Zero-Cost POSIX Compliance: Encoding the Socket State Machine in Lean's Types
ngrislain
32 points
19 comments
March 25, 2026
Related Discussions
Found 5 related stories in 33.6ms across 3,471 title embeddings via pgvector HNSW
- Rust zero-cost abstractions vs. SIMD Sirupsen · 14 pts · March 03, 2026 · 46% similar
- The inner workings of TCP zero-copy mfrw · 49 pts · March 02, 2026 · 46% similar
- Methods in Languages for Systems Programming (2023) surprisetalk · 17 pts · March 16, 2026 · 45% similar
- Zstandard Across the Stack oddurmagnusson · 14 pts · April 02, 2026 · 43% similar
- Show HN: Crazierl – An Erlang Operating System toast0 · 52 pts · March 29, 2026 · 43% similar
Discussion Highlights (8 comments)
yjftsjthsd-h
> Lean 4 offers a fourth option: make the bug unrepresentable at the type level, then erase the proof at compile time so the generated code is identical to raw C. Couldn't you do that in a more conventional type/class system without using an actual proof system? Instead of there being a Socket type/class, just make a Socket_Fresh, Socket_Bound, Socket_Listening, Socket_Connected, and maybe Socket_Closed (not 100% sure, would have to think about whether that's a thing or not), each of which takes the previous in its constructor. Or does that make it too hard to use?
wk_end
Lean doesn’t have any kind of substructural typing, does it? At a glance it looks like you need to manually (lexically) rebind the socket at each step in the operation, and there’s nothing stopping you from holding onto a socket in a now-invalid state and making mess of things, right? Also, boo AI slop. If you’re going to use AI to help write your technical blog posts please please please edit out all the “No X. No Y. Just pure Z.” marketing-speak.
khaledh
Interesting take on enforcing state machine rules using a proof system. I'm interested in this space, and have been developing a new programming language to enable typestate / state-machine representation at the type system level[0]. I don't know where it will end up on the spectrum of systems languages; it may end up being too niche or incomplete, but so far I think I'm scratching the right itch, at least for myself. [0] https://github.com/khaledh/machina
e-dant
This is cool stuff, but a nitpick: It’s not undefined behavior in the language sense in C to do socket ops on a bad file descriptor. It’s just an error from the kernel’s point of view, and the kernel will throw -errno at you.
diowldxiks
Does this work in the face of state changing out from under the socket? I'm not super familiar with low level socket details but I'm thinking something like connect returning EINPROGRESS and you not knowing if the connection has completed. It may complete, it may fail, but during that time this state machine is invalid I think. It seems like strict logical programming like this gets much harder in the face of mutable state changing out from under the program, but that can probably be worked around with enough effort.
russdill
This is a based on such a surface level understanding of one type of posix socket. Calling close twice on a socket is a normal allowed thing, particularly for non blocking sockets. Datagram sockets can be operated with bind, without bind, with connect and bind and with both called multiple times.
12_throw_away
I'm like 3 sentences in and already things do not quite make sense. > Calling [socket] operations in the wrong order [...] is undefined behaviour in C. UB? For using a socket incorrectly? You sure about that? > Documentation — trust the programmer to read the man page (C, Rust). I'm sorry, are they saying that rust's socket interface is unsound? Looks to me like it's a pretty standard Rust-style safe interface [1], what am I missing? [1] https://doc.rust-lang.org/std/net/struct.TcpListener.html
strongly-typed
Feels like we're living in parallel universes. You're building Hale, and I'm building Abs XD : https://github.com/rdavison/abs