2018-11-21 06:40:25 -06:00
|
|
|
#![feature(rustc_private)]
|
2017-07-21 10:25:30 -05:00
|
|
|
|
2018-11-25 08:44:28 -06:00
|
|
|
#![allow(clippy::cast_lossless)]
|
2018-07-10 10:32:38 -05:00
|
|
|
|
2017-07-21 10:25:30 -05:00
|
|
|
#[macro_use]
|
|
|
|
extern crate log;
|
2018-01-06 09:21:24 -06:00
|
|
|
|
|
|
|
// From rustc.
|
2018-10-31 04:19:20 -05:00
|
|
|
extern crate syntax;
|
2017-07-25 04:32:48 -05:00
|
|
|
#[macro_use]
|
2017-07-21 10:25:30 -05:00
|
|
|
extern crate rustc;
|
2017-12-14 04:03:55 -06:00
|
|
|
extern crate rustc_data_structures;
|
2018-05-03 17:29:13 -05:00
|
|
|
extern crate rustc_mir;
|
2018-05-01 11:13:22 -05:00
|
|
|
extern crate rustc_target;
|
2017-07-21 10:25:30 -05:00
|
|
|
|
2018-10-05 11:08:50 -05:00
|
|
|
use std::collections::HashMap;
|
|
|
|
use std::borrow::Cow;
|
2018-10-31 04:09:55 -05:00
|
|
|
use std::env;
|
2018-10-05 11:08:50 -05:00
|
|
|
|
2018-11-05 09:05:17 -06:00
|
|
|
use rustc::ty::{self, TyCtxt, query::TyCtxtAt};
|
2018-05-20 04:26:40 -05:00
|
|
|
use rustc::ty::layout::{TyLayout, LayoutOf, Size};
|
2018-10-18 09:59:08 -05:00
|
|
|
use rustc::hir::{self, def_id::DefId};
|
2017-07-21 10:25:30 -05:00
|
|
|
use rustc::mir;
|
2017-07-21 06:39:06 -05:00
|
|
|
|
2018-08-23 14:22:57 -05:00
|
|
|
use syntax::attr;
|
2018-11-15 02:09:48 -06:00
|
|
|
use syntax::source_map::DUMMY_SP;
|
2017-07-21 10:25:30 -05:00
|
|
|
|
2017-12-14 04:03:55 -06:00
|
|
|
pub use rustc_mir::interpret::*;
|
2018-10-24 10:17:44 -05:00
|
|
|
pub use rustc_mir::interpret::{self, AllocMap, PlaceTy}; // resolve ambiguity
|
2017-07-21 10:25:30 -05:00
|
|
|
|
2017-07-28 02:52:19 -05:00
|
|
|
mod fn_call;
|
2017-07-25 04:32:48 -05:00
|
|
|
mod operator;
|
2017-07-28 06:08:27 -05:00
|
|
|
mod intrinsic;
|
|
|
|
mod helpers;
|
2017-07-31 06:30:44 -05:00
|
|
|
mod tls;
|
2017-12-14 04:03:55 -06:00
|
|
|
mod range_map;
|
2018-10-05 11:08:50 -05:00
|
|
|
mod mono_hash_map;
|
2018-10-16 04:21:38 -05:00
|
|
|
mod stacked_borrows;
|
2017-07-24 08:19:32 -05:00
|
|
|
|
2018-11-27 07:41:53 -06:00
|
|
|
pub use crate::fn_call::EvalContextExt as MissingFnsEvalContextExt;
|
|
|
|
pub use crate::operator::EvalContextExt as OperatorEvalContextExt;
|
|
|
|
pub use crate::intrinsic::EvalContextExt as IntrinsicEvalContextExt;
|
|
|
|
pub use crate::tls::{EvalContextExt as TlsEvalContextExt, TlsData};
|
2018-11-01 02:56:41 -05:00
|
|
|
use crate::range_map::RangeMap;
|
2018-10-19 02:51:04 -05:00
|
|
|
#[allow(unused_imports)] // FIXME rustc bug https://github.com/rust-lang/rust/issues/53682
|
2018-12-11 07:32:59 -06:00
|
|
|
pub use crate::helpers::{EvalContextExt as HelpersEvalContextExt};
|
2018-11-01 02:56:41 -05:00
|
|
|
use crate::mono_hash_map::MonoHashMap;
|
2018-11-27 07:41:53 -06:00
|
|
|
pub use crate::stacked_borrows::{EvalContextExt as StackedBorEvalContextExt};
|
2018-05-26 10:07:34 -05:00
|
|
|
|
2018-10-24 04:39:31 -05:00
|
|
|
// Used by priroda
|
2018-11-05 09:05:17 -06:00
|
|
|
pub use crate::stacked_borrows::{Borrow, Stack, Stacks, BorStackItem};
|
2018-10-24 04:39:31 -05:00
|
|
|
|
2018-11-03 05:39:50 -05:00
|
|
|
/// Insert rustc arguments at the beginning of the argument list that miri wants to be
|
2018-10-24 10:16:41 -05:00
|
|
|
/// set per default, for maximal validation power.
|
2018-11-03 05:03:53 -05:00
|
|
|
pub fn miri_default_args() -> &'static [&'static str] {
|
2018-10-24 10:16:41 -05:00
|
|
|
// The flags here should be kept in sync with what bootstrap adds when `test-miri` is
|
2018-11-25 15:23:54 -06:00
|
|
|
// set, which happens in `bootstrap/bin/rustc.rs` in the rustc sources.
|
2018-11-03 05:03:53 -05:00
|
|
|
&["-Zalways-encode-mir", "-Zmir-emit-retag", "-Zmir-opt-level=0"]
|
2018-10-24 10:16:41 -05:00
|
|
|
}
|
|
|
|
|
2018-10-24 04:39:31 -05:00
|
|
|
// Used by priroda
|
2018-06-12 00:30:29 -05:00
|
|
|
pub fn create_ecx<'a, 'mir: 'a, 'tcx: 'mir>(
|
2017-07-21 10:25:30 -05:00
|
|
|
tcx: TyCtxt<'a, 'tcx, 'tcx>,
|
|
|
|
main_id: DefId,
|
2018-10-11 04:24:22 -05:00
|
|
|
validate: bool,
|
2018-08-23 12:28:48 -05:00
|
|
|
) -> EvalResult<'tcx, EvalContext<'a, 'mir, 'tcx, Evaluator<'tcx>>> {
|
2018-07-16 04:42:46 -05:00
|
|
|
let mut ecx = EvalContext::new(
|
2018-08-20 09:27:23 -05:00
|
|
|
tcx.at(syntax::source_map::DUMMY_SP),
|
2018-07-16 04:42:46 -05:00
|
|
|
ty::ParamEnv::reveal_all(),
|
2018-10-11 04:24:22 -05:00
|
|
|
Evaluator::new(validate),
|
2018-07-16 04:42:46 -05:00
|
|
|
);
|
2017-07-21 10:25:30 -05:00
|
|
|
|
2018-06-11 11:49:17 -05:00
|
|
|
let main_instance = ty::Instance::mono(ecx.tcx.tcx, main_id);
|
|
|
|
let main_mir = ecx.load_mir(main_instance.def)?;
|
2017-07-21 10:25:30 -05:00
|
|
|
|
2018-09-15 03:31:20 -05:00
|
|
|
if !main_mir.return_ty().is_unit() || main_mir.arg_count != 0 {
|
2018-06-11 11:49:17 -05:00
|
|
|
return err!(Unimplemented(
|
|
|
|
"miri does not support main functions without `fn()` type signatures"
|
|
|
|
.to_owned(),
|
|
|
|
));
|
|
|
|
}
|
2017-07-21 10:25:30 -05:00
|
|
|
|
2018-12-10 05:26:20 -06:00
|
|
|
let start_id = tcx.lang_items().start_fn().unwrap();
|
|
|
|
let main_ret_ty = tcx.fn_sig(main_id).output();
|
|
|
|
let main_ret_ty = main_ret_ty.no_bound_vars().unwrap();
|
|
|
|
let start_instance = ty::Instance::resolve(
|
|
|
|
ecx.tcx.tcx,
|
|
|
|
ty::ParamEnv::reveal_all(),
|
|
|
|
start_id,
|
|
|
|
ecx.tcx.mk_substs(
|
|
|
|
::std::iter::once(ty::subst::Kind::from(main_ret_ty)))
|
|
|
|
).unwrap();
|
|
|
|
let start_mir = ecx.load_mir(start_instance.def)?;
|
|
|
|
|
|
|
|
if start_mir.arg_count != 3 {
|
|
|
|
return err!(AbiViolation(format!(
|
|
|
|
"'start' lang item should have three arguments, but has {}",
|
|
|
|
start_mir.arg_count
|
|
|
|
)));
|
2018-06-11 11:49:17 -05:00
|
|
|
}
|
2017-09-25 08:55:21 -05:00
|
|
|
|
2018-12-10 05:26:20 -06:00
|
|
|
// Return value (in static memory so that it does not count as leak)
|
|
|
|
let ret = ecx.layout_of(start_mir.return_ty())?;
|
|
|
|
let ret_ptr = ecx.allocate(ret, MiriMemoryKind::MutStatic.into())?;
|
|
|
|
|
|
|
|
// Push our stack frame
|
|
|
|
ecx.push_stack_frame(
|
|
|
|
start_instance,
|
|
|
|
DUMMY_SP, // there is no call site, we want no span
|
|
|
|
start_mir,
|
|
|
|
Some(ret_ptr.into()),
|
|
|
|
StackPopCleanup::None { cleanup: true },
|
|
|
|
)?;
|
|
|
|
|
|
|
|
let mut args = ecx.frame().mir.args_iter();
|
|
|
|
|
|
|
|
// First argument: pointer to main()
|
|
|
|
let main_ptr = ecx.memory_mut().create_fn_alloc(main_instance).with_default_tag();
|
|
|
|
let dest = ecx.eval_place(&mir::Place::Local(args.next().unwrap()))?;
|
|
|
|
ecx.write_scalar(Scalar::Ptr(main_ptr), dest)?;
|
|
|
|
|
|
|
|
// Second argument (argc): 1
|
|
|
|
let dest = ecx.eval_place(&mir::Place::Local(args.next().unwrap()))?;
|
|
|
|
ecx.write_scalar(Scalar::from_int(1, dest.layout.size), dest)?;
|
|
|
|
|
|
|
|
// FIXME: extract main source file path
|
|
|
|
// Third argument (argv): &[b"foo"]
|
|
|
|
let dest = ecx.eval_place(&mir::Place::Local(args.next().unwrap()))?;
|
|
|
|
let foo = ecx.memory_mut().allocate_static_bytes(b"foo\0").with_default_tag();
|
|
|
|
let foo_ty = ecx.tcx.mk_imm_ptr(ecx.tcx.types.u8);
|
|
|
|
let foo_layout = ecx.layout_of(foo_ty)?;
|
|
|
|
let foo_place = ecx.allocate(foo_layout, MiriMemoryKind::Env.into())?;
|
|
|
|
ecx.write_scalar(Scalar::Ptr(foo), foo_place.into())?;
|
|
|
|
ecx.memory_mut().mark_immutable(foo_place.to_ptr()?.alloc_id)?;
|
|
|
|
ecx.write_scalar(foo_place.ptr, dest)?;
|
|
|
|
|
|
|
|
assert!(args.next().is_none(), "start lang item has more arguments than expected");
|
|
|
|
|
2018-08-23 12:28:48 -05:00
|
|
|
Ok(ecx)
|
2018-06-11 11:49:17 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
pub fn eval_main<'a, 'tcx: 'a>(
|
|
|
|
tcx: TyCtxt<'a, 'tcx, 'tcx>,
|
|
|
|
main_id: DefId,
|
2018-10-11 04:24:22 -05:00
|
|
|
validate: bool,
|
2018-06-11 11:49:17 -05:00
|
|
|
) {
|
2018-10-19 03:07:17 -05:00
|
|
|
let mut ecx = create_ecx(tcx, main_id, validate).expect("Couldn't create ecx");
|
2017-07-21 10:25:30 -05:00
|
|
|
|
2018-10-31 04:09:55 -05:00
|
|
|
// If MIRI_BACKTRACE is set and RUST_CTFE_BACKTRACE is not, set RUST_CTFE_BACKTRACE.
|
|
|
|
// Do this late, so we really only apply this to miri's errors.
|
|
|
|
if let Ok(var) = env::var("MIRI_BACKTRACE") {
|
|
|
|
if env::var("RUST_CTFE_BACKTRACE") == Err(env::VarError::NotPresent) {
|
|
|
|
env::set_var("RUST_CTFE_BACKTRACE", &var);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Run! The main execution.
|
2018-08-24 12:49:57 -05:00
|
|
|
let res: EvalResult = (|| {
|
2018-08-23 12:28:48 -05:00
|
|
|
ecx.run()?;
|
2018-08-24 12:49:57 -05:00
|
|
|
ecx.run_tls_dtors()
|
|
|
|
})();
|
2017-07-21 10:25:30 -05:00
|
|
|
|
2018-10-31 04:09:55 -05:00
|
|
|
// Process the result.
|
2018-06-11 11:49:17 -05:00
|
|
|
match res {
|
2017-07-21 10:25:30 -05:00
|
|
|
Ok(()) => {
|
|
|
|
let leaks = ecx.memory().leak_report();
|
2018-11-15 02:09:48 -06:00
|
|
|
// Disable the leak test on some platforms where we do not
|
2018-08-30 01:57:33 -05:00
|
|
|
// correctly implement TLS destructors.
|
2018-08-30 02:41:57 -05:00
|
|
|
let target_os = ecx.tcx.tcx.sess.target.target.target_os.to_lowercase();
|
|
|
|
let ignore_leaks = target_os == "windows" || target_os == "macos";
|
|
|
|
if !ignore_leaks && leaks != 0 {
|
2018-08-23 12:28:48 -05:00
|
|
|
tcx.sess.err("the evaluated program leaked memory");
|
2017-07-21 10:25:30 -05:00
|
|
|
}
|
|
|
|
}
|
2018-10-31 04:09:55 -05:00
|
|
|
Err(mut e) => {
|
|
|
|
e.print_backtrace();
|
2018-06-10 04:23:56 -05:00
|
|
|
if let Some(frame) = ecx.stack().last() {
|
|
|
|
let block = &frame.mir.basic_blocks()[frame.block];
|
|
|
|
let span = if frame.stmt < block.statements.len() {
|
|
|
|
block.statements[frame.stmt].source_info.span
|
|
|
|
} else {
|
|
|
|
block.terminator().source_info.span
|
|
|
|
};
|
|
|
|
|
2018-07-15 04:21:56 -05:00
|
|
|
let e = e.to_string();
|
|
|
|
let msg = format!("constant evaluation error: {}", e);
|
|
|
|
let mut err = struct_error(ecx.tcx.tcx.at(span), msg.as_str());
|
2018-10-29 03:09:03 -05:00
|
|
|
let frames = ecx.generate_stacktrace(None);
|
2018-07-15 04:21:56 -05:00
|
|
|
err.span_label(span, e);
|
2018-11-15 02:09:48 -06:00
|
|
|
// we iterate with indices because we need to look at the next frame (the caller)
|
|
|
|
for idx in 0..frames.len() {
|
|
|
|
let frame_info = &frames[idx];
|
|
|
|
let call_site_is_local = frames.get(idx+1).map_or(false,
|
|
|
|
|caller_info| caller_info.instance.def_id().is_local());
|
|
|
|
if call_site_is_local {
|
|
|
|
err.span_note(frame_info.call_site, &frame_info.to_string());
|
|
|
|
} else {
|
|
|
|
err.note(&frame_info.to_string());
|
|
|
|
}
|
2018-06-10 04:23:56 -05:00
|
|
|
}
|
|
|
|
err.emit();
|
|
|
|
} else {
|
|
|
|
ecx.tcx.sess.err(&e.to_string());
|
|
|
|
}
|
|
|
|
|
2018-05-07 11:03:28 -05:00
|
|
|
for (i, frame) in ecx.stack().iter().enumerate() {
|
|
|
|
trace!("-------------------");
|
|
|
|
trace!("Frame {}", i);
|
|
|
|
trace!(" return: {:#?}", frame.return_place);
|
|
|
|
for (i, local) in frame.locals.iter().enumerate() {
|
2018-08-07 08:22:11 -05:00
|
|
|
if let Ok(local) = local.access() {
|
2018-05-07 11:03:28 -05:00
|
|
|
trace!(" local {}: {:?}", i, local);
|
|
|
|
}
|
|
|
|
}
|
2018-10-31 04:16:42 -05:00
|
|
|
}
|
2017-07-21 10:25:30 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-09-19 18:00:59 -05:00
|
|
|
|
|
|
|
#[derive(Debug, Copy, Clone, PartialEq, Eq)]
|
|
|
|
pub enum MiriMemoryKind {
|
|
|
|
/// `__rust_alloc` memory
|
|
|
|
Rust,
|
|
|
|
/// `malloc` memory
|
|
|
|
C,
|
|
|
|
/// Part of env var emulation
|
|
|
|
Env,
|
|
|
|
/// mutable statics
|
|
|
|
MutStatic,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl Into<MemoryKind<MiriMemoryKind>> for MiriMemoryKind {
|
2018-10-16 05:44:04 -05:00
|
|
|
#[inline(always)]
|
2018-09-19 18:00:59 -05:00
|
|
|
fn into(self) -> MemoryKind<MiriMemoryKind> {
|
|
|
|
MemoryKind::Machine(self)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-10-16 05:44:04 -05:00
|
|
|
impl MayLeak for MiriMemoryKind {
|
|
|
|
#[inline(always)]
|
|
|
|
fn may_leak(self) -> bool {
|
2018-11-05 08:45:24 -06:00
|
|
|
use self::MiriMemoryKind::*;
|
2018-10-16 05:44:04 -05:00
|
|
|
match self {
|
|
|
|
Rust | C => false,
|
|
|
|
Env | MutStatic => true,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2018-09-19 18:00:59 -05:00
|
|
|
|
2017-12-14 04:03:55 -06:00
|
|
|
pub struct Evaluator<'tcx> {
|
2017-07-21 10:25:30 -05:00
|
|
|
/// Environment variables set by `setenv`
|
|
|
|
/// Miri does not expose env vars from the host to the emulated program
|
2018-10-16 04:21:38 -05:00
|
|
|
pub(crate) env_vars: HashMap<Vec<u8>, Pointer<Borrow>>,
|
2017-12-14 04:03:55 -06:00
|
|
|
|
2018-09-19 18:00:59 -05:00
|
|
|
/// TLS state
|
|
|
|
pub(crate) tls: TlsData<'tcx>,
|
2018-10-11 04:24:22 -05:00
|
|
|
|
|
|
|
/// Whether to enforce the validity invariant
|
|
|
|
pub(crate) validate: bool,
|
2018-10-16 11:01:50 -05:00
|
|
|
|
|
|
|
/// Stacked Borrows state
|
|
|
|
pub(crate) stacked_borrows: stacked_borrows::State,
|
2018-10-11 04:24:22 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
impl<'tcx> Evaluator<'tcx> {
|
|
|
|
fn new(validate: bool) -> Self {
|
|
|
|
Evaluator {
|
|
|
|
env_vars: HashMap::default(),
|
|
|
|
tls: TlsData::default(),
|
|
|
|
validate,
|
2018-11-15 11:15:05 -06:00
|
|
|
stacked_borrows: stacked_borrows::State::default(),
|
2018-10-11 04:24:22 -05:00
|
|
|
}
|
|
|
|
}
|
2017-07-21 10:25:30 -05:00
|
|
|
}
|
|
|
|
|
2018-10-16 11:01:50 -05:00
|
|
|
#[allow(dead_code)] // FIXME https://github.com/rust-lang/rust/issues/47131
|
|
|
|
type MiriEvalContext<'a, 'mir, 'tcx> = EvalContext<'a, 'mir, 'tcx, Evaluator<'tcx>>;
|
|
|
|
|
2018-12-11 07:16:58 -06:00
|
|
|
// A little trait that's useful to be inherited by extension traits
|
|
|
|
pub trait MiriEvalContextExt<'a, 'mir, 'tcx> {
|
|
|
|
fn eval_context_ref(&self) -> &MiriEvalContext<'a, 'mir, 'tcx>;
|
|
|
|
fn eval_context_mut(&mut self) -> &mut MiriEvalContext<'a, 'mir, 'tcx>;
|
|
|
|
}
|
|
|
|
impl<'a, 'mir, 'tcx> MiriEvalContextExt<'a, 'mir, 'tcx> for MiriEvalContext<'a, 'mir, 'tcx> {
|
|
|
|
#[inline(always)]
|
|
|
|
fn eval_context_ref(&self) -> &MiriEvalContext<'a, 'mir, 'tcx> {
|
|
|
|
self
|
|
|
|
}
|
|
|
|
#[inline(always)]
|
|
|
|
fn eval_context_mut(&mut self) -> &mut MiriEvalContext<'a, 'mir, 'tcx> {
|
|
|
|
self
|
|
|
|
}
|
|
|
|
}
|
2018-10-16 11:01:50 -05:00
|
|
|
|
2018-09-20 05:24:55 -05:00
|
|
|
impl<'a, 'mir, 'tcx> Machine<'a, 'mir, 'tcx> for Evaluator<'tcx> {
|
2018-09-19 18:00:59 -05:00
|
|
|
type MemoryKinds = MiriMemoryKind;
|
2018-10-17 10:36:07 -05:00
|
|
|
|
2018-11-15 11:15:05 -06:00
|
|
|
type FrameExtra = stacked_borrows::CallId;
|
|
|
|
type MemoryExtra = stacked_borrows::MemoryState;
|
2018-10-16 11:01:50 -05:00
|
|
|
type AllocExtra = stacked_borrows::Stacks;
|
2018-10-16 04:21:38 -05:00
|
|
|
type PointerTag = Borrow;
|
2017-07-28 02:52:19 -05:00
|
|
|
|
2018-10-16 04:21:38 -05:00
|
|
|
type MemoryMap = MonoHashMap<AllocId, (MemoryKind<MiriMemoryKind>, Allocation<Borrow, Self::AllocExtra>)>;
|
2018-10-05 11:08:50 -05:00
|
|
|
|
|
|
|
const STATIC_KIND: Option<MiriMemoryKind> = Some(MiriMemoryKind::MutStatic);
|
2018-10-11 02:02:28 -05:00
|
|
|
|
2018-12-02 10:18:25 -06:00
|
|
|
#[inline(always)]
|
2018-10-11 04:24:22 -05:00
|
|
|
fn enforce_validity(ecx: &EvalContext<'a, 'mir, 'tcx, Self>) -> bool {
|
2018-12-02 10:18:25 -06:00
|
|
|
ecx.machine.validate
|
2018-10-11 02:02:28 -05:00
|
|
|
}
|
2018-08-26 06:19:03 -05:00
|
|
|
|
2017-07-21 10:25:30 -05:00
|
|
|
/// Returns Ok() when the function was handled, fail otherwise
|
2018-10-16 11:01:50 -05:00
|
|
|
#[inline(always)]
|
2018-09-20 05:24:55 -05:00
|
|
|
fn find_fn(
|
2018-01-14 11:59:13 -06:00
|
|
|
ecx: &mut EvalContext<'a, 'mir, 'tcx, Self>,
|
2017-07-21 10:25:30 -05:00
|
|
|
instance: ty::Instance<'tcx>,
|
2018-10-16 04:21:38 -05:00
|
|
|
args: &[OpTy<'tcx, Borrow>],
|
|
|
|
dest: Option<PlaceTy<'tcx, Borrow>>,
|
2018-08-23 12:28:48 -05:00
|
|
|
ret: Option<mir::BasicBlock>,
|
|
|
|
) -> EvalResult<'tcx, Option<&'mir mir::Mir<'tcx>>> {
|
|
|
|
ecx.find_fn(instance, args, dest, ret)
|
2017-07-21 10:25:30 -05:00
|
|
|
}
|
2017-07-28 02:52:19 -05:00
|
|
|
|
2018-10-16 11:01:50 -05:00
|
|
|
#[inline(always)]
|
2018-09-20 05:24:55 -05:00
|
|
|
fn call_intrinsic(
|
2018-01-14 11:59:13 -06:00
|
|
|
ecx: &mut rustc_mir::interpret::EvalContext<'a, 'mir, 'tcx, Self>,
|
2017-07-28 06:08:27 -05:00
|
|
|
instance: ty::Instance<'tcx>,
|
2018-10-16 04:21:38 -05:00
|
|
|
args: &[OpTy<'tcx, Borrow>],
|
|
|
|
dest: PlaceTy<'tcx, Borrow>,
|
2017-07-28 06:08:27 -05:00
|
|
|
) -> EvalResult<'tcx> {
|
2018-08-23 12:28:48 -05:00
|
|
|
ecx.call_intrinsic(instance, args, dest)
|
2017-07-28 06:08:27 -05:00
|
|
|
}
|
|
|
|
|
2018-10-16 11:01:50 -05:00
|
|
|
#[inline(always)]
|
2018-09-20 05:24:55 -05:00
|
|
|
fn ptr_op(
|
2018-01-14 11:59:13 -06:00
|
|
|
ecx: &rustc_mir::interpret::EvalContext<'a, 'mir, 'tcx, Self>,
|
2017-07-25 04:32:48 -05:00
|
|
|
bin_op: mir::BinOp,
|
2018-10-16 04:21:38 -05:00
|
|
|
left: Scalar<Borrow>,
|
2018-08-15 14:01:40 -05:00
|
|
|
left_layout: TyLayout<'tcx>,
|
2018-10-16 04:21:38 -05:00
|
|
|
right: Scalar<Borrow>,
|
2018-08-15 14:01:40 -05:00
|
|
|
right_layout: TyLayout<'tcx>,
|
2018-10-16 04:21:38 -05:00
|
|
|
) -> EvalResult<'tcx, (Scalar<Borrow>, bool)> {
|
2018-08-15 14:01:40 -05:00
|
|
|
ecx.ptr_op(bin_op, left, left_layout, right, right_layout)
|
2017-07-25 04:32:48 -05:00
|
|
|
}
|
2017-07-28 09:48:43 -05:00
|
|
|
|
2018-09-20 05:24:55 -05:00
|
|
|
fn box_alloc(
|
2018-01-14 11:59:13 -06:00
|
|
|
ecx: &mut EvalContext<'a, 'mir, 'tcx, Self>,
|
2018-10-16 04:21:38 -05:00
|
|
|
dest: PlaceTy<'tcx, Borrow>,
|
2017-09-25 08:55:21 -05:00
|
|
|
) -> EvalResult<'tcx> {
|
2018-08-15 14:01:40 -05:00
|
|
|
trace!("box_alloc for {:?}", dest.layout.ty);
|
2017-09-25 08:55:21 -05:00
|
|
|
// Call the `exchange_malloc` lang item
|
|
|
|
let malloc = ecx.tcx.lang_items().exchange_malloc_fn().unwrap();
|
2018-01-14 11:59:13 -06:00
|
|
|
let malloc = ty::Instance::mono(ecx.tcx.tcx, malloc);
|
2017-09-25 08:55:21 -05:00
|
|
|
let malloc_mir = ecx.load_mir(malloc.def)?;
|
|
|
|
ecx.push_stack_frame(
|
|
|
|
malloc,
|
|
|
|
malloc_mir.span,
|
|
|
|
malloc_mir,
|
2018-10-09 15:03:14 -05:00
|
|
|
Some(dest),
|
2017-09-25 08:55:21 -05:00
|
|
|
// Don't do anything when we are done. The statement() function will increment
|
|
|
|
// the old stack frame's stmt counter to the next statement, which means that when
|
|
|
|
// exchange_malloc returns, we go on evaluating exactly where we want to be.
|
2018-08-24 10:44:04 -05:00
|
|
|
StackPopCleanup::None { cleanup: true },
|
2017-09-25 08:55:21 -05:00
|
|
|
)?;
|
|
|
|
|
|
|
|
let mut args = ecx.frame().mir.args_iter();
|
2018-08-15 14:01:40 -05:00
|
|
|
let layout = ecx.layout_of(dest.layout.ty.builtin_deref(false).unwrap().ty)?;
|
2017-09-25 08:55:21 -05:00
|
|
|
|
|
|
|
// First argument: size
|
2018-08-15 14:01:40 -05:00
|
|
|
// (0 is allowed here, this is expected to be handled by the lang item)
|
|
|
|
let arg = ecx.eval_place(&mir::Place::Local(args.next().unwrap()))?;
|
|
|
|
let size = layout.size.bytes();
|
|
|
|
ecx.write_scalar(Scalar::from_uint(size, arg.layout.size), arg)?;
|
2017-09-25 08:55:21 -05:00
|
|
|
|
|
|
|
// Second argument: align
|
2018-08-15 14:01:40 -05:00
|
|
|
let arg = ecx.eval_place(&mir::Place::Local(args.next().unwrap()))?;
|
2018-11-23 02:46:51 -06:00
|
|
|
let align = layout.align.abi.bytes();
|
2018-08-15 14:01:40 -05:00
|
|
|
ecx.write_scalar(Scalar::from_uint(align, arg.layout.size), arg)?;
|
2017-09-25 08:55:21 -05:00
|
|
|
|
|
|
|
// No more arguments
|
|
|
|
assert!(args.next().is_none(), "exchange_malloc lang item has more arguments than expected");
|
|
|
|
Ok(())
|
2017-07-28 09:48:43 -05:00
|
|
|
}
|
2017-09-15 06:02:33 -05:00
|
|
|
|
2018-09-20 05:24:55 -05:00
|
|
|
fn find_foreign_static(
|
2018-08-23 14:22:57 -05:00
|
|
|
def_id: DefId,
|
2018-11-15 06:29:55 -06:00
|
|
|
tcx: TyCtxtAt<'a, 'tcx, 'tcx>,
|
|
|
|
memory_extra: &Self::MemoryExtra,
|
2018-10-16 04:21:38 -05:00
|
|
|
) -> EvalResult<'tcx, Cow<'tcx, Allocation<Borrow, Self::AllocExtra>>> {
|
2018-08-23 14:22:57 -05:00
|
|
|
let attrs = tcx.get_attrs(def_id);
|
|
|
|
let link_name = match attr::first_attr_value_str_by_name(&attrs, "link_name") {
|
|
|
|
Some(name) => name.as_str(),
|
|
|
|
None => tcx.item_name(def_id).as_str(),
|
|
|
|
};
|
|
|
|
|
|
|
|
let alloc = match &link_name[..] {
|
|
|
|
"__cxa_thread_atexit_impl" => {
|
|
|
|
// This should be all-zero, pointer-sized
|
2018-11-15 06:29:55 -06:00
|
|
|
let size = tcx.data_layout.pointer_size;
|
|
|
|
let data = vec![0; size.bytes() as usize];
|
|
|
|
let extra = AllocationExtra::memory_allocated(size, memory_extra);
|
|
|
|
Allocation::from_bytes(&data[..], tcx.data_layout.pointer_align.abi, extra)
|
2018-08-23 14:22:57 -05:00
|
|
|
}
|
|
|
|
_ => return err!(Unimplemented(
|
|
|
|
format!("can't access foreign static: {}", link_name),
|
|
|
|
)),
|
|
|
|
};
|
2018-10-05 11:08:50 -05:00
|
|
|
Ok(Cow::Owned(alloc))
|
2017-09-15 06:02:33 -05:00
|
|
|
}
|
2017-12-14 04:03:55 -06:00
|
|
|
|
2018-10-16 11:01:50 -05:00
|
|
|
#[inline(always)]
|
2018-09-20 05:24:55 -05:00
|
|
|
fn before_terminator(_ecx: &mut EvalContext<'a, 'mir, 'tcx, Self>) -> EvalResult<'tcx>
|
|
|
|
{
|
|
|
|
// We are not interested in detecting loops
|
|
|
|
Ok(())
|
|
|
|
}
|
2018-10-05 11:08:50 -05:00
|
|
|
|
2018-11-15 06:29:55 -06:00
|
|
|
fn adjust_static_allocation<'b>(
|
|
|
|
alloc: &'b Allocation,
|
|
|
|
memory_extra: &Self::MemoryExtra,
|
|
|
|
) -> Cow<'b, Allocation<Borrow, Self::AllocExtra>> {
|
|
|
|
let extra = AllocationExtra::memory_allocated(
|
|
|
|
Size::from_bytes(alloc.bytes.len() as u64),
|
|
|
|
memory_extra,
|
|
|
|
);
|
2018-10-16 04:21:38 -05:00
|
|
|
let alloc: Allocation<Borrow, Self::AllocExtra> = Allocation {
|
|
|
|
bytes: alloc.bytes.clone(),
|
|
|
|
relocations: Relocations::from_presorted(
|
|
|
|
alloc.relocations.iter()
|
|
|
|
.map(|&(offset, ((), alloc))| (offset, (Borrow::default(), alloc)))
|
|
|
|
.collect()
|
|
|
|
),
|
|
|
|
undef_mask: alloc.undef_mask.clone(),
|
|
|
|
align: alloc.align,
|
|
|
|
mutability: alloc.mutability,
|
2018-11-15 06:29:55 -06:00
|
|
|
extra,
|
2018-10-16 04:21:38 -05:00
|
|
|
};
|
2018-10-05 11:08:50 -05:00
|
|
|
Cow::Owned(alloc)
|
|
|
|
}
|
2018-10-16 11:01:50 -05:00
|
|
|
|
|
|
|
fn tag_dereference(
|
|
|
|
ecx: &EvalContext<'a, 'mir, 'tcx, Self>,
|
2018-11-05 09:05:17 -06:00
|
|
|
place: MPlaceTy<'tcx, Borrow>,
|
2018-10-18 09:59:08 -05:00
|
|
|
mutability: Option<hir::Mutability>,
|
2018-11-05 09:05:17 -06:00
|
|
|
) -> EvalResult<'tcx, Scalar<Borrow>> {
|
2018-11-23 02:46:51 -06:00
|
|
|
let size = ecx.size_and_align_of_mplace(place)?.map(|(size, _)| size)
|
2018-11-05 09:05:17 -06:00
|
|
|
// for extern types, just cover what we can
|
2018-11-23 02:46:51 -06:00
|
|
|
.unwrap_or_else(|| place.layout.size);
|
2018-11-09 03:53:28 -06:00
|
|
|
if !ecx.tcx.sess.opts.debugging_opts.mir_emit_retag ||
|
|
|
|
!Self::enforce_validity(ecx) || size == Size::ZERO
|
|
|
|
{
|
2018-10-16 11:01:50 -05:00
|
|
|
// No tracking
|
2018-11-05 09:05:17 -06:00
|
|
|
Ok(place.ptr)
|
2018-10-16 11:01:50 -05:00
|
|
|
} else {
|
2018-11-17 02:54:58 -06:00
|
|
|
ecx.ptr_dereference(place, size, mutability.into())?;
|
|
|
|
// We never change the pointer
|
|
|
|
Ok(place.ptr)
|
2018-10-16 11:01:50 -05:00
|
|
|
}
|
|
|
|
}
|
2018-10-22 11:01:32 -05:00
|
|
|
|
|
|
|
#[inline(always)]
|
|
|
|
fn tag_new_allocation(
|
|
|
|
ecx: &mut EvalContext<'a, 'mir, 'tcx, Self>,
|
|
|
|
ptr: Pointer,
|
|
|
|
kind: MemoryKind<Self::MemoryKinds>,
|
|
|
|
) -> EvalResult<'tcx, Pointer<Borrow>> {
|
|
|
|
if !ecx.machine.validate {
|
|
|
|
// No tracking
|
|
|
|
Ok(ptr.with_default_tag())
|
|
|
|
} else {
|
|
|
|
let tag = ecx.tag_new_allocation(ptr.alloc_id, kind);
|
|
|
|
Ok(Pointer::new_with_tag(ptr.alloc_id, ptr.offset, tag))
|
|
|
|
}
|
|
|
|
}
|
2018-10-24 10:17:44 -05:00
|
|
|
|
2018-11-07 07:56:25 -06:00
|
|
|
#[inline]
|
|
|
|
fn escape_to_raw(
|
|
|
|
ecx: &mut EvalContext<'a, 'mir, 'tcx, Self>,
|
|
|
|
ptr: OpTy<'tcx, Self::PointerTag>,
|
|
|
|
) -> EvalResult<'tcx> {
|
|
|
|
// It is tempting to check the type here, but drop glue does EscapeToRaw
|
|
|
|
// on a raw pointer.
|
|
|
|
// This is deliberately NOT `deref_operand` as we do not want `tag_dereference`
|
|
|
|
// to be called! That would kill the original tag if we got a raw ptr.
|
|
|
|
let place = ecx.ref_to_mplace(ecx.read_immediate(ptr)?)?;
|
2018-11-23 02:46:51 -06:00
|
|
|
let size = ecx.size_and_align_of_mplace(place)?.map(|(size, _)| size)
|
2018-11-07 07:56:25 -06:00
|
|
|
// for extern types, just cover what we can
|
2018-11-23 02:46:51 -06:00
|
|
|
.unwrap_or_else(|| place.layout.size);
|
2018-11-07 07:56:25 -06:00
|
|
|
if !ecx.tcx.sess.opts.debugging_opts.mir_emit_retag ||
|
|
|
|
!ecx.machine.validate || size == Size::ZERO
|
|
|
|
{
|
|
|
|
// No tracking, or no retagging. The latter is possible because a dependency of ours
|
|
|
|
// might be called with different flags than we are, so there are `Retag`
|
|
|
|
// statements but we do not want to execute them.
|
|
|
|
Ok(())
|
|
|
|
} else {
|
|
|
|
ecx.escape_to_raw(place, size)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-10-24 10:17:44 -05:00
|
|
|
#[inline(always)]
|
|
|
|
fn retag(
|
|
|
|
ecx: &mut EvalContext<'a, 'mir, 'tcx, Self>,
|
|
|
|
fn_entry: bool,
|
2018-11-28 02:33:33 -06:00
|
|
|
two_phase: bool,
|
2018-10-24 10:17:44 -05:00
|
|
|
place: PlaceTy<'tcx, Borrow>,
|
|
|
|
) -> EvalResult<'tcx> {
|
2018-10-26 04:31:20 -05:00
|
|
|
if !ecx.tcx.sess.opts.debugging_opts.mir_emit_retag || !Self::enforce_validity(ecx) {
|
2018-11-07 07:56:25 -06:00
|
|
|
// No tracking, or no retagging. The latter is possible because a dependency of ours
|
|
|
|
// might be called with different flags than we are, so there are `Retag`
|
|
|
|
// statements but we do not want to execute them.
|
2018-10-26 04:31:20 -05:00
|
|
|
// Also, honor the whitelist in `enforce_validity` because otherwise we might retag
|
|
|
|
// uninitialized data.
|
2018-11-07 07:56:25 -06:00
|
|
|
Ok(())
|
|
|
|
} else {
|
2018-11-28 02:33:33 -06:00
|
|
|
ecx.retag(fn_entry, two_phase, place)
|
2018-10-24 10:17:44 -05:00
|
|
|
}
|
|
|
|
}
|
2018-11-15 11:15:05 -06:00
|
|
|
|
|
|
|
#[inline(always)]
|
|
|
|
fn stack_push(
|
|
|
|
ecx: &mut EvalContext<'a, 'mir, 'tcx, Self>,
|
|
|
|
) -> EvalResult<'tcx, stacked_borrows::CallId> {
|
|
|
|
Ok(ecx.memory().extra.borrow_mut().new_call())
|
|
|
|
}
|
|
|
|
|
|
|
|
#[inline(always)]
|
|
|
|
fn stack_pop(
|
|
|
|
ecx: &mut EvalContext<'a, 'mir, 'tcx, Self>,
|
|
|
|
extra: stacked_borrows::CallId,
|
|
|
|
) -> EvalResult<'tcx> {
|
|
|
|
Ok(ecx.memory().extra.borrow_mut().end_call(extra))
|
|
|
|
}
|
2017-07-21 10:25:30 -05:00
|
|
|
}
|