Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Improve performance and language support of memory initialization checks #3313

Merged
merged 31 commits into from
Jul 12, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
31 commits
Select commit Hold shift + click to select a range
428165a
Implement memory initialization checks using demonic non-determinism.
artemagvanian Jul 1, 2024
54d0493
Fix formatting
artemagvanian Jul 1, 2024
8967662
Make memory initialization checks work better with atomics; add more …
artemagvanian Jul 1, 2024
c7f1d20
Enable `uninit-checks` in `std-checks`
artemagvanian Jul 1, 2024
8af4c07
More tests for interaction between memory initialization and intrinsics
artemagvanian Jul 1, 2024
068b9af
Fix issues with `std-checks`
artemagvanian Jul 1, 2024
0723510
Fix formatting
artemagvanian Jul 1, 2024
8e7eac1
Merge branch 'main' into nondet-meminit
artemagvanian Jul 3, 2024
a939e55
Only bless drop for Adt's
artemagvanian Jul 3, 2024
fb2aa14
Assert `is_initialized` in predicates
artemagvanian Jul 3, 2024
bb2a02b
Add more comments, remove unnecessary checks
artemagvanian Jul 3, 2024
ed11c8e
Fix assert order
artemagvanian Jul 3, 2024
cb93dcb
Make clippy happy
artemagvanian Jul 3, 2024
fcb99ad
Remove unnecessary clone
artemagvanian Jul 5, 2024
3bf51f0
Wrap memory initialization set-up in a separate function
artemagvanian Jul 5, 2024
898dd0b
Wrap `assert!(is_initialized(...))` into a separate function
artemagvanian Jul 5, 2024
b388458
`-Z uninit-checks` automatically enables shadow memory
artemagvanian Jul 8, 2024
7abb003
Inject `UnsupportedCheck` when observing mutable pointer casts
artemagvanian Jul 8, 2024
5a7a6b2
Revert "Inject `UnsupportedCheck` when observing mutable pointer casts"
artemagvanian Jul 8, 2024
5f149bf
Separate calls to checking/setting memory initialization of slice chunks
artemagvanian Jul 8, 2024
9bb6e0d
Merge branch 'main' into nondet-meminit
artemagvanian Jul 8, 2024
38ecf46
Merge branch 'main' into nondet-meminit
artemagvanian Jul 8, 2024
c2d4d4f
Merge branch 'main' into nondet-meminit
artemagvanian Jul 9, 2024
fb07b8a
Remove unnecessary imports
artemagvanian Jul 9, 2024
853ed24
Apply suggestions from code review
artemagvanian Jul 10, 2024
351e592
Fix regressions
artemagvanian Jul 10, 2024
5f2cc9a
Merge branch 'main' into nondet-meminit
artemagvanian Jul 10, 2024
d094aaf
Ensure that non-determinism is not used in assumption context
artemagvanian Jul 10, 2024
630f6c3
Rollback changes in `std-checks`
artemagvanian Jul 10, 2024
0b24435
Try substituting `$crate` with `super` to make `verify_std_cmd` pass …
artemagvanian Jul 10, 2024
19cf091
Remove unnecessary temporary variable in `hooks.rs`
artemagvanian Jul 12, 2024
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -122,7 +122,7 @@ impl<'tcx> GotocCtx<'tcx> {
.tcx
.all_diagnostic_items(())
.name_to_id
.get(&rustc_span::symbol::Symbol::intern("KaniMemInitShadowMem"))
.get(&rustc_span::symbol::Symbol::intern("KaniMemoryInitializationState"))
.map(|attr_id| {
self.tcx
.symbol_name(rustc_middle::ty::Instance::mono(self.tcx, *attr_id))
Expand Down
36 changes: 36 additions & 0 deletions kani-compiler/src/codegen_cprover_gotoc/overrides/hooks.rs
Original file line number Diff line number Diff line change
Expand Up @@ -143,6 +143,41 @@ impl GotocHook for Assert {
}
}

struct Check;
impl GotocHook for Check {
fn hook_applies(&self, tcx: TyCtxt, instance: Instance) -> bool {
matches_function(tcx, instance.def, "KaniCheck")
}

fn handle(
&self,
gcx: &mut GotocCtx,
_instance: Instance,
mut fargs: Vec<Expr>,
_assign_to: &Place,
target: Option<BasicBlockIdx>,
span: Span,
) -> Stmt {
assert_eq!(fargs.len(), 2);
let cond = fargs.remove(0).cast_to(Type::bool());
let msg = fargs.remove(0);
let msg = gcx.extract_const_message(&msg).unwrap();
let target = target.unwrap();
let caller_loc = gcx.codegen_caller_span_stable(span);

let (msg, reach_stmt) = gcx.codegen_reachability_check(msg, span);

Stmt::block(
vec![
reach_stmt,
gcx.codegen_assert(cond, PropertyClass::Assertion, &msg, caller_loc),
Stmt::goto(bb_label(target), caller_loc),
],
caller_loc,
)
}
}

struct Nondet;

impl GotocHook for Nondet {
Expand Down Expand Up @@ -510,6 +545,7 @@ pub fn fn_hooks() -> GotocHooks {
Rc::new(Panic),
Rc::new(Assume),
Rc::new(Assert),
Rc::new(Check),
Rc::new(Cover),
Rc::new(Nondet),
Rc::new(IsAllocated),
Expand Down
21 changes: 19 additions & 2 deletions kani-compiler/src/kani_middle/transform/body.rs
Original file line number Diff line number Diff line change
Expand Up @@ -387,12 +387,13 @@ pub enum CheckType {
}

impl CheckType {
/// This will create the type of check that is available in the current crate.
/// This will create the type of check that is available in the current crate, attempting to
/// create a check that generates an assertion following by an assumption of the same assertion.
///
/// If `kani` crate is available, this will return [CheckType::Assert], and the instance will
/// point to `kani::assert`. Otherwise, we will collect the `core::panic_str` method and return
/// [CheckType::Panic].
pub fn new(tcx: TyCtxt) -> CheckType {
pub fn new_assert_assume(tcx: TyCtxt) -> CheckType {
if let Some(instance) = find_instance(tcx, "KaniAssert") {
CheckType::Assert(instance)
} else if find_instance(tcx, "panic_str").is_some() {
Expand All @@ -401,6 +402,22 @@ impl CheckType {
CheckType::NoCore
}
}

/// This will create the type of check that is available in the current crate, attempting to
/// create a check that generates an assertion, without assuming the condition afterwards.
///
/// If `kani` crate is available, this will return [CheckType::Assert], and the instance will
/// point to `kani::assert`. Otherwise, we will collect the `core::panic_str` method and return
/// [CheckType::Panic].
pub fn new_assert(tcx: TyCtxt) -> CheckType {
if let Some(instance) = find_instance(tcx, "KaniCheck") {
CheckType::Assert(instance)
} else if find_instance(tcx, "panic_str").is_some() {
CheckType::Panic
} else {
CheckType::NoCore
}
}
}

/// We store the index of an instruction to avoid borrow checker issues and unnecessary copies.
Expand Down
161 changes: 136 additions & 25 deletions kani-compiler/src/kani_middle/transform/check_uninit/mod.rs
Original file line number Diff line number Diff line change
Expand Up @@ -29,8 +29,17 @@ mod uninit_visitor;
pub use ty_layout::{PointeeInfo, PointeeLayout};
use uninit_visitor::{CheckUninitVisitor, InitRelevantInstruction, MemoryInitOp};

const SKIPPED_DIAGNOSTIC_ITEMS: &[&str] =
&["KaniIsUnitPtrInitialized", "KaniSetUnitPtrInitialized"];
// Function bodies of those functions will not be instrumented as not to cause infinite recursion.
const SKIPPED_DIAGNOSTIC_ITEMS: &[&str] = &[
"KaniIsPtrInitialized",
"KaniSetPtrInitialized",
"KaniIsSliceChunkPtrInitialized",
"KaniSetSliceChunkPtrInitialized",
"KaniIsSlicePtrInitialized",
"KaniSetSlicePtrInitialized",
"KaniIsStrPtrInitialized",
"KaniSetStrPtrInitialized",
];

/// Instrument the code with checks for uninitialized memory.
#[derive(Debug)]
Expand Down Expand Up @@ -59,8 +68,8 @@ impl TransformPass for UninitPass {
fn transform(&mut self, tcx: TyCtxt, body: Body, instance: Instance) -> (bool, Body) {
trace!(function=?instance.name(), "transform");

// Need to break infinite recursion when shadow memory checks are inserted,
// so the internal function responsible for shadow memory checks are skipped.
// Need to break infinite recursion when memory initialization checks are inserted, so the
// internal functions responsible for memory initialization are skipped.
if tcx
.get_diagnostic_name(rustc_internal::internal(tcx, instance.def.def_id()))
.map(|diagnostic_name| {
Expand All @@ -74,6 +83,11 @@ impl TransformPass for UninitPass {
let mut new_body = MutableBody::from(body);
let orig_len = new_body.blocks().len();

// Inject a call to set-up memory initialization state if the function is a harness.
if is_harness(instance, tcx) {
inject_memory_init_setup(&mut new_body, tcx, &mut self.mem_init_fn_cache);
}

// Set of basic block indices for which analyzing first statement should be skipped.
//
// This is necessary because some checks are inserted before the source instruction, which, in
Expand Down Expand Up @@ -159,10 +173,12 @@ impl UninitPass {
};

match operation {
MemoryInitOp::Check { .. } => {
MemoryInitOp::CheckSliceChunk { .. } | MemoryInitOp::Check { .. } => {
self.build_get_and_check(tcx, body, source, operation, pointee_ty_info, skip_first)
}
MemoryInitOp::Set { .. } | MemoryInitOp::SetRef { .. } => {
MemoryInitOp::SetSliceChunk { .. }
| MemoryInitOp::Set { .. }
| MemoryInitOp::SetRef { .. } => {
self.build_set(tcx, body, source, operation, pointee_ty_info, skip_first)
}
MemoryInitOp::Unsupported { .. } => {
Expand All @@ -171,8 +187,8 @@ impl UninitPass {
}
}

/// Inject a load from shadow memory tracking memory initialization and an assertion that all
/// non-padding bytes are initialized.
/// Inject a load from memory initialization state and an assertion that all non-padding bytes
/// are initialized.
fn build_get_and_check(
&mut self,
tcx: TyCtxt,
Expand All @@ -189,18 +205,34 @@ impl UninitPass {
let ptr_operand = operation.mk_operand(body, source);
match pointee_info.layout() {
PointeeLayout::Sized { layout } => {
let layout_operand = mk_layout_operand(body, source, operation.position(), &layout);
// Depending on whether accessing the known number of elements in the slice, need to
// pass is as an argument.
let (diagnostic, args) = match &operation {
MemoryInitOp::Check { .. } => {
let diagnostic = "KaniIsPtrInitialized";
let args = vec![ptr_operand.clone(), layout_operand];
(diagnostic, args)
}
MemoryInitOp::CheckSliceChunk { .. } => {
let diagnostic = "KaniIsSliceChunkPtrInitialized";
let args =
vec![ptr_operand.clone(), layout_operand, operation.expect_count()];
(diagnostic, args)
}
_ => unreachable!(),
};
let is_ptr_initialized_instance = resolve_mem_init_fn(
get_mem_init_fn_def(tcx, "KaniIsPtrInitialized", &mut self.mem_init_fn_cache),
get_mem_init_fn_def(tcx, diagnostic, &mut self.mem_init_fn_cache),
layout.len(),
*pointee_info.ty(),
);
let layout_operand = mk_layout_operand(body, source, operation.position(), &layout);
collect_skipped(&operation, body, skip_first);
body.add_call(
&is_ptr_initialized_instance,
source,
operation.position(),
vec![ptr_operand.clone(), layout_operand, operation.expect_count()],
args,
ret_place.clone(),
);
}
Expand Down Expand Up @@ -252,8 +284,8 @@ impl UninitPass {
)
}

/// Inject a store into shadow memory tracking memory initialization to initialize or
/// deinitialize all non-padding bytes.
/// Inject a store into memory initialization state to initialize or deinitialize all
/// non-padding bytes.
fn build_set(
&mut self,
tcx: TyCtxt,
Expand All @@ -272,27 +304,50 @@ impl UninitPass {

match pointee_info.layout() {
PointeeLayout::Sized { layout } => {
let layout_operand = mk_layout_operand(body, source, operation.position(), &layout);
// Depending on whether writing to the known number of elements in the slice, need to
// pass is as an argument.
let (diagnostic, args) = match &operation {
MemoryInitOp::Set { .. } | MemoryInitOp::SetRef { .. } => {
let diagnostic = "KaniSetPtrInitialized";
let args = vec![
ptr_operand,
layout_operand,
Operand::Constant(ConstOperand {
span: source.span(body.blocks()),
user_ty: None,
const_: MirConst::from_bool(value),
}),
];
(diagnostic, args)
}
MemoryInitOp::SetSliceChunk { .. } => {
let diagnostic = "KaniSetSliceChunkPtrInitialized";
let args = vec![
ptr_operand,
layout_operand,
operation.expect_count(),
Operand::Constant(ConstOperand {
span: source.span(body.blocks()),
user_ty: None,
const_: MirConst::from_bool(value),
}),
];
(diagnostic, args)
}
_ => unreachable!(),
};
let set_ptr_initialized_instance = resolve_mem_init_fn(
get_mem_init_fn_def(tcx, "KaniSetPtrInitialized", &mut self.mem_init_fn_cache),
get_mem_init_fn_def(tcx, diagnostic, &mut self.mem_init_fn_cache),
layout.len(),
*pointee_info.ty(),
);
let layout_operand = mk_layout_operand(body, source, operation.position(), &layout);
collect_skipped(&operation, body, skip_first);
body.add_call(
&set_ptr_initialized_instance,
source,
operation.position(),
vec![
ptr_operand,
layout_operand,
operation.expect_count(),
Operand::Constant(ConstOperand {
span: source.span(body.blocks()),
user_ty: None,
const_: MirConst::from_bool(value),
}),
],
args,
ret_place,
);
}
Expand Down Expand Up @@ -426,3 +481,59 @@ pub fn resolve_mem_init_fn(fn_def: FnDef, layout_size: usize, associated_type: T
)
.unwrap()
}

/// Checks if the instance is a harness -- an entry point of Kani analysis.
fn is_harness(instance: Instance, tcx: TyCtxt) -> bool {
artemagvanian marked this conversation as resolved.
Show resolved Hide resolved
let harness_identifiers = [
vec![
rustc_span::symbol::Symbol::intern("kanitool"),
rustc_span::symbol::Symbol::intern("proof_for_contract"),
],
vec![
rustc_span::symbol::Symbol::intern("kanitool"),
rustc_span::symbol::Symbol::intern("proof"),
],
];
harness_identifiers.iter().any(|attr_path| {
tcx.has_attrs_with_path(rustc_internal::internal(tcx, instance.def.def_id()), attr_path)
})
}

/// Inject an initial call to set-up memory initialization tracking.
fn inject_memory_init_setup(
new_body: &mut MutableBody,
tcx: TyCtxt,
mem_init_fn_cache: &mut HashMap<&'static str, FnDef>,
) {
// First statement or terminator in the harness.
let mut source = if !new_body.blocks()[0].statements.is_empty() {
SourceInstruction::Statement { idx: 0, bb: 0 }
} else {
SourceInstruction::Terminator { bb: 0 }
};

// Dummy return place.
let ret_place = Place {
local: new_body.new_local(
Ty::new_tuple(&[]),
source.span(new_body.blocks()),
Mutability::Not,
),
projection: vec![],
};

// Resolve the instance and inject a call to set-up the memory initialization state.
let memory_initialization_init = Instance::resolve(
get_mem_init_fn_def(tcx, "KaniInitializeMemoryInitializationState", mem_init_fn_cache),
&GenericArgs(vec![]),
)
.unwrap();

new_body.add_call(
&memory_initialization_init,
&mut source,
InsertPosition::Before,
vec![],
ret_place,
);
}
Loading
Loading