2019-09-24 17:28:00 -05:00
|
|
|
use std::collections::HashMap;
|
2019-10-03 09:33:36 -05:00
|
|
|
use std::fs::{File, OpenOptions, remove_file};
|
2019-10-01 13:48:59 -05:00
|
|
|
use std::io::{Read, Write};
|
2019-09-24 17:28:00 -05:00
|
|
|
|
2019-09-30 14:21:45 -05:00
|
|
|
use rustc::ty::layout::Size;
|
|
|
|
|
2019-09-24 17:28:00 -05:00
|
|
|
use crate::stacked_borrows::Tag;
|
|
|
|
use crate::*;
|
|
|
|
|
2019-10-20 05:20:48 -05:00
|
|
|
#[derive(Debug)]
|
2019-09-30 15:18:23 -05:00
|
|
|
pub struct FileHandle {
|
2019-09-30 11:51:09 -05:00
|
|
|
file: File,
|
|
|
|
}
|
|
|
|
|
2019-09-24 17:28:00 -05:00
|
|
|
pub struct FileHandler {
|
2019-09-30 11:51:09 -05:00
|
|
|
handles: HashMap<i32, FileHandle>,
|
2019-09-24 17:28:00 -05:00
|
|
|
low: i32,
|
|
|
|
}
|
|
|
|
|
2019-09-28 14:22:57 -05:00
|
|
|
impl Default for FileHandler {
|
|
|
|
fn default() -> Self {
|
|
|
|
FileHandler {
|
2019-09-30 11:51:09 -05:00
|
|
|
handles: Default::default(),
|
2019-09-28 14:22:57 -05:00
|
|
|
// 0, 1 and 2 are reserved for stdin, stdout and stderr
|
|
|
|
low: 3,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-09-24 17:28:00 -05:00
|
|
|
impl<'mir, 'tcx> EvalContextExt<'mir, 'tcx> for crate::MiriEvalContext<'mir, 'tcx> {}
|
|
|
|
pub trait EvalContextExt<'mir, 'tcx: 'mir>: crate::MiriEvalContextExt<'mir, 'tcx> {
|
|
|
|
fn open(
|
|
|
|
&mut self,
|
|
|
|
path_op: OpTy<'tcx, Tag>,
|
|
|
|
flag_op: OpTy<'tcx, Tag>,
|
|
|
|
) -> InterpResult<'tcx, i32> {
|
|
|
|
let this = self.eval_context_mut();
|
|
|
|
|
2019-10-14 15:36:15 -05:00
|
|
|
this.check_no_isolation("open")?;
|
2019-09-24 17:28:00 -05:00
|
|
|
|
|
|
|
let flag = this.read_scalar(flag_op)?.to_i32()?;
|
|
|
|
|
2019-09-30 11:46:07 -05:00
|
|
|
let mut options = OpenOptions::new();
|
|
|
|
|
2019-10-14 16:42:29 -05:00
|
|
|
let o_rdonly = this.eval_libc_i32("O_RDONLY")?;
|
|
|
|
let o_wronly = this.eval_libc_i32("O_WRONLY")?;
|
|
|
|
let o_rdwr = this.eval_libc_i32("O_RDWR")?;
|
|
|
|
// The first two bits of the flag correspond to the access mode in linux, macOS and
|
|
|
|
// windows. We need to check that in fact the access mode flags for the current platform
|
|
|
|
// only use these two bits, otherwise we are in an unsupported platform and should error.
|
|
|
|
if (o_rdonly | o_wronly | o_rdwr) & !0b11 != 0 {
|
|
|
|
throw_unsup_format!("Access mode flags on this platform are unsupported");
|
|
|
|
}
|
|
|
|
// Now we check the access mode
|
2019-09-30 11:46:07 -05:00
|
|
|
let access_mode = flag & 0b11;
|
|
|
|
|
2019-10-14 16:42:29 -05:00
|
|
|
if access_mode == o_rdonly {
|
2019-09-30 11:46:07 -05:00
|
|
|
options.read(true);
|
2019-10-14 16:42:29 -05:00
|
|
|
} else if access_mode == o_wronly {
|
2019-09-30 11:46:07 -05:00
|
|
|
options.write(true);
|
2019-10-14 16:42:29 -05:00
|
|
|
} else if access_mode == o_rdwr {
|
2019-09-30 11:46:07 -05:00
|
|
|
options.read(true).write(true);
|
|
|
|
} else {
|
|
|
|
throw_unsup_format!("Unsupported access mode {:#x}", access_mode);
|
|
|
|
}
|
2019-10-11 05:30:50 -05:00
|
|
|
// We need to check that there aren't unsupported options in `flag`. For this we try to
|
|
|
|
// reproduce the content of `flag` in the `mirror` variable using only the supported
|
|
|
|
// options.
|
|
|
|
let mut mirror = access_mode;
|
2019-09-30 11:46:07 -05:00
|
|
|
|
2019-10-11 05:30:50 -05:00
|
|
|
let o_append = this.eval_libc_i32("O_APPEND")?;
|
|
|
|
if flag & o_append != 0 {
|
2019-09-30 11:46:07 -05:00
|
|
|
options.append(true);
|
2019-10-11 05:30:50 -05:00
|
|
|
mirror |= o_append;
|
2019-09-30 11:46:07 -05:00
|
|
|
}
|
2019-10-11 05:30:50 -05:00
|
|
|
let o_trunc = this.eval_libc_i32("O_TRUNC")?;
|
|
|
|
if flag & o_trunc != 0 {
|
2019-09-30 11:46:07 -05:00
|
|
|
options.truncate(true);
|
2019-10-11 05:30:50 -05:00
|
|
|
mirror |= o_trunc;
|
2019-09-30 11:46:07 -05:00
|
|
|
}
|
2019-10-11 05:30:50 -05:00
|
|
|
let o_creat = this.eval_libc_i32("O_CREAT")?;
|
|
|
|
if flag & o_creat != 0 {
|
2019-09-30 11:46:07 -05:00
|
|
|
options.create(true);
|
2019-10-11 05:30:50 -05:00
|
|
|
mirror |= o_creat;
|
|
|
|
}
|
|
|
|
let o_cloexec = this.eval_libc_i32("O_CLOEXEC")?;
|
|
|
|
if flag & o_cloexec != 0 {
|
2019-10-12 20:12:26 -05:00
|
|
|
// We do not need to do anything for this flag because `std` already sets it.
|
|
|
|
// (Technically we do not support *not* setting this flag, but we ignore that.)
|
2019-10-11 05:30:50 -05:00
|
|
|
mirror |= o_cloexec;
|
|
|
|
}
|
|
|
|
// If `flag` is not equal to `mirror`, there is an unsupported option enabled in `flag`,
|
|
|
|
// then we throw an error.
|
|
|
|
if flag != mirror {
|
2019-10-12 20:12:26 -05:00
|
|
|
throw_unsup_format!("unsupported flags {:#x}", flag & !mirror);
|
2019-09-24 17:28:00 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
let path_bytes = this
|
2019-10-17 21:11:50 -05:00
|
|
|
.memory
|
2019-09-24 17:28:00 -05:00
|
|
|
.read_c_str(this.read_scalar(path_op)?.not_undef()?)?;
|
|
|
|
let path = std::str::from_utf8(path_bytes)
|
2019-10-01 09:18:55 -05:00
|
|
|
.map_err(|_| err_unsup_format!("{:?} is not a valid utf-8 string", path_bytes))?;
|
2019-09-30 11:46:07 -05:00
|
|
|
|
|
|
|
let fd = options.open(path).map(|file| {
|
2019-09-30 14:07:08 -05:00
|
|
|
let mut fh = &mut this.machine.file_handler;
|
|
|
|
fh.low += 1;
|
2019-10-20 05:20:48 -05:00
|
|
|
fh.handles.insert(fh.low, FileHandle { file }).unwrap_none();
|
2019-09-30 14:07:08 -05:00
|
|
|
fh.low
|
|
|
|
});
|
|
|
|
|
2019-10-16 21:37:35 -05:00
|
|
|
this.set_last_error_from_io_result(fd)
|
2019-09-24 17:28:00 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
fn fcntl(
|
|
|
|
&mut self,
|
|
|
|
fd_op: OpTy<'tcx, Tag>,
|
|
|
|
cmd_op: OpTy<'tcx, Tag>,
|
2019-10-12 20:12:26 -05:00
|
|
|
_arg1_op: Option<OpTy<'tcx, Tag>>,
|
2019-09-24 17:28:00 -05:00
|
|
|
) -> InterpResult<'tcx, i32> {
|
|
|
|
let this = self.eval_context_mut();
|
|
|
|
|
2019-10-14 15:36:15 -05:00
|
|
|
this.check_no_isolation("fcntl")?;
|
2019-09-24 17:28:00 -05:00
|
|
|
|
|
|
|
let fd = this.read_scalar(fd_op)?.to_i32()?;
|
|
|
|
let cmd = this.read_scalar(cmd_op)?.to_i32()?;
|
2019-10-11 12:17:54 -05:00
|
|
|
// We only support getting the flags for a descriptor
|
|
|
|
if cmd == this.eval_libc_i32("F_GETFD")? {
|
2019-10-12 20:12:26 -05:00
|
|
|
// Currently this is the only flag that `F_GETFD` returns. It is OK to just return the
|
|
|
|
// `FD_CLOEXEC` value without checking if the flag is set for the file because `std`
|
|
|
|
// always sets this flag when opening a file. However we still need to check that the
|
|
|
|
// file itself is open.
|
2019-10-14 16:42:29 -05:00
|
|
|
let fd_cloexec = this.eval_libc_i32("FD_CLOEXEC")?;
|
|
|
|
this.get_handle_and(fd, |_| Ok(fd_cloexec))
|
2019-09-24 17:28:00 -05:00
|
|
|
} else {
|
2019-10-11 12:17:54 -05:00
|
|
|
throw_unsup_format!("The {:#x} command is not supported for `fcntl`)", cmd);
|
2019-09-24 17:28:00 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
fn close(&mut self, fd_op: OpTy<'tcx, Tag>) -> InterpResult<'tcx, i32> {
|
|
|
|
let this = self.eval_context_mut();
|
|
|
|
|
2019-10-14 15:36:15 -05:00
|
|
|
this.check_no_isolation("close")?;
|
2019-09-24 17:28:00 -05:00
|
|
|
|
|
|
|
let fd = this.read_scalar(fd_op)?.to_i32()?;
|
|
|
|
|
2019-10-01 13:48:59 -05:00
|
|
|
this.remove_handle_and(fd, |handle, this| {
|
2019-10-16 21:37:35 -05:00
|
|
|
this.set_last_error_from_io_result(handle.file.sync_all().map(|_| 0i32))
|
2019-10-01 13:48:59 -05:00
|
|
|
})
|
2019-09-24 17:28:00 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
fn read(
|
|
|
|
&mut self,
|
|
|
|
fd_op: OpTy<'tcx, Tag>,
|
|
|
|
buf_op: OpTy<'tcx, Tag>,
|
|
|
|
count_op: OpTy<'tcx, Tag>,
|
|
|
|
) -> InterpResult<'tcx, i64> {
|
|
|
|
let this = self.eval_context_mut();
|
|
|
|
|
2019-10-14 15:36:15 -05:00
|
|
|
this.check_no_isolation("read")?;
|
2019-09-24 17:28:00 -05:00
|
|
|
|
2019-10-02 08:50:32 -05:00
|
|
|
let count = this.read_scalar(count_op)?.to_usize(&*this.tcx)?;
|
|
|
|
// Reading zero bytes should not change `buf`
|
|
|
|
if count == 0 {
|
|
|
|
return Ok(0);
|
|
|
|
}
|
2019-09-24 17:28:00 -05:00
|
|
|
let fd = this.read_scalar(fd_op)?.to_i32()?;
|
2019-10-02 08:43:23 -05:00
|
|
|
let buf_scalar = this.read_scalar(buf_op)?.not_undef()?;
|
2019-09-24 17:28:00 -05:00
|
|
|
|
2019-09-30 14:21:45 -05:00
|
|
|
// Remove the file handle to avoid borrowing issues
|
2019-10-01 13:48:59 -05:00
|
|
|
this.remove_handle_and(fd, |mut handle, this| {
|
|
|
|
// Don't use `?` to avoid returning before reinserting the handle
|
2019-10-02 08:50:32 -05:00
|
|
|
let bytes = this.force_ptr(buf_scalar).and_then(|buf| {
|
2019-10-17 21:11:50 -05:00
|
|
|
this.memory
|
2019-10-02 08:50:32 -05:00
|
|
|
.get_mut(buf.alloc_id)?
|
2019-10-18 04:33:12 -05:00
|
|
|
.get_bytes_mut(&*this.tcx, buf, Size::from_bytes(count))
|
2019-10-02 08:50:32 -05:00
|
|
|
.map(|buffer| handle.file.read(buffer))
|
|
|
|
});
|
2019-10-01 13:48:59 -05:00
|
|
|
// Reinsert the file handle
|
2019-10-20 05:20:48 -05:00
|
|
|
this.machine.file_handler.handles.insert(fd, handle).unwrap_none();
|
2019-10-16 21:37:35 -05:00
|
|
|
this.set_last_error_from_io_result(bytes?.map(|bytes| bytes as i64))
|
2019-10-01 13:48:59 -05:00
|
|
|
})
|
2019-09-30 15:18:23 -05:00
|
|
|
}
|
|
|
|
|
2019-09-30 11:46:07 -05:00
|
|
|
fn write(
|
|
|
|
&mut self,
|
|
|
|
fd_op: OpTy<'tcx, Tag>,
|
|
|
|
buf_op: OpTy<'tcx, Tag>,
|
|
|
|
count_op: OpTy<'tcx, Tag>,
|
|
|
|
) -> InterpResult<'tcx, i64> {
|
|
|
|
let this = self.eval_context_mut();
|
|
|
|
|
2019-10-14 15:36:15 -05:00
|
|
|
this.check_no_isolation("write")?;
|
2019-09-30 11:46:07 -05:00
|
|
|
|
2019-10-02 08:50:32 -05:00
|
|
|
let count = this.read_scalar(count_op)?.to_usize(&*this.tcx)?;
|
|
|
|
// Writing zero bytes should not change `buf`
|
|
|
|
if count == 0 {
|
|
|
|
return Ok(0);
|
|
|
|
}
|
2019-09-30 11:46:07 -05:00
|
|
|
let fd = this.read_scalar(fd_op)?.to_i32()?;
|
|
|
|
let buf = this.force_ptr(this.read_scalar(buf_op)?.not_undef()?)?;
|
|
|
|
|
|
|
|
this.remove_handle_and(fd, |mut handle, this| {
|
2019-10-17 21:11:50 -05:00
|
|
|
let bytes = this.memory.get(buf.alloc_id).and_then(|alloc| {
|
2019-10-01 13:48:59 -05:00
|
|
|
alloc
|
2019-10-18 04:33:12 -05:00
|
|
|
.get_bytes(&*this.tcx, buf, Size::from_bytes(count))
|
2019-10-01 13:48:59 -05:00
|
|
|
.map(|bytes| handle.file.write(bytes).map(|bytes| bytes as i64))
|
|
|
|
});
|
2019-10-20 05:20:48 -05:00
|
|
|
this.machine.file_handler.handles.insert(fd, handle).unwrap_none();
|
2019-10-16 21:37:35 -05:00
|
|
|
this.set_last_error_from_io_result(bytes?)
|
2019-09-30 11:46:07 -05:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2019-10-03 09:33:36 -05:00
|
|
|
fn unlink( &mut self, path_op: OpTy<'tcx, Tag>) -> InterpResult<'tcx, i32> {
|
|
|
|
let this = self.eval_context_mut();
|
|
|
|
|
2019-10-14 15:36:15 -05:00
|
|
|
this.check_no_isolation("unlink")?;
|
2019-10-03 09:33:36 -05:00
|
|
|
|
|
|
|
let path_bytes = this
|
2019-10-17 21:11:50 -05:00
|
|
|
.memory
|
2019-10-03 09:33:36 -05:00
|
|
|
.read_c_str(this.read_scalar(path_op)?.not_undef()?)?;
|
|
|
|
let path = std::str::from_utf8(path_bytes)
|
|
|
|
.map_err(|_| err_unsup_format!("{:?} is not a valid utf-8 string", path_bytes))?;
|
|
|
|
|
|
|
|
let result = remove_file(path).map(|_| 0);
|
|
|
|
|
2019-10-16 21:37:35 -05:00
|
|
|
this.set_last_error_from_io_result(result)
|
2019-10-03 09:33:36 -05:00
|
|
|
}
|
|
|
|
|
2019-10-01 10:31:04 -05:00
|
|
|
/// Helper function that gets a `FileHandle` immutable reference and allows to manipulate it
|
2019-09-30 11:46:07 -05:00
|
|
|
/// using the `f` closure.
|
2019-10-01 10:31:04 -05:00
|
|
|
///
|
2019-10-01 10:57:12 -05:00
|
|
|
/// If the `fd` file descriptor does not correspond to a file, this functions returns `Ok(-1)`
|
2019-10-01 10:31:04 -05:00
|
|
|
/// and sets `Evaluator::last_error` to `libc::EBADF` (invalid file descriptor).
|
|
|
|
///
|
|
|
|
/// This function uses `T: From<i32>` instead of `i32` directly because some IO related
|
|
|
|
/// functions return different integer types (like `read`, that returns an `i64`)
|
2019-10-01 09:18:55 -05:00
|
|
|
fn get_handle_and<F, T: From<i32>>(&mut self, fd: i32, f: F) -> InterpResult<'tcx, T>
|
2019-09-30 15:18:23 -05:00
|
|
|
where
|
|
|
|
F: Fn(&FileHandle) -> InterpResult<'tcx, T>,
|
|
|
|
{
|
|
|
|
let this = self.eval_context_mut();
|
|
|
|
if let Some(handle) = this.machine.file_handler.handles.get(&fd) {
|
|
|
|
f(handle)
|
|
|
|
} else {
|
2019-10-03 10:21:55 -05:00
|
|
|
let ebadf = this.eval_libc("EBADF")?;
|
|
|
|
this.set_last_error(ebadf)?;
|
2019-10-01 09:18:55 -05:00
|
|
|
Ok((-1).into())
|
2019-09-30 15:18:23 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-10-01 10:31:04 -05:00
|
|
|
/// Helper function that removes a `FileHandle` and allows to manipulate it using the `f`
|
|
|
|
/// closure. This function is quite useful when you need to modify a `FileHandle` but you need
|
|
|
|
/// to modify `MiriEvalContext` at the same time, so you can modify the handle and reinsert it
|
|
|
|
/// using `f`.
|
|
|
|
///
|
2019-10-01 10:57:12 -05:00
|
|
|
/// If the `fd` file descriptor does not correspond to a file, this functions returns `Ok(-1)`
|
2019-10-01 10:31:04 -05:00
|
|
|
/// and sets `Evaluator::last_error` to `libc::EBADF` (invalid file descriptor).
|
|
|
|
///
|
|
|
|
/// This function uses `T: From<i32>` instead of `i32` directly because some IO related
|
|
|
|
/// functions return different integer types (like `read`, that returns an `i64`)
|
2019-10-01 09:18:55 -05:00
|
|
|
fn remove_handle_and<F, T: From<i32>>(&mut self, fd: i32, mut f: F) -> InterpResult<'tcx, T>
|
2019-09-30 15:18:23 -05:00
|
|
|
where
|
|
|
|
F: FnMut(FileHandle, &mut MiriEvalContext<'mir, 'tcx>) -> InterpResult<'tcx, T>,
|
|
|
|
{
|
|
|
|
let this = self.eval_context_mut();
|
|
|
|
if let Some(handle) = this.machine.file_handler.handles.remove(&fd) {
|
|
|
|
f(handle, this)
|
2019-09-24 17:28:00 -05:00
|
|
|
} else {
|
2019-10-03 10:21:55 -05:00
|
|
|
let ebadf = this.eval_libc("EBADF")?;
|
|
|
|
this.set_last_error(ebadf)?;
|
2019-10-01 09:18:55 -05:00
|
|
|
Ok((-1).into())
|
2019-09-30 14:07:08 -05:00
|
|
|
}
|
|
|
|
}
|
2019-09-24 17:28:00 -05:00
|
|
|
}
|