miri/shims/unix/
mem.rs

1//! This is an incomplete implementation of mmap/munmap which is restricted in order to be
2//! implementable on top of the existing memory system. The point of these function as-written is
3//! to allow memory allocators written entirely in Rust to be executed by Miri. This implementation
4//! does not support other uses of mmap such as file mappings.
5//!
6//! mmap/munmap behave a lot like alloc/dealloc, and for simple use they are exactly
7//! equivalent. That is the only part we support: no MAP_FIXED or MAP_SHARED or anything
8//! else that goes beyond a basic allocation API.
9//!
10//! Note that in addition to only supporting malloc-like calls to mmap, we only support free-like
11//! calls to munmap, but for a very different reason. In principle, according to the man pages, it
12//! is possible to unmap arbitrary regions of address space. But in a high-level language like Rust
13//! this amounts to partial deallocation, which LLVM does not support. So any attempt to call our
14//! munmap shim which would partially unmap a region of address space previously mapped by mmap will
15//! report UB.
16
17use rustc_abi::Size;
18use rustc_target::spec::Os;
19
20use crate::*;
21
22impl<'tcx> EvalContextExt<'tcx> for crate::MiriInterpCx<'tcx> {}
23pub trait EvalContextExt<'tcx>: crate::MiriInterpCxExt<'tcx> {
24    fn mmap(
25        &mut self,
26        addr: &OpTy<'tcx>,
27        length: &OpTy<'tcx>,
28        prot: &OpTy<'tcx>,
29        flags: &OpTy<'tcx>,
30        fd: &OpTy<'tcx>,
31        offset: i128,
32    ) -> InterpResult<'tcx, Scalar> {
33        let this = self.eval_context_mut();
34
35        // We do not support MAP_FIXED, so the addr argument is always ignored (except for the MacOS hack)
36        let addr = this.read_target_usize(addr)?;
37        let length = this.read_target_usize(length)?;
38        let prot = this.read_scalar(prot)?.to_i32()?;
39        let flags = this.read_scalar(flags)?.to_i32()?;
40        let fd = this.read_scalar(fd)?.to_i32()?;
41
42        let map_private = this.eval_libc_i32("MAP_PRIVATE");
43        let map_anonymous = this.eval_libc_i32("MAP_ANONYMOUS");
44        let map_shared = this.eval_libc_i32("MAP_SHARED");
45        let map_fixed = this.eval_libc_i32("MAP_FIXED");
46
47        // This is a horrible hack, but on MacOS and Solarish the guard page mechanism uses mmap
48        // in a way we do not support. We just give it the return value it expects.
49        if this.frame_in_std()
50            && matches!(&this.tcx.sess.target.os, Os::MacOs | Os::Solaris | Os::Illumos)
51            && (flags & map_fixed) != 0
52        {
53            return interp_ok(Scalar::from_maybe_pointer(Pointer::without_provenance(addr), this));
54        }
55
56        let prot_read = this.eval_libc_i32("PROT_READ");
57        let prot_write = this.eval_libc_i32("PROT_WRITE");
58
59        // First, we do some basic argument validation as required by mmap
60        if (flags & (map_private | map_shared)).count_ones() != 1 {
61            this.set_last_error(LibcError("EINVAL"))?;
62            return interp_ok(this.eval_libc("MAP_FAILED"));
63        }
64        if length == 0 {
65            this.set_last_error(LibcError("EINVAL"))?;
66            return interp_ok(this.eval_libc("MAP_FAILED"));
67        }
68
69        // If a user tries to map a file, we want to loudly inform them that this is not going
70        // to work. It is possible that POSIX gives us enough leeway to return an error, but the
71        // outcome for the user (I need to add cfg(miri)) is the same, just more frustrating.
72        if fd != -1 {
73            throw_unsup_format!("Miri does not support file-backed memory mappings");
74        }
75
76        // Miri doesn't support MAP_FIXED.
77        if flags & map_fixed != 0 {
78            throw_unsup_format!(
79                "Miri does not support calls to mmap with MAP_FIXED as part of the flags argument",
80            );
81        }
82
83        // Miri doesn't support protections other than PROT_READ|PROT_WRITE.
84        if prot != prot_read | prot_write {
85            throw_unsup_format!(
86                "Miri does not support calls to mmap with protections other than \
87                 PROT_READ|PROT_WRITE",
88            );
89        }
90
91        // Miri does not support shared mappings, or any of the other extensions that for example
92        // Linux has added to the flags arguments.
93        if flags != map_private | map_anonymous {
94            throw_unsup_format!(
95                "Miri only supports calls to mmap which set the flags argument to \
96                 MAP_PRIVATE|MAP_ANONYMOUS",
97            );
98        }
99
100        // This is only used for file mappings, which we don't support anyway.
101        if offset != 0 {
102            throw_unsup_format!("Miri does not support non-zero offsets to mmap");
103        }
104
105        let align = this.machine.page_align();
106        let Some(map_length) = length.checked_next_multiple_of(this.machine.page_size) else {
107            this.set_last_error(LibcError("EINVAL"))?;
108            return interp_ok(this.eval_libc("MAP_FAILED"));
109        };
110        if map_length > this.target_usize_max() {
111            this.set_last_error(LibcError("EINVAL"))?;
112            return interp_ok(this.eval_libc("MAP_FAILED"));
113        }
114
115        let ptr = this.allocate_ptr(
116            Size::from_bytes(map_length),
117            align,
118            MiriMemoryKind::Mmap.into(),
119            // mmap guarantees new mappings are zero-init.
120            AllocInit::Zero,
121        )?;
122
123        interp_ok(Scalar::from_pointer(ptr, this))
124    }
125
126    fn munmap(&mut self, addr: &OpTy<'tcx>, length: &OpTy<'tcx>) -> InterpResult<'tcx, Scalar> {
127        let this = self.eval_context_mut();
128
129        let addr = this.read_pointer(addr)?;
130        let length = this.read_target_usize(length)?;
131
132        // addr must be a multiple of the page size, but apart from that munmap is just implemented
133        // as a dealloc.
134        if !addr.addr().bytes().is_multiple_of(this.machine.page_size) {
135            return this.set_last_error_and_return_i32(LibcError("EINVAL"));
136        }
137
138        let Some(length) = length.checked_next_multiple_of(this.machine.page_size) else {
139            return this.set_last_error_and_return_i32(LibcError("EINVAL"));
140        };
141        if length > this.target_usize_max() {
142            this.set_last_error(LibcError("EINVAL"))?;
143            return interp_ok(this.eval_libc("MAP_FAILED"));
144        }
145
146        let length = Size::from_bytes(length);
147        this.deallocate_ptr(
148            addr,
149            Some((length, this.machine.page_align())),
150            MemoryKind::Machine(MiriMemoryKind::Mmap),
151        )?;
152
153        interp_ok(Scalar::from_i32(0))
154    }
155}