2019-09-24 17:28:00 -05:00
|
|
|
use std::collections::HashMap;
|
2019-11-09 08:15:52 -06:00
|
|
|
use std::convert::TryFrom;
|
2019-10-24 08:44:13 -05:00
|
|
|
use std::fs::{remove_file, File, OpenOptions};
|
2019-10-01 13:48:59 -05:00
|
|
|
use std::io::{Read, Write};
|
2019-09-24 17:28:00 -05:00
|
|
|
|
2019-09-30 14:21:45 -05:00
|
|
|
use rustc::ty::layout::Size;
|
|
|
|
|
2019-09-24 17:28:00 -05:00
|
|
|
use crate::stacked_borrows::Tag;
|
|
|
|
use crate::*;
|
|
|
|
|
2019-10-20 05:20:48 -05:00
|
|
|
#[derive(Debug)]
|
2019-09-30 15:18:23 -05:00
|
|
|
pub struct FileHandle {
|
2019-09-30 11:51:09 -05:00
|
|
|
file: File,
|
|
|
|
}
|
|
|
|
|
2019-09-24 17:28:00 -05:00
|
|
|
pub struct FileHandler {
|
2019-09-30 11:51:09 -05:00
|
|
|
handles: HashMap<i32, FileHandle>,
|
2019-09-24 17:28:00 -05:00
|
|
|
low: i32,
|
|
|
|
}
|
|
|
|
|
2019-09-28 14:22:57 -05:00
|
|
|
impl Default for FileHandler {
|
|
|
|
fn default() -> Self {
|
|
|
|
FileHandler {
|
2019-09-30 11:51:09 -05:00
|
|
|
handles: Default::default(),
|
2019-10-21 06:24:56 -05:00
|
|
|
// 0, 1 and 2 are reserved for stdin, stdout and stderr.
|
2019-09-28 14:22:57 -05:00
|
|
|
low: 3,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-09-24 17:28:00 -05:00
|
|
|
impl<'mir, 'tcx> EvalContextExt<'mir, 'tcx> for crate::MiriEvalContext<'mir, 'tcx> {}
|
|
|
|
pub trait EvalContextExt<'mir, 'tcx: 'mir>: crate::MiriEvalContextExt<'mir, 'tcx> {
|
|
|
|
fn open(
|
|
|
|
&mut self,
|
|
|
|
path_op: OpTy<'tcx, Tag>,
|
|
|
|
flag_op: OpTy<'tcx, Tag>,
|
|
|
|
) -> InterpResult<'tcx, i32> {
|
|
|
|
let this = self.eval_context_mut();
|
|
|
|
|
2019-10-14 15:36:15 -05:00
|
|
|
this.check_no_isolation("open")?;
|
2019-09-24 17:28:00 -05:00
|
|
|
|
|
|
|
let flag = this.read_scalar(flag_op)?.to_i32()?;
|
|
|
|
|
2019-09-30 11:46:07 -05:00
|
|
|
let mut options = OpenOptions::new();
|
|
|
|
|
2019-10-14 16:42:29 -05:00
|
|
|
let o_rdonly = this.eval_libc_i32("O_RDONLY")?;
|
|
|
|
let o_wronly = this.eval_libc_i32("O_WRONLY")?;
|
|
|
|
let o_rdwr = this.eval_libc_i32("O_RDWR")?;
|
|
|
|
// The first two bits of the flag correspond to the access mode in linux, macOS and
|
|
|
|
// windows. We need to check that in fact the access mode flags for the current platform
|
|
|
|
// only use these two bits, otherwise we are in an unsupported platform and should error.
|
|
|
|
if (o_rdonly | o_wronly | o_rdwr) & !0b11 != 0 {
|
|
|
|
throw_unsup_format!("Access mode flags on this platform are unsupported");
|
|
|
|
}
|
|
|
|
// Now we check the access mode
|
2019-09-30 11:46:07 -05:00
|
|
|
let access_mode = flag & 0b11;
|
|
|
|
|
2019-10-14 16:42:29 -05:00
|
|
|
if access_mode == o_rdonly {
|
2019-09-30 11:46:07 -05:00
|
|
|
options.read(true);
|
2019-10-14 16:42:29 -05:00
|
|
|
} else if access_mode == o_wronly {
|
2019-09-30 11:46:07 -05:00
|
|
|
options.write(true);
|
2019-10-14 16:42:29 -05:00
|
|
|
} else if access_mode == o_rdwr {
|
2019-09-30 11:46:07 -05:00
|
|
|
options.read(true).write(true);
|
|
|
|
} else {
|
|
|
|
throw_unsup_format!("Unsupported access mode {:#x}", access_mode);
|
|
|
|
}
|
2019-10-11 05:30:50 -05:00
|
|
|
// We need to check that there aren't unsupported options in `flag`. For this we try to
|
|
|
|
// reproduce the content of `flag` in the `mirror` variable using only the supported
|
|
|
|
// options.
|
|
|
|
let mut mirror = access_mode;
|
2019-09-30 11:46:07 -05:00
|
|
|
|
2019-10-11 05:30:50 -05:00
|
|
|
let o_append = this.eval_libc_i32("O_APPEND")?;
|
|
|
|
if flag & o_append != 0 {
|
2019-09-30 11:46:07 -05:00
|
|
|
options.append(true);
|
2019-10-11 05:30:50 -05:00
|
|
|
mirror |= o_append;
|
2019-09-30 11:46:07 -05:00
|
|
|
}
|
2019-10-11 05:30:50 -05:00
|
|
|
let o_trunc = this.eval_libc_i32("O_TRUNC")?;
|
|
|
|
if flag & o_trunc != 0 {
|
2019-09-30 11:46:07 -05:00
|
|
|
options.truncate(true);
|
2019-10-11 05:30:50 -05:00
|
|
|
mirror |= o_trunc;
|
2019-09-30 11:46:07 -05:00
|
|
|
}
|
2019-10-11 05:30:50 -05:00
|
|
|
let o_creat = this.eval_libc_i32("O_CREAT")?;
|
|
|
|
if flag & o_creat != 0 {
|
2019-09-30 11:46:07 -05:00
|
|
|
options.create(true);
|
2019-10-11 05:30:50 -05:00
|
|
|
mirror |= o_creat;
|
|
|
|
}
|
|
|
|
let o_cloexec = this.eval_libc_i32("O_CLOEXEC")?;
|
|
|
|
if flag & o_cloexec != 0 {
|
2019-10-12 20:12:26 -05:00
|
|
|
// We do not need to do anything for this flag because `std` already sets it.
|
|
|
|
// (Technically we do not support *not* setting this flag, but we ignore that.)
|
2019-10-11 05:30:50 -05:00
|
|
|
mirror |= o_cloexec;
|
|
|
|
}
|
|
|
|
// If `flag` is not equal to `mirror`, there is an unsupported option enabled in `flag`,
|
|
|
|
// then we throw an error.
|
|
|
|
if flag != mirror {
|
2019-10-12 20:12:26 -05:00
|
|
|
throw_unsup_format!("unsupported flags {:#x}", flag & !mirror);
|
2019-09-24 17:28:00 -05:00
|
|
|
}
|
|
|
|
|
2019-10-24 03:23:44 -05:00
|
|
|
let path = this.read_os_string_from_c_string(this.read_scalar(path_op)?.not_undef()?)?;
|
2019-09-30 11:46:07 -05:00
|
|
|
|
|
|
|
let fd = options.open(path).map(|file| {
|
2019-09-30 14:07:08 -05:00
|
|
|
let mut fh = &mut this.machine.file_handler;
|
|
|
|
fh.low += 1;
|
2019-10-20 05:20:48 -05:00
|
|
|
fh.handles.insert(fh.low, FileHandle { file }).unwrap_none();
|
2019-09-30 14:07:08 -05:00
|
|
|
fh.low
|
|
|
|
});
|
|
|
|
|
2019-10-18 14:33:25 -05:00
|
|
|
this.try_unwrap_io_result(fd)
|
2019-09-24 17:28:00 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
fn fcntl(
|
|
|
|
&mut self,
|
|
|
|
fd_op: OpTy<'tcx, Tag>,
|
|
|
|
cmd_op: OpTy<'tcx, Tag>,
|
2019-10-12 20:12:26 -05:00
|
|
|
_arg1_op: Option<OpTy<'tcx, Tag>>,
|
2019-09-24 17:28:00 -05:00
|
|
|
) -> InterpResult<'tcx, i32> {
|
|
|
|
let this = self.eval_context_mut();
|
|
|
|
|
2019-10-14 15:36:15 -05:00
|
|
|
this.check_no_isolation("fcntl")?;
|
2019-09-24 17:28:00 -05:00
|
|
|
|
|
|
|
let fd = this.read_scalar(fd_op)?.to_i32()?;
|
|
|
|
let cmd = this.read_scalar(cmd_op)?.to_i32()?;
|
2019-10-21 06:24:56 -05:00
|
|
|
// We only support getting the flags for a descriptor.
|
2019-10-11 12:17:54 -05:00
|
|
|
if cmd == this.eval_libc_i32("F_GETFD")? {
|
2019-10-12 20:12:26 -05:00
|
|
|
// Currently this is the only flag that `F_GETFD` returns. It is OK to just return the
|
|
|
|
// `FD_CLOEXEC` value without checking if the flag is set for the file because `std`
|
|
|
|
// always sets this flag when opening a file. However we still need to check that the
|
|
|
|
// file itself is open.
|
2019-10-24 08:44:13 -05:00
|
|
|
if this.machine.file_handler.handles.contains_key(&fd) {
|
|
|
|
Ok(this.eval_libc_i32("FD_CLOEXEC")?)
|
|
|
|
} else {
|
|
|
|
this.handle_not_found()
|
|
|
|
}
|
2019-09-24 17:28:00 -05:00
|
|
|
} else {
|
2019-10-11 12:17:54 -05:00
|
|
|
throw_unsup_format!("The {:#x} command is not supported for `fcntl`)", cmd);
|
2019-09-24 17:28:00 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
fn close(&mut self, fd_op: OpTy<'tcx, Tag>) -> InterpResult<'tcx, i32> {
|
|
|
|
let this = self.eval_context_mut();
|
|
|
|
|
2019-10-14 15:36:15 -05:00
|
|
|
this.check_no_isolation("close")?;
|
2019-09-24 17:28:00 -05:00
|
|
|
|
|
|
|
let fd = this.read_scalar(fd_op)?.to_i32()?;
|
|
|
|
|
2019-10-24 08:44:13 -05:00
|
|
|
if let Some(handle) = this.machine.file_handler.handles.remove(&fd) {
|
2019-10-26 08:54:02 -05:00
|
|
|
// `File::sync_all` does the checks that are done when closing a file. We do this to
|
|
|
|
// to handle possible errors correctly.
|
|
|
|
let result = this.try_unwrap_io_result(handle.file.sync_all().map(|_| 0i32));
|
2019-11-03 10:04:00 -06:00
|
|
|
// Now we actually close the file.
|
2019-10-26 08:54:02 -05:00
|
|
|
drop(handle);
|
|
|
|
// And return the result.
|
|
|
|
result
|
2019-10-24 08:44:13 -05:00
|
|
|
} else {
|
|
|
|
this.handle_not_found()
|
|
|
|
}
|
2019-09-24 17:28:00 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
fn read(
|
|
|
|
&mut self,
|
|
|
|
fd_op: OpTy<'tcx, Tag>,
|
|
|
|
buf_op: OpTy<'tcx, Tag>,
|
|
|
|
count_op: OpTy<'tcx, Tag>,
|
|
|
|
) -> InterpResult<'tcx, i64> {
|
|
|
|
let this = self.eval_context_mut();
|
|
|
|
|
2019-10-14 15:36:15 -05:00
|
|
|
this.check_no_isolation("read")?;
|
2019-09-24 17:28:00 -05:00
|
|
|
|
2019-11-09 08:15:52 -06:00
|
|
|
let ptr_size = this.pointer_size().bits();
|
|
|
|
|
2019-11-13 10:57:20 -06:00
|
|
|
// We cap the number of read bytes to the largest value that we are able to fit in both the
|
|
|
|
// host's and target's `isize`.
|
2019-11-09 08:15:52 -06:00
|
|
|
let count = this
|
|
|
|
.read_scalar(count_op)?
|
|
|
|
.to_machine_usize(&*this.tcx)?
|
2019-11-13 10:57:20 -06:00
|
|
|
.min(1 << (ptr_size - 1))
|
|
|
|
.min(isize::max_value() as u64);
|
2019-10-21 06:24:56 -05:00
|
|
|
// Reading zero bytes should not change `buf`.
|
2019-10-02 08:50:32 -05:00
|
|
|
if count == 0 {
|
|
|
|
return Ok(0);
|
|
|
|
}
|
2019-09-24 17:28:00 -05:00
|
|
|
let fd = this.read_scalar(fd_op)?.to_i32()?;
|
2019-10-24 08:44:13 -05:00
|
|
|
let buf = this.read_scalar(buf_op)?.not_undef()?;
|
|
|
|
|
|
|
|
if let Some(handle) = this.machine.file_handler.handles.get_mut(&fd) {
|
2019-11-13 10:57:20 -06:00
|
|
|
// This can never fail because `count` was capped to be smaller than
|
|
|
|
// `isize::max_value()`.
|
2019-11-09 08:15:52 -06:00
|
|
|
let count = isize::try_from(count).unwrap();
|
2019-11-07 13:50:16 -06:00
|
|
|
// We want to read at most `count` bytes. We are sure that `count` is not negative
|
|
|
|
// because it was a target's `usize`. Also we are sure that its smaller than
|
|
|
|
// `usize::max_value()` because it is a host's `isize`.
|
|
|
|
let mut bytes = vec![0; count as usize];
|
2019-11-09 08:15:52 -06:00
|
|
|
let result = handle
|
|
|
|
.file
|
|
|
|
.read(&mut bytes)
|
2019-11-13 10:57:20 -06:00
|
|
|
// `File::read` never returns a value larger than `i64::max_value()`, so this
|
|
|
|
// unwrap cannot fail.
|
2019-11-09 08:15:52 -06:00
|
|
|
.map(|c| i64::try_from(c).unwrap());
|
2019-10-28 16:44:18 -05:00
|
|
|
|
2019-11-04 08:38:21 -06:00
|
|
|
match result {
|
2019-11-09 08:15:52 -06:00
|
|
|
Ok(read_bytes) => {
|
2019-11-05 15:47:24 -06:00
|
|
|
// If reading to `bytes` did not fail, we write those bytes to the buffer.
|
|
|
|
this.memory.write_bytes(buf, bytes)?;
|
|
|
|
Ok(read_bytes)
|
2019-11-09 08:15:52 -06:00
|
|
|
}
|
2019-11-04 08:38:21 -06:00
|
|
|
Err(e) => {
|
|
|
|
this.set_last_error_from_io_error(e)?;
|
|
|
|
Ok(-1)
|
2019-10-28 16:44:18 -05:00
|
|
|
}
|
2019-10-24 08:44:13 -05:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
this.handle_not_found()
|
|
|
|
}
|
2019-09-30 15:18:23 -05:00
|
|
|
}
|
|
|
|
|
2019-09-30 11:46:07 -05:00
|
|
|
fn write(
|
|
|
|
&mut self,
|
|
|
|
fd_op: OpTy<'tcx, Tag>,
|
|
|
|
buf_op: OpTy<'tcx, Tag>,
|
|
|
|
count_op: OpTy<'tcx, Tag>,
|
|
|
|
) -> InterpResult<'tcx, i64> {
|
|
|
|
let this = self.eval_context_mut();
|
|
|
|
|
2019-10-14 15:36:15 -05:00
|
|
|
this.check_no_isolation("write")?;
|
2019-09-30 11:46:07 -05:00
|
|
|
|
2019-11-09 08:15:52 -06:00
|
|
|
let ptr_size = this.pointer_size().bits();
|
|
|
|
|
2019-11-13 10:57:20 -06:00
|
|
|
// We cap the number of read bytes to the largest value that we are able to fit in both the
|
|
|
|
// host's and target's `isize`.
|
2019-11-09 08:15:52 -06:00
|
|
|
let count = this
|
|
|
|
.read_scalar(count_op)?
|
|
|
|
.to_machine_usize(&*this.tcx)?
|
2019-11-13 10:57:20 -06:00
|
|
|
.min(1 << (ptr_size - 1))
|
|
|
|
.min(isize::max_value() as u64);
|
2019-10-21 06:24:56 -05:00
|
|
|
// Writing zero bytes should not change `buf`.
|
2019-10-02 08:50:32 -05:00
|
|
|
if count == 0 {
|
|
|
|
return Ok(0);
|
|
|
|
}
|
2019-09-30 11:46:07 -05:00
|
|
|
let fd = this.read_scalar(fd_op)?.to_i32()?;
|
2019-10-24 08:44:13 -05:00
|
|
|
let buf = this.read_scalar(buf_op)?.not_undef()?;
|
|
|
|
|
|
|
|
if let Some(handle) = this.machine.file_handler.handles.get_mut(&fd) {
|
|
|
|
let bytes = this.memory.read_bytes(buf, Size::from_bytes(count))?;
|
2019-11-09 08:15:52 -06:00
|
|
|
let result = handle.file.write(&bytes).map(|c| i64::try_from(c).unwrap());
|
|
|
|
this.try_unwrap_io_result(result)
|
2019-10-24 08:44:13 -05:00
|
|
|
} else {
|
|
|
|
this.handle_not_found()
|
|
|
|
}
|
2019-09-30 11:46:07 -05:00
|
|
|
}
|
|
|
|
|
2019-10-24 08:44:13 -05:00
|
|
|
fn unlink(&mut self, path_op: OpTy<'tcx, Tag>) -> InterpResult<'tcx, i32> {
|
2019-10-03 09:33:36 -05:00
|
|
|
let this = self.eval_context_mut();
|
|
|
|
|
2019-10-14 15:36:15 -05:00
|
|
|
this.check_no_isolation("unlink")?;
|
2019-10-03 09:33:36 -05:00
|
|
|
|
2019-10-18 09:30:12 -05:00
|
|
|
let path = this.read_os_string_from_c_string(this.read_scalar(path_op)?.not_undef()?)?;
|
2019-10-03 09:33:36 -05:00
|
|
|
|
|
|
|
let result = remove_file(path).map(|_| 0);
|
|
|
|
|
2019-10-18 14:33:25 -05:00
|
|
|
this.try_unwrap_io_result(result)
|
2019-10-03 09:33:36 -05:00
|
|
|
}
|
|
|
|
|
2019-10-24 08:44:13 -05:00
|
|
|
/// Function used when a handle is not found inside `FileHandler`. It returns `Ok(-1)`and sets
|
|
|
|
/// the last OS error to `libc::EBADF` (invalid file descriptor). This function uses
|
|
|
|
/// `T: From<i32>` instead of `i32` directly because some fs functions return different integer
|
|
|
|
/// types (like `read`, that returns an `i64`).
|
|
|
|
fn handle_not_found<T: From<i32>>(&mut self) -> InterpResult<'tcx, T> {
|
2019-09-30 15:18:23 -05:00
|
|
|
let this = self.eval_context_mut();
|
2019-10-24 08:44:13 -05:00
|
|
|
let ebadf = this.eval_libc("EBADF")?;
|
|
|
|
this.set_last_error(ebadf)?;
|
|
|
|
Ok((-1).into())
|
2019-09-30 14:07:08 -05:00
|
|
|
}
|
2019-09-24 17:28:00 -05:00
|
|
|
}
|