1 ------------------------------------------------------------------------------
3 -- GNAT COMPILER COMPONENTS --
5 -- S Y S T E M . R I D E N T --
9 -- Copyright (C) 1992-2014, Free Software Foundation, Inc. --
11 -- GNAT is free software; you can redistribute it and/or modify it under --
12 -- terms of the GNU General Public License as published by the Free Soft- --
13 -- ware Foundation; either version 3, or (at your option) any later ver- --
14 -- sion. GNAT is distributed in the hope that it will be useful, but WITH- --
15 -- OUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY --
16 -- or FITNESS FOR A PARTICULAR PURPOSE. --
18 -- As a special exception under Section 7 of GPL version 3, you are granted --
19 -- additional permissions described in the GCC Runtime Library Exception, --
20 -- version 3.1, as published by the Free Software Foundation. --
22 -- You should have received a copy of the GNU General Public License and --
23 -- a copy of the GCC Runtime Library Exception along with this program; --
24 -- see the files COPYING3 and COPYING.RUNTIME respectively. If not, see --
25 -- <http://www.gnu.org/licenses/>. --
27 -- GNAT was originally developed by the GNAT team at New York University. --
28 -- Extensive contributions were provided by Ada Core Technologies Inc. --
30 ------------------------------------------------------------------------------
32 -- This package defines the set of restriction identifiers. It is a generic
33 -- package that is instantiated by the compiler/binder in package Rident, and
34 -- is instantiated in package System.Restrictions for use at run-time.
36 -- The reason that we make this a generic package is so that in the case of
37 -- the instantiation in Rident for use at compile time and bind time, we can
38 -- generate normal image tables for the enumeration types, which are needed
39 -- for diagnostic and informational messages. At run-time we really do not
40 -- want to waste the space for these image tables, and they are not needed,
41 -- so we can do the instantiation under control of Discard_Names to remove
44 ---------------------------------------------------
45 -- Note On Compile/Run-Time Consistency Checking --
46 ---------------------------------------------------
48 -- This unit is with'ed by the run-time (to make System.Restrictions which is
49 -- used for run-time access to restriction information), by the compiler (to
50 -- determine what restrictions are implemented and what their category is) and
51 -- by the binder (in processing ali files, and generating the information used
52 -- at run-time to access restriction information).
54 -- Normally the version of System.Rident referenced in all three contexts
55 -- should be the same. However, problems could arise in certain inconsistent
56 -- builds that used inconsistent versions of the compiler and run-time. This
57 -- sort of thing is not strictly correct, but it does arise when short-cuts
58 -- are taken in build procedures.
60 -- Previously, this kind of inconsistency could cause a significant problem.
61 -- If versions of System.Rident accessed by the compiler and binder differed,
62 -- then the binder could fail to recognize the R (restrictions line) in the
63 -- ali file, leading to bind errors when restrictions were added or removed.
65 -- The latest implementation avoids both this problem by using a named
66 -- scheme for recording restrictions, rather than a positional scheme which
67 -- fails completely if restrictions are added or subtracted. Now the worst
68 -- that happens at bind time in inconsistent builds is that unrecognized
69 -- restrictions are ignored, and the consistency checking for restrictions
70 -- might be incomplete, which is no big deal.
72 pragma Compiler_Unit_Warning;
75 package System.Rident is
78 -- The following enumeration type defines the set of restriction
79 -- identifiers that are implemented in GNAT.
81 -- To add a new restriction identifier, add an entry with the name to be
82 -- used in the pragma, and add calls to the Restrict.Check_Restriction
83 -- routine as appropriate.
85 type Restriction_Id is
87 -- The following cases are checked for consistency in the binder. The
88 -- binder will check that every unit either has the restriction set, or
89 -- does not violate the restriction.
91 (Simple_Barriers, -- Ada 2012 (D.7 (10.9/3))
92 No_Abort_Statements, -- (RM D.7(5), H.4(3))
93 No_Access_Parameter_Allocators, -- Ada 2012 (RM H.4 (8.3/3))
94 No_Access_Subprograms, -- (RM H.4(17))
95 No_Allocators, -- (RM H.4(7))
96 No_Anonymous_Allocators, -- Ada 2012 (RM H.4(8/1))
97 No_Asynchronous_Control, -- (RM J.13(3/2)
99 No_Coextensions, -- Ada 2012 (RM H.4(8.2/3))
100 No_Default_Stream_Attributes, -- Ada 2012 (RM 13.12.1(4/2))
101 No_Delay, -- (RM H.4(21))
102 No_Direct_Boolean_Operators, -- GNAT
103 No_Dispatch, -- (RM H.4(19))
104 No_Dispatching_Calls, -- GNAT
105 No_Dynamic_Attachment, -- Ada 2012 (RM E.7(10/3))
106 No_Dynamic_Priorities, -- (RM D.9(9))
107 No_Enumeration_Maps, -- GNAT
108 No_Entry_Calls_In_Elaboration_Code, -- GNAT
109 No_Entry_Queue, -- GNAT (Ravenscar)
110 No_Exception_Handlers, -- GNAT
111 No_Exception_Propagation, -- GNAT
112 No_Exception_Registration, -- GNAT
113 No_Exceptions, -- (RM H.4(12))
114 No_Finalization, -- GNAT
116 No_Fixed_Point, -- (RM H.4(15))
117 No_Floating_Point, -- (RM H.4(14))
118 No_IO, -- (RM H.4(20))
119 No_Implicit_Conditionals, -- GNAT
120 No_Implicit_Dynamic_Code, -- GNAT
121 No_Implicit_Heap_Allocations, -- (RM D.8(8), H.4(3))
122 No_Implicit_Loops, -- GNAT
123 No_Initialize_Scalars, -- GNAT
124 No_Local_Allocators, -- (RM H.4(8))
125 No_Local_Timing_Events, -- (RM D.7(10.2/2))
126 No_Local_Protected_Objects, -- Ada 2012 (D.7(10/1.3))
127 No_Long_Long_Integer, -- GNAT
128 No_Nested_Finalization, -- (RM D.7(4))
129 No_Protected_Type_Allocators, -- Ada 2012 (D.7 (10.3/2))
130 No_Protected_Types, -- (RM H.4(5))
131 No_Recursion, -- (RM H.4(22))
132 No_Reentrancy, -- (RM H.4(23))
133 No_Relative_Delay, -- Ada 2012 (D.7 (10.5/3))
134 No_Requeue_Statements, -- Ada 2012 (D.7 (10.6/3))
135 No_Secondary_Stack, -- GNAT
136 No_Select_Statements, -- Ada 2012 (D.7 (10.7/4))
137 No_Specific_Termination_Handlers, -- (RM D.7(10.7/2))
138 No_Standard_Allocators_After_Elaboration, -- Ada 2012 (RM D.7(19.1/2))
139 No_Standard_Storage_Pools, -- GNAT
140 No_Stream_Optimizations, -- GNAT
142 No_Task_Allocators, -- (RM D.7(7))
143 No_Task_Attributes_Package, -- GNAT
144 No_Task_Hierarchy, -- (RM D.7(3), H.4(3))
145 No_Task_Termination, -- GNAT (Ravenscar)
147 No_Terminate_Alternatives, -- (RM D.7(6))
148 No_Unchecked_Access, -- (RM H.4(18))
149 No_Unchecked_Conversion, -- (RM J.13(4/2))
150 No_Unchecked_Deallocation, -- (RM J.13(5/2))
151 Static_Priorities, -- GNAT
152 Static_Storage_Size, -- GNAT
154 -- The following require consistency checking with special rules. See
155 -- individual routines in unit Bcheck for details of what is required.
157 No_Default_Initialization, -- GNAT
159 -- The following cases do not require consistency checking and if used
160 -- as a configuration pragma within a specific unit, apply only to that
161 -- unit (e.g. if used in the package spec, do not apply to the body)
163 -- Note: No_Elaboration_Code is handled specially. Like the other
164 -- non-partition-wide restrictions, it can only be set in a unit that
165 -- is part of the extended main source unit (body/spec/subunits). But
166 -- it is sticky, in that if it is found anywhere within any of these
167 -- units, it applies to all units in this extended main source.
169 Immediate_Reclamation, -- (RM H.4(10))
170 No_Implementation_Aspect_Specifications, -- Ada 2012 AI-241
171 No_Implementation_Attributes, -- Ada 2005 AI-257
172 No_Implementation_Identifiers, -- Ada 2012 AI-246
173 No_Implementation_Pragmas, -- Ada 2005 AI-257
174 No_Implementation_Restrictions, -- GNAT
175 No_Implementation_Units, -- Ada 2012 AI-242
176 No_Implicit_Aliasing, -- GNAT
177 No_Elaboration_Code, -- GNAT
178 No_Obsolescent_Features, -- Ada 2005 AI-368
179 No_Wide_Characters, -- GNAT
182 -- The following cases require a parameter value
184 No_Specification_Of_Aspect, -- 2012 (RM 13.12.1 (6.1/3))
185 No_Use_Of_Attribute, -- 2012 (RM 13.12.1 (6.2/3))
186 No_Use_Of_Pragma, -- 2012 (RM 13.12.1 (6.3/3))
188 -- The following entries are fully checked at compile/bind time, which
189 -- means that the compiler can in general tell the minimum value which
190 -- could be used with a restrictions pragma. The binder can deduce the
191 -- appropriate minimum value for the partition by taking the maximum
192 -- value required by any unit.
194 Max_Protected_Entries, -- (RM D.7(14))
195 Max_Select_Alternatives, -- (RM D.7(12))
196 Max_Task_Entries, -- (RM D.7(13), H.4(3))
198 -- The following entries are also fully checked at compile/bind time,
199 -- and the compiler can also at least in some cases tell the minimum
200 -- value which could be used with a restriction pragma. The difference
201 -- is that the contributions are additive, so the binder deduces this
202 -- value by adding the unit contributions.
204 Max_Tasks, -- (RM D.7(19), H.4(3))
206 -- The following entries are checked at compile time only for zero/
207 -- nonzero entries. This means that the compiler can tell at compile
208 -- time if a restriction value of zero is (would be) violated, but that
209 -- the compiler cannot distinguish between different non-zero values.
211 Max_Asynchronous_Select_Nesting, -- (RM D.7(18), H.4(3))
212 Max_Entry_Queue_Length, -- Ada 2012 (RM D.7 (19.1/2))
214 -- The remaining entries are not checked at compile/bind time
216 Max_Storage_At_Blocking, -- (RM D.7(17))
218 Not_A_Restriction_Id);
220 -- Synonyms permitted for historical purposes of compatibility.
221 -- Must be coordinated with Restrict.Process_Restriction_Synonym.
223 Boolean_Entry_Barriers : Restriction_Id renames Simple_Barriers;
224 Max_Entry_Queue_Depth : Restriction_Id renames Max_Entry_Queue_Length;
225 No_Dynamic_Interrupts : Restriction_Id renames No_Dynamic_Attachment;
226 No_Requeue : Restriction_Id renames No_Requeue_Statements;
227 No_Task_Attributes : Restriction_Id renames No_Task_Attributes_Package;
228 SPARK : Restriction_Id renames SPARK_05;
230 subtype All_Restrictions is Restriction_Id range
231 Simple_Barriers .. Max_Storage_At_Blocking;
232 -- All restrictions (excluding only Not_A_Restriction_Id)
234 subtype All_Boolean_Restrictions is Restriction_Id range
235 Simple_Barriers .. SPARK_05;
236 -- All restrictions which do not take a parameter
238 subtype Partition_Boolean_Restrictions is All_Boolean_Restrictions range
239 Simple_Barriers .. Static_Storage_Size;
240 -- Boolean restrictions that are checked for partition consistency.
241 -- Note that all parameter restrictions are checked for partition
242 -- consistency by default, so this distinction is only needed in the
243 -- case of Boolean restrictions.
245 subtype Cunit_Boolean_Restrictions is All_Boolean_Restrictions range
246 Immediate_Reclamation .. SPARK_05;
247 -- Boolean restrictions that are not checked for partition consistency
248 -- and that thus apply only to the current unit. Note that for these
249 -- restrictions, the compiler does not apply restrictions found in
250 -- with'ed units, parent specs etc. to the main unit, and vice versa.
252 subtype All_Parameter_Restrictions is
254 No_Specification_Of_Aspect .. Max_Storage_At_Blocking;
255 -- All restrictions that take a parameter
257 subtype Checked_Parameter_Restrictions is
258 All_Parameter_Restrictions range
259 Max_Protected_Entries .. Max_Entry_Queue_Length;
260 -- These are the parameter restrictions that can be at least partially
261 -- checked at compile/binder time. Minimally, the compiler can detect
262 -- violations of a restriction pragma with a value of zero reliably.
264 subtype Checked_Max_Parameter_Restrictions is
265 Checked_Parameter_Restrictions range
266 Max_Protected_Entries .. Max_Task_Entries;
267 -- Restrictions with parameters that can be checked in some cases by
268 -- maximizing among statically detected instances where the compiler
269 -- can determine the count.
271 subtype Checked_Add_Parameter_Restrictions is
272 Checked_Parameter_Restrictions range
273 Max_Tasks .. Max_Tasks;
274 -- Restrictions with parameters that can be checked in some cases by
275 -- summing the statically detected instances where the compiler can
276 -- determine the count.
278 subtype Checked_Val_Parameter_Restrictions is
279 Checked_Parameter_Restrictions range
280 Max_Protected_Entries .. Max_Tasks;
281 -- Restrictions with parameter where the count is known at least in some
282 -- cases by the compiler/binder.
284 subtype Checked_Zero_Parameter_Restrictions is
285 Checked_Parameter_Restrictions range
286 Max_Asynchronous_Select_Nesting .. Max_Entry_Queue_Length;
287 -- Restrictions with parameters where the compiler can detect the use of
288 -- the feature, and hence violations of a restriction specifying a value
289 -- of zero, but cannot detect specific values other than zero/nonzero.
291 subtype Unchecked_Parameter_Restrictions is
292 All_Parameter_Restrictions range
293 Max_Storage_At_Blocking .. Max_Storage_At_Blocking;
294 -- Restrictions with parameters where the compiler cannot ever detect
295 -- corresponding compile time usage, so the binder and compiler never
296 -- detect violations of any restriction.
298 -------------------------------------
299 -- Restriction Status Declarations --
300 -------------------------------------
302 -- The following declarations are used to record the current status or
303 -- restrictions (for the current unit, or related units, at compile time,
304 -- and for all units in a partition at bind time or run time).
306 type Restriction_Flags is array (All_Restrictions) of Boolean;
307 type Restriction_Values is array (All_Parameter_Restrictions) of Natural;
308 type Parameter_Flags is array (All_Parameter_Restrictions) of Boolean;
310 type Restrictions_Info is record
311 Set : Restriction_Flags;
312 -- An entry is True in the Set array if a restrictions pragma has been
313 -- encountered for the given restriction. If the value is True for a
314 -- parameter restriction, then the corresponding entry in the Value
315 -- array gives the minimum value encountered for any such restriction.
317 Value : Restriction_Values;
318 -- If the entry for a parameter restriction in Set is True (i.e. a
319 -- restrictions pragma for the restriction has been encountered), then
320 -- the corresponding entry in the Value array is the minimum value
321 -- specified by any such restrictions pragma. Note that a restrictions
322 -- pragma specifying a value greater than Int'Last is simply ignored.
324 Violated : Restriction_Flags;
325 -- An entry is True in the violations array if the compiler has detected
326 -- a violation of the restriction. For a parameter restriction, the
327 -- Count and Unknown arrays have additional information.
329 Count : Restriction_Values;
330 -- If an entry for a parameter restriction is True in Violated, the
331 -- corresponding entry in the Count array may record additional
332 -- information. If the actual minimum count is known (by taking
333 -- maximums, or sums, depending on the restriction), it will be
334 -- recorded in this array. If not, then the value will remain zero.
335 -- The value is also zero for a non-violated restriction.
337 Unknown : Parameter_Flags;
338 -- If an entry for a parameter restriction is True in Violated, the
339 -- corresponding entry in the Unknown array may record additional
340 -- information. If the actual count is not known by the compiler (but
341 -- is known to be non-zero), then the entry in Unknown will be True.
342 -- This indicates that the value in Count is not known to be exact,
343 -- and the actual violation count may be higher.
345 -- Note: If Violated (K) is True, then either Count (K) > 0 or
346 -- Unknown (K) = True. It is possible for both these to be set.
347 -- For example, if Count (K) = 3 and Unknown (K) is True, it means
348 -- that the actual violation count is at least 3 but might be higher.
351 No_Restrictions : constant Restrictions_Info :=
352 (Set => (others => False),
353 Value => (others => 0),
354 Violated => (others => False),
355 Count => (others => 0),
356 Unknown => (others => False));
357 -- Used to initialize Restrictions_Info variables
359 ----------------------------------
360 -- Profile Definitions and Data --
361 ----------------------------------
363 -- Note: to add a profile, modify the following declarations appropriately,
364 -- add Name_xxx to Snames, and add a branch to the conditions for pragmas
365 -- Profile and Profile_Warnings in the body of Sem_Prag.
369 No_Implementation_Extensions,
372 -- Names of recognized profiles. No_Profile is used to indicate that a
373 -- restriction came from pragma Restrictions[_Warning], as opposed to
374 -- pragma Profile[_Warning].
376 subtype Profile_Name_Actual is Profile_Name
377 range No_Implementation_Extensions .. Restricted;
378 -- Actual used profile names
380 type Profile_Data is record
381 Set : Restriction_Flags;
382 -- Set to True if given restriction must be set for the profile, and
383 -- False if it need not be set (False does not mean that it must not be
384 -- set, just that it need not be set). If the flag is True for a
385 -- parameter restriction, then the Value array gives the maximum value
386 -- permitted by the profile.
388 Value : Restriction_Values;
389 -- An entry in this array is meaningful only if the corresponding flag
390 -- in Set is True. In that case, the value in this array is the maximum
391 -- value of the parameter permitted by the profile.
394 Profile_Info : constant array (Profile_Name_Actual) of Profile_Data := (
396 -- No_Implementation_Extensions profile
398 No_Implementation_Extensions =>
401 (No_Implementation_Aspect_Specifications => True,
402 No_Implementation_Attributes => True,
403 No_Implementation_Identifiers => True,
404 No_Implementation_Pragmas => True,
405 No_Implementation_Units => True,
408 -- Value settings for Restricted profile (none
413 -- Restricted Profile
417 -- Restrictions for Restricted profile
420 (No_Abort_Statements => True,
421 No_Asynchronous_Control => True,
422 No_Dynamic_Attachment => True,
423 No_Dynamic_Priorities => True,
424 No_Entry_Queue => True,
425 No_Local_Protected_Objects => True,
426 No_Protected_Type_Allocators => True,
427 No_Requeue_Statements => True,
428 No_Task_Allocators => True,
429 No_Task_Attributes_Package => True,
430 No_Task_Hierarchy => True,
431 No_Terminate_Alternatives => True,
432 Max_Asynchronous_Select_Nesting => True,
433 Max_Protected_Entries => True,
434 Max_Select_Alternatives => True,
435 Max_Task_Entries => True,
438 -- Value settings for Restricted profile
441 (Max_Asynchronous_Select_Nesting => 0,
442 Max_Protected_Entries => 1,
443 Max_Select_Alternatives => 0,
444 Max_Task_Entries => 0,
449 -- Note: the table entries here only represent the
450 -- required restriction profile for Ravenscar. The
451 -- full Ravenscar profile also requires:
453 -- pragma Dispatching_Policy (FIFO_Within_Priorities);
454 -- pragma Locking_Policy (Ceiling_Locking);
455 -- pragma Detect_Blocking
459 -- Restrictions for Ravenscar = Restricted profile ..
462 (No_Abort_Statements => True,
463 No_Asynchronous_Control => True,
464 No_Dynamic_Attachment => True,
465 No_Dynamic_Priorities => True,
466 No_Entry_Queue => True,
467 No_Local_Protected_Objects => True,
468 No_Protected_Type_Allocators => True,
469 No_Requeue_Statements => True,
470 No_Task_Allocators => True,
471 No_Task_Attributes_Package => True,
472 No_Task_Hierarchy => True,
473 No_Terminate_Alternatives => True,
474 Max_Asynchronous_Select_Nesting => True,
475 Max_Protected_Entries => True,
476 Max_Select_Alternatives => True,
477 Max_Task_Entries => True,
479 -- plus these additional restrictions:
482 No_Implicit_Heap_Allocations => True,
483 No_Local_Timing_Events => True,
484 No_Relative_Delay => True,
485 No_Select_Statements => True,
486 No_Specific_Termination_Handlers => True,
487 No_Task_Termination => True,
488 Simple_Barriers => True,
491 -- Value settings for Ravenscar (same as Restricted)
494 (Max_Asynchronous_Select_Nesting => 0,
495 Max_Protected_Entries => 1,
496 Max_Select_Alternatives => 0,
497 Max_Task_Entries => 0,