]>
Commit | Line | Data |
---|---|---|
8d08fdba | 1 | /* Handle initialization things in C++. |
818ab71a | 2 | Copyright (C) 1987-2016 Free Software Foundation, Inc. |
8d08fdba MS |
3 | Contributed by Michael Tiemann (tiemann@cygnus.com) |
4 | ||
f5adbb8d | 5 | This file is part of GCC. |
8d08fdba | 6 | |
f5adbb8d | 7 | GCC is free software; you can redistribute it and/or modify |
8d08fdba | 8 | it under the terms of the GNU General Public License as published by |
e77f031d | 9 | the Free Software Foundation; either version 3, or (at your option) |
8d08fdba MS |
10 | any later version. |
11 | ||
f5adbb8d | 12 | GCC is distributed in the hope that it will be useful, |
8d08fdba MS |
13 | but WITHOUT ANY WARRANTY; without even the implied warranty of |
14 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
15 | GNU General Public License for more details. | |
16 | ||
17 | You should have received a copy of the GNU General Public License | |
e77f031d NC |
18 | along with GCC; see the file COPYING3. If not see |
19 | <http://www.gnu.org/licenses/>. */ | |
8d08fdba | 20 | |
e92cc029 | 21 | /* High-level class interface. */ |
8d08fdba MS |
22 | |
23 | #include "config.h" | |
8d052bc7 | 24 | #include "system.h" |
4977bab6 | 25 | #include "coretypes.h" |
2adfab87 | 26 | #include "target.h" |
2adfab87 | 27 | #include "cp-tree.h" |
d8a2d370 DN |
28 | #include "stringpool.h" |
29 | #include "varasm.h" | |
45b0be94 | 30 | #include "gimplify.h" |
46621807 | 31 | #include "c-family/c-ubsan.h" |
8d08fdba | 32 | |
2a3398e1 NS |
33 | static bool begin_init_stmts (tree *, tree *); |
34 | static tree finish_init_stmts (bool, tree, tree); | |
2282d28d | 35 | static void construct_virtual_base (tree, tree); |
5ade1ed2 DG |
36 | static void expand_aggr_init_1 (tree, tree, tree, tree, int, tsubst_flags_t); |
37 | static void expand_default_init (tree, tree, tree, tree, int, tsubst_flags_t); | |
2282d28d | 38 | static void perform_member_init (tree, tree); |
362efdc1 NN |
39 | static int member_init_ok_or_else (tree, tree, tree); |
40 | static void expand_virtual_init (tree, tree); | |
2282d28d | 41 | static tree sort_mem_initializers (tree, tree); |
362efdc1 NN |
42 | static tree initializing_context (tree); |
43 | static void expand_cleanup_for_base (tree, tree); | |
362efdc1 | 44 | static tree dfs_initialize_vtbl_ptrs (tree, void *); |
362efdc1 | 45 | static tree build_field_list (tree, tree, int *); |
40bb78ad | 46 | static int diagnose_uninitialized_cst_or_ref_member_1 (tree, tree, bool, bool); |
8d08fdba | 47 | |
3dbc07b6 MM |
48 | /* We are about to generate some complex initialization code. |
49 | Conceptually, it is all a single expression. However, we may want | |
50 | to include conditionals, loops, and other such statement-level | |
51 | constructs. Therefore, we build the initialization code inside a | |
52 | statement-expression. This function starts such an expression. | |
53 | STMT_EXPR_P and COMPOUND_STMT_P are filled in by this function; | |
54 | pass them back to finish_init_stmts when the expression is | |
55 | complete. */ | |
56 | ||
2a3398e1 | 57 | static bool |
362efdc1 | 58 | begin_init_stmts (tree *stmt_expr_p, tree *compound_stmt_p) |
3dbc07b6 | 59 | { |
38e01f9e | 60 | bool is_global = !building_stmt_list_p (); |
c8094d83 | 61 | |
2a3398e1 | 62 | *stmt_expr_p = begin_stmt_expr (); |
325c3691 | 63 | *compound_stmt_p = begin_compound_stmt (BCS_NO_SCOPE); |
2a3398e1 NS |
64 | |
65 | return is_global; | |
3dbc07b6 MM |
66 | } |
67 | ||
68 | /* Finish out the statement-expression begun by the previous call to | |
69 | begin_init_stmts. Returns the statement-expression itself. */ | |
70 | ||
2a3398e1 NS |
71 | static tree |
72 | finish_init_stmts (bool is_global, tree stmt_expr, tree compound_stmt) | |
c8094d83 | 73 | { |
7a3397c7 | 74 | finish_compound_stmt (compound_stmt); |
c8094d83 | 75 | |
303b7406 | 76 | stmt_expr = finish_stmt_expr (stmt_expr, true); |
3dbc07b6 | 77 | |
38e01f9e | 78 | gcc_assert (!building_stmt_list_p () == is_global); |
c8094d83 | 79 | |
3dbc07b6 MM |
80 | return stmt_expr; |
81 | } | |
82 | ||
83 | /* Constructors */ | |
84 | ||
338d90b8 NS |
85 | /* Called from initialize_vtbl_ptrs via dfs_walk. BINFO is the base |
86 | which we want to initialize the vtable pointer for, DATA is | |
87 | TREE_LIST whose TREE_VALUE is the this ptr expression. */ | |
7177d104 | 88 | |
d569399b | 89 | static tree |
362efdc1 | 90 | dfs_initialize_vtbl_ptrs (tree binfo, void *data) |
d569399b | 91 | { |
5d5a519f NS |
92 | if (!TYPE_CONTAINS_VPTR_P (BINFO_TYPE (binfo))) |
93 | return dfs_skip_bases; | |
c8094d83 | 94 | |
5d5a519f | 95 | if (!BINFO_PRIMARY_P (binfo) || BINFO_VIRTUAL_P (binfo)) |
d569399b MM |
96 | { |
97 | tree base_ptr = TREE_VALUE ((tree) data); | |
7177d104 | 98 | |
a271590a PC |
99 | base_ptr = build_base_path (PLUS_EXPR, base_ptr, binfo, /*nonnull=*/1, |
100 | tf_warning_or_error); | |
d569399b MM |
101 | |
102 | expand_virtual_init (binfo, base_ptr); | |
103 | } | |
7177d104 | 104 | |
d569399b MM |
105 | return NULL_TREE; |
106 | } | |
107 | ||
cf2e003b MM |
108 | /* Initialize all the vtable pointers in the object pointed to by |
109 | ADDR. */ | |
e92cc029 | 110 | |
8d08fdba | 111 | void |
362efdc1 | 112 | initialize_vtbl_ptrs (tree addr) |
8d08fdba | 113 | { |
cf2e003b MM |
114 | tree list; |
115 | tree type; | |
116 | ||
117 | type = TREE_TYPE (TREE_TYPE (addr)); | |
118 | list = build_tree_list (type, addr); | |
d569399b | 119 | |
bbd15aac | 120 | /* Walk through the hierarchy, initializing the vptr in each base |
1f5a253a | 121 | class. We do these in pre-order because we can't find the virtual |
3461fba7 NS |
122 | bases for a class until we've initialized the vtbl for that |
123 | class. */ | |
5d5a519f | 124 | dfs_walk_once (TYPE_BINFO (type), dfs_initialize_vtbl_ptrs, NULL, list); |
8d08fdba | 125 | } |
d569399b | 126 | |
17bbb839 MM |
127 | /* Return an expression for the zero-initialization of an object with |
128 | type T. This expression will either be a constant (in the case | |
129 | that T is a scalar), or a CONSTRUCTOR (in the case that T is an | |
b43d1bde PC |
130 | aggregate), or NULL (in the case that T does not require |
131 | initialization). In either case, the value can be used as | |
132 | DECL_INITIAL for a decl of the indicated TYPE; it is a valid static | |
133 | initializer. If NELTS is non-NULL, and TYPE is an ARRAY_TYPE, NELTS | |
134 | is the number of elements in the array. If STATIC_STORAGE_P is | |
135 | TRUE, initializers are only generated for entities for which | |
1cb8292f | 136 | zero-initialization does not simply mean filling the storage with |
e33eba75 JJ |
137 | zero bytes. FIELD_SIZE, if non-NULL, is the bit size of the field, |
138 | subfields with bit positions at or above that bit size shouldn't | |
a8c1d899 JM |
139 | be added. Note that this only works when the result is assigned |
140 | to a base COMPONENT_REF; if we only have a pointer to the base subobject, | |
141 | expand_assignment will end up clearing the full size of TYPE. */ | |
94e6e4c4 | 142 | |
e33eba75 JJ |
143 | static tree |
144 | build_zero_init_1 (tree type, tree nelts, bool static_storage_p, | |
145 | tree field_size) | |
94e6e4c4 | 146 | { |
17bbb839 MM |
147 | tree init = NULL_TREE; |
148 | ||
149 | /* [dcl.init] | |
150 | ||
0fcedd9c | 151 | To zero-initialize an object of type T means: |
17bbb839 MM |
152 | |
153 | -- if T is a scalar type, the storage is set to the value of zero | |
0cbd7506 | 154 | converted to T. |
17bbb839 MM |
155 | |
156 | -- if T is a non-union class type, the storage for each nonstatic | |
0cbd7506 | 157 | data member and each base-class subobject is zero-initialized. |
17bbb839 MM |
158 | |
159 | -- if T is a union type, the storage for its first data member is | |
0cbd7506 | 160 | zero-initialized. |
17bbb839 MM |
161 | |
162 | -- if T is an array type, the storage for each element is | |
0cbd7506 | 163 | zero-initialized. |
17bbb839 MM |
164 | |
165 | -- if T is a reference type, no initialization is performed. */ | |
94e6e4c4 | 166 | |
50bc768d | 167 | gcc_assert (nelts == NULL_TREE || TREE_CODE (nelts) == INTEGER_CST); |
7a1d37e9 | 168 | |
17bbb839 MM |
169 | if (type == error_mark_node) |
170 | ; | |
171 | else if (static_storage_p && zero_init_p (type)) | |
172 | /* In order to save space, we do not explicitly build initializers | |
173 | for items that do not need them. GCC's semantics are that | |
174 | items with static storage duration that are not otherwise | |
175 | initialized are initialized to zero. */ | |
176 | ; | |
66b1156a | 177 | else if (TYPE_PTR_OR_PTRMEM_P (type)) |
cda0a029 | 178 | init = fold (convert (type, nullptr_node)); |
b8063b29 | 179 | else if (SCALAR_TYPE_P (type)) |
cda0a029 | 180 | init = fold (convert (type, integer_zero_node)); |
5621a5d7 | 181 | else if (RECORD_OR_UNION_CODE_P (TREE_CODE (type))) |
17bbb839 MM |
182 | { |
183 | tree field; | |
9771b263 | 184 | vec<constructor_elt, va_gc> *v = NULL; |
17bbb839 | 185 | |
17bbb839 | 186 | /* Iterate over the fields, building initializations. */ |
910ad8de | 187 | for (field = TYPE_FIELDS (type); field; field = DECL_CHAIN (field)) |
17bbb839 MM |
188 | { |
189 | if (TREE_CODE (field) != FIELD_DECL) | |
190 | continue; | |
191 | ||
7614d42c JJ |
192 | if (TREE_TYPE (field) == error_mark_node) |
193 | continue; | |
194 | ||
e33eba75 JJ |
195 | /* Don't add virtual bases for base classes if they are beyond |
196 | the size of the current field, that means it is present | |
197 | somewhere else in the object. */ | |
198 | if (field_size) | |
199 | { | |
200 | tree bitpos = bit_position (field); | |
201 | if (TREE_CODE (bitpos) == INTEGER_CST | |
202 | && !tree_int_cst_lt (bitpos, field_size)) | |
203 | continue; | |
204 | } | |
205 | ||
17bbb839 MM |
206 | /* Note that for class types there will be FIELD_DECLs |
207 | corresponding to base classes as well. Thus, iterating | |
208 | over TYPE_FIELDs will result in correct initialization of | |
209 | all of the subobjects. */ | |
32a11c08 | 210 | if (!static_storage_p || !zero_init_p (TREE_TYPE (field))) |
4038c495 | 211 | { |
e33eba75 JJ |
212 | tree new_field_size |
213 | = (DECL_FIELD_IS_BASE (field) | |
214 | && DECL_SIZE (field) | |
215 | && TREE_CODE (DECL_SIZE (field)) == INTEGER_CST) | |
216 | ? DECL_SIZE (field) : NULL_TREE; | |
217 | tree value = build_zero_init_1 (TREE_TYPE (field), | |
218 | /*nelts=*/NULL_TREE, | |
219 | static_storage_p, | |
220 | new_field_size); | |
b43d1bde PC |
221 | if (value) |
222 | CONSTRUCTOR_APPEND_ELT(v, field, value); | |
4038c495 | 223 | } |
17bbb839 MM |
224 | |
225 | /* For unions, only the first field is initialized. */ | |
226 | if (TREE_CODE (type) == UNION_TYPE) | |
227 | break; | |
228 | } | |
4038c495 | 229 | |
0fcedd9c JM |
230 | /* Build a constructor to contain the initializations. */ |
231 | init = build_constructor (type, v); | |
17bbb839 MM |
232 | } |
233 | else if (TREE_CODE (type) == ARRAY_TYPE) | |
94e6e4c4 | 234 | { |
17bbb839 | 235 | tree max_index; |
9771b263 | 236 | vec<constructor_elt, va_gc> *v = NULL; |
17bbb839 | 237 | |
17bbb839 | 238 | /* Iterate over the array elements, building initializations. */ |
6b6c8106 | 239 | if (nelts) |
db3927fb AH |
240 | max_index = fold_build2_loc (input_location, |
241 | MINUS_EXPR, TREE_TYPE (nelts), | |
7866705a | 242 | nelts, integer_one_node); |
6b6c8106 SB |
243 | else |
244 | max_index = array_type_nelts (type); | |
9bdb04a2 AP |
245 | |
246 | /* If we have an error_mark here, we should just return error mark | |
247 | as we don't know the size of the array yet. */ | |
248 | if (max_index == error_mark_node) | |
249 | return error_mark_node; | |
50bc768d | 250 | gcc_assert (TREE_CODE (max_index) == INTEGER_CST); |
7a1d37e9 | 251 | |
a8e6c82a MM |
252 | /* A zero-sized array, which is accepted as an extension, will |
253 | have an upper bound of -1. */ | |
254 | if (!tree_int_cst_equal (max_index, integer_minus_one_node)) | |
94763647 | 255 | { |
f32682ca | 256 | constructor_elt ce; |
4038c495 | 257 | |
b01f0d13 AP |
258 | /* If this is a one element array, we just use a regular init. */ |
259 | if (tree_int_cst_equal (size_zero_node, max_index)) | |
f32682ca | 260 | ce.index = size_zero_node; |
b01f0d13 | 261 | else |
f32682ca | 262 | ce.index = build2 (RANGE_EXPR, sizetype, size_zero_node, |
4038c495 | 263 | max_index); |
c8094d83 | 264 | |
f32682ca | 265 | ce.value = build_zero_init_1 (TREE_TYPE (type), |
e33eba75 JJ |
266 | /*nelts=*/NULL_TREE, |
267 | static_storage_p, NULL_TREE); | |
f11c7048 JJ |
268 | if (ce.value) |
269 | { | |
270 | vec_alloc (v, 1); | |
271 | v->quick_push (ce); | |
272 | } | |
94763647 | 273 | } |
c8094d83 | 274 | |
4038c495 GB |
275 | /* Build a constructor to contain the initializations. */ |
276 | init = build_constructor (type, v); | |
94e6e4c4 | 277 | } |
b55b02ea | 278 | else if (VECTOR_TYPE_P (type)) |
e8160c9a | 279 | init = build_zero_cst (type); |
94e6e4c4 | 280 | else |
8dc2b103 | 281 | gcc_assert (TREE_CODE (type) == REFERENCE_TYPE); |
94e6e4c4 | 282 | |
17bbb839 MM |
283 | /* In all cases, the initializer is a constant. */ |
284 | if (init) | |
51eed280 | 285 | TREE_CONSTANT (init) = 1; |
94e6e4c4 AO |
286 | |
287 | return init; | |
288 | } | |
289 | ||
e33eba75 JJ |
290 | /* Return an expression for the zero-initialization of an object with |
291 | type T. This expression will either be a constant (in the case | |
292 | that T is a scalar), or a CONSTRUCTOR (in the case that T is an | |
293 | aggregate), or NULL (in the case that T does not require | |
294 | initialization). In either case, the value can be used as | |
295 | DECL_INITIAL for a decl of the indicated TYPE; it is a valid static | |
296 | initializer. If NELTS is non-NULL, and TYPE is an ARRAY_TYPE, NELTS | |
297 | is the number of elements in the array. If STATIC_STORAGE_P is | |
298 | TRUE, initializers are only generated for entities for which | |
299 | zero-initialization does not simply mean filling the storage with | |
300 | zero bytes. */ | |
301 | ||
302 | tree | |
303 | build_zero_init (tree type, tree nelts, bool static_storage_p) | |
304 | { | |
305 | return build_zero_init_1 (type, nelts, static_storage_p, NULL_TREE); | |
306 | } | |
307 | ||
0fcedd9c | 308 | /* Return a suitable initializer for value-initializing an object of type |
8f540f06 | 309 | TYPE, as described in [dcl.init]. */ |
0fcedd9c | 310 | |
8f540f06 | 311 | tree |
309714d4 | 312 | build_value_init (tree type, tsubst_flags_t complain) |
0fcedd9c JM |
313 | { |
314 | /* [dcl.init] | |
315 | ||
316 | To value-initialize an object of type T means: | |
317 | ||
eca7fc57 JM |
318 | - if T is a class type (clause 9) with either no default constructor |
319 | (12.1) or a default constructor that is user-provided or deleted, | |
026c3cfd | 320 | then the object is default-initialized; |
0fcedd9c | 321 | |
eca7fc57 JM |
322 | - if T is a (possibly cv-qualified) class type without a user-provided |
323 | or deleted default constructor, then the object is zero-initialized | |
324 | and the semantic constraints for default-initialization are checked, | |
325 | and if T has a non-trivial default constructor, the object is | |
326 | default-initialized; | |
0fcedd9c JM |
327 | |
328 | - if T is an array type, then each element is value-initialized; | |
329 | ||
330 | - otherwise, the object is zero-initialized. | |
331 | ||
332 | A program that calls for default-initialization or | |
eca7fc57 | 333 | value-initialization of an entity of reference type is ill-formed. */ |
0fcedd9c | 334 | |
95d7bdaa | 335 | /* The AGGR_INIT_EXPR tweaking below breaks in templates. */ |
14b1860e JJ |
336 | gcc_assert (!processing_template_decl |
337 | || (SCALAR_TYPE_P (type) || TREE_CODE (type) == ARRAY_TYPE)); | |
95d7bdaa | 338 | |
60ff8e16 JM |
339 | if (CLASS_TYPE_P (type) |
340 | && type_build_ctor_call (type)) | |
0fcedd9c | 341 | { |
a710f1f8 | 342 | tree ctor = |
eca7fc57 JM |
343 | build_special_member_call (NULL_TREE, complete_ctor_identifier, |
344 | NULL, type, LOOKUP_NORMAL, | |
a710f1f8 JM |
345 | complain); |
346 | if (ctor == error_mark_node) | |
347 | return ctor; | |
348 | tree fn = NULL_TREE; | |
349 | if (TREE_CODE (ctor) == CALL_EXPR) | |
350 | fn = get_callee_fndecl (ctor); | |
351 | ctor = build_aggr_init_expr (type, ctor); | |
352 | if (fn && user_provided_p (fn)) | |
eca7fc57 | 353 | return ctor; |
7b37a0c5 | 354 | else if (TYPE_HAS_COMPLEX_DFLT (type)) |
8f540f06 JM |
355 | { |
356 | /* This is a class that needs constructing, but doesn't have | |
357 | a user-provided constructor. So we need to zero-initialize | |
358 | the object and then call the implicitly defined ctor. | |
450a927a | 359 | This will be handled in simplify_aggr_init_expr. */ |
eca7fc57 | 360 | AGGR_INIT_ZERO_FIRST (ctor) = 1; |
8f540f06 JM |
361 | return ctor; |
362 | } | |
fd97a96a | 363 | } |
eca7fc57 JM |
364 | |
365 | /* Discard any access checking during subobject initialization; | |
366 | the checks are implied by the call to the ctor which we have | |
367 | verified is OK (cpp0x/defaulted46.C). */ | |
368 | push_deferring_access_checks (dk_deferred); | |
369 | tree r = build_value_init_noctor (type, complain); | |
370 | pop_deferring_access_checks (); | |
371 | return r; | |
fd97a96a JM |
372 | } |
373 | ||
374 | /* Like build_value_init, but don't call the constructor for TYPE. Used | |
375 | for base initializers. */ | |
376 | ||
377 | tree | |
309714d4 | 378 | build_value_init_noctor (tree type, tsubst_flags_t complain) |
fd97a96a | 379 | { |
46a76d4b JM |
380 | if (!COMPLETE_TYPE_P (type)) |
381 | { | |
382 | if (complain & tf_error) | |
383 | error ("value-initialization of incomplete type %qT", type); | |
384 | return error_mark_node; | |
385 | } | |
4ddd8a74 JM |
386 | /* FIXME the class and array cases should just use digest_init once it is |
387 | SFINAE-enabled. */ | |
fd97a96a JM |
388 | if (CLASS_TYPE_P (type)) |
389 | { | |
12185846 PC |
390 | gcc_assert (!TYPE_HAS_COMPLEX_DFLT (type) |
391 | || errorcount != 0); | |
fd97a96a JM |
392 | |
393 | if (TREE_CODE (type) != UNION_TYPE) | |
0fcedd9c | 394 | { |
8f540f06 | 395 | tree field; |
9771b263 | 396 | vec<constructor_elt, va_gc> *v = NULL; |
0fcedd9c JM |
397 | |
398 | /* Iterate over the fields, building initializations. */ | |
910ad8de | 399 | for (field = TYPE_FIELDS (type); field; field = DECL_CHAIN (field)) |
0fcedd9c JM |
400 | { |
401 | tree ftype, value; | |
402 | ||
403 | if (TREE_CODE (field) != FIELD_DECL) | |
404 | continue; | |
405 | ||
406 | ftype = TREE_TYPE (field); | |
407 | ||
a95aef3c PC |
408 | if (ftype == error_mark_node) |
409 | continue; | |
410 | ||
0fcedd9c JM |
411 | /* We could skip vfields and fields of types with |
412 | user-defined constructors, but I think that won't improve | |
413 | performance at all; it should be simpler in general just | |
414 | to zero out the entire object than try to only zero the | |
415 | bits that actually need it. */ | |
416 | ||
417 | /* Note that for class types there will be FIELD_DECLs | |
418 | corresponding to base classes as well. Thus, iterating | |
419 | over TYPE_FIELDs will result in correct initialization of | |
420 | all of the subobjects. */ | |
309714d4 | 421 | value = build_value_init (ftype, complain); |
c0014b07 | 422 | value = maybe_constant_init (value); |
0fcedd9c | 423 | |
351ccf20 JM |
424 | if (value == error_mark_node) |
425 | return error_mark_node; | |
426 | ||
c0014b07 JM |
427 | CONSTRUCTOR_APPEND_ELT(v, field, value); |
428 | ||
429 | /* We shouldn't have gotten here for anything that would need | |
430 | non-trivial initialization, and gimplify_init_ctor_preeval | |
431 | would need to be fixed to allow it. */ | |
432 | gcc_assert (TREE_CODE (value) != TARGET_EXPR | |
433 | && TREE_CODE (value) != AGGR_INIT_EXPR); | |
0fcedd9c JM |
434 | } |
435 | ||
436 | /* Build a constructor to contain the zero- initializations. */ | |
8f540f06 | 437 | return build_constructor (type, v); |
0fcedd9c JM |
438 | } |
439 | } | |
440 | else if (TREE_CODE (type) == ARRAY_TYPE) | |
441 | { | |
9771b263 | 442 | vec<constructor_elt, va_gc> *v = NULL; |
0fcedd9c JM |
443 | |
444 | /* Iterate over the array elements, building initializations. */ | |
445 | tree max_index = array_type_nelts (type); | |
446 | ||
447 | /* If we have an error_mark here, we should just return error mark | |
448 | as we don't know the size of the array yet. */ | |
449 | if (max_index == error_mark_node) | |
462aa169 | 450 | { |
e2a009c7 JM |
451 | if (complain & tf_error) |
452 | error ("cannot value-initialize array of unknown bound %qT", | |
453 | type); | |
462aa169 JM |
454 | return error_mark_node; |
455 | } | |
0fcedd9c JM |
456 | gcc_assert (TREE_CODE (max_index) == INTEGER_CST); |
457 | ||
458 | /* A zero-sized array, which is accepted as an extension, will | |
459 | have an upper bound of -1. */ | |
460 | if (!tree_int_cst_equal (max_index, integer_minus_one_node)) | |
461 | { | |
f32682ca | 462 | constructor_elt ce; |
0fcedd9c | 463 | |
0fcedd9c JM |
464 | /* If this is a one element array, we just use a regular init. */ |
465 | if (tree_int_cst_equal (size_zero_node, max_index)) | |
f32682ca | 466 | ce.index = size_zero_node; |
0fcedd9c | 467 | else |
f32682ca | 468 | ce.index = build2 (RANGE_EXPR, sizetype, size_zero_node, max_index); |
0fcedd9c | 469 | |
f32682ca | 470 | ce.value = build_value_init (TREE_TYPE (type), complain); |
c0014b07 JM |
471 | ce.value = maybe_constant_init (ce.value); |
472 | if (ce.value == error_mark_node) | |
473 | return error_mark_node; | |
9dbd4406 | 474 | |
c0014b07 JM |
475 | vec_alloc (v, 1); |
476 | v->quick_push (ce); | |
351ccf20 | 477 | |
c0014b07 JM |
478 | /* We shouldn't have gotten here for anything that would need |
479 | non-trivial initialization, and gimplify_init_ctor_preeval | |
480 | would need to be fixed to allow it. */ | |
481 | gcc_assert (TREE_CODE (ce.value) != TARGET_EXPR | |
482 | && TREE_CODE (ce.value) != AGGR_INIT_EXPR); | |
0fcedd9c JM |
483 | } |
484 | ||
485 | /* Build a constructor to contain the initializations. */ | |
486 | return build_constructor (type, v); | |
487 | } | |
2b8497cd JM |
488 | else if (TREE_CODE (type) == FUNCTION_TYPE) |
489 | { | |
490 | if (complain & tf_error) | |
491 | error ("value-initialization of function type %qT", type); | |
492 | return error_mark_node; | |
493 | } | |
351ccf20 JM |
494 | else if (TREE_CODE (type) == REFERENCE_TYPE) |
495 | { | |
496 | if (complain & tf_error) | |
497 | error ("value-initialization of reference type %qT", type); | |
498 | return error_mark_node; | |
499 | } | |
0fcedd9c JM |
500 | |
501 | return build_zero_init (type, NULL_TREE, /*static_storage_p=*/false); | |
502 | } | |
503 | ||
238e471c VV |
504 | /* Initialize current class with INIT, a TREE_LIST of |
505 | arguments for a target constructor. If TREE_LIST is void_type_node, | |
506 | an empty initializer list was given. */ | |
507 | ||
508 | static void | |
509 | perform_target_ctor (tree init) | |
510 | { | |
511 | tree decl = current_class_ref; | |
512 | tree type = current_class_type; | |
513 | ||
a624d5fe PC |
514 | finish_expr_stmt (build_aggr_init (decl, init, |
515 | LOOKUP_NORMAL|LOOKUP_DELEGATING_CONS, | |
516 | tf_warning_or_error)); | |
eca7fc57 | 517 | if (type_build_dtor_call (type)) |
238e471c VV |
518 | { |
519 | tree expr = build_delete (type, decl, sfk_complete_destructor, | |
520 | LOOKUP_NORMAL | |
521 | |LOOKUP_NONVIRTUAL | |
522 | |LOOKUP_DESTRUCTOR, | |
523 | 0, tf_warning_or_error); | |
eca7fc57 JM |
524 | if (expr != error_mark_node |
525 | && TYPE_HAS_NONTRIVIAL_DESTRUCTOR (type)) | |
238e471c VV |
526 | finish_eh_cleanup (expr); |
527 | } | |
528 | } | |
529 | ||
b15ea309 JM |
530 | /* Return the non-static data initializer for FIELD_DECL MEMBER. */ |
531 | ||
532 | tree | |
533 | get_nsdmi (tree member, bool in_ctor) | |
534 | { | |
535 | tree init; | |
536 | tree save_ccp = current_class_ptr; | |
537 | tree save_ccr = current_class_ref; | |
04eca83e | 538 | |
b15ea309 | 539 | if (!in_ctor) |
3e605b20 JM |
540 | { |
541 | /* Use a PLACEHOLDER_EXPR when we don't have a 'this' parameter to | |
542 | refer to; constexpr evaluation knows what to do with it. */ | |
543 | current_class_ref = build0 (PLACEHOLDER_EXPR, DECL_CONTEXT (member)); | |
544 | current_class_ptr = build_address (current_class_ref); | |
545 | } | |
04eca83e | 546 | |
b15ea309 | 547 | if (DECL_LANG_SPECIFIC (member) && DECL_TEMPLATE_INFO (member)) |
f4cd9c51 | 548 | { |
04eca83e NS |
549 | init = DECL_INITIAL (DECL_TI_TEMPLATE (member)); |
550 | if (TREE_CODE (init) == DEFAULT_ARG) | |
551 | goto unparsed; | |
552 | ||
553 | /* Check recursive instantiation. */ | |
554 | if (DECL_INSTANTIATING_NSDMI_P (member)) | |
555 | { | |
556 | error ("recursive instantiation of non-static data member " | |
557 | "initializer for %qD", member); | |
558 | init = error_mark_node; | |
559 | } | |
560 | else | |
561 | { | |
562 | DECL_INSTANTIATING_NSDMI_P (member) = 1; | |
563 | ||
564 | /* Do deferred instantiation of the NSDMI. */ | |
565 | init = (tsubst_copy_and_build | |
566 | (init, DECL_TI_ARGS (member), | |
567 | tf_warning_or_error, member, /*function_p=*/false, | |
568 | /*integral_constant_expression_p=*/false)); | |
569 | init = digest_nsdmi_init (member, init); | |
570 | ||
571 | DECL_INSTANTIATING_NSDMI_P (member) = 0; | |
572 | } | |
f4cd9c51 | 573 | } |
b15ea309 JM |
574 | else |
575 | { | |
576 | init = DECL_INITIAL (member); | |
577 | if (init && TREE_CODE (init) == DEFAULT_ARG) | |
578 | { | |
04eca83e | 579 | unparsed: |
b15ea309 JM |
580 | error ("constructor required before non-static data member " |
581 | "for %qD has been parsed", member); | |
582 | DECL_INITIAL (member) = error_mark_node; | |
3e605b20 | 583 | init = error_mark_node; |
b15ea309 JM |
584 | } |
585 | /* Strip redundant TARGET_EXPR so we don't need to remap it, and | |
586 | so the aggregate init code below will see a CONSTRUCTOR. */ | |
338976c2 | 587 | if (init && SIMPLE_TARGET_EXPR_P (init)) |
b15ea309 JM |
588 | init = TARGET_EXPR_INITIAL (init); |
589 | init = break_out_target_exprs (init); | |
590 | } | |
591 | current_class_ptr = save_ccp; | |
592 | current_class_ref = save_ccr; | |
593 | return init; | |
594 | } | |
595 | ||
2282d28d MM |
596 | /* Initialize MEMBER, a FIELD_DECL, with INIT, a TREE_LIST of |
597 | arguments. If TREE_LIST is void_type_node, an empty initializer | |
598 | list was given; if NULL_TREE no initializer was given. */ | |
e92cc029 | 599 | |
8d08fdba | 600 | static void |
2282d28d | 601 | perform_member_init (tree member, tree init) |
8d08fdba MS |
602 | { |
603 | tree decl; | |
604 | tree type = TREE_TYPE (member); | |
2282d28d | 605 | |
0e5f8a59 JM |
606 | /* Use the non-static data member initializer if there was no |
607 | mem-initializer for this field. */ | |
608 | if (init == NULL_TREE) | |
b15ea309 | 609 | init = get_nsdmi (member, /*ctor*/true); |
0e5f8a59 | 610 | |
a9eba00e PC |
611 | if (init == error_mark_node) |
612 | return; | |
613 | ||
2282d28d MM |
614 | /* Effective C++ rule 12 requires that all data members be |
615 | initialized. */ | |
9dbd4406 | 616 | if (warn_ecpp && init == NULL_TREE && TREE_CODE (type) != ARRAY_TYPE) |
c5d75364 MLI |
617 | warning_at (DECL_SOURCE_LOCATION (current_function_decl), OPT_Weffc__, |
618 | "%qD should be initialized in the member initialization list", | |
619 | member); | |
2282d28d | 620 | |
2282d28d | 621 | /* Get an lvalue for the data member. */ |
50ad9642 MM |
622 | decl = build_class_member_access_expr (current_class_ref, member, |
623 | /*access_path=*/NULL_TREE, | |
5ade1ed2 DG |
624 | /*preserve_reference=*/true, |
625 | tf_warning_or_error); | |
2fbfe9b8 MS |
626 | if (decl == error_mark_node) |
627 | return; | |
628 | ||
c11e39b0 JW |
629 | if (warn_init_self && init && TREE_CODE (init) == TREE_LIST |
630 | && TREE_CHAIN (init) == NULL_TREE) | |
631 | { | |
632 | tree val = TREE_VALUE (init); | |
0aa359c1 PC |
633 | /* Handle references. */ |
634 | if (REFERENCE_REF_P (val)) | |
635 | val = TREE_OPERAND (val, 0); | |
c11e39b0 JW |
636 | if (TREE_CODE (val) == COMPONENT_REF && TREE_OPERAND (val, 1) == member |
637 | && TREE_OPERAND (val, 0) == current_class_ref) | |
638 | warning_at (DECL_SOURCE_LOCATION (current_function_decl), | |
0ccb505d | 639 | OPT_Winit_self, "%qD is initialized with itself", |
c11e39b0 JW |
640 | member); |
641 | } | |
642 | ||
9dbd4406 JM |
643 | if (init == void_type_node) |
644 | { | |
645 | /* mem() means value-initialization. */ | |
646 | if (TREE_CODE (type) == ARRAY_TYPE) | |
0f737a30 | 647 | { |
9c69dcea | 648 | init = build_vec_init_expr (type, init, tf_warning_or_error); |
4de2f020 | 649 | init = build2 (INIT_EXPR, type, decl, init); |
0f737a30 JJ |
650 | finish_expr_stmt (init); |
651 | } | |
9dbd4406 JM |
652 | else |
653 | { | |
48e5d119 PC |
654 | tree value = build_value_init (type, tf_warning_or_error); |
655 | if (value == error_mark_node) | |
656 | return; | |
657 | init = build2 (INIT_EXPR, type, decl, value); | |
351ccf20 | 658 | finish_expr_stmt (init); |
9dbd4406 | 659 | } |
9dbd4406 | 660 | } |
6bdb8141 JM |
661 | /* Deal with this here, as we will get confused if we try to call the |
662 | assignment op for an anonymous union. This can happen in a | |
663 | synthesized copy constructor. */ | |
9dbd4406 | 664 | else if (ANON_AGGR_TYPE_P (type)) |
6bdb8141 | 665 | { |
ff9f1a5d MM |
666 | if (init) |
667 | { | |
f293ce4b | 668 | init = build2 (INIT_EXPR, type, decl, TREE_VALUE (init)); |
ff9f1a5d MM |
669 | finish_expr_stmt (init); |
670 | } | |
6bdb8141 | 671 | } |
e2df21bf JM |
672 | else if (init |
673 | && (TREE_CODE (type) == REFERENCE_TYPE | |
674 | /* Pre-digested NSDMI. */ | |
675 | || (((TREE_CODE (init) == CONSTRUCTOR | |
676 | && TREE_TYPE (init) == type) | |
677 | /* { } mem-initializer. */ | |
678 | || (TREE_CODE (init) == TREE_LIST | |
014397c2 | 679 | && DIRECT_LIST_INIT_P (TREE_VALUE (init)))) |
e2df21bf JM |
680 | && (CP_AGGREGATE_TYPE_P (type) |
681 | || is_std_init_list (type))))) | |
682 | { | |
683 | /* With references and list-initialization, we need to deal with | |
684 | extending temporary lifetimes. 12.2p5: "A temporary bound to a | |
685 | reference member in a constructorâs ctor-initializer (12.6.2) | |
686 | persists until the constructor exits." */ | |
687 | unsigned i; tree t; | |
9771b263 | 688 | vec<tree, va_gc> *cleanups = make_tree_vector (); |
e2df21bf JM |
689 | if (TREE_CODE (init) == TREE_LIST) |
690 | init = build_x_compound_expr_from_list (init, ELK_MEM_INIT, | |
691 | tf_warning_or_error); | |
692 | if (TREE_TYPE (init) != type) | |
4794d4b5 JM |
693 | { |
694 | if (BRACE_ENCLOSED_INITIALIZER_P (init) | |
695 | && CP_AGGREGATE_TYPE_P (type)) | |
696 | init = reshape_init (type, init, tf_warning_or_error); | |
697 | init = digest_init (type, init, tf_warning_or_error); | |
698 | } | |
e2df21bf JM |
699 | if (init == error_mark_node) |
700 | return; | |
f3fae478 JM |
701 | /* A FIELD_DECL doesn't really have a suitable lifetime, but |
702 | make_temporary_var_for_ref_to_temp will treat it as automatic and | |
703 | set_up_extended_ref_temp wants to use the decl in a warning. */ | |
2c6f7927 | 704 | init = extend_ref_init_temps (member, init, &cleanups); |
e2df21bf JM |
705 | if (TREE_CODE (type) == ARRAY_TYPE |
706 | && TYPE_HAS_NONTRIVIAL_DESTRUCTOR (TREE_TYPE (type))) | |
707 | init = build_vec_init_expr (type, init, tf_warning_or_error); | |
708 | init = build2 (INIT_EXPR, type, decl, init); | |
709 | finish_expr_stmt (init); | |
9771b263 | 710 | FOR_EACH_VEC_ELT (*cleanups, i, t) |
e2df21bf JM |
711 | push_cleanup (decl, t, false); |
712 | release_tree_vector (cleanups); | |
713 | } | |
a0348261 JM |
714 | else if (type_build_ctor_call (type) |
715 | || (init && CLASS_TYPE_P (strip_array_types (type)))) | |
8d08fdba | 716 | { |
534ecb17 | 717 | if (TREE_CODE (type) == ARRAY_TYPE) |
8d08fdba | 718 | { |
534ecb17 JM |
719 | if (init) |
720 | { | |
dd56ca9f JM |
721 | if (TREE_CHAIN (init)) |
722 | init = error_mark_node; | |
723 | else | |
724 | init = TREE_VALUE (init); | |
f41349a3 JM |
725 | if (BRACE_ENCLOSED_INITIALIZER_P (init)) |
726 | init = digest_init (type, init, tf_warning_or_error); | |
534ecb17 JM |
727 | } |
728 | if (init == NULL_TREE | |
729 | || same_type_ignoring_top_level_qualifiers_p (type, | |
730 | TREE_TYPE (init))) | |
731 | { | |
7e9a3ad3 MS |
732 | if (TYPE_DOMAIN (type) && TYPE_MAX_VALUE (TYPE_DOMAIN (type))) |
733 | { | |
734 | /* Initialize the array only if it's not a flexible | |
735 | array member (i.e., if it has an upper bound). */ | |
736 | init = build_vec_init_expr (type, init, tf_warning_or_error); | |
737 | init = build2 (INIT_EXPR, type, decl, init); | |
738 | finish_expr_stmt (init); | |
739 | } | |
534ecb17 JM |
740 | } |
741 | else | |
742 | error ("invalid initializer for array member %q#D", member); | |
8d08fdba MS |
743 | } |
744 | else | |
b87d79e6 | 745 | { |
b8bf6ad9 JM |
746 | int flags = LOOKUP_NORMAL; |
747 | if (DECL_DEFAULTED_FN (current_function_decl)) | |
748 | flags |= LOOKUP_DEFAULTED; | |
b87d79e6 JM |
749 | if (CP_TYPE_CONST_P (type) |
750 | && init == NULL_TREE | |
6132bdd7 | 751 | && default_init_uninitialized_part (type)) |
0df9da03 FC |
752 | { |
753 | /* TYPE_NEEDS_CONSTRUCTING can be set just because we have a | |
754 | vtable; still give this diagnostic. */ | |
755 | if (permerror (DECL_SOURCE_LOCATION (current_function_decl), | |
756 | "uninitialized const member in %q#T", type)) | |
757 | inform (DECL_SOURCE_LOCATION (member), | |
758 | "%q#D should be initialized", member ); | |
759 | } | |
b8bf6ad9 | 760 | finish_expr_stmt (build_aggr_init (decl, init, flags, |
b87d79e6 JM |
761 | tf_warning_or_error)); |
762 | } | |
8d08fdba MS |
763 | } |
764 | else | |
765 | { | |
766 | if (init == NULL_TREE) | |
767 | { | |
31d1acec | 768 | tree core_type; |
8d08fdba | 769 | /* member traversal: note it leaves init NULL */ |
9dbd4406 | 770 | if (TREE_CODE (type) == REFERENCE_TYPE) |
0df9da03 FC |
771 | { |
772 | if (permerror (DECL_SOURCE_LOCATION (current_function_decl), | |
773 | "uninitialized reference member in %q#T", type)) | |
774 | inform (DECL_SOURCE_LOCATION (member), | |
775 | "%q#D should be initialized", member); | |
776 | } | |
58ec3cc5 | 777 | else if (CP_TYPE_CONST_P (type)) |
0df9da03 FC |
778 | { |
779 | if (permerror (DECL_SOURCE_LOCATION (current_function_decl), | |
780 | "uninitialized const member in %q#T", type)) | |
781 | inform (DECL_SOURCE_LOCATION (member), | |
782 | "%q#D should be initialized", member ); | |
783 | } | |
31d1acec | 784 | |
69f36ba6 JM |
785 | core_type = strip_array_types (type); |
786 | ||
012e6a1e JM |
787 | if (CLASS_TYPE_P (core_type) |
788 | && (CLASSTYPE_READONLY_FIELDS_NEED_INIT (core_type) | |
789 | || CLASSTYPE_REF_FIELDS_NEED_INIT (core_type))) | |
790 | diagnose_uninitialized_cst_or_ref_member (core_type, | |
40bb78ad FC |
791 | /*using_new=*/false, |
792 | /*complain=*/true); | |
8d08fdba MS |
793 | } |
794 | else if (TREE_CODE (init) == TREE_LIST) | |
c7b62f14 NS |
795 | /* There was an explicit member initialization. Do some work |
796 | in that case. */ | |
d555b1c7 PC |
797 | init = build_x_compound_expr_from_list (init, ELK_MEM_INIT, |
798 | tf_warning_or_error); | |
8d08fdba | 799 | |
4f0aa416 | 800 | if (init) |
4f2e1536 MP |
801 | finish_expr_stmt (cp_build_modify_expr (input_location, decl, |
802 | INIT_EXPR, init, | |
5ade1ed2 | 803 | tf_warning_or_error)); |
8d08fdba | 804 | } |
eb66be0e | 805 | |
eca7fc57 | 806 | if (type_build_dtor_call (type)) |
b7484fbe | 807 | { |
de22184b MS |
808 | tree expr; |
809 | ||
50ad9642 MM |
810 | expr = build_class_member_access_expr (current_class_ref, member, |
811 | /*access_path=*/NULL_TREE, | |
5ade1ed2 DG |
812 | /*preserve_reference=*/false, |
813 | tf_warning_or_error); | |
3ec6bad3 | 814 | expr = build_delete (type, expr, sfk_complete_destructor, |
574cfaa4 JM |
815 | LOOKUP_NONVIRTUAL|LOOKUP_DESTRUCTOR, 0, |
816 | tf_warning_or_error); | |
b7484fbe | 817 | |
eca7fc57 JM |
818 | if (expr != error_mark_node |
819 | && TYPE_HAS_NONTRIVIAL_DESTRUCTOR (type)) | |
659e5a7a | 820 | finish_eh_cleanup (expr); |
b7484fbe | 821 | } |
8d08fdba MS |
822 | } |
823 | ||
ff9f1a5d MM |
824 | /* Returns a TREE_LIST containing (as the TREE_PURPOSE of each node) all |
825 | the FIELD_DECLs on the TYPE_FIELDS list for T, in reverse order. */ | |
826 | ||
c8094d83 | 827 | static tree |
a81072c7 | 828 | build_field_list (tree t, tree list, int *uses_unions_or_anon_p) |
ff9f1a5d MM |
829 | { |
830 | tree fields; | |
831 | ||
832 | /* Note whether or not T is a union. */ | |
833 | if (TREE_CODE (t) == UNION_TYPE) | |
a81072c7 | 834 | *uses_unions_or_anon_p = 1; |
ff9f1a5d | 835 | |
910ad8de | 836 | for (fields = TYPE_FIELDS (t); fields; fields = DECL_CHAIN (fields)) |
ff9f1a5d | 837 | { |
535335bf JM |
838 | tree fieldtype; |
839 | ||
ff9f1a5d | 840 | /* Skip CONST_DECLs for enumeration constants and so forth. */ |
17bbb839 | 841 | if (TREE_CODE (fields) != FIELD_DECL || DECL_ARTIFICIAL (fields)) |
ff9f1a5d | 842 | continue; |
c8094d83 | 843 | |
535335bf | 844 | fieldtype = TREE_TYPE (fields); |
ff9f1a5d MM |
845 | |
846 | /* For an anonymous struct or union, we must recursively | |
847 | consider the fields of the anonymous type. They can be | |
848 | directly initialized from the constructor. */ | |
535335bf | 849 | if (ANON_AGGR_TYPE_P (fieldtype)) |
ff9f1a5d MM |
850 | { |
851 | /* Add this field itself. Synthesized copy constructors | |
852 | initialize the entire aggregate. */ | |
853 | list = tree_cons (fields, NULL_TREE, list); | |
854 | /* And now add the fields in the anonymous aggregate. */ | |
a81072c7 JM |
855 | list = build_field_list (fieldtype, list, uses_unions_or_anon_p); |
856 | *uses_unions_or_anon_p = 1; | |
ff9f1a5d MM |
857 | } |
858 | /* Add this field. */ | |
859 | else if (DECL_NAME (fields)) | |
860 | list = tree_cons (fields, NULL_TREE, list); | |
861 | } | |
862 | ||
863 | return list; | |
864 | } | |
865 | ||
a81072c7 JM |
866 | /* Return the innermost aggregate scope for FIELD, whether that is |
867 | the enclosing class or an anonymous aggregate within it. */ | |
868 | ||
869 | static tree | |
870 | innermost_aggr_scope (tree field) | |
871 | { | |
872 | if (ANON_AGGR_TYPE_P (TREE_TYPE (field))) | |
873 | return TREE_TYPE (field); | |
874 | else | |
875 | return DECL_CONTEXT (field); | |
876 | } | |
877 | ||
2282d28d MM |
878 | /* The MEM_INITS are a TREE_LIST. The TREE_PURPOSE of each list gives |
879 | a FIELD_DECL or BINFO in T that needs initialization. The | |
880 | TREE_VALUE gives the initializer, or list of initializer arguments. | |
881 | ||
882 | Return a TREE_LIST containing all of the initializations required | |
883 | for T, in the order in which they should be performed. The output | |
884 | list has the same format as the input. */ | |
e92cc029 | 885 | |
8d08fdba | 886 | static tree |
2282d28d | 887 | sort_mem_initializers (tree t, tree mem_inits) |
8d08fdba | 888 | { |
ff9f1a5d | 889 | tree init; |
fa743e8c | 890 | tree base, binfo, base_binfo; |
2282d28d MM |
891 | tree sorted_inits; |
892 | tree next_subobject; | |
9771b263 | 893 | vec<tree, va_gc> *vbases; |
2282d28d | 894 | int i; |
a81072c7 | 895 | int uses_unions_or_anon_p = 0; |
ff9f1a5d | 896 | |
2282d28d MM |
897 | /* Build up a list of initializations. The TREE_PURPOSE of entry |
898 | will be the subobject (a FIELD_DECL or BINFO) to initialize. The | |
899 | TREE_VALUE will be the constructor arguments, or NULL if no | |
900 | explicit initialization was provided. */ | |
901 | sorted_inits = NULL_TREE; | |
c8094d83 | 902 | |
2282d28d | 903 | /* Process the virtual bases. */ |
9ba5ff0f | 904 | for (vbases = CLASSTYPE_VBASECLASSES (t), i = 0; |
9771b263 | 905 | vec_safe_iterate (vbases, i, &base); i++) |
58c42dc2 | 906 | sorted_inits = tree_cons (base, NULL_TREE, sorted_inits); |
c8094d83 | 907 | |
2282d28d | 908 | /* Process the direct bases. */ |
fa743e8c NS |
909 | for (binfo = TYPE_BINFO (t), i = 0; |
910 | BINFO_BASE_ITERATE (binfo, i, base_binfo); ++i) | |
911 | if (!BINFO_VIRTUAL_P (base_binfo)) | |
912 | sorted_inits = tree_cons (base_binfo, NULL_TREE, sorted_inits); | |
913 | ||
2282d28d | 914 | /* Process the non-static data members. */ |
a81072c7 | 915 | sorted_inits = build_field_list (t, sorted_inits, &uses_unions_or_anon_p); |
2282d28d MM |
916 | /* Reverse the entire list of initializations, so that they are in |
917 | the order that they will actually be performed. */ | |
918 | sorted_inits = nreverse (sorted_inits); | |
919 | ||
920 | /* If the user presented the initializers in an order different from | |
921 | that in which they will actually occur, we issue a warning. Keep | |
922 | track of the next subobject which can be explicitly initialized | |
923 | without issuing a warning. */ | |
924 | next_subobject = sorted_inits; | |
925 | ||
926 | /* Go through the explicit initializers, filling in TREE_PURPOSE in | |
927 | the SORTED_INITS. */ | |
928 | for (init = mem_inits; init; init = TREE_CHAIN (init)) | |
929 | { | |
930 | tree subobject; | |
931 | tree subobject_init; | |
932 | ||
933 | subobject = TREE_PURPOSE (init); | |
934 | ||
935 | /* If the explicit initializers are in sorted order, then | |
c8094d83 | 936 | SUBOBJECT will be NEXT_SUBOBJECT, or something following |
2282d28d | 937 | it. */ |
c8094d83 MS |
938 | for (subobject_init = next_subobject; |
939 | subobject_init; | |
2282d28d MM |
940 | subobject_init = TREE_CHAIN (subobject_init)) |
941 | if (TREE_PURPOSE (subobject_init) == subobject) | |
ff9f1a5d MM |
942 | break; |
943 | ||
2282d28d | 944 | /* Issue a warning if the explicit initializer order does not |
2cfe82fe | 945 | match that which will actually occur. |
0cbd7506 | 946 | ??? Are all these on the correct lines? */ |
2282d28d | 947 | if (warn_reorder && !subobject_init) |
ff9f1a5d | 948 | { |
2282d28d | 949 | if (TREE_CODE (TREE_PURPOSE (next_subobject)) == FIELD_DECL) |
af718670 PC |
950 | warning_at (DECL_SOURCE_LOCATION (TREE_PURPOSE (next_subobject)), |
951 | OPT_Wreorder, "%qD will be initialized after", | |
952 | TREE_PURPOSE (next_subobject)); | |
2282d28d | 953 | else |
b323323f | 954 | warning (OPT_Wreorder, "base %qT will be initialized after", |
2282d28d MM |
955 | TREE_PURPOSE (next_subobject)); |
956 | if (TREE_CODE (subobject) == FIELD_DECL) | |
af718670 PC |
957 | warning_at (DECL_SOURCE_LOCATION (subobject), |
958 | OPT_Wreorder, " %q#D", subobject); | |
2282d28d | 959 | else |
b323323f | 960 | warning (OPT_Wreorder, " base %qT", subobject); |
c5d75364 MLI |
961 | warning_at (DECL_SOURCE_LOCATION (current_function_decl), |
962 | OPT_Wreorder, " when initialized here"); | |
ff9f1a5d | 963 | } |
b7484fbe | 964 | |
2282d28d MM |
965 | /* Look again, from the beginning of the list. */ |
966 | if (!subobject_init) | |
ff9f1a5d | 967 | { |
2282d28d MM |
968 | subobject_init = sorted_inits; |
969 | while (TREE_PURPOSE (subobject_init) != subobject) | |
970 | subobject_init = TREE_CHAIN (subobject_init); | |
ff9f1a5d | 971 | } |
c8094d83 | 972 | |
2282d28d MM |
973 | /* It is invalid to initialize the same subobject more than |
974 | once. */ | |
975 | if (TREE_VALUE (subobject_init)) | |
ff9f1a5d | 976 | { |
2282d28d | 977 | if (TREE_CODE (subobject) == FIELD_DECL) |
c5d75364 MLI |
978 | error_at (DECL_SOURCE_LOCATION (current_function_decl), |
979 | "multiple initializations given for %qD", | |
980 | subobject); | |
2282d28d | 981 | else |
c5d75364 MLI |
982 | error_at (DECL_SOURCE_LOCATION (current_function_decl), |
983 | "multiple initializations given for base %qT", | |
984 | subobject); | |
ff9f1a5d MM |
985 | } |
986 | ||
2282d28d MM |
987 | /* Record the initialization. */ |
988 | TREE_VALUE (subobject_init) = TREE_VALUE (init); | |
989 | next_subobject = subobject_init; | |
ff9f1a5d MM |
990 | } |
991 | ||
992 | /* [class.base.init] | |
b7484fbe | 993 | |
ff9f1a5d MM |
994 | If a ctor-initializer specifies more than one mem-initializer for |
995 | multiple members of the same union (including members of | |
57ece258 JM |
996 | anonymous unions), the ctor-initializer is ill-formed. |
997 | ||
998 | Here we also splice out uninitialized union members. */ | |
a81072c7 | 999 | if (uses_unions_or_anon_p) |
ff9f1a5d | 1000 | { |
3a6a88c8 | 1001 | tree *last_p = NULL; |
57ece258 JM |
1002 | tree *p; |
1003 | for (p = &sorted_inits; *p; ) | |
8d08fdba | 1004 | { |
ff9f1a5d | 1005 | tree field; |
535335bf | 1006 | tree ctx; |
ff9f1a5d | 1007 | |
57ece258 JM |
1008 | init = *p; |
1009 | ||
1010 | field = TREE_PURPOSE (init); | |
1011 | ||
1012 | /* Skip base classes. */ | |
1013 | if (TREE_CODE (field) != FIELD_DECL) | |
1014 | goto next; | |
1015 | ||
a81072c7 | 1016 | /* If this is an anonymous aggregate with no explicit initializer, |
57ece258 | 1017 | splice it out. */ |
a81072c7 | 1018 | if (!TREE_VALUE (init) && ANON_AGGR_TYPE_P (TREE_TYPE (field))) |
57ece258 JM |
1019 | goto splice; |
1020 | ||
ff9f1a5d MM |
1021 | /* See if this field is a member of a union, or a member of a |
1022 | structure contained in a union, etc. */ | |
a81072c7 JM |
1023 | ctx = innermost_aggr_scope (field); |
1024 | ||
ff9f1a5d | 1025 | /* If this field is not a member of a union, skip it. */ |
a81072c7 JM |
1026 | if (TREE_CODE (ctx) != UNION_TYPE |
1027 | && !ANON_AGGR_TYPE_P (ctx)) | |
57ece258 JM |
1028 | goto next; |
1029 | ||
3a6a88c8 JM |
1030 | /* If this union member has no explicit initializer and no NSDMI, |
1031 | splice it out. */ | |
1032 | if (TREE_VALUE (init) || DECL_INITIAL (field)) | |
1033 | /* OK. */; | |
1034 | else | |
57ece258 | 1035 | goto splice; |
8d08fdba | 1036 | |
ff9f1a5d MM |
1037 | /* It's only an error if we have two initializers for the same |
1038 | union type. */ | |
3a6a88c8 | 1039 | if (!last_p) |
6bdb8141 | 1040 | { |
3a6a88c8 | 1041 | last_p = p; |
57ece258 | 1042 | goto next; |
6bdb8141 | 1043 | } |
8d08fdba | 1044 | |
ff9f1a5d | 1045 | /* See if LAST_FIELD and the field initialized by INIT are |
a81072c7 JM |
1046 | members of the same union (or the union itself). If so, there's |
1047 | a problem, unless they're actually members of the same structure | |
ff9f1a5d | 1048 | which is itself a member of a union. For example, given: |
8d08fdba | 1049 | |
ff9f1a5d MM |
1050 | union { struct { int i; int j; }; }; |
1051 | ||
1052 | initializing both `i' and `j' makes sense. */ | |
a81072c7 JM |
1053 | ctx = common_enclosing_class |
1054 | (innermost_aggr_scope (field), | |
1055 | innermost_aggr_scope (TREE_PURPOSE (*last_p))); | |
3a6a88c8 | 1056 | |
a81072c7 JM |
1057 | if (ctx && (TREE_CODE (ctx) == UNION_TYPE |
1058 | || ctx == TREE_TYPE (TREE_PURPOSE (*last_p)))) | |
8d08fdba | 1059 | { |
3a6a88c8 JM |
1060 | /* A mem-initializer hides an NSDMI. */ |
1061 | if (TREE_VALUE (init) && !TREE_VALUE (*last_p)) | |
1062 | *last_p = TREE_CHAIN (*last_p); | |
1063 | else if (TREE_VALUE (*last_p) && !TREE_VALUE (init)) | |
1064 | goto splice; | |
1065 | else | |
2ef7251f MP |
1066 | { |
1067 | error_at (DECL_SOURCE_LOCATION (current_function_decl), | |
1068 | "initializations for multiple members of %qT", | |
1069 | ctx); | |
1070 | goto splice; | |
1071 | } | |
8d08fdba | 1072 | } |
ff9f1a5d | 1073 | |
3a6a88c8 | 1074 | last_p = p; |
57ece258 JM |
1075 | |
1076 | next: | |
1077 | p = &TREE_CHAIN (*p); | |
1078 | continue; | |
1079 | splice: | |
1080 | *p = TREE_CHAIN (*p); | |
1081 | continue; | |
b7484fbe MS |
1082 | } |
1083 | } | |
8d08fdba | 1084 | |
2282d28d | 1085 | return sorted_inits; |
b7484fbe MS |
1086 | } |
1087 | ||
2282d28d MM |
1088 | /* Initialize all bases and members of CURRENT_CLASS_TYPE. MEM_INITS |
1089 | is a TREE_LIST giving the explicit mem-initializer-list for the | |
1090 | constructor. The TREE_PURPOSE of each entry is a subobject (a | |
1091 | FIELD_DECL or a BINFO) of the CURRENT_CLASS_TYPE. The TREE_VALUE | |
1092 | is a TREE_LIST giving the arguments to the constructor or | |
1093 | void_type_node for an empty list of arguments. */ | |
a9aedbc2 | 1094 | |
3dbc07b6 | 1095 | void |
2282d28d | 1096 | emit_mem_initializers (tree mem_inits) |
8d08fdba | 1097 | { |
b8bf6ad9 JM |
1098 | int flags = LOOKUP_NORMAL; |
1099 | ||
72e4661a PC |
1100 | /* We will already have issued an error message about the fact that |
1101 | the type is incomplete. */ | |
1102 | if (!COMPLETE_TYPE_P (current_class_type)) | |
1103 | return; | |
c8094d83 | 1104 | |
238e471c VV |
1105 | if (mem_inits |
1106 | && TYPE_P (TREE_PURPOSE (mem_inits)) | |
1107 | && same_type_p (TREE_PURPOSE (mem_inits), current_class_type)) | |
1108 | { | |
1109 | /* Delegating constructor. */ | |
1110 | gcc_assert (TREE_CHAIN (mem_inits) == NULL_TREE); | |
1111 | perform_target_ctor (TREE_VALUE (mem_inits)); | |
1112 | return; | |
1113 | } | |
1114 | ||
85b5d65a JM |
1115 | if (DECL_DEFAULTED_FN (current_function_decl) |
1116 | && ! DECL_INHERITED_CTOR_BASE (current_function_decl)) | |
b8bf6ad9 JM |
1117 | flags |= LOOKUP_DEFAULTED; |
1118 | ||
2282d28d MM |
1119 | /* Sort the mem-initializers into the order in which the |
1120 | initializations should be performed. */ | |
1121 | mem_inits = sort_mem_initializers (current_class_type, mem_inits); | |
8d08fdba | 1122 | |
1f5a253a | 1123 | in_base_initializer = 1; |
c8094d83 | 1124 | |
2282d28d | 1125 | /* Initialize base classes. */ |
3b616f08 PC |
1126 | for (; (mem_inits |
1127 | && TREE_CODE (TREE_PURPOSE (mem_inits)) != FIELD_DECL); | |
1128 | mem_inits = TREE_CHAIN (mem_inits)) | |
8d08fdba | 1129 | { |
2282d28d MM |
1130 | tree subobject = TREE_PURPOSE (mem_inits); |
1131 | tree arguments = TREE_VALUE (mem_inits); | |
1132 | ||
3b616f08 PC |
1133 | /* We already have issued an error message. */ |
1134 | if (arguments == error_mark_node) | |
1135 | continue; | |
1136 | ||
91ea6df3 GDR |
1137 | if (arguments == NULL_TREE) |
1138 | { | |
1139 | /* If these initializations are taking place in a copy constructor, | |
1140 | the base class should probably be explicitly initialized if there | |
1141 | is a user-defined constructor in the base class (other than the | |
1142 | default constructor, which will be called anyway). */ | |
1143 | if (extra_warnings | |
1144 | && DECL_COPY_CONSTRUCTOR_P (current_function_decl) | |
1145 | && type_has_user_nondefault_constructor (BINFO_TYPE (subobject))) | |
1146 | warning_at (DECL_SOURCE_LOCATION (current_function_decl), | |
1147 | OPT_Wextra, "base class %q#T should be explicitly " | |
1148 | "initialized in the copy constructor", | |
1149 | BINFO_TYPE (subobject)); | |
91ea6df3 | 1150 | } |
2282d28d | 1151 | |
2282d28d | 1152 | /* Initialize the base. */ |
809e3e7f | 1153 | if (BINFO_VIRTUAL_P (subobject)) |
2282d28d MM |
1154 | construct_virtual_base (subobject, arguments); |
1155 | else | |
b7484fbe | 1156 | { |
2282d28d | 1157 | tree base_addr; |
c8094d83 | 1158 | |
2282d28d | 1159 | base_addr = build_base_path (PLUS_EXPR, current_class_ptr, |
a271590a | 1160 | subobject, 1, tf_warning_or_error); |
2282d28d | 1161 | expand_aggr_init_1 (subobject, NULL_TREE, |
dd865ef6 | 1162 | cp_build_indirect_ref (base_addr, RO_NULL, |
5ade1ed2 | 1163 | tf_warning_or_error), |
2282d28d | 1164 | arguments, |
b8bf6ad9 | 1165 | flags, |
5ade1ed2 | 1166 | tf_warning_or_error); |
2282d28d | 1167 | expand_cleanup_for_base (subobject, NULL_TREE); |
8d08fdba | 1168 | } |
8d08fdba | 1169 | } |
1f5a253a | 1170 | in_base_initializer = 0; |
8d08fdba | 1171 | |
2282d28d | 1172 | /* Initialize the vptrs. */ |
cf2e003b | 1173 | initialize_vtbl_ptrs (current_class_ptr); |
c8094d83 | 1174 | |
2282d28d MM |
1175 | /* Initialize the data members. */ |
1176 | while (mem_inits) | |
8d08fdba | 1177 | { |
2282d28d MM |
1178 | perform_member_init (TREE_PURPOSE (mem_inits), |
1179 | TREE_VALUE (mem_inits)); | |
1180 | mem_inits = TREE_CHAIN (mem_inits); | |
b7484fbe | 1181 | } |
8d08fdba MS |
1182 | } |
1183 | ||
3ec6bad3 MM |
1184 | /* Returns the address of the vtable (i.e., the value that should be |
1185 | assigned to the vptr) for BINFO. */ | |
1186 | ||
2077db1b | 1187 | tree |
362efdc1 | 1188 | build_vtbl_address (tree binfo) |
3ec6bad3 | 1189 | { |
9965d119 | 1190 | tree binfo_for = binfo; |
3ec6bad3 MM |
1191 | tree vtbl; |
1192 | ||
fc6633e0 | 1193 | if (BINFO_VPTR_INDEX (binfo) && BINFO_VIRTUAL_P (binfo)) |
9965d119 NS |
1194 | /* If this is a virtual primary base, then the vtable we want to store |
1195 | is that for the base this is being used as the primary base of. We | |
1196 | can't simply skip the initialization, because we may be expanding the | |
1197 | inits of a subobject constructor where the virtual base layout | |
1198 | can be different. */ | |
fc6633e0 NS |
1199 | while (BINFO_PRIMARY_P (binfo_for)) |
1200 | binfo_for = BINFO_INHERITANCE_CHAIN (binfo_for); | |
9965d119 | 1201 | |
3ec6bad3 MM |
1202 | /* Figure out what vtable BINFO's vtable is based on, and mark it as |
1203 | used. */ | |
9965d119 | 1204 | vtbl = get_vtbl_decl_for_binfo (binfo_for); |
c3439626 | 1205 | TREE_USED (vtbl) = true; |
3ec6bad3 MM |
1206 | |
1207 | /* Now compute the address to use when initializing the vptr. */ | |
6de9cd9a | 1208 | vtbl = unshare_expr (BINFO_VTABLE (binfo_for)); |
5a6ccc94 | 1209 | if (VAR_P (vtbl)) |
6de9cd9a | 1210 | vtbl = build1 (ADDR_EXPR, build_pointer_type (TREE_TYPE (vtbl)), vtbl); |
3ec6bad3 MM |
1211 | |
1212 | return vtbl; | |
1213 | } | |
1214 | ||
8d08fdba MS |
1215 | /* This code sets up the virtual function tables appropriate for |
1216 | the pointer DECL. It is a one-ply initialization. | |
1217 | ||
1218 | BINFO is the exact type that DECL is supposed to be. In | |
1219 | multiple inheritance, this might mean "C's A" if C : A, B. */ | |
e92cc029 | 1220 | |
8926095f | 1221 | static void |
362efdc1 | 1222 | expand_virtual_init (tree binfo, tree decl) |
8d08fdba | 1223 | { |
8d08fdba | 1224 | tree vtbl, vtbl_ptr; |
3ec6bad3 | 1225 | tree vtt_index; |
8d08fdba | 1226 | |
3ec6bad3 MM |
1227 | /* Compute the initializer for vptr. */ |
1228 | vtbl = build_vtbl_address (binfo); | |
1229 | ||
3461fba7 NS |
1230 | /* We may get this vptr from a VTT, if this is a subobject |
1231 | constructor or subobject destructor. */ | |
3ec6bad3 MM |
1232 | vtt_index = BINFO_VPTR_INDEX (binfo); |
1233 | if (vtt_index) | |
1234 | { | |
1235 | tree vtbl2; | |
1236 | tree vtt_parm; | |
1237 | ||
1238 | /* Compute the value to use, when there's a VTT. */ | |
e0fff4b3 | 1239 | vtt_parm = current_vtt_parm; |
5d49b6a7 | 1240 | vtbl2 = fold_build_pointer_plus (vtt_parm, vtt_index); |
dd865ef6 | 1241 | vtbl2 = cp_build_indirect_ref (vtbl2, RO_NULL, tf_warning_or_error); |
6de9cd9a | 1242 | vtbl2 = convert (TREE_TYPE (vtbl), vtbl2); |
3ec6bad3 MM |
1243 | |
1244 | /* The actual initializer is the VTT value only in the subobject | |
1245 | constructor. In maybe_clone_body we'll substitute NULL for | |
1246 | the vtt_parm in the case of the non-subobject constructor. */ | |
eb0dbdc7 | 1247 | vtbl = build_if_in_charge (vtbl, vtbl2); |
3ec6bad3 | 1248 | } |
70ae3201 MM |
1249 | |
1250 | /* Compute the location of the vtpr. */ | |
dd865ef6 | 1251 | vtbl_ptr = build_vfield_ref (cp_build_indirect_ref (decl, RO_NULL, |
5ade1ed2 | 1252 | tf_warning_or_error), |
338d90b8 | 1253 | TREE_TYPE (binfo)); |
50bc768d | 1254 | gcc_assert (vtbl_ptr != error_mark_node); |
8d08fdba | 1255 | |
70ae3201 | 1256 | /* Assign the vtable to the vptr. */ |
4b978f96 | 1257 | vtbl = convert_force (TREE_TYPE (vtbl_ptr), vtbl, 0, tf_warning_or_error); |
4f2e1536 MP |
1258 | finish_expr_stmt (cp_build_modify_expr (input_location, vtbl_ptr, NOP_EXPR, |
1259 | vtbl, tf_warning_or_error)); | |
8d08fdba MS |
1260 | } |
1261 | ||
f33e32a8 MM |
1262 | /* If an exception is thrown in a constructor, those base classes already |
1263 | constructed must be destroyed. This function creates the cleanup | |
0b8a1e58 | 1264 | for BINFO, which has just been constructed. If FLAG is non-NULL, |
838dfd8a | 1265 | it is a DECL which is nonzero when this base needs to be |
0b8a1e58 | 1266 | destroyed. */ |
f33e32a8 MM |
1267 | |
1268 | static void | |
362efdc1 | 1269 | expand_cleanup_for_base (tree binfo, tree flag) |
f33e32a8 MM |
1270 | { |
1271 | tree expr; | |
1272 | ||
eca7fc57 | 1273 | if (!type_build_dtor_call (BINFO_TYPE (binfo))) |
f33e32a8 MM |
1274 | return; |
1275 | ||
0b8a1e58 | 1276 | /* Call the destructor. */ |
c8094d83 | 1277 | expr = build_special_member_call (current_class_ref, |
4ba126e4 | 1278 | base_dtor_identifier, |
c166b898 | 1279 | NULL, |
4ba126e4 | 1280 | binfo, |
5ade1ed2 DG |
1281 | LOOKUP_NORMAL | LOOKUP_NONVIRTUAL, |
1282 | tf_warning_or_error); | |
eca7fc57 JM |
1283 | |
1284 | if (TYPE_HAS_TRIVIAL_DESTRUCTOR (BINFO_TYPE (binfo))) | |
1285 | return; | |
1286 | ||
0b8a1e58 | 1287 | if (flag) |
db3927fb AH |
1288 | expr = fold_build3_loc (input_location, |
1289 | COND_EXPR, void_type_node, | |
ba47d38d | 1290 | c_common_truthvalue_conversion (input_location, flag), |
7866705a | 1291 | expr, integer_zero_node); |
0b8a1e58 | 1292 | |
659e5a7a | 1293 | finish_eh_cleanup (expr); |
f33e32a8 MM |
1294 | } |
1295 | ||
2282d28d MM |
1296 | /* Construct the virtual base-class VBASE passing the ARGUMENTS to its |
1297 | constructor. */ | |
e92cc029 | 1298 | |
8d08fdba | 1299 | static void |
2282d28d | 1300 | construct_virtual_base (tree vbase, tree arguments) |
8d08fdba | 1301 | { |
2282d28d | 1302 | tree inner_if_stmt; |
2282d28d | 1303 | tree exp; |
c8094d83 | 1304 | tree flag; |
2282d28d MM |
1305 | |
1306 | /* If there are virtual base classes with destructors, we need to | |
1307 | emit cleanups to destroy them if an exception is thrown during | |
1308 | the construction process. These exception regions (i.e., the | |
1309 | period during which the cleanups must occur) begin from the time | |
1310 | the construction is complete to the end of the function. If we | |
1311 | create a conditional block in which to initialize the | |
1312 | base-classes, then the cleanup region for the virtual base begins | |
1313 | inside a block, and ends outside of that block. This situation | |
1314 | confuses the sjlj exception-handling code. Therefore, we do not | |
1315 | create a single conditional block, but one for each | |
1316 | initialization. (That way the cleanup regions always begin | |
3b426391 | 1317 | in the outer block.) We trust the back end to figure out |
2282d28d MM |
1318 | that the FLAG will not change across initializations, and |
1319 | avoid doing multiple tests. */ | |
910ad8de | 1320 | flag = DECL_CHAIN (DECL_ARGUMENTS (current_function_decl)); |
2282d28d MM |
1321 | inner_if_stmt = begin_if_stmt (); |
1322 | finish_if_stmt_cond (flag, inner_if_stmt); | |
2282d28d MM |
1323 | |
1324 | /* Compute the location of the virtual base. If we're | |
1325 | constructing virtual bases, then we must be the most derived | |
1326 | class. Therefore, we don't have to look up the virtual base; | |
1327 | we already know where it is. */ | |
22ed7e5f MM |
1328 | exp = convert_to_base_statically (current_class_ref, vbase); |
1329 | ||
c8094d83 | 1330 | expand_aggr_init_1 (vbase, current_class_ref, exp, arguments, |
4b978f96 | 1331 | 0, tf_warning_or_error); |
2282d28d | 1332 | finish_then_clause (inner_if_stmt); |
325c3691 | 1333 | finish_if_stmt (inner_if_stmt); |
2282d28d MM |
1334 | |
1335 | expand_cleanup_for_base (vbase, flag); | |
8d08fdba MS |
1336 | } |
1337 | ||
2ee887f2 | 1338 | /* Find the context in which this FIELD can be initialized. */ |
e92cc029 | 1339 | |
2ee887f2 | 1340 | static tree |
362efdc1 | 1341 | initializing_context (tree field) |
2ee887f2 MS |
1342 | { |
1343 | tree t = DECL_CONTEXT (field); | |
1344 | ||
1345 | /* Anonymous union members can be initialized in the first enclosing | |
1346 | non-anonymous union context. */ | |
6bdb8141 | 1347 | while (t && ANON_AGGR_TYPE_P (t)) |
2ee887f2 MS |
1348 | t = TYPE_CONTEXT (t); |
1349 | return t; | |
1350 | } | |
1351 | ||
8d08fdba MS |
1352 | /* Function to give error message if member initialization specification |
1353 | is erroneous. FIELD is the member we decided to initialize. | |
1354 | TYPE is the type for which the initialization is being performed. | |
72b7eeff | 1355 | FIELD must be a member of TYPE. |
c8094d83 | 1356 | |
8d08fdba MS |
1357 | MEMBER_NAME is the name of the member. */ |
1358 | ||
1359 | static int | |
362efdc1 | 1360 | member_init_ok_or_else (tree field, tree type, tree member_name) |
8d08fdba MS |
1361 | { |
1362 | if (field == error_mark_node) | |
1363 | return 0; | |
a723baf1 | 1364 | if (!field) |
8d08fdba | 1365 | { |
15a7ee29 | 1366 | error ("class %qT does not have any field named %qD", type, |
a723baf1 | 1367 | member_name); |
8d08fdba MS |
1368 | return 0; |
1369 | } | |
5a6ccc94 | 1370 | if (VAR_P (field)) |
b7484fbe | 1371 | { |
15a7ee29 | 1372 | error ("%q#D is a static data member; it can only be " |
a723baf1 MM |
1373 | "initialized at its definition", |
1374 | field); | |
1375 | return 0; | |
1376 | } | |
1377 | if (TREE_CODE (field) != FIELD_DECL) | |
1378 | { | |
15a7ee29 | 1379 | error ("%q#D is not a non-static data member of %qT", |
a723baf1 MM |
1380 | field, type); |
1381 | return 0; | |
1382 | } | |
1383 | if (initializing_context (field) != type) | |
1384 | { | |
15a7ee29 | 1385 | error ("class %qT does not have any field named %qD", type, |
a723baf1 | 1386 | member_name); |
b7484fbe MS |
1387 | return 0; |
1388 | } | |
1389 | ||
8d08fdba MS |
1390 | return 1; |
1391 | } | |
1392 | ||
2282d28d MM |
1393 | /* NAME is a FIELD_DECL, an IDENTIFIER_NODE which names a field, or it |
1394 | is a _TYPE node or TYPE_DECL which names a base for that type. | |
1f5a253a NS |
1395 | Check the validity of NAME, and return either the base _TYPE, base |
1396 | binfo, or the FIELD_DECL of the member. If NAME is invalid, return | |
2282d28d | 1397 | NULL_TREE and issue a diagnostic. |
8d08fdba | 1398 | |
36a68fe7 NS |
1399 | An old style unnamed direct single base construction is permitted, |
1400 | where NAME is NULL. */ | |
8d08fdba | 1401 | |
fd74ca0b | 1402 | tree |
1f5a253a | 1403 | expand_member_init (tree name) |
8d08fdba | 1404 | { |
2282d28d MM |
1405 | tree basetype; |
1406 | tree field; | |
8d08fdba | 1407 | |
2282d28d | 1408 | if (!current_class_ref) |
fd74ca0b | 1409 | return NULL_TREE; |
8d08fdba | 1410 | |
36a68fe7 | 1411 | if (!name) |
90418208 | 1412 | { |
36a68fe7 NS |
1413 | /* This is an obsolete unnamed base class initializer. The |
1414 | parser will already have warned about its use. */ | |
604a3205 | 1415 | switch (BINFO_N_BASE_BINFOS (TYPE_BINFO (current_class_type))) |
36a68fe7 NS |
1416 | { |
1417 | case 0: | |
15a7ee29 | 1418 | error ("unnamed initializer for %qT, which has no base classes", |
2282d28d | 1419 | current_class_type); |
36a68fe7 NS |
1420 | return NULL_TREE; |
1421 | case 1: | |
604a3205 NS |
1422 | basetype = BINFO_TYPE |
1423 | (BINFO_BASE_BINFO (TYPE_BINFO (current_class_type), 0)); | |
36a68fe7 NS |
1424 | break; |
1425 | default: | |
15a7ee29 | 1426 | error ("unnamed initializer for %qT, which uses multiple inheritance", |
2282d28d | 1427 | current_class_type); |
36a68fe7 NS |
1428 | return NULL_TREE; |
1429 | } | |
90418208 | 1430 | } |
36a68fe7 | 1431 | else if (TYPE_P (name)) |
be99da77 | 1432 | { |
a82d6da5 | 1433 | basetype = TYPE_MAIN_VARIANT (name); |
36a68fe7 | 1434 | name = TYPE_NAME (name); |
be99da77 | 1435 | } |
36a68fe7 NS |
1436 | else if (TREE_CODE (name) == TYPE_DECL) |
1437 | basetype = TYPE_MAIN_VARIANT (TREE_TYPE (name)); | |
2282d28d MM |
1438 | else |
1439 | basetype = NULL_TREE; | |
8d08fdba | 1440 | |
36a68fe7 | 1441 | if (basetype) |
41efda8f | 1442 | { |
d9148cf4 MM |
1443 | tree class_binfo; |
1444 | tree direct_binfo; | |
1445 | tree virtual_binfo; | |
1446 | int i; | |
2282d28d | 1447 | |
5cd5a78c JM |
1448 | if (current_template_parms |
1449 | || same_type_p (basetype, current_class_type)) | |
238e471c | 1450 | return basetype; |
2282d28d | 1451 | |
d9148cf4 MM |
1452 | class_binfo = TYPE_BINFO (current_class_type); |
1453 | direct_binfo = NULL_TREE; | |
1454 | virtual_binfo = NULL_TREE; | |
1455 | ||
1456 | /* Look for a direct base. */ | |
fa743e8c | 1457 | for (i = 0; BINFO_BASE_ITERATE (class_binfo, i, direct_binfo); ++i) |
539ed333 | 1458 | if (SAME_BINFO_TYPE_P (BINFO_TYPE (direct_binfo), basetype)) |
fa743e8c NS |
1459 | break; |
1460 | ||
d9148cf4 MM |
1461 | /* Look for a virtual base -- unless the direct base is itself |
1462 | virtual. */ | |
809e3e7f | 1463 | if (!direct_binfo || !BINFO_VIRTUAL_P (direct_binfo)) |
58c42dc2 | 1464 | virtual_binfo = binfo_for_vbase (basetype, current_class_type); |
d9148cf4 MM |
1465 | |
1466 | /* [class.base.init] | |
c8094d83 | 1467 | |
0cbd7506 | 1468 | If a mem-initializer-id is ambiguous because it designates |
d9148cf4 MM |
1469 | both a direct non-virtual base class and an inherited virtual |
1470 | base class, the mem-initializer is ill-formed. */ | |
1471 | if (direct_binfo && virtual_binfo) | |
1472 | { | |
15a7ee29 | 1473 | error ("%qD is both a direct base and an indirect virtual base", |
d9148cf4 MM |
1474 | basetype); |
1475 | return NULL_TREE; | |
1476 | } | |
1477 | ||
1478 | if (!direct_binfo && !virtual_binfo) | |
8d08fdba | 1479 | { |
5775a06a | 1480 | if (CLASSTYPE_VBASECLASSES (current_class_type)) |
c3115fd2 MM |
1481 | error ("type %qT is not a direct or virtual base of %qT", |
1482 | basetype, current_class_type); | |
41efda8f | 1483 | else |
c3115fd2 MM |
1484 | error ("type %qT is not a direct base of %qT", |
1485 | basetype, current_class_type); | |
fd74ca0b | 1486 | return NULL_TREE; |
41efda8f | 1487 | } |
d9148cf4 MM |
1488 | |
1489 | return direct_binfo ? direct_binfo : virtual_binfo; | |
41efda8f MM |
1490 | } |
1491 | else | |
1492 | { | |
9dc6f476 | 1493 | if (identifier_p (name)) |
86ac0575 | 1494 | field = lookup_field (current_class_type, name, 1, false); |
2282d28d MM |
1495 | else |
1496 | field = name; | |
8d08fdba | 1497 | |
2282d28d | 1498 | if (member_init_ok_or_else (field, current_class_type, name)) |
1f5a253a | 1499 | return field; |
41efda8f | 1500 | } |
fd74ca0b | 1501 | |
2282d28d | 1502 | return NULL_TREE; |
8d08fdba MS |
1503 | } |
1504 | ||
1505 | /* This is like `expand_member_init', only it stores one aggregate | |
1506 | value into another. | |
1507 | ||
1508 | INIT comes in two flavors: it is either a value which | |
1509 | is to be stored in EXP, or it is a parameter list | |
1510 | to go to a constructor, which will operate on EXP. | |
f30432d7 MS |
1511 | If INIT is not a parameter list for a constructor, then set |
1512 | LOOKUP_ONLYCONVERTING. | |
6060a796 MS |
1513 | If FLAGS is LOOKUP_ONLYCONVERTING then it is the = init form of |
1514 | the initializer, if FLAGS is 0, then it is the (init) form. | |
8d08fdba | 1515 | If `init' is a CONSTRUCTOR, then we emit a warning message, |
59be0cdd | 1516 | explaining that such initializations are invalid. |
8d08fdba | 1517 | |
8d08fdba MS |
1518 | If INIT resolves to a CALL_EXPR which happens to return |
1519 | something of the type we are looking for, then we know | |
1520 | that we can safely use that call to perform the | |
1521 | initialization. | |
1522 | ||
1523 | The virtual function table pointer cannot be set up here, because | |
1524 | we do not really know its type. | |
1525 | ||
8d08fdba MS |
1526 | This never calls operator=(). |
1527 | ||
1528 | When initializing, nothing is CONST. | |
1529 | ||
1530 | A default copy constructor may have to be used to perform the | |
1531 | initialization. | |
1532 | ||
1533 | A constructor or a conversion operator may have to be used to | |
e92cc029 | 1534 | perform the initialization, but not both, as it would be ambiguous. */ |
8d08fdba | 1535 | |
f1dedc31 | 1536 | tree |
5ade1ed2 | 1537 | build_aggr_init (tree exp, tree init, int flags, tsubst_flags_t complain) |
8d08fdba | 1538 | { |
f1dedc31 MM |
1539 | tree stmt_expr; |
1540 | tree compound_stmt; | |
1541 | int destroy_temps; | |
8d08fdba MS |
1542 | tree type = TREE_TYPE (exp); |
1543 | int was_const = TREE_READONLY (exp); | |
f30432d7 | 1544 | int was_volatile = TREE_THIS_VOLATILE (exp); |
2a3398e1 | 1545 | int is_global; |
8d08fdba MS |
1546 | |
1547 | if (init == error_mark_node) | |
f1dedc31 | 1548 | return error_mark_node; |
8d08fdba MS |
1549 | |
1550 | TREE_READONLY (exp) = 0; | |
f30432d7 MS |
1551 | TREE_THIS_VOLATILE (exp) = 0; |
1552 | ||
1ca66f7e PC |
1553 | if (init && init != void_type_node |
1554 | && TREE_CODE (init) != TREE_LIST | |
e08cc018 JM |
1555 | && !(TREE_CODE (init) == TARGET_EXPR |
1556 | && TARGET_EXPR_DIRECT_INIT_P (init)) | |
014397c2 | 1557 | && !DIRECT_LIST_INIT_P (init)) |
f30432d7 | 1558 | flags |= LOOKUP_ONLYCONVERTING; |
8d08fdba MS |
1559 | |
1560 | if (TREE_CODE (type) == ARRAY_TYPE) | |
1561 | { | |
671cb993 MM |
1562 | tree itype; |
1563 | ||
92a62aad MM |
1564 | /* An array may not be initialized use the parenthesized |
1565 | initialization form -- unless the initializer is "()". */ | |
1566 | if (init && TREE_CODE (init) == TREE_LIST) | |
8d08fdba | 1567 | { |
5ade1ed2 DG |
1568 | if (complain & tf_error) |
1569 | error ("bad array initializer"); | |
f1dedc31 | 1570 | return error_mark_node; |
8d08fdba | 1571 | } |
92a62aad MM |
1572 | /* Must arrange to initialize each element of EXP |
1573 | from elements of INIT. */ | |
671cb993 | 1574 | itype = init ? TREE_TYPE (init) : NULL_TREE; |
36c37128 JM |
1575 | if (cv_qualified_p (type)) |
1576 | TREE_TYPE (exp) = cv_unqualified (type); | |
1577 | if (itype && cv_qualified_p (itype)) | |
1578 | TREE_TYPE (init) = cv_unqualified (itype); | |
a48cccea | 1579 | stmt_expr = build_vec_init (exp, NULL_TREE, init, |
844ae01d | 1580 | /*explicit_value_init_p=*/false, |
36c37128 | 1581 | itype && same_type_p (TREE_TYPE (init), |
5ade1ed2 DG |
1582 | TREE_TYPE (exp)), |
1583 | complain); | |
8d08fdba | 1584 | TREE_READONLY (exp) = was_const; |
f30432d7 | 1585 | TREE_THIS_VOLATILE (exp) = was_volatile; |
8d08fdba | 1586 | TREE_TYPE (exp) = type; |
a47c2f62 JM |
1587 | /* Restore the type of init unless it was used directly. */ |
1588 | if (init && TREE_CODE (stmt_expr) != INIT_EXPR) | |
f376e137 | 1589 | TREE_TYPE (init) = itype; |
f1dedc31 | 1590 | return stmt_expr; |
8d08fdba MS |
1591 | } |
1592 | ||
2a99e5e6 LL |
1593 | if ((VAR_P (exp) || TREE_CODE (exp) == PARM_DECL) |
1594 | && !lookup_attribute ("warn_unused", TYPE_ATTRIBUTES (type))) | |
f4f206f4 | 1595 | /* Just know that we've seen something for this node. */ |
8d08fdba MS |
1596 | TREE_USED (exp) = 1; |
1597 | ||
2a3398e1 | 1598 | is_global = begin_init_stmts (&stmt_expr, &compound_stmt); |
f2c5f623 | 1599 | destroy_temps = stmts_are_full_exprs_p (); |
ae499cce | 1600 | current_stmt_tree ()->stmts_are_full_exprs_p = 0; |
8d08fdba | 1601 | expand_aggr_init_1 (TYPE_BINFO (type), exp, exp, |
5ade1ed2 | 1602 | init, LOOKUP_NORMAL|flags, complain); |
2a3398e1 | 1603 | stmt_expr = finish_init_stmts (is_global, stmt_expr, compound_stmt); |
ae499cce | 1604 | current_stmt_tree ()->stmts_are_full_exprs_p = destroy_temps; |
8d08fdba | 1605 | TREE_READONLY (exp) = was_const; |
f30432d7 | 1606 | TREE_THIS_VOLATILE (exp) = was_volatile; |
f1dedc31 MM |
1607 | |
1608 | return stmt_expr; | |
8d08fdba MS |
1609 | } |
1610 | ||
1611 | static void | |
5ade1ed2 DG |
1612 | expand_default_init (tree binfo, tree true_exp, tree exp, tree init, int flags, |
1613 | tsubst_flags_t complain) | |
8d08fdba | 1614 | { |
fc378698 | 1615 | tree type = TREE_TYPE (exp); |
9eb71d8c | 1616 | tree ctor_name; |
fc378698 | 1617 | |
8d08fdba MS |
1618 | /* It fails because there may not be a constructor which takes |
1619 | its own type as the first (or only parameter), but which does | |
1620 | take other types via a conversion. So, if the thing initializing | |
1621 | the expression is a unit element of type X, first try X(X&), | |
1622 | followed by initialization by X. If neither of these work | |
1623 | out, then look hard. */ | |
1624 | tree rval; | |
9771b263 | 1625 | vec<tree, va_gc> *parms; |
8d08fdba | 1626 | |
2061820e JM |
1627 | /* If we have direct-initialization from an initializer list, pull |
1628 | it out of the TREE_LIST so the code below can see it. */ | |
1629 | if (init && TREE_CODE (init) == TREE_LIST | |
014397c2 | 1630 | && DIRECT_LIST_INIT_P (TREE_VALUE (init))) |
2061820e JM |
1631 | { |
1632 | gcc_checking_assert ((flags & LOOKUP_ONLYCONVERTING) == 0 | |
1633 | && TREE_CHAIN (init) == NULL_TREE); | |
1634 | init = TREE_VALUE (init); | |
f0516ca4 JJ |
1635 | /* Only call reshape_init if it has not been called earlier |
1636 | by the callers. */ | |
1637 | if (BRACE_ENCLOSED_INITIALIZER_P (init) && CP_AGGREGATE_TYPE_P (type)) | |
1638 | init = reshape_init (type, init, complain); | |
2061820e JM |
1639 | } |
1640 | ||
4c9b3895 JM |
1641 | if (init && BRACE_ENCLOSED_INITIALIZER_P (init) |
1642 | && CP_AGGREGATE_TYPE_P (type)) | |
e08cc018 JM |
1643 | /* A brace-enclosed initializer for an aggregate. In C++0x this can |
1644 | happen for direct-initialization, too. */ | |
f0516ca4 | 1645 | init = digest_init (type, init, complain); |
e08cc018 JM |
1646 | |
1647 | /* A CONSTRUCTOR of the target's type is a previously digested | |
1648 | initializer, whether that happened just above or in | |
1649 | cp_parser_late_parsing_nsdmi. | |
1650 | ||
1651 | A TARGET_EXPR with TARGET_EXPR_DIRECT_INIT_P or TARGET_EXPR_LIST_INIT_P | |
1652 | set represents the whole initialization, so we shouldn't build up | |
1653 | another ctor call. */ | |
1654 | if (init | |
1655 | && (TREE_CODE (init) == CONSTRUCTOR | |
1656 | || (TREE_CODE (init) == TARGET_EXPR | |
1657 | && (TARGET_EXPR_DIRECT_INIT_P (init) | |
1658 | || TARGET_EXPR_LIST_INIT_P (init)))) | |
1659 | && same_type_ignoring_top_level_qualifiers_p (TREE_TYPE (init), type)) | |
4c9b3895 | 1660 | { |
e08cc018 JM |
1661 | /* Early initialization via a TARGET_EXPR only works for |
1662 | complete objects. */ | |
1663 | gcc_assert (TREE_CODE (init) == CONSTRUCTOR || true_exp == exp); | |
1664 | ||
4c9b3895 JM |
1665 | init = build2 (INIT_EXPR, TREE_TYPE (exp), exp, init); |
1666 | TREE_SIDE_EFFECTS (init) = 1; | |
1667 | finish_expr_stmt (init); | |
1668 | return; | |
1669 | } | |
1670 | ||
277294d7 | 1671 | if (init && TREE_CODE (init) != TREE_LIST |
faf5394a MS |
1672 | && (flags & LOOKUP_ONLYCONVERTING)) |
1673 | { | |
1674 | /* Base subobjects should only get direct-initialization. */ | |
8dc2b103 | 1675 | gcc_assert (true_exp == exp); |
faf5394a | 1676 | |
c37dc68e JM |
1677 | if (flags & DIRECT_BIND) |
1678 | /* Do nothing. We hit this in two cases: Reference initialization, | |
1679 | where we aren't initializing a real variable, so we don't want | |
1680 | to run a new constructor; and catching an exception, where we | |
1681 | have already built up the constructor call so we could wrap it | |
1682 | in an exception region. */; | |
1683 | else | |
4b978f96 PC |
1684 | init = ocp_convert (type, init, CONV_IMPLICIT|CONV_FORCE_TEMP, |
1685 | flags, complain); | |
faf5394a | 1686 | |
4e8dca1c JM |
1687 | if (TREE_CODE (init) == MUST_NOT_THROW_EXPR) |
1688 | /* We need to protect the initialization of a catch parm with a | |
1689 | call to terminate(), which shows up as a MUST_NOT_THROW_EXPR | |
c7ae64f2 | 1690 | around the TARGET_EXPR for the copy constructor. See |
4e8dca1c JM |
1691 | initialize_handler_parm. */ |
1692 | { | |
f293ce4b RS |
1693 | TREE_OPERAND (init, 0) = build2 (INIT_EXPR, TREE_TYPE (exp), exp, |
1694 | TREE_OPERAND (init, 0)); | |
4e8dca1c JM |
1695 | TREE_TYPE (init) = void_type_node; |
1696 | } | |
c7ae64f2 | 1697 | else |
f293ce4b | 1698 | init = build2 (INIT_EXPR, TREE_TYPE (exp), exp, init); |
c7ae64f2 | 1699 | TREE_SIDE_EFFECTS (init) = 1; |
f1dedc31 | 1700 | finish_expr_stmt (init); |
faf5394a MS |
1701 | return; |
1702 | } | |
1703 | ||
c166b898 ILT |
1704 | if (init == NULL_TREE) |
1705 | parms = NULL; | |
1706 | else if (TREE_CODE (init) == TREE_LIST && !TREE_TYPE (init)) | |
8d08fdba | 1707 | { |
c166b898 ILT |
1708 | parms = make_tree_vector (); |
1709 | for (; init != NULL_TREE; init = TREE_CHAIN (init)) | |
9771b263 | 1710 | vec_safe_push (parms, TREE_VALUE (init)); |
8d08fdba | 1711 | } |
8d08fdba | 1712 | else |
c166b898 | 1713 | parms = make_tree_vector_single (init); |
8d08fdba | 1714 | |
238e471c VV |
1715 | if (exp == current_class_ref && current_function_decl |
1716 | && DECL_HAS_IN_CHARGE_PARM_P (current_function_decl)) | |
1717 | { | |
1718 | /* Delegating constructor. */ | |
1719 | tree complete; | |
1720 | tree base; | |
c4ce224c JM |
1721 | tree elt; unsigned i; |
1722 | ||
1723 | /* Unshare the arguments for the second call. */ | |
9771b263 DN |
1724 | vec<tree, va_gc> *parms2 = make_tree_vector (); |
1725 | FOR_EACH_VEC_SAFE_ELT (parms, i, elt) | |
c4ce224c JM |
1726 | { |
1727 | elt = break_out_target_exprs (elt); | |
9771b263 | 1728 | vec_safe_push (parms2, elt); |
c4ce224c | 1729 | } |
238e471c | 1730 | complete = build_special_member_call (exp, complete_ctor_identifier, |
c4ce224c JM |
1731 | &parms2, binfo, flags, |
1732 | complain); | |
1733 | complete = fold_build_cleanup_point_expr (void_type_node, complete); | |
1734 | release_tree_vector (parms2); | |
1735 | ||
238e471c VV |
1736 | base = build_special_member_call (exp, base_ctor_identifier, |
1737 | &parms, binfo, flags, | |
1738 | complain); | |
c4ce224c | 1739 | base = fold_build_cleanup_point_expr (void_type_node, base); |
eb0dbdc7 | 1740 | rval = build_if_in_charge (complete, base); |
238e471c VV |
1741 | } |
1742 | else | |
1743 | { | |
1744 | if (true_exp == exp) | |
1745 | ctor_name = complete_ctor_identifier; | |
1746 | else | |
1747 | ctor_name = base_ctor_identifier; | |
1748 | rval = build_special_member_call (exp, ctor_name, &parms, binfo, flags, | |
1749 | complain); | |
1750 | } | |
c166b898 ILT |
1751 | |
1752 | if (parms != NULL) | |
1753 | release_tree_vector (parms); | |
1754 | ||
fa2200cb JM |
1755 | if (exp == true_exp && TREE_CODE (rval) == CALL_EXPR) |
1756 | { | |
1757 | tree fn = get_callee_fndecl (rval); | |
a76c13bf | 1758 | if (fn && DECL_DECLARED_CONSTEXPR_P (fn)) |
fa2200cb | 1759 | { |
3e605b20 | 1760 | tree e = maybe_constant_init (rval, exp); |
fa2200cb JM |
1761 | if (TREE_CONSTANT (e)) |
1762 | rval = build2 (INIT_EXPR, type, exp, e); | |
1763 | } | |
1764 | } | |
1765 | ||
1766 | /* FIXME put back convert_to_void? */ | |
25eb19ff | 1767 | if (TREE_SIDE_EFFECTS (rval)) |
fa2200cb | 1768 | finish_expr_stmt (rval); |
8d08fdba MS |
1769 | } |
1770 | ||
1771 | /* This function is responsible for initializing EXP with INIT | |
1772 | (if any). | |
1773 | ||
1774 | BINFO is the binfo of the type for who we are performing the | |
1775 | initialization. For example, if W is a virtual base class of A and B, | |
1776 | and C : A, B. | |
1777 | If we are initializing B, then W must contain B's W vtable, whereas | |
1778 | were we initializing C, W must contain C's W vtable. | |
1779 | ||
1780 | TRUE_EXP is nonzero if it is the true expression being initialized. | |
1781 | In this case, it may be EXP, or may just contain EXP. The reason we | |
1782 | need this is because if EXP is a base element of TRUE_EXP, we | |
1783 | don't necessarily know by looking at EXP where its virtual | |
1784 | baseclass fields should really be pointing. But we do know | |
1785 | from TRUE_EXP. In constructors, we don't know anything about | |
1786 | the value being initialized. | |
1787 | ||
9f880ef9 MM |
1788 | FLAGS is just passed to `build_new_method_call'. See that function |
1789 | for its description. */ | |
8d08fdba MS |
1790 | |
1791 | static void | |
5ade1ed2 DG |
1792 | expand_aggr_init_1 (tree binfo, tree true_exp, tree exp, tree init, int flags, |
1793 | tsubst_flags_t complain) | |
8d08fdba MS |
1794 | { |
1795 | tree type = TREE_TYPE (exp); | |
8d08fdba | 1796 | |
50bc768d | 1797 | gcc_assert (init != error_mark_node && type != error_mark_node); |
38e01f9e | 1798 | gcc_assert (building_stmt_list_p ()); |
8d08fdba MS |
1799 | |
1800 | /* Use a function returning the desired type to initialize EXP for us. | |
1801 | If the function is a constructor, and its first argument is | |
1802 | NULL_TREE, know that it was meant for us--just slide exp on | |
1803 | in and expand the constructor. Constructors now come | |
1804 | as TARGET_EXPRs. */ | |
faf5394a | 1805 | |
5a6ccc94 | 1806 | if (init && VAR_P (exp) |
3b2db49f | 1807 | && COMPOUND_LITERAL_P (init)) |
faf5394a | 1808 | { |
9771b263 | 1809 | vec<tree, va_gc> *cleanups = NULL; |
f1dedc31 | 1810 | /* If store_init_value returns NULL_TREE, the INIT has been |
3b2db49f | 1811 | recorded as the DECL_INITIAL for EXP. That means there's |
f1dedc31 | 1812 | nothing more we have to do. */ |
b25dd954 | 1813 | init = store_init_value (exp, init, &cleanups, flags); |
25ebb82a RH |
1814 | if (init) |
1815 | finish_expr_stmt (init); | |
b25dd954 | 1816 | gcc_assert (!cleanups); |
faf5394a MS |
1817 | return; |
1818 | } | |
1819 | ||
f388b7be | 1820 | /* List-initialization from {} becomes value-initialization for non-aggregate |
49b5925f JM |
1821 | classes with default constructors. Handle this here when we're |
1822 | initializing a base, so protected access works. */ | |
1823 | if (exp != true_exp && init && TREE_CODE (init) == TREE_LIST) | |
f388b7be JM |
1824 | { |
1825 | tree elt = TREE_VALUE (init); | |
1826 | if (DIRECT_LIST_INIT_P (elt) | |
1827 | && CONSTRUCTOR_ELTS (elt) == 0 | |
1828 | && CLASSTYPE_NON_AGGREGATE (type) | |
1829 | && TYPE_HAS_DEFAULT_CONSTRUCTOR (type)) | |
1830 | init = void_type_node; | |
1831 | } | |
1832 | ||
fd97a96a JM |
1833 | /* If an explicit -- but empty -- initializer list was present, |
1834 | that's value-initialization. */ | |
1835 | if (init == void_type_node) | |
1836 | { | |
c2b3ec18 JM |
1837 | /* If the type has data but no user-provided ctor, we need to zero |
1838 | out the object. */ | |
1839 | if (!type_has_user_provided_constructor (type) | |
1840 | && !is_really_empty_class (type)) | |
fd97a96a | 1841 | { |
1fb0b801 JM |
1842 | tree field_size = NULL_TREE; |
1843 | if (exp != true_exp && CLASSTYPE_AS_BASE (type) != type) | |
1844 | /* Don't clobber already initialized virtual bases. */ | |
1845 | field_size = TYPE_SIZE (CLASSTYPE_AS_BASE (type)); | |
1846 | init = build_zero_init_1 (type, NULL_TREE, /*static_storage_p=*/false, | |
1847 | field_size); | |
fd97a96a JM |
1848 | init = build2 (INIT_EXPR, type, exp, init); |
1849 | finish_expr_stmt (init); | |
fd97a96a | 1850 | } |
1fb0b801 | 1851 | |
fd97a96a | 1852 | /* If we don't need to mess with the constructor at all, |
1fb0b801 JM |
1853 | then we're done. */ |
1854 | if (! type_build_ctor_call (type)) | |
1855 | return; | |
1856 | ||
1857 | /* Otherwise fall through and call the constructor. */ | |
fd97a96a JM |
1858 | init = NULL_TREE; |
1859 | } | |
1860 | ||
9e9ff709 MS |
1861 | /* We know that expand_default_init can handle everything we want |
1862 | at this point. */ | |
5ade1ed2 | 1863 | expand_default_init (binfo, true_exp, exp, init, flags, complain); |
8d08fdba MS |
1864 | } |
1865 | ||
9e1e64ec | 1866 | /* Report an error if TYPE is not a user-defined, class type. If |
be99da77 | 1867 | OR_ELSE is nonzero, give an error message. */ |
e92cc029 | 1868 | |
be99da77 | 1869 | int |
9e1e64ec | 1870 | is_class_type (tree type, int or_else) |
be99da77 MS |
1871 | { |
1872 | if (type == error_mark_node) | |
1873 | return 0; | |
1874 | ||
9e1e64ec | 1875 | if (! CLASS_TYPE_P (type)) |
be99da77 MS |
1876 | { |
1877 | if (or_else) | |
9e1e64ec | 1878 | error ("%qT is not a class type", type); |
be99da77 MS |
1879 | return 0; |
1880 | } | |
1881 | return 1; | |
1882 | } | |
1883 | ||
8d08fdba | 1884 | tree |
362efdc1 | 1885 | get_type_value (tree name) |
8d08fdba | 1886 | { |
8d08fdba MS |
1887 | if (name == error_mark_node) |
1888 | return NULL_TREE; | |
1889 | ||
1890 | if (IDENTIFIER_HAS_TYPE_VALUE (name)) | |
1891 | return IDENTIFIER_TYPE_VALUE (name); | |
8d08fdba MS |
1892 | else |
1893 | return NULL_TREE; | |
1894 | } | |
051e6fd7 | 1895 | |
a5ac359a MM |
1896 | /* Build a reference to a member of an aggregate. This is not a C++ |
1897 | `&', but really something which can have its address taken, and | |
1898 | then act as a pointer to member, for example TYPE :: FIELD can have | |
1899 | its address taken by saying & TYPE :: FIELD. ADDRESS_P is true if | |
1900 | this expression is the operand of "&". | |
8d08fdba MS |
1901 | |
1902 | @@ Prints out lousy diagnostics for operator <typename> | |
1903 | @@ fields. | |
1904 | ||
51c184be | 1905 | @@ This function should be rewritten and placed in search.c. */ |
e92cc029 | 1906 | |
8d08fdba | 1907 | tree |
a378996b PC |
1908 | build_offset_ref (tree type, tree member, bool address_p, |
1909 | tsubst_flags_t complain) | |
8d08fdba | 1910 | { |
8d245821 | 1911 | tree decl; |
fc378698 | 1912 | tree basebinfo = NULL_TREE; |
8d08fdba | 1913 | |
5f311aec | 1914 | /* class templates can come in as TEMPLATE_DECLs here. */ |
d4f0f205 MM |
1915 | if (TREE_CODE (member) == TEMPLATE_DECL) |
1916 | return member; | |
93cdc044 | 1917 | |
627bc938 JM |
1918 | if (dependent_scope_p (type) || type_dependent_expression_p (member)) |
1919 | return build_qualified_name (NULL_TREE, type, member, | |
2d660b7f | 1920 | /*template_p=*/false); |
5566b478 | 1921 | |
d4f0f205 | 1922 | gcc_assert (TYPE_P (type)); |
9e1e64ec | 1923 | if (! is_class_type (type, 1)) |
c833d2be NS |
1924 | return error_mark_node; |
1925 | ||
d4f0f205 MM |
1926 | gcc_assert (DECL_P (member) || BASELINK_P (member)); |
1927 | /* Callers should call mark_used before this point. */ | |
3146f36f | 1928 | gcc_assert (!DECL_P (member) || TREE_USED (member)); |
be99da77 | 1929 | |
627bc938 | 1930 | type = TYPE_MAIN_VARIANT (type); |
01628e54 | 1931 | if (!COMPLETE_OR_OPEN_TYPE_P (complete_type (type))) |
8d08fdba | 1932 | { |
a378996b PC |
1933 | if (complain & tf_error) |
1934 | error ("incomplete type %qT does not have member %qD", type, member); | |
a5ac359a MM |
1935 | return error_mark_node; |
1936 | } | |
1937 | ||
d4f0f205 | 1938 | /* Entities other than non-static members need no further |
3db45ab5 | 1939 | processing. */ |
a5ac359a | 1940 | if (TREE_CODE (member) == TYPE_DECL) |
d4f0f205 | 1941 | return member; |
5a6ccc94 | 1942 | if (VAR_P (member) || TREE_CODE (member) == CONST_DECL) |
d4f0f205 | 1943 | return convert_from_reference (member); |
a5ac359a MM |
1944 | |
1945 | if (TREE_CODE (member) == FIELD_DECL && DECL_C_BIT_FIELD (member)) | |
1946 | { | |
a378996b PC |
1947 | if (complain & tf_error) |
1948 | error ("invalid pointer to bit-field %qD", member); | |
a5ac359a MM |
1949 | return error_mark_node; |
1950 | } | |
1951 | ||
d4f0f205 MM |
1952 | /* Set up BASEBINFO for member lookup. */ |
1953 | decl = maybe_dummy_object (type, &basebinfo); | |
1954 | ||
aa52c1ff | 1955 | /* A lot of this logic is now handled in lookup_member. */ |
a5ac359a | 1956 | if (BASELINK_P (member)) |
8d08fdba | 1957 | { |
8d08fdba | 1958 | /* Go from the TREE_BASELINK to the member function info. */ |
7304fcb4 | 1959 | tree t = BASELINK_FUNCTIONS (member); |
8d08fdba | 1960 | |
50ad9642 | 1961 | if (TREE_CODE (t) != TEMPLATE_ID_EXPR && !really_overloaded_fn (t)) |
8d08fdba | 1962 | { |
f4f206f4 | 1963 | /* Get rid of a potential OVERLOAD around it. */ |
2c73f9f5 ML |
1964 | t = OVL_CURRENT (t); |
1965 | ||
b54f5338 KL |
1966 | /* Unique functions are handled easily. */ |
1967 | ||
1968 | /* For non-static member of base class, we need a special rule | |
1969 | for access checking [class.protected]: | |
1970 | ||
1971 | If the access is to form a pointer to member, the | |
1972 | nested-name-specifier shall name the derived class | |
1973 | (or any class derived from that class). */ | |
1974 | if (address_p && DECL_P (t) | |
1975 | && DECL_NONSTATIC_MEMBER_P (t)) | |
0e69fdf0 | 1976 | perform_or_defer_access_check (TYPE_BINFO (type), t, t, |
a378996b | 1977 | complain); |
b54f5338 | 1978 | else |
0e69fdf0 | 1979 | perform_or_defer_access_check (basebinfo, t, t, |
a378996b | 1980 | complain); |
b54f5338 | 1981 | |
848b92e1 JM |
1982 | if (DECL_STATIC_FUNCTION_P (t)) |
1983 | return t; | |
a5ac359a MM |
1984 | member = t; |
1985 | } | |
1986 | else | |
7304fcb4 | 1987 | TREE_TYPE (member) = unknown_type_node; |
8d08fdba | 1988 | } |
b54f5338 KL |
1989 | else if (address_p && TREE_CODE (member) == FIELD_DECL) |
1990 | /* We need additional test besides the one in | |
1991 | check_accessibility_of_qualified_id in case it is | |
1992 | a pointer to non-static member. */ | |
0e69fdf0 | 1993 | perform_or_defer_access_check (TYPE_BINFO (type), member, member, |
a378996b | 1994 | complain); |
8d08fdba | 1995 | |
a5ac359a | 1996 | if (!address_p) |
8d08fdba | 1997 | { |
a5ac359a MM |
1998 | /* If MEMBER is non-static, then the program has fallen afoul of |
1999 | [expr.prim]: | |
8d08fdba | 2000 | |
a5ac359a MM |
2001 | An id-expression that denotes a nonstatic data member or |
2002 | nonstatic member function of a class can only be used: | |
8d08fdba | 2003 | |
a5ac359a MM |
2004 | -- as part of a class member access (_expr.ref_) in which the |
2005 | object-expression refers to the member's class or a class | |
2006 | derived from that class, or | |
b7484fbe | 2007 | |
a5ac359a MM |
2008 | -- to form a pointer to member (_expr.unary.op_), or |
2009 | ||
2010 | -- in the body of a nonstatic member function of that class or | |
2011 | of a class derived from that class (_class.mfct.nonstatic_), or | |
2012 | ||
2013 | -- in a mem-initializer for a constructor for that class or for | |
2014 | a class derived from that class (_class.base.init_). */ | |
2015 | if (DECL_NONSTATIC_MEMBER_FUNCTION_P (member)) | |
2016 | { | |
39a13be5 | 2017 | /* Build a representation of the qualified name suitable |
e9525111 MM |
2018 | for use as the operand to "&" -- even though the "&" is |
2019 | not actually present. */ | |
f293ce4b | 2020 | member = build2 (OFFSET_REF, TREE_TYPE (member), decl, member); |
a5ac359a MM |
2021 | /* In Microsoft mode, treat a non-static member function as if |
2022 | it were a pointer-to-member. */ | |
2023 | if (flag_ms_extensions) | |
2024 | { | |
a5ac359a | 2025 | PTRMEM_OK_P (member) = 1; |
a378996b | 2026 | return cp_build_addr_expr (member, complain); |
a5ac359a | 2027 | } |
a378996b PC |
2028 | if (complain & tf_error) |
2029 | error ("invalid use of non-static member function %qD", | |
2030 | TREE_OPERAND (member, 1)); | |
07471dfb | 2031 | return error_mark_node; |
a5ac359a MM |
2032 | } |
2033 | else if (TREE_CODE (member) == FIELD_DECL) | |
2034 | { | |
a378996b PC |
2035 | if (complain & tf_error) |
2036 | error ("invalid use of non-static data member %qD", member); | |
a5ac359a MM |
2037 | return error_mark_node; |
2038 | } | |
2039 | return member; | |
2040 | } | |
8d08fdba | 2041 | |
f293ce4b | 2042 | member = build2 (OFFSET_REF, TREE_TYPE (member), decl, member); |
8d245821 MM |
2043 | PTRMEM_OK_P (member) = 1; |
2044 | return member; | |
8d08fdba MS |
2045 | } |
2046 | ||
393e756d MM |
2047 | /* If DECL is a scalar enumeration constant or variable with a |
2048 | constant initializer, return the initializer (or, its initializers, | |
69eb4fde JM |
2049 | recursively); otherwise, return DECL. If STRICT_P, the |
2050 | initializer is only returned if DECL is a | |
90454da1 PC |
2051 | constant-expression. If RETURN_AGGREGATE_CST_OK_P, it is ok to |
2052 | return an aggregate constant. */ | |
8d08fdba | 2053 | |
393e756d | 2054 | static tree |
69eb4fde | 2055 | constant_value_1 (tree decl, bool strict_p, bool return_aggregate_cst_ok_p) |
8d08fdba | 2056 | { |
f513e31f | 2057 | while (TREE_CODE (decl) == CONST_DECL |
69eb4fde | 2058 | || (strict_p |
fa2200cb | 2059 | ? decl_constant_var_p (decl) |
5a6ccc94 | 2060 | : (VAR_P (decl) |
393e756d | 2061 | && CP_TYPE_CONST_NON_VOLATILE_P (TREE_TYPE (decl))))) |
b794e321 MM |
2062 | { |
2063 | tree init; | |
fa2200cb JM |
2064 | /* If DECL is a static data member in a template |
2065 | specialization, we must instantiate it here. The | |
2066 | initializer for the static data member is not processed | |
2067 | until needed; we need it now. */ | |
fd5c817a | 2068 | mark_used (decl, tf_none); |
fa2200cb JM |
2069 | mark_rvalue_use (decl); |
2070 | init = DECL_INITIAL (decl); | |
d174af6c | 2071 | if (init == error_mark_node) |
88274c4d JM |
2072 | { |
2073 | if (DECL_INITIALIZED_BY_CONSTANT_EXPRESSION_P (decl)) | |
2074 | /* Treat the error as a constant to avoid cascading errors on | |
2075 | excessively recursive template instantiation (c++/9335). */ | |
2076 | return init; | |
2077 | else | |
2078 | return decl; | |
2079 | } | |
73ce7fcb JJ |
2080 | /* Initializers in templates are generally expanded during |
2081 | instantiation, so before that for const int i(2) | |
2082 | INIT is a TREE_LIST with the actual initializer as | |
2083 | TREE_VALUE. */ | |
2084 | if (processing_template_decl | |
2085 | && init | |
2086 | && TREE_CODE (init) == TREE_LIST | |
2087 | && TREE_CHAIN (init) == NULL_TREE) | |
2088 | init = TREE_VALUE (init); | |
d1dfa20d JM |
2089 | /* Instantiate a non-dependent initializer for user variables. We |
2090 | mustn't do this for the temporary for an array compound literal; | |
2091 | trying to instatiate the initializer will keep creating new | |
2092 | temporaries until we crash. Probably it's not useful to do it for | |
2093 | other artificial variables, either. */ | |
2094 | if (!DECL_ARTIFICIAL (decl)) | |
2095 | init = instantiate_non_dependent_or_null (init); | |
d174af6c | 2096 | if (!init |
b794e321 | 2097 | || !TREE_TYPE (init) |
8152661b | 2098 | || !TREE_CONSTANT (init) |
69eb4fde | 2099 | || (!return_aggregate_cst_ok_p |
90454da1 PC |
2100 | /* Unless RETURN_AGGREGATE_CST_OK_P is true, do not |
2101 | return an aggregate constant (of which string | |
2102 | literals are a special case), as we do not want | |
2103 | to make inadvertent copies of such entities, and | |
2104 | we must be sure that their addresses are the | |
2105 | same everywhere. */ | |
8152661b JM |
2106 | && (TREE_CODE (init) == CONSTRUCTOR |
2107 | || TREE_CODE (init) == STRING_CST))) | |
b794e321 | 2108 | break; |
62f9ab0d JM |
2109 | /* Don't return a CONSTRUCTOR for a variable with partial run-time |
2110 | initialization, since it doesn't represent the entire value. */ | |
2111 | if (TREE_CODE (init) == CONSTRUCTOR | |
2112 | && !DECL_INITIALIZED_BY_CONSTANT_EXPRESSION_P (decl)) | |
2113 | break; | |
57b37fe3 | 2114 | decl = unshare_expr (init); |
b794e321 | 2115 | } |
8a784e4a NS |
2116 | return decl; |
2117 | } | |
a1652802 | 2118 | |
69eb4fde JM |
2119 | /* If DECL is a CONST_DECL, or a constant VAR_DECL initialized by constant |
2120 | of integral or enumeration type, or a constexpr variable of scalar type, | |
2121 | then return that value. These are those variables permitted in constant | |
2122 | expressions by [5.19/1]. */ | |
a1652802 | 2123 | |
8a784e4a | 2124 | tree |
69eb4fde | 2125 | scalar_constant_value (tree decl) |
8a784e4a | 2126 | { |
69eb4fde | 2127 | return constant_value_1 (decl, /*strict_p=*/true, |
90454da1 | 2128 | /*return_aggregate_cst_ok_p=*/false); |
393e756d | 2129 | } |
c8094d83 | 2130 | |
69eb4fde | 2131 | /* Like scalar_constant_value, but can also return aggregate initializers. */ |
393e756d MM |
2132 | |
2133 | tree | |
69eb4fde | 2134 | decl_really_constant_value (tree decl) |
393e756d | 2135 | { |
69eb4fde | 2136 | return constant_value_1 (decl, /*strict_p=*/true, |
90454da1 PC |
2137 | /*return_aggregate_cst_ok_p=*/true); |
2138 | } | |
2139 | ||
69eb4fde JM |
2140 | /* A more relaxed version of scalar_constant_value, used by the |
2141 | common C/C++ code. */ | |
90454da1 PC |
2142 | |
2143 | tree | |
69eb4fde | 2144 | decl_constant_value (tree decl) |
90454da1 | 2145 | { |
69eb4fde JM |
2146 | return constant_value_1 (decl, /*strict_p=*/processing_template_decl, |
2147 | /*return_aggregate_cst_ok_p=*/true); | |
8d08fdba MS |
2148 | } |
2149 | \f | |
8d08fdba | 2150 | /* Common subroutines of build_new and build_vec_delete. */ |
8d08fdba | 2151 | \f |
63c9a190 MM |
2152 | /* Build and return a NEW_EXPR. If NELTS is non-NULL, TYPE[NELTS] is |
2153 | the type of the object being allocated; otherwise, it's just TYPE. | |
2154 | INIT is the initializer, if any. USE_GLOBAL_NEW is true if the | |
2155 | user explicitly wrote "::operator new". PLACEMENT, if non-NULL, is | |
c166b898 ILT |
2156 | a vector of arguments to be provided as arguments to a placement |
2157 | new operator. This routine performs no semantic checks; it just | |
2158 | creates and returns a NEW_EXPR. */ | |
a0d5fba7 | 2159 | |
63c9a190 | 2160 | static tree |
9771b263 DN |
2161 | build_raw_new_expr (vec<tree, va_gc> *placement, tree type, tree nelts, |
2162 | vec<tree, va_gc> *init, int use_global_new) | |
743f140d | 2163 | { |
c166b898 | 2164 | tree init_list; |
63c9a190 | 2165 | tree new_expr; |
3db45ab5 | 2166 | |
c166b898 ILT |
2167 | /* If INIT is NULL, the we want to store NULL_TREE in the NEW_EXPR. |
2168 | If INIT is not NULL, then we want to store VOID_ZERO_NODE. This | |
2169 | permits us to distinguish the case of a missing initializer "new | |
2170 | int" from an empty initializer "new int()". */ | |
2171 | if (init == NULL) | |
2172 | init_list = NULL_TREE; | |
9771b263 | 2173 | else if (init->is_empty ()) |
632f2871 | 2174 | init_list = void_node; |
c166b898 ILT |
2175 | else |
2176 | init_list = build_tree_list_vec (init); | |
2177 | ||
2178 | new_expr = build4 (NEW_EXPR, build_pointer_type (type), | |
2179 | build_tree_list_vec (placement), type, nelts, | |
2180 | init_list); | |
63c9a190 MM |
2181 | NEW_EXPR_USE_GLOBAL (new_expr) = use_global_new; |
2182 | TREE_SIDE_EFFECTS (new_expr) = 1; | |
2183 | ||
2184 | return new_expr; | |
743f140d PB |
2185 | } |
2186 | ||
9d809e8f FC |
2187 | /* Diagnose uninitialized const members or reference members of type |
2188 | TYPE. USING_NEW is used to disambiguate the diagnostic between a | |
40bb78ad FC |
2189 | new expression without a new-initializer and a declaration. Returns |
2190 | the error count. */ | |
9d809e8f | 2191 | |
40bb78ad | 2192 | static int |
9d809e8f | 2193 | diagnose_uninitialized_cst_or_ref_member_1 (tree type, tree origin, |
40bb78ad | 2194 | bool using_new, bool complain) |
9d809e8f FC |
2195 | { |
2196 | tree field; | |
40bb78ad | 2197 | int error_count = 0; |
9d809e8f | 2198 | |
10ab8f62 | 2199 | if (type_has_user_provided_constructor (type)) |
40bb78ad | 2200 | return 0; |
10ab8f62 | 2201 | |
910ad8de | 2202 | for (field = TYPE_FIELDS (type); field; field = DECL_CHAIN (field)) |
9d809e8f FC |
2203 | { |
2204 | tree field_type; | |
2205 | ||
2206 | if (TREE_CODE (field) != FIELD_DECL) | |
2207 | continue; | |
2208 | ||
2209 | field_type = strip_array_types (TREE_TYPE (field)); | |
2210 | ||
1c682d06 FC |
2211 | if (type_has_user_provided_constructor (field_type)) |
2212 | continue; | |
2213 | ||
9d809e8f FC |
2214 | if (TREE_CODE (field_type) == REFERENCE_TYPE) |
2215 | { | |
40bb78ad FC |
2216 | ++ error_count; |
2217 | if (complain) | |
2218 | { | |
0e02d8e3 PC |
2219 | if (DECL_CONTEXT (field) == origin) |
2220 | { | |
2221 | if (using_new) | |
2222 | error ("uninitialized reference member in %q#T " | |
2223 | "using %<new%> without new-initializer", origin); | |
2224 | else | |
2225 | error ("uninitialized reference member in %q#T", origin); | |
2226 | } | |
40bb78ad | 2227 | else |
0e02d8e3 PC |
2228 | { |
2229 | if (using_new) | |
2230 | error ("uninitialized reference member in base %q#T " | |
2231 | "of %q#T using %<new%> without new-initializer", | |
2232 | DECL_CONTEXT (field), origin); | |
2233 | else | |
2234 | error ("uninitialized reference member in base %q#T " | |
2235 | "of %q#T", DECL_CONTEXT (field), origin); | |
2236 | } | |
40bb78ad | 2237 | inform (DECL_SOURCE_LOCATION (field), |
816551fe | 2238 | "%q#D should be initialized", field); |
40bb78ad | 2239 | } |
9d809e8f FC |
2240 | } |
2241 | ||
2242 | if (CP_TYPE_CONST_P (field_type)) | |
2243 | { | |
40bb78ad FC |
2244 | ++ error_count; |
2245 | if (complain) | |
2246 | { | |
0e02d8e3 PC |
2247 | if (DECL_CONTEXT (field) == origin) |
2248 | { | |
2249 | if (using_new) | |
2250 | error ("uninitialized const member in %q#T " | |
2251 | "using %<new%> without new-initializer", origin); | |
2252 | else | |
2253 | error ("uninitialized const member in %q#T", origin); | |
2254 | } | |
40bb78ad | 2255 | else |
0e02d8e3 PC |
2256 | { |
2257 | if (using_new) | |
2258 | error ("uninitialized const member in base %q#T " | |
2259 | "of %q#T using %<new%> without new-initializer", | |
2260 | DECL_CONTEXT (field), origin); | |
2261 | else | |
2262 | error ("uninitialized const member in base %q#T " | |
2263 | "of %q#T", DECL_CONTEXT (field), origin); | |
2264 | } | |
40bb78ad | 2265 | inform (DECL_SOURCE_LOCATION (field), |
816551fe | 2266 | "%q#D should be initialized", field); |
40bb78ad | 2267 | } |
9d809e8f FC |
2268 | } |
2269 | ||
2270 | if (CLASS_TYPE_P (field_type)) | |
40bb78ad FC |
2271 | error_count |
2272 | += diagnose_uninitialized_cst_or_ref_member_1 (field_type, origin, | |
2273 | using_new, complain); | |
9d809e8f | 2274 | } |
40bb78ad | 2275 | return error_count; |
9d809e8f FC |
2276 | } |
2277 | ||
40bb78ad FC |
2278 | int |
2279 | diagnose_uninitialized_cst_or_ref_member (tree type, bool using_new, bool complain) | |
9d809e8f | 2280 | { |
40bb78ad | 2281 | return diagnose_uninitialized_cst_or_ref_member_1 (type, type, using_new, complain); |
9d809e8f FC |
2282 | } |
2283 | ||
7d5e76c8 JM |
2284 | /* Call __cxa_bad_array_new_length to indicate that the size calculation |
2285 | overflowed. Pretend it returns sizetype so that it plays nicely in the | |
2286 | COND_EXPR. */ | |
2287 | ||
2288 | tree | |
2289 | throw_bad_array_new_length (void) | |
2290 | { | |
2291 | tree fn = get_identifier ("__cxa_throw_bad_array_new_length"); | |
2292 | if (!get_global_value_if_present (fn, &fn)) | |
2293 | fn = push_throw_library_fn (fn, build_function_type_list (sizetype, | |
2294 | NULL_TREE)); | |
2295 | ||
2296 | return build_cxx_call (fn, 0, NULL, tf_warning_or_error); | |
2297 | } | |
2298 | ||
46cb9332 MS |
2299 | /* Attempt to find the initializer for field T in the initializer INIT, |
2300 | when non-null. Returns the initializer when successful and NULL | |
2301 | otherwise. */ | |
2302 | static tree | |
2303 | find_field_init (tree t, tree init) | |
2304 | { | |
2305 | if (!init) | |
2306 | return NULL_TREE; | |
2307 | ||
2308 | unsigned HOST_WIDE_INT idx; | |
2309 | tree field, elt; | |
2310 | ||
2311 | /* Iterate over all top-level initializer elements. */ | |
2312 | FOR_EACH_CONSTRUCTOR_ELT (CONSTRUCTOR_ELTS (init), idx, field, elt) | |
2313 | { | |
2314 | /* If the member T is found, return it. */ | |
2315 | if (field == t) | |
2316 | return elt; | |
2317 | ||
2318 | /* Otherwise continue and/or recurse into nested initializers. */ | |
2319 | if (TREE_CODE (elt) == CONSTRUCTOR | |
2320 | && (init = find_field_init (t, elt))) | |
2321 | return init; | |
2322 | } | |
2323 | return NULL_TREE; | |
2324 | } | |
2325 | ||
e2f5cc96 MS |
2326 | /* Attempt to verify that the argument, OPER, of a placement new expression |
2327 | refers to an object sufficiently large for an object of TYPE or an array | |
2328 | of NELTS of such objects when NELTS is non-null, and issue a warning when | |
2329 | it does not. SIZE specifies the size needed to construct the object or | |
2330 | array and captures the result of NELTS * sizeof (TYPE). (SIZE could be | |
2331 | greater when the array under construction requires a cookie to store | |
2332 | NELTS. GCC's placement new expression stores the cookie when invoking | |
2333 | a user-defined placement new operator function but not the default one. | |
2334 | Placement new expressions with user-defined placement new operator are | |
2335 | not diagnosed since we don't know how they use the buffer (this could | |
2336 | be a future extension). */ | |
2337 | static void | |
2338 | warn_placement_new_too_small (tree type, tree nelts, tree size, tree oper) | |
2339 | { | |
2340 | location_t loc = EXPR_LOC_OR_LOC (oper, input_location); | |
2341 | ||
2342 | /* The number of bytes to add to or subtract from the size of the provided | |
2343 | buffer based on an offset into an array or an array element reference. | |
2344 | Although intermediate results may be negative (as in a[3] - 2) the final | |
2345 | result cannot be. */ | |
2346 | HOST_WIDE_INT adjust = 0; | |
2347 | /* True when the size of the entire destination object should be used | |
2348 | to compute the possibly optimistic estimate of the available space. */ | |
2349 | bool use_obj_size = false; | |
2350 | /* True when the reference to the destination buffer is an ADDR_EXPR. */ | |
2351 | bool addr_expr = false; | |
2352 | ||
2353 | STRIP_NOPS (oper); | |
2354 | ||
2355 | /* Using a function argument or a (non-array) variable as an argument | |
2356 | to placement new is not checked since it's unknown what it might | |
2357 | point to. */ | |
2358 | if (TREE_CODE (oper) == PARM_DECL | |
2359 | || TREE_CODE (oper) == VAR_DECL | |
2360 | || TREE_CODE (oper) == COMPONENT_REF) | |
2361 | return; | |
2362 | ||
2363 | /* Evaluate any constant expressions. */ | |
2364 | size = fold_non_dependent_expr (size); | |
2365 | ||
2366 | /* Handle the common case of array + offset expression when the offset | |
2367 | is a constant. */ | |
2368 | if (TREE_CODE (oper) == POINTER_PLUS_EXPR) | |
2369 | { | |
2370 | /* If the offset is comple-time constant, use it to compute a more | |
eb11eb15 MS |
2371 | accurate estimate of the size of the buffer. Since the operand |
2372 | of POINTER_PLUS_EXPR is represented as an unsigned type, convert | |
2373 | it to signed first. | |
2374 | Otherwise, use the size of the entire array as an optimistic | |
2375 | estimate (this may lead to false negatives). */ | |
2376 | tree adj = TREE_OPERAND (oper, 1); | |
e2f5cc96 | 2377 | if (CONSTANT_CLASS_P (adj)) |
eb11eb15 | 2378 | adjust += tree_to_shwi (convert (ssizetype, adj)); |
e2f5cc96 MS |
2379 | else |
2380 | use_obj_size = true; | |
2381 | ||
2382 | oper = TREE_OPERAND (oper, 0); | |
2383 | ||
2384 | STRIP_NOPS (oper); | |
2385 | } | |
2386 | ||
2387 | if (TREE_CODE (oper) == TARGET_EXPR) | |
2388 | oper = TREE_OPERAND (oper, 1); | |
2389 | else if (TREE_CODE (oper) == ADDR_EXPR) | |
2390 | { | |
2391 | addr_expr = true; | |
2392 | oper = TREE_OPERAND (oper, 0); | |
2393 | } | |
2394 | ||
2395 | STRIP_NOPS (oper); | |
2396 | ||
265149a6 MS |
2397 | if (TREE_CODE (oper) == ARRAY_REF |
2398 | && (addr_expr || TREE_CODE (TREE_TYPE (oper)) == ARRAY_TYPE)) | |
e2f5cc96 MS |
2399 | { |
2400 | /* Similar to the offset computed above, see if the array index | |
2401 | is a compile-time constant. If so, and unless the offset was | |
2402 | not a compile-time constant, use the index to determine the | |
2403 | size of the buffer. Otherwise, use the entire array as | |
2404 | an optimistic estimate of the size. */ | |
2405 | const_tree adj = TREE_OPERAND (oper, 1); | |
2406 | if (!use_obj_size && CONSTANT_CLASS_P (adj)) | |
2407 | adjust += tree_to_shwi (adj); | |
2408 | else | |
2409 | { | |
2410 | use_obj_size = true; | |
2411 | adjust = 0; | |
2412 | } | |
2413 | ||
2414 | oper = TREE_OPERAND (oper, 0); | |
2415 | } | |
2416 | ||
46cb9332 MS |
2417 | /* Refers to the declared object that constains the subobject referenced |
2418 | by OPER. When the object is initialized, makes it possible to determine | |
2419 | the actual size of a flexible array member used as the buffer passed | |
2420 | as OPER to placement new. */ | |
2421 | tree var_decl = NULL_TREE; | |
2422 | /* True when operand is a COMPONENT_REF, to distinguish flexible array | |
2423 | members from arrays of unspecified size. */ | |
2424 | bool compref = TREE_CODE (oper) == COMPONENT_REF; | |
2425 | ||
e2f5cc96 | 2426 | /* Descend into a struct or union to find the member whose address |
265149a6 MS |
2427 | is being used as the argument. */ |
2428 | if (TREE_CODE (oper) == COMPONENT_REF) | |
46cb9332 MS |
2429 | { |
2430 | tree op0 = oper; | |
2431 | while (TREE_CODE (op0 = TREE_OPERAND (op0, 0)) == COMPONENT_REF); | |
2432 | if (TREE_CODE (op0) == VAR_DECL) | |
2433 | var_decl = op0; | |
2434 | oper = TREE_OPERAND (oper, 1); | |
2435 | } | |
e2f5cc96 MS |
2436 | |
2437 | if ((addr_expr || !POINTER_TYPE_P (TREE_TYPE (oper))) | |
2438 | && (TREE_CODE (oper) == VAR_DECL | |
2439 | || TREE_CODE (oper) == FIELD_DECL | |
2440 | || TREE_CODE (oper) == PARM_DECL)) | |
2441 | { | |
2442 | /* A possibly optimistic estimate of the number of bytes available | |
2443 | in the destination buffer. */ | |
46cb9332 | 2444 | unsigned HOST_WIDE_INT bytes_avail = 0; |
e2f5cc96 MS |
2445 | /* True when the estimate above is in fact the exact size |
2446 | of the destination buffer rather than an estimate. */ | |
2447 | bool exact_size = true; | |
2448 | ||
2449 | /* Treat members of unions and members of structs uniformly, even | |
2450 | though the size of a member of a union may be viewed as extending | |
2451 | to the end of the union itself (it is by __builtin_object_size). */ | |
906f9ad9 | 2452 | if ((TREE_CODE (oper) == VAR_DECL || use_obj_size) |
0f875435 JJ |
2453 | && DECL_SIZE_UNIT (oper) |
2454 | && tree_fits_uhwi_p (DECL_SIZE_UNIT (oper))) | |
e2f5cc96 MS |
2455 | { |
2456 | /* Use the size of the entire array object when the expression | |
2457 | refers to a variable or its size depends on an expression | |
2458 | that's not a compile-time constant. */ | |
906f9ad9 | 2459 | bytes_avail = tree_to_uhwi (DECL_SIZE_UNIT (oper)); |
e2f5cc96 MS |
2460 | exact_size = !use_obj_size; |
2461 | } | |
0f875435 JJ |
2462 | else if (TYPE_SIZE_UNIT (TREE_TYPE (oper)) |
2463 | && tree_fits_uhwi_p (TYPE_SIZE_UNIT (TREE_TYPE (oper)))) | |
e2f5cc96 MS |
2464 | { |
2465 | /* Use the size of the type of the destination buffer object | |
2466 | as the optimistic estimate of the available space in it. */ | |
2467 | bytes_avail = tree_to_uhwi (TYPE_SIZE_UNIT (TREE_TYPE (oper))); | |
2468 | } | |
46cb9332 MS |
2469 | else if (var_decl) |
2470 | { | |
2471 | /* Constructing into a buffer provided by the flexible array | |
2472 | member of a declared object (which is permitted as a G++ | |
2473 | extension). If the array member has been initialized, | |
2474 | determine its size from the initializer. Otherwise, | |
2475 | the array size is zero. */ | |
2476 | bytes_avail = 0; | |
2477 | ||
2478 | if (tree init = find_field_init (oper, DECL_INITIAL (var_decl))) | |
2479 | bytes_avail = tree_to_uhwi (TYPE_SIZE_UNIT (TREE_TYPE (init))); | |
2480 | } | |
906f9ad9 MS |
2481 | else |
2482 | { | |
2483 | /* Bail if neither the size of the object nor its type is known. */ | |
2484 | return; | |
2485 | } | |
e2f5cc96 | 2486 | |
46cb9332 | 2487 | tree_code oper_code = TREE_CODE (TREE_TYPE (oper)); |
e2f5cc96 | 2488 | |
46cb9332 MS |
2489 | if (compref && oper_code == ARRAY_TYPE) |
2490 | { | |
2491 | /* Avoid diagnosing flexible array members (which are accepted | |
2492 | as an extension and diagnosed with -Wpedantic) and zero-length | |
2493 | arrays (also an extension). | |
2494 | Overflowing construction in one-element arrays is diagnosed | |
2495 | only at level 2. */ | |
2496 | if (bytes_avail == 0 && !var_decl) | |
2497 | return; | |
2498 | ||
2499 | tree nelts = array_type_nelts_top (TREE_TYPE (oper)); | |
2500 | tree nelts_cst = maybe_constant_value (nelts); | |
2501 | if (TREE_CODE (nelts_cst) == INTEGER_CST | |
2502 | && integer_onep (nelts_cst) | |
2503 | && !var_decl | |
2504 | && warn_placement_new < 2) | |
2505 | return; | |
2506 | } | |
2507 | ||
e2f5cc96 MS |
2508 | /* The size of the buffer can only be adjusted down but not up. */ |
2509 | gcc_checking_assert (0 <= adjust); | |
2510 | ||
2511 | /* Reduce the size of the buffer by the adjustment computed above | |
2512 | from the offset and/or the index into the array. */ | |
2513 | if (bytes_avail < static_cast<unsigned HOST_WIDE_INT>(adjust)) | |
2514 | bytes_avail = 0; | |
2515 | else | |
2516 | bytes_avail -= adjust; | |
2517 | ||
2518 | /* The minimum amount of space needed for the allocation. This | |
2519 | is an optimistic estimate that makes it possible to detect | |
2520 | placement new invocation for some undersize buffers but not | |
2521 | others. */ | |
2522 | unsigned HOST_WIDE_INT bytes_need; | |
2523 | ||
2524 | if (CONSTANT_CLASS_P (size)) | |
2525 | bytes_need = tree_to_uhwi (size); | |
2526 | else if (nelts && CONSTANT_CLASS_P (nelts)) | |
2527 | bytes_need = tree_to_uhwi (nelts) | |
2528 | * tree_to_uhwi (TYPE_SIZE_UNIT (type)); | |
2529 | else | |
2530 | bytes_need = tree_to_uhwi (TYPE_SIZE_UNIT (type)); | |
2531 | ||
2532 | if (bytes_avail < bytes_need) | |
2533 | { | |
2534 | if (nelts) | |
2535 | if (CONSTANT_CLASS_P (nelts)) | |
46cb9332 | 2536 | warning_at (loc, OPT_Wplacement_new_, |
e2f5cc96 MS |
2537 | exact_size ? |
2538 | "placement new constructing an object of type " | |
2539 | "%<%T [%wu]%> and size %qwu in a region of type %qT " | |
2540 | "and size %qwi" | |
2541 | : "placement new constructing an object of type " | |
c047b694 | 2542 | "%<%T [%wu]%> and size %qwu in a region of type %qT " |
e2f5cc96 MS |
2543 | "and size at most %qwu", |
2544 | type, tree_to_uhwi (nelts), bytes_need, | |
2545 | TREE_TYPE (oper), | |
2546 | bytes_avail); | |
2547 | else | |
46cb9332 | 2548 | warning_at (loc, OPT_Wplacement_new_, |
e2f5cc96 MS |
2549 | exact_size ? |
2550 | "placement new constructing an array of objects " | |
2551 | "of type %qT and size %qwu in a region of type %qT " | |
2552 | "and size %qwi" | |
2553 | : "placement new constructing an array of objects " | |
2554 | "of type %qT and size %qwu in a region of type %qT " | |
2555 | "and size at most %qwu", | |
2556 | type, bytes_need, TREE_TYPE (oper), | |
2557 | bytes_avail); | |
2558 | else | |
46cb9332 | 2559 | warning_at (loc, OPT_Wplacement_new_, |
e2f5cc96 MS |
2560 | exact_size ? |
2561 | "placement new constructing an object of type %qT " | |
2562 | "and size %qwu in a region of type %qT and size %qwi" | |
2563 | : "placement new constructing an object of type %qT" | |
2564 | "and size %qwu in a region of type %qT and size " | |
2565 | "at most %qwu", | |
2566 | type, bytes_need, TREE_TYPE (oper), | |
2567 | bytes_avail); | |
2568 | } | |
2569 | } | |
2570 | } | |
2571 | ||
af63ba4b JM |
2572 | /* True if alignof(T) > __STDCPP_DEFAULT_NEW_ALIGNMENT__. */ |
2573 | ||
2574 | bool | |
2575 | type_has_new_extended_alignment (tree t) | |
2576 | { | |
2577 | return (aligned_new_threshhold | |
2578 | && TYPE_ALIGN_UNIT (t) > (unsigned)aligned_new_threshhold); | |
2579 | } | |
2580 | ||
63c9a190 MM |
2581 | /* Generate code for a new-expression, including calling the "operator |
2582 | new" function, initializing the object, and, if an exception occurs | |
2583 | during construction, cleaning up. The arguments are as for | |
685c8340 MS |
2584 | build_raw_new_expr. This may change PLACEMENT and INIT. |
2585 | TYPE is the type of the object being constructed, possibly an array | |
2586 | of NELTS elements when NELTS is non-null (in "new T[NELTS]", T may | |
2587 | be an array of the form U[inner], with the whole expression being | |
2588 | "new U[NELTS][inner]"). */ | |
a0d5fba7 | 2589 | |
834c6dff | 2590 | static tree |
9771b263 DN |
2591 | build_new_1 (vec<tree, va_gc> **placement, tree type, tree nelts, |
2592 | vec<tree, va_gc> **init, bool globally_qualified_p, | |
c166b898 | 2593 | tsubst_flags_t complain) |
a0d5fba7 | 2594 | { |
d746e87d MM |
2595 | tree size, rval; |
2596 | /* True iff this is a call to "operator new[]" instead of just | |
c8094d83 | 2597 | "operator new". */ |
d746e87d | 2598 | bool array_p = false; |
9207099b JM |
2599 | /* If ARRAY_P is true, the element type of the array. This is never |
2600 | an ARRAY_TYPE; for something like "new int[3][4]", the | |
d746e87d | 2601 | ELT_TYPE is "int". If ARRAY_P is false, this is the same type as |
9207099b | 2602 | TYPE. */ |
d746e87d | 2603 | tree elt_type; |
f4f4610e MM |
2604 | /* The type of the new-expression. (This type is always a pointer |
2605 | type.) */ | |
2606 | tree pointer_type; | |
25357d1e | 2607 | tree non_const_pointer_type; |
685c8340 | 2608 | /* The most significant array bound in int[OUTER_NELTS][inner]. */ |
a48cccea | 2609 | tree outer_nelts = NULL_TREE; |
685c8340 MS |
2610 | /* For arrays with a non-constant number of elements, a bounds checks |
2611 | on the NELTS parameter to avoid integer overflow at runtime. */ | |
4a84253c | 2612 | tree outer_nelts_check = NULL_TREE; |
4ebc46e9 | 2613 | bool outer_nelts_from_type = false; |
685c8340 | 2614 | /* Number of the "inner" elements in "new T[OUTER_NELTS][inner]". */ |
807e902e | 2615 | offset_int inner_nelts_count = 1; |
f4f4610e | 2616 | tree alloc_call, alloc_expr; |
685c8340 | 2617 | /* Size of the inner array elements (those with constant dimensions). */ |
807e902e | 2618 | offset_int inner_size; |
f4f4610e MM |
2619 | /* The address returned by the call to "operator new". This node is |
2620 | a VAR_DECL and is therefore reusable. */ | |
2621 | tree alloc_node; | |
46ff5047 | 2622 | tree alloc_fn; |
8b5e2ce4 | 2623 | tree cookie_expr, init_expr; |
089d6ea7 | 2624 | int nothrow, check_new; |
743f140d | 2625 | int use_java_new = 0; |
834c6dff MM |
2626 | /* If non-NULL, the number of extra bytes to allocate at the |
2627 | beginning of the storage allocated for an array-new expression in | |
2628 | order to store the number of elements. */ | |
2629 | tree cookie_size = NULL_TREE; | |
c166b898 | 2630 | tree placement_first; |
a9de800a | 2631 | tree placement_expr = NULL_TREE; |
3f41ffd8 MM |
2632 | /* True if the function we are calling is a placement allocation |
2633 | function. */ | |
2634 | bool placement_allocation_fn_p; | |
f4f4610e | 2635 | /* True if the storage must be initialized, either by a constructor |
34cd5ae7 | 2636 | or due to an explicit new-initializer. */ |
f4f4610e MM |
2637 | bool is_initialized; |
2638 | /* The address of the thing allocated, not including any cookie. In | |
2639 | particular, if an array cookie is in use, DATA_ADDR is the | |
2640 | address of the first array element. This node is a VAR_DECL, and | |
2641 | is therefore reusable. */ | |
2642 | tree data_addr; | |
6de9cd9a | 2643 | tree init_preeval_expr = NULL_TREE; |
b75bf8b1 | 2644 | tree orig_type = type; |
a0d5fba7 | 2645 | |
058b15c1 | 2646 | if (nelts) |
a0d5fba7 | 2647 | { |
058b15c1 | 2648 | outer_nelts = nelts; |
d746e87d | 2649 | array_p = true; |
a0d5fba7 | 2650 | } |
9207099b | 2651 | else if (TREE_CODE (type) == ARRAY_TYPE) |
d746e87d | 2652 | { |
4ebc46e9 FW |
2653 | /* Transforms new (T[N]) to new T[N]. The former is a GNU |
2654 | extension for variable N. (This also covers new T where T is | |
2655 | a VLA typedef.) */ | |
9207099b JM |
2656 | array_p = true; |
2657 | nelts = array_type_nelts_top (type); | |
2658 | outer_nelts = nelts; | |
2659 | type = TREE_TYPE (type); | |
4ebc46e9 | 2660 | outer_nelts_from_type = true; |
d746e87d | 2661 | } |
834c6dff | 2662 | |
cda0a029 JM |
2663 | /* Lots of logic below. depends on whether we have a constant number of |
2664 | elements, so go ahead and fold it now. */ | |
2665 | if (outer_nelts) | |
2666 | outer_nelts = maybe_constant_value (outer_nelts); | |
2667 | ||
8d08fdba MS |
2668 | /* If our base type is an array, then make sure we know how many elements |
2669 | it has. */ | |
d746e87d MM |
2670 | for (elt_type = type; |
2671 | TREE_CODE (elt_type) == ARRAY_TYPE; | |
2672 | elt_type = TREE_TYPE (elt_type)) | |
4ebc46e9 FW |
2673 | { |
2674 | tree inner_nelts = array_type_nelts_top (elt_type); | |
2675 | tree inner_nelts_cst = maybe_constant_value (inner_nelts); | |
e1f10dd9 | 2676 | if (TREE_CODE (inner_nelts_cst) == INTEGER_CST) |
4a84253c | 2677 | { |
9be0ac8c | 2678 | bool overflow; |
807e902e KZ |
2679 | offset_int result = wi::mul (wi::to_offset (inner_nelts_cst), |
2680 | inner_nelts_count, SIGNED, &overflow); | |
9be0ac8c | 2681 | if (overflow) |
4a84253c FW |
2682 | { |
2683 | if (complain & tf_error) | |
2684 | error ("integer overflow in array size"); | |
2685 | nelts = error_mark_node; | |
2686 | } | |
2687 | inner_nelts_count = result; | |
2688 | } | |
2689 | else | |
4ebc46e9 FW |
2690 | { |
2691 | if (complain & tf_error) | |
2692 | { | |
8400e75e | 2693 | error_at (EXPR_LOC_OR_LOC (inner_nelts, input_location), |
b75bf8b1 | 2694 | "array size in new-expression must be constant"); |
4ebc46e9 FW |
2695 | cxx_constant_value(inner_nelts); |
2696 | } | |
2697 | nelts = error_mark_node; | |
2698 | } | |
2699 | if (nelts != error_mark_node) | |
2700 | nelts = cp_build_binary_op (input_location, | |
2701 | MULT_EXPR, nelts, | |
2702 | inner_nelts_cst, | |
2703 | complain); | |
2704 | } | |
2705 | ||
2706 | if (variably_modified_type_p (elt_type, NULL_TREE) && (complain & tf_error)) | |
2707 | { | |
b75bf8b1 | 2708 | error ("variably modified type not allowed in new-expression"); |
4ebc46e9 FW |
2709 | return error_mark_node; |
2710 | } | |
2711 | ||
2712 | if (nelts == error_mark_node) | |
2713 | return error_mark_node; | |
2714 | ||
2715 | /* Warn if we performed the (T[N]) to T[N] transformation and N is | |
2716 | variable. */ | |
2717 | if (outer_nelts_from_type | |
cda0a029 | 2718 | && !TREE_CONSTANT (outer_nelts)) |
4ebc46e9 FW |
2719 | { |
2720 | if (complain & tf_warning_or_error) | |
b75bf8b1 JM |
2721 | { |
2722 | const char *msg; | |
2723 | if (typedef_variant_p (orig_type)) | |
2724 | msg = ("non-constant array new length must be specified " | |
2725 | "directly, not by typedef"); | |
2726 | else | |
2727 | msg = ("non-constant array new length must be specified " | |
2728 | "without parentheses around the type-id"); | |
2729 | pedwarn (EXPR_LOC_OR_LOC (outer_nelts, input_location), | |
2730 | OPT_Wvla, msg); | |
2731 | } | |
4ebc46e9 FW |
2732 | else |
2733 | return error_mark_node; | |
2734 | } | |
5566b478 | 2735 | |
50e10fa8 | 2736 | if (VOID_TYPE_P (elt_type)) |
e1cd6e56 | 2737 | { |
5ade1ed2 DG |
2738 | if (complain & tf_error) |
2739 | error ("invalid type %<void%> for new"); | |
e1cd6e56 MS |
2740 | return error_mark_node; |
2741 | } | |
2742 | ||
2df663cc | 2743 | if (abstract_virtuals_error_sfinae (ACU_NEW, elt_type, complain)) |
a7a64a77 | 2744 | return error_mark_node; |
8926095f | 2745 | |
95552437 | 2746 | is_initialized = (type_build_ctor_call (elt_type) || *init != NULL); |
b87d79e6 | 2747 | |
eca7fc57 | 2748 | if (*init == NULL && cxx_dialect < cxx11) |
9d809e8f | 2749 | { |
40bb78ad | 2750 | bool maybe_uninitialized_error = false; |
9d809e8f FC |
2751 | /* A program that calls for default-initialization [...] of an |
2752 | entity of reference type is ill-formed. */ | |
2753 | if (CLASSTYPE_REF_FIELDS_NEED_INIT (elt_type)) | |
40bb78ad | 2754 | maybe_uninitialized_error = true; |
9d809e8f FC |
2755 | |
2756 | /* A new-expression that creates an object of type T initializes | |
2757 | that object as follows: | |
2758 | - If the new-initializer is omitted: | |
2759 | -- If T is a (possibly cv-qualified) non-POD class type | |
2760 | (or array thereof), the object is default-initialized (8.5). | |
2761 | [...] | |
2762 | -- Otherwise, the object created has indeterminate | |
2763 | value. If T is a const-qualified type, or a (possibly | |
2764 | cv-qualified) POD class type (or array thereof) | |
2765 | containing (directly or indirectly) a member of | |
2766 | const-qualified type, the program is ill-formed; */ | |
2767 | ||
2768 | if (CLASSTYPE_READONLY_FIELDS_NEED_INIT (elt_type)) | |
40bb78ad | 2769 | maybe_uninitialized_error = true; |
9d809e8f | 2770 | |
40bb78ad FC |
2771 | if (maybe_uninitialized_error |
2772 | && diagnose_uninitialized_cst_or_ref_member (elt_type, | |
2773 | /*using_new=*/true, | |
2774 | complain & tf_error)) | |
2775 | return error_mark_node; | |
9d809e8f FC |
2776 | } |
2777 | ||
c166b898 | 2778 | if (CP_TYPE_CONST_P (elt_type) && *init == NULL |
6132bdd7 | 2779 | && default_init_uninitialized_part (elt_type)) |
f4f4610e | 2780 | { |
5ade1ed2 DG |
2781 | if (complain & tf_error) |
2782 | error ("uninitialized const in %<new%> of %q#T", elt_type); | |
f4f4610e MM |
2783 | return error_mark_node; |
2784 | } | |
2785 | ||
d746e87d MM |
2786 | size = size_in_bytes (elt_type); |
2787 | if (array_p) | |
4a84253c FW |
2788 | { |
2789 | /* Maximum available size in bytes. Half of the address space | |
2790 | minus the cookie size. */ | |
807e902e KZ |
2791 | offset_int max_size |
2792 | = wi::set_bit_in_zero <offset_int> (TYPE_PRECISION (sizetype) - 1); | |
4a84253c | 2793 | /* Maximum number of outer elements which can be allocated. */ |
807e902e | 2794 | offset_int max_outer_nelts; |
4a84253c FW |
2795 | tree max_outer_nelts_tree; |
2796 | ||
2797 | gcc_assert (TREE_CODE (size) == INTEGER_CST); | |
2798 | cookie_size = targetm.cxx.get_cookie_size (elt_type); | |
2799 | gcc_assert (TREE_CODE (cookie_size) == INTEGER_CST); | |
807e902e | 2800 | gcc_checking_assert (wi::ltu_p (wi::to_offset (cookie_size), max_size)); |
c65cb8d1 | 2801 | /* Unconditionally subtract the cookie size. This decreases the |
4a84253c FW |
2802 | maximum object size and is safe even if we choose not to use |
2803 | a cookie after all. */ | |
807e902e | 2804 | max_size -= wi::to_offset (cookie_size); |
9be0ac8c | 2805 | bool overflow; |
807e902e KZ |
2806 | inner_size = wi::mul (wi::to_offset (size), inner_nelts_count, SIGNED, |
2807 | &overflow); | |
2808 | if (overflow || wi::gtu_p (inner_size, max_size)) | |
4a84253c FW |
2809 | { |
2810 | if (complain & tf_error) | |
2811 | error ("size of array is too large"); | |
2812 | return error_mark_node; | |
2813 | } | |
807e902e KZ |
2814 | |
2815 | max_outer_nelts = wi::udiv_trunc (max_size, inner_size); | |
807e902e | 2816 | max_outer_nelts_tree = wide_int_to_tree (sizetype, max_outer_nelts); |
4a84253c | 2817 | |
cda0a029 | 2818 | size = size_binop (MULT_EXPR, size, fold_convert (sizetype, nelts)); |
685c8340 | 2819 | |
f091ee19 | 2820 | if (INTEGER_CST == TREE_CODE (outer_nelts)) |
685c8340 MS |
2821 | { |
2822 | if (tree_int_cst_lt (max_outer_nelts_tree, outer_nelts)) | |
2823 | { | |
2824 | /* When the array size is constant, check it at compile time | |
2825 | to make sure it doesn't exceed the implementation-defined | |
2826 | maximum, as required by C++ 14 (in C++ 11 this requirement | |
2827 | isn't explicitly stated but it's enforced anyway -- see | |
2828 | grokdeclarator in cp/decl.c). */ | |
2829 | if (complain & tf_error) | |
2830 | error ("size of array is too large"); | |
2831 | return error_mark_node; | |
2832 | } | |
2833 | } | |
2834 | else | |
2835 | { | |
2836 | /* When a runtime check is necessary because the array size | |
2837 | isn't constant, keep only the top-most seven bits (starting | |
2838 | with the most significant non-zero bit) of the maximum size | |
2839 | to compare the array size against, to simplify encoding the | |
2840 | constant maximum size in the instruction stream. */ | |
2841 | ||
2842 | unsigned shift = (max_outer_nelts.get_precision ()) - 7 | |
2843 | - wi::clz (max_outer_nelts); | |
8de73453 | 2844 | max_outer_nelts = (max_outer_nelts >> shift) << shift; |
685c8340 MS |
2845 | |
2846 | outer_nelts_check = fold_build2 (LE_EXPR, boolean_type_node, | |
2847 | outer_nelts, | |
2848 | max_outer_nelts_tree); | |
2849 | } | |
4a84253c | 2850 | } |
a28e3c7f | 2851 | |
af63ba4b JM |
2852 | tree align_arg = NULL_TREE; |
2853 | if (type_has_new_extended_alignment (elt_type)) | |
2854 | align_arg = build_int_cst (align_type_node, TYPE_ALIGN_UNIT (elt_type)); | |
2855 | ||
63c9a190 MM |
2856 | alloc_fn = NULL_TREE; |
2857 | ||
c166b898 ILT |
2858 | /* If PLACEMENT is a single simple pointer type not passed by |
2859 | reference, prepare to capture it in a temporary variable. Do | |
2860 | this now, since PLACEMENT will change in the calls below. */ | |
c166b898 | 2861 | placement_first = NULL_TREE; |
9771b263 | 2862 | if (vec_safe_length (*placement) == 1 |
50e10fa8 | 2863 | && (TYPE_PTR_P (TREE_TYPE ((**placement)[0])))) |
9771b263 | 2864 | placement_first = (**placement)[0]; |
c166b898 | 2865 | |
e2f5cc96 MS |
2866 | bool member_new_p = false; |
2867 | ||
e92cc029 | 2868 | /* Allocate the object. */ |
9771b263 | 2869 | if (vec_safe_is_empty (*placement) && TYPE_FOR_JAVA (elt_type)) |
743f140d | 2870 | { |
63c9a190 | 2871 | tree class_addr; |
71b71b96 | 2872 | tree class_decl; |
8b60264b | 2873 | static const char alloc_name[] = "_Jv_AllocObject"; |
6de9cd9a | 2874 | |
71b71b96 PC |
2875 | if (!MAYBE_CLASS_TYPE_P (elt_type)) |
2876 | { | |
2877 | error ("%qT isn%'t a valid Java class type", elt_type); | |
2878 | return error_mark_node; | |
2879 | } | |
2880 | ||
2881 | class_decl = build_java_class_ref (elt_type); | |
a3d536f1 VR |
2882 | if (class_decl == error_mark_node) |
2883 | return error_mark_node; | |
2884 | ||
743f140d | 2885 | use_java_new = 1; |
c8094d83 | 2886 | if (!get_global_value_if_present (get_identifier (alloc_name), |
63c9a190 | 2887 | &alloc_fn)) |
b1e5b86c | 2888 | { |
5ade1ed2 DG |
2889 | if (complain & tf_error) |
2890 | error ("call to Java constructor with %qs undefined", alloc_name); | |
6961a592 GB |
2891 | return error_mark_node; |
2892 | } | |
63c9a190 | 2893 | else if (really_overloaded_fn (alloc_fn)) |
b1e5b86c | 2894 | { |
5ade1ed2 DG |
2895 | if (complain & tf_error) |
2896 | error ("%qD should never be overloaded", alloc_fn); | |
6961a592 GB |
2897 | return error_mark_node; |
2898 | } | |
63c9a190 | 2899 | alloc_fn = OVL_CURRENT (alloc_fn); |
dd125026 JJ |
2900 | if (TREE_CODE (alloc_fn) != FUNCTION_DECL |
2901 | || TREE_CODE (TREE_TYPE (alloc_fn)) != FUNCTION_TYPE | |
2902 | || !POINTER_TYPE_P (TREE_TYPE (TREE_TYPE (alloc_fn)))) | |
2903 | { | |
2904 | if (complain & tf_error) | |
2905 | error ("%qD is not a function returning a pointer", alloc_fn); | |
2906 | return error_mark_node; | |
2907 | } | |
743f140d | 2908 | class_addr = build1 (ADDR_EXPR, jclass_node, class_decl); |
6998c7ed NF |
2909 | alloc_call = cp_build_function_call_nary (alloc_fn, complain, |
2910 | class_addr, NULL_TREE); | |
743f140d | 2911 | } |
9e1e64ec | 2912 | else if (TYPE_FOR_JAVA (elt_type) && MAYBE_CLASS_TYPE_P (elt_type)) |
360f866c JJ |
2913 | { |
2914 | error ("Java class %q#T object allocated using placement new", elt_type); | |
2915 | return error_mark_node; | |
2916 | } | |
8d08fdba MS |
2917 | else |
2918 | { | |
834c6dff | 2919 | tree fnname; |
9f880ef9 | 2920 | tree fns; |
834c6dff | 2921 | |
d746e87d | 2922 | fnname = ansi_opname (array_p ? VEC_NEW_EXPR : NEW_EXPR); |
834c6dff | 2923 | |
e2f5cc96 | 2924 | member_new_p = !globally_qualified_p |
d746e87d MM |
2925 | && CLASS_TYPE_P (elt_type) |
2926 | && (array_p | |
2927 | ? TYPE_HAS_ARRAY_NEW_OPERATOR (elt_type) | |
e2f5cc96 MS |
2928 | : TYPE_HAS_NEW_OPERATOR (elt_type)); |
2929 | ||
2930 | if (member_new_p) | |
089d6ea7 MM |
2931 | { |
2932 | /* Use a class-specific operator new. */ | |
2933 | /* If a cookie is required, add some extra space. */ | |
d746e87d | 2934 | if (array_p && TYPE_VEC_NEW_USES_COOKIE (elt_type)) |
4a84253c FW |
2935 | size = size_binop (PLUS_EXPR, size, cookie_size); |
2936 | else | |
92d38f38 FW |
2937 | { |
2938 | cookie_size = NULL_TREE; | |
2939 | /* No size arithmetic necessary, so the size check is | |
2940 | not needed. */ | |
807e902e | 2941 | if (outer_nelts_check != NULL && inner_size == 1) |
92d38f38 FW |
2942 | outer_nelts_check = NULL_TREE; |
2943 | } | |
4a84253c | 2944 | /* Perform the overflow check. */ |
7d5e76c8 | 2945 | tree errval = TYPE_MAX_VALUE (sizetype); |
f391b44b | 2946 | if (cxx_dialect >= cxx11 && flag_exceptions) |
7d5e76c8 | 2947 | errval = throw_bad_array_new_length (); |
4a84253c FW |
2948 | if (outer_nelts_check != NULL_TREE) |
2949 | size = fold_build3 (COND_EXPR, sizetype, outer_nelts_check, | |
7d5e76c8 | 2950 | size, errval); |
089d6ea7 | 2951 | /* Create the argument list. */ |
9771b263 | 2952 | vec_safe_insert (*placement, 0, size); |
9f880ef9 | 2953 | /* Do name-lookup to find the appropriate operator. */ |
d746e87d | 2954 | fns = lookup_fnfields (elt_type, fnname, /*protect=*/2); |
a85cb0d7 VR |
2955 | if (fns == NULL_TREE) |
2956 | { | |
5ade1ed2 DG |
2957 | if (complain & tf_error) |
2958 | error ("no suitable %qD found in class %qT", fnname, elt_type); | |
a85cb0d7 VR |
2959 | return error_mark_node; |
2960 | } | |
9f880ef9 MM |
2961 | if (TREE_CODE (fns) == TREE_LIST) |
2962 | { | |
5ade1ed2 DG |
2963 | if (complain & tf_error) |
2964 | { | |
2965 | error ("request for member %qD is ambiguous", fnname); | |
2966 | print_candidates (fns); | |
2967 | } | |
9f880ef9 MM |
2968 | return error_mark_node; |
2969 | } | |
af63ba4b JM |
2970 | tree dummy = build_dummy_object (elt_type); |
2971 | alloc_call = NULL_TREE; | |
2972 | if (align_arg) | |
2973 | { | |
2974 | vec<tree, va_gc> *align_args | |
2975 | = vec_copy_and_insert (*placement, align_arg, 1); | |
2976 | alloc_call | |
2977 | = build_new_method_call (dummy, fns, &align_args, | |
2978 | /*conversion_path=*/NULL_TREE, | |
2979 | LOOKUP_NORMAL, &alloc_fn, tf_none); | |
2980 | /* If no matching function is found and the allocated object type | |
2981 | has new-extended alignment, the alignment argument is removed | |
2982 | from the argument list, and overload resolution is performed | |
2983 | again. */ | |
2984 | if (alloc_call == error_mark_node) | |
2985 | alloc_call = NULL_TREE; | |
2986 | } | |
2987 | if (!alloc_call) | |
2988 | alloc_call = build_new_method_call (dummy, fns, placement, | |
2989 | /*conversion_path=*/NULL_TREE, | |
2990 | LOOKUP_NORMAL, | |
2991 | &alloc_fn, complain); | |
089d6ea7 | 2992 | } |
834c6dff | 2993 | else |
089d6ea7 MM |
2994 | { |
2995 | /* Use a global operator new. */ | |
125e6594 | 2996 | /* See if a cookie might be required. */ |
4a84253c | 2997 | if (!(array_p && TYPE_VEC_NEW_USES_COOKIE (elt_type))) |
92d38f38 FW |
2998 | { |
2999 | cookie_size = NULL_TREE; | |
3000 | /* No size arithmetic necessary, so the size check is | |
3001 | not needed. */ | |
807e902e | 3002 | if (outer_nelts_check != NULL && inner_size == 1) |
92d38f38 FW |
3003 | outer_nelts_check = NULL_TREE; |
3004 | } | |
125e6594 | 3005 | |
c8094d83 | 3006 | alloc_call = build_operator_new_call (fnname, placement, |
63c9a190 | 3007 | &size, &cookie_size, |
af63ba4b | 3008 | align_arg, |
4a84253c | 3009 | outer_nelts_check, |
b40e334f | 3010 | &alloc_fn, complain); |
089d6ea7 | 3011 | } |
8d08fdba MS |
3012 | } |
3013 | ||
96790071 | 3014 | if (alloc_call == error_mark_node) |
2bb5d995 JM |
3015 | return error_mark_node; |
3016 | ||
63c9a190 MM |
3017 | gcc_assert (alloc_fn != NULL_TREE); |
3018 | ||
af63ba4b JM |
3019 | if (warn_aligned_new |
3020 | && TYPE_ALIGN (elt_type) > max_align_t_align () | |
3021 | && (warn_aligned_new > 1 | |
3022 | || CP_DECL_CONTEXT (alloc_fn) == global_namespace) | |
3023 | && !aligned_allocation_fn_p (alloc_fn)) | |
3024 | { | |
3025 | warning (OPT_Waligned_new_, "%<new%> of type %qT with extended " | |
3026 | "alignment %d", elt_type, TYPE_ALIGN_UNIT (elt_type)); | |
3027 | inform (input_location, "uses %qD, which does not have an alignment " | |
3028 | "parameter", alloc_fn); | |
3029 | inform (input_location, "use %<-faligned-new%> to enable C++17 " | |
3030 | "over-aligned new support"); | |
3031 | } | |
3032 | ||
c166b898 ILT |
3033 | /* If we found a simple case of PLACEMENT_EXPR above, then copy it |
3034 | into a temporary variable. */ | |
a9de800a | 3035 | if (!processing_template_decl |
a9de800a JJ |
3036 | && TREE_CODE (alloc_call) == CALL_EXPR |
3037 | && call_expr_nargs (alloc_call) == 2 | |
3038 | && TREE_CODE (TREE_TYPE (CALL_EXPR_ARG (alloc_call, 0))) == INTEGER_TYPE | |
50e10fa8 | 3039 | && TYPE_PTR_P (TREE_TYPE (CALL_EXPR_ARG (alloc_call, 1)))) |
a9de800a | 3040 | { |
e2f5cc96 | 3041 | tree placement = CALL_EXPR_ARG (alloc_call, 1); |
a9de800a | 3042 | |
e2f5cc96 MS |
3043 | if (placement_first != NULL_TREE |
3044 | && (INTEGRAL_OR_ENUMERATION_TYPE_P (TREE_TYPE (TREE_TYPE (placement))) | |
3045 | || VOID_TYPE_P (TREE_TYPE (TREE_TYPE (placement))))) | |
a9de800a | 3046 | { |
c166b898 | 3047 | placement_expr = get_target_expr (placement_first); |
a9de800a | 3048 | CALL_EXPR_ARG (alloc_call, 1) |
cda0a029 | 3049 | = fold_convert (TREE_TYPE (placement), placement_expr); |
e2f5cc96 MS |
3050 | } |
3051 | ||
3052 | if (!member_new_p | |
3053 | && VOID_TYPE_P (TREE_TYPE (TREE_TYPE (CALL_EXPR_ARG (alloc_call, 1))))) | |
3054 | { | |
3055 | /* Attempt to make the warning point at the operator new argument. */ | |
3056 | if (placement_first) | |
3057 | placement = placement_first; | |
3058 | ||
3059 | warn_placement_new_too_small (orig_type, nelts, size, placement); | |
a9de800a JJ |
3060 | } |
3061 | } | |
3062 | ||
a6111661 JM |
3063 | /* In the simple case, we can stop now. */ |
3064 | pointer_type = build_pointer_type (type); | |
3065 | if (!cookie_size && !is_initialized) | |
4d7a65ea | 3066 | return build_nop (pointer_type, alloc_call); |
a6111661 | 3067 | |
10ee5386 JM |
3068 | /* Store the result of the allocation call in a variable so that we can |
3069 | use it more than once. */ | |
3070 | alloc_expr = get_target_expr (alloc_call); | |
a6111661 JM |
3071 | alloc_node = TARGET_EXPR_SLOT (alloc_expr); |
3072 | ||
3073 | /* Strip any COMPOUND_EXPRs from ALLOC_CALL. */ | |
c8094d83 | 3074 | while (TREE_CODE (alloc_call) == COMPOUND_EXPR) |
a6111661 | 3075 | alloc_call = TREE_OPERAND (alloc_call, 1); |
089d6ea7 | 3076 | |
3f41ffd8 MM |
3077 | /* Now, check to see if this function is actually a placement |
3078 | allocation function. This can happen even when PLACEMENT is NULL | |
3079 | because we might have something like: | |
3080 | ||
3081 | struct S { void* operator new (size_t, int i = 0); }; | |
3082 | ||
3083 | A call to `new S' will get this allocation function, even though | |
3084 | there is no explicit placement argument. If there is more than | |
3085 | one argument, or there are variable arguments, then this is a | |
3086 | placement allocation function. */ | |
c8094d83 MS |
3087 | placement_allocation_fn_p |
3088 | = (type_num_arguments (TREE_TYPE (alloc_fn)) > 1 | |
46ff5047 | 3089 | || varargs_function_p (alloc_fn)); |
96790071 | 3090 | |
a6111661 JM |
3091 | /* Preevaluate the placement args so that we don't reevaluate them for a |
3092 | placement delete. */ | |
3093 | if (placement_allocation_fn_p) | |
3094 | { | |
6de9cd9a DN |
3095 | tree inits; |
3096 | stabilize_call (alloc_call, &inits); | |
a6111661 | 3097 | if (inits) |
f293ce4b RS |
3098 | alloc_expr = build2 (COMPOUND_EXPR, TREE_TYPE (alloc_expr), inits, |
3099 | alloc_expr); | |
a6111661 JM |
3100 | } |
3101 | ||
047f64a3 JM |
3102 | /* unless an allocation function is declared with an empty excep- |
3103 | tion-specification (_except.spec_), throw(), it indicates failure to | |
3104 | allocate storage by throwing a bad_alloc exception (clause _except_, | |
3105 | _lib.bad.alloc_); it returns a non-null pointer otherwise If the allo- | |
3106 | cation function is declared with an empty exception-specification, | |
3107 | throw(), it returns null to indicate failure to allocate storage and a | |
3108 | non-null pointer otherwise. | |
3109 | ||
3110 | So check for a null exception spec on the op new we just called. */ | |
3111 | ||
46ff5047 | 3112 | nothrow = TYPE_NOTHROW_P (TREE_TYPE (alloc_fn)); |
743f140d | 3113 | check_new = (flag_check_new || nothrow) && ! use_java_new; |
047f64a3 | 3114 | |
089d6ea7 | 3115 | if (cookie_size) |
8d08fdba | 3116 | { |
96790071 | 3117 | tree cookie; |
46e995e0 | 3118 | tree cookie_ptr; |
b5119fa1 | 3119 | tree size_ptr_type; |
f4f4610e MM |
3120 | |
3121 | /* Adjust so we're pointing to the start of the object. */ | |
5d49b6a7 | 3122 | data_addr = fold_build_pointer_plus (alloc_node, cookie_size); |
96790071 | 3123 | |
834c6dff | 3124 | /* Store the number of bytes allocated so that we can know how |
3461fba7 NS |
3125 | many elements to destroy later. We use the last sizeof |
3126 | (size_t) bytes to store the number of elements. */ | |
10ee5386 | 3127 | cookie_ptr = size_binop (MINUS_EXPR, cookie_size, size_in_bytes (sizetype)); |
5d49b6a7 RG |
3128 | cookie_ptr = fold_build_pointer_plus_loc (input_location, |
3129 | alloc_node, cookie_ptr); | |
b5119fa1 | 3130 | size_ptr_type = build_pointer_type (sizetype); |
10ee5386 | 3131 | cookie_ptr = fold_convert (size_ptr_type, cookie_ptr); |
dd865ef6 | 3132 | cookie = cp_build_indirect_ref (cookie_ptr, RO_NULL, complain); |
1f84ec23 | 3133 | |
f293ce4b | 3134 | cookie_expr = build2 (MODIFY_EXPR, sizetype, cookie, nelts); |
46e995e0 PB |
3135 | |
3136 | if (targetm.cxx.cookie_has_size ()) | |
3137 | { | |
3138 | /* Also store the element size. */ | |
5d49b6a7 | 3139 | cookie_ptr = fold_build_pointer_plus (cookie_ptr, |
db3927fb | 3140 | fold_build1_loc (input_location, |
5d49b6a7 RG |
3141 | NEGATE_EXPR, sizetype, |
3142 | size_in_bytes (sizetype))); | |
b2ec1738 | 3143 | |
dd865ef6 | 3144 | cookie = cp_build_indirect_ref (cookie_ptr, RO_NULL, complain); |
f293ce4b | 3145 | cookie = build2 (MODIFY_EXPR, sizetype, cookie, |
10ee5386 | 3146 | size_in_bytes (elt_type)); |
f293ce4b RS |
3147 | cookie_expr = build2 (COMPOUND_EXPR, TREE_TYPE (cookie_expr), |
3148 | cookie, cookie_expr); | |
46e995e0 | 3149 | } |
8d08fdba | 3150 | } |
96790071 | 3151 | else |
8b5e2ce4 JM |
3152 | { |
3153 | cookie_expr = NULL_TREE; | |
3154 | data_addr = alloc_node; | |
3155 | } | |
8d08fdba | 3156 | |
10ee5386 | 3157 | /* Now use a pointer to the type we've actually allocated. */ |
25357d1e JM |
3158 | |
3159 | /* But we want to operate on a non-const version to start with, | |
3160 | since we'll be modifying the elements. */ | |
3161 | non_const_pointer_type = build_pointer_type | |
a3360e77 | 3162 | (cp_build_qualified_type (type, cp_type_quals (type) & ~TYPE_QUAL_CONST)); |
25357d1e JM |
3163 | |
3164 | data_addr = fold_convert (non_const_pointer_type, data_addr); | |
9207099b | 3165 | /* Any further uses of alloc_node will want this type, too. */ |
25357d1e | 3166 | alloc_node = fold_convert (non_const_pointer_type, alloc_node); |
10ee5386 | 3167 | |
6de9cd9a DN |
3168 | /* Now initialize the allocated object. Note that we preevaluate the |
3169 | initialization expression, apart from the actual constructor call or | |
3170 | assignment--we do this because we want to delay the allocation as long | |
3171 | as possible in order to minimize the size of the exception region for | |
3172 | placement delete. */ | |
f4f4610e | 3173 | if (is_initialized) |
8d08fdba | 3174 | { |
6de9cd9a | 3175 | bool stable; |
844ae01d | 3176 | bool explicit_value_init_p = false; |
6de9cd9a | 3177 | |
9771b263 | 3178 | if (*init != NULL && (*init)->is_empty ()) |
6de9cd9a | 3179 | { |
c166b898 | 3180 | *init = NULL; |
844ae01d JM |
3181 | explicit_value_init_p = true; |
3182 | } | |
b84f4651 | 3183 | |
a67e7daa JM |
3184 | if (processing_template_decl && explicit_value_init_p) |
3185 | { | |
3186 | /* build_value_init doesn't work in templates, and we don't need | |
3187 | the initializer anyway since we're going to throw it away and | |
3188 | rebuild it at instantiation time, so just build up a single | |
3189 | constructor call to get any appropriate diagnostics. */ | |
3190 | init_expr = cp_build_indirect_ref (data_addr, RO_NULL, complain); | |
95552437 | 3191 | if (type_build_ctor_call (elt_type)) |
a67e7daa JM |
3192 | init_expr = build_special_member_call (init_expr, |
3193 | complete_ctor_identifier, | |
3194 | init, elt_type, | |
3195 | LOOKUP_NORMAL, | |
3196 | complain); | |
3197 | stable = stabilize_init (init_expr, &init_preeval_expr); | |
3198 | } | |
3199 | else if (array_p) | |
844ae01d | 3200 | { |
25357d1e | 3201 | tree vecinit = NULL_TREE; |
9771b263 | 3202 | if (vec_safe_length (*init) == 1 |
014397c2 | 3203 | && DIRECT_LIST_INIT_P ((**init)[0])) |
25357d1e | 3204 | { |
9771b263 | 3205 | vecinit = (**init)[0]; |
1f65a8c8 JM |
3206 | if (CONSTRUCTOR_NELTS (vecinit) == 0) |
3207 | /* List-value-initialization, leave it alone. */; | |
25357d1e JM |
3208 | else |
3209 | { | |
1f65a8c8 JM |
3210 | tree arraytype, domain; |
3211 | if (TREE_CONSTANT (nelts)) | |
3212 | domain = compute_array_index_type (NULL_TREE, nelts, | |
3213 | complain); | |
3214 | else | |
7d5e76c8 JM |
3215 | /* We'll check the length at runtime. */ |
3216 | domain = NULL_TREE; | |
1f65a8c8 JM |
3217 | arraytype = build_cplus_array_type (type, domain); |
3218 | vecinit = digest_init (arraytype, vecinit, complain); | |
25357d1e | 3219 | } |
25357d1e JM |
3220 | } |
3221 | else if (*init) | |
5ade1ed2 DG |
3222 | { |
3223 | if (complain & tf_error) | |
1f65a8c8 JM |
3224 | permerror (input_location, |
3225 | "parenthesized initializer in array new"); | |
5ade1ed2 DG |
3226 | else |
3227 | return error_mark_node; | |
25357d1e | 3228 | vecinit = build_tree_list_vec (*init); |
5ade1ed2 | 3229 | } |
6de9cd9a | 3230 | init_expr |
b73a4704 JM |
3231 | = build_vec_init (data_addr, |
3232 | cp_build_binary_op (input_location, | |
3233 | MINUS_EXPR, outer_nelts, | |
3234 | integer_one_node, | |
3235 | complain), | |
3236 | vecinit, | |
3237 | explicit_value_init_p, | |
3238 | /*from_array=*/0, | |
3239 | complain); | |
6de9cd9a DN |
3240 | |
3241 | /* An array initialization is stable because the initialization | |
3242 | of each element is a full-expression, so the temporaries don't | |
3243 | leak out. */ | |
3244 | stable = true; | |
3245 | } | |
f30efcb7 | 3246 | else |
8d08fdba | 3247 | { |
dd865ef6 | 3248 | init_expr = cp_build_indirect_ref (data_addr, RO_NULL, complain); |
9207099b | 3249 | |
95552437 | 3250 | if (type_build_ctor_call (type) && !explicit_value_init_p) |
b84f4651 MM |
3251 | { |
3252 | init_expr = build_special_member_call (init_expr, | |
3253 | complete_ctor_identifier, | |
3254 | init, elt_type, | |
5ade1ed2 DG |
3255 | LOOKUP_NORMAL, |
3256 | complain); | |
844ae01d JM |
3257 | } |
3258 | else if (explicit_value_init_p) | |
3259 | { | |
a67e7daa JM |
3260 | /* Something like `new int()'. */ |
3261 | tree val = build_value_init (type, complain); | |
3262 | if (val == error_mark_node) | |
3263 | return error_mark_node; | |
3264 | init_expr = build2 (INIT_EXPR, type, init_expr, val); | |
b84f4651 | 3265 | } |
8dc2b103 | 3266 | else |
b84f4651 | 3267 | { |
c166b898 ILT |
3268 | tree ie; |
3269 | ||
b84f4651 MM |
3270 | /* We are processing something like `new int (10)', which |
3271 | means allocate an int, and initialize it with 10. */ | |
3db45ab5 | 3272 | |
e2e03032 PC |
3273 | ie = build_x_compound_expr_from_vec (*init, "new initializer", |
3274 | complain); | |
4f2e1536 MP |
3275 | init_expr = cp_build_modify_expr (input_location, init_expr, |
3276 | INIT_EXPR, ie, complain); | |
b84f4651 | 3277 | } |
844ae01d | 3278 | stable = stabilize_init (init_expr, &init_preeval_expr); |
96790071 JM |
3279 | } |
3280 | ||
3281 | if (init_expr == error_mark_node) | |
3282 | return error_mark_node; | |
1f109f0f | 3283 | |
20c39572 JM |
3284 | /* If any part of the object initialization terminates by throwing an |
3285 | exception and a suitable deallocation function can be found, the | |
3286 | deallocation function is called to free the memory in which the | |
3287 | object was being constructed, after which the exception continues | |
3288 | to propagate in the context of the new-expression. If no | |
3289 | unambiguous matching deallocation function can be found, | |
3290 | propagating the exception does not cause the object's memory to be | |
3291 | freed. */ | |
96790071 | 3292 | if (flag_exceptions && ! use_java_new) |
1f109f0f | 3293 | { |
d746e87d | 3294 | enum tree_code dcode = array_p ? VEC_DELETE_EXPR : DELETE_EXPR; |
96790071 | 3295 | tree cleanup; |
a7d87521 | 3296 | |
5355deec | 3297 | /* The Standard is unclear here, but the right thing to do |
f4f4610e MM |
3298 | is to use the same method for finding deallocation |
3299 | functions that we use for finding allocation functions. */ | |
10ee5386 JM |
3300 | cleanup = (build_op_delete_call |
3301 | (dcode, | |
9207099b | 3302 | alloc_node, |
10ee5386 JM |
3303 | size, |
3304 | globally_qualified_p, | |
3305 | placement_allocation_fn_p ? alloc_call : NULL_TREE, | |
4b978f96 PC |
3306 | alloc_fn, |
3307 | complain)); | |
2bb14213 | 3308 | |
6de9cd9a DN |
3309 | if (!cleanup) |
3310 | /* We're done. */; | |
3311 | else if (stable) | |
3312 | /* This is much simpler if we were able to preevaluate all of | |
3313 | the arguments to the constructor call. */ | |
d665b6e5 MLI |
3314 | { |
3315 | /* CLEANUP is compiler-generated, so no diagnostics. */ | |
3316 | TREE_NO_WARNING (cleanup) = true; | |
3317 | init_expr = build2 (TRY_CATCH_EXPR, void_type_node, | |
3318 | init_expr, cleanup); | |
3319 | /* Likewise, this try-catch is compiler-generated. */ | |
3320 | TREE_NO_WARNING (init_expr) = true; | |
3321 | } | |
6de9cd9a DN |
3322 | else |
3323 | /* Ack! First we allocate the memory. Then we set our sentry | |
3324 | variable to true, and expand a cleanup that deletes the | |
3325 | memory if sentry is true. Then we run the constructor, and | |
3326 | finally clear the sentry. | |
3327 | ||
3328 | We need to do this because we allocate the space first, so | |
3329 | if there are any temporaries with cleanups in the | |
3330 | constructor args and we weren't able to preevaluate them, we | |
3331 | need this EH region to extend until end of full-expression | |
3332 | to preserve nesting. */ | |
da4768fe | 3333 | { |
96790071 | 3334 | tree end, sentry, begin; |
2face519 JM |
3335 | |
3336 | begin = get_target_expr (boolean_true_node); | |
659e5a7a | 3337 | CLEANUP_EH_ONLY (begin) = 1; |
2face519 | 3338 | |
659e5a7a JM |
3339 | sentry = TARGET_EXPR_SLOT (begin); |
3340 | ||
d665b6e5 MLI |
3341 | /* CLEANUP is compiler-generated, so no diagnostics. */ |
3342 | TREE_NO_WARNING (cleanup) = true; | |
3343 | ||
659e5a7a | 3344 | TARGET_EXPR_CLEANUP (begin) |
f293ce4b | 3345 | = build3 (COND_EXPR, void_type_node, sentry, |
632f2871 | 3346 | cleanup, void_node); |
2face519 | 3347 | |
f293ce4b RS |
3348 | end = build2 (MODIFY_EXPR, TREE_TYPE (sentry), |
3349 | sentry, boolean_false_node); | |
2face519 | 3350 | |
96790071 | 3351 | init_expr |
f293ce4b RS |
3352 | = build2 (COMPOUND_EXPR, void_type_node, begin, |
3353 | build2 (COMPOUND_EXPR, void_type_node, init_expr, | |
3354 | end)); | |
d665b6e5 MLI |
3355 | /* Likewise, this is compiler-generated. */ |
3356 | TREE_NO_WARNING (init_expr) = true; | |
da4768fe | 3357 | } |
1f109f0f | 3358 | } |
f4f4610e | 3359 | } |
8b5e2ce4 JM |
3360 | else |
3361 | init_expr = NULL_TREE; | |
3362 | ||
3363 | /* Now build up the return value in reverse order. */ | |
96790071 | 3364 | |
8b5e2ce4 | 3365 | rval = data_addr; |
2face519 | 3366 | |
8b5e2ce4 | 3367 | if (init_expr) |
f293ce4b | 3368 | rval = build2 (COMPOUND_EXPR, TREE_TYPE (rval), init_expr, rval); |
8b5e2ce4 | 3369 | if (cookie_expr) |
f293ce4b | 3370 | rval = build2 (COMPOUND_EXPR, TREE_TYPE (rval), cookie_expr, rval); |
8b5e2ce4 | 3371 | |
10ee5386 | 3372 | if (rval == data_addr) |
8b5e2ce4 JM |
3373 | /* If we don't have an initializer or a cookie, strip the TARGET_EXPR |
3374 | and return the call (which doesn't need to be adjusted). */ | |
3375 | rval = TARGET_EXPR_INITIAL (alloc_expr); | |
3376 | else | |
d18c083e | 3377 | { |
8b5e2ce4 JM |
3378 | if (check_new) |
3379 | { | |
ba47d38d AH |
3380 | tree ifexp = cp_build_binary_op (input_location, |
3381 | NE_EXPR, alloc_node, | |
6d96d7ff | 3382 | nullptr_node, |
5ade1ed2 | 3383 | complain); |
4cbc4bd7 PC |
3384 | rval = build_conditional_expr (input_location, ifexp, rval, |
3385 | alloc_node, complain); | |
8b5e2ce4 | 3386 | } |
d18c083e | 3387 | |
8b5e2ce4 JM |
3388 | /* Perform the allocation before anything else, so that ALLOC_NODE |
3389 | has been initialized before we start using it. */ | |
f293ce4b | 3390 | rval = build2 (COMPOUND_EXPR, TREE_TYPE (rval), alloc_expr, rval); |
8b5e2ce4 | 3391 | } |
51c184be | 3392 | |
6de9cd9a | 3393 | if (init_preeval_expr) |
f293ce4b | 3394 | rval = build2 (COMPOUND_EXPR, TREE_TYPE (rval), init_preeval_expr, rval); |
6de9cd9a | 3395 | |
d04a575f | 3396 | /* A new-expression is never an lvalue. */ |
bb19d4af | 3397 | gcc_assert (!obvalue_p (rval)); |
058dcc25 | 3398 | |
25357d1e | 3399 | return convert (pointer_type, rval); |
8d08fdba | 3400 | } |
63c9a190 | 3401 | |
c166b898 ILT |
3402 | /* Generate a representation for a C++ "new" expression. *PLACEMENT |
3403 | is a vector of placement-new arguments (or NULL if none). If NELTS | |
3404 | is NULL, TYPE is the type of the storage to be allocated. If NELTS | |
3405 | is not NULL, then this is an array-new allocation; TYPE is the type | |
3406 | of the elements in the array and NELTS is the number of elements in | |
3407 | the array. *INIT, if non-NULL, is the initializer for the new | |
3408 | object, or an empty vector to indicate an initializer of "()". If | |
3409 | USE_GLOBAL_NEW is true, then the user explicitly wrote "::new" | |
3410 | rather than just "new". This may change PLACEMENT and INIT. */ | |
63c9a190 MM |
3411 | |
3412 | tree | |
9771b263 DN |
3413 | build_new (vec<tree, va_gc> **placement, tree type, tree nelts, |
3414 | vec<tree, va_gc> **init, int use_global_new, tsubst_flags_t complain) | |
63c9a190 MM |
3415 | { |
3416 | tree rval; | |
9771b263 | 3417 | vec<tree, va_gc> *orig_placement = NULL; |
c166b898 | 3418 | tree orig_nelts = NULL_TREE; |
9771b263 | 3419 | vec<tree, va_gc> *orig_init = NULL; |
63c9a190 | 3420 | |
c166b898 | 3421 | if (type == error_mark_node) |
63c9a190 MM |
3422 | return error_mark_node; |
3423 | ||
9771b263 | 3424 | if (nelts == NULL_TREE && vec_safe_length (*init) == 1 |
c19267cb JM |
3425 | /* Don't do auto deduction where it might affect mangling. */ |
3426 | && (!processing_template_decl || at_function_scope_p ())) | |
86a09a9e JM |
3427 | { |
3428 | tree auto_node = type_uses_auto (type); | |
2e5748d2 JM |
3429 | if (auto_node) |
3430 | { | |
9771b263 | 3431 | tree d_init = (**init)[0]; |
46f0d909 | 3432 | d_init = resolve_nondeduced_context (d_init, complain); |
d84572a4 | 3433 | type = do_auto_deduction (type, d_init, auto_node); |
2e5748d2 | 3434 | } |
86a09a9e JM |
3435 | } |
3436 | ||
63c9a190 MM |
3437 | if (processing_template_decl) |
3438 | { | |
3439 | if (dependent_type_p (type) | |
c166b898 | 3440 | || any_type_dependent_arguments_p (*placement) |
63c9a190 | 3441 | || (nelts && type_dependent_expression_p (nelts)) |
879b0a1d | 3442 | || (nelts && *init) |
c166b898 ILT |
3443 | || any_type_dependent_arguments_p (*init)) |
3444 | return build_raw_new_expr (*placement, type, nelts, *init, | |
63c9a190 | 3445 | use_global_new); |
c166b898 ILT |
3446 | |
3447 | orig_placement = make_tree_vector_copy (*placement); | |
3448 | orig_nelts = nelts; | |
a4bbf910 PC |
3449 | if (*init) |
3450 | orig_init = make_tree_vector_copy (*init); | |
c166b898 ILT |
3451 | |
3452 | make_args_non_dependent (*placement); | |
63c9a190 MM |
3453 | if (nelts) |
3454 | nelts = build_non_dependent_expr (nelts); | |
c166b898 | 3455 | make_args_non_dependent (*init); |
63c9a190 MM |
3456 | } |
3457 | ||
3458 | if (nelts) | |
3459 | { | |
3460 | if (!build_expr_type_conversion (WANT_INT | WANT_ENUM, nelts, false)) | |
5ade1ed2 DG |
3461 | { |
3462 | if (complain & tf_error) | |
cbe5f3b3 | 3463 | permerror (input_location, "size in array new must have integral type"); |
5ade1ed2 DG |
3464 | else |
3465 | return error_mark_node; | |
3466 | } | |
685c8340 MS |
3467 | |
3468 | /* Try to determine the constant value only for the purposes | |
3469 | of the diagnostic below but continue to use the original | |
3470 | value and handle const folding later. */ | |
3471 | const_tree cst_nelts = maybe_constant_value (nelts); | |
3472 | ||
3473 | /* The expression in a noptr-new-declarator is erroneous if it's of | |
3474 | non-class type and its value before converting to std::size_t is | |
3475 | less than zero. ... If the expression is a constant expression, | |
3476 | the program is ill-fomed. */ | |
f091ee19 MS |
3477 | if (INTEGER_CST == TREE_CODE (cst_nelts) |
3478 | && tree_int_cst_sgn (cst_nelts) == -1) | |
685c8340 MS |
3479 | { |
3480 | if (complain & tf_error) | |
3481 | error ("size of array is negative"); | |
3482 | return error_mark_node; | |
3483 | } | |
3484 | ||
03a904b5 | 3485 | nelts = mark_rvalue_use (nelts); |
4b978f96 | 3486 | nelts = cp_save_expr (cp_convert (sizetype, nelts, complain)); |
63c9a190 MM |
3487 | } |
3488 | ||
3489 | /* ``A reference cannot be created by the new operator. A reference | |
3490 | is not an object (8.2.2, 8.4.3), so a pointer to it could not be | |
3491 | returned by new.'' ARM 5.3.3 */ | |
3492 | if (TREE_CODE (type) == REFERENCE_TYPE) | |
3493 | { | |
5ade1ed2 DG |
3494 | if (complain & tf_error) |
3495 | error ("new cannot be applied to a reference type"); | |
3496 | else | |
3497 | return error_mark_node; | |
63c9a190 MM |
3498 | type = TREE_TYPE (type); |
3499 | } | |
3500 | ||
3501 | if (TREE_CODE (type) == FUNCTION_TYPE) | |
3502 | { | |
5ade1ed2 DG |
3503 | if (complain & tf_error) |
3504 | error ("new cannot be applied to a function type"); | |
63c9a190 MM |
3505 | return error_mark_node; |
3506 | } | |
3507 | ||
57ccb546 MM |
3508 | /* The type allocated must be complete. If the new-type-id was |
3509 | "T[N]" then we are just checking that "T" is complete here, but | |
3510 | that is equivalent, since the value of "N" doesn't matter. */ | |
309714d4 | 3511 | if (!complete_type_or_maybe_complain (type, NULL_TREE, complain)) |
39fb9d72 DB |
3512 | return error_mark_node; |
3513 | ||
5ade1ed2 | 3514 | rval = build_new_1 (placement, type, nelts, init, use_global_new, complain); |
63c9a190 MM |
3515 | if (rval == error_mark_node) |
3516 | return error_mark_node; | |
3517 | ||
3518 | if (processing_template_decl) | |
c166b898 ILT |
3519 | { |
3520 | tree ret = build_raw_new_expr (orig_placement, type, orig_nelts, | |
3521 | orig_init, use_global_new); | |
3522 | release_tree_vector (orig_placement); | |
3523 | release_tree_vector (orig_init); | |
3524 | return ret; | |
3525 | } | |
63c9a190 MM |
3526 | |
3527 | /* Wrap it in a NOP_EXPR so warn_if_unused_value doesn't complain. */ | |
3528 | rval = build1 (NOP_EXPR, TREE_TYPE (rval), rval); | |
3529 | TREE_NO_WARNING (rval) = 1; | |
3530 | ||
3531 | return rval; | |
3532 | } | |
3533 | ||
3534 | /* Given a Java class, return a decl for the corresponding java.lang.Class. */ | |
3535 | ||
3536 | tree | |
3537 | build_java_class_ref (tree type) | |
3538 | { | |
3539 | tree name = NULL_TREE, class_decl; | |
3540 | static tree CL_suffix = NULL_TREE; | |
3541 | if (CL_suffix == NULL_TREE) | |
3542 | CL_suffix = get_identifier("class$"); | |
3543 | if (jclass_node == NULL_TREE) | |
3544 | { | |
3545 | jclass_node = IDENTIFIER_GLOBAL_VALUE (get_identifier ("jclass")); | |
3546 | if (jclass_node == NULL_TREE) | |
a3d536f1 VR |
3547 | { |
3548 | error ("call to Java constructor, while %<jclass%> undefined"); | |
3549 | return error_mark_node; | |
3550 | } | |
63c9a190 MM |
3551 | jclass_node = TREE_TYPE (jclass_node); |
3552 | } | |
3553 | ||
3554 | /* Mangle the class$ field. */ | |
3555 | { | |
3556 | tree field; | |
910ad8de | 3557 | for (field = TYPE_FIELDS (type); field; field = DECL_CHAIN (field)) |
63c9a190 MM |
3558 | if (DECL_NAME (field) == CL_suffix) |
3559 | { | |
3560 | mangle_decl (field); | |
3561 | name = DECL_ASSEMBLER_NAME (field); | |
3562 | break; | |
3563 | } | |
3564 | if (!field) | |
a3d536f1 | 3565 | { |
d8a07487 | 3566 | error ("can%'t find %<class$%> in %qT", type); |
a3d536f1 VR |
3567 | return error_mark_node; |
3568 | } | |
3569 | } | |
63c9a190 MM |
3570 | |
3571 | class_decl = IDENTIFIER_GLOBAL_VALUE (name); | |
3572 | if (class_decl == NULL_TREE) | |
3573 | { | |
c2255bc4 AH |
3574 | class_decl = build_decl (input_location, |
3575 | VAR_DECL, name, TREE_TYPE (jclass_node)); | |
63c9a190 MM |
3576 | TREE_STATIC (class_decl) = 1; |
3577 | DECL_EXTERNAL (class_decl) = 1; | |
3578 | TREE_PUBLIC (class_decl) = 1; | |
3579 | DECL_ARTIFICIAL (class_decl) = 1; | |
3580 | DECL_IGNORED_P (class_decl) = 1; | |
3581 | pushdecl_top_level (class_decl); | |
3582 | make_decl_rtl (class_decl); | |
3583 | } | |
3584 | return class_decl; | |
3585 | } | |
8d08fdba | 3586 | \f |
f30432d7 | 3587 | static tree |
362efdc1 | 3588 | build_vec_delete_1 (tree base, tree maxindex, tree type, |
574cfaa4 JM |
3589 | special_function_kind auto_delete_vec, |
3590 | int use_global_delete, tsubst_flags_t complain) | |
f30432d7 MS |
3591 | { |
3592 | tree virtual_size; | |
e92cc029 | 3593 | tree ptype = build_pointer_type (type = complete_type (type)); |
c9b0866a | 3594 | tree size_exp; |
f30432d7 MS |
3595 | |
3596 | /* Temporary variables used by the loop. */ | |
3597 | tree tbase, tbase_init; | |
3598 | ||
3599 | /* This is the body of the loop that implements the deletion of a | |
3600 | single element, and moves temp variables to next elements. */ | |
3601 | tree body; | |
3602 | ||
3603 | /* This is the LOOP_EXPR that governs the deletion of the elements. */ | |
c7b62f14 | 3604 | tree loop = 0; |
f30432d7 MS |
3605 | |
3606 | /* This is the thing that governs what to do after the loop has run. */ | |
3607 | tree deallocate_expr = 0; | |
3608 | ||
3609 | /* This is the BIND_EXPR which holds the outermost iterator of the | |
3610 | loop. It is convenient to set this variable up and test it before | |
3611 | executing any other code in the loop. | |
3612 | This is also the containing expression returned by this function. */ | |
3613 | tree controller = NULL_TREE; | |
5be014d5 | 3614 | tree tmp; |
f30432d7 | 3615 | |
b2153b98 | 3616 | /* We should only have 1-D arrays here. */ |
8dc2b103 | 3617 | gcc_assert (TREE_CODE (type) != ARRAY_TYPE); |
b2153b98 | 3618 | |
574cfaa4 JM |
3619 | if (base == error_mark_node || maxindex == error_mark_node) |
3620 | return error_mark_node; | |
3621 | ||
c9b0866a PC |
3622 | if (!COMPLETE_TYPE_P (type)) |
3623 | { | |
3624 | if ((complain & tf_warning) | |
3625 | && warning (OPT_Wdelete_incomplete, | |
3626 | "possible problem detected in invocation of " | |
3627 | "delete [] operator:")) | |
3628 | { | |
3629 | cxx_incomplete_type_diagnostic (base, type, DK_WARNING); | |
3630 | inform (input_location, "neither the destructor nor the " | |
3631 | "class-specific operator delete [] will be called, " | |
3632 | "even if they are declared when the class is defined"); | |
3633 | } | |
20b06add JM |
3634 | /* This size won't actually be used. */ |
3635 | size_exp = size_one_node; | |
3636 | goto no_destructor; | |
c9b0866a PC |
3637 | } |
3638 | ||
3639 | size_exp = size_in_bytes (type); | |
3640 | ||
eca7fc57 | 3641 | if (! MAYBE_CLASS_TYPE_P (type)) |
c7b62f14 | 3642 | goto no_destructor; |
eca7fc57 JM |
3643 | else if (TYPE_HAS_TRIVIAL_DESTRUCTOR (type)) |
3644 | { | |
3645 | /* Make sure the destructor is callable. */ | |
3646 | if (type_build_dtor_call (type)) | |
3647 | { | |
3648 | tmp = build_delete (ptype, base, sfk_complete_destructor, | |
3649 | LOOKUP_NORMAL|LOOKUP_DESTRUCTOR, 1, | |
3650 | complain); | |
3651 | if (tmp == error_mark_node) | |
3652 | return error_mark_node; | |
3653 | } | |
3654 | goto no_destructor; | |
3655 | } | |
f30432d7 | 3656 | |
708cae97 | 3657 | /* The below is short by the cookie size. */ |
fed3cef0 | 3658 | virtual_size = size_binop (MULT_EXPR, size_exp, |
cda0a029 | 3659 | fold_convert (sizetype, maxindex)); |
f30432d7 | 3660 | |
46e8c075 | 3661 | tbase = create_temporary_var (ptype); |
5d49b6a7 | 3662 | tbase_init |
4f2e1536 | 3663 | = cp_build_modify_expr (input_location, tbase, NOP_EXPR, |
5d49b6a7 RG |
3664 | fold_build_pointer_plus_loc (input_location, |
3665 | fold_convert (ptype, | |
3666 | base), | |
3667 | virtual_size), | |
3668 | complain); | |
574cfaa4 JM |
3669 | if (tbase_init == error_mark_node) |
3670 | return error_mark_node; | |
f293ce4b RS |
3671 | controller = build3 (BIND_EXPR, void_type_node, tbase, |
3672 | NULL_TREE, NULL_TREE); | |
f30432d7 | 3673 | TREE_SIDE_EFFECTS (controller) = 1; |
f30432d7 | 3674 | |
f293ce4b | 3675 | body = build1 (EXIT_EXPR, void_type_node, |
5cd88d68 RS |
3676 | build2 (EQ_EXPR, boolean_type_node, tbase, |
3677 | fold_convert (ptype, base))); | |
db3927fb | 3678 | tmp = fold_build1_loc (input_location, NEGATE_EXPR, sizetype, size_exp); |
5d49b6a7 | 3679 | tmp = fold_build_pointer_plus (tbase, tmp); |
4f2e1536 | 3680 | tmp = cp_build_modify_expr (input_location, tbase, NOP_EXPR, tmp, complain); |
574cfaa4 JM |
3681 | if (tmp == error_mark_node) |
3682 | return error_mark_node; | |
3683 | body = build_compound_expr (input_location, body, tmp); | |
3684 | tmp = build_delete (ptype, tbase, sfk_complete_destructor, | |
3685 | LOOKUP_NORMAL|LOOKUP_DESTRUCTOR, 1, | |
3686 | complain); | |
3687 | if (tmp == error_mark_node) | |
3688 | return error_mark_node; | |
3689 | body = build_compound_expr (input_location, body, tmp); | |
f30432d7 | 3690 | |
f293ce4b | 3691 | loop = build1 (LOOP_EXPR, void_type_node, body); |
c2255bc4 | 3692 | loop = build_compound_expr (input_location, tbase_init, loop); |
f30432d7 MS |
3693 | |
3694 | no_destructor: | |
e79a6b40 JM |
3695 | /* Delete the storage if appropriate. */ |
3696 | if (auto_delete_vec == sfk_deleting_destructor) | |
f30432d7 MS |
3697 | { |
3698 | tree base_tbd; | |
3699 | ||
708cae97 | 3700 | /* The below is short by the cookie size. */ |
fed3cef0 | 3701 | virtual_size = size_binop (MULT_EXPR, size_exp, |
cda0a029 | 3702 | fold_convert (sizetype, maxindex)); |
f30432d7 MS |
3703 | |
3704 | if (! TYPE_VEC_NEW_USES_COOKIE (type)) | |
3705 | /* no header */ | |
3706 | base_tbd = base; | |
3707 | else | |
3708 | { | |
834c6dff MM |
3709 | tree cookie_size; |
3710 | ||
46e995e0 | 3711 | cookie_size = targetm.cxx.get_cookie_size (type); |
574cfaa4 JM |
3712 | base_tbd = cp_build_binary_op (input_location, |
3713 | MINUS_EXPR, | |
3714 | cp_convert (string_type_node, | |
4b978f96 | 3715 | base, complain), |
574cfaa4 JM |
3716 | cookie_size, |
3717 | complain); | |
3718 | if (base_tbd == error_mark_node) | |
3719 | return error_mark_node; | |
4b978f96 | 3720 | base_tbd = cp_convert (ptype, base_tbd, complain); |
e92cc029 | 3721 | /* True size with header. */ |
834c6dff | 3722 | virtual_size = size_binop (PLUS_EXPR, virtual_size, cookie_size); |
f30432d7 | 3723 | } |
86f45d2c | 3724 | |
e79a6b40 JM |
3725 | deallocate_expr = build_op_delete_call (VEC_DELETE_EXPR, |
3726 | base_tbd, virtual_size, | |
3727 | use_global_delete & 1, | |
3728 | /*placement=*/NULL_TREE, | |
4b978f96 PC |
3729 | /*alloc_fn=*/NULL_TREE, |
3730 | complain); | |
f30432d7 MS |
3731 | } |
3732 | ||
c7b62f14 NS |
3733 | body = loop; |
3734 | if (!deallocate_expr) | |
3735 | ; | |
3736 | else if (!body) | |
3737 | body = deallocate_expr; | |
f30432d7 | 3738 | else |
ee392fc2 NS |
3739 | /* The delete operator mist be called, even if a destructor |
3740 | throws. */ | |
3741 | body = build2 (TRY_FINALLY_EXPR, void_type_node, body, deallocate_expr); | |
c8094d83 | 3742 | |
c7b62f14 NS |
3743 | if (!body) |
3744 | body = integer_zero_node; | |
c8094d83 | 3745 | |
f30432d7 | 3746 | /* Outermost wrapper: If pointer is null, punt. */ |
03ca8fb3 JJ |
3747 | tree cond = build2_loc (input_location, NE_EXPR, boolean_type_node, base, |
3748 | fold_convert (TREE_TYPE (base), nullptr_node)); | |
03a616ac JJ |
3749 | /* This is a compiler generated comparison, don't emit |
3750 | e.g. -Wnonnull-compare warning for it. */ | |
03ca8fb3 JJ |
3751 | TREE_NO_WARNING (cond) = 1; |
3752 | body = build3_loc (input_location, COND_EXPR, void_type_node, | |
3753 | cond, body, integer_zero_node); | |
d5bcd6d4 | 3754 | COND_EXPR_IS_VEC_DELETE (body) = true; |
f30432d7 MS |
3755 | body = build1 (NOP_EXPR, void_type_node, body); |
3756 | ||
3757 | if (controller) | |
3758 | { | |
3759 | TREE_OPERAND (controller, 1) = body; | |
4e8dca1c | 3760 | body = controller; |
f30432d7 | 3761 | } |
4e8dca1c JM |
3762 | |
3763 | if (TREE_CODE (base) == SAVE_EXPR) | |
3764 | /* Pre-evaluate the SAVE_EXPR outside of the BIND_EXPR. */ | |
f293ce4b | 3765 | body = build2 (COMPOUND_EXPR, void_type_node, base, body); |
4e8dca1c | 3766 | |
574cfaa4 | 3767 | return convert_to_void (body, ICV_CAST, complain); |
f30432d7 MS |
3768 | } |
3769 | ||
c8094d83 | 3770 | /* Create an unnamed variable of the indicated TYPE. */ |
c395453c | 3771 | |
f1dedc31 | 3772 | tree |
362efdc1 | 3773 | create_temporary_var (tree type) |
8a72a046 | 3774 | { |
f1dedc31 | 3775 | tree decl; |
c8094d83 | 3776 | |
c2255bc4 AH |
3777 | decl = build_decl (input_location, |
3778 | VAR_DECL, NULL_TREE, type); | |
f1dedc31 MM |
3779 | TREE_USED (decl) = 1; |
3780 | DECL_ARTIFICIAL (decl) = 1; | |
f1dedc31 | 3781 | DECL_IGNORED_P (decl) = 1; |
b35d4555 | 3782 | DECL_CONTEXT (decl) = current_function_decl; |
f1dedc31 | 3783 | |
f1dedc31 | 3784 | return decl; |
8a72a046 MM |
3785 | } |
3786 | ||
f1dedc31 MM |
3787 | /* Create a new temporary variable of the indicated TYPE, initialized |
3788 | to INIT. | |
8a72a046 | 3789 | |
f1dedc31 MM |
3790 | It is not entered into current_binding_level, because that breaks |
3791 | things when it comes time to do final cleanups (which take place | |
3792 | "outside" the binding contour of the function). */ | |
3793 | ||
fe5b5c36 | 3794 | tree |
362efdc1 | 3795 | get_temp_regvar (tree type, tree init) |
f30432d7 | 3796 | { |
f1dedc31 | 3797 | tree decl; |
8a72a046 | 3798 | |
f1dedc31 | 3799 | decl = create_temporary_var (type); |
350fae66 | 3800 | add_decl_expr (decl); |
c8094d83 | 3801 | |
4f2e1536 MP |
3802 | finish_expr_stmt (cp_build_modify_expr (input_location, decl, INIT_EXPR, |
3803 | init, tf_warning_or_error)); | |
8a72a046 | 3804 | |
f1dedc31 | 3805 | return decl; |
f30432d7 MS |
3806 | } |
3807 | ||
024f2d89 JM |
3808 | /* Subroutine of build_vec_init. Returns true if assigning to an array of |
3809 | INNER_ELT_TYPE from INIT is trivial. */ | |
3810 | ||
3811 | static bool | |
3812 | vec_copy_assign_is_trivial (tree inner_elt_type, tree init) | |
3813 | { | |
3814 | tree fromtype = inner_elt_type; | |
72b3e203 | 3815 | if (lvalue_p (init)) |
024f2d89 JM |
3816 | fromtype = cp_build_reference_type (fromtype, /*rval*/false); |
3817 | return is_trivially_xible (MODIFY_EXPR, inner_elt_type, fromtype); | |
3818 | } | |
3819 | ||
f1dedc31 MM |
3820 | /* `build_vec_init' returns tree structure that performs |
3821 | initialization of a vector of aggregate types. | |
8d08fdba | 3822 | |
9207099b JM |
3823 | BASE is a reference to the vector, of ARRAY_TYPE, or a pointer |
3824 | to the first element, of POINTER_TYPE. | |
a48cccea | 3825 | MAXINDEX is the maximum index of the array (one less than the |
9207099b | 3826 | number of elements). It is only used if BASE is a pointer or |
a48cccea | 3827 | TYPE_DOMAIN (TREE_TYPE (BASE)) == NULL_TREE. |
b84f4651 | 3828 | |
8d08fdba MS |
3829 | INIT is the (possibly NULL) initializer. |
3830 | ||
844ae01d JM |
3831 | If EXPLICIT_VALUE_INIT_P is true, then INIT must be NULL. All |
3832 | elements in the array are value-initialized. | |
b84f4651 | 3833 | |
8d08fdba MS |
3834 | FROM_ARRAY is 0 if we should init everything with INIT |
3835 | (i.e., every element initialized from INIT). | |
3836 | FROM_ARRAY is 1 if we should index into INIT in parallel | |
3837 | with initialization of DECL. | |
3838 | FROM_ARRAY is 2 if we should index into INIT in parallel, | |
3839 | but use assignment instead of initialization. */ | |
3840 | ||
3841 | tree | |
3db45ab5 | 3842 | build_vec_init (tree base, tree maxindex, tree init, |
844ae01d | 3843 | bool explicit_value_init_p, |
5ade1ed2 | 3844 | int from_array, tsubst_flags_t complain) |
8d08fdba MS |
3845 | { |
3846 | tree rval; | |
8a72a046 | 3847 | tree base2 = NULL_TREE; |
e833cb11 | 3848 | tree itype = NULL_TREE; |
8a72a046 | 3849 | tree iterator; |
9207099b | 3850 | /* The type of BASE. */ |
f30efcb7 | 3851 | tree atype = TREE_TYPE (base); |
f1dedc31 | 3852 | /* The type of an element in the array. */ |
f30efcb7 | 3853 | tree type = TREE_TYPE (atype); |
c8094d83 | 3854 | /* The element type reached after removing all outer array |
b5af3133 MM |
3855 | types. */ |
3856 | tree inner_elt_type; | |
f1dedc31 MM |
3857 | /* The type of a pointer to an element in the array. */ |
3858 | tree ptype; | |
3859 | tree stmt_expr; | |
3860 | tree compound_stmt; | |
3861 | int destroy_temps; | |
f5984164 | 3862 | tree try_block = NULL_TREE; |
8a72a046 | 3863 | int num_initialized_elts = 0; |
2a3398e1 | 3864 | bool is_global; |
fa2200cb | 3865 | tree obase = base; |
f91352dc | 3866 | bool xvalue = false; |
574cfaa4 | 3867 | bool errors = false; |
c8094d83 | 3868 | |
9207099b | 3869 | if (TREE_CODE (atype) == ARRAY_TYPE && TYPE_DOMAIN (atype)) |
a48cccea JM |
3870 | maxindex = array_type_nelts (atype); |
3871 | ||
ddffee68 | 3872 | if (maxindex == NULL_TREE || maxindex == error_mark_node) |
8d08fdba MS |
3873 | return error_mark_node; |
3874 | ||
cda0a029 | 3875 | maxindex = maybe_constant_value (maxindex); |
844ae01d | 3876 | if (explicit_value_init_p) |
b84f4651 MM |
3877 | gcc_assert (!init); |
3878 | ||
9207099b | 3879 | inner_elt_type = strip_array_types (type); |
567ef749 JM |
3880 | |
3881 | /* Look through the TARGET_EXPR around a compound literal. */ | |
3882 | if (init && TREE_CODE (init) == TARGET_EXPR | |
5a4d8044 JM |
3883 | && TREE_CODE (TARGET_EXPR_INITIAL (init)) == CONSTRUCTOR |
3884 | && from_array != 2) | |
567ef749 JM |
3885 | init = TARGET_EXPR_INITIAL (init); |
3886 | ||
7d5e76c8 JM |
3887 | /* If we have a braced-init-list, make sure that the array |
3888 | is big enough for all the initializers. */ | |
46621807 JM |
3889 | bool length_check = (init && TREE_CODE (init) == CONSTRUCTOR |
3890 | && CONSTRUCTOR_NELTS (init) > 0 | |
3891 | && !TREE_CONSTANT (maxindex)); | |
7d5e76c8 | 3892 | |
c8a3d889 | 3893 | if (init |
25357d1e | 3894 | && TREE_CODE (atype) == ARRAY_TYPE |
06b76c7f | 3895 | && TREE_CONSTANT (maxindex) |
c8a3d889 | 3896 | && (from_array == 2 |
024f2d89 | 3897 | ? vec_copy_assign_is_trivial (inner_elt_type, init) |
c8a3d889 | 3898 | : !TYPE_NEEDS_CONSTRUCTING (type)) |
f30efcb7 JM |
3899 | && ((TREE_CODE (init) == CONSTRUCTOR |
3900 | /* Don't do this if the CONSTRUCTOR might contain something | |
3901 | that might throw and require us to clean up. */ | |
9771b263 | 3902 | && (vec_safe_is_empty (CONSTRUCTOR_ELTS (init)) |
b5af3133 | 3903 | || ! TYPE_HAS_NONTRIVIAL_DESTRUCTOR (inner_elt_type))) |
f30efcb7 JM |
3904 | || from_array)) |
3905 | { | |
c32097d8 | 3906 | /* Do non-default initialization of trivial arrays resulting from |
f30efcb7 JM |
3907 | brace-enclosed initializers. In this case, digest_init and |
3908 | store_constructor will handle the semantics for us. */ | |
3909 | ||
a47c2f62 JM |
3910 | if (BRACE_ENCLOSED_INITIALIZER_P (init)) |
3911 | init = digest_init (atype, init, complain); | |
f293ce4b | 3912 | stmt_expr = build2 (INIT_EXPR, atype, base, init); |
f30efcb7 JM |
3913 | return stmt_expr; |
3914 | } | |
3915 | ||
4b978f96 | 3916 | maxindex = cp_convert (ptrdiff_type_node, maxindex, complain); |
cda0a029 JM |
3917 | maxindex = fold_simple (maxindex); |
3918 | ||
9207099b JM |
3919 | if (TREE_CODE (atype) == ARRAY_TYPE) |
3920 | { | |
3921 | ptype = build_pointer_type (type); | |
89fcabaf PC |
3922 | base = decay_conversion (base, complain); |
3923 | if (base == error_mark_node) | |
3924 | return error_mark_node; | |
4b978f96 | 3925 | base = cp_convert (ptype, base, complain); |
9207099b JM |
3926 | } |
3927 | else | |
3928 | ptype = atype; | |
8d08fdba | 3929 | |
f1dedc31 | 3930 | /* The code we are generating looks like: |
303b7406 | 3931 | ({ |
f1dedc31 | 3932 | T* t1 = (T*) base; |
f30efcb7 | 3933 | T* rval = t1; |
f1dedc31 MM |
3934 | ptrdiff_t iterator = maxindex; |
3935 | try { | |
4977bab6 | 3936 | for (; iterator != -1; --iterator) { |
f30efcb7 JM |
3937 | ... initialize *t1 ... |
3938 | ++t1; | |
4977bab6 | 3939 | } |
f1dedc31 | 3940 | } catch (...) { |
0cbd7506 | 3941 | ... destroy elements that were constructed ... |
f1dedc31 | 3942 | } |
303b7406 NS |
3943 | rval; |
3944 | }) | |
c8094d83 | 3945 | |
f1dedc31 MM |
3946 | We can omit the try and catch blocks if we know that the |
3947 | initialization will never throw an exception, or if the array | |
f30efcb7 | 3948 | elements do not have destructors. We can omit the loop completely if |
c8094d83 | 3949 | the elements of the array do not have constructors. |
f1dedc31 MM |
3950 | |
3951 | We actually wrap the entire body of the above in a STMT_EXPR, for | |
c8094d83 | 3952 | tidiness. |
f1dedc31 MM |
3953 | |
3954 | When copying from array to another, when the array elements have | |
3955 | only trivial copy constructors, we should use __builtin_memcpy | |
3956 | rather than generating a loop. That way, we could take advantage | |
3b426391 | 3957 | of whatever cleverness the back end has for dealing with copies |
f1dedc31 MM |
3958 | of blocks of memory. */ |
3959 | ||
2a3398e1 | 3960 | is_global = begin_init_stmts (&stmt_expr, &compound_stmt); |
f2c5f623 | 3961 | destroy_temps = stmts_are_full_exprs_p (); |
ae499cce | 3962 | current_stmt_tree ()->stmts_are_full_exprs_p = 0; |
f30efcb7 | 3963 | rval = get_temp_regvar (ptype, base); |
f1dedc31 | 3964 | base = get_temp_regvar (ptype, rval); |
8a72a046 | 3965 | iterator = get_temp_regvar (ptrdiff_type_node, maxindex); |
8d08fdba | 3966 | |
5a4d8044 JM |
3967 | /* If initializing one array from another, initialize element by |
3968 | element. We rely upon the below calls to do the argument | |
3969 | checking. Evaluate the initializer before entering the try block. */ | |
3970 | if (from_array && init && TREE_CODE (init) != CONSTRUCTOR) | |
3971 | { | |
f91352dc JM |
3972 | if (lvalue_kind (init) & clk_rvalueref) |
3973 | xvalue = true; | |
89fcabaf PC |
3974 | base2 = decay_conversion (init, complain); |
3975 | if (base2 == error_mark_node) | |
3976 | return error_mark_node; | |
5a4d8044 JM |
3977 | itype = TREE_TYPE (base2); |
3978 | base2 = get_temp_regvar (itype, base2); | |
3979 | itype = TREE_TYPE (itype); | |
3980 | } | |
3981 | ||
8a72a046 | 3982 | /* Protect the entire array initialization so that we can destroy |
f30efcb7 JM |
3983 | the partially constructed array if an exception is thrown. |
3984 | But don't do this if we're assigning. */ | |
3985 | if (flag_exceptions && TYPE_HAS_NONTRIVIAL_DESTRUCTOR (type) | |
3986 | && from_array != 2) | |
ed5511d9 MM |
3987 | { |
3988 | try_block = begin_try_block (); | |
ed5511d9 | 3989 | } |
8a72a046 | 3990 | |
c0014b07 JM |
3991 | /* Should we try to create a constant initializer? */ |
3992 | bool try_const = (TREE_CODE (atype) == ARRAY_TYPE | |
3993 | && TREE_CONSTANT (maxindex) | |
a02f26f6 JM |
3994 | && (init ? TREE_CODE (init) == CONSTRUCTOR |
3995 | : (type_has_constexpr_default_constructor | |
3996 | (inner_elt_type))) | |
c0014b07 JM |
3997 | && (literal_type_p (inner_elt_type) |
3998 | || TYPE_HAS_CONSTEXPR_CTOR (inner_elt_type))); | |
3999 | vec<constructor_elt, va_gc> *const_vec = NULL; | |
4000 | bool saw_non_const = false; | |
4001 | /* If we're initializing a static array, we want to do static | |
4002 | initialization of any elements with constant initializers even if | |
4003 | some are non-constant. */ | |
4004 | bool do_static_init = (DECL_P (obase) && TREE_STATIC (obase)); | |
4005 | ||
3bc63227 | 4006 | bool empty_list = false; |
1f65a8c8 JM |
4007 | if (init && BRACE_ENCLOSED_INITIALIZER_P (init) |
4008 | && CONSTRUCTOR_NELTS (init) == 0) | |
3bc63227 JM |
4009 | /* Skip over the handling of non-empty init lists. */ |
4010 | empty_list = true; | |
1f65a8c8 | 4011 | |
fa2200cb JM |
4012 | /* Maybe pull out constant value when from_array? */ |
4013 | ||
1f65a8c8 | 4014 | else if (init != NULL_TREE && TREE_CODE (init) == CONSTRUCTOR) |
8d08fdba | 4015 | { |
c32097d8 | 4016 | /* Do non-default initialization of non-trivial arrays resulting from |
f30efcb7 | 4017 | brace-enclosed initializers. */ |
4038c495 | 4018 | unsigned HOST_WIDE_INT idx; |
fa2200cb | 4019 | tree field, elt; |
b25dd954 JM |
4020 | /* If the constructor already has the array type, it's been through |
4021 | digest_init, so we shouldn't try to do anything more. */ | |
4022 | bool digested = same_type_p (atype, TREE_TYPE (init)); | |
094fe153 JM |
4023 | from_array = 0; |
4024 | ||
7d5e76c8 JM |
4025 | if (length_check) |
4026 | { | |
24f1db9c RB |
4027 | tree nelts = build_int_cst (ptrdiff_type_node, |
4028 | CONSTRUCTOR_NELTS (init) - 1); | |
46621807 JM |
4029 | if (TREE_CODE (atype) != ARRAY_TYPE) |
4030 | { | |
4031 | if (flag_exceptions) | |
4032 | { | |
4033 | tree c = fold_build2 (LT_EXPR, boolean_type_node, iterator, | |
4034 | nelts); | |
4035 | c = build3 (COND_EXPR, void_type_node, c, | |
4036 | throw_bad_array_new_length (), void_node); | |
4037 | finish_expr_stmt (c); | |
4038 | } | |
4039 | /* Don't check an array new when -fno-exceptions. */ | |
4040 | } | |
4041 | else if (flag_sanitize & SANITIZE_BOUNDS | |
f5481fc4 | 4042 | && do_ubsan_in_current_function ()) |
46621807 JM |
4043 | { |
4044 | /* Make sure the last element of the initializer is in bounds. */ | |
4045 | finish_expr_stmt | |
4046 | (ubsan_instrument_bounds | |
4047 | (input_location, obase, &nelts, /*ignore_off_by_one*/false)); | |
4048 | } | |
7d5e76c8 JM |
4049 | } |
4050 | ||
fa2200cb | 4051 | if (try_const) |
c0014b07 | 4052 | vec_alloc (const_vec, CONSTRUCTOR_NELTS (init)); |
fa2200cb JM |
4053 | |
4054 | FOR_EACH_CONSTRUCTOR_ELT (CONSTRUCTOR_ELTS (init), idx, field, elt) | |
8d08fdba | 4055 | { |
f1dedc31 | 4056 | tree baseref = build1 (INDIRECT_REF, type, base); |
fa2200cb | 4057 | tree one_init; |
8d08fdba | 4058 | |
8a72a046 | 4059 | num_initialized_elts++; |
8d08fdba | 4060 | |
67c03833 | 4061 | current_stmt_tree ()->stmts_are_full_exprs_p = 1; |
b25dd954 JM |
4062 | if (digested) |
4063 | one_init = build2 (INIT_EXPR, type, baseref, elt); | |
4064 | else if (MAYBE_CLASS_TYPE_P (type) || TREE_CODE (type) == ARRAY_TYPE) | |
fa2200cb | 4065 | one_init = build_aggr_init (baseref, elt, 0, complain); |
8a72a046 | 4066 | else |
4f2e1536 MP |
4067 | one_init = cp_build_modify_expr (input_location, baseref, |
4068 | NOP_EXPR, elt, complain); | |
574cfaa4 JM |
4069 | if (one_init == error_mark_node) |
4070 | errors = true; | |
fa2200cb JM |
4071 | if (try_const) |
4072 | { | |
c0014b07 | 4073 | tree e = maybe_constant_init (one_init); |
fa2200cb JM |
4074 | if (reduced_constant_expression_p (e)) |
4075 | { | |
c0014b07 | 4076 | CONSTRUCTOR_APPEND_ELT (const_vec, field, e); |
fa2200cb JM |
4077 | if (do_static_init) |
4078 | one_init = NULL_TREE; | |
4079 | else | |
4080 | one_init = build2 (INIT_EXPR, type, baseref, e); | |
fa2200cb JM |
4081 | } |
4082 | else | |
4083 | { | |
4084 | if (do_static_init) | |
f11c7048 JJ |
4085 | { |
4086 | tree value = build_zero_init (TREE_TYPE (e), NULL_TREE, | |
4087 | true); | |
4088 | if (value) | |
c0014b07 | 4089 | CONSTRUCTOR_APPEND_ELT (const_vec, field, value); |
f11c7048 | 4090 | } |
fa2200cb JM |
4091 | saw_non_const = true; |
4092 | } | |
4093 | } | |
4094 | ||
4095 | if (one_init) | |
4096 | finish_expr_stmt (one_init); | |
67c03833 | 4097 | current_stmt_tree ()->stmts_are_full_exprs_p = 0; |
8a72a046 | 4098 | |
574cfaa4 JM |
4099 | one_init = cp_build_unary_op (PREINCREMENT_EXPR, base, 0, complain); |
4100 | if (one_init == error_mark_node) | |
4101 | errors = true; | |
4102 | else | |
4103 | finish_expr_stmt (one_init); | |
4104 | ||
4105 | one_init = cp_build_unary_op (PREDECREMENT_EXPR, iterator, 0, | |
4106 | complain); | |
4107 | if (one_init == error_mark_node) | |
4108 | errors = true; | |
4109 | else | |
4110 | finish_expr_stmt (one_init); | |
8d08fdba | 4111 | } |
8d08fdba | 4112 | |
3bc63227 JM |
4113 | /* Any elements without explicit initializers get T{}. */ |
4114 | empty_list = true; | |
8d08fdba | 4115 | } |
8a72a046 | 4116 | else if (from_array) |
8d08fdba | 4117 | { |
8a72a046 | 4118 | if (init) |
5a4d8044 | 4119 | /* OK, we set base2 above. */; |
95552437 | 4120 | else if (CLASS_TYPE_P (type) |
8a72a046 MM |
4121 | && ! TYPE_HAS_DEFAULT_CONSTRUCTOR (type)) |
4122 | { | |
5ade1ed2 DG |
4123 | if (complain & tf_error) |
4124 | error ("initializer ends prematurely"); | |
574cfaa4 | 4125 | errors = true; |
8a72a046 MM |
4126 | } |
4127 | } | |
8d08fdba | 4128 | |
8a72a046 MM |
4129 | /* Now, default-initialize any remaining elements. We don't need to |
4130 | do that if a) the type does not need constructing, or b) we've | |
094fe153 JM |
4131 | already initialized all the elements. |
4132 | ||
4133 | We do need to keep going if we're copying an array. */ | |
4134 | ||
a02f26f6 JM |
4135 | if (try_const && !init) |
4136 | /* With a constexpr default constructor, which we checked for when | |
4137 | setting try_const above, default-initialization is equivalent to | |
4138 | value-initialization, and build_value_init gives us something more | |
4139 | friendly to maybe_constant_init. */ | |
4140 | explicit_value_init_p = true; | |
094fe153 | 4141 | if (from_array |
1f65a8c8 | 4142 | || ((type_build_ctor_call (type) || init || explicit_value_init_p) |
9541ffee | 4143 | && ! (tree_fits_shwi_p (maxindex) |
05bccae2 | 4144 | && (num_initialized_elts |
9439e9a1 | 4145 | == tree_to_shwi (maxindex) + 1)))) |
8a72a046 | 4146 | { |
5453bfed | 4147 | /* If the ITERATOR is lesser or equal to -1, then we don't have to loop; |
8a72a046 | 4148 | we've already initialized all the elements. */ |
4977bab6 | 4149 | tree for_stmt; |
f1dedc31 | 4150 | tree elt_init; |
b84f4651 | 4151 | tree to; |
f1dedc31 | 4152 | |
3f43ac31 | 4153 | for_stmt = begin_for_stmt (NULL_TREE, NULL_TREE); |
4977bab6 | 4154 | finish_for_init_stmt (for_stmt); |
5453bfed | 4155 | finish_for_cond (build2 (GT_EXPR, boolean_type_node, iterator, |
aab384ae | 4156 | build_int_cst (TREE_TYPE (iterator), -1)), |
c5028d80 | 4157 | for_stmt, false); |
574cfaa4 JM |
4158 | elt_init = cp_build_unary_op (PREDECREMENT_EXPR, iterator, 0, |
4159 | complain); | |
4160 | if (elt_init == error_mark_node) | |
4161 | errors = true; | |
4162 | finish_for_expr (elt_init, for_stmt); | |
8d08fdba | 4163 | |
b84f4651 MM |
4164 | to = build1 (INDIRECT_REF, type, base); |
4165 | ||
ced2fb08 JM |
4166 | /* If the initializer is {}, then all elements are initialized from T{}. |
4167 | But for non-classes, that's the same as value-initialization. */ | |
4168 | if (empty_list) | |
4169 | { | |
4170 | if (cxx_dialect >= cxx11 && AGGREGATE_TYPE_P (type)) | |
4171 | { | |
08227658 | 4172 | init = build_constructor (init_list_type_node, NULL); |
ced2fb08 JM |
4173 | } |
4174 | else | |
4175 | { | |
4176 | init = NULL_TREE; | |
4177 | explicit_value_init_p = true; | |
4178 | } | |
4179 | } | |
4180 | ||
8d08fdba MS |
4181 | if (from_array) |
4182 | { | |
8d08fdba MS |
4183 | tree from; |
4184 | ||
4185 | if (base2) | |
f91352dc JM |
4186 | { |
4187 | from = build1 (INDIRECT_REF, itype, base2); | |
4188 | if (xvalue) | |
4189 | from = move (from); | |
4190 | } | |
8d08fdba MS |
4191 | else |
4192 | from = NULL_TREE; | |
4193 | ||
4194 | if (from_array == 2) | |
4f2e1536 MP |
4195 | elt_init = cp_build_modify_expr (input_location, to, NOP_EXPR, |
4196 | from, complain); | |
95552437 | 4197 | else if (type_build_ctor_call (type)) |
5ade1ed2 | 4198 | elt_init = build_aggr_init (to, from, 0, complain); |
8d08fdba | 4199 | else if (from) |
4f2e1536 | 4200 | elt_init = cp_build_modify_expr (input_location, to, NOP_EXPR, from, |
5ade1ed2 | 4201 | complain); |
8d08fdba | 4202 | else |
8dc2b103 | 4203 | gcc_unreachable (); |
8d08fdba MS |
4204 | } |
4205 | else if (TREE_CODE (type) == ARRAY_TYPE) | |
4206 | { | |
16b53405 | 4207 | if (init && !BRACE_ENCLOSED_INITIALIZER_P (init)) |
f30efcb7 JM |
4208 | sorry |
4209 | ("cannot initialize multi-dimensional array with initializer"); | |
4210 | elt_init = build_vec_init (build1 (INDIRECT_REF, type, base), | |
16b53405 | 4211 | 0, init, |
844ae01d | 4212 | explicit_value_init_p, |
5ade1ed2 | 4213 | 0, complain); |
f1dedc31 | 4214 | } |
844ae01d | 4215 | else if (explicit_value_init_p) |
309714d4 JM |
4216 | { |
4217 | elt_init = build_value_init (type, complain); | |
574cfaa4 | 4218 | if (elt_init != error_mark_node) |
309714d4 JM |
4219 | elt_init = build2 (INIT_EXPR, type, to, elt_init); |
4220 | } | |
f1dedc31 | 4221 | else |
844ae01d | 4222 | { |
1f65a8c8 JM |
4223 | gcc_assert (type_build_ctor_call (type) || init); |
4224 | if (CLASS_TYPE_P (type)) | |
4225 | elt_init = build_aggr_init (to, init, 0, complain); | |
4226 | else | |
4227 | { | |
4228 | if (TREE_CODE (init) == TREE_LIST) | |
4229 | init = build_x_compound_expr_from_list (init, ELK_INIT, | |
4230 | complain); | |
4231 | elt_init = build2 (INIT_EXPR, type, to, init); | |
4232 | } | |
844ae01d | 4233 | } |
c8094d83 | 4234 | |
574cfaa4 JM |
4235 | if (elt_init == error_mark_node) |
4236 | errors = true; | |
4237 | ||
c0014b07 JM |
4238 | if (try_const) |
4239 | { | |
a02f26f6 | 4240 | /* FIXME refs to earlier elts */ |
c0014b07 JM |
4241 | tree e = maybe_constant_init (elt_init); |
4242 | if (reduced_constant_expression_p (e)) | |
4243 | { | |
4244 | if (initializer_zerop (e)) | |
4245 | /* Don't fill the CONSTRUCTOR with zeros. */ | |
4246 | e = NULL_TREE; | |
4247 | if (do_static_init) | |
4248 | elt_init = NULL_TREE; | |
4249 | } | |
4250 | else | |
4251 | { | |
4252 | saw_non_const = true; | |
4253 | if (do_static_init) | |
4254 | e = build_zero_init (TREE_TYPE (e), NULL_TREE, true); | |
a02f26f6 JM |
4255 | else |
4256 | e = NULL_TREE; | |
c0014b07 JM |
4257 | } |
4258 | ||
4259 | if (e) | |
4260 | { | |
4261 | int max = tree_to_shwi (maxindex)+1; | |
4262 | for (; num_initialized_elts < max; ++num_initialized_elts) | |
4263 | { | |
4264 | tree field = size_int (num_initialized_elts); | |
4265 | CONSTRUCTOR_APPEND_ELT (const_vec, field, e); | |
4266 | } | |
4267 | } | |
4268 | } | |
4269 | ||
2a3398e1 | 4270 | current_stmt_tree ()->stmts_are_full_exprs_p = 1; |
c0014b07 JM |
4271 | if (elt_init) |
4272 | finish_expr_stmt (elt_init); | |
2a3398e1 | 4273 | current_stmt_tree ()->stmts_are_full_exprs_p = 0; |
8d08fdba | 4274 | |
5ade1ed2 DG |
4275 | finish_expr_stmt (cp_build_unary_op (PREINCREMENT_EXPR, base, 0, |
4276 | complain)); | |
8d08fdba | 4277 | if (base2) |
5ade1ed2 DG |
4278 | finish_expr_stmt (cp_build_unary_op (PREINCREMENT_EXPR, base2, 0, |
4279 | complain)); | |
0fac6b0b | 4280 | |
4977bab6 | 4281 | finish_for_stmt (for_stmt); |
8d08fdba | 4282 | } |
8a72a046 MM |
4283 | |
4284 | /* Make sure to cleanup any partially constructed elements. */ | |
f30efcb7 JM |
4285 | if (flag_exceptions && TYPE_HAS_NONTRIVIAL_DESTRUCTOR (type) |
4286 | && from_array != 2) | |
f1dedc31 MM |
4287 | { |
4288 | tree e; | |
ba47d38d AH |
4289 | tree m = cp_build_binary_op (input_location, |
4290 | MINUS_EXPR, maxindex, iterator, | |
5ade1ed2 | 4291 | complain); |
b2153b98 KL |
4292 | |
4293 | /* Flatten multi-dimensional array since build_vec_delete only | |
4294 | expects one-dimensional array. */ | |
4295 | if (TREE_CODE (type) == ARRAY_TYPE) | |
ba47d38d AH |
4296 | m = cp_build_binary_op (input_location, |
4297 | MULT_EXPR, m, | |
99c4346a JM |
4298 | /* Avoid mixing signed and unsigned. */ |
4299 | convert (TREE_TYPE (m), | |
4300 | array_type_nelts_total (type)), | |
5ade1ed2 | 4301 | complain); |
8d08fdba | 4302 | |
ed5511d9 | 4303 | finish_cleanup_try_block (try_block); |
c8094d83 | 4304 | e = build_vec_delete_1 (rval, m, |
e79a6b40 | 4305 | inner_elt_type, sfk_complete_destructor, |
574cfaa4 JM |
4306 | /*use_global_delete=*/0, complain); |
4307 | if (e == error_mark_node) | |
4308 | errors = true; | |
f1dedc31 MM |
4309 | finish_cleanup (e, try_block); |
4310 | } | |
4311 | ||
303b7406 NS |
4312 | /* The value of the array initialization is the array itself, RVAL |
4313 | is a pointer to the first element. */ | |
325c3691 | 4314 | finish_stmt_expr_expr (rval, stmt_expr); |
f1dedc31 | 4315 | |
2a3398e1 | 4316 | stmt_expr = finish_init_stmts (is_global, stmt_expr, compound_stmt); |
303b7406 | 4317 | |
5fb4d142 JM |
4318 | current_stmt_tree ()->stmts_are_full_exprs_p = destroy_temps; |
4319 | ||
4320 | if (errors) | |
4321 | return error_mark_node; | |
c0014b07 JM |
4322 | |
4323 | if (try_const) | |
4324 | { | |
4325 | if (!saw_non_const) | |
4326 | { | |
4327 | tree const_init = build_constructor (atype, const_vec); | |
4328 | return build2 (INIT_EXPR, atype, obase, const_init); | |
4329 | } | |
4330 | else if (do_static_init && !vec_safe_is_empty (const_vec)) | |
4331 | DECL_INITIAL (obase) = build_constructor (atype, const_vec); | |
4332 | else | |
4333 | vec_free (const_vec); | |
4334 | } | |
5fb4d142 | 4335 | |
9207099b JM |
4336 | /* Now make the result have the correct type. */ |
4337 | if (TREE_CODE (atype) == ARRAY_TYPE) | |
4338 | { | |
4339 | atype = build_pointer_type (atype); | |
4340 | stmt_expr = build1 (NOP_EXPR, atype, stmt_expr); | |
dd865ef6 | 4341 | stmt_expr = cp_build_indirect_ref (stmt_expr, RO_NULL, complain); |
311fa510 | 4342 | TREE_NO_WARNING (stmt_expr) = 1; |
9207099b | 4343 | } |
c8094d83 | 4344 | |
f1dedc31 | 4345 | return stmt_expr; |
8d08fdba MS |
4346 | } |
4347 | ||
86f45d2c MM |
4348 | /* Call the DTOR_KIND destructor for EXP. FLAGS are as for |
4349 | build_delete. */ | |
298d6f60 MM |
4350 | |
4351 | static tree | |
574cfaa4 JM |
4352 | build_dtor_call (tree exp, special_function_kind dtor_kind, int flags, |
4353 | tsubst_flags_t complain) | |
298d6f60 | 4354 | { |
86f45d2c | 4355 | tree name; |
ee76b931 | 4356 | tree fn; |
86f45d2c MM |
4357 | switch (dtor_kind) |
4358 | { | |
4359 | case sfk_complete_destructor: | |
4360 | name = complete_dtor_identifier; | |
4361 | break; | |
4362 | ||
4363 | case sfk_base_destructor: | |
4364 | name = base_dtor_identifier; | |
4365 | break; | |
4366 | ||
4367 | case sfk_deleting_destructor: | |
4368 | name = deleting_dtor_identifier; | |
4369 | break; | |
4370 | ||
4371 | default: | |
8dc2b103 | 4372 | gcc_unreachable (); |
86f45d2c | 4373 | } |
ee76b931 | 4374 | fn = lookup_fnfields (TREE_TYPE (exp), name, /*protect=*/2); |
c8094d83 | 4375 | return build_new_method_call (exp, fn, |
c166b898 | 4376 | /*args=*/NULL, |
ee76b931 | 4377 | /*conversion_path=*/NULL_TREE, |
63c9a190 | 4378 | flags, |
5ade1ed2 | 4379 | /*fn_p=*/NULL, |
574cfaa4 | 4380 | complain); |
298d6f60 MM |
4381 | } |
4382 | ||
8d08fdba MS |
4383 | /* Generate a call to a destructor. TYPE is the type to cast ADDR to. |
4384 | ADDR is an expression which yields the store to be destroyed. | |
86f45d2c MM |
4385 | AUTO_DELETE is the name of the destructor to call, i.e., either |
4386 | sfk_complete_destructor, sfk_base_destructor, or | |
4387 | sfk_deleting_destructor. | |
8d08fdba MS |
4388 | |
4389 | FLAGS is the logical disjunction of zero or more LOOKUP_ | |
ade3dc07 | 4390 | flags. See cp-tree.h for more info. */ |
e92cc029 | 4391 | |
8d08fdba | 4392 | tree |
eca7fc57 | 4393 | build_delete (tree otype, tree addr, special_function_kind auto_delete, |
574cfaa4 | 4394 | int flags, int use_global_delete, tsubst_flags_t complain) |
8d08fdba | 4395 | { |
8d08fdba | 4396 | tree expr; |
8d08fdba MS |
4397 | |
4398 | if (addr == error_mark_node) | |
4399 | return error_mark_node; | |
4400 | ||
eca7fc57 JM |
4401 | tree type = TYPE_MAIN_VARIANT (otype); |
4402 | ||
8d08fdba MS |
4403 | /* Can happen when CURRENT_EXCEPTION_OBJECT gets its type |
4404 | set to `error_mark_node' before it gets properly cleaned up. */ | |
4405 | if (type == error_mark_node) | |
4406 | return error_mark_node; | |
4407 | ||
eca7fc57 JM |
4408 | if (TREE_CODE (type) == POINTER_TYPE) |
4409 | type = TYPE_MAIN_VARIANT (TREE_TYPE (type)); | |
8d08fdba | 4410 | |
eca7fc57 JM |
4411 | if (TREE_CODE (type) == ARRAY_TYPE) |
4412 | { | |
4413 | if (TYPE_DOMAIN (type) == NULL_TREE) | |
4414 | { | |
4415 | if (complain & tf_error) | |
4416 | error ("unknown array size in delete"); | |
4417 | return error_mark_node; | |
4418 | } | |
4419 | return build_vec_delete (addr, array_type_nelts (type), | |
4420 | auto_delete, use_global_delete, complain); | |
4421 | } | |
03a904b5 | 4422 | |
eca7fc57 | 4423 | if (TYPE_PTR_P (otype)) |
8d08fdba | 4424 | { |
eca7fc57 | 4425 | addr = mark_rvalue_use (addr); |
23b4deba | 4426 | |
b1e5b86c GB |
4427 | /* We don't want to warn about delete of void*, only other |
4428 | incomplete types. Deleting other incomplete types | |
4429 | invokes undefined behavior, but it is not ill-formed, so | |
4430 | compile to something that would even do The Right Thing | |
4431 | (TM) should the type have a trivial dtor and no delete | |
4432 | operator. */ | |
4433 | if (!VOID_TYPE_P (type)) | |
8d08fdba | 4434 | { |
b1e5b86c GB |
4435 | complete_type (type); |
4436 | if (!COMPLETE_TYPE_P (type)) | |
4437 | { | |
574cfaa4 | 4438 | if ((complain & tf_warning) |
c9b0866a PC |
4439 | && warning (OPT_Wdelete_incomplete, |
4440 | "possible problem detected in invocation of " | |
574cfaa4 | 4441 | "delete operator:")) |
71205d17 MLI |
4442 | { |
4443 | cxx_incomplete_type_diagnostic (addr, type, DK_WARNING); | |
c9b0866a PC |
4444 | inform (input_location, |
4445 | "neither the destructor nor the class-specific " | |
71205d17 | 4446 | "operator delete will be called, even if they are " |
d8a07487 | 4447 | "declared when the class is defined"); |
71205d17 | 4448 | } |
b1e5b86c | 4449 | } |
e2ab8a0f JW |
4450 | else if (auto_delete == sfk_deleting_destructor && warn_delnonvdtor |
4451 | && MAYBE_CLASS_TYPE_P (type) && !CLASSTYPE_FINAL (type) | |
4452 | && TYPE_POLYMORPHIC_P (type)) | |
014ab419 JW |
4453 | { |
4454 | tree dtor; | |
4455 | dtor = CLASSTYPE_DESTRUCTORS (type); | |
4456 | if (!dtor || !DECL_VINDEX (dtor)) | |
4457 | { | |
4458 | if (CLASSTYPE_PURE_VIRTUALS (type)) | |
4459 | warning (OPT_Wdelete_non_virtual_dtor, | |
4460 | "deleting object of abstract class type %qT" | |
4461 | " which has non-virtual destructor" | |
9c582551 | 4462 | " will cause undefined behavior", type); |
014ab419 JW |
4463 | else |
4464 | warning (OPT_Wdelete_non_virtual_dtor, | |
4465 | "deleting object of polymorphic class type %qT" | |
4466 | " which has non-virtual destructor" | |
9c582551 | 4467 | " might cause undefined behavior", type); |
014ab419 JW |
4468 | } |
4469 | } | |
8d08fdba MS |
4470 | } |
4471 | if (TREE_SIDE_EFFECTS (addr)) | |
4472 | addr = save_expr (addr); | |
2986ae00 | 4473 | |
f4f206f4 | 4474 | /* Throw away const and volatile on target type of addr. */ |
4b978f96 | 4475 | addr = convert_force (build_pointer_type (type), addr, 0, complain); |
8d08fdba | 4476 | } |
8d08fdba MS |
4477 | else |
4478 | { | |
4479 | /* Don't check PROTECT here; leave that decision to the | |
4480 | destructor. If the destructor is accessible, call it, | |
4481 | else report error. */ | |
574cfaa4 JM |
4482 | addr = cp_build_addr_expr (addr, complain); |
4483 | if (addr == error_mark_node) | |
4484 | return error_mark_node; | |
8d08fdba MS |
4485 | if (TREE_SIDE_EFFECTS (addr)) |
4486 | addr = save_expr (addr); | |
4487 | ||
4b978f96 | 4488 | addr = convert_force (build_pointer_type (type), addr, 0, complain); |
8d08fdba MS |
4489 | } |
4490 | ||
834c6dff | 4491 | if (TYPE_HAS_TRIVIAL_DESTRUCTOR (type)) |
8d08fdba | 4492 | { |
eca7fc57 JM |
4493 | /* Make sure the destructor is callable. */ |
4494 | if (type_build_dtor_call (type)) | |
4495 | { | |
4496 | expr = build_dtor_call (cp_build_indirect_ref (addr, RO_NULL, | |
4497 | complain), | |
4498 | sfk_complete_destructor, flags, complain); | |
4499 | if (expr == error_mark_node) | |
4500 | return error_mark_node; | |
4501 | } | |
4502 | ||
60696c53 | 4503 | if (auto_delete != sfk_deleting_destructor) |
632f2871 | 4504 | return void_node; |
8d08fdba | 4505 | |
3db45ab5 MS |
4506 | return build_op_delete_call (DELETE_EXPR, addr, |
4507 | cxx_sizeof_nowarn (type), | |
63c9a190 MM |
4508 | use_global_delete, |
4509 | /*placement=*/NULL_TREE, | |
4b978f96 PC |
4510 | /*alloc_fn=*/NULL_TREE, |
4511 | complain); | |
8d08fdba | 4512 | } |
ade3dc07 | 4513 | else |
8d08fdba | 4514 | { |
6f06d231 | 4515 | tree head = NULL_TREE; |
700f8a87 | 4516 | tree do_delete = NULL_TREE; |
bd6dd845 | 4517 | tree ifexp; |
700f8a87 | 4518 | |
9f4faeae MM |
4519 | if (CLASSTYPE_LAZY_DESTRUCTOR (type)) |
4520 | lazily_declare_fn (sfk_destructor, type); | |
ade3dc07 | 4521 | |
52682a1b MM |
4522 | /* For `::delete x', we must not use the deleting destructor |
4523 | since then we would not be sure to get the global `operator | |
4524 | delete'. */ | |
86f45d2c | 4525 | if (use_global_delete && auto_delete == sfk_deleting_destructor) |
700f8a87 | 4526 | { |
1b4a93f7 MM |
4527 | /* We will use ADDR multiple times so we must save it. */ |
4528 | addr = save_expr (addr); | |
6f06d231 | 4529 | head = get_target_expr (build_headof (addr)); |
c6002625 | 4530 | /* Delete the object. */ |
20b06add JM |
4531 | do_delete = build_op_delete_call (DELETE_EXPR, |
4532 | head, | |
4533 | cxx_sizeof_nowarn (type), | |
4534 | /*global_p=*/true, | |
4535 | /*placement=*/NULL_TREE, | |
4536 | /*alloc_fn=*/NULL_TREE, | |
4537 | complain); | |
86f45d2c MM |
4538 | /* Otherwise, treat this like a complete object destructor |
4539 | call. */ | |
4540 | auto_delete = sfk_complete_destructor; | |
700f8a87 | 4541 | } |
52682a1b MM |
4542 | /* If the destructor is non-virtual, there is no deleting |
4543 | variant. Instead, we must explicitly call the appropriate | |
4544 | `operator delete' here. */ | |
4545 | else if (!DECL_VIRTUAL_P (CLASSTYPE_DESTRUCTORS (type)) | |
4546 | && auto_delete == sfk_deleting_destructor) | |
4547 | { | |
1b4a93f7 MM |
4548 | /* We will use ADDR multiple times so we must save it. */ |
4549 | addr = save_expr (addr); | |
4550 | /* Build the call. */ | |
52682a1b MM |
4551 | do_delete = build_op_delete_call (DELETE_EXPR, |
4552 | addr, | |
ea793912 | 4553 | cxx_sizeof_nowarn (type), |
5bd61841 | 4554 | /*global_p=*/false, |
63c9a190 | 4555 | /*placement=*/NULL_TREE, |
4b978f96 PC |
4556 | /*alloc_fn=*/NULL_TREE, |
4557 | complain); | |
52682a1b MM |
4558 | /* Call the complete object destructor. */ |
4559 | auto_delete = sfk_complete_destructor; | |
4560 | } | |
e3fe84e5 JM |
4561 | else if (auto_delete == sfk_deleting_destructor |
4562 | && TYPE_GETS_REG_DELETE (type)) | |
4563 | { | |
4564 | /* Make sure we have access to the member op delete, even though | |
4565 | we'll actually be calling it from the destructor. */ | |
ea793912 | 4566 | build_op_delete_call (DELETE_EXPR, addr, cxx_sizeof_nowarn (type), |
3db45ab5 | 4567 | /*global_p=*/false, |
63c9a190 | 4568 | /*placement=*/NULL_TREE, |
4b978f96 PC |
4569 | /*alloc_fn=*/NULL_TREE, |
4570 | complain); | |
e3fe84e5 | 4571 | } |
8d08fdba | 4572 | |
574cfaa4 JM |
4573 | expr = build_dtor_call (cp_build_indirect_ref (addr, RO_NULL, complain), |
4574 | auto_delete, flags, complain); | |
4575 | if (expr == error_mark_node) | |
4576 | return error_mark_node; | |
bd6dd845 | 4577 | if (do_delete) |
ee392fc2 NS |
4578 | /* The delete operator must be called, regardless of whether |
4579 | the destructor throws. | |
4580 | ||
4581 | [expr.delete]/7 The deallocation function is called | |
4582 | regardless of whether the destructor for the object or some | |
4583 | element of the array throws an exception. */ | |
4584 | expr = build2 (TRY_FINALLY_EXPR, void_type_node, expr, do_delete); | |
9e9ff709 | 4585 | |
6f06d231 JM |
4586 | /* We need to calculate this before the dtor changes the vptr. */ |
4587 | if (head) | |
4588 | expr = build2 (COMPOUND_EXPR, void_type_node, head, expr); | |
4589 | ||
bd6dd845 MS |
4590 | if (flags & LOOKUP_DESTRUCTOR) |
4591 | /* Explicit destructor call; don't check for null pointer. */ | |
4592 | ifexp = integer_one_node; | |
8d08fdba | 4593 | else |
574cfaa4 JM |
4594 | { |
4595 | /* Handle deleting a null pointer. */ | |
458cd4c3 | 4596 | warning_sentinel s (warn_address); |
03ca8fb3 JJ |
4597 | ifexp = cp_build_binary_op (input_location, NE_EXPR, addr, |
4598 | nullptr_node, complain); | |
574cfaa4 JM |
4599 | if (ifexp == error_mark_node) |
4600 | return error_mark_node; | |
932c0da4 JJ |
4601 | /* This is a compiler generated comparison, don't emit |
4602 | e.g. -Wnonnull-compare warning for it. */ | |
4603 | else if (TREE_CODE (ifexp) == NE_EXPR) | |
4604 | TREE_NO_WARNING (ifexp) = 1; | |
574cfaa4 | 4605 | } |
8d08fdba | 4606 | |
bd6dd845 | 4607 | if (ifexp != integer_one_node) |
632f2871 | 4608 | expr = build3 (COND_EXPR, void_type_node, ifexp, expr, void_node); |
8d08fdba | 4609 | |
8d08fdba MS |
4610 | return expr; |
4611 | } | |
ade3dc07 | 4612 | } |
8d08fdba | 4613 | |
ade3dc07 JM |
4614 | /* At the beginning of a destructor, push cleanups that will call the |
4615 | destructors for our base classes and members. | |
2a2480e1 | 4616 | |
a29e1034 | 4617 | Called from begin_destructor_body. */ |
8d08fdba | 4618 | |
ade3dc07 | 4619 | void |
edaf3e03 | 4620 | push_base_cleanups (void) |
ade3dc07 | 4621 | { |
fa743e8c NS |
4622 | tree binfo, base_binfo; |
4623 | int i; | |
ade3dc07 JM |
4624 | tree member; |
4625 | tree expr; | |
9771b263 | 4626 | vec<tree, va_gc> *vbases; |
8d08fdba | 4627 | |
ade3dc07 | 4628 | /* Run destructors for all virtual baseclasses. */ |
5775a06a | 4629 | if (CLASSTYPE_VBASECLASSES (current_class_type)) |
ade3dc07 | 4630 | { |
ade3dc07 | 4631 | tree cond = (condition_conversion |
f293ce4b RS |
4632 | (build2 (BIT_AND_EXPR, integer_type_node, |
4633 | current_in_charge_parm, | |
4634 | integer_two_node))); | |
8d08fdba | 4635 | |
58c42dc2 | 4636 | /* The CLASSTYPE_VBASECLASSES vector is in initialization |
ade3dc07 | 4637 | order, which is also the right order for pushing cleanups. */ |
9ba5ff0f | 4638 | for (vbases = CLASSTYPE_VBASECLASSES (current_class_type), i = 0; |
9771b263 | 4639 | vec_safe_iterate (vbases, i, &base_binfo); i++) |
8d08fdba | 4640 | { |
eca7fc57 | 4641 | if (type_build_dtor_call (BINFO_TYPE (base_binfo))) |
8d08fdba | 4642 | { |
c8094d83 | 4643 | expr = build_special_member_call (current_class_ref, |
4ba126e4 | 4644 | base_dtor_identifier, |
c166b898 | 4645 | NULL, |
9ba5ff0f | 4646 | base_binfo, |
c8094d83 | 4647 | (LOOKUP_NORMAL |
5ade1ed2 | 4648 | | LOOKUP_NONVIRTUAL), |
eca7fc57 JM |
4649 | tf_warning_or_error); |
4650 | if (TYPE_HAS_NONTRIVIAL_DESTRUCTOR (BINFO_TYPE (base_binfo))) | |
4651 | { | |
4652 | expr = build3 (COND_EXPR, void_type_node, cond, | |
632f2871 | 4653 | expr, void_node); |
eca7fc57 JM |
4654 | finish_decl_cleanup (NULL_TREE, expr); |
4655 | } | |
8d08fdba MS |
4656 | } |
4657 | } | |
ade3dc07 JM |
4658 | } |
4659 | ||
ade3dc07 | 4660 | /* Take care of the remaining baseclasses. */ |
fa743e8c NS |
4661 | for (binfo = TYPE_BINFO (current_class_type), i = 0; |
4662 | BINFO_BASE_ITERATE (binfo, i, base_binfo); i++) | |
ade3dc07 | 4663 | { |
eca7fc57 JM |
4664 | if (BINFO_VIRTUAL_P (base_binfo) |
4665 | || !type_build_dtor_call (BINFO_TYPE (base_binfo))) | |
ade3dc07 JM |
4666 | continue; |
4667 | ||
c8094d83 | 4668 | expr = build_special_member_call (current_class_ref, |
4ba126e4 | 4669 | base_dtor_identifier, |
c166b898 | 4670 | NULL, base_binfo, |
5ade1ed2 DG |
4671 | LOOKUP_NORMAL | LOOKUP_NONVIRTUAL, |
4672 | tf_warning_or_error); | |
eca7fc57 JM |
4673 | if (TYPE_HAS_NONTRIVIAL_DESTRUCTOR (BINFO_TYPE (base_binfo))) |
4674 | finish_decl_cleanup (NULL_TREE, expr); | |
ade3dc07 JM |
4675 | } |
4676 | ||
57ece258 JM |
4677 | /* Don't automatically destroy union members. */ |
4678 | if (TREE_CODE (current_class_type) == UNION_TYPE) | |
4679 | return; | |
4680 | ||
ade3dc07 | 4681 | for (member = TYPE_FIELDS (current_class_type); member; |
910ad8de | 4682 | member = DECL_CHAIN (member)) |
ade3dc07 | 4683 | { |
57ece258 JM |
4684 | tree this_type = TREE_TYPE (member); |
4685 | if (this_type == error_mark_node | |
2e5d2970 VR |
4686 | || TREE_CODE (member) != FIELD_DECL |
4687 | || DECL_ARTIFICIAL (member)) | |
ade3dc07 | 4688 | continue; |
04056396 | 4689 | if (ANON_AGGR_TYPE_P (this_type)) |
57ece258 | 4690 | continue; |
eca7fc57 | 4691 | if (type_build_dtor_call (this_type)) |
ade3dc07 | 4692 | { |
c8094d83 MS |
4693 | tree this_member = (build_class_member_access_expr |
4694 | (current_class_ref, member, | |
50ad9642 | 4695 | /*access_path=*/NULL_TREE, |
5ade1ed2 DG |
4696 | /*preserve_reference=*/false, |
4697 | tf_warning_or_error)); | |
ade3dc07 JM |
4698 | expr = build_delete (this_type, this_member, |
4699 | sfk_complete_destructor, | |
4700 | LOOKUP_NONVIRTUAL|LOOKUP_DESTRUCTOR|LOOKUP_NORMAL, | |
574cfaa4 | 4701 | 0, tf_warning_or_error); |
eca7fc57 JM |
4702 | if (TYPE_HAS_NONTRIVIAL_DESTRUCTOR (this_type)) |
4703 | finish_decl_cleanup (NULL_TREE, expr); | |
ade3dc07 | 4704 | } |
8d08fdba MS |
4705 | } |
4706 | } | |
4707 | ||
8d08fdba MS |
4708 | /* Build a C++ vector delete expression. |
4709 | MAXINDEX is the number of elements to be deleted. | |
4710 | ELT_SIZE is the nominal size of each element in the vector. | |
4711 | BASE is the expression that should yield the store to be deleted. | |
8d08fdba MS |
4712 | This function expands (or synthesizes) these calls itself. |
4713 | AUTO_DELETE_VEC says whether the container (vector) should be deallocated. | |
8d08fdba MS |
4714 | |
4715 | This also calls delete for virtual baseclasses of elements of the vector. | |
4716 | ||
4717 | Update: MAXINDEX is no longer needed. The size can be extracted from the | |
4718 | start of the vector for pointers, and from the type for arrays. We still | |
4719 | use MAXINDEX for arrays because it happens to already have one of the | |
4720 | values we'd have to extract. (We could use MAXINDEX with pointers to | |
4721 | confirm the size, and trap if the numbers differ; not clear that it'd | |
4722 | be worth bothering.) */ | |
e92cc029 | 4723 | |
8d08fdba | 4724 | tree |
362efdc1 | 4725 | build_vec_delete (tree base, tree maxindex, |
574cfaa4 JM |
4726 | special_function_kind auto_delete_vec, |
4727 | int use_global_delete, tsubst_flags_t complain) | |
8d08fdba | 4728 | { |
f30432d7 | 4729 | tree type; |
49b7aacb JM |
4730 | tree rval; |
4731 | tree base_init = NULL_TREE; | |
8d08fdba | 4732 | |
f30432d7 | 4733 | type = TREE_TYPE (base); |
c407792d | 4734 | |
50e10fa8 | 4735 | if (TYPE_PTR_P (type)) |
8d08fdba MS |
4736 | { |
4737 | /* Step back one from start of vector, and read dimension. */ | |
834c6dff | 4738 | tree cookie_addr; |
726a989a | 4739 | tree size_ptr_type = build_pointer_type (sizetype); |
834c6dff | 4740 | |
3c784bca | 4741 | base = mark_rvalue_use (base); |
6742d92b | 4742 | if (TREE_SIDE_EFFECTS (base)) |
49b7aacb JM |
4743 | { |
4744 | base_init = get_target_expr (base); | |
4745 | base = TARGET_EXPR_SLOT (base_init); | |
4746 | } | |
708cae97 | 4747 | type = strip_array_types (TREE_TYPE (type)); |
db3927fb AH |
4748 | cookie_addr = fold_build1_loc (input_location, NEGATE_EXPR, |
4749 | sizetype, TYPE_SIZE_UNIT (sizetype)); | |
5d49b6a7 RG |
4750 | cookie_addr = fold_build_pointer_plus (fold_convert (size_ptr_type, base), |
4751 | cookie_addr); | |
574cfaa4 | 4752 | maxindex = cp_build_indirect_ref (cookie_addr, RO_NULL, complain); |
8d08fdba | 4753 | } |
f30432d7 | 4754 | else if (TREE_CODE (type) == ARRAY_TYPE) |
8d08fdba | 4755 | { |
f4f206f4 KH |
4756 | /* Get the total number of things in the array, maxindex is a |
4757 | bad name. */ | |
f30432d7 | 4758 | maxindex = array_type_nelts_total (type); |
834c6dff | 4759 | type = strip_array_types (type); |
16b53405 | 4760 | base = decay_conversion (base, complain); |
574cfaa4 JM |
4761 | if (base == error_mark_node) |
4762 | return error_mark_node; | |
6742d92b | 4763 | if (TREE_SIDE_EFFECTS (base)) |
49b7aacb JM |
4764 | { |
4765 | base_init = get_target_expr (base); | |
4766 | base = TARGET_EXPR_SLOT (base_init); | |
4767 | } | |
8d08fdba MS |
4768 | } |
4769 | else | |
4770 | { | |
574cfaa4 | 4771 | if (base != error_mark_node && !(complain & tf_error)) |
8251199e | 4772 | error ("type to vector delete is neither pointer or array type"); |
8d08fdba MS |
4773 | return error_mark_node; |
4774 | } | |
8d08fdba | 4775 | |
49b7aacb | 4776 | rval = build_vec_delete_1 (base, maxindex, type, auto_delete_vec, |
574cfaa4 JM |
4777 | use_global_delete, complain); |
4778 | if (base_init && rval != error_mark_node) | |
f293ce4b | 4779 | rval = build2 (COMPOUND_EXPR, TREE_TYPE (rval), base_init, rval); |
49b7aacb JM |
4780 | |
4781 | return rval; | |
8d08fdba | 4782 | } |