1 use std::cell::RefCell;
6 use rustc_middle::ty::{self, TyCtxt};
7 use rustc_span::{source_map::DUMMY_SP, Span};
11 /// Details of premature program termination.
12 pub enum TerminationInfo {
14 Abort(Option<String>),
15 UnsupportedInIsolation(String),
16 ExperimentalUb { msg: String, url: String },
20 impl fmt::Display for TerminationInfo {
21 fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
22 use TerminationInfo::*;
25 write!(f, "the evaluated program completed with exit code {}", code),
27 write!(f, "the evaluated program aborted execution"),
29 write!(f, "the evaluated program aborted execution: {}", msg),
30 UnsupportedInIsolation(msg) =>
32 ExperimentalUb { msg, .. } =>
35 write!(f, "the evaluated program deadlocked"),
40 impl MachineStopType for TerminationInfo {}
42 /// Miri specific diagnostics
43 pub enum NonHaltingDiagnostic {
44 PoppedPointerTag(Item),
45 CreatedCallId(CallId),
46 CreatedAlloc(AllocId),
50 /// Emit a custom diagnostic without going through the miri-engine machinery
51 pub fn report_error<'tcx, 'mir>(
52 ecx: &InterpCx<'mir, 'tcx, Evaluator<'mir, 'tcx>>,
53 e: InterpErrorInfo<'tcx>,
57 let (title, helps) = match &e.kind {
58 MachineStop(info) => {
59 let info = info.downcast_ref::<TerminationInfo>().expect("invalid MachineStop payload");
60 use TerminationInfo::*;
61 let title = match info {
62 Exit(code) => return Some(*code),
64 "abnormal termination",
65 UnsupportedInIsolation(_) =>
66 "unsupported operation",
67 ExperimentalUb { .. } =>
69 Deadlock => "deadlock",
71 let helps = match info {
72 UnsupportedInIsolation(_) =>
73 vec![format!("pass the flag `-Zmiri-disable-isolation` to disable isolation")],
74 ExperimentalUb { url, .. } =>
76 format!("this indicates a potential bug in the program: it performed an invalid operation, but the rules it violated are still experimental"),
77 format!("see {} for further information", url),
84 let title = match e.kind {
86 "unsupported operation",
87 UndefinedBehavior(_) =>
89 ResourceExhaustion(_) =>
90 "resource exhaustion",
91 InvalidProgram(InvalidProgramInfo::ReferencedConstant) =>
92 "post-monomorphization error",
94 bug!("This error should be impossible in Miri: {}", e),
96 let helps = match e.kind {
97 Unsupported(UnsupportedOpInfo::NoMirFor(..)) =>
98 vec![format!("make sure to use a Miri sysroot, which you can prepare with `cargo miri setup`")],
99 Unsupported(UnsupportedOpInfo::ReadBytesAsPointer | UnsupportedOpInfo::ThreadLocalStatic(_) | UnsupportedOpInfo::ReadExternStatic(_)) =>
100 panic!("Error should never be raised by Miri: {:?}", e.kind),
102 vec![format!("this is likely not a bug in the program; it indicates that the program performed an operation that the interpreter does not support")],
103 UndefinedBehavior(UndefinedBehaviorInfo::AlignmentCheckFailed { .. }) =>
105 format!("this usually indicates that your program performed an invalid operation and caused Undefined Behavior"),
106 format!("but alignment errors can also be false positives, see https://github.com/rust-lang/miri/issues/1074"),
107 format!("you can disable the alignment check with `-Zmiri-disable-alignment-check`, but that could hide true bugs")
109 UndefinedBehavior(_) =>
111 format!("this indicates a bug in the program: it performed an invalid operation, and caused Undefined Behavior"),
112 format!("see https://doc.rust-lang.org/nightly/reference/behavior-considered-undefined.html for further information"),
121 let msg = e.to_string();
122 report_msg(*ecx.tcx, /*error*/true, &format!("{}: {}", title, msg), msg, helps, &ecx.generate_stacktrace());
124 // Debug-dump all locals.
125 for (i, frame) in ecx.active_thread_stack().iter().enumerate() {
126 trace!("-------------------");
127 trace!("Frame {}", i);
128 trace!(" return: {:?}", frame.return_place.map(|p| *p));
129 for (i, local) in frame.locals.iter().enumerate() {
130 trace!(" local {}: {:?}", i, local.value);
134 // Extra output to help debug specific issues.
136 UndefinedBehavior(UndefinedBehaviorInfo::InvalidUninitBytes(Some(access))) => {
138 "Uninitialized read occurred at offsets 0x{:x}..0x{:x} into this allocation:",
139 access.uninit_ptr.offset.bytes(),
140 access.uninit_ptr.offset.bytes() + access.uninit_size.bytes(),
142 eprintln!("{:?}", ecx.memory.dump_alloc(access.uninit_ptr.alloc_id));
150 /// Report an error or note (depending on the `error` argument) with the given stacktrace.
151 /// Also emits a full stacktrace of the interpreter stack.
157 mut helps: Vec<String>,
158 stacktrace: &[FrameInfo<'tcx>],
160 let span = stacktrace.first().map_or(DUMMY_SP, |fi| fi.span);
161 let mut err = if error {
162 tcx.sess.struct_span_err(span, title)
164 tcx.sess.diagnostic().span_note_diag(span, title)
166 // Show main message.
167 if span != DUMMY_SP {
168 err.span_label(span, span_msg);
170 // Make sure we show the message even when it is a dummy span.
172 err.note("(no span available)");
174 // Show help messages.
175 if !helps.is_empty() {
176 // Add visual separator before backtrace.
177 helps.last_mut().unwrap().push_str("\n");
183 for (idx, frame_info) in stacktrace.iter().enumerate() {
184 let is_local = frame_info.instance.def_id().is_local();
185 // No span for non-local frames and the first frame (which is the error site).
186 if is_local && idx > 0 {
187 err.span_note(frame_info.span, &frame_info.to_string());
189 err.note(&frame_info.to_string());
197 static DIAGNOSTICS: RefCell<Vec<NonHaltingDiagnostic>> = RefCell::new(Vec::new());
200 /// Schedule a diagnostic for emitting. This function works even if you have no `InterpCx` available.
201 /// The diagnostic will be emitted after the current interpreter step is finished.
202 pub fn register_diagnostic(e: NonHaltingDiagnostic) {
203 DIAGNOSTICS.with(|diagnostics| diagnostics.borrow_mut().push(e));
206 /// Remember enough about the topmost frame so that we can restore the stack
207 /// after a step was taken.
208 pub struct TopFrameInfo<'tcx> {
210 instance: Option<ty::Instance<'tcx>>,
214 impl<'mir, 'tcx: 'mir> EvalContextExt<'mir, 'tcx> for crate::MiriEvalContext<'mir, 'tcx> {}
215 pub trait EvalContextExt<'mir, 'tcx: 'mir>: crate::MiriEvalContextExt<'mir, 'tcx> {
216 fn preprocess_diagnostics(&self) -> TopFrameInfo<'tcx> {
217 // Ensure we have no lingering diagnostics.
218 DIAGNOSTICS.with(|diagnostics| assert!(diagnostics.borrow().is_empty()));
220 let this = self.eval_context_ref();
221 if this.active_thread_stack().is_empty() {
222 // Diagnostics can happen even with the empty stack (e.g. deallocation of thread-local statics).
223 return TopFrameInfo { stack_size: 0, instance: None, span: DUMMY_SP };
225 let frame = this.frame();
228 stack_size: this.active_thread_stack().len(),
229 instance: Some(frame.instance),
230 span: frame.current_source_info().map_or(DUMMY_SP, |si| si.span),
234 /// Emit all diagnostics that were registed with `register_diagnostics`
235 fn process_diagnostics(&self, info: TopFrameInfo<'tcx>) {
236 let this = self.eval_context_ref();
237 DIAGNOSTICS.with(|diagnostics| {
238 let mut diagnostics = diagnostics.borrow_mut();
239 if diagnostics.is_empty() {
242 // We need to fix up the stack trace, because the machine has already
243 // stepped to the next statement.
244 let mut stacktrace = this.generate_stacktrace();
245 // Remove newly pushed frames.
246 while stacktrace.len() > info.stack_size {
247 stacktrace.remove(0);
249 // Add popped frame back.
250 if stacktrace.len() < info.stack_size {
251 assert!(stacktrace.len() == info.stack_size-1, "we should never pop more than one frame at once");
252 let frame_info = FrameInfo {
253 instance: info.instance.unwrap(),
257 stacktrace.insert(0, frame_info);
258 } else if let Some(instance) = info.instance {
259 // Adjust topmost frame.
260 stacktrace[0].span = info.span;
261 assert_eq!(stacktrace[0].instance, instance, "we should not pop and push a frame in one step");
265 for e in diagnostics.drain(..) {
266 use NonHaltingDiagnostic::*;
268 PoppedPointerTag(item) =>
269 format!("popped tracked tag for item {:?}", item),
271 format!("function call with id {}", id),
272 CreatedAlloc(AllocId(id)) =>
273 format!("created allocation with id {}", id),
274 FreedAlloc(AllocId(id)) =>
275 format!("freed allocation with id {}", id),
277 report_msg(*this.tcx, /*error*/false, "tracking was triggered", msg, vec![], &stacktrace);