Hi,

On 10/02/2014 05:22 AM, Jason Merrill wrote:
On 10/01/2014 12:31 PM, Paolo Carlini wrote:
in this issue Daniel argued that the value of a noexcept expression
should not depend on constructor elision.

I'm open to that, but I don't think it's at all clear in the standard.
Ok. Personally, I find the analysis in the audit trail rather convincing. In practice, clang++ definitely agrees, likewise SolarisStudio. Current EDG seems inconsistent, the templated and non-templated cases are handled differently.

Then, in the audit trail Marc
tentatively suggested something like the parser.c hunk below, which just
disables our -felide-constructors optimization when parsing the noexcept
expression. Over the last couple of days, I had a look, noticed that in
any case we still have to handle templates, thus the pt.c hunk, and also
that maybe we can avoid completely disabling -felide-constructors in
noexcept expressions when we know for sure that the constructor at issue
doen't throw: for that in call.s I'm further abusing the
flag_elide_constructors global, in terms of using a special value of 2
when flag_elide_constructor is found == 1 when handling the expression.
The below passes testing, anyway.

Why do we want to avoid completely disabling -felide-constructors, since it's an unevaluated context anyway?
Agreed.
If you're going to mess with this flag you need to save/restore it in push/pop_to_top_level as well.
I see. But then if we have to do take care of that I find much more clean to just add a global?!? In any case, if I understand correctly the logic at the end of push_to_top_level, it would be tricky to reset the flag to a sensible value (by default would be 1, but the user may have passed -fno-elide-constructors on the command line).

The below passes testing.

Thanks!
Paolo.

////////////////////////
Index: cp/call.c
===================================================================
--- cp/call.c   (revision 215797)
+++ cp/call.c   (working copy)
@@ -7251,7 +7251,11 @@ build_over_call (struct z_candidate *cand, int fla
     /* Do things the hard way.  */;
   else if (cand->num_convs == 1 
            && (DECL_COPY_CONSTRUCTOR_P (fn) 
-               || DECL_MOVE_CONSTRUCTOR_P (fn)))
+               || DECL_MOVE_CONSTRUCTOR_P (fn))
+          /* It's unsafe to elide the constructor when handling
+             a noexcept-expression, it may evaluate to the wrong
+             value (c++/53025).  */
+          && cp_noexcept_operand == 0)
     {
       tree targ;
       tree arg = argarray[num_artificial_parms_for (fn)];
Index: cp/cp-tree.h
===================================================================
--- cp/cp-tree.h        (revision 215797)
+++ cp/cp-tree.h        (working copy)
@@ -1058,6 +1058,7 @@ struct GTY(()) saved_scope {
 
   int unevaluated_operand;
   int inhibit_evaluation_warnings;
+  int noexcept_operand;
   /* If non-zero, implicit "omp declare target" attribute is added into the
      attribute lists.  */
   int omp_declare_target_attribute;
@@ -4399,6 +4400,10 @@ extern int comparing_specializations;
 
 extern int cp_unevaluated_operand;
 
+/* Nonzero if we are parsing the operand of a noexcept operator.  */
+
+extern int cp_noexcept_operand;
+
 /* in pt.c  */
 
 /* These values are used for the `STRICT' parameter to type_unification and
Index: cp/name-lookup.c
===================================================================
--- cp/name-lookup.c    (revision 215797)
+++ cp/name-lookup.c    (working copy)
@@ -6139,6 +6139,7 @@ push_to_top_level (void)
   s->function_decl = current_function_decl;
   s->unevaluated_operand = cp_unevaluated_operand;
   s->inhibit_evaluation_warnings = c_inhibit_evaluation_warnings;
+  s->noexcept_operand = cp_noexcept_operand;
   s->x_stmt_tree.stmts_are_full_exprs_p = true;
 
   scope_chain = s;
@@ -6149,6 +6150,7 @@ push_to_top_level (void)
   push_class_stack ();
   cp_unevaluated_operand = 0;
   c_inhibit_evaluation_warnings = 0;
+  cp_noexcept_operand = 0;
   timevar_cond_stop (TV_NAME_LOOKUP, subtime);
 }
 
@@ -6182,6 +6184,7 @@ pop_from_top_level_1 (void)
   current_function_decl = s->function_decl;
   cp_unevaluated_operand = s->unevaluated_operand;
   c_inhibit_evaluation_warnings = s->inhibit_evaluation_warnings;
+  cp_noexcept_operand = s->noexcept_operand;
 }
 
 /* Wrapper for pop_from_top_level_1.  */
Index: cp/parser.c
===================================================================
--- cp/parser.c (revision 215797)
+++ cp/parser.c (working copy)
@@ -259,6 +259,9 @@ static FILE *cp_lexer_debug_stream;
    sizeof, typeof, or alignof.  */
 int cp_unevaluated_operand;
 
+/* Nonzero if we are parsing the operand of a noexcept operator.  */
+int cp_noexcept_operand;
+
 /* Dump up to NUM tokens in BUFFER to FILE starting with token
    START_TOKEN.  If START_TOKEN is NULL, the dump starts with the
    first token in BUFFER.  If NUM is 0, dump all the tokens.  If
@@ -7156,7 +7159,9 @@ cp_parser_unary_expression (cp_parser *parser, boo
 
            ++cp_unevaluated_operand;
            ++c_inhibit_evaluation_warnings;
+           ++cp_noexcept_operand;
            expr = cp_parser_expression (parser);
+           --cp_noexcept_operand;
            --c_inhibit_evaluation_warnings;
            --cp_unevaluated_operand;
 
Index: cp/pt.c
===================================================================
--- cp/pt.c     (revision 215797)
+++ cp/pt.c     (working copy)
@@ -14769,11 +14769,13 @@ tsubst_copy_and_build (tree t,
       op1 = TREE_OPERAND (t, 0);
       ++cp_unevaluated_operand;
       ++c_inhibit_evaluation_warnings;
+      ++cp_noexcept_operand;
       op1 = tsubst_copy_and_build (op1, args, complain, in_decl,
                                   /*function_p=*/false,
                                   /*integral_constant_expression_p=*/false);
       --cp_unevaluated_operand;
       --c_inhibit_evaluation_warnings;
+      --cp_noexcept_operand;
       RETURN (finish_noexcept_expr (op1, complain));
 
     case MODOP_EXPR:
Index: testsuite/g++.dg/cpp0x/noexcept23.C
===================================================================
--- testsuite/g++.dg/cpp0x/noexcept23.C (revision 0)
+++ testsuite/g++.dg/cpp0x/noexcept23.C (working copy)
@@ -0,0 +1,14 @@
+// PR c++/53025
+// { dg-do compile { target c++11 } }
+
+struct A {
+  A() noexcept {}
+  A(const A&) noexcept(false) {}
+};
+
+void a(A) noexcept {}
+
+void f()
+{
+  static_assert(!noexcept(a(A{})), "");
+}
Index: testsuite/g++.dg/cpp0x/noexcept24.C
===================================================================
--- testsuite/g++.dg/cpp0x/noexcept24.C (revision 0)
+++ testsuite/g++.dg/cpp0x/noexcept24.C (working copy)
@@ -0,0 +1,22 @@
+// PR c++/53025
+// { dg-do compile { target c++11 } }
+
+template<typename T>
+struct A {
+  A() noexcept {}
+  A(const A&) noexcept(false) {}
+};
+
+template<typename T>
+void a(A<T>) noexcept {}
+
+template<typename T>
+void f()
+{
+  static_assert(!noexcept(a(A<T>{})), "");
+}
+
+void g()
+{
+  f<int>();
+}

Reply via email to