aboutsummaryrefslogtreecommitdiff
path: root/src/check_decl.cpp
diff options
context:
space:
mode:
authorgingerBill <gingerBill@users.noreply.github.com>2024-05-05 21:50:57 +0100
committerGitHub <noreply@github.com>2024-05-05 21:50:57 +0100
commit15f7148eae89a36696916e15ed4c83fb7fed01c5 (patch)
tree1b743cb73db6ee1e5849820739c535e5a36f917f /src/check_decl.cpp
parent1e5267c8e7ab1777e6691d28b4cf84f62c5e1871 (diff)
parent25f1d0906d2b5a8276c3832783970a798c12cc6c (diff)
Merge pull request #3526 from laytan/target-features
Improve target features support
Diffstat (limited to 'src/check_decl.cpp')
-rw-r--r--src/check_decl.cpp49
1 files changed, 39 insertions, 10 deletions
diff --git a/src/check_decl.cpp b/src/check_decl.cpp
index 952a877a4..5b9486873 100644
--- a/src/check_decl.cpp
+++ b/src/check_decl.cpp
@@ -886,17 +886,37 @@ gb_internal void check_proc_decl(CheckerContext *ctx, Entity *e, DeclInfo *d) {
check_objc_methods(ctx, e, ac);
- if (ac.require_target_feature.len != 0 && ac.enable_target_feature.len != 0) {
- error(e->token, "Attributes @(require_target_feature=...) and @(enable_target_feature=...) cannot be used together");
- } else if (ac.require_target_feature.len != 0) {
- if (check_target_feature_is_enabled(e->token.pos, ac.require_target_feature)) {
- e->Procedure.target_feature = ac.require_target_feature;
- } else {
- e->Procedure.target_feature_disabled = true;
+ {
+ if (ac.require_target_feature.len != 0 && ac.enable_target_feature.len != 0) {
+ error(e->token, "A procedure cannot have both @(require_target_feature=\"...\") and @(enable_target_feature=\"...\")");
+ }
+
+ if (build_context.strict_target_features && ac.enable_target_feature.len != 0) {
+ ac.require_target_feature = ac.enable_target_feature;
+ ac.enable_target_feature.len = 0;
+ }
+
+ if (ac.require_target_feature.len != 0) {
+ pt->require_target_feature = ac.require_target_feature;
+ String invalid;
+ if (!check_target_feature_is_valid_globally(ac.require_target_feature, &invalid)) {
+ error(e->token, "Required target feature '%.*s' is not a valid target feature", LIT(invalid));
+ } else if (!check_target_feature_is_enabled(ac.require_target_feature, nullptr)) {
+ e->flags |= EntityFlag_Disabled;
+ }
+ } else if (ac.enable_target_feature.len != 0) {
+
+ // NOTE: disallow wasm, features on that arch are always global to the module.
+ if (is_arch_wasm()) {
+ error(e->token, "@(enable_target_feature=\"...\") is not allowed on wasm, features for wasm must be declared globally");
+ }
+
+ pt->enable_target_feature = ac.enable_target_feature;
+ String invalid;
+ if (!check_target_feature_is_valid_globally(ac.enable_target_feature, &invalid)) {
+ error(e->token, "Procedure enabled target feature '%.*s' is not a valid target feature", LIT(invalid));
+ }
}
- } else if (ac.enable_target_feature.len != 0) {
- enable_target_feature(e->token.pos, ac.enable_target_feature);
- e->Procedure.target_feature = ac.enable_target_feature;
}
switch (e->Procedure.optimization_mode) {
@@ -1370,6 +1390,10 @@ gb_internal void check_proc_group_decl(CheckerContext *ctx, Entity *pg_entity, D
continue;
}
+ if (p->flags & EntityFlag_Disabled) {
+ continue;
+ }
+
String name = p->token.string;
for (isize k = j+1; k < pge->entities.count; k++) {
@@ -1387,6 +1411,10 @@ gb_internal void check_proc_group_decl(CheckerContext *ctx, Entity *pg_entity, D
ERROR_BLOCK();
+ if (q->flags & EntityFlag_Disabled) {
+ continue;
+ }
+
ProcTypeOverloadKind kind = are_proc_types_overload_safe(p->type, q->type);
bool both_have_where_clauses = false;
if (p->decl_info->proc_lit != nullptr && q->decl_info->proc_lit != nullptr) {
@@ -1423,6 +1451,7 @@ gb_internal void check_proc_group_decl(CheckerContext *ctx, Entity *pg_entity, D
break;
case ProcOverload_ParamCount:
case ProcOverload_ParamTypes:
+ case ProcOverload_TargetFeatures:
// This is okay :)
break;