2023-05-04 01:03:58 -07:00
|
|
|
---
|
|
|
|
title: "Proving My Compiler Code Incorrect With Alloy"
|
2023-10-14 15:58:20 -07:00
|
|
|
date: 2023-06-04T21:56:00-07:00
|
2024-03-13 15:59:46 -07:00
|
|
|
tags: ["Chapel", "Compilers", "C++", "Alloy"]
|
2023-05-14 21:18:23 -07:00
|
|
|
description: "In this post, I apply Alloy to a piece of code in the Chapel compiler to find a bug."
|
2023-05-04 01:03:58 -07:00
|
|
|
---
|
|
|
|
|
2023-05-14 21:18:23 -07:00
|
|
|
__Disclaimer:__ though "my compiler code" makes for a fun title, I do not
|
|
|
|
claim exclusive credit for any of the C++ code in the Chapel compiler that
|
|
|
|
I mention in this post. The code is "mine" in the sense that I was
|
|
|
|
debugging changes I was making, and perhaps also in the sense that I was
|
|
|
|
working with it.
|
|
|
|
|
2023-05-04 01:03:58 -07:00
|
|
|
I work as a compiler developer on the [Chapel](https://chapel-lang.org) team.
|
2023-05-14 21:13:23 -07:00
|
|
|
Recently, while thinking through a change to some code, I caught myself
|
|
|
|
making wishes: "if only I could have a computer check this property for
|
|
|
|
me". Having at some point seen [Hillel Wayne's post](https://www.hillelwayne.com/post/alloy6/)
|
|
|
|
about the release of [Alloy 6](https://alloytools.org/), I thought I'd give it
|
|
|
|
a go. In this post, I describe my experience applying Alloy to a real part of
|
|
|
|
the Chapel compiler. I'd never touched Alloy before this, so be warned: this
|
|
|
|
is what I came up with on my own attempt, and I may well be doing something
|
|
|
|
fairly silly by the standards of "real" Alloy users.
|
2023-05-04 21:01:20 -07:00
|
|
|
|
|
|
|
### The Problem at Hand
|
2023-05-04 01:03:58 -07:00
|
|
|
One of the things that a language like Chapel has to do is called _resolution_,
|
|
|
|
which is the process of figuring out what each identifier, like `x`, refers to,
|
|
|
|
and what its type is. Even the first part of that is pretty complicated, what
|
2023-06-04 21:56:45 -07:00
|
|
|
with public and private variables, methods (which can be declared outside
|
2023-05-04 01:03:58 -07:00
|
|
|
of their receiver type in Chapel), and more...
|
|
|
|
|
|
|
|
Scope resolution in Chapel is further complicated by the fact that the same
|
|
|
|
scope might need to be searched multiple times, in different contexts. Let
|
|
|
|
me start with a few examples to illustrate what I mean. Here's the first
|
|
|
|
program:
|
|
|
|
|
|
|
|
```Chapel {linenos=true}
|
|
|
|
module M {
|
|
|
|
class C {}
|
|
|
|
|
|
|
|
// A regular procedure (not a method)
|
|
|
|
proc foo() {}
|
|
|
|
|
|
|
|
// A method on C.
|
|
|
|
proc C.foo() {}
|
|
|
|
|
|
|
|
// Another method on C.
|
|
|
|
proc C.doSomething() {
|
|
|
|
foo();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
If you don't know Chapel (and you probably don't!) this program already merits a fair
|
2023-06-04 21:56:45 -07:00
|
|
|
bit of explanation. I've collapsed it for the sake of visual clarity; feel
|
|
|
|
free to expand the below section to learn more about the language features
|
|
|
|
used in the program above.
|
|
|
|
|
|
|
|
{{< details summary="Click here for an explanation of the above code snippet" >}}
|
|
|
|
A _module_ in Chapel (declared via a `module` keyword)
|
2023-05-04 01:03:58 -07:00
|
|
|
is just a collection of definitions. Such definitions could include variables,
|
|
|
|
methods, classes and more. Putting them in a module helps group them.
|
|
|
|
|
2023-06-04 21:56:45 -07:00
|
|
|
A _class_ in Chapel (declared via a `class` keyword) is much like a class in
|
|
|
|
object oriented languages. The class `C` that we're creating on line 2 doesn't
|
|
|
|
have any fields or methods -- at least not yet. We will, however, add methods
|
|
|
|
to it using Chapel's _secondary method_ mechanism (more on that in a moment).
|
|
|
|
|
|
|
|
The `proc` keyword is used to create functions and methods. On line 5, we
|
|
|
|
create a procedure called `foo` that does nothing. On line 8, because we
|
|
|
|
write `C.foo` instead of just `foo`, we're actually creating a method on
|
|
|
|
the class `C` we declared earlier. This method does nothing too. Notice
|
|
|
|
that although declaring classes in Chapel works about the same as declaring
|
|
|
|
classes in other languages, it's fairly unusual to be able to declare a
|
|
|
|
class method (like the `foo` on line 8 in this case) outside of the `class
|
|
|
|
C { ... }` section of code. This is part of the reason that Chapel method
|
|
|
|
resolution is complicated (methods can be declared anywhere!). The only
|
|
|
|
other language that I know of that supports this feature is Kotlin with its
|
|
|
|
[extension function
|
|
|
|
mechanism](https://kotlinlang.org/docs/extensions.html), but it's possible
|
|
|
|
that other languages have similar functionality.
|
|
|
|
{{< /details >}}
|
2023-05-04 01:03:58 -07:00
|
|
|
|
|
|
|
The interesting part of the snippet is the body of the `doSomething` method.
|
|
|
|
It has a call to `foo`: but which `foo` is it referring to? There are two:
|
|
|
|
the regular procedure (non-method) `foo`, declared on line 5, and the
|
|
|
|
method `C.foo` declared on line 8. In Chapel, the rules dictate that when
|
|
|
|
such a situation arises, and a fitting method is found, the method is
|
|
|
|
preferred to the non-method. In the rewritten version of the Chapel compiler,
|
|
|
|
titled Dyno, this disambiguation is achieved by first searching the scopes
|
|
|
|
visible from the class `C` for methods only. In this particular example,
|
|
|
|
the two scopes searched will be:
|
|
|
|
|
|
|
|
1. The inside of class `C`. The class itself doesn't define any methods, so
|
|
|
|
nothing is found.
|
|
|
|
2. The module in which `C` is defined (`M` in this case). This module does
|
|
|
|
have a method, the one on line 8, so that one is returned.
|
|
|
|
|
|
|
|
Only if methods are not found are non-methods considered. In this situation,
|
|
|
|
the search order will be as follows:
|
|
|
|
|
|
|
|
1. The inside of `C.doSomething` will be searched. `doSomething` doesn't declare
|
|
|
|
anything, so the search will come up empty.
|
|
|
|
2. The module in which `C.doSomething` is defined (`M` again) will be searched. This time,
|
|
|
|
both methods and non-methods will be considered. Since we're considering
|
|
|
|
a hypothetical situation in which the method `C.foo` isn't there (otherwise
|
|
|
|
it would've been found earlier), the only thing that will be found will
|
|
|
|
be the non-method `foo`.
|
|
|
|
|
|
|
|
Notice that we've already had to search the module `M` twice, looking for
|
2023-06-04 21:56:45 -07:00
|
|
|
different things each time. First, we were looking for only methods, but
|
2023-05-04 01:03:58 -07:00
|
|
|
later, we were looking for anything. However, this isn't as complicated as
|
|
|
|
things can get. The simplifying aspect of this program is that both `doSomething`
|
2023-06-04 21:56:45 -07:00
|
|
|
and `C` are defined inside the module `M`, and therefore have access to its
|
2023-05-04 01:03:58 -07:00
|
|
|
private methods and procedures. If we extracted `C.doSomething` into its
|
|
|
|
own separate module, the program would look like this.
|
|
|
|
|
|
|
|
```Chapel {linenos=true}
|
|
|
|
module M1 {
|
|
|
|
class C {}
|
|
|
|
|
|
|
|
// A regular procedure (not a method)
|
|
|
|
proc foo() {}
|
|
|
|
|
|
|
|
// A method on C.
|
|
|
|
proc C.foo() {}
|
|
|
|
}
|
|
|
|
module M2 {
|
|
|
|
use super.M1;
|
|
|
|
|
|
|
|
// Another method on C.
|
|
|
|
proc C.doSomething() {
|
|
|
|
foo();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
Since `doSomething` is now in another module, it can't just access the `foo`s from
|
|
|
|
`M1` willy-nilly. There are a few ways to get the things that were declared in another module out
|
|
|
|
and make use of them. I opted for a `use` statement, which, in its simplest form,
|
|
|
|
just brings all the declarations inside the `use`d module into the current scope. Thus,
|
|
|
|
the `use` statement on line 11 would bring all things declared in `M1` into
|
2023-06-04 21:56:45 -07:00
|
|
|
the scope inside `M2`. There's a catch, though. Since `M2` is not declared
|
2023-05-04 01:03:58 -07:00
|
|
|
inside `M1`, a `use` statement will not be able to bring in _private_ symbols
|
|
|
|
from `M1` (they're private for a reason!). So, this time, when searching the scope
|
|
|
|
for `M1`, we will have to search only for public symbols. That's another,
|
|
|
|
different way of searching `M1`. So far, we've seen three:
|
|
|
|
|
|
|
|
* Search `M1` for any symbol.
|
|
|
|
* Search `M1` for methods only.
|
|
|
|
* Search `M1` for public symbols only.
|
|
|
|
|
2023-06-04 21:56:45 -07:00
|
|
|
Dyno introduces more ways to search within a scope, including combinations of
|
|
|
|
search types, such as looking only for public methods. To represent the various
|
|
|
|
search configurations, the Dyno team came up with using a bitfield of _flags_,
|
|
|
|
each of which indicated a necessary condition for a symbol to be returned. A
|
|
|
|
bitfield with flags set for two properties (like "public" and "method") requires
|
|
|
|
that both such properties be found on each symbol that's returned from a scope.
|
|
|
|
This led to C++ code along the lines of:
|
2023-05-04 01:03:58 -07:00
|
|
|
|
|
|
|
```C++
|
|
|
|
auto allPublicSymbols = Flags::PUBLIC;
|
|
|
|
auto allPublicMethods = Flags::PUBLIC | Flags::METHOD;
|
|
|
|
```
|
|
|
|
|
|
|
|
It also turned out convenient to add negative versions of each flag
|
|
|
|
(`NOT_PUBLIC` for private symbols, `NOT_METHOD` for regular old procedures
|
|
|
|
and other definitions, and so on. So, some other possible flag combinations
|
|
|
|
include:
|
|
|
|
|
|
|
|
```C++
|
|
|
|
auto allNonMethods = Flags::NOT_METHOD;
|
|
|
|
auto privateMethods = Flags::NOT_PUBLIC | Flags::METHOD;
|
|
|
|
```
|
|
|
|
|
|
|
|
Given these flags, there are some situations in which checking a scope a
|
|
|
|
second time is redundant, in that it is guaranteed to find no additional
|
|
|
|
symbols. For instance, if you search a scope for all public symbols, and
|
|
|
|
then subsequently search for all public methods, you will only find
|
|
|
|
duplicates -- after all, all public methods are public symbols. Most
|
|
|
|
generally, this occurs when a second search has all the flags from a
|
|
|
|
previous search, and maybe more. In math lingo, if the set of flags checked
|
|
|
|
the first time is a subset of the set of flags checked the second time,
|
|
|
|
it's guaranteed not to find anything new.
|
|
|
|
|
|
|
|
In Dyno, we like to avoid additional work when we can. To do so, we track
|
|
|
|
which scopes have already been searched, and avoid searching them again.
|
|
|
|
Since what comes up from a search depends on the flags, we store the flags
|
|
|
|
alongside the scopes we've checked. __If we find that the previously-checked
|
2023-06-04 21:56:45 -07:00
|
|
|
bitfield is a subset of the current bitset, we just skip the search__.
|
2023-05-04 01:03:58 -07:00
|
|
|
|
|
|
|
But then, what if it _isn't_ a subset? Another concern here is avoiding
|
|
|
|
duplicate results (it's easier to check for duplicate definitions if you
|
|
|
|
know a symbol is only returned from a search once). So, another feature of
|
2023-05-04 21:01:20 -07:00
|
|
|
Dyno's scope search is an additional bitfield of what to _exclude_, which we
|
2023-05-04 01:03:58 -07:00
|
|
|
set to be the previous search's filter. So if the first search looked for
|
2024-05-13 18:58:50 -07:00
|
|
|
symbols matching description \(A\), and the second search is supposed to
|
|
|
|
look for symbols matching description \(B\), __then really we do a search
|
|
|
|
for \(A \land \lnot B\) (that is, \(A\) and not \(B\))__.
|
2023-05-04 01:03:58 -07:00
|
|
|
|
|
|
|
{{< dialog >}}
|
|
|
|
{{< message "question" "reader" >}}
|
2023-05-04 21:01:20 -07:00
|
|
|
Hold on, why do you need a whole another bitfield? There are already negated
|
2023-05-04 01:03:58 -07:00
|
|
|
versions of each flag available. Can't you just add those to the filter?
|
|
|
|
{{< /message >}}
|
|
|
|
{{< message "answer" "Daniel" >}}
|
|
|
|
Good question. The difference is a little bit tricky. If we just negated
|
|
|
|
each flag, we'd turn an expression like \(A \land B\) into \(\lnot A \land
|
2023-06-04 22:03:38 -07:00
|
|
|
\lnot B\). However, according to <a href="https://en.wikipedia.org/wiki/De_Morgan%27s_laws">De Morgan's laws</a>, the proper negation of
|
2023-05-04 01:03:58 -07:00
|
|
|
\(A \land B\) is \(\lnot A \lor \lnot B\) (notice the use of "or" instead
|
2023-05-04 21:01:20 -07:00
|
|
|
of "and"). On the other hand, using an "exclude" bitfield negates the whole
|
2023-05-04 01:03:58 -07:00
|
|
|
conjunction, rather than the individual flags, and so gives us the result
|
|
|
|
we need.
|
|
|
|
{{< /message >}}
|
|
|
|
{{< /dialog >}}
|
|
|
|
|
|
|
|
One last thing: what happens if there were two previous searches? What we
|
|
|
|
need is to to somehow combine the two filters into one. Taking a cue from
|
|
|
|
a previous example, in which "public" was followed by "public methods", we
|
|
|
|
can observe that since the second search has additional flags, it's more
|
|
|
|
restrictive, and thus guaranteed to not find anything. __So we try to create
|
2023-05-04 21:01:20 -07:00
|
|
|
the least restrictive bitfield possible, by taking an intersection of the
|
2023-05-04 01:03:58 -07:00
|
|
|
flags used.__
|
|
|
|
|
|
|
|
Actually, that last point is not quite correct in every possible case
|
|
|
|
(taking the intersection is not always the right thing to do).
|
|
|
|
However, running the code through our test suite, we did not notice any
|
|
|
|
cases in which it misbehaved. So, noting the potential issue in a comment,
|
|
|
|
we moved on to other things.
|
|
|
|
|
|
|
|
That is, until I decided that it was time to add another possible flag to
|
2023-05-04 21:01:20 -07:00
|
|
|
the bitfield. At that point, sitting and trying to reason about the
|
2023-05-04 01:03:58 -07:00
|
|
|
possible cases, I realized that it would be much nicer to describe this
|
|
|
|
mathematically, and have a model checker generate outlandish scenarios for
|
2023-05-14 21:13:23 -07:00
|
|
|
me.
|
2023-05-04 01:03:58 -07:00
|
|
|
|
|
|
|
### Modeling Flags and Bitsets in Alloy
|
|
|
|
Flags are represented on the C++ side as an `enum` (with custom indexing so
|
|
|
|
as to make each flag be exactly one bit). I checked, and it looked like
|
|
|
|
Alloy had an `enum` feature, too! I started off by making an enum of the
|
|
|
|
flags I wanted to play with.
|
|
|
|
|
|
|
|
{{< codelines "Alloy" "dyno-alloy/DynoAlloy.als" 1 1 >}}
|
|
|
|
|
|
|
|
We haven't seen the `MethodOrField` flag, but it's an important one. It
|
|
|
|
turns out that it's much more common to look for anything that could be
|
|
|
|
part of a class, rather than just its methods. This flag is itself an "or"
|
|
|
|
of two properties (something being a method and something being a class
|
|
|
|
field). Note that this is not the same as having two flags, `Method` and
|
|
|
|
`Field`, and always including them together (because that would be an
|
|
|
|
"and", not an "or").
|
|
|
|
|
|
|
|
Notice also that the list of flags doesn't include the negative versions.
|
|
|
|
Since the negative versions are one-for-one with the positive ones, I
|
2023-05-04 21:01:20 -07:00
|
|
|
instead chose to represent bitfields as simply two sets: one set of
|
2023-05-04 01:03:58 -07:00
|
|
|
"positive" flags, in which the presence of e.g. `Method` indicates that the
|
|
|
|
`METHOD` flag was set, and one set of "negative" flags, in which the
|
|
|
|
presence of `Method` indicates that `NOT_METHOD` was set. This way, I'm
|
|
|
|
guaranteed that there's a positive and negative version of each flag,
|
|
|
|
automatically. Here's how I wrote that in Alloy.
|
|
|
|
|
|
|
|
{{< codelines "Alloy" "dyno-alloy/DynoAlloy.als" 6 9 >}}
|
|
|
|
|
2023-05-04 21:01:20 -07:00
|
|
|
This definition (a _signature_ in Alloy terms) specifies what a bitfield is
|
|
|
|
like, but not any operations on it. My next order of business is to define
|
|
|
|
some common functionality on bitfields. Alloy is all about
|
|
|
|
[relations](https://en.wikipedia.org/wiki/Relation_(mathematics)) and
|
|
|
|
[predicates](https://en.wikipedia.org/wiki/Predicate_(mathematical_logic)),
|
|
|
|
so for all of these, I had to effectively write something that _checks_ if
|
|
|
|
some condition holds for some arguments. This might seem abstract; as an
|
|
|
|
example, here's `bitfieldEmpty`, which checks that a bitfield has no flags
|
|
|
|
set.
|
|
|
|
|
2023-05-14 16:00:55 -07:00
|
|
|
{{< codelines "Alloy" "dyno-alloy/DynoAlloy.als" 26 28 >}}
|
2023-05-04 21:01:20 -07:00
|
|
|
|
|
|
|
The `#` operator in Alloy is used to check the size of a set. So, to check
|
|
|
|
if a bitfield is empty, I simply check if there are neither positive nor
|
|
|
|
negative flags. Probably the most unusual aspect of this piece of code is
|
|
|
|
that equality is written as `=`, as opposed to `==` like in most common
|
2023-05-14 16:00:55 -07:00
|
|
|
languages. This is because, like I said, Alloy is all about relations and
|
2023-05-04 21:01:20 -07:00
|
|
|
predicates, and not at all about imperative manipulation of data. So,
|
|
|
|
there's no need to reserve `=` for assignment.
|
|
|
|
|
|
|
|
The next step from here is a predicate that accepts two arguments,
|
|
|
|
`bitfieldEqual`. As its name suggests, this predicate accepts two
|
|
|
|
bitfields, and makes sure they have exactly the same flags set.
|
|
|
|
|
2023-05-14 16:00:55 -07:00
|
|
|
{{< codelines "Alloy" "dyno-alloy/DynoAlloy.als" 30 32 >}}
|
2023-05-04 21:01:20 -07:00
|
|
|
|
|
|
|
So far, this has been pretty similar to just writing boolean functions in a
|
|
|
|
language like C++. However, the similarity is only superficial. An easy way
|
|
|
|
to see that is to try to determine the _intersection_ of two bitfields --
|
|
|
|
that's the operation we will be having to model, since the Dyno
|
|
|
|
implementation uses `&` to combine filter sets. In a language like C++, you
|
|
|
|
might write a function like the following, in which you accept two bitfield
|
|
|
|
arguments and return a new bitfield.
|
|
|
|
|
|
|
|
```C++
|
|
|
|
Bitfield intersection(Bitfield b1, Bitfield b2) { /* ... */ }
|
|
|
|
```
|
|
|
|
|
|
|
|
However, in Alloy, you can't create a new bitfield, nor return something
|
|
|
|
from a `pred` that isn't a boolean. Instead, you describe how the inputs
|
|
|
|
will be related to the output. So, to model a binary function, you end up
|
|
|
|
with a three-parameter predicate: two inputs, and one output. But how
|
|
|
|
_does_ the output of a bitfield intersection connect to the two operands
|
|
|
|
being intersected? Well, its two flag sets will be intersections of the
|
|
|
|
flag sets of the inputs!
|
|
|
|
|
2023-05-14 16:00:55 -07:00
|
|
|
{{< codelines "Alloy" "dyno-alloy/DynoAlloy.als" 34 37 >}}
|
2023-05-04 21:01:20 -07:00
|
|
|
|
|
|
|
Next, let's talk about what flags _do_. They are used to include and
|
|
|
|
exclude symbols based on certain properties. One property is being a
|
|
|
|
method: a `METHOD` flag requires this property, whereas a `NOT_METHOD` flag
|
|
|
|
ensures that a symbol does not have it. Another property is being a public
|
|
|
|
definition: if a symbol isn't public, it'll be ignored by searches with the
|
|
|
|
`PUBLIC` flag set. Just like a bitfield can have multiple flags, a symbol
|
|
|
|
can have multiple properties (e.g., a public method). Unlike our bitfields,
|
|
|
|
though, we won't be modeling symbols as having both positive and negative
|
|
|
|
properties. That is to say, we won't have a "not public" property: the
|
|
|
|
absence of the "public" property will be enough to make something private.
|
2023-05-14 16:00:55 -07:00
|
|
|
Here's the Alloy definition for everything I just said:
|
2023-05-04 21:01:20 -07:00
|
|
|
|
2023-05-14 16:00:55 -07:00
|
|
|
{{< codelines "Alloy" "dyno-alloy/DynoAlloy.als" 59 63 >}}
|
2023-05-04 21:01:20 -07:00
|
|
|
|
2023-06-04 21:56:45 -07:00
|
|
|
Now, we can specify how flags in a bitfield relate to properties on a
|
2023-05-04 21:01:20 -07:00
|
|
|
symbol. We can do so by saying which flags match which properties. The
|
|
|
|
`Method` flag, for instance, will be satisfied by the `PMethod` property.
|
|
|
|
The `MethodOrField` flag is more lenient, and will be satisfied by either
|
|
|
|
`PMethod` or `PField`. Here's a predicate `flagMatchesProperty` that
|
|
|
|
encodes all the flag-property combinations:
|
|
|
|
|
2023-05-14 16:00:55 -07:00
|
|
|
{{< codelines "Alloy" "dyno-alloy/DynoAlloy.als" 65 69 >}}
|
2023-05-04 21:01:20 -07:00
|
|
|
|
|
|
|
A bitfield matching a symbol is a little bit more complicated. Said
|
|
|
|
informally, the condition for a bitfield matching a symbol is twofold:
|
|
|
|
|
|
|
|
* Every single positive flag, like `METHOD`, must be satisfied by a
|
|
|
|
property on the symbol.
|
|
|
|
* None of the negative flags, like `NOT_METHOD`, must be satisfied by a
|
|
|
|
property on the symbol (that is to say, if `Method` is in the negative
|
|
|
|
flags set, then the symbol must not have `PMethod` property). It is more
|
|
|
|
conveniently to formulate this -- equivalently -- as follows: for each
|
2023-06-04 21:56:45 -07:00
|
|
|
negative flag, there must not be a property that satisfies it.
|
2023-05-04 21:01:20 -07:00
|
|
|
|
2023-06-04 21:56:45 -07:00
|
|
|
Each of the above two conditions translates quite literally into Alloy:
|
2023-05-04 21:01:20 -07:00
|
|
|
|
2023-05-14 16:00:55 -07:00
|
|
|
{{< codelines "Alloy" "dyno-alloy/DynoAlloy.als" 71 74 >}}
|
2023-05-04 21:01:20 -07:00
|
|
|
|
|
|
|
We can read line 73 as "for each flag in a bitfield's positive flags, there
|
|
|
|
must be some property in the symbol that matches it". Similarly, line 74
|
|
|
|
can be read out loud as "for each flag in the negative flags, no property
|
|
|
|
in the symbol must match it".
|
|
|
|
|
2023-05-14 16:00:55 -07:00
|
|
|
We've written a fair bit of Alloy. If you're anything like me, you might be
|
2023-05-04 21:01:20 -07:00
|
|
|
getting a bit twitchy: how do we even check that any of this works? For
|
|
|
|
this, we'll need to run our model. We will give Alloy a claim, and ask
|
|
|
|
it to find a situation in which that claim holds true. The simplest claim
|
|
|
|
is "there exists a bitfield".
|
|
|
|
|
2023-05-14 16:00:55 -07:00
|
|
|
{{< codelines "Alloy" "dyno-alloy/DynoAlloy.als" 76 78 >}}
|
2023-05-04 21:01:20 -07:00
|
|
|
|
|
|
|
Executing this model yields a pretty interesting bitfield: one in which every single flag is set -- both the positive and negative versions.
|
|
|
|
|
|
|
|
{{< figure src="bitfield_exists.png" caption="Alloy's output satisfying \"a bit field exists\"" >}}
|
|
|
|
|
|
|
|
That's a little bit ridiculous: this bitfield will never match anything!
|
|
|
|
You can't be and not be a method at the same time, for instance. For for a
|
|
|
|
more interesting example, let's ask for a bitfield that matches some
|
|
|
|
symbol.
|
|
|
|
|
2023-05-14 16:00:55 -07:00
|
|
|
{{< codelines "Alloy" "dyno-alloy/DynoAlloy.als" 80 82 >}}
|
2023-05-04 21:01:20 -07:00
|
|
|
|
|
|
|
The output here is pretty interesting too. Alloy finds a symbol and a
|
|
|
|
bitfield that matches it, but they're both empty. In effect, it said:
|
|
|
|
"if you don't specify any filters, any private definition will match". Fair
|
|
|
|
enough, of course, but a curious departure from the previous maximalist
|
|
|
|
"put in all the flags!" approach.
|
|
|
|
|
|
|
|
{{< figure src="matching_bitfield_exists.png" caption="Alloy's output satisfying \"a bit field that matches a symbol exists\"" >}}
|
|
|
|
|
|
|
|
Let's try nudge it towards a more interesting case. I'm going to ask for a
|
|
|
|
filter with one positive and one negative flag, and a symbol with two
|
|
|
|
properties.
|
|
|
|
|
2023-05-14 16:00:55 -07:00
|
|
|
{{< codelines "Alloy" "dyno-alloy/DynoAlloy.als" 84 91 >}}
|
2023-05-04 21:01:20 -07:00
|
|
|
|
|
|
|
The results are more interesting this time: we get a filter for private
|
|
|
|
methods, and a private symbol that was... both a field and a method?
|
|
|
|
|
|
|
|
{{< figure src="matching_bitfield_exists_2.png" caption="Alloy's spiced up output satisfying \"a bit field that matches a symbol exists\"" >}}
|
|
|
|
|
2023-05-14 16:00:55 -07:00
|
|
|
We never told Alloy that a symbol can't be both a field and a method. It
|
2023-05-04 21:01:20 -07:00
|
|
|
had no idea what the flags meant, just that they exist.
|
|
|
|
To let Alloy know what we do -- that the two properties are incompatible --
|
|
|
|
we can use a _fact_. To me, the most natural way of phrasing this is "there
|
|
|
|
is never a symbol that has both the method and field properties". Alas,
|
|
|
|
Alloy doesn't have a `never` keyword; it only has `always`. So I opt instead
|
|
|
|
for an alternative formulation: "there are always zero symbols that are
|
2023-05-14 16:00:55 -07:00
|
|
|
both methods and fields". In Alloy, the claim looks like this:
|
2023-05-04 21:01:20 -07:00
|
|
|
|
2023-05-14 16:00:55 -07:00
|
|
|
{{< codelines "Alloy" "dyno-alloy/DynoAlloy.als" 93 98 >}}
|
2023-05-04 21:01:20 -07:00
|
|
|
|
2023-05-14 16:00:55 -07:00
|
|
|
Re-running the example program with this fact, Alloy spits out a filter for
|
2023-05-04 21:01:20 -07:00
|
|
|
public non-method symbols, and a symbol that's a public field. Public
|
|
|
|
fields also aren't a thing in Chapel (all fields in a class are publicly
|
|
|
|
readable in the current version of the language). Perhaps it's time for
|
|
|
|
another fact.
|
|
|
|
|
2023-05-14 16:00:55 -07:00
|
|
|
{{< codelines "Alloy" "dyno-alloy/DynoAlloy.als" 99 103 >}}
|
2023-05-04 21:01:20 -07:00
|
|
|
|
|
|
|
But now, Alloy fails to come up with anything at all. That makes sense: by
|
|
|
|
restricting the search to a symbol with two properties, and making `PField`
|
|
|
|
incompatible with the other two possible properties, we've guaranteed that
|
|
|
|
our symbol would be a public method. But then, we also required a negative
|
|
|
|
flag in the filter; however, all the flags in the list match a public
|
|
|
|
method, so making any of them negative would guarantee that our symbol
|
|
|
|
would not be found. Let's change the example up a bit to only ask for
|
|
|
|
positive flags.
|
|
|
|
|
2023-05-14 16:00:55 -07:00
|
|
|
{{< codelines "Alloy" "dyno-alloy/DynoAlloy.als" 105 111 >}}
|
2023-05-04 21:01:20 -07:00
|
|
|
|
2023-05-14 16:00:55 -07:00
|
|
|
This time, Alloy gives us a symbol that's a public method, and a filter
|
2023-05-04 21:01:20 -07:00
|
|
|
that only looks for public methods. Fair enough.
|
|
|
|
|
|
|
|
{{< figure src="matching_bitfield_exists_3.png" caption="Alloy's spiced up output satisfying \"a bit field that matches a symbol exists\"" >}}
|
|
|
|
|
2023-05-14 16:00:55 -07:00
|
|
|
### Exploring Possible Search Configurations
|
|
|
|
So now we have a descriptioin of filters and symbols in scopes. The next thing
|
|
|
|
on the itinerary is modeling how the filters (include and exclude) are
|
|
|
|
configured during scope search in Dyno. For this, let's take a look at the
|
|
|
|
C++ code in Dyno.
|
|
|
|
|
|
|
|
I'll be using the branch that I was working on at the time of trying to
|
|
|
|
apply Alloy. First, here's the code in C++ that defines the various flags
|
|
|
|
I'd be working with (though I've omitted flags that are not currently
|
|
|
|
used in the implementation).
|
|
|
|
|
2023-10-09 14:41:03 -07:00
|
|
|
{{< githubsnippet "chapel-lang/chapel" "390187df504f58cbf721a87d5632cdf7ea37563f" "frontend/include/chpl/resolution/scope-types.h" "C++" 45 >}}
|
2023-05-14 16:00:55 -07:00
|
|
|
enum {
|
|
|
|
/** Public */
|
|
|
|
PUBLIC = 1,
|
|
|
|
/** Not public (aka private) */
|
|
|
|
NOT_PUBLIC = 2,
|
|
|
|
/** A method or field declaration */
|
|
|
|
METHOD_FIELD = 4,
|
|
|
|
/** Something other than (a method or field declaration) */
|
|
|
|
NOT_METHOD_FIELD = 8,
|
|
|
|
/** A method declaration */
|
|
|
|
METHOD = 64,
|
|
|
|
/** Something other than a method declaration */
|
|
|
|
NOT_METHOD = 128,
|
|
|
|
};
|
2023-10-09 14:41:03 -07:00
|
|
|
{{< /githubsnippet >}}
|
2023-05-14 16:00:55 -07:00
|
|
|
|
|
|
|
These are the flags that we model using a `Bitset`: `PUBLIC`,
|
|
|
|
`METHOD_FIELD`, and `METHOD` are modeled using `positiveFlags`, and
|
|
|
|
`NOT_PUBLIC`, `NOT_METHOD_FIELD`, and `NOT_METHOD` are modeled using
|
|
|
|
`negativeFlags`. There are a lot of flags here, and it's not hard to
|
|
|
|
imagine that _some_ combination of these flags will cause problems in our
|
|
|
|
system (particularly when we _know_ it's an approximation). However, the
|
|
|
|
flags aren't used arbitrarily; in fact, it wasn't too hard to track down the
|
|
|
|
most important place in the code where bitsets are built.
|
|
|
|
|
2023-10-09 14:41:03 -07:00
|
|
|
{{< githubsnippet "chapel-lang/chapel" "390187df504f58cbf721a87d5632cdf7ea37563f" "frontend/lib/resolution/scope-queries.cpp" "C++" 914 >}}
|
2023-05-14 16:00:55 -07:00
|
|
|
IdAndFlags::Flags curFilter = 0;
|
|
|
|
/* ... some unrelated code ... */
|
|
|
|
if (skipPrivateVisibilities) {
|
|
|
|
curFilter |= IdAndFlags::PUBLIC;
|
|
|
|
}
|
|
|
|
if (onlyMethodsFields) {
|
|
|
|
curFilter |= IdAndFlags::METHOD_FIELD;
|
|
|
|
} else if (!includeMethods && receiverScopes.empty()) {
|
|
|
|
curFilter |= IdAndFlags::NOT_METHOD;
|
|
|
|
}
|
2023-10-09 14:41:03 -07:00
|
|
|
{{< /githubsnippet >}}
|
2023-05-14 16:00:55 -07:00
|
|
|
|
|
|
|
The above code converts the current search parameters into `Bitfield`
|
|
|
|
flags. For instance, if a `use` statement is being processed that doesn't
|
|
|
|
have access to private fields, `skipPrivateVisibilities` will be set.
|
|
|
|
On the other hand, if the calling code didn't explicitly ask for methods,
|
|
|
|
and if there's no method receiver, then the last condition will be true.
|
|
|
|
These various conditions are converted into bits and applied to
|
|
|
|
`curFilter`. Then, `curFilter` is used for looking up symbols in a scope.
|
|
|
|
|
|
|
|
It's not too hard to model this by just looking at the code, and
|
|
|
|
enumerating the possibilities. The first `if` statement can either be true
|
|
|
|
or false, and then the subsequent `if`-`else` chain creates three
|
|
|
|
possibilities in each case: either `METHOD_FIELD` is set, or `NOT_METHOD`,
|
|
|
|
or nothing.
|
|
|
|
|
|
|
|
However, I envisioned this condition to possibly grow in complexity as more
|
|
|
|
search configurations became necessary (in that, the `NOT_METHOD` option
|
|
|
|
was an addition in my new branch). I therefore chose to model the possible
|
|
|
|
`Bitfield` values more faithfully, by mimicking the imperative C++ code.
|
|
|
|
|
|
|
|
{{< dialog >}}
|
|
|
|
{{< message "question" "reader" >}}
|
|
|
|
Wait, something sounds off. Just earlier, you said Alloy "is not at all about
|
|
|
|
imperative manipulation of data". But now, we're going to mimic plain
|
|
|
|
imperative C++ code?
|
|
|
|
{{< /message >}}
|
|
|
|
{{< message "answer" "Daniel" >}}
|
|
|
|
Alloy the programming language is still not imperative. However, we can
|
|
|
|
<em>model</em> imperative behavior in Alloy. The way I see it, doing so
|
|
|
|
requires us to venture a tiny bit into the realm of <em>semantics</em>
|
|
|
|
for programming languages, in particular for imperative languages. This
|
|
|
|
"venture" is very minimal though, and you really don't need to know much
|
|
|
|
about semantics to understand it.
|
|
|
|
{{< /message >}}
|
|
|
|
{{< message "question" "reader" >}}
|
|
|
|
Alright. How does one model imperative behavior in Alloy?
|
|
|
|
{{< /message >}}
|
|
|
|
{{< message "answer" "Daniel" >}}
|
|
|
|
On to that next.
|
|
|
|
{{< /message >}}
|
|
|
|
{{< /dialog >}}
|
|
|
|
|
|
|
|
The essential piece of insight to modeling an imperative language, though
|
|
|
|
it sounds a little bit tautological, is that _statements are all about
|
|
|
|
manipulating state_. For example, state could be the value of a variable.
|
|
|
|
If you start with the variable `x` storing the number `6`, and then execute
|
|
|
|
the statement `x = x * 7`, the final value of `x` will be `42`. Thus, state
|
|
|
|
has changed. To put this in terms Alloy would understand -- relations and
|
|
|
|
sets -- a statement connects (relates) states before it's executed to states
|
|
|
|
after it's executed. In our particular example, the connection would
|
|
|
|
between the state `x = 6` and the state `x = 42`. In the case of adding the
|
|
|
|
`PUBLIC` to `curFilter`, as on line 917 in the above code block, we could
|
|
|
|
state the relationship as follows:
|
|
|
|
|
|
|
|
```Alloy
|
|
|
|
addBitfieldFlag[bitfieldBefore, bitfieldAfter, Public]
|
|
|
|
```
|
|
|
|
|
|
|
|
The above code states that `bitfieldAfter` (the state _after_ line 917) is
|
|
|
|
the same `Bitfield` as `bitfieldBefore` (the state _before_ line 917), except
|
|
|
|
that the `Public` flag has been added to it.
|
|
|
|
|
|
|
|
Things are a little more complicated when it comes to modeling the whole
|
|
|
|
`if`-statement on line 916. If we wanted to be very precise, we'd need to
|
|
|
|
encode the other variables (such as `skipPrivateVisibilities`), how they're
|
|
|
|
set, and what values are possible. However, for the sake of keeping the
|
|
|
|
scope of this model manageable for the time being, I'm content to do
|
|
|
|
something simpler -- that is, acknowledge that the code on line 917 may or
|
|
|
|
may not run. If it does run, our previous `addBitfieldFlag` will be the
|
|
|
|
correct restriction on the before and after states. However, if it doesn't,
|
|
|
|
the state shouldn't change at all. Therefore, we can model lines 916
|
|
|
|
through 918 as follows (notice the `or`):
|
|
|
|
|
|
|
|
```Alloy
|
|
|
|
addBitfieldFlag[bitfieldBefore, bitfieldAfter, Public] or
|
|
|
|
bitfieldEqual[bitfieldBefore, bitfieldAfter]
|
|
|
|
```
|
|
|
|
|
|
|
|
The next thing to note is that there are two `if` statements one after another.
|
|
|
|
The state "after" the first statement is one and the same as the state
|
|
|
|
"before" the second statement. Using arrows to represent the "before-after"
|
|
|
|
relationship created by each statement, we can visualize the whole
|
|
|
|
situation as follows:
|
|
|
|
|
|
|
|
{{< latex >}}
|
|
|
|
\text{initial state}
|
|
|
|
\xRightarrow{\text{first statement}}
|
|
|
|
\text{middle state}
|
|
|
|
\xRightarrow{\text{second statement}}
|
|
|
|
\text{final state}
|
|
|
|
{{< /latex >}}
|
|
|
|
|
|
|
|
We'll write our Alloy code to match:
|
|
|
|
|
|
|
|
```Alloy
|
|
|
|
/* First if statement */
|
|
|
|
addBitfieldFlag[bitfieldBefore, bitfieldMiddle, Public] or
|
|
|
|
bitfieldEqual[bitfieldBefore, bitfieldMiddle]
|
|
|
|
|
|
|
|
/* ... something connecting bitfieldMiddle and bitfieldAfter ... */
|
|
|
|
```
|
|
|
|
|
|
|
|
From here, we can handle the second `if`/`else` chain in the same way we
|
|
|
|
did the first `if`-statement: by making all three outcomes of the chain be
|
|
|
|
possible, and creating an `or` of all of them.
|
|
|
|
|
|
|
|
```Alloy
|
|
|
|
/* First if statement */
|
|
|
|
addBitfieldFlag[bitfieldBefore, bitfieldMiddle, Public] or
|
|
|
|
bitfieldEqual[bitfieldBefore, bitfieldMiddle]
|
|
|
|
|
|
|
|
/* Second if statement */
|
|
|
|
addBitfieldFlag[bitfieldMiddle, bitfieldAfter, MethodOrField] or
|
|
|
|
addBitfieldFlagNeg[bitfieldMiddle, bitfieldAfter, Method] or
|
|
|
|
bitfieldEqual[bitfieldMiddle, bitfieldAfter]
|
|
|
|
```
|
|
|
|
|
|
|
|
So that helps model the relevant Dyno code. However, what we really want is
|
|
|
|
an Alloy predicate that classifies possible outcomes of the piece of code:
|
|
|
|
is a particular combination of flags possible or not? Here's the piece of
|
|
|
|
Alloy that does so:
|
|
|
|
|
|
|
|
{{< codelines "Alloy" "dyno-alloy/DynoAlloy.als" 113 132 >}}
|
|
|
|
|
|
|
|
The `FilterState` on the first line (and elsewhere, really), is new. I'm
|
|
|
|
trying to be explicit about the state in this particular computation. Its
|
|
|
|
definition is very simple: currently, the only state we care about is the
|
|
|
|
`Bitfield` corresponding to `curFilter` in the C++ code above.
|
|
|
|
|
|
|
|
{{< codelines "Alloy" "dyno-alloy/DynoAlloy.als" 12 14 >}}
|
|
|
|
|
|
|
|
There's not much more to the predicate. It says, in English, that a state
|
|
|
|
`filterState` is possible if, starting from an empty initial state
|
|
|
|
`initialState`, the model of our C++ code can end up with its particular
|
|
|
|
set of flags in the `curFilter` bitfield.
|
|
|
|
|
2023-05-14 21:13:23 -07:00
|
|
|
### Modeling Search State
|
|
|
|
|
2023-05-14 16:00:55 -07:00
|
|
|
Next, I needed to model the behavior the I described earlier: searching for
|
2024-05-13 18:58:50 -07:00
|
|
|
\(A \land \lnot B\), and taking the intersection of past searches
|
2023-05-14 16:00:55 -07:00
|
|
|
when running subsequent searches.
|
|
|
|
|
|
|
|
Dyno implemented this roughly as follows:
|
|
|
|
|
|
|
|
1. It kept a mapping of (searched scope → search bitfield). Initially, this
|
|
|
|
mapping was empty.
|
|
|
|
2. When a scope was searched for the first time, its `curFilter` / search
|
|
|
|
bitfield was stored into the mapping.
|
|
|
|
3. When a scope was searched after that, the previously-stored flags in the
|
2024-05-13 18:58:50 -07:00
|
|
|
mapping were excluded (that's the \(A\land\lnot B\) behavior), and
|
2023-05-14 16:00:55 -07:00
|
|
|
the bitfield in the mapping was updated to be the intersection of
|
|
|
|
`curFilter` and the stored flags.
|
|
|
|
|
|
|
|
We'll simplify the model by doing away with the mapping, and considering
|
|
|
|
only a single scope that is searched many times. We'll represent the stored
|
|
|
|
flags as a field `found`, which will be one of two things: either a
|
|
|
|
`Bitfield` representing the previously-stored search configuration, or a
|
|
|
|
`NotSet` sentinel value, representing a scope that hasn't been searched
|
|
|
|
yet. The Alloy code:
|
|
|
|
|
2023-05-14 21:23:22 -07:00
|
|
|
{{< codelines "alloy" "dyno-alloy/DynoAlloy.als" 21 23 >}}
|
2023-05-14 16:00:55 -07:00
|
|
|
|
|
|
|
The `NotSet` sentinel value is defined in a very simple way:
|
|
|
|
|
|
|
|
{{< codelines "Alloy" "dyno-alloy/DynoAlloy.als" 17 17 >}}
|
|
|
|
|
|
|
|
Both of these signatures use a new keyword, `one`. This keyword means that
|
|
|
|
there's only a single instance of both `NotSet` and `SearchState` in our
|
|
|
|
model. This is in contrast to a signature like `Bitfield,` which allows
|
|
|
|
multiple bitfields to exist at the same time. I ended up with a pretty
|
2023-05-14 21:13:23 -07:00
|
|
|
simple predicate that implemented the "store if not set, intersect if set"
|
2023-05-14 16:00:55 -07:00
|
|
|
behavior in Alloy:
|
|
|
|
|
|
|
|
{{< codelines "Alloy" "dyno-alloy/DynoAlloy.als" 147 150 >}}
|
|
|
|
|
2023-05-14 21:13:23 -07:00
|
|
|
If you look closely, this predicate uses a feature of Alloy we haven't
|
2023-05-14 16:00:55 -07:00
|
|
|
really seen: its ability to reason about time by dipping into _temporal logic_.
|
|
|
|
Notice that the predicate is written not just in terms of `toSet`, but also
|
|
|
|
`toSet'`. The tick (which I personally read as "prime") indicates that what
|
|
|
|
we're talking about is not the _current_ value of `toSet`, but its value at
|
2023-05-14 21:13:23 -07:00
|
|
|
the _next moment in time_.
|
2023-05-14 16:00:55 -07:00
|
|
|
|
2023-05-14 21:13:23 -07:00
|
|
|
The first line of the predicate represents the second item from the list
|
|
|
|
above: if a scope hasn't been searched before (represented by the _present_
|
|
|
|
value of `toSet` being `NotSet`) the future value (represented by `toSet'`)
|
|
|
|
is just the current filter / bitfield. The second line handles the third item
|
|
|
|
from the list, updating a previously-set filter based on new flags. I defined
|
|
|
|
an additional predicate to help with this:
|
2023-05-04 01:03:58 -07:00
|
|
|
|
2023-05-14 21:13:23 -07:00
|
|
|
{{< codelines "Alloy" "dyno-alloy/DynoAlloy.als" 138 140 >}}
|
2023-05-14 16:00:55 -07:00
|
|
|
|
2023-05-14 21:13:23 -07:00
|
|
|
What this predicate says is that _at the next moment_, the value of `toSet`
|
|
|
|
will be equal to its present value intersected with `curFilter`. I also had
|
|
|
|
to specify that the future value of `toSet`, will still be a
|
|
|
|
`Bitfield` after the step, and would not revert to a `NotSet`.
|
2023-05-14 16:00:55 -07:00
|
|
|
|
2023-05-14 21:13:23 -07:00
|
|
|
With the `updateOrSet` predicate in hand, we can actually specify how our
|
|
|
|
model will evolve. To do so, we first need to specify the initial
|
|
|
|
conditions. In particular, our scope will start out not having been
|
|
|
|
searched; its flags will be `NotSet`.
|
2023-05-04 01:03:58 -07:00
|
|
|
|
2023-05-14 21:13:23 -07:00
|
|
|
{{< codelines "Alloy" "dyno-alloy/DynoAlloy.als" 138 140 >}}
|
2023-05-04 01:03:58 -07:00
|
|
|
|
2023-05-14 21:13:23 -07:00
|
|
|
Next, we must specify that our `SearchState` changes in a very particular
|
|
|
|
way: each step, the code invokes a search, and the state is modified to
|
|
|
|
record that the search occurred. Each search is described via `curFilter`
|
|
|
|
in a `filterState`. We want to ensure that `curFilter` is a reasonable
|
|
|
|
filter (that is, it's a combination of flags that can actually arise in the
|
|
|
|
C++ program). To ensure this, we can use the `possibleState` predicate from
|
|
|
|
earlier. From there, the `updateOrSet` predicate can be used to specify
|
|
|
|
that this step's `curFilter` is saved, either as-is (if no searches
|
|
|
|
occurred previously) or as an intersection (if this is not the first
|
|
|
|
search). The whole fact corresponding to this is below:
|
|
|
|
|
|
|
|
{{< codelines "Alloy" "dyno-alloy/DynoAlloy.als" 161 175 >}}
|
|
|
|
|
|
|
|
### Asking for Counterexamples
|
|
|
|
|
|
|
|
As we've already seen, Alloy works by finding examples: combinations of
|
|
|
|
various variables that match our requirements. It won't be sufficient to
|
|
|
|
ask Alloy for an example of our code doing what we expect: if the code
|
|
|
|
malfunctions nine times out of ten, Alloy will still find us the one case
|
|
|
|
in which it works. It won't tell us much.
|
|
|
|
|
|
|
|
Instead, we have to ask it to find a _counterexample_: a case which does
|
|
|
|
_not_ work. If Alloy succeeds in finding such an example, the code we're
|
|
|
|
modeling has a bug. Of course, to make all this work, you need to know what
|
|
|
|
to ask. There's no way to tell Alloy, "find me a bug" -- we need to be more
|
|
|
|
specific. I had to focus on bugs I was most worried about.
|
|
|
|
|
|
|
|
If the stored combination of flags (in `found`) evolves into a bad
|
|
|
|
configuration, things can go wrong in two ways. The first is that we will
|
|
|
|
somehow exclude symbols from the lookup that shouldn't have been excluded.
|
|
|
|
In other words, can past searches break future searches?
|
|
|
|
|
|
|
|
I came up with the following Alloy (counter)example to model this
|
|
|
|
situation. It's a little bit long; there are comments there to explain what
|
|
|
|
it does, and I'll go through below.
|
|
|
|
|
|
|
|
{{< codelines "Alloy" "dyno-alloy/DynoAlloy.als" 177 202 >}}
|
|
|
|
|
|
|
|
This example asks that at some point in time, things "go wrong". In
|
|
|
|
particular, will there by a symbol (`symbol`) that hasn't been found yet,
|
|
|
|
such that a search for a particular filter (`fs`) will break the system,
|
|
|
|
making a subsequent search `fsBroken` not find `symbol` even though it
|
|
|
|
should have?
|
|
|
|
|
|
|
|
The `possibleState`, `updateOrSet`, and `excludeBitfield`
|
|
|
|
lines encode the fact that a search occurred for `fs`. This must be a valid
|
|
|
|
search, and the search state must be modified appropriately. Furthermore,
|
2024-05-13 18:58:50 -07:00
|
|
|
at the time this search takes place, to make the \(\lnot B\) portion of
|
2023-05-14 21:13:23 -07:00
|
|
|
the algorithm work, the bitfield `exclude1` will be set based on the
|
|
|
|
previous search state.
|
|
|
|
|
|
|
|
The next two lines, `possibleState` and `excludeBitfield`, set the stage for
|
|
|
|
the broken search: `fsBroken` is a another valid search, and at the time it
|
|
|
|
happens, the bitfield `exclude2` is set based on previous search state.
|
|
|
|
Since `fsBroken` occurs after `fs`, its "previous search state" is actually
|
|
|
|
the state _after_ `fs`, so we use `found'` instead of `found`.
|
|
|
|
|
|
|
|
Finally, the subsequent four lines of code describe the issue: the symbol
|
|
|
|
in question has not been found before `fs`, and nor will it be found by
|
|
|
|
`fs`. That means thus far, it hasn't been reported to the user.
|
|
|
|
Therefore, if the symbol matches `fsBroken`, it ought to be reported: we haven't
|
|
|
|
seen it yet, and here we're being asked for something matching the symbol's
|
|
|
|
description! However, as per the last line of code, searching for
|
|
|
|
`fsBroken` together with the appropriate set of exclude flags, we still
|
|
|
|
don't find `symbol`. That's a problem!
|
|
|
|
|
|
|
|
Unfortunately, Alloy finds a model that satisfies this constraint. There
|
|
|
|
are a lot of moving parts, so the output is a bit difficult to read. I did
|
|
|
|
my best to clean it up by turning off some arrows. Our system is spanning
|
|
|
|
multiple "moments" in time, so a single picture won't describe the bug
|
|
|
|
entirely. Here's the diagram Alloy outputs for the first state:
|
|
|
|
|
|
|
|
{{< figure src="bug.png" caption="Figure representing the initial state according to Alloy" class="fullwide" >}}
|
|
|
|
|
|
|
|
We can get a lot out of this figure. First, the symbol-to-be-lost is a
|
|
|
|
private method (it doesn't have the `PPublic` property, and it does have
|
|
|
|
the `PMethod` property). Also, Alloy immediately gives away what `fs` and
|
|
|
|
`fsBroken` will be: eventually, when the user searches for all
|
|
|
|
_non-methods_ (`negativeFlags: Method` are the giveaway there), their
|
|
|
|
subsequent search for _anything_ will fail to come up with our private
|
|
|
|
method, even though it should. To gather more details about this broken
|
|
|
|
case, we can look at the state that follows the initial one.
|
|
|
|
|
|
|
|
{{< figure src="bug_2.png" caption="Figure representing the second state according to Alloy" class="fullwide" >}}
|
|
|
|
|
|
|
|
The main difference is that `found` has changed from `NotSet` (because no
|
|
|
|
searches occurred) to `FilterState1`. This indicates that the first search
|
|
|
|
was for all `Public` symbols (which our method is not). There is only one
|
|
|
|
more state after this:
|
|
|
|
|
|
|
|
{{< figure src="bug_3.png" caption="Figure representing the final state according to Alloy" class="fullwide" >}}
|
|
|
|
|
|
|
|
In the above diagram, `found` has changed once again, this time to an empty
|
|
|
|
bitfield. This is a valid behavior for our system. Recall that `fs` was a
|
|
|
|
search for non-methods, and that the intersection of `NOT_METHOD` and `PUBLIC`
|
|
|
|
is empty. Thus, `found` will be set to the empty `bitfield`, which
|
|
|
|
(incorrectly) indicates that all symbols have been searched for! After
|
|
|
|
this, any search would fail: `fsBroken` doesn't have any flags set, and
|
|
|
|
still, nothing is reported.
|
|
|
|
|
|
|
|
Now, this doesn't definitively prove the compiler is broken: it's possible
|
|
|
|
that there isn't a situation in which three searches like this (`PUBLIC`,
|
|
|
|
then `NOT_METHOD`, then anything) will occur in practice. However, this
|
|
|
|
gave the "motif" for reproducing the bug. All I had to do was find a
|
|
|
|
real-life case that matched the counterexample.
|
|
|
|
|
|
|
|
It was a little easier to find a reproducer for a similar counterexample,
|
|
|
|
actually. By inspection, I noticed that the same bug would occur if the
|
|
|
|
second search was for `METHOD_OR_FIELD`, and not for `NOT_METHOD`. I was
|
|
|
|
able to come up with a (fairly convoluted) example of Chapel code that
|
|
|
|
triggered the issue. I include it here as a curiosity; there's no need to
|
|
|
|
understand how exactly it works.
|
2023-05-04 01:03:58 -07:00
|
|
|
|
2023-05-14 21:13:23 -07:00
|
|
|
```Chapel
|
|
|
|
module TopLevel {
|
|
|
|
module XContainerUser {
|
|
|
|
public use TopLevel.XContainer; // Will search for public, to no avail.
|
|
|
|
}
|
|
|
|
module XContainer {
|
|
|
|
private var x: int;
|
|
|
|
record R {} // R is in the same scope as x so it won't set public
|
|
|
|
module MethodHaver {
|
|
|
|
use TopLevel.XContainerUser;
|
|
|
|
use TopLevel.XContainer;
|
|
|
|
proc R.foo() {
|
|
|
|
var y = x;
|
|
|
|
}
|
2023-05-04 01:03:58 -07:00
|
|
|
}
|
2023-05-14 21:13:23 -07:00
|
|
|
}
|
2023-05-04 01:03:58 -07:00
|
|
|
}
|
|
|
|
```
|
|
|
|
|
2023-05-14 21:13:23 -07:00
|
|
|
Alas, the two-bitfield system is not just an approximation, it malfunctions
|
|
|
|
in practice. I submitted a PR to fix the issue.
|