Changeset 0eb18557 for doc/rob_thesis
- Timestamp:
- Apr 12, 2017, 3:54:28 PM (8 years ago)
- Branches:
- ADT, aaron-thesis, arm-eh, ast-experimental, cleanup-dtors, deferred_resn, demangler, enum, forall-pointer-decay, jacob/cs343-translation, jenkins-sandbox, master, new-ast, new-ast-unique-expr, new-env, no_list, persistent-indexer, pthread-emulation, qualifiedEnum, resolv-new, with_gc
- Children:
- e869e434
- Parents:
- eaa2f3a1
- Location:
- doc/rob_thesis
- Files:
-
- 6 edited
Legend:
- Unmodified
- Added
- Removed
-
doc/rob_thesis/cfa-format.tex
reaa2f3a1 r0eb18557 131 131 style=defaultStyle 132 132 } 133 \lstMakeShortInline[basewidth=0.5em,breaklines=true ]@ % single-character for \lstinline133 \lstMakeShortInline[basewidth=0.5em,breaklines=true,basicstyle=\normalsize\ttfamily\color{basicCol}]@ % single-character for \lstinline 134 134 135 135 \lstnewenvironment{cfacode}[1][]{ -
doc/rob_thesis/conclusions.tex
reaa2f3a1 r0eb18557 45 45 46 46 A caveat of this approach is that the @cleanup@ attribute only permits a name that refers to a function that consumes a single argument of type @T *@ for a variable of type @T@. 47 This means that any destructor that consumes multiple arguments ( e.g., because it is polymorphic) or any destructor that is a function pointer (e.g., because it is an assertion parameter) must be called through a local thunk.47 This means that any destructor that consumes multiple arguments (\eg, because it is polymorphic) or any destructor that is a function pointer (\eg, because it is an assertion parameter) must be called through a local thunk. 48 48 For example, 49 49 \begin{cfacode} -
doc/rob_thesis/ctordtor.tex
reaa2f3a1 r0eb18557 7 7 8 8 Since \CFA is a true systems language, it does not provide a garbage collector. 9 As well, \CFA is not an object-oriented programming language, i.e., structures cannot have routine members.9 As well, \CFA is not an object-oriented programming language, \ie, structures cannot have routine members. 10 10 Nevertheless, one important goal is to reduce programming complexity and increase safety. 11 11 To that end, \CFA provides support for implicit pre/post-execution of routines for objects, via constructors and destructors. … … 30 30 Next, @x@ is assigned the value of @y@. 31 31 In the last line, @z@ is implicitly initialized to 0 since it is marked @static@. 32 The key difference between assignment and initialization being that assignment occurs on a live object ( i.e., an object that contains data).32 The key difference between assignment and initialization being that assignment occurs on a live object (\ie, an object that contains data). 33 33 It is important to note that this means @x@ could have been used uninitialized prior to being assigned, while @y@ could not be used uninitialized. 34 34 Use of uninitialized variables yields undefined behaviour, which is a common source of errors in C programs. … … 79 79 80 80 In \CFA, a constructor is a function with the name @?{}@. 81 Like other operators in \CFA, the name represents the syntax used to call the constructor, e.g., @struct S = { ... };@.81 Like other operators in \CFA, the name represents the syntax used to call the constructor, \eg, @struct S = { ... };@. 82 82 Every constructor must have a return type of @void@ and at least one parameter, the first of which is colloquially referred to as the \emph{this} parameter, as in many object-oriented programming-languages (however, a programmer can give it an arbitrary name). 83 83 The @this@ parameter must have a pointer type, whose base type is the type of object that the function constructs. … … 114 114 In other words, a default constructor is a constructor that takes a single argument: the @this@ parameter. 115 115 116 In \CFA, a destructor is a function much like a constructor, except that its name is \lstinline!^?{}! and it take only one argument.117 A destructor for the @Array@ type can be defined as such.116 In \CFA, a destructor is a function much like a constructor, except that its name is \lstinline!^?{}! and it takes only one argument. 117 A destructor for the @Array@ type can be defined as: 118 118 \begin{cfacode} 119 119 void ^?{}(Array * arr) { … … 167 167 } 168 168 \end{cfacode} 169 169 170 In \CFA, constructors are called implicitly in initialization contexts. 170 171 \begin{cfacode} 171 172 Array x, y = { 20, 0xdeadbeef }, z = y; 172 173 \end{cfacode} 173 174 In \CFA, constructor calls look just like C initializers, which allows them to be inserted into legacy C code with minimal code changes, and also provides a very simple syntax that veteran C programmers are familiar with. 175 One downside of reusing C initialization syntax is that it isn't possible to determine whether an object is constructed just by looking at its declaration, since that requires knowledge of whether the type is managed at that point. 174 Constructor calls look just like C initializers, which allows them to be inserted into legacy C code with minimal code changes, and also provides a very simple syntax that veteran C programmers are familiar with. 175 One downside of reusing C initialization syntax is that it is not possible to determine whether an object is constructed just by looking at its declaration, since that requires knowledge of whether the type is managed at that point in the program. 176 176 177 177 This example generates the following code … … 246 246 \end{cfacode} 247 247 Finally, constructors and destructors support \emph{operator syntax}. 248 Like other operators in \CFA, the function name mirrors the use-case, in that the first $N$ arguments fill in the place of the question mark.248 Like other operators in \CFA, the function name mirrors the use-case, in that the question marks are placeholders for the first $N$ arguments. 249 249 This syntactic form is similar to the new initialization syntax in \CCeleven, except that it is used in expression contexts, rather than declaration contexts. 250 250 \begin{cfacode} … … 272 272 Like other operators, the function name @?{}@ matches its operator syntax. 273 273 For example, @(&x){}@ calls the default constructor on the variable @x@, and produces @&x@ as a result. 274 A key example for this capability is the use of constructor expressions to initialize the result of a call to standard C routine@malloc@.274 A key example for this capability is the use of constructor expressions to initialize the result of a call to @malloc@. 275 275 \begin{cfacode} 276 276 struct X { ... }; 277 277 void ?{}(X *, double); 278 X * x = malloc( sizeof(X)){ 1.5 };278 X * x = malloc(){ 1.5 }; 279 279 \end{cfacode} 280 280 In this example, @malloc@ dynamically allocates storage and initializes it using a constructor, all before assigning it into the variable @x@. 281 281 If this extension is not present, constructing dynamically allocated objects is much more cumbersome, requiring separate initialization of the pointer and initialization of the pointed-to memory. 282 282 \begin{cfacode} 283 X * x = malloc( sizeof(X));283 X * x = malloc(); 284 284 x{ 1.5 }; 285 285 \end{cfacode} … … 291 291 struct X *_tmp_ctor; 292 292 struct X *x = ?{}( // construct result of malloc 293 _tmp_ctor=malloc (sizeof(struct X)), // store result of malloc293 _tmp_ctor=malloc_T(sizeof(struct X), _Alignof(struct X)), // store result of malloc 294 294 1.5 295 295 ), _tmp_ctor; // produce constructed result of malloc … … 297 297 It should be noted that this technique is not exclusive to @malloc@, and allows a user to write a custom allocator that can be idiomatically used in much the same way as a constructed @malloc@ call. 298 298 299 It is also possible to use operator syntax with destructors. 300 Unlike constructors, operator syntax with destructors is a statement and thus does not produce a value, since the destructed object is invalidated by the use of a destructor. 301 For example, \lstinline!^(&x){}! calls the destructor on the variable @x@. 299 It should be noted that while it is possible to use operator syntax with destructors, destructors invalidate their argument, thus operator syntax with destructors is a statement and does not produce a value. 302 300 303 301 \subsection{Function Generation} … … 376 374 The field constructors are constructors that consume a prefix of the structure's member-list. 377 375 That is, $N$ constructors are built of the form @void ?{}(S *, T$_{\text{M}_0}$)@, @void ?{}(S *, T$_{\text{M}_0}$, T$_{\text{M}_1}$)@, ..., @void ?{}(S *, T$_{\text{M}_0}$, T$_{\text{M}_1}$, ..., T$_{\text{M}_{N-1}}$)@, where members are copy constructed if they have a corresponding positional argument and are default constructed otherwise. 378 The addition of field constructors allows structures in \CFA to be used naturally in the same ways as used in C ( i.e., to initialize any prefix of the structure), e.g., @A a0 = { b }, a1 = { b, c }@.376 The addition of field constructors allows structures in \CFA to be used naturally in the same ways as used in C (\ie, to initialize any prefix of the structure), \eg, @A a0 = { b }, a1 = { b, c }@. 379 377 Extending the previous example, the following constructors are implicitly generated for @A@. 380 378 \begin{cfacode} … … 429 427 430 428 \subsection{Using Constructors and Destructors} 431 Implicitly generated constructor and destructor calls ignore the outermost type qualifiers, e.g.@const@ and @volatile@, on a type by way of a cast on the first argument to the function.429 Implicitly generated constructor and destructor calls ignore the outermost type qualifiers, \eg @const@ and @volatile@, on a type by way of a cast on the first argument to the function. 432 430 For example, 433 431 \begin{cfacode} … … 448 446 Here, @&s@ and @&s2@ are cast to unqualified pointer types. 449 447 This mechanism allows the same constructors and destructors to be used for qualified objects as for unqualified objects. 450 This applies only to implicitly generated constructor calls.448 This rule applies only to implicitly generated constructor calls. 451 449 Hence, explicitly re-initializing qualified objects with a constructor requires an explicit cast. 452 450 … … 489 487 Instead, @a2->x@ is initialized to @0@ as if it were a C object, because of the explicit initializer. 490 488 491 In addition to freedom, \ateq provides a simple path tomigrating legacy C code to \CFA, in that objects can be moved from C-style initialization to \CFA gradually and individually.489 In addition to freedom, \ateq provides a simple path for migrating legacy C code to \CFA, in that objects can be moved from C-style initialization to \CFA gradually and individually. 492 490 It is worth noting that the use of unmanaged objects can be tricky to get right, since there is no guarantee that the proper invariants are established on an unmanaged object. 493 491 It is recommended that most objects be managed by sensible constructors and destructors, except where absolutely necessary. … … 503 501 { 504 502 void ?{}(S * s, int i) { s->x = i*2; } // locally hide autogen constructors 505 S s4; // error 506 S s5 = { 3 }; // okay 507 S s6 = { 4, 5 }; // error 503 S s4; // error, no default constructor 504 S s5 = { 3 }; // okay, local constructor 505 S s6 = { 4, 5 }; // error, no field constructor 508 506 S s7 = s5; // okay 509 507 } … … 513 511 In this example, the inner scope declares a constructor from @int@ to @S@, which hides the default constructor and field constructors until the end of the scope. 514 512 515 When defining a constructor or destructor for a struct @S@, any members that are not explicitly constructed or destructed are implicitly constructed or destructed automatically.513 When defining a constructor or destructor for a structure @S@, any members that are not explicitly constructed or destructed are implicitly constructed or destructed automatically. 516 514 If an explicit call is present, then that call is taken in preference to any implicitly generated call. 517 515 A consequence of this rule is that it is possible, unlike \CC, to precisely control the order of construction and destruction of sub-objects on a per-constructor basis, whereas in \CC sub-object initialization and destruction is always performed based on the declaration order. … … 597 595 In practice, however, there could be many objects that can be constructed from a given @int@ (or, indeed, any arbitrary parameter list), and thus a complete solution to this problem would require fully exploring all possibilities. 598 596 599 More precisely, constructor calls cannot have a nesting depth greater than the number of array components in the type of the initialized object, plus one.597 More precisely, constructor calls cannot have a nesting depth greater than the number of array dimensions in the type of the initialized object, plus one. 600 598 For example, 601 599 \begin{cfacode} … … 609 607 { {14 }, { 15 } } // a2[1] 610 608 }; 611 A a3[4] = { 612 { { 11 }, { 12 } }, // error 609 A a3[4] = { // 1 dimension => max depth 2 610 { { 11 }, { 12 } }, // error, three levels deep 613 611 { 80 }, { 90 }, { 100 } 614 612 } … … 622 620 \label{sub:implicit_dtor} 623 621 Destructors are automatically called at the end of the block in which the object is declared. 624 In addition to this, destructors are automatically called when statements manipulate control flow to leave a block in which the object is declared, e.g., with return, break, continue, and goto statements.622 In addition to this, destructors are automatically called when statements manipulate control flow to leave a block in which the object is declared, \eg, with return, break, continue, and goto statements. 625 623 The example below demonstrates a simple routine with multiple return statements. 626 624 \begin{cfacode} … … 747 745 Exempt from these rules are intrinsic and built-in functions. 748 746 It should be noted that unmanaged objects are subject to copy constructor calls when passed as arguments to a function or when returned from a function, since they are not the \emph{target} of the copy constructor call. 749 That is, since the parameter is not marked as an unmanaged object using \ateq, it willbe copy constructed if it is returned by value or passed as an argument to another function, so to guarantee consistent behaviour, unmanaged objects must be copy constructed when passed as arguments.750 Th is is an important detailto bear in mind when using unmanaged objects, and could produce unexpected results when mixed with objects that are explicitly constructed.747 That is, since the parameter is not marked as an unmanaged object using \ateq, it is be copy constructed if it is returned by value or passed as an argument to another function, so to guarantee consistent behaviour, unmanaged objects must be copy constructed when passed as arguments. 748 These semantics are important to bear in mind when using unmanaged objects, and could produce unexpected results when mixed with objects that are explicitly constructed. 751 749 \begin{cfacode} 752 750 struct A; … … 763 761 identity(z); // copy construct z into x 764 762 \end{cfacode} 765 Note that @z@ is copy constructed into a temporary variable to be passed as an argument, which is also destructed after the call. 763 Note that unmanaged argument @z@ is logically copy constructed into managed parameter @x@; however, the translator must copy construct into a temporary variable to be passed as an argument, which is also destructed after the call. 764 A compiler could by-pass the argument temporaries since it is in control of the calling conventions and knows exactly where the called-function's parameters live. 766 765 767 766 This generates the following … … 859 858 This transformation provides @f@ with the address of the return variable so that it can be constructed into directly. 860 859 It is worth pointing out that this kind of signature rewriting already occurs in polymorphic functions that return by value, as discussed in \cite{Bilson03}. 861 A key difference in this case is that every function would need to be rewritten like this, since types can switch between managed and unmanaged at different scope levels, e.g.860 A key difference in this case is that every function would need to be rewritten like this, since types can switch between managed and unmanaged at different scope levels, \eg 862 861 \begin{cfacode} 863 862 struct A { int v; }; … … 874 873 Furthermore, it is not possible to overload C functions, so using @extern "C"@ to declare functions is of limited use. 875 874 876 It would be possible to regain some control by adding an attribute to struct s that specifies whether they can be managed or not (perhaps \emph{manageable} or \emph{unmanageable}), and to emit an error in the case that a constructor or destructor is declared for an unmanageable type.877 Ideally, struct s should be manageable by default, since otherwise the default case becomes more verbose.875 It would be possible to regain some control by adding an attribute to structures that specifies whether they can be managed or not (perhaps \emph{manageable} or \emph{unmanageable}), and to emit an error in the case that a constructor or destructor is declared for an unmanageable type. 876 Ideally, structures should be manageable by default, since otherwise the default case becomes more verbose. 878 877 This means that in general, function signatures would have to be rewritten, and in a select few cases the signatures would not be rewritten. 879 878 \begin{cfacode} … … 886 885 C h(); // rewritten void h(C *); 887 886 \end{cfacode} 888 An alternative is to insteadmake the attribute \emph{identifiable}, which states that objects of this type use the @this@ parameter as an identity.887 An alternative is to make the attribute \emph{identifiable}, which states that objects of this type use the @this@ parameter as an identity. 889 888 This strikes more closely to the visible problem, in that only types marked as identifiable would need to have the return value moved into the parameter list, and every other type could remain the same. 890 889 Furthermore, no restrictions would need to be placed on whether objects can be constructed. … … 1015 1014 1016 1015 \subsection{Global Initialization} 1017 In standard C, global variables can only be initialized to compile-time constant expressions. 1018 This places strict limitations on the programmer's ability to control the default values of objects. 1016 In standard C, global variables can only be initialized to compile-time constant expressions, which places strict limitations on the programmer's ability to control the default values of objects. 1019 1017 In \CFA, constructors and destructors are guaranteed to be run on global objects, allowing arbitrary code to be run before and after the execution of the main routine. 1020 1018 By default, objects within a translation unit are constructed in declaration order, and destructed in the reverse order. 1021 1019 The default order of construction of objects amongst translation units is unspecified. 1022 It is, however, guaranteed that any global objects in the standard library are initialized prior to the initialization of any object in theuser program.1020 It is, however, guaranteed that any global objects in the standard library are initialized prior to the initialization of any object in a user program. 1023 1021 1024 1022 This feature is implemented in the \CFA translator by grouping every global constructor call into a function with the GCC attribute \emph{constructor}, which performs most of the heavy lifting \cite[6.31.1]{GCCExtensions}. … … 1053 1051 % https://gcc.gnu.org/onlinedocs/gcc/C_002b_002b-Attributes.html#C_002b_002b-Attributes 1054 1052 % suggestion: implement this in CFA by picking objects with a specified priority and pulling them into their own init functions (could even group them by priority level -> map<int, list<ObjectDecl*>>) and pull init_priority forward into constructor and destructor attributes with the same priority level 1055 GCC provides an attribute @init_priority@ , which allows specifying the relative priority for initialization of global objects on a per-object basis in \CC.1053 GCC provides an attribute @init_priority@ in \CC, which allows specifying the relative priority for initialization of global objects on a per-object basis. 1056 1054 A similar attribute can be implemented in \CFA by pulling marked objects into global constructor/destructor-attribute functions with the specified priority. 1057 1055 For example, … … 1076 1074 In standard C, it is possible to mark variables that are local to a function with the @static@ storage class. 1077 1075 Unlike normal local variables, a @static@ local variable is defined to live for the entire duration of the program, so that each call to the function has access to the same variable with the same address and value as it had in the previous call to the function. 1078 Much like global variables, in C@static@ variables can only be initialized to a \emph{compile-time constant value} so that a compiler is able to create storage for the variable and initialize it at compile-time.1076 Much like global variables, @static@ variables can only be initialized to a \emph{compile-time constant value} so that a compiler is able to create storage for the variable and initialize it at compile-time. 1079 1077 1080 1078 Yet again, this rule is too restrictive for a language with constructors and destructors. 1081 Instead, \CFA modifies the definition of a @static@ local variable so that objects are guaranteed to be live from the time control flow reaches their declaration, until the end of the program, since the initializer expression is not necessarily a compile-time constant, but can depend on the current execution state of the function.1082 Since standard C does not allow access to a @static@ local variable before the first time control flow reaches the declaration, this restrictiondoes not preclude any valid C code.1079 Since the initializer expression is not necessarily a compile-time constant and can depend on the current execution state of the function, \CFA modifies the definition of a @static@ local variable so that objects are guaranteed to be live from the time control flow reaches their declaration, until the end of the program. 1080 Since standard C does not allow access to a @static@ local variable before the first time control flow reaches the declaration, this change does not preclude any valid C code. 1083 1081 Local objects with @static@ storage class are only implicitly constructed and destructed once for the duration of the program. 1084 1082 The object is constructed when its declaration is reached for the first time. … … 1090 1088 Since the parameter to @atexit@ is a parameter-less function, some additional tweaking is required. 1091 1089 First, the @static@ variable must be hoisted up to global scope and uniquely renamed to prevent name clashes with other global objects. 1092 Second, a function is built which calls the destructor for the newly hoisted variable. 1090 If necessary, a local structure may need to be hoisted, as well. 1091 Second, a function is built that calls the destructor for the newly hoisted variable. 1093 1092 Finally, the newly generated function is registered with @atexit@, instead of registering the destructor directly. 1094 1093 Since @atexit@ calls functions in the reverse order in which they are registered, @static@ local variables are guaranteed to be destructed in the reverse order that they are constructed, which may differ between multiple executions of the same program. … … 1156 1155 void f(T); 1157 1156 \end{cfacode} 1158 This allows easily specifying constraints that are common to all complete object 1159 1160 Now that \CFA has constructors and destructors, more of a complete object's behaviour can be specified bythan was previously possible.1157 This allows easily specifying constraints that are common to all complete object-types very simply. 1158 1159 Now that \CFA has constructors and destructors, more of a complete object's behaviour can be specified than was previously possible. 1161 1160 As such, @otype@ has been augmented to include assertions for a default constructor, copy constructor, and destructor. 1162 1161 That is, the previous example is now equivalent to 1163 1162 \begin{cfacode} 1164 forall(dtype T | sized(T) | { T ?=?(T *, T); void ?{}(T *); void ?{}(T *, T); void ^?{}(T *); }) 1163 forall(dtype T | sized(T) | 1164 { T ?=?(T *, T); void ?{}(T *); void ?{}(T *, T); void ^?{}(T *); }) 1165 1165 void f(T); 1166 1166 \end{cfacode} 1167 Th is allows@f@'s body to create and destroy objects of type @T@, and pass objects of type @T@ as arguments to other functions, following the normal \CFA rules.1168 A point of note here is that objects can be missing default constructors (and eventually other functions through deleted functions), so it is important for \CFA programmers to think carefully about the operations needed by their function, as to not over-constrain the acceptable parameter types .1167 These additions allow @f@'s body to create and destroy objects of type @T@, and pass objects of type @T@ as arguments to other functions, following the normal \CFA rules. 1168 A point of note here is that objects can be missing default constructors (and eventually other functions through deleted functions), so it is important for \CFA programmers to think carefully about the operations needed by their function, as to not over-constrain the acceptable parameter types and prevent potential reuse. -
doc/rob_thesis/intro.tex
reaa2f3a1 r0eb18557 16 16 Therefore, these design principles must be kept in mind throughout the design and development of new language features. 17 17 In order to appeal to existing C programmers, great care must be taken to ensure that new features naturally feel like C. 18 These goals ensure existing C code-bases can be converted to \CFA incrementally with minimal effort, and C programmers can productively generate \CFA code without training beyond the features being used. 19 Unfortunately, \CC is actively diverging from C, so incremental additions require significant effort and training, coupled with multiple legacy design-choices that cannot be updated. 20 18 21 The remainder of this section describes some of the important new features that currently exist in \CFA, to give the reader the necessary context in which the new features presented in this thesis must dovetail. 19 22 … … 53 56 \end{cfacode} 54 57 Compound literals create an unnamed object, and result in an lvalue, so it is legal to assign a value into a compound literal or to take its address \cite[p.~86]{C11}. 55 Syntactically, compound literals look like a cast operator followed by a brace-enclosed initializer, but semantically are different from a C cast, which only applies basic conversions and is never an lvalue.58 Syntactically, compound literals look like a cast operator followed by a brace-enclosed initializer, but semantically are different from a C cast, which only applies basic conversions and coercions and is never an lvalue. 56 59 57 60 \subsection{Overloading} … … 59 62 Overloading is the ability to specify multiple entities with the same name. 60 63 The most common form of overloading is function overloading, wherein multiple functions can be defined with the same name, but with different signatures. 61 Like in \CC, \CFA allows overloading based both on the number of parameters and on the types of parameters. 64 C provides a small amount of built-in overloading, \eg + is overloaded for the basic types. 65 Like in \CC, \CFA allows user-defined overloading based both on the number of parameters and on the types of parameters. 62 66 \begin{cfacode} 63 67 void f(void); // (1) … … 92 96 There are times when a function should logically return multiple values. 93 97 Since a function in standard C can only return a single value, a programmer must either take in additional return values by address, or the function's designer must create a wrapper structure to package multiple return-values. 98 For example, the first approach: 94 99 \begin{cfacode} 95 100 int f(int * ret) { // returns a value through parameter ret … … 101 106 int res1 = g(&res2); // explicitly pass storage 102 107 \end{cfacode} 103 The former solutionis awkward because it requires the caller to explicitly allocate memory for $n$ result variables, even if they are only temporary values used as a subexpression, or even not used at all.104 The latterapproach:108 is awkward because it requires the caller to explicitly allocate memory for $n$ result variables, even if they are only temporary values used as a subexpression, or even not used at all. 109 The second approach: 105 110 \begin{cfacode} 106 111 struct A { … … 113 118 ... res3.x ... res3.y ... // use result values 114 119 \end{cfacode} 115 requires the callerto either learn the field names of the structure or learn the names of helper routines to access the individual return values.116 Both solutions are syntactically unnatural.120 is awkward because the caller has to either learn the field names of the structure or learn the names of helper routines to access the individual return values. 121 Both approaches are syntactically unnatural. 117 122 118 123 In \CFA, it is possible to directly declare a function returning multiple values. … … 165 170 \begin{cfacode} 166 171 struct A { int i; }; 167 int ?+?(A x, A y); 172 int ?+?(A x, A y); // '?'s represent operands 168 173 bool ?<?(A x, A y); 169 174 \end{cfacode} 170 175 Notably, the only difference is syntax. 171 176 Most of the operators supported by \CC for operator overloading are also supported in \CFA. 172 Of notable exception are the logical operators ( e.g. @||@), the sequence operator (i.e. @,@), and the member-access operators (e.g.@.@ and \lstinline{->}).177 Of notable exception are the logical operators (\eg @||@), the sequence operator (\ie @,@), and the member-access operators (\eg @.@ and \lstinline{->}). 173 178 174 179 Finally, \CFA also permits overloading variable identifiers. … … 243 248 template<typename T> 244 249 T sum(T *arr, int n) { 245 T t; 250 T t; // default construct => 0 246 251 for (; n > 0; n--) t += arr[n-1]; 247 252 return t; … … 261 266 \end{cfacode} 262 267 The first thing to note here is that immediately following the declaration of @otype T@ is a list of \emph{type assertions} that specify restrictions on acceptable choices of @T@. 263 In particular, the assertions above specify that there must be a an assignment from \zero to @T@ and an addition assignment operator from @T@ to @T@.268 In particular, the assertions above specify that there must be an assignment from \zero to @T@ and an addition assignment operator from @T@ to @T@. 264 269 The existence of an assignment operator from @T@ to @T@ and the ability to create an object of type @T@ are assumed implicitly by declaring @T@ with the @otype@ type-class. 265 270 In addition to @otype@, there are currently two other type-classes. … … 281 286 A major difference between the approaches of \CC and \CFA to polymorphism is that the set of assumed properties for a type is \emph{explicit} in \CFA. 282 287 One of the major limiting factors of \CC's approach is that templates cannot be separately compiled. 283 In contrast, the explicit nature of assertions allows \CFA's polymorphic functions to be separately compiled. 288 In contrast, the explicit nature of assertions allows \CFA's polymorphic functions to be separately compiled, as the function prototype states all necessary requirements separate from the implementation. 289 For example, the prototype for the previous sum function is 290 \begin{cfacode} 291 forall(otype T | **R**{ T ?=?(T *, zero_t); T ?+=?(T *, T); }**R**) 292 T sum(T *arr, int n); 293 \end{cfacode} 294 With this prototype, a caller in another translation unit knows all of the constraints on @T@, and thus knows all of the operations that need to be made available to @sum@. 284 295 285 296 In \CFA, a set of assertions can be factored into a \emph{trait}. … … 296 307 This capability allows specifying the same set of assertions in multiple locations, without the repetition and likelihood of mistakes that come with manually writing them out for each function declaration. 297 308 298 An interesting application of return-type resolution and polymorphism is with type-safe@malloc@.309 An interesting application of return-type resolution and polymorphism is a type-safe version of @malloc@. 299 310 \begin{cfacode} 300 311 forall(dtype T | sized(T)) … … 316 327 317 328 In object-oriented programming languages, type invariants are typically established in a constructor and maintained throughout the object's lifetime. 318 These assertions are typically achieved through a combination of access 329 These assertions are typically achieved through a combination of access-control modifiers and a restricted interface. 319 330 Typically, data which requires the maintenance of an invariant is hidden from external sources using the \emph{private} modifier, which restricts reads and writes to a select set of trusted routines, including member functions. 320 331 It is these trusted routines that perform all modifications to internal data in a way that is consistent with the invariant, by ensuring that the invariant holds true at the end of the routine call. … … 388 399 In other languages, a hybrid situation exists where resources escape the allocation block, but ownership is precisely controlled by the language. 389 400 This pattern requires a strict interface and protocol for a data structure, consisting of a pre-initialization and a post-termination call, and all intervening access is done via interface routines. 390 This kind of encapsulation is popular in object-oriented programming languages, and like the stack, it takes care of a significant portion of resource 401 This kind of encapsulation is popular in object-oriented programming languages, and like the stack, it takes care of a significant portion of resource-management cases. 391 402 392 403 For example, \CC directly supports this pattern through class types and an idiom known as RAII \footnote{Resource Acquisition is Initialization} by means of constructors and destructors. … … 399 410 In the context of \CFA, a non-trivial constructor is either a user defined constructor or an auto-generated constructor that calls a non-trivial constructor. 400 411 401 For the remaining resource ownership cases, programmer must follow a brittle, explicit protocol for freeing resources or an implicit protocol implemented viathe programming language.412 For the remaining resource ownership cases, a programmer must follow a brittle, explicit protocol for freeing resources or an implicit protocol enforced by the programming language. 402 413 403 414 In garbage collected languages, such as Java, resources are largely managed by the garbage collector. 404 Still, garbage collectors aretypically focus only on memory management.415 Still, garbage collectors typically focus only on memory management. 405 416 There are many kinds of resources that the garbage collector does not understand, such as sockets, open files, and database connections. 406 417 In particular, Java supports \emph{finalizers}, which are similar to destructors. 407 Sadly, finalizers are only guaranteed to be called before an object is reclaimed by the garbage collector \cite[p.~373]{Java8}, which may not happen if memory use is not contentious.418 Unfortunately, finalizers are only guaranteed to be called before an object is reclaimed by the garbage collector \cite[p.~373]{Java8}, which may not happen if memory use is not contentious. 408 419 Due to operating-system resource-limits, this is unacceptable for many long running programs. 409 420 Instead, the paradigm in Java requires programmers to manually keep track of all resources \emph{except} memory, leading many novices and experts alike to forget to close files, etc. … … 450 461 \end{javacode} 451 462 Variables declared as part of a try-with-resources statement must conform to the @AutoClosable@ interface, and the compiler implicitly calls @close@ on each of the variables at the end of the block. 452 Depending on when the exception is raised, both @out@ and @log@ are null, @log@ is null, or both are non-null, therefore, the cleanup for these variables at the end is a ppropriately guarded and conditionally executed to prevent null-pointer exceptions.463 Depending on when the exception is raised, both @out@ and @log@ are null, @log@ is null, or both are non-null, therefore, the cleanup for these variables at the end is automatically guarded and conditionally executed to prevent null-pointer exceptions. 453 464 454 465 While Rust \cite{Rust} does not enforce the use of a garbage collector, it does provide a manual memory management environment, with a strict ownership model that automatically frees allocated memory and prevents common memory management errors. … … 486 497 There is no runtime cost imposed on these restrictions, since they are enforced at compile-time. 487 498 488 Rust provides RAII through the @Drop@ trait, allowing arbitrary code to execute when the object goes out of scope, allowing Rust programs to automatically clean up auxiliary resourcesmuch like a \CC program.499 Rust provides RAII through the @Drop@ trait, allowing arbitrary code to execute when the object goes out of scope, providing automatic clean up of auxiliary resources, much like a \CC program. 489 500 \begin{rustcode} 490 501 struct S { … … 493 504 494 505 impl Drop for S { // RAII for S 495 fn drop(&mut self) { 506 fn drop(&mut self) { // destructor 496 507 println!("dropped {}", self.name); 497 508 } … … 558 569 tuple<int, int, int> triple(10, 20, 30); 559 570 auto & [t1, t2, t3] = triple; 560 t2 = 0; // changes triple571 t2 = 0; // changes middle element of triple 561 572 562 573 struct S { int x; double y; }; … … 564 575 auto [x, y] = s; // unpack s 565 576 \end{cppcode} 566 Structured bindings allow unpacking any struct with all public non-static data members into fresh local variables.577 Structured bindings allow unpacking any structure with all public non-static data members into fresh local variables. 567 578 The use of @&@ allows declaring new variables as references, which is something that cannot be done with @std::tie@, since \CC references do not support rebinding. 568 579 This extension requires the use of @auto@ to infer the types of the new variables, so complicated expressions with a non-obvious type must be documented with some other mechanism. 569 580 Furthermore, structured bindings are not a full replacement for @std::tie@, as it always declares new variables. 570 581 571 Like \CC, D provides tuples through a library variadic template struct.582 Like \CC, D provides tuples through a library variadic-template structure. 572 583 In D, it is possible to name the fields of a tuple type, which creates a distinct type. 573 584 % http://dlang.org/phobos/std_typecons.html … … 600 611 \end{smlcode} 601 612 Here, the function @binco@ appears to take 2 arguments, but it actually takes a single argument which is implicitly decomposed via pattern matching. 602 Tuples are a foundational tool in SML, allowing the creation of arbitrarily complex structured datatypes.613 Tuples are a foundational tool in SML, allowing the creation of arbitrarily-complex structured data-types. 603 614 604 615 Scala, like \CC, provides tuple types through the standard library \cite{Scala}. … … 653 664 Since the variadic arguments are untyped, it is up to the function to interpret any data that is passed in. 654 665 Additionally, the interface to manipulate @va_list@ objects is essentially limited to advancing to the next argument, without any built-in facility to determine when the last argument is read. 655 This requires the use of an \emph{argument descriptor} to pass information to the function about the structure of the argument list, including the number of arguments and their types.666 This limitation requires the use of an \emph{argument descriptor} to pass information to the function about the structure of the argument list, including the number of arguments and their types. 656 667 The format string in @printf@ is one such example of an argument descriptor. 657 668 \begin{cfacode} -
doc/rob_thesis/tuples.tex
reaa2f3a1 r0eb18557 70 70 Furthermore, while many C routines that accept pointers are designed so that it is safe to pass @NULL@ as a parameter, there are many C routines that are not null-safe. 71 71 On a related note, C does not provide a standard mechanism to state that a parameter is going to be used as an additional return value, which makes the job of ensuring that a value is returned more difficult for the compiler. 72 There is a subtle bug in the previous example, in that @ret_ch@ is never assigned for a string that does not contain any letters, which can lead to undefined behaviour. 72 Interestingly, there is a subtle bug in the previous example, in that @ret_ch@ is never assigned for a string that does not contain any letters, which can lead to undefined behaviour. 73 In this particular case, it turns out that the frequency return value also doubles as an error code, where a frequency of 0 means the character return value should be ignored. 74 Still, not every routine with multiple return values should be required to return an error code, and error codes are easily ignored, so this is not a satisfying solution. 73 75 As with the previous approach, this technique can simulate multiple return values, but in practice it is verbose and error prone. 74 76 … … 84 86 char freqs [26] = { 0 }; 85 87 int ret_freq = 0; 86 char ret_ch = 'a'; 88 char ret_ch = 'a'; // arbitrary default value for consistent results 87 89 for (int i = 0; str[i] != '\0'; ++i) { 88 90 if (isalpha(str[i])) { // only count letters … … 98 100 } 99 101 \end{cfacode} 100 This approach provides the benefits of compile-time checking for appropriate return statements as in aggregation, but without the required verbosity of declaring a new named type, which precludes the bug seen with out 102 This approach provides the benefits of compile-time checking for appropriate return statements as in aggregation, but without the required verbosity of declaring a new named type, which precludes the bug seen with out-parameters. 101 103 102 104 The addition of multiple-return-value functions necessitates a syntax for accepting multiple values at the call-site. … … 208 210 For the call to @g@, the values @y@ and @10@ are structured into a single argument of type @[int, int]@ to match the type of the parameter of @g@. 209 211 Finally, in the call to @h@, @y@ is flattened to yield an argument list of length 3, of which the first component of @x@ is passed as the first parameter of @h@, and the second component of @x@ and @y@ are structured into the second argument of type @[int, int]@. 210 The flexible structure of tuples permits a simple and expressive function 212 The flexible structure of tuples permits a simple and expressive function-call syntax to work seamlessly with both single- and multiple-return-value functions, and with any number of arguments of arbitrarily complex structure. 211 213 212 214 In \KWC \cite{Buhr94a,Till89}, a precursor to \CFA, there were 4 tuple coercions: opening, closing, flattening, and structuring. 213 215 Opening coerces a tuple value into a tuple of values, while closing converts a tuple of values into a single tuple value. 214 Flattening coerces a nested tuple into a flat tuple, i.e.it takes a tuple with tuple components and expands it into a tuple with only non-tuple components.215 Structuring moves in the opposite direction, i.e.it takes a flat tuple value and provides structure by introducing nested tuple components.216 Flattening coerces a nested tuple into a flat tuple, \ie it takes a tuple with tuple components and expands it into a tuple with only non-tuple components. 217 Structuring moves in the opposite direction, \ie it takes a flat tuple value and provides structure by introducing nested tuple components. 216 218 217 219 In \CFA, the design has been simplified to require only the two conversions previously described, which trigger only in function call and return situations. … … 258 260 A mass assignment assigns the value $R$ to each $L_i$. 259 261 For a mass assignment to be valid, @?=?(&$L_i$, $R$)@ must be a well-typed expression. 260 These semantics differ from C cascading assignment ( e.g.@a=b=c@) in that conversions are applied to $R$ in each individual assignment, which prevents data loss from the chain of conversions that can happen during a cascading assignment.262 These semantics differ from C cascading assignment (\eg @a=b=c@) in that conversions are applied to $R$ in each individual assignment, which prevents data loss from the chain of conversions that can happen during a cascading assignment. 261 263 For example, @[y, x] = 3.14@ performs the assignments @y = 3.14@ and @x = 3.14@, which results in the value @3.14@ in @y@ and the value @3@ in @x@. 262 264 On the other hand, the C cascading assignment @y = x = 3.14@ performs the assignments @x = 3.14@ and @y = x@, which results in the value @3@ in @x@, and as a result the value @3@ in @y@ as well. … … 274 276 These semantics allow cascading tuple assignment to work out naturally in any context where a tuple is permitted. 275 277 These semantics are a change from the original tuple design in \KWC \cite{Till89}, wherein tuple assignment was a statement that allows cascading assignments as a special case. 276 Restricting tuple assignment to statements was an attempt to to fix what was seen as a problem with assignment, wherein it can be used in many different locations, such as in function-call argument position.278 Restricting tuple assignment to statements was an attempt to to fix what was seen as a problem with side-effects, wherein assignment can be used in many different locations, such as in function-call argument position. 277 279 While permitting assignment as an expression does introduce the potential for subtle complexities, it is impossible to remove assignment expressions from \CFA without affecting backwards compatibility. 278 280 Furthermore, there are situations where permitting assignment as an expression improves readability by keeping code succinct and reducing repetition, and complicating the definition of tuple assignment puts a greater cognitive burden on the user. … … 289 291 \end{cfacode} 290 292 The tuple expression begins with a mass assignment of @1.5@ into @[b, d]@, which assigns @1.5@ into @b@, which is truncated to @1@, and @1.5@ into @d@, producing the tuple @[1, 1.5]@ as a result. 291 That tuple is used as the right side of the multiple assignment ( i.e., @[c, a] = [1, 1.5]@) that assigns @1@ into @c@ and @1.5@ into @a@, which is truncated to @1@, producing the result @[1, 1]@.293 That tuple is used as the right side of the multiple assignment (\ie, @[c, a] = [1, 1.5]@) that assigns @1@ into @c@ and @1.5@ into @a@, which is truncated to @1@, producing the result @[1, 1]@. 292 294 Finally, the tuple @[1, 1]@ is used as an expression in the call to @f@. 293 295 … … 307 309 In this example, @x@ is initialized by the multiple constructor calls @?{}(&x.0, 3)@ and @?{}(&x.1, 6.28)@, while @y@ is initialized by two default constructor calls @?{}(&y.0)@ and @?{}(&y.1)@. 308 310 @z@ is initialized by mass copy constructor calls @?{}(&z.0, x.0)@ and @?{}(&z.1, x.0)@. 309 Finally, @x@, @y@, and @z@ are destructed, i.e.the calls @^?{}(&x.0)@, @^?{}(&x.1)@, @^?{}(&y.0)@, @^?{}(&y.1)@, @^?{}(&z.0)@, and @^?{}(&z.1)@.311 Finally, @x@, @y@, and @z@ are destructed, \ie the calls @^?{}(&x.0)@, @^?{}(&x.1)@, @^?{}(&y.0)@, @^?{}(&y.1)@, @^?{}(&z.0)@, and @^?{}(&z.1)@. 310 312 311 313 It is possible to define constructors and assignment functions for tuple types that provide new semantics, if the existing semantics do not fit the needs of an application. … … 340 342 Then the type of @a.[x, y, z]@ is @[T_x, T_y, T_z]@. 341 343 342 Since tuple index expressions are a form of member-access expression, it is possible to use tuple-index expressions in conjunction with member tuple expressions to manually restructure a tuple ( e.g., rearrange components, drop components, duplicate components, etc.).344 Since tuple index expressions are a form of member-access expression, it is possible to use tuple-index expressions in conjunction with member tuple expressions to manually restructure a tuple (\eg, rearrange components, drop components, duplicate components, etc.). 343 345 \begin{cfacode} 344 346 [int, int, long, double] x; … … 392 394 393 395 As for @z.y@, one interpretation is to extend the meaning of member tuple expressions. 394 That is, currently the tuple must occur as the member, i.e.to the right of the dot.396 That is, currently the tuple must occur as the member, \ie to the right of the dot. 395 397 Allowing tuples to the left of the dot could distribute the member across the elements of the tuple, in much the same way that member tuple expressions distribute the aggregate across the member tuple. 396 398 In this example, @z.y@ expands to @[z.0.y, z.1.y]@, allowing what is effectively a very limited compile-time field-sections map operation, where the argument must be a tuple containing only aggregates having a member named @y@. … … 450 452 451 453 struct A { int x; }; 452 (struct A)f(); // invalid 454 (struct A)f(); // invalid, int cannot be converted to A 453 455 \end{cfacode} 454 456 In C, line 4 is a valid cast, which calls @f@ and discards its result. … … 466 468 [int, [int, int], int] g(); 467 469 468 ([int, double])f(); // (1) 469 ([int, int, int])g(); // (2) 470 ([void, [int, int]])g(); // (3) 471 ([int, int, int, int])g(); // (4) 472 ([int, [int, int, int]])g(); // (5) 470 ([int, double])f(); // (1) valid 471 ([int, int, int])g(); // (2) valid 472 ([void, [int, int]])g(); // (3) valid 473 ([int, int, int, int])g(); // (4) invalid 474 ([int, [int, int, int]])g(); // (5) invalid 473 475 \end{cfacode} 474 476 … … 477 479 If @g@ is free of side effects, this is equivalent to @[(int)(g().0), (int)(g().1.0), (int)(g().2)]@. 478 480 Since @void@ is effectively a 0-element tuple, (3) discards the first and third return values, which is effectively equivalent to @[(int)(g().1.0), (int)(g().1.1)]@). 479 480 481 % will this always hold true? probably, as constructors should give all of the conversion power we need. if casts become function calls, what would they look like? would need a way to specify the target type, which seems awkward. Also, C++ basically only has this because classes are closed to extension, while we don't have that problem (can have floating constructors for any type). 481 482 Note that a cast is not a function call in \CFA, so flattening and structuring conversions do not occur for cast expressions. … … 534 535 \end{cfacode} 535 536 536 Until this point, it has been assumed that assertion arguments must match the parameter type exactly, modulo polymorphic specialization ( i.e., no implicit conversions are applied to assertion arguments).537 Until this point, it has been assumed that assertion arguments must match the parameter type exactly, modulo polymorphic specialization (\ie, no implicit conversions are applied to assertion arguments). 537 538 This decision presents a conflict with the flexibility of tuples. 538 539 \subsection{Assertion Inference} … … 566 567 } 567 568 \end{cfacode} 568 Is transformed into569 is transformed into 569 570 \begin{cfacode} 570 571 forall(dtype T0, dtype T1 | sized(T0) | sized(T1)) 571 struct _tuple2 { // generated before the first 2-tuple572 struct _tuple2_ { // generated before the first 2-tuple 572 573 T0 field_0; 573 574 T1 field_1; … … 576 577 _tuple2_(double, double) x; 577 578 forall(dtype T0, dtype T1, dtype T2 | sized(T0) | sized(T1) | sized(T2)) 578 struct _tuple3 { // generated before the first 3-tuple579 struct _tuple3_ { // generated before the first 3-tuple 579 580 T0 field_0; 580 581 T1 field_1; … … 589 590 [5, 'x', 1.24]; 590 591 \end{cfacode} 591 Becomes592 becomes 592 593 \begin{cfacode} 593 594 (_tuple3_(int, char, double)){ 5, 'x', 1.24 }; … … 603 604 f(x, 'z'); 604 605 \end{cfacode} 605 Is transformed into606 is transformed into 606 607 \begin{cfacode} 607 608 void f(int, _tuple2_(double, char)); … … 650 651 It is possible that lazy evaluation could be exposed to the user through a lazy keyword with little additional effort. 651 652 652 Tuple member expressions are recursively expanded into a list of memberaccess expressions.653 Tuple-member expressions are recursively expanded into a list of member-access expressions. 653 654 \begin{cfacode} 654 655 [int, [double, int, double], int]] x; 655 656 x.[0, 1.[0, 2]]; 656 657 \end{cfacode} 657 whichbecomes658 becomes 658 659 \begin{cfacode} 659 660 [x.0, [x.1.0, x.1.2]]; … … 670 671 [x, y, z] = 1.5; // mass assignment 671 672 \end{cfacode} 672 Generates the following673 generates the following 673 674 \begin{cfacode} 674 675 // [x, y, z] = 1.5; … … 711 712 }); 712 713 \end{cfacode} 713 A variable is generated to store the value produced by a statement expression, since its fields may need to be constructed with a non-trivial constructor and it may need to be referred to multiple time, e.g., in a unique expression.714 A variable is generated to store the value produced by a statement expression, since its fields may need to be constructed with a non-trivial constructor and it may need to be referred to multiple time, \eg, in a unique expression. 714 715 $N$ LHS variables are generated and constructed using the address of the tuple components, and a single RHS variable is generated to store the value of the RHS without any loss of precision. 715 716 A nested statement expression is generated that performs the individual assignments and constructs the return value using the results of the individual assignments. … … 720 721 [x, y, z] = [f(), 3]; // multiple assignment 721 722 \end{cfacode} 722 Generates 723 generates the following 723 724 \begin{cfacode} 724 725 // [x, y, z] = [f(), 3]; -
doc/rob_thesis/variadic.tex
reaa2f3a1 r0eb18557 12 12 In addition, C requires the programmer to hard code all of the possible expected types. 13 13 As a result, it is cumbersome to write a function that is open to extension. 14 For example, a simple function which sums$N$ @int@s,14 For example, a simple function to sum $N$ @int@s, 15 15 \begin{cfacode} 16 16 int sum(int N, ...) { … … 27 27 sum(3, 10, 20, 30); // need to keep counter in sync 28 28 \end{cfacode} 29 The @va_list@ type is a special C data type that abstracts variadic 29 The @va_list@ type is a special C data type that abstracts variadic-argument manipulation. 30 30 The @va_start@ macro initializes a @va_list@, given the last named parameter. 31 31 Each use of the @va_arg@ macro allows access to the next variadic argument, given a type. … … 34 34 In the case where the provided type is not compatible with the argument's actual type after default argument promotions, or if too many arguments are accessed, the behaviour is undefined \cite[p.~81]{C11}. 35 35 Furthermore, there is no way to perform the necessary error checks in the @sum@ function at run-time, since type information is not carried into the function body. 36 Since they rely on programmer convention rather than compile-time checks, variadic functions are generallyunsafe.36 Since they rely on programmer convention rather than compile-time checks, variadic functions are unsafe. 37 37 38 38 In practice, compilers can provide warnings to help mitigate some of the problems. 39 For example, GCC provides the @format@ attribute to specify that a function uses a format string, which allows the compiler to perform some checks related to the standard format 40 Unfortunately, this approach does not permit extensions to the format 39 For example, GCC provides the @format@ attribute to specify that a function uses a format string, which allows the compiler to perform some checks related to the standard format-specifiers. 40 Unfortunately, this approach does not permit extensions to the format-string syntax, so a programmer cannot extend the attribute to warn for mismatches with custom types. 41 41 42 42 As a result, C's variadic functions are a deficient language feature. … … 79 79 Similarly, in order to pass 0 variadic arguments, an explicit empty tuple must be passed into the argument list, otherwise the exact matching rule would not have an argument to bind against. 80 80 81 It should be otherwise noted that the addition of an exact matching rule only affects the outcome for polymorphic type 81 It should be otherwise noted that the addition of an exact matching rule only affects the outcome for polymorphic type-binding when tuples are involved. 82 82 For non-tuple arguments, exact matching and flattening and structuring are equivalent. 83 For tuple arguments to a function without polymorphic formal 83 For tuple arguments to a function without polymorphic formal-parameters, flattening and structuring work whenever an exact match would have worked, since the tuple is flattened and implicitly restructured to its original structure. 84 84 Thus there is nothing to be gained from permitting the exact matching rule to take effect when a function does not contain polymorphism and none of the arguments are tuples. 85 85 … … 161 161 return x+y; 162 162 } 163 forall(otype T1, otype T2, otype T3, ttype Params, otype R163 forall(otype T1, otype T2, otype T3, otype R, ttype Params 164 164 | summable(T1, T2, T3) 165 165 | { R sum(T3, Params); }) … … 184 184 \CFA does not need an ellipsis in either case, since the type class @ttype@ is only used for variadics. 185 185 An alternative design is to use an ellipsis combined with an existing type class. 186 This approach was not taken because the largest benefit of the ellipsis token in \CC is the ability to expand a parameter pack within an expression, e.g., in fold expressions, which requires compile-time knowledge of the structure of the parameter pack, which is not available in \CFA.186 This approach was not taken because the largest benefit of the ellipsis token in \CC is the ability to expand a parameter pack within an expression, \eg, in fold expressions, which requires compile-time knowledge of the structure of the parameter pack, which is not available in \CFA. 187 187 \begin{cppcode} 188 188 template<typename... Args> … … 224 224 Array * x = new(1, 2, 3); 225 225 \end{cfacode} 226 The @new@ function provides the combination of type-safe @malloc@ with a constructor call, so that it becomes impossible to forget to construct dynamically allocated objects. 226 In the call to @new@, @Array@ is selected to match @T@, and @Params@ is expanded to match @[int, int, int, int]@. To satisfy the assertions, a constructor with an interface compatible with @void ?{}(Array *, int, int, int)@ must exist in the current scope. 227 228 The @new@ function provides the combination of type-safe @malloc@ with a constructor call, so that it becomes impossible to forget to construct dynamically-allocated objects. 227 229 This approach provides the type-safety of @new@ in \CC, without the need to specify the allocated type, thanks to return-type inference. 228 229 In the call to @new@, @Array@ is selected to match @T@, and @Params@ is expanded to match @[int, int, int, int]@. To satisfy the assertions, a constructor with an interface compatible with @void ?{}(Array *, int, int, int)@ must exist in the current scope.230 230 231 231 \section{Implementation} … … 240 240 } 241 241 \end{cfacode} 242 Generates the following242 generates the following 243 243 \begin{cfacode} 244 244 void *malloc(long unsigned int _sizeof_T, long unsigned int _alignof_T); … … 267 267 \end{cfacode} 268 268 The constructor for @T@ is called indirectly through the adapter function on the result of @malloc@ and the parameter pack. 269 The variable that was allocated and constructed is then returned from @new@.269 The variable that is allocated and constructed is then returned from @new@. 270 270 271 271 A call to @new@ … … 337 337 } 338 338 \end{cfacode} 339 Generates 339 generates the following 340 340 \begin{cfacode} 341 341 void print_variadic( … … 382 382 print("x = ", 123, ".\n"); 383 383 \end{cfacode} 384 Generates the following384 generates the following 385 385 \begin{cfacode} 386 386 void print_string(const char *x){
Note: See TracChangeset
for help on using the changeset viewer.