Lizard is a VS Code extension and an experimental visual debugger for the Viper intermediate verification language. It works with both Viper's backends (Silicon as well as Carbon), although not all Viper language features might work correctly. Hence, Lizard requires the Viper VS Code extension to be installed (particularly, the common-dbg
branch, see PR #152). Verification errors reported by Viper trigger Lizard to produce comprehensible counterexamples to failed assertions, postconditions, or invariants.
Lizard displays the counterexample next to the Viper program that failed to verify.
Lizard's main purpose is debugging (unbounded) heap-manipulating Viper programs that are specified in terms of quantified permissions (a.k.a. iterated separating conjunction). Lizard is especially useful in combination with Chuckwalla (Viper's prototypical extension for heap-reachability verification). However, it may be that at this time Chuckwalla is not yet implemented.
To generate a counterexample, Lizard combines the available type information with the information from the SMT model (normally produced by Z3 in an incomplete yet incomprehensible manner). Visualization is further facilitated by some preexpectation for the shape of possible counterexamples. For example, it is expected that each method's footprint is represented as a set of references to the nodes, the fields of which may be accessed by the method.
Lizard might be useful also as a platform for prototyping other Viper debuggers, providing an API for querying SMT models from within Viper IDE. Lizard is written in TypeScript and uses things like Graphviz, Node.js, Webpack, WebView, HTML, CSS, and prayer.
To compile the project:
- clone the repo
- run
npm install
to install the dependencies - run
npm run compile
to build the extension - run
code lizard/
to open the project in VS Code - start the extension from the debug panel in VS Code
- run
vsce package
to assemble a portable distribution bundle
To use Lizard, you first need to install the Viper extension for your Visual Studio Code installation. Viper is a JVM server application, so you'll also need Java. For more details, see Download and Install Viper.
To activate the verification debugger, your preferred Viper backend must be set up to emit counterexamples. This can be done by passing the --counterexample native
option. For example, the JSON settings below configure two Viper backends ("silicon-debug" and "carbon-debug") to produce counterexamples (to switch between backends, use Ctrl+L
or ⌘+L
):
"viperSettings.verificationBackends": [
{
"v": "674a514867b1",
"name": "silicon-debug",
"type": "silicon",
"paths": [],
"engine": "ViperServer",
"timeout": 100000,
"stages": [
{
"name": "verify",
"isVerification": true,
"mainMethod": "viper.silicon.SiliconRunner",
"customArguments": "--z3Exe $z3Exe$ --disableCaching --counterexample native $fileToVerify$"
}
],
"stoppingTimeout": 5000
},
{
"v": "674a514867b1",
"name": "carbon-debug",
"type": "carbon",
"paths": [],
"engine": "ViperServer",
"timeout": 100000,
"stages": [
{
"name": "verify",
"isVerification": true,
"mainMethod": "viper.carbon.Carbon",
"customArguments": "--z3Exe $z3Exe$ --boogieExe $boogieExe$ --disableCaching --counterexample native $fileToVerify$"
}
],
"stoppingTimeout": 5000
}
]
This extension is a follow-up project to the family of verification debugger prototypes developed as student projects at the Programming Methodology Group at ETH Zurich. In particular, some code is borrowed from Alessio Aurrechia's Master thesis project (which used symbolic execution traces and Alloy models, as opposed to Z3 models, to extract possible counterexamples).