Skip to content

Commit 1ee20cf

Browse files
committed
Add enumerative loop invariant synthesizer
Implement the functionality described below. Motivation --- This loop invariant synthesizer use the idea counter-example-guided synthesis (CEGIS) to synthesize loop invariants for programs with only checks instrumented by `goto-instrument` with flag `--pointer-check`. This PR contain the driver of the synthesizer and the verifier we use to check invariant candidates. Verifier --- The verifier take as input a goto program with pointer checks and a map from loop id to loop invariant candidates. It first annotate and apply the loop invariant candidates into the goto model; and then simulate the CBMC api to verify the instrumented goto program. If there are some violations---loop invariants are not inductive, or some pointer checks fail---, it record valuation from trace generated by the back end to construct a formatted counterexample `cext`. Counterexample --- A counterexample `cext` record valuations of variables in the trace, and other information about the violation. The valuation we record including 1. set of live variables upon the entry of the loop. 2. the havoced value of all primitive-typed variables; 3. the havoced offset and the object size of all pointer-typed variables; 4. history values of 2 and 3. The valuations will be used as true positive (history values) and true negative (havcoed valuation) to filter out bad invariant clause with the idea of the Daikon invariant detector in a following PR. However, in this PR we only construct the valuation but not actually use them. Synthesizer --- Loop invariants we synthesize are of the form `` (in_clause || !guard) && (!guard -> pos_clause)`` where `in_clause` and `out_clause` are predicates we store in two different map, and `guard` is the loop guard. The idea is that we separately synthesize the condition `in_clause` that should hold before the execution of the loop body, and condition `pos_clause` that should hold as post-condition of the loop. When the violation happen in the loop, we update `in_clause`. When the violation happen after the loop, we update `pos_clause`. When the invariant candidate it not inductive, we enumerate strengthening clause to make it inductive. To be more efficient, we choose different synthesis strategy for different type of violation * For out-of-boundary violation, we choose to use the violated predicate as the new clause, which is the WLP of the violation if the violation is only dependent on the havocing instruction. **TODO**: to make it more complete, we need to implement a WLP algorithm * For null-pointer violation, we choose `__CPROVER_same_object(ptr, __CPROVER_loop_entry(ptr))` as the new clause. That is, the havoced pointer should points to the same object at the start of every iteration of the loop. It is a heuristic choice. This can be extended with the idea of alias analysis if needed. * For invariant-not-preserved violation, we enumerate strengthening clauses and check that if the invariant will be inductive after strengthening (disjunction with the new clause). The synthesizer works as follow 1. initialize the two invariant maps, 2. verify the current candidates built from the two maps, _a. return the candidate if there is no violation _b. synthesize a new clause to resolve the **first** violation and add it to the correct map, 3. repeat 2.
1 parent f9890d4 commit 1ee20cf

26 files changed

+1377
-56
lines changed

regression/goto-synthesizer/CMakeLists.txt

+21-22
Original file line numberDiff line numberDiff line change
@@ -12,32 +12,31 @@ else()
1212
set(gcc_only_string "")
1313
endif()
1414

15-
1615
add_test_pl_tests(
17-
"${CMAKE_CURRENT_SOURCE_DIR}/chain.sh $<TARGET_FILE:goto-cc> $<TARGET_FILE:goto-synthesizer> $<TARGET_FILE:cbmc> ${is_windows}"
16+
"${CMAKE_CURRENT_SOURCE_DIR}/chain.sh $<TARGET_FILE:goto-cc> $<TARGET_FILE:goto-instrument> $<TARGET_FILE:goto-synthesizer> $<TARGET_FILE:cbmc> ${is_windows}"
1817
)
1918

20-
## Enabling these causes a very significant increase in the time taken to run the regressions
19+
# # Enabling these causes a very significant increase in the time taken to run the regressions
2120

22-
#add_test_pl_profile(
23-
# "cbmc-z3"
24-
# "${CMAKE_CURRENT_SOURCE_DIR}/chain.sh $<TARGET_FILE:goto-cc> $<TARGET_FILE:goto-synthesizer> '$<TARGET_FILE:cbmc> --z3' ${is_windows}"
25-
# "-C;-X;broken-smt-backend;-X;thorough-smt-backend;-X;broken-z3-backend;-X;thorough-z3-backend;${gcc_only_string}-s;z3"
26-
# "CORE"
27-
#)
21+
# add_test_pl_profile(
22+
# "cbmc-z3"
23+
# "${CMAKE_CURRENT_SOURCE_DIR}/chain.sh $<TARGET_FILE:goto-cc> $<TARGET_FILE:goto-synthesizer> '$<TARGET_FILE:cbmc> --z3' ${is_windows}"
24+
# "-C;-X;broken-smt-backend;-X;thorough-smt-backend;-X;broken-z3-backend;-X;thorough-z3-backend;${gcc_only_string}-s;z3"
25+
# "CORE"
26+
# )
2827

29-
#add_test_pl_profile(
30-
# "cbmc-cprover-smt2"
31-
# "${CMAKE_CURRENT_SOURCE_DIR}/chain.sh $<TARGET_FILE:goto-cc> $<TARGET_FILE:goto-synthesizer> '$<TARGET_FILE:cbmc> --cprover-smt2' ${is_windows}"
32-
# "-C;-X;broken-smt-backend;-X;thorough-smt-backend;-X;broken-cprover-smt2-backend;-X;thorough-cprover-smt2-backend;${gcc_only_string}-s;cprover-smt2"
33-
# "CORE"
34-
#)
28+
# add_test_pl_profile(
29+
# "cbmc-cprover-smt2"
30+
# "${CMAKE_CURRENT_SOURCE_DIR}/chain.sh $<TARGET_FILE:goto-cc> $<TARGET_FILE:goto-synthesizer> '$<TARGET_FILE:cbmc> --cprover-smt2' ${is_windows}"
31+
# "-C;-X;broken-smt-backend;-X;thorough-smt-backend;-X;broken-cprover-smt2-backend;-X;thorough-cprover-smt2-backend;${gcc_only_string}-s;cprover-smt2"
32+
# "CORE"
33+
# )
3534

3635
# solver appears on the PATH in Windows already
37-
#if(NOT "${CMAKE_SYSTEM_NAME}" STREQUAL "Windows")
38-
# set_property(
39-
# TEST "cbmc-cprover-smt2-CORE"
40-
# PROPERTY ENVIRONMENT
41-
# "PATH=$ENV{PATH}:$<TARGET_FILE_DIR:smt2_solver>"
42-
# )
43-
#endif()
36+
# if(NOT "${CMAKE_SYSTEM_NAME}" STREQUAL "Windows")
37+
# set_property(
38+
# TEST "cbmc-cprover-smt2-CORE"
39+
# PROPERTY ENVIRONMENT
40+
# "PATH=$ENV{PATH}:$<TARGET_FILE_DIR:smt2_solver>"
41+
# )
42+
# endif()

regression/goto-synthesizer/chain.sh

+10-6
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,15 @@
33
set -e
44

55
goto_cc=$1
6-
goto_synthesizer=$2
7-
cbmc=$3
8-
is_windows=$4
6+
goto_instrument=$2
7+
goto_synthesizer=$3
8+
cbmc=$4
9+
is_windows=$5
910

1011
name=${*:$#}
1112
name=${name%.c}
1213

13-
args=${*:5:$#-5}
14+
args=${*:6:$#-6}
1415
if [[ "$args" != *" _ "* ]]
1516
then
1617
args_inst=$args
@@ -27,7 +28,8 @@ else
2728
fi
2829

2930
rm -f "${name}-mod.gb"
30-
$goto_synthesizer ${args_inst} "${name}.gb" "${name}-mod.gb"
31+
rm -f "${name}-mod-2.gb"
32+
$goto_instrument ${args_inst} "${name}.gb" "${name}-mod.gb"
3133
if [ ! -e "${name}-mod.gb" ] ; then
3234
cp "$name.gb" "${name}-mod.gb"
3335
elif echo $args_inst | grep -q -- "--dump-c" ; then
@@ -41,4 +43,6 @@ elif echo $args_inst | grep -q -- "--dump-c" ; then
4143

4244
rm "${name}-mod.c"
4345
fi
44-
$cbmc "${name}-mod.gb" ${args_cbmc}
46+
$goto_synthesizer "${name}-mod.gb" "${name}-mod-2.gb"
47+
echo "2:"
48+
$cbmc "${name}-mod-2.gb" ${args_cbmc}

regression/goto-synthesizer/loop_contracts_synthesis_01/test.desc

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
CORE
22
main.c
3-
3+
--pointer-check
44
^EXIT=0$
55
^SIGNAL=0$
66
^\[main\.\d+\] line 10 Check loop invariant before entry: SUCCESS$
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
#define SIZE 80
2+
3+
void main()
4+
{
5+
unsigned len;
6+
__CPROVER_assume(len <= SIZE);
7+
__CPROVER_assume(len >= 8);
8+
char *array = malloc(len);
9+
unsigned s = 0;
10+
11+
for(unsigned i = 0; i < SIZE; ++i)
12+
// __CPROVER_loop_invariant(i <= len)
13+
{
14+
if(i == len - 1)
15+
break;
16+
s += array[i];
17+
}
18+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
CORE
2+
main.c
3+
--pointer-check
4+
^EXIT=0$
5+
^SIGNAL=0$
6+
^\[main.pointer\_dereference.\d+\] .* SUCCESS$
7+
^VERIFICATION SUCCESSFUL$
8+
--
9+
--
10+
This test shows that loop invariant with form of range predicates can be correctly
11+
synthesized for programs with only pointer checks but no other assertions.
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
#define SIZE 80
2+
3+
void main()
4+
{
5+
unsigned long len;
6+
__CPROVER_assume(len <= SIZE);
7+
__CPROVER_assume(len >= 8);
8+
char *array = malloc(len);
9+
const char *end = array + len;
10+
unsigned s = 0;
11+
12+
while(array != end)
13+
// __CPROVER_loop_invariant(
14+
// __CPROVER_POINTER_OBJECT(array) == __CPROVER_POINTER_OBJECT(end))
15+
// __CPROVER_loop_invariant(__CPROVER_POINTER_OFFSET(array) <= len)
16+
{
17+
s += *array++;
18+
}
19+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
CORE
2+
main.c
3+
--pointer-check
4+
^EXIT=0$
5+
^SIGNAL=0$
6+
^\[main.pointer\_dereference.\d+\] .* SUCCESS$
7+
^VERIFICATION SUCCESSFUL$
8+
--
9+
--
10+
This test shows that loop invariant with form of range predicates and same
11+
object predicates can be correctly synthesized for programs with only pointer
12+
checks but no other assertions.
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
#define SIZE 80
2+
3+
void main()
4+
{
5+
unsigned long len;
6+
__CPROVER_assume(len <= SIZE);
7+
__CPROVER_assume(len >= 8);
8+
char *array = malloc(len);
9+
unsigned long s = 0;
10+
11+
unsigned long j = 0;
12+
for(unsigned long i = 0; i < len; i++)
13+
// __CPROVER_loop_invariant(i == j)
14+
{
15+
s += array[j];
16+
j++;
17+
}
18+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
CORE
2+
main.c
3+
--pointer-check
4+
^EXIT=0$
5+
^SIGNAL=0$
6+
^\[main.pointer\_dereference.\d+\] .* SUCCESS$
7+
^VERIFICATION SUCCESSFUL$
8+
--
9+
--
10+
This test shows that the loop-invariant synthesizer can enumerate
11+
strengthening clauses for invariant-not-preserved violation.

src/analyses/dependence_graph.cpp

+47
Original file line numberDiff line numberDiff line change
@@ -383,6 +383,53 @@ void dependence_grapht::add_dep(
383383
nodes[n_to].in[n_from].add(kind);
384384
}
385385

386+
bool dependence_grapht::is_flow_dependent(
387+
const goto_programt::const_targett &from,
388+
const goto_programt::const_targett &to)
389+
{
390+
std::set<node_indext> visited = std::set<node_indext>();
391+
const dep_graph_domaint from_domain = static_cast<const dep_graph_domaint &>(
392+
*storage->abstract_state_before(from, *domain_factory));
393+
const dep_graph_domaint to_domain = static_cast<const dep_graph_domaint &>(
394+
*storage->abstract_state_before(to, *domain_factory));
395+
return is_flow_dependent(from_domain, to_domain, visited);
396+
}
397+
398+
bool dependence_grapht::is_flow_dependent(
399+
const dep_graph_domaint &from,
400+
const dep_graph_domaint &to,
401+
std::set<node_indext> &visited)
402+
{
403+
// `to` is control dependent on `from`?
404+
for(const auto node : to.get_control_deps())
405+
{
406+
if(visited.count((*this)[node].get_node_id()))
407+
continue;
408+
409+
visited.insert((*this)[node].get_node_id());
410+
411+
if(
412+
from.get_node_id() == (*this)[node].get_node_id() ||
413+
is_flow_dependent(from, (*this)[node], visited))
414+
return true;
415+
}
416+
417+
// `to` is data dependent on `from`?
418+
for(const auto node : to.get_data_deps())
419+
{
420+
if(visited.count((*this)[node].get_node_id()))
421+
continue;
422+
423+
visited.insert((*this)[node].get_node_id());
424+
425+
if(
426+
from.get_node_id() == (*this)[node].get_node_id() ||
427+
is_flow_dependent(from, (*this)[node], visited))
428+
return true;
429+
}
430+
return false;
431+
}
432+
386433
void dep_graph_domaint::populate_dep_graph(
387434
dependence_grapht &dep_graph, goto_programt::const_targett this_loc) const
388435
{

src/analyses/dependence_graph.h

+19-2
Original file line numberDiff line numberDiff line change
@@ -67,6 +67,7 @@ class dep_graph_domaint:public ai_domain_baset
6767
{
6868
public:
6969
typedef grapht<dep_nodet>::node_indext node_indext;
70+
typedef std::set<goto_programt::const_targett> depst;
7071

7172
explicit dep_graph_domaint(node_indext id)
7273
: has_values(false), node_id(id), has_changed(false)
@@ -167,13 +168,20 @@ class dep_graph_domaint:public ai_domain_baset
167168
void populate_dep_graph(
168169
dependence_grapht &, goto_programt::const_targett) const;
169170

171+
depst get_control_deps() const
172+
{
173+
return control_deps;
174+
}
175+
depst get_data_deps() const
176+
{
177+
return data_deps;
178+
}
179+
170180
private:
171181
tvt has_values;
172182
node_indext node_id;
173183
bool has_changed;
174184

175-
typedef std::set<goto_programt::const_targett> depst;
176-
177185
// Set of locations with control instructions on which the instruction at this
178186
// location has a control dependency on
179187
depst control_deps;
@@ -279,7 +287,16 @@ class dependence_grapht:
279287
return rd;
280288
}
281289

290+
/// Decide whether the instruction `to` is flow dependent on `from`.
291+
bool is_flow_dependent(
292+
const goto_programt::const_targett &from,
293+
const goto_programt::const_targett &to);
294+
282295
protected:
296+
bool is_flow_dependent(
297+
const dep_graph_domaint &from,
298+
const dep_graph_domaint &to,
299+
std::set<node_indext> &visited);
283300
friend dep_graph_domain_factoryt;
284301
friend dep_graph_domaint;
285302
const namespacet &ns;

src/goto-instrument/contracts/contracts.cpp

+8-2
Original file line numberDiff line numberDiff line change
@@ -142,7 +142,7 @@ void code_contractst::check_apply_loop_contracts(
142142
// i.e., the loop guard was satisfied.
143143
const auto entered_loop =
144144
new_tmp_symbol(
145-
bool_typet(), loop_head_location, mode, symbol_table, "__entered_loop")
145+
bool_typet(), loop_head_location, mode, symbol_table, ENTERED_LOOP)
146146
.symbol_expr();
147147
pre_loop_head_instrs.add(
148148
goto_programt::make_decl(entered_loop, loop_head_location));
@@ -173,7 +173,7 @@ void code_contractst::check_apply_loop_contracts(
173173
// instrumentation of the loop.
174174
const auto in_base_case =
175175
new_tmp_symbol(
176-
bool_typet(), loop_head_location, mode, symbol_table, "__in_base_case")
176+
bool_typet(), loop_head_location, mode, symbol_table, IN_BASE_CASE)
177177
.symbol_expr();
178178
pre_loop_head_instrs.add(
179179
goto_programt::make_decl(in_base_case, loop_head_location));
@@ -294,6 +294,12 @@ void code_contractst::check_apply_loop_contracts(
294294
// Generate havocing code for assignment targets.
295295
havoc_assigns_targetst havoc_gen(to_havoc, ns);
296296
havoc_gen.append_full_havoc_code(loop_head_location, pre_loop_head_instrs);
297+
// Add loop number to the havoc_code
298+
for(auto &havoc_instr : pre_loop_head_instrs.instructions)
299+
{
300+
if(is_loop_havoc(havoc_instr))
301+
havoc_instr.loop_number = loop_end->loop_number;
302+
}
297303

298304
// Insert the second block of pre_loop_head_instrs: the havocing code.
299305
// We do not `add_pragma_disable_assigns_check`,

src/goto-instrument/contracts/utils.cpp

+33
Original file line numberDiff line numberDiff line change
@@ -447,3 +447,36 @@ void generate_history_variables_initialization(
447447
// Add all the history variable initialization instructions
448448
program.destructive_append(history);
449449
}
450+
451+
bool is_transformed_loop_end(const goto_programt::const_targett &target)
452+
{
453+
// The end of the loop end of transformed loop is
454+
// ASSIGN entered_loop = true
455+
if(!target->is_assign())
456+
return false;
457+
458+
return from_expr(target->assign_lhs()).find("__entered_loop") !=
459+
std::string::npos &&
460+
target->assign_rhs() == true_exprt();
461+
}
462+
463+
bool is_assignment_to_instrumented_variable(
464+
const goto_programt::const_targett &target,
465+
std::string var_name)
466+
{
467+
INVARIANT(
468+
var_name == IN_BASE_CASE || var_name == ENTERED_LOOP,
469+
"var_name is not of instrumented variables.");
470+
471+
if(!target->is_assign())
472+
return false;
473+
474+
if(can_cast_expr<symbol_exprt>(target->assign_lhs()))
475+
{
476+
const auto &lhs = to_symbol_expr(target->assign_lhs());
477+
return id2string(lhs.get_identifier()).find("::" + var_name) !=
478+
std::string::npos;
479+
}
480+
481+
return false;
482+
}

src/goto-instrument/contracts/utils.h

+12
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,9 @@ Date: September 2021
1717

1818
#include <goto-programs/goto_convert_class.h>
1919

20+
#define IN_BASE_CASE "__in_base_case"
21+
#define ENTERED_LOOP "__entered_loop"
22+
2023
/// \brief A class that overrides the low-level havocing functions in the base
2124
/// utility class, to havoc only when expressions point to valid memory,
2225
/// i.e. if all dereferences within an expression are valid
@@ -205,4 +208,13 @@ void generate_history_variables_initialization(
205208
const irep_idt &mode,
206209
goto_programt &program);
207210

211+
/// Return true if `target` is the loop end of some transformed code.
212+
bool is_transformed_loop_end(const goto_programt::const_targett &target);
213+
214+
/// Return true if `target` is an assignment to an instrumented variable with
215+
/// name `var_name`.
216+
bool is_assignment_to_instrumented_variable(
217+
const goto_programt::const_targett &target,
218+
std::string var_name);
219+
208220
#endif // CPROVER_GOTO_INSTRUMENT_CONTRACTS_UTILS_H

0 commit comments

Comments
 (0)