I work on Cinder, a just-in-time (JIT) compiler built on top of CPython. If you aren’t familiar with Cinder and want to learn more, a previous post about the inliner gives a decent overview of the JIT. This post will talk about how we use binary search to track down compiler bugs, a technique that is applicable to any compiler if you have the right infrastructure.
Motivation
Sometimes—frequently—I change an optimization pass or a code generation step and I break something. In the best case scenario, I end up with a failing test and the test name or body give me enough clues to fix my silly little mistake. But in the worst case I can’t even boot to the Python prompt because I messed something up so badly. This can manifest as an exception, a failing assert
, or even a segmentation fault.
Since the runtime could have compiled any number of functions in that boot process or test run, there are a lot of moving parts. I generally don’t want to look at the source, intermediate representations, and assembly of 1000 different Python functions. That’s too much. It would be nice to have one to two functions to look at and make inferences. This is where bisect comes in.
Bisect
You may have heard of bisecting from geometry or from git bisect
. Those are the two places I heard about it. It means to cut in half. In our case and the Git case, not just once—many times!
We want to take our list of compiled functions and continuously cut it in half until we reach a very small group of functions that cause us trouble.
Say we run ./python -X jit some_program.py
and it crashes. In the course of this run it compiles functions A
, B
, C
, and D
, runs some code, and aborts. We can’t know which function is miscompiled, so we will try and bisect:
- Try
A
andB
together. Success. - Try
C
andD
together. Crash. - Try
C
. Success. - Try
D
. Crash.
Since we can discard half of this set each time, we can find our miscompiled functions in logarithmic time. That’s awesome. Even on slow-running repros, this rarely takes significant time. At worst, I go make tea.
Requirements
While it’s super helpful in many cases, bisecting has some prerequisites before it can work well:
- A consistent reproducer. If your program non-deterministically fails, the bisect results won’t make any sense.
- The ability to set the list of functions to compile. This requires some cooperation from the runtime.
- The ability to figure out which functions have been compiled. This also requires some cooperation from the runtime.
We already have the second two due to some server architecture constraints.
Implementation details
Cinder can be run with -X jit-list-file=somefile.txt
and will only compile functions on the JIT list (but will still only compile on first run).
The bisect script is a wrapper like ./jitlist_bisect.py ./python -X jit ...
which interprets the debug output to figure out which functions were compiled and passes in the JIT list.
Sometimes a JIT list will cause the crash but each split half won’t. In that case we hold each half fixed and try bisecting the other half to figure out what candidates we need.
The script is less than 200 lines of Python and can be found here.
Other helpful thoughts
Manually or automatically slimming down your reproducing source code also helps with this approach. It makes the repro runtime shorter and sometimes removes other moving parts like needing to send network traffic or something. We can probably use some form of tracing and bisect to automatically slim the repro.
Similar work
Speaking of automatically slimming the repro, C-Reduce is a tool by John Regehr and his collaborators. It takes a C source file and runner script and automatically bisects it to some failing case. From their homepage:
C-Reduce is a tool that takes a large C, C++, or OpenCL file that has a property of interest (such as triggering a compiler bug) and automatically produces a much smaller C/C++ file that has the same property. It is intended for use by people who discover and report bugs in compilers and other tools that process source code.
Incidentally, at the time of writing, their website looks pretty similar to this one.
from Hacker News https://ift.tt/K1QZkh2
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.