digitalmars.D - Against enforce()
- bearophile (10/10) Mar 16 2011 enforce() seems the part of Phobos that I hate more. Among its faults:
- Adam D. Ruppe (23/26) Mar 16 2011 assert and enforce cover a completely different problem, and aren't
- Jonathan M Davis (53/81) Mar 16 2011 A number of modules in Phobos have exceptions specific to that module - ...
- Andrei Alexandrescu (20/29) Mar 16 2011 So perhaps the language could be improved as enforce does not break puri...
- bearophile (12/27) Mar 16 2011 Currently enforce() uses a lazy argument. A lazy argument is a delegate,...
- bearophile (3/5) Mar 16 2011 Sorry,
- Jonathan M Davis (8/76) Mar 16 2011 For the most part, I don't think that this is true. There was discussion...
- bearophile (4/6) Mar 16 2011 Right, for once that of mine is a falsifiable assertion (http://en.wikip...
- Andrei Alexandrescu (18/67) Mar 16 2011 I haven't thought through it. Clearly this is a false positive, a
- Steven Schveighoffer (12/30) Mar 17 2011 int x;
- Walter Bright (6/13) Mar 17 2011 I must reiterate that enforce() is NOT FOR DETECTING PROGRAM BUGS. There...
- Jonathan M Davis (23/39) Mar 17 2011 I completely agree with you. However, I think that part of the confusion...
- Daniel Gibson (14/27) Mar 16 2011 Really?
- Andrei Alexandrescu (3/26) Mar 16 2011 enforce is an expression that returns its argument so it's composable.
- Daniel Gibson (10/37) Mar 16 2011 You're right. I just realized it and wanted to reply that correction to
- Simen kjaeraas (5/13) Mar 16 2011 null and false are also zero. :p
- Daniel Gibson (6/17) Mar 17 2011 Technically yes, but it'd be more clear to specifically mention them.
- Adam D. Ruppe (6/7) Mar 16 2011 One use of enforce is something more like this:
- Andrej Mitrovic (3/10) Mar 16 2011 Well that is pretty sweet. I didn't know enforce returned the type
- Steven Schveighoffer (24/28) Mar 17 2011 Why can't enforce be this:
- bearophile (4/7) Mar 17 2011 Bye,
- Steven Schveighoffer (12/25) Mar 17 2011 I was going off of this statement:
- bearophile (4/5) Mar 17 2011 Please don't ignore the purity-killing :-)
- Kagamin (6/11) Mar 17 2011 void checkArgument(bool condition, const char[] msg = null, string file ...
- bearophile (4/5) Mar 17 2011 Maybe msg has to be of string type.
- Steven Schveighoffer (17/20) Mar 17 2011 I think this is not as much an easy fix. By changing one line in enforc...
- Simen kjaeraas (7/20) Mar 17 2011 Not currently, at least. This made me wonder. A delegate created inside ...
- Steven Schveighoffer (9/30) Mar 17 2011 As long as the delegate does not access shared/global data, it should be...
- Don (9/45) Mar 18 2011 Fortunately, we don't. Delegates created via lazy are not the same as
- Don (7/31) Mar 17 2011 I completely agree. If we make statements like "it's OK because it will
- Walter Bright (8/17) Mar 17 2011 I want to emphasize Andrei's point.
- dsimcha (19/37) Mar 17 2011 I've asked for this before and I'll ask again: Can we **please** put an
- Walter Bright (4/8) Mar 17 2011 Not always the prettiest, but you can write:
- dsimcha (4/12) Mar 17 2011 This is better than nothing, but not enough to convince me to stop abusi...
- Walter Bright (3/15) Mar 17 2011 if (!condition) { writeln("my message %s %s", __FILE__, __LINE__); asser...
- Andrei Alexandrescu (5/27) Mar 17 2011 There's nothing wrong with encapsulating this idiom (if frequent).
- Walter Bright (7/14) Mar 17 2011 Sure, but there is plenty wrong with using enforce() for bug detection e...
- dsimcha (4/10) Mar 17 2011 What makes you think it wouldn't be used very frequently? It seems
- Andrei Alexandrescu (5/17) Mar 17 2011 To me it sounds perfectly normal that there are integrity checks that
- Walter Bright (13/26) Mar 17 2011 The use case is more constrained than that. Because of the existence of:
- Andrei Alexandrescu (18/48) Mar 17 2011 Note that you have (twice in two different posts) a bug in your code:
- Walter Bright (18/39) Mar 17 2011 I made a mistake, I should have tested it.
- Andrei Alexandrescu (56/72) Mar 17 2011 (I'm not sure what you even want to convey here as your statement does
- Walter Bright (12/13) Mar 17 2011 I don't disagree with anything you wrote. But I am suggesting that one l...
- Andrei Alexandrescu (3/19) Mar 17 2011 These are all very good points and insights. We should keep them in mind...
- Jonathan M Davis (9/33) Mar 17 2011 It also brings us back to one of Bearophile's concerns. If you want asse...
- Michel Fortin (47/69) Mar 17 2011 This would be much easier to work with if the decision about checking
- bearophile (9/17) Mar 16 2011 I have hit some of such cases in my code, finding them through profiling...
- Andrei Alexandrescu (24/56) Mar 16 2011 It's not about me. Phobos has several contributors (including
- Daniel Gibson (16/16) Mar 16 2011 I'd just like to summarize what useful stuff came out of this topic:
- Don (5/24) Mar 16 2011 That was discussed on the Phobos ng some time back. I don't think it's a...
- Jonathan M Davis (21/37) Mar 17 2011 Probably because
- Lars T. Kyllingstad (13/29) Mar 17 2011 You can overload on pure, yes, but only when you pass an explicit
- Don (4/39) Mar 17 2011 Ah, OK. I was pretty sure there wasn't a problem with delegates, didn't
- bearophile (6/9) Mar 17 2011 In one of the answers I've written to Andrei I have shown this link, it ...
- Kagamin (2/4) Mar 17 2011 .net framework was designed to use sizeable exception hierarchy, though ...
- Kagamin (2/5) Mar 18 2011 Pure functions calling weakly pure functions are also weakly pure and so...
- Don (6/12) Mar 18 2011 TLS variables are global and must not be accessed from any function
- Kagamin (2/6) Mar 18 2011 What's the difference?
- Simen kjaeraas (5/12) Mar 18 2011 Your original statement seems to indicate that strongly pure functions
- Steven Schveighoffer (30/38) Mar 18 2011 However, it's still not shared.
- Don (14/64) Mar 18 2011 It's not a lost cause, it's a two-liner!
- Steven Schveighoffer (26/77) Mar 18 2011 I'm not sure this works. Aren't you allowed to pass in a delegate to a ...
- Don (11/101) Mar 18 2011 This compiles just fine. (Well, you need to use bar(foo) not bar(&foo)).
- Steven Schveighoffer (22/111) Mar 21 2011 But does this make sense? A pure function (bar) is reading a shared
- Don (15/141) Mar 21 2011 If you pass the address of global or shared data into a weakly pure
- Steven Schveighoffer (31/38) Mar 21 2011 Just on this one point, TLS or __gshared references are indistinguishabl...
- Simen kjaeraas (12/26) Mar 21 2011 That is a good point. However, pure delegates should (but might not
- Don (13/66) Mar 22 2011 Not necessarily. It only guarantees that it won't access shared data
- Steven Schveighoffer (5/11) Mar 18 2011 No. Strong-pure functions can call weak-pure functions and still can be...
- Kagamin (12/21) Mar 18 2011 So this is a bug? This is a contract, not a validation of user input.
- Steven Schveighoffer (9/35) Mar 18 2011 This is a good example of why it's difficult to decide what "user input"...
- spir (33/40) Mar 18 2011 This is indeed a difficult topic. I'm a bit bluffed when reading people
- Steven Schveighoffer (29/67) Mar 18 2011 See, this is where I feel we have issues. The clear problem with *alway...
- Andrei Alexandrescu (6/52) Mar 18 2011 [snip]
- Steven Schveighoffer (26/82) Mar 18 2011 In this simple case yes, but inlining is not forceable, so you should no...
- spir (16/74) Mar 18 2011 Yes, I think you are correctly surrounding the issue.
- Kagamin (2/10) Mar 18 2011 You can't validate all user input, so external data ends up spead across...
- Jonathan M Davis (27/43) Mar 18 2011 The idea is that if an assertion fails, there is a bug in your program. ...
- Gerrit Wichert (8/19) Mar 18 2011 I would say it is a bug in the contract.
- Kagamin (8/23) Mar 24 2011 As has been point out, the problem is in cases where it's not clear whet...
- Jonathan M Davis (34/61) Mar 24 2011 It's a case by case thing. In some cases, you go with assertions and let...
enforce() seems the part of Phobos that I hate more. Among its faults: - It can't be used in weakly pure functions (because you can't use lazy arguments in pure functions), and not-purity is viral. Lot of Phobos can't be pure because of this, so even more user code can't be pure because of this; - It kills inlining (with the current DMD, and I don't think this problem will be fixed soon); - I have seen it slow down code (probably mostly because of its not-inlining nature); - Where it is used it usually doesn't give a more meaningful exception like WrongArgumentException, etc. I don't want a deep hierarchy of one hundred standard exceptions, but I think some standard exceptions for the most common mistakes, like wrong arguments, etc, are better than a generic enforce(), especially for a standard library code that is meant to be written with care and to give better error messages/exceptions. - It doesn't allow functions to be nothrow. This is a fault, because D has Contract Programming, that is meant to be usable for nothrow functions too. D Contracts with asserts are the right tool. I see enforce() just as a temporary workaround for a problem of Phobos (that it's compiled in release mode, so its asserts are vanished) that risks to become a permanent part of Phobos. So a better solution is for the standard Phobos library to ship in two versions, one compiled in release and not release mode, and DMD may choose the right one according to the compilation switches. This removes most of the need of enforce(). I suggest to deprecate enforce(). Until the problem with Phobos compilation is solved and enforces are removed from Phobos, enforce() may become a private Phobos function that user code can't import. Bye, bearophile
Mar 16 2011
bearophile wrote:- It doesn't allow functions to be nothrow. This is a fault, because D has Contract Programming, that is meant to be usable for nothrow functions too. D Contracts with asserts are the right tool.assert and enforce cover a completely different problem, and aren't interchangeable. assert catches programming errors. If an assert fails, it's a bug that the programmer should fix. enforce, on the other hand, catches runtime errors that aren't the programmer's fault. Then *have* to be handled to be correct, so being nothrow is out of the question. The function is *not* guaranteed to succeed at runtime. Look at the way enforce is generally used inside Phobos. enforce(fp = fopen("file", "r")); That is something that could fail at no fault of the programmer. It's an exception, not an assert. By far, the majority of enforces in Phobos are of this variety. They cannot possibly be made into contracts, and even if they could, that would be wrong. That said, I tentatively agree that enforce may be bad right now because of the other things you said (except the meaningful exception. enforce does that with an optional argument.) enforce is just a lazy way to write if(xxxxx) throw T(msg); It is elegant, it is beautiful, but if the practical problems aren't fixed, it might be right to avoid it anyway. But it'd have to be replaced with if/throw, not assert.
Mar 16 2011
On Wednesday, March 16, 2011 16:45:56 bearophile wrote:enforce() seems the part of Phobos that I hate more. Among its faults: - It can't be used in weakly pure functions (because you can't use lazy arguments in pure functions), and not-purity is viral. Lot of Phobos can't be pure because of this, so even more user code can't be pure because of this; - It kills inlining (with the current DMD, and I don't think this problem will be fixed soon); - I have seen it slow down code (probably mostly because of its not-inlining nature);- Where it is used it usually doesn't give a more meaningful exception like WrongArgumentException, etc. I don't want a deep hierarchy of one hundred standard exceptions, but I think some standard exceptions for the most common mistakes, like wrong arguments, etc, are better than a generic enforce(), especially for a standard library code that is meant to be written with care and to give better error messages/exceptions.A number of modules in Phobos have exceptions specific to that module - such as DateTimeException or FileException. enforce doesn't stop anyone from using specific exceptions. And it's just as easy to use Exception instead of a specific exception type when throwing directly, so I don't think that this complaint holds much water. It's a valid complaint if Phobos developers are choosing to throw Exception instead of more specific exceptions, but that's not enforce's fault.- It doesn't allow functions to be nothrow. This is a fault, because D has Contract Programming, that is meant to be usable for nothrow functions too. D Contracts with asserts are the right tool.Overall, I favor exceptions when it comes to testing input rather than assertions, but regardless of that. enforce does _not_ stop functions from being nothrow. It just makes it more annoying to make them nothrow. If you want the caller to be nothrow, you have to have a try-catch block in the caller which catches Exception. If the function really isn't ever going to throw, then you can use such a try-catch block with an assert(0) in the catch body, and it's quite safe. std.datetime does that in several places. Regardless, your problem here really isn't enforce anyway. Your problem is that you think that a number of functions should be using assertions instead of exceptions. enforce happens to be a way to throw exceptions, but it's quite easy to use exceptions without it. So, enforce doesn't really have anything to do with it other than the fact that that was the means used to throw the exception.I see enforce() just as a temporary workaround for a problem of Phobos (that it's compiled in release mode, so its asserts are vanished) that risks to become a permanent part of Phobos.So a better solution is for the standard Phobos library to ship in two versions, one compiled in release and not release mode, and DMD may choose the right one according to the compilation switches. This removes most of the need of enforce(). I suggest to deprecate enforce(). Until the problem with Phobos compilation is solved and enforces are removed from Phobos, enforce() may become a private Phobos function that user code can't import.There a number of places in Phobos which throw exceptions and _should_ throw exceptions. ConvExceptions and FileExceptions are great examples. DateTimeException is used liberally in std.datetime, and it really wouldn't make sense to make them use assertions. And even in cases where exceptions were chosen of assertions because of the release vs non-release mode issue, there's still the question of whether we really want Phobos to be throwing AssertErrors, since when a programmer sees an assertion which isn't theirs, they're likely to think that it's someone else's code which is broken, not theirs. So, having AssertErrors thrown from Phobos look just plain bad. Now, in same cases performance still makes assertions more desirable - and there _are_ places in Phobos which use exceptions - but there are still a lot of situations where Phobos _should_ be throwing exceptions. Regardless, enforce is supposed to make throwing exceptions similar to asserting something. It is - in theory at least - a great idea. The problem with it is its laziness and all of the implications that that has (like the inability to inline because of it). If we had a non-lazy version of enforce or if the compiler were made smart enough to realize that it didn't need a lazy version in some cases (such as when it's passed a string literal) and to use a non-lazy version in such cases, then the problem would be reduced. Personally, I rarely use enforce precisely because of the inlining issue. I don't that that if(!condition) throw new ExceptionType(msg); is really much worse than enforce(condition, new ExceptionType(msg)); but I see no reason to get rid enforce. I also disagree with you about how much Phobos should be using exceptions. There _are_ places - such as in a lot of range-based functions - which likely need to use assertions rather than exceptions for performance reasons, but I do _not_ like the idea of using assertions to validate input from code outside of Phobos. I think that that is _exactly_ the sort of place that should be using exceptions rather than assertions. - Jonathan M Davis
Mar 16 2011
On 03/16/2011 06:45 PM, bearophile wrote:enforce() seems the part of Phobos that I hate more.Yum, love the enforce.Among its faults: - It can't be used in weakly pure functions (because you can't use lazy arguments in pure functions), and not-purity is viral. Lot of Phobos can't be pure because of this, so even more user code can't be pure because of this;So perhaps the language could be improved as enforce does not break purity.- It kills inlining (with the current DMD, and I don't think this problem will be fixed soon);Not a problem of enforce.- I have seen it slow down code (probably mostly because of its not-inlining nature);Not a problem of enforce.- Where it is used it usually doesn't give a more meaningful exception like WrongArgumentException, etc. I don't want a deep hierarchy of one hundred standard exceptions, but I think some standard exceptions for the most common mistakes, like wrong arguments, etc, are better than a generic enforce(), especially for a standard library code that is meant to be written with care and to give better error messages/exceptions.enforce helps such idioms, does not prevent them. From the docs: =============== T enforce(T)(T value, lazy Throwable ex); If value is nonzero, returns it. Otherwise, throws ex. ===============- It doesn't allow functions to be nothrow. This is a fault, because D has Contract Programming, that is meant to be usable for nothrow functions too. D Contracts with asserts are the right tool.enforce's specification specifies it throws. It would therefore be difficult for it to not throw. This complaint is non sequitur.I see enforce() just as a temporary workaround for a problem of Phobos (that it's compiled in release mode, so its asserts are vanished) that risks to become a permanent part of Phobos.enforce is a simple abstraction of the idiom "if (!condition) throw new Exception(args)". If that idiom were rare, then occurrences of enforce would be rare and therefore there would be little need to have enforce at all.So a better solution is for the standard Phobos library to ship in two versions, one compiled in release and not release mode, and DMD may choose the right one according to the compilation switches. This removes most of the need of enforce(). I suggest to deprecate enforce(). Until the problem with Phobos compilation is solved and enforces are removed from Phobos, enforce() may become a private Phobos function that user code can't import.There may be some confusion somewhere. enforce is not supposed to be a sort of assert. It is a different tool with a different charter. Use assert for assertions. Andrei
Mar 16 2011
Andrei:Yum, love the enforce.You are silly :-)So perhaps the language could be improved as enforce does not break purity.Currently enforce() uses a lazy argument. A lazy argument is a delegate, and generally such delegate can't be pure, because the expressions you give to enforce() usually refer to variables in the scope where you call enforce(). So what kind of language improvements are you thinking about? This is an example: http://d.puremagic.com/issues/show_bug.cgi?id=5746In my opinion it's not wise use widely in the standard library something that requires an optimization that the DMD compiler is not going to have soon, and that makes the code significantly slower. In some cases this almost forces me to keep a patched version of Phobos, or to add more nearly duplicated functions to my dlibs2.- It kills inlining (with the current DMD, and I don't think this problem will be fixed soon);Not a problem of enforce.enforce helps such idioms, does not prevent them. From the docs: =============== T enforce(T)(T value, lazy Throwable ex); If value is nonzero, returns it. Otherwise, throws ex. ===============Then why is iota() using a nude enforce() instead of the enforce() with a more meaningful exception like WrongArgumentException? I have seen the nude enforce used in other parts of Phobos. So maybe enforce() makes even the standard library writers lazy.enforce's specification specifies it throws. It would therefore be difficult for it to not throw. This complaint is non sequitur.<I know, and I agree in some situations you want an assert (to test arguments coming from "outside"), so in some situations an enforce is acceptable. The problem is that currently enforce is used as a patch for a DMD/Phobos problem that I hope will be fixed in a short time, see below.I see enforce() just as a temporary workaround for a problem of Phobos (that it's compiled in release mode, so its asserts are vanished) that risks to become a permanent part of Phobos.<<enforce is a simple abstraction of the idiom "if (!condition) throw new Exception(args)". If that idiom were rare, then occurrences of enforce would be rare and therefore there would be little need to have enforce at all.< There may be some confusion somewhere. enforce is not supposed to be a sort of assert. It is a different tool with a different charter. Use assert for assertions.<Right. But saying just that is not enough. You have to add that such "if (!condition) throw new Exception(args)" idiom is common in Phobos because Phobos is present only in release mode. If the zip distribution of DMD contains two Phobos and dmd becomes able to use the right one according to the compilation switches, then I think that "if (!condition) throw new Exception(args)" will become more rare, and the enforce() too will be less commonly needed. Bye, bearophile
Mar 16 2011
I know, and I agree in some situations you want an assert (I meant:I know, and I agree in some situations you want an exception (Sorry, bearophile
Mar 16 2011
On Wednesday, March 16, 2011 18:53:06 bearophile wrote:Andrei:For the most part, I don't think that this is true. There was discussion of using enforce instead of assertions because of assertions being compiled out with -release, but I'm not sure that that ever actually happened. Every case that I can think of at the moment where enforce is used, an exception _should_ be used. The only question is whether enforce should be used due to the current problems with inlining it and whatnot. - Jonathan M DavisYum, love the enforce.You are silly :-)So perhaps the language could be improved as enforce does not break purity.Currently enforce() uses a lazy argument. A lazy argument is a delegate, and generally such delegate can't be pure, because the expressions you give to enforce() usually refer to variables in the scope where you call enforce(). So what kind of language improvements are you thinking about? This is an example: http://d.puremagic.com/issues/show_bug.cgi?id=5746In my opinion it's not wise use widely in the standard library something that requires an optimization that the DMD compiler is not going to have soon, and that makes the code significantly slower. In some cases this almost forces me to keep a patched version of Phobos, or to add more nearly duplicated functions to my dlibs2.- It kills inlining (with the current DMD, and I don't think this problem will be fixed soon);Not a problem of enforce.enforce helps such idioms, does not prevent them. From the docs: =============== T enforce(T)(T value, lazy Throwable ex); If value is nonzero, returns it. Otherwise, throws ex. ===============Then why is iota() using a nude enforce() instead of the enforce() with a more meaningful exception like WrongArgumentException? I have seen the nude enforce used in other parts of Phobos. So maybe enforce() makes even the standard library writers lazy.enforce's specification specifies it throws. It would therefore be difficult for it to not throw. This complaint is non sequitur.<I know, and I agree in some situations you want an assert (to test arguments coming from "outside"), so in some situations an enforce is acceptable. The problem is that currently enforce is used as a patch for a DMD/Phobos problem that I hope will be fixed in a short time, see below.Right. But saying just that is not enough. You have to add that such "if (!condition) throw new Exception(args)" idiom is common in Phobos because Phobos is present only in release mode. If the zip distribution of DMD contains two Phobos and dmd becomes able to use the right one according to the compilation switches, then I think that "if (!condition) throw new Exception(args)" will become more rare, and the enforce() too will be less commonly needed.I see enforce() just as a temporary workaround for a problem of Phobos (that it's compiled in release mode, so its asserts are vanished) that risks to become a permanent part of Phobos.<<enforce is a simple abstraction of the idiom "if (!condition) throw new Exception(args)". If that idiom were rare, then occurrences of enforce would be rare and therefore there would be little need to have enforce at all.< There may be some confusion somewhere. enforce is not supposed to be a sort of assert. It is a different tool with a different charter. Use assert for assertions.<
Mar 16 2011
Jonathan M Davis:Every case that I can think of at the moment where enforce is used, an exception _should_ be used.Right, for once that of mine is a falsifiable assertion (http://en.wikipedia.org/wiki/Falsifiability ) :-) Bye, bearophile
Mar 16 2011
On 03/16/2011 08:53 PM, bearophile wrote:Andrei:I haven't thought through it. Clearly this is a false positive, a restriction that should be at best removed.Yum, love the enforce.You are silly :-)So perhaps the language could be improved as enforce does not break purity.Currently enforce() uses a lazy argument. A lazy argument is a delegate, and generally such delegate can't be pure, because the expressions you give to enforce() usually refer to variables in the scope where you call enforce(). So what kind of language improvements are you thinking about?This is an example: http://d.puremagic.com/issues/show_bug.cgi?id=5746No need to blow out of proportion everything that serves a point. There are only few places in which use of enforce (or checking in general) slows things down. We have decided to assuage that by avoiding duplicate checks and by sometimes leaving it to the user to check (e.g. by using assert). This is a good approach because it starts from conservative and thoroughly checked.In my opinion it's not wise use widely in the standard library something that requires an optimization that the DMD compiler is not going to have soon, and that makes the code significantly slower. In some cases this almost forces me to keep a patched version of Phobos, or to add more nearly duplicated functions to my dlibs2.- It kills inlining (with the current DMD, and I don't think this problem will be fixed soon);Not a problem of enforce.Because I don't condone defining large exception hierarchies. It's most important to throw an exception. Then it's okay to refine exception types, but that's not an issue that is the charter of enforce or that enforce prevents.enforce helps such idioms, does not prevent them. From the docs: =============== T enforce(T)(T value, lazy Throwable ex); If value is nonzero, returns it. Otherwise, throws ex. ===============Then why is iota() using a nude enforce() instead of the enforce() with a more meaningful exception like WrongArgumentException?I have seen the nude enforce used in other parts of Phobos. So maybe enforce() makes even the standard library writers lazy.It makes the standard library writers productive.Hoping less and doing more would be great.enforce's specification specifies it throws. It would therefore be difficult for it to not throw. This complaint is non sequitur.<I know, and I agree in some situations you want an assert (to test arguments coming from "outside"), so in some situations an enforce is acceptable. The problem is that currently enforce is used as a patch for a DMD/Phobos problem that I hope will be fixed in a short time, see below.I think you are terribly confused about the relative roles of assert and enforce. AndreiI see enforce() just as a temporary workaround for a problem of Phobos (that it's compiled in release mode, so its asserts are vanished) that risks to become a permanent part of Phobos.<<enforce is a simple abstraction of the idiom "if (!condition) throw new Exception(args)". If that idiom were rare, then occurrences of enforce would be rare and therefore there would be little need to have enforce at all.< There may be some confusion somewhere. enforce is not supposed to be a sort of assert. It is a different tool with a different charter. Use assert for assertions.<Right. But saying just that is not enough. You have to add that such "if (!condition) throw new Exception(args)" idiom is common in Phobos because Phobos is present only in release mode. If the zip distribution of DMD contains two Phobos and dmd becomes able to use the right one according to the compilation switches, then I think that "if (!condition) throw new Exception(args)" will become more rare, and the enforce() too will be less commonly needed.
Mar 16 2011
On Wed, 16 Mar 2011 22:10:01 -0400, Andrei Alexandrescu <SeeWebsiteForEmail erdani.org> wrote:On 03/16/2011 08:53 PM, bearophile wrote:int x; void foo(int i) { enforce(i == 5, to!string(x = 5)); // if enforce is pure, this will mean the global x could be affected inside the function } I don't think enforce can be straight pure. It can only be pure when called from pure functions. A so-called conditional purity. If we have auto purity, then I think the compiler could sort this out. -SteveAndrei:I haven't thought through it. Clearly this is a false positive, a restriction that should be at best removed.Yum, love the enforce.You are silly :-)So perhaps the language could be improved as enforce does not break purity.Currently enforce() uses a lazy argument. A lazy argument is a delegate, and generally such delegate can't be pure, because the expressions you give to enforce() usually refer to variables in the scope where you call enforce(). So what kind of language improvements are you thinking about?
Mar 17 2011
On 3/16/2011 6:53 PM, bearophile wrote:Right. But saying just that is not enough. You have to add that such "if (!condition) throw new Exception(args)" idiom is common in Phobos because Phobos is present only in release mode. If the zip distribution of DMD contains two Phobos and dmd becomes able to use the right one according to the compilation switches, then I think that "if (!condition) throw new Exception(args)" will become more rare, and the enforce() too will be less commonly needed.I must reiterate that enforce() is NOT FOR DETECTING PROGRAM BUGS. Therefore, enforce() must not change its behavior based on "release mode" or other compiler switches. Contracts and asserts are for program bug detection. NOT enforce. This distinction is critical.
Mar 17 2011
On Thursday, March 17, 2011 12:22:00 Walter Bright wrote:On 3/16/2011 6:53 PM, bearophile wrote:I completely agree with you. However, I think that part of the confusion is that there was discussion of using enforce in Phobos in some cases where we might otherwise have used an assertion, because the assertions would general be compiled out when anyone went to use Phobos other than Phobos itself, so they would be useless. I'm not aware that ever actually having been done, however. And in general, I don't like the idea of using assertions to validate that someone is using a library function correctly rather than validating the library function itself. I really think that that should be treated like user input and throw an exception if it really is supposed to be being validated. Some additional assertions which could be of benefit both in unit testing and if some actually uses a non-release version of Phobos might be useful, but counting on that sort of check being there makes no sense to me. Assertions are for validating the code that they're in, not someone else's code which is using that code. In any case, I think that part of the confusion here is due to previous discussions on the lack of assertions in -release (and the fact that libphobos.a is normally compiled with -release) and the possible use of enforce to get around that in some cases. I'm not aware that actually ever having been done, however. Still, I do get the impression the people often confuse the purposes of assertions and exceptions. - Jonathan M DavisRight. But saying just that is not enough. You have to add that such "if (!condition) throw new Exception(args)" idiom is common in Phobos because Phobos is present only in release mode. If the zip distribution of DMD contains two Phobos and dmd becomes able to use the right one according to the compilation switches, then I think that "if (!condition) throw new Exception(args)" will become more rare, and the enforce() too will be less commonly needed.I must reiterate that enforce() is NOT FOR DETECTING PROGRAM BUGS. Therefore, enforce() must not change its behavior based on "release mode" or other compiler switches. Contracts and asserts are for program bug detection. NOT enforce. This distinction is critical.
Mar 17 2011
Am 17.03.2011 02:07, schrieb Andrei Alexandrescu:On 03/16/2011 06:45 PM, bearophile wrote:Really? using enforce with a custom throwable saves *one* char: enforce(foo, new BlaException("bad!")); if(!foo) throw new BlaException("bad!"); or are there other merits? But using enforce with a custom message (thus it'll just throw a standard Exception with that message), like assert, really shortens things: enforce(..., "bad!"); if(!...) throw new Exception("bad!"); So of course enforce allows to throw meaningful exceptions, but it doesn't make it considerably easier/shorter. Cheers, - Daniel- Where it is used it usually doesn't give a more meaningful exception like WrongArgumentException, etc. I don't want a deep hierarchy of one hundred standard exceptions, but I think some standard exceptions for the most common mistakes, like wrong arguments, etc, are better than a generic enforce(), especially for a standard library code that is meant to be written with care and to give better error messages/exceptions.enforce helps such idioms, does not prevent them. From the docs: =============== T enforce(T)(T value, lazy Throwable ex); If value is nonzero, returns it. Otherwise, throws ex. ===============
Mar 16 2011
On 03/16/2011 08:50 PM, Daniel Gibson wrote:Am 17.03.2011 02:07, schrieb Andrei Alexandrescu:enforce is an expression that returns its argument so it's composable. AndreiOn 03/16/2011 06:45 PM, bearophile wrote:Really? using enforce with a custom throwable saves *one* char: enforce(foo, new BlaException("bad!")); if(!foo) throw new BlaException("bad!"); or are there other merits?- Where it is used it usually doesn't give a more meaningful exception like WrongArgumentException, etc. I don't want a deep hierarchy of one hundred standard exceptions, but I think some standard exceptions for the most common mistakes, like wrong arguments, etc, are better than a generic enforce(), especially for a standard library code that is meant to be written with care and to give better error messages/exceptions.enforce helps such idioms, does not prevent them. From the docs: =============== T enforce(T)(T value, lazy Throwable ex); If value is nonzero, returns it. Otherwise, throws ex. ===============
Mar 16 2011
Am 17.03.2011 02:55, schrieb Andrei Alexandrescu:On 03/16/2011 08:50 PM, Daniel Gibson wrote:You're right. I just realized it and wanted to reply that correction to myself but you were faster :) I agree, that *is* helpful. A side note: The documentation says the value is returned if it's "non-zero". enforce() also throws on null (for classes, probably also for pointers) and false (for bool..) - this should probably be mentioned in the docs ;-) Cheers, - DanielAm 17.03.2011 02:07, schrieb Andrei Alexandrescu:enforce is an expression that returns its argument so it's composable. AndreiOn 03/16/2011 06:45 PM, bearophile wrote:Really? using enforce with a custom throwable saves *one* char: enforce(foo, new BlaException("bad!")); if(!foo) throw new BlaException("bad!"); or are there other merits?- Where it is used it usually doesn't give a more meaningful exception like WrongArgumentException, etc. I don't want a deep hierarchy of one hundred standard exceptions, but I think some standard exceptions for the most common mistakes, like wrong arguments, etc, are better than a generic enforce(), especially for a standard library code that is meant to be written with care and to give better error messages/exceptions.enforce helps such idioms, does not prevent them. From the docs: =============== T enforce(T)(T value, lazy Throwable ex); If value is nonzero, returns it. Otherwise, throws ex. ===============
Mar 16 2011
On Thu, 17 Mar 2011 03:03:23 +0100, Daniel Gibson <metalcaedes gmail.com> wrote:You're right. I just realized it and wanted to reply that correction to myself but you were faster :) I agree, that *is* helpful. A side note: The documentation says the value is returned if it's "non-zero". enforce() also throws on null (for classes, probably also for pointers) and false (for bool..) - this should probably be mentioned in the docs ;-)null and false are also zero. :p -- Simen
Mar 16 2011
Am 17.03.2011 06:59, schrieb Simen kjaeraas:On Thu, 17 Mar 2011 03:03:23 +0100, Daniel Gibson <metalcaedes gmail.com> wrote:Technically yes, but it'd be more clear to specifically mention them. Also "the value is returned" could imply that enforce doesn't work with references (=> objects).. I think enforce's behaviour on bools, objects and pointers would be easier to understand if null and false were mentioned :)You're right. I just realized it and wanted to reply that correction to myself but you were faster :) I agree, that *is* helpful. A side note: The documentation says the value is returned if it's "non-zero". enforce() also throws on null (for classes, probably also for pointers) and false (for bool..) - this should probably be mentioned in the docs ;-)null and false are also zero. :p
Mar 17 2011
Daniel Gibsonenforce(foo, new BlaException("bad!"));One use of enforce is something more like this: auto fp = enforce(fopen("my file", "r"), "cant open file"); Which replaces: auto fp = fopen("my file", "r"); if(fp is null) throw new Exception("cant open file");
Mar 16 2011
On 3/17/11, Adam D. Ruppe <destructionator gmail.com> wrote:Daniel GibsonWell that is pretty sweet. I didn't know enforce returned the type back. Time to cut some lines in my code, yay.enforce(foo, new BlaException("bad!"));One use of enforce is something more like this: auto fp = enforce(fopen("my file", "r"), "cant open file"); Which replaces: auto fp = fopen("my file", "r"); if(fp is null) throw new Exception("cant open file");
Mar 16 2011
On Wed, 16 Mar 2011 21:07:54 -0400, Andrei Alexandrescu <SeeWebsiteForEmail erdani.org> wrote:On 03/16/2011 06:45 PM, bearophile wrote:Why can't enforce be this: T enforce(T, string file = __FILE__, int line = __LINE__)(T value, /* lazy -- BUG: disables inlining */ const(char)[] msg = null); Until the compiler is fixed? I bet it would perform better even though the message may be eagerly constructed. Simply because in 99% of cases (I've checked) the message is a string literal. Essentially we keep saying D is on par with C for performance, and then the standard library is riddled with un-optimizable code making that claim patently false. It doesn't help to say, "well yeah, I know it's not *now* but trust me, we know what the problem is and we'll fix it in the next 1-60 months." Given that this problem has been noted and existed for over a year, and doesn't show any sign of being fixed, we should work around it until it is fixed. enforce should be pure, since it should be equivalent to if(!x) throw new Exception(msg). However, we cannot have a "function" that is the equivalent. This would all be possible with macros. The workaround is simple, replace instances of enforce in functions you want to be pure with the equivalent if (!x) throw ... All the other points, I disagree with bearophile, enforce is not assert and should not be nothrow. -Steve- It kills inlining (with the current DMD, and I don't think this problem will be fixed soon);Not a problem of enforce.
Mar 17 2011
Steven Schveighoffer:All the other points, I disagree with bearophile, enforce is not assert and should not be nothrow.I have never said this. I am aware that enforce can't be nothrow, and I agree that in some situations you want to raise an exception instead of using asserts. One of the things I have said (maybe wrongly) are:You have to add that such "if (!condition) throw new Exception(args)" idiom is common in Phobos because Phobos is present only in release mode. If the zip distribution of DMD contains two Phobos and dmd becomes able to use the right one according to the compilation switches, then I think that "if (!condition) throw new Exception(args)" will become more rare, and the enforce() too will be less commonly needed.<Bye, bearophile
Mar 17 2011
On Thu, 17 Mar 2011 11:49:25 -0400, bearophile <bearophileHUGS lycos.com> wrote:Steven Schveighoffer:I was going off of this statement: "It doesn't allow functions to be nothrow. This is a fault, because D has Contract Programming, that is meant to be usable for nothrow functions too. D Contracts with asserts are the right tool." Sorry if I misunderstood. But enforce is a simple factoring of the if(!condition) throw Exception(msg) into an expression. It is meant to throw an exception and meant to be used in release mode. The only problem I see with it is the inline-killing. -SteveAll the other points, I disagree with bearophile, enforce is not assert and should not be nothrow.I have never said this. I am aware that enforce can't be nothrow, and I agree that in some situations you want to raise an exception instead of using asserts. One of the things I have said (maybe wrongly) are:You have to add that such "if (!condition) throw new Exception(args)" idiom is common in Phobos because Phobos is present only in release mode. If the zip distribution of DMD contains two Phobos and dmd becomes able to use the right one according to the compilation switches, then I think that "if (!condition) throw new Exception(args)" will become more rare, and the enforce() too will be less commonly needed.<
Mar 17 2011
Steven Schveighoffer:The only problem I see with it is the inline-killing.Please don't ignore the purity-killing :-) Bye, bearophile
Mar 17 2011
bearophile Wrote:Steven Schveighoffer:void checkArgument(bool condition, const char[] msg = null, string file = __FILE__, int line = __LINE__) pure { if(!condition)throw new ArgumentException(msg,file,line); } will this work?The only problem I see with it is the inline-killing.Please don't ignore the purity-killing :-)
Mar 17 2011
Kagamin:will this work?Maybe msg has to be of string type. Bye, bearophile
Mar 17 2011
On Thu, 17 Mar 2011 12:09:50 -0400, bearophile <bearophileHUGS lycos.com> wrote:Steven Schveighoffer:I think this is not as much an easy fix. By changing one line in enforce, every instance becomes inlinable. By making enforce also pure, it doesn't automatically make all users of enforce pure. I thought that lazy enforce cannot be pure, but I realize now that it can, as long as the delegate is pure. However, I think the compiler won't cooperate with that. If we temporarily disallow lazy and also make enforce pure, it will compile, but I'm worried one problem will be fixed and not the other, and then we are stuck with not being able to get the benefits of the lazy evaluation. I think the easiest thing to do right now is make enforce not lazy. That at least gets us inlining, which should be 90% of the performance problem with near-zero effort. If it makes sense in the future, we can also make it pure, or auto pure if that is ever supported. -SteveThe only problem I see with it is the inline-killing.Please don't ignore the purity-killing :-)
Mar 17 2011
On Thu, 17 Mar 2011 18:17:08 +0100, Steven Schveighoffer <schveiguy yahoo.com> wrote:On Thu, 17 Mar 2011 12:09:50 -0400, bearophile <bearophileHUGS lycos.com> wrote:Not currently, at least. This made me wonder. A delegate created inside a pure function would have to be pure while in the scope of that function, right? Seems to me that should be possible to implement. -- SimenSteven Schveighoffer:I think this is not as much an easy fix. By changing one line in enforce, every instance becomes inlinable. By making enforce also pure, it doesn't automatically make all users of enforce pure. I thought that lazy enforce cannot be pure, but I realize now that it can, as long as the delegate is pure. However, I think the compiler won't cooperate with that.The only problem I see with it is the inline-killing.Please don't ignore the purity-killing :-)
Mar 17 2011
On Thu, 17 Mar 2011 13:30:21 -0400, Simen kjaeraas <simen.kjaras gmail.com> wrote:On Thu, 17 Mar 2011 18:17:08 +0100, Steven Schveighoffer <schveiguy yahoo.com> wrote:As long as the delegate does not access shared/global data, it should be able to be pure. Even delegates which modify TLS data should be able to be pure (weak-pure, but still pure). This should be easy to enforce when the delegate is created automatically from an expression using a lazy call. However, we need some implicit casting rules for pure delegates into non-pure ones. -SteveOn Thu, 17 Mar 2011 12:09:50 -0400, bearophile <bearophileHUGS lycos.com> wrote:Not currently, at least. This made me wonder. A delegate created inside a pure function would have to be pure while in the scope of that function, right? Seems to me that should be possible to implement.Steven Schveighoffer:I think this is not as much an easy fix. By changing one line in enforce, every instance becomes inlinable. By making enforce also pure, it doesn't automatically make all users of enforce pure. I thought that lazy enforce cannot be pure, but I realize now that it can, as long as the delegate is pure. However, I think the compiler won't cooperate with that.The only problem I see with it is the inline-killing.Please don't ignore the purity-killing :-)
Mar 17 2011
Steven Schveighoffer wrote:On Thu, 17 Mar 2011 13:30:21 -0400, Simen kjaeraas <simen.kjaras gmail.com> wrote:Fortunately, we don't. Delegates created via lazy are not the same as external delegates; they're an even simpler case of delegate literals. This means that at the moment that a lazy function is called, all of the code of the delegate is available. Furthermore, the caller function must access every expression inside the lazy delegate; if the caller is marked as pure, every expression inside the lazy delegate must also be pure. So the existing checks work just fine. Patch in bug 5750.On Thu, 17 Mar 2011 18:17:08 +0100, Steven Schveighoffer <schveiguy yahoo.com> wrote:As long as the delegate does not access shared/global data, it should be able to be pure. Even delegates which modify TLS data should be able to be pure (weak-pure, but still pure). This should be easy to enforce when the delegate is created automatically from an expression using a lazy call. However, we need some implicit casting rules for pure delegates into non-pure ones. -SteveOn Thu, 17 Mar 2011 12:09:50 -0400, bearophile <bearophileHUGS lycos.com> wrote:Not currently, at least. This made me wonder. A delegate created inside a pure function would have to be pure while in the scope of that function, right? Seems to me that should be possible to implement.Steven Schveighoffer:I think this is not as much an easy fix. By changing one line in enforce, every instance becomes inlinable. By making enforce also pure, it doesn't automatically make all users of enforce pure. I thought that lazy enforce cannot be pure, but I realize now that it can, as long as the delegate is pure. However, I think the compiler won't cooperate with that.The only problem I see with it is the inline-killing.Please don't ignore the purity-killing :-)
Mar 18 2011
Steven Schveighoffer wrote:On Wed, 16 Mar 2011 21:07:54 -0400, Andrei Alexandrescu <SeeWebsiteForEmail erdani.org> wrote:I completely agree. If we make statements like "it's OK because it will be fixed soon" it has to be added to a list and prioritized. With the understanding that *it knocks something else from that list*. As I've ended up being the one who implements a large fraction of such things, I get unhappy when people casually make statements about them being implemented "soon".On 03/16/2011 06:45 PM, bearophile wrote:Why can't enforce be this: T enforce(T, string file = __FILE__, int line = __LINE__)(T value, /* lazy -- BUG: disables inlining */ const(char)[] msg = null); Until the compiler is fixed? I bet it would perform better even though the message may be eagerly constructed. Simply because in 99% of cases (I've checked) the message is a string literal. Essentially we keep saying D is on par with C for performance, and then the standard library is riddled with un-optimizable code making that claim patently false. It doesn't help to say, "well yeah, I know it's not *now* but trust me, we know what the problem is and we'll fix it in the next 1-60 months."- It kills inlining (with the current DMD, and I don't think this problem will be fixed soon);Not a problem of enforce.
Mar 17 2011
On 3/16/2011 6:07 PM, Andrei Alexandrescu wrote:On 03/16/2011 06:45 PM, bearophile wrote:I want to emphasize Andrei's point. 1. Asserts and contracts are for detecting program BUGS. They are not for validating user input, checking for disk full, file not found errors, etc. 2. Enforce is for validating user input, checking for disk full, file not found errors, etc. Enforce is NOT for use in contracts or checking for program bugs. Any use of enforce in Phobos that is checking for program bugs is itself a bug and should be entered into bugzilla for fixing.So a better solution is for the standard Phobos library to ship in two versions, one compiled in release and not release mode, and DMD may choose the right one according to the compilation switches. This removes most of the need of enforce(). I suggest to deprecate enforce(). Until the problem with Phobos compilation is solved and enforces are removed from Phobos, enforce() may become a private Phobos function that user code can't import.There may be some confusion somewhere. enforce is not supposed to be a sort of assert. It is a different tool with a different charter. Use assert for assertions.
Mar 17 2011
== Quote from Walter Bright (newshound2 digitalmars.com)'s articleOn 3/16/2011 6:07 PM, Andrei Alexandrescu wrote:assertions.On 03/16/2011 06:45 PM, bearophile wrote:So a better solution is for the standard Phobos library to ship in two versions, one compiled in release and not release mode, and DMD may choose the right one according to the compilation switches. This removes most of the need of enforce(). I suggest to deprecate enforce(). Until the problem with Phobos compilation is solved and enforces are removed from Phobos, enforce() may become a private Phobos function that user code can't import.There may be some confusion somewhere. enforce is not supposed to be a sort of assert. It is a different tool with a different charter. Use assert forI want to emphasize Andrei's point. 1. Asserts and contracts are for detecting program BUGS. They are not for validating user input, checking for disk full, file not found errors, etc. 2. Enforce is for validating user input, checking for disk full, file not found errors, etc. Enforce is NOT for use in contracts or checking for program bugs. Any use of enforce in Phobos that is checking for program bugs is itself a bug and should be entered into bugzilla for fixing.I've asked for this before and I'll ask again: Can we **please** put an alwaysAssert() function (or an abbreviation of this to make it less verbose) in Phobos? I proposed this once before and it wasn't well liked for some reason This reminded me to persist a little about it. I sometimes abuse enforce() for non-performance critical asserts that I don't want to ever be turned off, but that are semantically asserts in that they're supposed to reveal bugs, not check for within-spec errors. I know this is The Wrong Thing to do, but it's too convenient and useful to stop doing it unless I have a good alternative. The differences between enforce() and alwaysAssert() would be that alwaysAssert() throws an AssertError instead of an Exception and that they indicate different intents. alwaysAssert() could even be implemented in terms of enforce() using custom exceptions. Example implementation: void alwaysAssert(T, string file = __FILE__, string line = __LINE__) (T value, lazy string msg = null) { enforce!(T, file, line)(value, new AssertError(msg)); }
Mar 17 2011
On 3/17/2011 12:32 PM, dsimcha wrote:I've asked for this before and I'll ask again: Can we **please** put an alwaysAssert() function (or an abbreviation of this to make it less verbose) in Phobos? I proposed this once before and it wasn't well liked for some reason This reminded me to persist a little about it.Not always the prettiest, but you can write: if (!condition) assert(0); The assert(0) will be replaced with a HLT instruction even in release mode.
Mar 17 2011
== Quote from Walter Bright (newshound2 digitalmars.com)'s articleOn 3/17/2011 12:32 PM, dsimcha wrote:This is better than nothing, but not enough to convince me to stop abusing enforce(). I much prefer to have a real alwaysAssert() function that gives a file, a line number and an error message.I've asked for this before and I'll ask again: Can we **please** put an alwaysAssert() function (or an abbreviation of this to make it less verbose) in Phobos? I proposed this once before and it wasn't well liked for some reason This reminded me to persist a little about it.Not always the prettiest, but you can write: if (!condition) assert(0); The assert(0) will be replaced with a HLT instruction even in release mode.
Mar 17 2011
On 3/17/2011 1:49 PM, dsimcha wrote:== Quote from Walter Bright (newshound2 digitalmars.com)'s articleif (!condition) { writeln("my message %s %s", __FILE__, __LINE__); assert(0); } I am strongly opposed to using enforce() for bug detection.On 3/17/2011 12:32 PM, dsimcha wrote:This is better than nothing, but not enough to convince me to stop abusing enforce(). I much prefer to have a real alwaysAssert() function that gives a file, a line number and an error message.I've asked for this before and I'll ask again: Can we **please** put an alwaysAssert() function (or an abbreviation of this to make it less verbose) in Phobos? I proposed this once before and it wasn't well liked for some reason This reminded me to persist a little about it.Not always the prettiest, but you can write: if (!condition) assert(0); The assert(0) will be replaced with a HLT instruction even in release mode.
Mar 17 2011
On 03/17/2011 05:03 PM, Walter Bright wrote:On 3/17/2011 1:49 PM, dsimcha wrote:There's nothing wrong with encapsulating this idiom (if frequent). That's what essentially alwaysAssert does. So you're right but without contradicting dsimcha's suggestion. Andrei== Quote from Walter Bright (newshound2 digitalmars.com)'s articleif (!condition) { writeln("my message %s %s", __FILE__, __LINE__); assert(0); } I am strongly opposed to using enforce() for bug detection.On 3/17/2011 12:32 PM, dsimcha wrote:This is better than nothing, but not enough to convince me to stop abusing enforce(). I much prefer to have a real alwaysAssert() function that gives a file, a line number and an error message.I've asked for this before and I'll ask again: Can we **please** put an alwaysAssert() function (or an abbreviation of this to make it less verbose) in Phobos? I proposed this once before and it wasn't well liked for some reason This reminded me to persist a little about it.Not always the prettiest, but you can write: if (!condition) assert(0); The assert(0) will be replaced with a HLT instruction even in release mode.
Mar 17 2011
On 3/17/2011 3:08 PM, Andrei Alexandrescu wrote:Sure, but there is plenty wrong with using enforce() for bug detection even if alwaysAssert does not exist. For one thing, such uses encourage others to misunderstand and misuse enforce. Additionally, alwaysAssert is an obvious one liner. I think such things need to be very frequently used to consider them part of the standard library. Otherwise, we risk Phobos becoming a morass of trivia.if (!condition) { writeln("my message %s %s", __FILE__, __LINE__); assert(0); } I am strongly opposed to using enforce() for bug detection.There's nothing wrong with encapsulating this idiom (if frequent). That's what essentially alwaysAssert does. So you're right but without contradicting dsimcha's suggestion.
Mar 17 2011
On 3/17/2011 7:12 PM, Walter Bright wrote:Sure, but there is plenty wrong with using enforce() for bug detection even if alwaysAssert does not exist. For one thing, such uses encourage others to misunderstand and misuse enforce. Additionally, alwaysAssert is an obvious one liner. I think such things need to be very frequently used to consider them part of the standard library. Otherwise, we risk Phobos becoming a morass of trivia.What makes you think it wouldn't be used very frequently? It seems silly to me to turn off asserts in non-performance-critical bits of code just because I don't want bounds checking or the more expensive asserts.
Mar 17 2011
On 03/17/2011 06:38 PM, dsimcha wrote:On 3/17/2011 7:12 PM, Walter Bright wrote:To me it sounds perfectly normal that there are integrity checks that you want to keep at all times, whereas others you only want to keep in a debug build. AndreiSure, but there is plenty wrong with using enforce() for bug detection even if alwaysAssert does not exist. For one thing, such uses encourage others to misunderstand and misuse enforce. Additionally, alwaysAssert is an obvious one liner. I think such things need to be very frequently used to consider them part of the standard library. Otherwise, we risk Phobos becoming a morass of trivia.What makes you think it wouldn't be used very frequently? It seems silly to me to turn off asserts in non-performance-critical bits of code just because I don't want bounds checking or the more expensive asserts.
Mar 17 2011
On 3/17/2011 4:38 PM, dsimcha wrote:On 3/17/2011 7:12 PM, Walter Bright wrote:I don't know if it would or would not be used very frequently.Sure, but there is plenty wrong with using enforce() for bug detection even if alwaysAssert does not exist. For one thing, such uses encourage others to misunderstand and misuse enforce. Additionally, alwaysAssert is an obvious one liner. I think such things need to be very frequently used to consider them part of the standard library. Otherwise, we risk Phobos becoming a morass of trivia.What makes you think it wouldn't be used very frequently?It seems silly to me to turn off asserts in non-performance-critical bits of code just because I don't want bounds checking or the more expensive asserts.The use case is more constrained than that. Because of the existence of: if (!condition) assert(0); the alwaysAssert is constrained to those purposes where the user feels the need for file/line/message for bug detection in released code, and also does not want to use: if (!condition) { writeln("my message %s %s", __FILE__, __LINE__); assert(0); } Furthermore, nothing prevents the user from writing his own alwaysAssert. For inclusion in Phobos, the more trivial something is, the higher utility it needs to have to justify it. Of course, there's an element of subjectivity to these judgments. One liners, though, should always be subject to significant scrutiny and justification. Once in, we'll be stuck with them for a long time.
Mar 17 2011
On 3/17/11 7:16 PM, Walter Bright wrote:On 3/17/2011 4:38 PM, dsimcha wrote:Note that you have (twice in two different posts) a bug in your code: you should have used writefln, not writeln. This humorously ruins your point, particularly because it's a bug likely to make it all the way to production (since that code path would normally not be exercised). Furthermore, the format of the message is decided with every call instead of centrally.On 3/17/2011 7:12 PM, Walter Bright wrote:I don't know if it would or would not be used very frequently.Sure, but there is plenty wrong with using enforce() for bug detection even if alwaysAssert does not exist. For one thing, such uses encourage others to misunderstand and misuse enforce. Additionally, alwaysAssert is an obvious one liner. I think such things need to be very frequently used to consider them part of the standard library. Otherwise, we risk Phobos becoming a morass of trivia.What makes you think it wouldn't be used very frequently?It seems silly to me to turn off asserts in non-performance-critical bits of code just because I don't want bounds checking or the more expensive asserts.The use case is more constrained than that. Because of the existence of: if (!condition) assert(0); the alwaysAssert is constrained to those purposes where the user feels the need for file/line/message for bug detection in released code, and also does not want to use: if (!condition) { writeln("my message %s %s", __FILE__, __LINE__); assert(0); }Furthermore, nothing prevents the user from writing his own alwaysAssert.Conversely, nothing prevents the library from defining a function if it deems it widely useful, even if short.For inclusion in Phobos, the more trivial something is, the higher utility it needs to have to justify it. Of course, there's an element of subjectivity to these judgments. One liners, though, should always be subject to significant scrutiny and justification. Once in, we'll be stuck with them for a long time.Correct. There are also other criteria such as standardization. Primitives for logging would score strongly on the standardization scale, though they are often trivial to implement. You rose things debug and unittest all the way up to coveted keyword status because you correctly understood that, although such items could have easily been left to the implementation, everybody would have chosen their own devices creating a morass of incompatibility. I find it incongruent that you so strongly believe such success cannot be reproduced. Andrei
Mar 17 2011
On 3/17/2011 5:41 PM, Andrei Alexandrescu wrote:That's because I used cut & paste.if (!condition) { writeln("my message %s %s", __FILE__, __LINE__); assert(0); }Note that you have (twice in two different posts)a bug in your code: you should have used writefln, not writeln.I made a mistake, I should have tested it.This humorously ruins your point,Come on. In any case, it would print: my message %s %stest.d6 core.exception.AssertError test(6): Assertion failure and the information is still there, just badly formatted.Right. So is it so widely useful that it justifies the cognitive load of documentation of it and filling up Phobos with trivial stuff? It's not just alwaysAssert(), this particular issue comes up again and again. The last time it was for a suite of math functions that took degrees instead of radians. I think what we need in Phobos is nontrivial stuff. Things like the fast xml library, network code, database interface, etc.Furthermore, nothing prevents the user from writing his own alwaysAssert.Conversely, nothing prevents the library from defining a function if it deems it widely useful, even if short.There's a limited amount of such things one should do. Where does it stop? Each addition must be judged on its own merits, not on the merits of something else. As many have pointed out, D does not follow any of its principles 100%, because doing so will drive it into a ditch, as do all things that value adherence to principle over utility.For inclusion in Phobos, the more trivial something is, the higher utility it needs to have to justify it. Of course, there's an element of subjectivity to these judgments. One liners, though, should always be subject to significant scrutiny and justification. Once in, we'll be stuck with them for a long time.Correct. There are also other criteria such as standardization. Primitives for logging would score strongly on the standardization scale, though they are often trivial to implement. You rose things debug and unittest all the way up to coveted keyword status because you correctly understood that, although such items could have easily been left to the implementation, everybody would have chosen their own devices creating a morass of incompatibility. I find it incongruent that you so strongly believe such success cannot be reproduced.
Mar 17 2011
On 03/17/2011 06:12 PM, Walter Bright wrote:On 3/17/2011 3:08 PM, Andrei Alexandrescu wrote:(I'm not sure what you even want to convey here as your statement does not contradict or oppose any other, yet is grammatically formulated as if it did. One may as well reply with "Yes, but the water's wet.") No question enforce would be wrong for bug detection. Using this would be just as wrong: if (undefinedState) throw new Exception("Hmm, odd..."); By packaging the if/throw combo, enforce becomes a notion, a part of the vocabulary, a meme if you wish. That makes it neither more nor less wrong for bug detection, but makes it plenty better for systematic error handling. Now, there is an additional issue that may confuse people on the relative roles of assert and enforce. We have faced the question, how do we validate arguments to a function in Phobos? Initially I used enforce() all over the place, under the assumption that Phobos' user and Phobos are separate entities. Therefore, any argument coming from outside Phobos would be necessarily considered I/O from within Phobos and therefore scrubbed accordingly. Then there was pressure on loss of efficiency due to checking, so I and others replaced certain instances of enforce() with assert(). This is not wrong at all. Instead, it reflects a different view of the dynamics between Phobos and its user: now Phobos + user code is considered as an entity that works together. So a failing assert in Phobos could describe a bug in Phobos itself or one in the application code that uses it. This is more ambiguous but not one bit less correct under the stated assumptions.Sure, but there is plenty wrong with using enforce() for bug detection even if alwaysAssert does not exist. For one thing, such uses encourage others to misunderstand and misuse enforce.if (!condition) { writeln("my message %s %s", __FILE__, __LINE__); assert(0); } I am strongly opposed to using enforce() for bug detection.There's nothing wrong with encapsulating this idiom (if frequent). That's what essentially alwaysAssert does. So you're right but without contradicting dsimcha's suggestion.Additionally, alwaysAssert is an obvious one liner. I think such things need to be very frequently used to consider them part of the standard library. Otherwise, we risk Phobos becoming a morass of trivia.enforce() is an obvious one liner too. Size is not the only means to assess the usefulness of an abstraction. Two others are frequency of the pattern (think "writeln") and ascribing a meaningful name to it (think "unittest"). is a good read, let me paste: ========================= We have seen that procedures are, in effect, abstractions that describe compound operations on numbers independent of the particular numbers. For example, when we (define (cube x) (* x x x)) we are not talking about the cube of a particular number, but rather about a method for obtaining the cube of any number. Of course we could get along without ever defining this procedure, by always writing expressions such as (* 3 3 3) (* x x x) (* y y y) and never mentioning cube explicitly. This would place us at a serious disadvantage, forcing us to work always at the level of the particular operations that happen to be primitives in the language (multiplication, in this case) rather than in terms of higher-level operations. Our programs would be able to compute cubes, but our language would lack the ability to express the concept of cubing. One of the things we should demand from a powerful programming language is the ability to build abstractions by assigning names to common patterns and then to work in terms of the abstractions directly. Procedures provide this ability. This is why all but the most primitive programming languages include mechanisms for defining procedures. ========================= Andrei
Mar 17 2011
On 3/17/2011 5:02 PM, Andrei Alexandrescu wrote:[...]I don't disagree with anything you wrote. But I am suggesting that one liners should have a high utility to be justifiably included in Phobos. --------------------------------- You mentioned wondering where we should draw the line in using asserts to check function inputs as opposed to using enforce. I suggest that line should be when a shared library/dll boundary is crossed. Statically linked libs should use assert. The reason is straightforward - a shared library/dll cannot know in advance what will be connected to it, so it should treat data coming in from an external source as untrusted input. A statically linked library, on the other hand, is inextricably bound to a specific caller and is debugged/tested as a whole. This raises the spectre about what to do with Phobos if Phobos is built as a dll.
Mar 17 2011
On 3/17/11 7:31 PM, Walter Bright wrote:On 3/17/2011 5:02 PM, Andrei Alexandrescu wrote: > [...] I don't disagree with anything you wrote. But I am suggesting that one liners should have a high utility to be justifiably included in Phobos. --------------------------------- You mentioned wondering where we should draw the line in using asserts to check function inputs as opposed to using enforce. I suggest that line should be when a shared library/dll boundary is crossed. Statically linked libs should use assert. The reason is straightforward - a shared library/dll cannot know in advance what will be connected to it, so it should treat data coming in from an external source as untrusted input. A statically linked library, on the other hand, is inextricably bound to a specific caller and is debugged/tested as a whole. This raises the spectre about what to do with Phobos if Phobos is built as a dll.These are all very good points and insights. We should keep them in mind. Andrei
Mar 17 2011
On Thursday, March 17, 2011 18:23:51 Andrei Alexandrescu wrote:On 3/17/11 7:31 PM, Walter Bright wrote:It also brings us back to one of Bearophile's concerns. If you want assertions to be enabled in Phobos, you need a non-release build, and Phobos is distributed in non-release build. The only way to have a non-release build is to build it yourself and replace your libphobos.a (or phobos.lib) with the non-release version. Some folks want a way to make it so that there's a release and non- release version of Phobos and dmd picks the release version when you compile with -release and picks the non-release version otherwise. - Jonathan M DavisOn 3/17/2011 5:02 PM, Andrei Alexandrescu wrote: > [...] I don't disagree with anything you wrote. But I am suggesting that one liners should have a high utility to be justifiably included in Phobos. --------------------------------- You mentioned wondering where we should draw the line in using asserts to check function inputs as opposed to using enforce. I suggest that line should be when a shared library/dll boundary is crossed. Statically linked libs should use assert. The reason is straightforward - a shared library/dll cannot know in advance what will be connected to it, so it should treat data coming in from an external source as untrusted input. A statically linked library, on the other hand, is inextricably bound to a specific caller and is debugged/tested as a whole. This raises the spectre about what to do with Phobos if Phobos is built as a dll.These are all very good points and insights. We should keep them in mind.
Mar 17 2011
On 2011-03-17 20:31:43 -0400, Walter Bright <newshound2 digitalmars.com> said:On 3/17/2011 5:02 PM, Andrei Alexandrescu wrote: > [...] I don't disagree with anything you wrote. But I am suggesting that one liners should have a high utility to be justifiably included in Phobos. --------------------------------- You mentioned wondering where we should draw the line in using asserts to check function inputs as opposed to using enforce. I suggest that line should be when a shared library/dll boundary is crossed. Statically linked libs should use assert. The reason is straightforward - a shared library/dll cannot know in advance what will be connected to it, so it should treat data coming in from an external source as untrusted input. A statically linked library, on the other hand, is inextricably bound to a specific caller and is debugged/tested as a whole. This raises the spectre about what to do with Phobos if Phobos is built as a dll.This would be much easier to work with if the decision about checking "in" contracts was taken at the call site. If user code is compiled with contracts, any user code calling Phobos would check the contracts too, dynamic library or not. One way to make this work is by making the compiler take the contract as a separate function to call. For instance, this function: int test(int i) in { assert(i >= 0); } body { return 100 / i; } would be split in two: int testContract(int i) { assert(i >= 0); return test(i); // could hard-code tail call optimization here } int test(int i) { return 100 / i; } If the function that calls this test function is compiled with contracts turned on, it substitutes the call to test() for a call to testContract(), and the contracts gets checked. The testContract() function does not necessarily need to be part of the library, it can be instantiated as needed at the call point. It could even work with virtual functions: if test() is virtual, testContract() would remain non-virtual and a call to the virtual function test() would be replaced with a call to the non-virtual function testContract() (which would be charged to call test). There's two concerns however: 1. the contract would be checked against the static type instead of the dynamic type as it is right now. Checking against the dynamic type would require a new slot on the vtable -- or a separate vtable, perhaps inside of the ClassInfo -- which would require contracts for public and protected functions to be part of the library at all times. 2. taking the address of a function (or a delegate) could give you the one that includes the contract if contracts are turned on, but that would mean that code compiled with contracts and code compiled without them would get different addresses for the same function inside of the same executable, which could break some expectations. -- Michel Fortin michel.fortin michelf.com http://michelf.com/
Mar 17 2011
Andrei:No need to blow out of proportion everything that serves a point.You are right, but probably I am doing that because I see you nearly deaf to the problems I see in Phobos usages of enforce().There are only few places in which use of enforce (or checking in general) slows things down.I have hit some of such cases in my code, finding them through profiling. At first I didn't expect Phobos functions to give those problems :-(Because I don't condone defining large exception hierarchies.The WrongArgumentException I am talking about comes from a set of less than about ten most useful exceptions, and I mean this hierarchy to be flat, all of them come from Exception. So this is not a large exception hierarchy.but that's not an issue that is the charter of enforce or that enforce prevents.When you design a language and its standard library you have to keep a balance between making things very easy but not good enough, and very hard/fussy but better (see the simplicity of ddoc and D unittests, ddoc is mostly OK, but unnittests are probably a bit too much simple, they miss some essential features like a name). In my opinion a standard library is meant to throw a bit better exceptions than fully generic ones.It makes the standard library writers productive.enforce() has clearly some disadvantages. I believe the very small convenience it brings to Phobos writers is not enough to justify its usage in many cases. One of such cases is inside iota(), where I suggest to replace its usage with a if+throw to allow iota() to be usable in pure functions too.Hoping less and doing more would be great.You are right. I am sorry. I am trying to help, even if I am not doing enough. Bye and thank you for your answers, bearophile
Mar 16 2011
On 03/16/2011 09:33 PM, bearophile wrote:Andrei:It's not about me. Phobos has several contributors (including non-committers) who could be receptive to such issues and proactive about fixing them either in the language or the library.No need to blow out of proportion everything that serves a point.You are right, but probably I am doing that because I see you nearly deaf to the problems I see in Phobos usages of enforce().There are indeed a few places in which using enforce makes things slower. The principled approach to such things is not to blame enforce, but to fix the compiler to allow such a simple and effective idiom.There are only few places in which use of enforce (or checking in general) slows things down.I have hit some of such cases in my code, finding them through profiling. At first I didn't expect Phobos functions to give those problems :-(You may want to add a DIP at http://prowiki.org/wiki4d/wiki.cgi?LanguageDevel (possibly backed up by a pull request) and discuss it here. There are always ten "most useful" exceptions, except not all people think of the same ten.Because I don't condone defining large exception hierarchies.The WrongArgumentException I am talking about comes from a set of less than about ten most useful exceptions, and I mean this hierarchy to be flat, all of them come from Exception. So this is not a large exception hierarchy.The rhetoric sounds great. Now let's see a concrete proposal.but that's not an issue that is the charter of enforce or that enforce prevents.When you design a language and its standard library you have to keep a balance between making things very easy but not good enough, and very hard/fussy but better (see the simplicity of ddoc and D unittests, ddoc is mostly OK, but unnittests are probably a bit too much simple, they miss some essential features like a name). In my opinion a standard library is meant to throw a bit better exceptions than fully generic ones.enforce is convenient and leads to short, simple, and correct functions. Small and large teams have used and are using similar artifacts in codebases at three other companies I worked and work for. On what basis are you assessing the amount of convenience it brings?It makes the standard library writers productive.enforce() has clearly some disadvantages. I believe the very small convenience it brings to Phobos writers is not enough to justify its usage in many cases.One of such cases is inside iota(), where I suggest to replace its usage with a if+throw to allow iota() to be usable in pure functions too.I'd almost suggest using bugzilla.If anything please don't go again the sheepish route. If you were really sorry you wouldn't have started with something to be sorry about - and in what tone - in the first place. After the initial self-righteous and over-confident stance, it always seems awkwardly insincere. Wouldn't a simple and honest discussion be best? Framing everything as a diatribe against a two-line function is just ungainly. AndreiHoping less and doing more would be great.You are right. I am sorry. I am trying to help, even if I am not doing enough.
Mar 16 2011
I'd just like to summarize what useful stuff came out of this topic: * enforce is useful and more than a "always activated assert" ;-) * enforce prevents inlining and thus has negative impact on performance - this should probably be fixed. * enforce can't be used in weakly pure functions - this has the side-effect that iota() (maybe other functions as well) can't be used in pure functions - this should also be fixed. if fixing it is difficult /maybe/ if+throw should be used in potentially (weakly) pure functions in phobos until it is fixed * enforce's docs should probably mention null and false as well (even though maybe "zero" implies that, but it'd be clearer) - while I'm at it: I think the enforceEx signature in the docs is incomplete * it *may* encourage using the generic Exception instead of a specific more meaningful exception - related: some places in phobos could use a more specific Exception, e.g. iota() Cheers, - Daniel
Mar 16 2011
Daniel Gibson wrote:I'd just like to summarize what useful stuff came out of this topic: * enforce is useful and more than a "always activated assert" ;-) * enforce prevents inlining and thus has negative impact on performance - this should probably be fixed. * enforce can't be used in weakly pure functions - this has the side-effect that iota() (maybe other functions as well) can't be used in pure functions - this should also be fixed. if fixing it is difficult /maybe/ if+throw should be used in potentially (weakly) pure functions in phobos until it is fixedThat was discussed on the Phobos ng some time back. I don't think it's a compiler issue. It's just not pure because the lazy delegate isn't marked as pure. Since you can overload on pure, I'm not sure why this hasn't been done yet.* enforce's docs should probably mention null and false as well (even though maybe "zero" implies that, but it'd be clearer) - while I'm at it: I think the enforceEx signature in the docs is incomplete * it *may* encourage using the generic Exception instead of a specific more meaningful exception - related: some places in phobos could use a more specific Exception, e.g. iota() Cheers, - Daniel
Mar 16 2011
On Wednesday 16 March 2011 23:51:33 Don wrote:Daniel Gibson wrote:Probably because 1. Very little has been done with pure in Phobos thus far in general. 2. How many people know that you can overload on pure? _I_ sure didn't know that. How does that even work? The pure version is called if the caller is pure? Or are you talking about overloading on the lazy delegate? How would that be determined to be pure anyway? If the expression is pure? The fact that format isn't pure will rain on that parade a fair bit, but there _are_ quite a few uses of enforce (probably even the majority) which are just string literals, so that would go a fair ways. Overall, I think that the biggest obstacle to pure at this point is the lack of conditional purity for templates. We need to be able to say that a templated function is pure if it meets some set of conditions (like every function that it calls is pure). I believe that the best proposal for syntax on that is to do pure(condition) instead of just pure. Of course, nothrow, safe, trusted, etc. would likely need to have the same. But regardless, the fact that you can't generally make templated functions pure (especially in std.range and std.algorithm) _really_ puts a kink in using purity. I _was_ able to use pure fairly heavily in std.datetime, but it's probably just about the only place in Phobos right now that use pure much. - Jonathan M DavisI'd just like to summarize what useful stuff came out of this topic: * enforce is useful and more than a "always activated assert" ;-) * enforce prevents inlining and thus has negative impact on performance - this should probably be fixed. * enforce can't be used in weakly pure functions - this has the side-effect that iota() (maybe other functions as well) can't be used in pure functions - this should also be fixed. if fixing it is difficult /maybe/ if+throw should be used in potentially (weakly) pure functions in phobos until it is fixedThat was discussed on the Phobos ng some time back. I don't think it's a compiler issue. It's just not pure because the lazy delegate isn't marked as pure. Since you can overload on pure, I'm not sure why this hasn't been done yet.
Mar 17 2011
On Thu, 17 Mar 2011 07:51:33 +0100, Don wrote:Daniel Gibson wrote:You can overload on pure, yes, but only when you pass an explicit delegate. The following doesn't work, for instance: void foo(pure lazy string s) { ... } The compiler complains that "basic type expected, not pure". With "lazy", the compiler creates a delegate under the hood, and it needs the ability to deduce when that delegate can be marked as pure. For the function above, for instance, passing a simple string literal should be perfectly fine, as should the following: int baz() pure { ... } string bar(int i) pure { ... } foo(bar(baz())); -LarsI'd just like to summarize what useful stuff came out of this topic: * enforce is useful and more than a "always activated assert" ;-) * enforce prevents inlining and thus has negative impact on performance - this should probably be fixed. * enforce can't be used in weakly pure functions - this has the side-effect that iota() (maybe other functions as well) can't be used in pure functions - this should also be fixed. if fixing it is difficult /maybe/ if+throw should be used in potentially (weakly) pure functions in phobos until it is fixedThat was discussed on the Phobos ng some time back. I don't think it's a compiler issue. It's just not pure because the lazy delegate isn't marked as pure. Since you can overload on pure, I'm not sure why this hasn't been done yet.
Mar 17 2011
Lars T. Kyllingstad wrote:On Thu, 17 Mar 2011 07:51:33 +0100, Don wrote:Ah, OK. I was pretty sure there wasn't a problem with delegates, didn't realize that lazy was the issue. Nonetheless, I think we can just overload enforce() to fix this problem.Daniel Gibson wrote:You can overload on pure, yes, but only when you pass an explicit delegate. The following doesn't work, for instance: void foo(pure lazy string s) { ... } The compiler complains that "basic type expected, not pure".I'd just like to summarize what useful stuff came out of this topic: * enforce is useful and more than a "always activated assert" ;-) * enforce prevents inlining and thus has negative impact on performance - this should probably be fixed. * enforce can't be used in weakly pure functions - this has the side-effect that iota() (maybe other functions as well) can't be used in pure functions - this should also be fixed. if fixing it is difficult /maybe/ if+throw should be used in potentially (weakly) pure functions in phobos until it is fixedThat was discussed on the Phobos ng some time back. I don't think it's a compiler issue. It's just not pure because the lazy delegate isn't marked as pure. Since you can overload on pure, I'm not sure why this hasn't been done yet.With "lazy", the compiler creates a delegate under the hood, and it needs the ability to deduce when that delegate can be marked as pure. For the function above, for instance, passing a simple string literal should be perfectly fine, as should the following: int baz() pure { ... } string bar(int i) pure { ... } foo(bar(baz())); -Lars
Mar 17 2011
Don:Ah, OK. I was pretty sure there wasn't a problem with delegates, didn't realize that lazy was the issue. Nonetheless, I think we can just overload enforce() to fix this problem.In one of the answers I've written to Andrei I have shown this link, it shows the problem is caused by lazy: http://d.puremagic.com/issues/show_bug.cgi?id=5746 What is the enforce() overload do you suggest to add to Phobos? Bye, bearophile
Mar 17 2011
bearophile Wrote:When you design a language and its standard library you have to keep a balance between making things very easy but not good enough, and very hard/fussy but better (see the simplicity of ddoc and D unittests, ddoc is mostly OK, but unnittests are probably a bit too much simple, they miss some essential features like a name). In my opinion a standard library is meant to throw a bit better exceptions than fully generic ones..net framework was designed to use sizeable exception hierarchy, though this approach failed, in most cases everything goes ok and in the case of an error you can't recover, no matter what error it is. So the code usually ends up either catching Exception or not catching anything.
Mar 17 2011
Steven Schveighoffer Wrote:As long as the delegate does not access shared/global data, it should be able to be pure. Even delegates which modify TLS data should be able to be pure (weak-pure, but still pure).Pure functions calling weakly pure functions are also weakly pure and so on. This effectively leaves you without purity.
Mar 18 2011
Kagamin wrote:Steven Schveighoffer Wrote:TLS variables are global and must not be accessed from any function marked as pure. With regard to purity, there isn't any difference between shared and TLS variables.As long as the delegate does not access shared/global data, it should be able to be pure. Even delegates which modify TLS data should be able to be pure (weak-pure, but still pure).Pure functions calling weakly pure functions are also weakly pure and so on. This effectively leaves you without purity.I presume you mean "Pure functions calling weakly pure functions *would also be* weakly pure and so on." ?
Mar 18 2011
Don Wrote:What's the difference?Pure functions calling weakly pure functions are also weakly pure and so on. This effectively leaves you without purity.I presume you mean "Pure functions calling weakly pure functions *would also be* weakly pure and so on." ?
Mar 18 2011
On Fri, 18 Mar 2011 11:02:13 +0100, Kagamin <spam here.lot> wrote:Don Wrote:Your original statement seems to indicate that strongly pure functions would be reduced to weakly pure if they call weakly pure functions. -- SimenWhat's the difference?Pure functions calling weakly pure functions are also weakly pure andso on. This effectively leaves you without purity. I presume you mean "Pure functions calling weakly pure functions *would also be* weakly pure and so on." ?
Mar 18 2011
On Fri, 18 Mar 2011 04:34:54 -0400, Don <nospam nospam.com> wrote:However, it's still not shared. This, for example, is a weak pure function: void foo(int *n) pure { *n = 5;} Because TLS variables are not shared, you should be able to do this: int x; void bar() { foo(&x); } But you are right, there is a huge difference between a local reference to TLS data and directly accessing TLS data -- the latter can be obscured from the compiler, resulting in the compiler thinking the function can be strong pure. So I don't know exactly how to mitigate this, but in my mind, it feels like this should work: int foo(bool cond, lazy int n) pure { if(cond) return n; return 0;} int x; void bar() { foo(x == 4, x = 5); } It seems not too different from the above example where you pass the address of x. But obviously the x = 5 delegate cannot be pure (it modifies TLS data). We may have no recourse to get this to work. It may be a lost cause, and you just can't have lazy variables for pure functions. Cue the request for macros where you can just rewrite the syntax vs. having to use lazy in the first place... -SteveSteven Schveighoffer Wrote:TLS variables are global and must not be accessed from any function marked as pure. With regard to purity, there isn't any difference between shared and TLS variables.As long as the delegate does not access shared/global data, it should be able to be pure. Even delegates which modify TLS data should be able to be pure (weak-pure, but still pure).
Mar 18 2011
Steven Schveighoffer wrote:On Fri, 18 Mar 2011 04:34:54 -0400, Don <nospam nospam.com> wrote:Yes, that compiles fine. But bar() is not pure.However, it's still not shared. This, for example, is a weak pure function: void foo(int *n) pure { *n = 5;} Because TLS variables are not shared, you should be able to do this: int x; void bar() { foo(&x); }Steven Schveighoffer Wrote:TLS variables are global and must not be accessed from any function marked as pure. With regard to purity, there isn't any difference between shared and TLS variables.As long as the delegate does not access shared/global data, it should be able to be pure. Even delegates which modify TLS data should be able to be pure (weak-pure, but still pure).But you are right, there is a huge difference between a local reference to TLS data and directly accessing TLS data -- the latter can be obscured from the compiler, resulting in the compiler thinking the function can be strong pure. So I don't know exactly how to mitigate this, but in my mind, it feels like this should work: int foo(bool cond, lazy int n) pure { if(cond) return n; return 0;} int x; void bar() { foo(x == 4, x = 5); } It seems not too different from the above example where you pass the address of x. But obviously the x = 5 delegate cannot be pure (it modifies TLS data). We may have no recourse to get this to work. It may be a lost cause, and you just can't have lazy variables for pure functions.It's not a lost cause, it's a two-liner! mtype.c line 5045: if (fparam->storageClass & STClazy) { - error(0, "cannot have lazy parameters to a pure function"); + tf->purity = PUREweak; + break; } This is a bit conservative: it would be possible to allow lazy parameters to be marked as pure, which would allow them to be strongly pure. But that would probably not be worth the extra complexity.
Mar 18 2011
On Fri, 18 Mar 2011 14:35:27 -0400, Don <nospam nospam.com> wrote:Steven Schveighoffer wrote:I'm not sure this works. Aren't you allowed to pass in a delegate to a lazy parameter? For example: shared int x; int foo() { return x; } int bar(lazy int n) pure { return n; } void baz() { bar(&foo); } or alternatively: void baz() { bar(x); } The no-shared-data rule prevents you from passing in a shared int reference to a pure function, but how do you stop a delegate from accessing shared data? -SteveOn Fri, 18 Mar 2011 04:34:54 -0400, Don <nospam nospam.com> wrote:Yes, that compiles fine. But bar() is not pure.However, it's still not shared. This, for example, is a weak pure function: void foo(int *n) pure { *n = 5;} Because TLS variables are not shared, you should be able to do this: int x; void bar() { foo(&x); }Steven Schveighoffer Wrote:TLS variables are global and must not be accessed from any function marked as pure. With regard to purity, there isn't any difference between shared and TLS variables.As long as the delegate does not access shared/global data, it should be able to be pure. Even delegates which modify TLS data should be able to be pure (weak-pure, but still pure).But you are right, there is a huge difference between a local reference to TLS data and directly accessing TLS data -- the latter can be obscured from the compiler, resulting in the compiler thinking the function can be strong pure. So I don't know exactly how to mitigate this, but in my mind, it feels like this should work: int foo(bool cond, lazy int n) pure { if(cond) return n; return 0;} int x; void bar() { foo(x == 4, x = 5); } It seems not too different from the above example where you pass the address of x. But obviously the x = 5 delegate cannot be pure (it modifies TLS data). We may have no recourse to get this to work. It may be a lost cause, and you just can't have lazy variables for pure functions.It's not a lost cause, it's a two-liner! mtype.c line 5045: if (fparam->storageClass & STClazy) { - error(0, "cannot have lazy parameters to a pure function"); + tf->purity = PUREweak; + break; } This is a bit conservative: it would be possible to allow lazy parameters to be marked as pure, which would allow them to be strongly pure. But that would probably not be worth the extra complexity.
Mar 18 2011
Steven Schveighoffer wrote:On Fri, 18 Mar 2011 14:35:27 -0400, Don <nospam nospam.com> wrote:Yes.Steven Schveighoffer wrote:I'm not sure this works. Aren't you allowed to pass in a delegate to a lazy parameter?On Fri, 18 Mar 2011 04:34:54 -0400, Don <nospam nospam.com> wrote:Yes, that compiles fine. But bar() is not pure.However, it's still not shared. This, for example, is a weak pure function: void foo(int *n) pure { *n = 5;} Because TLS variables are not shared, you should be able to do this: int x; void bar() { foo(&x); }Steven Schveighoffer Wrote:TLS variables are global and must not be accessed from any function marked as pure. With regard to purity, there isn't any difference between shared and TLS variables.As long as the delegate does not access shared/global data, it should be able to be pure. Even delegates which modify TLS data should be able to be pure (weak-pure, but still pure).But you are right, there is a huge difference between a local reference to TLS data and directly accessing TLS data -- the latter can be obscured from the compiler, resulting in the compiler thinking the function can be strong pure. So I don't know exactly how to mitigate this, but in my mind, it feels like this should work: int foo(bool cond, lazy int n) pure { if(cond) return n; return 0;} int x; void bar() { foo(x == 4, x = 5); } It seems not too different from the above example where you pass the address of x. But obviously the x = 5 delegate cannot be pure (it modifies TLS data). We may have no recourse to get this to work. It may be a lost cause, and you just can't have lazy variables for pure functions.It's not a lost cause, it's a two-liner! mtype.c line 5045: if (fparam->storageClass & STClazy) { - error(0, "cannot have lazy parameters to a pure function"); + tf->purity = PUREweak; + break; } This is a bit conservative: it would be possible to allow lazy parameters to be marked as pure, which would allow them to be strongly pure. But that would probably not be worth the extra complexity.For example: shared int x; int foo() { return x; } int bar(lazy int n) pure { return n; } void baz() { bar(&foo); } or alternatively: void baz() { bar(x); }This compiles just fine. (Well, you need to use bar(foo) not bar(&foo)). But if you try to mark baz() as pure, here's what you get: test0.d(135): Error: pure function 'baz' cannot call impure function 'foo' or for the second case: test0.d(136): Error: pure function 'baz' cannot access mutable static data 'x' bar is just weakly pure.The no-shared-data rule prevents you from passing in a shared int reference to a pure function, but how do you stop a delegate from accessing shared data?Delegates are either marked as pure, or not. In the case above, foo() is not pure.
Mar 18 2011
On Fri, 18 Mar 2011 20:06:16 -0400, Don <nospam nospam.com> wrote:Steven Schveighoffer wrote:But does this make sense? A pure function (bar) is reading a shared integer via foo, I thought that was a big no-no?On Fri, 18 Mar 2011 14:35:27 -0400, Don <nospam nospam.com> wrote:Yes.Steven Schveighoffer wrote:I'm not sure this works. Aren't you allowed to pass in a delegate to a lazy parameter?On Fri, 18 Mar 2011 04:34:54 -0400, Don <nospam nospam.com> wrote:Yes, that compiles fine. But bar() is not pure.However, it's still not shared. This, for example, is a weak pure function: void foo(int *n) pure { *n = 5;} Because TLS variables are not shared, you should be able to do this: int x; void bar() { foo(&x); }Steven Schveighoffer Wrote:TLS variables are global and must not be accessed from any function marked as pure. With regard to purity, there isn't any difference between shared and TLS variables.As long as the delegate does not access shared/global data, it should be able to be pure. Even delegates which modify TLS data should be able to be pure (weak-pure, but still pure).But you are right, there is a huge difference between a local reference to TLS data and directly accessing TLS data -- the latter can be obscured from the compiler, resulting in the compiler thinking the function can be strong pure. So I don't know exactly how to mitigate this, but in my mind, it feels like this should work: int foo(bool cond, lazy int n) pure { if(cond) return n; return 0;} int x; void bar() { foo(x == 4, x = 5); } It seems not too different from the above example where you pass the address of x. But obviously the x = 5 delegate cannot be pure (it modifies TLS data). We may have no recourse to get this to work. It may be a lost cause, and you just can't have lazy variables for pure functions.It's not a lost cause, it's a two-liner! mtype.c line 5045: if (fparam->storageClass & STClazy) { - error(0, "cannot have lazy parameters to a pure function"); + tf->purity = PUREweak; + break; } This is a bit conservative: it would be possible to allow lazy parameters to be marked as pure, which would allow them to be strongly pure. But that would probably not be worth the extra complexity.For example: shared int x; int foo() { return x; } int bar(lazy int n) pure { return n; } void baz() { bar(&foo); } or alternatively: void baz() { bar(x); }This compiles just fine. (Well, you need to use bar(foo) not bar(&foo)). But if you try to mark baz() as pure, here's what you get: test0.d(135): Error: pure function 'baz' cannot call impure function 'foo'or for the second case: test0.d(136): Error: pure function 'baz' cannot access mutable static data 'x' bar is just weakly pure.But I wasn't saying baz is pure, I was saying bar is pure (probably should be more diverse in the names). But I'm concerned about a pure function being able to indirectly read/write shared data. Does this make sense? I guess a weak-pure function acts like a normal function when called from a normal-function. Is that why it's ok? Will there not be an expectation that a pure function will not read/write shared data that will be broken (i.e. why did the compiler allow this, I thought I was safe from this!)? So is the rule that if you pass a non-pure delegate into a pure function it's automatically weak-pure? If so, does this not mean we need two versions of pure functions that take delegates, one that takes a pure delegate, and one that takes a non-pure one? Otherwise, how do you know what's strong and what's weak? For example, a weak pure function is strong when called from a strong-pure function, so you could say if the calling function is pure, the call is strong-pure. But wouldn't you need separate generated code for the two cases? I guess you can see from the number of question marks, I'm not sure about this at all, either way :) If you think it will work, then I trust your judgment. -Steve
Mar 21 2011
Steven Schveighoffer wrote:On Fri, 18 Mar 2011 20:06:16 -0400, Don <nospam nospam.com> wrote:Yes.Steven Schveighoffer wrote:But does this make sense? A pure function (bar) is reading a shared integer via foo, I thought that was a big no-no?On Fri, 18 Mar 2011 14:35:27 -0400, Don <nospam nospam.com> wrote:Yes.Steven Schveighoffer wrote:I'm not sure this works. Aren't you allowed to pass in a delegate to a lazy parameter?On Fri, 18 Mar 2011 04:34:54 -0400, Don <nospam nospam.com> wrote:Yes, that compiles fine. But bar() is not pure.However, it's still not shared. This, for example, is a weak pure function: void foo(int *n) pure { *n = 5;} Because TLS variables are not shared, you should be able to do this: int x; void bar() { foo(&x); }Steven Schveighoffer Wrote:TLS variables are global and must not be accessed from any function marked as pure. With regard to purity, there isn't any difference between shared and TLS variables.As long as the delegate does not access shared/global data, it should be able to be pure. Even delegates which modify TLS data should be able to be pure (weak-pure, but still pure).But you are right, there is a huge difference between a local reference to TLS data and directly accessing TLS data -- the latter can be obscured from the compiler, resulting in the compiler thinking the function can be strong pure. So I don't know exactly how to mitigate this, but in my mind, it feels like this should work: int foo(bool cond, lazy int n) pure { if(cond) return n; return 0;} int x; void bar() { foo(x == 4, x = 5); } It seems not too different from the above example where you pass the address of x. But obviously the x = 5 delegate cannot be pure (it modifies TLS data). We may have no recourse to get this to work. It may be a lost cause, and you just can't have lazy variables for pure functions.It's not a lost cause, it's a two-liner! mtype.c line 5045: if (fparam->storageClass & STClazy) { - error(0, "cannot have lazy parameters to a pure function"); + tf->purity = PUREweak; + break; } This is a bit conservative: it would be possible to allow lazy parameters to be marked as pure, which would allow them to be strongly pure. But that would probably not be worth the extra complexity.For example: shared int x; int foo() { return x; } int bar(lazy int n) pure { return n; } void baz() { bar(&foo); } or alternatively: void baz() { bar(x); }This compiles just fine. (Well, you need to use bar(foo) not bar(&foo)). But if you try to mark baz() as pure, here's what you get: test0.d(135): Error: pure function 'baz' cannot call impure function 'foo'or for the second case: test0.d(136): Error: pure function 'baz' cannot access mutable static data 'x' bar is just weakly pure.But I wasn't saying baz is pure, I was saying bar is pure (probably should be more diverse in the names). But I'm concerned about a pure function being able to indirectly read/write shared data. Does this make sense? I guess a weak-pure function acts like a normal function when called from a normal-function. Is that why it's ok?Will there not be an expectation that a pure function will not read/write shared data that will be broken (i.e. why did the compiler allow this, I thought I was safe from this!)?If you pass the address of global or shared data into a weakly pure function, it won't be pure. If you have a function with a strongly pure signature, global data can never be passed to it.So is the rule that if you pass a non-pure delegate into a pure function it's automatically weak-pure?Yes.If so, does this not mean we need two versions of pure functions that take delegates, one that takes a pure delegate, and one that takes a non-pure one? Otherwise, how do you know what's strong and what's weak? For example, a weak pure function is strong when called from a strong-pure function, so you could say if the calling function is pure, the call is strong-pure. But wouldn't you need separate generated code for the two cases?Generally not. Basically, all weak-pure means, is that it's OK for a strongly pure function to call it. And that's pretty much all it means. If it's called from outside a strongly pure function, it's just a normal impure function. Now, there is some potential for a call to a weakly pure function to be considered as strongly pure, even when called from a normal function, if all the parameters are pure. But that's a secondary effect (and the compiler currently never does it): the real value of weakly pure is that it allows a dramatic increase in the number of strongly pure functions.I guess you can see from the number of question marks, I'm not sure about this at all, either way :) If you think it will work, then I trust your judgment. -Steve
Mar 21 2011
On Mon, 21 Mar 2011 10:08:56 -0400, Don <nospam nospam.com> wrote:Steven Schveighoffer wrote:Just on this one point, TLS or __gshared references are indistinguishable from normal references, but shared references are not the same, the type system lets you know it's shared. I thought this was the main reason why we were allowed to create weak-pure functions, because d has this distinction. Are you allowed to declare a function like this? int foo(shared int *x) pure {return *x;} I was under the impression that a pure function couldn't access shared data -- period. Is this not true? Clearly, this theoretically weak-pure function could not be called from a strong-pure function, so the pure decoration is useless. But this is very similar to a delegate that does the same thing. Why does one make sense and the other not? In other words, if I have a function like this: int foo(int delegate() x) pure {...} is this *ever* callable from a strong-pure function? Or does the delegate have to be declared pure? It seems to me that either: 1) it's not ever callable from a strong-pure function, making the pure decoration useless or 2) it's callable from a strong pure function, but then the compiler needs to generate two copies of the function, one with a pure delegate, one without. On item 2, the reason I feel this way is in the case where foo wants to pass the delegate to another pure function, it might optimize that call differently if the delegate is known to be pure. Or maybe we don't/can't care... Thanks for having patience, I'm asking all these questions because I want to make sure we do not put in rules that are wrong but hard to remove later when everything uses them -- even though I don't understand everything going on here ;) -SteveWill there not be an expectation that a pure function will not read/write shared data that will be broken (i.e. why did the compiler allow this, I thought I was safe from this!)?If you pass the address of global or shared data into a weakly pure function, it won't be pure. If you have a function with a strongly pure signature, global data can never be passed to it.
Mar 21 2011
On Mon, 21 Mar 2011 15:35:58 +0100, Steven Schveighoffer <schveiguy yahoo.com> wrote:Why does one make sense and the other not? In other words, if I have a function like this: int foo(int delegate() x) pure {...} is this *ever* callable from a strong-pure function? Or does the delegate have to be declared pure? It seems to me that either: 1) it's not ever callable from a strong-pure function, making the pure decoration useless or 2) it's callable from a strong pure function, but then the compiler needs to generate two copies of the function, one with a pure delegate, one without. On item 2, the reason I feel this way is in the case where foo wants to pass the delegate to another pure function, it might optimize that call differently if the delegate is known to be pure. Or maybe we don't/can't care...That is a good point. However, pure delegates should (but might not currently) be implicitly castable to impure. Hence, one version, taking an impure delegate, should be enough. Moreover, I believe a pure delegate could only ever be weakly-pure, hence precluding the use of aggressive optimizations. If my first assumption is correct, and the latter is not, the problem should only occur if you have two versions of a function, one taking a pure delegate, the other taking an impure one. -- Simen
Mar 21 2011
Steven Schveighoffer wrote:On Mon, 21 Mar 2011 10:08:56 -0400, Don <nospam nospam.com> wrote:No.Steven Schveighoffer wrote:Just on this one point, TLS or __gshared references are indistinguishable from normal references, but shared references are not the same, the type system lets you know it's shared. I thought this was the main reason why we were allowed to create weak-pure functions, because d has this distinction. Are you allowed to declare a function like this? int foo(shared int *x) pure {return *x;}Will there not be an expectation that a pure function will not read/write shared data that will be broken (i.e. why did the compiler allow this, I thought I was safe from this!)?If you pass the address of global or shared data into a weakly pure function, it won't be pure. If you have a function with a strongly pure signature, global data can never be passed to it.I was under the impression that a pure function couldn't access shared data -- period. Is this not true?Not necessarily. It only guarantees that it won't access shared data unless you provided it. Clearly, this theoreticallyweak-pure function could not be called from a strong-pure function, so the pure decoration is useless. But this is very similar to a delegate that does the same thing. Why does one make sense and the other not? In other words, if I have a function like this: int foo(int delegate() x) pure {...} is this *ever* callable from a strong-pure function? Or does the delegate have to be declared pure? It seems to me that either: 1) it's not ever callable from a strong-pure function, making the pure decoration useless orIt will only be callable from a strong-pure function if (a) the delegate is marked as pure; or (b) it's a delegate literal (so its purity can be checked). Lazy is an instance of (b).2) it's callable from a strong pure function, but then the compiler needs to generate two copies of the function, one with a pure delegate, one without.If the delegate isn't pure, it cannot be called at all from a strongly pure function. Pure functions (even weakly pure) cannot call non-pure delegates in any way -- except in the aforementioned delegate literal case.On item 2, the reason I feel this way is in the case where foo wants to pass the delegate to another pure function, it might optimize that call differently if the delegate is known to be pure. Or maybe we don't/can't care... Thanks for having patience, I'm asking all these questions because I want to make sure we do not put in rules that are wrong but hard to remove later when everything uses them -- even though I don't understand everything going on here ;) -Steve
Mar 22 2011
On Fri, 18 Mar 2011 03:50:17 -0400, Kagamin <spam here.lot> wrote:Steven Schveighoffer Wrote:No. Strong-pure functions can call weak-pure functions and still can be strong-pure. That's the huge benefit of weak-pure functions -- you can modularize pure functions without having to change everything to immutable. -SteveAs long as the delegate does not access shared/global data, it should be able to be pure. Even delegates which modify TLS data should be able to be pure (weak-pure, but still pure).Pure functions calling weakly pure functions are also weakly pure and so on. This effectively leaves you without purity.
Mar 18 2011
Walter Bright Wrote:1. Asserts and contracts are for detecting program BUGS. They are not for validating user input, checking for disk full, file not found errors, etc. 2. Enforce is for validating user input, checking for disk full, file not found errors, etc. Enforce is NOT for use in contracts or checking for program bugs. Any use of enforce in Phobos that is checking for program bugs is itself a bug and should be entered into bugzilla for fixing.So this is a bug? This is a contract, not a validation of user input. struct Iota(N, S) if ((isIntegral!N || isPointer!N) && isIntegral!S) { private N current, pastLast; private S step; this(N current, N pastLast, S step) { enforce((current <= pastLast && step > 0) || (current >= pastLast && step < 0)); this.current = current; this.step = step;
Mar 18 2011
On Fri, 18 Mar 2011 04:14:12 -0400, Kagamin <spam here.lot> wrote:Walter Bright Wrote:This is a good example of why it's difficult to decide what "user input" is. One could consider that the 'user' in this case is the developer using the library, but I don't think that's the right choice. I'd say it's a bug, this is clearly a contract, since the data being passed into the ctor can easily not be user input (i.e. it's most likely two literals that will never depend on a user). If it is user input, the caller of the ctor should enforce the user input before passing it to iota. -Steve1. Asserts and contracts are for detecting program BUGS. They are not for validating user input, checking for disk full, file not found errors, etc. 2. Enforce is for validating user input, checking for disk full, file not found errors, etc. Enforce is NOT for use in contracts or checking for program bugs. Any use of enforce in Phobos that is checking for program bugs is itself a bug and should be entered into bugzilla for fixing.So this is a bug? This is a contract, not a validation of user input. struct Iota(N, S) if ((isIntegral!N || isPointer!N) && isIntegral!S) { private N current, pastLast; private S step; this(N current, N pastLast, S step) { enforce((current <= pastLast && step > 0) || (current >= pastLast && step < 0)); this.current = current; this.step = step;
Mar 18 2011
On 03/18/2011 01:37 PM, Steven Schveighoffer wrote:This is a good example of why it's difficult to decide what "user input" is. One could consider that the 'user' in this case is the developer using the library, but I don't think that's the right choice. I'd say it's a bug, this is clearly a contract, since the data being passed into the ctor can easily not be user input (i.e. it's most likely two literals that will never depend on a user). If it is user input, the caller of the ctor should enforce the user input before passing it to iota.This is indeed a difficult topic. I'm a bit bluffed when reading people confidently asserting apparently clear positions about the use of enforce vs assert vs contracts and such, or whether such checks should or not stay or not in various distribution builds (mainly -release). I can see at least 5 cases, and am far to be sure what the proper tool is in every case, and in which builds it should stay. In each case, there is potential "wrong" input; but note the variety of cases does seems orthogonal (lol) to what kind of harm it may cause: * colleague: my code is called by code from the same app (same dev team); typically, wrong input logically "cannot" happen * friend: my code is called by code designed to cooperate with it; there is a kind of moral contract In both cases, wrong input reveals a bug; but in the first case, it's my own (team's) bug. I guess, but am not sure, these cases are good candidates for asserts (or contracts?), excluded from release build. * lib call: my code is a typical lib; thus, I have zero control on caller. I would let the check in release mode, thus use enforce. Or, use assert if it remains when the *caller* is compiled in debug mode. There is something unclear here, I guess. Maybe there are two sub-cases: ~ the caller logically should be able to prove its args correct ~ or not In the first case, checks should dispappear in release mode. But there is always a risk. So, what to choose if my func really requires correct input? By the way, I don't understand the diff between enforce and alwaysAssert; I thought enforce was precisely an alwaysAssert. * user input: cope with it. It's the only clear case for me. Denis -- _________________ vita es estrany spir.wikidot.com
Mar 18 2011
On Fri, 18 Mar 2011 11:35:22 -0400, spir <denis.spir gmail.com> wrote:On 03/18/2011 01:37 PM, Steven Schveighoffer wrote:See, this is where I feel we have issues. The clear problem with *always* checking is the iota example. One may use iota like this: foreach(i; iota(0, 5)) Why should checks in iota remain for iota to prove that 0 is less than 5? It always will be less than 5, and the check is not necessary. checks should only be in place during release when the input to the function cannot be proven at compile time. When it can be proven, then the checks should go away. The problem I see is it's iota's responsibility to do those checks, but it has no idea where the data comes from. What I would suggest is to check at the point the argument data is created, not at the point where it's used. So for instance, if you get the parameters for iota from an input file, then you need to check those arguments before passing to iota. This is a difficult problem to solve, because one party knows whether the arguments need to be checked, and the other party knows how to check the arguments. I don't know if there is a clean way to do this. My thoughts are that phobos should only use enforce where it can prove the arguments are runtime-generated, and rely on asserts otherwise. The obvious pitfall is that one could pass runtime-generated data to a phobos function which uses asserts, and the program could crash on an otherwise recoverable error because the user of phobos did not validate the input first. I think the risk here is less important than the reduction in performance that occurs when enforce is used instead.This is a good example of why it's difficult to decide what "user input" is. One could consider that the 'user' in this case is the developer using the library, but I don't think that's the right choice. I'd say it's a bug, this is clearly a contract, since the data being passed into the ctor can easily not be user input (i.e. it's most likely two literals that will never depend on a user). If it is user input, the caller of the ctor should enforce the user input before passing it to iota.This is indeed a difficult topic. I'm a bit bluffed when reading people confidently asserting apparently clear positions about the use of enforce vs assert vs contracts and such, or whether such checks should or not stay or not in various distribution builds (mainly -release). I can see at least 5 cases, and am far to be sure what the proper tool is in every case, and in which builds it should stay. In each case, there is potential "wrong" input; but note the variety of cases does seems orthogonal (lol) to what kind of harm it may cause: * colleague: my code is called by code from the same app (same dev team); typically, wrong input logically "cannot" happen * friend: my code is called by code designed to cooperate with it; there is a kind of moral contract In both cases, wrong input reveals a bug; but in the first case, it's my own (team's) bug. I guess, but am not sure, these cases are good candidates for asserts (or contracts?), excluded from release build. * lib call: my code is a typical lib; thus, I have zero control on caller. I would let the check in release mode, thus use enforce. Or, use assert if it remains when the *caller* is compiled in debug mode. There is something unclear here, I guess. Maybe there are two sub-cases: ~ the caller logically should be able to prove its args correct ~ or notBy the way, I don't understand the diff between enforce and alwaysAssert; I thought enforce was precisely an alwaysAssert.Assert throws an unrecoverable error, and its indication is that there is a problem in the code. An enforce throws a recoverable exception, and indicates there is a problem in the runtime input. -Steve
Mar 18 2011
On 3/18/11 11:07 AM, Steven Schveighoffer wrote:On Fri, 18 Mar 2011 11:35:22 -0400, spir <denis.spir gmail.com> wrote:[snip] This is the kind of job that the compiler could and should do. Whether it's assert and enforce, an inlining pass followed by value range propagation should simply eliminate the unnecessary tests. AndreiOn 03/18/2011 01:37 PM, Steven Schveighoffer wrote:See, this is where I feel we have issues. The clear problem with *always* checking is the iota example. One may use iota like this: foreach(i; iota(0, 5)) Why should checks in iota remain for iota to prove that 0 is less than 5? It always will be less than 5, and the check is not necessary.This is a good example of why it's difficult to decide what "user input" is. One could consider that the 'user' in this case is the developer using the library, but I don't think that's the right choice. I'd say it's a bug, this is clearly a contract, since the data being passed into the ctor can easily not be user input (i.e. it's most likely two literals that will never depend on a user). If it is user input, the caller of the ctor should enforce the user input before passing it to iota.This is indeed a difficult topic. I'm a bit bluffed when reading people confidently asserting apparently clear positions about the use of enforce vs assert vs contracts and such, or whether such checks should or not stay or not in various distribution builds (mainly -release). I can see at least 5 cases, and am far to be sure what the proper tool is in every case, and in which builds it should stay. In each case, there is potential "wrong" input; but note the variety of cases does seems orthogonal (lol) to what kind of harm it may cause: * colleague: my code is called by code from the same app (same dev team); typically, wrong input logically "cannot" happen * friend: my code is called by code designed to cooperate with it; there is a kind of moral contract In both cases, wrong input reveals a bug; but in the first case, it's my own (team's) bug. I guess, but am not sure, these cases are good candidates for asserts (or contracts?), excluded from release build. * lib call: my code is a typical lib; thus, I have zero control on caller. I would let the check in release mode, thus use enforce. Or, use assert if it remains when the *caller* is compiled in debug mode. There is something unclear here, I guess. Maybe there are two sub-cases: ~ the caller logically should be able to prove its args correct ~ or not
Mar 18 2011
On Fri, 18 Mar 2011 12:31:23 -0400, Andrei Alexandrescu <SeeWebsiteForEmail erdani.org> wrote:On 3/18/11 11:07 AM, Steven Schveighoffer wrote:In this simple case yes, but inlining is not forceable, so you should not rely on it for optimizing out asserts or enforce. Inlining also only goes so deep, it doesn't make sense to inline a whole program, so at some point, you are going to use a function call, even though it can be proven the data is within range. From what I can see, we have 3 cases: 1. those where we can prove beyond a doubt that whether a value is valid is runtime dependent. Those cases should obviously use enforce. 2. Those where we can prove beyond a doubt that whether a value is valid does not depend on runtime data. Those cases should obviously use assert. 3. You can't prove beyond a doubt where those values come from. It's case 3 that is the troublesome one, not because it's hard to prove whether it's case 3 or not, but because the code that knows what the data could be (the caller) is separate from the code which knows whether its valid (the callee). It's also case 3 which is the most common. The most common case is a library function which wants to validate its input. So with the tools we have at hand today, which one should be applied to case 3? My preference is to use assert because then the caller has control over whether the data is checked or not. If you use enforce, the caller has no way of saying "no really, I checked that value already!". Note also that phobos functions may be double checking data ALREADY if they make calls to each other. -SteveOn Fri, 18 Mar 2011 11:35:22 -0400, spir <denis.spir gmail.com> wrote:[snip] This is the kind of job that the compiler could and should do. Whether it's assert and enforce, an inlining pass followed by value range propagation should simply eliminate the unnecessary tests.On 03/18/2011 01:37 PM, Steven Schveighoffer wrote:See, this is where I feel we have issues. The clear problem with *always* checking is the iota example. One may use iota like this: foreach(i; iota(0, 5)) Why should checks in iota remain for iota to prove that 0 is less than 5? It always will be less than 5, and the check is not necessary.This is a good example of why it's difficult to decide what "user input" is. One could consider that the 'user' in this case is the developer using the library, but I don't think that's the right choice. I'd say it's a bug, this is clearly a contract, since the data being passed into the ctor can easily not be user input (i.e. it's most likely two literals that will never depend on a user). If it is user input, the caller of the ctor should enforce the user input before passing it to iota.This is indeed a difficult topic. I'm a bit bluffed when reading people confidently asserting apparently clear positions about the use of enforce vs assert vs contracts and such, or whether such checks should or not stay or not in various distribution builds (mainly -release). I can see at least 5 cases, and am far to be sure what the proper tool is in every case, and in which builds it should stay. In each case, there is potential "wrong" input; but note the variety of cases does seems orthogonal (lol) to what kind of harm it may cause: * colleague: my code is called by code from the same app (same dev team); typically, wrong input logically "cannot" happen * friend: my code is called by code designed to cooperate with it; there is a kind of moral contract In both cases, wrong input reveals a bug; but in the first case, it's my own (team's) bug. I guess, but am not sure, these cases are good candidates for asserts (or contracts?), excluded from release build. * lib call: my code is a typical lib; thus, I have zero control on caller. I would let the check in release mode, thus use enforce. Or, use assert if it remains when the *caller* is compiled in debug mode. There is something unclear here, I guess. Maybe there are two sub-cases: ~ the caller logically should be able to prove its args correct ~ or not
Mar 18 2011
On 03/18/2011 05:07 PM, Steven Schveighoffer wrote:On Fri, 18 Mar 2011 11:35:22 -0400, spir <denis.spir gmail.com> wrote:Yes, I think you are correctly surrounding the issue. But my choice would rather be safety as default. Would you really let the func called by a/b "non-check" b!=0? Thus, I would consider allowing the caller stating "don't check this call", not the opposite. Another issue is this creates one more complication in the language; and one orthogonal to the whole set of func-calls; with syntax needed, I guess. Another path is decision via compiler analysis: if arguments can be proved constant (I guess /this/ point can be made), then check is removed for release, automatically; else it cannot be removed at all. [Thanks for the precision about enforce vs alwaysAssert.] Denis -- _________________ vita es estrany spir.wikidot.comOn 03/18/2011 01:37 PM, Steven Schveighoffer wrote:See, this is where I feel we have issues. The clear problem with *always* checking is the iota example. One may use iota like this: foreach(i; iota(0, 5)) Why should checks in iota remain for iota to prove that 0 is less than 5? It always will be less than 5, and the check is not necessary. checks should only be in place during release when the input to the function cannot be proven at compile time. When it can be proven, then the checks should go away. The problem I see is it's iota's responsibility to do those checks, but it has no idea where the data comes from. What I would suggest is to check at the point the argument data is created, not at the point where it's used. So for instance, if you get the parameters for iota from an input file, then you need to check those arguments before passing to iota. This is a difficult problem to solve, because one party knows whether the arguments need to be checked, and the other party knows how to check the arguments. I don't know if there is a clean way to do this. My thoughts are that phobos should only use enforce where it can prove the arguments are runtime-generated, and rely on asserts otherwise. The obvious pitfall is that one could pass runtime-generated data to a phobos function which uses asserts, and the program could crash on an otherwise recoverable error because the user of phobos did not validate the input first. I think the risk here is less important than the reduction in performance that occurs when enforce is used instead.This is a good example of why it's difficult to decide what "user input" is. One could consider that the 'user' in this case is the developer using the library, but I don't think that's the right choice. I'd say it's a bug, this is clearly a contract, since the data being passed into the ctor can easily not be user input (i.e. it's most likely two literals that will never depend on a user). If it is user input, the caller of the ctor should enforce the user input before passing it to iota.This is indeed a difficult topic. I'm a bit bluffed when reading people confidently asserting apparently clear positions about the use of enforce vs assert vs contracts and such, or whether such checks should or not stay or not in various distribution builds (mainly -release). I can see at least 5 cases, and am far to be sure what the proper tool is in every case, and in which builds it should stay. In each case, there is potential "wrong" input; but note the variety of cases does seems orthogonal (lol) to what kind of harm it may cause: * colleague: my code is called by code from the same app (same dev team); typically, wrong input logically "cannot" happen * friend: my code is called by code designed to cooperate with it; there is a kind of moral contract In both cases, wrong input reveals a bug; but in the first case, it's my own (team's) bug. I guess, but am not sure, these cases are good candidates for asserts (or contracts?), excluded from release build. * lib call: my code is a typical lib; thus, I have zero control on caller. I would let the check in release mode, thus use enforce. Or, use assert if it remains when the *caller* is compiled in debug mode. There is something unclear here, I guess. Maybe there are two sub-cases: ~ the caller logically should be able to prove its args correct ~ or not
Mar 18 2011
Steven Schveighoffer Wrote:This is a good example of why it's difficult to decide what "user input" is. One could consider that the 'user' in this case is the developer using the library, but I don't think that's the right choice. I'd say it's a bug, this is clearly a contract, since the data being passed into the ctor can easily not be user input (i.e. it's most likely two literals that will never depend on a user). If it is user input, the caller of the ctor should enforce the user input before passing it to iota.You can't validate all user input, so external data ends up spead across your entire application. So I don't understand obsession with -release switch, because contracts most of the time do validate user input. If we think about -release switch as a HP-hack for exotic code, there will be no ideological difference between assert and enforce.
Mar 18 2011
On Friday, March 18, 2011 09:08:38 Kagamin wrote:Steven Schveighoffer Wrote:The idea is that if an assertion fails, there is a bug in your program. You _cannot_ rely on an assertion being run, because it could be compiled out. It is _only_ for verifying that your code is correct. Exceptions, on the other hand, are used for handling errors. If something which results in an error but which is _not_ a logic bug in your program, then it should be handled by an exception. User input would be a classic example of this. If you get bad user input, that's not the program's fault. It can verify that the user input is valid and then assume that it's valid after that (at which point, using assert would make sense, because it's supposed to be guaranteed that the values are valid, since they were validated). But in handling the user input, it would throw on error, not assert. enforce is merely a shorthand way of testing and throw exceptions on failure. It makes exception handling look like assertions. But it is an _entirely_ different thing. As has been point out, the problem is in cases where it's not clear whether you should treat input as user input (and therefore needs to _always_ be checked and have exceptions thrown on error) or whether you should treat input as being from your program and guaranteed to be valid (at which point you use assert to check that that guarantee actually holds). Assertions are _not_ for error handling. They _kill_ your program on failure (since they throw an Assert_Error_, not an exception). Exceptions (and therefore enforce) are for error handling. There is a _clear_ and _distinct_ difference between the two. The confusion is not between assert and enforce. The confusion is when you have a situation where whether assert or enforce is appropriate depends on how the function is being used. - Jonathan M DavisThis is a good example of why it's difficult to decide what "user input" is. One could consider that the 'user' in this case is the developer using the library, but I don't think that's the right choice. I'd say it's a bug, this is clearly a contract, since the data being passed into the ctor can easily not be user input (i.e. it's most likely two literals that will never depend on a user). If it is user input, the caller of the ctor should enforce the user input before passing it to iota.You can't validate all user input, so external data ends up spead across your entire application. So I don't understand obsession with -release switch, because contracts most of the time do validate user input. If we think about -release switch as a HP-hack for exotic code, there will be no ideological difference between assert and enforce.
Mar 18 2011
I would say it is a bug in the contract. The signature is not normalized and the user gets a chance to provide conflicting parameters. I think that it would be best to deduce the direction from the order of the start and end parameters. Then the stepsize can be made absolute. Am 18.03.2011 09:14, schrieb Kagamin:So this is a bug? This is a contract, not a validation of user input. struct Iota(N, S) if ((isIntegral!N || isPointer!N)&& isIntegral!S) { private N current, pastLast; private S step; this(N current, N pastLast, S step) { enforce((current<= pastLast&& step> 0) || (current>= pastLast&& step< 0)); this.current = current; this.step = step;
Mar 18 2011
So how do you solve the problem? ---------As has been point out, the problem is in cases where it's not clear whether you should treat input as user input (and therefore needs to _always_ be checked and have exceptions thrown on error) or whether you should treat input as being from your program and guaranteed to be valid (at which point you use assert to check that that guarantee actually holds). ----------This is a good example of why it's difficult to decide what "user input" is. One could consider that the 'user' in this case is the developer using the library, but I don't think that's the right choice. I'd say it's a bug, this is clearly a contract, since the data being passed into the ctor can easily not be user input (i.e. it's most likely two literals that will never depend on a user). If it is user input, the caller of the ctor should enforce the user input before passing it to iota.You can't validate all user input, so external data ends up spead across your entire application. So I don't understand obsession with -release switch, because contracts most of the time do validate user input. If we think about -release switch as a HP-hack for exotic code, there will be no ideological difference between assert and enforce.
Mar 24 2011
So how do you solve the problem? ---------It's a case by case thing. In some cases, you go with assertions and let the code choke horribly (or worse, silently sort of work but not quite right) if it's used in a case where it should have been an exception. In others, you use exceptions and just let the efficiency be degraded. It depends on the situation and what you're trying to do. In many cases, you'd go with an assertion and make it clear that the caller needs to check if they want the function to actually work correctly. Then it's up to the caller to check or not. There is no good answer for what to _always_ do in this sort of situation, because the costs can vary considerably from situation to situation. If the function is very cheap, then having additional checks in release mode could be devastating, and you just can't afford to be throwing exceptions from it. On the other hand, if it's very expensive, then having the additional checks wouldn't matter at all. The big question is what the general policy should be in Phobos functions. Should the default choice be to use an assertion, which will usually then do no checks at all, because assertions are almost always compiled out in Phobos (unless people compile it themselves), or should enforce be used and then have the additional cost in there all of the time. I would guess that iota is most frequently used with known values at compile time - iota(1, 512) - in which case assert makes perfect sense. In others, the value used could be based on lots of calculations somewhere and maybe even depends on user input - iota(a, b). The best choice would depend on what we expect the typical use case to be and how high the cost is to pick the other choice. The other possibility is to specifically have two versions of a function: one which uses an assertion (which may or may not be enabled) and therefore essentially does no checking, thereby requiring that the programmer ensure that the arguments are correct or the function could do funny things, and one which uses an exception. Then the programmer could choose whether they want the checks to occur or not (e.g. iota could assert or do no checks at all and iotoE could throw an exception). However, that doesn't scale very well if you try and do that with every function that has this problem. So, there really is no good answer. - Jonathan M DavisAs has been point out, the problem is in cases where it's not clear whether you should treat input as user input (and therefore needs to _always_ be checked and have exceptions thrown on error) or whether you should treat input as being from your program and guaranteed to be valid (at which point you use assert to check that that guarantee actually holds). ----------This is a good example of why it's difficult to decide what "user input" is. One could consider that the 'user' in this case is the developer using the library, but I don't think that's the right choice. I'd say it's a bug, this is clearly a contract, since the data being passed into the ctor can easily not be user input (i.e. it's most likely two literals that will never depend on a user). If it is user input, the caller of the ctor should enforce the user input before passing it to iota.You can't validate all user input, so external data ends up spead across your entire application. So I don't understand obsession with -release switch, because contracts most of the time do validate user input. If we think about -release switch as a HP-hack for exotic code, there will be no ideological difference between assert and enforce.
Mar 24 2011