diff --git a/Changelog b/Changelog index caecef4485410d82e88530db1a693ce59cab75a7..fee19c92ad3331064da81ab7e51661f676f17fa1 100644 --- a/Changelog +++ b/Changelog @@ -17,6 +17,12 @@ Open Source Release <next-release> ################################## +-! RTE [2021-04-16] -rte-initialized takes a set of functions as + parameter (defaults to none) +- RTE [2021-04-16] No more initialization warnings for full structures + and unions reads. Initialization warnings for other + types *without* trap representation. Refer to the + documentation for more details. -* Kernel [2021-04-16] Pretty prints array formals in their original form. Fixes pub/frama-c#392 o! Kernel [2021-04-13] Removed deprecated function Filepath.pretty diff --git a/doc/rte/rte.tex b/doc/rte/rte.tex index 228c049928b7299a356944ebcf38e546b939b0ae..bcb27b675a6a94c0e78e7086a2330f7834c6ade2 100644 --- a/doc/rte/rte.tex +++ b/doc/rte/rte.tex @@ -7,6 +7,9 @@ \newcommand{\optnodowncast}{\mbox{\lstinline|-rte-no-downcast|}} \newcommand{\rte}{\textsf{RTE}\xspace} \newcommand{\framac}{\textsf{Frama-C}\xspace} +\newcommand{\acsl}{\textsf{ACSL}\xspace} +\newcommand{\gcc}{\textsf{Gcc}\xspace} +\newcommand{\clang}{\textsf{Clang}\xspace} \tableofcontents @@ -48,7 +51,7 @@ implementation choice. Also note that annotations are dependent of the {\it machine dependency} used on Frama-C command-line, especially the size of integer types. -The C language ISO standard \cite{standardc99} will be referred to as \cnn{} +The C language ISO standard \cite{standardc99} will be referred to as \cnn{} (of which specific paragraphs are cited, such as \mbox{6.2.5.9}). %%\section{Generated Annotations} @@ -96,14 +99,14 @@ and thus has domain \lstinline|[-2147483648,2147483647]|, and that \lstinline|x| is an \lstinline|int|, the expression \lstinline|x+1| performs a signed integer overflow, and therefore has an undefined behavior, if and only if \lstinline|x| equals \lstinline|2147483647|. This is independent of the fact that for most -(if not all) C compilers and 32-bits architectures, one will get +(if not all) C compilers and 32-bits architectures, one will get \lstinline|x+1 = -2147483648| and no runtime error will happen. But by strictly -conforming to +conforming to the C standard, one cannot assert that the C compiler will not in fact generate code provoking a runtime error in this case, since it is allowed to do so. -%% In fact, for an expression such as \lstinline|x/y| (for \lstinline|int x,y|), -%% the execution will most likely result in a floating point exception -%% when \lstinline|x = -2147483648, y = -1| (the result is \lstinline|2147483648|, which overflows). +%% In fact, for an expression such as \lstinline|x/y| (for \lstinline|int x,y|), +%% the execution will most likely result in a floating point exception +%% when \lstinline|x = -2147483648, y = -1| (the result is \lstinline|2147483648|, which overflows). Also note that from a security analysis point of view, an undefined behavior leading to a runtime error classifies as a denial of service (since the program terminates), while a signed integer overflow may very well lead to buffer @@ -122,7 +125,7 @@ by making such wide-ranging and easily checkable assumptions. {\bf Therefore representation.} %% value analysis makes the same assumption; also see value analyse manual 4.4.1 -%% Frama-C is not intended to work on non ISO conforming inputs (?), +%% Frama-C is not intended to work on non ISO conforming inputs (?), %% but conforming programs may still produce undefined behaviors. Well ... \section{Other annotations generated} @@ -277,7 +280,7 @@ int main(void) { \end{listing-nonumber} \smallskip -is in fact equivalent to: +is in fact equivalent to: \smallskip \begin{listing-nonumber} @@ -312,7 +315,7 @@ whenever the result falls outside the range \lstinline|[-128,127]|. Thus, with a single annotation, the \rte{} plug-in prevents both an undefined behavior (signed overflow) and an implementation defined behavior (signed downcasting). Note that the annotation for signed downcasting always entails the annotation -for signed overflow. +for signed overflow. \subsection{Unary minus} @@ -430,7 +433,7 @@ z = x >> y; \section{Left-values access} -Dereferencing a pointer is an undefined behavior if: +Dereferencing a pointer is an undefined behavior if: \begin{itemize} \item the pointer has an invalid value: null pointer, misaligned address for the @@ -443,7 +446,7 @@ Dereferencing a pointer is an undefined behavior if: \end{itemize} The \rte{} plug-in generates annotations to prevent this type of undefined -behavior in a systematic way. It does so by deferring the check to the ACSL +behavior in a systematic way. It does so by deferring the check to the \acsl{} built-in predicate \lstinline|valid(p)|: \lstinline|valid(s)| (where \lstinline|s| is a set of terms) holds if and only if dereferencing any $\lstinline|p| \in \lstinline|s|$ is safe (i.e. points to a safely allocated @@ -511,7 +514,7 @@ int main(void) { } \end{listing-nonumber} -% Note that in the call \lstinline|f(tab)|, the implicit conversion from array \lstinline|tab| to a pointer to the beginning of the array +% Note that in the call \lstinline|f(tab)|, the implicit conversion from array \lstinline|tab| to a pointer to the beginning of the array % \lstinline|&tab[0]| introduces a pointer dereferencing and thus the annotation \lstinline|\valid((int*) tab)|, which is equivalent to % \lstinline|\valid(&tab[0])|. @@ -576,7 +579,7 @@ offers a way to generate assertions preventing unsigned arithmetic operations to overflow ({\it i.e.} involving computation of a modulo). Operations which are considered by \rte{} regarding unsigned overflows are -addition, subtraction, multiplication. Negation (unary minus), left shift. +addition, subtraction, multiplication. Negation (unary minus), left shift. and right shift are not considered. The generated assertion requires the result of the operation (in non-modular arithmetic) to be less than the maximal representable value of its type, and nonnegative (for subtraction). @@ -594,7 +597,7 @@ unsigned int f(unsigned int a, unsigned int b) { } \end{listing-nonumber} -To generate assertions w.r.t. unsigned overflows, options +To generate assertions w.r.t. unsigned overflows, options \lstinline|-warn-unsigned-overflow| must be used. Here is the resulting file on a 32 bits target architecture (\lstinline|-machdep x86_32|): \begin{listing-nonumber} @@ -681,7 +684,7 @@ int f(float v) { \section{Expressions not considered by \rte{}} An expression which is the operand of a \lstinline|sizeof| (or -\lstinline|__alignof|, a GCC operator parsed by Cil) is ignored by \rte{}, as +\lstinline|__alignof|, a \gcc{} operator parsed by Cil) is ignored by \rte{}, as are all its sub-expressions. This is an approximation, since the operand of \lstinline|sizeof| may sometimes be evaluated at runtime, for instance on variable sized arrays: see the example in \cnn{} paragraph \mbox{6.5.3.4.7}. @@ -710,7 +713,7 @@ preprocessing: \begin{listing-nonumber} typedef unsigned long size_t; -/* compiler builtin: +/* compiler builtin: void *__builtin_alloca(unsigned int); */ size_t fsize3(int n) { @@ -738,6 +741,60 @@ int main(void) \end{example} +\section{Initialization} + +Reading an uninitialized value can be an undefined behavior in the two following +cases: + +\begin{itemize} +\item \mbox{ISO C11 6.3.2.1}\footnote{here we use C11 as it is clearer than C99} + a variable whose address is never taken is read before being initialized, +\item a memory location that has never been initialized is read and it happens + that it was a trap representation for the type used for the access. +\end{itemize} + +More generally, reading an uninitialized location always results in an +indeterminate value (\mbox{6.7.9.10}). Such a value is either an unspecified +value or a trap representation. Only reading a trap representation is an +undefined behavior (\mbox{6.2.6.1.5}). It corresponds to the second case above. + +However for (most) types that do not have trap representation, reading an +unspecified value is generally not a desirable behavior. Thus, \rte{} is +stricter than the ISO C on many aspects and delegates one case of undefined +behavior to the use of compiler warnings. We now detail the chosen tradeoff. + +If a value of a fundamental type (integers, floating point types, pointers, or +a typedef of those) is read, it must be initialized except if it is a formal +parameter or a global variable. We exclude formal parameters as its +initialization status must be checked at the call point (\rte{} generates an +annotation for this). We exclude global variables as they are initialized by +default and any value stored in this variable must be initialized (\rte{} +generates an annotation for this). + +As structures and unions never have trap representation, they can (and they are +regularly) be manipulated while being partially initialized. Consequently, +\rte{} does not require initialization for reads of a full union or structure +(while reading fields with fundamental types is covered by the previous paragraph). +As a consequence, the case of structures and unions \textit{whose address is + never taken, and being read before being initialized} is \textbf{not} covered +by \rte{}. It is worth noting that +this particular case is efficiently detected by a compiler warning (see +\lstinline{-Wuninitialized} on \gcc{} and \clang{} for example) as it only +requires local reasoning that is easy for compilers (but not that simple to +express in \acsl{}). + +If you really need \rte{} to cover the previous case, please contact the +Frama-C team. + +Finally, there are some cases when reading uninitialized values via a type that +cannot have trap representation (for example \lstinline{unsigned char}) should +be allowed, for example writing a \lstinline{memcpy} function. In this case, one +can exclude this function from the range of function annotated with +initialization properties by removing them from the set of functions to annotate +(e.g. \lstinline{-rte-initialized="@all,-f"}). Note that the excluded functions +must preserve the initialization of globals, as no assertions are generated for +them. + \section{Undefined behaviors not covered by \rte{}} One should be aware that \rte{} only covers a small subset of all possible @@ -753,22 +810,16 @@ considered: producing a value outside of the representable range (\cnn{} 6.3.1.5) \item Conversion between two pointer types produces a result that is incorrectly aligned (\cnn{} 6.3.2.3) -\item Use of a variable with automatic storage duration before its - initialization (\cnn{} 6.7.8.10): such a variable has an indeterminate value -%% technically, not an undefined behavior (does not appear in the list of undefined behavior in -%% the relevant ANSI C ISO annex), but can as well be considered as one ; -%% not treated by plug-in because too many annotations would be generated -%% unless some dataflow analysis is performed \end{itemize} %% \Section{Others} %% ISO 6.3.1.3 / 6.3.1.4 / 6.3.1.5 %% convert an integer type to another signed integer type that cannot represent its value: implementation defined. %% convert a real floating type to an integer: if the value of the integral part cannot be represented by the integer type, undefined. -%% convert an integer to a real floating type : -%% if the value being converted is outside the range of values that can be represented, -%% undefined (does not happen with IEEE floating types, event if real floating = float and integer type = unsigned long long). -%% If in range but not exact, round to nearest higher or nearest lower representable value (implementation defined). +%% convert an integer to a real floating type : +%% if the value being converted is outside the range of values that can be represented, +%% undefined (does not happen with IEEE floating types, event if real floating = float and integer type = unsigned long long). +%% If in range but not exact, round to nearest higher or nearest lower representable value (implementation defined). %% Value analysis rounds to nearest lower silently (?). %% demote a real floating type to another and procuce a value outside the range = undefined @@ -800,7 +851,7 @@ unsigned overflows\\ unsigned integer downcast\\ \hline \lstinline|-warn-signed-overflow| & boolean (true) & Generate annotations for -signed overflows \\ +signed overflows \\ \hline \lstinline|-warn-signed-downcast| & boolean (false) & Generate annotations for signed integer downcast \\ @@ -836,24 +887,32 @@ invalid pointer arithmetic \\ \hline \lstinline|-rte| & boolean (false) & Enable \rte{} plug-in \\ \hline -\lstinline|-rte-div| & boolean (false) & Generate annotations for division by +\lstinline|-rte-div| & boolean (true) & Generate annotations for division by zero \\ \hline -\lstinline|-rte-shift| & boolean (false) & Generate annotations for left and right shift value out of bounds \\ -\hline -\lstinline |-rte-mem| & boolean (false) & Generate annotations for validity of -left-values access \\ -\hline \lstinline |-rte-float-to-int| & boolean (true) & Generate annotations for casts from floating-point to integer \\ \hline -\lstinline |-rte-trivial-annotations| & boolean (true) & Generate all annotations even when they trivially hold \\ +\lstinline |-rte-initialized| & set of function (none) & Generate annotations +for initialization for the given set of functions \\ \hline -\lstinline |-rte-warn| & boolean (true) & Emit warning on broken annotations \\ +\lstinline |-rte-mem| & boolean (true) & Generate annotations for validity of +left-values access \\ +\hline +\lstinline |-rte-pointer-call| & boolean (true) & Generate annotations for +validity of calls via function pointers \\ +\hline +\lstinline|-rte-shift| & boolean (true) & Generate annotations for left and +right shift value out of bounds \\ \hline \lstinline |-rte-select| & set of function (all) & Run plug-in on a subset of C functions \\ \hline +\lstinline |-rte-trivial-annotations| & boolean (false) & Generate all +annotations even when they trivially hold \\ +\hline +\lstinline |-rte-warn| & boolean (true) & Emit warning on broken annotations \\ +\hline \end{tabular} \caption{\rte{} options} \label{options} \end{center} diff --git a/src/plugins/rte/flags.ml b/src/plugins/rte/flags.ml index 36198afe973c165629266594f7690e1093b2c23f..d452b81ad736a37d46dcded3d3a4e97cfbe09dd5 100644 --- a/src/plugins/rte/flags.ml +++ b/src/plugins/rte/flags.ml @@ -26,7 +26,7 @@ type t = { remove_trivial: bool; - initialized: bool; + initialized: Kernel_function.Set.t ; mem_access: bool; div_mod: bool; shift: bool; @@ -44,9 +44,10 @@ type t = { bool_value: bool; } -let all = { +let all () = { remove_trivial = true; - initialized = true; + initialized = + Globals.Functions.fold Kernel_function.Set.add Kernel_function.Set.empty; mem_access = true; div_mod = true; shift = true; @@ -66,7 +67,7 @@ let all = { let none = { remove_trivial = false; - initialized = false; + initialized = Kernel_function.Set.empty; mem_access = false; div_mod = false; shift = false; @@ -87,7 +88,7 @@ let none = { (* Which annotations should be added, from local options, or deduced from the options of RTE and the kernel *) -let option (get : unit -> bool) = function None -> get () | Some flag -> flag +let option get = function None -> get () | Some flag -> flag let default ?remove_trivial diff --git a/src/plugins/rte/flags.mli b/src/plugins/rte/flags.mli index f294c8f49d5b3a34650919af663909c3ec8d8cd8..b36711a37e01b07ee90e856f2847359654c8d673 100644 --- a/src/plugins/rte/flags.mli +++ b/src/plugins/rte/flags.mli @@ -28,7 +28,7 @@ a category of alarms will be visited or not. *) type t = { remove_trivial: bool; - initialized: bool; + initialized: Kernel_function.Set.t ; mem_access: bool; div_mod: bool; shift: bool; @@ -49,7 +49,7 @@ type t = { (** Defaults flags are taken from the Kernel and RTE plug-in options. *) val default : ?remove_trivial:bool -> - ?initialized:bool -> + ?initialized:Kernel_function.Set.t -> ?mem_access:bool -> ?div_mod:bool -> ?shift:bool -> @@ -67,10 +67,10 @@ val default : ?bool_value:bool -> unit -> t -(** All flags set to [true]. *) -val all : t +(** All flags set to [true], [@all] for [initialized] *) +val all : unit -> t -(** All flags set to [false]. *) +(** All flags set to [false], [empty] for [initialized] *) val none : t (* -------------------------------------------------------------------------- *) diff --git a/src/plugins/rte/options.ml b/src/plugins/rte/options.ml index 3b962761670da3de9b97e252709370605e9f1781..2e5b4d55f5bcf4ebc6b571d5a95459e2ac1ba08c 100644 --- a/src/plugins/rte/options.ml +++ b/src/plugins/rte/options.ml @@ -64,11 +64,13 @@ module DoFloatToInt = (* annotates local variables and pointers read (aside from globals) initialization *) module DoInitialized = - False + Kernel_function_set (struct let option_name = "-rte-initialized" - let help = "when on, annotates local variables and pointers \ - reads with initialization tests" + let arg_name = "fct" + let help = "for each function in 'fct', annotates reads of non struct or \ + union values from local variables and pointers with \ + initialization tests, see documentation for more details" end) (* annotates invalid memory access (undefined behavior) *) diff --git a/src/plugins/rte/options.mli b/src/plugins/rte/options.mli index 9dea4f6c0af9730d05bff45e197441555317dfa7..d2d78c6e139f56faf130d6bc25c0ebfb93421905 100644 --- a/src/plugins/rte/options.mli +++ b/src/plugins/rte/options.mli @@ -27,7 +27,7 @@ module Enabled: Parameter_sig.Bool module DoShift : Parameter_sig.Bool module DoDivMod : Parameter_sig.Bool module DoFloatToInt : Parameter_sig.Bool -module DoInitialized : Parameter_sig.Bool +module DoInitialized : Parameter_sig.Kernel_function_set module DoMemAccess : Parameter_sig.Bool module DoPointerCall : Parameter_sig.Bool diff --git a/src/plugins/rte/register.ml b/src/plugins/rte/register.ml index 984734d10d4f48c9efec18dca89db440091b85c0..75b8dba172cb181233de116ec621dbbb86fb436c 100644 --- a/src/plugins/rte/register.ml +++ b/src/plugins/rte/register.ml @@ -28,7 +28,7 @@ function *) let do_all_rte kf = let flags = - { Flags.all with + { (Flags.all ()) with Flags.signed_downcast = false; unsigned_downcast = false; } in @@ -38,7 +38,7 @@ let do_all_rte kf = function *) let do_rte kf = let flags = - { Flags.all with + { (Flags.all ()) with Flags.unsigned_overflow = false; signed_downcast = false; unsigned_downcast = false; } diff --git a/src/plugins/rte/rte.ml b/src/plugins/rte/rte.ml index a18ad38795dd189971f39328df512a561bc61a45..b1d99f4d05903c1c5a1271ab1f66c6c8792fe92f 100644 --- a/src/plugins/rte/rte.ml +++ b/src/plugins/rte/rte.ml @@ -106,50 +106,22 @@ let lval_assertion ~read_only ~remove_trivial ~on_alarm lv = (* assertion for lvalue initialization *) let lval_initialized_assertion ~remove_trivial:_ ~on_alarm lv = - let rec check_array_initialized default off typ in_struct l = - match off with - | NoOffset -> - begin - match typ with - | TComp({cstruct = false; cfields; cname} ,_,_) -> - (match cfields with - | None -> - Options.fatal - "Access to an object of undefined union %a" - Printer.pp_varname cname - | Some [] -> () (* empty union, supported by gcc with size 0. - Trivially initialized. *) - | Some l -> - let llv = - List.map - (fun fi -> Cil.addOffsetLval (Field (fi, NoOffset)) lv) l - in - if default then - on_alarm ~invalid:false (Alarms.Uninitialized_union llv)) - | _ -> - if default then - on_alarm ~invalid:false (Alarms.Uninitialized lv) - end - | Field (fi, off) -> - (* Mark that we went through a struct field, then recurse *) - check_array_initialized default off fi.ftype true l - | Index (_e, off) -> - match Cil.unrollType typ with - | TArray (bt, Some _size, _, _) -> - check_array_initialized true off bt in_struct l - | TArray (bt, None, _, _) -> check_array_initialized true off bt in_struct l - | _ -> assert false - in - + let typ = Cil.typeOfLval lv in match lv with - | Var vi , off -> - let loc = fst vi.vdecl in - let ignored_cases = vi.vglob || vi.vformal || vi.vtemp in - check_array_initialized (not ignored_cases) off vi.vtype false loc - | (Mem e as lh), off -> - let loc = fst e.eloc in - if not (Cil.isFunctionType (Cil.typeOfLval lv)) then - check_array_initialized true off (Cil.typeOfLhost lh) false loc + | Var vi, NoOffset -> + (** Note: here [lv] has structure/union type or fundamental type. + We exclude structures and unions. And for fundamental types: + - globals (initialized and then only written with initialized values) + - formals (checked at function call) + - temporary variables (initialized during AST normalization) + *) + if not (vi.vglob || vi.vformal || vi.vtemp) + && not (Cil.isStructOrUnionType typ) + then + on_alarm ~invalid:false (Alarms.Uninitialized lv) + | _ -> + if not (Cil.isFunctionType typ || Cil.isStructOrUnionType typ) then + on_alarm ~invalid:false (Alarms.Uninitialized lv) (* assertion for unary minus signed overflow *) let uminus_assertion ~remove_trivial ~on_alarm exp = diff --git a/src/plugins/rte/visit.ml b/src/plugins/rte/visit.ml index aaa5dc814d71be46decfdcb5cae92da1f7ed51f9..d7778383f58cd0e596b43f7e09d75669a43adb54 100644 --- a/src/plugins/rte/visit.ml +++ b/src/plugins/rte/visit.ml @@ -51,7 +51,8 @@ class annot_visitor kf flags on_alarm = object (self) r method private do_initialized () = - flags.Flags.initialized && not (Generator.Initialized.is_computed kf) + Kernel_function.Set.mem kf flags.Flags.initialized + && not (Generator.Initialized.is_computed kf) method private do_mem_access () = flags.Flags.mem_access && not (Generator.Mem_access.is_computed kf) @@ -149,7 +150,7 @@ class annot_visitor kf flags on_alarm = object (self) (Rte.lval_assertion ~read_only:Alarms.For_writing) ret - method private check_uchar_assign dest src = + method private check_assigned dest = if self#do_mem_access () then begin Options.debug "lval %a: validity of potential mem access checked\n" Printer.pp_lval dest; @@ -157,20 +158,11 @@ class annot_visitor kf flags on_alarm = object (self) (Rte.lval_assertion ~read_only:Alarms.For_writing) dest end; - begin match src.enode with - | Lval src_lv -> - let typ1 = Cil.typeOfLval src_lv in - let typ2 = Cil.typeOfLval dest in - let isUChar t = Cil.isUnsignedInteger t && Cil.isAnyCharType t in - if isUChar typ1 && isUChar typ2 then - self#mark_to_skip_initialized src_lv - | _ -> () - end ; Cil.DoChildren (* assigned left values are checked for valid access *) method! vinst = function - | Set (lval,exp,_) -> self#check_uchar_assign lval exp + | Set (lval,_,_) -> self#check_assigned lval | Call (ret_opt,funcexp,argl,_) -> (* Do not emit alarms on Eva builtins such as Frama_C_show_each, that should have no effect on analyses. *) @@ -207,8 +199,8 @@ class annot_visitor kf flags on_alarm = object (self) let do_call lv _e _args _loc = self#treat_call lv in Cil.treat_constructor_as_func do_call v f args kind loc; Cil.DoChildren - | Local_init (v,AssignInit (SingleInit exp),_) -> - self#check_uchar_assign (Cil.var v) exp + | Local_init (v,AssignInit (SingleInit _),_) -> + self#check_assigned (Cil.var v) | Local_init (_,AssignInit _,_) | Asm _ | Skip _ | Code_annot _ -> Cil.DoChildren @@ -309,7 +301,8 @@ class annot_visitor kf flags on_alarm = object (self) self#generate_assertion (Rte.lval_assertion ~read_only:Alarms.For_reading) lval end; - if self#do_initialized () && not (self#must_skip_initialized lval) then begin + if self#do_initialized () + && not (self#must_skip_initialized lval) then begin Options.debug "exp %a is an lval: initialization of potential mem access checked" Printer.pp_exp exp; @@ -460,7 +453,8 @@ let annotate ?flags kf = let (|||) a b = a || b in let open Generator in let open Flags in - if comp Initialized.accessor flags.initialized ||| + if comp Initialized.accessor + (not @@ Kernel_function.Set.is_empty flags.initialized) ||| comp Mem_access.accessor flags.mem_access ||| comp Pointer_value.accessor flags.pointer_value ||| comp Pointer_call.accessor flags.pointer_call ||| diff --git a/tests/rte/initialized-ignore-fct.i b/tests/rte/initialized-ignore-fct.i new file mode 100644 index 0000000000000000000000000000000000000000..af2e03209b9f14dba64a1a48c7c00dd2a8fa6f0a --- /dev/null +++ b/tests/rte/initialized-ignore-fct.i @@ -0,0 +1,13 @@ +/* run.config + OPT: -rte -rte-initialized="@all" -print + OPT: -rte -rte-initialized="@all,-f1" -print +*/ + +int f1(void){ + int i = 0 ; + return i ; +} +int f2(void){ + int i = 0 ; + return i ; +} diff --git a/tests/rte/initialized.c b/tests/rte/initialized.c index 87354bc7e8de9438179420a6d19255e5f179eaa1..ea9c6ed25e034a6a793d9bb3ddcc78d1bd87009e 100644 --- a/tests/rte/initialized.c +++ b/tests/rte/initialized.c @@ -1,5 +1,5 @@ /* run.config - OPT: -rte -rte-initialized -warn-signed-overflow -print + OPT: -rte -rte-initialized="@all" -warn-signed-overflow -print */ struct R { @@ -32,9 +32,9 @@ int g() } /* Formals */ -int f (struct P*** pppp, struct P** ppp, struct P* pp, struct P p, struct P p2, +int f (struct P*** pppp, struct P** ppp, struct P* pp, struct P p, struct P p2, int v, struct Q q, int *i, int *j, int i0, int i1, int i2, int i3, int i4, double f_0) -{ +{ i0 = 0; i1 = 1; i2 = 2; @@ -62,7 +62,7 @@ int f (struct P*** pppp, struct P** ppp, struct P* pp, struct P p, struct P p2, v = p.id[3]; v = pp->id[3]; - + v = *i; v = pp->val; v = pp->id[3]; @@ -134,7 +134,7 @@ int main() { v = p.id[3]; v = pp->id[3]; - + v = *i; v = pp->val; v = pp->id[3]; @@ -163,6 +163,9 @@ int main() { v = p.val; v = p.tq[i0][i1].v; + /** Note: Frama-C is stricter than ISO C : potential indeterminate values are + * considered as alarms even for types without trap representation. + */ c1 = c2; unsigned char c3 = c2; return v; diff --git a/tests/rte/initialized_union.c b/tests/rte/initialized_union.c index 9f7b960688c1a9ace5860925922cd5b8e7dc032c..666907264d3d2227cd1ab0c80ac51d140e3cae86 100644 --- a/tests/rte/initialized_union.c +++ b/tests/rte/initialized_union.c @@ -1,6 +1,6 @@ /* run.config - OPT: -rte -rte-initialized -warn-signed-overflow -print - OPT: -cpp-extra-args="-DEMPTY" -machdep gcc_x86_64 -rte -rte-initialized -warn-signed-overflow -print + OPT: -rte -rte-initialized="@all" -warn-signed-overflow -print + OPT: -cpp-extra-args="-DEMPTY" -machdep gcc_x86_64 -rte -rte-initialized="@all" -warn-signed-overflow -print */ union U { diff --git a/tests/rte/oracle/initialized-ignore-fct.0.res.oracle b/tests/rte/oracle/initialized-ignore-fct.0.res.oracle new file mode 100644 index 0000000000000000000000000000000000000000..2e8fc2c9c5ed4fa0f973424cb95004144bee5499 --- /dev/null +++ b/tests/rte/oracle/initialized-ignore-fct.0.res.oracle @@ -0,0 +1,19 @@ +[kernel] Parsing tests/rte/initialized-ignore-fct.i (no preprocessing) +[rte] annotating function f1 +[rte] annotating function f2 +/* Generated by Frama-C */ +int f1(void) +{ + int i = 0; + /*@ assert rte: initialization: \initialized(&i); */ + return i; +} + +int f2(void) +{ + int i = 0; + /*@ assert rte: initialization: \initialized(&i); */ + return i; +} + + diff --git a/tests/rte/oracle/initialized-ignore-fct.1.res.oracle b/tests/rte/oracle/initialized-ignore-fct.1.res.oracle new file mode 100644 index 0000000000000000000000000000000000000000..4367d54cd9afdc56c95470bd8ad584c50deb5a66 --- /dev/null +++ b/tests/rte/oracle/initialized-ignore-fct.1.res.oracle @@ -0,0 +1,18 @@ +[kernel] Parsing tests/rte/initialized-ignore-fct.i (no preprocessing) +[rte] annotating function f1 +[rte] annotating function f2 +/* Generated by Frama-C */ +int f1(void) +{ + int i = 0; + return i; +} + +int f2(void) +{ + int i = 0; + /*@ assert rte: initialization: \initialized(&i); */ + return i; +} + + diff --git a/tests/rte/oracle/initialized.res.oracle b/tests/rte/oracle/initialized.res.oracle index 9293f495cd76f9f487024c6ea026e2786dd966a9..826e38c81816d703d4685746dcc89fc59638112d 100644 --- a/tests/rte/oracle/initialized.res.oracle +++ b/tests/rte/oracle/initialized.res.oracle @@ -85,9 +85,10 @@ int f(struct P ***pppp_0, struct P **ppp_0, struct P *pp_0, struct P p_0, /*@ assert rte: index_bound: i3_0 < 5; */ /*@ assert rte: initialization: \initialized(&p_0.id[i3_0]); */ p_0.id[i1_0] = p_0.id[i3_0]; + /*@ assert rte: initialization: \initialized(&p_0.next); */ /*@ assert rte: mem_access: \valid_read(p_0.next); */ - /*@ assert rte: initialization: \initialized(p_0.next); */ struct P np = *(p_0.next); + /*@ assert rte: initialization: \initialized(&p_0.next); */ struct P *npp = p_0.next; /*@ assert rte: initialization: \initialized(&npp); */ p_0.next = npp; @@ -189,6 +190,7 @@ int f(struct P ***pppp_0, struct P **ppp_0, struct P *pp_0, struct P p_0, \initialized(&((p_0.nexts[i1_0][i2_0])->nexts[i3_0][*i_0])->id[i4_0]); */ v_0 = ((p_0.nexts[i1_0][i2_0])->nexts[i3_0][*i_0])->id[i4_0]; + /*@ assert rte: initialization: \initialized(&p_0.q.v); */ v_0 = p_0.q.v; /*@ assert rte: index_bound: 0 ≤ i4_0; */ /*@ assert rte: index_bound: i4_0 < 12; */ @@ -225,6 +227,7 @@ int f(struct P ***pppp_0, struct P **ppp_0, struct P *pp_0, struct P p_0, /*@ assert rte: mem_access: \valid_read(&pp_0->tq[i3_0][i1_0].v); */ /*@ assert rte: initialization: \initialized(&pp_0->tq[i3_0][i1_0].v); */ v_0 = pp_0->tq[i3_0][i1_0].v; + /*@ assert rte: initialization: \initialized(&p_0.znexts); */ /*@ assert rte: mem_access: \valid_read(p_0.znexts + i0_0); */ /*@ assert rte: initialization: \initialized(p_0.znexts + i0_0); */ /*@ assert rte: mem_access: \valid_read(*(p_0.znexts + i0_0) + i1_0); */ @@ -243,7 +246,6 @@ int f(struct P ***pppp_0, struct P **ppp_0, struct P *pp_0, struct P p_0, /*@ assert rte: index_bound: i0_0 < 10; */ /*@ assert rte: index_bound: 0 ≤ i1_0; */ /*@ assert rte: index_bound: i1_0 < 11; */ - /*@ assert rte: initialization: \initialized(&p_0.tq[i0_0][i1_0]); */ q_0 = p_0.tq[i0_0][i1_0]; /*@ assert rte: index_bound: 0 ≤ i0_0; */ /*@ assert rte: index_bound: i0_0 < 10; */ @@ -258,6 +260,7 @@ int f(struct P ***pppp_0, struct P **ppp_0, struct P *pp_0, struct P p_0, /*@ assert rte: mem_access: \valid_read(&pp_0->val); */ /*@ assert rte: initialization: \initialized(&pp_0->val); */ v_0 = pp_0->val; + /*@ assert rte: initialization: \initialized(&p_0.val); */ v_0 = p_0.val; /*@ assert rte: index_bound: 0 ≤ i0_0; */ /*@ assert rte: index_bound: i0_0 < 10; */ @@ -329,9 +332,10 @@ int main(void) /*@ assert rte: index_bound: i3 < 5; */ /*@ assert rte: initialization: \initialized(&p.id[i3]); */ p.id[i1] = p.id[i3]; + /*@ assert rte: initialization: \initialized(&p.next); */ /*@ assert rte: mem_access: \valid_read(p.next); */ - /*@ assert rte: initialization: \initialized(p.next); */ struct P np = *(p.next); + /*@ assert rte: initialization: \initialized(&p.next); */ struct P *npp = p.next; /*@ assert rte: initialization: \initialized(&p.id[3]); */ v = p.id[3]; @@ -422,6 +426,7 @@ int main(void) \initialized(&((p.nexts[i1][i2])->nexts[i3][*i])->id[i4]); */ v = ((p.nexts[i1][i2])->nexts[i3][*i])->id[i4]; + /*@ assert rte: initialization: \initialized(&p.q.v); */ v = p.q.v; /*@ assert rte: index_bound: 0 ≤ i4; */ /*@ assert rte: index_bound: i4 < 12; */ @@ -456,6 +461,7 @@ int main(void) /*@ assert rte: mem_access: \valid_read(&pp->tq[i3][i1].v); */ /*@ assert rte: initialization: \initialized(&pp->tq[i3][i1].v); */ v = pp->tq[i3][i1].v; + /*@ assert rte: initialization: \initialized(&p.znexts); */ /*@ assert rte: mem_access: \valid_read(p.znexts + i0); */ /*@ assert rte: initialization: \initialized(p.znexts + i0); */ /*@ assert rte: mem_access: \valid_read(*(p.znexts + i0) + i1); */ @@ -472,7 +478,6 @@ int main(void) /*@ assert rte: index_bound: i0 < 10; */ /*@ assert rte: index_bound: 0 ≤ i1; */ /*@ assert rte: index_bound: i1 < 11; */ - /*@ assert rte: initialization: \initialized(&p.tq[i0][i1]); */ q = p.tq[i0][i1]; /*@ assert rte: index_bound: 0 ≤ i0; */ /*@ assert rte: index_bound: i0 < 10; */ @@ -485,6 +490,7 @@ int main(void) /*@ assert rte: mem_access: \valid_read(&pp->val); */ /*@ assert rte: initialization: \initialized(&pp->val); */ v = pp->val; + /*@ assert rte: initialization: \initialized(&p.val); */ v = p.val; /*@ assert rte: index_bound: 0 ≤ i0; */ /*@ assert rte: index_bound: i0 < 10; */ @@ -492,7 +498,9 @@ int main(void) /*@ assert rte: index_bound: i1 < 11; */ /*@ assert rte: initialization: \initialized(&p.tq[i0][i1].v); */ v = p.tq[i0][i1].v; + /*@ assert rte: initialization: \initialized(&c2); */ c1 = c2; + /*@ assert rte: initialization: \initialized(&c2); */ unsigned char c3 = c2; return v; } diff --git a/tests/rte/oracle/initialized_union.0.res.oracle b/tests/rte/oracle/initialized_union.0.res.oracle index 550af6851cec53470d701c3d2f199ed35c5a03e1..49509af6ee58a9fe8f75d941276db39f1cc397b2 100644 --- a/tests/rte/oracle/initialized_union.0.res.oracle +++ b/tests/rte/oracle/initialized_union.0.res.oracle @@ -30,37 +30,15 @@ int main(void) struct S s1; struct S s2; u_local1.c = (char)1; - /*@ assert - rte: initialization_of_union: - \initialized(&u_local1.c) ∨ \initialized(&u_local1.i) ∨ - \initialized(&u_local1.f); - */ u_local2 = u_local1; /*@ assert rte: initialization: \initialized(&u_local1.i); */ u2_local1.i2 = u_local1.i; - /*@ assert - rte: initialization_of_union: - \initialized(&u2_local1.i1) ∨ \initialized(&u2_local1.i2); - */ u2_local2 = u2_local1; - /*@ assert - rte: initialization_of_union: - \initialized(&u_local1.c) ∨ \initialized(&u_local1.i) ∨ - \initialized(&u_local1.f); - */ u3_local1.u = u_local1; - /*@ assert - rte: initialization_of_union: - \initialized(&u3_local1.u) ∨ \initialized(&u3_local1.u2); - */ u3_local2 = u3_local1; + /*@ assert rte: initialization: \initialized(&u_global.f); */ double f = u_global.f; s1.u.c = (char)'a'; - /*@ assert - rte: initialization_of_union: - \initialized(&s1.u.c) ∨ \initialized(&s1.u.i) ∨ - \initialized(&s1.u.f); - */ s2.u = s1.u; __retres = 0; /*@ assert rte: initialization: \initialized(&__retres); */ diff --git a/tests/rte/oracle/initialized_union.1.res.oracle b/tests/rte/oracle/initialized_union.1.res.oracle index ce2e6dd9cf59727c30be247f90aff0adf9574e0d..d738022aa908c028e71c4adee346f0bedab6ec46 100644 --- a/tests/rte/oracle/initialized_union.1.res.oracle +++ b/tests/rte/oracle/initialized_union.1.res.oracle @@ -34,37 +34,15 @@ int main(void) struct S s1; struct S s2; u_local1.c = (char)1; - /*@ assert - rte: initialization_of_union: - \initialized(&u_local1.c) ∨ \initialized(&u_local1.i) ∨ - \initialized(&u_local1.f); - */ u_local2 = u_local1; /*@ assert rte: initialization: \initialized(&u_local1.i); */ u2_local1.i2 = u_local1.i; - /*@ assert - rte: initialization_of_union: - \initialized(&u2_local1.i1) ∨ \initialized(&u2_local1.i2); - */ u2_local2 = u2_local1; - /*@ assert - rte: initialization_of_union: - \initialized(&u_local1.c) ∨ \initialized(&u_local1.i) ∨ - \initialized(&u_local1.f); - */ u3_local1.u = u_local1; - /*@ assert - rte: initialization_of_union: - \initialized(&u3_local1.u) ∨ \initialized(&u3_local1.u2); - */ u3_local2 = u3_local1; + /*@ assert rte: initialization: \initialized(&u_global.f); */ double f = u_global.f; s1.u.c = (char)'a'; - /*@ assert - rte: initialization_of_union: - \initialized(&s1.u.c) ∨ \initialized(&s1.u.i) ∨ - \initialized(&s1.u.f); - */ s2.u = s1.u; union empty e1 = e; __retres = 0;