
So far branch protection, sign return address, guarded control stack attributes are only emitted as module flags to indicate the functions need to be generated with those features. The problem is in case of an LTO build the module flags are merged with the `min` rule which means if one of the module is not build with sign return address then the features will be turned off for all functions. Due to the functions take the branch-protection and sign-return-address features from the module flags. The sign-return-address is function level option therefore it is expected functions from files that is compiled with -mbranch-protection=pac-ret to be protected. The inliner might inline functions with different set of flags as it doesn't consider the module flags. This patch adds the attributes to all functions and drops the checking of the module flags for the code generation. Module flag is still used for generating the ELF markers. Also drops the "true"/"false" values from the branch-protection-enforcement, branch-protection-pauth-lr, guarded-control-stack attributes as presence of the attribute means it is on absence means off and no other option. Releand with test fixes.
78 lines
1.9 KiB
LLVM
78 lines
1.9 KiB
LLVM
;; RUN: llc -mtriple=aarch64 -mattr=+v8.5a %s -o - | FileCheck %s
|
|
|
|
declare i32 @g(i32) #5
|
|
|
|
define i32 @f0(i32 %x) #0 {
|
|
entry:
|
|
%call = tail call i32 @g(i32 %x) #5
|
|
%add = add nsw i32 %call, 1
|
|
ret i32 %add
|
|
}
|
|
;; CHECK-LABEL: f0:
|
|
;; CHECK-NOT: bti
|
|
;; CHECK-NOT: pacia
|
|
;; CHECK-NOT: reta
|
|
|
|
define i32 @f1(i32 %x) #1 {
|
|
entry:
|
|
%call = tail call i32 @g(i32 %x) #5
|
|
%add = add nsw i32 %call, 1
|
|
ret i32 %add
|
|
}
|
|
;; CHECK-LABEL: f1:
|
|
;; CHECK: bti c
|
|
;; CHECK-NOT: reta
|
|
|
|
define i32 @f2(i32 %x) #2 {
|
|
entry:
|
|
%call = tail call i32 @g(i32 %x) #5
|
|
%add = add nsw i32 %call, 1
|
|
ret i32 %add
|
|
}
|
|
;; CHECK-LABEL: f2:
|
|
;; CHECK: paciasp
|
|
;; CHECK: retaa
|
|
|
|
define i32 @f3(i32 %x) #3 {
|
|
entry:
|
|
%call = tail call i32 @g(i32 %x) #5
|
|
%add = add nsw i32 %call, 1
|
|
ret i32 %add
|
|
}
|
|
;; CHECK-LABEL: f3:
|
|
;; CHECK: pacibsp
|
|
;; CHECK: retab
|
|
|
|
define i32 @f4(i32 %x) #4 {
|
|
entry:
|
|
ret i32 1
|
|
}
|
|
;; CHECK-LABEL: f4:
|
|
;; CHECK: paciasp
|
|
;; CHECK: retaa
|
|
|
|
define i32 @f5(i32 %x) #5 {
|
|
entry:
|
|
%call = tail call i32 @g(i32 %x) #5
|
|
%add = add nsw i32 %call, 1
|
|
ret i32 %add
|
|
}
|
|
;; CHECK-LABEL: f5:
|
|
;; CHECK: paciasp
|
|
;; CHECK: retaa
|
|
|
|
attributes #0 = { nounwind }
|
|
attributes #1 = { nounwind "branch-target-enforcement" }
|
|
attributes #2 = { nounwind "sign-return-address"="non-leaf" "sign-return-address-key"="a_key" }
|
|
attributes #3 = { nounwind "sign-return-address"="non-leaf" "sign-return-address-key"="b_key" }
|
|
attributes #4 = { nounwind "sign-return-address"="all" "sign-return-address-key"="a_key" }
|
|
attributes #5 = { nounwind "sign-return-address"="non-leaf" "sign-return-address-key"="a_key" }
|
|
|
|
!llvm.module.flags = !{!0, !1, !2, !3, !4}
|
|
|
|
!0 = !{i32 1, !"wchar_size", i32 4}
|
|
!1 = !{i32 8, !"branch-target-enforcement", i32 1}
|
|
!2 = !{i32 8, !"sign-return-address", i32 1}
|
|
!3 = !{i32 8, !"sign-return-address-all", i32 0}
|
|
!4 = !{i32 8, !"sign-return-address-with-bkey", i32 0}
|