18c2ecf20Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0
28c2ecf20Sopenharmony_ci
38c2ecf20Sopenharmony_ci#include "gcc-common.h"
48c2ecf20Sopenharmony_ci
58c2ecf20Sopenharmony_ci__visible int plugin_is_GPL_compatible;
68c2ecf20Sopenharmony_ci
78c2ecf20Sopenharmony_cistatic unsigned int sp_mask, canary_offset;
88c2ecf20Sopenharmony_ci
98c2ecf20Sopenharmony_cistatic unsigned int arm_pertask_ssp_rtl_execute(void)
108c2ecf20Sopenharmony_ci{
118c2ecf20Sopenharmony_ci	rtx_insn *insn;
128c2ecf20Sopenharmony_ci
138c2ecf20Sopenharmony_ci	for (insn = get_insns(); insn; insn = NEXT_INSN(insn)) {
148c2ecf20Sopenharmony_ci		const char *sym;
158c2ecf20Sopenharmony_ci		rtx body;
168c2ecf20Sopenharmony_ci		rtx mask, masked_sp;
178c2ecf20Sopenharmony_ci
188c2ecf20Sopenharmony_ci		/*
198c2ecf20Sopenharmony_ci		 * Find a SET insn involving a SYMBOL_REF to __stack_chk_guard
208c2ecf20Sopenharmony_ci		 */
218c2ecf20Sopenharmony_ci		if (!INSN_P(insn))
228c2ecf20Sopenharmony_ci			continue;
238c2ecf20Sopenharmony_ci		body = PATTERN(insn);
248c2ecf20Sopenharmony_ci		if (GET_CODE(body) != SET ||
258c2ecf20Sopenharmony_ci		    GET_CODE(SET_SRC(body)) != SYMBOL_REF)
268c2ecf20Sopenharmony_ci			continue;
278c2ecf20Sopenharmony_ci		sym = XSTR(SET_SRC(body), 0);
288c2ecf20Sopenharmony_ci		if (strcmp(sym, "__stack_chk_guard"))
298c2ecf20Sopenharmony_ci			continue;
308c2ecf20Sopenharmony_ci
318c2ecf20Sopenharmony_ci		/*
328c2ecf20Sopenharmony_ci		 * Replace the source of the SET insn with an expression that
338c2ecf20Sopenharmony_ci		 * produces the address of the copy of the stack canary value
348c2ecf20Sopenharmony_ci		 * stored in struct thread_info
358c2ecf20Sopenharmony_ci		 */
368c2ecf20Sopenharmony_ci		mask = GEN_INT(sext_hwi(sp_mask, GET_MODE_PRECISION(Pmode)));
378c2ecf20Sopenharmony_ci		masked_sp = gen_reg_rtx(Pmode);
388c2ecf20Sopenharmony_ci
398c2ecf20Sopenharmony_ci		emit_insn_before(gen_rtx_set(masked_sp,
408c2ecf20Sopenharmony_ci					     gen_rtx_AND(Pmode,
418c2ecf20Sopenharmony_ci							 stack_pointer_rtx,
428c2ecf20Sopenharmony_ci							 mask)),
438c2ecf20Sopenharmony_ci				 insn);
448c2ecf20Sopenharmony_ci
458c2ecf20Sopenharmony_ci		SET_SRC(body) = gen_rtx_PLUS(Pmode, masked_sp,
468c2ecf20Sopenharmony_ci					     GEN_INT(canary_offset));
478c2ecf20Sopenharmony_ci	}
488c2ecf20Sopenharmony_ci	return 0;
498c2ecf20Sopenharmony_ci}
508c2ecf20Sopenharmony_ci
518c2ecf20Sopenharmony_ci#define PASS_NAME arm_pertask_ssp_rtl
528c2ecf20Sopenharmony_ci
538c2ecf20Sopenharmony_ci#define NO_GATE
548c2ecf20Sopenharmony_ci#include "gcc-generate-rtl-pass.h"
558c2ecf20Sopenharmony_ci
568c2ecf20Sopenharmony_ci#if BUILDING_GCC_VERSION >= 9000
578c2ecf20Sopenharmony_cistatic bool no(void)
588c2ecf20Sopenharmony_ci{
598c2ecf20Sopenharmony_ci	return false;
608c2ecf20Sopenharmony_ci}
618c2ecf20Sopenharmony_ci
628c2ecf20Sopenharmony_cistatic void arm_pertask_ssp_start_unit(void *gcc_data, void *user_data)
638c2ecf20Sopenharmony_ci{
648c2ecf20Sopenharmony_ci	targetm.have_stack_protect_combined_set = no;
658c2ecf20Sopenharmony_ci	targetm.have_stack_protect_combined_test = no;
668c2ecf20Sopenharmony_ci}
678c2ecf20Sopenharmony_ci#endif
688c2ecf20Sopenharmony_ci
698c2ecf20Sopenharmony_ci__visible int plugin_init(struct plugin_name_args *plugin_info,
708c2ecf20Sopenharmony_ci			  struct plugin_gcc_version *version)
718c2ecf20Sopenharmony_ci{
728c2ecf20Sopenharmony_ci	const char * const plugin_name = plugin_info->base_name;
738c2ecf20Sopenharmony_ci	const int argc = plugin_info->argc;
748c2ecf20Sopenharmony_ci	const struct plugin_argument *argv = plugin_info->argv;
758c2ecf20Sopenharmony_ci	int tso = 0;
768c2ecf20Sopenharmony_ci	int i;
778c2ecf20Sopenharmony_ci
788c2ecf20Sopenharmony_ci	if (!plugin_default_version_check(version, &gcc_version)) {
798c2ecf20Sopenharmony_ci		error(G_("incompatible gcc/plugin versions"));
808c2ecf20Sopenharmony_ci		return 1;
818c2ecf20Sopenharmony_ci	}
828c2ecf20Sopenharmony_ci
838c2ecf20Sopenharmony_ci	for (i = 0; i < argc; ++i) {
848c2ecf20Sopenharmony_ci		if (!strcmp(argv[i].key, "disable"))
858c2ecf20Sopenharmony_ci			return 0;
868c2ecf20Sopenharmony_ci
878c2ecf20Sopenharmony_ci		/* all remaining options require a value */
888c2ecf20Sopenharmony_ci		if (!argv[i].value) {
898c2ecf20Sopenharmony_ci			error(G_("no value supplied for option '-fplugin-arg-%s-%s'"),
908c2ecf20Sopenharmony_ci			      plugin_name, argv[i].key);
918c2ecf20Sopenharmony_ci			return 1;
928c2ecf20Sopenharmony_ci		}
938c2ecf20Sopenharmony_ci
948c2ecf20Sopenharmony_ci		if (!strcmp(argv[i].key, "tso")) {
958c2ecf20Sopenharmony_ci			tso = atoi(argv[i].value);
968c2ecf20Sopenharmony_ci			continue;
978c2ecf20Sopenharmony_ci		}
988c2ecf20Sopenharmony_ci
998c2ecf20Sopenharmony_ci		if (!strcmp(argv[i].key, "offset")) {
1008c2ecf20Sopenharmony_ci			canary_offset = atoi(argv[i].value);
1018c2ecf20Sopenharmony_ci			continue;
1028c2ecf20Sopenharmony_ci		}
1038c2ecf20Sopenharmony_ci		error(G_("unknown option '-fplugin-arg-%s-%s'"),
1048c2ecf20Sopenharmony_ci		      plugin_name, argv[i].key);
1058c2ecf20Sopenharmony_ci		return 1;
1068c2ecf20Sopenharmony_ci	}
1078c2ecf20Sopenharmony_ci
1088c2ecf20Sopenharmony_ci	/* create the mask that produces the base of the stack */
1098c2ecf20Sopenharmony_ci	sp_mask = ~((1U << (12 + tso)) - 1);
1108c2ecf20Sopenharmony_ci
1118c2ecf20Sopenharmony_ci	PASS_INFO(arm_pertask_ssp_rtl, "expand", 1, PASS_POS_INSERT_AFTER);
1128c2ecf20Sopenharmony_ci
1138c2ecf20Sopenharmony_ci	register_callback(plugin_info->base_name, PLUGIN_PASS_MANAGER_SETUP,
1148c2ecf20Sopenharmony_ci			  NULL, &arm_pertask_ssp_rtl_pass_info);
1158c2ecf20Sopenharmony_ci
1168c2ecf20Sopenharmony_ci#if BUILDING_GCC_VERSION >= 9000
1178c2ecf20Sopenharmony_ci	register_callback(plugin_info->base_name, PLUGIN_START_UNIT,
1188c2ecf20Sopenharmony_ci			  arm_pertask_ssp_start_unit, NULL);
1198c2ecf20Sopenharmony_ci#endif
1208c2ecf20Sopenharmony_ci
1218c2ecf20Sopenharmony_ci	return 0;
1228c2ecf20Sopenharmony_ci}
123