The SLAM Project: Debugging System Software via Static Analysis

Post on 28-Jan-2016

20 views 0 download

description

The SLAM Project: Debugging System Software via Static Analysis. Thomas Ball Sriram K. Rajamani Microsoft Research http://research.microsoft.com/slam/. Thanks To. Sagar Chaki (CMU) Satyaki Das (Stanford) Rupak Majumdar (UC Berkeley) Todd Millstein (U. Washington) Robby (KSU) - PowerPoint PPT Presentation

transcript

1

The SLAM Project:Debugging System Software via Static Analysis

Thomas BallSriram K. Rajamani

Microsoft Researchhttp://research.microsoft.com/slam/

2

3

Thanks To

Sagar Chaki (CMU) Satyaki Das (Stanford) Rupak Majumdar (UC Berkeley) Todd Millstein (U. Washington) Robby (KSU) Westley Weimer (UC Berkeley)

Andreas Podelski (MPI) Stefan Schwoon (U. Edinburgh)

Software Productivity Tools Research group at MSR

4

SLAM Agenda

Overview

Demo

Termination (of SLAM)

Termination (of talk)

5

Specifying and Checking Properties of Programs

Goals defect detection partial validation

Properties memory safety temporal safety security …

Many (mature) techniquesautomated deductionprogram analysistype checkingmodel checking

Many projectsBandera, ESC-Java, FeaVer, JPF, LClint, OSQ, PolyScope, PREfix, rccjava, TVLA, Verisoft, Vault, xgcc, …

6

Code

ProgrammingTesting

APIUsage Rules

7

Windows Device Drivers Kernel presents a very complex interface to driver

stack of drivers NT kernel multi-threaded IRP completion, IRQL, plug-n-play, power management,

Correct API usage described by finite state protocols

Automatically check that clients respect these protocols

8

MPR3

CallDriver

MPRcompletion

synch

not pending returned

SKIP2

IPCCallDriver

Skip returnchild status

DC

Completerequest

returnnot Pend

PPCprop

completion

CallDriver

N/A

no propcompletion

CallDriver

start NP

returnPending

NP

MPR1

MPRcompletion

SKIP2

IPCCallDriver

CallDriver

DC

Completerequest

PPCprop

completion

CallDriver

N/A

no propcompletion

CallDriver

start P Mark Pending

IRP accessible N/A

synch

SKIP1CallDriver

SKIP1Skip

MPR2 MPR1

NP

MPR3

CallDrivernot pending returned

MPR2

synch

9

The SLAM Thesis

We can soundly and precisely check a program without annotations against API rules by creating a program abstraction exploring the abstraction’s state space refining the abstraction

We can scale such an approach to many 100kloc via modular analysis model checking

10

SLAM Input

API usage rules client C source code “as is”

Analysis create, explore and refine boolean program

abstractions

Output Error traces (minimize noise) Verification (soundness)

11

Usage Rule for Locking

Unlocked Locked Error

U

L

L

U

state {

int locked = 0;

}

KeAcquireSpinLock.call {

if (locked==1) abort;

else locked = 1;

}

KeReleaseSpinLock.call {

if (locked==0) abort;

else locked = 0;

}

SLICState Machine

12

Example

do { //get the write lock

KeAcquireSpinLock(&devExt->writeListLock);

nPacketsOld = nPackets; request = devExt->WLHeadVa;

if (request){KeReleaseSpinLock(&devExt->writeListLock);...nPackets++;

}} while (nPackets != nPacketsOld);KeReleaseSpinLock(&devExt->writeListLock);

Loop Invariant: nPackets = nPacketsOld IFF lock is held

13

c2bp

bebop

newton

prog. P’prog. P

SLIC rules

The SLAM Process

boolean program

path p

predicates

predicates

slic

14

Instrumented Codedo { //get the write lock

SLIC_KeAcquireSpinLock_call();KeAcquireSpinLock(&devExt->writeListLock);

nPacketsOld = nPackets; request = devExt->WLHeadVa;

if (request){SLIC_KeReleaseSpinLock_call();KeReleaseSpinLock(&devExt->writeListLock);...nPackets++;

}} while (nPackets != nPacketsOld);SLIC_KeReleaseSpinLock_call();KeReleaseSpinLock(&devExt->writeListLock);

15

Predicate Abstraction of C (c2bp)

Input: a C program P and set of predicates E predicate = pure C boolean expression

Output: a boolean program bp(P,E) that is a sound abstraction of P a precise (boolean) abstraction of P

Results separate compilation (predicate abstraction) in

presence of procedures and pointers

16

Skeletal Boolean Program

do //get the write lock

SLIC_KeAcquireSpinLock_call();

if (*) then SLIC_KeReleaseSpinLock_call();

fiwhile (*);SLIC_KeReleaseSpinLock_call();

Predicates:

(locked==0)(locked==1)

17

Reachability in Boolean Programs (bebop)

Symbolic interprocedural data flow analysis Based on CFL-reachability [Reps-Horwitz-Sagiv 95] Explicit representation of CFG Implicit representation of reachable states via BDDs

Worst-case complexity is O( P (GL)3 ) P = program size G = number of global states in state machine L = max. number of local states over all procedures

18

Shortest Error Path (Acquire 2x)

do //get the write lock

SLIC_KeAcquireSpinLock_call();

if (*) then SLIC_KeReleaseSpinLock_call();

fiwhile (*);SLIC_KeReleaseSpinLock_call();

Predicates:

(locked==0)(locked==1)

19

Counterexample-driven Refinement (newton)

Symbolically execute path in C program

Check for path infeasibility at each conditional Simplify theorem prover

If path is infeasible, generate new predicates to rule out infeasible path heuristics to generate “weak” explanation

20

Error Path in C code

do { //get the write lock

KeAcquireSpinLock(&devExt->writeListLock);

nPacketsOld = nPackets; request = devExt->WLHeadVa;

if (request){KeReleaseSpinLock(&devExt->writeListLock);...nPackets++;

}} while (nPackets != nPacketsOld);KeReleaseSpinLock(&devExt->writeListLock);

21

Newton: Path Simulation

Store:

Conditions:

nPackets = nPacketsOld;

request = devExt->WLHeadVa;

assume(!request);

assume(nPackets != nPacketsOld);

22

Newton

Store:

(1) nPacketsOld:

Conditions:

nPackets = nPacketsOld;

request = devExt->WLHeadVa;

assume(!request);

assume(nPackets != nPacketsOld);

23

Newton

Store:

(1) nPacketsOld:

(2) nPackets: (1)

Conditions:

nPackets = nPacketsOld;

request = devExt->WLHeadVa;

assume(!request);

assume(nPackets != nPacketsOld);

24

Newton

Store:

(1) nPacketsOld:

(2) nPackets: (1)

(3) devExt:

Conditions:

nPackets = nPacketsOld;

request = devExt->WLHeadVa;

assume(!request);

assume(nPackets != nPacketsOld);

25

Newton

nPackets = nPacketsOld;

request = devExt->WLHeadVa;

assume(!request);

assume(nPackets != nPacketsOld);

Store:

(1) nPacketsOld:

(2) nPackets: (1)

(3) devExt:

(4) ->WLHeadVa: (3)

Conditions:

26

Newton

Store:

(1) nPacketsOld:

(2) nPackets: (1)

(3) devExt:

(4) ->WLHeadVa: (3)

(5) request: (3,4)

Conditions:

nPackets = nPacketsOld;

request = devExt->WLHeadVa;

assume(!request);

assume(nPackets != nPacketsOld);

27

Newton

Store:

(1) nPacketsOld:

(2) nPackets: (1)

(3) devExt:

(4) ->WLHeadVa: (3)

(5) request: (3,4)

Conditions:

! (5)

nPackets = nPacketsOld;

request = devExt->WLHeadVa;

assume(!request);

assume(nPackets != nPacketsOld);

28

Newton

Store:

(1) nPacketsOld:

(2) nPackets: (1)

(3) devExt:

(4) ->WLHeadVa: (3)

(5) request: (3,4)

Conditions:

! (5)

!= (1,2)

nPackets = nPacketsOld;

request = devExt->WLHeadVa;

assume(!request);

assume(nPackets != nPacketsOld);

29

Newton

Store:

(1) nPacketsOld:

(2) nPackets: (1)

(3) devExt:

(4) ->WLHeadVa: (3)

(5) request: (3,4)

Conditions:

!= (1,2)

nPackets = nPacketsOld;

request = devExt->WLHeadVa;

assume(!request);

assume(nPackets != nPacketsOld);

30

Newton

Store:

(1) nPacketsOld:

(2) nPackets: (1)

Conditions:

!= (1,2)

nPackets = nPacketsOld;

request = devExt->WLHeadVa;

assume(!request);

assume(nPackets != nPacketsOld);

31

Newton

Predicates:

(nPacketsOld == )

(nPackets == )

( != )

nPackets = nPacketsOld;

request = devExt->WLHeadVa;

assume(!request);

assume(nPackets != nPacketsOld);

32

Newton

Predicates:

(nPacketsOld != nPackets)

nPackets = nPacketsOld;

request = devExt->WLHeadVa;

assume(!request);

assume(nPackets != nPacketsOld);

33

Newton

Predicates:

(nPacketsOld == nPackets)

nPackets = nPacketsOld;

request = devExt->WLHeadVa;

assume(!request);

assume(nPackets != nPacketsOld);

34

Refined Boolean Program

do //get the write lock

SLIC_KeAcquireSpinLock_call();b := true; // npacketsOld = npackets;

if (*) then SLIC_KeReleaseSpinLock_call();

b := b ? false : *; // npackets++;fi

while ( !b ); // (nPackets != nPacketsOld);SLIC_KeReleaseSpinLock_call();

Boolean variable b represents the condition

(nPacketsOld==nPackets)

!b

b

b

b

b

b

!b

35

Results on Drivers (so far)

Handful of drivers analyzed so far 2k-30k of C code each

Each driver has yielded bugs

SLAM process has always terminated minutes to ½ hour

Process optimizations have huge effects

36

Demo

Lock example validation

Lock example with bug error trace

SLAM’s first bug floppy device driver

37

Termination of SLAM

[Cousot-Cousot, PLILP’92] widening + abstract interpretation with infinite lattices

(WAIL) is more powerful than a (single) finite abstraction

[Ball-Podelski-Rajamani, TACAS’02] finite abstractions plus iterative refinement (FAIR) is more

powerful than WAIL

38

Termination and Widening

Widening is used to achieve termination by enlarging the set of states (to reach a fixpoint) 5 x 10 widened to 5 x

Of course, widening may lose precision

Every fixpoint algorithm that loses precision (in order to terminate) uses widening (implicitly)

39

Fixpoint

X := init;while X S do X’ := X F(X) if X’ X then break

X := X’odreturn X S

X := init;while X S do X’ := X F(X) if X’ X then break i := oracle’s guess X := W(i, X’)odreturn X S

Fixpoint + Widening(WAIL)

40

F

F

F

F

F

F

W

F

W

F

F

WF

F

W

F

W

Search Space of Widenings

41

Finite Abstraction + Iterative Refinement

X := init; while true do P := atoms(X); X# := lfp(F#

P, init)

if X# S then break X := X F(X)odreturn X# S

If WAIL succeeds in N iterations then FAIR will succeed in N iterations

But, FAIR can succeed earlier, due to use of interior (abstract) fixpoint

42

Search Space

F

F

F

F

F

F

W

F

W

F

F

WF

F

W

F

W

F

F

F

F

F

WAIL+oracle FAIR

43

Searching for Solutions

Once upon a time, only a human could play a great game of chess… … but then smart brute force won the day (Deep Blue vs.

Kasparov)

Once upon a time, only a human could design a great abstraction…

44

Termination of Talk

SLAM automatically discovers inductive invariants viapredicate abstraction of C programsmodel checking of boolean programscounterexample-driven refinement

Implemented and starting to yield results on NT device drivers

45

SLAMming on the shoulders of …

Model checking predicate abstraction counterexample-driven

refinement BDDs and symbolic model

checking

Program analysis abstract interpretation points-to analysis dataflow via CFL-

reachability

Automated deduction weakest preconditions theorem proving

Software AST toolkit Das’s Golf CU and CMU BDD Simplify, Vampyre OCAML

46

SLAM Future Work More impact

Static Driver Verifier (internal, external)

More features Heap abstractions Concurrency

More languages C# and CIL

More users 2002 public release of SLAM toolkit

47

Predictions

The holy grail of full program verification has been abandoned

New checking tools will emerge and be widely used

Tools will exploit ideas from various analysis disciplines alleviate the “chicken-and-egg” problem of

specifications

48

Challenges / SLAM Reading List

Specifications Mining specifications

Abstractions Predicate abstraction for software verification

Annotations Types as models: model checking MP programs Role analysis

Soundness Ccured: type-safe retrofitting of legacy code

Scaling Lazy abstraction

49

The End