Jump to content

CEK Machine

From Wikipedia, the free encyclopedia

A CEK Machine is an abstract machine invented by Matthias Felleisen and Daniel P. Friedman that implements left-to-right call by value.[1] It is generally implemented as an interpreter for functional programming languages, but can also be used to implement simple imperative programming languages. A state in a CEK machine includes a control statement, environment and continuation. The control statement is the term being evaluated at that moment, the environment is (usually) a map from variable names to values, and the continuation stores another state, or a special halt case. It is a simplified form of another abstract machine called the SECD machine.[2][3][4]

The CEK machine builds on the SECD machine by replacing the dump (call stack) with the more advanced continuation, and putting parameters directly into the environment, rather than pushing them on to the parameter stack first. Other modifications can be made which creates a whole family of related machines. For example, the CESK machine has the environment map variables to a pointer on the store, which is effectively a heap. This allows it to model mutable state better than the ordinary CEK machine. The CK machine has no environment, and can be used for simple calculi without variables.[5]

Description

[edit]

A CEK machine can be created for any programming language so the term is often used vaguely. For example, a CEK machine could be created to interpret the lambda calculus. Its environment maps variables to closures and the continuations are either a halt, a continuation to evaluate an argument (ar), or a continuation to evaluate an application after evaluating a function (ap):[4][6]

Transition From To
Variable x, E, K t, E', K where closure(t,E') = E[x]
Application (f e), E, K f, E, ar(e, E, K)
Abstraction while evaluating function Abs, E, ar(t, E', K) t, E', ap(Abs, E, K)
Abstraction while evaluating argument Abs, E, ap(λx.Exp, E', K) Exp, E'[x=closure(Abs,E)], K

Representation of components

[edit]

Each component of the CEK machine has various representations. The control string is usually a term being evaluated, or sometimes, a line number. For example, a CEK machine evaluating the lambda calculus would use a lambda expression as a control string. The environment is almost always a map from variables to values, or in the case of CESK machines, variables to addresses in the store. The representation of the continuation varies. It often contains another environment as well as a continuation type, for example argument or application. It is sometimes a call stack, where each frame is the rest of the state, i.e. a control statement and an environment.

[edit]

There are some other machines closely linked to the CEK machine.

CESK machine

[edit]

The CESK machine is another machine closely related to the CEK machine. The environment in a CESK machine maps variables to pointers, on a "store" (heap) hence the name "CESK". It can be used to model mutable state, for example the Λσ calculus described in the original paper. This makes it much more useful for interpreting imperative programming languages, rather than functional ones.[5]

CS machine

[edit]

The CS machine contains just a control statement and a store. It is also described by the original paper. In an application, instead of putting variables into an environment it substitutes them with an address on the store and putting the value of the variable in that address. The continuation is not needed because it is lazily evaluated; it does not need to remember to evaluate an argument.[5]

SECD machine

[edit]

The SECD machine was the machine that CEK machine was based on. It has a stack, environment, control statement and dump. The dump is a call stack, and is used instead of a continuation. The stack is used for passing parameters to functions. The control statement was written in postfix notation, and the machine had its own "programming language". A lambda calculus statement like this:

(M N)

would be written like this:

N:M:ap

where ap is a function that applies two abstractions together.[7][8]

Origins

[edit]

On page 196 of "Control Operators, the SECD Machine, and the -Calculus", [9] and on page 4 of the technical report with the same name, [10] Matthias Felleisen and Daniel P. Friedman wrote "The [CEK] machine is derived from Reynolds' extended interpreter IV.", referring to John Reynolds's Interpreter III in "Definitional Interpreters for Higher-Order Programming Languages". [11] [12]

To wit, here is an implementation of the CEK machine in OCaml, representing lambda terms with de Bruijn indices:

type term = IND of int    (* de Bruijn index *)
          | ABS of term
          | APP of term * term

Values are closures, as invented by Peter Landin:

type value = CLO of term * value list

type cont = C2 of term * value list * cont
          | C1 of value * cont
          | C0

let rec continue (c : cont) (v : value) : value =
  match c, v with
    C2 (t1, e, k), v0 ->
     eval t1 e (C1 (v0, k))
  | C1 (v0, k), v1 ->
     apply v0 v1 k
  | C0, v ->
     v
and eval (t : term) (e : value list) (k : cont) : value =
  match t with
    IND n ->
     continue k (List.nth e n)
  | ABS t' ->
     continue k (CLO (t', e))
  | APP (t0, t1) ->
     eval t0 e (C2 (t1, e, k))
and apply (v0 : value) (v1 : value) (k : cont) =
  let (CLO (t, e)) = v0
  in eval t (v1 :: e) k

let main (t : term) : value =
  eval t [] C0

This implementation is in defunctionalized form, with cont and continue as the first-order representation of a continuation. Here is its refunctionalized counterpart:

let rec eval (t : term) (e : value list) (k : value -> 'a) : 'a =
  match t with
    IND n ->
     k (List.nth e n)
  | ABS t' ->
     k (CLO (t', e))
  | APP (t0, t1) ->
     eval t0 e (fun v0 ->
                  eval t1 e (fun v1 ->
                               apply v0 v1 k))
and apply (v0 : value) (v1 : value) (k : value -> 'a) : 'a =
  let (CLO (t, e)) = v0
  in eval t (v1 :: e) k

let main (t : term) : value =
  eval t [] (fun v -> v)

This implementation is in left-to-right continuation-passing style, where the domain of answers is polymorphic, i.e., is implemented with a type variable.[13] This continuation-passing implementation is mapped back to direct style as follows:

let rec eval (t : term) (e : value list) : value =
  match t with
    IND n ->
     List.nth e n
  | ABS t' ->
     CLO (t', e)
  | APP (t0, t1) ->
     let v0 = eval t0 e
     and v1 = eval t1 e
     in apply v0 v1
and apply (v0 : value) (v1 : value) : value =
  let (CLO (t, e)) = v0
  in eval t (v1 :: e)

let main (t : term) : value =
  eval t []

This direct-style implementation is also in defunctionalized form, or more precisely in closure-converted form. Here is the result of closure-unconverting it:

type value = FUN of (value -> value)

let rec eval (t : term) (e : value list) : value =
  match t with
    IND n ->
     List.nth e n
  | ABS t' ->
     FUN (fun v -> eval t' (v :: e))
  | APP (t0, t1) ->
     let v0 = eval t0 e
     and v1 = eval t1 e
     in apply v0 v1
and apply (v0 : value) (v1 : value) : value =
  let (FUN f) = v0
  in f v1

let main (t : term) : value =
  eval t []

The resulting implementation is compositional. It is the usual Scott-Tarski definitional self-interpreter where the domain of values is reflexive (Scott) and where syntactic functions are defined as semantic functions and syntactic applications are defined as semantic applications (Tarski).

This derivation mimics Danvy's rational deconstruction of Landin's SECD machine.[14] The converse derivation (closure conversion, CPS transformation, and defunctionalization) is documented in John Reynolds's article "Definitional Interpreters for Higher-Order Programming Languages", which is the origin of the CEK machine and was subsequently identified as a blueprint for transforming compositional evaluators into abstract machines as well as vice versa.[11][15]

Modern times

[edit]

The CEK machine, like the Krivine machine, does not only functionally correspond to a meta-circular evaluator (via a left-to-right call-by-value CPS transformation), [15] it also syntactically corresponds to the calculus -- a calculus that uses explicit substitution -- with a left-to-right applicative-order reduction strategy, [16] [17] and likewise for the SECD machine (via a right-to-left call-by-value CPS transformation). [18]

References

[edit]
  1. ^ Accattoli, Beniamino; Barenbaum, Pablo; Mazza, Damiano (19 August 2014), "Distilling abstract machines", Proceedings of the 19th ACM SIGPLAN international conference on Functional programming, ACM, pp. 363–376, doi:10.1145/2628136.2628154, ISBN 9781450328739, They differ on how they behave with respect to applications: the CEK implements left-to-right call-by-value, i.e. it first evaluates the function part, the LAM gives instead precedence to arguments, realizing right-to-left call-by-value.
  2. ^ Jens Palsberg (28 August 2009). Semantics and Algebraic Specification: Essays Dedicated to Peter D. Mosses on the Occasion of His 60th Birthday. Springer Science & Business Media. pp. 162–. ISBN 978-3-642-04163-1.
  3. ^ Felleisen, Matthias; Findler, Robert Bruce; Flatt, Matthew (10 July 2009). Semantics Engineering with PLT Redex. MIT Press. pp. 113–. ISBN 978-0-262-25817-3.
  4. ^ a b Thielecke, Hayo (December 9, 2015). "Implementing functional languages with abstract machines" (PDF). Archived from the original (PDF) on 2021-07-17. Retrieved September 9, 2020.
  5. ^ a b c Felleisen, Matthias; Friedman, Daniel P. (October 1986). "A Calculus for Assignments in Higher-Order Languages" (PDF).
  6. ^ "A refresher on the CEK machine". CMSC 330, Summer 2015. Retrieved 2020-09-19.
  7. ^ "The SECD Virtual Machine" (PDF).
  8. ^ "secd". www.cs.bath.ac.uk. Retrieved 2020-09-23.
  9. ^ Felleisen, Matthias; Friedman, Daniel (1986). Control Operators, the SECD Machine, and the -Calculus. Formal Description of Programming Concepts III, Elsevier Science Publishers B.V. (North-Holland). pp. 193–217. doi:10.1007/978-3-319-14125-1_13.
  10. ^ Felleisen, Matthias; Friedman, Daniel P. (1986). Control Operators, the SECD Machine, and the -Calculus (PDF) (Technical report). Department of Computer Science, Indiana University. 197.
  11. ^ a b Reynolds, John C. (1972). "Definitional Interpreters for Higher-Order Programming Languages". Proceedings of the ACM annual conference on - ACM '72. Vol. 2. Proceedings of 25th ACM National Conference. pp. 717–740. doi:10.1145/800194.805852.
  12. ^ Reynolds, John C. (1998). "Definitional Interpreters Revisited". Higher-Order and Symbolic Computation. 11 (4): 355–361. doi:10.1023/A:1010075320153. S2CID 34126862.
  13. ^ Thielecke, Hayo (2004). "Answer Type Polymorphism in Call-by-Name Continuation Passing". Programming Languages and Systems. Lecture Notes in Computer Science. Vol. 2986. Programming Languages and Systems, 13th European Symposium on Programming, ESOP 2004, LNCS 2986, Springer. pp. 279–293. doi:10.1007/978-3-540-24725-8_20. ISBN 978-3-540-21313-0.
  14. ^ Danvy, Olivier (2004). A Rational Deconstruction of Landin's SECD Machine (PDF). Implementation and Application of Functional Languages, 16th International Workshop, IFL 2004, Revised Selected Papers, Lecture Notes in Computer Science 3474, Springer. pp. 52–71. ISSN 0909-0878.
  15. ^ a b Ager, Mads Sig; Biernacki, Dariusz; Danvy, Olivier; Midtgaard, Jan (2003). "A Functional Correspondence between Evaluators and Abstract Machines". Brics Report Series. 10 (13). 5th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming (PPDP'03): 8–19. doi:10.7146/brics.v10i13.21783.
  16. ^ Biernacka, Małgorzata; Danvy, Olivier (2007). "A Concrete Framework for Environment Machines". ACM Transactions on Computational Logic. 9 (1). Article #6: 1–30. doi:10.7146/brics.v13i3.21909.
  17. ^ Rozowski, Wojciech (2021). Formally verified derivation of an executable and terminating CEK machine from call-by-value lambda-p-hat-calculus (PDF) (Thesis). University of Southampton.
  18. ^ Danvy, Olivier; Millikin, Kevin (2008). "A rational deconstruction of Landin's SECD machine with the J operator". Logical Methods in Computer Science. 4 (4): 1–67. arXiv:0811.3231. doi:10.2168/LMCS-4(4:12)2008. S2CID 7926360.