OpenCores
URL https://opencores.org/ocsvn/openrisc/openrisc/trunk

Subversion Repositories openrisc

[/] [openrisc/] [trunk/] [gnu-dev/] [or1k-gcc/] [gcc/] [ada/] [checks.ads] - Blame information for rev 848

Go to most recent revision | Details | Compare with Previous | View Log

Line No. Rev Author Line
1 706 jeremybenn
------------------------------------------------------------------------------
2
--                                                                          --
3
--                         GNAT COMPILER COMPONENTS                         --
4
--                                                                          --
5
--                               C H E C K S                                --
6
--                                                                          --
7
--                                 S p e c                                  --
8
--                                                                          --
9
--          Copyright (C) 1992-2011, Free Software Foundation, Inc.         --
10
--                                                                          --
11
-- GNAT is free software;  you can  redistribute it  and/or modify it under --
12
-- terms of the  GNU General Public License as published  by the Free Soft- --
13
-- ware  Foundation;  either version 3,  or (at your option) any later ver- --
14
-- sion.  GNAT is distributed in the hope that it will be useful, but WITH- --
15
-- OUT ANY WARRANTY;  without even the  implied warranty of MERCHANTABILITY --
16
-- or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License --
17
-- for  more details.  You should have  received  a copy of the GNU General --
18
-- Public License  distributed with GNAT; see file COPYING3.  If not, go to --
19
-- http://www.gnu.org/licenses for a complete copy of the license.          --
20
--                                                                          --
21
-- GNAT was originally developed  by the GNAT team at  New York University. --
22
-- Extensive contributions were provided by Ada Core Technologies Inc.      --
23
--                                                                          --
24
------------------------------------------------------------------------------
25
 
26
--  Package containing routines used to deal with runtime checks. These
27
--  routines are used both by the semantics and by the expander. In some
28
--  cases, checks are enabled simply by setting flags for gigi, and in
29
--  other cases the code for the check is expanded.
30
 
31
--  The approach used for range and length checks, in regards to suppressed
32
--  checks, is to attempt to detect at compilation time that a constraint
33
--  error will occur. If this is detected a warning or error is issued and the
34
--  offending expression or statement replaced with a constraint error node.
35
--  This always occurs whether checks are suppressed or not. Dynamic range
36
--  checks are, of course, not inserted if checks are suppressed.
37
 
38
with Namet;  use Namet;
39
with Table;
40
with Types;  use Types;
41
with Uintp;  use Uintp;
42
 
43
package Checks is
44
 
45
   procedure Initialize;
46
   --  Called for each new main source program, to initialize internal
47
   --  variables used in the package body of the Checks unit.
48
 
49
   function Access_Checks_Suppressed          (E : Entity_Id) return Boolean;
50
   function Accessibility_Checks_Suppressed   (E : Entity_Id) return Boolean;
51
   function Alignment_Checks_Suppressed       (E : Entity_Id) return Boolean;
52
   function Atomic_Synchronization_Disabled   (E : Entity_Id) return Boolean;
53
   function Discriminant_Checks_Suppressed    (E : Entity_Id) return Boolean;
54
   function Division_Checks_Suppressed        (E : Entity_Id) return Boolean;
55
   function Elaboration_Checks_Suppressed     (E : Entity_Id) return Boolean;
56
   function Index_Checks_Suppressed           (E : Entity_Id) return Boolean;
57
   function Length_Checks_Suppressed          (E : Entity_Id) return Boolean;
58
   function Overflow_Checks_Suppressed        (E : Entity_Id) return Boolean;
59
   function Range_Checks_Suppressed           (E : Entity_Id) return Boolean;
60
   function Storage_Checks_Suppressed         (E : Entity_Id) return Boolean;
61
   function Tag_Checks_Suppressed             (E : Entity_Id) return Boolean;
62
   function Validity_Checks_Suppressed        (E : Entity_Id) return Boolean;
63
   --  These functions check to see if the named check is suppressed, either
64
   --  by an active scope suppress setting, or because the check has been
65
   --  specifically suppressed for the given entity. If no entity is relevant
66
   --  for the current check, then Empty is used as an argument. Note: the
67
   --  reason we insist on specifying Empty is to force the caller to think
68
   --  about whether there is any relevant entity that should be checked.
69
 
70
   -------------------------------------------
71
   -- Procedures to Activate Checking Flags --
72
   -------------------------------------------
73
 
74
   procedure Activate_Division_Check (N : Node_Id);
75
   pragma Inline (Activate_Division_Check);
76
   --  Sets Do_Division_Check flag in node N, and handles possible local raise.
77
   --  Always call this routine rather than calling Set_Do_Division_Check to
78
   --  set an explicit value of True, to ensure handling the local raise case.
79
 
80
   procedure Activate_Overflow_Check (N : Node_Id);
81
   pragma Inline (Activate_Overflow_Check);
82
   --  Sets Do_Overflow_Check flag in node N, and handles possible local raise.
83
   --  Always call this routine rather than calling Set_Do_Overflow_Check to
84
   --  set an explicit value of True, to ensure handling the local raise case.
85
 
86
   procedure Activate_Range_Check (N : Node_Id);
87
   pragma Inline (Activate_Range_Check);
88
   --  Sets Do_Range_Check flag in node N, and handles possible local raise
89
   --  Always call this routine rather than calling Set_Do_Range_Check to
90
   --  set an explicit value of True, to ensure handling the local raise case.
91
 
92
   --------------------------------
93
   -- Procedures to Apply Checks --
94
   --------------------------------
95
 
96
   --  General note on following checks. These checks are always active if
97
   --  Expander_Active and not Inside_A_Generic. They are inactive and have
98
   --  no effect Inside_A_Generic. In the case where not Expander_Active
99
   --  and not Inside_A_Generic, most of them are inactive, but some of them
100
   --  operate anyway since they may generate useful compile time warnings.
101
 
102
   procedure Apply_Access_Check (N : Node_Id);
103
   --  Determines whether an expression node requires a runtime access
104
   --  check and if so inserts the appropriate run-time check.
105
 
106
   procedure Apply_Accessibility_Check
107
     (N           : Node_Id;
108
      Typ         : Entity_Id;
109
      Insert_Node : Node_Id);
110
   --  Given a name N denoting an access parameter, emits a run-time
111
   --  accessibility check (if necessary), checking that the level of
112
   --  the object denoted by the access parameter is not deeper than the
113
   --  level of the type Typ. Program_Error is raised if the check fails.
114
   --  Insert_Node indicates the node where the check should be inserted.
115
 
116
   procedure Apply_Address_Clause_Check (E : Entity_Id; N : Node_Id);
117
   --  E is the entity for an object which has an address clause. If checks
118
   --  are enabled, then this procedure generates a check that the specified
119
   --  address has an alignment consistent with the alignment of the object,
120
   --  raising PE if this is not the case. The resulting check (if one is
121
   --  generated) is inserted before node N. check is also made for the case of
122
   --  a clear overlay situation that the size of the overlaying object is not
123
   --  larger than the overlaid object.
124
 
125
   procedure Apply_Arithmetic_Overflow_Check (N : Node_Id);
126
   --  Given a binary arithmetic operator (+ - *) expand a software integer
127
   --  overflow check using range checks on a larger checking type or a call
128
   --  to an appropriate runtime routine. This is used for all three operators
129
   --  for the signed integer case, and for +/- in the fixed-point case. The
130
   --  check is expanded only if Software_Overflow_Checking is enabled and
131
   --  Do_Overflow_Check is set on node N. Note that divide is handled
132
   --  separately using Apply_Arithmetic_Divide_Overflow_Check.
133
 
134
   procedure Apply_Constraint_Check
135
     (N          : Node_Id;
136
      Typ        : Entity_Id;
137
      No_Sliding : Boolean := False);
138
   --  Top-level procedure, calls all the others depending on the class of
139
   --  Typ. Checks that expression N satisfies the constraint of type Typ.
140
   --  No_Sliding is only relevant for constrained array types, if set to
141
   --  True, it checks that indexes are in range.
142
 
143
   procedure Apply_Discriminant_Check
144
     (N   : Node_Id;
145
      Typ : Entity_Id;
146
      Lhs : Node_Id := Empty);
147
   --  Given an expression N of a discriminated type, or of an access type
148
   --  whose designated type is a discriminanted type, generates a check to
149
   --  ensure that the expression can be converted to the subtype given as
150
   --  the second parameter. Lhs is empty except in the case of assignments,
151
   --  where the target object may be needed to determine the subtype to
152
   --  check against (such as the cases of unconstrained formal parameters
153
   --  and unconstrained aliased objects). For the case of unconstrained
154
   --  formals, the check is performed only if the corresponding actual is
155
   --  constrained, i.e., whether Lhs'Constrained is True.
156
 
157
   procedure Apply_Predicate_Check (N : Node_Id; Typ : Entity_Id);
158
   --  N is an expression to which a predicate check may need to be applied
159
   --  for Typ, if Typ has a predicate function. The check is applied only
160
   --  if the type of N does not match Typ.
161
 
162
   function Build_Discriminant_Checks
163
     (N     : Node_Id;
164
      T_Typ : Entity_Id)
165
      return  Node_Id;
166
   --  Subsidiary routine for Apply_Discriminant_Check. Builds the expression
167
   --  that compares discriminants of the expression with discriminants of the
168
   --  type. Also used directly for membership tests (see Exp_Ch4.Expand_N_In).
169
 
170
   procedure Apply_Divide_Check (N : Node_Id);
171
   --  The node kind is N_Op_Divide, N_Op_Mod, or N_Op_Rem. An appropriate
172
   --  check is generated to ensure that the right operand is non-zero. In
173
   --  the divide case, we also check that we do not have the annoying case
174
   --  of the largest negative number divided by minus one.
175
 
176
   procedure Apply_Type_Conversion_Checks (N : Node_Id);
177
   --  N is an N_Type_Conversion node. A type conversion actually involves
178
   --  two sorts of checks. The first check is the checks that ensures that
179
   --  the operand in the type conversion fits onto the base type of the
180
   --  subtype it is being converted to (see RM 4.6 (28)-(50)). The second
181
   --  check is there to ensure that once the operand has been converted to
182
   --  a value of the target type, this converted value meets the
183
   --  constraints imposed by the target subtype (see RM 4.6 (51)).
184
 
185
   procedure Apply_Universal_Integer_Attribute_Checks (N : Node_Id);
186
   --  The argument N is an attribute reference node intended for processing
187
   --  by gigi. The attribute is one that returns a universal integer, but
188
   --  the attribute reference node is currently typed with the expected
189
   --  result type. This routine deals with range and overflow checks needed
190
   --  to make sure that the universal result is in range.
191
 
192
   procedure Determine_Range
193
     (N            : Node_Id;
194
      OK           : out Boolean;
195
      Lo           : out Uint;
196
      Hi           : out Uint;
197
      Assume_Valid : Boolean := False);
198
   --  N is a node for a subexpression. If N is of a discrete type with no
199
   --  error indications, and no other peculiarities (e.g. missing type
200
   --  fields), then OK is True on return, and Lo and Hi are set to a
201
   --  conservative estimate of the possible range of values of N. Thus if OK
202
   --  is True on return, the value of the subexpression N is known to like in
203
   --  the range Lo .. Hi (inclusive). If the expression is not of a discrete
204
   --  type, or some kind of error condition is detected, then OK is False on
205
   --  exit, and Lo/Hi are set to No_Uint. Thus the significance of OK being
206
   --  False on return is that no useful information is available on the range
207
   --  of the expression. Assume_Valid determines whether the processing is
208
   --  allowed to assume that values are in range of their subtypes. If it is
209
   --  set to True, then this assumption is valid, if False, then processing
210
   --  is done using base types to allow invalid values.
211
 
212
   procedure Install_Null_Excluding_Check (N : Node_Id);
213
   --  Determines whether an access node requires a runtime access check and
214
   --  if so inserts the appropriate run-time check.
215
 
216
   -------------------------------------------------------
217
   -- Control and Optimization of Range/Overflow Checks --
218
   -------------------------------------------------------
219
 
220
   --  Range checks are controlled by the Do_Range_Check flag. The front end
221
   --  is responsible for setting this flag in relevant nodes. Originally
222
   --  the back end generated all corresponding range checks. But later on
223
   --  we decided to generate many range checks in the front end. We are now
224
   --  in the transitional phase where some of these checks are still done
225
   --  by the back end, but many are done by the front end. It is possible
226
   --  that in the future we might move all the checks to the front end. The
227
   --  main remaining back end checks are for subscript checking.
228
 
229
   --  Overflow checks are similarly controlled by the Do_Overflow_Check flag.
230
   --  The difference here is that if back end overflow checks are inactive
231
   --  (Backend_Overflow_Checks_On_Target set False), then the actual overflow
232
   --  checks are generated by the front end, but if back end overflow checks
233
   --  are active (Backend_Overflow_Checks_On_Target set True), then the back
234
   --  end does generate the checks.
235
 
236
   --  The following two routines are used to set these flags, they allow
237
   --  for the possibility of eliminating checks. Checks can be eliminated
238
   --  if an identical check has already been performed.
239
 
240
   procedure Enable_Overflow_Check (N : Node_Id);
241
   --  First this routine determines if an overflow check is needed by doing
242
   --  an appropriate range check. If a check is not needed, then the call
243
   --  has no effect. If a check is needed then this routine sets the flag
244
   --  Do_Overflow_Check in node N to True, unless it can be determined that
245
   --  the check is not needed. The only condition under which this is the
246
   --  case is if there was an identical check earlier on.
247
 
248
   procedure Enable_Range_Check (N : Node_Id);
249
   --  Set Do_Range_Check flag in node N True, unless it can be determined
250
   --  that the check is not needed. The only condition under which this is
251
   --  the case is if there was an identical check earlier on. This routine
252
   --  is not responsible for doing range analysis to determine whether or
253
   --  not such a check is needed -- the caller is expected to do this. The
254
   --  one other case in which the request to set the flag is ignored is
255
   --  when Kill_Range_Check is set in an N_Unchecked_Conversion node.
256
 
257
   --  The following routines are used to keep track of processing sequences
258
   --  of statements (e.g. the THEN statements of an IF statement). A check
259
   --  that appears within such a sequence can eliminate an identical check
260
   --  within this sequence of statements. However, after the end of the
261
   --  sequence of statements, such a check is no longer of interest, since
262
   --  it may not have been executed.
263
 
264
   procedure Conditional_Statements_Begin;
265
   --  This call marks the start of processing of a sequence of statements.
266
   --  Every call to this procedure must be followed by a matching call to
267
   --  Conditional_Statements_End.
268
 
269
   procedure Conditional_Statements_End;
270
   --  This call removes from consideration all saved checks since the
271
   --  corresponding call to Conditional_Statements_Begin. These two
272
   --  procedures operate in a stack like manner.
273
 
274
   --  The mechanism for optimizing checks works by remembering checks
275
   --  that have already been made, but certain conditions, for example
276
   --  an assignment to a variable involved in a check, may mean that the
277
   --  remembered check is no longer valid, in the sense that if the same
278
   --  expression appears again, another check is required because the
279
   --  value may have changed.
280
 
281
   --  The following routines are used to note conditions which may render
282
   --  some or all of the stored and remembered checks to be invalidated.
283
 
284
   procedure Kill_Checks (V : Entity_Id);
285
   --  This procedure records an assignment or other condition that causes
286
   --  the value of the variable to be changed, invalidating any stored
287
   --  checks that reference the value. Note that all such checks must
288
   --  be discarded, even if they are not in the current statement range.
289
 
290
   procedure Kill_All_Checks;
291
   --  This procedure kills all remembered checks
292
 
293
   -----------------------------
294
   -- Length and Range Checks --
295
   -----------------------------
296
 
297
   --  In the following procedures, there are three arguments which have
298
   --  a common meaning as follows:
299
 
300
   --    Expr        The expression to be checked. If a check is required,
301
   --                the appropriate flag will be placed on this node. Whether
302
   --                this node is further examined depends on the setting of
303
   --                the parameter Source_Typ, as described below.
304
 
305
   --    ??? Apply_Length_Check and Apply_Range_Check do not have an Expr
306
   --        formal
307
 
308
   --    ??? Apply_Length_Check and Apply_Range_Check have a Ck_Node formal
309
   --        which is undocumented, is it the same as Expr?
310
 
311
   --    Target_Typ  The target type on which the check is to be based. For
312
   --                example, if we have a scalar range check, then the check
313
   --                is that we are in range of this type.
314
 
315
   --    Source_Typ  Normally Empty, but can be set to a type, in which case
316
   --                this type is used for the check, see below.
317
 
318
   --  The checks operate in one of two modes:
319
 
320
   --    If Source_Typ is Empty, then the node Expr is examined, at the very
321
   --    least to get the source subtype. In addition for some of the checks,
322
   --    the actual form of the node may be examined. For example, a node of
323
   --    type Integer whose actual form is an Integer conversion from a type
324
   --    with range 0 .. 3 can be determined to have a value in range 0 .. 3.
325
 
326
   --    If Source_Typ is given, then nothing can be assumed about the Expr,
327
   --    and indeed its contents are not examined. In this case the check is
328
   --    based on the assumption that Expr can be an arbitrary value of the
329
   --    given Source_Typ.
330
 
331
   --  Currently, the only case in which a Source_Typ is explicitly supplied
332
   --  is for the case of Out and In_Out parameters, where, for the conversion
333
   --  on return (the Out direction), the types must be reversed. This is
334
   --  handled by the caller.
335
 
336
   procedure Apply_Length_Check
337
     (Ck_Node    : Node_Id;
338
      Target_Typ : Entity_Id;
339
      Source_Typ : Entity_Id := Empty);
340
   --  This procedure builds a sequence of declarations to do a length check
341
   --  that checks if the lengths of the two arrays Target_Typ and source type
342
   --  are the same. The resulting actions are inserted at Node using a call
343
   --  to Insert_Actions.
344
   --
345
   --  For access types, the Directly_Designated_Type is retrieved and
346
   --  processing continues as enumerated above, with a guard against null
347
   --  values.
348
   --
349
   --  Note: calls to Apply_Length_Check currently never supply an explicit
350
   --  Source_Typ parameter, but Apply_Length_Check takes this parameter and
351
   --  processes it as described above for consistency with the other routines
352
   --  in this section.
353
 
354
   procedure Apply_Range_Check
355
     (Ck_Node    : Node_Id;
356
      Target_Typ : Entity_Id;
357
      Source_Typ : Entity_Id := Empty);
358
   --  For a Node of kind N_Range, constructs a range check action that tests
359
   --  first that the range is not null and then that the range is contained in
360
   --  the Target_Typ range.
361
   --
362
   --  For scalar types, constructs a range check action that first tests that
363
   --  the expression is contained in the Target_Typ range. The difference
364
   --  between this and Apply_Scalar_Range_Check is that the latter generates
365
   --  the actual checking code in gigi against the Etype of the expression.
366
   --
367
   --  For constrained array types, construct series of range check actions
368
   --  to check that each Expr range is properly contained in the range of
369
   --  Target_Typ.
370
   --
371
   --  For a type conversion to an unconstrained array type, constructs a range
372
   --  check action to check that the bounds of the source type are within the
373
   --  constraints imposed by the Target_Typ.
374
   --
375
   --  For access types, the Directly_Designated_Type is retrieved and
376
   --  processing continues as enumerated above, with a guard against null
377
   --  values.
378
   --
379
   --  The source type is used by type conversions to unconstrained array
380
   --  types to retrieve the corresponding bounds.
381
 
382
   procedure Apply_Static_Length_Check
383
     (Expr       : Node_Id;
384
      Target_Typ : Entity_Id;
385
      Source_Typ : Entity_Id := Empty);
386
   --  Tries to determine statically whether the two array types source type
387
   --  and Target_Typ have the same length. If it can be determined at compile
388
   --  time that they do not, then an N_Raise_Constraint_Error node replaces
389
   --  Expr, and a warning message is issued.
390
 
391
   procedure Apply_Scalar_Range_Check
392
     (Expr       : Node_Id;
393
      Target_Typ : Entity_Id;
394
      Source_Typ : Entity_Id := Empty;
395
      Fixed_Int  : Boolean   := False);
396
   --  For scalar types, determines whether an expression node should be
397
   --  flagged as needing a runtime range check. If the node requires such a
398
   --  check, the Do_Range_Check flag is turned on. The Fixed_Int flag if set
399
   --  causes any fixed-point values to be treated as though they were discrete
400
   --  values (i.e. the underlying integer value is used).
401
 
402
   type Check_Result is private;
403
   --  Type used to return result of Get_Range_Checks call, for later use in
404
   --  call to Insert_Range_Checks procedure.
405
 
406
   function Get_Range_Checks
407
     (Ck_Node    : Node_Id;
408
      Target_Typ : Entity_Id;
409
      Source_Typ : Entity_Id := Empty;
410
      Warn_Node  : Node_Id   := Empty) return Check_Result;
411
   --  Like Apply_Range_Check, except it does not modify anything. Instead
412
   --  it returns an encapsulated result of the check operations for later
413
   --  use in a call to Insert_Range_Checks. If Warn_Node is non-empty, its
414
   --  Sloc is used, in the static case, for the generated warning or error.
415
   --  Additionally, it is used rather than Expr (or Low/High_Bound of Expr)
416
   --  in constructing the check.
417
 
418
   procedure Append_Range_Checks
419
     (Checks       : Check_Result;
420
      Stmts        : List_Id;
421
      Suppress_Typ : Entity_Id;
422
      Static_Sloc  : Source_Ptr;
423
      Flag_Node    : Node_Id);
424
   --  Called to append range checks as returned by a call to Get_Range_Checks.
425
   --  Stmts is a list to which either the dynamic check is appended or the
426
   --  raise Constraint_Error statement is appended (for static checks).
427
   --  Static_Sloc is the Sloc at which the raise CE node points, Flag_Node is
428
   --  used as the node at which to set the Has_Dynamic_Check flag. Checks_On
429
   --  is a boolean value that says if range and index checking is on or not.
430
 
431
   procedure Insert_Range_Checks
432
     (Checks       : Check_Result;
433
      Node         : Node_Id;
434
      Suppress_Typ : Entity_Id;
435
      Static_Sloc  : Source_Ptr := No_Location;
436
      Flag_Node    : Node_Id    := Empty;
437
      Do_Before    : Boolean    := False);
438
   --  Called to insert range checks as returned by a call to Get_Range_Checks.
439
   --  Node is the node after which either the dynamic check is inserted or
440
   --  the raise Constraint_Error statement is inserted (for static checks).
441
   --  Suppress_Typ is the type to check to determine if checks are suppressed.
442
   --  Static_Sloc, if passed, is the Sloc at which the raise CE node points,
443
   --  otherwise Sloc (Node) is used. The Has_Dynamic_Check flag is normally
444
   --  set at Node. If Flag_Node is present, then this is used instead as the
445
   --  node at which to set the Has_Dynamic_Check flag. Normally the check is
446
   --  inserted after, if Do_Before is True, the check is inserted before
447
   --  Node.
448
 
449
   -----------------------
450
   -- Expander Routines --
451
   -----------------------
452
 
453
   --  Some of the earlier processing for checks results in temporarily setting
454
   --  the Do_Range_Check flag rather than actually generating checks. Now we
455
   --  are moving the generation of such checks into the front end for reasons
456
   --  of efficiency and simplicity (there were difficulties in handling this
457
   --  in the back end when side effects were present in the expressions being
458
   --  checked).
459
 
460
   --  Probably we could eliminate the Do_Range_Check flag entirely and
461
   --  generate the checks earlier, but this is a delicate area and it
462
   --  seemed safer to implement the following routines, which are called
463
   --  late on in the expansion process. They check the Do_Range_Check flag
464
   --  and if it is set, generate the actual checks and reset the flag.
465
 
466
   procedure Generate_Range_Check
467
     (N           : Node_Id;
468
      Target_Type : Entity_Id;
469
      Reason      : RT_Exception_Code);
470
   --  This procedure is called to actually generate and insert a range check.
471
   --  A check is generated to ensure that the value of N lies within the range
472
   --  of the target type. Note that the base type of N may be different from
473
   --  the base type of the target type. This happens in the conversion case.
474
   --  The Reason parameter is the exception code to be used for the exception
475
   --  if raised.
476
   --
477
   --  Note on the relation of this routine to the Do_Range_Check flag. Mostly
478
   --  for historical reasons, we often set the Do_Range_Check flag and then
479
   --  later we call Generate_Range_Check if this flag is set. Most probably we
480
   --  could eliminate this intermediate setting of the flag (historically the
481
   --  back end dealt with range checks, using this flag to indicate if a check
482
   --  was required, then we moved checks into the front end).
483
 
484
   procedure Generate_Index_Checks (N : Node_Id);
485
   --  This procedure is called to generate index checks on the subscripts for
486
   --  the indexed component node N. Each subscript expression is examined, and
487
   --  if the Do_Range_Check flag is set, an appropriate index check is
488
   --  generated and the flag is reset.
489
 
490
   --  Similarly, we set the flag Do_Discriminant_Check in the semantic
491
   --  analysis to indicate that a discriminant check is required for selected
492
   --  component of a discriminated type. The following routine is called from
493
   --  the expander to actually generate the call.
494
 
495
   procedure Generate_Discriminant_Check (N : Node_Id);
496
   --  N is a selected component for which a discriminant check is required to
497
   --  make sure that the discriminants have appropriate values for the
498
   --  selection. This is done by calling the appropriate discriminant checking
499
   --  routine for the selector.
500
 
501
   -----------------------
502
   -- Validity Checking --
503
   -----------------------
504
 
505
   --  In (RM 13.9.1(9-11)) we have the following rules on invalid values
506
 
507
   --    If the representation of a scalar object does not represent value of
508
   --    the object's subtype (perhaps because the object was not initialized),
509
   --    the object is said to have an invalid representation. It is a bounded
510
   --    error to evaluate the value of such an object. If the error is
511
   --    detected, either Constraint_Error or Program_Error is raised.
512
   --    Otherwise, execution continues using the invalid representation. The
513
   --    rules of the language outside this subclause assume that all objects
514
   --    have valid representations. The semantics of operations on invalid
515
   --    representations are as follows:
516
   --
517
   --       10  If the representation of the object represents a value of the
518
   --           object's type, the value of the type is used.
519
   --
520
   --       11  If the representation of the object does not represent a value
521
   --           of the object's type, the semantics of operations on such
522
   --           representations is implementation-defined, but does not by
523
   --           itself lead to erroneous or unpredictable execution, or to
524
   --           other objects becoming abnormal.
525
 
526
   --  We quote the rules in full here since they are quite delicate. Most
527
   --  of the time, we can just compute away with wrong values, and get a
528
   --  possibly wrong result, which is well within the range of allowed
529
   --  implementation defined behavior. The two tricky cases are subscripted
530
   --  array assignments, where we don't want to do wild stores, and case
531
   --  statements where we don't want to do wild jumps.
532
 
533
   --  In GNAT, we control validity checking with a switch -gnatV that can take
534
   --  three parameters, n/d/f for None/Default/Full. These modes have the
535
   --  following meanings:
536
 
537
   --    None (no validity checking)
538
 
539
   --      In this mode, there is no specific checking for invalid values
540
   --      and the code generator assumes that all stored values are always
541
   --      within the bounds of the object subtype. The consequences are as
542
   --      follows:
543
 
544
   --        For case statements, an out of range invalid value will cause
545
   --        Constraint_Error to be raised, or an arbitrary one of the case
546
   --        alternatives will be executed. Wild jumps cannot result even
547
   --        in this mode, since we always do a range check
548
 
549
   --        For subscripted array assignments, wild stores will result in
550
   --        the expected manner when addresses are calculated using values
551
   --        of subscripts that are out of range.
552
 
553
   --      It could perhaps be argued that this mode is still conformant with
554
   --      the letter of the RM, since implementation defined is a rather
555
   --      broad category, but certainly it is not in the spirit of the
556
   --      RM requirement, since wild stores certainly seem to be a case of
557
   --      erroneous behavior.
558
 
559
   --    Default (default standard RM-compatible validity checking)
560
 
561
   --      In this mode, which is the default, minimal validity checking is
562
   --      performed to ensure no erroneous behavior as follows:
563
 
564
   --        For case statements, an out of range invalid value will cause
565
   --        Constraint_Error to be raised.
566
 
567
   --        For subscripted array assignments, invalid out of range
568
   --        subscript values will cause Constraint_Error to be raised.
569
 
570
   --    Full (Full validity checking)
571
 
572
   --      In this mode, the protections guaranteed by the standard mode are
573
   --      in place, and the following additional checks are made:
574
 
575
   --        For every assignment, the right side is checked for validity
576
 
577
   --        For every call, IN and IN OUT parameters are checked for validity
578
 
579
   --        For every subscripted array reference, both for stores and loads,
580
   --        all subscripts are checked for validity.
581
 
582
   --      These checks are not required by the RM, but will in practice
583
   --      improve the detection of uninitialized variables, particularly
584
   --      if used in conjunction with pragma Normalize_Scalars.
585
 
586
   --  In the above description, we talk about performing validity checks,
587
   --  but we don't actually generate a check in a case where the compiler
588
   --  can be sure that the value is valid. Note that this assurance must
589
   --  be achieved without assuming that any uninitialized value lies within
590
   --  the range of its type. The following are cases in which values are
591
   --  known to be valid. The flag Is_Known_Valid is used to keep track of
592
   --  some of these cases.
593
 
594
   --    If all possible stored values are valid, then any uninitialized
595
   --    value must be valid.
596
 
597
   --    Literals, including enumeration literals, are clearly always valid
598
 
599
   --    Constants are always assumed valid, with a validity check being
600
   --    performed on the initializing value where necessary to ensure that
601
   --    this is the case.
602
 
603
   --    For variables, the status is set to known valid if there is an
604
   --    initializing expression. Again a check is made on the initializing
605
   --    value if necessary to ensure that this assumption is valid. The
606
   --    status can change as a result of local assignments to a variable.
607
   --    If a known valid value is unconditionally assigned, then we mark
608
   --    the left side as known valid. If a value is assigned that is not
609
   --    known to be valid, then we mark the left side as invalid. This
610
   --    kind of processing does NOT apply to non-local variables since we
611
   --    are not following the flow graph (more properly the flow of actual
612
   --    processing only corresponds to the flow graph for local assignments).
613
   --    For non-local variables, we preserve the current setting, i.e. a
614
   --    validity check is performed when assigning to a knonwn valid global.
615
 
616
   --  Note: no validity checking is required if range checks are suppressed
617
   --  regardless of the setting of the validity checking mode.
618
 
619
   --  The following procedures are used in handling validity checking
620
 
621
   procedure Apply_Subscript_Validity_Checks (Expr : Node_Id);
622
   --  Expr is the node for an indexed component. If validity checking and
623
   --  range checking are enabled, all subscripts for this indexed component
624
   --  are checked for validity.
625
 
626
   procedure Check_Valid_Lvalue_Subscripts (Expr : Node_Id);
627
   --  Expr is a lvalue, i.e. an expression representing the target of an
628
   --  assignment. This procedure checks for this expression involving an
629
   --  assignment to an array value. We have to be sure that all the subscripts
630
   --  in such a case are valid, since according to the rules in (RM
631
   --  13.9.1(9-11)) such assignments are not permitted to result in erroneous
632
   --  behavior in the case of invalid subscript values.
633
 
634
   procedure Ensure_Valid (Expr : Node_Id; Holes_OK : Boolean := False);
635
   --  Ensure that Expr represents a valid value of its type. If this type
636
   --  is not a scalar type, then the call has no effect, since validity
637
   --  is only an issue for scalar types. The effect of this call is to
638
   --  check if the value is known valid, if so, nothing needs to be done.
639
   --  If this is not known, then either Expr is set to be range checked,
640
   --  or specific checking code is inserted so that an exception is raised
641
   --  if the value is not valid.
642
   --
643
   --  The optional argument Holes_OK indicates whether it is necessary to
644
   --  worry about enumeration types with non-standard representations leading
645
   --  to "holes" in the range of possible representations. If Holes_OK is
646
   --  True, then such values are assumed valid (this is used when the caller
647
   --  will make a separate check for this case anyway). If Holes_OK is False,
648
   --  then this case is checked, and code is inserted to ensure that Expr is
649
   --  valid, raising Constraint_Error if the value is not valid.
650
 
651
   function Expr_Known_Valid (Expr : Node_Id) return Boolean;
652
   --  This function tests it the value of Expr is known to be valid in the
653
   --  sense of RM 13.9.1(9-11). In the case of GNAT, it is only discrete types
654
   --  which are a concern, since for non-discrete types we simply continue
655
   --  computation with invalid values, which does not lead to erroneous
656
   --  behavior. Thus Expr_Known_Valid always returns True if the type of Expr
657
   --  is non-discrete. For discrete types the value returned is True only if
658
   --  it can be determined that the value is Valid. Otherwise False is
659
   --  returned.
660
 
661
   procedure Insert_Valid_Check (Expr : Node_Id);
662
   --  Inserts code that will check for the value of Expr being valid, in
663
   --  the sense of the 'Valid attribute returning True. Constraint_Error
664
   --  will be raised if the value is not valid.
665
 
666
   procedure Null_Exclusion_Static_Checks (N : Node_Id);
667
   --  Ada 2005 (AI-231): Check bad usages of the null-exclusion issue
668
 
669
   procedure Remove_Checks (Expr : Node_Id);
670
   --  Remove all checks from Expr except those that are only executed
671
   --  conditionally (on the right side of And Then/Or Else. This call
672
   --  removes only embedded checks (Do_Range_Check, Do_Overflow_Check).
673
 
674
   procedure Validity_Check_Range (N : Node_Id);
675
   --  If N is an N_Range node, then Ensure_Valid is called on its bounds,
676
   --  if validity checking of operands is enabled.
677
 
678
   -----------------------------
679
   -- Handling of Check Names --
680
   -----------------------------
681
 
682
   --  The following table contains Name_Id's for recognized checks. The first
683
   --  entries (corresponding to the values of the subtype Predefined_Check_Id)
684
   --  contain the Name_Id values for the checks that are predefined, including
685
   --  All_Checks (see Types). Remaining entries are those that are introduced
686
   --  by pragma Check_Names.
687
 
688
   package Check_Names is new Table.Table (
689
     Table_Component_Type => Name_Id,
690
     Table_Index_Type     => Check_Id,
691
     Table_Low_Bound      => 1,
692
     Table_Initial        => 30,
693
     Table_Increment      => 200,
694
     Table_Name           => "Name_Check_Names");
695
 
696
   function Get_Check_Id (N : Name_Id) return Check_Id;
697
   --  Function to search above table for matching name. If found returns the
698
   --  corresponding Check_Id value in the range 1 .. Check_Name.Last. If not
699
   --  found returns No_Check_Id.
700
 
701
private
702
 
703
   type Check_Result is array (Positive range 1 .. 2) of Node_Id;
704
   --  There are two cases for the result returned by Range_Check:
705
   --
706
   --    For the static case the result is one or two nodes that should cause
707
   --    a Constraint_Error. Typically these will include Expr itself or the
708
   --    direct descendents of Expr, such as Low/High_Bound (Expr)). It is the
709
   --    responsibility of the caller to rewrite and substitute the nodes with
710
   --    N_Raise_Constraint_Error nodes.
711
   --
712
   --    For the non-static case a single N_Raise_Constraint_Error node with a
713
   --    non-empty Condition field is returned.
714
   --
715
   --  Unused entries in Check_Result, if any, are simply set to Empty For
716
   --  external clients, the required processing on this result is achieved
717
   --  using the Insert_Range_Checks routine.
718
 
719
   pragma Inline (Apply_Length_Check);
720
   pragma Inline (Apply_Range_Check);
721
   pragma Inline (Apply_Static_Length_Check);
722
end Checks;

powered by: WebSVN 2.1.0

© copyright 1999-2024 OpenCores.org, equivalent to Oliscience, all rights reserved. OpenCores®, registered trademark.