Contents Index Previous Next
3.10 Access Types
1
{access type}
{access value} {designate}
A value of an access type (an
access value) provides
indirect access to the object or subprogram it
designates. Depending
on its type, an access value can designate either subprograms, objects created
by allocators (see
4.8), or more generally
aliased
objects of an appropriate type.
{pointer: See access value}
{pointer type: See access type}
1.a
Discussion: A name
denotes an entity; an access value designates an entity.
The ``dereference'' of an access value X, written ``X.all'', is
a name that denotes the entity designated
by X.
Language Design Principles
1.b
Access values should always be
well defined (barring uses of certain unchecked features of Section 13).
In particular, uninitialized access variables should be prevented by
compile-time rules.
Syntax
2
access_type_definition
::=
access_to_object_definition
|
access_to_subprogram_definition
3
access_to_object_definition
::=
access [
general_access_modifier]
subtype_indication
4
general_access_modifier
::= all |
constant
5
access_to_subprogram_definition
::=
access [
protected]
procedure parameter_profile
|
access [
protected]
function parameter_and_result_profile
6
access_definition
::= access subtype_mark
Static Semantics
7/1
{
8652/0012}
{access-to-object type} {access-to-subprogram
type} {pool-specific access
type} {general access type}
There are two kinds of access types,
access-to-object
types, whose values designate objects, and
access-to-subprogram types,
whose values designate subprograms.
{storage pool}
Associated with an access-to-object type is a
storage
pool; several access types may share the same storage pool.
All descendants
of an access type share the same storage pool. {pool element}
A storage pool is an area of storage used to hold dynamically
allocated objects (called
pool elements) created by allocators[; storage
pools are described further in
13.11, ``
Storage
Management''].
8
{pool-specific access type}
{general access type}
Access-to-object types are further subdivided into
pool-specific access types, whose values can designate only the
elements of their associated storage pool, and
general access
types, whose values can designate the elements of any storage pool, as
well as aliased objects created by declarations rather than allocators,
and aliased subcomponents of other objects.
8.a
Implementation Note: The
value of an access type will typically be a machine address. However,
a value of a pool-specific access type can be represented as an offset
(or index) relative to its storage pool, since it can point only to the
elements of that pool.
9
{aliased} A
view of an object is defined to be
aliased if it is defined by an
object_declaration
or
component_definition with the reserved
word
aliased, or by a renaming of an aliased view. In addition, the dereference
of an access-to-object value denotes an aliased view, as does a view conversion
(see
4.6) of an aliased view. Finally, the current
instance of a limited type, and a formal parameter or generic formal object
of a tagged type are defined to be aliased. [Aliased views are the ones that
can be designated by an access value.]
{constrained (object)}
{unconstrained (object)} {constrained
by its initial value} If the view defined by
an
object_declaration is aliased, and the
type of the object has discriminants, then the object is constrained; if its
nominal subtype is unconstrained, then the object is constrained by its initial
value. [Similarly, if the object created by an
allocator
has discriminants, the object is constrained, either by the designated subtype,
or by its initial value.]
9.a
Glossary entry: {Aliased}
An aliased view of an object is one that can be designated by an access
value. Objects allocated by allocators are aliased. Objects can also
be explicitly declared as aliased with the reserved word aliased.
The Access attribute can be used to create an access value designating
an aliased object.
9.b
Ramification: The current
instance of a nonlimited type is not aliased.
9.c
The object created by an allocator
is aliased, but not its subcomponents, except of course for those that
themselves have aliased in their component_definition.
9.d
The renaming of an aliased object
is aliased.
9.e
Slices are never aliased. See 4.1.2
for more discussion.
9.f
Reason: The current instance
of a limited type is defined to be aliased so that an access discriminant
of a component can be initialized with T'Access inside the definition
of T.
9.g
A formal parameter of a tagged type is
defined to be aliased so that a (tagged) parameter X may be passed to an access
parameter P by using P => X'Access. Access parameters are most important
for tagged types because of dispatching-on-access-parameters (see 3.9.2).
By restricting this to formal parameters, we minimize problems associated with
allowing components that are not declared aliased to be pointed-to from within
the same record.
9.h
A
view conversion of an aliased view is aliased so that the type of an
access parameter can be changed without first converting to a named access
type. For example:
9.i
type T1 is tagged ...;
procedure P(X : access T1);
9.j
type T2 is new T1 with ...;
procedure P(X : access T2) is
begin
P(T1(X.all)'Access); -- hand off to T1's P
. . . -- now do extra T2-specific processing
end P;
9.k
The rule about objects with discriminants
is necessary because values of a constrained access subtype can designate
an object whose nominal subtype is unconstrained; without this rule,
a check on every use of such values would be required to ensure that
the discriminants of the object had not changed. With this rule (among
others), we ensure that if there might exist aliased views of a discriminated
object, then the object is necessarily constrained. Note that this rule
is necessary only for untagged types, since a discriminant of a tagged
type can't have a default, so all tagged discriminated objects are always
constrained anyway.
9.l
We considered making more kinds
of objects aliased by default. In particular, any object of a by-reference
type will pretty much have to be allocated at an addressable location,
so it can be passed by reference without using bit-field pointers. Therefore,
one might wish to allow the Access and and Unchecked_Access attributes
for such objects. However, private parts are transparent to the definition
of ``by-reference type'', so if we made all objects of a by-reference
type aliased, we would be violating the privacy of private parts. Instead,
we would have to define a concept of ``visibly by-reference'' and base
the rule on that. This seemed to complicate the rules more than it was
worth, especially since there is no way to declare an untagged limited
private type to be by-reference, since the full type might by nonlimited.
9.m
Discussion: Note that we do not
use the term ``aliased'' to refer to formal parameters that are referenced through
multiple access paths (see 6.2).
10
An
access_to_object_definition
defines an access-to-object type and its first subtype;
{designated
subtype (of a named access type)} {designated
type (of a named access type)} the
subtype_indication
defines the
designated subtype of the access type. If a
general_access_modifier
appears, then the access type is a general access type.
{access-to-constant
type} If the modifier is the reserved
word
constant, then the type is an
access-to-constant type[;
a designated object cannot be updated through a value of such a type].
{access-to-variable type} If
the modifier is the reserved word
all, then the type is an
access-to-variable
type[; a designated object can be both read and updated through a
value of such a type]. If no
general_access_modifier
appears in the
access_to_object_definition,
the access type is a pool-specific access-to-variable type.
10.a
To be honest: The type
of the designated subtype is called the designated type.
10.b
Reason: The modifier all
was picked to suggest that values of a general access type could point
into ``all'' storage pools, as well as to objects declared aliased, and
that ``all'' access (both read and update) to the designated object was
provided. We couldn't think of any use for pool-specific access-to-constant
types, so any access type defined with the modifier constant is
considered a general access type, and can point into any storage pool
or at other (appropriate) aliased objects.
10.c
Implementation Note: The
predefined generic Unchecked_Deallocation can be instantiated for any
named access-to-variable type. There is no (language-defined) support
for deallocating objects designated by a value of an access-to-constant
type. Because of this, an allocator for an access-to-constant type can
allocate out of a storage pool with no support for deallocation. Frequently,
the allocation can be done at link-time, if the size and initial value
are known then.
10.d
Discussion: For the purpose
of generic formal type matching, the relevant subclasses of access types
are access-to-subprogram types, access-to-constant types, and (named)
access-to-variable types, with its subclass (named) general access-to-variable
types. Pool-specific access-to-variable types are not a separately matchable
subclass of types, since they don't have any ``extra'' operations relative
to all (named) access-to-variable types.
11
{access-to-subprogram
type} An
access_to_subprogram_definition
defines an access-to-subprogram type and its first subtype;
{designated
profile (of an access-to-subprogram type)} the
parameter_profile or
parameter_and_result_profile
defines the
designated profile of the access type.
{calling
convention (associated with a designated profile)} There
is a
calling convention associated with the designated profile[; only
subprograms with this calling convention can be designated by values of the
access type.] By default, the calling convention is ``
protected'' if
the reserved word
protected appears, and ``Ada'' otherwise. [See
Annex
B for how to override this default.]
11.a
Ramification: The calling
convention protected is in italics to emphasize that it cannot
be specified explicitly by the user. This is a consequence of it being
a reserved word.
11.b
Implementation Note: For an access-to-subprogram
type, the representation of an access value might include implementation-defined
information needed to support up-level references -- for example, a static link.
The accessibility rules (see 3.10.2) ensure that
in a "global-display-based" implementation model (as opposed to a
static-link-based model), an access-to-(unprotected)-subprogram value need consist
only of the address of the subprogram. The global display is guaranteed to be
properly set up any time the designated subprogram is called. Even in a static-link-based
model, the only time a static link is definitely required is for an access-to-subprogram
type declared in a scope nested at least two levels deep within subprogram or
task bodies, since values of such a type might designate subprograms nested
a smaller number of levels. For the normal case of an access-to-subprogram type
declared at the outermost (library) level, a code address by itself should be
sufficient to represent the access value in many implementations.
11.c
For access-to-protected-subprogram,
the access values will necessarily include both an address (or other
identification) of the code of the subprogram, as well as the address
of the associated protected object. This could be thought of as a static
link, but it will be needed even for global-display-based implementation
models. It corresponds to the value of the ``implicit parameter'' that
is passed into every call of a protected operation, to identify the current
instance of the protected type on which they are to operate.
11.d
Any Elaboration_Check is performed
when a call is made through an access value, rather than when the access
value is first "created" via a 'Access. For implementation
models that normally put that check at the call-site, an access value
will have to point to a separate entry point that does the check. Alternatively,
the access value could point to a "subprogram descriptor" that
consisted of two words (or perhaps more), the first being the address
of the code, the second being the elaboration bit. Or perhaps more efficiently,
just the address of the code, but using the trick that the descriptor
is initialized to point to a Raise-Program-Error routine initially, and
then set to point to the "real" code when the body is elaborated.
11.e
For implementations that share
code between generic instantiations, the extra level of indirection suggested
above to support Elaboration_Checks could also be used to provide a pointer
to the per-instance data area normally required when calling shared code.
The trick would be to put a pointer to the per-instance data area into
the subprogram descriptor, and then make sure that the address of the
subprogram descriptor is loaded into a "known" register whenever
an indirect call is performed. Once inside the shared code, the address
of the per-instance data area can be retrieved out of the subprogram
descriptor, by indexing off the "known" register.
11.f
Essentially the same implementation
issues arise for calls on dispatching operations of tagged types, except
that the static link is always known "statically."
11.g
Note that access parameters of
an anonymous access-to-subprogram type are not permitted. If there were
such parameters, full ``downward'' closures would be required, meaning
that in an implementation that uses a per-task (global) display, the
display would have to be passed as a hidden parameter, and reconstructed
at the point of call. This was felt to be an undue implementation burden,
given that an equivalent (actually, more general) capability is available
via formal subprogram parameters to a generic.
12
{anonymous access
type} {designated subtype (of
an anonymous access type)} {designated
type (of an anonymous access type)} An
access_definition
defines an anonymous general access-to-variable type; the
subtype_mark
denotes its
designated subtype. [An
access_definition
is used in the specification of an access discriminant (see
3.7)
or an access parameter (see
6.1).]
13
{null value (of an
access type)} For each (named) access type, there
is a literal
null which has a null access value designating no entity
at all. [The null value of a named access type is the default initial value
of the type.] Other values of an access type are obtained by evaluating an
attribute_reference
for the Access or Unchecked_Access attribute of an aliased view of an object
or non-intrinsic subprogram, or, in the case of a named access-to-object type,
an
allocator[, which returns an access
value designating a newly created object (see
3.10.2)].
13.a
Ramification: A value of
an anonymous access type (that is, the value of an access parameter or
access discriminant) cannot be null.
13.b
Reason: Access parameters
allow dispatching on the tag of the object designated by the actual parameter
(which gets converted to the anonymous access type as part of the call).
In order for dispatching to work properly, there had better be such an
object. Hence, the type conversion will raise Constraint_Error if the
value of the actual parameter is null.
14/1
{
8652/0013}
{constrained (subtype) [partial]} {unconstrained
(subtype) [partial]} [All subtypes of an access-to-subprogram
type are constrained.] The first subtype of a type defined by an
access_definitionaccess_type_definition
or an
access_to_object_definition is unconstrained
if the designated subtype is an unconstrained array or discriminated
subtypetype;
otherwise it is constrained.
14.a
Proof: The Legality Rules on range_constraints
(see 3.5) do not permit the subtype_mark
of the subtype_indication to denote an
access-to-scalar type, only a scalar type. The Legality Rules on index_constraints
(see 3.6.1) and discriminant_constraints
(see 3.7.1) both permit access-to-composite types
in a subtype_indication with such _constraints.
Note that an access-to-access-to-composite is never permitted in a subtype_indication
with a constraint.
14.b
Reason: Only composite_constraints
are permitted for an access type, and only on access-to-composite types.
A constraint on an access-to-scalar or access-to-access type might be
violated due to assignments via other access paths that were not so constrained.
By contrast, if the designated subtype is an array or discriminated type,
the constraint could not be violated by unconstrained assignments, since
array objects are always constrained, and aliased discriminated objects
are also constrained (by fiat, see Static Semantics).
Dynamic Semantics
15
{compatibility (composite_constraint
with an access subtype) [partial]} A
composite_constraint
is
compatible with an unconstrained access subtype if it is compatible
with the designated subtype.
{satisfies (for an access
value) [partial]} An access value
satisfies
a
composite_constraint of an access
subtype if it equals the null value of its type or if it designates an
object whose value satisfies the constraint.
16
{elaboration (access_type_definition)
[partial]} The elaboration of an
access_type_definition
creates the access type and its first subtype. For an access-to-object
type, this elaboration includes the elaboration of the
subtype_indication,
which creates the designated subtype.
17
{elaboration (access_definition)
[partial]} The elaboration of an
access_definition
creates an anonymous general access-to-variable type [(this happens as
part of the initialization of an access parameter or access discriminant)].
18
77 Access values are called
``pointers'' or ``references'' in some other languages.
19
78 Each access-to-object type has
an associated storage pool; several access types can share the same pool. An
object can be created in the storage pool of an access type by an allocator
(see 4.8) for the access type. A storage pool (roughly)
corresponds to what some other languages call a ``heap.'' See 13.11
for a discussion of pools.
20
79 Only index_constraints
and discriminant_constraints can be applied
to access types (see 3.6.1 and 3.7.1).
Examples
21
Examples of
access-to-object types:
22
type Peripheral_Ref is access Peripheral; -- see 3.8.1
type Binop_Ptr is access all Binary_Operation'Class;
-- general access-to-class-wide, see 3.9.1
23
Example of an
access subtype:
24
subtype Drum_Ref is Peripheral_Ref(Drum); -- see 3.8.1
25
Example of an
access-to-subprogram type:
26
type Message_Procedure is access procedure (M : in String := "Error!");
procedure Default_Message_Procedure(M : in String);
Give_Message : Message_Procedure := Default_Message_Procedure'Access;
...
procedure Other_Procedure(M : in String);
...
Give_Message := Other_Procedure'Access;
...
Give_Message("File not found."); -- call with parameter (.all is optional)
Give_Message.all; -- call with no parameters
Extensions to Ada 83
26.a
{extensions to Ada 83}
The syntax for access_type_definition
is changed to support general access types (including access-to-constants)
and access-to-subprograms. The syntax rules for general_access_modifier
and access_definition are new.
Wording Changes from Ada 83
26.b
We use the term "storage pool"
to talk about the data area from which allocation takes place. The term "collection"
is no longer used. ("Collection" and "storage pool" are
not the same thing because multiple unrelated access types can share the same
storage pool; see 13.11 for more discussion.)
Contents Index Previous Next Legal