Skip to content

Commit b853252

Browse files
committedNov 24, 2018
Rebase fallout
1 parent 360f988 commit b853252

File tree

6 files changed

+44
-21
lines changed

6 files changed

+44
-21
lines changed
 

‎src/librustc/mir/interpret/allocation.rs

+2-11
Original file line numberDiff line numberDiff line change
@@ -57,23 +57,14 @@ pub struct Allocation<Tag=(),Extra=()> {
5757
impl<'tcx, Tag, Extra> Allocation<Tag, Extra> {
5858
/// Check if the pointer is "in-bounds". Notice that a pointer pointing at the end
5959
/// of an allocation (i.e., at the first *inaccessible* location) *is* considered
60-
/// in-bounds! This follows C's/LLVM's rules. `check` indicates whether we
61-
/// additionally require the pointer to be pointing to a *live* (still allocated)
62-
/// allocation.
60+
/// in-bounds! This follows C's/LLVM's rules.
6361
/// If you want to check bounds before doing a memory access, better use `check_bounds`.
6462
pub fn check_bounds_ptr(
6563
&self,
6664
ptr: Pointer<Tag>,
6765
) -> EvalResult<'tcx> {
6866
let allocation_size = self.bytes.len() as u64;
69-
if ptr.offset.bytes() > allocation_size {
70-
return err!(PointerOutOfBounds {
71-
ptr: ptr.erase_tag(),
72-
check: InboundsCheck::Live,
73-
allocation_size: Size::from_bytes(allocation_size),
74-
});
75-
}
76-
Ok(())
67+
ptr.check_in_alloc(Size::from_bytes(allocation_size), InboundsCheck::Live)
7768
}
7869

7970
/// Check if the memory range beginning at `ptr` and of size `Size` is "in-bounds".

‎src/librustc/mir/interpret/pointer.rs

+18-1
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ use mir;
22
use ty::layout::{self, HasDataLayout, Size};
33

44
use super::{
5-
AllocId, EvalResult,
5+
AllocId, EvalResult, InboundsCheck,
66
};
77

88
////////////////////////////////////////////////////////////////////////////////
@@ -148,4 +148,21 @@ impl<'tcx, Tag> Pointer<Tag> {
148148
pub fn erase_tag(self) -> Pointer {
149149
Pointer { alloc_id: self.alloc_id, offset: self.offset, tag: () }
150150
}
151+
152+
#[inline(always)]
153+
pub fn check_in_alloc(
154+
self,
155+
allocation_size: Size,
156+
check: InboundsCheck,
157+
) -> EvalResult<'tcx, ()> {
158+
if self.offset > allocation_size {
159+
err!(PointerOutOfBounds {
160+
ptr: self.erase_tag(),
161+
check,
162+
allocation_size,
163+
})
164+
} else {
165+
Ok(())
166+
}
167+
}
151168
}

‎src/librustc_mir/interpret/memory.rs

+20-5
Original file line numberDiff line numberDiff line change
@@ -28,9 +28,9 @@ use rustc_data_structures::fx::{FxHashSet, FxHashMap};
2828
use syntax::ast::Mutability;
2929

3030
use super::{
31-
Pointer, AllocId, Allocation, GlobalId, AllocationExtra, InboundsCheck,
31+
Pointer, AllocId, Allocation, GlobalId, AllocationExtra,
3232
EvalResult, Scalar, EvalErrorKind, AllocType, PointerArithmetic,
33-
Machine, AllocMap, MayLeak, ErrorHandled, AllocationExtra,
33+
Machine, AllocMap, MayLeak, ErrorHandled, InboundsCheck,
3434
};
3535

3636
#[derive(Debug, PartialEq, Eq, Copy, Clone, Hash)]
@@ -251,9 +251,7 @@ impl<'a, 'mir, 'tcx, M: Machine<'a, 'mir, 'tcx>> Memory<'a, 'mir, 'tcx, M> {
251251
Scalar::Ptr(ptr) => {
252252
// check this is not NULL -- which we can ensure only if this is in-bounds
253253
// of some (potentially dead) allocation.
254-
self.check_bounds_ptr(ptr, InboundsCheck::MaybeDead)?;
255-
// data required for alignment check
256-
let (_, align) = self.get_size_and_align(ptr.alloc_id);
254+
let align = self.check_bounds_ptr_maybe_dead(ptr)?;
257255
(ptr.offset.bytes(), align)
258256
}
259257
Scalar::Bits { bits, size } => {
@@ -284,6 +282,23 @@ impl<'a, 'mir, 'tcx, M: Machine<'a, 'mir, 'tcx>> Memory<'a, 'mir, 'tcx, M> {
284282
})
285283
}
286284
}
285+
286+
/// Check if the pointer is "in-bounds". Notice that a pointer pointing at the end
287+
/// of an allocation (i.e., at the first *inaccessible* location) *is* considered
288+
/// in-bounds! This follows C's/LLVM's rules.
289+
/// This function also works for deallocated allocations.
290+
/// Use `.get(ptr.alloc_id)?.check_bounds_ptr(ptr)` if you want to force the allocation
291+
/// to still be live.
292+
/// If you want to check bounds before doing a memory access, better first obtain
293+
/// an `Allocation` and call `check_bounds`.
294+
pub fn check_bounds_ptr_maybe_dead(
295+
&self,
296+
ptr: Pointer<M::PointerTag>,
297+
) -> EvalResult<'tcx, Align> {
298+
let (allocation_size, align) = self.get_size_and_align(ptr.alloc_id);
299+
ptr.check_in_alloc(allocation_size, InboundsCheck::MaybeDead)?;
300+
Ok(align)
301+
}
287302
}
288303

289304
/// Allocation accessors

‎src/librustc_mir/interpret/operand.rs

+2-2
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ use rustc::ty::layout::{self, Size, LayoutOf, TyLayout, HasDataLayout, IntegerEx
1919
use rustc::mir::interpret::{
2020
GlobalId, AllocId,
2121
ConstValue, Pointer, Scalar,
22-
EvalResult, EvalErrorKind, InboundsCheck,
22+
EvalResult, EvalErrorKind,
2323
};
2424
use super::{EvalContext, Machine, MemPlace, MPlaceTy, MemoryKind};
2525
pub use rustc::mir::interpret::ScalarMaybeUndef;
@@ -647,7 +647,7 @@ impl<'a, 'mir, 'tcx, M: Machine<'a, 'mir, 'tcx>> EvalContext<'a, 'mir, 'tcx, M>
647647
ScalarMaybeUndef::Scalar(Scalar::Ptr(ptr)) => {
648648
// The niche must be just 0 (which an inbounds pointer value never is)
649649
let ptr_valid = niche_start == 0 && variants_start == variants_end &&
650-
self.memory.check_bounds_ptr(ptr, InboundsCheck::MaybeDead).is_ok();
650+
self.memory.check_bounds_ptr_maybe_dead(ptr).is_ok();
651651
if !ptr_valid {
652652
return err!(InvalidDiscriminant(raw_discr.erase_tag()));
653653
}

‎src/librustc_mir/interpret/validity.rs

+1-1
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ use rustc::ty::layout::{self, Size, Align, TyLayout, LayoutOf, VariantIdx};
1717
use rustc::ty;
1818
use rustc_data_structures::fx::FxHashSet;
1919
use rustc::mir::interpret::{
20-
Scalar, AllocType, EvalResult, EvalErrorKind, InboundsCheck,
20+
Scalar, AllocType, EvalResult, EvalErrorKind,
2121
};
2222

2323
use super::{

‎src/tools/miri

Submodule miri updated from dd7f545 to 32e93ed

0 commit comments

Comments
 (0)
Please sign in to comment.