Line |
Branch |
Exec |
Source |
1 |
|
|
#include "warnings.h" |
2 |
|
|
|
3 |
|
|
#include "asar.h" |
4 |
|
|
#include <cassert> |
5 |
|
|
#include <cstdarg> |
6 |
|
|
|
7 |
|
|
#include "interface-shared.h" |
8 |
|
|
|
9 |
|
|
static int asar_num_warnings = 0; |
10 |
|
|
|
11 |
|
|
struct asar_warning_mapping |
12 |
|
|
{ |
13 |
|
|
asar_warning_id warnid; |
14 |
|
|
const char* name; |
15 |
|
|
const char* message; |
16 |
|
|
bool enabled; |
17 |
|
|
bool enabled_default; |
18 |
|
|
|
19 |
|
2000 |
asar_warning_mapping(asar_warning_id inwarnid, const char *iname, const char* inmessage, bool inenabled = true) |
20 |
|
2000 |
{ |
21 |
|
2000 |
++asar_num_warnings; |
22 |
|
|
|
23 |
|
2000 |
warnid = inwarnid; |
24 |
|
2000 |
name = iname; |
25 |
|
2000 |
message = inmessage; |
26 |
|
2000 |
enabled = inenabled; |
27 |
|
2000 |
enabled_default = inenabled; |
28 |
|
|
|
29 |
|
|
// RPG Hacker: Sanity check. This makes sure that the order |
30 |
|
|
// of entries in asar_warnings matches with the order of |
31 |
|
|
// constants in asar_warning_id. This is important because |
32 |
|
|
// we access asar_warnings as an array. |
33 |
|
|
// Would love to do this via static_assert(), but can't |
34 |
|
|
// think of a way to do so. |
35 |
1/2
✗ Branch 0 not taken.
✓ Branch 1 taken 2000 times.
|
2000 |
assert(warnid - warning_id_start == asar_num_warnings); |
36 |
|
2000 |
} |
37 |
|
|
}; |
38 |
|
|
|
39 |
|
|
// Keep in sync with asar_warning_id. |
40 |
|
|
// Both, enum mapping and order, must match. |
41 |
|
|
#define WRN(name) warning_id_ ## name, "W" #name |
42 |
|
|
static asar_warning_mapping asar_warnings[] = |
43 |
|
|
{ |
44 |
|
|
{ WRN(relative_path_used), "Relative %s path passed to asar_patch_ex() - please use absolute paths only to prevent undefined behavior!" }, |
45 |
|
|
|
46 |
|
|
{ WRN(rom_too_short), "ROM is too short to have a title. (Expected '%s')" }, |
47 |
|
|
{ WRN(rom_title_incorrect), "ROM title is incorrect. Expected '%s', got '%s'." }, |
48 |
|
|
|
49 |
|
|
{ WRN(spc700_assuming_8_bit), "This opcode does not exist with 16-bit parameters, assuming 8-bit." }, |
50 |
|
|
{ WRN(assuming_address_mode), "The addressing mode %s is not valid for this instruction, assuming %s.%s" }, |
51 |
|
|
|
52 |
|
|
{ WRN(set_middle_byte), "It would be wise to set the 008000 bit of this address." }, |
53 |
|
|
|
54 |
|
|
{ WRN(freespace_leaked), "This freespace appears to be leaked." }, |
55 |
|
|
|
56 |
|
|
{ WRN(warn_command), "warn command%s" }, |
57 |
|
|
|
58 |
|
|
{ WRN(implicitly_sized_immediate), "Implicitly sized immediate.", false }, |
59 |
|
|
|
60 |
|
|
{ WRN(check_memory_file), "Accessing file '%s' which is not in memory while W%d is enabled.", false }, |
61 |
|
|
|
62 |
|
|
{ WRN(datasize_last_label), "Datasize used on last detected label '%s'." }, |
63 |
|
|
{ WRN(datasize_exceeds_size), "Datasize exceeds 0xFFFF for label '%s'." }, |
64 |
|
|
|
65 |
|
|
{ WRN(mapper_already_set), "A mapper has already been selected." }, |
66 |
|
|
{ WRN(feature_deprecated), "DEPRECATION NOTIFICATION: Feature \"%s\" is deprecated and will be REMOVED in the future. Please update your code to conform to newer styles. Suggested work around: %s." }, |
67 |
|
|
|
68 |
|
|
{ WRN(invalid_warning_id), "Warning '%s' (passed to %s) doesn't exist." }, |
69 |
|
|
|
70 |
|
|
{ WRN(byte_order_mark_utf8), "UTF-8 byte order mark detected and skipped." }, |
71 |
|
|
}; |
72 |
|
|
|
73 |
|
|
// RPG Hacker: Sanity check. This makes sure that the element count of asar_warnings |
74 |
|
|
// matches with the number of constants in asar_warning_id. This is important, because |
75 |
|
|
// we are going to access asar_warnings as an array. |
76 |
|
|
static_assert(sizeof(asar_warnings) / sizeof(asar_warnings[0]) == warning_id_count, "asar_warnings and asar_warning_id are not in sync"); |
77 |
|
|
|
78 |
|
2132 |
void asar_throw_warning(int whichpass, asar_warning_id warnid, ...) |
79 |
|
|
{ |
80 |
2/2
✓ Branch 0 taken 1089 times.
✓ Branch 1 taken 1043 times.
|
2132 |
if (pass == whichpass) |
81 |
|
|
{ |
82 |
2/4
✓ Branch 0 taken 547 times.
✗ Branch 1 not taken.
✓ Branch 2 taken 547 times.
✗ Branch 3 not taken.
|
547 |
assert(warnid > warning_id_start && warnid < warning_id_end); |
83 |
|
|
|
84 |
|
1089 |
const asar_warning_mapping& warning = asar_warnings[warnid - warning_id_start - 1]; |
85 |
|
|
|
86 |
2/2
✓ Branch 0 taken 122 times.
✓ Branch 1 taken 967 times.
|
1089 |
if (warning.enabled) |
87 |
|
|
{ |
88 |
|
|
char warning_buffer[1024]; |
89 |
|
|
va_list args; |
90 |
|
122 |
va_start(args, warnid); |
91 |
|
|
|
92 |
|
|
#if defined(__clang__) |
93 |
|
|
# pragma clang diagnostic push |
94 |
|
|
// "format string is not a literal". |
95 |
|
|
// The pointer we're passing here should always point to a string literal, |
96 |
|
|
// thus, I think, we can safely ignore this here. |
97 |
|
|
# pragma clang diagnostic ignored "-Wformat-nonliteral" |
98 |
|
|
#endif |
99 |
|
|
|
100 |
|
122 |
vsnprintf(warning_buffer, sizeof(warning_buffer), warning.message, args); |
101 |
|
|
|
102 |
|
|
#if defined(__clang__) |
103 |
|
|
# pragma clang diagnostic pop |
104 |
|
|
#endif |
105 |
|
|
|
106 |
|
122 |
va_end(args); |
107 |
1/2
✓ Branch 0 taken 62 times.
✗ Branch 1 not taken.
|
122 |
warn((int)warnid, warning_buffer); |
108 |
|
|
} |
109 |
|
|
} |
110 |
|
2132 |
} |
111 |
|
|
|
112 |
|
204 |
const char* get_warning_name(asar_warning_id warnid) |
113 |
|
|
{ |
114 |
2/4
✓ Branch 0 taken 104 times.
✗ Branch 1 not taken.
✓ Branch 2 taken 104 times.
✗ Branch 3 not taken.
|
104 |
assert(warnid > warning_id_start && warnid < warning_id_end); |
115 |
|
|
|
116 |
|
204 |
const asar_warning_mapping& warning = asar_warnings[warnid - warning_id_start - 1]; |
117 |
|
|
|
118 |
|
204 |
return warning.name; |
119 |
|
|
} |
120 |
|
|
|
121 |
|
|
|
122 |
|
|
|
123 |
|
200 |
void set_warning_enabled(asar_warning_id warnid, bool enabled) |
124 |
|
|
{ |
125 |
2/4
✓ Branch 0 taken 101 times.
✗ Branch 1 not taken.
✓ Branch 2 taken 101 times.
✗ Branch 3 not taken.
|
101 |
assert(warnid > warning_id_start && warnid < warning_id_end); |
126 |
|
|
|
127 |
|
200 |
asar_warning_mapping& warning = asar_warnings[warnid - warning_id_start - 1]; |
128 |
|
|
|
129 |
|
200 |
warning.enabled = enabled; |
130 |
|
200 |
} |
131 |
|
|
|
132 |
|
254 |
asar_warning_id parse_warning_id_from_string(const char* string) |
133 |
|
|
{ |
134 |
|
128 |
const char* pos = string; |
135 |
|
|
|
136 |
1/2
✗ Branch 0 not taken.
✓ Branch 1 taken 254 times.
|
254 |
if (pos == nullptr) |
137 |
|
|
{ |
138 |
|
✗ |
return warning_id_end; |
139 |
|
|
} |
140 |
|
|
|
141 |
|
|
|
142 |
3/4
✓ Branch 0 taken 254 times.
✗ Branch 1 not taken.
✓ Branch 2 taken 200 times.
✓ Branch 3 taken 54 times.
|
254 |
if (pos[0] == 'w' || pos[0] == 'W') |
143 |
|
|
{ |
144 |
|
200 |
++pos; |
145 |
|
|
} |
146 |
2/2
✓ Branch 0 taken 1709 times.
✓ Branch 1 taken 1692 times.
|
3401 |
for(int i = 0; i < warning_id_end-warning_id_start-1; i++) |
147 |
|
|
{ |
148 |
2/2
✓ Branch 0 taken 200 times.
✓ Branch 1 taken 3147 times.
|
3347 |
if(!stricmpwithlower(pos, asar_warnings[i].name+1)) |
149 |
|
|
{ |
150 |
|
200 |
return asar_warnings[i].warnid; |
151 |
|
|
} |
152 |
|
|
} |
153 |
|
|
|
154 |
|
27 |
return warning_id_end; |
155 |
|
|
} |
156 |
|
|
|
157 |
|
508 |
void reset_warnings_to_default() |
158 |
|
|
{ |
159 |
2/2
✓ Branch 0 taken 8128 times.
✓ Branch 1 taken 508 times.
|
8636 |
for (int i = (int)(warning_id_start + 1); i < (int)warning_id_end; ++i) |
160 |
|
|
{ |
161 |
|
8128 |
asar_warning_mapping& warning = asar_warnings[i - (int)warning_id_start - 1]; |
162 |
|
|
|
163 |
|
8128 |
warning.enabled = warning.enabled_default; |
164 |
|
|
} |
165 |
|
508 |
} |
166 |
|
|
|
167 |
|
|
struct warnings_state |
168 |
|
|
{ |
169 |
|
|
bool enabled[warning_id_count]; |
170 |
|
|
}; |
171 |
|
|
|
172 |
|
|
static autoarray<warnings_state> warnings_state_stack; |
173 |
|
|
static warnings_state main_warnings_state; |
174 |
|
|
|
175 |
|
2253 |
void push_warnings(bool warnings_command) |
176 |
|
|
{ |
177 |
|
|
warnings_state current_state; |
178 |
|
|
|
179 |
2/2
✓ Branch 0 taken 36048 times.
✓ Branch 1 taken 2253 times.
|
38301 |
for (int i = 0; i < (int)warning_id_count; ++i) |
180 |
|
|
{ |
181 |
|
36048 |
current_state.enabled[i] = asar_warnings[i].enabled; |
182 |
|
|
} |
183 |
|
|
|
184 |
2/2
✓ Branch 0 taken 72 times.
✓ Branch 1 taken 2181 times.
|
2253 |
if (warnings_command) |
185 |
|
|
{ |
186 |
1/2
✓ Branch 0 taken 36 times.
✗ Branch 1 not taken.
|
72 |
warnings_state_stack.append(current_state); |
187 |
|
|
} |
188 |
|
|
else |
189 |
|
|
{ |
190 |
|
2181 |
main_warnings_state = current_state; |
191 |
|
|
} |
192 |
|
2253 |
} |
193 |
|
|
|
194 |
|
2223 |
void pull_warnings(bool warnings_command) |
195 |
|
|
{ |
196 |
4/4
✓ Branch 0 taken 2169 times.
✓ Branch 1 taken 54 times.
✓ Branch 2 taken 2151 times.
✓ Branch 3 taken 18 times.
|
2223 |
if (warnings_state_stack.count > 0 || !warnings_command) |
197 |
|
|
{ |
198 |
|
|
warnings_state prev_state; |
199 |
|
|
|
200 |
2/2
✓ Branch 0 taken 54 times.
✓ Branch 1 taken 1107 times.
|
1161 |
if (warnings_command) |
201 |
|
|
{ |
202 |
1/2
✓ Branch 0 taken 27 times.
✗ Branch 1 not taken.
|
54 |
prev_state = warnings_state_stack[warnings_state_stack.count - 1]; |
203 |
|
|
} |
204 |
|
|
else |
205 |
|
|
{ |
206 |
|
2151 |
prev_state = main_warnings_state; |
207 |
|
|
} |
208 |
|
|
|
209 |
2/2
✓ Branch 0 taken 35280 times.
✓ Branch 1 taken 2205 times.
|
37485 |
for (int i = 0; i < (int)warning_id_count; ++i) |
210 |
|
|
{ |
211 |
|
35280 |
asar_warnings[i].enabled = prev_state.enabled[i]; |
212 |
|
|
} |
213 |
|
|
|
214 |
2/2
✓ Branch 0 taken 54 times.
✓ Branch 1 taken 2151 times.
|
2205 |
if (warnings_command) |
215 |
|
|
{ |
216 |
|
54 |
warnings_state_stack.remove(warnings_state_stack.count - 1); |
217 |
|
|
} |
218 |
|
2205 |
} |
219 |
|
|
else |
220 |
|
|
{ |
221 |
|
18 |
asar_throw_error(0, error_type_block, error_id_pullwarnings_without_pushwarnings); |
222 |
|
|
} |
223 |
|
2205 |
} |
224 |
|
|
|
225 |
|
2151 |
void verify_warnings() |
226 |
|
|
{ |
227 |
2/2
✓ Branch 0 taken 18 times.
✓ Branch 1 taken 2133 times.
|
2151 |
if (warnings_state_stack.count > 0) |
228 |
|
|
{ |
229 |
|
18 |
asar_throw_error(0, error_type_null, error_id_pushwarnings_without_pullwarnings); |
230 |
|
|
|
231 |
|
18 |
warnings_state_stack.reset(); |
232 |
|
|
} |
233 |
|
2151 |
} |
234 |
|
|
|