handling loops in bounded model checking of c programs
play

Handling Loops in Bounded Model Checking of C Programs via k- - PowerPoint PPT Presentation

Handling Loops in Bounded Model Checking of C Programs via k- Induction Lucas Cordeiro Joint work with Jeremy Morse, Mikhail Ramalho, Herberto Rocha, Hussama Ismail, Raimundo Barreto, Denis Nicole, and Bernd Fischer Bounded Model Checking


  1. Handling Loops in Bounded Model Checking of C Programs via k- Induction Lucas Cordeiro Joint work with Jeremy Morse, Mikhail Ramalho, Herberto Rocha, Hussama Ismail, Raimundo Barreto, Denis Nicole, and Bernd Fischer

  2. Bounded Model Checking (BMC) basic Idea: check negation of given property up to given depth property ¬ ϕ 0 ¬ ϕ 1 ¬ ϕ 2 ¬ ϕ k -1 ¬ ϕ k ∨ ∨ ∨ ∨ . . . transition M 0 M 1 M 2 M k -1 M k system bound counterexample trace • transition system M unrolled k times – for programs: loops, arrays, … • translated into verification condition ψ such that ψ satisfiable iff ϕ has counterexample of max. depth k • has been applied successfully to verify (embedded) software

  3. Difficulties in proving the correctness of programs with loops in BMC • BMC techniques can falsify properties up to a given depth k – they can prove correctness only if an upper bound of k is known ( unwinding assertion ) » BMC tools typically fail to verify programs that contain bounded and unbounded loops 4,294,967,295 loop unwindings i++ sn=sn+a the loop will be unfolded 2 n-1 times (in the worst case, 2 32-1 times on 32 bits integer) sn==n*a

  4. ESBMC: SMT-based BMC of single- and multi-threaded software Goal: prove that an invariant is k -inductive SMT-based bounded model checker for C, based on CBMC: • symbolically executes C into SSA, produces QF formulae • unrolls loops up to a maximum bound k • assertion failure iff corresponding formula is satisfiable – safety properties (array bounds, pointer dereferences, overflows,...) – user-specified properties Multi-threaded programs: • produces one SSA program for each possible thread interleaving • interleaves only at “visible” instructions • optional context bound

  5. Software BMC using ESBMC • program modelled as state transition system int main() { int a[2], i, x; – state : program counter and program variables if (x==0) a[i]=0; – derived from control-flow graph else – checked safety properties give extra nodes a[i+2]=1; assert (a[i+1]==1); • program unfolded up to given bounds } – loop iterations – context switches • unfolded program optimized to reduce blow-up – constant propagation crucial – forward substitutions

  6. Software BMC using ESBMC • program modelled as state transition system int main() { int a[2], i, x; – state : program counter and program variables if (x==0) a[i]=0; – derived from control-flow graph else – checked safety properties give extra nodes a[i+2]=1; assert (a[i+1]==1); • program unfolded up to given bounds } – loop iterations – context switches • unfolded program optimized to reduce blow-up g 1 = x 1 == 0 – constant propagation crucial a 1 = a 0 WITH [i 0 :=0] – forward substitutions a 2 = a 0 a 3 = a 2 WITH [2+i 0 :=1] • front-end converts unrolled and a 4 = g 1 ? a 1 : a 3 optimized program into SSA t 1 = a 4 [1+i 0 ] == 1

  7. Software BMC using ESBMC • program modelled as state transition system int main() { int a[2], i, x; – state : program counter and program variables if (x==0) a[i]=0; – derived from control-flow graph else – checked safety properties give extra nodes a[i+2]=1; assert (a[i+1]==1); • program unfolded up to given bounds } – loop iterations – context switches • unfolded program optimized to reduce blow-up   ( ) g : = x = 0 – constant propagation 1 1   ( ) ∧ a : = store a , i , 0   crucial 1 0 0   – forward substitutions C : = ∧ a : = a  2 0  ( )  ∧ a : = store a , 2 + i , 1  3 2 0 • front-end converts unrolled and    ∧ a : = ite ( g , a , a )  4 1 1 3 optimized program into SSA   i ≥ ∧ i < 0 2 0 0   ∧ 2 + i ≥ 0 ∧ 2 + i < 2   • extraction of constraints C and properties P 0 0 P : =   ∧ 1 + i ≥ 0 ∧ 1 + i < 2  0 0  ( ) – specific to selected SMT solver, uses theories  ∧ select a i + =  , 1 1 4 0 • satisfiability check of C ∧ ¬ P

  8. Software BMC using ESBMC • program modelled as state transition system int main() { int a[2], i, x; – state : program counter and program variables if (x==0) a[i]=0; – derived from control-flow graph else – checked safety properties give extra nodes a[i+2]=1; assert (a[i+1]==1); • program unfolded up to given bounds } – loop iterations ESBMC finds real errors in applications, but it – context switches is susceptible to producing time-out or memory-out for correct programs • unfolded program optimized to reduce blow-up   ( ) g : = x = 0 – constant propagation 1 1   ( ) ∧ a : = store a , i , 0   crucial 1 0 0   – forward substitutions C : = ∧ a : = a  2 0  ( )  ∧ a : = store a , 2 + i , 1  3 2 0 • front-end converts unrolled and    ∧ a : = ite ( g , a , a )  4 1 1 3 optimized program into SSA   i ≥ ∧ i < 0 2 0 0   ∧ 2 + i ≥ 0 ∧ 2 + i < 2   • extraction of constraints C and properties P 0 0 P : =   ∧ 1 + i ≥ 0 ∧ 1 + i < 2  0 0  ( ) – specific to selected SMT solver, uses theories  ∧ select a i + =  , 1 1 4 0 • satisfiability check of C ∧ ¬ P

  9. Induction-Based Verification k -induction checks loop-free programs... • base case ( base k ): find a counter-example with up to k loop unwindings (plain BMC) • forward condition ( fwd k ): check that P holds in all states reachable within k unwindings • inductive step ( step k ): check that whenever P holds for k unwindings, it also holds after next unwinding – havoc state – run k iterations – assume invariant – run final iteration ⇒ iterative deepening if inconclusive

  10. Loop-free Programs ( base k and fwd k ) • A loop-free program is represented by a straight-line program (without loops) using if- statements for (B; c; D) { E; } B while (c) { E; D;} L1: if (!c) goto L2 L1: while (c) { E; D; E; D; goto L1 } L2: ASSUME or ASSERT L1: if (!cond1) goto L4 L1: while (cond1) { LOOP1 BODY LOOP1 BODY L2: if (!cond2) goto L3 L2: while (cond2) { LOOP2 BODY LOOP2 BODY goto L2 } L3: goto L1 } L4: ASSUME or ASSERT

  11. Loop-free Programs ( base k and fwd k ) • A loop-free program is represented by a straight-line program (without loops) using if -statements for (B; c; D) { E; } B while (c) { E; D;} base k and fwd k translations can easily L1: if (!c) goto L2 L1: while (c) { E; D; be implemented on top of plain BMC E; D; goto L1 } L2: ASSUME or ASSERT L1: if (!cond1) goto L4 L1: while (cond1) { LOOP1 BODY LOOP1 BODY L2: if (!cond2) goto L3 L2: while (cond2) { LOOP2 BODY LOOP2 BODY goto L2 } L3: goto L1 } L4: ASSUME or ASSERT

  12. Loop-free Programs ( step k ) • In the inductive step, loops are converted into: while (c) { E; } A while (c) { S; E; U; } R; ‒ A: assigns non-deterministic values to all loops variables (the state is havocked before the loop) ‒ c: is the halt condition of the loop ‒ S: stores the current state of the program variables before executing the statements of E ‒ E: is the actual code inside the loop ‒ U: updates all program variables with local values after executing E

  13. The k -induction algorithm k =1 while k<=max_iterations do if base P, φ ,k then return trace s[0..k] else k=k+1 if fwd P, φ ,k then return true else if step P’, φ ,k then return true end if end return unknown

  14. I : initial condition The k -induction algorithm T : transition relation of P σ : termination condition φ : safey property k =1 while k<=max_iterations do σ ⇒ I ∧ T ∧ φ if base P, φ ,k then return trace s[0..k] inserts unwinding else assumption after k=k+1 each loop if fwd P, φ ,k then return true else if step P’, φ ,k then return true end if end return unknown

  15. The k -induction algorithm k =1 while k<=max_iterations do σ ⇒ I ∧ T ∧ φ if base P, φ ,k then return trace s[0..k] else ⇒ k=k+1 I ∧ T σ ∧ φ if fwd P, φ ,k then return true inserts unwinding assertion after else if step P’, φ ,k then each loop return true end if end return unknown

  16. The k -induction algorithm k =1 while k<=max_iterations do σ ⇒ I ∧ T ∧ φ if base P, φ ,k then return trace s[0..k] else ⇒ k=k+1 γ : transition relation of P’ I ∧ T σ ∧ φ if fwd P, φ ,k then return true ⇒ γ ∧ σ φ else if step P’, φ ,k then return true havoc variables that end if occur in the loop’s end termination condition return unknown

  17. The k -induction algorithm k =1 while k<=max_iterations do σ ⇒ I ∧ T ∧ φ if base P, φ ,k then return trace s[0..k] else ⇒ k=k+1 I ∧ T σ ∧ φ if fwd P, φ ,k then return true ⇒ γ ∧ σ φ else if step P’, φ ,k then return true end if unable to falsify or end prove the property return unknown

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend