[multiple changes]
[gcc.git] / gcc / ada / checks.ads
1 ------------------------------------------------------------------------------
2 -- --
3 -- GNAT COMPILER COMPONENTS --
4 -- --
5 -- C H E C K S --
6 -- --
7 -- S p e c --
8 -- --
9 -- Copyright (C) 1992-2012, Free Software Foundation, Inc. --
10 -- --
11 -- GNAT is free software; you can redistribute it and/or modify it under --
12 -- terms of the GNU General Public License as published by the Free Soft- --
13 -- ware Foundation; either version 3, or (at your option) any later ver- --
14 -- sion. GNAT is distributed in the hope that it will be useful, but WITH- --
15 -- OUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY --
16 -- or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License --
17 -- for more details. You should have received a copy of the GNU General --
18 -- Public License distributed with GNAT; see file COPYING3. If not, go to --
19 -- http://www.gnu.org/licenses for a complete copy of the license. --
20 -- --
21 -- GNAT was originally developed by the GNAT team at New York University. --
22 -- Extensive contributions were provided by Ada Core Technologies Inc. --
23 -- --
24 ------------------------------------------------------------------------------
25
26 -- Package containing routines used to deal with runtime checks. These
27 -- routines are used both by the semantics and by the expander. In some
28 -- cases, checks are enabled simply by setting flags for gigi, and in
29 -- other cases the code for the check is expanded.
30
31 -- The approach used for range and length checks, in regards to suppressed
32 -- checks, is to attempt to detect at compilation time that a constraint
33 -- error will occur. If this is detected a warning or error is issued and the
34 -- offending expression or statement replaced with a constraint error node.
35 -- This always occurs whether checks are suppressed or not. Dynamic range
36 -- checks are, of course, not inserted if checks are suppressed.
37
38 with Namet; use Namet;
39 with Table;
40 with Types; use Types;
41 with Uintp; use Uintp;
42
43 package Checks is
44
45 procedure Initialize;
46 -- Called for each new main source program, to initialize internal
47 -- variables used in the package body of the Checks unit.
48
49 function Access_Checks_Suppressed (E : Entity_Id) return Boolean;
50 function Accessibility_Checks_Suppressed (E : Entity_Id) return Boolean;
51 function Alignment_Checks_Suppressed (E : Entity_Id) return Boolean;
52 function Atomic_Synchronization_Disabled (E : Entity_Id) return Boolean;
53 function Discriminant_Checks_Suppressed (E : Entity_Id) return Boolean;
54 function Division_Checks_Suppressed (E : Entity_Id) return Boolean;
55 function Elaboration_Checks_Suppressed (E : Entity_Id) return Boolean;
56 function Index_Checks_Suppressed (E : Entity_Id) return Boolean;
57 function Length_Checks_Suppressed (E : Entity_Id) return Boolean;
58 function Overflow_Checks_Suppressed (E : Entity_Id) return Boolean;
59 function Range_Checks_Suppressed (E : Entity_Id) return Boolean;
60 function Storage_Checks_Suppressed (E : Entity_Id) return Boolean;
61 function Tag_Checks_Suppressed (E : Entity_Id) return Boolean;
62 function Validity_Checks_Suppressed (E : Entity_Id) return Boolean;
63 -- These functions check to see if the named check is suppressed, either
64 -- by an active scope suppress setting, or because the check has been
65 -- specifically suppressed for the given entity. If no entity is relevant
66 -- for the current check, then Empty is used as an argument. Note: the
67 -- reason we insist on specifying Empty is to force the caller to think
68 -- about whether there is any relevant entity that should be checked.
69
70 function Is_Check_Suppressed (E : Entity_Id; C : Check_Id) return Boolean;
71 -- This function is called if Checks_May_Be_Suppressed (E) is True to
72 -- determine whether check C is suppressed either on the entity E or
73 -- as the result of a scope suppress pragma. If Checks_May_Be_Suppressed
74 -- is False, then the status of the check can be determined simply by
75 -- examining Scope_Checks (C), so this routine is not called in that case.
76
77 function Overflow_Check_Mode (E : Entity_Id) return Overflow_Check_Type;
78 -- Returns current overflow checking mode, taking into account whether
79 -- we are inside an assertion expression. Always returns Suppressed if
80 -- overflow checks are suppressed for entity E.
81
82 -------------------------------------------
83 -- Procedures to Activate Checking Flags --
84 -------------------------------------------
85
86 procedure Activate_Division_Check (N : Node_Id);
87 pragma Inline (Activate_Division_Check);
88 -- Sets Do_Division_Check flag in node N, and handles possible local raise.
89 -- Always call this routine rather than calling Set_Do_Division_Check to
90 -- set an explicit value of True, to ensure handling the local raise case.
91
92 procedure Activate_Overflow_Check (N : Node_Id);
93 pragma Inline (Activate_Overflow_Check);
94 -- Sets Do_Overflow_Check flag in node N, and handles possible local raise.
95 -- Always call this routine rather than calling Set_Do_Overflow_Check to
96 -- set an explicit value of True, to ensure handling the local raise case.
97
98 procedure Activate_Range_Check (N : Node_Id);
99 pragma Inline (Activate_Range_Check);
100 -- Sets Do_Range_Check flag in node N, and handles possible local raise
101 -- Always call this routine rather than calling Set_Do_Range_Check to
102 -- set an explicit value of True, to ensure handling the local raise case.
103
104 --------------------------------
105 -- Procedures to Apply Checks --
106 --------------------------------
107
108 -- General note on following checks. These checks are always active if
109 -- Expander_Active and not Inside_A_Generic. They are inactive and have
110 -- no effect Inside_A_Generic. In the case where not Expander_Active
111 -- and not Inside_A_Generic, most of them are inactive, but some of them
112 -- operate anyway since they may generate useful compile time warnings.
113
114 procedure Apply_Access_Check (N : Node_Id);
115 -- Determines whether an expression node requires a runtime access
116 -- check and if so inserts the appropriate run-time check.
117
118 procedure Apply_Accessibility_Check
119 (N : Node_Id;
120 Typ : Entity_Id;
121 Insert_Node : Node_Id);
122 -- Given a name N denoting an access parameter, emits a run-time
123 -- accessibility check (if necessary), checking that the level of
124 -- the object denoted by the access parameter is not deeper than the
125 -- level of the type Typ. Program_Error is raised if the check fails.
126 -- Insert_Node indicates the node where the check should be inserted.
127
128 procedure Apply_Address_Clause_Check (E : Entity_Id; N : Node_Id);
129 -- E is the entity for an object which has an address clause. If checks
130 -- are enabled, then this procedure generates a check that the specified
131 -- address has an alignment consistent with the alignment of the object,
132 -- raising PE if this is not the case. The resulting check (if one is
133 -- generated) is inserted before node N. check is also made for the case of
134 -- a clear overlay situation that the size of the overlaying object is not
135 -- larger than the overlaid object.
136
137 procedure Apply_Arithmetic_Overflow_Check (N : Node_Id);
138 -- Given a binary arithmetic operator (+ - *) expand a software integer
139 -- overflow check using range checks on a larger checking type or a call
140 -- to an appropriate runtime routine. This is used for all three operators
141 -- for the signed integer case, and for +/- in the fixed-point case. The
142 -- check is expanded only if Software_Overflow_Checking is enabled and
143 -- Do_Overflow_Check is set on node N. Note that divide is handled
144 -- separately using Apply_Arithmetic_Divide_Overflow_Check.
145
146 procedure Apply_Constraint_Check
147 (N : Node_Id;
148 Typ : Entity_Id;
149 No_Sliding : Boolean := False);
150 -- Top-level procedure, calls all the others depending on the class of
151 -- Typ. Checks that expression N satisfies the constraint of type Typ.
152 -- No_Sliding is only relevant for constrained array types, if set to
153 -- True, it checks that indexes are in range.
154
155 procedure Apply_Discriminant_Check
156 (N : Node_Id;
157 Typ : Entity_Id;
158 Lhs : Node_Id := Empty);
159 -- Given an expression N of a discriminated type, or of an access type
160 -- whose designated type is a discriminanted type, generates a check to
161 -- ensure that the expression can be converted to the subtype given as
162 -- the second parameter. Lhs is empty except in the case of assignments,
163 -- where the target object may be needed to determine the subtype to
164 -- check against (such as the cases of unconstrained formal parameters
165 -- and unconstrained aliased objects). For the case of unconstrained
166 -- formals, the check is performed only if the corresponding actual is
167 -- constrained, i.e., whether Lhs'Constrained is True.
168
169 procedure Apply_Divide_Checks (N : Node_Id);
170 -- The node kind is N_Op_Divide, N_Op_Mod, or N_Op_Rem if either of the
171 -- flags Do_Division_Check or Do_Overflow_Check is set, then this routine
172 -- ensures that the appropriate checks are made. Note that overflow can
173 -- occur in the signed case for the case of the largest negative number
174 -- divided by minus one.
175
176 procedure Apply_Parameter_Aliasing_And_Validity_Checks (Subp : Entity_Id);
177 -- Given a subprogram Subp, add both a pre and post condition pragmas that
178 -- detect aliased objects and verify the proper initialization of scalars
179 -- in parameters and function results.
180
181 procedure Apply_Predicate_Check (N : Node_Id; Typ : Entity_Id);
182 -- N is an expression to which a predicate check may need to be applied
183 -- for Typ, if Typ has a predicate function. The check is applied only
184 -- if the type of N does not match Typ.
185
186 procedure Apply_Type_Conversion_Checks (N : Node_Id);
187 -- N is an N_Type_Conversion node. A type conversion actually involves
188 -- two sorts of checks. The first check is the checks that ensures that
189 -- the operand in the type conversion fits onto the base type of the
190 -- subtype it is being converted to (see RM 4.6 (28)-(50)). The second
191 -- check is there to ensure that once the operand has been converted to
192 -- a value of the target type, this converted value meets the
193 -- constraints imposed by the target subtype (see RM 4.6 (51)).
194
195 procedure Apply_Universal_Integer_Attribute_Checks (N : Node_Id);
196 -- The argument N is an attribute reference node intended for processing
197 -- by gigi. The attribute is one that returns a universal integer, but
198 -- the attribute reference node is currently typed with the expected
199 -- result type. This routine deals with range and overflow checks needed
200 -- to make sure that the universal result is in range.
201
202 function Build_Discriminant_Checks
203 (N : Node_Id;
204 T_Typ : Entity_Id)
205 return Node_Id;
206 -- Subsidiary routine for Apply_Discriminant_Check. Builds the expression
207 -- that compares discriminants of the expression with discriminants of the
208 -- type. Also used directly for membership tests (see Exp_Ch4.Expand_N_In).
209
210 function Convert_From_Bignum (N : Node_Id) return Node_Id;
211 -- Returns result of converting node N from Bignum. The returned value is
212 -- not analyzed, the caller takes responsibility for this. Node N must be
213 -- a subexpression node of type Bignum. The result is Long_Long_Integer.
214
215 function Convert_To_Bignum (N : Node_Id) return Node_Id;
216 -- Returns result of converting node N to Bignum. The returned value is not
217 -- analyzed, the caller takes responsibility for this. Node N must be a
218 -- subexpression node of a signed integer type or Bignum type (if it is
219 -- already a Bignnum, the returned value is Relocate_Node (N).
220
221 procedure Determine_Range
222 (N : Node_Id;
223 OK : out Boolean;
224 Lo : out Uint;
225 Hi : out Uint;
226 Assume_Valid : Boolean := False);
227 -- N is a node for a subexpression. If N is of a discrete type with no
228 -- error indications, and no other peculiarities (e.g. missing Etype),
229 -- then OK is True on return, and Lo and Hi are set to a conservative
230 -- estimate of the possible range of values of N. Thus if OK is True on
231 -- return, the value of the subexpression N is known to lie in the range
232 -- Lo .. Hi (inclusive). If the expression is not of a discrete type, or
233 -- some kind of error condition is detected, then OK is False on exit, and
234 -- Lo/Hi are set to No_Uint. Thus the significance of OK being False on
235 -- return is that no useful information is available on the range of the
236 -- expression. Assume_Valid determines whether the processing is allowed to
237 -- assume that values are in range of their subtypes. If it is set to True,
238 -- then this assumption is valid, if False, then processing is done using
239 -- base types to allow invalid values.
240
241 procedure Install_Null_Excluding_Check (N : Node_Id);
242 -- Determines whether an access node requires a runtime access check and
243 -- if so inserts the appropriate run-time check.
244
245 function Make_Bignum_Block (Loc : Source_Ptr) return Node_Id;
246 -- This function is used by top level overflow checking routines to do a
247 -- mark/release operation on the secondary stack around bignum operations.
248 -- The block created looks like:
249 --
250 -- declare
251 -- M : Mark_Id := SS_Mark;
252 -- begin
253 -- SS_Release (M);
254 -- end;
255 --
256 -- The idea is that the caller will insert any needed extra declarations
257 -- after the declaration of M, and any needed statements (in particular
258 -- the bignum operations) before the call to SS_Release, and then do an
259 -- Insert_Action of the whole block (it is returned unanalyzed). The Loc
260 -- parameter is used to supply Sloc values for the constructed tree.
261
262 procedure Minimize_Eliminate_Overflow_Checks
263 (N : Node_Id;
264 Lo : out Uint;
265 Hi : out Uint;
266 Top_Level : Boolean);
267 -- This is the main routine for handling MINIMIZED and ELIMINATED overflow
268 -- checks. On entry N is a node whose result is a signed integer subtype.
269 -- If the node is an artihmetic operation, then a range analysis is carried
270 -- out, and there are three possibilities:
271 --
272 -- The node is left unchanged (apart from expansion of an exponentiation
273 -- operation). This happens if the routine can determine that the result
274 -- is definitely in range. The Do_Overflow_Check flag is turned off in
275 -- this case.
276 --
277 -- The node is transformed into an arithmetic operation with a result
278 -- type of Long_Long_Integer.
279 --
280 -- The node is transformed into a function call that calls an appropriate
281 -- function in the System.Bignums package to compute a Bignum result.
282 --
283 -- In the first two cases, Lo and Hi are set to the bounds of the possible
284 -- range of results, computed as accurately as possible. In the third case
285 -- Lo and Hi are set to No_Uint (there are some cases where we cold get an
286 -- advantage from keeping result ranges for Bignum values, but it could use
287 -- a lot of space and is very unlikely to be valuable).
288 --
289 -- If the node is not an arithmetic operation, then it is unchanged but
290 -- Lo and Hi are still set (to the bounds of the result subtype if nothing
291 -- better can be determined.
292 --
293 -- Note: this function is recursive, if called with an arithmetic operator,
294 -- recursive calls are made to process the operands using this procedure.
295 -- So we end up doing things top down. Nothing happens to an arithmetic
296 -- expression until this procedure is called on the top level node and
297 -- then the recursive calls process all the children. We have to do it
298 -- this way. If we try to do it bottom up in natural expansion order, then
299 -- there are two problems. First, where do we stash the bounds, and more
300 -- importantly, semantic processing will be messed up. Consider A+B+C where
301 -- A,B,C are all of type integer, if we processed A+B before doing semantic
302 -- analysis of the addition of this result to C, that addition could end up
303 -- with a Long_Long_Integer left operand and an Integer right operand, and
304 -- we would get a semantic error.
305 --
306 -- The routine is called in three situations if we are operating in
307 -- either MINIMIZED or ELIMINATED modes.
308 --
309 -- Overflow checks applied to the top node of an expression tree when
310 -- that node is an arithmetic operator. In this case the result is
311 -- converted to the appropriate result type (there is special processing
312 -- when the parent is a conversion, see body for details).
313 --
314 -- Overflow checks are applied to the operands of a comparison operation.
315 -- In this case, the comparison is done on the result Long_Long_Integer
316 -- or Bignum values, without raising any exceptions.
317 --
318 -- Overflow checks are applied to the left operand of a membership test.
319 -- In this case no exception is raised if a Long_Long_Integer or Bignum
320 -- result is outside the range of the type of that left operand (it is
321 -- just that the result of IN is false in that case).
322 --
323 -- Note that if Bignum values appear, the caller must take care of doing
324 -- the appropriate mark/release operation on the secondary stack.
325 --
326 -- Top_Level is used to avoid inefficient unnecessary transitions into the
327 -- Bignum domain. If Top_Level is True, it means that the caller will have
328 -- to convert any Bignum value back to Long_Long_Integer, checking that the
329 -- value is in range. This is the normal case for a top level operator in
330 -- a subexpression. There is no point in going into Bignum mode to avoid an
331 -- overflow just so we can check for overflow the next moment. For calls
332 -- from comparisons and membership tests, and for all recursive calls, we
333 -- do want to transition into the Bignum domain if necessary. Note that
334 -- this setting is only relevant in ELIMINATED mode.
335
336 -------------------------------------------------------
337 -- Control and Optimization of Range/Overflow Checks --
338 -------------------------------------------------------
339
340 -- Range checks are controlled by the Do_Range_Check flag. The front end
341 -- is responsible for setting this flag in relevant nodes. Originally
342 -- the back end generated all corresponding range checks. But later on
343 -- we decided to generate many range checks in the front end. We are now
344 -- in the transitional phase where some of these checks are still done
345 -- by the back end, but many are done by the front end. It is possible
346 -- that in the future we might move all the checks to the front end. The
347 -- main remaining back end checks are for subscript checking.
348
349 -- Overflow checks are similarly controlled by the Do_Overflow_Check flag.
350 -- The difference here is that if back end overflow checks are inactive
351 -- (Backend_Overflow_Checks_On_Target set False), then the actual overflow
352 -- checks are generated by the front end, but if back end overflow checks
353 -- are active (Backend_Overflow_Checks_On_Target set True), then the back
354 -- end does generate the checks.
355
356 -- The following two routines are used to set these flags, they allow
357 -- for the possibility of eliminating checks. Checks can be eliminated
358 -- if an identical check has already been performed.
359
360 procedure Enable_Overflow_Check (N : Node_Id);
361 -- First this routine determines if an overflow check is needed by doing
362 -- an appropriate range check. If a check is not needed, then the call
363 -- has no effect. If a check is needed then this routine sets the flag
364 -- Do_Overflow_Check in node N to True, unless it can be determined that
365 -- the check is not needed. The only condition under which this is the
366 -- case is if there was an identical check earlier on. These optimziations
367 -- apply to CHECKED mode, but not to MINIMIZED/ELIMINATED modes. See the
368 -- body for a full explanation.
369
370 procedure Enable_Range_Check (N : Node_Id);
371 -- Set Do_Range_Check flag in node N True, unless it can be determined
372 -- that the check is not needed. The only condition under which this is
373 -- the case is if there was an identical check earlier on. This routine
374 -- is not responsible for doing range analysis to determine whether or
375 -- not such a check is needed -- the caller is expected to do this. The
376 -- one other case in which the request to set the flag is ignored is
377 -- when Kill_Range_Check is set in an N_Unchecked_Conversion node.
378
379 -- The following routines are used to keep track of processing sequences
380 -- of statements (e.g. the THEN statements of an IF statement). A check
381 -- that appears within such a sequence can eliminate an identical check
382 -- within this sequence of statements. However, after the end of the
383 -- sequence of statements, such a check is no longer of interest, since
384 -- it may not have been executed.
385
386 procedure Conditional_Statements_Begin;
387 -- This call marks the start of processing of a sequence of statements.
388 -- Every call to this procedure must be followed by a matching call to
389 -- Conditional_Statements_End.
390
391 procedure Conditional_Statements_End;
392 -- This call removes from consideration all saved checks since the
393 -- corresponding call to Conditional_Statements_Begin. These two
394 -- procedures operate in a stack like manner.
395
396 -- The mechanism for optimizing checks works by remembering checks
397 -- that have already been made, but certain conditions, for example
398 -- an assignment to a variable involved in a check, may mean that the
399 -- remembered check is no longer valid, in the sense that if the same
400 -- expression appears again, another check is required because the
401 -- value may have changed.
402
403 -- The following routines are used to note conditions which may render
404 -- some or all of the stored and remembered checks to be invalidated.
405
406 procedure Kill_Checks (V : Entity_Id);
407 -- This procedure records an assignment or other condition that causes
408 -- the value of the variable to be changed, invalidating any stored
409 -- checks that reference the value. Note that all such checks must
410 -- be discarded, even if they are not in the current statement range.
411
412 procedure Kill_All_Checks;
413 -- This procedure kills all remembered checks
414
415 -----------------------------
416 -- Length and Range Checks --
417 -----------------------------
418
419 -- In the following procedures, there are three arguments which have
420 -- a common meaning as follows:
421
422 -- Expr The expression to be checked. If a check is required,
423 -- the appropriate flag will be placed on this node. Whether
424 -- this node is further examined depends on the setting of
425 -- the parameter Source_Typ, as described below.
426
427 -- ??? Apply_Length_Check and Apply_Range_Check do not have an Expr
428 -- formal
429
430 -- ??? Apply_Length_Check and Apply_Range_Check have a Ck_Node formal
431 -- which is undocumented, is it the same as Expr?
432
433 -- Target_Typ The target type on which the check is to be based. For
434 -- example, if we have a scalar range check, then the check
435 -- is that we are in range of this type.
436
437 -- Source_Typ Normally Empty, but can be set to a type, in which case
438 -- this type is used for the check, see below.
439
440 -- The checks operate in one of two modes:
441
442 -- If Source_Typ is Empty, then the node Expr is examined, at the very
443 -- least to get the source subtype. In addition for some of the checks,
444 -- the actual form of the node may be examined. For example, a node of
445 -- type Integer whose actual form is an Integer conversion from a type
446 -- with range 0 .. 3 can be determined to have a value in range 0 .. 3.
447
448 -- If Source_Typ is given, then nothing can be assumed about the Expr,
449 -- and indeed its contents are not examined. In this case the check is
450 -- based on the assumption that Expr can be an arbitrary value of the
451 -- given Source_Typ.
452
453 -- Currently, the only case in which a Source_Typ is explicitly supplied
454 -- is for the case of Out and In_Out parameters, where, for the conversion
455 -- on return (the Out direction), the types must be reversed. This is
456 -- handled by the caller.
457
458 procedure Apply_Length_Check
459 (Ck_Node : Node_Id;
460 Target_Typ : Entity_Id;
461 Source_Typ : Entity_Id := Empty);
462 -- This procedure builds a sequence of declarations to do a length check
463 -- that checks if the lengths of the two arrays Target_Typ and source type
464 -- are the same. The resulting actions are inserted at Node using a call
465 -- to Insert_Actions.
466 --
467 -- For access types, the Directly_Designated_Type is retrieved and
468 -- processing continues as enumerated above, with a guard against null
469 -- values.
470 --
471 -- Note: calls to Apply_Length_Check currently never supply an explicit
472 -- Source_Typ parameter, but Apply_Length_Check takes this parameter and
473 -- processes it as described above for consistency with the other routines
474 -- in this section.
475
476 procedure Apply_Range_Check
477 (Ck_Node : Node_Id;
478 Target_Typ : Entity_Id;
479 Source_Typ : Entity_Id := Empty);
480 -- For a Node of kind N_Range, constructs a range check action that tests
481 -- first that the range is not null and then that the range is contained in
482 -- the Target_Typ range.
483 --
484 -- For scalar types, constructs a range check action that first tests that
485 -- the expression is contained in the Target_Typ range. The difference
486 -- between this and Apply_Scalar_Range_Check is that the latter generates
487 -- the actual checking code in gigi against the Etype of the expression.
488 --
489 -- For constrained array types, construct series of range check actions
490 -- to check that each Expr range is properly contained in the range of
491 -- Target_Typ.
492 --
493 -- For a type conversion to an unconstrained array type, constructs a range
494 -- check action to check that the bounds of the source type are within the
495 -- constraints imposed by the Target_Typ.
496 --
497 -- For access types, the Directly_Designated_Type is retrieved and
498 -- processing continues as enumerated above, with a guard against null
499 -- values.
500 --
501 -- The source type is used by type conversions to unconstrained array
502 -- types to retrieve the corresponding bounds.
503
504 procedure Apply_Static_Length_Check
505 (Expr : Node_Id;
506 Target_Typ : Entity_Id;
507 Source_Typ : Entity_Id := Empty);
508 -- Tries to determine statically whether the two array types source type
509 -- and Target_Typ have the same length. If it can be determined at compile
510 -- time that they do not, then an N_Raise_Constraint_Error node replaces
511 -- Expr, and a warning message is issued.
512
513 procedure Apply_Scalar_Range_Check
514 (Expr : Node_Id;
515 Target_Typ : Entity_Id;
516 Source_Typ : Entity_Id := Empty;
517 Fixed_Int : Boolean := False);
518 -- For scalar types, determines whether an expression node should be
519 -- flagged as needing a runtime range check. If the node requires such a
520 -- check, the Do_Range_Check flag is turned on. The Fixed_Int flag if set
521 -- causes any fixed-point values to be treated as though they were discrete
522 -- values (i.e. the underlying integer value is used).
523
524 type Check_Result is private;
525 -- Type used to return result of Get_Range_Checks call, for later use in
526 -- call to Insert_Range_Checks procedure.
527
528 function Get_Range_Checks
529 (Ck_Node : Node_Id;
530 Target_Typ : Entity_Id;
531 Source_Typ : Entity_Id := Empty;
532 Warn_Node : Node_Id := Empty) return Check_Result;
533 -- Like Apply_Range_Check, except it does not modify anything. Instead
534 -- it returns an encapsulated result of the check operations for later
535 -- use in a call to Insert_Range_Checks. If Warn_Node is non-empty, its
536 -- Sloc is used, in the static case, for the generated warning or error.
537 -- Additionally, it is used rather than Expr (or Low/High_Bound of Expr)
538 -- in constructing the check.
539
540 procedure Append_Range_Checks
541 (Checks : Check_Result;
542 Stmts : List_Id;
543 Suppress_Typ : Entity_Id;
544 Static_Sloc : Source_Ptr;
545 Flag_Node : Node_Id);
546 -- Called to append range checks as returned by a call to Get_Range_Checks.
547 -- Stmts is a list to which either the dynamic check is appended or the
548 -- raise Constraint_Error statement is appended (for static checks).
549 -- Static_Sloc is the Sloc at which the raise CE node points, Flag_Node is
550 -- used as the node at which to set the Has_Dynamic_Check flag. Checks_On
551 -- is a boolean value that says if range and index checking is on or not.
552
553 procedure Insert_Range_Checks
554 (Checks : Check_Result;
555 Node : Node_Id;
556 Suppress_Typ : Entity_Id;
557 Static_Sloc : Source_Ptr := No_Location;
558 Flag_Node : Node_Id := Empty;
559 Do_Before : Boolean := False);
560 -- Called to insert range checks as returned by a call to Get_Range_Checks.
561 -- Node is the node after which either the dynamic check is inserted or
562 -- the raise Constraint_Error statement is inserted (for static checks).
563 -- Suppress_Typ is the type to check to determine if checks are suppressed.
564 -- Static_Sloc, if passed, is the Sloc at which the raise CE node points,
565 -- otherwise Sloc (Node) is used. The Has_Dynamic_Check flag is normally
566 -- set at Node. If Flag_Node is present, then this is used instead as the
567 -- node at which to set the Has_Dynamic_Check flag. Normally the check is
568 -- inserted after, if Do_Before is True, the check is inserted before
569 -- Node.
570
571 -----------------------
572 -- Expander Routines --
573 -----------------------
574
575 -- Some of the earlier processing for checks results in temporarily setting
576 -- the Do_Range_Check flag rather than actually generating checks. Now we
577 -- are moving the generation of such checks into the front end for reasons
578 -- of efficiency and simplicity (there were difficulties in handling this
579 -- in the back end when side effects were present in the expressions being
580 -- checked).
581
582 -- Probably we could eliminate the Do_Range_Check flag entirely and
583 -- generate the checks earlier, but this is a delicate area and it
584 -- seemed safer to implement the following routines, which are called
585 -- late on in the expansion process. They check the Do_Range_Check flag
586 -- and if it is set, generate the actual checks and reset the flag.
587
588 procedure Generate_Range_Check
589 (N : Node_Id;
590 Target_Type : Entity_Id;
591 Reason : RT_Exception_Code);
592 -- This procedure is called to actually generate and insert a range check.
593 -- A check is generated to ensure that the value of N lies within the range
594 -- of the target type. Note that the base type of N may be different from
595 -- the base type of the target type. This happens in the conversion case.
596 -- The Reason parameter is the exception code to be used for the exception
597 -- if raised.
598 --
599 -- Note on the relation of this routine to the Do_Range_Check flag. Mostly
600 -- for historical reasons, we often set the Do_Range_Check flag and then
601 -- later we call Generate_Range_Check if this flag is set. Most probably we
602 -- could eliminate this intermediate setting of the flag (historically the
603 -- back end dealt with range checks, using this flag to indicate if a check
604 -- was required, then we moved checks into the front end).
605
606 procedure Generate_Index_Checks (N : Node_Id);
607 -- This procedure is called to generate index checks on the subscripts for
608 -- the indexed component node N. Each subscript expression is examined, and
609 -- if the Do_Range_Check flag is set, an appropriate index check is
610 -- generated and the flag is reset.
611
612 -- Similarly, we set the flag Do_Discriminant_Check in the semantic
613 -- analysis to indicate that a discriminant check is required for selected
614 -- component of a discriminated type. The following routine is called from
615 -- the expander to actually generate the call.
616
617 procedure Generate_Discriminant_Check (N : Node_Id);
618 -- N is a selected component for which a discriminant check is required to
619 -- make sure that the discriminants have appropriate values for the
620 -- selection. This is done by calling the appropriate discriminant checking
621 -- routine for the selector.
622
623 -----------------------
624 -- Validity Checking --
625 -----------------------
626
627 -- In (RM 13.9.1(9-11)) we have the following rules on invalid values
628
629 -- If the representation of a scalar object does not represent value of
630 -- the object's subtype (perhaps because the object was not initialized),
631 -- the object is said to have an invalid representation. It is a bounded
632 -- error to evaluate the value of such an object. If the error is
633 -- detected, either Constraint_Error or Program_Error is raised.
634 -- Otherwise, execution continues using the invalid representation. The
635 -- rules of the language outside this subclause assume that all objects
636 -- have valid representations. The semantics of operations on invalid
637 -- representations are as follows:
638 --
639 -- 10 If the representation of the object represents a value of the
640 -- object's type, the value of the type is used.
641 --
642 -- 11 If the representation of the object does not represent a value
643 -- of the object's type, the semantics of operations on such
644 -- representations is implementation-defined, but does not by
645 -- itself lead to erroneous or unpredictable execution, or to
646 -- other objects becoming abnormal.
647
648 -- We quote the rules in full here since they are quite delicate. Most
649 -- of the time, we can just compute away with wrong values, and get a
650 -- possibly wrong result, which is well within the range of allowed
651 -- implementation defined behavior. The two tricky cases are subscripted
652 -- array assignments, where we don't want to do wild stores, and case
653 -- statements where we don't want to do wild jumps.
654
655 -- In GNAT, we control validity checking with a switch -gnatV that can take
656 -- three parameters, n/d/f for None/Default/Full. These modes have the
657 -- following meanings:
658
659 -- None (no validity checking)
660
661 -- In this mode, there is no specific checking for invalid values
662 -- and the code generator assumes that all stored values are always
663 -- within the bounds of the object subtype. The consequences are as
664 -- follows:
665
666 -- For case statements, an out of range invalid value will cause
667 -- Constraint_Error to be raised, or an arbitrary one of the case
668 -- alternatives will be executed. Wild jumps cannot result even
669 -- in this mode, since we always do a range check
670
671 -- For subscripted array assignments, wild stores will result in
672 -- the expected manner when addresses are calculated using values
673 -- of subscripts that are out of range.
674
675 -- It could perhaps be argued that this mode is still conformant with
676 -- the letter of the RM, since implementation defined is a rather
677 -- broad category, but certainly it is not in the spirit of the
678 -- RM requirement, since wild stores certainly seem to be a case of
679 -- erroneous behavior.
680
681 -- Default (default standard RM-compatible validity checking)
682
683 -- In this mode, which is the default, minimal validity checking is
684 -- performed to ensure no erroneous behavior as follows:
685
686 -- For case statements, an out of range invalid value will cause
687 -- Constraint_Error to be raised.
688
689 -- For subscripted array assignments, invalid out of range
690 -- subscript values will cause Constraint_Error to be raised.
691
692 -- Full (Full validity checking)
693
694 -- In this mode, the protections guaranteed by the standard mode are
695 -- in place, and the following additional checks are made:
696
697 -- For every assignment, the right side is checked for validity
698
699 -- For every call, IN and IN OUT parameters are checked for validity
700
701 -- For every subscripted array reference, both for stores and loads,
702 -- all subscripts are checked for validity.
703
704 -- These checks are not required by the RM, but will in practice
705 -- improve the detection of uninitialized variables, particularly
706 -- if used in conjunction with pragma Normalize_Scalars.
707
708 -- In the above description, we talk about performing validity checks,
709 -- but we don't actually generate a check in a case where the compiler
710 -- can be sure that the value is valid. Note that this assurance must
711 -- be achieved without assuming that any uninitialized value lies within
712 -- the range of its type. The following are cases in which values are
713 -- known to be valid. The flag Is_Known_Valid is used to keep track of
714 -- some of these cases.
715
716 -- If all possible stored values are valid, then any uninitialized
717 -- value must be valid.
718
719 -- Literals, including enumeration literals, are clearly always valid
720
721 -- Constants are always assumed valid, with a validity check being
722 -- performed on the initializing value where necessary to ensure that
723 -- this is the case.
724
725 -- For variables, the status is set to known valid if there is an
726 -- initializing expression. Again a check is made on the initializing
727 -- value if necessary to ensure that this assumption is valid. The
728 -- status can change as a result of local assignments to a variable.
729 -- If a known valid value is unconditionally assigned, then we mark
730 -- the left side as known valid. If a value is assigned that is not
731 -- known to be valid, then we mark the left side as invalid. This
732 -- kind of processing does NOT apply to non-local variables since we
733 -- are not following the flow graph (more properly the flow of actual
734 -- processing only corresponds to the flow graph for local assignments).
735 -- For non-local variables, we preserve the current setting, i.e. a
736 -- validity check is performed when assigning to a knonwn valid global.
737
738 -- Note: no validity checking is required if range checks are suppressed
739 -- regardless of the setting of the validity checking mode.
740
741 -- The following procedures are used in handling validity checking
742
743 procedure Apply_Subscript_Validity_Checks (Expr : Node_Id);
744 -- Expr is the node for an indexed component. If validity checking and
745 -- range checking are enabled, all subscripts for this indexed component
746 -- are checked for validity.
747
748 procedure Check_Valid_Lvalue_Subscripts (Expr : Node_Id);
749 -- Expr is a lvalue, i.e. an expression representing the target of an
750 -- assignment. This procedure checks for this expression involving an
751 -- assignment to an array value. We have to be sure that all the subscripts
752 -- in such a case are valid, since according to the rules in (RM
753 -- 13.9.1(9-11)) such assignments are not permitted to result in erroneous
754 -- behavior in the case of invalid subscript values.
755
756 procedure Ensure_Valid (Expr : Node_Id; Holes_OK : Boolean := False);
757 -- Ensure that Expr represents a valid value of its type. If this type
758 -- is not a scalar type, then the call has no effect, since validity
759 -- is only an issue for scalar types. The effect of this call is to
760 -- check if the value is known valid, if so, nothing needs to be done.
761 -- If this is not known, then either Expr is set to be range checked,
762 -- or specific checking code is inserted so that an exception is raised
763 -- if the value is not valid.
764 --
765 -- The optional argument Holes_OK indicates whether it is necessary to
766 -- worry about enumeration types with non-standard representations leading
767 -- to "holes" in the range of possible representations. If Holes_OK is
768 -- True, then such values are assumed valid (this is used when the caller
769 -- will make a separate check for this case anyway). If Holes_OK is False,
770 -- then this case is checked, and code is inserted to ensure that Expr is
771 -- valid, raising Constraint_Error if the value is not valid.
772
773 function Expr_Known_Valid (Expr : Node_Id) return Boolean;
774 -- This function tests it the value of Expr is known to be valid in the
775 -- sense of RM 13.9.1(9-11). In the case of GNAT, it is only discrete types
776 -- which are a concern, since for non-discrete types we simply continue
777 -- computation with invalid values, which does not lead to erroneous
778 -- behavior. Thus Expr_Known_Valid always returns True if the type of Expr
779 -- is non-discrete. For discrete types the value returned is True only if
780 -- it can be determined that the value is Valid. Otherwise False is
781 -- returned.
782
783 procedure Insert_Valid_Check (Expr : Node_Id);
784 -- Inserts code that will check for the value of Expr being valid, in
785 -- the sense of the 'Valid attribute returning True. Constraint_Error
786 -- will be raised if the value is not valid.
787
788 procedure Null_Exclusion_Static_Checks (N : Node_Id);
789 -- Ada 2005 (AI-231): Check bad usages of the null-exclusion issue
790
791 procedure Remove_Checks (Expr : Node_Id);
792 -- Remove all checks from Expr except those that are only executed
793 -- conditionally (on the right side of And Then/Or Else. This call
794 -- removes only embedded checks (Do_Range_Check, Do_Overflow_Check).
795
796 procedure Validity_Check_Range (N : Node_Id);
797 -- If N is an N_Range node, then Ensure_Valid is called on its bounds,
798 -- if validity checking of operands is enabled.
799
800 -----------------------------
801 -- Handling of Check Names --
802 -----------------------------
803
804 -- The following table contains Name_Id's for recognized checks. The first
805 -- entries (corresponding to the values of the subtype Predefined_Check_Id)
806 -- contain the Name_Id values for the checks that are predefined, including
807 -- All_Checks (see Types). Remaining entries are those that are introduced
808 -- by pragma Check_Names.
809
810 package Check_Names is new Table.Table (
811 Table_Component_Type => Name_Id,
812 Table_Index_Type => Check_Id,
813 Table_Low_Bound => 1,
814 Table_Initial => 30,
815 Table_Increment => 200,
816 Table_Name => "Name_Check_Names");
817
818 function Get_Check_Id (N : Name_Id) return Check_Id;
819 -- Function to search above table for matching name. If found returns the
820 -- corresponding Check_Id value in the range 1 .. Check_Name.Last. If not
821 -- found returns No_Check_Id.
822
823 private
824
825 type Check_Result is array (Positive range 1 .. 2) of Node_Id;
826 -- There are two cases for the result returned by Range_Check:
827 --
828 -- For the static case the result is one or two nodes that should cause
829 -- a Constraint_Error. Typically these will include Expr itself or the
830 -- direct descendents of Expr, such as Low/High_Bound (Expr)). It is the
831 -- responsibility of the caller to rewrite and substitute the nodes with
832 -- N_Raise_Constraint_Error nodes.
833 --
834 -- For the non-static case a single N_Raise_Constraint_Error node with a
835 -- non-empty Condition field is returned.
836 --
837 -- Unused entries in Check_Result, if any, are simply set to Empty For
838 -- external clients, the required processing on this result is achieved
839 -- using the Insert_Range_Checks routine.
840
841 pragma Inline (Apply_Length_Check);
842 pragma Inline (Apply_Range_Check);
843 pragma Inline (Apply_Static_Length_Check);
844 end Checks;