6.8 KiB
PBS IRBackend to IRVM Lowering Specification
Status: Draft v1 (Backend Baseline)
Applies to: executable-backend lowering from IRBackend handoff into IRVM
1. Purpose
This document defines the normative lowering contract from executable IRBackend to IRVM.
Its purpose is to make backend lowering deterministic, reviewable, and compatible with runtime ISA/verification authority.
2. Scope
This document defines:
- required backend preconditions before
IRBackend -> IRVMstarts, IRVMstructural obligations needed before optimization/emission,- deterministic function-id assignment and control-flow lowering obligations,
- callsite lowering obligations across function, host-backed, and VM-owned intrinsic paths,
- mandatory compiler-side structural pre-verification before bytecode emission,
- and deterministic rejection obligations for backend-originated failures.
This document does not define:
- binary PBX layout details,
- loader patching internals,
- runtime execution internals,
- or one mandatory optimizer implementation.
3. Authority and Precedence
Normative precedence:
- Runtime authority (
docs/specs/hardware/topics/chapter-2.md,chapter-3.md,chapter-9.md,chapter-12.md,chapter-16.md) - Bytecode authority (
docs/specs/bytecode/ISA_CORE.md) docs/specs/compiler-languages/pbs/13. Lowering IRBackend Specification.md- This document
If a rule here conflicts with higher-precedence authorities, it is invalid.
4. Normative Inputs
This document depends on:
docs/specs/compiler-languages/pbs/13. Lowering IRBackend Specification.mddocs/specs/compiler-languages/pbs/6.1. Intrinsics and Builtin Types Specification.mddocs/specs/compiler-languages/pbs/6.2. Host ABI Binding and Loader Resolution Specification.md15. Bytecode and PBX Mapping Specification.md21. IRVM Optimization Pipeline Specification.md
5. Backend Entry Preconditions
Lowering from IRBackend to IRVM may start only when:
- frontend admission to
IRBackendis complete for the active slice, - required callsite categories (
CALL_FUNC/CALL_HOST/CALL_INTRINSIC) are available, - required canonical host/intrinsic metadata is available for admitted callsites,
- dependency-scoped fail-fast exclusions have already been applied at the
IRBackendboundary, - compiler-selected published-wrapper entrypoint identity is present and unambiguous,
- and target
vm_profileis selected deterministically.
6. IRVM Model Obligations
IRVM v1 is a quasi-ISA backend form:
- it may contain Core ISA ops and internal extension ops (
IRVM_EXT), - each
IRVM_EXTmust declare structural metadata equivalent to opcode-spec needs:pops,pushes,is_branch,is_terminator,
- and
IRVM_EXTmust be eliminable before bytecode emission.
IRVM must preserve, per function:
param_slots,local_slots,return_slots,max_stack_slots,- function entry mapping and deterministic identity.
7. Control-Flow Lowering Obligations
Control-flow lowering must satisfy:
- symbolic labels are allowed internally in lowering,
- final jump immediates must be resolved to
u32offsets relative to function start before emission, - jump targets must be instruction-boundary-valid within function ranges,
- and reachable fallthrough beyond function end without terminator is rejected.
8. Deterministic Function-ID Assignment
Function indexing must be deterministic:
- the compiler-selected published wrapper is the physical entrypoint,
- the published wrapper function id is
0, - remaining functions are ordered by
(moduleId -> modulePool canonical key, callable_name, source_start), - manifest-owned or name-only entrypoint fallback is forbidden,
- and identical admitted input graphs must produce identical function-id assignments.
For PBS executable lowering:
- the userland callable marked with
[Frame]remains the logical frame root, - the wrapper path must contain final
FRAME_RET, - and lowering must preserve that distinction through
IRVM.
9. Callsite Lowering Obligations
9.1 Function calls
CALL_FUNC lowers to CALL <func_id> with valid index and arity-consistent signature contracts.
9.2 Host-backed calls
CALL_HOST lowers to pre-load HOSTCALL <sysc_index>, not raw SYSCALL.
9.3 VM-owned intrinsic calls
CALL_INTRINSIC lowers to VM-owned intrinsic path and must remain distinct from host-binding paths.
Final intrinsic id resolution rules:
- compiler must resolve final intrinsic ids from the canonical ISA-scoped intrinsic registry artifact,
- compiler-local hardcoded maps or runtime-source parsing must not be authoritative identity sources,
- runtime and compiler consumers must validate parity against the same canonical artifact in strict CI mode.
9.4 Closure and coroutine constraints (v1)
- closure calls with unknown static callee are rejected in v1,
SPAWNandYIELDare outside the executablecore-v1claim scope and MUST be rejected as unsupported forms in v1 backend admission,SPAWNargument-count andYIELDstack-shape invariants remain reserved for a future profile that explicitly admits these opcodes,- and any profile that admits
SPAWN/YIELDMUST publish dedicated conformance evidence before claiming support.
10. Mandatory Compiler-Side Pre-Verification
Before bytecode emission, backend must run structural pre-verification on lowered IRVM (after resolving to Core-ISA-compatible form), covering at minimum:
- jump target validity,
- stack-depth join consistency,
- underflow/overflow against declared limits,
- return-shape consistency,
- function-id validity,
- callsite arity consistency,
- and structural validity of host/intrinsic call forms.
This pre-verification does not replace runtime verifier authority.
11. Deterministic Rejection Policy
When backend lowering fails at this boundary:
- rejection must be deterministic,
- diagnostics identity and phase must remain stable,
- and source attribution must be preserved whenever the failure remains source-attributable and user-actionable.
12. Explicit Deferrals
The following are intentionally deferred:
- optimizer pass catalog and tuning policy,
- richer internal IR analysis models beyond v1 obligations,
- advanced closure/lifetime optimizations beyond v1 constraints,
- and executable support for
SPAWN/YIELDincore-v1.
13. Non-Goals
- Defining one in-memory IR implementation graph.
- Redefining runtime verifier/loader internals.
- Defining PBX binary chunk policy in this document.
14. Exit Criteria
This document is healthy when:
IRBackend -> IRVMobligations are explicit and testable,- deterministic function/call/control-flow lowering rules are explicit,
- mandatory pre-verification boundary is explicit,
- and scope boundaries with optimization/emission specs are explicit.