[LLVMdev] summer of code idea — checking bounds overflow bugs

John Criswell criswell at uiuc.edu
Wed Mar 31 07:58:08 PDT 2010


Adve, Vikram Sadanand wrote:
> On Mar 30, 2010, at 11:33 AM, John Regehr wrote:
>
>   
>> John-- a couple questions:
>>
>> Can you explain the SAFECode model in a bit more detail?  I am getting 
>> conflicting information.  On one hand, some of the papers describe a 
>> system that is primarily designed to hide safety violations.  On the other 
>> hand, the 2006 ICSE paper that I cited earlier today seems to be talking 
>> about catching violations.  
>>     
>
> SAFECode has both capabilities.  The complete array bounds checking described in the ICSE paper is an option.  So are the complete dangling pointer checks described in a DSN 2006 paper (that one has higher overhead for many programs).  The guarantees in the PLDI 2006 paper -- partial type safety, control flow integrity, and a sound operational semantics -- hold regardless of whether those two options are enabled or not.
>
> The code in the public repository defaults to a debugging version that (a) turns on complete bounds checking;     (b) I think turns on dangling pointer checks;

Dangling pointer detection (DSN 2006) is disabled by default.  A command 
line option in the sc tool will enable it.


>  but (c) does not use Automatic Pool Allocation, so it does not guarantee the soundness of pointer analysis.

I have comments to John's other questions below.


>   It also does much more information tracking to give useful feedback on bugs.  Of course, it has much higher overhead than if we had made other choices, e.g., for use in production code.
>
> --Vikram
>
>
>   
>> These are very different goals!  What does the 
>> code in the SAFECode repository actually do?
>>
>> Can you comment on the speed of LLVM when shelling out to Omega?  My guess 
>> would be that this will result in unacceptable compile times for large 
>> software, and that something fast and relatively simple like ABCD is a 
>> better choice for general usage.
>>     

I don't have numbers, but it was unusable for doing static array bounds 
checking on the Linux kernel during the Secure Virtual Architecture 
(SVA) work.  There might be performance numbers in one of the SAFECode 
publications.

The immediate engineering problem with using the Omega constraint solver 
is that SAFECode does multiple fork() and exec() calls to execute a 
separate binary program to do constraint solving; this occurs multiple 
times during the static array bounds checking pass.  Performance could 
be greatly improved by using the Omega code as a library and linking it 
straight into the static array bounds checking pass.  The overheads of 
constraint generation and solving would still be there, but calling into 
the Omega code would be much faster.

Regarding the use of alternative algorithms, there are new, simple 
static array bounds checking passes within SAFECode that utilize 
analysis group chaining.  When one analysis cannot determine that a GEP 
remains within bounds, it can ask a more powerful pass to return a 
result.  This could potentially be used to reduce the use of the Omega 
method to just those GEPs that cannot be proven safe using simpler methods.

>> Finally a comment: it's a clear that a comprehensive system for trapping 
>> undefined behavior in Clang is a multi-year project.  Some parts of this 
>> must live in Clang.  Some parts, such as bounds check optimizations, 
>> should go into LLVM passes.  Anyway I'm just saying that the project you 
>> outlines seems to fit very well into the overall vision of detecting 
>> undefined behavior in C programs.
>>     

Can you elaborate on the undefined behaviors you have in mind?  SAFECode 
(when its Automatic Pool Allocation option is working) should provide 
sound operational semantics, so all undefined behavior due to memory 
safety should be gone.  I'm sure there's other undefined behaviors 
(e.g., divide by zero), but I haven't thought much about them.

I'm curious why you think some undefined behavior detectors need to be 
built in Clang.  It seems to me that any static analysis could be built 
using either LLVM or Clang; there are just tradeoffs to each approach.  
What advantages does Clang provide?

-- John T.




More information about the llvm-dev mailing list