aboutsummaryrefslogtreecommitdiff
path: root/src/compiler/semantics.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/compiler/semantics.c')
-rw-r--r--src/compiler/semantics.c1962
1 files changed, 1962 insertions, 0 deletions
diff --git a/src/compiler/semantics.c b/src/compiler/semantics.c
new file mode 100644
index 0000000..d0a766a
--- /dev/null
+++ b/src/compiler/semantics.c
@@ -0,0 +1,1962 @@
+#include <string.h>
+#include <assert.h>
+
+#include "semantics.h"
+#include "parser.h"
+#include "coerce.h"
+#include "stdio.h"
+
+/* -DFLATCC_PORTABLE may help if inttypes.h is missing. */
+#ifndef PRId64
+#include <inttypes.h>
+#endif
+
+/* Same order as enum! */
+static const char *fb_known_attribute_names[] = {
+ "",
+ "id",
+ "deprecated",
+ "original_order",
+ "force_align",
+ "bit_flags",
+ "nested_flatbuffer",
+ "key",
+ "required",
+ "hash",
+ "base64",
+ "base64url",
+ "primary_key",
+ "sorted",
+};
+
+static const int fb_known_attribute_types[] = {
+ vt_invalid, /* Unknowns have arbitrary types. */
+ vt_uint,
+ vt_missing,
+ vt_missing,
+ vt_uint,
+ vt_missing,
+ vt_string,
+ vt_missing,
+ vt_missing,
+ vt_string,
+ vt_missing,
+ vt_missing,
+ vt_missing,
+ vt_missing,
+};
+
+static fb_scalar_type_t map_scalar_token_type(fb_token_t *t)
+{
+ switch (t->id) {
+ case tok_kw_uint64:
+ case tok_kw_ulong:
+ return fb_ulong;
+ case tok_kw_uint32:
+ case tok_kw_uint:
+ return fb_uint;
+ case tok_kw_uint16:
+ case tok_kw_ushort:
+ return fb_ushort;
+ case tok_kw_uint8:
+ case tok_kw_ubyte:
+ return fb_ubyte;
+ case tok_kw_char:
+ return fb_char;
+ case tok_kw_bool:
+ return fb_bool;
+ case tok_kw_int64:
+ case tok_kw_long:
+ return fb_long;
+ case tok_kw_int32:
+ case tok_kw_int:
+ return fb_int;
+ case tok_kw_int16:
+ case tok_kw_short:
+ return fb_short;
+ case tok_kw_int8:
+ case tok_kw_byte:
+ return fb_byte;
+ case tok_kw_float64:
+ case tok_kw_double:
+ return fb_double;
+ case tok_kw_float32:
+ case tok_kw_float:
+ return fb_float;
+ default:
+ return fb_missing_type;
+ }
+}
+
+/*
+ * The flatc compiler currently has a 256 limit.
+ *
+ * Some target C compilers might respect anything above
+ * 16 and may reguire that PAD option of the C code generator.
+ */
+static inline int is_valid_align(uint64_t align)
+{
+ uint64_t n = 1;
+ if (align == 0 || align > FLATCC_FORCE_ALIGN_MAX) {
+ return 0;
+ }
+ while (n <= align) {
+ if (n == align) {
+ return 1;
+ }
+ n *= 2;
+ }
+ return 0;
+}
+
+static inline uint64_t fb_align(uint64_t size, uint64_t align)
+{
+ assert(is_valid_align(align));
+
+ return (size + align - 1) & ~(align - 1);
+}
+
+/*
+ * The FNV-1a 32-bit little endian hash is a FlatBuffers standard for
+ * transmission of type identifiers in a compact form, in particular as
+ * alternative file identifiers. Note that if hash becomes 0, we map it
+ * to hash("").
+ */
+static inline void set_type_hash(fb_compound_type_t *ct)
+{
+ fb_ref_t *name;
+ fb_symbol_t *sym;
+ uint32_t hash;
+
+ hash = fb_hash_fnv1a_32_init();
+ if (ct->scope) {
+ for (name = ct->scope->name; name; name = name->link) {
+ hash = fb_hash_fnv1a_32_append(hash, name->ident->text, (size_t)name->ident->len);
+ hash = fb_hash_fnv1a_32_append(hash, ".", 1);
+ }
+ }
+ sym = &ct->symbol;
+ hash = fb_hash_fnv1a_32_append(hash, sym->ident->text, (size_t)sym->ident->len);
+ if (hash == 0) {
+ hash = fb_hash_fnv1a_32_init();
+ }
+ ct->type_hash = hash;
+}
+
+static inline fb_scope_t *fb_find_scope_by_string(fb_schema_t *S, const char *name, size_t len)
+{
+ if (!S || !S->root_schema) {
+ return 0;
+ }
+ if (len == 0) {
+ /* Global scope. */
+ name = 0;
+ }
+ return fb_scope_table_find(&S->root_schema->scope_index, name, len);
+}
+
+/* count = 0 indicates zero-terminated ref list, name = 0 indicates global scope. */
+static inline fb_scope_t *fb_find_scope_by_ref(fb_schema_t *S, const fb_ref_t *name, int count)
+{
+ if (!S || !S->root_schema) {
+ return 0;
+ }
+ return fb_scope_table_find(&S->root_schema->scope_index, name, (size_t)(-count));
+}
+
+static inline fb_symbol_t *define_fb_symbol(fb_symbol_table_t *si, fb_symbol_t *sym)
+{
+ return fb_symbol_table_insert_item(si, sym, ht_keep);
+}
+
+static inline fb_symbol_t *find_fb_symbol_by_token(fb_symbol_table_t *si, fb_token_t *token)
+{
+ return fb_symbol_table_find(si, token->text, (size_t)token->len);
+}
+
+static inline fb_name_t *define_fb_name(fb_name_table_t *ni, fb_name_t *name)
+{
+ return fb_name_table_insert_item(ni, name, ht_keep);
+}
+
+static inline fb_name_t *find_fb_name_by_token(fb_name_table_t *ni, fb_token_t *token)
+{
+ return fb_name_table_find(ni, token->text, (size_t)token->len);
+}
+
+/* Returns 1 if value exists, 0 otherwise, */
+static inline int add_to_value_set(fb_value_set_t *vs, fb_value_t *value)
+{
+ return fb_value_set_insert_item(vs, value, ht_keep) != 0;
+}
+
+static inline int is_in_value_set(fb_value_set_t *vs, fb_value_t *value)
+{
+ return 0 != fb_value_set_find_item(vs, value);
+}
+
+/*
+ * An immediate parent scope does not necessarily exist and it might
+ * appear in a later search, so we return the nearest existing parent
+ * and do not cache the parent.
+ */
+static inline fb_scope_t *find_parent_scope(fb_parser_t *P, fb_scope_t *scope)
+{
+ fb_ref_t *p;
+ int count;
+ fb_scope_t *parent;
+
+ parent = 0;
+ count = 0;
+ if (scope == 0) {
+ return 0;
+ }
+ p = scope->name;
+ while (p) {
+ ++count;
+ p = p->link;
+ }
+ if (count == 0) {
+ return 0;
+ }
+ while (count-- > 1) {
+ if ((parent = fb_find_scope_by_ref(&P->schema, scope->name, count))) {
+ return parent;
+ }
+ }
+ /* Root scope. */
+ return fb_find_scope_by_ref(&P->schema, 0, 0);
+}
+
+static inline fb_symbol_t *lookup_string_reference(fb_parser_t *P, fb_scope_t *local, const char *s, size_t len)
+{
+ fb_symbol_t *sym;
+ fb_scope_t *scope;
+ const char *name, *basename;
+ size_t k;
+
+ name = s;
+ basename = s;
+ k = len;
+ while (k > 0) {
+ if (s[--k] == '.') {
+ basename = s + k + 1;
+ --len;
+ break;
+ }
+ }
+ len -= k;
+ if (local && k == 0) {
+ do {
+ if ((sym = fb_symbol_table_find(&local->symbol_index, basename, len))) {
+ if (get_compound_if_visible(&P->schema, sym)) {
+ return sym;
+ }
+ }
+ local = find_parent_scope(P, local);
+ } while (local);
+ return 0;
+ }
+ if (!(scope = fb_find_scope_by_string(&P->schema, name, k))) {
+ return 0;
+ }
+ return fb_symbol_table_find(&scope->symbol_index, basename, len);
+}
+
+/*
+ * First search the optional local scope, then the scope of the namespace prefix if any.
+ * If `enumval` is non-zero, the last namepart is stored in that
+ * pointer and the lookup stops before that part.
+ *
+ * If the reference is prefixed with a namespace then the scope is
+ * looked up relative to root then the basename is searched in that
+ * scope.
+ *
+ * If the refernce is not prefixed with a namespace then the name is
+ * search in the local symbol table (which may be the root if null) and
+ * if that fails, the nearest existing parent scope is used as the new
+ * local scope and the process is repeated until local is root.
+ *
+ * This means that namespace prefixes cannot be relative to a parent
+ * namespace or to the current scope, but simple names can be found in a
+ * parent namespace.
+ */
+static inline fb_symbol_t *lookup_reference(fb_parser_t *P, fb_scope_t *local, fb_ref_t *name, fb_ref_t **enumval)
+{
+ fb_ref_t *basename, *last, *p;
+ fb_scope_t *scope;
+ fb_symbol_t *sym;
+ int count;
+
+ count = 0;
+ scope = 0;
+ p = name;
+ last = 0;
+ basename = 0;
+ while (p) {
+ basename = last;
+ last = p;
+ p = p->link;
+ ++count;
+ }
+ if (enumval) {
+ --count;
+ *enumval = last;
+ } else {
+ basename = last;
+ }
+ if (!basename) {
+ return 0;
+ }
+ if (local && count == 1) {
+ do {
+ if ((sym = find_fb_symbol_by_token(&local->symbol_index, basename->ident))) {
+ if (get_compound_if_visible(&P->schema, sym)) {
+ return sym;
+ }
+ }
+ local = find_parent_scope(P, local);
+ } while (local);
+ return 0;
+ }
+ /* Null name is valid in scope lookup, indicating global scope. */
+ if (count == 1) {
+ name = 0;
+ }
+ if (!(scope = fb_find_scope_by_ref(&P->schema, name, count - 1))) {
+ return 0;
+ }
+ sym = find_fb_symbol_by_token(&scope->symbol_index, basename->ident);
+ if (sym && get_compound_if_visible(&P->schema, sym)) {
+ return sym;
+ }
+ return 0;
+}
+
+static inline fb_symbol_t *lookup_type_reference(fb_parser_t *P, fb_scope_t *local, fb_ref_t *name)
+{
+ return lookup_reference(P, local, name, 0);
+}
+
+/*
+ * `ct` is null when looking up names for scalar types and otherwise it is
+ * the enum type being assigned. The provided reference may reference
+ * an enum value in the `ct` type, or another enum if a scope/type is
+ * given.
+ */
+static inline int lookup_enum_name(fb_parser_t *P, fb_scope_t *local, fb_compound_type_t *ct, fb_ref_t *ref, fb_value_t *value)
+{
+ fb_symbol_t *sym;
+ fb_ref_t *enumval;
+ fb_member_t *member;
+
+ enumval = 0;
+ assert(ref);
+ assert(ct == 0 || ct->symbol.kind == fb_is_enum);
+ sym = lookup_reference(P, local, ref, &enumval);
+ if (sym && sym->kind == fb_is_enum) {
+ ct = (fb_compound_type_t *)sym;
+ } else if (ref->link) {
+ /* If there was a scope / type prefix, it was not found, or it was not an enum type. */
+ return -1;
+ }
+ if (!ct) {
+ return -1;
+ }
+ sym = find_fb_symbol_by_token(&ct->index, enumval->ident);
+ if (!sym) {
+ return -1;
+ }
+ member = (fb_member_t *)sym;
+ *value = member->value;
+ return 0;
+}
+
+/* This is repeated for every include file, but this pose no problem. */
+static void install_known_attributes(fb_parser_t *P)
+{
+ unsigned int i;
+ fb_attribute_t *a;
+
+ for (i = 0; i < KNOWN_ATTR_COUNT; ++i) {
+ /* Don't put it in the parsed list, just the index. */
+ a = new_elem(P, sizeof(*a));
+ a->known = i;
+ a->name.name.s.s = (char *)fb_known_attribute_names[i];
+ a->name.name.s.len = (int)strlen(fb_known_attribute_names[i]);
+ a->name.name.type = vt_string;
+ a->name.link = 0;
+ if ((a = (fb_attribute_t *)define_fb_name(&P->schema.root_schema->attribute_index, &a->name))) {
+ /*
+ * If the user alredy defined the attribute, keep that instead.
+ * (Memory leak is ok here.)
+ */
+ a->known = i;
+ }
+ }
+}
+
+static void revert_order(fb_compound_type_t **list) {
+ fb_compound_type_t *next, *prev = 0, *link = *list;
+
+ while (link) {
+ next = link->order;
+ link->order = prev;
+ prev = link;
+ link = next;
+ }
+ *list = prev;
+}
+
+static inline unsigned short process_metadata(fb_parser_t *P, fb_metadata_t *m,
+ uint16_t expect, fb_metadata_t *out[KNOWN_ATTR_COUNT])
+{
+ uint16_t flags;
+ unsigned int i, n = FLATCC_ATTR_MAX;
+ int type;
+ fb_attribute_t *a;
+
+ memset(out, 0, sizeof(out[0]) * KNOWN_ATTR_COUNT);
+ for (flags = 0; m && n; --n, m = m->link) {
+ a = (fb_attribute_t *)find_fb_name_by_token(&P->schema.root_schema->attribute_index, m->ident);
+ if (!a) {
+ error_tok(P, m->ident, "unknown attribute not declared");
+ continue;
+ }
+ if (!(i = a->known)) {
+ continue;
+ }
+ if (!((1 << i) & expect)) {
+ error_tok(P, m->ident, "known attribute not expected in this context");
+ continue;
+ }
+ flags |= 1 << i;
+ if (out[i]) {
+ error_tok(P, m->ident, "known attribute listed multiple times");
+ continue;
+ }
+ out[i] = m;
+ type = fb_known_attribute_types[i];
+ if (type == vt_missing && m->value.type != vt_missing) {
+ error_tok(P, m->ident, "known attribute does not expect a value");
+ continue;
+ }
+ if (type == vt_string && m->value.type != vt_string) {
+ error_tok(P, m->ident, "known attribute expects a string");
+ continue;
+ }
+ if (type == vt_uint && m->value.type != vt_uint) {
+ error_tok(P, m->ident, "known attribute expects an unsigned integer");
+ continue;
+ }
+ if (type == vt_int && m->value.type != vt_uint && m->value.type != vt_int) {
+ error_tok(P, m->ident, "known attribute expects an integer");
+ continue;
+ }
+ if (type == vt_bool && m->value.type != vt_bool) {
+ error_tok(P, m->ident, "known attribute expects 'true' or 'false'");
+ continue;
+ }
+ }
+ if (m) {
+ error_tok(P, m->ident, "too many attributes");
+ }
+ return flags;
+}
+
+/*
+ * Recursive types are allowed, according to FlatBuffers Internals doc.,
+ * but this cannot be possible for structs because they have no default
+ * value or null option, and can only hold scalars and other structs, so
+ * recursion would never terminate. Enums are simple types and cannot be
+ * recursive either. Unions reference tables which may reference unions,
+ * and recursion works well here. Tables allow any other table, union,
+ * or scalar value to be optional or default, so recursion is possible.
+ * In conclusion, Unions and Table members may reference all other
+ * types, and self. Enums are trivially checked because the only allow
+ * scalars, which leaves structs that can build illegal forms.
+ *
+ * Object instances cannot be recursive meaning the object graph is
+ * always a tree, but this isn't really a concern for the schema
+ * compiler, and for the builder it happens naturally as it only adds to
+ * the buffer (though a compressor might reuse old data without
+ * violating the tree?).
+ *
+ * Conclusion: check structs for circular references and allow
+ * everything else to unfold, provided they otherwise pass type checks.
+ *
+ * Algorithm:
+ *
+ * Depth first search of the struct reference tree. We maintain flags to
+ * find back-links. We prune sub-trees already fully analyzed by using
+ * the closed flag. This operation is O(N) since each struct member is
+ * visited once.
+ *
+ * Recursion is limited to prevent blowing the stack and to protect
+ * against abuse.
+ */
+static int analyze_struct(fb_parser_t *P, fb_compound_type_t *ct)
+{
+ fb_symbol_t *sym;
+ fb_compound_type_t *type;
+ fb_member_t *member;
+ int ret = 0;
+ uint64_t size;
+ uint16_t align;
+ fb_token_t *t;
+
+ assert(ct->symbol.kind == fb_is_struct);
+
+ assert(!(ct->symbol.flags & fb_circular_open));
+ if (ct->symbol.flags & fb_circular_closed) {
+ return 0;
+ }
+ assert(!ct->order);
+ ct->symbol.flags |= fb_circular_open;
+ align = 1;
+ for (sym = ct->members; sym; sym = sym->link) {
+ type = 0;
+ if (P->nesting_level >= FLATCC_NESTING_MAX) {
+ error(P, "maximum allowed nesting level exceeded while processing struct hierarchy");
+ return -1;
+ }
+ member = (fb_member_t *)sym;
+ switch (member->type.type) {
+ case vt_fixed_array_type:
+ case vt_scalar_type:
+ t = member->type.t;
+ member->type.st = map_scalar_token_type(t);
+ size = sizeof_scalar_type(member->type.st);
+ if (size < 1) {
+ error_sym_tok(P, sym, "unexpected type", t);
+ return -1;
+ }
+ member->align = (uint16_t)size;
+ member->size = size * member->type.len;
+ break;
+ case vt_fixed_array_compound_type_ref:
+ case vt_compound_type_ref:
+ /* Enums might not be valid, but then it would be detected earlier. */
+ if (member->type.ct->symbol.kind == fb_is_enum) {
+ type = member->type.ct;
+ size = type->size;
+ member->align = (uint16_t)size;
+ member->size = member->type.len * type->size;
+ break;
+ } else if (member->type.ct->symbol.kind == fb_is_struct) {
+ type = member->type.ct;
+ if (type->symbol.flags & fb_circular_open) {
+ error_sym_2(P, sym, "circular reference to struct at", &type->symbol);
+ return -1;
+ }
+ if (!(type->symbol.flags & fb_circular_closed)) {
+ if (P->opts.hide_later_struct) {
+ error_sym_2(P, sym, "dependency on later defined struct not permitted with current settings", &type->symbol);
+ }
+ ++P->nesting_level;
+ ret = analyze_struct(P, type);
+ --P->nesting_level;
+ if (ret) {
+ return ret;
+ }
+ }
+ member->align = type->align;
+ member->size = member->type.len * type->size;
+ break;
+ } else {
+ error_sym(P, sym, "unexpected compound type for field");
+ return -1;
+ }
+ break;
+ case vt_invalid:
+ /* Old error. */
+ return -1;
+ default:
+ error_sym(P, sym, "unexpected type");
+ return -1;
+ }
+ member->offset = fb_align(ct->size, member->align);
+ if (member->offset < ct->size || member->offset + member->size < member->offset) {
+ error_sym(P, sym, "struct size overflow");
+ return -1;
+ }
+ size = member->offset + member->size;
+ if (size < ct->size || size > FLATCC_STRUCT_MAX_SIZE) {
+ error_sym(P, sym, "struct field overflows maximum allowed struct size");
+ };
+ ct->size = size;
+ /*
+ * FB spec is not very clear on this - but experimentally a
+ * force aligned member struct will force that alignment upon a
+ * containing struct if the alignment would otherwise be
+ * smaller. In otherwise, a struct is aligned to the alignment
+ * of the largest member, not just the largest scalar member
+ * (directly or indirectly).
+ */
+ if (align < member->align) {
+ align = member->align;
+ }
+ }
+ if (ct->align > 0) {
+ if (align > ct->align) {
+ error_sym(P, &ct->symbol, "'force_align' cannot be smaller than natural alignment for");
+ ct->align = align;
+ }
+ } else {
+ ct->align = align;
+ }
+ /* Add trailing padding if necessary. */
+ ct->size = fb_align(ct->size, ct->align);
+
+ if (ct->size == 0) {
+ error_sym(P, &ct->symbol, "struct cannot be empty");
+ return -1;
+ }
+
+ ct->symbol.flags |= fb_circular_closed;
+ ct->symbol.flags &= (uint16_t)~fb_circular_open;
+ ct->order = P->schema.ordered_structs;
+ P->schema.ordered_structs = ct;
+ return ret;
+}
+
+static int define_nested_table(fb_parser_t *P, fb_scope_t *local, fb_member_t *member, fb_metadata_t *m)
+{
+ fb_symbol_t *type_sym;
+
+ if (member->type.type != vt_vector_type || member->type.st != fb_ubyte) {
+ error_tok(P, m->ident, "'nested_flatbuffer' attribute requires a [ubyte] vector type");
+ return -1;
+ }
+ if (m->value.type != vt_string) {
+ /* All known attributes get automatically type checked, so just ignore. */
+ return -1;
+ }
+ type_sym = lookup_string_reference(P, local, m->value.s.s, (size_t)m->value.s.len);
+ if (!type_sym) {
+ error_tok_as_string(P, m->ident, "nested reference not found", m->value.s.s, (size_t)m->value.s.len);
+ return -1;
+ }
+ if (type_sym->kind != fb_is_table) {
+ if (!P->opts.allow_struct_root) {
+ error_tok_2(P, m->ident, "nested reference does not refer to a table", type_sym->ident);
+ return -1;
+ }
+ if (type_sym->kind != fb_is_struct) {
+ error_tok_2(P, m->ident, "nested reference does not refer to a table or a struct", type_sym->ident);
+ return -1;
+ }
+ }
+ member->nest = (fb_compound_type_t *)type_sym;
+ return 0;
+}
+
+static int process_struct(fb_parser_t *P, fb_compound_type_t *ct)
+{
+ fb_symbol_t *sym, *old, *type_sym;
+ fb_member_t *member;
+ fb_metadata_t *knowns[KNOWN_ATTR_COUNT], *m;
+ uint16_t allow_flags;
+ int key_count = 0, primary_count = 0, key_ok = 0;
+
+ if (ct->type.type) {
+ error_sym(P, &ct->symbol, "internal error: struct cannot have a type");
+ return -1;
+ }
+ ct->metadata_flags = process_metadata(P, ct->metadata, fb_f_force_align, knowns);
+ if ((m = knowns[fb_attr_force_align])) {
+ if (!is_valid_align(m->value.u)) {
+ error_sym(P, &ct->symbol, "'force_align' exceeds maximum permitted alignment or is not a power of 2");
+ } else {
+ /* This may still fail on natural alignment size. */
+ ct->align = (uint16_t)m->value.u;
+ }
+ }
+ for (sym = ct->members; sym; sym = sym->link) {
+ if ((old = define_fb_symbol(&ct->index, sym))) {
+ error_sym_2(P, sym, "struct field already defined here", old);
+ continue;
+ }
+ if (sym->kind != fb_is_member) {
+ error_sym(P, sym, "internal error: field type expected");
+ return -1;
+ }
+ key_ok = 1;
+ member = (fb_member_t *)sym;
+ allow_flags = 0;
+ /* Notice the difference between fb_f_ and fb_attr_ (flag vs index). */
+ if (P->opts.allow_struct_field_key) {
+ allow_flags |= fb_f_key;
+ if (P->opts.allow_primary_key) {
+ allow_flags |= fb_f_primary_key;
+ }
+ }
+ if (P->opts.allow_struct_field_deprecate) {
+ allow_flags |= fb_f_deprecated;
+ }
+ member->metadata_flags = process_metadata(P, member->metadata, allow_flags, knowns);
+ switch (member->type.type) {
+ case vt_fixed_array_type_ref:
+ key_ok = 0;
+ goto lbl_type_ref;
+ case vt_type_ref:
+lbl_type_ref:
+ type_sym = lookup_type_reference(P, ct->scope, member->type.ref);
+ if (!type_sym) {
+ error_ref_sym(P, member->type.ref, "unknown type reference used with struct field", sym);
+ member->type.type = vt_invalid;
+ continue;
+ }
+ member->type.ct = (fb_compound_type_t*)type_sym;
+ member->type.type = member->type.type == vt_fixed_array_type_ref ?
+ vt_fixed_array_compound_type_ref : vt_compound_type_ref;
+ if (type_sym->kind != fb_is_struct) {
+ if (P->opts.allow_enum_struct_field) {
+ if (type_sym->kind != fb_is_enum) {
+ error_sym_2(P, sym, "struct fields can only be scalars, structs, and enums, or arrays of these, but has type", type_sym);
+ member->type.type = vt_invalid;
+ return -1;
+ }
+ if (!P->opts.allow_enum_key) {
+ key_ok = 0;
+ break;
+ }
+ } else {
+ error_sym_2(P, sym, "struct fields can only be scalars and structs, or arrays of these, but has type", type_sym);
+ member->type.type = vt_invalid;
+ return -1;
+ }
+ } else {
+ key_ok = 0;
+ }
+ break;
+ case vt_fixed_array_string_type:
+ error_sym(P, sym, "fixed length arrays cannot have string elements");
+ member->type.type = vt_invalid;
+ return -1;
+ case vt_fixed_array_type:
+ key_ok = 0;
+ break;
+ case vt_scalar_type:
+ break;
+ default:
+ error_sym(P, sym, "struct member member can only be of struct scalar, or fixed length scalar array type");
+ return -1;
+ }
+ if (!key_ok) {
+ if (member->metadata_flags & fb_f_key) {
+ member->type.type = vt_invalid;
+ error_sym(P, sym, "key attribute now allowed for this kind of field");
+ return -1;
+ }
+ if (member->metadata_flags & fb_f_primary_key) {
+ member->type.type = vt_invalid;
+ error_sym(P, sym, "primary_key attribute now allowed for this kind of field");
+ return -1;
+ }
+ }
+ if (member->metadata_flags & fb_f_deprecated) {
+ if (member->metadata_flags & fb_f_key) {
+ error_sym(P, sym, "key attribute not allowed for deprecated struct member");
+ return -1;
+ } else if (member->metadata_flags & fb_f_primary_key) {
+ error_sym(P, sym, "primary_key attribute not allowed for deprecated struct member");
+ return -1;
+ }
+ }
+ if (member->metadata_flags & fb_f_key) {
+ if (member->metadata_flags & fb_f_primary_key) {
+ error_sym(P, sym, "primary_key attribute conflicts with key attribute");
+ member->type.type = vt_invalid;
+ return -1;
+ }
+ key_count++;
+ if (!ct->primary_key) {
+ /* First key is primary key if no primary key is given explicitly. */
+ ct->primary_key = member;
+ }
+ } else if (member->metadata_flags & fb_f_primary_key) {
+ if (primary_count++) {
+ error_sym(P, sym, "at most one struct member can have a primary_key attribute");
+ member->type.type = vt_invalid;
+ return -1;
+ }
+ key_count++;
+ /* Allow backends to treat primary key as an ordinary key. */
+ member->metadata_flags |= fb_f_key;
+ ct->primary_key = member;
+ }
+ if (member->value.type) {
+ error_sym(P, sym, "struct member member cannot have a default value");
+ continue;
+ }
+ }
+ if (key_count) {
+ ct->symbol.flags |= fb_indexed;
+ }
+ /* Set primary key flag for backends even if chosen by default. */
+ if (ct->primary_key) {
+ ct->primary_key->metadata_flags |= fb_f_primary_key;
+ }
+ if (key_count > 1 && !P->opts.allow_multiple_key_fields) {
+ error_sym(P, &ct->symbol, "table has multiple key fields, but at most one is permitted");
+ return -1;
+ }
+ return 0;
+}
+
+static fb_member_t *original_order_members(fb_parser_t *P, fb_member_t *next)
+{
+ fb_member_t *head = 0;
+ fb_member_t **tail = &head;
+
+ /* Not used for now, but in case we need error messages etc. */
+ (void)P;
+
+ while (next) {
+ *tail = next;
+ tail = &next->order;
+ next = (fb_member_t *)(((fb_symbol_t *)next)->link);
+ }
+ *tail = 0;
+ return head;
+}
+
+/*
+ * Alignment of table offset fields are generally not stored, and
+ * vectors store the element alignment for scalar types, so we
+ * detect alignment based on type also. Unions are tricky since they
+ * use a single byte type followed by an offset, but it is impractical
+ * to store these separately so we sort by the type field.
+ */
+static fb_member_t *align_order_members(fb_parser_t *P, fb_member_t *members)
+{
+ uint16_t i, j, k;
+ fb_member_t *heads[9] = {0};
+ fb_member_t **tails[9] = {0};
+ fb_member_t *next = members;
+
+ while (next) {
+ k = next->align;
+ switch (next->type.type) {
+ case vt_compound_type_ref:
+ switch (next->type.ct->symbol.kind) {
+ case fb_is_struct:
+ case fb_is_enum:
+ k = next->type.ct->align;
+ break;
+ case fb_is_union:
+ /*
+ * Unions align to their offsets because the type can
+ * always be added last in a second pass since it is 1
+ * byte.
+ */
+ k = (uint16_t)P->opts.offset_size;
+ break;
+ default:
+ k = (uint16_t)P->opts.offset_size;
+ break;
+ }
+ break;
+ case vt_vector_compound_type_ref:
+ case vt_string_type:
+ case vt_vector_type:
+ case vt_vector_string_type:
+ k = (uint16_t)P->opts.offset_size;
+ break;
+ case vt_invalid:
+ /* Just to have some sane behavior. */
+ return original_order_members(P, members);
+ default:
+ k = next->align;
+ break;
+ }
+ assert(k > 0);
+ i = 0;
+ while (k >>= 1) {
+ ++i;
+ }
+ /* Normally the largest alignment is 256, but otherwise we group them together. */
+ if (i > 7) {
+ i = 7;
+ }
+ if (!heads[i]) {
+ heads[i] = next;
+ } else {
+ *tails[i] = next;
+ }
+ tails[i] = &next->order;
+ next = (fb_member_t *)(((fb_symbol_t *)next)->link);
+ }
+ i = j = 8;
+ tails[8] = &heads[8];
+ while (j) {
+ while (i && !heads[--i]) {
+ }
+ *tails[j] = heads[i];
+ j = i;
+ }
+ return heads[8];
+}
+
+/* Temporary markers only used during assignment of field identifiers. */
+enum { unused_field = 0, normal_field, type_field };
+
+static int process_table(fb_parser_t *P, fb_compound_type_t *ct)
+{
+ char msg_buf [100];
+ fb_symbol_t *sym, *old, *type_sym;
+ fb_member_t *member;
+ fb_metadata_t *knowns[KNOWN_ATTR_COUNT], *m;
+ int ret = 0;
+ uint64_t count = 0;
+ int need_id = 0, id_failed = 0;
+ uint64_t max_id = 0;
+ int key_ok, key_count = 0, primary_count = 0;
+ int is_union_vector, is_vector;
+ uint64_t i, j;
+ int max_id_errors = 10;
+ int allow_flags = 0;
+
+ /*
+ * This just tracks the presence of a `normal_field` or a hidden
+ * `type_field`. The size is litmited to 16-bit unsigned offsets.
+ * It is only of relevance for ithe optional `id` table field
+ * attribute.
+ */
+ uint8_t *field_marker = 0;
+ fb_symbol_t **field_index = 0;
+
+ assert(ct->symbol.kind == fb_is_table);
+ assert(!ct->type.type);
+
+ ct->metadata_flags = process_metadata(P, ct->metadata, fb_f_original_order, knowns);
+ /*
+ * `original_order` now lives as a flag, we need not consider it
+ * further until code generation.
+ */
+ for (sym = ct->members; sym; sym = sym->link) {
+ key_ok = 0;
+ type_sym = 0;
+ is_vector = 0;
+ is_union_vector = 0;
+ if ((old = define_fb_symbol(&ct->index, sym))) {
+ error_sym_2(P, sym, "table member already defined here", old);
+ continue;
+ }
+ if (sym->kind != fb_is_member) {
+ error_sym(P, sym, "internal error: member type expected");
+ return -1;
+ }
+ member = (fb_member_t *)sym;
+ if (member->type.type == vt_invalid) {
+ continue;
+ }
+ if (member->type.type == vt_scalar_type || member->type.type == vt_vector_type) {
+ member->type.st = map_scalar_token_type(member->type.t);
+ }
+ allow_flags =
+ fb_f_id | fb_f_nested_flatbuffer | fb_f_deprecated | fb_f_key |
+ fb_f_required | fb_f_hash | fb_f_base64 | fb_f_base64url | fb_f_sorted;
+
+ if (P->opts.allow_primary_key) {
+ allow_flags |= fb_f_primary_key;
+ }
+ member->metadata_flags = process_metadata(P, member->metadata, (uint16_t)allow_flags, knowns);
+ if ((m = knowns[fb_attr_nested_flatbuffer])) {
+ define_nested_table(P, ct->scope, member, m);
+ }
+ /* Note: we allow base64 and base64url with nested attribute. */
+ if ((member->metadata_flags & fb_f_base64) &&
+ (member->type.type != vt_vector_type || member->type.st != fb_ubyte)) {
+ error_sym(P, sym, "'base64' attribute is only allowed on vectors of type ubyte");
+ }
+ if ((member->metadata_flags & fb_f_base64url) &&
+ (member->type.type != vt_vector_type || member->type.st != fb_ubyte)) {
+ error_sym(P, sym, "'base64url' attribute is only allowed on vectors of type ubyte");
+ }
+ if ((member->metadata_flags & (fb_f_base64 | fb_f_base64url)) ==
+ (fb_f_base64 | fb_f_base64url)) {
+ error_sym(P, sym, "'base64' and 'base64url' attributes cannot both be set");
+ }
+ m = knowns[fb_attr_id];
+ if (m && count == 0) {
+ need_id = 1;
+ field_marker = P->tmp_field_marker;
+ memset(field_marker, 0, (size_t)P->opts.vt_max_count);
+ }
+ if (!id_failed) {
+ if (count >= P->opts.vt_max_count) {
+ error_sym(P, sym, "too many fields for vtable size");
+ id_failed = 1;
+ } else if (!need_id) {
+ member->id = (unsigned short)count;
+ }
+ ++count;
+ }
+ switch (member->type.type) {
+ case vt_scalar_type:
+ if (member->value.type == vt_null) {
+ member->value.type = vt_uint;
+ member->value.u = 0;
+ member->flags |= fb_fm_optional;
+ }
+ if (member->metadata_flags & fb_f_required) {
+ if (member->flags & fb_fm_optional) {
+ error_sym(P, sym, "'required' attribute is incompatible with optional table field (= null)");
+ } else {
+ error_sym(P, sym, "'required' attribute is redundant on scalar table field");
+ }
+ }
+ key_ok = 1;
+ if (member->value.type == vt_name_ref) {
+ if (lookup_enum_name(P, ct->scope, 0, member->value.ref, &member->value)) {
+ error_ref_sym(P, member->value.ref, "unknown name used as initializer for scalar field", sym);
+ member->type.type = vt_invalid;
+ continue;
+ }
+ }
+ if (!member->value.type) {
+ /*
+ * Simplifying by ensuring we always have a default
+ * value where an initializer is possible (also goes for enum).
+ */
+ member->value.type = vt_uint;
+ member->value.u = 0;
+ }
+ if (fb_coerce_scalar_type(P, sym, member->type.st, &member->value)) {
+ member->type.type = vt_invalid;
+ continue;
+ }
+ member->size = sizeof_scalar_type(member->type.st);
+ member->align = (uint16_t)member->size;
+ break;
+ case vt_vector_type:
+ is_vector = 1;
+ member->size = sizeof_scalar_type(member->type.st);
+ member->align =(uint16_t) member->size;
+ if (member->value.type) {
+ error_sym(P, sym, "scalar vectors cannot have an initializer");
+ member->type.type = vt_invalid;
+ continue;
+ }
+ break;
+ case vt_fixed_array_type_ref:
+ case vt_fixed_array_string_type:
+ case vt_fixed_array_type:
+ error_sym(P, sym, "fixed length arrays can only be used with structs");
+ member->type.type = vt_invalid;
+ return -1;
+ case vt_string_type:
+ /* `size` or `align` not defined - these are implicit uoffset types. */
+ key_ok = P->opts.allow_string_key;
+ if (member->value.type) {
+ error_sym(P, sym, "strings cannot have an initializer");
+ member->type.type = vt_invalid;
+ continue;
+ }
+ break;
+ case vt_vector_string_type:
+ is_vector = 1;
+ /* `size` or `align` not defined - these are implicit uoffset types. */
+ if (member->value.type) {
+ error_sym(P, sym, "string vectors cannot have an initializer");
+ member->type.type = vt_invalid;
+ continue;
+ }
+ break;
+ case vt_type_ref:
+ type_sym = lookup_type_reference(P, ct->scope, member->type.ref);
+ if (!type_sym) {
+ error_ref_sym(P, member->type.ref, "unknown type reference used with table field", sym);
+ member->type.type = vt_invalid;
+ /* We cannot count id's without knowing if it is a union. */
+ id_failed = 1;
+ continue;
+ }
+ switch (type_sym->kind) {
+ case fb_is_enum:
+ /*
+ * Note the enums without a 0 element requires an
+ * initializer in the schema, but that cannot happen
+ * with a null value, so in this case the value is force
+ * to 0. This is only relevant when using the `_get()`
+ * accessor instead of the `_option()`.
+ */
+ if (member->value.type == vt_null) {
+ member->value.type = vt_uint;
+ member->value.u = 0;
+ member->flags |= fb_fm_optional;
+ }
+ if (member->metadata_flags & fb_f_required) {
+ if (member->flags & fb_fm_optional) {
+ error_sym(P, sym, "'required' attribute is incompatible with optional enum table field (= null)");
+ } else {
+ error_sym(P, sym, "'required' attribute is redundant on enum table field");
+ }
+ }
+ key_ok = P->opts.allow_enum_key;
+ break;
+ case fb_is_table:
+ case fb_is_struct:
+ case fb_is_union:
+ break;
+ case fb_is_rpc_service:
+ error_sym_2(P, sym, "rpc service is not a valid table field type", type_sym);
+ member->type.type = vt_invalid;
+ continue;
+ default:
+ error_sym_2(P, sym, "internal error: unexpected field type", type_sym);
+ member->type.type = vt_invalid;
+ continue;
+ }
+ member->type.type = vt_compound_type_ref;
+ member->type.ct = (fb_compound_type_t*)type_sym;
+ /*
+ * Note: this information transfer won't always work because
+ * structs do not know their full size at this point so
+ * codegen must use the member->type.ct values.
+ */
+ member->size = member->type.ct->size;
+ member->align = member->type.ct->align;
+
+ if (type_sym->kind == fb_is_union && !id_failed) {
+ /* Hidden union type field. */
+ if (!need_id) {
+ member->id = (unsigned short)count;
+ }
+ ++count;
+ }
+ if (member->value.type) {
+ if (type_sym->kind != fb_is_enum) {
+ error_sym(P, sym, "non-scalar field cannot have an initializer");
+ member->type.type = vt_invalid;
+ continue;
+ }
+ if (member->value.type == vt_name_ref) {
+ if (lookup_enum_name(P, ct->scope, member->type.ct, member->value.ref, &member->value)) {
+ error_ref_sym(P, member->value.ref, "unknown name used as initializer for enum field", sym);
+ member->type.type = vt_invalid;
+ continue;
+ }
+ } else {
+ if (fb_coerce_scalar_type(P, sym, ((fb_compound_type_t *)type_sym)->type.st, &member->value)) {
+ member->type.type = vt_invalid;
+ continue;
+ }
+ /* Bitflags can have complex combinations of values, and do not nativele have a 0 value. */
+ if (P->opts.strict_enum_init && !(member->type.ct->metadata_flags & fb_f_bit_flags)
+ && !(member->flags & fb_fm_optional)) {
+ if (!is_in_value_set(&member->type.ct->value_set, &member->value)) {
+ error_sym(P, sym, "initializer does not match a defined enum value");
+ member->type.type = vt_invalid;
+ continue;
+ }
+ }
+ }
+ } else {
+ /* Enum is the only type that cannot always default to 0. */
+ if (type_sym->kind == fb_is_enum) {
+ member->value.type = vt_uint;
+ member->value.u = 0;
+ if (fb_coerce_scalar_type(P, type_sym, ((fb_compound_type_t *)type_sym)->type.st, &member->value)) {
+ member->type.type = vt_invalid;
+ continue;
+ }
+ if (P->opts.strict_enum_init) {
+ /* TODO: consider if this error is necessary for bit_flags - flatc 2.0.0 errors on this. */
+ if (!is_in_value_set(&member->type.ct->value_set, &member->value)) {
+ error_sym_2(P, sym,
+ "enum type requires an explicit initializer because it has no 0 value", type_sym);
+ member->type.type = vt_invalid;
+ continue;
+ }
+ }
+ }
+ }
+ break;
+ case vt_vector_type_ref:
+ type_sym = lookup_type_reference(P, ct->scope, member->type.ref);
+ if (!type_sym) {
+ error_ref_sym(P, member->type.ref, "unknown vector type reference used with table field", sym);
+ member->type.type = vt_invalid;
+ continue;
+ }
+ switch (type_sym->kind) {
+ case fb_is_enum:
+ case fb_is_table:
+ case fb_is_struct:
+ case fb_is_union:
+ break;
+ default:
+ /* Vectors of strings are handled separately but this is irrelevant to the user. */
+ error_sym_tok(P, sym, "vectors can only hold scalars, structs, enums, strings, tables, and unions", member->type.t);
+ member->type.type = vt_invalid;
+ continue;
+ }
+ is_vector = 1;
+ is_union_vector = type_sym->kind == fb_is_union;
+ if (member->value.type) {
+ error_sym(P, sym, "non-scalar field cannot have an initializer");
+ member->type.type = vt_invalid;
+ continue;
+ }
+ /* Size of the vector element, not of the vector itself. */
+ member->type.type = vt_vector_compound_type_ref;
+ member->type.ct = (fb_compound_type_t*)type_sym;
+ member->size = member->type.ct->size;
+ member->align = member->type.ct->align;
+ if (type_sym->kind == fb_is_union && !id_failed) {
+ /* Hidden union type field. */
+ if (!need_id) {
+ member->id = (unsigned short)count;
+ }
+ ++count;
+ }
+ break;
+ default:
+ error_sym(P, sym, "unexpected table field type encountered");
+ member->type.type = vt_invalid;
+ continue;
+ }
+ if (!id_failed) {
+ if (m && !need_id && !id_failed) {
+ error_tok(P, m->ident, "unexpected id attribute, must be used on all fields, or none");
+ id_failed = 1;
+ } else if (!m && need_id && !id_failed) {
+ error_sym(P, sym, "id attribute missing, must be used on all fields, or none");
+ id_failed = 1;
+ } else if (m) {
+ if (m->value.type == vt_uint) {
+ if (m->value.u >= P->opts.vt_max_count) {
+ error_sym(P, sym, "id too large to fit in vtable");
+ id_failed = 1;
+ } else {
+ member->id = (unsigned short)m->value.u;
+ if (member->id > max_id) {
+ max_id = member->id;
+ }
+ }
+ } else if (m->value.type == vt_int) {
+ error_tok(P, m->ident, "id attribute cannot be negative");
+ id_failed = 1;
+ } else {
+ error_tok(P, m->ident, "unexpecte id attribute type");
+ id_failed = 1;
+ }
+ }
+ }
+ if (need_id && !id_failed) {
+ if (field_marker[member->id] == type_field) {
+ error_tok(P, m->ident, "id attribute value conflicts with a hidden type field");
+ id_failed = normal_field;
+ } else if (field_marker[member->id]) {
+ error_tok(P, m->ident, "id attribute value conflicts with another field");
+ } else {
+ field_marker[member->id] = normal_field;
+ }
+ if (!id_failed && type_sym && type_sym->kind == fb_is_union) {
+ if (member->id <= 1) {
+ error_tok(P, m->ident, is_union_vector ?
+ "id attribute value should be larger to accommodate hidden union vector type field" :
+ "id attribute value should be larger to accommodate hidden union type field");
+ id_failed = 1;
+ } else if (field_marker[member->id - 1] == type_field) {
+ error_tok(P, m->ident, is_union_vector ?
+ "hidden union vector type field below attribute id value conflicts with another hidden type field" :
+ "hidden union type field below attribute id value conflicts with another hidden type field");
+ id_failed = 1;
+ } else if (field_marker[member->id - 1]) {
+ error_tok(P, m->ident, is_union_vector ?
+ "hidden union vector type field below attribute id value conflicts with another field" :
+ "hidden union type field below attribute id value conflicts with another field");
+ id_failed = 1;
+ } else {
+ field_marker[member->id - 1] = type_field;
+ }
+ }
+ }
+ if (member->metadata_flags & fb_f_deprecated) {
+ if (member->metadata_flags & fb_f_key) {
+ error_sym(P, sym, "key attribute not allowed for deprecated field");
+ return -1;
+ } else if (member->metadata_flags & fb_f_primary_key) {
+ error_sym(P, sym, "primary_key attribute not allowed for deprecated field");
+ return -1;
+ }
+ }
+ if (member->metadata_flags & fb_f_key) {
+ ++key_count;
+ if (!key_ok) {
+ error_sym(P, sym, "key attribute not allowed for this kind of field");
+ member->type.type = vt_invalid;
+ } else if (member->metadata_flags & fb_f_primary_key) {
+ error_sym(P, sym, "primary_key attribute conflicts with key attribute");
+ member->type.type = vt_invalid;
+ } else if (!ct->primary_key ||
+ (primary_count == 0 && ct->primary_key->id > member->id)) {
+ /*
+ * Set key field with lowest id as default primary key
+ * unless a key field also has a primary attribute.
+ */
+ ct->primary_key = member;
+ }
+ } else if (member->metadata_flags & fb_f_primary_key) {
+ if (member->metadata_flags & fb_f_primary_key) {
+ if (primary_count++) {
+ error_sym(P, sym, "at most one field can have a primary_key attribute");
+ member->type.type = vt_invalid;
+ continue;
+ } else {
+ ct->primary_key = member;
+ }
+ }
+ key_count++;
+ /* Allow backends to treat primary key as an ordinary key. */
+ member->metadata_flags |= fb_f_key;
+ }
+ if (member->metadata_flags & fb_f_sorted) {
+ if (is_union_vector) {
+ error_sym(P, sym, "sorted attribute not allowed for union vectors");
+ member->type.type = vt_invalid;
+ return -1;
+ } else if (!is_vector) {
+ error_sym(P, sym, "sorted attribute only allowed for vectors");
+ member->type.type = vt_invalid;
+ return -1;
+ }
+ /*
+ * A subsequent call to validate_table_attr will verify that a
+ * sorted vector of tables or structs have a defined field
+ * key. This cannot be done before all types have been
+ * processed.
+ */
+ }
+ }
+ if (!id_failed) {
+ ct->count = count;
+ }
+ if (!id_failed && need_id) {
+ if (count && max_id >= count) {
+ for (i = 0; i < max_id; ++i) {
+ if (field_marker[i] == 0) {
+ if (!max_id_errors--) {
+ error_sym(P, &ct->symbol, "... more id's missing");
+ break;
+ }
+ sprintf(msg_buf, "id range not consequtive from 0, missing id: %"PRIu64"", i);
+ error_sym(P, &ct->symbol, msg_buf);
+ }
+ }
+ id_failed = 1;
+ }
+ }
+ /* Order in which data is ordered in binary buffer. */
+ if (ct->metadata_flags & fb_f_original_order) {
+ ct->ordered_members = original_order_members(P, (fb_member_t *)ct->members);
+ } else {
+ /* Size efficient ordering. */
+ ct->ordered_members = align_order_members(P, (fb_member_t *)ct->members);
+ }
+ if (!id_failed && need_id && count > 0) {
+ field_index = P->tmp_field_index;
+ memset(field_index, 0, sizeof(field_index[0]) * (size_t)P->opts.vt_max_count);
+ /*
+ * Reorder by id so table constructor arguments in code
+ * generators always use same ordering across versions.
+ */
+ for (sym = ct->members; sym; sym = sym->link) {
+ member = (fb_member_t *)sym;
+ field_index[member->id] = sym;
+ }
+ j = 0;
+ if (field_index[0] == 0) {
+ j = 1; /* Adjust for union type. */
+ }
+ ct->members = field_index[j];
+ for (i = j + 1; i <= max_id; ++i) {
+ if (field_index[i] == 0) ++i; /* Adjust for union type. */
+ field_index[j]->link = field_index[i];
+ j = i;
+ }
+ field_index[max_id]->link = 0;
+ }
+ if (key_count) {
+ ct->symbol.flags |= fb_indexed;
+ }
+ /* Set primary key flag for backends even if chosen by default. */
+ if (ct->primary_key) {
+ ct->primary_key->metadata_flags |= fb_f_primary_key;
+ }
+ if (key_count > 1 && !P->opts.allow_multiple_key_fields) {
+ error_sym(P, &ct->symbol, "table has multiple key fields, but at most one is permitted");
+ ret = -1;
+ }
+ if (id_failed) {
+ ret = -1;
+ }
+ return ret;
+}
+
+/*
+ * Post processing of process_table because some information is only
+ * available when all types have been processed.
+ */
+static int validate_table_attr(fb_parser_t *P, fb_compound_type_t *ct)
+{
+ fb_symbol_t *sym;
+ fb_member_t *member;
+
+ for (sym = ct->members; sym; sym = sym->link) {
+ member = (fb_member_t *)sym;
+ if (member->metadata_flags & fb_f_deprecated) {
+ continue;
+ }
+
+ if (member->type.type == vt_vector_compound_type_ref &&
+ member->metadata_flags & fb_f_sorted) {
+ switch (member->type.ct->symbol.kind) {
+ case fb_is_table:
+ if (!member->type.ct->primary_key) {
+ error_sym(P, sym, "sorted table vector only valid when table has a key field");
+ return -1;
+ }
+ break;
+ case fb_is_struct:
+ if (!member->type.ct->primary_key) {
+ error_sym(P, sym, "sorted struct vector only valid when struct has a key field");
+ return -1;
+ }
+ break;
+ /* Other cases already handled in process_table. */
+ default:
+ continue;
+ }
+ }
+ }
+ return 0;
+}
+
+/*
+ * The parser already makes sure we have exactly one request type,
+ * one response type, and no initializer.
+ *
+ * We are a bit heavy on flagging attributes because their behavior
+ * isn't really specified at this point.
+ */
+static int process_rpc_service(fb_parser_t *P, fb_compound_type_t *ct)
+{
+ fb_symbol_t *sym, *old, *type_sym;
+ fb_member_t *member;
+#if FLATCC_ALLOW_RPC_SERVICE_ATTRIBUTES || FLATCC_ALLOW_RPC_METHOD_ATTRIBUTES
+ fb_metadata_t *knowns[KNOWN_ATTR_COUNT];
+#endif
+
+ assert(ct->symbol.kind == fb_is_rpc_service);
+ assert(!ct->type.type);
+
+ /*
+ * Deprecated is defined for fields - but it is unclear if this also
+ * covers rpc services. Anyway, we accept it since it may be useful,
+ * and does not harm.
+ */
+#if FLATCC_ALLOW_RPC_SERVICE_ATTRIBUTES
+ /* But we have no known attributes to support. */
+ ct->metadata_flags = process_metadata(P, ct->metadata, 0, knowns);
+#else
+ if (ct->metadata) {
+ error_sym(P, &ct->symbol, "rpc services cannot have attributes");
+ /* Non-fatal. */
+ }
+#endif
+
+ /*
+ * `original_order` now lives as a flag, we need not consider it
+ * further until code generation.
+ */
+ for (sym = ct->members; sym; sym = sym->link) {
+ type_sym = 0;
+ if ((old = define_fb_symbol(&ct->index, sym))) {
+ error_sym_2(P, sym, "rpc method already defined here", old);
+ continue;
+ }
+ if (sym->kind != fb_is_member) {
+ error_sym(P, sym, "internal error: member type expected");
+ return -1;
+ }
+ member = (fb_member_t *)sym;
+ if (member->value.type) {
+ error_sym(P, sym, "internal error: initializer should have been rejected by parser");
+ }
+ if (member->type.type == vt_invalid) {
+ continue;
+ }
+ if (member->type.type != vt_type_ref) {
+ error_sym(P, sym, "internal error: request type expected to be a type reference");
+ }
+ type_sym = lookup_type_reference(P, ct->scope, member->req_type.ref);
+ if (!type_sym) {
+ error_ref_sym(P, member->req_type.ref, "unknown type reference used with rpc request type", sym);
+ member->type.type = vt_invalid;
+ continue;
+ } else {
+ if (type_sym->kind != fb_is_table) {
+ error_sym_2(P, sym, "rpc request type must reference a table, defined here", type_sym);
+ member->type.type = vt_invalid;
+ continue;
+ }
+ member->req_type.type = vt_compound_type_ref;
+ member->req_type.ct = (fb_compound_type_t*)type_sym;
+ }
+ type_sym = lookup_type_reference(P, ct->scope, member->type.ref);
+ if (!type_sym) {
+ error_ref_sym(P, member->type.ref, "unknown type reference used with rpc response type", sym);
+ member->type.type = vt_invalid;
+ continue;
+ } else {
+ if (type_sym->kind != fb_is_table) {
+ error_sym_2(P, sym, "rpc response type must reference a table, defined here", type_sym);
+ member->type.type = vt_invalid;
+ continue;
+ }
+ member->type.type = vt_compound_type_ref;
+ member->type.ct = (fb_compound_type_t*)type_sym;
+ /* Symbols have no size. */
+ member->size = 0;
+ }
+#if FLATCC_ALLOW_RPC_METHOD_ATTRIBUTES
+#if FLATCC_ALLOW_DEPRECATED_RPC_METHOD
+ member->metadata_flags = process_metadata(P, member->metadata, fb_f_deprecated, knowns);
+#else
+ member->metadata_flags = process_metadata(P, member->metadata, 0, knowns);
+#endif
+#else
+ if (member->metadata) {
+ error_sym(P, sym, "rpc methods cannot have attributes");
+ /* Non-fatal. */
+ continue;
+ }
+#endif
+ }
+ return 0;
+}
+
+static int process_enum(fb_parser_t *P, fb_compound_type_t *ct)
+{
+ fb_symbol_t *sym, *old, *type_sym;
+ fb_member_t *member;
+ fb_metadata_t *knowns[KNOWN_ATTR_COUNT];
+ fb_value_t index = { { { 0 } }, 0, 0 };
+ fb_value_t old_index;
+ int first = 1;
+ int bit_flags = 0;
+ int is_union = ct->symbol.kind == fb_is_union;
+
+ if (!is_union) {
+ assert(ct->symbol.kind == fb_is_enum);
+ if (!ct->type.type) {
+ ct->type.type = vt_invalid;
+ error_sym(P, &ct->symbol, "enum must have a type");
+ return -1;
+ }
+ if (ct->type.type == vt_missing) {
+ /*
+ * Enums normally require a type, but the parser may have an
+ * option to allow missing type, and then we provide a
+ * sensible default.
+ */
+ ct->type.st = fb_int;
+ ct->type.type = vt_scalar_type;
+ } else if (ct->type.type == vt_scalar_type) {
+ ct->type.st = map_scalar_token_type(ct->type.t);
+ } else {
+ /* Spec does not mention boolean type in enum, but we allow it. */
+ error_sym(P, &ct->symbol, "enum type must be a scalar integral type or bool");
+ return -1;
+ }
+ ct->size = sizeof_scalar_type(ct->type.st);
+ ct->align = (uint16_t)ct->size;
+ } else {
+ if (ct->type.type) {
+ error_sym(P, &ct->symbol, "unions cannot have a type, they are always enumerated as ubyte");
+ return -1;
+ }
+ /*
+ * We preprocess unions as enums to get the value assignments.
+ * The type field is not documented, but generated output from
+ * flatc suggests ubyte. We use a an injected token to represent
+ * the ubyte type so we do not have to hardcode elsewhere.
+ */
+ ct->type.type = vt_scalar_type;
+ ct->type.st = fb_ubyte;
+ /*
+ * The union field use the type field and not the offset field
+ * to define its size because type.type is scalar.
+ */
+ ct->size = sizeof_scalar_type(fb_ubyte);
+ ct->align = (uint16_t)ct->size;
+ }
+
+ ct->metadata_flags = process_metadata(P, ct->metadata, fb_f_bit_flags, knowns);
+ if (ct->metadata_flags & fb_f_bit_flags) {
+ bit_flags = 1;
+ index.type = vt_uint;
+ index.u = 0;
+ }
+
+ if (ct->type.st == fb_bool) {
+ index.b = 0;
+ index.type = vt_bool;
+ } else {
+ index.i = 0;
+ index.type = vt_int;
+ if (fb_coerce_scalar_type(P, (fb_symbol_t *)ct, ct->type.st, &index)) {
+ error(P, "internal error: unexpected conversion failure on enum 0 index");
+ return -1;
+ }
+ }
+ old_index = index;
+
+ for (sym = ct->members; sym; sym = sym->link, first = 0) {
+ member = (fb_member_t *)sym;
+ if ((old = define_fb_symbol(&ct->index, sym))) {
+ if (old->ident == &P->t_none) {
+ /*
+ * Parser injects `NONE` as the first union member and
+ * it therefore gets index 0. Additional use of NONE
+ * will fail.
+ */
+ error_sym(P, sym, "'NONE' is a predefined value");
+ member->type.type = vt_invalid;
+ continue;
+ }
+ error_sym_2(P, sym, "value already defined here", old);
+ member->type.type = vt_invalid;
+ continue;
+ }
+ if (sym->kind != fb_is_member) {
+ error_sym(P, sym, "internal error: enum value type expected");
+ return -1;
+ }
+ /* Enum / union values cannot have metadata. */
+ assert(member->metadata == 0);
+ if (is_union) {
+ if (member->symbol.ident == &P->t_none) {
+ /* Handle implicit NONE specially. */
+ member->type.type = vt_missing;
+ } else if (member->type.type == vt_string_type) {
+ member->size = 0;
+ } else if (member->type.type != vt_type_ref) {
+ if (member->type.type != vt_invalid) {
+ error_sym(P, sym, "union member type must be string or a reference to a table or a struct");
+ member->type.type = vt_invalid;
+ }
+ continue;
+ } else {
+ type_sym = lookup_type_reference(P, ct->scope, member->type.ref);
+ if (!type_sym) {
+ error_ref_sym(P, member->type.ref, "unknown type reference used with union member", sym);
+ member->type.type = vt_invalid;
+ continue;
+ } else {
+ if (type_sym->kind != fb_is_table && type_sym->kind != fb_is_struct) {
+ error_sym_2(P, sym, "union member type reference must be a table or a struct, defined here", type_sym);
+ member->type.type = vt_invalid;
+ continue;
+ }
+ member->type.type = vt_compound_type_ref;
+ member->type.ct = (fb_compound_type_t*)type_sym;
+ /* Symbols have no size. */
+ member->size = 0;
+ }
+ }
+ }
+ if (!member->value.type && !first) {
+ if (index.type == vt_uint) {
+ if (ct->type.st == fb_long && index.u == UINT64_MAX) {
+ /* Not captured by range check. */
+ error_sym(P, sym, "64-bit unsigned int overflow");
+ }
+ index.u = index.u + 1;
+ } else if (index.type == vt_int && !first) {
+ if (ct->type.st == fb_long && index.i == INT64_MAX) {
+ /* Not captured by range check. */
+ error_sym(P, sym, "64-bit signed int overflow");
+ }
+ index.i = index.i + 1;
+ } else if (index.type == vt_bool && !first) {
+ if (index.b == 1) {
+ error_sym(P, sym, "boolean overflow: cannot enumerate past true");
+ }
+ index.b = 1;
+ }
+ }
+ if (bit_flags) {
+ if (member->value.type) {
+ if (member->value.type != vt_uint) {
+ error_sym(P, sym, "enum value must be unsigned int when used with 'bit_flags'");
+ return -1;
+ } else {
+ index = member->value;
+ }
+ }
+ if (index.u >= sizeof_scalar_type(ct->type.st) * 8) {
+ error_sym(P, sym, "enum value out of range when used with 'bit_flags'");
+ return -1;
+ }
+ member->value.u = UINT64_C(1) << index.u;
+ member->value.type = vt_uint;
+ if (fb_coerce_scalar_type(P, sym, ct->type.st, &member->value)) {
+ /* E.g. enumval = 15 causes signed overflow with short. */
+ error_sym(P, sym, "enum value out of range when used with 'bit_flags'");
+ return -1;
+ }
+ } else {
+ if (member->value.type) {
+ index = member->value;
+ }
+ /*
+ * Captures errors in user assigned values. Also captures
+ * overflow on auto-increment on all types except maximum
+ * representation size, i.e. long or ulong which we handled
+ * above.
+ */
+ if (fb_coerce_scalar_type(P, sym, ct->type.st, &index)) {
+ return -1;
+ }
+ member->value = index;
+ }
+ if (!first && P->opts.ascending_enum) {
+ /* Without ascending enum we also allow duplicate values (but not names). */
+ if ((index.type == vt_uint && index.u <= old_index.u) ||
+ (index.type == vt_int && index.i <= old_index.i)) {
+ if (is_union && old_index.u == 0) {
+ /*
+ * The user explicitly assigned zero, or less, to the first
+ * element (here second element after parser injecting
+ * the NONE element).
+ */
+ error_sym(P, sym, "union values must be positive, 0 is reserved for implicit 'NONE'");
+ member->value.type = vt_invalid;
+ return -1;
+ }
+ error_sym(P, sym, "enum values must be in ascending order");
+ member->value.type = vt_invalid;
+ return -1;
+ }
+ if (index.type == vt_bool && index.b <= old_index.b) {
+ error_sym(P, sym, "enum of type bool can only enumerate from false (0) to true (1)");
+ member->value.type = vt_invalid;
+ return -1;
+ }
+ }
+ old_index = index;
+ if (add_to_value_set(&ct->value_set, &member->value)) {
+ if (is_union) {
+ error_sym(P, sym, "union members require unique positive values (0 being reserved for 'NONE'");
+ member->value.type = vt_invalid;
+ return -1;
+ } else {
+ /*
+ * With ascending enums this won't happen, but
+ * otherwise flag secondary values so we can remove them
+ * from inverse name mappings in code gen.
+ */
+ member->symbol.flags |= fb_duplicate;
+ }
+ }
+ if (member->metadata) {
+ error_sym(P, sym, "enum values cannot have attributes");
+ /* Non-fatal. */
+ continue;
+ }
+ }
+ return 0;
+}
+
+static inline int process_union(fb_parser_t *P, fb_compound_type_t *ct)
+{
+ return process_enum(P, ct);
+}
+
+int fb_build_schema(fb_parser_t *P)
+{
+ fb_schema_t *S = &P->schema;
+ fb_symbol_t *sym, *old_sym;
+ fb_name_t *old_name;
+ fb_compound_type_t *ct;
+ fb_attribute_t *a;
+
+ /* Make sure self is visible at this point in time. */
+ assert(ptr_set_exists(&P->schema.visible_schema, &P->schema));
+ for (sym = S->symbols; sym; sym = sym->link) {
+ switch (sym->kind) {
+ case fb_is_table:
+ case fb_is_enum:
+ case fb_is_union:
+ case fb_is_struct:
+ case fb_is_rpc_service:
+ ct = (fb_compound_type_t *)sym;
+ set_type_hash(ct);
+ ct->schema = &P->schema;
+ if (ct->scope && (old_sym = define_fb_symbol(&ct->scope->symbol_index, sym))) {
+ error_sym_2(P, sym, "symbol already defined here", old_sym);
+ }
+ }
+ }
+
+ /*
+ * Known attributes will be pre-defined if not provided by the
+ * user. After that point, all attribute references must be
+ * defined.
+ */
+ for (a = (fb_attribute_t *)S->attributes; a; a = (fb_attribute_t *)a->name.link) {
+ if ((old_name = define_fb_name(&S->root_schema->attribute_index, &a->name))) {
+ /*
+ * Allow attributes to be defined multiple times, including
+ * known attributes.
+ */
+#if 0
+ error_name(P, &a->name, "attribute already defined");
+#endif
+ }
+ }
+ install_known_attributes(P);
+
+ if (!P->opts.hide_later_enum) {
+ for (sym = S->symbols; sym; sym = sym->link) {
+ switch (sym->kind) {
+ case fb_is_enum:
+ ct = (fb_compound_type_t *)sym;
+ if (process_enum(P, ct)) {
+ ct->type.type = vt_invalid;
+ continue;
+ }
+ break;
+ default:
+ continue;
+ }
+ }
+ }
+
+ /*
+ * Resolve type references both earlier and later than point of
+ * reference. This also supports recursion for tables and unions.
+ */
+ for (sym = S->symbols; sym; sym = sym->link) {
+ switch (sym->kind) {
+ case fb_is_struct:
+ ct = (fb_compound_type_t *)sym;
+ if (process_struct(P, ct)) {
+ ct->type.type = vt_invalid;
+ continue;
+ }
+ break;
+ case fb_is_table:
+ /* Handle after structs and enums. */
+ continue;
+ case fb_is_rpc_service:
+ /*
+ * Also handle rpc_service later like tables, just in case
+ * we allow non-table types in request/response type.
+ */
+ continue;
+ case fb_is_enum:
+ if (P->opts.hide_later_enum) {
+ ct = (fb_compound_type_t *)sym;
+ if (process_enum(P, ct)) {
+ ct->type.type = vt_invalid;
+ continue;
+ }
+ }
+ break;
+ case fb_is_union:
+ ct = (fb_compound_type_t *)sym;
+ if (process_union(P, ct)) {
+ ct->type.type = vt_invalid;
+ continue;
+ }
+ break;
+ default:
+ error_sym(P, sym, "internal error: unexpected symbol at schema level");
+ return -1;
+ }
+ }
+ for (sym = P->schema.symbols; sym; sym = sym->link) {
+ switch (sym->kind) {
+ case fb_is_struct:
+ /*
+ * Structs need two stages, first process symbols, then
+ * analyze for size, alignment, and circular references.
+ */
+ ct = (fb_compound_type_t *)sym;
+ if (ct->type.type != vt_invalid && analyze_struct(P, ct)) {
+ ct->type.type = vt_invalid;
+ continue;
+ }
+ break;
+ default:
+ continue;
+ }
+ }
+ for (sym = P->schema.symbols; sym; sym = sym->link) {
+ switch (sym->kind) {
+ case fb_is_table:
+ ct = (fb_compound_type_t *)sym;
+ /* Only now is the full struct size available. */
+ if (ct->type.type != vt_invalid && process_table(P, ct)) {
+ ct->type.type = vt_invalid;
+ continue;
+ }
+ break;
+ case fb_is_rpc_service:
+ ct = (fb_compound_type_t *)sym;
+ /* Only now is the full struct size available. */
+ if (ct->type.type != vt_invalid && process_rpc_service(P, ct)) {
+ ct->type.type = vt_invalid;
+ continue;
+ }
+ }
+ }
+ for (sym = P->schema.symbols; sym; sym = sym->link) {
+ switch (sym->kind) {
+ case fb_is_table:
+ ct = (fb_compound_type_t *)sym;
+ /*
+ * Some table attributes depend on attributes on members and
+ * therefore can only be validated after procesing.
+ */
+ if (ct->type.type != vt_invalid && validate_table_attr(P, ct)) {
+ ct->type.type = vt_invalid;
+ continue;
+ }
+ }
+ }
+ revert_order(&P->schema.ordered_structs);
+ if (!S->root_type.name) {
+ if (P->opts.require_root_type) {
+ error(P, "root type not declared");
+ }
+ } else {
+ sym = S->root_type.type = lookup_type_reference(P,
+ S->root_type.scope, S->root_type.name);
+ if (!sym) {
+ error_ref(P, S->root_type.name, "root type not found");
+ } else if (P->opts.allow_struct_root) {
+ if (sym->kind != fb_is_struct && sym->kind != fb_is_table) {
+ error_ref(P, S->root_type.name, "root type must be a struct or a table");
+ } else {
+ S->root_type.type = sym;
+ }
+ } else {
+ if (sym->kind != fb_is_table) {
+ error_ref(P, S->root_type.name, "root type must be a table");
+ } else {
+ S->root_type.type = sym;
+ }
+ }
+ S->root_type.name = 0;
+ }
+ P->has_schema = !P->failed;
+ return P->failed;
+}