On 10/2/16, Jason Merrill <ja...@redhat.com> wrote:
> OK, thanks.
>
> On Sat, Oct 1, 2016 at 10:16 AM, Marek Polacek <pola...@redhat.com> wrote:
>> On Fri, Sep 30, 2016 at 05:48:03PM -0400, Jason Merrill wrote:
>>> On Fri, Sep 30, 2016 at 12:43 PM, Marek Polacek <pola...@redhat.com>
>>> wrote:
>>> > On Fri, Sep 23, 2016 at 10:31:33AM -0400, Jason Merrill wrote:
>>> >> On Fri, Sep 23, 2016 at 9:15 AM, Marek Polacek <pola...@redhat.com>
>>> >> wrote:
>>> >> > On Wed, Sep 21, 2016 at 03:52:09PM -0400, Jason Merrill wrote:
>>> >> >> On Mon, Sep 19, 2016 at 2:49 PM, Jason Merrill <ja...@redhat.com>
>>> >> >> wrote:
>>> >> >> > I suppose that an INTEGER_CST of character type is necessarily a
>>> >> >> > character constant, so adding a check for !char_type_p ought to
>>> >> >> > do the
>>> >> >> > trick.
>>> >> >>
>>> >> >> Indeed it does.  I'm checking this in:
>>> >> >
>>> >> > Nice, thanks.  What about the original patch?  We still need to
>>> >> > warn
>>> >> > (or error for C++11) for pointer comparisons.
>>> >>
>>> >> If we still accept pointer comparisons in C++, that's another bug
>>> >> with
>>> >> treating \0 as a null pointer constant.  This seems to be because
>>> >> ocp_convert of \0 to int produces an INTEGER_CST indistinguishable
>>> >> from literal 0.
>>> >
>>> > I was trying to fix this in ocp_convert, by using NOP_EXPRs, but that
>>> > wasn't
>>> > successful.  But since we're interested in ==/!=, I think this can be
>>> > fixed
>>> > easily in cp_build_binary_op.  Actually, all that seems to be needed is
>>> > using
>>> > orig_op as the argument to null_ptr_cst_p, but that wouldn't give the
>>> > correct
>>> > diagnostics, so I did this.  By checking orig_op we can see if the
>>> > operands are
>>> > character literals or not, because orig_op is an operand before the
>>> > default
>>> > conversions.
>>>
>>> What is wrong about the diagnostic from just using orig_op?  "ISO C++
>>> forbids comparison between pointer and integer" seems fine to me, and
>>> will help the user to realize that they need to index off the pointer.
>>>
>>> I see that some of the calls to null_ptr_cst_p in cp_build_binary_op
>>> have already been changed to check orig_op*, but not all.  Let's
>>> update the remaining calls, that should do the trick without adding a
>>> new error.
>>
>> Here you go:
>>
>> Bootstrapped/regtested on x86_64-linux and ppc64-linux, ok for trunk?
>>
>> 2016-10-01  Marek Polacek  <pola...@redhat.com>
>>
>>         Core 903
>>         * typeck.c (cp_build_binary_op): Pass original operands to
>>         null_ptr_cst_p, not those after the default conversions.
>>
>>         * g++.dg/cpp0x/nullptr37.C: New test.
>>
>> diff --git gcc/cp/typeck.c gcc/cp/typeck.c
>> index 617ca55..8b780be 100644
>> --- gcc/cp/typeck.c
>> +++ gcc/cp/typeck.c
>> @@ -4573,7 +4573,7 @@ cp_build_binary_op (location_t location,
>>               || code1 == COMPLEX_TYPE || code1 == ENUMERAL_TYPE))
>>         short_compare = 1;
>>        else if (((code0 == POINTER_TYPE || TYPE_PTRDATAMEM_P (type0))
>> -               && null_ptr_cst_p (op1))
>> +               && null_ptr_cst_p (orig_op1))
>>                /* Handle, eg, (void*)0 (c++/43906), and more.  */
>>                || (code0 == POINTER_TYPE
>>                    && TYPE_PTR_P (type1) && integer_zerop (op1)))
>> @@ -4587,7 +4587,7 @@ cp_build_binary_op (location_t location,
>>           warn_for_null_address (location, op0, complain);
>>         }
>>        else if (((code1 == POINTER_TYPE || TYPE_PTRDATAMEM_P (type1))
>> -               && null_ptr_cst_p (op0))
>> +               && null_ptr_cst_p (orig_op0))
>>                /* Handle, eg, (void*)0 (c++/43906), and more.  */
>>                || (code1 == POINTER_TYPE
>>                    && TYPE_PTR_P (type0) && integer_zerop (op0)))
>> @@ -4604,7 +4604,7 @@ cp_build_binary_op (location_t location,
>>                || (TYPE_PTRDATAMEM_P (type0) && TYPE_PTRDATAMEM_P
>> (type1)))
>>         result_type = composite_pointer_type (type0, type1, op0, op1,
>>                                               CPO_COMPARISON, complain);
>> -      else if (null_ptr_cst_p (op0) && null_ptr_cst_p (op1))
>> +      else if (null_ptr_cst_p (orig_op0) && null_ptr_cst_p (orig_op1))
>>         /* One of the operands must be of nullptr_t type.  */
>>          result_type = TREE_TYPE (nullptr_node);
>>        else if (code0 == POINTER_TYPE && code1 == INTEGER_TYPE)
>> @@ -4623,7 +4623,7 @@ cp_build_binary_op (location_t location,
>>            else
>>              return error_mark_node;
>>         }
>> -      else if (TYPE_PTRMEMFUNC_P (type0) && null_ptr_cst_p (op1))
>> +      else if (TYPE_PTRMEMFUNC_P (type0) && null_ptr_cst_p (orig_op1))
>>         {
>>           if (TARGET_PTRMEMFUNC_VBIT_LOCATION
>>               == ptrmemfunc_vbit_in_delta)
>> @@ -4664,7 +4664,7 @@ cp_build_binary_op (location_t location,
>>             }
>>           result_type = TREE_TYPE (op0);
>>         }
>> -      else if (TYPE_PTRMEMFUNC_P (type1) && null_ptr_cst_p (op0))
>> +      else if (TYPE_PTRMEMFUNC_P (type1) && null_ptr_cst_p (orig_op0))
>>         return cp_build_binary_op (location, code, op1, op0, complain);
>>        else if (TYPE_PTRMEMFUNC_P (type0) && TYPE_PTRMEMFUNC_P (type1))
>>         {
>> @@ -4877,21 +4877,21 @@ cp_build_binary_op (location_t location,
>>        else if (code0 == POINTER_TYPE && code1 == POINTER_TYPE)
>>         result_type = composite_pointer_type (type0, type1, op0, op1,
>>                                               CPO_COMPARISON, complain);
>> -      else if (code0 == POINTER_TYPE && null_ptr_cst_p (op1))
>> +      else if (code0 == POINTER_TYPE && null_ptr_cst_p (orig_op1))
>>         {
>>           result_type = type0;
>>           if (extra_warnings && (complain & tf_warning))
>>             warning (OPT_Wextra,
>>                      "ordered comparison of pointer with integer zero");
>>         }
>> -      else if (code1 == POINTER_TYPE && null_ptr_cst_p (op0))
>> +      else if (code1 == POINTER_TYPE && null_ptr_cst_p (orig_op0))
>>         {
>>           result_type = type1;
>>           if (extra_warnings && (complain & tf_warning))
>>             warning (OPT_Wextra,
>>                      "ordered comparison of pointer with integer zero");
>>         }
>> -      else if (null_ptr_cst_p (op0) && null_ptr_cst_p (op1))
>> +      else if (null_ptr_cst_p (orig_op0) && null_ptr_cst_p (orig_op1))
>>         /* One of the operands must be of nullptr_t type.  */
>>          result_type = TREE_TYPE (nullptr_node);
>>        else if (code0 == POINTER_TYPE && code1 == INTEGER_TYPE)
>> diff --git gcc/testsuite/g++.dg/cpp0x/nullptr37.C
>> gcc/testsuite/g++.dg/cpp0x/nullptr37.C
>> index e69de29..e746a28 100644
>> --- gcc/testsuite/g++.dg/cpp0x/nullptr37.C
>> +++ gcc/testsuite/g++.dg/cpp0x/nullptr37.C
>> @@ -0,0 +1,78 @@
>> +/* PR c++/64767 */
>> +// { dg-do compile { target c++11 } }
>> +
>> +int
>> +f1 (int *p, int **q)
>> +{
>> +  int r = 0;
>> +
>> +  r += p == '\0'; // { dg-error "ISO C\\+\\+ forbids comparison between
>> pointer and integer" }
>> +  r += p == L'\0'; // { dg-error "ISO C\\+\\+ forbids comparison between
>> pointer and integer" }
>> +  r += p == u'\0'; // { dg-error "ISO C\\+\\+ forbids comparison between
>> pointer and integer" }
>> +  r += p == U'\0'; // { dg-error "ISO C\\+\\+ forbids comparison between
>> pointer and integer" }
>> +  r += p != '\0'; // { dg-error "ISO C\\+\\+ forbids comparison between
>> pointer and integer" }
>> +  r += p != L'\0'; // { dg-error "ISO C\\+\\+ forbids comparison between
>> pointer and integer" }
>> +  r += p != u'\0'; // { dg-error "ISO C\\+\\+ forbids comparison between
>> pointer and integer" }
>> +  r += p != U'\0'; // { dg-error "ISO C\\+\\+ forbids comparison between
>> pointer and integer" }
>> +
>> +  r += '\0' == p; // { dg-error "ISO C\\+\\+ forbids comparison between
>> pointer and integer" }
>> +  r += L'\0' == p; // { dg-error "ISO C\\+\\+ forbids comparison between
>> pointer and integer" }
>> +  r += u'\0' == p; // { dg-error "ISO C\\+\\+ forbids comparison between
>> pointer and integer" }
>> +  r += U'\0' == p; // { dg-error "ISO C\\+\\+ forbids comparison between
>> pointer and integer" }
>> +  r += '\0' != p; // { dg-error "ISO C\\+\\+ forbids comparison between
>> pointer and integer" }
>> +  r += L'\0' != p; // { dg-error "ISO C\\+\\+ forbids comparison between
>> pointer and integer" }
>> +  r += u'\0' != p; // { dg-error "ISO C\\+\\+ forbids comparison between
>> pointer and integer" }
>> +  r += U'\0' != p; // { dg-error "ISO C\\+\\+ forbids comparison between
>> pointer and integer" }
>> +
>> +  r += q == '\0'; // { dg-error "ISO C\\+\\+ forbids comparison between
>> pointer and integer" }
>> +  r += q == L'\0'; // { dg-error "ISO C\\+\\+ forbids comparison between
>> pointer and integer" }
>> +  r += q == u'\0'; // { dg-error "ISO C\\+\\+ forbids comparison between
>> pointer and integer" }
>> +  r += q == U'\0'; // { dg-error "ISO C\\+\\+ forbids comparison between
>> pointer and integer" }
>> +  r += q != '\0'; // { dg-error "ISO C\\+\\+ forbids comparison between
>> pointer and integer" }
>> +  r += q != L'\0'; // { dg-error "ISO C\\+\\+ forbids comparison between
>> pointer and integer" }
>> +  r += q != u'\0'; // { dg-error "ISO C\\+\\+ forbids comparison between
>> pointer and integer" }
>> +  r += q != U'\0'; // { dg-error "ISO C\\+\\+ forbids comparison between
>> pointer and integer" }
>> +
>> +  r += '\0' == q; // { dg-error "ISO C\\+\\+ forbids comparison between
>> pointer and integer" }
>> +  r += L'\0' == q; // { dg-error "ISO C\\+\\+ forbids comparison between
>> pointer and integer" }
>> +  r += u'\0' == q; // { dg-error "ISO C\\+\\+ forbids comparison between
>> pointer and integer" }
>> +  r += U'\0' == q; // { dg-error "ISO C\\+\\+ forbids comparison between
>> pointer and integer" }
>> +  r += '\0' != q; // { dg-error "ISO C\\+\\+ forbids comparison between
>> pointer and integer" }
>> +  r += L'\0' != q; // { dg-error "ISO C\\+\\+ forbids comparison between
>> pointer and integer" }
>> +  r += u'\0' != q; // { dg-error "ISO C\\+\\+ forbids comparison between
>> pointer and integer" }
>> +  r += U'\0' != q; // { dg-error "ISO C\\+\\+ forbids comparison between
>> pointer and integer" }
>> +
>> +  return r;
>> +}
>> +
>> +int
>> +f2 (int *p)
>> +{
>> +  int r = 0;
>> +
>> +  r += p == (void *) 0;
>> +  r += p != (void *) 0;
>> +  r += (void *) 0 == p;
>> +  r += (void *) 0 != p;
>> +
>> +  r += p == 0;
>> +  r += p != 0;
>> +  r += 0 == p;
>> +  r += 0 != p;
>> +
>> +  return r;
>> +}
>> +
>> +int
>> +f3 (int *p)
>> +{
>> +  int r = 0;
>> +
>> +  r += p == (char) 0; // { dg-error "ISO C\\+\\+ forbids comparison
>> between pointer and integer" }
>> +  r += p != (char) 0; // { dg-error "ISO C\\+\\+ forbids comparison
>> between pointer and integer" }
>> +
>> +  r += (char) 0 == p; // { dg-error "ISO C\\+\\+ forbids comparison
>> between pointer and integer" }
>> +  r += (char) 0 != p; // { dg-error "ISO C\\+\\+ forbids comparison
>> between pointer and integer" }
>> +
>> +  return r;
>> +}
>>
>>         Marek
>

So I'm still kind of unclear as to what got committed as a result of
this thread. It seems like there's a new diagnostic for C++11, but
what about other language standards? Is there still going to be a
separate -Wpointer-compare flag usable in plain C? When I tried with
trunk from yesterday, it still didn't work:

$ /usr/local/bin/gcc -Wpointer-compare -c unexmacosx.c
gcc: error: unrecognized command line option ‘-Wpointer-compare’; did
you mean ‘-Wnonnull-compare’?
$

I hope a separate -Wpointer-compare flag can make it in in time for GCC 7.

Thanks,
Eric

Reply via email to