File: README

package info (click to toggle)
acl2 8.6%2Bdfsg-3
  • links: PTS
  • area: main
  • in suites: forky, sid
  • size: 1,138,276 kB
  • sloc: lisp: 17,818,294; java: 125,359; python: 28,122; javascript: 23,458; cpp: 18,851; ansic: 11,569; perl: 7,678; xml: 5,591; sh: 3,978; makefile: 3,840; ruby: 2,633; yacc: 1,126; ml: 763; awk: 295; csh: 233; lex: 197; php: 178; tcl: 49; asm: 23; haskell: 17
file content (184 lines) | stat: -rw-r--r-- 9,997 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
This is the README file for /books/projects/apply-model-2/.

The material in this directory demonstrates (for two sets of user definitions)
that there exists a model of apply$ that makes all warrants valid.  We
``re-define'' APPLY$ and DEFWARRANT in an isolated package so we can illustrate
their properties without relying on their native implementations.  The package
is named "MODAPP" (for Model of APPLY$).  It then contains two subdirectories,
ex1/ and ex2/, containing sample user histories, constructions of the model of
APPLY$ for each history, and proofs that all warrants are valid.

This directory started as a copy of /books/projects/apply-model/, which
contains a similar demonstration for the version of apply$ and defwarrant
described in the paper "Limited Second-Order Functionality in a First-Order
Setting," by Kaufmann and Moore.  That original apply-model/ is foundational
and static: it backs up the definitions and arguments in the above paper.  But
once APPLY$ was integrated into the sources, in ACL2 Version_8.0, we felt
free (under the usual concerns that we convince ourselves of the logical
correctness of any changes) to improve it.  One such improvement occurred even
as we integrated APPLY$: we added a constraint to apply$-userfn allowing us to
prove that (APPLY$ 'fn args) is only sensitive to the first n elements of args,
where n is the arity of 'fn as reported by the badge.  Thus ACL2's sources
drifted away from the foundational work in apply-model/.

Among other changes are:

* We added a constraint on untame-apply$ so that it, like apply$-userfn, is
  only sensitive to the first n of the arguments, where n is the arity of the
  fn being applied.  This constraint allows us to prove the doppelganger of
  apply$-userfn satisfies its constraint.  (We could have dealt with this by
  changing the way the doppelganger of untame-apply$ is defined but this
  solution felt simplest.)

* Badges no longer have an :authorization-flg field and instead have an
  :arity-out field.

* Multivalued functions may be applied.

* Functions that are ancestrally independent of apply$ (i.e., G1 functions)
  must satisfy fewer restrictions in order to be badged and warranted: we no
  longer impose constraints on their measures and we do not insist that all
  their subfunctions are badged.  We still insist that STATE and stobjs do not
  appear in their signatures, but this allows the warranting of G1 functions
  that use local stobjs and G1 functions in mutually recursive cliques.

* Measures of scions of apply$ (i.e., G2 functions) must be ancestrally
  independent of apply$ (thus they would be tame if badged but needn't be
  badged) and are no longer required to be strictly numeric.  Instead, they may
  be either numeric or syntactically lexicographic (as in instances of the
  macroexpansion of an LLIST expression).

While this code nearly mimics ACL2 Version_8.2 (and then improves upon it with
the relaxation of restrictions on G1 and G2 functions as described above), we
left out some features implemented in the Version_8.2 source code:

* The machinery here does not support LAMBDA objects containing DECLARE forms.
  For example, in the source code tamep-lambdap calls lambda-object-body (which
  detects and skips over any declare form) but here we just call lambda-body.

* We do not define well-formed-lambda-objectp but instead define the simpler
  well-formed-lambdap.  The source code uses well-formed-lambda-objectp so that
  it can efficiently support the lambda cache via factoring out the detection
  of syntactic ill-formedness.

* The machinery here does not check that the book projects/apply/base.lisp has
  been included in the session or give predefined functions special treatment.
  These differences show up in the definition of defwarrant-fn1.

WARNING: While the definitions here basically agree with those of ACL2
Version_8.2, but there is no guarantee that the definitions in this directory
agree future versions of the ACL2 sources! ACL2 is free to continue to evolve
and we feel free to add features in the source code without reflecting them
here as long as we can convince ourselves that they're sound.

In this README file we address four questions: What's in this directory, why is
it in an isolated package, what is the relation between this directory and the
similarly-named /books/system/apply/, and how to certify these books.

WHAT IS IN THIS DIRECTORY?

The "MODAPP" package is defined in portcullis.acl2 and every book here is built
on top of that by virtue of the cert.acl2 file here.

The files apply-prim.lisp, apply-constraints.lisp, and apply.lisp define
APPLY$.

The file report.lisp provides the script for proving the theorems cited as
Examples in the above-mentioned paper.  However, we may add new theorems to
report.lisp to illustrate features added since the paper.

A key part of the APPLY$ story is the role of warrants.  These are predicates
that stipulate the behavior of APPLY$ on user-defined functions that have been
admitted by defwarrant.  The warrant for function fn must be provided as a
hypothesis in the statement of any theorem whose proof requires knowledge of
APPLY$'s behavior on 'fn.  This allows us to avoid ``the LOCAL problem,'' which
would arise if axioms were added to describe APPLY$'s behavior on newly defined
functions.  But warrants raise another question ``Is it possible to satisfy the
assumptions made by all the warrants?'', i.e., ``is it possible that theorems
carrying warrants are valid only because the warrants are contradictory?''  The
paper addresses that question and shows, via a proof in ACL2's metatheory, that
it is possible to construct a model for any set of warrants issued by
DEFWARRANT.  The construction of that model is complicated and has changed
slightly since the paper.  At the end of the ACL2 source file apply-raw.lisp
there is an essay, "Essay on Admitting a Model for Apply$ and the Functions
that Use It," that gives a proof for the version of apply$ and defwarrant
implemented in the then-current sources.  The model construction used in ex1/
and ex2/ here reflect that essay as of ACL2 Version_8.2.

Another important question is whether we can execute APPLY$ on user-defined
functions.  To do so would require the assumption of the relevant warrants.
The paper addresses this question too.  The key observation is that we arrange
for the ``evaluation theory'' (the theory in which top-level ACL2 evaluation
takes place as opposed to the ``current theory'' in which theorems are proved)
to include the attachment of certains functions from the above-mentioned model
construction to the constrained functions BADGE-USERFN and APPLY$-USERFN.

Thus the model construction is important for two reasons: to assure us that our
theorems are non-vacuous and to explain how evaluation proceeds.

To support the paper, this directory provides two subdirectories, ex1/ and ex2/
that illustrate the model construction.  Ex1/ constructs the model for a small
set of user-defined functions.  Ex2/ constructs the model for a much larger set
that contains many odd uses of APPLY$ to illustrate some of the problems that
arise in the model construction.

In our opinion, ex1/ is a small enough body of work that you can grasp the
whole model construction story by reading every line in the files there,
assuming you're already familiar with apply-prim.lisp, apply-constraints.lisp,
and apply.lisp here.

Ex2/ is provided just to illustrate that def-warrant admits a pretty wide range
of functions involving APPLY$ and we can model all those warrants
simultaneously.  We recommend ex2/ only to those really wishing to see how
model construction handles certain weird but admissible situations.

WHY IS THIS DEVELOPMENT DONE IN AN ISOLATED PACKAGE?

From ACL2 Version_8.0 onwards we expect APPLY$ will be an ACL2 primitive.  This
is necessary in order to support the implicit inclusion in the evaluation
theory of all warrants, allowing top-level execution of ground apply$ forms via
attachments to the ``magic'' functions concrete-badge-userfn an
concrete-apply$-userfn.

To support execution of APPLY$ without tying down the definition or constraints
on apply$ would raise soundness issues if the user defined apply$ differently.

We thus decided to preserve the version APPLY$ described in the paper, along
with its examples, model construction, and execution model.  That's why both
the original apply-model/ and this directory do everything in an isolated
package.

WHAT IS THE RELATIONSHIP BETWEEN THIS DIRECTORY AND /books/system/apply/?

The short answer is "none".  These files are essentially static, supporting the
claim that there was a model of apply$ and defwarrant as of ACL2 Version_8.2.
The similarly named files in books/system/apply/ support the build process for
ACL2, particularly the claims that the definitions of APPLY$, et al, terminate
and are guard verified.  At one time the definitions in the two directories
might have agreed but they are free to drift apart.

See the Essay on the APPLY$ Integration in the ACL2 source file apply-prim.lisp.

CERTIFICATION INSTRUCTIONS

Certification of the books directly in this directory is straightforward.  But
certification of ex1/ and ex2/ is a bit non-standard because it involves
copying certain files so they can be re-certified with different portcullises.

Q. Given a book, a.lisp, defining a current theory how do you build a book,
e.lisp, whose current theory is the evaluation theory of a.lisp defined by some
attachments?

A. Put the relevant constraints in the portcullis of a.lisp.  When you certify
a you'll get a book that is the current theory of a.  Then copy a.lisp to
e.lisp.  Define a new portcullis in which the constrained functions of a.lisp
are defined to be their attachments.  Then certify e.lisp to get a book whose
current theory is the evaluation theory of a.

To certify the books in and under this directory do:

make ACL2=<your-acl2>

E.g.,
make ACL2=v82