How to Test Program Generators? A Case Study using flex Prahladavaradan Sampath

A. C. Rajeev

K. C. Shashidhar

S. Ramesh

General Motors India Science Lab Bangalore {p.sampath, rajeev.c, shashidhar.kc, ramesh.s}@gm.com Abstract We address the problem of rigorous testing of program generators. Program generators are software that take as input a model in a certain modeling language, and produce as output a program that captures the execution semantics of the input-model. In this sense, program generators are also programs and, at first sight, the traditional techniques for testing programs ought to be applicable to program generators as well. However, the rich semantic structure of the inputs and outputs of program generators poses unique challenges that have so far not been addressed sufficiently in the testing literature. We present a novel automatic testcase generation method for testing program generators. It is based on both syntax and semantics of the modeling language, and can uncover subtle semantic errors in the program generator. We demonstrate our method on flex, a prototypical lexical analyzer generator.

1. Introduction Program generators are programs that generate other programs. They take as input a model in a certain modeling language, and produce as output an implementation that captures the execution semantics of the input-model. They play a critical role in addressing the increasing complexity of modern software engineering [23]. Some of the traditional areas where program generators have been applied include syntactic analysis, program compilation and program optimization. Apart from these traditional areas, program generators, and in general, model-processors – tools that process input-models to obtain output-models, are increasingly being used in software engineering practice. Some of the applications that make essential use of such model-processors include model-based software engineering, aspect-based programming, compiler generation, etc.

Industrial strength program generators implement a complex functionality. Their design and implementation requires a thorough understanding of the syntactic and semantic aspects of their input modeling language. In addition to their complexity, they are also subject to evolution to meet the changing demands of software engineering practice. This implies that the correctness of their functionality cannot be taken for granted. Indeed, it is becoming increasingly important to gain confidence in their correctness before using them in an industrial project, in particular, when they are used in the development of safety critical application software. Software testing is the most viable technique for gaining confidence in the correctness of programs, and automated test-generation (ATG) methods are essential to make it effective. However, testing a program generator is about ensuring that, given a model and its implementation, the semantics of the model is captured faithfully in the implementation. Therefore, an ATG method required for such a testing will have to deal with the rich syntactic and semantic structures of models unlike a traditional ATG method that typically deals only with simpler input and output domains. As an example, suppose that the program generator to be tested is a lexical analyzer generator (LAG). The testcases required here are the regular expression lists that are used as inputs to the LAG, along with the strings that belong to the language accepted by the regular expressions in the list. Therefore, the requirement on an ATG method is that it should produce a suite of valid input-models, and test-inputs for these models. Some ATG methods have been proposed in the literature for testing a lexical analyzer; for example, grammar-based testing, which takes as input a grammar describing a language, and generates strings in the language accepted by the grammar. However, our problem is different – we wish to have an ATG method for a LAG – the program that generates the lexical analyzer. In this paper, we present such a method for rigorously testing program

generators. It is based on the generic framework outlined in [21]. We demonstrate it using flex [17], a well-known LAG, as the case study. Our ATG method for testing program generators takes two inputs – the formal meta-model of the modeling language being processed by the tool and a test specification that expresses the tester’s intent. The formal meta-model of the modeling language, which is a unique aspect of our method, specifies both the syntax and the semantics using a uniform framework. The intent in the test specification could be, for example, a certain limiting size measure on the test-model. Given these inputs, the method generates a set of test-models for testing the program generator. A novelty here is that the generated test-cases cover both syntactic and semantic aspects of the modeling language. In addition to the test-models, the method also generates a set of test-inputs and the corresponding set of expected outputs for them. This can be used for testing the equivalence of test-models and their corresponding translations. This integrated generation of test-inputs for the test-models is yet another novelty of our method. The paper is organized as follows: Section 2 discusses related work. Section 3 motivates our choice of flex as the case study. Section 4 gives an overview of our method. Section 5 presents the formal meta-model of flex in the form of inference rules. Based on this meta-model, Section 6 gives the details of how our method generates test-cases for flex. We present the results of our test-case generation in Section 7, and discuss our results in Section 8. Finally, Section 9 concludes along with some directions for future work.

tools. Therefore, in an industrial context, testing based approaches remain the preferred method for verifying program generators. Software testing has been an important area of research and a large body of literature exists; see [3] for a broad survey in this area. ATG for software testing is an active area of research resulting in a plethora of new techniques, many of which are targeted to specific requirements. Recently, many interesting ATG techniques have been developed based on fresh insights into the nature of the domain of the test-cases, and by combining ideas from static/dynamic analysis and model-checking. However, these promising techniques, for example, [6,8,11], do not address the ATG problem for program generators, where test-cases are programs or models with rich structure. In practice, the usual approach to gain confidence in program generators is to manually develop a suite of benchmark test-cases. However, this requires a large investment, and moreover it is difficult to give an objective assessment of the quality of the benchmark suite. Therefore, it is advantageous to use an ATG method instead of manual development of test-suites. Below, we discuss a few methods that we are aware of in the rather sparse literature on ATG for program generators. White-box coverage testing [1, 7, 25] has been used for testing code generators. They rely on the knowledge of transformation rules implemented in the code generator to be tested. However, this requires either the availability of the source code of the tool, or at least the underlying implementation details, which is most often not the case for third-party tools. In contrast to this, our approach requires only the specification of the program generator to be tested, i.e., the syntax and semantics of the modeling language. Grammar-based testing [5, 12, 15, 26] deals only with those aspects of a program generator that are based on context-free grammars or attribute grammars – mainly the syntactic constructs. None of these approaches take into account the semantics of the modeling language, which is essential for uncovering subtle semantic errors in the program generator. Although we incorporate some ideas from grammar-based testing in our method, our focus is on semantics. We not only generate test-models, but also generate specific inputs to these test-models for testing subtle semantic interactions, which would otherwise require impractically deep syntactic coverage of the grammar to be generated.

2. Related Work In order to check the correctness of program generators, three broad approaches are used: translator verification, translation validation and classical testing. Translator verification is based on the idea of formal verification of software. It involves the use of theorem proving techniques for establishing the correctness of the implementation for translating the source model to the target code [9, 13, 14]. The use of this approach in an industrial context is however still infeasible due to the complexity of the modeling languages and also the effort required for the use of current generation theorem proving tools [4]. Recently, translation validation [2, 10, 16, 19, 20, 22] has been proposed as an alternative to translator verification. The basic idea in this approach is to verify each instance of translation rather than the translator, i.e., check the target code against the source model for each instance of translation. Even though for certain classes of languages this approach is more tractable than translator verification, it often requires internal tool details which are difficult to obtain in the case of third-party

3. Why flex? LAGs are a widely used class of software, and there are a number of available implementations: lex, GNU flex, jlex, jflex and sml-lex to name a few. There seems to be an implicit belief in the programming community that 2

all these implementations are in essence compatible with each other, once the issues related to the specificities of the host language (C, Java etc.) are factored out. The belief of compatibility stems largely from the fact that LAGs have a well documented functionality and most of their implementations are open-source, which allows comparison for compatibility. In spite of this, an interesting and important issue is the possibility of certifying the compatibility of different implementations of LAGs using a suite of test-cases. In this paper we use flex as only a prototypical example of a LAG, and therefore, all mention of flex, unless otherwise specified, should be interpreted as referring to any arbitrary member of the class of LAGs.

formal meta-model of flex

test specification (string length, regex depth, ...)

ATG for Program Generators Inference Tree Generator (ITG) Constraint Generator (CG) Constraint Solver (CS)

R

(s, T )

flex

Test Harness

4. ATG for Program Generators In this section, we give an overview of our ATG method. In order to facilitate our exposition, we first introduce the inputs and outputs of flex, our case study. Its schematic diagram is as shown in Figure 1. It takes as input a list R of token definitions in the form of regular expressions, and produces a lexical analyzer L. The behavior of L is that it takes as input a string s, and outputs a token sequence T which splits s into a sequence of substrings, each of which matches a regular expression in R. List of regular expressions

R

flex

Figure 2. Test-case generation flow for flex.

4.1. Formal Meta-Model The first input to our method is the formal meta-model of the modeling language. It consists of syntactic and semantic definitions expressed using inference rules. The main advantage of inference rules is that they are capable of representing a wide range of syntactic and semantic definitions. In particular, they can easily represent context-free grammars. Also, the well-formedness conditions, sometimes referred to as the static semantics of the language, which are typically not expressible in terms of context-free grammars can be expressed using the side-conditions of inference rules. Similarly, both small-step structural operational semantics [18] and big-step natural semantics are expressible in the form of inference rules.

String

s

Lexical Analyzer

L

Token sequence

Ts

Figure 1. Schematic diagram of flex.

4.2. Test Specification Our ATG method is an attempt to formalize an expert tester who designs inputs for a program generator. The inputs to the program generator are models, which we call test-models, that conform to the meta-model accepted by it. A tester of a program generator is interested in generating a suite of test-models such that it has complete coverage over the problematic aspects of syntax and semantics of the modeling language. More often, the focus is on semantic subtleties of the meta-model, and accordingly, the test-models are chosen such that possible errors in the implementation are uncovered. The method embedded in the test-case generation flow for flex is as shown in Figure 2. In what follows, we briefly discuss the individual components in the flow and embark on the details in later sections with the flex case study.

The second input is the test specification. Abstractly, the purpose of the test specification is to specify syntactic structures and semantic behaviors that have to be tested. It is the mechanism for identifying an interesting set of models from the space of valid models. It states some coverage criteria such as the coverage of certain syntactic and semantic rules and their combinations, up to a certain bound. For example, as will be explained later, string length could be used as a bound during test-case generation for flex.

4.3. Test-case Generation The central component of the flow is our ATG method for program generators. Given the meta-model of a mod3

4.4. Test Harness

eling language and a test specification, it generates a set of syntactically valid model instances. The fact that the metamodel includes the semantic rules of the modeling language makes it possible to examine whether certain semantic subtleties in the language have been correctly dealt with by the program generator. The method first constructs an inference tree representing the required semantic scenario by instantiating the rules in a tree structure such that a premise of one rule is the conclusion of another. It then solves the constraint extracted from the inference tree to obtain a test-model that is capable of exhibiting the scenario. The method also derives a test-input (and the expected output) for the test-model that will drive the model to exhibit that particular scenario. We refer to the pair of a test-model and its test-input/output as a test-case. In the case of flex, a list R of regular expressions gives the test-model, and a corresponding set of string and token sequence tuples (s, T ) gives the test-input/output, together they constitute a single test-case. Internally, the method consists of three components, viz., an inference tree generator (ITG), a constraint generator (CG) and a constraint solver (CS). In what follows, we briefly describe them, postponing a detailed discussion of their functionality to Section 6 with the flex case study.

The requirements on a test harness for testing a program generator are also unique. The test harness generates a program by feeding the program generator to be tested with the test-model. It then executes the generated program for the test-inputs. The outputs of this execution are compared with the expected outputs and any failure is reported. Since the output-program is generated by the program generator, its non-conformance with the expected behavior implies a failure of the program generator to produce the correct outputprogram. For example, in our case study, the test harness feeds an R to flex to obtain a lexical analyzer L, and then executes L with input s to obtain a token sequence Ts and compares it with T .

5. Formal Meta-model of flex In this section, we describe the meta-model of flex. It includes a description of the syntax of the input to flex, and the semantics of flex. The input to flex is a list R of regular expressions. The syntax of regular expressions that we consider is the following: r := a ∈ Σ | r1 .r2 | r? | r∗ | r+ | r1  r2 | r1 /r2

Inference Tree Generator (ITG) ITG performs combinatorial exploration of all possible inference trees, respecting the constraints from the test specification. It essentially uses the test specification to control the set of generated inference trees.

Here Σ is the alphabet for strings, r1 .r2 refers to a match of r1 followed by a match of r2 (concatenation), r? refers to zero or one match of r (option), r∗ represents zero or more matches of r, r+ represents one or more matches of r and r1  r2 represents a choice between r1 and r2 . The last regular expression r1 /r2 represents a match of r1 , but only if it is followed by a match of r2 (trailing-context). This regular expression is not supported by some LAGs like jlex and sml-lex. Now we present the semantics of flex. Note that the semantics we develop is in fact a specification of how flex should interpret the input it receives, and is independent of any particular implementation. This semantics is not overly simplistic, and provides insights into the use of our method for testing code generators. There are certain subtleties in the semantics of flex that arise out of the strategies (such as longest match first) used by it to resolve between multiple regular expressions that match a given string. We capture some of these subtleties in our semantics, which allow us to generate test-cases to test these subtleties. The semantics of flex is that it translates the inputmodel R into an executable lexical analyzer L, such that the interpretation of R is preserved as the execution semantics of L. We provide a set of inference rules that gives an interpretation to R, and then define the semantics of flex

Constraint Generator (CG) CG extracts the constraints on test-models and test-inputs in order for them to exhibit the behavior described by the inference tree. These constraints are needed to check the well-formedness of the generated inference trees. The selection of a logical system for expressing the constraints is therefore an important part of the design of CG.

Constraint Solver (CS) Generating a test-case requires solving the constraints generated by the constraint generator. CS solves the extracted constraints in the context of a suitable theory, to generate test-models and test-inputs. If the constraint is satisfiable, then a solution to the constraint is given as an assignment to the free-variables in the constraint. On the other hand, if the constraint is un-satisfiable, it indicates that the corresponding inference tree is an infeasible inference tree for our meta-model. We use a custombuilt solver for this step. 4

a∈Σ a∈a

∈r s∈r s∈r

+

s1 ∈ r1

(A X -C HAR )

(P LUS 1)



s2 ∈ r2

s1 .s2 ∈ r1 .r2

(A X -S TAR)

s1 ∈ r

s2 ∈ r +

s1 .s2 ∈ r+

s∈r s ∈ r∗

(D OT )

 ∈ r?

(S TAR 1)

s1 ∈ r

s2 ∈ r ∗

s1 .s2 ∈ r∗

s ∈ r1

(P LUS 2)

(A X -O PT)

s ∈ r1  r2

s∈r s ∈ r?

(O PT)

(S TAR 2) s ∈ r2

(C HOICE 1)

s ∈ r1  r2

(C HOICE 2)

Figure 3. Semantics of regular expressions. in terms of these rules. In the sequel, references to the semantics of flex should be understood as the interpretation of the input-models of flex. The basic idea behind our interpretation is, given an R and an s, compute the set T of all possible tokenizations of s with respect to the regular expressions in R. A unique token sequence T is obtained from this set T , by imposing an order on T and then selecting the minimum token sequence with respect to this order. This unique token sequence T is defined to be the result of the lexical analysis of string s. Note that we do not model the behavior of flex that discards the unmatched characters in the input string s – we require that the string s be fully matched against the regular expressions in R. We present the semantics of flex by structuring it into a number of layers, each layer describing an aspect of the lexical analysis process. The different layers are:

pression. We first specify the semantics of regular expressions using judgements of the form s ∈ r, which asserts the membership of string s in the set of strings represented by the regular expression r. Figure 3 gives the rules formed using such judgements, for the usual operators over regular expressions. Note that we use italic font (a) for characters in a string, and typewriter font (a) for characters in a regular expression definition. We postpone providing the rule for trailing context regular expressions to Section 5.2, while discussing the matching of a string against a sequence of regular expressions. A token t is a tuple (s, n, p), where s is the string that is matched by the pth regular expression in the list R, and n is the length of the match. The fact that the lexical analysis of s gives rise to a token t is shown using the judgement

1. Matching a string against a single regular expression,

which is read as, “string s is matched by token t in the context of regular expression sequence R”. The rule for obtaining a token from a string is,

R  s ≈ t,

2. Matching a string against a sequence of regular expressions,

R[p] = r

3. Disambiguating two token sequences that match a given string, and

|s| > 0 s ∈ r

R  s ≈ (s, |s|, p)

(T OKEN),

where |s| represents the length of the string s. The side-condition |s| > 0 reflects the observation that flex considers only non-zero length substrings for matching the regular expressions in R. This is basically to ensure the termination of lexical analysis process. It also guarantees the existence of a unique tokenization for a given string, and is used in deriving Proposition 2 in Section 5.4.

4. Selecting a unique token sequence as the output of lexical analysis, from the set of all possible token sequences matching a given string. The layers 1 and 2 describe how a string can be split up into tokens, layer 3 describes the order relation between token sequences, and layer 4 explains the selection of a unique token sequence as the result of the lexical analysis of the given string.

5.2.

Matching quences

Regular

Expression

Se-

5.1. Matching Regular Expressions When a string s is matched against a list R of regular expressions, s may be split into substrings si such that s = s1 .s2 . . . sk , with each si matching a regular expression rj

At the lowest level, flex generates a recognizer that checks whether an input string matches a given regular ex5

Rs≈t (T OK -S EQ 1) → Rs− ≈ t R[p] = r1 /r2

→ Rs− ≈ t2 , . . . , tk  (T OK -S EQ 2) → − R  s1 .s ≈ t1 , t2 , . . . , tk 

R  s 1 ≈ t1

→ s1 ∈ r1 |s2 | > 0 s2 ∈ r2 R  s2 .s − ≈ t2 , . . . , tk  (T OK -S EQ 3) → − R  s1 .s2 .s ≈ (s1 , |s1 | + |s2 |, p), t2 , . . . , tk 

|s1 | > 0

Figure 4. Matching regular expression sequences. from R. Each such si , along with the matching rj forms a token ti . We use the judgement

A flex-generated lexical analyzer will first apply the longest match first rule and if this does not result in a unique regular expression match, it will apply the earliest match first rule to disambiguate between the multiple regular expression matches. Note that the earliest match first rule can guarantee a unique match because of the fact that the ordering in the sequence of regular expressions R is a strict total-order.

→ Rs− ≈T to represent the matching of string s against a sequence of tokens T = t1 , . . . tk  in the context of a regular expression list R. Figure 4 gives the rules for obtaining such token sequences. The rule T OK -S EQ 1 shows how a sequence consisting of a single token is obtained, and the rule T OK -S EQ 2 shows how a sequence consisting of more than one token is obtained. We can now provide the semantics of regular expressions having trailing-context operator, i.e., r1 /r2 . It is interpreted as matching a string s1 by r1 , but only if it is followed by a string s2 that matches r2 . This is represented by T OK -S EQ 3 rule. Note that the generated token has |s1 | + |s2 | as the length of the match, even though only s1 is recorded as the string which is matched. This is as per the semantics of the trailing-context operator described in the manual for flex [17].

n1 > n2 R  (s1 , n1 , p1 ) ≺ (s2 , n2 , p2 ) s1 = s2

n1 = n2

p1 < p2

R  (s1 , n1 , p1 ) ≺ (s2 , n2 , p2 )

(L ONGEST-M ATCH)

(E ARLIEST-M ATCH)

Figure 5. Rules for unique matching. For a given list of regular expressions R and tokens t1 = (s1 , n1 , p1 ) and t2 = (s2 , n2 , p2 ), we represent the ordering between t1 and t2 using the judgement R  t1 ≺ t2 . Figure 5 gives the rules for ordering the tokens matching the prefixes s1 and s2 of a string s. The rules discussed above disambiguate between two tokens. A flex generated lexical analyzer lifts these rules to operate on token sequences. This is done by using dictionary ordering with respect to the ordering of tokens. We represent the ordering between token sequences T1 and T2 → − using the judgement R  T1 ≺ T2 . We describe the rules for the dictionary ordering in Figure 6.

5.3. Disambiguating Token Sequences Given a list of regular expressions R and an input string s, there can be many possible ways of splitting s into matching tokens. A lexical analyzer generated by flex uses two rules to define a unique splitting of any input string s: Longest match first: Let s and s be two prefixes of s matching r and r respectively, where r and r are elements of R. If |s | > |s | then the lexical analyzer will choose r and proceed with matching the rest of s, after removing the prefix s . In other words, flex generates lexical analyzers that give preference to longer matches.

5.4. Deriving a Unique Token Sequence Given a list of regular expressions R and a string s, the rules given in Section 5.1 and Section 5.2 allow the derivation of a set of possible token sequences T . We can use the → − ordering relation ≺ described in Section 5.3 to order this → − set. As explained in Section 5.3, the ordering ≺ is a strict total order on the set T . The Proposition 1 follows from this.

Earliest match first: Let r and r be elements of R, with r appearing earlier than r in R. Given a prefix s of s that matches both r and r , the lexical analyzer will choose r . 6

extracts test-cases from these trees. The test-cases consist of all strings of length up to the maximum length and all possible matchings of these strings with regular expressions of depth up to the maximum depth. Each valid inference tree generated by the method represents a semantic scenario in terms of the rules given in Section 5. In particular, we are interested in inference trees → whose conclusion judgement is of the form R  s − ≈ T. From such conclusion judgements, we can extract test-cases as tuples (R, s, T ). The list of regular expressions R can be given as input to flex, which generates a lexical-analyzer L. A test oracle can then check whether flex passes or fails the test (R, s, T ) by checking whether the output of L on input string s is the sequence of tokens T . We take advantage of the layered structure of the rules in Section 5 and split up the test-case generator into corresponding layers. These layers are explained in the following sections.

R  t1 ≺ t1 (D ICT 1) → − R  t1 , . . . , tk  ≺ t1 , . . . , tl  → − R  t2 , . . . , tk  ≺ t2 , . . . , tl  (D ICT 2) → − R  t1 , t2 , . . . , tk  ≺ t1 , t2 , . . . , tl 

t1 = t1

Figure 6. Dictionary ordering of token sequences.

Proposition 1 (Total ordering) Given a finite sequence of regular expressions R, a string s and any two possible token sequences T1 and T2 that match s, it is either the case that → − → − T1 ≺ T2 or T2 ≺ T1 . Now, the fact that flex considers only substrings of non-zero length for matching a string (as mentioned in Section 5.2) implies that there are only a finite number of ways to split up a given string into tokens. This leads us to the following proposition.

6.1. Generation of Tokens In the lowest layer of test-case generator, our aim is to generate all possible inference trees using the rules in Figure 3, for a test specification giving the maximum string length and the maximum regular expression depth. From these trees, we want to obtain all possible regular expressions (up to the given maximum depth) that can be matched by a given string. This requirement is essential for generating correct test-cases and will be justified in Section 6.3. Note that some combinations of certain inference rules can increase the depth of an inference tree without increasing the string length or the regular expression depth. An example is the following inference tree composed of rules S TAR 2 and A X -S TAR:

Proposition 2 (Finiteness) Given a finite sequence of regular expressions R and a string s, there are only a finite number of sequences of tokens from R that match with s such that each match is a non-empty match. The above two propositions guarantee the existence of a unique minimum element in the set of all possible tokenizations T of a string s. Theorem 1 (Existence of minima) Given a finite sequence of regular expressions R and a string s, there exists a unique sequence T of non-zero length tokens that matches → − s such that T ≺ T  for any other sequence T  of non-zero length tokens. Proof. Follows from Proposition 1 and Proposition 2. 

s1 ∈ r

 ∈ r∗

s1 ∈ r ∗

The semantics of flex therefore defines the result of the lexical analysis of s as the minimum token sequence in T with respect to the order defined in Section 5.3.

(A X -S TAR ) (S TAR 2)

In order to handle this, we first generate inference trees that do not contain the rules A X -S TAR and A X -O PT, which are the rules involving the empty string . Tree generation is performed by a recursive procedure, starting with inference trees of height 1 consisting of the nullary rule A X -C HAR , for each character in the alphabet. Given trees of height h, trees of height h + 1 can be generated by applying the other rules in Figure 3. We continue this until the limits placed by the test specification are reached. At this point we include the rules A X -S TAR and A X -O PT and continue the tree generation process by applying only those rules which increment the string length or the regular expression depth. This procedure terminates when we are unable to generate any new tree within the limits set by the test specification.

6. Test-case Generation for flex In this section, we provide the details of ATG for flex. The test specification that we use provides the maximum length of strings and the maximum depth of regular expressions appearing in the test-cases. Note that by the depth of a regular expression, we mean the depth of its tree representation considered as an algebraic term. Using the inference rules in the meta-model, our method generates all valid inference trees satisfying the given test specification and then 7

along with the matching regular expression ri forms a token ti = (si , |si |, p). Using these tokens, we generate all possible token sequences that match the string s, by applying the rules T OK -S EQ 1 and T OK -S EQ 2 in Figure 4. Note that T OK -S EQ 3 rule also can be used to generate token sequences. This case is handled in a similar manner by first ensuring that the list R contains all possible regular expressions of the form ri /rj and then considering the judgements si ∈ ri and sj ∈ rj . The main difference is that the token generated for si and ri /rj will be (si , |si | + |sj |, p), where ri /rj = R[p]. This procedure generates all strings and their tokenizations such that the string lengths remain within the limit placed by the test specification. This step is guaranteed to terminate as we consider only non-empty strings.

Note that our procedure for generating inference trees involves extraction of constraints and solving them to ensure the well-formedness of the trees. For example, suppose the following tree:

a∈a

(A X -C HAR ) a.b ∈ b∗

b∈b b ∈ b∗

(A X -C HAR ) (S TAR 1) (S TAR 2)

is generated by ITG, but it is not valid. This fact is reflected in the unsatisfiability of the constraint implied by this tree. The application of S TAR 2 rule in this tree requires a = b, which is not satisfiable. Such constraints implied by the generated trees are solved using a term unification engine which we have implemented. We note that term unification is sufficient for solving the constraints generated by flex. At the end of this procedure, we have all possible regular expression matches (up to the specified maximum depth) of a given string. The termination of this procedure is guaranteed because, at every step, we increment either the string length or the regular expression depth in the tree and both of these are limited by the test specification.

6.3. Extracting Test-cases In the previous section, we have explained the procedure for generating all possible tokenizations T of a given string s with respect to a given list of regular expressions R. The need for all possible tokenizations of s is that the rules in Section 5.4 require all tokenizations for computing the min→ − imum among them with respect to the order relation ≺ . We represent a test-case as the tuple (R, s, T ), where T is the minimum token sequence for a given s and R. Such tuples are obtained for every pair of R and s that appear in → the judgements R  s − ≈ T generated by the procedure in Section 6.2.

6.2. Generation of Token Sequences The previous section describes the generation of inference trees using the rules in Figure 3. From these trees, we obtain valid judgements R  s ≈ t by applying the T OKEN rule. These judgements can be used along with the rules in Figure 4 to generate inference trees representing the splitting of strings into tokens. Note that for generating correct test-cases, we require all possible ways of splitting a string into token sequences. This requirement is justified in Section 6.3. In order to apply the rule T OKEN, and the rules T OK -S EQ 1 and T OK -S EQ 2 in Figure 4, we need to generate lists of regular expressions (Rs). Note that the T OKEN rule implies that all tokens represent non-empty strings. This fact places a bound on the length of every R to be generated. Considering the maximum string length l in the test specification, a non-empty string can be split up into at most l tokens of length 1 each. Therefore it is sufficient to consider Rs of length at most l. Since the procedure in Section 6.1 has already identified the regular expressions, we can generate all possible combinations of them as the required Rs. Now, for each such list R we need to generate all possible tokenizations of strings matching the regular expressions in R. This is done by considering all judgements si ∈ ri obtained in Section 6.1, such that si is non-empty and ri occurs in R (i.e., ∃p : ri = R[p]). The string si

7. Implementation and Results We have implemented a prototype tool in Standard ML [24] for demonstrating the method. It represents the meta-models in terms of SML data-types, and also implements the layered algorithm presented in Section 6 for automatic test-case generation. We have experimented with different values for the maximum string length and the maximum regular expression depth to be considered as the test specification. When these limits are incremented, the number of test-cases grows combinatorially, as a result of the large number of inference rules in the meta-model. As explained in Section 6, we need to further calculate all possible combinations of these rules to obtain the test-cases. We have currently limited our experimentation to a test specification giving the maximum string length of 2 and regular expression depth of 3. Test-case generation for this specification takes around 2 minutes on a Pentium 4, 2.4 GHz processor, with 512 MB of RAM. This experiment generated in excess of 200000 test-cases in the form of tuples (R, s, T ). Note that these test-cases include many re8

dundant ones, for example, the two test-cases,

same time amenable to analysis. In this respect, we feel that the semantics we have formulated is both simple and elegant. The test specification plays a very significant role in allowing us to tune the test-generation parameters, and also to balance the coverage of meta-model rules achieved by the test-cases against the efficiency of test-case generation. In the current implementation, we have formulated an algorithm (presented in Section 6) for test-case generation that appears, at first sight, tailored to flex. However, the steps in the algorithm are guided by the semantic rules of flex, and it seems plausible to identify notions of coverage and test specifications that would allow such algorithms to be generated from the syntactic and semantic specifications of program generators. Finally, it should be noted that the notion of a test-suite that we have formulated itself is novel in that the test-cases include inputs not only to the LAG, but also to the programs generated by the LAG. This test-suite has considerable value, as it can be reused for certifying various implementations of LAGs. Our method also provides a clear notion of the coverage achieved by a test-suite that is based on the semantic structure of LAGs.

(a∗ , a∗ , aa, (aa, 2, 1)) and (b∗ , b∗ , bb, (bb, 2, 1)), are essentially the same, but both will be generated by our procedure, as we do not currently take into account the symmetries between the generated test-cases. We are currently in the process of evaluating these testcases. A majority of the test-cases would appear trivial to a flex user. However, even within the small limits we have placed on the test specification, we were able to generate interesting test-cases on which flex fails. We give two examples of such test-cases below – both examples involve use of the trailing-context operator of flex. Example Test-case 1: (a∗ /b, b, b, (b, 1, 2)) In this case, the input to flex was the sequence a∗ /b, b, and the input to the generated lexical analyzer is the string “b”. According to the semantics of flex, the lexical analyzer should match this string with the regular expression b. However, GNU flex exhibits divergent behavior on this test-case, by repeatedly matching an empty string with the regular expression a∗ /b. Note that when this regular expression list is fed to GNU flex, it warns of the use of a dangerous construct. However, we did not expect the generated lexical analyzer to diverge. Repeating the same experiment on jflex, we note that the generated lexical analyzer aborted with an array indexing exception. This too was unexpected and, in our estimate, an unacceptable behavior.

9. Conclusion and Future Work We have presented an ATG method for rigorously testing program generators, and we have demonstrated it for flex. We have formulated an abstract semantics for flex, and made essential use of the semantics for automatic test-case generation. Some interesting corner-cases for flex have been identified by using our method. As part of our work on this paper, we plan to make the test-suite we have generated using our method available to the flex community. Even though there are probably a number of test-suites available for flex, we feel that our test-suite has the advantage of being based on a formal semantics of flex, and also of being automatically generated to exhaustively test flex with respect to a clear test specification, for example, the coverage of string length and regular expression depth. In future work, we plan to enhance our method. A number of areas for improvement immediately suggest themselves: – reducing the number of test cases, – making the formal meta-modeling task amenable for non-experts, – enhancing the notion of test specifications, – improving the algorithms and decision-procedures used in the method, and – relating test-generation and formal verification – that is, can we generate a test-suite that can guarantee a formal proof of coverage achieved by the test-suite for the program generator.

Example Test-case 2: (a∗ a/a∗ a, a∗ a, aa, (a, 2, 1)(a, 1, 2)) In this case, the first character of the input string “aa” should be matched with the regular expression a∗ a/a∗ a and the second character should be matched with the regular expression a∗ a. However, both GNU flex and jflex match the entire input string “aa” with the regular expression a∗ a/a∗ a. This behavior is totally contrary to the expected behavior of the trailing context operator.

8. Discussion We believe that the results presented in Section 7 are very encouraging and indicate the viability of our ATG method for more complex program generators. Applying our method to flex required us to address many challenges. The primary challenge was to formulate a semantics of flex that is both comprehensive and at the 9

Acknowledgments

[14] X. Leroy. Formal certification of a compiler back-end or: programming a compiler with a proof assistant. In POPL, pages 42–54, 2006. [15] P. M. Maurer. Generating test data with enhanced contextfree grammars. IEEE Software, 7(4):50–55, 1990. [16] G. C. Necula. Translation validation for an optimizing compiler. In PLDI, pages 83–94, 2000. [17] V. Paxson. flex - A fast scanner generator., 2.5 edition, 1995. Available from: www.gnu.org. [18] G. D. Plotkin. A structural approach to operational semantics. J. Log. Algebr. Program., 60-61:17–139, 2004. [19] A. Pnueli, O. Strichman, and M. Siegel. Translation validation for synchronous languages. In K. G. Larsen, S. Skyum, and G. Winskel, editors, ICALP, volume 1443 of Lecture Notes in Computer Science, pages 235–246. Springer, 1998. [20] A. Pnueli, O. Strichman, and M. Siegel. Translation validation: From SIGNAL to C. In E.-R. Olderog and B. Steffen, editors, Correct System Design, volume 1710 of Lecture Notes in Computer Science, pages 231–255. Springer, 1999. [21] P. Sampath, A. C. Rajeev, S. Ramesh, and K. C. Shashidhar. Testing model-processing tools for embedded systems. In IEEE Real-Time and Embedded Technology and Applications Symposium, pages 203–214, 2007. [22] K. C. Shashidhar, M. Bruynooghe, F. Catthoor, and G. Janssens. Verification of source code transformations by program equivalence checking. In R. Bod´ık, editor, CC, volume 3443 of Lecture Notes in Computer Science, pages 221–236. Springer, 2005. [23] Y. Smaragdakis, S. S. Huang, and D. Zook. Program generators and the tools to make them. In N. Heintze and P. Sestoft, editors, PEPM, pages 92–100. ACM, 2004. [24] The Standard ML Language, http://www.smlnj.org. [25] I. St¨urmer and M. Conrad. Test suite design for code generation tools. In ASE, pages 286–290. IEEE Computer Society, 2003. [26] L. Van Aertryck, M. V. Benveniste, and D. L. M´etayer. CASTING: A formally based software test generation method. In ICFEM, pages 101–, 1997.

We would like to thank the members of our group at General Motors India Science Lab for their valuable feedback on this work. Thanks are also due to Srihari Sukumaran and the anonymous referees for their constructive comments and suggestions.

References [1] P. Baldan, B. K¨onig, and I. St¨urmer. Generating test cases for code generators by unfolding graph transformation systems. In H. Ehrig, G. Engels, F. Parisi-Presicce, and G. Rozenberg, editors, ICGT, volume 3256 of Lecture Notes in Computer Science, pages 194–209. Springer, 2004. [2] C. W. Barrett, Y. Fang, B. Goldberg, Y. Hu, A. Pnueli, and L. D. Zuck. TVOC: A translation validator for optimizing compilers. In K. Etessami and S. K. Rajamani, editors, CAV, volume 3576 of Lecture Notes in Computer Science, pages 291–295. Springer, 2005. [3] B. Beizer. Software Testing Techniques. International Thomson Computer Press, 2nd edition, 1990. [4] N. Benton. Machine obstructed proof: How many months can it take to verify 30 assembly instructions? In ACM SIGPLAN Workshop on Mechanizing Metatheory, September 2006. [5] A. S. Boujarwah and K. Saleh. Compiler test case generation methods: a survey and assessment. Information and Software Technology, 39(9):617–625, 1997. [6] C. Boyapati, S. Khurshid, and D. Marinov. Korat: automated testing based on java predicates. In ISSTA, pages 123–133, 2002. [7] A. Darabos, A. Pataricza, and D. Varr´o. Towards testing the implementation of graph transformations. In Proc. of the Fifth International Workshop on Graph Transformation and Visual Modelling Techniques, ENTCS. Elsevier, 2006. [8] P. Godefroid. Compositional dynamic test generation. In POPL, pages 47–54, 2007. [9] G. Goos and W. Zimmermann. Verification of compilers. In Correct System Design, Recent Insight and Advances, volume 1710 of Lecture Notes in Computer Science, pages 201– 230, 1999. [10] M. Haroud and A. Biere. SDL versus C equivalence checking. In A. Prinz, R. Reed, and J. Reed, editors, SDL Forum, volume 3530 of Lecture Notes in Computer Science, pages 323–338. Springer, 2005. [11] S. Khurshid and D. Marinov. TestEra: Specification-based testing of Java programs using SAT. Autom. Softw. Eng., 11(4):403–434, 2004. [12] R. L¨ammel and W. Schulte. Controllable combinatorial cov¨ Uyar, A. Y. Duale, erage in grammar-based testing. In M. U. and M. A. Fecko, editors, TestCom, volume 3964 of Lecture Notes in Computer Science, pages 19–38. Springer, 2006. [13] D. Leinenbach, W. J. Paul, and E. Petrova. Towards the formal verification of a C0 compiler: Code generation and implementation correctness. In B. K. Aichernig and B. Beckert, editors, SEFM, pages 2–12. IEEE Computer Society, 2005.

10

How to Test Program Generators? A Case Study using ...

and a large body of literature exists; see [3] for a broad sur- vey in this area. ATG for ..... L. A test oracle can then check whether flex passes or fails the test (R, s, ...

157KB Sizes 0 Downloads 190 Views

Recommend Documents

Case Study of a successful Measurement Program
significant revenue stream to the Department and is required by the business to remain ... Full Time Equivalents (FTE) – was measured as the number of personnel that work ..... 800. 900. 1000. F. E. B. 2005 (S iz e = 34. 5 fps. ) MA. Y. 2005 (S iz

Misleading Worm Signature Generators Using ... - Roberto Perdisci
this case the real worm flow and all its fake anomalous flows ... gorithm creates an ordered list of tokens that is present in all the .... Of course, the question is how to obtain p(false ...... Proceedings of the 10th ACM Conference on Computer and

Using eyetracking to study numerical cognition-the case of the ...
Sep 23, 2010 - Their results. revealed a significant negative correlation between reaction. time and number of errors and the numerical difference. between the two numbers. In other words, the larger the. numerical difference is between two numerical

Using eyetracking to study numerical cognition-the case of the ...
Whoops! There was a problem loading more pages. Retrying... Using eyetracking to study numerical cognition-the case of the numerical ratio effect.pdf. Using eyetracking to study numerical cognition-the case of the numerical ratio effect.pdf. Open. Ex

Misleading Worm Signature Generators Using Deliberate ... - CiteSeerX
tain TI. Whenever two worm flows wi and wj are consid- ered together, a signature containing TI will be generated. Whereas, whenever two fake anomalous ...

Misleading Worm Signature Generators Using ... - Roberto Perdisci
jected code, e.g., [15, 10, 5, 1] are not considered because they are largely ... to a host in B, it also sends a fake anomalous flow to the same host, as shown in ...

A YouTube Case Study
The campaign ran across multiple media, including TV. , Outdoor ... Best Game of the year Purchase Intent ... YouTube has a significant effect on key brand Measures ... Jorge Huguet, Chief Marketing Officer (CMO) Sony PlayStation Espana.

Transaction Manager Failover: A Case Study Using ...
components and JBoss application server, how replication for availability can ... Three-tier middleware architecture is commonly used for hosting large-scale ..... M.C. Little and S K Shrivastava, “Integrating the Object Transaction Service with ..

case study
When Samsung Turkey launched the Galaxy S4 cell phone in early 2013, its marketing team ... wanted to use the company's existing video assets to build out a.

USING TEMPORAL LOBE EPILEPSY TO STUDY HOW ...
connections that form our cerebral network, which we take for granted as the foundation of our entire life ... calculation (for example, the optic network inputs and analyzes visual information in a way that can be used .... other words, the subiculu

Using Mergers to Test a Model of Oligopoly
Sep 1, 2009 - 2007 International I.O. Conference, and the 2008 FTC/Northwestern ... compare the ex ante predicted prices of mergers to direct ex post estimates of .... 3The FTC's web site provides an example of a second request on its web ...