9

Rust verification tools

 4 years ago
source link: https://alastairreid.github.io/rust-verification-tools/
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
neoserver,ios ssh client

The Rust language and the Rust community are really interesting if you are interested in building better quality systems software.

  • The language is specifically designed to make it easier to build reliable software.
  • The Rust book and the Cargo tool actively promote the idea that good Rust code includes documentation and tests.
  • There is an active Rust fuzzing community to improve the state of Rust packages and other software.

Over the last few months, I have been trying to understand one more part of the story: what is the state of formal verification tools for Rust?

The clean, principled language design and, in particular, the Rust type system fit really well with recent work on formal verification . Academic researchers are showing a lot of interest in Rust and and it seems that the community should be receptive to the idea of formal verification.

So what tools are out there? What can you do with them? Are they complete? And are they being maintained?

Here is a list of the tools that I know about (more details below):

I should also mention Miri (paper). Miri is not a formal verification tool but it can be used to detect undefined behaviour and it is important in defining what “unsafe” Rust is and is not allowed to do.

Before I go any further, I should probably add a disclaimer: Although I have spent some time looking at what is available and reading Rust verification papers , I am not an expert in this area so I have probably got things wrong, missed out important tools, etc. You should also bear in mind that things are changing fast: I am writing this in early May 2020 but I hope that, in a few months time, everything I say will be out of date. Do please contact me with additions and corrections.

What can the tools verify?

There are three major categories of software verification tool in roughly increasing order of how hard it is to use them: automatic (aka extended static checkers), auto-active verifiers and deductive verifiers.

Automatic verification tools

These tools are good for checking for what some call “Absence of Run-Time Exception” (AoRTE). Runtime errors includes things like the following (not all of these apply to safe Rust code).

  • No division by zero
  • No integer overflow
  • No failing assertions
  • Memory safety
    • All array accesses in bounds
    • No null dereferences
    • No buffer overflows
    • No use after free
    • No memory leaks
  • Lock safety of concurrent code

While not all tools aim to check all of the above, the automatic verification tools I know of are CBMC , Crux-mir , MIRAI , RustHorn , SMACK . It is worth saying that the Crust tool is different from the other tools in that it is designed to check that a library that contains unsafe Rust code is externally safe.

One of the appealing features of the automatic verification tools is that you don’t have to write specifications. Typically, all you have to do is build a verification harness (that looks a wee bit like a fuzzing harness) and maybe add some extra assertions into your code.

Auto-active verification tools

While automatic tools focus on things not going wrong, auto-active verification tools help you verify some key properties of your code: data structure invariants, the results of functions, etc. The price that you pay for this extra power is that you may have to assist the tool by adding function contracts (pre/post-conditions for functions), loop invariants, type invariants, etc. to your code.

The only auto-active verification tool that I am aware of is Prusti . Prusti is a really interesting tool because it exploits Rust’s unusual type system to help it verify code. Also Prusti has the slickest user interface: a VSCode extension that checks your code as you type it!

Deductive verification tools

These tools can be used to show things like “full functional correctness”: that the outputs are exactly what they should be. Deductive verification tools typically generate a set of “verification conditions” that are then proved using an interactive theorem prover.

The deductive verification tools for Rust that I know of are Electrolysis and RustBelt . The goal of RustBelt is to verify unsafe Rust code but, strictly speaking, RustBelt does not actually verify Rust code: you manually transcribe Rust code into λ-Rust and then use RustBelt to verify that code using IRIS and the Coq theorem prover.

How much Rust do these tools support?

As far as I can tell, no verification tool currently supports the full Rust language. (In contrast, C verification tools are complete enough to verify things like OS device drivers.) Some of the big challenges are:

  • Unsafe code
  • Closures
  • Stdlib

The Electrolysis repository has the clearest statement of language coverage of all the tools. It uses the language reference manual as a guide to what has to be covered and it uses test code from the manual (as well as some hand-written tests) to confirm that that feature is supported.

Unsafe code

THE KNOWLEDGE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF UNLEASHING INDESCRIBABLE HORRORS THAT SHATTER YOUR PSYCHE AND SET YOUR MIND ADRIFT IN THE UNKNOWABLY INFINITE COSMOS.

— The Rustonomicon .

The problem with unsafe code is that it eliminates the big advantage of Rust code: that the type system gives you a bunch of guarantees that you can rely on while reasoning about your code. This means that every tool that takes advantage of the Rust typesystem is going to have a problem with unsafe code. In particular, I think that this is a problem for Electrolysis , Prusti and RustHorn . On the other hand, tools like SMACK that are based on the LLVM IR have no problem with unsafe code.

Closures

While “unsafe” code raises some fundamental barriers for some tools, as far as I can tell, closures just seem to take more effort. They bring in a degree of indirection / higher-order behaviour that is harder for tools to handle.

The only tools that I am aware of that can handle closures at the moment are Electrolysis and, I suspect, SMACK . (But I could easily have missed some.)

Standard library

The standard library is complicated in two ways:

  1. Some of it uses unsafe code
  2. Some of it is highly optimized

So, many verification tools replace the standard library with something simpler such as a simpler implementation or a function contract. It is quite a lot of work to create and maintain this verification version of the library so standard library support can be quite incomplete.

Two tools that I know are affected by this are

Which tools are being maintained?

These tools all vary in how actively they are being developed. Here is what I know about them. (Please tell me if I got this wrong.)

Other thoughts

While I was looking at all these different tools, I noticed a few other challenges with the tools. Some of the tools have solutions for these issues.

  • Cargo tool integration: Many of the tools seem to act on a single file but if I want to verify a Rust package, I really want something that is integrated with Cargo.

  • Standard verification interfaces for automatic verification tools: The automatic verification tools all seem to have different ways of creating symbolic values and specifying assumptions. I wonder whether the arbitrary crate used by fuzzers could provide some inspiration for a standard symbolic value API?

  • Standard verification interfaces for function contracts: The MIRAI tool is using the contracts crate for function contracts. Is this a good choice? Are/should other tools use the same crate?

Conclusion

Is looks as though Rust is a very active area for verification tools. I am not sure yet whether any of the tools are complete enough for me to use them in anger but it seems that some of them are getting close.

The Rust verification future looks very bright!

Where did I get this list from? As you might imagine, I searched the Google Scholar and the web for things like “Rust verification tool” This finds things like

Also, Martin Nyx Brain pointed me at the CBMC pull request for Rust support.


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK