2018-08-22 19:52:01 +00:00
|
|
|
// Copyright 2018 The Rust Project Developers. See the COPYRIGHT
|
|
|
|
// file at the top-level directory of this distribution and at
|
|
|
|
// http://rust-lang.org/COPYRIGHT.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 <LICENSE-APACHE or
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0> or the MIT license
|
|
|
|
// <LICENSE-MIT or http://opensource.org/licenses/MIT>, at your
|
|
|
|
// option. This file may not be copied, modified, or distributed
|
|
|
|
// except according to those terms.
|
|
|
|
|
2018-08-18 09:53:15 +00:00
|
|
|
//! The memory subsystem.
|
|
|
|
//!
|
|
|
|
//! Generally, we use `Pointer` to denote memory addresses. However, some operations
|
|
|
|
//! have a "size"-like parameter, and they take `Scalar` for the address because
|
|
|
|
//! if the size is 0, then the pointer can also be a (properly aligned, non-NULL)
|
|
|
|
//! integer. It is crucial that these operations call `check_align` *before*
|
|
|
|
//! short-circuiting the empty case!
|
|
|
|
|
2018-05-18 14:06:20 +00:00
|
|
|
use std::collections::VecDeque;
|
2018-04-26 07:18:19 +00:00
|
|
|
use std::ptr;
|
2018-09-21 21:32:59 +00:00
|
|
|
use std::borrow::Cow;
|
2016-03-05 06:48:23 +00:00
|
|
|
|
2018-10-03 10:34:10 +00:00
|
|
|
use rustc::ty::{self, Instance, ParamEnv, query::TyCtxtAt};
|
2018-08-23 19:22:27 +00:00
|
|
|
use rustc::ty::layout::{self, Align, TargetDataLayout, Size, HasDataLayout};
|
2018-10-16 12:50:07 +00:00
|
|
|
pub use rustc::mir::interpret::{truncate, write_target_uint, read_target_uint};
|
2018-08-04 22:01:11 +00:00
|
|
|
use rustc_data_structures::fx::{FxHashSet, FxHashMap};
|
2018-06-08 02:47:26 +00:00
|
|
|
|
|
|
|
use syntax::ast::Mutability;
|
2017-12-12 16:14:49 +00:00
|
|
|
|
2018-10-16 12:50:07 +00:00
|
|
|
use super::{
|
|
|
|
Pointer, AllocId, Allocation, ConstValue, GlobalId,
|
|
|
|
EvalResult, Scalar, EvalErrorKind, AllocType, PointerArithmetic,
|
|
|
|
Machine, MemoryAccess, AllocMap, MayLeak, ScalarMaybeUndef,
|
|
|
|
};
|
2016-04-05 02:33:41 +00:00
|
|
|
|
2018-08-23 17:04:33 +00:00
|
|
|
#[derive(Debug, PartialEq, Eq, Copy, Clone, Hash)]
|
2017-08-09 12:53:22 +00:00
|
|
|
pub enum MemoryKind<T> {
|
2017-07-13 14:58:36 +00:00
|
|
|
/// Error if deallocated except during a stack pop
|
2017-07-12 12:51:47 +00:00
|
|
|
Stack,
|
2018-09-21 21:32:59 +00:00
|
|
|
/// Error if ever deallocated
|
|
|
|
Vtable,
|
2017-07-28 14:48:43 +00:00
|
|
|
/// Additional memory kinds a machine wishes to distinguish from the builtin ones
|
|
|
|
Machine(T),
|
2016-04-05 02:33:41 +00:00
|
|
|
}
|
|
|
|
|
2018-10-16 10:45:44 +00:00
|
|
|
impl<T: MayLeak> MayLeak for MemoryKind<T> {
|
|
|
|
#[inline]
|
|
|
|
fn may_leak(self) -> bool {
|
|
|
|
match self {
|
|
|
|
MemoryKind::Stack => false,
|
|
|
|
MemoryKind::Vtable => true,
|
|
|
|
MemoryKind::Machine(k) => k.may_leak()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-09-20 08:12:21 +00:00
|
|
|
// `Memory` has to depend on the `Machine` because some of its operations
|
|
|
|
// (e.g. `get`) call a `Machine` hook.
|
|
|
|
pub struct Memory<'a, 'mir, 'tcx: 'a + 'mir, M: Machine<'a, 'mir, 'tcx>> {
|
2018-08-23 17:04:33 +00:00
|
|
|
/// Allocations local to this instance of the miri engine. The kind
|
|
|
|
/// helps ensure that the same mechanism is used for allocation and
|
2018-08-26 10:59:59 +00:00
|
|
|
/// deallocation. When an allocation is not found here, it is a
|
2018-10-05 13:13:59 +00:00
|
|
|
/// static and looked up in the `tcx` for read access. Some machines may
|
|
|
|
/// have to mutate this map even on a read-only access to a static (because
|
|
|
|
/// they do pointer provenance tracking and the allocations in `tcx` have
|
|
|
|
/// the wrong type), so we let the machine override this type.
|
2018-10-05 08:23:39 +00:00
|
|
|
/// Either way, if the machine allows writing to a static, doing so will
|
|
|
|
/// create a copy of the static allocation here.
|
2018-10-05 13:13:59 +00:00
|
|
|
alloc_map: M::MemoryMap,
|
2017-02-10 21:35:45 +00:00
|
|
|
|
2018-09-15 14:34:30 +00:00
|
|
|
/// To be able to compare pointers with NULL, and to check alignment for accesses
|
|
|
|
/// to ZSTs (where pointers may dangle), we keep track of the size even for allocations
|
|
|
|
/// that do not exist any more.
|
|
|
|
dead_alloc_map: FxHashMap<AllocId, (Size, Align)>,
|
|
|
|
|
2018-09-20 08:22:11 +00:00
|
|
|
/// Lets us implement `HasDataLayout`, which is awfully convenient.
|
|
|
|
pub(super) tcx: TyCtxtAt<'a, 'tcx, 'tcx>,
|
2016-03-24 03:40:58 +00:00
|
|
|
}
|
|
|
|
|
2018-09-20 08:12:21 +00:00
|
|
|
impl<'b, 'a, 'mir, 'tcx, M: Machine<'a, 'mir, 'tcx>> HasDataLayout
|
|
|
|
for &'b Memory<'a, 'mir, 'tcx, M>
|
|
|
|
{
|
2018-08-23 19:22:27 +00:00
|
|
|
#[inline]
|
|
|
|
fn data_layout(&self) -> &TargetDataLayout {
|
|
|
|
&self.tcx.data_layout
|
|
|
|
}
|
|
|
|
}
|
2018-09-20 08:12:21 +00:00
|
|
|
impl<'a, 'b, 'c, 'mir, 'tcx, M: Machine<'a, 'mir, 'tcx>> HasDataLayout
|
2018-08-26 18:42:52 +00:00
|
|
|
for &'b &'c mut Memory<'a, 'mir, 'tcx, M>
|
|
|
|
{
|
|
|
|
#[inline]
|
|
|
|
fn data_layout(&self) -> &TargetDataLayout {
|
|
|
|
&self.tcx.data_layout
|
|
|
|
}
|
|
|
|
}
|
2018-08-23 19:22:27 +00:00
|
|
|
|
2018-09-20 08:12:21 +00:00
|
|
|
// FIXME: Really we shouldnt clone memory, ever. Snapshot machinery should instad
|
|
|
|
// carefully copy only the reachable parts.
|
|
|
|
impl<'a, 'mir, 'tcx: 'a + 'mir, M: Machine<'a, 'mir, 'tcx>>
|
|
|
|
Clone for Memory<'a, 'mir, 'tcx, M>
|
|
|
|
{
|
|
|
|
fn clone(&self) -> Self {
|
|
|
|
Memory {
|
|
|
|
alloc_map: self.alloc_map.clone(),
|
|
|
|
dead_alloc_map: self.dead_alloc_map.clone(),
|
|
|
|
tcx: self.tcx,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl<'a, 'mir, 'tcx, M: Machine<'a, 'mir, 'tcx>> Memory<'a, 'mir, 'tcx, M> {
|
2018-10-16 07:15:13 +00:00
|
|
|
pub fn new(tcx: TyCtxtAt<'a, 'tcx, 'tcx>) -> Self {
|
2016-09-22 13:22:00 +00:00
|
|
|
Memory {
|
2018-10-05 13:13:59 +00:00
|
|
|
alloc_map: Default::default(),
|
2018-09-15 14:34:30 +00:00
|
|
|
dead_alloc_map: FxHashMap::default(),
|
2017-12-06 08:25:29 +00:00
|
|
|
tcx,
|
2016-09-22 13:22:00 +00:00
|
|
|
}
|
2016-03-05 06:48:23 +00:00
|
|
|
}
|
|
|
|
|
2018-09-21 21:32:59 +00:00
|
|
|
pub fn create_fn_alloc(&mut self, instance: Instance<'tcx>) -> Pointer<M::PointerTag> {
|
|
|
|
Pointer::from(self.tcx.alloc_map.lock().create_fn_alloc(instance)).with_default_tag()
|
2016-06-08 11:43:34 +00:00
|
|
|
}
|
|
|
|
|
2018-09-21 21:32:59 +00:00
|
|
|
pub fn allocate_static_bytes(&mut self, bytes: &[u8]) -> Pointer<M::PointerTag> {
|
|
|
|
Pointer::from(self.tcx.allocate_bytes(bytes)).with_default_tag()
|
2017-02-10 21:35:33 +00:00
|
|
|
}
|
|
|
|
|
2018-08-23 17:04:33 +00:00
|
|
|
pub fn allocate_with(
|
2017-07-28 14:48:43 +00:00
|
|
|
&mut self,
|
2018-10-16 07:15:13 +00:00
|
|
|
alloc: Allocation<M::PointerTag, M::AllocExtra>,
|
2018-06-08 02:47:26 +00:00
|
|
|
kind: MemoryKind<M::MemoryKinds>,
|
2018-04-26 07:18:19 +00:00
|
|
|
) -> EvalResult<'tcx, AllocId> {
|
2018-05-02 04:03:06 +00:00
|
|
|
let id = self.tcx.alloc_map.lock().reserve();
|
2018-08-23 17:04:33 +00:00
|
|
|
self.alloc_map.insert(id, (kind, alloc));
|
2018-04-26 07:18:19 +00:00
|
|
|
Ok(id)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn allocate(
|
|
|
|
&mut self,
|
2018-05-19 14:37:29 +00:00
|
|
|
size: Size,
|
2018-04-26 07:18:19 +00:00
|
|
|
align: Align,
|
2018-06-08 02:47:26 +00:00
|
|
|
kind: MemoryKind<M::MemoryKinds>,
|
2018-09-21 21:32:59 +00:00
|
|
|
) -> EvalResult<'tcx, Pointer<M::PointerTag>> {
|
|
|
|
let ptr = Pointer::from(self.allocate_with(Allocation::undef(size, align), kind)?);
|
|
|
|
Ok(ptr.with_default_tag())
|
2016-03-05 06:48:23 +00:00
|
|
|
}
|
|
|
|
|
2017-07-28 14:48:43 +00:00
|
|
|
pub fn reallocate(
|
|
|
|
&mut self,
|
2018-09-21 21:32:59 +00:00
|
|
|
ptr: Pointer<M::PointerTag>,
|
2018-05-19 14:37:29 +00:00
|
|
|
old_size: Size,
|
2017-12-17 06:47:22 +00:00
|
|
|
old_align: Align,
|
2018-05-19 14:37:29 +00:00
|
|
|
new_size: Size,
|
2017-12-17 06:47:22 +00:00
|
|
|
new_align: Align,
|
2017-08-09 12:53:22 +00:00
|
|
|
kind: MemoryKind<M::MemoryKinds>,
|
2018-09-21 21:32:59 +00:00
|
|
|
) -> EvalResult<'tcx, Pointer<M::PointerTag>> {
|
2018-05-19 14:37:29 +00:00
|
|
|
if ptr.offset.bytes() != 0 {
|
2017-08-02 14:59:01 +00:00
|
|
|
return err!(ReallocateNonBasePtr);
|
2016-04-06 23:29:56 +00:00
|
|
|
}
|
|
|
|
|
2017-07-10 20:34:54 +00:00
|
|
|
// For simplicities' sake, we implement reallocate as "alloc, copy, dealloc"
|
2018-06-08 02:47:26 +00:00
|
|
|
let new_ptr = self.allocate(new_size, new_align, kind)?;
|
2017-08-10 15:48:38 +00:00
|
|
|
self.copy(
|
|
|
|
ptr.into(),
|
2017-12-17 06:47:22 +00:00
|
|
|
old_align,
|
2017-08-10 15:48:38 +00:00
|
|
|
new_ptr.into(),
|
2017-12-17 06:47:22 +00:00
|
|
|
new_align,
|
|
|
|
old_size.min(new_size),
|
2018-08-23 17:04:33 +00:00
|
|
|
/*nonoverlapping*/ true,
|
2017-08-10 15:48:38 +00:00
|
|
|
)?;
|
2017-07-12 12:51:47 +00:00
|
|
|
self.deallocate(ptr, Some((old_size, old_align)), kind)?;
|
2016-06-13 09:24:01 +00:00
|
|
|
|
2017-07-10 20:34:54 +00:00
|
|
|
Ok(new_ptr)
|
2016-04-06 23:29:56 +00:00
|
|
|
}
|
|
|
|
|
2018-08-23 17:04:33 +00:00
|
|
|
/// Deallocate a local, or do nothing if that local has been made into a static
|
2018-09-21 21:32:59 +00:00
|
|
|
pub fn deallocate_local(&mut self, ptr: Pointer<M::PointerTag>) -> EvalResult<'tcx> {
|
2018-08-23 17:04:33 +00:00
|
|
|
// The allocation might be already removed by static interning.
|
|
|
|
// This can only really happen in the CTFE instance, not in miri.
|
|
|
|
if self.alloc_map.contains_key(&ptr.alloc_id) {
|
|
|
|
self.deallocate(ptr, None, MemoryKind::Stack)
|
|
|
|
} else {
|
|
|
|
Ok(())
|
2017-12-06 08:25:29 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-07-28 14:48:43 +00:00
|
|
|
pub fn deallocate(
|
|
|
|
&mut self,
|
2018-09-21 21:32:59 +00:00
|
|
|
ptr: Pointer<M::PointerTag>,
|
2018-05-19 14:37:29 +00:00
|
|
|
size_and_align: Option<(Size, Align)>,
|
2017-08-09 12:53:22 +00:00
|
|
|
kind: MemoryKind<M::MemoryKinds>,
|
2017-07-28 14:48:43 +00:00
|
|
|
) -> EvalResult<'tcx> {
|
2018-10-17 10:36:18 +00:00
|
|
|
trace!("deallocating: {}", ptr.alloc_id);
|
2018-09-15 14:34:30 +00:00
|
|
|
|
2018-05-19 14:37:29 +00:00
|
|
|
if ptr.offset.bytes() != 0 {
|
2017-08-02 14:59:01 +00:00
|
|
|
return err!(DeallocateNonBasePtr);
|
2016-11-17 13:48:34 +00:00
|
|
|
}
|
2016-04-07 09:02:02 +00:00
|
|
|
|
2018-10-16 12:50:07 +00:00
|
|
|
let (alloc_kind, mut alloc) = match self.alloc_map.remove(&ptr.alloc_id) {
|
2017-12-06 08:25:29 +00:00
|
|
|
Some(alloc) => alloc,
|
2018-06-08 02:47:26 +00:00
|
|
|
None => {
|
2018-08-23 17:04:33 +00:00
|
|
|
// Deallocating static memory -- always an error
|
2018-05-02 04:03:06 +00:00
|
|
|
return match self.tcx.alloc_map.lock().get(ptr.alloc_id) {
|
|
|
|
Some(AllocType::Function(..)) => err!(DeallocatedWrongMemoryKind(
|
|
|
|
"function".to_string(),
|
|
|
|
format!("{:?}", kind),
|
|
|
|
)),
|
|
|
|
Some(AllocType::Static(..)) |
|
|
|
|
Some(AllocType::Memory(..)) => err!(DeallocatedWrongMemoryKind(
|
|
|
|
"static".to_string(),
|
|
|
|
format!("{:?}", kind),
|
|
|
|
)),
|
|
|
|
None => err!(DoubleFree)
|
|
|
|
}
|
|
|
|
}
|
2017-08-08 11:06:14 +00:00
|
|
|
};
|
|
|
|
|
2017-12-06 08:25:29 +00:00
|
|
|
if alloc_kind != kind {
|
2017-08-10 15:48:38 +00:00
|
|
|
return err!(DeallocatedWrongMemoryKind(
|
2017-12-06 08:25:29 +00:00
|
|
|
format!("{:?}", alloc_kind),
|
2017-08-10 15:48:38 +00:00
|
|
|
format!("{:?}", kind),
|
|
|
|
));
|
2017-07-12 12:51:47 +00:00
|
|
|
}
|
|
|
|
if let Some((size, align)) = size_and_align {
|
2018-05-19 14:37:29 +00:00
|
|
|
if size.bytes() != alloc.bytes.len() as u64 || align != alloc.align {
|
2018-08-22 19:59:14 +00:00
|
|
|
let bytes = Size::from_bytes(alloc.bytes.len() as u64);
|
|
|
|
return err!(IncorrectAllocationInformation(size,
|
|
|
|
bytes,
|
|
|
|
align,
|
|
|
|
alloc.align));
|
2017-07-03 23:47:58 +00:00
|
|
|
}
|
2016-04-07 09:02:02 +00:00
|
|
|
}
|
2017-07-03 23:47:58 +00:00
|
|
|
|
2018-10-16 12:50:07 +00:00
|
|
|
// Let the machine take some extra action
|
2018-10-17 10:36:18 +00:00
|
|
|
M::memory_deallocated(&mut alloc, ptr)?;
|
2018-10-16 12:50:07 +00:00
|
|
|
|
2018-09-15 14:34:30 +00:00
|
|
|
// Don't forget to remember size and align of this now-dead allocation
|
|
|
|
let old = self.dead_alloc_map.insert(
|
|
|
|
ptr.alloc_id,
|
|
|
|
(Size::from_bytes(alloc.bytes.len() as u64), alloc.align)
|
|
|
|
);
|
|
|
|
if old.is_some() {
|
|
|
|
bug!("Nothing can be deallocated twice");
|
|
|
|
}
|
2016-04-07 09:02:02 +00:00
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|
2016-06-23 07:59:16 +00:00
|
|
|
|
2018-09-15 14:34:30 +00:00
|
|
|
/// Check that the pointer is aligned AND non-NULL. This supports ZSTs in two ways:
|
|
|
|
/// You can pass a scalar, and a `Pointer` does not have to actually still be allocated.
|
2018-09-21 21:32:59 +00:00
|
|
|
pub fn check_align(
|
|
|
|
&self,
|
|
|
|
ptr: Scalar<M::PointerTag>,
|
|
|
|
required_align: Align
|
|
|
|
) -> EvalResult<'tcx> {
|
2017-08-25 12:41:59 +00:00
|
|
|
// Check non-NULL/Undef, extract offset
|
2018-05-20 22:30:00 +00:00
|
|
|
let (offset, alloc_align) = match ptr {
|
2018-05-20 21:43:16 +00:00
|
|
|
Scalar::Ptr(ptr) => {
|
2018-10-03 10:34:10 +00:00
|
|
|
let (size, align) = self.get_size_and_align(ptr.alloc_id);
|
2018-09-15 14:34:30 +00:00
|
|
|
// check this is not NULL -- which we can ensure only if this is in-bounds
|
|
|
|
// of some (potentially dead) allocation.
|
|
|
|
if ptr.offset > size {
|
|
|
|
return err!(PointerOutOfBounds {
|
2018-09-21 21:32:59 +00:00
|
|
|
ptr: ptr.erase_tag(),
|
2018-09-15 14:34:30 +00:00
|
|
|
access: true,
|
|
|
|
allocation_size: size,
|
|
|
|
});
|
|
|
|
};
|
|
|
|
// keep data for alignment check
|
|
|
|
(ptr.offset.bytes(), align)
|
2017-08-10 15:48:38 +00:00
|
|
|
}
|
2018-07-24 16:28:53 +00:00
|
|
|
Scalar::Bits { bits, size } => {
|
|
|
|
assert_eq!(size as u64, self.pointer_size().bytes());
|
2018-08-30 09:39:40 +00:00
|
|
|
assert!(bits < (1u128 << self.pointer_size().bits()));
|
2018-09-15 14:34:30 +00:00
|
|
|
// check this is not NULL
|
2018-08-30 09:39:40 +00:00
|
|
|
if bits == 0 {
|
2017-08-02 14:59:01 +00:00
|
|
|
return err!(InvalidNullPointerUsage);
|
2017-07-03 12:16:11 +00:00
|
|
|
}
|
2018-08-30 09:39:40 +00:00
|
|
|
// the "base address" is 0 and hence always aligned
|
|
|
|
(bits as u64, required_align)
|
2017-08-10 15:48:38 +00:00
|
|
|
}
|
2017-01-31 09:36:27 +00:00
|
|
|
};
|
2017-08-25 12:41:59 +00:00
|
|
|
// Check alignment
|
2017-12-17 06:47:22 +00:00
|
|
|
if alloc_align.abi() < required_align.abi() {
|
2017-08-25 12:41:59 +00:00
|
|
|
return err!(AlignmentCheckFailed {
|
2018-05-19 14:37:29 +00:00
|
|
|
has: alloc_align,
|
|
|
|
required: required_align,
|
2017-08-25 12:41:59 +00:00
|
|
|
});
|
|
|
|
}
|
2017-12-17 06:47:22 +00:00
|
|
|
if offset % required_align.abi() == 0 {
|
2016-07-22 14:35:39 +00:00
|
|
|
Ok(())
|
|
|
|
} else {
|
2018-05-19 14:37:29 +00:00
|
|
|
let has = offset % required_align.abi();
|
2017-08-02 14:59:01 +00:00
|
|
|
err!(AlignmentCheckFailed {
|
2018-05-19 14:37:29 +00:00
|
|
|
has: Align::from_bytes(has, has).unwrap(),
|
|
|
|
required: required_align,
|
2016-07-22 14:35:39 +00:00
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
2017-01-30 08:44:52 +00:00
|
|
|
|
2018-08-13 14:14:22 +00:00
|
|
|
/// Check if the pointer is "in-bounds". Notice that a pointer pointing at the end
|
|
|
|
/// of an allocation (i.e., at the first *inaccessible* location) *is* considered
|
2018-08-28 15:49:24 +00:00
|
|
|
/// in-bounds! This follows C's/LLVM's rules. The `access` boolean is just used
|
|
|
|
/// for the error message.
|
|
|
|
/// If you want to check bounds before doing a memory access, be sure to
|
|
|
|
/// check the pointer one past the end of your access, then everything will
|
|
|
|
/// work out exactly.
|
2018-09-21 21:32:59 +00:00
|
|
|
pub fn check_bounds_ptr(&self, ptr: Pointer<M::PointerTag>, access: bool) -> EvalResult<'tcx> {
|
2017-06-05 02:31:34 +00:00
|
|
|
let alloc = self.get(ptr.alloc_id)?;
|
|
|
|
let allocation_size = alloc.bytes.len() as u64;
|
2018-05-19 14:37:29 +00:00
|
|
|
if ptr.offset.bytes() > allocation_size {
|
2017-08-10 15:48:38 +00:00
|
|
|
return err!(PointerOutOfBounds {
|
2018-09-21 21:32:59 +00:00
|
|
|
ptr: ptr.erase_tag(),
|
2017-08-10 15:48:38 +00:00
|
|
|
access,
|
2018-05-19 14:37:29 +00:00
|
|
|
allocation_size: Size::from_bytes(allocation_size),
|
2017-08-10 15:48:38 +00:00
|
|
|
});
|
2017-06-05 02:31:34 +00:00
|
|
|
}
|
|
|
|
Ok(())
|
|
|
|
}
|
2018-10-02 15:02:58 +00:00
|
|
|
|
|
|
|
/// Check if the memory range beginning at `ptr` and of size `Size` is "in-bounds".
|
|
|
|
#[inline(always)]
|
2018-10-10 09:31:31 +00:00
|
|
|
pub fn check_bounds(
|
|
|
|
&self,
|
|
|
|
ptr: Pointer<M::PointerTag>,
|
|
|
|
size: Size,
|
|
|
|
access: bool
|
|
|
|
) -> EvalResult<'tcx> {
|
2018-10-02 15:02:58 +00:00
|
|
|
// if ptr.offset is in bounds, then so is ptr (because offset checks for overflow)
|
|
|
|
self.check_bounds_ptr(ptr.offset(size, &*self)?, access)
|
|
|
|
}
|
2016-06-23 07:40:01 +00:00
|
|
|
}
|
2016-04-07 09:02:02 +00:00
|
|
|
|
2016-06-23 07:40:01 +00:00
|
|
|
/// Allocation accessors
|
2018-09-20 08:12:21 +00:00
|
|
|
impl<'a, 'mir, 'tcx, M: Machine<'a, 'mir, 'tcx>> Memory<'a, 'mir, 'tcx, M> {
|
2018-10-05 14:49:51 +00:00
|
|
|
/// Helper function to obtain the global (tcx) allocation for a static.
|
|
|
|
/// This attempts to return a reference to an existing allocation if
|
|
|
|
/// one can be found in `tcx`. That, however, is only possible if `tcx` and
|
|
|
|
/// this machine use the same pointer tag, so it is indirected through
|
|
|
|
/// `M::static_with_default_tag`.
|
2018-08-27 11:34:12 +00:00
|
|
|
fn get_static_alloc(
|
|
|
|
tcx: TyCtxtAt<'a, 'tcx, 'tcx>,
|
|
|
|
id: AllocId,
|
2018-10-16 07:15:13 +00:00
|
|
|
) -> EvalResult<'tcx, Cow<'tcx, Allocation<M::PointerTag, M::AllocExtra>>> {
|
2018-08-27 11:34:12 +00:00
|
|
|
let alloc = tcx.alloc_map.lock().get(id);
|
|
|
|
let def_id = match alloc {
|
|
|
|
Some(AllocType::Memory(mem)) => {
|
2018-10-05 14:49:51 +00:00
|
|
|
// We got tcx memory. Let the machine figure out whether and how to
|
|
|
|
// turn that into memory with the right pointer tag.
|
2018-09-21 21:32:59 +00:00
|
|
|
return Ok(M::static_with_default_tag(mem))
|
2018-08-27 11:34:12 +00:00
|
|
|
}
|
|
|
|
Some(AllocType::Function(..)) => {
|
|
|
|
return err!(DerefFunctionPointer)
|
|
|
|
}
|
|
|
|
Some(AllocType::Static(did)) => {
|
|
|
|
did
|
|
|
|
}
|
|
|
|
None =>
|
|
|
|
return err!(DanglingPointerDeref),
|
|
|
|
};
|
|
|
|
// We got a "lazy" static that has not been computed yet, do some work
|
|
|
|
trace!("static_alloc: Need to compute {:?}", def_id);
|
|
|
|
if tcx.is_foreign_item(def_id) {
|
|
|
|
return M::find_foreign_static(tcx, def_id);
|
|
|
|
}
|
|
|
|
let instance = Instance::mono(tcx.tcx, def_id);
|
|
|
|
let gid = GlobalId {
|
|
|
|
instance,
|
|
|
|
promoted: None,
|
|
|
|
};
|
|
|
|
tcx.const_eval(ty::ParamEnv::reveal_all().and(gid)).map_err(|err| {
|
|
|
|
// no need to report anything, the const_eval call takes care of that for statics
|
|
|
|
assert!(tcx.is_static(def_id).is_some());
|
|
|
|
EvalErrorKind::ReferencedConstant(err).into()
|
2018-08-31 10:31:15 +00:00
|
|
|
}).map(|const_val| {
|
|
|
|
if let ConstValue::ByRef(_, allocation, _) = const_val.val {
|
2018-10-05 14:49:51 +00:00
|
|
|
// We got tcx memory. Let the machine figure out whether and how to
|
|
|
|
// turn that into memory with the right pointer tag.
|
2018-09-21 21:32:59 +00:00
|
|
|
M::static_with_default_tag(allocation)
|
2018-08-31 10:31:15 +00:00
|
|
|
} else {
|
2018-09-01 10:13:28 +00:00
|
|
|
bug!("Matching on non-ByRef static")
|
2018-08-31 10:31:15 +00:00
|
|
|
}
|
2018-08-27 11:34:12 +00:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2018-10-16 07:15:13 +00:00
|
|
|
pub fn get(&self, id: AllocId) -> EvalResult<'tcx, &Allocation<M::PointerTag, M::AllocExtra>> {
|
2018-09-21 21:32:59 +00:00
|
|
|
// The error type of the inner closure here is somewhat funny. We have two
|
|
|
|
// ways of "erroring": An actual error, or because we got a reference from
|
|
|
|
// `get_static_alloc` that we can actually use directly without inserting anything anywhere.
|
|
|
|
// So the error type is `EvalResult<'tcx, &Allocation<M::PointerTag>>`.
|
|
|
|
let a = self.alloc_map.get_or(id, || {
|
|
|
|
let alloc = Self::get_static_alloc(self.tcx, id).map_err(Err)?;
|
|
|
|
match alloc {
|
|
|
|
Cow::Borrowed(alloc) => {
|
2018-10-05 14:49:51 +00:00
|
|
|
// We got a ref, cheaply return that as an "error" so that the
|
|
|
|
// map does not get mutated.
|
2018-09-21 21:32:59 +00:00
|
|
|
Err(Ok(alloc))
|
|
|
|
}
|
|
|
|
Cow::Owned(alloc) => {
|
|
|
|
// Need to put it into the map and return a ref to that
|
|
|
|
let kind = M::STATIC_KIND.expect(
|
|
|
|
"I got an owned allocation that I have to copy but the machine does \
|
|
|
|
not expect that to happen"
|
|
|
|
);
|
|
|
|
Ok((MemoryKind::Machine(kind), alloc))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
});
|
|
|
|
// Now unpack that funny error type
|
|
|
|
match a {
|
|
|
|
Ok(a) => Ok(&a.1),
|
|
|
|
Err(a) => a
|
2016-06-13 09:39:15 +00:00
|
|
|
}
|
2016-03-05 06:48:23 +00:00
|
|
|
}
|
2017-08-10 15:48:38 +00:00
|
|
|
|
2018-08-23 17:04:33 +00:00
|
|
|
pub fn get_mut(
|
2017-08-10 15:48:38 +00:00
|
|
|
&mut self,
|
|
|
|
id: AllocId,
|
2018-10-16 07:15:13 +00:00
|
|
|
) -> EvalResult<'tcx, &mut Allocation<M::PointerTag, M::AllocExtra>> {
|
2018-10-05 13:13:59 +00:00
|
|
|
let tcx = self.tcx;
|
|
|
|
let a = self.alloc_map.get_mut_or(id, || {
|
|
|
|
// Need to make a copy, even if `get_static_alloc` is able
|
|
|
|
// to give us a cheap reference.
|
|
|
|
let alloc = Self::get_static_alloc(tcx, id)?;
|
|
|
|
if alloc.mutability == Mutability::Immutable {
|
|
|
|
return err!(ModifiedConstantMemory);
|
2018-08-26 10:59:59 +00:00
|
|
|
}
|
2018-10-05 13:13:59 +00:00
|
|
|
let kind = M::STATIC_KIND.expect(
|
2018-10-05 14:49:51 +00:00
|
|
|
"An allocation is being mutated but the machine does not expect that to happen"
|
2018-10-05 13:13:59 +00:00
|
|
|
);
|
|
|
|
Ok((MemoryKind::Machine(kind), alloc.into_owned()))
|
|
|
|
});
|
|
|
|
// Unpack the error type manually because type inference doesn't
|
|
|
|
// work otherwise (and we cannot help it because `impl Trait`)
|
|
|
|
match a {
|
|
|
|
Err(e) => Err(e),
|
|
|
|
Ok(a) => {
|
|
|
|
let a = &mut a.1;
|
|
|
|
if a.mutability == Mutability::Immutable {
|
2018-09-21 21:32:59 +00:00
|
|
|
return err!(ModifiedConstantMemory);
|
|
|
|
}
|
2018-10-05 13:13:59 +00:00
|
|
|
Ok(a)
|
2018-09-21 21:32:59 +00:00
|
|
|
}
|
2018-10-05 13:13:59 +00:00
|
|
|
}
|
2017-07-14 03:33:06 +00:00
|
|
|
}
|
|
|
|
|
2018-10-05 14:49:51 +00:00
|
|
|
pub fn get_size_and_align(&self, id: AllocId) -> (Size, Align) {
|
|
|
|
if let Ok(alloc) = self.get(id) {
|
|
|
|
return (Size::from_bytes(alloc.bytes.len() as u64), alloc.align);
|
|
|
|
}
|
|
|
|
// Could also be a fn ptr or extern static
|
|
|
|
match self.tcx.alloc_map.lock().get(id) {
|
|
|
|
Some(AllocType::Function(..)) => (Size::ZERO, Align::from_bytes(1, 1).unwrap()),
|
|
|
|
Some(AllocType::Static(did)) => {
|
|
|
|
// The only way `get` couldn't have worked here is if this is an extern static
|
|
|
|
assert!(self.tcx.is_foreign_item(did));
|
|
|
|
// Use size and align of the type
|
|
|
|
let ty = self.tcx.type_of(did);
|
|
|
|
let layout = self.tcx.layout_of(ParamEnv::empty().and(ty)).unwrap();
|
|
|
|
(layout.size, layout.align)
|
|
|
|
}
|
|
|
|
_ => {
|
|
|
|
// Must be a deallocated pointer
|
|
|
|
*self.dead_alloc_map.get(&id).expect(
|
|
|
|
"allocation missing in dead_alloc_map"
|
|
|
|
)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-09-21 21:32:59 +00:00
|
|
|
pub fn get_fn(&self, ptr: Pointer<M::PointerTag>) -> EvalResult<'tcx, Instance<'tcx>> {
|
2018-05-19 14:37:29 +00:00
|
|
|
if ptr.offset.bytes() != 0 {
|
2017-08-02 14:59:01 +00:00
|
|
|
return err!(InvalidFunctionPointer);
|
2017-06-22 04:45:51 +00:00
|
|
|
}
|
2018-08-27 11:34:12 +00:00
|
|
|
trace!("reading fn ptr: {}", ptr.alloc_id);
|
2018-05-02 04:03:06 +00:00
|
|
|
match self.tcx.alloc_map.lock().get(ptr.alloc_id) {
|
|
|
|
Some(AllocType::Function(instance)) => Ok(instance),
|
|
|
|
_ => Err(EvalErrorKind::ExecuteMemory.into()),
|
|
|
|
}
|
2016-06-08 11:43:34 +00:00
|
|
|
}
|
|
|
|
|
2018-09-21 21:32:59 +00:00
|
|
|
pub fn mark_immutable(&mut self, id: AllocId) -> EvalResult<'tcx> {
|
|
|
|
self.get_mut(id)?.mutability = Mutability::Immutable;
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2016-12-08 06:00:46 +00:00
|
|
|
/// For debugging, print an allocation and all allocations it points to, recursively.
|
|
|
|
pub fn dump_alloc(&self, id: AllocId) {
|
|
|
|
self.dump_allocs(vec![id]);
|
|
|
|
}
|
|
|
|
|
2018-10-16 07:15:13 +00:00
|
|
|
fn dump_alloc_helper<Tag, Extra>(
|
2018-09-21 21:32:59 +00:00
|
|
|
&self,
|
|
|
|
allocs_seen: &mut FxHashSet<AllocId>,
|
|
|
|
allocs_to_print: &mut VecDeque<AllocId>,
|
|
|
|
mut msg: String,
|
2018-10-16 07:15:13 +00:00
|
|
|
alloc: &Allocation<Tag, Extra>,
|
2018-09-21 21:32:59 +00:00
|
|
|
extra: String,
|
|
|
|
) {
|
|
|
|
use std::fmt::Write;
|
|
|
|
|
|
|
|
let prefix_len = msg.len();
|
|
|
|
let mut relocations = vec![];
|
|
|
|
|
|
|
|
for i in 0..(alloc.bytes.len() as u64) {
|
|
|
|
let i = Size::from_bytes(i);
|
|
|
|
if let Some(&(_, target_id)) = alloc.relocations.get(&i) {
|
|
|
|
if allocs_seen.insert(target_id) {
|
|
|
|
allocs_to_print.push_back(target_id);
|
|
|
|
}
|
|
|
|
relocations.push((i, target_id));
|
|
|
|
}
|
|
|
|
if alloc.undef_mask.is_range_defined(i, i + Size::from_bytes(1)).is_ok() {
|
|
|
|
// this `as usize` is fine, since `i` came from a `usize`
|
|
|
|
write!(msg, "{:02x} ", alloc.bytes[i.bytes() as usize]).unwrap();
|
|
|
|
} else {
|
|
|
|
msg.push_str("__ ");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
trace!(
|
|
|
|
"{}({} bytes, alignment {}){}",
|
|
|
|
msg,
|
|
|
|
alloc.bytes.len(),
|
|
|
|
alloc.align.abi(),
|
|
|
|
extra
|
|
|
|
);
|
|
|
|
|
|
|
|
if !relocations.is_empty() {
|
|
|
|
msg.clear();
|
|
|
|
write!(msg, "{:1$}", "", prefix_len).unwrap(); // Print spaces.
|
|
|
|
let mut pos = Size::ZERO;
|
|
|
|
let relocation_width = (self.pointer_size().bytes() - 1) * 3;
|
|
|
|
for (i, target_id) in relocations {
|
|
|
|
// this `as usize` is fine, since we can't print more chars than `usize::MAX`
|
|
|
|
write!(msg, "{:1$}", "", ((i - pos) * 3).bytes() as usize).unwrap();
|
|
|
|
let target = format!("({})", target_id);
|
|
|
|
// this `as usize` is fine, since we can't print more chars than `usize::MAX`
|
|
|
|
write!(msg, "└{0:─^1$}┘ ", target, relocation_width as usize).unwrap();
|
|
|
|
pos = i + self.pointer_size();
|
|
|
|
}
|
|
|
|
trace!("{}", msg);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-12-08 06:00:46 +00:00
|
|
|
/// For debugging, print a list of allocations and all allocations they point to, recursively.
|
|
|
|
pub fn dump_allocs(&self, mut allocs: Vec<AllocId>) {
|
2018-04-26 05:35:24 +00:00
|
|
|
if !log_enabled!(::log::Level::Trace) {
|
|
|
|
return;
|
|
|
|
}
|
2016-12-08 06:00:46 +00:00
|
|
|
allocs.sort();
|
|
|
|
allocs.dedup();
|
|
|
|
let mut allocs_to_print = VecDeque::from(allocs);
|
2018-03-23 09:32:27 +00:00
|
|
|
let mut allocs_seen = FxHashSet::default();
|
2016-04-06 09:45:06 +00:00
|
|
|
|
|
|
|
while let Some(id) = allocs_to_print.pop_front() {
|
2018-09-21 21:32:59 +00:00
|
|
|
let msg = format!("Alloc {:<5} ", format!("{}:", id));
|
|
|
|
|
|
|
|
// normal alloc?
|
2018-10-05 13:13:59 +00:00
|
|
|
match self.alloc_map.get_or(id, || Err(())) {
|
|
|
|
Ok((kind, alloc)) => {
|
2018-09-21 21:32:59 +00:00
|
|
|
let extra = match kind {
|
2017-12-06 08:25:29 +00:00
|
|
|
MemoryKind::Stack => " (stack)".to_owned(),
|
2018-09-21 21:32:59 +00:00
|
|
|
MemoryKind::Vtable => " (vtable)".to_owned(),
|
2017-12-06 08:25:29 +00:00
|
|
|
MemoryKind::Machine(m) => format!(" ({:?})", m),
|
2018-09-21 21:32:59 +00:00
|
|
|
};
|
|
|
|
self.dump_alloc_helper(
|
|
|
|
&mut allocs_seen, &mut allocs_to_print,
|
|
|
|
msg, alloc, extra
|
|
|
|
);
|
|
|
|
},
|
2018-10-05 13:13:59 +00:00
|
|
|
Err(()) => {
|
2018-09-21 21:32:59 +00:00
|
|
|
// static alloc?
|
|
|
|
match self.tcx.alloc_map.lock().get(id) {
|
|
|
|
Some(AllocType::Memory(alloc)) => {
|
|
|
|
self.dump_alloc_helper(
|
|
|
|
&mut allocs_seen, &mut allocs_to_print,
|
|
|
|
msg, alloc, " (immutable)".to_owned()
|
|
|
|
);
|
|
|
|
}
|
|
|
|
Some(AllocType::Function(func)) => {
|
|
|
|
trace!("{} {}", msg, func);
|
|
|
|
}
|
|
|
|
Some(AllocType::Static(did)) => {
|
|
|
|
trace!("{} {:?}", msg, did);
|
|
|
|
}
|
|
|
|
None => {
|
|
|
|
trace!("{} (deallocated)", msg);
|
2018-06-08 02:47:26 +00:00
|
|
|
}
|
2016-04-06 09:45:06 +00:00
|
|
|
}
|
2018-09-21 21:32:59 +00:00
|
|
|
},
|
|
|
|
};
|
2016-09-19 10:10:51 +00:00
|
|
|
|
2016-04-06 09:45:06 +00:00
|
|
|
}
|
|
|
|
}
|
2017-02-14 14:35:13 +00:00
|
|
|
|
|
|
|
pub fn leak_report(&self) -> usize {
|
|
|
|
trace!("### LEAK REPORT ###");
|
2018-10-05 16:08:36 +00:00
|
|
|
let leaks: Vec<_> = self.alloc_map.filter_map_collect(|&id, &(kind, _)| {
|
2018-10-16 10:45:44 +00:00
|
|
|
if kind.may_leak() { None } else { Some(id) }
|
2018-10-05 16:08:36 +00:00
|
|
|
});
|
2017-02-14 14:35:13 +00:00
|
|
|
let n = leaks.len();
|
|
|
|
self.dump_allocs(leaks);
|
|
|
|
n
|
|
|
|
}
|
2018-10-20 09:09:44 +00:00
|
|
|
|
|
|
|
/// This is used by [priroda](https://github.com/oli-obk/priroda)
|
2018-10-20 11:42:25 +00:00
|
|
|
pub fn alloc_map(&self) -> &M::MemoryMap {
|
2018-10-20 09:09:44 +00:00
|
|
|
&self.alloc_map
|
|
|
|
}
|
2016-06-23 07:40:01 +00:00
|
|
|
}
|
2016-04-06 09:45:06 +00:00
|
|
|
|
2016-06-23 07:40:01 +00:00
|
|
|
/// Byte accessors
|
2018-09-20 08:12:21 +00:00
|
|
|
impl<'a, 'mir, 'tcx, M: Machine<'a, 'mir, 'tcx>> Memory<'a, 'mir, 'tcx, M> {
|
2018-08-28 15:49:24 +00:00
|
|
|
/// The last argument controls whether we error out when there are undefined
|
|
|
|
/// or pointer bytes. You should never call this, call `get_bytes` or
|
2018-08-29 08:07:27 +00:00
|
|
|
/// `get_bytes_with_undef_and_ptr` instead,
|
2018-10-02 12:45:41 +00:00
|
|
|
///
|
|
|
|
/// This function also guarantees that the resulting pointer will remain stable
|
|
|
|
/// even when new allocations are pushed to the `HashMap`. `copy_repeatedly` relies
|
|
|
|
/// on that.
|
2018-08-28 15:49:24 +00:00
|
|
|
fn get_bytes_internal(
|
2017-08-10 15:48:38 +00:00
|
|
|
&self,
|
2018-09-21 21:32:59 +00:00
|
|
|
ptr: Pointer<M::PointerTag>,
|
2018-05-19 14:37:29 +00:00
|
|
|
size: Size,
|
2017-12-17 06:47:22 +00:00
|
|
|
align: Align,
|
2018-08-28 15:49:24 +00:00
|
|
|
check_defined_and_ptr: bool,
|
2017-08-10 15:48:38 +00:00
|
|
|
) -> EvalResult<'tcx, &[u8]> {
|
2018-08-28 15:49:24 +00:00
|
|
|
assert_ne!(size.bytes(), 0, "0-sized accesses should never even get a `Pointer`");
|
2017-12-17 06:47:22 +00:00
|
|
|
self.check_align(ptr.into(), align)?;
|
2018-10-02 15:02:58 +00:00
|
|
|
self.check_bounds(ptr, size, true)?;
|
2018-08-28 15:49:24 +00:00
|
|
|
|
|
|
|
if check_defined_and_ptr {
|
|
|
|
self.check_defined(ptr, size)?;
|
2018-08-29 08:07:27 +00:00
|
|
|
self.check_relocations(ptr, size)?;
|
|
|
|
} else {
|
|
|
|
// We still don't want relocations on the *edges*
|
|
|
|
self.check_relocation_edges(ptr, size)?;
|
2018-08-28 15:49:24 +00:00
|
|
|
}
|
|
|
|
|
2016-05-10 00:52:44 +00:00
|
|
|
let alloc = self.get(ptr.alloc_id)?;
|
2018-10-16 12:50:07 +00:00
|
|
|
M::memory_accessed(alloc, ptr, size, MemoryAccess::Read)?;
|
|
|
|
|
2018-05-19 14:37:29 +00:00
|
|
|
assert_eq!(ptr.offset.bytes() as usize as u64, ptr.offset.bytes());
|
|
|
|
assert_eq!(size.bytes() as usize as u64, size.bytes());
|
|
|
|
let offset = ptr.offset.bytes() as usize;
|
|
|
|
Ok(&alloc.bytes[offset..offset + size.bytes() as usize])
|
2016-03-05 06:48:23 +00:00
|
|
|
}
|
|
|
|
|
2018-08-28 15:49:24 +00:00
|
|
|
#[inline]
|
2018-09-21 21:32:59 +00:00
|
|
|
fn get_bytes(
|
|
|
|
&self,
|
|
|
|
ptr: Pointer<M::PointerTag>,
|
|
|
|
size: Size,
|
|
|
|
align: Align
|
|
|
|
) -> EvalResult<'tcx, &[u8]> {
|
2018-08-28 15:49:24 +00:00
|
|
|
self.get_bytes_internal(ptr, size, align, true)
|
|
|
|
}
|
|
|
|
|
|
|
|
/// It is the caller's responsibility to handle undefined and pointer bytes.
|
2018-10-11 09:15:30 +00:00
|
|
|
/// However, this still checks that there are no relocations on the *egdes*.
|
2018-08-28 15:49:24 +00:00
|
|
|
#[inline]
|
|
|
|
fn get_bytes_with_undef_and_ptr(
|
|
|
|
&self,
|
2018-09-21 21:32:59 +00:00
|
|
|
ptr: Pointer<M::PointerTag>,
|
2018-08-28 15:49:24 +00:00
|
|
|
size: Size,
|
|
|
|
align: Align
|
|
|
|
) -> EvalResult<'tcx, &[u8]> {
|
|
|
|
self.get_bytes_internal(ptr, size, align, false)
|
|
|
|
}
|
|
|
|
|
2018-08-29 08:07:27 +00:00
|
|
|
/// Just calling this already marks everything as defined and removes relocations,
|
|
|
|
/// so be sure to actually put data there!
|
2018-08-28 15:49:24 +00:00
|
|
|
fn get_bytes_mut(
|
2017-08-10 15:48:38 +00:00
|
|
|
&mut self,
|
2018-09-21 21:32:59 +00:00
|
|
|
ptr: Pointer<M::PointerTag>,
|
2018-05-19 14:37:29 +00:00
|
|
|
size: Size,
|
2017-12-17 06:47:22 +00:00
|
|
|
align: Align,
|
2017-08-10 15:48:38 +00:00
|
|
|
) -> EvalResult<'tcx, &mut [u8]> {
|
2018-08-28 15:49:24 +00:00
|
|
|
assert_ne!(size.bytes(), 0, "0-sized accesses should never even get a `Pointer`");
|
2017-12-17 06:47:22 +00:00
|
|
|
self.check_align(ptr.into(), align)?;
|
2018-10-02 15:02:58 +00:00
|
|
|
self.check_bounds(ptr, size, true)?;
|
2018-08-28 15:49:24 +00:00
|
|
|
|
|
|
|
self.mark_definedness(ptr, size, true)?;
|
|
|
|
self.clear_relocations(ptr, size)?;
|
|
|
|
|
2016-05-10 00:52:44 +00:00
|
|
|
let alloc = self.get_mut(ptr.alloc_id)?;
|
2018-10-16 12:50:07 +00:00
|
|
|
M::memory_accessed(alloc, ptr, size, MemoryAccess::Write)?;
|
|
|
|
|
2018-05-19 14:37:29 +00:00
|
|
|
assert_eq!(ptr.offset.bytes() as usize as u64, ptr.offset.bytes());
|
|
|
|
assert_eq!(size.bytes() as usize as u64, size.bytes());
|
|
|
|
let offset = ptr.offset.bytes() as usize;
|
|
|
|
Ok(&mut alloc.bytes[offset..offset + size.bytes() as usize])
|
2016-03-05 06:48:23 +00:00
|
|
|
}
|
2016-06-23 07:40:01 +00:00
|
|
|
}
|
2016-03-21 11:27:34 +00:00
|
|
|
|
2018-09-21 21:32:59 +00:00
|
|
|
/// Interning (for CTFE)
|
2018-10-05 13:13:59 +00:00
|
|
|
impl<'a, 'mir, 'tcx, M> Memory<'a, 'mir, 'tcx, M>
|
|
|
|
where
|
2018-10-16 07:15:13 +00:00
|
|
|
M: Machine<'a, 'mir, 'tcx, PointerTag=(), AllocExtra=()>,
|
|
|
|
M::MemoryMap: AllocMap<AllocId, (MemoryKind<M::MemoryKinds>, Allocation)>,
|
2018-10-05 13:13:59 +00:00
|
|
|
{
|
2017-02-08 15:27:28 +00:00
|
|
|
/// mark an allocation as static and initialized, either mutable or not
|
2018-08-24 15:36:18 +00:00
|
|
|
pub fn intern_static(
|
2017-08-10 15:48:38 +00:00
|
|
|
&mut self,
|
|
|
|
alloc_id: AllocId,
|
|
|
|
mutability: Mutability,
|
|
|
|
) -> EvalResult<'tcx> {
|
|
|
|
trace!(
|
2018-01-16 09:16:38 +00:00
|
|
|
"mark_static_initialized {:?}, mutability: {:?}",
|
2017-08-10 15:48:38 +00:00
|
|
|
alloc_id,
|
|
|
|
mutability
|
|
|
|
);
|
2018-08-23 17:04:33 +00:00
|
|
|
// remove allocation
|
|
|
|
let (kind, mut alloc) = self.alloc_map.remove(&alloc_id).unwrap();
|
|
|
|
match kind {
|
|
|
|
MemoryKind::Machine(_) => bug!("Static cannot refer to machine memory"),
|
2018-09-21 21:32:59 +00:00
|
|
|
MemoryKind::Stack | MemoryKind::Vtable => {},
|
2018-08-23 17:04:33 +00:00
|
|
|
}
|
|
|
|
// ensure llvm knows not to put this into immutable memory
|
|
|
|
alloc.mutability = mutability;
|
|
|
|
let alloc = self.tcx.intern_const_alloc(alloc);
|
|
|
|
self.tcx.alloc_map.lock().set_id_memory(alloc_id, alloc);
|
|
|
|
// recurse into inner allocations
|
2018-09-21 21:32:59 +00:00
|
|
|
for &(_, alloc) in alloc.relocations.values() {
|
2018-08-23 17:04:33 +00:00
|
|
|
// FIXME: Reusing the mutability here is likely incorrect. It is originally
|
|
|
|
// determined via `is_freeze`, and data is considered frozen if there is no
|
|
|
|
// `UnsafeCell` *immediately* in that data -- however, this search stops
|
|
|
|
// at references. So whenever we follow a reference, we should likely
|
|
|
|
// assume immutability -- and we should make sure that the compiler
|
|
|
|
// does not permit code that would break this!
|
2018-08-24 15:36:18 +00:00
|
|
|
if self.alloc_map.contains_key(&alloc) {
|
|
|
|
// Not yet interned, so proceed recursively
|
|
|
|
self.intern_static(alloc, mutability)?;
|
|
|
|
}
|
2017-12-06 08:25:29 +00:00
|
|
|
}
|
2018-08-23 17:04:33 +00:00
|
|
|
Ok(())
|
|
|
|
}
|
2018-09-21 21:32:59 +00:00
|
|
|
}
|
2018-08-23 17:04:33 +00:00
|
|
|
|
2018-09-21 21:32:59 +00:00
|
|
|
/// Reading and writing
|
|
|
|
impl<'a, 'mir, 'tcx, M: Machine<'a, 'mir, 'tcx>> Memory<'a, 'mir, 'tcx, M> {
|
2017-08-10 15:48:38 +00:00
|
|
|
pub fn copy(
|
|
|
|
&mut self,
|
2018-09-21 21:32:59 +00:00
|
|
|
src: Scalar<M::PointerTag>,
|
2017-12-17 06:47:22 +00:00
|
|
|
src_align: Align,
|
2018-09-21 21:32:59 +00:00
|
|
|
dest: Scalar<M::PointerTag>,
|
2017-12-17 06:47:22 +00:00
|
|
|
dest_align: Align,
|
2018-05-19 14:37:29 +00:00
|
|
|
size: Size,
|
2017-08-10 15:48:38 +00:00
|
|
|
nonoverlapping: bool,
|
2018-06-27 02:59:10 +00:00
|
|
|
) -> EvalResult<'tcx> {
|
|
|
|
self.copy_repeatedly(src, src_align, dest, dest_align, size, 1, nonoverlapping)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn copy_repeatedly(
|
|
|
|
&mut self,
|
2018-09-21 21:32:59 +00:00
|
|
|
src: Scalar<M::PointerTag>,
|
2018-06-27 02:59:10 +00:00
|
|
|
src_align: Align,
|
2018-09-21 21:32:59 +00:00
|
|
|
dest: Scalar<M::PointerTag>,
|
2018-06-27 02:59:10 +00:00
|
|
|
dest_align: Align,
|
|
|
|
size: Size,
|
|
|
|
length: u64,
|
|
|
|
nonoverlapping: bool,
|
2017-08-10 15:48:38 +00:00
|
|
|
) -> EvalResult<'tcx> {
|
2018-05-19 14:37:29 +00:00
|
|
|
if size.bytes() == 0 {
|
2018-08-18 09:53:15 +00:00
|
|
|
// Nothing to do for ZST, other than checking alignment and non-NULLness.
|
|
|
|
self.check_align(src, src_align)?;
|
|
|
|
self.check_align(dest, dest_align)?;
|
2016-09-22 13:22:00 +00:00
|
|
|
return Ok(());
|
|
|
|
}
|
2017-06-20 12:26:50 +00:00
|
|
|
let src = src.to_ptr()?;
|
|
|
|
let dest = dest.to_ptr()?;
|
2016-03-21 11:27:34 +00:00
|
|
|
|
2017-08-28 12:08:55 +00:00
|
|
|
// first copy the relocations to a temporary buffer, because
|
|
|
|
// `get_bytes_mut` will clear the relocations, which is correct,
|
|
|
|
// since we don't want to keep any relocations at the target.
|
2018-08-29 08:07:27 +00:00
|
|
|
// (`get_bytes_with_undef_and_ptr` below checks that there are no
|
|
|
|
// relocations overlapping the edges; those would not be handled correctly).
|
2018-06-30 04:44:58 +00:00
|
|
|
let relocations = {
|
|
|
|
let relocations = self.relocations(src, size)?;
|
|
|
|
let mut new_relocations = Vec::with_capacity(relocations.len() * (length as usize));
|
|
|
|
for i in 0..length {
|
|
|
|
new_relocations.extend(
|
|
|
|
relocations
|
|
|
|
.iter()
|
2018-09-21 21:32:59 +00:00
|
|
|
.map(|&(offset, reloc)| {
|
2018-08-22 19:59:14 +00:00
|
|
|
(offset + dest.offset - src.offset + (i * size * relocations.len() as u64),
|
2018-09-21 21:32:59 +00:00
|
|
|
reloc)
|
2018-06-30 04:44:58 +00:00
|
|
|
})
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
new_relocations
|
|
|
|
};
|
2017-08-28 12:08:55 +00:00
|
|
|
|
2018-08-29 08:07:27 +00:00
|
|
|
// This also checks alignment, and relocation edges on the src.
|
2018-08-28 15:49:24 +00:00
|
|
|
let src_bytes = self.get_bytes_with_undef_and_ptr(src, size, src_align)?.as_ptr();
|
2018-06-27 02:59:10 +00:00
|
|
|
let dest_bytes = self.get_bytes_mut(dest, size * length, dest_align)?.as_mut_ptr();
|
2016-03-05 06:48:23 +00:00
|
|
|
|
|
|
|
// SAFE: The above indexing would have panicked if there weren't at least `size` bytes
|
|
|
|
// behind `src` and `dest`. Also, we use the overlapping-safe `ptr::copy` if `src` and
|
|
|
|
// `dest` could possibly overlap.
|
2018-10-05 08:28:33 +00:00
|
|
|
// The pointers above remain valid even if the `HashMap` table is moved around because they
|
2018-09-29 07:51:38 +00:00
|
|
|
// point into the `Vec` storing the bytes.
|
2016-03-05 06:48:23 +00:00
|
|
|
unsafe {
|
2018-05-19 14:37:29 +00:00
|
|
|
assert_eq!(size.bytes() as usize as u64, size.bytes());
|
2016-03-05 06:48:23 +00:00
|
|
|
if src.alloc_id == dest.alloc_id {
|
2017-07-04 03:27:09 +00:00
|
|
|
if nonoverlapping {
|
|
|
|
if (src.offset <= dest.offset && src.offset + size > dest.offset) ||
|
2017-08-10 15:48:38 +00:00
|
|
|
(dest.offset <= src.offset && dest.offset + size > src.offset)
|
|
|
|
{
|
|
|
|
return err!(Intrinsic(
|
2018-07-28 12:40:32 +00:00
|
|
|
"copy_nonoverlapping called on overlapping ranges".to_string(),
|
2017-08-10 15:48:38 +00:00
|
|
|
));
|
2017-07-04 03:27:09 +00:00
|
|
|
}
|
|
|
|
}
|
2018-06-27 02:59:10 +00:00
|
|
|
|
|
|
|
for i in 0..length {
|
2018-08-22 19:59:14 +00:00
|
|
|
ptr::copy(src_bytes,
|
|
|
|
dest_bytes.offset((size.bytes() * i) as isize),
|
|
|
|
size.bytes() as usize);
|
2018-06-27 02:59:10 +00:00
|
|
|
}
|
2016-03-05 06:48:23 +00:00
|
|
|
} else {
|
2018-06-27 02:59:10 +00:00
|
|
|
for i in 0..length {
|
2018-08-22 19:59:14 +00:00
|
|
|
ptr::copy_nonoverlapping(src_bytes,
|
|
|
|
dest_bytes.offset((size.bytes() * i) as isize),
|
|
|
|
size.bytes() as usize);
|
2018-06-27 02:59:10 +00:00
|
|
|
}
|
2016-03-05 06:48:23 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-08-29 08:07:27 +00:00
|
|
|
// copy definedness to the destination
|
2018-06-30 18:23:41 +00:00
|
|
|
self.copy_undef_mask(src, dest, size, length)?;
|
2018-08-29 08:07:27 +00:00
|
|
|
// copy the relocations to the destination
|
2018-05-18 14:06:20 +00:00
|
|
|
self.get_mut(dest.alloc_id)?.relocations.insert_presorted(relocations);
|
2016-04-06 10:08:52 +00:00
|
|
|
|
|
|
|
Ok(())
|
2016-03-05 06:48:23 +00:00
|
|
|
}
|
|
|
|
|
2018-09-21 21:32:59 +00:00
|
|
|
pub fn read_c_str(&self, ptr: Pointer<M::PointerTag>) -> EvalResult<'tcx, &[u8]> {
|
2016-12-17 01:10:16 +00:00
|
|
|
let alloc = self.get(ptr.alloc_id)?;
|
2018-05-19 14:37:29 +00:00
|
|
|
assert_eq!(ptr.offset.bytes() as usize as u64, ptr.offset.bytes());
|
|
|
|
let offset = ptr.offset.bytes() as usize;
|
2016-12-17 01:10:16 +00:00
|
|
|
match alloc.bytes[offset..].iter().position(|&c| c == 0) {
|
|
|
|
Some(size) => {
|
2018-05-19 14:37:29 +00:00
|
|
|
let p1 = Size::from_bytes((size + 1) as u64);
|
2018-08-29 08:07:27 +00:00
|
|
|
self.check_relocations(ptr, p1)?;
|
2018-05-19 14:37:29 +00:00
|
|
|
self.check_defined(ptr, p1)?;
|
2016-12-17 01:10:16 +00:00
|
|
|
Ok(&alloc.bytes[offset..offset + size])
|
2017-08-10 15:48:38 +00:00
|
|
|
}
|
2018-09-21 21:32:59 +00:00
|
|
|
None => err!(UnterminatedCString(ptr.erase_tag())),
|
2016-12-17 01:10:16 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-10-11 09:15:30 +00:00
|
|
|
pub fn check_bytes(
|
|
|
|
&self,
|
|
|
|
ptr: Scalar<M::PointerTag>,
|
|
|
|
size: Size,
|
2018-10-12 08:56:47 +00:00
|
|
|
allow_ptr_and_undef: bool,
|
2018-10-11 09:15:30 +00:00
|
|
|
) -> EvalResult<'tcx> {
|
|
|
|
// Empty accesses don't need to be valid pointers, but they should still be non-NULL
|
|
|
|
let align = Align::from_bytes(1, 1).unwrap();
|
|
|
|
if size.bytes() == 0 {
|
|
|
|
self.check_align(ptr, align)?;
|
|
|
|
return Ok(());
|
|
|
|
}
|
|
|
|
let ptr = ptr.to_ptr()?;
|
2018-10-11 11:13:14 +00:00
|
|
|
// Check bounds, align and relocations on the edges
|
2018-10-11 09:15:30 +00:00
|
|
|
self.get_bytes_with_undef_and_ptr(ptr, size, align)?;
|
2018-10-12 08:56:47 +00:00
|
|
|
// Check undef and ptr
|
|
|
|
if !allow_ptr_and_undef {
|
|
|
|
self.check_defined(ptr, size)?;
|
2018-10-11 09:15:30 +00:00
|
|
|
self.check_relocations(ptr, size)?;
|
|
|
|
}
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2018-09-21 21:32:59 +00:00
|
|
|
pub fn read_bytes(&self, ptr: Scalar<M::PointerTag>, size: Size) -> EvalResult<'tcx, &[u8]> {
|
2017-08-25 12:41:59 +00:00
|
|
|
// Empty accesses don't need to be valid pointers, but they should still be non-NULL
|
2017-12-17 06:47:22 +00:00
|
|
|
let align = Align::from_bytes(1, 1).unwrap();
|
2018-05-19 14:37:29 +00:00
|
|
|
if size.bytes() == 0 {
|
2018-08-18 09:53:15 +00:00
|
|
|
self.check_align(ptr, align)?;
|
2017-06-20 14:26:53 +00:00
|
|
|
return Ok(&[]);
|
|
|
|
}
|
2017-12-17 06:47:22 +00:00
|
|
|
self.get_bytes(ptr.to_ptr()?, size, align)
|
2016-04-15 09:16:35 +00:00
|
|
|
}
|
|
|
|
|
2018-09-21 21:32:59 +00:00
|
|
|
pub fn write_bytes(&mut self, ptr: Scalar<M::PointerTag>, src: &[u8]) -> EvalResult<'tcx> {
|
2017-08-25 12:41:59 +00:00
|
|
|
// Empty accesses don't need to be valid pointers, but they should still be non-NULL
|
2017-12-17 06:47:22 +00:00
|
|
|
let align = Align::from_bytes(1, 1).unwrap();
|
2017-06-20 14:26:53 +00:00
|
|
|
if src.is_empty() {
|
2018-08-18 09:53:15 +00:00
|
|
|
self.check_align(ptr, align)?;
|
2017-06-20 14:26:53 +00:00
|
|
|
return Ok(());
|
|
|
|
}
|
2018-05-19 14:37:29 +00:00
|
|
|
let bytes = self.get_bytes_mut(ptr.to_ptr()?, Size::from_bytes(src.len() as u64), align)?;
|
2016-04-07 11:56:07 +00:00
|
|
|
bytes.clone_from_slice(src);
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2018-09-21 21:32:59 +00:00
|
|
|
pub fn write_repeat(
|
|
|
|
&mut self,
|
|
|
|
ptr: Scalar<M::PointerTag>,
|
|
|
|
val: u8,
|
|
|
|
count: Size
|
|
|
|
) -> EvalResult<'tcx> {
|
2017-08-25 12:41:59 +00:00
|
|
|
// Empty accesses don't need to be valid pointers, but they should still be non-NULL
|
2017-12-17 06:47:22 +00:00
|
|
|
let align = Align::from_bytes(1, 1).unwrap();
|
2018-05-19 14:37:29 +00:00
|
|
|
if count.bytes() == 0 {
|
2018-08-18 09:53:15 +00:00
|
|
|
self.check_align(ptr, align)?;
|
2017-06-20 14:26:53 +00:00
|
|
|
return Ok(());
|
|
|
|
}
|
2017-12-17 06:47:22 +00:00
|
|
|
let bytes = self.get_bytes_mut(ptr.to_ptr()?, count, align)?;
|
2017-08-10 15:48:38 +00:00
|
|
|
for b in bytes {
|
|
|
|
*b = val;
|
|
|
|
}
|
2016-04-07 11:56:07 +00:00
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2018-08-17 15:47:37 +00:00
|
|
|
/// Read a *non-ZST* scalar
|
2018-08-23 16:34:21 +00:00
|
|
|
pub fn read_scalar(
|
|
|
|
&self,
|
2018-09-21 21:32:59 +00:00
|
|
|
ptr: Pointer<M::PointerTag>,
|
2018-08-23 16:34:21 +00:00
|
|
|
ptr_align: Align,
|
|
|
|
size: Size
|
2018-09-21 21:32:59 +00:00
|
|
|
) -> EvalResult<'tcx, ScalarMaybeUndef<M::PointerTag>> {
|
2018-08-29 08:07:27 +00:00
|
|
|
// get_bytes_unchecked tests alignment and relocation edges
|
2018-08-28 15:49:24 +00:00
|
|
|
let bytes = self.get_bytes_with_undef_and_ptr(
|
|
|
|
ptr, size, ptr_align.min(self.int_align(size))
|
|
|
|
)?;
|
2017-07-20 03:24:09 +00:00
|
|
|
// Undef check happens *after* we established that the alignment is correct.
|
|
|
|
// We must not return Ok() for unaligned pointers!
|
2018-09-02 14:22:46 +00:00
|
|
|
if self.check_defined(ptr, size).is_err() {
|
2018-08-23 17:04:33 +00:00
|
|
|
// this inflates undefined bytes to the entire scalar, even if only a few
|
|
|
|
// bytes are undefined
|
2018-07-24 16:28:53 +00:00
|
|
|
return Ok(ScalarMaybeUndef::Undef);
|
2017-07-20 03:24:09 +00:00
|
|
|
}
|
2017-08-25 14:20:13 +00:00
|
|
|
// Now we do the actual reading
|
2018-08-26 18:42:52 +00:00
|
|
|
let bits = read_target_uint(self.tcx.data_layout.endian, bytes).unwrap();
|
2017-08-25 14:20:13 +00:00
|
|
|
// See if we got a pointer
|
|
|
|
if size != self.pointer_size() {
|
2018-08-29 08:07:27 +00:00
|
|
|
// *Now* better make sure that the inside also is free of relocations.
|
|
|
|
self.check_relocations(ptr, size)?;
|
2017-08-25 14:20:13 +00:00
|
|
|
} else {
|
|
|
|
let alloc = self.get(ptr.alloc_id)?;
|
|
|
|
match alloc.relocations.get(&ptr.offset) {
|
2018-09-21 21:32:59 +00:00
|
|
|
Some(&(tag, alloc_id)) => {
|
|
|
|
let ptr = Pointer::new_with_tag(alloc_id, Size::from_bytes(bits as u64), tag);
|
2018-08-22 19:59:14 +00:00
|
|
|
return Ok(ScalarMaybeUndef::Scalar(ptr.into()))
|
|
|
|
}
|
2017-08-25 14:20:13 +00:00
|
|
|
None => {},
|
|
|
|
}
|
2016-03-17 13:24:10 +00:00
|
|
|
}
|
2018-05-22 08:28:46 +00:00
|
|
|
// We don't. Just return the bits.
|
2018-08-26 18:42:52 +00:00
|
|
|
Ok(ScalarMaybeUndef::Scalar(Scalar::from_uint(bits, size)))
|
2017-08-25 14:20:13 +00:00
|
|
|
}
|
|
|
|
|
2018-09-21 21:32:59 +00:00
|
|
|
pub fn read_ptr_sized(
|
|
|
|
&self,
|
|
|
|
ptr: Pointer<M::PointerTag>,
|
|
|
|
ptr_align: Align
|
|
|
|
) -> EvalResult<'tcx, ScalarMaybeUndef<M::PointerTag>> {
|
2018-05-22 17:30:16 +00:00
|
|
|
self.read_scalar(ptr, ptr_align, self.pointer_size())
|
2016-03-13 20:36:25 +00:00
|
|
|
}
|
|
|
|
|
2018-08-17 15:47:37 +00:00
|
|
|
/// Write a *non-ZST* scalar
|
2018-08-01 10:55:05 +00:00
|
|
|
pub fn write_scalar(
|
|
|
|
&mut self,
|
2018-09-21 21:32:59 +00:00
|
|
|
ptr: Pointer<M::PointerTag>,
|
2018-08-01 10:55:05 +00:00
|
|
|
ptr_align: Align,
|
2018-09-21 21:32:59 +00:00
|
|
|
val: ScalarMaybeUndef<M::PointerTag>,
|
2018-08-01 10:55:05 +00:00
|
|
|
type_size: Size,
|
|
|
|
) -> EvalResult<'tcx> {
|
2018-07-24 16:28:53 +00:00
|
|
|
let val = match val {
|
|
|
|
ScalarMaybeUndef::Scalar(scalar) => scalar,
|
|
|
|
ScalarMaybeUndef::Undef => return self.mark_definedness(ptr, type_size, false),
|
|
|
|
};
|
|
|
|
|
2017-08-25 16:25:05 +00:00
|
|
|
let bytes = match val {
|
2018-05-20 21:43:16 +00:00
|
|
|
Scalar::Ptr(val) => {
|
2018-07-24 16:28:53 +00:00
|
|
|
assert_eq!(type_size, self.pointer_size());
|
2018-05-19 14:37:29 +00:00
|
|
|
val.offset.bytes() as u128
|
2016-12-17 09:36:02 +00:00
|
|
|
}
|
|
|
|
|
2018-07-24 16:28:53 +00:00
|
|
|
Scalar::Bits { bits, size } => {
|
|
|
|
assert_eq!(size as u64, type_size.bytes());
|
2018-08-26 18:42:52 +00:00
|
|
|
debug_assert_eq!(truncate(bits, Size::from_bytes(size.into())), bits,
|
2018-08-16 09:38:16 +00:00
|
|
|
"Unexpected value of size {} when writing to memory", size);
|
2018-07-24 16:28:53 +00:00
|
|
|
bits
|
|
|
|
},
|
2017-08-25 16:25:05 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
{
|
2018-08-17 15:47:37 +00:00
|
|
|
// get_bytes_mut checks alignment
|
2018-08-26 18:42:52 +00:00
|
|
|
let endian = self.tcx.data_layout.endian;
|
2018-08-17 15:47:37 +00:00
|
|
|
let dst = self.get_bytes_mut(ptr, type_size, ptr_align)?;
|
2018-08-26 18:42:52 +00:00
|
|
|
write_target_uint(endian, dst, bytes).unwrap();
|
2017-08-25 16:25:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// See if we have to also write a relocation
|
|
|
|
match val {
|
2018-05-20 21:43:16 +00:00
|
|
|
Scalar::Ptr(val) => {
|
2017-08-25 16:25:05 +00:00
|
|
|
self.get_mut(ptr.alloc_id)?.relocations.insert(
|
|
|
|
ptr.offset,
|
2018-09-21 21:32:59 +00:00
|
|
|
(val.tag, val.alloc_id),
|
2017-08-25 16:25:05 +00:00
|
|
|
);
|
|
|
|
}
|
|
|
|
_ => {}
|
2016-12-17 09:36:02 +00:00
|
|
|
}
|
2017-08-25 16:25:05 +00:00
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2018-09-21 21:32:59 +00:00
|
|
|
pub fn write_ptr_sized(
|
|
|
|
&mut self,
|
|
|
|
ptr: Pointer<M::PointerTag>,
|
|
|
|
ptr_align: Align,
|
|
|
|
val: ScalarMaybeUndef<M::PointerTag>
|
|
|
|
) -> EvalResult<'tcx> {
|
2017-08-25 16:25:05 +00:00
|
|
|
let ptr_size = self.pointer_size();
|
2018-08-17 15:47:37 +00:00
|
|
|
self.write_scalar(ptr.into(), ptr_align, val, ptr_size)
|
2016-03-07 10:44:03 +00:00
|
|
|
}
|
|
|
|
|
2018-05-19 14:37:29 +00:00
|
|
|
fn int_align(&self, size: Size) -> Align {
|
2017-08-25 14:20:13 +00:00
|
|
|
// We assume pointer-sized integers have the same alignment as pointers.
|
2017-08-28 13:58:58 +00:00
|
|
|
// We also assume signed and unsigned integers of the same size have the same alignment.
|
2018-05-19 14:37:29 +00:00
|
|
|
let ity = match size.bytes() {
|
2017-12-17 06:47:22 +00:00
|
|
|
1 => layout::I8,
|
|
|
|
2 => layout::I16,
|
|
|
|
4 => layout::I32,
|
|
|
|
8 => layout::I64,
|
|
|
|
16 => layout::I128,
|
2018-05-19 14:37:29 +00:00
|
|
|
_ => bug!("bad integer size: {}", size.bytes()),
|
2017-12-17 06:47:22 +00:00
|
|
|
};
|
|
|
|
ity.align(self)
|
2016-07-06 09:12:44 +00:00
|
|
|
}
|
2016-06-23 07:40:01 +00:00
|
|
|
}
|
2016-03-05 06:48:23 +00:00
|
|
|
|
2016-06-23 07:40:01 +00:00
|
|
|
/// Relocations
|
2018-09-20 08:12:21 +00:00
|
|
|
impl<'a, 'mir, 'tcx, M: Machine<'a, 'mir, 'tcx>> Memory<'a, 'mir, 'tcx, M> {
|
2018-08-29 08:07:27 +00:00
|
|
|
/// Return all relocations overlapping with the given ptr-offset pair.
|
2017-08-10 15:48:38 +00:00
|
|
|
fn relocations(
|
|
|
|
&self,
|
2018-09-21 21:32:59 +00:00
|
|
|
ptr: Pointer<M::PointerTag>,
|
2018-05-19 14:37:29 +00:00
|
|
|
size: Size,
|
2018-09-21 21:32:59 +00:00
|
|
|
) -> EvalResult<'tcx, &[(Size, (M::PointerTag, AllocId))]> {
|
2018-08-29 08:07:27 +00:00
|
|
|
// We have to go back `pointer_size - 1` bytes, as that one would still overlap with
|
|
|
|
// the beginning of this range.
|
2018-05-19 14:37:29 +00:00
|
|
|
let start = ptr.offset.bytes().saturating_sub(self.pointer_size().bytes() - 1);
|
2018-08-29 08:07:27 +00:00
|
|
|
let end = ptr.offset + size; // this does overflow checking
|
2018-05-19 14:37:29 +00:00
|
|
|
Ok(self.get(ptr.alloc_id)?.relocations.range(Size::from_bytes(start)..end))
|
2016-03-05 06:48:23 +00:00
|
|
|
}
|
|
|
|
|
2018-08-29 08:07:27 +00:00
|
|
|
/// Check that there ar eno relocations overlapping with the given range.
|
|
|
|
#[inline(always)]
|
2018-09-21 21:32:59 +00:00
|
|
|
fn check_relocations(&self, ptr: Pointer<M::PointerTag>, size: Size) -> EvalResult<'tcx> {
|
2018-08-29 08:07:27 +00:00
|
|
|
if self.relocations(ptr, size)?.len() != 0 {
|
|
|
|
err!(ReadPointerAsBytes)
|
|
|
|
} else {
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Remove all relocations inside the given range.
|
|
|
|
/// If there are relocations overlapping with the edges, they
|
|
|
|
/// are removed as well *and* the bytes they cover are marked as
|
|
|
|
/// uninitialized. This is a somewhat odd "spooky action at a distance",
|
|
|
|
/// but it allows strictly more code to run than if we would just error
|
|
|
|
/// immediately in that case.
|
2018-09-21 21:32:59 +00:00
|
|
|
fn clear_relocations(&mut self, ptr: Pointer<M::PointerTag>, size: Size) -> EvalResult<'tcx> {
|
2016-03-27 06:29:02 +00:00
|
|
|
// Find the start and end of the given range and its outermost relocations.
|
2018-05-18 14:06:20 +00:00
|
|
|
let (first, last) = {
|
|
|
|
// Find all relocations overlapping the given range.
|
|
|
|
let relocations = self.relocations(ptr, size)?;
|
|
|
|
if relocations.is_empty() {
|
|
|
|
return Ok(());
|
|
|
|
}
|
|
|
|
|
|
|
|
(relocations.first().unwrap().0,
|
|
|
|
relocations.last().unwrap().0 + self.pointer_size())
|
|
|
|
};
|
2016-03-27 06:29:02 +00:00
|
|
|
let start = ptr.offset;
|
|
|
|
let end = start + size;
|
|
|
|
|
2016-05-10 00:52:44 +00:00
|
|
|
let alloc = self.get_mut(ptr.alloc_id)?;
|
2016-03-27 06:29:02 +00:00
|
|
|
|
|
|
|
// Mark parts of the outermost relocations as undefined if they partially fall outside the
|
|
|
|
// given range.
|
2017-08-10 15:48:38 +00:00
|
|
|
if first < start {
|
|
|
|
alloc.undef_mask.set_range(first, start, false);
|
|
|
|
}
|
|
|
|
if last > end {
|
|
|
|
alloc.undef_mask.set_range(end, last, false);
|
|
|
|
}
|
2016-03-27 06:29:02 +00:00
|
|
|
|
|
|
|
// Forget all the relocations.
|
2018-05-30 13:59:42 +00:00
|
|
|
alloc.relocations.remove_range(first..last);
|
2016-03-27 06:29:02 +00:00
|
|
|
|
2016-03-24 03:40:58 +00:00
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2018-08-29 08:07:27 +00:00
|
|
|
/// Error if there are relocations overlapping with the egdes of the
|
|
|
|
/// given memory range.
|
|
|
|
#[inline]
|
2018-09-21 21:32:59 +00:00
|
|
|
fn check_relocation_edges(&self, ptr: Pointer<M::PointerTag>, size: Size) -> EvalResult<'tcx> {
|
2018-08-29 08:07:27 +00:00
|
|
|
self.check_relocations(ptr, Size::ZERO)?;
|
|
|
|
self.check_relocations(ptr.offset(size, self)?, Size::ZERO)?;
|
2016-03-24 03:40:58 +00:00
|
|
|
Ok(())
|
|
|
|
}
|
2016-06-23 07:40:01 +00:00
|
|
|
}
|
2016-03-27 04:25:08 +00:00
|
|
|
|
2016-06-23 07:40:01 +00:00
|
|
|
/// Undefined bytes
|
2018-09-20 08:12:21 +00:00
|
|
|
impl<'a, 'mir, 'tcx, M: Machine<'a, 'mir, 'tcx>> Memory<'a, 'mir, 'tcx, M> {
|
2018-10-03 02:11:38 +00:00
|
|
|
// FIXME: Add a fast version for the common, nonoverlapping case
|
2017-08-10 15:48:38 +00:00
|
|
|
fn copy_undef_mask(
|
|
|
|
&mut self,
|
2018-09-21 21:32:59 +00:00
|
|
|
src: Pointer<M::PointerTag>,
|
|
|
|
dest: Pointer<M::PointerTag>,
|
2018-05-19 14:37:29 +00:00
|
|
|
size: Size,
|
2018-06-30 18:23:41 +00:00
|
|
|
repeat: u64,
|
2017-08-10 15:48:38 +00:00
|
|
|
) -> EvalResult<'tcx> {
|
2016-04-06 10:08:52 +00:00
|
|
|
// The bits have to be saved locally before writing to dest in case src and dest overlap.
|
2018-05-19 14:37:29 +00:00
|
|
|
assert_eq!(size.bytes() as usize as u64, size.bytes());
|
2018-06-30 00:22:35 +00:00
|
|
|
|
2018-06-30 02:26:15 +00:00
|
|
|
let undef_mask = self.get(src.alloc_id)?.undef_mask.clone();
|
|
|
|
let dest_allocation = self.get_mut(dest.alloc_id)?;
|
2018-06-30 00:22:35 +00:00
|
|
|
|
2018-05-19 14:37:29 +00:00
|
|
|
for i in 0..size.bytes() {
|
2018-06-30 02:26:15 +00:00
|
|
|
let defined = undef_mask.get(src.offset + Size::from_bytes(i));
|
2018-06-22 04:40:14 +00:00
|
|
|
|
2018-06-30 18:23:41 +00:00
|
|
|
for j in 0..repeat {
|
|
|
|
dest_allocation.undef_mask.set(
|
|
|
|
dest.offset + Size::from_bytes(i + (size.bytes() * j)),
|
|
|
|
defined
|
|
|
|
);
|
|
|
|
}
|
2016-04-06 10:08:52 +00:00
|
|
|
}
|
2018-06-30 00:22:35 +00:00
|
|
|
|
2016-04-06 10:08:52 +00:00
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2018-09-02 14:22:46 +00:00
|
|
|
/// Checks that a range of bytes is defined. If not, returns the `ReadUndefBytes`
|
|
|
|
/// error which will report the first byte which is undefined.
|
|
|
|
#[inline]
|
2018-09-21 21:32:59 +00:00
|
|
|
fn check_defined(&self, ptr: Pointer<M::PointerTag>, size: Size) -> EvalResult<'tcx> {
|
2016-05-10 00:52:44 +00:00
|
|
|
let alloc = self.get(ptr.alloc_id)?;
|
2018-09-02 14:22:46 +00:00
|
|
|
alloc.undef_mask.is_range_defined(
|
2017-08-10 15:48:38 +00:00
|
|
|
ptr.offset,
|
|
|
|
ptr.offset + size,
|
2018-09-02 14:22:46 +00:00
|
|
|
).or_else(|idx| err!(ReadUndefBytes(idx)))
|
2016-03-27 05:56:49 +00:00
|
|
|
}
|
|
|
|
|
2017-02-04 21:09:10 +00:00
|
|
|
pub fn mark_definedness(
|
|
|
|
&mut self,
|
2018-09-21 21:32:59 +00:00
|
|
|
ptr: Pointer<M::PointerTag>,
|
2018-05-19 14:37:29 +00:00
|
|
|
size: Size,
|
2017-08-10 15:48:38 +00:00
|
|
|
new_state: bool,
|
2017-02-04 21:09:10 +00:00
|
|
|
) -> EvalResult<'tcx> {
|
2018-05-19 14:37:29 +00:00
|
|
|
if size.bytes() == 0 {
|
2017-08-10 15:48:38 +00:00
|
|
|
return Ok(());
|
2016-09-22 13:22:00 +00:00
|
|
|
}
|
2017-08-12 16:45:44 +00:00
|
|
|
let alloc = self.get_mut(ptr.alloc_id)?;
|
2017-08-10 15:48:38 +00:00
|
|
|
alloc.undef_mask.set_range(
|
|
|
|
ptr.offset,
|
|
|
|
ptr.offset + size,
|
|
|
|
new_state,
|
|
|
|
);
|
2016-03-27 04:25:08 +00:00
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
}
|