rust/src/lib.rs

397 lines
13 KiB
Rust
Raw Normal View History

2017-07-21 10:25:30 -05:00
#![feature(
rustc_private,
2017-12-14 04:03:55 -06:00
catch_expr,
2017-07-21 10:25:30 -05:00
)]
2018-07-10 10:32:38 -05:00
#![cfg_attr(feature = "cargo-clippy", allow(cast_lossless))]
2017-07-21 10:25:30 -05:00
#[macro_use]
extern crate log;
2018-01-06 09:21:24 -06:00
// From rustc.
#[macro_use]
2017-07-21 10:25:30 -05:00
extern crate rustc;
2017-12-14 04:03:55 -06:00
extern crate rustc_data_structures;
2018-05-03 17:29:13 -05:00
extern crate rustc_mir;
2018-05-01 11:13:22 -05:00
extern crate rustc_target;
2017-07-21 10:25:30 -05:00
extern crate syntax;
2018-08-23 14:22:57 -05:00
use rustc::ty::{self, TyCtxt, query::TyCtxtAt};
use rustc::ty::layout::{TyLayout, LayoutOf, Size};
2017-07-24 08:19:32 -05:00
use rustc::hir::def_id::DefId;
2017-07-21 10:25:30 -05:00
use rustc::mir;
use rustc_data_structures::fx::FxHasher;
use syntax::ast::Mutability;
2018-08-23 14:22:57 -05:00
use syntax::attr;
use std::marker::PhantomData;
use std::collections::{HashMap, BTreeMap};
use std::hash::{Hash, Hasher};
2017-07-21 10:25:30 -05:00
pub use rustc::mir::interpret::*;
2017-12-14 04:03:55 -06:00
pub use rustc_mir::interpret::*;
2017-07-21 10:25:30 -05:00
mod fn_call;
mod operator;
mod intrinsic;
mod helpers;
mod memory;
2017-07-31 06:30:44 -05:00
mod tls;
2017-12-14 04:03:55 -06:00
mod locks;
mod range_map;
2017-07-24 08:19:32 -05:00
use fn_call::EvalContextExt as MissingFnsEvalContextExt;
use operator::EvalContextExt as OperatorEvalContextExt;
use intrinsic::EvalContextExt as IntrinsicEvalContextExt;
2017-08-01 04:11:57 -05:00
use tls::EvalContextExt as TlsEvalContextExt;
use memory::MemoryKind as MiriMemoryKind;
2017-12-14 04:03:55 -06:00
use locks::LockInfo;
use range_map::RangeMap;
use helpers::{ScalarExt, FalibleScalarExt};
2018-05-26 10:07:34 -05:00
2018-06-12 00:30:29 -05:00
pub fn create_ecx<'a, 'mir: 'a, 'tcx: 'mir>(
2017-07-21 10:25:30 -05:00
tcx: TyCtxt<'a, 'tcx, 'tcx>,
main_id: DefId,
start_wrapper: Option<DefId>,
) -> EvalResult<'tcx, EvalContext<'a, 'mir, 'tcx, Evaluator<'tcx>>> {
2018-07-16 04:42:46 -05:00
let mut ecx = EvalContext::new(
2018-08-20 09:27:23 -05:00
tcx.at(syntax::source_map::DUMMY_SP),
2018-07-16 04:42:46 -05:00
ty::ParamEnv::reveal_all(),
Default::default(),
MemoryData::new()
);
2017-07-21 10:25:30 -05:00
2018-06-11 11:49:17 -05:00
let main_instance = ty::Instance::mono(ecx.tcx.tcx, main_id);
let main_mir = ecx.load_mir(main_instance.def)?;
2017-07-21 10:25:30 -05:00
2018-06-11 11:49:17 -05:00
if !main_mir.return_ty().is_nil() || main_mir.arg_count != 0 {
return err!(Unimplemented(
"miri does not support main functions without `fn()` type signatures"
.to_owned(),
));
}
2018-08-07 08:22:11 -05:00
let ptr_size = ecx.memory.pointer_size();
2017-07-21 10:25:30 -05:00
2018-06-11 11:49:17 -05:00
if let Some(start_id) = start_wrapper {
let main_ret_ty = ecx.tcx.fn_sig(main_id).output();
let main_ret_ty = main_ret_ty.no_late_bound_regions().unwrap();
let start_instance = ty::Instance::resolve(
ecx.tcx.tcx,
ty::ParamEnv::reveal_all(),
start_id,
ecx.tcx.mk_substs(
::std::iter::once(ty::subst::Kind::from(main_ret_ty)))
).unwrap();
let start_mir = ecx.load_mir(start_instance.def)?;
if start_mir.arg_count != 3 {
return err!(AbiViolation(format!(
"'start' lang item should have three arguments, but has {}",
start_mir.arg_count
)));
}
2017-07-21 10:25:30 -05:00
// Return value (in static memory so that it does not count as leak)
2018-06-11 11:49:17 -05:00
let size = ecx.tcx.data_layout.pointer_size;
let align = ecx.tcx.data_layout.pointer_align;
let ret_ptr = ecx.memory_mut().allocate(size, align, MiriMemoryKind::MutStatic.into())?;
2018-06-11 11:49:17 -05:00
// Push our stack frame
ecx.push_stack_frame(
start_instance,
start_mir.span,
start_mir,
Place::from_ptr(ret_ptr, align),
StackPopCleanup::None,
)?;
let mut args = ecx.frame().mir.args_iter();
// First argument: pointer to main()
let main_ptr = ecx.memory_mut().create_fn_alloc(main_instance);
let dest = ecx.eval_place(&mir::Place::Local(args.next().unwrap()))?;
ecx.write_scalar(Scalar::Ptr(main_ptr), dest)?;
2018-06-11 11:49:17 -05:00
// Second argument (argc): 1
let dest = ecx.eval_place(&mir::Place::Local(args.next().unwrap()))?;
ecx.write_scalar(Scalar::from_int(1, dest.layout.size), dest)?;
2018-06-11 11:49:17 -05:00
// FIXME: extract main source file path
// Third argument (argv): &[b"foo"]
let dest = ecx.eval_place(&mir::Place::Local(args.next().unwrap()))?;
let foo = ecx.memory.allocate_static_bytes(b"foo\0");
let foo_ty = ecx.tcx.mk_imm_ptr(ecx.tcx.types.u8);
let foo_layout = ecx.layout_of(foo_ty)?;
let foo_place = ecx.allocate(foo_layout, MemoryKind::Stack)?; // will be marked as static in just a second
ecx.write_scalar(Scalar::Ptr(foo), foo_place.into())?;
ecx.memory.mark_static_initialized(foo_place.to_ptr()?.alloc_id, Mutability::Immutable)?; // marked as static
ecx.write_scalar(foo_place.ptr, dest)?;
2018-06-11 11:49:17 -05:00
assert!(args.next().is_none(), "start lang item has more arguments than expected");
} else {
ecx.push_stack_frame(
main_instance,
main_mir.span,
main_mir,
2018-08-07 08:22:11 -05:00
Place::from_scalar_ptr(Scalar::from_int(1, ptr_size).into(), ty::layout::Align::from_bytes(1, 1).unwrap()),
2018-06-11 11:49:17 -05:00
StackPopCleanup::None,
)?;
// No arguments
let mut args = ecx.frame().mir.args_iter();
assert!(args.next().is_none(), "main function must not have arguments");
}
Ok(ecx)
2018-06-11 11:49:17 -05:00
}
pub fn eval_main<'a, 'tcx: 'a>(
tcx: TyCtxt<'a, 'tcx, 'tcx>,
main_id: DefId,
start_wrapper: Option<DefId>,
) {
let mut ecx = create_ecx(tcx, main_id, start_wrapper).expect("Couldn't create ecx");
2017-07-21 10:25:30 -05:00
2018-06-11 11:49:17 -05:00
let res: EvalResult = do catch {
ecx.run()?;
2017-08-01 04:11:57 -05:00
ecx.run_tls_dtors()?;
2018-06-11 11:49:17 -05:00
};
2017-07-21 10:25:30 -05:00
2018-06-11 11:49:17 -05:00
match res {
2017-07-21 10:25:30 -05:00
Ok(()) => {
let leaks = ecx.memory().leak_report();
if leaks != 0 {
tcx.sess.err("the evaluated program leaked memory");
2017-07-21 10:25:30 -05:00
}
}
Err(e) => {
if let Some(frame) = ecx.stack().last() {
let block = &frame.mir.basic_blocks()[frame.block];
let span = if frame.stmt < block.statements.len() {
block.statements[frame.stmt].source_info.span
} else {
block.terminator().source_info.span
};
let e = e.to_string();
let msg = format!("constant evaluation error: {}", e);
let mut err = struct_error(ecx.tcx.tcx.at(span), msg.as_str());
let (frames, span) = ecx.generate_stacktrace(None);
err.span_label(span, e);
2018-07-02 11:00:36 -05:00
for FrameInfo { span, location, .. } in frames {
err.span_note(span, &format!("inside call to `{}`", location));
}
err.emit();
} else {
ecx.tcx.sess.err(&e.to_string());
}
/* Nice try, but with MIRI_BACKTRACE this shows 100s of backtraces.
for (i, frame) in ecx.stack().iter().enumerate() {
trace!("-------------------");
trace!("Frame {}", i);
trace!(" return: {:#?}", frame.return_place);
for (i, local) in frame.locals.iter().enumerate() {
2018-08-07 08:22:11 -05:00
if let Ok(local) = local.access() {
trace!(" local {}: {:?}", i, local);
}
}
}*/
2017-07-21 10:25:30 -05:00
}
}
}
#[derive(Clone, Default, PartialEq, Eq)]
2017-12-14 04:03:55 -06:00
pub struct Evaluator<'tcx> {
2017-07-21 10:25:30 -05:00
/// Environment variables set by `setenv`
/// Miri does not expose env vars from the host to the emulated program
2018-05-26 10:07:34 -05:00
pub(crate) env_vars: HashMap<Vec<u8>, Pointer>,
2017-12-14 04:03:55 -06:00
/// Use the lifetime
_dummy : PhantomData<&'tcx ()>,
2017-07-21 10:25:30 -05:00
}
impl<'tcx> Hash for Evaluator<'tcx> {
fn hash<H: Hasher>(&self, state: &mut H) {
let Evaluator {
env_vars,
_dummy: _,
} = self;
env_vars.iter()
.map(|(env, ptr)| {
let mut h = FxHasher::default();
env.hash(&mut h);
ptr.hash(&mut h);
h.finish()
})
.fold(0u64, |acc, hash| acc.wrapping_add(hash))
.hash(state);
}
}
pub type TlsKey = u128;
2017-07-21 10:25:30 -05:00
#[derive(Copy, Clone, Debug, Hash, PartialEq, Eq)]
2017-07-21 10:25:30 -05:00
pub struct TlsEntry<'tcx> {
2018-05-26 10:07:34 -05:00
data: Scalar, // Will eventually become a map from thread IDs to `Scalar`s, if we ever support more than one thread.
2017-07-21 10:25:30 -05:00
dtor: Option<ty::Instance<'tcx>>,
}
2018-07-16 04:42:46 -05:00
#[derive(Clone, PartialEq, Eq)]
pub struct MemoryData<'tcx> {
2017-07-21 10:25:30 -05:00
/// The Key to use for the next thread-local allocation.
next_thread_local: TlsKey,
/// pthreads-style thread-local storage.
thread_local: BTreeMap<TlsKey, TlsEntry<'tcx>>,
2017-12-14 04:03:55 -06:00
/// Memory regions that are locked by some function
///
/// Only mutable (static mut, heap, stack) allocations have an entry in this map.
/// The entry is created when allocating the memory and deleted after deallocation.
2018-01-14 21:31:59 -06:00
locks: HashMap<AllocId, RangeMap<LockInfo<'tcx>>>,
2017-07-21 10:25:30 -05:00
}
2018-07-16 04:42:46 -05:00
impl<'tcx> MemoryData<'tcx> {
fn new() -> Self {
MemoryData {
next_thread_local: 1, // start with 1 as we must not use 0 on Windows
thread_local: BTreeMap::new(),
locks: HashMap::new(),
}
}
}
impl<'tcx> Hash for MemoryData<'tcx> {
fn hash<H: Hasher>(&self, state: &mut H) {
let MemoryData {
next_thread_local: _,
thread_local,
locks: _,
} = self;
thread_local.hash(state);
}
}
2018-01-14 11:59:13 -06:00
impl<'mir, 'tcx: 'mir> Machine<'mir, 'tcx> for Evaluator<'tcx> {
2017-07-21 10:25:30 -05:00
type MemoryData = MemoryData<'tcx>;
type MemoryKinds = memory::MemoryKind;
2017-07-21 10:25:30 -05:00
/// Returns Ok() when the function was handled, fail otherwise
fn find_fn<'a>(
2018-01-14 11:59:13 -06:00
ecx: &mut EvalContext<'a, 'mir, 'tcx, Self>,
2017-07-21 10:25:30 -05:00
instance: ty::Instance<'tcx>,
args: &[OpTy<'tcx>],
dest: Option<PlaceTy<'tcx>>,
ret: Option<mir::BasicBlock>,
) -> EvalResult<'tcx, Option<&'mir mir::Mir<'tcx>>> {
ecx.find_fn(instance, args, dest, ret)
2017-07-21 10:25:30 -05:00
}
fn call_intrinsic<'a>(
2018-01-14 11:59:13 -06:00
ecx: &mut rustc_mir::interpret::EvalContext<'a, 'mir, 'tcx, Self>,
instance: ty::Instance<'tcx>,
args: &[OpTy<'tcx>],
dest: PlaceTy<'tcx>,
) -> EvalResult<'tcx> {
ecx.call_intrinsic(instance, args, dest)
}
2017-08-01 04:11:57 -05:00
fn try_ptr_op<'a>(
2018-01-14 11:59:13 -06:00
ecx: &rustc_mir::interpret::EvalContext<'a, 'mir, 'tcx, Self>,
bin_op: mir::BinOp,
2018-05-26 10:07:34 -05:00
left: Scalar,
left_layout: TyLayout<'tcx>,
2018-05-26 10:07:34 -05:00
right: Scalar,
right_layout: TyLayout<'tcx>,
2018-05-26 10:07:34 -05:00
) -> EvalResult<'tcx, Option<(Scalar, bool)>> {
ecx.ptr_op(bin_op, left, left_layout, right, right_layout)
}
fn access_static_mut<'a, 'm>(
mem: &'m mut Memory<'a, 'mir, 'tcx, Self>,
2018-04-07 04:43:46 -05:00
id: AllocId,
) -> EvalResult<'tcx, &'m mut Allocation> {
// Make a copy, use that.
mem.deep_copy_static(id, MiriMemoryKind::MutStatic.into())?;
mem.get_mut(id) // this is recursive, but now we know that `id` is in `alloc_map`
}
fn box_alloc<'a>(
2018-01-14 11:59:13 -06:00
ecx: &mut EvalContext<'a, 'mir, 'tcx, Self>,
dest: PlaceTy<'tcx>,
) -> EvalResult<'tcx> {
trace!("box_alloc for {:?}", dest.layout.ty);
// Call the `exchange_malloc` lang item
let malloc = ecx.tcx.lang_items().exchange_malloc_fn().unwrap();
2018-01-14 11:59:13 -06:00
let malloc = ty::Instance::mono(ecx.tcx.tcx, malloc);
let malloc_mir = ecx.load_mir(malloc.def)?;
ecx.push_stack_frame(
malloc,
malloc_mir.span,
malloc_mir,
*dest,
// Don't do anything when we are done. The statement() function will increment
// the old stack frame's stmt counter to the next statement, which means that when
// exchange_malloc returns, we go on evaluating exactly where we want to be.
StackPopCleanup::None,
)?;
let mut args = ecx.frame().mir.args_iter();
let layout = ecx.layout_of(dest.layout.ty.builtin_deref(false).unwrap().ty)?;
// First argument: size
// (0 is allowed here, this is expected to be handled by the lang item)
let arg = ecx.eval_place(&mir::Place::Local(args.next().unwrap()))?;
let size = layout.size.bytes();
ecx.write_scalar(Scalar::from_uint(size, arg.layout.size), arg)?;
// Second argument: align
let arg = ecx.eval_place(&mir::Place::Local(args.next().unwrap()))?;
let align = layout.align.abi();
ecx.write_scalar(Scalar::from_uint(align, arg.layout.size), arg)?;
// No more arguments
assert!(args.next().is_none(), "exchange_malloc lang item has more arguments than expected");
Ok(())
}
2018-08-23 14:22:57 -05:00
fn find_foreign_static<'a>(
tcx: TyCtxtAt<'a, 'tcx, 'tcx>,
def_id: DefId,
) -> EvalResult<'tcx, &'tcx Allocation> {
let attrs = tcx.get_attrs(def_id);
let link_name = match attr::first_attr_value_str_by_name(&attrs, "link_name") {
Some(name) => name.as_str(),
None => tcx.item_name(def_id).as_str(),
};
let alloc = match &link_name[..] {
"__cxa_thread_atexit_impl" => {
// This should be all-zero, pointer-sized
let data = vec![0; tcx.data_layout.pointer_size.bytes() as usize];
let alloc = Allocation::from_bytes(&data[..], tcx.data_layout.pointer_align);
tcx.intern_const_alloc(alloc)
}
_ => return err!(Unimplemented(
format!("can't access foreign static: {}", link_name),
)),
};
Ok(alloc)
}
2017-12-14 04:03:55 -06:00
fn validation_op<'a>(
2018-05-07 03:49:54 -05:00
_ecx: &mut EvalContext<'a, 'mir, 'tcx, Self>,
_op: ::rustc::mir::ValidationOp,
_operand: &::rustc::mir::ValidationOperand<'tcx, ::rustc::mir::Place<'tcx>>,
2017-12-14 04:03:55 -06:00
) -> EvalResult<'tcx> {
// FIXME: prevent this from ICEing
//ecx.validation_op(op, operand)
Ok(())
2017-12-14 04:03:55 -06:00
}
2017-07-21 10:25:30 -05:00
}