Hi guys,

That's great, thanks for sharing this with the list. I think Docker is a nice medium for distributing KLEE, and in fact there were several other people who have "dockerized" KLEE recently:
https://github.com/riyadparvez/klee-docker
https://registry.hub.docker.com/u/petrhosek/klee/
https://registry.hub.docker.com/u/oscarsd/klee-release/
https://registry.hub.docker.com/u/kleeweb/klee/
https://registry.hub.docker.com/u/mbrt/klee/
etc.

I think it would be useful to have an official repository for the dockerized KLEE, which we would recommend to new users on the KLEE website, and which would be maintained as part of the KLEE project on GitHub (https://github.com/klee). Also, it would be useful to automatically update an associated KLEE Docker image and upload it to the Docker registry either after each KLEE commit, or at regular time intervals.

These are just my initial thought though, and it would be useful to get other opinions.

Best,
Cristian


On 26/02/15 16:14, Makula, Szymon wrote:
Hello All,

Docker is a relatively recent technology that developers and sysadmins
use to build, ship, and run distributed applications. Compared to
virtual machines, docker is more lightweight and efficient, since it
provides an additional layer of abstraction of operating-system-level
virtualization. You can read more about it at https://www.docker.com/.

The use of docker makes Klee much easier to deploy and get started with.
We have dockerized Klee and you can find the result of our labors at
https://github.com/szymoniks/Klee-Docker.

To install docker, please follow the guide at
https://docs.docker.com/installation/#installation. After the
installation and cloning our project, you can simply execute the
following command from the project root directory to build Klee:

$sudo docker build -t [image_name] .

Where image_name can be any name for the final image one fancies! :) By
default, the number of jobs for make commands is 5, which one can change
it in Dockerfile to adjust for their machine’s specification. We address
the security concerns of sudo-ing this script below.

This command builds Klee, following the instruction in the guide on
http://klee.github.io/getting-started/as of 26/02/2015. The image is
based on an official Ubuntu 14.04 docker image and will be supplied with
LLVM-GCC 2.9, LLVM 2.9, STP r940 and uclibc (provided by Klee community
at https://github.com/klee/klee-uclibc.git).

To work in the virtualized environment where Klee is installed, type the
command:

$sudo docker run -t -i [image_name] /bin/bash

Again, we address the security concerns of sudo-ing this script below.

We used the following options:

·-i : keep STDIN open even if not attached

·-t : allocate a pseudo-TTY

For more information, please read README or check
https://docs.docker.com/reference/commandline/cli/.

Please feel free to contact us with any questions.

Best regards,

Szymon Makula and Zheng Gao

University College London

*Security*

Docker has been used and trusted by different companies, such as Gilt
Groupe Inc., Yelp, and Baidu Inc, so we believe it does not contain any
trojans or malware.

We have used Docker version 1.2.0 and Klee is built on Ubuntu 14.04.

The docker daemon always runs as the root user, and since Docker version
0.5.2, the docker daemon binds to a Unix socket instead of a TCP port.
By default that Unix socket is owned by the user root, and so, by
default, you need to access it with sudo.

Starting in version 0.5.3, if you (or your Docker installer) create a
Unix group called docker and add users to it, then the docker daemon
will make the ownership of the Unix socket read/writable by the docker
group when the daemon starts. The docker daemon must always run as the
root user, but if you run the docker client as a user in the docker
group then you don't need to add sudo to all the client commands. As of
0.9.0, you can specify that a group other than docker should own the
Unix socket with the -G option. However, the docker group (or the group
specified with -G) is root-equivalent.

You can verify that the script does nothing more by inspection. The
secure hash of the Dockerfile and two patches can be found in the
checksum file.



_______________________________________________
klee-dev mailing list
[email protected]
https://mailman.ic.ac.uk/mailman/listinfo/klee-dev


_______________________________________________
klee-dev mailing list
[email protected]
https://mailman.ic.ac.uk/mailman/listinfo/klee-dev

Reply via email to