diff options
author | François-Xavier Coudert <fxcoudert@gcc.gnu.org> | 2006-10-13 08:18:50 +0000 |
---|---|---|
committer | François-Xavier Coudert <fxcoudert@gcc.gnu.org> | 2006-10-13 08:18:50 +0000 |
commit | 16dbbd9957c126f9d3b8014ac8f9d414163c03c7 (patch) | |
tree | 3cdf2a3d259e896bbc296aeda2f6c06d3fcb1499 /gcc/fortran | |
parent | 1a4259dca6f29ce22b34d346322529aa206eeac0 (diff) | |
download | gcc-16dbbd9957c126f9d3b8014ac8f9d414163c03c7.zip gcc-16dbbd9957c126f9d3b8014ac8f9d414163c03c7.tar.gz gcc-16dbbd9957c126f9d3b8014ac8f9d414163c03c7.tar.bz2 |
re PR fortran/21435 (fails to open nonexisting file with status scratch)
PR fortran/21435
* io.c (compare_to_allowed_values): New function.
(gfc_match_open): Add checks for constant values of specifiers.
(gfc_match_close): Add checks for constant values of the STATUS
specifier.
* gcc/testsuite/gfortran.dg/io_constraints_3.f90: New test.
* gcc/testsuite/gfortran.dg/open_access_append_1.f90: Add checks
for compile-time warnings.
* gcc/testsuite/gfortran.dg/pr20163-2.f: Likewise.
* gcc/testsuite/gfortran.dg/iostat_2.f90: Likewise.
* gcc/testsuite/gfortran.dg/label_4.f90: Delete the temporary
file.
* gcc/testsuite/gfortran.dg/direct_io_2.f90: Add a FILE=
specifier.
* gcc/testsuite/gfortran.dg/iomsg_1.f90: Add check for
compile-time warning.
From-SVN: r117685
Diffstat (limited to 'gcc/fortran')
-rw-r--r-- | gcc/fortran/ChangeLog | 8 | ||||
-rw-r--r-- | gcc/fortran/io.c | 342 |
2 files changed, 350 insertions, 0 deletions
diff --git a/gcc/fortran/ChangeLog b/gcc/fortran/ChangeLog index 6f1006d..5d1365a 100644 --- a/gcc/fortran/ChangeLog +++ b/gcc/fortran/ChangeLog @@ -1,3 +1,11 @@ +2006-10-13 Francois-Xavier Coudert <coudert@clipper.ens.fr> + + PR fortran/21435 + * io.c (compare_to_allowed_values): New function. + (gfc_match_open): Add checks for constant values of specifiers. + (gfc_match_close): Add checks for constant values of the STATUS + specifier. + 2006-10-12 Brooks Moses <bmoses@stanford.edu> * intrinsic.texi (STAT): Fixed a format typo in sample code. diff --git a/gcc/fortran/io.c b/gcc/fortran/io.c index a95cd2c..20bf262 100644 --- a/gcc/fortran/io.c +++ b/gcc/fortran/io.c @@ -1253,6 +1253,99 @@ gfc_resolve_open (gfc_open * open) } + +/* Check if a given value for a SPECIFIER is either in the list of values + allowed in F95 or F2003, issuing an error message and returning a zero + value if it is not allowed. */ +static int +compare_to_allowed_values (const char * specifier, const char * allowed[], + const char * allowed_f2003[], + const char * allowed_gnu[], char * value, + const char * statement, bool warn) +{ + int i; + unsigned int len; + + len = strlen(value); + if (len > 0) + { + for (len--; len > 0; len--) + if (value[len] != ' ') + break; + len++; + } + + for (i = 0; allowed[i]; i++) + if (len == strlen(allowed[i]) + && strncasecmp (value, allowed[i], strlen(allowed[i])) == 0) + return 1; + + for (i = 0; allowed_f2003 && allowed_f2003[i]; i++) + if (len == strlen(allowed_f2003[i]) + && strncasecmp (value, allowed_f2003[i], strlen(allowed_f2003[i])) == 0) + { + notification n = gfc_notification_std (GFC_STD_F2003); + + if (n == WARNING || (warn && n == ERROR)) + { + gfc_warning ("Fortran 2003: %s specifier in %s statement at %C " + "has value '%s'", specifier, statement, + allowed_f2003[i]); + return 1; + } + else + if (n == ERROR) + { + gfc_notify_std (GFC_STD_F2003, "Fortran 2003: %s specifier in " + "%s statement at %C has value '%s'", specifier, + statement, allowed_f2003[i]); + return 0; + } + + /* n == SILENT */ + return 1; + } + + for (i = 0; allowed_gnu && allowed_gnu[i]; i++) + if (len == strlen(allowed_gnu[i]) + && strncasecmp (value, allowed_gnu[i], strlen(allowed_gnu[i])) == 0) + { + notification n = gfc_notification_std (GFC_STD_GNU); + + if (n == WARNING || (warn && n == ERROR)) + { + gfc_warning ("Extension: %s specifier in %s statement at %C " + "has value '%s'", specifier, statement, + allowed_gnu[i]); + return 1; + } + else + if (n == ERROR) + { + gfc_notify_std (GFC_STD_GNU, "Extension: %s specifier in " + "%s statement at %C has value '%s'", specifier, + statement, allowed_gnu[i]); + return 0; + } + + /* n == SILENT */ + return 1; + } + + if (warn) + { + gfc_warning ("%s specifier in %s statement at %C has invalid value '%s'", + specifier, statement, value); + return 1; + } + else + { + gfc_error ("%s specifier in %s statement at %C has invalid value '%s'", + specifier, statement, value); + return 0; + } +} + /* Match an OPEN statement. */ match @@ -1260,6 +1353,7 @@ gfc_match_open (void) { gfc_open *open; match m; + bool warn; m = gfc_match_char ('('); if (m == MATCH_NO) @@ -1303,6 +1397,240 @@ gfc_match_open (void) goto cleanup; } + warn = (open->err || open->iostat) ? true : false; + /* Checks on the ACCESS specifier. */ + if (open->access && open->access->expr_type == EXPR_CONSTANT) + { + static const char * access_f95[] = { "SEQUENTIAL", "DIRECT", NULL }; + static const char * access_f2003[] = { "STREAM", NULL }; + static const char * access_gnu[] = { "APPEND", NULL }; + + if (!compare_to_allowed_values ("ACCESS", access_f95, access_f2003, + access_gnu, + open->access->value.character.string, + "OPEN", warn)) + goto cleanup; + } + + /* Checks on the ACTION specifier. */ + if (open->action && open->action->expr_type == EXPR_CONSTANT) + { + static const char * action[] = { "READ", "WRITE", "READWRITE", NULL }; + + if (!compare_to_allowed_values ("ACTION", action, NULL, NULL, + open->action->value.character.string, + "OPEN", warn)) + goto cleanup; + } + + /* Checks on the ASYNCHRONOUS specifier. */ + /* TODO: code is ready, just needs uncommenting when async I/O support + is added ;-) + if (open->asynchronous && open->asynchronous->expr_type == EXPR_CONSTANT) + { + static const char * asynchronous[] = { "YES", "NO", NULL }; + + if (!compare_to_allowed_values + ("action", asynchronous, NULL, NULL, + open->asynchronous->value.character.string, "OPEN", warn)) + goto cleanup; + }*/ + + /* Checks on the BLANK specifier. */ + if (open->blank && open->blank->expr_type == EXPR_CONSTANT) + { + static const char * blank[] = { "ZERO", "NULL", NULL }; + + if (!compare_to_allowed_values ("BLANK", blank, NULL, NULL, + open->blank->value.character.string, + "OPEN", warn)) + goto cleanup; + } + + /* Checks on the DECIMAL specifier. */ + /* TODO: uncomment this code when DECIMAL support is added + if (open->decimal && open->decimal->expr_type == EXPR_CONSTANT) + { + static const char * decimal[] = { "COMMA", "POINT", NULL }; + + if (!compare_to_allowed_values ("DECIMAL", decimal, NULL, NULL, + open->decimal->value.character.string, + "OPEN", warn)) + goto cleanup; + } */ + + /* Checks on the DELIM specifier. */ + if (open->delim && open->delim->expr_type == EXPR_CONSTANT) + { + static const char * delim[] = { "APOSTROPHE", "QUOTE", "NONE", NULL }; + + if (!compare_to_allowed_values ("DELIM", delim, NULL, NULL, + open->delim->value.character.string, + "OPEN", warn)) + goto cleanup; + } + + /* Checks on the ENCODING specifier. */ + /* TODO: uncomment this code when ENCODING support is added + if (open->encoding && open->encoding->expr_type == EXPR_CONSTANT) + { + static const char * encoding[] = { "UTF-8", "DEFAULT", NULL }; + + if (!compare_to_allowed_values ("ENCODING", encoding, NULL, NULL, + open->encoding->value.character.string, + "OPEN", warn)) + goto cleanup; + } */ + + /* Checks on the FORM specifier. */ + if (open->form && open->form->expr_type == EXPR_CONSTANT) + { + static const char * form[] = { "FORMATTED", "UNFORMATTED", NULL }; + + if (!compare_to_allowed_values ("FORM", form, NULL, NULL, + open->form->value.character.string, + "OPEN", warn)) + goto cleanup; + } + + /* Checks on the PAD specifier. */ + if (open->pad && open->pad->expr_type == EXPR_CONSTANT) + { + static const char * pad[] = { "YES", "NO", NULL }; + + if (!compare_to_allowed_values ("PAD", pad, NULL, NULL, + open->pad->value.character.string, + "OPEN", warn)) + goto cleanup; + } + + /* Checks on the POSITION specifier. */ + if (open->position && open->position->expr_type == EXPR_CONSTANT) + { + static const char * position[] = { "ASIS", "REWIND", "APPEND", NULL }; + + if (!compare_to_allowed_values ("POSITION", position, NULL, NULL, + open->position->value.character.string, + "OPEN", warn)) + goto cleanup; + } + + /* Checks on the ROUND specifier. */ + /* TODO: uncomment this code when ROUND support is added + if (open->round && open->round->expr_type == EXPR_CONSTANT) + { + static const char * round[] = { "UP", "DOWN", "ZERO", "NEAREST", + "COMPATIBLE", "PROCESSOR_DEFINED", NULL }; + + if (!compare_to_allowed_values ("ROUND", round, NULL, NULL, + open->round->value.character.string, + "OPEN", warn)) + goto cleanup; + } */ + + /* Checks on the SIGN specifier. */ + /* TODO: uncomment this code when SIGN support is added + if (open->sign && open->sign->expr_type == EXPR_CONSTANT) + { + static const char * sign[] = { "PLUS", "SUPPRESS", "PROCESSOR_DEFINED", + NULL }; + + if (!compare_to_allowed_values ("SIGN", sign, NULL, NULL, + open->sign->value.character.string, + "OPEN", warn)) + goto cleanup; + } */ + +#define warn_or_error(...) \ +{ \ + if (warn) \ + gfc_warning (__VA_ARGS__); \ + else \ + { \ + gfc_error (__VA_ARGS__); \ + goto cleanup; \ + } \ +} + + /* Checks on the RECL specifier. */ + if (open->recl && open->recl->expr_type == EXPR_CONSTANT + && open->recl->ts.type == BT_INTEGER + && mpz_sgn (open->recl->value.integer) != 1) + { + warn_or_error ("RECL in OPEN statement at %C must be positive"); + } + + /* Checks on the STATUS specifier. */ + if (open->status && open->status->expr_type == EXPR_CONSTANT) + { + static const char * status[] = { "OLD", "NEW", "SCRATCH", + "REPLACE", "UNKNOWN", NULL }; + + if (!compare_to_allowed_values ("STATUS", status, NULL, NULL, + open->status->value.character.string, + "OPEN", warn)) + goto cleanup; + + /* F2003, 9.4.5: If the STATUS= specifier has the value NEW or REPLACE, + the FILE= specifier shall appear. */ + if (open->file == NULL && + (strncasecmp (open->status->value.character.string, "replace", 7) == 0 + || strncasecmp (open->status->value.character.string, "new", 3) == 0)) + { + warn_or_error ("The STATUS specified in OPEN statement at %C is '%s' " + "and no FILE specifier is present", + open->status->value.character.string); + } + + /* F2003, 9.4.5: If the STATUS= specifier has the value SCRATCH, + the FILE= specifier shall not appear. */ + if (strncasecmp (open->status->value.character.string, "scratch", 7) == 0 + && open->file) + { + warn_or_error ("The STATUS specified in OPEN statement at %C cannot " + "have the value SCRATCH if a FILE specifier " + "is present"); + } + } + + /* Things that are not allowed for unformatted I/O. */ + if (open->form && open->form->expr_type == EXPR_CONSTANT + && (open->delim + /* TODO uncomment this code when F2003 support is finished */ + /* || open->decimal || open->encoding || open->round + || open->sign */ + || open->pad || open->blank) + && strncasecmp (open->form->value.character.string, + "unformatted", 11) == 0) + { + const char * spec = (open->delim ? "DELIM " : (open->pad ? "PAD " : + open->blank ? "BLANK " : "")); + + warn_or_error ("%sspecifier at %C not allowed in OPEN statement for " + "unformatted I/O", spec); + } + + if (open->recl && open->access && open->access->expr_type == EXPR_CONSTANT + && strncasecmp (open->access->value.character.string, "stream", 6) == 0) + { + warn_or_error ("RECL specifier not allowed in OPEN statement at %C for " + "stream I/O"); + } + + if (open->position && open->access && open->access->expr_type == EXPR_CONSTANT + && !(strncasecmp (open->access->value.character.string, + "sequential", 10) == 0 + || strncasecmp (open->access->value.character.string, + "stream", 6) == 0 + || strncasecmp (open->access->value.character.string, + "append", 6) == 0)) + { + warn_or_error ("POSITION specifier in OPEN statement at %C only allowed " + "for stream or sequential ACCESS"); + } + +#undef warn_or_error + new_st.op = EXEC_OPEN; new_st.ext.open = open; return MATCH_YES; @@ -1368,6 +1696,7 @@ gfc_match_close (void) { gfc_close *close; match m; + bool warn; m = gfc_match_char ('('); if (m == MATCH_NO) @@ -1411,6 +1740,19 @@ gfc_match_close (void) goto cleanup; } + warn = (close->iostat || close->err) ? true : false; + + /* Checks on the STATUS specifier. */ + if (close->status && close->status->expr_type == EXPR_CONSTANT) + { + static const char * status[] = { "KEEP", "DELETE" }; + + if (!compare_to_allowed_values ("STATUS", status, NULL, NULL, + close->status->value.character.string, + "CLOSE", warn)) + goto cleanup; + } + new_st.op = EXEC_CLOSE; new_st.ext.close = close; return MATCH_YES; |