With -fsanitize=kcfi (Kernel Control-Flow Integrity), Clang emits
"kcfi" operand bundles to indirect call instructions. Similarly to
the target-specific lowering added in D119296, implement KCFI operand
bundle lowering for RISC-V.
This patch disables the generic KCFI pass for RISC-V in Clang, and
adds the KCFI machine function pass in RISCVPassConfig::addPreSched
to emit target-specific KCFI_CHECK pseudo instructions before calls
that have KCFI operand bundles. The machine function pass also bundles
the instructions to ensure we emit the checks immediately before the
calls, which is not possible with the generic pass.
KCFI_CHECK instructions are lowered in RISCVAsmPrinter to a
contiguous code sequence that traps if the expected hash in the
operand bundle doesn't match the hash before the target function
address. This patch emits an ebreak instruction for error handling
to match the Linux kernel's BUG() implementation. Just like for X86,
we also emit trap locations to a .kcfi_traps section to support
error handling, as we cannot embed additional information to the trap
instruction itself.
What about this code relies on it being 64-bit?