]> git.ipfire.org Git - thirdparty/gcc.git/blame - gcc/cp/class.c
tree-dfa.c (get_ref_base_and_extent): When computing maxsize deal with structures...
[thirdparty/gcc.git] / gcc / cp / class.c
CommitLineData
8d08fdba 1/* Functions related to building classes and their related objects.
06ceef4e 2 Copyright (C) 1987, 1992, 1993, 1994, 1995, 1996, 1997, 1998,
0a57b6af 3 1999, 2000, 2001, 2002, 2003, 2004, 2005 Free Software Foundation, Inc.
8d08fdba
MS
4 Contributed by Michael Tiemann (tiemann@cygnus.com)
5
f5adbb8d 6This file is part of GCC.
8d08fdba 7
f5adbb8d 8GCC is free software; you can redistribute it and/or modify
8d08fdba
MS
9it under the terms of the GNU General Public License as published by
10the Free Software Foundation; either version 2, or (at your option)
11any later version.
12
f5adbb8d 13GCC is distributed in the hope that it will be useful,
8d08fdba
MS
14but WITHOUT ANY WARRANTY; without even the implied warranty of
15MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16GNU General Public License for more details.
17
18You should have received a copy of the GNU General Public License
f5adbb8d 19along with GCC; see the file COPYING. If not, write to
1788952f
KC
20the Free Software Foundation, 51 Franklin Street, Fifth Floor,
21Boston, MA 02110-1301, USA. */
8d08fdba
MS
22
23
e92cc029 24/* High-level class interface. */
8d08fdba
MS
25
26#include "config.h"
8d052bc7 27#include "system.h"
4977bab6
ZW
28#include "coretypes.h"
29#include "tm.h"
e7a587ef 30#include "tree.h"
8d08fdba
MS
31#include "cp-tree.h"
32#include "flags.h"
28cbf42c 33#include "rtl.h"
e8abc66f 34#include "output.h"
54f92bfb 35#include "toplev.h"
1af6141b 36#include "target.h"
7b6d72fc 37#include "convert.h"
8634c649 38#include "cgraph.h"
ef330312 39#include "tree-dump.h"
8d08fdba 40
61a127b3
MM
41/* The number of nested classes being processed. If we are not in the
42 scope of any class, this is zero. */
43
8d08fdba
MS
44int current_class_depth;
45
61a127b3
MM
46/* In order to deal with nested classes, we keep a stack of classes.
47 The topmost entry is the innermost class, and is the entry at index
48 CURRENT_CLASS_DEPTH */
49
50typedef struct class_stack_node {
51 /* The name of the class. */
52 tree name;
53
54 /* The _TYPE node for the class. */
55 tree type;
56
57 /* The access specifier pending for new declarations in the scope of
58 this class. */
59 tree access;
8f032717
MM
60
61 /* If were defining TYPE, the names used in this class. */
62 splay_tree names_used;
c888c93b
MM
63
64 /* Nonzero if this class is no longer open, because of a call to
65 push_to_top_level. */
66 size_t hidden;
61a127b3
MM
67}* class_stack_node_t;
68
911a71a7 69typedef struct vtbl_init_data_s
c35cce41 70{
911a71a7
MM
71 /* The base for which we're building initializers. */
72 tree binfo;
73ea87d7 73 /* The type of the most-derived type. */
c35cce41 74 tree derived;
73ea87d7
NS
75 /* The binfo for the dynamic type. This will be TYPE_BINFO (derived),
76 unless ctor_vtbl_p is true. */
77 tree rtti_binfo;
9bab6c90
MM
78 /* The negative-index vtable initializers built up so far. These
79 are in order from least negative index to most negative index. */
80 tree inits;
d0cd8b44 81 /* The last (i.e., most negative) entry in INITS. */
9bab6c90 82 tree* last_init;
c35cce41 83 /* The binfo for the virtual base for which we're building
911a71a7 84 vcall offset initializers. */
c35cce41 85 tree vbase;
9bab6c90
MM
86 /* The functions in vbase for which we have already provided vcall
87 offsets. */
1e625046 88 VEC(tree,gc) *fns;
c35cce41
MM
89 /* The vtable index of the next vcall or vbase offset. */
90 tree index;
91 /* Nonzero if we are building the initializer for the primary
92 vtable. */
911a71a7
MM
93 int primary_vtbl_p;
94 /* Nonzero if we are building the initializer for a construction
95 vtable. */
96 int ctor_vtbl_p;
548502d3
MM
97 /* True when adding vcall offset entries to the vtable. False when
98 merely computing the indices. */
99 bool generate_vcall_entries;
911a71a7 100} vtbl_init_data;
c35cce41 101
c20118a8 102/* The type of a function passed to walk_subobject_offsets. */
94edc4ab 103typedef int (*subobject_offset_fn) (tree, tree, splay_tree);
c20118a8 104
4639c5c6 105/* The stack itself. This is a dynamically resized array. The
61a127b3
MM
106 number of elements allocated is CURRENT_CLASS_STACK_SIZE. */
107static int current_class_stack_size;
108static class_stack_node_t current_class_stack;
109
c5a35c3c
MM
110/* The size of the largest empty class seen in this translation unit. */
111static GTY (()) tree sizeof_biggest_empty_class;
112
1f6e1acc
AS
113/* An array of all local classes present in this translation unit, in
114 declaration order. */
806aa901 115VEC(tree,gc) *local_classes;
1f6e1acc 116
94edc4ab
NN
117static tree get_vfield_name (tree);
118static void finish_struct_anon (tree);
119static tree get_vtable_name (tree);
120static tree get_basefndecls (tree, tree);
121static int build_primary_vtable (tree, tree);
dbbf88d1 122static int build_secondary_vtable (tree);
94edc4ab
NN
123static void finish_vtbls (tree);
124static void modify_vtable_entry (tree, tree, tree, tree, tree *);
94edc4ab
NN
125static void finish_struct_bits (tree);
126static int alter_access (tree, tree, tree);
127static void handle_using_decl (tree, tree);
94edc4ab
NN
128static tree dfs_modify_vtables (tree, void *);
129static tree modify_all_vtables (tree, tree);
fc6633e0 130static void determine_primary_bases (tree);
94edc4ab
NN
131static void finish_struct_methods (tree);
132static void maybe_warn_about_overly_private_class (tree);
94edc4ab
NN
133static int method_name_cmp (const void *, const void *);
134static int resort_method_name_cmp (const void *, const void *);
e5e459bf 135static void add_implicitly_declared_members (tree, int, int);
94edc4ab 136static tree fixed_type_or_null (tree, int *, int *);
92af500d
NS
137static tree resolve_address_of_overloaded_function (tree, tree, tsubst_flags_t,
138 bool, tree);
00bfffa4 139static tree build_simple_base_path (tree expr, tree binfo);
94edc4ab
NN
140static tree build_vtbl_ref_1 (tree, tree);
141static tree build_vtbl_initializer (tree, tree, tree, tree, int *);
142static int count_fields (tree);
d07605f5 143static int add_fields_to_record_type (tree, struct sorted_fields_type*, int);
94edc4ab 144static void check_bitfield_decl (tree);
e5e459bf
AO
145static void check_field_decl (tree, tree, int *, int *, int *);
146static void check_field_decls (tree, tree *, int *, int *);
58731fd1
MM
147static tree *build_base_field (record_layout_info, tree, splay_tree, tree *);
148static void build_base_fields (record_layout_info, splay_tree, tree *);
94edc4ab
NN
149static void check_methods (tree);
150static void remove_zero_width_bit_fields (tree);
e5e459bf 151static void check_bases (tree, int *, int *);
58731fd1
MM
152static void check_bases_and_members (tree);
153static tree create_vtable_ptr (tree, tree *);
17bbb839 154static void include_empty_classes (record_layout_info);
e93ee644 155static void layout_class_type (tree, tree *);
94edc4ab
NN
156static void fixup_pending_inline (tree);
157static void fixup_inline_methods (tree);
dbbf88d1 158static void propagate_binfo_offsets (tree, tree);
17bbb839 159static void layout_virtual_bases (record_layout_info, splay_tree);
94edc4ab
NN
160static void build_vbase_offset_vtbl_entries (tree, vtbl_init_data *);
161static void add_vcall_offset_vtbl_entries_r (tree, vtbl_init_data *);
162static void add_vcall_offset_vtbl_entries_1 (tree, vtbl_init_data *);
163static void build_vcall_offset_vtbl_entries (tree, vtbl_init_data *);
e6a66567 164static void add_vcall_offset (tree, tree, vtbl_init_data *);
94edc4ab 165static void layout_vtable_decl (tree, int);
5d5a519f 166static tree dfs_find_final_overrider_pre (tree, void *);
dbbf88d1 167static tree dfs_find_final_overrider_post (tree, void *);
94edc4ab
NN
168static tree find_final_overrider (tree, tree, tree);
169static int make_new_vtable (tree, tree);
b5791fdc 170static tree get_primary_binfo (tree);
94edc4ab 171static int maybe_indent_hierarchy (FILE *, int, int);
dbbf88d1 172static tree dump_class_hierarchy_r (FILE *, int, tree, tree, int);
94edc4ab 173static void dump_class_hierarchy (tree);
bb885938 174static void dump_class_hierarchy_1 (FILE *, int, tree);
94edc4ab
NN
175static void dump_array (FILE *, tree);
176static void dump_vtable (tree, tree, tree);
177static void dump_vtt (tree, tree);
bb885938 178static void dump_thunk (FILE *, int, tree);
94edc4ab
NN
179static tree build_vtable (tree, tree, tree);
180static void initialize_vtable (tree, tree);
94edc4ab 181static void layout_nonempty_base_or_field (record_layout_info,
5d5a519f 182 tree, tree, splay_tree);
94edc4ab 183static tree end_of_class (tree, int);
dbbf88d1 184static bool layout_empty_base (tree, tree, splay_tree);
94edc4ab
NN
185static void accumulate_vtbl_inits (tree, tree, tree, tree, tree);
186static tree dfs_accumulate_vtbl_inits (tree, tree, tree, tree,
187 tree);
188static void build_rtti_vtbl_entries (tree, vtbl_init_data *);
5d5a519f 189static void build_vcall_and_vbase_vtbl_entries (tree, vtbl_init_data *);
94edc4ab
NN
190static void clone_constructors_and_destructors (tree);
191static tree build_clone (tree, tree);
a2ddc397 192static void update_vtable_entry_for_fn (tree, tree, tree, tree *, unsigned);
94edc4ab
NN
193static void build_ctor_vtbl_group (tree, tree);
194static void build_vtt (tree);
195static tree binfo_ctor_vtable (tree);
196static tree *build_vtt_inits (tree, tree, tree *, tree *);
197static tree dfs_build_secondary_vptr_vtt_inits (tree, void *);
94edc4ab 198static tree dfs_fixup_binfo_vtbls (tree, void *);
94edc4ab
NN
199static int record_subobject_offset (tree, tree, splay_tree);
200static int check_subobject_offset (tree, tree, splay_tree);
201static int walk_subobject_offsets (tree, subobject_offset_fn,
5d5a519f 202 tree, splay_tree, tree, int);
c5a35c3c 203static void record_subobject_offsets (tree, tree, splay_tree, bool);
94edc4ab
NN
204static int layout_conflict_p (tree, tree, splay_tree, int);
205static int splay_tree_compare_integer_csts (splay_tree_key k1,
5d5a519f 206 splay_tree_key k2);
94edc4ab
NN
207static void warn_about_ambiguous_bases (tree);
208static bool type_requires_array_cookie (tree);
956d9305 209static bool contains_empty_class_p (tree);
9368208b 210static bool base_derived_from (tree, tree);
7ba539c6 211static int empty_base_at_nonzero_offset_p (tree, tree, splay_tree);
ba9a991f 212static tree end_of_base (tree);
548502d3 213static tree get_vcall_index (tree, tree);
9965d119 214
51c184be 215/* Variables shared between class.c and call.c. */
8d08fdba 216
5566b478 217#ifdef GATHER_STATISTICS
8d08fdba
MS
218int n_vtables = 0;
219int n_vtable_entries = 0;
220int n_vtable_searches = 0;
221int n_vtable_elems = 0;
222int n_convert_harshness = 0;
223int n_compute_conversion_costs = 0;
8d08fdba 224int n_inner_fields_searched = 0;
5566b478 225#endif
8d08fdba 226
338d90b8
NS
227/* Convert to or from a base subobject. EXPR is an expression of type
228 `A' or `A*', an expression of type `B' or `B*' is returned. To
229 convert A to a base B, CODE is PLUS_EXPR and BINFO is the binfo for
230 the B base instance within A. To convert base A to derived B, CODE
231 is MINUS_EXPR and BINFO is the binfo for the A instance within B.
232 In this latter case, A must not be a morally virtual base of B.
233 NONNULL is true if EXPR is known to be non-NULL (this is only
234 needed when EXPR is of pointer type). CV qualifiers are preserved
235 from EXPR. */
ca36f057
MM
236
237tree
94edc4ab 238build_base_path (enum tree_code code,
0cbd7506
MS
239 tree expr,
240 tree binfo,
241 int nonnull)
1a588ad7 242{
338d90b8 243 tree v_binfo = NULL_TREE;
6bc34b14 244 tree d_binfo = NULL_TREE;
338d90b8
NS
245 tree probe;
246 tree offset;
247 tree target_type;
248 tree null_test = NULL;
249 tree ptr_target_type;
ca36f057 250 int fixed_type_p;
338d90b8 251 int want_pointer = TREE_CODE (TREE_TYPE (expr)) == POINTER_TYPE;
00bfffa4 252 bool has_empty = false;
d7981fd9 253 bool virtual_access;
1a588ad7 254
338d90b8
NS
255 if (expr == error_mark_node || binfo == error_mark_node || !binfo)
256 return error_mark_node;
6bc34b14
JM
257
258 for (probe = binfo; probe; probe = BINFO_INHERITANCE_CHAIN (probe))
259 {
260 d_binfo = probe;
00bfffa4
JM
261 if (is_empty_class (BINFO_TYPE (probe)))
262 has_empty = true;
809e3e7f 263 if (!v_binfo && BINFO_VIRTUAL_P (probe))
6bc34b14
JM
264 v_binfo = probe;
265 }
338d90b8
NS
266
267 probe = TYPE_MAIN_VARIANT (TREE_TYPE (expr));
268 if (want_pointer)
269 probe = TYPE_MAIN_VARIANT (TREE_TYPE (probe));
00bfffa4 270
539ed333
NS
271 gcc_assert ((code == MINUS_EXPR
272 && SAME_BINFO_TYPE_P (BINFO_TYPE (binfo), probe))
273 || (code == PLUS_EXPR
274 && SAME_BINFO_TYPE_P (BINFO_TYPE (d_binfo), probe)));
c8094d83 275
00bfffa4
JM
276 if (binfo == d_binfo)
277 /* Nothing to do. */
278 return expr;
279
338d90b8
NS
280 if (code == MINUS_EXPR && v_binfo)
281 {
1f070f2b 282 error ("cannot convert from base %qT to derived type %qT via virtual base %qT",
6bc34b14 283 BINFO_TYPE (binfo), BINFO_TYPE (d_binfo), BINFO_TYPE (v_binfo));
338d90b8
NS
284 return error_mark_node;
285 }
1a588ad7 286
f576dfc4
JM
287 if (!want_pointer)
288 /* This must happen before the call to save_expr. */
289 expr = build_unary_op (ADDR_EXPR, expr, 0);
290
00bfffa4 291 offset = BINFO_OFFSET (binfo);
ca36f057 292 fixed_type_p = resolves_to_fixed_type_p (expr, &nonnull);
0e686aa6 293 target_type = code == PLUS_EXPR ? BINFO_TYPE (binfo) : BINFO_TYPE (d_binfo);
00bfffa4 294
d7981fd9
JM
295 /* Do we need to look in the vtable for the real offset? */
296 virtual_access = (v_binfo && fixed_type_p <= 0);
297
298 /* Do we need to check for a null pointer? */
0e686aa6
MM
299 if (want_pointer && !nonnull)
300 {
301 /* If we know the conversion will not actually change the value
302 of EXPR, then we can avoid testing the expression for NULL.
303 We have to avoid generating a COMPONENT_REF for a base class
304 field, because other parts of the compiler know that such
305 expressions are always non-NULL. */
306 if (!virtual_access && integer_zerop (offset))
307 return build_nop (build_pointer_type (target_type), expr);
308 null_test = error_mark_node;
309 }
00bfffa4 310
d7981fd9
JM
311 /* Protect against multiple evaluation if necessary. */
312 if (TREE_SIDE_EFFECTS (expr) && (null_test || virtual_access))
ca36f057 313 expr = save_expr (expr);
f2606a97 314
d7981fd9 315 /* Now that we've saved expr, build the real null test. */
00bfffa4 316 if (null_test)
471a58a9
AP
317 {
318 tree zero = cp_convert (TREE_TYPE (expr), integer_zero_node);
7866705a
SB
319 null_test = fold_build2 (NE_EXPR, boolean_type_node,
320 expr, zero);
471a58a9 321 }
00bfffa4
JM
322
323 /* If this is a simple base reference, express it as a COMPONENT_REF. */
d7981fd9 324 if (code == PLUS_EXPR && !virtual_access
00bfffa4
JM
325 /* We don't build base fields for empty bases, and they aren't very
326 interesting to the optimizers anyway. */
327 && !has_empty)
328 {
329 expr = build_indirect_ref (expr, NULL);
330 expr = build_simple_base_path (expr, binfo);
331 if (want_pointer)
442c8e31 332 expr = build_address (expr);
00bfffa4
JM
333 target_type = TREE_TYPE (expr);
334 goto out;
335 }
336
d7981fd9 337 if (virtual_access)
1a588ad7 338 {
338d90b8 339 /* Going via virtual base V_BINFO. We need the static offset
0cbd7506
MS
340 from V_BINFO to BINFO, and the dynamic offset from D_BINFO to
341 V_BINFO. That offset is an entry in D_BINFO's vtable. */
1f5a253a
NS
342 tree v_offset;
343
344 if (fixed_type_p < 0 && in_base_initializer)
345 {
2acb1af9
NS
346 /* In a base member initializer, we cannot rely on the
347 vtable being set up. We have to indirect via the
348 vtt_parm. */
6de9cd9a
DN
349 tree t;
350
2acb1af9 351 t = TREE_TYPE (TYPE_VFIELD (current_class_type));
6de9cd9a
DN
352 t = build_pointer_type (t);
353 v_offset = convert (t, current_vtt_parm);
6de9cd9a 354 v_offset = build_indirect_ref (v_offset, NULL);
1f5a253a
NS
355 }
356 else
357 v_offset = build_vfield_ref (build_indirect_ref (expr, NULL),
358 TREE_TYPE (TREE_TYPE (expr)));
c8094d83 359
f293ce4b
RS
360 v_offset = build2 (PLUS_EXPR, TREE_TYPE (v_offset),
361 v_offset, BINFO_VPTR_FIELD (v_binfo));
c8094d83 362 v_offset = build1 (NOP_EXPR,
338d90b8
NS
363 build_pointer_type (ptrdiff_type_node),
364 v_offset);
365 v_offset = build_indirect_ref (v_offset, NULL);
6de9cd9a
DN
366 TREE_CONSTANT (v_offset) = 1;
367 TREE_INVARIANT (v_offset) = 1;
f63ab951 368
7b6d72fc 369 offset = convert_to_integer (ptrdiff_type_node,
c8094d83 370 size_diffop (offset,
7b6d72fc 371 BINFO_OFFSET (v_binfo)));
8d08fdba 372
338d90b8 373 if (!integer_zerop (offset))
f293ce4b 374 v_offset = build2 (code, ptrdiff_type_node, v_offset, offset);
f2606a97
JM
375
376 if (fixed_type_p < 0)
377 /* Negative fixed_type_p means this is a constructor or destructor;
378 virtual base layout is fixed in in-charge [cd]tors, but not in
379 base [cd]tors. */
f293ce4b
RS
380 offset = build3 (COND_EXPR, ptrdiff_type_node,
381 build2 (EQ_EXPR, boolean_type_node,
382 current_in_charge_parm, integer_zero_node),
383 v_offset,
aa8f5c20
AP
384 convert_to_integer (ptrdiff_type_node,
385 BINFO_OFFSET (binfo)));
338d90b8
NS
386 else
387 offset = v_offset;
8d08fdba 388 }
8d08fdba 389
338d90b8
NS
390 target_type = cp_build_qualified_type
391 (target_type, cp_type_quals (TREE_TYPE (TREE_TYPE (expr))));
392 ptr_target_type = build_pointer_type (target_type);
393 if (want_pointer)
394 target_type = ptr_target_type;
c8094d83 395
338d90b8 396 expr = build1 (NOP_EXPR, ptr_target_type, expr);
fed3cef0 397
338d90b8 398 if (!integer_zerop (offset))
f293ce4b 399 expr = build2 (code, ptr_target_type, expr, offset);
8d08fdba 400 else
338d90b8 401 null_test = NULL;
c8094d83 402
338d90b8
NS
403 if (!want_pointer)
404 expr = build_indirect_ref (expr, NULL);
8d08fdba 405
00bfffa4 406 out:
338d90b8 407 if (null_test)
7866705a
SB
408 expr = fold_build3 (COND_EXPR, target_type, null_test, expr,
409 fold_build1 (NOP_EXPR, target_type,
410 integer_zero_node));
f2606a97 411
338d90b8 412 return expr;
8d08fdba
MS
413}
414
00bfffa4
JM
415/* Subroutine of build_base_path; EXPR and BINFO are as in that function.
416 Perform a derived-to-base conversion by recursively building up a
417 sequence of COMPONENT_REFs to the appropriate base fields. */
418
419static tree
420build_simple_base_path (tree expr, tree binfo)
421{
422 tree type = BINFO_TYPE (binfo);
fc6633e0 423 tree d_binfo = BINFO_INHERITANCE_CHAIN (binfo);
00bfffa4
JM
424 tree field;
425
00bfffa4
JM
426 if (d_binfo == NULL_TREE)
427 {
12a669d1 428 tree temp;
c8094d83 429
8dc2b103 430 gcc_assert (TYPE_MAIN_VARIANT (TREE_TYPE (expr)) == type);
c8094d83 431
12a669d1 432 /* Transform `(a, b).x' into `(*(a, &b)).x', `(a ? b : c).x'
0cbd7506
MS
433 into `(*(a ? &b : &c)).x', and so on. A COND_EXPR is only
434 an lvalue in the frontend; only _DECLs and _REFs are lvalues
435 in the backend. */
12a669d1
NS
436 temp = unary_complex_lvalue (ADDR_EXPR, expr);
437 if (temp)
438 expr = build_indirect_ref (temp, NULL);
439
00bfffa4
JM
440 return expr;
441 }
442
443 /* Recurse. */
444 expr = build_simple_base_path (expr, d_binfo);
445
446 for (field = TYPE_FIELDS (BINFO_TYPE (d_binfo));
447 field; field = TREE_CHAIN (field))
448 /* Is this the base field created by build_base_field? */
449 if (TREE_CODE (field) == FIELD_DECL
642124c6
RH
450 && DECL_FIELD_IS_BASE (field)
451 && TREE_TYPE (field) == type)
12a669d1
NS
452 {
453 /* We don't use build_class_member_access_expr here, as that
454 has unnecessary checks, and more importantly results in
455 recursive calls to dfs_walk_once. */
456 int type_quals = cp_type_quals (TREE_TYPE (expr));
457
458 expr = build3 (COMPONENT_REF,
459 cp_build_qualified_type (type, type_quals),
460 expr, field, NULL_TREE);
461 expr = fold_if_not_in_template (expr);
c8094d83 462
12a669d1
NS
463 /* Mark the expression const or volatile, as appropriate.
464 Even though we've dealt with the type above, we still have
465 to mark the expression itself. */
466 if (type_quals & TYPE_QUAL_CONST)
467 TREE_READONLY (expr) = 1;
468 if (type_quals & TYPE_QUAL_VOLATILE)
469 TREE_THIS_VOLATILE (expr) = 1;
c8094d83 470
12a669d1
NS
471 return expr;
472 }
00bfffa4
JM
473
474 /* Didn't find the base field?!? */
8dc2b103 475 gcc_unreachable ();
00bfffa4
JM
476}
477
08e17d9d
MM
478/* Convert OBJECT to the base TYPE. OBJECT is an expression whose
479 type is a class type or a pointer to a class type. In the former
480 case, TYPE is also a class type; in the latter it is another
481 pointer type. If CHECK_ACCESS is true, an error message is emitted
482 if TYPE is inaccessible. If OBJECT has pointer type, the value is
483 assumed to be non-NULL. */
50ad9642
MM
484
485tree
08e17d9d 486convert_to_base (tree object, tree type, bool check_access, bool nonnull)
50ad9642
MM
487{
488 tree binfo;
08e17d9d 489 tree object_type;
50ad9642 490
08e17d9d
MM
491 if (TYPE_PTR_P (TREE_TYPE (object)))
492 {
493 object_type = TREE_TYPE (TREE_TYPE (object));
494 type = TREE_TYPE (type);
495 }
496 else
497 object_type = TREE_TYPE (object);
498
499 binfo = lookup_base (object_type, type,
c8094d83 500 check_access ? ba_check : ba_unique,
50ad9642 501 NULL);
5bfc90de 502 if (!binfo || binfo == error_mark_node)
50ad9642
MM
503 return error_mark_node;
504
08e17d9d 505 return build_base_path (PLUS_EXPR, object, binfo, nonnull);
50ad9642
MM
506}
507
539ed333
NS
508/* EXPR is an expression with unqualified class type. BASE is a base
509 binfo of that class type. Returns EXPR, converted to the BASE
22ed7e5f
MM
510 type. This function assumes that EXPR is the most derived class;
511 therefore virtual bases can be found at their static offsets. */
512
513tree
514convert_to_base_statically (tree expr, tree base)
515{
516 tree expr_type;
517
518 expr_type = TREE_TYPE (expr);
539ed333 519 if (!SAME_BINFO_TYPE_P (BINFO_TYPE (base), expr_type))
22ed7e5f
MM
520 {
521 tree pointer_type;
522
523 pointer_type = build_pointer_type (expr_type);
524 expr = build_unary_op (ADDR_EXPR, expr, /*noconvert=*/1);
525 if (!integer_zerop (BINFO_OFFSET (base)))
c8094d83 526 expr = build2 (PLUS_EXPR, pointer_type, expr,
f293ce4b 527 build_nop (pointer_type, BINFO_OFFSET (base)));
22ed7e5f
MM
528 expr = build_nop (build_pointer_type (BINFO_TYPE (base)), expr);
529 expr = build1 (INDIRECT_REF, BINFO_TYPE (base), expr);
530 }
531
532 return expr;
533}
534
f8361147 535\f
981c353e
RH
536tree
537build_vfield_ref (tree datum, tree type)
538{
539 tree vfield, vcontext;
540
541 if (datum == error_mark_node)
542 return error_mark_node;
543
981c353e
RH
544 /* First, convert to the requested type. */
545 if (!same_type_ignoring_top_level_qualifiers_p (TREE_TYPE (datum), type))
08e17d9d
MM
546 datum = convert_to_base (datum, type, /*check_access=*/false,
547 /*nonnull=*/true);
981c353e
RH
548
549 /* Second, the requested type may not be the owner of its own vptr.
550 If not, convert to the base class that owns it. We cannot use
551 convert_to_base here, because VCONTEXT may appear more than once
5995ebfb 552 in the inheritance hierarchy of TYPE, and thus direct conversion
981c353e
RH
553 between the types may be ambiguous. Following the path back up
554 one step at a time via primary bases avoids the problem. */
555 vfield = TYPE_VFIELD (type);
556 vcontext = DECL_CONTEXT (vfield);
557 while (!same_type_ignoring_top_level_qualifiers_p (vcontext, type))
558 {
559 datum = build_simple_base_path (datum, CLASSTYPE_PRIMARY_BINFO (type));
560 type = TREE_TYPE (datum);
561 }
562
563 return build3 (COMPONENT_REF, TREE_TYPE (vfield), datum, vfield, NULL_TREE);
564}
565
8d08fdba 566/* Given an object INSTANCE, return an expression which yields the
67231816
RH
567 vtable element corresponding to INDEX. There are many special
568 cases for INSTANCE which we take care of here, mainly to avoid
569 creating extra tree nodes when we don't have to. */
e92cc029 570
4a8d0c9c 571static tree
94edc4ab 572build_vtbl_ref_1 (tree instance, tree idx)
8d08fdba 573{
f63ab951
JM
574 tree aref;
575 tree vtbl = NULL_TREE;
8d08fdba 576
f63ab951
JM
577 /* Try to figure out what a reference refers to, and
578 access its virtual function table directly. */
579
580 int cdtorp = 0;
581 tree fixed_type = fixed_type_or_null (instance, NULL, &cdtorp);
582
ee76b931 583 tree basetype = non_reference (TREE_TYPE (instance));
8d08fdba 584
f63ab951 585 if (fixed_type && !cdtorp)
8d08fdba 586 {
f63ab951 587 tree binfo = lookup_base (fixed_type, basetype,
18e4be85 588 ba_unique | ba_quiet, NULL);
f63ab951 589 if (binfo)
6de9cd9a 590 vtbl = unshare_expr (BINFO_VTABLE (binfo));
f63ab951 591 }
8d08fdba 592
f63ab951 593 if (!vtbl)
dbbf88d1 594 vtbl = build_vfield_ref (instance, basetype);
c8094d83 595
e3417fcd 596 assemble_external (vtbl);
a1dd0d36 597
8d08fdba 598 aref = build_array_ref (vtbl, idx);
6de9cd9a
DN
599 TREE_CONSTANT (aref) |= TREE_CONSTANT (vtbl) && TREE_CONSTANT (idx);
600 TREE_INVARIANT (aref) = TREE_CONSTANT (aref);
8d08fdba 601
c4372ef4 602 return aref;
8d08fdba
MS
603}
604
4a8d0c9c 605tree
94edc4ab 606build_vtbl_ref (tree instance, tree idx)
4a8d0c9c
RH
607{
608 tree aref = build_vtbl_ref_1 (instance, idx);
609
4a8d0c9c
RH
610 return aref;
611}
612
0f59171d
RH
613/* Given a stable object pointer INSTANCE_PTR, return an expression which
614 yields a function pointer corresponding to vtable element INDEX. */
67231816
RH
615
616tree
0f59171d 617build_vfn_ref (tree instance_ptr, tree idx)
67231816 618{
0f59171d
RH
619 tree aref;
620
621 aref = build_vtbl_ref_1 (build_indirect_ref (instance_ptr, 0), idx);
67231816
RH
622
623 /* When using function descriptors, the address of the
624 vtable entry is treated as a function pointer. */
625 if (TARGET_VTABLE_USES_DESCRIPTORS)
4a8d0c9c 626 aref = build1 (NOP_EXPR, TREE_TYPE (aref),
67231816
RH
627 build_unary_op (ADDR_EXPR, aref, /*noconvert=*/1));
628
0f59171d 629 /* Remember this as a method reference, for later devirtualization. */
f293ce4b 630 aref = build3 (OBJ_TYPE_REF, TREE_TYPE (aref), aref, instance_ptr, idx);
0f59171d 631
67231816
RH
632 return aref;
633}
634
669ec2b4
JM
635/* Return the name of the virtual function table (as an IDENTIFIER_NODE)
636 for the given TYPE. */
637
638static tree
94edc4ab 639get_vtable_name (tree type)
669ec2b4 640{
1f84ec23 641 return mangle_vtbl_for_type (type);
669ec2b4
JM
642}
643
4684cd27
MM
644/* DECL is an entity associated with TYPE, like a virtual table or an
645 implicitly generated constructor. Determine whether or not DECL
646 should have external or internal linkage at the object file
647 level. This routine does not deal with COMDAT linkage and other
648 similar complexities; it simply sets TREE_PUBLIC if it possible for
649 entities in other translation units to contain copies of DECL, in
650 the abstract. */
651
652void
653set_linkage_according_to_type (tree type, tree decl)
654{
655 /* If TYPE involves a local class in a function with internal
656 linkage, then DECL should have internal linkage too. Other local
657 classes have no linkage -- but if their containing functions
658 have external linkage, it makes sense for DECL to have external
659 linkage too. That will allow template definitions to be merged,
660 for example. */
661 if (no_linkage_check (type, /*relaxed_p=*/true))
662 {
663 TREE_PUBLIC (decl) = 0;
664 DECL_INTERFACE_KNOWN (decl) = 1;
665 }
666 else
667 TREE_PUBLIC (decl) = 1;
668}
669
459c43ad
MM
670/* Create a VAR_DECL for a primary or secondary vtable for CLASS_TYPE.
671 (For a secondary vtable for B-in-D, CLASS_TYPE should be D, not B.)
672 Use NAME for the name of the vtable, and VTABLE_TYPE for its type. */
b9f39201
MM
673
674static tree
94edc4ab 675build_vtable (tree class_type, tree name, tree vtable_type)
b9f39201
MM
676{
677 tree decl;
678
679 decl = build_lang_decl (VAR_DECL, name, vtable_type);
90ecce3e
JM
680 /* vtable names are already mangled; give them their DECL_ASSEMBLER_NAME
681 now to avoid confusion in mangle_decl. */
682 SET_DECL_ASSEMBLER_NAME (decl, name);
b9f39201
MM
683 DECL_CONTEXT (decl) = class_type;
684 DECL_ARTIFICIAL (decl) = 1;
685 TREE_STATIC (decl) = 1;
b9f39201 686 TREE_READONLY (decl) = 1;
b9f39201 687 DECL_VIRTUAL_P (decl) = 1;
a6f5e048 688 DECL_ALIGN (decl) = TARGET_VTABLE_ENTRY_ALIGN;
d35543c0 689 DECL_VTABLE_OR_VTT_P (decl) = 1;
78d55cc8
JM
690 /* At one time the vtable info was grabbed 2 words at a time. This
691 fails on sparc unless you have 8-byte alignment. (tiemann) */
692 DECL_ALIGN (decl) = MAX (TYPE_ALIGN (double_type_node),
693 DECL_ALIGN (decl));
4684cd27
MM
694 set_linkage_according_to_type (class_type, decl);
695 /* The vtable has not been defined -- yet. */
696 DECL_EXTERNAL (decl) = 1;
697 DECL_NOT_REALLY_EXTERN (decl) = 1;
698
78e0d62b
RH
699 /* Mark the VAR_DECL node representing the vtable itself as a
700 "gratuitous" one, thereby forcing dwarfout.c to ignore it. It
701 is rather important that such things be ignored because any
702 effort to actually generate DWARF for them will run into
703 trouble when/if we encounter code like:
c8094d83 704
78e0d62b
RH
705 #pragma interface
706 struct S { virtual void member (); };
c8094d83 707
78e0d62b
RH
708 because the artificial declaration of the vtable itself (as
709 manufactured by the g++ front end) will say that the vtable is
710 a static member of `S' but only *after* the debug output for
711 the definition of `S' has already been output. This causes
712 grief because the DWARF entry for the definition of the vtable
713 will try to refer back to an earlier *declaration* of the
714 vtable as a static member of `S' and there won't be one. We
715 might be able to arrange to have the "vtable static member"
716 attached to the member list for `S' before the debug info for
717 `S' get written (which would solve the problem) but that would
718 require more intrusive changes to the g++ front end. */
719 DECL_IGNORED_P (decl) = 1;
78d55cc8 720
b9f39201
MM
721 return decl;
722}
723
1aa4ccd4
NS
724/* Get the VAR_DECL of the vtable for TYPE. TYPE need not be polymorphic,
725 or even complete. If this does not exist, create it. If COMPLETE is
838dfd8a 726 nonzero, then complete the definition of it -- that will render it
1aa4ccd4
NS
727 impossible to actually build the vtable, but is useful to get at those
728 which are known to exist in the runtime. */
729
c8094d83 730tree
94edc4ab 731get_vtable_decl (tree type, int complete)
1aa4ccd4 732{
548502d3
MM
733 tree decl;
734
735 if (CLASSTYPE_VTABLES (type))
736 return CLASSTYPE_VTABLES (type);
c8094d83 737
d1a74aa7 738 decl = build_vtable (type, get_vtable_name (type), vtbl_type_node);
548502d3
MM
739 CLASSTYPE_VTABLES (type) = decl;
740
1aa4ccd4 741 if (complete)
217f4eb9
MM
742 {
743 DECL_EXTERNAL (decl) = 1;
744 cp_finish_decl (decl, NULL_TREE, NULL_TREE, 0);
745 }
1aa4ccd4 746
1aa4ccd4
NS
747 return decl;
748}
749
28531dd0
MM
750/* Build the primary virtual function table for TYPE. If BINFO is
751 non-NULL, build the vtable starting with the initial approximation
752 that it is the same as the one which is the head of the association
838dfd8a 753 list. Returns a nonzero value if a new vtable is actually
28531dd0 754 created. */
e92cc029 755
28531dd0 756static int
94edc4ab 757build_primary_vtable (tree binfo, tree type)
8d08fdba 758{
31f8e4f3
MM
759 tree decl;
760 tree virtuals;
8d08fdba 761
1aa4ccd4 762 decl = get_vtable_decl (type, /*complete=*/0);
c8094d83 763
8d08fdba
MS
764 if (binfo)
765 {
dbbf88d1 766 if (BINFO_NEW_VTABLE_MARKED (binfo))
0533d788
MM
767 /* We have already created a vtable for this base, so there's
768 no need to do it again. */
28531dd0 769 return 0;
c8094d83 770
d1f05f93 771 virtuals = copy_list (BINFO_VIRTUALS (binfo));
c35cce41
MM
772 TREE_TYPE (decl) = TREE_TYPE (get_vtbl_decl_for_binfo (binfo));
773 DECL_SIZE (decl) = TYPE_SIZE (TREE_TYPE (decl));
774 DECL_SIZE_UNIT (decl) = TYPE_SIZE_UNIT (TREE_TYPE (decl));
8d08fdba
MS
775 }
776 else
777 {
50bc768d 778 gcc_assert (TREE_TYPE (decl) == vtbl_type_node);
8d08fdba 779 virtuals = NULL_TREE;
8d08fdba
MS
780 }
781
782#ifdef GATHER_STATISTICS
783 n_vtables += 1;
784 n_vtable_elems += list_length (virtuals);
785#endif
786
8d08fdba
MS
787 /* Initialize the association list for this type, based
788 on our first approximation. */
604a3205
NS
789 BINFO_VTABLE (TYPE_BINFO (type)) = decl;
790 BINFO_VIRTUALS (TYPE_BINFO (type)) = virtuals;
dbbf88d1 791 SET_BINFO_NEW_VTABLE_MARKED (TYPE_BINFO (type));
28531dd0 792 return 1;
8d08fdba
MS
793}
794
3461fba7 795/* Give BINFO a new virtual function table which is initialized
8d08fdba
MS
796 with a skeleton-copy of its original initialization. The only
797 entry that changes is the `delta' entry, so we can really
798 share a lot of structure.
799
3461fba7 800 FOR_TYPE is the most derived type which caused this table to
8d08fdba
MS
801 be needed.
802
838dfd8a 803 Returns nonzero if we haven't met BINFO before.
2636fde4
JM
804
805 The order in which vtables are built (by calling this function) for
806 an object must remain the same, otherwise a binary incompatibility
807 can result. */
e92cc029 808
28531dd0 809static int
dbbf88d1 810build_secondary_vtable (tree binfo)
8d08fdba 811{
dbbf88d1 812 if (BINFO_NEW_VTABLE_MARKED (binfo))
0533d788
MM
813 /* We already created a vtable for this base. There's no need to
814 do it again. */
28531dd0 815 return 0;
0533d788 816
8d7a5379
MM
817 /* Remember that we've created a vtable for this BINFO, so that we
818 don't try to do so again. */
dbbf88d1 819 SET_BINFO_NEW_VTABLE_MARKED (binfo);
c8094d83 820
8d7a5379 821 /* Make fresh virtual list, so we can smash it later. */
d1f05f93 822 BINFO_VIRTUALS (binfo) = copy_list (BINFO_VIRTUALS (binfo));
8d7a5379 823
3461fba7
NS
824 /* Secondary vtables are laid out as part of the same structure as
825 the primary vtable. */
826 BINFO_VTABLE (binfo) = NULL_TREE;
28531dd0 827 return 1;
8d08fdba
MS
828}
829
28531dd0 830/* Create a new vtable for BINFO which is the hierarchy dominated by
838dfd8a 831 T. Return nonzero if we actually created a new vtable. */
28531dd0
MM
832
833static int
94edc4ab 834make_new_vtable (tree t, tree binfo)
28531dd0
MM
835{
836 if (binfo == TYPE_BINFO (t))
837 /* In this case, it is *type*'s vtable we are modifying. We start
d0cd8b44 838 with the approximation that its vtable is that of the
28531dd0 839 immediate base class. */
981c353e 840 return build_primary_vtable (binfo, t);
28531dd0
MM
841 else
842 /* This is our very own copy of `basetype' to play with. Later,
843 we will fill in all the virtual functions that override the
844 virtual functions in these base classes which are not defined
845 by the current type. */
dbbf88d1 846 return build_secondary_vtable (binfo);
28531dd0
MM
847}
848
849/* Make *VIRTUALS, an entry on the BINFO_VIRTUALS list for BINFO
850 (which is in the hierarchy dominated by T) list FNDECL as its
4e7512c9
MM
851 BV_FN. DELTA is the required constant adjustment from the `this'
852 pointer where the vtable entry appears to the `this' required when
853 the function is actually called. */
8d08fdba
MS
854
855static void
94edc4ab 856modify_vtable_entry (tree t,
0cbd7506
MS
857 tree binfo,
858 tree fndecl,
859 tree delta,
860 tree *virtuals)
8d08fdba 861{
28531dd0 862 tree v;
c0bbf652 863
28531dd0 864 v = *virtuals;
c0bbf652 865
5e19c053 866 if (fndecl != BV_FN (v)
4e7512c9 867 || !tree_int_cst_equal (delta, BV_DELTA (v)))
c0bbf652 868 {
28531dd0
MM
869 /* We need a new vtable for BINFO. */
870 if (make_new_vtable (t, binfo))
871 {
872 /* If we really did make a new vtable, we also made a copy
873 of the BINFO_VIRTUALS list. Now, we have to find the
874 corresponding entry in that list. */
875 *virtuals = BINFO_VIRTUALS (binfo);
5e19c053 876 while (BV_FN (*virtuals) != BV_FN (v))
28531dd0
MM
877 *virtuals = TREE_CHAIN (*virtuals);
878 v = *virtuals;
879 }
8d08fdba 880
5e19c053 881 BV_DELTA (v) = delta;
aabb4cd6 882 BV_VCALL_INDEX (v) = NULL_TREE;
5e19c053 883 BV_FN (v) = fndecl;
8d08fdba 884 }
8d08fdba
MS
885}
886
8d08fdba 887\f
b2a9b208 888/* Add method METHOD to class TYPE. If USING_DECL is non-null, it is
b77fe7b4
NS
889 the USING_DECL naming METHOD. Returns true if the method could be
890 added to the method vec. */
e92cc029 891
b77fe7b4 892bool
b2a9b208 893add_method (tree type, tree method, tree using_decl)
8d08fdba 894{
9ba5ff0f 895 unsigned slot;
90ea9897 896 tree overload;
b54a07e8
NS
897 bool template_conv_p = false;
898 bool conv_p;
d4e6fecb 899 VEC(tree,gc) *method_vec;
aaaa46d2 900 bool complete_p;
9ba5ff0f
NS
901 bool insert_p = false;
902 tree current_fns;
ac2b3222
AP
903
904 if (method == error_mark_node)
b77fe7b4 905 return false;
aaaa46d2
MM
906
907 complete_p = COMPLETE_TYPE_P (type);
b54a07e8
NS
908 conv_p = DECL_CONV_FN_P (method);
909 if (conv_p)
910 template_conv_p = (TREE_CODE (method) == TEMPLATE_DECL
911 && DECL_TEMPLATE_CONV_FN_P (method));
452a394b 912
452a394b 913 method_vec = CLASSTYPE_METHOD_VEC (type);
aaaa46d2
MM
914 if (!method_vec)
915 {
916 /* Make a new method vector. We start with 8 entries. We must
917 allocate at least two (for constructors and destructors), and
918 we're going to end up with an assignment operator at some
919 point as well. */
d4e6fecb 920 method_vec = VEC_alloc (tree, gc, 8);
aaaa46d2
MM
921 /* Create slots for constructors and destructors. */
922 VEC_quick_push (tree, method_vec, NULL_TREE);
923 VEC_quick_push (tree, method_vec, NULL_TREE);
924 CLASSTYPE_METHOD_VEC (type) = method_vec;
925 }
926
452a394b
MM
927 /* Constructors and destructors go in special slots. */
928 if (DECL_MAYBE_IN_CHARGE_CONSTRUCTOR_P (method))
929 slot = CLASSTYPE_CONSTRUCTOR_SLOT;
930 else if (DECL_MAYBE_IN_CHARGE_DESTRUCTOR_P (method))
4b0d3cbe
MM
931 {
932 slot = CLASSTYPE_DESTRUCTOR_SLOT;
c8094d83 933
f5c28a15 934 if (TYPE_FOR_JAVA (type))
9f4faeae
MM
935 {
936 if (!DECL_ARTIFICIAL (method))
937 error ("Java class %qT cannot have a destructor", type);
938 else if (TYPE_HAS_NONTRIVIAL_DESTRUCTOR (type))
939 error ("Java class %qT cannot have an implicit non-trivial "
940 "destructor",
941 type);
942 }
4b0d3cbe 943 }
452a394b 944 else
61a127b3 945 {
aaaa46d2
MM
946 tree m;
947
9ba5ff0f 948 insert_p = true;
452a394b 949 /* See if we already have an entry with this name. */
c8094d83 950 for (slot = CLASSTYPE_FIRST_CONVERSION_SLOT;
9ba5ff0f 951 VEC_iterate (tree, method_vec, slot, m);
aaaa46d2 952 ++slot)
5dd236e2 953 {
5dd236e2 954 m = OVL_CURRENT (m);
5dd236e2
NS
955 if (template_conv_p)
956 {
aaaa46d2
MM
957 if (TREE_CODE (m) == TEMPLATE_DECL
958 && DECL_TEMPLATE_CONV_FN_P (m))
959 insert_p = false;
5dd236e2
NS
960 break;
961 }
aaaa46d2 962 if (conv_p && !DECL_CONV_FN_P (m))
5dd236e2 963 break;
aaaa46d2 964 if (DECL_NAME (m) == DECL_NAME (method))
452a394b 965 {
aaaa46d2
MM
966 insert_p = false;
967 break;
8d08fdba 968 }
aaaa46d2
MM
969 if (complete_p
970 && !DECL_CONV_FN_P (m)
971 && DECL_NAME (m) > DECL_NAME (method))
972 break;
61a127b3 973 }
452a394b 974 }
9ba5ff0f 975 current_fns = insert_p ? NULL_TREE : VEC_index (tree, method_vec, slot);
c8094d83 976
c353b8e3 977 if (processing_template_decl)
452a394b
MM
978 /* TYPE is a template class. Don't issue any errors now; wait
979 until instantiation time to complain. */
980 ;
981 else
982 {
983 tree fns;
03017874 984
452a394b 985 /* Check to see if we've already got this method. */
9ba5ff0f 986 for (fns = current_fns; fns; fns = OVL_NEXT (fns))
452a394b
MM
987 {
988 tree fn = OVL_CURRENT (fns);
6b20b203
MM
989 tree fn_type;
990 tree method_type;
f0ab6bf2
MM
991 tree parms1;
992 tree parms2;
f0ab6bf2 993
452a394b
MM
994 if (TREE_CODE (fn) != TREE_CODE (method))
995 continue;
03017874 996
f0ab6bf2
MM
997 /* [over.load] Member function declarations with the
998 same name and the same parameter types cannot be
999 overloaded if any of them is a static member
1000 function declaration.
1001
1002 [namespace.udecl] When a using-declaration brings names
1003 from a base class into a derived class scope, member
1004 functions in the derived class override and/or hide member
1005 functions with the same name and parameter types in a base
1006 class (rather than conflicting). */
6b20b203
MM
1007 fn_type = TREE_TYPE (fn);
1008 method_type = TREE_TYPE (method);
1009 parms1 = TYPE_ARG_TYPES (fn_type);
1010 parms2 = TYPE_ARG_TYPES (method_type);
f0ab6bf2
MM
1011
1012 /* Compare the quals on the 'this' parm. Don't compare
1013 the whole types, as used functions are treated as
1014 coming from the using class in overload resolution. */
1015 if (! DECL_STATIC_FUNCTION_P (fn)
1016 && ! DECL_STATIC_FUNCTION_P (method)
1017 && (TYPE_QUALS (TREE_TYPE (TREE_VALUE (parms1)))
1018 != TYPE_QUALS (TREE_TYPE (TREE_VALUE (parms2)))))
6b20b203 1019 continue;
c8094d83 1020
6b20b203
MM
1021 /* For templates, the return type and template parameters
1022 must be identical. */
8a188e24 1023 if (TREE_CODE (fn) == TEMPLATE_DECL
6b20b203
MM
1024 && (!same_type_p (TREE_TYPE (fn_type),
1025 TREE_TYPE (method_type))
1026 || !comp_template_parms (DECL_TEMPLATE_PARMS (fn),
1027 DECL_TEMPLATE_PARMS (method))))
1028 continue;
c8094d83 1029
f0ab6bf2
MM
1030 if (! DECL_STATIC_FUNCTION_P (fn))
1031 parms1 = TREE_CHAIN (parms1);
1032 if (! DECL_STATIC_FUNCTION_P (method))
1033 parms2 = TREE_CHAIN (parms2);
1034
6b20b203 1035 if (compparms (parms1, parms2)
c8094d83 1036 && (!DECL_CONV_FN_P (fn)
6b20b203
MM
1037 || same_type_p (TREE_TYPE (fn_type),
1038 TREE_TYPE (method_type))))
452a394b 1039 {
b2a9b208
NS
1040 if (using_decl)
1041 {
1042 if (DECL_CONTEXT (fn) == type)
1043 /* Defer to the local function. */
b77fe7b4 1044 return false;
b2a9b208 1045 if (DECL_CONTEXT (fn) == DECL_CONTEXT (method))
dee15844 1046 error ("repeated using declaration %q+D", using_decl);
b2a9b208 1047 else
dee15844
JM
1048 error ("using declaration %q+D conflicts with a previous using declaration",
1049 using_decl);
b2a9b208 1050 }
f0ab6bf2 1051 else
03017874 1052 {
dee15844
JM
1053 error ("%q+#D cannot be overloaded", method);
1054 error ("with %q+#D", fn);
03017874 1055 }
c8094d83 1056
b2a9b208
NS
1057 /* We don't call duplicate_decls here to merge the
1058 declarations because that will confuse things if the
1059 methods have inline definitions. In particular, we
1060 will crash while processing the definitions. */
b77fe7b4 1061 return false;
452a394b 1062 }
03017874 1063 }
452a394b 1064 }
03017874 1065
357d956e
MM
1066 /* A class should never have more than one destructor. */
1067 if (current_fns && DECL_MAYBE_IN_CHARGE_DESTRUCTOR_P (method))
1068 return false;
1069
c8094d83 1070 /* Add the new binding. */
9ba5ff0f 1071 overload = build_overload (method, current_fns);
c8094d83 1072
357d956e
MM
1073 if (conv_p)
1074 TYPE_HAS_CONVERSION (type) = 1;
1075 else if (slot >= CLASSTYPE_FIRST_CONVERSION_SLOT && !complete_p)
90ea9897
MM
1076 push_class_level_binding (DECL_NAME (method), overload);
1077
9ba5ff0f
NS
1078 if (insert_p)
1079 {
1080 /* We only expect to add few methods in the COMPLETE_P case, so
1081 just make room for one more method in that case. */
d4e6fecb 1082 if (VEC_reserve (tree, gc, method_vec, complete_p ? -1 : 1))
9ba5ff0f
NS
1083 CLASSTYPE_METHOD_VEC (type) = method_vec;
1084 if (slot == VEC_length (tree, method_vec))
1085 VEC_quick_push (tree, method_vec, overload);
1086 else
1087 VEC_quick_insert (tree, method_vec, slot, overload);
1088 }
1089 else
03fd3f84 1090 /* Replace the current slot. */
9ba5ff0f 1091 VEC_replace (tree, method_vec, slot, overload);
b77fe7b4 1092 return true;
8d08fdba
MS
1093}
1094
1095/* Subroutines of finish_struct. */
1096
aa52c1ff
JM
1097/* Change the access of FDECL to ACCESS in T. Return 1 if change was
1098 legit, otherwise return 0. */
e92cc029 1099
8d08fdba 1100static int
94edc4ab 1101alter_access (tree t, tree fdecl, tree access)
8d08fdba 1102{
721c3b42
MM
1103 tree elem;
1104
1105 if (!DECL_LANG_SPECIFIC (fdecl))
1106 retrofit_lang_decl (fdecl);
1107
50bc768d 1108 gcc_assert (!DECL_DISCRIMINATOR_P (fdecl));
8e4ce833 1109
721c3b42 1110 elem = purpose_member (t, DECL_ACCESS (fdecl));
38afd588 1111 if (elem)
8d08fdba 1112 {
38afd588 1113 if (TREE_VALUE (elem) != access)
8d08fdba 1114 {
38afd588 1115 if (TREE_CODE (TREE_TYPE (fdecl)) == FUNCTION_DECL)
dee15844
JM
1116 error ("conflicting access specifications for method"
1117 " %q+D, ignored", TREE_TYPE (fdecl));
38afd588 1118 else
1f070f2b 1119 error ("conflicting access specifications for field %qE, ignored",
4460cef2 1120 DECL_NAME (fdecl));
8d08fdba
MS
1121 }
1122 else
430bb96b
JL
1123 {
1124 /* They're changing the access to the same thing they changed
1125 it to before. That's OK. */
1126 ;
1127 }
db5ae43f 1128 }
38afd588 1129 else
8d08fdba 1130 {
6df5158a 1131 perform_or_defer_access_check (TYPE_BINFO (t), fdecl);
be99da77 1132 DECL_ACCESS (fdecl) = tree_cons (t, access, DECL_ACCESS (fdecl));
8d08fdba
MS
1133 return 1;
1134 }
1135 return 0;
1136}
1137
58010b57 1138/* Process the USING_DECL, which is a member of T. */
79ad62b2 1139
e9659ab0 1140static void
94edc4ab 1141handle_using_decl (tree using_decl, tree t)
79ad62b2 1142{
98ed9dae 1143 tree decl = USING_DECL_DECLS (using_decl);
79ad62b2
MM
1144 tree name = DECL_NAME (using_decl);
1145 tree access
1146 = TREE_PRIVATE (using_decl) ? access_private_node
1147 : TREE_PROTECTED (using_decl) ? access_protected_node
1148 : access_public_node;
79ad62b2 1149 tree flist = NULL_TREE;
aa52c1ff 1150 tree old_value;
79ad62b2 1151
98ed9dae 1152 gcc_assert (!processing_template_decl && decl);
c8094d83 1153
39fb05d0 1154 old_value = lookup_member (t, name, /*protect=*/0, /*want_type=*/false);
aa52c1ff 1155 if (old_value)
79ad62b2 1156 {
aa52c1ff
JM
1157 if (is_overloaded_fn (old_value))
1158 old_value = OVL_CURRENT (old_value);
1159
1160 if (DECL_P (old_value) && DECL_CONTEXT (old_value) == t)
1161 /* OK */;
1162 else
1163 old_value = NULL_TREE;
79ad62b2 1164 }
c8094d83 1165
6e976965 1166 cp_emit_debug_info_for_using (decl, USING_DECL_SCOPE (using_decl));
c8094d83 1167
98ed9dae
NS
1168 if (is_overloaded_fn (decl))
1169 flist = decl;
aa52c1ff
JM
1170
1171 if (! old_value)
1172 ;
1173 else if (is_overloaded_fn (old_value))
79ad62b2 1174 {
aa52c1ff
JM
1175 if (flist)
1176 /* It's OK to use functions from a base when there are functions with
1177 the same name already present in the current class. */;
1178 else
79ad62b2 1179 {
dee15844
JM
1180 error ("%q+D invalid in %q#T", using_decl, t);
1181 error (" because of local method %q+#D with same name",
1182 OVL_CURRENT (old_value));
aa52c1ff 1183 return;
79ad62b2
MM
1184 }
1185 }
186c0fbe 1186 else if (!DECL_ARTIFICIAL (old_value))
aa52c1ff 1187 {
dee15844
JM
1188 error ("%q+D invalid in %q#T", using_decl, t);
1189 error (" because of local member %q+#D with same name", old_value);
aa52c1ff
JM
1190 return;
1191 }
c8094d83 1192
f4f206f4 1193 /* Make type T see field decl FDECL with access ACCESS. */
aa52c1ff
JM
1194 if (flist)
1195 for (; flist; flist = OVL_NEXT (flist))
1196 {
b2a9b208 1197 add_method (t, OVL_CURRENT (flist), using_decl);
aa52c1ff
JM
1198 alter_access (t, OVL_CURRENT (flist), access);
1199 }
1200 else
98ed9dae 1201 alter_access (t, decl, access);
79ad62b2 1202}
8d08fdba 1203\f
e5e459bf
AO
1204/* Run through the base classes of T, updating CANT_HAVE_CONST_CTOR_P,
1205 and NO_CONST_ASN_REF_P. Also set flag bits in T based on
1206 properties of the bases. */
8d08fdba 1207
607cf131 1208static void
94edc4ab 1209check_bases (tree t,
0cbd7506
MS
1210 int* cant_have_const_ctor_p,
1211 int* no_const_asn_ref_p)
8d08fdba 1212{
607cf131 1213 int i;
0fb3018c 1214 int seen_non_virtual_nearly_empty_base_p;
fa743e8c
NS
1215 tree base_binfo;
1216 tree binfo;
8d08fdba 1217
0fb3018c 1218 seen_non_virtual_nearly_empty_base_p = 0;
607cf131 1219
fa743e8c
NS
1220 for (binfo = TYPE_BINFO (t), i = 0;
1221 BINFO_BASE_ITERATE (binfo, i, base_binfo); i++)
8d08fdba 1222 {
fa743e8c 1223 tree basetype = TREE_TYPE (base_binfo);
9a71c18b 1224
50bc768d 1225 gcc_assert (COMPLETE_TYPE_P (basetype));
c8094d83 1226
4c6b7393 1227 /* Effective C++ rule 14. We only need to check TYPE_POLYMORPHIC_P
607cf131
MM
1228 here because the case of virtual functions but non-virtual
1229 dtor is handled in finish_struct_1. */
74fa0285
GDR
1230 if (!TYPE_POLYMORPHIC_P (basetype))
1231 warning (OPT_Weffc__,
1232 "base class %q#T has a non-virtual destructor", basetype);
8d08fdba 1233
607cf131
MM
1234 /* If the base class doesn't have copy constructors or
1235 assignment operators that take const references, then the
1236 derived class cannot have such a member automatically
1237 generated. */
1238 if (! TYPE_HAS_CONST_INIT_REF (basetype))
1239 *cant_have_const_ctor_p = 1;
1240 if (TYPE_HAS_ASSIGN_REF (basetype)
1241 && !TYPE_HAS_CONST_ASSIGN_REF (basetype))
1242 *no_const_asn_ref_p = 1;
8d08fdba 1243
809e3e7f 1244 if (BINFO_VIRTUAL_P (base_binfo))
00a17e31 1245 /* A virtual base does not effect nearly emptiness. */
0fb3018c 1246 ;
f9c528ea 1247 else if (CLASSTYPE_NEARLY_EMPTY_P (basetype))
0fb3018c
NS
1248 {
1249 if (seen_non_virtual_nearly_empty_base_p)
1250 /* And if there is more than one nearly empty base, then the
1251 derived class is not nearly empty either. */
1252 CLASSTYPE_NEARLY_EMPTY_P (t) = 0;
1253 else
00a17e31 1254 /* Remember we've seen one. */
0fb3018c
NS
1255 seen_non_virtual_nearly_empty_base_p = 1;
1256 }
1257 else if (!is_empty_class (basetype))
1258 /* If the base class is not empty or nearly empty, then this
1259 class cannot be nearly empty. */
1260 CLASSTYPE_NEARLY_EMPTY_P (t) = 0;
f9c528ea 1261
607cf131
MM
1262 /* A lot of properties from the bases also apply to the derived
1263 class. */
8d08fdba 1264 TYPE_NEEDS_CONSTRUCTING (t) |= TYPE_NEEDS_CONSTRUCTING (basetype);
c8094d83 1265 TYPE_HAS_NONTRIVIAL_DESTRUCTOR (t)
834c6dff 1266 |= TYPE_HAS_NONTRIVIAL_DESTRUCTOR (basetype);
c8094d83 1267 TYPE_HAS_COMPLEX_ASSIGN_REF (t)
607cf131 1268 |= TYPE_HAS_COMPLEX_ASSIGN_REF (basetype);
e8abc66f 1269 TYPE_HAS_COMPLEX_INIT_REF (t) |= TYPE_HAS_COMPLEX_INIT_REF (basetype);
4c6b7393 1270 TYPE_POLYMORPHIC_P (t) |= TYPE_POLYMORPHIC_P (basetype);
c8094d83 1271 CLASSTYPE_CONTAINS_EMPTY_CLASS_P (t)
5ec1192e 1272 |= CLASSTYPE_CONTAINS_EMPTY_CLASS_P (basetype);
607cf131
MM
1273 }
1274}
1275
fc6633e0
NS
1276/* Determine all the primary bases within T. Sets BINFO_PRIMARY_BASE_P for
1277 those that are primaries. Sets BINFO_LOST_PRIMARY_P for those
1278 that have had a nearly-empty virtual primary base stolen by some
77880ae4 1279 other base in the hierarchy. Determines CLASSTYPE_PRIMARY_BASE for
fc6633e0 1280 T. */
c35cce41
MM
1281
1282static void
fc6633e0 1283determine_primary_bases (tree t)
c35cce41 1284{
fc6633e0
NS
1285 unsigned i;
1286 tree primary = NULL_TREE;
1287 tree type_binfo = TYPE_BINFO (t);
1288 tree base_binfo;
1289
1290 /* Determine the primary bases of our bases. */
1291 for (base_binfo = TREE_CHAIN (type_binfo); base_binfo;
1292 base_binfo = TREE_CHAIN (base_binfo))
c35cce41 1293 {
fc6633e0 1294 tree primary = CLASSTYPE_PRIMARY_BINFO (BINFO_TYPE (base_binfo));
c35cce41 1295
fc6633e0
NS
1296 /* See if we're the non-virtual primary of our inheritance
1297 chain. */
1298 if (!BINFO_VIRTUAL_P (base_binfo))
dbbf88d1 1299 {
fc6633e0
NS
1300 tree parent = BINFO_INHERITANCE_CHAIN (base_binfo);
1301 tree parent_primary = CLASSTYPE_PRIMARY_BINFO (BINFO_TYPE (parent));
c8094d83 1302
fc6633e0 1303 if (parent_primary
539ed333
NS
1304 && SAME_BINFO_TYPE_P (BINFO_TYPE (base_binfo),
1305 BINFO_TYPE (parent_primary)))
fc6633e0
NS
1306 /* We are the primary binfo. */
1307 BINFO_PRIMARY_P (base_binfo) = 1;
1308 }
1309 /* Determine if we have a virtual primary base, and mark it so.
1310 */
1311 if (primary && BINFO_VIRTUAL_P (primary))
1312 {
1313 tree this_primary = copied_binfo (primary, base_binfo);
1314
1315 if (BINFO_PRIMARY_P (this_primary))
1316 /* Someone already claimed this base. */
1317 BINFO_LOST_PRIMARY_P (base_binfo) = 1;
1318 else
dbbf88d1 1319 {
fc6633e0 1320 tree delta;
c8094d83 1321
fc6633e0
NS
1322 BINFO_PRIMARY_P (this_primary) = 1;
1323 BINFO_INHERITANCE_CHAIN (this_primary) = base_binfo;
c8094d83 1324
fc6633e0 1325 /* A virtual binfo might have been copied from within
0cbd7506
MS
1326 another hierarchy. As we're about to use it as a
1327 primary base, make sure the offsets match. */
fc6633e0
NS
1328 delta = size_diffop (convert (ssizetype,
1329 BINFO_OFFSET (base_binfo)),
1330 convert (ssizetype,
1331 BINFO_OFFSET (this_primary)));
c8094d83 1332
fc6633e0 1333 propagate_binfo_offsets (this_primary, delta);
dbbf88d1
NS
1334 }
1335 }
c35cce41 1336 }
8026246f 1337
fc6633e0 1338 /* First look for a dynamic direct non-virtual base. */
fa743e8c 1339 for (i = 0; BINFO_BASE_ITERATE (type_binfo, i, base_binfo); i++)
607cf131 1340 {
607cf131 1341 tree basetype = BINFO_TYPE (base_binfo);
aff08c18 1342
fc6633e0 1343 if (TYPE_CONTAINS_VPTR_P (basetype) && !BINFO_VIRTUAL_P (base_binfo))
8d08fdba 1344 {
fc6633e0
NS
1345 primary = base_binfo;
1346 goto found;
911a71a7
MM
1347 }
1348 }
8026246f 1349
3461fba7 1350 /* A "nearly-empty" virtual base class can be the primary base
fc6633e0
NS
1351 class, if no non-virtual polymorphic base can be found. Look for
1352 a nearly-empty virtual dynamic base that is not already a primary
77880ae4 1353 base of something in the hierarchy. If there is no such base,
fc6633e0
NS
1354 just pick the first nearly-empty virtual base. */
1355
1356 for (base_binfo = TREE_CHAIN (type_binfo); base_binfo;
1357 base_binfo = TREE_CHAIN (base_binfo))
1358 if (BINFO_VIRTUAL_P (base_binfo)
1359 && CLASSTYPE_NEARLY_EMPTY_P (BINFO_TYPE (base_binfo)))
1360 {
1361 if (!BINFO_PRIMARY_P (base_binfo))
1362 {
1363 /* Found one that is not primary. */
1364 primary = base_binfo;
1365 goto found;
1366 }
1367 else if (!primary)
1368 /* Remember the first candidate. */
1369 primary = base_binfo;
1370 }
c8094d83 1371
fc6633e0
NS
1372 found:
1373 /* If we've got a primary base, use it. */
1374 if (primary)
7cafdb8b 1375 {
fc6633e0 1376 tree basetype = BINFO_TYPE (primary);
c8094d83 1377
fc6633e0
NS
1378 CLASSTYPE_PRIMARY_BINFO (t) = primary;
1379 if (BINFO_PRIMARY_P (primary))
1380 /* We are stealing a primary base. */
1381 BINFO_LOST_PRIMARY_P (BINFO_INHERITANCE_CHAIN (primary)) = 1;
1382 BINFO_PRIMARY_P (primary) = 1;
1383 if (BINFO_VIRTUAL_P (primary))
7cafdb8b 1384 {
fc6633e0 1385 tree delta;
7cafdb8b 1386
fc6633e0
NS
1387 BINFO_INHERITANCE_CHAIN (primary) = type_binfo;
1388 /* A virtual binfo might have been copied from within
0cbd7506
MS
1389 another hierarchy. As we're about to use it as a primary
1390 base, make sure the offsets match. */
fc6633e0
NS
1391 delta = size_diffop (ssize_int (0),
1392 convert (ssizetype, BINFO_OFFSET (primary)));
c8094d83 1393
fc6633e0 1394 propagate_binfo_offsets (primary, delta);
7cafdb8b 1395 }
c8094d83 1396
fc6633e0 1397 primary = TYPE_BINFO (basetype);
c8094d83 1398
fc6633e0
NS
1399 TYPE_VFIELD (t) = TYPE_VFIELD (basetype);
1400 BINFO_VTABLE (type_binfo) = BINFO_VTABLE (primary);
1401 BINFO_VIRTUALS (type_binfo) = BINFO_VIRTUALS (primary);
7cafdb8b 1402 }
8d08fdba 1403}
8d08fdba 1404\f
d2c5305b
MM
1405/* Set memoizing fields and bits of T (and its variants) for later
1406 use. */
e92cc029 1407
8d08fdba 1408static void
94edc4ab 1409finish_struct_bits (tree t)
8d08fdba 1410{
090ad434 1411 tree variants;
c8094d83 1412
8d08fdba 1413 /* Fix up variants (if any). */
090ad434
NS
1414 for (variants = TYPE_NEXT_VARIANT (t);
1415 variants;
1416 variants = TYPE_NEXT_VARIANT (variants))
8d08fdba
MS
1417 {
1418 /* These fields are in the _TYPE part of the node, not in
1419 the TYPE_LANG_SPECIFIC component, so they are not shared. */
1420 TYPE_HAS_CONSTRUCTOR (variants) = TYPE_HAS_CONSTRUCTOR (t);
8d08fdba 1421 TYPE_NEEDS_CONSTRUCTING (variants) = TYPE_NEEDS_CONSTRUCTING (t);
c8094d83 1422 TYPE_HAS_NONTRIVIAL_DESTRUCTOR (variants)
834c6dff 1423 = TYPE_HAS_NONTRIVIAL_DESTRUCTOR (t);
8d08fdba 1424
4c6b7393 1425 TYPE_POLYMORPHIC_P (variants) = TYPE_POLYMORPHIC_P (t);
c8094d83 1426
cad7e87b
NS
1427 TYPE_BINFO (variants) = TYPE_BINFO (t);
1428
8d08fdba 1429 /* Copy whatever these are holding today. */
eb34af89
RK
1430 TYPE_VFIELD (variants) = TYPE_VFIELD (t);
1431 TYPE_METHODS (variants) = TYPE_METHODS (t);
5566b478 1432 TYPE_FIELDS (variants) = TYPE_FIELDS (t);
e92cc029 1433 TYPE_SIZE (variants) = TYPE_SIZE (t);
509087ae 1434 TYPE_SIZE_UNIT (variants) = TYPE_SIZE_UNIT (t);
8d08fdba
MS
1435 }
1436
fa743e8c 1437 if (BINFO_N_BASE_BINFOS (TYPE_BINFO (t)) && TYPE_POLYMORPHIC_P (t))
16ae29f1
NS
1438 /* For a class w/o baseclasses, 'finish_struct' has set
1439 CLASSTYPE_PURE_VIRTUALS correctly (by definition).
132c7dd3
NS
1440 Similarly for a class whose base classes do not have vtables.
1441 When neither of these is true, we might have removed abstract
1442 virtuals (by providing a definition), added some (by declaring
1443 new ones), or redeclared ones from a base class. We need to
1444 recalculate what's really an abstract virtual at this point (by
1445 looking in the vtables). */
1446 get_pure_virtuals (t);
c8094d83 1447
132c7dd3
NS
1448 /* If this type has a copy constructor or a destructor, force its
1449 mode to be BLKmode, and force its TREE_ADDRESSABLE bit to be
1450 nonzero. This will cause it to be passed by invisible reference
1451 and prevent it from being returned in a register. */
8b16faa2 1452 if (! TYPE_HAS_TRIVIAL_INIT_REF (t) || TYPE_HAS_NONTRIVIAL_DESTRUCTOR (t))
8d08fdba 1453 {
e8abc66f 1454 tree variants;
d2e5ee5c 1455 DECL_MODE (TYPE_MAIN_DECL (t)) = BLKmode;
e8abc66f 1456 for (variants = t; variants; variants = TYPE_NEXT_VARIANT (variants))
8d08fdba
MS
1457 {
1458 TYPE_MODE (variants) = BLKmode;
1459 TREE_ADDRESSABLE (variants) = 1;
8d08fdba
MS
1460 }
1461 }
1462}
1463
b0e0b31f 1464/* Issue warnings about T having private constructors, but no friends,
c8094d83 1465 and so forth.
aed7b2a6 1466
b0e0b31f
MM
1467 HAS_NONPRIVATE_METHOD is nonzero if T has any non-private methods or
1468 static members. HAS_NONPRIVATE_STATIC_FN is nonzero if T has any
1469 non-private static member functions. */
1470
1471static void
94edc4ab 1472maybe_warn_about_overly_private_class (tree t)
aed7b2a6 1473{
056a3b12
MM
1474 int has_member_fn = 0;
1475 int has_nonprivate_method = 0;
1476 tree fn;
1477
1478 if (!warn_ctor_dtor_privacy
b0e0b31f
MM
1479 /* If the class has friends, those entities might create and
1480 access instances, so we should not warn. */
056a3b12
MM
1481 || (CLASSTYPE_FRIEND_CLASSES (t)
1482 || DECL_FRIENDLIST (TYPE_MAIN_DECL (t)))
b0e0b31f
MM
1483 /* We will have warned when the template was declared; there's
1484 no need to warn on every instantiation. */
056a3b12 1485 || CLASSTYPE_TEMPLATE_INSTANTIATION (t))
c8094d83 1486 /* There's no reason to even consider warning about this
056a3b12
MM
1487 class. */
1488 return;
c8094d83 1489
056a3b12
MM
1490 /* We only issue one warning, if more than one applies, because
1491 otherwise, on code like:
1492
1493 class A {
1494 // Oops - forgot `public:'
1495 A();
1496 A(const A&);
1497 ~A();
1498 };
1499
1500 we warn several times about essentially the same problem. */
1501
1502 /* Check to see if all (non-constructor, non-destructor) member
1503 functions are private. (Since there are no friends or
1504 non-private statics, we can't ever call any of the private member
1505 functions.) */
1506 for (fn = TYPE_METHODS (t); fn; fn = TREE_CHAIN (fn))
1507 /* We're not interested in compiler-generated methods; they don't
1508 provide any way to call private members. */
c8094d83 1509 if (!DECL_ARTIFICIAL (fn))
056a3b12
MM
1510 {
1511 if (!TREE_PRIVATE (fn))
b0e0b31f 1512 {
c8094d83 1513 if (DECL_STATIC_FUNCTION_P (fn))
056a3b12
MM
1514 /* A non-private static member function is just like a
1515 friend; it can create and invoke private member
1516 functions, and be accessed without a class
1517 instance. */
1518 return;
c8094d83 1519
056a3b12 1520 has_nonprivate_method = 1;
f576dfc4 1521 /* Keep searching for a static member function. */
056a3b12 1522 }
ce0a5952 1523 else if (!DECL_CONSTRUCTOR_P (fn) && !DECL_DESTRUCTOR_P (fn))
056a3b12 1524 has_member_fn = 1;
c8094d83 1525 }
aed7b2a6 1526
c8094d83 1527 if (!has_nonprivate_method && has_member_fn)
056a3b12 1528 {
ce0a5952
MM
1529 /* There are no non-private methods, and there's at least one
1530 private member function that isn't a constructor or
1531 destructor. (If all the private members are
1532 constructors/destructors we want to use the code below that
1533 issues error messages specifically referring to
1534 constructors/destructors.) */
fa743e8c 1535 unsigned i;
dbbf88d1 1536 tree binfo = TYPE_BINFO (t);
c8094d83 1537
fa743e8c 1538 for (i = 0; i != BINFO_N_BASE_BINFOS (binfo); i++)
604a3205 1539 if (BINFO_BASE_ACCESS (binfo, i) != access_private_node)
056a3b12
MM
1540 {
1541 has_nonprivate_method = 1;
1542 break;
1543 }
c8094d83 1544 if (!has_nonprivate_method)
b0e0b31f 1545 {
74fa0285
GDR
1546 warning (OPT_Wctor_dtor_privacy,
1547 "all member functions in class %qT are private", t);
056a3b12 1548 return;
b0e0b31f 1549 }
056a3b12 1550 }
aed7b2a6 1551
056a3b12
MM
1552 /* Even if some of the member functions are non-private, the class
1553 won't be useful for much if all the constructors or destructors
1554 are private: such an object can never be created or destroyed. */
9f4faeae
MM
1555 fn = CLASSTYPE_DESTRUCTORS (t);
1556 if (fn && TREE_PRIVATE (fn))
056a3b12 1557 {
74fa0285
GDR
1558 warning (OPT_Wctor_dtor_privacy,
1559 "%q#T only defines a private destructor and has no friends",
4b0d3cbe
MM
1560 t);
1561 return;
056a3b12 1562 }
b0e0b31f 1563
550d1bf4
MM
1564 if (TYPE_HAS_CONSTRUCTOR (t)
1565 /* Implicitly generated constructors are always public. */
1566 && (!CLASSTYPE_LAZY_DEFAULT_CTOR (t)
1567 || !CLASSTYPE_LAZY_COPY_CTOR (t)))
056a3b12
MM
1568 {
1569 int nonprivate_ctor = 0;
c8094d83 1570
056a3b12
MM
1571 /* If a non-template class does not define a copy
1572 constructor, one is defined for it, enabling it to avoid
1573 this warning. For a template class, this does not
1574 happen, and so we would normally get a warning on:
b0e0b31f 1575
c8094d83
MS
1576 template <class T> class C { private: C(); };
1577
056a3b12
MM
1578 To avoid this asymmetry, we check TYPE_HAS_INIT_REF. All
1579 complete non-template or fully instantiated classes have this
1580 flag set. */
1581 if (!TYPE_HAS_INIT_REF (t))
1582 nonprivate_ctor = 1;
c8094d83
MS
1583 else
1584 for (fn = CLASSTYPE_CONSTRUCTORS (t); fn; fn = OVL_NEXT (fn))
056a3b12
MM
1585 {
1586 tree ctor = OVL_CURRENT (fn);
1587 /* Ideally, we wouldn't count copy constructors (or, in
1588 fact, any constructor that takes an argument of the
1589 class type as a parameter) because such things cannot
1590 be used to construct an instance of the class unless
1591 you already have one. But, for now at least, we're
1592 more generous. */
1593 if (! TREE_PRIVATE (ctor))
b0e0b31f 1594 {
056a3b12
MM
1595 nonprivate_ctor = 1;
1596 break;
b0e0b31f 1597 }
056a3b12 1598 }
aed7b2a6 1599
056a3b12
MM
1600 if (nonprivate_ctor == 0)
1601 {
74fa0285
GDR
1602 warning (OPT_Wctor_dtor_privacy,
1603 "%q#T only defines private constructors and has no friends",
0cbd7506 1604 t);
056a3b12 1605 return;
b0e0b31f
MM
1606 }
1607 }
aed7b2a6
MM
1608}
1609
17211ab5
GK
1610static struct {
1611 gt_pointer_operator new_value;
1612 void *cookie;
1613} resort_data;
1614
f90cdf34
MT
1615/* Comparison function to compare two TYPE_METHOD_VEC entries by name. */
1616
1617static int
94edc4ab 1618method_name_cmp (const void* m1_p, const void* m2_p)
f90cdf34 1619{
67f5655f
GDR
1620 const tree *const m1 = (const tree *) m1_p;
1621 const tree *const m2 = (const tree *) m2_p;
c8094d83 1622
f90cdf34
MT
1623 if (*m1 == NULL_TREE && *m2 == NULL_TREE)
1624 return 0;
1625 if (*m1 == NULL_TREE)
1626 return -1;
1627 if (*m2 == NULL_TREE)
1628 return 1;
1629 if (DECL_NAME (OVL_CURRENT (*m1)) < DECL_NAME (OVL_CURRENT (*m2)))
1630 return -1;
1631 return 1;
1632}
b0e0b31f 1633
17211ab5
GK
1634/* This routine compares two fields like method_name_cmp but using the
1635 pointer operator in resort_field_decl_data. */
1636
1637static int
94edc4ab 1638resort_method_name_cmp (const void* m1_p, const void* m2_p)
17211ab5 1639{
67f5655f
GDR
1640 const tree *const m1 = (const tree *) m1_p;
1641 const tree *const m2 = (const tree *) m2_p;
17211ab5
GK
1642 if (*m1 == NULL_TREE && *m2 == NULL_TREE)
1643 return 0;
1644 if (*m1 == NULL_TREE)
1645 return -1;
1646 if (*m2 == NULL_TREE)
1647 return 1;
1648 {
1649 tree d1 = DECL_NAME (OVL_CURRENT (*m1));
1650 tree d2 = DECL_NAME (OVL_CURRENT (*m2));
1651 resort_data.new_value (&d1, resort_data.cookie);
1652 resort_data.new_value (&d2, resort_data.cookie);
1653 if (d1 < d2)
1654 return -1;
1655 }
1656 return 1;
1657}
1658
1659/* Resort TYPE_METHOD_VEC because pointers have been reordered. */
1660
c8094d83 1661void
94edc4ab 1662resort_type_method_vec (void* obj,
0cbd7506
MS
1663 void* orig_obj ATTRIBUTE_UNUSED ,
1664 gt_pointer_operator new_value,
1665 void* cookie)
17211ab5 1666{
d4e6fecb 1667 VEC(tree,gc) *method_vec = (VEC(tree,gc) *) obj;
aaaa46d2
MM
1668 int len = VEC_length (tree, method_vec);
1669 size_t slot;
1670 tree fn;
17211ab5
GK
1671
1672 /* The type conversion ops have to live at the front of the vec, so we
1673 can't sort them. */
aaaa46d2 1674 for (slot = CLASSTYPE_FIRST_CONVERSION_SLOT;
9ba5ff0f 1675 VEC_iterate (tree, method_vec, slot, fn);
aaaa46d2
MM
1676 ++slot)
1677 if (!DECL_CONV_FN_P (OVL_CURRENT (fn)))
1678 break;
1679
17211ab5
GK
1680 if (len - slot > 1)
1681 {
1682 resort_data.new_value = new_value;
1683 resort_data.cookie = cookie;
aaaa46d2 1684 qsort (VEC_address (tree, method_vec) + slot, len - slot, sizeof (tree),
17211ab5
GK
1685 resort_method_name_cmp);
1686 }
1687}
1688
c7222c02 1689/* Warn about duplicate methods in fn_fields.
8d08fdba 1690
5b0cec3b
MM
1691 Sort methods that are not special (i.e., constructors, destructors,
1692 and type conversion operators) so that we can find them faster in
1693 search. */
8d08fdba 1694
b0e0b31f 1695static void
94edc4ab 1696finish_struct_methods (tree t)
8d08fdba 1697{
b0e0b31f 1698 tree fn_fields;
d4e6fecb 1699 VEC(tree,gc) *method_vec;
58010b57
MM
1700 int slot, len;
1701
58010b57 1702 method_vec = CLASSTYPE_METHOD_VEC (t);
508a1c9c
MM
1703 if (!method_vec)
1704 return;
1705
aaaa46d2 1706 len = VEC_length (tree, method_vec);
8d08fdba 1707
c7222c02 1708 /* Clear DECL_IN_AGGR_P for all functions. */
c8094d83 1709 for (fn_fields = TYPE_METHODS (t); fn_fields;
b0e0b31f 1710 fn_fields = TREE_CHAIN (fn_fields))
5b0cec3b 1711 DECL_IN_AGGR_P (fn_fields) = 0;
8d08fdba 1712
b0e0b31f
MM
1713 /* Issue warnings about private constructors and such. If there are
1714 no methods, then some public defaults are generated. */
f90cdf34
MT
1715 maybe_warn_about_overly_private_class (t);
1716
f90cdf34
MT
1717 /* The type conversion ops have to live at the front of the vec, so we
1718 can't sort them. */
9ba5ff0f
NS
1719 for (slot = CLASSTYPE_FIRST_CONVERSION_SLOT;
1720 VEC_iterate (tree, method_vec, slot, fn_fields);
aaaa46d2
MM
1721 ++slot)
1722 if (!DECL_CONV_FN_P (OVL_CURRENT (fn_fields)))
1723 break;
f90cdf34 1724 if (len - slot > 1)
aaaa46d2
MM
1725 qsort (VEC_address (tree, method_vec) + slot,
1726 len-slot, sizeof (tree), method_name_cmp);
8d08fdba
MS
1727}
1728
90ecce3e 1729/* Make BINFO's vtable have N entries, including RTTI entries,
8d7a5379
MM
1730 vbase and vcall offsets, etc. Set its type and call the backend
1731 to lay it out. */
1a588ad7
MM
1732
1733static void
94edc4ab 1734layout_vtable_decl (tree binfo, int n)
1a588ad7 1735{
1a588ad7 1736 tree atype;
c35cce41 1737 tree vtable;
1a588ad7 1738
c8094d83 1739 atype = build_cplus_array_type (vtable_entry_type,
442e01b6 1740 build_index_type (size_int (n - 1)));
1a588ad7
MM
1741 layout_type (atype);
1742
1743 /* We may have to grow the vtable. */
c35cce41
MM
1744 vtable = get_vtbl_decl_for_binfo (binfo);
1745 if (!same_type_p (TREE_TYPE (vtable), atype))
1a588ad7 1746 {
06ceef4e 1747 TREE_TYPE (vtable) = atype;
c35cce41 1748 DECL_SIZE (vtable) = DECL_SIZE_UNIT (vtable) = NULL_TREE;
06ceef4e 1749 layout_decl (vtable, 0);
1a588ad7
MM
1750 }
1751}
1752
9bab6c90
MM
1753/* True iff FNDECL and BASE_FNDECL (both non-static member functions)
1754 have the same signature. */
83f2ccf4 1755
e0fff4b3 1756int
94edc4ab 1757same_signature_p (tree fndecl, tree base_fndecl)
83f2ccf4 1758{
872f37f9
MM
1759 /* One destructor overrides another if they are the same kind of
1760 destructor. */
1761 if (DECL_DESTRUCTOR_P (base_fndecl) && DECL_DESTRUCTOR_P (fndecl)
1762 && special_function_p (base_fndecl) == special_function_p (fndecl))
ca36f057 1763 return 1;
872f37f9
MM
1764 /* But a non-destructor never overrides a destructor, nor vice
1765 versa, nor do different kinds of destructors override
1766 one-another. For example, a complete object destructor does not
1767 override a deleting destructor. */
0d9eb3ba 1768 if (DECL_DESTRUCTOR_P (base_fndecl) || DECL_DESTRUCTOR_P (fndecl))
ca36f057 1769 return 0;
872f37f9 1770
a6c0d772
MM
1771 if (DECL_NAME (fndecl) == DECL_NAME (base_fndecl)
1772 || (DECL_CONV_FN_P (fndecl)
1773 && DECL_CONV_FN_P (base_fndecl)
1774 && same_type_p (DECL_CONV_FN_TYPE (fndecl),
1775 DECL_CONV_FN_TYPE (base_fndecl))))
83f2ccf4 1776 {
ca36f057 1777 tree types, base_types;
ca36f057
MM
1778 types = TYPE_ARG_TYPES (TREE_TYPE (fndecl));
1779 base_types = TYPE_ARG_TYPES (TREE_TYPE (base_fndecl));
1780 if ((TYPE_QUALS (TREE_TYPE (TREE_VALUE (base_types)))
1781 == TYPE_QUALS (TREE_TYPE (TREE_VALUE (types))))
1782 && compparms (TREE_CHAIN (base_types), TREE_CHAIN (types)))
1783 return 1;
83f2ccf4 1784 }
ca36f057 1785 return 0;
83f2ccf4
MM
1786}
1787
9368208b
MM
1788/* Returns TRUE if DERIVED is a binfo containing the binfo BASE as a
1789 subobject. */
c8094d83 1790
9368208b
MM
1791static bool
1792base_derived_from (tree derived, tree base)
1793{
dbbf88d1
NS
1794 tree probe;
1795
1796 for (probe = base; probe; probe = BINFO_INHERITANCE_CHAIN (probe))
1797 {
1798 if (probe == derived)
1799 return true;
809e3e7f 1800 else if (BINFO_VIRTUAL_P (probe))
dbbf88d1
NS
1801 /* If we meet a virtual base, we can't follow the inheritance
1802 any more. See if the complete type of DERIVED contains
1803 such a virtual base. */
58c42dc2
NS
1804 return (binfo_for_vbase (BINFO_TYPE (probe), BINFO_TYPE (derived))
1805 != NULL_TREE);
dbbf88d1
NS
1806 }
1807 return false;
9368208b
MM
1808}
1809
ca36f057
MM
1810typedef struct find_final_overrider_data_s {
1811 /* The function for which we are trying to find a final overrider. */
1812 tree fn;
1813 /* The base class in which the function was declared. */
1814 tree declaring_base;
9368208b 1815 /* The candidate overriders. */
78b45a24 1816 tree candidates;
5d5a519f 1817 /* Path to most derived. */
d4e6fecb 1818 VEC(tree,heap) *path;
ca36f057 1819} find_final_overrider_data;
8d7a5379 1820
f7a8132a
MM
1821/* Add the overrider along the current path to FFOD->CANDIDATES.
1822 Returns true if an overrider was found; false otherwise. */
8d7a5379 1823
f7a8132a 1824static bool
c8094d83 1825dfs_find_final_overrider_1 (tree binfo,
5d5a519f
NS
1826 find_final_overrider_data *ffod,
1827 unsigned depth)
7177d104 1828{
741d8ca3
MM
1829 tree method;
1830
f7a8132a
MM
1831 /* If BINFO is not the most derived type, try a more derived class.
1832 A definition there will overrider a definition here. */
5d5a519f 1833 if (depth)
dbbf88d1 1834 {
5d5a519f
NS
1835 depth--;
1836 if (dfs_find_final_overrider_1
1837 (VEC_index (tree, ffod->path, depth), ffod, depth))
f7a8132a
MM
1838 return true;
1839 }
dbbf88d1 1840
741d8ca3 1841 method = look_for_overrides_here (BINFO_TYPE (binfo), ffod->fn);
f7a8132a
MM
1842 if (method)
1843 {
1844 tree *candidate = &ffod->candidates;
c8094d83 1845
f7a8132a
MM
1846 /* Remove any candidates overridden by this new function. */
1847 while (*candidate)
8d7a5379 1848 {
f7a8132a
MM
1849 /* If *CANDIDATE overrides METHOD, then METHOD
1850 cannot override anything else on the list. */
1851 if (base_derived_from (TREE_VALUE (*candidate), binfo))
1852 return true;
1853 /* If METHOD overrides *CANDIDATE, remove *CANDIDATE. */
1854 if (base_derived_from (binfo, TREE_VALUE (*candidate)))
1855 *candidate = TREE_CHAIN (*candidate);
dbbf88d1 1856 else
f7a8132a 1857 candidate = &TREE_CHAIN (*candidate);
5e19c053 1858 }
c8094d83 1859
f7a8132a
MM
1860 /* Add the new function. */
1861 ffod->candidates = tree_cons (method, binfo, ffod->candidates);
1862 return true;
dbbf88d1 1863 }
5e19c053 1864
f7a8132a
MM
1865 return false;
1866}
1867
1868/* Called from find_final_overrider via dfs_walk. */
1869
1870static tree
5d5a519f 1871dfs_find_final_overrider_pre (tree binfo, void *data)
f7a8132a
MM
1872{
1873 find_final_overrider_data *ffod = (find_final_overrider_data *) data;
1874
1875 if (binfo == ffod->declaring_base)
5d5a519f 1876 dfs_find_final_overrider_1 (binfo, ffod, VEC_length (tree, ffod->path));
d4e6fecb 1877 VEC_safe_push (tree, heap, ffod->path, binfo);
f7a8132a 1878
dbbf88d1
NS
1879 return NULL_TREE;
1880}
db3d8cde 1881
dbbf88d1 1882static tree
5d5a519f 1883dfs_find_final_overrider_post (tree binfo ATTRIBUTE_UNUSED, void *data)
dbbf88d1 1884{
dbbf88d1 1885 find_final_overrider_data *ffod = (find_final_overrider_data *) data;
5d5a519f 1886 VEC_pop (tree, ffod->path);
78b45a24 1887
dd42e135
MM
1888 return NULL_TREE;
1889}
1890
5e19c053
MM
1891/* Returns a TREE_LIST whose TREE_PURPOSE is the final overrider for
1892 FN and whose TREE_VALUE is the binfo for the base where the
95675950
MM
1893 overriding occurs. BINFO (in the hierarchy dominated by the binfo
1894 DERIVED) is the base object in which FN is declared. */
e92cc029 1895
a292b002 1896static tree
94edc4ab 1897find_final_overrider (tree derived, tree binfo, tree fn)
a292b002 1898{
5e19c053 1899 find_final_overrider_data ffod;
a292b002 1900
0e339752 1901 /* Getting this right is a little tricky. This is valid:
a292b002 1902
5e19c053
MM
1903 struct S { virtual void f (); };
1904 struct T { virtual void f (); };
1905 struct U : public S, public T { };
a292b002 1906
c8094d83 1907 even though calling `f' in `U' is ambiguous. But,
a292b002 1908
5e19c053
MM
1909 struct R { virtual void f(); };
1910 struct S : virtual public R { virtual void f (); };
1911 struct T : virtual public R { virtual void f (); };
1912 struct U : public S, public T { };
dd42e135 1913
d0cd8b44 1914 is not -- there's no way to decide whether to put `S::f' or
c8094d83
MS
1915 `T::f' in the vtable for `R'.
1916
5e19c053
MM
1917 The solution is to look at all paths to BINFO. If we find
1918 different overriders along any two, then there is a problem. */
07fa4878
NS
1919 if (DECL_THUNK_P (fn))
1920 fn = THUNK_TARGET (fn);
f7a8132a
MM
1921
1922 /* Determine the depth of the hierarchy. */
5e19c053
MM
1923 ffod.fn = fn;
1924 ffod.declaring_base = binfo;
78b45a24 1925 ffod.candidates = NULL_TREE;
d4e6fecb 1926 ffod.path = VEC_alloc (tree, heap, 30);
5e19c053 1927
5d5a519f
NS
1928 dfs_walk_all (derived, dfs_find_final_overrider_pre,
1929 dfs_find_final_overrider_post, &ffod);
f7a8132a 1930
d4e6fecb 1931 VEC_free (tree, heap, ffod.path);
c8094d83 1932
78b45a24 1933 /* If there was no winner, issue an error message. */
9368208b 1934 if (!ffod.candidates || TREE_CHAIN (ffod.candidates))
16a1369e 1935 return error_mark_node;
dd42e135 1936
9368208b 1937 return ffod.candidates;
a292b002
MS
1938}
1939
548502d3
MM
1940/* Return the index of the vcall offset for FN when TYPE is used as a
1941 virtual base. */
d0cd8b44 1942
d0cd8b44 1943static tree
548502d3 1944get_vcall_index (tree fn, tree type)
d0cd8b44 1945{
d4e6fecb 1946 VEC(tree_pair_s,gc) *indices = CLASSTYPE_VCALL_INDICES (type);
0871761b
NS
1947 tree_pair_p p;
1948 unsigned ix;
d0cd8b44 1949
0871761b
NS
1950 for (ix = 0; VEC_iterate (tree_pair_s, indices, ix, p); ix++)
1951 if ((DECL_DESTRUCTOR_P (fn) && DECL_DESTRUCTOR_P (p->purpose))
1952 || same_signature_p (fn, p->purpose))
1953 return p->value;
548502d3
MM
1954
1955 /* There should always be an appropriate index. */
8dc2b103 1956 gcc_unreachable ();
d0cd8b44 1957}
d0cd8b44
JM
1958
1959/* Update an entry in the vtable for BINFO, which is in the hierarchy
4639c5c6 1960 dominated by T. FN has been overridden in BINFO; VIRTUALS points to the
d0cd8b44 1961 corresponding position in the BINFO_VIRTUALS list. */
4e7512c9
MM
1962
1963static void
a2ddc397
NS
1964update_vtable_entry_for_fn (tree t, tree binfo, tree fn, tree* virtuals,
1965 unsigned ix)
4e7512c9
MM
1966{
1967 tree b;
1968 tree overrider;
4e7512c9 1969 tree delta;
31f8e4f3 1970 tree virtual_base;
d0cd8b44 1971 tree first_defn;
3cfabe60
NS
1972 tree overrider_fn, overrider_target;
1973 tree target_fn = DECL_THUNK_P (fn) ? THUNK_TARGET (fn) : fn;
1974 tree over_return, base_return;
f11ee281 1975 bool lost = false;
4e7512c9 1976
d0cd8b44
JM
1977 /* Find the nearest primary base (possibly binfo itself) which defines
1978 this function; this is the class the caller will convert to when
1979 calling FN through BINFO. */
1980 for (b = binfo; ; b = get_primary_binfo (b))
4e7512c9 1981 {
50bc768d 1982 gcc_assert (b);
3cfabe60 1983 if (look_for_overrides_here (BINFO_TYPE (b), target_fn))
31f8e4f3 1984 break;
f11ee281
JM
1985
1986 /* The nearest definition is from a lost primary. */
1987 if (BINFO_LOST_PRIMARY_P (b))
1988 lost = true;
4e7512c9 1989 }
d0cd8b44 1990 first_defn = b;
4e7512c9 1991
31f8e4f3 1992 /* Find the final overrider. */
3cfabe60 1993 overrider = find_final_overrider (TYPE_BINFO (t), b, target_fn);
4e7512c9 1994 if (overrider == error_mark_node)
16a1369e
JJ
1995 {
1996 error ("no unique final overrider for %qD in %qT", target_fn, t);
1997 return;
1998 }
3cfabe60 1999 overrider_target = overrider_fn = TREE_PURPOSE (overrider);
c8094d83 2000
9bcb9aae 2001 /* Check for adjusting covariant return types. */
3cfabe60
NS
2002 over_return = TREE_TYPE (TREE_TYPE (overrider_target));
2003 base_return = TREE_TYPE (TREE_TYPE (target_fn));
c8094d83 2004
3cfabe60
NS
2005 if (POINTER_TYPE_P (over_return)
2006 && TREE_CODE (over_return) == TREE_CODE (base_return)
2007 && CLASS_TYPE_P (TREE_TYPE (over_return))
b77fe7b4
NS
2008 && CLASS_TYPE_P (TREE_TYPE (base_return))
2009 /* If the overrider is invalid, don't even try. */
2010 && !DECL_INVALID_OVERRIDER_P (overrider_target))
3cfabe60
NS
2011 {
2012 /* If FN is a covariant thunk, we must figure out the adjustment
0cbd7506
MS
2013 to the final base FN was converting to. As OVERRIDER_TARGET might
2014 also be converting to the return type of FN, we have to
2015 combine the two conversions here. */
3cfabe60 2016 tree fixed_offset, virtual_offset;
12a669d1
NS
2017
2018 over_return = TREE_TYPE (over_return);
2019 base_return = TREE_TYPE (base_return);
c8094d83 2020
3cfabe60
NS
2021 if (DECL_THUNK_P (fn))
2022 {
50bc768d 2023 gcc_assert (DECL_RESULT_THUNK_P (fn));
3cfabe60
NS
2024 fixed_offset = ssize_int (THUNK_FIXED_OFFSET (fn));
2025 virtual_offset = THUNK_VIRTUAL_OFFSET (fn);
3cfabe60
NS
2026 }
2027 else
2028 fixed_offset = virtual_offset = NULL_TREE;
4977bab6 2029
e00853fd
NS
2030 if (virtual_offset)
2031 /* Find the equivalent binfo within the return type of the
2032 overriding function. We will want the vbase offset from
2033 there. */
58c42dc2 2034 virtual_offset = binfo_for_vbase (BINFO_TYPE (virtual_offset),
12a669d1
NS
2035 over_return);
2036 else if (!same_type_ignoring_top_level_qualifiers_p
2037 (over_return, base_return))
3cfabe60
NS
2038 {
2039 /* There was no existing virtual thunk (which takes
12a669d1
NS
2040 precedence). So find the binfo of the base function's
2041 return type within the overriding function's return type.
2042 We cannot call lookup base here, because we're inside a
2043 dfs_walk, and will therefore clobber the BINFO_MARKED
2044 flags. Fortunately we know the covariancy is valid (it
2045 has already been checked), so we can just iterate along
2046 the binfos, which have been chained in inheritance graph
2047 order. Of course it is lame that we have to repeat the
2048 search here anyway -- we should really be caching pieces
2049 of the vtable and avoiding this repeated work. */
2050 tree thunk_binfo, base_binfo;
2051
2052 /* Find the base binfo within the overriding function's
742f25b3
NS
2053 return type. We will always find a thunk_binfo, except
2054 when the covariancy is invalid (which we will have
2055 already diagnosed). */
12a669d1
NS
2056 for (base_binfo = TYPE_BINFO (base_return),
2057 thunk_binfo = TYPE_BINFO (over_return);
742f25b3 2058 thunk_binfo;
12a669d1 2059 thunk_binfo = TREE_CHAIN (thunk_binfo))
742f25b3
NS
2060 if (SAME_BINFO_TYPE_P (BINFO_TYPE (thunk_binfo),
2061 BINFO_TYPE (base_binfo)))
2062 break;
c8094d83 2063
12a669d1
NS
2064 /* See if virtual inheritance is involved. */
2065 for (virtual_offset = thunk_binfo;
2066 virtual_offset;
2067 virtual_offset = BINFO_INHERITANCE_CHAIN (virtual_offset))
2068 if (BINFO_VIRTUAL_P (virtual_offset))
2069 break;
c8094d83 2070
742f25b3
NS
2071 if (virtual_offset
2072 || (thunk_binfo && !BINFO_OFFSET_ZEROP (thunk_binfo)))
3cfabe60 2073 {
bb885938 2074 tree offset = convert (ssizetype, BINFO_OFFSET (thunk_binfo));
8d1f0f67 2075
12a669d1 2076 if (virtual_offset)
3cfabe60 2077 {
12a669d1
NS
2078 /* We convert via virtual base. Adjust the fixed
2079 offset to be from there. */
bb885938
NS
2080 offset = size_diffop
2081 (offset, convert
2082 (ssizetype, BINFO_OFFSET (virtual_offset)));
3cfabe60
NS
2083 }
2084 if (fixed_offset)
2085 /* There was an existing fixed offset, this must be
2086 from the base just converted to, and the base the
2087 FN was thunking to. */
2088 fixed_offset = size_binop (PLUS_EXPR, fixed_offset, offset);
2089 else
2090 fixed_offset = offset;
2091 }
2092 }
c8094d83 2093
3cfabe60
NS
2094 if (fixed_offset || virtual_offset)
2095 /* Replace the overriding function with a covariant thunk. We
2096 will emit the overriding function in its own slot as
9bcb9aae 2097 well. */
3cfabe60
NS
2098 overrider_fn = make_thunk (overrider_target, /*this_adjusting=*/0,
2099 fixed_offset, virtual_offset);
2100 }
2101 else
50bc768d 2102 gcc_assert (!DECL_THUNK_P (fn));
c8094d83 2103
31f8e4f3
MM
2104 /* Assume that we will produce a thunk that convert all the way to
2105 the final overrider, and not to an intermediate virtual base. */
9ccf6541 2106 virtual_base = NULL_TREE;
31f8e4f3 2107
f11ee281 2108 /* See if we can convert to an intermediate virtual base first, and then
3461fba7 2109 use the vcall offset located there to finish the conversion. */
f11ee281 2110 for (; b; b = BINFO_INHERITANCE_CHAIN (b))
4e7512c9 2111 {
d0cd8b44
JM
2112 /* If we find the final overrider, then we can stop
2113 walking. */
539ed333
NS
2114 if (SAME_BINFO_TYPE_P (BINFO_TYPE (b),
2115 BINFO_TYPE (TREE_VALUE (overrider))))
1f84ec23 2116 break;
31f8e4f3 2117
d0cd8b44
JM
2118 /* If we find a virtual base, and we haven't yet found the
2119 overrider, then there is a virtual base between the
2120 declaring base (first_defn) and the final overrider. */
809e3e7f 2121 if (BINFO_VIRTUAL_P (b))
dbbf88d1
NS
2122 {
2123 virtual_base = b;
2124 break;
2125 }
4e7512c9 2126 }
4e7512c9 2127
a2ddc397
NS
2128 if (overrider_fn != overrider_target && !virtual_base)
2129 {
2130 /* The ABI specifies that a covariant thunk includes a mangling
0cbd7506
MS
2131 for a this pointer adjustment. This-adjusting thunks that
2132 override a function from a virtual base have a vcall
2133 adjustment. When the virtual base in question is a primary
2134 virtual base, we know the adjustments are zero, (and in the
2135 non-covariant case, we would not use the thunk).
2136 Unfortunately we didn't notice this could happen, when
2137 designing the ABI and so never mandated that such a covariant
2138 thunk should be emitted. Because we must use the ABI mandated
2139 name, we must continue searching from the binfo where we
2140 found the most recent definition of the function, towards the
2141 primary binfo which first introduced the function into the
2142 vtable. If that enters a virtual base, we must use a vcall
2143 this-adjusting thunk. Bleah! */
bb885938
NS
2144 tree probe = first_defn;
2145
2146 while ((probe = get_primary_binfo (probe))
2147 && (unsigned) list_length (BINFO_VIRTUALS (probe)) > ix)
809e3e7f 2148 if (BINFO_VIRTUAL_P (probe))
bb885938 2149 virtual_base = probe;
c8094d83 2150
a2ddc397
NS
2151 if (virtual_base)
2152 /* Even if we find a virtual base, the correct delta is
2153 between the overrider and the binfo we're building a vtable
2154 for. */
2155 goto virtual_covariant;
2156 }
c8094d83 2157
d0cd8b44
JM
2158 /* Compute the constant adjustment to the `this' pointer. The
2159 `this' pointer, when this function is called, will point at BINFO
2160 (or one of its primary bases, which are at the same offset). */
31f8e4f3 2161 if (virtual_base)
20dde49d
NS
2162 /* The `this' pointer needs to be adjusted from the declaration to
2163 the nearest virtual base. */
bb885938
NS
2164 delta = size_diffop (convert (ssizetype, BINFO_OFFSET (virtual_base)),
2165 convert (ssizetype, BINFO_OFFSET (first_defn)));
f11ee281
JM
2166 else if (lost)
2167 /* If the nearest definition is in a lost primary, we don't need an
2168 entry in our vtable. Except possibly in a constructor vtable,
2169 if we happen to get our primary back. In that case, the offset
2170 will be zero, as it will be a primary base. */
2171 delta = size_zero_node;
4e7512c9 2172 else
548502d3
MM
2173 /* The `this' pointer needs to be adjusted from pointing to
2174 BINFO to pointing at the base where the final overrider
2175 appears. */
a2ddc397 2176 virtual_covariant:
bb885938
NS
2177 delta = size_diffop (convert (ssizetype,
2178 BINFO_OFFSET (TREE_VALUE (overrider))),
2179 convert (ssizetype, BINFO_OFFSET (binfo)));
4e7512c9 2180
3cfabe60 2181 modify_vtable_entry (t, binfo, overrider_fn, delta, virtuals);
31f8e4f3
MM
2182
2183 if (virtual_base)
c8094d83 2184 BV_VCALL_INDEX (*virtuals)
3cfabe60 2185 = get_vcall_index (overrider_target, BINFO_TYPE (virtual_base));
d1f05f93
NS
2186 else
2187 BV_VCALL_INDEX (*virtuals) = NULL_TREE;
4e7512c9
MM
2188}
2189
8026246f 2190/* Called from modify_all_vtables via dfs_walk. */
e92cc029 2191
8026246f 2192static tree
94edc4ab 2193dfs_modify_vtables (tree binfo, void* data)
8026246f 2194{
bcb1079e 2195 tree t = (tree) data;
5b94d9dd
NS
2196 tree virtuals;
2197 tree old_virtuals;
2198 unsigned ix;
2199
2200 if (!TYPE_CONTAINS_VPTR_P (BINFO_TYPE (binfo)))
2201 /* A base without a vtable needs no modification, and its bases
2202 are uninteresting. */
2203 return dfs_skip_bases;
c8094d83 2204
5b94d9dd
NS
2205 if (SAME_BINFO_TYPE_P (BINFO_TYPE (binfo), t)
2206 && !CLASSTYPE_HAS_PRIMARY_BASE_P (t))
2207 /* Don't do the primary vtable, if it's new. */
2208 return NULL_TREE;
2209
2210 if (BINFO_PRIMARY_P (binfo) && !BINFO_VIRTUAL_P (binfo))
2211 /* There's no need to modify the vtable for a non-virtual primary
2212 base; we're not going to use that vtable anyhow. We do still
2213 need to do this for virtual primary bases, as they could become
2214 non-primary in a construction vtable. */
2215 return NULL_TREE;
2216
2217 make_new_vtable (t, binfo);
c8094d83 2218
5b94d9dd
NS
2219 /* Now, go through each of the virtual functions in the virtual
2220 function table for BINFO. Find the final overrider, and update
2221 the BINFO_VIRTUALS list appropriately. */
2222 for (ix = 0, virtuals = BINFO_VIRTUALS (binfo),
2223 old_virtuals = BINFO_VIRTUALS (TYPE_BINFO (BINFO_TYPE (binfo)));
2224 virtuals;
2225 ix++, virtuals = TREE_CHAIN (virtuals),
2226 old_virtuals = TREE_CHAIN (old_virtuals))
c8094d83
MS
2227 update_vtable_entry_for_fn (t,
2228 binfo,
5b94d9dd
NS
2229 BV_FN (old_virtuals),
2230 &virtuals, ix);
8026246f 2231
8026246f
MM
2232 return NULL_TREE;
2233}
2234
a68ad5bd
MM
2235/* Update all of the primary and secondary vtables for T. Create new
2236 vtables as required, and initialize their RTTI information. Each
e6858a84
NS
2237 of the functions in VIRTUALS is declared in T and may override a
2238 virtual function from a base class; find and modify the appropriate
2239 entries to point to the overriding functions. Returns a list, in
2240 declaration order, of the virtual functions that are declared in T,
2241 but do not appear in the primary base class vtable, and which
2242 should therefore be appended to the end of the vtable for T. */
a68ad5bd
MM
2243
2244static tree
94edc4ab 2245modify_all_vtables (tree t, tree virtuals)
8026246f 2246{
3461fba7
NS
2247 tree binfo = TYPE_BINFO (t);
2248 tree *fnsp;
a68ad5bd 2249
5e19c053 2250 /* Update all of the vtables. */
5b94d9dd 2251 dfs_walk_once (binfo, dfs_modify_vtables, NULL, t);
a68ad5bd 2252
e6858a84
NS
2253 /* Add virtual functions not already in our primary vtable. These
2254 will be both those introduced by this class, and those overridden
2255 from secondary bases. It does not include virtuals merely
2256 inherited from secondary bases. */
2257 for (fnsp = &virtuals; *fnsp; )
a68ad5bd 2258 {
3461fba7 2259 tree fn = TREE_VALUE (*fnsp);
a68ad5bd 2260
e6858a84
NS
2261 if (!value_member (fn, BINFO_VIRTUALS (binfo))
2262 || DECL_VINDEX (fn) == error_mark_node)
a68ad5bd 2263 {
3461fba7
NS
2264 /* We don't need to adjust the `this' pointer when
2265 calling this function. */
2266 BV_DELTA (*fnsp) = integer_zero_node;
2267 BV_VCALL_INDEX (*fnsp) = NULL_TREE;
2268
e6858a84 2269 /* This is a function not already in our vtable. Keep it. */
3461fba7 2270 fnsp = &TREE_CHAIN (*fnsp);
a68ad5bd 2271 }
3461fba7
NS
2272 else
2273 /* We've already got an entry for this function. Skip it. */
2274 *fnsp = TREE_CHAIN (*fnsp);
a68ad5bd 2275 }
e93ee644 2276
e6858a84 2277 return virtuals;
7177d104
MS
2278}
2279
7d5b8b11
MM
2280/* Get the base virtual function declarations in T that have the
2281 indicated NAME. */
e92cc029 2282
5ddc28a5 2283static tree
94edc4ab 2284get_basefndecls (tree name, tree t)
9e9ff709 2285{
7d5b8b11 2286 tree methods;
9e9ff709 2287 tree base_fndecls = NULL_TREE;
604a3205 2288 int n_baseclasses = BINFO_N_BASE_BINFOS (TYPE_BINFO (t));
7d5b8b11 2289 int i;
9e9ff709 2290
3d1df1fa
MM
2291 /* Find virtual functions in T with the indicated NAME. */
2292 i = lookup_fnfields_1 (t, name);
2293 if (i != -1)
aaaa46d2 2294 for (methods = VEC_index (tree, CLASSTYPE_METHOD_VEC (t), i);
3d1df1fa
MM
2295 methods;
2296 methods = OVL_NEXT (methods))
2297 {
2298 tree method = OVL_CURRENT (methods);
2299
2300 if (TREE_CODE (method) == FUNCTION_DECL
2301 && DECL_VINDEX (method))
2302 base_fndecls = tree_cons (NULL_TREE, method, base_fndecls);
2303 }
9e9ff709
MS
2304
2305 if (base_fndecls)
2306 return base_fndecls;
2307
2308 for (i = 0; i < n_baseclasses; i++)
2309 {
604a3205 2310 tree basetype = BINFO_TYPE (BINFO_BASE_BINFO (TYPE_BINFO (t), i));
7d5b8b11 2311 base_fndecls = chainon (get_basefndecls (name, basetype),
9e9ff709
MS
2312 base_fndecls);
2313 }
2314
2315 return base_fndecls;
2316}
2317
2ee887f2
MS
2318/* If this declaration supersedes the declaration of
2319 a method declared virtual in the base class, then
2320 mark this field as being virtual as well. */
2321
9f4faeae 2322void
94edc4ab 2323check_for_override (tree decl, tree ctype)
2ee887f2 2324{
cbb40945
NS
2325 if (TREE_CODE (decl) == TEMPLATE_DECL)
2326 /* In [temp.mem] we have:
2ee887f2 2327
0cbd7506
MS
2328 A specialization of a member function template does not
2329 override a virtual function from a base class. */
cbb40945
NS
2330 return;
2331 if ((DECL_DESTRUCTOR_P (decl)
a6c0d772
MM
2332 || IDENTIFIER_VIRTUAL_P (DECL_NAME (decl))
2333 || DECL_CONV_FN_P (decl))
cbb40945
NS
2334 && look_for_overrides (ctype, decl)
2335 && !DECL_STATIC_FUNCTION_P (decl))
e6858a84
NS
2336 /* Set DECL_VINDEX to a value that is neither an INTEGER_CST nor
2337 the error_mark_node so that we know it is an overriding
2338 function. */
2339 DECL_VINDEX (decl) = decl;
2340
cbb40945 2341 if (DECL_VIRTUAL_P (decl))
2ee887f2 2342 {
e6858a84 2343 if (!DECL_VINDEX (decl))
2ee887f2
MS
2344 DECL_VINDEX (decl) = error_mark_node;
2345 IDENTIFIER_VIRTUAL_P (DECL_NAME (decl)) = 1;
2346 }
2347}
2348
fc378698
MS
2349/* Warn about hidden virtual functions that are not overridden in t.
2350 We know that constructors and destructors don't apply. */
e92cc029 2351
9e9ff709 2352void
94edc4ab 2353warn_hidden (tree t)
9e9ff709 2354{
d4e6fecb 2355 VEC(tree,gc) *method_vec = CLASSTYPE_METHOD_VEC (t);
aaaa46d2
MM
2356 tree fns;
2357 size_t i;
9e9ff709
MS
2358
2359 /* We go through each separately named virtual function. */
c8094d83 2360 for (i = CLASSTYPE_FIRST_CONVERSION_SLOT;
9ba5ff0f 2361 VEC_iterate (tree, method_vec, i, fns);
aaaa46d2 2362 ++i)
9e9ff709 2363 {
aaaa46d2 2364 tree fn;
7d5b8b11
MM
2365 tree name;
2366 tree fndecl;
2367 tree base_fndecls;
fa743e8c
NS
2368 tree base_binfo;
2369 tree binfo;
7d5b8b11
MM
2370 int j;
2371
2372 /* All functions in this slot in the CLASSTYPE_METHOD_VEC will
2373 have the same name. Figure out what name that is. */
aaaa46d2 2374 name = DECL_NAME (OVL_CURRENT (fns));
7d5b8b11
MM
2375 /* There are no possibly hidden functions yet. */
2376 base_fndecls = NULL_TREE;
2377 /* Iterate through all of the base classes looking for possibly
2378 hidden functions. */
fa743e8c
NS
2379 for (binfo = TYPE_BINFO (t), j = 0;
2380 BINFO_BASE_ITERATE (binfo, j, base_binfo); j++)
a4832853 2381 {
fa743e8c 2382 tree basetype = BINFO_TYPE (base_binfo);
7d5b8b11
MM
2383 base_fndecls = chainon (get_basefndecls (name, basetype),
2384 base_fndecls);
a4832853
JM
2385 }
2386
00a17e31 2387 /* If there are no functions to hide, continue. */
7d5b8b11 2388 if (!base_fndecls)
9e9ff709
MS
2389 continue;
2390
00a17e31 2391 /* Remove any overridden functions. */
aaaa46d2 2392 for (fn = fns; fn; fn = OVL_NEXT (fn))
9e9ff709 2393 {
aaaa46d2 2394 fndecl = OVL_CURRENT (fn);
7d5b8b11
MM
2395 if (DECL_VINDEX (fndecl))
2396 {
2397 tree *prev = &base_fndecls;
c8094d83
MS
2398
2399 while (*prev)
7d5b8b11
MM
2400 /* If the method from the base class has the same
2401 signature as the method from the derived class, it
2402 has been overridden. */
2403 if (same_signature_p (fndecl, TREE_VALUE (*prev)))
2404 *prev = TREE_CHAIN (*prev);
2405 else
2406 prev = &TREE_CHAIN (*prev);
2407 }
9e9ff709
MS
2408 }
2409
9e9ff709
MS
2410 /* Now give a warning for all base functions without overriders,
2411 as they are hidden. */
c8094d83 2412 while (base_fndecls)
7d5b8b11
MM
2413 {
2414 /* Here we know it is a hider, and no overrider exists. */
dee15844
JM
2415 warning (0, "%q+D was hidden", TREE_VALUE (base_fndecls));
2416 warning (0, " by %q+D", fns);
7d5b8b11
MM
2417 base_fndecls = TREE_CHAIN (base_fndecls);
2418 }
9e9ff709
MS
2419 }
2420}
2421
2422/* Check for things that are invalid. There are probably plenty of other
2423 things we should check for also. */
e92cc029 2424
9e9ff709 2425static void
94edc4ab 2426finish_struct_anon (tree t)
9e9ff709
MS
2427{
2428 tree field;
f90cdf34 2429
9e9ff709
MS
2430 for (field = TYPE_FIELDS (t); field; field = TREE_CHAIN (field))
2431 {
2432 if (TREE_STATIC (field))
2433 continue;
2434 if (TREE_CODE (field) != FIELD_DECL)
2435 continue;
2436
2437 if (DECL_NAME (field) == NULL_TREE
6bdb8141 2438 && ANON_AGGR_TYPE_P (TREE_TYPE (field)))
9e9ff709 2439 {
f90cdf34
MT
2440 tree elt = TYPE_FIELDS (TREE_TYPE (field));
2441 for (; elt; elt = TREE_CHAIN (elt))
9e9ff709 2442 {
b7076960
MM
2443 /* We're generally only interested in entities the user
2444 declared, but we also find nested classes by noticing
2445 the TYPE_DECL that we create implicitly. You're
2446 allowed to put one anonymous union inside another,
6f32162a
JM
2447 though, so we explicitly tolerate that. We use
2448 TYPE_ANONYMOUS_P rather than ANON_AGGR_TYPE_P so that
2449 we also allow unnamed types used for defining fields. */
c8094d83 2450 if (DECL_ARTIFICIAL (elt)
b7076960 2451 && (!DECL_IMPLICIT_TYPEDEF_P (elt)
6f32162a 2452 || TYPE_ANONYMOUS_P (TREE_TYPE (elt))))
9e9ff709
MS
2453 continue;
2454
f90cdf34 2455 if (TREE_CODE (elt) != FIELD_DECL)
8ebeee52 2456 {
dee15844
JM
2457 pedwarn ("%q+#D invalid; an anonymous union can "
2458 "only have non-static data members", elt);
8ebeee52
JM
2459 continue;
2460 }
2461
f90cdf34 2462 if (TREE_PRIVATE (elt))
dee15844 2463 pedwarn ("private member %q+#D in anonymous union", elt);
f90cdf34 2464 else if (TREE_PROTECTED (elt))
dee15844 2465 pedwarn ("protected member %q+#D in anonymous union", elt);
fc378698 2466
f90cdf34
MT
2467 TREE_PRIVATE (elt) = TREE_PRIVATE (field);
2468 TREE_PROTECTED (elt) = TREE_PROTECTED (field);
9e9ff709
MS
2469 }
2470 }
2471 }
2472}
2473
7088fca9
KL
2474/* Add T to CLASSTYPE_DECL_LIST of current_class_type which
2475 will be used later during class template instantiation.
2476 When FRIEND_P is zero, T can be a static member data (VAR_DECL),
2477 a non-static member data (FIELD_DECL), a member function
c8094d83 2478 (FUNCTION_DECL), a nested type (RECORD_TYPE, ENUM_TYPE),
7088fca9
KL
2479 a typedef (TYPE_DECL) or a member class template (TEMPLATE_DECL)
2480 When FRIEND_P is nonzero, T is either a friend class
2481 (RECORD_TYPE, TEMPLATE_DECL) or a friend function
2482 (FUNCTION_DECL, TEMPLATE_DECL). */
2483
2484void
94edc4ab 2485maybe_add_class_template_decl_list (tree type, tree t, int friend_p)
7088fca9
KL
2486{
2487 /* Save some memory by not creating TREE_LIST if TYPE is not template. */
2488 if (CLASSTYPE_TEMPLATE_INFO (type))
2489 CLASSTYPE_DECL_LIST (type)
2490 = tree_cons (friend_p ? NULL_TREE : type,
2491 t, CLASSTYPE_DECL_LIST (type));
2492}
2493
61a127b3 2494/* Create default constructors, assignment operators, and so forth for
e5e459bf
AO
2495 the type indicated by T, if they are needed. CANT_HAVE_CONST_CTOR,
2496 and CANT_HAVE_CONST_ASSIGNMENT are nonzero if, for whatever reason,
2497 the class cannot have a default constructor, copy constructor
2498 taking a const reference argument, or an assignment operator taking
2499 a const reference, respectively. */
61a127b3 2500
f72ab53b 2501static void
c8094d83 2502add_implicitly_declared_members (tree t,
94edc4ab
NN
2503 int cant_have_const_cctor,
2504 int cant_have_const_assignment)
61a127b3 2505{
61a127b3 2506 /* Destructor. */
9f4faeae 2507 if (!CLASSTYPE_DESTRUCTORS (t))
61a127b3 2508 {
9f4faeae
MM
2509 /* In general, we create destructors lazily. */
2510 CLASSTYPE_LAZY_DESTRUCTOR (t) = 1;
2511 /* However, if the implicit destructor is non-trivial
2512 destructor, we sometimes have to create it at this point. */
2513 if (TYPE_HAS_NONTRIVIAL_DESTRUCTOR (t))
2514 {
2515 bool lazy_p = true;
61a127b3 2516
9f4faeae
MM
2517 if (TYPE_FOR_JAVA (t))
2518 /* If this a Java class, any non-trivial destructor is
2519 invalid, even if compiler-generated. Therefore, if the
2520 destructor is non-trivial we create it now. */
2521 lazy_p = false;
2522 else
2523 {
2524 tree binfo;
2525 tree base_binfo;
2526 int ix;
2527
2528 /* If the implicit destructor will be virtual, then we must
2529 generate it now because (unfortunately) we do not
2530 generate virtual tables lazily. */
2531 binfo = TYPE_BINFO (t);
2532 for (ix = 0; BINFO_BASE_ITERATE (binfo, ix, base_binfo); ix++)
2533 {
2534 tree base_type;
2535 tree dtor;
2536
2537 base_type = BINFO_TYPE (base_binfo);
2538 dtor = CLASSTYPE_DESTRUCTORS (base_type);
2539 if (dtor && DECL_VIRTUAL_P (dtor))
2540 {
2541 lazy_p = false;
2542 break;
2543 }
2544 }
2545 }
2546
2547 /* If we can't get away with being lazy, generate the destructor
c8094d83 2548 now. */
9f4faeae
MM
2549 if (!lazy_p)
2550 lazily_declare_fn (sfk_destructor, t);
2551 }
61a127b3 2552 }
61a127b3
MM
2553
2554 /* Default constructor. */
e5e459bf 2555 if (! TYPE_HAS_CONSTRUCTOR (t))
61a127b3 2556 {
508a1c9c
MM
2557 TYPE_HAS_DEFAULT_CONSTRUCTOR (t) = 1;
2558 CLASSTYPE_LAZY_DEFAULT_CTOR (t) = 1;
61a127b3
MM
2559 }
2560
2561 /* Copy constructor. */
6eabb241 2562 if (! TYPE_HAS_INIT_REF (t) && ! TYPE_FOR_JAVA (t))
61a127b3 2563 {
508a1c9c
MM
2564 TYPE_HAS_INIT_REF (t) = 1;
2565 TYPE_HAS_CONST_INIT_REF (t) = !cant_have_const_cctor;
2566 CLASSTYPE_LAZY_COPY_CTOR (t) = 1;
2567 TYPE_HAS_CONSTRUCTOR (t) = 1;
61a127b3
MM
2568 }
2569
aaaa46d2
MM
2570 /* If there is no assignment operator, one will be created if and
2571 when it is needed. For now, just record whether or not the type
2572 of the parameter to the assignment operator will be a const or
2573 non-const reference. */
2574 if (!TYPE_HAS_ASSIGN_REF (t) && !TYPE_FOR_JAVA (t))
fb232476
MM
2575 {
2576 TYPE_HAS_ASSIGN_REF (t) = 1;
2577 TYPE_HAS_CONST_ASSIGN_REF (t) = !cant_have_const_assignment;
2578 CLASSTYPE_LAZY_ASSIGNMENT_OP (t) = 1;
2579 }
61a127b3
MM
2580}
2581
f90cdf34
MT
2582/* Subroutine of finish_struct_1. Recursively count the number of fields
2583 in TYPE, including anonymous union members. */
2584
2585static int
94edc4ab 2586count_fields (tree fields)
f90cdf34
MT
2587{
2588 tree x;
2589 int n_fields = 0;
2590 for (x = fields; x; x = TREE_CHAIN (x))
2591 {
2592 if (TREE_CODE (x) == FIELD_DECL && ANON_AGGR_TYPE_P (TREE_TYPE (x)))
2593 n_fields += count_fields (TYPE_FIELDS (TREE_TYPE (x)));
2594 else
2595 n_fields += 1;
2596 }
2597 return n_fields;
2598}
2599
2600/* Subroutine of finish_struct_1. Recursively add all the fields in the
d07605f5 2601 TREE_LIST FIELDS to the SORTED_FIELDS_TYPE elts, starting at offset IDX. */
f90cdf34
MT
2602
2603static int
d07605f5 2604add_fields_to_record_type (tree fields, struct sorted_fields_type *field_vec, int idx)
f90cdf34
MT
2605{
2606 tree x;
2607 for (x = fields; x; x = TREE_CHAIN (x))
2608 {
2609 if (TREE_CODE (x) == FIELD_DECL && ANON_AGGR_TYPE_P (TREE_TYPE (x)))
d07605f5 2610 idx = add_fields_to_record_type (TYPE_FIELDS (TREE_TYPE (x)), field_vec, idx);
f90cdf34 2611 else
d07605f5 2612 field_vec->elts[idx++] = x;
f90cdf34
MT
2613 }
2614 return idx;
2615}
2616
1e30f9b4
MM
2617/* FIELD is a bit-field. We are finishing the processing for its
2618 enclosing type. Issue any appropriate messages and set appropriate
2619 flags. */
2620
2621static void
94edc4ab 2622check_bitfield_decl (tree field)
1e30f9b4
MM
2623{
2624 tree type = TREE_TYPE (field);
cd8ed629 2625 tree w = NULL_TREE;
1e30f9b4 2626
cd8ed629 2627 /* Detect invalid bit-field type. */
1e30f9b4
MM
2628 if (DECL_INITIAL (field)
2629 && ! INTEGRAL_TYPE_P (TREE_TYPE (field)))
2630 {
dee15844 2631 error ("bit-field %q+#D with non-integral type", field);
cd8ed629 2632 w = error_mark_node;
1e30f9b4
MM
2633 }
2634
2635 /* Detect and ignore out of range field width. */
2636 if (DECL_INITIAL (field))
2637 {
cd8ed629 2638 w = DECL_INITIAL (field);
1e30f9b4
MM
2639
2640 /* Avoid the non_lvalue wrapper added by fold for PLUS_EXPRs. */
2641 STRIP_NOPS (w);
2642
2643 /* detect invalid field size. */
8a784e4a 2644 w = integral_constant_value (w);
1e30f9b4
MM
2645
2646 if (TREE_CODE (w) != INTEGER_CST)
2647 {
dee15844 2648 error ("bit-field %q+D width not an integer constant", field);
cd8ed629 2649 w = error_mark_node;
1e30f9b4 2650 }
05bccae2 2651 else if (tree_int_cst_sgn (w) < 0)
1e30f9b4 2652 {
dee15844 2653 error ("negative width in bit-field %q+D", field);
cd8ed629 2654 w = error_mark_node;
1e30f9b4 2655 }
05bccae2 2656 else if (integer_zerop (w) && DECL_NAME (field) != 0)
1e30f9b4 2657 {
dee15844 2658 error ("zero width for bit-field %q+D", field);
cd8ed629 2659 w = error_mark_node;
1e30f9b4 2660 }
05bccae2 2661 else if (compare_tree_int (w, TYPE_PRECISION (type)) > 0
1e30f9b4
MM
2662 && TREE_CODE (type) != ENUMERAL_TYPE
2663 && TREE_CODE (type) != BOOLEAN_TYPE)
dee15844 2664 warning (0, "width of %q+D exceeds its type", field);
1e30f9b4 2665 else if (TREE_CODE (type) == ENUMERAL_TYPE
05bccae2
RK
2666 && (0 > compare_tree_int (w,
2667 min_precision (TYPE_MIN_VALUE (type),
8df83eae 2668 TYPE_UNSIGNED (type)))
05bccae2
RK
2669 || 0 > compare_tree_int (w,
2670 min_precision
2671 (TYPE_MAX_VALUE (type),
8df83eae 2672 TYPE_UNSIGNED (type)))))
dee15844 2673 warning (0, "%q+D is too small to hold all values of %q#T", field, type);
cd8ed629 2674 }
c8094d83 2675
cd8ed629
MM
2676 /* Remove the bit-field width indicator so that the rest of the
2677 compiler does not treat that value as an initializer. */
2678 DECL_INITIAL (field) = NULL_TREE;
1e30f9b4 2679
cd8ed629
MM
2680 if (w != error_mark_node)
2681 {
2682 DECL_SIZE (field) = convert (bitsizetype, w);
2683 DECL_BIT_FIELD (field) = 1;
1e30f9b4
MM
2684 }
2685 else
cd8ed629
MM
2686 {
2687 /* Non-bit-fields are aligned for their type. */
2688 DECL_BIT_FIELD (field) = 0;
2689 CLEAR_DECL_C_BIT_FIELD (field);
cd8ed629 2690 }
1e30f9b4
MM
2691}
2692
2693/* FIELD is a non bit-field. We are finishing the processing for its
2694 enclosing type T. Issue any appropriate messages and set appropriate
2695 flags. */
2696
2697static void
94edc4ab 2698check_field_decl (tree field,
0cbd7506
MS
2699 tree t,
2700 int* cant_have_const_ctor,
2701 int* no_const_asn_ref,
94edc4ab 2702 int* any_default_members)
1e30f9b4
MM
2703{
2704 tree type = strip_array_types (TREE_TYPE (field));
2705
2706 /* An anonymous union cannot contain any fields which would change
2707 the settings of CANT_HAVE_CONST_CTOR and friends. */
2708 if (ANON_UNION_TYPE_P (type))
2709 ;
2710 /* And, we don't set TYPE_HAS_CONST_INIT_REF, etc., for anonymous
2711 structs. So, we recurse through their fields here. */
2712 else if (ANON_AGGR_TYPE_P (type))
2713 {
2714 tree fields;
2715
2716 for (fields = TYPE_FIELDS (type); fields; fields = TREE_CHAIN (fields))
17aec3eb 2717 if (TREE_CODE (fields) == FIELD_DECL && !DECL_C_BIT_FIELD (field))
1e30f9b4 2718 check_field_decl (fields, t, cant_have_const_ctor,
e5e459bf 2719 no_const_asn_ref, any_default_members);
1e30f9b4
MM
2720 }
2721 /* Check members with class type for constructors, destructors,
2722 etc. */
2723 else if (CLASS_TYPE_P (type))
2724 {
2725 /* Never let anything with uninheritable virtuals
2726 make it through without complaint. */
2727 abstract_virtuals_error (field, type);
c8094d83 2728
1e30f9b4
MM
2729 if (TREE_CODE (t) == UNION_TYPE)
2730 {
2731 if (TYPE_NEEDS_CONSTRUCTING (type))
dee15844
JM
2732 error ("member %q+#D with constructor not allowed in union",
2733 field);
834c6dff 2734 if (TYPE_HAS_NONTRIVIAL_DESTRUCTOR (type))
dee15844 2735 error ("member %q+#D with destructor not allowed in union", field);
1e30f9b4 2736 if (TYPE_HAS_COMPLEX_ASSIGN_REF (type))
dee15844
JM
2737 error ("member %q+#D with copy assignment operator not allowed in union",
2738 field);
1e30f9b4
MM
2739 }
2740 else
2741 {
2742 TYPE_NEEDS_CONSTRUCTING (t) |= TYPE_NEEDS_CONSTRUCTING (type);
c8094d83 2743 TYPE_HAS_NONTRIVIAL_DESTRUCTOR (t)
834c6dff 2744 |= TYPE_HAS_NONTRIVIAL_DESTRUCTOR (type);
1e30f9b4
MM
2745 TYPE_HAS_COMPLEX_ASSIGN_REF (t) |= TYPE_HAS_COMPLEX_ASSIGN_REF (type);
2746 TYPE_HAS_COMPLEX_INIT_REF (t) |= TYPE_HAS_COMPLEX_INIT_REF (type);
2747 }
2748
2749 if (!TYPE_HAS_CONST_INIT_REF (type))
2750 *cant_have_const_ctor = 1;
2751
2752 if (!TYPE_HAS_CONST_ASSIGN_REF (type))
2753 *no_const_asn_ref = 1;
1e30f9b4
MM
2754 }
2755 if (DECL_INITIAL (field) != NULL_TREE)
2756 {
2757 /* `build_class_init_list' does not recognize
2758 non-FIELD_DECLs. */
2759 if (TREE_CODE (t) == UNION_TYPE && any_default_members != 0)
1f070f2b 2760 error ("multiple fields in union %qT initialized", t);
1e30f9b4
MM
2761 *any_default_members = 1;
2762 }
6bb88f3b 2763}
1e30f9b4 2764
08b962b0
MM
2765/* Check the data members (both static and non-static), class-scoped
2766 typedefs, etc., appearing in the declaration of T. Issue
2767 appropriate diagnostics. Sets ACCESS_DECLS to a list (in
2768 declaration order) of access declarations; each TREE_VALUE in this
2769 list is a USING_DECL.
8d08fdba 2770
08b962b0 2771 In addition, set the following flags:
8d08fdba 2772
08b962b0
MM
2773 EMPTY_P
2774 The class is empty, i.e., contains no non-static data members.
8d08fdba 2775
08b962b0
MM
2776 CANT_HAVE_CONST_CTOR_P
2777 This class cannot have an implicitly generated copy constructor
2778 taking a const reference.
8d08fdba 2779
08b962b0
MM
2780 CANT_HAVE_CONST_ASN_REF
2781 This class cannot have an implicitly generated assignment
2782 operator taking a const reference.
8d08fdba 2783
08b962b0
MM
2784 All of these flags should be initialized before calling this
2785 function.
8d08fdba 2786
08b962b0
MM
2787 Returns a pointer to the end of the TYPE_FIELDs chain; additional
2788 fields can be added by adding to this chain. */
8d08fdba 2789
607cf131 2790static void
58731fd1 2791check_field_decls (tree t, tree *access_decls,
58731fd1
MM
2792 int *cant_have_const_ctor_p,
2793 int *no_const_asn_ref_p)
08b962b0
MM
2794{
2795 tree *field;
2796 tree *next;
dd29d26b 2797 bool has_pointers;
08b962b0
MM
2798 int any_default_members;
2799
2800 /* Assume there are no access declarations. */
2801 *access_decls = NULL_TREE;
2802 /* Assume this class has no pointer members. */
dd29d26b 2803 has_pointers = false;
08b962b0
MM
2804 /* Assume none of the members of this class have default
2805 initializations. */
2806 any_default_members = 0;
2807
2808 for (field = &TYPE_FIELDS (t); *field; field = next)
8d08fdba 2809 {
08b962b0
MM
2810 tree x = *field;
2811 tree type = TREE_TYPE (x);
8d08fdba 2812
08b962b0 2813 next = &TREE_CHAIN (x);
8d08fdba 2814
c91a56d2 2815 if (TREE_CODE (x) == FIELD_DECL)
691c003d 2816 {
e0d1297c
NS
2817 if (TYPE_PACKED (t))
2818 {
2819 if (!pod_type_p (TREE_TYPE (x)) && !TYPE_PACKED (TREE_TYPE (x)))
dee15844
JM
2820 warning
2821 (0,
2822 "ignoring packed attribute on unpacked non-POD field %q+#D",
e0d1297c 2823 x);
646c0835 2824 else if (TYPE_ALIGN (TREE_TYPE (x)) > BITS_PER_UNIT)
e0d1297c
NS
2825 DECL_PACKED (x) = 1;
2826 }
e6267549
JM
2827
2828 if (DECL_C_BIT_FIELD (x) && integer_zerop (DECL_INITIAL (x)))
08b962b0
MM
2829 /* We don't treat zero-width bitfields as making a class
2830 non-empty. */
2831 ;
e6267549 2832 else
f9c528ea 2833 {
5ec1192e
MM
2834 tree element_type;
2835
f9c528ea 2836 /* The class is non-empty. */
58731fd1 2837 CLASSTYPE_EMPTY_P (t) = 0;
f9c528ea
MM
2838 /* The class is not even nearly empty. */
2839 CLASSTYPE_NEARLY_EMPTY_P (t) = 0;
5ec1192e
MM
2840 /* If one of the data members contains an empty class,
2841 so does T. */
2842 element_type = strip_array_types (type);
c8094d83 2843 if (CLASS_TYPE_P (element_type)
5ec1192e 2844 && CLASSTYPE_CONTAINS_EMPTY_CLASS_P (element_type))
aa06d37b 2845 CLASSTYPE_CONTAINS_EMPTY_CLASS_P (t) = 1;
f9c528ea 2846 }
691c003d 2847 }
c91a56d2 2848
cffa8729 2849 if (TREE_CODE (x) == USING_DECL)
f30432d7 2850 {
08b962b0
MM
2851 /* Prune the access declaration from the list of fields. */
2852 *field = TREE_CHAIN (x);
2853
2854 /* Save the access declarations for our caller. */
2855 *access_decls = tree_cons (NULL_TREE, x, *access_decls);
2856
2857 /* Since we've reset *FIELD there's no reason to skip to the
2858 next field. */
2859 next = field;
f30432d7
MS
2860 continue;
2861 }
8d08fdba 2862
050367a3
MM
2863 if (TREE_CODE (x) == TYPE_DECL
2864 || TREE_CODE (x) == TEMPLATE_DECL)
f30432d7 2865 continue;
8d08fdba 2866
f30432d7 2867 /* If we've gotten this far, it's a data member, possibly static,
e92cc029 2868 or an enumerator. */
17aec3eb 2869 DECL_CONTEXT (x) = t;
8d08fdba 2870
58ec3cc5
MM
2871 /* When this goes into scope, it will be a non-local reference. */
2872 DECL_NONLOCAL (x) = 1;
2873
2874 if (TREE_CODE (t) == UNION_TYPE)
2875 {
2876 /* [class.union]
2877
2878 If a union contains a static data member, or a member of
324f9dfb 2879 reference type, the program is ill-formed. */
58ec3cc5
MM
2880 if (TREE_CODE (x) == VAR_DECL)
2881 {
dee15844 2882 error ("%q+D may not be static because it is a member of a union", x);
58ec3cc5
MM
2883 continue;
2884 }
2885 if (TREE_CODE (type) == REFERENCE_TYPE)
2886 {
dee15844
JM
2887 error ("%q+D may not have reference type %qT because"
2888 " it is a member of a union",
2889 x, type);
58ec3cc5
MM
2890 continue;
2891 }
2892 }
2893
f30432d7
MS
2894 /* ``A local class cannot have static data members.'' ARM 9.4 */
2895 if (current_function_decl && TREE_STATIC (x))
dee15844 2896 error ("field %q+D in local class cannot be static", x);
8d08fdba 2897
f30432d7
MS
2898 /* Perform error checking that did not get done in
2899 grokdeclarator. */
52fb2769 2900 if (TREE_CODE (type) == FUNCTION_TYPE)
f30432d7 2901 {
dee15844 2902 error ("field %q+D invalidly declared function type", x);
52fb2769
NS
2903 type = build_pointer_type (type);
2904 TREE_TYPE (x) = type;
f30432d7 2905 }
52fb2769 2906 else if (TREE_CODE (type) == METHOD_TYPE)
f30432d7 2907 {
dee15844 2908 error ("field %q+D invalidly declared method type", x);
52fb2769
NS
2909 type = build_pointer_type (type);
2910 TREE_TYPE (x) = type;
f30432d7 2911 }
8d08fdba 2912
52fb2769 2913 if (type == error_mark_node)
f30432d7 2914 continue;
c8094d83 2915
58ec3cc5 2916 if (TREE_CODE (x) == CONST_DECL || TREE_CODE (x) == VAR_DECL)
73a8adb6 2917 continue;
8d08fdba 2918
f30432d7 2919 /* Now it can only be a FIELD_DECL. */
8d08fdba 2920
f30432d7 2921 if (TREE_PRIVATE (x) || TREE_PROTECTED (x))
08b962b0 2922 CLASSTYPE_NON_AGGREGATE (t) = 1;
8d08fdba 2923
f30432d7
MS
2924 /* If this is of reference type, check if it needs an init.
2925 Also do a little ANSI jig if necessary. */
52fb2769 2926 if (TREE_CODE (type) == REFERENCE_TYPE)
0cbd7506 2927 {
08b962b0 2928 CLASSTYPE_NON_POD_P (t) = 1;
f30432d7 2929 if (DECL_INITIAL (x) == NULL_TREE)
6eb35968 2930 SET_CLASSTYPE_REF_FIELDS_NEED_INIT (t, 1);
8d08fdba 2931
f30432d7
MS
2932 /* ARM $12.6.2: [A member initializer list] (or, for an
2933 aggregate, initialization by a brace-enclosed list) is the
2934 only way to initialize nonstatic const and reference
2935 members. */
e349ee73 2936 TYPE_HAS_COMPLEX_ASSIGN_REF (t) = 1;
f30432d7 2937
b323323f
LM
2938 if (! TYPE_HAS_CONSTRUCTOR (t) && CLASSTYPE_NON_AGGREGATE (t))
2939 warning (OPT_Wextra, "non-static reference %q+#D in class without a constructor", x);
f30432d7 2940 }
8d08fdba 2941
1e30f9b4 2942 type = strip_array_types (type);
dd29d26b
GB
2943
2944 /* This is used by -Weffc++ (see below). Warn only for pointers
2945 to members which might hold dynamic memory. So do not warn
2946 for pointers to functions or pointers to members. */
2947 if (TYPE_PTR_P (type)
2948 && !TYPE_PTRFN_P (type)
2949 && !TYPE_PTR_TO_MEMBER_P (type))
2950 has_pointers = true;
824b9a4c 2951
58ec3cc5
MM
2952 if (CLASS_TYPE_P (type))
2953 {
2954 if (CLASSTYPE_REF_FIELDS_NEED_INIT (type))
2955 SET_CLASSTYPE_REF_FIELDS_NEED_INIT (t, 1);
2956 if (CLASSTYPE_READONLY_FIELDS_NEED_INIT (type))
2957 SET_CLASSTYPE_READONLY_FIELDS_NEED_INIT (t, 1);
2958 }
2959
52fb2769 2960 if (DECL_MUTABLE_P (x) || TYPE_HAS_MUTABLE_P (type))
08b962b0 2961 CLASSTYPE_HAS_MUTABLE (t) = 1;
a7a7710d 2962
d282fcb2 2963 if (! pod_type_p (type))
0cbd7506
MS
2964 /* DR 148 now allows pointers to members (which are POD themselves),
2965 to be allowed in POD structs. */
08b962b0 2966 CLASSTYPE_NON_POD_P (t) = 1;
52fb2769 2967
94e6e4c4
AO
2968 if (! zero_init_p (type))
2969 CLASSTYPE_NON_ZERO_INIT_P (t) = 1;
2970
f30432d7 2971 /* If any field is const, the structure type is pseudo-const. */
52fb2769 2972 if (CP_TYPE_CONST_P (type))
f30432d7
MS
2973 {
2974 C_TYPE_FIELDS_READONLY (t) = 1;
2975 if (DECL_INITIAL (x) == NULL_TREE)
6eb35968 2976 SET_CLASSTYPE_READONLY_FIELDS_NEED_INIT (t, 1);
f30432d7
MS
2977
2978 /* ARM $12.6.2: [A member initializer list] (or, for an
2979 aggregate, initialization by a brace-enclosed list) is the
2980 only way to initialize nonstatic const and reference
2981 members. */
e349ee73 2982 TYPE_HAS_COMPLEX_ASSIGN_REF (t) = 1;
f30432d7 2983
b323323f
LM
2984 if (! TYPE_HAS_CONSTRUCTOR (t) && CLASSTYPE_NON_AGGREGATE (t))
2985 warning (OPT_Wextra, "non-static const member %q+#D in class without a constructor", x);
f30432d7 2986 }
08b962b0 2987 /* A field that is pseudo-const makes the structure likewise. */
5552b43c 2988 else if (CLASS_TYPE_P (type))
f30432d7 2989 {
08b962b0 2990 C_TYPE_FIELDS_READONLY (t) |= C_TYPE_FIELDS_READONLY (type);
6eb35968
DE
2991 SET_CLASSTYPE_READONLY_FIELDS_NEED_INIT (t,
2992 CLASSTYPE_READONLY_FIELDS_NEED_INIT (t)
2993 | CLASSTYPE_READONLY_FIELDS_NEED_INIT (type));
f30432d7 2994 }
8d08fdba 2995
c10bffd0
JM
2996 /* Core issue 80: A nonstatic data member is required to have a
2997 different name from the class iff the class has a
2998 user-defined constructor. */
633221db 2999 if (constructor_name_p (DECL_NAME (x), t) && TYPE_HAS_CONSTRUCTOR (t))
dee15844 3000 pedwarn ("field %q+#D with same name as class", x);
c10bffd0 3001
162bc98d
JM
3002 /* We set DECL_C_BIT_FIELD in grokbitfield.
3003 If the type and width are valid, we'll also set DECL_BIT_FIELD. */
3004 if (DECL_C_BIT_FIELD (x))
1e30f9b4 3005 check_bitfield_decl (x);
f30432d7 3006 else
1e30f9b4 3007 check_field_decl (x, t,
08b962b0 3008 cant_have_const_ctor_p,
08b962b0 3009 no_const_asn_ref_p,
1e30f9b4 3010 &any_default_members);
8d08fdba
MS
3011 }
3012
dd29d26b
GB
3013 /* Effective C++ rule 11: if a class has dynamic memory held by pointers,
3014 it should also define a copy constructor and an assignment operator to
3015 implement the correct copy semantic (deep vs shallow, etc.). As it is
3016 not feasible to check whether the constructors do allocate dynamic memory
3017 and store it within members, we approximate the warning like this:
3018
3019 -- Warn only if there are members which are pointers
3020 -- Warn only if there is a non-trivial constructor (otherwise,
3021 there cannot be memory allocated).
3022 -- Warn only if there is a non-trivial destructor. We assume that the
3023 user at least implemented the cleanup correctly, and a destructor
3024 is needed to free dynamic memory.
c8094d83 3025
77880ae4 3026 This seems enough for practical purposes. */
dd29d26b
GB
3027 if (warn_ecpp
3028 && has_pointers
3029 && TYPE_HAS_CONSTRUCTOR (t)
9f4faeae 3030 && TYPE_HAS_NONTRIVIAL_DESTRUCTOR (t)
dd29d26b 3031 && !(TYPE_HAS_INIT_REF (t) && TYPE_HAS_ASSIGN_REF (t)))
824b9a4c 3032 {
b323323f 3033 warning (OPT_Weffc__, "%q#T has pointer data members", t);
c8094d83 3034
824b9a4c
MS
3035 if (! TYPE_HAS_INIT_REF (t))
3036 {
74fa0285
GDR
3037 warning (OPT_Weffc__,
3038 " but does not override %<%T(const %T&)%>", t, t);
3039 if (!TYPE_HAS_ASSIGN_REF (t))
3040 warning (OPT_Weffc__, " or %<operator=(const %T&)%>", t);
824b9a4c
MS
3041 }
3042 else if (! TYPE_HAS_ASSIGN_REF (t))
74fa0285
GDR
3043 warning (OPT_Weffc__,
3044 " but does not override %<operator=(const %T&)%>", t);
824b9a4c 3045 }
08b962b0 3046
607cf131
MM
3047
3048 /* Check anonymous struct/anonymous union fields. */
3049 finish_struct_anon (t);
3050
08b962b0
MM
3051 /* We've built up the list of access declarations in reverse order.
3052 Fix that now. */
3053 *access_decls = nreverse (*access_decls);
08b962b0
MM
3054}
3055
c20118a8
MM
3056/* If TYPE is an empty class type, records its OFFSET in the table of
3057 OFFSETS. */
607cf131 3058
c20118a8 3059static int
94edc4ab 3060record_subobject_offset (tree type, tree offset, splay_tree offsets)
5c24fba6 3061{
c20118a8 3062 splay_tree_node n;
5c24fba6 3063
c20118a8
MM
3064 if (!is_empty_class (type))
3065 return 0;
5c24fba6 3066
c20118a8
MM
3067 /* Record the location of this empty object in OFFSETS. */
3068 n = splay_tree_lookup (offsets, (splay_tree_key) offset);
3069 if (!n)
c8094d83 3070 n = splay_tree_insert (offsets,
c20118a8
MM
3071 (splay_tree_key) offset,
3072 (splay_tree_value) NULL_TREE);
c8094d83 3073 n->value = ((splay_tree_value)
c20118a8
MM
3074 tree_cons (NULL_TREE,
3075 type,
3076 (tree) n->value));
3077
3078 return 0;
607cf131
MM
3079}
3080
838dfd8a 3081/* Returns nonzero if TYPE is an empty class type and there is
c20118a8 3082 already an entry in OFFSETS for the same TYPE as the same OFFSET. */
9785e4b1 3083
c20118a8 3084static int
94edc4ab 3085check_subobject_offset (tree type, tree offset, splay_tree offsets)
9785e4b1 3086{
c20118a8
MM
3087 splay_tree_node n;
3088 tree t;
3089
3090 if (!is_empty_class (type))
3091 return 0;
3092
3093 /* Record the location of this empty object in OFFSETS. */
3094 n = splay_tree_lookup (offsets, (splay_tree_key) offset);
3095 if (!n)
3096 return 0;
3097
3098 for (t = (tree) n->value; t; t = TREE_CHAIN (t))
3099 if (same_type_p (TREE_VALUE (t), type))
3100 return 1;
3101
3102 return 0;
9785e4b1
MM
3103}
3104
c20118a8
MM
3105/* Walk through all the subobjects of TYPE (located at OFFSET). Call
3106 F for every subobject, passing it the type, offset, and table of
2003cd37
MM
3107 OFFSETS. If VBASES_P is one, then virtual non-primary bases should
3108 be traversed.
5cdba4ff
MM
3109
3110 If MAX_OFFSET is non-NULL, then subobjects with an offset greater
3111 than MAX_OFFSET will not be walked.
3112
838dfd8a 3113 If F returns a nonzero value, the traversal ceases, and that value
5cdba4ff 3114 is returned. Otherwise, returns zero. */
d77249e7 3115
c20118a8 3116static int
c8094d83 3117walk_subobject_offsets (tree type,
0cbd7506
MS
3118 subobject_offset_fn f,
3119 tree offset,
3120 splay_tree offsets,
3121 tree max_offset,
3122 int vbases_p)
5c24fba6 3123{
c20118a8 3124 int r = 0;
ff944b49 3125 tree type_binfo = NULL_TREE;
c20118a8 3126
5cdba4ff
MM
3127 /* If this OFFSET is bigger than the MAX_OFFSET, then we should
3128 stop. */
3129 if (max_offset && INT_CST_LT (max_offset, offset))
3130 return 0;
3131
dbe91deb
NS
3132 if (type == error_mark_node)
3133 return 0;
3134
c8094d83 3135 if (!TYPE_P (type))
ff944b49
MM
3136 {
3137 if (abi_version_at_least (2))
3138 type_binfo = type;
3139 type = BINFO_TYPE (type);
3140 }
3141
c20118a8 3142 if (CLASS_TYPE_P (type))
5c24fba6 3143 {
c20118a8 3144 tree field;
17bbb839 3145 tree binfo;
c20118a8
MM
3146 int i;
3147
5ec1192e
MM
3148 /* Avoid recursing into objects that are not interesting. */
3149 if (!CLASSTYPE_CONTAINS_EMPTY_CLASS_P (type))
3150 return 0;
3151
c20118a8
MM
3152 /* Record the location of TYPE. */
3153 r = (*f) (type, offset, offsets);
3154 if (r)
3155 return r;
3156
3157 /* Iterate through the direct base classes of TYPE. */
ff944b49
MM
3158 if (!type_binfo)
3159 type_binfo = TYPE_BINFO (type);
fa743e8c 3160 for (i = 0; BINFO_BASE_ITERATE (type_binfo, i, binfo); i++)
c20118a8 3161 {
ff944b49
MM
3162 tree binfo_offset;
3163
c8094d83 3164 if (abi_version_at_least (2)
809e3e7f 3165 && BINFO_VIRTUAL_P (binfo))
17bbb839 3166 continue;
5c24fba6 3167
c8094d83
MS
3168 if (!vbases_p
3169 && BINFO_VIRTUAL_P (binfo)
9965d119 3170 && !BINFO_PRIMARY_P (binfo))
c20118a8
MM
3171 continue;
3172
ff944b49
MM
3173 if (!abi_version_at_least (2))
3174 binfo_offset = size_binop (PLUS_EXPR,
3175 offset,
3176 BINFO_OFFSET (binfo));
3177 else
3178 {
3179 tree orig_binfo;
3180 /* We cannot rely on BINFO_OFFSET being set for the base
3181 class yet, but the offsets for direct non-virtual
3182 bases can be calculated by going back to the TYPE. */
604a3205 3183 orig_binfo = BINFO_BASE_BINFO (TYPE_BINFO (type), i);
c8094d83 3184 binfo_offset = size_binop (PLUS_EXPR,
ff944b49
MM
3185 offset,
3186 BINFO_OFFSET (orig_binfo));
3187 }
3188
3189 r = walk_subobject_offsets (binfo,
c20118a8 3190 f,
ff944b49 3191 binfo_offset,
c20118a8 3192 offsets,
5cdba4ff 3193 max_offset,
c8094d83 3194 (abi_version_at_least (2)
17bbb839 3195 ? /*vbases_p=*/0 : vbases_p));
c20118a8
MM
3196 if (r)
3197 return r;
3198 }
3199
58c42dc2 3200 if (abi_version_at_least (2) && CLASSTYPE_VBASECLASSES (type))
17bbb839 3201 {
58c42dc2 3202 unsigned ix;
d4e6fecb 3203 VEC(tree,gc) *vbases;
17bbb839 3204
ff944b49
MM
3205 /* Iterate through the virtual base classes of TYPE. In G++
3206 3.2, we included virtual bases in the direct base class
3207 loop above, which results in incorrect results; the
3208 correct offsets for virtual bases are only known when
3209 working with the most derived type. */
3210 if (vbases_p)
9ba5ff0f
NS
3211 for (vbases = CLASSTYPE_VBASECLASSES (type), ix = 0;
3212 VEC_iterate (tree, vbases, ix, binfo); ix++)
ff944b49 3213 {
ff944b49
MM
3214 r = walk_subobject_offsets (binfo,
3215 f,
3216 size_binop (PLUS_EXPR,
3217 offset,
3218 BINFO_OFFSET (binfo)),
3219 offsets,
3220 max_offset,
3221 /*vbases_p=*/0);
3222 if (r)
3223 return r;
3224 }
3225 else
17bbb839 3226 {
ff944b49
MM
3227 /* We still have to walk the primary base, if it is
3228 virtual. (If it is non-virtual, then it was walked
3229 above.) */
58c42dc2 3230 tree vbase = get_primary_binfo (type_binfo);
c8094d83 3231
809e3e7f 3232 if (vbase && BINFO_VIRTUAL_P (vbase)
fc6633e0
NS
3233 && BINFO_PRIMARY_P (vbase)
3234 && BINFO_INHERITANCE_CHAIN (vbase) == type_binfo)
ff944b49 3235 {
c8094d83 3236 r = (walk_subobject_offsets
dbbf88d1
NS
3237 (vbase, f, offset,
3238 offsets, max_offset, /*vbases_p=*/0));
3239 if (r)
3240 return r;
ff944b49 3241 }
17bbb839
MM
3242 }
3243 }
3244
c20118a8
MM
3245 /* Iterate through the fields of TYPE. */
3246 for (field = TYPE_FIELDS (type); field; field = TREE_CHAIN (field))
17bbb839 3247 if (TREE_CODE (field) == FIELD_DECL && !DECL_ARTIFICIAL (field))
c20118a8 3248 {
956d9305
MM
3249 tree field_offset;
3250
3251 if (abi_version_at_least (2))
3252 field_offset = byte_position (field);
3253 else
3254 /* In G++ 3.2, DECL_FIELD_OFFSET was used. */
3255 field_offset = DECL_FIELD_OFFSET (field);
3256
c20118a8
MM
3257 r = walk_subobject_offsets (TREE_TYPE (field),
3258 f,
3259 size_binop (PLUS_EXPR,
3260 offset,
956d9305 3261 field_offset),
c20118a8 3262 offsets,
5cdba4ff 3263 max_offset,
c20118a8
MM
3264 /*vbases_p=*/1);
3265 if (r)
3266 return r;
3267 }
5c24fba6 3268 }
c20118a8
MM
3269 else if (TREE_CODE (type) == ARRAY_TYPE)
3270 {
5ec1192e 3271 tree element_type = strip_array_types (type);
c20118a8
MM
3272 tree domain = TYPE_DOMAIN (type);
3273 tree index;
5c24fba6 3274
5ec1192e
MM
3275 /* Avoid recursing into objects that are not interesting. */
3276 if (!CLASS_TYPE_P (element_type)
3277 || !CLASSTYPE_CONTAINS_EMPTY_CLASS_P (element_type))
3278 return 0;
3279
c20118a8 3280 /* Step through each of the elements in the array. */
17bbb839
MM
3281 for (index = size_zero_node;
3282 /* G++ 3.2 had an off-by-one error here. */
c8094d83 3283 (abi_version_at_least (2)
17bbb839
MM
3284 ? !INT_CST_LT (TYPE_MAX_VALUE (domain), index)
3285 : INT_CST_LT (index, TYPE_MAX_VALUE (domain)));
c20118a8
MM
3286 index = size_binop (PLUS_EXPR, index, size_one_node))
3287 {
3288 r = walk_subobject_offsets (TREE_TYPE (type),
3289 f,
3290 offset,
3291 offsets,
5cdba4ff 3292 max_offset,
c20118a8
MM
3293 /*vbases_p=*/1);
3294 if (r)
3295 return r;
c8094d83 3296 offset = size_binop (PLUS_EXPR, offset,
c20118a8 3297 TYPE_SIZE_UNIT (TREE_TYPE (type)));
5cdba4ff
MM
3298 /* If this new OFFSET is bigger than the MAX_OFFSET, then
3299 there's no point in iterating through the remaining
3300 elements of the array. */
3301 if (max_offset && INT_CST_LT (max_offset, offset))
3302 break;
c20118a8
MM
3303 }
3304 }
3305
3306 return 0;
3307}
3308
c0572427
MM
3309/* Record all of the empty subobjects of TYPE (either a type or a
3310 binfo). If IS_DATA_MEMBER is true, then a non-static data member
c5a35c3c
MM
3311 is being placed at OFFSET; otherwise, it is a base class that is
3312 being placed at OFFSET. */
c20118a8
MM
3313
3314static void
c8094d83 3315record_subobject_offsets (tree type,
0cbd7506
MS
3316 tree offset,
3317 splay_tree offsets,
c5a35c3c 3318 bool is_data_member)
c20118a8 3319{
c5a35c3c 3320 tree max_offset;
c0572427
MM
3321 /* If recording subobjects for a non-static data member or a
3322 non-empty base class , we do not need to record offsets beyond
3323 the size of the biggest empty class. Additional data members
3324 will go at the end of the class. Additional base classes will go
3325 either at offset zero (if empty, in which case they cannot
3326 overlap with offsets past the size of the biggest empty class) or
3327 at the end of the class.
3328
3329 However, if we are placing an empty base class, then we must record
c5a35c3c
MM
3330 all offsets, as either the empty class is at offset zero (where
3331 other empty classes might later be placed) or at the end of the
3332 class (where other objects might then be placed, so other empty
3333 subobjects might later overlap). */
c0572427
MM
3334 if (is_data_member
3335 || !is_empty_class (BINFO_TYPE (type)))
c5a35c3c
MM
3336 max_offset = sizeof_biggest_empty_class;
3337 else
3338 max_offset = NULL_TREE;
c20118a8 3339 walk_subobject_offsets (type, record_subobject_offset, offset,
c5a35c3c 3340 offsets, max_offset, is_data_member);
5c24fba6
MM
3341}
3342
838dfd8a
KH
3343/* Returns nonzero if any of the empty subobjects of TYPE (located at
3344 OFFSET) conflict with entries in OFFSETS. If VBASES_P is nonzero,
c20118a8 3345 virtual bases of TYPE are examined. */
9785e4b1
MM
3346
3347static int
94edc4ab 3348layout_conflict_p (tree type,
0cbd7506
MS
3349 tree offset,
3350 splay_tree offsets,
3351 int vbases_p)
9785e4b1 3352{
5cdba4ff
MM
3353 splay_tree_node max_node;
3354
3355 /* Get the node in OFFSETS that indicates the maximum offset where
3356 an empty subobject is located. */
3357 max_node = splay_tree_max (offsets);
3358 /* If there aren't any empty subobjects, then there's no point in
3359 performing this check. */
3360 if (!max_node)
3361 return 0;
3362
c20118a8 3363 return walk_subobject_offsets (type, check_subobject_offset, offset,
5cdba4ff
MM
3364 offsets, (tree) (max_node->key),
3365 vbases_p);
9785e4b1
MM
3366}
3367
5c24fba6
MM
3368/* DECL is a FIELD_DECL corresponding either to a base subobject of a
3369 non-static data member of the type indicated by RLI. BINFO is the
c20118a8 3370 binfo corresponding to the base subobject, OFFSETS maps offsets to
17bbb839
MM
3371 types already located at those offsets. This function determines
3372 the position of the DECL. */
5c24fba6
MM
3373
3374static void
c8094d83
MS
3375layout_nonempty_base_or_field (record_layout_info rli,
3376 tree decl,
3377 tree binfo,
17bbb839 3378 splay_tree offsets)
5c24fba6 3379{
c20118a8 3380 tree offset = NULL_TREE;
17bbb839
MM
3381 bool field_p;
3382 tree type;
c8094d83 3383
17bbb839
MM
3384 if (binfo)
3385 {
3386 /* For the purposes of determining layout conflicts, we want to
3387 use the class type of BINFO; TREE_TYPE (DECL) will be the
3388 CLASSTYPE_AS_BASE version, which does not contain entries for
3389 zero-sized bases. */
3390 type = TREE_TYPE (binfo);
3391 field_p = false;
3392 }
3393 else
3394 {
3395 type = TREE_TYPE (decl);
3396 field_p = true;
3397 }
c20118a8 3398
5c24fba6
MM
3399 /* Try to place the field. It may take more than one try if we have
3400 a hard time placing the field without putting two objects of the
3401 same type at the same address. */
3402 while (1)
3403 {
defd0dea 3404 struct record_layout_info_s old_rli = *rli;
5c24fba6 3405
770ae6cc
RK
3406 /* Place this field. */
3407 place_field (rli, decl);
da3d4dfa 3408 offset = byte_position (decl);
1e2e9f54 3409
5c24fba6
MM
3410 /* We have to check to see whether or not there is already
3411 something of the same type at the offset we're about to use.
1e2e9f54 3412 For example, consider:
c8094d83 3413
1e2e9f54
MM
3414 struct S {};
3415 struct T : public S { int i; };
3416 struct U : public S, public T {};
c8094d83 3417
5c24fba6
MM
3418 Here, we put S at offset zero in U. Then, we can't put T at
3419 offset zero -- its S component would be at the same address
3420 as the S we already allocated. So, we have to skip ahead.
3421 Since all data members, including those whose type is an
838dfd8a 3422 empty class, have nonzero size, any overlap can happen only
5c24fba6
MM
3423 with a direct or indirect base-class -- it can't happen with
3424 a data member. */
1e2e9f54
MM
3425 /* In a union, overlap is permitted; all members are placed at
3426 offset zero. */
3427 if (TREE_CODE (rli->t) == UNION_TYPE)
3428 break;
7ba539c6
MM
3429 /* G++ 3.2 did not check for overlaps when placing a non-empty
3430 virtual base. */
809e3e7f 3431 if (!abi_version_at_least (2) && binfo && BINFO_VIRTUAL_P (binfo))
7ba539c6 3432 break;
c8094d83 3433 if (layout_conflict_p (field_p ? type : binfo, offset,
ff944b49 3434 offsets, field_p))
5c24fba6 3435 {
5c24fba6
MM
3436 /* Strip off the size allocated to this field. That puts us
3437 at the first place we could have put the field with
3438 proper alignment. */
770ae6cc
RK
3439 *rli = old_rli;
3440
c20118a8 3441 /* Bump up by the alignment required for the type. */
770ae6cc 3442 rli->bitpos
c8094d83
MS
3443 = size_binop (PLUS_EXPR, rli->bitpos,
3444 bitsize_int (binfo
c20118a8
MM
3445 ? CLASSTYPE_ALIGN (type)
3446 : TYPE_ALIGN (type)));
770ae6cc 3447 normalize_rli (rli);
5c24fba6
MM
3448 }
3449 else
3450 /* There was no conflict. We're done laying out this field. */
3451 break;
3452 }
c20118a8 3453
623fe76a 3454 /* Now that we know where it will be placed, update its
c20118a8
MM
3455 BINFO_OFFSET. */
3456 if (binfo && CLASS_TYPE_P (BINFO_TYPE (binfo)))
90024bdc 3457 /* Indirect virtual bases may have a nonzero BINFO_OFFSET at
17bbb839
MM
3458 this point because their BINFO_OFFSET is copied from another
3459 hierarchy. Therefore, we may not need to add the entire
3460 OFFSET. */
c8094d83 3461 propagate_binfo_offsets (binfo,
17bbb839 3462 size_diffop (convert (ssizetype, offset),
c8094d83 3463 convert (ssizetype,
dbbf88d1 3464 BINFO_OFFSET (binfo))));
5c24fba6
MM
3465}
3466
90024bdc 3467/* Returns true if TYPE is empty and OFFSET is nonzero. */
7ba539c6
MM
3468
3469static int
3470empty_base_at_nonzero_offset_p (tree type,
3471 tree offset,
3472 splay_tree offsets ATTRIBUTE_UNUSED)
3473{
3474 return is_empty_class (type) && !integer_zerop (offset);
3475}
3476
9785e4b1 3477/* Layout the empty base BINFO. EOC indicates the byte currently just
ec386958 3478 past the end of the class, and should be correctly aligned for a
c20118a8 3479 class of the type indicated by BINFO; OFFSETS gives the offsets of
623fe76a 3480 the empty bases allocated so far. T is the most derived
838dfd8a 3481 type. Return nonzero iff we added it at the end. */
9785e4b1 3482
06d9f09f 3483static bool
dbbf88d1 3484layout_empty_base (tree binfo, tree eoc, splay_tree offsets)
9785e4b1 3485{
ec386958 3486 tree alignment;
9785e4b1 3487 tree basetype = BINFO_TYPE (binfo);
06d9f09f 3488 bool atend = false;
956d9305 3489
9785e4b1 3490 /* This routine should only be used for empty classes. */
50bc768d 3491 gcc_assert (is_empty_class (basetype));
1b50716d 3492 alignment = ssize_int (CLASSTYPE_ALIGN_UNIT (basetype));
9785e4b1 3493
3075b327
NS
3494 if (!integer_zerop (BINFO_OFFSET (binfo)))
3495 {
3496 if (abi_version_at_least (2))
3497 propagate_binfo_offsets
3498 (binfo, size_diffop (size_zero_node, BINFO_OFFSET (binfo)));
74fa0285
GDR
3499 else
3500 warning (OPT_Wabi,
3501 "offset of empty base %qT may not be ABI-compliant and may"
3075b327
NS
3502 "change in a future version of GCC",
3503 BINFO_TYPE (binfo));
3504 }
c8094d83 3505
9785e4b1
MM
3506 /* This is an empty base class. We first try to put it at offset
3507 zero. */
ff944b49 3508 if (layout_conflict_p (binfo,
c20118a8 3509 BINFO_OFFSET (binfo),
c8094d83 3510 offsets,
c20118a8 3511 /*vbases_p=*/0))
9785e4b1
MM
3512 {
3513 /* That didn't work. Now, we move forward from the next
3514 available spot in the class. */
06d9f09f 3515 atend = true;
dbbf88d1 3516 propagate_binfo_offsets (binfo, convert (ssizetype, eoc));
c8094d83 3517 while (1)
9785e4b1 3518 {
ff944b49 3519 if (!layout_conflict_p (binfo,
c8094d83 3520 BINFO_OFFSET (binfo),
c20118a8
MM
3521 offsets,
3522 /*vbases_p=*/0))
9785e4b1
MM
3523 /* We finally found a spot where there's no overlap. */
3524 break;
3525
3526 /* There's overlap here, too. Bump along to the next spot. */
dbbf88d1 3527 propagate_binfo_offsets (binfo, alignment);
9785e4b1
MM
3528 }
3529 }
06d9f09f 3530 return atend;
9785e4b1
MM
3531}
3532
78dcd41a 3533/* Layout the base given by BINFO in the class indicated by RLI.
58731fd1 3534 *BASE_ALIGN is a running maximum of the alignments of
17bbb839
MM
3535 any base class. OFFSETS gives the location of empty base
3536 subobjects. T is the most derived type. Return nonzero if the new
3537 object cannot be nearly-empty. A new FIELD_DECL is inserted at
c8094d83 3538 *NEXT_FIELD, unless BINFO is for an empty base class.
5c24fba6 3539
17bbb839
MM
3540 Returns the location at which the next field should be inserted. */
3541
3542static tree *
58731fd1 3543build_base_field (record_layout_info rli, tree binfo,
17bbb839 3544 splay_tree offsets, tree *next_field)
d77249e7 3545{
17bbb839 3546 tree t = rli->t;
d77249e7 3547 tree basetype = BINFO_TYPE (binfo);
d77249e7 3548
d0f062fb 3549 if (!COMPLETE_TYPE_P (basetype))
d77249e7
MM
3550 /* This error is now reported in xref_tag, thus giving better
3551 location information. */
17bbb839 3552 return next_field;
c8094d83 3553
17bbb839
MM
3554 /* Place the base class. */
3555 if (!is_empty_class (basetype))
5c24fba6 3556 {
17bbb839
MM
3557 tree decl;
3558
5c24fba6
MM
3559 /* The containing class is non-empty because it has a non-empty
3560 base class. */
58731fd1 3561 CLASSTYPE_EMPTY_P (t) = 0;
c8094d83 3562
17bbb839
MM
3563 /* Create the FIELD_DECL. */
3564 decl = build_decl (FIELD_DECL, NULL_TREE, CLASSTYPE_AS_BASE (basetype));
3565 DECL_ARTIFICIAL (decl) = 1;
78e0d62b 3566 DECL_IGNORED_P (decl) = 1;
17bbb839
MM
3567 DECL_FIELD_CONTEXT (decl) = t;
3568 DECL_SIZE (decl) = CLASSTYPE_SIZE (basetype);
3569 DECL_SIZE_UNIT (decl) = CLASSTYPE_SIZE_UNIT (basetype);
3570 DECL_ALIGN (decl) = CLASSTYPE_ALIGN (basetype);
3571 DECL_USER_ALIGN (decl) = CLASSTYPE_USER_ALIGN (basetype);
550f100c 3572 DECL_MODE (decl) = TYPE_MODE (basetype);
642124c6 3573 DECL_FIELD_IS_BASE (decl) = 1;
0f3a8219 3574
5c24fba6
MM
3575 /* Try to place the field. It may take more than one try if we
3576 have a hard time placing the field without putting two
3577 objects of the same type at the same address. */
17bbb839
MM
3578 layout_nonempty_base_or_field (rli, decl, binfo, offsets);
3579 /* Add the new FIELD_DECL to the list of fields for T. */
3580 TREE_CHAIN (decl) = *next_field;
3581 *next_field = decl;
3582 next_field = &TREE_CHAIN (decl);
5c24fba6
MM
3583 }
3584 else
ec386958 3585 {
17bbb839 3586 tree eoc;
7ba539c6 3587 bool atend;
ec386958
MM
3588
3589 /* On some platforms (ARM), even empty classes will not be
3590 byte-aligned. */
17bbb839
MM
3591 eoc = round_up (rli_size_unit_so_far (rli),
3592 CLASSTYPE_ALIGN_UNIT (basetype));
dbbf88d1 3593 atend = layout_empty_base (binfo, eoc, offsets);
7ba539c6
MM
3594 /* A nearly-empty class "has no proper base class that is empty,
3595 not morally virtual, and at an offset other than zero." */
809e3e7f 3596 if (!BINFO_VIRTUAL_P (binfo) && CLASSTYPE_NEARLY_EMPTY_P (t))
7ba539c6
MM
3597 {
3598 if (atend)
3599 CLASSTYPE_NEARLY_EMPTY_P (t) = 0;
c5a35c3c 3600 /* The check above (used in G++ 3.2) is insufficient because
7ba539c6 3601 an empty class placed at offset zero might itself have an
90024bdc 3602 empty base at a nonzero offset. */
c8094d83 3603 else if (walk_subobject_offsets (basetype,
7ba539c6
MM
3604 empty_base_at_nonzero_offset_p,
3605 size_zero_node,
3606 /*offsets=*/NULL,
3607 /*max_offset=*/NULL_TREE,
3608 /*vbases_p=*/true))
3609 {
3610 if (abi_version_at_least (2))
3611 CLASSTYPE_NEARLY_EMPTY_P (t) = 0;
74fa0285
GDR
3612 else
3613 warning (OPT_Wabi,
3614 "class %qT will be considered nearly empty in a "
7ba539c6
MM
3615 "future version of GCC", t);
3616 }
3617 }
c8094d83 3618
17bbb839
MM
3619 /* We do not create a FIELD_DECL for empty base classes because
3620 it might overlap some other field. We want to be able to
3621 create CONSTRUCTORs for the class by iterating over the
3622 FIELD_DECLs, and the back end does not handle overlapping
3623 FIELD_DECLs. */
58731fd1
MM
3624
3625 /* An empty virtual base causes a class to be non-empty
3626 -- but in that case we do not need to clear CLASSTYPE_EMPTY_P
3627 here because that was already done when the virtual table
3628 pointer was created. */
ec386958 3629 }
5c24fba6 3630
5c24fba6 3631 /* Record the offsets of BINFO and its base subobjects. */
ff944b49 3632 record_subobject_offsets (binfo,
c20118a8 3633 BINFO_OFFSET (binfo),
c8094d83 3634 offsets,
c5a35c3c 3635 /*is_data_member=*/false);
17bbb839
MM
3636
3637 return next_field;
d77249e7
MM
3638}
3639
c20118a8 3640/* Layout all of the non-virtual base classes. Record empty
17bbb839
MM
3641 subobjects in OFFSETS. T is the most derived type. Return nonzero
3642 if the type cannot be nearly empty. The fields created
3643 corresponding to the base classes will be inserted at
3644 *NEXT_FIELD. */
607cf131 3645
17bbb839 3646static void
58731fd1 3647build_base_fields (record_layout_info rli,
17bbb839 3648 splay_tree offsets, tree *next_field)
607cf131
MM
3649{
3650 /* Chain to hold all the new FIELD_DECLs which stand in for base class
3651 subobjects. */
17bbb839 3652 tree t = rli->t;
604a3205 3653 int n_baseclasses = BINFO_N_BASE_BINFOS (TYPE_BINFO (t));
5c24fba6 3654 int i;
607cf131 3655
3461fba7 3656 /* The primary base class is always allocated first. */
17bbb839
MM
3657 if (CLASSTYPE_HAS_PRIMARY_BASE_P (t))
3658 next_field = build_base_field (rli, CLASSTYPE_PRIMARY_BINFO (t),
58731fd1 3659 offsets, next_field);
d77249e7
MM
3660
3661 /* Now allocate the rest of the bases. */
607cf131
MM
3662 for (i = 0; i < n_baseclasses; ++i)
3663 {
d77249e7 3664 tree base_binfo;
607cf131 3665
604a3205 3666 base_binfo = BINFO_BASE_BINFO (TYPE_BINFO (t), i);
911a71a7 3667
3461fba7
NS
3668 /* The primary base was already allocated above, so we don't
3669 need to allocate it again here. */
17bbb839 3670 if (base_binfo == CLASSTYPE_PRIMARY_BINFO (t))
607cf131
MM
3671 continue;
3672
dbbf88d1
NS
3673 /* Virtual bases are added at the end (a primary virtual base
3674 will have already been added). */
809e3e7f 3675 if (BINFO_VIRTUAL_P (base_binfo))
607cf131
MM
3676 continue;
3677
58731fd1 3678 next_field = build_base_field (rli, base_binfo,
17bbb839 3679 offsets, next_field);
607cf131 3680 }
607cf131
MM
3681}
3682
58010b57
MM
3683/* Go through the TYPE_METHODS of T issuing any appropriate
3684 diagnostics, figuring out which methods override which other
3ef397c1 3685 methods, and so forth. */
58010b57
MM
3686
3687static void
94edc4ab 3688check_methods (tree t)
58010b57
MM
3689{
3690 tree x;
58010b57
MM
3691
3692 for (x = TYPE_METHODS (t); x; x = TREE_CHAIN (x))
3693 {
58010b57 3694 check_for_override (x, t);
fee7654e 3695 if (DECL_PURE_VIRTUAL_P (x) && ! DECL_VINDEX (x))
dee15844 3696 error ("initializer specified for non-virtual method %q+D", x);
58010b57
MM
3697 /* The name of the field is the original field name
3698 Save this in auxiliary field for later overloading. */
3699 if (DECL_VINDEX (x))
3700 {
3ef397c1 3701 TYPE_POLYMORPHIC_P (t) = 1;
fee7654e 3702 if (DECL_PURE_VIRTUAL_P (x))
d4e6fecb 3703 VEC_safe_push (tree, gc, CLASSTYPE_PURE_VIRTUALS (t), x);
58010b57 3704 }
9f4faeae
MM
3705 /* All user-declared destructors are non-trivial. */
3706 if (DECL_DESTRUCTOR_P (x))
3707 TYPE_HAS_NONTRIVIAL_DESTRUCTOR (t) = 1;
58010b57 3708 }
58010b57
MM
3709}
3710
db9b2174
MM
3711/* FN is a constructor or destructor. Clone the declaration to create
3712 a specialized in-charge or not-in-charge version, as indicated by
3713 NAME. */
3714
3715static tree
94edc4ab 3716build_clone (tree fn, tree name)
db9b2174
MM
3717{
3718 tree parms;
3719 tree clone;
3720
3721 /* Copy the function. */
3722 clone = copy_decl (fn);
3723 /* Remember where this function came from. */
3724 DECL_CLONED_FUNCTION (clone) = fn;
5daf7c0a 3725 DECL_ABSTRACT_ORIGIN (clone) = fn;
db9b2174
MM
3726 /* Reset the function name. */
3727 DECL_NAME (clone) = name;
71cb9286 3728 SET_DECL_ASSEMBLER_NAME (clone, NULL_TREE);
db9b2174
MM
3729 /* There's no pending inline data for this function. */
3730 DECL_PENDING_INLINE_INFO (clone) = NULL;
3731 DECL_PENDING_INLINE_P (clone) = 0;
3732 /* And it hasn't yet been deferred. */
3733 DECL_DEFERRED_FN (clone) = 0;
3734
298d6f60
MM
3735 /* The base-class destructor is not virtual. */
3736 if (name == base_dtor_identifier)
3737 {
3738 DECL_VIRTUAL_P (clone) = 0;
3739 if (TREE_CODE (clone) != TEMPLATE_DECL)
3740 DECL_VINDEX (clone) = NULL_TREE;
3741 }
3742
4e7512c9 3743 /* If there was an in-charge parameter, drop it from the function
db9b2174
MM
3744 type. */
3745 if (DECL_HAS_IN_CHARGE_PARM_P (clone))
3746 {
3747 tree basetype;
3748 tree parmtypes;
3749 tree exceptions;
3750
3751 exceptions = TYPE_RAISES_EXCEPTIONS (TREE_TYPE (clone));
3752 basetype = TYPE_METHOD_BASETYPE (TREE_TYPE (clone));
3753 parmtypes = TYPE_ARG_TYPES (TREE_TYPE (clone));
3754 /* Skip the `this' parameter. */
3755 parmtypes = TREE_CHAIN (parmtypes);
3756 /* Skip the in-charge parameter. */
3757 parmtypes = TREE_CHAIN (parmtypes);
e0fff4b3
JM
3758 /* And the VTT parm, in a complete [cd]tor. */
3759 if (DECL_HAS_VTT_PARM_P (fn)
3760 && ! DECL_NEEDS_VTT_PARM_P (clone))
3761 parmtypes = TREE_CHAIN (parmtypes);
3ec6bad3
MM
3762 /* If this is subobject constructor or destructor, add the vtt
3763 parameter. */
c8094d83 3764 TREE_TYPE (clone)
43dc123f
MM
3765 = build_method_type_directly (basetype,
3766 TREE_TYPE (TREE_TYPE (clone)),
3767 parmtypes);
db9b2174
MM
3768 if (exceptions)
3769 TREE_TYPE (clone) = build_exception_variant (TREE_TYPE (clone),
3770 exceptions);
c8094d83 3771 TREE_TYPE (clone)
e9525111
MM
3772 = cp_build_type_attribute_variant (TREE_TYPE (clone),
3773 TYPE_ATTRIBUTES (TREE_TYPE (fn)));
db9b2174
MM
3774 }
3775
e0fff4b3
JM
3776 /* Copy the function parameters. But, DECL_ARGUMENTS on a TEMPLATE_DECL
3777 aren't function parameters; those are the template parameters. */
db9b2174
MM
3778 if (TREE_CODE (clone) != TEMPLATE_DECL)
3779 {
3780 DECL_ARGUMENTS (clone) = copy_list (DECL_ARGUMENTS (clone));
3781 /* Remove the in-charge parameter. */
3782 if (DECL_HAS_IN_CHARGE_PARM_P (clone))
3783 {
3784 TREE_CHAIN (DECL_ARGUMENTS (clone))
3785 = TREE_CHAIN (TREE_CHAIN (DECL_ARGUMENTS (clone)));
3786 DECL_HAS_IN_CHARGE_PARM_P (clone) = 0;
3787 }
e0fff4b3
JM
3788 /* And the VTT parm, in a complete [cd]tor. */
3789 if (DECL_HAS_VTT_PARM_P (fn))
3ec6bad3 3790 {
e0fff4b3
JM
3791 if (DECL_NEEDS_VTT_PARM_P (clone))
3792 DECL_HAS_VTT_PARM_P (clone) = 1;
3793 else
3794 {
3795 TREE_CHAIN (DECL_ARGUMENTS (clone))
3796 = TREE_CHAIN (TREE_CHAIN (DECL_ARGUMENTS (clone)));
3797 DECL_HAS_VTT_PARM_P (clone) = 0;
3798 }
3ec6bad3
MM
3799 }
3800
db9b2174
MM
3801 for (parms = DECL_ARGUMENTS (clone); parms; parms = TREE_CHAIN (parms))
3802 {
3803 DECL_CONTEXT (parms) = clone;
63e1b1c4 3804 cxx_dup_lang_specific_decl (parms);
db9b2174
MM
3805 }
3806 }
3807
db9b2174 3808 /* Create the RTL for this function. */
19e7881c 3809 SET_DECL_RTL (clone, NULL_RTX);
0e6df31e 3810 rest_of_decl_compilation (clone, /*top_level=*/1, at_eof);
c8094d83 3811
db9b2174
MM
3812 /* Make it easy to find the CLONE given the FN. */
3813 TREE_CHAIN (clone) = TREE_CHAIN (fn);
3814 TREE_CHAIN (fn) = clone;
3815
3816 /* If this is a template, handle the DECL_TEMPLATE_RESULT as well. */
3817 if (TREE_CODE (clone) == TEMPLATE_DECL)
3818 {
3819 tree result;
3820
c8094d83 3821 DECL_TEMPLATE_RESULT (clone)
db9b2174
MM
3822 = build_clone (DECL_TEMPLATE_RESULT (clone), name);
3823 result = DECL_TEMPLATE_RESULT (clone);
3824 DECL_TEMPLATE_INFO (result) = copy_node (DECL_TEMPLATE_INFO (result));
3825 DECL_TI_TEMPLATE (result) = clone;
3826 }
5e2f4cd2
MM
3827 else if (pch_file)
3828 note_decl_for_pch (clone);
db9b2174
MM
3829
3830 return clone;
3831}
3832
3833/* Produce declarations for all appropriate clones of FN. If
838dfd8a 3834 UPDATE_METHOD_VEC_P is nonzero, the clones are added to the
db9b2174
MM
3835 CLASTYPE_METHOD_VEC as well. */
3836
3837void
94edc4ab 3838clone_function_decl (tree fn, int update_method_vec_p)
db9b2174
MM
3839{
3840 tree clone;
3841
c00996a3 3842 /* Avoid inappropriate cloning. */
1f84ec23
MM
3843 if (TREE_CHAIN (fn)
3844 && DECL_CLONED_FUNCTION (TREE_CHAIN (fn)))
c00996a3
JM
3845 return;
3846
298d6f60 3847 if (DECL_MAYBE_IN_CHARGE_CONSTRUCTOR_P (fn))
db9b2174 3848 {
298d6f60
MM
3849 /* For each constructor, we need two variants: an in-charge version
3850 and a not-in-charge version. */
db9b2174
MM
3851 clone = build_clone (fn, complete_ctor_identifier);
3852 if (update_method_vec_p)
b2a9b208 3853 add_method (DECL_CONTEXT (clone), clone, NULL_TREE);
db9b2174
MM
3854 clone = build_clone (fn, base_ctor_identifier);
3855 if (update_method_vec_p)
b2a9b208 3856 add_method (DECL_CONTEXT (clone), clone, NULL_TREE);
db9b2174
MM
3857 }
3858 else
298d6f60 3859 {
50bc768d 3860 gcc_assert (DECL_MAYBE_IN_CHARGE_DESTRUCTOR_P (fn));
298d6f60 3861
3ec6bad3 3862 /* For each destructor, we need three variants: an in-charge
298d6f60 3863 version, a not-in-charge version, and an in-charge deleting
4e7512c9
MM
3864 version. We clone the deleting version first because that
3865 means it will go second on the TYPE_METHODS list -- and that
3866 corresponds to the correct layout order in the virtual
c8094d83 3867 function table.
52682a1b 3868
0cbd7506 3869 For a non-virtual destructor, we do not build a deleting
52682a1b
MM
3870 destructor. */
3871 if (DECL_VIRTUAL_P (fn))
3872 {
3873 clone = build_clone (fn, deleting_dtor_identifier);
3874 if (update_method_vec_p)
b2a9b208 3875 add_method (DECL_CONTEXT (clone), clone, NULL_TREE);
52682a1b 3876 }
4e7512c9 3877 clone = build_clone (fn, complete_dtor_identifier);
298d6f60 3878 if (update_method_vec_p)
b2a9b208 3879 add_method (DECL_CONTEXT (clone), clone, NULL_TREE);
298d6f60
MM
3880 clone = build_clone (fn, base_dtor_identifier);
3881 if (update_method_vec_p)
b2a9b208 3882 add_method (DECL_CONTEXT (clone), clone, NULL_TREE);
298d6f60 3883 }
5daf7c0a
JM
3884
3885 /* Note that this is an abstract function that is never emitted. */
3886 DECL_ABSTRACT (fn) = 1;
db9b2174
MM
3887}
3888
5f6eeeb3
NS
3889/* DECL is an in charge constructor, which is being defined. This will
3890 have had an in class declaration, from whence clones were
3891 declared. An out-of-class definition can specify additional default
3892 arguments. As it is the clones that are involved in overload
3893 resolution, we must propagate the information from the DECL to its
00a17e31 3894 clones. */
5f6eeeb3
NS
3895
3896void
94edc4ab 3897adjust_clone_args (tree decl)
5f6eeeb3
NS
3898{
3899 tree clone;
c8094d83 3900
5f6eeeb3
NS
3901 for (clone = TREE_CHAIN (decl); clone && DECL_CLONED_FUNCTION (clone);
3902 clone = TREE_CHAIN (clone))
3903 {
3904 tree orig_clone_parms = TYPE_ARG_TYPES (TREE_TYPE (clone));
3905 tree orig_decl_parms = TYPE_ARG_TYPES (TREE_TYPE (decl));
3906 tree decl_parms, clone_parms;
3907
3908 clone_parms = orig_clone_parms;
c8094d83 3909
00a17e31 3910 /* Skip the 'this' parameter. */
5f6eeeb3
NS
3911 orig_clone_parms = TREE_CHAIN (orig_clone_parms);
3912 orig_decl_parms = TREE_CHAIN (orig_decl_parms);
3913
3914 if (DECL_HAS_IN_CHARGE_PARM_P (decl))
3915 orig_decl_parms = TREE_CHAIN (orig_decl_parms);
3916 if (DECL_HAS_VTT_PARM_P (decl))
3917 orig_decl_parms = TREE_CHAIN (orig_decl_parms);
c8094d83 3918
5f6eeeb3
NS
3919 clone_parms = orig_clone_parms;
3920 if (DECL_HAS_VTT_PARM_P (clone))
3921 clone_parms = TREE_CHAIN (clone_parms);
c8094d83 3922
5f6eeeb3
NS
3923 for (decl_parms = orig_decl_parms; decl_parms;
3924 decl_parms = TREE_CHAIN (decl_parms),
3925 clone_parms = TREE_CHAIN (clone_parms))
3926 {
50bc768d
NS
3927 gcc_assert (same_type_p (TREE_TYPE (decl_parms),
3928 TREE_TYPE (clone_parms)));
c8094d83 3929
5f6eeeb3
NS
3930 if (TREE_PURPOSE (decl_parms) && !TREE_PURPOSE (clone_parms))
3931 {
3932 /* A default parameter has been added. Adjust the
00a17e31 3933 clone's parameters. */
5f6eeeb3
NS
3934 tree exceptions = TYPE_RAISES_EXCEPTIONS (TREE_TYPE (clone));
3935 tree basetype = TYPE_METHOD_BASETYPE (TREE_TYPE (clone));
3936 tree type;
3937
3938 clone_parms = orig_decl_parms;
3939
3940 if (DECL_HAS_VTT_PARM_P (clone))
3941 {
3942 clone_parms = tree_cons (TREE_PURPOSE (orig_clone_parms),
3943 TREE_VALUE (orig_clone_parms),
3944 clone_parms);
3945 TREE_TYPE (clone_parms) = TREE_TYPE (orig_clone_parms);
3946 }
43dc123f
MM
3947 type = build_method_type_directly (basetype,
3948 TREE_TYPE (TREE_TYPE (clone)),
3949 clone_parms);
5f6eeeb3
NS
3950 if (exceptions)
3951 type = build_exception_variant (type, exceptions);
3952 TREE_TYPE (clone) = type;
c8094d83 3953
5f6eeeb3
NS
3954 clone_parms = NULL_TREE;
3955 break;
3956 }
3957 }
50bc768d 3958 gcc_assert (!clone_parms);
5f6eeeb3
NS
3959 }
3960}
3961
db9b2174
MM
3962/* For each of the constructors and destructors in T, create an
3963 in-charge and not-in-charge variant. */
3964
3965static void
94edc4ab 3966clone_constructors_and_destructors (tree t)
db9b2174
MM
3967{
3968 tree fns;
3969
db9b2174
MM
3970 /* If for some reason we don't have a CLASSTYPE_METHOD_VEC, we bail
3971 out now. */
3972 if (!CLASSTYPE_METHOD_VEC (t))
3973 return;
3974
db9b2174
MM
3975 for (fns = CLASSTYPE_CONSTRUCTORS (t); fns; fns = OVL_NEXT (fns))
3976 clone_function_decl (OVL_CURRENT (fns), /*update_method_vec_p=*/1);
298d6f60
MM
3977 for (fns = CLASSTYPE_DESTRUCTORS (t); fns; fns = OVL_NEXT (fns))
3978 clone_function_decl (OVL_CURRENT (fns), /*update_method_vec_p=*/1);
db9b2174
MM
3979}
3980
58010b57
MM
3981/* Remove all zero-width bit-fields from T. */
3982
3983static void
94edc4ab 3984remove_zero_width_bit_fields (tree t)
58010b57
MM
3985{
3986 tree *fieldsp;
3987
c8094d83 3988 fieldsp = &TYPE_FIELDS (t);
58010b57
MM
3989 while (*fieldsp)
3990 {
3991 if (TREE_CODE (*fieldsp) == FIELD_DECL
c8094d83 3992 && DECL_C_BIT_FIELD (*fieldsp)
58010b57
MM
3993 && DECL_INITIAL (*fieldsp))
3994 *fieldsp = TREE_CHAIN (*fieldsp);
3995 else
3996 fieldsp = &TREE_CHAIN (*fieldsp);
3997 }
3998}
3999
dbc957f1
MM
4000/* Returns TRUE iff we need a cookie when dynamically allocating an
4001 array whose elements have the indicated class TYPE. */
4002
4003static bool
94edc4ab 4004type_requires_array_cookie (tree type)
dbc957f1
MM
4005{
4006 tree fns;
18fee3ee 4007 bool has_two_argument_delete_p = false;
dbc957f1 4008
50bc768d 4009 gcc_assert (CLASS_TYPE_P (type));
dbc957f1
MM
4010
4011 /* If there's a non-trivial destructor, we need a cookie. In order
4012 to iterate through the array calling the destructor for each
4013 element, we'll have to know how many elements there are. */
4014 if (TYPE_HAS_NONTRIVIAL_DESTRUCTOR (type))
4015 return true;
4016
4017 /* If the usual deallocation function is a two-argument whose second
4018 argument is of type `size_t', then we have to pass the size of
4019 the array to the deallocation function, so we will need to store
4020 a cookie. */
c8094d83 4021 fns = lookup_fnfields (TYPE_BINFO (type),
dbc957f1
MM
4022 ansi_opname (VEC_DELETE_EXPR),
4023 /*protect=*/0);
4024 /* If there are no `operator []' members, or the lookup is
4025 ambiguous, then we don't need a cookie. */
4026 if (!fns || fns == error_mark_node)
4027 return false;
4028 /* Loop through all of the functions. */
50ad9642 4029 for (fns = BASELINK_FUNCTIONS (fns); fns; fns = OVL_NEXT (fns))
dbc957f1
MM
4030 {
4031 tree fn;
4032 tree second_parm;
4033
4034 /* Select the current function. */
4035 fn = OVL_CURRENT (fns);
4036 /* See if this function is a one-argument delete function. If
4037 it is, then it will be the usual deallocation function. */
4038 second_parm = TREE_CHAIN (TYPE_ARG_TYPES (TREE_TYPE (fn)));
4039 if (second_parm == void_list_node)
4040 return false;
4041 /* Otherwise, if we have a two-argument function and the second
4042 argument is `size_t', it will be the usual deallocation
4043 function -- unless there is one-argument function, too. */
4044 if (TREE_CHAIN (second_parm) == void_list_node
4045 && same_type_p (TREE_VALUE (second_parm), sizetype))
4046 has_two_argument_delete_p = true;
4047 }
4048
4049 return has_two_argument_delete_p;
4050}
4051
607cf131
MM
4052/* Check the validity of the bases and members declared in T. Add any
4053 implicitly-generated functions (like copy-constructors and
4054 assignment operators). Compute various flag bits (like
4055 CLASSTYPE_NON_POD_T) for T. This routine works purely at the C++
4056 level: i.e., independently of the ABI in use. */
4057
4058static void
58731fd1 4059check_bases_and_members (tree t)
607cf131 4060{
607cf131
MM
4061 /* Nonzero if the implicitly generated copy constructor should take
4062 a non-const reference argument. */
4063 int cant_have_const_ctor;
78dcd41a 4064 /* Nonzero if the implicitly generated assignment operator
607cf131
MM
4065 should take a non-const reference argument. */
4066 int no_const_asn_ref;
4067 tree access_decls;
4068
4069 /* By default, we use const reference arguments and generate default
4070 constructors. */
607cf131
MM
4071 cant_have_const_ctor = 0;
4072 no_const_asn_ref = 0;
4073
00a17e31 4074 /* Check all the base-classes. */
e5e459bf 4075 check_bases (t, &cant_have_const_ctor,
607cf131
MM
4076 &no_const_asn_ref);
4077
9f4faeae
MM
4078 /* Check all the method declarations. */
4079 check_methods (t);
4080
4081 /* Check all the data member declarations. We cannot call
4082 check_field_decls until we have called check_bases check_methods,
4083 as check_field_decls depends on TYPE_HAS_NONTRIVIAL_DESTRUCTOR
4084 being set appropriately. */
58731fd1 4085 check_field_decls (t, &access_decls,
607cf131
MM
4086 &cant_have_const_ctor,
4087 &no_const_asn_ref);
4088
bbd15aac
MM
4089 /* A nearly-empty class has to be vptr-containing; a nearly empty
4090 class contains just a vptr. */
4091 if (!TYPE_CONTAINS_VPTR_P (t))
f9c528ea
MM
4092 CLASSTYPE_NEARLY_EMPTY_P (t) = 0;
4093
607cf131
MM
4094 /* Do some bookkeeping that will guide the generation of implicitly
4095 declared member functions. */
4096 TYPE_HAS_COMPLEX_INIT_REF (t)
5775a06a 4097 |= (TYPE_HAS_INIT_REF (t) || TYPE_CONTAINS_VPTR_P (t));
607cf131 4098 TYPE_NEEDS_CONSTRUCTING (t)
5775a06a
NS
4099 |= (TYPE_HAS_CONSTRUCTOR (t) || TYPE_CONTAINS_VPTR_P (t));
4100 CLASSTYPE_NON_AGGREGATE (t)
4101 |= (TYPE_HAS_CONSTRUCTOR (t) || TYPE_POLYMORPHIC_P (t));
607cf131 4102 CLASSTYPE_NON_POD_P (t)
c8094d83 4103 |= (CLASSTYPE_NON_AGGREGATE (t)
9f4faeae 4104 || TYPE_HAS_NONTRIVIAL_DESTRUCTOR (t)
607cf131 4105 || TYPE_HAS_ASSIGN_REF (t));
607cf131 4106 TYPE_HAS_COMPLEX_ASSIGN_REF (t)
0830ae44 4107 |= TYPE_HAS_ASSIGN_REF (t) || TYPE_CONTAINS_VPTR_P (t);
607cf131 4108
03fd3f84 4109 /* Synthesize any needed methods. */
e5e459bf 4110 add_implicitly_declared_members (t,
607cf131
MM
4111 cant_have_const_ctor,
4112 no_const_asn_ref);
4113
db9b2174
MM
4114 /* Create the in-charge and not-in-charge variants of constructors
4115 and destructors. */
4116 clone_constructors_and_destructors (t);
4117
aa52c1ff
JM
4118 /* Process the using-declarations. */
4119 for (; access_decls; access_decls = TREE_CHAIN (access_decls))
4120 handle_using_decl (TREE_VALUE (access_decls), t);
4121
607cf131
MM
4122 /* Build and sort the CLASSTYPE_METHOD_VEC. */
4123 finish_struct_methods (t);
dbc957f1
MM
4124
4125 /* Figure out whether or not we will need a cookie when dynamically
4126 allocating an array of this type. */
e2500fed 4127 TYPE_LANG_SPECIFIC (t)->u.c.vec_new_uses_cookie
dbc957f1 4128 = type_requires_array_cookie (t);
607cf131
MM
4129}
4130
3ef397c1 4131/* If T needs a pointer to its virtual function table, set TYPE_VFIELD
5c24fba6
MM
4132 accordingly. If a new vfield was created (because T doesn't have a
4133 primary base class), then the newly created field is returned. It
c35cce41 4134 is not added to the TYPE_FIELDS list; it is the caller's
e6858a84
NS
4135 responsibility to do that. Accumulate declared virtual functions
4136 on VIRTUALS_P. */
3ef397c1 4137
5c24fba6 4138static tree
94edc4ab 4139create_vtable_ptr (tree t, tree* virtuals_p)
3ef397c1
MM
4140{
4141 tree fn;
4142
e6858a84 4143 /* Collect the virtual functions declared in T. */
3ef397c1 4144 for (fn = TYPE_METHODS (t); fn; fn = TREE_CHAIN (fn))
e6858a84
NS
4145 if (DECL_VINDEX (fn) && !DECL_MAYBE_IN_CHARGE_DESTRUCTOR_P (fn)
4146 && TREE_CODE (DECL_VINDEX (fn)) != INTEGER_CST)
4147 {
4148 tree new_virtual = make_node (TREE_LIST);
c8094d83 4149
e6858a84
NS
4150 BV_FN (new_virtual) = fn;
4151 BV_DELTA (new_virtual) = integer_zero_node;
d1f05f93 4152 BV_VCALL_INDEX (new_virtual) = NULL_TREE;
3ef397c1 4153
e6858a84
NS
4154 TREE_CHAIN (new_virtual) = *virtuals_p;
4155 *virtuals_p = new_virtual;
4156 }
c8094d83 4157
da3d4dfa
MM
4158 /* If we couldn't find an appropriate base class, create a new field
4159 here. Even if there weren't any new virtual functions, we might need a
bbd15aac
MM
4160 new virtual function table if we're supposed to include vptrs in
4161 all classes that need them. */
e6858a84 4162 if (!TYPE_VFIELD (t) && (*virtuals_p || TYPE_CONTAINS_VPTR_P (t)))
3ef397c1
MM
4163 {
4164 /* We build this decl with vtbl_ptr_type_node, which is a
4165 `vtable_entry_type*'. It might seem more precise to use
a692ad2e 4166 `vtable_entry_type (*)[N]' where N is the number of virtual
3ef397c1
MM
4167 functions. However, that would require the vtable pointer in
4168 base classes to have a different type than the vtable pointer
4169 in derived classes. We could make that happen, but that
4170 still wouldn't solve all the problems. In particular, the
4171 type-based alias analysis code would decide that assignments
4172 to the base class vtable pointer can't alias assignments to
4173 the derived class vtable pointer, since they have different
4639c5c6 4174 types. Thus, in a derived class destructor, where the base
3ef397c1 4175 class constructor was inlined, we could generate bad code for
c8094d83 4176 setting up the vtable pointer.
3ef397c1 4177
0cbd7506 4178 Therefore, we use one type for all vtable pointers. We still
3ef397c1
MM
4179 use a type-correct type; it's just doesn't indicate the array
4180 bounds. That's better than using `void*' or some such; it's
4181 cleaner, and it let's the alias analysis code know that these
4182 stores cannot alias stores to void*! */
0abe00c5
NS
4183 tree field;
4184
4185 field = build_decl (FIELD_DECL, get_vfield_name (t), vtbl_ptr_type_node);
0abe00c5
NS
4186 DECL_VIRTUAL_P (field) = 1;
4187 DECL_ARTIFICIAL (field) = 1;
4188 DECL_FIELD_CONTEXT (field) = t;
4189 DECL_FCONTEXT (field) = t;
c8094d83 4190
0abe00c5 4191 TYPE_VFIELD (t) = field;
c8094d83 4192
0abe00c5 4193 /* This class is non-empty. */
58731fd1 4194 CLASSTYPE_EMPTY_P (t) = 0;
3ef397c1 4195
0abe00c5 4196 return field;
3ef397c1 4197 }
5c24fba6
MM
4198
4199 return NULL_TREE;
3ef397c1
MM
4200}
4201
2ef16140
MM
4202/* Fixup the inline function given by INFO now that the class is
4203 complete. */
08b962b0 4204
2ef16140 4205static void
94edc4ab 4206fixup_pending_inline (tree fn)
2ef16140 4207{
0e5921e8 4208 if (DECL_PENDING_INLINE_INFO (fn))
2ef16140 4209 {
0e5921e8 4210 tree args = DECL_ARGUMENTS (fn);
2ef16140
MM
4211 while (args)
4212 {
4213 DECL_CONTEXT (args) = fn;
4214 args = TREE_CHAIN (args);
4215 }
4216 }
4217}
08b962b0 4218
2ef16140
MM
4219/* Fixup the inline methods and friends in TYPE now that TYPE is
4220 complete. */
08b962b0 4221
2ef16140 4222static void
94edc4ab 4223fixup_inline_methods (tree type)
08b962b0 4224{
2ef16140 4225 tree method = TYPE_METHODS (type);
d4e6fecb 4226 VEC(tree,gc) *friends;
585b44d3 4227 unsigned ix;
08b962b0 4228
2ef16140 4229 if (method && TREE_CODE (method) == TREE_VEC)
08b962b0 4230 {
2ef16140
MM
4231 if (TREE_VEC_ELT (method, 1))
4232 method = TREE_VEC_ELT (method, 1);
4233 else if (TREE_VEC_ELT (method, 0))
4234 method = TREE_VEC_ELT (method, 0);
08b962b0 4235 else
2ef16140 4236 method = TREE_VEC_ELT (method, 2);
08b962b0
MM
4237 }
4238
2ef16140
MM
4239 /* Do inline member functions. */
4240 for (; method; method = TREE_CHAIN (method))
0e5921e8 4241 fixup_pending_inline (method);
08b962b0 4242
2ef16140 4243 /* Do friends. */
585b44d3
NS
4244 for (friends = CLASSTYPE_INLINE_FRIENDS (type), ix = 0;
4245 VEC_iterate (tree, friends, ix, method); ix++)
4246 fixup_pending_inline (method);
4247 CLASSTYPE_INLINE_FRIENDS (type) = NULL;
2ef16140 4248}
08b962b0 4249
9d4c0187
MM
4250/* Add OFFSET to all base types of BINFO which is a base in the
4251 hierarchy dominated by T.
80fd5f48 4252
911a71a7 4253 OFFSET, which is a type offset, is number of bytes. */
80fd5f48
MM
4254
4255static void
dbbf88d1 4256propagate_binfo_offsets (tree binfo, tree offset)
80fd5f48 4257{
911a71a7
MM
4258 int i;
4259 tree primary_binfo;
fa743e8c 4260 tree base_binfo;
80fd5f48 4261
911a71a7
MM
4262 /* Update BINFO's offset. */
4263 BINFO_OFFSET (binfo)
c8094d83 4264 = convert (sizetype,
911a71a7
MM
4265 size_binop (PLUS_EXPR,
4266 convert (ssizetype, BINFO_OFFSET (binfo)),
4267 offset));
80fd5f48 4268
911a71a7
MM
4269 /* Find the primary base class. */
4270 primary_binfo = get_primary_binfo (binfo);
4271
fc6633e0 4272 if (primary_binfo && BINFO_INHERITANCE_CHAIN (primary_binfo) == binfo)
090ad434 4273 propagate_binfo_offsets (primary_binfo, offset);
c8094d83 4274
911a71a7
MM
4275 /* Scan all of the bases, pushing the BINFO_OFFSET adjust
4276 downwards. */
fa743e8c 4277 for (i = 0; BINFO_BASE_ITERATE (binfo, i, base_binfo); ++i)
80fd5f48 4278 {
090ad434
NS
4279 /* Don't do the primary base twice. */
4280 if (base_binfo == primary_binfo)
4281 continue;
911a71a7 4282
090ad434 4283 if (BINFO_VIRTUAL_P (base_binfo))
911a71a7
MM
4284 continue;
4285
dbbf88d1 4286 propagate_binfo_offsets (base_binfo, offset);
911a71a7 4287 }
9d4c0187
MM
4288}
4289
17bbb839 4290/* Set BINFO_OFFSET for all of the virtual bases for RLI->T. Update
c20118a8
MM
4291 TYPE_ALIGN and TYPE_SIZE for T. OFFSETS gives the location of
4292 empty subobjects of T. */
80fd5f48 4293
d2c5305b 4294static void
17bbb839 4295layout_virtual_bases (record_layout_info rli, splay_tree offsets)
80fd5f48 4296{
dbbf88d1 4297 tree vbase;
17bbb839 4298 tree t = rli->t;
eca7f13c 4299 bool first_vbase = true;
17bbb839 4300 tree *next_field;
9785e4b1 4301
604a3205 4302 if (BINFO_N_BASE_BINFOS (TYPE_BINFO (t)) == 0)
9785e4b1
MM
4303 return;
4304
17bbb839
MM
4305 if (!abi_version_at_least(2))
4306 {
4307 /* In G++ 3.2, we incorrectly rounded the size before laying out
4308 the virtual bases. */
4309 finish_record_layout (rli, /*free_p=*/false);
9785e4b1 4310#ifdef STRUCTURE_SIZE_BOUNDARY
17bbb839
MM
4311 /* Packed structures don't need to have minimum size. */
4312 if (! TYPE_PACKED (t))
fc555370 4313 TYPE_ALIGN (t) = MAX (TYPE_ALIGN (t), (unsigned) STRUCTURE_SIZE_BOUNDARY);
9785e4b1 4314#endif
17bbb839
MM
4315 rli->offset = TYPE_SIZE_UNIT (t);
4316 rli->bitpos = bitsize_zero_node;
4317 rli->record_align = TYPE_ALIGN (t);
4318 }
80fd5f48 4319
17bbb839
MM
4320 /* Find the last field. The artificial fields created for virtual
4321 bases will go after the last extant field to date. */
4322 next_field = &TYPE_FIELDS (t);
4323 while (*next_field)
4324 next_field = &TREE_CHAIN (*next_field);
80fd5f48 4325
9d4c0187 4326 /* Go through the virtual bases, allocating space for each virtual
3461fba7
NS
4327 base that is not already a primary base class. These are
4328 allocated in inheritance graph order. */
dbbf88d1 4329 for (vbase = TYPE_BINFO (t); vbase; vbase = TREE_CHAIN (vbase))
c35cce41 4330 {
809e3e7f 4331 if (!BINFO_VIRTUAL_P (vbase))
1f84ec23 4332 continue;
eca7f13c 4333
9965d119 4334 if (!BINFO_PRIMARY_P (vbase))
c35cce41 4335 {
17bbb839
MM
4336 tree basetype = TREE_TYPE (vbase);
4337
c35cce41
MM
4338 /* This virtual base is not a primary base of any class in the
4339 hierarchy, so we have to add space for it. */
58731fd1 4340 next_field = build_base_field (rli, vbase,
17bbb839 4341 offsets, next_field);
9785e4b1 4342
eca7f13c
MM
4343 /* If the first virtual base might have been placed at a
4344 lower address, had we started from CLASSTYPE_SIZE, rather
4345 than TYPE_SIZE, issue a warning. There can be both false
4346 positives and false negatives from this warning in rare
4347 cases; to deal with all the possibilities would probably
4348 require performing both layout algorithms and comparing
4349 the results which is not particularly tractable. */
4350 if (warn_abi
4351 && first_vbase
c8094d83 4352 && (tree_int_cst_lt
17bbb839
MM
4353 (size_binop (CEIL_DIV_EXPR,
4354 round_up (CLASSTYPE_SIZE (t),
4355 CLASSTYPE_ALIGN (basetype)),
4356 bitsize_unit_node),
4357 BINFO_OFFSET (vbase))))
74fa0285
GDR
4358 warning (OPT_Wabi,
4359 "offset of virtual base %qT is not ABI-compliant and "
0cbd7506 4360 "may change in a future version of GCC",
eca7f13c
MM
4361 basetype);
4362
eca7f13c 4363 first_vbase = false;
c35cce41
MM
4364 }
4365 }
80fd5f48
MM
4366}
4367
ba9a991f
MM
4368/* Returns the offset of the byte just past the end of the base class
4369 BINFO. */
4370
4371static tree
4372end_of_base (tree binfo)
4373{
4374 tree size;
4375
4376 if (is_empty_class (BINFO_TYPE (binfo)))
4377 /* An empty class has zero CLASSTYPE_SIZE_UNIT, but we need to
4378 allocate some space for it. It cannot have virtual bases, so
4379 TYPE_SIZE_UNIT is fine. */
4380 size = TYPE_SIZE_UNIT (BINFO_TYPE (binfo));
4381 else
4382 size = CLASSTYPE_SIZE_UNIT (BINFO_TYPE (binfo));
4383
4384 return size_binop (PLUS_EXPR, BINFO_OFFSET (binfo), size);
4385}
4386
9785e4b1
MM
4387/* Returns the offset of the byte just past the end of the base class
4388 with the highest offset in T. If INCLUDE_VIRTUALS_P is zero, then
4389 only non-virtual bases are included. */
80fd5f48 4390
17bbb839 4391static tree
94edc4ab 4392end_of_class (tree t, int include_virtuals_p)
80fd5f48 4393{
17bbb839 4394 tree result = size_zero_node;
d4e6fecb 4395 VEC(tree,gc) *vbases;
ba9a991f 4396 tree binfo;
9ba5ff0f 4397 tree base_binfo;
ba9a991f 4398 tree offset;
9785e4b1 4399 int i;
80fd5f48 4400
fa743e8c
NS
4401 for (binfo = TYPE_BINFO (t), i = 0;
4402 BINFO_BASE_ITERATE (binfo, i, base_binfo); ++i)
9785e4b1 4403 {
9785e4b1 4404 if (!include_virtuals_p
fc6633e0
NS
4405 && BINFO_VIRTUAL_P (base_binfo)
4406 && (!BINFO_PRIMARY_P (base_binfo)
4407 || BINFO_INHERITANCE_CHAIN (base_binfo) != TYPE_BINFO (t)))
9785e4b1 4408 continue;
80fd5f48 4409
fa743e8c 4410 offset = end_of_base (base_binfo);
17bbb839
MM
4411 if (INT_CST_LT_UNSIGNED (result, offset))
4412 result = offset;
9785e4b1 4413 }
80fd5f48 4414
ba9a991f
MM
4415 /* G++ 3.2 did not check indirect virtual bases. */
4416 if (abi_version_at_least (2) && include_virtuals_p)
9ba5ff0f
NS
4417 for (vbases = CLASSTYPE_VBASECLASSES (t), i = 0;
4418 VEC_iterate (tree, vbases, i, base_binfo); i++)
ba9a991f 4419 {
9ba5ff0f 4420 offset = end_of_base (base_binfo);
ba9a991f
MM
4421 if (INT_CST_LT_UNSIGNED (result, offset))
4422 result = offset;
4423 }
4424
9785e4b1 4425 return result;
80fd5f48
MM
4426}
4427
17bbb839 4428/* Warn about bases of T that are inaccessible because they are
78b45a24
MM
4429 ambiguous. For example:
4430
4431 struct S {};
4432 struct T : public S {};
4433 struct U : public S, public T {};
4434
4435 Here, `(S*) new U' is not allowed because there are two `S'
4436 subobjects of U. */
4437
4438static void
94edc4ab 4439warn_about_ambiguous_bases (tree t)
78b45a24
MM
4440{
4441 int i;
d4e6fecb 4442 VEC(tree,gc) *vbases;
17bbb839 4443 tree basetype;
58c42dc2 4444 tree binfo;
fa743e8c 4445 tree base_binfo;
78b45a24 4446
18e4be85
NS
4447 /* If there are no repeated bases, nothing can be ambiguous. */
4448 if (!CLASSTYPE_REPEATED_BASE_P (t))
4449 return;
c8094d83 4450
17bbb839 4451 /* Check direct bases. */
fa743e8c
NS
4452 for (binfo = TYPE_BINFO (t), i = 0;
4453 BINFO_BASE_ITERATE (binfo, i, base_binfo); ++i)
78b45a24 4454 {
fa743e8c 4455 basetype = BINFO_TYPE (base_binfo);
78b45a24 4456
18e4be85 4457 if (!lookup_base (t, basetype, ba_unique | ba_quiet, NULL))
d4ee4d25 4458 warning (0, "direct base %qT inaccessible in %qT due to ambiguity",
17bbb839 4459 basetype, t);
78b45a24 4460 }
17bbb839
MM
4461
4462 /* Check for ambiguous virtual bases. */
4463 if (extra_warnings)
9ba5ff0f
NS
4464 for (vbases = CLASSTYPE_VBASECLASSES (t), i = 0;
4465 VEC_iterate (tree, vbases, i, binfo); i++)
17bbb839 4466 {
58c42dc2 4467 basetype = BINFO_TYPE (binfo);
c8094d83 4468
18e4be85 4469 if (!lookup_base (t, basetype, ba_unique | ba_quiet, NULL))
b323323f 4470 warning (OPT_Wextra, "virtual base %qT inaccessible in %qT due to ambiguity",
17bbb839
MM
4471 basetype, t);
4472 }
78b45a24
MM
4473}
4474
c20118a8
MM
4475/* Compare two INTEGER_CSTs K1 and K2. */
4476
4477static int
94edc4ab 4478splay_tree_compare_integer_csts (splay_tree_key k1, splay_tree_key k2)
c20118a8
MM
4479{
4480 return tree_int_cst_compare ((tree) k1, (tree) k2);
4481}
4482
17bbb839
MM
4483/* Increase the size indicated in RLI to account for empty classes
4484 that are "off the end" of the class. */
4485
4486static void
4487include_empty_classes (record_layout_info rli)
4488{
4489 tree eoc;
e3ccdd50 4490 tree rli_size;
17bbb839
MM
4491
4492 /* It might be the case that we grew the class to allocate a
4493 zero-sized base class. That won't be reflected in RLI, yet,
4494 because we are willing to overlay multiple bases at the same
4495 offset. However, now we need to make sure that RLI is big enough
4496 to reflect the entire class. */
c8094d83 4497 eoc = end_of_class (rli->t,
17bbb839 4498 CLASSTYPE_AS_BASE (rli->t) != NULL_TREE);
e3ccdd50
MM
4499 rli_size = rli_size_unit_so_far (rli);
4500 if (TREE_CODE (rli_size) == INTEGER_CST
4501 && INT_CST_LT_UNSIGNED (rli_size, eoc))
17bbb839 4502 {
43fe31f6
MM
4503 if (!abi_version_at_least (2))
4504 /* In version 1 of the ABI, the size of a class that ends with
4505 a bitfield was not rounded up to a whole multiple of a
4506 byte. Because rli_size_unit_so_far returns only the number
4507 of fully allocated bytes, any extra bits were not included
4508 in the size. */
4509 rli->bitpos = round_down (rli->bitpos, BITS_PER_UNIT);
4510 else
4511 /* The size should have been rounded to a whole byte. */
50bc768d
NS
4512 gcc_assert (tree_int_cst_equal
4513 (rli->bitpos, round_down (rli->bitpos, BITS_PER_UNIT)));
c8094d83
MS
4514 rli->bitpos
4515 = size_binop (PLUS_EXPR,
e3ccdd50
MM
4516 rli->bitpos,
4517 size_binop (MULT_EXPR,
4518 convert (bitsizetype,
4519 size_binop (MINUS_EXPR,
4520 eoc, rli_size)),
4521 bitsize_int (BITS_PER_UNIT)));
4522 normalize_rli (rli);
17bbb839
MM
4523 }
4524}
4525
2ef16140
MM
4526/* Calculate the TYPE_SIZE, TYPE_ALIGN, etc for T. Calculate
4527 BINFO_OFFSETs for all of the base-classes. Position the vtable
00a17e31 4528 pointer. Accumulate declared virtual functions on VIRTUALS_P. */
607cf131 4529
2ef16140 4530static void
e93ee644 4531layout_class_type (tree t, tree *virtuals_p)
2ef16140 4532{
5c24fba6
MM
4533 tree non_static_data_members;
4534 tree field;
4535 tree vptr;
4536 record_layout_info rli;
c20118a8
MM
4537 /* Maps offsets (represented as INTEGER_CSTs) to a TREE_LIST of
4538 types that appear at that offset. */
4539 splay_tree empty_base_offsets;
eca7f13c
MM
4540 /* True if the last field layed out was a bit-field. */
4541 bool last_field_was_bitfield = false;
17bbb839
MM
4542 /* The location at which the next field should be inserted. */
4543 tree *next_field;
4544 /* T, as a base class. */
4545 tree base_t;
5c24fba6
MM
4546
4547 /* Keep track of the first non-static data member. */
4548 non_static_data_members = TYPE_FIELDS (t);
4549
770ae6cc
RK
4550 /* Start laying out the record. */
4551 rli = start_record_layout (t);
534170eb 4552
fc6633e0
NS
4553 /* Mark all the primary bases in the hierarchy. */
4554 determine_primary_bases (t);
8026246f 4555
5c24fba6 4556 /* Create a pointer to our virtual function table. */
58731fd1 4557 vptr = create_vtable_ptr (t, virtuals_p);
5c24fba6 4558
3461fba7 4559 /* The vptr is always the first thing in the class. */
1f84ec23 4560 if (vptr)
5c24fba6 4561 {
17bbb839
MM
4562 TREE_CHAIN (vptr) = TYPE_FIELDS (t);
4563 TYPE_FIELDS (t) = vptr;
4564 next_field = &TREE_CHAIN (vptr);
770ae6cc 4565 place_field (rli, vptr);
5c24fba6 4566 }
17bbb839
MM
4567 else
4568 next_field = &TYPE_FIELDS (t);
5c24fba6 4569
72a50ab0 4570 /* Build FIELD_DECLs for all of the non-virtual base-types. */
c8094d83 4571 empty_base_offsets = splay_tree_new (splay_tree_compare_integer_csts,
c20118a8 4572 NULL, NULL);
58731fd1 4573 build_base_fields (rli, empty_base_offsets, next_field);
c8094d83 4574
5c24fba6 4575 /* Layout the non-static data members. */
770ae6cc 4576 for (field = non_static_data_members; field; field = TREE_CHAIN (field))
5c24fba6 4577 {
01955e96
MM
4578 tree type;
4579 tree padding;
5c24fba6
MM
4580
4581 /* We still pass things that aren't non-static data members to
4582 the back-end, in case it wants to do something with them. */
4583 if (TREE_CODE (field) != FIELD_DECL)
4584 {
770ae6cc 4585 place_field (rli, field);
0154eaa8 4586 /* If the static data member has incomplete type, keep track
c8094d83 4587 of it so that it can be completed later. (The handling
0154eaa8
MM
4588 of pending statics in finish_record_layout is
4589 insufficient; consider:
4590
4591 struct S1;
4592 struct S2 { static S1 s1; };
c8094d83 4593
0cbd7506 4594 At this point, finish_record_layout will be called, but
0154eaa8
MM
4595 S1 is still incomplete.) */
4596 if (TREE_CODE (field) == VAR_DECL)
532b37d9
MM
4597 {
4598 maybe_register_incomplete_var (field);
4599 /* The visibility of static data members is determined
4600 at their point of declaration, not their point of
4601 definition. */
4602 determine_visibility (field);
4603 }
5c24fba6
MM
4604 continue;
4605 }
4606
01955e96 4607 type = TREE_TYPE (field);
c8094d83 4608
1e099144 4609 padding = NULL_TREE;
01955e96
MM
4610
4611 /* If this field is a bit-field whose width is greater than its
3461fba7
NS
4612 type, then there are some special rules for allocating
4613 it. */
01955e96 4614 if (DECL_C_BIT_FIELD (field)
1f84ec23 4615 && INT_CST_LT (TYPE_SIZE (type), DECL_SIZE (field)))
01955e96
MM
4616 {
4617 integer_type_kind itk;
4618 tree integer_type;
555456b1 4619 bool was_unnamed_p = false;
01955e96
MM
4620 /* We must allocate the bits as if suitably aligned for the
4621 longest integer type that fits in this many bits. type
4622 of the field. Then, we are supposed to use the left over
4623 bits as additional padding. */
4624 for (itk = itk_char; itk != itk_none; ++itk)
c8094d83 4625 if (INT_CST_LT (DECL_SIZE (field),
01955e96
MM
4626 TYPE_SIZE (integer_types[itk])))
4627 break;
4628
4629 /* ITK now indicates a type that is too large for the
4630 field. We have to back up by one to find the largest
4631 type that fits. */
4632 integer_type = integer_types[itk - 1];
2d3e278d 4633
1e099144
MM
4634 /* Figure out how much additional padding is required. GCC
4635 3.2 always created a padding field, even if it had zero
4636 width. */
4637 if (!abi_version_at_least (2)
4638 || INT_CST_LT (TYPE_SIZE (integer_type), DECL_SIZE (field)))
2d3e278d 4639 {
1e099144
MM
4640 if (abi_version_at_least (2) && TREE_CODE (t) == UNION_TYPE)
4641 /* In a union, the padding field must have the full width
4642 of the bit-field; all fields start at offset zero. */
4643 padding = DECL_SIZE (field);
4644 else
4645 {
74fa0285
GDR
4646 if (TREE_CODE (t) == UNION_TYPE)
4647 warning (OPT_Wabi, "size assigned to %qT may not be "
1e099144 4648 "ABI-compliant and may change in a future "
c8094d83 4649 "version of GCC",
1e099144
MM
4650 t);
4651 padding = size_binop (MINUS_EXPR, DECL_SIZE (field),
4652 TYPE_SIZE (integer_type));
4653 }
2d3e278d 4654 }
c9372112 4655#ifdef PCC_BITFIELD_TYPE_MATTERS
63e5f567
MM
4656 /* An unnamed bitfield does not normally affect the
4657 alignment of the containing class on a target where
4658 PCC_BITFIELD_TYPE_MATTERS. But, the C++ ABI does not
4659 make any exceptions for unnamed bitfields when the
4660 bitfields are longer than their types. Therefore, we
4661 temporarily give the field a name. */
4662 if (PCC_BITFIELD_TYPE_MATTERS && !DECL_NAME (field))
4663 {
4664 was_unnamed_p = true;
4665 DECL_NAME (field) = make_anon_name ();
4666 }
c9372112 4667#endif
01955e96
MM
4668 DECL_SIZE (field) = TYPE_SIZE (integer_type);
4669 DECL_ALIGN (field) = TYPE_ALIGN (integer_type);
11cf4d18 4670 DECL_USER_ALIGN (field) = TYPE_USER_ALIGN (integer_type);
555456b1
MM
4671 layout_nonempty_base_or_field (rli, field, NULL_TREE,
4672 empty_base_offsets);
4673 if (was_unnamed_p)
4674 DECL_NAME (field) = NULL_TREE;
4675 /* Now that layout has been performed, set the size of the
4676 field to the size of its declared type; the rest of the
4677 field is effectively invisible. */
4678 DECL_SIZE (field) = TYPE_SIZE (type);
29edb15c
MM
4679 /* We must also reset the DECL_MODE of the field. */
4680 if (abi_version_at_least (2))
4681 DECL_MODE (field) = TYPE_MODE (type);
4682 else if (warn_abi
4683 && DECL_MODE (field) != TYPE_MODE (type))
4684 /* Versions of G++ before G++ 3.4 did not reset the
4685 DECL_MODE. */
74fa0285
GDR
4686 warning (OPT_Wabi,
4687 "the offset of %qD may not be ABI-compliant and may "
29edb15c 4688 "change in a future version of GCC", field);
01955e96 4689 }
555456b1
MM
4690 else
4691 layout_nonempty_base_or_field (rli, field, NULL_TREE,
4692 empty_base_offsets);
01955e96 4693
2003cd37
MM
4694 /* Remember the location of any empty classes in FIELD. */
4695 if (abi_version_at_least (2))
c8094d83 4696 record_subobject_offsets (TREE_TYPE (field),
2003cd37
MM
4697 byte_position(field),
4698 empty_base_offsets,
c5a35c3c 4699 /*is_data_member=*/true);
2003cd37 4700
eca7f13c
MM
4701 /* If a bit-field does not immediately follow another bit-field,
4702 and yet it starts in the middle of a byte, we have failed to
4703 comply with the ABI. */
4704 if (warn_abi
c8094d83 4705 && DECL_C_BIT_FIELD (field)
660845bf
ZL
4706 /* The TREE_NO_WARNING flag gets set by Objective-C when
4707 laying out an Objective-C class. The ObjC ABI differs
4708 from the C++ ABI, and so we do not want a warning
4709 here. */
4710 && !TREE_NO_WARNING (field)
eca7f13c
MM
4711 && !last_field_was_bitfield
4712 && !integer_zerop (size_binop (TRUNC_MOD_EXPR,
4713 DECL_FIELD_BIT_OFFSET (field),
4714 bitsize_unit_node)))
74fa0285 4715 warning (OPT_Wabi, "offset of %q+D is not ABI-compliant and may "
dee15844 4716 "change in a future version of GCC", field);
eca7f13c 4717
956d9305
MM
4718 /* G++ used to use DECL_FIELD_OFFSET as if it were the byte
4719 offset of the field. */
c8094d83 4720 if (warn_abi
956d9305
MM
4721 && !tree_int_cst_equal (DECL_FIELD_OFFSET (field),
4722 byte_position (field))
4723 && contains_empty_class_p (TREE_TYPE (field)))
74fa0285 4724 warning (OPT_Wabi, "%q+D contains empty classes which may cause base "
dee15844
JM
4725 "classes to be placed at different locations in a "
4726 "future version of GCC", field);
956d9305 4727
01955e96
MM
4728 /* If we needed additional padding after this field, add it
4729 now. */
4730 if (padding)
4731 {
4732 tree padding_field;
4733
c8094d83 4734 padding_field = build_decl (FIELD_DECL,
01955e96 4735 NULL_TREE,
c8094d83 4736 char_type_node);
01955e96
MM
4737 DECL_BIT_FIELD (padding_field) = 1;
4738 DECL_SIZE (padding_field) = padding;
1e099144 4739 DECL_CONTEXT (padding_field) = t;
ea258926 4740 DECL_ARTIFICIAL (padding_field) = 1;
78e0d62b 4741 DECL_IGNORED_P (padding_field) = 1;
c20118a8 4742 layout_nonempty_base_or_field (rli, padding_field,
c8094d83 4743 NULL_TREE,
17bbb839 4744 empty_base_offsets);
01955e96 4745 }
eca7f13c
MM
4746
4747 last_field_was_bitfield = DECL_C_BIT_FIELD (field);
5c24fba6
MM
4748 }
4749
17bbb839 4750 if (abi_version_at_least (2) && !integer_zerop (rli->bitpos))
e3ccdd50
MM
4751 {
4752 /* Make sure that we are on a byte boundary so that the size of
4753 the class without virtual bases will always be a round number
4754 of bytes. */
4755 rli->bitpos = round_up (rli->bitpos, BITS_PER_UNIT);
4756 normalize_rli (rli);
4757 }
17bbb839 4758
8a874cb4
MM
4759 /* G++ 3.2 does not allow virtual bases to be overlaid with tail
4760 padding. */
4761 if (!abi_version_at_least (2))
4762 include_empty_classes(rli);
58010b57 4763
3ef397c1
MM
4764 /* Delete all zero-width bit-fields from the list of fields. Now
4765 that the type is laid out they are no longer important. */
4766 remove_zero_width_bit_fields (t);
4767
17bbb839
MM
4768 /* Create the version of T used for virtual bases. We do not use
4769 make_aggr_type for this version; this is an artificial type. For
4770 a POD type, we just reuse T. */
58731fd1 4771 if (CLASSTYPE_NON_POD_P (t) || CLASSTYPE_EMPTY_P (t))
06ceef4e 4772 {
17bbb839 4773 base_t = make_node (TREE_CODE (t));
c8094d83 4774
58731fd1
MM
4775 /* Set the size and alignment for the new type. In G++ 3.2, all
4776 empty classes were considered to have size zero when used as
4777 base classes. */
4778 if (!abi_version_at_least (2) && CLASSTYPE_EMPTY_P (t))
4779 {
4780 TYPE_SIZE (base_t) = bitsize_zero_node;
4781 TYPE_SIZE_UNIT (base_t) = size_zero_node;
4782 if (warn_abi && !integer_zerop (rli_size_unit_so_far (rli)))
74fa0285
GDR
4783 warning (OPT_Wabi,
4784 "layout of classes derived from empty class %qT "
58731fd1
MM
4785 "may change in a future version of GCC",
4786 t);
4787 }
4788 else
4789 {
6b99d1c0
MM
4790 tree eoc;
4791
4792 /* If the ABI version is not at least two, and the last
4793 field was a bit-field, RLI may not be on a byte
4794 boundary. In particular, rli_size_unit_so_far might
4795 indicate the last complete byte, while rli_size_so_far
4796 indicates the total number of bits used. Therefore,
4797 rli_size_so_far, rather than rli_size_unit_so_far, is
4798 used to compute TYPE_SIZE_UNIT. */
4799 eoc = end_of_class (t, /*include_virtuals_p=*/0);
c8094d83 4800 TYPE_SIZE_UNIT (base_t)
8a874cb4 4801 = size_binop (MAX_EXPR,
6b99d1c0
MM
4802 convert (sizetype,
4803 size_binop (CEIL_DIV_EXPR,
4804 rli_size_so_far (rli),
4805 bitsize_int (BITS_PER_UNIT))),
4806 eoc);
c8094d83 4807 TYPE_SIZE (base_t)
8a874cb4
MM
4808 = size_binop (MAX_EXPR,
4809 rli_size_so_far (rli),
4810 size_binop (MULT_EXPR,
6b99d1c0 4811 convert (bitsizetype, eoc),
8a874cb4 4812 bitsize_int (BITS_PER_UNIT)));
58731fd1 4813 }
17bbb839
MM
4814 TYPE_ALIGN (base_t) = rli->record_align;
4815 TYPE_USER_ALIGN (base_t) = TYPE_USER_ALIGN (t);
4816
4817 /* Copy the fields from T. */
4818 next_field = &TYPE_FIELDS (base_t);
4819 for (field = TYPE_FIELDS (t); field; field = TREE_CHAIN (field))
4820 if (TREE_CODE (field) == FIELD_DECL)
4821 {
4822 *next_field = build_decl (FIELD_DECL,
c8094d83 4823 DECL_NAME (field),
17bbb839
MM
4824 TREE_TYPE (field));
4825 DECL_CONTEXT (*next_field) = base_t;
4826 DECL_FIELD_OFFSET (*next_field) = DECL_FIELD_OFFSET (field);
4827 DECL_FIELD_BIT_OFFSET (*next_field)
4828 = DECL_FIELD_BIT_OFFSET (field);
4f0a2b81
MM
4829 DECL_SIZE (*next_field) = DECL_SIZE (field);
4830 DECL_MODE (*next_field) = DECL_MODE (field);
17bbb839
MM
4831 next_field = &TREE_CHAIN (*next_field);
4832 }
4833
4834 /* Record the base version of the type. */
4835 CLASSTYPE_AS_BASE (t) = base_t;
5a5cccaa 4836 TYPE_CONTEXT (base_t) = t;
83b14b88 4837 }
1f84ec23 4838 else
17bbb839 4839 CLASSTYPE_AS_BASE (t) = t;
0b41abe6 4840
5ec1192e
MM
4841 /* Every empty class contains an empty class. */
4842 if (CLASSTYPE_EMPTY_P (t))
4843 CLASSTYPE_CONTAINS_EMPTY_CLASS_P (t) = 1;
4844
8d08fdba
MS
4845 /* Set the TYPE_DECL for this type to contain the right
4846 value for DECL_OFFSET, so that we can use it as part
4847 of a COMPONENT_REF for multiple inheritance. */
d2e5ee5c 4848 layout_decl (TYPE_MAIN_DECL (t), 0);
8d08fdba 4849
7177d104
MS
4850 /* Now fix up any virtual base class types that we left lying
4851 around. We must get these done before we try to lay out the
5c24fba6
MM
4852 virtual function table. As a side-effect, this will remove the
4853 base subobject fields. */
17bbb839
MM
4854 layout_virtual_bases (rli, empty_base_offsets);
4855
c8094d83 4856 /* Make sure that empty classes are reflected in RLI at this
17bbb839
MM
4857 point. */
4858 include_empty_classes(rli);
4859
4860 /* Make sure not to create any structures with zero size. */
58731fd1 4861 if (integer_zerop (rli_size_unit_so_far (rli)) && CLASSTYPE_EMPTY_P (t))
c8094d83 4862 place_field (rli,
17bbb839
MM
4863 build_decl (FIELD_DECL, NULL_TREE, char_type_node));
4864
4865 /* Let the back-end lay out the type. */
4866 finish_record_layout (rli, /*free_p=*/true);
9785e4b1 4867
17bbb839
MM
4868 /* Warn about bases that can't be talked about due to ambiguity. */
4869 warn_about_ambiguous_bases (t);
78b45a24 4870
00bfffa4
JM
4871 /* Now that we're done with layout, give the base fields the real types. */
4872 for (field = TYPE_FIELDS (t); field; field = TREE_CHAIN (field))
4873 if (DECL_ARTIFICIAL (field) && IS_FAKE_BASE_TYPE (TREE_TYPE (field)))
4874 TREE_TYPE (field) = TYPE_CONTEXT (TREE_TYPE (field));
4875
9785e4b1 4876 /* Clean up. */
c20118a8 4877 splay_tree_delete (empty_base_offsets);
c5a35c3c
MM
4878
4879 if (CLASSTYPE_EMPTY_P (t)
c0572427
MM
4880 && tree_int_cst_lt (sizeof_biggest_empty_class,
4881 TYPE_SIZE_UNIT (t)))
4882 sizeof_biggest_empty_class = TYPE_SIZE_UNIT (t);
2ef16140 4883}
c35cce41 4884
af287697
MM
4885/* Determine the "key method" for the class type indicated by TYPE,
4886 and set CLASSTYPE_KEY_METHOD accordingly. */
9aad8f83 4887
af287697
MM
4888void
4889determine_key_method (tree type)
9aad8f83
MA
4890{
4891 tree method;
4892
4893 if (TYPE_FOR_JAVA (type)
4894 || processing_template_decl
4895 || CLASSTYPE_TEMPLATE_INSTANTIATION (type)
4896 || CLASSTYPE_INTERFACE_KNOWN (type))
af287697 4897 return;
9aad8f83 4898
af287697
MM
4899 /* The key method is the first non-pure virtual function that is not
4900 inline at the point of class definition. On some targets the
4901 key function may not be inline; those targets should not call
4902 this function until the end of the translation unit. */
9aad8f83
MA
4903 for (method = TYPE_METHODS (type); method != NULL_TREE;
4904 method = TREE_CHAIN (method))
4905 if (DECL_VINDEX (method) != NULL_TREE
4906 && ! DECL_DECLARED_INLINE_P (method)
4907 && ! DECL_PURE_VIRTUAL_P (method))
af287697
MM
4908 {
4909 CLASSTYPE_KEY_METHOD (type) = method;
4910 break;
4911 }
9aad8f83 4912
af287697 4913 return;
9aad8f83
MA
4914}
4915
548502d3
MM
4916/* Perform processing required when the definition of T (a class type)
4917 is complete. */
2ef16140
MM
4918
4919void
94edc4ab 4920finish_struct_1 (tree t)
2ef16140
MM
4921{
4922 tree x;
00a17e31 4923 /* A TREE_LIST. The TREE_VALUE of each node is a FUNCTION_DECL. */
e6858a84 4924 tree virtuals = NULL_TREE;
2ef16140 4925 int n_fields = 0;
2ef16140 4926
d0f062fb 4927 if (COMPLETE_TYPE_P (t))
2ef16140 4928 {
8dc2b103 4929 gcc_assert (IS_AGGR_TYPE (t));
1f070f2b 4930 error ("redefinition of %q#T", t);
2ef16140
MM
4931 popclass ();
4932 return;
4933 }
4934
2ef16140
MM
4935 /* If this type was previously laid out as a forward reference,
4936 make sure we lay it out again. */
2ef16140 4937 TYPE_SIZE (t) = NULL_TREE;
911a71a7 4938 CLASSTYPE_PRIMARY_BINFO (t) = NULL_TREE;
2ef16140 4939
6d0a3f67 4940 fixup_inline_methods (t);
c8094d83 4941
5ec1192e
MM
4942 /* Make assumptions about the class; we'll reset the flags if
4943 necessary. */
58731fd1
MM
4944 CLASSTYPE_EMPTY_P (t) = 1;
4945 CLASSTYPE_NEARLY_EMPTY_P (t) = 1;
5ec1192e 4946 CLASSTYPE_CONTAINS_EMPTY_CLASS_P (t) = 0;
58731fd1 4947
2ef16140 4948 /* Do end-of-class semantic processing: checking the validity of the
03702748 4949 bases and members and add implicitly generated methods. */
58731fd1 4950 check_bases_and_members (t);
2ef16140 4951
f4f206f4 4952 /* Find the key method. */
a63996f1 4953 if (TYPE_CONTAINS_VPTR_P (t))
9aad8f83 4954 {
af287697
MM
4955 /* The Itanium C++ ABI permits the key method to be chosen when
4956 the class is defined -- even though the key method so
4957 selected may later turn out to be an inline function. On
4958 some systems (such as ARM Symbian OS) the key method cannot
4959 be determined until the end of the translation unit. On such
4960 systems, we leave CLASSTYPE_KEY_METHOD set to NULL, which
4961 will cause the class to be added to KEYED_CLASSES. Then, in
4962 finish_file we will determine the key method. */
4963 if (targetm.cxx.key_method_may_be_inline ())
4964 determine_key_method (t);
9aad8f83
MA
4965
4966 /* If a polymorphic class has no key method, we may emit the vtable
9bcb9aae 4967 in every translation unit where the class definition appears. */
9aad8f83
MA
4968 if (CLASSTYPE_KEY_METHOD (t) == NULL_TREE)
4969 keyed_classes = tree_cons (NULL_TREE, t, keyed_classes);
4970 }
4971
2ef16140 4972 /* Layout the class itself. */
e93ee644 4973 layout_class_type (t, &virtuals);
a0c68737
NS
4974 if (CLASSTYPE_AS_BASE (t) != t)
4975 /* We use the base type for trivial assignments, and hence it
4976 needs a mode. */
4977 compute_record_mode (CLASSTYPE_AS_BASE (t));
8ebeee52 4978
e93ee644 4979 virtuals = modify_all_vtables (t, nreverse (virtuals));
db5ae43f 4980
5e19c053 4981 /* If necessary, create the primary vtable for this class. */
e6858a84 4982 if (virtuals || TYPE_CONTAINS_VPTR_P (t))
8d08fdba 4983 {
8d08fdba 4984 /* We must enter these virtuals into the table. */
3ef397c1 4985 if (!CLASSTYPE_HAS_PRIMARY_BASE_P (t))
da3d4dfa 4986 build_primary_vtable (NULL_TREE, t);
dbbf88d1 4987 else if (! BINFO_NEW_VTABLE_MARKED (TYPE_BINFO (t)))
0533d788
MM
4988 /* Here we know enough to change the type of our virtual
4989 function table, but we will wait until later this function. */
28531dd0 4990 build_primary_vtable (CLASSTYPE_PRIMARY_BINFO (t), t);
8d08fdba
MS
4991 }
4992
bbd15aac 4993 if (TYPE_CONTAINS_VPTR_P (t))
8d08fdba 4994 {
e93ee644
MM
4995 int vindex;
4996 tree fn;
4997
604a3205 4998 if (BINFO_VTABLE (TYPE_BINFO (t)))
50bc768d 4999 gcc_assert (DECL_VIRTUAL_P (BINFO_VTABLE (TYPE_BINFO (t))));
1eb4bea9 5000 if (!CLASSTYPE_HAS_PRIMARY_BASE_P (t))
50bc768d 5001 gcc_assert (BINFO_VIRTUALS (TYPE_BINFO (t)) == NULL_TREE);
1eb4bea9 5002
e6858a84 5003 /* Add entries for virtual functions introduced by this class. */
604a3205
NS
5004 BINFO_VIRTUALS (TYPE_BINFO (t))
5005 = chainon (BINFO_VIRTUALS (TYPE_BINFO (t)), virtuals);
e93ee644
MM
5006
5007 /* Set DECL_VINDEX for all functions declared in this class. */
c8094d83
MS
5008 for (vindex = 0, fn = BINFO_VIRTUALS (TYPE_BINFO (t));
5009 fn;
5010 fn = TREE_CHAIN (fn),
e93ee644
MM
5011 vindex += (TARGET_VTABLE_USES_DESCRIPTORS
5012 ? TARGET_VTABLE_USES_DESCRIPTORS : 1))
4977bab6
ZW
5013 {
5014 tree fndecl = BV_FN (fn);
5015
5016 if (DECL_THUNK_P (fndecl))
5017 /* A thunk. We should never be calling this entry directly
5018 from this vtable -- we'd use the entry for the non
5019 thunk base function. */
5020 DECL_VINDEX (fndecl) = NULL_TREE;
5021 else if (TREE_CODE (DECL_VINDEX (fndecl)) != INTEGER_CST)
7d60be94 5022 DECL_VINDEX (fndecl) = build_int_cst (NULL_TREE, vindex);
4977bab6 5023 }
8d08fdba
MS
5024 }
5025
d2c5305b 5026 finish_struct_bits (t);
8d08fdba 5027
f30432d7
MS
5028 /* Complete the rtl for any static member objects of the type we're
5029 working on. */
58010b57 5030 for (x = TYPE_FIELDS (t); x; x = TREE_CHAIN (x))
19e7881c 5031 if (TREE_CODE (x) == VAR_DECL && TREE_STATIC (x)
c7f4981a 5032 && same_type_p (TYPE_MAIN_VARIANT (TREE_TYPE (x)), t))
19e7881c 5033 DECL_MODE (x) = TYPE_MODE (t);
8d08fdba 5034
f90cdf34 5035 /* Done with FIELDS...now decide whether to sort these for
58010b57 5036 faster lookups later.
f90cdf34 5037
6c73ad72 5038 We use a small number because most searches fail (succeeding
f90cdf34
MT
5039 ultimately as the search bores through the inheritance
5040 hierarchy), and we want this failure to occur quickly. */
5041
58010b57
MM
5042 n_fields = count_fields (TYPE_FIELDS (t));
5043 if (n_fields > 7)
f90cdf34 5044 {
99dd239f 5045 struct sorted_fields_type *field_vec = GGC_NEWVAR
0cbd7506
MS
5046 (struct sorted_fields_type,
5047 sizeof (struct sorted_fields_type) + n_fields * sizeof (tree));
d07605f5
AP
5048 field_vec->len = n_fields;
5049 add_fields_to_record_type (TYPE_FIELDS (t), field_vec, 0);
5050 qsort (field_vec->elts, n_fields, sizeof (tree),
17211ab5 5051 field_decl_cmp);
f90cdf34
MT
5052 if (! DECL_LANG_SPECIFIC (TYPE_MAIN_DECL (t)))
5053 retrofit_lang_decl (TYPE_MAIN_DECL (t));
5054 DECL_SORTED_FIELDS (TYPE_MAIN_DECL (t)) = field_vec;
5055 }
5056
8d7a5379
MM
5057 /* Make the rtl for any new vtables we have created, and unmark
5058 the base types we marked. */
5059 finish_vtbls (t);
c8094d83 5060
23656158
MM
5061 /* Build the VTT for T. */
5062 build_vtt (t);
8d7a5379 5063
f03e8526
MM
5064 /* This warning does not make sense for Java classes, since they
5065 cannot have destructors. */
5066 if (!TYPE_FOR_JAVA (t) && warn_nonvdtor && TYPE_POLYMORPHIC_P (t))
9fd8f60d 5067 {
9f4faeae
MM
5068 tree dtor;
5069
5070 dtor = CLASSTYPE_DESTRUCTORS (t);
5071 /* Warn only if the dtor is non-private or the class has
5072 friends. */
5073 if (/* An implicitly declared destructor is always public. And,
5074 if it were virtual, we would have created it by now. */
5075 !dtor
5076 || (!DECL_VINDEX (dtor)
c8094d83
MS
5077 && (!TREE_PRIVATE (dtor)
5078 || CLASSTYPE_FRIEND_CLASSES (t)
9f4faeae 5079 || DECL_FRIENDLIST (TYPE_MAIN_DECL (t)))))
c8094d83 5080 warning (0, "%q#T has virtual functions but non-virtual destructor",
9f4faeae 5081 t);
9fd8f60d 5082 }
8d08fdba 5083
0154eaa8 5084 complete_vars (t);
8d08fdba 5085
9e9ff709
MS
5086 if (warn_overloaded_virtual)
5087 warn_hidden (t);
8d08fdba 5088
43d9ad1d
DS
5089 /* Class layout, assignment of virtual table slots, etc., is now
5090 complete. Give the back end a chance to tweak the visibility of
5091 the class or perform any other required target modifications. */
5092 targetm.cxx.adjust_class_at_definition (t);
5093
ae673f14 5094 maybe_suppress_debug_info (t);
8d08fdba 5095
b7442fb5 5096 dump_class_hierarchy (t);
c8094d83 5097
d2e5ee5c 5098 /* Finish debugging output for this type. */
881c6935 5099 rest_of_type_compilation (t, ! LOCAL_CLASS_P (t));
8d08fdba 5100}
f30432d7 5101
61a127b3
MM
5102/* When T was built up, the member declarations were added in reverse
5103 order. Rearrange them to declaration order. */
5104
5105void
94edc4ab 5106unreverse_member_declarations (tree t)
61a127b3
MM
5107{
5108 tree next;
5109 tree prev;
5110 tree x;
5111
7088fca9
KL
5112 /* The following lists are all in reverse order. Put them in
5113 declaration order now. */
61a127b3 5114 TYPE_METHODS (t) = nreverse (TYPE_METHODS (t));
7088fca9 5115 CLASSTYPE_DECL_LIST (t) = nreverse (CLASSTYPE_DECL_LIST (t));
61a127b3
MM
5116
5117 /* Actually, for the TYPE_FIELDS, only the non TYPE_DECLs are in
5118 reverse order, so we can't just use nreverse. */
5119 prev = NULL_TREE;
c8094d83
MS
5120 for (x = TYPE_FIELDS (t);
5121 x && TREE_CODE (x) != TYPE_DECL;
61a127b3
MM
5122 x = next)
5123 {
5124 next = TREE_CHAIN (x);
5125 TREE_CHAIN (x) = prev;
5126 prev = x;
5127 }
5128 if (prev)
5129 {
5130 TREE_CHAIN (TYPE_FIELDS (t)) = x;
5131 if (prev)
5132 TYPE_FIELDS (t) = prev;
5133 }
5134}
5135
f30432d7 5136tree
94edc4ab 5137finish_struct (tree t, tree attributes)
f30432d7 5138{
82a98427 5139 location_t saved_loc = input_location;
1f0d71c5 5140
61a127b3
MM
5141 /* Now that we've got all the field declarations, reverse everything
5142 as necessary. */
5143 unreverse_member_declarations (t);
f30432d7 5144
91d231cb 5145 cplus_decl_attributes (&t, attributes, (int) ATTR_FLAG_TYPE_IN_PLACE);
6467930b 5146
1f0d71c5
NS
5147 /* Nadger the current location so that diagnostics point to the start of
5148 the struct, not the end. */
f31686a3 5149 input_location = DECL_SOURCE_LOCATION (TYPE_NAME (t));
1f0d71c5 5150
5566b478 5151 if (processing_template_decl)
f30432d7 5152 {
7fb213d8
GB
5153 tree x;
5154
b0e0b31f 5155 finish_struct_methods (t);
867580ce 5156 TYPE_SIZE (t) = bitsize_zero_node;
ae54ec16 5157 TYPE_SIZE_UNIT (t) = size_zero_node;
7fb213d8
GB
5158
5159 /* We need to emit an error message if this type was used as a parameter
5160 and it is an abstract type, even if it is a template. We construct
5161 a simple CLASSTYPE_PURE_VIRTUALS list without taking bases into
5162 account and we call complete_vars with this type, which will check
5163 the PARM_DECLS. Note that while the type is being defined,
5164 CLASSTYPE_PURE_VIRTUALS contains the list of the inline friends
5165 (see CLASSTYPE_INLINE_FRIENDS) so we need to clear it. */
585b44d3 5166 CLASSTYPE_PURE_VIRTUALS (t) = NULL;
7fb213d8
GB
5167 for (x = TYPE_METHODS (t); x; x = TREE_CHAIN (x))
5168 if (DECL_PURE_VIRTUAL_P (x))
d4e6fecb 5169 VEC_safe_push (tree, gc, CLASSTYPE_PURE_VIRTUALS (t), x);
7fb213d8 5170 complete_vars (t);
6f1b4c42 5171 }
f30432d7 5172 else
9f33663b 5173 finish_struct_1 (t);
5566b478 5174
82a98427 5175 input_location = saved_loc;
1f0d71c5 5176
5566b478 5177 TYPE_BEING_DEFINED (t) = 0;
8f032717 5178
5566b478 5179 if (current_class_type)
b74a0560 5180 popclass ();
5566b478 5181 else
357351e5 5182 error ("trying to finish struct, but kicked out due to previous parse errors");
5566b478 5183
5f261ba9
MM
5184 if (processing_template_decl && at_function_scope_p ())
5185 add_stmt (build_min (TAG_DEFN, t));
ae673f14 5186
5566b478 5187 return t;
f30432d7 5188}
8d08fdba 5189\f
51ddb82e 5190/* Return the dynamic type of INSTANCE, if known.
8d08fdba
MS
5191 Used to determine whether the virtual function table is needed
5192 or not.
5193
5194 *NONNULL is set iff INSTANCE can be known to be nonnull, regardless
97d953bb
MM
5195 of our knowledge of its type. *NONNULL should be initialized
5196 before this function is called. */
e92cc029 5197
d8e178a0 5198static tree
94edc4ab 5199fixed_type_or_null (tree instance, int* nonnull, int* cdtorp)
8d08fdba
MS
5200{
5201 switch (TREE_CODE (instance))
5202 {
5203 case INDIRECT_REF:
608afcc5 5204 if (POINTER_TYPE_P (TREE_TYPE (instance)))
a0de9d20
JM
5205 return NULL_TREE;
5206 else
5207 return fixed_type_or_null (TREE_OPERAND (instance, 0),
5208 nonnull, cdtorp);
5209
8d08fdba
MS
5210 case CALL_EXPR:
5211 /* This is a call to a constructor, hence it's never zero. */
5212 if (TREE_HAS_CONSTRUCTOR (instance))
5213 {
5214 if (nonnull)
5215 *nonnull = 1;
51ddb82e 5216 return TREE_TYPE (instance);
8d08fdba 5217 }
51ddb82e 5218 return NULL_TREE;
8d08fdba
MS
5219
5220 case SAVE_EXPR:
5221 /* This is a call to a constructor, hence it's never zero. */
5222 if (TREE_HAS_CONSTRUCTOR (instance))
5223 {
5224 if (nonnull)
5225 *nonnull = 1;
51ddb82e 5226 return TREE_TYPE (instance);
8d08fdba 5227 }
394fd776 5228 return fixed_type_or_null (TREE_OPERAND (instance, 0), nonnull, cdtorp);
8d08fdba 5229
8d08fdba
MS
5230 case PLUS_EXPR:
5231 case MINUS_EXPR:
394fd776
NS
5232 if (TREE_CODE (TREE_OPERAND (instance, 0)) == ADDR_EXPR)
5233 return fixed_type_or_null (TREE_OPERAND (instance, 0), nonnull, cdtorp);
8d08fdba
MS
5234 if (TREE_CODE (TREE_OPERAND (instance, 1)) == INTEGER_CST)
5235 /* Propagate nonnull. */
f63ab951 5236 return fixed_type_or_null (TREE_OPERAND (instance, 0), nonnull, cdtorp);
51ddb82e 5237 return NULL_TREE;
8d08fdba
MS
5238
5239 case NOP_EXPR:
5240 case CONVERT_EXPR:
394fd776 5241 return fixed_type_or_null (TREE_OPERAND (instance, 0), nonnull, cdtorp);
8d08fdba
MS
5242
5243 case ADDR_EXPR:
88f19756 5244 instance = TREE_OPERAND (instance, 0);
8d08fdba 5245 if (nonnull)
88f19756
RH
5246 {
5247 /* Just because we see an ADDR_EXPR doesn't mean we're dealing
5248 with a real object -- given &p->f, p can still be null. */
5249 tree t = get_base_address (instance);
5250 /* ??? Probably should check DECL_WEAK here. */
5251 if (t && DECL_P (t))
5252 *nonnull = 1;
5253 }
5254 return fixed_type_or_null (instance, nonnull, cdtorp);
8d08fdba
MS
5255
5256 case COMPONENT_REF:
642124c6
RH
5257 /* If this component is really a base class reference, then the field
5258 itself isn't definitive. */
5259 if (DECL_FIELD_IS_BASE (TREE_OPERAND (instance, 1)))
0cbd7506 5260 return fixed_type_or_null (TREE_OPERAND (instance, 0), nonnull, cdtorp);
394fd776 5261 return fixed_type_or_null (TREE_OPERAND (instance, 1), nonnull, cdtorp);
8d08fdba 5262
8d08fdba
MS
5263 case VAR_DECL:
5264 case FIELD_DECL:
5265 if (TREE_CODE (TREE_TYPE (instance)) == ARRAY_TYPE
5266 && IS_AGGR_TYPE (TREE_TYPE (TREE_TYPE (instance))))
5267 {
5268 if (nonnull)
5269 *nonnull = 1;
51ddb82e 5270 return TREE_TYPE (TREE_TYPE (instance));
8d08fdba 5271 }
e92cc029 5272 /* fall through... */
8d08fdba
MS
5273 case TARGET_EXPR:
5274 case PARM_DECL:
f63ab951 5275 case RESULT_DECL:
8d08fdba
MS
5276 if (IS_AGGR_TYPE (TREE_TYPE (instance)))
5277 {
5278 if (nonnull)
5279 *nonnull = 1;
51ddb82e 5280 return TREE_TYPE (instance);
8d08fdba 5281 }
394fd776 5282 else if (instance == current_class_ptr)
0cbd7506
MS
5283 {
5284 if (nonnull)
5285 *nonnull = 1;
5286
5287 /* if we're in a ctor or dtor, we know our type. */
5288 if (DECL_LANG_SPECIFIC (current_function_decl)
5289 && (DECL_CONSTRUCTOR_P (current_function_decl)
5290 || DECL_DESTRUCTOR_P (current_function_decl)))
5291 {
5292 if (cdtorp)
5293 *cdtorp = 1;
5294 return TREE_TYPE (TREE_TYPE (instance));
5295 }
5296 }
394fd776 5297 else if (TREE_CODE (TREE_TYPE (instance)) == REFERENCE_TYPE)
0cbd7506
MS
5298 {
5299 /* Reference variables should be references to objects. */
5300 if (nonnull)
8d08fdba 5301 *nonnull = 1;
c8094d83 5302
772f8889
MM
5303 /* DECL_VAR_MARKED_P is used to prevent recursion; a
5304 variable's initializer may refer to the variable
5305 itself. */
c8094d83 5306 if (TREE_CODE (instance) == VAR_DECL
772f8889
MM
5307 && DECL_INITIAL (instance)
5308 && !DECL_VAR_MARKED_P (instance))
5309 {
5310 tree type;
5311 DECL_VAR_MARKED_P (instance) = 1;
5312 type = fixed_type_or_null (DECL_INITIAL (instance),
5313 nonnull, cdtorp);
5314 DECL_VAR_MARKED_P (instance) = 0;
5315 return type;
5316 }
8d08fdba 5317 }
51ddb82e 5318 return NULL_TREE;
8d08fdba
MS
5319
5320 default:
51ddb82e 5321 return NULL_TREE;
8d08fdba
MS
5322 }
5323}
51ddb82e 5324
838dfd8a 5325/* Return nonzero if the dynamic type of INSTANCE is known, and
338d90b8
NS
5326 equivalent to the static type. We also handle the case where
5327 INSTANCE is really a pointer. Return negative if this is a
5328 ctor/dtor. There the dynamic type is known, but this might not be
5329 the most derived base of the original object, and hence virtual
5330 bases may not be layed out according to this type.
51ddb82e
JM
5331
5332 Used to determine whether the virtual function table is needed
5333 or not.
5334
5335 *NONNULL is set iff INSTANCE can be known to be nonnull, regardless
97d953bb
MM
5336 of our knowledge of its type. *NONNULL should be initialized
5337 before this function is called. */
51ddb82e
JM
5338
5339int
94edc4ab 5340resolves_to_fixed_type_p (tree instance, int* nonnull)
51ddb82e
JM
5341{
5342 tree t = TREE_TYPE (instance);
394fd776 5343 int cdtorp = 0;
c8094d83 5344
394fd776 5345 tree fixed = fixed_type_or_null (instance, nonnull, &cdtorp);
51ddb82e
JM
5346 if (fixed == NULL_TREE)
5347 return 0;
5348 if (POINTER_TYPE_P (t))
5349 t = TREE_TYPE (t);
394fd776
NS
5350 if (!same_type_ignoring_top_level_qualifiers_p (t, fixed))
5351 return 0;
5352 return cdtorp ? -1 : 1;
51ddb82e
JM
5353}
5354
8d08fdba
MS
5355\f
5356void
94edc4ab 5357init_class_processing (void)
8d08fdba
MS
5358{
5359 current_class_depth = 0;
61a127b3 5360 current_class_stack_size = 10;
c8094d83 5361 current_class_stack
0ac1b889 5362 = XNEWVEC (struct class_stack_node, current_class_stack_size);
806aa901 5363 local_classes = VEC_alloc (tree, gc, 8);
c5a35c3c 5364 sizeof_biggest_empty_class = size_zero_node;
8d08fdba 5365
0e5921e8
ZW
5366 ridpointers[(int) RID_PUBLIC] = access_public_node;
5367 ridpointers[(int) RID_PRIVATE] = access_private_node;
5368 ridpointers[(int) RID_PROTECTED] = access_protected_node;
8d08fdba
MS
5369}
5370
39fb05d0
MM
5371/* Restore the cached PREVIOUS_CLASS_LEVEL. */
5372
5373static void
5374restore_class_cache (void)
5375{
39fb05d0 5376 tree type;
39fb05d0
MM
5377
5378 /* We are re-entering the same class we just left, so we don't
5379 have to search the whole inheritance matrix to find all the
5380 decls to bind again. Instead, we install the cached
5381 class_shadowed list and walk through it binding names. */
5382 push_binding_level (previous_class_level);
5383 class_binding_level = previous_class_level;
39fb05d0 5384 /* Restore IDENTIFIER_TYPE_VALUE. */
c8094d83
MS
5385 for (type = class_binding_level->type_shadowed;
5386 type;
39fb05d0
MM
5387 type = TREE_CHAIN (type))
5388 SET_IDENTIFIER_TYPE_VALUE (TREE_PURPOSE (type), TREE_TYPE (type));
5389}
5390
a723baf1
MM
5391/* Set global variables CURRENT_CLASS_NAME and CURRENT_CLASS_TYPE as
5392 appropriate for TYPE.
8d08fdba 5393
8d08fdba
MS
5394 So that we may avoid calls to lookup_name, we cache the _TYPE
5395 nodes of local TYPE_DECLs in the TREE_TYPE field of the name.
5396
5397 For multiple inheritance, we perform a two-pass depth-first search
39fb05d0 5398 of the type lattice. */
8d08fdba
MS
5399
5400void
29370796 5401pushclass (tree type)
8d08fdba 5402{
c888c93b
MM
5403 class_stack_node_t csn;
5404
7fb4a8f7 5405 type = TYPE_MAIN_VARIANT (type);
8d08fdba 5406
61a127b3 5407 /* Make sure there is enough room for the new entry on the stack. */
c8094d83 5408 if (current_class_depth + 1 >= current_class_stack_size)
8d08fdba 5409 {
61a127b3
MM
5410 current_class_stack_size *= 2;
5411 current_class_stack
7767580e
GDR
5412 = XRESIZEVEC (struct class_stack_node, current_class_stack,
5413 current_class_stack_size);
8d08fdba
MS
5414 }
5415
61a127b3 5416 /* Insert a new entry on the class stack. */
c888c93b
MM
5417 csn = current_class_stack + current_class_depth;
5418 csn->name = current_class_name;
5419 csn->type = current_class_type;
5420 csn->access = current_access_specifier;
5421 csn->names_used = 0;
5422 csn->hidden = 0;
61a127b3
MM
5423 current_class_depth++;
5424
5425 /* Now set up the new type. */
8d08fdba
MS
5426 current_class_name = TYPE_NAME (type);
5427 if (TREE_CODE (current_class_name) == TYPE_DECL)
5428 current_class_name = DECL_NAME (current_class_name);
5429 current_class_type = type;
5430
61a127b3
MM
5431 /* By default, things in classes are private, while things in
5432 structures or unions are public. */
c8094d83
MS
5433 current_access_specifier = (CLASSTYPE_DECLARED_CLASS (type)
5434 ? access_private_node
61a127b3
MM
5435 : access_public_node);
5436
89b578be
MM
5437 if (previous_class_level
5438 && type != previous_class_level->this_entity
8d08fdba
MS
5439 && current_class_depth == 1)
5440 {
5441 /* Forcibly remove any old class remnants. */
8f032717 5442 invalidate_class_lookup_cache ();
8d08fdba
MS
5443 }
5444
c8094d83 5445 if (!previous_class_level
89b578be
MM
5446 || type != previous_class_level->this_entity
5447 || current_class_depth > 1)
90ea9897 5448 pushlevel_class ();
29370796 5449 else
39fb05d0 5450 restore_class_cache ();
8f032717
MM
5451}
5452
39fb05d0
MM
5453/* When we exit a toplevel class scope, we save its binding level so
5454 that we can restore it quickly. Here, we've entered some other
5455 class, so we must invalidate our cache. */
8d08fdba 5456
8f032717 5457void
94edc4ab 5458invalidate_class_lookup_cache (void)
8f032717 5459{
89b578be 5460 previous_class_level = NULL;
8d08fdba 5461}
c8094d83 5462
8d08fdba 5463/* Get out of the current class scope. If we were in a class scope
b74a0560 5464 previously, that is the one popped to. */
e92cc029 5465
8d08fdba 5466void
94edc4ab 5467popclass (void)
8d08fdba 5468{
273a708f 5469 poplevel_class ();
8d08fdba
MS
5470
5471 current_class_depth--;
61a127b3
MM
5472 current_class_name = current_class_stack[current_class_depth].name;
5473 current_class_type = current_class_stack[current_class_depth].type;
5474 current_access_specifier = current_class_stack[current_class_depth].access;
8f032717
MM
5475 if (current_class_stack[current_class_depth].names_used)
5476 splay_tree_delete (current_class_stack[current_class_depth].names_used);
8d08fdba
MS
5477}
5478
c888c93b
MM
5479/* Mark the top of the class stack as hidden. */
5480
5481void
5482push_class_stack (void)
5483{
5484 if (current_class_depth)
5485 ++current_class_stack[current_class_depth - 1].hidden;
5486}
5487
5488/* Mark the top of the class stack as un-hidden. */
5489
5490void
5491pop_class_stack (void)
5492{
5493 if (current_class_depth)
5494 --current_class_stack[current_class_depth - 1].hidden;
5495}
5496
70adf8a9
JM
5497/* Returns 1 if current_class_type is either T or a nested type of T.
5498 We start looking from 1 because entry 0 is from global scope, and has
5499 no type. */
b9082e8a
JM
5500
5501int
94edc4ab 5502currently_open_class (tree t)
b9082e8a
JM
5503{
5504 int i;
14d22dd6 5505 if (current_class_type && same_type_p (t, current_class_type))
b9082e8a 5506 return 1;
c888c93b
MM
5507 for (i = current_class_depth - 1; i > 0; --i)
5508 {
5509 if (current_class_stack[i].hidden)
5510 break;
5511 if (current_class_stack[i].type
5512 && same_type_p (current_class_stack [i].type, t))
5513 return 1;
5514 }
b9082e8a
JM
5515 return 0;
5516}
5517
70adf8a9
JM
5518/* If either current_class_type or one of its enclosing classes are derived
5519 from T, return the appropriate type. Used to determine how we found
5520 something via unqualified lookup. */
5521
5522tree
94edc4ab 5523currently_open_derived_class (tree t)
70adf8a9
JM
5524{
5525 int i;
5526
9bcb9aae 5527 /* The bases of a dependent type are unknown. */
1fb3244a
MM
5528 if (dependent_type_p (t))
5529 return NULL_TREE;
5530
c44e68a5
KL
5531 if (!current_class_type)
5532 return NULL_TREE;
5533
70adf8a9
JM
5534 if (DERIVED_FROM_P (t, current_class_type))
5535 return current_class_type;
5536
5537 for (i = current_class_depth - 1; i > 0; --i)
c888c93b
MM
5538 {
5539 if (current_class_stack[i].hidden)
5540 break;
5541 if (DERIVED_FROM_P (t, current_class_stack[i].type))
5542 return current_class_stack[i].type;
5543 }
70adf8a9
JM
5544
5545 return NULL_TREE;
5546}
5547
8d08fdba 5548/* When entering a class scope, all enclosing class scopes' names with
14d22dd6
MM
5549 static meaning (static variables, static functions, types and
5550 enumerators) have to be visible. This recursive function calls
5551 pushclass for all enclosing class contexts until global or a local
5552 scope is reached. TYPE is the enclosed class. */
8d08fdba
MS
5553
5554void
14d22dd6 5555push_nested_class (tree type)
8d08fdba 5556{
a28e3c7f
MS
5557 tree context;
5558
b262d64c 5559 /* A namespace might be passed in error cases, like A::B:C. */
c8094d83
MS
5560 if (type == NULL_TREE
5561 || type == error_mark_node
b262d64c 5562 || TREE_CODE (type) == NAMESPACE_DECL
07c88314 5563 || ! IS_AGGR_TYPE (type)
73b0fce8 5564 || TREE_CODE (type) == TEMPLATE_TYPE_PARM
a1281f45 5565 || TREE_CODE (type) == BOUND_TEMPLATE_TEMPLATE_PARM)
a28e3c7f 5566 return;
c8094d83 5567
d2e5ee5c 5568 context = DECL_CONTEXT (TYPE_MAIN_DECL (type));
8d08fdba 5569
6b400b21 5570 if (context && CLASS_TYPE_P (context))
14d22dd6 5571 push_nested_class (context);
29370796 5572 pushclass (type);
8d08fdba
MS
5573}
5574
a723baf1 5575/* Undoes a push_nested_class call. */
8d08fdba
MS
5576
5577void
94edc4ab 5578pop_nested_class (void)
8d08fdba 5579{
d2e5ee5c 5580 tree context = DECL_CONTEXT (TYPE_MAIN_DECL (current_class_type));
8d08fdba 5581
b74a0560 5582 popclass ();
6b400b21 5583 if (context && CLASS_TYPE_P (context))
b74a0560 5584 pop_nested_class ();
8d08fdba
MS
5585}
5586
46ccf50a
JM
5587/* Returns the number of extern "LANG" blocks we are nested within. */
5588
5589int
94edc4ab 5590current_lang_depth (void)
46ccf50a 5591{
aff44741 5592 return VEC_length (tree, current_lang_base);
46ccf50a
JM
5593}
5594
8d08fdba
MS
5595/* Set global variables CURRENT_LANG_NAME to appropriate value
5596 so that behavior of name-mangling machinery is correct. */
5597
5598void
94edc4ab 5599push_lang_context (tree name)
8d08fdba 5600{
aff44741 5601 VEC_safe_push (tree, gc, current_lang_base, current_lang_name);
8d08fdba 5602
e229f2cd 5603 if (name == lang_name_cplusplus)
8d08fdba 5604 {
8d08fdba
MS
5605 current_lang_name = name;
5606 }
e229f2cd
PB
5607 else if (name == lang_name_java)
5608 {
e229f2cd
PB
5609 current_lang_name = name;
5610 /* DECL_IGNORED_P is initially set for these types, to avoid clutter.
5611 (See record_builtin_java_type in decl.c.) However, that causes
5612 incorrect debug entries if these types are actually used.
00a17e31 5613 So we re-enable debug output after extern "Java". */
e3cd9945
APB
5614 DECL_IGNORED_P (TYPE_NAME (java_byte_type_node)) = 0;
5615 DECL_IGNORED_P (TYPE_NAME (java_short_type_node)) = 0;
5616 DECL_IGNORED_P (TYPE_NAME (java_int_type_node)) = 0;
5617 DECL_IGNORED_P (TYPE_NAME (java_long_type_node)) = 0;
5618 DECL_IGNORED_P (TYPE_NAME (java_float_type_node)) = 0;
5619 DECL_IGNORED_P (TYPE_NAME (java_double_type_node)) = 0;
5620 DECL_IGNORED_P (TYPE_NAME (java_char_type_node)) = 0;
5621 DECL_IGNORED_P (TYPE_NAME (java_boolean_type_node)) = 0;
e229f2cd 5622 }
8d08fdba
MS
5623 else if (name == lang_name_c)
5624 {
8d08fdba
MS
5625 current_lang_name = name;
5626 }
5627 else
9e637a26 5628 error ("language string %<\"%E\"%> not recognized", name);
8d08fdba 5629}
c8094d83 5630
8d08fdba 5631/* Get out of the current language scope. */
e92cc029 5632
8d08fdba 5633void
94edc4ab 5634pop_lang_context (void)
8d08fdba 5635{
aff44741 5636 current_lang_name = VEC_pop (tree, current_lang_base);
8d08fdba 5637}
8d08fdba
MS
5638\f
5639/* Type instantiation routines. */
5640
104bf76a
MM
5641/* Given an OVERLOAD and a TARGET_TYPE, return the function that
5642 matches the TARGET_TYPE. If there is no satisfactory match, return
13a44ee0 5643 error_mark_node, and issue an error & warning messages under control
92af500d
NS
5644 of FLAGS. Permit pointers to member function if FLAGS permits. If
5645 TEMPLATE_ONLY, the name of the overloaded function was a
5646 template-id, and EXPLICIT_TARGS are the explicitly provided
104bf76a
MM
5647 template arguments. */
5648
2c73f9f5 5649static tree
c8094d83 5650resolve_address_of_overloaded_function (tree target_type,
94edc4ab 5651 tree overload,
92af500d
NS
5652 tsubst_flags_t flags,
5653 bool template_only,
94edc4ab 5654 tree explicit_targs)
2c73f9f5 5655{
104bf76a 5656 /* Here's what the standard says:
c8094d83 5657
104bf76a
MM
5658 [over.over]
5659
5660 If the name is a function template, template argument deduction
5661 is done, and if the argument deduction succeeds, the deduced
5662 arguments are used to generate a single template function, which
5663 is added to the set of overloaded functions considered.
5664
5665 Non-member functions and static member functions match targets of
5666 type "pointer-to-function" or "reference-to-function." Nonstatic
5667 member functions match targets of type "pointer-to-member
5668 function;" the function type of the pointer to member is used to
5669 select the member function from the set of overloaded member
5670 functions. If a nonstatic member function is selected, the
5671 reference to the overloaded function name is required to have the
5672 form of a pointer to member as described in 5.3.1.
5673
5674 If more than one function is selected, any template functions in
5675 the set are eliminated if the set also contains a non-template
5676 function, and any given template function is eliminated if the
5677 set contains a second template function that is more specialized
5678 than the first according to the partial ordering rules 14.5.5.2.
5679 After such eliminations, if any, there shall remain exactly one
5680 selected function. */
5681
5682 int is_ptrmem = 0;
5683 int is_reference = 0;
5684 /* We store the matches in a TREE_LIST rooted here. The functions
5685 are the TREE_PURPOSE, not the TREE_VALUE, in this list, for easy
5686 interoperability with most_specialized_instantiation. */
5687 tree matches = NULL_TREE;
50714e79 5688 tree fn;
104bf76a 5689
d8f8dca1
MM
5690 /* By the time we get here, we should be seeing only real
5691 pointer-to-member types, not the internal POINTER_TYPE to
5692 METHOD_TYPE representation. */
50bc768d
NS
5693 gcc_assert (TREE_CODE (target_type) != POINTER_TYPE
5694 || TREE_CODE (TREE_TYPE (target_type)) != METHOD_TYPE);
104bf76a 5695
50bc768d 5696 gcc_assert (is_overloaded_fn (overload));
c8094d83 5697
104bf76a
MM
5698 /* Check that the TARGET_TYPE is reasonable. */
5699 if (TYPE_PTRFN_P (target_type))
381ddaa6 5700 /* This is OK. */;
104bf76a
MM
5701 else if (TYPE_PTRMEMFUNC_P (target_type))
5702 /* This is OK, too. */
5703 is_ptrmem = 1;
5704 else if (TREE_CODE (target_type) == FUNCTION_TYPE)
5705 {
5706 /* This is OK, too. This comes from a conversion to reference
5707 type. */
5708 target_type = build_reference_type (target_type);
5709 is_reference = 1;
5710 }
c8094d83 5711 else
104bf76a 5712 {
92af500d 5713 if (flags & tf_error)
c4f73174 5714 error ("cannot resolve overloaded function %qD based on"
0cbd7506
MS
5715 " conversion to type %qT",
5716 DECL_NAME (OVL_FUNCTION (overload)), target_type);
104bf76a
MM
5717 return error_mark_node;
5718 }
c8094d83 5719
104bf76a
MM
5720 /* If we can find a non-template function that matches, we can just
5721 use it. There's no point in generating template instantiations
5722 if we're just going to throw them out anyhow. But, of course, we
5723 can only do this when we don't *need* a template function. */
5724 if (!template_only)
5725 {
5726 tree fns;
5727
a723baf1 5728 for (fns = overload; fns; fns = OVL_NEXT (fns))
104bf76a 5729 {
a723baf1 5730 tree fn = OVL_CURRENT (fns);
104bf76a 5731 tree fntype;
2c73f9f5 5732
104bf76a
MM
5733 if (TREE_CODE (fn) == TEMPLATE_DECL)
5734 /* We're not looking for templates just yet. */
5735 continue;
5736
5737 if ((TREE_CODE (TREE_TYPE (fn)) == METHOD_TYPE)
5738 != is_ptrmem)
5739 /* We're looking for a non-static member, and this isn't
5740 one, or vice versa. */
5741 continue;
34ff2673 5742
d63d5d0c
ILT
5743 /* Ignore functions which haven't been explicitly
5744 declared. */
34ff2673
RS
5745 if (DECL_ANTICIPATED (fn))
5746 continue;
5747
104bf76a
MM
5748 /* See if there's a match. */
5749 fntype = TREE_TYPE (fn);
5750 if (is_ptrmem)
5751 fntype = build_ptrmemfunc_type (build_pointer_type (fntype));
5752 else if (!is_reference)
5753 fntype = build_pointer_type (fntype);
5754
30f86ec3 5755 if (can_convert_arg (target_type, fntype, fn, LOOKUP_NORMAL))
e1b3e07d 5756 matches = tree_cons (fn, NULL_TREE, matches);
104bf76a
MM
5757 }
5758 }
5759
5760 /* Now, if we've already got a match (or matches), there's no need
5761 to proceed to the template functions. But, if we don't have a
5762 match we need to look at them, too. */
c8094d83 5763 if (!matches)
2c73f9f5 5764 {
104bf76a
MM
5765 tree target_fn_type;
5766 tree target_arg_types;
8d3631f8 5767 tree target_ret_type;
104bf76a
MM
5768 tree fns;
5769
5770 if (is_ptrmem)
4393e105
MM
5771 target_fn_type
5772 = TREE_TYPE (TYPE_PTRMEMFUNC_FN_TYPE (target_type));
2c73f9f5 5773 else
4393e105
MM
5774 target_fn_type = TREE_TYPE (target_type);
5775 target_arg_types = TYPE_ARG_TYPES (target_fn_type);
8d3631f8 5776 target_ret_type = TREE_TYPE (target_fn_type);
e5214479
JM
5777
5778 /* Never do unification on the 'this' parameter. */
5779 if (TREE_CODE (target_fn_type) == METHOD_TYPE)
5780 target_arg_types = TREE_CHAIN (target_arg_types);
c8094d83 5781
a723baf1 5782 for (fns = overload; fns; fns = OVL_NEXT (fns))
104bf76a 5783 {
a723baf1 5784 tree fn = OVL_CURRENT (fns);
104bf76a
MM
5785 tree instantiation;
5786 tree instantiation_type;
5787 tree targs;
5788
5789 if (TREE_CODE (fn) != TEMPLATE_DECL)
5790 /* We're only looking for templates. */
5791 continue;
5792
5793 if ((TREE_CODE (TREE_TYPE (fn)) == METHOD_TYPE)
5794 != is_ptrmem)
4393e105 5795 /* We're not looking for a non-static member, and this is
104bf76a
MM
5796 one, or vice versa. */
5797 continue;
5798
104bf76a 5799 /* Try to do argument deduction. */
f31c0a32 5800 targs = make_tree_vec (DECL_NTPARMS (fn));
4393e105 5801 if (fn_type_unification (fn, explicit_targs, targs,
8d3631f8 5802 target_arg_types, target_ret_type,
30f86ec3 5803 DEDUCE_EXACT, LOOKUP_NORMAL))
104bf76a
MM
5804 /* Argument deduction failed. */
5805 continue;
5806
5807 /* Instantiate the template. */
92af500d 5808 instantiation = instantiate_template (fn, targs, flags);
104bf76a
MM
5809 if (instantiation == error_mark_node)
5810 /* Instantiation failed. */
5811 continue;
5812
5813 /* See if there's a match. */
5814 instantiation_type = TREE_TYPE (instantiation);
5815 if (is_ptrmem)
c8094d83 5816 instantiation_type =
104bf76a
MM
5817 build_ptrmemfunc_type (build_pointer_type (instantiation_type));
5818 else if (!is_reference)
5819 instantiation_type = build_pointer_type (instantiation_type);
30f86ec3
FJ
5820 if (can_convert_arg (target_type, instantiation_type, instantiation,
5821 LOOKUP_NORMAL))
e1b3e07d 5822 matches = tree_cons (instantiation, fn, matches);
104bf76a
MM
5823 }
5824
5825 /* Now, remove all but the most specialized of the matches. */
5826 if (matches)
5827 {
e5214479 5828 tree match = most_specialized_instantiation (matches);
104bf76a
MM
5829
5830 if (match != error_mark_node)
7ca383e6
MM
5831 matches = tree_cons (TREE_PURPOSE (match),
5832 NULL_TREE,
5833 NULL_TREE);
104bf76a
MM
5834 }
5835 }
5836
5837 /* Now we should have exactly one function in MATCHES. */
5838 if (matches == NULL_TREE)
5839 {
5840 /* There were *no* matches. */
92af500d 5841 if (flags & tf_error)
104bf76a 5842 {
0cbd7506
MS
5843 error ("no matches converting function %qD to type %q#T",
5844 DECL_NAME (OVL_FUNCTION (overload)),
5845 target_type);
6b9b6b15
JM
5846
5847 /* print_candidates expects a chain with the functions in
0cbd7506
MS
5848 TREE_VALUE slots, so we cons one up here (we're losing anyway,
5849 so why be clever?). */
5850 for (; overload; overload = OVL_NEXT (overload))
5851 matches = tree_cons (NULL_TREE, OVL_CURRENT (overload),
e1b3e07d 5852 matches);
c8094d83 5853
6b9b6b15 5854 print_candidates (matches);
104bf76a
MM
5855 }
5856 return error_mark_node;
2c73f9f5 5857 }
104bf76a
MM
5858 else if (TREE_CHAIN (matches))
5859 {
5860 /* There were too many matches. */
5861
92af500d 5862 if (flags & tf_error)
104bf76a
MM
5863 {
5864 tree match;
5865
0cbd7506 5866 error ("converting overloaded function %qD to type %q#T is ambiguous",
104bf76a
MM
5867 DECL_NAME (OVL_FUNCTION (overload)),
5868 target_type);
5869
5870 /* Since print_candidates expects the functions in the
5871 TREE_VALUE slot, we flip them here. */
5872 for (match = matches; match; match = TREE_CHAIN (match))
5873 TREE_VALUE (match) = TREE_PURPOSE (match);
5874
5875 print_candidates (matches);
5876 }
c8094d83 5877
104bf76a
MM
5878 return error_mark_node;
5879 }
5880
50714e79
MM
5881 /* Good, exactly one match. Now, convert it to the correct type. */
5882 fn = TREE_PURPOSE (matches);
5883
b1ce3eb2 5884 if (DECL_NONSTATIC_MEMBER_FUNCTION_P (fn)
92af500d 5885 && !(flags & tf_ptrmem_ok) && !flag_ms_extensions)
19420d00 5886 {
b1ce3eb2 5887 static int explained;
c8094d83 5888
92af500d 5889 if (!(flags & tf_error))
0cbd7506 5890 return error_mark_node;
19420d00 5891
1f070f2b 5892 pedwarn ("assuming pointer to member %qD", fn);
b1ce3eb2 5893 if (!explained)
0cbd7506
MS
5894 {
5895 pedwarn ("(a pointer to member can only be formed with %<&%E%>)", fn);
5896 explained = 1;
5897 }
19420d00 5898 }
84583208
MM
5899
5900 /* If we're doing overload resolution purely for the purpose of
5901 determining conversion sequences, we should not consider the
5902 function used. If this conversion sequence is selected, the
5903 function will be marked as used at this point. */
5904 if (!(flags & tf_conv))
5905 mark_used (fn);
a6ecf8b6 5906
50714e79
MM
5907 if (TYPE_PTRFN_P (target_type) || TYPE_PTRMEMFUNC_P (target_type))
5908 return build_unary_op (ADDR_EXPR, fn, 0);
5909 else
5910 {
5911 /* The target must be a REFERENCE_TYPE. Above, build_unary_op
5912 will mark the function as addressed, but here we must do it
5913 explicitly. */
dffd7eb6 5914 cxx_mark_addressable (fn);
50714e79
MM
5915
5916 return fn;
5917 }
2c73f9f5
ML
5918}
5919
ec255269
MS
5920/* This function will instantiate the type of the expression given in
5921 RHS to match the type of LHSTYPE. If errors exist, then return
92af500d 5922 error_mark_node. FLAGS is a bit mask. If TF_ERROR is set, then
5e76004e
NS
5923 we complain on errors. If we are not complaining, never modify rhs,
5924 as overload resolution wants to try many possible instantiations, in
5925 the hope that at least one will work.
c8094d83 5926
e6e174e5
JM
5927 For non-recursive calls, LHSTYPE should be a function, pointer to
5928 function, or a pointer to member function. */
e92cc029 5929
8d08fdba 5930tree
94edc4ab 5931instantiate_type (tree lhstype, tree rhs, tsubst_flags_t flags)
8d08fdba 5932{
92af500d 5933 tsubst_flags_t flags_in = flags;
c8094d83 5934
c2ea3a40 5935 flags &= ~tf_ptrmem_ok;
c8094d83 5936
8d08fdba
MS
5937 if (TREE_CODE (lhstype) == UNKNOWN_TYPE)
5938 {
92af500d 5939 if (flags & tf_error)
8251199e 5940 error ("not enough type information");
8d08fdba
MS
5941 return error_mark_node;
5942 }
5943
5944 if (TREE_TYPE (rhs) != NULL_TREE && ! (type_unknown_p (rhs)))
abff8e06 5945 {
8f4b394d 5946 if (same_type_p (lhstype, TREE_TYPE (rhs)))
abff8e06 5947 return rhs;
c8094d83 5948 if (flag_ms_extensions
a723baf1
MM
5949 && TYPE_PTRMEMFUNC_P (lhstype)
5950 && !TYPE_PTRMEMFUNC_P (TREE_TYPE (rhs)))
5951 /* Microsoft allows `A::f' to be resolved to a
5952 pointer-to-member. */
5953 ;
5954 else
5955 {
92af500d 5956 if (flags & tf_error)
1f070f2b 5957 error ("argument of type %qT does not match %qT",
a723baf1
MM
5958 TREE_TYPE (rhs), lhstype);
5959 return error_mark_node;
5960 }
abff8e06 5961 }
8d08fdba 5962
50ad9642
MM
5963 if (TREE_CODE (rhs) == BASELINK)
5964 rhs = BASELINK_FUNCTIONS (rhs);
5965
5ae9ba3e
MM
5966 /* If we are in a template, and have a NON_DEPENDENT_EXPR, we cannot
5967 deduce any type information. */
5968 if (TREE_CODE (rhs) == NON_DEPENDENT_EXPR)
5969 {
5970 if (flags & tf_error)
5971 error ("not enough type information");
5972 return error_mark_node;
5973 }
5974
2c73f9f5
ML
5975 /* We don't overwrite rhs if it is an overloaded function.
5976 Copying it would destroy the tree link. */
5977 if (TREE_CODE (rhs) != OVERLOAD)
5978 rhs = copy_node (rhs);
c73964b2 5979
8d08fdba
MS
5980 /* This should really only be used when attempting to distinguish
5981 what sort of a pointer to function we have. For now, any
5982 arithmetic operation which is not supported on pointers
5983 is rejected as an error. */
5984
5985 switch (TREE_CODE (rhs))
5986 {
5987 case TYPE_EXPR:
5988 case CONVERT_EXPR:
5989 case SAVE_EXPR:
5990 case CONSTRUCTOR:
8dc2b103 5991 gcc_unreachable ();
8d08fdba
MS
5992
5993 case INDIRECT_REF:
5994 case ARRAY_REF:
ec255269
MS
5995 {
5996 tree new_rhs;
8d08fdba 5997
ec255269 5998 new_rhs = instantiate_type (build_pointer_type (lhstype),
940ff223 5999 TREE_OPERAND (rhs, 0), flags);
ec255269
MS
6000 if (new_rhs == error_mark_node)
6001 return error_mark_node;
6002
6003 TREE_TYPE (rhs) = lhstype;
6004 TREE_OPERAND (rhs, 0) = new_rhs;
6005 return rhs;
6006 }
8d08fdba
MS
6007
6008 case NOP_EXPR:
6009 rhs = copy_node (TREE_OPERAND (rhs, 0));
6010 TREE_TYPE (rhs) = unknown_type_node;
940ff223 6011 return instantiate_type (lhstype, rhs, flags);
8d08fdba
MS
6012
6013 case COMPONENT_REF:
92af500d 6014 {
5ae9ba3e 6015 tree member = TREE_OPERAND (rhs, 1);
92af500d 6016
5ae9ba3e
MM
6017 member = instantiate_type (lhstype, member, flags);
6018 if (member != error_mark_node
92af500d 6019 && TREE_SIDE_EFFECTS (TREE_OPERAND (rhs, 0)))
04c06002 6020 /* Do not lose object's side effects. */
5ae9ba3e
MM
6021 return build2 (COMPOUND_EXPR, TREE_TYPE (member),
6022 TREE_OPERAND (rhs, 0), member);
6023 return member;
92af500d 6024 }
8d08fdba 6025
2a238a97 6026 case OFFSET_REF:
05e0b2f4
JM
6027 rhs = TREE_OPERAND (rhs, 1);
6028 if (BASELINK_P (rhs))
92af500d 6029 return instantiate_type (lhstype, BASELINK_FUNCTIONS (rhs), flags_in);
05e0b2f4 6030
2a238a97
MM
6031 /* This can happen if we are forming a pointer-to-member for a
6032 member template. */
50bc768d 6033 gcc_assert (TREE_CODE (rhs) == TEMPLATE_ID_EXPR);
05e0b2f4 6034
2a238a97 6035 /* Fall through. */
874503bc 6036
386b8a85 6037 case TEMPLATE_ID_EXPR:
2bdb0643
JM
6038 {
6039 tree fns = TREE_OPERAND (rhs, 0);
6040 tree args = TREE_OPERAND (rhs, 1);
6041
19420d00 6042 return
92af500d
NS
6043 resolve_address_of_overloaded_function (lhstype, fns, flags_in,
6044 /*template_only=*/true,
2bdb0643 6045 args);
2bdb0643 6046 }
386b8a85 6047
2c73f9f5 6048 case OVERLOAD:
a723baf1 6049 case FUNCTION_DECL:
c8094d83 6050 return
92af500d
NS
6051 resolve_address_of_overloaded_function (lhstype, rhs, flags_in,
6052 /*template_only=*/false,
104bf76a 6053 /*explicit_targs=*/NULL_TREE);
2c73f9f5 6054
8d08fdba
MS
6055 case CALL_EXPR:
6056 /* This is too hard for now. */
8dc2b103 6057 gcc_unreachable ();
8d08fdba
MS
6058
6059 case PLUS_EXPR:
6060 case MINUS_EXPR:
6061 case COMPOUND_EXPR:
a0a33927 6062 TREE_OPERAND (rhs, 0)
940ff223 6063 = instantiate_type (lhstype, TREE_OPERAND (rhs, 0), flags);
8d08fdba
MS
6064 if (TREE_OPERAND (rhs, 0) == error_mark_node)
6065 return error_mark_node;
a0a33927 6066 TREE_OPERAND (rhs, 1)
940ff223 6067 = instantiate_type (lhstype, TREE_OPERAND (rhs, 1), flags);
8d08fdba
MS
6068 if (TREE_OPERAND (rhs, 1) == error_mark_node)
6069 return error_mark_node;
6070
6071 TREE_TYPE (rhs) = lhstype;
6072 return rhs;
6073
6074 case MULT_EXPR:
6075 case TRUNC_DIV_EXPR:
6076 case FLOOR_DIV_EXPR:
6077 case CEIL_DIV_EXPR:
6078 case ROUND_DIV_EXPR:
6079 case RDIV_EXPR:
6080 case TRUNC_MOD_EXPR:
6081 case FLOOR_MOD_EXPR:
6082 case CEIL_MOD_EXPR:
6083 case ROUND_MOD_EXPR:
6084 case FIX_ROUND_EXPR:
6085 case FIX_FLOOR_EXPR:
6086 case FIX_CEIL_EXPR:
6087 case FIX_TRUNC_EXPR:
6088 case FLOAT_EXPR:
6089 case NEGATE_EXPR:
6090 case ABS_EXPR:
6091 case MAX_EXPR:
6092 case MIN_EXPR:
8d08fdba
MS
6093
6094 case BIT_AND_EXPR:
6095 case BIT_IOR_EXPR:
6096 case BIT_XOR_EXPR:
6097 case LSHIFT_EXPR:
6098 case RSHIFT_EXPR:
6099 case LROTATE_EXPR:
6100 case RROTATE_EXPR:
6101
6102 case PREINCREMENT_EXPR:
6103 case PREDECREMENT_EXPR:
6104 case POSTINCREMENT_EXPR:
6105 case POSTDECREMENT_EXPR:
92af500d 6106 if (flags & tf_error)
8251199e 6107 error ("invalid operation on uninstantiated type");
8d08fdba
MS
6108 return error_mark_node;
6109
6110 case TRUTH_AND_EXPR:
6111 case TRUTH_OR_EXPR:
6112 case TRUTH_XOR_EXPR:
6113 case LT_EXPR:
6114 case LE_EXPR:
6115 case GT_EXPR:
6116 case GE_EXPR:
6117 case EQ_EXPR:
6118 case NE_EXPR:
6119 case TRUTH_ANDIF_EXPR:
6120 case TRUTH_ORIF_EXPR:
6121 case TRUTH_NOT_EXPR:
92af500d 6122 if (flags & tf_error)
8251199e 6123 error ("not enough type information");
8d08fdba
MS
6124 return error_mark_node;
6125
ca36f057
MM
6126 case COND_EXPR:
6127 if (type_unknown_p (TREE_OPERAND (rhs, 0)))
6128 {
92af500d 6129 if (flags & tf_error)
ca36f057
MM
6130 error ("not enough type information");
6131 return error_mark_node;
6132 }
6133 TREE_OPERAND (rhs, 1)
6134 = instantiate_type (lhstype, TREE_OPERAND (rhs, 1), flags);
6135 if (TREE_OPERAND (rhs, 1) == error_mark_node)
6136 return error_mark_node;
6137 TREE_OPERAND (rhs, 2)
6138 = instantiate_type (lhstype, TREE_OPERAND (rhs, 2), flags);
6139 if (TREE_OPERAND (rhs, 2) == error_mark_node)
6140 return error_mark_node;
6141
6142 TREE_TYPE (rhs) = lhstype;
6143 return rhs;
6144
6145 case MODIFY_EXPR:
6146 TREE_OPERAND (rhs, 1)
6147 = instantiate_type (lhstype, TREE_OPERAND (rhs, 1), flags);
6148 if (TREE_OPERAND (rhs, 1) == error_mark_node)
6149 return error_mark_node;
6150
6151 TREE_TYPE (rhs) = lhstype;
6152 return rhs;
c8094d83 6153
ca36f057 6154 case ADDR_EXPR:
19420d00
NS
6155 {
6156 if (PTRMEM_OK_P (rhs))
0cbd7506 6157 flags |= tf_ptrmem_ok;
c8094d83 6158
ca36f057 6159 return instantiate_type (lhstype, TREE_OPERAND (rhs, 0), flags);
19420d00 6160 }
ca36f057
MM
6161
6162 case ERROR_MARK:
6163 return error_mark_node;
6164
6165 default:
8dc2b103 6166 gcc_unreachable ();
ca36f057 6167 }
8dc2b103 6168 return error_mark_node;
ca36f057
MM
6169}
6170\f
6171/* Return the name of the virtual function pointer field
6172 (as an IDENTIFIER_NODE) for the given TYPE. Note that
6173 this may have to look back through base types to find the
6174 ultimate field name. (For single inheritance, these could
6175 all be the same name. Who knows for multiple inheritance). */
6176
6177static tree
94edc4ab 6178get_vfield_name (tree type)
ca36f057 6179{
37a247a0 6180 tree binfo, base_binfo;
ca36f057
MM
6181 char *buf;
6182
37a247a0 6183 for (binfo = TYPE_BINFO (type);
fa743e8c 6184 BINFO_N_BASE_BINFOS (binfo);
37a247a0
NS
6185 binfo = base_binfo)
6186 {
6187 base_binfo = BINFO_BASE_BINFO (binfo, 0);
ca36f057 6188
37a247a0
NS
6189 if (BINFO_VIRTUAL_P (base_binfo)
6190 || !TYPE_CONTAINS_VPTR_P (BINFO_TYPE (base_binfo)))
6191 break;
6192 }
c8094d83 6193
ca36f057 6194 type = BINFO_TYPE (binfo);
67f5655f
GDR
6195 buf = (char *) alloca (sizeof (VFIELD_NAME_FORMAT)
6196 + TYPE_NAME_LENGTH (type) + 2);
ea122333
JM
6197 sprintf (buf, VFIELD_NAME_FORMAT,
6198 IDENTIFIER_POINTER (constructor_name (type)));
ca36f057
MM
6199 return get_identifier (buf);
6200}
6201
6202void
94edc4ab 6203print_class_statistics (void)
ca36f057
MM
6204{
6205#ifdef GATHER_STATISTICS
6206 fprintf (stderr, "convert_harshness = %d\n", n_convert_harshness);
6207 fprintf (stderr, "compute_conversion_costs = %d\n", n_compute_conversion_costs);
ca36f057
MM
6208 if (n_vtables)
6209 {
6210 fprintf (stderr, "vtables = %d; vtable searches = %d\n",
6211 n_vtables, n_vtable_searches);
6212 fprintf (stderr, "vtable entries = %d; vtable elems = %d\n",
6213 n_vtable_entries, n_vtable_elems);
6214 }
6215#endif
6216}
6217
6218/* Build a dummy reference to ourselves so Derived::Base (and A::A) works,
6219 according to [class]:
0cbd7506 6220 The class-name is also inserted
ca36f057
MM
6221 into the scope of the class itself. For purposes of access checking,
6222 the inserted class name is treated as if it were a public member name. */
6223
6224void
94edc4ab 6225build_self_reference (void)
ca36f057
MM
6226{
6227 tree name = constructor_name (current_class_type);
6228 tree value = build_lang_decl (TYPE_DECL, name, current_class_type);
6229 tree saved_cas;
6230
6231 DECL_NONLOCAL (value) = 1;
6232 DECL_CONTEXT (value) = current_class_type;
6233 DECL_ARTIFICIAL (value) = 1;
a3d87771 6234 SET_DECL_SELF_REFERENCE_P (value);
ca36f057
MM
6235
6236 if (processing_template_decl)
6237 value = push_template_decl (value);
6238
6239 saved_cas = current_access_specifier;
6240 current_access_specifier = access_public_node;
6241 finish_member_declaration (value);
6242 current_access_specifier = saved_cas;
6243}
6244
6245/* Returns 1 if TYPE contains only padding bytes. */
6246
6247int
94edc4ab 6248is_empty_class (tree type)
ca36f057 6249{
ca36f057
MM
6250 if (type == error_mark_node)
6251 return 0;
6252
6253 if (! IS_AGGR_TYPE (type))
6254 return 0;
6255
58731fd1
MM
6256 /* In G++ 3.2, whether or not a class was empty was determined by
6257 looking at its size. */
6258 if (abi_version_at_least (2))
6259 return CLASSTYPE_EMPTY_P (type);
6260 else
6261 return integer_zerop (CLASSTYPE_SIZE (type));
ca36f057
MM
6262}
6263
956d9305
MM
6264/* Returns true if TYPE contains an empty class. */
6265
6266static bool
6267contains_empty_class_p (tree type)
6268{
6269 if (is_empty_class (type))
6270 return true;
6271 if (CLASS_TYPE_P (type))
6272 {
6273 tree field;
fa743e8c
NS
6274 tree binfo;
6275 tree base_binfo;
956d9305
MM
6276 int i;
6277
fa743e8c
NS
6278 for (binfo = TYPE_BINFO (type), i = 0;
6279 BINFO_BASE_ITERATE (binfo, i, base_binfo); ++i)
6280 if (contains_empty_class_p (BINFO_TYPE (base_binfo)))
956d9305
MM
6281 return true;
6282 for (field = TYPE_FIELDS (type); field; field = TREE_CHAIN (field))
17bbb839
MM
6283 if (TREE_CODE (field) == FIELD_DECL
6284 && !DECL_ARTIFICIAL (field)
6285 && is_empty_class (TREE_TYPE (field)))
956d9305
MM
6286 return true;
6287 }
6288 else if (TREE_CODE (type) == ARRAY_TYPE)
6289 return contains_empty_class_p (TREE_TYPE (type));
6290 return false;
6291}
6292
ca36f057
MM
6293/* Note that NAME was looked up while the current class was being
6294 defined and that the result of that lookup was DECL. */
6295
6296void
94edc4ab 6297maybe_note_name_used_in_class (tree name, tree decl)
ca36f057
MM
6298{
6299 splay_tree names_used;
6300
6301 /* If we're not defining a class, there's nothing to do. */
39fb05d0
MM
6302 if (!(innermost_scope_kind() == sk_class
6303 && TYPE_BEING_DEFINED (current_class_type)))
ca36f057 6304 return;
c8094d83 6305
ca36f057
MM
6306 /* If there's already a binding for this NAME, then we don't have
6307 anything to worry about. */
c8094d83 6308 if (lookup_member (current_class_type, name,
39fb05d0 6309 /*protect=*/0, /*want_type=*/false))
ca36f057
MM
6310 return;
6311
6312 if (!current_class_stack[current_class_depth - 1].names_used)
6313 current_class_stack[current_class_depth - 1].names_used
6314 = splay_tree_new (splay_tree_compare_pointers, 0, 0);
6315 names_used = current_class_stack[current_class_depth - 1].names_used;
6316
6317 splay_tree_insert (names_used,
c8094d83 6318 (splay_tree_key) name,
ca36f057
MM
6319 (splay_tree_value) decl);
6320}
6321
6322/* Note that NAME was declared (as DECL) in the current class. Check
0e339752 6323 to see that the declaration is valid. */
ca36f057
MM
6324
6325void
94edc4ab 6326note_name_declared_in_class (tree name, tree decl)
ca36f057
MM
6327{
6328 splay_tree names_used;
6329 splay_tree_node n;
6330
6331 /* Look to see if we ever used this name. */
c8094d83 6332 names_used
ca36f057
MM
6333 = current_class_stack[current_class_depth - 1].names_used;
6334 if (!names_used)
6335 return;
6336
6337 n = splay_tree_lookup (names_used, (splay_tree_key) name);
6338 if (n)
6339 {
6340 /* [basic.scope.class]
c8094d83 6341
ca36f057
MM
6342 A name N used in a class S shall refer to the same declaration
6343 in its context and when re-evaluated in the completed scope of
6344 S. */
1f070f2b 6345 error ("declaration of %q#D", decl);
dee15844
JM
6346 error ("changes meaning of %qD from %q+#D",
6347 DECL_NAME (OVL_CURRENT (decl)), (tree) n->value);
ca36f057
MM
6348 }
6349}
6350
3461fba7
NS
6351/* Returns the VAR_DECL for the complete vtable associated with BINFO.
6352 Secondary vtables are merged with primary vtables; this function
6353 will return the VAR_DECL for the primary vtable. */
ca36f057 6354
c35cce41 6355tree
94edc4ab 6356get_vtbl_decl_for_binfo (tree binfo)
c35cce41
MM
6357{
6358 tree decl;
6359
6360 decl = BINFO_VTABLE (binfo);
6361 if (decl && TREE_CODE (decl) == PLUS_EXPR)
6362 {
50bc768d 6363 gcc_assert (TREE_CODE (TREE_OPERAND (decl, 0)) == ADDR_EXPR);
c35cce41
MM
6364 decl = TREE_OPERAND (TREE_OPERAND (decl, 0), 0);
6365 }
6366 if (decl)
50bc768d 6367 gcc_assert (TREE_CODE (decl) == VAR_DECL);
c35cce41
MM
6368 return decl;
6369}
6370
911a71a7 6371
dbbf88d1
NS
6372/* Returns the binfo for the primary base of BINFO. If the resulting
6373 BINFO is a virtual base, and it is inherited elsewhere in the
6374 hierarchy, then the returned binfo might not be the primary base of
6375 BINFO in the complete object. Check BINFO_PRIMARY_P or
6376 BINFO_LOST_PRIMARY_P to be sure. */
911a71a7 6377
b5791fdc 6378static tree
94edc4ab 6379get_primary_binfo (tree binfo)
911a71a7
MM
6380{
6381 tree primary_base;
c8094d83 6382
911a71a7
MM
6383 primary_base = CLASSTYPE_PRIMARY_BINFO (BINFO_TYPE (binfo));
6384 if (!primary_base)
6385 return NULL_TREE;
6386
b5791fdc 6387 return copied_binfo (primary_base, binfo);
911a71a7
MM
6388}
6389
838dfd8a 6390/* If INDENTED_P is zero, indent to INDENT. Return nonzero. */
b7442fb5
NS
6391
6392static int
94edc4ab 6393maybe_indent_hierarchy (FILE * stream, int indent, int indented_p)
b7442fb5
NS
6394{
6395 if (!indented_p)
6396 fprintf (stream, "%*s", indent, "");
6397 return 1;
6398}
6399
dbbf88d1
NS
6400/* Dump the offsets of all the bases rooted at BINFO to STREAM.
6401 INDENT should be zero when called from the top level; it is
6402 incremented recursively. IGO indicates the next expected BINFO in
9bcb9aae 6403 inheritance graph ordering. */
c35cce41 6404
dbbf88d1
NS
6405static tree
6406dump_class_hierarchy_r (FILE *stream,
0cbd7506
MS
6407 int flags,
6408 tree binfo,
6409 tree igo,
6410 int indent)
ca36f057 6411{
b7442fb5 6412 int indented = 0;
fa743e8c
NS
6413 tree base_binfo;
6414 int i;
c8094d83 6415
b7442fb5
NS
6416 indented = maybe_indent_hierarchy (stream, indent, 0);
6417 fprintf (stream, "%s (0x%lx) ",
fc6633e0 6418 type_as_string (BINFO_TYPE (binfo), TFF_PLAIN_IDENTIFIER),
b7442fb5 6419 (unsigned long) binfo);
dbbf88d1
NS
6420 if (binfo != igo)
6421 {
6422 fprintf (stream, "alternative-path\n");
6423 return igo;
6424 }
6425 igo = TREE_CHAIN (binfo);
c8094d83 6426
9965d119 6427 fprintf (stream, HOST_WIDE_INT_PRINT_DEC,
ca36f057 6428 tree_low_cst (BINFO_OFFSET (binfo), 0));
9965d119
NS
6429 if (is_empty_class (BINFO_TYPE (binfo)))
6430 fprintf (stream, " empty");
6431 else if (CLASSTYPE_NEARLY_EMPTY_P (BINFO_TYPE (binfo)))
6432 fprintf (stream, " nearly-empty");
809e3e7f 6433 if (BINFO_VIRTUAL_P (binfo))
dbbf88d1 6434 fprintf (stream, " virtual");
9965d119 6435 fprintf (stream, "\n");
ca36f057 6436
b7442fb5 6437 indented = 0;
fc6633e0 6438 if (BINFO_PRIMARY_P (binfo))
b7442fb5
NS
6439 {
6440 indented = maybe_indent_hierarchy (stream, indent + 3, indented);
6441 fprintf (stream, " primary-for %s (0x%lx)",
fc6633e0 6442 type_as_string (BINFO_TYPE (BINFO_INHERITANCE_CHAIN (binfo)),
b7442fb5 6443 TFF_PLAIN_IDENTIFIER),
fc6633e0 6444 (unsigned long)BINFO_INHERITANCE_CHAIN (binfo));
b7442fb5
NS
6445 }
6446 if (BINFO_LOST_PRIMARY_P (binfo))
6447 {
6448 indented = maybe_indent_hierarchy (stream, indent + 3, indented);
6449 fprintf (stream, " lost-primary");
6450 }
6451 if (indented)
6452 fprintf (stream, "\n");
6453
6454 if (!(flags & TDF_SLIM))
6455 {
6456 int indented = 0;
c8094d83 6457
b7442fb5
NS
6458 if (BINFO_SUBVTT_INDEX (binfo))
6459 {
6460 indented = maybe_indent_hierarchy (stream, indent + 3, indented);
6461 fprintf (stream, " subvttidx=%s",
6462 expr_as_string (BINFO_SUBVTT_INDEX (binfo),
6463 TFF_PLAIN_IDENTIFIER));
6464 }
6465 if (BINFO_VPTR_INDEX (binfo))
6466 {
6467 indented = maybe_indent_hierarchy (stream, indent + 3, indented);
6468 fprintf (stream, " vptridx=%s",
6469 expr_as_string (BINFO_VPTR_INDEX (binfo),
6470 TFF_PLAIN_IDENTIFIER));
6471 }
6472 if (BINFO_VPTR_FIELD (binfo))
6473 {
6474 indented = maybe_indent_hierarchy (stream, indent + 3, indented);
6475 fprintf (stream, " vbaseoffset=%s",
6476 expr_as_string (BINFO_VPTR_FIELD (binfo),
6477 TFF_PLAIN_IDENTIFIER));
6478 }
6479 if (BINFO_VTABLE (binfo))
6480 {
6481 indented = maybe_indent_hierarchy (stream, indent + 3, indented);
6482 fprintf (stream, " vptr=%s",
6483 expr_as_string (BINFO_VTABLE (binfo),
6484 TFF_PLAIN_IDENTIFIER));
6485 }
c8094d83 6486
b7442fb5
NS
6487 if (indented)
6488 fprintf (stream, "\n");
6489 }
dbbf88d1 6490
fa743e8c
NS
6491 for (i = 0; BINFO_BASE_ITERATE (binfo, i, base_binfo); i++)
6492 igo = dump_class_hierarchy_r (stream, flags, base_binfo, igo, indent + 2);
c8094d83 6493
dbbf88d1 6494 return igo;
c35cce41
MM
6495}
6496
6497/* Dump the BINFO hierarchy for T. */
6498
b7442fb5 6499static void
bb885938 6500dump_class_hierarchy_1 (FILE *stream, int flags, tree t)
c35cce41 6501{
b7442fb5
NS
6502 fprintf (stream, "Class %s\n", type_as_string (t, TFF_PLAIN_IDENTIFIER));
6503 fprintf (stream, " size=%lu align=%lu\n",
6504 (unsigned long)(tree_low_cst (TYPE_SIZE (t), 0) / BITS_PER_UNIT),
6505 (unsigned long)(TYPE_ALIGN (t) / BITS_PER_UNIT));
dbbf88d1
NS
6506 fprintf (stream, " base size=%lu base align=%lu\n",
6507 (unsigned long)(tree_low_cst (TYPE_SIZE (CLASSTYPE_AS_BASE (t)), 0)
6508 / BITS_PER_UNIT),
6509 (unsigned long)(TYPE_ALIGN (CLASSTYPE_AS_BASE (t))
6510 / BITS_PER_UNIT));
6511 dump_class_hierarchy_r (stream, flags, TYPE_BINFO (t), TYPE_BINFO (t), 0);
b7442fb5 6512 fprintf (stream, "\n");
bb885938
NS
6513}
6514
da1d7781 6515/* Debug interface to hierarchy dumping. */
bb885938
NS
6516
6517extern void
6518debug_class (tree t)
6519{
6520 dump_class_hierarchy_1 (stderr, TDF_SLIM, t);
6521}
6522
6523static void
6524dump_class_hierarchy (tree t)
6525{
6526 int flags;
6527 FILE *stream = dump_begin (TDI_class, &flags);
6528
6529 if (stream)
6530 {
6531 dump_class_hierarchy_1 (stream, flags, t);
6532 dump_end (TDI_class, stream);
6533 }
b7442fb5
NS
6534}
6535
6536static void
94edc4ab 6537dump_array (FILE * stream, tree decl)
b7442fb5 6538{
4038c495
GB
6539 tree value;
6540 unsigned HOST_WIDE_INT ix;
b7442fb5
NS
6541 HOST_WIDE_INT elt;
6542 tree size = TYPE_MAX_VALUE (TYPE_DOMAIN (TREE_TYPE (decl)));
6543
6544 elt = (tree_low_cst (TYPE_SIZE (TREE_TYPE (TREE_TYPE (decl))), 0)
6545 / BITS_PER_UNIT);
6546 fprintf (stream, "%s:", decl_as_string (decl, TFF_PLAIN_IDENTIFIER));
6547 fprintf (stream, " %s entries",
6548 expr_as_string (size_binop (PLUS_EXPR, size, size_one_node),
6549 TFF_PLAIN_IDENTIFIER));
6550 fprintf (stream, "\n");
6551
4038c495
GB
6552 FOR_EACH_CONSTRUCTOR_VALUE (CONSTRUCTOR_ELTS (DECL_INITIAL (decl)),
6553 ix, value)
4fdc14ca 6554 fprintf (stream, "%-4ld %s\n", (long)(ix * elt),
4038c495 6555 expr_as_string (value, TFF_PLAIN_IDENTIFIER));
b7442fb5
NS
6556}
6557
6558static void
94edc4ab 6559dump_vtable (tree t, tree binfo, tree vtable)
b7442fb5
NS
6560{
6561 int flags;
6562 FILE *stream = dump_begin (TDI_class, &flags);
6563
6564 if (!stream)
6565 return;
6566
6567 if (!(flags & TDF_SLIM))
9965d119 6568 {
b7442fb5 6569 int ctor_vtbl_p = TYPE_BINFO (t) != binfo;
c8094d83 6570
b7442fb5
NS
6571 fprintf (stream, "%s for %s",
6572 ctor_vtbl_p ? "Construction vtable" : "Vtable",
fc6633e0 6573 type_as_string (BINFO_TYPE (binfo), TFF_PLAIN_IDENTIFIER));
b7442fb5
NS
6574 if (ctor_vtbl_p)
6575 {
809e3e7f 6576 if (!BINFO_VIRTUAL_P (binfo))
b7442fb5
NS
6577 fprintf (stream, " (0x%lx instance)", (unsigned long)binfo);
6578 fprintf (stream, " in %s", type_as_string (t, TFF_PLAIN_IDENTIFIER));
6579 }
6580 fprintf (stream, "\n");
6581 dump_array (stream, vtable);
6582 fprintf (stream, "\n");
9965d119 6583 }
c8094d83 6584
b7442fb5
NS
6585 dump_end (TDI_class, stream);
6586}
6587
6588static void
94edc4ab 6589dump_vtt (tree t, tree vtt)
b7442fb5
NS
6590{
6591 int flags;
6592 FILE *stream = dump_begin (TDI_class, &flags);
6593
6594 if (!stream)
6595 return;
6596
6597 if (!(flags & TDF_SLIM))
6598 {
6599 fprintf (stream, "VTT for %s\n",
6600 type_as_string (t, TFF_PLAIN_IDENTIFIER));
6601 dump_array (stream, vtt);
6602 fprintf (stream, "\n");
6603 }
c8094d83 6604
b7442fb5 6605 dump_end (TDI_class, stream);
ca36f057
MM
6606}
6607
bb885938
NS
6608/* Dump a function or thunk and its thunkees. */
6609
6610static void
6611dump_thunk (FILE *stream, int indent, tree thunk)
6612{
6613 static const char spaces[] = " ";
6614 tree name = DECL_NAME (thunk);
6615 tree thunks;
c8094d83 6616
bb885938
NS
6617 fprintf (stream, "%.*s%p %s %s", indent, spaces,
6618 (void *)thunk,
6619 !DECL_THUNK_P (thunk) ? "function"
6620 : DECL_THIS_THUNK_P (thunk) ? "this-thunk" : "covariant-thunk",
6621 name ? IDENTIFIER_POINTER (name) : "<unset>");
e00853fd 6622 if (DECL_THUNK_P (thunk))
bb885938
NS
6623 {
6624 HOST_WIDE_INT fixed_adjust = THUNK_FIXED_OFFSET (thunk);
6625 tree virtual_adjust = THUNK_VIRTUAL_OFFSET (thunk);
6626
6627 fprintf (stream, " fixed=" HOST_WIDE_INT_PRINT_DEC, fixed_adjust);
6628 if (!virtual_adjust)
6629 /*NOP*/;
6630 else if (DECL_THIS_THUNK_P (thunk))
6631 fprintf (stream, " vcall=" HOST_WIDE_INT_PRINT_DEC,
6632 tree_low_cst (virtual_adjust, 0));
6633 else
6634 fprintf (stream, " vbase=" HOST_WIDE_INT_PRINT_DEC "(%s)",
6635 tree_low_cst (BINFO_VPTR_FIELD (virtual_adjust), 0),
6636 type_as_string (BINFO_TYPE (virtual_adjust), TFF_SCOPE));
e00853fd
NS
6637 if (THUNK_ALIAS (thunk))
6638 fprintf (stream, " alias to %p", (void *)THUNK_ALIAS (thunk));
bb885938
NS
6639 }
6640 fprintf (stream, "\n");
6641 for (thunks = DECL_THUNKS (thunk); thunks; thunks = TREE_CHAIN (thunks))
6642 dump_thunk (stream, indent + 2, thunks);
6643}
6644
6645/* Dump the thunks for FN. */
6646
6647extern void
6648debug_thunks (tree fn)
6649{
6650 dump_thunk (stderr, 0, fn);
6651}
6652
ca36f057
MM
6653/* Virtual function table initialization. */
6654
6655/* Create all the necessary vtables for T and its base classes. */
6656
6657static void
94edc4ab 6658finish_vtbls (tree t)
ca36f057 6659{
3461fba7
NS
6660 tree list;
6661 tree vbase;
ca36f057 6662
3461fba7
NS
6663 /* We lay out the primary and secondary vtables in one contiguous
6664 vtable. The primary vtable is first, followed by the non-virtual
6665 secondary vtables in inheritance graph order. */
604a3205 6666 list = build_tree_list (BINFO_VTABLE (TYPE_BINFO (t)), NULL_TREE);
3461fba7
NS
6667 accumulate_vtbl_inits (TYPE_BINFO (t), TYPE_BINFO (t),
6668 TYPE_BINFO (t), t, list);
c8094d83 6669
3461fba7
NS
6670 /* Then come the virtual bases, also in inheritance graph order. */
6671 for (vbase = TYPE_BINFO (t); vbase; vbase = TREE_CHAIN (vbase))
6672 {
809e3e7f 6673 if (!BINFO_VIRTUAL_P (vbase))
3461fba7 6674 continue;
dbbf88d1 6675 accumulate_vtbl_inits (vbase, vbase, TYPE_BINFO (t), t, list);
ff668506
JM
6676 }
6677
604a3205 6678 if (BINFO_VTABLE (TYPE_BINFO (t)))
3461fba7 6679 initialize_vtable (TYPE_BINFO (t), TREE_VALUE (list));
ca36f057
MM
6680}
6681
6682/* Initialize the vtable for BINFO with the INITS. */
6683
6684static void
94edc4ab 6685initialize_vtable (tree binfo, tree inits)
ca36f057 6686{
ca36f057
MM
6687 tree decl;
6688
6689 layout_vtable_decl (binfo, list_length (inits));
c35cce41 6690 decl = get_vtbl_decl_for_binfo (binfo);
19c29b2f 6691 initialize_artificial_var (decl, inits);
b7442fb5 6692 dump_vtable (BINFO_TYPE (binfo), binfo, decl);
23656158
MM
6693}
6694
9965d119
NS
6695/* Build the VTT (virtual table table) for T.
6696 A class requires a VTT if it has virtual bases.
c8094d83 6697
9965d119
NS
6698 This holds
6699 1 - primary virtual pointer for complete object T
90ecce3e
JM
6700 2 - secondary VTTs for each direct non-virtual base of T which requires a
6701 VTT
9965d119
NS
6702 3 - secondary virtual pointers for each direct or indirect base of T which
6703 has virtual bases or is reachable via a virtual path from T.
6704 4 - secondary VTTs for each direct or indirect virtual base of T.
c8094d83 6705
9965d119 6706 Secondary VTTs look like complete object VTTs without part 4. */
23656158
MM
6707
6708static void
94edc4ab 6709build_vtt (tree t)
23656158
MM
6710{
6711 tree inits;
6712 tree type;
6713 tree vtt;
3ec6bad3 6714 tree index;
23656158 6715
23656158
MM
6716 /* Build up the initializers for the VTT. */
6717 inits = NULL_TREE;
3ec6bad3 6718 index = size_zero_node;
9965d119 6719 build_vtt_inits (TYPE_BINFO (t), t, &inits, &index);
23656158
MM
6720
6721 /* If we didn't need a VTT, we're done. */
6722 if (!inits)
6723 return;
6724
6725 /* Figure out the type of the VTT. */
442e01b6 6726 type = build_index_type (size_int (list_length (inits) - 1));
23656158 6727 type = build_cplus_array_type (const_ptr_type_node, type);
c8094d83 6728
23656158 6729 /* Now, build the VTT object itself. */
3e355d92 6730 vtt = build_vtable (t, mangle_vtt_for_type (t), type);
19c29b2f 6731 initialize_artificial_var (vtt, inits);
548502d3
MM
6732 /* Add the VTT to the vtables list. */
6733 TREE_CHAIN (vtt) = TREE_CHAIN (CLASSTYPE_VTABLES (t));
6734 TREE_CHAIN (CLASSTYPE_VTABLES (t)) = vtt;
b7442fb5
NS
6735
6736 dump_vtt (t, vtt);
23656158
MM
6737}
6738
13de7ec4
JM
6739/* When building a secondary VTT, BINFO_VTABLE is set to a TREE_LIST with
6740 PURPOSE the RTTI_BINFO, VALUE the real vtable pointer for this binfo,
6741 and CHAIN the vtable pointer for this binfo after construction is
00a17e31 6742 complete. VALUE can also be another BINFO, in which case we recurse. */
13de7ec4
JM
6743
6744static tree
94edc4ab 6745binfo_ctor_vtable (tree binfo)
13de7ec4
JM
6746{
6747 tree vt;
6748
6749 while (1)
6750 {
6751 vt = BINFO_VTABLE (binfo);
6752 if (TREE_CODE (vt) == TREE_LIST)
6753 vt = TREE_VALUE (vt);
95b4aca6 6754 if (TREE_CODE (vt) == TREE_BINFO)
13de7ec4
JM
6755 binfo = vt;
6756 else
6757 break;
6758 }
6759
6760 return vt;
6761}
6762
a3a0fc7f
NS
6763/* Data for secondary VTT initialization. */
6764typedef struct secondary_vptr_vtt_init_data_s
6765{
6766 /* Is this the primary VTT? */
6767 bool top_level_p;
6768
6769 /* Current index into the VTT. */
6770 tree index;
6771
6772 /* TREE_LIST of initializers built up. */
6773 tree inits;
6774
6775 /* The type being constructed by this secondary VTT. */
6776 tree type_being_constructed;
6777} secondary_vptr_vtt_init_data;
6778
23656158 6779/* Recursively build the VTT-initializer for BINFO (which is in the
9965d119
NS
6780 hierarchy dominated by T). INITS points to the end of the initializer
6781 list to date. INDEX is the VTT index where the next element will be
6782 replaced. Iff BINFO is the binfo for T, this is the top level VTT (i.e.
6783 not a subvtt for some base of T). When that is so, we emit the sub-VTTs
6784 for virtual bases of T. When it is not so, we build the constructor
6785 vtables for the BINFO-in-T variant. */
23656158
MM
6786
6787static tree *
a3a0fc7f 6788build_vtt_inits (tree binfo, tree t, tree *inits, tree *index)
23656158
MM
6789{
6790 int i;
6791 tree b;
6792 tree init;
6793 tree secondary_vptrs;
a3a0fc7f 6794 secondary_vptr_vtt_init_data data;
539ed333 6795 int top_level_p = SAME_BINFO_TYPE_P (BINFO_TYPE (binfo), t);
23656158
MM
6796
6797 /* We only need VTTs for subobjects with virtual bases. */
5775a06a 6798 if (!CLASSTYPE_VBASECLASSES (BINFO_TYPE (binfo)))
23656158
MM
6799 return inits;
6800
6801 /* We need to use a construction vtable if this is not the primary
6802 VTT. */
9965d119 6803 if (!top_level_p)
3ec6bad3
MM
6804 {
6805 build_ctor_vtbl_group (binfo, t);
6806
6807 /* Record the offset in the VTT where this sub-VTT can be found. */
6808 BINFO_SUBVTT_INDEX (binfo) = *index;
6809 }
23656158
MM
6810
6811 /* Add the address of the primary vtable for the complete object. */
13de7ec4 6812 init = binfo_ctor_vtable (binfo);
23656158
MM
6813 *inits = build_tree_list (NULL_TREE, init);
6814 inits = &TREE_CHAIN (*inits);
9965d119
NS
6815 if (top_level_p)
6816 {
50bc768d 6817 gcc_assert (!BINFO_VPTR_INDEX (binfo));
9965d119
NS
6818 BINFO_VPTR_INDEX (binfo) = *index;
6819 }
3ec6bad3 6820 *index = size_binop (PLUS_EXPR, *index, TYPE_SIZE_UNIT (ptr_type_node));
c8094d83 6821
23656158 6822 /* Recursively add the secondary VTTs for non-virtual bases. */
fa743e8c
NS
6823 for (i = 0; BINFO_BASE_ITERATE (binfo, i, b); ++i)
6824 if (!BINFO_VIRTUAL_P (b))
5d5a519f 6825 inits = build_vtt_inits (b, t, inits, index);
c8094d83 6826
23656158 6827 /* Add secondary virtual pointers for all subobjects of BINFO with
9965d119
NS
6828 either virtual bases or reachable along a virtual path, except
6829 subobjects that are non-virtual primary bases. */
a3a0fc7f
NS
6830 data.top_level_p = top_level_p;
6831 data.index = *index;
6832 data.inits = NULL;
6833 data.type_being_constructed = BINFO_TYPE (binfo);
c8094d83 6834
5d5a519f 6835 dfs_walk_once (binfo, dfs_build_secondary_vptr_vtt_inits, NULL, &data);
9965d119 6836
a3a0fc7f 6837 *index = data.index;
23656158
MM
6838
6839 /* The secondary vptrs come back in reverse order. After we reverse
6840 them, and add the INITS, the last init will be the first element
6841 of the chain. */
a3a0fc7f 6842 secondary_vptrs = data.inits;
23656158
MM
6843 if (secondary_vptrs)
6844 {
6845 *inits = nreverse (secondary_vptrs);
6846 inits = &TREE_CHAIN (secondary_vptrs);
50bc768d 6847 gcc_assert (*inits == NULL_TREE);
23656158
MM
6848 }
6849
9965d119 6850 if (top_level_p)
a3a0fc7f
NS
6851 /* Add the secondary VTTs for virtual bases in inheritance graph
6852 order. */
9ccf6541
MM
6853 for (b = TYPE_BINFO (BINFO_TYPE (binfo)); b; b = TREE_CHAIN (b))
6854 {
809e3e7f 6855 if (!BINFO_VIRTUAL_P (b))
9ccf6541 6856 continue;
c8094d83 6857
dbbf88d1 6858 inits = build_vtt_inits (b, t, inits, index);
9ccf6541 6859 }
a3a0fc7f
NS
6860 else
6861 /* Remove the ctor vtables we created. */
5d5a519f 6862 dfs_walk_all (binfo, dfs_fixup_binfo_vtbls, NULL, binfo);
23656158
MM
6863
6864 return inits;
6865}
6866
8df83eae 6867/* Called from build_vtt_inits via dfs_walk. BINFO is the binfo for the base
a3a0fc7f 6868 in most derived. DATA is a SECONDARY_VPTR_VTT_INIT_DATA structure. */
23656158
MM
6869
6870static tree
a3a0fc7f 6871dfs_build_secondary_vptr_vtt_inits (tree binfo, void *data_)
23656158 6872{
a3a0fc7f 6873 secondary_vptr_vtt_init_data *data = (secondary_vptr_vtt_init_data *)data_;
23656158 6874
23656158
MM
6875 /* We don't care about bases that don't have vtables. */
6876 if (!TYPE_VFIELD (BINFO_TYPE (binfo)))
5d5a519f 6877 return dfs_skip_bases;
23656158 6878
a3a0fc7f
NS
6879 /* We're only interested in proper subobjects of the type being
6880 constructed. */
539ed333 6881 if (SAME_BINFO_TYPE_P (BINFO_TYPE (binfo), data->type_being_constructed))
23656158
MM
6882 return NULL_TREE;
6883
a3a0fc7f
NS
6884 /* We're only interested in bases with virtual bases or reachable
6885 via a virtual path from the type being constructed. */
5d5a519f
NS
6886 if (!(CLASSTYPE_VBASECLASSES (BINFO_TYPE (binfo))
6887 || binfo_via_virtual (binfo, data->type_being_constructed)))
6888 return dfs_skip_bases;
c8094d83 6889
5d5a519f
NS
6890 /* We're not interested in non-virtual primary bases. */
6891 if (!BINFO_VIRTUAL_P (binfo) && BINFO_PRIMARY_P (binfo))
db3d8cde 6892 return NULL_TREE;
c8094d83 6893
3ec6bad3 6894 /* Record the index where this secondary vptr can be found. */
a3a0fc7f 6895 if (data->top_level_p)
9965d119 6896 {
50bc768d 6897 gcc_assert (!BINFO_VPTR_INDEX (binfo));
a3a0fc7f 6898 BINFO_VPTR_INDEX (binfo) = data->index;
3ec6bad3 6899
a3a0fc7f
NS
6900 if (BINFO_VIRTUAL_P (binfo))
6901 {
0cbd7506
MS
6902 /* It's a primary virtual base, and this is not a
6903 construction vtable. Find the base this is primary of in
6904 the inheritance graph, and use that base's vtable
6905 now. */
a3a0fc7f
NS
6906 while (BINFO_PRIMARY_P (binfo))
6907 binfo = BINFO_INHERITANCE_CHAIN (binfo);
6908 }
9965d119 6909 }
c8094d83 6910
a3a0fc7f
NS
6911 /* Add the initializer for the secondary vptr itself. */
6912 data->inits = tree_cons (NULL_TREE, binfo_ctor_vtable (binfo), data->inits);
23656158 6913
a3a0fc7f
NS
6914 /* Advance the vtt index. */
6915 data->index = size_binop (PLUS_EXPR, data->index,
6916 TYPE_SIZE_UNIT (ptr_type_node));
9965d119 6917
a3a0fc7f 6918 return NULL_TREE;
9965d119
NS
6919}
6920
a3a0fc7f
NS
6921/* Called from build_vtt_inits via dfs_walk. After building
6922 constructor vtables and generating the sub-vtt from them, we need
6923 to restore the BINFO_VTABLES that were scribbled on. DATA is the
6924 binfo of the base whose sub vtt was generated. */
23656158
MM
6925
6926static tree
94edc4ab 6927dfs_fixup_binfo_vtbls (tree binfo, void* data)
23656158 6928{
a3a0fc7f 6929 tree vtable = BINFO_VTABLE (binfo);
23656158 6930
5d5a519f
NS
6931 if (!TYPE_CONTAINS_VPTR_P (BINFO_TYPE (binfo)))
6932 /* If this class has no vtable, none of its bases do. */
6933 return dfs_skip_bases;
c8094d83 6934
5d5a519f
NS
6935 if (!vtable)
6936 /* This might be a primary base, so have no vtable in this
6937 hierarchy. */
6938 return NULL_TREE;
c8094d83 6939
23656158
MM
6940 /* If we scribbled the construction vtable vptr into BINFO, clear it
6941 out now. */
5d5a519f 6942 if (TREE_CODE (vtable) == TREE_LIST
a3a0fc7f
NS
6943 && (TREE_PURPOSE (vtable) == (tree) data))
6944 BINFO_VTABLE (binfo) = TREE_CHAIN (vtable);
23656158
MM
6945
6946 return NULL_TREE;
6947}
6948
6949/* Build the construction vtable group for BINFO which is in the
6950 hierarchy dominated by T. */
6951
6952static void
94edc4ab 6953build_ctor_vtbl_group (tree binfo, tree t)
23656158
MM
6954{
6955 tree list;
6956 tree type;
6957 tree vtbl;
6958 tree inits;
6959 tree id;
9ccf6541 6960 tree vbase;
23656158 6961
7bdcf888 6962 /* See if we've already created this construction vtable group. */
1f84ec23 6963 id = mangle_ctor_vtbl_for_type (t, binfo);
23656158
MM
6964 if (IDENTIFIER_GLOBAL_VALUE (id))
6965 return;
6966
539ed333 6967 gcc_assert (!SAME_BINFO_TYPE_P (BINFO_TYPE (binfo), t));
23656158
MM
6968 /* Build a version of VTBL (with the wrong type) for use in
6969 constructing the addresses of secondary vtables in the
6970 construction vtable group. */
459c43ad 6971 vtbl = build_vtable (t, id, ptr_type_node);
505970fc 6972 DECL_CONSTRUCTION_VTABLE_P (vtbl) = 1;
23656158
MM
6973 list = build_tree_list (vtbl, NULL_TREE);
6974 accumulate_vtbl_inits (binfo, TYPE_BINFO (TREE_TYPE (binfo)),
6975 binfo, t, list);
9965d119
NS
6976
6977 /* Add the vtables for each of our virtual bases using the vbase in T
6978 binfo. */
c8094d83
MS
6979 for (vbase = TYPE_BINFO (BINFO_TYPE (binfo));
6980 vbase;
9ccf6541
MM
6981 vbase = TREE_CHAIN (vbase))
6982 {
6983 tree b;
6984
809e3e7f 6985 if (!BINFO_VIRTUAL_P (vbase))
9ccf6541 6986 continue;
dbbf88d1 6987 b = copied_binfo (vbase, binfo);
c8094d83 6988
dbbf88d1 6989 accumulate_vtbl_inits (b, vbase, binfo, t, list);
9ccf6541 6990 }
99389463 6991 inits = TREE_VALUE (list);
23656158
MM
6992
6993 /* Figure out the type of the construction vtable. */
442e01b6 6994 type = build_index_type (size_int (list_length (inits) - 1));
23656158
MM
6995 type = build_cplus_array_type (vtable_entry_type, type);
6996 TREE_TYPE (vtbl) = type;
6997
6998 /* Initialize the construction vtable. */
548502d3 6999 CLASSTYPE_VTABLES (t) = chainon (CLASSTYPE_VTABLES (t), vtbl);
19c29b2f 7000 initialize_artificial_var (vtbl, inits);
b7442fb5 7001 dump_vtable (t, binfo, vtbl);
23656158
MM
7002}
7003
9965d119
NS
7004/* Add the vtbl initializers for BINFO (and its bases other than
7005 non-virtual primaries) to the list of INITS. BINFO is in the
7006 hierarchy dominated by T. RTTI_BINFO is the binfo within T of
7007 the constructor the vtbl inits should be accumulated for. (If this
7008 is the complete object vtbl then RTTI_BINFO will be TYPE_BINFO (T).)
7009 ORIG_BINFO is the binfo for this object within BINFO_TYPE (RTTI_BINFO).
7010 BINFO is the active base equivalent of ORIG_BINFO in the inheritance
7011 graph of T. Both BINFO and ORIG_BINFO will have the same BINFO_TYPE,
7012 but are not necessarily the same in terms of layout. */
ca36f057
MM
7013
7014static void
94edc4ab 7015accumulate_vtbl_inits (tree binfo,
0cbd7506
MS
7016 tree orig_binfo,
7017 tree rtti_binfo,
7018 tree t,
7019 tree inits)
ca36f057 7020{
23656158 7021 int i;
fa743e8c 7022 tree base_binfo;
539ed333 7023 int ctor_vtbl_p = !SAME_BINFO_TYPE_P (BINFO_TYPE (rtti_binfo), t);
23656158 7024
539ed333 7025 gcc_assert (SAME_BINFO_TYPE_P (BINFO_TYPE (binfo), BINFO_TYPE (orig_binfo)));
23656158 7026
00a17e31 7027 /* If it doesn't have a vptr, we don't do anything. */
623fe76a
NS
7028 if (!TYPE_CONTAINS_VPTR_P (BINFO_TYPE (binfo)))
7029 return;
c8094d83 7030
23656158
MM
7031 /* If we're building a construction vtable, we're not interested in
7032 subobjects that don't require construction vtables. */
c8094d83 7033 if (ctor_vtbl_p
5775a06a 7034 && !CLASSTYPE_VBASECLASSES (BINFO_TYPE (binfo))
9965d119 7035 && !binfo_via_virtual (orig_binfo, BINFO_TYPE (rtti_binfo)))
23656158
MM
7036 return;
7037
7038 /* Build the initializers for the BINFO-in-T vtable. */
c8094d83 7039 TREE_VALUE (inits)
23656158
MM
7040 = chainon (TREE_VALUE (inits),
7041 dfs_accumulate_vtbl_inits (binfo, orig_binfo,
7042 rtti_binfo, t, inits));
c8094d83 7043
c35cce41
MM
7044 /* Walk the BINFO and its bases. We walk in preorder so that as we
7045 initialize each vtable we can figure out at what offset the
23656158
MM
7046 secondary vtable lies from the primary vtable. We can't use
7047 dfs_walk here because we need to iterate through bases of BINFO
7048 and RTTI_BINFO simultaneously. */
fa743e8c 7049 for (i = 0; BINFO_BASE_ITERATE (binfo, i, base_binfo); ++i)
23656158 7050 {
23656158 7051 /* Skip virtual bases. */
809e3e7f 7052 if (BINFO_VIRTUAL_P (base_binfo))
23656158
MM
7053 continue;
7054 accumulate_vtbl_inits (base_binfo,
604a3205 7055 BINFO_BASE_BINFO (orig_binfo, i),
9965d119 7056 rtti_binfo, t,
23656158
MM
7057 inits);
7058 }
ca36f057
MM
7059}
7060
3461fba7
NS
7061/* Called from accumulate_vtbl_inits. Returns the initializers for
7062 the BINFO vtable. */
ca36f057
MM
7063
7064static tree
94edc4ab 7065dfs_accumulate_vtbl_inits (tree binfo,
0cbd7506
MS
7066 tree orig_binfo,
7067 tree rtti_binfo,
7068 tree t,
7069 tree l)
ca36f057 7070{
23656158 7071 tree inits = NULL_TREE;
9965d119 7072 tree vtbl = NULL_TREE;
539ed333 7073 int ctor_vtbl_p = !SAME_BINFO_TYPE_P (BINFO_TYPE (rtti_binfo), t);
9965d119 7074
13de7ec4 7075 if (ctor_vtbl_p
809e3e7f 7076 && BINFO_VIRTUAL_P (orig_binfo) && BINFO_PRIMARY_P (orig_binfo))
9965d119 7077 {
13de7ec4
JM
7078 /* In the hierarchy of BINFO_TYPE (RTTI_BINFO), this is a
7079 primary virtual base. If it is not the same primary in
7080 the hierarchy of T, we'll need to generate a ctor vtable
7081 for it, to place at its location in T. If it is the same
7082 primary, we still need a VTT entry for the vtable, but it
7083 should point to the ctor vtable for the base it is a
7084 primary for within the sub-hierarchy of RTTI_BINFO.
c8094d83 7085
13de7ec4 7086 There are three possible cases:
c8094d83 7087
13de7ec4
JM
7088 1) We are in the same place.
7089 2) We are a primary base within a lost primary virtual base of
7090 RTTI_BINFO.
049d2def 7091 3) We are primary to something not a base of RTTI_BINFO. */
c8094d83 7092
fc6633e0 7093 tree b;
13de7ec4 7094 tree last = NULL_TREE;
85a9a0a2 7095
13de7ec4
JM
7096 /* First, look through the bases we are primary to for RTTI_BINFO
7097 or a virtual base. */
fc6633e0
NS
7098 b = binfo;
7099 while (BINFO_PRIMARY_P (b))
7bdcf888 7100 {
fc6633e0 7101 b = BINFO_INHERITANCE_CHAIN (b);
13de7ec4 7102 last = b;
809e3e7f 7103 if (BINFO_VIRTUAL_P (b) || b == rtti_binfo)
fc6633e0 7104 goto found;
7bdcf888 7105 }
13de7ec4
JM
7106 /* If we run out of primary links, keep looking down our
7107 inheritance chain; we might be an indirect primary. */
fc6633e0
NS
7108 for (b = last; b; b = BINFO_INHERITANCE_CHAIN (b))
7109 if (BINFO_VIRTUAL_P (b) || b == rtti_binfo)
7110 break;
7111 found:
c8094d83 7112
13de7ec4
JM
7113 /* If we found RTTI_BINFO, this is case 1. If we found a virtual
7114 base B and it is a base of RTTI_BINFO, this is case 2. In
7115 either case, we share our vtable with LAST, i.e. the
7116 derived-most base within B of which we are a primary. */
7117 if (b == rtti_binfo
58c42dc2 7118 || (b && binfo_for_vbase (BINFO_TYPE (b), BINFO_TYPE (rtti_binfo))))
049d2def
JM
7119 /* Just set our BINFO_VTABLE to point to LAST, as we may not have
7120 set LAST's BINFO_VTABLE yet. We'll extract the actual vptr in
7121 binfo_ctor_vtable after everything's been set up. */
7122 vtbl = last;
13de7ec4 7123
049d2def 7124 /* Otherwise, this is case 3 and we get our own. */
9965d119 7125 }
dbbf88d1 7126 else if (!BINFO_NEW_VTABLE_MARKED (orig_binfo))
9965d119 7127 return inits;
7bdcf888 7128
9965d119 7129 if (!vtbl)
ca36f057 7130 {
c35cce41
MM
7131 tree index;
7132 int non_fn_entries;
7133
7134 /* Compute the initializer for this vtable. */
23656158 7135 inits = build_vtbl_initializer (binfo, orig_binfo, t, rtti_binfo,
aabb4cd6 7136 &non_fn_entries);
c35cce41 7137
23656158 7138 /* Figure out the position to which the VPTR should point. */
c35cce41 7139 vtbl = TREE_PURPOSE (l);
6de9cd9a 7140 vtbl = build1 (ADDR_EXPR, vtbl_ptr_type_node, vtbl);
c35cce41
MM
7141 index = size_binop (PLUS_EXPR,
7142 size_int (non_fn_entries),
7143 size_int (list_length (TREE_VALUE (l))));
23656158
MM
7144 index = size_binop (MULT_EXPR,
7145 TYPE_SIZE_UNIT (vtable_entry_type),
7146 index);
f293ce4b 7147 vtbl = build2 (PLUS_EXPR, TREE_TYPE (vtbl), vtbl, index);
9965d119 7148 }
23656158 7149
7bdcf888 7150 if (ctor_vtbl_p)
9965d119
NS
7151 /* For a construction vtable, we can't overwrite BINFO_VTABLE.
7152 So, we make a TREE_LIST. Later, dfs_fixup_binfo_vtbls will
7153 straighten this out. */
7154 BINFO_VTABLE (binfo) = tree_cons (rtti_binfo, vtbl, BINFO_VTABLE (binfo));
809e3e7f 7155 else if (BINFO_PRIMARY_P (binfo) && BINFO_VIRTUAL_P (binfo))
7bdcf888
NS
7156 inits = NULL_TREE;
7157 else
7158 /* For an ordinary vtable, set BINFO_VTABLE. */
7159 BINFO_VTABLE (binfo) = vtbl;
ca36f057 7160
23656158 7161 return inits;
ca36f057
MM
7162}
7163
1b746b0f
AP
7164static GTY(()) tree abort_fndecl_addr;
7165
90ecce3e 7166/* Construct the initializer for BINFO's virtual function table. BINFO
aabb4cd6 7167 is part of the hierarchy dominated by T. If we're building a
23656158 7168 construction vtable, the ORIG_BINFO is the binfo we should use to
9965d119
NS
7169 find the actual function pointers to put in the vtable - but they
7170 can be overridden on the path to most-derived in the graph that
7171 ORIG_BINFO belongs. Otherwise,
911a71a7 7172 ORIG_BINFO should be the same as BINFO. The RTTI_BINFO is the
23656158
MM
7173 BINFO that should be indicated by the RTTI information in the
7174 vtable; it will be a base class of T, rather than T itself, if we
7175 are building a construction vtable.
aabb4cd6
MM
7176
7177 The value returned is a TREE_LIST suitable for wrapping in a
7178 CONSTRUCTOR to use as the DECL_INITIAL for a vtable. If
7179 NON_FN_ENTRIES_P is not NULL, *NON_FN_ENTRIES_P is set to the
c8094d83 7180 number of non-function entries in the vtable.
911a71a7
MM
7181
7182 It might seem that this function should never be called with a
9965d119 7183 BINFO for which BINFO_PRIMARY_P holds, the vtable for such a
911a71a7 7184 base is always subsumed by a derived class vtable. However, when
9965d119 7185 we are building construction vtables, we do build vtables for
911a71a7
MM
7186 primary bases; we need these while the primary base is being
7187 constructed. */
ca36f057
MM
7188
7189static tree
94edc4ab 7190build_vtbl_initializer (tree binfo,
0cbd7506
MS
7191 tree orig_binfo,
7192 tree t,
7193 tree rtti_binfo,
7194 int* non_fn_entries_p)
ca36f057 7195{
d0cd8b44 7196 tree v, b;
911a71a7 7197 tree vfun_inits;
911a71a7 7198 vtbl_init_data vid;
58c42dc2
NS
7199 unsigned ix;
7200 tree vbinfo;
d4e6fecb 7201 VEC(tree,gc) *vbases;
c8094d83 7202
911a71a7 7203 /* Initialize VID. */
961192e1 7204 memset (&vid, 0, sizeof (vid));
911a71a7
MM
7205 vid.binfo = binfo;
7206 vid.derived = t;
73ea87d7 7207 vid.rtti_binfo = rtti_binfo;
911a71a7 7208 vid.last_init = &vid.inits;
539ed333
NS
7209 vid.primary_vtbl_p = SAME_BINFO_TYPE_P (BINFO_TYPE (binfo), t);
7210 vid.ctor_vtbl_p = !SAME_BINFO_TYPE_P (BINFO_TYPE (rtti_binfo), t);
548502d3 7211 vid.generate_vcall_entries = true;
c35cce41 7212 /* The first vbase or vcall offset is at index -3 in the vtable. */
ce552f75 7213 vid.index = ssize_int(-3 * TARGET_VTABLE_DATA_ENTRY_DISTANCE);
c35cce41 7214
9bab6c90 7215 /* Add entries to the vtable for RTTI. */
73ea87d7 7216 build_rtti_vtbl_entries (binfo, &vid);
9bab6c90 7217
b485e15b
MM
7218 /* Create an array for keeping track of the functions we've
7219 processed. When we see multiple functions with the same
7220 signature, we share the vcall offsets. */
1e625046 7221 vid.fns = VEC_alloc (tree, gc, 32);
c35cce41 7222 /* Add the vcall and vbase offset entries. */
911a71a7 7223 build_vcall_and_vbase_vtbl_entries (binfo, &vid);
c8094d83 7224
79cda2d1 7225 /* Clear BINFO_VTABLE_PATH_MARKED; it's set by
c35cce41 7226 build_vbase_offset_vtbl_entries. */
9ba5ff0f
NS
7227 for (vbases = CLASSTYPE_VBASECLASSES (t), ix = 0;
7228 VEC_iterate (tree, vbases, ix, vbinfo); ix++)
58c42dc2 7229 BINFO_VTABLE_PATH_MARKED (vbinfo) = 0;
ca36f057 7230
a6f5e048
RH
7231 /* If the target requires padding between data entries, add that now. */
7232 if (TARGET_VTABLE_DATA_ENTRY_DISTANCE > 1)
7233 {
7234 tree cur, *prev;
7235
7236 for (prev = &vid.inits; (cur = *prev); prev = &TREE_CHAIN (cur))
7237 {
7238 tree add = cur;
7239 int i;
7240
7241 for (i = 1; i < TARGET_VTABLE_DATA_ENTRY_DISTANCE; ++i)
7befdb9f 7242 add = tree_cons (NULL_TREE,
2e88ae22
SE
7243 build1 (NOP_EXPR, vtable_entry_type,
7244 null_pointer_node),
7befdb9f 7245 add);
a6f5e048
RH
7246 *prev = add;
7247 }
7248 }
7249
c35cce41 7250 if (non_fn_entries_p)
911a71a7 7251 *non_fn_entries_p = list_length (vid.inits);
ca36f057
MM
7252
7253 /* Go through all the ordinary virtual functions, building up
7254 initializers. */
c35cce41 7255 vfun_inits = NULL_TREE;
23656158 7256 for (v = BINFO_VIRTUALS (orig_binfo); v; v = TREE_CHAIN (v))
ca36f057
MM
7257 {
7258 tree delta;
7259 tree vcall_index;
4977bab6 7260 tree fn, fn_original;
f11ee281 7261 tree init = NULL_TREE;
c8094d83 7262
ca36f057 7263 fn = BV_FN (v);
07fa4878
NS
7264 fn_original = fn;
7265 if (DECL_THUNK_P (fn))
4977bab6 7266 {
07fa4878
NS
7267 if (!DECL_NAME (fn))
7268 finish_thunk (fn);
e00853fd 7269 if (THUNK_ALIAS (fn))
bb885938
NS
7270 {
7271 fn = THUNK_ALIAS (fn);
7272 BV_FN (v) = fn;
7273 }
07fa4878 7274 fn_original = THUNK_TARGET (fn);
4977bab6 7275 }
c8094d83 7276
d0cd8b44
JM
7277 /* If the only definition of this function signature along our
7278 primary base chain is from a lost primary, this vtable slot will
7279 never be used, so just zero it out. This is important to avoid
7280 requiring extra thunks which cannot be generated with the function.
7281
f11ee281
JM
7282 We first check this in update_vtable_entry_for_fn, so we handle
7283 restored primary bases properly; we also need to do it here so we
7284 zero out unused slots in ctor vtables, rather than filling themff
7285 with erroneous values (though harmless, apart from relocation
7286 costs). */
7287 for (b = binfo; ; b = get_primary_binfo (b))
7288 {
7289 /* We found a defn before a lost primary; go ahead as normal. */
4977bab6 7290 if (look_for_overrides_here (BINFO_TYPE (b), fn_original))
f11ee281
JM
7291 break;
7292
7293 /* The nearest definition is from a lost primary; clear the
7294 slot. */
7295 if (BINFO_LOST_PRIMARY_P (b))
7296 {
7297 init = size_zero_node;
d0cd8b44 7298 break;
f11ee281
JM
7299 }
7300 }
d0cd8b44 7301
f11ee281
JM
7302 if (! init)
7303 {
7304 /* Pull the offset for `this', and the function to call, out of
7305 the list. */
7306 delta = BV_DELTA (v);
548502d3 7307 vcall_index = BV_VCALL_INDEX (v);
f11ee281 7308
50bc768d
NS
7309 gcc_assert (TREE_CODE (delta) == INTEGER_CST);
7310 gcc_assert (TREE_CODE (fn) == FUNCTION_DECL);
f11ee281
JM
7311
7312 /* You can't call an abstract virtual function; it's abstract.
7313 So, we replace these functions with __pure_virtual. */
4977bab6 7314 if (DECL_PURE_VIRTUAL_P (fn_original))
4977bab6 7315 {
1b746b0f
AP
7316 fn = abort_fndecl;
7317 if (abort_fndecl_addr == NULL)
7318 abort_fndecl_addr = build1 (ADDR_EXPR, vfunc_ptr_type_node, fn);
7319 init = abort_fndecl_addr;
7320 }
7321 else
7322 {
7323 if (!integer_zerop (delta) || vcall_index)
7324 {
7325 fn = make_thunk (fn, /*this_adjusting=*/1, delta, vcall_index);
7326 if (!DECL_NAME (fn))
7327 finish_thunk (fn);
7328 }
7329 /* Take the address of the function, considering it to be of an
7330 appropriate generic type. */
7331 init = build1 (ADDR_EXPR, vfunc_ptr_type_node, fn);
4977bab6 7332 }
f11ee281 7333 }
d0cd8b44 7334
ca36f057 7335 /* And add it to the chain of initializers. */
67231816
RH
7336 if (TARGET_VTABLE_USES_DESCRIPTORS)
7337 {
7338 int i;
7339 if (init == size_zero_node)
7340 for (i = 0; i < TARGET_VTABLE_USES_DESCRIPTORS; ++i)
7341 vfun_inits = tree_cons (NULL_TREE, init, vfun_inits);
7342 else
7343 for (i = 0; i < TARGET_VTABLE_USES_DESCRIPTORS; ++i)
7344 {
f293ce4b
RS
7345 tree fdesc = build2 (FDESC_EXPR, vfunc_ptr_type_node,
7346 TREE_OPERAND (init, 0),
7d60be94 7347 build_int_cst (NULL_TREE, i));
67231816 7348 TREE_CONSTANT (fdesc) = 1;
6de9cd9a 7349 TREE_INVARIANT (fdesc) = 1;
67231816
RH
7350
7351 vfun_inits = tree_cons (NULL_TREE, fdesc, vfun_inits);
7352 }
7353 }
7354 else
0cbd7506 7355 vfun_inits = tree_cons (NULL_TREE, init, vfun_inits);
ca36f057
MM
7356 }
7357
c35cce41
MM
7358 /* The initializers for virtual functions were built up in reverse
7359 order; straighten them out now. */
7360 vfun_inits = nreverse (vfun_inits);
c8094d83 7361
9bab6c90 7362 /* The negative offset initializers are also in reverse order. */
911a71a7 7363 vid.inits = nreverse (vid.inits);
9bab6c90
MM
7364
7365 /* Chain the two together. */
911a71a7 7366 return chainon (vid.inits, vfun_inits);
ca36f057
MM
7367}
7368
d0cd8b44 7369/* Adds to vid->inits the initializers for the vbase and vcall
c35cce41 7370 offsets in BINFO, which is in the hierarchy dominated by T. */
ca36f057 7371
c35cce41 7372static void
94edc4ab 7373build_vcall_and_vbase_vtbl_entries (tree binfo, vtbl_init_data* vid)
ca36f057 7374{
c35cce41 7375 tree b;
8d08fdba 7376
c35cce41 7377 /* If this is a derived class, we must first create entries
9bab6c90 7378 corresponding to the primary base class. */
911a71a7 7379 b = get_primary_binfo (binfo);
c35cce41 7380 if (b)
911a71a7 7381 build_vcall_and_vbase_vtbl_entries (b, vid);
c35cce41
MM
7382
7383 /* Add the vbase entries for this base. */
911a71a7 7384 build_vbase_offset_vtbl_entries (binfo, vid);
c35cce41 7385 /* Add the vcall entries for this base. */
911a71a7 7386 build_vcall_offset_vtbl_entries (binfo, vid);
ca36f057 7387}
8d08fdba 7388
ca36f057
MM
7389/* Returns the initializers for the vbase offset entries in the vtable
7390 for BINFO (which is part of the class hierarchy dominated by T), in
c35cce41
MM
7391 reverse order. VBASE_OFFSET_INDEX gives the vtable index
7392 where the next vbase offset will go. */
8d08fdba 7393
c35cce41 7394static void
94edc4ab 7395build_vbase_offset_vtbl_entries (tree binfo, vtbl_init_data* vid)
ca36f057 7396{
c35cce41
MM
7397 tree vbase;
7398 tree t;
90b1ca2f 7399 tree non_primary_binfo;
8d08fdba 7400
ca36f057
MM
7401 /* If there are no virtual baseclasses, then there is nothing to
7402 do. */
5775a06a 7403 if (!CLASSTYPE_VBASECLASSES (BINFO_TYPE (binfo)))
c35cce41 7404 return;
ca36f057 7405
911a71a7 7406 t = vid->derived;
c8094d83 7407
90b1ca2f
NS
7408 /* We might be a primary base class. Go up the inheritance hierarchy
7409 until we find the most derived class of which we are a primary base:
7410 it is the offset of that which we need to use. */
7411 non_primary_binfo = binfo;
7412 while (BINFO_INHERITANCE_CHAIN (non_primary_binfo))
7413 {
7414 tree b;
7415
7416 /* If we have reached a virtual base, then it must be a primary
7417 base (possibly multi-level) of vid->binfo, or we wouldn't
7418 have called build_vcall_and_vbase_vtbl_entries for it. But it
7419 might be a lost primary, so just skip down to vid->binfo. */
809e3e7f 7420 if (BINFO_VIRTUAL_P (non_primary_binfo))
90b1ca2f
NS
7421 {
7422 non_primary_binfo = vid->binfo;
7423 break;
7424 }
7425
7426 b = BINFO_INHERITANCE_CHAIN (non_primary_binfo);
7427 if (get_primary_binfo (b) != non_primary_binfo)
7428 break;
7429 non_primary_binfo = b;
7430 }
ca36f057 7431
c35cce41
MM
7432 /* Go through the virtual bases, adding the offsets. */
7433 for (vbase = TYPE_BINFO (BINFO_TYPE (binfo));
7434 vbase;
7435 vbase = TREE_CHAIN (vbase))
7436 {
7437 tree b;
7438 tree delta;
c8094d83 7439
809e3e7f 7440 if (!BINFO_VIRTUAL_P (vbase))
c35cce41 7441 continue;
ca36f057 7442
c35cce41
MM
7443 /* Find the instance of this virtual base in the complete
7444 object. */
dbbf88d1 7445 b = copied_binfo (vbase, binfo);
c35cce41
MM
7446
7447 /* If we've already got an offset for this virtual base, we
7448 don't need another one. */
7449 if (BINFO_VTABLE_PATH_MARKED (b))
7450 continue;
dbbf88d1 7451 BINFO_VTABLE_PATH_MARKED (b) = 1;
c35cce41
MM
7452
7453 /* Figure out where we can find this vbase offset. */
c8094d83 7454 delta = size_binop (MULT_EXPR,
911a71a7 7455 vid->index,
c35cce41
MM
7456 convert (ssizetype,
7457 TYPE_SIZE_UNIT (vtable_entry_type)));
911a71a7 7458 if (vid->primary_vtbl_p)
c35cce41
MM
7459 BINFO_VPTR_FIELD (b) = delta;
7460
7461 if (binfo != TYPE_BINFO (t))
50bc768d
NS
7462 /* The vbase offset had better be the same. */
7463 gcc_assert (tree_int_cst_equal (delta, BINFO_VPTR_FIELD (vbase)));
c35cce41
MM
7464
7465 /* The next vbase will come at a more negative offset. */
a6f5e048
RH
7466 vid->index = size_binop (MINUS_EXPR, vid->index,
7467 ssize_int (TARGET_VTABLE_DATA_ENTRY_DISTANCE));
c35cce41
MM
7468
7469 /* The initializer is the delta from BINFO to this virtual base.
4e7512c9
MM
7470 The vbase offsets go in reverse inheritance-graph order, and
7471 we are walking in inheritance graph order so these end up in
7472 the right order. */
90b1ca2f 7473 delta = size_diffop (BINFO_OFFSET (b), BINFO_OFFSET (non_primary_binfo));
c8094d83
MS
7474
7475 *vid->last_init
9bab6c90 7476 = build_tree_list (NULL_TREE,
c8094d83 7477 fold_build1 (NOP_EXPR,
7866705a
SB
7478 vtable_entry_type,
7479 delta));
911a71a7 7480 vid->last_init = &TREE_CHAIN (*vid->last_init);
c35cce41 7481 }
8d08fdba 7482}
ca36f057 7483
b485e15b 7484/* Adds the initializers for the vcall offset entries in the vtable
d0cd8b44
JM
7485 for BINFO (which is part of the class hierarchy dominated by VID->DERIVED)
7486 to VID->INITS. */
b485e15b
MM
7487
7488static void
94edc4ab 7489build_vcall_offset_vtbl_entries (tree binfo, vtbl_init_data* vid)
b485e15b 7490{
548502d3
MM
7491 /* We only need these entries if this base is a virtual base. We
7492 compute the indices -- but do not add to the vtable -- when
7493 building the main vtable for a class. */
809e3e7f 7494 if (BINFO_VIRTUAL_P (binfo) || binfo == TYPE_BINFO (vid->derived))
548502d3
MM
7495 {
7496 /* We need a vcall offset for each of the virtual functions in this
7497 vtable. For example:
b485e15b 7498
548502d3
MM
7499 class A { virtual void f (); };
7500 class B1 : virtual public A { virtual void f (); };
7501 class B2 : virtual public A { virtual void f (); };
7502 class C: public B1, public B2 { virtual void f (); };
d0cd8b44 7503
548502d3
MM
7504 A C object has a primary base of B1, which has a primary base of A. A
7505 C also has a secondary base of B2, which no longer has a primary base
7506 of A. So the B2-in-C construction vtable needs a secondary vtable for
7507 A, which will adjust the A* to a B2* to call f. We have no way of
7508 knowing what (or even whether) this offset will be when we define B2,
7509 so we store this "vcall offset" in the A sub-vtable and look it up in
7510 a "virtual thunk" for B2::f.
b485e15b 7511
548502d3
MM
7512 We need entries for all the functions in our primary vtable and
7513 in our non-virtual bases' secondary vtables. */
7514 vid->vbase = binfo;
7515 /* If we are just computing the vcall indices -- but do not need
7516 the actual entries -- not that. */
809e3e7f 7517 if (!BINFO_VIRTUAL_P (binfo))
548502d3
MM
7518 vid->generate_vcall_entries = false;
7519 /* Now, walk through the non-virtual bases, adding vcall offsets. */
7520 add_vcall_offset_vtbl_entries_r (binfo, vid);
7521 }
b485e15b
MM
7522}
7523
7524/* Build vcall offsets, starting with those for BINFO. */
7525
7526static void
94edc4ab 7527add_vcall_offset_vtbl_entries_r (tree binfo, vtbl_init_data* vid)
b485e15b
MM
7528{
7529 int i;
7530 tree primary_binfo;
fa743e8c 7531 tree base_binfo;
b485e15b
MM
7532
7533 /* Don't walk into virtual bases -- except, of course, for the
d0cd8b44
JM
7534 virtual base for which we are building vcall offsets. Any
7535 primary virtual base will have already had its offsets generated
7536 through the recursion in build_vcall_and_vbase_vtbl_entries. */
809e3e7f 7537 if (BINFO_VIRTUAL_P (binfo) && vid->vbase != binfo)
b485e15b 7538 return;
c8094d83 7539
b485e15b
MM
7540 /* If BINFO has a primary base, process it first. */
7541 primary_binfo = get_primary_binfo (binfo);
7542 if (primary_binfo)
7543 add_vcall_offset_vtbl_entries_r (primary_binfo, vid);
7544
7545 /* Add BINFO itself to the list. */
7546 add_vcall_offset_vtbl_entries_1 (binfo, vid);
7547
7548 /* Scan the non-primary bases of BINFO. */
fa743e8c
NS
7549 for (i = 0; BINFO_BASE_ITERATE (binfo, i, base_binfo); ++i)
7550 if (base_binfo != primary_binfo)
7551 add_vcall_offset_vtbl_entries_r (base_binfo, vid);
b485e15b
MM
7552}
7553
9965d119 7554/* Called from build_vcall_offset_vtbl_entries_r. */
e92cc029 7555
b485e15b 7556static void
94edc4ab 7557add_vcall_offset_vtbl_entries_1 (tree binfo, vtbl_init_data* vid)
8d08fdba 7558{
e6a66567
MM
7559 /* Make entries for the rest of the virtuals. */
7560 if (abi_version_at_least (2))
31f8e4f3 7561 {
e6a66567 7562 tree orig_fn;
911a71a7 7563
e6a66567
MM
7564 /* The ABI requires that the methods be processed in declaration
7565 order. G++ 3.2 used the order in the vtable. */
7566 for (orig_fn = TYPE_METHODS (BINFO_TYPE (binfo));
7567 orig_fn;
7568 orig_fn = TREE_CHAIN (orig_fn))
7569 if (DECL_VINDEX (orig_fn))
95675950 7570 add_vcall_offset (orig_fn, binfo, vid);
e6a66567
MM
7571 }
7572 else
7573 {
7574 tree derived_virtuals;
7575 tree base_virtuals;
7576 tree orig_virtuals;
7577 /* If BINFO is a primary base, the most derived class which has
7578 BINFO as a primary base; otherwise, just BINFO. */
7579 tree non_primary_binfo;
7580
7581 /* We might be a primary base class. Go up the inheritance hierarchy
7582 until we find the most derived class of which we are a primary base:
7583 it is the BINFO_VIRTUALS there that we need to consider. */
7584 non_primary_binfo = binfo;
7585 while (BINFO_INHERITANCE_CHAIN (non_primary_binfo))
911a71a7 7586 {
e6a66567
MM
7587 tree b;
7588
7589 /* If we have reached a virtual base, then it must be vid->vbase,
7590 because we ignore other virtual bases in
7591 add_vcall_offset_vtbl_entries_r. In turn, it must be a primary
7592 base (possibly multi-level) of vid->binfo, or we wouldn't
7593 have called build_vcall_and_vbase_vtbl_entries for it. But it
7594 might be a lost primary, so just skip down to vid->binfo. */
809e3e7f 7595 if (BINFO_VIRTUAL_P (non_primary_binfo))
e6a66567 7596 {
8dc2b103 7597 gcc_assert (non_primary_binfo == vid->vbase);
e6a66567
MM
7598 non_primary_binfo = vid->binfo;
7599 break;
7600 }
911a71a7 7601
e6a66567
MM
7602 b = BINFO_INHERITANCE_CHAIN (non_primary_binfo);
7603 if (get_primary_binfo (b) != non_primary_binfo)
7604 break;
7605 non_primary_binfo = b;
7606 }
4e7512c9 7607
e6a66567
MM
7608 if (vid->ctor_vtbl_p)
7609 /* For a ctor vtable we need the equivalent binfo within the hierarchy
7610 where rtti_binfo is the most derived type. */
dbbf88d1
NS
7611 non_primary_binfo
7612 = original_binfo (non_primary_binfo, vid->rtti_binfo);
c8094d83 7613
e6a66567
MM
7614 for (base_virtuals = BINFO_VIRTUALS (binfo),
7615 derived_virtuals = BINFO_VIRTUALS (non_primary_binfo),
7616 orig_virtuals = BINFO_VIRTUALS (TYPE_BINFO (BINFO_TYPE (binfo)));
7617 base_virtuals;
7618 base_virtuals = TREE_CHAIN (base_virtuals),
7619 derived_virtuals = TREE_CHAIN (derived_virtuals),
7620 orig_virtuals = TREE_CHAIN (orig_virtuals))
7621 {
7622 tree orig_fn;
73ea87d7 7623
e6a66567
MM
7624 /* Find the declaration that originally caused this function to
7625 be present in BINFO_TYPE (binfo). */
7626 orig_fn = BV_FN (orig_virtuals);
9bab6c90 7627
e6a66567
MM
7628 /* When processing BINFO, we only want to generate vcall slots for
7629 function slots introduced in BINFO. So don't try to generate
7630 one if the function isn't even defined in BINFO. */
539ed333 7631 if (!SAME_BINFO_TYPE_P (BINFO_TYPE (binfo), DECL_CONTEXT (orig_fn)))
e6a66567 7632 continue;
b485e15b 7633
95675950 7634 add_vcall_offset (orig_fn, binfo, vid);
e6a66567
MM
7635 }
7636 }
7637}
b485e15b 7638
95675950 7639/* Add a vcall offset entry for ORIG_FN to the vtable. */
b485e15b 7640
e6a66567 7641static void
95675950 7642add_vcall_offset (tree orig_fn, tree binfo, vtbl_init_data *vid)
e6a66567
MM
7643{
7644 size_t i;
7645 tree vcall_offset;
1e625046 7646 tree derived_entry;
9bab6c90 7647
e6a66567
MM
7648 /* If there is already an entry for a function with the same
7649 signature as FN, then we do not need a second vcall offset.
7650 Check the list of functions already present in the derived
7651 class vtable. */
c8094d83 7652 for (i = 0; VEC_iterate (tree, vid->fns, i, derived_entry); ++i)
e6a66567 7653 {
e6a66567
MM
7654 if (same_signature_p (derived_entry, orig_fn)
7655 /* We only use one vcall offset for virtual destructors,
7656 even though there are two virtual table entries. */
7657 || (DECL_DESTRUCTOR_P (derived_entry)
7658 && DECL_DESTRUCTOR_P (orig_fn)))
7659 return;
7660 }
4e7512c9 7661
e6a66567
MM
7662 /* If we are building these vcall offsets as part of building
7663 the vtable for the most derived class, remember the vcall
7664 offset. */
7665 if (vid->binfo == TYPE_BINFO (vid->derived))
0871761b 7666 {
d4e6fecb 7667 tree_pair_p elt = VEC_safe_push (tree_pair_s, gc,
0871761b
NS
7668 CLASSTYPE_VCALL_INDICES (vid->derived),
7669 NULL);
7670 elt->purpose = orig_fn;
7671 elt->value = vid->index;
7672 }
c8094d83 7673
e6a66567
MM
7674 /* The next vcall offset will be found at a more negative
7675 offset. */
7676 vid->index = size_binop (MINUS_EXPR, vid->index,
7677 ssize_int (TARGET_VTABLE_DATA_ENTRY_DISTANCE));
7678
7679 /* Keep track of this function. */
1e625046 7680 VEC_safe_push (tree, gc, vid->fns, orig_fn);
e6a66567
MM
7681
7682 if (vid->generate_vcall_entries)
7683 {
7684 tree base;
e6a66567 7685 tree fn;
548502d3 7686
e6a66567 7687 /* Find the overriding function. */
95675950 7688 fn = find_final_overrider (vid->rtti_binfo, binfo, orig_fn);
e6a66567
MM
7689 if (fn == error_mark_node)
7690 vcall_offset = build1 (NOP_EXPR, vtable_entry_type,
7691 integer_zero_node);
7692 else
7693 {
95675950
MM
7694 base = TREE_VALUE (fn);
7695
7696 /* The vbase we're working on is a primary base of
7697 vid->binfo. But it might be a lost primary, so its
7698 BINFO_OFFSET might be wrong, so we just use the
7699 BINFO_OFFSET from vid->binfo. */
7700 vcall_offset = size_diffop (BINFO_OFFSET (base),
7701 BINFO_OFFSET (vid->binfo));
7866705a
SB
7702 vcall_offset = fold_build1 (NOP_EXPR, vtable_entry_type,
7703 vcall_offset);
548502d3 7704 }
34cd5ae7 7705 /* Add the initializer to the vtable. */
e6a66567
MM
7706 *vid->last_init = build_tree_list (NULL_TREE, vcall_offset);
7707 vid->last_init = &TREE_CHAIN (*vid->last_init);
c35cce41 7708 }
570221c2 7709}
b54ccf71 7710
34cd5ae7 7711/* Return vtbl initializers for the RTTI entries corresponding to the
aabb4cd6 7712 BINFO's vtable. The RTTI entries should indicate the object given
73ea87d7 7713 by VID->rtti_binfo. */
b54ccf71 7714
9bab6c90 7715static void
94edc4ab 7716build_rtti_vtbl_entries (tree binfo, vtbl_init_data* vid)
b54ccf71 7717{
ca36f057 7718 tree b;
aabb4cd6 7719 tree t;
ca36f057 7720 tree basetype;
ca36f057
MM
7721 tree offset;
7722 tree decl;
7723 tree init;
b54ccf71 7724
ca36f057 7725 basetype = BINFO_TYPE (binfo);
73ea87d7 7726 t = BINFO_TYPE (vid->rtti_binfo);
b54ccf71 7727
ca36f057
MM
7728 /* To find the complete object, we will first convert to our most
7729 primary base, and then add the offset in the vtbl to that value. */
7730 b = binfo;
9965d119 7731 while (CLASSTYPE_HAS_PRIMARY_BASE_P (BINFO_TYPE (b))
0cbd7506 7732 && !BINFO_LOST_PRIMARY_P (b))
b54ccf71 7733 {
c35cce41
MM
7734 tree primary_base;
7735
911a71a7 7736 primary_base = get_primary_binfo (b);
fc6633e0
NS
7737 gcc_assert (BINFO_PRIMARY_P (primary_base)
7738 && BINFO_INHERITANCE_CHAIN (primary_base) == b);
c35cce41 7739 b = primary_base;
b54ccf71 7740 }
73ea87d7 7741 offset = size_diffop (BINFO_OFFSET (vid->rtti_binfo), BINFO_OFFSET (b));
8f032717 7742
8fa33dfa
MM
7743 /* The second entry is the address of the typeinfo object. */
7744 if (flag_rtti)
7993382e 7745 decl = build_address (get_tinfo_decl (t));
ca36f057 7746 else
8fa33dfa 7747 decl = integer_zero_node;
c8094d83 7748
8fa33dfa
MM
7749 /* Convert the declaration to a type that can be stored in the
7750 vtable. */
7993382e 7751 init = build_nop (vfunc_ptr_type_node, decl);
911a71a7
MM
7752 *vid->last_init = build_tree_list (NULL_TREE, init);
7753 vid->last_init = &TREE_CHAIN (*vid->last_init);
8f032717 7754
78dcd41a
VR
7755 /* Add the offset-to-top entry. It comes earlier in the vtable than
7756 the typeinfo entry. Convert the offset to look like a
c4372ef4 7757 function pointer, so that we can put it in the vtable. */
7993382e 7758 init = build_nop (vfunc_ptr_type_node, offset);
c4372ef4
NS
7759 *vid->last_init = build_tree_list (NULL_TREE, init);
7760 vid->last_init = &TREE_CHAIN (*vid->last_init);
8f032717 7761}
0f59171d
RH
7762
7763/* Fold a OBJ_TYPE_REF expression to the address of a function.
7764 KNOWN_TYPE carries the true type of OBJ_TYPE_REF_OBJECT(REF). */
7765
7766tree
7767cp_fold_obj_type_ref (tree ref, tree known_type)
7768{
7769 HOST_WIDE_INT index = tree_low_cst (OBJ_TYPE_REF_TOKEN (ref), 1);
7770 HOST_WIDE_INT i = 0;
604a3205 7771 tree v = BINFO_VIRTUALS (TYPE_BINFO (known_type));
0f59171d
RH
7772 tree fndecl;
7773
7774 while (i != index)
7775 {
7776 i += (TARGET_VTABLE_USES_DESCRIPTORS
7777 ? TARGET_VTABLE_USES_DESCRIPTORS : 1);
7778 v = TREE_CHAIN (v);
7779 }
7780
7781 fndecl = BV_FN (v);
7782
7783#ifdef ENABLE_CHECKING
8dc2b103
NS
7784 gcc_assert (tree_int_cst_equal (OBJ_TYPE_REF_TOKEN (ref),
7785 DECL_VINDEX (fndecl)));
0f59171d
RH
7786#endif
7787
8634c649
JJ
7788 cgraph_node (fndecl)->local.vtable_method = true;
7789
0f59171d
RH
7790 return build_address (fndecl);
7791}
d7afec4b 7792
1b746b0f 7793#include "gt-cp-class.h"