1//! The memory subsystem.
2//!
3//! Generally, we use `Pointer` to denote memory addresses. However, some operations
4//! have a "size"-like parameter, and they take `Scalar` for the address because
5//! if the size is 0, then the pointer can also be a (properly aligned, non-null)
6//! integer. It is crucial that these operations call `check_align` *before*
7//! short-circuiting the empty case!
89use std::borrow::{Borrow, Cow};
10use std::cell::Cell;
11use std::collections::VecDeque;
12use std::{assert_matches, fmt, ptr};
1314use rustc_abi::{Align, HasDataLayout, Size};
15use rustc_ast::Mutability;
16use rustc_data_structures::fx::{FxHashSet, FxIndexMap};
17use rustc_middle::bug;
18use rustc_middle::mir::display_allocation;
19use rustc_middle::ty::{self, Instance, Ty, TyCtxt};
20use tracing::{debug, instrument, trace};
2122use super::{
23AllocBytes, AllocId, AllocInit, AllocMap, AllocRange, Allocation, CheckAlignMsg,
24CheckInAllocMsg, CtfeProvenance, GlobalAlloc, InterpCx, InterpResult, MPlaceTy, Machine,
25MayLeak, Misalignment, Pointer, PointerArithmetic, Provenance, Scalar, alloc_range, err_ub,
26err_ub_format, interp_ok, throw_ub, throw_ub_format, throw_unsup, throw_unsup_format,
27};
28use crate::const_eval::ConstEvalErrKind;
2930#[derive(#[automatically_derived]
impl<T: ::core::fmt::Debug> ::core::fmt::Debug for MemoryKind<T> {
#[inline]
fn fmt(&self, f: &mut ::core::fmt::Formatter) -> ::core::fmt::Result {
match self {
MemoryKind::Stack =>
::core::fmt::Formatter::write_str(f, "Stack"),
MemoryKind::CallerLocation =>
::core::fmt::Formatter::write_str(f, "CallerLocation"),
MemoryKind::Machine(__self_0) =>
::core::fmt::Formatter::debug_tuple_field1_finish(f,
"Machine", &__self_0),
}
}
}Debug, #[automatically_derived]
impl<T: ::core::cmp::PartialEq> ::core::cmp::PartialEq for MemoryKind<T> {
#[inline]
fn eq(&self, other: &MemoryKind<T>) -> bool {
let __self_discr = ::core::intrinsics::discriminant_value(self);
let __arg1_discr = ::core::intrinsics::discriminant_value(other);
__self_discr == __arg1_discr &&
match (self, other) {
(MemoryKind::Machine(__self_0), MemoryKind::Machine(__arg1_0))
=> __self_0 == __arg1_0,
_ => true,
}
}
}PartialEq, #[automatically_derived]
impl<T: ::core::marker::Copy> ::core::marker::Copy for MemoryKind<T> { }Copy, #[automatically_derived]
impl<T: ::core::clone::Clone> ::core::clone::Clone for MemoryKind<T> {
#[inline]
fn clone(&self) -> MemoryKind<T> {
match self {
MemoryKind::Stack => MemoryKind::Stack,
MemoryKind::CallerLocation => MemoryKind::CallerLocation,
MemoryKind::Machine(__self_0) =>
MemoryKind::Machine(::core::clone::Clone::clone(__self_0)),
}
}
}Clone)]
31pub enum MemoryKind<T> {
32/// Stack memory. Error if deallocated except during a stack pop.
33Stack,
34/// Memory allocated by `caller_location` intrinsic. Error if ever deallocated.
35CallerLocation,
36/// Additional memory kinds a machine wishes to distinguish from the builtin ones.
37Machine(T),
38}
3940impl<T: MayLeak> MayLeakfor MemoryKind<T> {
41#[inline]
42fn may_leak(self) -> bool {
43match self {
44 MemoryKind::Stack => false,
45 MemoryKind::CallerLocation => true,
46 MemoryKind::Machine(k) => k.may_leak(),
47 }
48 }
49}
5051impl<T: fmt::Display> fmt::Displayfor MemoryKind<T> {
52fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
53match self {
54 MemoryKind::Stack => f.write_fmt(format_args!("stack variable"))write!(f, "stack variable"),
55 MemoryKind::CallerLocation => f.write_fmt(format_args!("caller location"))write!(f, "caller location"),
56 MemoryKind::Machine(m) => f.write_fmt(format_args!("{0}", m))write!(f, "{m}"),
57 }
58 }
59}
6061/// The return value of `get_alloc_info` indicates the "kind" of the allocation.
62#[derive(#[automatically_derived]
impl ::core::marker::Copy for AllocKind { }Copy, #[automatically_derived]
impl ::core::clone::Clone for AllocKind {
#[inline]
fn clone(&self) -> AllocKind { *self }
}Clone, #[automatically_derived]
impl ::core::cmp::PartialEq for AllocKind {
#[inline]
fn eq(&self, other: &AllocKind) -> bool {
let __self_discr = ::core::intrinsics::discriminant_value(self);
let __arg1_discr = ::core::intrinsics::discriminant_value(other);
__self_discr == __arg1_discr
}
}PartialEq, #[automatically_derived]
impl ::core::fmt::Debug for AllocKind {
#[inline]
fn fmt(&self, f: &mut ::core::fmt::Formatter) -> ::core::fmt::Result {
::core::fmt::Formatter::write_str(f,
match self {
AllocKind::LiveData => "LiveData",
AllocKind::Function => "Function",
AllocKind::VaList => "VaList",
AllocKind::VTable => "VTable",
AllocKind::TypeId => "TypeId",
AllocKind::Dead => "Dead",
})
}
}Debug)]
63pub enum AllocKind {
64/// A regular live data allocation.
65LiveData,
66/// A function allocation (that fn ptrs point to).
67Function,
68/// A variable argument list allocation (used by c-variadic functions).
69VaList,
70/// A vtable allocation.
71VTable,
72/// A TypeId allocation.
73TypeId,
74/// A dead allocation.
75Dead,
76}
7778/// Metadata about an `AllocId`.
79#[derive(#[automatically_derived]
impl ::core::marker::Copy for AllocInfo { }Copy, #[automatically_derived]
impl ::core::clone::Clone for AllocInfo {
#[inline]
fn clone(&self) -> AllocInfo {
let _: ::core::clone::AssertParamIsClone<Size>;
let _: ::core::clone::AssertParamIsClone<Align>;
let _: ::core::clone::AssertParamIsClone<AllocKind>;
let _: ::core::clone::AssertParamIsClone<Mutability>;
*self
}
}Clone, #[automatically_derived]
impl ::core::cmp::PartialEq for AllocInfo {
#[inline]
fn eq(&self, other: &AllocInfo) -> bool {
self.size == other.size && self.align == other.align &&
self.kind == other.kind && self.mutbl == other.mutbl
}
}PartialEq, #[automatically_derived]
impl ::core::fmt::Debug for AllocInfo {
#[inline]
fn fmt(&self, f: &mut ::core::fmt::Formatter) -> ::core::fmt::Result {
::core::fmt::Formatter::debug_struct_field4_finish(f, "AllocInfo",
"size", &self.size, "align", &self.align, "kind", &self.kind,
"mutbl", &&self.mutbl)
}
}Debug)]
80pub struct AllocInfo {
81pub size: Size,
82pub align: Align,
83pub kind: AllocKind,
84pub mutbl: Mutability,
85}
8687impl AllocInfo {
88fn new(size: Size, align: Align, kind: AllocKind, mutbl: Mutability) -> Self {
89Self { size, align, kind, mutbl }
90 }
91}
9293/// The value of a function pointer.
94#[derive(#[automatically_derived]
impl<'tcx, Other: ::core::fmt::Debug> ::core::fmt::Debug for
FnVal<'tcx, Other> {
#[inline]
fn fmt(&self, f: &mut ::core::fmt::Formatter) -> ::core::fmt::Result {
match self {
FnVal::Instance(__self_0) =>
::core::fmt::Formatter::debug_tuple_field1_finish(f,
"Instance", &__self_0),
FnVal::Other(__self_0) =>
::core::fmt::Formatter::debug_tuple_field1_finish(f, "Other",
&__self_0),
}
}
}Debug, #[automatically_derived]
impl<'tcx, Other: ::core::marker::Copy> ::core::marker::Copy for
FnVal<'tcx, Other> {
}Copy, #[automatically_derived]
impl<'tcx, Other: ::core::clone::Clone> ::core::clone::Clone for
FnVal<'tcx, Other> {
#[inline]
fn clone(&self) -> FnVal<'tcx, Other> {
match self {
FnVal::Instance(__self_0) =>
FnVal::Instance(::core::clone::Clone::clone(__self_0)),
FnVal::Other(__self_0) =>
FnVal::Other(::core::clone::Clone::clone(__self_0)),
}
}
}Clone)]
95pub enum FnVal<'tcx, Other> {
96 Instance(Instance<'tcx>),
97 Other(Other),
98}
99100impl<'tcx, Other> FnVal<'tcx, Other> {
101pub fn as_instance(self) -> InterpResult<'tcx, Instance<'tcx>> {
102match self {
103 FnVal::Instance(instance) => interp_ok(instance),
104 FnVal::Other(_) => {
105do yeet ::rustc_middle::mir::interpret::InterpErrorKind::Unsupported(::rustc_middle::mir::interpret::UnsupportedOpInfo::Unsupported(::alloc::__export::must_use({
::alloc::fmt::format(format_args!("\'foreign\' function pointers are not supported in this context"))
})))throw_unsup_format!("'foreign' function pointers are not supported in this context")106 }
107 }
108 }
109}
110111// `Memory` has to depend on the `Machine` because some of its operations
112// (e.g., `get`) call a `Machine` hook.
113pub struct Memory<'tcx, M: Machine<'tcx>> {
114/// Allocations local to this instance of the interpreter. The kind
115 /// helps ensure that the same mechanism is used for allocation and
116 /// deallocation. When an allocation is not found here, it is a
117 /// global and looked up in the `tcx` for read access. Some machines may
118 /// have to mutate this map even on a read-only access to a global (because
119 /// they do pointer provenance tracking and the allocations in `tcx` have
120 /// the wrong type), so we let the machine override this type.
121 /// Either way, if the machine allows writing to a global, doing so will
122 /// create a copy of the global allocation here.
123// FIXME: this should not be public, but interning currently needs access to it
124pub(super) alloc_map: M::MemoryMap,
125126/// Map for "extra" function pointers.
127extra_fn_ptr_map: FxIndexMap<AllocId, M::ExtraFnVal>,
128129/// Map storing variable argument lists.
130va_list_map: FxIndexMap<AllocId, VecDeque<MPlaceTy<'tcx, M::Provenance>>>,
131132/// To be able to compare pointers with null, and to check alignment for accesses
133 /// to ZSTs (where pointers may dangle), we keep track of the size even for allocations
134 /// that do not exist any more.
135// FIXME: this should not be public, but interning currently needs access to it
136pub(super) dead_alloc_map: FxIndexMap<AllocId, (Size, Align)>,
137138/// This stores whether we are currently doing reads purely for the purpose of validation.
139 /// Those reads do not trigger the machine's hooks for memory reads.
140 /// Needless to say, this must only be set with great care!
141validation_in_progress: Cell<bool>,
142}
143144/// A reference to some allocation that was already bounds-checked for the given region
145/// and had the on-access machine hooks run.
146#[derive(#[automatically_derived]
impl<'a, 'tcx, Prov: ::core::marker::Copy + Provenance,
Extra: ::core::marker::Copy, Bytes: ::core::marker::Copy + AllocBytes>
::core::marker::Copy for AllocRef<'a, 'tcx, Prov, Extra, Bytes> {
}Copy, #[automatically_derived]
impl<'a, 'tcx, Prov: ::core::clone::Clone + Provenance,
Extra: ::core::clone::Clone, Bytes: ::core::clone::Clone + AllocBytes>
::core::clone::Clone for AllocRef<'a, 'tcx, Prov, Extra, Bytes> {
#[inline]
fn clone(&self) -> AllocRef<'a, 'tcx, Prov, Extra, Bytes> {
AllocRef {
alloc: ::core::clone::Clone::clone(&self.alloc),
range: ::core::clone::Clone::clone(&self.range),
tcx: ::core::clone::Clone::clone(&self.tcx),
alloc_id: ::core::clone::Clone::clone(&self.alloc_id),
}
}
}Clone)]
147pub struct AllocRef<'a, 'tcx, Prov: Provenance, Extra, Bytes: AllocBytes = Box<[u8]>> {
148 alloc: &'a Allocation<Prov, Extra, Bytes>,
149 range: AllocRange,
150 tcx: TyCtxt<'tcx>,
151 alloc_id: AllocId,
152}
153/// A reference to some allocation that was already bounds-checked for the given region
154/// and had the on-access machine hooks run.
155pub struct AllocRefMut<'a, 'tcx, Prov: Provenance, Extra, Bytes: AllocBytes = Box<[u8]>> {
156 alloc: &'a mut Allocation<Prov, Extra, Bytes>,
157 range: AllocRange,
158 tcx: TyCtxt<'tcx>,
159 alloc_id: AllocId,
160}
161162impl<'tcx, M: Machine<'tcx>> Memory<'tcx, M> {
163pub fn new() -> Self {
164Memory {
165 alloc_map: M::MemoryMap::default(),
166 extra_fn_ptr_map: FxIndexMap::default(),
167 va_list_map: FxIndexMap::default(),
168 dead_alloc_map: FxIndexMap::default(),
169 validation_in_progress: Cell::new(false),
170 }
171 }
172173/// This is used by [priroda](https://github.com/oli-obk/priroda)
174pub fn alloc_map(&self) -> &M::MemoryMap {
175&self.alloc_map
176 }
177}
178179impl<'tcx, M: Machine<'tcx>> InterpCx<'tcx, M> {
180/// Call this to turn untagged "global" pointers (obtained via `tcx`) into
181 /// the machine pointer to the allocation. Must never be used
182 /// for any other pointers, nor for TLS statics.
183 ///
184 /// Using the resulting pointer represents a *direct* access to that memory
185 /// (e.g. by directly using a `static`),
186 /// as opposed to access through a pointer that was created by the program.
187 ///
188 /// This function can fail only if `ptr` points to an `extern static`.
189#[inline]
190pub fn global_root_pointer(
191&self,
192 ptr: Pointer<CtfeProvenance>,
193 ) -> InterpResult<'tcx, Pointer<M::Provenance>> {
194let alloc_id = ptr.provenance.alloc_id();
195// We need to handle `extern static`.
196match self.tcx.try_get_global_alloc(alloc_id) {
197Some(GlobalAlloc::Static(def_id)) if self.tcx.is_thread_local_static(def_id) => {
198// Thread-local statics do not have a constant address. They *must* be accessed via
199 // `ThreadLocalRef`; we can never have a pointer to them as a regular constant value.
200::rustc_middle::util::bug::bug_fmt(format_args!("global memory cannot point to thread-local static"))bug!("global memory cannot point to thread-local static")201 }
202Some(GlobalAlloc::Static(def_id)) if self.tcx.is_foreign_item(def_id) => {
203return M::extern_static_pointer(self, def_id);
204 }
205None => {
206let is_fn_ptr = self.memory.extra_fn_ptr_map.contains_key(&alloc_id);
207let is_va_list = self.memory.va_list_map.contains_key(&alloc_id);
208if !(is_fn_ptr || is_va_list) {
{
::core::panicking::panic_fmt(format_args!("{0:?} is neither global, va_list nor a function pointer",
alloc_id));
}
};assert!(
209 is_fn_ptr || is_va_list,
210"{alloc_id:?} is neither global, va_list nor a function pointer"
211);
212 }
213_ => {}
214 }
215// And we need to get the provenance.
216M::adjust_alloc_root_pointer(self, ptr, M::GLOBAL_KIND.map(MemoryKind::Machine))
217 }
218219pub fn fn_ptr(&mut self, fn_val: FnVal<'tcx, M::ExtraFnVal>) -> Pointer<M::Provenance> {
220let id = match fn_val {
221 FnVal::Instance(instance) => {
222let salt = M::get_global_alloc_salt(self, Some(instance));
223self.tcx.reserve_and_set_fn_alloc(instance, salt)
224 }
225 FnVal::Other(extra) => {
226// FIXME(RalfJung): Should we have a cache here?
227let id = self.tcx.reserve_alloc_id();
228let old = self.memory.extra_fn_ptr_map.insert(id, extra);
229if !old.is_none() {
::core::panicking::panic("assertion failed: old.is_none()")
};assert!(old.is_none());
230id231 }
232 };
233// Functions are global allocations, so make sure we get the right root pointer.
234 // We know this is not an `extern static` so this cannot fail.
235self.global_root_pointer(Pointer::from(id)).unwrap()
236 }
237238/// Insert a new variable argument list in the global map of variable argument lists.
239pub fn va_list_ptr(
240&mut self,
241 varargs: VecDeque<MPlaceTy<'tcx, M::Provenance>>,
242 ) -> Pointer<M::Provenance> {
243let id = self.tcx.reserve_alloc_id();
244let old = self.memory.va_list_map.insert(id, varargs);
245if !old.is_none() {
::core::panicking::panic("assertion failed: old.is_none()")
};assert!(old.is_none());
246// Variable argument lists are global allocations, so make sure we get the right root
247 // pointer. We know this is not an `extern static` so this cannot fail.
248self.global_root_pointer(Pointer::from(id)).unwrap()
249 }
250251pub fn allocate_ptr(
252&mut self,
253 size: Size,
254 align: Align,
255 kind: MemoryKind<M::MemoryKind>,
256 init: AllocInit,
257 ) -> InterpResult<'tcx, Pointer<M::Provenance>> {
258let params = self.machine.get_default_alloc_params();
259let alloc = if M::PANIC_ON_ALLOC_FAIL {
260Allocation::new(size, align, init, params)
261 } else {
262Allocation::try_new(size, align, init, params)?
263};
264self.insert_allocation(alloc, kind)
265 }
266267pub fn allocate_bytes_ptr(
268&mut self,
269 bytes: &[u8],
270 align: Align,
271 kind: MemoryKind<M::MemoryKind>,
272 mutability: Mutability,
273 ) -> InterpResult<'tcx, Pointer<M::Provenance>> {
274let params = self.machine.get_default_alloc_params();
275let alloc = Allocation::from_bytes(bytes, align, mutability, params);
276self.insert_allocation(alloc, kind)
277 }
278279pub fn insert_allocation(
280&mut self,
281 alloc: Allocation<M::Provenance, (), M::Bytes>,
282 kind: MemoryKind<M::MemoryKind>,
283 ) -> InterpResult<'tcx, Pointer<M::Provenance>> {
284if !(alloc.size() <= self.max_size_of_val()) {
::core::panicking::panic("assertion failed: alloc.size() <= self.max_size_of_val()")
};assert!(alloc.size() <= self.max_size_of_val());
285let id = self.tcx.reserve_alloc_id();
286if true {
match (&(Some(kind)), &(M::GLOBAL_KIND.map(MemoryKind::Machine))) {
(left_val, right_val) => {
if *left_val == *right_val {
let kind = ::core::panicking::AssertKind::Ne;
::core::panicking::assert_failed(kind, &*left_val,
&*right_val,
::core::option::Option::Some(format_args!("dynamically allocating global memory")));
}
}
};
};debug_assert_ne!(
287Some(kind),
288 M::GLOBAL_KIND.map(MemoryKind::Machine),
289"dynamically allocating global memory"
290);
291// This cannot be merged with the `adjust_global_allocation` code path
292 // since here we have an allocation that already uses `M::Bytes`.
293let extra = M::init_local_allocation(self, id, kind, alloc.size(), alloc.align)?;
294let alloc = alloc.with_extra(extra);
295self.memory.alloc_map.insert(id, (kind, alloc));
296 M::adjust_alloc_root_pointer(self, Pointer::from(id), Some(kind))
297 }
298299/// If this grows the allocation, `init_growth` determines
300 /// whether the additional space will be initialized.
301pub fn reallocate_ptr(
302&mut self,
303 ptr: Pointer<Option<M::Provenance>>,
304 old_size_and_align: Option<(Size, Align)>,
305 new_size: Size,
306 new_align: Align,
307 kind: MemoryKind<M::MemoryKind>,
308 init_growth: AllocInit,
309 ) -> InterpResult<'tcx, Pointer<M::Provenance>> {
310let (alloc_id, offset, _prov) = self.ptr_get_alloc_id(ptr, 0)?;
311if offset.bytes() != 0 {
312do yeet ::rustc_middle::mir::interpret::InterpErrorKind::UndefinedBehavior(::rustc_middle::mir::interpret::UndefinedBehaviorInfo::Ub(::alloc::__export::must_use({
::alloc::fmt::format(format_args!("reallocating {0} which does not point to the beginning of an object",
ptr))
})));throw_ub_format!(
313"reallocating {ptr} which does not point to the beginning of an object"
314);
315 }
316317// For simplicities' sake, we implement reallocate as "alloc, copy, dealloc".
318 // This happens so rarely, the perf advantage is outweighed by the maintenance cost.
319 // If requested, we zero-init the entire allocation, to ensure that a growing
320 // allocation has its new bytes properly set. For the part that is copied,
321 // `mem_copy` below will de-initialize things as necessary.
322let new_ptr = self.allocate_ptr(new_size, new_align, kind, init_growth)?;
323let old_size = match old_size_and_align {
324Some((size, _align)) => size,
325None => self.get_alloc_raw(alloc_id)?.size(),
326 };
327// This will also call the access hooks.
328self.mem_copy(ptr, new_ptr.into(), old_size.min(new_size), /*nonoverlapping*/ true)?;
329self.deallocate_ptr(ptr, old_size_and_align, kind)?;
330331interp_ok(new_ptr)
332 }
333334/// Mark the `const_allocate`d allocation `ptr` points to as immutable so we can intern it.
335pub fn make_const_heap_ptr_global(
336&mut self,
337 ptr: Pointer<Option<CtfeProvenance>>,
338 ) -> InterpResult<'tcx>
339where
340M: Machine<'tcx, MemoryKind = crate::const_eval::MemoryKind, Provenance = CtfeProvenance>,
341 {
342let (alloc_id, offset, _) = self.ptr_get_alloc_id(ptr, 0)?;
343if offset.bytes() != 0 {
344return Err(ConstEvalErrKind::ConstMakeGlobalWithOffset(ptr)).into();
345 }
346347if self.tcx.try_get_global_alloc(alloc_id).is_some() {
348// This points to something outside the current interpreter.
349return Err(ConstEvalErrKind::ConstMakeGlobalPtrIsNonHeap(ptr)).into();
350 }
351352// If we can't find it in `alloc_map` it must be dangling (because we don't use
353 // `extra_fn_ptr_map` in const-eval).
354let (kind, alloc) = self355 .memory
356 .alloc_map
357 .get_mut_or(alloc_id, || Err(ConstEvalErrKind::ConstMakeGlobalWithDanglingPtr(ptr)))?;
358359// Ensure this is actually a *heap* allocation, and record it as made-global.
360match kind {
361 MemoryKind::Stack | MemoryKind::CallerLocation => {
362return Err(ConstEvalErrKind::ConstMakeGlobalPtrIsNonHeap(ptr)).into();
363 }
364 MemoryKind::Machine(crate::const_eval::MemoryKind::Heap { was_made_global }) => {
365if *was_made_global {
366return Err(ConstEvalErrKind::ConstMakeGlobalPtrAlreadyMadeGlobal(alloc_id))
367 .into();
368 }
369*was_made_global = true;
370 }
371 }
372373// Prevent further mutation, this is now an immutable global.
374alloc.mutability = Mutability::Not;
375376interp_ok(())
377 }
378379#[allow(clippy :: suspicious_else_formatting)]
{
let __tracing_attr_span;
let __tracing_attr_guard;
if ::tracing::Level::DEBUG <= ::tracing::level_filters::STATIC_MAX_LEVEL
&&
::tracing::Level::DEBUG <=
::tracing::level_filters::LevelFilter::current() ||
{ false } {
__tracing_attr_span =
{
use ::tracing::__macro_support::Callsite as _;
static __CALLSITE: ::tracing::callsite::DefaultCallsite =
{
static META: ::tracing::Metadata<'static> =
{
::tracing_core::metadata::Metadata::new("deallocate_ptr",
"rustc_const_eval::interpret::memory",
::tracing::Level::DEBUG,
::tracing_core::__macro_support::Option::Some("compiler/rustc_const_eval/src/interpret/memory.rs"),
::tracing_core::__macro_support::Option::Some(379u32),
::tracing_core::__macro_support::Option::Some("rustc_const_eval::interpret::memory"),
::tracing_core::field::FieldSet::new(&["ptr",
"old_size_and_align", "kind"],
::tracing_core::callsite::Identifier(&__CALLSITE)),
::tracing::metadata::Kind::SPAN)
};
::tracing::callsite::DefaultCallsite::new(&META)
};
let mut interest = ::tracing::subscriber::Interest::never();
if ::tracing::Level::DEBUG <=
::tracing::level_filters::STATIC_MAX_LEVEL &&
::tracing::Level::DEBUG <=
::tracing::level_filters::LevelFilter::current() &&
{ interest = __CALLSITE.interest(); !interest.is_never() }
&&
::tracing::__macro_support::__is_enabled(__CALLSITE.metadata(),
interest) {
let meta = __CALLSITE.metadata();
::tracing::Span::new(meta,
&{
#[allow(unused_imports)]
use ::tracing::field::{debug, display, Value};
let mut iter = meta.fields().iter();
meta.fields().value_set(&[(&::tracing::__macro_support::Iterator::next(&mut iter).expect("FieldSet corrupted (this is a bug)"),
::tracing::__macro_support::Option::Some(&::tracing::field::debug(&ptr)
as &dyn Value)),
(&::tracing::__macro_support::Iterator::next(&mut iter).expect("FieldSet corrupted (this is a bug)"),
::tracing::__macro_support::Option::Some(&::tracing::field::debug(&old_size_and_align)
as &dyn Value)),
(&::tracing::__macro_support::Iterator::next(&mut iter).expect("FieldSet corrupted (this is a bug)"),
::tracing::__macro_support::Option::Some(&::tracing::field::debug(&kind)
as &dyn Value))])
})
} else {
let span =
::tracing::__macro_support::__disabled_span(__CALLSITE.metadata());
{};
span
}
};
__tracing_attr_guard = __tracing_attr_span.enter();
}
#[warn(clippy :: suspicious_else_formatting)]
{
#[allow(unknown_lints, unreachable_code, clippy ::
diverging_sub_expression, clippy :: empty_loop, clippy ::
let_unit_value, clippy :: let_with_type_underscore, clippy ::
needless_return, clippy :: unreachable)]
if false {
let __tracing_attr_fake_return: InterpResult<'tcx> = loop {};
return __tracing_attr_fake_return;
}
{
let (alloc_id, offset, prov) = self.ptr_get_alloc_id(ptr, 0)?;
{
use ::tracing::__macro_support::Callsite as _;
static __CALLSITE: ::tracing::callsite::DefaultCallsite =
{
static META: ::tracing::Metadata<'static> =
{
::tracing_core::metadata::Metadata::new("event compiler/rustc_const_eval/src/interpret/memory.rs:387",
"rustc_const_eval::interpret::memory",
::tracing::Level::TRACE,
::tracing_core::__macro_support::Option::Some("compiler/rustc_const_eval/src/interpret/memory.rs"),
::tracing_core::__macro_support::Option::Some(387u32),
::tracing_core::__macro_support::Option::Some("rustc_const_eval::interpret::memory"),
::tracing_core::field::FieldSet::new(&["message"],
::tracing_core::callsite::Identifier(&__CALLSITE)),
::tracing::metadata::Kind::EVENT)
};
::tracing::callsite::DefaultCallsite::new(&META)
};
let enabled =
::tracing::Level::TRACE <=
::tracing::level_filters::STATIC_MAX_LEVEL &&
::tracing::Level::TRACE <=
::tracing::level_filters::LevelFilter::current() &&
{
let interest = __CALLSITE.interest();
!interest.is_never() &&
::tracing::__macro_support::__is_enabled(__CALLSITE.metadata(),
interest)
};
if enabled {
(|value_set: ::tracing::field::ValueSet|
{
let meta = __CALLSITE.metadata();
::tracing::Event::dispatch(meta, &value_set);
;
})({
#[allow(unused_imports)]
use ::tracing::field::{debug, display, Value};
let mut iter = __CALLSITE.metadata().fields().iter();
__CALLSITE.metadata().fields().value_set(&[(&::tracing::__macro_support::Iterator::next(&mut iter).expect("FieldSet corrupted (this is a bug)"),
::tracing::__macro_support::Option::Some(&format_args!("deallocating: {0}",
alloc_id) as &dyn Value))])
});
} else { ; }
};
if offset.bytes() != 0 {
do yeet ::rustc_middle::mir::interpret::InterpErrorKind::UndefinedBehavior(::rustc_middle::mir::interpret::UndefinedBehaviorInfo::Ub(::alloc::__export::must_use({
::alloc::fmt::format(format_args!("deallocating {0} which does not point to the beginning of an object",
ptr))
})));
}
let Some((alloc_kind, mut alloc)) =
self.memory.alloc_map.remove(&alloc_id) else {
return Err(match self.tcx.try_get_global_alloc(alloc_id) {
Some(GlobalAlloc::Function { .. }) => {
::rustc_middle::mir::interpret::InterpErrorKind::UndefinedBehavior(::rustc_middle::mir::interpret::UndefinedBehaviorInfo::Ub(::alloc::__export::must_use({
::alloc::fmt::format(format_args!("deallocating {0}, which is a function",
alloc_id))
})))
}
Some(GlobalAlloc::VTable(..)) => {
::rustc_middle::mir::interpret::InterpErrorKind::UndefinedBehavior(::rustc_middle::mir::interpret::UndefinedBehaviorInfo::Ub(::alloc::__export::must_use({
::alloc::fmt::format(format_args!("deallocating {0}, which is a vtable",
alloc_id))
})))
}
Some(GlobalAlloc::TypeId { .. }) => {
::rustc_middle::mir::interpret::InterpErrorKind::UndefinedBehavior(::rustc_middle::mir::interpret::UndefinedBehaviorInfo::Ub(::alloc::__export::must_use({
::alloc::fmt::format(format_args!("deallocating {0}, which is a type id",
alloc_id))
})))
}
Some(GlobalAlloc::Static(..) | GlobalAlloc::Memory(..)) => {
::rustc_middle::mir::interpret::InterpErrorKind::UndefinedBehavior(::rustc_middle::mir::interpret::UndefinedBehaviorInfo::Ub(::alloc::__export::must_use({
::alloc::fmt::format(format_args!("deallocating {0}, which is static memory",
alloc_id))
})))
}
None =>
::rustc_middle::mir::interpret::InterpErrorKind::UndefinedBehavior(::rustc_middle::mir::interpret::UndefinedBehaviorInfo::PointerUseAfterFree(alloc_id,
CheckInAllocMsg::MemoryAccess)),
}).into();
};
if alloc.mutability.is_not() {
do yeet ::rustc_middle::mir::interpret::InterpErrorKind::UndefinedBehavior(::rustc_middle::mir::interpret::UndefinedBehaviorInfo::Ub(::alloc::__export::must_use({
::alloc::fmt::format(format_args!("deallocating immutable allocation {0}",
alloc_id))
})));
}
if alloc_kind != kind {
do yeet ::rustc_middle::mir::interpret::InterpErrorKind::UndefinedBehavior(::rustc_middle::mir::interpret::UndefinedBehaviorInfo::Ub(::alloc::__export::must_use({
::alloc::fmt::format(format_args!("deallocating {0}, which is {1} memory, using {2} deallocation operation",
alloc_id, alloc_kind, kind))
})));
}
if let Some((size, align)) = old_size_and_align {
if size != alloc.size() || align != alloc.align {
do yeet ::rustc_middle::mir::interpret::InterpErrorKind::UndefinedBehavior(::rustc_middle::mir::interpret::UndefinedBehaviorInfo::Ub(::alloc::__export::must_use({
::alloc::fmt::format(format_args!("incorrect layout on deallocation: {4} has size {0} and alignment {1}, but gave size {2} and alignment {3}",
alloc.size().bytes(), alloc.align.bytes(), size.bytes(),
align.bytes(), alloc_id))
})))
}
}
let size = alloc.size();
M::before_memory_deallocation(self.tcx, &mut self.machine,
&mut alloc.extra, ptr, (alloc_id, prov), size, alloc.align,
kind)?;
let old =
self.memory.dead_alloc_map.insert(alloc_id,
(size, alloc.align));
if old.is_some() {
::rustc_middle::util::bug::bug_fmt(format_args!("Nothing can be deallocated twice"));
}
interp_ok(())
}
}
}#[instrument(skip(self), level = "debug")]380pub fn deallocate_ptr(
381&mut self,
382 ptr: Pointer<Option<M::Provenance>>,
383 old_size_and_align: Option<(Size, Align)>,
384 kind: MemoryKind<M::MemoryKind>,
385 ) -> InterpResult<'tcx> {
386let (alloc_id, offset, prov) = self.ptr_get_alloc_id(ptr, 0)?;
387trace!("deallocating: {alloc_id}");
388389if offset.bytes() != 0 {
390throw_ub_format!(
391"deallocating {ptr} which does not point to the beginning of an object"
392);
393 }
394395let Some((alloc_kind, mut alloc)) = self.memory.alloc_map.remove(&alloc_id) else {
396// Deallocating global memory -- always an error
397return Err(match self.tcx.try_get_global_alloc(alloc_id) {
398Some(GlobalAlloc::Function { .. }) => {
399err_ub_format!("deallocating {alloc_id}, which is a function")
400 }
401Some(GlobalAlloc::VTable(..)) => {
402err_ub_format!("deallocating {alloc_id}, which is a vtable")
403 }
404Some(GlobalAlloc::TypeId { .. }) => {
405err_ub_format!("deallocating {alloc_id}, which is a type id")
406 }
407Some(GlobalAlloc::Static(..) | GlobalAlloc::Memory(..)) => {
408err_ub_format!("deallocating {alloc_id}, which is static memory")
409 }
410None => err_ub!(PointerUseAfterFree(alloc_id, CheckInAllocMsg::MemoryAccess)),
411 })
412 .into();
413 };
414415if alloc.mutability.is_not() {
416throw_ub_format!("deallocating immutable allocation {alloc_id}");
417 }
418if alloc_kind != kind {
419throw_ub_format!(
420"deallocating {alloc_id}, which is {alloc_kind} memory, using {kind} deallocation operation",
421 );
422 }
423if let Some((size, align)) = old_size_and_align {
424if size != alloc.size() || align != alloc.align {
425throw_ub_format!(
426"incorrect layout on deallocation: {alloc_id} has size {size} and alignment {align}, but gave size {size_found} and alignment {align_found}",
427 size = alloc.size().bytes(),
428 align = alloc.align.bytes(),
429 size_found = size.bytes(),
430 align_found = align.bytes(),
431 )
432 }
433 }
434435// Let the machine take some extra action
436let size = alloc.size();
437 M::before_memory_deallocation(
438self.tcx,
439&mut self.machine,
440&mut alloc.extra,
441 ptr,
442 (alloc_id, prov),
443 size,
444 alloc.align,
445 kind,
446 )?;
447448// Don't forget to remember size and align of this now-dead allocation
449let old = self.memory.dead_alloc_map.insert(alloc_id, (size, alloc.align));
450if old.is_some() {
451bug!("Nothing can be deallocated twice");
452 }
453454 interp_ok(())
455 }
456457/// Internal helper function to determine the allocation and offset of a pointer (if any).
458#[inline(always)]
459fn get_ptr_access(
460&self,
461 ptr: Pointer<Option<M::Provenance>>,
462 size: Size,
463 ) -> InterpResult<'tcx, Option<(AllocId, Size, M::ProvenanceExtra)>> {
464let size = i64::try_from(size.bytes()).unwrap(); // it would be an error to even ask for more than isize::MAX bytes
465Self::check_and_deref_ptr(
466self,
467ptr,
468size,
469 CheckInAllocMsg::MemoryAccess,
470 |this, alloc_id, offset, prov| {
471let (size, align) =
472this.get_live_alloc_size_and_align(alloc_id, CheckInAllocMsg::MemoryAccess)?;
473interp_ok((size, align, (alloc_id, offset, prov)))
474 },
475 )
476 }
477478/// Check if the given pointer points to live memory of the given `size`.
479 /// The caller can control the error message for the out-of-bounds case.
480#[inline(always)]
481pub fn check_ptr_access(
482&self,
483 ptr: Pointer<Option<M::Provenance>>,
484 size: Size,
485 msg: CheckInAllocMsg,
486 ) -> InterpResult<'tcx> {
487let size = i64::try_from(size.bytes()).unwrap(); // it would be an error to even ask for more than isize::MAX bytes
488Self::check_and_deref_ptr(self, ptr, size, msg, |this, alloc_id, _, _| {
489let (size, align) = this.get_live_alloc_size_and_align(alloc_id, msg)?;
490interp_ok((size, align, ()))
491 })?;
492interp_ok(())
493 }
494495/// Check whether the given pointer points to live memory for a signed amount of bytes.
496 /// A negative amounts means that the given range of memory to the left of the pointer
497 /// needs to be dereferenceable.
498pub fn check_ptr_access_signed(
499&self,
500 ptr: Pointer<Option<M::Provenance>>,
501 size: i64,
502 msg: CheckInAllocMsg,
503 ) -> InterpResult<'tcx> {
504Self::check_and_deref_ptr(self, ptr, size, msg, |this, alloc_id, _, _| {
505let (size, align) = this.get_live_alloc_size_and_align(alloc_id, msg)?;
506interp_ok((size, align, ()))
507 })?;
508interp_ok(())
509 }
510511/// Low-level helper function to check if a ptr is in-bounds and potentially return a reference
512 /// to the allocation it points to. Supports both shared and mutable references, as the actual
513 /// checking is offloaded to a helper closure. Supports signed sizes for checks "to the left" of
514 /// a pointer.
515 ///
516 /// `alloc_size` will only get called for non-zero-sized accesses.
517 ///
518 /// Returns `None` if and only if the size is 0.
519fn check_and_deref_ptr<T, R: Borrow<Self>>(
520 this: R,
521 ptr: Pointer<Option<M::Provenance>>,
522 size: i64,
523 msg: CheckInAllocMsg,
524 alloc_size: impl FnOnce(
525 R,
526AllocId,
527Size,
528 M::ProvenanceExtra,
529 ) -> InterpResult<'tcx, (Size, Align, T)>,
530 ) -> InterpResult<'tcx, Option<T>> {
531// Everything is okay with size 0.
532if size == 0 {
533return interp_ok(None);
534 }
535536interp_ok(match this.borrow().ptr_try_get_alloc_id(ptr, size) {
537Err(addr) => {
538// We couldn't get a proper allocation.
539do yeet ::rustc_middle::mir::interpret::InterpErrorKind::UndefinedBehavior(::rustc_middle::mir::interpret::UndefinedBehaviorInfo::DanglingIntPointer {
addr,
inbounds_size: size,
msg,
});throw_ub!(DanglingIntPointer { addr, inbounds_size: size, msg });
540 }
541Ok((alloc_id, offset, prov)) => {
542let tcx = this.borrow().tcx;
543let (alloc_size, _alloc_align, ret_val) = alloc_size(this, alloc_id, offset, prov)?;
544let offset = offset.bytes();
545// Compute absolute begin and end of the range.
546let (begin, end) = if size >= 0 {
547 (Some(offset), offset.checked_add(sizeas u64))
548 } else {
549 (offset.checked_sub(size.unsigned_abs()), Some(offset))
550 };
551// Ensure both are within bounds.
552let in_bounds = begin.is_some() && end.is_some_and(|e| e <= alloc_size.bytes());
553if !in_bounds {
554do yeet ::rustc_middle::mir::interpret::InterpErrorKind::UndefinedBehavior(::rustc_middle::mir::interpret::UndefinedBehaviorInfo::PointerOutOfBounds {
alloc_id,
alloc_size,
ptr_offset: tcx.sign_extend_to_target_isize(offset),
inbounds_size: size,
msg,
})throw_ub!(PointerOutOfBounds {
555 alloc_id,
556 alloc_size,
557 ptr_offset: tcx.sign_extend_to_target_isize(offset),
558 inbounds_size: size,
559 msg,
560 })561 }
562563Some(ret_val)
564 }
565 })
566 }
567568pub(super) fn check_misalign(
569&self,
570 misaligned: Option<Misalignment>,
571 msg: CheckAlignMsg,
572 ) -> InterpResult<'tcx> {
573if let Some(misaligned) = misaligned {
574do yeet ::rustc_middle::mir::interpret::InterpErrorKind::UndefinedBehavior(::rustc_middle::mir::interpret::UndefinedBehaviorInfo::AlignmentCheckFailed(misaligned,
msg))throw_ub!(AlignmentCheckFailed(misaligned, msg))575 }
576interp_ok(())
577 }
578579pub(super) fn is_ptr_misaligned(
580&self,
581 ptr: Pointer<Option<M::Provenance>>,
582 align: Align,
583 ) -> Option<Misalignment> {
584if !M::enforce_alignment(self) || align.bytes() == 1 {
585return None;
586 }
587588#[inline]
589fn is_offset_misaligned(offset: u64, align: Align) -> Option<Misalignment> {
590if offset.is_multiple_of(align.bytes()) {
591None592 } else {
593// The biggest power of two through which `offset` is divisible.
594let offset_pow2 = 1 << offset.trailing_zeros();
595Some(Misalignment { has: Align::from_bytes(offset_pow2).unwrap(), required: align })
596 }
597 }
598599match self.ptr_try_get_alloc_id(ptr, 0) {
600Err(addr) => is_offset_misaligned(addr, align),
601Ok((alloc_id, offset, _prov)) => {
602let alloc_info = self.get_alloc_info(alloc_id);
603if let Some(misalign) = M::alignment_check(
604self,
605alloc_id,
606alloc_info.align,
607alloc_info.kind,
608offset,
609align,
610 ) {
611Some(misalign)
612 } else if M::Provenance::OFFSET_IS_ADDR {
613is_offset_misaligned(ptr.addr().bytes(), align)
614 } else {
615// Check allocation alignment and offset alignment.
616if alloc_info.align.bytes() < align.bytes() {
617Some(Misalignment { has: alloc_info.align, required: align })
618 } else {
619is_offset_misaligned(offset.bytes(), align)
620 }
621 }
622 }
623 }
624 }
625626/// Checks a pointer for misalignment.
627 ///
628 /// The error assumes this is checking the pointer used directly for an access.
629pub fn check_ptr_align(
630&self,
631 ptr: Pointer<Option<M::Provenance>>,
632 align: Align,
633 ) -> InterpResult<'tcx> {
634self.check_misalign(self.is_ptr_misaligned(ptr, align), CheckAlignMsg::AccessedPtr)
635 }
636}
637638impl<'tcx, M: Machine<'tcx>> InterpCx<'tcx, M> {
639/// This function is used by Miri's provenance GC to remove unreachable entries from the dead_alloc_map.
640pub fn remove_unreachable_allocs(&mut self, reachable_allocs: &FxHashSet<AllocId>) {
641// Unlike all the other GC helpers where we check if an `AllocId` is found in the interpreter or
642 // is live, here all the IDs in the map are for dead allocations so we don't
643 // need to check for liveness.
644#[allow(rustc::potential_query_instability)] // Only used from Miri, not queries.
645self.memory.dead_alloc_map.retain(|id, _| reachable_allocs.contains(id));
646 }
647}
648649/// Allocation accessors
650impl<'tcx, M: Machine<'tcx>> InterpCx<'tcx, M> {
651/// Helper function to obtain a global (tcx) allocation.
652 /// This attempts to return a reference to an existing allocation if
653 /// one can be found in `tcx`. That, however, is only possible if `tcx` and
654 /// this machine use the same pointer provenance, so it is indirected through
655 /// `M::adjust_allocation`.
656fn get_global_alloc(
657&self,
658 id: AllocId,
659 is_write: bool,
660 ) -> InterpResult<'tcx, Cow<'tcx, Allocation<M::Provenance, M::AllocExtra, M::Bytes>>> {
661let (alloc, def_id) = match self.tcx.try_get_global_alloc(id) {
662Some(GlobalAlloc::Memory(mem)) => {
663// Memory of a constant or promoted or anonymous memory referenced by a static.
664(mem, None)
665 }
666Some(GlobalAlloc::Function { .. }) => do yeet ::rustc_middle::mir::interpret::InterpErrorKind::UndefinedBehavior(::rustc_middle::mir::interpret::UndefinedBehaviorInfo::DerefFunctionPointer(id))throw_ub!(DerefFunctionPointer(id)),
667Some(GlobalAlloc::VTable(..)) => do yeet ::rustc_middle::mir::interpret::InterpErrorKind::UndefinedBehavior(::rustc_middle::mir::interpret::UndefinedBehaviorInfo::DerefVTablePointer(id))throw_ub!(DerefVTablePointer(id)),
668Some(GlobalAlloc::TypeId { .. }) => do yeet ::rustc_middle::mir::interpret::InterpErrorKind::UndefinedBehavior(::rustc_middle::mir::interpret::UndefinedBehaviorInfo::DerefTypeIdPointer(id))throw_ub!(DerefTypeIdPointer(id)),
669None => do yeet ::rustc_middle::mir::interpret::InterpErrorKind::UndefinedBehavior(::rustc_middle::mir::interpret::UndefinedBehaviorInfo::PointerUseAfterFree(id,
CheckInAllocMsg::MemoryAccess))throw_ub!(PointerUseAfterFree(id, CheckInAllocMsg::MemoryAccess)),
670Some(GlobalAlloc::Static(def_id)) => {
671if !self.tcx.is_static(def_id) {
::core::panicking::panic("assertion failed: self.tcx.is_static(def_id)")
};assert!(self.tcx.is_static(def_id));
672// Thread-local statics do not have a constant address. They *must* be accessed via
673 // `ThreadLocalRef`; we can never have a pointer to them as a regular constant value.
674if !!self.tcx.is_thread_local_static(def_id) {
::core::panicking::panic("assertion failed: !self.tcx.is_thread_local_static(def_id)")
};assert!(!self.tcx.is_thread_local_static(def_id));
675// Notice that every static has two `AllocId` that will resolve to the same
676 // thing here: one maps to `GlobalAlloc::Static`, this is the "lazy" ID,
677 // and the other one is maps to `GlobalAlloc::Memory`, this is returned by
678 // `eval_static_initializer` and it is the "resolved" ID.
679 // The resolved ID is never used by the interpreted program, it is hidden.
680 // This is relied upon for soundness of const-patterns; a pointer to the resolved
681 // ID would "sidestep" the checks that make sure consts do not point to statics!
682 // The `GlobalAlloc::Memory` branch here is still reachable though; when a static
683 // contains a reference to memory that was created during its evaluation (i.e., not
684 // to another static), those inner references only exist in "resolved" form.
685if self.tcx.is_foreign_item(def_id) {
686// This is unreachable in Miri, but can happen in CTFE where we actually *do* support
687 // referencing arbitrary (declared) extern statics.
688do yeet ::rustc_middle::mir::interpret::InterpErrorKind::Unsupported(::rustc_middle::mir::interpret::UnsupportedOpInfo::ExternStatic(def_id));throw_unsup!(ExternStatic(def_id));
689 }
690691// We don't give a span -- statics don't need that, they cannot be generic or associated.
692let val = self.ctfe_query(|tcx| tcx.eval_static_initializer(def_id))?;
693 (val, Some(def_id))
694 }
695 };
696 M::before_access_global(self.tcx, &self.machine, id, alloc, def_id, is_write)?;
697// We got tcx memory. Let the machine initialize its "extra" stuff.
698M::adjust_global_allocation(
699self,
700id, // always use the ID we got as input, not the "hidden" one.
701alloc.inner(),
702 )
703 }
704705/// Gives raw access to the `Allocation`, without bounds or alignment checks.
706 /// The caller is responsible for calling the access hooks!
707 ///
708 /// You almost certainly want to use `get_ptr_alloc`/`get_ptr_alloc_mut` instead.
709pub fn get_alloc_raw(
710&self,
711 id: AllocId,
712 ) -> InterpResult<'tcx, &Allocation<M::Provenance, M::AllocExtra, M::Bytes>> {
713// The error type of the inner closure here is somewhat funny. We have two
714 // ways of "erroring": An actual error, or because we got a reference from
715 // `get_global_alloc` that we can actually use directly without inserting anything anywhere.
716 // So the error type is `InterpResult<'tcx, &Allocation<M::Provenance>>`.
717let a = self.memory.alloc_map.get_or(id, || {
718// We have to funnel the `InterpErrorInfo` through a `Result` to match the `get_or` API,
719 // so we use `report_err` for that.
720let alloc = self.get_global_alloc(id, /*is_write*/ false).report_err().map_err(Err)?;
721match alloc {
722 Cow::Borrowed(alloc) => {
723// We got a ref, cheaply return that as an "error" so that the
724 // map does not get mutated.
725Err(Ok(alloc))
726 }
727 Cow::Owned(alloc) => {
728// Need to put it into the map and return a ref to that
729let kind = M::GLOBAL_KIND.expect(
730"I got a global allocation that I have to copy but the machine does \
731 not expect that to happen",
732 );
733Ok((MemoryKind::Machine(kind), alloc))
734 }
735 }
736 });
737// Now unpack that funny error type
738match a {
739Ok(a) => interp_ok(&a.1),
740Err(a) => a.into(),
741 }
742 }
743744/// Gives raw, immutable access to the `Allocation` address, without bounds or alignment checks.
745 /// The caller is responsible for calling the access hooks!
746pub fn get_alloc_bytes_unchecked_raw(&self, id: AllocId) -> InterpResult<'tcx, *const u8> {
747let alloc = self.get_alloc_raw(id)?;
748interp_ok(alloc.get_bytes_unchecked_raw())
749 }
750751/// Bounds-checked *but not align-checked* allocation access.
752pub fn get_ptr_alloc<'a>(
753&'a self,
754 ptr: Pointer<Option<M::Provenance>>,
755 size: Size,
756 ) -> InterpResult<'tcx, Option<AllocRef<'a, 'tcx, M::Provenance, M::AllocExtra, M::Bytes>>>
757 {
758let size_i64 = i64::try_from(size.bytes()).unwrap(); // it would be an error to even ask for more than isize::MAX bytes
759let ptr_and_alloc = Self::check_and_deref_ptr(
760self,
761ptr,
762size_i64,
763 CheckInAllocMsg::MemoryAccess,
764 |this, alloc_id, offset, prov| {
765let alloc = this.get_alloc_raw(alloc_id)?;
766interp_ok((alloc.size(), alloc.align, (alloc_id, offset, prov, alloc)))
767 },
768 )?;
769// We want to call the hook on *all* accesses that involve an AllocId, including zero-sized
770 // accesses. That means we cannot rely on the closure above or the `Some` branch below. We
771 // do this after `check_and_deref_ptr` to ensure some basic sanity has already been checked.
772if !self.memory.validation_in_progress.get() {
773if let Ok((alloc_id, ..)) = self.ptr_try_get_alloc_id(ptr, size_i64) {
774 M::before_alloc_access(self.tcx, &self.machine, alloc_id)?;
775 }
776 }
777778if let Some((alloc_id, offset, prov, alloc)) = ptr_and_alloc {
779let range = alloc_range(offset, size);
780if !self.memory.validation_in_progress.get() {
781 M::before_memory_read(
782self.tcx,
783&self.machine,
784&alloc.extra,
785ptr,
786 (alloc_id, prov),
787range,
788 )?;
789 }
790interp_ok(Some(AllocRef { alloc, range, tcx: *self.tcx, alloc_id }))
791 } else {
792interp_ok(None)
793 }
794 }
795796/// Return the `extra` field of the given allocation.
797pub fn get_alloc_extra<'a>(&'a self, id: AllocId) -> InterpResult<'tcx, &'a M::AllocExtra> {
798interp_ok(&self.get_alloc_raw(id)?.extra)
799 }
800801/// Return the `mutability` field of the given allocation.
802pub fn get_alloc_mutability<'a>(&'a self, id: AllocId) -> InterpResult<'tcx, Mutability> {
803interp_ok(self.get_alloc_raw(id)?.mutability)
804 }
805806/// Gives raw mutable access to the `Allocation`, without bounds or alignment checks.
807 /// The caller is responsible for calling the access hooks!
808 ///
809 /// Also returns a ptr to `self.extra` so that the caller can use it in parallel with the
810 /// allocation.
811 ///
812 /// You almost certainly want to use `get_ptr_alloc`/`get_ptr_alloc_mut` instead.
813pub fn get_alloc_raw_mut(
814&mut self,
815 id: AllocId,
816 ) -> InterpResult<'tcx, (&mut Allocation<M::Provenance, M::AllocExtra, M::Bytes>, &mut M)> {
817// We have "NLL problem case #3" here, which cannot be worked around without loss of
818 // efficiency even for the common case where the key is in the map.
819 // <https://rust-lang.github.io/rfcs/2094-nll.html#problem-case-3-conditional-control-flow-across-functions>
820 // (Cannot use `get_mut_or` since `get_global_alloc` needs `&self`, and that boils down to
821 // Miri's `adjust_alloc_root_pointer` needing to look up the size of the allocation.
822 // It could be avoided with a totally separate codepath in Miri for handling the absolute address
823 // of global allocations, but that's not worth it.)
824if self.memory.alloc_map.get_mut(id).is_none() {
825// Slow path.
826 // Allocation not found locally, go look global.
827let alloc = self.get_global_alloc(id, /*is_write*/ true)?;
828let kind = M::GLOBAL_KIND.expect(
829"I got a global allocation that I have to copy but the machine does \
830 not expect that to happen",
831 );
832self.memory.alloc_map.insert(id, (MemoryKind::Machine(kind), alloc.into_owned()));
833 }
834835let (_kind, alloc) = self.memory.alloc_map.get_mut(id).unwrap();
836if alloc.mutability.is_not() {
837do yeet ::rustc_middle::mir::interpret::InterpErrorKind::UndefinedBehavior(::rustc_middle::mir::interpret::UndefinedBehaviorInfo::WriteToReadOnly(id))throw_ub!(WriteToReadOnly(id))838 }
839interp_ok((alloc, &mut self.machine))
840 }
841842/// Gives raw, mutable access to the `Allocation` address, without bounds or alignment checks.
843 /// The caller is responsible for calling the access hooks!
844pub fn get_alloc_bytes_unchecked_raw_mut(
845&mut self,
846 id: AllocId,
847 ) -> InterpResult<'tcx, *mut u8> {
848let alloc = self.get_alloc_raw_mut(id)?.0;
849interp_ok(alloc.get_bytes_unchecked_raw_mut())
850 }
851852/// Bounds-checked *but not align-checked* allocation access.
853pub fn get_ptr_alloc_mut<'a>(
854&'a mut self,
855 ptr: Pointer<Option<M::Provenance>>,
856 size: Size,
857 ) -> InterpResult<'tcx, Option<AllocRefMut<'a, 'tcx, M::Provenance, M::AllocExtra, M::Bytes>>>
858 {
859let tcx = self.tcx;
860let validation_in_progress = self.memory.validation_in_progress.get();
861862let size_i64 = i64::try_from(size.bytes()).unwrap(); // it would be an error to even ask for more than isize::MAX bytes
863let ptr_and_alloc = Self::check_and_deref_ptr(
864self,
865ptr,
866size_i64,
867 CheckInAllocMsg::MemoryAccess,
868 |this, alloc_id, offset, prov| {
869let (alloc, machine) = this.get_alloc_raw_mut(alloc_id)?;
870interp_ok((alloc.size(), alloc.align, (alloc_id, offset, prov, alloc, machine)))
871 },
872 )?;
873874if let Some((alloc_id, offset, prov, alloc, machine)) = ptr_and_alloc {
875let range = alloc_range(offset, size);
876if !validation_in_progress {
877// For writes, it's okay to only call those when there actually is a non-zero
878 // amount of bytes to be written: a zero-sized write doesn't manifest anything.
879M::before_alloc_access(tcx, machine, alloc_id)?;
880 M::before_memory_write(
881tcx,
882machine,
883&mut alloc.extra,
884ptr,
885 (alloc_id, prov),
886range,
887 )?;
888 }
889interp_ok(Some(AllocRefMut { alloc, range, tcx: *tcx, alloc_id }))
890 } else {
891interp_ok(None)
892 }
893 }
894895/// Return the `extra` field of the given allocation.
896pub fn get_alloc_extra_mut<'a>(
897&'a mut self,
898 id: AllocId,
899 ) -> InterpResult<'tcx, (&'a mut M::AllocExtra, &'a mut M)> {
900let (alloc, machine) = self.get_alloc_raw_mut(id)?;
901interp_ok((&mut alloc.extra, machine))
902 }
903904/// Check whether an allocation is live. This is faster than calling
905 /// [`InterpCx::get_alloc_info`] if all you need to check is whether the kind is
906 /// [`AllocKind::Dead`] because it doesn't have to look up the type and layout of statics.
907pub fn is_alloc_live(&self, id: AllocId) -> bool {
908self.memory.alloc_map.contains_key_ref(&id)
909 || self.memory.extra_fn_ptr_map.contains_key(&id)
910 || self.memory.va_list_map.contains_key(&id)
911// We check `tcx` last as that has to acquire a lock in `many-seeds` mode.
912 // This also matches the order in `get_alloc_info`.
913|| self.tcx.try_get_global_alloc(id).is_some()
914 }
915916/// Obtain the size and alignment of an allocation, even if that allocation has
917 /// been deallocated.
918pub fn get_alloc_info(&self, id: AllocId) -> AllocInfo {
919// # Regular allocations
920 // Don't use `self.get_raw` here as that will
921 // a) cause cycles in case `id` refers to a static
922 // b) duplicate a global's allocation in miri
923if let Some((_, alloc)) = self.memory.alloc_map.get(id) {
924return AllocInfo::new(
925alloc.size(),
926alloc.align,
927 AllocKind::LiveData,
928alloc.mutability,
929 );
930 }
931932// # Function pointers
933 // (both global from `alloc_map` and local from `extra_fn_ptr_map`)
934if let Some(fn_val) = self.get_fn_alloc(id) {
935let align = match fn_val {
936 FnVal::Instance(_instance) => {
937// FIXME: Until we have a clear design for the effects of align(N) functions
938 // on the address of function pointers, we don't consider the align(N)
939 // attribute on functions in the interpreter.
940 // See <https://github.com/rust-lang/rust/issues/144661> for more context.
941Align::ONE942 }
943// Machine-specific extra functions currently do not support alignment restrictions.
944FnVal::Other(_) => Align::ONE,
945 };
946947return AllocInfo::new(Size::ZERO, align, AllocKind::Function, Mutability::Not);
948 }
949950// # Variable argument lists
951if self.memory.va_list_map.contains_key(&id) {
952return AllocInfo::new(Size::ZERO, Align::ONE, AllocKind::VaList, Mutability::Not);
953 }
954955// # Global allocations
956if let Some(global_alloc) = self.tcx.try_get_global_alloc(id) {
957// NOTE: `static` alignment from attributes has already been applied to the allocation.
958let (size, align) = global_alloc.size_and_align(*self.tcx, self.typing_env);
959let mutbl = global_alloc.mutability(*self.tcx, self.typing_env);
960let kind = match global_alloc {
961 GlobalAlloc::Static { .. } | GlobalAlloc::Memory { .. } => AllocKind::LiveData,
962 GlobalAlloc::Function { .. } => ::rustc_middle::util::bug::bug_fmt(format_args!("We already checked function pointers above"))bug!("We already checked function pointers above"),
963 GlobalAlloc::VTable { .. } => AllocKind::VTable,
964 GlobalAlloc::TypeId { .. } => AllocKind::TypeId,
965 };
966return AllocInfo::new(size, align, kind, mutbl);
967 }
968969// # Dead pointers
970let (size, align) = *self971 .memory
972 .dead_alloc_map
973 .get(&id)
974 .expect("deallocated pointers should all be recorded in `dead_alloc_map`");
975AllocInfo::new(size, align, AllocKind::Dead, Mutability::Not)
976 }
977978/// Obtain the size and alignment of a *live* allocation.
979fn get_live_alloc_size_and_align(
980&self,
981 id: AllocId,
982 msg: CheckInAllocMsg,
983 ) -> InterpResult<'tcx, (Size, Align)> {
984let info = self.get_alloc_info(id);
985if info.kind == AllocKind::Dead {
986do yeet ::rustc_middle::mir::interpret::InterpErrorKind::UndefinedBehavior(::rustc_middle::mir::interpret::UndefinedBehaviorInfo::PointerUseAfterFree(id,
msg))throw_ub!(PointerUseAfterFree(id, msg))987 }
988interp_ok((info.size, info.align))
989 }
990991fn get_fn_alloc(&self, id: AllocId) -> Option<FnVal<'tcx, M::ExtraFnVal>> {
992if let Some(extra) = self.memory.extra_fn_ptr_map.get(&id) {
993Some(FnVal::Other(*extra))
994 } else {
995match self.tcx.try_get_global_alloc(id) {
996Some(GlobalAlloc::Function { instance, .. }) => Some(FnVal::Instance(instance)),
997_ => None,
998 }
999 }
1000 }
10011002/// Takes a pointer that is the first chunk of a `TypeId` and return the type that its
1003 /// provenance refers to, as well as the segment of the hash that this pointer covers.
1004pub fn get_ptr_type_id(
1005&self,
1006 ptr: Pointer<Option<M::Provenance>>,
1007 ) -> InterpResult<'tcx, (Ty<'tcx>, u64)> {
1008let (alloc_id, offset, _meta) = self.ptr_get_alloc_id(ptr, 0)?;
1009let Some(GlobalAlloc::TypeId { ty }) = self.tcx.try_get_global_alloc(alloc_id) else {
1010do yeet ::rustc_middle::mir::interpret::InterpErrorKind::UndefinedBehavior(::rustc_middle::mir::interpret::UndefinedBehaviorInfo::Ub(::alloc::__export::must_use({
::alloc::fmt::format(format_args!("invalid `TypeId` value: not all bytes carry type id metadata"))
})))throw_ub_format!("invalid `TypeId` value: not all bytes carry type id metadata")1011 };
1012interp_ok((ty, offset.bytes()))
1013 }
10141015pub fn get_ptr_fn(
1016&self,
1017 ptr: Pointer<Option<M::Provenance>>,
1018 ) -> InterpResult<'tcx, FnVal<'tcx, M::ExtraFnVal>> {
1019{
use ::tracing::__macro_support::Callsite as _;
static __CALLSITE: ::tracing::callsite::DefaultCallsite =
{
static META: ::tracing::Metadata<'static> =
{
::tracing_core::metadata::Metadata::new("event compiler/rustc_const_eval/src/interpret/memory.rs:1019",
"rustc_const_eval::interpret::memory",
::tracing::Level::TRACE,
::tracing_core::__macro_support::Option::Some("compiler/rustc_const_eval/src/interpret/memory.rs"),
::tracing_core::__macro_support::Option::Some(1019u32),
::tracing_core::__macro_support::Option::Some("rustc_const_eval::interpret::memory"),
::tracing_core::field::FieldSet::new(&["message"],
::tracing_core::callsite::Identifier(&__CALLSITE)),
::tracing::metadata::Kind::EVENT)
};
::tracing::callsite::DefaultCallsite::new(&META)
};
let enabled =
::tracing::Level::TRACE <= ::tracing::level_filters::STATIC_MAX_LEVEL
&&
::tracing::Level::TRACE <=
::tracing::level_filters::LevelFilter::current() &&
{
let interest = __CALLSITE.interest();
!interest.is_never() &&
::tracing::__macro_support::__is_enabled(__CALLSITE.metadata(),
interest)
};
if enabled {
(|value_set: ::tracing::field::ValueSet|
{
let meta = __CALLSITE.metadata();
::tracing::Event::dispatch(meta, &value_set);
;
})({
#[allow(unused_imports)]
use ::tracing::field::{debug, display, Value};
let mut iter = __CALLSITE.metadata().fields().iter();
__CALLSITE.metadata().fields().value_set(&[(&::tracing::__macro_support::Iterator::next(&mut iter).expect("FieldSet corrupted (this is a bug)"),
::tracing::__macro_support::Option::Some(&format_args!("get_ptr_fn({0:?})",
ptr) as &dyn Value))])
});
} else { ; }
};trace!("get_ptr_fn({:?})", ptr);
1020let (alloc_id, offset, _prov) = self.ptr_get_alloc_id(ptr, 0)?;
1021if offset.bytes() != 0 {
1022do yeet ::rustc_middle::mir::interpret::InterpErrorKind::UndefinedBehavior(::rustc_middle::mir::interpret::UndefinedBehaviorInfo::InvalidFunctionPointer(Pointer::new(alloc_id,
offset)))throw_ub!(InvalidFunctionPointer(Pointer::new(alloc_id, offset)))1023 }
1024self.get_fn_alloc(alloc_id)
1025 .ok_or_else(|| ::rustc_middle::mir::interpret::InterpErrorKind::UndefinedBehavior(::rustc_middle::mir::interpret::UndefinedBehaviorInfo::InvalidFunctionPointer(Pointer::new(alloc_id,
offset)))err_ub!(InvalidFunctionPointer(Pointer::new(alloc_id, offset))))
1026 .into()
1027 }
10281029pub fn get_ptr_va_list(
1030&self,
1031 ptr: Pointer<Option<M::Provenance>>,
1032 ) -> InterpResult<'tcx, &VecDeque<MPlaceTy<'tcx, M::Provenance>>> {
1033{
use ::tracing::__macro_support::Callsite as _;
static __CALLSITE: ::tracing::callsite::DefaultCallsite =
{
static META: ::tracing::Metadata<'static> =
{
::tracing_core::metadata::Metadata::new("event compiler/rustc_const_eval/src/interpret/memory.rs:1033",
"rustc_const_eval::interpret::memory",
::tracing::Level::TRACE,
::tracing_core::__macro_support::Option::Some("compiler/rustc_const_eval/src/interpret/memory.rs"),
::tracing_core::__macro_support::Option::Some(1033u32),
::tracing_core::__macro_support::Option::Some("rustc_const_eval::interpret::memory"),
::tracing_core::field::FieldSet::new(&["message"],
::tracing_core::callsite::Identifier(&__CALLSITE)),
::tracing::metadata::Kind::EVENT)
};
::tracing::callsite::DefaultCallsite::new(&META)
};
let enabled =
::tracing::Level::TRACE <= ::tracing::level_filters::STATIC_MAX_LEVEL
&&
::tracing::Level::TRACE <=
::tracing::level_filters::LevelFilter::current() &&
{
let interest = __CALLSITE.interest();
!interest.is_never() &&
::tracing::__macro_support::__is_enabled(__CALLSITE.metadata(),
interest)
};
if enabled {
(|value_set: ::tracing::field::ValueSet|
{
let meta = __CALLSITE.metadata();
::tracing::Event::dispatch(meta, &value_set);
;
})({
#[allow(unused_imports)]
use ::tracing::field::{debug, display, Value};
let mut iter = __CALLSITE.metadata().fields().iter();
__CALLSITE.metadata().fields().value_set(&[(&::tracing::__macro_support::Iterator::next(&mut iter).expect("FieldSet corrupted (this is a bug)"),
::tracing::__macro_support::Option::Some(&format_args!("get_ptr_va_list({0:?})",
ptr) as &dyn Value))])
});
} else { ; }
};trace!("get_ptr_va_list({:?})", ptr);
1034let (alloc_id, offset, _prov) = self.ptr_get_alloc_id(ptr, 0)?;
1035if offset.bytes() != 0 {
1036do yeet ::rustc_middle::mir::interpret::InterpErrorKind::UndefinedBehavior(::rustc_middle::mir::interpret::UndefinedBehaviorInfo::InvalidVaListPointer(Pointer::new(alloc_id,
offset)))throw_ub!(InvalidVaListPointer(Pointer::new(alloc_id, offset)))1037 }
10381039let Some(va_list) = self.memory.va_list_map.get(&alloc_id) else {
1040do yeet ::rustc_middle::mir::interpret::InterpErrorKind::UndefinedBehavior(::rustc_middle::mir::interpret::UndefinedBehaviorInfo::InvalidVaListPointer(Pointer::new(alloc_id,
offset)))throw_ub!(InvalidVaListPointer(Pointer::new(alloc_id, offset)))1041 };
10421043interp_ok(va_list)
1044 }
10451046/// Removes this VaList from the global map of variable argument lists. This does not deallocate
1047 /// the VaList elements, that happens when the Frame is popped.
1048pub fn deallocate_va_list(
1049&mut self,
1050 ptr: Pointer<Option<M::Provenance>>,
1051 ) -> InterpResult<'tcx, VecDeque<MPlaceTy<'tcx, M::Provenance>>> {
1052{
use ::tracing::__macro_support::Callsite as _;
static __CALLSITE: ::tracing::callsite::DefaultCallsite =
{
static META: ::tracing::Metadata<'static> =
{
::tracing_core::metadata::Metadata::new("event compiler/rustc_const_eval/src/interpret/memory.rs:1052",
"rustc_const_eval::interpret::memory",
::tracing::Level::TRACE,
::tracing_core::__macro_support::Option::Some("compiler/rustc_const_eval/src/interpret/memory.rs"),
::tracing_core::__macro_support::Option::Some(1052u32),
::tracing_core::__macro_support::Option::Some("rustc_const_eval::interpret::memory"),
::tracing_core::field::FieldSet::new(&["message"],
::tracing_core::callsite::Identifier(&__CALLSITE)),
::tracing::metadata::Kind::EVENT)
};
::tracing::callsite::DefaultCallsite::new(&META)
};
let enabled =
::tracing::Level::TRACE <= ::tracing::level_filters::STATIC_MAX_LEVEL
&&
::tracing::Level::TRACE <=
::tracing::level_filters::LevelFilter::current() &&
{
let interest = __CALLSITE.interest();
!interest.is_never() &&
::tracing::__macro_support::__is_enabled(__CALLSITE.metadata(),
interest)
};
if enabled {
(|value_set: ::tracing::field::ValueSet|
{
let meta = __CALLSITE.metadata();
::tracing::Event::dispatch(meta, &value_set);
;
})({
#[allow(unused_imports)]
use ::tracing::field::{debug, display, Value};
let mut iter = __CALLSITE.metadata().fields().iter();
__CALLSITE.metadata().fields().value_set(&[(&::tracing::__macro_support::Iterator::next(&mut iter).expect("FieldSet corrupted (this is a bug)"),
::tracing::__macro_support::Option::Some(&format_args!("deallocate_va_list({0:?})",
ptr) as &dyn Value))])
});
} else { ; }
};trace!("deallocate_va_list({:?})", ptr);
1053let (alloc_id, offset, _prov) = self.ptr_get_alloc_id(ptr, 0)?;
1054if offset.bytes() != 0 {
1055do yeet ::rustc_middle::mir::interpret::InterpErrorKind::UndefinedBehavior(::rustc_middle::mir::interpret::UndefinedBehaviorInfo::InvalidVaListPointer(Pointer::new(alloc_id,
offset)))throw_ub!(InvalidVaListPointer(Pointer::new(alloc_id, offset)))1056 }
10571058let Some(va_list) = self.memory.va_list_map.swap_remove(&alloc_id) else {
1059do yeet ::rustc_middle::mir::interpret::InterpErrorKind::UndefinedBehavior(::rustc_middle::mir::interpret::UndefinedBehaviorInfo::InvalidVaListPointer(Pointer::new(alloc_id,
offset)))throw_ub!(InvalidVaListPointer(Pointer::new(alloc_id, offset)))1060 };
10611062self.memory.dead_alloc_map.insert(alloc_id, (Size::ZERO, Align::ONE));
1063interp_ok(va_list)
1064 }
10651066/// Get the dynamic type of the given vtable pointer.
1067 /// If `expected_trait` is `Some`, it must be a vtable for the given trait.
1068pub fn get_ptr_vtable_ty(
1069&self,
1070 ptr: Pointer<Option<M::Provenance>>,
1071 expected_trait: Option<&'tcx ty::List<ty::PolyExistentialPredicate<'tcx>>>,
1072 ) -> InterpResult<'tcx, Ty<'tcx>> {
1073{
use ::tracing::__macro_support::Callsite as _;
static __CALLSITE: ::tracing::callsite::DefaultCallsite =
{
static META: ::tracing::Metadata<'static> =
{
::tracing_core::metadata::Metadata::new("event compiler/rustc_const_eval/src/interpret/memory.rs:1073",
"rustc_const_eval::interpret::memory",
::tracing::Level::TRACE,
::tracing_core::__macro_support::Option::Some("compiler/rustc_const_eval/src/interpret/memory.rs"),
::tracing_core::__macro_support::Option::Some(1073u32),
::tracing_core::__macro_support::Option::Some("rustc_const_eval::interpret::memory"),
::tracing_core::field::FieldSet::new(&["message"],
::tracing_core::callsite::Identifier(&__CALLSITE)),
::tracing::metadata::Kind::EVENT)
};
::tracing::callsite::DefaultCallsite::new(&META)
};
let enabled =
::tracing::Level::TRACE <= ::tracing::level_filters::STATIC_MAX_LEVEL
&&
::tracing::Level::TRACE <=
::tracing::level_filters::LevelFilter::current() &&
{
let interest = __CALLSITE.interest();
!interest.is_never() &&
::tracing::__macro_support::__is_enabled(__CALLSITE.metadata(),
interest)
};
if enabled {
(|value_set: ::tracing::field::ValueSet|
{
let meta = __CALLSITE.metadata();
::tracing::Event::dispatch(meta, &value_set);
;
})({
#[allow(unused_imports)]
use ::tracing::field::{debug, display, Value};
let mut iter = __CALLSITE.metadata().fields().iter();
__CALLSITE.metadata().fields().value_set(&[(&::tracing::__macro_support::Iterator::next(&mut iter).expect("FieldSet corrupted (this is a bug)"),
::tracing::__macro_support::Option::Some(&format_args!("get_ptr_vtable({0:?})",
ptr) as &dyn Value))])
});
} else { ; }
};trace!("get_ptr_vtable({:?})", ptr);
1074let (alloc_id, offset, _tag) = self.ptr_get_alloc_id(ptr, 0)?;
1075if offset.bytes() != 0 {
1076do yeet ::rustc_middle::mir::interpret::InterpErrorKind::UndefinedBehavior(::rustc_middle::mir::interpret::UndefinedBehaviorInfo::InvalidVTablePointer(Pointer::new(alloc_id,
offset)))throw_ub!(InvalidVTablePointer(Pointer::new(alloc_id, offset)))1077 }
1078let Some(GlobalAlloc::VTable(ty, vtable_dyn_type)) =
1079self.tcx.try_get_global_alloc(alloc_id)
1080else {
1081do yeet ::rustc_middle::mir::interpret::InterpErrorKind::UndefinedBehavior(::rustc_middle::mir::interpret::UndefinedBehaviorInfo::InvalidVTablePointer(Pointer::new(alloc_id,
offset)))throw_ub!(InvalidVTablePointer(Pointer::new(alloc_id, offset)))1082 };
1083if let Some(expected_dyn_type) = expected_trait {
1084self.check_vtable_for_type(vtable_dyn_type, expected_dyn_type)?;
1085 }
1086interp_ok(ty)
1087 }
10881089pub fn alloc_mark_immutable(&mut self, id: AllocId) -> InterpResult<'tcx> {
1090self.get_alloc_raw_mut(id)?.0.mutability = Mutability::Not;
1091interp_ok(())
1092 }
10931094/// Visit all allocations reachable from the given start set, by recursively traversing the
1095 /// provenance information of those allocations.
1096pub fn visit_reachable_allocs(
1097&mut self,
1098 start: Vec<AllocId>,
1099mut visit: impl FnMut(&mut Self, AllocId, &AllocInfo) -> InterpResult<'tcx>,
1100 ) -> InterpResult<'tcx> {
1101let mut done = FxHashSet::default();
1102let mut todo = start;
1103while let Some(id) = todo.pop() {
1104if !done.insert(id) {
1105// We already saw this allocation before, don't process it again.
1106continue;
1107 }
1108let info = self.get_alloc_info(id);
11091110// Recurse, if there is data here.
1111 // Do this *before* invoking the callback, as the callback might mutate the
1112 // allocation and e.g. replace all provenance by wildcards!
1113if info.kind == AllocKind::LiveData {
1114let alloc = self.get_alloc_raw(id)?;
1115for prov in alloc.provenance().provenances() {
1116if let Some(id) = prov.get_alloc_id() {
1117 todo.push(id);
1118 }
1119 }
1120 }
11211122// Call the callback.
1123visit(self, id, &info)?;
1124 }
1125interp_ok(())
1126 }
11271128/// Create a lazy debug printer that prints the given allocation and all allocations it points
1129 /// to, recursively.
1130#[must_use]
1131pub fn dump_alloc<'a>(&'a self, id: AllocId) -> DumpAllocs<'a, 'tcx, M> {
1132self.dump_allocs(::alloc::boxed::box_assume_init_into_vec_unsafe(::alloc::intrinsics::write_box_via_move(::alloc::boxed::Box::new_uninit(),
[id]))vec![id])
1133 }
11341135/// Create a lazy debug printer for a list of allocations and all allocations they point to,
1136 /// recursively.
1137#[must_use]
1138pub fn dump_allocs<'a>(&'a self, mut allocs: Vec<AllocId>) -> DumpAllocs<'a, 'tcx, M> {
1139allocs.sort();
1140allocs.dedup();
1141DumpAllocs { ecx: self, allocs }
1142 }
11431144/// Print the allocation's bytes, without any nested allocations.
1145pub fn print_alloc_bytes_for_diagnostics(&self, id: AllocId) -> String {
1146// Using the "raw" access to avoid the `before_alloc_read` hook, we specifically
1147 // want to be able to read all memory for diagnostics, even if that is cyclic.
1148let alloc = self.get_alloc_raw(id).unwrap();
1149let mut bytes = String::new();
1150if alloc.size() != Size::ZERO {
1151bytes = "\n".into();
1152// FIXME(translation) there might be pieces that are translatable.
1153rustc_middle::mir::pretty::write_allocation_bytes(*self.tcx, alloc, &mut bytes, " ")
1154 .unwrap();
1155 }
1156bytes1157 }
11581159/// Find leaked allocations, remove them from memory and return them. Allocations reachable from
1160 /// `static_roots` or a `Global` allocation are not considered leaked, as well as leaks whose
1161 /// kind's `may_leak()` returns true.
1162 ///
1163 /// This is highly destructive, no more execution can happen after this!
1164pub fn take_leaked_allocations(
1165&mut self,
1166 static_roots: impl FnOnce(&Self) -> &[AllocId],
1167 ) -> Vec<(AllocId, MemoryKind<M::MemoryKind>, Allocation<M::Provenance, M::AllocExtra, M::Bytes>)>
1168 {
1169// Collect the set of allocations that are *reachable* from `Global` allocations.
1170let reachable = {
1171let mut reachable = FxHashSet::default();
1172let global_kind = M::GLOBAL_KIND.map(MemoryKind::Machine);
1173let mut todo: Vec<_> =
1174self.memory.alloc_map.filter_map_collect(move |&id, &(kind, _)| {
1175if Some(kind) == global_kind { Some(id) } else { None }
1176 });
1177todo.extend(static_roots(self));
1178while let Some(id) = todo.pop() {
1179if reachable.insert(id) {
1180// This is a new allocation, add the allocations it points to `todo`.
1181 // We only need to care about `alloc_map` memory here, as entirely unchanged
1182 // global memory cannot point to memory relevant for the leak check.
1183if let Some((_, alloc)) = self.memory.alloc_map.get(id) {
1184 todo.extend(
1185 alloc.provenance().provenances().filter_map(|prov| prov.get_alloc_id()),
1186 );
1187 }
1188 }
1189 }
1190reachable1191 };
11921193// All allocations that are *not* `reachable` and *not* `may_leak` are considered leaking.
1194let leaked: Vec<_> = self.memory.alloc_map.filter_map_collect(|&id, &(kind, _)| {
1195if kind.may_leak() || reachable.contains(&id) { None } else { Some(id) }
1196 });
1197let mut result = Vec::new();
1198for &id in leaked.iter() {
1199let (kind, alloc) = self.memory.alloc_map.remove(&id).unwrap();
1200 result.push((id, kind, alloc));
1201 }
1202result1203 }
12041205/// Runs the closure in "validation" mode, which means the machine's memory read hooks will be
1206 /// suppressed. Needless to say, this must only be set with great care! Cannot be nested.
1207 ///
1208 /// We do this so Miri's allocation access tracking does not show the validation
1209 /// reads as spurious accesses.
1210pub fn run_for_validation_mut<R>(&mut self, f: impl FnOnce(&mut Self) -> R) -> R {
1211// This deliberately uses `==` on `bool` to follow the pattern
1212 // `assert!(val.replace(new) == old)`.
1213if !(self.memory.validation_in_progress.replace(true) == false) {
{
::core::panicking::panic_fmt(format_args!("`validation_in_progress` was already set"));
}
};assert!(
1214self.memory.validation_in_progress.replace(true) == false,
1215"`validation_in_progress` was already set"
1216);
1217let res = f(self);
1218if !(self.memory.validation_in_progress.replace(false) == true) {
{
::core::panicking::panic_fmt(format_args!("`validation_in_progress` was unset by someone else"));
}
};assert!(
1219self.memory.validation_in_progress.replace(false) == true,
1220"`validation_in_progress` was unset by someone else"
1221);
1222res1223 }
12241225/// Runs the closure in "validation" mode, which means the machine's memory read hooks will be
1226 /// suppressed. Needless to say, this must only be set with great care! Cannot be nested.
1227 ///
1228 /// We do this so Miri's allocation access tracking does not show the validation
1229 /// reads as spurious accesses.
1230pub fn run_for_validation_ref<R>(&self, f: impl FnOnce(&Self) -> R) -> R {
1231// This deliberately uses `==` on `bool` to follow the pattern
1232 // `assert!(val.replace(new) == old)`.
1233if !(self.memory.validation_in_progress.replace(true) == false) {
{
::core::panicking::panic_fmt(format_args!("`validation_in_progress` was already set"));
}
};assert!(
1234self.memory.validation_in_progress.replace(true) == false,
1235"`validation_in_progress` was already set"
1236);
1237let res = f(self);
1238if !(self.memory.validation_in_progress.replace(false) == true) {
{
::core::panicking::panic_fmt(format_args!("`validation_in_progress` was unset by someone else"));
}
};assert!(
1239self.memory.validation_in_progress.replace(false) == true,
1240"`validation_in_progress` was unset by someone else"
1241);
1242res1243 }
12441245pub(super) fn validation_in_progress(&self) -> bool {
1246self.memory.validation_in_progress.get()
1247 }
1248}
12491250#[doc(hidden)]
1251/// There's no way to use this directly, it's just a helper struct for the `dump_alloc(s)` methods.
1252pub struct DumpAllocs<'a, 'tcx, M: Machine<'tcx>> {
1253 ecx: &'a InterpCx<'tcx, M>,
1254 allocs: Vec<AllocId>,
1255}
12561257impl<'a, 'tcx, M: Machine<'tcx>> std::fmt::Debugfor DumpAllocs<'a, 'tcx, M> {
1258fn fmt(&self, fmt: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
1259// Cannot be a closure because it is generic in `Prov`, `Extra`.
1260fn write_allocation_track_relocs<'tcx, Prov: Provenance, Extra, Bytes: AllocBytes>(
1261 fmt: &mut std::fmt::Formatter<'_>,
1262 tcx: TyCtxt<'tcx>,
1263 allocs_to_print: &mut VecDeque<AllocId>,
1264 alloc: &Allocation<Prov, Extra, Bytes>,
1265 ) -> std::fmt::Result {
1266for alloc_id in alloc.provenance().provenances().filter_map(|prov| prov.get_alloc_id())
1267 {
1268 allocs_to_print.push_back(alloc_id);
1269 }
1270fmt.write_fmt(format_args!("{0}", display_allocation(tcx, alloc)))write!(fmt, "{}", display_allocation(tcx, alloc))1271 }
12721273let mut allocs_to_print: VecDeque<_> = self.allocs.iter().copied().collect();
1274// `allocs_printed` contains all allocations that we have already printed.
1275let mut allocs_printed = FxHashSet::default();
12761277while let Some(id) = allocs_to_print.pop_front() {
1278if !allocs_printed.insert(id) {
1279// Already printed, so skip this.
1280continue;
1281 }
12821283fmt.write_fmt(format_args!("{0:?}", id))write!(fmt, "{id:?}")?;
1284match self.ecx.memory.alloc_map.get(id) {
1285Some((kind, alloc)) => {
1286// normal alloc
1287fmt.write_fmt(format_args!(" ({0}, ", kind))write!(fmt, " ({kind}, ")?;
1288 write_allocation_track_relocs(
1289&mut *fmt,
1290*self.ecx.tcx,
1291&mut allocs_to_print,
1292 alloc,
1293 )?;
1294 }
1295None => {
1296// global alloc
1297match self.ecx.tcx.try_get_global_alloc(id) {
1298Some(GlobalAlloc::Memory(alloc)) => {
1299fmt.write_fmt(format_args!(" (unchanged global, "))write!(fmt, " (unchanged global, ")?;
1300 write_allocation_track_relocs(
1301&mut *fmt,
1302*self.ecx.tcx,
1303&mut allocs_to_print,
1304 alloc.inner(),
1305 )?;
1306 }
1307Some(GlobalAlloc::Function { instance, .. }) => {
1308fmt.write_fmt(format_args!(" (fn: {0})", instance))write!(fmt, " (fn: {instance})")?;
1309 }
1310Some(GlobalAlloc::VTable(ty, dyn_ty)) => {
1311fmt.write_fmt(format_args!(" (vtable: impl {0} for {1})", dyn_ty, ty))write!(fmt, " (vtable: impl {dyn_ty} for {ty})")?;
1312 }
1313Some(GlobalAlloc::TypeId { ty }) => {
1314fmt.write_fmt(format_args!(" (typeid for {0})", ty))write!(fmt, " (typeid for {ty})")?;
1315 }
1316Some(GlobalAlloc::Static(did)) => {
1317fmt.write_fmt(format_args!(" (static: {0})", self.ecx.tcx.def_path_str(did)))write!(fmt, " (static: {})", self.ecx.tcx.def_path_str(did))?;
1318 }
1319None => {
1320fmt.write_fmt(format_args!(" (deallocated)"))write!(fmt, " (deallocated)")?;
1321 }
1322 }
1323 }
1324 }
1325fmt.write_fmt(format_args!("\n"))writeln!(fmt)?;
1326 }
1327Ok(())
1328 }
1329}
13301331/// Reading and writing.
1332impl<'a, 'tcx, Prov: Provenance, Extra, Bytes: AllocBytes>
1333AllocRefMut<'a, 'tcx, Prov, Extra, Bytes>
1334{
1335pub fn as_ref<'b>(&'b self) -> AllocRef<'b, 'tcx, Prov, Extra, Bytes> {
1336AllocRef { alloc: self.alloc, range: self.range, tcx: self.tcx, alloc_id: self.alloc_id }
1337 }
13381339/// `range` is relative to this allocation reference, not the base of the allocation.
1340pub fn write_scalar(&mut self, range: AllocRange, val: Scalar<Prov>) -> InterpResult<'tcx> {
1341let range = self.range.subrange(range);
1342{
use ::tracing::__macro_support::Callsite as _;
static __CALLSITE: ::tracing::callsite::DefaultCallsite =
{
static META: ::tracing::Metadata<'static> =
{
::tracing_core::metadata::Metadata::new("event compiler/rustc_const_eval/src/interpret/memory.rs:1342",
"rustc_const_eval::interpret::memory",
::tracing::Level::DEBUG,
::tracing_core::__macro_support::Option::Some("compiler/rustc_const_eval/src/interpret/memory.rs"),
::tracing_core::__macro_support::Option::Some(1342u32),
::tracing_core::__macro_support::Option::Some("rustc_const_eval::interpret::memory"),
::tracing_core::field::FieldSet::new(&["message"],
::tracing_core::callsite::Identifier(&__CALLSITE)),
::tracing::metadata::Kind::EVENT)
};
::tracing::callsite::DefaultCallsite::new(&META)
};
let enabled =
::tracing::Level::DEBUG <= ::tracing::level_filters::STATIC_MAX_LEVEL
&&
::tracing::Level::DEBUG <=
::tracing::level_filters::LevelFilter::current() &&
{
let interest = __CALLSITE.interest();
!interest.is_never() &&
::tracing::__macro_support::__is_enabled(__CALLSITE.metadata(),
interest)
};
if enabled {
(|value_set: ::tracing::field::ValueSet|
{
let meta = __CALLSITE.metadata();
::tracing::Event::dispatch(meta, &value_set);
;
})({
#[allow(unused_imports)]
use ::tracing::field::{debug, display, Value};
let mut iter = __CALLSITE.metadata().fields().iter();
__CALLSITE.metadata().fields().value_set(&[(&::tracing::__macro_support::Iterator::next(&mut iter).expect("FieldSet corrupted (this is a bug)"),
::tracing::__macro_support::Option::Some(&format_args!("write_scalar at {0:?}{1:?}: {2:?}",
self.alloc_id, range, val) as &dyn Value))])
});
} else { ; }
};debug!("write_scalar at {:?}{range:?}: {val:?}", self.alloc_id);
13431344self.alloc
1345 .write_scalar(&self.tcx, range, val)
1346 .map_err(|e| e.to_interp_error(self.alloc_id))
1347 .into()
1348 }
13491350/// `offset` is relative to this allocation reference, not the base of the allocation.
1351pub fn write_ptr_sized(&mut self, offset: Size, val: Scalar<Prov>) -> InterpResult<'tcx> {
1352self.write_scalar(alloc_range(offset, self.tcx.data_layout().pointer_size()), val)
1353 }
13541355/// Mark the given sub-range (relative to this allocation reference) as uninitialized.
1356pub fn write_uninit(&mut self, range: AllocRange) {
1357let range = self.range.subrange(range);
13581359self.alloc.write_uninit(&self.tcx, range);
1360 }
13611362/// Mark the entire referenced range as uninitialized
1363pub fn write_uninit_full(&mut self) {
1364self.alloc.write_uninit(&self.tcx, self.range);
1365 }
13661367/// Remove all provenance in the reference range.
1368pub fn clear_provenance(&mut self) {
1369self.alloc.clear_provenance(&self.tcx, self.range);
1370 }
1371}
13721373impl<'a, 'tcx, Prov: Provenance, Extra, Bytes: AllocBytes> AllocRef<'a, 'tcx, Prov, Extra, Bytes> {
1374/// `range` is relative to this allocation reference, not the base of the allocation.
1375pub fn read_scalar(
1376&self,
1377 range: AllocRange,
1378 read_provenance: bool,
1379 ) -> InterpResult<'tcx, Scalar<Prov>> {
1380let range = self.range.subrange(range);
1381self.alloc
1382 .read_scalar(&self.tcx, range, read_provenance)
1383 .map_err(|e| e.to_interp_error(self.alloc_id))
1384 .into()
1385 }
13861387/// `range` is relative to this allocation reference, not the base of the allocation.
1388pub fn read_integer(&self, range: AllocRange) -> InterpResult<'tcx, Scalar<Prov>> {
1389self.read_scalar(range, /*read_provenance*/ false)
1390 }
13911392/// `offset` is relative to this allocation reference, not the base of the allocation.
1393pub fn read_pointer(&self, offset: Size) -> InterpResult<'tcx, Scalar<Prov>> {
1394self.read_scalar(
1395alloc_range(offset, self.tcx.data_layout().pointer_size()),
1396/*read_provenance*/ true,
1397 )
1398 }
13991400/// `range` is relative to this allocation reference, not the base of the allocation.
1401pub fn get_bytes_strip_provenance<'b>(&'b self) -> InterpResult<'tcx, &'a [u8]> {
1402self.alloc
1403 .get_bytes_strip_provenance(&self.tcx, self.range)
1404 .map_err(|e| e.to_interp_error(self.alloc_id))
1405 .into()
1406 }
14071408/// Returns whether the allocation has provenance anywhere in the range of the `AllocRef`.
1409pub fn has_provenance(&self) -> bool {
1410 !self.alloc.provenance().range_empty(self.range, &self.tcx)
1411 }
1412}
14131414impl<'tcx, M: Machine<'tcx>> InterpCx<'tcx, M> {
1415/// Reads the given number of bytes from memory, and strips their provenance if possible.
1416 /// Returns them as a slice.
1417 ///
1418 /// Performs appropriate bounds checks.
1419pub fn read_bytes_ptr_strip_provenance(
1420&self,
1421 ptr: Pointer<Option<M::Provenance>>,
1422 size: Size,
1423 ) -> InterpResult<'tcx, &[u8]> {
1424let Some(alloc_ref) = self.get_ptr_alloc(ptr, size)? else {
1425// zero-sized access
1426return interp_ok(&[]);
1427 };
1428// Side-step AllocRef and directly access the underlying bytes more efficiently.
1429 // (We are staying inside the bounds here so all is good.)
1430interp_ok(
1431alloc_ref1432 .alloc
1433 .get_bytes_strip_provenance(&alloc_ref.tcx, alloc_ref.range)
1434 .map_err(|e| e.to_interp_error(alloc_ref.alloc_id))?,
1435 )
1436 }
14371438/// Writes the given stream of bytes into memory.
1439 ///
1440 /// Performs appropriate bounds checks.
1441pub fn write_bytes_ptr(
1442&mut self,
1443 ptr: Pointer<Option<M::Provenance>>,
1444 src: impl IntoIterator<Item = u8>,
1445 ) -> InterpResult<'tcx> {
1446let mut src = src.into_iter();
1447let (lower, upper) = src.size_hint();
1448let len = upper.expect("can only write bounded iterators");
1449match (&lower, &len) {
(left_val, right_val) => {
if !(*left_val == *right_val) {
let kind = ::core::panicking::AssertKind::Eq;
::core::panicking::assert_failed(kind, &*left_val, &*right_val,
::core::option::Option::Some(format_args!("can only write iterators with a precise length")));
}
}
};assert_eq!(lower, len, "can only write iterators with a precise length");
14501451let size = Size::from_bytes(len);
1452let Some(alloc_ref) = self.get_ptr_alloc_mut(ptr, size)? else {
1453// zero-sized access
1454match src.next() {
None => {}
ref left_val => {
::core::panicking::assert_matches_failed(left_val, "None",
::core::option::Option::Some(format_args!("iterator said it was empty but returned an element")));
}
};assert_matches!(src.next(), None, "iterator said it was empty but returned an element");
1455return interp_ok(());
1456 };
14571458// Side-step AllocRef and directly access the underlying bytes more efficiently.
1459 // (We are staying inside the bounds here and all bytes do get overwritten so all is good.)
1460let bytes =
1461alloc_ref.alloc.get_bytes_unchecked_for_overwrite(&alloc_ref.tcx, alloc_ref.range);
1462// `zip` would stop when the first iterator ends; we want to definitely
1463 // cover all of `bytes`.
1464for dest in bytes {
1465*dest = src.next().expect("iterator was shorter than it said it would be");
1466 }
1467match src.next() {
None => {}
ref left_val => {
::core::panicking::assert_matches_failed(left_val, "None",
::core::option::Option::Some(format_args!("iterator was longer than it said it would be")));
}
};assert_matches!(src.next(), None, "iterator was longer than it said it would be");
1468interp_ok(())
1469 }
14701471pub fn mem_copy(
1472&mut self,
1473 src: Pointer<Option<M::Provenance>>,
1474 dest: Pointer<Option<M::Provenance>>,
1475 size: Size,
1476 nonoverlapping: bool,
1477 ) -> InterpResult<'tcx> {
1478self.mem_copy_repeatedly(src, dest, size, 1, nonoverlapping)
1479 }
14801481/// Performs `num_copies` many copies of `size` many bytes from `src` to `dest + i*size` (where
1482 /// `i` is the index of the copy).
1483 ///
1484 /// Either `nonoverlapping` must be true or `num_copies` must be 1; doing repeated copies that
1485 /// may overlap is not supported.
1486pub fn mem_copy_repeatedly(
1487&mut self,
1488 src: Pointer<Option<M::Provenance>>,
1489 dest: Pointer<Option<M::Provenance>>,
1490 size: Size,
1491 num_copies: u64,
1492 nonoverlapping: bool,
1493 ) -> InterpResult<'tcx> {
1494let tcx = self.tcx;
1495// We need to do our own bounds-checks.
1496let src_parts = self.get_ptr_access(src, size)?;
1497let dest_parts = self.get_ptr_access(dest, size * num_copies)?; // `Size` multiplication
14981499 // Similar to `get_ptr_alloc`, we need to call `before_alloc_access` even for zero-sized
1500 // reads. However, just like in `get_ptr_alloc_mut`, the write part is okay to skip for
1501 // zero-sized writes.
1502if let Ok((alloc_id, ..)) = self.ptr_try_get_alloc_id(src, size.bytes().try_into().unwrap())
1503 {
1504 M::before_alloc_access(tcx, &self.machine, alloc_id)?;
1505 }
15061507// FIXME: we look up both allocations twice here, once before for the `check_ptr_access`
1508 // and once below to get the underlying `&[mut] Allocation`.
15091510 // Source alloc preparations and access hooks.
1511let Some((src_alloc_id, src_offset, src_prov)) = src_partselse {
1512// Zero-sized *source*, that means dest is also zero-sized and we have nothing to do.
1513return interp_ok(());
1514 };
1515let src_alloc = self.get_alloc_raw(src_alloc_id)?;
1516let src_range = alloc_range(src_offset, size);
1517if !!self.memory.validation_in_progress.get() {
{
::core::panicking::panic_fmt(format_args!("we can\'t be copying during validation"));
}
};assert!(!self.memory.validation_in_progress.get(), "we can't be copying during validation");
15181519// Trigger read hook.
1520 // For the overlapping case, it is crucial that we trigger the read hook
1521 // before the write hook -- the aliasing model cares about the order.
1522M::before_memory_read(
1523tcx,
1524&self.machine,
1525&src_alloc.extra,
1526src,
1527 (src_alloc_id, src_prov),
1528src_range,
1529 )?;
1530// We need the `dest` ptr for the next operation, so we get it now.
1531 // We already did the source checks and called the hooks so we are good to return early.
1532let Some((dest_alloc_id, dest_offset, dest_prov)) = dest_partselse {
1533// Zero-sized *destination*.
1534return interp_ok(());
1535 };
15361537// Prepare getting source provenance.
1538let src_bytes = src_alloc.get_bytes_unchecked(src_range).as_ptr(); // raw ptr, so we can also get a ptr to the destination allocation
1539 // First copy the provenance to a temporary buffer, because
1540 // `get_bytes_unchecked_for_overwrite_ptr` will clear the provenance (in preparation for
1541 // inserting the new provenance), and that can overlap with the source range.
1542let provenance = src_alloc.provenance_prepare_copy(src_range, self);
1543// Prepare a copy of the initialization mask.
1544let init = src_alloc.init_mask().prepare_copy(src_range);
15451546// Destination alloc preparations...
1547let (dest_alloc, machine) = self.get_alloc_raw_mut(dest_alloc_id)?;
1548let dest_range = alloc_range(dest_offset, size * num_copies);
1549// ...and access hooks.
1550M::before_alloc_access(tcx, machine, dest_alloc_id)?;
1551 M::before_memory_write(
1552tcx,
1553machine,
1554&mut dest_alloc.extra,
1555dest,
1556 (dest_alloc_id, dest_prov),
1557dest_range,
1558 )?;
1559// Yes we do overwrite all bytes in `dest_bytes`.
1560let dest_bytes =
1561dest_alloc.get_bytes_unchecked_for_overwrite_ptr(&tcx, dest_range).as_mut_ptr();
15621563if init.no_bytes_init() {
1564// Fast path: If all bytes are `uninit` then there is nothing to copy. The target range
1565 // is marked as uninitialized but we otherwise omit changing the byte representation which may
1566 // be arbitrary for uninitialized bytes.
1567 // This also avoids writing to the target bytes so that the backing allocation is never
1568 // touched if the bytes stay uninitialized for the whole interpreter execution. On contemporary
1569 // operating system this can avoid physically allocating the page.
1570dest_alloc.write_uninit(&tcx, dest_range);
1571// `write_uninit` also resets the provenance, so we are done.
1572return interp_ok(());
1573 }
15741575// SAFE: The above indexing would have panicked if there weren't at least `size` bytes
1576 // behind `src` and `dest`. Also, we use the overlapping-safe `ptr::copy` if `src` and
1577 // `dest` could possibly overlap.
1578 // The pointers above remain valid even if the `HashMap` table is moved around because they
1579 // point into the `Vec` storing the bytes.
1580unsafe {
1581if src_alloc_id == dest_alloc_id {
1582if nonoverlapping {
1583// `Size` additions
1584if (src_offset <= dest_offset && src_offset + size > dest_offset)
1585 || (dest_offset <= src_offset && dest_offset + size > src_offset)
1586 {
1587do yeet ::rustc_middle::mir::interpret::InterpErrorKind::UndefinedBehavior(::rustc_middle::mir::interpret::UndefinedBehaviorInfo::Ub(::alloc::__export::must_use({
::alloc::fmt::format(format_args!("`copy_nonoverlapping` called on overlapping ranges"))
})));throw_ub_format!("`copy_nonoverlapping` called on overlapping ranges");
1588 }
1589 }
1590 }
1591if num_copies > 1 {
1592if !nonoverlapping {
{
::core::panicking::panic_fmt(format_args!("multi-copy only supported in non-overlapping mode"));
}
};assert!(nonoverlapping, "multi-copy only supported in non-overlapping mode");
1593 }
15941595let size_in_bytes = size.bytes_usize();
1596// For particularly large arrays (where this is perf-sensitive) it's common that
1597 // we're writing a single byte repeatedly. So, optimize that case to a memset.
1598if size_in_bytes == 1 {
1599if true {
if !(num_copies >= 1) {
::core::panicking::panic("assertion failed: num_copies >= 1")
};
};debug_assert!(num_copies >= 1); // we already handled the zero-sized cases above.
1600 // SAFETY: `src_bytes` would be read from anyway by `copy` below (num_copies >= 1).
1601let value = *src_bytes;
1602dest_bytes.write_bytes(value, (size * num_copies).bytes_usize());
1603 } else if src_alloc_id == dest_alloc_id {
1604let mut dest_ptr = dest_bytes;
1605for _ in 0..num_copies {
1606// Here we rely on `src` and `dest` being non-overlapping if there is more than
1607 // one copy.
1608ptr::copy(src_bytes, dest_ptr, size_in_bytes);
1609 dest_ptr = dest_ptr.add(size_in_bytes);
1610 }
1611 } else {
1612let mut dest_ptr = dest_bytes;
1613for _ in 0..num_copies {
1614 ptr::copy_nonoverlapping(src_bytes, dest_ptr, size_in_bytes);
1615 dest_ptr = dest_ptr.add(size_in_bytes);
1616 }
1617 }
1618 }
16191620// now fill in all the "init" data
1621dest_alloc.init_mask_apply_copy(
1622init,
1623alloc_range(dest_offset, size), // just a single copy (i.e., not full `dest_range`)
1624num_copies,
1625 );
1626// copy the provenance to the destination
1627dest_alloc.provenance_apply_copy(provenance, alloc_range(dest_offset, size), num_copies);
16281629interp_ok(())
1630 }
1631}
16321633/// Machine pointer introspection.
1634impl<'tcx, M: Machine<'tcx>> InterpCx<'tcx, M> {
1635/// Test if this value might be null.
1636 /// If the machine does not support ptr-to-int casts, this is conservative.
1637pub fn scalar_may_be_null(&self, scalar: Scalar<M::Provenance>) -> InterpResult<'tcx, bool> {
1638match scalar.try_to_scalar_int() {
1639Ok(int) => interp_ok(int.is_null()),
1640Err(_) => {
1641// We can't cast this pointer to an integer. Can only happen during CTFE.
1642let ptr = scalar.to_pointer(self)?;
1643match self.ptr_try_get_alloc_id(ptr, 0) {
1644Ok((alloc_id, offset, _)) => {
1645let info = self.get_alloc_info(alloc_id);
1646if info.kind == AllocKind::TypeId {
1647// We *could* actually precisely answer this question since here,
1648 // the offset *is* the integer value. But the entire point of making
1649 // this a pointer is not to leak the integer value, so we say everything
1650 // might be null.
1651return interp_ok(true);
1652 }
1653// If the pointer is in-bounds (including "at the end"), it is definitely not null.
1654if offset <= info.size {
1655return interp_ok(false);
1656 }
1657// If the allocation is N-aligned, and the offset is not divisible by N,
1658 // then `base + offset` has a non-zero remainder after division by `N`,
1659 // which means `base + offset` cannot be null.
1660if !offset.bytes().is_multiple_of(info.align.bytes()) {
1661return interp_ok(false);
1662 }
1663// We don't know enough, this might be null.
1664interp_ok(true)
1665 }
1666Err(_offset) => ::rustc_middle::util::bug::bug_fmt(format_args!("a non-int scalar is always a pointer"))bug!("a non-int scalar is always a pointer"),
1667 }
1668 }
1669 }
1670 }
16711672/// Turning a "maybe pointer" into a proper pointer (and some information
1673 /// about where it points), or an absolute address.
1674 ///
1675 /// `size` says how many bytes of memory are expected at that pointer. This is largely only used
1676 /// for error messages; however, the *sign* of `size` can be used to disambiguate situations
1677 /// where a wildcard pointer sits right in between two allocations.
1678 /// It is almost always okay to just set the size to 0; this will be treated like a positive size
1679 /// for handling wildcard pointers.
1680 ///
1681 /// The result must be used immediately; it is not allowed to convert
1682 /// the returned data back into a `Pointer` and store that in machine state.
1683 /// (In fact that's not even possible since `M::ProvenanceExtra` is generic and
1684 /// we don't have an operation to turn it back into `M::Provenance`.)
1685pub fn ptr_try_get_alloc_id(
1686&self,
1687 ptr: Pointer<Option<M::Provenance>>,
1688 size: i64,
1689 ) -> Result<(AllocId, Size, M::ProvenanceExtra), u64> {
1690match ptr.into_pointer_or_addr() {
1691Ok(ptr) => match M::ptr_get_alloc(self, ptr, size) {
1692Some((alloc_id, offset, extra)) => Ok((alloc_id, offset, extra)),
1693None => {
1694if !M::Provenance::OFFSET_IS_ADDR {
::core::panicking::panic("assertion failed: M::Provenance::OFFSET_IS_ADDR")
};assert!(M::Provenance::OFFSET_IS_ADDR);
1695// Offset is absolute, as we just asserted.
1696let (_, addr) = ptr.into_raw_parts();
1697Err(addr.bytes())
1698 }
1699 },
1700Err(addr) => Err(addr.bytes()),
1701 }
1702 }
17031704/// Turning a "maybe pointer" into a proper pointer (and some information about where it points).
1705 ///
1706 /// `size` says how many bytes of memory are expected at that pointer. This is largely only used
1707 /// for error messages; however, the *sign* of `size` can be used to disambiguate situations
1708 /// where a wildcard pointer sits right in between two allocations.
1709 /// It is almost always okay to just set the size to 0; this will be treated like a positive size
1710 /// for handling wildcard pointers.
1711 ///
1712 /// The result must be used immediately; it is not allowed to convert
1713 /// the returned data back into a `Pointer` and store that in machine state.
1714 /// (In fact that's not even possible since `M::ProvenanceExtra` is generic and
1715 /// we don't have an operation to turn it back into `M::Provenance`.)
1716#[inline(always)]
1717pub fn ptr_get_alloc_id(
1718&self,
1719 ptr: Pointer<Option<M::Provenance>>,
1720 size: i64,
1721 ) -> InterpResult<'tcx, (AllocId, Size, M::ProvenanceExtra)> {
1722self.ptr_try_get_alloc_id(ptr, size)
1723 .map_err(|offset| {
1724::rustc_middle::mir::interpret::InterpErrorKind::UndefinedBehavior(::rustc_middle::mir::interpret::UndefinedBehaviorInfo::DanglingIntPointer {
addr: offset,
inbounds_size: size,
msg: CheckInAllocMsg::Dereferenceable,
})err_ub!(DanglingIntPointer {
1725 addr: offset,
1726 inbounds_size: size,
1727 msg: CheckInAllocMsg::Dereferenceable
1728 })1729 })
1730 .into()
1731 }
1732}