Hi David,
I tried a bunch of random offsets and wasn't able to get a failure. Not
sure how this squares with Raimondas's report, but perhaps I should use
the latest source instead of the self-contained executable version.
My program is here in case that's useful:
http://www.cs.utah.edu/~regehr/val.c
John
On Tue, 24 Jan 2012, David Antonio Ramos wrote:
Hi John,
It's possible your -77 offset is landing in-bounds in another allocated buffer.
Since the standard version of KLEE doesn't track referents (that is, which
buffer a particular pointer SHOULD reference), it doesn't know the difference
between an in-bounds access in the correct buffer from an in-bounds access in a
different buffer. We have an internal version with this functionality, but it
would be difficult to port back to the open source version.
When KLEE hits an array dereference at a symbolic offset (storage[index]), it
tries to resolve that symbolic address into every allocated buffer in the
current state. If it's possible for the offset to lie outside all of these
objects (given the arbitrary concrete addresses on a particular execution),
then KLEE will report the error. If all feasible indices will land the pointer
inside of valid buffers, then there's no error for KLEE to report. You might
want to try values other than -77, running KLEE multiple times, enabling ASLR,
etc. to confirm the transient nature of this type of error.
-David
----- Original Message -----
From: "John Regehr" <[email protected]>
To: "Ott Tinn" <[email protected]>
Cc: [email protected]
Sent: Tuesday, January 24, 2012 2:16:49 PM
Subject: Re: [klee-dev] blog post and a question
Hi Ott,
I'm pretty sure optimizations are not the problem.
First, "storage" has external linkage -- the compiler cannot infer that it
is not subsequently used.
Second, llvm-gcc's output for this code (even with optimizations turned
on) is a pretty obvious translation of the C code.
John
On Tue, 24 Jan 2012, Ott Tinn wrote:
Hi John,
The most obvious problem I see is that the code sample is too simple -
the compiler optimizations could also see that the value you are
storing to the storage array is never used. Since accessing array
elements that are out of bounds is undefined in C then the compiler
can optimize this away by assuming that it isn't out of bounds. To
make this example work you could try compiling without any
optimizations and without using KLEE's -optimize flag or otherwise
making sure the dangerous operations can't be optimized away.
Ott
On Tue, Jan 24, 2012 at 9:18 PM, John Regehr <[email protected]> wrote:
Perhaps interesting to people here:
http://blog.regehr.org/archives/672
While writing this up I discovered that when "i" is symbolic Klee cannot
find a value for i that makes this code access an OOB array element:
int indices[] = { 0,2,1,5,3,0,-77,0,3,6 };
value_t storage[7];
void stash (int i, value_t v)
{
if (i<0 || i>=10) {
error();
} else {
int index = indices[i];
// assert (index>=0);
// assert (index<7);
storage[index] = v;
}
}
On the other hand, given the assertions, Klee generates the test case where
i==6.
I infer that Klee does not automatically assert in-boundedness of array
accesses. But these assertions seem obviously desirable, so I'm trying to
figure out why not. Maybe Klee doesn't have enough runtime information to
make this happen?
John
_______________________________________________
klee-dev mailing list
[email protected]
http://keeda.Stanford.EDU/mailman/listinfo/klee-dev
_______________________________________________
klee-dev mailing list
[email protected]
http://keeda.Stanford.EDU/mailman/listinfo/klee-dev
_______________________________________________
klee-dev mailing list
[email protected]
http://keeda.Stanford.EDU/mailman/listinfo/klee-dev