindSectionInfo {
114   std::vector<ExecutorAddrRange> CodeRanges;
115   ExecutorAddrRange DwarfSection;
116   ExecutorAddrRange CompactUnwindSection;
117 };
118 
119 using SPSUnwindSectionInfo =
120     SPSTuple<SPSSequence<SPSExecutorAddrRange>, SPSExecutorAddrRange,
121              SPSExecutorAddrRange>;
122 
123 template <>
124 class SPSSerializationTraits<SPSUnwindSectionInfo, UnwindSectionInfo> {
125 public:
126   static size_t size(const UnwindSectionInfo &USI) {
127     return SPSUnwindSectionInfo::AsArgList::size(
128         USI.CodeRanges, USI.DwarfSection, USI.CompactUnwindSection);
129   }
130 
131   static bool serialize(SPSOutputBuffer &OB, const UnwindSectionInfo &USI) {
132     return SPSUnwindSectionInfo::AsArgList::serialize(
133         OB, USI.CodeRanges, USI.DwarfSection, USI.CompactUnwindSection);
134   }
135 
136   static bool deserialize(SPSInputBuffer &IB, UnwindSectionInfo &USI) {
137     return SPSUnwindSectionInfo::AsArgList::deserialize(
138         IB, USI.CodeRanges, USI.DwarfSection, USI.CompactUnwindSection);
139   }
140 };
141 
142 } // namespace __orc_rt
143 
144 namespace {
145 struct TLVDescriptor {
146   void *(*Thunk)(TLVDescriptor *) = nullptr;
147   unsigned long Key = 0;
148   unsigned long DataAddress = 0;
149 };
150 
151 class MachOPlatformRuntimeState {
152 public:
153   // Used internally by MachOPlatformRuntimeState, but made public to enable
154   // serialization.
155   enum class MachOExecutorSymbolFlags : uint8_t {
156     None = 0,
157     Weak = 1U << 0,
158     Callable = 1U << 1,
159     ORC_RT_MARK_AS_BITMASK_ENUM(/* LargestValue = */ Callable)
160   };
161 
162 private:
163   struct AtExitEntry {
164     void (*Func)(void *);
165     void *Arg;
166   };
167 
168   using AtExitsVector = std::vector<AtExitEntry>;
169 
170   /// Used to manage sections of fixed-sized metadata records (e.g. pointer
171   /// sections, selector refs, etc.)
172   template <typename RecordElement> class RecordSectionsTracker {
173   public:
174     /// Add a section to the "new" list.
175     void add(span<RecordElement> Sec) { New.push_back(std::move(Sec)); }
176 
177     /// Returns true if there are new sections to process.
178     bool hasNewSections() const { return !New.empty(); }
179 
180     /// Returns the number of new sections to process.
181     size_t numNewSections() const { return New.size(); }
182 
183     /// Process all new sections.
184     template <typename ProcessSectionFunc>
185     std::enable_if_t<std::is_void_v<
186         std::invoke_result_t<ProcessSectionFunc, span<RecordElement>>>>
187     processNewSections(ProcessSectionFunc &&ProcessSection) {
188       for (auto &Sec : New)
189         ProcessSection(Sec);
190       moveNewToProcessed();
191     }
192 
193     /// Proces all new sections with a fallible handler.
194     ///
195     /// Successfully handled sections will be moved to the Processed
196     /// list.
197     template <typename ProcessSectionFunc>
198     std::enable_if_t<
199         std::is_same_v<Error, std::invoke_result_t<ProcessSectionFunc,
200                                                    span<RecordElement>>>,
201         Error>
202     processNewSections(ProcessSectionFunc &&ProcessSection) {
203       for (size_t I = 0; I != New.size(); ++I) {
204         if (auto Err = ProcessSection(New[I])) {
205           for (size_t J = 0; J != I; ++J)
206             Processed.push_back(New[J]);
207           New.erase(New.begin(), New.begin() + I);
208           return Err;
209         }
210       }
211       moveNewToProcessed();
212       return Error::success();
213     }
214 
215     /// Move all sections back to New for reprocessing.
216     void reset() {
217       moveNewToProcessed();
218       New = std::move(Processed);
219     }
220 
221     /// Remove the section with the given range.
222     bool removeIfPresent(ExecutorAddrRange R) {
223       if (removeIfPresent(New, R))
224         return true;
225       return removeIfPresent(Processed, R);
226     }
227 
228   private:
229     void moveNewToProcessed() {
230       if (Processed.empty())
231         Processed = std::move(New);
232       else {
233         Processed.reserve(Processed.size() + New.size());
234         std::copy(New.begin(), New.end(), std::back_inserter(Processed));
235         New.clear();
236       }
237     }
238 
239     bool removeIfPresent(std::vector<span<RecordElement>> &V,
240                          ExecutorAddrRange R) {
241       auto RI = std::find_if(
242           V.rbegin(), V.rend(),
243           [RS = R.toSpan<RecordElement>()](const span<RecordElement> &E) {
244             return E.data() == RS.data();
245           });
246       if (RI != V.rend()) {
247         V.erase(std::next(RI).base());
248         return true;
249       }
250       return false;
251     }
252 
253     std::vector<span<RecordElement>> Processed;
254     std::vector<span<RecordElement>> New;
255   };
256 
257   struct UnwindSections {
258     UnwindSections(const UnwindSectionInfo &USI)
259         : DwarfSection(USI.DwarfSection.toSpan<char>()),
260           CompactUnwindSection(USI.CompactUnwindSection.toSpan<char>()) {}
261 
262     span<char> DwarfSection;
263     span<char> CompactUnwindSection;
264   };
265 
266   using UnwindSectionsMap =
267       IntervalMap<char *, UnwindSections, IntervalCoalescing::Disabled>;
268 
269   struct JITDylibState {
270 
271     using SymbolTableMap =
272         std::unordered_map<std::string_view,
273                            std::pair<ExecutorAddr, MachOExecutorSymbolFlags>>;
274 
275     std::string Name;
276     void *Header = nullptr;
277     bool Sealed = false;
278     size_t LinkedAgainstRefCount = 0;
279     size_t DlRefCount = 0;
280     SymbolTableMap SymbolTable;
281     std::vector<JITDylibState *> Deps;
282     AtExitsVector AtExits;
283     const objc_image_info *ObjCImageInfo = nullptr;
284     std::unordered_map<void *, std::vector<char>> DataSectionContent;
285     std::unordered_map<void *, size_t> ZeroInitRanges;
286     UnwindSectionsMap UnwindSections;
287     RecordSectionsTracker<void (*)()> ModInitsSections;
288     RecordSectionsTracker<char> ObjCRuntimeRegistrationObjects;
289 
290     bool referenced() const {
291       return LinkedAgainstRefCount != 0 || DlRefCount != 0;
292     }
293   };
294 
295 public:
296   static Error create();
297   static MachOPlatformRuntimeState &get();
298   static Error destroy();
299 
300   MachOPlatformRuntimeState() = default;
301 
302   // Delete copy and move constructors.
303   MachOPlatformRuntimeState(const MachOPlatformRuntimeState &) = delete;
304   MachOPlatformRuntimeState &
305   operator=(const MachOPlatformRuntimeState &) = delete;
306   MachOPlatformRuntimeState(MachOPlatformRuntimeState &&) = delete;
307   MachOPlatformRuntimeState &operator=(MachOPlatformRuntimeState &&) = delete;
308 
309   Error initialize();
310   Error shutdown();
311 
312   Error registerJITDylib(std::string Name, void *Header);
313   Error deregisterJITDylib(void *Header);
314   Error registerThreadDataSection(span<const char> ThreadDataSection);
315   Error deregisterThreadDataSection(span<const char> ThreadDataSection);
316   Error registerObjectSymbolTable(
317       ExecutorAddr HeaderAddr,
318       const std::vector<std::tuple<ExecutorAddr, ExecutorAddr,
319                                    MachOExecutorSymbolFlags>> &Entries);
320   Error deregisterObjectSymbolTable(
321       ExecutorAddr HeaderAddr,
322       const std::vector<std::tuple<ExecutorAddr, ExecutorAddr,
323                                    MachOExecutorSymbolFlags>> &Entries);
324   Error registerObjectPlatformSections(
325       ExecutorAddr HeaderAddr, std::optional<UnwindSectionInfo> UnwindSections,
326       std::vector<std::pair<std::string_view, ExecutorAddrRange>> Secs);
327   Error deregisterObjectPlatformSections(
328       ExecutorAddr HeaderAddr, std::optional<UnwindSectionInfo> UnwindSections,
329       std::vector<std::pair<std::string_view, ExecutorAddrRange>> Secs);
330 
331   const char *dlerror();
332   void *dlopen(std::string_view Name, int Mode);
333   int dlclose(void *DSOHandle);
334   void *dlsym(void *DSOHandle, const char *Symbol);
335 
336   int registerAtExit(void (*F)(void *), void *Arg, void *DSOHandle);
337   void runAtExits(std::unique_lock<std::mutex> &JDStatesLock,
338                   JITDylibState &JDS);
339   void runAtExits(void *DSOHandle);
340 
341   /// Returns the base address of the section containing ThreadData.
342   Expected<std::pair<const char *, size_t>>
343   getThreadDataSectionFor(const char *ThreadData);
344 
345 private:
346   JITDylibState *getJITDylibStateByHeader(void *DSOHandle);
347   JITDylibState *getJITDylibStateByName(std::string_view Path);
348 
349   /// Requests materialization of the given symbols. For each pair, the bool
350   /// element indicates whether the symbol is required (true) or weakly
351   /// referenced (false).
352   Error requestPushSymbols(JITDylibState &JDS,
353                            span<std::pair<std::string_view, bool>> Symbols);
354 
355   /// Attempts to look up the given symbols locally, requesting a push from the
356   /// remote if they're not found. Results are written to the Result span, which
357   /// must have the same size as the Symbols span.
358   Error
359   lookupSymbols(JITDylibState &JDS, std::unique_lock<std::mutex> &JDStatesLock,
360                 span<std::pair<ExecutorAddr, MachOExecutorSymbolFlags>> Result,
361                 span<std::pair<std::string_view, bool>> Symbols);
362 
363   bool lookupUnwindSections(void *Addr, unw_dynamic_unwind_sections &Info);
364 
365   static int findDynamicUnwindSections(uintptr_t addr,
366                                        unw_dynamic_unwind_sections *info);
367   static Error registerEHFrames(span<const char> EHFrameSection);
368   static Error deregisterEHFrames(span<const char> EHFrameSection);
369 
370   static Error registerObjCRegistrationObjects(JITDylibState &JDS);
371   static Error runModInits(std::unique_lock<std::mutex> &JDStatesLock,
372                            JITDylibState &JDS);
373 
374   Expected<void *> dlopenImpl(std::string_view Path, int Mode);
375   Error dlopenFull(std::unique_lock<std::mutex> &JDStatesLock,
376                    JITDylibState &JDS);
377   Error dlopenInitialize(std::unique_lock<std::mutex> &JDStatesLock,
378                          JITDylibState &JDS, MachOJITDylibDepInfoMap &DepInfo);
379 
380   Error dlcloseImpl(void *DSOHandle);
381   Error dlcloseDeinitialize(std::unique_lock<std::mutex> &JDStatesLock,
382                             JITDylibState &JDS);
383 
384   static MachOPlatformRuntimeState *MOPS;
385 
386   bool UseCallbackStyleUnwindInfo = false;
387 
388   // FIXME: Move to thread-state.
389   std::string DLFcnError;
390 
391   // APIMutex guards against concurrent entry into key "dyld" API functions
392   // (e.g. dlopen, dlclose).
393   std::recursive_mutex DyldAPIMutex;
394 
395   // JDStatesMutex guards the data structures that hold JITDylib state.
396   std::mutex JDStatesMutex;
397   std::unordered_map<void *, JITDylibState> JDStates;
398   std::unordered_map<std::string_view, void *> JDNameToHeader;
399 
400   // ThreadDataSectionsMutex guards thread local data section state.
401   std::mutex ThreadDataSectionsMutex;
402   std::map<const char *, size_t> ThreadDataSections;
403 };
404 
405 } // anonymous namespace
406 
407 namespace __orc_rt {
408 
409 class SPSMachOExecutorSymbolFlags;
410 
411 template <>
412 class SPSSerializationTraits<
413     SPSMachOExecutorSymbolFlags,
414     MachOPlatformRuntimeState::MachOExecutorSymbolFlags> {
415 private:
416   using UT = std::underlying_type_t<
417       MachOPlatformRuntimeState::MachOExecutorSymbolFlags>;
418 
419 public:
420   static size_t
421   size(const MachOPlatformRuntimeState::MachOExecutorSymbolFlags &SF) {
422     return sizeof(UT);
423   }
424 
425   static bool
426   serialize(SPSOutputBuffer &OB,
427             const MachOPlatformRuntimeState::MachOExecutorSymbolFlags &SF) {
428     return SPSArgList<UT>::serialize(OB, static_cast<UT>(SF));
429   }
430 
431   static bool
432   deserialize(SPSInputBuffer &IB,
433               MachOPlatformRuntimeState::MachOExecutorSymbolFlags &SF) {
434     UT Tmp;
435     if (!SPSArgList<UT>::deserialize(IB, Tmp))
436       return false;
437     SF = static_cast<MachOPlatformRuntimeState::MachOExecutorSymbolFlags>(Tmp);
438     return true;
439   }
440 };
441 
442 } // namespace __orc_rt
443 
444 namespace {
445 
446 MachOPlatformRuntimeState *MachOPlatformRuntimeState::MOPS = nullptr;
447 
448 Error MachOPlatformRuntimeState::create() {
449   assert(!MOPS && "MachOPlatformRuntimeState should be null");
450   MOPS = new MachOPlatformRuntimeState();
451   return MOPS->initialize();
452 }
453 
454 MachOPlatformRuntimeState &MachOPlatformRuntimeState::get() {
455   assert(MOPS && "MachOPlatformRuntimeState not initialized");
456   return *MOPS;
457 }
458 
459 Error MachOPlatformRuntimeState::destroy() {
460   assert(MOPS && "MachOPlatformRuntimeState not initialized");
461   auto Err = MOPS->shutdown();
462   delete MOPS;
463   return Err;
464 }
465 
466 Error MachOPlatformRuntimeState::initialize() {
467   UseCallbackStyleUnwindInfo = __unw_add_find_dynamic_unwind_sections &&
468                                __unw_remove_find_dynamic_unwind_sections;
469   if (UseCallbackStyleUnwindInfo) {
470     ORC_RT_DEBUG({
471       printdbg("__unw_add/remove_find_dynamic_unwind_sections available."
472                " Using callback-based frame info lookup.\n");
473     });
474     if (__unw_add_find_dynamic_unwind_sections(&findDynamicUnwindSections))
475       return make_error<StringError>(
476           "Could not register findDynamicUnwindSections");
477   } else {
478     ORC_RT_DEBUG({
479       printdbg("__unw_add/remove_find_dynamic_unwind_sections not available."
480                " Using classic frame info registration.\n");
481     });
482   }
483   return Error::success();
484 }
485 
486 Error MachOPlatformRuntimeState::shutdown() {
487   if (UseCallbackStyleUnwindInfo) {
488     if (__unw_remove_find_dynamic_unwind_sections(&findDynamicUnwindSections)) {
489       ORC_RT_DEBUG(
490           { printdbg("__unw_remove_find_dynamic_unwind_sections failed.\n"); });
491     }
492   }
493   return Error::success();
494 }
495 
496 Error MachOPlatformRuntimeState::registerJITDylib(std::string Name,
497                                                   void *Header) {
498   ORC_RT_DEBUG({
499     printdbg("Registering JITDylib %s: Header = %p\n", Name.c_str(), Header);
500   });
501   std::lock_guard<std::mutex> Lock(JDStatesMutex);
502   if (JDStates.count(Header)) {
503     std::ostringstream ErrStream;
504     ErrStream << "Duplicate JITDylib registration for header " << Header
505               << " (name = " << Name << ")";
506     return make_error<StringError>(ErrStream.str());
507   }
508   if (JDNameToHeader.count(Name)) {
509     std::ostringstream ErrStream;
510     ErrStream << "Duplicate JITDylib registration for header " << Header
511               << " (header = " << Header << ")";
512     return make_error<StringError>(ErrStream.str());
513   }
514 
515   auto &JDS = JDStates[Header];
516   JDS.Name = std::move(Name);
517   JDS.Header = Header;
518   JDNameToHeader[JDS.Name] = Header;
519   return Error::success();
520 }
521 
522 Error MachOPlatformRuntimeState::deregisterJITDylib(void *Header) {
523   std::lock_guard<std::mutex> Lock(JDStatesMutex);
524   auto I = JDStates.find(Header);
525   if (I == JDStates.end()) {
526     std::ostringstream ErrStream;
527     ErrStream << "Attempted to deregister unrecognized header " << Header;
528     return make_error<StringError>(ErrStream.str());
529   }
530 
531   // Remove std::string construction once we can use C++20.
532   auto J = JDNameToHeader.find(
533       std::string(I->second.Name.data(), I->second.Name.size()));
534   assert(J != JDNameToHeader.end() &&
535          "Missing JDNameToHeader entry for JITDylib");
536 
537   ORC_RT_DEBUG({
538     printdbg("Deregistering JITDylib %s: Header = %p\n", I->second.Name.c_str(),
539              Header);
540   });
541 
542   JDNameToHeader.erase(J);
543   JDStates.erase(I);
544   return Error::success();
545 }
546 
547 Error MachOPlatformRuntimeState::registerThreadDataSection(
548     span<const char> ThreadDataSection) {
549   std::lock_guard<std::mutex> Lock(ThreadDataSectionsMutex);
550   auto I = ThreadDataSections.upper_bound(ThreadDataSection.data());
551   if (I != ThreadDataSections.begin()) {
552     auto J = std::prev(I);
553     if (J->first + J->second > ThreadDataSection.data())
554       return make_error<StringError>("Overlapping __thread_data sections");
555   }
556   ThreadDataSections.insert(
557       I, std::make_pair(ThreadDataSection.data(), ThreadDataSection.size()));
558   return Error::success();
559 }
560 
561 Error MachOPlatformRuntimeState::deregisterThreadDataSection(
562     span<const char> ThreadDataSection) {
563   std::lock_guard<std::mutex> Lock(ThreadDataSectionsMutex);
564   auto I = ThreadDataSections.find(ThreadDataSection.data());
565   if (I == ThreadDataSections.end())
566     return make_error<StringError>("Attempt to deregister unknown thread data "
567                                    "section");
568   ThreadDataSections.erase(I);
569   return Error::success();
570 }
571 
572 Error MachOPlatformRuntimeState::registerObjectSymbolTable(
573     ExecutorAddr HeaderAddr,
574     const std::vector<std::tuple<ExecutorAddr, ExecutorAddr,
575                                  MachOExecutorSymbolFlags>> &Entries) {
576 
577   std::lock_guard<std::mutex> Lock(JDStatesMutex);
578   auto *JDS = getJITDylibStateByHeader(HeaderAddr.toPtr<void *>());
579   if (!JDS) {
580     std::ostringstream ErrStream;
581     ErrStream << "Could not register object platform sections for "
582                  "unrecognized header "
583               << HeaderAddr.toPtr<void *>();
584     return make_error<StringError>(ErrStream.str());
585   }
586 
587   for (auto &[NameAddr, SymAddr, Flags] : Entries)
588     JDS->SymbolTable[NameAddr.toPtr<const char *>()] = {SymAddr, Flags};
589 
590   return Error::success();
591 }
592 
593 Error MachOPlatformRuntimeState::deregisterObjectSymbolTable(
594     ExecutorAddr HeaderAddr,
595     const std::vector<std::tuple<ExecutorAddr, ExecutorAddr,
596                                  MachOExecutorSymbolFlags>> &Entries) {
597 
598   std::lock_guard<std::mutex> Lock(JDStatesMutex);
599   auto *JDS = getJITDylibStateByHeader(HeaderAddr.toPtr<void *>());
600   if (!JDS) {
601     std::ostringstream ErrStream;
602     ErrStream << "Could not register object platform sections for "
603                  "unrecognized header "
604               << HeaderAddr.toPtr<void *>();
605     return make_error<StringError>(ErrStream.str());
606   }
607 
608   for (auto &[NameAddr, SymAddr, Flags] : Entries)
609     JDS->SymbolTable.erase(NameAddr.toPtr<const char *>());
610 
611   return Error::success();
612 }
613 
614 Error MachOPlatformRuntimeState::registerObjectPlatformSections(
615     ExecutorAddr HeaderAddr, std::optional<UnwindSectionInfo> UnwindInfo,
616     std::vector<std::pair<std::string_view, ExecutorAddrRange>> Secs) {
617 
618   // FIXME: Reject platform section registration after the JITDylib is
619   // sealed?
620 
621   ORC_RT_DEBUG({
622     printdbg("MachOPlatform: Registering object sections for %p.\n",
623              HeaderAddr.toPtr<void *>());
624   });
625 
626   std::lock_guard<std::mutex> Lock(JDStatesMutex);
627   auto *JDS = getJITDylibStateByHeader(HeaderAddr.toPtr<void *>());
628   if (!JDS) {
629     std::ostringstream ErrStream;
630     ErrStream << "Could not register object platform sections for "
631                  "unrecognized header "
632               << HeaderAddr.toPtr<void *>();
633     return make_error<StringError>(ErrStream.str());
634   }
635 
636   if (UnwindInfo && UseCallbackStyleUnwindInfo) {
637     ORC_RT_DEBUG({
638       printdbg("  Registering new-style unwind info for:\n"
639                "    DWARF: %p -- %p\n"
640                "    Compact-unwind: %p -- %p\n"
641                "  for:\n",
642                UnwindInfo->DwarfSection.Start.toPtr<void *>(),
643                UnwindInfo->DwarfSection.End.toPtr<void *>(),
644                UnwindInfo->CompactUnwindSection.Start.toPtr<void *>(),
645                UnwindInfo->CompactUnwindSection.End.toPtr<void *>());
646     });
647     for (auto &CodeRange : UnwindInfo->CodeRanges) {
648       JDS->UnwindSections.insert(CodeRange.Start.toPtr<char *>(),
649                                  CodeRange.End.toPtr<char *>(), *UnwindInfo);
650       ORC_RT_DEBUG({
651         printdbg("    [ %p -- %p ]\n", CodeRange.Start.toPtr<void *>(),
652                  CodeRange.End.toPtr<void *>());
653       });
654     }
655   }
656 
657   for (auto &KV : Secs) {
658     // FIXME: Validate section ranges?
659     if (KV.first == "__TEXT,__eh_frame") {
660       if (!UseCallbackStyleUnwindInfo) {
661         // Use classic libunwind registration.
662         if (auto Err = registerEHFrames(KV.second.toSpan<const char>()))
663           return Err;
664       }
665     } else if (KV.first == "__DATA,__data") {
666       assert(!JDS->DataSectionContent.count(KV.second.Start.toPtr<char *>()) &&
667              "Address already registered.");
668       auto S = KV.second.toSpan<char>();
669       JDS->DataSectionContent[KV.second.Start.toPtr<char *>()] =
670           std::vector<char>(S.begin(), S.end());
671     } else if (KV.first == "__DATA,__common") {
672       JDS->ZeroInitRanges[KV.second.Start.toPtr<char *>()] = KV.second.size();
673     } else if (KV.first == "__DATA,__thread_data") {
674       if (auto Err = registerThreadDataSection(KV.second.toSpan<const char>()))
675         return Err;
676     } else if (KV.first == "__llvm_jitlink_ObjCRuntimeRegistrationObject")
677       JDS->ObjCRuntimeRegistrationObjects.add(KV.second.toSpan<char>());
678     else if (KV.first == "__DATA,__mod_init_func")
679       JDS->ModInitsSections.add(KV.second.toSpan<void (*)()>());
680     else {
681       // Should this be a warning instead?
682       return make_error<StringError>(
683           "Encountered unexpected section " +
684           std::string(KV.first.data(), KV.first.size()) +
685           " while registering object platform sections");
686     }
687   }
688 
689   return Error::success();
690 }
691 
692 Error MachOPlatformRuntimeState::deregisterObjectPlatformSections(
693     ExecutorAddr HeaderAddr, std::optional<UnwindSectionInfo> UnwindInfo,
694     std::vector<std::pair<std::string_view, ExecutorAddrRange>> Secs) {
695   // TODO: Make this more efficient? (maybe unnecessary if removal is rare?)
696   // TODO: Add a JITDylib prepare-for-teardown operation that clears all
697   //       registered sections, causing this function to take the fast-path.
698   ORC_RT_DEBUG({
699     printdbg("MachOPlatform: Deregistering object sections for %p.\n",
700              HeaderAddr.toPtr<void *>());
701   });
702 
703   std::lock_guard<std::mutex> Lock(JDStatesMutex);
704   auto *JDS = getJITDylibStateByHeader(HeaderAddr.toPtr<void *>());
705   if (!JDS) {
706     std::ostringstream ErrStream;
707     ErrStream << "Could not register object platform sections for unrecognized "
708                  "header "
709               << HeaderAddr.toPtr<void *>();
710     return make_error<StringError>(ErrStream.str());
711   }
712 
713   // FIXME: Implement faster-path by returning immediately if JDS is being
714   // torn down entirely?
715 
716   // TODO: Make library permanent (i.e. not able to be dlclosed) if it contains
717   // any Swift or ObjC. Once this happens we can clear (and no longer record)
718   // data section content, as the library could never be re-initialized.
719 
720   if (UnwindInfo && UseCallbackStyleUnwindInfo) {
721     ORC_RT_DEBUG({
722       printdbg("  Deregistering new-style unwind info for:\n"
723                "    DWARF: %p -- %p\n"
724                "    Compact-unwind: %p -- %p\n"
725                "  for:\n",
726                UnwindInfo->DwarfSection.Start.toPtr<void *>(),
727                UnwindInfo->DwarfSection.End.toPtr<void *>(),
728                UnwindInfo->CompactUnwindSection.Start.toPtr<void *>(),
729                UnwindInfo->CompactUnwindSection.End.toPtr<void *>());
730     });
731     for (auto &CodeRange : UnwindInfo->CodeRanges) {
732       JDS->UnwindSections.erase(CodeRange.Start.toPtr<char *>(),
733                                 CodeRange.End.toPtr<char *>());
734       ORC_RT_DEBUG({
735         printdbg("    [ %p -- %p ]\n", CodeRange.Start.toPtr<void *>(),
736                  CodeRange.End.toPtr<void *>());
737       });
738     }
739   }
740 
741   for (auto &KV : Secs) {
742     // FIXME: Validate section ranges?
743     if (KV.first == "__TEXT,__eh_frame") {
744       if (!UseCallbackStyleUnwindInfo) {
745         // Use classic libunwind registration.
746         if (auto Err = deregisterEHFrames(KV.second.toSpan<const char>()))
747           return Err;
748       }
749     } else if (KV.first == "__DATA,__data") {
750       JDS->DataSectionContent.erase(KV.second.Start.toPtr<char *>());
751     } else if (KV.first == "__DATA,__common") {
752       JDS->ZeroInitRanges.erase(KV.second.Start.toPtr<char *>());
753     } else if (KV.first == "__DATA,__thread_data") {
754       if (auto Err =
755               deregisterThreadDataSection(KV.second.toSpan<const char>()))
756         return Err;
757     } else if (KV.first == "__llvm_jitlink_ObjCRuntimeRegistrationObject")
758       JDS->ObjCRuntimeRegistrationObjects.removeIfPresent(KV.second);
759     else if (KV.first == "__DATA,__mod_init_func")
760       JDS->ModInitsSections.removeIfPresent(KV.second);
761     else {
762       // Should this be a warning instead?
763       return make_error<StringError>(
764           "Encountered unexpected section " +
765           std::string(KV.first.data(), KV.first.size()) +
766           " while deregistering object platform sections");
767     }
768   }
769   return Error::success();
770 }
771 
772 const char *MachOPlatformRuntimeState::dlerror() { return DLFcnError.c_str(); }
773 
774 void *MachOPlatformRuntimeState::dlopen(std::string_view Path, int Mode) {
775   ORC_RT_DEBUG({
776     std::string S(Path.data(), Path.size());
777     printdbg("MachOPlatform::dlopen(\"%s\")\n", S.c_str());
778   });
779   std::lock_guard<std::recursive_mutex> Lock(DyldAPIMutex);
780   if (auto H = dlopenImpl(Path, Mode))
781     return *H;
782   else {
783     // FIXME: Make dlerror thread safe.
784     DLFcnError = toString(H.takeError());
785     return nullptr;
786   }
787 }
788 
789 int MachOPlatformRuntimeState::dlclose(void *DSOHandle) {
790   ORC_RT_DEBUG({
791     auto *JDS = getJITDylibStateByHeader(DSOHandle);
792     std::string DylibName;
793     if (JDS) {
794       std::string S;
795       printdbg("MachOPlatform::dlclose(%p) (%s)\n", DSOHandle, S.c_str());
796     } else
797       printdbg("MachOPlatform::dlclose(%p) (%s)\n", DSOHandle,
798                "invalid handle");
799   });
800   std::lock_guard<std::recursive_mutex> Lock(DyldAPIMutex);
801   if (auto Err = dlcloseImpl(DSOHandle)) {
802     // FIXME: Make dlerror thread safe.
803     DLFcnError = toString(std::move(Err));
804     return -1;
805   }
806   return 0;
807 }
808 
809 void *MachOPlatformRuntimeState::dlsym(void *DSOHandle, const char *Symbol) {
810   std::unique_lock<std::mutex> Lock(JDStatesMutex);
811   auto *JDS = getJITDylibStateByHeader(DSOHandle);
812   if (!JDS) {
813     std::ostringstream ErrStream;
814     ErrStream << "In call to dlsym, unrecognized header address " << DSOHandle;
815     DLFcnError = ErrStream.str();
816     return nullptr;
817   }
818 
819   std::string MangledName = std::string("_") + Symbol;
820   std::pair<std::string_view, bool> Lookup(MangledName, false);
821   std::pair<ExecutorAddr, MachOExecutorSymbolFlags> Result;
822 
823   if (auto Err = lookupSymbols(*JDS, Lock, {&Result, 1}, {&Lookup, 1})) {
824     DLFcnError = toString(std::move(Err));
825     return nullptr;
826   }
827 
828   // Sign callable symbols as functions, to match dyld.
829   if ((Result.second & MachOExecutorSymbolFlags::Callable) ==
830       MachOExecutorSymbolFlags::Callable)
831     return reinterpret_cast<void *>(Result.first.toPtr<void(void)>());
832   return Result.first.toPtr<void *>();
833 }
834 
835 int MachOPlatformRuntimeState::registerAtExit(void (*F)(void *), void *Arg,
836                                               void *DSOHandle) {
837   // FIXME: Handle out-of-memory errors, returning -1 if OOM.
838   std::lock_guard<std::mutex> Lock(JDStatesMutex);
839   auto *JDS = getJITDylibStateByHeader(DSOHandle);
840   if (!JDS) {
841     ORC_RT_DEBUG({
842       printdbg("MachOPlatformRuntimeState::registerAtExit called with "
843                "unrecognized dso handle %p\n",
844                DSOHandle);
845     });
846     return -1;
847   }
848   JDS->AtExits.push_back({F, Arg});
849   return 0;
850 }
851 
852 void MachOPlatformRuntimeState::runAtExits(
853     std::unique_lock<std::mutex> &JDStatesLock, JITDylibState &JDS) {
854   auto AtExits = std::move(JDS.AtExits);
855 
856   // Unlock while running atexits, as they may trigger operations that modify
857   // JDStates.
858   JDStatesLock.unlock();
859   while (!AtExits.empty()) {
860     auto &AE = AtExits.back();
861     AE.Func(AE.Arg);
862     AtExits.pop_back();
863   }
864   JDStatesLock.lock();
865 }
866 
867 void MachOPlatformRuntimeState::runAtExits(void *DSOHandle) {
868   std::unique_lock<std::mutex> Lock(JDStatesMutex);
869   auto *JDS = getJITDylibStateByHeader(DSOHandle);
870   ORC_RT_DEBUG({
871     printdbg("MachOPlatformRuntimeState::runAtExits called on unrecognized "
872              "dso_handle %p\n",
873              DSOHandle);
874   });
875   if (JDS)
876     runAtExits(Lock, *JDS);
877 }
878 
879 Expected<std::pair<const char *, size_t>>
880 MachOPlatformRuntimeState::getThreadDataSectionFor(const char *ThreadData) {
881   std::lock_guard<std::mutex> Lock(ThreadDataSectionsMutex);
882   auto I = ThreadDataSections.upper_bound(ThreadData);
883   // Check that we have a valid entry covering this address.
884   if (I == ThreadDataSections.begin())
885     return make_error<StringError>("No thread local data section for key");
886   I = std::prev(I);
887   if (ThreadData >= I->first + I->second)
888     return make_error<StringError>("No thread local data section for key");
889   return *I;
890 }
891 
892 MachOPlatformRuntimeState::JITDylibState *
893 MachOPlatformRuntimeState::getJITDylibStateByHeader(void *DSOHandle) {
894   auto I = JDStates.find(DSOHandle);
895   if (I == JDStates.end()) {
896     I = JDStates.insert(std::make_pair(DSOHandle, JITDylibState())).first;
897     I->second.Header = DSOHandle;
898   }
899   return &I->second;
900 }
901 
902 MachOPlatformRuntimeState::JITDylibState *
903 MachOPlatformRuntimeState::getJITDylibStateByName(std::string_view Name) {
904   // FIXME: Avoid creating string once we have C++20.
905   auto I = JDNameToHeader.find(std::string(Name.data(), Name.size()));
906   if (I != JDNameToHeader.end())
907     return getJITDylibStateByHeader(I->second);
908   return nullptr;
909 }
910 
911 Error MachOPlatformRuntimeState::requestPushSymbols(
912     JITDylibState &JDS, span<std::pair<std::string_view, bool>> Symbols) {
913   Error OpErr = Error::success();
914   if (auto Err = WrapperFunction<SPSError(
915           SPSExecutorAddr, SPSSequence<SPSTuple<SPSString, bool>>)>::
916           call(&__orc_rt_macho_push_symbols_tag, OpErr,
917                ExecutorAddr::fromPtr(JDS.Header), Symbols)) {
918     cantFail(std::move(OpErr));
919     return std::move(Err);
920   }
921   return OpErr;
922 }
923 
924 Error MachOPlatformRuntimeState::lookupSymbols(
925     JITDylibState &JDS, std::unique_lock<std::mutex> &JDStatesLock,
926     span<std::pair<ExecutorAddr, MachOExecutorSymbolFlags>> Result,
927     span<std::pair<std::string_view, bool>> Symbols) {
928   assert(JDStatesLock.owns_lock() &&
929          "JDStatesLock should be locked at call-site");
930   assert(Result.size() == Symbols.size() &&
931          "Results and Symbols span sizes should match");
932 
933   // Make an initial pass over the local symbol table.
934   std::vector<size_t> MissingSymbolIndexes;
935   for (size_t Idx = 0; Idx != Symbols.size(); ++Idx) {
936     auto I = JDS.SymbolTable.find(Symbols[Idx].first);
937     if (I != JDS.SymbolTable.end())
938       Result[Idx] = I->second;
939     else
940       MissingSymbolIndexes.push_back(Idx);
941   }
942 
943   // If everything has been resolved already then bail out early.
944   if (MissingSymbolIndexes.empty())
945     return Error::success();
946 
947   // Otherwise call back to the controller to try to request that the symbol
948   // be materialized.
949   std::vector<std::pair<std::string_view, bool>> MissingSymbols;
950   MissingSymbols.reserve(MissingSymbolIndexes.size());
951   ORC_RT_DEBUG({
952     printdbg("requesting push of %i missing symbols...\n",
953              MissingSymbolIndexes.size());
954   });
955   for (auto MissingIdx : MissingSymbolIndexes)
956     MissingSymbols.push_back(Symbols[MissingIdx]);
957 
958   JDStatesLock.unlock();
959   if (auto Err = requestPushSymbols(
960           JDS, {MissingSymbols.data(), MissingSymbols.size()}))
961     return Err;
962   JDStatesLock.lock();
963 
964   // Try to resolve the previously missing symbols locally.
965   std::vector<size_t> MissingRequiredSymbols;
966   for (auto MissingIdx : MissingSymbolIndexes) {
967     auto I = JDS.SymbolTable.find(Symbols[MissingIdx].first);
968     if (I != JDS.SymbolTable.end())
969       Result[MissingIdx] = I->second;
970     else {
971       if (Symbols[MissingIdx].second)
972         MissingRequiredSymbols.push_back(MissingIdx);
973       else
974         Result[MissingIdx] = {ExecutorAddr(), {}};
975     }
976   }
977 
978   // Error out if any missing symbols could not be resolved.
979   if (!MissingRequiredSymbols.empty()) {
980     std::ostringstream ErrStream;
981     ErrStream << "Lookup could not find required symbols: [ ";
982     for (auto MissingIdx : MissingRequiredSymbols)
983       ErrStream << "\"" << Symbols[MissingIdx].first << "\" ";
984     ErrStream << "]";
985     return make_error<StringError>(ErrStream.str());
986   }
987 
988   return Error::success();
989 }
990 
991 // eh-frame registration functions.
992 // We expect these to be available for all processes.
993 extern "C" void __register_frame(const void *);
994 extern "C" void __deregister_frame(const void *);
995 
996 template <typename HandleFDEFn>
997 void walkEHFrameSection(span<const char> EHFrameSection,
998                         HandleFDEFn HandleFDE) {
999   const char *CurCFIRecord = EHFrameSection.data();
1000   uint64_t Size = *reinterpret_cast<const uint32_t *>(CurCFIRecord);
1001 
1002   while (CurCFIRecord != EHFrameSection.end() && Size != 0) {
1003     const char *OffsetField = CurCFIRecord + (Size == 0xffffffff ? 12 : 4);
1004     if (Size == 0xffffffff)
1005       Size = *reinterpret_cast<const uint64_t *>(CurCFIRecord + 4) + 12;
1006     else
1007       Size += 4;
1008     uint32_t Offset = *reinterpret_cast<const uint32_t *>(OffsetField);
1009 
1010     if (Offset != 0)
1011       HandleFDE(CurCFIRecord);
1012 
1013     CurCFIRecord += Size;
1014     Size = *reinterpret_cast<const uint32_t *>(CurCFIRecord);
1015   }
1016 }
1017 
1018 bool MachOPlatformRuntimeState::lookupUnwindSections(
1019     void *Addr, unw_dynamic_unwind_sections &Info) {
1020   ORC_RT_DEBUG(
1021       { printdbg("Tried to lookup unwind-info via new lookup call.\n"); });
1022   std::lock_guard<std::mutex> Lock(JDStatesMutex);
1023   for (auto &KV : JDStates) {
1024     auto &JD = KV.second;
1025     auto I = JD.UnwindSections.find(reinterpret_cast<char *>(Addr));
1026     if (I != JD.UnwindSections.end()) {
1027       Info.dso_base = reinterpret_cast<uintptr_t>(JD.Header);
1028       Info.dwarf_section =
1029           reinterpret_cast<uintptr_t>(I->second.DwarfSection.data());
1030       Info.dwarf_section_length = I->second.DwarfSection.size();
1031       Info.compact_unwind_section =
1032           reinterpret_cast<uintptr_t>(I->second.CompactUnwindSection.data());
1033       Info.compact_unwind_section_length =
1034           I->second.CompactUnwindSection.size();
1035       return true;
1036     }
1037   }
1038   return false;
1039 }
1040 
1041 int MachOPlatformRuntimeState::findDynamicUnwindSections(
1042     uintptr_t addr, unw_dynamic_unwind_sections *info) {
1043   if (!info)
1044     return 0;
1045   return MachOPlatformRuntimeState::get().lookupUnwindSections((void *)addr,
1046                                                                *info);
1047 }
1048 
1049 Error MachOPlatformRuntimeState::registerEHFrames(
1050     span<const char> EHFrameSection) {
1051   walkEHFrameSection(EHFrameSection, __register_frame);
1052   return Error::success();
1053 }
1054 
1055 Error MachOPlatformRuntimeState::deregisterEHFrames(
1056     span<const char> EHFrameSection) {
1057   walkEHFrameSection(EHFrameSection, __deregister_frame);
1058   return Error::success();
1059 }
1060 
1061 Error MachOPlatformRuntimeState::registerObjCRegistrationObjects(
1062     JITDylibState &JDS) {
1063   ORC_RT_DEBUG(printdbg("Registering Objective-C / Swift metadata.\n"));
1064 
1065   std::vector<char *> RegObjBases;
1066   JDS.ObjCRuntimeRegistrationObjects.processNewSections(
1067       [&](span<char> RegObj) { RegObjBases.push_back(RegObj.data()); });
1068 
1069   if (RegObjBases.empty())
1070     return Error::success();
1071 
1072   if (!_objc_map_images || !_objc_load_image)
1073     return make_error<StringError>(
1074         "Could not register Objective-C / Swift metadata: _objc_map_images / "
1075         "_objc_load_image not found");
1076 
1077   std::vector<char *> Paths;
1078   Paths.resize(RegObjBases.size());
1079   _objc_map_images(RegObjBases.size(), Paths.data(),
1080                    reinterpret_cast<mach_header **>(RegObjBases.data()));
1081 
1082   for (void *RegObjBase : RegObjBases)
1083     _objc_load_image(nullptr, reinterpret_cast<mach_header *>(RegObjBase));
1084 
1085   return Error::success();
1086 }
1087 
1088 Error MachOPlatformRuntimeState::runModInits(
1089     std::unique_lock<std::mutex> &JDStatesLock, JITDylibState &JDS) {
1090   std::vector<span<void (*)()>> InitSections;
1091   InitSections.reserve(JDS.ModInitsSections.numNewSections());
1092 
1093   // Copy initializer sections: If the JITDylib is unsealed then the
1094   // initializers could reach back into the JIT and cause more initializers to
1095   // be added.
1096   // FIXME: Skip unlock and run in-place on sealed JITDylibs?
1097   JDS.ModInitsSections.processNewSections(
1098       [&](span<void (*)()> Inits) { InitSections.push_back(Inits); });
1099 
1100   JDStatesLock.unlock();
1101   for (auto InitSec : InitSections)
1102     for (auto *Init : InitSec)
1103       Init();
1104   JDStatesLock.lock();
1105 
1106   return Error::success();
1107 }
1108 
1109 Expected<void *> MachOPlatformRuntimeState::dlopenImpl(std::string_view Path,
1110                                                        int Mode) {
1111   std::unique_lock<std::mutex> Lock(JDStatesMutex);
1112 
1113   // Try to find JITDylib state by name.
1114   auto *JDS = getJITDylibStateByName(Path);
1115 
1116   if (!JDS)
1117     return make_error<StringError>("No registered JTIDylib for path " +
1118                                    std::string(Path.data(), Path.size()));
1119 
1120   // If this JITDylib is unsealed, or this is the first dlopen then run
1121   // full dlopen path (update deps, push and run initializers, update ref
1122   // counts on all JITDylibs in the dep tree).
1123   if (!JDS->referenced() || !JDS->Sealed) {
1124     if (auto Err = dlopenFull(Lock, *JDS))
1125       return std::move(Err);
1126   }
1127 
1128   // Bump the ref-count on this dylib.
1129   ++JDS->DlRefCount;
1130 
1131   // Return the header address.
1132   return JDS->Header;
1133 }
1134 
1135 Error MachOPlatformRuntimeState::dlopenFull(
1136     std::unique_lock<std::mutex> &JDStatesLock, JITDylibState &JDS) {
1137   // Call back to the JIT to push the initializers.
1138   Expected<MachOJITDylibDepInfoMap> DepInfo((MachOJITDylibDepInfoMap()));
1139   // Unlock so that we can accept the initializer update.
1140   JDStatesLock.unlock();
1141   if (auto Err = WrapperFunction<SPSExpected<SPSMachOJITDylibDepInfoMap>(
1142           SPSExecutorAddr)>::call(&__orc_rt_macho_push_initializers_tag,
1143                                   DepInfo, ExecutorAddr::fromPtr(JDS.Header)))
1144     return Err;
1145   JDStatesLock.lock();
1146 
1147   if (!DepInfo)
1148     return DepInfo.takeError();
1149 
1150   if (auto Err = dlopenInitialize(JDStatesLock, JDS, *DepInfo))
1151     return Err;
1152 
1153   if (!DepInfo->empty()) {
1154     ORC_RT_DEBUG({
1155       printdbg("Unrecognized dep-info key headers in dlopen of %s\n",
1156                JDS.Name.c_str());
1157     });
1158     std::ostringstream ErrStream;
1159     ErrStream << "Encountered unrecognized dep-info key headers "
1160                  "while processing dlopen of "
1161               << JDS.Name;
1162     return make_error<StringError>(ErrStream.str());
1163   }
1164 
1165   return Error::success();
1166 }
1167 
1168 Error MachOPlatformRuntimeState::dlopenInitialize(
1169     std::unique_lock<std::mutex> &JDStatesLock, JITDylibState &JDS,
1170     MachOJITDylibDepInfoMap &DepInfo) {
1171   ORC_RT_DEBUG({
1172     printdbg("MachOPlatformRuntimeState::dlopenInitialize(\"%s\")\n",
1173              JDS.Name.c_str());
1174   });
1175 
1176   // If the header is not present in the dep map then assume that we
1177   // already processed it earlier in the dlopenInitialize traversal and
1178   // return.
1179   // TODO: Keep a visited set instead so that we can error out on missing
1180   //       entries?
1181   auto I = DepInfo.find(ExecutorAddr::fromPtr(JDS.Header));
1182   if (I == DepInfo.end())
1183     return Error::success();
1184 
1185   auto DI = std::move(I->second);
1186   DepInfo.erase(I);
1187 
1188   // We don't need to re-initialize sealed JITDylibs that have already been
1189   // initialized. Just check that their dep-map entry is empty as expected.
1190   if (JDS.Sealed) {
1191     if (!DI.DepHeaders.empty()) {
1192       std::ostringstream ErrStream;
1193       ErrStream << "Sealed JITDylib " << JDS.Header
1194                 << " already has registered dependencies";
1195       return make_error<StringError>(ErrStream.str());
1196     }
1197     if (JDS.referenced())
1198       return Error::success();
1199   } else
1200     JDS.Sealed = DI.Sealed;
1201 
1202   // This is an unsealed or newly sealed JITDylib. Run initializers.
1203   std::vector<JITDylibState *> OldDeps;
1204   std::swap(JDS.Deps, OldDeps);
1205   JDS.Deps.reserve(DI.DepHeaders.size());
1206   for (auto DepHeaderAddr : DI.DepHeaders) {
1207     auto *DepJDS = getJITDylibStateByHeader(DepHeaderAddr.toPtr<void *>());
1208     if (!DepJDS) {
1209       std::ostringstream ErrStream;
1210       ErrStream << "Encountered unrecognized dep header "
1211                 << DepHeaderAddr.toPtr<void *>() << " while initializing "
1212                 << JDS.Name;
1213       return make_error<StringError>(ErrStream.str());
1214     }
1215     ++DepJDS->LinkedAgainstRefCount;
1216     if (auto Err = dlopenInitialize(JDStatesLock, *DepJDS, DepInfo))
1217       return Err;
1218   }
1219 
1220   // Initialize this JITDylib.
1221   if (auto Err = registerObjCRegistrationObjects(JDS))
1222     return Err;
1223   if (auto Err = runModInits(JDStatesLock, JDS))
1224     return Err;
1225 
1226   // Decrement old deps.
1227   // FIXME: We should probably continue and just report deinitialize errors
1228   // here.
1229   for (auto *DepJDS : OldDeps) {
1230     --DepJDS->LinkedAgainstRefCount;
1231     if (!DepJDS->referenced())
1232       if (auto Err = dlcloseDeinitialize(JDStatesLock, *DepJDS))
1233         return Err;
1234   }
1235 
1236   return Error::success();
1237 }
1238 
1239 Error MachOPlatformRuntimeState::dlcloseImpl(void *DSOHandle) {
1240   std::unique_lock<std::mutex> Lock(JDStatesMutex);
1241 
1242   // Try to find JITDylib state by header.
1243   auto *JDS = getJITDylibStateByHeader(DSOHandle);
1244 
1245   if (!JDS) {
1246     std::ostringstream ErrStream;
1247     ErrStream << "No registered JITDylib for " << DSOHandle;
1248     return make_error<StringError>(ErrStream.str());
1249   }
1250 
1251   // Bump the ref-count.
1252   --JDS->DlRefCount;
1253 
1254   if (!JDS->referenced())
1255     return dlcloseDeinitialize(Lock, *JDS);
1256 
1257   return Error::success();
1258 }
1259 
1260 Error MachOPlatformRuntimeState::dlcloseDeinitialize(
1261     std::unique_lock<std::mutex> &JDStatesLock, JITDylibState &JDS) {
1262 
1263   ORC_RT_DEBUG({
1264     printdbg("MachOPlatformRuntimeState::dlcloseDeinitialize(\"%s\")\n",
1265              JDS.Name.c_str());
1266   });
1267 
1268   runAtExits(JDStatesLock, JDS);
1269 
1270   // Reset mod-inits
1271   JDS.ModInitsSections.reset();
1272 
1273   // Reset data section contents.
1274   for (auto &KV : JDS.DataSectionContent)
1275     memcpy(KV.first, KV.second.data(), KV.second.size());
1276   for (auto &KV : JDS.ZeroInitRanges)
1277     memset(KV.first, 0, KV.second);
1278 
1279   // Deinitialize any dependencies.
1280   for (auto *DepJDS : JDS.Deps) {
1281     --DepJDS->LinkedAgainstRefCount;
1282     if (!DepJDS->referenced())
1283       if (auto Err = dlcloseDeinitialize(JDStatesLock, *DepJDS))
1284         return Err;
1285   }
1286 
1287   return Error::success();
1288 }
1289 
1290 class MachOPlatformRuntimeTLVManager {
1291 public:
1292   void *getInstance(const char *ThreadData);
1293 
1294 private:
1295   std::unordered_map<const char *, char *> Instances;
1296   std::unordered_map<const char *, std::unique_ptr<char[]>> AllocatedSections;
1297 };
1298 
1299 void *MachOPlatformRuntimeTLVManager::getInstance(const char *ThreadData) {
1300   auto I = Instances.find(ThreadData);
1301   if (I != Instances.end())
1302     return I->second;
1303 
1304   auto TDS =
1305       MachOPlatformRuntimeState::get().getThreadDataSectionFor(ThreadData);
1306   if (!TDS) {
1307     __orc_rt_log_error(toString(TDS.takeError()).c_str());
1308     return nullptr;
1309   }
1310 
1311   auto &Allocated = AllocatedSections[TDS->first];
1312   if (!Allocated) {
1313     Allocated = std::make_unique<char[]>(TDS->second);
1314     memcpy(Allocated.get(), TDS->first, TDS->second);
1315   }
1316 
1317   size_t ThreadDataDelta = ThreadData - TDS->first;
1318   assert(ThreadDataDelta <= TDS->second && "ThreadData outside section bounds");
1319 
1320   char *Instance = Allocated.get() + ThreadDataDelta;
1321   Instances[ThreadData] = Instance;
1322   return Instance;
1323 }
1324 
1325 void destroyMachOTLVMgr(void *MachOTLVMgr) {
1326   delete static_cast<MachOPlatformRuntimeTLVManager *>(MachOTLVMgr);
1327 }
1328 
1329 Error runWrapperFunctionCalls(std::vector<WrapperFunctionCall> WFCs) {
1330   for (auto &WFC : WFCs)
1331     if (auto Err = WFC.runWithSPSRet<void>())
1332       return Err;
1333   return Error::success();
1334 }
1335 
1336 } // end anonymous namespace
1337 
1338 //------------------------------------------------------------------------------
1339 //                             JIT entry points
1340 //------------------------------------------------------------------------------
1341 
1342 ORC_RT_INTERFACE orc_rt_CWrapperFunctionResult
1343 __orc_rt_macho_platform_bootstrap(char *ArgData, size_t ArgSize) {
1344   return WrapperFunction<SPSError()>::handle(
1345              ArgData, ArgSize,
1346              []() { return MachOPlatformRuntimeState::create(); })
1347       .release();
1348 }
1349 
1350 ORC_RT_INTERFACE orc_rt_CWrapperFunctionResult
1351 __orc_rt_macho_platform_shutdown(char *ArgData, size_t ArgSize) {
1352   return WrapperFunction<SPSError()>::handle(
1353              ArgData, ArgSize,
1354              []() { return MachOPlatformRuntimeState::destroy(); })
1355       .release();
1356 }
1357 
1358 ORC_RT_INTERFACE orc_rt_CWrapperFunctionResult
1359 __orc_rt_macho_register_jitdylib(char *ArgData, size_t ArgSize) {
1360   return WrapperFunction<SPSError(SPSString, SPSExecutorAddr)>::handle(
1361              ArgData, ArgSize,
1362              [](std::string &Name, ExecutorAddr HeaderAddr) {
1363                return MachOPlatformRuntimeState::get().registerJITDylib(
1364                    std::move(Name), HeaderAddr.toPtr<void *>());
1365              })
1366       .release();
1367 }
1368 
1369 ORC_RT_INTERFACE orc_rt_CWrapperFunctionResult
1370 __orc_rt_macho_deregister_jitdylib(char *ArgData, size_t ArgSize) {
1371   return WrapperFunction<SPSError(SPSExecutorAddr)>::handle(
1372              ArgData, ArgSize,
1373              [](ExecutorAddr HeaderAddr) {
1374                return MachOPlatformRuntimeState::get().deregisterJITDylib(
1375                    HeaderAddr.toPtr<void *>());
1376              })
1377       .release();
1378 }
1379 
1380 ORC_RT_INTERFACE orc_rt_CWrapperFunctionResult
1381 __orc_rt_macho_register_object_platform_sections(char *ArgData,
1382                                                  size_t ArgSize) {
1383   return WrapperFunction<SPSError(SPSExecutorAddr,
1384                                   SPSOptional<SPSUnwindSectionInfo>,
1385                                   SPSMachOObjectPlatformSectionsMap)>::
1386       handle(ArgData, ArgSize,
1387              [](ExecutorAddr HeaderAddr, std::optional<UnwindSectionInfo> USI,
1388                 std::vector<std::pair<std::string_view, ExecutorAddrRange>>
1389                     &Secs) {
1390                return MachOPlatformRuntimeState::get()
1391                    .registerObjectPlatformSections(HeaderAddr, std::move(USI),
1392                                                    std::move(Secs));
1393              })
1394           .release();
1395 }
1396 
1397 ORC_RT_INTERFACE orc_rt_CWrapperFunctionResult
1398 __orc_rt_macho_register_object_symbol_table(char *ArgData, size_t ArgSize) {
1399   using SymtabContainer = std::vector<
1400       std::tuple<ExecutorAddr, ExecutorAddr,
1401                  MachOPlatformRuntimeState::MachOExecutorSymbolFlags>>;
1402   return WrapperFunction<SPSError(
1403       SPSExecutorAddr, SPSSequence<SPSTuple<SPSExecutorAddr, SPSExecutorAddr,
1404                                             SPSMachOExecutorSymbolFlags>>)>::
1405       handle(ArgData, ArgSize,
1406              [](ExecutorAddr HeaderAddr, SymtabContainer &Symbols) {
1407                return MachOPlatformRuntimeState::get()
1408                    .registerObjectSymbolTable(HeaderAddr, Symbols);
1409              })
1410           .release();
1411 }
1412 
1413 ORC_RT_INTERFACE orc_rt_CWrapperFunctionResult
1414 __orc_rt_macho_deregister_object_symbol_table(char *ArgData, size_t ArgSize) {
1415   using SymtabContainer = std::vector<
1416       std::tuple<ExecutorAddr, ExecutorAddr,
1417                  MachOPlatformRuntimeState::MachOExecutorSymbolFlags>>;
1418   return WrapperFunction<SPSError(
1419       SPSExecutorAddr, SPSSequence<SPSTuple<SPSExecutorAddr, SPSExecutorAddr,
1420                                             SPSMachOExecutorSymbolFlags>>)>::
1421       handle(ArgData, ArgSize,
1422              [](ExecutorAddr HeaderAddr, SymtabContainer &Symbols) {
1423                return MachOPlatformRuntimeState::get()
1424                    .deregisterObjectSymbolTable(HeaderAddr, Symbols);
1425              })
1426           .release();
1427 }
1428 
1429 ORC_RT_INTERFACE orc_rt_CWrapperFunctionResult
1430 __orc_rt_macho_deregister_object_platform_sections(char *ArgData,
1431                                                    size_t ArgSize) {
1432   return WrapperFunction<SPSError(SPSExecutorAddr,
1433                                   SPSOptional<SPSUnwindSectionInfo>,
1434                                   SPSMachOObjectPlatformSectionsMap)>::
1435       handle(ArgData, ArgSize,
1436              [](ExecutorAddr HeaderAddr, std::optional<UnwindSectionInfo> USI,
1437                 std::vector<std::pair<std::string_view, ExecutorAddrRange>>
1438                     &Secs) {
1439                return MachOPlatformRuntimeState::get()
1440                    .deregisterObjectPlatformSections(HeaderAddr, std::move(USI),
1441                                                      std::move(Secs));
1442              })
1443           .release();
1444 }
1445 
1446 ORC_RT_INTERFACE orc_rt_CWrapperFunctionResult
1447 __orc_rt_macho_run_wrapper_function_calls(char *ArgData, size_t ArgSize) {
1448   return WrapperFunction<SPSError(SPSSequence<SPSWrapperFunctionCall>)>::handle(
1449              ArgData, ArgSize, runWrapperFunctionCalls)
1450       .release();
1451 }
1452 
1453 //------------------------------------------------------------------------------
1454 //                            TLV support
1455 //------------------------------------------------------------------------------
1456 
1457 ORC_RT_INTERFACE void *__orc_rt_macho_tlv_get_addr_impl(TLVDescriptor *D) {
1458   auto *TLVMgr = static_cast<MachOPlatformRuntimeTLVManager *>(
1459       pthread_getspecific(D->Key));
1460   if (!TLVMgr) {
1461     TLVMgr = new MachOPlatformRuntimeTLVManager();
1462     if (pthread_setspecific(D->Key, TLVMgr)) {
1463       __orc_rt_log_error("Call to pthread_setspecific failed");
1464       return nullptr;
1465     }
1466   }
1467 
1468   return TLVMgr->getInstance(
1469       reinterpret_cast<char *>(static_cast<uintptr_t>(D->DataAddress)));
1470 }
1471 
1472 ORC_RT_INTERFACE orc_rt_CWrapperFunctionResult
1473 __orc_rt_macho_create_pthread_key(char *ArgData, size_t ArgSize) {
1474   return WrapperFunction<SPSExpected<uint64_t>(void)>::handle(
1475              ArgData, ArgSize,
1476              []() -> Expected<uint64_t> {
1477                pthread_key_t Key;
1478                if (int Err = pthread_key_create(&Key, destroyMachOTLVMgr)) {
1479                  __orc_rt_log_error("Call to pthread_key_create failed");
1480                  return make_error<StringError>(strerror(Err));
1481                }
1482                return static_cast<uint64_t>(Key);
1483              })
1484       .release();
1485 }
1486 
1487 //------------------------------------------------------------------------------
1488 //                           cxa_atexit support
1489 //------------------------------------------------------------------------------
1490 
1491 int __orc_rt_macho_cxa_atexit(void (*func)(void *), void *arg,
1492                               void *dso_handle) {
1493   return MachOPlatformRuntimeState::get().registerAtExit(func, arg, dso_handle);
1494 }
1495 
1496 void __orc_rt_macho_cxa_finalize(void *dso_handle) {
1497   MachOPlatformRuntimeState::get().runAtExits(dso_handle);
1498 }
1499 
1500 //------------------------------------------------------------------------------
1501 //                        JIT'd dlfcn alternatives.
1502 //------------------------------------------------------------------------------
1503 
1504 const char *__orc_rt_macho_jit_dlerror() {
1505   return MachOPlatformRuntimeState::get().dlerror();
1506 }
1507 
1508 void *__orc_rt_macho_jit_dlopen(const char *path, int mode) {
1509   return MachOPlatformRuntimeState::get().dlopen(path, mode);
1510 }
1511 
1512 int __orc_rt_macho_jit_dlclose(void *dso_handle) {
1513   return MachOPlatformRuntimeState::get().dlclose(dso_handle);
1514 }
1515 
1516 void *__orc_rt_macho_jit_dlsym(void *dso_handle, const char *symbol) {
1517   return MachOPlatformRuntimeState::get().dlsym(dso_handle, symbol);
1518 }
1519 
1520 //------------------------------------------------------------------------------
1521 //                             MachO Run Program
1522 //------------------------------------------------------------------------------
1523 
1524 ORC_RT_INTERFACE int64_t __orc_rt_macho_run_program(const char *JITDylibName,
1525                                                     const char *EntrySymbolName,
1526                                                     int argc, char *argv[]) {
1527   using MainTy = int (*)(int, char *[]);
1528 
1529   void *H = __orc_rt_macho_jit_dlopen(JITDylibName,
1530                                       __orc_rt::macho::ORC_RT_RTLD_LAZY);
1531   if (!H) {
1532     __orc_rt_log_error(__orc_rt_macho_jit_dlerror());
1533     return -1;
1534   }
1535 
1536   auto *Main =
1537       reinterpret_cast<MainTy>(__orc_rt_macho_jit_dlsym(H, EntrySymbolName));
1538 
1539   if (!Main) {
1540     __orc_rt_log_error(__orc_rt_macho_jit_dlerror());
1541     return -1;
1542   }
1543 
1544   int Result = Main(argc, argv);
1545 
1546   if (__orc_rt_macho_jit_dlclose(H) == -1)
1547     __orc_rt_log_error(__orc_rt_macho_jit_dlerror());
1548 
1549   return Result;
1550 }
1551