diff options
Diffstat (limited to 'src/compiler/semantics.c')
-rw-r--r-- | src/compiler/semantics.c | 1962 |
1 files changed, 1962 insertions, 0 deletions
diff --git a/src/compiler/semantics.c b/src/compiler/semantics.c new file mode 100644 index 0000000..d0a766a --- /dev/null +++ b/src/compiler/semantics.c @@ -0,0 +1,1962 @@ +#include <string.h> +#include <assert.h> + +#include "semantics.h" +#include "parser.h" +#include "coerce.h" +#include "stdio.h" + +/* -DFLATCC_PORTABLE may help if inttypes.h is missing. */ +#ifndef PRId64 +#include <inttypes.h> +#endif + +/* Same order as enum! */ +static const char *fb_known_attribute_names[] = { + "", + "id", + "deprecated", + "original_order", + "force_align", + "bit_flags", + "nested_flatbuffer", + "key", + "required", + "hash", + "base64", + "base64url", + "primary_key", + "sorted", +}; + +static const int fb_known_attribute_types[] = { + vt_invalid, /* Unknowns have arbitrary types. */ + vt_uint, + vt_missing, + vt_missing, + vt_uint, + vt_missing, + vt_string, + vt_missing, + vt_missing, + vt_string, + vt_missing, + vt_missing, + vt_missing, + vt_missing, +}; + +static fb_scalar_type_t map_scalar_token_type(fb_token_t *t) +{ + switch (t->id) { + case tok_kw_uint64: + case tok_kw_ulong: + return fb_ulong; + case tok_kw_uint32: + case tok_kw_uint: + return fb_uint; + case tok_kw_uint16: + case tok_kw_ushort: + return fb_ushort; + case tok_kw_uint8: + case tok_kw_ubyte: + return fb_ubyte; + case tok_kw_char: + return fb_char; + case tok_kw_bool: + return fb_bool; + case tok_kw_int64: + case tok_kw_long: + return fb_long; + case tok_kw_int32: + case tok_kw_int: + return fb_int; + case tok_kw_int16: + case tok_kw_short: + return fb_short; + case tok_kw_int8: + case tok_kw_byte: + return fb_byte; + case tok_kw_float64: + case tok_kw_double: + return fb_double; + case tok_kw_float32: + case tok_kw_float: + return fb_float; + default: + return fb_missing_type; + } +} + +/* + * The flatc compiler currently has a 256 limit. + * + * Some target C compilers might respect anything above + * 16 and may reguire that PAD option of the C code generator. + */ +static inline int is_valid_align(uint64_t align) +{ + uint64_t n = 1; + if (align == 0 || align > FLATCC_FORCE_ALIGN_MAX) { + return 0; + } + while (n <= align) { + if (n == align) { + return 1; + } + n *= 2; + } + return 0; +} + +static inline uint64_t fb_align(uint64_t size, uint64_t align) +{ + assert(is_valid_align(align)); + + return (size + align - 1) & ~(align - 1); +} + +/* + * The FNV-1a 32-bit little endian hash is a FlatBuffers standard for + * transmission of type identifiers in a compact form, in particular as + * alternative file identifiers. Note that if hash becomes 0, we map it + * to hash(""). + */ +static inline void set_type_hash(fb_compound_type_t *ct) +{ + fb_ref_t *name; + fb_symbol_t *sym; + uint32_t hash; + + hash = fb_hash_fnv1a_32_init(); + if (ct->scope) { + for (name = ct->scope->name; name; name = name->link) { + hash = fb_hash_fnv1a_32_append(hash, name->ident->text, (size_t)name->ident->len); + hash = fb_hash_fnv1a_32_append(hash, ".", 1); + } + } + sym = &ct->symbol; + hash = fb_hash_fnv1a_32_append(hash, sym->ident->text, (size_t)sym->ident->len); + if (hash == 0) { + hash = fb_hash_fnv1a_32_init(); + } + ct->type_hash = hash; +} + +static inline fb_scope_t *fb_find_scope_by_string(fb_schema_t *S, const char *name, size_t len) +{ + if (!S || !S->root_schema) { + return 0; + } + if (len == 0) { + /* Global scope. */ + name = 0; + } + return fb_scope_table_find(&S->root_schema->scope_index, name, len); +} + +/* count = 0 indicates zero-terminated ref list, name = 0 indicates global scope. */ +static inline fb_scope_t *fb_find_scope_by_ref(fb_schema_t *S, const fb_ref_t *name, int count) +{ + if (!S || !S->root_schema) { + return 0; + } + return fb_scope_table_find(&S->root_schema->scope_index, name, (size_t)(-count)); +} + +static inline fb_symbol_t *define_fb_symbol(fb_symbol_table_t *si, fb_symbol_t *sym) +{ + return fb_symbol_table_insert_item(si, sym, ht_keep); +} + +static inline fb_symbol_t *find_fb_symbol_by_token(fb_symbol_table_t *si, fb_token_t *token) +{ + return fb_symbol_table_find(si, token->text, (size_t)token->len); +} + +static inline fb_name_t *define_fb_name(fb_name_table_t *ni, fb_name_t *name) +{ + return fb_name_table_insert_item(ni, name, ht_keep); +} + +static inline fb_name_t *find_fb_name_by_token(fb_name_table_t *ni, fb_token_t *token) +{ + return fb_name_table_find(ni, token->text, (size_t)token->len); +} + +/* Returns 1 if value exists, 0 otherwise, */ +static inline int add_to_value_set(fb_value_set_t *vs, fb_value_t *value) +{ + return fb_value_set_insert_item(vs, value, ht_keep) != 0; +} + +static inline int is_in_value_set(fb_value_set_t *vs, fb_value_t *value) +{ + return 0 != fb_value_set_find_item(vs, value); +} + +/* + * An immediate parent scope does not necessarily exist and it might + * appear in a later search, so we return the nearest existing parent + * and do not cache the parent. + */ +static inline fb_scope_t *find_parent_scope(fb_parser_t *P, fb_scope_t *scope) +{ + fb_ref_t *p; + int count; + fb_scope_t *parent; + + parent = 0; + count = 0; + if (scope == 0) { + return 0; + } + p = scope->name; + while (p) { + ++count; + p = p->link; + } + if (count == 0) { + return 0; + } + while (count-- > 1) { + if ((parent = fb_find_scope_by_ref(&P->schema, scope->name, count))) { + return parent; + } + } + /* Root scope. */ + return fb_find_scope_by_ref(&P->schema, 0, 0); +} + +static inline fb_symbol_t *lookup_string_reference(fb_parser_t *P, fb_scope_t *local, const char *s, size_t len) +{ + fb_symbol_t *sym; + fb_scope_t *scope; + const char *name, *basename; + size_t k; + + name = s; + basename = s; + k = len; + while (k > 0) { + if (s[--k] == '.') { + basename = s + k + 1; + --len; + break; + } + } + len -= k; + if (local && k == 0) { + do { + if ((sym = fb_symbol_table_find(&local->symbol_index, basename, len))) { + if (get_compound_if_visible(&P->schema, sym)) { + return sym; + } + } + local = find_parent_scope(P, local); + } while (local); + return 0; + } + if (!(scope = fb_find_scope_by_string(&P->schema, name, k))) { + return 0; + } + return fb_symbol_table_find(&scope->symbol_index, basename, len); +} + +/* + * First search the optional local scope, then the scope of the namespace prefix if any. + * If `enumval` is non-zero, the last namepart is stored in that + * pointer and the lookup stops before that part. + * + * If the reference is prefixed with a namespace then the scope is + * looked up relative to root then the basename is searched in that + * scope. + * + * If the refernce is not prefixed with a namespace then the name is + * search in the local symbol table (which may be the root if null) and + * if that fails, the nearest existing parent scope is used as the new + * local scope and the process is repeated until local is root. + * + * This means that namespace prefixes cannot be relative to a parent + * namespace or to the current scope, but simple names can be found in a + * parent namespace. + */ +static inline fb_symbol_t *lookup_reference(fb_parser_t *P, fb_scope_t *local, fb_ref_t *name, fb_ref_t **enumval) +{ + fb_ref_t *basename, *last, *p; + fb_scope_t *scope; + fb_symbol_t *sym; + int count; + + count = 0; + scope = 0; + p = name; + last = 0; + basename = 0; + while (p) { + basename = last; + last = p; + p = p->link; + ++count; + } + if (enumval) { + --count; + *enumval = last; + } else { + basename = last; + } + if (!basename) { + return 0; + } + if (local && count == 1) { + do { + if ((sym = find_fb_symbol_by_token(&local->symbol_index, basename->ident))) { + if (get_compound_if_visible(&P->schema, sym)) { + return sym; + } + } + local = find_parent_scope(P, local); + } while (local); + return 0; + } + /* Null name is valid in scope lookup, indicating global scope. */ + if (count == 1) { + name = 0; + } + if (!(scope = fb_find_scope_by_ref(&P->schema, name, count - 1))) { + return 0; + } + sym = find_fb_symbol_by_token(&scope->symbol_index, basename->ident); + if (sym && get_compound_if_visible(&P->schema, sym)) { + return sym; + } + return 0; +} + +static inline fb_symbol_t *lookup_type_reference(fb_parser_t *P, fb_scope_t *local, fb_ref_t *name) +{ + return lookup_reference(P, local, name, 0); +} + +/* + * `ct` is null when looking up names for scalar types and otherwise it is + * the enum type being assigned. The provided reference may reference + * an enum value in the `ct` type, or another enum if a scope/type is + * given. + */ +static inline int lookup_enum_name(fb_parser_t *P, fb_scope_t *local, fb_compound_type_t *ct, fb_ref_t *ref, fb_value_t *value) +{ + fb_symbol_t *sym; + fb_ref_t *enumval; + fb_member_t *member; + + enumval = 0; + assert(ref); + assert(ct == 0 || ct->symbol.kind == fb_is_enum); + sym = lookup_reference(P, local, ref, &enumval); + if (sym && sym->kind == fb_is_enum) { + ct = (fb_compound_type_t *)sym; + } else if (ref->link) { + /* If there was a scope / type prefix, it was not found, or it was not an enum type. */ + return -1; + } + if (!ct) { + return -1; + } + sym = find_fb_symbol_by_token(&ct->index, enumval->ident); + if (!sym) { + return -1; + } + member = (fb_member_t *)sym; + *value = member->value; + return 0; +} + +/* This is repeated for every include file, but this pose no problem. */ +static void install_known_attributes(fb_parser_t *P) +{ + unsigned int i; + fb_attribute_t *a; + + for (i = 0; i < KNOWN_ATTR_COUNT; ++i) { + /* Don't put it in the parsed list, just the index. */ + a = new_elem(P, sizeof(*a)); + a->known = i; + a->name.name.s.s = (char *)fb_known_attribute_names[i]; + a->name.name.s.len = (int)strlen(fb_known_attribute_names[i]); + a->name.name.type = vt_string; + a->name.link = 0; + if ((a = (fb_attribute_t *)define_fb_name(&P->schema.root_schema->attribute_index, &a->name))) { + /* + * If the user alredy defined the attribute, keep that instead. + * (Memory leak is ok here.) + */ + a->known = i; + } + } +} + +static void revert_order(fb_compound_type_t **list) { + fb_compound_type_t *next, *prev = 0, *link = *list; + + while (link) { + next = link->order; + link->order = prev; + prev = link; + link = next; + } + *list = prev; +} + +static inline unsigned short process_metadata(fb_parser_t *P, fb_metadata_t *m, + uint16_t expect, fb_metadata_t *out[KNOWN_ATTR_COUNT]) +{ + uint16_t flags; + unsigned int i, n = FLATCC_ATTR_MAX; + int type; + fb_attribute_t *a; + + memset(out, 0, sizeof(out[0]) * KNOWN_ATTR_COUNT); + for (flags = 0; m && n; --n, m = m->link) { + a = (fb_attribute_t *)find_fb_name_by_token(&P->schema.root_schema->attribute_index, m->ident); + if (!a) { + error_tok(P, m->ident, "unknown attribute not declared"); + continue; + } + if (!(i = a->known)) { + continue; + } + if (!((1 << i) & expect)) { + error_tok(P, m->ident, "known attribute not expected in this context"); + continue; + } + flags |= 1 << i; + if (out[i]) { + error_tok(P, m->ident, "known attribute listed multiple times"); + continue; + } + out[i] = m; + type = fb_known_attribute_types[i]; + if (type == vt_missing && m->value.type != vt_missing) { + error_tok(P, m->ident, "known attribute does not expect a value"); + continue; + } + if (type == vt_string && m->value.type != vt_string) { + error_tok(P, m->ident, "known attribute expects a string"); + continue; + } + if (type == vt_uint && m->value.type != vt_uint) { + error_tok(P, m->ident, "known attribute expects an unsigned integer"); + continue; + } + if (type == vt_int && m->value.type != vt_uint && m->value.type != vt_int) { + error_tok(P, m->ident, "known attribute expects an integer"); + continue; + } + if (type == vt_bool && m->value.type != vt_bool) { + error_tok(P, m->ident, "known attribute expects 'true' or 'false'"); + continue; + } + } + if (m) { + error_tok(P, m->ident, "too many attributes"); + } + return flags; +} + +/* + * Recursive types are allowed, according to FlatBuffers Internals doc., + * but this cannot be possible for structs because they have no default + * value or null option, and can only hold scalars and other structs, so + * recursion would never terminate. Enums are simple types and cannot be + * recursive either. Unions reference tables which may reference unions, + * and recursion works well here. Tables allow any other table, union, + * or scalar value to be optional or default, so recursion is possible. + * In conclusion, Unions and Table members may reference all other + * types, and self. Enums are trivially checked because the only allow + * scalars, which leaves structs that can build illegal forms. + * + * Object instances cannot be recursive meaning the object graph is + * always a tree, but this isn't really a concern for the schema + * compiler, and for the builder it happens naturally as it only adds to + * the buffer (though a compressor might reuse old data without + * violating the tree?). + * + * Conclusion: check structs for circular references and allow + * everything else to unfold, provided they otherwise pass type checks. + * + * Algorithm: + * + * Depth first search of the struct reference tree. We maintain flags to + * find back-links. We prune sub-trees already fully analyzed by using + * the closed flag. This operation is O(N) since each struct member is + * visited once. + * + * Recursion is limited to prevent blowing the stack and to protect + * against abuse. + */ +static int analyze_struct(fb_parser_t *P, fb_compound_type_t *ct) +{ + fb_symbol_t *sym; + fb_compound_type_t *type; + fb_member_t *member; + int ret = 0; + uint64_t size; + uint16_t align; + fb_token_t *t; + + assert(ct->symbol.kind == fb_is_struct); + + assert(!(ct->symbol.flags & fb_circular_open)); + if (ct->symbol.flags & fb_circular_closed) { + return 0; + } + assert(!ct->order); + ct->symbol.flags |= fb_circular_open; + align = 1; + for (sym = ct->members; sym; sym = sym->link) { + type = 0; + if (P->nesting_level >= FLATCC_NESTING_MAX) { + error(P, "maximum allowed nesting level exceeded while processing struct hierarchy"); + return -1; + } + member = (fb_member_t *)sym; + switch (member->type.type) { + case vt_fixed_array_type: + case vt_scalar_type: + t = member->type.t; + member->type.st = map_scalar_token_type(t); + size = sizeof_scalar_type(member->type.st); + if (size < 1) { + error_sym_tok(P, sym, "unexpected type", t); + return -1; + } + member->align = (uint16_t)size; + member->size = size * member->type.len; + break; + case vt_fixed_array_compound_type_ref: + case vt_compound_type_ref: + /* Enums might not be valid, but then it would be detected earlier. */ + if (member->type.ct->symbol.kind == fb_is_enum) { + type = member->type.ct; + size = type->size; + member->align = (uint16_t)size; + member->size = member->type.len * type->size; + break; + } else if (member->type.ct->symbol.kind == fb_is_struct) { + type = member->type.ct; + if (type->symbol.flags & fb_circular_open) { + error_sym_2(P, sym, "circular reference to struct at", &type->symbol); + return -1; + } + if (!(type->symbol.flags & fb_circular_closed)) { + if (P->opts.hide_later_struct) { + error_sym_2(P, sym, "dependency on later defined struct not permitted with current settings", &type->symbol); + } + ++P->nesting_level; + ret = analyze_struct(P, type); + --P->nesting_level; + if (ret) { + return ret; + } + } + member->align = type->align; + member->size = member->type.len * type->size; + break; + } else { + error_sym(P, sym, "unexpected compound type for field"); + return -1; + } + break; + case vt_invalid: + /* Old error. */ + return -1; + default: + error_sym(P, sym, "unexpected type"); + return -1; + } + member->offset = fb_align(ct->size, member->align); + if (member->offset < ct->size || member->offset + member->size < member->offset) { + error_sym(P, sym, "struct size overflow"); + return -1; + } + size = member->offset + member->size; + if (size < ct->size || size > FLATCC_STRUCT_MAX_SIZE) { + error_sym(P, sym, "struct field overflows maximum allowed struct size"); + }; + ct->size = size; + /* + * FB spec is not very clear on this - but experimentally a + * force aligned member struct will force that alignment upon a + * containing struct if the alignment would otherwise be + * smaller. In otherwise, a struct is aligned to the alignment + * of the largest member, not just the largest scalar member + * (directly or indirectly). + */ + if (align < member->align) { + align = member->align; + } + } + if (ct->align > 0) { + if (align > ct->align) { + error_sym(P, &ct->symbol, "'force_align' cannot be smaller than natural alignment for"); + ct->align = align; + } + } else { + ct->align = align; + } + /* Add trailing padding if necessary. */ + ct->size = fb_align(ct->size, ct->align); + + if (ct->size == 0) { + error_sym(P, &ct->symbol, "struct cannot be empty"); + return -1; + } + + ct->symbol.flags |= fb_circular_closed; + ct->symbol.flags &= (uint16_t)~fb_circular_open; + ct->order = P->schema.ordered_structs; + P->schema.ordered_structs = ct; + return ret; +} + +static int define_nested_table(fb_parser_t *P, fb_scope_t *local, fb_member_t *member, fb_metadata_t *m) +{ + fb_symbol_t *type_sym; + + if (member->type.type != vt_vector_type || member->type.st != fb_ubyte) { + error_tok(P, m->ident, "'nested_flatbuffer' attribute requires a [ubyte] vector type"); + return -1; + } + if (m->value.type != vt_string) { + /* All known attributes get automatically type checked, so just ignore. */ + return -1; + } + type_sym = lookup_string_reference(P, local, m->value.s.s, (size_t)m->value.s.len); + if (!type_sym) { + error_tok_as_string(P, m->ident, "nested reference not found", m->value.s.s, (size_t)m->value.s.len); + return -1; + } + if (type_sym->kind != fb_is_table) { + if (!P->opts.allow_struct_root) { + error_tok_2(P, m->ident, "nested reference does not refer to a table", type_sym->ident); + return -1; + } + if (type_sym->kind != fb_is_struct) { + error_tok_2(P, m->ident, "nested reference does not refer to a table or a struct", type_sym->ident); + return -1; + } + } + member->nest = (fb_compound_type_t *)type_sym; + return 0; +} + +static int process_struct(fb_parser_t *P, fb_compound_type_t *ct) +{ + fb_symbol_t *sym, *old, *type_sym; + fb_member_t *member; + fb_metadata_t *knowns[KNOWN_ATTR_COUNT], *m; + uint16_t allow_flags; + int key_count = 0, primary_count = 0, key_ok = 0; + + if (ct->type.type) { + error_sym(P, &ct->symbol, "internal error: struct cannot have a type"); + return -1; + } + ct->metadata_flags = process_metadata(P, ct->metadata, fb_f_force_align, knowns); + if ((m = knowns[fb_attr_force_align])) { + if (!is_valid_align(m->value.u)) { + error_sym(P, &ct->symbol, "'force_align' exceeds maximum permitted alignment or is not a power of 2"); + } else { + /* This may still fail on natural alignment size. */ + ct->align = (uint16_t)m->value.u; + } + } + for (sym = ct->members; sym; sym = sym->link) { + if ((old = define_fb_symbol(&ct->index, sym))) { + error_sym_2(P, sym, "struct field already defined here", old); + continue; + } + if (sym->kind != fb_is_member) { + error_sym(P, sym, "internal error: field type expected"); + return -1; + } + key_ok = 1; + member = (fb_member_t *)sym; + allow_flags = 0; + /* Notice the difference between fb_f_ and fb_attr_ (flag vs index). */ + if (P->opts.allow_struct_field_key) { + allow_flags |= fb_f_key; + if (P->opts.allow_primary_key) { + allow_flags |= fb_f_primary_key; + } + } + if (P->opts.allow_struct_field_deprecate) { + allow_flags |= fb_f_deprecated; + } + member->metadata_flags = process_metadata(P, member->metadata, allow_flags, knowns); + switch (member->type.type) { + case vt_fixed_array_type_ref: + key_ok = 0; + goto lbl_type_ref; + case vt_type_ref: +lbl_type_ref: + type_sym = lookup_type_reference(P, ct->scope, member->type.ref); + if (!type_sym) { + error_ref_sym(P, member->type.ref, "unknown type reference used with struct field", sym); + member->type.type = vt_invalid; + continue; + } + member->type.ct = (fb_compound_type_t*)type_sym; + member->type.type = member->type.type == vt_fixed_array_type_ref ? + vt_fixed_array_compound_type_ref : vt_compound_type_ref; + if (type_sym->kind != fb_is_struct) { + if (P->opts.allow_enum_struct_field) { + if (type_sym->kind != fb_is_enum) { + error_sym_2(P, sym, "struct fields can only be scalars, structs, and enums, or arrays of these, but has type", type_sym); + member->type.type = vt_invalid; + return -1; + } + if (!P->opts.allow_enum_key) { + key_ok = 0; + break; + } + } else { + error_sym_2(P, sym, "struct fields can only be scalars and structs, or arrays of these, but has type", type_sym); + member->type.type = vt_invalid; + return -1; + } + } else { + key_ok = 0; + } + break; + case vt_fixed_array_string_type: + error_sym(P, sym, "fixed length arrays cannot have string elements"); + member->type.type = vt_invalid; + return -1; + case vt_fixed_array_type: + key_ok = 0; + break; + case vt_scalar_type: + break; + default: + error_sym(P, sym, "struct member member can only be of struct scalar, or fixed length scalar array type"); + return -1; + } + if (!key_ok) { + if (member->metadata_flags & fb_f_key) { + member->type.type = vt_invalid; + error_sym(P, sym, "key attribute now allowed for this kind of field"); + return -1; + } + if (member->metadata_flags & fb_f_primary_key) { + member->type.type = vt_invalid; + error_sym(P, sym, "primary_key attribute now allowed for this kind of field"); + return -1; + } + } + if (member->metadata_flags & fb_f_deprecated) { + if (member->metadata_flags & fb_f_key) { + error_sym(P, sym, "key attribute not allowed for deprecated struct member"); + return -1; + } else if (member->metadata_flags & fb_f_primary_key) { + error_sym(P, sym, "primary_key attribute not allowed for deprecated struct member"); + return -1; + } + } + if (member->metadata_flags & fb_f_key) { + if (member->metadata_flags & fb_f_primary_key) { + error_sym(P, sym, "primary_key attribute conflicts with key attribute"); + member->type.type = vt_invalid; + return -1; + } + key_count++; + if (!ct->primary_key) { + /* First key is primary key if no primary key is given explicitly. */ + ct->primary_key = member; + } + } else if (member->metadata_flags & fb_f_primary_key) { + if (primary_count++) { + error_sym(P, sym, "at most one struct member can have a primary_key attribute"); + member->type.type = vt_invalid; + return -1; + } + key_count++; + /* Allow backends to treat primary key as an ordinary key. */ + member->metadata_flags |= fb_f_key; + ct->primary_key = member; + } + if (member->value.type) { + error_sym(P, sym, "struct member member cannot have a default value"); + continue; + } + } + if (key_count) { + ct->symbol.flags |= fb_indexed; + } + /* Set primary key flag for backends even if chosen by default. */ + if (ct->primary_key) { + ct->primary_key->metadata_flags |= fb_f_primary_key; + } + if (key_count > 1 && !P->opts.allow_multiple_key_fields) { + error_sym(P, &ct->symbol, "table has multiple key fields, but at most one is permitted"); + return -1; + } + return 0; +} + +static fb_member_t *original_order_members(fb_parser_t *P, fb_member_t *next) +{ + fb_member_t *head = 0; + fb_member_t **tail = &head; + + /* Not used for now, but in case we need error messages etc. */ + (void)P; + + while (next) { + *tail = next; + tail = &next->order; + next = (fb_member_t *)(((fb_symbol_t *)next)->link); + } + *tail = 0; + return head; +} + +/* + * Alignment of table offset fields are generally not stored, and + * vectors store the element alignment for scalar types, so we + * detect alignment based on type also. Unions are tricky since they + * use a single byte type followed by an offset, but it is impractical + * to store these separately so we sort by the type field. + */ +static fb_member_t *align_order_members(fb_parser_t *P, fb_member_t *members) +{ + uint16_t i, j, k; + fb_member_t *heads[9] = {0}; + fb_member_t **tails[9] = {0}; + fb_member_t *next = members; + + while (next) { + k = next->align; + switch (next->type.type) { + case vt_compound_type_ref: + switch (next->type.ct->symbol.kind) { + case fb_is_struct: + case fb_is_enum: + k = next->type.ct->align; + break; + case fb_is_union: + /* + * Unions align to their offsets because the type can + * always be added last in a second pass since it is 1 + * byte. + */ + k = (uint16_t)P->opts.offset_size; + break; + default: + k = (uint16_t)P->opts.offset_size; + break; + } + break; + case vt_vector_compound_type_ref: + case vt_string_type: + case vt_vector_type: + case vt_vector_string_type: + k = (uint16_t)P->opts.offset_size; + break; + case vt_invalid: + /* Just to have some sane behavior. */ + return original_order_members(P, members); + default: + k = next->align; + break; + } + assert(k > 0); + i = 0; + while (k >>= 1) { + ++i; + } + /* Normally the largest alignment is 256, but otherwise we group them together. */ + if (i > 7) { + i = 7; + } + if (!heads[i]) { + heads[i] = next; + } else { + *tails[i] = next; + } + tails[i] = &next->order; + next = (fb_member_t *)(((fb_symbol_t *)next)->link); + } + i = j = 8; + tails[8] = &heads[8]; + while (j) { + while (i && !heads[--i]) { + } + *tails[j] = heads[i]; + j = i; + } + return heads[8]; +} + +/* Temporary markers only used during assignment of field identifiers. */ +enum { unused_field = 0, normal_field, type_field }; + +static int process_table(fb_parser_t *P, fb_compound_type_t *ct) +{ + char msg_buf [100]; + fb_symbol_t *sym, *old, *type_sym; + fb_member_t *member; + fb_metadata_t *knowns[KNOWN_ATTR_COUNT], *m; + int ret = 0; + uint64_t count = 0; + int need_id = 0, id_failed = 0; + uint64_t max_id = 0; + int key_ok, key_count = 0, primary_count = 0; + int is_union_vector, is_vector; + uint64_t i, j; + int max_id_errors = 10; + int allow_flags = 0; + + /* + * This just tracks the presence of a `normal_field` or a hidden + * `type_field`. The size is litmited to 16-bit unsigned offsets. + * It is only of relevance for ithe optional `id` table field + * attribute. + */ + uint8_t *field_marker = 0; + fb_symbol_t **field_index = 0; + + assert(ct->symbol.kind == fb_is_table); + assert(!ct->type.type); + + ct->metadata_flags = process_metadata(P, ct->metadata, fb_f_original_order, knowns); + /* + * `original_order` now lives as a flag, we need not consider it + * further until code generation. + */ + for (sym = ct->members; sym; sym = sym->link) { + key_ok = 0; + type_sym = 0; + is_vector = 0; + is_union_vector = 0; + if ((old = define_fb_symbol(&ct->index, sym))) { + error_sym_2(P, sym, "table member already defined here", old); + continue; + } + if (sym->kind != fb_is_member) { + error_sym(P, sym, "internal error: member type expected"); + return -1; + } + member = (fb_member_t *)sym; + if (member->type.type == vt_invalid) { + continue; + } + if (member->type.type == vt_scalar_type || member->type.type == vt_vector_type) { + member->type.st = map_scalar_token_type(member->type.t); + } + allow_flags = + fb_f_id | fb_f_nested_flatbuffer | fb_f_deprecated | fb_f_key | + fb_f_required | fb_f_hash | fb_f_base64 | fb_f_base64url | fb_f_sorted; + + if (P->opts.allow_primary_key) { + allow_flags |= fb_f_primary_key; + } + member->metadata_flags = process_metadata(P, member->metadata, (uint16_t)allow_flags, knowns); + if ((m = knowns[fb_attr_nested_flatbuffer])) { + define_nested_table(P, ct->scope, member, m); + } + /* Note: we allow base64 and base64url with nested attribute. */ + if ((member->metadata_flags & fb_f_base64) && + (member->type.type != vt_vector_type || member->type.st != fb_ubyte)) { + error_sym(P, sym, "'base64' attribute is only allowed on vectors of type ubyte"); + } + if ((member->metadata_flags & fb_f_base64url) && + (member->type.type != vt_vector_type || member->type.st != fb_ubyte)) { + error_sym(P, sym, "'base64url' attribute is only allowed on vectors of type ubyte"); + } + if ((member->metadata_flags & (fb_f_base64 | fb_f_base64url)) == + (fb_f_base64 | fb_f_base64url)) { + error_sym(P, sym, "'base64' and 'base64url' attributes cannot both be set"); + } + m = knowns[fb_attr_id]; + if (m && count == 0) { + need_id = 1; + field_marker = P->tmp_field_marker; + memset(field_marker, 0, (size_t)P->opts.vt_max_count); + } + if (!id_failed) { + if (count >= P->opts.vt_max_count) { + error_sym(P, sym, "too many fields for vtable size"); + id_failed = 1; + } else if (!need_id) { + member->id = (unsigned short)count; + } + ++count; + } + switch (member->type.type) { + case vt_scalar_type: + if (member->value.type == vt_null) { + member->value.type = vt_uint; + member->value.u = 0; + member->flags |= fb_fm_optional; + } + if (member->metadata_flags & fb_f_required) { + if (member->flags & fb_fm_optional) { + error_sym(P, sym, "'required' attribute is incompatible with optional table field (= null)"); + } else { + error_sym(P, sym, "'required' attribute is redundant on scalar table field"); + } + } + key_ok = 1; + if (member->value.type == vt_name_ref) { + if (lookup_enum_name(P, ct->scope, 0, member->value.ref, &member->value)) { + error_ref_sym(P, member->value.ref, "unknown name used as initializer for scalar field", sym); + member->type.type = vt_invalid; + continue; + } + } + if (!member->value.type) { + /* + * Simplifying by ensuring we always have a default + * value where an initializer is possible (also goes for enum). + */ + member->value.type = vt_uint; + member->value.u = 0; + } + if (fb_coerce_scalar_type(P, sym, member->type.st, &member->value)) { + member->type.type = vt_invalid; + continue; + } + member->size = sizeof_scalar_type(member->type.st); + member->align = (uint16_t)member->size; + break; + case vt_vector_type: + is_vector = 1; + member->size = sizeof_scalar_type(member->type.st); + member->align =(uint16_t) member->size; + if (member->value.type) { + error_sym(P, sym, "scalar vectors cannot have an initializer"); + member->type.type = vt_invalid; + continue; + } + break; + case vt_fixed_array_type_ref: + case vt_fixed_array_string_type: + case vt_fixed_array_type: + error_sym(P, sym, "fixed length arrays can only be used with structs"); + member->type.type = vt_invalid; + return -1; + case vt_string_type: + /* `size` or `align` not defined - these are implicit uoffset types. */ + key_ok = P->opts.allow_string_key; + if (member->value.type) { + error_sym(P, sym, "strings cannot have an initializer"); + member->type.type = vt_invalid; + continue; + } + break; + case vt_vector_string_type: + is_vector = 1; + /* `size` or `align` not defined - these are implicit uoffset types. */ + if (member->value.type) { + error_sym(P, sym, "string vectors cannot have an initializer"); + member->type.type = vt_invalid; + continue; + } + break; + case vt_type_ref: + type_sym = lookup_type_reference(P, ct->scope, member->type.ref); + if (!type_sym) { + error_ref_sym(P, member->type.ref, "unknown type reference used with table field", sym); + member->type.type = vt_invalid; + /* We cannot count id's without knowing if it is a union. */ + id_failed = 1; + continue; + } + switch (type_sym->kind) { + case fb_is_enum: + /* + * Note the enums without a 0 element requires an + * initializer in the schema, but that cannot happen + * with a null value, so in this case the value is force + * to 0. This is only relevant when using the `_get()` + * accessor instead of the `_option()`. + */ + if (member->value.type == vt_null) { + member->value.type = vt_uint; + member->value.u = 0; + member->flags |= fb_fm_optional; + } + if (member->metadata_flags & fb_f_required) { + if (member->flags & fb_fm_optional) { + error_sym(P, sym, "'required' attribute is incompatible with optional enum table field (= null)"); + } else { + error_sym(P, sym, "'required' attribute is redundant on enum table field"); + } + } + key_ok = P->opts.allow_enum_key; + break; + case fb_is_table: + case fb_is_struct: + case fb_is_union: + break; + case fb_is_rpc_service: + error_sym_2(P, sym, "rpc service is not a valid table field type", type_sym); + member->type.type = vt_invalid; + continue; + default: + error_sym_2(P, sym, "internal error: unexpected field type", type_sym); + member->type.type = vt_invalid; + continue; + } + member->type.type = vt_compound_type_ref; + member->type.ct = (fb_compound_type_t*)type_sym; + /* + * Note: this information transfer won't always work because + * structs do not know their full size at this point so + * codegen must use the member->type.ct values. + */ + member->size = member->type.ct->size; + member->align = member->type.ct->align; + + if (type_sym->kind == fb_is_union && !id_failed) { + /* Hidden union type field. */ + if (!need_id) { + member->id = (unsigned short)count; + } + ++count; + } + if (member->value.type) { + if (type_sym->kind != fb_is_enum) { + error_sym(P, sym, "non-scalar field cannot have an initializer"); + member->type.type = vt_invalid; + continue; + } + if (member->value.type == vt_name_ref) { + if (lookup_enum_name(P, ct->scope, member->type.ct, member->value.ref, &member->value)) { + error_ref_sym(P, member->value.ref, "unknown name used as initializer for enum field", sym); + member->type.type = vt_invalid; + continue; + } + } else { + if (fb_coerce_scalar_type(P, sym, ((fb_compound_type_t *)type_sym)->type.st, &member->value)) { + member->type.type = vt_invalid; + continue; + } + /* Bitflags can have complex combinations of values, and do not nativele have a 0 value. */ + if (P->opts.strict_enum_init && !(member->type.ct->metadata_flags & fb_f_bit_flags) + && !(member->flags & fb_fm_optional)) { + if (!is_in_value_set(&member->type.ct->value_set, &member->value)) { + error_sym(P, sym, "initializer does not match a defined enum value"); + member->type.type = vt_invalid; + continue; + } + } + } + } else { + /* Enum is the only type that cannot always default to 0. */ + if (type_sym->kind == fb_is_enum) { + member->value.type = vt_uint; + member->value.u = 0; + if (fb_coerce_scalar_type(P, type_sym, ((fb_compound_type_t *)type_sym)->type.st, &member->value)) { + member->type.type = vt_invalid; + continue; + } + if (P->opts.strict_enum_init) { + /* TODO: consider if this error is necessary for bit_flags - flatc 2.0.0 errors on this. */ + if (!is_in_value_set(&member->type.ct->value_set, &member->value)) { + error_sym_2(P, sym, + "enum type requires an explicit initializer because it has no 0 value", type_sym); + member->type.type = vt_invalid; + continue; + } + } + } + } + break; + case vt_vector_type_ref: + type_sym = lookup_type_reference(P, ct->scope, member->type.ref); + if (!type_sym) { + error_ref_sym(P, member->type.ref, "unknown vector type reference used with table field", sym); + member->type.type = vt_invalid; + continue; + } + switch (type_sym->kind) { + case fb_is_enum: + case fb_is_table: + case fb_is_struct: + case fb_is_union: + break; + default: + /* Vectors of strings are handled separately but this is irrelevant to the user. */ + error_sym_tok(P, sym, "vectors can only hold scalars, structs, enums, strings, tables, and unions", member->type.t); + member->type.type = vt_invalid; + continue; + } + is_vector = 1; + is_union_vector = type_sym->kind == fb_is_union; + if (member->value.type) { + error_sym(P, sym, "non-scalar field cannot have an initializer"); + member->type.type = vt_invalid; + continue; + } + /* Size of the vector element, not of the vector itself. */ + member->type.type = vt_vector_compound_type_ref; + member->type.ct = (fb_compound_type_t*)type_sym; + member->size = member->type.ct->size; + member->align = member->type.ct->align; + if (type_sym->kind == fb_is_union && !id_failed) { + /* Hidden union type field. */ + if (!need_id) { + member->id = (unsigned short)count; + } + ++count; + } + break; + default: + error_sym(P, sym, "unexpected table field type encountered"); + member->type.type = vt_invalid; + continue; + } + if (!id_failed) { + if (m && !need_id && !id_failed) { + error_tok(P, m->ident, "unexpected id attribute, must be used on all fields, or none"); + id_failed = 1; + } else if (!m && need_id && !id_failed) { + error_sym(P, sym, "id attribute missing, must be used on all fields, or none"); + id_failed = 1; + } else if (m) { + if (m->value.type == vt_uint) { + if (m->value.u >= P->opts.vt_max_count) { + error_sym(P, sym, "id too large to fit in vtable"); + id_failed = 1; + } else { + member->id = (unsigned short)m->value.u; + if (member->id > max_id) { + max_id = member->id; + } + } + } else if (m->value.type == vt_int) { + error_tok(P, m->ident, "id attribute cannot be negative"); + id_failed = 1; + } else { + error_tok(P, m->ident, "unexpecte id attribute type"); + id_failed = 1; + } + } + } + if (need_id && !id_failed) { + if (field_marker[member->id] == type_field) { + error_tok(P, m->ident, "id attribute value conflicts with a hidden type field"); + id_failed = normal_field; + } else if (field_marker[member->id]) { + error_tok(P, m->ident, "id attribute value conflicts with another field"); + } else { + field_marker[member->id] = normal_field; + } + if (!id_failed && type_sym && type_sym->kind == fb_is_union) { + if (member->id <= 1) { + error_tok(P, m->ident, is_union_vector ? + "id attribute value should be larger to accommodate hidden union vector type field" : + "id attribute value should be larger to accommodate hidden union type field"); + id_failed = 1; + } else if (field_marker[member->id - 1] == type_field) { + error_tok(P, m->ident, is_union_vector ? + "hidden union vector type field below attribute id value conflicts with another hidden type field" : + "hidden union type field below attribute id value conflicts with another hidden type field"); + id_failed = 1; + } else if (field_marker[member->id - 1]) { + error_tok(P, m->ident, is_union_vector ? + "hidden union vector type field below attribute id value conflicts with another field" : + "hidden union type field below attribute id value conflicts with another field"); + id_failed = 1; + } else { + field_marker[member->id - 1] = type_field; + } + } + } + if (member->metadata_flags & fb_f_deprecated) { + if (member->metadata_flags & fb_f_key) { + error_sym(P, sym, "key attribute not allowed for deprecated field"); + return -1; + } else if (member->metadata_flags & fb_f_primary_key) { + error_sym(P, sym, "primary_key attribute not allowed for deprecated field"); + return -1; + } + } + if (member->metadata_flags & fb_f_key) { + ++key_count; + if (!key_ok) { + error_sym(P, sym, "key attribute not allowed for this kind of field"); + member->type.type = vt_invalid; + } else if (member->metadata_flags & fb_f_primary_key) { + error_sym(P, sym, "primary_key attribute conflicts with key attribute"); + member->type.type = vt_invalid; + } else if (!ct->primary_key || + (primary_count == 0 && ct->primary_key->id > member->id)) { + /* + * Set key field with lowest id as default primary key + * unless a key field also has a primary attribute. + */ + ct->primary_key = member; + } + } else if (member->metadata_flags & fb_f_primary_key) { + if (member->metadata_flags & fb_f_primary_key) { + if (primary_count++) { + error_sym(P, sym, "at most one field can have a primary_key attribute"); + member->type.type = vt_invalid; + continue; + } else { + ct->primary_key = member; + } + } + key_count++; + /* Allow backends to treat primary key as an ordinary key. */ + member->metadata_flags |= fb_f_key; + } + if (member->metadata_flags & fb_f_sorted) { + if (is_union_vector) { + error_sym(P, sym, "sorted attribute not allowed for union vectors"); + member->type.type = vt_invalid; + return -1; + } else if (!is_vector) { + error_sym(P, sym, "sorted attribute only allowed for vectors"); + member->type.type = vt_invalid; + return -1; + } + /* + * A subsequent call to validate_table_attr will verify that a + * sorted vector of tables or structs have a defined field + * key. This cannot be done before all types have been + * processed. + */ + } + } + if (!id_failed) { + ct->count = count; + } + if (!id_failed && need_id) { + if (count && max_id >= count) { + for (i = 0; i < max_id; ++i) { + if (field_marker[i] == 0) { + if (!max_id_errors--) { + error_sym(P, &ct->symbol, "... more id's missing"); + break; + } + sprintf(msg_buf, "id range not consequtive from 0, missing id: %"PRIu64"", i); + error_sym(P, &ct->symbol, msg_buf); + } + } + id_failed = 1; + } + } + /* Order in which data is ordered in binary buffer. */ + if (ct->metadata_flags & fb_f_original_order) { + ct->ordered_members = original_order_members(P, (fb_member_t *)ct->members); + } else { + /* Size efficient ordering. */ + ct->ordered_members = align_order_members(P, (fb_member_t *)ct->members); + } + if (!id_failed && need_id && count > 0) { + field_index = P->tmp_field_index; + memset(field_index, 0, sizeof(field_index[0]) * (size_t)P->opts.vt_max_count); + /* + * Reorder by id so table constructor arguments in code + * generators always use same ordering across versions. + */ + for (sym = ct->members; sym; sym = sym->link) { + member = (fb_member_t *)sym; + field_index[member->id] = sym; + } + j = 0; + if (field_index[0] == 0) { + j = 1; /* Adjust for union type. */ + } + ct->members = field_index[j]; + for (i = j + 1; i <= max_id; ++i) { + if (field_index[i] == 0) ++i; /* Adjust for union type. */ + field_index[j]->link = field_index[i]; + j = i; + } + field_index[max_id]->link = 0; + } + if (key_count) { + ct->symbol.flags |= fb_indexed; + } + /* Set primary key flag for backends even if chosen by default. */ + if (ct->primary_key) { + ct->primary_key->metadata_flags |= fb_f_primary_key; + } + if (key_count > 1 && !P->opts.allow_multiple_key_fields) { + error_sym(P, &ct->symbol, "table has multiple key fields, but at most one is permitted"); + ret = -1; + } + if (id_failed) { + ret = -1; + } + return ret; +} + +/* + * Post processing of process_table because some information is only + * available when all types have been processed. + */ +static int validate_table_attr(fb_parser_t *P, fb_compound_type_t *ct) +{ + fb_symbol_t *sym; + fb_member_t *member; + + for (sym = ct->members; sym; sym = sym->link) { + member = (fb_member_t *)sym; + if (member->metadata_flags & fb_f_deprecated) { + continue; + } + + if (member->type.type == vt_vector_compound_type_ref && + member->metadata_flags & fb_f_sorted) { + switch (member->type.ct->symbol.kind) { + case fb_is_table: + if (!member->type.ct->primary_key) { + error_sym(P, sym, "sorted table vector only valid when table has a key field"); + return -1; + } + break; + case fb_is_struct: + if (!member->type.ct->primary_key) { + error_sym(P, sym, "sorted struct vector only valid when struct has a key field"); + return -1; + } + break; + /* Other cases already handled in process_table. */ + default: + continue; + } + } + } + return 0; +} + +/* + * The parser already makes sure we have exactly one request type, + * one response type, and no initializer. + * + * We are a bit heavy on flagging attributes because their behavior + * isn't really specified at this point. + */ +static int process_rpc_service(fb_parser_t *P, fb_compound_type_t *ct) +{ + fb_symbol_t *sym, *old, *type_sym; + fb_member_t *member; +#if FLATCC_ALLOW_RPC_SERVICE_ATTRIBUTES || FLATCC_ALLOW_RPC_METHOD_ATTRIBUTES + fb_metadata_t *knowns[KNOWN_ATTR_COUNT]; +#endif + + assert(ct->symbol.kind == fb_is_rpc_service); + assert(!ct->type.type); + + /* + * Deprecated is defined for fields - but it is unclear if this also + * covers rpc services. Anyway, we accept it since it may be useful, + * and does not harm. + */ +#if FLATCC_ALLOW_RPC_SERVICE_ATTRIBUTES + /* But we have no known attributes to support. */ + ct->metadata_flags = process_metadata(P, ct->metadata, 0, knowns); +#else + if (ct->metadata) { + error_sym(P, &ct->symbol, "rpc services cannot have attributes"); + /* Non-fatal. */ + } +#endif + + /* + * `original_order` now lives as a flag, we need not consider it + * further until code generation. + */ + for (sym = ct->members; sym; sym = sym->link) { + type_sym = 0; + if ((old = define_fb_symbol(&ct->index, sym))) { + error_sym_2(P, sym, "rpc method already defined here", old); + continue; + } + if (sym->kind != fb_is_member) { + error_sym(P, sym, "internal error: member type expected"); + return -1; + } + member = (fb_member_t *)sym; + if (member->value.type) { + error_sym(P, sym, "internal error: initializer should have been rejected by parser"); + } + if (member->type.type == vt_invalid) { + continue; + } + if (member->type.type != vt_type_ref) { + error_sym(P, sym, "internal error: request type expected to be a type reference"); + } + type_sym = lookup_type_reference(P, ct->scope, member->req_type.ref); + if (!type_sym) { + error_ref_sym(P, member->req_type.ref, "unknown type reference used with rpc request type", sym); + member->type.type = vt_invalid; + continue; + } else { + if (type_sym->kind != fb_is_table) { + error_sym_2(P, sym, "rpc request type must reference a table, defined here", type_sym); + member->type.type = vt_invalid; + continue; + } + member->req_type.type = vt_compound_type_ref; + member->req_type.ct = (fb_compound_type_t*)type_sym; + } + type_sym = lookup_type_reference(P, ct->scope, member->type.ref); + if (!type_sym) { + error_ref_sym(P, member->type.ref, "unknown type reference used with rpc response type", sym); + member->type.type = vt_invalid; + continue; + } else { + if (type_sym->kind != fb_is_table) { + error_sym_2(P, sym, "rpc response type must reference a table, defined here", type_sym); + member->type.type = vt_invalid; + continue; + } + member->type.type = vt_compound_type_ref; + member->type.ct = (fb_compound_type_t*)type_sym; + /* Symbols have no size. */ + member->size = 0; + } +#if FLATCC_ALLOW_RPC_METHOD_ATTRIBUTES +#if FLATCC_ALLOW_DEPRECATED_RPC_METHOD + member->metadata_flags = process_metadata(P, member->metadata, fb_f_deprecated, knowns); +#else + member->metadata_flags = process_metadata(P, member->metadata, 0, knowns); +#endif +#else + if (member->metadata) { + error_sym(P, sym, "rpc methods cannot have attributes"); + /* Non-fatal. */ + continue; + } +#endif + } + return 0; +} + +static int process_enum(fb_parser_t *P, fb_compound_type_t *ct) +{ + fb_symbol_t *sym, *old, *type_sym; + fb_member_t *member; + fb_metadata_t *knowns[KNOWN_ATTR_COUNT]; + fb_value_t index = { { { 0 } }, 0, 0 }; + fb_value_t old_index; + int first = 1; + int bit_flags = 0; + int is_union = ct->symbol.kind == fb_is_union; + + if (!is_union) { + assert(ct->symbol.kind == fb_is_enum); + if (!ct->type.type) { + ct->type.type = vt_invalid; + error_sym(P, &ct->symbol, "enum must have a type"); + return -1; + } + if (ct->type.type == vt_missing) { + /* + * Enums normally require a type, but the parser may have an + * option to allow missing type, and then we provide a + * sensible default. + */ + ct->type.st = fb_int; + ct->type.type = vt_scalar_type; + } else if (ct->type.type == vt_scalar_type) { + ct->type.st = map_scalar_token_type(ct->type.t); + } else { + /* Spec does not mention boolean type in enum, but we allow it. */ + error_sym(P, &ct->symbol, "enum type must be a scalar integral type or bool"); + return -1; + } + ct->size = sizeof_scalar_type(ct->type.st); + ct->align = (uint16_t)ct->size; + } else { + if (ct->type.type) { + error_sym(P, &ct->symbol, "unions cannot have a type, they are always enumerated as ubyte"); + return -1; + } + /* + * We preprocess unions as enums to get the value assignments. + * The type field is not documented, but generated output from + * flatc suggests ubyte. We use a an injected token to represent + * the ubyte type so we do not have to hardcode elsewhere. + */ + ct->type.type = vt_scalar_type; + ct->type.st = fb_ubyte; + /* + * The union field use the type field and not the offset field + * to define its size because type.type is scalar. + */ + ct->size = sizeof_scalar_type(fb_ubyte); + ct->align = (uint16_t)ct->size; + } + + ct->metadata_flags = process_metadata(P, ct->metadata, fb_f_bit_flags, knowns); + if (ct->metadata_flags & fb_f_bit_flags) { + bit_flags = 1; + index.type = vt_uint; + index.u = 0; + } + + if (ct->type.st == fb_bool) { + index.b = 0; + index.type = vt_bool; + } else { + index.i = 0; + index.type = vt_int; + if (fb_coerce_scalar_type(P, (fb_symbol_t *)ct, ct->type.st, &index)) { + error(P, "internal error: unexpected conversion failure on enum 0 index"); + return -1; + } + } + old_index = index; + + for (sym = ct->members; sym; sym = sym->link, first = 0) { + member = (fb_member_t *)sym; + if ((old = define_fb_symbol(&ct->index, sym))) { + if (old->ident == &P->t_none) { + /* + * Parser injects `NONE` as the first union member and + * it therefore gets index 0. Additional use of NONE + * will fail. + */ + error_sym(P, sym, "'NONE' is a predefined value"); + member->type.type = vt_invalid; + continue; + } + error_sym_2(P, sym, "value already defined here", old); + member->type.type = vt_invalid; + continue; + } + if (sym->kind != fb_is_member) { + error_sym(P, sym, "internal error: enum value type expected"); + return -1; + } + /* Enum / union values cannot have metadata. */ + assert(member->metadata == 0); + if (is_union) { + if (member->symbol.ident == &P->t_none) { + /* Handle implicit NONE specially. */ + member->type.type = vt_missing; + } else if (member->type.type == vt_string_type) { + member->size = 0; + } else if (member->type.type != vt_type_ref) { + if (member->type.type != vt_invalid) { + error_sym(P, sym, "union member type must be string or a reference to a table or a struct"); + member->type.type = vt_invalid; + } + continue; + } else { + type_sym = lookup_type_reference(P, ct->scope, member->type.ref); + if (!type_sym) { + error_ref_sym(P, member->type.ref, "unknown type reference used with union member", sym); + member->type.type = vt_invalid; + continue; + } else { + if (type_sym->kind != fb_is_table && type_sym->kind != fb_is_struct) { + error_sym_2(P, sym, "union member type reference must be a table or a struct, defined here", type_sym); + member->type.type = vt_invalid; + continue; + } + member->type.type = vt_compound_type_ref; + member->type.ct = (fb_compound_type_t*)type_sym; + /* Symbols have no size. */ + member->size = 0; + } + } + } + if (!member->value.type && !first) { + if (index.type == vt_uint) { + if (ct->type.st == fb_long && index.u == UINT64_MAX) { + /* Not captured by range check. */ + error_sym(P, sym, "64-bit unsigned int overflow"); + } + index.u = index.u + 1; + } else if (index.type == vt_int && !first) { + if (ct->type.st == fb_long && index.i == INT64_MAX) { + /* Not captured by range check. */ + error_sym(P, sym, "64-bit signed int overflow"); + } + index.i = index.i + 1; + } else if (index.type == vt_bool && !first) { + if (index.b == 1) { + error_sym(P, sym, "boolean overflow: cannot enumerate past true"); + } + index.b = 1; + } + } + if (bit_flags) { + if (member->value.type) { + if (member->value.type != vt_uint) { + error_sym(P, sym, "enum value must be unsigned int when used with 'bit_flags'"); + return -1; + } else { + index = member->value; + } + } + if (index.u >= sizeof_scalar_type(ct->type.st) * 8) { + error_sym(P, sym, "enum value out of range when used with 'bit_flags'"); + return -1; + } + member->value.u = UINT64_C(1) << index.u; + member->value.type = vt_uint; + if (fb_coerce_scalar_type(P, sym, ct->type.st, &member->value)) { + /* E.g. enumval = 15 causes signed overflow with short. */ + error_sym(P, sym, "enum value out of range when used with 'bit_flags'"); + return -1; + } + } else { + if (member->value.type) { + index = member->value; + } + /* + * Captures errors in user assigned values. Also captures + * overflow on auto-increment on all types except maximum + * representation size, i.e. long or ulong which we handled + * above. + */ + if (fb_coerce_scalar_type(P, sym, ct->type.st, &index)) { + return -1; + } + member->value = index; + } + if (!first && P->opts.ascending_enum) { + /* Without ascending enum we also allow duplicate values (but not names). */ + if ((index.type == vt_uint && index.u <= old_index.u) || + (index.type == vt_int && index.i <= old_index.i)) { + if (is_union && old_index.u == 0) { + /* + * The user explicitly assigned zero, or less, to the first + * element (here second element after parser injecting + * the NONE element). + */ + error_sym(P, sym, "union values must be positive, 0 is reserved for implicit 'NONE'"); + member->value.type = vt_invalid; + return -1; + } + error_sym(P, sym, "enum values must be in ascending order"); + member->value.type = vt_invalid; + return -1; + } + if (index.type == vt_bool && index.b <= old_index.b) { + error_sym(P, sym, "enum of type bool can only enumerate from false (0) to true (1)"); + member->value.type = vt_invalid; + return -1; + } + } + old_index = index; + if (add_to_value_set(&ct->value_set, &member->value)) { + if (is_union) { + error_sym(P, sym, "union members require unique positive values (0 being reserved for 'NONE'"); + member->value.type = vt_invalid; + return -1; + } else { + /* + * With ascending enums this won't happen, but + * otherwise flag secondary values so we can remove them + * from inverse name mappings in code gen. + */ + member->symbol.flags |= fb_duplicate; + } + } + if (member->metadata) { + error_sym(P, sym, "enum values cannot have attributes"); + /* Non-fatal. */ + continue; + } + } + return 0; +} + +static inline int process_union(fb_parser_t *P, fb_compound_type_t *ct) +{ + return process_enum(P, ct); +} + +int fb_build_schema(fb_parser_t *P) +{ + fb_schema_t *S = &P->schema; + fb_symbol_t *sym, *old_sym; + fb_name_t *old_name; + fb_compound_type_t *ct; + fb_attribute_t *a; + + /* Make sure self is visible at this point in time. */ + assert(ptr_set_exists(&P->schema.visible_schema, &P->schema)); + for (sym = S->symbols; sym; sym = sym->link) { + switch (sym->kind) { + case fb_is_table: + case fb_is_enum: + case fb_is_union: + case fb_is_struct: + case fb_is_rpc_service: + ct = (fb_compound_type_t *)sym; + set_type_hash(ct); + ct->schema = &P->schema; + if (ct->scope && (old_sym = define_fb_symbol(&ct->scope->symbol_index, sym))) { + error_sym_2(P, sym, "symbol already defined here", old_sym); + } + } + } + + /* + * Known attributes will be pre-defined if not provided by the + * user. After that point, all attribute references must be + * defined. + */ + for (a = (fb_attribute_t *)S->attributes; a; a = (fb_attribute_t *)a->name.link) { + if ((old_name = define_fb_name(&S->root_schema->attribute_index, &a->name))) { + /* + * Allow attributes to be defined multiple times, including + * known attributes. + */ +#if 0 + error_name(P, &a->name, "attribute already defined"); +#endif + } + } + install_known_attributes(P); + + if (!P->opts.hide_later_enum) { + for (sym = S->symbols; sym; sym = sym->link) { + switch (sym->kind) { + case fb_is_enum: + ct = (fb_compound_type_t *)sym; + if (process_enum(P, ct)) { + ct->type.type = vt_invalid; + continue; + } + break; + default: + continue; + } + } + } + + /* + * Resolve type references both earlier and later than point of + * reference. This also supports recursion for tables and unions. + */ + for (sym = S->symbols; sym; sym = sym->link) { + switch (sym->kind) { + case fb_is_struct: + ct = (fb_compound_type_t *)sym; + if (process_struct(P, ct)) { + ct->type.type = vt_invalid; + continue; + } + break; + case fb_is_table: + /* Handle after structs and enums. */ + continue; + case fb_is_rpc_service: + /* + * Also handle rpc_service later like tables, just in case + * we allow non-table types in request/response type. + */ + continue; + case fb_is_enum: + if (P->opts.hide_later_enum) { + ct = (fb_compound_type_t *)sym; + if (process_enum(P, ct)) { + ct->type.type = vt_invalid; + continue; + } + } + break; + case fb_is_union: + ct = (fb_compound_type_t *)sym; + if (process_union(P, ct)) { + ct->type.type = vt_invalid; + continue; + } + break; + default: + error_sym(P, sym, "internal error: unexpected symbol at schema level"); + return -1; + } + } + for (sym = P->schema.symbols; sym; sym = sym->link) { + switch (sym->kind) { + case fb_is_struct: + /* + * Structs need two stages, first process symbols, then + * analyze for size, alignment, and circular references. + */ + ct = (fb_compound_type_t *)sym; + if (ct->type.type != vt_invalid && analyze_struct(P, ct)) { + ct->type.type = vt_invalid; + continue; + } + break; + default: + continue; + } + } + for (sym = P->schema.symbols; sym; sym = sym->link) { + switch (sym->kind) { + case fb_is_table: + ct = (fb_compound_type_t *)sym; + /* Only now is the full struct size available. */ + if (ct->type.type != vt_invalid && process_table(P, ct)) { + ct->type.type = vt_invalid; + continue; + } + break; + case fb_is_rpc_service: + ct = (fb_compound_type_t *)sym; + /* Only now is the full struct size available. */ + if (ct->type.type != vt_invalid && process_rpc_service(P, ct)) { + ct->type.type = vt_invalid; + continue; + } + } + } + for (sym = P->schema.symbols; sym; sym = sym->link) { + switch (sym->kind) { + case fb_is_table: + ct = (fb_compound_type_t *)sym; + /* + * Some table attributes depend on attributes on members and + * therefore can only be validated after procesing. + */ + if (ct->type.type != vt_invalid && validate_table_attr(P, ct)) { + ct->type.type = vt_invalid; + continue; + } + } + } + revert_order(&P->schema.ordered_structs); + if (!S->root_type.name) { + if (P->opts.require_root_type) { + error(P, "root type not declared"); + } + } else { + sym = S->root_type.type = lookup_type_reference(P, + S->root_type.scope, S->root_type.name); + if (!sym) { + error_ref(P, S->root_type.name, "root type not found"); + } else if (P->opts.allow_struct_root) { + if (sym->kind != fb_is_struct && sym->kind != fb_is_table) { + error_ref(P, S->root_type.name, "root type must be a struct or a table"); + } else { + S->root_type.type = sym; + } + } else { + if (sym->kind != fb_is_table) { + error_ref(P, S->root_type.name, "root type must be a table"); + } else { + S->root_type.type = sym; + } + } + S->root_type.name = 0; + } + P->has_schema = !P->failed; + return P->failed; +} |