programs that manipulate pointer data structures—includinginformation hiding in the presence of pointers;
"transfer of ownership" (avoidance of semantic frameaxioms); and
virtual separation (modular reasoning) between concurrent modules.
Separation logic supports the developing field of research described byPeter O'Hearn and others aslocal reasoning, whereby specifications and proofs of a program component mention only the portion of memory used by the component, and not the entire global state of the system. Applications include automatedprogram verification (where analgorithm checks the validity of another algorithm) and automatedparallelization of software.
Separation logic assertions describe "states" consisting of astore and aheap, roughly corresponding to the state oflocal (orstack-allocated) variables anddynamically-allocated objects in common programming languages such asC andJava. A store is afunction mapping variables to values. A heap is apartial function mapping memory addresses to values. Two heaps and aredisjoint (denoted) if their domains do not overlap (i.e., for every memory address, at least one of and is undefined).
The logic allows to prove judgements of the form, where is a store, is a heap, and is anassertion over the given store and heap. Separation logic assertions (denoted as,,) contain the standard Boolean connectives and, in addition,,,, and, where and are expressions.
The constant asserts that the heap isempty, i.e., when is undefined for all addresses.
The binary operator takes an address and a value and asserts that the heap is defined at exactly one location, mapping the given address to the given value. I.e., when (where denotes the value of expression evaluated in store) and is otherwise undefined.
The binary operator (pronouncedstar orseparating conjunction) asserts that the heap can be split into twodisjoint parts where its two arguments hold, respectively. I.e., when there exist such that and and and.
The binary operator (pronouncedmagic wand orseparating implication) asserts that extending the heap with a disjoint part that satisfies its first argument results in a heap that satisfies its second argument. I.e,. when for every heap such that, also holds.
The operators and share some properties with the classicalconjunction andimplication operators. They can be combined using an inference rule similar tomodus ponens
and they form anadjunction, i.e., if and only if for; more precisely, the adjoint operators are and.
In separation logic, Hoare triples have a slightly different meaning than inHoare logic. The triple asserts that if the program executes from an initial state satisfying the precondition then the program willnot go wrong (e.g., have undefined behaviour), and if it terminates, then the final state will satisfy the postcondition. In essence, during its execution, may access only memory locations whose existence is asserted in the precondition or that have been allocated by itself.
In addition to the standard rules fromHoare logic, separation logic supports the following very important rule:
This is known as theframe rule (named after theframe problem) and enables local reasoning. It says that a program that executes safely in a small state (satisfying), can also execute in any bigger state (satisfying) and that its execution will not affect the additional part of the state (and so will remain true in the postcondition). The side condition enforces this by specifying that none of the variables modified by occur free in, i.e. none of them are in the 'free variable' set of.
More generally, separation logic can be seen as a way of reasoning aboutseparation algebras. A separation algebra may be defined in several ways, but is often presented as acancellative,partialcommutative monoid.[8] More concretely, it is a setA, partial binary operation and constantu satisfying the following identities, where in the first three laws, if any side of the equation is defined, all sides are defined:
Associativity: For allx,y andz,
Commutativity: For allx andy,
Identity: For allx,
Cancellativity: For allx,y andz, if then
It can be shown that the presentation of stacks and heaps above gives rise to a separation algebra: takeA to be the set of all heaps, the binary operation to be the union of two heaps (only defined when the heaps are disjoint), andu to be the empty heap. In some definitions, cancellativity is omitted, but this does not necessarily pose a problem.[9]
Many assertions can be given semantics purely in terms of a separation algebra; in particular, for an assertionP we can assign to it a certain subset ofA, denoted, as follows:
The rules for,, and are omitted but are easily derived from the above, while the semantics of are given by the separation algebra in question.
Separation logic leads to simple proofs of pointer manipulation for data structures that exhibit regular sharing patterns which can be described simply using separating conjunctions; examples include singly and doubly linked lists and varieties of trees. Graphs and DAGs and other data structures with more general sharing are more difficult for both formal and informal proof. Separation logic has, nonetheless, been applied successfully to reasoning aboutprograms with general sharing.
In their POPL'01 paper,[3] O'Hearn and Ishtiaq explained how the magic wand connective could be used to reason in the presence of sharing, at least in principle.For example, in the triple
we obtain the weakest precondition for a statement that mutates the heap at location, and this works for any postcondition, not only one that is laid out neatly using the separating conjunction. This idea was taken much further by Yang, who used to provide localized reasoning about mutations in the classicSchorr-Waite graph marking algorithm.[10] Finally, one of the most recent works in this direction is that of Hobor and Villard,[11] who employ not only but also a connectivewhich has variously been called overlapping conjunction or sepish,[12] and which can be used to describe overlapping data structures: holds of a heap when and hold for subheaps and whose union is, but which possibly have a nonempty portion in common. Abstractly, can be seen to be a version of the fusion connective ofrelevance logic.
A Concurrent Separation Logic (CSL),a version of separation logic for concurrent programs, was originally proposed byPeter O'Hearn,[13]using a proof rule
which allows independent reasoning about threads that access separate storage. O'Hearn's proof rules adapted an early approach ofTony Hoare to reasoning about concurrency,[14]replacing the use of scoping constraints to ensure separation by reasoning in separation logic. In addition to extending Hoare's approach to apply in the presence of heap-allocated pointers, O'Hearn showed how reasoning in concurrent separation logic could track dynamic ownership transfer of heap portions between processes; examples in the paper include a pointer-transferring buffer, and amemory manager.
Commenting on the early classical work oninterference freedom bySusan Owicki andDavid Gries, O'Hearn says that explicit checking for non-interference isn't necessary because his system rules out interference in an implicit way, by the nature of the way proofs are constructed.
A model for concurrent separation logic was first provided by Stephen Brookes in a companion paper to O'Hearn's.[15] The soundness of the logic had been a difficult problem, and in fact a counterexample of John Reynolds had shown the unsoundness of an earlier, unpublished version of the logic; the issue raised by Reynolds's example is described briefly in O'Hearn's paper, and more thoroughly in Brookes's.
At first it appeared that CSL was well suited to what Dijkstra had called loosely connected processes,[16] but perhaps not to fine-grained concurrent algorithms with significant interference. However, gradually it was realized that the basic approach of CSL was considerably more powerful than first envisaged, if one employed non-standard models of the logical connectives and even the Hoare triples.
By suitable choice of separation algebra, it was surprisingly found that the proof rules of abstract versions of concurrent separation logic could be used to reason about interfering concurrent processes, for example by encoding the rely-guarantee technique which had been originally proposed to reason about interference;[17] in this work the elements of the model were considered not resources, but rather "views" of the program state, and a non-standard interpretation of Hoare triples accompanies the non-standard reading of pre and postconditions.Finally, CSL-style principles have been used to compose reasoning about program histories instead of program states, in order to provide modular techniques for reasoning about fine-grained concurrent algorithms.[18]
Versions of CSL have been included in many interactive and semi-automatic (or "in-between") verification tools as described in the next section. A particularly significant verification effort is that of the μC/OS-II kernel mentioned there. But, although steps have been made,[19] as of yet CSL-style reasoning has been included in comparatively fewtools in the automatic program analysis category (and none mentioned in the next section).
O'Hearn and Brookes are co-recipients of the 2016Gödel Prize for their invention of Concurrent Separation Logic.[20]
Plain concurrent separation logic is able to describe ownership transfer, wherein one thread may completely gives control over individual heap locations to another thread, but this isn't enough to reason about many concurrent programs—in particular, each heap cell may be shared by many threads so long as each thread only reads from the cell and does not write to it, or alternatively it may be written to so long as only one thread can do the writing.[21]
This may be achieved by annotating each assertion with a fractional permission as. Whenπ = 1, the thread has full ownership of the heap cell and therefore may write to it:
Whenπ < 1, the thread only has shared access, and therefore may only read:
Importantly, permissions may be infinitely split, allowing an arbitrary number of threads to read from the same location (with the fractional permission keeping track of when the number of threads has reduced to one again):
Note that the actual magnitudes of the permissions less than one are immaterial and only required for tracking purposes; a program should not concern itself over whether any given permission is 0.1 or 0.9, as it is able to read from the heap cell all the same.
To allow for two heaps to both consider the same memory location, some modification is required to the definition of heaps and their disjointness. In particular, every heap location is assigned a fractional permission (and thus semantically means that in heaph, locatione has valuee' with permissionπ), and two heaps are disjoint if, for every location that is in both heaps, their values are equal and the sum of their fractional permissions does not exceed one. The operation of merging two heaps will correspondingly add together permissions for those duplicated locations.
Tools for reasoning about programs fall on a spectrum from fully automatic program analysis tools, which do not require any user input, to interactive tools where the humanis intimately involved in the proof process. Many such tools have been developed; the following list includes a few representatives in each category.
Automatic Program Analyses. These tools typically look for restricted classes of bugs (e.g., memory safety errors) or attempt to prove their absence, but fall short of proving full correctness.
A current example isFacebook Infer, a static analysis tool for Java, C, andObjective-C based on separation logic and bi-abduction.[22] As of 2015 hundreds of bugs per month were being found by Infer and fixed by developers before being shipped to Facebook's mobile apps.[23]
Other examples includeSpaceInvader (one of the first SL analyzers),Predator (which has won several verification competitions),MemCAD (which mixes shape and numerical properties) andSLAyer (from Microsoft Research, focussed on data structures found in device drivers).
Interactive Proof. Proofs have been done using embeddings of Separation Logic into interactive theorem provers such asRocq (previously known asCoq) andHOL (proof assistant). In comparison to the program analysis work, these tools require more in the way of human effort but prove deeper properties, up to functional correctness.
A proof of the FSCQ file system[24] where the specification includes behaviour under crashes as well as normal operation. This work won the best paper award at the 2015 Symposium on Operating System Principles.
Verification of a large fragment of theRust type system and some of its standard libraries in theRustBelt project using theIris framework for separation logic in Rocq.
Verification of an OpenSSL implementation of a cryptographic authentication algorithm,[25] utilizingverifiable C
Verification of key modules of a commercial OS kernel, the μC/OS-II kernel, the first commercialpre-emptive kernel to have been verified.[26]
In Between. Many tools require more user intervention than program analyses, in that they expect the user to input assertions such as pre/post specs for functions or loop invariants, but after this input is given they attempt to be fully or almost fully automatic; this mode of verification goes back to classic works in the 1970s such as J King's verifier, and the Stanford Pascal Verifier. This style of verifier has recently been calledauto active verification, a term which intends to evoke the way of interacting with a verifier via an assert-check loop, analogous to the interaction between a programmer and a type-checker.
The very first Separation Logic verifier,Smallfoot, was in this in-between category. It required the user to input pre/post specs, loop invariants, and resource invariants for locks. It introduced a method of symbolic execution, as well as an automatic way to infer frame axioms. Smallfoot included Concurrent Separation Logic.
SmallfootRG is a verifier for a marriage of separation logic and the classic rely/guarantee method for concurrent programs.
VeriFast is an advanced current tool in the in-between category. It has demonstrated proofs ranging from object-oriented patterns to highly concurrent algorithms and to systems programs.
Viper is a state-of-the-art automated verification infrastructure for permission-based reasoning. It mainly consists of a programming language and two verification backends, one based on symbolic execution and another one on verification condition generation (VCG).[28] Based on the Viper infrastructure, several frontends for various programming languages have emerged:Gobra for Go,Nagini for Python,Prusti for Rust, andVerCors for C, Java, OpenCL, and OpenMP. These frontends translate the frontend programming language into Viper to then use a Viper verification backend for proving the input program's correctness.
The distinction between interactive and in-between verifiers is not a sharp one. For example,Bedrock strives for a high degree of automation, in what it terms mostly-automatic verification, whereVerifast sometimes requires annotations that resemble the tactics (little programs) used in interactive verifiers.
The satisfiability problem for a quantifier-free, multi-sorted fragment of separation logic parameterized over the sorts of locations and data can be shown to bePSPACE-complete.[29] An algorithm for solving this fragment inDPLL(T)-basedSMT solvers has been integrated intocvc5.[30] Extending this result, satisfiability for an analog of theBernays–Schönfinkel class for separation logic with uninterpreted memory locations can also be shown to be PSPACE-complete, whereas the problem is undecidable with interpreted memory locations (e.g., integers) or further quantifier alternations[31]
^Reynolds, John C. (1999). "Intuitionistic Reasoning about Shared Mutable Data Structure". InDavies, Jim;Roscoe, Bill;Woodcock, Jim (eds.).Millennial Perspectives in Computer Science, Proceedings of the 1999 Oxford–Microsoft Symposium in Honour of Sir Tony Hoare.Palgrave.