Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: Terminating analysis #1750

Merged
merged 17 commits into from
Apr 8, 2024
Merged

feat: Terminating analysis #1750

merged 17 commits into from
Apr 8, 2024

Conversation

KemalBekir
Copy link
Contributor

This PR solves: This issue

  • Added test for positive and negative outcomes
  • Implements the terminating description from the Go spec:
  • Analysis performed during preprocessing

- static_analysis and static_analysis_test
- static_analysis, static_analysis_test
@github-actions github-actions bot added the 📦 🤖 gnovm Issues or PRs gnovm related label Mar 10, 2024
@petar-dambovaliev
Copy link
Contributor

It looks good.
Some of the tests are failing because the code doesn't seem to cover the case where functions are external and injected in the VM.

Like strconv/strconv.go

package strconv

func Itoa(n int) string        

You need to identify external functions and not do analysis on them.

Copy link

codecov bot commented Mar 11, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 45.26%. Comparing base (05b8afc) to head (1605300).
Report is 52 commits behind head on master.

Additional details and impacted files
@@            Coverage Diff             @@
##           master    #1750      +/-   ##
==========================================
- Coverage   47.44%   45.26%   -2.19%     
==========================================
  Files         384      464      +80     
  Lines       61220    68515    +7295     
==========================================
+ Hits        29045    31010    +1965     
- Misses      29745    34902    +5157     
- Partials     2430     2603     +173     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@petar-dambovaliev petar-dambovaliev changed the title FEAT: Terminating analysis feat: Terminating analysis Mar 14, 2024
Copy link
Contributor

@petar-dambovaliev petar-dambovaliev left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

300 lines (without the tests). I like it.

Copy link
Contributor

@mvertes mvertes left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I agree that the terminating statement analysis proposed here is complying to the Go specification and seems correct in its implementation.

However I'm not sure that it is the best response (or at least not sufficient) to the class of errors we want to address here: missing or wrong return statements.

We should have instead a check of each return statement to be compliant with the function signature (including the special case of pre-declared returned values allowing an empty return), and the detection of a missing return at the end of function body.

This check will still be necessary, even if we implement termination analysis.

If we have this check, then termination analysis becomes much less useful, except to catch the possibility of skipping a return if all the previous branches have one, which is just an optimisation.

To me the gain of termination analysis in this context is marginal. I don't know if it is justified in the context of an interpreter. Or maybe I missed something ?

@petar-dambovaliev
Copy link
Contributor

petar-dambovaliev commented Mar 18, 2024

I agree that the terminating statement analysis proposed here is complying to the Go specification and seems correct in its implementation.

However I'm not sure that it is the best response (or at least not sufficient) to the class of errors we want to address here: missing or wrong return statements.

We should have instead a check of each return statement to be compliant with the function signature (including the special case of pre-declared returned values allowing an empty return),

This is exactly what this PR does
and the detection of a missing return at the end of function body.

This check will still be necessary, even if we implement termination analysis.

If we have this check, then termination analysis becomes much less useful, except to catch the possibility of skipping a return if all the previous branches have one, which is just an optimisation.

To me the gain of termination analysis in this context is marginal. I don't know if it is justified in the context of an interpreter. Or maybe I missed something ?

The idea of this was to catch bad code like

func foo(b bool) int {
   if b {
     return 1
  }
}

Which corrupts the VM stack.
Whether the return statement returns the correct type or not is up to the type checker.
The only job of the termination analysis is to make sure there is a return statement where one is required.
This is essentially what you said the detection of a missing return at the end of function body.
The other stuff that you referred to is already implemented in the type checking code.

Copy link
Contributor

@mvertes mvertes left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

After discussing and thinking more, I agree that your solution is the way to go 👍 .

Could you add also the following test which should pass ?

func f(a int) int {
    switch a {
    case 1:
        return 1
    default:
        return 0
    }
    // no return needed here
} 

Also the same for if:

func f(a int) int {
    if a > 0 {
        return 1
    } else {
        return 0
    }
    // no return needed
}

Copy link
Member

@zivkovicmilos zivkovicmilos left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you for the contribution 🙏

I've left some comments that should be addressed before we go ahead and merge -- they're mostly style related, but also address some sketchy parts of the PR

gnovm/pkg/gnolang/preprocess.go Outdated Show resolved Hide resolved
gnovm/pkg/gnolang/static_analysis.go Outdated Show resolved Hide resolved
gnovm/pkg/gnolang/static_analysis.go Outdated Show resolved Hide resolved
gnovm/pkg/gnolang/static_analysis.go Outdated Show resolved Hide resolved
gnovm/pkg/gnolang/static_analysis.go Outdated Show resolved Hide resolved
gnovm/pkg/gnolang/static_analysis.go Outdated Show resolved Hide resolved
gnovm/pkg/gnolang/static_analysis.go Outdated Show resolved Hide resolved
gnovm/pkg/gnolang/static_analysis_test.go Outdated Show resolved Hide resolved
gnovm/pkg/gnolang/static_analysis_test.go Outdated Show resolved Hide resolved
gnovm/pkg/gnolang/static_analysis_test.go Outdated Show resolved Hide resolved
Copy link
Member

@zivkovicmilos zivkovicmilos left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you for resolving the comments 🙏

I've just left a single point about a typo, otherwise we are good to go 🚀

gnovm/pkg/gnolang/static_analysis.go Outdated Show resolved Hide resolved
@zivkovicmilos zivkovicmilos merged commit 59c6d3e into gnolang:master Apr 8, 2024
190 checks passed
@michelleellen
Copy link

@KemalBekir we host a weekly developer call and would love to have you join if you're interested. Are you also on our Discord channe?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
📦 🤖 gnovm Issues or PRs gnovm related
Projects
Status: Done
Status: Done
Development

Successfully merging this pull request may close these issues.

None yet

6 participants