]>
Commit | Line | Data |
---|---|---|
8d08fdba | 1 | /* Handle initialization things in C++. |
d6a8bdff | 2 | Copyright (C) 1987, 1989, 1992, 1993, 1994, 1995, 1996, 1997, 1998, |
dbbf88d1 | 3 | 1999, 2000, 2001, 2002, 2003 Free Software Foundation, Inc. |
8d08fdba MS |
4 | Contributed by Michael Tiemann (tiemann@cygnus.com) |
5 | ||
f5adbb8d | 6 | This file is part of GCC. |
8d08fdba | 7 | |
f5adbb8d | 8 | GCC is free software; you can redistribute it and/or modify |
8d08fdba MS |
9 | it under the terms of the GNU General Public License as published by |
10 | the Free Software Foundation; either version 2, or (at your option) | |
11 | any later version. | |
12 | ||
f5adbb8d | 13 | GCC is distributed in the hope that it will be useful, |
8d08fdba MS |
14 | but WITHOUT ANY WARRANTY; without even the implied warranty of |
15 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
16 | GNU General Public License for more details. | |
17 | ||
18 | You should have received a copy of the GNU General Public License | |
f5adbb8d | 19 | along with GCC; see the file COPYING. If not, write to |
e9fa0c7c RK |
20 | the Free Software Foundation, 59 Temple Place - Suite 330, |
21 | Boston, MA 02111-1307, USA. */ | |
8d08fdba | 22 | |
e92cc029 | 23 | /* High-level class interface. */ |
8d08fdba MS |
24 | |
25 | #include "config.h" | |
8d052bc7 | 26 | #include "system.h" |
4977bab6 ZW |
27 | #include "coretypes.h" |
28 | #include "tm.h" | |
8d08fdba MS |
29 | #include "tree.h" |
30 | #include "rtl.h" | |
8f17b5c5 | 31 | #include "expr.h" |
8d08fdba MS |
32 | #include "cp-tree.h" |
33 | #include "flags.h" | |
e8abc66f | 34 | #include "output.h" |
eb66be0e | 35 | #include "except.h" |
54f92bfb | 36 | #include "toplev.h" |
8d08fdba | 37 | |
2a3398e1 NS |
38 | static bool begin_init_stmts (tree *, tree *); |
39 | static tree finish_init_stmts (bool, tree, tree); | |
2282d28d | 40 | static void construct_virtual_base (tree, tree); |
362efdc1 NN |
41 | static void expand_aggr_init_1 (tree, tree, tree, tree, int); |
42 | static void expand_default_init (tree, tree, tree, tree, int); | |
43 | static tree build_vec_delete_1 (tree, tree, tree, special_function_kind, int); | |
2282d28d | 44 | static void perform_member_init (tree, tree); |
362efdc1 NN |
45 | static tree build_builtin_delete_call (tree); |
46 | static int member_init_ok_or_else (tree, tree, tree); | |
47 | static void expand_virtual_init (tree, tree); | |
2282d28d | 48 | static tree sort_mem_initializers (tree, tree); |
362efdc1 NN |
49 | static tree initializing_context (tree); |
50 | static void expand_cleanup_for_base (tree, tree); | |
51 | static tree get_temp_regvar (tree, tree); | |
52 | static tree dfs_initialize_vtbl_ptrs (tree, void *); | |
53 | static tree build_default_init (tree, tree); | |
54 | static tree build_new_1 (tree); | |
55 | static tree get_cookie_size (tree); | |
56 | static tree build_dtor_call (tree, special_function_kind, int); | |
57 | static tree build_field_list (tree, tree, int *); | |
58 | static tree build_vtbl_address (tree); | |
8d08fdba | 59 | |
3dbc07b6 MM |
60 | /* We are about to generate some complex initialization code. |
61 | Conceptually, it is all a single expression. However, we may want | |
62 | to include conditionals, loops, and other such statement-level | |
63 | constructs. Therefore, we build the initialization code inside a | |
64 | statement-expression. This function starts such an expression. | |
65 | STMT_EXPR_P and COMPOUND_STMT_P are filled in by this function; | |
66 | pass them back to finish_init_stmts when the expression is | |
67 | complete. */ | |
68 | ||
2a3398e1 | 69 | static bool |
362efdc1 | 70 | begin_init_stmts (tree *stmt_expr_p, tree *compound_stmt_p) |
3dbc07b6 | 71 | { |
2a3398e1 | 72 | bool is_global = !building_stmt_tree (); |
35b1567d | 73 | |
2a3398e1 | 74 | *stmt_expr_p = begin_stmt_expr (); |
7a3397c7 | 75 | *compound_stmt_p = begin_compound_stmt (/*has_no_scope=*/true); |
2a3398e1 NS |
76 | |
77 | return is_global; | |
3dbc07b6 MM |
78 | } |
79 | ||
80 | /* Finish out the statement-expression begun by the previous call to | |
81 | begin_init_stmts. Returns the statement-expression itself. */ | |
82 | ||
2a3398e1 NS |
83 | static tree |
84 | finish_init_stmts (bool is_global, tree stmt_expr, tree compound_stmt) | |
35b1567d | 85 | { |
7a3397c7 | 86 | finish_compound_stmt (compound_stmt); |
35b1567d | 87 | |
303b7406 | 88 | stmt_expr = finish_stmt_expr (stmt_expr, true); |
3dbc07b6 | 89 | |
2a3398e1 NS |
90 | my_friendly_assert (!building_stmt_tree () == is_global, 20030726); |
91 | ||
3dbc07b6 MM |
92 | return stmt_expr; |
93 | } | |
94 | ||
95 | /* Constructors */ | |
96 | ||
338d90b8 NS |
97 | /* Called from initialize_vtbl_ptrs via dfs_walk. BINFO is the base |
98 | which we want to initialize the vtable pointer for, DATA is | |
99 | TREE_LIST whose TREE_VALUE is the this ptr expression. */ | |
7177d104 | 100 | |
d569399b | 101 | static tree |
362efdc1 | 102 | dfs_initialize_vtbl_ptrs (tree binfo, void *data) |
d569399b | 103 | { |
9965d119 | 104 | if ((!BINFO_PRIMARY_P (binfo) || TREE_VIA_VIRTUAL (binfo)) |
d569399b MM |
105 | && CLASSTYPE_VFIELDS (BINFO_TYPE (binfo))) |
106 | { | |
107 | tree base_ptr = TREE_VALUE ((tree) data); | |
7177d104 | 108 | |
338d90b8 | 109 | base_ptr = build_base_path (PLUS_EXPR, base_ptr, binfo, /*nonnull=*/1); |
d569399b MM |
110 | |
111 | expand_virtual_init (binfo, base_ptr); | |
112 | } | |
7177d104 | 113 | |
dbbf88d1 | 114 | BINFO_MARKED (binfo) = 1; |
d569399b MM |
115 | |
116 | return NULL_TREE; | |
117 | } | |
118 | ||
cf2e003b MM |
119 | /* Initialize all the vtable pointers in the object pointed to by |
120 | ADDR. */ | |
e92cc029 | 121 | |
8d08fdba | 122 | void |
362efdc1 | 123 | initialize_vtbl_ptrs (tree addr) |
8d08fdba | 124 | { |
cf2e003b MM |
125 | tree list; |
126 | tree type; | |
127 | ||
128 | type = TREE_TYPE (TREE_TYPE (addr)); | |
129 | list = build_tree_list (type, addr); | |
d569399b | 130 | |
bbd15aac | 131 | /* Walk through the hierarchy, initializing the vptr in each base |
1f5a253a | 132 | class. We do these in pre-order because we can't find the virtual |
3461fba7 NS |
133 | bases for a class until we've initialized the vtbl for that |
134 | class. */ | |
dbbf88d1 NS |
135 | dfs_walk_real (TYPE_BINFO (type), dfs_initialize_vtbl_ptrs, |
136 | NULL, unmarkedp, list); | |
137 | dfs_walk (TYPE_BINFO (type), dfs_unmark, markedp, type); | |
8d08fdba | 138 | } |
d569399b | 139 | |
17bbb839 MM |
140 | /* Return an expression for the zero-initialization of an object with |
141 | type T. This expression will either be a constant (in the case | |
142 | that T is a scalar), or a CONSTRUCTOR (in the case that T is an | |
143 | aggregate). In either case, the value can be used as DECL_INITIAL | |
144 | for a decl of the indicated TYPE; it is a valid static initializer. | |
1cb8292f MM |
145 | If NELTS is non-NULL, and TYPE is an ARRAY_TYPE, NELTS is the |
146 | number of elements in the array. If STATIC_STORAGE_P is TRUE, | |
147 | initializers are only generated for entities for which | |
148 | zero-initialization does not simply mean filling the storage with | |
149 | zero bytes. */ | |
94e6e4c4 AO |
150 | |
151 | tree | |
1cb8292f | 152 | build_zero_init (tree type, tree nelts, bool static_storage_p) |
94e6e4c4 | 153 | { |
17bbb839 MM |
154 | tree init = NULL_TREE; |
155 | ||
156 | /* [dcl.init] | |
157 | ||
158 | To zero-initialization storage for an object of type T means: | |
159 | ||
160 | -- if T is a scalar type, the storage is set to the value of zero | |
161 | converted to T. | |
162 | ||
163 | -- if T is a non-union class type, the storage for each nonstatic | |
164 | data member and each base-class subobject is zero-initialized. | |
165 | ||
166 | -- if T is a union type, the storage for its first data member is | |
167 | zero-initialized. | |
168 | ||
169 | -- if T is an array type, the storage for each element is | |
170 | zero-initialized. | |
171 | ||
172 | -- if T is a reference type, no initialization is performed. */ | |
94e6e4c4 | 173 | |
7a1d37e9 MA |
174 | my_friendly_assert (nelts == NULL_TREE || TREE_CODE (nelts) == INTEGER_CST, |
175 | 20030618); | |
176 | ||
17bbb839 MM |
177 | if (type == error_mark_node) |
178 | ; | |
179 | else if (static_storage_p && zero_init_p (type)) | |
180 | /* In order to save space, we do not explicitly build initializers | |
181 | for items that do not need them. GCC's semantics are that | |
182 | items with static storage duration that are not otherwise | |
183 | initialized are initialized to zero. */ | |
184 | ; | |
185 | else if (SCALAR_TYPE_P (type)) | |
186 | init = convert (type, integer_zero_node); | |
187 | else if (CLASS_TYPE_P (type)) | |
188 | { | |
189 | tree field; | |
190 | tree inits; | |
191 | ||
192 | /* Build a constructor to contain the initializations. */ | |
dcf92453 | 193 | init = build_constructor (type, NULL_TREE); |
17bbb839 MM |
194 | /* Iterate over the fields, building initializations. */ |
195 | inits = NULL_TREE; | |
196 | for (field = TYPE_FIELDS (type); field; field = TREE_CHAIN (field)) | |
197 | { | |
198 | if (TREE_CODE (field) != FIELD_DECL) | |
199 | continue; | |
200 | ||
201 | /* Note that for class types there will be FIELD_DECLs | |
202 | corresponding to base classes as well. Thus, iterating | |
203 | over TYPE_FIELDs will result in correct initialization of | |
204 | all of the subobjects. */ | |
205 | if (static_storage_p && !zero_init_p (TREE_TYPE (field))) | |
206 | inits = tree_cons (field, | |
207 | build_zero_init (TREE_TYPE (field), | |
1cb8292f | 208 | /*nelts=*/NULL_TREE, |
17bbb839 MM |
209 | static_storage_p), |
210 | inits); | |
211 | ||
212 | /* For unions, only the first field is initialized. */ | |
213 | if (TREE_CODE (type) == UNION_TYPE) | |
214 | break; | |
215 | } | |
216 | CONSTRUCTOR_ELTS (init) = nreverse (inits); | |
217 | } | |
218 | else if (TREE_CODE (type) == ARRAY_TYPE) | |
94e6e4c4 | 219 | { |
17bbb839 MM |
220 | tree index; |
221 | tree max_index; | |
222 | tree inits; | |
223 | ||
224 | /* Build a constructor to contain the initializations. */ | |
dcf92453 | 225 | init = build_constructor (type, NULL_TREE); |
17bbb839 MM |
226 | /* Iterate over the array elements, building initializations. */ |
227 | inits = NULL_TREE; | |
1cb8292f | 228 | max_index = nelts ? nelts : array_type_nelts (type); |
7a1d37e9 MA |
229 | my_friendly_assert (TREE_CODE (max_index) == INTEGER_CST, 20030618); |
230 | ||
1cb8292f | 231 | for (index = size_zero_node; |
17bbb839 MM |
232 | !tree_int_cst_lt (max_index, index); |
233 | index = size_binop (PLUS_EXPR, index, size_one_node)) | |
234 | inits = tree_cons (index, | |
1cb8292f MM |
235 | build_zero_init (TREE_TYPE (type), |
236 | /*nelts=*/NULL_TREE, | |
17bbb839 MM |
237 | static_storage_p), |
238 | inits); | |
239 | CONSTRUCTOR_ELTS (init) = nreverse (inits); | |
94e6e4c4 AO |
240 | } |
241 | else if (TREE_CODE (type) == REFERENCE_TYPE) | |
17bbb839 | 242 | ; |
94e6e4c4 | 243 | else |
17bbb839 | 244 | abort (); |
94e6e4c4 | 245 | |
17bbb839 MM |
246 | /* In all cases, the initializer is a constant. */ |
247 | if (init) | |
248 | TREE_CONSTANT (init) = 1; | |
94e6e4c4 AO |
249 | |
250 | return init; | |
251 | } | |
252 | ||
1cb8292f MM |
253 | /* Build an expression for the default-initialization of an object of |
254 | the indicated TYPE. If NELTS is non-NULL, and TYPE is an | |
255 | ARRAY_TYPE, NELTS is the number of elements in the array. If | |
256 | initialization of TYPE requires calling constructors, this function | |
257 | returns NULL_TREE; the caller is responsible for arranging for the | |
258 | constructors to be called. */ | |
f30efcb7 | 259 | |
17bbb839 | 260 | static tree |
362efdc1 | 261 | build_default_init (tree type, tree nelts) |
17bbb839 MM |
262 | { |
263 | /* [dcl.init]: | |
f30efcb7 | 264 | |
17bbb839 | 265 | To default-initialize an object of type T means: |
f30efcb7 | 266 | |
17bbb839 MM |
267 | --if T is a non-POD class type (clause _class_), the default construc- |
268 | tor for T is called (and the initialization is ill-formed if T has | |
269 | no accessible default constructor); | |
f30efcb7 | 270 | |
17bbb839 | 271 | --if T is an array type, each element is default-initialized; |
f30efcb7 | 272 | |
17bbb839 | 273 | --otherwise, the storage for the object is zero-initialized. |
f30efcb7 | 274 | |
17bbb839 MM |
275 | A program that calls for default-initialization of an entity of refer- |
276 | ence type is ill-formed. */ | |
277 | ||
278 | /* If TYPE_NEEDS_CONSTRUCTING is true, the caller is responsible for | |
279 | performing the initialization. This is confusing in that some | |
280 | non-PODs do not have TYPE_NEEDS_CONSTRUCTING set. (For example, | |
281 | a class with a pointer-to-data member as a non-static data member | |
282 | does not have TYPE_NEEDS_CONSTRUCTING set.) Therefore, we end up | |
283 | passing non-PODs to build_zero_init below, which is contrary to | |
284 | the semantics quoted above from [dcl.init]. | |
285 | ||
286 | It happens, however, that the behavior of the constructor the | |
287 | standard says we should have generated would be precisely the | |
288 | same as that obtained by calling build_zero_init below, so things | |
289 | work out OK. */ | |
7a1d37e9 MA |
290 | if (TYPE_NEEDS_CONSTRUCTING (type) |
291 | || (nelts && TREE_CODE (nelts) != INTEGER_CST)) | |
f30efcb7 | 292 | return NULL_TREE; |
17bbb839 MM |
293 | |
294 | /* At this point, TYPE is either a POD class type, an array of POD | |
cd0be382 | 295 | classes, or something even more innocuous. */ |
1cb8292f | 296 | return build_zero_init (type, nelts, /*static_storage_p=*/false); |
f30efcb7 JM |
297 | } |
298 | ||
2282d28d MM |
299 | /* Initialize MEMBER, a FIELD_DECL, with INIT, a TREE_LIST of |
300 | arguments. If TREE_LIST is void_type_node, an empty initializer | |
301 | list was given; if NULL_TREE no initializer was given. */ | |
e92cc029 | 302 | |
8d08fdba | 303 | static void |
2282d28d | 304 | perform_member_init (tree member, tree init) |
8d08fdba MS |
305 | { |
306 | tree decl; | |
307 | tree type = TREE_TYPE (member); | |
2282d28d | 308 | bool explicit; |
eb66be0e | 309 | |
2282d28d MM |
310 | explicit = (init != NULL_TREE); |
311 | ||
312 | /* Effective C++ rule 12 requires that all data members be | |
313 | initialized. */ | |
314 | if (warn_ecpp && !explicit && TREE_CODE (type) != ARRAY_TYPE) | |
315 | warning ("`%D' should be initialized in the member initialization " | |
316 | "list", | |
317 | member); | |
318 | ||
319 | if (init == void_type_node) | |
320 | init = NULL_TREE; | |
321 | ||
322 | /* Get an lvalue for the data member. */ | |
50ad9642 MM |
323 | decl = build_class_member_access_expr (current_class_ref, member, |
324 | /*access_path=*/NULL_TREE, | |
325 | /*preserve_reference=*/true); | |
2fbfe9b8 MS |
326 | if (decl == error_mark_node) |
327 | return; | |
328 | ||
6bdb8141 JM |
329 | /* Deal with this here, as we will get confused if we try to call the |
330 | assignment op for an anonymous union. This can happen in a | |
331 | synthesized copy constructor. */ | |
332 | if (ANON_AGGR_TYPE_P (type)) | |
333 | { | |
ff9f1a5d MM |
334 | if (init) |
335 | { | |
336 | init = build (INIT_EXPR, type, decl, TREE_VALUE (init)); | |
337 | finish_expr_stmt (init); | |
338 | } | |
6bdb8141 JM |
339 | } |
340 | else if (TYPE_NEEDS_CONSTRUCTING (type) | |
341 | || (init && TYPE_HAS_CONSTRUCTOR (type))) | |
8d08fdba | 342 | { |
8d08fdba MS |
343 | if (explicit |
344 | && TREE_CODE (type) == ARRAY_TYPE | |
345 | && init != NULL_TREE | |
346 | && TREE_CHAIN (init) == NULL_TREE | |
347 | && TREE_CODE (TREE_TYPE (TREE_VALUE (init))) == ARRAY_TYPE) | |
348 | { | |
349 | /* Initialization of one array from another. */ | |
a48cccea JM |
350 | finish_expr_stmt (build_vec_init (decl, NULL_TREE, TREE_VALUE (init), |
351 | /* from_array=*/1)); | |
8d08fdba MS |
352 | } |
353 | else | |
f1dedc31 | 354 | finish_expr_stmt (build_aggr_init (decl, init, 0)); |
8d08fdba MS |
355 | } |
356 | else | |
357 | { | |
358 | if (init == NULL_TREE) | |
359 | { | |
360 | if (explicit) | |
361 | { | |
1cb8292f | 362 | init = build_default_init (type, /*nelts=*/NULL_TREE); |
f30efcb7 | 363 | if (TREE_CODE (type) == REFERENCE_TYPE) |
33bd39a2 | 364 | warning |
f30efcb7 JM |
365 | ("default-initialization of `%#D', which has reference type", |
366 | member); | |
8d08fdba MS |
367 | } |
368 | /* member traversal: note it leaves init NULL */ | |
f30efcb7 | 369 | else if (TREE_CODE (type) == REFERENCE_TYPE) |
33bd39a2 | 370 | pedwarn ("uninitialized reference member `%D'", member); |
8d08fdba MS |
371 | } |
372 | else if (TREE_CODE (init) == TREE_LIST) | |
c7b62f14 NS |
373 | /* There was an explicit member initialization. Do some work |
374 | in that case. */ | |
375 | init = build_x_compound_expr_from_list (init, "member initializer"); | |
8d08fdba | 376 | |
4f0aa416 | 377 | if (init) |
f1dedc31 | 378 | finish_expr_stmt (build_modify_expr (decl, INIT_EXPR, init)); |
8d08fdba | 379 | } |
eb66be0e | 380 | |
834c6dff | 381 | if (TYPE_HAS_NONTRIVIAL_DESTRUCTOR (type)) |
b7484fbe | 382 | { |
de22184b MS |
383 | tree expr; |
384 | ||
50ad9642 MM |
385 | expr = build_class_member_access_expr (current_class_ref, member, |
386 | /*access_path=*/NULL_TREE, | |
387 | /*preserve_reference=*/false); | |
3ec6bad3 | 388 | expr = build_delete (type, expr, sfk_complete_destructor, |
b7484fbe MS |
389 | LOOKUP_NONVIRTUAL|LOOKUP_DESTRUCTOR, 0); |
390 | ||
391 | if (expr != error_mark_node) | |
659e5a7a | 392 | finish_eh_cleanup (expr); |
b7484fbe | 393 | } |
8d08fdba MS |
394 | } |
395 | ||
ff9f1a5d MM |
396 | /* Returns a TREE_LIST containing (as the TREE_PURPOSE of each node) all |
397 | the FIELD_DECLs on the TYPE_FIELDS list for T, in reverse order. */ | |
398 | ||
399 | static tree | |
362efdc1 | 400 | build_field_list (tree t, tree list, int *uses_unions_p) |
ff9f1a5d MM |
401 | { |
402 | tree fields; | |
403 | ||
01c3fb15 JM |
404 | *uses_unions_p = 0; |
405 | ||
ff9f1a5d MM |
406 | /* Note whether or not T is a union. */ |
407 | if (TREE_CODE (t) == UNION_TYPE) | |
408 | *uses_unions_p = 1; | |
409 | ||
410 | for (fields = TYPE_FIELDS (t); fields; fields = TREE_CHAIN (fields)) | |
411 | { | |
412 | /* Skip CONST_DECLs for enumeration constants and so forth. */ | |
17bbb839 | 413 | if (TREE_CODE (fields) != FIELD_DECL || DECL_ARTIFICIAL (fields)) |
ff9f1a5d MM |
414 | continue; |
415 | ||
416 | /* Keep track of whether or not any fields are unions. */ | |
417 | if (TREE_CODE (TREE_TYPE (fields)) == UNION_TYPE) | |
418 | *uses_unions_p = 1; | |
419 | ||
420 | /* For an anonymous struct or union, we must recursively | |
421 | consider the fields of the anonymous type. They can be | |
422 | directly initialized from the constructor. */ | |
423 | if (ANON_AGGR_TYPE_P (TREE_TYPE (fields))) | |
424 | { | |
425 | /* Add this field itself. Synthesized copy constructors | |
426 | initialize the entire aggregate. */ | |
427 | list = tree_cons (fields, NULL_TREE, list); | |
428 | /* And now add the fields in the anonymous aggregate. */ | |
429 | list = build_field_list (TREE_TYPE (fields), list, | |
430 | uses_unions_p); | |
431 | } | |
432 | /* Add this field. */ | |
433 | else if (DECL_NAME (fields)) | |
434 | list = tree_cons (fields, NULL_TREE, list); | |
435 | } | |
436 | ||
437 | return list; | |
438 | } | |
439 | ||
2282d28d MM |
440 | /* The MEM_INITS are a TREE_LIST. The TREE_PURPOSE of each list gives |
441 | a FIELD_DECL or BINFO in T that needs initialization. The | |
442 | TREE_VALUE gives the initializer, or list of initializer arguments. | |
443 | ||
444 | Return a TREE_LIST containing all of the initializations required | |
445 | for T, in the order in which they should be performed. The output | |
446 | list has the same format as the input. */ | |
e92cc029 | 447 | |
8d08fdba | 448 | static tree |
2282d28d | 449 | sort_mem_initializers (tree t, tree mem_inits) |
8d08fdba | 450 | { |
ff9f1a5d | 451 | tree init; |
2282d28d MM |
452 | tree base; |
453 | tree sorted_inits; | |
454 | tree next_subobject; | |
455 | int i; | |
ff9f1a5d MM |
456 | int uses_unions_p; |
457 | ||
2282d28d MM |
458 | /* Build up a list of initializations. The TREE_PURPOSE of entry |
459 | will be the subobject (a FIELD_DECL or BINFO) to initialize. The | |
460 | TREE_VALUE will be the constructor arguments, or NULL if no | |
461 | explicit initialization was provided. */ | |
462 | sorted_inits = NULL_TREE; | |
463 | /* Process the virtual bases. */ | |
464 | for (base = CLASSTYPE_VBASECLASSES (t); base; base = TREE_CHAIN (base)) | |
465 | sorted_inits = tree_cons (TREE_VALUE (base), NULL_TREE, sorted_inits); | |
466 | /* Process the direct bases. */ | |
467 | for (i = 0; i < CLASSTYPE_N_BASECLASSES (t); ++i) | |
8d08fdba | 468 | { |
2282d28d MM |
469 | base = BINFO_BASETYPE (TYPE_BINFO (t), i); |
470 | if (!TREE_VIA_VIRTUAL (base)) | |
471 | sorted_inits = tree_cons (base, NULL_TREE, sorted_inits); | |
472 | } | |
473 | /* Process the non-static data members. */ | |
474 | sorted_inits = build_field_list (t, sorted_inits, &uses_unions_p); | |
475 | /* Reverse the entire list of initializations, so that they are in | |
476 | the order that they will actually be performed. */ | |
477 | sorted_inits = nreverse (sorted_inits); | |
478 | ||
479 | /* If the user presented the initializers in an order different from | |
480 | that in which they will actually occur, we issue a warning. Keep | |
481 | track of the next subobject which can be explicitly initialized | |
482 | without issuing a warning. */ | |
483 | next_subobject = sorted_inits; | |
484 | ||
485 | /* Go through the explicit initializers, filling in TREE_PURPOSE in | |
486 | the SORTED_INITS. */ | |
487 | for (init = mem_inits; init; init = TREE_CHAIN (init)) | |
488 | { | |
489 | tree subobject; | |
490 | tree subobject_init; | |
491 | ||
492 | subobject = TREE_PURPOSE (init); | |
493 | ||
494 | /* If the explicit initializers are in sorted order, then | |
495 | SUBOBJECT will be NEXT_SUBOBJECT, or something following | |
496 | it. */ | |
497 | for (subobject_init = next_subobject; | |
498 | subobject_init; | |
499 | subobject_init = TREE_CHAIN (subobject_init)) | |
500 | if (TREE_PURPOSE (subobject_init) == subobject) | |
ff9f1a5d MM |
501 | break; |
502 | ||
2282d28d MM |
503 | /* Issue a warning if the explicit initializer order does not |
504 | match that which will actually occur. */ | |
505 | if (warn_reorder && !subobject_init) | |
ff9f1a5d | 506 | { |
2282d28d MM |
507 | if (TREE_CODE (TREE_PURPOSE (next_subobject)) == FIELD_DECL) |
508 | cp_warning_at ("`%D' will be initialized after", | |
509 | TREE_PURPOSE (next_subobject)); | |
510 | else | |
511 | warning ("base `%T' will be initialized after", | |
512 | TREE_PURPOSE (next_subobject)); | |
513 | if (TREE_CODE (subobject) == FIELD_DECL) | |
514 | cp_warning_at (" `%#D'", subobject); | |
515 | else | |
516 | warning (" base `%T'", subobject); | |
ff9f1a5d | 517 | } |
b7484fbe | 518 | |
2282d28d MM |
519 | /* Look again, from the beginning of the list. */ |
520 | if (!subobject_init) | |
ff9f1a5d | 521 | { |
2282d28d MM |
522 | subobject_init = sorted_inits; |
523 | while (TREE_PURPOSE (subobject_init) != subobject) | |
524 | subobject_init = TREE_CHAIN (subobject_init); | |
ff9f1a5d | 525 | } |
2282d28d MM |
526 | |
527 | /* It is invalid to initialize the same subobject more than | |
528 | once. */ | |
529 | if (TREE_VALUE (subobject_init)) | |
ff9f1a5d | 530 | { |
2282d28d MM |
531 | if (TREE_CODE (subobject) == FIELD_DECL) |
532 | error ("multiple initializations given for `%D'", subobject); | |
533 | else | |
534 | error ("multiple initializations given for base `%T'", | |
535 | subobject); | |
ff9f1a5d MM |
536 | } |
537 | ||
2282d28d MM |
538 | /* Record the initialization. */ |
539 | TREE_VALUE (subobject_init) = TREE_VALUE (init); | |
540 | next_subobject = subobject_init; | |
ff9f1a5d MM |
541 | } |
542 | ||
543 | /* [class.base.init] | |
b7484fbe | 544 | |
ff9f1a5d MM |
545 | If a ctor-initializer specifies more than one mem-initializer for |
546 | multiple members of the same union (including members of | |
547 | anonymous unions), the ctor-initializer is ill-formed. */ | |
548 | if (uses_unions_p) | |
549 | { | |
2282d28d MM |
550 | tree last_field = NULL_TREE; |
551 | for (init = sorted_inits; init; init = TREE_CHAIN (init)) | |
8d08fdba | 552 | { |
ff9f1a5d MM |
553 | tree field; |
554 | tree field_type; | |
555 | int done; | |
556 | ||
2282d28d MM |
557 | /* Skip uninitialized members and base classes. */ |
558 | if (!TREE_VALUE (init) | |
559 | || TREE_CODE (TREE_PURPOSE (init)) != FIELD_DECL) | |
ff9f1a5d MM |
560 | continue; |
561 | /* See if this field is a member of a union, or a member of a | |
562 | structure contained in a union, etc. */ | |
563 | field = TREE_PURPOSE (init); | |
564 | for (field_type = DECL_CONTEXT (field); | |
565 | !same_type_p (field_type, t); | |
566 | field_type = TYPE_CONTEXT (field_type)) | |
567 | if (TREE_CODE (field_type) == UNION_TYPE) | |
568 | break; | |
569 | /* If this field is not a member of a union, skip it. */ | |
570 | if (TREE_CODE (field_type) != UNION_TYPE) | |
8d08fdba | 571 | continue; |
8d08fdba | 572 | |
ff9f1a5d MM |
573 | /* It's only an error if we have two initializers for the same |
574 | union type. */ | |
575 | if (!last_field) | |
6bdb8141 | 576 | { |
ff9f1a5d MM |
577 | last_field = field; |
578 | continue; | |
6bdb8141 | 579 | } |
8d08fdba | 580 | |
ff9f1a5d MM |
581 | /* See if LAST_FIELD and the field initialized by INIT are |
582 | members of the same union. If so, there's a problem, | |
583 | unless they're actually members of the same structure | |
584 | which is itself a member of a union. For example, given: | |
8d08fdba | 585 | |
ff9f1a5d MM |
586 | union { struct { int i; int j; }; }; |
587 | ||
588 | initializing both `i' and `j' makes sense. */ | |
589 | field_type = DECL_CONTEXT (field); | |
590 | done = 0; | |
591 | do | |
8d08fdba | 592 | { |
ff9f1a5d MM |
593 | tree last_field_type; |
594 | ||
595 | last_field_type = DECL_CONTEXT (last_field); | |
596 | while (1) | |
00595019 | 597 | { |
ff9f1a5d | 598 | if (same_type_p (last_field_type, field_type)) |
00595019 | 599 | { |
ff9f1a5d | 600 | if (TREE_CODE (field_type) == UNION_TYPE) |
33bd39a2 | 601 | error ("initializations for multiple members of `%T'", |
ff9f1a5d MM |
602 | last_field_type); |
603 | done = 1; | |
604 | break; | |
00595019 | 605 | } |
8d08fdba | 606 | |
ff9f1a5d MM |
607 | if (same_type_p (last_field_type, t)) |
608 | break; | |
8d08fdba | 609 | |
ff9f1a5d MM |
610 | last_field_type = TYPE_CONTEXT (last_field_type); |
611 | } | |
612 | ||
613 | /* If we've reached the outermost class, then we're | |
614 | done. */ | |
615 | if (same_type_p (field_type, t)) | |
616 | break; | |
8d08fdba | 617 | |
ff9f1a5d | 618 | field_type = TYPE_CONTEXT (field_type); |
8d08fdba | 619 | } |
ff9f1a5d MM |
620 | while (!done); |
621 | ||
622 | last_field = field; | |
b7484fbe MS |
623 | } |
624 | } | |
8d08fdba | 625 | |
2282d28d | 626 | return sorted_inits; |
b7484fbe MS |
627 | } |
628 | ||
2282d28d MM |
629 | /* Initialize all bases and members of CURRENT_CLASS_TYPE. MEM_INITS |
630 | is a TREE_LIST giving the explicit mem-initializer-list for the | |
631 | constructor. The TREE_PURPOSE of each entry is a subobject (a | |
632 | FIELD_DECL or a BINFO) of the CURRENT_CLASS_TYPE. The TREE_VALUE | |
633 | is a TREE_LIST giving the arguments to the constructor or | |
634 | void_type_node for an empty list of arguments. */ | |
a9aedbc2 | 635 | |
3dbc07b6 | 636 | void |
2282d28d | 637 | emit_mem_initializers (tree mem_inits) |
8d08fdba | 638 | { |
2282d28d MM |
639 | /* Sort the mem-initializers into the order in which the |
640 | initializations should be performed. */ | |
641 | mem_inits = sort_mem_initializers (current_class_type, mem_inits); | |
8d08fdba | 642 | |
1f5a253a NS |
643 | in_base_initializer = 1; |
644 | ||
2282d28d MM |
645 | /* Initialize base classes. */ |
646 | while (mem_inits | |
647 | && TREE_CODE (TREE_PURPOSE (mem_inits)) != FIELD_DECL) | |
8d08fdba | 648 | { |
2282d28d MM |
649 | tree subobject = TREE_PURPOSE (mem_inits); |
650 | tree arguments = TREE_VALUE (mem_inits); | |
651 | ||
652 | /* If these initializations are taking place in a copy | |
653 | constructor, the base class should probably be explicitly | |
654 | initialized. */ | |
655 | if (extra_warnings && !arguments | |
656 | && DECL_COPY_CONSTRUCTOR_P (current_function_decl) | |
657 | && TYPE_NEEDS_CONSTRUCTING (BINFO_TYPE (subobject))) | |
658 | warning ("base class `%#T' should be explicitly initialized in the " | |
659 | "copy constructor", | |
660 | BINFO_TYPE (subobject)); | |
661 | ||
662 | /* If an explicit -- but empty -- initializer list was present, | |
663 | treat it just like default initialization at this point. */ | |
664 | if (arguments == void_type_node) | |
665 | arguments = NULL_TREE; | |
666 | ||
667 | /* Initialize the base. */ | |
668 | if (TREE_VIA_VIRTUAL (subobject)) | |
669 | construct_virtual_base (subobject, arguments); | |
670 | else | |
b7484fbe | 671 | { |
2282d28d MM |
672 | tree base_addr; |
673 | ||
674 | base_addr = build_base_path (PLUS_EXPR, current_class_ptr, | |
675 | subobject, 1); | |
676 | expand_aggr_init_1 (subobject, NULL_TREE, | |
677 | build_indirect_ref (base_addr, NULL), | |
678 | arguments, | |
b370501f | 679 | LOOKUP_NORMAL); |
2282d28d | 680 | expand_cleanup_for_base (subobject, NULL_TREE); |
8d08fdba | 681 | } |
8d08fdba | 682 | |
2282d28d | 683 | mem_inits = TREE_CHAIN (mem_inits); |
8d08fdba | 684 | } |
1f5a253a | 685 | in_base_initializer = 0; |
8d08fdba | 686 | |
2282d28d | 687 | /* Initialize the vptrs. */ |
cf2e003b | 688 | initialize_vtbl_ptrs (current_class_ptr); |
1f5a253a | 689 | |
2282d28d MM |
690 | /* Initialize the data members. */ |
691 | while (mem_inits) | |
8d08fdba | 692 | { |
2282d28d MM |
693 | perform_member_init (TREE_PURPOSE (mem_inits), |
694 | TREE_VALUE (mem_inits)); | |
695 | mem_inits = TREE_CHAIN (mem_inits); | |
b7484fbe | 696 | } |
8d08fdba MS |
697 | } |
698 | ||
3ec6bad3 MM |
699 | /* Returns the address of the vtable (i.e., the value that should be |
700 | assigned to the vptr) for BINFO. */ | |
701 | ||
702 | static tree | |
362efdc1 | 703 | build_vtbl_address (tree binfo) |
3ec6bad3 | 704 | { |
9965d119 | 705 | tree binfo_for = binfo; |
3ec6bad3 MM |
706 | tree vtbl; |
707 | ||
9965d119 NS |
708 | if (BINFO_VPTR_INDEX (binfo) && TREE_VIA_VIRTUAL (binfo) |
709 | && BINFO_PRIMARY_P (binfo)) | |
710 | /* If this is a virtual primary base, then the vtable we want to store | |
711 | is that for the base this is being used as the primary base of. We | |
712 | can't simply skip the initialization, because we may be expanding the | |
713 | inits of a subobject constructor where the virtual base layout | |
714 | can be different. */ | |
715 | while (BINFO_PRIMARY_BASE_OF (binfo_for)) | |
716 | binfo_for = BINFO_PRIMARY_BASE_OF (binfo_for); | |
717 | ||
3ec6bad3 MM |
718 | /* Figure out what vtable BINFO's vtable is based on, and mark it as |
719 | used. */ | |
9965d119 | 720 | vtbl = get_vtbl_decl_for_binfo (binfo_for); |
3ec6bad3 MM |
721 | assemble_external (vtbl); |
722 | TREE_USED (vtbl) = 1; | |
723 | ||
724 | /* Now compute the address to use when initializing the vptr. */ | |
9965d119 | 725 | vtbl = BINFO_VTABLE (binfo_for); |
3ec6bad3 MM |
726 | if (TREE_CODE (vtbl) == VAR_DECL) |
727 | { | |
728 | vtbl = build1 (ADDR_EXPR, build_pointer_type (TREE_TYPE (vtbl)), vtbl); | |
729 | TREE_CONSTANT (vtbl) = 1; | |
730 | } | |
731 | ||
732 | return vtbl; | |
733 | } | |
734 | ||
8d08fdba MS |
735 | /* This code sets up the virtual function tables appropriate for |
736 | the pointer DECL. It is a one-ply initialization. | |
737 | ||
738 | BINFO is the exact type that DECL is supposed to be. In | |
739 | multiple inheritance, this might mean "C's A" if C : A, B. */ | |
e92cc029 | 740 | |
8926095f | 741 | static void |
362efdc1 | 742 | expand_virtual_init (tree binfo, tree decl) |
8d08fdba | 743 | { |
8d08fdba | 744 | tree vtbl, vtbl_ptr; |
3ec6bad3 | 745 | tree vtt_index; |
8d08fdba | 746 | |
3ec6bad3 MM |
747 | /* Compute the initializer for vptr. */ |
748 | vtbl = build_vtbl_address (binfo); | |
749 | ||
3461fba7 NS |
750 | /* We may get this vptr from a VTT, if this is a subobject |
751 | constructor or subobject destructor. */ | |
3ec6bad3 MM |
752 | vtt_index = BINFO_VPTR_INDEX (binfo); |
753 | if (vtt_index) | |
754 | { | |
755 | tree vtbl2; | |
756 | tree vtt_parm; | |
757 | ||
758 | /* Compute the value to use, when there's a VTT. */ | |
e0fff4b3 | 759 | vtt_parm = current_vtt_parm; |
3ec6bad3 MM |
760 | vtbl2 = build (PLUS_EXPR, |
761 | TREE_TYPE (vtt_parm), | |
762 | vtt_parm, | |
763 | vtt_index); | |
764 | vtbl2 = build1 (INDIRECT_REF, TREE_TYPE (vtbl), vtbl2); | |
765 | ||
766 | /* The actual initializer is the VTT value only in the subobject | |
767 | constructor. In maybe_clone_body we'll substitute NULL for | |
768 | the vtt_parm in the case of the non-subobject constructor. */ | |
769 | vtbl = build (COND_EXPR, | |
770 | TREE_TYPE (vtbl), | |
48f22ed2 JM |
771 | build (EQ_EXPR, boolean_type_node, |
772 | current_in_charge_parm, integer_zero_node), | |
3ec6bad3 MM |
773 | vtbl2, |
774 | vtbl); | |
775 | } | |
70ae3201 MM |
776 | |
777 | /* Compute the location of the vtpr. */ | |
338d90b8 NS |
778 | vtbl_ptr = build_vfield_ref (build_indirect_ref (decl, NULL), |
779 | TREE_TYPE (binfo)); | |
780 | my_friendly_assert (vtbl_ptr != error_mark_node, 20010730); | |
8d08fdba | 781 | |
70ae3201 | 782 | /* Assign the vtable to the vptr. */ |
6060a796 | 783 | vtbl = convert_force (TREE_TYPE (vtbl_ptr), vtbl, 0); |
f1dedc31 | 784 | finish_expr_stmt (build_modify_expr (vtbl_ptr, NOP_EXPR, vtbl)); |
8d08fdba MS |
785 | } |
786 | ||
f33e32a8 MM |
787 | /* If an exception is thrown in a constructor, those base classes already |
788 | constructed must be destroyed. This function creates the cleanup | |
0b8a1e58 | 789 | for BINFO, which has just been constructed. If FLAG is non-NULL, |
838dfd8a | 790 | it is a DECL which is nonzero when this base needs to be |
0b8a1e58 | 791 | destroyed. */ |
f33e32a8 MM |
792 | |
793 | static void | |
362efdc1 | 794 | expand_cleanup_for_base (tree binfo, tree flag) |
f33e32a8 MM |
795 | { |
796 | tree expr; | |
797 | ||
834c6dff | 798 | if (TYPE_HAS_TRIVIAL_DESTRUCTOR (BINFO_TYPE (binfo))) |
f33e32a8 MM |
799 | return; |
800 | ||
0b8a1e58 | 801 | /* Call the destructor. */ |
4ba126e4 MM |
802 | expr = build_special_member_call (current_class_ref, |
803 | base_dtor_identifier, | |
804 | NULL_TREE, | |
805 | binfo, | |
806 | LOOKUP_NORMAL | LOOKUP_NONVIRTUAL); | |
0b8a1e58 MM |
807 | if (flag) |
808 | expr = fold (build (COND_EXPR, void_type_node, | |
78ef5b89 | 809 | c_common_truthvalue_conversion (flag), |
0b8a1e58 MM |
810 | expr, integer_zero_node)); |
811 | ||
659e5a7a | 812 | finish_eh_cleanup (expr); |
f33e32a8 MM |
813 | } |
814 | ||
2282d28d MM |
815 | /* Construct the virtual base-class VBASE passing the ARGUMENTS to its |
816 | constructor. */ | |
e92cc029 | 817 | |
8d08fdba | 818 | static void |
2282d28d | 819 | construct_virtual_base (tree vbase, tree arguments) |
8d08fdba | 820 | { |
2282d28d MM |
821 | tree inner_if_stmt; |
822 | tree compound_stmt; | |
823 | tree exp; | |
824 | tree flag; | |
825 | ||
826 | /* If there are virtual base classes with destructors, we need to | |
827 | emit cleanups to destroy them if an exception is thrown during | |
828 | the construction process. These exception regions (i.e., the | |
829 | period during which the cleanups must occur) begin from the time | |
830 | the construction is complete to the end of the function. If we | |
831 | create a conditional block in which to initialize the | |
832 | base-classes, then the cleanup region for the virtual base begins | |
833 | inside a block, and ends outside of that block. This situation | |
834 | confuses the sjlj exception-handling code. Therefore, we do not | |
835 | create a single conditional block, but one for each | |
836 | initialization. (That way the cleanup regions always begin | |
837 | in the outer block.) We trust the back-end to figure out | |
838 | that the FLAG will not change across initializations, and | |
839 | avoid doing multiple tests. */ | |
840 | flag = TREE_CHAIN (DECL_ARGUMENTS (current_function_decl)); | |
841 | inner_if_stmt = begin_if_stmt (); | |
842 | finish_if_stmt_cond (flag, inner_if_stmt); | |
7a3397c7 | 843 | compound_stmt = begin_compound_stmt (/*has_no_scope=*/true); |
2282d28d MM |
844 | |
845 | /* Compute the location of the virtual base. If we're | |
846 | constructing virtual bases, then we must be the most derived | |
847 | class. Therefore, we don't have to look up the virtual base; | |
848 | we already know where it is. */ | |
22ed7e5f MM |
849 | exp = convert_to_base_statically (current_class_ref, vbase); |
850 | ||
851 | expand_aggr_init_1 (vbase, current_class_ref, exp, arguments, | |
852 | LOOKUP_COMPLAIN); | |
7a3397c7 | 853 | finish_compound_stmt (compound_stmt); |
2282d28d MM |
854 | finish_then_clause (inner_if_stmt); |
855 | finish_if_stmt (); | |
856 | ||
857 | expand_cleanup_for_base (vbase, flag); | |
8d08fdba MS |
858 | } |
859 | ||
2ee887f2 | 860 | /* Find the context in which this FIELD can be initialized. */ |
e92cc029 | 861 | |
2ee887f2 | 862 | static tree |
362efdc1 | 863 | initializing_context (tree field) |
2ee887f2 MS |
864 | { |
865 | tree t = DECL_CONTEXT (field); | |
866 | ||
867 | /* Anonymous union members can be initialized in the first enclosing | |
868 | non-anonymous union context. */ | |
6bdb8141 | 869 | while (t && ANON_AGGR_TYPE_P (t)) |
2ee887f2 MS |
870 | t = TYPE_CONTEXT (t); |
871 | return t; | |
872 | } | |
873 | ||
8d08fdba MS |
874 | /* Function to give error message if member initialization specification |
875 | is erroneous. FIELD is the member we decided to initialize. | |
876 | TYPE is the type for which the initialization is being performed. | |
72b7eeff | 877 | FIELD must be a member of TYPE. |
8d08fdba MS |
878 | |
879 | MEMBER_NAME is the name of the member. */ | |
880 | ||
881 | static int | |
362efdc1 | 882 | member_init_ok_or_else (tree field, tree type, tree member_name) |
8d08fdba MS |
883 | { |
884 | if (field == error_mark_node) | |
885 | return 0; | |
a723baf1 | 886 | if (!field) |
8d08fdba | 887 | { |
33bd39a2 | 888 | error ("class `%T' does not have any field named `%D'", type, |
a723baf1 | 889 | member_name); |
8d08fdba MS |
890 | return 0; |
891 | } | |
a723baf1 | 892 | if (TREE_CODE (field) == VAR_DECL) |
b7484fbe | 893 | { |
a723baf1 MM |
894 | error ("`%#D' is a static data member; it can only be " |
895 | "initialized at its definition", | |
896 | field); | |
897 | return 0; | |
898 | } | |
899 | if (TREE_CODE (field) != FIELD_DECL) | |
900 | { | |
901 | error ("`%#D' is not a non-static data member of `%T'", | |
902 | field, type); | |
903 | return 0; | |
904 | } | |
905 | if (initializing_context (field) != type) | |
906 | { | |
907 | error ("class `%T' does not have any field named `%D'", type, | |
908 | member_name); | |
b7484fbe MS |
909 | return 0; |
910 | } | |
911 | ||
8d08fdba MS |
912 | return 1; |
913 | } | |
914 | ||
2282d28d MM |
915 | /* NAME is a FIELD_DECL, an IDENTIFIER_NODE which names a field, or it |
916 | is a _TYPE node or TYPE_DECL which names a base for that type. | |
1f5a253a NS |
917 | Check the validity of NAME, and return either the base _TYPE, base |
918 | binfo, or the FIELD_DECL of the member. If NAME is invalid, return | |
2282d28d | 919 | NULL_TREE and issue a diagnostic. |
8d08fdba | 920 | |
36a68fe7 NS |
921 | An old style unnamed direct single base construction is permitted, |
922 | where NAME is NULL. */ | |
8d08fdba | 923 | |
fd74ca0b | 924 | tree |
1f5a253a | 925 | expand_member_init (tree name) |
8d08fdba | 926 | { |
2282d28d MM |
927 | tree basetype; |
928 | tree field; | |
8d08fdba | 929 | |
2282d28d | 930 | if (!current_class_ref) |
fd74ca0b | 931 | return NULL_TREE; |
8d08fdba | 932 | |
36a68fe7 | 933 | if (!name) |
90418208 | 934 | { |
36a68fe7 NS |
935 | /* This is an obsolete unnamed base class initializer. The |
936 | parser will already have warned about its use. */ | |
2282d28d | 937 | switch (CLASSTYPE_N_BASECLASSES (current_class_type)) |
36a68fe7 NS |
938 | { |
939 | case 0: | |
33bd39a2 | 940 | error ("unnamed initializer for `%T', which has no base classes", |
2282d28d | 941 | current_class_type); |
36a68fe7 NS |
942 | return NULL_TREE; |
943 | case 1: | |
2282d28d | 944 | basetype = TYPE_BINFO_BASETYPE (current_class_type, 0); |
36a68fe7 NS |
945 | break; |
946 | default: | |
33bd39a2 | 947 | error ("unnamed initializer for `%T', which uses multiple inheritance", |
2282d28d | 948 | current_class_type); |
36a68fe7 NS |
949 | return NULL_TREE; |
950 | } | |
90418208 | 951 | } |
36a68fe7 | 952 | else if (TYPE_P (name)) |
be99da77 | 953 | { |
a82d6da5 | 954 | basetype = TYPE_MAIN_VARIANT (name); |
36a68fe7 | 955 | name = TYPE_NAME (name); |
be99da77 | 956 | } |
36a68fe7 NS |
957 | else if (TREE_CODE (name) == TYPE_DECL) |
958 | basetype = TYPE_MAIN_VARIANT (TREE_TYPE (name)); | |
2282d28d MM |
959 | else |
960 | basetype = NULL_TREE; | |
8d08fdba | 961 | |
36a68fe7 | 962 | if (basetype) |
41efda8f | 963 | { |
d9148cf4 MM |
964 | tree class_binfo; |
965 | tree direct_binfo; | |
966 | tree virtual_binfo; | |
967 | int i; | |
2282d28d | 968 | |
36a68fe7 | 969 | if (current_template_parms) |
1f5a253a | 970 | return basetype; |
2282d28d | 971 | |
d9148cf4 MM |
972 | class_binfo = TYPE_BINFO (current_class_type); |
973 | direct_binfo = NULL_TREE; | |
974 | virtual_binfo = NULL_TREE; | |
975 | ||
976 | /* Look for a direct base. */ | |
977 | for (i = 0; i < BINFO_N_BASETYPES (class_binfo); ++i) | |
978 | if (same_type_p (basetype, | |
979 | TYPE_BINFO_BASETYPE (current_class_type, i))) | |
980 | { | |
981 | direct_binfo = BINFO_BASETYPE (class_binfo, i); | |
982 | break; | |
983 | } | |
984 | /* Look for a virtual base -- unless the direct base is itself | |
985 | virtual. */ | |
986 | if (!direct_binfo || !TREE_VIA_VIRTUAL (direct_binfo)) | |
987 | { | |
988 | virtual_binfo | |
989 | = purpose_member (basetype, | |
990 | CLASSTYPE_VBASECLASSES (current_class_type)); | |
991 | if (virtual_binfo) | |
992 | virtual_binfo = TREE_VALUE (virtual_binfo); | |
993 | } | |
994 | ||
995 | /* [class.base.init] | |
996 | ||
997 | If a mem-initializer-id is ambiguous because it designates | |
998 | both a direct non-virtual base class and an inherited virtual | |
999 | base class, the mem-initializer is ill-formed. */ | |
1000 | if (direct_binfo && virtual_binfo) | |
1001 | { | |
1002 | error ("'%D' is both a direct base and an indirect virtual base", | |
1003 | basetype); | |
1004 | return NULL_TREE; | |
1005 | } | |
1006 | ||
1007 | if (!direct_binfo && !virtual_binfo) | |
8d08fdba | 1008 | { |
2282d28d | 1009 | if (TYPE_USES_VIRTUAL_BASECLASSES (current_class_type)) |
33bd39a2 | 1010 | error ("type `%D' is not a direct or virtual base of `%T'", |
2282d28d | 1011 | name, current_class_type); |
41efda8f | 1012 | else |
33bd39a2 | 1013 | error ("type `%D' is not a direct base of `%T'", |
2282d28d | 1014 | name, current_class_type); |
fd74ca0b | 1015 | return NULL_TREE; |
41efda8f | 1016 | } |
d9148cf4 MM |
1017 | |
1018 | return direct_binfo ? direct_binfo : virtual_binfo; | |
41efda8f MM |
1019 | } |
1020 | else | |
1021 | { | |
2282d28d | 1022 | if (TREE_CODE (name) == IDENTIFIER_NODE) |
86ac0575 | 1023 | field = lookup_field (current_class_type, name, 1, false); |
2282d28d MM |
1024 | else |
1025 | field = name; | |
8d08fdba | 1026 | |
2282d28d | 1027 | if (member_init_ok_or_else (field, current_class_type, name)) |
1f5a253a | 1028 | return field; |
41efda8f | 1029 | } |
fd74ca0b | 1030 | |
2282d28d | 1031 | return NULL_TREE; |
8d08fdba MS |
1032 | } |
1033 | ||
1034 | /* This is like `expand_member_init', only it stores one aggregate | |
1035 | value into another. | |
1036 | ||
1037 | INIT comes in two flavors: it is either a value which | |
1038 | is to be stored in EXP, or it is a parameter list | |
1039 | to go to a constructor, which will operate on EXP. | |
f30432d7 MS |
1040 | If INIT is not a parameter list for a constructor, then set |
1041 | LOOKUP_ONLYCONVERTING. | |
6060a796 MS |
1042 | If FLAGS is LOOKUP_ONLYCONVERTING then it is the = init form of |
1043 | the initializer, if FLAGS is 0, then it is the (init) form. | |
8d08fdba | 1044 | If `init' is a CONSTRUCTOR, then we emit a warning message, |
59be0cdd | 1045 | explaining that such initializations are invalid. |
8d08fdba | 1046 | |
8d08fdba MS |
1047 | If INIT resolves to a CALL_EXPR which happens to return |
1048 | something of the type we are looking for, then we know | |
1049 | that we can safely use that call to perform the | |
1050 | initialization. | |
1051 | ||
1052 | The virtual function table pointer cannot be set up here, because | |
1053 | we do not really know its type. | |
1054 | ||
8d08fdba MS |
1055 | This never calls operator=(). |
1056 | ||
1057 | When initializing, nothing is CONST. | |
1058 | ||
1059 | A default copy constructor may have to be used to perform the | |
1060 | initialization. | |
1061 | ||
1062 | A constructor or a conversion operator may have to be used to | |
e92cc029 | 1063 | perform the initialization, but not both, as it would be ambiguous. */ |
8d08fdba | 1064 | |
f1dedc31 | 1065 | tree |
362efdc1 | 1066 | build_aggr_init (tree exp, tree init, int flags) |
8d08fdba | 1067 | { |
f1dedc31 MM |
1068 | tree stmt_expr; |
1069 | tree compound_stmt; | |
1070 | int destroy_temps; | |
8d08fdba MS |
1071 | tree type = TREE_TYPE (exp); |
1072 | int was_const = TREE_READONLY (exp); | |
f30432d7 | 1073 | int was_volatile = TREE_THIS_VOLATILE (exp); |
2a3398e1 | 1074 | int is_global; |
8d08fdba MS |
1075 | |
1076 | if (init == error_mark_node) | |
f1dedc31 | 1077 | return error_mark_node; |
8d08fdba MS |
1078 | |
1079 | TREE_READONLY (exp) = 0; | |
f30432d7 MS |
1080 | TREE_THIS_VOLATILE (exp) = 0; |
1081 | ||
1082 | if (init && TREE_CODE (init) != TREE_LIST) | |
1083 | flags |= LOOKUP_ONLYCONVERTING; | |
8d08fdba MS |
1084 | |
1085 | if (TREE_CODE (type) == ARRAY_TYPE) | |
1086 | { | |
1087 | /* Must arrange to initialize each element of EXP | |
1088 | from elements of INIT. */ | |
8d08fdba | 1089 | tree itype = init ? TREE_TYPE (init) : NULL_TREE; |
aa54df09 NS |
1090 | |
1091 | if (init && !itype) | |
8d08fdba MS |
1092 | { |
1093 | /* Handle bad initializers like: | |
1094 | class COMPLEX { | |
1095 | public: | |
1096 | double re, im; | |
1097 | COMPLEX(double r = 0.0, double i = 0.0) {re = r; im = i;}; | |
1098 | ~COMPLEX() {}; | |
1099 | }; | |
1100 | ||
1101 | int main(int argc, char **argv) { | |
1102 | COMPLEX zees(1.0, 0.0)[10]; | |
1103 | } | |
1104 | */ | |
33bd39a2 | 1105 | error ("bad array initializer"); |
f1dedc31 | 1106 | return error_mark_node; |
8d08fdba | 1107 | } |
89d684bb | 1108 | if (cp_type_quals (type) != TYPE_UNQUALIFIED) |
b2153b98 KL |
1109 | TREE_TYPE (exp) = TYPE_MAIN_VARIANT (type); |
1110 | if (itype && cp_type_quals (itype) != TYPE_UNQUALIFIED) | |
1111 | TREE_TYPE (init) = TYPE_MAIN_VARIANT (itype); | |
a48cccea | 1112 | stmt_expr = build_vec_init (exp, NULL_TREE, init, |
f1dedc31 MM |
1113 | init && same_type_p (TREE_TYPE (init), |
1114 | TREE_TYPE (exp))); | |
8d08fdba | 1115 | TREE_READONLY (exp) = was_const; |
f30432d7 | 1116 | TREE_THIS_VOLATILE (exp) = was_volatile; |
8d08fdba | 1117 | TREE_TYPE (exp) = type; |
f376e137 MS |
1118 | if (init) |
1119 | TREE_TYPE (init) = itype; | |
f1dedc31 | 1120 | return stmt_expr; |
8d08fdba MS |
1121 | } |
1122 | ||
1123 | if (TREE_CODE (exp) == VAR_DECL || TREE_CODE (exp) == PARM_DECL) | |
1124 | /* just know that we've seen something for this node */ | |
1125 | TREE_USED (exp) = 1; | |
1126 | ||
e7843f33 | 1127 | TREE_TYPE (exp) = TYPE_MAIN_VARIANT (type); |
2a3398e1 | 1128 | is_global = begin_init_stmts (&stmt_expr, &compound_stmt); |
f2c5f623 | 1129 | destroy_temps = stmts_are_full_exprs_p (); |
ae499cce | 1130 | current_stmt_tree ()->stmts_are_full_exprs_p = 0; |
8d08fdba | 1131 | expand_aggr_init_1 (TYPE_BINFO (type), exp, exp, |
b370501f | 1132 | init, LOOKUP_NORMAL|flags); |
2a3398e1 | 1133 | stmt_expr = finish_init_stmts (is_global, stmt_expr, compound_stmt); |
ae499cce | 1134 | current_stmt_tree ()->stmts_are_full_exprs_p = destroy_temps; |
e7843f33 | 1135 | TREE_TYPE (exp) = type; |
8d08fdba | 1136 | TREE_READONLY (exp) = was_const; |
f30432d7 | 1137 | TREE_THIS_VOLATILE (exp) = was_volatile; |
f1dedc31 MM |
1138 | |
1139 | return stmt_expr; | |
8d08fdba MS |
1140 | } |
1141 | ||
6f30f1f1 JM |
1142 | /* Like build_aggr_init, but not just for aggregates. */ |
1143 | ||
1144 | tree | |
362efdc1 | 1145 | build_init (tree decl, tree init, int flags) |
6f30f1f1 JM |
1146 | { |
1147 | tree expr; | |
1148 | ||
1149 | if (IS_AGGR_TYPE (TREE_TYPE (decl)) | |
1150 | || TREE_CODE (TREE_TYPE (decl)) == ARRAY_TYPE) | |
1151 | expr = build_aggr_init (decl, init, flags); | |
1152 | else | |
8e3df2de MM |
1153 | expr = build (INIT_EXPR, TREE_TYPE (decl), decl, init); |
1154 | ||
6f30f1f1 JM |
1155 | return expr; |
1156 | } | |
1157 | ||
8d08fdba | 1158 | static void |
362efdc1 | 1159 | expand_default_init (tree binfo, tree true_exp, tree exp, tree init, int flags) |
8d08fdba | 1160 | { |
fc378698 | 1161 | tree type = TREE_TYPE (exp); |
9eb71d8c | 1162 | tree ctor_name; |
fc378698 | 1163 | |
8d08fdba MS |
1164 | /* It fails because there may not be a constructor which takes |
1165 | its own type as the first (or only parameter), but which does | |
1166 | take other types via a conversion. So, if the thing initializing | |
1167 | the expression is a unit element of type X, first try X(X&), | |
1168 | followed by initialization by X. If neither of these work | |
1169 | out, then look hard. */ | |
1170 | tree rval; | |
1171 | tree parms; | |
8d08fdba | 1172 | |
277294d7 | 1173 | if (init && TREE_CODE (init) != TREE_LIST |
faf5394a MS |
1174 | && (flags & LOOKUP_ONLYCONVERTING)) |
1175 | { | |
1176 | /* Base subobjects should only get direct-initialization. */ | |
1177 | if (true_exp != exp) | |
1178 | abort (); | |
1179 | ||
c37dc68e JM |
1180 | if (flags & DIRECT_BIND) |
1181 | /* Do nothing. We hit this in two cases: Reference initialization, | |
1182 | where we aren't initializing a real variable, so we don't want | |
1183 | to run a new constructor; and catching an exception, where we | |
1184 | have already built up the constructor call so we could wrap it | |
1185 | in an exception region. */; | |
b216f69b MM |
1186 | else if (TREE_CODE (init) == CONSTRUCTOR |
1187 | && TREE_HAS_CONSTRUCTOR (init)) | |
8e3df2de | 1188 | { |
b216f69b MM |
1189 | /* A brace-enclosed initializer for an aggregate. */ |
1190 | my_friendly_assert (CP_AGGREGATE_TYPE_P (type), 20021016); | |
1191 | init = digest_init (type, init, (tree *)NULL); | |
8e3df2de | 1192 | } |
c37dc68e | 1193 | else |
37c46b43 | 1194 | init = ocp_convert (type, init, CONV_IMPLICIT|CONV_FORCE_TEMP, flags); |
faf5394a | 1195 | |
4e8dca1c JM |
1196 | if (TREE_CODE (init) == MUST_NOT_THROW_EXPR) |
1197 | /* We need to protect the initialization of a catch parm with a | |
1198 | call to terminate(), which shows up as a MUST_NOT_THROW_EXPR | |
c7ae64f2 | 1199 | around the TARGET_EXPR for the copy constructor. See |
4e8dca1c JM |
1200 | initialize_handler_parm. */ |
1201 | { | |
1202 | TREE_OPERAND (init, 0) = build (INIT_EXPR, TREE_TYPE (exp), exp, | |
1203 | TREE_OPERAND (init, 0)); | |
1204 | TREE_TYPE (init) = void_type_node; | |
1205 | } | |
c7ae64f2 JM |
1206 | else |
1207 | init = build (INIT_EXPR, TREE_TYPE (exp), exp, init); | |
1208 | TREE_SIDE_EFFECTS (init) = 1; | |
f1dedc31 | 1209 | finish_expr_stmt (init); |
faf5394a MS |
1210 | return; |
1211 | } | |
1212 | ||
b7484fbe MS |
1213 | if (init == NULL_TREE |
1214 | || (TREE_CODE (init) == TREE_LIST && ! TREE_TYPE (init))) | |
8d08fdba MS |
1215 | { |
1216 | parms = init; | |
db5ae43f MS |
1217 | if (parms) |
1218 | init = TREE_VALUE (parms); | |
8d08fdba | 1219 | } |
8d08fdba | 1220 | else |
051e6fd7 | 1221 | parms = build_tree_list (NULL_TREE, init); |
8d08fdba | 1222 | |
9eb71d8c MM |
1223 | if (true_exp == exp) |
1224 | ctor_name = complete_ctor_identifier; | |
1225 | else | |
1226 | ctor_name = base_ctor_identifier; | |
8d08fdba | 1227 | |
4ba126e4 | 1228 | rval = build_special_member_call (exp, ctor_name, parms, binfo, flags); |
25eb19ff | 1229 | if (TREE_SIDE_EFFECTS (rval)) |
e895113a | 1230 | finish_expr_stmt (convert_to_void (rval, NULL)); |
8d08fdba MS |
1231 | } |
1232 | ||
1233 | /* This function is responsible for initializing EXP with INIT | |
1234 | (if any). | |
1235 | ||
1236 | BINFO is the binfo of the type for who we are performing the | |
1237 | initialization. For example, if W is a virtual base class of A and B, | |
1238 | and C : A, B. | |
1239 | If we are initializing B, then W must contain B's W vtable, whereas | |
1240 | were we initializing C, W must contain C's W vtable. | |
1241 | ||
1242 | TRUE_EXP is nonzero if it is the true expression being initialized. | |
1243 | In this case, it may be EXP, or may just contain EXP. The reason we | |
1244 | need this is because if EXP is a base element of TRUE_EXP, we | |
1245 | don't necessarily know by looking at EXP where its virtual | |
1246 | baseclass fields should really be pointing. But we do know | |
1247 | from TRUE_EXP. In constructors, we don't know anything about | |
1248 | the value being initialized. | |
1249 | ||
8d08fdba MS |
1250 | FLAGS is just passes to `build_method_call'. See that function for |
1251 | its description. */ | |
1252 | ||
1253 | static void | |
362efdc1 | 1254 | expand_aggr_init_1 (tree binfo, tree true_exp, tree exp, tree init, int flags) |
8d08fdba MS |
1255 | { |
1256 | tree type = TREE_TYPE (exp); | |
8d08fdba MS |
1257 | |
1258 | my_friendly_assert (init != error_mark_node && type != error_mark_node, 211); | |
8e3df2de | 1259 | my_friendly_assert (building_stmt_tree (), 20021010); |
8d08fdba MS |
1260 | |
1261 | /* Use a function returning the desired type to initialize EXP for us. | |
1262 | If the function is a constructor, and its first argument is | |
1263 | NULL_TREE, know that it was meant for us--just slide exp on | |
1264 | in and expand the constructor. Constructors now come | |
1265 | as TARGET_EXPRs. */ | |
faf5394a MS |
1266 | |
1267 | if (init && TREE_CODE (exp) == VAR_DECL | |
1268 | && TREE_CODE (init) == CONSTRUCTOR | |
1269 | && TREE_HAS_CONSTRUCTOR (init)) | |
1270 | { | |
f1dedc31 MM |
1271 | /* If store_init_value returns NULL_TREE, the INIT has been |
1272 | record in the DECL_INITIAL for EXP. That means there's | |
1273 | nothing more we have to do. */ | |
8e3df2de | 1274 | if (store_init_value (exp, init)) |
c557501d | 1275 | finish_expr_stmt (build (INIT_EXPR, type, exp, init)); |
faf5394a MS |
1276 | return; |
1277 | } | |
1278 | ||
9e9ff709 MS |
1279 | /* We know that expand_default_init can handle everything we want |
1280 | at this point. */ | |
b370501f | 1281 | expand_default_init (binfo, true_exp, exp, init, flags); |
8d08fdba MS |
1282 | } |
1283 | ||
be99da77 MS |
1284 | /* Report an error if TYPE is not a user-defined, aggregate type. If |
1285 | OR_ELSE is nonzero, give an error message. */ | |
e92cc029 | 1286 | |
be99da77 | 1287 | int |
362efdc1 | 1288 | is_aggr_type (tree type, int or_else) |
be99da77 MS |
1289 | { |
1290 | if (type == error_mark_node) | |
1291 | return 0; | |
1292 | ||
1293 | if (! IS_AGGR_TYPE (type) | |
73b0fce8 | 1294 | && TREE_CODE (type) != TEMPLATE_TYPE_PARM |
a1281f45 | 1295 | && TREE_CODE (type) != BOUND_TEMPLATE_TEMPLATE_PARM) |
be99da77 MS |
1296 | { |
1297 | if (or_else) | |
33bd39a2 | 1298 | error ("`%T' is not an aggregate type", type); |
be99da77 MS |
1299 | return 0; |
1300 | } | |
1301 | return 1; | |
1302 | } | |
1303 | ||
8d08fdba | 1304 | /* Like is_aggr_typedef, but returns typedef if successful. */ |
e92cc029 | 1305 | |
8d08fdba | 1306 | tree |
362efdc1 | 1307 | get_aggr_from_typedef (tree name, int or_else) |
8d08fdba MS |
1308 | { |
1309 | tree type; | |
1310 | ||
1311 | if (name == error_mark_node) | |
1312 | return NULL_TREE; | |
1313 | ||
1314 | if (IDENTIFIER_HAS_TYPE_VALUE (name)) | |
1315 | type = IDENTIFIER_TYPE_VALUE (name); | |
8d08fdba MS |
1316 | else |
1317 | { | |
1318 | if (or_else) | |
33bd39a2 | 1319 | error ("`%T' fails to be an aggregate typedef", name); |
8d08fdba MS |
1320 | return NULL_TREE; |
1321 | } | |
1322 | ||
1323 | if (! IS_AGGR_TYPE (type) | |
73b0fce8 | 1324 | && TREE_CODE (type) != TEMPLATE_TYPE_PARM |
a1281f45 | 1325 | && TREE_CODE (type) != BOUND_TEMPLATE_TEMPLATE_PARM) |
8d08fdba MS |
1326 | { |
1327 | if (or_else) | |
33bd39a2 | 1328 | error ("type `%T' is of non-aggregate type", type); |
8d08fdba MS |
1329 | return NULL_TREE; |
1330 | } | |
1331 | return type; | |
1332 | } | |
1333 | ||
1334 | tree | |
362efdc1 | 1335 | get_type_value (tree name) |
8d08fdba | 1336 | { |
8d08fdba MS |
1337 | if (name == error_mark_node) |
1338 | return NULL_TREE; | |
1339 | ||
1340 | if (IDENTIFIER_HAS_TYPE_VALUE (name)) | |
1341 | return IDENTIFIER_TYPE_VALUE (name); | |
8d08fdba MS |
1342 | else |
1343 | return NULL_TREE; | |
1344 | } | |
051e6fd7 | 1345 | |
a5ac359a MM |
1346 | /* Build a reference to a member of an aggregate. This is not a C++ |
1347 | `&', but really something which can have its address taken, and | |
1348 | then act as a pointer to member, for example TYPE :: FIELD can have | |
1349 | its address taken by saying & TYPE :: FIELD. ADDRESS_P is true if | |
1350 | this expression is the operand of "&". | |
8d08fdba MS |
1351 | |
1352 | @@ Prints out lousy diagnostics for operator <typename> | |
1353 | @@ fields. | |
1354 | ||
51c184be | 1355 | @@ This function should be rewritten and placed in search.c. */ |
e92cc029 | 1356 | |
8d08fdba | 1357 | tree |
a5ac359a | 1358 | build_offset_ref (tree type, tree name, bool address_p) |
8d08fdba | 1359 | { |
8d245821 | 1360 | tree decl; |
d6479fe7 | 1361 | tree member; |
fc378698 | 1362 | tree basebinfo = NULL_TREE; |
2a238a97 | 1363 | tree orig_name = name; |
8d08fdba | 1364 | |
5f311aec | 1365 | /* class templates can come in as TEMPLATE_DECLs here. */ |
874503bc | 1366 | if (TREE_CODE (name) == TEMPLATE_DECL) |
93cdc044 JM |
1367 | return name; |
1368 | ||
53b22f3d MM |
1369 | if (processing_template_decl || uses_template_parms (type)) |
1370 | return build_min_nt (SCOPE_REF, type, name); | |
5566b478 | 1371 | |
2a238a97 MM |
1372 | if (TREE_CODE (name) == TEMPLATE_ID_EXPR) |
1373 | { | |
1374 | /* If the NAME is a TEMPLATE_ID_EXPR, we are looking at | |
1375 | something like `a.template f<int>' or the like. For the most | |
1376 | part, we treat this just like a.f. We do remember, however, | |
1377 | the template-id that was used. */ | |
1378 | name = TREE_OPERAND (orig_name, 0); | |
e4a84209 | 1379 | |
c65a922c TP |
1380 | if (DECL_P (name)) |
1381 | name = DECL_NAME (name); | |
1382 | else | |
1383 | { | |
10b1d5e7 MM |
1384 | if (TREE_CODE (name) == COMPONENT_REF) |
1385 | name = TREE_OPERAND (name, 1); | |
1386 | if (TREE_CODE (name) == OVERLOAD) | |
1387 | name = DECL_NAME (OVL_CURRENT (name)); | |
c65a922c | 1388 | } |
e4a84209 | 1389 | |
2a238a97 MM |
1390 | my_friendly_assert (TREE_CODE (name) == IDENTIFIER_NODE, 0); |
1391 | } | |
1392 | ||
c833d2be NS |
1393 | if (type == NULL_TREE) |
1394 | return error_mark_node; | |
1395 | ||
1396 | /* Handle namespace names fully here. */ | |
1397 | if (TREE_CODE (type) == NAMESPACE_DECL) | |
1398 | { | |
8d245821 | 1399 | tree t = lookup_namespace_name (type, name); |
c833d2be NS |
1400 | if (t == error_mark_node) |
1401 | return t; | |
1402 | if (TREE_CODE (orig_name) == TEMPLATE_ID_EXPR) | |
1403 | /* Reconstruct the TEMPLATE_ID_EXPR. */ | |
1404 | t = build (TEMPLATE_ID_EXPR, TREE_TYPE (t), | |
1405 | t, TREE_OPERAND (orig_name, 1)); | |
1406 | if (! type_unknown_p (t)) | |
1407 | { | |
1408 | mark_used (t); | |
1409 | t = convert_from_reference (t); | |
1410 | } | |
1411 | return t; | |
1412 | } | |
1413 | ||
1414 | if (! is_aggr_type (type, 1)) | |
1415 | return error_mark_node; | |
1416 | ||
8d08fdba MS |
1417 | if (TREE_CODE (name) == BIT_NOT_EXPR) |
1418 | { | |
1c2c08a5 | 1419 | if (! check_dtor_name (type, name)) |
33bd39a2 | 1420 | error ("qualified type `%T' does not match destructor name `~%T'", |
1c2c08a5 JM |
1421 | type, TREE_OPERAND (name, 0)); |
1422 | name = dtor_identifier; | |
8d08fdba | 1423 | } |
be99da77 | 1424 | |
d0f062fb | 1425 | if (!COMPLETE_TYPE_P (complete_type (type)) |
61a127b3 | 1426 | && !TYPE_BEING_DEFINED (type)) |
8d08fdba | 1427 | { |
33bd39a2 | 1428 | error ("incomplete type `%T' does not have member `%D'", type, |
61a127b3 | 1429 | name); |
8d08fdba MS |
1430 | return error_mark_node; |
1431 | } | |
1432 | ||
51924768 | 1433 | decl = maybe_dummy_object (type, &basebinfo); |
8d08fdba | 1434 | |
a723baf1 | 1435 | if (BASELINK_P (name) || DECL_P (name)) |
50ad9642 MM |
1436 | member = name; |
1437 | else | |
1438 | { | |
1439 | member = lookup_member (basebinfo, name, 1, 0); | |
1440 | ||
1441 | if (member == error_mark_node) | |
1442 | return error_mark_node; | |
1443 | } | |
00595019 | 1444 | |
a5ac359a MM |
1445 | if (!member) |
1446 | { | |
1447 | error ("`%D' is not a member of type `%T'", name, type); | |
1448 | return error_mark_node; | |
1449 | } | |
1450 | ||
1451 | if (TREE_CODE (member) == TYPE_DECL) | |
1452 | { | |
1453 | TREE_USED (member) = 1; | |
1454 | return member; | |
1455 | } | |
1456 | /* static class members and class-specific enum | |
1457 | values can be returned without further ado. */ | |
1458 | if (TREE_CODE (member) == VAR_DECL || TREE_CODE (member) == CONST_DECL) | |
1459 | { | |
1460 | mark_used (member); | |
1461 | return convert_from_reference (member); | |
1462 | } | |
1463 | ||
1464 | if (TREE_CODE (member) == FIELD_DECL && DECL_C_BIT_FIELD (member)) | |
1465 | { | |
1466 | error ("invalid pointer to bit-field `%D'", member); | |
1467 | return error_mark_node; | |
1468 | } | |
1469 | ||
aa52c1ff | 1470 | /* A lot of this logic is now handled in lookup_member. */ |
a5ac359a | 1471 | if (BASELINK_P (member)) |
8d08fdba | 1472 | { |
8d08fdba | 1473 | /* Go from the TREE_BASELINK to the member function info. */ |
d6479fe7 | 1474 | tree fnfields = member; |
8d245821 | 1475 | tree t = BASELINK_FUNCTIONS (fnfields); |
8d08fdba | 1476 | |
2a238a97 MM |
1477 | if (TREE_CODE (orig_name) == TEMPLATE_ID_EXPR) |
1478 | { | |
1479 | /* The FNFIELDS are going to contain functions that aren't | |
1480 | necessarily templates, and templates that don't | |
1481 | necessarily match the explicit template parameters. We | |
1482 | save all the functions, and the explicit parameters, and | |
1483 | then figure out exactly what to instantiate with what | |
1484 | arguments in instantiate_type. */ | |
1485 | ||
1486 | if (TREE_CODE (t) != OVERLOAD) | |
1487 | /* The code in instantiate_type which will process this | |
1488 | expects to encounter OVERLOADs, not raw functions. */ | |
1489 | t = ovl_cons (t, NULL_TREE); | |
051e6fd7 | 1490 | |
19420d00 NS |
1491 | t = build (TEMPLATE_ID_EXPR, TREE_TYPE (t), t, |
1492 | TREE_OPERAND (orig_name, 1)); | |
1493 | t = build (OFFSET_REF, unknown_type_node, decl, t); | |
1494 | ||
1495 | PTRMEM_OK_P (t) = 1; | |
1496 | ||
1497 | return t; | |
2a238a97 MM |
1498 | } |
1499 | ||
50ad9642 | 1500 | if (TREE_CODE (t) != TEMPLATE_ID_EXPR && !really_overloaded_fn (t)) |
8d08fdba | 1501 | { |
2c73f9f5 ML |
1502 | /* Get rid of a potential OVERLOAD around it */ |
1503 | t = OVL_CURRENT (t); | |
1504 | ||
b54f5338 KL |
1505 | /* Unique functions are handled easily. */ |
1506 | ||
1507 | /* For non-static member of base class, we need a special rule | |
1508 | for access checking [class.protected]: | |
1509 | ||
1510 | If the access is to form a pointer to member, the | |
1511 | nested-name-specifier shall name the derived class | |
1512 | (or any class derived from that class). */ | |
1513 | if (address_p && DECL_P (t) | |
1514 | && DECL_NONSTATIC_MEMBER_P (t)) | |
1515 | perform_or_defer_access_check (TYPE_BINFO (type), t); | |
1516 | else | |
1517 | perform_or_defer_access_check (basebinfo, t); | |
1518 | ||
fc378698 | 1519 | mark_used (t); |
848b92e1 JM |
1520 | if (DECL_STATIC_FUNCTION_P (t)) |
1521 | return t; | |
a5ac359a MM |
1522 | member = t; |
1523 | } | |
1524 | else | |
1525 | { | |
1526 | TREE_TYPE (fnfields) = unknown_type_node; | |
1527 | member = fnfields; | |
8d08fdba | 1528 | } |
8d08fdba | 1529 | } |
b54f5338 KL |
1530 | else if (address_p && TREE_CODE (member) == FIELD_DECL) |
1531 | /* We need additional test besides the one in | |
1532 | check_accessibility_of_qualified_id in case it is | |
1533 | a pointer to non-static member. */ | |
1534 | perform_or_defer_access_check (TYPE_BINFO (type), member); | |
8d08fdba | 1535 | |
a5ac359a | 1536 | if (!address_p) |
8d08fdba | 1537 | { |
a5ac359a MM |
1538 | /* If MEMBER is non-static, then the program has fallen afoul of |
1539 | [expr.prim]: | |
8d08fdba | 1540 | |
a5ac359a MM |
1541 | An id-expression that denotes a nonstatic data member or |
1542 | nonstatic member function of a class can only be used: | |
8d08fdba | 1543 | |
a5ac359a MM |
1544 | -- as part of a class member access (_expr.ref_) in which the |
1545 | object-expression refers to the member's class or a class | |
1546 | derived from that class, or | |
b7484fbe | 1547 | |
a5ac359a MM |
1548 | -- to form a pointer to member (_expr.unary.op_), or |
1549 | ||
1550 | -- in the body of a nonstatic member function of that class or | |
1551 | of a class derived from that class (_class.mfct.nonstatic_), or | |
1552 | ||
1553 | -- in a mem-initializer for a constructor for that class or for | |
1554 | a class derived from that class (_class.base.init_). */ | |
1555 | if (DECL_NONSTATIC_MEMBER_FUNCTION_P (member)) | |
1556 | { | |
1557 | /* In Microsoft mode, treat a non-static member function as if | |
1558 | it were a pointer-to-member. */ | |
1559 | if (flag_ms_extensions) | |
1560 | { | |
1561 | member = build (OFFSET_REF, TREE_TYPE (member), decl, member); | |
1562 | PTRMEM_OK_P (member) = 1; | |
1563 | return build_unary_op (ADDR_EXPR, member, 0); | |
1564 | } | |
1565 | error ("invalid use of non-static member function `%D'", member); | |
1566 | return error_mark_node; | |
1567 | } | |
1568 | else if (TREE_CODE (member) == FIELD_DECL) | |
1569 | { | |
1570 | error ("invalid use of non-static data member `%D'", member); | |
1571 | return error_mark_node; | |
1572 | } | |
1573 | return member; | |
1574 | } | |
8d08fdba | 1575 | |
be99da77 MS |
1576 | /* In member functions, the form `type::name' is no longer |
1577 | equivalent to `this->type::name', at least not until | |
1578 | resolve_offset_ref. */ | |
a5ac359a | 1579 | member = build (OFFSET_REF, TREE_TYPE (member), decl, member); |
8d245821 MM |
1580 | PTRMEM_OK_P (member) = 1; |
1581 | return member; | |
8d08fdba MS |
1582 | } |
1583 | ||
fc611ce0 MM |
1584 | /* If DECL is a `const' declaration, and its value is a known |
1585 | constant, then return that value. */ | |
8d08fdba MS |
1586 | |
1587 | tree | |
362efdc1 | 1588 | decl_constant_value (tree decl) |
8d08fdba | 1589 | { |
a1652802 MM |
1590 | /* When we build a COND_EXPR, we don't know whether it will be used |
1591 | as an lvalue or as an rvalue. If it is an lvalue, it's not safe | |
1592 | to replace the second and third operands with their | |
1593 | initializers. So, we do that here. */ | |
1594 | if (TREE_CODE (decl) == COND_EXPR) | |
1595 | { | |
1596 | tree d1; | |
1597 | tree d2; | |
1598 | ||
1599 | d1 = decl_constant_value (TREE_OPERAND (decl, 1)); | |
1600 | d2 = decl_constant_value (TREE_OPERAND (decl, 2)); | |
1601 | ||
1602 | if (d1 != TREE_OPERAND (decl, 1) || d2 != TREE_OPERAND (decl, 2)) | |
1603 | return build (COND_EXPR, | |
1604 | TREE_TYPE (decl), | |
1605 | TREE_OPERAND (decl, 0), d1, d2); | |
1606 | } | |
1607 | ||
fc611ce0 MM |
1608 | if (TREE_READONLY_DECL_P (decl) |
1609 | && ! TREE_THIS_VOLATILE (decl) | |
61a127b3 | 1610 | && DECL_INITIAL (decl) |
bd6dd845 | 1611 | && DECL_INITIAL (decl) != error_mark_node |
8d08fdba MS |
1612 | /* This is invalid if initial value is not constant. |
1613 | If it has either a function call, a memory reference, | |
1614 | or a variable, then re-evaluating it could give different results. */ | |
1615 | && TREE_CONSTANT (DECL_INITIAL (decl)) | |
1616 | /* Check for cases where this is sub-optimal, even though valid. */ | |
61a127b3 | 1617 | && TREE_CODE (DECL_INITIAL (decl)) != CONSTRUCTOR) |
8d08fdba MS |
1618 | return DECL_INITIAL (decl); |
1619 | return decl; | |
1620 | } | |
1621 | \f | |
8d08fdba MS |
1622 | /* Common subroutines of build_new and build_vec_delete. */ |
1623 | ||
c787dd82 | 1624 | /* Call the global __builtin_delete to delete ADDR. */ |
8d08fdba | 1625 | |
bd6dd845 | 1626 | static tree |
362efdc1 | 1627 | build_builtin_delete_call (tree addr) |
8d08fdba | 1628 | { |
a6ecf8b6 | 1629 | mark_used (global_delete_fndecl); |
0c11ada6 | 1630 | return build_call (global_delete_fndecl, build_tree_list (NULL_TREE, addr)); |
8d08fdba MS |
1631 | } |
1632 | \f | |
1633 | /* Generate a C++ "new" expression. DECL is either a TREE_LIST | |
1634 | (which needs to go through some sort of groktypename) or it | |
1635 | is the name of the class we are newing. INIT is an initialization value. | |
1636 | It is either an EXPRLIST, an EXPR_NO_COMMAS, or something in braces. | |
1637 | If INIT is void_type_node, it means do *not* call a constructor | |
1638 | for this instance. | |
1639 | ||
1640 | For types with constructors, the data returned is initialized | |
1641 | by the appropriate constructor. | |
1642 | ||
1643 | Whether the type has a constructor or not, if it has a pointer | |
1644 | to a virtual function table, then that pointer is set up | |
1645 | here. | |
1646 | ||
1647 | Unless I am mistaken, a call to new () will return initialized | |
1648 | data regardless of whether the constructor itself is private or | |
8926095f | 1649 | not. NOPE; new fails if the constructor is private (jcm). |
8d08fdba MS |
1650 | |
1651 | Note that build_new does nothing to assure that any special | |
1652 | alignment requirements of the type are met. Rather, it leaves | |
1653 | it up to malloc to do the right thing. Otherwise, folding to | |
1654 | the right alignment cal cause problems if the user tries to later | |
1655 | free the memory returned by `new'. | |
1656 | ||
1657 | PLACEMENT is the `placement' list for user-defined operator new (). */ | |
1658 | ||
1659 | tree | |
362efdc1 | 1660 | build_new (tree placement, tree decl, tree init, int use_global_new) |
8d08fdba | 1661 | { |
a0d5fba7 | 1662 | tree type, rval; |
a703fb38 | 1663 | tree nelts = NULL_TREE, t; |
8926095f | 1664 | int has_array = 0; |
8d08fdba | 1665 | |
8d08fdba MS |
1666 | if (decl == error_mark_node) |
1667 | return error_mark_node; | |
1668 | ||
1669 | if (TREE_CODE (decl) == TREE_LIST) | |
1670 | { | |
1671 | tree absdcl = TREE_VALUE (decl); | |
1672 | tree last_absdcl = NULL_TREE; | |
8d08fdba MS |
1673 | |
1674 | if (current_function_decl | |
1675 | && DECL_CONSTRUCTOR_P (current_function_decl)) | |
2aa3110a | 1676 | my_friendly_assert (immediate_size_expand == 0, 19990926); |
8d08fdba MS |
1677 | |
1678 | nelts = integer_one_node; | |
1679 | ||
1680 | if (absdcl && TREE_CODE (absdcl) == CALL_EXPR) | |
a98facb0 | 1681 | abort (); |
8d08fdba MS |
1682 | while (absdcl && TREE_CODE (absdcl) == INDIRECT_REF) |
1683 | { | |
1684 | last_absdcl = absdcl; | |
1685 | absdcl = TREE_OPERAND (absdcl, 0); | |
1686 | } | |
1687 | ||
1688 | if (absdcl && TREE_CODE (absdcl) == ARRAY_REF) | |
1689 | { | |
1690 | /* probably meant to be a vec new */ | |
1691 | tree this_nelts; | |
1692 | ||
51c184be MS |
1693 | while (TREE_OPERAND (absdcl, 0) |
1694 | && TREE_CODE (TREE_OPERAND (absdcl, 0)) == ARRAY_REF) | |
1695 | { | |
1696 | last_absdcl = absdcl; | |
1697 | absdcl = TREE_OPERAND (absdcl, 0); | |
1698 | } | |
1699 | ||
8d08fdba MS |
1700 | has_array = 1; |
1701 | this_nelts = TREE_OPERAND (absdcl, 1); | |
1702 | if (this_nelts != error_mark_node) | |
1703 | { | |
1704 | if (this_nelts == NULL_TREE) | |
8251199e | 1705 | error ("new of array type fails to specify size"); |
5156628f | 1706 | else if (processing_template_decl) |
5566b478 MS |
1707 | { |
1708 | nelts = this_nelts; | |
1709 | absdcl = TREE_OPERAND (absdcl, 0); | |
1710 | } | |
8d08fdba MS |
1711 | else |
1712 | { | |
12fa82db | 1713 | if (build_expr_type_conversion (WANT_INT | WANT_ENUM, |
b746c5dc | 1714 | this_nelts, false) |
6a8f78d5 JM |
1715 | == NULL_TREE) |
1716 | pedwarn ("size in array new must have integral type"); | |
1717 | ||
37c46b43 | 1718 | this_nelts = save_expr (cp_convert (sizetype, this_nelts)); |
8d08fdba MS |
1719 | absdcl = TREE_OPERAND (absdcl, 0); |
1720 | if (this_nelts == integer_zero_node) | |
1721 | { | |
8251199e | 1722 | warning ("zero size array reserves no space"); |
8d08fdba MS |
1723 | nelts = integer_zero_node; |
1724 | } | |
1725 | else | |
ab76ca54 | 1726 | nelts = cp_build_binary_op (MULT_EXPR, nelts, this_nelts); |
8d08fdba MS |
1727 | } |
1728 | } | |
1729 | else | |
1730 | nelts = integer_zero_node; | |
1731 | } | |
1732 | ||
1733 | if (last_absdcl) | |
1734 | TREE_OPERAND (last_absdcl, 0) = absdcl; | |
1735 | else | |
1736 | TREE_VALUE (decl) = absdcl; | |
1737 | ||
a0d5fba7 | 1738 | type = groktypename (decl); |
8926095f | 1739 | if (! type || type == error_mark_node) |
2aa3110a | 1740 | return error_mark_node; |
8d08fdba MS |
1741 | } |
1742 | else if (TREE_CODE (decl) == IDENTIFIER_NODE) | |
1743 | { | |
1744 | if (IDENTIFIER_HAS_TYPE_VALUE (decl)) | |
1745 | { | |
1746 | /* An aggregate type. */ | |
1747 | type = IDENTIFIER_TYPE_VALUE (decl); | |
d2e5ee5c | 1748 | decl = TYPE_MAIN_DECL (type); |
8d08fdba MS |
1749 | } |
1750 | else | |
1751 | { | |
1752 | /* A builtin type. */ | |
1753 | decl = lookup_name (decl, 1); | |
1754 | my_friendly_assert (TREE_CODE (decl) == TYPE_DECL, 215); | |
1755 | type = TREE_TYPE (decl); | |
1756 | } | |
8d08fdba MS |
1757 | } |
1758 | else if (TREE_CODE (decl) == TYPE_DECL) | |
1759 | { | |
1760 | type = TREE_TYPE (decl); | |
8d08fdba MS |
1761 | } |
1762 | else | |
1763 | { | |
1764 | type = decl; | |
d2e5ee5c | 1765 | decl = TYPE_MAIN_DECL (type); |
8d08fdba MS |
1766 | } |
1767 | ||
5156628f | 1768 | if (processing_template_decl) |
5566b478 | 1769 | { |
5566b478 | 1770 | if (has_array) |
a09ba2e0 MM |
1771 | t = tree_cons (tree_cons (NULL_TREE, type, NULL_TREE), |
1772 | build_min_nt (ARRAY_REF, NULL_TREE, nelts), | |
1773 | NULL_TREE); | |
5566b478 MS |
1774 | else |
1775 | t = type; | |
1776 | ||
c006d942 MM |
1777 | rval = build_min (NEW_EXPR, build_pointer_type (type), |
1778 | placement, t, init); | |
5566b478 MS |
1779 | NEW_EXPR_USE_GLOBAL (rval) = use_global_new; |
1780 | return rval; | |
1781 | } | |
1782 | ||
8926095f MS |
1783 | /* ``A reference cannot be created by the new operator. A reference |
1784 | is not an object (8.2.2, 8.4.3), so a pointer to it could not be | |
1785 | returned by new.'' ARM 5.3.3 */ | |
1786 | if (TREE_CODE (type) == REFERENCE_TYPE) | |
8d08fdba | 1787 | { |
8251199e | 1788 | error ("new cannot be applied to a reference type"); |
a0d5fba7 | 1789 | type = TREE_TYPE (type); |
8d08fdba MS |
1790 | } |
1791 | ||
b7484fbe MS |
1792 | if (TREE_CODE (type) == FUNCTION_TYPE) |
1793 | { | |
8251199e | 1794 | error ("new cannot be applied to a function type"); |
b7484fbe MS |
1795 | return error_mark_node; |
1796 | } | |
1797 | ||
8926095f MS |
1798 | /* When the object being created is an array, the new-expression yields a |
1799 | pointer to the initial element (if any) of the array. For example, | |
1800 | both new int and new int[10] return an int*. 5.3.4. */ | |
1801 | if (TREE_CODE (type) == ARRAY_TYPE && has_array == 0) | |
8d08fdba | 1802 | { |
8926095f MS |
1803 | nelts = array_type_nelts_top (type); |
1804 | has_array = 1; | |
a0d5fba7 | 1805 | type = TREE_TYPE (type); |
8d08fdba MS |
1806 | } |
1807 | ||
a0d5fba7 JM |
1808 | if (has_array) |
1809 | t = build_nt (ARRAY_REF, type, nelts); | |
1810 | else | |
1811 | t = type; | |
1812 | ||
1813 | rval = build (NEW_EXPR, build_pointer_type (type), placement, t, init); | |
1814 | NEW_EXPR_USE_GLOBAL (rval) = use_global_new; | |
1815 | TREE_SIDE_EFFECTS (rval) = 1; | |
b3ab27f3 MM |
1816 | rval = build_new_1 (rval); |
1817 | if (rval == error_mark_node) | |
1818 | return error_mark_node; | |
a0d5fba7 JM |
1819 | |
1820 | /* Wrap it in a NOP_EXPR so warn_if_unused_value doesn't complain. */ | |
1821 | rval = build1 (NOP_EXPR, TREE_TYPE (rval), rval); | |
1822 | TREE_NO_UNUSED_WARNING (rval) = 1; | |
1823 | ||
a0d5fba7 JM |
1824 | return rval; |
1825 | } | |
1826 | ||
c6002625 | 1827 | /* Given a Java class, return a decl for the corresponding java.lang.Class. */ |
743f140d | 1828 | |
e97f22c9 | 1829 | tree |
362efdc1 | 1830 | build_java_class_ref (tree type) |
743f140d | 1831 | { |
ae0ed63a | 1832 | tree name = NULL_TREE, class_decl; |
d1a458c4 TT |
1833 | static tree CL_suffix = NULL_TREE; |
1834 | if (CL_suffix == NULL_TREE) | |
1835 | CL_suffix = get_identifier("class$"); | |
743f140d PB |
1836 | if (jclass_node == NULL_TREE) |
1837 | { | |
400500c4 | 1838 | jclass_node = IDENTIFIER_GLOBAL_VALUE (get_identifier ("jclass")); |
743f140d | 1839 | if (jclass_node == NULL_TREE) |
400500c4 RK |
1840 | fatal_error ("call to Java constructor, while `jclass' undefined"); |
1841 | ||
743f140d PB |
1842 | jclass_node = TREE_TYPE (jclass_node); |
1843 | } | |
23d4e4cc | 1844 | |
3461fba7 | 1845 | /* Mangle the class$ field */ |
1f84ec23 MM |
1846 | { |
1847 | tree field; | |
1848 | for (field = TYPE_FIELDS (type); field; field = TREE_CHAIN (field)) | |
1849 | if (DECL_NAME (field) == CL_suffix) | |
1850 | { | |
92643fea MM |
1851 | mangle_decl (field); |
1852 | name = DECL_ASSEMBLER_NAME (field); | |
1f84ec23 MM |
1853 | break; |
1854 | } | |
1855 | if (!field) | |
1f978f5f | 1856 | internal_error ("can't find class$"); |
23d4e4cc | 1857 | } |
23d4e4cc | 1858 | |
743f140d PB |
1859 | class_decl = IDENTIFIER_GLOBAL_VALUE (name); |
1860 | if (class_decl == NULL_TREE) | |
1861 | { | |
743f140d PB |
1862 | class_decl = build_decl (VAR_DECL, name, TREE_TYPE (jclass_node)); |
1863 | TREE_STATIC (class_decl) = 1; | |
1864 | DECL_EXTERNAL (class_decl) = 1; | |
1865 | TREE_PUBLIC (class_decl) = 1; | |
1866 | DECL_ARTIFICIAL (class_decl) = 1; | |
1867 | DECL_IGNORED_P (class_decl) = 1; | |
1868 | pushdecl_top_level (class_decl); | |
3e411c3f | 1869 | make_decl_rtl (class_decl, NULL); |
743f140d PB |
1870 | } |
1871 | return class_decl; | |
1872 | } | |
1873 | ||
d1a458c4 | 1874 | /* Returns the size of the cookie to use when allocating an array |
834c6dff MM |
1875 | whose elements have the indicated TYPE. Assumes that it is already |
1876 | known that a cookie is needed. */ | |
1877 | ||
1878 | static tree | |
362efdc1 | 1879 | get_cookie_size (tree type) |
834c6dff MM |
1880 | { |
1881 | tree cookie_size; | |
1882 | ||
3461fba7 NS |
1883 | /* We need to allocate an additional max (sizeof (size_t), alignof |
1884 | (true_type)) bytes. */ | |
1f84ec23 MM |
1885 | tree sizetype_size; |
1886 | tree type_align; | |
1887 | ||
1888 | sizetype_size = size_in_bytes (sizetype); | |
1889 | type_align = size_int (TYPE_ALIGN_UNIT (type)); | |
1890 | if (INT_CST_LT_UNSIGNED (type_align, sizetype_size)) | |
1891 | cookie_size = sizetype_size; | |
834c6dff | 1892 | else |
1f84ec23 | 1893 | cookie_size = type_align; |
834c6dff MM |
1894 | |
1895 | return cookie_size; | |
1896 | } | |
1897 | ||
a0d5fba7 JM |
1898 | /* Called from cplus_expand_expr when expanding a NEW_EXPR. The return |
1899 | value is immediately handed to expand_expr. */ | |
1900 | ||
834c6dff | 1901 | static tree |
362efdc1 | 1902 | build_new_1 (tree exp) |
a0d5fba7 | 1903 | { |
56c5d8bf | 1904 | tree placement, init; |
f4f4610e MM |
1905 | tree true_type, size, rval, t; |
1906 | /* The type of the new-expression. (This type is always a pointer | |
1907 | type.) */ | |
1908 | tree pointer_type; | |
1909 | /* The type pointed to by POINTER_TYPE. */ | |
1910 | tree type; | |
1911 | /* The type being allocated. For "new T[...]" this will be an | |
1912 | ARRAY_TYPE. */ | |
f30efcb7 | 1913 | tree full_type; |
f4f4610e MM |
1914 | /* A pointer type pointing to to the FULL_TYPE. */ |
1915 | tree full_pointer_type; | |
a48cccea | 1916 | tree outer_nelts = NULL_TREE; |
a703fb38 | 1917 | tree nelts = NULL_TREE; |
f4f4610e MM |
1918 | tree alloc_call, alloc_expr; |
1919 | /* The address returned by the call to "operator new". This node is | |
1920 | a VAR_DECL and is therefore reusable. */ | |
1921 | tree alloc_node; | |
46ff5047 | 1922 | tree alloc_fn; |
8b5e2ce4 | 1923 | tree cookie_expr, init_expr; |
a0d5fba7 | 1924 | int has_array = 0; |
834c6dff | 1925 | enum tree_code code; |
089d6ea7 | 1926 | int nothrow, check_new; |
834c6dff MM |
1927 | /* Nonzero if the user wrote `::new' rather than just `new'. */ |
1928 | int globally_qualified_p; | |
743f140d | 1929 | int use_java_new = 0; |
834c6dff MM |
1930 | /* If non-NULL, the number of extra bytes to allocate at the |
1931 | beginning of the storage allocated for an array-new expression in | |
1932 | order to store the number of elements. */ | |
1933 | tree cookie_size = NULL_TREE; | |
3f41ffd8 MM |
1934 | /* True if the function we are calling is a placement allocation |
1935 | function. */ | |
1936 | bool placement_allocation_fn_p; | |
4f649415 | 1937 | tree args = NULL_TREE; |
f4f4610e | 1938 | /* True if the storage must be initialized, either by a constructor |
34cd5ae7 | 1939 | or due to an explicit new-initializer. */ |
f4f4610e MM |
1940 | bool is_initialized; |
1941 | /* The address of the thing allocated, not including any cookie. In | |
1942 | particular, if an array cookie is in use, DATA_ADDR is the | |
1943 | address of the first array element. This node is a VAR_DECL, and | |
1944 | is therefore reusable. */ | |
1945 | tree data_addr; | |
a0d5fba7 JM |
1946 | |
1947 | placement = TREE_OPERAND (exp, 0); | |
1948 | type = TREE_OPERAND (exp, 1); | |
1949 | init = TREE_OPERAND (exp, 2); | |
834c6dff | 1950 | globally_qualified_p = NEW_EXPR_USE_GLOBAL (exp); |
a0d5fba7 JM |
1951 | |
1952 | if (TREE_CODE (type) == ARRAY_REF) | |
1953 | { | |
1954 | has_array = 1; | |
a48cccea | 1955 | nelts = outer_nelts = TREE_OPERAND (type, 1); |
a0d5fba7 | 1956 | type = TREE_OPERAND (type, 0); |
f30efcb7 | 1957 | |
a48cccea JM |
1958 | /* Use an incomplete array type to avoid VLA headaches. */ |
1959 | full_type = build_cplus_array_type (type, NULL_TREE); | |
a0d5fba7 | 1960 | } |
f30efcb7 JM |
1961 | else |
1962 | full_type = type; | |
1963 | ||
a0d5fba7 JM |
1964 | true_type = type; |
1965 | ||
834c6dff MM |
1966 | code = has_array ? VEC_NEW_EXPR : NEW_EXPR; |
1967 | ||
8d08fdba MS |
1968 | /* If our base type is an array, then make sure we know how many elements |
1969 | it has. */ | |
1970 | while (TREE_CODE (true_type) == ARRAY_TYPE) | |
1971 | { | |
1972 | tree this_nelts = array_type_nelts_top (true_type); | |
ab76ca54 | 1973 | nelts = cp_build_binary_op (MULT_EXPR, nelts, this_nelts); |
8d08fdba MS |
1974 | true_type = TREE_TYPE (true_type); |
1975 | } | |
5566b478 | 1976 | |
66543169 | 1977 | if (!complete_type_or_else (true_type, exp)) |
8f259df3 | 1978 | return error_mark_node; |
5566b478 | 1979 | |
cc600f33 | 1980 | if (TREE_CODE (true_type) == VOID_TYPE) |
e1cd6e56 | 1981 | { |
8251199e | 1982 | error ("invalid type `void' for new"); |
e1cd6e56 MS |
1983 | return error_mark_node; |
1984 | } | |
1985 | ||
a7a64a77 MM |
1986 | if (abstract_virtuals_error (NULL_TREE, true_type)) |
1987 | return error_mark_node; | |
8926095f | 1988 | |
f4f4610e MM |
1989 | is_initialized = (TYPE_NEEDS_CONSTRUCTING (type) || init); |
1990 | if (CP_TYPE_CONST_P (true_type) && !is_initialized) | |
1991 | { | |
1992 | error ("uninitialized const in `new' of `%#T'", true_type); | |
1993 | return error_mark_node; | |
1994 | } | |
1995 | ||
089d6ea7 MM |
1996 | size = size_in_bytes (true_type); |
1997 | if (has_array) | |
1998 | size = size_binop (MULT_EXPR, size, convert (sizetype, nelts)); | |
a28e3c7f | 1999 | |
e92cc029 | 2000 | /* Allocate the object. */ |
9bfadf57 | 2001 | if (! placement && TYPE_FOR_JAVA (true_type)) |
743f140d | 2002 | { |
8c1bd4f5 | 2003 | tree class_addr, alloc_decl; |
743f140d PB |
2004 | tree class_decl = build_java_class_ref (true_type); |
2005 | tree class_size = size_in_bytes (true_type); | |
8b60264b | 2006 | static const char alloc_name[] = "_Jv_AllocObject"; |
743f140d | 2007 | use_java_new = 1; |
3c28fc74 JM |
2008 | alloc_decl = IDENTIFIER_GLOBAL_VALUE (get_identifier (alloc_name)); |
2009 | if (alloc_decl == NULL_TREE) | |
2010 | fatal_error ("call to Java constructor with `%s' undefined", | |
2011 | alloc_name); | |
2012 | ||
743f140d | 2013 | class_addr = build1 (ADDR_EXPR, jclass_node, class_decl); |
96790071 JM |
2014 | alloc_call = (build_function_call |
2015 | (alloc_decl, | |
2016 | tree_cons (NULL_TREE, class_addr, | |
2017 | build_tree_list (NULL_TREE, class_size)))); | |
743f140d | 2018 | } |
8d08fdba MS |
2019 | else |
2020 | { | |
834c6dff | 2021 | tree fnname; |
834c6dff | 2022 | |
596ea4e5 | 2023 | fnname = ansi_opname (code); |
834c6dff | 2024 | |
089d6ea7 MM |
2025 | if (!globally_qualified_p |
2026 | && CLASS_TYPE_P (true_type) | |
2027 | && (has_array | |
2028 | ? TYPE_HAS_ARRAY_NEW_OPERATOR (true_type) | |
2029 | : TYPE_HAS_NEW_OPERATOR (true_type))) | |
2030 | { | |
2031 | /* Use a class-specific operator new. */ | |
2032 | /* If a cookie is required, add some extra space. */ | |
2033 | if (has_array && TYPE_VEC_NEW_USES_COOKIE (true_type)) | |
2034 | { | |
2035 | cookie_size = get_cookie_size (true_type); | |
2036 | size = size_binop (PLUS_EXPR, size, cookie_size); | |
2037 | } | |
2038 | /* Create the argument list. */ | |
2039 | args = tree_cons (NULL_TREE, size, placement); | |
2040 | /* Call the function. */ | |
2041 | alloc_call = build_method_call (build_dummy_object (true_type), | |
2042 | fnname, args, | |
2043 | TYPE_BINFO (true_type), | |
2044 | LOOKUP_NORMAL); | |
2045 | } | |
834c6dff | 2046 | else |
089d6ea7 MM |
2047 | { |
2048 | /* Use a global operator new. */ | |
125e6594 MM |
2049 | /* See if a cookie might be required. */ |
2050 | if (has_array && TYPE_VEC_NEW_USES_COOKIE (true_type)) | |
2051 | cookie_size = get_cookie_size (true_type); | |
2052 | else | |
2053 | cookie_size = NULL_TREE; | |
2054 | ||
2055 | alloc_call = build_operator_new_call (fnname, placement, | |
2056 | &size, &cookie_size); | |
089d6ea7 | 2057 | } |
8d08fdba MS |
2058 | } |
2059 | ||
96790071 | 2060 | if (alloc_call == error_mark_node) |
2bb5d995 JM |
2061 | return error_mark_node; |
2062 | ||
a6111661 JM |
2063 | /* In the simple case, we can stop now. */ |
2064 | pointer_type = build_pointer_type (type); | |
2065 | if (!cookie_size && !is_initialized) | |
2066 | return build_nop (pointer_type, alloc_call); | |
2067 | ||
2068 | /* While we're working, use a pointer to the type we've actually | |
2069 | allocated. Store the result of the call in a variable so that we | |
2070 | can use it more than once. */ | |
2071 | full_pointer_type = build_pointer_type (full_type); | |
2072 | alloc_expr = get_target_expr (build_nop (full_pointer_type, alloc_call)); | |
2073 | alloc_node = TARGET_EXPR_SLOT (alloc_expr); | |
2074 | ||
2075 | /* Strip any COMPOUND_EXPRs from ALLOC_CALL. */ | |
2076 | while (TREE_CODE (alloc_call) == COMPOUND_EXPR) | |
2077 | alloc_call = TREE_OPERAND (alloc_call, 1); | |
2078 | alloc_fn = get_callee_fndecl (alloc_call); | |
46ff5047 | 2079 | my_friendly_assert (alloc_fn != NULL_TREE, 20020325); |
089d6ea7 | 2080 | |
3f41ffd8 MM |
2081 | /* Now, check to see if this function is actually a placement |
2082 | allocation function. This can happen even when PLACEMENT is NULL | |
2083 | because we might have something like: | |
2084 | ||
2085 | struct S { void* operator new (size_t, int i = 0); }; | |
2086 | ||
2087 | A call to `new S' will get this allocation function, even though | |
2088 | there is no explicit placement argument. If there is more than | |
2089 | one argument, or there are variable arguments, then this is a | |
2090 | placement allocation function. */ | |
2091 | placement_allocation_fn_p | |
46ff5047 MM |
2092 | = (type_num_arguments (TREE_TYPE (alloc_fn)) > 1 |
2093 | || varargs_function_p (alloc_fn)); | |
96790071 | 2094 | |
a6111661 JM |
2095 | /* Preevaluate the placement args so that we don't reevaluate them for a |
2096 | placement delete. */ | |
2097 | if (placement_allocation_fn_p) | |
2098 | { | |
2099 | tree inits = NULL_TREE; | |
2100 | t = TREE_CHAIN (TREE_OPERAND (alloc_call, 1)); | |
2101 | for (; t; t = TREE_CHAIN (t)) | |
2102 | if (TREE_SIDE_EFFECTS (TREE_VALUE (t))) | |
2103 | { | |
2104 | tree init; | |
2105 | TREE_VALUE (t) = stabilize_expr (TREE_VALUE (t), &init); | |
2106 | if (inits) | |
2107 | inits = build (COMPOUND_EXPR, void_type_node, inits, init); | |
2108 | else | |
2109 | inits = init; | |
2110 | } | |
2111 | if (inits) | |
2112 | alloc_expr = build (COMPOUND_EXPR, TREE_TYPE (alloc_expr), inits, | |
2113 | alloc_expr); | |
2114 | } | |
2115 | ||
047f64a3 JM |
2116 | /* unless an allocation function is declared with an empty excep- |
2117 | tion-specification (_except.spec_), throw(), it indicates failure to | |
2118 | allocate storage by throwing a bad_alloc exception (clause _except_, | |
2119 | _lib.bad.alloc_); it returns a non-null pointer otherwise If the allo- | |
2120 | cation function is declared with an empty exception-specification, | |
2121 | throw(), it returns null to indicate failure to allocate storage and a | |
2122 | non-null pointer otherwise. | |
2123 | ||
2124 | So check for a null exception spec on the op new we just called. */ | |
2125 | ||
46ff5047 | 2126 | nothrow = TYPE_NOTHROW_P (TREE_TYPE (alloc_fn)); |
743f140d | 2127 | check_new = (flag_check_new || nothrow) && ! use_java_new; |
047f64a3 | 2128 | |
089d6ea7 | 2129 | if (cookie_size) |
8d08fdba | 2130 | { |
96790071 | 2131 | tree cookie; |
f4f4610e MM |
2132 | |
2133 | /* Adjust so we're pointing to the start of the object. */ | |
2134 | data_addr = get_target_expr (build (PLUS_EXPR, full_pointer_type, | |
2135 | alloc_node, cookie_size)); | |
96790071 | 2136 | |
834c6dff | 2137 | /* Store the number of bytes allocated so that we can know how |
3461fba7 NS |
2138 | many elements to destroy later. We use the last sizeof |
2139 | (size_t) bytes to store the number of elements. */ | |
1f84ec23 | 2140 | cookie = build (MINUS_EXPR, build_pointer_type (sizetype), |
f4f4610e | 2141 | data_addr, size_in_bytes (sizetype)); |
3e411c3f | 2142 | cookie = build_indirect_ref (cookie, NULL); |
1f84ec23 | 2143 | |
f4f4610e | 2144 | cookie_expr = build (MODIFY_EXPR, sizetype, cookie, nelts); |
8b5e2ce4 | 2145 | data_addr = TARGET_EXPR_SLOT (data_addr); |
8d08fdba | 2146 | } |
96790071 | 2147 | else |
8b5e2ce4 JM |
2148 | { |
2149 | cookie_expr = NULL_TREE; | |
2150 | data_addr = alloc_node; | |
2151 | } | |
8d08fdba | 2152 | |
96790071 | 2153 | /* Now initialize the allocated object. */ |
f4f4610e | 2154 | if (is_initialized) |
8d08fdba | 2155 | { |
f4f4610e | 2156 | init_expr = build_indirect_ref (data_addr, NULL); |
f30efcb7 JM |
2157 | |
2158 | if (init == void_zero_node) | |
1cb8292f | 2159 | init = build_default_init (full_type, nelts); |
f30efcb7 | 2160 | else if (init && pedantic && has_array) |
33bd39a2 | 2161 | pedwarn ("ISO C++ forbids initialization in array new"); |
f30efcb7 JM |
2162 | |
2163 | if (has_array) | |
a48cccea JM |
2164 | init_expr |
2165 | = build_vec_init (init_expr, | |
2166 | cp_build_binary_op (MINUS_EXPR, outer_nelts, | |
2167 | integer_one_node), | |
2168 | init, /*from_array=*/0); | |
f30efcb7 | 2169 | else if (TYPE_NEEDS_CONSTRUCTING (type)) |
4ba126e4 MM |
2170 | init_expr = build_special_member_call (init_expr, |
2171 | complete_ctor_identifier, | |
2172 | init, TYPE_BINFO (true_type), | |
2173 | LOOKUP_NORMAL); | |
f30efcb7 | 2174 | else |
8d08fdba | 2175 | { |
01240200 MM |
2176 | /* We are processing something like `new int (10)', which |
2177 | means allocate an int, and initialize it with 10. */ | |
f30efcb7 JM |
2178 | |
2179 | if (TREE_CODE (init) == TREE_LIST) | |
c7b62f14 NS |
2180 | init = build_x_compound_expr_from_list (init, "new initializer"); |
2181 | ||
f30efcb7 JM |
2182 | else if (TREE_CODE (init) == CONSTRUCTOR |
2183 | && TREE_TYPE (init) == NULL_TREE) | |
2184 | { | |
2185 | pedwarn ("ISO C++ forbids aggregate initializer to new"); | |
2186 | init = digest_init (type, init, 0); | |
7215f9a0 | 2187 | } |
80170791 | 2188 | |
f30efcb7 | 2189 | init_expr = build_modify_expr (init_expr, INIT_EXPR, init); |
96790071 JM |
2190 | } |
2191 | ||
2192 | if (init_expr == error_mark_node) | |
2193 | return error_mark_node; | |
1f109f0f | 2194 | |
20c39572 JM |
2195 | /* If any part of the object initialization terminates by throwing an |
2196 | exception and a suitable deallocation function can be found, the | |
2197 | deallocation function is called to free the memory in which the | |
2198 | object was being constructed, after which the exception continues | |
2199 | to propagate in the context of the new-expression. If no | |
2200 | unambiguous matching deallocation function can be found, | |
2201 | propagating the exception does not cause the object's memory to be | |
2202 | freed. */ | |
96790071 | 2203 | if (flag_exceptions && ! use_java_new) |
1f109f0f | 2204 | { |
2face519 | 2205 | enum tree_code dcode = has_array ? VEC_DELETE_EXPR : DELETE_EXPR; |
96790071 | 2206 | tree cleanup; |
834c6dff MM |
2207 | int flags = (LOOKUP_NORMAL |
2208 | | (globally_qualified_p * LOOKUP_GLOBAL)); | |
a7d87521 | 2209 | |
5355deec | 2210 | /* The Standard is unclear here, but the right thing to do |
f4f4610e MM |
2211 | is to use the same method for finding deallocation |
2212 | functions that we use for finding allocation functions. */ | |
5355deec AO |
2213 | flags |= LOOKUP_SPECULATIVELY; |
2214 | ||
f4f4610e | 2215 | cleanup = build_op_delete_call (dcode, alloc_node, size, flags, |
3f41ffd8 MM |
2216 | (placement_allocation_fn_p |
2217 | ? alloc_call : NULL_TREE)); | |
2bb14213 | 2218 | |
2face519 JM |
2219 | /* Ack! First we allocate the memory. Then we set our sentry |
2220 | variable to true, and expand a cleanup that deletes the memory | |
96790071 JM |
2221 | if sentry is true. Then we run the constructor, and finally |
2222 | clear the sentry. | |
2223 | ||
2224 | It would be nice to be able to handle this without the sentry | |
2225 | variable, perhaps with a TRY_CATCH_EXPR, but this doesn't | |
2226 | work. We allocate the space first, so if there are any | |
2227 | temporaries with cleanups in the constructor args we need this | |
2228 | EH region to extend until end of full-expression to preserve | |
2229 | nesting. | |
2230 | ||
2231 | If the backend had some mechanism so that we could force the | |
2232 | allocation to be expanded after all the other args to the | |
2233 | constructor, that would fix the nesting problem and we could | |
2234 | do away with this complexity. But that would complicate other | |
2235 | things; in particular, it would make it difficult to bail out | |
8e51619a JM |
2236 | if the allocation function returns null. Er, no, it wouldn't; |
2237 | we just don't run the constructor. The standard says it's | |
4977bab6 ZW |
2238 | unspecified whether or not the args are evaluated. |
2239 | ||
2240 | FIXME FIXME FIXME inline invisible refs as refs. That way we | |
2241 | can preevaluate value parameters. */ | |
2face519 | 2242 | |
da4768fe JM |
2243 | if (cleanup) |
2244 | { | |
96790071 | 2245 | tree end, sentry, begin; |
2face519 JM |
2246 | |
2247 | begin = get_target_expr (boolean_true_node); | |
659e5a7a | 2248 | CLEANUP_EH_ONLY (begin) = 1; |
2face519 | 2249 | |
659e5a7a JM |
2250 | sentry = TARGET_EXPR_SLOT (begin); |
2251 | ||
2252 | TARGET_EXPR_CLEANUP (begin) | |
2face519 JM |
2253 | = build (COND_EXPR, void_type_node, sentry, |
2254 | cleanup, void_zero_node); | |
2face519 | 2255 | |
2face519 JM |
2256 | end = build (MODIFY_EXPR, TREE_TYPE (sentry), |
2257 | sentry, boolean_false_node); | |
2face519 | 2258 | |
96790071 JM |
2259 | init_expr |
2260 | = build (COMPOUND_EXPR, void_type_node, begin, | |
2261 | build (COMPOUND_EXPR, void_type_node, init_expr, | |
2262 | end)); | |
da4768fe | 2263 | } |
1f109f0f | 2264 | } |
f4f4610e | 2265 | } |
8b5e2ce4 JM |
2266 | else |
2267 | init_expr = NULL_TREE; | |
2268 | ||
2269 | /* Now build up the return value in reverse order. */ | |
96790071 | 2270 | |
8b5e2ce4 | 2271 | rval = data_addr; |
2face519 | 2272 | |
8b5e2ce4 JM |
2273 | if (init_expr) |
2274 | rval = build (COMPOUND_EXPR, TREE_TYPE (rval), init_expr, rval); | |
2275 | if (cookie_expr) | |
2276 | rval = build (COMPOUND_EXPR, TREE_TYPE (rval), cookie_expr, rval); | |
2277 | ||
2278 | if (rval == alloc_node) | |
2279 | /* If we don't have an initializer or a cookie, strip the TARGET_EXPR | |
2280 | and return the call (which doesn't need to be adjusted). */ | |
2281 | rval = TARGET_EXPR_INITIAL (alloc_expr); | |
2282 | else | |
d18c083e | 2283 | { |
8b5e2ce4 JM |
2284 | if (check_new) |
2285 | { | |
2286 | tree ifexp = cp_build_binary_op (NE_EXPR, alloc_node, | |
2287 | integer_zero_node); | |
2288 | rval = build_conditional_expr (ifexp, rval, alloc_node); | |
2289 | } | |
d18c083e | 2290 | |
8b5e2ce4 JM |
2291 | /* Perform the allocation before anything else, so that ALLOC_NODE |
2292 | has been initialized before we start using it. */ | |
2293 | rval = build (COMPOUND_EXPR, TREE_TYPE (rval), alloc_expr, rval); | |
2294 | } | |
51c184be | 2295 | |
f4f4610e | 2296 | /* Convert to the final type. */ |
d04a575f MM |
2297 | rval = build_nop (pointer_type, rval); |
2298 | ||
2299 | /* A new-expression is never an lvalue. */ | |
2300 | if (real_lvalue_p (rval)) | |
2301 | rval = build1 (NON_LVALUE_EXPR, TREE_TYPE (rval), rval); | |
2302 | ||
2303 | return rval; | |
8d08fdba MS |
2304 | } |
2305 | \f | |
f30432d7 | 2306 | static tree |
362efdc1 NN |
2307 | build_vec_delete_1 (tree base, tree maxindex, tree type, |
2308 | special_function_kind auto_delete_vec, int use_global_delete) | |
f30432d7 MS |
2309 | { |
2310 | tree virtual_size; | |
e92cc029 | 2311 | tree ptype = build_pointer_type (type = complete_type (type)); |
f30432d7 MS |
2312 | tree size_exp = size_in_bytes (type); |
2313 | ||
2314 | /* Temporary variables used by the loop. */ | |
2315 | tree tbase, tbase_init; | |
2316 | ||
2317 | /* This is the body of the loop that implements the deletion of a | |
2318 | single element, and moves temp variables to next elements. */ | |
2319 | tree body; | |
2320 | ||
2321 | /* This is the LOOP_EXPR that governs the deletion of the elements. */ | |
c7b62f14 | 2322 | tree loop = 0; |
f30432d7 MS |
2323 | |
2324 | /* This is the thing that governs what to do after the loop has run. */ | |
2325 | tree deallocate_expr = 0; | |
2326 | ||
2327 | /* This is the BIND_EXPR which holds the outermost iterator of the | |
2328 | loop. It is convenient to set this variable up and test it before | |
2329 | executing any other code in the loop. | |
2330 | This is also the containing expression returned by this function. */ | |
2331 | tree controller = NULL_TREE; | |
2332 | ||
b2153b98 KL |
2333 | /* We should only have 1-D arrays here. */ |
2334 | if (TREE_CODE (type) == ARRAY_TYPE) | |
2335 | abort (); | |
2336 | ||
834c6dff | 2337 | if (! IS_AGGR_TYPE (type) || TYPE_HAS_TRIVIAL_DESTRUCTOR (type)) |
c7b62f14 | 2338 | goto no_destructor; |
f30432d7 | 2339 | |
708cae97 | 2340 | /* The below is short by the cookie size. */ |
fed3cef0 RK |
2341 | virtual_size = size_binop (MULT_EXPR, size_exp, |
2342 | convert (sizetype, maxindex)); | |
f30432d7 | 2343 | |
46e8c075 | 2344 | tbase = create_temporary_var (ptype); |
f30432d7 MS |
2345 | tbase_init = build_modify_expr (tbase, NOP_EXPR, |
2346 | fold (build (PLUS_EXPR, ptype, | |
2347 | base, | |
2348 | virtual_size))); | |
2349 | DECL_REGISTER (tbase) = 1; | |
4dabb379 | 2350 | controller = build (BIND_EXPR, void_type_node, tbase, NULL_TREE, NULL_TREE); |
f30432d7 | 2351 | TREE_SIDE_EFFECTS (controller) = 1; |
f30432d7 | 2352 | |
c7b62f14 NS |
2353 | body = build (EXIT_EXPR, void_type_node, |
2354 | build (EQ_EXPR, boolean_type_node, base, tbase)); | |
2355 | body = build_compound_expr | |
2356 | (body, build_modify_expr (tbase, NOP_EXPR, | |
2357 | build (MINUS_EXPR, ptype, tbase, size_exp))); | |
2358 | body = build_compound_expr | |
2359 | (body, build_delete (ptype, tbase, sfk_complete_destructor, | |
2360 | LOOKUP_NORMAL|LOOKUP_DESTRUCTOR, 1)); | |
f30432d7 | 2361 | |
c7b62f14 NS |
2362 | loop = build (LOOP_EXPR, void_type_node, body); |
2363 | loop = build_compound_expr (tbase_init, loop); | |
f30432d7 MS |
2364 | |
2365 | no_destructor: | |
2366 | /* If the delete flag is one, or anything else with the low bit set, | |
2367 | delete the storage. */ | |
86f45d2c | 2368 | if (auto_delete_vec != sfk_base_destructor) |
f30432d7 MS |
2369 | { |
2370 | tree base_tbd; | |
2371 | ||
708cae97 | 2372 | /* The below is short by the cookie size. */ |
fed3cef0 RK |
2373 | virtual_size = size_binop (MULT_EXPR, size_exp, |
2374 | convert (sizetype, maxindex)); | |
f30432d7 MS |
2375 | |
2376 | if (! TYPE_VEC_NEW_USES_COOKIE (type)) | |
2377 | /* no header */ | |
2378 | base_tbd = base; | |
2379 | else | |
2380 | { | |
834c6dff MM |
2381 | tree cookie_size; |
2382 | ||
2383 | cookie_size = get_cookie_size (type); | |
2384 | base_tbd | |
2385 | = cp_convert (ptype, | |
ab76ca54 MM |
2386 | cp_build_binary_op (MINUS_EXPR, |
2387 | cp_convert (string_type_node, | |
2388 | base), | |
2389 | cookie_size)); | |
e92cc029 | 2390 | /* True size with header. */ |
834c6dff | 2391 | virtual_size = size_binop (PLUS_EXPR, virtual_size, cookie_size); |
f30432d7 | 2392 | } |
86f45d2c MM |
2393 | |
2394 | if (auto_delete_vec == sfk_deleting_destructor) | |
2395 | deallocate_expr = build_x_delete (base_tbd, | |
2396 | 2 | use_global_delete, | |
2397 | virtual_size); | |
f30432d7 MS |
2398 | } |
2399 | ||
c7b62f14 NS |
2400 | body = loop; |
2401 | if (!deallocate_expr) | |
2402 | ; | |
2403 | else if (!body) | |
2404 | body = deallocate_expr; | |
f30432d7 | 2405 | else |
c7b62f14 NS |
2406 | body = build_compound_expr (body, deallocate_expr); |
2407 | ||
2408 | if (!body) | |
2409 | body = integer_zero_node; | |
2410 | ||
f30432d7 | 2411 | /* Outermost wrapper: If pointer is null, punt. */ |
37f88e3e JM |
2412 | body = fold (build (COND_EXPR, void_type_node, |
2413 | fold (build (NE_EXPR, boolean_type_node, base, | |
2414 | integer_zero_node)), | |
2415 | body, integer_zero_node)); | |
f30432d7 MS |
2416 | body = build1 (NOP_EXPR, void_type_node, body); |
2417 | ||
2418 | if (controller) | |
2419 | { | |
2420 | TREE_OPERAND (controller, 1) = body; | |
4e8dca1c | 2421 | body = controller; |
f30432d7 | 2422 | } |
4e8dca1c JM |
2423 | |
2424 | if (TREE_CODE (base) == SAVE_EXPR) | |
2425 | /* Pre-evaluate the SAVE_EXPR outside of the BIND_EXPR. */ | |
2426 | body = build (COMPOUND_EXPR, void_type_node, base, body); | |
2427 | ||
8d245821 | 2428 | return convert_to_void (body, /*implicit=*/NULL); |
f30432d7 MS |
2429 | } |
2430 | ||
c395453c MM |
2431 | /* Create an unnamed variable of the indicated TYPE. */ |
2432 | ||
f1dedc31 | 2433 | tree |
362efdc1 | 2434 | create_temporary_var (tree type) |
8a72a046 | 2435 | { |
f1dedc31 MM |
2436 | tree decl; |
2437 | ||
2438 | decl = build_decl (VAR_DECL, NULL_TREE, type); | |
2439 | TREE_USED (decl) = 1; | |
2440 | DECL_ARTIFICIAL (decl) = 1; | |
f31686a3 | 2441 | DECL_SOURCE_LOCATION (decl) = input_location; |
f1dedc31 | 2442 | DECL_IGNORED_P (decl) = 1; |
b35d4555 | 2443 | DECL_CONTEXT (decl) = current_function_decl; |
f1dedc31 | 2444 | |
f1dedc31 | 2445 | return decl; |
8a72a046 MM |
2446 | } |
2447 | ||
f1dedc31 MM |
2448 | /* Create a new temporary variable of the indicated TYPE, initialized |
2449 | to INIT. | |
8a72a046 | 2450 | |
f1dedc31 MM |
2451 | It is not entered into current_binding_level, because that breaks |
2452 | things when it comes time to do final cleanups (which take place | |
2453 | "outside" the binding contour of the function). */ | |
2454 | ||
2455 | static tree | |
362efdc1 | 2456 | get_temp_regvar (tree type, tree init) |
f30432d7 | 2457 | { |
f1dedc31 | 2458 | tree decl; |
8a72a046 | 2459 | |
f1dedc31 | 2460 | decl = create_temporary_var (type); |
2a3398e1 NS |
2461 | add_decl_stmt (decl); |
2462 | ||
f1dedc31 | 2463 | finish_expr_stmt (build_modify_expr (decl, INIT_EXPR, init)); |
8a72a046 | 2464 | |
f1dedc31 | 2465 | return decl; |
f30432d7 MS |
2466 | } |
2467 | ||
f1dedc31 MM |
2468 | /* `build_vec_init' returns tree structure that performs |
2469 | initialization of a vector of aggregate types. | |
8d08fdba | 2470 | |
f30efcb7 | 2471 | BASE is a reference to the vector, of ARRAY_TYPE. |
a48cccea JM |
2472 | MAXINDEX is the maximum index of the array (one less than the |
2473 | number of elements). It is only used if | |
2474 | TYPE_DOMAIN (TREE_TYPE (BASE)) == NULL_TREE. | |
8d08fdba MS |
2475 | INIT is the (possibly NULL) initializer. |
2476 | ||
2477 | FROM_ARRAY is 0 if we should init everything with INIT | |
2478 | (i.e., every element initialized from INIT). | |
2479 | FROM_ARRAY is 1 if we should index into INIT in parallel | |
2480 | with initialization of DECL. | |
2481 | FROM_ARRAY is 2 if we should index into INIT in parallel, | |
2482 | but use assignment instead of initialization. */ | |
2483 | ||
2484 | tree | |
362efdc1 | 2485 | build_vec_init (tree base, tree maxindex, tree init, int from_array) |
8d08fdba MS |
2486 | { |
2487 | tree rval; | |
8a72a046 | 2488 | tree base2 = NULL_TREE; |
8d08fdba | 2489 | tree size; |
e833cb11 | 2490 | tree itype = NULL_TREE; |
8a72a046 | 2491 | tree iterator; |
f30efcb7 JM |
2492 | /* The type of the array. */ |
2493 | tree atype = TREE_TYPE (base); | |
f1dedc31 | 2494 | /* The type of an element in the array. */ |
f30efcb7 | 2495 | tree type = TREE_TYPE (atype); |
f1dedc31 MM |
2496 | /* The type of a pointer to an element in the array. */ |
2497 | tree ptype; | |
2498 | tree stmt_expr; | |
2499 | tree compound_stmt; | |
2500 | int destroy_temps; | |
f5984164 | 2501 | tree try_block = NULL_TREE; |
486837a7 | 2502 | tree try_body = NULL_TREE; |
8a72a046 | 2503 | int num_initialized_elts = 0; |
2a3398e1 NS |
2504 | bool is_global; |
2505 | ||
a48cccea JM |
2506 | if (TYPE_DOMAIN (atype)) |
2507 | maxindex = array_type_nelts (atype); | |
2508 | ||
2509 | if (maxindex == NULL_TREE || maxindex == error_mark_node) | |
8d08fdba MS |
2510 | return error_mark_node; |
2511 | ||
c8a3d889 AO |
2512 | if (init |
2513 | && (from_array == 2 | |
2514 | ? (!CLASS_TYPE_P (type) || !TYPE_HAS_COMPLEX_ASSIGN_REF (type)) | |
2515 | : !TYPE_NEEDS_CONSTRUCTING (type)) | |
f30efcb7 JM |
2516 | && ((TREE_CODE (init) == CONSTRUCTOR |
2517 | /* Don't do this if the CONSTRUCTOR might contain something | |
2518 | that might throw and require us to clean up. */ | |
2519 | && (CONSTRUCTOR_ELTS (init) == NULL_TREE | |
2520 | || ! TYPE_HAS_NONTRIVIAL_DESTRUCTOR (target_type (type)))) | |
2521 | || from_array)) | |
2522 | { | |
2523 | /* Do non-default initialization of POD arrays resulting from | |
2524 | brace-enclosed initializers. In this case, digest_init and | |
2525 | store_constructor will handle the semantics for us. */ | |
2526 | ||
2527 | stmt_expr = build (INIT_EXPR, atype, base, init); | |
f30efcb7 JM |
2528 | return stmt_expr; |
2529 | } | |
2530 | ||
2531 | maxindex = cp_convert (ptrdiff_type_node, maxindex); | |
f1dedc31 | 2532 | ptype = build_pointer_type (type); |
8d08fdba | 2533 | size = size_in_bytes (type); |
f30efcb7 | 2534 | if (TREE_CODE (TREE_TYPE (base)) == ARRAY_TYPE) |
0a72704b | 2535 | base = cp_convert (ptype, decay_conversion (base)); |
8d08fdba | 2536 | |
f1dedc31 | 2537 | /* The code we are generating looks like: |
303b7406 | 2538 | ({ |
f1dedc31 | 2539 | T* t1 = (T*) base; |
f30efcb7 | 2540 | T* rval = t1; |
f1dedc31 MM |
2541 | ptrdiff_t iterator = maxindex; |
2542 | try { | |
4977bab6 | 2543 | for (; iterator != -1; --iterator) { |
f30efcb7 JM |
2544 | ... initialize *t1 ... |
2545 | ++t1; | |
4977bab6 | 2546 | } |
f1dedc31 MM |
2547 | } catch (...) { |
2548 | ... destroy elements that were constructed ... | |
2549 | } | |
303b7406 NS |
2550 | rval; |
2551 | }) | |
f1dedc31 MM |
2552 | |
2553 | We can omit the try and catch blocks if we know that the | |
2554 | initialization will never throw an exception, or if the array | |
f30efcb7 | 2555 | elements do not have destructors. We can omit the loop completely if |
f1dedc31 MM |
2556 | the elements of the array do not have constructors. |
2557 | ||
2558 | We actually wrap the entire body of the above in a STMT_EXPR, for | |
2559 | tidiness. | |
2560 | ||
2561 | When copying from array to another, when the array elements have | |
2562 | only trivial copy constructors, we should use __builtin_memcpy | |
2563 | rather than generating a loop. That way, we could take advantage | |
2564 | of whatever cleverness the back-end has for dealing with copies | |
2565 | of blocks of memory. */ | |
2566 | ||
2a3398e1 | 2567 | is_global = begin_init_stmts (&stmt_expr, &compound_stmt); |
f2c5f623 | 2568 | destroy_temps = stmts_are_full_exprs_p (); |
ae499cce | 2569 | current_stmt_tree ()->stmts_are_full_exprs_p = 0; |
f30efcb7 | 2570 | rval = get_temp_regvar (ptype, base); |
f1dedc31 | 2571 | base = get_temp_regvar (ptype, rval); |
8a72a046 | 2572 | iterator = get_temp_regvar (ptrdiff_type_node, maxindex); |
8d08fdba | 2573 | |
8a72a046 | 2574 | /* Protect the entire array initialization so that we can destroy |
f30efcb7 JM |
2575 | the partially constructed array if an exception is thrown. |
2576 | But don't do this if we're assigning. */ | |
2577 | if (flag_exceptions && TYPE_HAS_NONTRIVIAL_DESTRUCTOR (type) | |
2578 | && from_array != 2) | |
ed5511d9 MM |
2579 | { |
2580 | try_block = begin_try_block (); | |
7a3397c7 | 2581 | try_body = begin_compound_stmt (/*has_no_scope=*/true); |
ed5511d9 | 2582 | } |
8a72a046 | 2583 | |
f30efcb7 | 2584 | if (init != NULL_TREE && TREE_CODE (init) == CONSTRUCTOR) |
8d08fdba | 2585 | { |
f30efcb7 JM |
2586 | /* Do non-default initialization of non-POD arrays resulting from |
2587 | brace-enclosed initializers. */ | |
8a72a046 MM |
2588 | |
2589 | tree elts; | |
094fe153 JM |
2590 | from_array = 0; |
2591 | ||
8a72a046 | 2592 | for (elts = CONSTRUCTOR_ELTS (init); elts; elts = TREE_CHAIN (elts)) |
8d08fdba | 2593 | { |
8a72a046 | 2594 | tree elt = TREE_VALUE (elts); |
f1dedc31 | 2595 | tree baseref = build1 (INDIRECT_REF, type, base); |
8d08fdba | 2596 | |
8a72a046 | 2597 | num_initialized_elts++; |
8d08fdba | 2598 | |
8a72a046 | 2599 | if (IS_AGGR_TYPE (type) || TREE_CODE (type) == ARRAY_TYPE) |
f1dedc31 | 2600 | finish_expr_stmt (build_aggr_init (baseref, elt, 0)); |
8a72a046 | 2601 | else |
f1dedc31 MM |
2602 | finish_expr_stmt (build_modify_expr (baseref, NOP_EXPR, |
2603 | elt)); | |
8a72a046 | 2604 | |
f30efcb7 JM |
2605 | finish_expr_stmt (build_unary_op (PREINCREMENT_EXPR, base, 0)); |
2606 | finish_expr_stmt (build_unary_op (PREDECREMENT_EXPR, iterator, 0)); | |
8d08fdba | 2607 | } |
8d08fdba | 2608 | |
8a72a046 MM |
2609 | /* Clear out INIT so that we don't get confused below. */ |
2610 | init = NULL_TREE; | |
8d08fdba | 2611 | } |
8a72a046 | 2612 | else if (from_array) |
8d08fdba | 2613 | { |
8a72a046 MM |
2614 | /* If initializing one array from another, initialize element by |
2615 | element. We rely upon the below calls the do argument | |
2616 | checking. */ | |
8a72a046 MM |
2617 | if (init) |
2618 | { | |
0a72704b | 2619 | base2 = decay_conversion (init); |
8a72a046 MM |
2620 | itype = TREE_TYPE (base2); |
2621 | base2 = get_temp_regvar (itype, base2); | |
2622 | itype = TREE_TYPE (itype); | |
2623 | } | |
2624 | else if (TYPE_LANG_SPECIFIC (type) | |
2625 | && TYPE_NEEDS_CONSTRUCTING (type) | |
2626 | && ! TYPE_HAS_DEFAULT_CONSTRUCTOR (type)) | |
2627 | { | |
2628 | error ("initializer ends prematurely"); | |
2629 | return error_mark_node; | |
2630 | } | |
2631 | } | |
8d08fdba | 2632 | |
8a72a046 MM |
2633 | /* Now, default-initialize any remaining elements. We don't need to |
2634 | do that if a) the type does not need constructing, or b) we've | |
094fe153 JM |
2635 | already initialized all the elements. |
2636 | ||
2637 | We do need to keep going if we're copying an array. */ | |
2638 | ||
2639 | if (from_array | |
2640 | || (TYPE_NEEDS_CONSTRUCTING (type) | |
665f2503 | 2641 | && ! (host_integerp (maxindex, 0) |
05bccae2 | 2642 | && (num_initialized_elts |
665f2503 | 2643 | == tree_low_cst (maxindex, 0) + 1)))) |
8a72a046 | 2644 | { |
37e05cd5 | 2645 | /* If the ITERATOR is equal to -1, then we don't have to loop; |
8a72a046 | 2646 | we've already initialized all the elements. */ |
4977bab6 ZW |
2647 | tree for_stmt; |
2648 | tree for_body; | |
f1dedc31 MM |
2649 | tree elt_init; |
2650 | ||
4977bab6 ZW |
2651 | for_stmt = begin_for_stmt (); |
2652 | finish_for_init_stmt (for_stmt); | |
2653 | finish_for_cond (build (NE_EXPR, boolean_type_node, | |
2654 | iterator, integer_minus_one_node), | |
2655 | for_stmt); | |
2656 | finish_for_expr (build_unary_op (PREDECREMENT_EXPR, iterator, 0), | |
2657 | for_stmt); | |
8d08fdba | 2658 | |
8a72a046 | 2659 | /* Otherwise, loop through the elements. */ |
7a3397c7 | 2660 | for_body = begin_compound_stmt (/*has_no_scope=*/true); |
f1dedc31 | 2661 | |
8d08fdba MS |
2662 | if (from_array) |
2663 | { | |
2664 | tree to = build1 (INDIRECT_REF, type, base); | |
2665 | tree from; | |
2666 | ||
2667 | if (base2) | |
2668 | from = build1 (INDIRECT_REF, itype, base2); | |
2669 | else | |
2670 | from = NULL_TREE; | |
2671 | ||
2672 | if (from_array == 2) | |
f1dedc31 | 2673 | elt_init = build_modify_expr (to, NOP_EXPR, from); |
8d08fdba | 2674 | else if (TYPE_NEEDS_CONSTRUCTING (type)) |
f1dedc31 | 2675 | elt_init = build_aggr_init (to, from, 0); |
8d08fdba | 2676 | else if (from) |
f1dedc31 | 2677 | elt_init = build_modify_expr (to, NOP_EXPR, from); |
8d08fdba | 2678 | else |
a98facb0 | 2679 | abort (); |
8d08fdba MS |
2680 | } |
2681 | else if (TREE_CODE (type) == ARRAY_TYPE) | |
2682 | { | |
2683 | if (init != 0) | |
f30efcb7 JM |
2684 | sorry |
2685 | ("cannot initialize multi-dimensional array with initializer"); | |
2686 | elt_init = build_vec_init (build1 (INDIRECT_REF, type, base), | |
a48cccea | 2687 | 0, 0, 0); |
f1dedc31 MM |
2688 | } |
2689 | else | |
2690 | elt_init = build_aggr_init (build1 (INDIRECT_REF, type, base), | |
2691 | init, 0); | |
2692 | ||
2a3398e1 NS |
2693 | current_stmt_tree ()->stmts_are_full_exprs_p = 1; |
2694 | finish_expr_stmt (elt_init); | |
2695 | current_stmt_tree ()->stmts_are_full_exprs_p = 0; | |
8d08fdba | 2696 | |
f30efcb7 | 2697 | finish_expr_stmt (build_unary_op (PREINCREMENT_EXPR, base, 0)); |
8d08fdba | 2698 | if (base2) |
f30efcb7 | 2699 | finish_expr_stmt (build_unary_op (PREINCREMENT_EXPR, base2, 0)); |
0fac6b0b | 2700 | |
7a3397c7 | 2701 | finish_compound_stmt (for_body); |
4977bab6 | 2702 | finish_for_stmt (for_stmt); |
8d08fdba | 2703 | } |
8a72a046 MM |
2704 | |
2705 | /* Make sure to cleanup any partially constructed elements. */ | |
f30efcb7 JM |
2706 | if (flag_exceptions && TYPE_HAS_NONTRIVIAL_DESTRUCTOR (type) |
2707 | && from_array != 2) | |
f1dedc31 MM |
2708 | { |
2709 | tree e; | |
b2153b98 KL |
2710 | tree m = cp_build_binary_op (MINUS_EXPR, maxindex, iterator); |
2711 | ||
2712 | /* Flatten multi-dimensional array since build_vec_delete only | |
2713 | expects one-dimensional array. */ | |
2714 | if (TREE_CODE (type) == ARRAY_TYPE) | |
2715 | { | |
2716 | m = cp_build_binary_op (MULT_EXPR, m, | |
2717 | array_type_nelts_total (type)); | |
2718 | type = strip_array_types (type); | |
2719 | } | |
8d08fdba | 2720 | |
7a3397c7 | 2721 | finish_compound_stmt (try_body); |
ed5511d9 | 2722 | finish_cleanup_try_block (try_block); |
303b7406 | 2723 | e = build_vec_delete_1 (rval, m, type, sfk_base_destructor, |
f1dedc31 | 2724 | /*use_global_delete=*/0); |
f1dedc31 MM |
2725 | finish_cleanup (e, try_block); |
2726 | } | |
2727 | ||
303b7406 NS |
2728 | /* The value of the array initialization is the array itself, RVAL |
2729 | is a pointer to the first element. */ | |
2730 | finish_stmt_expr_expr (rval); | |
f1dedc31 | 2731 | |
2a3398e1 | 2732 | stmt_expr = finish_init_stmts (is_global, stmt_expr, compound_stmt); |
303b7406 | 2733 | |
04c06002 | 2734 | /* Now convert make the result have the correct type. */ |
303b7406 NS |
2735 | atype = build_pointer_type (atype); |
2736 | stmt_expr = build1 (NOP_EXPR, atype, stmt_expr); | |
2737 | stmt_expr = build_indirect_ref (stmt_expr, NULL); | |
2738 | ||
ae499cce | 2739 | current_stmt_tree ()->stmts_are_full_exprs_p = destroy_temps; |
f1dedc31 | 2740 | return stmt_expr; |
8d08fdba MS |
2741 | } |
2742 | ||
2743 | /* Free up storage of type TYPE, at address ADDR. | |
2744 | ||
2745 | TYPE is a POINTER_TYPE and can be ptr_type_node for no special type | |
2746 | of pointer. | |
2747 | ||
2748 | VIRTUAL_SIZE is the amount of storage that was allocated, and is | |
2749 | used as the second argument to operator delete. It can include | |
2750 | things like padding and magic size cookies. It has virtual in it, | |
2751 | because if you have a base pointer and you delete through a virtual | |
2752 | destructor, it should be the size of the dynamic object, not the | |
cab1f180 | 2753 | static object, see Free Store 12.5 ISO C++. |
8d08fdba MS |
2754 | |
2755 | This does not call any destructors. */ | |
e92cc029 | 2756 | |
8d08fdba | 2757 | tree |
362efdc1 | 2758 | build_x_delete (tree addr, int which_delete, tree virtual_size) |
8d08fdba | 2759 | { |
a28e3c7f MS |
2760 | int use_global_delete = which_delete & 1; |
2761 | int use_vec_delete = !!(which_delete & 2); | |
a28e3c7f | 2762 | enum tree_code code = use_vec_delete ? VEC_DELETE_EXPR : DELETE_EXPR; |
da4768fe | 2763 | int flags = LOOKUP_NORMAL | (use_global_delete * LOOKUP_GLOBAL); |
8d08fdba | 2764 | |
519ebd1e | 2765 | return build_op_delete_call (code, addr, virtual_size, flags, NULL_TREE); |
8d08fdba MS |
2766 | } |
2767 | ||
86f45d2c MM |
2768 | /* Call the DTOR_KIND destructor for EXP. FLAGS are as for |
2769 | build_delete. */ | |
298d6f60 MM |
2770 | |
2771 | static tree | |
362efdc1 | 2772 | build_dtor_call (tree exp, special_function_kind dtor_kind, int flags) |
298d6f60 | 2773 | { |
86f45d2c | 2774 | tree name; |
ee76b931 | 2775 | tree fn; |
86f45d2c MM |
2776 | switch (dtor_kind) |
2777 | { | |
2778 | case sfk_complete_destructor: | |
2779 | name = complete_dtor_identifier; | |
2780 | break; | |
2781 | ||
2782 | case sfk_base_destructor: | |
2783 | name = base_dtor_identifier; | |
2784 | break; | |
2785 | ||
2786 | case sfk_deleting_destructor: | |
2787 | name = deleting_dtor_identifier; | |
2788 | break; | |
2789 | ||
2790 | default: | |
a98facb0 | 2791 | abort (); |
86f45d2c | 2792 | } |
ee76b931 MM |
2793 | |
2794 | exp = convert_from_reference (exp); | |
2795 | fn = lookup_fnfields (TREE_TYPE (exp), name, /*protect=*/2); | |
2796 | return build_new_method_call (exp, fn, | |
2797 | /*args=*/NULL_TREE, | |
2798 | /*conversion_path=*/NULL_TREE, | |
2799 | flags); | |
298d6f60 MM |
2800 | } |
2801 | ||
8d08fdba MS |
2802 | /* Generate a call to a destructor. TYPE is the type to cast ADDR to. |
2803 | ADDR is an expression which yields the store to be destroyed. | |
86f45d2c MM |
2804 | AUTO_DELETE is the name of the destructor to call, i.e., either |
2805 | sfk_complete_destructor, sfk_base_destructor, or | |
2806 | sfk_deleting_destructor. | |
8d08fdba MS |
2807 | |
2808 | FLAGS is the logical disjunction of zero or more LOOKUP_ | |
ade3dc07 | 2809 | flags. See cp-tree.h for more info. */ |
e92cc029 | 2810 | |
8d08fdba | 2811 | tree |
362efdc1 NN |
2812 | build_delete (tree type, tree addr, special_function_kind auto_delete, |
2813 | int flags, int use_global_delete) | |
8d08fdba | 2814 | { |
8d08fdba | 2815 | tree expr; |
8d08fdba MS |
2816 | |
2817 | if (addr == error_mark_node) | |
2818 | return error_mark_node; | |
2819 | ||
2820 | /* Can happen when CURRENT_EXCEPTION_OBJECT gets its type | |
2821 | set to `error_mark_node' before it gets properly cleaned up. */ | |
2822 | if (type == error_mark_node) | |
2823 | return error_mark_node; | |
2824 | ||
2825 | type = TYPE_MAIN_VARIANT (type); | |
2826 | ||
2827 | if (TREE_CODE (type) == POINTER_TYPE) | |
2828 | { | |
2986ae00 | 2829 | type = TYPE_MAIN_VARIANT (TREE_TYPE (type)); |
8d08fdba MS |
2830 | if (TREE_CODE (type) == ARRAY_TYPE) |
2831 | goto handle_array; | |
23b4deba AO |
2832 | |
2833 | if (VOID_TYPE_P (type) | |
2834 | /* We don't want to warn about delete of void*, only other | |
2835 | incomplete types. Deleting other incomplete types | |
2836 | invokes undefined behavior, but it is not ill-formed, so | |
2837 | compile to something that would even do The Right Thing | |
2838 | (TM) should the type have a trivial dtor and no delete | |
2839 | operator. */ | |
2840 | || !complete_type_or_diagnostic (type, addr, 1) | |
2841 | || !IS_AGGR_TYPE (type)) | |
8d08fdba MS |
2842 | { |
2843 | /* Call the builtin operator delete. */ | |
c787dd82 | 2844 | return build_builtin_delete_call (addr); |
8d08fdba MS |
2845 | } |
2846 | if (TREE_SIDE_EFFECTS (addr)) | |
2847 | addr = save_expr (addr); | |
2986ae00 MS |
2848 | |
2849 | /* throw away const and volatile on target type of addr */ | |
6060a796 | 2850 | addr = convert_force (build_pointer_type (type), addr, 0); |
8d08fdba MS |
2851 | } |
2852 | else if (TREE_CODE (type) == ARRAY_TYPE) | |
2853 | { | |
2854 | handle_array: | |
6742d92b | 2855 | |
c407792d RK |
2856 | if (TYPE_DOMAIN (type) == NULL_TREE) |
2857 | { | |
8251199e | 2858 | error ("unknown array size in delete"); |
c407792d RK |
2859 | return error_mark_node; |
2860 | } | |
8d08fdba | 2861 | return build_vec_delete (addr, array_type_nelts (type), |
c7edeea3 | 2862 | auto_delete, use_global_delete); |
8d08fdba MS |
2863 | } |
2864 | else | |
2865 | { | |
2866 | /* Don't check PROTECT here; leave that decision to the | |
2867 | destructor. If the destructor is accessible, call it, | |
2868 | else report error. */ | |
2869 | addr = build_unary_op (ADDR_EXPR, addr, 0); | |
2870 | if (TREE_SIDE_EFFECTS (addr)) | |
2871 | addr = save_expr (addr); | |
2872 | ||
60696c53 | 2873 | addr = convert_force (build_pointer_type (type), addr, 0); |
8d08fdba MS |
2874 | } |
2875 | ||
2876 | my_friendly_assert (IS_AGGR_TYPE (type), 220); | |
2877 | ||
834c6dff | 2878 | if (TYPE_HAS_TRIVIAL_DESTRUCTOR (type)) |
8d08fdba | 2879 | { |
60696c53 | 2880 | if (auto_delete != sfk_deleting_destructor) |
8d08fdba MS |
2881 | return void_zero_node; |
2882 | ||
da4768fe | 2883 | return build_op_delete_call |
ea793912 | 2884 | (DELETE_EXPR, addr, cxx_sizeof_nowarn (type), |
519ebd1e JM |
2885 | LOOKUP_NORMAL | (use_global_delete * LOOKUP_GLOBAL), |
2886 | NULL_TREE); | |
8d08fdba | 2887 | } |
ade3dc07 | 2888 | else |
8d08fdba | 2889 | { |
700f8a87 | 2890 | tree do_delete = NULL_TREE; |
bd6dd845 | 2891 | tree ifexp; |
700f8a87 | 2892 | |
ade3dc07 JM |
2893 | my_friendly_assert (TYPE_HAS_DESTRUCTOR (type), 20011213); |
2894 | ||
52682a1b MM |
2895 | /* For `::delete x', we must not use the deleting destructor |
2896 | since then we would not be sure to get the global `operator | |
2897 | delete'. */ | |
86f45d2c | 2898 | if (use_global_delete && auto_delete == sfk_deleting_destructor) |
700f8a87 | 2899 | { |
1b4a93f7 MM |
2900 | /* We will use ADDR multiple times so we must save it. */ |
2901 | addr = save_expr (addr); | |
c6002625 | 2902 | /* Delete the object. */ |
86f45d2c MM |
2903 | do_delete = build_builtin_delete_call (addr); |
2904 | /* Otherwise, treat this like a complete object destructor | |
2905 | call. */ | |
2906 | auto_delete = sfk_complete_destructor; | |
700f8a87 | 2907 | } |
52682a1b MM |
2908 | /* If the destructor is non-virtual, there is no deleting |
2909 | variant. Instead, we must explicitly call the appropriate | |
2910 | `operator delete' here. */ | |
2911 | else if (!DECL_VIRTUAL_P (CLASSTYPE_DESTRUCTORS (type)) | |
2912 | && auto_delete == sfk_deleting_destructor) | |
2913 | { | |
1b4a93f7 MM |
2914 | /* We will use ADDR multiple times so we must save it. */ |
2915 | addr = save_expr (addr); | |
2916 | /* Build the call. */ | |
52682a1b MM |
2917 | do_delete = build_op_delete_call (DELETE_EXPR, |
2918 | addr, | |
ea793912 | 2919 | cxx_sizeof_nowarn (type), |
52682a1b MM |
2920 | LOOKUP_NORMAL, |
2921 | NULL_TREE); | |
2922 | /* Call the complete object destructor. */ | |
2923 | auto_delete = sfk_complete_destructor; | |
2924 | } | |
e3fe84e5 JM |
2925 | else if (auto_delete == sfk_deleting_destructor |
2926 | && TYPE_GETS_REG_DELETE (type)) | |
2927 | { | |
2928 | /* Make sure we have access to the member op delete, even though | |
2929 | we'll actually be calling it from the destructor. */ | |
ea793912 | 2930 | build_op_delete_call (DELETE_EXPR, addr, cxx_sizeof_nowarn (type), |
e3fe84e5 JM |
2931 | LOOKUP_NORMAL, NULL_TREE); |
2932 | } | |
8d08fdba | 2933 | |
3e411c3f | 2934 | expr = build_dtor_call (build_indirect_ref (addr, NULL), |
1b4a93f7 | 2935 | auto_delete, flags); |
bd6dd845 MS |
2936 | if (do_delete) |
2937 | expr = build (COMPOUND_EXPR, void_type_node, expr, do_delete); | |
9e9ff709 | 2938 | |
bd6dd845 MS |
2939 | if (flags & LOOKUP_DESTRUCTOR) |
2940 | /* Explicit destructor call; don't check for null pointer. */ | |
2941 | ifexp = integer_one_node; | |
8d08fdba | 2942 | else |
bd6dd845 | 2943 | /* Handle deleting a null pointer. */ |
ab76ca54 | 2944 | ifexp = fold (cp_build_binary_op (NE_EXPR, addr, integer_zero_node)); |
8d08fdba | 2945 | |
bd6dd845 MS |
2946 | if (ifexp != integer_one_node) |
2947 | expr = build (COND_EXPR, void_type_node, | |
2948 | ifexp, expr, void_zero_node); | |
8d08fdba | 2949 | |
8d08fdba MS |
2950 | return expr; |
2951 | } | |
ade3dc07 | 2952 | } |
8d08fdba | 2953 | |
ade3dc07 JM |
2954 | /* At the beginning of a destructor, push cleanups that will call the |
2955 | destructors for our base classes and members. | |
2a2480e1 | 2956 | |
a29e1034 | 2957 | Called from begin_destructor_body. */ |
8d08fdba | 2958 | |
ade3dc07 | 2959 | void |
edaf3e03 | 2960 | push_base_cleanups (void) |
ade3dc07 JM |
2961 | { |
2962 | tree binfos; | |
2963 | int i, n_baseclasses; | |
2964 | tree member; | |
2965 | tree expr; | |
8d08fdba | 2966 | |
ade3dc07 JM |
2967 | /* Run destructors for all virtual baseclasses. */ |
2968 | if (TYPE_USES_VIRTUAL_BASECLASSES (current_class_type)) | |
2969 | { | |
2970 | tree vbases; | |
2971 | tree cond = (condition_conversion | |
2972 | (build (BIT_AND_EXPR, integer_type_node, | |
2973 | current_in_charge_parm, | |
2974 | integer_two_node))); | |
8d08fdba | 2975 | |
ade3dc07 JM |
2976 | vbases = CLASSTYPE_VBASECLASSES (current_class_type); |
2977 | /* The CLASSTYPE_VBASECLASSES list is in initialization | |
2978 | order, which is also the right order for pushing cleanups. */ | |
2979 | for (; vbases; | |
2980 | vbases = TREE_CHAIN (vbases)) | |
8d08fdba | 2981 | { |
ade3dc07 JM |
2982 | tree vbase = TREE_VALUE (vbases); |
2983 | tree base_type = BINFO_TYPE (vbase); | |
2984 | ||
2985 | if (TYPE_HAS_NONTRIVIAL_DESTRUCTOR (base_type)) | |
8d08fdba | 2986 | { |
4ba126e4 MM |
2987 | expr = build_special_member_call (current_class_ref, |
2988 | base_dtor_identifier, | |
2989 | NULL_TREE, | |
2990 | vbase, | |
2991 | (LOOKUP_NORMAL | |
2992 | | LOOKUP_NONVIRTUAL)); | |
ade3dc07 JM |
2993 | expr = build (COND_EXPR, void_type_node, cond, |
2994 | expr, void_zero_node); | |
2995 | finish_decl_cleanup (NULL_TREE, expr); | |
8d08fdba MS |
2996 | } |
2997 | } | |
ade3dc07 JM |
2998 | } |
2999 | ||
3000 | binfos = BINFO_BASETYPES (TYPE_BINFO (current_class_type)); | |
3001 | n_baseclasses = CLASSTYPE_N_BASECLASSES (current_class_type); | |
8d08fdba | 3002 | |
ade3dc07 JM |
3003 | /* Take care of the remaining baseclasses. */ |
3004 | for (i = 0; i < n_baseclasses; i++) | |
3005 | { | |
3006 | tree base_binfo = TREE_VEC_ELT (binfos, i); | |
3007 | if (TYPE_HAS_TRIVIAL_DESTRUCTOR (BINFO_TYPE (base_binfo)) | |
3008 | || TREE_VIA_VIRTUAL (base_binfo)) | |
3009 | continue; | |
3010 | ||
4ba126e4 MM |
3011 | expr = build_special_member_call (current_class_ref, |
3012 | base_dtor_identifier, | |
3013 | NULL_TREE, base_binfo, | |
3014 | LOOKUP_NORMAL | LOOKUP_NONVIRTUAL); | |
ade3dc07 JM |
3015 | finish_decl_cleanup (NULL_TREE, expr); |
3016 | } | |
3017 | ||
3018 | for (member = TYPE_FIELDS (current_class_type); member; | |
3019 | member = TREE_CHAIN (member)) | |
3020 | { | |
17bbb839 | 3021 | if (TREE_CODE (member) != FIELD_DECL || DECL_ARTIFICIAL (member)) |
ade3dc07 JM |
3022 | continue; |
3023 | if (TYPE_HAS_NONTRIVIAL_DESTRUCTOR (TREE_TYPE (member))) | |
3024 | { | |
50ad9642 MM |
3025 | tree this_member = (build_class_member_access_expr |
3026 | (current_class_ref, member, | |
3027 | /*access_path=*/NULL_TREE, | |
3028 | /*preserve_reference=*/false)); | |
ade3dc07 JM |
3029 | tree this_type = TREE_TYPE (member); |
3030 | expr = build_delete (this_type, this_member, | |
3031 | sfk_complete_destructor, | |
3032 | LOOKUP_NONVIRTUAL|LOOKUP_DESTRUCTOR|LOOKUP_NORMAL, | |
3033 | 0); | |
3034 | finish_decl_cleanup (NULL_TREE, expr); | |
3035 | } | |
8d08fdba MS |
3036 | } |
3037 | } | |
3038 | ||
3039 | /* For type TYPE, delete the virtual baseclass objects of DECL. */ | |
3040 | ||
3041 | tree | |
362efdc1 | 3042 | build_vbase_delete (tree type, tree decl) |
8d08fdba MS |
3043 | { |
3044 | tree vbases = CLASSTYPE_VBASECLASSES (type); | |
c7b62f14 | 3045 | tree result; |
8d08fdba MS |
3046 | tree addr = build_unary_op (ADDR_EXPR, decl, 0); |
3047 | ||
3048 | my_friendly_assert (addr != error_mark_node, 222); | |
3049 | ||
c7b62f14 NS |
3050 | for (result = convert_to_void (integer_zero_node, NULL); |
3051 | vbases; vbases = TREE_CHAIN (vbases)) | |
8d08fdba | 3052 | { |
c7b62f14 NS |
3053 | tree base_addr = convert_force |
3054 | (build_pointer_type (BINFO_TYPE (TREE_VALUE (vbases))), addr, 0); | |
3055 | tree base_delete = build_delete | |
3056 | (TREE_TYPE (base_addr), base_addr, sfk_base_destructor, | |
3057 | LOOKUP_NORMAL|LOOKUP_DESTRUCTOR, 0); | |
3058 | ||
3059 | result = build_compound_expr (result, base_delete); | |
8d08fdba | 3060 | } |
c7b62f14 | 3061 | return result; |
8d08fdba MS |
3062 | } |
3063 | ||
3064 | /* Build a C++ vector delete expression. | |
3065 | MAXINDEX is the number of elements to be deleted. | |
3066 | ELT_SIZE is the nominal size of each element in the vector. | |
3067 | BASE is the expression that should yield the store to be deleted. | |
8d08fdba MS |
3068 | This function expands (or synthesizes) these calls itself. |
3069 | AUTO_DELETE_VEC says whether the container (vector) should be deallocated. | |
8d08fdba MS |
3070 | |
3071 | This also calls delete for virtual baseclasses of elements of the vector. | |
3072 | ||
3073 | Update: MAXINDEX is no longer needed. The size can be extracted from the | |
3074 | start of the vector for pointers, and from the type for arrays. We still | |
3075 | use MAXINDEX for arrays because it happens to already have one of the | |
3076 | values we'd have to extract. (We could use MAXINDEX with pointers to | |
3077 | confirm the size, and trap if the numbers differ; not clear that it'd | |
3078 | be worth bothering.) */ | |
e92cc029 | 3079 | |
8d08fdba | 3080 | tree |
362efdc1 NN |
3081 | build_vec_delete (tree base, tree maxindex, |
3082 | special_function_kind auto_delete_vec, int use_global_delete) | |
8d08fdba | 3083 | { |
f30432d7 | 3084 | tree type; |
49b7aacb JM |
3085 | tree rval; |
3086 | tree base_init = NULL_TREE; | |
8d08fdba | 3087 | |
f30432d7 | 3088 | type = TREE_TYPE (base); |
c407792d | 3089 | |
f30432d7 | 3090 | if (TREE_CODE (type) == POINTER_TYPE) |
8d08fdba MS |
3091 | { |
3092 | /* Step back one from start of vector, and read dimension. */ | |
834c6dff MM |
3093 | tree cookie_addr; |
3094 | ||
6742d92b | 3095 | if (TREE_SIDE_EFFECTS (base)) |
49b7aacb JM |
3096 | { |
3097 | base_init = get_target_expr (base); | |
3098 | base = TARGET_EXPR_SLOT (base_init); | |
3099 | } | |
708cae97 | 3100 | type = strip_array_types (TREE_TYPE (type)); |
1f84ec23 MM |
3101 | cookie_addr = build (MINUS_EXPR, |
3102 | build_pointer_type (sizetype), | |
3103 | base, | |
3104 | TYPE_SIZE_UNIT (sizetype)); | |
3e411c3f | 3105 | maxindex = build_indirect_ref (cookie_addr, NULL); |
8d08fdba | 3106 | } |
f30432d7 | 3107 | else if (TREE_CODE (type) == ARRAY_TYPE) |
8d08fdba MS |
3108 | { |
3109 | /* get the total number of things in the array, maxindex is a bad name */ | |
f30432d7 | 3110 | maxindex = array_type_nelts_total (type); |
834c6dff | 3111 | type = strip_array_types (type); |
8d08fdba | 3112 | base = build_unary_op (ADDR_EXPR, base, 1); |
6742d92b | 3113 | if (TREE_SIDE_EFFECTS (base)) |
49b7aacb JM |
3114 | { |
3115 | base_init = get_target_expr (base); | |
3116 | base = TARGET_EXPR_SLOT (base_init); | |
3117 | } | |
8d08fdba MS |
3118 | } |
3119 | else | |
3120 | { | |
9e9ff709 | 3121 | if (base != error_mark_node) |
8251199e | 3122 | error ("type to vector delete is neither pointer or array type"); |
8d08fdba MS |
3123 | return error_mark_node; |
3124 | } | |
8d08fdba | 3125 | |
49b7aacb | 3126 | rval = build_vec_delete_1 (base, maxindex, type, auto_delete_vec, |
f30432d7 | 3127 | use_global_delete); |
49b7aacb JM |
3128 | if (base_init) |
3129 | rval = build (COMPOUND_EXPR, TREE_TYPE (rval), base_init, rval); | |
3130 | ||
3131 | return rval; | |
8d08fdba | 3132 | } |