| Semantics | ||||||||
|---|---|---|---|---|---|---|---|---|
| ||||||||
| Semantics of programming languages | ||||||||
| ||||||||
Predicate transformer semantics were introduced byEdsger Dijkstra in his seminal paper "Guarded commands, nondeterminacy and formal derivation of programs". They define the semantics of animperative programming paradigm by assigning to eachstatement in this language a correspondingpredicate transformer: atotal function between twopredicates on the state space of the statement. In this sense, predicate transformer semantics are a kind ofdenotational semantics. Actually, inguarded commands, Dijkstra uses only one kind of predicate transformer: the well-knownweakest preconditions (see below).
Moreover, predicate transformer semantics are a reformulation ofFloyd–Hoare logic. Whereas Hoare logic is presented as adeductive system, predicate transformer semantics (either byweakest-preconditions or bystrongest-postconditions see below) arecomplete strategies to buildvalid deductions of Hoare logic. In other words, they provide an effectivealgorithm to reduce the problem of verifying a Hoare triple to the problem of proving afirst-order formula. Technically, predicate transformer semantics perform a kind ofsymbolic execution of statements into predicates: execution runsbackward in the case of weakest-preconditions, or runsforward in the case of strongest-postconditions.
For a statementS and apostconditionR, aweakest precondition is a predicateQ such that for anypreconditionP, if and only if. In other words, it is the "loosest" or least restrictive requirement needed to guarantee thatR holds afterS. Uniqueness follows easily from the definition: If bothQ andQ' are weakest preconditions, then by the definition so and so, and thus. We often use to denote the weakest precondition for statementS with respect to a postconditionR.
We use T to denote the predicate that is everywhere true and F to denote the one that is everywhere false. We shouldn't at least conceptually confuse ourselves with a Boolean expression defined by some language syntax, which might also contain true and false as Boolean scalars. For such scalars we need to do a type coercion such that we have T = predicate(true) and F = predicate(false). Such a promotion is carried out often casually, so people tend to take T as true and F as false.
We give below two equivalent weakest-preconditions for the assignment statement. In these formulas, is a copy ofR wherefree occurrences ofx are replaced byE. Hence, here, expressionE is implicitly coerced into avalid term of the underlying logic: it is thus apure expression, totally defined, terminating and without side effect.
wherey is a fresh variable and not free in E and R (representing the final value of variablex) |
Provided that E is well defined, we just apply the so-calledone-point rule on version 1. Then
The first version avoids a potential duplication ofx inR, whereas the second version is simpler when there is at most a single occurrence ofx inR. The first version also reveals a deep duality between weakest-precondition and strongest-postcondition (see below).
An example of a valid calculation ofwp (using version 2) for assignments with integer valued variablex is:
This means that in order for the postconditionx > 10 to be true after the assignment, the preconditionx > 15 must be true before the assignment. This is also the "weakest precondition", in that it is the "weakest" restriction on the value ofx which makesx > 10 true after the assignment.
For example,
As example:
Ignoring termination for a moment, we can define the rule for theweakest liberal precondition, denotedwlp, using a predicateINV, called theLoopINVariant, typically supplied by the programmer:
To show total correctness, we also have to show that the loop terminates. For this we define awell-founded relation on the state space denoted as (wfs, <) and define a variant functionvf , such that we have:
wherev is a fresh tuple of variables |
Informally, in the above conjunction of three formulas:
However, the conjunction of those three is not a necessary condition. Exactly, we have
Actually, Dijkstra'sGuarded Command Language (GCL) is an extension of the simple imperative language given until here with non-deterministic statements. Indeed, GCL aims to be a formal notation to define algorithms. Non-deterministic statements represent choices left to the actual implementation (in an effective programming language): properties proved on non-deterministic statements are ensured for all possible choices of implementation. In other words, weakest-preconditions of non-deterministic statements ensure
Notice that the definitions of weakest-precondition given above (in particular forwhile-loop) preserve this property.
Selection is a generalization ofif statement:
Here, when two guards and are simultaneously true, then execution of this statement can run any of the associated statement or.
Repetition is a generalization ofwhile statement in a similar way.
Refinement calculus extends GCL with the notion ofspecification statement. Syntactically, we prefer to write a specification statement as
which specifies a computation that starts in a state satisfyingpre and is guaranteed to end in a state satisfyingpostby changing onlyx. We call a logical constant employed to aid in a specification. For example, we can specify a computation that increment x by 1 as
Another example is a computation of a square root of an integer.
The specification statement appears like a primitive in the sense that it does not contain other statements. However, it is very expressive, aspre andpost are arbitrary predicates. Its weakest precondition is as follows.
wheres is fresh. |
It combines Morgan's syntactic idea with the sharpness idea by Bijlsma, Matthews and Wiltink.[1] The very advantage of this is its capability of defining wp of goto L and other jump statements.[2]
Formalization of jump statements likegoto L takes a very long bumpy process. A common belief seems to indicate the goto statement could only be argued operationally. This is probably due to a failure to recognize thatgoto L is actually miraculous (i.e. non-strict) and does not follow Dijkstra's coined Law of Miracle Excluded, as stood in itself. But it enjoys an extremely simple operational view from the weakest precondition perspective, which was unexpected. We define
wherewpL is the weakest precondition at labelL. |
Forgoto L execution transfers control to labelL at which the weakest precondition has to hold. The way thatwpL is referred to in the rule should not be taken as a big surprise. It is just for someQ computed to that point. This is like any wp rules, using constituent statements to give wp definitions, even thoughgoto L appears a primitive. The rule does not require the uniqueness for locations wherewpL holds within a program, so theoretically it allows the same label to appear in multiple locations as long as the weakest precondition at each location is the same wpL. The goto statement can jump to any of such locations. This actually justifies that we could place the same labels at the same location multiple times, as, which is the same as. Also, it does not imply any scoping rule, thus allowing a jump into a loop body, for example. Let us calculate wp of the following program S, which has a jump into the loop body.
wp(do x > 0 → L: x := x-1 od; if x < 0 → x := -x; goto L ⫿ x ≥ 0 → skip fi, post) = { sequential composition and alternation rules } wp(do x > 0 → L: x := x-1 od, (x<0 ∧ wp(x := -x; goto L, post)) ∨ (x ≥ 0 ∧ post) = { sequential composition, goto, assignment rules } wp(do x > 0 → L: x := x-1 od, x<0 ∧ wpL(x ← -x) ∨ x≥0 ∧ post) = { repetition rule } the strongest solution of Z: [ Z ≡ x > 0 ∧ wp(L: x := x-1, Z) ∨ x < 0 ∧ wpL(x ← -x) ∨ x=0 ∧ post ] = { assignment rule, found wpL = Z(x ← x-1) } the strongest solution of Z: [ Z ≡ x > 0 ∧ Z(x ← x-1) ∨ x < 0 ∧ Z(x ← x-1) (x ← -x) ∨ x=0 ∧ post] = { substitution } the strongest solution of Z:[ Z ≡ x > 0 ∧ Z(x ← x-1) ∨ x < 0 ∧ Z(x ← -x-1) ∨ x=0 ∧ post ] = { solve the equation by approximation } post(x ← 0)Therefore,
wp(S, post) = post(x ← 0).
An important variant of the weakest precondition is theweakest liberal precondition, which yields the weakest condition under whichS either does not terminate or establishesR. It therefore differs fromwp in not guaranteeing termination. Hence it corresponds toHoare logic in partial correctness: for the statement language given above,wlp differs withwp only onwhile-loop, in not requiring a variant (see above).
GivenS a statement andR aprecondition (a predicate on the initial state), then is theirstrongest-postcondition: it implies any postcondition satisfied by the final state of any execution of S, for any initial state satisfying R. In other words, a Hoare triple is provable in Hoare logic if and only if the predicate below hold:
Usually,strongest-postconditions are used in partial correctness.Hence, we have the following relation between weakest-liberal-preconditions and strongest-postconditions:
For example, on assignment we have:
wherey is fresh |
Above, the logical variabley represents the initial value of variablex.Hence,
On sequence, it appears thatsp runs forward (whereaswp runs backward):
Leslie Lamport has suggestedwin andsin aspredicate transformers forconcurrent programming.[3]
This section presents some characteristic properties of predicate transformers.[4] Below,S denotes a predicate transformer (a function between two predicates on the state space) andP a predicate. For instance,S(P) may denotewp(S,P) orsp(S,P). We keepx as the variable of the state space.
Predicate transformers of interest (wp,wlp, andsp) aremonotonic. A predicate transformerS ismonotonic if and only if:
This property is related to theconsequence rule of Hoare logic.
A predicate transformerS isstrict iff:
For instance,wp is artificially made strict, whereaswlp is generally not. In particular, if statementS may not terminate then is satisfiable. We have
Indeed,T is a valid invariant of that loop.
The non-strict but monotonic or conjunctive predicate transformers are called miraculous and can also be used to define a class of programming constructs, in particular, jump statements, which Dijkstra cared less about. Those jump statements include straight goto L, break and continue in a loop and return statements in a procedure body, exception handling, etc. It turns out that all jump statements are executable miracles,[5] i.e. they can be implemented but not strict.
A predicate transformerS isterminating if:
Actually, this terminology makes sense only for strict predicate transformers: indeed, is the weakest-precondition ensuring termination ofS.
It seems that naming this propertynon-aborting would be more appropriate: in total correctness, non-termination is abortion, whereas in partial correctness, it is not.
A predicate transformerS isconjunctive iff:
This is the case for, even if statementS is non-deterministic as a selection statement or a specification statement.
A predicate transformerS isdisjunctive iff:
This is generally not the case of whenS is non-deterministic. Indeed, consider a non-deterministic statementS choosing an arbitrary Boolean. This statement is given here as the followingselection statement:
Then, reduces to the formula.
Hence, reduces to thetautology
Whereas, the formulareduces to thewrong proposition.
In predicate transformers semantics, expressions are restricted to terms of the logic (see above). However, this restriction seems too strong for most existing programming languages, where expressions may have side effects (call to a function having a side effect), may not terminate or abort (likedivision by zero). There are many proposals to extend weakest-preconditions or strongest-postconditions for imperative expression languages and in particular formonads.
Among them,Hoare Type Theory combinesHoare logic for aHaskell-like language,separation logic andtype theory.[9]This system is currently implemented as aRocq library calledYnot.[10] In this language,evaluation of expressions corresponds to computations ofstrongest-postconditions.
Probabilistic Predicate Transformers are an extension of predicate transformers forprobabilistic programs.Indeed, such programs have many applications incryptography (hiding of information using some randomized noise),distributed systems (symmetry breaking).[11]