[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [csmith-dev] feature request: generate memory unsafe code
Pointer unsafe behaviors are allowed in Csmith (git commit 7e3325). I am
adding array OOB soon. The two command line options are exactly what you
requested:
--null-ptr-deref-prob <N> and
--dangling-ptr-deref-prob <N>
N is 0 by default, which means no null/dangling pointer dereferences are
allowed.
-Xuejun
> -----Original Message-----
> From: csmith-dev-bounces@flux.utah.edu
> [mailto:csmith-dev-bounces@flux.utah.edu] On Behalf Of John Regehr
> Sent: Wednesday, June 08, 2011 3:20 PM
> To: csmith-dev@flux.utah.edu
> Subject: [csmith-dev] feature request: generate memory unsafe code
>
> This is a feature request I received, and also it's something I've
> wanted myself.
>
> The new feature is for Csmith to optionally ignore its safety analyses
> sometimes, in order to generate memory unsafety. Obviously these
> features are turned off by default. Probably there are three flags:
>
> - probability of ignoring possibly-null pointer when generating a
> dereference
>
> - probability of ignoring possibly-expired pointer when generating a
> dereference
>
> - probability of letting an array index go OOB
>
> The purpose of these features is to test static and dynamic memory
> safety checking tools.
>
> John