Skip to content

Commit d55d46f

Browse files
committed
[WPD] Add an optional checking mode for debugging devirtualization
This adds an internal option -wholeprogramdevirt-check which if enabled will guard each devirtualization with a runtime check against the expected target, and an invocation of a debug trap if the check fails. This is useful for debugging WPD failures involving undefined behavior (e.g. casting to another class type not in the inheritance chain). Differential Revision: https://reviews.llvm.org/D95969
1 parent 2f0f67a commit d55d46f

File tree

2 files changed

+107
-2
lines changed

2 files changed

+107
-2
lines changed

llvm/lib/Transforms/IPO/WholeProgramDevirt.cpp

Lines changed: 30 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -94,6 +94,7 @@
9494
#include "llvm/Support/MathExtras.h"
9595
#include "llvm/Transforms/IPO.h"
9696
#include "llvm/Transforms/IPO/FunctionAttrs.h"
97+
#include "llvm/Transforms/Utils/BasicBlockUtils.h"
9798
#include "llvm/Transforms/Utils/Evaluator.h"
9899
#include <algorithm>
99100
#include <cstddef>
@@ -162,6 +163,14 @@ cl::list<std::string>
162163
cl::desc("Prevent function(s) from being devirtualized"),
163164
cl::Hidden, cl::ZeroOrMore, cl::CommaSeparated);
164165

166+
/// Mechanism to add runtime checking of devirtualization decisions, trapping on
167+
/// any that are not correct. Useful for debugging undefined behavior leading to
168+
/// failures with WPD.
169+
cl::opt<bool>
170+
CheckDevirt("wholeprogramdevirt-check", cl::init(false), cl::Hidden,
171+
cl::ZeroOrMore,
172+
cl::desc("Add code to trap on incorrect devirtualizations"));
173+
165174
namespace {
166175
struct PatternList {
167176
std::vector<GlobPattern> Patterns;
@@ -1055,8 +1064,27 @@ void DevirtModule::applySingleImplDevirt(VTableSlotInfo &SlotInfo,
10551064
if (RemarksEnabled)
10561065
VCallSite.emitRemark("single-impl",
10571066
TheFn->stripPointerCasts()->getName(), OREGetter);
1058-
VCallSite.CB.setCalledOperand(ConstantExpr::getBitCast(
1059-
TheFn, VCallSite.CB.getCalledOperand()->getType()));
1067+
auto &CB = VCallSite.CB;
1068+
IRBuilder<> Builder(&CB);
1069+
Value *Callee =
1070+
Builder.CreateBitCast(TheFn, CB.getCalledOperand()->getType());
1071+
1072+
// If checking is enabled, add support to compare the virtual function
1073+
// pointer to the devirtualized target. In case of a mismatch, perform a
1074+
// debug trap.
1075+
if (CheckDevirt) {
1076+
auto *Cond = Builder.CreateICmpNE(CB.getCalledOperand(), Callee);
1077+
Instruction *ThenTerm =
1078+
SplitBlockAndInsertIfThen(Cond, &CB, /*Unreachable=*/false);
1079+
Builder.SetInsertPoint(ThenTerm);
1080+
Function *TrapFn = Intrinsic::getDeclaration(&M, Intrinsic::debugtrap);
1081+
auto *CallTrap = Builder.CreateCall(TrapFn);
1082+
CallTrap->setDebugLoc(CB.getDebugLoc());
1083+
}
1084+
1085+
// Devirtualize.
1086+
CB.setCalledOperand(Callee);
1087+
10601088
// This use is no longer unsafe.
10611089
if (VCallSite.NumUnsafeUses)
10621090
--*VCallSite.NumUnsafeUses;

llvm/test/ThinLTO/X86/devirt_check.ll

Lines changed: 77 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,77 @@
1+
; REQUIRES: x86-registered-target
2+
3+
; Test that devirtualization option -wholeprogramdevirt-check adds code to check
4+
; that the devirtualization decision was correct and trap if not.
5+
6+
; The vtables have vcall_visibility metadata with hidden visibility, to enable
7+
; devirtualization.
8+
9+
; Generate unsplit module with summary for ThinLTO index-based WPD.
10+
; RUN: opt -thinlto-bc -o %t2.o %s
11+
; RUN: llvm-lto2 run %t2.o -save-temps -use-new-pm -pass-remarks=. \
12+
; RUN: -wholeprogramdevirt-check \
13+
; RUN: -o %t3 \
14+
; RUN: -r=%t2.o,test,px \
15+
; RUN: -r=%t2.o,_ZN1A1nEi,p \
16+
; RUN: -r=%t2.o,_ZN1B1fEi,p \
17+
; RUN: -r=%t2.o,_ZTV1B,px 2>&1 | FileCheck %s --check-prefix=REMARK
18+
; RUN: llvm-dis %t3.1.4.opt.bc -o - | FileCheck %s --check-prefix=CHECK-IR
19+
20+
; REMARK-DAG: single-impl: devirtualized a call to _ZN1A1nEi
21+
22+
target datalayout = "e-m:e-p270:32:32-p271:32:32-p272:64:64-i64:64-f80:128-n8:16:32:64-S128"
23+
target triple = "x86_64-grtev4-linux-gnu"
24+
25+
%struct.A = type { i32 (...)** }
26+
%struct.B = type { %struct.A }
27+
28+
@_ZTV1B = constant { [4 x i8*] } { [4 x i8*] [i8* null, i8* undef, i8* bitcast (i32 (%struct.B*, i32)* @_ZN1B1fEi to i8*), i8* bitcast (i32 (%struct.A*, i32)* @_ZN1A1nEi to i8*)] }, !type !0, !type !1, !vcall_visibility !5
29+
30+
31+
; CHECK-IR-LABEL: define i32 @test
32+
define i32 @test(%struct.A* %obj, i32 %a) {
33+
entry:
34+
%0 = bitcast %struct.A* %obj to i8***
35+
%vtable = load i8**, i8*** %0
36+
%1 = bitcast i8** %vtable to i8*
37+
%p = call i1 @llvm.type.test(i8* %1, metadata !"_ZTS1A")
38+
call void @llvm.assume(i1 %p)
39+
%fptrptr = getelementptr i8*, i8** %vtable, i32 1
40+
%2 = bitcast i8** %fptrptr to i32 (%struct.A*, i32)**
41+
%fptr1 = load i32 (%struct.A*, i32)*, i32 (%struct.A*, i32)** %2, align 8
42+
43+
; Check that the call was devirtualized, but preceeded by a check guarding
44+
; a trap if the function pointer doesn't match.
45+
; CHECK-IR: %.not = icmp eq i32 (%struct.A*, i32)* %fptr1, @_ZN1A1nEi
46+
; CHECK-IR: br i1 %.not, label %3, label %2
47+
; CHECK-IR: 2:
48+
; CHECK-IR: tail call void @llvm.debugtrap()
49+
; CHECK-IR: br label %3
50+
; CHECK-IR: 3:
51+
; CHECK-IR: tail call i32 @_ZN1A1nEi
52+
%call = tail call i32 %fptr1(%struct.A* nonnull %obj, i32 %a)
53+
54+
ret i32 %call
55+
}
56+
; CHECK-IR-LABEL: ret i32
57+
; CHECK-IR-LABEL: }
58+
59+
declare i1 @llvm.type.test(i8*, metadata)
60+
declare void @llvm.assume(i1)
61+
62+
define i32 @_ZN1B1fEi(%struct.B* %this, i32 %a) #0 {
63+
ret i32 0;
64+
}
65+
66+
define i32 @_ZN1A1nEi(%struct.A* %this, i32 %a) #0 {
67+
ret i32 0;
68+
}
69+
70+
; Make sure we don't inline or otherwise optimize out the direct calls.
71+
attributes #0 = { noinline optnone }
72+
73+
!0 = !{i64 16, !"_ZTS1A"}
74+
!1 = !{i64 16, !"_ZTS1B"}
75+
!3 = !{i64 16, !4}
76+
!4 = distinct !{}
77+
!5 = !{i64 1}

0 commit comments

Comments
 (0)