2017-07-21 10:25:30 -05:00
|
|
|
#![feature(
|
|
|
|
rustc_private,
|
2017-12-14 04:03:55 -06:00
|
|
|
catch_expr,
|
2017-07-21 10:25:30 -05:00
|
|
|
)]
|
|
|
|
|
2018-07-10 10:32:38 -05:00
|
|
|
#![cfg_attr(feature = "cargo-clippy", allow(cast_lossless))]
|
|
|
|
|
2017-07-21 10:25:30 -05:00
|
|
|
#[macro_use]
|
|
|
|
extern crate log;
|
2018-01-06 09:21:24 -06:00
|
|
|
|
|
|
|
// From rustc.
|
2017-07-25 04:32:48 -05:00
|
|
|
#[macro_use]
|
2017-07-21 10:25:30 -05:00
|
|
|
extern crate rustc;
|
2017-12-14 04:03:55 -06:00
|
|
|
extern crate rustc_data_structures;
|
2018-05-03 17:29:13 -05:00
|
|
|
extern crate rustc_mir;
|
2018-05-01 11:13:22 -05:00
|
|
|
extern crate rustc_target;
|
2017-07-21 10:25:30 -05:00
|
|
|
extern crate syntax;
|
|
|
|
|
2017-07-24 08:19:32 -05:00
|
|
|
use rustc::ty::{self, TyCtxt};
|
2018-05-20 04:26:40 -05:00
|
|
|
use rustc::ty::layout::{TyLayout, LayoutOf, Size};
|
2018-03-23 06:18:33 -05:00
|
|
|
use rustc::ty::subst::Subst;
|
2017-07-24 08:19:32 -05:00
|
|
|
use rustc::hir::def_id::DefId;
|
2017-07-21 10:25:30 -05:00
|
|
|
use rustc::mir;
|
2017-07-21 06:39:06 -05:00
|
|
|
|
2018-06-29 14:48:55 -05:00
|
|
|
use rustc_data_structures::fx::FxHasher;
|
|
|
|
|
2017-08-29 05:24:58 -05:00
|
|
|
use syntax::ast::Mutability;
|
2018-08-20 09:27:23 -05:00
|
|
|
use syntax::source_map::Span;
|
2017-07-28 02:52:19 -05:00
|
|
|
|
2018-08-15 14:01:40 -05:00
|
|
|
use std::marker::PhantomData;
|
2017-08-10 10:48:38 -05:00
|
|
|
use std::collections::{HashMap, BTreeMap};
|
2018-06-29 14:48:55 -05:00
|
|
|
use std::hash::{Hash, Hasher};
|
2017-07-21 10:25:30 -05:00
|
|
|
|
2017-10-05 05:31:47 -05:00
|
|
|
pub use rustc::mir::interpret::*;
|
2017-12-14 04:03:55 -06:00
|
|
|
pub use rustc_mir::interpret::*;
|
2017-07-21 10:25:30 -05:00
|
|
|
|
2017-07-28 02:52:19 -05:00
|
|
|
mod fn_call;
|
2017-07-25 04:32:48 -05:00
|
|
|
mod operator;
|
2017-07-28 06:08:27 -05:00
|
|
|
mod intrinsic;
|
|
|
|
mod helpers;
|
2017-07-28 09:48:43 -05:00
|
|
|
mod memory;
|
2017-07-31 06:30:44 -05:00
|
|
|
mod tls;
|
2017-12-14 04:03:55 -06:00
|
|
|
mod locks;
|
|
|
|
mod range_map;
|
2017-07-24 08:19:32 -05:00
|
|
|
|
2017-07-28 02:52:19 -05:00
|
|
|
use fn_call::EvalContextExt as MissingFnsEvalContextExt;
|
2017-07-25 04:32:48 -05:00
|
|
|
use operator::EvalContextExt as OperatorEvalContextExt;
|
2017-07-28 06:08:27 -05:00
|
|
|
use intrinsic::EvalContextExt as IntrinsicEvalContextExt;
|
2017-08-01 04:11:57 -05:00
|
|
|
use tls::EvalContextExt as TlsEvalContextExt;
|
2017-12-14 04:03:55 -06:00
|
|
|
use locks::LockInfo;
|
|
|
|
use range_map::RangeMap;
|
2018-08-15 14:01:40 -05:00
|
|
|
use helpers::{ScalarExt, FalibleScalarExt};
|
2018-05-26 10:07:34 -05:00
|
|
|
|
2018-06-12 00:30:29 -05:00
|
|
|
pub fn create_ecx<'a, 'mir: 'a, 'tcx: 'mir>(
|
2017-07-21 10:25:30 -05:00
|
|
|
tcx: TyCtxt<'a, 'tcx, 'tcx>,
|
|
|
|
main_id: DefId,
|
|
|
|
start_wrapper: Option<DefId>,
|
2018-06-11 11:49:17 -05:00
|
|
|
) -> EvalResult<'tcx, (EvalContext<'a, 'mir, 'tcx, Evaluator<'tcx>>, Option<Pointer>)> {
|
2018-07-16 04:42:46 -05:00
|
|
|
let mut ecx = EvalContext::new(
|
2018-08-20 09:27:23 -05:00
|
|
|
tcx.at(syntax::source_map::DUMMY_SP),
|
2018-07-16 04:42:46 -05:00
|
|
|
ty::ParamEnv::reveal_all(),
|
|
|
|
Default::default(),
|
|
|
|
MemoryData::new()
|
|
|
|
);
|
2017-07-21 10:25:30 -05:00
|
|
|
|
2018-06-11 11:49:17 -05:00
|
|
|
let main_instance = ty::Instance::mono(ecx.tcx.tcx, main_id);
|
|
|
|
let main_mir = ecx.load_mir(main_instance.def)?;
|
|
|
|
let mut cleanup_ptr = None; // Scalar to be deallocated when we are done
|
2017-07-21 10:25:30 -05:00
|
|
|
|
2018-06-11 11:49:17 -05:00
|
|
|
if !main_mir.return_ty().is_nil() || main_mir.arg_count != 0 {
|
|
|
|
return err!(Unimplemented(
|
|
|
|
"miri does not support main functions without `fn()` type signatures"
|
|
|
|
.to_owned(),
|
|
|
|
));
|
|
|
|
}
|
2018-08-07 08:22:11 -05:00
|
|
|
let ptr_size = ecx.memory.pointer_size();
|
2017-07-21 10:25:30 -05:00
|
|
|
|
2018-06-11 11:49:17 -05:00
|
|
|
if let Some(start_id) = start_wrapper {
|
|
|
|
let main_ret_ty = ecx.tcx.fn_sig(main_id).output();
|
|
|
|
let main_ret_ty = main_ret_ty.no_late_bound_regions().unwrap();
|
|
|
|
let start_instance = ty::Instance::resolve(
|
|
|
|
ecx.tcx.tcx,
|
|
|
|
ty::ParamEnv::reveal_all(),
|
|
|
|
start_id,
|
|
|
|
ecx.tcx.mk_substs(
|
|
|
|
::std::iter::once(ty::subst::Kind::from(main_ret_ty)))
|
|
|
|
).unwrap();
|
|
|
|
let start_mir = ecx.load_mir(start_instance.def)?;
|
|
|
|
|
|
|
|
if start_mir.arg_count != 3 {
|
|
|
|
return err!(AbiViolation(format!(
|
|
|
|
"'start' lang item should have three arguments, but has {}",
|
|
|
|
start_mir.arg_count
|
|
|
|
)));
|
|
|
|
}
|
2017-07-21 10:25:30 -05:00
|
|
|
|
2018-06-11 11:49:17 -05:00
|
|
|
// Return value
|
|
|
|
let size = ecx.tcx.data_layout.pointer_size;
|
|
|
|
let align = ecx.tcx.data_layout.pointer_align;
|
2018-07-02 11:00:36 -05:00
|
|
|
let ret_ptr = ecx.memory_mut().allocate(size, align, MemoryKind::Stack)?;
|
2018-06-11 11:49:17 -05:00
|
|
|
cleanup_ptr = Some(ret_ptr);
|
|
|
|
|
|
|
|
// Push our stack frame
|
|
|
|
ecx.push_stack_frame(
|
|
|
|
start_instance,
|
|
|
|
start_mir.span,
|
|
|
|
start_mir,
|
|
|
|
Place::from_ptr(ret_ptr, align),
|
|
|
|
StackPopCleanup::None,
|
|
|
|
)?;
|
|
|
|
|
|
|
|
let mut args = ecx.frame().mir.args_iter();
|
|
|
|
|
|
|
|
// First argument: pointer to main()
|
|
|
|
let main_ptr = ecx.memory_mut().create_fn_alloc(main_instance);
|
|
|
|
let dest = ecx.eval_place(&mir::Place::Local(args.next().unwrap()))?;
|
2018-08-15 14:01:40 -05:00
|
|
|
ecx.write_scalar(Scalar::Ptr(main_ptr), dest)?;
|
2018-06-11 11:49:17 -05:00
|
|
|
|
|
|
|
// Second argument (argc): 1
|
|
|
|
let dest = ecx.eval_place(&mir::Place::Local(args.next().unwrap()))?;
|
2018-08-15 14:01:40 -05:00
|
|
|
ecx.write_scalar(Scalar::from_int(1, dest.layout.size), dest)?;
|
2018-06-11 11:49:17 -05:00
|
|
|
|
|
|
|
// FIXME: extract main source file path
|
|
|
|
// Third argument (argv): &[b"foo"]
|
|
|
|
let dest = ecx.eval_place(&mir::Place::Local(args.next().unwrap()))?;
|
|
|
|
let foo = ecx.memory.allocate_bytes(b"foo\0");
|
2018-08-15 14:01:40 -05:00
|
|
|
let foo_ty = ecx.tcx.mk_imm_ptr(ecx.tcx.types.u8);
|
|
|
|
let foo_layout = ecx.layout_of(foo_ty)?;
|
|
|
|
let foo_place = ecx.allocate(foo_layout, MemoryKind::Stack)?;
|
|
|
|
ecx.write_scalar(Scalar::Ptr(foo), foo_place.into())?;
|
|
|
|
ecx.memory.mark_static_initialized(foo_place.to_ptr()?.alloc_id, Mutability::Immutable)?;
|
|
|
|
ecx.write_scalar(foo_place.ptr, dest)?;
|
2018-06-11 11:49:17 -05:00
|
|
|
|
|
|
|
assert!(args.next().is_none(), "start lang item has more arguments than expected");
|
|
|
|
} else {
|
|
|
|
ecx.push_stack_frame(
|
|
|
|
main_instance,
|
|
|
|
main_mir.span,
|
|
|
|
main_mir,
|
2018-08-07 08:22:11 -05:00
|
|
|
Place::from_scalar_ptr(Scalar::from_int(1, ptr_size).into(), ty::layout::Align::from_bytes(1, 1).unwrap()),
|
2018-06-11 11:49:17 -05:00
|
|
|
StackPopCleanup::None,
|
|
|
|
)?;
|
|
|
|
|
|
|
|
// No arguments
|
|
|
|
let mut args = ecx.frame().mir.args_iter();
|
|
|
|
assert!(args.next().is_none(), "main function must not have arguments");
|
|
|
|
}
|
2017-09-25 08:55:21 -05:00
|
|
|
|
2018-06-11 11:49:17 -05:00
|
|
|
Ok((ecx, cleanup_ptr))
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn eval_main<'a, 'tcx: 'a>(
|
|
|
|
tcx: TyCtxt<'a, 'tcx, 'tcx>,
|
|
|
|
main_id: DefId,
|
|
|
|
start_wrapper: Option<DefId>,
|
|
|
|
) {
|
|
|
|
let (mut ecx, cleanup_ptr) = create_ecx(tcx, main_id, start_wrapper).expect("Couldn't create ecx");
|
2017-07-21 10:25:30 -05:00
|
|
|
|
2018-06-11 11:49:17 -05:00
|
|
|
let res: EvalResult = do catch {
|
2017-07-21 10:25:30 -05:00
|
|
|
while ecx.step()? {}
|
2017-08-01 04:11:57 -05:00
|
|
|
ecx.run_tls_dtors()?;
|
2017-07-21 10:25:30 -05:00
|
|
|
if let Some(cleanup_ptr) = cleanup_ptr {
|
2017-08-10 10:48:38 -05:00
|
|
|
ecx.memory_mut().deallocate(
|
|
|
|
cleanup_ptr,
|
|
|
|
None,
|
|
|
|
MemoryKind::Stack,
|
|
|
|
)?;
|
2017-07-21 10:25:30 -05:00
|
|
|
}
|
2018-06-11 11:49:17 -05:00
|
|
|
};
|
2017-07-21 10:25:30 -05:00
|
|
|
|
2018-06-11 11:49:17 -05:00
|
|
|
match res {
|
2017-07-21 10:25:30 -05:00
|
|
|
Ok(()) => {
|
|
|
|
let leaks = ecx.memory().leak_report();
|
|
|
|
if leaks != 0 {
|
2018-05-09 12:24:25 -05:00
|
|
|
// TODO: Prevent leaks which aren't supposed to be there
|
2018-03-23 06:18:33 -05:00
|
|
|
//tcx.sess.err("the evaluated program leaked memory");
|
2017-07-21 10:25:30 -05:00
|
|
|
}
|
|
|
|
}
|
2018-06-10 04:23:56 -05:00
|
|
|
Err(e) => {
|
|
|
|
if let Some(frame) = ecx.stack().last() {
|
|
|
|
let block = &frame.mir.basic_blocks()[frame.block];
|
|
|
|
let span = if frame.stmt < block.statements.len() {
|
|
|
|
block.statements[frame.stmt].source_info.span
|
|
|
|
} else {
|
|
|
|
block.terminator().source_info.span
|
|
|
|
};
|
|
|
|
|
2018-07-15 04:21:56 -05:00
|
|
|
let e = e.to_string();
|
|
|
|
let msg = format!("constant evaluation error: {}", e);
|
|
|
|
let mut err = struct_error(ecx.tcx.tcx.at(span), msg.as_str());
|
2018-06-10 04:23:56 -05:00
|
|
|
let (frames, span) = ecx.generate_stacktrace(None);
|
2018-07-15 04:21:56 -05:00
|
|
|
err.span_label(span, e);
|
2018-07-02 11:00:36 -05:00
|
|
|
for FrameInfo { span, location, .. } in frames {
|
2018-06-10 04:23:56 -05:00
|
|
|
err.span_note(span, &format!("inside call to `{}`", location));
|
|
|
|
}
|
|
|
|
err.emit();
|
|
|
|
} else {
|
|
|
|
ecx.tcx.sess.err(&e.to_string());
|
|
|
|
}
|
|
|
|
|
2018-05-07 11:03:28 -05:00
|
|
|
for (i, frame) in ecx.stack().iter().enumerate() {
|
|
|
|
trace!("-------------------");
|
|
|
|
trace!("Frame {}", i);
|
|
|
|
trace!(" return: {:#?}", frame.return_place);
|
|
|
|
for (i, local) in frame.locals.iter().enumerate() {
|
2018-08-07 08:22:11 -05:00
|
|
|
if let Ok(local) = local.access() {
|
2018-05-07 11:03:28 -05:00
|
|
|
trace!(" local {}: {:?}", i, local);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2017-07-21 10:25:30 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-06-29 14:48:55 -05:00
|
|
|
#[derive(Clone, Default, PartialEq, Eq)]
|
2017-12-14 04:03:55 -06:00
|
|
|
pub struct Evaluator<'tcx> {
|
2017-07-21 10:25:30 -05:00
|
|
|
/// Environment variables set by `setenv`
|
|
|
|
/// Miri does not expose env vars from the host to the emulated program
|
2018-05-26 10:07:34 -05:00
|
|
|
pub(crate) env_vars: HashMap<Vec<u8>, Pointer>,
|
2017-12-14 04:03:55 -06:00
|
|
|
|
2018-08-15 14:01:40 -05:00
|
|
|
/// Use the lifetime
|
|
|
|
_dummy : PhantomData<&'tcx ()>,
|
2017-07-21 10:25:30 -05:00
|
|
|
}
|
|
|
|
|
2018-06-29 14:48:55 -05:00
|
|
|
impl<'tcx> Hash for Evaluator<'tcx> {
|
|
|
|
fn hash<H: Hasher>(&self, state: &mut H) {
|
|
|
|
let Evaluator {
|
|
|
|
env_vars,
|
2018-08-15 14:01:40 -05:00
|
|
|
_dummy: _,
|
2018-06-29 14:48:55 -05:00
|
|
|
} = self;
|
|
|
|
|
|
|
|
env_vars.iter()
|
|
|
|
.map(|(env, ptr)| {
|
|
|
|
let mut h = FxHasher::default();
|
|
|
|
env.hash(&mut h);
|
|
|
|
ptr.hash(&mut h);
|
|
|
|
h.finish()
|
|
|
|
})
|
|
|
|
.fold(0u64, |acc, hash| acc.wrapping_add(hash))
|
|
|
|
.hash(state);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-05-30 08:59:04 -05:00
|
|
|
pub type TlsKey = u128;
|
2017-07-21 10:25:30 -05:00
|
|
|
|
2018-06-29 14:48:55 -05:00
|
|
|
#[derive(Copy, Clone, Debug, Hash, PartialEq, Eq)]
|
2017-07-21 10:25:30 -05:00
|
|
|
pub struct TlsEntry<'tcx> {
|
2018-05-26 10:07:34 -05:00
|
|
|
data: Scalar, // Will eventually become a map from thread IDs to `Scalar`s, if we ever support more than one thread.
|
2017-07-21 10:25:30 -05:00
|
|
|
dtor: Option<ty::Instance<'tcx>>,
|
|
|
|
}
|
|
|
|
|
2018-07-16 04:42:46 -05:00
|
|
|
#[derive(Clone, PartialEq, Eq)]
|
2017-08-28 07:08:10 -05:00
|
|
|
pub struct MemoryData<'tcx> {
|
2017-07-21 10:25:30 -05:00
|
|
|
/// The Key to use for the next thread-local allocation.
|
|
|
|
next_thread_local: TlsKey,
|
|
|
|
|
|
|
|
/// pthreads-style thread-local storage.
|
|
|
|
thread_local: BTreeMap<TlsKey, TlsEntry<'tcx>>,
|
2017-12-14 04:03:55 -06:00
|
|
|
|
|
|
|
/// Memory regions that are locked by some function
|
|
|
|
///
|
|
|
|
/// Only mutable (static mut, heap, stack) allocations have an entry in this map.
|
|
|
|
/// The entry is created when allocating the memory and deleted after deallocation.
|
2018-01-14 21:31:59 -06:00
|
|
|
locks: HashMap<AllocId, RangeMap<LockInfo<'tcx>>>,
|
2018-03-23 06:06:32 -05:00
|
|
|
|
2018-04-07 04:43:46 -05:00
|
|
|
statics: HashMap<GlobalId<'tcx>, AllocId>,
|
2017-07-21 10:25:30 -05:00
|
|
|
}
|
|
|
|
|
2018-07-16 04:42:46 -05:00
|
|
|
impl<'tcx> MemoryData<'tcx> {
|
|
|
|
fn new() -> Self {
|
|
|
|
MemoryData {
|
|
|
|
next_thread_local: 1, // start with 1 as we must not use 0 on Windows
|
|
|
|
thread_local: BTreeMap::new(),
|
|
|
|
locks: HashMap::new(),
|
|
|
|
statics: HashMap::new(),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-06-29 14:48:55 -05:00
|
|
|
impl<'tcx> Hash for MemoryData<'tcx> {
|
|
|
|
fn hash<H: Hasher>(&self, state: &mut H) {
|
|
|
|
let MemoryData {
|
|
|
|
next_thread_local: _,
|
|
|
|
thread_local,
|
|
|
|
locks: _,
|
|
|
|
statics: _,
|
|
|
|
} = self;
|
|
|
|
|
|
|
|
thread_local.hash(state);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-01-14 11:59:13 -06:00
|
|
|
impl<'mir, 'tcx: 'mir> Machine<'mir, 'tcx> for Evaluator<'tcx> {
|
2017-07-21 10:25:30 -05:00
|
|
|
type MemoryData = MemoryData<'tcx>;
|
2017-08-09 07:53:22 -05:00
|
|
|
type MemoryKinds = memory::MemoryKind;
|
2017-07-28 02:52:19 -05:00
|
|
|
|
2017-07-21 10:25:30 -05:00
|
|
|
/// Returns Ok() when the function was handled, fail otherwise
|
2017-07-28 02:52:19 -05:00
|
|
|
fn eval_fn_call<'a>(
|
2018-01-14 11:59:13 -06:00
|
|
|
ecx: &mut EvalContext<'a, 'mir, 'tcx, Self>,
|
2017-07-21 10:25:30 -05:00
|
|
|
instance: ty::Instance<'tcx>,
|
2018-08-15 14:01:40 -05:00
|
|
|
destination: Option<(PlaceTy<'tcx>, mir::BasicBlock)>,
|
|
|
|
args: &[OpTy<'tcx>],
|
2017-07-28 02:52:19 -05:00
|
|
|
span: Span,
|
|
|
|
) -> EvalResult<'tcx, bool> {
|
2018-08-15 14:01:40 -05:00
|
|
|
ecx.eval_fn_call(instance, destination, args, span)
|
2017-07-21 10:25:30 -05:00
|
|
|
}
|
2017-07-28 02:52:19 -05:00
|
|
|
|
2017-07-28 06:08:27 -05:00
|
|
|
fn call_intrinsic<'a>(
|
2018-01-14 11:59:13 -06:00
|
|
|
ecx: &mut rustc_mir::interpret::EvalContext<'a, 'mir, 'tcx, Self>,
|
2017-07-28 06:08:27 -05:00
|
|
|
instance: ty::Instance<'tcx>,
|
2018-08-15 14:01:40 -05:00
|
|
|
args: &[OpTy<'tcx>],
|
|
|
|
dest: PlaceTy<'tcx>,
|
2017-07-28 06:08:27 -05:00
|
|
|
target: mir::BasicBlock,
|
|
|
|
) -> EvalResult<'tcx> {
|
2018-08-15 14:01:40 -05:00
|
|
|
ecx.call_intrinsic(instance, args, dest, target)
|
2017-07-28 06:08:27 -05:00
|
|
|
}
|
|
|
|
|
2017-08-01 04:11:57 -05:00
|
|
|
fn try_ptr_op<'a>(
|
2018-01-14 11:59:13 -06:00
|
|
|
ecx: &rustc_mir::interpret::EvalContext<'a, 'mir, 'tcx, Self>,
|
2017-07-25 04:32:48 -05:00
|
|
|
bin_op: mir::BinOp,
|
2018-05-26 10:07:34 -05:00
|
|
|
left: Scalar,
|
2018-08-15 14:01:40 -05:00
|
|
|
left_layout: TyLayout<'tcx>,
|
2018-05-26 10:07:34 -05:00
|
|
|
right: Scalar,
|
2018-08-15 14:01:40 -05:00
|
|
|
right_layout: TyLayout<'tcx>,
|
2018-05-26 10:07:34 -05:00
|
|
|
) -> EvalResult<'tcx, Option<(Scalar, bool)>> {
|
2018-08-15 14:01:40 -05:00
|
|
|
ecx.ptr_op(bin_op, left, left_layout, right, right_layout)
|
2017-07-25 04:32:48 -05:00
|
|
|
}
|
2017-07-28 09:48:43 -05:00
|
|
|
|
2018-01-14 11:59:13 -06:00
|
|
|
fn mark_static_initialized<'a>(
|
2018-04-07 04:43:46 -05:00
|
|
|
mem: &mut Memory<'a, 'mir, 'tcx, Self>,
|
|
|
|
id: AllocId,
|
2018-01-14 11:59:13 -06:00
|
|
|
_mutability: Mutability,
|
|
|
|
) -> EvalResult<'tcx, bool> {
|
2018-04-07 04:43:46 -05:00
|
|
|
use memory::MemoryKind::*;
|
|
|
|
match mem.get_alloc_kind(id) {
|
2017-07-28 09:48:43 -05:00
|
|
|
// FIXME: This could be allowed, but not for env vars set during miri execution
|
2018-04-07 04:43:46 -05:00
|
|
|
Some(MemoryKind::Machine(Env)) => err!(Unimplemented("statics can't refer to env vars".to_owned())),
|
2018-01-14 11:59:13 -06:00
|
|
|
_ => Ok(false), // TODO: What does the bool mean?
|
2018-04-07 04:43:46 -05:00
|
|
|
}
|
2018-01-14 11:59:13 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
fn init_static<'a>(
|
|
|
|
ecx: &mut EvalContext<'a, 'mir, 'tcx, Self>,
|
|
|
|
cid: GlobalId<'tcx>,
|
|
|
|
) -> EvalResult<'tcx, AllocId> {
|
2018-04-04 08:54:40 -05:00
|
|
|
// Step 1: If the static has already been evaluated return the cached version
|
2018-04-07 04:43:46 -05:00
|
|
|
if let Some(alloc_id) = ecx.memory.data.statics.get(&cid) {
|
2018-03-23 06:18:33 -05:00
|
|
|
return Ok(*alloc_id);
|
2018-03-23 06:06:32 -05:00
|
|
|
}
|
2018-03-23 06:18:33 -05:00
|
|
|
|
|
|
|
let tcx = ecx.tcx.tcx;
|
|
|
|
|
2018-04-04 08:54:40 -05:00
|
|
|
// Step 2: Load mir
|
2018-03-23 06:18:33 -05:00
|
|
|
let mut mir = ecx.load_mir(cid.instance.def)?;
|
|
|
|
if let Some(index) = cid.promoted {
|
|
|
|
mir = &mir.promoted[index];
|
|
|
|
}
|
|
|
|
assert!(mir.arg_count == 0);
|
|
|
|
|
2018-04-04 08:54:40 -05:00
|
|
|
// Step 3: Allocate storage
|
2018-03-23 06:06:32 -05:00
|
|
|
let layout = ecx.layout_of(mir.return_ty().subst(tcx, cid.instance.substs))?;
|
2018-03-23 06:18:33 -05:00
|
|
|
assert!(!layout.is_unsized());
|
|
|
|
let ptr = ecx.memory.allocate(
|
2018-05-20 04:26:40 -05:00
|
|
|
layout.size,
|
2018-03-23 06:06:32 -05:00
|
|
|
layout.align,
|
2018-07-02 11:00:36 -05:00
|
|
|
MemoryKind::Stack,
|
2018-03-23 06:06:32 -05:00
|
|
|
)?;
|
2018-03-23 06:18:33 -05:00
|
|
|
|
2018-04-04 08:54:40 -05:00
|
|
|
// Step 4: Cache allocation id for recursive statics
|
2018-04-07 04:43:46 -05:00
|
|
|
assert!(ecx.memory.data.statics.insert(cid, ptr.alloc_id).is_none());
|
2018-03-23 06:18:33 -05:00
|
|
|
|
2018-04-04 08:54:40 -05:00
|
|
|
// Step 5: Push stackframe to evaluate static
|
2018-03-23 06:18:33 -05:00
|
|
|
let cleanup = StackPopCleanup::None;
|
|
|
|
ecx.push_stack_frame(
|
|
|
|
cid.instance,
|
|
|
|
mir.span,
|
|
|
|
mir,
|
|
|
|
Place::from_ptr(ptr, layout.align),
|
|
|
|
cleanup,
|
|
|
|
)?;
|
|
|
|
|
2018-04-04 08:54:40 -05:00
|
|
|
// Step 6: Step until static has been initialized
|
|
|
|
let call_stackframe = ecx.stack().len();
|
|
|
|
while ecx.step()? && ecx.stack().len() >= call_stackframe {
|
|
|
|
if ecx.stack().len() == call_stackframe {
|
2018-08-15 14:01:40 -05:00
|
|
|
let cleanup = {
|
|
|
|
let frame = ecx.frame();
|
|
|
|
let bb = &frame.mir.basic_blocks()[frame.block];
|
|
|
|
bb.statements.len() == frame.stmt && !bb.is_cleanup &&
|
|
|
|
if let ::rustc::mir::TerminatorKind::Return = bb.terminator().kind { true } else { false }
|
|
|
|
};
|
|
|
|
if cleanup {
|
|
|
|
for (local, _local_decl) in mir.local_decls.iter_enumerated().skip(1) {
|
|
|
|
// Don't deallocate locals, because the return value might reference them
|
|
|
|
ecx.storage_dead(local);
|
2018-04-04 08:54:40 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2018-03-23 06:18:33 -05:00
|
|
|
|
2018-04-07 04:43:46 -05:00
|
|
|
// TODO: Freeze immutable statics without copying them to the global static cache
|
|
|
|
|
2018-04-04 08:54:40 -05:00
|
|
|
// Step 7: Return the alloc
|
2018-03-23 06:18:33 -05:00
|
|
|
Ok(ptr.alloc_id)
|
2017-07-28 09:48:43 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
fn box_alloc<'a>(
|
2018-01-14 11:59:13 -06:00
|
|
|
ecx: &mut EvalContext<'a, 'mir, 'tcx, Self>,
|
2018-08-15 14:01:40 -05:00
|
|
|
dest: PlaceTy<'tcx>,
|
2017-09-25 08:55:21 -05:00
|
|
|
) -> EvalResult<'tcx> {
|
2018-08-15 14:01:40 -05:00
|
|
|
trace!("box_alloc for {:?}", dest.layout.ty);
|
2017-09-25 08:55:21 -05:00
|
|
|
// Call the `exchange_malloc` lang item
|
|
|
|
let malloc = ecx.tcx.lang_items().exchange_malloc_fn().unwrap();
|
2018-01-14 11:59:13 -06:00
|
|
|
let malloc = ty::Instance::mono(ecx.tcx.tcx, malloc);
|
2017-09-25 08:55:21 -05:00
|
|
|
let malloc_mir = ecx.load_mir(malloc.def)?;
|
|
|
|
ecx.push_stack_frame(
|
|
|
|
malloc,
|
|
|
|
malloc_mir.span,
|
|
|
|
malloc_mir,
|
2018-08-15 14:01:40 -05:00
|
|
|
*dest,
|
2017-09-25 08:55:21 -05:00
|
|
|
// Don't do anything when we are done. The statement() function will increment
|
|
|
|
// the old stack frame's stmt counter to the next statement, which means that when
|
|
|
|
// exchange_malloc returns, we go on evaluating exactly where we want to be.
|
|
|
|
StackPopCleanup::None,
|
|
|
|
)?;
|
|
|
|
|
|
|
|
let mut args = ecx.frame().mir.args_iter();
|
2018-08-15 14:01:40 -05:00
|
|
|
let layout = ecx.layout_of(dest.layout.ty.builtin_deref(false).unwrap().ty)?;
|
2017-09-25 08:55:21 -05:00
|
|
|
|
|
|
|
// First argument: size
|
2018-08-15 14:01:40 -05:00
|
|
|
// (0 is allowed here, this is expected to be handled by the lang item)
|
|
|
|
let arg = ecx.eval_place(&mir::Place::Local(args.next().unwrap()))?;
|
|
|
|
let size = layout.size.bytes();
|
|
|
|
ecx.write_scalar(Scalar::from_uint(size, arg.layout.size), arg)?;
|
2017-09-25 08:55:21 -05:00
|
|
|
|
|
|
|
// Second argument: align
|
2018-08-15 14:01:40 -05:00
|
|
|
let arg = ecx.eval_place(&mir::Place::Local(args.next().unwrap()))?;
|
|
|
|
let align = layout.align.abi();
|
|
|
|
ecx.write_scalar(Scalar::from_uint(align, arg.layout.size), arg)?;
|
2017-09-25 08:55:21 -05:00
|
|
|
|
|
|
|
// No more arguments
|
|
|
|
assert!(args.next().is_none(), "exchange_malloc lang item has more arguments than expected");
|
|
|
|
Ok(())
|
2017-07-28 09:48:43 -05:00
|
|
|
}
|
2017-09-15 06:02:33 -05:00
|
|
|
|
|
|
|
fn global_item_with_linkage<'a>(
|
2018-04-17 07:26:17 -05:00
|
|
|
_ecx: &mut EvalContext<'a, 'mir, 'tcx, Self>,
|
|
|
|
_instance: ty::Instance<'tcx>,
|
|
|
|
_mutability: Mutability,
|
2017-09-15 06:02:33 -05:00
|
|
|
) -> EvalResult<'tcx> {
|
2018-04-17 07:26:17 -05:00
|
|
|
panic!("remove this function from rustc");
|
2017-09-15 06:02:33 -05:00
|
|
|
}
|
2017-12-14 04:03:55 -06:00
|
|
|
|
|
|
|
fn check_locks<'a>(
|
2018-08-15 14:01:40 -05:00
|
|
|
_mem: &Memory<'a, 'mir, 'tcx, Self>,
|
|
|
|
_ptr: Pointer,
|
|
|
|
_size: Size,
|
|
|
|
_access: AccessKind,
|
2017-12-14 04:03:55 -06:00
|
|
|
) -> EvalResult<'tcx> {
|
2018-08-15 14:01:40 -05:00
|
|
|
Ok(())
|
2017-12-14 04:03:55 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
fn add_lock<'a>(
|
2018-08-15 14:01:40 -05:00
|
|
|
_mem: &mut Memory<'a, 'mir, 'tcx, Self>,
|
|
|
|
_id: AllocId,
|
|
|
|
) { }
|
2017-12-14 04:03:55 -06:00
|
|
|
|
|
|
|
fn free_lock<'a>(
|
2018-08-15 14:01:40 -05:00
|
|
|
_mem: &mut Memory<'a, 'mir, 'tcx, Self>,
|
|
|
|
_id: AllocId,
|
|
|
|
_len: u64,
|
2017-12-14 04:03:55 -06:00
|
|
|
) -> EvalResult<'tcx> {
|
2018-08-15 14:01:40 -05:00
|
|
|
Ok(())
|
2017-12-14 04:03:55 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
fn end_region<'a>(
|
2018-08-15 14:01:40 -05:00
|
|
|
_ecx: &mut EvalContext<'a, 'mir, 'tcx, Self>,
|
|
|
|
_reg: Option<::rustc::middle::region::Scope>,
|
2017-12-14 04:03:55 -06:00
|
|
|
) -> EvalResult<'tcx> {
|
2018-08-15 14:01:40 -05:00
|
|
|
Ok(())
|
2017-12-14 04:03:55 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
fn validation_op<'a>(
|
2018-05-07 03:49:54 -05:00
|
|
|
_ecx: &mut EvalContext<'a, 'mir, 'tcx, Self>,
|
|
|
|
_op: ::rustc::mir::ValidationOp,
|
|
|
|
_operand: &::rustc::mir::ValidationOperand<'tcx, ::rustc::mir::Place<'tcx>>,
|
2017-12-14 04:03:55 -06:00
|
|
|
) -> EvalResult<'tcx> {
|
2018-05-07 03:38:13 -05:00
|
|
|
// FIXME: prevent this from ICEing
|
|
|
|
//ecx.validation_op(op, operand)
|
|
|
|
Ok(())
|
2017-12-14 04:03:55 -06:00
|
|
|
}
|
2017-07-21 10:25:30 -05:00
|
|
|
}
|