author | Mario de Sousa <msousa@fe.up.pt> |
Fri, 28 Oct 2011 10:25:07 +0100 | |
changeset 385 | 450d684013dc |
parent 367 | 6d94128ba5ad |
child 386 | 606443ffd589 |
permissions | -rwxr-xr-x |
204 | 1 |
/* |
267
0a1204bcc9af
starting to add proper header file with declaration of standard functions
Mario de Sousa <msousa@fe.up.pt>
parents:
266
diff
changeset
|
2 |
* matiec - a compiler for the programming languages defined in IEC 61131-3 |
204 | 3 |
* |
267
0a1204bcc9af
starting to add proper header file with declaration of standard functions
Mario de Sousa <msousa@fe.up.pt>
parents:
266
diff
changeset
|
4 |
* Copyright (C) 2009-2011 Mario de Sousa (msousa@fe.up.pt) |
279
c0453b7f99df
Re-generated std lib related code, with updated headers, updated all forgotten headers
Edouard Tisserant
parents:
273
diff
changeset
|
5 |
* Copyright (C) 2007-2011 Laurent Bessard and Edouard Tisserant |
204 | 6 |
* |
267
0a1204bcc9af
starting to add proper header file with declaration of standard functions
Mario de Sousa <msousa@fe.up.pt>
parents:
266
diff
changeset
|
7 |
* This program is free software: you can redistribute it and/or modify |
0a1204bcc9af
starting to add proper header file with declaration of standard functions
Mario de Sousa <msousa@fe.up.pt>
parents:
266
diff
changeset
|
8 |
* it under the terms of the GNU General Public License as published by |
0a1204bcc9af
starting to add proper header file with declaration of standard functions
Mario de Sousa <msousa@fe.up.pt>
parents:
266
diff
changeset
|
9 |
* the Free Software Foundation, either version 3 of the License, or |
0a1204bcc9af
starting to add proper header file with declaration of standard functions
Mario de Sousa <msousa@fe.up.pt>
parents:
266
diff
changeset
|
10 |
* (at your option) any later version. |
0a1204bcc9af
starting to add proper header file with declaration of standard functions
Mario de Sousa <msousa@fe.up.pt>
parents:
266
diff
changeset
|
11 |
* |
0a1204bcc9af
starting to add proper header file with declaration of standard functions
Mario de Sousa <msousa@fe.up.pt>
parents:
266
diff
changeset
|
12 |
* This program is distributed in the hope that it will be useful, |
0a1204bcc9af
starting to add proper header file with declaration of standard functions
Mario de Sousa <msousa@fe.up.pt>
parents:
266
diff
changeset
|
13 |
* but WITHOUT ANY WARRANTY; without even the implied warranty of |
0a1204bcc9af
starting to add proper header file with declaration of standard functions
Mario de Sousa <msousa@fe.up.pt>
parents:
266
diff
changeset
|
14 |
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
0a1204bcc9af
starting to add proper header file with declaration of standard functions
Mario de Sousa <msousa@fe.up.pt>
parents:
266
diff
changeset
|
15 |
* GNU General Public License for more details. |
0a1204bcc9af
starting to add proper header file with declaration of standard functions
Mario de Sousa <msousa@fe.up.pt>
parents:
266
diff
changeset
|
16 |
* |
0a1204bcc9af
starting to add proper header file with declaration of standard functions
Mario de Sousa <msousa@fe.up.pt>
parents:
266
diff
changeset
|
17 |
* You should have received a copy of the GNU General Public License |
0a1204bcc9af
starting to add proper header file with declaration of standard functions
Mario de Sousa <msousa@fe.up.pt>
parents:
266
diff
changeset
|
18 |
* along with this program. If not, see <http://www.gnu.org/licenses/>. |
0a1204bcc9af
starting to add proper header file with declaration of standard functions
Mario de Sousa <msousa@fe.up.pt>
parents:
266
diff
changeset
|
19 |
* |
204 | 20 |
* |
21 |
* This code is made available on the understanding that it will not be |
|
22 |
* used in safety-critical situations without a full and competent review. |
|
23 |
*/ |
|
24 |
||
25 |
/* |
|
267
0a1204bcc9af
starting to add proper header file with declaration of standard functions
Mario de Sousa <msousa@fe.up.pt>
parents:
266
diff
changeset
|
26 |
* An IEC 61131-3 compiler. |
204 | 27 |
* |
28 |
* Based on the |
|
29 |
* FINAL DRAFT - IEC 61131-3, 2nd Ed. (2001-12-10) |
|
30 |
* |
|
31 |
*/ |
|
32 |
||
33 |
||
34 |
/* Verify whether the semantic rules of data type compatibility are being followed. |
|
35 |
* |
|
36 |
* For example: |
|
37 |
*/ |
|
38 |
||
39 |
#include "visit_expression_type.hh" |
|
40 |
#include <typeinfo> |
|
41 |
#include <list> |
|
42 |
#include <string> |
|
43 |
#include <string.h> |
|
44 |
#include <strings.h> |
|
45 |
||
46 |
||
287
9df7fcb9bde5
Added tracking of order by which tokens are processed by lexical analyser.
Mario de Sousa <msousa@fe.up.pt>
parents:
286
diff
changeset
|
47 |
#define FIRST_(symbol1, symbol2) (((symbol1)->first_order < (symbol2)->first_order) ? (symbol1) : (symbol2)) |
9df7fcb9bde5
Added tracking of order by which tokens are processed by lexical analyser.
Mario de Sousa <msousa@fe.up.pt>
parents:
286
diff
changeset
|
48 |
#define LAST_(symbol1, symbol2) (((symbol1)->last_order > (symbol2)->last_order) ? (symbol1) : (symbol2)) |
204 | 49 |
|
323 | 50 |
#define STAGE3_ERROR(symbol1, symbol2, ...) { \ |
51 |
fprintf(stderr, "%s:%d-%d..%d-%d: error : ", \ |
|
286
a4f4990d5c66
Adding tracking of filename in which token is located.
Mario de Sousa <msousa@fe.up.pt>
parents:
284
diff
changeset
|
52 |
FIRST_(symbol1,symbol2)->first_file, FIRST_(symbol1,symbol2)->first_line, FIRST_(symbol1,symbol2)->first_column, \ |
323 | 53 |
LAST_(symbol1,symbol2) ->last_line, LAST_(symbol1,symbol2) ->last_column); \ |
54 |
fprintf(stderr, __VA_ARGS__); \ |
|
55 |
fprintf(stderr, "\n"); \ |
|
204 | 56 |
il_error = true; \ |
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
57 |
error_found = true; \ |
204 | 58 |
} |
59 |
||
60 |
||
259
b6d7c71ff6d8
Adding debug conditional printf()s in stage 3.
Mario de Sousa <msousa@fe.up.pt>
parents:
258
diff
changeset
|
61 |
/* set to 1 to see debug info during execution */ |
b6d7c71ff6d8
Adding debug conditional printf()s in stage 3.
Mario de Sousa <msousa@fe.up.pt>
parents:
258
diff
changeset
|
62 |
static int debug = 0; |
204 | 63 |
|
64 |
||
65 |
void *visit_expression_type_c::visit(program_declaration_c *symbol) { |
|
66 |
search_varfb_instance_type = new search_varfb_instance_type_c(symbol); |
|
67 |
symbol->var_declarations->accept(*this); |
|
259
b6d7c71ff6d8
Adding debug conditional printf()s in stage 3.
Mario de Sousa <msousa@fe.up.pt>
parents:
258
diff
changeset
|
68 |
if (debug) printf("checking semantics in body of program %s\n", ((token_c *)(symbol->program_type_name))->value); |
204 | 69 |
il_parenthesis_level = 0; |
70 |
il_error = false; |
|
71 |
il_default_variable_type = NULL; |
|
72 |
symbol->function_block_body->accept(*this); |
|
73 |
il_default_variable_type = NULL; |
|
74 |
delete search_varfb_instance_type; |
|
257 | 75 |
search_varfb_instance_type = NULL; |
204 | 76 |
return NULL; |
77 |
} |
|
78 |
||
79 |
void *visit_expression_type_c::visit(function_declaration_c *symbol) { |
|
80 |
search_varfb_instance_type = new search_varfb_instance_type_c(symbol); |
|
81 |
symbol->var_declarations_list->accept(*this); |
|
259
b6d7c71ff6d8
Adding debug conditional printf()s in stage 3.
Mario de Sousa <msousa@fe.up.pt>
parents:
258
diff
changeset
|
82 |
if (debug) printf("checking semantics in body of function %s\n", ((token_c *)(symbol->derived_function_name))->value); |
204 | 83 |
il_parenthesis_level = 0; |
84 |
il_error = false; |
|
85 |
il_default_variable_type = NULL; |
|
86 |
symbol->function_body->accept(*this); |
|
87 |
il_default_variable_type = NULL; |
|
88 |
delete search_varfb_instance_type; |
|
257 | 89 |
search_varfb_instance_type = NULL; |
204 | 90 |
return NULL; |
91 |
} |
|
92 |
||
93 |
void *visit_expression_type_c::visit(function_block_declaration_c *symbol) { |
|
94 |
search_varfb_instance_type = new search_varfb_instance_type_c(symbol); |
|
95 |
symbol->var_declarations->accept(*this); |
|
259
b6d7c71ff6d8
Adding debug conditional printf()s in stage 3.
Mario de Sousa <msousa@fe.up.pt>
parents:
258
diff
changeset
|
96 |
if (debug) printf("checking semantics in body of FB %s\n", ((token_c *)(symbol->fblock_name))->value); |
204 | 97 |
il_parenthesis_level = 0; |
98 |
il_error = false; |
|
99 |
il_default_variable_type = NULL; |
|
100 |
symbol->fblock_body->accept(*this); |
|
101 |
il_default_variable_type = NULL; |
|
102 |
delete search_varfb_instance_type; |
|
257 | 103 |
search_varfb_instance_type = NULL; |
204 | 104 |
return NULL; |
105 |
} |
|
106 |
||
107 |
||
108 |
||
109 |
||
110 |
||
111 |
||
112 |
||
113 |
||
114 |
||
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
115 |
visit_expression_type_c::visit_expression_type_c(symbol_c *ignore) { |
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
116 |
error_found = false; |
204 | 117 |
} |
118 |
||
119 |
visit_expression_type_c::~visit_expression_type_c(void) { |
|
120 |
} |
|
121 |
||
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
122 |
bool visit_expression_type_c::get_error_found(void) { |
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
123 |
return error_found; |
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
124 |
} |
204 | 125 |
|
257 | 126 |
|
127 |
||
128 |
/* NOTE on data type handling and literals... |
|
129 |
* ========================================== |
|
130 |
* |
|
131 |
* Literals that are explicitly type cast |
|
132 |
* e.g.: BYTE#42 |
|
133 |
* INT#65 |
|
134 |
* TIME#45h23m |
|
135 |
* etc... |
|
136 |
* are NOT considered literals in the following code. |
|
137 |
* Since they are type cast, and their data type is fixed and well known, |
|
138 |
* they are treated as a variable of that data type (except when determining lvalues) |
|
139 |
* In other words, when calling search_constant_type_c on these constants, it returns |
|
140 |
* a xxxxx_type_name_c, and not one of the xxxx_literal_c ! |
|
141 |
* |
|
142 |
* When the following code handles a literal, it is really a literal of unknown data type. |
|
143 |
* e.g. 42, may be considered an int, a byte, a word, etc... |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
144 |
* |
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
145 |
* NOTE: type_symbol == NULL is valid! |
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
146 |
* This will occur, for example, when and undefined/undeclared symbolic_variable is used in the program. |
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
147 |
* This will not be of any type, so we always return false. |
257 | 148 |
*/ |
149 |
||
204 | 150 |
/* A helper function... */ |
151 |
bool visit_expression_type_c::is_ANY_ELEMENTARY_type(symbol_c *type_symbol) { |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
152 |
if (type_symbol == NULL) {return false;} |
204 | 153 |
return is_ANY_MAGNITUDE_type(type_symbol) |
257 | 154 |
|| is_ANY_BIT_type (type_symbol) |
155 |
|| is_ANY_STRING_type (type_symbol) |
|
156 |
|| is_ANY_DATE_type (type_symbol); |
|
157 |
} |
|
158 |
||
159 |
/* A helper function... */ |
|
160 |
bool visit_expression_type_c::is_ANY_SAFEELEMENTARY_type(symbol_c *type_symbol) { |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
161 |
if (type_symbol == NULL) {return false;} |
257 | 162 |
return is_ANY_SAFEMAGNITUDE_type(type_symbol) |
163 |
|| is_ANY_SAFEBIT_type (type_symbol) |
|
164 |
|| is_ANY_SAFESTRING_type (type_symbol) |
|
165 |
|| is_ANY_SAFEDATE_type (type_symbol); |
|
166 |
} |
|
167 |
||
168 |
/* A helper function... */ |
|
169 |
bool visit_expression_type_c::is_ANY_ELEMENTARY_compatible(symbol_c *type_symbol) { |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
170 |
if (type_symbol == NULL) {return false;} |
257 | 171 |
/* NOTE: doing |
172 |
* return is_ANY_SAFEELEMENTARY_type() || is_ANY_ELEMENTARY_type() |
|
173 |
* is incorrect, as the literals would never be considered compatible... |
|
174 |
*/ |
|
175 |
return is_ANY_MAGNITUDE_compatible(type_symbol) |
|
176 |
|| is_ANY_BIT_compatible (type_symbol) |
|
177 |
|| is_ANY_STRING_compatible (type_symbol) |
|
178 |
|| is_ANY_DATE_compatible (type_symbol); |
|
204 | 179 |
} |
180 |
||
181 |
||
182 |
/* A helper function... */ |
|
183 |
bool visit_expression_type_c::is_ANY_MAGNITUDE_type(symbol_c *type_symbol) { |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
184 |
if (type_symbol == NULL) {return false;} |
204 | 185 |
if (typeid(*type_symbol) == typeid(time_type_name_c)) {return true;} |
186 |
return is_ANY_NUM_type(type_symbol); |
|
187 |
} |
|
188 |
||
257 | 189 |
/* A helper function... */ |
190 |
bool visit_expression_type_c::is_ANY_SAFEMAGNITUDE_type(symbol_c *type_symbol) { |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
191 |
if (type_symbol == NULL) {return false;} |
257 | 192 |
if (typeid(*type_symbol) == typeid(safetime_type_name_c)) {return true;} |
193 |
return is_ANY_SAFENUM_type(type_symbol); |
|
194 |
} |
|
195 |
||
196 |
/* A helper function... */ |
|
197 |
bool visit_expression_type_c::is_ANY_MAGNITUDE_compatible(symbol_c *type_symbol) { |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
198 |
if (type_symbol == NULL) {return false;} |
257 | 199 |
if (is_ANY_MAGNITUDE_type (type_symbol)) {return true;} |
200 |
if (is_ANY_SAFEMAGNITUDE_type(type_symbol)) {return true;} |
|
201 |
||
202 |
return is_ANY_NUM_compatible(type_symbol); |
|
203 |
} |
|
204 | 204 |
|
205 |
/* A helper function... */ |
|
206 |
bool visit_expression_type_c::is_ANY_NUM_type(symbol_c *type_symbol) { |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
207 |
if (type_symbol == NULL) {return false;} |
257 | 208 |
if (is_ANY_REAL_type(type_symbol)) {return true;} |
209 |
if (is_ANY_INT_type(type_symbol)) {return true;} |
|
210 |
return false; |
|
211 |
} |
|
212 |
||
213 |
/* A helper function... */ |
|
214 |
bool visit_expression_type_c::is_ANY_SAFENUM_type(symbol_c *type_symbol) { |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
215 |
if (type_symbol == NULL) {return false;} |
257 | 216 |
return is_ANY_SAFEREAL_type(type_symbol) |
217 |
|| is_ANY_SAFEINT_type (type_symbol); |
|
218 |
} |
|
219 |
||
220 |
/* A helper function... */ |
|
221 |
bool visit_expression_type_c::is_ANY_NUM_compatible(symbol_c *type_symbol) { |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
222 |
if (type_symbol == NULL) {return false;} |
257 | 223 |
if (is_ANY_REAL_compatible(type_symbol)) {return true;} |
224 |
if (is_ANY_INT_compatible(type_symbol)) {return true;} |
|
225 |
return false; |
|
226 |
} |
|
204 | 227 |
|
228 |
/* A helper function... */ |
|
229 |
bool visit_expression_type_c::is_ANY_DATE_type(symbol_c *type_symbol) { |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
230 |
if (type_symbol == NULL) {return false;} |
204 | 231 |
if (typeid(*type_symbol) == typeid(date_type_name_c)) {return true;} |
257 | 232 |
if (typeid(*type_symbol) == typeid(tod_type_name_c)) {return true;} |
233 |
if (typeid(*type_symbol) == typeid(dt_type_name_c)) {return true;} |
|
204 | 234 |
return false; |
235 |
} |
|
236 |
||
257 | 237 |
/* A helper function... */ |
238 |
bool visit_expression_type_c::is_ANY_SAFEDATE_type(symbol_c *type_symbol) { |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
239 |
if (type_symbol == NULL) {return false;} |
257 | 240 |
if (typeid(*type_symbol) == typeid(safedate_type_name_c)) {return true;} |
241 |
if (typeid(*type_symbol) == typeid(safetod_type_name_c)) {return true;} |
|
242 |
if (typeid(*type_symbol) == typeid(safedt_type_name_c)) {return true;} |
|
243 |
return false; |
|
244 |
} |
|
245 |
||
246 |
/* A helper function... */ |
|
247 |
bool visit_expression_type_c::is_ANY_DATE_compatible(symbol_c *type_symbol) { |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
248 |
if (type_symbol == NULL) {return false;} |
257 | 249 |
if (is_ANY_DATE_type (type_symbol)) {return true;} |
250 |
if (is_ANY_SAFEDATE_type(type_symbol)) {return true;} |
|
251 |
return false; |
|
252 |
} |
|
204 | 253 |
|
254 |
/* A helper function... */ |
|
255 |
bool visit_expression_type_c::is_ANY_STRING_type(symbol_c *type_symbol) { |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
256 |
if (type_symbol == NULL) {return false;} |
204 | 257 |
if (typeid(*type_symbol) == typeid(string_type_name_c)) {return true;} |
258 |
if (typeid(*type_symbol) == typeid(wstring_type_name_c)) {return true;} |
|
257 | 259 |
// TODO literal_string ??? |
204 | 260 |
return false; |
261 |
} |
|
262 |
||
257 | 263 |
/* A helper function... */ |
264 |
bool visit_expression_type_c::is_ANY_SAFESTRING_type(symbol_c *type_symbol) { |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
265 |
if (type_symbol == NULL) {return false;} |
257 | 266 |
if (typeid(*type_symbol) == typeid(safestring_type_name_c)) {return true;} |
267 |
if (typeid(*type_symbol) == typeid(safewstring_type_name_c)) {return true;} |
|
268 |
return false; |
|
269 |
} |
|
270 |
||
271 |
/* A helper function... */ |
|
272 |
bool visit_expression_type_c::is_ANY_STRING_compatible(symbol_c *type_symbol) { |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
273 |
if (type_symbol == NULL) {return false;} |
257 | 274 |
if (is_ANY_STRING_type (type_symbol)) {return true;} |
275 |
if (is_ANY_SAFESTRING_type(type_symbol)) {return true;} |
|
276 |
return false; |
|
277 |
} |
|
204 | 278 |
|
279 |
/* A helper function... */ |
|
280 |
bool visit_expression_type_c::is_ANY_INT_type(symbol_c *type_symbol) { |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
281 |
if (type_symbol == NULL) {return false;} |
204 | 282 |
if (typeid(*type_symbol) == typeid(sint_type_name_c)) {return true;} |
283 |
if (typeid(*type_symbol) == typeid(int_type_name_c)) {return true;} |
|
284 |
if (typeid(*type_symbol) == typeid(dint_type_name_c)) {return true;} |
|
285 |
if (typeid(*type_symbol) == typeid(lint_type_name_c)) {return true;} |
|
286 |
if (typeid(*type_symbol) == typeid(usint_type_name_c)) {return true;} |
|
287 |
if (typeid(*type_symbol) == typeid(uint_type_name_c)) {return true;} |
|
288 |
if (typeid(*type_symbol) == typeid(udint_type_name_c)) {return true;} |
|
289 |
if (typeid(*type_symbol) == typeid(ulint_type_name_c)) {return true;} |
|
290 |
return false; |
|
291 |
} |
|
292 |
||
257 | 293 |
/* A helper function... */ |
294 |
bool visit_expression_type_c::is_ANY_SAFEINT_type(symbol_c *type_symbol) { |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
295 |
if (type_symbol == NULL) {return false;} |
257 | 296 |
if (typeid(*type_symbol) == typeid(safesint_type_name_c)) {return true;} |
297 |
if (typeid(*type_symbol) == typeid(safeint_type_name_c)) {return true;} |
|
298 |
if (typeid(*type_symbol) == typeid(safedint_type_name_c)) {return true;} |
|
299 |
if (typeid(*type_symbol) == typeid(safelint_type_name_c)) {return true;} |
|
300 |
if (typeid(*type_symbol) == typeid(safeusint_type_name_c)) {return true;} |
|
301 |
if (typeid(*type_symbol) == typeid(safeuint_type_name_c)) {return true;} |
|
302 |
if (typeid(*type_symbol) == typeid(safeudint_type_name_c)) {return true;} |
|
303 |
if (typeid(*type_symbol) == typeid(safeulint_type_name_c)) {return true;} |
|
304 |
return false; |
|
305 |
} |
|
306 |
||
307 |
/* A helper function... */ |
|
308 |
bool visit_expression_type_c::is_ANY_INT_compatible(symbol_c *type_symbol) { |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
309 |
if (type_symbol == NULL) {return false;} |
257 | 310 |
if (is_ANY_INT_type (type_symbol)) {return true;} |
311 |
if (is_ANY_SAFEINT_type(type_symbol)) {return true;} |
|
312 |
if (is_literal_integer_type(type_symbol)) {return true;} |
|
313 |
return false; |
|
314 |
} |
|
204 | 315 |
|
316 |
/* A helper function... */ |
|
317 |
bool visit_expression_type_c::is_ANY_REAL_type(symbol_c *type_symbol) { |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
318 |
if (type_symbol == NULL) {return false;} |
204 | 319 |
if (typeid(*type_symbol) == typeid(real_type_name_c)) {return true;} |
320 |
if (typeid(*type_symbol) == typeid(lreal_type_name_c)) {return true;} |
|
321 |
return false; |
|
322 |
} |
|
323 |
||
257 | 324 |
/* A helper function... */ |
325 |
bool visit_expression_type_c::is_ANY_SAFEREAL_type(symbol_c *type_symbol) { |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
326 |
if (type_symbol == NULL) {return false;} |
257 | 327 |
if (typeid(*type_symbol) == typeid(safereal_type_name_c)) {return true;} |
328 |
if (typeid(*type_symbol) == typeid(safelreal_type_name_c)) {return true;} |
|
329 |
return false; |
|
330 |
} |
|
331 |
||
332 |
/* A helper function... */ |
|
333 |
bool visit_expression_type_c::is_ANY_REAL_compatible(symbol_c *type_symbol) { |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
334 |
if (type_symbol == NULL) {return false;} |
257 | 335 |
if (is_ANY_REAL_type (type_symbol)) {return true;} |
336 |
if (is_ANY_SAFEREAL_type(type_symbol)) {return true;} |
|
337 |
if (is_literal_real_type(type_symbol)) {return true;} |
|
338 |
return false; |
|
339 |
} |
|
204 | 340 |
|
341 |
/* A helper function... */ |
|
342 |
bool visit_expression_type_c::is_ANY_BIT_type(symbol_c *type_symbol) { |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
343 |
if (type_symbol == NULL) {return false;} |
257 | 344 |
if (typeid(*type_symbol) == typeid(bool_type_name_c)) {return true;} |
345 |
if (typeid(*type_symbol) == typeid(byte_type_name_c)) {return true;} |
|
346 |
if (typeid(*type_symbol) == typeid(word_type_name_c)) {return true;} |
|
347 |
if (typeid(*type_symbol) == typeid(dword_type_name_c)) {return true;} |
|
348 |
if (typeid(*type_symbol) == typeid(lword_type_name_c)) {return true;} |
|
204 | 349 |
return false; |
350 |
} |
|
351 |
||
257 | 352 |
/* A helper function... */ |
353 |
bool visit_expression_type_c::is_ANY_SAFEBIT_type(symbol_c *type_symbol) { |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
354 |
if (type_symbol == NULL) {return false;} |
257 | 355 |
if (typeid(*type_symbol) == typeid(safebool_type_name_c)) {return true;} |
356 |
if (typeid(*type_symbol) == typeid(safebyte_type_name_c)) {return true;} |
|
357 |
if (typeid(*type_symbol) == typeid(safeword_type_name_c)) {return true;} |
|
358 |
if (typeid(*type_symbol) == typeid(safedword_type_name_c)) {return true;} |
|
359 |
if (typeid(*type_symbol) == typeid(safelword_type_name_c)) {return true;} |
|
360 |
return false; |
|
361 |
} |
|
362 |
||
363 |
/* A helper function... */ |
|
364 |
bool visit_expression_type_c::is_ANY_BIT_compatible(symbol_c *type_symbol) { |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
365 |
if (type_symbol == NULL) {return false;} |
257 | 366 |
if (is_ANY_BIT_type (type_symbol)) {return true;} |
367 |
if (is_ANY_SAFEBIT_type(type_symbol)) {return true;} |
|
368 |
if (is_nonneg_literal_integer_type(type_symbol)) {return true;} |
|
369 |
if (is_literal_bool_type(type_symbol)) {return true;} |
|
370 |
return false; |
|
371 |
} |
|
204 | 372 |
|
373 |
/* A helper function... */ |
|
374 |
bool visit_expression_type_c::is_BOOL_type(symbol_c *type_symbol) { |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
375 |
if (type_symbol == NULL) {return false;} |
257 | 376 |
if (typeid(*type_symbol) == typeid(bool_type_name_c)) {return true;} |
204 | 377 |
return false; |
378 |
} |
|
379 |
||
257 | 380 |
/* A helper function... */ |
381 |
bool visit_expression_type_c::is_SAFEBOOL_type(symbol_c *type_symbol){ |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
382 |
if (type_symbol == NULL) {return false;} |
257 | 383 |
if (typeid(*type_symbol) == typeid(safebool_type_name_c)) {return true;} |
384 |
return false; |
|
385 |
} |
|
386 |
||
387 |
/* A helper function... */ |
|
388 |
bool visit_expression_type_c::is_ANY_BOOL_compatible(symbol_c *type_symbol) { |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
389 |
if (type_symbol == NULL) {return false;} |
257 | 390 |
if (is_BOOL_type (type_symbol)) {return true;} |
391 |
if (is_SAFEBOOL_type(type_symbol)) {return true;} |
|
392 |
if (is_literal_bool_type(type_symbol)) {return true;} |
|
393 |
return false; |
|
394 |
} |
|
395 |
||
396 |
||
333
b495a49f5038
Fix bug when trying to find the type of a NULL symbol
laurent
parents:
331
diff
changeset
|
397 |
#define is_type(type_name_symbol, type_name_class) ((type_name_symbol == NULL) ? false : (typeid(*type_name_symbol) == typeid(type_name_class))) |
257 | 398 |
|
204 | 399 |
|
400 |
#define sizeoftype(symbol) get_sizeof_datatype_c::getsize(symbol) |
|
401 |
||
402 |
||
403 |
/* A helper function... */ |
|
404 |
bool visit_expression_type_c::is_literal_integer_type(symbol_c *type_symbol) { |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
405 |
if (type_symbol == NULL) {return false;} |
257 | 406 |
if (typeid(*type_symbol) == typeid(neg_integer_c)) {return true;} |
407 |
return is_nonneg_literal_integer_type(type_symbol); |
|
408 |
} |
|
409 |
||
410 |
||
411 |
/* A helper function... */ |
|
412 |
bool visit_expression_type_c::is_nonneg_literal_integer_type(symbol_c *type_symbol) { |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
413 |
if (type_symbol == NULL) {return false;} |
204 | 414 |
if (typeid(*type_symbol) == typeid(integer_c)) {return true;} |
415 |
if (typeid(*type_symbol) == typeid(binary_integer_c)) {return true;} |
|
416 |
if (typeid(*type_symbol) == typeid(octal_integer_c)) {return true;} |
|
417 |
if (typeid(*type_symbol) == typeid(hex_integer_c)) {return true;} |
|
418 |
return false; |
|
419 |
} |
|
420 |
||
421 |
||
422 |
/* A helper function... */ |
|
423 |
bool visit_expression_type_c::is_literal_real_type(symbol_c *type_symbol) { |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
424 |
if (type_symbol == NULL) {return false;} |
257 | 425 |
if (typeid(*type_symbol) == typeid(real_c)) {return true;} |
426 |
if (typeid(*type_symbol) == typeid(neg_real_c)) {return true;} |
|
204 | 427 |
return false; |
428 |
} |
|
429 |
||
430 |
||
431 |
/* A helper function... */ |
|
432 |
bool visit_expression_type_c::is_literal_bool_type(symbol_c *type_symbol) { |
|
433 |
bool_type_name_c bool_t; |
|
434 |
||
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
435 |
if (type_symbol == NULL) {return false;} |
204 | 436 |
if (typeid(*type_symbol) == typeid(boolean_true_c)) {return true;} |
437 |
if (typeid(*type_symbol) == typeid(boolean_false_c)) {return true;} |
|
257 | 438 |
if (is_nonneg_literal_integer_type(type_symbol)) |
204 | 439 |
if (sizeoftype(&bool_t) >= sizeoftype(type_symbol)) {return true;} |
440 |
return false; |
|
441 |
} |
|
442 |
||
443 |
/* Determine the common data type between two data types. |
|
444 |
* If no common data type found, return NULL. |
|
445 |
* |
|
446 |
* If data types are identical, return the first (actually any would do...). |
|
447 |
* If any of the data types is a literal, we confirm that |
|
448 |
* the literal uses less bits than the fixed size data type. |
|
449 |
* e.g. BYTE and 1024 returns NULL |
|
450 |
* BYTE and 255 returns BYTE |
|
451 |
* |
|
452 |
* If two literals, then return the literal that requires more bits... |
|
453 |
*/ |
|
257 | 454 |
|
204 | 455 |
symbol_c *visit_expression_type_c::common_type__(symbol_c *first_type, symbol_c *second_type) { |
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
456 |
if (first_type == NULL && second_type == NULL) {return NULL;} |
204 | 457 |
if (first_type == NULL) {return second_type;} |
458 |
if (second_type == NULL) {return first_type;} |
|
459 |
||
460 |
if (is_literal_integer_type(first_type) && is_literal_integer_type(second_type)) |
|
461 |
{return ((sizeoftype(first_type) > sizeoftype(second_type))? first_type:second_type);} |
|
462 |
||
463 |
if (is_literal_real_type(first_type) && is_literal_real_type(second_type)) |
|
464 |
{return ((sizeoftype(first_type) > sizeoftype(second_type))? first_type:second_type);} |
|
465 |
||
466 |
if (is_literal_bool_type(first_type) && is_literal_bool_type(second_type)) |
|
467 |
{return first_type;} |
|
468 |
||
257 | 469 |
/* The following check can only be made after the is_literal_XXXX checks */ |
204 | 470 |
/* When two literals of the same type, with identical typeid's are checked, |
257 | 471 |
* we must return the one that occupies more bits... This is done above. |
204 | 472 |
*/ |
473 |
if (typeid(*first_type) == typeid(*second_type)) {return first_type;} |
|
474 |
||
257 | 475 |
/* NOTE Although a BOOL is also an ANY_BIT, we must check it explicitly since some |
476 |
* literal bool values are not literal integers... |
|
477 |
*/ |
|
478 |
if (is_BOOL_type(first_type) && is_literal_bool_type(second_type)) {return first_type;} |
|
479 |
if (is_BOOL_type(second_type) && is_literal_bool_type(first_type)) {return second_type;} |
|
480 |
||
481 |
if (is_SAFEBOOL_type(first_type) && is_literal_bool_type(second_type)) {return first_type;} |
|
482 |
if (is_SAFEBOOL_type(second_type) && is_literal_bool_type(first_type)) {return second_type;} |
|
483 |
||
484 |
if (is_SAFEBOOL_type(first_type) && is_BOOL_type(second_type)) {return second_type;} |
|
485 |
if (is_SAFEBOOL_type(second_type) && is_BOOL_type(first_type)) {return first_type;} |
|
486 |
||
487 |
if (is_ANY_BIT_type(first_type) && is_nonneg_literal_integer_type(second_type)) |
|
204 | 488 |
{return ((sizeoftype(first_type) >= sizeoftype(second_type))? first_type :NULL);} |
257 | 489 |
if (is_ANY_BIT_type(second_type) && is_nonneg_literal_integer_type(first_type)) |
204 | 490 |
{return ((sizeoftype(second_type) >= sizeoftype(first_type)) ? second_type:NULL);} |
491 |
||
257 | 492 |
if (is_ANY_SAFEBIT_type(first_type) && is_nonneg_literal_integer_type(second_type)) |
204 | 493 |
{return ((sizeoftype(first_type) >= sizeoftype(second_type))? first_type :NULL);} |
257 | 494 |
if (is_ANY_SAFEBIT_type(second_type) && is_nonneg_literal_integer_type(first_type)) |
204 | 495 |
{return ((sizeoftype(second_type) >= sizeoftype(first_type)) ? second_type:NULL);} |
496 |
||
257 | 497 |
if (is_ANY_SAFEBIT_type(first_type) && is_ANY_BIT_type(second_type)) |
498 |
{return ((sizeoftype(first_type) == sizeoftype(second_type))? second_type:NULL);} |
|
499 |
if (is_ANY_SAFEBIT_type(second_type) && is_ANY_BIT_type(first_type)) |
|
500 |
{return ((sizeoftype(first_type) == sizeoftype(second_type))? first_type :NULL);} |
|
501 |
||
502 |
if (is_ANY_INT_type(first_type) && is_literal_integer_type(second_type)) |
|
204 | 503 |
{return ((sizeoftype(first_type) >= sizeoftype(second_type))? first_type :NULL);} |
257 | 504 |
if (is_ANY_INT_type(second_type) && is_literal_integer_type(first_type)) |
204 | 505 |
{return ((sizeoftype(second_type) >= sizeoftype(first_type)) ? second_type:NULL);} |
506 |
||
257 | 507 |
if (is_ANY_SAFEINT_type(first_type) && is_literal_integer_type(second_type)) |
508 |
{return ((sizeoftype(first_type) >= sizeoftype(second_type))? first_type :NULL);} |
|
509 |
if (is_ANY_SAFEINT_type(second_type) && is_literal_integer_type(first_type)) |
|
510 |
{return ((sizeoftype(second_type) >= sizeoftype(first_type)) ? second_type:NULL);} |
|
511 |
||
512 |
if (is_ANY_SAFEINT_type(first_type) && is_ANY_INT_type(second_type)) |
|
513 |
{return ((sizeoftype(first_type) == sizeoftype(second_type))? second_type:NULL);} |
|
514 |
if (is_ANY_SAFEINT_type(second_type) && is_ANY_INT_type(first_type)) |
|
515 |
{return ((sizeoftype(first_type) == sizeoftype(second_type))? first_type :NULL);} |
|
516 |
||
517 |
if (is_ANY_REAL_type(first_type) && is_literal_real_type(second_type)) |
|
518 |
{return ((sizeoftype(first_type) >= sizeoftype(second_type))? first_type :NULL);} |
|
519 |
if (is_ANY_REAL_type(second_type) && is_literal_real_type(first_type)) |
|
520 |
{return ((sizeoftype(second_type) >= sizeoftype(first_type)) ? second_type:NULL);} |
|
521 |
||
522 |
if (is_ANY_SAFEREAL_type(first_type) && is_literal_real_type(second_type)) |
|
523 |
{return ((sizeoftype(first_type) >= sizeoftype(second_type))? first_type :NULL);} |
|
524 |
if (is_ANY_SAFEREAL_type(second_type) && is_literal_real_type(first_type)) |
|
525 |
{return ((sizeoftype(second_type) >= sizeoftype(first_type)) ? second_type:NULL);} |
|
526 |
||
527 |
if (is_ANY_SAFEREAL_type(first_type) && is_ANY_REAL_type(second_type)) |
|
528 |
{return ((sizeoftype(first_type) == sizeoftype(second_type))? second_type:NULL);} |
|
529 |
if (is_ANY_SAFEREAL_type(second_type) && is_ANY_REAL_type(first_type)) |
|
530 |
{return ((sizeoftype(first_type) == sizeoftype(second_type))? first_type :NULL);} |
|
531 |
||
532 |
/* the Time and Date types... */ |
|
533 |
if (is_type(first_type, safetime_type_name_c) && is_type(second_type, time_type_name_c)) {return second_type;} |
|
534 |
if (is_type(second_type, safetime_type_name_c) && is_type( first_type, time_type_name_c)) {return first_type;} |
|
535 |
||
536 |
if (is_type(first_type, safedate_type_name_c) && is_type(second_type, date_type_name_c)) {return second_type;} |
|
537 |
if (is_type(second_type, safedate_type_name_c) && is_type( first_type, date_type_name_c)) {return first_type;} |
|
538 |
||
539 |
if (is_type(first_type, safedt_type_name_c) && is_type(second_type, dt_type_name_c)) {return second_type;} |
|
540 |
if (is_type(second_type, safedt_type_name_c) && is_type( first_type, dt_type_name_c)) {return first_type;} |
|
541 |
||
542 |
if (is_type(first_type, safetod_type_name_c) && is_type(second_type, tod_type_name_c)) {return second_type;} |
|
543 |
if (is_type(second_type, safetod_type_name_c) && is_type( first_type, tod_type_name_c)) {return first_type;} |
|
544 |
||
204 | 545 |
/* no common type */ |
546 |
return NULL; |
|
547 |
} |
|
548 |
||
549 |
/* Determine the common data type between two data types. |
|
550 |
* Unlike the common_type__() function, we stop the compiler with an ERROR |
|
551 |
* if no common data type is found. |
|
552 |
*/ |
|
553 |
symbol_c *visit_expression_type_c::common_type(symbol_c *first_type, symbol_c *second_type) { |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
554 |
/* |
204 | 555 |
symbol_c *res = common_type__(first_type, second_type); |
556 |
if (NULL == res) ERROR; |
|
557 |
return res; |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
558 |
*/ |
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
559 |
return common_type__(first_type, second_type); |
204 | 560 |
} |
561 |
||
562 |
||
257 | 563 |
/* Return TRUE if the second (value) data type may be assigned to a variable of the first (variable) data type |
564 |
* such as: |
|
565 |
* var_type value_type |
|
566 |
* BOOL BYTE#7 -> returns false |
|
567 |
* INT INT#7 -> returns true |
|
568 |
* INT 7 -> returns true |
|
569 |
* REAL 7.89 -> returns true |
|
570 |
* REAL 7 -> returns true |
|
571 |
* INT 7.89 -> returns false |
|
572 |
* SAFEBOOL BOOL#1 -> returns false !!! |
|
573 |
* etc... |
|
574 |
* |
|
575 |
* NOTE: It is assumed that the var_type is the data type of an lvalue |
|
576 |
*/ |
|
577 |
bool visit_expression_type_c::is_valid_assignment(symbol_c *var_type, symbol_c *value_type) { |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
578 |
if (var_type == NULL) {/* STAGE3_ERROR(value_type, value_type, "Var_type == NULL"); */ return false;} |
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
579 |
if (value_type == NULL) {/* STAGE3_ERROR(var_type, var_type, "Value_type == NULL"); */ return false;} |
257 | 580 |
|
581 |
symbol_c *common_type = common_type__(var_type, value_type); |
|
582 |
if (NULL == common_type) |
|
583 |
return false; |
|
584 |
return (typeid(*var_type) == typeid(*common_type)); |
|
585 |
} |
|
586 |
||
587 |
||
204 | 588 |
/* Return TRUE if there is a common data type, otherwise return FALSE |
257 | 589 |
* i.e., return TRUE if both data types may be used simultaneously in an expression |
590 |
* such as: |
|
591 |
* BOOL#0 AND BYTE#7 -> returns false |
|
592 |
* 0 AND BYTE#7 -> returns true |
|
593 |
* INT#10 AND INT#7 -> returns true |
|
594 |
* INT#10 AND 7 -> returns true |
|
595 |
* REAL#34.3 AND 7.89 -> returns true |
|
596 |
* REAL#34.3 AND 7 -> returns true |
|
597 |
* INT#10 AND 7.89 -> returns false |
|
598 |
* SAFEBOOL#0 AND BOOL#1 -> returns true !!! |
|
599 |
* etc... |
|
204 | 600 |
*/ |
601 |
bool visit_expression_type_c::is_compatible_type(symbol_c *first_type, symbol_c *second_type) { |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
602 |
if (first_type == NULL || second_type == NULL) {return false;} |
204 | 603 |
return (NULL != common_type__(first_type, second_type)); |
604 |
} |
|
605 |
||
606 |
||
607 |
||
608 |
||
609 |
/* A helper function... */ |
|
257 | 610 |
/* |
204 | 611 |
symbol_c *visit_expression_type_c::compute_boolean_expression(symbol_c *left_type, symbol_c *right_type, |
612 |
is_data_type_t is_data_type) { |
|
257 | 613 |
*/ |
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
614 |
symbol_c *visit_expression_type_c::compute_expression(symbol_c *left_type, symbol_c *right_type, is_data_type_t is_data_type, |
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
615 |
symbol_c *left_expr, symbol_c *right_expr) { |
204 | 616 |
bool error = false; |
617 |
||
618 |
if (!(this->*is_data_type)(left_type)) { |
|
263 | 619 |
if (debug) printf("visit_expression_type_c::compute_expression(): invalid left_type\n"); |
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
620 |
if (left_expr != NULL) |
266
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
621 |
STAGE3_ERROR(left_expr, left_expr, "Invalid data type of operand, or of data resulting from previous IL instructions."); |
204 | 622 |
error = true; |
623 |
} |
|
624 |
if (!(this->*is_data_type)(right_type)) { |
|
263 | 625 |
if (debug) printf("visit_expression_type_c::compute_expression(): invalid right_type\n"); |
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
626 |
if (right_expr != NULL) |
266
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
627 |
STAGE3_ERROR(right_expr, right_expr, "Invalid data type of operand."); |
204 | 628 |
error = true; |
629 |
} |
|
630 |
if (!is_compatible_type(left_type, right_type)) { |
|
263 | 631 |
if (debug) printf("visit_expression_type_c::compute_expression(): left_type & right_type are incompatible\n"); |
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
632 |
if ((left_expr != NULL) && (right_expr != NULL)) |
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
633 |
STAGE3_ERROR(left_expr, right_expr, "Type mismatch between operands."); |
204 | 634 |
error = true; |
635 |
} |
|
636 |
||
637 |
if (error) |
|
638 |
return NULL; |
|
639 |
else |
|
640 |
return common_type(left_type, right_type); |
|
641 |
} |
|
642 |
||
643 |
||
644 |
||
645 |
||
646 |
/* A helper function... */ |
|
647 |
/* check the semantics of a FB or Function non-formal call */ |
|
648 |
/* e.g. foo(1, 2, 3, 4); */ |
|
350
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
649 |
/* If error_count pointer is != NULL, we do not really print out the errors, |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
650 |
* but rather only count how many errors were found. |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
651 |
* This is used to support overloaded functions, where we have to check each possible |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
652 |
* function, one at a time, untill we find a function call without any errors. |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
653 |
*/ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
654 |
void visit_expression_type_c::check_nonformal_call(symbol_c *f_call, symbol_c *f_decl, bool use_il_defvar, int *error_count) { |
204 | 655 |
symbol_c *call_param_value, *call_param_type, *param_type; |
656 |
identifier_c *param_name; |
|
657 |
function_param_iterator_c fp_iterator(f_decl); |
|
658 |
function_call_param_iterator_c fcp_iterator(f_call); |
|
350
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
659 |
int extensible_parameter_highest_index = -1; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
660 |
|
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
661 |
/* reset error counter */ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
662 |
if (error_count != NULL) *error_count = 0; |
204 | 663 |
/* if use_il_defvar, then the first parameter for the call comes from the il_default_variable */ |
664 |
if (use_il_defvar) { |
|
665 |
/* The first parameter of the function corresponds to the il_default_variable_type of the function call */ |
|
666 |
do { |
|
667 |
param_name = fp_iterator.next(); |
|
668 |
if(param_name == NULL) break; |
|
669 |
/* The EN and ENO parameters are default parameters. |
|
670 |
* In the non-formal invocation of a function there can be no assignment of |
|
671 |
* values to these parameters. Therefore, we ignore the parameters declared |
|
672 |
* in the function. |
|
673 |
*/ |
|
674 |
} while ((strcmp(param_name->value, "EN") == 0) || (strcmp(param_name->value, "ENO") == 0)); |
|
675 |
/* If the function does not have any parameters (param_name == NULL) |
|
676 |
* then we cannot compare its type with the il_default_variable_type. |
|
350
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
677 |
* |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
678 |
* However, I (Mario) think this is invalid syntax, as it seems to me all functions must |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
679 |
* have at least one parameter. |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
680 |
* However, we will make this semantic verification consider it possible, as later |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
681 |
* versions of the standard may change that syntax. |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
682 |
* So, instead of generating a syntax error message, we simply check whether the call |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
683 |
* is passing any more parameters besides the default variable (the il default variable may be ignored |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
684 |
* in this case, and not consider it as being a parameter being passed to the function). |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
685 |
* If it does, then we have found a semantic error, otherwise the function call is |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
686 |
* correct, and we simply return. |
204 | 687 |
*/ |
350
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
688 |
if(param_name == NULL) { |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
689 |
if (fcp_iterator.next_nf() != NULL) |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
690 |
STAGE3_ERROR(f_call, f_call, "Too many parameters in function/FB call."); |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
691 |
return; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
692 |
} else { |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
693 |
/* param_name != NULL */ |
204 | 694 |
param_type = fp_iterator.param_type(); |
350
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
695 |
if(!is_valid_assignment(param_type, il_default_variable_type)) { |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
696 |
if (error_count != NULL) (*error_count)++; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
697 |
else STAGE3_ERROR(f_call, f_call, "In function/FB call, first parameter has invalid data type."); |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
698 |
} |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
699 |
} |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
700 |
|
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
701 |
/* the fisrt parameter (il_def_variable) is correct */ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
702 |
if (extensible_parameter_highest_index < fp_iterator.extensible_param_index()) { |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
703 |
extensible_parameter_highest_index = fp_iterator.extensible_param_index(); |
204 | 704 |
} |
705 |
} // if (use_il_defvar) |
|
350
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
706 |
|
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
707 |
|
204 | 708 |
|
709 |
/* Iterating through the non-formal parameters of the function call */ |
|
710 |
while((call_param_value = fcp_iterator.next_nf()) != NULL) { |
|
323 | 711 |
/* Obtaining the type of the value being passed in the function call */ |
204 | 712 |
call_param_type = base_type((symbol_c*)call_param_value->accept(*this)); |
323 | 713 |
if (call_param_type == NULL) { |
350
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
714 |
if (error_count != NULL) (*error_count)++; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
715 |
/* the following error will usually occur when ST code uses an identifier, that could refer to an enumerated constant, |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
716 |
* but was not actually used as a constant in any definitions of an enumerated data type |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
717 |
*/ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
718 |
else STAGE3_ERROR(call_param_value, call_param_value, "Could not determine data type of value being passed in function/FB call."); |
323 | 719 |
continue; |
720 |
} |
|
721 |
||
204 | 722 |
/* Iterate to the next parameter of the function being called. |
723 |
* Get the name of that parameter, and ignore if EN or ENO. |
|
724 |
*/ |
|
725 |
do { |
|
726 |
param_name = fp_iterator.next(); |
|
350
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
727 |
/* If there is no other parameter declared, then we are passing too many parameters... */ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
728 |
if(param_name == NULL) { |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
729 |
if (error_count != NULL) (*error_count)++; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
730 |
/* Note: We don't want to print out the follwoing error message multiple times, so we return instead of continuing with 'break' */ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
731 |
else STAGE3_ERROR(f_call, f_call, "Too many parameters in function/FB call."); return; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
732 |
} |
204 | 733 |
} while ((strcmp(param_name->value, "EN") == 0) || (strcmp(param_name->value, "ENO") == 0)); |
734 |
||
350
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
735 |
/* Get the parameter type */ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
736 |
param_type = base_type(fp_iterator.param_type()); |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
737 |
/* If the declared parameter and the parameter from the function call do not have the same type */ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
738 |
if(!is_valid_assignment(param_type, call_param_type)) { |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
739 |
if (error_count != NULL) (*error_count)++; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
740 |
else STAGE3_ERROR(call_param_value, call_param_value, "Type mismatch in function/FB call parameter."); |
204 | 741 |
} |
350
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
742 |
|
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
743 |
if (extensible_parameter_highest_index < fp_iterator.extensible_param_index()) { |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
744 |
extensible_parameter_highest_index = fp_iterator.extensible_param_index(); |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
745 |
} |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
746 |
} |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
747 |
|
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
748 |
/* The function call may not have any errors! */ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
749 |
/* In the case of a call to an extensible function, we store the highest index |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
750 |
* of the extensible parameters this particular call uses, in the symbol_c object |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
751 |
* of the function call itself! |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
752 |
* In calls to non-extensible functions, this value will be set to -1. |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
753 |
* This information is later used in stage4 to correctly generate the |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
754 |
* output code. |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
755 |
*/ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
756 |
int extensible_param_count = -1; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
757 |
if (extensible_parameter_highest_index >=0) /* if call to extensible function */ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
758 |
extensible_param_count = 1 + extensible_parameter_highest_index - fp_iterator.first_extensible_param_index(); |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
759 |
il_function_call_c *il_function_call = dynamic_cast<il_function_call_c *>(f_call); |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
760 |
function_invocation_c *function_invocation = dynamic_cast<function_invocation_c *>(f_call); |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
761 |
if (il_function_call != NULL) il_function_call ->extensible_param_count = extensible_param_count; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
762 |
else if (function_invocation != NULL) function_invocation->extensible_param_count = extensible_param_count; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
763 |
// else ERROR; /* this function is also called by Function Blocks, so this is not an error! */ |
204 | 764 |
} |
765 |
||
323 | 766 |
|
767 |
/* check semantics of FB call in the IL language using input operators */ |
|
768 |
/* e.g. CU, CLK, IN, PT, SR, ... */ |
|
769 |
void visit_expression_type_c::check_il_fbcall(symbol_c *il_operator, const char *il_operator_str) { |
|
770 |
symbol_c *call_param_type = il_default_variable_type; |
|
204 | 771 |
symbol_c *fb_decl = il_operand_type; |
772 |
/* The following should never occur. The function block must be defined, |
|
773 |
* and the FB type being called MUST be in the symtable... |
|
774 |
* This was all already checked at stage 2! |
|
775 |
*/ |
|
323 | 776 |
if (NULL == fb_decl) ERROR; |
777 |
if (call_param_type == NULL) ERROR; |
|
778 |
||
779 |
/* We also create an identifier_c object, so we can later use it to find the equivalent FB parameter */ |
|
780 |
/* Note however that this symbol does not have the correct location (file name and line numbers) |
|
781 |
* so any error messages must use the il_operator symbol to generate the error location |
|
782 |
*/ |
|
783 |
identifier_c call_param_name(il_operator_str); |
|
204 | 784 |
|
785 |
/* Obtaining the type of the value being passed in the function call */ |
|
786 |
call_param_type = base_type(call_param_type); |
|
323 | 787 |
if (call_param_type == NULL) STAGE3_ERROR(il_operator, il_operator, "Could not determine data type of value being passed in FB call."); |
788 |
||
204 | 789 |
/* Find the corresponding parameter of the function being called */ |
323 | 790 |
function_param_iterator_c fp_iterator(fb_decl); |
791 |
if(fp_iterator.search(&call_param_name) == NULL) { |
|
792 |
STAGE3_ERROR(il_operand, il_operand, "Called FB does not have an input parameter named %s.", il_operator_str); |
|
204 | 793 |
} else { |
794 |
/* Get the parameter type */ |
|
323 | 795 |
symbol_c *param_type = base_type(fp_iterator.param_type()); |
204 | 796 |
/* If the declared parameter and the parameter from the function call have the same type */ |
323 | 797 |
if(!is_valid_assignment(param_type, call_param_type)) STAGE3_ERROR(il_operator, il_operator, "Type mismatch in FB call parameter."); |
204 | 798 |
} |
799 |
} |
|
800 |
||
801 |
||
802 |
/* A helper function... */ |
|
803 |
/* check the semantics of a FB or Function formal call */ |
|
804 |
/* e.g. foo(IN1 := 1, OUT1 =>x, EN := true); */ |
|
350
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
805 |
/* If error_count pointer is != NULL, we do not really print out the errors, |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
806 |
* but rather only count how many errors were found. |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
807 |
* This is used to support overloaded functions, where we have to check each possible |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
808 |
* function, one at a time, untill we find a function call without any errors. |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
809 |
*/ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
810 |
void visit_expression_type_c::check_formal_call(symbol_c *f_call, symbol_c *f_decl, int *error_count) { |
204 | 811 |
symbol_c *call_param_value, *call_param_type, *call_param_name, *param_type; |
812 |
symbol_c *verify_duplicate_param; |
|
813 |
identifier_c *param_name; |
|
814 |
function_param_iterator_c fp_iterator(f_decl); |
|
815 |
function_call_param_iterator_c fcp_iterator(f_call); |
|
350
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
816 |
int extensible_parameter_highest_index = -1; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
817 |
identifier_c *extensible_parameter_name; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
818 |
|
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
819 |
/* reset error counter */ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
820 |
if (error_count != NULL) *error_count = 0; |
204 | 821 |
|
822 |
/* Iterating through the formal parameters of the function call */ |
|
823 |
while((call_param_name = fcp_iterator.next_f()) != NULL) { |
|
824 |
||
825 |
/* Obtaining the value being passed in the function call */ |
|
826 |
call_param_value = fcp_iterator.get_current_value(); |
|
827 |
/* the following should never occur. If it does, then we have a bug in our code... */ |
|
828 |
if (NULL == call_param_value) ERROR; |
|
829 |
||
830 |
/* Checking if there are duplicated parameter values */ |
|
831 |
verify_duplicate_param = fcp_iterator.search_f(call_param_name); |
|
832 |
if(verify_duplicate_param != call_param_value){ |
|
350
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
833 |
if (error_count != NULL) (*error_count)++; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
834 |
else STAGE3_ERROR(call_param_name, verify_duplicate_param, "Duplicated parameter values."); |
204 | 835 |
} |
836 |
||
837 |
/* Obtaining the type of the value being passed in the function call */ |
|
838 |
call_param_type = (symbol_c*)call_param_value->accept(*this); |
|
839 |
if (call_param_type == NULL) { |
|
350
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
840 |
if (error_count != NULL) (*error_count)++; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
841 |
else STAGE3_ERROR(call_param_name, call_param_value, "Could not determine data type of value being passed in function/FB call."); |
204 | 842 |
/* The data value being passed is possibly any enumerated type value. |
843 |
* We do not yet handle semantic verification of enumerated types. |
|
844 |
*/ |
|
845 |
ERROR; |
|
846 |
} |
|
847 |
call_param_type = base_type(call_param_type); |
|
848 |
if (call_param_type == NULL) STAGE3_ERROR(call_param_name, call_param_value, "Could not determine data type of value being passed in function/FB call."); |
|
849 |
||
850 |
/* Find the corresponding parameter of the function being called */ |
|
851 |
param_name = fp_iterator.search(call_param_name); |
|
852 |
if(param_name == NULL) { |
|
350
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
853 |
if (error_count != NULL) (*error_count)++; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
854 |
else STAGE3_ERROR(call_param_name, call_param_name, "Invalid parameter in function/FB call."); |
204 | 855 |
} else { |
856 |
/* Get the parameter type */ |
|
323 | 857 |
param_type = base_type(fp_iterator.param_type()); |
204 | 858 |
/* If the declared parameter and the parameter from the function call have the same type */ |
350
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
859 |
if(!is_valid_assignment(param_type, call_param_type)) { |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
860 |
if (error_count != NULL) (*error_count)++; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
861 |
else STAGE3_ERROR(call_param_name, call_param_value, "Type mismatch function/FB call parameter."); |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
862 |
} |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
863 |
if (extensible_parameter_highest_index < fp_iterator.extensible_param_index()) { |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
864 |
extensible_parameter_highest_index = fp_iterator.extensible_param_index(); |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
865 |
extensible_parameter_name = param_name; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
866 |
} |
204 | 867 |
} |
868 |
} |
|
350
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
869 |
|
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
870 |
/* In the case of a call to an extensible function, we store the highest index |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
871 |
* of the extensible parameters this particular call uses, in the symbol_c object |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
872 |
* of the function call itself! |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
873 |
* In calls to non-extensible functions, this value will be set to -1. |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
874 |
* This information is later used in stage4 to correctly generate the |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
875 |
* output code. |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
876 |
*/ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
877 |
int extensible_param_count = -1; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
878 |
if (extensible_parameter_highest_index >=0) /* if call to extensible function */ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
879 |
extensible_param_count = 1 + extensible_parameter_highest_index - fp_iterator.first_extensible_param_index(); |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
880 |
il_formal_funct_call_c *il_formal_funct_call = dynamic_cast<il_formal_funct_call_c *>(f_call); |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
881 |
function_invocation_c *function_invocation = dynamic_cast<function_invocation_c *>(f_call); |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
882 |
if (il_formal_funct_call != NULL) il_formal_funct_call->extensible_param_count = extensible_param_count; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
883 |
else if (function_invocation != NULL) function_invocation->extensible_param_count = extensible_param_count; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
884 |
// else ERROR; /* this function is also called by Function Blocks, so this is not an error! */ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
885 |
|
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
886 |
/* We have iterated through all the formal parameters of the function call, |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
887 |
* and everything seems fine. |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
888 |
* If the function being called in an extensible function, we now check |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
889 |
* whether the extensible paramters in the formal invocation do not skip |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
890 |
* any indexes... |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
891 |
* |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
892 |
* f(in1:=0, in2:=0, in4:=0) --> ERROR!! |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
893 |
*/ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
894 |
if (extensible_parameter_highest_index >=0) { /* if call to extensible function */ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
895 |
for (int i=fp_iterator.first_extensible_param_index(); i < extensible_parameter_highest_index; i++) { |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
896 |
char tmp[256]; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
897 |
if (snprintf(tmp, 256, "%s%d", extensible_parameter_name->value, i) >= 256) ERROR; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
898 |
if (fcp_iterator.search_f(tmp) == NULL) { |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
899 |
/* error in invocation of extensible function */ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
900 |
if (error_count != NULL) (*error_count)++; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
901 |
else STAGE3_ERROR(f_call, f_call, "Missing extensible parameters in call to extensible function."); |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
902 |
} |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
903 |
} |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
904 |
} |
204 | 905 |
} |
906 |
||
907 |
||
908 |
||
909 |
||
910 |
/* a helper function... */ |
|
911 |
symbol_c *visit_expression_type_c::base_type(symbol_c *symbol) { |
|
262
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
912 |
/* NOTE: symbol == NULL is valid. It will occur when, for e.g., an undefined/undeclared symbolic_variable is used |
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
913 |
* in the code. |
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
914 |
*/ |
197ba42d78b2
Do not crash when checking semantics of undeclared symbolic_variable.
Mario de Sousa <msousa@fe.up.pt>
parents:
260
diff
changeset
|
915 |
if (symbol == NULL) return NULL; |
204 | 916 |
return (symbol_c *)symbol->accept(search_base_type); |
917 |
} |
|
918 |
||
919 |
||
920 |
/* a helper function... */ |
|
921 |
void *visit_expression_type_c::verify_null(symbol_c *symbol){ |
|
922 |
if(il_default_variable_type == NULL){ |
|
266
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
923 |
STAGE3_ERROR(symbol, symbol, "Missing LD instruction (or equivalent) before this instruction."); |
204 | 924 |
} |
925 |
if(il_operand_type == NULL){ |
|
266
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
926 |
STAGE3_ERROR(symbol, symbol, "This instruction requires an operand."); |
204 | 927 |
} |
928 |
return NULL; |
|
929 |
} |
|
930 |
||
931 |
||
305
fe5cb87610fa
When checking semantics of expressions, skip semantic checking of data type definitions
Mario de Sousa <msousa@fe.up.pt>
parents:
289
diff
changeset
|
932 |
/********************************/ |
fe5cb87610fa
When checking semantics of expressions, skip semantic checking of data type definitions
Mario de Sousa <msousa@fe.up.pt>
parents:
289
diff
changeset
|
933 |
/* B 1.3.3 - Derived data types */ |
fe5cb87610fa
When checking semantics of expressions, skip semantic checking of data type definitions
Mario de Sousa <msousa@fe.up.pt>
parents:
289
diff
changeset
|
934 |
/********************************/ |
fe5cb87610fa
When checking semantics of expressions, skip semantic checking of data type definitions
Mario de Sousa <msousa@fe.up.pt>
parents:
289
diff
changeset
|
935 |
void *visit_expression_type_c::visit(data_type_declaration_c *symbol) { |
fe5cb87610fa
When checking semantics of expressions, skip semantic checking of data type definitions
Mario de Sousa <msousa@fe.up.pt>
parents:
289
diff
changeset
|
936 |
// TODO !!! |
fe5cb87610fa
When checking semantics of expressions, skip semantic checking of data type definitions
Mario de Sousa <msousa@fe.up.pt>
parents:
289
diff
changeset
|
937 |
/* for the moment we must return NULL so semantic analysis of remaining code is not interrupted! */ |
fe5cb87610fa
When checking semantics of expressions, skip semantic checking of data type definitions
Mario de Sousa <msousa@fe.up.pt>
parents:
289
diff
changeset
|
938 |
return NULL; |
fe5cb87610fa
When checking semantics of expressions, skip semantic checking of data type definitions
Mario de Sousa <msousa@fe.up.pt>
parents:
289
diff
changeset
|
939 |
} |
204 | 940 |
|
941 |
||
942 |
/*********************/ |
|
943 |
/* B 1.4 - Variables */ |
|
944 |
/*********************/ |
|
945 |
||
946 |
void *visit_expression_type_c::visit(symbolic_variable_c *symbol) { |
|
321
a96399ab57c2
Add better comments, and change name of functions to clarify what they do.
Mario de Sousa <msousa@fe.up.pt>
parents:
319
diff
changeset
|
947 |
return search_varfb_instance_type->get_basetype_decl(symbol); |
204 | 948 |
} |
949 |
||
950 |
/********************************************/ |
|
951 |
/* B 1.4.1 - Directly Represented Variables */ |
|
952 |
/********************************************/ |
|
953 |
void *visit_expression_type_c::visit(direct_variable_c *symbol) { |
|
954 |
switch (symbol->value[2]) { |
|
955 |
case 'X': // bit - 1 bit |
|
956 |
return (void *)&bool_type_name; |
|
957 |
case 'B': // byte - 8 bits |
|
958 |
return (void *)&byte_type_name; |
|
959 |
case 'W': // word - 16 bits |
|
960 |
return (void *)&word_type_name; |
|
961 |
case 'D': // double word - 32 bits |
|
962 |
return (void *)&dword_type_name; |
|
963 |
case 'L': // long word - 64 bits |
|
964 |
return (void *)&lword_type_name; |
|
965 |
default: // if none of the above, then the empty string was used <=> boolean |
|
966 |
return (void *)&bool_type_name; |
|
967 |
} |
|
968 |
} |
|
969 |
||
970 |
/*************************************/ |
|
971 |
/* B 1.4.2 - Multi-element variables */ |
|
972 |
/*************************************/ |
|
973 |
void *visit_expression_type_c::visit(array_variable_c *symbol) { |
|
321
a96399ab57c2
Add better comments, and change name of functions to clarify what they do.
Mario de Sousa <msousa@fe.up.pt>
parents:
319
diff
changeset
|
974 |
return search_varfb_instance_type->get_basetype_decl(symbol); |
204 | 975 |
} |
976 |
||
977 |
void *visit_expression_type_c::visit(structured_variable_c *symbol) { |
|
321
a96399ab57c2
Add better comments, and change name of functions to clarify what they do.
Mario de Sousa <msousa@fe.up.pt>
parents:
319
diff
changeset
|
978 |
return search_varfb_instance_type->get_basetype_decl(symbol); |
204 | 979 |
} |
980 |
||
981 |
||
982 |
||
319
1669977e84f4
Skip CONFIGURATION declarations in stage 3 for now, so semantic analysis does not stop when a configuration is encountered.
Mario de Sousa <msousa@fe.up.pt>
parents:
305
diff
changeset
|
983 |
/********************************/ |
1669977e84f4
Skip CONFIGURATION declarations in stage 3 for now, so semantic analysis does not stop when a configuration is encountered.
Mario de Sousa <msousa@fe.up.pt>
parents:
305
diff
changeset
|
984 |
/* B 1.7 Configuration elements */ |
1669977e84f4
Skip CONFIGURATION declarations in stage 3 for now, so semantic analysis does not stop when a configuration is encountered.
Mario de Sousa <msousa@fe.up.pt>
parents:
305
diff
changeset
|
985 |
/********************************/ |
1669977e84f4
Skip CONFIGURATION declarations in stage 3 for now, so semantic analysis does not stop when a configuration is encountered.
Mario de Sousa <msousa@fe.up.pt>
parents:
305
diff
changeset
|
986 |
void *visit_expression_type_c::visit(configuration_declaration_c *symbol) { |
1669977e84f4
Skip CONFIGURATION declarations in stage 3 for now, so semantic analysis does not stop when a configuration is encountered.
Mario de Sousa <msousa@fe.up.pt>
parents:
305
diff
changeset
|
987 |
// TODO !!! |
1669977e84f4
Skip CONFIGURATION declarations in stage 3 for now, so semantic analysis does not stop when a configuration is encountered.
Mario de Sousa <msousa@fe.up.pt>
parents:
305
diff
changeset
|
988 |
/* for the moment we must return NULL so semantic analysis of remaining code is not interrupted! */ |
1669977e84f4
Skip CONFIGURATION declarations in stage 3 for now, so semantic analysis does not stop when a configuration is encountered.
Mario de Sousa <msousa@fe.up.pt>
parents:
305
diff
changeset
|
989 |
return NULL; |
1669977e84f4
Skip CONFIGURATION declarations in stage 3 for now, so semantic analysis does not stop when a configuration is encountered.
Mario de Sousa <msousa@fe.up.pt>
parents:
305
diff
changeset
|
990 |
} |
1669977e84f4
Skip CONFIGURATION declarations in stage 3 for now, so semantic analysis does not stop when a configuration is encountered.
Mario de Sousa <msousa@fe.up.pt>
parents:
305
diff
changeset
|
991 |
|
1669977e84f4
Skip CONFIGURATION declarations in stage 3 for now, so semantic analysis does not stop when a configuration is encountered.
Mario de Sousa <msousa@fe.up.pt>
parents:
305
diff
changeset
|
992 |
|
204 | 993 |
/****************************************/ |
994 |
/* B.2 - Language IL (Instruction List) */ |
|
995 |
/****************************************/ |
|
996 |
/***********************************/ |
|
997 |
/* B 2.1 Instructions and Operands */ |
|
998 |
/***********************************/ |
|
999 |
/*| instruction_list il_instruction */ |
|
1000 |
/* The visitor of the base class search_visitor_c will handle calling each instruction in the list. |
|
1001 |
* We do not need to do anything here... |
|
1002 |
*/ |
|
1003 |
// void *visit_expression_type_c::visit(instruction_list_c *symbol) |
|
1004 |
||
1005 |
/* | label ':' [il_incomplete_instruction] eol_list */ |
|
1006 |
//SYM_REF2(il_instruction_c, label, il_instruction) |
|
1007 |
// void *visit_expression_type_c::visit(il_instruction_c *symbol); |
|
1008 |
||
1009 |
||
1010 |
/* | il_simple_operator [il_operand] */ |
|
1011 |
// SYM_REF2(il_simple_operation_c, il_simple_operator, il_operand) |
|
1012 |
void *visit_expression_type_c::visit(il_simple_operation_c *symbol) { |
|
1013 |
if (il_error) |
|
1014 |
return NULL; |
|
1015 |
||
1016 |
/* determine the data type of the operand */ |
|
266
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1017 |
il_operand = symbol->il_operand; |
204 | 1018 |
if (symbol->il_operand != NULL){ |
1019 |
il_operand_type = base_type((symbol_c *)symbol->il_operand->accept(*this)); |
|
1020 |
} else { |
|
1021 |
il_operand_type = NULL; |
|
1022 |
} |
|
1023 |
/* recursive call to see whether data types are compatible */ |
|
1024 |
symbol->il_simple_operator->accept(*this); |
|
1025 |
||
1026 |
il_operand_type = NULL; |
|
266
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1027 |
il_operand = NULL; |
204 | 1028 |
return NULL; |
1029 |
} |
|
1030 |
||
1031 |
// | function_name [il_operand_list] */ |
|
1032 |
//SYM_REF2(il_function_call_c, function_name, il_operand_list) |
|
1033 |
void *visit_expression_type_c::visit(il_function_call_c *symbol) { |
|
1034 |
if (il_error) |
|
1035 |
return NULL; |
|
1036 |
||
350
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1037 |
symbol_c *return_data_type = NULL; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1038 |
|
204 | 1039 |
/* First find the declaration of the function being called! */ |
350
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1040 |
function_symtable_t::iterator lower = function_symtable.lower_bound(symbol->function_name); |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1041 |
function_symtable_t::iterator upper = function_symtable.upper_bound(symbol->function_name); |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1042 |
if (lower == function_symtable.end()) ERROR; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1043 |
|
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1044 |
int error_count = 0; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1045 |
int *error_count_ptr = NULL; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1046 |
|
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1047 |
function_symtable_t::iterator second = lower; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1048 |
second++; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1049 |
if (second != upper) |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1050 |
/* This is a call to an overloaded function... */ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1051 |
error_count_ptr = &error_count; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1052 |
|
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1053 |
for(; lower != upper; lower++) { |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1054 |
function_declaration_c *f_decl = function_symtable.get_value(lower); |
204 | 1055 |
|
350
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1056 |
check_nonformal_call(symbol, f_decl, true, error_count_ptr); |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1057 |
|
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1058 |
if (0 == error_count) { |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1059 |
/* Either: |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1060 |
* (i) we have a call to a non-overloaded function (error_cnt_ptr is NULL!, so error_count won't change!) |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1061 |
* (ii) we have a call to an overloaded function, with no errors! |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1062 |
*/ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1063 |
|
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1064 |
/* Store the pointer to the declaration of the function being called. |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1065 |
* This data will be used by stage 4 to call the correct function. |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1066 |
* Mostly needed to disambiguate overloaded functions... |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1067 |
* See comments in absyntax.def for more details |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1068 |
*/ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1069 |
symbol->called_function_declaration = f_decl; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1070 |
/* determine the base data type returned by the function being called... */ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1071 |
return_data_type = base_type(f_decl->type_name); |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1072 |
/* If the following occurs, then we must have some big bug in the syntax parser (stage 2)... */ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1073 |
if (NULL == return_data_type) ERROR; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1074 |
/* set the new data type of the default variable for the following verifications... */ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1075 |
il_default_variable_type = return_data_type; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1076 |
return NULL; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1077 |
} |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1078 |
} |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1079 |
|
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1080 |
/* No compatible function was found for this function call */ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1081 |
STAGE3_ERROR(symbol, symbol, "Call to an overloaded function with invalid parameter type."); |
204 | 1082 |
return NULL; |
1083 |
} |
|
1084 |
||
1085 |
||
1086 |
/* | il_expr_operator '(' [il_operand] eol_list [simple_instr_list] ')' */ |
|
1087 |
// SYM_REF3(il_expression_c, il_expr_operator, il_operand, simple_instr_list); |
|
1088 |
void *visit_expression_type_c::visit(il_expression_c *symbol) { |
|
1089 |
if (il_error) |
|
1090 |
return NULL; |
|
1091 |
||
1092 |
symbol_c *il_default_variable_type_back = il_default_variable_type; |
|
1093 |
||
1094 |
il_parenthesis_level++; |
|
1095 |
||
1096 |
if(symbol->il_operand != NULL) { |
|
1097 |
il_default_variable_type = base_type((symbol_c *)symbol->il_operand->accept(*this)); |
|
1098 |
} else { |
|
1099 |
il_default_variable_type = NULL; |
|
1100 |
} |
|
1101 |
||
1102 |
if(symbol->simple_instr_list != NULL) { |
|
1103 |
symbol->simple_instr_list->accept(*this); |
|
1104 |
} |
|
1105 |
||
1106 |
il_parenthesis_level--; |
|
1107 |
if (il_parenthesis_level < 0) ERROR; |
|
1108 |
||
266
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1109 |
il_operand = symbol->simple_instr_list; |
204 | 1110 |
il_operand_type = il_default_variable_type; |
1111 |
il_default_variable_type = il_default_variable_type_back; |
|
1112 |
||
1113 |
/* Now check the if the data type semantics of operation are correct, |
|
1114 |
* but only if no previous error has been found... |
|
1115 |
*/ |
|
266
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1116 |
if (!il_error) |
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1117 |
symbol->il_expr_operator->accept(*this); |
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1118 |
|
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1119 |
il_operand_type = NULL; |
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1120 |
il_operand = NULL; |
204 | 1121 |
return NULL; |
1122 |
} |
|
1123 |
||
1124 |
||
1125 |
#if 0 |
|
1126 |
/* il_jump_operator label */ |
|
1127 |
SYM_REF2(il_jump_operation_c, il_jump_operator, label) |
|
1128 |
void *visit_expression_type_c::visit(il_jump_operation_c *symbol); |
|
1129 |
#endif |
|
1130 |
||
1131 |
||
1132 |
/* il_call_operator prev_declared_fb_name |
|
1133 |
* | il_call_operator prev_declared_fb_name '(' ')' |
|
1134 |
* | il_call_operator prev_declared_fb_name '(' eol_list ')' |
|
1135 |
* | il_call_operator prev_declared_fb_name '(' il_operand_list ')' |
|
1136 |
* | il_call_operator prev_declared_fb_name '(' eol_list il_param_list ')' |
|
1137 |
*/ |
|
1138 |
/* SYM_REF4(il_fb_call_c, il_call_operator, fb_name, il_operand_list, il_param_list) */ |
|
1139 |
void *visit_expression_type_c::visit(il_fb_call_c *symbol) { |
|
1140 |
if (il_error) |
|
1141 |
return NULL; |
|
1142 |
||
1143 |
/* first check whether the il_default_variable is of the correct type |
|
1144 |
* for the CAL / CALC / CALCN operator being used... |
|
1145 |
*/ |
|
1146 |
symbol->il_call_operator->accept(*this); |
|
1147 |
||
1148 |
/* Now check the FB call itself... */ |
|
1149 |
||
1150 |
/* First we find the declaration of the FB type of the FB instance being called... */ |
|
1151 |
/* e.g. Function_block foo_fb_type |
|
1152 |
* ... |
|
1153 |
* End_Function_Block |
|
1154 |
* |
|
1155 |
* Program test |
|
1156 |
* var fb1 : foo_fb_type; end_var |
|
1157 |
* fb1(...) |
|
1158 |
* End_Program |
|
1159 |
* |
|
321
a96399ab57c2
Add better comments, and change name of functions to clarify what they do.
Mario de Sousa <msousa@fe.up.pt>
parents:
319
diff
changeset
|
1160 |
* search_varfb_instance_type->get_basetype_decl( identifier_c("fb1") ) |
204 | 1161 |
* in the scope of Program 'test' |
1162 |
* will return the fb declaration of foo_fb_type !! |
|
1163 |
*/ |
|
1164 |
#if 0 |
|
321
a96399ab57c2
Add better comments, and change name of functions to clarify what they do.
Mario de Sousa <msousa@fe.up.pt>
parents:
319
diff
changeset
|
1165 |
symbol_c *fb_decl_symbol = search_varfb_instance_type->get_basetype_decl(symbol->fb_name); |
204 | 1166 |
/* The following should never occur. The function block must be defined, |
1167 |
* and the FB type being called MUST be in the symtable... |
|
1168 |
* This was all already checked at stage 2! |
|
1169 |
*/ |
|
1170 |
if (NULL == fb_decl_symbol) ERROR; |
|
1171 |
||
1172 |
function_block_declaration_c *fb_decl = dynamic_cast<function_block_declaration_c *>(fb_decl_symbol); |
|
1173 |
/* should never occur. ... */ |
|
1174 |
if (NULL == fb_decl) ERROR; |
|
1175 |
#endif |
|
321
a96399ab57c2
Add better comments, and change name of functions to clarify what they do.
Mario de Sousa <msousa@fe.up.pt>
parents:
319
diff
changeset
|
1176 |
symbol_c *fb_decl = search_varfb_instance_type->get_basetype_decl(symbol->fb_name); |
204 | 1177 |
/* The following should never occur. The function block must be defined, |
1178 |
* and the FB type being called MUST be in the symtable... |
|
1179 |
* This was all already checked at stage 2! |
|
1180 |
*/ |
|
1181 |
if (NULL == fb_decl) ERROR; |
|
1182 |
||
1183 |
/* now check the semantics of the fb call... */ |
|
1184 |
/* If the syntax parser is working correctly, exactly one of the |
|
1185 |
* following two symbols will be NULL, while the other is != NULL. |
|
1186 |
*/ |
|
1187 |
if (NULL != symbol->il_operand_list) check_nonformal_call(symbol, fb_decl); |
|
1188 |
if (NULL != symbol->il_param_list) check_formal_call (symbol, fb_decl); |
|
1189 |
||
1190 |
return NULL; |
|
1191 |
} |
|
1192 |
||
1193 |
||
1194 |
||
1195 |
/* | function_name '(' eol_list [il_param_list] ')' */ |
|
1196 |
/* SYM_REF2(il_formal_funct_call_c, function_name, il_param_list) */ |
|
1197 |
void *visit_expression_type_c::visit(il_formal_funct_call_c *symbol) { |
|
1198 |
if (il_error) |
|
1199 |
return NULL; |
|
1200 |
||
1201 |
symbol_c *return_data_type = NULL; |
|
350
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1202 |
function_symtable_t::iterator lower = function_symtable.lower_bound(symbol->function_name); |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1203 |
function_symtable_t::iterator upper = function_symtable.upper_bound(symbol->function_name); |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1204 |
|
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1205 |
if (lower == function_symtable.end()) { |
204 | 1206 |
function_type_t current_function_type = get_function_type((identifier_c *)symbol->function_name); |
1207 |
if (current_function_type == function_none) ERROR; |
|
350
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1208 |
return NULL; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1209 |
} |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1210 |
|
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1211 |
int error_count = 0; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1212 |
int *error_count_ptr = NULL; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1213 |
|
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1214 |
function_symtable_t::iterator second = lower; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1215 |
second++; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1216 |
if (second != upper) |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1217 |
/* This is a call to an overloaded function... */ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1218 |
error_count_ptr = &error_count; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1219 |
|
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1220 |
for(; lower != upper; lower++) { |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1221 |
function_declaration_c *f_decl = function_symtable.get_value(lower); |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1222 |
|
204 | 1223 |
/* check semantics of data passed in the function call... */ |
350
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1224 |
check_formal_call(symbol, f_decl, error_count_ptr); |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1225 |
|
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1226 |
if (0 == error_count) { |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1227 |
/* Either: |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1228 |
* (i) we have a call to a non-overloaded function (error_cnt_ptr is NULL!, so error_count won't change!) |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1229 |
* (ii) we have a call to an overloaded function, with no errors! |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1230 |
*/ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1231 |
|
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1232 |
/* Store the pointer to the declaration of the function being called. |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1233 |
* This data will be used by stage 4 to call the correct function. |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1234 |
* Mostly needed to disambiguate overloaded functions... |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1235 |
* See comments in absyntax.def for more details |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1236 |
*/ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1237 |
symbol->called_function_declaration = f_decl; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1238 |
/* determine the base data type returned by the function being called... */ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1239 |
return_data_type = base_type(f_decl->type_name); |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1240 |
/* the following should never occur. If it does, then we have a bug in the syntax parser (stage 2)... */ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1241 |
if (NULL == return_data_type) ERROR; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1242 |
/* the data type of the data returned by the function, and stored in the il default variable... */ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1243 |
il_default_variable_type = return_data_type; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1244 |
return NULL; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1245 |
} |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1246 |
} |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1247 |
|
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1248 |
/* No compatible function was found for this function call */ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1249 |
STAGE3_ERROR(symbol, symbol, "Call to an overloaded function with invalid parameter type."); |
204 | 1250 |
return NULL; |
1251 |
} |
|
1252 |
||
1253 |
||
1254 |
#if 0 |
|
1255 |
/* | il_operand_list ',' il_operand */ |
|
1256 |
SYM_LIST(il_operand_list_c) |
|
1257 |
void *visit_expression_type_c::visit(il_operand_list_c *symbol); |
|
1258 |
||
1259 |
/* | simple_instr_list il_simple_instruction */ |
|
1260 |
SYM_LIST(simple_instr_list_c) |
|
1261 |
void *visit_expression_type_c::visit(simple_instr_list_c *symbol); |
|
1262 |
||
1263 |
/* | il_initial_param_list il_param_instruction */ |
|
1264 |
SYM_LIST(il_param_list_c) |
|
1265 |
void *visit_expression_type_c::visit(il_param_list_c *symbol); |
|
1266 |
||
1267 |
/* il_assign_operator il_operand |
|
1268 |
* | il_assign_operator '(' eol_list simple_instr_list ')' |
|
1269 |
*/ |
|
1270 |
SYM_REF3(il_param_assignment_c, il_assign_operator, il_operand, simple_instr_list) |
|
1271 |
void *visit_expression_type_c::visit(il_param_assignment_c *symbol); |
|
1272 |
/* il_assign_out_operator variable */ |
|
1273 |
SYM_REF2(il_param_out_assignment_c, il_assign_out_operator, variable) |
|
1274 |
void *visit_expression_type_c::visit(il_param_out_assignment_c *symbol); |
|
1275 |
||
1276 |
#endif |
|
1277 |
||
1278 |
||
1279 |
/*******************/ |
|
1280 |
/* B 2.2 Operators */ |
|
1281 |
/*******************/ |
|
1282 |
||
1283 |
//SYM_REF0(LD_operator_c) |
|
1284 |
void *visit_expression_type_c::visit(LD_operator_c *symbol) { |
|
1285 |
if (0 == il_parenthesis_level) |
|
1286 |
il_error = false; |
|
1287 |
||
1288 |
if(il_operand_type == NULL) |
|
1289 |
STAGE3_ERROR(symbol, symbol, "LD operator requires an operand."); |
|
1290 |
il_default_variable_type = il_operand_type; |
|
1291 |
return NULL; |
|
1292 |
} |
|
1293 |
||
1294 |
// SYM_REF0(LDN_operator_c) |
|
1295 |
void *visit_expression_type_c::visit(LDN_operator_c *symbol) { |
|
1296 |
if(il_operand_type == NULL) |
|
1297 |
STAGE3_ERROR(symbol, symbol, "LDN operator requires an operand."); |
|
257 | 1298 |
if(!is_ANY_BIT_compatible(il_operand_type)) |
266
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1299 |
STAGE3_ERROR(symbol, il_operand, "invalid data type of LDN operand, should be of type ANY_BIT."); |
204 | 1300 |
il_default_variable_type = il_operand_type; |
1301 |
return NULL; |
|
1302 |
} |
|
1303 |
||
1304 |
// SYM_REF0(ST_operator_c) |
|
1305 |
void *visit_expression_type_c::visit(ST_operator_c *symbol) { |
|
1306 |
verify_null(symbol); |
|
257 | 1307 |
|
1308 |
if(!is_valid_assignment(il_operand_type, il_default_variable_type)) |
|
204 | 1309 |
STAGE3_ERROR(symbol, symbol, "Type mismatch in ST operation."); |
1310 |
/* TODO: check whether il_operand_type is an LVALUE !! */ |
|
1311 |
/* data type of il_default_variable_type is unchanged... */ |
|
1312 |
// il_default_variable_type = il_default_variable_type; |
|
1313 |
return NULL; |
|
1314 |
} |
|
1315 |
||
1316 |
// SYM_REF0(STN_operator_c) |
|
1317 |
void *visit_expression_type_c::visit(STN_operator_c *symbol) { |
|
1318 |
verify_null(symbol); |
|
257 | 1319 |
if(!is_valid_assignment(il_operand_type, il_default_variable_type)) |
204 | 1320 |
STAGE3_ERROR(symbol, symbol, "Type mismatch in ST operation."); |
1321 |
/* TODO: check whether il_operand_type is an LVALUE !! */ |
|
257 | 1322 |
if(!is_ANY_BIT_compatible(il_default_variable_type)) |
204 | 1323 |
STAGE3_ERROR(symbol, symbol, "invalid data type of il_default_variable for STN operand, should be of type ANY_BIT."); |
257 | 1324 |
if(!is_ANY_BIT_compatible(il_operand_type)) |
266
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1325 |
STAGE3_ERROR(symbol, il_operand, "invalid data type of STN operand, should be of type ANY_BIT."); |
204 | 1326 |
/* data type of il_default_variable_type is unchanged... */ |
1327 |
// il_default_variable_type = il_default_variable_type; |
|
1328 |
return NULL; |
|
1329 |
} |
|
1330 |
||
1331 |
//SYM_REF0(NOT_operator_c) |
|
1332 |
void *visit_expression_type_c::visit(NOT_operator_c *symbol) { |
|
1333 |
if(il_operand_type != NULL){ |
|
266
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1334 |
STAGE3_ERROR(symbol, il_operand, "NOT operator may not have an operand."); |
204 | 1335 |
return NULL; |
1336 |
} |
|
1337 |
if(il_default_variable_type == NULL) { |
|
1338 |
STAGE3_ERROR(symbol, symbol, "Il default variable should not be NULL."); |
|
1339 |
return NULL; |
|
1340 |
} |
|
257 | 1341 |
if(!is_ANY_BIT_compatible(il_default_variable_type)) { |
204 | 1342 |
STAGE3_ERROR(symbol, symbol, "Il default variable should be of type ANY_BIT."); |
1343 |
return NULL; |
|
1344 |
} |
|
1345 |
/* data type of il_default_variable_type is unchanged... */ |
|
1346 |
// il_default_variable_type = il_default_variable_type; |
|
1347 |
return NULL; |
|
1348 |
} |
|
1349 |
||
1350 |
// SYM_REF0(S_operator_c) |
|
1351 |
void *visit_expression_type_c::visit(S_operator_c *symbol) { |
|
1352 |
verify_null(symbol); |
|
1353 |
if (!is_BOOL_type(il_default_variable_type)) {STAGE3_ERROR(symbol, symbol, "IL default variable should be BOOL type.");} |
|
266
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1354 |
if (!is_BOOL_type(il_operand_type)) {STAGE3_ERROR(symbol, il_operand, "operator S requires operand of type BOOL.");} |
204 | 1355 |
/* TODO: check whether il_operand_type is an LVALUE !! */ |
1356 |
/* data type of il_default_variable_type is unchanged... */ |
|
1357 |
// il_default_variable_type = il_default_variable_type; |
|
1358 |
return NULL; |
|
1359 |
} |
|
1360 |
||
1361 |
// SYM_REF0(R_operator_c) |
|
1362 |
void *visit_expression_type_c::visit(R_operator_c *symbol) { |
|
1363 |
verify_null(symbol); |
|
1364 |
if (!is_BOOL_type(il_default_variable_type)) {STAGE3_ERROR(symbol, symbol, "IL default variable should be BOOL type.");} |
|
266
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1365 |
if (!is_BOOL_type(il_operand_type)) {STAGE3_ERROR(symbol, il_operand, "operator R requires operand of type BOOL.");} |
204 | 1366 |
/* TODO: check whether il_operand_type is an LVALUE !! */ |
1367 |
/* data type of il_default_variable_type is unchanged... */ |
|
1368 |
// il_default_variable_type = il_default_variable_type; |
|
1369 |
return NULL; |
|
1370 |
} |
|
1371 |
||
1372 |
||
1373 |
// SYM_REF0(S1_operator_c) |
|
1374 |
void *visit_expression_type_c::visit(S1_operator_c *symbol){ |
|
323 | 1375 |
check_il_fbcall(symbol, "S1"); |
204 | 1376 |
return NULL; |
1377 |
} |
|
1378 |
||
1379 |
// SYM_REF0(R1_operator_c) |
|
1380 |
void *visit_expression_type_c::visit(R1_operator_c *symbol) { |
|
323 | 1381 |
check_il_fbcall(symbol, "R1"); |
204 | 1382 |
return NULL; |
1383 |
} |
|
1384 |
||
1385 |
// SYM_REF0(CLK_operator_c) |
|
1386 |
void *visit_expression_type_c::visit(CLK_operator_c *symbol) { |
|
323 | 1387 |
check_il_fbcall(symbol, "CLK"); |
204 | 1388 |
return NULL; |
1389 |
} |
|
1390 |
||
1391 |
// SYM_REF0(CU_operator_c) |
|
1392 |
void *visit_expression_type_c::visit(CU_operator_c *symbol) { |
|
323 | 1393 |
check_il_fbcall(symbol, "CU"); |
204 | 1394 |
return NULL; |
1395 |
} |
|
1396 |
||
1397 |
// SYM_REF0(CD_operator_c) |
|
1398 |
void *visit_expression_type_c::visit(CD_operator_c *symbol) { |
|
323 | 1399 |
check_il_fbcall(symbol, "CD"); |
204 | 1400 |
return NULL; |
1401 |
} |
|
1402 |
||
1403 |
// SYM_REF0(PV_operator_c) |
|
1404 |
void *visit_expression_type_c::visit(PV_operator_c *symbol) { |
|
323 | 1405 |
check_il_fbcall(symbol, "PV"); |
204 | 1406 |
return NULL; |
1407 |
} |
|
1408 |
||
1409 |
// SYM_REF0(IN_operator_c) |
|
1410 |
void *visit_expression_type_c::visit(IN_operator_c *symbol) { |
|
323 | 1411 |
check_il_fbcall(symbol, "IN"); |
204 | 1412 |
return NULL; |
1413 |
} |
|
1414 |
||
1415 |
// SYM_REF0(PT_operator_c) |
|
1416 |
void *visit_expression_type_c::visit(PT_operator_c *symbol) { |
|
323 | 1417 |
check_il_fbcall(symbol, "PT"); |
204 | 1418 |
return NULL; |
1419 |
} |
|
1420 |
||
1421 |
//SYM_REF0(AND_operator_c) |
|
1422 |
void *visit_expression_type_c::visit(AND_operator_c *symbol) { |
|
1423 |
verify_null(symbol); |
|
266
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1424 |
il_default_variable_type = compute_expression(il_default_variable_type, il_operand_type, &visit_expression_type_c::is_ANY_BIT_compatible, |
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1425 |
symbol , il_operand); |
204 | 1426 |
return NULL; |
1427 |
} |
|
1428 |
||
1429 |
//SYM_REF0(OR_operator_c) |
|
1430 |
void *visit_expression_type_c::visit(OR_operator_c *symbol) { |
|
1431 |
verify_null(symbol); |
|
266
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1432 |
il_default_variable_type = compute_expression(il_default_variable_type, il_operand_type, &visit_expression_type_c::is_ANY_BIT_compatible, |
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1433 |
symbol , il_operand); |
204 | 1434 |
return NULL; |
1435 |
} |
|
1436 |
||
1437 |
//SYM_REF0(XOR_operator_c) |
|
1438 |
void *visit_expression_type_c::visit(XOR_operator_c *symbol) { |
|
1439 |
verify_null(symbol); |
|
266
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1440 |
il_default_variable_type = compute_expression(il_default_variable_type, il_operand_type, &visit_expression_type_c::is_ANY_BIT_compatible, |
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1441 |
symbol , il_operand); |
204 | 1442 |
return NULL; |
1443 |
} |
|
1444 |
||
1445 |
// SYM_REF0(ANDN_operator_c) |
|
1446 |
void *visit_expression_type_c::visit(ANDN_operator_c *symbol) { |
|
1447 |
verify_null(symbol); |
|
266
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1448 |
il_default_variable_type = compute_expression(il_default_variable_type, il_operand_type, &visit_expression_type_c::is_ANY_BIT_compatible, |
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1449 |
symbol , il_operand); |
204 | 1450 |
return NULL; |
1451 |
} |
|
1452 |
||
1453 |
// SYM_REF0(ORN_operator_c) |
|
1454 |
void *visit_expression_type_c::visit(ORN_operator_c *symbol) { |
|
1455 |
verify_null(symbol); |
|
266
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1456 |
il_default_variable_type = compute_expression(il_default_variable_type, il_operand_type, &visit_expression_type_c::is_ANY_BIT_compatible, |
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1457 |
symbol , il_operand); |
204 | 1458 |
return NULL; |
1459 |
} |
|
1460 |
||
1461 |
// SYM_REF0(XORN_operator_c) |
|
1462 |
void *visit_expression_type_c::visit(XORN_operator_c *symbol) { |
|
1463 |
verify_null(symbol); |
|
266
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1464 |
il_default_variable_type = compute_expression(il_default_variable_type, il_operand_type, &visit_expression_type_c::is_ANY_BIT_compatible, |
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1465 |
symbol , il_operand); |
204 | 1466 |
return NULL; |
1467 |
} |
|
1468 |
||
1469 |
// SYM_REF0(ADD_operator_c) |
|
1470 |
void *visit_expression_type_c::visit(ADD_operator_c *symbol) { |
|
1471 |
verify_null(symbol); |
|
1472 |
symbol_c *left_type = il_default_variable_type; |
|
1473 |
symbol_c *right_type = il_operand_type; |
|
257 | 1474 |
|
1475 |
/* The following is not required, it is already handled by compute_expression() ... */ |
|
1476 |
/* |
|
1477 |
if (is_type(left_type, time_type_name_c) && is_type(right_type, time_type_name_c)) |
|
204 | 1478 |
il_default_variable_type = &time_type_name; |
257 | 1479 |
*/ |
1480 |
||
1481 |
if (is_type(left_type, tod_type_name_c) && is_type(right_type, time_type_name_c)) |
|
204 | 1482 |
il_default_variable_type = &tod_type_name; |
257 | 1483 |
else if (is_type(left_type, safetod_type_name_c) && is_type(right_type, time_type_name_c)) |
1484 |
il_default_variable_type = &tod_type_name; |
|
1485 |
else if (is_type(left_type, tod_type_name_c) && is_type(right_type, safetime_type_name_c)) |
|
1486 |
il_default_variable_type = &tod_type_name; |
|
1487 |
else if (is_type(left_type, safetod_type_name_c) && is_type(right_type, safetime_type_name_c)) |
|
1488 |
il_default_variable_type = &safetod_type_name; |
|
1489 |
||
1490 |
else if (is_type(left_type, dt_type_name_c) && is_type(right_type, time_type_name_c)) |
|
204 | 1491 |
il_default_variable_type = &dt_type_name; |
257 | 1492 |
else if (is_type(left_type, safedt_type_name_c) && is_type(right_type, time_type_name_c)) |
1493 |
il_default_variable_type = &dt_type_name; |
|
1494 |
else if (is_type(left_type, dt_type_name_c) && is_type(right_type, safetime_type_name_c)) |
|
1495 |
il_default_variable_type = &dt_type_name; |
|
1496 |
else if (is_type(left_type, safedt_type_name_c) && is_type(right_type, safetime_type_name_c)) |
|
1497 |
il_default_variable_type = &safedt_type_name; |
|
1498 |
||
266
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1499 |
else il_default_variable_type = compute_expression(il_default_variable_type, il_operand_type, &visit_expression_type_c::is_ANY_MAGNITUDE_compatible, |
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1500 |
symbol , il_operand); |
204 | 1501 |
return NULL; |
1502 |
} |
|
1503 |
||
1504 |
// SYM_REF0(SUB_operator_c) |
|
1505 |
void *visit_expression_type_c::visit(SUB_operator_c *symbol) { |
|
1506 |
verify_null(symbol); |
|
1507 |
symbol_c *left_type = il_default_variable_type; |
|
1508 |
symbol_c *right_type = il_operand_type;; |
|
257 | 1509 |
|
1510 |
/* The following is not required, it is already handled by compute_expression() ... */ |
|
1511 |
/* |
|
204 | 1512 |
if (typeid(*left_type) == typeid(time_type_name_c) && typeid(*right_type) == typeid(time_type_name_c)) |
1513 |
il_default_variable_type = &time_type_name; |
|
257 | 1514 |
*/ |
1515 |
||
1516 |
if (is_type(left_type, tod_type_name_c) && is_type(right_type, time_type_name_c)) |
|
1517 |
il_default_variable_type = &tod_type_name; |
|
1518 |
else if (is_type(left_type, safetod_type_name_c) && is_type(right_type, time_type_name_c)) |
|
1519 |
il_default_variable_type = &tod_type_name; |
|
1520 |
else if (is_type(left_type, tod_type_name_c) && is_type(right_type, safetime_type_name_c)) |
|
1521 |
il_default_variable_type = &tod_type_name; |
|
1522 |
else if (is_type(left_type, safetod_type_name_c) && is_type(right_type, safetime_type_name_c)) |
|
1523 |
il_default_variable_type = &safetod_type_name; |
|
1524 |
||
1525 |
else if (is_type(left_type, dt_type_name_c) && is_type(right_type, time_type_name_c)) |
|
1526 |
il_default_variable_type = &dt_type_name; |
|
1527 |
else if (is_type(left_type, safedt_type_name_c) && is_type(right_type, time_type_name_c)) |
|
1528 |
il_default_variable_type = &dt_type_name; |
|
1529 |
else if (is_type(left_type, dt_type_name_c) && is_type(right_type, safetime_type_name_c)) |
|
1530 |
il_default_variable_type = &dt_type_name; |
|
1531 |
else if (is_type(left_type, safedt_type_name_c) && is_type(right_type, safetime_type_name_c)) |
|
1532 |
il_default_variable_type = &safedt_type_name; |
|
1533 |
||
1534 |
else if (is_type(left_type, date_type_name_c) && is_type(right_type, date_type_name_c)) |
|
204 | 1535 |
il_default_variable_type = &time_type_name; |
257 | 1536 |
else if (is_type(left_type, safedate_type_name_c) && is_type(right_type, date_type_name_c)) |
204 | 1537 |
il_default_variable_type = &time_type_name; |
257 | 1538 |
else if (is_type(left_type, date_type_name_c) && is_type(right_type, safedate_type_name_c)) |
204 | 1539 |
il_default_variable_type = &time_type_name; |
257 | 1540 |
else if (is_type(left_type, safedate_type_name_c) && is_type(right_type, safedate_type_name_c)) |
1541 |
il_default_variable_type = &safetime_type_name; |
|
1542 |
||
1543 |
else if (is_type(left_type, tod_type_name_c) && is_type(right_type, tod_type_name_c)) |
|
1544 |
il_default_variable_type = &time_type_name; |
|
1545 |
else if (is_type(left_type, safetod_type_name_c) && is_type(right_type, tod_type_name_c)) |
|
1546 |
il_default_variable_type = &time_type_name; |
|
1547 |
else if (is_type(left_type, tod_type_name_c) && is_type(right_type, safetod_type_name_c)) |
|
1548 |
il_default_variable_type = &time_type_name; |
|
1549 |
else if (is_type(left_type, safetod_type_name_c) && is_type(right_type, safetod_type_name_c)) |
|
1550 |
il_default_variable_type = &safetime_type_name; |
|
1551 |
||
1552 |
else if (is_type(left_type, dt_type_name_c) && is_type(right_type, dt_type_name_c)) |
|
1553 |
il_default_variable_type = &time_type_name; |
|
1554 |
else if (is_type(left_type, safedt_type_name_c) && is_type(right_type, dt_type_name_c)) |
|
1555 |
il_default_variable_type = &time_type_name; |
|
1556 |
else if (is_type(left_type, dt_type_name_c) && is_type(right_type, safedt_type_name_c)) |
|
1557 |
il_default_variable_type = &time_type_name; |
|
1558 |
else if (is_type(left_type, safedt_type_name_c) && is_type(right_type, safedt_type_name_c)) |
|
1559 |
il_default_variable_type = &safetime_type_name; |
|
1560 |
||
266
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1561 |
else il_default_variable_type = compute_expression(il_default_variable_type, il_operand_type, &visit_expression_type_c::is_ANY_MAGNITUDE_compatible, |
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1562 |
symbol , il_operand); |
204 | 1563 |
return NULL; |
1564 |
} |
|
1565 |
||
1566 |
// SYM_REF0(MUL_operator_c) |
|
1567 |
void *visit_expression_type_c::visit(MUL_operator_c *symbol) { |
|
1568 |
verify_null(symbol); |
|
1569 |
symbol_c *left_type = il_default_variable_type; |
|
1570 |
symbol_c *right_type = il_operand_type; |
|
257 | 1571 |
|
1572 |
if (is_type(left_type, time_type_name_c) && is_ANY_NUM_compatible(right_type)) |
|
204 | 1573 |
il_default_variable_type = &time_type_name; |
257 | 1574 |
else if (is_type(left_type, safetime_type_name_c) && is_ANY_NUM_type(right_type)) |
1575 |
il_default_variable_type = &time_type_name; |
|
1576 |
else if (is_type(left_type, safetime_type_name_c) && is_ANY_SAFENUM_type(right_type)) |
|
1577 |
il_default_variable_type = &safetime_type_name; |
|
1578 |
/* Since we have already checked for ANY_NUM_type and ANY_SAFENUM_type in the previous lines, |
|
1579 |
* this next line is really only to check for integers/reals of undefined type on 'right_type'... |
|
1580 |
*/ |
|
1581 |
else if (is_type(left_type, safetime_type_name_c) && is_ANY_NUM_compatible(right_type)) |
|
1582 |
il_default_variable_type = &safetime_type_name; |
|
1583 |
||
266
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1584 |
else il_default_variable_type = compute_expression(il_default_variable_type, il_operand_type, &visit_expression_type_c::is_ANY_NUM_compatible, |
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1585 |
symbol , il_operand); |
204 | 1586 |
return NULL; |
1587 |
} |
|
1588 |
||
1589 |
// SYM_REF0(DIV_operator_c) |
|
1590 |
void *visit_expression_type_c::visit(DIV_operator_c *symbol) { |
|
1591 |
verify_null(symbol); |
|
1592 |
symbol_c *left_type = il_default_variable_type; |
|
1593 |
symbol_c *right_type = il_operand_type; |
|
257 | 1594 |
|
1595 |
if (is_type(left_type, time_type_name_c) && is_ANY_NUM_compatible(right_type)) |
|
204 | 1596 |
il_default_variable_type = &time_type_name; |
257 | 1597 |
else if (is_type(left_type, safetime_type_name_c) && is_ANY_NUM_type(right_type)) |
1598 |
il_default_variable_type = &time_type_name; |
|
1599 |
else if (is_type(left_type, safetime_type_name_c) && is_ANY_SAFENUM_type(right_type)) |
|
1600 |
il_default_variable_type = &safetime_type_name; |
|
1601 |
/* Since we have already checked for ANY_NUM_type and ANY_SAFENUM_type in the previous lines, |
|
1602 |
* this next line is really only to check for integers/reals of undefined type on 'right_type'... |
|
1603 |
*/ |
|
1604 |
else if (is_type(left_type, safetime_type_name_c) && is_ANY_NUM_compatible(right_type)) |
|
1605 |
il_default_variable_type = &safetime_type_name; |
|
1606 |
||
266
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1607 |
else il_default_variable_type = compute_expression(il_default_variable_type, il_operand_type, &visit_expression_type_c::is_ANY_NUM_compatible, |
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1608 |
symbol , il_operand); |
204 | 1609 |
return NULL; |
1610 |
} |
|
1611 |
||
1612 |
// SYM_REF0(MOD_operator_c) |
|
1613 |
void *visit_expression_type_c::visit(MOD_operator_c *symbol) { |
|
1614 |
verify_null(symbol); |
|
360
f4ce1b1c2112
Print error messages when data type errors in ST expressions are detected.
Mario de Sousa <msousa@fe.up.pt>
parents:
350
diff
changeset
|
1615 |
il_default_variable_type = compute_expression(il_default_variable_type, il_operand_type, &visit_expression_type_c::is_ANY_INT_compatible, |
f4ce1b1c2112
Print error messages when data type errors in ST expressions are detected.
Mario de Sousa <msousa@fe.up.pt>
parents:
350
diff
changeset
|
1616 |
symbol , il_operand); |
204 | 1617 |
return NULL; |
1618 |
} |
|
1619 |
||
1620 |
// SYM_REF0(GT_operator_c) |
|
1621 |
void *visit_expression_type_c::visit(GT_operator_c *symbol) { |
|
1622 |
verify_null(symbol); |
|
266
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1623 |
compute_expression(il_default_variable_type, il_operand_type, &visit_expression_type_c::is_ANY_ELEMENTARY_compatible, |
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1624 |
symbol , il_operand); |
204 | 1625 |
il_default_variable_type = &search_expression_type_c::bool_type_name; |
1626 |
return NULL; |
|
1627 |
} |
|
1628 |
||
1629 |
//SYM_REF0(GE_operator_c) |
|
1630 |
void *visit_expression_type_c::visit(GE_operator_c *symbol) { |
|
1631 |
verify_null(symbol); |
|
266
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1632 |
compute_expression(il_default_variable_type, il_operand_type, &visit_expression_type_c::is_ANY_ELEMENTARY_compatible, |
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1633 |
symbol , il_operand); |
204 | 1634 |
il_default_variable_type = &search_expression_type_c::bool_type_name; |
1635 |
return NULL; |
|
1636 |
} |
|
1637 |
||
1638 |
//SYM_REF0(EQ_operator_c) |
|
1639 |
void *visit_expression_type_c::visit(EQ_operator_c *symbol) { |
|
1640 |
verify_null(symbol); |
|
266
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1641 |
compute_expression(il_default_variable_type, il_operand_type, &visit_expression_type_c::is_ANY_ELEMENTARY_compatible, |
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1642 |
symbol , il_operand); |
204 | 1643 |
il_default_variable_type = &search_expression_type_c::bool_type_name; |
1644 |
return NULL; |
|
1645 |
} |
|
1646 |
||
1647 |
//SYM_REF0(LT_operator_c) |
|
1648 |
void *visit_expression_type_c::visit(LT_operator_c *symbol) { |
|
1649 |
verify_null(symbol); |
|
266
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1650 |
compute_expression(il_default_variable_type, il_operand_type, &visit_expression_type_c::is_ANY_ELEMENTARY_compatible, |
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1651 |
symbol , il_operand); |
204 | 1652 |
il_default_variable_type = &search_expression_type_c::bool_type_name; |
1653 |
return NULL; |
|
1654 |
} |
|
1655 |
||
1656 |
//SYM_REF0(LE_operator_c) |
|
1657 |
void *visit_expression_type_c::visit(LE_operator_c *symbol) { |
|
1658 |
verify_null(symbol); |
|
266
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1659 |
compute_expression(il_default_variable_type, il_operand_type, &visit_expression_type_c::is_ANY_ELEMENTARY_compatible, |
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1660 |
symbol , il_operand); |
204 | 1661 |
il_default_variable_type = &search_expression_type_c::bool_type_name; |
1662 |
return NULL; |
|
1663 |
} |
|
1664 |
||
1665 |
//SYM_REF0(NE_operator_c) |
|
1666 |
void *visit_expression_type_c::visit(NE_operator_c *symbol) { |
|
1667 |
verify_null(symbol); |
|
266
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1668 |
compute_expression(il_default_variable_type, il_operand_type, &visit_expression_type_c::is_ANY_ELEMENTARY_compatible, |
2f6d8866ec8d
Fixing error messages for IL semantic errors (brocken in a previous changeset/commit).
Mario de Sousa <msousa@fe.up.pt>
parents:
263
diff
changeset
|
1669 |
symbol , il_operand); |
204 | 1670 |
il_default_variable_type = &search_expression_type_c::bool_type_name; |
1671 |
return NULL; |
|
1672 |
} |
|
1673 |
||
1674 |
// SYM_REF0(CAL_operator_c) |
|
1675 |
void *visit_expression_type_c::visit(CAL_operator_c *symbol) { |
|
1676 |
return NULL; |
|
1677 |
} |
|
1678 |
||
1679 |
// SYM_REF0(CALC_operator_c) |
|
1680 |
void *visit_expression_type_c::visit(CALC_operator_c *symbol) { |
|
1681 |
if(il_default_variable_type == NULL) |
|
1682 |
STAGE3_ERROR(symbol, symbol, "CALC: il default variable should not be NULL."); |
|
1683 |
if (!is_BOOL_type(il_default_variable_type)) |
|
1684 |
STAGE3_ERROR(symbol, symbol, "CALC operator requires il_default_variable to be of type BOOL."); |
|
1685 |
return NULL; |
|
1686 |
} |
|
1687 |
||
1688 |
// SYM_REF0(CALCN_operator_c) |
|
1689 |
void *visit_expression_type_c::visit(CALCN_operator_c *symbol) { |
|
1690 |
if(il_default_variable_type == NULL) |
|
1691 |
STAGE3_ERROR(symbol, symbol, "CALCN: il_default_variable should not be NULL."); |
|
1692 |
if (!is_BOOL_type(il_default_variable_type)) |
|
1693 |
STAGE3_ERROR(symbol, symbol, "CALCN operator requires il_default_variable to be of type BOOL."); |
|
1694 |
return NULL; |
|
1695 |
} |
|
1696 |
||
1697 |
// SYM_REF0(RET_operator_c) |
|
1698 |
void *visit_expression_type_c::visit(RET_operator_c *symbol) { |
|
1699 |
return NULL; |
|
1700 |
} |
|
1701 |
||
1702 |
// SYM_REF0(RETC_operator_c) |
|
1703 |
void *visit_expression_type_c::visit(RETC_operator_c *symbol) { |
|
1704 |
if(il_default_variable_type == NULL) |
|
1705 |
STAGE3_ERROR(symbol, symbol, "RETC: il default variable should not be NULL."); |
|
1706 |
if (!is_BOOL_type(il_default_variable_type)) |
|
1707 |
STAGE3_ERROR(symbol, symbol, "RETC operator requires il_default_variable to be of type BOOL."); |
|
1708 |
return NULL; |
|
1709 |
} |
|
1710 |
||
1711 |
// SYM_REF0(RETCN_operator_c) |
|
1712 |
void *visit_expression_type_c::visit(RETCN_operator_c *symbol) { |
|
1713 |
if(il_default_variable_type == NULL) |
|
1714 |
STAGE3_ERROR(symbol, symbol, "RETCN: il_default_variable should not be NULL."); |
|
1715 |
if (!is_BOOL_type(il_default_variable_type)) |
|
1716 |
STAGE3_ERROR(symbol, symbol, "RETCN operator requires il_default_variable to be of type BOOL."); |
|
1717 |
return NULL; |
|
1718 |
} |
|
1719 |
||
1720 |
// SYM_REF0(JMP_operator_c) |
|
1721 |
void *visit_expression_type_c::visit(JMP_operator_c *symbol){ |
|
1722 |
return NULL; |
|
1723 |
} |
|
1724 |
||
1725 |
// SYM_REF0(JMPC_operator_c) |
|
1726 |
void *visit_expression_type_c::visit(JMPC_operator_c *symbol) { |
|
1727 |
if(il_default_variable_type == NULL) |
|
1728 |
STAGE3_ERROR(symbol, symbol, "JMPC: il default variable should not be NULL."); |
|
1729 |
if (!is_BOOL_type(il_default_variable_type)) |
|
1730 |
STAGE3_ERROR(symbol, symbol, "JMPC operator requires il_default_variable to be of type BOOL."); |
|
1731 |
return NULL; |
|
1732 |
} |
|
1733 |
||
1734 |
// SYM_REF0(JMPCN_operator_c) |
|
1735 |
void *visit_expression_type_c::visit(JMPCN_operator_c *symbol) { |
|
1736 |
if(il_default_variable_type == NULL) |
|
1737 |
STAGE3_ERROR(symbol, symbol, "JMPCN: il_default_variable should not be NULL."); |
|
1738 |
if (!is_BOOL_type(il_default_variable_type)) |
|
1739 |
STAGE3_ERROR(symbol, symbol, "JMPCN operator requires il_default_variable to be of type BOOL."); |
|
1740 |
return NULL; |
|
1741 |
} |
|
1742 |
||
1743 |
/* Symbol class handled together with function call checks */ |
|
1744 |
/* any_identifier ASSIGN */ |
|
1745 |
// SYM_REF1(il_assign_operator_c, variable_name) |
|
1746 |
// void *visit_expression_type_c::visit(il_assign_operator_c *symbol, variable_name); |
|
1747 |
||
1748 |
/* Symbol class handled together with function call checks */ |
|
1749 |
/*| [NOT] any_identifier SENDTO */ |
|
1750 |
// SYM_REF2(il_assign_out_operator_c, option, variable_name) |
|
1751 |
// void *visit_expression_type_c::visit(il_assign_operator_c *symbol, option, variable_name); |
|
1752 |
||
1753 |
||
1754 |
||
1755 |
||
1756 |
||
1757 |
/***************************************/ |
|
1758 |
/* B.3 - Language ST (Structured Text) */ |
|
1759 |
/***************************************/ |
|
1760 |
/***********************/ |
|
1761 |
/* B 3.1 - Expressions */ |
|
1762 |
/***********************/ |
|
1763 |
||
1764 |
void *visit_expression_type_c::visit(or_expression_c *symbol) { |
|
1765 |
symbol_c *left_type = base_type((symbol_c *)symbol->l_exp->accept(*this)); |
|
1766 |
symbol_c *right_type = base_type((symbol_c *)symbol->r_exp->accept(*this)); |
|
360
f4ce1b1c2112
Print error messages when data type errors in ST expressions are detected.
Mario de Sousa <msousa@fe.up.pt>
parents:
350
diff
changeset
|
1767 |
return compute_expression(left_type, right_type, &visit_expression_type_c::is_ANY_BIT_compatible, symbol->l_exp, symbol->r_exp); |
204 | 1768 |
} |
1769 |
||
1770 |
||
1771 |
void *visit_expression_type_c::visit(xor_expression_c *symbol) { |
|
1772 |
symbol_c *left_type = base_type((symbol_c *)symbol->l_exp->accept(*this)); |
|
1773 |
symbol_c *right_type = base_type((symbol_c *)symbol->r_exp->accept(*this)); |
|
360
f4ce1b1c2112
Print error messages when data type errors in ST expressions are detected.
Mario de Sousa <msousa@fe.up.pt>
parents:
350
diff
changeset
|
1774 |
return compute_expression(left_type, right_type, &visit_expression_type_c::is_ANY_BIT_compatible, symbol->l_exp, symbol->r_exp); |
204 | 1775 |
} |
1776 |
||
1777 |
||
1778 |
void *visit_expression_type_c::visit(and_expression_c *symbol) { |
|
1779 |
symbol_c *left_type = base_type((symbol_c *)symbol->l_exp->accept(*this)); |
|
1780 |
symbol_c *right_type = base_type((symbol_c *)symbol->r_exp->accept(*this)); |
|
360
f4ce1b1c2112
Print error messages when data type errors in ST expressions are detected.
Mario de Sousa <msousa@fe.up.pt>
parents:
350
diff
changeset
|
1781 |
return compute_expression(left_type, right_type, &visit_expression_type_c::is_ANY_BIT_compatible, symbol->l_exp, symbol->r_exp); |
204 | 1782 |
} |
1783 |
||
1784 |
||
1785 |
void *visit_expression_type_c::visit(equ_expression_c *symbol) { |
|
1786 |
symbol_c *left_type = base_type((symbol_c *)symbol->l_exp->accept(*this)); |
|
1787 |
symbol_c *right_type = base_type((symbol_c *)symbol->r_exp->accept(*this)); |
|
360
f4ce1b1c2112
Print error messages when data type errors in ST expressions are detected.
Mario de Sousa <msousa@fe.up.pt>
parents:
350
diff
changeset
|
1788 |
compute_expression(left_type, right_type, &visit_expression_type_c::is_ANY_ELEMENTARY_compatible, symbol->l_exp, symbol->r_exp); |
204 | 1789 |
return &search_expression_type_c::bool_type_name; |
1790 |
} |
|
1791 |
||
1792 |
||
1793 |
void *visit_expression_type_c::visit(notequ_expression_c *symbol) { |
|
1794 |
symbol_c *left_type = base_type((symbol_c *)symbol->l_exp->accept(*this)); |
|
1795 |
symbol_c *right_type = base_type((symbol_c *)symbol->r_exp->accept(*this)); |
|
360
f4ce1b1c2112
Print error messages when data type errors in ST expressions are detected.
Mario de Sousa <msousa@fe.up.pt>
parents:
350
diff
changeset
|
1796 |
compute_expression(left_type, right_type, &visit_expression_type_c::is_ANY_ELEMENTARY_compatible, symbol->l_exp, symbol->r_exp); |
204 | 1797 |
return &search_expression_type_c::bool_type_name; |
1798 |
} |
|
1799 |
||
1800 |
||
1801 |
void *visit_expression_type_c::visit(lt_expression_c *symbol) { |
|
1802 |
symbol_c *left_type = base_type((symbol_c *)symbol->l_exp->accept(*this)); |
|
1803 |
symbol_c *right_type = base_type((symbol_c *)symbol->r_exp->accept(*this)); |
|
360
f4ce1b1c2112
Print error messages when data type errors in ST expressions are detected.
Mario de Sousa <msousa@fe.up.pt>
parents:
350
diff
changeset
|
1804 |
compute_expression(left_type, right_type, &visit_expression_type_c::is_ANY_ELEMENTARY_compatible, symbol->l_exp, symbol->r_exp); |
204 | 1805 |
return &search_expression_type_c::bool_type_name; |
1806 |
} |
|
1807 |
||
1808 |
||
1809 |
void *visit_expression_type_c::visit(gt_expression_c *symbol) { |
|
1810 |
symbol_c *left_type = base_type((symbol_c *)symbol->l_exp->accept(*this)); |
|
1811 |
symbol_c *right_type = base_type((symbol_c *)symbol->r_exp->accept(*this)); |
|
360
f4ce1b1c2112
Print error messages when data type errors in ST expressions are detected.
Mario de Sousa <msousa@fe.up.pt>
parents:
350
diff
changeset
|
1812 |
compute_expression(left_type, right_type, &visit_expression_type_c::is_ANY_ELEMENTARY_compatible, symbol->l_exp, symbol->r_exp); |
204 | 1813 |
return &search_expression_type_c::bool_type_name; |
1814 |
} |
|
1815 |
||
1816 |
||
1817 |
void *visit_expression_type_c::visit(le_expression_c *symbol) { |
|
1818 |
symbol_c *left_type = base_type((symbol_c *)symbol->l_exp->accept(*this)); |
|
1819 |
symbol_c *right_type = base_type((symbol_c *)symbol->r_exp->accept(*this)); |
|
360
f4ce1b1c2112
Print error messages when data type errors in ST expressions are detected.
Mario de Sousa <msousa@fe.up.pt>
parents:
350
diff
changeset
|
1820 |
compute_expression(left_type, right_type, &visit_expression_type_c::is_ANY_ELEMENTARY_compatible, symbol->l_exp, symbol->r_exp); |
204 | 1821 |
return &search_expression_type_c::bool_type_name; |
1822 |
} |
|
1823 |
||
1824 |
||
1825 |
void *visit_expression_type_c::visit(ge_expression_c *symbol) { |
|
1826 |
symbol_c *left_type = base_type((symbol_c *)symbol->l_exp->accept(*this)); |
|
1827 |
symbol_c *right_type = base_type((symbol_c *)symbol->r_exp->accept(*this)); |
|
360
f4ce1b1c2112
Print error messages when data type errors in ST expressions are detected.
Mario de Sousa <msousa@fe.up.pt>
parents:
350
diff
changeset
|
1828 |
compute_expression(left_type, right_type, &visit_expression_type_c::is_ANY_ELEMENTARY_compatible, symbol->l_exp, symbol->r_exp); |
204 | 1829 |
return &search_expression_type_c::bool_type_name; |
1830 |
} |
|
1831 |
||
1832 |
||
1833 |
void *visit_expression_type_c::visit(add_expression_c *symbol) { |
|
1834 |
symbol_c *left_type = base_type((symbol_c *)symbol->l_exp->accept(*this)); |
|
1835 |
symbol_c *right_type = base_type((symbol_c *)symbol->r_exp->accept(*this)); |
|
257 | 1836 |
|
1837 |
/* The following is already checked in compute_expression */ |
|
1838 |
/* |
|
1839 |
if (is_type(left_type, time_type_name_c) && is_type(right_type, time_type_name_c)) |
|
1840 |
return (void *)&time_type_name; |
|
1841 |
*/ |
|
1842 |
||
1843 |
if (is_type(left_type, tod_type_name_c) && is_type(right_type, time_type_name_c)) |
|
1844 |
return (void *)&tod_type_name; |
|
1845 |
if (is_type(left_type, safetod_type_name_c) && is_type(right_type, time_type_name_c)) |
|
1846 |
return (void *)&tod_type_name; |
|
1847 |
if (is_type(left_type, tod_type_name_c) && is_type(right_type, safetime_type_name_c)) |
|
1848 |
return (void *)&tod_type_name; |
|
1849 |
if (is_type(left_type, safetod_type_name_c) && is_type(right_type, safetime_type_name_c)) |
|
1850 |
return (void *)&safetod_type_name; |
|
1851 |
||
1852 |
if (is_type(left_type, dt_type_name_c) && is_type(right_type, time_type_name_c)) |
|
1853 |
return (void *)&dt_type_name; |
|
1854 |
if (is_type(left_type, safedt_type_name_c) && is_type(right_type, time_type_name_c)) |
|
1855 |
return (void *)&dt_type_name; |
|
1856 |
if (is_type(left_type, dt_type_name_c) && is_type(right_type, safetime_type_name_c)) |
|
1857 |
return (void *)&dt_type_name; |
|
1858 |
if (is_type(left_type, safedt_type_name_c) && is_type(right_type, safetime_type_name_c)) |
|
1859 |
return (void *)&safedt_type_name; |
|
1860 |
||
360
f4ce1b1c2112
Print error messages when data type errors in ST expressions are detected.
Mario de Sousa <msousa@fe.up.pt>
parents:
350
diff
changeset
|
1861 |
return compute_expression(left_type, right_type, &visit_expression_type_c::is_ANY_MAGNITUDE_compatible, symbol->l_exp, symbol->r_exp); |
204 | 1862 |
} |
1863 |
||
1864 |
||
1865 |
void *visit_expression_type_c::visit(sub_expression_c *symbol) { |
|
1866 |
symbol_c *left_type = base_type((symbol_c *)symbol->l_exp->accept(*this)); |
|
1867 |
symbol_c *right_type = base_type((symbol_c *)symbol->r_exp->accept(*this)); |
|
257 | 1868 |
|
1869 |
/* The following is already checked in compute_expression */ |
|
1870 |
/* |
|
1871 |
if (is_type(left_type, time_type_name_c) && is_type(right_type, time_type_name_c)) |
|
1872 |
return (void *)&time_type_name; |
|
1873 |
*/ |
|
1874 |
||
1875 |
if (is_type(left_type, tod_type_name_c) && is_type(right_type, time_type_name_c)) |
|
1876 |
return (void *)&tod_type_name; |
|
1877 |
if (is_type(left_type, safetod_type_name_c) && is_type(right_type, time_type_name_c)) |
|
1878 |
return (void *)&tod_type_name; |
|
1879 |
if (is_type(left_type, tod_type_name_c) && is_type(right_type, safetime_type_name_c)) |
|
1880 |
return (void *)&tod_type_name; |
|
1881 |
if (is_type(left_type, safetod_type_name_c) && is_type(right_type, safetime_type_name_c)) |
|
1882 |
return (void *)&safetod_type_name; |
|
1883 |
||
1884 |
if (is_type(left_type, dt_type_name_c) && is_type(right_type, time_type_name_c)) |
|
1885 |
return (void *)&dt_type_name; |
|
1886 |
if (is_type(left_type, safedt_type_name_c) && is_type(right_type, time_type_name_c)) |
|
1887 |
return (void *)&dt_type_name; |
|
1888 |
if (is_type(left_type, dt_type_name_c) && is_type(right_type, safetime_type_name_c)) |
|
1889 |
return (void *)&dt_type_name; |
|
1890 |
if (is_type(left_type, safedt_type_name_c) && is_type(right_type, safetime_type_name_c)) |
|
1891 |
return (void *)&safedt_type_name; |
|
1892 |
||
1893 |
if (is_type(left_type, tod_type_name_c) && is_type(right_type, tod_type_name_c)) |
|
1894 |
return (void *)&time_type_name; |
|
1895 |
if (is_type(left_type, safetod_type_name_c) && is_type(right_type, tod_type_name_c)) |
|
1896 |
return (void *)&time_type_name; |
|
1897 |
if (is_type(left_type, tod_type_name_c) && is_type(right_type, safetod_type_name_c)) |
|
1898 |
return (void *)&time_type_name; |
|
1899 |
if (is_type(left_type, safetod_type_name_c) && is_type(right_type, safetod_type_name_c)) |
|
1900 |
return (void *)&safetime_type_name; |
|
1901 |
||
1902 |
if (is_type(left_type, date_type_name_c) && is_type(right_type, date_type_name_c)) |
|
1903 |
return (void *)&time_type_name; |
|
1904 |
if (is_type(left_type, safedate_type_name_c) && is_type(right_type, date_type_name_c)) |
|
1905 |
return (void *)&time_type_name; |
|
1906 |
if (is_type(left_type, date_type_name_c) && is_type(right_type, safedate_type_name_c)) |
|
1907 |
return (void *)&time_type_name; |
|
1908 |
if (is_type(left_type, safedate_type_name_c) && is_type(right_type, safedate_type_name_c)) |
|
1909 |
return (void *)&safetime_type_name; |
|
1910 |
||
1911 |
if (is_type(left_type, dt_type_name_c) && is_type(right_type, dt_type_name_c)) |
|
1912 |
return (void *)&time_type_name; |
|
1913 |
if (is_type(left_type, safedt_type_name_c) && is_type(right_type, dt_type_name_c)) |
|
1914 |
return (void *)&time_type_name; |
|
1915 |
if (is_type(left_type, dt_type_name_c) && is_type(right_type, safedt_type_name_c)) |
|
1916 |
return (void *)&time_type_name; |
|
1917 |
if (is_type(left_type, safedt_type_name_c) && is_type(right_type, safedt_type_name_c)) |
|
1918 |
return (void *)&safetime_type_name; |
|
1919 |
||
360
f4ce1b1c2112
Print error messages when data type errors in ST expressions are detected.
Mario de Sousa <msousa@fe.up.pt>
parents:
350
diff
changeset
|
1920 |
return compute_expression(left_type, right_type, &visit_expression_type_c::is_ANY_MAGNITUDE_compatible, symbol->l_exp, symbol->r_exp); |
204 | 1921 |
} |
1922 |
||
1923 |
||
1924 |
void *visit_expression_type_c::visit(mul_expression_c *symbol) { |
|
1925 |
symbol_c *left_type = base_type((symbol_c *)symbol->l_exp->accept(*this)); |
|
1926 |
symbol_c *right_type = base_type((symbol_c *)symbol->r_exp->accept(*this)); |
|
257 | 1927 |
|
1928 |
if (is_type(left_type, time_type_name_c) && is_ANY_NUM_compatible(right_type)) |
|
1929 |
return (void *)&time_type_name; |
|
1930 |
if (is_type(left_type, safetime_type_name_c) && is_ANY_NUM_type(right_type)) |
|
1931 |
return (void *)&time_type_name; |
|
1932 |
if (is_type(left_type, safetime_type_name_c) && is_ANY_SAFENUM_type(right_type)) |
|
1933 |
return (void *)&safetime_type_name; |
|
1934 |
/* Since we have already checked for ANY_NUM_type and ANY_SAFENUM_type in the previous lines, |
|
1935 |
* this next line is really only to check for integers/reals of undefined type on 'right_type'... |
|
1936 |
*/ |
|
1937 |
if (is_type(left_type, safetime_type_name_c) && is_ANY_NUM_compatible(right_type)) |
|
1938 |
return (void *)&safetime_type_name; |
|
1939 |
||
360
f4ce1b1c2112
Print error messages when data type errors in ST expressions are detected.
Mario de Sousa <msousa@fe.up.pt>
parents:
350
diff
changeset
|
1940 |
return compute_expression(left_type, right_type, &visit_expression_type_c::is_ANY_NUM_compatible, symbol->l_exp, symbol->r_exp); |
204 | 1941 |
} |
1942 |
||
1943 |
||
1944 |
void *visit_expression_type_c::visit(div_expression_c *symbol) { |
|
1945 |
symbol_c *left_type = base_type((symbol_c *)symbol->l_exp->accept(*this)); |
|
1946 |
symbol_c *right_type = base_type((symbol_c *)symbol->r_exp->accept(*this)); |
|
257 | 1947 |
|
1948 |
if (is_type(left_type, time_type_name_c) && is_ANY_NUM_compatible(right_type)) |
|
1949 |
return (void *)&time_type_name; |
|
1950 |
if (is_type(left_type, safetime_type_name_c) && is_ANY_NUM_type(right_type)) |
|
1951 |
return (void *)&time_type_name; |
|
1952 |
if (is_type(left_type, safetime_type_name_c) && is_ANY_SAFENUM_type(right_type)) |
|
1953 |
return (void *)&safetime_type_name; |
|
1954 |
/* Since we have already checked for ANY_NUM_type and ANY_SAFENUM_type in the previous lines, |
|
1955 |
* this next line is really only to check for integers/reals of undefined type on 'right_type'... |
|
1956 |
*/ |
|
1957 |
if (is_type(left_type, safetime_type_name_c) && is_ANY_NUM_compatible(right_type)) |
|
1958 |
return (void *)&safetime_type_name; |
|
1959 |
||
360
f4ce1b1c2112
Print error messages when data type errors in ST expressions are detected.
Mario de Sousa <msousa@fe.up.pt>
parents:
350
diff
changeset
|
1960 |
return compute_expression(left_type, right_type, &visit_expression_type_c::is_ANY_NUM_compatible, symbol->l_exp, symbol->r_exp); |
204 | 1961 |
} |
1962 |
||
1963 |
||
1964 |
void *visit_expression_type_c::visit(mod_expression_c *symbol) { |
|
1965 |
symbol_c *left_type = base_type((symbol_c *)symbol->l_exp->accept(*this)); |
|
1966 |
symbol_c *right_type = base_type((symbol_c *)symbol->r_exp->accept(*this)); |
|
360
f4ce1b1c2112
Print error messages when data type errors in ST expressions are detected.
Mario de Sousa <msousa@fe.up.pt>
parents:
350
diff
changeset
|
1967 |
return compute_expression(left_type, right_type, &visit_expression_type_c::is_ANY_INT_compatible, symbol->l_exp, symbol->r_exp); |
204 | 1968 |
} |
1969 |
||
1970 |
||
1971 |
void *visit_expression_type_c::visit(power_expression_c *symbol) { |
|
1972 |
symbol_c *left_type = base_type((symbol_c *)symbol->l_exp->accept(*this)); |
|
1973 |
symbol_c *right_type = base_type((symbol_c *)symbol->r_exp->accept(*this)); |
|
257 | 1974 |
if (!is_ANY_REAL_compatible(left_type)) |
204 | 1975 |
STAGE3_ERROR(symbol->l_exp, symbol->l_exp, "first operand of ** operator has invalid data type, should be of type ANY_REAL."); |
257 | 1976 |
if (!is_ANY_NUM_compatible(right_type)) |
204 | 1977 |
STAGE3_ERROR(symbol->r_exp, symbol->r_exp, "second operand of ** operator has invalid data type, should be of type ANY_NUM."); |
1978 |
||
1979 |
return (void *)left_type; |
|
1980 |
} |
|
1981 |
||
1982 |
||
1983 |
void *visit_expression_type_c::visit(neg_expression_c *symbol) { |
|
1984 |
symbol_c *exp_type = base_type((symbol_c *)symbol->exp->accept(*this)); |
|
257 | 1985 |
if (!is_ANY_MAGNITUDE_compatible(exp_type)) |
204 | 1986 |
STAGE3_ERROR(symbol, symbol, "operand of negate expression '-' has invalid data type, should be of type ANY_MAGNITUDE."); |
1987 |
||
1988 |
return exp_type; |
|
1989 |
} |
|
1990 |
||
1991 |
||
1992 |
void *visit_expression_type_c::visit(not_expression_c *symbol) { |
|
1993 |
symbol_c *type = base_type((symbol_c *)symbol->exp->accept(*this)); |
|
360
f4ce1b1c2112
Print error messages when data type errors in ST expressions are detected.
Mario de Sousa <msousa@fe.up.pt>
parents:
350
diff
changeset
|
1994 |
return compute_expression(type, type, &visit_expression_type_c::is_ANY_BIT_compatible, NULL, symbol->exp); |
204 | 1995 |
} |
1996 |
||
1997 |
||
1998 |
void *visit_expression_type_c::visit(function_invocation_c *symbol) { |
|
350
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
1999 |
function_symtable_t::iterator lower = function_symtable.lower_bound(symbol->function_name); |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2000 |
function_symtable_t::iterator upper = function_symtable.upper_bound(symbol->function_name); |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2001 |
if (lower == function_symtable.end()) ERROR; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2002 |
|
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2003 |
function_symtable_t::iterator second = lower; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2004 |
second++; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2005 |
if (second == upper) { |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2006 |
/* call to a function that is not overloaded. */ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2007 |
/* now check the semantics of the function call... */ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2008 |
/* If the syntax parser is working correctly, exactly one of the |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2009 |
* following two symbols will be NULL, while the other is != NULL. |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2010 |
*/ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2011 |
function_declaration_c *f_decl = function_symtable.get_value(lower); |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2012 |
if (symbol-> formal_param_list != NULL) check_formal_call (symbol, f_decl); |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2013 |
if (symbol->nonformal_param_list != NULL) check_nonformal_call(symbol, f_decl); |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2014 |
/* Store the pointer to the declaration of the function being called. |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2015 |
* This data will be used by stage 4 to call the correct function. |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2016 |
* Mostly needed to disambiguate overloaded functions... |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2017 |
* See comments in absyntax.def for more details |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2018 |
*/ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2019 |
symbol->called_function_declaration = f_decl; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2020 |
return base_type(f_decl->type_name); |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2021 |
} |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2022 |
|
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2023 |
/* This is a call to an overloaded function... */ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2024 |
if (debug) printf("visit_expression_type_c::visit(function_invocation_c *symbol): FOUND CALL TO OVERLOADED FUNCTION!!\n"); |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2025 |
for(; lower != upper; lower++) { |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2026 |
if (debug) printf("visit_expression_type_c::visit(function_invocation_c *symbol): FOUND CALL TO OVERLOADED FUNCTION!! iterating...\n"); |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2027 |
int error_count = 0; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2028 |
function_declaration_c *f_decl = function_symtable.get_value(lower); |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2029 |
if (symbol-> formal_param_list != NULL) check_formal_call (symbol, f_decl, &error_count); |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2030 |
if (symbol->nonformal_param_list != NULL) check_nonformal_call(symbol, f_decl, false, &error_count); |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2031 |
if (0 == error_count) { |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2032 |
/* Store the pointer to the declaration of the function being called. |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2033 |
* This data will be used by stage 4 to call the correct function. |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2034 |
* Mostly needed to disambiguate overloaded functions... |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2035 |
* See comments in absyntax.def for more details |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2036 |
*/ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2037 |
symbol->called_function_declaration = f_decl; |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2038 |
return base_type(f_decl->type_name); |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2039 |
} |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2040 |
} |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2041 |
|
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2042 |
/* No compatible function was found for this function call */ |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2043 |
STAGE3_ERROR(symbol, symbol, "Call to an overloaded function with invalid parameter type."); |
2c3c4dc34979
Support for semantic verification of calls to standard functions.
Mario de Sousa <msousa@fe.up.pt>
parents:
333
diff
changeset
|
2044 |
return NULL; |
204 | 2045 |
} |
2046 |
||
2047 |
/********************/ |
|
2048 |
/* B 3.2 Statements */ |
|
2049 |
/********************/ |
|
2050 |
// SYM_LIST(statement_list_c) |
|
2051 |
/* The visitor of the base class search_visitor_c will handle calling each instruction in the list. |
|
2052 |
* We do not need to do anything here... |
|
2053 |
*/ |
|
2054 |
// void *visit_expression_type_c::visit(statement_list_c *symbol) |
|
2055 |
||
2056 |
||
2057 |
/*********************************/ |
|
2058 |
/* B 3.2.1 Assignment Statements */ |
|
2059 |
/*********************************/ |
|
2060 |
||
2061 |
void *visit_expression_type_c::visit(assignment_statement_c *symbol) { |
|
2062 |
symbol_c *left_type = base_type((symbol_c *)symbol->l_exp->accept(*this)); |
|
2063 |
symbol_c *right_type = base_type((symbol_c *)symbol->r_exp->accept(*this)); |
|
2064 |
||
305
fe5cb87610fa
When checking semantics of expressions, skip semantic checking of data type definitions
Mario de Sousa <msousa@fe.up.pt>
parents:
289
diff
changeset
|
2065 |
if (debug) { |
fe5cb87610fa
When checking semantics of expressions, skip semantic checking of data type definitions
Mario de Sousa <msousa@fe.up.pt>
parents:
289
diff
changeset
|
2066 |
printf("visit_expression_type_c::visit(assignment_statement_c) called. Checking --->"); |
fe5cb87610fa
When checking semantics of expressions, skip semantic checking of data type definitions
Mario de Sousa <msousa@fe.up.pt>
parents:
289
diff
changeset
|
2067 |
symbolic_variable_c *hi = dynamic_cast<symbolic_variable_c *>(symbol->l_exp); |
fe5cb87610fa
When checking semantics of expressions, skip semantic checking of data type definitions
Mario de Sousa <msousa@fe.up.pt>
parents:
289
diff
changeset
|
2068 |
if (hi != NULL) { |
fe5cb87610fa
When checking semantics of expressions, skip semantic checking of data type definitions
Mario de Sousa <msousa@fe.up.pt>
parents:
289
diff
changeset
|
2069 |
identifier_c *hi1 = dynamic_cast<identifier_c *>(hi->var_name); |
331 | 2070 |
if (hi1 != NULL) printf("%s", hi1->value); |
305
fe5cb87610fa
When checking semantics of expressions, skip semantic checking of data type definitions
Mario de Sousa <msousa@fe.up.pt>
parents:
289
diff
changeset
|
2071 |
} |
fe5cb87610fa
When checking semantics of expressions, skip semantic checking of data type definitions
Mario de Sousa <msousa@fe.up.pt>
parents:
289
diff
changeset
|
2072 |
printf(" := "); |
fe5cb87610fa
When checking semantics of expressions, skip semantic checking of data type definitions
Mario de Sousa <msousa@fe.up.pt>
parents:
289
diff
changeset
|
2073 |
hex_integer_c *hi2 = dynamic_cast<hex_integer_c *>(symbol->r_exp); |
331 | 2074 |
if (hi2 != NULL) printf("%s", hi2->value); |
305
fe5cb87610fa
When checking semantics of expressions, skip semantic checking of data type definitions
Mario de Sousa <msousa@fe.up.pt>
parents:
289
diff
changeset
|
2075 |
printf("\n"); |
fe5cb87610fa
When checking semantics of expressions, skip semantic checking of data type definitions
Mario de Sousa <msousa@fe.up.pt>
parents:
289
diff
changeset
|
2076 |
} // if (debug) |
367
6d94128ba5ad
Add checks for undefined structure elements used IEC 61131-3 source code being compiled.
Mario de Sousa <msousa@fe.up.pt>
parents:
365
diff
changeset
|
2077 |
|
6d94128ba5ad
Add checks for undefined structure elements used IEC 61131-3 source code being compiled.
Mario de Sousa <msousa@fe.up.pt>
parents:
365
diff
changeset
|
2078 |
if (NULL == left_type) { |
6d94128ba5ad
Add checks for undefined structure elements used IEC 61131-3 source code being compiled.
Mario de Sousa <msousa@fe.up.pt>
parents:
365
diff
changeset
|
2079 |
STAGE3_ERROR(symbol->l_exp, symbol->l_exp, "Could not determine data type of expression (undefined variable or strcuture element?).\n"); |
6d94128ba5ad
Add checks for undefined structure elements used IEC 61131-3 source code being compiled.
Mario de Sousa <msousa@fe.up.pt>
parents:
365
diff
changeset
|
2080 |
} else if (NULL == right_type) { |
6d94128ba5ad
Add checks for undefined structure elements used IEC 61131-3 source code being compiled.
Mario de Sousa <msousa@fe.up.pt>
parents:
365
diff
changeset
|
2081 |
STAGE3_ERROR(symbol->r_exp, symbol->r_exp, "Could not determine data type of expression (undefined variable or strcuture element?).\n"); |
6d94128ba5ad
Add checks for undefined structure elements used IEC 61131-3 source code being compiled.
Mario de Sousa <msousa@fe.up.pt>
parents:
365
diff
changeset
|
2082 |
} else if (!is_valid_assignment(left_type, right_type)) |
6d94128ba5ad
Add checks for undefined structure elements used IEC 61131-3 source code being compiled.
Mario de Sousa <msousa@fe.up.pt>
parents:
365
diff
changeset
|
2083 |
STAGE3_ERROR(symbol, symbol, "data type mismatch in assignment statement!\n"); |
6d94128ba5ad
Add checks for undefined structure elements used IEC 61131-3 source code being compiled.
Mario de Sousa <msousa@fe.up.pt>
parents:
365
diff
changeset
|
2084 |
|
204 | 2085 |
return NULL; |
2086 |
} |
|
2087 |
||
2088 |
||
2089 |
||
2090 |
/*****************************************/ |
|
2091 |
/* B 3.2.2 Subprogram Control Statements */ |
|
2092 |
/*****************************************/ |
|
2093 |
||
2094 |
/* RETURN */ |
|
2095 |
// SYM_REF0(return_statement_c) |
|
2096 |
||
2097 |
||
2098 |
/* fb_name '(' [param_assignment_list] ')' */ |
|
2099 |
/* param_assignment_list -> may be NULL ! */ |
|
2100 |
// SYM_REF3(fb_invocation_c, fb_name, formal_param_list, nonformal_param_list) |
|
2101 |
void *visit_expression_type_c::visit(fb_invocation_c *symbol) { |
|
321
a96399ab57c2
Add better comments, and change name of functions to clarify what they do.
Mario de Sousa <msousa@fe.up.pt>
parents:
319
diff
changeset
|
2102 |
symbol_c *fb_decl = search_varfb_instance_type->get_basetype_decl(symbol->fb_name); |
204 | 2103 |
/* The following should never occur. The function block must be defined, |
2104 |
* and the FB type being called MUST be in the symtable... |
|
2105 |
* This was all already checked at stage 2! |
|
2106 |
*/ |
|
2107 |
if (NULL == fb_decl) ERROR; |
|
2108 |
||
2109 |
/* now check the semantics of the fb call... */ |
|
2110 |
/* If the syntax parser is working correctly, exactly one of the |
|
2111 |
* following two symbols will be NULL, while the other is != NULL. |
|
2112 |
*/ |
|
2113 |
if (symbol-> formal_param_list != NULL) check_formal_call (symbol, fb_decl); |
|
2114 |
if (symbol->nonformal_param_list != NULL) check_nonformal_call(symbol, fb_decl); |
|
2115 |
||
2116 |
return NULL; |
|
2117 |
} |
|
2118 |
||
2119 |
||
2120 |
#if 0 |
|
2121 |
/* helper symbol for fb_invocation */ |
|
2122 |
/* param_assignment_list ',' param_assignment */ |
|
2123 |
SYM_LIST(param_assignment_list_c) |
|
2124 |
||
2125 |
/* variable_name ASSIGN expression */ |
|
2126 |
SYM_REF2(input_variable_param_assignment_c, variable_name, expression) |
|
2127 |
||
2128 |
/* [NOT] variable_name '=>' variable */ |
|
2129 |
SYM_REF3(output_variable_param_assignment_c, not_param, variable_name, variable) |
|
2130 |
||
2131 |
/* helper CLASS for output_variable_param_assignment */ |
|
2132 |
SYM_REF0(not_paramassign_c) |
|
2133 |
#endif |
|
2134 |
||
2135 |
/********************************/ |
|
2136 |
/* B 3.2.3 Selection Statements */ |
|
2137 |
/********************************/ |
|
2138 |
||
2139 |
/* IF expression THEN statement_list elseif_statement_list ELSE statement_list END_IF */ |
|
2140 |
// SYM_REF4(if_statement_c, expression, statement_list, elseif_statement_list, else_statement_list) |
|
2141 |
void *visit_expression_type_c::visit(if_statement_c *symbol) { |
|
2142 |
symbol_c *expr_type = base_type((symbol_c*)symbol->expression->accept(*this)); |
|
260
70dfd493e639
Error messages (stage3) now better identify the location of the error.
Mario de Sousa <msousa@fe.up.pt>
parents:
259
diff
changeset
|
2143 |
if (!is_BOOL_type(expr_type)) STAGE3_ERROR(symbol->expression,symbol->expression,"IF conditional expression is not of boolean type."); |
204 | 2144 |
if (NULL != symbol->statement_list) |
2145 |
symbol->statement_list->accept(*this); |
|
2146 |
if (NULL != symbol->elseif_statement_list) |
|
2147 |
symbol->elseif_statement_list->accept(*this); |
|
2148 |
if (NULL != symbol->else_statement_list) |
|
2149 |
symbol->else_statement_list->accept(*this); |
|
2150 |
return NULL; |
|
2151 |
} |
|
2152 |
||
2153 |
/* helper symbol for if_statement */ |
|
2154 |
// SYM_LIST(elseif_statement_list_c) |
|
2155 |
// void *visit_expression_type_c::visit(elseif_statement_list_c *symbol) { } |
|
2156 |
||
2157 |
/* helper symbol for elseif_statement_list */ |
|
2158 |
/* ELSIF expression THEN statement_list */ |
|
2159 |
// SYM_REF2(elseif_statement_c, expression, statement_list) |
|
2160 |
void *visit_expression_type_c::visit(elseif_statement_c *symbol) { |
|
2161 |
symbol_c *elseif_expr_type = base_type((symbol_c*)symbol->expression->accept(*this)); |
|
260
70dfd493e639
Error messages (stage3) now better identify the location of the error.
Mario de Sousa <msousa@fe.up.pt>
parents:
259
diff
changeset
|
2162 |
if(!is_BOOL_type(elseif_expr_type)) STAGE3_ERROR(symbol->expression,symbol->expression,"ELSIF conditional expression is not of boolean type."); |
204 | 2163 |
if (NULL != symbol->statement_list) |
2164 |
symbol->statement_list->accept(*this); |
|
2165 |
return NULL; |
|
2166 |
} |
|
2167 |
||
2168 |
||
2169 |
/* CASE expression OF case_element_list ELSE statement_list END_CASE */ |
|
2170 |
// SYM_REF3(case_statement_c, expression, case_element_list, statement_list) |
|
2171 |
void *visit_expression_type_c::visit(case_statement_c *symbol) { |
|
2172 |
case_expression_type = base_type((symbol_c*)symbol->expression->accept(*this)); |
|
2173 |
if (NULL != case_expression_type) { |
|
2174 |
if (NULL != symbol->case_element_list) |
|
2175 |
symbol->case_element_list->accept(*this); |
|
2176 |
} |
|
2177 |
if (NULL != symbol->statement_list) |
|
2178 |
symbol->statement_list->accept(*this); |
|
2179 |
return NULL; |
|
2180 |
} |
|
2181 |
||
2182 |
#if 0 |
|
2183 |
/* helper symbol for case_statement */ |
|
2184 |
// SYM_LIST(case_element_list_c) |
|
2185 |
// void *visit_expression_type_c::visit(case_element_list_c *symbol); |
|
2186 |
||
2187 |
/* case_list ':' statement_list */ |
|
2188 |
// SYM_REF2(case_element_c, case_list, statement_list) |
|
2189 |
void *visit_expression_type_c::visit(case_element_c *symbol); |
|
2190 |
#endif |
|
2191 |
||
2192 |
// SYM_LIST(case_list_c) |
|
2193 |
void *visit_expression_type_c::visit(case_list_c *symbol) { |
|
2194 |
symbol_c *element_type; |
|
2195 |
for(int i = 0; i < symbol->n; i++) { |
|
2196 |
element_type = (symbol_c *)symbol->elements[i]->accept(*this); |
|
2197 |
if (NULL == element_type) { |
|
2198 |
STAGE3_ERROR(symbol->elements[i], symbol->elements[i], "Case list element has undefined data type."); |
|
2199 |
} else { |
|
2200 |
element_type = base_type(element_type); |
|
2201 |
if (NULL != element_type){ |
|
257 | 2202 |
/* The CASE value is only used for comparison (and not assingment), so we only check for compatibility! */ |
204 | 2203 |
if (!is_compatible_type(case_expression_type, element_type)) |
2204 |
STAGE3_ERROR(symbol->elements[i], symbol->elements[i], "Invalid data type of case list element."); |
|
2205 |
} |
|
2206 |
} |
|
2207 |
} |
|
2208 |
return NULL; |
|
2209 |
} |
|
2210 |
||
2211 |
/********************************/ |
|
2212 |
/* B 3.2.4 Iteration Statements */ |
|
2213 |
/********************************/ |
|
2214 |
||
2215 |
/* FOR control_variable ASSIGN expression TO expression [BY expression] DO statement_list END_FOR */ |
|
2216 |
// SYM_REF5(for_statement_c, control_variable, beg_expression, end_expression, by_expression, statement_list) |
|
2217 |
void *visit_expression_type_c::visit(for_statement_c *symbol) { |
|
2218 |
symbol_c *var_type = (symbol_c*)symbol->control_variable->accept(*this); |
|
2219 |
if (NULL == var_type) ERROR; |
|
2220 |
var_type = base_type(var_type); |
|
2221 |
if (NULL == var_type) ERROR; |
|
2222 |
// ASSIGN |
|
2223 |
symbol_c *beg_expr_type = base_type((symbol_c*)symbol->beg_expression->accept(*this)); |
|
257 | 2224 |
if (NULL != beg_expr_type) { |
2225 |
/* The BEG value is assigned to the variable, so we check for assignment validity! */ |
|
2226 |
if(!is_valid_assignment(var_type, beg_expr_type)) |
|
260
70dfd493e639
Error messages (stage3) now better identify the location of the error.
Mario de Sousa <msousa@fe.up.pt>
parents:
259
diff
changeset
|
2227 |
STAGE3_ERROR(symbol->beg_expression, symbol->beg_expression, "Data type mismatch between control variable and initial value."); |
204 | 2228 |
} |
2229 |
// TO |
|
2230 |
symbol_c *end_expr_type = base_type((symbol_c*)symbol->end_expression->accept(*this)); |
|
2231 |
if (NULL != end_expr_type) { |
|
257 | 2232 |
/* The TO value is only used for comparison, so we only check for compatibility! */ |
2233 |
if(!is_compatible_type(var_type, end_expr_type)) |
|
260
70dfd493e639
Error messages (stage3) now better identify the location of the error.
Mario de Sousa <msousa@fe.up.pt>
parents:
259
diff
changeset
|
2234 |
STAGE3_ERROR(symbol->end_expression, symbol->end_expression, "Data type mismatch between control variable and final value."); |
204 | 2235 |
} |
2236 |
// BY |
|
2237 |
if(symbol->by_expression != NULL) { |
|
2238 |
symbol_c *by_expr_type = base_type((symbol_c*)symbol->by_expression->accept(*this)); |
|
2239 |
if (NULL != end_expr_type) { |
|
257 | 2240 |
/* The BY value is used in an expression (add, sub, ...), so we only check for compatibility! */ |
2241 |
if(!is_compatible_type(var_type, by_expr_type)) |
|
260
70dfd493e639
Error messages (stage3) now better identify the location of the error.
Mario de Sousa <msousa@fe.up.pt>
parents:
259
diff
changeset
|
2242 |
STAGE3_ERROR(symbol->by_expression, symbol->by_expression, "Data type mismatch between control variable and BY value."); |
204 | 2243 |
} |
2244 |
} |
|
2245 |
// DO |
|
2246 |
if (NULL != symbol->statement_list) |
|
2247 |
symbol->statement_list->accept(*this); |
|
2248 |
return NULL; |
|
2249 |
} |
|
2250 |
||
2251 |
||
2252 |
/* WHILE expression DO statement_list END_WHILE */ |
|
2253 |
// SYM_REF2(while_statement_c, expression, statement_list) |
|
2254 |
void *visit_expression_type_c::visit(while_statement_c *symbol) { |
|
2255 |
symbol_c *expr_type = base_type((symbol_c*)symbol->expression->accept(*this)); |
|
2256 |
if (NULL != expr_type) { |
|
2257 |
if(!is_BOOL_type(expr_type)) |
|
260
70dfd493e639
Error messages (stage3) now better identify the location of the error.
Mario de Sousa <msousa@fe.up.pt>
parents:
259
diff
changeset
|
2258 |
STAGE3_ERROR(symbol->expression,symbol->expression,"WHILE conditional expression is not of boolean type."); |
204 | 2259 |
} |
2260 |
||
2261 |
if (NULL != symbol->statement_list) |
|
2262 |
symbol->statement_list->accept(*this); |
|
2263 |
return NULL; |
|
2264 |
} |
|
2265 |
||
2266 |
/* REPEAT statement_list UNTIL expression END_REPEAT */ |
|
2267 |
// SYM_REF2(repeat_statement_c, statement_list, expression) |
|
2268 |
void *visit_expression_type_c::visit(repeat_statement_c *symbol) { |
|
2269 |
if (NULL != symbol->statement_list) |
|
2270 |
symbol->statement_list->accept(*this); |
|
2271 |
||
2272 |
symbol_c *expr_type = base_type((symbol_c*)symbol->expression->accept(*this)); |
|
2273 |
if (NULL != expr_type) { |
|
2274 |
if(!is_BOOL_type(expr_type)) |
|
260
70dfd493e639
Error messages (stage3) now better identify the location of the error.
Mario de Sousa <msousa@fe.up.pt>
parents:
259
diff
changeset
|
2275 |
STAGE3_ERROR(symbol->expression,symbol->expression,"REPEAT conditional expression is not of boolean type."); |
204 | 2276 |
} |
2277 |
return NULL; |
|
2278 |
} |
|
2279 |
||
2280 |
/* EXIT */ |
|
2281 |
// SYM_REF0(exit_statement_c) |
|
2282 |
||
2283 |
||
2284 |