On Symbolic Heaps Modulo Permission Theories

Abstract : We address the entailment problem for separation logic with symbolic heaps admitting list predicates and permissions for memory cells that are essential to express ownership of a heap region. In the permission-free case, the entailment problem is known to be in P. Herein, we design new decision procedures for solving the satisfiability and entailment problems that are parameterised by the permission theories. This permits the use of solvers dealing with the permission theory at hand, independently of the shape analysis. We also show that the entailment problem without list predicates is coNP-complete for several permission models, such as counting permissions and binary tree shares but the problem is in P for fractional permissions. Furthermore, when list predicates are added, we prove that the entailment problem is coNP-complete when the entail-ment problem for permission formulae is in coNP, assuming the write permission can be split into as many read permissions as desired. Finally, we show that the entailment problem for any Boolean permission model with infinite width is coNP-complete. 1 Introduction Separation logics with permissions. In program verification, proving properties of the memory is one of the most difficult tasks and separation logic has been devised for this goal [14]. Separation logic with permissions [4] can express that the ownership of a given heap region is shared with other threads. A permission can be thought of as a "quantity of ownership" associated to each cell of the heap. This quantity prescribes whether write accesses are allowed or not on this cell and how such a write access may be restored in the future. This abstract notion has lead to many permission theories and separation logics, including fractional permissions [5], token-based permissions [4], combinations of the two, binary tree shares [7], and yet some other models. Separation logic with permissions is supported by several tools like VeriFast [12], Hip/Sleek [11], or Heap-Hop [16]. Usually, these tools support only one permission model and demand that permissions are explicit values. For instance, in a tool that supports fractional permissions, to express that a cell x is shared by two threads for read access, one may write x 0.3 → y and x 0.7 → y making an arbitrary choice for permissions (0.3 and 0.7) when a better approach would use x α → y and x β → y and the constraint 1 = α + β (as it is done in the paper). This hides the logical structure of the proof and ties it to a specific arbitrary permission model. Our motivations. We wish to get rid of the use of explicit permission models and to provide a separation logic with permissions which can use symbolic permission expressions
Type de document :
Communication dans un congrès
37th IARCS Foundation on Software Technology and Theoretical Computer Science, Dec 2017, Kanpur, India. 〈10.4230/LIPIcs.FSTTCS.2017.25〉
Liste complète des métadonnées

Littérature citée [17 références]  Voir  Masquer  Télécharger

https://hal-amu.archives-ouvertes.fr/hal-01788798
Contributeur : Denis Lugiez <>
Soumis le : mercredi 9 mai 2018 - 14:08:10
Dernière modification le : mercredi 14 novembre 2018 - 01:16:48
Document(s) archivé(s) le : mardi 25 septembre 2018 - 14:51:04

Fichier

dll-final-fsttcs17.pdf
Fichiers produits par l'(les) auteur(s)

Identifiants

Citation

S Demri, E Lozes, D Lugiez. On Symbolic Heaps Modulo Permission Theories. 37th IARCS Foundation on Software Technology and Theoretical Computer Science, Dec 2017, Kanpur, India. 〈10.4230/LIPIcs.FSTTCS.2017.25〉. 〈hal-01788798〉

Partager

Métriques

Consultations de la notice

125

Téléchargements de fichiers

17