SAT SMT by Example PDF
SAT SMT by Example PDF
I would be happy to hear from anyone interested in my consulting services. The area of my expertise is programming
in general, reverse engineering, maybe technical writing...
-> [email protected]
My dear readers! From time to time, I have questions, I don’t know who (or where) to ask. Or I’m just lazy... Can
you please help me?
Is anybody here who can help with math.statistics? I have couple of questions...
How do you use MUS in SAT and unsat core in SMT? Why MUS is that important?
The book about John Nash (“Beautiful Mind”) mentioned that he wrote computer programs. Have anybody seen
them? Are the available somewhere for downloading?
A pack of texts are to be indexed. Then a search is required. A simple query-language is desirable. What lightweight
library would you recommend? Preferably Python or C++.
Can anyone point me to ready-to-run code and/or examples of Stable Roommates Problem (SRP) with/without ties,
and Stable Marriage Problem (SMP) with ties?
How do you solve set cover problem in Wolfram Mathematica? What problem(s) it can be reduced to?
Do you think I should add more puzzle examples to the “SAT/SMT by Example”? Like those from Martin Gardner’s
books? I think it’s enough already...
A delivery service company (like FedEx or UPS) uses 10 (decimal) digit tracking numbers. Numbers are often trans-
mitten by phone, scribbled on scraps of paper, etc. You can add, say, 2-3 more (decimal) digits to add some redundancy,
so the 10-digit code would be restored if one digit was transmitten incorrectly. How to do it?
1
2
____ _ _____ ______ __ __ _____ _ _____ _
/ ___| / \ |_ _| / / ___| | \/ |_ _| | |__ _ _ | ____|_ ____ _ _ __ ___ _ __ | | ___
\___ \ / _ \ | | / /\___ \ | | \ / | | | | | ’_ \ | | | | | _| \ \/ / _‘ | ’_ ‘ _ \ | ’_ \ | | / _ \
___) / ___ \ | | / / ___) | | | | | | | |_) | |_| | | |___ > < (_| | | | | | | |_) | | __/
|____/_/ \_\_/_/ |____/ |_| |_| |_| |_.__/ \__, | |_____/_/\_\__,_|_| |_| |_| .__/ |_| \___|
|___/ |_|
2
SAT/SMT by Example
November 6, 2019
2
Contents
1 Introduction 11
1.1 What this is all about? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.2 Praise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.3 As recommended reading at several universities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.4 Thanks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.5 Disclaimer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.6 Python . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.7 Latest versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.8 Proofreaders wanted! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.9 The source code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.10 Is it a hype? Yet another fad? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2 Basics 15
2.1 One-hot encoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.2 SMT1 -solvers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.2.1 School-level system of equations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.2.2 Another school-level system of equations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
2.2.3 Why variables are declared using declare-fun? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
2.2.4 Connection between SAT2 and SMT solvers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
2.2.5 List of SMT-solvers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
2.2.6 Z3 specific . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
2.3 SAT-solvers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
2.3.1 CNF form . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
2.3.2 Example: 2-bit adder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
2.3.3 Picosat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
2.3.4 MaxSAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
2.3.5 List of SAT-solvers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
2.4 Yet another explanation of NP-problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
2.4.1 Constant time, O(1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
2.4.2 Linear time, O(n) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
2.4.3 Hash tables and binary trees . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
2.4.4 EXPTIME . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
2.4.5 NP-problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
2.4.6 P=NP? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
2.4.7 What are SAT/SMT solvers? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
3 Equations 27
3.1 Solving XKCD 287 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
3.2 XKCD 287 in SMT-LIB 2.x format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
3.3 Other solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
3.4 Wood workshop, linear programming and Leonid Kantorovich . . . . . . . . . . . . . . . . . . . . . . . . . 29
3.5 Art of problem solving . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
3.6 Yet another explanation of modulo inverse using SMT-solvers . . . . . . . . . . . . . . . . . . . . . . . . . 33
1 Satisfiability modulo theories
2 Boolean satisfiability problem
3
3.7 School-level equation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
3.8 Minesweeper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
3.8.1 Cracking Minesweeper with SMT solver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
3.8.2 Cracking Minesweeper with SAT solver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
3.8.3 Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
3.8.4 Cracking Minesweeper: Donald Knuth’s version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
3.8.5 Cracking Minesweeper with SAT solver and sorting network . . . . . . . . . . . . . . . . . . . . . . 54
3.8.6 Cracking Minesweeper: by bruteforce . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
3.9 Cracking LCG3 with Z3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
3.10 Can rand() generate 10 consecutive zeroes? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
3.10.1 UNIX time and srand(time(NULL)) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
3.10.2 etc: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
3.10.3 Fun story . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
3.10.4 Further reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
3.11 Integer factorization using Z3 SMT solver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
3.12 Integer factorization using SAT solver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
3.12.1 Binary adder in SAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
3.12.2 Binary multiplier in SAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
3.12.3 Glueing all together . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
3.12.4 Division using multiplier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
3.12.5 Breaking RSA4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
3.12.6 Further reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
3.13 Recalculating micro-spreadsheet using Z3Py . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
3.13.1 Z3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
3.13.2 Unsat core . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
3.13.3 Stress test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
3.13.4 The files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
3.14 Discrete tomography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
3.15 Cribbage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
3.16 Solving Problem Euler 31: “Coin sums” . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
3.17 Exercise 15 from TAOCP “7.1.3 Bitwise tricks and techniques” . . . . . . . . . . . . . . . . . . . . . . . . 85
3.18 Generating de Bruijn sequences using Z3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
3.19 Solving the xy = 19487171 equation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
4 Proofs 91
4.1 Using Z3 theorem prover to prove equivalence of some weird alternative to XOR operation . . . . . . . . . 91
4.1.1 In SMT-LIB form . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
4.1.2 Using universal quantifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
4.1.3 How the expression works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
4.2 Proving bizarre XOR alternative using SAT solver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
4.3 Dietz’s formula . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
4.4 XOR swapping algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
4.4.1 In SMT-LIB form . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
4.5 Simplifying long and messy expressions using Mathematica and Z3 . . . . . . . . . . . . . . . . . . . . . . 99
4.6 Bit reverse function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
4.7 Proving sorting network correctness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
4.8 ITE5 example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
4.9 Branchless abs() . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
4.10 Proving branchless min/max functions are correct . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
4.11 Proving “Determine if a word has a zero byte” bit twiddling hack . . . . . . . . . . . . . . . . . . . . . . . 108
4.12 Arithmetical shift bit twiddling hack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
4.13 Proving several floor()/ceiling() properties using Z3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
3 Linear congruential generator
4 Rivest–Shamir–Adleman cryptosystem
5 If-Then-Else
4
5 Verification 113
5.1 Integer overflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
5.1.1 Signed addition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
5.1.2 Arithmetic mean . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
5.1.3 Allocate memory for some chunks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
5.1.4 abs() . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
5.1.5 Games . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
5.1.6 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
5.1.7 Further work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
5.1.8 Further reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
5
8.10.1 Variations of the problem from the same book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
8.11 Alphametics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
8.12 2015 AIME II Problems/Problem 12 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
8.13 Fred puzzle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
8.14 Multiple choice logic puzzle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
8.15 Art of problem solving . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
8.16 2012 AIME I Problems/Problem 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
8.17 Recreational math, calculator’s keypad and divisibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
8.18 Android lock screen (9 dots) has exactly 140240 possible ways to (un)lock it . . . . . . . . . . . . . . . . . 237
8.19 Crossword generator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
8.20 Almost recreational math: missing operation(s) puzzle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
8.21 Nonogram puzzle solver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
8.22 ”Feed the kids” puzzle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
14 MaxSAT/MaxSMT 311
14.1 Making smallest possible test suite using Z3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311
14.2 Fault check of digital circuit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
14.3 GCD8 and LCM9 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318
14.3.1 GCD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318
14.3.2 Least Common Multiple . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
14.4 Assignment problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
14.5 Find maximal clique using Open-WBO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
14.6 ”Polite customer” problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326
14.7 Packing students into a dorm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
8 Greatest Common Divisor
9 Least Common Multiple
6
14.8 Finding optimal beer can size using SMT solver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
14.8.1 A jar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
14.9 Choosing between short/long jumps in x86 assembler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
15 Synthesis 339
15.1 Logic circuits synthesis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
15.1.1 Simple logic synthesis using Z3 and Apollo Guidance Computer . . . . . . . . . . . . . . . . . . . . 339
15.1.2 TAOCP 7.1.1 exercises 4 and 5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349
15.2 Program synthesis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362
15.2.1 Synthesis of simple program using Z3 SMT-solver . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363
15.2.2 Rockey dongle: finding unknown algorithm using only input/output pairs . . . . . . . . . . . . . . 366
15.2.3 The files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372
15.2.4 TAOCP 7.1.3 Exercise 198, UTF-8 encoding and program synthesis by sketching . . . . . . . . . . 372
15.2.5 TAOCP 7.1.3 Exercise 203, MMIX MOR instruction and program synthesis by sketching . . . . . 374
15.2.6 Loading a constant into register using ASCII-only x86 code . . . . . . . . . . . . . . . . . . . . . . 377
15.2.7 Further reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
15.3 DFA (Deterministic Finite Automaton) synthesis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
15.3.1 DFA accepting a 001 substring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
15.3.2 DFA accepting a binary substring divisible by prime number . . . . . . . . . . . . . . . . . . . . . 382
15.4 Other . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387
15.4.1 Graph theory: degree sequence problem / graph realization problem . . . . . . . . . . . . . . . . . 387
7
18 KLEE 441
18.1 Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441
18.2 Unit test: HTML/CSS color . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441
18.3 Unit test: strcmp() function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444
18.4 UNIX date/time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446
18.5 Inverse function for base64 decoder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452
18.6 LZSS decompressor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455
18.7 strtodx() from RetroBSD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459
18.8 Unit testing: simple expression evaluator (calculator) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 464
18.9 More examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469
18.10Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469
8
25 Further reading 565
9
10
Chapter 1
Introduction
1.2 Praise
“Dennis Yurichev’s ”SAT/SMT by Example” is an impressive monograph. It provides an extensive and diverse collection
of problems that can be encoded as SAT or SMT problems, and discusses their encodings in detail. Its wealth of SMT
examples in particular has made it popular among researchers and practitioners interested in leveraging the power of SMT
solvers.” (Cesare Tinelli2 , one of CVC4’s authors).
“This is quite instructive for students. I will point my students to this!” (Armin Biere3 , one of Boolector’s authors).
“An excellent source of well-worked through and motivating examples of using Z3’s python interface.” 4 (Nikolaj
Bjorner, one of Z3’s developers).
“Impressive collection of fun examples!” (Pascal Fontaine5 , one of veriT solver’s developers.)
“This is a great book. I’ve been recommending it to the students in my SMT class, as it’s (by far) the largest
compendium of constraint satisfaction problems/solutions that I’m aware of, including tons of unique and obscure ones.
Good work, Dennis!” (Rolf Rolles6 .)
1.4 Thanks
Armin Biere has patiently answered to my endless and boring questions.
1 Conjunctive normal form
2 http://homepage.cs.uiowa.edu/~tinelli/
3 http://fmv.jku.at/biere/
4 https://github.com/Z3Prover/z3/wiki
5 https://members.loria.fr/PFontaine/
6 https://twitter.com/rolfrolles/status/1005259729919193088
11
Leonardo Mendonça de Moura7 , Nikolaj Bjørner8 and Mate Soos9 have also helped.
Masahiro Sakai10 has helped with numberlink puzzle: 8.8.
Chad Brewbaker, Evan Wallace, Ben Gardiner and Wojciech Niedbala fixed bugs and made improvements.
Alex “clayrat” Gryzlov, @mztropics on twitter and Jason Bucata found couple of bugs.
Xenia Galinskaya: for carefully planned periods of forced distraction from the work.
English grammar fixes: Priyanshu Jain.
1.5 Disclaimer
This collection is a non-academic reading for “end-users”, i.e., programmers, etc.
The author of these lines is no expert in SAT/SMT, by any means. This is not a book, rather a student’s notes. Take
it with grain of salt...
Despite the fact there are many examples for Z3 SMT-solver, the author of these lines is not affiliated with the Z3
team in any way...
1.6 Python
Majority of code in the book is written in Python.
12
SMT-LIB mailing list was created in 2002 16 .
Also, SAT/SMT are not special or unique. There are adjacent area like ASP: Answer Set Programming. CSP:
Constraint Satisfaction Problems. Also, Prolog programming language.
16 https://cs.nyu.edu/pipermail/smt-lib/2002/
13
14
Chapter 2
Basics
Decimal One-hot
0 00000001
1 00000010
2 00000100
3 00001000
4 00010000
5 00100000
6 01000000
7 10000000
Or in reversed form:
Decimal One-hot
0 10000000
1 01000000
2 00100000
3 00010000
4 00001000
5 00000100
6 00000010
7 00000001
2.2 SMT-solvers
2.2.1 School-level system of equations
This is school-level system of equations copy-pasted from Wikipedia 1 :
1 https://en.wikipedia.org/wiki/System_of_linear_equations
15
3x + 2y − z = 1
2x − 2y + 4z = −2
−x + 21 y − z = 0
x = Real('x')
y = Real('y')
z = Real('z')
s = Solver ()
s.add (3*x + 2*y - z == 1)
s.add (2*x - 2*y + 4*z == -2)
s.add(-x + 0.5*y - z == 0)
print s.check ()
print s.model ()
sat
[z = -2, y = -2, x = 1]
If we change any equation in some way so it will have no solution, s.check() will return “unsat”.
I’ve used “Real” sort (some kind of data type in SMT-solvers) because the last expression equals to 21 , which is, of
course, a real number. For the integer system of equations, “Int” sort would work fine.
Python (and other high-level PL2 s like C#) interface is highly popular, because it’s practical, but in fact, there is a
standard language for SMT-solvers called SMT-LIB 3 .
Our example rewritten to it looks like this:
This language is very close to LISP, but is somewhat hard to read for untrained eyes.
Now we run it:
16
1.0)
)
So when you look back to my Python code, you may feel that these 3 expressions could be executed. This is not
true: Z3Py API offers overloaded operators, so expressions are constructed and passed into the guts of Z3 without any
execution 4 . I would call it “embedded DSL5 ”.
Same thing for Z3 C++ API, you may find there “operator+” declarations and many more 6 .
Z3 API7 s for Java, ML and .NET are also exist 8 .
sat
[ triangle = 1, square = 2, circle = 5]
4 https://github.com/Z3Prover/z3/blob/6e852762baf568af2aad1e35019fdf41189e4e12/src/api/python/z3.py
5 Domain-specific language
6 https://github.com/Z3Prover/z3/blob/6e852762baf568af2aad1e35019fdf41189e4e12/src/api/c%2B%2B/z3%2B%2B.h
7 Application programming interface
8 https://github.com/Z3Prover/z3/tree/6e852762baf568af2aad1e35019fdf41189e4e12/src/api
17
2.2.3 Why variables are declared using declare-fun?
They mean this is nullary function, only returning a constant, nothing else.
18
22
• dReal: “An SMT Solver for Nonlinear Theories of the Reals” .
Something else:
2.2.6 Z3 specific
The output is not guaranteed to be random. You can randomize it by:
import time
...
s= Solver ()
set_param (" smt. random_seed ", int(time.time ()))
Or conversely, you may want to reproduce its result each time the same:
2.3 SAT-solvers
SMT vs. SAT is like high level PL vs. assembly language. The latter can be much more efficient, but it’s hard to program
in it.
SAT is abbreviation of “Boolean satisfiability problem”. The problem is to find such a set of variables, which, if plugged
into boolean expression, will result in “true”.
19
Figure 2.2: 2-bit adder circuit
The adder in its simplest form: it has no carry-in and carry-out, and it has 3 XOR gates and one AND gate. Let’s try
to figure out, which sets of input values will force adder to set both two output bits? By doing quick memory calculation,
we can see that there are 4 ways to do so: 0 + 3 = 3, 1 + 2 = 3, 2 + 1 = 3, 3 + 0 = 3. Here is also truth table, with these
rows highlighted:
aH aL bH bL qH qL
3+3 = 6 ≡ 2 (mod 4) 1 1 1 1 1 0
3+2 = 5 ≡ 1 (mod 4) 1 1 1 0 0 1
3+1 = 4 ≡ 0 (mod 4) 1 1 0 1 0 0
3+0 = 3 ≡ 3 (mod 4) 1 1 0 0 1 1
2+3 = 5 ≡ 1 (mod 4) 1 0 1 1 0 1
2+2 = 4 ≡ 0 (mod 4) 1 0 1 0 0 0
2+1 = 3 ≡ 3 (mod 4) 1 0 0 1 1 1
2+0 = 2 ≡ 2 (mod 4) 1 0 0 0 1 0
1+3 = 4 ≡ 0 (mod 4) 0 1 1 1 0 0
1+2 = 3 ≡ 3 (mod 4) 0 1 1 0 1 1
1+1 = 2 ≡ 2 (mod 4) 0 1 0 1 1 0
1+0 = 1 ≡ 1 (mod 4) 0 1 0 0 0 1
0+3 = 3 ≡ 3 (mod 4) 0 0 1 1 1 1
0+2 = 2 ≡ 2 (mod 4) 0 0 1 0 1 0
0+1 = 1 ≡ 1 (mod 4) 0 0 0 1 0 1
0+0 = 0 ≡ 0 (mod 4) 0 0 0 0 0 0
20
Using Wolfram Mathematica, we can express 1-bit expression for both adder outputs:
In[]:=AdderQ0[aL_,bL_]=Xor[aL,bL]
Out[]:=aL ⊻ bL
In[]:=AdderQ1[aL_,aH_,bL_,bH_]=Xor[And[aL,bL],Xor[aH,bH]]
Out[]:=aH ⊻ bH ⊻ (aL && bL)
We need such expression, where both parts will generate 1’s. Let’s use Wolfram Mathematica find all instances of
such expression (I glueled both parts with And):
In[]:=Boole[SatisfiabilityInstances[And[AdderQ0[aL,bL],AdderQ1[aL,aH,bL,bH]],{aL,aH,bL,bH},4]]
Out[]:={1,1,0,0},{1,0,0,1},{0,1,1,0},{0,0,1,1}
Yes, indeed, Mathematica says, there are 4 inputs which will lead to the result we need. So, Mathematica can also
be used as SAT solver.
Nevertheless, let’s proceed to CNF form. Using Mathematica again, let’s convert our expression to CNF form:
In[]:=cnf=BooleanConvert[And[AdderQ0[aL,bL],AdderQ1[aL,aH,bL,bH]],``CNF'']
Out[]:=(!aH ∥ !bH) && (aH ∥ bH) && (!aL ∥ !bL) && (aL ∥ bL)
Looks more complex. The reason of such verbosity is that CNF form doesn’t allow XOR operations.
MiniSat
For starters, we can try MiniSat27 . The standard way to encode CNF expression for MiniSat is to enumerate all OR parts
at each line. Also, MiniSat doesn’t support variable names, just numbers. Let’s enumerate our variables: 1 will be aH, 2
– aL, 3 – bH, 4 – bL.
Here is what I’ve got when I converted Mathematica expression to the MiniSat input file:
p cnf 4 4
-1 -3 0
1 3 0
-2 -4 0
2 4 0
Two 4’s at the first lines are number of variables and number of clauses respectively. There are 4 lines then, each for
each OR clause. Minus before variable number meaning that the variable is negated. Absence of minus – not negated.
Zero at the end is just terminating zero, meaning end of the clause.
In other words, each line is OR-clause with optional negations, and the task of MiniSat is to find such set of input,
which can satisfy all lines in the input file.
That file I named as adder.cnf and now let’s try MiniSat:
SAT
-1 -2 3 4 0
This means, if the first two variables (aH and aL) will be false, and the last two variables (bH and bL) will be set
to true, the whole CNF expression is satisfiable. Seems to be true: if bH and bL are the only inputs set to true, both
resulting bits are also has true states.
Now how to get other instances? SAT-solvers, like SMT solvers, produce only one solution (or instance).
27 http://minisat.se/MiniSat.html
21
MiniSat uses PRNG28 and its initial seed can be set explicitely. I tried different values, but result is still the same.
Nevertheless, CryptoMiniSat in this case was able to show all possible 4 instances, in chaotic order, though. So this is not
very robust way.
Perhaps, the only known way is to negate solution clause and add it to the input expression. We’ve got -1 -2 3 4,
now we can negate all values in it (just toggle minuses: 1 2 -3 -4) and add it to the end of the input file:
p cnf 4 5
-1 -3 0
1 3 0
-2 -4 0
2 4 0
1 2 -3 -4
SAT
1 2 -3 -4 0
This means, aH and aL must be both true and bH and bL must be false, to satisfy the input expression. Let’s negate
this clause and add it again:
p cnf 4 6
-1 -3 0
1 3 0
-2 -4 0
2 4 0
1 2 -3 -4
-1 -2 3 4 0
SAT
-1 2 3 -4 0
aH=false, aL=true, bH=true, bL=false. This is also correct, according to our truth table.
Let’s add it again:
p cnf 4 7
-1 -3 0
1 3 0
-2 -4 0
2 4 0
1 2 -3 -4
-1 -2 3 4 0
1 -2 -3 4 0
SAT
1 -2 -3 4 0
22
p cnf 4 8
-1 -3 0
1 3 0
-2 -4 0
2 4 0
1 2 -3 -4
-1 -2 3 4 0
1 -2 -3 4 0
-1 2 3 -4 0
Now MiniSat just says “UNSATISFIABLE” without any additional information in the resulting file.
Our example is tiny, but MiniSat can work with huge CNF expressions.
CryptoMiniSat
XOR operation is absent in CNF form, but crucial in cryptographical algorithms. Simplest possible way to represent
single XOR operation in CNF form is: (¬x ∨ ¬y) ∧ (x ∨ y) – not that small expression, though, many XOR operations in
single expression can be optimized better.
One significant difference between MiniSat and CryptoMiniSat is that the latter supports clauses with XOR oper-
ations instead of ORs, because CryptoMiniSat has aim to analyze crypto algorithms29 . XOR clauses are handled by
CryptoMiniSat in a special way without translating to OR clauses.
You need just to prepend a clause with “x” in CNF file and OR clause is then treated as XOR clause by CryptoMiniSat.
As of 2-bit adder, this smallest possible XOR-CNF expression can be used to find all inputs where both output adder bits
are set:
(aH ⊕ bH) ∧ (aL ⊕ bL)
This is .cnf file for CryptoMiniSat:
p cnf 4 2
x1 3 0
x2 4 0
Now I run CryptoMiniSat with various random values to initialize its PRNG …
23
% cryptominisat4 --verb 0 --random 7 XOR_adder .cnf
s SATISFIABLE
v 1 -2 -3 4 0
% cryptominisat4 --verb 0 --random 8 XOR_adder .cnf
s SATISFIABLE
v 1 2 -3 -4 0
% cryptominisat4 --verb 0 --random 9 XOR_adder .cnf
s SATISFIABLE
v 1 2 -3 -4 0
v -1 -2 3 4 0
v -1 2 3 -4 0
v 1 -2 -3 4 0
v 1 2 -3 -4 0
2.3.3 Picosat
At least Picosat can enumerate all possible solutions without crutches I just shown:
2.3.4 MaxSAT
MaxSAT problem is a problem where as many clauses should be satisfied, as possible, but maybe not all.
(Usual) clauses which must be satisfied, called hard clauses. Clauses which should be satisfied, called soft clauses.
MaxSAT solver tries to satisfy all hard clauses and as much soft clauses, as possible.
*.wcnf files are used, the format is almost the same as in DIMACS files, like:
...
1 -152 0
1 -153 0
1 -154 0
1 155 0
1 -156 0
1 -157 0
24
Each clause is written as in DIMACS file, but the first number if weight. MaxSAT solver tries to maximize clauses
with bigger weights first.
If the weight has top weight, the clause is hard clause and must always be satisfied. Top weight is set in header. In our
case, it’s 208.
Some well-known MaxSAT solvers are Open-WBO30 , etc.
• PicoSat, PrecoSat, Lingeling, CaDiCaL32 . All created by Armin Biere. Plingeling supports multithreading. picosat
Ubuntu package is available.
• CryptoMiniSat. Created by Mate Soos for cryptographical problems exploration. Supports XOR clauses, multi-
threading. Has Python API.
• microsat35 by Marijn Heule, smallest known CDCL solver, (238 SLOC of pure C).
• Donald Knuth has written several SAT solvers for his TAOCP book, used in section 7.2.2.2.
MaxSAT solvers:
Something else:
25
2.4.3 Hash tables and binary trees
These are used in associative arrays implementations. Using binary trees (std::map, std::set in C++ STL) is somewhat
wasteful: you need too much memory, for each tree node. Also, search speed is a binary logarithm of the size of tree:
O(log(n)) (because depth of binary tree is log2 (size_of _tree)). Good: keys are stored in sorted order, and you can
retrieve them sorted while enumeration, by depth-first search of the binary tree.
Hash tables (std::unordered_map and std::unordered_set in C++ STL), on contrary, have constant access/inser-
tion/deletion time (O(1)), and uses much less memory. This is because all key/value pairs are stored in a (big) table,
and a hashed key is an index inside the table. Hash function should be good to make keys which are close to each other
(100,101,102...) distributed uniformly across the table. However, you can’t retrieve all keys from hash table in sorted
form. It’s a good idea to use hash tables instead of binary trees, if you don’t need keys sorted.
2.4.4 EXPTIME
Time is dependent exponentially on size of input, O(2p(n) ) or just O(2n ). This is bruteforce. When you try to break some
cryptoalgorithm by bruteforcing and trying all possible inputs. For 8 bits of input, there are 28 = 256 possible values,
etc. Bruteforce can crack any cryptoalgorithm and solve almost any problem, but this is not very interesting, because it’s
extremely slow.
2.4.5 NP-problems
Finding correct inputs for CNF formula is an NP-problem, but you can also find them using simple bruteforce. In fact,
SAT-solvers also do bruteforce, but the resulting search tree is extremely big. And to make search faster, SAT-solvers prune
search tree as early as possible, but in unpredictable ways. This makes execution time of SAT-solvers also unpredictable.
In fact, this is a problem, to predict how much time it will take to find a solution for CNF formula. No SAT/SMT solvers
can say you ETA38 of their work.
NP problems has no O-notation, meaning, there is no link between size (and contents) of input and execution time.
In contrast to other problems listed here (constant, linear, logarithmical, exponential), you can predict time of work
by observing input values. You can predict, how long it will take to sort items by looking at a list of items to be sorted.
This is a problem for NP-problems: you can’t predict it.
Probably, you could devise faster algorithm to solve NP-problems, maybe working 1000 times faster, but still, it will
work unpredictably.
Also, both SAT and SMT solvers are very capricious to input data. This is a rare case, when shotgun debugging 39 is
justified!
2.4.6 P=NP?
One of the famous problem asking, if it’s possible to solve NP-problems fast.
In other words, a scientist (or anyone else) who will find a way to solve NP-problems in predictable time (but faster
than bruteforce/EXPTIME), will make a significant or revolutionary step in computer science.
In popular opinion, this will crack all cryptoalgorithms we currently use. In fact, this is not true. Some scientists,
like Donald Knuth, believe, that there may be a way to solve NP-problems in polynomial time, but still too slow to be
practical.
However, majority of scientists believe the humankind is not ready for such problems.
A list of many attempts to solve this problem: https://www.win.tue.nl/~gwoegi/P-versus-NP.htm.
26
Chapter 3
Equations
( https://www.xkcd.com/287/ )
The problem is to solve the following equation: 2.15a + 2.75b + 3.35c + 3.55d + 4.20e + 5.80f == 15.05, where a..f are
integers. So this is a linear diophantine equation.
from MK85 import *
s=MK85 ()
a=s. BitVec ("a", 16)
b=s. BitVec ("b", 16)
c=s. BitVec ("c", 16)
d=s. BitVec ("d", 16)
e=s. BitVec ("e", 16)
f=s. BitVec ("f", 16)
27
s.add(a <=10)
s.add(b <=10)
s.add(c <=10)
s.add(d <=10)
s.add(e <=10)
s.add(f <=10)
In []:= FindInstance [2.15 a + 2.75 b + 3.35 c + 3.55 d + 4.20 e + 5.80 f == 15.05 &&
a >= 0 && b >= 0 && c >= 0 && d >= 0 && e >= 0 && f >= 0,
{a, b, c, d, e, f}, Integers , 1000]
Out []= {{a -> 1, b -> 0, c -> 0, d -> 2, e -> 0, f -> 1},
{a -> 7, b -> 0, c -> 0, d -> 0, e -> 0, f -> 0}}
1000 means “find at most 1000 solutions”, but only 2 are found. See also: http://reference.wolfram.com/language/
ref/FindInstance.html.
28
( assert ( bvult a # x0010 ))
( assert ( bvult b # x0010 ))
( assert ( bvult c # x0010 ))
( assert ( bvult d # x0010 ))
( assert ( bvult e # x0010 ))
( assert ( bvult f # x0010 ))
( assert
(=
(bvadd
( bvmul (_ bv215 16) a)
( bvmul (_ bv275 16) b)
( bvmul (_ bv335 16) c)
( bvmul (_ bv355 16) d)
( bvmul (_ bv420 16) e)
( bvmul (_ bv580 16) f)
)
(_ bv1505 16)
)
)
;(check -sat)
;(get -model )
(get -all - models )
; correct answer :
;( model
; (define -fun a () (_ BitVec 16) (_ bv7 16)) ; 0x7
; (define -fun b () (_ BitVec 16) (_ bv0 16)) ; 0x0
; (define -fun c () (_ BitVec 16) (_ bv0 16)) ; 0x0
; (define -fun d () (_ BitVec 16) (_ bv0 16)) ; 0x0
; (define -fun e () (_ BitVec 16) (_ bv0 16)) ; 0x0
; (define -fun f () (_ BitVec 16) (_ bv0 16)) ; 0x0
;)
;( model
; (define -fun a () (_ BitVec 16) (_ bv1 16)) ; 0x1
; (define -fun b () (_ BitVec 16) (_ bv0 16)) ; 0x0
; (define -fun c () (_ BitVec 16) (_ bv0 16)) ; 0x0
; (define -fun d () (_ BitVec 16) (_ bv2 16)) ; 0x2
; (define -fun e () (_ BitVec 16) (_ bv0 16)) ; 0x0
; (define -fun f () (_ BitVec 16) (_ bv1 16)) ; 0x1
;)
; Model count : 2
29
Figure 3.2: A 6*13 workpiece
You want to produce 800 rectangles of 4*5 size and 400 rectangles of 2*3 size:
To cut a piece as A/B rectangles, you can cut a 6*13 workpiece in 4 ways. Or, to put it in another way, you can place
A/B rectangles on 6*13 rectanlge in 4 ways:
Now the problem. Which cuts are most efficient? You want to consume as little workpieces as possible.
This is optimization problem and I can solve it this with Z3:
from z3 import *
s= Optimize ()
s.add(cut_A >=0)
s.add(cut_B >=0)
30
s.add(cut_C >=0)
s.add(cut_D >=0)
s.add(out_A ==800)
s.add(out_B ==400)
s. minimize ( workpieces_total )
print s. check ()
print s. model ()
sat
[cut_B = 25,
cut_D = 0,
cut_A = 250 ,
out_B = 400 ,
out_A = 800 ,
workpieces_total = 275 ,
cut_C = 0]
So you want to cut 250 workpieces in A’s way and 25 pieces in B’s way, this is the most optimal way.
Also, the problem is small enough to be solved by my toy bit-blaster MK85, (thanks to the Open-WBO MaxSAT
solver):
(declare -fun workpieces_total () (_ BitVec 16))
(declare -fun cut_A () (_ BitVec 16))
(declare -fun cut_B () (_ BitVec 16))
(declare -fun cut_C () (_ BitVec 16))
(declare -fun cut_D () (_ BitVec 16))
(declare -fun out_A () (_ BitVec 16))
(declare -fun out_B () (_ BitVec 16))
31
( bvmul_no_overflow cut_D (_ bv13 16))
)
)
)
( minimize workpieces_total )
(check -sat)
(get -model)
The result:
sat
(model
(define -fun cut_A () (_ BitVec 16) (_ bv250 16)) ; 0xfa
(define -fun cut_B () (_ BitVec 16) (_ bv25 16)) ; 0x19
(define -fun cut_C () (_ BitVec 16) (_ bv0 16)) ; 0x0
(define -fun cut_D () (_ BitVec 16) (_ bv0 16)) ; 0x0
(define -fun out_A () (_ BitVec 16) (_ bv800 16)) ; 0x320
(define -fun out_B () (_ BitVec 16) (_ bv400 16)) ; 0x190
(define -fun workpieces_total () (_ BitVec 16) (_ bv275 16)) ; 0x113
)
The task I solved I’ve found in Leonid Kantorovich’s book ”The Best Uses of Economic Resources” (1959). And these
are 5 pages with the task and solution 1 (in Russian).
Leonid Kantorovich was indeed consulting plywood factory in 1939 about optimal use of materials. And this is how
linear programming (LP) and integer linear programming (ILP) has emerged.
from z3 import *
s= Solver ()
s.add(x >0)
s.add(y >0)
s.add(x+y == 4*x*y)
print s. check ()
m=s. model ()
print "the model :"
print m
print "the answer :", m. evaluate (1/x + 1/y)
1 https://github.com/DennisYurichev/SAT_SMT_by_example/tree/master/equations/kantorovich/from_book
32
Instead of pulling values from the model and then compute the final result on Python’s side, we can evaluate an
expression ( x1 + y1 ) inside the model we’ve got:
sat
the model :
[x = 1, y = 1/3]
the answer : 4
from z3 import *
s= Solver ()
print s.check ()
print "%x" % s. model ()[m]. as_long ()
sat
aaaaaaab
33
(declare -fun a () (_ BitVec 16))
(declare -fun b () (_ BitVec 16))
( assert (= a b))
; without this constraint , two results would be generated (with MSB =1 and MSB =0) ,
; but we need only one indeed , MSB of m has no effect of multiplication here
; and SMT - solver offers two solutions
( assert (= ( bvand m # x8000 ) # x0000 ))
(check -sat)
(get - model )
;(get -all - models )
sat
(model
(define -fun m () (_ BitVec 16) (_ bv10923 16)) ; 0 x2aab
(define -fun a () (_ BitVec 16) (_ bv1554 16)) ; 0x612
(define -fun b () (_ BitVec 16) (_ bv1554 16)) ; 0x612
)
However, it wouldn’t work for 10, because there are no modulo inverse of 10 modulo 232 , SMT solver would give
”unsat”.
34
KLEE: WARNING ONCE: calling external : klee_assert (0)
KLEE: ERROR: /home/klee/ klee_eq .c:18: failed external call: klee_assert
KLEE: NOTE: now ignoring this error at this location
int main ()
{
int circle , square , triangle ;
3.8 Minesweeper
3.8.1 Cracking Minesweeper with SMT solver
For those who are not very good at playing Minesweeper (like me), it’s possible to predict bombs’ placement without
touching debugger.
Here is a clicked somewhere and I see revealed empty cells and cells with known number of “neighbours”:
35
What we have here, actually? Hidden cells, empty cells (where bombs are not present), and empty cells with numbers,
which shows how many bombs are placed nearby.
The method
Unlike many other examples, where our goal is to find a solution, here we use the fact that an instance is unsolvable
(unsat).
Here is what we can do: we will try to place a bomb to all possible hidden cells and ask Z3 SMT solver, if it can
disprove the very fact that the bomb can be placed there.
Take a look at this fragment. ”?” mark is for hidden cell, ”.” is for empty cell, number is a number of neighbours.
C1 C2 C3
R1 ? ? ?
R2 ? 3 .
R3 ? 1 .
So there are 5 hidden cells. We will check each hidden cell by placing a bomb there. Let’s first pick top/left cell:
C1 C2 C3
R1 * ? ?
R2 ? 3 .
R3 ? 1 .
Then we will try to solve the following system of equations (RrCc is cell of row r and column c):
As it turns out, this system of equations is satisfiable, so there could be a bomb at this cell. But this information is
not interesting to us, since we want to find cells we can freely click on. And we will try another one. And if the equation
will be unsatisfiable, that would imply that a bomb cannot be there and we can click on it.
(This is so called “0-1 integer linear programming”, since unknown variables are limited to 0/1.)
36
The code
known =[
" 01?10001? ",
" 01?100011 ",
" 011100000 ",
" 000000000 ",
" 111110011 ",
" ????1001? ",
" ????3101? ",
" ?????211? ",
" ????????? "]
from z3 import *
import sys
s= Solver ()
cells =[[ Int('r%d_c%d' % (r,c)) for c in range ( WIDTH +2)] for r in range ( HEIGHT +2)]
# make border
for c in range ( WIDTH +2):
s.add(cells [0][c ]==0)
s.add(cells [ HEIGHT +1][c]==0)
for r in range ( HEIGHT +2):
s.add(cells [r ][0]==0)
s.add(cells [r][ WIDTH +1]==0)
# place bomb:
s.add( cells [row ][ col ]==1)
37
if s. check () == unsat :
print "row =%d col =%d, unsat !" % (row , col)
The code is almost self-explanatory. We need border for the same reason, why Conway’s ”Game of Life” implemen-
tations also has border (to make calculation function simpler). Whenever we know that the cell is free of bomb, we put
zero there. Whenever we know number of neighbours, we add a constraint, again, just like in ”Game of Life”: number of
neighbours must be equal to the number we have seen in the Minesweeper. Then we place bomb somewhere and check.
Based on map in the example, my script first tries to put a bomb at row=1 col=3 (first ”?”). And this system of
equations being generated:
r0_c0 + r0_c1 + r0_c2 + r1_c0 + r1_c2 + r2_c0 + r2_c1 + r2_c2 == 0
r0_c1 + r0_c2 + r0_c3 + r1_c1 + r1_c3 + r2_c1 + r2_c2 + r2_c3 == 1
r0_c3 + r0_c4 + r0_c5 + r1_c3 + r1_c5 + r2_c3 + r2_c4 + r2_c5 == 1
r0_c4 + r0_c5 + r0_c6 + r1_c4 + r1_c6 + r2_c4 + r2_c5 + r2_c6 == 0
r0_c5 + r0_c6 + r0_c7 + r1_c5 + r1_c7 + r2_c5 + r2_c6 + r2_c7 == 0
r0_c6 + r0_c7 + r0_c8 + r1_c6 + r1_c8 + r2_c6 + r2_c7 + r2_c8 == 0
r0_c7 + r0_c8 + r0_c9 + r1_c7 + r1_c9 + r2_c7 + r2_c8 + r2_c9 == 1
r1_c0 + r1_c1 + r1_c2 + r2_c0 + r2_c2 + r3_c0 + r3_c1 + r3_c2 == 0
r1_c1 + r1_c2 + r1_c3 + r2_c1 + r2_c3 + r3_c1 + r3_c2 + r3_c3 == 1
r1_c3 + r1_c4 + r1_c5 + r2_c3 + r2_c5 + r3_c3 + r3_c4 + r3_c5 == 1
r1_c4 + r1_c5 + r1_c6 + r2_c4 + r2_c6 + r3_c4 + r3_c5 + r3_c6 == 0
r1_c5 + r1_c6 + r1_c7 + r2_c5 + r2_c7 + r3_c5 + r3_c6 + r3_c7 == 0
r1_c6 + r1_c7 + r1_c8 + r2_c6 + r2_c8 + r3_c6 + r3_c7 + r3_c8 == 0
r1_c7 + r1_c8 + r1_c9 + r2_c7 + r2_c9 + r3_c7 + r3_c8 + r3_c9 == 1
r1_c8 + r1_c9 + r1_c10 + r2_c8 + r2_c10 + r3_c8 + r3_c9 + r3_c10 == 1
r2_c0 + r2_c1 + r2_c2 + r3_c0 + r3_c2 + r4_c0 + r4_c1 + r4_c2 == 0
r2_c1 + r2_c2 + r2_c3 + r3_c1 + r3_c3 + r4_c1 + r4_c2 + r4_c3 == 1
r2_c2 + r2_c3 + r2_c4 + r3_c2 + r3_c4 + r4_c2 + r4_c3 + r4_c4 == 1
r2_c3 + r2_c4 + r2_c5 + r3_c3 + r3_c5 + r4_c3 + r4_c4 + r4_c5 == 1
r2_c4 + r2_c5 + r2_c6 + r3_c4 + r3_c6 + r4_c4 + r4_c5 + r4_c6 == 0
r2_c5 + r2_c6 + r2_c7 + r3_c5 + r3_c7 + r4_c5 + r4_c6 + r4_c7 == 0
r2_c6 + r2_c7 + r2_c8 + r3_c6 + r3_c8 + r4_c6 + r4_c7 + r4_c8 == 0
r2_c7 + r2_c8 + r2_c9 + r3_c7 + r3_c9 + r4_c7 + r4_c8 + r4_c9 == 0
r2_c8 + r2_c9 + r2_c10 + r3_c8 + r3_c10 + r4_c8 + r4_c9 + r4_c10 == 0
r3_c0 + r3_c1 + r3_c2 + r4_c0 + r4_c2 + r5_c0 + r5_c1 + r5_c2 == 0
r3_c1 + r3_c2 + r3_c3 + r4_c1 + r4_c3 + r5_c1 + r5_c2 + r5_c3 == 0
r3_c2 + r3_c3 + r3_c4 + r4_c2 + r4_c4 + r5_c2 + r5_c3 + r5_c4 == 0
r3_c3 + r3_c4 + r3_c5 + r4_c3 + r4_c5 + r5_c3 + r5_c4 + r5_c5 == 0
r3_c4 + r3_c5 + r3_c6 + r4_c4 + r4_c6 + r5_c4 + r5_c5 + r5_c6 == 0
r3_c5 + r3_c6 + r3_c7 + r4_c5 + r4_c7 + r5_c5 + r5_c6 + r5_c7 == 0
r3_c6 + r3_c7 + r3_c8 + r4_c6 + r4_c8 + r5_c6 + r5_c7 + r5_c8 == 0
r3_c7 + r3_c8 + r3_c9 + r4_c7 + r4_c9 + r5_c7 + r5_c8 + r5_c9 == 0
r3_c8 + r3_c9 + r3_c10 + r4_c8 + r4_c10 + r5_c8 + r5_c9 + r5_c10 == 0
r4_c0 + r4_c1 + r4_c2 + r5_c0 + r5_c2 + r6_c0 + r6_c1 + r6_c2 == 1
r4_c1 + r4_c2 + r4_c3 + r5_c1 + r5_c3 + r6_c1 + r6_c2 + r6_c3 == 1
r4_c2 + r4_c3 + r4_c4 + r5_c2 + r5_c4 + r6_c2 + r6_c3 + r6_c4 == 1
r4_c3 + r4_c4 + r4_c5 + r5_c3 + r5_c5 + r6_c3 + r6_c4 + r6_c5 == 1
r4_c4 + r4_c5 + r4_c6 + r5_c4 + r5_c6 + r6_c4 + r6_c5 + r6_c6 == 1
r4_c5 + r4_c6 + r4_c7 + r5_c5 + r5_c7 + r6_c5 + r6_c6 + r6_c7 == 0
r4_c6 + r4_c7 + r4_c8 + r5_c6 + r5_c8 + r6_c6 + r6_c7 + r6_c8 == 0
r4_c7 + r4_c8 + r4_c9 + r5_c7 + r5_c9 + r6_c7 + r6_c8 + r6_c9 == 1
r4_c8 + r4_c9 + r4_c10 + r5_c8 + r5_c10 + r6_c8 + r6_c9 + r6_c10 == 1
38
r5_c4 + r5_c5 + r5_c6 + r6_c4 + r6_c6 + r7_c4 + r7_c5 + r7_c6 == 1
r5_c5 + r5_c6 + r5_c7 + r6_c5 + r6_c7 + r7_c5 + r7_c6 + r7_c7 == 0
r5_c6 + r5_c7 + r5_c8 + r6_c6 + r6_c8 + r7_c6 + r7_c7 + r7_c8 == 0
r5_c7 + r5_c8 + r5_c9 + r6_c7 + r6_c9 + r7_c7 + r7_c8 + r7_c9 == 1
r6_c4 + r6_c5 + r6_c6 + r7_c4 + r7_c6 + r8_c4 + r8_c5 + r8_c6 == 3
r6_c5 + r6_c6 + r6_c7 + r7_c5 + r7_c7 + r8_c5 + r8_c6 + r8_c7 == 1
r6_c6 + r6_c7 + r6_c8 + r7_c6 + r7_c8 + r8_c6 + r8_c7 + r8_c8 == 0
r6_c7 + r6_c8 + r6_c9 + r7_c7 + r7_c9 + r8_c7 + r8_c8 + r8_c9 == 1
r7_c5 + r7_c6 + r7_c7 + r8_c5 + r8_c7 + r9_c5 + r9_c6 + r9_c7 == 2
r7_c6 + r7_c7 + r7_c8 + r8_c6 + r8_c8 + r9_c6 + r9_c7 + r9_c8 == 1
r7_c7 + r7_c8 + r7_c9 + r8_c7 + r8_c9 + r9_c7 + r9_c8 + r9_c9 == 1
row =1 col =3, unsat !
My script tries to solve the equation with no luck (unsat). That means, no bomb can be at that cell.
Now let’s run it for all cells:
known =[
"01110001?" ,
"01?100011" ,
"011100000" ,
"000000000" ,
"111110011" ,
"?11?1001?" ,
"???331011" ,
"?????2110" ,
"???????10"]
I run it again:
39
row =7 col =1, unsat !
row =7 col =2, unsat !
row =7 col =3, unsat !
row =8 col =3, unsat !
row =9 col =5, unsat !
row =9 col =6, unsat !
I update it again:
known =[
"01110001?" ,
"01?100011" ,
"011100000" ,
"000000000" ,
"111110011" ,
"?11?1001?" ,
"222331011" ,
"??2??2110" ,
"????22?10"]
40
This is last update:
known =[
"01110001?" ,
"01?100011" ,
"011100000" ,
"000000000" ,
"111110011" ,
"?11?1001?" ,
"222331011" ,
"?22??2110" ,
"???322?10"]
…last result:
Voila!
41
More theory
In Numb3rs TV series, Dr.Charlie Eppes tried to solve ”Minesweeper game”: https://en.wikipedia.org/wiki/Uncertainty_
Principle_(Numbers), http://pi.math.cornell.edu/~numb3rs/luthy/num104.html.
What he is tried to do, is to find faster/better way to solve this game, by finding better methods to solve NP-problems
in general.
Solving Minesweeper is NP-complete: http://simon.bailey.at/random/kaye.minesweeper.pdf, http://web.mat.
bham.ac.uk/R.W.Kaye/minesw/ASE2003.pdf, http://math.oregonstate.edu/~math_reu/proceedings/REU_Proceedings/
Proceedings2003/2003MK.pdf.
Our way to solve it is also called ”Minesweeper Consistency Problem” 3 . We did it using system of integer equation.
And solving system of integer equation is NP-complete as well.
Find better way to solve Minesweeper, and you probably will be able to solve other NP-problems!
Further reading
Proofsweeper – Play Minesweeper by formally proving your moves in Idris: https://github.com/A1kmm/proofsweeper.
In []:= tbl2 =
Table[ PadLeft [ IntegerDigits [i, 2], 8] ->
If[Equal [ DigitCount [i, 2][[1]] , 2], 1, 0], {i, 0, 255}]
In []:= BooleanConvert [
BooleanFunction [tbl2 , {a, b, c, d, e, f, g, h}], "CNF "]
42
e || f || g || h) && (a || c || d || e || f || g ||
h) && (! b || ! c || ! d) && (! b || ! c || ! e) && (! b || !
c || ! f) && (! b || ! c || ! g) && (! b || ! c || ! h) && (!
b || ! d || ! e) && (! b || ! d || ! f) && (! b || ! d || !
g) && (! b || ! d || ! h) && (! b || ! e || ! f) && (! b || !
e || ! g) && (! b || ! e || ! h) && (! b || ! f || ! g) && (!
b || ! f || ! h) && (! b || ! g || ! h) && (b || c || d || e ||
f || g ||
h) && (! c || ! d || ! e) && (! c || ! d || ! f) && (! c || !
d || ! g) && (! c || ! d || ! h) && (! c || ! e || ! f) && (!
c || ! e || ! g) && (! c || ! e || ! h) && (! c || ! f || !
g) && (! c || ! f || ! h) && (! c || ! g || ! h) && (! d || !
e || ! f) && (! d || ! e || ! g) && (! d || ! e || ! h) && (!
d || ! f || ! g) && (! d || ! f || ! h) && (! d || ! g || !
h) && (! e || ! f || ! g) && (! e || ! f || ! h) && (! e || !
g || ! h) && (! f || ! g || ! h)
import subprocess
f=open("tmp.cnf", "w")
f. write ("p cnf 8 "+str(len( clauses ))+"\n")
43
for c in clauses :
f.write (c+" 0\n")
f. close ()
It replaces a/b/c/... variables to the variable names passed (1/2/3...), reworks syntax, etc. Here is a result:
p cnf 8 64
-1 -2 -3 0
-1 -2 -4 0
-1 -2 -5 0
-1 -2 -6 0
-1 -2 -7 0
-1 -2 -8 0
-1 -3 -4 0
-1 -3 -5 0
-1 -3 -6 0
-1 -3 -7 0
-1 -3 -8 0
-1 -4 -5 0
-1 -4 -6 0
-1 -4 -7 0
-1 -4 -8 0
-1 -5 -6 0
-1 -5 -7 0
-1 -5 -8 0
-1 -6 -7 0
-1 -6 -8 0
-1 -7 -8 0
1 2 3 4 5 6 7 0
1 2 3 4 5 6 8 0
1 2 3 4 5 7 8 0
1 2 3 4 6 7 8 0
1 2 3 5 6 7 8 0
1 2 4 5 6 7 8 0
1 3 4 5 6 7 8 0
-2 -3 -4 0
-2 -3 -5 0
-2 -3 -6 0
-2 -3 -7 0
-2 -3 -8 0
-2 -4 -5 0
-2 -4 -6 0
-2 -4 -7 0
-2 -4 -8 0
-2 -5 -6 0
-2 -5 -7 0
-2 -5 -8 0
-2 -6 -7 0
-2 -6 -8 0
-2 -7 -8 0
2 3 4 5 6 7 8 0
-3 -4 -5 0
-3 -4 -6 0
-3 -4 -7 0
-3 -4 -8 0
-3 -5 -6 0
-3 -5 -7 0
-3 -5 -8 0
44
-3 -6 -7 0
-3 -6 -8 0
-3 -7 -8 0
-4 -5 -6 0
-4 -5 -7 0
-4 -5 -8 0
-4 -6 -7 0
-4 -6 -8 0
-4 -7 -8 0
-5 -6 -7 0
-5 -6 -8 0
-5 -7 -8 0
-6 -7 -8 0
The variable name in results lacking minus sign is True. Variable name with minus sign is False. We see there are just
two variables are True: 1 and 8. This is indeed correct: MiniSat solver found a condition, for which our function returns
True. Zero at the end is just a terminal symbol which means nothing.
We can ask MiniSat for another solution, by adding current solution to the input CNF file, but with all variables
negated:
...
-5 -6 -8 0
-5 -7 -8 0
-6 -7 -8 0
-1 2 3 4 5 6 7 -8 0
In plain English language, this means “give me ANY solution which can satisfy all clauses, but also not equal to the
last clause we’ve just added”.
MiniSat, indeed, found another solution, again, with only 2 variables equal to True:
By the way, population count function for 8 neighbours (POPCNT8) in CNF form is simplest:
a&&b&&c&&d&&e&&f&&g&&h
!a&&!b&&!c&&!d&&!e&&!f&&!g&&!h
45
It means, it will return True, if all input variables are False.
By the way, POPCNT1 function is also simple:
(!a||!b)&&(!a||!c)&&(!a||!d)&&(!a||!e)&&(!a||!f)&&(!a||!g)&&(!a||!h)&&(a||b||c||d||e||f
||g||h)&&
(!b||!c)&&(!b||!d)&&(!b||!e)&&(!b||!f)&&(!b||!g)&&(!b||!h)&&(!c||!d)&&(!c||!e)&&(!c||!f)
&&(!c||!g)&&
(!c||!h)&&(!d||!e)&&(!d||!f)&&(!d||!g)&&(!d||!h)&&(!e||!f)&&(!e||!g)&&(!e||!h)&&(!f||!g)
&&(!f||!h)&&(!g||!h)
There is just enumeration of all possible pairs of 8 variables (a/b, a/c, a/d, etc), which implies: no two bits must be
present simultaneously in each possible pair. And there is another clause: “(a||b||c||d||e||f||g||h)”, which implies: at least
one bit must be present among 8 variables.
And yes, you can ask Mathematica for finding CNF expressions for any other truth table.
Minesweeper
Now we can use Mathematica to generate all population count functions for 0..8 neighbours.
For 9 · 9 Minesweeper matrix including invisible border, there will be 11 · 11 = 121 variables, mapped to Minesweeper
matrix like this:
1 2 3 4 5 6 7 8 9 10 11
12 13 14 15 16 17 18 19 20 21 22
23 24 25 26 27 28 29 30 31 32 33
34 35 36 37 38 39 40 41 42 43 44
...
100 101 102 103 104 105 106 107 108 109 110
111 112 113 114 115 116 117 118 119 120 121
Then we write a Python script which stacks all population count functions: each function for each known number of
neighbours (digit on Minesweeper field). Each POPCNTx() function takes list of variable numbers and outputs list of
clauses to be added to the final CNF file.
As of empty cells, we also add them as clauses, but with minus sign, which means, the variable must be False. Whenever
we try to place bomb, we add its variable as clause without minus sign, this means the variable must be True.
Then we execute external minisat process. The only thing we need from it is exit code. If an input CNF is UNSAT, it
returns 20:
We use here the information from the previous solving of Minesweeper: 3.8.1.
#!/ usr/bin/ python
import subprocess
WIDTH =9
HEIGHT =9
VARS_TOTAL =( WIDTH +2) *( HEIGHT +2)
known =[
" 01?10001? ",
" 01?100011 ",
" 011100000 ",
" 000000000 ",
" 111110011 ",
" ????1001? ",
" ????3101? ",
" ?????211? ",
46
" ????????? "]
47
||!f||!h)&&" \
"(!a||!d||!g||!h)&&(!a||!e||!f||!g)&&(!a||!e||!f||!h)&&(!a||!e||!g||!h)&&(!a||!f
||!g||!h)&&" \
"(a||b||c||d||e||f)&&(a||b||c||d||e||g)&&(a||b||c||d||e||h)&&(a||b||c||d||f||g)&&(
a||b||c||d||f||h)&&" \
"(a||b||c||d||g||h)&&(a||b||c||e||f||g)&&(a||b||c||e||f||h)&&(a||b||c||e||g||h)&&(
a||b||c||f||g||h)&&" \
"(a||b||d||e||f||g)&&(a||b||d||e||f||h)&&(a||b||d||e||g||h)&&(a||b||d||f||g||h)&&(
a||b||e||f||g||h)&&" \
"(a||c||d||e||f||g)&&(a||c||d||e||f||h)&&(a||c||d||e||g||h)&&(a||c||d||f||g||h)&&(
a||c||e||f||g||h)&&" \
"(a||d||e||f||g||h)&&(!b||!c||!d||!e)&&(!b||!c||!d||!f)&&(!b||!c||!d||!g)&&(!b||!c
||!d||!h)&&" \
"(!b||!c||!e||!f)&&(!b||!c||!e||!g)&&(!b||!c||!e||!h)&&(!b||!c||!f||!g)&&(!b||!c
||!f||!h)&&" \
"(!b||!c||!g||!h)&&(!b||!d||!e||!f)&&(!b||!d||!e||!g)&&(!b||!d||!e||!h)&&(!b||!d
||!f||!g)&&" \
"(!b||!d||!f||!h)&&(!b||!d||!g||!h)&&(!b||!e||!f||!g)&&(!b||!e||!f||!h)&&(!b||!e
||!g||!h)&&" \
"(!b||!f||!g||!h)&&(b||c||d||e||f||g)&&(b||c||d||e||f||h)&&(b||c||d||e||g||h)&&(b
||c||d||f||g||h)&&" \
"(b||c||e||f||g||h)&&(b||d||e||f||g||h)&&(!c||!d||!e||!f)&&(!c||!d||!e||!g)&&(!c
||!d||!e||!h)&&" \
"(!c||!d||!f||!g)&&(!c||!d||!f||!h)&&(!c||!d||!g||!h)&&(!c||!e||!f||!g)&&(!c||!e
||!f||!h)&&" \
"(!c||!e||!g||!h)&&(!c||!f||!g||!h)&&(c||d||e||f||g||h)&&(!d||!e||!f||!g)&&(!d||!e
||!f||!h)&&" \
"(!d||!e||!g||!h)&&(!d||!f||!g||!h)&&(!e||!f||!g||!h)"
return mathematica_to_CNF (s, a)
48
"(a||c||e||f||g)&&(a||c||e||f||h)&&(a||c||e||g||h)&&(a||c||f||g||h)&&(a||d||e||f||
g)&&(a||d||e||f||h)&&" \
"(a||d||e||g||h)&&(a||d||f||g||h)&&(a||e||f||g||h)&&(!b||!c||!d||!e||!f)&&(!b||!c
||!d||!e||!g)&&" \
"(!b||!c||!d||!e||!h)&&(!b||!c||!d||!f||!g)&&(!b||!c||!d||!f||!h)&&(!b||!c||!d||!g
||!h)&&" \
"(!b||!c||!e||!f||!g)&&(!b||!c||!e||!f||!h)&&(!b||!c||!e||!g||!h)&&(!b||!c||!f||!g
||!h)&&" \
"(!b||!d||!e||!f||!g)&&(!b||!d||!e||!f||!h)&&(!b||!d||!e||!g||!h)&&(!b||!d||!f||!g
||!h)&&" \
"(!b||!e||!f||!g||!h)&&(b||c||d||e||f)&&(b||c||d||e||g)&&(b||c||d||e||h)&&(b||c||d
||f||g)&&" \
"(b||c||d||f||h)&&(b||c||d||g||h)&&(b||c||e||f||g)&&(b||c||e||f||h)&&(b||c||e||g||
h)&&" \
"(b||c||f||g||h)&&(b||d||e||f||g)&&(b||d||e||f||h)&&(b||d||e||g||h)&&(b||d||f||g||
h)&&" \
"(b||e||f||g||h)&&(!c||!d||!e||!f||!g)&&(!c||!d||!e||!f||!h)&&(!c||!d||!e||!g||!h)
&&" \
"(!c||!d||!f||!g||!h)&&(!c||!e||!f||!g||!h)&&(c||d||e||f||g)&&(c||d||e||f||h)&&(c
||d||e||g||h)&&" \
"(c||d||f||g||h)&&(c||e||f||g||h)&&(!d||!e||!f||!g||!h)&&(d||e||f||g||h)"
return mathematica_to_CNF (s, a)
49
return mathematica_to_CNF (s, a)
50
if t in " 012345678 ":
# cell at r, c is empty ( False ):
clauses . append ("-"+ coords_to_var (r,c))
# we need an empty border so the following expression would work for all
possible cells :
neighbours =[ coords_to_var (r-1, c -1) , coords_to_var (r-1, c),
coords_to_var (r-1, c+1) , coords_to_var (r, c -1) ,
coords_to_var (r, c+1) , coords_to_var (r+1, c -1) , coords_to_var (r
+1, c), coords_to_var (r+1, c+1)]
clauses = clauses + POPCNT_functions [int(t)]( neighbours )
# place a bomb
clauses . append ( coords_to_var (row ,col))
f=open("tmp.cnf", "w")
f.write ("p cnf "+str( VARS_TOTAL )+" "+str(len( clauses ))+"\n")
for c in clauses :
f. write (c+" 0\n")
f.close ()
child = subprocess .Popen ([" minisat ", "tmp.cnf"], stdout = subprocess .PIPE)
child .wait ()
# 10 is SAT , 20 is UNSAT
if child . returncode ==20:
print "row =%d, col =%d, unsat !" % (row , col)
( https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/equations/minesweeper_SAT/minesweeper_
SAT.py )
The output CNF file can be large, up to ≈ 2000 clauses, or more, here is an example: https://github.com/DennisYurichev/
SAT_SMT_by_example/blob/master/equations/minesweeper_SAT/sample.cnf.
Anyway, it works just like my previous Z3Py script:
…but it runs way faster, even considering overhead of executing external program. Perhaps, Z3Py version could be
optimized better?
The files, including Wolfram Mathematica notebook: https://github.com/DennisYurichev/SAT_SMT_by_example/
tree/master/equations/minesweeper_SAT.
3.8.3 Optimization
A simple observation can help us: there is no need to probe hidden cells in the middle of other hidden cells. In fact, only
those hidden cells surrounding digits (known number of bombs) is to be probed: It speeds up everything a little.
...
51
def get_from_known_or_empty (known , r, c):
# I'm lazy to do overflow checks
try:
return known [r][c]
except IndexError :
return ""
( https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/equations/minesweeper/3_SMT_opt/minesweeper
Z3_with_tests.py )
52
And solution:
53
3.8.5 Cracking Minesweeper with SAT solver and sorting network
The SAT version of this program used Mathematica-generated POPCNT functions: 3.8.2.
Now what if I locked on a desert island again, with no Internet and Wolfram Mathematica?
Here is another way of solving it using SAT solver. The main problem is to count bits around a cell.
Here (4.7) I described sorting networks shortly.
They can be used for sorting boolean values. 01101 will become 00111, 10001 -> 00011, etc. We will count bits using
sorting network.
My implementation is a simplest ”bubble sort” and not the one the most optimized I described earlier. It’s created
recursively, as shown in Wikipedia5 .
5 https://en.wikipedia.org/wiki/Sorting_network
54
Now the comparator/swapper. How do we compare/swap two boolean variables, A and B?
A B out1 out2
0 0 0 0
0 1 0 1
1 0 0 1
1 1 1 1
if len(lst)==2:
return self. sorting_network_make_ladder (lst)
( https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/libs/SAT_lib.py )
Now if you will look closely on the output of sorting network, it looks like a thermometer, isn’t it? This is indeed
”unary coding”, or ”thermometer code”, where 1 is encoded as 1, 2 as 11... 4 as 1111, etc. Who need such a wasteful
code? For 9 inputs/outputs, we can afford it so far.
In other words, sorting network is a device counting input bits and giving output in unary coding.
Also, we don’t need to add 9 constraints for each variable. Only two will suffice, one False and one True, because we
are only interesting in the ”level” of a thermometer.
55
s. fix_always_false ( sorted [n])
if n!=0:
s. fix_always_true ( sorted [n -1])
import SAT_lib
WIDTH =9
HEIGHT =9
VARS_TOTAL =( WIDTH +2) *( HEIGHT +2)
known =[
" 01?10001? ",
" 01?100011 ",
" 011100000 ",
" 000000000 ",
" 111110011 ",
" ????1001? ",
" ????3101? ",
" ?????211? ",
" ????????? "]
# place a bomb
s. fix_always_true (vars[row ][ col ])
56
if s. solve () == False :
print "row =%d, col =%d, unsat !" % (row , col)
As before, this is a list of Minesweeper cells you can safely click on:
However, it performs several times slower than the version with Mathematica-generated POPCNT functions, which is
the fastest version so far...
Nevertheless, sorting networks has important place in SAT/SMT world. By fixing a ”level” of a thermometer using a
single constraint, it’s possible to add PB (pseudo-boolean) constraints, like, ”x>=10” (you need just to force a ”level” to
be always higher or equal than 10).
int main ()
{
int i;
srand (time(NULL));
6 http://en.wikipedia.org/wiki/Linear_congruential_generator#Advantages_and_disadvantages_of_LCGs, http://www.reteam.org/
papers/e59.pdf, http://stackoverflow.com/questions/8569113/why-1103515245-is-used-in-rand/8574774#8574774
57
37
29
74
95
98
40
23
58
61
17
Let’s say we are observing only 8 of these numbers (from 29 to 61) and we need to predict next one (17) and/or
previous one (37).
The program is compiled using MSVC 2013 (I choose it because its LCG is simpler than that in Glib):
s = Solver ()
58
s.add( output_prev == URem (( state1 > >16) &0 x7FFF ,100) )
s.add(URem (( state2 > >16) &0 x7FFF ,100) ==29)
s.add(URem (( state3 > >16) &0 x7FFF ,100) ==74)
s.add(URem (( state4 > >16) &0 x7FFF ,100) ==95)
s.add(URem (( state5 > >16) &0 x7FFF ,100) ==98)
s.add(URem (( state6 > >16) &0 x7FFF ,100) ==40)
s.add(URem (( state7 > >16) &0 x7FFF ,100) ==23)
s.add(URem (( state8 > >16) &0 x7FFF ,100) ==58)
s.add(URem (( state9 > >16) &0 x7FFF ,100) ==61)
s.add( output_next == URem (( state10 > >16) &0 x7FFF ,100) )
print(s.check ())
print(s.model ())
URem states for unsigned remainder. It works for some time and gave us correct result!
sat
[ state3 = 2276903645 ,
state4 = 1467740716 ,
state5 = 3163191359 ,
state7 = 4108542129 ,
state8 = 2839445680 ,
state2 = 998088354 ,
state6 = 4214551046 ,
state1 = 1791599627 ,
state9 = 548002995 ,
output_next = 17,
output_prev = 37,
state10 = 1390515370]
I added ≈ 10 states to be sure result will be correct. It may be not in case of smaller set of information.
That is the reason why LCG is not suitable for any security-related task. This is why cryptographically secure
pseudorandom number generators exist: they are designed to be protected against such simple attack. Well, at least if
NSA7 don’t get involved 8 .
Security tokens like “RSA SecurID” can be viewed just as CPRNG9 with a secret seed. It shows new pseudorandom
number each minute, and the server can predict it, because it knows the seed. Imagine if such token would implement
LCG—it would be much easier to break!
59
state9 = BitVec ('state9 ', 32)
s = Solver ()
sat
[ state3 = 1181667981 ,
state4 = 342792988 ,
state5 = 4116856175 ,
state7 = 1741999969 ,
state8 = 3185636512 ,
state2 = 1478548498 ,
state6 = 4036911734 ,
state1 = 286227003 ,
state9 = 1700675811]
... and at some point, this piece of code can generate 8 zeroes in row, if the state will be 286227003 (decimal).
Just checked this piece of code in MSVC 2015:
int main ()
{
srand (286227003) ;
60
Yes, its output is 8 zeroes!
What about other modulos?
I can get 4 consecutive zeroes modulo 100:
#!/ usr/bin/ python
from z3 import *
s = Solver ()
sat
[ state3 = 635704497 ,
state4 = 1644979376 ,
state2 = 1055176198 ,
state1 = 3865742399 ,
state5 = 1389375667]
However, 4 consecutive zeroes modulo 100 is impossible (given these constants at least), this gives “unsat”: https:
//github.com/DennisYurichev/SAT_SMT_by_example/blob/master/equations/LCG/LCG100_v1.py.
... and 3 consecutive zeroes modulo 1000:
#!/ usr/bin/ python
from z3 import *
s = Solver ()
61
print (s. check ())
print (s. model ())
sat
[ state3 = 1179663182 ,
state2 = 720934183 ,
state1 = 4090229556 ,
state4 = 786474201]
What if we could use rand()’s output without division? Which is in 0..0x7fff range (i.e., 15 bits)? As it can be checked
quickly, 2 zeroes at output is possible:
#!/ usr/bin/ python
from z3 import *
s = Solver ()
sat
[ state2 = 20057 , state1 = 3385131726 , state3 = 22456]
s = Solver ()
62
s.add( state2 == state1 *214013+2531011)
s.add( state3 == state2 *214013+2531011)
s.add( state4 == state3 *214013+2531011)
s.add( state5 == state4 *214013+2531011)
s.add( state6 == state5 *214013+2531011)
s.add( state7 == state6 *214013+2531011)
Yes:
sat
[ state3 = 2234253076 ,
state4 = 497021319 ,
state5 = 4160988718 ,
c = 3,
state2 = 333151205 ,
state6 = 46785593 ,
state1 = 1512500810 ,
state7 = 1158878744]
If srand(time(NULL)) will be executed at Tue Dec 5 21:06:50 EET 2017 (this precise second, UNIX time=1512500810),
a next 6 rand() % 10 lines will output six numbers of 3 in a row. Don’t know if it useful or not, but you’ve got the idea.
3.10.2 etc:
The files: https://github.com/DennisYurichev/SAT_SMT_by_example/tree/master/equations/LCG.
Further work: check glibc’s rand(), Mersenne Twister, etc. Simple 32-bit LCG as described can be checked using
simple brute-force, I think.
void init_all ()
{
...
srand (time(NULL));
...
};
...
63
void check_protection_thread ()
{
// get in 0..9 range
int t=( int)(( double )rand () /3276) ;
if (t== 5)
{
check protection
}
};
Perhaps, we can find the most optimal UNIX time to start the software, so the protection will not be checked as long
as possible...
import random
from z3 import *
from operator import mul
s= Solver ()
s.add(out ==n)
s.add(in1*in2 == out)
# inputs cannot be negative and must be non -1:
s.add(in1 >1)
s.add(in2 >1)
if s. check () == unsat :
print n,"is prime ( unsat )"
return [n]
if s. check () == unknown :
print n,"is probably prime ( unknown )"
return [n]
m=s. model ()
# get inputs of multiplier :
in1_n =m[in1 ]. as_long ()
in2_n =m[in2 ]. as_long ()
64
return rt
# infinite test:
def test ():
while True:
print factor ( random . randrange (1000000000) )
#test ()
... Z3 will solve the problem as a real problem . If no real solution is found , we know
there is no integer solution .
If a solution is found , Z3 will check if the solution is really assigning integer values
to integer variables .
If that is not the case , it will return unknown to indicate it failed to solve the
problem .
( https://stackoverflow.com/questions/13898175/how-does-z3-handle-non-linear-integer-arithmetic )
Probably, this is the case: we getting ”unknown” in the case when a number cannot be factored, i.e., it’s prime.
65
It’s also very slow. Wolfram Mathematica can factor number around 280 in a matter of seconds. Still, I’ve written this
for demonstration.
The problem of breaking RSA is a problem of factorization of very large numbers, up to 24096 . It’s currently not
possible to do this in practice.
In place of epigraph:
It’s somewhat mind-boggling to realize that numbers can be factored without using any number theory!
No greatest common divisors, no applications of Fermat’s theorems, etc., are anywhere in sight. We’re
providing no hints to the solver except for a bunch of Boolean formulas that operate almost blindly at the
bit level. Yet factors are found.
Of course we can’t expect this method to compete with the sophisticated factorization algorithms of
Section 4.5.4. But the problem of factoring does demonstrate the great versatility of clauses. And its
clauses can be combined with other constraints that go well beyond any of the problems we’ve studied
before.
Simple binary adder usually constists of full-adders and one half-adder. These are basic elements of adders.
66
Figure 3.6: Full-adder
X3 Y3 X2 Y2 X1 Y1 X0 Y0
| | | | | | | |
v v v v v v v v
+----+ +----+ +----+ +----+
Cout <- | FA | <- carry <- | FA | <- carry <- | FA | <- carry <- | HA |
+----+ +----+ +----+ +----+
^ ^ ^ ^
| | | |
S3 S2 S1 S0
X3 Y3 X2 Y2 X1 Y1 X0 Y0
| | | | | | | |
v v v v v v v v
+----+ +----+ +----+ +----+
Cout <- | FA | <- carry <- | FA | <- carry <- | FA | <- carry <- | FA | <- Cin
+----+ +----+ +----+ +----+
^ ^ ^ ^
| | | |
S3 S2 S1 S0
What carries are? 4-bit adder can sum up two numbers up to 0b1111 (15). 15+15=30 and this is 0b11110, i.e., 5 bits.
Lowest 4 bits is a sum. 5th most significant bit is not a part of sum, but is a carry bit.
If you sum two numbers on x86 CPU, CF flag is a carry bit connected to ALU10 . It is set if a resulting sum is bigger
than it can be fit into result.
Now you can also need carry-in. Again, x86 CPU has ADC instruction, it takes CF flag state. It can be said, CF flag
is connected to adder’s carry-in input. Hence, combining two ADD and ADC instructions you can sum up 128 bits on
64-bit CPU.
By the way, this is a good explanation of ”carry-ripple”. The very first full-adder’s result is depending on the carry-out
of the previous full-adder. Hence, adders cannot work in parallel. This is a problem of simplest possible adder, other
adders can solve this.
10 Arithmetic logic unit
67
To represent full-adders in CNF form, we can use Wolfram Mathematica. I’ve taken truth table for full-adder from
Wikipedia:
Inputs | Outputs
--------+----------
A B Cin | Cout Sum
0 0 0 | 0 0
0 0 1 | 0 1
0 1 0 | 0 1
0 1 1 | 1 0
1 0 0 | 0 1
1 0 1 | 1 0
1 1 0 | 1 0
1 1 1 | 1 1
In Mathematica, I’m setting ”->1” if row is correct and ”->0” if not correct.
...
In [60]:= BooleanConvert [
BooleanFunction [FaTbl , {a, b, cin , cout , s}], "CNF "]
68
self. add_clause ([a, cin , self.neg(cout)])
self. add_clause ([a, self.neg(cout), self.neg(s)])
self. add_clause ([ self.neg(b), self.neg(cin), cout ])
self. add_clause ([ self.neg(b), cout , s])
self. add_clause ([b, cin , self.neg(cout)])
self. add_clause ([b, self.neg(cout), self.neg(s)])
self. add_clause ([ self.neg(cin), cout , s])
self. add_clause ([cin , self.neg(cout), self.neg(s)])
return s, cout
Remember school-level long division? This multiplier works in a same way, but for binary digits.
Here is example of multiplying 0b1101 (X) by 0b0111 (Y):
LSB
|
v
1101 <- X
-------
LSB 0| 0000
1| 1101
1| 1101
1| 1101
^
|
Y
If bit from Y is zero, a row is zero. If bit from Y is non-zero, a row is equal to X, but shifted each time. Then you
just sum up all rows (which are called ”partial products”.)
This is 4-bit binary multiplier. It takes 4-bit inputs and produces 8-bit output:
69
Figure 3.7: 4-bit binary multiplier
...
# bit is 0 or 1.
# i.e., if it 's 0, output is 0 (all bits)
70
# if it 's 1, output = input
def mult_by_bit (self , X, bit):
return [self.AND(i, bit) for i in X]
AND gate is constructed here using Tseitin transformations. This is quite popular way of encoding gates in CNF form,
by adding additional variable: https://en.wikipedia.org/wiki/Tseytin_transformation. In fact, full-adder can be
constructed without Mathematica, using logic gates, and encoded by Tseitin transformation.
# size of inputs .
# in other words , how many bits we have to allocate to store 'n '?
input_bits =int(math.ceil(math.log(n ,2)))
print (" input_bits =%d" % input_bits )
if s. solve () == False :
print ("%d is prime ( unsat )" % n)
return [n]
71
# get inputs of multiplier :
factor1_n = SAT_lib . BV_to_number (s. get_BV_from_solution ( factor1 ))
factor2_n = SAT_lib . BV_to_number (s. get_BV_from_solution ( factor2 ))
# infinite test:
def test ():
while True:
print ( factor ( random . randrange (100000000000) ))
#test ()
I just connect our number to output of multiplier and ask SAT solver to find inputs. If it’s UNSAT, this is prime number.
Then we factor factors recursively.
Also, we want block input factors of 1, because obviously, we do not interesting in the fact that n*1=n. I’m using wide
OR gates for this.
Output:
72
input_bits =12
3803 is prime (unsat )
[2, 3, 3, 5, 3607 , 3803]
# size of inputs .
# in other words , how many bits we have to allocate to store 'n '?
input_bits =int(math.ceil(math.log(dividend ,2)))
print (" input_bits =%d" % input_bits )
if s. solve () == False :
print (" remainder !=0 ( unsat )")
return None
73
3.12.6 Further reading
1, 2, 3.
As it turns out, though overkill, this can be solved using MK85 with little effort:
#!/ usr/bin/ python
s=MK85 ()
cur_R =0
cur_C =0
74
e=eval(st)
# add constraint :
s.add (e)
cur_C =cur_C +1
cur_R = cur_R +1
cur_C =0
if s. check ():
m=s. model ()
for r in range ( HEIGHT ):
for c in range (WIDTH ):
sys. stdout .write (str(m[ coord_to_name (r, c)])+"\t")
sys. stdout . write ("\n")
( https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/equations/spreadsheet/spreadsheet_
MK85.py )
All we do is just creating pack of variables for each cell, named A0, B1, etc, of integer type. All of them are stored in
cells[] dictionary. Key is a string. Then we parse all the strings from cells, and add to list of constraints A0=123 (in case
of number in cell) or A0=B1+C2 (in case of expression in cell). There is a slight preparation: string like A0+B2 becomes
cells[”A0”]+cells[”B2”].
Then the string is evaluated using Python eval() method, which is highly dangerous 12 : imagine if end-user could add
a string to cell other than expression? Nevertheless, it serves our purposes well, because this is a simplest way to pass a
string with expression into MK85.
3.13.1 Z3
The source code almost the same:
#!/ usr/bin/ python
from z3 import *
import sys , re
s= Solver ()
12 http://stackoverflow.com/questions/1832940/is-using-eval-in-python-a-bad-practice
75
cur_R =0
cur_C =0
( https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/equations/spreadsheet/spreadsheet_
Z3_1.py )
Two first cells of the last row (C0 and C1) are linked to each other. Our program will just tells “unsat”, meaning,
it couldn’t satisfy all constraints together. We can’t use this as error message reported to end-user, because it’s highly
unfriendly.
However, we can fetch unsat core, i.e., list of variables which Z3 finds conflicting.
...
s= Solver ()
s.set( unsat_core =True)
...
# add constraint :
s. assert_and_track (e, coord_to_name (cur_R , cur_C ))
...
if result ==" sat ":
...
else:
print s. unsat_core ()
( https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/equations/spreadsheet/spreadsheet_
Z3_2.py )
We must explicitly turn on unsat core support and use assert_and_track() instead of add() method, because this
feature slows down the whole process, and is turned off by default. That works:
76
% python 2.py test_circular
unsat
[C0 , C1]
Perhaps, these variables could be removed from the 2D array, marked as unresolved and the whole spreadsheet could
be recalculated again.
Arrows will represent information flow. So a vertex (node) which has no incoming arrows to it (indegree=0), can be
set to a random number. Then we use topological sort to find dependencies between vertices. Then we assign spreadsheet
13 Directed acyclic graph
77
cell names to each vertex. Then we generate random expression with random operations/numbers/cells to each cell, with
the use of information from topological sorted graph.
(* Utility functions *)
In [1]:= findSublistBeforeElementByValue [lst_ , element_ ]:= lst [[ 1;; Position [lst , element
][[1]][[1]] -1]]
(* We omit division operation because micro - spreadsheet evaluator can 't handle division
by zero *)
In [5]:= interleaveListWithRandomOperationsAsStrings [lst_ ]:= Riffle [lst , Table [ RandomChoice
[{"+" ," -" ,"*"}] , Length [lst ] -1]]
In [8]:= assignNumberOrExpr [g_ , vertex_ ]:= If[ VertexInDegree [g, vertex ]==0 ,
randomNumberAsString [], randomNonNumberExpression [g, vertex ]]
(* Main part *)
(* Create random graph *)
In [21]:= WIDTH =7; HEIGHT =8; TOTAL = WIDTH * HEIGHT
Out [21]= 56
...
(* Make 2D table of it *)
In [27]:= t= Partition [ expressions , WIDTH ];
78
846 499 A3*913-H4 ... ... ... ...
B4*860+D2 999 59 ... ... ... ...
G6*379-C3-436-C4-289+H6 972 804 ... ... ... ...
F2 E0 B6-731-D3+791+B4*92+C1 ... ... ... ...
519 G1*402+D1*107*G3-458*A1 D3 ... ... ... ...
F5-531+B5-222*E4 9 B5+106*B6+600-B1 ... ... ... ...
C3-956*A5 G4*408-D3*290*B6-899*G5+400+F1 B2-701+H6 ... ... ... ..
B4-792*H4*407+F6-425-E1 D2 D3 ... ... ... ...
Using this script, I can generate random spreadsheet of 26 · 500 = 13000 cells, which seems to be processed by Z3 in
couple of seconds.
WIDTH= 11 HEIGHT = 11
angle�=(/4) *0
** 2
** 2
0
*** 3
** 2
** 2
** 2
** 2
** 2
**** 4
0
[2, 2, 0, 3, 2, 2, 2, 2, 2, 4, 0] ,
angle�=(/4) *1
0
0
* 1
** 2
* 1
** 2
** 2
**** 4
* 1
* 1
0
[0, 0, 1, 2, 1, 2, 2, 4, 1, 1, 0] ,
angle�=(/4) *2
0
0
0
79
0
* 1
** ******* 9
** ******* 9
* * 2
0
0
0
[0, 0, 0, 0, 1, 9, 9, 2, 0, 0, 0] ,
angle�=(/4) *3
0
0
* 1
** 2
** * 3
*** 3
** 2
0
** 2
* 1
0
[0, 0, 1, 2, 3, 3, 2, 0, 2, 1, 0] ,
[2, 2, 0, 3, 2, 2, 2, 2, 2, 4, 0] ,
[0, 0, 1, 2, 1, 2, 2, 4, 1, 1, 0] ,
[0, 0, 0, 0, 1, 9, 9, 2, 0, 0, 0] ,
[0, 0, 1, 2, 3, 3, 2, 0, 2, 1, 0] ,
How do we recover initial image? We are going to represent 11*11 matrix, where sum of each row must be equal to
some value we already know. Then we rotate matrix, and do this again.
For the first matrix, the system of equations looks like that (we put there a values from the first vector):
C1 ,1 + C1 ,2 + C1 ,3 + ... + C1 ,11 = 2
C2 ,1 + C2 ,2 + C2 ,3 + ... + C2 ,11 = 2
...
80
HEIGHT =len(pic)
# print WIDTH , HEIGHT
assert WIDTH == HEIGHT
ofs= WIDTH /2
vectors =[
[2, 2, 0, 3, 2, 2, 2, 2, 2, 4, 0] ,
[0, 0, 1, 2, 1, 2, 2, 4, 1, 1, 0] ,
[0, 0, 0, 0, 1, 9, 9, 2, 0, 0, 0] ,
[0, 0, 1, 2, 3, 3, 2, 0, 2, 1, 0]]
s= Solver ()
cells =[[ Int('cell_r =% d_c =%d' % (r,c)) for c in range ( WIDTH )] for r in range ( HEIGHT )]
print s. check ()
m=s. model ()
for r in range ( HEIGHT ):
for c in range ( WIDTH ):
if str(m[cells [r][c]]) =="1":
sys. stdout .write ("*")
else:
sys. stdout .write (" ")
81
print ""
***
**
**
**
**
**
****
WIDTH= 11 HEIGHT = 11
angle�=(/3) *0
** 2
** 2
0
*** 3
** 2
** 2
** 2
** 2
** 2
**** 4
0
[2, 2, 0, 3, 2, 2, 2, 2, 2, 4, 0] ,
angle�=(/3) *1
0
0
0
** 2
** 2
*** 3
**** 4
** 2
* 1
0
0
[0, 0, 0, 2, 2, 3, 4, 2, 1, 0, 0] ,
angle�=(/3) *2
0
0
0
** 2
** 2
***** 5
82
** 2
** 2
* 1
0
0
[0, 0, 0, 2, 2, 5, 2, 2, 1, 0, 0] ,
* **
**
* *
**
* *
* *
****
However, the result is correct, but only 3 vectors allows too many possible “initial images”, and Z3 SMT-solver finds
first.
Further reading: https://en.wikipedia.org/wiki/Discrete_tomography, https://en.wikipedia.org/wiki/2-satisfiabi
Discrete_tomography.
3.15 Cribbage
I’ve found this problem in the Ronald L. Graham, Donald E. Knuth, Oren Patashnik – “Concrete Mathematics” book:
My solution:
#!/ usr/bin/env python
from z3 import *
s= Solver ()
s.add(Sum(cells )==N)
83
s.add( cells [0] >0)
if s. check () == sat:
m=s. model ()
print "(%d terms ) %d + ... + %d == %d" % (terms , m[cells [0]]. as_long () , m[cells [
terms -1]]. as_long () , N)
#N=15
N =1050
The result:
In England the currency is made up of pound, £, and pence, p, and there are eight coins in general
circulation:
1p, 2p, 5p, 10p, 20p, 50p, £1 (100p) and £2 (200p). It is possible to make £2 in the following way:
1£1 + 150p + 220p + 15p + 12p + 31p How many different ways can £2 be made using any number
of coins?
from z3 import *
84
while True:
if s. check () == sat:
m = s.model ()
print m
result . append (m)
# Create a new constraint the blocks the current model
block = []
for d in m:
# create a constant from declaration
c=d()
block . append (c != m[d])
s.add(Or(block ))
else:
print len( result )
break
[h = 0, g = 0, f = 0, e = 0, d = 0, c = 0, b = 0, a = 200]
[f = 1, b = 5, a = 0, d = 1, g = 1, h = 0, c = 2, e = 1]
[f = 0, b = 1, a = 153 , d = 0, g = 0, h = 0, c = 1, e = 2]
...
[f = 0, b = 31, a = 33, d = 2, g = 0, h = 0, c = 17, e = 0]
[f = 0, b = 30, a = 35, d = 2, g = 0, h = 0, c = 17, e = 0]
[f = 0, b = 5, a = 50, d = 2, g = 0, h = 0, c = 24, e = 0]
Soltuion:
from z3 import *
s= Solver ()
85
results . append (m)
block = []
for d in m:
c=d()
block . append (c != m[d])
s.add(Or(block ))
else:
print " results total =", len( results )
break
...
[b = 7, a = 0]
[b = 6, a = 8]
[b = 7, a = 8]
[b = 6, a = 12]
[b = 7, a = 12]
[b = 12, a = 0]
[b = 13, a = 0]
[b = 12, a = 8]
[b = 13, a = 8]
[b = 12, a = 4]
[b = 13, a = 4]
[b = 12, a = 12]
[b = 13, a = 12]
[b = 14, a = 0]
[b = 15, a = 0]
[b = 14, a = 4]
[b = 15, a = 4]
[b = 14, a = 8]
[b = 15, a = 8]
[b = 14, a = 12]
[b = 15, a = 12]
results total= 128
int v [64]=
{ -1,31, 8,30, -1, 7,-1,-1, 29,-1,26, 6, -1,-1, 2,-1,
-1,28,-1,-1, -1,19,25,-1, 5,-1,17,-1, 23 ,14 , 1,-1,
9,-1,-1,-1, 27,-1, 3,-1, -1,-1,20,-1, 18 ,24 ,15 ,10 ,
-1,-1, 4,-1, 21 , -1 ,16 ,11 , -1,22,-1,12, 13,-1, 0,-1 };
86
x |= x >> 2;
x |= x >> 4;
x |= x >> 8;
x |= x >> 16;
x *= 0 x4badf0d ;
return v[x >> 26];
}
(This is usually done using simpler algorithm, but it will contain conditional jumps, which is bad for CPUs starting
at RISC. There are no conditional jumps in this algorithm.)
The magic number used here is called de Bruijn sequence, and I once used bruteforce to find it (one of the results was
0x4badf0d, which is used here). But what if we need magic number for 64-bit values? Bruteforce is not an option here.
If you already read about these sequences in my blog or in other sources, you can see that the 32-bit magic number is
a number consisting of 5-bit overlapping chunks, and all chunks must be unique, i.e., must not be repeating.
For 64-bit magic number, these are 6-bit overlapping chunks.
To find the magic number, one can find a Hamiltonian path of a de Bruijn graph. But I’ve found that Z3 is also can
do this, though, overkill, but this is more illustrative.
#!/ usr/bin/ python
from z3 import *
tmp =[]
for i in range (64):
tmp. append ((out >>i)&0 x3F)
s= Solver ()
print s. check ()
We just enumerate all overlapping 6-bit chunks and tell Z3 that they must be unique (see Distinct). Output:
sat
0 x79c52dd0991abf60
100000
110000
011000
101100
110110
111011
111101
111110
111111
011111
87
101111
010111
101011
010101
101010
110101
011010
001101
000110
100011
010001
001000
100100
110010
011001
001100
100110
010011
001001
000100
000010
100001
010000
101000
110100
111010
011101
101110
110111
011011
101101
010110
001011
100101
010010
101001
010100
001010
000101
100010
110001
111000
011100
001110
100111
110011
111001
111100
011110
001111
000111
000011
000001
000000
Overlapping chunks are clearly visible. So the magic number is 0x79c52dd0991abf60. Let’s check:
# include <stdint .h>
88
# include <stdio .h>
# include <assert .h>
int main ()
{
// construct magic table
// may be omitted in production code
for (int i=0; i <64; i++)
magic_tbl [( MAGIC /(1 ULL <<i)) & 0x3F ]=i;
// test
for (int i=0; i <64; i++)
{
printf (" input =0x%llx , result =%d\n", 1ULL <<i, bitpos (1ULL <<i));
assert ( bitpos (1ULL <<i)==i);
};
assert ( tzcnt (0 xFFFF0000 ) ==16) ;
assert ( tzcnt (0 xFFFF0010 )==4);
};
That works!
89
( assert (= out
(ite (= y #x2) ( bvmul_no_overflow x x)
(ite (= y #x3) ( bvmul_no_overflow x x x)
(ite (= y #x4) ( bvmul_no_overflow x x x x)
(ite (= y #x5) ( bvmul_no_overflow x x x x x)
(ite (= y #x6) ( bvmul_no_overflow x x x x x x)
(ite (= y #x7) ( bvmul_no_overflow x x x x x x x)
(_ bv0 32)))))))))
(check -sat)
(get - model )
It is important to note that MK85 has no idea about Newton’s method of finding square/cubic/etc roots...
90
Chapter 4
Proofs
SAT/SMT solvers can’t prove correctness of something, or if the model behaves as the author wanted.
However, it can prove equivalence of two expressions or models.
And it’s hard to say, why/where we can use it, maybe for obfuscation, I’m not sure. I would call this suboptimization
(as opposed to superoptimization). Or maybe superdeoptimization.
But my another question was also, is it possible to prove that this is correct formula at all? The Aha! checking some
intput/output values against XOR operation, but of course, not all the possible values. It is 32-bit code, so it may take
very long time to try all possible 32-bit inputs to test it.
We can try Z3 theorem prover for the job. It’s called prover, after all.
So I wrote this:
91
s.add(x^y== output )
s.add (((y & x)*0 xFFFFFFFE ) + (y + x)!= output )
print s.check ()
In plain English language, this means “are there any case for x and y where x⊕y doesn’t equals to ((y&x)∗−2)+(y+x)?”
…and Z3 prints “unsat”, meaning, it can’t find any counterexample to the equation. So this Aha! result is proved to be
working just like XOR operation.
Oh, I also tried to extend the formula to 64 bit:
Nope, now it says “sat”, meaning, Z3 found at least one counterexample. Oops, it’s because I forgot to extend -2
number to 64-bit value:
Now it says “unsat”, so the formula given by Aha! works for 64-bit code as well.
92
(not
(=
(bvsub
( bvadd x y)
( bvshl ( bvand x y) (_ bv1 64)))
(bvxor x y)
)
)
)
(check -sat)
It returns “unsat”, meaning, Z3 couldn’t find any counterexample of the equation, i.e., it’s not exist.
Z3 also supports universal quantifier forall, which is true if the equation is true for all possible values. So we can
rewrite our SMT-LIB example as:
It returns “sat”, meaning, the equation is correct for all possible 64-bit x and y values, like them all were checked.
Mathematically speaking: ∀n ∈ N (x ⊕ y = (x + y − ((x&y) << 1))) 3
3∀ means equation must be true for all possible values, which are choosen from natural numbers (N).
93
4.1.3 How the expression works
First of all, binary addition can be viewed as binary XORing with carrying (2.3.2). Here is an example: let’s add 2 (10b)
and 2 (10b). XORing these two values resulting 0, but there is a carry generated during addition of two second bits. That
carry bit is propagated further and settles at the place of the 3rd bit: 100b. 4 (100b) is hence a final result of addition.
If the carry bits are not generated during addition, the addition operation is merely XORing. For example, let’s add
1 (1b) and 2 (10b). 1 + 2 equals to 3, but 1 ⊕ 2 is also 3.
If the addition is XORing plus carry generation and application, we should eliminate effect of carrying somehow here.
The first part of the expression (x + y) is addition, the second ((x&y) << 1) is just calculation of every carry bit which
was used during addition. If to subtract carry bits from the result of addition, the only XOR effect is left then.
It’s hard to say how Z3 proves this: maybe it just simplifies the equation down to single XOR using simple boolean
algebra rewriting rules?
x −−− +−−−+
|AND| −−− +−−−+
y −−− +−−−+ |MUL| −−− +−−−+
−2 +−−−+ |ADD| −−− +−−−+
x − +−−−+ |ADD| −−> out1 −−− +−−−−−−−+
y − +−−−+ | | +−−−−+
| XOR | −−−> | OR | −−−> must be 0
x −−− +−−−+ | | +−−−−+
|XOR| −−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−> out2 −−− +−−−−−−−+
y −−− +−−−+
So it has two parts: generic XOR block and a block which must be equivalent to XOR. Then we compare its outputs
using XOR and OR. If outputs of these parts are always equal to each other for all possible x and y, output of the whole
block must be 0.
I do otherwise, I’m trying to find such an input pair, for which output will be 1:
if s. solve () == False :
print (" unsat ")
return
94
print (" product =%x" % SAT_lib . BV_to_number (s. get_BV_from_solution ( product )))
print (" result1 =%x" % SAT_lib . BV_to_number (s. get_BV_from_solution ( result1 )))
print (" result2 =%x" % SAT_lib . BV_to_number (s. get_BV_from_solution ( result2 )))
print (" minus_2 =%x" % SAT_lib . BV_to_number (s. get_BV_from_solution ( minus_2 )))
a joint made between two pieces of wood or other material at an angle of 90°, such that
the line of junction bisects this angle .
It’s also slow, because multiplier block is used: so we use small 8-bit x’s and y’s.
But the whole thing can be rewritten: x ⊕ y = x + y − (x&y) << 1. And subtraction is addition, but with one negated
operand. So, x ⊕ y = (−(x&y)) << 1 + (x + y) or x ⊕ y = (x&y) ∗ 2 − (x + y).
NEG is negation block, in two’s complement system. It just inverts all bits and adds 1:
95
if s. solve () == False :
print (" unsat ")
return
One important thing is that we can’t operate on 64-bit values on right side, because result will overflow. So we will
zero extend inputs on right side by 1 bit (in other words, we will just 1 zero bit before each value). The result of Dietz’s
formula will also be extended by 1 bit. Hence, both sides of the equation will have a width of 65 bits:
96
( bvand x y)
( bvlshr ( bvxor x y) (_ bv1 64))
)
)
( bvlshr
( bvadd ((_ zero_extend 1) x) ((_ zero_extend 1) y))
(_ bv1 65)
)
)
)
)
(check -sat)
Z3 says “sat”.
65 bits are enough, because the result of addition of two biggest 64-bit values has width of 65 bits:
0xFF...FF + 0xFF...FF = 0x1FF...FE.
As in previous example about XOR equivalent, (not (= ... )) and exists can also be used here instead of forall.
Z3 gave ”unsat”, meaning, it can’t find any counterexample to the last equation (line 18). Hence, the equation is
correct and so is the whole algorithm.
97
; prove that XOR swap algorithm is correct .
; https :// en. wikipedia .org/wiki/ XOR_swap_algorithm
; initial : X1 , Y1
;X2 := X1 XOR Y1
;Y3 := Y1 XOR X2
;X4 := X2 XOR Y3
; prove X1=Y3 and Y1=X4 for all
; needless to say that other SMT solvers may use simplification to prove this , MK85 can '
t do it ,
; it " proves " on SAT level , by absence of counterexample to the expressions .
(check -sat)
; initial : X1 , Y1
;X2 := X1 ADD Y1
;Y3 := X2 SUB Y1
;X4 := X2 SUB Y3
; prove X1=Y3 and Y1=X4 for all
; needless to say that other SMT solvers may use simplification to prove this , MK85 can '
t do it ,
; it " proves " on SAT level , by absence of counterexample to the expressions .
98
(declare -fun x4 () (_ BitVec 32))
(check -sat)
Both Mathematica and Z3 (using “simplify” command) can’t make it shorter, but I’ve got that gut feeling there is
something redundant.
Let’s take a look at the right part of the expression. If x must be less than 6 OR greater than 7, then it can hold any
value except 6 AND 7, right? So I can rewrite this manually:
y gets reduced.
But am I really right? And why Mathematica and Z3 didn’t simplify this at first place?
I can use Z3 to prove that these expressions are equal to each other:
from z3 import *
x=Int('x')
y=Int('y')
s= Solver ()
6 https://github.com/DennisYurichev/RE-for-beginners/blob/cd85356051937e87f90967cc272248084808223b/other/hexrays_EN.tex#
L412, https://beginners.re/
99
s.add(exp1 != exp2)
print s.check ()
print s.model ()
Z3 can’t find counterexample, so it says “unsat”, meaning, these expressions are equivalent to each other. So I’ve
rewritten this expression in my code, tests has been passed, etc.
Yes, using both Mathematica and Z3 is overkill, and this is basic boolean algebra, but after ~10 hours of sitting at
a front of computer you can make really dumb mistakes, and additional proof that your piece of code is correct is never
unwanted.
( https://github.com/torvalds/linux/blob/master/include/linux/bitrev.h )
While you can check all possible 32-bit values in brute-force manner, this is infeasible for 64-bit function(s).
As before, I’m not proving here the function is ”correct” in some sense, but I’m proving equivalence of two functions:
bitrev64() and bitrev64_unoptimized(), which uses bitrev32(), which in turn uses bitrev16(), etc...
#!/ usr/bin/ python
from z3 import *
# from Henry Warren 's " Hacker 's Delight ", Chapter 7
# Or: https :// github .com/ torvalds /linux /blob/ master / include / linux / bitrev .h
# default right shift in Z3 is arithmetical , so I'm using Z3 's LShR () function here ,
which is logical shift right
# these " unoptimized " versions are constructed like a Russian doll ...
100
def bitrev32_unoptimized (x):
return ( bitrev16_unoptimized (x & 0 xffff ) << 16) | ( bitrev16_unoptimized (LShR(x, 16))
)
# copypasted from CADO -NFS 2.3.0 , http :// cado -nfs. gforge . inria .fr/ download .html
def bitrev64 (a):
a = LShR(a, 32) ^ (a << 32)
m = 0 x0000ffff0000ffff
a = (LShR(a, 16) & m) ^ ((a << 16) & ∼m)
m = 0 x00ff00ff00ff00ff
a = (LShR(a, 8) & m) ^ ((a << 8) & ∼m)
m = 0 x0f0f0f0f0f0f0f0f
a = (LShR(a, 4) & m) ^ ((a << 4) & ∼m)
m = 0 x3333333333333333
a = (LShR(a, 2) & m) ^ ((a << 2) & ∼m)
m = 0 x5555555555555555
a = (LShR(a, 1) & m) ^ ((a << 1) & ∼m)
return a
s= Solver ()
# tests .
# uncomment any.
# must be "unsat " in each case.
The problem is easy enough to be solved using my toy MK85 bitblaster, with only tiny modifications:
#!/ usr/bin/ python
# MK85 uses logical shift right for Python operator >>, so here is it as is ...
101
def bitrev32 (x):
x = (x >> 16) | (x << 16)
x = ((x & 0 xFF00FF00 ) >> 8) | ((x & 0 x00FF00FF ) << 8)
x = ((x & 0 xF0F0F0F0 ) >> 4) | ((x & 0 x0F0F0F0F ) << 4)
x = ((x & 0 xCCCCCCCC ) >> 2) | ((x & 0 x33333333 ) << 2)
x = ((x & 0 xAAAAAAAA ) >> 1) | ((x & 0 x55555555 ) << 1)
return x
# tests .
# check this:
#s.add( bitrev64_unoptimized (x)!= bitrev64 (x))
# or this:
s.add( bitrev64 (x)==y)
s.add( bitrev64 (y)!=x)
# must be False :
print s. check ()
Sorting networks are highly popular in electronics, GPGPU and even in SAT encodings: https://en.wikipedia.org/
wiki/Sorting_network.
Especially bitonic sorters, which are also sorting networks: https://en.wikipedia.org/wiki/Bitonic_sorter.
Its popularity is probably related to the fact they can be parallelized easily.
They are relatively easy to construct, but, finding a smallest possible is a challenge.
There is a smallest network (only 25 comparators) for 9-channel sorting network:
102
Figure 4.1: Smallest possible
This is combinational circuit, each connection is a comparator+swapper, it swaps if one of input values is bigger and
passes output to the next level.
I copypasted it from the article: Michael Codish, Lu ́ıs Cruz-Filipe, Michael Frank, and Peter Schneider-Kamp –
“Twenty-Five Comparators is Optimal when Sorting Nine Inputs (and Twenty-Nine for Ten)”.
Another article about it: Ian Parberry – A Computer Assisted Optimal Depth Lower Bound for Nine-Input Sorting
Networks.
I don’t know (yet) how they proved it, but it’s interesting, that it’s extremely easy to prove its correctness using Z3
SMT solver. We just construct network out of comparators/swappers and asking Z3 to find counterexample, for which the
output of the network will not be sorted. And it can’t, meaning, output’s state is always sorted, no matter what values
are plugged into inputs.
from z3 import *
a, b, c, d, e, f, g, h, i=Ints('a b c d e f g h i')
l=[i, h, g, f, e, d, c, b, a]
l=line(l, " ++++++++ ")
l=line(l, " + + + + ")
l=line(l, " + + ")
l=line(l, " + + ")
l=line(l, "+ + ")
l=line(l, " + + + +")
103
l=line(l, " + +")
l=line(l, " + + ")
l=line(l, " + + ")
l=line(l, " + +++ ")
l=line(l, "+ + ")
l=line(l, "+ + + + ")
l=line(l, "+ + ")
l=line(l, " + + ")
l=line(l, " ++++++ ++")
s= Solver ()
...
...
104
If(If(If(a < c, a, c) > If(b < d, b, d),
If(a < c, a, c),
If(b < d, b, d)) >
If(If(a > c, a, c) < If(b > d, b, d),
If(a > c, a, c),
If(b > d, b, d)),
If(If(a < c, a, c) > If(b < d, b, d),
If(a < c, a, c),
If(b < d, b, d)),
If(If(a > c, a, c) < If(b > d, b, d),
If(a > c, a, c),
If(b > d, b, d)))
The first and the last are shorter than the 2nd and the 3rd, they are just min(min(min(a, b), c), d) and max(max(max(a, b), c), d).
Another example in this book related to sorting networks: cracking minesweeper with it (3.8.5).
Problem 2.3 ( modeling : program equivalence ). Show that the two if -then -else expressions
below are equivalent :
!(a || b) ? h : !(a == b) ? f : g
You can assume that the variables have only one bit.
( assert (=( ite (not (or a b)) h (ite (not (= a b)) f g)) out1))
( assert (=( ite (not (or (not a) (not b))) g (ite (and (not a) (not b)) h f)) out2))
; find counterexample :
( assert ( distinct out1 out2))
105
4.9 Branchless abs()
Prove that branchless abs() function from the Henry Warren 2ed, ”2-4 Absolute Value Function” is correct:
; tested with Z3 and MK85
; must be unsat :
(check -sat)
; unsigned version
(set - logic QF_BV )
(set -info :smt -lib - version 2.0)
106
; y ^ ((x ^ y) & -(x < y)); // min(x, y)
( assert (= min2
( bvxor
y
(bvand
( bvxor x y)
( bvneg (ite (bvult x y) # x00000001 # x00000000 ))
)
)
))
; find any set of variables for which min1 != min2 or max1 != max2
( assert (or
(not (= min1 min2))
(not (= max1 max2))
))
; signed version
(set - logic QF_BV )
(set -info :smt -lib - version 2.0)
107
( bvxor x y)
( bvneg (ite (bvslt x y) # x00000001 # x00000000 ))
)
)
))
; find any set of variables for which min1 != min2 or max1 != max2
( assert (or
(not (= min1 min2))
(not (= max1 max2))
))
4.11 Proving “Determine if a word has a zero byte” bit twiddling hack
... which is:
( https://graphics.stanford.edu/~seander/bithacks.html#ZeroInWord )
The expression returns zero if there are no zero bytes in 32-bit word, or non-zero, if at least one is present. Here we
prove that it’s correct for all possible 32-bit words.
; checked with Z3 and MK85
( assert (= HasZeroByte
(or
(= ( bvand v # xff000000 ) # x00000000 )
(= ( bvand v # x00ff0000 ) # x00000000 )
(= ( bvand v # x0000ff00 ) # x00000000 )
(= ( bvand v # x000000ff ) # x00000000 )
)
108
)
)
; out ==0
( assert (= out # x00000000 ))
; must be unsat :
(check -sat)
Find numbers x and y such that floor (x + y) != floor (x) + floor (y) and ceiling (x + y) !=
ceiling (x) + ceiling (y).
109
I can emulate real numbers using fixed point arithmetic over bitvectors. In a 16-bit variable, high 8-bit part will be
integer part and low 8-bit part is fractional part. This is also called Q8.87 .
floor() function is simple — just zero fractional part (low 8 bits). ceiling() function — if something is present in
fractional part (low 8 bits), increment high 8 bits.
from z3 import *
# Find numbers x and y such that floor (x + y) != floor (x) + floor (y) and
# ceiling (x + y) != ceiling (x) + ceiling (y).
s= Solver ()
print s. check ()
m=s. model ()
print "x=0x%04x or %f" % (m[x]. as_long () , float (m[x]. as_long ())/0 x100)
print "y=0x%04x or %f" % (m[y]. as_long () , float (m[y]. as_long ())/0 x100)
In []:= y = 63.125;
from z3 import *
110
# a. ceiling ((x - 1) /2) = floor (x/2)
# b. ceiling ((x - 1) /3) = floor (x/3)
s= Solver ()
print s. check ()
m=s. model ()
print "x=0x%04x or %f" % (m[x]. as_long () , float (m[x]. as_long ())/0 x100)
from z3 import *
"""
Prove each of the following statements about inequalities with the floor and ceiling ,
where x is a real number and n is an integer .
a. floor (x) < n iff x < n.
b. n < ceiling (x) iff n < x.
c. n <= floor (x) iff n <= x.
d. floor (x) <= n iff x <= n.
"""
s= Solver ()
111
n = BitVec ('n', 16)
from z3 import *
"""
Prove each statement , where n is an integer .
a. ceiling (n/2) = floor ((n + 1) /2)
b. floor (n/2) = ceiling ((n - 1) /2)
"""
s= Solver ()
112
Chapter 5
Verification
...
};
Seems innocent? However, if a (remote) attacker can put negative value into num, no exception is to be throwed, and
malloc() will crash on too big input value, because malloc() takes unsigned size_t on input. Unsigned int should be used
instead of int for ”num”, but many programmers use int as a generic type for everything.
+−−−−−−−−−−−−+
a −−−+−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−> | |
| | 32− b i t ALU | −− [ s i g n extend to 64− b i t ] −−> | \
b −− | −+−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−> | | | \
| | +−−−−−−−−−−−−+ | \
| | | cmp | −> t r u e
| | +−−−−−−−−−−−−+ | /
+− | −− [ s i g n extend to 64 b i t s ] −−> | | | /
| | 64− b i t ALU | −−−−−−−−−−−−−−−−−−−−−−−−−−−−−> | /
+−−− [ s i g n extend to 64 b i t s ] −−> | |
+−−−−−−−−−−−−+
In other words, you want your expression to be evaluated on both ALUs correctly, for all possible inputs, right? Like
if the result of 32-bit ALU is always fit into 32-bit register.
And now we can ask Z3 SMT solver to find such an a/b inputs, for which the final comparison will fail.
Needless to say, the default operations (+, -, comparisons, etc) in Z3’s Python API are signed, you can see this here.
Also, we can find lower bound, or minimal possible inputs, using minimize():
113
from z3 import *
def func(a,b):
return a+b
s= Optimize ()
s. minimize (a32)
s. minimize (b32)
# from https :// stackoverflow .com/ questions /1375897/ how -to -get -the -signed -integer -value -
of -a-long -in - python
def toSigned32 (n):
n = n & 0 xffffffff
return n | (-(n & 0 x80000000 ))
print "a32 =0x%x or %d" % (m[a32 ]. as_long () , toSigned32 (m[a32 ]. as_long ()))
print "b32 =0x%x or %d" % (m[b32 ]. as_long () , toSigned32 (m[b32 ]. as_long ()))
print " out32 =0x%x or %d" % (m[ out32 ]. as_long () , toSigned32 (m[ out32 ]. as_long ()))
print " out32_extended =0x%x or %d" % (m[ out32_extended ]. as_long () , toSigned64 (m[
out32_extended ]. as_long ()))
print "a64 =0x%x or %d" % (m[a64 ]. as_long () , toSigned64 (m[a64 ]. as_long ()))
print "b64 =0x%x or %d" % (m[b64 ]. as_long () , toSigned64 (m[b64 ]. as_long ()))
print " out64 =0x%x or %d" % (m[ out64 ]. as_long () , toSigned64 (m[ out64 ]. as_long ()))
a32 =0x1 or 1
b32 =0 x7fffffff or 2147483647
out32 =0 x80000000 or -2147483648
out32_extended =0 xffffffff80000000 or -2147483648
a64 =0x1 or 1
b64 =0 x7fffffff or 2147483647
out64 =0 x80000000 or 2147483648
114
Right, 1+0x7fffffff = 0x80000000. But 0x80000000 is negative already, because MSB1 is 1. However, add this on 64-bit
ALU and the result will fit in 64-bit register.
How would we fix this problem? We can devise a special function with ”wrapped” addition:
/* Returns : a + b */
COMPILER_RT_ABI si_int
__addvsi3 ( si_int a, si_int b)
{
si_int s = ( su_int ) a + ( su_int ) b;
if (b >= 0)
{
if (s < a)
compilerrt_abort ();
}
else
{
if (s >= a)
compilerrt_abort ();
}
return s;
}
( https://github.com/llvm-mirror/compiler-rt/blob/master/lib/builtins/addvsi3.c )
Now I can simulate this function in Z3Py. I’m telling it: ”find a solution, where this expression will be false”:
And it gives unsat, meaning, there is no counterexample, so the expression can be evaluated safely on both ALUs.
But is there a bug in my statement? Let’s check. Find inputs for which this piece of LLVM code will call compilerrt_abort():
a32 =0x1 or 1
b32 =0 x7fffffff or 2147483647
out32 =0 x80000000 or -2147483648
out32_extended =0 xffffffff80000000 or -2147483648
a64 =0x1 or 1
b64 =0 x7fffffff or 2147483647
out64 =0 x80000000 or 2147483648
def func(a,b):
return (a+b)/2
1 Most Significant Bit
115
a32 =0x1 or 1
b32 =0 x7fffffff or 2147483647
out32 =0 xc0000000 or -1073741824
out32_extended =0 xffffffffc0000000 or -1073741824
a64 =0x1 or 1
b64 =0 x7fffffff or 2147483647
out64 =0 x40000000 or 1073741824
We can fix this function using a seemingly esoteric Dietz formula, used to do the same, but without integer overflow:
def func(a,b):
return ((a^b) >>1) + (a&b)
def func(a):
return a *1024
#s= Solver ()
s= Optimize ()
s.add(out32 == func(a32))
s.add(out64 == func(a64))
s. minimize (a32)
# from https :// stackoverflow .com/ questions /1375897/ how -to -get -the -signed -integer -value -
of -a-long -in - python
def toSigned32 (n):
n = n & 0 xffffffff
return n | (-(n & 0 x80000000 ))
116
print "a32 =0x%x or %d" % (m[a32 ]. as_long () , toSigned32 (m[a32 ]. as_long ()))
print " out32 =0x%x or %d" % (m[ out32 ]. as_long () , toSigned32 (m[ out32 ]. as_long ()))
print " out32_extended =0x%x or %d" % (m[ out32_extended ]. as_long () , toSigned64 (m[
out32_extended ]. as_long ()))
print "a64 =0x%x or %d" % (m[a64 ]. as_long () , toSigned64 (m[a64 ]. as_long ()))
print " out64 =0x%x or %d" % (m[ out64 ]. as_long () , toSigned64 (m[ out64 ]. as_long ()))
For which ”a” values will fail the expression a*1024? This is a smallest ”a” input:
s.add(a32 <100)
Still, an attacker can pass a negative a=-2147483648, and malloc() will fail.
Let’s pretend, we added a ”assert (a>0)” before calling malloc():
s.add(a32 >0)
5.1.4 abs()
Also seemingly innocent function:
def func(a):
return If(a<0, -a, a)
This is an artifact of two’s complement system. This is INT_MIN, and -INT_MIN == INT_MIN. It can lead to
nasty bugs, and classic one is a naive implementations of itoa() or printf().
Suppose, you print a signed value. And you write something like:
117
if (input <0)
{
input =- input ;
printf ("-"); // print leading minus
};
If INT_MIN (0x80000000) is passed, minus sign is printed, but the ”input” variable still contain negative value. An
additional check for INT_MIN is to be added to fix this.
This is also called ”undefined behaviour” in C. The problem is that C language itself is old enough to be a witness
of ”old iron” – computers which could represent signed numbers in other ways than two’s complement representation:
ttps://en.wikipedia.org/wiki/Signed_number_representations.
For this reason, C standard doesn’t guarantee that -1 will be 0xffffffff (all bits set) on 32-bit registers, because the
standard can’t guarantee you will run on a hardware with two’s complement representation of signed numbers.
However, almost all hardware you can currently use and buy uses two’s complement.
More about the abs() problem:
This can become a security issue . I have seen one instance in the vasprintf
implementation of libiberty ,
which is part of gcc , binutils and some other GNU software . vasprintf walks over the
format string and
tries to estimate how much space it will need to hold the formatted result string . In
format strings ,
there is a construct %.*s or %*s, which means that the actual value should be taken from
the stack .
The libiberty code did it like this:
if (*p == '*')
{
++p;
total_width += abs ( va_arg (ap , int));
}
This is actually two issues in one. The first issue is that total_width can overflow .
The second issue
is the one that is interesting in this context : abs can return a negative number ,
causing the code
to allocate not enough space and thus cause a buffer overflow .
( http://www.fefe.de/intof.html )
5.1.5 Games
A lot of video games are prone to integer overflow. Which are exploited actively by gamers. As of NetHack: https:
//nethackwiki.com/wiki/Integer_overflow, https://nethackwiki.com/wiki/Negative_gold.
5.1.6 Summary
What we did here, is we checked, if a result of an expression can fit in 32-bit register. Probably, you can use a narrower
second ”ALU”, than a 64-bit one.
118
5.1.8 Further reading
Understanding Integer Overflow in C/C++.
Modular Bug-finding for Integer Overflows in the Large: Sound, Efficient, Bit-precise Static Analysis.
C32SAT.
119
120
Chapter 6
Regular expressions
6.1 KLEE
I’ve always wanted to generate possible strings for given regular expression. This is not so hard if to dive into regular
expression matcher theory and details, but can we force RE matcher to do this?
I took lightest RE engine I’ve found: https://github.com/cesanta/slre, and wrote this:
int main(void)
{
char s[6];
klee_make_symbolic (s, sizeof s, "s");
s [5]=0;
if ( slre_match ("^\\ d[a-c]+(x|y|z)", s, 5, NULL , 0, 0) ==5)
klee_assert (0);
}
So I wanted a string consisting of digit, “a” or “b” or “c” (at least one character) and “x” or “y” or “z” (one character).
The whole string must have size of 5 characters.
This is indeed correct string. “\xff” is at the place where terminal zero byte should be, but RE engine we use ignores
the last zero byte, because it has buffer lenght as a passed parameter. Hence, KLEE doesn’t reconstruct final byte.
Can we get more? Now we add additional constraint:
int main(void)
{
121
char s[6];
klee_make_symbolic (s, sizeof s, "s");
s [5]=0;
if ( slre_match ("^\\ d[a-c]+(x|y|z)", s, 5, NULL , 0, 0) ==5 &&
strcmp (s, "5 aaax ") !=0)
klee_assert (0);
}
Let’s say, out of whim, we don’t like “a” at the 2nd position (starting at 0th):
int main(void)
{
char s[6];
klee_make_symbolic (s, sizeof s, "s");
s [5]=0;
if ( slre_match ("^\\ d[a-c]+(x|y|z)", s, 5, NULL , 0, 0) ==5 &&
strcmp (s, "5 aaax ") !=0 &&
s[2]!= 'a ')
klee_assert (0);
}
int main(void)
{
char s[6];
klee_make_symbolic (s, sizeof s, "s");
s [5]=0;
if ( slre_match ("^\\ d[a-c]+(x|y|z)", s, 5, NULL , 0, 0) ==5 &&
strcmp (s, "5 aaax ") !=0 &&
s[2]!= 'a' &&
s[2]!= 'b' &&
s[2]!= 'c ')
klee_assert (0);
}
It cannot indeed, and KLEE finished without reporting about klee_assert() triggering.
122
6.2 Enumerating all possible inputs for a specific regular expression
Regular expression if first converted to FSM1 before matching. Hence, many RE2 libraries has two functions: “compile”
and “execute” (when you match many strings against single RE, no need to recompile it to FSM each time).
And I’ve found this website, which can visualize FSM for a regular expression. http://hokein.github.io/Automata.
js/. This is fun!
This FSM (DFA3 ) is for the expression (dark|light)?(red|blue|green)(ish)?
Figure 6.1
123
Accepting states are in double circles, these are the states where matching process stops.
How can we generate an input string which regular expression would match? In other words, which inputs FSM would
accept? This task is surprisingly simple for SMT-solver.
We just define a transition function. For each pair (state, input) it defines new state.
FSM has been visualized by the website mentioned above, and I used this information to write “transition()” function.
Then we chain transition functions... then we try a chain for all lengths in range of 2..14.
BIT_WIDTH =16
INVALID_STATE =999
ACCEPTING_STATES =[13 , 19, 23, 24]
# st - state
# i - input character
def transition (s, st , i):
# this is like switch ()
return s.If(And(st ==0 , i== ord('r')), s. BitVecConst (3, BIT_WIDTH ),
s.If(And(st ==0 , i== ord('b')), s. BitVecConst (4, BIT_WIDTH ),
s.If(And(st ==0 , i== ord('g')), s. BitVecConst (5, BIT_WIDTH ),
s.If(And(st ==0 , i== ord('d')), s. BitVecConst (1, BIT_WIDTH ),
s.If(And(st ==0 , i== ord('l')), s. BitVecConst (2, BIT_WIDTH ),
s.If(And(st ==1 , i== ord('a')), s. BitVecConst (6, BIT_WIDTH ),
s.If(And(st ==2 , i== ord('i')), s. BitVecConst (7, BIT_WIDTH ),
s.If(And(st ==3 , i== ord('e')), s. BitVecConst (8, BIT_WIDTH ),
s.If(And(st ==4 , i== ord('l')), s. BitVecConst (9, BIT_WIDTH ),
s.If(And(st ==5 , i== ord('r')), s. BitVecConst (10 , BIT_WIDTH ),
s.If(And(st ==6 , i== ord('r')), s. BitVecConst (11 , BIT_WIDTH ),
s.If(And(st ==7 , i== ord('g')), s. BitVecConst (12 , BIT_WIDTH ),
s.If(And(st ==8 , i== ord('d')), s. BitVecConst (13 , BIT_WIDTH ),
s.If(And(st ==9 , i== ord('u')), s. BitVecConst (14 , BIT_WIDTH ),
s.If(And(st ==10 , i== ord('e')), s. BitVecConst (15 , BIT_WIDTH ),
s.If(And(st ==11 , i== ord('k')), s. BitVecConst (16 , BIT_WIDTH ),
s.If(And(st ==12 , i== ord('h')), s. BitVecConst (17 , BIT_WIDTH ),
s.If(And(st ==13 , i== ord('i')), s. BitVecConst (18 , BIT_WIDTH ),
s.If(And(st ==14 , i== ord('e')), s. BitVecConst (19 , BIT_WIDTH ),
s.If(And(st ==15 , i== ord('e')), s. BitVecConst (20 , BIT_WIDTH ),
s.If(And(st ==16 , i== ord('r')), s. BitVecConst (3, BIT_WIDTH ),
s.If(And(st ==16 , i== ord('b')), s. BitVecConst (4, BIT_WIDTH ),
s.If(And(st ==16 , i== ord('g')), s. BitVecConst (5, BIT_WIDTH ),
s.If(And(st ==17 , i== ord('t')), s. BitVecConst (21 , BIT_WIDTH ),
s.If(And(st ==18 , i== ord('s')), s. BitVecConst (22 , BIT_WIDTH ),
s.If(And(st ==19 , i== ord('i')), s. BitVecConst (18 , BIT_WIDTH ),
s.If(And(st ==20 , i== ord('n')), s. BitVecConst (23 , BIT_WIDTH ),
s.If(And(st ==21 , i== ord('r')), s. BitVecConst (3, BIT_WIDTH ),
s.If(And(st ==21 , i== ord('b')), s. BitVecConst (4, BIT_WIDTH ),
s.If(And(st ==21 , i== ord('g')), s. BitVecConst (5, BIT_WIDTH ),
s.If(And(st ==22 , i== ord('h')), s. BitVecConst (24 , BIT_WIDTH ),
s.If(And(st ==23 , i== ord('i')), s. BitVecConst (18 , BIT_WIDTH ),
s. BitVecConst ( INVALID_STATE , 16)))))))))))))))))))))))))))))))))
124
tmp=tmp+chr(m[" inputs_ %d" % i])
print tmp
# initial state :
s.add( states [0]==0)
# enumerate results :
results =[]
while s. check ():
m=s. model ()
# print m
print_model (m, length , inputs )
# add the current solution negated :
tmp =[]
for pair in m:
tmp. append (s. var_by_name (pair) == m[pair ])
s.add(expr.Not(And (* tmp)))
Results:
red
blue
green
redish
darkred
blueish
darkblue
greenish
lightred
lightblue
darkgreen
lightgreen
darkredish
darkblueish
lightredish
darkgreenish
125
lightblueish
lightgreenish
As simple as this.
The source code for Z3Py: https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/regexp/SMT/
re_Z3.py.
It can be said, what we did is enumeration of all paths between two vertices of a digraph (representing FSM).
Also, the “transition()” function itself can act as a RE matcher, with no relevance to SMT solver(s). Just feed
input characters to it and track state. Whenever you hit one of accepting states, return “match”, whenever you hit
INVALID_STATE, return “no match”.
6.2.1 But...
A simpler solution exist: just find all walks in the FA graph between initial and accepting state.
126
Chapter 7
Gray code
Suppose, you are making a rotary encoder. This is a device that can signal its angle in some form, like:
127
Figure 7.1: Rotary encoder
128
Figure 7.2: Cropped and photoshopped version
( Source: http://homepages.dordt.edu/~ddeboer//S10/304/c_at_d/304S10_RC_TRK.HTM )
Click on bigger one.
There are pins and tracks on rotating wheel. How would you do this? Easiest way is to use binary code. But it has
a problem: when a wheel is rotating, in a moment of transition from one state to another, several bits may be changed,
hence, undesirable state may be present for a short period of time. This is bad. To deal with it, Gray code was invented:
only 1 bit is changed during rotation. Like:
129
15 1111 1000
Now the second problem. Look at the picture again. It has a lot of bit changes on the outer circles. And this is
electromechanical device. Surely, you may want to make tracks as long as possible, to reduce wearing of both tracks and
pins. This is a first problem. The second: wearing should be even across all tracks (this is balanced Gray code).
This is also called: ”They are listed in Gray code or minimum change order, where each subset differs in exactly
one element from its neighbors.” ( Sriram V. Pemmaraju and Steven Skiena – Computational Discrete Mathematics:
Combinatorics and Graph Theory in Mathematica )
How we can find a table for all states using Z3:
#!/ usr/bin/env python3
from z3 import *
BITS =5
# how many times a run of bits for each bit can be changed (max).
# it can be 4 for 4-bit Gray code or 8 for 5-bit code.
# 12 for 6-bit code ( maybe even less)
CHANGES_MAX =8
s= Solver ()
130
s.add(Or(t))
code =[[ Bool('code_ %d_%d' % (r,c)) for c in range (BITS)] for r in range (ROWS)]
ch =[[ Bool('ch_%d_%d' % (r,c)) for c in range (BITS)] for r in range (ROWS)]
# each rows must be different from a previous one and a next one by 1 bit:
for i in range (ROWS):
# get bits of the current row:
lst1 =[ code[i][ bit] for bit in range (BITS)]
# get bits of the next row.
# important : if the current row is the last one , (last +1)&MASK ==0 , so we overlap
here:
lst2 =[ code [(i+1)&MASK ][ bit] for bit in range (BITS)]
hamming1 (lst1 , lst2)
# 1 in ch [] table means that run of 1's has been changed to run of 0's, or back.
# "run" change detected using simple XOR:
for i in range (ROWS):
for bit in range (BITS):
# row overlapping works here as well:
s.add(ch[i][ bit ]== Xor(code[i][ bit],code [(i+1)&MASK ][ bit ]))
131
print (t)
stat ={}
132
8 changes for 5 bits: https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/gray_code/SMT/
5.txt. 12 for 6 bits (or maybe even less): https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/
gray_code/SMT/6.txt.
>In Duke Nukem , you often come upon panels that have four buttons in a row ,
>all in their "off" position . Each time you "push" a button , it toggles from
>one state to the other . The object is to find the unique combination that
>unlocks something in the game.
>My question is: What is the most efficient order in which to push the
>buttons so that every combination is tested with no wasted effort ?
(Oh , you wanted to know what one would be? How about :
0000
133
0001
0011
0010
0110
0111
0101
0100
1100
1101
1111
1110
1010
1000
1001
1011
( https://groups.google.com/forum/#!topic/rec.puzzles/Dh2H-pGJcbI )
Obviously, using our solution, you can minimize all movements in this ancient videogame, for 4 switches, that would
be 4*4=16 switches. With our solution (balanced Gray code), wearing would be even across all 4 switches.
BITS =5
# how many times a run of bits for each bit can be changed (max).
# it can be 4 for 4-bit Gray code or 8 for 5-bit code.
# 12 for 6-bit code ( maybe even less)
134
code =[s. alloc_BV (BITS) for r in range (ROWS)]
ch =[s. alloc_BV (BITS) for r in range (ROWS)]
# each rows must be different from a previous one and a next one by 1 bit:
for i in range (ROWS):
# get bits of the current row:
lst1 =[ code[i][ bit] for bit in range (BITS)]
# get bits of the next row.
# important : if the current row is the last one , (last +1)&MASK ==0 , so we overlap
here:
lst2 =[ code [(i+1)&MASK ][ bit] for bit in range (BITS)]
s. hamming1 (lst1 , lst2)
# 1 in ch [] table means that run of 1's has been changed to run of 0's, or back.
# "run" change detected using simple XOR:
for i in range (ROWS):
for bit in range (BITS):
# row overlapping works here as well.
# we add here "soft" constraint with weight =1:
s. fix_soft (s.EQ(ch[i][ bit], s.XOR(code[i][ bit],code [(i+1)&MASK ][ bit ])),
False , weight =1)
if s. solve () == False :
print (" unsat ")
exit (0)
# get statistics :
stat ={}
135
print ("stat (bit number : number of changes ): ")
print (stat)
do_all ()
*
**
* **
** **
** *
* *
* **
* *
** *
stat (bit number : number of changes ):
{0: 6, 1: 4, 2: 6, 3: 6, 4: 10}
136
Chapter 8
8.1 Sudoku
Sudoku puzzle is a 9*9 grid with some cells filled with values, some are empty:
5 3
8 2
7 1 5
4 5 3
1 7 6
3 2 8
6 5 9
4 3
9 7
Unsolved Sudoku
Numbers of each row must be unique, i.e., it must contain all 9 numbers in range of 1..9 without repetition. Same
story for each column and also for each 3*3 square.
This puzzle is good candidate to try SMT solver on, because it’s essentially an unsolved system of equations.
137
The effect is just the same, but the final value is in base 2 instead of 10.
Now a working example:
import sys
from z3 import *
"""
coordinates :
------------------------------
00 01 02 | 03 04 05 | 06 07 08
10 11 12 | 13 14 15 | 16 17 18
20 21 22 | 23 24 25 | 26 27 28
------------------------------
30 31 32 | 33 34 35 | 36 37 38
40 41 42 | 43 44 45 | 46 47 48
50 51 52 | 53 54 55 | 56 57 58
------------------------------
60 61 62 | 63 64 65 | 66 67 68
70 71 72 | 73 74 75 | 76 77 78
80 81 82 | 83 84 85 | 86 87 88
------------------------------
"""
s= Solver ()
138
(one << cells [r ][6]) +
(one << cells [r ][7]) +
(one << cells [r ][8]) )== mask)
print s. check ()
# print s. model ()
m=s. model ()
( https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/puzzles/sudoku/1/sudoku_plus_Z3.py
)
139
Even more, we can replace summing operation to logical OR:
import sys
from z3 import *
"""
coordinates :
------------------------------
00 01 02 | 03 04 05 | 06 07 08
10 11 12 | 13 14 15 | 16 17 18
20 21 22 | 23 24 25 | 26 27 28
------------------------------
30 31 32 | 33 34 35 | 36 37 38
40 41 42 | 43 44 45 | 46 47 48
50 51 52 | 53 54 55 | 56 57 58
------------------------------
60 61 62 | 63 64 65 | 66 67 68
70 71 72 | 73 74 75 | 76 77 78
80 81 82 | 83 84 85 | 86 87 88
------------------------------
"""
s= Solver ()
140
(one << cells [r ][4]) |
(one << cells [r ][5]) |
(one << cells [r ][6]) |
(one << cells [r ][7]) |
(one << cells [r ][8]) )== mask)
print s. check ()
# print s. model ()
m=s. model ()
( https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/puzzles/sudoku/1/sudoku_or_Z3.py )
Now it works much faster. Z3 handles OR operation over bit vectors better than addition?
141
sys 0m0 .036s
import sys
from z3 import *
"""
------------------------------
00 01 02 | 03 04 05 | 06 07 08
10 11 12 | 13 14 15 | 16 17 18
20 21 22 | 23 24 25 | 26 27 28
------------------------------
30 31 32 | 33 34 35 | 36 37 38
40 41 42 | 43 44 45 | 46 47 48
50 51 52 | 53 54 55 | 56 57 58
------------------------------
60 61 62 | 63 64 65 | 66 67 68
70 71 72 | 73 74 75 | 76 77 78
80 81 82 | 83 84 85 | 86 87 88
------------------------------
"""
s= Solver ()
1 http://www.mirror.co.uk/news/weird-news/worlds-hardest-sudoku-can-you-242294
142
# this is important , because otherwise , Z3 will report correct solutions with too big
and/or negative numbers in cells
for r in range (9):
for c in range (9):
s.add( cells [r][c] >=1)
s.add( cells [r][c] <=9)
print s. check ()
# print s. model ()
m=s. model ()
( https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/puzzles/sudoku/1/sudoku2_Z3.py )
143
1 4 5 3 2 7 6 9 8
8 3 9 6 5 4 1 2 7
6 7 2 9 1 8 5 4 3
4 9 6 1 8 5 3 7 2
2 1 8 4 7 3 9 5 6
7 5 3 2 9 6 4 8 1
3 6 7 5 4 2 8 1 9
9 8 4 7 6 1 2 3 5
5 2 1 8 3 9 7 6 4
Conclusion
SMT-solvers are so helpful, is that our Sudoku solver has nothing else, we have just defined relationships between variables
(cells).
Homework
As it seems, true Sudoku puzzle is the one which has only one solution. The piece of code I’ve included here shows only
the first one. Using the method described earlier (3.16, also called “model counting”), try to find more solutions, or prove
that the solution you have just found is the only one possible.
Further reading
http://www.norvig.com/sudoku.html
It’s also possible to represend Sudoku puzzle as a huge CNF equation and use SAT-solver to find solution, but it’s just
trickier.
Some articles about it: Building a Sudoku Solver with SAT 2 , Tjark Weber, A SAT-based Sudoku Solver 3 , Ines Lynce,
Joel Ouaknine, Sudoku as a SAT Problem4 , Gihwon Kwon, Himanshu Jain, Optimized CNF Encoding for Sudoku Puzzles5 .
SMT-solver can also use SAT-solver in its core, so it does all mundane translating work. As a “compiler”, it may not
do this in the most efficient way, though.
2 https://dspace.mit.edu/bitstream/handle/1721.1/106923/6-005-fall-2011/contents/assignments/MIT6_005F11_ps4.pdf
3 https://www.lri.fr/~conchon/mpri/weber.pdf
4 http://sat.inesc-id.pt/~ines/publications/aimath06.pdf
5 http://www.cs.cmu.edu/~hjain/papers/sudoku-as-SAT.pdf
144
Figure 8.1
It can be solved easily with Z3. I’ve took the same piece of code I used for the usual Sudoku: ().
... and added this:
...
"""
Subsquares :
------------------------------
| |
1,1 | 1,2 | 1,3
| |
------------------------------
| |
2,1 | 2,2 | 2,3
| |
------------------------------
| |
3,1 | 3,2 | 3,3
| |
145
------------------------------
"""
# from http :// www. killersudokuonline .com/ puzzles /2017/ puzzle - GD4hzi164344 .pdf
# subsquare 1,1:
s.add( cells [0][0] > cells [0][1])
s.add( cells [1][0] > cells [1][1])
s.add( cells [2][0] < cells [2][1])
# subsquare 1,2:
s.add( cells [0][4] > cells [1][4])
s.add( cells [1][3] > cells [2][3])
s.add( cells [1][4] > cells [2][4])
s.add( cells [1][5] > cells [2][5])
# subsquare 1,3:
s.add( cells [0][6] > cells [0][7])
s.add( cells [0][7] < cells [0][8])
s.add( cells [0][6] < cells [1][6])
s.add( cells [1][7] < cells [1][8])
s.add( cells [1][6] > cells [2][6])
s.add( cells [1][7] > cells [2][7])
s.add( cells [1][8] > cells [2][8])
# subsquare 2,1:
s.add( cells [3][0] < cells [4][0])
s.add( cells [4][0] < cells [5][0])
s.add( cells [4][1] < cells [4][2])
s.add( cells [4][0] < cells [5][0])
s.add( cells [4][1] > cells [5][1])
s.add( cells [4][2] < cells [5][2])
# subsquare 2,2:
s.add( cells [3][4] > cells [4][4])
s.add( cells [3][4] < cells [3][5])
s.add( cells [4][3] < cells [4][4])
s.add( cells [4][3] < cells [5][3])
# subsquare 2,3:
s.add( cells [3][6] > cells [3][7])
s.add( cells [3][7] > cells [3][8])
s.add( cells [3][6] > cells [4][6])
s.add( cells [4][6] < cells [4][7])
s.add( cells [4][7] < cells [4][8])
s.add( cells [5][7] < cells [5][8])
# subsquare 3,1:
s.add( cells [6][0] > cells [6][1])
s.add( cells [6][1] < cells [6][2])
s.add( cells [6][1] > cells [7][1])
s.add( cells [7][0] < cells [7][1])
s.add( cells [7][0] > cells [8][0])
s.add( cells [7][2] > cells [8][2])
146
# subsquare 3,2:
s.add( cells [6][3] > cells [6][4])
s.add( cells [6][4] > cells [6][5])
s.add( cells [7][3] > cells [7][4])
s.add( cells [7][4] < cells [7][5])
s.add( cells [8][3] > cells [8][4])
s.add( cells [8][4] < cells [8][5])
s.add( cells [7][4] > cells [8][4])
# subsquare 3,3:
s.add( cells [6][7] > cells [6][8])
s.add( cells [6][7] > cells [7][7])
s.add( cells [7][7] > cells [8][7])
s.add( cells [8][7] > cells [8][8])
...
The puzzle marked as “Outrageous” (for humans?), however it took ≈ 30 seconds on my old Intel Xeon E3-1220
3.10GHz to solve it:
7 3 4 6 9 2 5 1 8
2 1 5 8 3 7 9 4 6
6 8 9 5 1 4 7 2 3
1 7 3 2 8 9 6 5 4
5 4 6 1 7 3 2 8 9
9 2 8 4 5 6 1 3 7
8 6 7 3 2 1 4 9 5
4 5 2 9 6 8 3 7 1
3 9 1 7 4 5 8 6 2
147
Figure 8.2
There are “cages”, each cage must have distinct digits, and its sum must be equal to the number written there in a
manner of crossword. See also: https://en.wikipedia.org/wiki/Killer_sudoku.
This is also piece of cake for Z3. I’ve took the same piece of code I used for usual Sudoku ( https://github.com/
DennisYurichev/SAT_SMT_by_example/blob/master/puzzles/sudoku/1/sudoku2_Z3.py ).
...
cage =[ cells [0][7] , cells [0][8] , cells [1][7] , cells [1][8] , cells [2][7] , cells [2][8] ,
cells [3][7]]
148
s.add( Distinct (* cage))
s.add(Sum (* cage) ==34)
cage =[ cells [2][6] , cells [3][5] , cells [3][6] , cells [4][5] , cells [4][6]]
s.add( Distinct (* cage))
s.add(Sum (* cage) ==28)
cage =[ cells [4][2] , cells [4][3] , cells [5][2] , cells [5][3] , cells [6][2]]
s.add( Distinct (* cage))
s.add(Sum (* cage) ==25)
cage =[ cells [5][1] , cells [6][0] , cells [6][1] , cells [7][0] , cells [7][1] , cells [8][0] ,
cells [8][1]]
s.add( Distinct (* cage))
s.add(Sum (* cage) ==40)
149
s.add( Distinct (* cage))
s.add(Sum (* cage) ==22)
...
5 3 4 7 1 2 8 9 6
8 2 1 4 6 9 7 5 3
9 6 7 8 3 5 4 2 1
2 4 6 1 9 7 3 8 5
7 1 9 3 5 8 6 4 2
3 8 5 6 2 4 9 1 7
4 7 2 5 8 3 1 6 9
6 5 8 9 7 1 2 3 4
1 9 3 2 4 6 5 7 8
8.1.4 KLEE
I’ve also rewritten Sudoku example (8.1.1) for KLEE:
1 # include <stdint .h>
2
3 /*
4 coordinates :
5 ------------------------------
6 00 01 02 | 03 04 05 | 06 07 08
7 10 11 12 | 13 14 15 | 16 17 18
8 20 21 22 | 23 24 25 | 26 27 28
150
9 ------------------------------
10 30 31 32 | 33 34 35 | 36 37 38
11 40 41 42 | 43 44 45 | 46 47 48
12 50 51 52 | 53 54 55 | 56 57 58
13 ------------------------------
14 60 61 62 | 63 64 65 | 66 67 68
15 70 71 72 | 73 74 75 | 76 77 78
16 80 81 82 | 83 84 85 | 86 87 88
17 ------------------------------
18 */
19
20 uint8_t cells [9][9];
21
22 // http :// www. norvig .com/ sudoku .html
23 // http :// www. mirror .co.uk/news/weird -news/worlds -hardest -sudoku -can -you -242294
24 char * puzzle
="..53.....8......2..7..1.5..4....53...1..7...6..32...8..6.5....9..4....3......97..";
25
26 int main ()
27 {
28 klee_make_symbolic (cells , sizeof cells , " cells ");
29
30 // process text line:
31 for (int row =0; row <9; row ++)
32 for (int column =0; column <9; column ++)
33 {
34 char c= puzzle [row *9 + column ];
35 if (c!= '. ')
36 {
37 if ( cells [row ][ column ]!=c-'0') return 0;
38 }
39 else
40 {
41 // limit cells values to 1..9:
42 if ( cells [row ][ column ] <1) return 0;
43 if ( cells [row ][ column ] >9) return 0;
44 };
45 };
46
47 // for all 9 rows
48 for (int row =0; row <9; row ++)
49 {
50
51 if (((1 < < cells [row ][0]) |
52 (1<< cells [row ][1]) |
53 (1<< cells [row ][2]) |
54 (1<< cells [row ][3]) |
55 (1<< cells [row ][4]) |
56 (1<< cells [row ][5]) |
57 (1<< cells [row ][6]) |
58 (1<< cells [row ][7]) |
59 (1<< cells [row ][8]) )!=0 x3FE ) return 0; // 11 1111 1110
60 };
61
62 // for all 9 columns
63 for (int c=0; c <9; c++)
151
64 {
65 if (((1 < < cells [0][c]) |
66 (1<< cells [1][c]) |
67 (1<< cells [2][c]) |
68 (1<< cells [3][c]) |
69 (1<< cells [4][c]) |
70 (1<< cells [5][c]) |
71 (1<< cells [6][c]) |
72 (1<< cells [7][c]) |
73 (1<< cells [8][c]))!=0 x3FE ) return 0; // 11 1111 1110
74 };
75
76 // enumerate all 9 squares
77 for (int r=0; r <9; r+=3)
78 for (int c=0; c <9; c+=3)
79 {
80 // add constraints for each 3*3 square :
81 if ((1<< cells [r+0][c+0] |
82 1<< cells [r+0][c+1] |
83 1<< cells [r+0][c+2] |
84 1<< cells [r+1][c+0] |
85 1<< cells [r+1][c+1] |
86 1<< cells [r+1][c+2] |
87 1<< cells [r+2][c+0] |
88 1<< cells [r+2][c+1] |
89 1<< cells [r+2][c+2]) !=0 x3FE ) return 0; // 11 1111 1110
90 };
91
92 // at this point , all constraints must be satisfied
93 klee_assert (0);
94 };
Now this is really slower (on my Intel Core i3-3110M 2.4GHz notebook) in comparison to Z3Py solution (8.1.1).
But the answer is correct:
152
test000161 . external .err
Character \t has code of 9 in C/C++, and KLEE prints byte array as a C/C++ string, so it shows some values in
such way. We can just keep in mind that there is 9 at the each place where we see \t. The solution, while not properly
formatted, correct indeed.
By the way, at lines 42 and 43 you may see how we tell to KLEE that all array elements must be within some limits.
If we comment these lines out, we’ve got this:
KLEE warns us that shift value at line 51 is too big. Indeed, KLEE may try all byte values up to 255 (0xFF), which
are pointless to use there, and may be a symptom of error or bug, so KLEE warns about it.
Now let’s use klee_assume() again:
# include <stdint .h>
/*
coordinates :
------------------------------
00 01 02 | 03 04 05 | 06 07 08
10 11 12 | 13 14 15 | 16 17 18
20 21 22 | 23 24 25 | 26 27 28
------------------------------
30 31 32 | 33 34 35 | 36 37 38
40 41 42 | 43 44 45 | 46 47 48
50 51 52 | 53 54 55 | 56 57 58
------------------------------
60 61 62 | 63 64 65 | 66 67 68
70 71 72 | 73 74 75 | 76 77 78
80 81 82 | 83 84 85 | 86 87 88
------------------------------
*/
153
char * puzzle
="..53.....8......2..7..1.5..4....53...1..7...6..32...8..6.5....9..4....3......97..";
int main ()
{
klee_make_symbolic (cells , sizeof cells , " cells ");
};
154
{
// add constraints for each 3*3 square :
klee_assume ((1<< cells [r+0][c+0] |
1<< cells [r+0][c+1] |
1<< cells [r+0][c+2] |
1<< cells [r+1][c+0] |
1<< cells [r+1][c+1] |
1<< cells [r+1][c+2] |
1<< cells [r+2][c+0] |
1<< cells [r+2][c+1] |
1<< cells [r+2][c+2]) ==0 x3FE ); // 11 1111 1110
};
That works much faster: perhaps KLEE indeed handle this intrinsic in a special way. And, as we see, the only one
path has been found (one we actually interesting in it) instead of 161.
It’s still much slower than Z3Py solution, though.
155
Now we will use a POPCNT1 function to make each row in the matrix to contain only one True bit, that will preserve
consistency in encoding, since no vector can contain more than 1 True bit, or no True bits at all. Then we will use a
POPCNT1 function again to make all columns in the matrix to have only one single True bit. That will make all rows in
matrix unique, in other words, all 9 encoded numbers will always be unique.
After applying POPCNT1 function 9+9=18 times we’ll have 9 unique numbers in 1..9 range.
Using that operation we can make each row of Sudoku puzzle unique, each column unique and also each 3 · 3 = 9 box.
# global variables :
clauses =[]
vector_names ={}
last_var =1
BITS_PER_VECTOR =9
return solution
def neg(v):
return "-"+v
156
# so add "∼var OR ∼var2"
for pair in itertools . combinations (vars , r=2):
clauses . append ([ neg(pair [0]) , neg(pair [1]) ])
# at least one var must be present :
clauses . append (vars)
# 1 -> [1, 0, 0, 0, 0, 0, 0, 0, 0]
# 3 -> [0, 0, 1, 0, 0, 0, 0, 0, 0]
def number_to_vector (n):
rt =[0]*(n -1)
rt. append (1)
157
rt=rt +[0]*( BITS_PER_VECTOR -len(rt))
return rt
"""
coordinates we 're using here:
+--------+--------+--------+
|11 12 13|14 15 16|17 18 19|
|21 22 23|24 25 26|27 28 29|
|31 32 33|34 35 36|37 38 39|
+--------+--------+--------+
|41 42 43|44 45 46|47 48 49|
|51 52 53|54 55 56|57 58 59|
|61 62 63|64 65 66|67 68 69|
+--------+--------+--------+
|71 72 73|74 75 76|77 78 79|
|81 82 83|84 85 86|87 88 89|
|91 92 93|94 95 96|97 98 99|
+--------+--------+--------+
"""
def make_vec_name (row , col):
return "cell"+str(row)+str(col)
158
# variables in each 3*3 box are unique :
for row in range (1, 9+1, 3):
for col in range (1, 9+1 , 3):
tmp =[]
tmp. append ( make_vec_name (row +0, col +0))
tmp. append ( make_vec_name (row +0, col +1))
tmp. append ( make_vec_name (row +0, col +2))
tmp. append ( make_vec_name (row +1, col +0))
tmp. append ( make_vec_name (row +1, col +1))
tmp. append ( make_vec_name (row +1, col +2))
tmp. append ( make_vec_name (row +2, col +0))
tmp. append ( make_vec_name (row +2, col +1))
tmp. append ( make_vec_name (row +2, col +2))
make_distinct_vectors (tmp)
print_solution ( solution )
main ()
( https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/puzzles/sudoku/SAT/sudoku_SAT.py )
The make_distinct_bits_in_vector() function preserves consistency of encoding.
The make_distinct_vectors() function makes 9 numbers unique.
The cvt_vector_to_number() decodes vector to number.
The number_to_vector() encodes number to vector.
The main() function has all necessary calls to make rows/columns/3 · 3 boxes unique.
That works:
159
Measuring puzzle’s hardness using MiniSat
Various puzzles printed in newspapers are divided by ”hardness” or number of clues. Let’s see, how we can measure
”hardness”. SAT solver’s clock time is not an options, because this is too easy problem for them. However, MiniSat can
give other statistics:
35 clues, ”Easy” level from https://www.websudoku.com/?level=1.
"8.4.3.1.772.54.9....1.7.....39.....5.7.469.1.1.....79.....2.4....5.93.719.3.8.5.6"
restarts : 1
conflicts : 0 (0 /sec)
decisions : 1 (0.00 % random ) (99 /sec)
propagations : 729 (72221 /sec)
conflict literals : 0 (-nan % deleted )
restarts : 1
conflicts : 0 (0 /sec)
decisions : 1 (0.00 % random ) (117 /sec)
propagations : 729 (84945 /sec)
conflict literals : 0 (-nan % deleted )
restarts : 1
conflicts : 0 (0 /sec)
decisions : 1 (0.00 % random ) (120 /sec)
propagations : 729 (87431 /sec)
conflict literals : 0 (-nan % deleted )
restarts : 1
conflicts : 1 (275 /sec)
decisions : 2 (0.00 % random ) (550 /sec)
propagations : 810 (222711 /sec)
conflict literals : 1 (0.00 % deleted )
restarts : 1
conflicts : 22 (2281 /sec)
decisions : 30 (0.00 % random ) (3110 /sec)
propagations : 2516 (260861 /sec)
conflict literals : 156 (21.61 % deleted )
160
That will make 3447 clauses instead of 12195, but somehow, SAT solvers works slower. No idea why.
In the interest of clarity, it must be added that each of the five houses is painted a different
color, and their inhabitants are of different national extractions, own different pets, drink different
beverages and smoke different brands of American cigarets [sic]. One other thing: in statement 6, right
means your right.
( https://en.wikipedia.org/wiki/Zebra_Puzzle )
Yellow , Blue , Red , Ivory , Green =Ints('Yellow Blue Red Ivory Green ')
Norwegian , Ukrainian , Englishman , Spaniard , Japanese =Ints('Norwegian Ukrainian
Englishman Spaniard Japanese ')
Water , Tea , Milk , OrangeJuice , Coffee =Ints('Water Tea Milk OrangeJuice Coffee ')
Kools , Chesterfield , OldGold , LuckyStrike , Parliament =Ints('Kools Chesterfield OldGold
LuckyStrike Parliament ')
Fox , Horse , Snails , Dog , Zebra =Ints('Fox Horse Snails Dog Zebra ')
6 Constraint satisfaction problem
161
s = Solver ()
# so are beverages :
s.add( Distinct (Water , Tea , Milk , OrangeJuice , Coffee ))
# so are cigarettes :
s.add( Distinct (Kools , Chesterfield , OldGold , LuckyStrike , Parliament ))
# so are pets:
s.add( Distinct (Fox , Horse , Snails , Dog , Zebra ))
# limits .
# adding two constraints at once ( separated by comma ) is the same
# as adding one And () constraint with two subconstraints
s.add(Yellow >=1 , Yellow <=5)
s.add(Blue >=1 , Blue <=5)
s.add(Red >=1 , Red <=5)
s.add(Ivory >=1, Ivory <=5)
s.add(Green >=1, Green <=5)
162
s.add( Spaniard == Dog)
# 11. The man who smokes Chesterfields lives in the house next to the man with the fox.
s.add(Or( Chesterfield == Fox +1, Chesterfield ==Fox -1)) # left or right
# 12. Kools are smoked in the house next to the house where the horse is kept.
s.add(Or( Kools == Horse +1, Kools == Horse -1)) # left or right
r=s. check ()
print r
if r== unsat :
exit (0)
m=s. model ()
print (m)
sat
[ Snails = 3,
Blue = 2,
Ivory = 4,
OrangeJuice = 4,
Parliament = 5,
Yellow = 1,
Fox = 1,
Zebra = 5,
Horse = 2,
163
Dog = 4,
Tea = 2,
Water = 1,
Chesterfield = 2,
Red = 3,
Japanese = 5,
LuckyStrike = 4,
Norwegian = 1,
Milk = 3,
Kools = 1,
OldGold = 3,
Ukrainian = 2,
Coffee = 5,
Green = 5,
Spaniard = 4,
Englishman = 3]
8.2.2 KLEE
We just define all variables and add constraints:
int main ()
{
int Yellow , Blue , Red , Ivory , Green ;
int Norwegian , Ukrainian , Englishman , Spaniard , Japanese ;
int Water , Tea , Milk , OrangeJuice , Coffee ;
int Kools , Chesterfield , OldGold , LuckyStrike , Parliament ;
int Fox , Horse , Snails , Dog , Zebra ;
164
klee_make_symbolic (& Zebra , sizeof (int), " Zebra ");
// limits .
if (Yellow <1 || Yellow >5) return 0;
if (Blue <1 || Blue >5) return 0;
if (Red <1 || Red >5) return 0;
if (Ivory <1 || Ivory >5) return 0;
if (Green <1 || Green >5) return 0;
// so are beverages :
if (((1 < < Water ) | (1<<Tea) | (1<< Milk) | (1<< OrangeJuice ) | (1<< Coffee ))!=0 x3E)
return 0; // 111110
// so are cigarettes :
if (((1 < < Kools ) | (1<< Chesterfield ) | (1<< OldGold ) | (1<< LuckyStrike ) | (1<<
Parliament ))!=0 x3E) return 0; // 111110
// so are pets:
if (((1 < < Fox) | (1<< Horse ) | (1<< Snails ) | (1<<Dog) | (1<< Zebra ))!=0 x3E) return
0; // 111110
165
// 3. The Spaniard owns the dog.
if ( Spaniard != Dog) return 0;
// 11. The man who smokes Chesterfields lives in the house next to the man with
the fox.
if ( Chesterfield != Fox +1 && Chesterfield !=Fox -1) return 0; // left or right
// 12. Kools are smoked in the house next to the house where the horse is kept.
if ( Kools != Horse +1 && Kools != Horse -1) return 0; // left or right
return 0;
};
I force KLEE to find distinct values for colors, nationalities, cigarettes, etc, in the same way as I did for Sudoku earlier
(8.1.1).
Let’s run it:
166
KLEE: WARNING : undefined reference to function : klee_assert
KLEE: WARNING ONCE: calling external : klee_assert (0)
KLEE: ERROR: /home/klee/ klee_zebra1 .c :130: failed external call: klee_assert
KLEE: NOTE: now ignoring this error at this location
It works for ≈ 7 seconds on my Intel Core i3-3110M 2.4GHz notebook. Let’s find out path, where klee_assert() has
been executed:
...
167
int Fox , Horse , Snails , Dog , Zebra ;
// limits .
klee_assume (Yellow >=1 && Yellow <=5);
klee_assume (Blue >=1 && Blue <=5);
klee_assume (Red >=1 && Red <=5);
klee_assume (Ivory >=1 && Ivory <=5);
klee_assume (Green >=1 && Green <=5);
168
klee_assume (Fox >=1 && Fox <=5);
klee_assume (Horse >=1 && Horse <=5);
klee_assume (Snails >=1 && Snails <=5);
klee_assume (Dog >=1 && Dog <=5);
klee_assume (Zebra >=1 && Zebra <=5);
// so are beverages :
klee_assume (((1 < < Water ) | (1<<Tea) | (1<< Milk) | (1<< OrangeJuice ) | (1<< Coffee )
)==0 x3E); // 111110
// so are cigarettes :
klee_assume (((1 < < Kools ) | (1<< Chesterfield ) | (1<< OldGold ) | (1<< LuckyStrike ) |
(1<< Parliament ))==0 x3E); // 111110
// so are pets:
klee_assume (((1 < < Fox) | (1<< Horse ) | (1<< Snails ) | (1<<Dog) | (1<< Zebra ))==0 x3E
); // 111110
// 11. The man who smokes Chesterfields lives in the house next to the man with
the fox.
169
klee_assume ( Chesterfield == Fox +1 || Chesterfield ==Fox -1); // left or right
// 12. Kools are smoked in the house next to the house where the horse is kept.
klee_assume ( Kools == Horse +1 || Kools == Horse -1); // left or right
…and this version works slightly faster (≈ 5 seconds), maybe because KLEE is aware of this intrinsic and handles it
in a special way?
...
{1,1,1,1,0}->0,
{1 ,1 ,1 ,1 ,1} - >0}
170
s="(!a||!b)&&" \
"(!a||!c)&&" \
"(!a||!d)&&" \
"(!a||!e)&&" \
"(!b||!c)&&" \
"(!b||!d)&&" \
"(!b||!e)&&" \
"(!c||!d)&&" \
"(!c||!e)&&" \
"(!d||!e)&&" \
"(a||b||c||d||e)"
...
# k=tuple : (" high - level " variable name , number of bit (0..4) )
# v= variable number in CNF
vars ={}
vars_last =1
...
add_popcnt1 (vars [( name ,0)], vars [( name ,1)], vars [( name ,2)], vars [( name ,3)], vars
[(name ,4) ])
...
alloc_distinct_variables ([" Yellow ", "Blue", "Red", " Ivory ", " Green "])
alloc_distinct_variables ([" Norwegian ", " Ukrainian ", " Englishman ", " Spaniard ", " Japanese
"])
alloc_distinct_variables ([" Water ", "Tea", "Milk", " OrangeJuice ", " Coffee "])
alloc_distinct_variables ([" Kools ", " Chesterfield ", " OldGold ", " LuckyStrike ", " Parliament
"])
alloc_distinct_variables ([" Fox", " Horse ", " Snails ", "Dog", " Zebra "])
...
Now we have 5 boolean variables for each high-level variable, and each group of variables will always have distinct
values.
Now let’s reread puzzle description: “2.The Englishman lives in the red house.”. That’s easy. In my Z3 and KLEE
examples I just wrote “Englishman==Red”. Same story here: we just add a clauses showing that 5 boolean variables for
“Englishman” must be equal to 5 booleans for “Red”.
On a lowest CNF level, if we want to say that two variables must be equal to each other, we add two clauses:
171
(var1 ∨ ¬var2) ∧ (¬var1 ∨ var2)
That means, both var1 and var2 values must be False or True, but they cannot be different.
...
...
Now the next conditions: “9.Milk is drunk in the middle house.” (i.e., 3rd house), “10.The Norwegian lives in the first
house.” We can just assign boolean values directly:
# n=1..5
def add_eq_var_n (name , n):
global clauses
global vars
for i in range (5):
if i==n -1:
clauses . append (vars [( name ,i)]) # always True
else:
clauses . append (" -"+ vars [( name ,i)]) # always False
...
Ivory Green
AND (1 0 0 0 0 0 1 0 0 0)
.. OR ..
AND (0 1 0 0 0 0 0 1 0 0)
.. OR ..
AND (0 0 1 0 0 0 0 0 1 0)
172
.. OR ..
AND (0 0 0 1 0 0 0 0 0 1)
There is no “0 0 0 0 1” for “Ivory”, because it cannot be the last one. Now I can convert these conditions to CNF
using Wolfram Mathematica:
In []:= BooleanConvert [( a1 && !b1 &&! c1 &&! d1 &&! e1 &&! a2 && b2 &&! c2 &&! d2 &&! e2) ||
(!a1&& b1 &&! c1 &&! d1 &&! e1 &&! a2 && !b2 && c2 &&! d2 &&! e2) ||
(!a1&& !b1 &&c1 &&! d1 &&! e1 &&! a2 && !b2 &&! c2 && d2 &&! e2) ||
(!a1&& !b1 &&! c1 && d1 &&! e1 &&! a2 && !b2 &&! c2 &&! d2 && e2) ,"CNF "]
Out []= (!a1 ||! b1)&&(! a1 ||! c1)&&(! a1 ||! d1)&&( a1 ||b1 || c1 || d1)&&! a2 &&(! b1 ||! b2)&&(! b1 ||! c1)
&&
(!b1 ||! d1)&&( b1 || b2 || c1 || d1)&&(! b2 ||! c1)&&(! b2 ||! c2)&&(! b2 ||! d1)&&(! b2 ||! d2)&&(! b2 ||! e2)
&&
(b2 ||c1 ||c2||d1)&&( b2 || c2 || d1 || d2)&&( b2 || c2 || d2 || e2)&&(! c1 ||! c2)&&(! c1 ||! d1)&&(! c2 ||! d1)
&&
(!c2 ||! d2)&&(! c2 ||! e2)&&(! d1 ||! d2)&&(! d2 ||! e2)&&! e1
...
What we will do with that? “11.The man who smokes Chesterfields lives in the house next to the man with the fox.”
“12.Kools are smoked in the house next to the house where the horse is kept.”
We don’t know side, left or right, but we know that they are differ in one. Here is a clauses I would add:
Chesterfield Fox
AND (0 0 0 0 1 0 0 0 1 0)
.. OR ..
AND (0 0 0 1 0 0 0 0 0 1)
AND (0 0 0 1 0 0 0 1 0 0)
.. OR ..
AND (0 0 1 0 0 0 1 0 0 0)
AND (0 0 1 0 0 0 0 0 1 0)
.. OR ..
AND (0 1 0 0 0 1 0 0 0 0)
173
AND (0 1 0 0 0 0 0 1 0 0)
.. OR ..
AND (1 0 0 0 0 0 1 0 0 0)
In []:= BooleanConvert [( a1 && !b1 &&! c1 &&! d1 &&! e1 &&! a2 && b2 &&! c2 &&! d2 &&! e2) ||
(!a1&& b1 &&! c1 &&! d1 &&! e1 && a2 && !b2 &&! c2 &&! d2 &&! e2) ||
(!a1&& b1 &&! c1 &&! d1 &&! e1 &&! a2 && !b2 && c2 &&! d2 &&! e2) ||
(!a1&& !b1 &&c1 &&! d1 &&! e1 &&! a2 && b2 &&! c2 &&! d2 &&! e2) ||
(!a1&& !b1 &&c1 &&! d1 &&! e1 &&! a2 && !b2 &&! c2 && d2 &&! e2) ||
(!a1&& !b1 &&! c1 && d1 &&! e1 &&! a2 && !b2 && c2 &&! d2 &&! e2) ||
(!a1&& !b1 &&! c1 && d1 &&! e1 &&! a2 && !b2 &&! c2 &&! d2 && e2) ||
(!a1&& !b1 &&! c1 &&! d1 && e1 &&! a2 && !b2 &&! c2 && d2 &&! e2) ,"CNF "]
Out []= (!a1 ||! b1)&&(! a1 ||! c1)&&(! a1 ||! d1)&&(! a1 ||! e1)&&( a1 || b1 || c1 || d1 || e1)&&(! a2 || b1)
&&(! a2 ||! b2)&&
(!a2 ||! c2)&&(! a2 ||! d2)&&(! a2 ||! e2)&&( a2 || b2 || c1 || c2 || d1 || e1)&&( a2 || b2 || c2 || d1 || d2)&&( a2
||b2||c2 ||d2|| e2)&&
(!b1 ||! b2)&&(! b1 ||! c1)&&(! b1 ||! d1)&&(! b1 ||! e1)&&( b1 || b2 || c1 || d1 || e1)&&(! b2 ||! c2)&&(! b2
||! d1)&&(! b2 ||! d2)&&
(!b2 ||! e1)&&(! b2 ||! e2)&&(! c1 ||! c2)&&(! c1 ||! d1)&&(! c1 ||! e1)&&(! c2 ||! d2)&&(! c2 ||! e1)&&(! c2
||! e2)&&
(!d1 ||! d2)&&(! d1 ||! e1)&&(! d2 ||! e2)
...
# 11. The man who smokes Chesterfields lives in the house next to the man with the fox.
add_right_or_left (" Chesterfield "," Fox ") # left or right
# 12. Kools are smoked in the house next to the house where the horse is kept.
add_right_or_left (" Kools "," Horse ") # left or right
174
This is it! The full source code: https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/puzzles/
zebra/SAT/zebra_SAT.py.
Resulting CNF instance has 125 boolean variables and 511 clauses:
https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/puzzles/zebra/SAT/1.cnf. It is a piece of
cake for any SAT solver. Even my toy-level SAT-solver (23.1) can solve it in ~1 second on my ancient Intel Atom netbook.
And of course, there is only one possible solution, what is acknowledged by Picosat.
“Pipe puzzle” is a popular puzzle (just google “pipe puzzle” and look at images).
175
Figure 8.3: Shuffled puzzle
…and solved:
8.3.1 Generation
First, we need to generate it. Here is my quick idea on it. Take 8*16 array of cells. Each cell may contain some type of
block. There are joints between cells:
176
vjoints[…, 10]
vjoints[…, 11]
vjoints[…, 12]
vjoints[…, 13]
vjoints[…, 14]
vjoints[…, 15]
vjoints[…, 0]
vjoints[…, 1]
vjoints[…, 2]
vjoints[…, 3]
vjoints[…, 4]
vjoints[…, 5]
vjoints[…, 6]
vjoints[…, 7]
vjoints[…, 8]
vjoints[…, 9]
hjoints[0, …]
hjoints[1, …]
hjoints[2, …]
hjoints[3, …]
hjoints[4, …]
hjoints[5, …]
hjoints[6, …]
hjoints[7, …]
Blue lines are horizontal joints, red lines are vertical joints. We just set each joint to 0/false (absent) or 1/true
(present), randomly.
Once set, it’s now easy to find type for each cell. There are:
Dangling joints can be preset at a first stage (i.e., cell with only one joint), but they are removed recursively, these
cells are transforming into empty cells. Hence, at the end, all cells has at least two joints, and the whole plumbing system
has no connections with outer world—I hope this would make things clearer.
The C source code of generator is here: https://github.com/DennisYurichev/SAT_SMT_by_example/tree/master/
puzzles/pipe/generator. All horizontal joints are stored in the global array hjoints[] and vertical in vjoints[].
The C program generates ANSI-colored output like it has been showed above (??, ??) plus an array of types, with no
angle information about each cell:
[
["0" , "0", "2b", "3" , "2a", "2a", "2a", "3" , "3" , "2a", "3" , "2b", "2b", "2b", "0" ,
"0"] ,
["2b", "2b", "3" , "2b", "0", "0" , "2b", "3" , "3" , "3" , "3" , "3" , "4" , "2b", "0" , "0"] ,
["3" , "4", "2b", "0" , "0" , "0" , "3" , "2b", "2b", "4" , "2b", "3" , "4" , "2b", "2b", "2b"],
["2b", "4", "3", "2a", "3" , "3" , "3" , "2b", "2b", "3" , "3" , "3" , "2a", "2b", "4" , "3"] ,
["0" , "2b", "3", "2b", "3" , "4" , "2b", "3" , "3" , "2b", "3" , "3" , "3" , "0" , "2a", "2a"],
["0" , "0", "2b", "2b", "0" , "3" , "3" , "4" , "3" , "4" , "3" , "3" , "3" , "2b", "3" , "3"] ,
177
["0" , "2b", "3", "2b", "0" , "3" , "3" , "4" , "3" , "4" , "4" , "3" , "0" , "3" , "4" , "3"] ,
["0" , "2b", "3", "3" , "2a", "3" , "2b", "2b", "3" , "3" , "3" , "3" , "2a", "3" , "3" , "2b"],
]
8.3.2 Solving
First of all, we would think about 8*16 array of cells, where each has four bits: “T” (top), “B” (bottom), “L” (left), “R”
(right). Each bit represents half of joint.
[…, 10]
[…, 11]
[…, 12]
[…, 13]
[…, 14]
[…, 15]
[…, 0]
[…, 1]
[…, 2]
[…, 3]
[…, 4]
[…, 5]
[…, 6]
[…, 7]
[…, 8]
[…, 9]
T T T T T T T T T T T T T T T T
[0, …] L RL RL RL RL RL RL RL RL RL RL RL RL RL RL RL R
B B B B B B B B B B B B B B B B
T T T T T T T T T T T T T T T T
[1, …] L RL RL RL RL RL RL RL RL RL RL RL RL RL RL RL R
B B B B B B B B B B B B B B B B
T T T T T T T T T T T T T T T T
[2, …] L RL RL RL RL RL RL RL RL RL RL RL RL RL RL RL R
B B B B B B B B B B B B B B B B
T T T T T T T T T T T T T T T T
[3, …] L RL RL RL RL RL RL RL RL RL RL RL RL RL RL RL R
B B B B B B B B B B B B B B B B
T T T T T T T T T T T T T T T T
[4, …] L RL RL RL RL RL RL RL RL RL RL RL RL RL RL RL R
B B B B B B B B B B B B B B B B
T T T T T T T T T T T T T T T T
[5, …] L RL RL RL RL RL RL RL RL RL RL RL RL RL RL RL R
B B B B B B B B B B B B B B B B
T T T T T T T T T T T T T T T T
[6, …] L RL RL RL RL RL RL RL RL RL RL RL RL RL RL RL R
B B B B B B B B B B B B B B B B
T T T T T T T T T T T T T T T T
[7, …] L RL RL RL RL RL RL RL RL RL RL RL RL RL RL RL R
B B B B B B B B B B B B B B B B
HEIGHT =8
WIDTH =16
We know that if each of half-joints is present, corresponding half-joint must be also present, and vice versa. We define
this using these constraints:
# "top" of each cell must be equal to " bottom " of the cell above
# " bottom " of each cell must be equal to "top" of the cell below
# "left" of each cell must be equal to " right " of the cell at left
# "right" of each cell must be equal to "left" of the cell at right
for r in range( HEIGHT ):
for c in range ( WIDTH ):
if r!=0:
s.add(T[r][c]==B[r -1][c])
if r!= HEIGHT -1:
178
s.add(B[r][c]==T[r+1][c])
if c!=0:
s.add(L[r][c]==R[r][c -1])
if c!= WIDTH -1:
s.add(R[r][c]==L[r][c+1])
# "left" of each cell of first column shouldn 't have any connection
# so is " right " of each cell of the last column
for r in range( HEIGHT ):
s.add(L[r ][0]== f)
s.add(R[r][ WIDTH -1]== f)
# "top" of each cell of the first row shouldn 't have any connection
# so is " bottom " of each cell of the last row
for c in range( WIDTH ):
s.add(T[0][c]==f)
s.add(B[HEIGHT -1][c]==f)
Now we’ll enumerate all cells in the initial array (8.3.1). First two cells are empty there. And the third one has type
“2b”. This is “ ” and it can be oriented in 4 possible ways. And if it has angle 0◦ , bottom and right half-joints are present,
others are absent. If it has angle 90◦ , it looks like “ ”, and bottom and left half-joints are present, others are absent.
In plain English: “if cell of this type has angle 0◦ , these half-joints must be present OR if it has angle 90◦ , these
half-joints must be present, OR, etc, etc.”
Likewise, we define all these rules for all types and all possible angles:
if ty =="0":
s.add(A[r][c]==f)
s.add(T[r][c]==f, B[r][c]==f, L[r][c]==f, R[r][c]==f)
if ty =="2a":
s.add(Or(And(A[r][c]==0 , L[r][c]==f, R[r][c]==f, T[r][c]==t, B[r][c]==t),
#
And(A[r][c]==90 , L[r][c]==t, R[r][c]==t, T[r][c]==f, B[r][c]==f)))
#
if ty =="2b":
s.add(Or(And(A[r][c]==0 , L[r][c]==f, R[r][c]==t, T[r][c]==f, B[r][c]==t),
#
And(A[r][c]==90 , L[r][c]==t, R[r][c]==f, T[r][c]==f, B[r][c]==t),
#
And(A[r][c]==180 , L[r][c]==t, R[r][c]==f, T[r][c]==t, B[r][c]==f),
#
And(A[r][c]==270 , L[r][c]==f, R[r][c]==t, T[r][c]==t, B[r][c]==f)))
#
if ty =="3":
s.add(Or(And(A[r][c]==0 , L[r][c]==f, R[r][c]==t, T[r][c]==t, B[r][c]==t),
#
And(A[r][c]==90 , L[r][c]==t, R[r][c]==t, T[r][c]==f, B[r][c]==t),
#
And(A[r][c]==180 , L[r][c]==t, R[r][c]==f, T[r][c]==t, B[r][c]==t),
#
179
And(A[r][c]==270 , L[r][c]==t, R[r][c]==t, T[r][c]==t, B[r][c]==f)))
#
if ty =="4":
s.add(A[r][c ]==0)
s.add(T[r][c]==t, B[r][c]==t, L[r][c]==t, R[r][c]==t) #
It produces this result (prints angle for each cell and (pseudo)graphical representation):
It worked ≈ 4 seconds on my old and slow Intel Atom N455 1.66GHz. Is it fast? I don’t know, but again, what is
really cool, we do not know about any mathematical background of all this, we just defined cells, (half-)joints and defined
relations between them.
Now the next question is, how many solutions are possible? Using method described earlier (3.16), I’ve altered solver
script 7 and solver said two solutions are possible.
7 https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/puzzles/pipe/solver/solve_pipe_puzzle2.py
180
Figure 8.6: gvimdiff output (pardon my red cursor at left pane at left-top corner)
4 cells in the middle can be orientated differently. Perhaps, other puzzles may produce different results.
P.S. Half-joint is defined as boolean type. But in fact, the first version of the solver has been written using integer
type for half-joints, and 0 was used for False and 1 for True. I did it so because I wanted to make source code tidier and
narrower without using long words like “False” and “True”. And it worked, but slower. Perhaps, Z3 handles boolean data
types faster? Better? Anyway, I writing this to note that integer type can also be used instead of boolean, if needed.
| | | |*| | | | |
| | | | | | |*| |
| | | | |*| | | |
| |*| | | | | | |
| | | | | |*| | |
|*| | | | | | | |
| | |*| | | | | |
| | | | | | | |*|
8.4.1 make_one_hot
One important function we will (often) use is make_one_hot. This is a function which returns True if one single of inputs
is True and others are False. It will return False otherwise.
In my other examples, I’ve used Wolfram Mathematica to generate CNF clauses for it, for example: 3.8.2. What
expression Mathematica offers as make_one_hot function with 8 inputs?
(!a||!b)&&(!a||!c)&&(!a||!d)&&(!a||!e)&&(!a||!f)&&(!a||!g)&&(!a||!h)&&(a||b||c||d||e||f
||g||h)&&
(!b||!c)&&(!b||!d)&&(!b||!e)&&(!b||!f)&&(!b||!g)&&(!b||!h)&&(!c||!d)&&(!c||!e)&&(!c||!f)
&&(!c||!g)&&
(!c||!h)&&(!d||!e)&&(!d||!f)&&(!d||!g)&&(!d||!h)&&(!e||!f)&&(!e||!g)&&(!e||!h)&&(!f||!g)
&&(!f||!h)&&(!g||!h)
We can clearly see that the expression constisting of all possible variable pairs (negated) plus enumeration of all
variables (non-negated). In plain English terms, this means: “no pair can be equal to two True’s AND at least one True
must be present among all variables”.
181
This is how it works: if two variables will be True, negated they will be both False, and this clause will not be evaluated
to True, which is our ultimate goal. If one of variables is True, both negated will produce one True and one False (fine).
If both variables are False, both negated will produce two True’s (again, fine).
Here is how I can generate clauses for the function using itertools module from Python, which provides many important
functions from combinatorics:
AtMost1() function enumerates all possible pairs using itertools function combinations().
make_one_hot() function does the same, but also adds a final clause, which forces at least one True variable to be
present.
What clauses will be generated for 5 variables (1..5)?
p cnf 5 11
-2 -5 0
-2 -4 0
-4 -5 0
-2 -3 0
-1 -4 0
-1 -5 0
-1 -2 0
-1 -3 0
-3 -4 0
-3 -5 0
1 2 3 4 5 0
Yes, these are all possible pairs of 1..5 numbers + all 5 numbers.
We can get all solutions using Picosat:
s SATISFIABLE
v -1 -2 -3 -4 5 0
s SATISFIABLE
v -1 -2 -3 4 -5 0
s SATISFIABLE
v -1 -2 3 -4 -5 0
s SATISFIABLE
v -1 2 -3 -4 -5 0
s SATISFIABLE
v 1 -2 -3 -4 -5 0
s SOLUTIONS 5
182
The problem of placing non-attacking (each other) queens on chess board (of any size) can be stated in plain English
like this:
• one single queen must be present at each row;
• one single queen must be present at each column;
• zero or one queen must be present at each diagonal (empty diagonals can be present in valid solution).
These rules can be translated like that:
• make_one_hot(each row)==True
• make_one_hot(each column)==True
• AtMost1(each diagonal)==True
Now all we need is to enumerate rows, columns and diagonals and gather all clauses:
#!/ usr/bin/env python3
SIZE =8
SKIP_SYMMETRIES =True
# SKIP_SYMMETRIES =False
183
first_var =int( _vars [0])
# print solution :
print (" solution number ", sol_n , ":")
# print 2D array :
for row in range (SIZE):
tmp =[([" ", "*"][ solution_as_2D_bool_array [row ][ col ]]+"|") for col in range (
SIZE)]
print ("|"+"".join(tmp))
sol_n =sol_n +1
main ()
184
( https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/puzzles/8queens/8queens.py )
Perhaps, gen_diagonal() function is not very aesthetically appealing: it enumerates also subdiagonals of already
enumerated longer diagonals. To prevent presence of duplicate clauses, clauses global variable is not a list, rather set,
which allows only unique data to be present there.
Also, I’ve used AtMost1 for each column, this will help to produce slightly lower number of clauses. Each column will
have a queen anyway, this is implied from the first rule (make_one_hot for each row).
After running, we got CNF file with 64 variables and 736 clauses (https://github.com/DennisYurichev/SAT_SMT_
by_example/blob/master/puzzles/8queens/8queens.cnf). Here is one solution:
How many possible solutions are there? Picosat tells 92, which is indeed correct number of solutions (https://oeis.
org/A000170).
Performance of Picosat is not impressive, probably because it has to output all the solutions. It took 34 seconds on
my ancient Intel Atom 1.66GHz netbook to enumerate all solutions for 11 · 11 chess board (2680 solutions), which is way
slower than my straigt brute-force program: https://yurichev.com/blog/8queens/. Nevertheless, it’s lighting fast (as
other SAT solvers) in finding first solution.
The SAT instance is also small enough to be easily solved by my simplest possible backtracking SAT solver: 23.1.
185
8.5.1 Intro
First, a bit of terminology. There are 6 colors we have: white, green, blue, orange, red, yellow. We also have 6 sides:
front, up, down, left, right, back.
This is how we will name all facelets:
U1 U2
U3 U4
-------
L1 L2 | F1 F2 | R1 R2 | B1 B2
L3 L4 | F3 F4 | R3 R4 | B3 B4
-------
D1 D2
D3 D4
G G
G G
---
R R|W W|O O|Y Y
R R|W W|O O|Y Y
---
B B
B B
There are 6 possible turns: front, left, right, back, up, down. But each turn can be clockwise, counterclockwise and
half-turn (equal to two CW or two CCW). Each CW is equal to 3 CCW and vice versa. Hence, there are 6*3=18 possible
turns.
It is known, that 11 turns (including half-turns) are enough to solve any pocket cube (God’s algorithm). This means,
graph has a diameter of 11. For 3*3*3 cube one need 20 turns (http://www.cube20.org/). See also: https://en.
wikipedia.org/wiki/Rubik%27s_Cube_group.
8.5.2 Z3
There are 6 sides and 4 facelets on each, hence, 6*4=24 variables we need to define a state.
Then we define how state is transformed after each possible turn:
186
[ s[ FACE_L ][3] , s[ FACE_R ][1] , s[ FACE_L ][1] , s[ FACE_R ][3] ],
[ s[ FACE_L ][0] , s[ FACE_R ][2] , s[ FACE_L ][2] , s[ FACE_R ][0] ],
[ s[ FACE_B ][0] , s[ FACE_B ][1] , s[ FACE_B ][2] , s[ FACE_B ][3] ] ]
...
Then we define a function, which takes turn number and transforms a state:
# op is turn number
def rotate (turn , state , face , facelet ):
return If(op ==0 , rotate_FCW ( state )[face ][ facelet ],
If(op ==1 , rotate_FCCW ( state )[face ][ facelet ],
If(op ==2 , rotate_UCW ( state )[face ][ facelet ],
If(op ==3 , rotate_UCCW ( state )[face ][ facelet ],
If(op ==4 , rotate_DCW ( state )[face ][ facelet ],
...
move_names =[" FCW", "FCCW", "UCW", "UCCW", "DCW", "DCCW", "RCW", "RCCW", "LCW", "LCCW", "
BCW", "BCCW", "FH", "UH", "DH", "RH", "LH", "BH "]
# 4
init_F , init_U , init_D , init_R , init_L , init_B = set_current_state ({" FACE_F ":" RYOG", "
FACE_U ":" YRGO", " FACE_D ":" WRBO", " FACE_R ":" GYWB", " FACE_L ":" BYWG", " FACE_B ":" BOWR "})
...
s= Solver ()
state =[[[ Int(' state %d_%d_%d' % (n, side , i)) for i in range ( FACELETS )] for side in
range (FACES )] for n in range ( TURNS +1)]
op=[ Int('op%d' % n) for n in range ( TURNS +1)]
187
s.add( state [0][ FACE_D ][i]== init_D [i])
s.add( state [0][ FACE_R ][i]== init_R [i])
s.add( state [0][ FACE_L ][i]== init_L [i])
s.add( state [0][ FACE_B ][i]== init_B [i])
# solved state
for face in range ( FACES):
for facelet in range ( FACELETS ):
s.add( state [ TURNS ][ face ][ facelet ]== face)
# turns:
for turn in range ( TURNS):
for face in range ( FACES ):
for facelet in range ( FACELETS ):
s.add( state [turn +1][ face ][ facelet ]== rotate (op[turn], state [turn], face ,
facelet ))
if s. check () == sat:
print "sat"
m=s. model ()
for turn in range ( TURNS ):
print move_names [int(str(m[op[turn ]]))]
exit (0)
turns= 1
turns= 2
turns= 3
turns= 4
sat
RCW
UCW
DCW
RCW
...but very slow. It takes up to 1 hours to find a path of 8 turns, which is not enough, we need 11.
Nevetheless, I decided to include Z3 solver as a demonstration.
188
You set all turns and the device ”calculates” final state.
Each ”blk” can be constisted of 24 multiplexers (MUX), each for each facelet. Each MUX is controlled by 5-bit
command (turn number). Depending on command, MUX takes 3-bit color from a facelet from a previous state.
Here is a table: the first column is a ”destination” facelet, then a list of ”source” facelets for each turn:
# dst , FCW FH FCCW UCW UH UCCW DCW DH DCCW RCW RH RCCW LCW LH
LCCW BCW BH BCCW
add_r ("F1" ,[" F3","F4","F2","R1","B1","L1","F1","F1","F1","F1","F1","F1","U1","B4","
D1","F1","F1","F1 "])
add_r ("F2" ,[" F1","F3","F4","R2","B2","L2","F2","F2","F2","D2","B3","U2","F2","F2","
F2","F2","F2","F2 "])
add_r ("F3" ,[" F4","F2","F1","F3","F3","F3","L3","B3","R3","F3","F3","F3","U3","B2","
D3","F3","F3","F3 "])
add_r ("F4" ,[" F2","F1","F3","F4","F4","F4","L4","B4","R4","D4","B1","U4","F4","F4","
F4","F4","F4","F4 "])
add_r ("U1" ,[" U1","U1","U1","U3","U4","U2","U1","U1","U1","U1","U1","U1","B4","D1","
F1","R2","D4","L3 "])
add_r ("U2" ,[" U2","U2","U2","U1","U3","U4","U2","U2","U2","F2","D2","B3","U2","U2","
U2","R4","D3","L1 "])
add_r ("U3" ,[" L4","D2","R1","U4","U2","U1","U3","U3","U3","U3","U3","U3","B2","D3","
F3","U3","U3","U3 "])
add_r ("U4" ,[" L2","D1","R3","U2","U1","U3","U4","U4","U4","F4","D4","B1","U4","U4","
U4","U4","U4","U4 "])
add_r ("D1" ,[" R3","U4","L2","D1","D1","D1","D3","D4","D2","D1","D1","D1","F1","U1","
B4","D1","D1","D1 "])
add_r ("D2" ,[" R1","U3","L4","D2","D2","D2","D1","D3","D4","B3","U2","F2","D2","D2","
D2","D2","D2","D2 "])
add_r ("D3" ,[" D3","D3","D3","D3","D3","D3","D4","D2","D1","D3","D3","D3","F3","U3","
B2","L1","U2","R4 "])
add_r ("D4" ,[" D4","D4","D4","D4","D4","D4","D2","D1","D3","B1","U4","F4","D4","D4","
D4","L3","U1","R2 "])
add_r ("R1" ,[" U3","L4","D2","B1","L1","F1","R1","R1","R1","R3","R4","R2","R1","R1","
R1","R1","R1","R1 "])
add_r ("R2" ,[" R2","R2","R2","B2","L2","F2","R2","R2","R2","R1","R3","R4","R2","R2","
R2","D4","L3","U1 "])
add_r ("R3" ,[" U4","L2","D1","R3","R3","R3","F3","L3","B3","R4","R2","R1","R3","R3","
R3","R3","R3","R3 "])
add_r ("R4" ,[" R4","R4","R4","R4","R4","R4","F4","L4","B4","R2","R1","R3","R4","R4","
R4","D3","L1","U2 "])
add_r ("L1" ,[" L1","L1","L1","F1","R1","B1","L1","L1","L1","L1","L1","L1","L3","L4","
L2","U2","R4","D3 "])
add_r ("L2" ,[" D1","R3","U4","F2","R2","B2","L2","L2","L2","L2","L2","L2","L1","L3","
L4","L2","L2","L2 "])
add_r ("L3" ,[" L3","L3","L3","L3","L3","L3","B3","R3","F3","L3","L3","L3","L4","L2","
L1","U1","R2","D4 "])
add_r ("L4" ,[" D2","R1","U3","L4","L4","L4","B4","R4","F4","L4","L4","L4","L2","L1","
L3","L4","L4","L4 "])
add_r ("B1" ,[" B1","B1","B1","L1","F1","R1","B1","B1","B1","U4","F4","D4","B1","B1","
B1","B3","B4","B2 "])
add_r ("B2" ,[" B2","B2","B2","L2","F2","R2","B2","B2","B2","B2","B2","B2","D3","F3","
U3","B1","B3","B4 "])
add_r ("B3" ,[" B3","B3","B3","B3","B3","B3","R3","F3","L3","U2","F2","D2","B3","B3","
B3","B4","B2","B1 "])
add_r ("B4" ,[" B4","B4","B4","B4","B4","B4","R4","F4","L4","B4","B4","B4","D1","F1","
U1","B2","B1","B3 "])
189
Each MUX has 32 inputs, each has width of 3 bits: colors from ”source” facelets. It has 3-bit output (color for
”destination” facelet). It has 5-bit selector, for 18 turns. Other selector values (32-18=14 values) are not used at all.
The whole problem is to build a circuit and then ask SAT solver to set ”switches” to such a state, when input and
output are determined (by us).
Now the problem is to represent MUX in CNF terms.
From EE8 courses we can remember about a simple if-then-else (ITE) gate, it takes 3 inputs (”selector”, ”true” and
”false”) and it has 1 output. Depending on ”selector” input it ”connects” output with ”true” or ”false” input. Using tree
of ITE gates we first can build 32-to-1 MUX, then wide 32*3-to-3 MUX.
I once have written small utility to search for shortest possible CNF formula for a specific function, in a brute-
force manner (https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/puzzles/rubik2/SAT/XOR_
CNF_bf.c). It was inspired by ”aha! hacker assistant” by Henry Warren. So here is a function:
// ITE:
bool tmp;
if (v [0]==0)
tmp=v[1];
else
tmp=v[2];
try_all_CNFs_of_len (1)
try_all_CNFs_of_len (2)
try_all_CNFs_of_len (3)
try_all_CNFs_of_len (4)
found a CNF:
p cnf 4 4
-1 3 -4 0
1 2 -4 0
-1 -3 4 0
1 -2 4 0
1st variable is ”select”, 2nd is ”false”, 3rd is ”true”, 4th is ”output”. ”output” is an additional variable, added just like
in Tseitin transformations.
Hence, CNF formula is:
(! select OR true OR ! output ) AND ( select OR false OR ! output ) AND (! select OR !true OR
output ) AND ( select OR ! false OR output )
It assures that the ”output” will always be equal to one of inputs depending on ”select”.
Now we can build a tree of ITE gates:
190
clauses . append ([ neg(s),neg(t),x])
clauses . append ([s,neg(f),x])
return x
This is my old MUX I wrote for 16 inputs and 4-bit selector, but you’ve got the idea: this is 4-tier tree. It has 15 ITE
gates or 15*4=60 clauses.
Now the question, is it possible to make it smaller? I’ve tried to use Mathematica. First I’ve built truth table for 4-bit
selector:
...
1 1 1 1 1 1 1 1 1 1 0 1 0 1 0 1 1 0 1 1 0 0
1 1 1 1 1 1 1 1 1 1 0 1 0 1 0 1 1 0 1 1 1 1
1 1 1 1 1 1 1 1 1 1 0 1 0 1 0 1 1 1 0 0 0 0
1 1 1 1 1 1 1 1 1 1 0 1 0 1 0 1 1 1 0 0 1 1
1 1 1 1 1 1 1 1 1 1 0 1 0 1 0 1 1 1 0 1 0 0
1 1 1 1 1 1 1 1 1 1 0 1 0 1 0 1 1 1 0 1 1 1
1 1 1 1 1 1 1 1 1 1 0 1 0 1 0 1 1 1 1 0 0 0
1 1 1 1 1 1 1 1 1 1 0 1 0 1 0 1 1 1 1 0 1 1
1 1 1 1 1 1 1 1 1 1 0 1 0 1 0 1 1 1 1 1 0 0
1 1 1 1 1 1 1 1 1 1 0 1 0 1 0 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1 1 0 1 0 1 1 0 0 0 0 0 0 0
1 1 1 1 1 1 1 1 1 1 0 1 0 1 1 0 0 0 0 0 1 1
1 1 1 1 1 1 1 1 1 1 0 1 0 1 1 0 0 0 0 1 0 0
1 1 1 1 1 1 1 1 1 1 0 1 0 1 1 0 0 0 0 1 1 1
1 1 1 1 1 1 1 1 1 1 0 1 0 1 1 0 0 0 1 0 0 0
1 1 1 1 1 1 1 1 1 1 0 1 0 1 1 0 0 0 1 0 1 1
1 1 1 1 1 1 1 1 1 1 0 1 0 1 1 0 0 0 1 1 0 0
...
First 4 bits is selector, then 16 bits of input. Then the possible output and the bit, indicating, if the output bit equals
to one of the inputs.
Then I load this table to Mathematica and make CNF expression out of truth table:
arr= Import ["/ home/ dennis /P/ Rubik /TT"," Table "]
191
{{0 ,0 ,0 ,0,0 ,0,0,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,1} ,
{0,0,0,0,0,0 ,0,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,1 ,0} ,
{0,0,0,0,0,0 ,0,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,1 ,0 ,0} ,
{0,0,0,0,0,0 ,0,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,1 ,1 ,1} ,
{0,0,0,0,0,0 ,0,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,1 ,0 ,0 ,1} ,
{0,0,0,0,0,0 ,0,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,1 ,0 ,1 ,0} ,
{0,0,0,0,0,0 ,0,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,1 ,1 ,0 ,0} ,
{0,0,0,0,0,0 ,0,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,1 ,1 ,1 ,1} ,
{0,0,0,0,0,0 ,0,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,1 ,0 ,0 ,0 ,1} ,
...2097135... ,
{1,1,1,1,1,1 ,1,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,0 ,0 ,0 ,0} ,
{1,1,1,1,1,1 ,1,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,0 ,0 ,1 ,1} ,
{1,1,1,1,1,1 ,1,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,0 ,1 ,0 ,0} ,
{1,1,1,1,1,1 ,1,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,0 ,1 ,1 ,1} ,
{1,1,1,1,1,1 ,1,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,0 ,0 ,0} ,
{1,1,1,1,1,1 ,1,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,0 ,1 ,1} ,
{1,1,1,1,1,1 ,1,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,0 ,0} ,
{1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1 ,1}}
BooleanConvert [ BooleanFunction [TT ,{s3 ,s2 ,s1 ,s0 , i15 ,i14 ,i13 ,i12 ,i11 ,i10 ,i9 ,i8 ,i7 ,i6 ,i5 ,
i4 ,i3 , i2 , i1 , i0 ,x}] ," CNF "]
(!i0||s0||s1 ||s2 || s3 ||x)&&( i0 || s0 || s1 || s2 || s3 ||!x)&&(! i1 ||! s0 || s1 || s2 || s3 ||x)&&( i1 ||! s0
||s1||s2 ||s3 ||!x)&&(! i10 || s0 ||! s1 || s2 ||! s3 ||x)&&
(i10 ||s0 ||! s1 || s2 ||! s3 ||!x)&&(! i11 ||! s0 ||! s1 || s2 ||! s3 ||x)&&( i11 ||! s0 ||! s1 || s2 ||! s3 ||!x)
&&(! i12 || s0||s1 ||! s2 ||! s3 ||x)&&( i12 || s0 || s1 ||! s2 ||! s3 ||!x)&&
(! i13 ||! s0|| s1 ||! s2 ||! s3 ||x)&&( i13 ||! s0 || s1 ||! s2 ||! s3 ||!x)&&(! i14 || s0 ||! s1 ||! s2 ||! s3 ||x)
&&( i14 ||s0 ||! s1 ||! s2 ||! s3 ||!x)&&
(! i15 ||! s0 ||! s1 ||! s2 ||! s3 ||x)&&( i15 ||! s0 ||! s1 ||! s2 ||! s3 ||!x)&&(! i2 || s0 ||! s1 || s2 || s3 ||x)
&&( i2||s0 ||! s1 || s2 || s3 ||!x)&&(! i3 ||! s0 ||! s1 || s2 || s3 ||x)&&
(i3 ||! s0 ||! s1 || s2 || s3 ||!x)&&(! i4 || s0 || s1 ||! s2 || s3 ||x)&&( i4 || s0 || s1 ||! s2 || s3 ||!x)&&(! i5
||! s0||s1 ||! s2 || s3 ||x)&&( i5 ||! s0 || s1 ||! s2 || s3 ||!x)&&
(!i6||s0 ||! s1 ||! s2 || s3 ||x)&&( i6 || s0 ||! s1 ||! s2 || s3 ||!x)&&(! i7 ||! s0 ||! s1 ||! s2 || s3 ||x)&&( i7
||! s0 ||! s1 ||! s2 || s3 ||!x)&&(! i8 || s0 || s1 || s2 ||! s3 ||x)&&
(i8 ||s0 ||s1||s2 ||! s3 ||!x)&&(! i9 ||! s0 || s1 || s2 ||! s3 ||x)&&( i9 ||! s0 || s1 || s2 ||! s3 ||!x)
192
Look closer to CNF expression:
...
It has simple structure and there are 32 clauses, against 60 in my previous attempt. Will it work faster? No, as my
experience shows, it doesn’t speed up anything. Anyway, I used the latter idea to make MUX.
The following function makes pack of MUXes for each state, based on what I’ve got from Mathematica:
# src=list of 18 facelets
def add_r (dst , src):
global facelets , selectors , s
t=s. create_var ()
s.fix(t,True)
for state in range (STATES -1):
src_vectors =[]
for tmp in src:
src_vectors . append ( facelets [ state ][ tmp ])
# padding : there are 18 used MUX inputs , so add 32 -18=14 for padding
for i in range (32 -18):
src_vectors . append ([t,t,t])
193
dst_vector =s. create_wide_MUX ( src_vectors , selectors [ state ])
s. fix_BV_EQ (dst_vector , facelets [ state +1][ dst ])
...
# dst , FCW FH FCCW UCW UH UCCW DCW DH DCCW RCW RH RCCW LCW LH
LCCW BCW BH BCCW
add_r ("F1" ,["F3","F4","F2","R1","B1","L1","F1","F1","F1","F1","F1","F1","U1","B4","
D1","F1","F1","F1"])
add_r ("F2" ,["F1","F3","F4","R2","B2","L2","F2","F2","F2","D2","B3","U2","F2","F2","
F2","F2","F2","F2"])
add_r ("F3" ,["F4","F2","F1","F3","F3","F3","L3","B3","R3","F3","F3","F3","U3","B2","
D3","F3","F3","F3"])
add_r ("F4" ,["F2","F1","F3","F4","F4","F4","L4","B4","R4","D4","B1","U4","F4","F4","
F4","F4","F4","F4"])
add_r ("U1" ,["U1","U1","U1","U3","U4","U2","U1","U1","U1","U1","U1","U1","B4","D1","
F1","R2","D4","L3"])
...
set_state (0, {"F":" RYOG", "U":" YRGO", "D":" WRBO", "R":" GYWB", "L":" BYWG", "B":" BOWR "})
TURNS= 11
sat!
RCW
DH
BCW
UCW
UH
DCCW
FH
BH
BH
FH
UH
TURNS= 10
sat!
RCCW
UCCW
UCW
RCW
RCW
UH
FCW
UCCW
DCCW
DH
TURNS= 9
sat!
BCCW
194
LH
RH
BCW
RCW
RCCW
DCW
FH
LCW
TURNS= 8
sat!
RCW
UH
BCW
UCCW
LCW
LH
RCW
FCW
TURNS= 7
sat!
DCCW
DH
UH
UCW
BCW
UH
RCW
TURNS= 6
sat!
RCW
UCCW
DCCW
LCW
UH
DH
TURNS= 5
sat!
LCW
FCW
BCW
RH
LCCW
TURNS= 4
sat!
RCW
DCW
UCW
RCW
TURNS= 3
unsat!
195
Even on my relic Intel Atom 1.5GHz netbook it takes just 20s.
You can find redundant turns in 11-turn solution, like double UH turns. Of course, two UH turns returns the cube to
the previous state. So these ”annihilating turns” are added if the final solution can be shorter. Why the solver added it?
There is no ”no operation” turn. And the solver is forced to fit into 11 turns. Hence, it do what it can to produce correct
solution.
Now a hard example:
set_state (0, {"F":" RORW", "U":" BRBB", "D":" GOOR", "R":" WYGY", "L":" OWYW", "B":" BYGG "})
TURNS= 11
sat!
UCW
BCW
LCCW
BH
DCW
RH
DCCW
FCW
UH
LCW
RCW
TURNS= 10
sat!
RH
BCCW
LCCW
RH
BCCW
LH
BCW
DH
BCW
LCCW
...
196
8.6.3 3*3*3 cube
3*3*3 cube requires much more turns (20), so I couldn’t solve it with my methods. I have success to solve maybe 10 or
11 turns. But some people do all 20 turns: Jingchao Chen.
However, you can use 3*3*3 cube to play, because it can act as 2*2*2 cube: just use corners and ignore edge and center
cubes. Here is mine I used, you can see that corners are correctly solved:
from z3 import *
FACES =6
FACELETS =9
197
[ s[0][6] , s[0][3] , s[0][0] , s[0][7] , s[0][4] , s[0][1] , s[0][8] , s
[0][5] , s[0][2] , ], # new F
[ s[1][0] , s[1][1] , s[1][2] , s[1][3] , s[1][4] , s[1][5] , s[4][8] , s
[4][5] , s[4][2] , ], # new U
[ s[3][6] , s[3][3] , s[3][0] , s[2][3] , s[2][4] , s[2][5] , s[2][6] , s
[2][7] , s[2][8] , ], # new D
[ s[1][6] , s[3][1] , s[3][2] , s[1][7] , s[3][4] , s[3][5] , s[1][8] , s
[3][7] , s[3][8] , ], # new R
[ s[4][0] , s[4][1] , s[2][0] , s[4][3] , s[4][4] , s[2][1] , s[4][6] , s
[4][7] , s[2][2] , ], # new L
[ s[5][0] , s[5][1] , s[5][2] , s[5][3] , s[5][4] , s[5][5] , s[5][6] , s
[5][7] , s[5][8] , ] ] # new B
...
move_names =[" FCW", "FCCW", "UCW", "UCCW", "DCW", "DCCW", "RCW", "RCCW", "LCW", "LCCW", "
BCW", "BCCW", "FH", "UH", "DH", "RH", "LH", "BH "]
198
def colors_to_array_of_ints (s):
rt =[]
for c in s:
if c=='W ':
rt. append (True)
else:
rt. append ( False)
return rt
init_F , init_U , init_D , init_R , init_L , init_B = set_current_state ({"F ":".... W..W.", "U
":"... W...W.", "D ":"....... W.", "R ":".. W...W.." , "L ":"...... W.." , "B ":".. W ......"})
s= Solver ()
state =[[[ Bool(' state %d_%d_%d' % (n, side , i)) for i in range ( FACELETS )] for side
in range ( FACES)] for n in range ( STEPS +1)]
# initial state
for i in range ( FACELETS ):
s.add( state [0][0][ i]== init_F [i])
s.add( state [0][1][ i]== init_U [i])
s.add( state [0][2][ i]== init_D [i])
s.add( state [0][3][ i]== init_R [i])
s.add( state [0][4][ i]== init_L [i])
s.add( state [0][5][ i]== init_B [i])
if s.check () == sat:
print "sat"
m=s. model ()
for n in range ( STEPS ):
print move_names [int(str(m[op[n]]))]
exit (0)
199
one_face_SMT/rubik3_z3.py )
trying 1 steps
trying 2 steps
trying 3 steps
trying 4 steps
trying 5 steps
trying 6 steps
trying 7 steps
trying 8 steps
sat
LCW
UCCW
BCW
LCW
RCCW
BCCW
UCW
LCCW
Now the fun statistics. Using random walk I collected 928 states and then I tried to solve one (white/front) face for
each state.
1 turns = 4
5 turns = 5
57 turns= 6
307 turns= 7
501 turns= 8
56 turns= 9
1 turns = 10
It seems that majority of all states can be solved for 7-8 half turns (half-turn is one of 18 turns we used here). But
there is at least one state which must be solved with 10 half turns. Maybe 10 is a ”god’s number” for one face, like 20 for
all 6 faces?
8.8 Numberlink
8.8.1 Numberlink (AKA Flow Free) puzzle (Z3Py)
You probably saw Flow Free puzzle:
Figure 8.9
200
I’ll stick to Numberlink version of the puzzle. This is the example puzzle from Wikipedia:
Figure 8.10
This is solved:
Figure 8.11
from z3 import *
# connections between cells . L means the cell has connection with cell at left , etc:
L=[[ Bool('L_r%d_c%d' % (r,c)) for c in range (width )] for r in range ( height )]
R=[[ Bool('R_r%d_c%d' % (r,c)) for c in range (width )] for r in range ( height )]
U=[[ Bool('U_r%d_c%d' % (r,c)) for c in range (width )] for r in range ( height )]
201
D=[[ Bool('D_r%d_c%d' % (r,c)) for c in range (width )] for r in range ( height )]
s= Solver ()
# yes , I know , we have 4 bools for each cell at this point , and we can half this number ,
# but anyway , for the sake of simplicity , this could be better .
# if L [][]== True , cell 's number must be equal to the number of cell at left , etc
:
if c!=0:
s.add(If(L[r][c], cells [r][c]== cells [r][c -1] , True))
if c!= width -1:
s.add(If(R[r][c], cells [r][c]== cells [r][c+1] , True))
if r!=0:
s.add(If(U[r][c], cells [r][c]== cells [r -1][c], True))
if r!= height -1:
s.add(If(D[r][c], cells [r][c]== cells [r+1][c], True))
202
# L/R/U/D at borders sometimes must be always False :
for r in range ( height ):
s.add(L[r ][0]== False )
s.add(R[r][ width -1]== False )
# print solution :
print s. check ()
m=s. model ()
print ""
print ""
print ""
if tu and td:
row=row+"�"
if tr and td:
row=row+"�"
if tr and tu:
row=row+"�"
if tl and td:
row=row+"�"
if tl and tu:
row=row+"�"
if tl and tr:
203
row=row+"�"
else:
row=row+t
print row
The solution:
sat
2 2 2 4 4 4 4
2 3 2 2 2 5 4
2 3 3 3 1 5 4
2 5 5 5 1 5 4
2 5 1 1 1 5 4
2 5 1 5 5 5 4
2 5 5 5 4 4 4
R D| LR | L D| R | LR | LR | L D|
UD| D| RU | LR | L | D| UD|
UD| RU | LR | L | D| UD| UD|
UD| R D| LR | L | UD| UD| UD|
UD| UD| R D| LR | L U | UD| UD|
UD| UD| U | R D| LR | L U | UD|
U | RU | LR | L U | R | LR | L U |
8.8.2 Numberlink (AKA Flow Free) puzzle as a MaxSAT problem + toy PCB router
Let’s revisit my solution for Numberlink (AKA Flow Free) puzzle written for Z3Py.
What if holes in the puzzle exist? Can we make all paths as short as possible?
I’ve rewritten the puzzle solver using my own SAT library and now I use Open-WBO MaxSAT solver, see the source
code, which is almost the same: https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/puzzles/
numberlink/MaxSAT/numberlink_WBO.py.
But now we “maximize” number of empty cells:
204
Figure 8.13
This is a solution with shortest possible paths. Others are possible, but their sum wouldn’t be shorter. This is like toy
PCB routing.
What if we comment the s.fix_soft_always_true(cell_is_empty[r][c], 1) line and set maxsat=True?
Figure 8.14
Lines 2 and 3 “roaming” chaotically, but the solution is correct, under given constraints.
The files: https://github.com/DennisYurichev/SAT_SMT_by_example/tree/master/puzzles/numberlink/MaxSAT.
With the use of three different weights, namely 1 lb., 3 lb., and 9 lb., how many objects of different
weights can be weighed, if the objects is to be weighed and the given weights may be placed in either pan
of the scale? 15, 13, 11, 9, 7
This is fun!
from z3 import *
205
w1 , w3 , w9 , obj = Ints('w1 w3 w9 obj ')
s= Solver ()
206
if str(d). startswith (" z3name "):
continue
c=d()
block . append (c != m[d])
s.add(Or(block ))
else:
print " total results ", len( results )
break
The output:
Suppose a survey revealed that 70% of the population visited an amusement park and 80% visited a
national park. At least what percentage of the population visited both?
The problem is supposed to be solved using finite sets counting... But I’m slothful student and would try Z3.
from z3 import *
# each element is 0/1 , reflecting 10% of park1 / park2 levels of attendance ...
207
p1 =[ Int('park1_ %d' % i) for i in range (10)]
p2 =[ Int('park2_ %d' % i) for i in range (10)]
# 1 if visited both , 0 otherwise :
b=[ Int('both_ %d' % i) for i in range (10)]
s= Optimize ()
# sum of p1 [] must be 7 (or 70%)
s.add(Sum(p1)==7)
# sum of p2 [] must be 8 (or 80%)
s.add(Sum(p2)==8)
both=Int('both ')
s.add(Sum(b)== both)
s. minimize (both)
#s. maximize (both)
assert s. check () == sat
m=s. model ()
print " park1 : "+"".join ([("*" if m[p1[i]]. as_long () ==1 else ".") for i in range (10) ])
print " park2 : "+"".join ([("*" if m[p2[i]]. as_long () ==1 else ".") for i in range (10) ])
print "both : "+"".join ([("*" if m[b[i]]. as_long () ==1 else ".") for i in range (10) ])+"
(%d)" % m[both ]. as_long ()
This is fun!
If minimize:
park1 : ***...****
park2 : *..*******
both : *.....**** (5)
If maximize:
park1 : ..*******.
park2 : ..********
both : ..*******. (7)
In other words, “stars” are allocated in such a way, so that the sum of “stars” in b[] would be minimal/maximal.
Observing this, we can deduce the general formula:
Maximal both = min(park1, park2)
What about minimal both? We can see that “stars” from one park1 must “shift out” or “hide in” to what corresponding
empty space of park2. So, minimal both = park2 - (100% - park1)
SMT solver is overkill for the job, but perfect for illustration and helping in better understanding.
208
Suppose that 100 senators voted on three separate senate bills as follows: 70 percent of the senators
voted for the first bill, 65 percent voted for the second bill, and 60 percent voted for the third bill. At
least what percentage of the senators voted for all three bills?
Suppose that 25 people attended a conference with three sessions, where 15 people attended the first
session, 18 the second session, and 12 the third session. At least how many people attended all three
sessions?
8.11 Alphametics
According to Donald Knuth, the term “Alphametics” was coined by J. A. H. Hunter. This is a puzzle: what decimal digits
in 0..9 range must be assigned to each letter, so the following equation will be true?
SEND
+ MORE
-----
MONEY
# SEND+MORE= MONEY
D, E, M, N, O, R, S, Y = Ints('D, E, M, N, O, R, S, Y')
s= Solver ()
s.add (1000* S +100* E+10*N+D + 1000* M+100* O+10*R+E == 10000* M +1000* O+100* N+10*E+Y)
print s. check ()
print s. model ()
Output:
sat
[E, = 5,
S, = 9,
M, = 1,
N, = 6,
D, = 7,
209
R, = 8,
O, = 0,
Y = 2]
A, I, L, N, O, R, S, T, V = Ints('A, I, L, N, O, R, S, T, V')
s= Solver ()
print s. check ()
print s. model ()
sat
[L, = 6,
S, = 7,
N, = 2,
T, = 1,
I, = 5,
V = 3,
A, = 8,
R, = 9,
O, = 4,
TRIO = 1954 ,
SONATA , = 742818 ,
VIOLA , = 35468 ,
VIOLIN , = 354652]
210
# H+E+L+L+O = W+O+R+L+D = 25
s= Solver ()
s.add(H+E+L+L+O == 25)
s.add(W+O+R+L+D == 25)
print s. check ()
print s. model ()
sat
[D = 5, R = 4, O = 3, E = 8, L = 6, W = 7, H = 2]
This is an exercise Q209 from the [Companion to the Papers of Donald Knuth]10 .
KNIFE
FORK
SPOON
SOUP
------
SUPPER
E, F, I, K, N, O, P, R, S, U = Ints('E F I K N O P R S U')
s= Solver ()
211
s.add(And(U >=0, U <=9))
#s.add(S!=0)
KNIFE , FORK , SPOON , SOUP , SUPPER = Ints('KNIFE FORK SPOON SOUP SUPPER ')
print s. check ()
print s. model ()
sat
[K = 7,
N = 4,
R = 9,
I = 1,
E = 6,
S = 0,
O = 3,
F = 5,
U = 8,
P = 2,
SUPPER = 82269 ,
SOUP = 382 ,
SPOON = 2334 ,
FORK = 5397 ,
KNIFE = 74156]
S is zero, so SUPPER value is starting with leading (removed) zero. Let’s say, we don’t like it. Add this to resolve it:
s.add(S!=0)
sat
[K = 8,
N = 4,
R = 3,
I = 7,
E = 6,
212
S = 1,
O = 9,
F = 2,
U = 0,
P = 5,
SUPPER = 105563 ,
SOUP = 1905 ,
SPOON = 15994 ,
FORK = 2938 ,
KNIFE = 84726]
# this is " reverse " table , it has value for each letter :
letters =[ Int('letter_ %d' % i) for i in range (26)]
s= Solver ()
# all items in digits [] table must be distinct , because no two letters can share same
number :
s.add( Distinct ( digits ))
# all numbers are in 0..25 range , because each number in this table defines character :
for i in range (10):
s.add(And( digits [i]>=0, digits [i] <26))
213
If( digits [3]==i,3,
If( digits [4]==i,4,
If( digits [5]==i,5,
If( digits [6]==i,6,
If( digits [7]==i,7,
If( digits [8]==i,8,
If( digits [9]==i ,9 ,99999999) ))))))))))
# the last word is "sum" all the rest are " addends ":
words =['APPLE ', 'BANANA ', 'BREAD ', 'CAKE ', 'CAVIAR ', 'CHEESE ', 'CHIPS ', 'COFFEE ', 'EGGS '
, 'FISH ', 'HONEY ', 'JAM ', 'JELLY ', 'JUICE ', 'MILK ', 'OATMEAL ', 'ORANGE ', 'PANCAKE ',
'PIZZA ', 'STEAK ', 'TEA ', 'TOMATO ', 'WAFFLE ', 'LUNCH ']
print s. check ()
m=s. model ()
# print m
sat
EGGS
214
JELLY
LUNCH
C 5
E 6
G 3
H 7
J 0
L 1
N 4
S 8
U 2
Y 9
sat
CAKE
TEA
LUNCH
A 8
C 3
E 1
H 9
J 6
K 2
L 0
N 5
T 7
U 4
Add this:
sat
EGGS
HONEY
LUNCH
C 6
E 7
G 9
H 4
L 5
N 8
O 2
S 3
U 0
Y 1
215
The files
https://github.com/DennisYurichev/SAT_SMT_by_example/tree/master/puzzles/alphametics.
There are 210 = 1024 possible 10-letter strings in which each letter is either an A or a B. Find the
number of such strings that do not have more than 3 adjacent letters that are identical.
We just find all 10-bit numbers, which don’t have 4-bit runs of zeros or ones:
from z3 import *
s= Solver ()
results =[]
while True:
if s. check () == sat:
m = s. model ()
print "0x%x" % m[a]. as_long ()
It’s 548.
If the innocent told the truth and the guilty lied , who is guilty ? ( Remember that false
statements imply anything ).
216
I think Ed and Ted are innocent and Fred is guilty . Is it in contradiction with
statement 2.
( https://math.stackexchange.com/questions/15199/implication-of-three-statements )
And how to convert this into logic statements:
Fg means Fred is guilty , and Fi means Fred is innocent , Tg and Ti for Ted and Eg and Ei
for Ed.
1. Ed says: Fg ∧ Ti
2. Fred says: Eg → Tg
3. Ted says: Ti ∧ (Fg ∨ Eg)
We know that the guilty is lying and the innocent tells the truth .
...
from z3 import *
s= Solver ()
s.add(fg !=fi)
s.add(tg !=ti)
s.add(eg !=ei)
The result:
sat
[fg = False ,
ti = False ,
tg = True ,
eg = True ,
ei = False ,
fi = True]
217
(Implies can be replaced with Or(Not(x), y).)
Now in SMT-LIB v2 form:
; tested with Z3 and MK85:
(check -sat)
(get - model )
218
(define -fun internal !16 () Bool true) ; var_no =24
(define -fun internal !17 () Bool true) ; var_no =25
(define -fun internal !18 () Bool false ) ; var_no =26
(define -fun internal !19 () Bool false ) ; var_no =27
(define -fun internal !20 () Bool true) ; var_no =28
)
219
c generate_EQ id1=ei , id2= internal !10 , var1 =8, var2 =18
c generate_XOR id1=ei id2= internal !10 var1 =8 var2 =18 out id= internal !11 out var =19
-8 -18 -19 0
8 18 -19 0
8 -18 19 0
-8 18 19 0
c generate_NOT id= internal !11 var =19 , out id= internal !12 out var =20
-20 -19 0
20 19 0
c create_assert () id= internal !12 var =20
20 0
c generate_NOT id=eg var =7, out id= internal !13 out var =21
-21 -7 0
21 7 0
c generate_OR id1= internal !13 id2=tg var1 =21 var2 =5 out id= internal !14 out var =22
21 5 -22 0
-21 22 0
-5 22 0
c generate_EQ id1=fi , id2= internal !14 , var1 =4, var2 =22
c generate_XOR id1=fi id2= internal !14 var1 =4 var2 =22 out id= internal !15 out var =23
-4 -22 -23 0
4 22 -23 0
4 -22 23 0
-4 22 23 0
c generate_NOT id= internal !15 var =23 , out id= internal !16 out var =24
-24 -23 0
24 23 0
c create_assert () id= internal !16 var =24
24 0
c generate_OR id1=fg id2=eg var1 =3 var2 =7 out id= internal !17 out var =25
3 7 -25 0
-3 25 0
-7 25 0
c generate_AND id1=ti id2= internal !17 var1 =6 var2 =25 out id= internal !18 out var =26
-6 -25 26 0
6 -26 0
25 -26 0
c generate_EQ id1=ti , id2= internal !18 , var1 =6, var2 =26
c generate_XOR id1=ti id2= internal !18 var1 =6 var2 =26 out id= internal !19 out var =27
-6 -26 -27 0
6 26 -27 0
6 -26 27 0
-6 26 27 0
c generate_NOT id= internal !19 var =27 , out id= internal !20 out var =28
-28 -27 0
28 27 0
c create_assert () id= internal !20 var =28
28 0
220
c generate_NOT id= internal !4 var =12 , out id= internal !5 out var =13
c generate_NOT id= internal !5 var =13 , out id= internal !6 out var =14
c create_assert () id= internal !6 var =14
c generate_EQ id1=eg , id2=ei , var1 =7, var2 =8
c generate_XOR id1=eg id2=ei var1 =7 var2 =8 out id= internal !7 out var =15
c generate_NOT id= internal !7 var =15 , out id= internal !8 out var =16
c generate_NOT id= internal !8 var =16 , out id= internal !9 out var =17
c create_assert () id= internal !9 var =17
c generate_AND id1=fg id2=ti var1 =3 var2 =6 out id= internal !10 out var =18
c generate_EQ id1=ei , id2= internal !10 , var1 =8, var2 =18
c generate_XOR id1=ei id2= internal !10 var1 =8 var2 =18 out id= internal !11 out var =19
c generate_NOT id= internal !11 var =19 , out id= internal !12 out var =20
c create_assert () id= internal !12 var =20
c generate_NOT id=eg var =7, out id= internal !13 out var =21
c generate_OR id1= internal !13 id2=tg var1 =21 var2 =5 out id= internal !14 out var =22
c generate_EQ id1=fi , id2= internal !14 , var1 =4, var2 =22
c generate_XOR id1=fi id2= internal !14 var1 =4 var2 =22 out id= internal !15 out var =23
c generate_NOT id= internal !15 var =23 , out id= internal !16 out var =24
c create_assert () id= internal !16 var =24
c generate_OR id1=fg id2=eg var1 =3 var2 =7 out id= internal !17 out var =25
c generate_AND id1=ti id2= internal !17 var1 =6 var2 =25 out id= internal !18 out var =26
c generate_EQ id1=ti , id2= internal !18 , var1 =6, var2 =26
c generate_XOR id1=ti id2= internal !18 var1 =6 var2 =26 out id= internal !19 out var =27
c generate_NOT id= internal !19 var =27 , out id= internal !20 out var =28
c create_assert () id= internal !20 var =28
221
#!/ usr/bin/env python
from z3 import *
s= Solver ()
s.add(a== And(b,c,d,e,f))
s.add(b== And(Not(c),Not(d),Not(e),Not(f)))
s.add(c== And(a,b))
s.add(d== Or(And(a,Not(b),Not(c)), And(Not(a),b,Not(c)), And(Not(a),Not(b),c)))
s.add(e== And(Not(a),Not(b),Not(c),Not(d)))
s.add(f== And(Not(a),Not(b),Not(c),Not(d), Not(e)))
print s. check ()
print s. model ()
The answer:
sat
[f = False ,
b = False ,
a = False ,
c = False ,
d = False ,
e = True]
(check -sat)
(get - model )
222
sat
(model
(define -fun a () Bool false )
(define -fun b () Bool false )
(define -fun c () Bool false )
(define -fun d () Bool false )
(define -fun e () Bool true)
(define -fun f () Bool false )
)
Now let’s have fun and see how my toy SMT solver tackles this example. What internal variables it creates?
$ ./ MK85 --dump -internal - variables mc.smt2
sat
(model
(define -fun always_false () Bool false ) ; var_no =1
(define -fun always_true () Bool true) ; var_no =2
(define -fun a () Bool false ) ; var_no =3
(define -fun b () Bool false ) ; var_no =4
(define -fun c () Bool false ) ; var_no =5
(define -fun d () Bool false ) ; var_no =6
(define -fun e () Bool true) ; var_no =7
(define -fun f () Bool false ) ; var_no =8
(define -fun internal !1 () Bool false ) ; var_no =9
(define -fun internal !2 () Bool false ) ; var_no =10
(define -fun internal !3 () Bool false ) ; var_no =11
(define -fun internal !4 () Bool false ) ; var_no =12
(define -fun internal !5 () Bool false ) ; var_no =13
(define -fun internal !6 () Bool true) ; var_no =14
(define -fun internal !7 () Bool true) ; var_no =15
(define -fun internal !8 () Bool true) ; var_no =16
(define -fun internal !9 () Bool true) ; var_no =17
(define -fun internal !10 () Bool false ) ; var_no =18
(define -fun internal !11 () Bool false ) ; var_no =19
(define -fun internal !12 () Bool true) ; var_no =20
(define -fun internal !13 () Bool false ) ; var_no =21
(define -fun internal !14 () Bool false ) ; var_no =22
(define -fun internal !15 () Bool true) ; var_no =23
(define -fun internal !16 () Bool false ) ; var_no =24
(define -fun internal !17 () Bool false ) ; var_no =25
(define -fun internal !18 () Bool true) ; var_no =26
(define -fun internal !19 () Bool true) ; var_no =27
(define -fun internal !20 () Bool false ) ; var_no =28
(define -fun internal !21 () Bool true) ; var_no =29
(define -fun internal !22 () Bool false ) ; var_no =30
(define -fun internal !23 () Bool true) ; var_no =31
(define -fun internal !24 () Bool false ) ; var_no =32
(define -fun internal !25 () Bool true) ; var_no =33
(define -fun internal !26 () Bool false ) ; var_no =34
(define -fun internal !27 () Bool false ) ; var_no =35
(define -fun internal !28 () Bool true) ; var_no =36
(define -fun internal !29 () Bool true) ; var_no =37
(define -fun internal !30 () Bool true) ; var_no =38
(define -fun internal !31 () Bool false ) ; var_no =39
(define -fun internal !32 () Bool false ) ; var_no =40
223
(define -fun internal !33 () Bool false ) ; var_no =41
(define -fun internal !34 () Bool true) ; var_no =42
(define -fun internal !35 () Bool true) ; var_no =43
(define -fun internal !36 () Bool true) ; var_no =44
(define -fun internal !37 () Bool true) ; var_no =45
(define -fun internal !38 () Bool true) ; var_no =46
(define -fun internal !39 () Bool true) ; var_no =47
(define -fun internal !40 () Bool true) ; var_no =48
(define -fun internal !41 () Bool true) ; var_no =49
(define -fun internal !42 () Bool false ) ; var_no =50
(define -fun internal !43 () Bool true) ; var_no =51
(define -fun internal !44 () Bool true) ; var_no =52
(define -fun internal !45 () Bool true) ; var_no =53
(define -fun internal !46 () Bool true) ; var_no =54
(define -fun internal !47 () Bool true) ; var_no =55
(define -fun internal !48 () Bool true) ; var_no =56
(define -fun internal !49 () Bool true) ; var_no =57
(define -fun internal !50 () Bool true) ; var_no =58
(define -fun internal !51 () Bool false ) ; var_no =59
(define -fun internal !52 () Bool false ) ; var_no =60
(define -fun internal !53 () Bool false ) ; var_no =61
(define -fun internal !54 () Bool true) ; var_no =62
)
What is in resulting CNF file to be fed into the external picosat SAT-solver?
p cnf 62 151
-1 0
2 0
c generate_AND id1=b id2=c var1 =4 var2 =5 out id= internal !1 out var =9
-4 -5 9 0
4 -9 0
5 -9 0
c generate_AND id1= internal !1 id2=d var1 =9 var2 =6 out id= internal !2 out var =10
-9 -6 10 0
9 -10 0
6 -10 0
c generate_AND id1= internal !2 id2=e var1 =10 var2 =7 out id= internal !3 out var =11
-10 -7 11 0
10 -11 0
7 -11 0
c generate_AND id1= internal !3 id2=f var1 =11 var2 =8 out id= internal !4 out var =12
-11 -8 12 0
11 -12 0
8 -12 0
c generate_EQ id1=a, id2= internal !4, var1 =3, var2 =12
c generate_XOR id1=a id2= internal !4 var1 =3 var2 =12 out id= internal !5 out var =13
-3 -12 -13 0
3 12 -13 0
3 -12 13 0
-3 12 13 0
c generate_NOT id= internal !5 var =13 , out id= internal !6 out var =14
-14 -13 0
14 13 0
c create_assert () id= internal !6 var =14
14 0
c generate_NOT id=c var =5, out id= internal !7 out var =15
-15 -5 0
224
15 5 0
c generate_NOT id=d var =6, out id= internal !8 out var =16
-16 -6 0
16 6 0
c generate_AND id1= internal !7 id2= internal !8 var1 =15 var2 =16 out id= internal !9 out var
=17
-15 -16 17 0
15 -17 0
16 -17 0
c generate_NOT id=e var =7, out id= internal !10 out var =18
-18 -7 0
18 7 0
c generate_AND id1= internal !9 id2= internal !10 var1 =17 var2 =18 out id= internal !11 out var
=19
-17 -18 19 0
17 -19 0
18 -19 0
c generate_NOT id=f var =8, out id= internal !12 out var =20
-20 -8 0
20 8 0
c generate_AND id1= internal !11 id2= internal !12 var1 =19 var2 =20 out id= internal !13 out
var =21
-19 -20 21 0
19 -21 0
20 -21 0
c generate_EQ id1=b, id2= internal !13 , var1 =4, var2 =21
c generate_XOR id1=b id2= internal !13 var1 =4 var2 =21 out id= internal !14 out var =22
-4 -21 -22 0
4 21 -22 0
4 -21 22 0
-4 21 22 0
c generate_NOT id= internal !14 var =22 , out id= internal !15 out var =23
-23 -22 0
23 22 0
c create_assert () id= internal !15 var =23
23 0
c generate_AND id1=a id2=b var1 =3 var2 =4 out id= internal !16 out var =24
-3 -4 24 0
3 -24 0
4 -24 0
c generate_EQ id1=c, id2= internal !16 , var1 =5, var2 =24
c generate_XOR id1=c id2= internal !16 var1 =5 var2 =24 out id= internal !17 out var =25
-5 -24 -25 0
5 24 -25 0
5 -24 25 0
-5 24 25 0
c generate_NOT id= internal !17 var =25 , out id= internal !18 out var =26
-26 -25 0
26 25 0
c create_assert () id= internal !18 var =26
26 0
c generate_NOT id=b var =4, out id= internal !19 out var =27
-27 -4 0
27 4 0
c generate_AND id1=a id2= internal !19 var1 =3 var2 =27 out id= internal !20 out var =28
-3 -27 28 0
3 -28 0
225
27 -28 0
c generate_NOT id=c var =5, out id= internal !21 out var =29
-29 -5 0
29 5 0
c generate_AND id1= internal !20 id2= internal !21 var1 =28 var2 =29 out id= internal !22 out
var =30
-28 -29 30 0
28 -30 0
29 -30 0
c generate_NOT id=a var =3, out id= internal !23 out var =31
-31 -3 0
31 3 0
c generate_AND id1= internal !23 id2=b var1 =31 var2 =4 out id= internal !24 out var =32
-31 -4 32 0
31 -32 0
4 -32 0
c generate_NOT id=c var =5, out id= internal !25 out var =33
-33 -5 0
33 5 0
c generate_AND id1= internal !24 id2= internal !25 var1 =32 var2 =33 out id= internal !26 out
var =34
-32 -33 34 0
32 -34 0
33 -34 0
c generate_OR id1= internal !22 id2= internal !26 var1 =30 var2 =34 out id= internal !27 out var
=35
30 34 -35 0
-30 35 0
-34 35 0
c generate_NOT id=a var =3, out id= internal !28 out var =36
-36 -3 0
36 3 0
c generate_NOT id=b var =4, out id= internal !29 out var =37
-37 -4 0
37 4 0
c generate_AND id1= internal !28 id2= internal !29 var1 =36 var2 =37 out id= internal !30 out
var =38
-36 -37 38 0
36 -38 0
37 -38 0
c generate_AND id1= internal !30 id2=c var1 =38 var2 =5 out id= internal !31 out var =39
-38 -5 39 0
38 -39 0
5 -39 0
c generate_OR id1= internal !27 id2= internal !31 var1 =35 var2 =39 out id= internal !32 out var
=40
35 39 -40 0
-35 40 0
-39 40 0
c generate_EQ id1=d, id2= internal !32 , var1 =6, var2 =40
c generate_XOR id1=d id2= internal !32 var1 =6 var2 =40 out id= internal !33 out var =41
-6 -40 -41 0
6 40 -41 0
6 -40 41 0
-6 40 41 0
c generate_NOT id= internal !33 var =41 , out id= internal !34 out var =42
-42 -41 0
226
42 41 0
c create_assert () id= internal !34 var =42
42 0
c generate_NOT id=a var =3, out id= internal !35 out var =43
-43 -3 0
43 3 0
c generate_NOT id=b var =4, out id= internal !36 out var =44
-44 -4 0
44 4 0
c generate_AND id1= internal !35 id2= internal !36 var1 =43 var2 =44 out id= internal !37 out
var =45
-43 -44 45 0
43 -45 0
44 -45 0
c generate_NOT id=c var =5, out id= internal !38 out var =46
-46 -5 0
46 5 0
c generate_AND id1= internal !37 id2= internal !38 var1 =45 var2 =46 out id= internal !39 out
var =47
-45 -46 47 0
45 -47 0
46 -47 0
c generate_NOT id=d var =6, out id= internal !40 out var =48
-48 -6 0
48 6 0
c generate_AND id1= internal !39 id2= internal !40 var1 =47 var2 =48 out id= internal !41 out
var =49
-47 -48 49 0
47 -49 0
48 -49 0
c generate_EQ id1=e, id2= internal !41 , var1 =7, var2 =49
c generate_XOR id1=e id2= internal !41 var1 =7 var2 =49 out id= internal !42 out var =50
-7 -49 -50 0
7 49 -50 0
7 -49 50 0
-7 49 50 0
c generate_NOT id= internal !42 var =50 , out id= internal !43 out var =51
-51 -50 0
51 50 0
c create_assert () id= internal !43 var =51
51 0
c generate_NOT id=a var =3, out id= internal !44 out var =52
-52 -3 0
52 3 0
c generate_NOT id=b var =4, out id= internal !45 out var =53
-53 -4 0
53 4 0
c generate_AND id1= internal !44 id2= internal !45 var1 =52 var2 =53 out id= internal !46 out
var =54
-52 -53 54 0
52 -54 0
53 -54 0
c generate_NOT id=c var =5, out id= internal !47 out var =55
-55 -5 0
55 5 0
c generate_AND id1= internal !46 id2= internal !47 var1 =54 var2 =55 out id= internal !48 out
var =56
227
-54 -55 56 0
54 -56 0
55 -56 0
c generate_NOT id=d var =6, out id= internal !49 out var =57
-57 -6 0
57 6 0
c generate_AND id1= internal !48 id2= internal !49 var1 =56 var2 =57 out id= internal !50 out
var =58
-56 -57 58 0
56 -58 0
57 -58 0
c generate_NOT id=e var =7, out id= internal !51 out var =59
-59 -7 0
59 7 0
c generate_AND id1= internal !50 id2= internal !51 var1 =58 var2 =59 out id= internal !52 out
var =60
-58 -59 60 0
58 -60 0
59 -60 0
c generate_EQ id1=f, id2= internal !52 , var1 =8, var2 =60
c generate_XOR id1=f id2= internal !52 var1 =8 var2 =60 out id= internal !53 out var =61
-8 -60 -61 0
8 60 -61 0
8 -60 61 0
-8 60 61 0
c generate_NOT id= internal !53 var =61 , out id= internal !54 out var =62
-62 -61 0
62 61 0
c create_assert () id= internal !54 var =62
62 0
Here are comments (starting with “c ” prefix), and my SMT-solver indicate, how each low-level logical gate is added,
its inputs (variable IDs and numbers) and outputs.
Let’s filter comments:
$ cat tmp.cnf | grep "^c "
c generate_AND id1=b id2=c var1 =4 var2 =5 out id= internal !1 out var =9
c generate_AND id1= internal !1 id2=d var1 =9 var2 =6 out id= internal !2 out var =10
c generate_AND id1= internal !2 id2=e var1 =10 var2 =7 out id= internal !3 out var =11
c generate_AND id1= internal !3 id2=f var1 =11 var2 =8 out id= internal !4 out var =12
c generate_EQ id1=a, id2= internal !4, var1 =3, var2 =12
c generate_XOR id1=a id2= internal !4 var1 =3 var2 =12 out id= internal !5 out var =13
c generate_NOT id= internal !5 var =13 , out id= internal !6 out var =14
c create_assert () id= internal !6 var =14
c generate_NOT id=c var =5, out id= internal !7 out var =15
c generate_NOT id=d var =6, out id= internal !8 out var =16
c generate_AND id1= internal !7 id2= internal !8 var1 =15 var2 =16 out id= internal !9 out var
=17
c generate_NOT id=e var =7, out id= internal !10 out var =18
c generate_AND id1= internal !9 id2= internal !10 var1 =17 var2 =18 out id= internal !11 out var
=19
c generate_NOT id=f var =8, out id= internal !12 out var =20
c generate_AND id1= internal !11 id2= internal !12 var1 =19 var2 =20 out id= internal !13 out
var =21
c generate_EQ id1=b, id2= internal !13 , var1 =4, var2 =21
c generate_XOR id1=b id2= internal !13 var1 =4 var2 =21 out id= internal !14 out var =22
c generate_NOT id= internal !14 var =22 , out id= internal !15 out var =23
228
c create_assert () id= internal !15 var =23
c generate_AND id1=a id2=b var1 =3 var2 =4 out id= internal !16 out var =24
c generate_EQ id1=c, id2= internal !16 , var1 =5, var2 =24
c generate_XOR id1=c id2= internal !16 var1 =5 var2 =24 out id= internal !17 out var =25
c generate_NOT id= internal !17 var =25 , out id= internal !18 out var =26
c create_assert () id= internal !18 var =26
c generate_NOT id=b var =4, out id= internal !19 out var =27
c generate_AND id1=a id2= internal !19 var1 =3 var2 =27 out id= internal !20 out var =28
c generate_NOT id=c var =5, out id= internal !21 out var =29
c generate_AND id1= internal !20 id2= internal !21 var1 =28 var2 =29 out id= internal !22 out
var =30
c generate_NOT id=a var =3, out id= internal !23 out var =31
c generate_AND id1= internal !23 id2=b var1 =31 var2 =4 out id= internal !24 out var =32
c generate_NOT id=c var =5, out id= internal !25 out var =33
c generate_AND id1= internal !24 id2= internal !25 var1 =32 var2 =33 out id= internal !26 out
var =34
c generate_OR id1= internal !22 id2= internal !26 var1 =30 var2 =34 out id= internal !27 out var
=35
c generate_NOT id=a var =3, out id= internal !28 out var =36
c generate_NOT id=b var =4, out id= internal !29 out var =37
c generate_AND id1= internal !28 id2= internal !29 var1 =36 var2 =37 out id= internal !30 out
var =38
c generate_AND id1= internal !30 id2=c var1 =38 var2 =5 out id= internal !31 out var =39
c generate_OR id1= internal !27 id2= internal !31 var1 =35 var2 =39 out id= internal !32 out var
=40
c generate_EQ id1=d, id2= internal !32 , var1 =6, var2 =40
c generate_XOR id1=d id2= internal !32 var1 =6 var2 =40 out id= internal !33 out var =41
c generate_NOT id= internal !33 var =41 , out id= internal !34 out var =42
c create_assert () id= internal !34 var =42
c generate_NOT id=a var =3, out id= internal !35 out var =43
c generate_NOT id=b var =4, out id= internal !36 out var =44
c generate_AND id1= internal !35 id2= internal !36 var1 =43 var2 =44 out id= internal !37 out
var =45
c generate_NOT id=c var =5, out id= internal !38 out var =46
c generate_AND id1= internal !37 id2= internal !38 var1 =45 var2 =46 out id= internal !39 out
var =47
c generate_NOT id=d var =6, out id= internal !40 out var =48
c generate_AND id1= internal !39 id2= internal !40 var1 =47 var2 =48 out id= internal !41 out
var =49
c generate_EQ id1=e, id2= internal !41 , var1 =7, var2 =49
c generate_XOR id1=e id2= internal !41 var1 =7 var2 =49 out id= internal !42 out var =50
c generate_NOT id= internal !42 var =50 , out id= internal !43 out var =51
c create_assert () id= internal !43 var =51
c generate_NOT id=a var =3, out id= internal !44 out var =52
c generate_NOT id=b var =4, out id= internal !45 out var =53
c generate_AND id1= internal !44 id2= internal !45 var1 =52 var2 =53 out id= internal !46 out
var =54
c generate_NOT id=c var =5, out id= internal !47 out var =55
c generate_AND id1= internal !46 id2= internal !47 var1 =54 var2 =55 out id= internal !48 out
var =56
c generate_NOT id=d var =6, out id= internal !49 out var =57
c generate_AND id1= internal !48 id2= internal !49 var1 =56 var2 =57 out id= internal !50 out
var =58
c generate_NOT id=e var =7, out id= internal !51 out var =59
c generate_AND id1= internal !50 id2= internal !51 var1 =58 var2 =59 out id= internal !52 out
var =60
c generate_EQ id1=f, id2= internal !52 , var1 =8, var2 =60
229
c generate_XOR id1=f id2= internal !52 var1 =8 var2 =60 out id= internal !53 out var =61
c generate_NOT id= internal !53 var =61 , out id= internal !54 out var =62
c create_assert () id= internal !54 var =62
Now you can juxtapose list of internal variables and comments in CNF file. For example, equality gate is generated as
NOT(XOR(a,b)).
create_assert() function fixes a bool variable to be always True.
Other (internal) variables are added by SMT solver as “joints” to connect logic gates with each other.
Hence, my SMT solver constructing a digital circuit based on the input SMT file. Logic gates are then converted
into CNF form using Tseitin transformations. The task of SAT solver is then to find such an assignment, for which CNF
expression would be true. In other words, its task is to find such inputs/outputs for which this “virtual” digital circuit
would work without contradictions.
The SAT instance is also small enough to be solved using my simplest backtracking SAT solver written:
SAT
-1 2 -3 -4 -5 -6 7 -8 -9 -10 -11 -12 -13 14 15 16 17 -18 -19 20 -21 -22 23 -24 -25 26 27
-28 29 -30 31 -32 33 -34 -35 36 37 38 -39 -40 -41 42 43 44 45 46 47 48 49 -50 51 52
53 54 55 56 57 58 -59 -60 -61 62 0
UNSAT
solutions = 1
You can juxtapose variables from solver’s result and variable numbers from MK85 listing. Therefore, MK85 + my
small SAT solver is standalone program under 3000 SLOC, which still can solve such (simple enough) system of boolean
equations, without external aid like minisat/picosat.
Among comments at the John D. Cook’s blog, there is also a solution by Aaron Meurer, using SymPy, which also has
SAT-solver inside:
In [2]: facts = [
Equivalent (a, (b & c & d & e & f)),
Equivalent (b, (∼c & ∼d & ∼e & ∼f)),
Equivalent (c, a & b),
Equivalent (d, ((a & ∼b & ∼c) | (∼a & b & ∼c) | (∼a & ∼b & c))),
Equivalent (e, (∼a & ∼b & ∼c & ∼d)),
Equivalent (f, (∼a & ∼b & ∼c & ∼d & ∼e)),
]
So it seems e is the only answer , assuming I got the facts correct . And it is important
to use Equivalent (a bidirectional implication ) rather than just Implies . If you
only use -> (which I guess would mean that an answer not being chosen ’doesnt
necessarily mean that it ’isnt true), then ‘’none , b, and f are also “”solutions .
230
Also , if I replace the d fact with Equivalent (d, a | b | c), the result is the same. So
it seems that the interpretation of “”one both in terms of choice d and in terms of
how many choices there are is irrelevant .
Thanks for the fun problem . I hope others took the time to solve this in their head
before reading the comments .
The positive integers x1 , x2 , ..., x7 satisfy x6 = 144 and xn+3 = xn+2 (xn+1 + xn ) for n = 1, 2, 3, 4. Find
the last three digits of x7 .
This is it:
from z3 import *
s= Solver ()
x1 , x2 , x3 , x4 , x5 , x6 , x7=Ints('x1 x2 x3 x4 x5 x6 x7 ')
s.add(x1 >=0)
s.add(x2 >=0)
s.add(x3 >=0)
s.add(x4 >=0)
s.add(x5 >=0)
s.add(x6 >=0)
s.add(x7 >=0)
s.add(x6 ==144)
results =[]
while True:
if s. check () == sat:
m = s.model ()
print m
231
print " total results ", len( results )
break
[x2 = 1,
x3 = 1,
x1 = 7,
x4 = 8,
x5 = 16,
x7 = 3456 ,
x6 = 144]
[x3 = 2,
x2 = 1,
x1 = 2,
x6 = 144 ,
x4 = 6,
x5 = 18,
x7 = 3456]
total results 2
Find the number of positive integers with three not necessarily distinct digits, abc, with a ̸= 0 and
c ̸= 0 such that both abc and cba are multiples of 4.
from z3 import *
a, b, c = Ints('a b c')
s= Solver ()
s.add(a >0)
s.add(b >=0)
s.add(c >0)
s.add(a <=9)
s.add(b <=9)
s.add(c <=9)
results =[]
while True:
if s. check () == sat:
m = s.model ()
print m
232
results . append (m)
block = []
for d in m:
c=d()
block . append (c != m[d])
s.add(Or(block ))
else:
print " total results ", len( results )
break
Let’s see:
[c = 4, b = 0, a = 4]
[b = 1, c = 2, a = 2]
[b = 6, c = 4, a = 4]
[b = 4, c = 4, a = 4]
[b = 2, c = 4, a = 4]
[b = 4, c = 4, a = 8]
[b = 8, c = 4, a = 4]
[b = 6, c = 4, a = 8]
[b = 8, c = 4, a = 8]
[b = 0, c = 4, a = 8]
[b = 2, c = 4, a = 8]
[b = 8, c = 8, a = 8]
[b = 9, c = 6, a = 6]
[b = 2, c = 8, a = 8]
[b = 2, c = 8, a = 4]
[b = 4, c = 8, a = 4]
[b = 4, c = 8, a = 8]
[b = 8, c = 8, a = 4]
[b = 6, c = 8, a = 4]
[b = 6, c = 8, a = 8]
[b = 0, c = 8, a = 4]
[b = 0, c = 8, a = 8]
[b = 7, c = 6, a = 6]
[b = 7, c = 2, a = 6]
[b = 7, c = 6, a = 2]
[b = 7, c = 2, a = 2]
[b = 9, c = 2, a = 6]
[b = 9, c = 2, a = 2]
[b = 9, c = 6, a = 2]
[b = 5, c = 6, a = 2]
[b = 1, c = 6, a = 2]
[b = 3, c = 6, a = 2]
[b = 5, c = 2, a = 2]
[b = 3, c = 2, a = 2]
[b = 5, c = 6, a = 6]
[b = 5, c = 2, a = 6]
[b = 3, c = 2, a = 6]
[b = 1, c = 2, a = 6]
[b = 1, c = 6, a = 6]
[b = 3, c = 6, a = 6]
total results 40
233
(set -logic QF_BV )
(set -info :smt -lib - version 2.0)
; slower :
;( assert (= ( bvurem ( bvadd ( bvmul a (_ bv100 8)) ( bvmul b (_ bv00 8)) c) #x04) #x00))
;( assert (= ( bvurem ( bvadd ( bvmul c (_ bv100 8)) ( bvmul b (_ bv00 8)) a) #x04) #x00))
; faster :
( assert (= (bvand ( bvadd ( bvmul a (_ bv100 8)) ( bvmul b (_ bv00 8)) c) #x03) #x00))
( assert (= (bvand ( bvadd ( bvmul c (_ bv100 8)) ( bvmul b (_ bv00 8)) a) #x03) #x00))
;( check -sat)
;(get -model)
(get -all - models )
;( count - models )
Faster version doesn’t find remainder, it just isolates two last bits.
789
456
123
7 8 9
+---+
|4 5|6
|1 2|3
+---+
The number is 4521. Or 2145, or 5214. All these numbers are divisible by 11, 111 and 1111. One explanation:
https://files.eric.ed.gov/fulltext/EJ891796.pdf.
However, I could try to prove that all these numbers are indeed divisible.
from z3 import *
"""
We will keep track on numbers using row/col representation :
234
|0 1 2 <-col
-|- - -
0|7 8 9
1|4 5 6
2|1 2 3
^
|
row
"""
s= Solver ()
# bottom - right corner is always under left - upper corner , or equal to it , or to the right
of it:
s.add(to_r >= from_r )
s.add(to_c >= from_c )
235
# what we 're going to do?
prove =False
enumerate_rectangles =True
if prove :
# prove by finding counterexample .
# find any variable state for which remainder will be non -zero:
s.add(And (( n1 %11) != 0) , (n1 %111) != 0, (n1 %1111) != 0)
s.add(And (( n2 %11) != 0) , (n2 %111) != 0, (n2 %1111) != 0)
s.add(And (( n3 %11) != 0) , (n3 %111) != 0, (n3 %1111) != 0)
s.add(And (( n4 %11) != 0) , (n4 %111) != 0, (n4 %1111) != 0)
# ... or ...
if enumerate_rectangles :
# enumerate all possible solutions :
results =[]
while True:
if s. check () == sat:
m = s. model ()
# print_model (m)
print m
print m[n1]
print m[n2]
print m[n3]
print m[n4]
results . append (m)
block = []
for d in m:
c=d()
block . append (c != m[d])
s.add(Or( block ))
else:
print " results total =", len( results )
break
[n1 = 7821 ,
BL = 1,
n2 = 8217 ,
to_r = 2,
LT = 7,
RT = 8,
BR = 2,
n4 = 1782 ,
from_r = 0,
n3 = 2178 ,
from_c = 0,
to_c = 1]
7821
8217
236
2178
1782
[n1 = 7931 ,
BL = 1,
n2 = 9317 ,
to_r = 2,
LT = 7,
RT = 9,
BR = 3,
n4 = 1793 ,
from_r = 0,
n3 = 3179 ,
from_c = 0,
to_c = 2]
7931
9317
3179
1793
...
[n1 = 5522 ,
BL = 2,
n2 = 5225 ,
to_r = 2,
LT = 5,
RT = 5,
BR = 2,
n4 = 2552 ,
from_r = 1,
n3 = 2255 ,
from_c = 1,
to_c = 1]
5522
5225
2255
2552
results total= 36
8.18 Android lock screen (9 dots) has exactly 140240 possible ways to
(un)lock it
How would you count?
from z3 import *
"""
1 2 3
4 5 6
7 8 9
"""
237
# this is like switch () or multiplexer
"""
def next_dot (a, b):
return If(a==1 , Or(b==2 , b==4 , b==5) ,
If(a==2 , Or(b==1 , b==3 , b==4 , b==5 , b==6) ,
If(a==3 , Or(b==2 , b==5 , b==6) ,
If(a==4 , Or(b==1 , b==2 , b==5 , b==7 , b==8) ,
If(a==5 , Or(b==1 , b==2 , b==3 , b==4 , b==6 , b==7 , b==8 , b==9) ,
If(a==6 , Or(b==2 , b==3 , b==5 , b==8 , b==9) ,
If(a==7 , Or(b==4 , b==5 , b==8) ,
If(a==8 , Or(b==4 , b==5 , b==6 , b==7 , b==9) ,
If(a==9 , Or(b==5 , b==6 , b==8) ,
False ))))))))) # default
"""
238
# all elements of path must be distinct
s.add( Distinct (path))
# next element of path is defined by next_dot () function , unless it 's the last one:
for i in range (LENGTH -1):
s.add( next_dot (path[i], path[i+1]))
results =[]
total =0
for l in range (2 ,10):
total = total + paths_for_length (l)
...
path [7, 5, 1, 4, 8, 6, 3]
3 . 7
4 2 6
1 5 .
path [9, 5, 7, 4, 8, 6, 3]
239
. . 7
4 2 6
3 5 1
path [9, 5, 1, 4, 8, 6, 3]
3 . 7
4 2 6
. 5 1
...
1 2 3
4 5 6
7 8 9
Numbers on 3 · 3 box represent a sequence: which dot is the 1st, 2nd, etc...
Of 9:
...
path [7, 8, 9, 5, 4, 1, 2, 6, 3]
6 7 9
5 4 8
1 2 3
path [1, 4, 7, 5, 2, 3, 6, 9, 8]
1 5 6
2 4 7
3 9 8
path [9, 6, 8, 7, 4, 1, 5, 2, 3]
6 8 9
5 7 2
4 3 1
...
What if only non-diagonal lines would be allowed (which isn’t a case of a real Android lock screen)?
240
length = 2 results total = 24
length = 3 results total = 44
length = 4 results total = 80
length = 5 results total = 104
length = 6 results total = 128
length = 7 results total = 112
length = 8 results total = 112
length = 9 results total = 40
total= 644
Also, at first, when I published this note, lines like these weren’t counted (but allowable on Andoird lock screen, as it
was pointed out by @mztropics):
* . .
. . *
. * .
Now you can see, how drastically number of all possibilities can change, when you add ≈ 2 more branches at each
element of path.
Or(
And(chars [X][Y]== 't', chars [X][Y+1]== 'h', chars [X][Y+2]== 'e ') ,
And(chars [X][Y]== 's', chars [X][Y+1]== 'h', chars [X][Y+2]== 'e ') ,
And(chars [X][Y]== 'x', chars [X][Y+1]== 'o', chars [X][Y+2]== 'r '))
**** **********
* * * * * * *
***************
* * * * * * *
********* *****
241
* * * * * * *
****** ********
* * * * *
******** ******
* * * * * * *
***** *********
* * * * * * *
***************
* * * * * * *
********** ****
Sample result:
spur stimulated
r e c i a h e
congratulations
m u t a i s c
violation niece
s a e p e n n
rector penitent
i i o c e
accounts herald
s n g e a r o
press edinburgh
e x e n t p i
characteristics
t c l r n e a
satisfying dull
horizontal :
((0 , 0), (0, 3)) spur
((0 , 5), (0, 14)) stimulated
((2 , 0), (2, 14)) congratulations
((4 , 0), (4, 8)) violation
((4 , 10) , (4, 14)) niece
((6 , 0), (6, 5)) rector
((6 , 7), (6, 14)) penitent
((8 , 0), (8, 7)) accounts
((8 , 9), (8, 14)) herald
((10 , 0), (10 , 4)) press
((10 , 6), (10 , 14)) edinburgh
((12 , 0), (12 , 14)) characteristics
((14 , 0), (14 , 9)) satisfying
((14 , 11) , (14, 14)) dull
vertical :
((8 , 0), (14, 0)) aspects
((0 , 1), (6, 1)) promise
((10 , 2), (14 , 2)) exact
((0 , 3), (10, 3)) regulations
((10 , 4), (14 , 4)) seals
((0 , 5), (9, 5)) scattering
((10 , 6), (14 , 6)) entry
((4 , 7), (10, 7)) opposed
((0 , 8), (4, 8)) milan
((5 , 9), (14, 9)) enchanting
((0 , 10) , (4, 10)) latin
((4 , 11) , (14, 11)) interrupted
242
((0 , 12) , (4, 12)) those
((8 , 13) , (14, 13)) logical
((0 , 14) , (6, 14)) descent
Unsat is possible if the dictionary is too small or have no words of length present in pattern.
The source code:
#!/ usr/bin/env python
from z3 import *
import sys
"""
# https :// commons . wikimedia .org/wiki/File:Khachbar -1. jpg
pattern =[
"*****" ,
"* * *",
"* ***" ,
"*** *",
"* ***" ,
"* * *",
"*****"]
"""
"""
# https :// commons . wikimedia .org/wiki/File:Khachbar -4. jpg
pattern =[
"*******" ,
"* * * *",
"*******" ,
"* * * *",
"*******" ,
"* * * *",
"*******"]
"""
# scan pattern [] and find all " sticks " longer than 1 and collect its coordinates :
243
horizontal =[]
in_the_middle =False
for r in range ( HEIGHT ):
for c in range ( WIDTH ):
if pattern [r][c]== '*' and in_the_middle == False :
in_the_middle =True
start =(r,c)
elif pattern [r][c]== ' ' and in_the_middle == True:
if c-start [1] >1:
horizontal . append (( start , (r, c -1)))
in_the_middle = False
if in_the_middle :
if c- start [1] >1:
horizontal . append (( start , (r, c)))
in_the_middle = False
vertical =[]
in_the_middle =False
for c in range ( WIDTH ):
for r in range ( HEIGHT ):
if pattern [r][c]== '*' and in_the_middle == False :
in_the_middle =True
start =(r,c)
elif pattern [r][c]== ' ' and in_the_middle == True:
if r-start [0] >1:
vertical . append (( start , (r-1, c)))
in_the_middle = False
if in_the_middle :
if r- start [0] >1:
vertical . append (( start , (r, c)))
in_the_middle = False
# for the first simple pattern , we will have such coordinates of " sticks ":
# horizontal =[((0 , 0), (0, 4)), ((2 , 2) , (2, 4)), ((3 , 0) , (3, 2)), ((4 , 2) , (4, 4)),
((6, 0) , (6, 4))]
# vertical =[((0 , 0) , (6, 0)), ((0 , 2) , (6, 2)), ((0 , 4), (6, 4))]
# the list in this file is assumed to not have duplicates , otherwise duplicates can be
present in the final resulting crossword :
with open("words .txt") as f:
content = f. readlines ()
words = [x.strip () for x in content ]
244
chars =[[ Int('chars_ %d_%d' % (r, c)) for c in range (WIDTH )] for r in range ( HEIGHT )]
# indices of horizontal words :
horizontal_idx =[ Int('horizontal_idx_ %d' % i) for i in range (len( horizontal ))]
# indices of vertical words :
vertical_idx =[ Int('vertical_idx_ %d' % i) for i in range (len( vertical ))]
s= Solver ()
# now we find all horizonal " sticks ", we find all possible words of corresponding length
...
for i in range (len( horizontal )):
h= horizontal [i]
_from =h[0]
_to=h[1]
l=_to [1] - _from [1]+1
list_of_ANDs =[]
for idx , word in find_words_len (l):
# at this point , we form expression like:
# And(chars [0][0]== ord('h '), chars [0][1]== ord('e '), chars [0][2]== ord('l '), chars
[0][3]== ord('l '), chars [0][4]== ord('o '), horizontal_idx []==...)
list_of_ANDs . append (And( form_H_expr ( _from [0] , _from [1] , l, word)+[ horizontal_idx
[i]== idx ]))
# at this point , we form expression like:
# Or(And( chars ...== word1 ), And( chars ...== word2 ), And( chars ...== word3 ))
s.add(Or (* list_of_ANDs ))
# we collected indices of horizonal / vertical words to make sure they will not be
duplicated on resulting crossword :
s.add( Distinct (*( horizontal_idx + vertical_idx )))
245
sys. stdout . write (chr(m[ chars [r][c]]. as_long ()))
else:
sys. stdout . write (' ')
print ""
print ""
N=10
# get 10 results :
results =[]
for i in range (N):
if s. check () == sat:
m = s.model ()
print_model (m)
results . append (m)
block = []
for d in m:
c=d()
block . append (c != m[d])
s.add(Or(block ))
else:
print " total results ", len( results )
break
1 ? 2 ? 3 ? 4 ? 5 ? 6 ? 7 ? 8 ? 9 = 0
Fill ? with -, + or * operation, and find such a sequence, so that the equation would be true. This is tricky, because
of operator precedence, multiplication must be handled at first. Brackets are also possible.
See also: https://www.dcode.fr/missing-operators-equation-solver,
https://brilliant.org/wiki/arithmetic-puzzles-operator-search/.
To solve this, I just enumerate all possible ordered binary search tree of 9 elements, which are almost the same as
expression with 9 terms and all possible variations of brackets.
Then we try each expression...
from z3 import *
CONST =1234
TOTAL =9
# prepare a list in form: [(1 ,"1") ,(2 ,"2") ,(3 ,"3") ...]
# rationale : enum_ordered () yields both expression tree and expression as a string ...
input_values =[]
for i in range ( TOTAL ):
246
input_values . append ((i+1, str(i+1)))
OPS=TOTAL -1
# expression may have form like ( please note , many constants are optimized / folded ):
# If(op_1 == 0,
# 1 +
# If(op_0 == 0, 5, If(op_0 == 1, -1, If(op_0 == 2, 6, 0))),
# If(op_1 == 1,
# 1 -
# If(op_0 == 0,
# 5,
# If(op_0 == 1, -1, If(op_0 == 2, 6, 0))),
# If(op_1 == 2,
# 1*
# If(op_0 == 0,
# 5,
# If(op_0 == 1, -1, If(op_0 == 2, 6, 0))),
# 0)))
# string is like "(1 op1 (2 op0 3))", opX substring will be replaced by operation name
after (-, +, *)
247
s.add(And(ops[i]>=0, ops[i] <=2))
s.add(tree [0]== CONST )
if s. check () == sat:
m=s. model ()
tmp=tree [1]
for i in range (OPS):
op_s =["+", "-", "*"][m[ops[i]]. as_long ()]
tmp=tmp. replace ("op"+str(i), op_s)
print tmp , "=", eval(tmp)
n=-1
For 9 terms, there are 1430 binary trees, or expressions (9th Catalan number).
For 0, there are 1391 solutions, some of them:
(1 + (2 + (3 + (4 + (5 * (6 - (7 - (8 - 9)))))))) = 0
(1 + (2 + (3 + (4 + (5 * (6 - ((7 - 8) + 9))))))) = 0
(1 + (2 + (3 + (4 + (5 * ((6 - 7) + (8 - 9))))))) = 0
(1 + (2 + (3 - (4 + (5 - ((6 * (7 - 8)) + 9)))))) = 0
(1 + (2 + (3 + (4 + (5 * (((6 - 7) + 8) - 9)))))) = 0
(1 - (2 + (3 + (4 + ((5 - 6) + (7 * (8 - 9))))))) = 0
(1 - (2 + (3 + (4 + ((5 - 6) * ((7 - 8) + 9)))))) = 0
...
Surely, several of these expressions are equivalent to each other, due to associative property of multiplication and
addition.
For 1234:
248
(1 + ((2 + ((3 * ((4 + 5) - 6)) * (7 + 8))) * 9)) = 1234
(1 + ((2 - (((3 * (4 - 5)) - 6) * (7 + 8))) * 9)) = 1234
(1 - ((2 + ((3 * ((4 - (5 + 6)) * 7)) + 8)) * 9)) = 1234
(1 - ((2 + ((3 * (((4 - 5) - 6) * 7)) + 8)) * 9)) = 1234
(1 - ((2 + (((3 * (4 - (5 + 6))) * 7) + 8)) * 9)) = 1234
(1 - ((2 + (((3 * ((4 - 5) - 6)) * 7) + 8)) * 9)) = 1234
(1 - ((2 - ((((3 * (4 + 5)) - 6) * 7) - 8)) * 9)) = 1234
(1 - (((2 - ((3 + 4) * 5)) - ((6 + 7) * 8)) * 9)) = 1234
(1 - (((2 - ((3 + (4 * 5)) * 6)) + (7 - 8)) * 9)) = 1234
(1 + (((2 + (3 - (4 * (5 - (6 * 7))))) * 8) + 9)) = 1234
(1 + (((2 + (3 + (4 * ((5 * 6) + 7)))) * 8) + 9)) = 1234
(1 - (((2 + (3 * ((4 - (5 + 6)) * 7))) + 8) * 9)) = 1234
(1 - (((2 + (3 * (((4 - 5) - 6) * 7))) + 8) * 9)) = 1234
(1 - (((2 + ((3 * (4 - (5 + 6))) * 7)) + 8) * 9)) = 1234
(1 - (((2 + ((3 * ((4 - 5) - 6)) * 7)) + 8) * 9)) = 1234
(1 - (((2 - (((3 + (4 * 5)) * 6) - 7)) - 8) * 9)) = 1234
(1 + ((((2 + 3) - (4 * (5 - (6 * 7)))) * 8) + 9)) = 1234
(1 - ((((2 - (3 * ((4 + 5) * 6))) + 7) * 8) - 9)) = 1234
(1 - ((((2 - ((3 + (4 * 5)) * 6)) + 7) - 8) * 9)) = 1234
((1 + 2) + ((((3 * ((4 + 5) * 6)) - 7) * 8) - 9)) = 1234
((1 + 2) + (((((3 * (4 + 5)) * 6) - 7) * 8) - 9)) = 1234
((1 + (2 + (((3 * ((4 + 5) * 6)) - 7) * 8))) - 9) = 1234
((1 + (2 + ((((3 * (4 + 5)) * 6) - 7) * 8))) - 9) = 1234
((1 + ((2 + (3 - (4 * (5 - (6 * 7))))) * 8)) + 9) = 1234
((1 + ((2 + (3 + (4 * ((5 * 6) + 7)))) * 8)) + 9) = 1234
((1 - ((2 - ((3 * ((4 + 5) * 6)) - 7)) * 8)) + 9) = 1234
((1 - ((2 - (((3 * (4 + 5)) * 6) - 7)) * 8)) + 9) = 1234
((1 + (((2 + 3) - (4 * (5 - (6 * 7)))) * 8)) + 9) = 1234
((1 - (((2 - (3 * ((4 + 5) * 6))) + 7) * 8)) + 9) = 1234
((1 - (((2 - ((3 * (4 + 5)) * 6)) + 7) * 8)) + 9) = 1234
(((1 + 2) + (((3 * ((4 + 5) * 6)) - 7) * 8)) - 9) = 1234
(((1 + 2) + ((((3 * (4 + 5)) * 6) - 7) * 8)) - 9) = 1234
n=-1
CONST =13
# TOTAL =9
TOTAL =7
BIT_WIDTH =8
input_values =[]
for i in range ( TOTAL ):
input_values . append ((s. BitVecConst (i+1, BIT_WIDTH ), str(i+1)))
OPS=TOTAL -1
249
def op(l, r, n):
return s.If(ops[n]==s. BitVecConst (0, 2) , l+r,
s.If(ops[n]==s. BitVecConst (1, 2) , l-r,
s.If(ops[n]==s. BitVecConst (2, 2) , l*r,
s. BitVecConst (0, BIT_WIDTH ))))
if s. check ():
m=s. model ()
# print "sat", tree [1]
tmp=tree [1]
for i in range (OPS):
op_s =["+", "-", "*"][m['op_%d' % i]]
tmp=tmp. replace ("op"+str(i), op_s)
print tmp , "=", eval(tmp)
# show only first solution ...
exit (0)
250
from z3 import *
251
# http :// puzzlygame .com/ nonogram /24/
#rows =[[4] , [1,8,1] , [3 ,11 ,3] , [3 ,14 ,4] , [4 ,22] , [1 ,4 ,22] , [28] , [27] , [3 ,11 ,8] , [9 ,9] ,
[8,8] , [7 ,8] , [2 ,1 ,7] , [2 ,6] , [3 ,5] , [2 ,4] , [4] , [2] , [2] , [2] , [2] , [2] , [2] , [2] ,
[2]]
#cols =[[2] , [3] , [4] , [1 ,2], [4] , [5] , [7] , [3 ,5] , [1 ,5] , [7] , [7] , [9] , [11] , [10 ,2] ,
[11 ,2] , [12 ,2 ,2] , [9 ,3] , [8 ,4 ,2] , [15 ,2] , [17 ,2] , [19] , [18] , [15] , [12] , [9] , [7] ,
[4], [3], [3] , [2] , [3] , [2] , [3] , [2] , [2]]
WIDTH =len(cols)
HEIGHT =len(rows)
s= Solver ()
252
# must be an empty cell(s) between islands :
for i in range (len(q) -1):
s.add( row_island_shift [j][i+1] > row_island_shift [j][i]+q[i])
#
--------------------------------------------------------------------------------------------
253
else:
rt=rt+" "
print rt
print s. check ()
m=s. model ()
print_model (m)
exit (0)
# ... or ...
The result:
sat
******** ******* ***** *******
***** **** *** ***
*** *** ** ***
**** *** ** **
*** *** ** **
*** **** ** **
**** ***** **
*** ***** *
**** *** **
*** **** **
**** **** **
*** ****** **
*** ** *** *
**** *** **** **
*** ** *** **
****** *****
**** *****
*** ***
*** ***
* *
How it works (briefly). Given a row of width 8 and input (or clue) like [3,2], we create two islands of two bitstrings of
corresponding lengths:
00000111
00000011
254
The whole length of each bitvector/bitstring is 8 (width of row).
We then define another variable: island_shift, for each island, which defines a count, on which a bitstring is shifted
left. We also calculate limits for each island: position of each one must not be lower/equal then the position of the previous
island.
All islands are then merged into one (merged_islands[]) using OR operation:
11100000
00001100
->
11101100
( von Nora Hartsfield, Gerhard Ringel – Pearls in Graph Theory: A Comprehensive Introduction )
There are only 3 ways to allocate food to kids. The problem is also small enough to be solved using my toy-level MK85
SMT-solver...
(set - logic QF_BV )
(set -info :smt -lib - version 2.0)
; apples = 0
; bananas = 1
; cherries = 2
; dates = 3
( assert
(or
(= E (_ bv2 2))
(= E (_ bv3 2))
)
255
)
( assert
(or
(= F (_ bv0 2))
(= F (_ bv2 2))
)
)
( assert
(or
(= G (_ bv1 2))
(= G (_ bv2 2))
)
)
( assert
(or
(= H (_ bv0 2))
(= H (_ bv2 2))
(= H (_ bv3 2))
)
)
;( model
; (define -fun E () (_ BitVec 2) (_ bv2 2)) ; 0x2
; (define -fun F () (_ BitVec 2) (_ bv0 2)) ; 0x0
; (define -fun G () (_ BitVec 2) (_ bv1 2)) ; 0x1
; (define -fun H () (_ BitVec 2) (_ bv3 2)) ; 0x3
;)
;( model
; (define -fun E () (_ BitVec 2) (_ bv3 2)) ; 0x3
; (define -fun F () (_ BitVec 2) (_ bv2 2)) ; 0x2
; (define -fun G () (_ BitVec 2) (_ bv1 2)) ; 0x1
; (define -fun H () (_ BitVec 2) (_ bv0 2)) ; 0x0
;)
;( model
; (define -fun E () (_ BitVec 2) (_ bv3 2)) ; 0x3
; (define -fun F () (_ BitVec 2) (_ bv0 2)) ; 0x0
; (define -fun G () (_ BitVec 2) (_ bv1 2)) ; 0x1
; (define -fun H () (_ BitVec 2) (_ bv2 2)) ; 0x2
;)
; Model count : 3
from z3 import *
# apples = 0
# bananas = 1
# cherries = 2
256
# dates = 3
E, F, G, H = Ints('E F G H')
s= Solver ()
[G = 1, F = 2, E = 3, H = 0]
[G = 2, F = 0, E = 3, H = 1]
[G = 1, F = 0, E = 2, H = 3]
results total = 3
"""
257
258
Chapter 9
Graph coloring
from z3 import *
borders ={" Albania ": [" Greece ", " Kosovo ", " Macedonia ", " Montenegro "],
" Andorra ": [" France ", "Spain "],
" Austria ": [" CzechRepublic ", " Germany ", " Hungary ", " Italy ", " Liechtenstein ", " Slovakia ",
" Slovenia ", " Switzerland "],
" Belarus ": [" Latvia ", " Lithuania ", " Poland ", " Ukraine "],
" Belgium ": [" France ", " Germany ", " Luxembourg ", " Netherlands "],
" BosniaHerzegovina ": [" Croatia ", " Montenegro ", " Serbia "],
" Bulgaria ": [" Greece ", " Macedonia ", " Romania ", " Serbia "],
" Croatia ": [" BosniaHerzegovina ", " Hungary ", " Montenegro ", " Serbia ", " Slovenia "],
" Cyprus ": [],
" CzechRepublic ": [" Austria ", " Germany ", " Poland ", " Slovakia "],
" Denmark ": [" Germany "],
" Estonia ": [" Latvia "],
" Finland ": [" Norway ", " Sweden "],
" France ": [" Andorra ", " Belgium ", " Germany ", "Italy ", " Luxembourg ", " Monaco ", " Spain ", "
Switzerland "],
" Germany ": [" Austria ", " Belgium ", " CzechRepublic ", " Denmark ", " France ", " Luxembourg ", "
Netherlands ", " Poland ", " Switzerland "],
" Greece ": [" Albania ", " Bulgaria ", " Macedonia "],
" Hungary ": [" Austria ", " Croatia ", " Romania ", " Serbia ", " Slovakia ", " Slovenia ", " Ukraine "
],
" Iceland ": [],
" Ireland ": [" UnitedKingdom "],
" Italy ": [" Austria ", " France ", " SanMarino ", " Slovenia ", " Switzerland ", " VaticanCity "],
" Kosovo ": [" Albania ", " Macedonia ", " Montenegro ", " Serbia "],
" Latvia ": [" Belarus ", " Estonia ", " Lithuania "],
" Liechtenstein ": [" Austria ", " Switzerland "],
" Lithuania ": [" Belarus ", " Latvia ", " Poland "],
" Luxembourg ": [" Belgium ", " France ", " Germany "],
" Macedonia ": [" Albania ", " Bulgaria ", " Greece ", " Kosovo ", " Serbia "],
" Malta ": [],
259
" Moldova ": [" Romania ", " Ukraine "],
" Monaco ": [" France "],
" Montenegro ": [" Albania ", " BosniaHerzegovina ", " Croatia ", " Kosovo ", " Serbia "],
" Netherlands ": [" Belgium ", " Germany "],
" Norway ": [" Finland ", " Sweden "],
" Poland ": [" Belarus ", " CzechRepublic ", " Germany ", " Lithuania ", " Slovakia ", " Ukraine "],
" Portugal ": ["Spain "],
" Romania ": [" Bulgaria ", " Hungary ", " Moldova ", " Serbia ", " Ukraine "],
" SanMarino ": [" Italy "],
" Serbia ": [" BosniaHerzegovina ", " Bulgaria ", " Croatia ", " Hungary ", " Kosovo ", " Macedonia ",
" Montenegro ", " Romania "],
" Slovakia ": [" Austria ", " CzechRepublic ", " Hungary ", " Poland ", " Ukraine "],
" Slovenia ": [" Austria ", " Croatia ", " Hungary ", " Italy "],
" Spain ": [" Andorra ", " France ", " Portugal "],
" Sweden ": [" Finland ", " Norway "],
" Switzerland ": [" Austria ", " France ", " Germany ", " Italy ", " Liechtenstein "],
" Ukraine ": [" Belarus ", " Hungary ", " Moldova ", " Poland ", " Romania ", " Slovakia "],
" UnitedKingdom ": [" Ireland "],
" VaticanCity ": ["Italy "]}
s= Solver ()
print s. check ()
m=s. model ()
260
The output is to be fed to Wolfram Mathematica – I’m using it to draw a map 1 :
coloring = { Entity [" Country ", " Lithuania "] -> RGBColor [0, 0, 1],
Entity [" Country ", " Luxembourg "] -> RGBColor [0, 0, 1],
Entity [" Country ", " Andorra "] -> RGBColor [0, 1, 0],
Entity [" Country ", " Ireland "] -> RGBColor [1, 0, 0],
Entity [" Country ", " Belarus "] -> RGBColor [0, 1, 0],
Entity [" Country ", " Slovenia "] -> RGBColor [1, 0, 0],
Entity [" Country ", " BosniaHerzegovina "] -> RGBColor [1, 1, 0],
Entity [" Country ", " Belgium "] -> RGBColor [1, 1, 0],
Entity [" Country ", " Spain "] -> RGBColor [0, 0, 1],
Entity [" Country ", " Netherlands "] -> RGBColor [1, 0, 0],
Entity [" Country ", " UnitedKingdom "] -> RGBColor [0, 1, 0],
Entity [" Country ", " Denmark "] -> RGBColor [1, 0, 0],
Entity [" Country ", " Poland "] -> RGBColor [1, 1, 0],
Entity [" Country ", " Moldova "] -> RGBColor [0, 0, 1],
Entity [" Country ", " Croatia "] -> RGBColor [0, 1, 0],
Entity [" Country ", " Monaco "] -> RGBColor [0, 1, 0],
Entity [" Country ", " Switzerland "] -> RGBColor [1, 1, 0],
Entity [" Country ", " VaticanCity "] -> RGBColor [1, 0, 0],
Entity [" Country ", " CzechRepublic "] -> RGBColor [1, 0, 0],
Entity [" Country ", " Albania "] -> RGBColor [0, 0, 1],
Entity [" Country ", " Estonia "] -> RGBColor [1, 0, 0],
Entity [" Country ", " Kosovo "] -> RGBColor [1, 1, 0],
Entity [" Country ", " Cyprus "] -> RGBColor [1, 0, 0],
Entity [" Country ", " Italy "] -> RGBColor [0, 1, 0],
Entity [" Country ", " Malta "] -> RGBColor [1, 0, 0],
Entity [" Country ", " France "] -> RGBColor [1, 0, 0],
Entity [" Country ", " Slovakia "] -> RGBColor [0, 1, 0],
Entity [" Country ", " SanMarino "] -> RGBColor [0, 0, 1],
Entity [" Country ", " Norway "] -> RGBColor [1, 0, 0],
Entity [" Country ", " Iceland "] -> RGBColor [1, 0, 0],
Entity [" Country ", " Montenegro "] -> RGBColor [1, 0, 0],
Entity [" Country ", " Germany "] -> RGBColor [0, 1, 0],
Entity [" Country ", " Ukraine "] -> RGBColor [1, 0, 0],
Entity [" Country ", " Finland "] -> RGBColor [0, 1, 0],
Entity [" Country ", " Macedonia "] -> RGBColor [0, 1, 0],
Entity [" Country ", " Liechtenstein "] -> RGBColor [0, 1, 0],
Entity [" Country ", " Latvia "] -> RGBColor [1, 1, 0],
Entity [" Country ", " Bulgaria "] -> RGBColor [1, 0, 0],
Entity [" Country ", " Romania "] -> RGBColor [0, 1, 0],
Entity [" Country ", " Portugal "] -> RGBColor [1, 1, 0],
Entity [" Country ", " Serbia "] -> RGBColor [0, 0, 1],
Entity [" Country ", " Sweden "] -> RGBColor [0, 0, 1],
Entity [" Country ", " Austria "] -> RGBColor [0, 0, 1],
Entity [" Country ", " Greece "] -> RGBColor [1, 1, 0],
Entity [" Country ", " Hungary "] -> RGBColor [1, 1, 0] ,}
GeoGraphics [{ EdgeForm [
Directive [Thin ,
Black ]], { GeoStyling [#2] , Tooltip [ Polygon [#1] , #1[[2]]]} & @@@
coloring }]
261
Figure 9.1: Colored map
Now let’s have fun. Out of pure whim, we may want to make as many countries colored as red as possible 2 :
s= Optimize ()
...
s. maximize (Sum (*[ If( country_color [i]==0 , 1, 0) for i in range ( countries_total )]))
262
Figure 9.2: The map
s. minimize (Sum (*[ If( country_color [i]==0 , 1, 0) for i in range ( countries_total )]))
263
Figure 9.3: The map
...
s. minimize (Sum (*[ If(Or( country_color [i]==0 , country_color [i ]==1) , 1, 0) for i in range (
countries_total )]))
...
264
Represent towers as vertices. If towers are placed too close to each other, put an edge between them, meaning, different
colors/frequencies must be assigned to them.
For cellular network, placing stations/tower in hexagonal form, makes this graph to be colored using only 3 colors/fre-
quencies:
( The images was taken from the Generalizing and optimizing fractional frequency reuse in broadband cellular radio
access networks article. )
Mathematicians say, the chromatic number of this (planar) graph is 3. Chromatic number is a minimal number of
colors. And a planar graph is a graph that can be represented on 2D plane with no edges intersected (like a world map).
See also: https://en.wikipedia.org/wiki/Radio_coloring.
Suppose some people form committees to do various tasks. The problem is to schedule the committee
meetings in as few time slots as possible. To simplify the discussion, we’ll represent each person with a
number. For example, let S = 1, 2, 3, 4, 5, 6, 7 represent a set of seven people, and suppose they have
formed six three-person committees as follows:
S1 = 1, 2, 3, S2 = 2, 3, 4, S3 = 3, 4, 5, S4 = 4, 5, 6, S5 = 5, 6, 7, S6 = 1, 6, 7.
We can model the problem with the graph pictured in Figure 1.4.4, where the committee names are
the vertices and an edge connects two vertices if a person belongs to both committees represented by
265
the vertices. If each committee meets for one hour, what is the smallest number of hours needed for the
committees to do their work? From the graph, it follows that an edge between two committees means that
they have at least one member in common. Thus, they cannot meet at the same time. No edge between
committees means that they can meet at the same time. For example, committees S1 and S4 can meet
the first hour. Then committees S2 and S5 can meet the second hour. Finally, committees S3 and S6 can
meet the third hour. Can you see why three hours is the smallest number of hours that the six committees
can meet?
import itertools
from z3 import *
# 7 peoples , 6 committees
S={}
S[1]= set ([1, 2, 3])
S[2]= set ([2, 3, 4])
S[3]= set ([3, 4, 5])
S[4]= set ([4, 5, 6])
S[5]= set ([5, 6, 7])
S[6]= set ([1, 6, 7])
committees =len(S)
s= Solver ()
schedule ={}
266
for t in schedule :
print "hour:", t, " committees :", schedule [t]
The result:
# 16 peoples , 4 groups
PERSONS =16
GROUPS =4
s= Solver ()
# each pair of persons can 't be in the same group , because they hate each other .
# IOW , we add an edge between vertices .
s.add( person [0] != person [7])
s.add( person [0] != person [8])
s.add( person [0] != person [9])
s.add( person [2] != person [9])
s.add( person [9] != person [14])
s.add( person [11] != person [15])
s.add( person [11] != person [1])
s.add( person [11] != person [2])
s.add( person [11] != person [9])
s.add( person [10] != person [1])
267
Form expression like:
If( person_0 == g, 1, 0) +
If( person_1 == g, 1, 0) +
If( person_2 == g, 1, 0) +
...
If( person_15 == g, 1, 0)
"""
return Sum (*[ If( person [i]==g, 1, 0) for i in range ( PERSONS )])
groups ={}
for i in range ( PERSONS ):
g=m[ person [i]]. as_long ()
if g not in groups :
groups [g]=[]
groups [g]. append (i)
for g in groups :
print "group %d, persons :" % g, groups [g]
The result:
char * kmp_search (char *haystack , size_t haystack_size , char *needle , size_t needle_size )
;
int64_t T [1024];
char * kmp_search (char *haystack , size_t haystack_size , char *needle , size_t needle_size )
{
// int *T;
int64_t i, j;
char * result = NULL;
268
if ( needle_size ==0)
return haystack ;
// free(T);
return result ;
}
int main ()
{
printf ("%s\n", helper (" hello world ", " world "));
printf ("%s\n", helper (" hello world ", "ell"));
};
... as you can see, I simplified it a bit, there are no more calls to malloc/free and T[] array is now global.
Then I compiled it using GCC 7.3 x64 and reworked assembly listing a little, now there are no registers, but rather
vXX variables, each one is assigned only once, in a SSA4 manner. No variable assigned more than once. This is AT&T
syntax.
#RDI − haystack v1
#RSI − haystack_size v2
#RDX − needle v3
#RCX − needle_size v4
. text
. globl kmp_search
. type kmp_search , @function
kmp_search :
# v1 v2 v3 v4 v5 v6 v7 v8 v9 v10 v11 v12 v13 v14 v15 v16
269
testq %v4 , %v4 # | | | U
movq %v1 , %rax # U | | |
je . exit # | | | |
leaq (%v4,%v3 ) , %v7 # | | U U D
movq %v3 , %v5 # | | U | D |
leaq 8+T(%r i p ) , %v9 # | | | | | | D
movq $−1, T(%r i p ) # | | | | | | |
cmpq %v5 , %v7 # | | | | U U |
leaq −8(%v9 ) , %v8 # | | | | | | D U
je . L20 # | | | | | | | |
. L6 : # | | | | | | | |
movq −8(%v9 ) , %v14 # | | | | | | | U D
addq $1 , %v14 # | | | | | | | | U
testq %v14 , %v14 # | | | | | | | | U
movq %v14 , (%v9 ) # | | | | | | | U U
jle . L4 # | | | | | | | | |
movzbl (%v5 ) , %v11 # | | | | U | | | D |
cmpb %v11_byte , −1(%v3,%v14 ) # | | U | | | | | U U
jne . L5 # | | | | | | | | |
jmp . L4 # | | | | | | | | |
. L21 : # | | | | | | | | |
movzbl −1(%v3,%v14 ) , %v12 # | | U | | | | | D U
cmpb %v12_byte , (%v5 ) # | | | | U | | | U |
je . L4 # | | | | | | | | |
. L5 : # | | | | | | | | |
movq −8(%v8,%v14 , 8 ) , %v15 # | | | | | | U | U D
addq $1 , %v15 # | | | | | | | U
testq %v15 , %v15 # | | | | | | | U
movq %v15 , (%v9 ) # | | | | | | U U
jg . L21 # | | | | | | |
. L4 : # | | | | | | |
addq $1 , %v5 # | | | | U | |
addq $8 , %v9 # | | | | | | U
cmpq %v5 , %v7 # | | | | U U |
jne . L6 # | | | | | | |
. L20 :
# v1 v2 v3 v4 v5 v6 v7 v8 v9 v10 v11 v12 v13 v14 v15 v16
# | | | |
leaq T(%r i p ) , %v6 # | | | | D
xorq %v16 , %v16 # | | | | | D
xorq %v10 , %v10 # | | | | | D |
. L7 : # | | | | | | |
cmpq %v10 , %v2 # | U | | | U |
jbe . L22 # | | | | | | |
. L11 : # | | | | | | |
testq %v16 , %v16 # | | | | | | U
js . L8 # | | | | | | |
movzbl (%v3,%v16 ) , %v13 # | | U | | | D U
cmpb %v13_byte , (%v1,%v10 ) # U | | | U U |
je . L8 # | | | | | |
cmpq %v10 , %v2 # | U | | U |
movq (%v6,%v16 , 8 ) , %v16 # | | U | U
ja . L11 # | | | |
. L22 : # | | | |
xorq %rax , %rax # | | | |
ret # | | | |
. L8 : # | | | |
addq $1 , %v16 # | | | U
addq $1 , %v10 # | | U |
cmpq %v16 , %v4 # | U | U
jne . L7 # | | |
subq %v4 , %v10 # | U U
leaq (%v1,%v10 ) , %rax # U U
. exit :
ret
.comm T, 8 1 9 2 , 3 2
Dangling ”noodles” you see at right are ”live ranges” of each vXX variable. ”D” means ”defined”, ”U” - ”used” or
”used and then defined again”. Whenever live range is started, we need to allocate variable (in a register or a local stack).
When it’s ending, we do not need to keep it somewhere in storage (in a register or a local stack).
As you can see, the function has two parts: preparation and processing. You can clearly see how live ranges are divided
270
by two groups, except of first 4 variables, which are function arguments.
You see, there are 16 variables. But we want to use as small number of registers, as possible. If several live ranges are
present at some address or point of time, these variables cannot be allocated in the same register.
This is how we can assign a register to each live range using Z3 SMT-solver:
from z3 import *
s= Solver ()
registers =["RDI", "RSI", "RDX", "RCX", "R8", "R9", "R10", "R11", "R12", "R13", "R14"
, "R15"]
# first 4 variables are function arguments and they are always linked to rdi/rsi/rdx
/rcx:
s.add(v [1]==0)
s.add(v [2]==1)
s.add(v [3]==2)
s.add(v [4]==3)
if s. check () == sat:
print "* colors =", colors
m=s. model ()
for i in range (1, 17):
print "v%d=%s" % (i, registers [m[v[i]]. as_long () ])
271
attempt ( colors )
272
#RDI − haystack v1
#RSI − haystack_size v2
#RDX − needle v3
#RCX − needle_size v4
. text
. globl kmp_search
. type kmp_search , @function
kmp_search :
# v1 v2 v3 v4 v5 v6 v7 v8 v9 v10 v11 v12 v13 v14 v15 v16
testq %rcx , %rcx # | | | U
movq %rd i , %rax # U | | |
je . exit # | | | |
leaq (%rcx ,%rdx ) , %r8 # | | U U D
movq %rdx , %r10 # | | U | D |
leaq 8+T(%r i p ) , %r11 # | | | | | | D
movq $−1, T(%r i p ) # | | | | | | |
cmpq %r10 , %r8 # | | | | U U |
leaq −8(%r11 ) , %r13 # | | | | | | D U
je . L20 # | | | | | | | |
. L6 : # | | | | | | | |
movq −8(%r11 ) , %r9 # | | | | | | | U D
addq $1 , %r9 # | | | | | | | | U
testq %r9 , %r9 # | | | | | | | | U
movq %r9 , (%r11 ) # | | | | | | | U U
jle . L4 # | | | | | | | | |
movzbl (%r10 ) , %r12d # | | | | U | | | D |
cmpb %r12b , −1(%rdx ,%r9 ) # | | U | | | | | U U
jne . L5 # | | | | | | | | |
jmp . L4 # | | | | | | | | |
. L21 : # | | | | | | | | |
movzbl −1(%rdx ,%r9 ) , %r12d # | | U | | | | | D U
cmpb %r12b , (%r10 ) # | | | | U | | | U |
je . L4 # | | | | | | | | |
. L5 : # | | | | | | | | |
movq −8(%r13 ,%r9 , 8 ) , %r12 # | | | | | | U | U D
addq $1 , %r12 # | | | | | | | U
testq %r12 , %r12 # | | | | | | | U
movq %r12 , (%r11 ) # | | | | | | U U
jg . L21 # | | | | | | |
. L4 : # | | | | | | |
addq $1 , %r10 # | | | | U | |
addq $8 , %r11 # | | | | | | U
cmpq %r10 , %r8 # | | | | U U |
jne . L6 # | | | | | | |
. L20 :
# v1 v2 v3 v4 v5 v6 v7 v8 v9 v10 v11 v12 v13 v14 v15 v16
# | | | |
leaq T(%r i p ) , %r11 # | | | | D
xorq %r9 , %r9 # | | | | | D
xorq %r10 , %r10 # | | | | | D |
. L7 : # | | | | | | |
cmpq %r10 , %r s i # | U | | | U |
jbe . L22 # | | | | | | |
. L11 : # | | | | | | |
testq %r9 , %r9 # | | | | | | U
js . L8 # | | | | | | |
movzbl (%rdx ,%r9 ) , %r8d # | | U | | | D U
cmpb %r8b , (%r d i ,%r10 ) # U | | | U U |
je . L8 # | | | | | |
cmpq %r10 , %r s i # | U | | U |
movq (%r11 ,%r9 , 8 ) , %r9 # | | U | U
ja . L11 # | | | |
. L22 : # | | | |
xorq %rax , %rax # | | | |
ret # | | | |
. L8 : # | | | |
addq $1 , %r9 # | | | U
addq $1 , %r10 # | | U |
cmpq %r9 , %rcx # | U | U
jne . L7 # | | |
273
subq %rcx , %r10 # | U U
leaq (%rd i ,%r10 ) , %rax # U U
. exit :
ret
.comm T, 8 1 9 2 , 3 2
5 https://yurichev.com/writings/Math-for-programmers.pdf
274
Chapter 10
Knapsack problems
10.1 Popsicles
Found this problem at http://artofproblemsolving.com/wiki/index.php?title=2017_AMC_12A_Problems/Problem_
1:
Pablo buys popsicles for his friends. The store sells single popsicles for $1 each, 3-popsicle boxes for
$2, and 5-popsicle boxes for $3. What is the greatest number of popsicles that Pablo can buy with $8?
s= Optimize ()
s.add(box1pop >=0)
s.add(box3pop >=0)
s.add(box5pop >=0)
s. maximize ( pop_total )
print s. check ()
print s. model ()
The result:
sat
[ box3pop = 1,
box5pop = 2,
cost_total = 8,
pop_total = 13,
275
box1pop = 0]
( assert (=
((_ zero_extend 16) pop_total )
( bvadd
((_ zero_extend 16) box1pop )
(bvmul ((_ zero_extend 16) box3pop ) # x00000003 )
(bvmul ((_ zero_extend 16) box5pop ) # x00000005 )
)))
( assert (=
((_ zero_extend 16) cost_total )
( bvadd
((_ zero_extend 16) box1pop )
(bvmul ((_ zero_extend 16) box3pop ) # x00000002 )
(bvmul ((_ zero_extend 16) box5pop ) # x00000003 )
)))
( maximize pop_total )
(check -sat)
(get - model )
; correct solution :
;( model
; (define -fun box1pop () (_ BitVec 16) (_ bv0 16)) ; 0x0
; (define -fun box3pop () (_ BitVec 16) (_ bv1 16)) ; 0x1
; (define -fun box5pop () (_ BitVec 16) (_ bv2 16)) ; 0x2
; (define -fun pop_total () (_ BitVec 16) (_ bv13 16)) ; 0xd
; (define -fun cost_total () (_ BitVec 16) (_ bv8 16)) ; 0x8
;)
276
from z3 import *
import itertools
storages =[700 , 30, 100 , 800 , 100 , 800 , 300 , 150 , 60, 500 , 1000]
files =[18 , 57, 291 , 184 , 167 , 496 , 45, 368 , 144 , 428 , 15, 100 , 999]
print " trying to fit all the files into storages :", storages_to_be_used ,
s= Solver ()
... in plain English - if a file is in storage , add its size to the final sum
"""
s.add( storage_occupied [i]== Sum ([ If( file_in_storage [f]==i, files [f], 0) for f in
range ( files_n )]))
277
# ... but sum of all files in each storage must be lower than what we have in
the storage :
s.add(And( storage_occupied [i]>=0, storage_occupied [i]<= storages [
storages_to_be_used [i]]))
if s. check () == sat:
print "sat"
print "* solution (%d storages ):" % t
m=s. model ()
# print m
for i in range (t):
print " storage %d ( total =%d):" % ( storages_to_be_used [i], storages [
storages_to_be_used [i]])
for f in range ( files_n ):
if m[ file_in_storage [f]]. as_long () ==i:
print " file%d (%d)" % (f, files [f])
print " allocated on storage =%d" % (m[ storage_occupied [i]]. as_long ()),
print "free on storage =%d" % ( storages [ storages_to_be_used [i]] - m[
storage_occupied [i]]. as_long ())
print " total in all storages =%d" % storage_t
print " allocated on all storages =%d%%" % (( float ( files_t )/ float ( storage_t )) *100)
print ""
return True
else:
print " unsat "
return False
( https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/knapsack/backup/backup.py )
Choose any solution you like:
trying to fit all the files into storages : (0, 3, 5, 7, 10) sat
* solution (5 storages ):
storage0 (total =700) :
file0 (18)
file3 (184)
file9 (428)
allocated on storage =630 free on storage =70
storage3 (total =800) :
278
file2 (291)
file5 (496)
allocated on storage =787 free on storage =13
storage5 (total =800) :
file1 (57)
file4 (167)
file6 (45)
file7 (368)
file8 (144)
allocated on storage =781 free on storage =19
storage7 (total =150) :
file10 (15)
file11 (100)
allocated on storage =115 free on storage =35
storage10 ( total =1000) :
file12 (999)
allocated on storage =999 free on storage =1
total in all storages =3450
allocated on all storages =96%
trying to fit all the files into storages : (0, 3, 5, 8, 10) sat
* solution (5 storages ):
storage0 (total =700) :
file3 (184)
file5 (496)
allocated on storage =680 free on storage =20
storage3 (total =800) :
file1 (57)
file4 (167)
file8 (144)
file9 (428)
allocated on storage =796 free on storage =4
storage5 (total =800) :
file0 (18)
file2 (291)
file7 (368)
file11 (100)
allocated on storage =777 free on storage =23
storage8 (total =60):
file6 (45)
file10 (15)
allocated on storage =60 free on storage =0
storage10 ( total =1000) :
file12 (999)
allocated on storage =999 free on storage =1
total in all storages =3360
allocated on all storages =98%
Now something practical. You may want to store each file twice. And no pair must reside on a single storage. Not a
problem, just make two arrays of variables:
_PRE_BEGIN
...
279
...
...
...
( https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/knapsack/backup/backup_twice.py )
The result:
280
total in all storages =3600
allocated on all storages =99%
trying to fit all the files into storages : (0, 3, 5, 9, 10) sat
* solution (5 storages ):
storage0 (total =700) :
file0 (1st copy) (18)
file3 (2nd copy) (184)
file5 (2nd copy) (496)
allocated on storage =698 free on storage =2
storage3 (total =800) :
file1 (2nd copy) (57)
file2 (2nd copy) (291)
file4 (2nd copy) (167)
file8 (1st copy) (144)
file9 (2nd copy) (15)
allocated on storage =674 free on storage =126
storage5 (total =800) :
file4 (1st copy) (167)
file6 (2nd copy) (45)
file7 (1st copy) (368)
file8 (2nd copy) (144)
allocated on storage =724 free on storage =76
storage9 (total =500) :
file2 (1st copy) (291)
file3 (1st copy) (184)
allocated on storage =475 free on storage =25
storage10 ( total =1000) :
file0 (2nd copy) (18)
file1 (1st copy) (57)
file5 (1st copy) (496)
file6 (1st copy) (45)
file7 (2nd copy) (368)
file9 (1st copy) (15)
allocated on storage =999 free on storage =1
total in all storages =3800
allocated on all storages =93%
RAM storage
srv0 2 100
srv1 4 800
srv2 4 1000
srv3 16 8000
srv4 8 3000
srv5 16 6000
srv6 16 4000
srv7 32 2000
srv8 8 1000
srv9 16 10000
srv10 8 1000
281
And you’re going to put these virtual machines to servers:
RAM storage
VM0 1 100
VM1 16 900
VM2 4 710
VM3 2 800
VM4 4 7000
VM5 8 4000
VM6 2 800
VM7 4 2500
VM8 16 450
VM9 16 3700
VM10 12 1300
The problem: use as small number of servers, as possible. Fit VMs into them in the most efficient way, so that the
free RAM/storage would be minimal.
This is like knapsack problem. But the classic knapsack problem is about only one dimension (weight or size). We’ve
two dimensions here: RAM and storage. This is called multidimensional knapsack problem.
Another problem we will solve here is a bin packing problem.
from z3 import *
import itertools
# RAM , storage
vms =[(1 , 100) ,
(16 , 900) ,
(4, 710) ,
(2, 800) ,
(4, 7000) ,
(8, 4000) ,
(2, 800) ,
(4, 2500) ,
(16 , 450) ,
(16 , 3700) ,
(12 , 1300)]
vms_total =len(vms)
282
def try_to_fit_into_servers ( servers_to_be_used ):
t=len( servers_to_be_used )
# for each server :
RAM_allocated =[ Int('srv% d_RAM_allocated ' % i) for i in range (t)]
storage_allocated =[ Int('srv% d_storage_allocated ' % i) for i in range (t)]
# which server this VM occupies ?
VM_in_srv =[ Int('VM% d_in_srv ' % i) for i in range ( vms_total )]
s= Solver ()
If( VM0_in_srv == 3, 1, 0) +
If( VM1_in_srv == 3, 16, 0) +
If( VM2_in_srv == 3, 4, 0) +
If( VM3_in_srv == 3, 2, 0) +
If( VM4_in_srv == 3, 4, 0) +
If( VM5_in_srv == 3, 8, 0) +
If( VM6_in_srv == 3, 2, 0) +
If( VM7_in_srv == 3, 4, 0) +
If( VM8_in_srv == 3, 16, 0) +
If( VM9_in_srv == 3, 16, 0) +
If( VM10_in_srv == 3, 12, 0)
"""
# RAM
s.add( RAM_allocated [i]== Sum ([ If( VM_in_srv [v]==i, vms[v][0] , 0) for v in range (
vms_total )]))
# storage
s.add( storage_allocated [i]== Sum ([If( VM_in_srv [v]==i, vms[v][1] , 0) for v in
range ( vms_total )]))
# ... but sum of all RAM/ storage occupied in each server must be lower than what
we have in the server :
283
s.add(And( RAM_allocated [i]>=0, RAM_allocated [i]<= servers [ servers_to_be_used [i
]][0]) )
s.add(And( storage_allocated [i]>=0, storage_allocated [i]<= servers [
servers_to_be_used [i ]][1]) )
if s. check () == sat:
print "sat"
print "* solution (%d servers ):" % t
m=s. model ()
( https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/knapsack/VM_packing/VM_pack.py )
The result:
RAM total we need 85
storage total we need 22260
trying to fit VMs into servers : (3, 4, 5, 6, 7) unsat
trying to fit VMs into servers : (3, 4, 5, 7, 9) sat
* solution (5 servers ):
srv3 ( total =16/8000) : VM2 (4/710) VM3 (2/800) VM5 (8/4000) VM6 (2/800) allocated on srv
=16/6310 free on srv =0/1690
srv4 ( total =8/3000) : VM0 (1/100) VM7 (4/2500) allocated on srv =5/2600 free on srv =3/400
srv5 ( total =16/6000) : VM9 (16/3700) allocated on srv =16/3700 free on srv =0/2300
284
srv7 ( total =32/2000) : VM1 (16/900) VM8 (16/450) allocated on srv =32/1350 free on srv
=0/650
srv9 ( total =16/10000) : VM4 (4/7000) VM10 (12/1300) allocated on srv =16/8300 free on srv
=0/1700
total in all servers =88/29000
allocated on all servers =96%/76%
285
286
Chapter 11
Twenty golfers wish to play in foursomes for 5 days. Is it possible for each golfer to play no more than
once with any other golfer?
...
Event organizers for bowling, golf, bridge, or tennis frequently tackle problems of this sort, unaware of
the problem complexity. In general, it is an unsolved problem. A table of known results is maintained by
Harvey.
( http://mathworld.wolfram.com/SocialGolferProblem.html )
Fifteen young ladies in a school walk out three abreast for seven days in succession: it is required to
arrange them daily so that no two shall walk twice abreast.
( https://en.wikipedia.org/wiki/Kirkman%27s_schoolgirl_problem )
This is naive and straightforward solution:
from MK85 import *
import itertools
s=MK85 ()
287
assert len(l1)== len(l2)
expr =[]
for pair_eq in range (len(l1)):
tmp =[]
for i in range (len(l1)):
if pair_eq ==i:
tmp. append (l1[i]== l2[i])
else:
tmp. append (l1[i]!= l2[i])
expr. append (And (* tmp))
s.add(Or (* expr))
assert s. check ()
m=s. model ()
print ""
print " persons grouped :"
for day in range (DAYS):
print "day =%d:" % day ,
for group in range ( GROUPS ):
print persons_in_group (day , group )+" ",
print ""
288
day =4: 2 3 4 1 0 3 0 0 4 4 2 3 1 1 2
day =5: 0 4 0 2 0 2 2 4 1 3 4 1 3 1 3
day =6: 0 0 2 4 1 1 3 4 3 4 3 2 0 1 2
persons grouped :
day =0: EIM CFH JKN BGO ADL
day =1: CDK FIO AGN HLM BEJ
day =2: FKM GJL DEO BCN AHI
day =3: AFJ HNO EKL CGM BDI
day =4: EGH DMN AKO BFL CIJ
day =5: ACE ILN DFG JMO BHK
day =6: ABM EFN CLO GIK DHJ
It takes 3-5s seconds on my old Intel Xeon E3-1220 3.10GHz. Thanks to picosat SAT solver, MK85 on this small
problem has comparable efficiency as Z3’s.
I’ve also tried to represent each number (group in which schoolgirl/golfer is) as a single bit (one-hot encoding):
from MK85 import *
import itertools , math
s=MK85 ()
# get two arrays of variables XORed . one element of this new array must be zero:
def only_one_in_pair_can_be_equal (l1 , l2):
assert len(l1)== len(l2)
only_one_must_be_zero ([l1[i]^ l2[i] for i in range (len(l1))])
assert s. check ()
m=s. model ()
289
print " person :"+"".join ([ chr(ord('A')+i)+" " for i in range ( PERSONS )])
for day in range (DAYS):
print "day =%d:" % day ,
for person in range ( PERSONS ):
print int(math.log(m["%d_%d" % (person , day)] ,2)),
print ""
print ""
print " persons grouped :"
for day in range (DAYS):
print "day =%d:" % day ,
for group in range ( GROUPS ):
print persons_in_group (day , group )+" ",
print ""
Scheduling Tradition
There are 12 school teams, unimaginatively named A, B, C, D, E, F, G, H, I, J, K, and L. They must
play one another on 11 consecutive days on six fields. Every team must play every other team exactly
once. Each team plays one game per day.
Warm-Up Suppose there were four teams A, B, C, D and each team has to play every other in three
days on two fields. How can you do it?
Solution to Warm-Up
We’ll represent the solution in two columns corresponding to the two playing fields. Thus, in the first
day, A plays B on field 1 and C plays D on field 2. AB CD AC DB AD BC
Not only does the real problem involve 12 teams instead of merely four, but there are certain constraints
due to traditional team rivalries: A must play B on day 1, G on day 3, and H on day 6. F must play I on
day 2 and J on day 5. K must play H on day 9 and E on day 11. L must play E on day 8 and B on day
9. H must play I on day 10 and L on day 11. There are no constraints on C or D because these are new
teams.
1. Can you form an 11-day schedule for these teams that satisfies the constraints?
It may seem difficult, but look again at the warm-up. Look in particular at the non-A columns. They
are related to one another. If you understand how, you can solve the harder problem.
This is like Kirkman’s Schoolgirl Problem I have solved using SMT before, but this time I’ve rewritten it as a SAT
problem. Also, I added additional constraints relating to “team rivalries”.
#!/ usr/bin/env python3
1 Social Golfer Problem
290
import SAT_lib
import itertools , math
# get two arrays of variables XORed . one element of this new array must be zero:
def only_one_in_pair_can_be_equal (l1 , l2):
assert len(l1)== len(l2)
only_one_must_be_zero ([s. BV_XOR (l1[i], l2[i]) for i in range (len(l1))])
291
# enumerate all possible pairs :
for pair in itertools . combinations ( range ( PERSONS ), r=2):
only_one_in_pair_can_be_equal (tbl[pair [0]] , tbl[pair [1]])
assert s. solve ()
print ("")
print (" persons grouped :")
for day in range (DAYS):
t=("day =%2d: " % day)
for group in range ( GROUPS ):
t=t+ persons_in_group (day , group )+" "
print (t)
The solution:
persons grouped :
day= 0: FH CL GK DJ AB EI
day= 1: BK GJ EH CD FI AL
day= 2: DL CE FK IJ AG BH
day= 3: IL DE GH AK CF BJ
day= 4: BE KL FJ AH CI DG
day= 5: FG IK JL AE CH BD
day= 6: FL EG JK BI DH AC
day= 7: CK DF BG EL HJ AI
day= 8: HK EF BL GI AD CJ
day= 9: GL DK BC HI AF EJ
day =10: CG HL AJ EK DI BF
292
(“Person” and “team” terms are interchangeable in my code.)
Thanks to parallel lingeling SAT solver2 I’ve used this time, it takes couple of minutes on a decent 4-core CPU.
The source code: https://github.com/DennisYurichev/SAT_SMT_by_example/tree/master/SGP/SAT.
2 http://fmv.jku.at/lingeling/
293
294
Chapter 12
Latin squares
Magic/Latin square is a square filled with numbers/letters, which are all distinct in each row and column. Sudoku is 9*9
magic square with additional constraints (for each 3*3 subsquare).
. . . . *
. . . * .
. . * . .
. * . . .
* . . . .
. . * . .
. . . * .
. . . . *
* . . . .
. * . . .
* . . . .
. . . . *
. . . * .
. . * . .
. * . . .
I could only find 5*5 and 7*7 squares using Z3, couldn’t find 11*11 square, however, it’s possible to prove there are no
6*6 and 4*4 squares (such squares doesn’t exist if size is divisible by 2 or 3).
from z3 import *
#SIZE =4 # unsat
#SIZE =5 # OK
#SIZE =6 # unsat
SIZE =7 # OK
295
s= Solver ()
print s. check ()
m=s. model ()
3 4 5 1 2
5 1 2 3 4
2 3 4 5 1
4 5 1 2 3
1 2 3 4 5
7*7:
4 7 6 5 1 2 3
6 5 1 2 3 4 7
1 2 3 4 7 6 5
3 4 7 6 5 1 2
7 6 5 1 2 3 4
5 1 2 3 4 7 6
2 3 4 7 6 5 1
This is a good example of NP-problem: you can check the result visually, but it takes several seconds for computer to
find it.
We can also use different encoding: each number can be represented by one bit. 0b0001 for 1, 0b0010 for 2, 0b1000 for
4, etc. Then a ”Distinct” operator can be replaced by OR operation and comparison against mask with all bits present.
import math , operator
from z3 import *
296
#SIZE =4 # unsat
SIZE =5 # OK
#SIZE =6 # unsat
#SIZE =7 # OK
#SIZE =11 # no answer
a=[[ BitVec ('%d_%d' % (r,c), SIZE) for c in range (SIZE)] for r in range (SIZE)]
s= Solver ()
print s. check ()
m=s. model ()
That works twice as faster (however, numbers are in 0..SIZE-1 range instead of 1..SIZE, but you’ve got the idea).
Besides recreational mathematics, Knut Vik squares like these are very important in design of experiments.
Further reading:
• A. Hedayat and W, T. Federer - On the Nonexistence of Knut Vik Designs for all Even Orders (1973)
• A. Hedayat - A Complete Solution to the Existence and Nonexistence of Knut Vik Designs and Orthogonal Knut
Vik Designs (1975)
297
298
Chapter 13
INPUT_SIZE =32
OUTPUT_SIZE = INPUT_SIZE *2
"""
rows with dots are partial products :
aaaa
b ....
b ....
b ....
b ....
"""
# partial products
p=[ BitVec ('p_%d' % i, OUTPUT_SIZE ) for i in range ( INPUT_SIZE )]
s= Solver ()
1 https://yurichev.com/writings/Math-for-programmers.pdf
299
for i in range ( INPUT_SIZE ):
# if there is a bit in b[], assign shifted a[] padded with zeroes at left/ right
# if there is no bit in b[], let p[] be zero
if i==0:
s.add(p[i] == If((b>>i)&1==1 , Concat ( BitVecVal (0, OUTPUT_SIZE -i- INPUT_SIZE ), a),
0))
else:
s.add(p[i] == If((b>>i)&1==1 , Concat ( BitVecVal (0, OUTPUT_SIZE -i- INPUT_SIZE ), a,
BitVecVal (0, i)), 0))
# tests
m=s. model ()
print "sat , a=0x%x, b=0x%x" % (m[a]. as_long () , m[b]. as_long ())
300
Deducing all these parameters is surprisingly simple using Z3, just get two values for 01 byte and 02, or any other
bytes.
from z3 import *
import struct
# knobs :
# CRC -16 ( Modbus ) on https :// www. lammertbies .nl/comm/info/crc - calculation .html
# width =16
# samples =["\ x01", "\ x02 "]
# must_be =[0 x807E , 0 x813E ]
# sample_len =1
# CRC -16 - CCITT , Kermit on https :// www. lammertbies .nl/comm/info/crc - calculation .html
# width =16
# samples =["\ x01", "\ x02 "]
# must_be =[0 x8911 , 0 x1223 ]
# sample_len =1
width =32
samples =["\x01", "\x02"]
must_be =[0 xA505DF1B , 0 x3C0C8EA1 ]
sample_len =1
# crc64_1 .c:
# width =64
# samples =["\ x01", "\ x02 "]
# must_be =[0 x28d250b0f0900abe , 0 x6c9fd98969f81a9d ]
# sample_len =1
# crc64_2 .c ( redis ):
# width =64
# samples =["\ x01", "\ x02 "]
# must_be =[0 x7ad870c830358979 , 0 xf5b0e190606b12f2 ]
# sample_len =1
# crc64_3 .c:
# width =64
# samples =["\ x01", "\ x02 "]
# must_be =[0 xb32e4cbe03a75f6f , 0 xf4843657a840a05b ]
# sample_len =1
301
# recipe -259177 -1. py , CRC -64 - ISO
# width =64
# samples =["\ x01", "\ x02 "]
# must_be =[0 x01B0000000000000 , 0 x0360000000000000 ]
# sample_len =1
# width =32
# samples =["12" ," ab"]
# must_be =[0 x4F5344CD , 0 x9E83486D ]
# sample_len =2
states =[[[ BitVec ('state_ %d_%d_%d' % (sample , i, bit), width ) for bit in range (8+1) ] for
i in range ( sample_len +1)] for sample in range (len( samples ))]
s= Solver ()
302
# implement basic CRC algorithm
for i in range ( sample_len ):
s.add( states [ sample ][i +1][0] == states [ sample ][i][8] ^ ord( samples [ sample ][i]))
print "poly =0x%x, init =0x%x, %s" % (m[poly ]. as_long () , m[ states [0][0][8]].
as_long () , outparams )
Sometimes, we have no enough information, but still can get something. This is for CRC-16-CCITT:
303
One of these results is correct.
We can get something even if we have only one result for one input byte:
• http://www.cosc.canterbury.ac.nz/greg.ewing/essays/CRC-Reverse-Engineering.html
• http://reveng.sourceforge.net/crc-catalogue/1-15.htm
• http://reveng.sourceforge.net/crc-catalogue/16.htm
• http://reveng.sourceforge.net/crc-catalogue/17plus.htm
from z3 import *
import copy , random
width =32
s= Solver ()
no_call =0
304
# make each variable name unique
# no_call ( number of call) increments at each call to CRC () function
global no_call
states =[[ BitVec ('state_ %d_%d_%d' % (no_call , i, bit), width ) for bit in range (8+1) ]
for i in range (len( _input )+1)]
no_call = no_call +1
# initial state is always 0:
s.add( states [0][8]==0)
poly =0 xf9
poly =0 x50
305
poly =0 x90
...
poly =0 xf7af
poly =0 x368
poly =0 x268
poly =0 x228
...
poly =0 x1683a5ab
poly =0 x78553eda
poly =0 x7a153eda
poly =0 x7b353eda
...
poly =0 x8000000000000006
poly =0 x926b19b536a62f10
poly =0 x4a7bb0a7da78a370
poly =0 xbbc781e7e83dabf0
...
Problem: at least this one. CRC must be able to detect errors in very long buffers, up to 232 for CRC32. We can’t
feed that huge buffers to SMT solver. I had success only with samples up to ≈ 32 bytes.
crc = ∼crc;
while (len --)
{
crc ^= *buf ++;
for (k = 0; k < 8; k++)
crc = crc & 1 ? (crc >> 1) ^ 0 x42f0e1eba9ea3693 : crc >> 1;
2 Cyclic redundancy check
3 There are several slightly different CRC64 implementations, the one I use here can also be different from popular ones.
306
}
return crc;
}
int main ()
{
# define HEAD_STR "Hello , world !.. "
# define HEAD_SIZE strlen ( HEAD_STR )
# define TAIL_STR " ... and goodbye "
# define TAIL_SIZE strlen ( TAIL_STR )
# define MID_SIZE 14 // work
# define BUF_SIZE HEAD_SIZE + TAIL_SIZE + MID_SIZE
klee_assert (0);
return 0;
}
Since our code uses memcmp() standard C/C++ function, we need to add --libc=uclibc switch, so KLEE will use
its own uClibc implementation.
It takes about 1 minute (on my Intel Core i3-3110M 2.4GHz notebook) and we getting this:
...
real 0m52 .643s
user 0m51 .232s
sys 0m0 .239s
...
% ls klee -last | grep err
test000001 .user.err
test000002 .user.err
test000003 .user.err
test000004 . external .err
307
object 0: size: 46
object 0: data: b'Hello , world !.. qqlicayzceamyw ... and goodbye '
Maybe it’s slow, but definitely faster than bruteforce. Indeed, log2 2614 ≈ 65.8 which is close to 64 bits. In other words,
one need ≈ 14 latin characters to encode 64 bits. And KLEE + SMT solver needs 64 bits at some place it can alter to
make final CRC64 value equal to what we defined.
I tried to reduce length of the middle block to 13 characters: no luck for KLEE then, it has no space enough.
Hello , world! <8 bytes (64 - bit value )> and goodbye <6 more bytes >
int main ()
{
# define HEAD_STR "Hello , world !.. "
# define HEAD_SIZE strlen ( HEAD_STR )
# define TAIL_STR " ... and goodbye "
# define TAIL_SIZE strlen ( TAIL_STR )
// 8 bytes for 64- bit value :
# define MID_SIZE 8
# define BUF_SIZE HEAD_SIZE + TAIL_SIZE + MID_SIZE +6
klee_assert (0);
return 0;
}
It works:
308
ktest file : 'klee -last/ test000003 .ktest '
args : [' klee_CRC64 .bc ']
num objects : 1
object 0: name: b'buf '
object 0: size: 46
object 0: data: b'Hello , world !.. T+]\ xb9A\x08\x0fq ... and goodbye \xb6\x8f\x9c\xd8\
xc5\x00 '
8 bytes between two strings is 64-bit value which equals to CRC64 of this whole block. Again, it’s faster than brute-force
way to find it. If to decrease last spare 6-byte buffer to 4 bytes or less, KLEE works so long so I’ve stopped it.
309
41 find_string (str);
42
43 return 0;
44 }
Still, it’s no magic: if to remove condition at lines 23..25 (i.e., if to relax constraints), KLEE will produce some other
string, which will be still correct for the CRC32 value given.
It works, because 6 Latin characters in A..Z limits contain ≈ 28.2 bits: log2 266 ≈ 28.2, which is even smaller value
than 32. In other words, the final CRC32 value holds enough bits to recover ≈ 28.2 bits of input.
The input buffer can be even bigger, if each byte of it will be in even tighter constraints (decimal digits, binary digits,
etc).
310
Chapter 14
MaxSAT/MaxSMT
...
3395: 189: for (i = 1; i < F; i++) {
3395: 190: if (( cmp = key[i] - sp -> text_buf [p + i]) != 0)
2565: 191: break ;
-: 192: }
2565: 193: if (i > sp -> match_length ) {
1291: 194: sp -> match_position = p;
1291: 195: if ((sp -> match_length = i) >= F)
#####: 196: break ;
-: 197: }
2565: 198: }
#####: 199: sp -> parent [r] = sp -> parent [p];
#####: 200: sp -> lchild [r] = sp -> lchild [p];
#####: 201: sp -> rchild [r] = sp -> rchild [p];
#####: 202: sp -> parent [sp -> lchild [p]] = r;
#####: 203: sp -> parent [sp -> rchild [p]] = r;
#####: 204: if (sp -> rchild [sp -> parent [p]] == p)
#####: 205: sp -> rchild [sp -> parent [p]] = r;
...
1 https://en.wikipedia.org/wiki/Set_cover_problem
2 Lempel–Ziv–Storer–Szymanski
3 https://github.com/opensource-apple/kext_tools/blob/master/compression.c
4 https://github.com/DennisYurichev/yurichev.com/blob/master/blog/set_cover/gen_gcov_tests.sh
311
A leftmost number is an execution count for each line. ##### means the line of code hasn’t been executed at all. The
second column is a line number.
Now the Z3Py script, which will parse all these 1000 gcov results and produce minimal hitting set:
import re , sys
from z3 import *
TOTAL_TESTS =1000
while True:
l=f. readline (). rstrip ()
m = re. search ('^ *([0 -9]+): ([0 -9]+) :.*$', l)
if m!= None:
lines . append (int(m.group (2)))
if len(l)==0:
break
f.close ()
return lines
312
# expression is a list which unfolds as list of arguments into Z3's Or () function (
see asterisk )
# that results in big expression like "Or( test_1 ==1 , test_2 ==1 , ...)"
# the expression is then added as a constraint :
opt.add(Or (* expressions ))
# we need to find a such solution , where minimal number of all " test_X " variables will
have 1
# "* tests " unfolds to a list of arguments : [test_1 , test_2 , test_3 ,...]
# "Sum (* tests )" unfolds to the following expression : "Sum(test_1 , test_2 , ...)"
# the sum of all " test_X " variables should be as minimal as possible :
h=opt. minimize (Sum (* tests ))
And what it produces (~19s on my old Intel Quad-Core Xeon E3-1220 3.10GHz):
We need just these 3 tests to execute (almost) all lines in the code: looks impressive, given the fact, that it would be
notoriously hard to pick these tests by hand! The result can be checked easily, again, using gcov utility.
This is sometimes also called MaxSAT/MaxSxT — the problem is to find solution, but the solution where some
variable/expression is maximal as possible, or minimal as possible.
Also, the code gives incorrect results on Z3 4.4.1, but working correctly on Z3 4.5.0 (so please upgrade). This is
relatively fresh feature in Z3, so probably it was not stable in previous versions?
The files: https://github.com/DennisYurichev/SAT_SMT_by_example/tree/master/MaxSxT/set_cover.
Further reading: https://en.wikipedia.org/wiki/Set_cover_problem, https://en.wikipedia.org/wiki/Maximum_
satisfiability_problem, https://en.wikipedia.org/wiki/Optimization_problem.
313
Find a way to check, if it was soldered correclty, with no wires stuck at ground (always 0) or current (always 1). You
can just enumerate all possible inputs (5) and this will be a table of correct inputs/outputs, 32 pairs. But you want to
make fault check as fast as possible and minimize test set.
This is almost a problem I’ve been writing before: 14.1.
We want such a test set, so that all gates’ outputs will output 0 and 1, at least once. And the test set should be as
small, as possible.
The source code is very close to my previous example...
from z3 import *
OUT_Z1 , OUT_Z2 , OUT_Z3 , OUT_Z4 , OUT_Z5 , OUT_A2 , OUT_A3 , OUT_B1 , OUT_B2 , OUT_B3 , OUT_C1 ,
OUT_C2 , OUT_P , OUT_Q , OUT_S = range ( OUTPUTS_TOTAL )
out_false_if ={}
out_true_if ={}
outs ={}
314
outs[ OUT_B1 ]= y1&x2
outs[ OUT_A2 ]= x1&y2
outs[ OUT_B2 ]= y2&x2
outs[ OUT_A3 ]= x1&y3
outs[ OUT_B3 ]= y3&x2
s= Solver ()
# this generates expression like (tests [0]==1 OR tests [1]==1 OR tests [X ]==1) :
for o in range ( OUTPUTS_TOTAL ):
opt.add(Or (*[ tests [i]==1 for i in out_false_if [o]]))
opt.add(Or (*[ tests [i]==1 for i in out_true_if [o]]))
315
print (opt.check ())
m=opt.model ()
The output:
inputs : (0, 0, 0, 0, 0) outputs of all gates : {0: 0, 1: 0, 2: 0, 3: 0, 4: 0, 5: 0, 6: 0,
7: 0, 8: 0, 9: 0, 10: 0, 11: 0, 12: 0, 13: 0, 14: 0}
inputs : (0, 0, 0, 0, 1) outputs of all gates : {0: 0, 1: 0, 2: 0, 3: 0, 4: 0, 5: 0, 6: 0,
7: 0, 8: 0, 9: 0, 10: 0, 11: 0, 12: 0, 13: 0, 14: 0}
inputs : (0, 0, 0, 1, 0) outputs of all gates : {0: 0, 1: 0, 2: 0, 3: 0, 4: 0, 5: 0, 6: 0,
7: 0, 8: 0, 9: 0, 10: 0, 11: 0, 12: 0, 13: 0, 14: 0}
inputs : (0, 0, 0, 1, 1) outputs of all gates : {0: 0, 1: 0, 2: 0, 3: 0, 4: 0, 5: 0, 6: 0,
7: 0, 8: 0, 9: 0, 10: 0, 11: 0, 12: 0, 13: 0, 14: 0}
inputs : (0, 0, 1, 0, 0) outputs of all gates : {0: 0, 1: 0, 2: 0, 3: 0, 4: 0, 5: 0, 6: 0,
7: 0, 8: 0, 9: 0, 10: 0, 11: 0, 12: 0, 13: 0, 14: 0}
inputs : (0, 0, 1, 0, 1) outputs of all gates : {0: 1, 1: 0, 2: 0, 3: 0, 4: 0, 5: 0, 6: 0,
7: 0, 8: 0, 9: 0, 10: 0, 11: 0, 12: 0, 13: 0, 14: 0}
inputs : (0, 0, 1, 1, 0) outputs of all gates : {0: 0, 1: 1, 2: 0, 3: 0, 4: 0, 5: 0, 6: 0,
7: 1, 8: 0, 9: 0, 10: 0, 11: 0, 12: 0, 13: 0, 14: 0}
inputs : (0, 0, 1, 1, 1) outputs of all gates : {0: 1, 1: 1, 2: 0, 3: 0, 4: 0, 5: 0, 6: 0,
7: 1, 8: 0, 9: 0, 10: 0, 11: 0, 12: 0, 13: 0, 14: 0}
inputs : (0, 1, 0, 0, 0) outputs of all gates : {0: 0, 1: 0, 2: 0, 3: 0, 4: 0, 5: 0, 6: 0,
7: 0, 8: 0, 9: 0, 10: 0, 11: 0, 12: 0, 13: 0, 14: 0}
inputs : (0, 1, 0, 0, 1) outputs of all gates : {0: 0, 1: 1, 2: 0, 3: 0, 4: 0, 5: 1, 6: 0,
7: 0, 8: 0, 9: 0, 10: 0, 11: 0, 12: 0, 13: 0, 14: 0}
inputs : (0, 1, 0, 1, 0) outputs of all gates : {0: 0, 1: 0, 2: 1, 3: 0, 4: 0, 5: 0, 6: 0,
7: 0, 8: 1, 9: 0, 10: 0, 11: 0, 12: 0, 13: 0, 14: 1}
inputs : (0, 1, 0, 1, 1) outputs of all gates : {0: 0, 1: 1, 2: 1, 3: 0, 4: 0, 5: 1, 6: 0,
7: 0, 8: 1, 9: 0, 10: 0, 11: 0, 12: 0, 13: 0, 14: 1}
inputs : (0, 1, 1, 0, 0) outputs of all gates : {0: 0, 1: 0, 2: 0, 3: 0, 4: 0, 5: 0, 6: 0,
7: 0, 8: 0, 9: 0, 10: 0, 11: 0, 12: 0, 13: 0, 14: 0}
inputs : (0, 1, 1, 0, 1) outputs of all gates : {0: 1, 1: 1, 2: 0, 3: 0, 4: 0, 5: 1, 6: 0,
7: 0, 8: 0, 9: 0, 10: 0, 11: 0, 12: 0, 13: 0, 14: 0}
inputs : (0, 1, 1, 1, 0) outputs of all gates : {0: 0, 1: 1, 2: 1, 3: 0, 4: 0, 5: 0, 6: 0,
7: 1, 8: 1, 9: 0, 10: 0, 11: 0, 12: 0, 13: 0, 14: 1}
inputs : (0, 1, 1, 1, 1) outputs of all gates : {0: 1, 1: 0, 2: 0, 3: 1, 4: 0, 5: 1, 6: 0,
7: 1, 8: 1, 9: 0, 10: 1, 11: 1, 12: 0, 13: 1, 14: 1}
inputs : (1, 0, 0, 0, 0) outputs of all gates : {0: 0, 1: 0, 2: 0, 3: 0, 4: 0, 5: 0, 6: 0,
7: 0, 8: 0, 9: 0, 10: 0, 11: 0, 12: 0, 13: 0, 14: 0}
inputs : (1, 0, 0, 0, 1) outputs of all gates : {0: 0, 1: 0, 2: 1, 3: 0, 4: 0, 5: 0, 6: 1,
7: 0, 8: 0, 9: 0, 10: 0, 11: 0, 12: 0, 13: 0, 14: 1}
inputs : (1, 0, 0, 1, 0) outputs of all gates : {0: 0, 1: 0, 2: 0, 3: 1, 4: 0, 5: 0, 6: 0,
7: 0, 8: 0, 9: 1, 10: 0, 11: 0, 12: 0, 13: 0, 14: 0}
inputs : (1, 0, 0, 1, 1) outputs of all gates : {0: 0, 1: 0, 2: 1, 3: 1, 4: 0, 5: 0, 6: 1,
7: 0, 8: 0, 9: 1, 10: 0, 11: 0, 12: 0, 13: 0, 14: 1}
inputs : (1, 0, 1, 0, 0) outputs of all gates : {0: 0, 1: 0, 2: 0, 3: 0, 4: 0, 5: 0, 6: 0,
7: 0, 8: 0, 9: 0, 10: 0, 11: 0, 12: 0, 13: 0, 14: 0}
inputs : (1, 0, 1, 0, 1) outputs of all gates : {0: 1, 1: 0, 2: 1, 3: 0, 4: 0, 5: 0, 6: 1,
7: 0, 8: 0, 9: 0, 10: 0, 11: 0, 12: 0, 13: 0, 14: 1}
inputs : (1, 0, 1, 1, 0) outputs of all gates : {0: 0, 1: 1, 2: 0, 3: 1, 4: 0, 5: 0, 6: 0,
7: 1, 8: 0, 9: 1, 10: 0, 11: 0, 12: 0, 13: 0, 14: 0}
inputs : (1, 0, 1, 1, 1) outputs of all gates : {0: 1, 1: 1, 2: 1, 3: 1, 4: 0, 5: 0, 6: 1,
7: 1, 8: 0, 9: 1, 10: 0, 11: 0, 12: 0, 13: 0, 14: 1}
316
inputs : (1, 1, 0, 0, 0) outputs of all gates : {0: 0, 1: 0, 2: 0, 3: 0, 4: 0, 5: 0, 6: 0,
7: 0, 8: 0, 9: 0, 10: 0, 11: 0, 12: 0, 13: 0, 14: 0}
inputs : (1, 1, 0, 0, 1) outputs of all gates : {0: 0, 1: 1, 2: 1, 3: 0, 4: 0, 5: 1, 6: 1,
7: 0, 8: 0, 9: 0, 10: 0, 11: 0, 12: 0, 13: 0, 14: 1}
inputs : (1, 1, 0, 1, 0) outputs of all gates : {0: 0, 1: 0, 2: 1, 3: 1, 4: 0, 5: 0, 6: 0,
7: 0, 8: 1, 9: 1, 10: 0, 11: 0, 12: 0, 13: 0, 14: 1}
inputs : (1, 1, 0, 1, 1) outputs of all gates : {0: 0, 1: 1, 2: 0, 3: 0, 4: 1, 5: 1, 6: 1,
7: 0, 8: 1, 9: 1, 10: 0, 11: 1, 12: 1, 13: 0, 14: 0}
inputs : (1, 1, 1, 0, 0) outputs of all gates : {0: 0, 1: 0, 2: 0, 3: 0, 4: 0, 5: 0, 6: 0,
7: 0, 8: 0, 9: 0, 10: 0, 11: 0, 12: 0, 13: 0, 14: 0}
inputs : (1, 1, 1, 0, 1) outputs of all gates : {0: 1, 1: 1, 2: 1, 3: 0, 4: 0, 5: 1, 6: 1,
7: 0, 8: 0, 9: 0, 10: 0, 11: 0, 12: 0, 13: 0, 14: 1}
inputs : (1, 1, 1, 1, 0) outputs of all gates : {0: 0, 1: 1, 2: 1, 3: 1, 4: 0, 5: 0, 6: 0,
7: 1, 8: 1, 9: 1, 10: 0, 11: 0, 12: 0, 13: 0, 14: 1}
inputs : (1, 1, 1, 1, 1) outputs of all gates : {0: 1, 1: 0, 2: 1, 3: 0, 4: 1, 5: 1, 6: 1,
7: 1, 8: 1, 9: 1, 10: 1, 11: 1, 12: 1, 13: 0, 14: 0}
output #0
false if: [0, 1, 2, 3, 4, 6, 8, 9, 10, 11, 12, 14, 16, 17, 18, 19, 20, 22, 24, 25,
26, 27, 28, 30]
true if: [5, 7, 13, 15, 21, 23, 29, 31]
output #1
false if: [0, 1, 2, 3, 4, 5, 8, 10, 12, 15, 16, 17, 18, 19, 20, 21, 24, 26, 28, 31]
true if: [6, 7, 9, 11, 13, 14, 22, 23, 25, 27, 29, 30]
output #2
false if: [0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 12, 13, 15, 16, 18, 20, 22, 24, 27, 28]
true if: [10, 11, 14, 17, 19, 21, 23, 25, 26, 29, 30, 31]
output #3
false if: [0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 16, 17, 20, 21, 24, 25,
27, 28, 29, 31]
true if: [15, 18, 19, 22, 23, 26, 30]
output #4
false if: [0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20,
21, 22, 23, 24, 25, 26, 28, 29, 30]
true if: [27, 31]
output #5
false if: [0, 1, 2, 3, 4, 5, 6, 7, 8, 10, 12, 14, 16, 17, 18, 19, 20, 21, 22, 23,
24, 26, 28, 30]
true if: [9, 11, 13, 15, 25, 27, 29, 31]
output #6
false if: [0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 18, 20, 22, 24,
26, 28, 30]
true if: [17, 19, 21, 23, 25, 27, 29, 31]
output #7
false if: [0, 1, 2, 3, 4, 5, 8, 9, 10, 11, 12, 13, 16, 17, 18, 19, 20, 21, 24, 25,
26, 27, 28, 29]
true if: [6, 7, 14, 15, 22, 23, 30, 31]
output #8
false if: [0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 12, 13, 16, 17, 18, 19, 20, 21, 22, 23, 24,
25, 28, 29]
true if: [10, 11, 14, 15, 26, 27, 30, 31]
output #9
false if: [0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 20, 21, 24,
25, 28, 29]
true if: [18, 19, 22, 23, 26, 27, 30, 31]
output #10
false if: [0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 16, 17, 18, 19, 20, 21,
22, 23, 24, 25, 26, 27, 28, 29, 30]
317
true if: [15, 31]
output #11
false if: [0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 16, 17, 18, 19, 20, 21,
22, 23, 24, 25, 26, 28, 29, 30]
true if: [15, 27, 31]
output #12
false if: [0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20,
21, 22, 23, 24, 25, 26, 28, 29, 30]
true if: [27, 31]
output #13
false if: [0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 16, 17, 18, 19, 20, 21,
22, 23, 24, 25, 26, 27, 28, 29, 30, 31]
true if: [15]
output #14
false if: [0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 12, 13, 16, 18, 20, 22, 24, 27, 28, 31]
true if: [10, 11, 14, 15, 17, 19, 21, 23, 25, 26, 29, 30]
sat
01111
10001
11011
This is it, you can test this circuit using just 3 test vectors: 01111, 10001 and 11011.
However, Donald Knuth’s test set is bigger: 5 test vectors, but his algorithm also checks ”fanout” gates (one input,
multiple outputs), which also may be faulty. I’ve omitted this for simplification.
14.3.1 GCD
To compute GCD, one of the oldest algorithms is used: Euclidean algorithm. But, I can demonstrate how to make things
much less efficient, but more spectacular.
To find GCD of 14 and 8, we are going to solve this system of equations:
x*GCD =14
y*GCD =8
Then we drop x and y, we don’t need them. This system can be solved using a piece of paper and pencil, but GCD
must be as big as possible. Here we can use Z3 in MaxSMT mode:
from z3 import *
opt = Optimize ()
opt.add(x*GCD ==14)
opt.add(y*GCD ==8)
5 https://yurichev.com/writings/Math-for-programmers.pdf
318
print (opt.check ())
print (opt.model ())
That works:
sat
[y = 4, x = 7, GCD = 2]
What if we need to find GCD for 3 numbers? Maybe we are going to fill a space with biggest possible cubes?
from z3 import *
opt = Optimize ()
opt.add(x*GCD ==300)
opt.add(y*GCD ==333)
opt.add(z*GCD ==900)
This is 3:
sat
[z = 300, y = 111 , x = 100 , GCD = 3]
In SMT-LIB form:
; checked with Z3 and MK85
; must be 21
; see also: https :// www. wolframalpha .com/ input /?i=GCD [861 ,3969 ,840]
( assert (= ( bvmul ((_ zero_extend 16) x) ((_ zero_extend 16) GCD)) (_ bv861 32)))
( assert (= ( bvmul ((_ zero_extend 16) y) ((_ zero_extend 16) GCD)) (_ bv3969 32)))
( assert (= ( bvmul ((_ zero_extend 16) z) ((_ zero_extend 16) GCD)) (_ bv840 32)))
( maximize GCD)
(check -sat)
(get - model )
; correct result :
;( model
; (define -fun x () (_ BitVec 16) (_ bv41 16)) ; 0x29
; (define -fun y () (_ BitVec 16) (_ bv189 16)) ; 0xbd
319
; (define -fun z () (_ BitVec 16) (_ bv40 16)) ; 0x28
; (define -fun GCD () (_ BitVec 16) (_ bv21 16)) ; 0x15
;)
To find LCM of 4 and 6, we are going to solve the following diophantine (i.e., allowing only integer solutions) system of
equations:
4x = 6y = LCM
... where LCM>0 and as small, as possible.
from z3 import *
opt = Optimize ()
opt.add(x*4== LCM)
opt.add(y*6== LCM)
opt.add(LCM >0)
sat
[y = 2, x = 3, LCM = 12]
320
As in my previous examples, Z3 and SMT-solver may be overkill for the task. Simpler algorithm exists for this task
(Hungarian algorithm/method) 6 .
But again, I use it to demonstrate the problem + as SMT-solvers demonstration.
Here is what I do:
#!/ usr/bin/env python
from z3 import *
321
If( choice [1]==1 , 600 ,
If( choice [1]==2 , 350 , -1))))
# find such a ( distinct ) choice []'s, so that the final_sum would be minimal :
s. minimize ( final_sum )
print s. check ()
print s. model ()
In plain English this means choose such columns, so that their sum would be as small as possible.
sat
[ choice_0 = 1,
choice_1 = 2,
choice_2 = 0,
z3name !12 = 0,
z3name !7 = 1,
z3name !10 = 2,
z3name !8 = 0,
z3name !11 = 0,
z3name !9 = 0,
final_sum = 950 ,
row_value_2 = 200 ,
row_value_1 = 350 ,
row_value_0 = 400]
322
(However, I’ve no idea what “z3name” variables mean, perhaps, some internal variables?)
The problem can also be stated in SMT-LIB 2.0 format, and solved using MK85:
( assert (= row_value1
(ite (= choice1 (_ bv0 2)) (_ bv250 16)
(ite (= choice1 (_ bv1 2)) (_ bv400 16)
(ite (= choice1 (_ bv2 2)) (_ bv250 16)
(_ bv999 16))))))
323
( assert (= row_value2
(ite (= choice2 (_ bv0 2)) (_ bv400 16)
(ite (= choice2 (_ bv1 2)) (_ bv600 16)
(ite (= choice2 (_ bv2 2)) (_ bv350 16)
(_ bv999 16))))))
( assert (= row_value3
(ite (= choice3 (_ bv0 2)) (_ bv200 16)
(ite (= choice3 (_ bv1 2)) (_ bv400 16)
(ite (= choice3 (_ bv2 2)) (_ bv250 16)
(_ bv999 16))))))
( minimize final_sum )
(check -sat)
(get - model )
VERTICES =50
324
edges =set ()
while True:
raw=f. readline ()
l=raw. rstrip ()
if len(l)==0:
break
f. close ()
print ("")
...
325
10000 -3 -5 0
10000 -3 -6 0
10000 -3 -11 0
10000 -3 -13 0
10000 -3 -14 0
10000 -3 -15 0
10000 -3 -17 0
10000 -3 -19 0
...
10000 -52 -31 0
10000 -52 -34 0
10000 -52 -36 0
10000 -52 -39 0
10000 -52 -40 0
10000 -52 -45 0
10000 -52 -46 0
10000 -52 -47 0
10000 -52 -48 0
1
2
7
14
42
46
# we don 't use coins for simplicity , but it 's not a problem to add them
326
customer_wallet_10 =1
customer_wallet_25 =0
customer_wallet_50 =15
customer_wallet_100 =20
s= Optimize ()
# sum:
s.add( from_cash_register ==
from_cash_register_1 *1 +
from_cash_register_3 *3 +
from_cash_register_5 *5 +
from_cash_register_10 *10 +
from_cash_register_25 *25 +
from_cash_register_50 *50 +
from_cash_register_100 *100)
327
from_customer =Int('from_customer ')
s.add( from_customer ==
from_customer_wallet_1 *1 +
from_customer_wallet_3 *3 +
from_customer_wallet_5 *5 +
from_customer_wallet_10 *10 +
from_customer_wallet_25 *25 +
from_customer_wallet_50 *50 +
from_customer_wallet_100 *100)
print s. check ()
m=s. model ()
print ""
sat
from_cash_register_1 = 0
328
from_cash_register_3 = 0
from_cash_register_5 = 0
from_cash_register_10 = 2
from_cash_register_25 = 0
from_cash_register_50 = 0
from_cash_register_100 = 0
from_cash_register = 20
from_customer_wallet_1 = 2
from_customer_wallet_3 = 1
from_customer_wallet_5 = 0
from_customer_wallet_10 = 0
from_customer_wallet_25 = 0
from_customer_wallet_50 = 11
from_customer_wallet_100 = 16
from_customer = 2155
So that the cashier have to pull only 2 tenners from cash desk.
Now what if we don’t care about small banknotes, but want to make transaction as paperless as possible:
...
...
sat
from_cash_register_1 = 0
from_cash_register_3 = 0
from_cash_register_5 = 1
from_cash_register_10 = 1
from_cash_register_25 = 0
from_cash_register_50 = 0
from_cash_register_100 = 0
from_cash_register = 15
from_customer_wallet_1 = 0
from_customer_wallet_3 = 0
329
from_customer_wallet_5 = 0
from_customer_wallet_10 = 0
from_customer_wallet_25 = 0
from_customer_wallet_50 = 3
from_customer_wallet_100 = 20
from_customer = 2150
Likewise, you can minimize banknotes from cashier only, or from customer only.
STUDENTS =15
CEILING_LOG2_STUDENTS =4 # 4 bits to hold a number in 0..14 range
POSSIBLE_INTERESTS =8
# each variable is " grounded " to the bitmask from interests []:
interests_vars =[s. alloc_BV ( POSSIBLE_INTERESTS ) for i in range (2** CEILING_LOG2_STUDENTS )]
for st in range (2** CEILING_LOG2_STUDENTS ):
s. fix_BV ( interests_vars [st], SAT_lib . n_to_BV ( interests [st], POSSIBLE_INTERESTS ))
330
# connect interests of each student to permuted version
# use multiplexer ...
interests_of_student_in_position ={}
for st in range (2** CEILING_LOG2_STUDENTS ):
interests_of_student_in_position [st ]=s. create_wide_MUX ( interests_vars ,
students_positions [st])
assert s. solve ()
total_in_all_groups =0
# print solution :
for group in range ( STUDENTS /3):
print "* group ", group
st1= SAT_lib . BV_to_number (s. get_BV_from_solution ( students_positions [ group *3]))
st2= SAT_lib . BV_to_number (s. get_BV_from_solution ( students_positions [ group *3+1]) )
st3= SAT_lib . BV_to_number (s. get_BV_from_solution ( students_positions [ group *3+2]) )
total =c12+c13+c23
print "total =", total
total_in_all_groups = total_in_all_groups + total
331
assert len(l1)== len(l2)
self. add_comment (" fix_BV_NEQ ")
t=[ self.XOR(l1[i], l2[i]) for i in range (len(l1))]
self. add_clause (t)
...
( https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/libs/SAT_lib.py )
... and then Open-WBO MaxSAT searches such a solution, for which as many soft clauses as possible would be
satisfied, i.e., as many hobbies shared, as possible.
And the result:
* group 0
students : 7 12 1
common interests between 1 and 2: 1
common interests between 1 and 3: 1
common interests between 2 and 3: 0
total= 2
* group 1
students : 13 2 10
common interests between 1 and 2: 0
common interests between 1 and 3: 1
common interests between 2 and 3: 0
total= 1
* group 2
students : 3 4 14
common interests between 1 and 2: 1
common interests between 1 and 3: 1
common interests between 2 and 3: 0
total= 2
* group 3
students : 8 5 11
332
common interests between 1 and 2: 0
common interests between 1 and 3: 0
common interests between 2 and 3: 1
total= 1
* group 4
students : 9 0 6
common interests between 1 and 2: 1
common interests between 1 and 3: 1
common interests between 2 and 3: 1
total= 3
* total between all groups = 9
Surely, you can group any other objects with each other based on multiple preferences.
; unknowns
(declare -fun Radius () (_ BitVec 16))
(declare -fun Height () (_ BitVec 16))
; There are may not be solutions for Volume =10000 , since this we work on integers
; So let 's ask for solution for Volume somewhere in between 10000 and 10500...
(declare -fun Volume () (_ BitVec 16))
( assert ( bvuge Volume (_ bv10000 16)))
( assert ( bvule Volume (_ bv10500 16)))
; r*r
(declare -fun Radius2 () (_ BitVec 16))
( assert (= Radius2 ( bvmul_no_overflow Radius Radius )))
; pi*r*r
(declare -fun AreaOfBase () (_ BitVec 16))
( assert (= AreaOfBase ( bvmul_no_overflow Radius2 AlmostPi )))
; 2*pi*r
(declare -fun Circumference () (_ BitVec 16))
( assert (= Circumference ( bvmul_no_overflow ( bvmul_no_overflow Radius AlmostPi ) (_ bv2
16))))
( minimize SurfaceOfCylinder )
333
(check -sat)
(get - model )
The solution:
sat
(model
(define -fun AlmostPi () (_ BitVec 16) (_ bv3 16)) ; 0x3
(define -fun AreaOfBase () (_ BitVec 16) (_ bv507 16)) ; 0x1fb
(define -fun Circumference () (_ BitVec 16) (_ bv78 16)) ; 0x4e
(define -fun Height () (_ BitVec 16) (_ bv20 16)) ; 0x14
(define -fun Radius () (_ BitVec 16) (_ bv13 16)) ; 0xd
(define -fun Radius2 () (_ BitVec 16) (_ bv169 16)) ; 0xa9
(define -fun SurfaceOfCylinder () (_ BitVec 16) (_ bv2574 16)) ; 0xa0e
(define -fun Volume () (_ BitVec 16) (_ bv10140 16)) ; 0 x279c
)
For Volume=10140, Radius=13, Height=20. Hard to believe, but this is almost correct. I can check it with Wolfram
Mathematica:
Error is 3.
Using my toy solver and π fixed to 3, perhaps, my results cannot be used in practice, however, we can deduce a general
rule: height must be the same as diameter, so that you’ll spent minimum tin (or other material) to make it.
Probably, the can will not be suitable for stacking, packing, transporting, or holding in hand, but this is the most
economical way to produce them.
14.8.1 A jar
What about a jar (a can without top (or bottom))?
...
; surface of jar = Circumference * Height + AreaOfBase
(declare -fun SurfaceOfJar () (_ BitVec 16))
( assert (= SurfaceOfJar ( bvadd ( bvmul_no_overflow Circumference Height ) AreaOfBase )))
( minimize SurfaceOfJar )
...
sat
(model
(define -fun AlmostPi () (_ BitVec 16) (_ bv3 16)) ; 0x3
(define -fun AreaOfBase () (_ BitVec 16) (_ bv675 16)) ; 0x2a3
(define -fun Circumference () (_ BitVec 16) (_ bv90 16)) ; 0x5a
(define -fun Height () (_ BitVec 16) (_ bv15 16)) ; 0xf
(define -fun Radius () (_ BitVec 16) (_ bv15 16)) ; 0xf
(define -fun Radius2 () (_ BitVec 16) (_ bv225 16)) ; 0xe1
(define -fun SurfaceOfJar () (_ BitVec 16) (_ bv2025 16)) ; 0x7e9
(define -fun Volume () (_ BitVec 16) (_ bv10125 16)) ; 0 x278d
)
334
For Volume=10125, Radius=15 and Height=15. We can see that for jar, the height must be equal to the radius. Let’s
recheck in Mathematica:
Correct!
Yes, you’ve been probably taught in school to solve this using paper and pencil, but... The fun thing is that I never
knew calculus at all, but I could write my toy bit-blaster, which can give such answers. And thanks to Open-WBO, which
is used in my MK85 as external MaxSAT solver.
Since I’m using non-standard SMT-LIB function bvmul_no_overflow, this will not work on other SMT solvers. For
Z3, bvumul_noovfl is to be used: https://github.com/Z3Prover/z3/issues/574
See also: https://demonstrations.wolfram.com/MinimizingTheSurfaceAreaOfACylinderWithAFixedVolume/
label_1 :
+---------+
| |
| block 1 | block1_size
| |
+---------+
JMP label_3 JMP_1_size
label_2 :
+---------+
| |
| block 2 | block2_size
| |
+---------+
JMP label_5 JMP_2_size
label_3 :
+---------+
| |
| block 3 | block3_size
| |
+---------+
JMP label_2 JMP_3_size
label_4 :
+---------+
| |
| block 4 | block4_size
| |
+---------+
JMP label_1 JMP_4_size
label_5 :
+---------+
| |
| block 5 | block5_size
335
| |
+---------+
JMP label_3 JMP_5_size
from z3 import *
# this is simplification , "back" offsets are limited by 127 bytes , " forward " ones by 128
bytes , but OK , let 's say ,
# all of them are 128:
def JMP_size ( offset ):
return If(offset >128 , 5, 2)
block1_size =64
block2_size =81
block3_size =12
block4_size =50
block5_size =60
s= Optimize ()
# calculate all JMPs offsets , these are block sizes and also other 's JMPs sizes between
the current address
# and desination address :
s.add( JMP_1_offset == block2_size + JMP_2_size )
s.add( JMP_2_offset == block3_size + JMP_3_size + block4_size + JMP_4_size )
s.add( JMP_3_offset == block2_size + JMP_2_size + block3_size )
s.add( JMP_4_offset == block1_size + JMP_1_size + block2_size + JMP_2_size + block3_size +
JMP_3_size + block4_size )
s.add( JMP_5_offset == block3_size + JMP_3_size + block4_size + JMP_4_size + block5_size )
print s. check ()
print s. model ()
336
Listing 14.2: The result
sat
[ JMP_2_size = 2,
JMP_1_offset = 83,
JMP_5_size = 5,
JMP_5_offset = 129 ,
JMP_2_offset = 69,
JMP_4_size = 5,
JMP_4_offset = 213 ,
JMP_1_size = 2,
JMP_3_size = 2,
JMP_3_offset = 95]
I.e., JMP_4 and JMP_5 JMPs must be long ones, others can be short ones.
Other simplification I made for the sake of example: short conditional Jcc’s can also be encoded using 2 bytes, long
ones using 6 bytes rather than 5 (5 is unconditional JMP).
337
338
Chapter 15
Synthesis
# 1-bit NOT
"""
INPUTS =[0 b10]
OUTPUTS =[0 b01]
BITS =2
add_always_false =False
add_always_true =True
avail =[ I_XOR ]
# avail =[ I_NOR3 ]
"""
# 2- input AND
"""
INPUTS =[0 b1100 , 0b1010 ]
OUTPUTS =[0 b1000 ]
BITS =4
add_always_false =False
add_always_true = False
avail =[I_OR , I_NOT ]
# avail =[ I_NOR3 ]
"""
# 2- input XOR
#"""
INPUTS =[0 b1100 , 0 b1010 ]
OUTPUTS =[0 b0110 ]
339
BITS =4
add_always_false =False
# add_always_false =True
add_always_true = False
# add_always_true =True
# avail =[ I_NOR3 ]
# avail =[ I_AND , I_NOT ]
avail =[I_OR , I_NOT ]
#"""
# full - adder
"""
INPUTS =[0 b11110000 , 0b11001100 , 0 b10101010 ]
OUTPUTS =[0 b11101000 , 0 b10010110 ] # carry -out , sum
BITS =8
add_always_false =False
add_always_true = False
avail =[ I_AND , I_OR , I_XOR , I_NOT ]
# avail =[ I_AND , I_OR , I_NOT ]
# avail =[ I_NOR3 ]
"""
# popcnt
""" TT for popcnt
in HL
000 00
001 01
010 01
011 10
100 01
101 10
110 10
340
111 11
"""
"""
INPUTS =[0 b11110000 , 0b11001100 , 0 b10101010 ]
OUTPUTS =[0 b11101000 , 0 b10010110 ] # high , low
BITS =8
add_always_false =False
add_always_true = False
# avail =[ I_AND , I_OR , I_XOR , I_NOT ]
avail =[ I_NOR3 ]
"""
# 2-bit adder :
"""
INPUTS =[0 b1111111100000000 , 0 b1111000011110000 , 0 b1100110011001100 , 0 b1010101010101010 ]
OUTPUTS =[0 b1001001101101100 , 0 b0101101001011010 ] # high , low
BITS =16
add_always_false =True
add_always_true =True
# add_always_false = False
# add_always_true =False
avail =[ I_AND , I_OR , I_XOR , I_NOT ]
# avail =[ I_NOR3 ]
"""
"""
#7- segment display
INPUTS =[0 b1111111100000000 , 0 b1111000011110000 , 0 b1100110011001100 , 0 b1010101010101010 ]
# "g" segment , like here: http :// www. nutsvolts .com/ uploads / wygwam /
NV_0501_Marston_Figure02 .jpg
OUTPUTS =[0 b1110111101111100 ] # g
BITS =16
add_always_false =False
add_always_true = False
avail =[ I_AND , I_OR , I_XOR , I_NOT ]
# avail =[ I_NOR3 ]
"""
341
MAX_STEPS =20
else:
raise AssertionError
return R
"""
selector () functions generates expression like:
342
If( op1_reg_s5 == 0,
S_s0 ,
If( op1_reg_s5 == 1,
S_s1 ,
If( op1_reg_s5 == 2,
S_s2 ,
If( op1_reg_s5 == 3,
S_s3 ,
If( op1_reg_s5 == 4,
S_s4 ,
If( op1_reg_s5 == 5,
S_s5 ,
If( op1_reg_s5 == 6,
S_s6 ,
If( op1_reg_s5 == 7,
S_s7 ,
If( op1_reg_s5 == 8,
S_s8 ,
If( op1_reg_s5 == 9,
S_s9 ,
If( op1_reg_s5 == 10,
S_s10 ,
If( op1_reg_s5 == 11,
S_s11 ,
0))))))))))))
343
if op_n in [I_AND , I_OR , I_XOR ]:
t="r%d=%s r%d, r%d" % (s, op_s , op1_reg_n , op2_reg_n )
elif op_n == I_NOT :
t="r%d=%s r%d" % (s, op_s , op1_reg_n )
else: # else NOR3
t="r%d=%s r%d, r%d, r%d" % (s, op_s , op1_reg_n , op2_reg_n , op3_reg_n )
# fill inputs :
for i in range (len( INPUTS )):
sl.add(R[i]== INPUTS [i])
# fill outputs , "must be 's"
for o in range (len( OUTPUTS )):
sl.add(R[STEPS -(o+1) ]== list( reversed ( OUTPUTS ))[o])
tmp=sl.check ()
if tmp == sat:
print "sat!"
m=sl. model ()
# print m
print_model (m, R, STEPS , op , op1_reg , op2_reg , op3_reg )
selftest (m, STEPS , op , op1_reg , op2_reg , op3_reg )
exit (0)
else:
print tmp
344
I could generate only small circuits maybe up to ≈ 10 gates, but this is interesting nonetheless.
Also, I’ve always wondering how you can do something usable for Apollo Guidance Computer, which had only one
single gate: NOR3? See also its schematics: http://klabs.org/history/ech/agc_schematics/. The answer is De
Morgan’s laws, but this is not obvious.
INPUTS[] has all possible bit combinations for all inputs, or all possible truth tables. OUTPUTS[] has truth table
for each output. All the rest is processed in bitsliced manner. Given that, the resulting program will work on 4/8/16-bit
CPU and will generate defined OUTPUTS for defined INPUTS. Or, this program can be treated just like a logic circuit.
AND gate
How to build 2-input AND gate using only OR’s and NOT’s?
...
r0=input 1100
r1=input 1010
r2=NOT r1 0101
r3=NOT r0 0011
r4=OR r3 , r2 0111
r5=NOT r4 1000
This is indeed like stated in De Morgan’s laws: x ∧ y is equivalent to ¬(¬x ∨ ¬y). Can be used for obfuscation?
Now using only NOR3 gate?
avail =[ I_NOR3 ]
...
r0=input 1100
r1=input 1010
r2=NOR3 r1 , r1 , r1 0101
r3=NOR3 r2 , r0 , r0 0010
r4=NOR3 r3 , r2 , r2 1000
XOR gate
How to build 2-input XOR using only OR’s and NOT’s?
...
7 instructions
r0=input 1100
r1=input 1010
r2=OR r1 , r0 1110
r3=NOT r2 0001
345
r4=OR r0 , r3 1101
r5=NOT r4 0010
r6=OR r1 , r3 1011
r7=NOT r6 0100
r8=OR r5 , r7 0110
avail =[ I_NOR3 ]
...
r0=input 1100
r1=input 1010
r2=NOR3 r1 , r1 , r1 0101
r3=NOR3 r0 , r0 , r1 0001
r4=NOR3 r0 , r2 , r3 0010
r5=NOR3 r2 , r4 , r2 1000
r6=NOR3 r3 , r5 , r3 0110
Full-adder
According to Wikipedia, full-adder can be constructed using two XOR gates, two AND gates and one OR gate. But I had
no idea 3 XORs and 2 ANDs can be used instead:
...
5 instructions
r0=input 11110000
r1=input 11001100
r2=input 10101010
r3=XOR r2 , r1 01100110
r4=AND r0 , r3 01100000
r5=AND r2 , r1 10001000
r6=XOR r4 , r5 11101000
r7=XOR r0 , r3 10010110
346
avail =[ I_NOR3 ]
...
8 instructions
r0=input 11110000
r1=input 11001100
r2=input 10101010
r3=NOR3 r0 , r0 , r1 00000011
r4=NOR3 r2 , r3 , r1 00010000
r5=NOR3 r3 , r2 , r0 00000100
r6=NOR3 r3 , r0 , r5 00001000
r7=NOR3 r5 , r2 , r4 01000001
r8=NOR3 r3 , r4 , r1 00100000
r9=NOR3 r3 , r5 , r4 11101000
r10=NOR3 r8 , r7 , r6 10010110
POPCNT
avail =[ I_NOR3 ]
...
8 instructions
r0=input 11110000
r1=input 11001100
r2=input 10101010
r3=NOR3 r0 , r0 , r1 00000011
r4=NOR3 r2 , r3 , r1 00010000
r5=NOR3 r3 , r2 , r0 00000100
r6=NOR3 r3 , r0 , r5 00001000
r7=NOR3 r5 , r2 , r4 01000001
r8=NOR3 r3 , r4 , r1 00100000
r9=NOR3 r3 , r5 , r4 11101000
r10=NOR3 r8 , r7 , r6 10010110
347
Circuit for a central ”g” segment of 7-segment display
348
# "g" segment , like here: http :// www. nutsvolts .com/ uploads / wygwam /
NV_0501_Marston_Figure02 .jpg
OUTPUTS =[0 b1110111101111100 ] # g
BITS =16
avail =[ I_AND , I_OR , I_XOR , I_NOT ]
...
5 instructions
r0=input 1111111100000000
r1=input 1111000011110000
r2=input 1100110011001100
r3=input 1010101010101010
r4=AND r3 , r1 1010000010100000
r5=XOR r4 , r0 0101111110100000
r6=XOR r4 , r2 0110110001101100
r7=XOR r5 , r1 1010111101010000
r8=OR r7 , r6 1110111101111100
avail =[ I_NOR3 ]
...
8 instructions
r0=input 1111111100000000
r1=input 1111000011110000
r2=input 1100110011001100
r3=input 1010101010101010
r4=NOR3 r1 , r1 , r1 0000111100001111
r5=NOR3 r3 , r3 , r4 0101000001010000
r6=NOR3 r2 , r0 , r0 0000000000110011
r7=NOR3 r6 , r6 , r5 1010111110001100
r8=NOR3 r4 , r0 , r7 0000000001110000
r9=NOR3 r8 , r7 , r2 0001000000000011
r10=NOR3 r0 , r8 , r4 0000000010000000
r11=NOR3 r9 , r10 , r10 1110111101111100
349
Figure 15.1: Page 3
I’m not clever enough to solve this manually (yet), but I could try using logic synthesis, as I did before. As they say,
“machines should work; people should think”.
The modified Z3Py script:
#!/ usr/bin/env python
from z3 import *
import sys
350
# 2- input function
BITS =4
add_always_false =False
add_always_true = False
# add_always_false =True
# add_always_true =True
avail =[ I_NAND ]
# avail =[ I_ANDN ]
MAX_STEPS =10
else:
raise AssertionError
351
# evaluate program we 've got. for self - testing .
def eval_pgm (m, STEPS , op , op1_reg , op2_reg , op3_reg ):
R=[ None ]* STEPS
for i in range (len( INPUTS )):
R[i]= INPUTS [i]
return R
"""
selector () function generates expression like:
If( op1_reg_s5 == 0,
S_s0 ,
If( op1_reg_s5 == 1,
S_s1 ,
If( op1_reg_s5 == 2,
S_s2 ,
If( op1_reg_s5 == 3,
S_s3 ,
If( op1_reg_s5 == 4,
S_s4 ,
If( op1_reg_s5 == 5,
S_s5 ,
If( op1_reg_s5 == 6,
S_s6 ,
If( op1_reg_s5 == 7,
S_s7 ,
If( op1_reg_s5 == 8,
S_s8 ,
If( op1_reg_s5 == 9,
S_s9 ,
If( op1_reg_s5 == 10,
S_s10 ,
If( op1_reg_s5 == 11,
S_s11 ,
0))))))))))))
352
op1_val = selector (R, op1_reg )
return If(op == I_AND , op1_val & selector (R, op2_reg ),
If(op == I_OR , op1_val | selector (R, op2_reg ),
If(op == I_XOR , op1_val ^ selector (R, op2_reg ),
If(op == I_NOT , ∼op1_val ,
If(op == I_NOR3 , ∼( op1_val | selector (R, op2_reg ) | selector (R, op3_reg )),
If(op == I_NAND , ∼( op1_val & selector (R, op2_reg )),
If(op == I_ANDN , (∼op1_val ) & selector (R, op2_reg ),
0))))))) # default
353
# fill inputs :
for i in range (len( INPUTS )):
sl.add(R[i]== INPUTS [i])
# fill outputs , "must be's"
for o in range (len( OUTPUTS )):
sl.add(R[STEPS -(o+1) ]== list( reversed ( OUTPUTS ))[o])
tmp=sl. check ()
if tmp == sat:
print "sat!"
m=sl.model ()
# print m
print_model (m, R, STEPS , op , op1_reg , op2_reg , op3_reg )
selftest (m, STEPS , op , op1_reg , op2_reg , op3_reg )
return True
else:
print tmp
return False
354
r2=NAND r0 , r0 0011
355
r2=NAND r0 , r0 0011
r3=NAND r2 , r2 1100
356
r0=input 1100
r1=input 1010
r2=input 0000
r3=input 1111
r4=NAND r0 , r1 0111
r5=NAND r4 , r0 1011
r6=NAND r5 , r3 0100
357
r5=NAND r4 , r4 1010
358
2 instructions for OUTPUTS TT (Knuth 's representation )= 0001
r0=input 1100
r1=input 1010
r2=ANDN r0 , r1 0010
r3=ANDN r2 , r1 1000
359
r0=input 1100
r1=input 1010
r2=input 0000
r3=input 1111
r4=ANDN r1 , r3 0101
360
r5=ANDN r4 , r3 1011
361
Figure 15.3: Page 51
My solutions are slightly different: I haven’t ”pass through” instruction, so sometimes a value is copied from the input
to the output using NAND/ANDN. Also, my versions are sometimes different, but correct and has the same length.
362
15.2.1 Synthesis of simple program using Z3 SMT-solver
Sometimes, multiplication operation can be replaced with a several operations of shifting/addition/subtraction. Compilers
do so, because pack of instructions can be executed faster.
For example, multiplication by 19 is replaced by GCC 5.4 with pair of instructions: lea edx, [eax+eax*8] and
lea eax, [eax+edx*2]. This is sometimes also called “superoptimization”.
Let’s see if we can find a shortest possible instructions pack for some specified multiplier.
As I’ve already wrote once, SMT-solver can be seen as a solver of huge systems of equations. The task is to construct
such system of equations, which, when solved, could produce a short program. I will use electronics analogy here, it can
make things a little simpler.
First of all, what our program will be consting of? There will be 3 operations allowed: ADD/SUB/SHL. Only registers
allowed as operands, except for the second operand of SHL (which could be in 1..31 range). Each register will be assigned
only once (as in SSA).
And there will be some “magic block”, which takes all previous register states, it also takes operation type, operands
and produces a value of next register’s state.
op ------------+
op1_reg -----+ |
op2_reg ---+ | |
| | |
v v v
+---------------+
| |
registers -> | | -> new register 's state
| |
+---------------+
1 -> blk -> blk -> blk .. -> blk -> multiplier
Each block takes previous state of registers and produces new states. There are two chains. First chain takes 0 as
state of R0 at the very beginning, and the chain is supposed to produce 0 at the end (since zero multiplied by any value
is still zero). The second chain takes 1 and must produce multiplier as the state of very last register (since 1 multiplied
by multiplier must equal to multiplier).
Each block is “controlled” by operation type, operands, etc. For each column, there is each own set.
Now you can view these two chains as two equations. The ultimate goal is to find such state of all operation types and
operands, so the first chain will equal to 0, and the second to multiplier.
Let’s also take a look into “magic block” inside:
op1_reg op
| v
v +-----+
registers ---> selector1 --> | ADD |
+ | SUB | ---> result
| | SHL |
+-> selector2 --> +-----+
^ ^
| |
op2_reg op2_imm
Each selector can be viewed as a simple multipositional switch. If operation is SHL, a value in range of 1..31 is used
as second operand.
So you can imagine this electric circuit and your goal is to turn all switches in such a state, so two chains will have 0
and multiplier on output. This sounds like logic puzzle in some way. Now we will try to use Z3 to solve this puzzle.
363
First, we define all varibles:
R=[[ BitVec ('S_s%d_c%d' % (s, c), 32) for s in range ( MAX_STEPS )] for c in range ( CHAINS )]
op=[ Int('op_s%d' % s) for s in range ( MAX_STEPS )]
op1_reg =[ Int(' op1_reg_s %d' % s) for s in range ( MAX_STEPS )]
op2_reg =[ Int(' op2_reg_s %d' % s) for s in range ( MAX_STEPS )]
op2_imm =[ BitVec (' op2_imm_s %d' % s, 32) for s in range ( MAX_STEPS )]
364
This is very important to understand: if the operation is ADD/SUB, op2_imm’s value is just ignored. Otherwise, if
operation is SHL, value of op2_reg is ignored. Just like in case of digital circuit.
The code: https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/synth/pgm/load/mult.py
Now let’s see how it works:
% ./ mult.py 12
multiplier = 12
attempt , STEPS= 2
unsat
attempt , STEPS= 3
unsat
attempt , STEPS= 4
sat!
r1=SHL r0 , 2
r2=SHL r1 , 1
r3=ADD r1 , r2
tests are OK
The first step is always a step containing 0/1, or, r0. So when our solver reporting about 4 steps, this means 3
instructions.
Something harder:
% ./ mult.py 123
multiplier = 123
attempt , STEPS= 2
unsat
attempt , STEPS= 3
unsat
attempt , STEPS= 4
unsat
attempt , STEPS= 5
sat!
r1=SHL r0 , 2
r2=SHL r1 , 5
r3=SUB r2 , r1
r4=SUB r3 , r0
tests are OK
r1=SHL r0 , 6
r2=ADD r0 , r1
r3=ADD r2 , r1
r4=SHL r2 , 4
r5=ADD r2 , r3
r6=ADD r5 , r4
Looks great, but it took ≈ 23 seconds to find it on my Intel Xeon CPU E31220 @ 3.10GHz. I agree, this is far from
practical usage. Also, I’m not quite sure that this piece of code will work faster than a single multiplication instruction.
But anyway, it’s a good demonstration of SMT solvers capabilities.
The code multiplying by 12345 (≈ 150 seconds):
r1=SHL r0 , 5
r2=SHL r0 , 3
r3=SUB r2 , r1
365
r4=SUB r1 , r3
r5=SHL r3 , 9
r6=SUB r4 , r5
r7=ADD r0 , r6
r1=SHL r0 , 9
r2=SHL r0 , 13
r3=SHL r0 , 2
r4=SUB r1 , r2
r5=SUB r3 , r4
r6=SHL r5 , 4
r7=ADD r1 , r6
Few notes
I’ve removed SHR instruction support, simply because the code multiplying by a constant makes no use of it. Even more:
it’s not a problem to add support of constants as second operand for all instructions, but again, you wouldn’t find a piece
of code which does this job and uses some additional constants. Or maybe I wrong?
Of course, for another job you’ll need to add support of constants and other operations. But at the same time, it will
work slower and slower. So I had to keep ISA1 of this toy CPU2 as compact as possible.
The code
https://github.com/DennisYurichev/SAT_SMT_by_example/tree/master/synth/pgm/load
15.2.2 Rockey dongle: finding unknown algorithm using only input/output pairs
Some smartcards can execute Java or .NET code - that’s the way to hide your sensitive algorithm into chip that is very
hard to break (decapsulate). For example, one may encrypt/decrypt data files by hidden crypto algorithm rendering
software piracy of such software close to impossible—an encrypted date file created on software with connected smartcard
would be impossible to decrypt on cracked version of the same software. (This leads to many nuisances, though.)
That’s what is called black box.
Some software protection dongles offers this functionality too. One example is Rockey 43 .
This is a small dongle connected via USB. Is contain some user-defined memory but also memory for user algorithms.
The virtual (toy) CPU for these algorithms is very simple: it offer only 8 16-bit registers (however, only 4 can be set
and read) and 8 operations (addition, subtractation, cyclic left shifting, multiplication, OR, XOR, AND, negation).
Second instruction argument can be a constant (from 0 to 63) instead of register.
1 Instruction
Set Architecture
2 Centralprocessing unit
3 http://www.rockey.nl/en/rockey.html
366
Each algorithm is described by string like
A=A+B, B=C*13, D=D^A, C=B*55, C=C&A, D=D|A, A=A*9, A=A&B.
There are no memory, stack, conditional/unconditional jumps, etc.
Each algorithm, obviously, can’t have side effects, so they are actually pure functions and their results can be memoized.
By the way, as it has been mentioned in Rockey 4 manual, first and last instruction cannot have constants. Maybe
that’s because these fields used for some internal data: each algorithm start and end should be marked somehow internally
anyway.
Would it be possible to reveal hidden impossible-to-read algorithm only by recording input/output dongle traffic?
Common sense tell us “no”. But we can try anyway.
Since, my goal wasn’t to break into some Rockey-protected software, I was interesting only in limits (which algorithms
could we find), so I make some things simpler: we will work with only 4 16-bit registers, and there will be only 6 operations
(add, subtract, multiply, OR, XOR, AND).
Let’s first calculate, how much information will be used in brute-force case.
There are 384 of all possible instructions in reg=reg,op,reg format for 4 registers and 6 operations, and also 6144
instructions in reg=reg,op,constant format. Remember that constant limited to 63 as maximal value? That help us for
a little.
So, there are 6528 of all possible instructions. This mean, there are ≈ 1.1 · 1019 5-instruction algorithms. That’s too
much.
How can we express each instruction as system of equations? While remembering some school mathematics, I wrote
this:
367
So the question now is to find 5 · 23 boolean values satisfying known input/output pairs.
I wrote small utility to probe Rockey 4 algorithm with random numbers, it produce results in form:
• constraint definitions (like, output_1 should be n for input_1=m, constant cannot be greater than 63, etc);
• functions constructing system of equations.
This piece of code define some kind of structure consisting of 4 named 16-bit variables, each represent register in our
toy CPU.
These enumerations define two new types (or sorts in Z3’s terminology):
Operation , (OP_MULT , OP_MINUS , OP_PLUS , OP_XOR , OP_OR , OP_AND ) = EnumSort ('Operation ',
('OP_MULT ', 'OP_MINUS ', 'OP_PLUS ', 'OP_XOR ', 'OP_OR ', 'OP_AND '))
Register , (A, B, C, D) = EnumSort ('Register ', ('A', 'B', 'C', 'D '))
This part is very important, it defines all variables in our system of equations. op_step is type of operation in
instruction. reg_or_constant is selector between register and constant in second argument — False if it’s a register and
True if it’s a constant. reg_step is a destination register of this instruction. reg1_step and reg2_step are just registers
at arg1 and arg2. constant_step is constant (in case it’s used in instruction instead of arg2).
Adding constraints is very simple. Remember, I wrote that each constant cannot be larger than 63?
# according to Rockey 4 dongle manual , arg2 in first and last instructions cannot be a
constant
s.add ( reg_or_constant_step [0]== False )
s.add ( reg_or_constant_step [STEPS -1]== False )
...
368
for x in range( STEPS ):
s.add ( constant_step [x]>=0, constant_step [x] <=63)
This function returning corresponding register value from structure. Needless to say, the code above is not executed.
If() is Z3Py function. The code only declares the function, which will be used in another. Expression declaration
resembling LISP PL in some way.
Here is another function where register_selector() is used:
The code here is never executed too. It only constructs one small piece of very big expression. But for the sake of
simplicity, one can think all these functions will be called during bruteforce search, many times, at fastest possible speed.
Here is the expression describing each instruction. new_val will be assigned to destination register, while all other
registers’ values are copied from input registers’ state:
369
Registers_State .D( input_registers )),
If ( register_assigned_in_this_step ==C, Registers_State .cons ( Registers_State .
A( input_registers ),
Registers_State .B( input_registers ),
new_val ,
Registers_State .D( input_registers )),
If ( register_assigned_in_this_step ==D, Registers_State .cons ( Registers_State .
A( input_registers ),
Registers_State .B( input_registers ),
Registers_State .C( input_registers ),
new_val ),
Registers_State .cons (0 ,0 ,0 ,0))))) #
default
Again, for the sake of simplicity, it can be said, now Z3 will try each possible registers/operations/constants against
this expression to find such combination which satisfy all input/output pairs. Sounds absurdic, but this is close to reality.
SAT/SMT-solvers indeed tries them all. But the trick is to prune search tree as early as possible, so it will work for some
reasonable time. And this is hardest problem for solvers.
Now let’s start with very simple 3-step algorithm: B=A^D, C=D*D, D=A*C. Please note: register A left unchanged. I
programmed Rockey 4 dongle with the algorithm, and recorded algorithm outputs are:
It took about one second and only 5 pairs above to find algorithm (on my quad-core Xeon E3-1220 3.1GHz, however,
Z3 solver working in single-thread mode):
B = A ^ D
C = D * D
D = C * A
Note the last instruction: C and A registers are swapped comparing to version I wrote by hand. But of course, this
instruction is working in the same way, because multiplication is commutative operation.
Now if I try to find 4-step program satisfying to these values, my script will offer this:
B = A ^ D
C = D * D
D = A * C
A = A | A
370
…and that’s really fun, because the last instruction do nothing with value in register A, it’s like NOP4 —but still,
algorithm is correct for all values given.
Here is another 5-step algorithm: B=B^D, C=A*22, A=B*19, A=A&42, D=B&C and values:
B = D ^ B
C = A * 22
A = B * 19
A = A & 42
D = C & B
A=A&42 was correctly deduced (look at these five p1’s at output (assigned to output A register): 32,8,0,2,0)
6-step algorithm A=A+B, B=C*13, D=D^A, C=C&A, D=D|B, A=A&B and values:
A = A + B
B = C * 13
D = D ^ A
D = B | D
C = C & A
A = B & A
But that was simple, however. Some 6-step algorithms are not possible to find, for example:
A=A^B, A=A*9, A=A^C, A=A*19, A=A^D, A=A&B. Solver was working too long (up to several hours), so I didn’t even know
is it possible to find it anyway.
Conclusion
This is in fact an exercise in program synthesis.
Some short algorithms for tiny CPUs are really possible to find using so small set set of data. Of course it’s still not
possible to reveal some complex algorithm, but this method definitely should not be ignored.
4 No Operation
371
15.2.3 The files
Rockey 4 dongle programmer and reader, Rockey 4 manual, Z3Py script for finding algorithms, input/output pairs:
https://github.com/DennisYurichev/SAT_SMT_by_example/tree/master/synth/pgm/rockey
Further work
Perhaps, constructing LISP-like S-expression can be better than a program for toy-level CPU.
It’s also possible to start with smaller constants and then proceed to bigger. This is somewhat similar to increasing
password length in password brute-force cracking.
Exercise
https://challenges.re/25/.
15.2.4 TAOCP 7.1.3 Exercise 198, UTF-8 encoding and program synthesis by sketching
Found this exercise in TAOCP 7.1.3 (Bitwise Tricks and Techniques):
This is like program synthesis by sketching: you give a sketch with several “holes” missing and ask some automated
software to fill the “holes”. In our case, a, b and c are “holes”.
Let’s find them using Z3:
from z3 import *
s= Solver ()
372
if t!= None:
s.add (((a >> ((x>>b) & c)) & 3) == (t -1))
print "a,b,c = 0x%x 0x%x 0x%x" % (m[a]. as_long () , m[b]. as_long () , m[c]. as_long ())
I tried various bit widths for a, b and c and found that 22 bits are enough. I’ve lots of results like:
...
...
It seems that several least significant bits of a and c are not used. After little experimentation, I’ve come to this:
...
...
373
a,b,c = 0 x250000 0x3 0x56
results total= 8
Pick any.
But how it works? Its operation is very similar to the bitwise trick related to leading/trailing zero bits counting based
on De Bruijn sequences. Read more about it in Mathematics for Programmers5 .
15.2.5 TAOCP 7.1.3 Exercise 203, MMIX MOR instruction and program synthesis by
sketching
5 https://yurichev.com/writings/Math-for-programmers.pdf
374
Figure 15.7: Screenshot from the MMIX book
( http://mmix.cs.hm.edu/doc/mmix-doc.pdf )
Let’s try to solve. We create two functions. First has MOR instructions simulation + the program from TAOCP. The
second is a naive implementation. Then we add “forall” quantifier: for all inputs, both functions must produce the same
result. But, we don’t know a/b/c/d/e/f and ask Z3 SMT-solver to
from z3 import *
s= Solver ()
$x_i_j = y_0_j z_i_0 \vee y_1_j z_i_1 \vee \cdots \vee y_7_j z_i_7$
https :// latexbase .com/d/bf2243f8 -5d0b -4231 -8891 -66 fb47d846f0
IOW:
x<byte ><bit > = (y<0><bit > AND z<byte ><0>) OR (y<1><bit > AND z<byte ><1>) OR ... OR (y
<7><bit > AND z<byte ><7>)
"""
375
return (x>>(i*8+j))&1
rt =0
for byte in range (8):
for bit in range (8):
t=0
for i in range (8):
t|= get_ij (y, i, bit) & get_ij (z, byte , i)
return rt
#"""
# new version .
# for all possible 32- bit x's, find such a/b/c/d/e, so that these two parts would be
equal to each other
# zero extend x to 64- bit value in both cases
x= BitVec ('x', 32)
s.add( ForAll ([x], simulate_pgm ( ZeroExt (32 , x))== method2 ( ZeroExt (32 , x))))
#"""
"""
# previous version :
for i in range (5):
x= random . getrandbits (32)
t ="%08 x" % x
y=int(''. join ("%02 X" % ord(c) for c in t), 16)
print "%x %x" % (x, y)
376
m = s. model ()
Very slow, it takes several hours on my venerable Intel Quad-Core Xeon E3-1220 3.10GHz but found at least one
solution:
s.add(a==0 x0008000400020001 )
...
...
377
26 25 xx xx xx xx and eax , imm32
26 2D xx xx xx xx sub eax , imm32
26 35 xx xx xx xx xor eax , imm32
Will it be possible to generate such a sequence of instructions, so that the arbitrary 32-bit constant would be loaded
into EAX regiser? Given the fact that the initial value of EAX is unknown, because, let’s say, we can’t reset it? Surely,
all 32-bit operands must have ASCII-only bytes as well.
The answer is... using Z3 SMT-solver:
#!/ usr/bin/env python
from z3 import *
import sys , random
BIT_WIDTH =32
MAX_STEPS =20
# CONST =0
# CONST =0 x12345678
# CONST =0 x0badf00d
# CONST =0 xffffffff
CHAINS =30
R=[[ BitVec ('S_s%d_c%d' % (s, c), BIT_WIDTH ) for s in range ( MAX_STEPS )] for c in
range ( CHAINS )]
op =[ Int('op_s%d' % s) for s in range ( MAX_STEPS )]
op2_imm =[ BitVec ('op2_imm_s %d' % s, BIT_WIDTH ) for s in range ( MAX_STEPS )]
378
for shift_cnt in [0 ,8 ,16 ,24]:
sl.add(And (( op2_imm [s]>> shift_cnt )&0xff >=0 x21) ,( op2_imm [s]>> shift_cnt )&0xff
<=0 x7e)
"""
# or use 0..9 , a..z, A..Z:
for shift_cnt in [0 ,8 ,16 ,24]:
sl.add(Or(
And (( op2_imm [s]>> shift_cnt )&0xff >= ord ('0') ,( op2_imm [s]>> shift_cnt )&0xff
<= ord ('9')),
And (( op2_imm [s]>> shift_cnt )&0xff >= ord('a ') ,( op2_imm [s]>> shift_cnt )&0xff
<= ord('z ')),
And (( op2_imm [s]>> shift_cnt )&0xff >= ord('A ') ,( op2_imm [s]>> shift_cnt )&0xff
<= ord('Z '))))
"""
tmp=sl.check ()
if tmp == sat:
print "sat!"
m=sl. model ()
print_model (m, STEPS , op , op2_imm )
exit (0)
else:
print tmp
These two instructions clears EAX. You can understand how it works if you’ll see these operands in binary form:
0 x3e5a3e28 = 111110010110100011111000101000
0 x40214040 = 1000000001000010100000001000000
It’s best to have a zero bit for both operands, but this is not always possible, because each of 4 bytes in 32-bit operand
must be in [0x21..0x7e] range, so the Z3 solver find a way to reset other bits using second instruction.
Running it again:
379
AND EAX , 0 x48273048
AND EAX , 0 x31504325
XOR EAX , 0 x61212251
SUB EAX , 0 x55733244
First two AND instruction clears EAX, 3th and 4th makes 0x0badf00d value.
Now 0x12345678:
CONST =0 xf3c37766
...
AND EAX , 0 x21283024
AND EAX , 0 x58504050
SUB EAX , 0 x31377b56
SUB EAX , 0 x3f2f3b5e
XOR EAX , 0 x7c5a3e2a
Now what if, for aesthetical reasons maybe, we would limit all printable characters to 0..9, a..z, A..Z (comment/un-
comment corresponding fragments of the source code)? This is not a problem at all.
However, if to limit to a..z, A..Z, it needs more instructions, but this is still correct (8 instructions to clear EAX
register):
CONST =0x0
...
XOR EAX , 0 x43685575
SUB EAX , 0 x6c747a6f
XOR EAX , 0 x59525541
AND EAX , 0 x65755454
XOR EAX , 0 x57416643
AND EAX , 0 x76767757
SUB EAX , 0 x556f7547
AND EAX , 0 x42424242
CONST =0 x12345678
...
AND EAX , 0 x6f77414d
SUB EAX , 0 x646b7845
AND EAX , 0 x41674a54
SUB EAX , 0 x47414744
AND EAX , 0 x49486d41
XOR EAX , 0 x53757778
AND EAX , 0 x7274567a
Further work: use ForAll quantifier instead of randomly generated test inputs... also, we could try INC EAX/DEC
EAX instructions.
380
15.2.7 Further reading
”A toy code generator” https://github.com/nickgildea/z3_codegen — Nick Gildea has introduced a ”set” instruction,
loading a value into register.
This example shows how to design a finite automaton E_2 to recognize the regular
language of all strings that contain the string 001 as a substring . For example ,
0010 , 1001 , 001 , and 11111110011111 are all in the language , but 11 and 0000
are not. How would you recognize this language if you were pretending to
be E_2?
state =[[ Int('state_ %d_%d' % (s, b)) for b in range (2)] for s in range (100) ]
INITIAL_STATE =0
INVALID_STATE =999
# construct FA for z3
def transition (STATES , s, i):
# this is like switch ()
# construct FA for z3
def FA(STATES , input_string ):
s= IntVal ( INITIAL_STATE )
for i in input_string :
s= transition (STATES , s, int(i))
return s
FA ={}
for s in range ( STATES ):
381
f. write ("\tS_%d -> S_%d [ label = \"0\" ];\n" % (s, m[state [s ][0]]. as_long ()))
f. write ("\tS_%d -> S_%d [ label = \"1\" ];\n" % (s, m[state [s ][1]]. as_long ()))
FA[s]=(m[state [s ][0]]. as_long () , m[ state [s ][1]]. as_long ())
f.write ("}\n")
f.close ()
os. system ("dot -Tpng 1.gv > 1. png") # run GraphViz
ACCEPTING_STATE =STATES -1
result =[]
382
• https://stackoverflow.com/questions/867279/regular-expression-to-define-some-binary-sequence
• https://www.regextester.com/96234
DIVISOR =3
# DIVISOR =5
# DIVISOR =7
# DIVISOR =9
# DIVISOR =10
# DIVISOR =11 # no luck
state =[[ Int('state_ %d_%d' % (s, b)) for b in range (2)] for s in range (100) ]
INITIAL_STATE =0
INVALID_STATE =999
# construct FA for z3
def transition (STATES , s, i):
# this is like switch ()
# construct FA for z3
def FA(STATES , input_string ):
s= IntVal ( INITIAL_STATE )
for i in input_string :
s= transition (STATES , s, int(i))
return s
383
if final_state == ACCEPTING_STATE :
raise AssertionError
print "test OK"
FA ={}
for s in range ( STATES ):
f. write ("\tS_%d -> S_%d [ label = \"0\" ];\n" % (s, m[state [s ][0]]. as_long ()))
f. write ("\tS_%d -> S_%d [ label = \"1\" ];\n" % (s, m[state [s ][1]]. as_long ()))
FA[s]=(m[state [s ][0]]. as_long () , m[ state [s ][1]]. as_long ())
f.write ("}\n")
f.close ()
os. system ("dot -Tpng 1.gv > 1. png") # run GraphViz
test_FA (STATES , FA)
ACCEPTING_STATE =STATES -1
result =[]
384
attempt (i)
As you can see, it has testing procedure, which is, in turn, can be used instead of RE matcher, if you really need to
match numbers divisible by 3.
... is almost like the one someone posted here, but my solution has two separate states as initial and accepting.
385
Figure 15.11: DFA for numbers divisible by 7
Figure 15.12: DFA for numbers divisible by 9. Probably not an easy thing to find it manually
386
Figure 15.13: DFA for numbers divisible by 10. Not a prime, so the DFA is smaller
These DFAs are guaranteed to be minimal. Further work: convert them to RE...
15.4 Other
15.4.1 Graph theory: degree sequence problem / graph realization problem
The degree sequence of an undirected graph is the non-increasing sequence of its vertex degrees;[2] for
the above graph it is (5, 3, 3, 2, 2, 1, 0). The degree sequence is a graph invariant so isomorphic graphs
have the same degree sequence. However, the degree sequence does not, in general, uniquely identify a
graph; in some cases, non-isomorphic graphs have the same degree sequence.
The degree sequence problem is the problem of finding some or all graphs with the degree sequence
being a given non-increasing sequence of positive integers. (Trailing zeroes may be ignored since they are
trivially realized by adding an appropriate number of isolated vertices to the graph.) A sequence which
is the degree sequence of some graph, i.e. for which the degree sequence problem has a solution, is called
a graphic or graphical sequence. As a consequence of the degree sum formula, any sequence with an odd
sum, such as (3, 3, 1), cannot be realized as the degree sequence of a graph. The converse is also true: if a
sequence has an even sum, it is the degree sequence of a multigraph. The construction of such a graph is
straightforward: connect vertices with odd degrees in pairs by a matching, and fill out the remaining even
degree counts by self-loops. The question of whether a given degree sequence can be realized by a simple
graph is more challenging. This problem is also called graph realization problem and can either be solved
by the Erdős–Gallai theorem or the Havel–Hakimi algorithm. The problem of finding or estimating the
number of graphs with a given degree sequence is a problem from the field of graph enumeration.
( https://en.wikipedia.org/wiki/Degree_(graph_theory) )
The graph realization problem is a decision problem in graph theory . Given a finite
sequence ( d 1 , … , d n )
{\ displaystyle (d_ {1} ,\ dots ,d_{n})} {\ displaystyle (d_ {1} ,\ dots ,d_{n})} of natural
numbers , the problem asks whether there is
387
labeled simple graph such that ( d 1 , … , d n ) {\ displaystyle (d_ {1} ,\ dots ,d_{n})} {\
displaystyle (d_ {1} ,\ dots ,d_{n})}
is the degree sequence of this graph .
( https://en.wikipedia.org/wiki/Graph_realization_problem )
I can solve this using Z3 SMT solver, however, isomorphic graphs are not being weed out... the result is then rendered
using GraphViz.
# "The degree sequence problem is the problem of finding some or all graphs with
# the degree sequence being a given non - increasing sequence of positive integers ."
# ( https :// en. wikipedia .org/wiki/ Degree_ ( graph_theory ) )
from z3 import *
import subprocess
BV_WIDTH =8
seq =[8 ,8 ,7 ,7 ,6 ,6 ,4 ,3 ,2 ,1 ,1 ,1] # https :// math. stackexchange .com/ questions /1074651/ check -
if -sequence -is -graphic -8 -8 -7 -7 -6 -6 -4 -3 -2 -1 -1 -1
vertices =len(seq)
if (sum(seq) & 1) == 1:
print "not a graphical sequence "
exit (0)
edges =sum(seq)/2
print " edges =", edges
# for each edge , edges_begin [] and edges_end [] pair defines a vertex numbers , which they
connect :
edges_begin =[ BitVec ('edges_begin_ %d' % i, BV_WIDTH ) for i in range ( edges )]
edges_end =[ BitVec ('edges_end_ %d' % i, BV_WIDTH ) for i in range ( edges )]
s= Solver ()
388
for i in range ( edges ):
# no loops must be present
s.add( edges_begin [i]!= edges_end [i])
gv_no =0
389
print " results total =", len( results )
if len( results )==0:
print "not a graphical sequence "
break
390
For the [8,8,7,7,6,6,4,3,2,1,1,1] sequence I’ve copypasted from someone’s homework...
Exercise
1.1.1. Seven students go on vacations. They decide that each will send a postcard to three of the others.
Is it possible that every student receives postcards from precisely the three to whom he sent postcards?
No, it’s not possible, because 7*3 is a odd number. However, if you reduce 7 students to 6, this is solvable, the sequence
is [3,3,3,3,3,3].
Now the graph of mutual exchanging of postcards between 6 students:
391
Figure 15.14: 6 students
392
Chapter 16
Toy decompiler
16.1 Introduction
A modern-day compiler is a product of hundreds of developer/year. At the same time, toy compiler can be an exercise
for a student for a week (or even weekend).
Likewise, commercial decompiler like Hex-Rays can be extremely complex, while toy decompiler like this one, can be
easy to understand and remake.
The following decompiler written in Python, supports only short basic blocks, with no jumps. Memory is also not
supported.
* 9
- 5
INPUT 32
How to store it in memory? We see here 3 types of nodes: 1) numbers (or values); 2) arithmetical operations; 3)
symbols (like “INPUT”).
Many developers with OOP1 in their mind will create some kind of class. Other developer maybe will use “variant
type”.
I’ll use simplest possible way of representing this structure: a Python tuple. First element of tuple can be a string:
either “EXPR_OP” for operation, “EXPR_SYMBOL” for symbol or “EXPR_VALUE” for value. In case of symbol or
value, it follows the string. In case of operation, the string followed by another tuples.
1 Object-oriented programming
393
Node type and operation type are stored as plain strings—to make debugging output easier to read.
There are constructors in our code, in OOP sense:
"EXPR_OP"
"/"
"EXPR_OP" "EXPR_VALUE"
"*" 9
"EXPR_OP" "EXPR_VALUE"
"-" 5
"EXPR_SYMBOL" "EXPR_VALUE"
"arg1" 32
394
…or as Python expression:
In fact, this is AST2 in its simplest form. ASTs are used heavily in compilers.
At start, these symbols are assigned to registers: RAX=initial_RAX, RBX=initial_RBX, RDI=arg1, RSI=arg2,
RDX=arg3, RCX=arg4.
When we handle MOV instruction, we just copy expression from RDI to RAX. When we handle IMUL instruction, we
create a new expression, adding together expressions from RAX and RSI and putting result into RAX again.
I can feed this to decompiler and we will see how register’s state is changed through processing:
...
...
result =(' EXPR_OP ', '*', (' EXPR_SYMBOL ', 'arg1 ') , (' EXPR_SYMBOL ', 'arg2 '))
IMUL instruction is mapped to “*” string, and then new expression is constructed in handle_binary_op(), which
puts result into RAX.
In this output, the data structures are dumped using Python str() function, which does mostly the same, as print().
Output is bulky, and we can turn off Python expressions output, and see how this internal data structure can be
rendered neatly using our internal expr_to_string() function:
395
python td.py --show - registers tests /mul.s
...
...
...
...
result =(' EXPR_OP ', '+', ('EXPR_OP ', '*', (' EXPR_SYMBOL ', 'arg1 ') , (' EXPR_SYMBOL ', 'arg2
')), (' EXPR_SYMBOL ', 'arg3 '))
396
And again, let’s see this expression dumped neatly:
...
...
...
result =(' EXPR_OP ', '+', ('EXPR_OP ', '*', (' EXPR_SYMBOL ', 'arg1 ') , (' EXPR_VALUE ', 1234) ),
('EXPR_OP ', '*', (' EXPR_SYMBOL ', 'arg2 ') , ('EXPR_VALUE ', 5678) ))
...
397
Now conversion program:
You can see, how register’s state is changed over execution (or parsing).
Raw:
python td.py --show - registers --python -expr tests / fahr_to_celsius .s
...
398
EXPR_VALUE ', 32)), (' EXPR_VALUE ', 5)), (' EXPR_VALUE ', 9))
...
result =(' EXPR_OP ', '/', ('EXPR_OP ', '*', ('EXPR_OP ', '-', (' EXPR_SYMBOL ', 'arg1 ') , ('
EXPR_VALUE ', 32)), (' EXPR_VALUE ', 5)), (' EXPR_VALUE ', 9))
Neat:
...
...
399
It is interesting to note that IDIV instruction also calculates reminder of division, and it is placed into RDX register.
It’s not used, but is available for use.
This is how quotient and remainder are stored in registers:
; rdi=i
; rsi=grain
sub rsi , 1
add rdi , rsi
not rsi
and rdi , rsi
mov rax , rdi
...
400
rdx=arg3
rdi =(( arg1 + (arg2 - 1)) & (∼(arg2 - 1)))
rax= initial_RAX
...
…will be transormed into (arg1 + arg1) expression. It can be reduced to (arg1 * 2). Our toy decompiler can identify
patterns like such and rewrite them.
This function will just test, if the current node has EXPR_OP type, operation is “+” and both children are equal
to each other. By the way, since our data structure is just tuple of tuples, Python can compare them using plain “==”
operation. If the testing is finished successfully, current node is then replaced with a new expression: we take one of
children, we construct a node of EXPR_VALUE type with “2” number in it, and then we construct a node of EXPR_OP
type with “*”.
dbg_print_reduced_expr() serving solely debugging purposes—it just prints the old and the new (reduced) expres-
sions.
Decompiler is then traverse expression tree recursively in deep-first search fashion.
401
...
...
...
402
This is correct, but too verbose.
We would like to rewrite (X*n)*m expression to X*(n*m), where n and m are numbers. We can do this by adding
another function like reduce_ADD1(), but there is much better option: we can make matcher for tree. You can think
about it as regular expression matcher, but over trees.
403
# returns dict in case of success , or None
def match (expr , pattern ):
t= get_expr_type ( pattern )
if t==" EXPR_WILDCARD ":
return match_EXPR_WILDCARD (expr , pattern )
elif t==" EXPR_WILDCARD_VALUE ":
return match_EXPR_WILDCARD_VALUE (expr , pattern )
elif t==" EXPR_SYMBOL ":
if expr == pattern :
return {}
else:
return None
elif t==" EXPR_VALUE ":
if expr == pattern :
return {}
else:
return None
elif t==" EXPR_OP ":
return match_EXPR_OP (expr , pattern )
else:
raise AssertionError
We take input expression, and we also construct pattern to be matched. Matcher works recursively over both
expressions synchronously. Pattern is also expression, but can use two additional node types: EXPR_WILDCARD
and EXPR_WILDCARD_VALUE. These nodes are supplied with keys (stored as strings). When matcher encounters
EXPR_WILDCARD in pattern, it just stashes current expression and will return it. If matcher encounters EXPR_WILDCARD_VA
it does the same, but only in case the current node has EXPR_VALUE type.
bind_expr() and bind_value() are functions which create nodes with the types we have seen.
All this means, reduce_MUL1() function will search for the expression in form (X*A)*B, where A and B are numbers.
In other cases, matcher will return input expression untouched, so these reducing function can be chained.
Now when reduce_MUL1() encounters (sub)expression we are interesting in, it will return dictionary with keys and
expressions. Let’s add print m call somewhere before return and rerun:
...
going to reduce ((( arg1 + arg1) + (arg1 + arg1)) + (( arg1 + arg1) + (arg1 + arg1)))
reduction in reduce_ADD1 () (arg1 + arg1) -> (arg1 * 2)
reduction in reduce_ADD1 () (arg1 + arg1) -> (arg1 * 2)
reduction in reduce_ADD1 () (( arg1 * 2) + (arg1 * 2)) -> (( arg1 * 2) * 2)
{'A': 2, 'X': (' EXPR_SYMBOL ', 'arg1 ') , 'B ': 2}
404
reduction in reduce_MUL1 () (( arg1 * 2) * 2) -> (arg1 * 4)
reduction in reduce_ADD1 () (arg1 + arg1) -> (arg1 * 2)
reduction in reduce_ADD1 () (arg1 + arg1) -> (arg1 * 2)
reduction in reduce_ADD1 () (( arg1 * 2) + (arg1 * 2)) -> (( arg1 * 2) * 2)
{'A': 2, 'X': (' EXPR_SYMBOL ', 'arg1 ') , 'B ': 2}
reduction in reduce_MUL1 () (( arg1 * 2) * 2) -> (arg1 * 4)
reduction in reduce_ADD1 () (( arg1 * 4) + (arg1 * 4)) -> (( arg1 * 4) * 2)
{'A': 4, 'X': (' EXPR_SYMBOL ', 'arg1 ') , 'B ': 2}
reduction in reduce_MUL1 () (( arg1 * 4) * 2) -> (arg1 * 8)
going to reduce (arg1 * 8)
...
result =( arg1 * 8)
The dictionary has keys we supplied plus expressions matcher found. We then can use them to create new expression
and return it. Numbers are just summed while forming second operand to “*” opeartion.
Now a real-world optimization technique—optimizing GCC replaced multiplication by 31 by shifting and subtraction
operations:
Without reduction functions, our decompiler will translate this into ((arg1 « 5) - arg1). We can replace shifting left
by multiplication:
Now we getting ((arg1 * 32) - arg1). We can add another reduction function:
Matcher will return two X’s, and we must be assured that they are equal. In fact, in previous versions of this toy
decompiler, I did comparison with plain “==”, and it worked. But we can reuse match() function for the same purpose,
because it will process commutative operations better. For example, if X1 is “Q+1” and X2 is “1+Q”, expressions are
equal, but plain “==” will not work. On the other side, match() function, when encounter “+” operation (or another
commutative operation), and it fails with comparison, it will also try swapped operand and will try to compare again.
However, to understand it easier, for a moment, you can imagine there is “==” instead of the second match().
Anyway, here is what we’ve got:
405
working out tests / mul31_GCC .s
going to reduce (( arg1 << 5) - arg1)
reduction in reduce_SHL1 () (arg1 << 5) -> (arg1 * 32)
reduction in reduce_SUB3 () (( arg1 * 32) - arg1) -> (arg1 * 31)
going to reduce (arg1 * 31)
...
result =( arg1 * 31)
Another optimization technique is often seen in ARM thumb code: AND-ing a value with a value like 0xFFFFFFF0,
is implemented using shifts:
This code is quite common in ARM thumb code, because it’s a headache to encode 32-bit constants using couple of
16-bit thumb instructions, while single 16-bit instruction can shift by 4 bits left or right.
Also, the expression (x»4)«4 can be jokingly called as “twitching operator”: I’ve heard the “--i++” expression was
called like this in Russian-speaking social networks, it was some kind of meme (“operator podergivaniya”).
Anyway, these reduction functions will be used:
...
...
# FIXME: slow
# returns True if n=2^x or popcnt (n)=1
def is_2n (n):
return bin(n). count ("1") ==1
406
return expr # no match
result = x
3
=x· 1
3
=x· 1·M agicN umber
3·M agicN umber
Given the fact that division by 2n is very fast, we now should find that M agicN umber, for which the following equation
will be true: 2n = 3 · M agicN umber.
This code performing division by 10:
Division by 264 is somewhat hidden: lower 64-bit of product in RAX is not used (dropped), only higher 64-bit of
product (in RDX) is used and then shifted by additional 3 bits.
RDX register is set during processing of MUL/IMUL like this:
0cccccccccccccccdh 264+3
In other words, the assembly code we have just seen multiplicates by 2 64+3 , or divides by 0cccccccccccccccdh .
To find divisor we just have to divide numerator by denominator.
# n = magic number
# m = shifting coefficient
# return = 1 / (n / 2^m) = 2^m / n
def get_divisor (n, m):
407
return (2** float (m))/ float (n)
This works, but we have a problem: this rule takes (arg1 * 0xcccccccccccccccd) » 64 expression first and finds divisor
to be equal to 1.25. This is correct: result is shifted by 3 bits after (or divided by 8), and 1.25 · 8 = 10. But our toy
decompiler doesn’t support real numbers.
We can solve this problem in the following way: if divisor has fractional part, we postpone reducing, with a hope, that
two subsequent right shift operations will be reduced into single one:
That works:
I don’t know if this is best solution. In early version of this decompiler, it processed input expression in two passes:
first pass for everything except division by multiplication, and the second pass for the latter. I don’t know which way is
better. Or maybe we could support real numbers in expressions?
Couple of words about better understanding division by multiplication. Many people miss “hidden” division by 232 or
64
2 , when lower 32-bit part (or 64-bit part) of product is not used (or just dropped). Also, there is misconception that
modulo inverse is used here. This is close, but not the same thing. Extended Euclidean algorithm is usually used to find
magic coefficient, but in fact, this algorithm is rather used to solve the equation. You can solve it using any other method.
Also, needless to mention, the equation is unsolvable for some divisors, because this is diophantine equation (i.e., equation
allowing result to be only integer), since we work on integer CPU registers, after all.
408
16.5 Obfuscation/deobfuscation
Despite simplicity of our decompiler, we can see how to deobfuscate (or optimize) using several simple tricks.
For example, this piece of code does nothing:
if m!= None:
return dbg_print_reduced_expr (" reduce_XOR4 ", expr , create_binary_expr ("^" , m["
X"],
create_val_expr (m["N"]^m["M"])))
else:
return expr # no match
...
# default :
return expr # no match
409
mov rbx , rax
mov rcx , rbx
mov rsi , rcx
xor rsi , 12345678 h
xor rsi , 12345679 h
mov rax , rsi
I also used aha! 4 superoptimizer to find weird piece of code which does nothing.
Aha! is so called superoptimizer, it tries various piece of codes in brute-force manner, in attempt to find shortest
possible alternative for some mathematical operation. While sane compiler developers use superoptimizers for this task, I
tried it in opposite way, to find oddest pieces of code for some simple operations, including NOP operation. In past, I’ve
used it to find weird alternative to XOR operation (4.1).
So here is what aha! can find for NOP:
# X & X -> X
def reduce_AND3 (expr):
m= match (expr , create_binary_expr ("&" , bind_expr (" X1 ") , bind_expr (" X2 ")))
if m!= None and match (m[" X1"], m[" X2 "]) != None:
return dbg_print_reduced_expr (" reduce_AND3 ", expr , m[" X1 "])
else:
return expr # no match
...
# X | X -> X
def reduce_OR1 (expr):
m= match (expr , create_binary_expr ("|" , bind_expr (" X1 ") , bind_expr (" X2 ")))
if m!= None and match (m[" X1"], m[" X2 "]) != None:
return dbg_print_reduced_expr (" reduce_OR1 ", expr , m[" X1 "])
else:
return expr # no match
410
This is weirder:
Rules added (I used “NEG” string to represent sign change and to be different from subtraction operation, which is
just minus (“-”)):
# default :
return expr # no match
...
I also forced aha! to find piece of code which adds 2 with no addition/subtraction operations allowed:
411
; not r1 ,rx
; neg r2 ,r1
; not r3 ,r2
; neg r4 ,r3
; Expr: -(∼(-(∼(x))))
Rule:
This is artifact of two’s complement system of signed numbers representation. Same can be done for subtraction (just
swap NEG and NOT operations).
Now let’s add some fake luggage to Fahrenheit-to-Celsius example:
It’s not a problem for our decompiler, because the noise is left in RDX register, and not used at all:
working out tests / fahr_to_celsius_obf1 .s
line =[ mov rbx , 12345 h]
rcx=arg4
rsi=arg2
rbx =0 x12345
rdx=arg3
412
rdi=arg1
rax= initial_RAX
413
rax =((( arg1 - 32) * 5) / 9)
…but in fact, it’s all reduced by reduce_AND2() function we already saw (16.5):
We can see that deobfuscation is in fact the same thing as optimization used in compilers. We can try this function in
GCC:
int f(int a)
{
return -(∼a);
};
f:
mov eax , DWORD PTR [esp +4]
add eax , 1
ret
GCC has its own rewriting rules, some of which are, probably, close to what we use here.
414
16.6 Tests
Despite simplicity of the decompiler, it’s still error-prone. We need to be sure that original expression and reduced one
are equivalent to each other.
415
In fact, this is very close to what LISP EVAL function does, or even LISP interpreter. However, not all symbols are
set. If the expression is using initial values from RAX or RBX (to which symbols “initial_RAX” and “initial_RBX” are
assigned, decompiler will stop with exception, because no random values assigned to these registers, and these symbols
are absent in symbols dictionary.
Using this test, I’ve suddenly found a bug here (despite simplicity of all these reduction rules). Well, no-one protected
from eye strain. Nevertheless, the test has a serious problem: some bugs can be revealed only if one of arguments is 0, or
1, or −1. Maybe there are even more special cases exists.
Mentioned above aha! superoptimizer tries at least these values as arguments while testing: 1, 0, -1, 0x80000000,
0x7FFFFFFF, 0x80000001, 0x7FFFFFFE, 0x01234567, 0x89ABCDEF, -2, 2, -3, 3, -64, 64, -5, -31415.
Still, you cannot be sure.
; do nothing ( obfuscation )
Using toy decompiler, I’ve found that this piece is reduced to arg1 expression:
But is it correct? I’ve added a function which can output expression(s) to SMT-LIB-format, it’s as simple as a function
which converts expression to string.
And this is SMT-LIB-file for Z3:
( assert
416
( forall (( arg1 (_ BitVec 64)) (arg2 (_ BitVec 64)) (arg3 (_ BitVec 64)) (arg4 (_
BitVec 64)))
(=
( bvsub ( bvsub ( bvsub ( bvneg arg1) # x0000000000000003 ) ( bvneg arg1)) ( bvsub (
bvneg arg1) # x0000000000000003 ))
arg1
)
)
)
(check -sat)
In plain English terms, what we asking it to be sure, that forall four 64-bit arguments, two expressions are equivalent
(second is just arg1).
The syntax maybe hard to understand, but in fact, this is very close to LISP, and arithmetical operations are named
“bvsub”, “bvadd”, etc, because “bv” stands for bit vector.
While running, Z3 shows “sat”, meaning “satisfiable”. In other words, Z3 couldn’t find counterexample for this
expression.
In fact, I can rewrite this expression in the following form: expr1 != expr2, and we would ask Z3 to find at least one
set of input arguments, for which expressions are not equal to each other:
( assert
(not
(=
( bvsub ( bvsub ( bvsub ( bvneg arg1) # x0000000000000003 ) ( bvneg arg1)) ( bvsub (
bvneg arg1) # x0000000000000003 ))
arg1
)
)
)
(check -sat)
Z3 says “unsat”, meaning, it couldn’t find any such counterexample. In other words, for all possible input arguments,
results of these two expressions are always equal to each other.
Nevertheless, Z3 is not omnipotent. It fails to prove equivalence of the code which performs division by multiplication.
First of all, I extended it so boths results will have size of 128 bit instead of 64:
(bv17 is just 64-bit number 17, etc. “bv” stands for “bit vector”, as opposed to integer value.)
Z3 works too long without any answer, and I had to interrupt it.
417
As Z3 developers mentioned, such expressions are hard for Z3 so far: https://github.com/Z3Prover/z3/issues/514.
Still, division by multiplication can be tested using previously described brute-force check.
( lib/Analysis/InstructionSimplify.cpp )
( lib/Transforms/InstCombine/InstCombineAndOrXor.cpp )
As you can see, my matcher tries to mimic LLVM. What I call reduction is called folding in LLVM. Both terms are
popular.
I have also a blog post about LLVM obfuscator, in which LLVM matcher is mentioned: https://yurichev.com/blog/
llvm/.
Python version of toy decompiler uses strings in place where enumerate data type is used in C version (like OP_AND,
OP_MUL, etc) and symbols used in Racket version6 (like ’OP_DIV, etc). This may be seen as inefficient, nevertheless,
thanks to strings interning, only address of strings are compared in Python version, not strings as a whole. So strings in
Python can be seen as possible replacement for LISP symbols.
...
decompiler/files/Racket
418
{
...
case ADD: registers [op1 ]="(" + registers [op1] + " + " + registers [op2] + ") ";
break ;
...
case MUL: registers [op1 ]="(" + registers [op1] + " / " + registers [op2] + ") ";
break ;
...
}
Now you’ll have long expressions for each register, represented as strings. For reducing them, you can use plain simple
regular expression matcher.
For example, for the rule (X*n)+(X*m) -> X*(n+m), you can match (sub)string using the following regular expression:
((.*)*(.*))+((.*)*(.*)) 7 . If the string is matched, you’re getting 4 groups (or substrings). You then just compare 1st
and 3rd using string comparison function, then you check if the 2nd and 4th are numbers, you convert them to numbers,
sum them and you make new string, consisting of 1st group and sum, like this: (" + X + "*" + (int(n) + int(m)) +
").
It was naïve, clumsy, it was source of great embarrassment, but it worked correctly.
• C data types: arrays, structures, pointers, etc. This problem is virtually non-existent for JVM9 (Java, etc) and
.NET decompilers, because type information is present in binary files.
10
• Basic blocks, C/C++ statements. Mike Van Emmerik in his thesis shows how this can be tackled using SSA
forms (which are also used heavily in compilers).
• Memory support, including local stack. Keep in mind pointer aliasing problem. Again, decompilers of JVM and
.NET files are simpler here.
com/mirrors/vanEmmerik_ssa.pdf
419
As I’ve said, LISP knowledge can help to understand this all much easier. Here is well-known micro-interpreter of
LISP by Peter Norvig, also written in Python: https://web.archive.org/web/20161116133448/http://www.norvig.
com/lispy.html, https://web.archive.org/web/20160305172301/http://norvig.com/lispy2.html.
The gradual rewriting I’ve shown here is also available in Mathematica (”Trace” command): https://reference.
wolfram.com/language/ref/Trace.html.
420
Chapter 17
Symbolic execution
X=X^Y
Y=Y^X
X=X^Y
It works, because Python is dynamicaly typed PL, so the function doesn’t care what to operate on, numerical values,
or on objects of Expr() class.
Here is result:
1 https://yurichev.com/writings/Math-for-programmers.pdf
421
new_X ((X^Y)^(Y^(X^Y)))
new_Y (Y^(X^Y))
You can remove double variables in your mind (since XORing by a value twice will result in nothing). At new_X we
can drop two X-es and two Y-es, and single Y will left. At new_Y we can drop two Y-es, and single X will left.
422
Again, we can build equivalent function which can take both numerical variables and Expr() objects. We also extend
Expr() class to support many arithmetical and boolean operations. Also, Expr() methods would take both Expr() objects
on input and integer values.
#!/ usr/bin/env python
class Expr:
def __init__ (self ,s):
self.s=s
# change endianness
ecx=Expr(" initial_ECX ") # 1st argument
eax=ecx # mov eax , ecx
edx=ecx # mov edx , ecx
edx=edx <<16 # shl edx , 16
eax=eax &0 xff00 # and eax , 0000 ff00H
eax=eax|edx # or eax , edx
edx=ecx # mov edx , ecx
edx=edx &0 x00ff0000 # and edx , 00 ff0000H
ecx=ecx >>16 # shr ecx , 16
edx=edx|ecx # or edx , ecx
eax=eax <<8 # shl eax , 8
edx=edx >>8 # shr edx , 8
eax=eax|edx # or eax , edx
print eax
I run it:
(((( initial_ECX &65280) |( initial_ECX < <16)) <<8) |((( initial_ECX &16711680) |( initial_ECX > >16)
) >>8))
Now this is something more readable, however, a bit LISPy at first sight. In fact, this is a function which change
endianness in 32-bit word.
423
By the way, my Toy Decompiler can do this job as well, but operates on AST instead of plain strings: 16.
def FFT(X):
n = len(X)
w = exp (-2* pi *1j/n)
if n > 1:
X = FFT(X [::2]) + FFT(X [1::2])
for k in xrange (n/2):
xk = X[k]
X[k] = xk + w**k*X[k+n/2]
X[k+n/2] = xk - w**k*X[k+n/2]
return X
class Expr:
def __init__ (self ,s):
self.s=s
def FFT(X):
n = len(X)
# cast complex value to string , and then to Expr
w = Expr(str(exp (-2* pi *1j/n)))
if n > 1:
424
X = FFT(X [::2]) + FFT(X [1::2])
for k in xrange (n/2):
xk = X[k]
X[k] = xk + w**k*X[k+n/2]
X[k+n/2] = xk - w**k*X[k+n/2]
return X
FFT() function left almost intact, the only thing I added: complex value is converted into string and then Expr()
object is constructed.
0 : ((( input_0 +((( -1 -1.22464679915e -16j)**0)* input_4 )) +(((6.12323399574e -17 -1j)**0) *(
input_2 +((( -1 -1.22464679915e -16j)**0)* input_6 )))) +(((0.707106781187 -0.707106781187 j)
**0) *(( input_1 +((( -1 -1.22464679915e -16j)**0)* input_5 )) +(((6.12323399574e -17 -1j)**0)
*( input_3 +((( -1 -1.22464679915e -16j)**0)* input_7 ))))))
1 : ((( input_0 -((( -1 -1.22464679915e -16j)**0)* input_4 )) +(((6.12323399574e -17 -1j)**1) *(
input_2 -((( -1 -1.22464679915e -16j)**0)* input_6 )))) +(((0.707106781187 -0.707106781187 j)
**1) *(( input_1 -((( -1 -1.22464679915e -16j)**0)* input_5 )) +(((6.12323399574e -17 -1j)**1)
*( input_3 -((( -1 -1.22464679915e -16j)**0)* input_7 ))))))
2 : ((( input_0 +((( -1 -1.22464679915e -16j)**0)* input_4 )) -(((6.12323399574e -17 -1j)**0) *(
input_2 +((( -1 -1.22464679915e -16j)**0)* input_6 )))) +(((0.707106781187 -0.707106781187 j)
**2) *(( input_1 +((( -1 -1.22464679915e -16j)**0)* input_5 )) -(((6.12323399574e -17 -1j)**0)
*( input_3 +((( -1 -1.22464679915e -16j)**0)* input_7 ))))))
3 : ((( input_0 -((( -1 -1.22464679915e -16j)**0)* input_4 )) -(((6.12323399574e -17 -1j)**1) *(
input_2 -((( -1 -1.22464679915e -16j)**0)* input_6 )))) +(((0.707106781187 -0.707106781187 j)
**3) *(( input_1 -((( -1 -1.22464679915e -16j)**0)* input_5 )) -(((6.12323399574e -17 -1j)**1)
*( input_3 -((( -1 -1.22464679915e -16j)**0)* input_7 ))))))
4 : ((( input_0 +((( -1 -1.22464679915e -16j)**0)* input_4 )) +(((6.12323399574e -17 -1j)**0) *(
input_2 +((( -1 -1.22464679915e -16j)**0)* input_6 )))) -(((0.707106781187 -0.707106781187 j)
**0) *(( input_1 +((( -1 -1.22464679915e -16j)**0)* input_5 )) +(((6.12323399574e -17 -1j)**0)
*( input_3 +((( -1 -1.22464679915e -16j)**0)* input_7 ))))))
5 : ((( input_0 -((( -1 -1.22464679915e -16j)**0)* input_4 )) +(((6.12323399574e -17 -1j)**1) *(
input_2 -((( -1 -1.22464679915e -16j)**0)* input_6 )))) -(((0.707106781187 -0.707106781187 j)
**1) *(( input_1 -((( -1 -1.22464679915e -16j)**0)* input_5 )) +(((6.12323399574e -17 -1j)**1)
*( input_3 -((( -1 -1.22464679915e -16j)**0)* input_7 ))))))
6 : ((( input_0 +((( -1 -1.22464679915e -16j)**0)* input_4 )) -(((6.12323399574e -17 -1j)**0) *(
input_2 +((( -1 -1.22464679915e -16j)**0)* input_6 )))) -(((0.707106781187 -0.707106781187 j)
**2) *(( input_1 +((( -1 -1.22464679915e -16j)**0)* input_5 )) -(((6.12323399574e -17 -1j)**0)
*( input_3 +((( -1 -1.22464679915e -16j)**0)* input_7 ))))))
7 : ((( input_0 -((( -1 -1.22464679915e -16j)**0)* input_4 )) -(((6.12323399574e -17 -1j)**1) *(
input_2 -((( -1 -1.22464679915e -16j)**0)* input_6 )))) -(((0.707106781187 -0.707106781187 j)
**3) *(( input_1 -((( -1 -1.22464679915e -16j)**0)* input_5 )) -(((6.12323399574e -17 -1j)**1)
*( input_3 -((( -1 -1.22464679915e -16j)**0)* input_7 ))))))
We can see subexpressions in form like x0 and x1 . We can eliminate them, since x0 = 1 and x1 = x. Also, we can
reduce subexpressions like x · 1 to just x.
if op1 =="1":
return Expr(op2)
425
if op2 =="1":
return Expr(op1)
0 : ((( input_0 + input_4 )+( input_2 + input_6 ))+(( input_1 + input_5 )+( input_3 + input_7 )))
1 : ((( input_0 - input_4 ) +((6.12323399574e -17 -1j)*( input_2 - input_6 )))
+((0.707106781187 -0.707106781187 j)*(( input_1 - input_5 ) +((6.12323399574e -17 -1j)*(
input_3 - input_7 )))))
2 : ((( input_0 + input_4 ) -( input_2 + input_6 )) +(((0.707106781187 -0.707106781187 j)**2) *((
input_1 + input_5 ) -( input_3 + input_7 ))))
3 : ((( input_0 - input_4 ) -((6.12323399574e -17 -1j)*( input_2 - input_6 )))
+(((0.707106781187 -0.707106781187 j)**3) *(( input_1 - input_5 ) -((6.12323399574e -17 -1j)*(
input_3 - input_7 )))))
4 : ((( input_0 + input_4 )+( input_2 + input_6 )) -(( input_1 + input_5 )+( input_3 + input_7 )))
5 : ((( input_0 - input_4 ) +((6.12323399574e -17 -1j)*( input_2 - input_6 )))
-((0.707106781187 -0.707106781187 j)*(( input_1 - input_5 ) +((6.12323399574e -17 -1j)*(
input_3 - input_7 )))))
6 : ((( input_0 + input_4 ) -( input_2 + input_6 )) -(((0.707106781187 -0.707106781187 j)**2) *((
input_1 + input_5 ) -( input_3 + input_7 ))))
7 : ((( input_0 - input_4 ) -((6.12323399574e -17 -1j)*( input_2 - input_6 )))
-(((0.707106781187 -0.707106781187 j)**3) *(( input_1 - input_5 ) -((6.12323399574e -17 -1j)*(
input_3 - input_7 )))))
class Expr:
def __init__ (self ,s):
self.s=s
426
def __xor__ (self , other ):
return Expr("(" + self.s + "^" + self. convert_to_Expr_if_int ( other ).s + ")")
BYTES =1
buf =[[ Expr("in_%d_%d" % (byte , bit)) for bit in range (8)] for byte in range (BYTES )]
crc32 (buf)
Here are expressions for each CRC32 bit for 1-byte buffer:
state 0=(1^( in_0_2 ^1))
state 1=((1^( in_0_0 ^1))^( in_0_3 ^1))
state 2=(((1^( in_0_0 ^1))^( in_0_1 ^1))^( in_0_4 ^1))
state 3=(((1^( in_0_1 ^1))^( in_0_2 ^1))^( in_0_5 ^1))
427
state 4=(((1^( in_0_2 ^1))^( in_0_3 ^1))^( in_0_6 ^(1^( in_0_0 ^1))))
state 5=(((1^( in_0_3 ^1))^( in_0_4 ^1))^( in_0_7 ^(1^( in_0_1 ^1))))
state 6=((1^( in_0_4 ^1))^( in_0_5 ^1))
state 7=((1^( in_0_5 ^1))^( in_0_6 ^(1^( in_0_0 ^1))))
state 8=(((1^( in_0_0 ^1))^( in_0_6 ^(1^( in_0_0 ^1))))^( in_0_7 ^(1^( in_0_1 ^1))))
state 9=((1^( in_0_1 ^1))^( in_0_7 ^(1^( in_0_1 ^1))))
state 10=(1^( in_0_2 ^1))
state 11=(1^( in_0_3 ^1))
state 12=((1^( in_0_0 ^1))^( in_0_4 ^1))
state 13=(((1^( in_0_0 ^1))^( in_0_1 ^1))^( in_0_5 ^1))
state 14=((((1^( in_0_0 ^1))^( in_0_1 ^1))^( in_0_2 ^1))^( in_0_6 ^(1^( in_0_0 ^1))))
state 15=((((1^( in_0_1 ^1))^( in_0_2 ^1))^( in_0_3 ^1))^( in_0_7 ^(1^( in_0_1 ^1))))
state 16=((((1^( in_0_0 ^1))^( in_0_2 ^1))^( in_0_3 ^1))^( in_0_4 ^1))
state 17=(((((1^( in_0_0 ^1))^( in_0_1 ^1))^( in_0_3 ^1))^( in_0_4 ^1))^( in_0_5 ^1))
state 18=(((((1^( in_0_1 ^1))^( in_0_2 ^1))^( in_0_4 ^1))^( in_0_5 ^1))^( in_0_6 ^(1^( in_0_0 ^1))))
state 19=((((((1^( in_0_0 ^1))^( in_0_2 ^1))^( in_0_3 ^1))^( in_0_5 ^1))^( in_0_6 ^(1^( in_0_0 ^1)))
)^( in_0_7 ^(1^( in_0_1 ^1))))
state 20=((((((1^( in_0_0 ^1))^( in_0_1 ^1))^( in_0_3 ^1))^( in_0_4 ^1))^( in_0_6 ^(1^( in_0_0 ^1)))
)^( in_0_7 ^(1^( in_0_1 ^1))))
state 21=(((((1^( in_0_1 ^1))^( in_0_2 ^1))^( in_0_4 ^1))^( in_0_5 ^1))^( in_0_7 ^(1^( in_0_1 ^1))))
state 22=(((((1^( in_0_0 ^1))^( in_0_2 ^1))^( in_0_3 ^1))^( in_0_5 ^1))^( in_0_6 ^(1^( in_0_0 ^1))))
state 23=((((((1^( in_0_0 ^1))^( in_0_1 ^1))^( in_0_3 ^1))^( in_0_4 ^1))^( in_0_6 ^(1^( in_0_0 ^1)))
)^( in_0_7 ^(1^( in_0_1 ^1))))
state 24=(((((( in_0_0 ^1) ^( in_0_1 ^1))^( in_0_2 ^1))^( in_0_4 ^1))^( in_0_5 ^1))^( in_0_7 ^(1^(
in_0_1 ^1))))
state 25=((((( in_0_1 ^1) ^( in_0_2 ^1))^( in_0_3 ^1))^( in_0_5 ^1))^( in_0_6 ^(1^( in_0_0 ^1))))
state 26=((((( in_0_2 ^1) ^( in_0_3 ^1))^( in_0_4 ^1))^( in_0_6 ^(1^( in_0_0 ^1))))^( in_0_7 ^(1^(
in_0_1 ^1))))
state 27=(((( in_0_3 ^1) ^( in_0_4 ^1))^( in_0_5 ^1))^( in_0_7 ^(1^( in_0_1 ^1))))
state 28=((( in_0_4 ^1) ^( in_0_5 ^1))^( in_0_6 ^(1^( in_0_0 ^1))))
state 29=((( in_0_5 ^1) ^( in_0_6 ^(1^( in_0_0 ^1))))^( in_0_7 ^(1^( in_0_1 ^1))))
state 30=(( in_0_6 ^(1^( in_0_0 ^1)))^( in_0_7 ^(1^( in_0_1 ^1))))
state 31=( in_0_7 ^(1^( in_0_1 ^1)))
For larger buffer, expressions gets increasing exponentially. This is 0th bit of the final state for 4-byte buffer:
state 0=(((((((((((((( in_0_0 ^1) ^( in_0_1 ^1))^( in_0_2 ^1))^( in_0_4 ^1))^( in_0_5 ^1))^( in_0_7
^(1^( in_0_1 ^1))))^
( in_1_0 ^(1^( in_0_2 ^1))))^( in_1_2 ^(((1^( in_0_0 ^1))^( in_0_1 ^1))^( in_0_4 ^1))))^( in_1_3
^(((1^( in_0_1 ^1))^
( in_0_2 ^1))^( in_0_5 ^1))))^( in_1_4 ^(((1^( in_0_2 ^1))^( in_0_3 ^1))^( in_0_6 ^(1^( in_0_0 ^1)))))
)^( in_2_0 ^((((1^
( in_0_0 ^1))^( in_0_6 ^(1^( in_0_0 ^1))))^( in_0_7 ^(1^( in_0_1 ^1))))^( in_1_2 ^(((1^( in_0_0 ^1))^(
in_0_1 ^1))^( in_0_4 ^
1))))))^( in_2_6 ^(((((((1^( in_0_0 ^1))^( in_0_1 ^1))^( in_0_2 ^1))^( in_0_6 ^(1^( in_0_0 ^1))))^(
in_1_4 ^(((1^( in_0_2 ^1))^
( in_0_3 ^1))^( in_0_6 ^(1^( in_0_0 ^1))))))^( in_1_5 ^(((1^( in_0_3 ^1))^( in_0_4 ^1))^( in_0_7 ^(1^(
in_0_1 ^1))))))^
( in_2_0 ^((((1^( in_0_0 ^1))^( in_0_6 ^(1^( in_0_0 ^1))))^( in_0_7 ^(1^( in_0_1 ^1))))^( in_1_2
^(((1^( in_0_0 ^1))^( in_0_1 ^1))^
( in_0_4 ^1))))))))^( in_2_7 ^(((((((1^( in_0_1 ^1))^( in_0_2 ^1))^( in_0_3 ^1))^( in_0_7 ^(1^(
in_0_1 ^1))))^( in_1_5 ^(((1^
( in_0_3 ^1))^( in_0_4 ^1))^( in_0_7 ^(1^( in_0_1 ^1))))))^( in_1_6 ^(((1^( in_0_4 ^1))^( in_0_5 ^1))
^( in_1_0 ^(1^( in_0_2 ^
1))))))^( in_2_1 ^((((1^( in_0_1 ^1))^( in_0_7 ^(1^( in_0_1 ^1))))^( in_1_0 ^(1^( in_0_2 ^1))))^(
in_1_3 ^(((1^( in_0_1 ^1))^
( in_0_2 ^1))^( in_0_5 ^1))))))))^( in_3_2 ^(((((((((1^( in_0_1 ^1))^( in_0_2 ^1))^( in_0_4 ^1))^(
428
in_0_5 ^1))^( in_0_6 ^(1^
( in_0_0 ^1))))^( in_1_2 ^(((1^( in_0_0 ^1))^( in_0_1 ^1))^( in_0_4 ^1))))^( in_2_0 ^((((1^( in_0_0
^1))^( in_0_6 ^(1^( in_0_0 ^
1))))^( in_0_7 ^(1^( in_0_1 ^1))))^( in_1_2 ^(((1^( in_0_0 ^1))^( in_0_1 ^1))^( in_0_4 ^1))))))^(
in_2_1 ^((((1^( in_0_1 ^1))^
( in_0_7 ^(1^( in_0_1 ^1))))^( in_1_0 ^(1^( in_0_2 ^1))))^( in_1_3 ^(((1^( in_0_1 ^1))^( in_0_2 ^1))^(
in_0_5 ^1))))))^( in_2_4 ^
(((((1^( in_0_0 ^1))^( in_0_4 ^1))^( in_1_2 ^(((1^( in_0_0 ^1))^( in_0_1 ^1))^( in_0_4 ^1))))^(
in_1_3 ^(((1^( in_0_1 ^1))^
( in_0_2 ^1))^( in_0_5 ^1))))^( in_1_6 ^(((1^( in_0_4 ^1))^( in_0_5 ^1))^( in_1_0 ^(1^( in_0_2 ^1)))))
)))))
Expression for the 0th bit of the final state for 8-byte buffer has length of ≈ 350KiB, which is, of course, can be
reduced significantly (because this expression is basically XOR tree), but you can feel the weight of it.
Now we can process this expressions somehow to get a smaller picture on what is affecting what. Let’s say, if we can
find “in_2_3” substring in expression, this means that 3rd bit of 2nd byte of input affects this expression. But even more
than that: since this is XOR tree (i.e., expression consisting only of XOR operations), if some input variable is occurring
twice, it’s annihilated, since x ⊕ x = 0. More than that: if a vairable occurred even number of times (2, 4, 8, etc), it’s
annihilated, but left if it’s occurred odd number of times (1, 3, 5, etc).
( https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/symbolic/4_CRC/2.py )
Now this how each bit of 1-byte input buffer affects each bit of the final CRC32 state:
state 00: *
state 01: * *
state 02: ** *
state 03: ** *
state 04: * ** *
state 05: * ** *
state 06: **
state 07: * **
state 08: * **
state 09: *
state 10: *
state 11: *
state 12: * *
state 13: ** *
state 14: ** *
state 15: ** *
state 16: * ***
state 17: ** ***
state 18: *** ***
state 19: *** ***
state 20: ** **
state 21: * ** *
429
state 22: ** **
state 23: ** **
state 24: * * ** *
state 25: **** **
state 26: ***** **
state 27: * *** *
state 28: * ***
state 29: ** ***
state 30: ** **
state 31: * *
430
def convert_to_Expr_if_int (self , n):
if isinstance (n, int):
return Expr(str(n))
if isinstance (n, Expr):
return n
raise AssertionError # unsupported type
431
*1103515245) +12345) *1103515245) +12345) *1103515245) +12345) >>16) &32767)
Now if we once got several values from this PRNG, like 4583, 16304, 14440, 32315, 28670, 12568..., how would we
recover the initial seed? The problem in fact is solving a system of equations:
As it turns out, Z3 can solve this system correctly using only two equations:
#!/ usr/bin/env python
from z3 import *
s= Solver ()
a =1103515245
c =12345
s.add ((((x*a)+c) >>16) &32767==4583)
s.add (((((( x*a)+c)*a)+c) >>16) &32767==16304)
#s.add (((((((( x*a)+c)*a)+c)*a)+c) >>16) &32767==14440)
#s.add (((((((((( x*a)+c)*a)+c)*a)+c)*a)+c) >>16) &32767==32315)
s. check ()
print s. model ()
[x = 11223344]
input =...
SECS_DAY =24*60*60
dayno = input / SECS_DAY
wday = (dayno + 4) % 7
if wday ==5:
print " Thanks God , it 's Friday !"
Let’s say, we should find a way to run the block with print() call in it. What input value should be?
First, let’s build expression of wday variable:
#!/ usr/bin/env python
class Expr:
def __init__ (self ,s):
self.s=s
432
def convert_to_Expr_if_int (self , n):
if isinstance (n, int):
return Expr(str(n))
if isinstance (n, Expr):
return n
raise AssertionError # unsupported type
s= Solver ()
x=Int("x")
s. check ()
print s. model ()
[x = 86438]
Though the date back in year 1970, but it’s still correct!
This is also called “path constraint”, i.e., what constraint must be satisified to execute specific block? Several tools
has “path” in their names, like “pathgrind”, Symbolic PathFinder, CodeSurfer Path Inspector, etc.
433
Like the shell game, this task is also often encounters in practice. You can see that something dangerous can be
executed inside some basic block and you’re trying to deduce, what input values can cause execution of it. It may be
buffer overflow, etc. Such input values are sometimes also called “inputs of death”.
Many crackmes are solved in this way, all you need is find a path into block which prints “key is correct” or something
like that.
We can extend this tiny example:
input =...
SECS_DAY =24*60*60
dayno = input / SECS_DAY
wday = (dayno + 4) % 7
print wday
if wday ==5:
print " Thanks God , it 's Friday !"
else:
print "Got to wait a little "
input
Now we have two blocks: for the first we should solve this equation: (( 86400 + 4) ≡ 5 mod 7. But for the second we
should solve inverted equation: (( 86400 + 4) ̸≡ 5 mod 7. By solving these equations, we will find two paths into both
input
blocks.
KLEE (or similar tool) tries to find path to each [basic] block and produces “ideal” unit test. Hence, KLEE can find
a path into the block which crashes everything, or reporting about correctness of the input key/license, etc. Surprisingly,
KLEE can find backdoors in the very same manner.
KLEE is also called “KLEE Symbolic Virtual Machine” – by that its creators mean that the KLEE is VM3 which
executes a code symbolically rather than numerically (like usual CPU).
Let’s extend our tiny example again. We would like to find Friday 13th. To make things simpler, we can limit ourselves
to year 1970. Let’s get all 12 13th days of year 1970:
% date +"%j" --date ="13 Jan 1970"
013
% date +"%j" --date ="13 Feb 1970"
044
% date +"%j" --date ="13 Mar 1970"
072
% date +"%j" --date ="13 Apr 1970"
103
% date +"%j" --date ="13 May 1970"
133
% date +"%j" --date ="13 Jun 1970"
164
% date +"%j" --date ="13 Jul 1970"
194
% date +"%j" --date ="13 Aug 1970"
225
% date +"%j" --date ="13 Sep 1970"
256
% date +"%j" --date ="13 Oct 1970"
286
% date +"%j" --date ="13 Nov 1970"
317
% date +"%j" --date ="13 Dec 1970"
347
3 Virtual Machine
434
input =...
SECS_DAY =24*60*60
dayno = input / SECS_DAY
wday = (dayno + 4) % 7
print wday
if wday ==5:
print " Thanks God , it 's Friday !"
if dayno in [13 ,44 ,72 ,103 ,133 ,164 ,194 ,225 ,256 ,286 ,317 ,347]:
print " Friday 13 th"
s= Solver ()
x=Int("x")
# 1st constraint :
s.add (( dayno +4) %7==5) # must be Friday
# 2nd constraint :
s.add(Or( dayno ==13 -1 , dayno ==44 -1 , dayno ==72 -1 , dayno ==103 -1 , dayno ==133 -1 , dayno ==164 -1 ,
dayno ==194 -1 , dayno ==225 -1 , dayno ==256 -1 , dayno ==286 -1 , dayno ==317 -1 , dayno ==347 -1))
s. check ()
print s. model ()
This is an UNIX date for which both constructs are satisfied: 13th November 1970, Friday.
435
return n
raise AssertionError # unsupported type
"""
x
------------
2y + 4z - 12
"""
This equation is easy to solve, let’s try Wolfram Mathematica this time:
436
def __le__ (self , other ):
# compare only integer parts :
return self.i <= other .i
if len(m) <= 1:
print tabs( indent )+" merge_sort () end. returning single element "
return m
middle = len(m) // 2
left = m[: middle ]
right = m[ middle :]
But here is a function which compares elements. Obviously, it wouldn’t work correctly without it.
So we can track both expression for each element and numerical value. Both will be printed finally. But whenever
values are to be compared, only numerical parts will be used.
Result:
437
merge_sort () begin . input :
input1 (22)
input2 (7)
input3 (2)
input4 (1)
input5 (8)
input6 (4)
merge_sort () begin . input :
input1 (22)
input2 (7)
input3 (2)
merge_sort () begin . input :
input1 (22)
merge_sort () end. returning single element
merge_sort () begin . input :
input2 (7)
input3 (2)
merge_sort () begin . input :
input2 (7)
merge_sort () end. returning single element
merge_sort () begin . input :
input3 (2)
merge_sort () end. returning single element
merge_sort () end. returning :
input3 (2)
input2 (7)
merge_sort () end. returning :
input3 (2)
input2 (7)
input1 (22)
merge_sort () begin . input :
input4 (1)
input5 (8)
input6 (4)
merge_sort () begin . input :
input4 (1)
merge_sort () end. returning single element
merge_sort () begin . input :
input5 (8)
input6 (4)
merge_sort () begin . input :
input5 (8)
merge_sort () end. returning single element
merge_sort () begin . input :
input6 (4)
merge_sort () end. returning single element
merge_sort () end. returning :
input6 (4)
input5 (8)
merge_sort () end. returning :
input4 (1)
input6 (4)
input5 (8)
merge_sort () end. returning :
input4 (1)
input3 (2)
438
input6 (4)
input2 (7)
input5 (8)
input1 (22)
17.1.10 Conclusion
For the sake of demonstration, I made things as simple as possible. But reality is always harsh and inconvenient, so all
this shouldn’t be taken as a silver bullet.
The files used in this part: https://github.com/DennisYurichev/SAT_SMT_by_example/tree/master/symbolic.
4 https://classes.soe.ucsc.edu/cmps290g/Fall09/Papers/AssigningMeanings1967.pdf
5 https://yurichev.com/mirrors/king76symbolicexecution.pdf
439
440
Chapter 18
KLEE
18.1 Installation
KLEE building from source is tricky. Easiest way to use KLEE is to install docker1 and then to run KLEE docker
image2 . The path where KLEE files residing can look like /var/lib/docker/aufs/mnt/(lots of hexadecimal dig-
its)/home/klee.
// abbreviated hexadecimal
1 https://docs.docker.com/engine/installation/linux/ubuntulinux/
2 http://klee.github.io/docker/
441
if (R > >4==(R&0 xF) && G > >4==(G&0 xF) && B > >4==(B&0 xF))
{
sprintf (out , "#%X%X%X", R&0xF , G&0xF , B&0 xF);
return ;
};
// last resort
sprintf (out , "#%02 X%02X%02X", R, G, B);
};
int main ()
{
uint8_t R, G, B;
klee_make_symbolic (&R, sizeof R, "R");
klee_make_symbolic (&G, sizeof R, "G");
klee_make_symbolic (&B, sizeof R, "B");
There are 5 possible paths in function, and let’s see, if KLEE could find them all? It’s indeed so:
% klee color.bc
KLEE: output directory is "/ home/klee/klee -out -134"
KLEE: WARNING : undefined reference to function : sprintf
KLEE: WARNING : undefined reference to function : strcpy
KLEE: WARNING ONCE: calling external : strcpy (51867584 , 51598960)
KLEE: ERROR: /home/klee/ color .c:33: external call with symbolic argument : sprintf
KLEE: NOTE: now ignoring this error at this location
KLEE: ERROR: /home/klee/ color .c:28: external call with symbolic argument : sprintf
KLEE: NOTE: now ignoring this error at this location
We can ignore calls to strcpy() and sprintf(), because we are not really interesting in state of out variable.
So there are exactly 5 paths:
% ls klee -last
assembly .ll run. stats test000003 . ktest test000005 . ktest
info test000001 . ktest test000003 .pc test000005 .pc
messages .txt test000002 . ktest test000004 . ktest warnings .txt
run. istats test000003 .exec.err test000005 .exec.err
442
object 0: size: 1
object 0: data: b '\xff '
object 1: name: b'G'
object 1: size: 1
object 1: data: b '\x00 '
object 2: name: b'B'
object 2: size: 1
object 2: data: b '\x00 '
443
5th set of input variables will result in “#F01” string:
These 5 sets of input variables can form a unit test for our function.
while (1)
{
ret = *( unsigned char *) s1 - *( unsigned char *) s2;
if (ret !=0)
break ;
if ((* s1 ==0) || (* s2)==0)
break ;
s1 ++;
s2 ++;
};
if (ret < 0)
{
return -1;
} else if (ret > 0)
{
return 1;
}
return 0;
}
int main ()
{
char input1 [2];
char input2 [2];
444
klee_assume (( input1 [0] >= 'a ') && ( input1 [0] <= 'z '));
klee_assume (( input2 [0] >= 'a ') && ( input2 [0] <= 'z '));
Let’s find out, if KLEE is capable of finding all three paths? I intentionaly made things simpler for KLEE by limiting
input arrays to two 2 bytes or to 1 character + terminal zero byte.
% ls klee -last
assembly .ll run. stats test000002 . ktest test000004 . ktest
info test000001 . ktest test000002 .pc test000005 . ktest
messages .txt test000001 .pc test000002 .user.err warnings .txt
run. istats test000001 .user.err test000003 . ktest
The first two errors are about klee_assume(). These are input values on which klee_assume() calls are stuck. We
can ignore them, or take a peek out of curiosity:
445
Three rest files are the input values for each path inside of my implementation of strcmp():
3rd is about first argument (“b”) is lesser than the second (“c”). 4th is opposite (“c” and “a”). 5th is when they are
equal (“a” and “a”).
Using these 3 test cases, we’ve got full coverage of our implementation of strcmp().
446
10 */
11
12 # define YEAR0 1900
13 # define EPOCH_YR 1970
14 # define SECS_DAY (24L * 60L * 60L)
15 # define YEARSIZE (year) ( LEAPYEAR (year) ? 366 : 365)
16
17 const int _ytab [2][12] =
18 {
19 { 31, 28, 31, 30, 31, 30, 31, 31, 30, 31, 30, 31 },
20 { 31, 29, 31, 30, 31, 30, 31, 31, 30, 31, 30, 31 }
21 };
22
23 const char *_days [] =
24 {
25 " Sunday ", " Monday ", " Tuesday ", " Wednesday ",
26 " Thursday ", " Friday ", " Saturday "
27 };
28
29 const char * _months [] =
30 {
31 " January ", " February ", " March ",
32 "April", "May", "June",
33 "July", " August ", " September ",
34 " October ", " November ", " December "
35 };
36
37 # define LEAPYEAR (year) (!(( year) % 4) && ((( year) % 100) || !(( year) % 400)))
38
39 void decode_UNIX_time ( const time_t time)
40 {
41 unsigned int dayclock , dayno ;
42 int year = EPOCH_YR ;
43
44 dayclock = ( unsigned long)time % SECS_DAY ;
45 dayno = ( unsigned long)time / SECS_DAY ;
46
47 int seconds = dayclock % 60;
48 int minutes = ( dayclock % 3600) / 60;
49 int hour = dayclock / 3600;
50 int wday = ( dayno + 4) % 7;
51 while ( dayno >= YEARSIZE (year))
52 {
53 dayno -= YEARSIZE (year);
54 year ++;
55 }
56
57 year = year - YEAR0 ;
58
59 int month = 0;
60
61 while ( dayno >= _ytab [ LEAPYEAR (year)][ month ])
62 {
63 dayno -= _ytab [ LEAPYEAR (year)][ month ];
64 month ++;
65 }
66
447
67 char *s;
68 switch ( month )
69 {
70 case 0: s=" January "; break ;
71 case 1: s=" February "; break ;
72 case 2: s=" March "; break ;
73 case 3: s=" April "; break ;
74 case 4: s=" May "; break ;
75 case 5: s=" June "; break ;
76 case 6: s=" July "; break ;
77 case 7: s=" August "; break ;
78 case 8: s=" September "; break ;
79 case 9: s=" October "; break ;
80 case 10: s=" November "; break ;
81 case 11: s=" December "; break ;
82 default :
83 assert (0);
84 };
85
86 printf ("%04d -%s -%02d %02d:%02d:%02d\n", YEAR0 +year , s, dayno +1, hour , minutes ,
seconds );
87 printf (" week day: %s\n", _days [wday ]);
88 }
89
90 int main ()
91 {
92 uint32_t time;
93
94 klee_make_symbolic (& time , sizeof time , "time ");
95
96 decode_UNIX_time (time);
97
98 return 0;
99 }
Wow, assert() at line 83 has been triggered, why? Let’s see a value of UNIX time which triggers it:
448
test000002 . assert .err
After my investigation, I’ve found that month variable can hold incorrect value of 12 (while 11 is maximal, for De-
cember), because LEAPYEAR() macro should receive year number as 2000, not as 100. So I’ve introduced a bug during
rewritting this function, and KLEE found it!
Just interesting, what would be if I’ll replace switch() to array of strings, like it usually happens in concise C/C++
code?
...
...
printf ("%04d -%s -%02d %02d:%02d:%02d\n", YEAR0 +year , s, dayno +1, hour , minutes ,
seconds );
printf (" week day: %s\n", _days [wday ]);
...
449
KLEE: done: total instructions = 101716
KLEE: done: completed paths = 1635
KLEE: done: generated tests = 2
So, if this piece of code can be triggered on remote computer, with this input value (input of death), it’s possible to
crash the process (with some luck, though).
OK, now I’m fixing a bug by moving year subtracting expression to line 43, and let’s find, what UNIX time value
corresponds to some fancy date like 2022-February-2?
1 # include <stdint .h>
2 # include <time.h>
3 # include <assert .h>
4
5 # define YEAR0 1900
6 # define EPOCH_YR 1970
7 # define SECS_DAY (24L * 60L * 60L)
8 # define YEARSIZE (year) ( LEAPYEAR (year) ? 366 : 365)
9
10 const int _ytab [2][12] =
11 {
12 { 31, 28, 31, 30, 31, 30, 31, 31, 30, 31, 30, 31 },
13 { 31, 29, 31, 30, 31, 30, 31, 31, 30, 31, 30, 31 }
14 };
15
16 # define LEAPYEAR (year) (!(( year) % 4) && ((( year) % 100) || !(( year) % 400)))
17
18 void decode_UNIX_time ( const time_t time)
19 {
20 unsigned int dayclock , dayno ;
21 int year = EPOCH_YR ;
22
23 dayclock = ( unsigned long)time % SECS_DAY ;
24 dayno = ( unsigned long)time / SECS_DAY ;
25
26 int seconds = dayclock % 60;
27 int minutes = ( dayclock % 3600) / 60;
28 int hour = dayclock / 3600;
29 int wday = ( dayno + 4) % 7;
30 while ( dayno >= YEARSIZE (year))
31 {
32 dayno -= YEARSIZE (year);
450
33 year ++;
34 }
35
36 int month = 0;
37
38 while ( dayno >= _ytab [ LEAPYEAR (year)][ month ])
39 {
40 dayno -= _ytab [ LEAPYEAR (year)][ month ];
41 month ++;
42 }
43 year = year - YEAR0 ;
44
45 if (YEAR0 +year ==2022 && month ==1 && dayno +1==22)
46 klee_assert (0);
47 }
48 int main ()
49 {
50 uint32_t time;
51
52 klee_make_symbolic (& time , sizeof time , "time ");
53
54 decode_UNIX_time (time);
55
56 return 0;
57 }
Success, but hours/minutes/seconds are seems random—they are random indeed, because, KLEE satisfied all con-
straints we’ve put, nothing else. We didn’t ask it to set hours/minutes/seconds to zeroes.
451
Let’s add constraints to hours/minutes/seconds as well:
...
if (YEAR0 +year ==2022 && month ==1 && dayno +1==22 && hour ==22 && minutes ==22 &&
seconds ==22)
klee_assert (0);
...
452
21 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64,
22 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64,
23 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64,
24 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64,
25 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64
26 };
27
28 int Base64decode (char *bufplain , const char * bufcoded )
29 {
30 int nbytesdecoded ;
31 register const unsigned char * bufin ;
32 register unsigned char * bufout ;
33 register int nprbytes ;
34
35 bufin = ( const unsigned char *) bufcoded ;
36 while ( pr2six [*( bufin ++)] <= 63);
37 nprbytes = ( bufin - ( const unsigned char *) bufcoded ) - 1;
38 nbytesdecoded = (( nprbytes + 3) / 4) * 3;
39
40 bufout = ( unsigned char *) bufplain ;
41 bufin = ( const unsigned char *) bufcoded ;
42
43 while ( nprbytes > 4) {
44 *( bufout ++) =
45 ( unsigned char) ( pr2six [* bufin ] << 2 | pr2six [ bufin [1]] >> 4);
46 *( bufout ++) =
47 ( unsigned char) ( pr2six [ bufin [1]] << 4 | pr2six [ bufin [2]] >> 2);
48 *( bufout ++) =
49 ( unsigned char) ( pr2six [ bufin [2]] << 6 | pr2six [ bufin [3]]) ;
50 bufin += 4;
51 nprbytes -= 4;
52 }
53
54 /* Note: ( nprbytes == 1) would be an error , so just ingore that case */
55 if ( nprbytes > 1) {
56 *( bufout ++) =
57 ( unsigned char) ( pr2six [* bufin ] << 2 | pr2six [ bufin [1]] >> 4);
58 }
59 if ( nprbytes > 2) {
60 *( bufout ++) =
61 ( unsigned char) ( pr2six [ bufin [1]] << 4 | pr2six [ bufin [2]] >> 2);
62 }
63 if ( nprbytes > 3) {
64 *( bufout ++) =
65 ( unsigned char) ( pr2six [ bufin [2]] << 6 | pr2six [ bufin [3]]) ;
66 }
67
68 *( bufout ++) = '\0';
69 nbytesdecoded -= (4 - nprbytes ) & 3;
70 return nbytesdecoded ;
71 }
72
73 int main ()
74 {
75 char input [32];
76 uint8_t output [16+1];
77
453
78 klee_make_symbolic (input , sizeof input , " input ");
79
80 klee_assume ( input [31]==0) ;
81
82 klee_assume ( Base64decode (output , input ) ==16) ;
83
84 for (int i=0; i <16; i++)
85 klee_assume ( output [i]==i);
86
87 klee_assert (0);
88
89 return 0;
90 }
...
We’re interesting in the second error, where klee_assert() has been triggered:
This is indeed a real base64 string, terminated with the zero byte, just as it’s requested by C/C++ standards. The
final zero byte at 31th byte (starting at zeroth byte) is our deed: so that KLEE would report lesser number of errors.
The base64 string is indeed correct:
454
% echo AAECAwQFBgcICQoLDA0OD4 | base64 -d | hexdump -C
base64 : invalid input
00000000 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f |................|
00000010
base64 decoder Linux utility I’ve just run blaming for “invalid input”—it means the input string is not properly padded.
Now let’s pad it manually, and decoder utility will no complain anymore:
The reason our generated base64 string is not padded is because base64 decoders are usually discards padding symbols
(“=”) at the end. In other words, they are not require them, so is the case of our decoder. Hence, padding symbols are
left unnoticed to KLEE.
So we again made antipode or inverse function of base64 decoder.
int
decompress_lzss ( uint8_t *dst , uint8_t *src , uint32_t srclen )
{
/* ring buffer of size N, with extra F -1 bytes to aid string comparison */
uint8_t * dststart = dst;
uint8_t * srcend = src + srclen ;
int i, j, k, r, c;
unsigned int flags ;
uint8_t text_buf [N + F - 1];
dst = dststart ;
srcend = src + srclen ;
for (i = 0; i < N - F; i++)
text_buf [i] = ' ';
r = N - F;
flags = 0;
for ( ; ; ) {
455
if ((( flags >>= 1) & 0x100) == 0) {
if (src < srcend ) c = *src ++; else break ;
flags = c | 0 xFF00 ; /* uses higher byte cleverly */
} /* to count eight */
if (flags & 1) {
if (src < srcend ) c = *src ++; else break ;
*dst ++ = c;
text_buf [r++] = c;
r &= (N - 1);
} else {
if (src < srcend ) i = *src ++; else break ;
if (src < srcend ) j = *src ++; else break ;
i |= ((j & 0xF0) << 4);
j = (j & 0x0F) + THRESHOLD ;
for (k = 0; k <= j; k++) {
c = text_buf [(i + k) & (N - 1) ];
*dst ++ = c;
text_buf [r++] = c;
r &= (N - 1);
}
}
}
int main ()
{
# define COMPRESSED_LEN 15
uint8_t input [ COMPRESSED_LEN ];
uint8_t plain [24];
uint32_t size= COMPRESSED_LEN ;
klee_assert (0);
return 0;
}
What I did is changing size of ring buffer from 4096 to 32, because if bigger, KLEE consumes all RAM4 it can. But
I’ve found that KLEE can live with that small buffer. I’ve also decreased COMPRESSED_LEN gradually to check, whether
KLEE would find compressed piece of data, and it did:
456
KLEE: output directory is "/ home/klee/klee -out -7"
KLEE: WARNING : undefined reference to function : klee_assert
KLEE: ERROR: /home/klee/ klee_lzss .c :122: invalid klee_assume call ( provably false )
KLEE: NOTE: now ignoring this error at this location
KLEE: ERROR: /home/klee/ klee_lzss .c:47: memory error : out of bound pointer
KLEE: NOTE: now ignoring this error at this location
KLEE: ERROR: /home/klee/ klee_lzss .c:37: memory error : out of bound pointer
KLEE: NOTE: now ignoring this error at this location
KLEE: WARNING ONCE: calling external : klee_assert (0)
KLEE: ERROR: /home/klee/ klee_lzss .c :124: failed external call: klee_assert
KLEE: NOTE: now ignoring this error at this location
KLEE consumed ≈ 1GB of RAM and worked for ≈ 15 minutes (on my Intel Core i3-3110M 2.4GHz notebook), but
here it is, a 15 bytes which, if decompressed by our copypasted algorithm, will result in desired text!
During my experimentation, I’ve found that KLEE can do even more cooler thing, to find out size of compressed piece
of data:
int main ()
{
uint8_t input [24];
uint8_t plain [24];
uint32_t size;
klee_assert (0);
return 0;
}
457
…but then KLEE works much slower, consumes much more RAM and I had success only with even smaller pieces of
desired text.
So how LZSS works? Without peeking into Wikipedia, we can say that: if LZSS compressor observes some data it
already had, it replaces the data with a link to some place in past with size. If it observes something yet unseen, it puts
data as is. This is theory. This is indeed what we’ve got. Desired text is three “Buffalo” words, the first and the last are
equivalent, but the second is almost equivalent, differing with first by one character.
That’s what we see:
Here is some control byte (0xff), “Buffalo” word is placed as is, then another control byte (0x01), then we see beginning
of the second word (“b”) and more control bytes, perhaps, links to the beginning of the buffer. These are command to
decompressor, like, in plain English, “copy data from the buffer we’ve already done, from that place to that place”, etc.
Interesting, is it possible to meddle into this piece of compressed data? Out of whim, can we force KLEE to find a
compressed data, where not just “b” character has been placed as is, but also the second character of the word, i.e., “bu”?
I’ve modified main() function by adding klee_assume(): now the 11th byte of input (compressed) data (right after
“b” byte) must have “u”. I has no luck with 15 byte of compressed data, so I increased it to 16 bytes:
int main ()
{
# define COMPRESSED_LEN 16
uint8_t input [ COMPRESSED_LEN ];
uint8_t plain [24];
uint32_t size= COMPRESSED_LEN ;
klee_assert (0);
return 0;
}
…and voilà: KLEE found a compressed piece of data which satisfied our whimsical constraint:
458
KLEE: done: total instructions = 36700587
KLEE: done: completed paths = 369756
KLEE: done: generated tests = 4
So now we find a piece of compressed data where two strings are placed as is: “Buffalo” and “bu”.
Both pieces of compressed data, if feeded into our copypasted function, produce “Buffalo buffalo Buffalo” text string.
Please note, I still have no access to LZSS compressor code, and I didn’t get into LZSS decompressor details yet.
Unfortunately, things are not that cool: KLEE is very slow and I had success only with small pieces of text, and
also ring buffer size had to be decreased significantly (original LZSS decompressor with ring buffer of 4096 bytes cannot
decompress correctly what we found).
Nevertheless, it’s very impressive, taking into account the fact that we’re not getting into internals of this specific
LZSS decompressor. Once more time, we’ve created antipode of decompressor, or inverse function.
Also, as it seems, KLEE isn’t very good so far with decompression algorithms (but who’s good then?). I’ve also tried
various JPEG/PNG/GIF decoders (which, of course, has decompressors), starting with simplest possible, and KLEE had
stuck.
459
22 * by white space . Must have form "-I.FE -X", where I is the integer
23 * part of the mantissa , F is the fractional part of the mantissa ,
24 * and X is the exponent . Either of the signs may be "+" , "-", or
25 * omitted . Either I or F may be omitted , or both. The decimal point
26 * isn 't necessary unless F is present . The "E" may actually be an "e",
27 * or "E", "S", "s", "F", "f", "D", "d", "L", "l".
28 * E and X may both be omitted (but not just one).
29 *
30 * endPtr
31 * If non -NULL , store terminating character 's address here.
32 *
33 * radix
34 * Radix of floating point , one of 2, 8, 10, 16.
35 *
36 * The return value is the double - precision floating - point
37 * representation of the characters in string . If endPtr isn 't
38 * NULL , then * endPtr is filled in with the address of the
39 * next character after the last one that was part of the
40 * floating -point number .
41 */
42 double strtodx (char *string , char ** endPtr , int radix )
43 {
44 int sign = 0, expSign = 0, fracSz , fracOff , i;
45 double fraction , dblExp , * powTab ;
46 register char *p;
47 register char c;
48
49 /* Exponent read from "EX" field . */
50 int exp = 0;
51
52 /* Exponent that derives from the fractional part. Under normal
53 * circumstances , it is the negative of the number of digits in F.
54 * However , if I is very long , the last digits of I get dropped
55 * ( otherwise a long I with a large negative exponent could cause an
56 * unnecessary overflow on I alone ). In this case , fracExp is
57 * incremented one for each dropped digit . */
58 int fracExp = 0;
59
60 /* Number of digits in mantissa . */
61 int mantSize ;
62
63 /* Number of mantissa digits BEFORE decimal point . */
64 int decPt ;
65
66 /* Temporarily holds location of exponent in string . */
67 char *pExp;
68
69 /* Largest possible base 10 exponent .
70 * Any exponent larger than this will already
71 * produce underflow or overflow , so there 's
72 * no need to worry about additional digits . */
73 static int maxExponent = 307;
74
75 /* Table giving binary powers of 10.
76 * Entry is 10^2^ i. Used to convert decimal
77 * exponents into floating - point numbers . */
78 static double powersOf10 [] = {
460
79 1e1 , 1e2 , 1e4 , 1e8 , 1e16 , 1e32 , //1 e64 , 1e128 , 1e256 ,
80 };
81 static double powersOf2 [] = {
82 2, 4, 16, 256 , 65536 , 4.294967296 e9 , 1.8446744073709551616 e19 ,
83 //3.4028236692093846346 e38 , 1.1579208923731619542 e77 ,
1.3407807929942597099 e154 ,
84 };
85 static double powersOf8 [] = {
86 8, 64, 4096 , 2.81474976710656 e14 , 7.9228162514264337593 e28 ,
87 //6.2771017353866807638 e57 , 3.9402006196394479212 e115 ,
1.5525180923007089351 e231 ,
88 };
89 static double powersOf16 [] = {
90 16, 256 , 65536 , 1.8446744073709551616 e19 ,
91 //3.4028236692093846346 e38 , 1.1579208923731619542 e77 ,
1.3407807929942597099 e154 ,
92 };
93
94 /*
95 * Strip off leading blanks and check for a sign.
96 */
97 p = string ;
98 while (*p==' ' || *p== '\t ')
99 ++p;
100 if (*p == '-') {
101 sign = 1;
102 ++p;
103 } else if (*p == '+')
104 ++p;
105
106 /*
107 * Count the number of digits in the mantissa ( including the decimal
108 * point ), and also locate the decimal point .
109 */
110 decPt = -1;
111 for ( mantSize =0; ; ++ mantSize ) {
112 c = *p;
113 if (! isdigitx (c, radix )) {
114 if (c != '.' || decPt >= 0)
115 break ;
116 decPt = mantSize ;
117 }
118 ++p;
119 }
120
121 /*
122 * Now suck up the digits in the mantissa . Use two integers to
123 * collect 9 digits each (this is faster than using floating - point ).
124 * If the mantissa has more than 18 digits , ignore the extras , since
125 * they can 't affect the value anyway .
126 */
127 pExp = p;
128 p -= mantSize ;
129 if (decPt < 0)
130 decPt = mantSize ;
131 else
132 --mantSize ; /* One of the digits was the point . */
461
133
134 switch ( radix ) {
135 default :
136 case 10: fracSz = 9; fracOff = 1000000000; powTab = powersOf10 ; break ;
137 case 2: fracSz = 30; fracOff = 1073741824; powTab = powersOf2 ; break ;
138 case 8: fracSz = 10; fracOff = 1073741824; powTab = powersOf8 ; break ;
139 case 16: fracSz = 7; fracOff = 268435456; powTab = powersOf16 ; break ;
140 }
141 if ( mantSize > 2 * fracSz )
142 mantSize = 2 * fracSz ;
143 fracExp = decPt - mantSize ;
144 if ( mantSize == 0) {
145 fraction = 0.0;
146 p = string ;
147 goto done;
148 } else {
149 int frac1 , frac2 ;
150
151 for ( frac1 =0; mantSize > fracSz ; --mantSize ) {
152 c = *p++;
153 if (c == '.')
154 c = *p++;
155 frac1 = frac1 * radix + (c - '0');
156 }
157 for ( frac2 =0; mantSize >0; --mantSize ) {
158 c = *p++;
159 if (c == '.')
160 c = *p++;
161 frac2 = frac2 * radix + (c - '0');
162 }
163 fraction = ( double ) fracOff * frac1 + frac2 ;
164 }
165
166 /*
167 * Skim off the exponent .
168 */
169 p = pExp;
170 if (*p=='E' || *p=='e' || *p=='S' || *p=='s' || *p=='F' || *p=='f' ||
171 *p=='D' || *p=='d' || *p=='L' || *p=='l ') {
172 ++p;
173 if (*p == '-') {
174 expSign = 1;
175 ++p;
176 } else if (*p == '+')
177 ++p;
178 while ( isdigitx (*p, radix ))
179 exp = exp * radix + (*p++ - '0');
180 }
181 if ( expSign )
182 exp = fracExp - exp;
183 else
184 exp = fracExp + exp;
185
186 /*
187 * Generate a floating - point number that represents the exponent .
188 * Do this by processing the exponent one bit at a time to combine
189 * many powers of 2 of 10. Then combine the exponent with the
462
190 * fraction .
191 */
192 if (exp < 0) {
193 expSign = 1;
194 exp = -exp;
195 } else
196 expSign = 0;
197 if (exp > maxExponent )
198 exp = maxExponent ;
199 dblExp = 1.0;
200 for (i=0; exp; exp >>=1, ++i)
201 if (exp & 01)
202 dblExp *= powTab [i];
203 if ( expSign )
204 fraction /= dblExp ;
205 else
206 fraction *= dblExp ;
207
208 done:
209 if ( endPtr )
210 * endPtr = p;
211
212 return sign ? -fraction : fraction ;
213 }
214
215 # define BUFSIZE 10
216 int main ()
217 {
218 char buf[ BUFSIZE ];
219 klee_make_symbolic (buf , sizeof buf , "buf ");
220 klee_assume (buf [9]==0) ;
221
222 strtodx (buf , NULL , 10);
223 };
( https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/KLEE/strtodx.c )
Interestinly, KLEE cannot handle floating-point arithmetic, but nevertheless, found something:
...
KLEE: ERROR: /home/klee/ klee_test .c :202: memory error : out of bound pointer
...
As it seems, string “-.0E-66” makes out of bounds array access (read) at line 202. While further investigation, I’ve
found that powersOf10[] array is too short: 6th element (started at 0th) has been accessed. And here we see part of
array commented (line 79)! Probably someone’s mistake?
463
18.8 Unit testing: simple expression evaluator (calculator)
I has been looking for simple expression evaluator (calculator in other words) which takes expression like “2+2” on input
and gives answer. I’ve found one at http://stackoverflow.com/a/13895198. Unfortunately, it has no bugs, so I’ve
introduced one: a token buffer (buf[] at line 31) is smaller than input buffer (input[] at line 19).
464
52 klee_make_symbolic (input , sizeof input , " input ");
53 input [127]=0;
54
55 init ();
56 while (1)
57 {
58 int val = expr ();
59 printf ("%d\n", val);
60
61 if ( look_ahead != END_INPUT )
62 error ("junk after expression ");
63 advance (); // past end of input mark
64 }
65 return 0;
66 }
67
68 // Just die on any error .
69 void error (char *msg)
70 {
71 fprintf (stderr , " Error : %s. Exiting .\n", msg);
72 exit (1);
73 }
74
75 // Buffer the current character and read a new one.
76 void read ()
77 {
78 buf[n++] = ch;
79 buf[n] = '\0 '; // Terminate the string .
80 ch = my_getchar ();
81 }
82
83 // Ignore the current character .
84 void ignore ()
85 {
86 ch = my_getchar ();
87 }
88
89 // Reset the token buffer .
90 void reset ()
91 {
92 n = 0;
93 buf [0] = '\0 ';
94 }
95
96 // The scanner . A tiny deterministic finite automaton .
97 int scan ()
98 {
99 reset ();
100 START :
101 // first character is digit ?
102 if ( isdigit (ch))
103 goto DIGITS ;
104
105 switch (ch)
106 {
107 case ' ': case '\t': case '\r':
108 ignore ();
465
109 goto START ;
110
111 case '-': case '+': case '^':
112 read ();
113 return ADD_OP ;
114
115 case '∼':
116 read ();
117 return NOT_OP ;
118
119 case '*': case '/': case '%':
120 read ();
121 return MUL_OP ;
122
123 case '(':
124 read ();
125 return LEFT_PAREN ;
126
127 case ')':
128 read ();
129 return RIGHT_PAREN ;
130
131 case 0:
132 case '\n':
133 ch = ' '; // delayed ignore ()
134 return END_INPUT ;
135
136 default :
137 printf ("bad character : 0x%x\n", ch);
138 exit (0);
139 }
140
141 DIGITS :
142 if ( isdigit (ch))
143 {
144 read ();
145 goto DIGITS ;
146 }
147 else
148 return NUMBER ;
149 }
150
151 // To advance is just to replace the look -ahead .
152 void advance ()
153 {
154 look_ahead = scan ();
155 }
156
157 // Clear the token buffer and read the first look - ahead .
158 void init ()
159 {
160 reset ();
161 ignore (); // junk current character
162 advance ();
163 }
164
165 int get_number (char *buf)
466
166 {
167 char * endptr ;
168
169 int rt= strtoul (buf , &endptr , 10);
170
171 // is the whole buffer has been processed ?
172 if ( strlen (buf)!= endptr -buf)
173 {
174 fprintf (stderr , " invalid number : %s\n", buf);
175 exit (0);
176 };
177 return rt;
178 };
179
180 int unsigned_factor ()
181 {
182 int rtn = 0;
183 switch ( look_ahead )
184 {
185 case NUMBER :
186 rtn= get_number (buf);
187 advance ();
188 break ;
189
190 case LEFT_PAREN :
191 advance ();
192 rtn = expr ();
193 if ( look_ahead != RIGHT_PAREN ) error (" missing ')'");
194 advance ();
195 break ;
196
197 default :
198 printf (" unexpected token : %d\n", look_ahead );
199 exit (0);
200 }
201 return rtn;
202 }
203
204 int factor ()
205 {
206 int rtn = 0;
207 // If there is a leading minus ...
208 if ( look_ahead == ADD_OP && buf [0] == '-')
209 {
210 advance ();
211 rtn = -unsigned_factor ();
212 }
213 else
214 rtn = unsigned_factor ();
215
216 return rtn;
217 }
218
219 int term ()
220 {
221 int rtn = factor ();
222 while ( look_ahead == MUL_OP )
467
223 {
224 switch (buf [0])
225 {
226 case '*':
227 advance ();
228 rtn *= factor ();
229 break ;
230
231 case '/':
232 advance ();
233 rtn /= factor ();
234 break ;
235 case '%':
236 advance ();
237 rtn %= factor ();
238 break ;
239 }
240 }
241 return rtn;
242 }
243
244 int expr ()
245 {
246 int rtn = term ();
247 while ( look_ahead == ADD_OP )
248 {
249 switch (buf [0])
250 {
251 case '+':
252 advance ();
253 rtn += term ();
254 break ;
255
256 case '-':
257 advance ();
258 rtn -= term ();
259 break ;
260 }
261 }
262 return rtn;
263 }
( https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/KLEE/calc.c )
KLEE found buffer overflow with little effort (65 zero digits + one tabulation symbol):
468
Hard to say, how tabulation symbol (\t) got into input[] array, but KLEE achieved what has been desired: buffer
overflown.
KLEE also found two expression strings which leads to division error (“0/0” and “0%0”):
Maybe this is not impressive result, nevertheless, it’s yet another reminder that division and remainder operations
must be wrapped somehow in production code to avoid possible crash.
18.10 Exercise
Here is my crackme/keygenme, which may be tricky, but easy to solve using KLEE: http://challenges.re/74/.
469
470
Chapter 19
(Amateur) cryptography
class Expr:
def __init__ (self ,s):
self.s=s
471
# reworked from:
def MX():
return ((z> >5) ^(y < <2)) + ((y > >3) ^(z <<4))^( sum^y) + (k[( Expr(str(p)) & 3)^e]^z)
y = v[0]
sum = Expr("0")
DELTA = 0 x9e3779b9
# Encoding only
z = v[n -1]
# number of rounds :
#q = 6 + 52 / n
q=1
while q > 0:
q -= 1
sum = sum + DELTA
e = (sum >> 2) & 3
p = 0
while p < n - 1:
y = v[p+1]
z = v[p] = v[p] + MX()
p += 1
y = v[0]
z = v[n -1] = v[n -1] + MX()
return 0
v=[ Expr(" input1 "), Expr(" input2 "), Expr(" input3 "), Expr(" input4 ")]
k=Expr("key")
raw_xxtea (v, 4, k)
A key is choosen according to input data, and, obviously, we can’t know it during symbolic execution, so we leave
expression like k[...].
Now results for just one round, for each of 4 outputs:
0 : ( input1 +(((( input4 > >5) ^( input2 < <2))+(( input2 > >3) ^( input4 < <4))) ^(((0+2654435769) ^
input2 )+
(( key [((0&3) ^(((0+2654435769) >>2)&3))])^ input4 ))))
1 : ( input2 +((((( input1 +(((( input4 > >5) ^( input2 < <2))+(( input2 > >3) ^( input4 < <4)))
^(((0+2654435769) ^
input2 )+(( key [((0&3) ^(((0+2654435769) >>2)&3))])^ input4 )))) >>5)^( input3 < <2))+(( input3 > >3)
^(( input1 +
(((( input4 > >5) ^( input2 < <2))+(( input2 > >3) ^( input4 < <4))) ^(((0+2654435769) ^ input2 )+(( key
[((0&3) ^
(((0+2654435769) >>2)&3))])^ input4 )))) <<4))) ^(((0+2654435769) ^ input3 )+(( key [((1&3)
472
^(((0+2654435769) >>2)&
3))])^( input1 +(((( input4 > >5) ^( input2 < <2))+(( input2 > >3) ^( input4 < <4))) ^(((0+2654435769) ^
input2 )+
(( key [((0&3) ^(((0+2654435769) >>2)&3))])^ input4 ))))))))
2 : ( input3 +((((( input2 +((((( input1 +(((( input4 > >5) ^( input2 < <2))+(( input2 > >3) ^( input4 < <4)
))^
(((0+2654435769) ^ input2 )+(( key [((0&3) ^(((0+2654435769) >>2) &3))])^ input4 )))) >>5)^( input3
<<2))+
(( input3 > >3) ^(( input1 +(((( input4 > >5) ^( input2 < <2))+(( input2 > >3) ^( input4 < <4)))
^(((0+2654435769) ^
input2 )+(( key [((0&3) ^(((0+2654435769) >>2)&3))])^ input4 )))) <<4))) ^(((0+2654435769) ^ input3
)+
(( key [((1&3) ^(((0+2654435769) >>2)&3))]) ^( input1 +(((( input4 > >5) ^( input2 < <2))+(( input2 > >3)
^( input4 <<4)))
^(((0+2654435769) ^ input2 )+(( key [((0&3) ^(((0+2654435769) >>2)&3))])^ input4 )))))))) >>5)^(
input4 <<2))+
(( input4 > >3) ^(( input2 +((((( input1 +(((( input4 > >5)^( input2 < <2))+(( input2 > >3) ^( input4 < <4)))
^(((0+2654435769) ^
input2 )+(( key [((0&3) ^(((0+2654435769) >>2)&3))])^ input4 )))) >>5)^( input3 < <2))+(( input3 > >3)
^(( input1 +
(((( input4 > >5) ^( input2 < <2))+(( input2 > >3) ^( input4 < <4))) ^(((0+2654435769) ^ input2 )+(( key
[((0&3) ^
(((0+2654435769) >>2)&3))])^ input4 )))) <<4))) ^(((0+2654435769) ^ input3 )+(( key [((1&3)
^(((0+2654435769) >>2)&3))])^
( input1 +(((( input4 > >5) ^( input2 < <2))+(( input2 > >3) ^( input4 < <4))) ^(((0+2654435769) ^ input2 )
+(( key [((0&3) ^
(((0+2654435769) >>2)&3))])^ input4 )))))))) <<4))) ^(((0+2654435769) ^ input4 )+(( key [((2&3)
^(((0+2654435769) >>2)&
3))])^( input2 +((((( input1 +(((( input4 > >5) ^( input2 < <2))+(( input2 > >3) ^( input4 < <4)))
^(((0+2654435769) ^
input2 )+(( key [((0&3) ^(((0+2654435769) >>2)&3))])^ input4 )))) >>5)^( input3 < <2))+(( input3 > >3)
^(( input1 +
(((( input4 > >5) ^( input2 < <2))+(( input2 > >3) ^( input4 < <4))) ^(((0+2654435769) ^ input2 )+(( key
[((0&3) ^
(((0+2654435769) >>2)&3))])^ input4 )))) <<4))) ^(((0+2654435769) ^ input3 )+(( key [((1&3)
^(((0+2654435769) >>2)&
3))])^( input1 +(((( input4 > >5) ^( input2 < <2))+(( input2 > >3) ^( input4 < <4))) ^(((0+2654435769) ^
input2 )+(( key [((0&3) ^
(((0+2654435769) >>2)&3))])^ input4 ))))))))))))
3 : ( input4 +((((( input3 +((((( input2 +((((( input1 +(((( input4 > >5) ^( input2 < <2))+(( input2 > >3)
^( input4 <<4)))^
(((0+2654435769) ^ input2 )+(( key [((0&3) ^(((0+2654435769) >>2) &3))])^ input4 )))) >>5)^( input3
<<2))+(( input3 > >3)^
(( input1 +(((( input4 > >5) ^( input2 < <2))+(( input2 > >3) ^( input4 < <4))) ^(((0+2654435769) ^ input2 )
+(( key [((0&3) ^
(((0+2654435769) >>2)&3))])^ input4 )))) <<4))) ^(((0+2654435769) ^ input3 )+(( key [((1&3)
^(((0+2654435769) >>2)&3))])^
( input1 +(((( input4 > >5) ^( input2 < <2))+(( input2 > >3) ^( input4 < <4))) ^(((0+2654435769) ^ input2 )
+(( key [((0&3) ^
(((0+2654435769) >>2)&3))])^ input4 )))))))) >>5)^( input4 < <2))+(( input4 > >3) ^(( input2 +(((((
input1 +(((( input4 > >5)^
(input2 <<2))+(( input2 > >3) ^( input4 < <4))) ^(((0+2654435769) ^ input2 )+(( key [((0&3)
^(((0+2654435769) >>2)&3))])^
input4 )))) >>5)^( input3 < <2))+(( input3 > >3) ^(( input1 +(((( input4 > >5) ^( input2 < <2))+(( input2
>>3)^( input4 < <4)))^
473
(((0+2654435769) ^ input2 )+(( key [((0&3) ^(((0+2654435769) >>2) &3))])^ input4 )))) <<4)))
^(((0+2654435769) ^ input3 )+
(( key [((1&3) ^(((0+2654435769) >>2)&3))]) ^( input1 +(((( input4 > >5) ^( input2 < <2))+(( input2 > >3)
^( input4 <<4)))^
(((0+2654435769) ^ input2 )+(( key [((0&3) ^(((0+2654435769) >>2) &3))])^ input4 )))))))) <<4)))
^(((0+2654435769) ^
input4 )+(( key [((2&3) ^(((0+2654435769) >>2)&3))]) ^( input2 +((((( input1 +(((( input4 > >5) ^(
input2 <<2))+(( input2 > >3)^
(input4 <<4))) ^(((0+2654435769) ^ input2 )+(( key [((0&3) ^(((0+2654435769) >>2)&3))])^ input4 )))
) >>5)^( input3 < <2))+
(( input3 > >3) ^(( input1 +(((( input4 > >5) ^( input2 < <2))+(( input2 > >3) ^( input4 < <4)))
^(((0+2654435769) ^ input2 )+
(( key [((0&3) ^(((0+2654435769) >>2)&3))])^ input4 )))) <<4))) ^(((0+2654435769) ^ input3 )+(( key
[((1&3) ^(((0+2654435769) >>
2) &3))])^( input1 +(((( input4 > >5) ^( input2 < <2))+(( input2 > >3) ^( input4 < <4))) ^(((0+2654435769)
^ input2 )+(( key [((0&3) ^
(((0+2654435769) >>2)&3))])^ input4 )))))))))))) >>5)^(( input1 +(((( input4 > >5) ^( input2 < <2))
+(( input2 >>3) ^( input4 <<
4))) ^(((0+2654435769) ^ input2 )+(( key [((0&3) ^(((0+2654435769) >>2)&3))])^ input4 )))) <<2))
+((( input1 +(((( input4 > >5)^
(input2 <<2))+(( input2 > >3) ^( input4 < <4))) ^(((0+2654435769) ^ input2 )+(( key [((0&3)
^(((0+2654435769) >>2)&3))])^
input4 )))) >>3) ^(( input3 +((((( input2 +((((( input1 +(((( input4 > >5) ^( input2 < <2))+(( input2 > >3)
^( input4 <<4))) ^(((0+
2654435769) ^ input2 )+(( key [((0&3) ^(((0+2654435769) >>2)&3))])^ input4 )))) >>5)^( input3 < <2))
+(( input3 >>3) ^(( input1 +
(((( input4 > >5) ^( input2 < <2))+(( input2 > >3) ^( input4 < <4))) ^(((0+2654435769) ^ input2 )+(( key
[((0&3) ^(((0+2654435769) >>
2) &3))])^ input4 )))) <<4))) ^(((0+2654435769) ^ input3 )+(( key [((1&3) ^(((0+2654435769) >>2)&3))
])^( input1 +(((( input4 >>
5)^( input2 <<2))+(( input2 > >3) ^( input4 < <4))) ^(((0+2654435769) ^ input2 )+(( key [((0&3)
^(((0+2654435769) >>2)&3))])^
input4 )))))))) >>5)^( input4 < <2))+(( input4 > >3) ^(( input2 +((((( input1 +(((( input4 > >5) ^( input2
<<2))+(( input2 > >3)^
(input4 <<4))) ^(((0+2654435769) ^ input2 )+(( key [((0&3) ^(((0+2654435769) >>2)&3))])^ input4 )))
) >>5)^( input3 < <2))+
(( input3 > >3) ^(( input1 +(((( input4 > >5) ^( input2 < <2))+(( input2 > >3) ^( input4 < <4)))
^(((0+2654435769) ^ input2 )+
(( key [((0&3) ^(((0+2654435769) >>2)&3))])^ input4 )))) <<4))) ^(((0+2654435769) ^ input3 )+(( key
[((1&3) ^(((0+2654435769) >>
2) &3))])^( input1 +(((( input4 > >5) ^( input2 < <2))+(( input2 > >3) ^( input4 < <4))) ^(((0+2654435769)
^ input2 )+(( key [((0&3) ^
(((0+2654435769) >>2)&3))])^ input4 )))))))) <<4))) ^(((0+2654435769) ^ input4 )+(( key [((2&3)
^(((0+2654435769) >>2)&3))])^
( input2 +((((( input1 +(((( input4 > >5) ^( input2 < <2))+(( input2 > >3) ^( input4 < <4)))
^(((0+2654435769) ^ input2 )+(( key [((0&3) ^
(((0+2654435769) >>2)&3))])^ input4 )))) >>5)^( input3 < <2))+(( input3 > >3) ^(( input1 +(((( input4
>>5)^( input2 < <2))+
(( input2 > >3) ^( input4 < <4))) ^(((0+2654435769) ^ input2 )+(( key [((0&3) ^(((0+2654435769) >>2)&3)
)])^ input4 )))) <<4)))^(((
0+2654435769) ^ input3 )+(( key [((1&3) ^(((0+2654435769) >>2)&3))]) ^( input1 +(((( input4 > >5) ^(
input2 <<2))+(( input2 > >3) ^(
input4 <<4))) ^(((0+2654435769) ^ input2 )+(( key [((0&3) ^(((0+2654435769) >>2)&3))])^ input4 ))))
)))))))) <<4))) ^(((0+
2654435769) ^( input1 +(((( input4 > >5) ^( input2 < <2))+(( input2 > >3) ^( input4 < <4)))
^(((0+2654435769) ^ input2 )+(( key [((0&3) ^
(((0+2654435769) >>2)&3))])^ input4 )))))+(( key [((3&3) ^(((0+2654435769) >>2)&3))]) ^( input3
474
+((((( input2 +((((( input1 +
(((( input4 > >5) ^( input2 < <2))+(( input2 > >3) ^( input4 < <4))) ^(((0+2654435769) ^ input2 )+(( key
[((0&3) ^(((0+2654435769) >>
2) &3))])^ input4 )))) >>5)^( input3 < <2))+(( input3 > >3) ^(( input1 +(((( input4 > >5) ^( input2 < <2))
+(( input2 >>3) ^( input4 <<
4))) ^(((0+2654435769) ^ input2 )+(( key [((0&3) ^(((0+2654435769) >>2)&3))])^ input4 )))) <<4)))
^(((0+2654435769) ^ input3 )+
(( key [((1&3) ^(((0+2654435769) >>2)&3))]) ^( input1 +(((( input4 > >5) ^( input2 < <2))+(( input2 > >3)
^( input4 <<4))) ^(((0+
2654435769) ^ input2 )+(( key [((0&3) ^(((0+2654435769) >>2)&3))])^ input4 )))))))) >>5)^( input4
<<2))+(( input4 > >3) ^((
input2 +((((( input1 +(((( input4 > >5) ^( input2 < <2))+(( input2 > >3) ^( input4 < <4)))
^(((0+2654435769) ^ input2 )+(( key [((0&3) ^
(((0+2654435769) >>2)&3))])^ input4 )))) >>5)^( input3 < <2))+(( input3 > >3) ^(( input1 +(((( input4
>>5)^( input2 < <2))+((
input2 >>3)^( input4 < <4))) ^(((0+2654435769) ^ input2 )+(( key [((0&3) ^(((0+2654435769) >>2)&3))
])^ input4 )))) <<4))) ^(((0+
2654435769) ^ input3 )+(( key [((1&3) ^(((0+2654435769) >>2)&3))]) ^( input1 +(((( input4 > >5) ^(
input2 <<2))+(( input2 > >3)^
(input4 <<4))) ^(((0+2654435769) ^ input2 )+(( key [((0&3) ^(((0+2654435769) >>2)&3))])^ input4 )))
))))) <<4))) ^(((0+
2654435769) ^ input4 )+(( key [((2&3) ^(((0+2654435769) >>2)&3))]) ^( input2 +((((( input1 +((((
input4 >>5)^( input2 < <2))+
(( input2 > >3) ^( input4 < <4))) ^(((0+2654435769) ^ input2 )+(( key [((0&3) ^(((0+2654435769) >>2)&3)
)])^ input4 )))) >>5)^
(input3 <<2))+(( input3 > >3) ^(( input1 +(((( input4 > >5) ^( input2 < <2))+(( input2 > >3) ^( input4 < <4))
) ^(((0+2654435769) ^
input2 )+(( key [((0&3) ^(((0+2654435769) >>2)&3))])^ input4 )))) <<4))) ^(((0+2654435769) ^ input3
)+(( key [((1&3) ^(((0+
2654435769) >>2)&3))]) ^( input1 +(((( input4 > >5) ^( input2 < <2))+(( input2 > >3) ^( input4 < <4)))
^(((0+2654435769) ^ input2 )+
(( key [((0&3) ^(((0+2654435769) >>2)&3))])^ input4 ))))))))))))))))
Somehow, size of expression for each subsequent output is bigger. I hope I haven’t been mistaken? And this is just
for 1 round. For 2 rounds, size of all 4 expression is ≈ 970KB. For 3 rounds, this is ≈ 115M B. For 4 rounds, I have not
enough RAM on my computer. Expressions exploding exponentially. And there are 19 rounds. You can weigh it.
Perhaps, you can simplify these expressions: there are a lot of excessive parenthesis, but I’m highly pessimistic,
cryptoalgorithms constructed in such a way to not have any spare operations.
In order to crack it, you can use these expressions as system of equation and try to solve it using SMT-solver. This is
called “algebraic attack”.
In other words, theoretically, you can build a system of equation like this: M D5(x) = 12341234..., but expressions are
so huge so it’s impossible to solve them. Yes, cryptographers are fully aware of this and one of the goals of the successful
cipher is to make expressions as big as possible, using resonable time and size of algorithm.
Nevertheless, you can find numerous papers about breaking these cryptosystems with reduced number of rounds: when
expression isn’t exploded yet, sometimes it’s possible. This cannot be applied in practice, but such an experience has some
interesting theoretical uses.
475
• Attacking Bivium Using SAT Solvers
• Extending SAT Solvers to Cryptographic Problems
• Applications of SAT Solvers to Cryptanalysis of Hash Functions
• Algebraic-Differential Cryptanalysis of DES
• Attepmt to break Speck cipher: https://github.com/TechSecCTF/z3_splash_class.
476
buf [3]= rotr32b (t3 , 4);
};
};
int main ()
{
uint32_t buf [4];
klee_make_symbolic (buf , sizeof buf);
megahash (buf);
if (buf [0]==0 x18f71ce6 // or whatever
&& buf [1]==0 xf37c2fc9
&& buf [2]==0 x1cfe96fe
&& buf [3]==0 x8c02c75e )
klee_assert (0);
};
KLEE can break it with little effort. Functions of such complexity is common in shareware, which checks license keys,
etc.
Here is how we can make its work harder by making rotations dependent of inputs, and this makes number of possible
inputs much, much bigger:
void megahash ( uint32_t buf [4])
{
for (int i=0; i <16; i++)
{
uint32_t t0=buf [0]^0 x12345678 ^buf [1];
uint32_t t1=buf [1]^0 xabcdef01 ^buf [2];
uint32_t t2=buf [2]^0 x23456789 ^buf [3];
uint32_t t3=buf [3]^0 x0abcdef0 ^buf [0];
Addition (or modular addition, as cryptographers say) can make thing even harder:
void megahash ( uint32_t buf [4])
{
for (int i=0; i <4; i++)
{
uint32_t t0=buf [0]^0 x12345678 ^buf [1];
uint32_t t1=buf [1]^0 xabcdef01 ^buf [2];
uint32_t t2=buf [2]^0 x23456789 ^buf [3];
uint32_t t3=buf [3]^0 x0abcdef0 ^buf [0];
As en exercise, you can try to make a block cipher which KLEE wouldn’t break. This is quite sobering experience.
Another significant property of the serious cryptography is: “The two inputs differ by only a single bit, but approx-
imately half the bits are different in the digests.” (Alan A. A. Donovan, Brian W. Kernighan — The Go Programming
Language).
477
Another easy way to test your algorithm: encrypt numbers starting at 0 and feed the resulting ciphertext to diehard
test 2 (like in Counter/CTR encryption mode). These tests are designed to check PRNGs. In other words, tests shouldn’t
find any regularities in a list of random numbers, as well as in a ciphertext.
Summary: if you deal with amateur cryptography, you can always give KLEE and SMT solver a try. Even more:
sometimes you have only decryption function, and if algorithm is simple enough, KLEE or SMT solver can reverse things
back.
One amusing thing to mention: if you try to implement amateur cryptoalgorithm in Verilog/VHDL language to run
it on FPGA3 , maybe in brute-force way, you can find that EDA4 tools can optimize many things during synthesis (this
is the word they use for “compilation”) and can leave cryptoalgorithm much smaller/simpler than it was. Even if you try
to implement DES5 algorithm in bare metal with a fixed key, Altera Quartus can optimize first round of it and make it
smaller than others.
19.2.1 Bugs
Another prominent feature of amateur cryptography is bugs. Bugs here often left uncaught because output of encrypting
function visually looked “good enough” or “obfuscated enough”, so a developer stopped to work on it.
This is especially feature of hash functions, because when you work on block cipher, you have to do two functions
(encryption/decryption), while hashing function is single.
Weirdest ever amateur encryption algorithm I once saw, encrypted only odd bytes of input block, while even bytes
left untouched, so the input plain text has been partially seen in the resulting encrypted block. It was encryption routine
used in license key validation. Hard to believe someone did this on purpose. Most likely, it was just an unnoticed bug.
19.2.4 Examples
• A popular FLEXlm license manager was based on a simple amateur cryptoalgorithm (before they switched to ECC8 ),
which can be cracked easily.
• You can find a lot of blog posts about breaking CTF-level crypto using Z3, etc. Here is one of them: http:
//doar-e.github.io/blog/2015/08/18/keygenning-with-klee/.
2 https://en.wikipedia.org/wiki/Diehard_tests
3 Field-programmable gate array
4 Electronic design automation
5 Data Encryption Standard
6 http://beginners.re
7 Message authentication code
8 Elliptic curve cryptography
478
• Many examples of amateur cryptography I’ve taken from an old Fravia website: https://yurichev.com/mirrors/
amateur_crypto_examples_from_Fravia/.
• Dmitry Sklyarov’s book ”The art of protecting and breaking information” (2004, in Russian) has many examples of
amateur cryptography and misused cryptographical algorithms as well.
The example was compiled by GCC, so the first argument is passed in ECX.
If you don’t have Hex-Rays, or if you distrust to it, you can try to reverse this code manually. One method is to
represent the CPU registers as local C variables and replace each instruction by a one-line equivalent expression, like:
uint64_t f( uint64_t input )
{
uint64_t rax , rbx , rcx , rdx , r8;
9 https://0xec.blogspot.com/2016/04/reversing-petya-ransomware-with.html
10 Thisexample was also used by Murphy Berzish in his lecture about SAT and SMT: http://mirror.csclub.uwaterloo.ca/csclub/
mtrberzi-sat-smt-slides.pdf, http://mirror.csclub.uwaterloo.ca/csclub/mtrberzi-sat-smt.mp4
479
ecx=input ;
rdx =0 x5D7E0D1F2E0F1F84 ;
rax=rcx;
rax *= rdx;
rdx =0 x388D76AEE8CB1500 ;
rax= _lrotr (rax , rax &0 xF); // rotate right
rax ^= rdx;
rdx =0 xD2E9EE7E83C4285B ;
rax= _lrotl (rax , rax &0 xF); // rotate left
r8=rax+rdx;
rdx =0 x8888888888888889 ;
rax=r8;
rax *= rdx;
rdx=rdx > >5;
rax=rdx;
rcx=r8+rdx *4;
rax=rax < <6;
rcx=rcx -rax;
rax=r8
rax= _lrotl (rax , rcx &0 xFF); // rotate left
return rax;
};
If you are careful enough, this code can be compiled and will even work in the same way as the original.
Then, we are going to rewrite it gradually, keeping in mind all registers usage. Attention and focus is very important
here—any tiny typo may ruin all your work!
Here is the first step:
uint64_t f( uint64_t input )
{
uint64_t rax , rbx , rcx , rdx , r8;
ecx=input ;
rdx =0 x5D7E0D1F2E0F1F84 ;
rax=rcx;
rax *= rdx;
rdx =0 x388D76AEE8CB1500 ;
rax= _lrotr (rax , rax &0 xF); // rotate right
rax ^= rdx;
rdx =0 xD2E9EE7E83C4285B ;
rax= _lrotl (rax , rax &0 xF); // rotate left
r8=rax+rdx;
rdx =0 x8888888888888889 ;
rax=r8;
rax *= rdx;
// RDX here is a high part of multiplication result
rdx=rdx > >5;
// RDX here is division result !
rax=rdx;
rcx=r8+rdx *4;
rax=rax < <6;
rcx=rcx -rax;
rax=r8
rax= _lrotl (rax , rcx &0 xFF); // rotate left
480
return rax;
};
Next step:
uint64_t f( uint64_t input )
{
uint64_t rax , rbx , rcx , rdx , r8;
ecx=input ;
rdx =0 x5D7E0D1F2E0F1F84 ;
rax=rcx;
rax *= rdx;
rdx =0 x388D76AEE8CB1500 ;
rax= _lrotr (rax , rax &0 xF); // rotate right
rax ^= rdx;
rdx =0 xD2E9EE7E83C4285B ;
rax= _lrotl (rax , rax &0 xF); // rotate left
r8=rax+rdx;
rdx =0 x8888888888888889 ;
rax=r8;
rax *= rdx;
// RDX here is a high part of multiplication result
rdx=rdx > >5;
// RDX here is division result !
rax=rdx;
We can spot the division using multiplication. Indeed, let’s calculate the divider in Wolfram Mathematica:
We get this:
uint64_t f( uint64_t input )
{
uint64_t rax , rbx , rcx , rdx , r8;
ecx=input ;
rdx =0 x5D7E0D1F2E0F1F84 ;
rax=rcx;
rax *= rdx;
rdx =0 x388D76AEE8CB1500 ;
rax= _lrotr (rax , rax &0 xF); // rotate right
rax ^= rdx;
rdx =0 xD2E9EE7E83C4285B ;
rax= _lrotl (rax , rax &0 xF); // rotate left
r8=rax+rdx;
481
rax=rdx=r8 /60;
rax=input ;
rax *=0 x5D7E0D1F2E0F1F84 ;
rax= _lrotr (rax , rax &0 xF); // rotate right
rax ^=0 x388D76AEE8CB1500 ;
rax= _lrotl (rax , rax &0 xF); // rotate left
r8=rax +0 xD2E9EE7E83C4285B ;
By simple reducing, we finally see that it’s calculating the remainder, not the quotient:
uint64_t f( uint64_t input )
{
uint64_t rax , rbx , rcx , rdx , r8;
rax=input ;
rax *=0 x5D7E0D1F2E0F1F84 ;
rax= _lrotr (rax , rax &0 xF); // rotate right
rax ^=0 x388D76AEE8CB1500 ;
rax= _lrotl (rax , rax &0 xF); // rotate left
r8=rax +0 xD2E9EE7E83C4285B ;
# define C1 0 x5D7E0D1F2E0F1F84
# define C2 0 x388D76AEE8CB1500
# define C3 0 xD2E9EE7E83C4285B
482
v= _lrotr (v, v&0 xF); // rotate right
v^=C2;
v= _lrotl (v, v&0 xF); // rotate left
v+=C3;
v= _lrotl (v, v % 60); // rotate left
return v;
};
int main ()
{
printf ("% llu\n", hash (...) );
};
Since we are not cryptoanalysts we can’t find an easy way to generate the input value for some specific output value. The
rotate instruction’s coefficients look frightening—it’s a warranty that the function is not bijective, it is rather surjective,
it has collisions, or, speaking more simply, many inputs may be possible for one output.
Brute-force is not solution because values are 64-bit ones, that’s beyond reality.
483
... > python .exe 1. py
sat
[i1 = 3959740824832824396 ,
i3 = 8957124831728646493 ,
i5 = 10816636949158156260 ,
inp = 1364123924608584563 ,
outp = 10816636949158156260 ,
i4 = 14065440378185297801 ,
i2 = 4954926323707358301]
inp =0 x12EE577B63E80B73
outp =0 x961C69FF0AEFD7E4
“sat” mean “satisfiable”, i.e., the solver was able to find at least one solution. The solution is printed in the square
brackets. The last two lines are the input/output pair in hexadecimal form. Yes, indeed, if we run our function with
0x12EE577B63E80B73 as input, the algorithm will produce the value we were looking for.
But, as we noticed before, the function we work with is not bijective, so there may be other correct input values. The
Z3 is not capable of producing more than one result, but let’s hack our example slightly, by adding line 21, which implies
“look for any other results than this”:
1 #!/ usr/bin/env python
2
3 from z3 import *
4
5 C1 =0 x5D7E0D1F2E0F1F84
6 C2 =0 x388D76AEE8CB1500
7 C3 =0 xD2E9EE7E83C4285B
8
9 inp , i1 , i2 , i3 , i4 , i5 , i6 , outp = BitVecs ('inp i1 i2 i3 i4 i5 i6 outp ', 64)
10
11 s = Solver ()
12 s.add(i1 == inp*C1)
13 s.add(i2 == RotateRight (i1 , i1 & 0xF))
14 s.add(i3 ==i2 ^ C2)
15 s.add(i4 == RotateLeft (i3 , i3 & 0xF))
16 s.add(i5 ==i4 + C3)
17 s.add(outp == RotateLeft (i5 , URem(i5 , 60)))
18
19 s.add(outp ==10816636949158156260)
20
21 s.add(inp !=0 x12EE577B63E80B73 )
22
23 print s. check ()
24 m=s. model ()
25 print m
26 print (" inp =0x%X" % m[inp ]. as_long ())
27 print ("outp =0x%X" % m[outp ]. as_long ())
484
i2 = 4954926323707358301]
inp =0 x92EE577B63E80B73
outp =0 x961C69FF0AEFD7E4
This can be automated. Each found result can be added as a constraint and then the next result will be searched for.
Here is a slightly more sophisticated example:
1 #!/ usr/bin/env python
2
3 from z3 import *
4
5 C1 =0 x5D7E0D1F2E0F1F84
6 C2 =0 x388D76AEE8CB1500
7 C3 =0 xD2E9EE7E83C4285B
8
9 inp , i1 , i2 , i3 , i4 , i5 , i6 , outp = BitVecs ('inp i1 i2 i3 i4 i5 i6 outp ', 64)
10
11 s = Solver ()
12 s.add(i1 == inp*C1)
13 s.add(i2 == RotateRight (i1 , i1 & 0xF))
14 s.add(i3 ==i2 ^ C2)
15 s.add(i4 == RotateLeft (i3 , i3 & 0xF))
16 s.add(i5 ==i4 + C3)
17 s.add(outp == RotateLeft (i5 , URem(i5 , 60)))
18
19 s.add(outp ==10816636949158156260)
20
21 # copypasted from http :// stackoverflow .com/ questions /11867611/ z3py -checking -all -
solutions -for - equation
22 result =[]
23 while True:
24 if s. check () == sat:
25 m = s.model ()
26 print m[inp]
27 result . append (m)
28 # Create a new constraint the blocks the current model
29 block = []
30 for d in m:
31 # d is a declaration
32 if d.arity () > 0:
33 raise Z3Exception (" uninterpreted functions are not supported ")
34 # create a constant from declaration
35 c=d()
36 if is_array (c) or c.sort ().kind () == Z3_UNINTERPRETED_SORT :
37 raise Z3Exception (" arrays and uninterpreted sorts are not supported ")
38 block . append (c != m[d])
39 s.add(Or(block ))
40 else:
41 print " results total =",len( result )
42 break
We got:
1364123924608584563
1234567890
9223372038089343698
4611686019661955794
485
13835058056516731602
3096040143925676201
12319412180780452009
7707726162353064105
16931098199207839913
1906652839273745429
11130024876128521237
15741710894555909141
6518338857701133333
5975809943035972467
15199181979890748275
10587495961463360371
results total= 16
It is indeed so:
sat
[i1 = 14869545517796235860 ,
i3 = 8388171335828825253 ,
i5 = 6918262285561543945 ,
inp = 1370377541658871093 ,
outp = 14543180351754208565 ,
i4 = 10167065714588685486 ,
i2 = 5541032613289652645]
inp =0 x13048F1D12C00535
486
outp =0 xC9D3C17A12C00535
Let’s be more sadistic and add another constraint: last 16 bits must be 0x1234:
1 #!/ usr/bin/env python
2
3 from z3 import *
4
5 C1 =0 x5D7E0D1F2E0F1F84
6 C2 =0 x388D76AEE8CB1500
7 C3 =0 xD2E9EE7E83C4285B
8
9 inp , i1 , i2 , i3 , i4 , i5 , i6 , outp = BitVecs ('inp i1 i2 i3 i4 i5 i6 outp ', 64)
10
11 s = Solver ()
12 s.add(i1 == inp*C1)
13 s.add(i2 == RotateRight (i1 , i1 & 0xF))
14 s.add(i3 ==i2 ^ C2)
15 s.add(i4 == RotateLeft (i3 , i3 & 0xF))
16 s.add(i5 ==i4 + C3)
17 s.add(outp == RotateLeft (i5 , URem(i5 , 60)))
18
19 s.add(outp & 0 xFFFFFFFF == inp & 0 xFFFFFFFF )
20 s.add(outp & 0 xFFFF == 0 x1234 )
21
22 print s. check ()
23 m=s. model ()
24 print m
25 print (" inp =0x%X" % m[inp ]. as_long ())
26 print ("outp =0x%X" % m[outp ]. as_long ())
sat
[i1 = 2834222860503985872 ,
i3 = 2294680776671411152 ,
i5 = 17492621421353821227 ,
inp = 461881484695179828 ,
outp = 419247225543463476 ,
i4 = 2294680776671411152 ,
i2 = 2834222860503985872]
inp =0 x668EEC35F961234
outp =0 x5D177215F961234
Z3 works very fast and it implies that the algorithm is weak, it is not cryptographic at all (like the most of the amateur
cryptography).
487
obj = AES.new('This is a key123 ', AES.MODE_CBC , 'This is an IV456 ')
message = "Hello , world !!!!" # message 's size must be multiple of 16
# encrypt it back:
The author saw this in shareware checking license keys, etc, when a key is encrypted (yes) to get information from
it. Perhaps, their key generator decrypted data when putting it to key file. Hopefully, they swapped functions just by
mistake, but it worked, so they left it all as is.
488
Chapter 20
First-Order Logic
For exists/forall/forall:
( assert
( exists ((x Bool)) ( forall ((y Bool)) ( forall ((z Bool))
(and
(or x y)
(or (not x) z)
(or y (not z))
)))
)
)
(check -sat)
489
unsat
unsat
unsat
sat
unsat
unsat
sat
sat
For (a):
( assert
( forall ((x Bool) (y Bool) (z Bool))
(=
(or (xor x y) z)
(xor (or x z) (or y z))
)
)
)
(check -sat)
For (b):
( assert
( forall ((x Bool) (y Bool) (z Bool) (w Bool))
(=
(or (xor w x y) z)
(xor (or w z) (or x z) (or y z))
)
)
)
(check -sat)
For (c):
( assert
( forall ((x Bool) (y Bool) (z Bool))
(=
(or (xor x y) (xor y z))
(or (xor x z) (xor y z))
)
)
)
(check -sat)
Results:
490
% z3 -smt2 Knuth_a .smt
unsat
% z3 -smt2 Knuth_b .smt
sat
% z3 -smt2 Knuth_c .smt
sat
491
492
Chapter 21
Cellular automata
if center == true:
return popcnt2 ( neighbours ) || popcnt3 ( neighbours )
if center == false
return popcnt3 ( neighbours )
result =( center == true && ( popcnt2 ( neighbours ) || popcnt3 ( neighbours ))) || ( center == false
&& popcnt3 ( neighbours ))
…where “center” is state of central cell, “neighbours” are 8 neighbouring cells, popcnt2 is a function which returns
True if it has exactly 2 bits on input, popcnt3 is the same, but for 3 bits (just like these were used in my “Minesweeper”
example (3.8.2)).
Using Wolfram Mathematica, I first create all helper functions and truth table for the function, which returns true, if
a cell must be present in the next state, or false if not:
In [4]:= newcell [ center_Integer , neighbours_Integer ]:=( center ==1 && ( popcount2 [ neighbours
]|| popcount3 [ neighbours ]))||
( center ==0 && popcount3 [ neighbours ])
493
Out [13]= {{0,0,0 ,0 ,0 ,0 ,0 ,0 ,0} - >0 ,
{1,0,0,0,0,0,0,0,0}->0,
{0,0,0,0,0,0,0,0,1}->0,
{1,0,0,0,0,0,0,0,1}->0,
{0,0,0,0,0,0,0,1,0}->0,
{1,0,0,0,0,0,0,1,0}->0,
{0,0,0,0,0,0,0,1,1}->0,
{1,0,0,0,0,0,0,1,1}->1,
...
...
Also, we need a second function, inverted one, which will return true if the cell must be absent in the next state, or
false otherwise:
...
...
Using the very same way as in my “Minesweeper” example, I can convert CNF expression to list of clauses:
494
s=s. replace ("e", a[4]). replace ("f", a[5]). replace ("g", a[6]). replace ("h", a[7])
s=s. replace ("!" , " -"). replace ("||" , " "). replace ("(" , ""). replace (")", "")
s=s.split ("&&")
return s
And again, as in “Minesweeper”, there is an invisible border, to make processing simpler. SAT variables are also
numbered as in previous example:
1 2 3 4 5 6 7 8 9 10 11
12 13 14 15 16 17 18 19 20 21 22
23 24 25 26 27 28 29 30 31 32 33
34 35 36 37 38 39 40 41 42 43 44
...
100 101 102 103 104 105 106 107 108 109 110
111 112 113 114 115 116 117 118 119 120 121
Also, there is a visible border, always fixed to False, to make things simpler.
Now the working source code. Whenever we encounter “*” in final_state[], we add clauses generated by cell_is_true()
function, or cell_is_false() if otherwise. When we get a solution, it is negated and added to the list of clauses, so when
minisat is executed next time, it will skip solution which was already printed.
...
495
"(a||b||!c||!d||e||f||!g||h)&&(a||b||!c||!d||e||f||g||!h)&&(a||b||!c||d||!e||!f||g
||h)&&" \
"(a||b||!c||d||!e||f||!g||h)&&(a||b||!c||d||!e||f||g||!h)&&(a||b||!c||d||e||!f||!g
||h)&&" \
"(a||b||!c||d||e||!f||g||!h)&&(a||b||!c||d||e||f||!g||!h)&&(a||b||c||!d||!e||!f||g
||h)&&" \
"(a||b||c||!d||!e||f||!g||h)&&(a||b||c||!d||!e||f||g||!h)&&(a||b||c||!d||e||!f||!g
||h)&&" \
"(a||b||c||!d||e||!f||g||!h)&&(a||b||c||!d||e||f||!g||!h)&&(a||b||c||d||!e||!f||!g
||h)&&" \
"(a||b||c||d||!e||!f||g||!h)&&(a||b||c||d||!e||f||!g||!h)&&(a||b||c||d||e||!f||!g
||!h)&&" \
"(!b||!c||! center ||d||e||f||g||h)&&(!b||c||! center ||!d||e||f||g||h)&&(!b||c||!
center ||d||!e||f||g||h)&&" \
"(!b||c||! center ||d||e||!f||g||h)&&(!b||c||! center ||d||e||f||!g||h)&&(!b||c||!
center ||d||e||f||g||!h)&&" \
"(b||!c||! center ||!d||e||f||g||h)&&(b||!c||! center ||d||!e||f||g||h)&&(b||!c||!
center ||d||e||!f||g||h)&&" \
"(b||!c||! center ||d||e||f||!g||h)&&(b||!c||! center ||d||e||f||g||!h)&&(b||c||!
center ||!d||!e||f||g||h)&&" \
"(b||c||! center ||!d||e||!f||g||h)&&(b||c||! center ||!d||e||f||!g||h)&&(b||c||!
center ||!d||e||f||g||!h)&&" \
"(b||c||! center ||d||!e||!f||g||h)&&(b||c||! center ||d||!e||f||!g||h)&&(b||c||!
center ||d||!e||f||g||!h)&&" \
"(b||c||! center ||d||e||!f||!g||h)&&(b||c||! center ||d||e||!f||g||!h)&&(b||c||!
center ||d||e||f||!g||!h)"
496
\
"(a||c|| center ||d||e||g||h)&&(a||c|| center ||d||f||g||h)&&(a||c|| center ||e||f||g||h
)&&" \
"(a||c||d||e||f||g||h)&&(a|| center ||d||e||f||g||h)&&(!b||!c||!d||!e)&&(!b||!c||!d
||!f)&&" \
"(!b||!c||!d||!g)&&(!b||!c||!d||!h)&&(!b||!c||!e||!f)&&(!b||!c||!e||!g)&&(!b||!c
||!e||!h)&&" \
"(!b||!c||!f||!g)&&(!b||!c||!f||!h)&&(!b||!c||!g||!h)&&(!b||!d||!e||!f)&&(!b||!d
||!e||!g)&&" \
"(!b||!d||!e||!h)&&(!b||!d||!f||!g)&&(!b||!d||!f||!h)&&(!b||!d||!g||!h)&&(!b||!e
||!f||!g)&&" \
"(!b||!e||!f||!h)&&(!b||!e||!g||!h)&&(!b||!f||!g||!h)&&(b||c|| center ||d||e||f||g)
&&" \
"(b||c|| center ||d||e||f||h)&&(b||c|| center ||d||e||g||h)&&(b||c|| center ||d||f||g||h
)&&" \
"(b||c|| center ||e||f||g||h)&&(b||c||d||e||f||g||h)&&(b|| center ||d||e||f||g||h)&&"
\
"(!c||!d||!e||!f)&&(!c||!d||!e||!g)&&(!c||!d||!e||!h)&&(!c||!d||!f||!g)&&(!c||!d
||!f||!h)&&" \
"(!c||!d||!g||!h)&&(!c||!e||!f||!g)&&(!c||!e||!f||!h)&&(!c||!e||!g||!h)&&(!c||!f
||!g||!h)&&" \
"(c|| center ||d||e||f||g||h)&&(!d||!e||!f||!g)&&(!d||!e||!f||!h)&&(!d||!e||!g||!h)
&&(!d||!f||!g||!h)&&" \
"(!e||!f||!g||!h)"
...
( https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/CA/GoL/GoL_SAT_utils.py )
#!/ usr/bin/ python3
import os
from GoL_SAT_utils import *
final_state =[
" * ",
"* *",
" * "]
VARS_TOTAL =W*H+1
VAR_FALSE =str( VARS_TOTAL )
497
r, c, H, W))
print_grid (grid)
write_RLE (grid)
return grid
clauses =[]
# always false :
clauses . append ("-"+ VAR_FALSE )
while True:
solution = try_again ( clauses )
clauses . append ( negate_clause ( grid_to_clause (solution , H, W)))
print ("")
( https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/CA/GoL/reverse1.py )
Here is the result:
HEIGHT = 3 WIDTH= 3
2525 clauses
.*.
*.*
.*.
1. rle written
2526 clauses
.**
*..
*.*
2. rle written
2527 clauses
**.
..*
498
*.*
3. rle written
2528 clauses
*.*
*..
.**
4. rle written
2529 clauses
*.*
..*
**.
5. rle written
2530 clauses
*.*
.*.
*.*
6. rle written
2531 clauses
unsat!
The first result is the same as initial state. Indeed: this is “still life”, i.e., state which will never change, and it is
correct solution. The last solution is also valid.
Now the problem: 2nd, 3rd, 4th and 5th solutions are equivalent to each other, they just mirrored or rotated. In fact,
this is reflectional1 (like in mirror) and rotational2 symmetries. We can solve this easily: we will take each solution, reflect
and rotate it and add them negated to the list of clauses, so minisat will skip them during its work:
...
while True:
solution = try_again ( clauses )
clauses . append ( negate_clause ( grid_to_clause (solution , H, W)))
clauses . append ( negate_clause ( grid_to_clause ( reflect_vertically ( solution ), H, W)))
clauses . append ( negate_clause ( grid_to_clause ( reflect_horizontally ( solution ), H, W)))
# is this square ?
if W==H:
clauses . append ( negate_clause ( grid_to_clause ( rotate_square_array (solution ,1) , H,
W)))
clauses . append ( negate_clause ( grid_to_clause ( rotate_square_array (solution ,2) , H,
W)))
clauses . append ( negate_clause ( grid_to_clause ( rotate_square_array (solution ,3) , H,
W)))
print ""
...
( https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/CA/GoL/reverse2.py )
Functions reflect_vertically(), reflect_horizontally and rotate_squarearray() are simple array manipula-
tion routines.
Now we get just 3 solutions:
1 https://en.wikipedia.org/wiki/Reflection_symmetry
2 https://en.wikipedia.org/wiki/Rotational_symmetry
499
HEIGHT = 3 WIDTH= 3
2525 clauses
.*.
*.*
.*.
1. rle written
2531 clauses
.**
*..
*.*
2. rle written
2537 clauses
*.*
.*.
*.*
3. rle written
2543 clauses
unsat!
final_state =[
" * ",
" * ",
" * "]
_PRE_END
_PRE_BEGIN
HEIGHT = 3 WIDTH= 3
2503 clauses
...
***
...
1. rle written
2509 clauses
unsat!
final_state =[
" * ",
" ",
" ** ",
" * ",
" * ",
" *** "]
HEIGHT = 6 WIDTH= 5
500
5217 clauses
.*.*.
..*..
.**.*
..*..
..*.*
.**..
1. rle written
5220 clauses
.*.*.
..*..
.**.*
..*..
*.*.*
.**..
2. rle written
5223 clauses
..*.*
..**.
.**..
....*
*.*.*
.**..
3. rle written
5226 clauses
..*.*
..**.
.**..
*...*
..*.*
.**..
4. rle written
...
final_state =[
" ",
" * * ",
" * * ",
" ******* ",
" ** *** ** ",
" *********** ",
" * ******* * ",
" * * * * ",
" ** ** ",
" "]
HEIGHT = 10 WIDTH = 13
16469 clauses
..*.*.**.....
501
.....*****...
....**..*....
......*...*..
..**...*.*...
.*..*.*.**..*
*....*....*.*
..*.*..*.....
..*.....*.*..
....**..*.*..
1. rle written
16472 clauses
*.*.*.**.....
.....*****...
....**..*....
......*...*..
..**...*.*...
.*..*.*.**..*
*....*....*.*
..*.*..*.....
..*.....*.*..
....**..*.*..
2. rle written
16475 clauses
..*.*.**.....
*....*****...
....**..*....
......*...*..
..**...*.*...
.*..*.*.**..*
*....*....*.*
..*.*..*.....
..*.....*.*..
....**..*.*..
3. rle written
...
I don’t know how many possible states can lead to “space invader”, perhaps, too many. Had to stop it. And it slows
down during execution, because number of clauses is increasing (because of negating solutions addition).
All solutions are also exported to RLE files, which can be opened by Golly3 .
In [17]:= stillife = Flatten [ Table [Join [{ center }, PadLeft [ IntegerDigits [ neighbours ,2] ,8]] - >
Boole[Boole[ newcell [center , neighbours ]]== center ],{ neighbours ,0 ,255} ,{ center ,0 ,1}]]
Out [17]= {{0,0,0 ,0 ,0 ,0 ,0 ,0 ,0} - >1 ,
{1,0,0,0,0,0,0,0,0}->0,
{0,0,0,0,0,0,0,0,1}->1,
{1,0,0,0,0,0,0,0,1}->0,
3 http://golly.sourceforge.net/
502
...
...
import os
from GoL_SAT_utils import *
import SL_common
W=3 # WIDTH
H=3 # HEIGHT
VARS_TOTAL =W*H+1
VAR_FALSE =str( VARS_TOTAL )
503
return grid
clauses =[]
# always false :
clauses . append ("-"+ VAR_FALSE )
while True:
solution = try_again ( clauses )
clauses . append ( negate_clause ( grid_to_clause (solution , H, W)))
clauses . append ( negate_clause ( grid_to_clause ( my_utils . reflect_vertically ( solution ), H
, W)))
clauses . append ( negate_clause ( grid_to_clause ( my_utils . reflect_horizontally ( solution ),
H, W)))
# is this square ?
if W==H:
clauses . append ( negate_clause ( grid_to_clause ( my_utils . rotate_rect_array (solution
,1) , H, W)))
clauses . append ( negate_clause ( grid_to_clause ( my_utils . rotate_rect_array (solution
,2) , H, W)))
clauses . append ( negate_clause ( grid_to_clause ( my_utils . rotate_rect_array (solution
,3) , H, W)))
print ("")
( https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/CA/GoL/SL1.py )
What we’ve got for 2 · 2?
1881 clauses
..
..
1. rle written
1887 clauses
**
**
2. rle written
1893 clauses
unsat!
Both solutions are correct: empty square will progress into empty square (no cells are born). 2 · 2 box is also known
“still life”.
What about 3 · 3 square?
2887 clauses
...
...
...
1. rle written
2893 clauses
.**
.**
...
2. rle written
504
2899 clauses
.**
*.*
**.
3. rle written
2905 clauses
.*.
*.*
**.
4. rle written
2911 clauses
.*.
*.*
.*.
5. rle written
2917 clauses
unsat!
Here is a problem: we see familiar 2 · 2 box, but shifted. This is indeed correct solution, but we don’t interested in it,
because it has been already seen.
What we can do is add another condition. We can force minisat to find solutions with no empty rows and columns.
This is easy. These are SAT variables for 5 · 5 square:
1 2 3 4 5
6 7 8 9 10
11 12 13 14 15
16 17 18 19 20
21 22 23 24 25
1 OR 2 OR 3 OR 4 OR 5
6 OR 7 OR 8 OR 9 OR 10
...
That means that each row must have at least one True value somewhere. We can also do this for each column as well.
...
...
( https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/CA/GoL/SL2.py )
Now we can see that 3 · 3 square has 3 possible “still lives”:
505
2893 clauses
.*.
*.*
**.
1. rle written
2899 clauses
.*.
*.*
.*.
2. rle written
2905 clauses
.**
*.*
**.
3. rle written
2911 clauses
unsat!
4 · 4 has 7:
4169 clauses
..**
...*
***.
*...
1. rle written
4175 clauses
..**
..*.
*.*.
**..
2. rle written
4181 clauses
..**
.*.*
*.*.
**..
3. rle written
4187 clauses
..*.
.*.*
*.*.
**..
4. rle written
4193 clauses
.**.
*..*
*.*.
.*..
506
5. rle written
4199 clauses
..*.
.*.*
*.*.
.*..
6. rle written
4205 clauses
.**.
*..*
*..*
.**.
7. rle written
4211 clauses
unsat!
When I try large squares, like 20 · 20, funny things happen. First of all, minisat finds solutions not very pleasing
aesthetically, but still correct, like:
61033 clauses
....**.**.**.**.**.*
**..*.**.**.**.**.**
*...................
.*..................
**..................
*...................
.*..................
**..................
*...................
.*..................
**..................
*...................
.*..................
**..................
*...................
.*..................
..*.................
...*................
***.................
*...................
1. rle written
...
Indeed: all rows and columns has at least one True value.
Then minisat begins to add smaller “still lives” into the whole picture:
61285 clauses
.**....**...**...**.
.**...*..*.*.*...*..
.......**...*......*
..................**
...**............*..
507
...*.*...........*..
....*.*........**...
**...*.*...**..*....
*.*...*....*....*...
.*..........****.*..
................*...
..*...**..******....
.*.*..*..*..........
*..*...*.*..****....
***.***..*.*....*...
....*..***.**..**...
**.*..*.............
.*.**.**..........**
*..*..*..*......*..*
**..**..**......**..
43. rle written
In other words, result is a square consisting of smaller “still lives”. It then altering these parts slightly, shifting back
and forth. Is it cheating? Anyway, it does it in a strict accordance to rules we defined.
But we want denser picture. We can add a rule: in all 5-cell chunks there must be at least one True cell. To achieve
this, we just split the whole square by 5-cell chunks and add clause for each:
...
...
( https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/CA/GoL/SL3.py )
This is indeed denser:
61113 clauses
..**.**......*.*.*..
...*.*.....***.**.*.
...*..*...*.......*.
....*.*..*.*......**
...**.*.*..*...**.*.
..*...*.***.....*.*.
...*.*.*......*..*..
****.*..*....*.**...
*....**.*....*.*....
...**..*...**..*....
..*..*....*....*.**.
.*.*.**....****.*..*
..*.*....*.*..*..**.
....*.****..*..*.*..
508
....**....*.*.**..*.
*.**...****.*..*.**.
**...**.....**.*....
...**..*..**..*.**.*
***.*.*..*.*..*.*.**
*....*....*....*....
1. rle written
61119 clauses
..**.**......*.*.*..
...*.*.....***.**.*.
...*..*...*.......*.
....*.*..*.*......**
...**.*.*..*...**.*.
..*...*.***.....*.*.
...*.*.*......*..*..
****.*..*....*.**...
*....**.*....*.*....
...**..*...**..*....
..*..*....*....*.**.
.*.*.**....****.*..*
..*.*....*.*..*..**.
....*.****..*..*.*..
....**....*.*.**..*.
*.**...****.*..*.**.
**...**.....**.*....
...**..*.***..*.**.*
***.*..*.*..*.*.*.**
*.......*..**.**....
2. rle written
...
Let’s try more dense, one mandatory true cell per each 4-cell chunk:
61133 clauses
.**.**...*....**..**
*.*.*...*.*..*..*..*
*....*...*.*..*.**..
.***.*.....*.**.*...
..*.*.....**...*..*.
*......**..*...*.**.
**.....*...*.**.*...
...**...*...**..*...
**.*..*.*......*...*
.*...**.**..***.****
.*....*.*..*..*.*...
**.***...*.**...*.**
.*.*..****.....*..*.
*....*.....**..**.*.
*.***.*..**.*.....**
.*...*..*......**...
...*.*.**......*.***
..**.*.....**......*
*..*.*.**..*.*..***.
**....*.*...*...*...
1. rle written
509
61139 clauses
.**.**...*....**..**
*.*.*...*.*..*..*..*
*....*...*.*..*.**..
.***.*.....*.**.*...
..*.*.....**...*..*.
*......**..*...*.**.
**.....*...*.**.*...
...**...*...**..*...
**.*..*.*......*...*
.*...**.**..***.****
.*....*.*..*..*.*...
**.***...*.**...*.**
.*.*..****.....*..*.
*....*.....**..**.*.
*.***.*..**.*.....**
.*...*..*......**..*
...*.*.**......*.**.
..**.*.....**....*..
*..*.*.**..*.*...*.*
**....*.*...*.....**
2. rle written
...
61166 clauses
**.*..**...**.**....
*.**..*.*...*.*.*.**
....**..*...*...*.*.
.**..*.*.**.*.*.*.*.
..**.*.*...*.**.*.**
*...*.*.**.*....*.*.
**.*..*...*.*.***..*
.*.*.*.***..**...**.
.*.*.*.*..**...*.*..
**.**.*..*...**.*..*
..*...*.**.**.*.*.**
..*.**.*..*.*.*.*...
**.*.*...*..*.*.*...
.*.*...*.**..*..***.
.*..****.*....**...*
..*.*...*..*...*..*.
.**...*.*.**...*.*..
..*..**.*.*...**.**.
..*.*..*..*..*..*..*
.**.**....**..**..**
1. rle written
61172 clauses
**.*..**...**.**....
*.**..*.*...*.*.*.**
....**..*...*...*.*.
.**..*.*.**.*.*.*.*.
..**.*.*...*.**.*.**
510
*...*.*.**.*....*.*.
**.*..*...*.*.***..*
.*.*.*.***..**...**.
.*.*.*.*..**...*.*..
**.**.*..*...**.*..*
..*...*.**.**.*.*.**
..*.**.*..*.*.*.*...
**.*.*...*..*.*.*...
.*.*...*.**..*..***.
.*..****.*....**...*
..*.*...*..*...*..*.
.**..**.*.**...*.*..
*..*.*..*.*...**.**.
*..*.*.*..*..*..*..*
.**...*...**..**..**
2. rle written
...
This is most dense. Unfortunaly, it’s impossible to construct “still life” with one mandatory true cell per each 2-cell
chunk.
WIDTH =15
rules =[]
for i in range (8):
if (( RULE >>i)&1) ==1:
rules . append (True)
else:
rules . append ( False )
511
def f(a, b, c):
return If(And(a== True , b== True , c== True), rules [7] ,
If(And(a== True , b== True , c== False ), rules [6] ,
If(And(a== True , b== False , c== True), rules [5] ,
If(And(a== True , b== False , c== False ), rules [4] ,
If(And(a== False , b==True , c== True), rules [3] ,
If(And(a== False , b==True , c== False ), rules [2] ,
If(And(a== False , b== False , c== True), rules [1] ,
If(And(a== False , b== False , c== False ), rules [0] , False ))))))))
S=[[ Bool("%d_%d" % (s, i)) for i in range ( WIDTH )] for s in range ( STATES )]
s= Solver ()
if WRAPPED == False :
for st in range ( STATES ):
s.add(S[st ][0]== False )
s.add(S[st][ WIDTH -1]== False )
if WRAPPED == False :
for st in range (1, STATES ):
for i in range (1, WIDTH -1):
s.add(S[st ][i] == f(S[st -1][i -1] , S[st -1][i], S[st -1][i+1]))
else:
for st in range (1, STATES ):
for i in range ( WIDTH ):
s.add(S[st ][i] == f(S[st -1][(i -1) % WIDTH ], S[st -1][i], S[st -1][( i+1) %
WIDTH ]))
512
for i in range (1,WIDTH -1):
if SHIFTED ==0:
s.add(S[0][i]==S[STATES -1][i])
if SHIFTED ==1:
s.add(S[0][i]==S[STATES -1][i -1])
if SHIFTED ==2:
s.add(S[0][i]==S[STATES -1][i+1])
else:
for i in range (WIDTH ):
if SHIFTED ==0:
s.add(S[0][i]==S[STATES -1][i % WIDTH ])
if SHIFTED ==1:
s.add(S[0][i]==S[STATES -1][(i -1) % WIDTH ])
if SHIFTED ==2:
s.add(S[0][i]==S[STATES -1][( i+1) % WIDTH ])
if s. check () == unsat :
return
# print " unsat "
#exit (0)
m=s. model ()
print "RULE =%d STATES =%d, WRAPPED =%s, SHIFTED =%d" % (RULE , STATES , str( WRAPPED ),
SHIFTED )
for st in range ( STATES ):
t=""
for i in range (WIDTH ):
if str(m[S[st ][i]]) =="False ":
t=t+"."
else:
t=t+"*"
print t
513
RULE =30 STATES =4, WRAPPED =True , SHIFTED =1
**..***..***..*
.**.*.**.*.**.*
****.****.****.
*..***..***..**
514
...**...**...**
515
**...**...**...
**..***..***..*
.*.**.*.**.*.**
516
*....*....*....
**..***..***..*
*.**.*.**.*.**.
*....*....*....
517
*...**.****...*
**.*.**...**.*.
.****.**.*.****
*...**.****...*
518
RULE =134 STATES =4, WRAPPED =True , SHIFTED =1
...*....*....*.
**...**...**...
.*.*..*.*..*.*.
..*....*....*..
519
RULE =167 STATES =7, WRAPPED =True , SHIFTED =1
*.*..*.*..*.*..
***..***..***..
.**...**...**..
..*.*..*.*..*.*
..***..***..***
...**...**...**
.*..*.*..*.*..*
520
RULE =195 STATES =6, WRAPPED =True , SHIFTED =0
*..*.*....***.*
*.*....***.**..
....***.**..*.*
.***.**..*.*...
*.**..*.*....**
*..*.*....***.*
SHIFTED=0 means oscillator, SHIFTED=1 means glider slipping left, SHIFTED=2 — slipping right.
521
522
Chapter 22
Everything else
In combinatorial mathematics , the ménage problem or problème des ménages [1] asks for the
number of different ways in which it is possible to seat a set of male - female
couples at a dining table so that men and women alternate and nobody sits next to
his or her partner . This problem was formulated in 1891 by Édouard Lucas and
independently , a few years earlier , by Peter Guthrie Tait in connection with knot
theory .[2] For a number of couples equal to 3, 4, 5, ... the number of seating
arrangements is
12, 96, 3120 , 115200 , 5836320 , 382072320 , 31488549120 , ... ( sequence A059375 in the
OEIS).
( Wikipedia. )
We can count it using Z3, but also get actual men/women allocations:
from z3 import *
COUPLES =3
# m m m
# w w w
# i.e., women [0] is placed between men [0] and men [1]
# the last women [COUPLES -1] is between men[COUPLES -1] and men [0] ( wrapping )
s= Solver ()
s.add( Distinct (men))
s.add( Distinct ( women ))
# a pair , each woman belong to , cannot be the same as men 's located at left and right .
# "% COUPLES " is wrapping , so that the last woman is between the last man and the first
man.
523
for i in range ( COUPLES ):
s.add(And(women [i]!= men[i], women [i]!= men [(i+1) % COUPLES ]))
results =[]
( https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/other/menage/menage.py )
For 3 couples:
men 0 2 1
women 1 0 2
men 1 2 0
women 0 1 2
men 0 1 2
women 2 0 1
men 2 1 0
women 0 2 1
men 2 0 1
women 1 2 0
men 1 0 2
women 2 1 0
results total= 6
however , according to https :// oeis.org/ A059375 : 12
524
We are getting “half” of results because men and women can be then swapped (their sex swapped (or reassigned)) and
you’ve got another 6 results. 6+6=12 in total. This is kind of symmetry.
For 4 couples:
...
men 3 0 2 1
women 1 3 0 2
men 3 0 1 2
women 2 3 0 1
men 1 0 2 3
women 3 1 0 2
men 2 0 1 3
women 3 2 0 1
results total= 48
however , according to https :// oeis.org/ A059375 : 96
For 5 couples:
...
men 0 4 1 2 3
women 1 3 0 4 2
men 0 3 1 2 4
women 1 4 0 3 2
men 0 3 1 2 4
women 1 0 4 3 2
men 4 3 1 0 2
women 0 2 4 1 3
In []:= g = Graph [{7 -> 1, 7 -> 0, 5 -> 1, 3 -> 0, 3 -> 4, 1 -> 2, 1 -> 6,
1 -> 4, 0 -> 6}, VertexLabels -> "Name "]
525
Figure 22.1
Each arrow shows that an item is needed by an item arrow pointing to, i.e., if “a -> b”, then item “a” must be first
processed, because “b” needs it, or “b” depends on “a”.
How Mathematica would “sort” the dependency graph?
7 1
7 0
5 1
3 0
3 4
1 2
1 6
1 4
0 6
% tsort tst
3
5
7
0
1
4
6
2
Now I’ll use Z3 SMT-solver for topological sort, which is overkill, but quite spectacular: all we need to do is to add
constraint for each edge (or “connection”) in graph, if “a -> b”, then “a” must be less then “b”, where each variable
reflects ordering.
from MK85 import *
526
TOTAL =8
s=MK85 ()
print s. check ()
m=s. model ()
print order_to_print
True
[5, 7, 1, 3, 0, 4, 6, 2]
527
from z3 import *
s= Optimize ()
libA=Int('libA ')
# libA 's version is 1..5 or 999 ( which means library will not be installed ):
s.add(Or(And(libA >=1 , libA <=5) ,libA ==999) )
libB=Int('libB ')
# libB 's version is 1, 4, 5 or 999:
s.add(Or(libB ==1 , libB ==4 , libB ==5 , libB ==999) )
libC=Int('libC ')
# libC 's version is 10, 11, 14 or 999:
s.add(Or(libC ==10 , libC ==11 , libC ==14 , libC ==999) )
libD=Int('libD ')
# libD 's version is 1..10
s.add(Or(And(libD >=1 , libD <=10) ,libD ==999) )
print s. check ()
print s. model ()
528
( The source code: https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/other/dep/dependency.
py )
The output:
sat
[libB = 5,
libD = 999 ,
libC = 10,
programB = 7,
programA = 1,
libA = 2]
999 means that there is no need to install libD, it’s not required by other packages.
Change version of ProgramB to v8 and it will says “unsat”, meaning, there is a conflict: ProgramA requires libA v2,
but ProgramB v8 eventually requires newer libA.
Still, there is a work to do: “unsat” message is somewhat useless to end user, some information about conflicting items
should be printed.
Here is my another optimization problem example: 14.1.
More about using SAT/SMT solvers in package managers: https://research.swtch.com/version-sat, https:
//cseweb.ucsd.edu/~lerner/papers/opium.pdf.
Now in the opposite direction: forcing aptitude package manager to solve Sudoku:
http://web.archive.org/web/20160326062818/http://algebraicthunk.net/~dburrows/blog/entry/package-management-s
Some readers may ask, how to order libraries/programs/packages to be installed? This is simpler problem, which is
often solved by topological sorting. The algorithm reorders graph in such a way so that vertices not depended on anything
will be on the top of queue. Next, there will be vertices dependend on vertices from the previous layer. And so on.
make UNIX utility does this while constructing order of items to be processed. Even more: older make utilities
offloaded the job to the external utility (tsort). Some older UNIX has it, at least some versions of NetBSD 1 .
from z3 import *
import pprint , math
SIZE =8
# closed = False
closed =True
# find King 's tour instead of Knight 's. just for demonstration
# king_tour =True
king_tour = False
"""
knight 's movements :
. x . x . . . .
x . . . x . . .
1 http://netbsd.gw.com/cgi-bin/man-cgi/man?tsort+1+NetBSD-current
529
. . o . . . . .
x . . . x . . .
. x . x . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
"""
G={}
if king_tour :
# King 's tour
for r in range (SIZE):
for c in range (SIZE):
_from = coord_to_idx (r, c)
_to =[]
_to. append ( coord_to_idx (r-1, c -1))
_to. append ( coord_to_idx (r-1, c+0))
_to. append ( coord_to_idx (r-1, c+1))
_to. append ( coord_to_idx (r-0, c -1))
_to. append ( coord_to_idx (r-0, c+1))
_to. append ( coord_to_idx (r+1, c -1))
_to. append ( coord_to_idx (r+1, c+0))
_to. append ( coord_to_idx (r+1, c+1))
# remove "None" elements ( moves beyond physical board ):
_to= filter ( lambda x: x!= None , _to)
G[_from ]= _to
else:
# Knight 's tour
for r in range (SIZE):
for c in range (SIZE):
_from = coord_to_idx (r, c)
_to =[]
_to. append ( coord_to_idx (r-2, c -1))
_to. append ( coord_to_idx (r-2, c+1))
_to. append ( coord_to_idx (r-1, c -2))
_to. append ( coord_to_idx (r-1, c+2))
_to. append ( coord_to_idx (r+1, c -2))
_to. append ( coord_to_idx (r+1, c+2))
_to. append ( coord_to_idx (r+2, c -1))
_to. append ( coord_to_idx (r+2, c+1))
# remove "None" elements ( moves beyond physical board ):
_to= filter ( lambda x: x!= None , _to)
G[_from ]= _to
s= Solver ()
L=len(G)
# we use one -hot (or unitary ) variables , thus we eliminate the need of using adding +
remainder
# as in https :// github .com/ Z3Prover /z3/blob/ master / examples / python / hamiltonian /
hamiltonian .py
V=[ BitVec ('V_%d' % i, L) for i in range (L)]
530
# on closed tour , we may omit this constraint , SAT/SMT solver got to know this is one -
hot/ unitary variable !
if closed == False :
# without : faster on closed tours
for v in range (L):
or_list =[]
for i in range (L):
or_list . append (V[v ]==2** i)
s.add(Or (* or_list ))
# first cell:
s.add(V [0]== BitVecVal (1, L))
54 If( sel54 == 2,
RotateLeft (V_60 , 1) ,
If( sel54 == 1,
RotateLeft (V_44 , 1) ,
If( sel54 == 0,
RotateLeft (V_39 , 1),
RotateLeft (V_37 , 1))))
531
exit (0)
m=s. model ()
# print m
print ""
for r in range (SIZE):
for c in range (SIZE):
t= coord_to_idx (r, c)
print ("%2d" % int(math.log(m[V[t]]. as_long () , 2))),
print ""
Can find a closed knight’s tour on 8*8 chess board for 150s on Intel Quad-Core Xeon E3-1220 3.10GHz:
0 57 44 41 2 39 12 29
43 46 1 58 11 30 23 38
56 63 42 45 40 3 28 13
47 8 59 10 31 24 37 22
60 55 62 51 4 27 14 25
7 48 9 32 17 34 21 36
54 61 50 5 52 19 26 15
49 6 53 18 33 16 35 20
The Internet infrastructure company Akamai, cofounded by Tom Leighton, also uses a variation of the
Mating Ritual to assign web traffic to its servers.
In the early days, Akamai used other combinatorial optimization algorithms that got to be too slow
as the number of servers (over 65,000 in 2010) and requests (over 800 billion per day) increased. Akamai
switched to a Ritual-like approach, since a Ritual is fast and can be run in a distributed manner. In
this case, web requests correspond to women and web servers correspond to men. The web requests
have preferences based on latency and packet loss, and the web servers have preferences based on cost of
bandwidth and co-location.
( Eric Lehman, F Thomson Leighton, Albert R Meyer - Mathematics for Computer Science )
My solution is much less efficient, because much simpler/better algorithm exists (Gale/Shapley algorithm), but I did
it to demonstrate the essence of the problem plus as a yet another SMT-solvers and Z3 demonstration.
See comments:
#!/ usr/bin/env python
from z3 import *
SIZE =10
532
# names and preferences has been copypasted from https :// rosettacode .org/wiki/
Stable_marriage_problem
# males :
abe , bob , col , dan , ed , fred , gav , hal , ian , jon = 0,1,2,3,4,5,6,7,8,9
MenStr =["abe", "bob", "col", "dan", "ed", "fred", "gav", "hal", "ian", "jon"]
# females :
abi , bea , cath , dee , eve , fay , gay , hope , ivy , jan = 0,1,2,3,4,5,6,7,8,9
WomenStr =["abi", "bea", "cath", "dee", "eve", "fay", "gay", "hope", "ivy", "jan"]
s= Solver ()
# " inverted index ", make sure all men and women are " connected " to each other , i.e.,
form pairs .
# FIXME : only work for SIZE =10
for i in range (SIZE):
s.add( WomanChoice [i]==
If( ManChoice [0]==i, 0,
If( ManChoice [1]==i, 1,
If( ManChoice [2]==i, 2,
If( ManChoice [3]==i, 3,
533
If( ManChoice [4]==i, 4,
If( ManChoice [5]==i, 5,
If( ManChoice [6]==i, 6,
If( ManChoice [7]==i, 7,
If( ManChoice [8]==i, 8,
If( ManChoice [9]==i, 9, -1)))))))))))
# this is like ManChoice [] value , but " inverted index ". it reflects wife 's rating in man
's own rating system .
# 0 if he married best women , 1 if there is 1 women who he would prefer (if there is a
chance ):
ManChoiceInOwnRating =[ Int('ManChoiceInOwnRating_ %d' % i) for i in range (SIZE)]
# same for all women :
WomanChoiceInOwnRating =[ Int('WomanChoiceInOwnRating_ %d' % i) for i in range (SIZE)]
# set values in " inverted " indices according to values in ManPrefer []/ WomenPrefer [].
# FIXME : only work for SIZE =10
for m in range (SIZE):
s.add ( ManChoiceInOwnRating [m]==
If( ManChoice [m]== ManPrefer [m][0] ,0 ,
If( ManChoice [m]== ManPrefer [m][1] ,1 ,
If( ManChoice [m]== ManPrefer [m][2] ,2 ,
If( ManChoice [m]== ManPrefer [m][3] ,3 ,
If( ManChoice [m]== ManPrefer [m][4] ,4 ,
If( ManChoice [m]== ManPrefer [m][5] ,5 ,
If( ManChoice [m]== ManPrefer [m][6] ,6 ,
If( ManChoice [m]== ManPrefer [m][7] ,7 ,
If( ManChoice [m]== ManPrefer [m][8] ,8 ,
If( ManChoice [m]== ManPrefer [m][9] ,9 , -1)))))))))))
# this is 2D bool array . "true" if a ( married or already connected ) man would prefer
another women over his wife.
ManWouldPrefer =[[ Bool('ManWouldPrefer_ %d_%d' % (m, w)) for w in range (SIZE)] for m in
range (SIZE)]
# same for all women :
WomanWouldPrefer =[[ Bool('WomanWouldPrefer_ %d_%d' % (w, m)) for m in range (SIZE)] for w
in range (SIZE)]
# set "true" in ManWouldPrefer [][] table for all women who are better than the wife a
man currently has.
# all others can be " false "
# if the man married best women , all entries would be " false "
534
for m in range (SIZE):
for w in range (SIZE):
s.add( ManWouldPrefer [m][w] == ( ManPrefer [m]. index (w) < ManChoiceInOwnRating [m]))
print s. check ()
mdl=s.model ()
print ""
print ""
sat
ManChoice :
abe <-> ivy
bob <-> cath
col <-> dee
dan <-> fay
ed <-> jan
fred <-> bea
gav <-> gay
hal <-> eve
ian <-> hope
jon <-> abi
WomanChoice :
abi <-> jon
535
bea <-> fred
cath <-> bob
dee <-> col
eve <-> hal
fay <-> dan
gay <-> gav
hope <-> ian
ivy <-> abe
jan <-> ed
This is what we did in plain English language. “Connect men and women somehow, we don’t care how. But no
pair must exist of those who prefer each other (simultaneously) over their current spouses”. Gale/Shapley algorithm uses
“steps” to “stabilize” marriage. There are no “steps”, all pairs are married couples already.
Another important thing to notice: only one solution must exist.
...
results =[]
...
...
...
536
s.add( WomanChoice [i]== _if_x (ManChoice , i, 0))
...
This is classic problem: given 12 polyomino titles, cover mutilated chessboard with them (it has 60 squares with no central
4 squares).
The problem is covered at least in Donald E. Knuth - Dancing Links, and this Z3 solution has been inspired by it.
Another thing I’ve added: graph coloring (9). You see, my script gives correct solutions, but somewhat unpleasant
visually. So I used colored pseudographics. There are 12 tiles, it’s not a problem to assign 12 colors to them. But there
is another popular SAT problem: graph coloring.
Given a graph, assign a color to each vertex/node, so that colors wouldn’t be equal in adjacent nodes. The problem can
be solved easily in SMT: assign variable to each vertex. If two vertices are connected, add a constraint: vertex1_color !=
vertex2_color. As simple as that. In my case, each polynomio is vertex and if polyomino is adjacent to another polyomino,
an edge/link is added between vertices. So I did, and output is now colored.
But this is planar graph (i.e., a graph which is, if represented in two-dimensional space has no intersected edges/links).
And here is a famous four color theorem can be used. The solution of tiled polynomios is in fact like planar graph, or, a
map, like a world map. Theorem states that any planar graph (or map) can be colored only 4 colors.
This is true, even more, several tilings can be colors with only 3 colors:
537
Figure 22.2
Now the classic: 12 pentominos and ”mutilated” chess board, several solutions:
538
Figure 22.3
539
Figure 22.4
22.7 Hilbert’s 10th problem, Fermat’s last theorem and SMT solvers
Hilbert’s 10th problem states that you cannot devise an algorithm which can solve any diophantine equation over integers.
However, it’s important to understand, that this is possible over fixed-size bitvectors.
Fermat’s last theorem states that there are no integer solution(s) for an + bn = cn , for n >= 3.
540
Let’s prove it for n=3 and for a in 0..255 range:
from z3 import *
# for a 8-bit bitvec , to prevent overflow during multiplication /addition , 25 bits must
be allocated
# because log2 (256) *3 = 8*3 = 24
# and a sum of two 24- bit bitvectors can be 25- bit
a,b,c = BitVecs ('a b c', 25)
s= Solver ()
print s. check ()
Z3 gives ”unsat”, meaning, it couldn’t find any a/b/c. However, this is possible to check even using brute-force search.
If to replace ”BitVecs” by ”Ints”, Z3 would give ”unknown”:
from z3 import *
s= Solver ()
s.add(a!=0)
s.add(b!=0)
s.add(c!=0)
print s. check ()
In short: anything is decidable (you can build an algorithm which can solve equation or not) under fixed-size bitvectors.
Given enough computational power, you can solve such equations for big bit-vectors. But this is not possible for integers
or bit-vectors of any size.
Another interesting reading about this by Leonardo de Moura: https://stackoverflow.com/questions/13898175/
how-does-z3-handle-non-linear-integer-arithmetic.
541
The problem is to schedule all jobs/tasks so that they will finish as soon as possible.
See also: https://en.wikipedia.org/wiki/Job_shop_scheduling, https://developers.google.com/optimization/
scheduling/job_shop.
from z3 import *
import itertools
jobs =[]
"""
# from https :// developers . google .com/ optimization / scheduling / job_shop
jobs. append ([(0 , 3) , (1, 2), (2, 2)])
jobs. append ([(0 , 2) , (2, 1), (1, 4)])
jobs. append ([(1 , 4) , (2, 3)])
machines =3
makespan =11
"""
#"""
# from http :// support .sas.com/ documentation /cdl/en/ orcpug /63973/ HTML/ default / viewer .htm#
orcpug_clp_sect048 .htm
jobs. append ([(2 , 44) , (3, 5) , (5, 58) , (4, 97) , (0, 9) , (7, 84) , (8, 77) ,
(9, 96) , (1, 58) , (6, 89) ])
jobs. append ([(4 , 15) , (7, 31) , (1, 87) , (8, 57) , (0, 77) , (3, 85) , (2, 81) ,
(5, 39) , (9, 73) , (6, 21) ])
jobs. append ([(9 , 82) , (6, 22) , (4, 10) , (3, 70) , (1, 49) , (0, 40) , (8, 34) ,
(2, 48) , (7, 80) , (5, 71) ])
jobs. append ([(1 , 91) , (2, 17) , (7, 62) , (5, 75) , (8, 47) , (4, 11) , (3, 7) ,
(6, 72) , (9, 35) , (0, 55) ])
jobs. append ([(6 , 71) , (1, 90) , (3, 75) , (0, 64) , (2, 94) , (8, 15) , (4, 12) ,
(7, 67) , (9, 20) , (5, 50) ])
jobs. append ([(7 , 70) , (5, 93) , (8, 77) , (2, 29) , (4, 58) , (6, 93) , (3, 68) ,
(1, 57) , (9, 7) , (0, 52) ])
jobs. append ([(6 , 87) , (1, 63) , (4, 26) , (5, 6) , (2, 82) , (3, 27) , (7, 56) ,
(8, 48) , (9, 36) , (0, 95) ])
jobs. append ([(0 , 36) , (5, 15) , (8, 41) , (9, 78) , (3, 76) , (6, 84) , (4, 30) ,
(7, 76) , (2, 36) , (1, 8) ])
jobs. append ([(5 , 88) , (2, 81) , (3, 13) , (6, 82) , (4, 54) , (7, 13) , (8, 29) ,
(9, 40) , (1, 78) , (0, 75) ])
jobs. append ([(9 , 88) , (4, 54) , (6, 64) , (7, 32) , (0, 52) , (2, 6) , (8, 54) ,
(5, 82) , (3, 6) , (1, 26) ])
machines =10
makespan =842
#"""
542
s.add(Or(i2_begin >= i1_end , i2_begin < i1_begin ))
s.add(Or(i2_end >i1_end , i2_end <= i1_begin ))
s= Solver ()
text_result =[]
543
# construct Gantt chart :
for machine in range ( machines ):
st =[ None for i in range ( makespan )]
for task in tasks_for_machines [ machine ]:
job=task [0]
begin =m[task [1]]. as_long ()
end=m[task [2]]. as_long ()
# fill text string with this job number :
for i in range (begin ,end):
st[i]= job
ss=""
for i,t in enumerate (st):
ss=ss +("." if t== None else str(st[i]))
text_result . append (ss)
It takes 20s on my venerable Intel Xeon E31220 3.10GHz to solve 10*10 (10 jobs and 10 machines) problem from
sas.com: https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/other/job_shop/r2.txt.
Further work: makespan can be decreased gradually, or maybe binary search can be used...
from z3 import *
import itertools
jobs =[]
544
"""
# from https :// developers . google .com/ optimization / scheduling / job_shop
jobs. append ([(0 , 3) , (1, 2), (2, 2)])
jobs. append ([(0 , 2) , (2, 1), (1, 4)])
jobs. append ([(1 , 4) , (2, 3)])
machines =3
makespan =11
"""
#"""
# from http :// support .sas.com/ documentation /cdl/en/ orcpug /63973/ HTML/ default / viewer .htm#
orcpug_clp_sect048 .htm
jobs. append ([(2 , 44) , (3, 5) , (5, 58) , (4, 97) , (0, 9) , (7, 84) , (8, 77) ,
(9, 96) , (1, 58) , (6, 89) ])
jobs. append ([(4 , 15) , (7, 31) , (1, 87) , (8, 57) , (0, 77) , (3, 85) , (2, 81) ,
(5, 39) , (9, 73) , (6, 21) ])
jobs. append ([(9 , 82) , (6, 22) , (4, 10) , (3, 70) , (1, 49) , (0, 40) , (8, 34) ,
(2, 48) , (7, 80) , (5, 71) ])
jobs. append ([(1 , 91) , (2, 17) , (7, 62) , (5, 75) , (8, 47) , (4, 11) , (3, 7) ,
(6, 72) , (9, 35) , (0, 55) ])
jobs. append ([(6 , 71) , (1, 90) , (3, 75) , (0, 64) , (2, 94) , (8, 15) , (4, 12) ,
(7, 67) , (9, 20) , (5, 50) ])
jobs. append ([(7 , 70) , (5, 93) , (8, 77) , (2, 29) , (4, 58) , (6, 93) , (3, 68) ,
(1, 57) , (9, 7) , (0, 52) ])
jobs. append ([(6 , 87) , (1, 63) , (4, 26) , (5, 6) , (2, 82) , (3, 27) , (7, 56) ,
(8, 48) , (9, 36) , (0, 95) ])
jobs. append ([(0 , 36) , (5, 15) , (8, 41) , (9, 78) , (3, 76) , (6, 84) , (4, 30) ,
(7, 76) , (2, 36) , (1, 8) ])
jobs. append ([(5 , 88) , (2, 81) , (3, 13) , (6, 82) , (4, 54) , (7, 13) , (8, 29) ,
(9, 40) , (1, 78) , (0, 75) ])
jobs. append ([(9 , 88) , (4, 54) , (6, 64) , (7, 32) , (0, 52) , (2, 6) , (8, 54) ,
(5, 82) , (3, 6) , (1, 26) ])
machines =10
# makespan =842
#"""
makespan = Int('makespan ')
s = Optimize ()
s.add(makespan >0)
545
jobs_array =[]
h = s. minimize ( makespan )
text_result =[]
546
ss=""
for i,t in enumerate (st):
ss=ss +("." if t== None else str(st[i]))
text_result . append (ss)
547
548
Chapter 23
Toy-level solvers
... which has been written by me and serves as a demonstration and playground.
SAT
-1 -2 -3 -4 5 6 7 8 0
SAT
-1 -2 -3 4 -5 6 7 8 0
SAT
-1 -2 -3 4 5 -6 7 8 0
SAT
-1 -2 -3 4 5 6 -7 8 0
...
SAT
1 2 3 -4 -5 6 -7 -8 0
SAT
1 2 3 -4 5 -6 -7 -8 0
SAT
1 2 3 4 -5 -6 -7 -8 0
UNSAT
solutions = 70
It was also tested on my SAT-based Minesweeper cracker (3.8.2), and finishes in reasonable time (though, slower than
MiniSat by a factor of ~10).
On bigger CNF instances, it gets stuck, though.
The source code:
#!/ usr/bin/env python
count_solutions =True
# count_solutions =False
import sys
1 Davis–Putnam–Logemann–Loveland
2 https://github.com/DennisYurichev/SAT_SMT_by_example/blob/master/solvers/backtrack/POPCNT4.cnf
549
def read_text_file (fname ):
with open(fname ) as f:
content = f. readlines ()
return [x.strip () for x in content ]
550
def chk_vals (clauses , variables_idx , vals):
# check only clauses which affected by the last (new/ changed ) value , ignore the rest
# because since we already got here , all other values are correct , so no need to
recheck them
idx_of_last_var =len(vals)
# variable can be absent in index , because no clause uses it:
if idx_of_last_var not in variables_idx :
return True
# enumerate clauses which has this variable :
for clause_n in variables_idx [ idx_of_last_var ]:
clause = clauses [ clause_n ]
# if any clause evaluated to False , stop checking , new value is incorrect :
if eval_clause (clause , vals)== False :
return False
# all clauses evaluated to True or None (" maybe ")
return True
solutions =0
551
exit (20) # as in MiniSat
As you can see, all it does is enumerate all possible solutions, but prunes search tree as early as possible. This is
backtracking.
The files: https://github.com/DennisYurichev/SAT_SMT_by_example/tree/master/solvers/backtrack.
Some comments: https://www.reddit.com/r/compsci/comments/6jn3th/simplest_sat_solver_in_120_lines/.
; find a, b:
(get -all - models )
(model
(define -fun a () (_ BitVec 4) (_ bv0 4)) ; 0x0
(define -fun b () (_ BitVec 4) (_ bv4 4)) ; 0x4
)
(model
(define -fun a () (_ BitVec 4) (_ bv12 4)) ; 0xc
(define -fun b () (_ BitVec 4) (_ bv8 4)) ; 0x8
)
...
(model
(define -fun a () (_ BitVec 4) (_ bv9 4)) ; 0x9
(define -fun b () (_ BitVec 4) (_ bv11 4)) ; 0xb
)
Model count: 16
552
This is how full adders gathered together to form a simple 4-bit carry-ripple adder (also from Wikipedia):
553
};
( https://github.com/DennisYurichev/MK85/blob/master/MK85.cc )
|add_Tseitin*()| functions makes logic gates in CNF form: https://en.wikipedia.org/wiki/Tseytin_transformation.
Then I connect logic gates to make full-adder.
Then I connect full-adders to create a n-bit adder:
...
// the first full - adder could be half -adder , but we make things simple here
for (int i=0; i<a->width ; i++)
{
* carry_out = create_internal_variable (" adder_carry ", TY_BOOL , 1);
add_FA (a-> var_no +i, b-> var_no +i, carry , (* sum)->var_no +i, (* carry_out )->
var_no );
// newly created carry_out is a carry_in for the next full - adder :
carry =(* carry_out )->var_no ;
};
};
( https://github.com/DennisYurichev/MK85/blob/master/MK85.cc )
Let’s take a look on output CNF file:
p cnf 40 114
c always false
-1 0
c always true
2 0
c generate_adder
c add_FA inputs =3, 7, cin =1, s=11 , cout =15
c add_Tseitin_XOR 16=3^7
-3 -7 -16 0
3 7 -16 0
3 -7 16 0
-3 7 16 0
c add_Tseitin_XOR 11=16^1
-16 -1 -11 0
16 1 -11 0
16 -1 11 0
-16 1 11 0
c add_Tseitin_AND 17=16&1
-16 -1 17 0
16 -17 0
1 -17 0
c add_Tseitin_AND 18=3&7
-3 -7 18 0
3 -18 0
7 -18 0
554
c add_Tseitin_OR2 15=17|18
17 18 -15 0
-17 15 0
-18 15 0
c add_FA inputs =4, 8, cin =15 , s=12 , cout =19
c add_Tseitin_XOR 20=4^8
-4 -8 -20 0
4 8 -20 0
4 -8 20 0
-4 8 20 0
c add_Tseitin_XOR 12=20^15
-20 -15 -12 0
20 15 -12 0
20 -15 12 0
-20 15 12 0
c add_Tseitin_AND 21=20&15
-20 -15 21 0
20 -21 0
15 -21 0
c add_Tseitin_AND 22=4&8
-4 -8 22 0
4 -22 0
8 -22 0
c add_Tseitin_OR2 19=21|22
21 22 -19 0
-21 19 0
-22 19 0
c add_FA inputs =5, 9, cin =19 , s=13 , cout =23
c add_Tseitin_XOR 24=5^9
-5 -9 -24 0
5 9 -24 0
5 -9 24 0
-5 9 24 0
c add_Tseitin_XOR 13=24^19
-24 -19 -13 0
24 19 -13 0
24 -19 13 0
-24 19 13 0
c add_Tseitin_AND 25=24&19
-24 -19 25 0
24 -25 0
19 -25 0
c add_Tseitin_AND 26=5&9
-5 -9 26 0
5 -26 0
9 -26 0
c add_Tseitin_OR2 23=25|26
25 26 -23 0
-25 23 0
-26 23 0
c add_FA inputs =6, 10, cin =23 , s=14 , cout =27
c add_Tseitin_XOR 28=6^10
-6 -10 -28 0
6 10 -28 0
6 -10 28 0
-6 10 28 0
c add_Tseitin_XOR 14=28^23
555
-28 -23 -14 0
28 23 -14 0
28 -23 14 0
-28 23 14 0
c add_Tseitin_AND 29=28&23
-28 -23 29 0
28 -29 0
23 -29 0
c add_Tseitin_AND 30=6&10
-6 -10 30 0
6 -30 0
10 -30 0
c add_Tseitin_OR2 27=29|30
29 30 -27 0
-29 27 0
-30 27 0
c generate_const (val =4, width =4). var_no =[31..34]
-31 0
-32 0
33 0
-34 0
c generate_EQ for two bitvectors , v1 =[11...14] , v2 =[31...34]
c generate_BVXOR v1 =[11...14] v2 =[31...34]
c add_Tseitin_XOR 35=11^31
-11 -31 -35 0
11 31 -35 0
11 -31 35 0
-11 31 35 0
c add_Tseitin_XOR 36=12^32
-12 -32 -36 0
12 32 -36 0
12 -32 36 0
-12 32 36 0
c add_Tseitin_XOR 37=13^33
-13 -33 -37 0
13 33 -37 0
13 -33 37 0
-13 33 37 0
c add_Tseitin_XOR 38=14^34
-14 -34 -38 0
14 34 -38 0
14 -34 38 0
-14 34 38 0
c generate_OR_list (var =35 , width =4) var out =39
c add_Tseitin_OR_list (var =35 , width =4, var_out =39)
35 36 37 38 -39 0
-35 39 0
-36 39 0
-37 39 0
-38 39 0
c generate_NOT id= internal !8 var =39 , out id= internal !9 out var =40
-40 -39 0
40 39 0
c create_assert () id= internal !9 var =40
40 0
556
c always false
c always true
c generate_adder
c add_FA inputs =3, 7, cin =1, s=11 , cout =15
c add_Tseitin_XOR 16=3^7
c add_Tseitin_XOR 11=16^1
c add_Tseitin_AND 17=16&1
c add_Tseitin_AND 18=3&7
c add_Tseitin_OR2 15=17|18
c add_FA inputs =4, 8, cin =15 , s=12 , cout =19
c add_Tseitin_XOR 20=4^8
c add_Tseitin_XOR 12=20^15
c add_Tseitin_AND 21=20&15
c add_Tseitin_AND 22=4&8
c add_Tseitin_OR2 19=21|22
c add_FA inputs =5, 9, cin =19 , s=13 , cout =23
c add_Tseitin_XOR 24=5^9
c add_Tseitin_XOR 13=24^19
c add_Tseitin_AND 25=24&19
c add_Tseitin_AND 26=5&9
c add_Tseitin_OR2 23=25|26
c add_FA inputs =6, 10, cin =23 , s=14 , cout =27
c add_Tseitin_XOR 28=6^10
c add_Tseitin_XOR 14=28^23
c add_Tseitin_AND 29=28&23
c add_Tseitin_AND 30=6&10
c add_Tseitin_OR2 27=29|30
c generate_const (val =4, width =4). var_no =[31..34]
c generate_EQ for two bitvectors , v1 =[11...14] , v2 =[31...34]
c generate_BVXOR v1 =[11...14] v2 =[31...34]
c add_Tseitin_XOR 35=11^31
c add_Tseitin_XOR 36=12^32
c add_Tseitin_XOR 37=13^33
c add_Tseitin_XOR 38=14^34
c generate_OR_list (var =35 , width =4) var out =39
c add_Tseitin_OR_list (var =35 , width =4, var_out =39)
c generate_NOT id= internal !8 var =39 , out id= internal !9 out var =40
c create_assert () id= internal !9 var =40
I make these functions add variable numbers to comments. And you can see how all the signals are routed inside each
full-adder.
|generate_EQ()| function makes two bitvectors equal by XOR-ing two bitvectors. Resulting bitvector is then OR-ed,
and result must be zero.
Again, this SAT instance is small enough to be handled by my simple SAT backtracking solver:
SAT
-1 2 -3 -4 -5 -6 -7 -8 9 -10 -11 -12 13 -14 -15 -16 -17 -18 -19 -20 -21 -22 -23 24 -25
-26 -27 -28 -29 -30 -31 -32 33 -34 -35 -36
-37 -38 -39 40 0
SAT
-1 2 -3 -4 -5 6 -7 -8 9 10 -11 -12 13 -14 -15 -16 -17 -18 -19 -20 -21 -22 -23 24 -25 -26
27 -28 -29 30 -31 -32 33 -34 -35 -36 -37
-38 -39 40 0
...
557
SAT
-1 2 3 4 5 -6 7 -8 9 10 -11 -12 13 -14 15 -16 -17 18 19 20 21 -22 23 -24 -25 26 27 28 29
-30 -31 -32 33 -34 -35 -36 -37 -38 -39 40 0
SAT
-1 2 3 4 5 6 7 -8 9 -10 -11 -12 13 -14 15 -16 -17 18 19 20 21 -22 23 -24 -25 26 27 28 29
-30 -31 -32 33 -34 -35 -36 -37 -38 -39 40 0
UNSAT
solutions = 16
; must be 21
; see also: https :// www. wolframalpha .com/ input /?i=GCD [861 ,3969 ,840]
( assert (= ( bvmul ((_ zero_extend 16) x) ((_ zero_extend 16) GCD)) (_ bv861 32)))
( assert (= ( bvmul ((_ zero_extend 16) y) ((_ zero_extend 16) GCD)) (_ bv3969 32)))
( assert (= ( bvmul ((_ zero_extend 16) z) ((_ zero_extend 16) GCD)) (_ bv840 32)))
( maximize GCD)
(check -sat)
(get - model )
; correct result :
;( model
; (define -fun x () (_ BitVec 16) (_ bv41 16)) ; 0x29
; (define -fun y () (_ BitVec 16) (_ bv189 16)) ; 0xbd
; (define -fun z () (_ BitVec 16) (_ bv40 16)) ; 0x28
; (define -fun GCD () (_ BitVec 16) (_ bv21 16)) ; 0x15
;)
We are going to find such an assignment, for which GCD variable will be as big as possible (that would not break hard
constraints, of course).
Whenever my MK85 encounters minimize/maximize command, the following function is called:
3 http://sat.inesc-id.pt/open-wbo/
558
// if " minimize ", negate input value :
if ( min_max == false )
v= generate_BVNEG (v);
...
};
( https://github.com/DennisYurichev/MK85/blob/master/MK85.cc )
Lowest bit of variable to maximize receives weight 1. Second bit receives weight 2. Then 4, 8, 16, etc. Hence, MaxSAT
solver, in order to maximize weights of soft clauses, would maximize the binary variable as well!
What is in the WCNF (weighted CNF) file for the GCD example?
...
559
// "cnt" is not a SMT variable !
struct SMT_var * generate_shift_left ( struct SMT_var * X, unsigned int cnt)
{
int w=X-> width ;
return rt;
};
It can be said, the |cnt| variable would be set during SAT instance creation, but it cannot be changed during solving.
Now let’s create a real shifter. Now for 8-bit left shifter, I’m generating the following (long) expression:
I.e., if a specific bit is set in |cnt|, shift X by that number of bits, or do nothing otherwise. ITE() is a if-then-else gate,
works for bitvectors as well.
Glueing all this together:
// bit vector must have width =2^x, i.e., 8, 16, 32, 64, etc
assert ( popcount64c (w)==1);
560
add_Tseitin_ITE_BV (cnt -> SAT_var +i, tmp ->SAT_var , in ->SAT_var ,
out ->SAT_var , w);
in=out;
};
Now the puzzle. a>>b must be equal to 0x12345678, while several bits in a must be reset, like (a&0xf1110100)==0.
Find a, b:
(check -sat)
(get -model )
The solution:
sat
( model
(define -fun a () (_ BitVec 32) (_ bv38177487 32)) ; 0 x2468acf
(define -fun b () (_ BitVec 32) (_ bv3 32)) ; 0x3
)
561
562
Chapter 24
Glossary (SAT)
• clause - disjunction of one or more literals. For example: var1 OR -var2 OR var3 ... - at least one literal must be
satisfied in each clause.
• CNF (conjunctive normal form) formula, conjunction of one or more clauses. Is a list of clauses, all of which must
be satisfied.
• literal/term - can be variable and -variable, these are different literals.
1 http://archive.dimacs.rutgers.edu/Challenges/
563
564
Chapter 25
Further reading
1
• Julien Vanegue, Sean Heelan, Rolf Rolles – SMT Solvers for Software Security
• Armin Biere, Marijn Heule, Hans van Maaren, Toby Walsh – Handbook of Satisfiability (2009)
• Rui Reis – Practical Symbolic Execution and SATisfiability Module Theories (SMT) 101 2 .
• Daniel Kroening and Ofer Strichman – Decision Procedures – An Algorithmic Point of View 3 .
• Henry Warren – Hacker’s Delight. Some people say these branchless tricks and hacks were only relevant for old
RISC CPUs, so you don’t need to read it. Nevertheless, these hacks and understanding them helps immensely to
get into boolean algebra and all the mathematics.
Z3-specific:
4
• Z3 API in Python
5
• Z3 Strategies
• Nikolaj Bjørner – Recent Trends in SMT and Z3: An interactive taste of SMT with Z3 6 .
SAT-specific:
• Donald Knuth – TAOCP 7.2.2.2. Satisfiability 10 . Since the Postscript file is freely available at Donald Knuth’s
website, I converted it to PDF and put it to my website: Download here.
• https://en.wikipedia.org/wiki/Tseytin_transformation
12
• Martin Finke – Equisatisfiable SAT Encodings of Arithmetical Operations .
1 https://yurichev.com/mirrors/SMT/woot12.pdf
2 http://deniable.org/reversing/symbolic-execution
3 http://www.decision-procedures.org
4 http://www.cs.tau.ac.il/~msagiv/courses/asv/z3py/guide-examples.htm
5 http://www.cs.tau.ac.il/~msagiv/courses/asv/z3py/strategies-examples.htm
6 http://www.cse.chalmers.se/~laurako/links/ADuctSlides/L10.html
7 http://theory.stanford.edu/~nikolaj/programmingz3.html
8 https://stackoverflow.com/questions/tagged/z3
9 http://minisat.se/downloads/MiniSat+.pdf
10 http://www-cs-faculty.stanford.edu/~knuth/fasc6a.ps.gz
11 http://fmv.jku.at/biere/talks/Biere-TPTPA11.pdf
12 http://www.martin-finke.de/documents/Masterarbeit_bitblast_Finke.pdf
565
SMT-specific:
566
Chapter 26
Some applications
• All sorts of theorem provers, including (but not limited to) Isabelle, HOL...
• IVy – a tool for specifying, modeling, implementing and verifying protcols10 . Uses Z3.
11
• Cryptol : a language for cryptoalgorithms specification and prooving it’s correctness. Uses Z3.
• SPARK – a formally defined computer programming language based on the Ada. It can use Alt-Ergo, Z3, CVC4,
etc.
567
Nuno P. Lopes, David Menendez, Santosh Nagarakatte, John Regehr – Practical Verification of Peephole Optimizations
with Alive 12 .
Another paper: Provably Correct Peephole Optimizations with Alive 13 .
At github: https://github.com/nunoplopes/alive.
Nuno Lopes – Verifying Optimizations using SMT Solvers 14 .
12 http://web.ist.utl.pt/nuno.lopes/pubs/alive-cacm18.pdf
13 http://www.cs.utah.edu/~regehr/papers/pldi15.pdf
14 https://llvm.org/devmtg/2013-11/slides/Lopes-SMT.pdf
568
Chapter 27
Acronyms used
PL Programming Language . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
569
CRC Cyclic redundancy check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306
CS Computer science . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
570
RE Regular Expression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
ITE If-Then-Else . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
571