
So far branch protection, sign return address, guarded control stack attributes are only emitted as module flags to indicate the functions need to be generated with those features. The problem is in case of an LTO build the module flags are merged with the `min` rule which means if one of the module is not build with sign return address then the features will be turned off for all functions. Due to the functions take the branch-protection and sign-return-address features from the module flags. The sign-return-address is function level option therefore it is expected functions from files that is compiled with -mbranch-protection=pac-ret to be protected. The inliner might inline functions with different set of flags as it doesn't consider the module flags. This patch adds the attributes to all functions and drops the checking of the module flags for the code generation. Module flag is still used for generating the ELF markers. Also drops the "true"/"false" values from the branch-protection-enforcement, branch-protection-pauth-lr, guarded-control-stack attributes as presence of the attribute means it is on absence means off and no other option. Releand with test fixes.
71 lines
2.4 KiB
C++
71 lines
2.4 KiB
C++
//===-- ARMMachineFunctionInfo.cpp - ARM machine function info ------------===//
|
|
//
|
|
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
|
|
// See https://llvm.org/LICENSE.txt for license information.
|
|
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
#include "ARMMachineFunctionInfo.h"
|
|
#include "ARMSubtarget.h"
|
|
#include "llvm/IR/Module.h"
|
|
|
|
using namespace llvm;
|
|
|
|
void ARMFunctionInfo::anchor() {}
|
|
|
|
yaml::ARMFunctionInfo::ARMFunctionInfo(const llvm::ARMFunctionInfo &MFI)
|
|
: LRSpilled(MFI.isLRSpilled()) {}
|
|
|
|
void yaml::ARMFunctionInfo::mappingImpl(yaml::IO &YamlIO) {
|
|
MappingTraits<ARMFunctionInfo>::mapping(YamlIO, *this);
|
|
}
|
|
|
|
void ARMFunctionInfo::initializeBaseYamlFields(
|
|
const yaml::ARMFunctionInfo &YamlMFI) {
|
|
LRSpilled = YamlMFI.LRSpilled;
|
|
}
|
|
|
|
static bool GetBranchTargetEnforcement(const Function &F,
|
|
const ARMSubtarget *Subtarget) {
|
|
if (!Subtarget->isMClass() || !Subtarget->hasV7Ops())
|
|
return false;
|
|
|
|
return F.hasFnAttribute("branch-target-enforcement");
|
|
}
|
|
|
|
// The pair returns values for the ARMFunctionInfo members
|
|
// SignReturnAddress and SignReturnAddressAll respectively.
|
|
static std::pair<bool, bool> GetSignReturnAddress(const Function &F) {
|
|
if (!F.hasFnAttribute("sign-return-address")) {
|
|
return {false, false};
|
|
}
|
|
|
|
StringRef Scope = F.getFnAttribute("sign-return-address").getValueAsString();
|
|
if (Scope == "none")
|
|
return {false, false};
|
|
|
|
if (Scope == "all")
|
|
return {true, true};
|
|
|
|
assert(Scope == "non-leaf");
|
|
return {true, false};
|
|
}
|
|
|
|
ARMFunctionInfo::ARMFunctionInfo(const Function &F,
|
|
const ARMSubtarget *Subtarget)
|
|
: isThumb(Subtarget->isThumb()), hasThumb2(Subtarget->hasThumb2()),
|
|
IsCmseNSEntry(F.hasFnAttribute("cmse_nonsecure_entry")),
|
|
IsCmseNSCall(F.hasFnAttribute("cmse_nonsecure_call")),
|
|
BranchTargetEnforcement(GetBranchTargetEnforcement(F, Subtarget)) {
|
|
if (Subtarget->isMClass() && Subtarget->hasV7Ops())
|
|
std::tie(SignReturnAddress, SignReturnAddressAll) = GetSignReturnAddress(F);
|
|
}
|
|
|
|
MachineFunctionInfo *
|
|
ARMFunctionInfo::clone(BumpPtrAllocator &Allocator, MachineFunction &DestMF,
|
|
const DenseMap<MachineBasicBlock *, MachineBasicBlock *>
|
|
&Src2DstMBB) const {
|
|
return DestMF.cloneInfo<ARMFunctionInfo>(*this);
|
|
}
|