Details | Last modification | View Log | RSS feed
| Rev | Author | Line No. | Line | 
|---|---|---|---|
| 14 | pmbaty | 1 | //===- CodeGenCommonISel.h - Common code between ISels ---------*- C++ -*--===// | 
| 2 | // | ||
| 3 | // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. | ||
| 4 | // See https://llvm.org/LICENSE.txt for license information. | ||
| 5 | // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception | ||
| 6 | // | ||
| 7 | //===----------------------------------------------------------------------===// | ||
| 8 | // | ||
| 9 | // This file declares common utilities that are shared between SelectionDAG and | ||
| 10 | // GlobalISel frameworks. | ||
| 11 | // | ||
| 12 | //===----------------------------------------------------------------------===// | ||
| 13 | |||
| 14 | #ifndef LLVM_CODEGEN_CODEGENCOMMONISEL_H | ||
| 15 | #define LLVM_CODEGEN_CODEGENCOMMONISEL_H | ||
| 16 | |||
| 17 | #include "llvm/CodeGen/MachineBasicBlock.h" | ||
| 18 | #include <cassert> | ||
| 19 | namespace llvm { | ||
| 20 | |||
| 21 | class BasicBlock; | ||
| 22 | /// Encapsulates all of the information needed to generate a stack protector | ||
| 23 | /// check, and signals to isel when initialized that one needs to be generated. | ||
| 24 | /// | ||
| 25 | /// *NOTE* The following is a high level documentation of SelectionDAG Stack | ||
| 26 | /// Protector Generation. This is now also ported be shared with GlobalISel, | ||
| 27 | /// but without any significant changes. | ||
| 28 | /// | ||
| 29 | /// High Level Overview of ISel Stack Protector Generation: | ||
| 30 | /// | ||
| 31 | /// Previously, the "stack protector" IR pass handled stack protector | ||
| 32 | /// generation. This necessitated splitting basic blocks at the IR level to | ||
| 33 | /// create the success/failure basic blocks in the tail of the basic block in | ||
| 34 | /// question. As a result of this, calls that would have qualified for the | ||
| 35 | /// sibling call optimization were no longer eligible for optimization since | ||
| 36 | /// said calls were no longer right in the "tail position" (i.e. the immediate | ||
| 37 | /// predecessor of a ReturnInst instruction). | ||
| 38 | /// | ||
| 39 | /// Since the sibling call optimization causes the callee to reuse the caller's | ||
| 40 | /// stack, if we could delay the generation of the stack protector check until | ||
| 41 | /// later in CodeGen after the sibling call decision was made, we get both the | ||
| 42 | /// tail call optimization and the stack protector check! | ||
| 43 | /// | ||
| 44 | /// A few goals in solving this problem were: | ||
| 45 | /// | ||
| 46 | ///   1. Preserve the architecture independence of stack protector generation. | ||
| 47 | /// | ||
| 48 | ///   2. Preserve the normal IR level stack protector check for platforms like | ||
| 49 | ///      OpenBSD for which we support platform-specific stack protector | ||
| 50 | ///      generation. | ||
| 51 | /// | ||
| 52 | /// The main problem that guided the present solution is that one can not | ||
| 53 | /// solve this problem in an architecture independent manner at the IR level | ||
| 54 | /// only. This is because: | ||
| 55 | /// | ||
| 56 | ///   1. The decision on whether or not to perform a sibling call on certain | ||
| 57 | ///      platforms (for instance i386) requires lower level information | ||
| 58 | ///      related to available registers that can not be known at the IR level. | ||
| 59 | /// | ||
| 60 | ///   2. Even if the previous point were not true, the decision on whether to | ||
| 61 | ///      perform a tail call is done in LowerCallTo in SelectionDAG (or | ||
| 62 | ///      CallLowering in GlobalISel) which occurs after the Stack Protector | ||
| 63 | ///      Pass. As a result, one would need to put the relevant callinst into the | ||
| 64 | ///      stack protector check success basic block (where the return inst is | ||
| 65 | ///      placed) and then move it back later at ISel/MI time before the | ||
| 66 | ///      stack protector check if the tail call optimization failed. The MI | ||
| 67 | ///      level option was nixed immediately since it would require | ||
| 68 | ///      platform-specific pattern matching. The ISel level option was | ||
| 69 | ///      nixed because SelectionDAG only processes one IR level basic block at a | ||
| 70 | ///      time implying one could not create a DAG Combine to move the callinst. | ||
| 71 | /// | ||
| 72 | /// To get around this problem: | ||
| 73 | /// | ||
| 74 | ///   1. SelectionDAG can only process one block at a time, we can generate | ||
| 75 | ///      multiple machine basic blocks for one IR level basic block. | ||
| 76 | ///      This is how we handle bit tests and switches. | ||
| 77 | /// | ||
| 78 | ///   2. At the MI level, tail calls are represented via a special return | ||
| 79 | ///      MIInst called "tcreturn". Thus if we know the basic block in which we | ||
| 80 | ///      wish to insert the stack protector check, we get the correct behavior | ||
| 81 | ///      by always inserting the stack protector check right before the return | ||
| 82 | ///      statement. This is a "magical transformation" since no matter where | ||
| 83 | ///      the stack protector check intrinsic is, we always insert the stack | ||
| 84 | ///      protector check code at the end of the BB. | ||
| 85 | /// | ||
| 86 | /// Given the aforementioned constraints, the following solution was devised: | ||
| 87 | /// | ||
| 88 | ///   1. On platforms that do not support ISel stack protector check | ||
| 89 | ///      generation, allow for the normal IR level stack protector check | ||
| 90 | ///      generation to continue. | ||
| 91 | /// | ||
| 92 | ///   2. On platforms that do support ISel stack protector check | ||
| 93 | ///      generation: | ||
| 94 | /// | ||
| 95 | ///     a. Use the IR level stack protector pass to decide if a stack | ||
| 96 | ///        protector is required/which BB we insert the stack protector check | ||
| 97 | ///        in by reusing the logic already therein. | ||
| 98 | /// | ||
| 99 | ///     b. After we finish selecting the basic block, we produce the validation | ||
| 100 | ///        code with one of these techniques: | ||
| 101 | ///          1) with a call to a guard check function | ||
| 102 | ///          2) with inlined instrumentation | ||
| 103 | /// | ||
| 104 | ///        1) We insert a call to the check function before the terminator. | ||
| 105 | /// | ||
| 106 | ///        2) We first find a splice point in the parent basic block | ||
| 107 | ///        before the terminator and then splice the terminator of said basic | ||
| 108 | ///        block into the success basic block. Then we code-gen a new tail for | ||
| 109 | ///        the parent basic block consisting of the two loads, the comparison, | ||
| 110 | ///        and finally two branches to the success/failure basic blocks. We | ||
| 111 | ///        conclude by code-gening the failure basic block if we have not | ||
| 112 | ///        code-gened it already (all stack protector checks we generate in | ||
| 113 | ///        the same function, use the same failure basic block). | ||
| 114 | class StackProtectorDescriptor { | ||
| 115 | public: | ||
| 116 | StackProtectorDescriptor() = default; | ||
| 117 | |||
| 118 |   /// Returns true if all fields of the stack protector descriptor are | ||
| 119 |   /// initialized implying that we should/are ready to emit a stack protector. | ||
| 120 | bool shouldEmitStackProtector() const { | ||
| 121 | return ParentMBB && SuccessMBB && FailureMBB; | ||
| 122 |   } | ||
| 123 | |||
| 124 | bool shouldEmitFunctionBasedCheckStackProtector() const { | ||
| 125 | return ParentMBB && !SuccessMBB && !FailureMBB; | ||
| 126 |   } | ||
| 127 | |||
| 128 |   /// Initialize the stack protector descriptor structure for a new basic | ||
| 129 |   /// block. | ||
| 130 | void initialize(const BasicBlock *BB, MachineBasicBlock *MBB, | ||
| 131 | bool FunctionBasedInstrumentation) { | ||
| 132 |     // Make sure we are not initialized yet. | ||
| 133 | assert(!shouldEmitStackProtector() && "Stack Protector Descriptor is " | ||
| 134 | "already initialized!"); | ||
| 135 | ParentMBB = MBB; | ||
| 136 | if (!FunctionBasedInstrumentation) { | ||
| 137 | SuccessMBB = addSuccessorMBB(BB, MBB, /* IsLikely */ true); | ||
| 138 | FailureMBB = addSuccessorMBB(BB, MBB, /* IsLikely */ false, FailureMBB); | ||
| 139 |     } | ||
| 140 |   } | ||
| 141 | |||
| 142 |   /// Reset state that changes when we handle different basic blocks. | ||
| 143 |   /// | ||
| 144 |   /// This currently includes: | ||
| 145 |   /// | ||
| 146 |   /// 1. The specific basic block we are generating a | ||
| 147 |   /// stack protector for (ParentMBB). | ||
| 148 |   /// | ||
| 149 |   /// 2. The successor machine basic block that will contain the tail of | ||
| 150 |   /// parent mbb after we create the stack protector check (SuccessMBB). This | ||
| 151 |   /// BB is visited only on stack protector check success. | ||
| 152 | void resetPerBBState() { | ||
| 153 | ParentMBB = nullptr; | ||
| 154 | SuccessMBB = nullptr; | ||
| 155 |   } | ||
| 156 | |||
| 157 |   /// Reset state that only changes when we switch functions. | ||
| 158 |   /// | ||
| 159 |   /// This currently includes: | ||
| 160 |   /// | ||
| 161 |   /// 1. FailureMBB since we reuse the failure code path for all stack | ||
| 162 |   /// protector checks created in an individual function. | ||
| 163 |   /// | ||
| 164 |   /// 2.The guard variable since the guard variable we are checking against is | ||
| 165 |   /// always the same. | ||
| 166 | void resetPerFunctionState() { FailureMBB = nullptr; } | ||
| 167 | |||
| 168 | MachineBasicBlock *getParentMBB() { return ParentMBB; } | ||
| 169 | MachineBasicBlock *getSuccessMBB() { return SuccessMBB; } | ||
| 170 | MachineBasicBlock *getFailureMBB() { return FailureMBB; } | ||
| 171 | |||
| 172 | private: | ||
| 173 |   /// The basic block for which we are generating the stack protector. | ||
| 174 |   /// | ||
| 175 |   /// As a result of stack protector generation, we will splice the | ||
| 176 |   /// terminators of this basic block into the successor mbb SuccessMBB and | ||
| 177 |   /// replace it with a compare/branch to the successor mbbs | ||
| 178 |   /// SuccessMBB/FailureMBB depending on whether or not the stack protector | ||
| 179 |   /// was violated. | ||
| 180 | MachineBasicBlock *ParentMBB = nullptr; | ||
| 181 | |||
| 182 |   /// A basic block visited on stack protector check success that contains the | ||
| 183 |   /// terminators of ParentMBB. | ||
| 184 | MachineBasicBlock *SuccessMBB = nullptr; | ||
| 185 | |||
| 186 |   /// This basic block visited on stack protector check failure that will | ||
| 187 |   /// contain a call to __stack_chk_fail(). | ||
| 188 | MachineBasicBlock *FailureMBB = nullptr; | ||
| 189 | |||
| 190 |   /// Add a successor machine basic block to ParentMBB. If the successor mbb | ||
| 191 |   /// has not been created yet (i.e. if SuccMBB = 0), then the machine basic | ||
| 192 |   /// block will be created. Assign a large weight if IsLikely is true. | ||
| 193 | MachineBasicBlock *addSuccessorMBB(const BasicBlock *BB, | ||
| 194 |                                      MachineBasicBlock *ParentMBB, | ||
| 195 |                                      bool IsLikely, | ||
| 196 | MachineBasicBlock *SuccMBB = nullptr); | ||
| 197 | }; | ||
| 198 | |||
| 199 | /// Find the split point at which to splice the end of BB into its success stack | ||
| 200 | /// protector check machine basic block. | ||
| 201 | /// | ||
| 202 | /// On many platforms, due to ABI constraints, terminators, even before register | ||
| 203 | /// allocation, use physical registers. This creates an issue for us since | ||
| 204 | /// physical registers at this point can not travel across basic | ||
| 205 | /// blocks. Luckily, selectiondag always moves physical registers into vregs | ||
| 206 | /// when they enter functions and moves them through a sequence of copies back | ||
| 207 | /// into the physical registers right before the terminator creating a | ||
| 208 | /// ``Terminator Sequence''. This function is searching for the beginning of the | ||
| 209 | /// terminator sequence so that we can ensure that we splice off not just the | ||
| 210 | /// terminator, but additionally the copies that move the vregs into the | ||
| 211 | /// physical registers. | ||
| 212 | MachineBasicBlock::iterator | ||
| 213 | findSplitPointForStackProtector(MachineBasicBlock *BB, | ||
| 214 | const TargetInstrInfo &TII); | ||
| 215 | /// Evaluates if the specified FP class test is an inversion of a simpler test. | ||
| 216 | /// An example is the test "inf|normal|subnormal|zero", which is an inversion | ||
| 217 | /// of "nan". | ||
| 218 | /// \param Test The test as specified in 'is_fpclass' intrinsic invocation. | ||
| 219 | /// \returns The inverted test, or zero, if inversion does not produce simpler | ||
| 220 | /// test. | ||
| 221 | unsigned getInvertedFPClassTest(unsigned Test); | ||
| 222 | |||
| 223 | /// Assuming the instruction \p MI is going to be deleted, attempt to salvage | ||
| 224 | /// debug users of \p MI by writing the effect of \p MI in a DIExpression. | ||
| 225 | void salvageDebugInfoForDbgValue(const MachineRegisterInfo &MRI, | ||
| 226 |                                  MachineInstr &MI, | ||
| 227 | ArrayRef<MachineOperand *> DbgUsers); | ||
| 228 | |||
| 229 | } // namespace llvm | ||
| 230 | |||
| 231 | #endif // LLVM_CODEGEN_CODEGENCOMMONISEL_H |