1 // Copyright (c) 2015-2016 The Khronos Group Inc.
2 //
3 // Licensed under the Apache License, Version 2.0 (the "License");
4 // you may not use this file except in compliance with the License.
5 // You may obtain a copy of the License at
6 //
7 // http://www.apache.org/licenses/LICENSE-2.0
8 //
9 // Unless required by applicable law or agreed to in writing, software
10 // distributed under the License is distributed on an "AS IS" BASIS,
11 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 // See the License for the specific language governing permissions and
13 // limitations under the License.
14
15 #include "source/val/validate.h"
16
17 #include <algorithm>
18 #include <cassert>
19 #include <cstdio>
20 #include <functional>
21 #include <iterator>
22 #include <memory>
23 #include <sstream>
24 #include <string>
25 #include <vector>
26
27 #include "source/binary.h"
28 #include "source/diagnostic.h"
29 #include "source/enum_string_mapping.h"
30 #include "source/extensions.h"
31 #include "source/instruction.h"
32 #include "source/opcode.h"
33 #include "source/operand.h"
34 #include "source/spirv_constant.h"
35 #include "source/spirv_endian.h"
36 #include "source/spirv_target_env.h"
37 #include "source/spirv_validator_options.h"
38 #include "source/val/construct.h"
39 #include "source/val/function.h"
40 #include "source/val/instruction.h"
41 #include "source/val/validation_state.h"
42 #include "spirv-tools/libspirv.h"
43
44 namespace {
45 // TODO(issue 1950): The validator only returns a single message anyway, so no
46 // point in generating more than 1 warning.
47 static uint32_t kDefaultMaxNumOfWarnings = 1;
48 } // namespace
49
50 namespace spvtools {
51 namespace val {
52 namespace {
53
54 // Parses OpExtension instruction and registers extension.
RegisterExtension(ValidationState_t & _,const spv_parsed_instruction_t * inst)55 void RegisterExtension(ValidationState_t& _,
56 const spv_parsed_instruction_t* inst) {
57 const std::string extension_str = spvtools::GetExtensionString(inst);
58 Extension extension;
59 if (!GetExtensionFromString(extension_str.c_str(), &extension)) {
60 // The error will be logged in the ProcessInstruction pass.
61 return;
62 }
63
64 _.RegisterExtension(extension);
65 }
66
67 // Parses the beginning of the module searching for OpExtension instructions.
68 // Registers extensions if recognized. Returns SPV_REQUESTED_TERMINATION
69 // once an instruction which is not SpvOpCapability and SpvOpExtension is
70 // encountered. According to the SPIR-V spec extensions are declared after
71 // capabilities and before everything else.
ProcessExtensions(void * user_data,const spv_parsed_instruction_t * inst)72 spv_result_t ProcessExtensions(void* user_data,
73 const spv_parsed_instruction_t* inst) {
74 const SpvOp opcode = static_cast<SpvOp>(inst->opcode);
75 if (opcode == SpvOpCapability) return SPV_SUCCESS;
76
77 if (opcode == SpvOpExtension) {
78 ValidationState_t& _ = *(reinterpret_cast<ValidationState_t*>(user_data));
79 RegisterExtension(_, inst);
80 return SPV_SUCCESS;
81 }
82
83 // OpExtension block is finished, requesting termination.
84 return SPV_REQUESTED_TERMINATION;
85 }
86
ProcessInstruction(void * user_data,const spv_parsed_instruction_t * inst)87 spv_result_t ProcessInstruction(void* user_data,
88 const spv_parsed_instruction_t* inst) {
89 ValidationState_t& _ = *(reinterpret_cast<ValidationState_t*>(user_data));
90
91 auto* instruction = _.AddOrderedInstruction(inst);
92 _.RegisterDebugInstruction(instruction);
93
94 return SPV_SUCCESS;
95 }
96
ValidateForwardDecls(ValidationState_t & _)97 spv_result_t ValidateForwardDecls(ValidationState_t& _) {
98 if (_.unresolved_forward_id_count() == 0) return SPV_SUCCESS;
99
100 std::stringstream ss;
101 std::vector<uint32_t> ids = _.UnresolvedForwardIds();
102
103 std::transform(
104 std::begin(ids), std::end(ids),
105 std::ostream_iterator<std::string>(ss, " "),
106 bind(&ValidationState_t::getIdName, std::ref(_), std::placeholders::_1));
107
108 auto id_str = ss.str();
109 return _.diag(SPV_ERROR_INVALID_ID, nullptr)
110 << "The following forward referenced IDs have not been defined:\n"
111 << id_str.substr(0, id_str.size() - 1);
112 }
113
114 // Entry point validation. Based on 2.16.1 (Universal Validation Rules) of the
115 // SPIRV spec:
116 // * There is at least one OpEntryPoint instruction, unless the Linkage
117 // capability is being used.
118 // * No function can be targeted by both an OpEntryPoint instruction and an
119 // OpFunctionCall instruction.
120 //
121 // Additionally enforces that entry points for Vulkan should not have recursion.
ValidateEntryPoints(ValidationState_t & _)122 spv_result_t ValidateEntryPoints(ValidationState_t& _) {
123 _.ComputeFunctionToEntryPointMapping();
124 _.ComputeRecursiveEntryPoints();
125
126 if (_.entry_points().empty() && !_.HasCapability(SpvCapabilityLinkage)) {
127 return _.diag(SPV_ERROR_INVALID_BINARY, nullptr)
128 << "No OpEntryPoint instruction was found. This is only allowed if "
129 "the Linkage capability is being used.";
130 }
131
132 for (const auto& entry_point : _.entry_points()) {
133 if (_.IsFunctionCallTarget(entry_point)) {
134 return _.diag(SPV_ERROR_INVALID_BINARY, _.FindDef(entry_point))
135 << "A function (" << entry_point
136 << ") may not be targeted by both an OpEntryPoint instruction and "
137 "an OpFunctionCall instruction.";
138 }
139
140 // For Vulkan, the static function-call graph for an entry point
141 // must not contain cycles.
142 if (spvIsVulkanEnv(_.context()->target_env)) {
143 if (_.recursive_entry_points().find(entry_point) !=
144 _.recursive_entry_points().end()) {
145 return _.diag(SPV_ERROR_INVALID_BINARY, _.FindDef(entry_point))
146 << _.VkErrorID(4634)
147 << "Entry points may not have a call graph with cycles.";
148 }
149 }
150 }
151
152 return SPV_SUCCESS;
153 }
154
ValidateBinaryUsingContextAndValidationState(const spv_context_t & context,const uint32_t * words,const size_t num_words,spv_diagnostic * pDiagnostic,ValidationState_t * vstate)155 spv_result_t ValidateBinaryUsingContextAndValidationState(
156 const spv_context_t& context, const uint32_t* words, const size_t num_words,
157 spv_diagnostic* pDiagnostic, ValidationState_t* vstate) {
158 auto binary = std::unique_ptr<spv_const_binary_t>(
159 new spv_const_binary_t{words, num_words});
160
161 spv_endianness_t endian;
162 spv_position_t position = {};
163 if (spvBinaryEndianness(binary.get(), &endian)) {
164 return DiagnosticStream(position, context.consumer, "",
165 SPV_ERROR_INVALID_BINARY)
166 << "Invalid SPIR-V magic number.";
167 }
168
169 spv_header_t header;
170 if (spvBinaryHeaderGet(binary.get(), endian, &header)) {
171 return DiagnosticStream(position, context.consumer, "",
172 SPV_ERROR_INVALID_BINARY)
173 << "Invalid SPIR-V header.";
174 }
175
176 if (header.version > spvVersionForTargetEnv(context.target_env)) {
177 return DiagnosticStream(position, context.consumer, "",
178 SPV_ERROR_WRONG_VERSION)
179 << "Invalid SPIR-V binary version "
180 << SPV_SPIRV_VERSION_MAJOR_PART(header.version) << "."
181 << SPV_SPIRV_VERSION_MINOR_PART(header.version)
182 << " for target environment "
183 << spvTargetEnvDescription(context.target_env) << ".";
184 }
185
186 if (header.bound > vstate->options()->universal_limits_.max_id_bound) {
187 return DiagnosticStream(position, context.consumer, "",
188 SPV_ERROR_INVALID_BINARY)
189 << "Invalid SPIR-V. The id bound is larger than the max id bound "
190 << vstate->options()->universal_limits_.max_id_bound << ".";
191 }
192
193 // Look for OpExtension instructions and register extensions.
194 // This parse should not produce any error messages. Hijack the context and
195 // replace the message consumer so that we do not pollute any state in input
196 // consumer.
197 spv_context_t hijacked_context = context;
198 hijacked_context.consumer = [](spv_message_level_t, const char*,
199 const spv_position_t&, const char*) {};
200 spvBinaryParse(&hijacked_context, vstate, words, num_words,
201 /* parsed_header = */ nullptr, ProcessExtensions,
202 /* diagnostic = */ nullptr);
203
204 // Parse the module and perform inline validation checks. These checks do
205 // not require the knowledge of the whole module.
206 if (auto error = spvBinaryParse(&context, vstate, words, num_words,
207 /*parsed_header =*/nullptr,
208 ProcessInstruction, pDiagnostic)) {
209 return error;
210 }
211
212 std::vector<Instruction*> visited_entry_points;
213 for (auto& instruction : vstate->ordered_instructions()) {
214 {
215 // In order to do this work outside of Process Instruction we need to be
216 // able to, briefly, de-const the instruction.
217 Instruction* inst = const_cast<Instruction*>(&instruction);
218
219 if (inst->opcode() == SpvOpEntryPoint) {
220 const auto entry_point = inst->GetOperandAs<uint32_t>(1);
221 const auto execution_model = inst->GetOperandAs<SpvExecutionModel>(0);
222 const std::string desc_name = inst->GetOperandAs<std::string>(2);
223
224 ValidationState_t::EntryPointDescription desc;
225 desc.name = desc_name;
226
227 std::vector<uint32_t> interfaces;
228 for (size_t j = 3; j < inst->operands().size(); ++j)
229 desc.interfaces.push_back(inst->word(inst->operand(j).offset));
230
231 vstate->RegisterEntryPoint(entry_point, execution_model,
232 std::move(desc));
233
234 if (visited_entry_points.size() > 0) {
235 for (const Instruction* check_inst : visited_entry_points) {
236 const auto check_execution_model =
237 check_inst->GetOperandAs<SpvExecutionModel>(0);
238 const std::string check_name =
239 check_inst->GetOperandAs<std::string>(2);
240
241 if (desc_name == check_name &&
242 execution_model == check_execution_model) {
243 return vstate->diag(SPV_ERROR_INVALID_DATA, inst)
244 << "2 Entry points cannot share the same name and "
245 "ExecutionMode.";
246 }
247 }
248 }
249 visited_entry_points.push_back(inst);
250 }
251 if (inst->opcode() == SpvOpFunctionCall) {
252 if (!vstate->in_function_body()) {
253 return vstate->diag(SPV_ERROR_INVALID_LAYOUT, &instruction)
254 << "A FunctionCall must happen within a function body.";
255 }
256
257 const auto called_id = inst->GetOperandAs<uint32_t>(2);
258 vstate->AddFunctionCallTarget(called_id);
259 }
260
261 if (vstate->in_function_body()) {
262 inst->set_function(&(vstate->current_function()));
263 inst->set_block(vstate->current_function().current_block());
264
265 if (vstate->in_block() && spvOpcodeIsBlockTerminator(inst->opcode())) {
266 vstate->current_function().current_block()->set_terminator(inst);
267 }
268 }
269
270 if (auto error = IdPass(*vstate, inst)) return error;
271 }
272
273 if (auto error = CapabilityPass(*vstate, &instruction)) return error;
274 if (auto error = ModuleLayoutPass(*vstate, &instruction)) return error;
275 if (auto error = CfgPass(*vstate, &instruction)) return error;
276 if (auto error = InstructionPass(*vstate, &instruction)) return error;
277
278 // Now that all of the checks are done, update the state.
279 {
280 Instruction* inst = const_cast<Instruction*>(&instruction);
281 vstate->RegisterInstruction(inst);
282 if (inst->opcode() == SpvOpTypeForwardPointer) {
283 vstate->RegisterForwardPointer(inst->GetOperandAs<uint32_t>(0));
284 }
285 }
286 }
287
288 if (!vstate->has_memory_model_specified())
289 return vstate->diag(SPV_ERROR_INVALID_LAYOUT, nullptr)
290 << "Missing required OpMemoryModel instruction.";
291
292 if (vstate->in_function_body())
293 return vstate->diag(SPV_ERROR_INVALID_LAYOUT, nullptr)
294 << "Missing OpFunctionEnd at end of module.";
295
296 // Catch undefined forward references before performing further checks.
297 if (auto error = ValidateForwardDecls(*vstate)) return error;
298
299 // Calculate reachability after all the blocks are parsed, but early that it
300 // can be relied on in subsequent pases.
301 ReachabilityPass(*vstate);
302
303 // ID usage needs be handled in its own iteration of the instructions,
304 // between the two others. It depends on the first loop to have been
305 // finished, so that all instructions have been registered. And the following
306 // loop depends on all of the usage data being populated. Thus it cannot live
307 // in either of those iterations.
308 // It should also live after the forward declaration check, since it will
309 // have problems with missing forward declarations, but give less useful error
310 // messages.
311 for (size_t i = 0; i < vstate->ordered_instructions().size(); ++i) {
312 auto& instruction = vstate->ordered_instructions()[i];
313 if (auto error = UpdateIdUse(*vstate, &instruction)) return error;
314 }
315
316 // Validate individual opcodes.
317 for (size_t i = 0; i < vstate->ordered_instructions().size(); ++i) {
318 auto& instruction = vstate->ordered_instructions()[i];
319
320 // Keep these passes in the order they appear in the SPIR-V specification
321 // sections to maintain test consistency.
322 if (auto error = MiscPass(*vstate, &instruction)) return error;
323 if (auto error = DebugPass(*vstate, &instruction)) return error;
324 if (auto error = AnnotationPass(*vstate, &instruction)) return error;
325 if (auto error = ExtensionPass(*vstate, &instruction)) return error;
326 if (auto error = ModeSettingPass(*vstate, &instruction)) return error;
327 if (auto error = TypePass(*vstate, &instruction)) return error;
328 if (auto error = ConstantPass(*vstate, &instruction)) return error;
329 if (auto error = MemoryPass(*vstate, &instruction)) return error;
330 if (auto error = FunctionPass(*vstate, &instruction)) return error;
331 if (auto error = ImagePass(*vstate, &instruction)) return error;
332 if (auto error = ConversionPass(*vstate, &instruction)) return error;
333 if (auto error = CompositesPass(*vstate, &instruction)) return error;
334 if (auto error = ArithmeticsPass(*vstate, &instruction)) return error;
335 if (auto error = BitwisePass(*vstate, &instruction)) return error;
336 if (auto error = LogicalsPass(*vstate, &instruction)) return error;
337 if (auto error = ControlFlowPass(*vstate, &instruction)) return error;
338 if (auto error = DerivativesPass(*vstate, &instruction)) return error;
339 if (auto error = AtomicsPass(*vstate, &instruction)) return error;
340 if (auto error = PrimitivesPass(*vstate, &instruction)) return error;
341 if (auto error = BarriersPass(*vstate, &instruction)) return error;
342 // Group
343 // Device-Side Enqueue
344 // Pipe
345 if (auto error = NonUniformPass(*vstate, &instruction)) return error;
346
347 if (auto error = LiteralsPass(*vstate, &instruction)) return error;
348 }
349
350 // Validate the preconditions involving adjacent instructions. e.g. SpvOpPhi
351 // must only be preceded by SpvOpLabel, SpvOpPhi, or SpvOpLine.
352 if (auto error = ValidateAdjacency(*vstate)) return error;
353
354 if (auto error = ValidateEntryPoints(*vstate)) return error;
355 // CFG checks are performed after the binary has been parsed
356 // and the CFGPass has collected information about the control flow
357 if (auto error = PerformCfgChecks(*vstate)) return error;
358 if (auto error = CheckIdDefinitionDominateUse(*vstate)) return error;
359 if (auto error = ValidateDecorations(*vstate)) return error;
360 if (auto error = ValidateInterfaces(*vstate)) return error;
361 // TODO(dsinclair): Restructure ValidateBuiltins so we can move into the
362 // for() above as it loops over all ordered_instructions internally.
363 if (auto error = ValidateBuiltIns(*vstate)) return error;
364 // These checks must be performed after individual opcode checks because
365 // those checks register the limitation checked here.
366 for (const auto& inst : vstate->ordered_instructions()) {
367 if (auto error = ValidateExecutionLimitations(*vstate, &inst)) return error;
368 if (auto error = ValidateSmallTypeUses(*vstate, &inst)) return error;
369 }
370
371 return SPV_SUCCESS;
372 }
373
374 } // namespace
375
ValidateBinaryAndKeepValidationState(const spv_const_context context,spv_const_validator_options options,const uint32_t * words,const size_t num_words,spv_diagnostic * pDiagnostic,std::unique_ptr<ValidationState_t> * vstate)376 spv_result_t ValidateBinaryAndKeepValidationState(
377 const spv_const_context context, spv_const_validator_options options,
378 const uint32_t* words, const size_t num_words, spv_diagnostic* pDiagnostic,
379 std::unique_ptr<ValidationState_t>* vstate) {
380 spv_context_t hijack_context = *context;
381 if (pDiagnostic) {
382 *pDiagnostic = nullptr;
383 UseDiagnosticAsMessageConsumer(&hijack_context, pDiagnostic);
384 }
385
386 vstate->reset(new ValidationState_t(&hijack_context, options, words,
387 num_words, kDefaultMaxNumOfWarnings));
388
389 return ValidateBinaryUsingContextAndValidationState(
390 hijack_context, words, num_words, pDiagnostic, vstate->get());
391 }
392
393 } // namespace val
394 } // namespace spvtools
395
spvValidate(const spv_const_context context,const spv_const_binary binary,spv_diagnostic * pDiagnostic)396 spv_result_t spvValidate(const spv_const_context context,
397 const spv_const_binary binary,
398 spv_diagnostic* pDiagnostic) {
399 return spvValidateBinary(context, binary->code, binary->wordCount,
400 pDiagnostic);
401 }
402
spvValidateBinary(const spv_const_context context,const uint32_t * words,const size_t num_words,spv_diagnostic * pDiagnostic)403 spv_result_t spvValidateBinary(const spv_const_context context,
404 const uint32_t* words, const size_t num_words,
405 spv_diagnostic* pDiagnostic) {
406 spv_context_t hijack_context = *context;
407 if (pDiagnostic) {
408 *pDiagnostic = nullptr;
409 spvtools::UseDiagnosticAsMessageConsumer(&hijack_context, pDiagnostic);
410 }
411
412 // This interface is used for default command line options.
413 spv_validator_options default_options = spvValidatorOptionsCreate();
414
415 // Create the ValidationState using the context and default options.
416 spvtools::val::ValidationState_t vstate(&hijack_context, default_options,
417 words, num_words,
418 kDefaultMaxNumOfWarnings);
419
420 spv_result_t result =
421 spvtools::val::ValidateBinaryUsingContextAndValidationState(
422 hijack_context, words, num_words, pDiagnostic, &vstate);
423
424 spvValidatorOptionsDestroy(default_options);
425 return result;
426 }
427
spvValidateWithOptions(const spv_const_context context,spv_const_validator_options options,const spv_const_binary binary,spv_diagnostic * pDiagnostic)428 spv_result_t spvValidateWithOptions(const spv_const_context context,
429 spv_const_validator_options options,
430 const spv_const_binary binary,
431 spv_diagnostic* pDiagnostic) {
432 spv_context_t hijack_context = *context;
433 if (pDiagnostic) {
434 *pDiagnostic = nullptr;
435 spvtools::UseDiagnosticAsMessageConsumer(&hijack_context, pDiagnostic);
436 }
437
438 // Create the ValidationState using the context.
439 spvtools::val::ValidationState_t vstate(&hijack_context, options,
440 binary->code, binary->wordCount,
441 kDefaultMaxNumOfWarnings);
442
443 return spvtools::val::ValidateBinaryUsingContextAndValidationState(
444 hijack_context, binary->code, binary->wordCount, pDiagnostic, &vstate);
445 }
446