Subversion Repositories QNX 8.QNX8 LLVM/Clang compiler suite

Rev

Details | Last modification | View Log | RSS feed

Rev Author Line No. Line
14 pmbaty 1
//===- CodeGenCommonISel.h - Common code between ISels ---------*- C++ -*--===//
2
//
3
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4
// See https://llvm.org/LICENSE.txt for license information.
5
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6
//
7
//===----------------------------------------------------------------------===//
8
//
9
// This file declares common utilities that are shared between SelectionDAG and
10
// GlobalISel frameworks.
11
//
12
//===----------------------------------------------------------------------===//
13
 
14
#ifndef LLVM_CODEGEN_CODEGENCOMMONISEL_H
15
#define LLVM_CODEGEN_CODEGENCOMMONISEL_H
16
 
17
#include "llvm/CodeGen/MachineBasicBlock.h"
18
#include <cassert>
19
namespace llvm {
20
 
21
class BasicBlock;
22
/// Encapsulates all of the information needed to generate a stack protector
23
/// check, and signals to isel when initialized that one needs to be generated.
24
///
25
/// *NOTE* The following is a high level documentation of SelectionDAG Stack
26
/// Protector Generation. This is now also ported be shared with GlobalISel,
27
/// but without any significant changes.
28
///
29
/// High Level Overview of ISel Stack Protector Generation:
30
///
31
/// Previously, the "stack protector" IR pass handled stack protector
32
/// generation. This necessitated splitting basic blocks at the IR level to
33
/// create the success/failure basic blocks in the tail of the basic block in
34
/// question. As a result of this, calls that would have qualified for the
35
/// sibling call optimization were no longer eligible for optimization since
36
/// said calls were no longer right in the "tail position" (i.e. the immediate
37
/// predecessor of a ReturnInst instruction).
38
///
39
/// Since the sibling call optimization causes the callee to reuse the caller's
40
/// stack, if we could delay the generation of the stack protector check until
41
/// later in CodeGen after the sibling call decision was made, we get both the
42
/// tail call optimization and the stack protector check!
43
///
44
/// A few goals in solving this problem were:
45
///
46
///   1. Preserve the architecture independence of stack protector generation.
47
///
48
///   2. Preserve the normal IR level stack protector check for platforms like
49
///      OpenBSD for which we support platform-specific stack protector
50
///      generation.
51
///
52
/// The main problem that guided the present solution is that one can not
53
/// solve this problem in an architecture independent manner at the IR level
54
/// only. This is because:
55
///
56
///   1. The decision on whether or not to perform a sibling call on certain
57
///      platforms (for instance i386) requires lower level information
58
///      related to available registers that can not be known at the IR level.
59
///
60
///   2. Even if the previous point were not true, the decision on whether to
61
///      perform a tail call is done in LowerCallTo in SelectionDAG (or
62
///      CallLowering in GlobalISel) which occurs after the Stack Protector
63
///      Pass. As a result, one would need to put the relevant callinst into the
64
///      stack protector check success basic block (where the return inst is
65
///      placed) and then move it back later at ISel/MI time before the
66
///      stack protector check if the tail call optimization failed. The MI
67
///      level option was nixed immediately since it would require
68
///      platform-specific pattern matching. The ISel level option was
69
///      nixed because SelectionDAG only processes one IR level basic block at a
70
///      time implying one could not create a DAG Combine to move the callinst.
71
///
72
/// To get around this problem:
73
///
74
///   1. SelectionDAG can only process one block at a time, we can generate
75
///      multiple machine basic blocks for one IR level basic block.
76
///      This is how we handle bit tests and switches.
77
///
78
///   2. At the MI level, tail calls are represented via a special return
79
///      MIInst called "tcreturn". Thus if we know the basic block in which we
80
///      wish to insert the stack protector check, we get the correct behavior
81
///      by always inserting the stack protector check right before the return
82
///      statement. This is a "magical transformation" since no matter where
83
///      the stack protector check intrinsic is, we always insert the stack
84
///      protector check code at the end of the BB.
85
///
86
/// Given the aforementioned constraints, the following solution was devised:
87
///
88
///   1. On platforms that do not support ISel stack protector check
89
///      generation, allow for the normal IR level stack protector check
90
///      generation to continue.
91
///
92
///   2. On platforms that do support ISel stack protector check
93
///      generation:
94
///
95
///     a. Use the IR level stack protector pass to decide if a stack
96
///        protector is required/which BB we insert the stack protector check
97
///        in by reusing the logic already therein.
98
///
99
///     b. After we finish selecting the basic block, we produce the validation
100
///        code with one of these techniques:
101
///          1) with a call to a guard check function
102
///          2) with inlined instrumentation
103
///
104
///        1) We insert a call to the check function before the terminator.
105
///
106
///        2) We first find a splice point in the parent basic block
107
///        before the terminator and then splice the terminator of said basic
108
///        block into the success basic block. Then we code-gen a new tail for
109
///        the parent basic block consisting of the two loads, the comparison,
110
///        and finally two branches to the success/failure basic blocks. We
111
///        conclude by code-gening the failure basic block if we have not
112
///        code-gened it already (all stack protector checks we generate in
113
///        the same function, use the same failure basic block).
114
class StackProtectorDescriptor {
115
public:
116
  StackProtectorDescriptor() = default;
117
 
118
  /// Returns true if all fields of the stack protector descriptor are
119
  /// initialized implying that we should/are ready to emit a stack protector.
120
  bool shouldEmitStackProtector() const {
121
    return ParentMBB && SuccessMBB && FailureMBB;
122
  }
123
 
124
  bool shouldEmitFunctionBasedCheckStackProtector() const {
125
    return ParentMBB && !SuccessMBB && !FailureMBB;
126
  }
127
 
128
  /// Initialize the stack protector descriptor structure for a new basic
129
  /// block.
130
  void initialize(const BasicBlock *BB, MachineBasicBlock *MBB,
131
                  bool FunctionBasedInstrumentation) {
132
    // Make sure we are not initialized yet.
133
    assert(!shouldEmitStackProtector() && "Stack Protector Descriptor is "
134
                                          "already initialized!");
135
    ParentMBB = MBB;
136
    if (!FunctionBasedInstrumentation) {
137
      SuccessMBB = addSuccessorMBB(BB, MBB, /* IsLikely */ true);
138
      FailureMBB = addSuccessorMBB(BB, MBB, /* IsLikely */ false, FailureMBB);
139
    }
140
  }
141
 
142
  /// Reset state that changes when we handle different basic blocks.
143
  ///
144
  /// This currently includes:
145
  ///
146
  /// 1. The specific basic block we are generating a
147
  /// stack protector for (ParentMBB).
148
  ///
149
  /// 2. The successor machine basic block that will contain the tail of
150
  /// parent mbb after we create the stack protector check (SuccessMBB). This
151
  /// BB is visited only on stack protector check success.
152
  void resetPerBBState() {
153
    ParentMBB = nullptr;
154
    SuccessMBB = nullptr;
155
  }
156
 
157
  /// Reset state that only changes when we switch functions.
158
  ///
159
  /// This currently includes:
160
  ///
161
  /// 1. FailureMBB since we reuse the failure code path for all stack
162
  /// protector checks created in an individual function.
163
  ///
164
  /// 2.The guard variable since the guard variable we are checking against is
165
  /// always the same.
166
  void resetPerFunctionState() { FailureMBB = nullptr; }
167
 
168
  MachineBasicBlock *getParentMBB() { return ParentMBB; }
169
  MachineBasicBlock *getSuccessMBB() { return SuccessMBB; }
170
  MachineBasicBlock *getFailureMBB() { return FailureMBB; }
171
 
172
private:
173
  /// The basic block for which we are generating the stack protector.
174
  ///
175
  /// As a result of stack protector generation, we will splice the
176
  /// terminators of this basic block into the successor mbb SuccessMBB and
177
  /// replace it with a compare/branch to the successor mbbs
178
  /// SuccessMBB/FailureMBB depending on whether or not the stack protector
179
  /// was violated.
180
  MachineBasicBlock *ParentMBB = nullptr;
181
 
182
  /// A basic block visited on stack protector check success that contains the
183
  /// terminators of ParentMBB.
184
  MachineBasicBlock *SuccessMBB = nullptr;
185
 
186
  /// This basic block visited on stack protector check failure that will
187
  /// contain a call to __stack_chk_fail().
188
  MachineBasicBlock *FailureMBB = nullptr;
189
 
190
  /// Add a successor machine basic block to ParentMBB. If the successor mbb
191
  /// has not been created yet (i.e. if SuccMBB = 0), then the machine basic
192
  /// block will be created. Assign a large weight if IsLikely is true.
193
  MachineBasicBlock *addSuccessorMBB(const BasicBlock *BB,
194
                                     MachineBasicBlock *ParentMBB,
195
                                     bool IsLikely,
196
                                     MachineBasicBlock *SuccMBB = nullptr);
197
};
198
 
199
/// Find the split point at which to splice the end of BB into its success stack
200
/// protector check machine basic block.
201
///
202
/// On many platforms, due to ABI constraints, terminators, even before register
203
/// allocation, use physical registers. This creates an issue for us since
204
/// physical registers at this point can not travel across basic
205
/// blocks. Luckily, selectiondag always moves physical registers into vregs
206
/// when they enter functions and moves them through a sequence of copies back
207
/// into the physical registers right before the terminator creating a
208
/// ``Terminator Sequence''. This function is searching for the beginning of the
209
/// terminator sequence so that we can ensure that we splice off not just the
210
/// terminator, but additionally the copies that move the vregs into the
211
/// physical registers.
212
MachineBasicBlock::iterator
213
findSplitPointForStackProtector(MachineBasicBlock *BB,
214
                                const TargetInstrInfo &TII);
215
/// Evaluates if the specified FP class test is an inversion of a simpler test.
216
/// An example is the test "inf|normal|subnormal|zero", which is an inversion
217
/// of "nan".
218
/// \param Test The test as specified in 'is_fpclass' intrinsic invocation.
219
/// \returns The inverted test, or zero, if inversion does not produce simpler
220
/// test.
221
unsigned getInvertedFPClassTest(unsigned Test);
222
 
223
/// Assuming the instruction \p MI is going to be deleted, attempt to salvage
224
/// debug users of \p MI by writing the effect of \p MI in a DIExpression.
225
void salvageDebugInfoForDbgValue(const MachineRegisterInfo &MRI,
226
                                 MachineInstr &MI,
227
                                 ArrayRef<MachineOperand *> DbgUsers);
228
 
229
} // namespace llvm
230
 
231
#endif // LLVM_CODEGEN_CODEGENCOMMONISEL_H