1 //=- AArch64MachineFunctionInfo.cpp - AArch64 Machine Function Info ---------=//
4 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
5 // See https://llvm.org/LICENSE.txt for license information.
6 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
8 //===----------------------------------------------------------------------===//
11 /// This file implements AArch64-specific per-machine-function
14 //===----------------------------------------------------------------------===//
16 #include "AArch64MachineFunctionInfo.h"
17 #include "AArch64InstrInfo.h"
18 #include "AArch64Subtarget.h"
19 #include "llvm/IR/Constants.h"
20 #include "llvm/IR/Metadata.h"
21 #include "llvm/IR/Module.h"
22 #include "llvm/MC/MCAsmInfo.h"
26 yaml::AArch64FunctionInfo::AArch64FunctionInfo(
27 const llvm::AArch64FunctionInfo
&MFI
)
28 : HasRedZone(MFI
.hasRedZone()) {}
30 void yaml::AArch64FunctionInfo::mappingImpl(yaml::IO
&YamlIO
) {
31 MappingTraits
<AArch64FunctionInfo
>::mapping(YamlIO
, *this);
34 void AArch64FunctionInfo::initializeBaseYamlFields(
35 const yaml::AArch64FunctionInfo
&YamlMFI
) {
36 if (YamlMFI
.HasRedZone
)
37 HasRedZone
= YamlMFI
.HasRedZone
;
40 static std::pair
<bool, bool> GetSignReturnAddress(const Function
&F
) {
41 // The function should be signed in the following situations:
42 // - sign-return-address=all
43 // - sign-return-address=non-leaf and the functions spills the LR
44 if (!F
.hasFnAttribute("sign-return-address")) {
45 const Module
&M
= *F
.getParent();
46 if (const auto *Sign
= mdconst::extract_or_null
<ConstantInt
>(
47 M
.getModuleFlag("sign-return-address"))) {
48 if (Sign
->getZExtValue()) {
49 if (const auto *All
= mdconst::extract_or_null
<ConstantInt
>(
50 M
.getModuleFlag("sign-return-address-all")))
51 return {true, All
->getZExtValue()};
55 return {false, false};
58 StringRef Scope
= F
.getFnAttribute("sign-return-address").getValueAsString();
59 if (Scope
.equals("none"))
60 return {false, false};
62 if (Scope
.equals("all"))
65 assert(Scope
.equals("non-leaf"));
69 static bool ShouldSignWithBKey(const Function
&F
, const AArch64Subtarget
&STI
) {
70 if (!F
.hasFnAttribute("sign-return-address-key")) {
71 if (const auto *BKey
= mdconst::extract_or_null
<ConstantInt
>(
72 F
.getParent()->getModuleFlag("sign-return-address-with-bkey")))
73 return BKey
->getZExtValue();
74 if (STI
.getTargetTriple().isOSWindows())
80 F
.getFnAttribute("sign-return-address-key").getValueAsString();
81 assert(Key
== "a_key" || Key
== "b_key");
82 return Key
== "b_key";
85 AArch64FunctionInfo::AArch64FunctionInfo(const Function
&F
,
86 const AArch64Subtarget
*STI
) {
87 // If we already know that the function doesn't have a redzone, set
89 if (F
.hasFnAttribute(Attribute::NoRedZone
))
91 std::tie(SignReturnAddress
, SignReturnAddressAll
) = GetSignReturnAddress(F
);
92 SignWithBKey
= ShouldSignWithBKey(F
, *STI
);
93 // TODO: skip functions that have no instrumented allocas for optimization
94 IsMTETagged
= F
.hasFnAttribute(Attribute::SanitizeMemTag
);
96 // BTI/PAuthLR may be set either on the function or the module. Set Bool from
97 // either the function attribute or module attribute, depending on what is
99 // Note: the module attributed is numeric (0 or 1) but the function attribute
100 // is stringy ("true" or "false").
101 auto TryFnThenModule
= [&](StringRef AttrName
, bool &Bool
) {
102 if (F
.hasFnAttribute(AttrName
)) {
103 const StringRef V
= F
.getFnAttribute(AttrName
).getValueAsString();
104 assert(V
.equals_insensitive("true") || V
.equals_insensitive("false"));
105 Bool
= V
.equals_insensitive("true");
106 } else if (const auto *ModVal
= mdconst::extract_or_null
<ConstantInt
>(
107 F
.getParent()->getModuleFlag(AttrName
))) {
108 Bool
= ModVal
->getZExtValue();
112 TryFnThenModule("branch-target-enforcement", BranchTargetEnforcement
);
113 TryFnThenModule("branch-protection-pauth-lr", BranchProtectionPAuthLR
);
115 // The default stack probe size is 4096 if the function has no
116 // stack-probe-size attribute. This is a safe default because it is the
117 // smallest possible guard page size.
118 uint64_t ProbeSize
= 4096;
119 if (F
.hasFnAttribute("stack-probe-size"))
120 ProbeSize
= F
.getFnAttributeAsParsedInteger("stack-probe-size");
121 else if (const auto *PS
= mdconst::extract_or_null
<ConstantInt
>(
122 F
.getParent()->getModuleFlag("stack-probe-size")))
123 ProbeSize
= PS
->getZExtValue();
124 assert(int64_t(ProbeSize
) > 0 && "Invalid stack probe size");
126 if (STI
->isTargetWindows()) {
127 if (!F
.hasFnAttribute("no-stack-arg-probe"))
128 StackProbeSize
= ProbeSize
;
130 // Round down to the stack alignment.
131 uint64_t StackAlign
=
132 STI
->getFrameLowering()->getTransientStackAlign().value();
133 ProbeSize
= std::max(StackAlign
, ProbeSize
& ~(StackAlign
- 1U));
135 if (F
.hasFnAttribute("probe-stack"))
136 ProbeKind
= F
.getFnAttribute("probe-stack").getValueAsString();
137 else if (const auto *PS
= dyn_cast_or_null
<MDString
>(
138 F
.getParent()->getModuleFlag("probe-stack")))
139 ProbeKind
= PS
->getString();
140 if (ProbeKind
.size()) {
141 if (ProbeKind
!= "inline-asm")
142 report_fatal_error("Unsupported stack probing method");
143 StackProbeSize
= ProbeSize
;
148 MachineFunctionInfo
*AArch64FunctionInfo::clone(
149 BumpPtrAllocator
&Allocator
, MachineFunction
&DestMF
,
150 const DenseMap
<MachineBasicBlock
*, MachineBasicBlock
*> &Src2DstMBB
)
152 return DestMF
.cloneInfo
<AArch64FunctionInfo
>(*this);
155 bool AArch64FunctionInfo::shouldSignReturnAddress(bool SpillsLR
) const {
156 if (!SignReturnAddress
)
158 if (SignReturnAddressAll
)
163 static bool isLRSpilled(const MachineFunction
&MF
) {
165 MF
.getFrameInfo().getCalleeSavedInfo(),
166 [](const auto &Info
) { return Info
.getReg() == AArch64::LR
; });
169 bool AArch64FunctionInfo::shouldSignReturnAddress(
170 const MachineFunction
&MF
) const {
171 return shouldSignReturnAddress(isLRSpilled(MF
));
174 bool AArch64FunctionInfo::needsShadowCallStackPrologueEpilogue(
175 MachineFunction
&MF
) const {
176 if (!(isLRSpilled(MF
) &&
177 MF
.getFunction().hasFnAttribute(Attribute::ShadowCallStack
)))
180 if (!MF
.getSubtarget
<AArch64Subtarget
>().isXRegisterReserved(18))
181 report_fatal_error("Must reserve x18 to use shadow call stack");
186 bool AArch64FunctionInfo::needsDwarfUnwindInfo(
187 const MachineFunction
&MF
) const {
188 if (!NeedsDwarfUnwindInfo
)
189 NeedsDwarfUnwindInfo
= MF
.needsFrameMoves() &&
190 !MF
.getTarget().getMCAsmInfo()->usesWindowsCFI();
192 return *NeedsDwarfUnwindInfo
;
195 bool AArch64FunctionInfo::needsAsyncDwarfUnwindInfo(
196 const MachineFunction
&MF
) const {
197 if (!NeedsAsyncDwarfUnwindInfo
) {
198 const Function
&F
= MF
.getFunction();
199 // The check got "minsize" is because epilogue unwind info is not emitted
200 // (yet) for homogeneous epilogues, outlined functions, and functions
202 NeedsAsyncDwarfUnwindInfo
= needsDwarfUnwindInfo(MF
) &&
203 F
.getUWTableKind() == UWTableKind::Async
&&
206 return *NeedsAsyncDwarfUnwindInfo
;