]> git.ipfire.org Git - thirdparty/gcc.git/blame - gcc/cp/class.c
re PR fortran/37011 (F2003, type extension: multiple inheritence not rejected)
[thirdparty/gcc.git] / gcc / cp / class.c
CommitLineData
8d08fdba 1/* Functions related to building classes and their related objects.
06ceef4e 2 Copyright (C) 1987, 1992, 1993, 1994, 1995, 1996, 1997, 1998,
9e1e64ec 3 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2007, 2008
fc40d49c 4 Free Software Foundation, Inc.
8d08fdba
MS
5 Contributed by Michael Tiemann (tiemann@cygnus.com)
6
f5adbb8d 7This file is part of GCC.
8d08fdba 8
f5adbb8d 9GCC is free software; you can redistribute it and/or modify
8d08fdba 10it under the terms of the GNU General Public License as published by
e77f031d 11the Free Software Foundation; either version 3, or (at your option)
8d08fdba
MS
12any later version.
13
f5adbb8d 14GCC is distributed in the hope that it will be useful,
8d08fdba
MS
15but WITHOUT ANY WARRANTY; without even the implied warranty of
16MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17GNU General Public License for more details.
18
19You should have received a copy of the GNU General Public License
e77f031d
NC
20along with GCC; see the file COPYING3. If not see
21<http://www.gnu.org/licenses/>. */
8d08fdba
MS
22
23
e92cc029 24/* High-level class interface. */
8d08fdba
MS
25
26#include "config.h"
8d052bc7 27#include "system.h"
4977bab6
ZW
28#include "coretypes.h"
29#include "tm.h"
e7a587ef 30#include "tree.h"
8d08fdba
MS
31#include "cp-tree.h"
32#include "flags.h"
28cbf42c 33#include "rtl.h"
e8abc66f 34#include "output.h"
54f92bfb 35#include "toplev.h"
1af6141b 36#include "target.h"
7b6d72fc 37#include "convert.h"
8634c649 38#include "cgraph.h"
ef330312 39#include "tree-dump.h"
8d08fdba 40
61a127b3
MM
41/* The number of nested classes being processed. If we are not in the
42 scope of any class, this is zero. */
43
8d08fdba
MS
44int current_class_depth;
45
61a127b3
MM
46/* In order to deal with nested classes, we keep a stack of classes.
47 The topmost entry is the innermost class, and is the entry at index
48 CURRENT_CLASS_DEPTH */
49
50typedef struct class_stack_node {
51 /* The name of the class. */
52 tree name;
53
54 /* The _TYPE node for the class. */
55 tree type;
56
57 /* The access specifier pending for new declarations in the scope of
58 this class. */
59 tree access;
8f032717
MM
60
61 /* If were defining TYPE, the names used in this class. */
62 splay_tree names_used;
c888c93b
MM
63
64 /* Nonzero if this class is no longer open, because of a call to
65 push_to_top_level. */
66 size_t hidden;
61a127b3
MM
67}* class_stack_node_t;
68
911a71a7 69typedef struct vtbl_init_data_s
c35cce41 70{
911a71a7
MM
71 /* The base for which we're building initializers. */
72 tree binfo;
73ea87d7 73 /* The type of the most-derived type. */
c35cce41 74 tree derived;
73ea87d7
NS
75 /* The binfo for the dynamic type. This will be TYPE_BINFO (derived),
76 unless ctor_vtbl_p is true. */
77 tree rtti_binfo;
9bab6c90
MM
78 /* The negative-index vtable initializers built up so far. These
79 are in order from least negative index to most negative index. */
80 tree inits;
d0cd8b44 81 /* The last (i.e., most negative) entry in INITS. */
9bab6c90 82 tree* last_init;
c35cce41 83 /* The binfo for the virtual base for which we're building
911a71a7 84 vcall offset initializers. */
c35cce41 85 tree vbase;
9bab6c90
MM
86 /* The functions in vbase for which we have already provided vcall
87 offsets. */
1e625046 88 VEC(tree,gc) *fns;
c35cce41
MM
89 /* The vtable index of the next vcall or vbase offset. */
90 tree index;
91 /* Nonzero if we are building the initializer for the primary
92 vtable. */
911a71a7
MM
93 int primary_vtbl_p;
94 /* Nonzero if we are building the initializer for a construction
95 vtable. */
96 int ctor_vtbl_p;
548502d3
MM
97 /* True when adding vcall offset entries to the vtable. False when
98 merely computing the indices. */
99 bool generate_vcall_entries;
911a71a7 100} vtbl_init_data;
c35cce41 101
c20118a8 102/* The type of a function passed to walk_subobject_offsets. */
94edc4ab 103typedef int (*subobject_offset_fn) (tree, tree, splay_tree);
c20118a8 104
4639c5c6 105/* The stack itself. This is a dynamically resized array. The
61a127b3
MM
106 number of elements allocated is CURRENT_CLASS_STACK_SIZE. */
107static int current_class_stack_size;
108static class_stack_node_t current_class_stack;
109
c5a35c3c
MM
110/* The size of the largest empty class seen in this translation unit. */
111static GTY (()) tree sizeof_biggest_empty_class;
112
1f6e1acc
AS
113/* An array of all local classes present in this translation unit, in
114 declaration order. */
806aa901 115VEC(tree,gc) *local_classes;
1f6e1acc 116
94edc4ab
NN
117static tree get_vfield_name (tree);
118static void finish_struct_anon (tree);
119static tree get_vtable_name (tree);
120static tree get_basefndecls (tree, tree);
121static int build_primary_vtable (tree, tree);
dbbf88d1 122static int build_secondary_vtable (tree);
94edc4ab
NN
123static void finish_vtbls (tree);
124static void modify_vtable_entry (tree, tree, tree, tree, tree *);
94edc4ab
NN
125static void finish_struct_bits (tree);
126static int alter_access (tree, tree, tree);
127static void handle_using_decl (tree, tree);
94edc4ab
NN
128static tree dfs_modify_vtables (tree, void *);
129static tree modify_all_vtables (tree, tree);
fc6633e0 130static void determine_primary_bases (tree);
94edc4ab
NN
131static void finish_struct_methods (tree);
132static void maybe_warn_about_overly_private_class (tree);
94edc4ab
NN
133static int method_name_cmp (const void *, const void *);
134static int resort_method_name_cmp (const void *, const void *);
e5e459bf 135static void add_implicitly_declared_members (tree, int, int);
94edc4ab 136static tree fixed_type_or_null (tree, int *, int *);
00bfffa4 137static tree build_simple_base_path (tree expr, tree binfo);
94edc4ab
NN
138static tree build_vtbl_ref_1 (tree, tree);
139static tree build_vtbl_initializer (tree, tree, tree, tree, int *);
140static int count_fields (tree);
d07605f5 141static int add_fields_to_record_type (tree, struct sorted_fields_type*, int);
e7df0180 142static bool check_bitfield_decl (tree);
e5e459bf
AO
143static void check_field_decl (tree, tree, int *, int *, int *);
144static void check_field_decls (tree, tree *, int *, int *);
58731fd1
MM
145static tree *build_base_field (record_layout_info, tree, splay_tree, tree *);
146static void build_base_fields (record_layout_info, splay_tree, tree *);
94edc4ab
NN
147static void check_methods (tree);
148static void remove_zero_width_bit_fields (tree);
e5e459bf 149static void check_bases (tree, int *, int *);
58731fd1
MM
150static void check_bases_and_members (tree);
151static tree create_vtable_ptr (tree, tree *);
17bbb839 152static void include_empty_classes (record_layout_info);
e93ee644 153static void layout_class_type (tree, tree *);
94edc4ab
NN
154static void fixup_pending_inline (tree);
155static void fixup_inline_methods (tree);
dbbf88d1 156static void propagate_binfo_offsets (tree, tree);
17bbb839 157static void layout_virtual_bases (record_layout_info, splay_tree);
94edc4ab
NN
158static void build_vbase_offset_vtbl_entries (tree, vtbl_init_data *);
159static void add_vcall_offset_vtbl_entries_r (tree, vtbl_init_data *);
160static void add_vcall_offset_vtbl_entries_1 (tree, vtbl_init_data *);
161static void build_vcall_offset_vtbl_entries (tree, vtbl_init_data *);
e6a66567 162static void add_vcall_offset (tree, tree, vtbl_init_data *);
94edc4ab 163static void layout_vtable_decl (tree, int);
5d5a519f 164static tree dfs_find_final_overrider_pre (tree, void *);
dbbf88d1 165static tree dfs_find_final_overrider_post (tree, void *);
94edc4ab
NN
166static tree find_final_overrider (tree, tree, tree);
167static int make_new_vtable (tree, tree);
b5791fdc 168static tree get_primary_binfo (tree);
94edc4ab 169static int maybe_indent_hierarchy (FILE *, int, int);
dbbf88d1 170static tree dump_class_hierarchy_r (FILE *, int, tree, tree, int);
94edc4ab 171static void dump_class_hierarchy (tree);
bb885938 172static void dump_class_hierarchy_1 (FILE *, int, tree);
94edc4ab
NN
173static void dump_array (FILE *, tree);
174static void dump_vtable (tree, tree, tree);
175static void dump_vtt (tree, tree);
bb885938 176static void dump_thunk (FILE *, int, tree);
94edc4ab
NN
177static tree build_vtable (tree, tree, tree);
178static void initialize_vtable (tree, tree);
94edc4ab 179static void layout_nonempty_base_or_field (record_layout_info,
5d5a519f 180 tree, tree, splay_tree);
94edc4ab 181static tree end_of_class (tree, int);
d9d9dbc0 182static bool layout_empty_base (record_layout_info, tree, tree, splay_tree);
94edc4ab
NN
183static void accumulate_vtbl_inits (tree, tree, tree, tree, tree);
184static tree dfs_accumulate_vtbl_inits (tree, tree, tree, tree,
185 tree);
186static void build_rtti_vtbl_entries (tree, vtbl_init_data *);
5d5a519f 187static void build_vcall_and_vbase_vtbl_entries (tree, vtbl_init_data *);
94edc4ab
NN
188static void clone_constructors_and_destructors (tree);
189static tree build_clone (tree, tree);
a2ddc397 190static void update_vtable_entry_for_fn (tree, tree, tree, tree *, unsigned);
94edc4ab
NN
191static void build_ctor_vtbl_group (tree, tree);
192static void build_vtt (tree);
193static tree binfo_ctor_vtable (tree);
194static tree *build_vtt_inits (tree, tree, tree *, tree *);
195static tree dfs_build_secondary_vptr_vtt_inits (tree, void *);
94edc4ab 196static tree dfs_fixup_binfo_vtbls (tree, void *);
94edc4ab
NN
197static int record_subobject_offset (tree, tree, splay_tree);
198static int check_subobject_offset (tree, tree, splay_tree);
199static int walk_subobject_offsets (tree, subobject_offset_fn,
5d5a519f 200 tree, splay_tree, tree, int);
c5a35c3c 201static void record_subobject_offsets (tree, tree, splay_tree, bool);
94edc4ab
NN
202static int layout_conflict_p (tree, tree, splay_tree, int);
203static int splay_tree_compare_integer_csts (splay_tree_key k1,
5d5a519f 204 splay_tree_key k2);
94edc4ab
NN
205static void warn_about_ambiguous_bases (tree);
206static bool type_requires_array_cookie (tree);
956d9305 207static bool contains_empty_class_p (tree);
9368208b 208static bool base_derived_from (tree, tree);
7ba539c6 209static int empty_base_at_nonzero_offset_p (tree, tree, splay_tree);
ba9a991f 210static tree end_of_base (tree);
548502d3 211static tree get_vcall_index (tree, tree);
9965d119 212
51c184be 213/* Variables shared between class.c and call.c. */
8d08fdba 214
5566b478 215#ifdef GATHER_STATISTICS
8d08fdba
MS
216int n_vtables = 0;
217int n_vtable_entries = 0;
218int n_vtable_searches = 0;
219int n_vtable_elems = 0;
220int n_convert_harshness = 0;
221int n_compute_conversion_costs = 0;
8d08fdba 222int n_inner_fields_searched = 0;
5566b478 223#endif
8d08fdba 224
338d90b8
NS
225/* Convert to or from a base subobject. EXPR is an expression of type
226 `A' or `A*', an expression of type `B' or `B*' is returned. To
227 convert A to a base B, CODE is PLUS_EXPR and BINFO is the binfo for
228 the B base instance within A. To convert base A to derived B, CODE
229 is MINUS_EXPR and BINFO is the binfo for the A instance within B.
230 In this latter case, A must not be a morally virtual base of B.
231 NONNULL is true if EXPR is known to be non-NULL (this is only
232 needed when EXPR is of pointer type). CV qualifiers are preserved
233 from EXPR. */
ca36f057
MM
234
235tree
94edc4ab 236build_base_path (enum tree_code code,
0cbd7506
MS
237 tree expr,
238 tree binfo,
239 int nonnull)
1a588ad7 240{
338d90b8 241 tree v_binfo = NULL_TREE;
6bc34b14 242 tree d_binfo = NULL_TREE;
338d90b8
NS
243 tree probe;
244 tree offset;
245 tree target_type;
246 tree null_test = NULL;
247 tree ptr_target_type;
ca36f057 248 int fixed_type_p;
338d90b8 249 int want_pointer = TREE_CODE (TREE_TYPE (expr)) == POINTER_TYPE;
00bfffa4 250 bool has_empty = false;
d7981fd9 251 bool virtual_access;
1a588ad7 252
338d90b8
NS
253 if (expr == error_mark_node || binfo == error_mark_node || !binfo)
254 return error_mark_node;
6bc34b14
JM
255
256 for (probe = binfo; probe; probe = BINFO_INHERITANCE_CHAIN (probe))
257 {
258 d_binfo = probe;
00bfffa4
JM
259 if (is_empty_class (BINFO_TYPE (probe)))
260 has_empty = true;
809e3e7f 261 if (!v_binfo && BINFO_VIRTUAL_P (probe))
6bc34b14
JM
262 v_binfo = probe;
263 }
338d90b8
NS
264
265 probe = TYPE_MAIN_VARIANT (TREE_TYPE (expr));
266 if (want_pointer)
267 probe = TYPE_MAIN_VARIANT (TREE_TYPE (probe));
00bfffa4 268
539ed333
NS
269 gcc_assert ((code == MINUS_EXPR
270 && SAME_BINFO_TYPE_P (BINFO_TYPE (binfo), probe))
271 || (code == PLUS_EXPR
272 && SAME_BINFO_TYPE_P (BINFO_TYPE (d_binfo), probe)));
c8094d83 273
00bfffa4
JM
274 if (binfo == d_binfo)
275 /* Nothing to do. */
276 return expr;
277
338d90b8
NS
278 if (code == MINUS_EXPR && v_binfo)
279 {
1f070f2b 280 error ("cannot convert from base %qT to derived type %qT via virtual base %qT",
6bc34b14 281 BINFO_TYPE (binfo), BINFO_TYPE (d_binfo), BINFO_TYPE (v_binfo));
338d90b8
NS
282 return error_mark_node;
283 }
1a588ad7 284
f576dfc4
JM
285 if (!want_pointer)
286 /* This must happen before the call to save_expr. */
5ade1ed2 287 expr = cp_build_unary_op (ADDR_EXPR, expr, 0, tf_warning_or_error);
f576dfc4 288
00bfffa4 289 offset = BINFO_OFFSET (binfo);
ca36f057 290 fixed_type_p = resolves_to_fixed_type_p (expr, &nonnull);
0e686aa6 291 target_type = code == PLUS_EXPR ? BINFO_TYPE (binfo) : BINFO_TYPE (d_binfo);
00bfffa4 292
d7981fd9 293 /* Do we need to look in the vtable for the real offset? */
7a0b47e3
JM
294 virtual_access = (v_binfo && fixed_type_p <= 0);
295
296 /* Don't bother with the calculations inside sizeof; they'll ICE if the
297 source type is incomplete and the pointer value doesn't matter. */
298 if (skip_evaluation)
dc555429
JM
299 {
300 expr = build_nop (build_pointer_type (target_type), expr);
301 if (!want_pointer)
302 expr = build_indirect_ref (expr, NULL);
303 return expr;
304 }
d7981fd9
JM
305
306 /* Do we need to check for a null pointer? */
0e686aa6
MM
307 if (want_pointer && !nonnull)
308 {
309 /* If we know the conversion will not actually change the value
310 of EXPR, then we can avoid testing the expression for NULL.
311 We have to avoid generating a COMPONENT_REF for a base class
312 field, because other parts of the compiler know that such
313 expressions are always non-NULL. */
314 if (!virtual_access && integer_zerop (offset))
a607b96e
MM
315 {
316 tree class_type;
317 /* TARGET_TYPE has been extracted from BINFO, and, is
318 therefore always cv-unqualified. Extract the
319 cv-qualifiers from EXPR so that the expression returned
320 matches the input. */
321 class_type = TREE_TYPE (TREE_TYPE (expr));
322 target_type
323 = cp_build_qualified_type (target_type,
324 cp_type_quals (class_type));
325 return build_nop (build_pointer_type (target_type), expr);
326 }
0e686aa6
MM
327 null_test = error_mark_node;
328 }
00bfffa4 329
d7981fd9
JM
330 /* Protect against multiple evaluation if necessary. */
331 if (TREE_SIDE_EFFECTS (expr) && (null_test || virtual_access))
ca36f057 332 expr = save_expr (expr);
f2606a97 333
d7981fd9 334 /* Now that we've saved expr, build the real null test. */
00bfffa4 335 if (null_test)
471a58a9
AP
336 {
337 tree zero = cp_convert (TREE_TYPE (expr), integer_zero_node);
7866705a
SB
338 null_test = fold_build2 (NE_EXPR, boolean_type_node,
339 expr, zero);
471a58a9 340 }
00bfffa4
JM
341
342 /* If this is a simple base reference, express it as a COMPONENT_REF. */
d7981fd9 343 if (code == PLUS_EXPR && !virtual_access
00bfffa4
JM
344 /* We don't build base fields for empty bases, and they aren't very
345 interesting to the optimizers anyway. */
346 && !has_empty)
347 {
5ade1ed2 348 expr = cp_build_indirect_ref (expr, NULL, tf_warning_or_error);
00bfffa4
JM
349 expr = build_simple_base_path (expr, binfo);
350 if (want_pointer)
442c8e31 351 expr = build_address (expr);
00bfffa4
JM
352 target_type = TREE_TYPE (expr);
353 goto out;
354 }
355
d7981fd9 356 if (virtual_access)
1a588ad7 357 {
338d90b8 358 /* Going via virtual base V_BINFO. We need the static offset
0cbd7506
MS
359 from V_BINFO to BINFO, and the dynamic offset from D_BINFO to
360 V_BINFO. That offset is an entry in D_BINFO's vtable. */
1f5a253a
NS
361 tree v_offset;
362
363 if (fixed_type_p < 0 && in_base_initializer)
364 {
2acb1af9
NS
365 /* In a base member initializer, we cannot rely on the
366 vtable being set up. We have to indirect via the
367 vtt_parm. */
6de9cd9a
DN
368 tree t;
369
2acb1af9 370 t = TREE_TYPE (TYPE_VFIELD (current_class_type));
6de9cd9a
DN
371 t = build_pointer_type (t);
372 v_offset = convert (t, current_vtt_parm);
5ade1ed2
DG
373 v_offset = cp_build_indirect_ref (v_offset, NULL,
374 tf_warning_or_error);
1f5a253a
NS
375 }
376 else
5ade1ed2
DG
377 v_offset = build_vfield_ref (cp_build_indirect_ref (expr, NULL,
378 tf_warning_or_error),
1f5a253a 379 TREE_TYPE (TREE_TYPE (expr)));
c8094d83 380
5be014d5
AP
381 v_offset = build2 (POINTER_PLUS_EXPR, TREE_TYPE (v_offset),
382 v_offset, fold_convert (sizetype, BINFO_VPTR_FIELD (v_binfo)));
c8094d83 383 v_offset = build1 (NOP_EXPR,
338d90b8
NS
384 build_pointer_type (ptrdiff_type_node),
385 v_offset);
5ade1ed2 386 v_offset = cp_build_indirect_ref (v_offset, NULL, tf_warning_or_error);
6de9cd9a 387 TREE_CONSTANT (v_offset) = 1;
f63ab951 388
7b6d72fc 389 offset = convert_to_integer (ptrdiff_type_node,
c8094d83 390 size_diffop (offset,
7b6d72fc 391 BINFO_OFFSET (v_binfo)));
8d08fdba 392
338d90b8 393 if (!integer_zerop (offset))
f293ce4b 394 v_offset = build2 (code, ptrdiff_type_node, v_offset, offset);
f2606a97
JM
395
396 if (fixed_type_p < 0)
397 /* Negative fixed_type_p means this is a constructor or destructor;
398 virtual base layout is fixed in in-charge [cd]tors, but not in
399 base [cd]tors. */
f293ce4b
RS
400 offset = build3 (COND_EXPR, ptrdiff_type_node,
401 build2 (EQ_EXPR, boolean_type_node,
402 current_in_charge_parm, integer_zero_node),
403 v_offset,
aa8f5c20
AP
404 convert_to_integer (ptrdiff_type_node,
405 BINFO_OFFSET (binfo)));
338d90b8
NS
406 else
407 offset = v_offset;
8d08fdba 408 }
8d08fdba 409
338d90b8
NS
410 target_type = cp_build_qualified_type
411 (target_type, cp_type_quals (TREE_TYPE (TREE_TYPE (expr))));
412 ptr_target_type = build_pointer_type (target_type);
413 if (want_pointer)
414 target_type = ptr_target_type;
c8094d83 415
338d90b8 416 expr = build1 (NOP_EXPR, ptr_target_type, expr);
fed3cef0 417
338d90b8 418 if (!integer_zerop (offset))
5be014d5
AP
419 {
420 offset = fold_convert (sizetype, offset);
421 if (code == MINUS_EXPR)
422 offset = fold_build1 (NEGATE_EXPR, sizetype, offset);
423 expr = build2 (POINTER_PLUS_EXPR, ptr_target_type, expr, offset);
424 }
8d08fdba 425 else
338d90b8 426 null_test = NULL;
c8094d83 427
338d90b8 428 if (!want_pointer)
5ade1ed2 429 expr = cp_build_indirect_ref (expr, NULL, tf_warning_or_error);
8d08fdba 430
00bfffa4 431 out:
338d90b8 432 if (null_test)
7866705a
SB
433 expr = fold_build3 (COND_EXPR, target_type, null_test, expr,
434 fold_build1 (NOP_EXPR, target_type,
435 integer_zero_node));
f2606a97 436
338d90b8 437 return expr;
8d08fdba
MS
438}
439
00bfffa4
JM
440/* Subroutine of build_base_path; EXPR and BINFO are as in that function.
441 Perform a derived-to-base conversion by recursively building up a
442 sequence of COMPONENT_REFs to the appropriate base fields. */
443
444static tree
445build_simple_base_path (tree expr, tree binfo)
446{
447 tree type = BINFO_TYPE (binfo);
fc6633e0 448 tree d_binfo = BINFO_INHERITANCE_CHAIN (binfo);
00bfffa4
JM
449 tree field;
450
00bfffa4
JM
451 if (d_binfo == NULL_TREE)
452 {
12a669d1 453 tree temp;
c8094d83 454
8dc2b103 455 gcc_assert (TYPE_MAIN_VARIANT (TREE_TYPE (expr)) == type);
c8094d83 456
12a669d1 457 /* Transform `(a, b).x' into `(*(a, &b)).x', `(a ? b : c).x'
0cbd7506 458 into `(*(a ? &b : &c)).x', and so on. A COND_EXPR is only
3b426391
KH
459 an lvalue in the front end; only _DECLs and _REFs are lvalues
460 in the back end. */
12a669d1
NS
461 temp = unary_complex_lvalue (ADDR_EXPR, expr);
462 if (temp)
5ade1ed2 463 expr = cp_build_indirect_ref (temp, NULL, tf_warning_or_error);
12a669d1 464
00bfffa4
JM
465 return expr;
466 }
467
468 /* Recurse. */
469 expr = build_simple_base_path (expr, d_binfo);
470
471 for (field = TYPE_FIELDS (BINFO_TYPE (d_binfo));
472 field; field = TREE_CHAIN (field))
473 /* Is this the base field created by build_base_field? */
474 if (TREE_CODE (field) == FIELD_DECL
642124c6
RH
475 && DECL_FIELD_IS_BASE (field)
476 && TREE_TYPE (field) == type)
12a669d1
NS
477 {
478 /* We don't use build_class_member_access_expr here, as that
479 has unnecessary checks, and more importantly results in
480 recursive calls to dfs_walk_once. */
481 int type_quals = cp_type_quals (TREE_TYPE (expr));
482
483 expr = build3 (COMPONENT_REF,
484 cp_build_qualified_type (type, type_quals),
485 expr, field, NULL_TREE);
486 expr = fold_if_not_in_template (expr);
c8094d83 487
12a669d1
NS
488 /* Mark the expression const or volatile, as appropriate.
489 Even though we've dealt with the type above, we still have
490 to mark the expression itself. */
491 if (type_quals & TYPE_QUAL_CONST)
492 TREE_READONLY (expr) = 1;
493 if (type_quals & TYPE_QUAL_VOLATILE)
494 TREE_THIS_VOLATILE (expr) = 1;
c8094d83 495
12a669d1
NS
496 return expr;
497 }
00bfffa4
JM
498
499 /* Didn't find the base field?!? */
8dc2b103 500 gcc_unreachable ();
00bfffa4
JM
501}
502
08e17d9d
MM
503/* Convert OBJECT to the base TYPE. OBJECT is an expression whose
504 type is a class type or a pointer to a class type. In the former
505 case, TYPE is also a class type; in the latter it is another
506 pointer type. If CHECK_ACCESS is true, an error message is emitted
507 if TYPE is inaccessible. If OBJECT has pointer type, the value is
508 assumed to be non-NULL. */
50ad9642
MM
509
510tree
08e17d9d 511convert_to_base (tree object, tree type, bool check_access, bool nonnull)
50ad9642
MM
512{
513 tree binfo;
08e17d9d 514 tree object_type;
50ad9642 515
08e17d9d
MM
516 if (TYPE_PTR_P (TREE_TYPE (object)))
517 {
518 object_type = TREE_TYPE (TREE_TYPE (object));
519 type = TREE_TYPE (type);
520 }
521 else
522 object_type = TREE_TYPE (object);
523
524 binfo = lookup_base (object_type, type,
c8094d83 525 check_access ? ba_check : ba_unique,
50ad9642 526 NULL);
5bfc90de 527 if (!binfo || binfo == error_mark_node)
50ad9642
MM
528 return error_mark_node;
529
08e17d9d 530 return build_base_path (PLUS_EXPR, object, binfo, nonnull);
50ad9642
MM
531}
532
539ed333
NS
533/* EXPR is an expression with unqualified class type. BASE is a base
534 binfo of that class type. Returns EXPR, converted to the BASE
22ed7e5f
MM
535 type. This function assumes that EXPR is the most derived class;
536 therefore virtual bases can be found at their static offsets. */
537
538tree
539convert_to_base_statically (tree expr, tree base)
540{
541 tree expr_type;
542
543 expr_type = TREE_TYPE (expr);
539ed333 544 if (!SAME_BINFO_TYPE_P (BINFO_TYPE (base), expr_type))
22ed7e5f
MM
545 {
546 tree pointer_type;
547
548 pointer_type = build_pointer_type (expr_type);
ffd34392
JH
549
550 /* We use fold_build2 and fold_convert below to simplify the trees
551 provided to the optimizers. It is not safe to call these functions
552 when processing a template because they do not handle C++-specific
553 trees. */
554 gcc_assert (!processing_template_decl);
5ade1ed2
DG
555 expr = cp_build_unary_op (ADDR_EXPR, expr, /*noconvert=*/1,
556 tf_warning_or_error);
22ed7e5f 557 if (!integer_zerop (BINFO_OFFSET (base)))
5be014d5
AP
558 expr = fold_build2 (POINTER_PLUS_EXPR, pointer_type, expr,
559 fold_convert (sizetype, BINFO_OFFSET (base)));
ffd34392
JH
560 expr = fold_convert (build_pointer_type (BINFO_TYPE (base)), expr);
561 expr = build_fold_indirect_ref (expr);
22ed7e5f
MM
562 }
563
564 return expr;
565}
566
f8361147 567\f
981c353e
RH
568tree
569build_vfield_ref (tree datum, tree type)
570{
571 tree vfield, vcontext;
572
573 if (datum == error_mark_node)
574 return error_mark_node;
575
981c353e
RH
576 /* First, convert to the requested type. */
577 if (!same_type_ignoring_top_level_qualifiers_p (TREE_TYPE (datum), type))
08e17d9d
MM
578 datum = convert_to_base (datum, type, /*check_access=*/false,
579 /*nonnull=*/true);
981c353e
RH
580
581 /* Second, the requested type may not be the owner of its own vptr.
582 If not, convert to the base class that owns it. We cannot use
583 convert_to_base here, because VCONTEXT may appear more than once
5995ebfb 584 in the inheritance hierarchy of TYPE, and thus direct conversion
981c353e
RH
585 between the types may be ambiguous. Following the path back up
586 one step at a time via primary bases avoids the problem. */
587 vfield = TYPE_VFIELD (type);
588 vcontext = DECL_CONTEXT (vfield);
589 while (!same_type_ignoring_top_level_qualifiers_p (vcontext, type))
590 {
591 datum = build_simple_base_path (datum, CLASSTYPE_PRIMARY_BINFO (type));
592 type = TREE_TYPE (datum);
593 }
594
595 return build3 (COMPONENT_REF, TREE_TYPE (vfield), datum, vfield, NULL_TREE);
596}
597
8d08fdba 598/* Given an object INSTANCE, return an expression which yields the
67231816
RH
599 vtable element corresponding to INDEX. There are many special
600 cases for INSTANCE which we take care of here, mainly to avoid
601 creating extra tree nodes when we don't have to. */
e92cc029 602
4a8d0c9c 603static tree
94edc4ab 604build_vtbl_ref_1 (tree instance, tree idx)
8d08fdba 605{
f63ab951
JM
606 tree aref;
607 tree vtbl = NULL_TREE;
8d08fdba 608
f63ab951
JM
609 /* Try to figure out what a reference refers to, and
610 access its virtual function table directly. */
611
612 int cdtorp = 0;
613 tree fixed_type = fixed_type_or_null (instance, NULL, &cdtorp);
614
ee76b931 615 tree basetype = non_reference (TREE_TYPE (instance));
8d08fdba 616
f63ab951 617 if (fixed_type && !cdtorp)
8d08fdba 618 {
f63ab951 619 tree binfo = lookup_base (fixed_type, basetype,
18e4be85 620 ba_unique | ba_quiet, NULL);
f63ab951 621 if (binfo)
6de9cd9a 622 vtbl = unshare_expr (BINFO_VTABLE (binfo));
f63ab951 623 }
8d08fdba 624
f63ab951 625 if (!vtbl)
dbbf88d1 626 vtbl = build_vfield_ref (instance, basetype);
c8094d83 627
e3417fcd 628 assemble_external (vtbl);
a1dd0d36 629
8d08fdba 630 aref = build_array_ref (vtbl, idx);
6de9cd9a 631 TREE_CONSTANT (aref) |= TREE_CONSTANT (vtbl) && TREE_CONSTANT (idx);
8d08fdba 632
c4372ef4 633 return aref;
8d08fdba
MS
634}
635
4a8d0c9c 636tree
94edc4ab 637build_vtbl_ref (tree instance, tree idx)
4a8d0c9c
RH
638{
639 tree aref = build_vtbl_ref_1 (instance, idx);
640
4a8d0c9c
RH
641 return aref;
642}
643
0f59171d
RH
644/* Given a stable object pointer INSTANCE_PTR, return an expression which
645 yields a function pointer corresponding to vtable element INDEX. */
67231816
RH
646
647tree
0f59171d 648build_vfn_ref (tree instance_ptr, tree idx)
67231816 649{
0f59171d
RH
650 tree aref;
651
5ade1ed2
DG
652 aref = build_vtbl_ref_1 (cp_build_indirect_ref (instance_ptr, 0,
653 tf_warning_or_error),
654 idx);
67231816
RH
655
656 /* When using function descriptors, the address of the
657 vtable entry is treated as a function pointer. */
658 if (TARGET_VTABLE_USES_DESCRIPTORS)
4a8d0c9c 659 aref = build1 (NOP_EXPR, TREE_TYPE (aref),
5ade1ed2
DG
660 cp_build_unary_op (ADDR_EXPR, aref, /*noconvert=*/1,
661 tf_warning_or_error));
67231816 662
0f59171d 663 /* Remember this as a method reference, for later devirtualization. */
f293ce4b 664 aref = build3 (OBJ_TYPE_REF, TREE_TYPE (aref), aref, instance_ptr, idx);
0f59171d 665
67231816
RH
666 return aref;
667}
668
669ec2b4
JM
669/* Return the name of the virtual function table (as an IDENTIFIER_NODE)
670 for the given TYPE. */
671
672static tree
94edc4ab 673get_vtable_name (tree type)
669ec2b4 674{
1f84ec23 675 return mangle_vtbl_for_type (type);
669ec2b4
JM
676}
677
4684cd27
MM
678/* DECL is an entity associated with TYPE, like a virtual table or an
679 implicitly generated constructor. Determine whether or not DECL
680 should have external or internal linkage at the object file
681 level. This routine does not deal with COMDAT linkage and other
682 similar complexities; it simply sets TREE_PUBLIC if it possible for
683 entities in other translation units to contain copies of DECL, in
684 the abstract. */
685
686void
687set_linkage_according_to_type (tree type, tree decl)
688{
689 /* If TYPE involves a local class in a function with internal
690 linkage, then DECL should have internal linkage too. Other local
691 classes have no linkage -- but if their containing functions
692 have external linkage, it makes sense for DECL to have external
693 linkage too. That will allow template definitions to be merged,
694 for example. */
695 if (no_linkage_check (type, /*relaxed_p=*/true))
696 {
697 TREE_PUBLIC (decl) = 0;
698 DECL_INTERFACE_KNOWN (decl) = 1;
699 }
700 else
701 TREE_PUBLIC (decl) = 1;
702}
703
459c43ad
MM
704/* Create a VAR_DECL for a primary or secondary vtable for CLASS_TYPE.
705 (For a secondary vtable for B-in-D, CLASS_TYPE should be D, not B.)
706 Use NAME for the name of the vtable, and VTABLE_TYPE for its type. */
b9f39201
MM
707
708static tree
94edc4ab 709build_vtable (tree class_type, tree name, tree vtable_type)
b9f39201
MM
710{
711 tree decl;
712
713 decl = build_lang_decl (VAR_DECL, name, vtable_type);
90ecce3e
JM
714 /* vtable names are already mangled; give them their DECL_ASSEMBLER_NAME
715 now to avoid confusion in mangle_decl. */
716 SET_DECL_ASSEMBLER_NAME (decl, name);
b9f39201
MM
717 DECL_CONTEXT (decl) = class_type;
718 DECL_ARTIFICIAL (decl) = 1;
719 TREE_STATIC (decl) = 1;
b9f39201 720 TREE_READONLY (decl) = 1;
b9f39201 721 DECL_VIRTUAL_P (decl) = 1;
a6f5e048 722 DECL_ALIGN (decl) = TARGET_VTABLE_ENTRY_ALIGN;
d35543c0 723 DECL_VTABLE_OR_VTT_P (decl) = 1;
78d55cc8
JM
724 /* At one time the vtable info was grabbed 2 words at a time. This
725 fails on sparc unless you have 8-byte alignment. (tiemann) */
726 DECL_ALIGN (decl) = MAX (TYPE_ALIGN (double_type_node),
727 DECL_ALIGN (decl));
4684cd27
MM
728 set_linkage_according_to_type (class_type, decl);
729 /* The vtable has not been defined -- yet. */
730 DECL_EXTERNAL (decl) = 1;
731 DECL_NOT_REALLY_EXTERN (decl) = 1;
732
78e0d62b
RH
733 /* Mark the VAR_DECL node representing the vtable itself as a
734 "gratuitous" one, thereby forcing dwarfout.c to ignore it. It
735 is rather important that such things be ignored because any
736 effort to actually generate DWARF for them will run into
737 trouble when/if we encounter code like:
c8094d83 738
78e0d62b
RH
739 #pragma interface
740 struct S { virtual void member (); };
c8094d83 741
78e0d62b
RH
742 because the artificial declaration of the vtable itself (as
743 manufactured by the g++ front end) will say that the vtable is
744 a static member of `S' but only *after* the debug output for
745 the definition of `S' has already been output. This causes
746 grief because the DWARF entry for the definition of the vtable
747 will try to refer back to an earlier *declaration* of the
748 vtable as a static member of `S' and there won't be one. We
749 might be able to arrange to have the "vtable static member"
750 attached to the member list for `S' before the debug info for
751 `S' get written (which would solve the problem) but that would
752 require more intrusive changes to the g++ front end. */
753 DECL_IGNORED_P (decl) = 1;
78d55cc8 754
b9f39201
MM
755 return decl;
756}
757
1aa4ccd4
NS
758/* Get the VAR_DECL of the vtable for TYPE. TYPE need not be polymorphic,
759 or even complete. If this does not exist, create it. If COMPLETE is
838dfd8a 760 nonzero, then complete the definition of it -- that will render it
1aa4ccd4
NS
761 impossible to actually build the vtable, but is useful to get at those
762 which are known to exist in the runtime. */
763
c8094d83 764tree
94edc4ab 765get_vtable_decl (tree type, int complete)
1aa4ccd4 766{
548502d3
MM
767 tree decl;
768
769 if (CLASSTYPE_VTABLES (type))
770 return CLASSTYPE_VTABLES (type);
c8094d83 771
d1a74aa7 772 decl = build_vtable (type, get_vtable_name (type), vtbl_type_node);
548502d3
MM
773 CLASSTYPE_VTABLES (type) = decl;
774
1aa4ccd4 775 if (complete)
217f4eb9
MM
776 {
777 DECL_EXTERNAL (decl) = 1;
d174af6c 778 finish_decl (decl, NULL_TREE, NULL_TREE);
217f4eb9 779 }
1aa4ccd4 780
1aa4ccd4
NS
781 return decl;
782}
783
28531dd0
MM
784/* Build the primary virtual function table for TYPE. If BINFO is
785 non-NULL, build the vtable starting with the initial approximation
786 that it is the same as the one which is the head of the association
838dfd8a 787 list. Returns a nonzero value if a new vtable is actually
28531dd0 788 created. */
e92cc029 789
28531dd0 790static int
94edc4ab 791build_primary_vtable (tree binfo, tree type)
8d08fdba 792{
31f8e4f3
MM
793 tree decl;
794 tree virtuals;
8d08fdba 795
1aa4ccd4 796 decl = get_vtable_decl (type, /*complete=*/0);
c8094d83 797
8d08fdba
MS
798 if (binfo)
799 {
dbbf88d1 800 if (BINFO_NEW_VTABLE_MARKED (binfo))
0533d788
MM
801 /* We have already created a vtable for this base, so there's
802 no need to do it again. */
28531dd0 803 return 0;
c8094d83 804
d1f05f93 805 virtuals = copy_list (BINFO_VIRTUALS (binfo));
c35cce41
MM
806 TREE_TYPE (decl) = TREE_TYPE (get_vtbl_decl_for_binfo (binfo));
807 DECL_SIZE (decl) = TYPE_SIZE (TREE_TYPE (decl));
808 DECL_SIZE_UNIT (decl) = TYPE_SIZE_UNIT (TREE_TYPE (decl));
8d08fdba
MS
809 }
810 else
811 {
50bc768d 812 gcc_assert (TREE_TYPE (decl) == vtbl_type_node);
8d08fdba 813 virtuals = NULL_TREE;
8d08fdba
MS
814 }
815
816#ifdef GATHER_STATISTICS
817 n_vtables += 1;
818 n_vtable_elems += list_length (virtuals);
819#endif
820
8d08fdba
MS
821 /* Initialize the association list for this type, based
822 on our first approximation. */
604a3205
NS
823 BINFO_VTABLE (TYPE_BINFO (type)) = decl;
824 BINFO_VIRTUALS (TYPE_BINFO (type)) = virtuals;
dbbf88d1 825 SET_BINFO_NEW_VTABLE_MARKED (TYPE_BINFO (type));
28531dd0 826 return 1;
8d08fdba
MS
827}
828
3461fba7 829/* Give BINFO a new virtual function table which is initialized
8d08fdba
MS
830 with a skeleton-copy of its original initialization. The only
831 entry that changes is the `delta' entry, so we can really
832 share a lot of structure.
833
3461fba7 834 FOR_TYPE is the most derived type which caused this table to
8d08fdba
MS
835 be needed.
836
838dfd8a 837 Returns nonzero if we haven't met BINFO before.
2636fde4
JM
838
839 The order in which vtables are built (by calling this function) for
840 an object must remain the same, otherwise a binary incompatibility
841 can result. */
e92cc029 842
28531dd0 843static int
dbbf88d1 844build_secondary_vtable (tree binfo)
8d08fdba 845{
dbbf88d1 846 if (BINFO_NEW_VTABLE_MARKED (binfo))
0533d788
MM
847 /* We already created a vtable for this base. There's no need to
848 do it again. */
28531dd0 849 return 0;
0533d788 850
8d7a5379
MM
851 /* Remember that we've created a vtable for this BINFO, so that we
852 don't try to do so again. */
dbbf88d1 853 SET_BINFO_NEW_VTABLE_MARKED (binfo);
c8094d83 854
8d7a5379 855 /* Make fresh virtual list, so we can smash it later. */
d1f05f93 856 BINFO_VIRTUALS (binfo) = copy_list (BINFO_VIRTUALS (binfo));
8d7a5379 857
3461fba7
NS
858 /* Secondary vtables are laid out as part of the same structure as
859 the primary vtable. */
860 BINFO_VTABLE (binfo) = NULL_TREE;
28531dd0 861 return 1;
8d08fdba
MS
862}
863
28531dd0 864/* Create a new vtable for BINFO which is the hierarchy dominated by
838dfd8a 865 T. Return nonzero if we actually created a new vtable. */
28531dd0
MM
866
867static int
94edc4ab 868make_new_vtable (tree t, tree binfo)
28531dd0
MM
869{
870 if (binfo == TYPE_BINFO (t))
871 /* In this case, it is *type*'s vtable we are modifying. We start
d0cd8b44 872 with the approximation that its vtable is that of the
28531dd0 873 immediate base class. */
981c353e 874 return build_primary_vtable (binfo, t);
28531dd0
MM
875 else
876 /* This is our very own copy of `basetype' to play with. Later,
877 we will fill in all the virtual functions that override the
878 virtual functions in these base classes which are not defined
879 by the current type. */
dbbf88d1 880 return build_secondary_vtable (binfo);
28531dd0
MM
881}
882
883/* Make *VIRTUALS, an entry on the BINFO_VIRTUALS list for BINFO
884 (which is in the hierarchy dominated by T) list FNDECL as its
4e7512c9
MM
885 BV_FN. DELTA is the required constant adjustment from the `this'
886 pointer where the vtable entry appears to the `this' required when
887 the function is actually called. */
8d08fdba
MS
888
889static void
94edc4ab 890modify_vtable_entry (tree t,
0cbd7506
MS
891 tree binfo,
892 tree fndecl,
893 tree delta,
894 tree *virtuals)
8d08fdba 895{
28531dd0 896 tree v;
c0bbf652 897
28531dd0 898 v = *virtuals;
c0bbf652 899
5e19c053 900 if (fndecl != BV_FN (v)
4e7512c9 901 || !tree_int_cst_equal (delta, BV_DELTA (v)))
c0bbf652 902 {
28531dd0
MM
903 /* We need a new vtable for BINFO. */
904 if (make_new_vtable (t, binfo))
905 {
906 /* If we really did make a new vtable, we also made a copy
907 of the BINFO_VIRTUALS list. Now, we have to find the
908 corresponding entry in that list. */
909 *virtuals = BINFO_VIRTUALS (binfo);
5e19c053 910 while (BV_FN (*virtuals) != BV_FN (v))
28531dd0
MM
911 *virtuals = TREE_CHAIN (*virtuals);
912 v = *virtuals;
913 }
8d08fdba 914
5e19c053 915 BV_DELTA (v) = delta;
aabb4cd6 916 BV_VCALL_INDEX (v) = NULL_TREE;
5e19c053 917 BV_FN (v) = fndecl;
8d08fdba 918 }
8d08fdba
MS
919}
920
8d08fdba 921\f
b2a9b208 922/* Add method METHOD to class TYPE. If USING_DECL is non-null, it is
b77fe7b4
NS
923 the USING_DECL naming METHOD. Returns true if the method could be
924 added to the method vec. */
e92cc029 925
b77fe7b4 926bool
b2a9b208 927add_method (tree type, tree method, tree using_decl)
8d08fdba 928{
9ba5ff0f 929 unsigned slot;
90ea9897 930 tree overload;
b54a07e8
NS
931 bool template_conv_p = false;
932 bool conv_p;
d4e6fecb 933 VEC(tree,gc) *method_vec;
aaaa46d2 934 bool complete_p;
9ba5ff0f
NS
935 bool insert_p = false;
936 tree current_fns;
fc40d49c 937 tree fns;
ac2b3222
AP
938
939 if (method == error_mark_node)
b77fe7b4 940 return false;
aaaa46d2
MM
941
942 complete_p = COMPLETE_TYPE_P (type);
b54a07e8
NS
943 conv_p = DECL_CONV_FN_P (method);
944 if (conv_p)
945 template_conv_p = (TREE_CODE (method) == TEMPLATE_DECL
946 && DECL_TEMPLATE_CONV_FN_P (method));
452a394b 947
452a394b 948 method_vec = CLASSTYPE_METHOD_VEC (type);
aaaa46d2
MM
949 if (!method_vec)
950 {
951 /* Make a new method vector. We start with 8 entries. We must
952 allocate at least two (for constructors and destructors), and
953 we're going to end up with an assignment operator at some
954 point as well. */
d4e6fecb 955 method_vec = VEC_alloc (tree, gc, 8);
aaaa46d2
MM
956 /* Create slots for constructors and destructors. */
957 VEC_quick_push (tree, method_vec, NULL_TREE);
958 VEC_quick_push (tree, method_vec, NULL_TREE);
959 CLASSTYPE_METHOD_VEC (type) = method_vec;
960 }
961
0fcedd9c 962 /* Maintain TYPE_HAS_USER_CONSTRUCTOR, etc. */
7137605e
MM
963 grok_special_member_properties (method);
964
452a394b
MM
965 /* Constructors and destructors go in special slots. */
966 if (DECL_MAYBE_IN_CHARGE_CONSTRUCTOR_P (method))
967 slot = CLASSTYPE_CONSTRUCTOR_SLOT;
968 else if (DECL_MAYBE_IN_CHARGE_DESTRUCTOR_P (method))
4b0d3cbe
MM
969 {
970 slot = CLASSTYPE_DESTRUCTOR_SLOT;
c8094d83 971
f5c28a15 972 if (TYPE_FOR_JAVA (type))
9f4faeae
MM
973 {
974 if (!DECL_ARTIFICIAL (method))
975 error ("Java class %qT cannot have a destructor", type);
976 else if (TYPE_HAS_NONTRIVIAL_DESTRUCTOR (type))
977 error ("Java class %qT cannot have an implicit non-trivial "
978 "destructor",
979 type);
980 }
4b0d3cbe 981 }
452a394b 982 else
61a127b3 983 {
aaaa46d2
MM
984 tree m;
985
9ba5ff0f 986 insert_p = true;
452a394b 987 /* See if we already have an entry with this name. */
c8094d83 988 for (slot = CLASSTYPE_FIRST_CONVERSION_SLOT;
9ba5ff0f 989 VEC_iterate (tree, method_vec, slot, m);
aaaa46d2 990 ++slot)
5dd236e2 991 {
5dd236e2 992 m = OVL_CURRENT (m);
5dd236e2
NS
993 if (template_conv_p)
994 {
aaaa46d2
MM
995 if (TREE_CODE (m) == TEMPLATE_DECL
996 && DECL_TEMPLATE_CONV_FN_P (m))
997 insert_p = false;
5dd236e2
NS
998 break;
999 }
aaaa46d2 1000 if (conv_p && !DECL_CONV_FN_P (m))
5dd236e2 1001 break;
aaaa46d2 1002 if (DECL_NAME (m) == DECL_NAME (method))
452a394b 1003 {
aaaa46d2
MM
1004 insert_p = false;
1005 break;
8d08fdba 1006 }
aaaa46d2
MM
1007 if (complete_p
1008 && !DECL_CONV_FN_P (m)
1009 && DECL_NAME (m) > DECL_NAME (method))
1010 break;
61a127b3 1011 }
452a394b 1012 }
9ba5ff0f 1013 current_fns = insert_p ? NULL_TREE : VEC_index (tree, method_vec, slot);
c8094d83 1014
fc40d49c
LM
1015 /* Check to see if we've already got this method. */
1016 for (fns = current_fns; fns; fns = OVL_NEXT (fns))
452a394b 1017 {
fc40d49c
LM
1018 tree fn = OVL_CURRENT (fns);
1019 tree fn_type;
1020 tree method_type;
1021 tree parms1;
1022 tree parms2;
1023
1024 if (TREE_CODE (fn) != TREE_CODE (method))
1025 continue;
1026
1027 /* [over.load] Member function declarations with the
1028 same name and the same parameter types cannot be
1029 overloaded if any of them is a static member
1030 function declaration.
1031
1032 [namespace.udecl] When a using-declaration brings names
1033 from a base class into a derived class scope, member
1034 functions in the derived class override and/or hide member
1035 functions with the same name and parameter types in a base
1036 class (rather than conflicting). */
1037 fn_type = TREE_TYPE (fn);
1038 method_type = TREE_TYPE (method);
1039 parms1 = TYPE_ARG_TYPES (fn_type);
1040 parms2 = TYPE_ARG_TYPES (method_type);
1041
1042 /* Compare the quals on the 'this' parm. Don't compare
1043 the whole types, as used functions are treated as
1044 coming from the using class in overload resolution. */
1045 if (! DECL_STATIC_FUNCTION_P (fn)
1046 && ! DECL_STATIC_FUNCTION_P (method)
7b3e2d46
DG
1047 && TREE_TYPE (TREE_VALUE (parms1)) != error_mark_node
1048 && TREE_TYPE (TREE_VALUE (parms2)) != error_mark_node
fc40d49c
LM
1049 && (TYPE_QUALS (TREE_TYPE (TREE_VALUE (parms1)))
1050 != TYPE_QUALS (TREE_TYPE (TREE_VALUE (parms2)))))
1051 continue;
1052
1053 /* For templates, the return type and template parameters
1054 must be identical. */
1055 if (TREE_CODE (fn) == TEMPLATE_DECL
1056 && (!same_type_p (TREE_TYPE (fn_type),
1057 TREE_TYPE (method_type))
1058 || !comp_template_parms (DECL_TEMPLATE_PARMS (fn),
1059 DECL_TEMPLATE_PARMS (method))))
1060 continue;
1061
1062 if (! DECL_STATIC_FUNCTION_P (fn))
1063 parms1 = TREE_CHAIN (parms1);
1064 if (! DECL_STATIC_FUNCTION_P (method))
1065 parms2 = TREE_CHAIN (parms2);
1066
1067 if (compparms (parms1, parms2)
1068 && (!DECL_CONV_FN_P (fn)
1069 || same_type_p (TREE_TYPE (fn_type),
1070 TREE_TYPE (method_type))))
452a394b 1071 {
fc40d49c 1072 if (using_decl)
452a394b 1073 {
fc40d49c
LM
1074 if (DECL_CONTEXT (fn) == type)
1075 /* Defer to the local function. */
1076 return false;
1077 if (DECL_CONTEXT (fn) == DECL_CONTEXT (method))
1078 error ("repeated using declaration %q+D", using_decl);
f0ab6bf2 1079 else
fc40d49c
LM
1080 error ("using declaration %q+D conflicts with a previous using declaration",
1081 using_decl);
452a394b 1082 }
fc40d49c
LM
1083 else
1084 {
1085 error ("%q+#D cannot be overloaded", method);
1086 error ("with %q+#D", fn);
1087 }
1088
1089 /* We don't call duplicate_decls here to merge the
1090 declarations because that will confuse things if the
1091 methods have inline definitions. In particular, we
1092 will crash while processing the definitions. */
1093 return false;
03017874 1094 }
452a394b 1095 }
03017874 1096
3db45ab5 1097 /* A class should never have more than one destructor. */
357d956e
MM
1098 if (current_fns && DECL_MAYBE_IN_CHARGE_DESTRUCTOR_P (method))
1099 return false;
1100
c8094d83 1101 /* Add the new binding. */
9ba5ff0f 1102 overload = build_overload (method, current_fns);
c8094d83 1103
357d956e
MM
1104 if (conv_p)
1105 TYPE_HAS_CONVERSION (type) = 1;
1106 else if (slot >= CLASSTYPE_FIRST_CONVERSION_SLOT && !complete_p)
90ea9897
MM
1107 push_class_level_binding (DECL_NAME (method), overload);
1108
9ba5ff0f
NS
1109 if (insert_p)
1110 {
efb7e1e0
ILT
1111 bool reallocated;
1112
9ba5ff0f
NS
1113 /* We only expect to add few methods in the COMPLETE_P case, so
1114 just make room for one more method in that case. */
efb7e1e0
ILT
1115 if (complete_p)
1116 reallocated = VEC_reserve_exact (tree, gc, method_vec, 1);
1117 else
1118 reallocated = VEC_reserve (tree, gc, method_vec, 1);
1119 if (reallocated)
9ba5ff0f
NS
1120 CLASSTYPE_METHOD_VEC (type) = method_vec;
1121 if (slot == VEC_length (tree, method_vec))
1122 VEC_quick_push (tree, method_vec, overload);
1123 else
1124 VEC_quick_insert (tree, method_vec, slot, overload);
1125 }
1126 else
03fd3f84 1127 /* Replace the current slot. */
9ba5ff0f 1128 VEC_replace (tree, method_vec, slot, overload);
b77fe7b4 1129 return true;
8d08fdba
MS
1130}
1131
1132/* Subroutines of finish_struct. */
1133
aa52c1ff
JM
1134/* Change the access of FDECL to ACCESS in T. Return 1 if change was
1135 legit, otherwise return 0. */
e92cc029 1136
8d08fdba 1137static int
94edc4ab 1138alter_access (tree t, tree fdecl, tree access)
8d08fdba 1139{
721c3b42
MM
1140 tree elem;
1141
1142 if (!DECL_LANG_SPECIFIC (fdecl))
1143 retrofit_lang_decl (fdecl);
1144
50bc768d 1145 gcc_assert (!DECL_DISCRIMINATOR_P (fdecl));
8e4ce833 1146
721c3b42 1147 elem = purpose_member (t, DECL_ACCESS (fdecl));
38afd588 1148 if (elem)
8d08fdba 1149 {
38afd588 1150 if (TREE_VALUE (elem) != access)
8d08fdba 1151 {
38afd588 1152 if (TREE_CODE (TREE_TYPE (fdecl)) == FUNCTION_DECL)
dee15844
JM
1153 error ("conflicting access specifications for method"
1154 " %q+D, ignored", TREE_TYPE (fdecl));
38afd588 1155 else
1f070f2b 1156 error ("conflicting access specifications for field %qE, ignored",
4460cef2 1157 DECL_NAME (fdecl));
8d08fdba
MS
1158 }
1159 else
430bb96b
JL
1160 {
1161 /* They're changing the access to the same thing they changed
1162 it to before. That's OK. */
1163 ;
1164 }
db5ae43f 1165 }
38afd588 1166 else
8d08fdba 1167 {
02022f3a 1168 perform_or_defer_access_check (TYPE_BINFO (t), fdecl, fdecl);
be99da77 1169 DECL_ACCESS (fdecl) = tree_cons (t, access, DECL_ACCESS (fdecl));
8d08fdba
MS
1170 return 1;
1171 }
1172 return 0;
1173}
1174
58010b57 1175/* Process the USING_DECL, which is a member of T. */
79ad62b2 1176
e9659ab0 1177static void
94edc4ab 1178handle_using_decl (tree using_decl, tree t)
79ad62b2 1179{
98ed9dae 1180 tree decl = USING_DECL_DECLS (using_decl);
79ad62b2
MM
1181 tree name = DECL_NAME (using_decl);
1182 tree access
1183 = TREE_PRIVATE (using_decl) ? access_private_node
1184 : TREE_PROTECTED (using_decl) ? access_protected_node
1185 : access_public_node;
79ad62b2 1186 tree flist = NULL_TREE;
aa52c1ff 1187 tree old_value;
79ad62b2 1188
98ed9dae 1189 gcc_assert (!processing_template_decl && decl);
c8094d83 1190
39fb05d0 1191 old_value = lookup_member (t, name, /*protect=*/0, /*want_type=*/false);
aa52c1ff 1192 if (old_value)
79ad62b2 1193 {
aa52c1ff
JM
1194 if (is_overloaded_fn (old_value))
1195 old_value = OVL_CURRENT (old_value);
1196
1197 if (DECL_P (old_value) && DECL_CONTEXT (old_value) == t)
1198 /* OK */;
1199 else
1200 old_value = NULL_TREE;
79ad62b2 1201 }
c8094d83 1202
6e976965 1203 cp_emit_debug_info_for_using (decl, USING_DECL_SCOPE (using_decl));
c8094d83 1204
98ed9dae
NS
1205 if (is_overloaded_fn (decl))
1206 flist = decl;
aa52c1ff
JM
1207
1208 if (! old_value)
1209 ;
1210 else if (is_overloaded_fn (old_value))
79ad62b2 1211 {
aa52c1ff
JM
1212 if (flist)
1213 /* It's OK to use functions from a base when there are functions with
1214 the same name already present in the current class. */;
1215 else
79ad62b2 1216 {
dee15844
JM
1217 error ("%q+D invalid in %q#T", using_decl, t);
1218 error (" because of local method %q+#D with same name",
1219 OVL_CURRENT (old_value));
aa52c1ff 1220 return;
79ad62b2
MM
1221 }
1222 }
186c0fbe 1223 else if (!DECL_ARTIFICIAL (old_value))
aa52c1ff 1224 {
dee15844
JM
1225 error ("%q+D invalid in %q#T", using_decl, t);
1226 error (" because of local member %q+#D with same name", old_value);
aa52c1ff
JM
1227 return;
1228 }
c8094d83 1229
f4f206f4 1230 /* Make type T see field decl FDECL with access ACCESS. */
aa52c1ff
JM
1231 if (flist)
1232 for (; flist; flist = OVL_NEXT (flist))
1233 {
b2a9b208 1234 add_method (t, OVL_CURRENT (flist), using_decl);
aa52c1ff
JM
1235 alter_access (t, OVL_CURRENT (flist), access);
1236 }
1237 else
98ed9dae 1238 alter_access (t, decl, access);
79ad62b2 1239}
8d08fdba 1240\f
e5e459bf
AO
1241/* Run through the base classes of T, updating CANT_HAVE_CONST_CTOR_P,
1242 and NO_CONST_ASN_REF_P. Also set flag bits in T based on
1243 properties of the bases. */
8d08fdba 1244
607cf131 1245static void
94edc4ab 1246check_bases (tree t,
0cbd7506
MS
1247 int* cant_have_const_ctor_p,
1248 int* no_const_asn_ref_p)
8d08fdba 1249{
607cf131 1250 int i;
0fb3018c 1251 int seen_non_virtual_nearly_empty_base_p;
fa743e8c
NS
1252 tree base_binfo;
1253 tree binfo;
8d08fdba 1254
0fb3018c 1255 seen_non_virtual_nearly_empty_base_p = 0;
607cf131 1256
fa743e8c
NS
1257 for (binfo = TYPE_BINFO (t), i = 0;
1258 BINFO_BASE_ITERATE (binfo, i, base_binfo); i++)
8d08fdba 1259 {
fa743e8c 1260 tree basetype = TREE_TYPE (base_binfo);
9a71c18b 1261
50bc768d 1262 gcc_assert (COMPLETE_TYPE_P (basetype));
c8094d83 1263
4c6b7393 1264 /* Effective C++ rule 14. We only need to check TYPE_POLYMORPHIC_P
607cf131
MM
1265 here because the case of virtual functions but non-virtual
1266 dtor is handled in finish_struct_1. */
74fa0285
GDR
1267 if (!TYPE_POLYMORPHIC_P (basetype))
1268 warning (OPT_Weffc__,
3db45ab5 1269 "base class %q#T has a non-virtual destructor", basetype);
8d08fdba 1270
607cf131
MM
1271 /* If the base class doesn't have copy constructors or
1272 assignment operators that take const references, then the
1273 derived class cannot have such a member automatically
1274 generated. */
1275 if (! TYPE_HAS_CONST_INIT_REF (basetype))
1276 *cant_have_const_ctor_p = 1;
1277 if (TYPE_HAS_ASSIGN_REF (basetype)
1278 && !TYPE_HAS_CONST_ASSIGN_REF (basetype))
1279 *no_const_asn_ref_p = 1;
8d08fdba 1280
809e3e7f 1281 if (BINFO_VIRTUAL_P (base_binfo))
00a17e31 1282 /* A virtual base does not effect nearly emptiness. */
0fb3018c 1283 ;
f9c528ea 1284 else if (CLASSTYPE_NEARLY_EMPTY_P (basetype))
0fb3018c
NS
1285 {
1286 if (seen_non_virtual_nearly_empty_base_p)
1287 /* And if there is more than one nearly empty base, then the
1288 derived class is not nearly empty either. */
1289 CLASSTYPE_NEARLY_EMPTY_P (t) = 0;
1290 else
00a17e31 1291 /* Remember we've seen one. */
0fb3018c
NS
1292 seen_non_virtual_nearly_empty_base_p = 1;
1293 }
1294 else if (!is_empty_class (basetype))
1295 /* If the base class is not empty or nearly empty, then this
1296 class cannot be nearly empty. */
1297 CLASSTYPE_NEARLY_EMPTY_P (t) = 0;
f9c528ea 1298
607cf131
MM
1299 /* A lot of properties from the bases also apply to the derived
1300 class. */
8d08fdba 1301 TYPE_NEEDS_CONSTRUCTING (t) |= TYPE_NEEDS_CONSTRUCTING (basetype);
c8094d83 1302 TYPE_HAS_NONTRIVIAL_DESTRUCTOR (t)
834c6dff 1303 |= TYPE_HAS_NONTRIVIAL_DESTRUCTOR (basetype);
c8094d83 1304 TYPE_HAS_COMPLEX_ASSIGN_REF (t)
607cf131 1305 |= TYPE_HAS_COMPLEX_ASSIGN_REF (basetype);
e8abc66f 1306 TYPE_HAS_COMPLEX_INIT_REF (t) |= TYPE_HAS_COMPLEX_INIT_REF (basetype);
4c6b7393 1307 TYPE_POLYMORPHIC_P (t) |= TYPE_POLYMORPHIC_P (basetype);
c8094d83 1308 CLASSTYPE_CONTAINS_EMPTY_CLASS_P (t)
5ec1192e 1309 |= CLASSTYPE_CONTAINS_EMPTY_CLASS_P (basetype);
cb68ec50 1310 TYPE_HAS_COMPLEX_DFLT (t) |= TYPE_HAS_COMPLEX_DFLT (basetype);
607cf131
MM
1311 }
1312}
1313
fc6633e0
NS
1314/* Determine all the primary bases within T. Sets BINFO_PRIMARY_BASE_P for
1315 those that are primaries. Sets BINFO_LOST_PRIMARY_P for those
1316 that have had a nearly-empty virtual primary base stolen by some
77880ae4 1317 other base in the hierarchy. Determines CLASSTYPE_PRIMARY_BASE for
fc6633e0 1318 T. */
c35cce41
MM
1319
1320static void
fc6633e0 1321determine_primary_bases (tree t)
c35cce41 1322{
fc6633e0
NS
1323 unsigned i;
1324 tree primary = NULL_TREE;
1325 tree type_binfo = TYPE_BINFO (t);
1326 tree base_binfo;
1327
1328 /* Determine the primary bases of our bases. */
1329 for (base_binfo = TREE_CHAIN (type_binfo); base_binfo;
1330 base_binfo = TREE_CHAIN (base_binfo))
c35cce41 1331 {
fc6633e0 1332 tree primary = CLASSTYPE_PRIMARY_BINFO (BINFO_TYPE (base_binfo));
c35cce41 1333
fc6633e0
NS
1334 /* See if we're the non-virtual primary of our inheritance
1335 chain. */
1336 if (!BINFO_VIRTUAL_P (base_binfo))
dbbf88d1 1337 {
fc6633e0
NS
1338 tree parent = BINFO_INHERITANCE_CHAIN (base_binfo);
1339 tree parent_primary = CLASSTYPE_PRIMARY_BINFO (BINFO_TYPE (parent));
c8094d83 1340
fc6633e0 1341 if (parent_primary
539ed333
NS
1342 && SAME_BINFO_TYPE_P (BINFO_TYPE (base_binfo),
1343 BINFO_TYPE (parent_primary)))
fc6633e0
NS
1344 /* We are the primary binfo. */
1345 BINFO_PRIMARY_P (base_binfo) = 1;
1346 }
1347 /* Determine if we have a virtual primary base, and mark it so.
1348 */
1349 if (primary && BINFO_VIRTUAL_P (primary))
1350 {
1351 tree this_primary = copied_binfo (primary, base_binfo);
1352
1353 if (BINFO_PRIMARY_P (this_primary))
1354 /* Someone already claimed this base. */
1355 BINFO_LOST_PRIMARY_P (base_binfo) = 1;
1356 else
dbbf88d1 1357 {
fc6633e0 1358 tree delta;
c8094d83 1359
fc6633e0
NS
1360 BINFO_PRIMARY_P (this_primary) = 1;
1361 BINFO_INHERITANCE_CHAIN (this_primary) = base_binfo;
c8094d83 1362
fc6633e0 1363 /* A virtual binfo might have been copied from within
0cbd7506
MS
1364 another hierarchy. As we're about to use it as a
1365 primary base, make sure the offsets match. */
fc6633e0
NS
1366 delta = size_diffop (convert (ssizetype,
1367 BINFO_OFFSET (base_binfo)),
1368 convert (ssizetype,
1369 BINFO_OFFSET (this_primary)));
c8094d83 1370
fc6633e0 1371 propagate_binfo_offsets (this_primary, delta);
dbbf88d1
NS
1372 }
1373 }
c35cce41 1374 }
8026246f 1375
fc6633e0 1376 /* First look for a dynamic direct non-virtual base. */
fa743e8c 1377 for (i = 0; BINFO_BASE_ITERATE (type_binfo, i, base_binfo); i++)
607cf131 1378 {
607cf131 1379 tree basetype = BINFO_TYPE (base_binfo);
aff08c18 1380
fc6633e0 1381 if (TYPE_CONTAINS_VPTR_P (basetype) && !BINFO_VIRTUAL_P (base_binfo))
8d08fdba 1382 {
fc6633e0
NS
1383 primary = base_binfo;
1384 goto found;
911a71a7
MM
1385 }
1386 }
8026246f 1387
3461fba7 1388 /* A "nearly-empty" virtual base class can be the primary base
fc6633e0
NS
1389 class, if no non-virtual polymorphic base can be found. Look for
1390 a nearly-empty virtual dynamic base that is not already a primary
77880ae4 1391 base of something in the hierarchy. If there is no such base,
fc6633e0
NS
1392 just pick the first nearly-empty virtual base. */
1393
1394 for (base_binfo = TREE_CHAIN (type_binfo); base_binfo;
1395 base_binfo = TREE_CHAIN (base_binfo))
1396 if (BINFO_VIRTUAL_P (base_binfo)
1397 && CLASSTYPE_NEARLY_EMPTY_P (BINFO_TYPE (base_binfo)))
1398 {
1399 if (!BINFO_PRIMARY_P (base_binfo))
1400 {
1401 /* Found one that is not primary. */
1402 primary = base_binfo;
1403 goto found;
1404 }
1405 else if (!primary)
1406 /* Remember the first candidate. */
1407 primary = base_binfo;
1408 }
c8094d83 1409
fc6633e0
NS
1410 found:
1411 /* If we've got a primary base, use it. */
1412 if (primary)
7cafdb8b 1413 {
fc6633e0 1414 tree basetype = BINFO_TYPE (primary);
c8094d83 1415
fc6633e0
NS
1416 CLASSTYPE_PRIMARY_BINFO (t) = primary;
1417 if (BINFO_PRIMARY_P (primary))
1418 /* We are stealing a primary base. */
1419 BINFO_LOST_PRIMARY_P (BINFO_INHERITANCE_CHAIN (primary)) = 1;
1420 BINFO_PRIMARY_P (primary) = 1;
1421 if (BINFO_VIRTUAL_P (primary))
7cafdb8b 1422 {
fc6633e0 1423 tree delta;
7cafdb8b 1424
fc6633e0
NS
1425 BINFO_INHERITANCE_CHAIN (primary) = type_binfo;
1426 /* A virtual binfo might have been copied from within
0cbd7506
MS
1427 another hierarchy. As we're about to use it as a primary
1428 base, make sure the offsets match. */
fc6633e0
NS
1429 delta = size_diffop (ssize_int (0),
1430 convert (ssizetype, BINFO_OFFSET (primary)));
c8094d83 1431
fc6633e0 1432 propagate_binfo_offsets (primary, delta);
7cafdb8b 1433 }
c8094d83 1434
fc6633e0 1435 primary = TYPE_BINFO (basetype);
c8094d83 1436
fc6633e0
NS
1437 TYPE_VFIELD (t) = TYPE_VFIELD (basetype);
1438 BINFO_VTABLE (type_binfo) = BINFO_VTABLE (primary);
1439 BINFO_VIRTUALS (type_binfo) = BINFO_VIRTUALS (primary);
7cafdb8b 1440 }
8d08fdba 1441}
8d08fdba 1442\f
d2c5305b
MM
1443/* Set memoizing fields and bits of T (and its variants) for later
1444 use. */
e92cc029 1445
8d08fdba 1446static void
94edc4ab 1447finish_struct_bits (tree t)
8d08fdba 1448{
090ad434 1449 tree variants;
c8094d83 1450
8d08fdba 1451 /* Fix up variants (if any). */
090ad434
NS
1452 for (variants = TYPE_NEXT_VARIANT (t);
1453 variants;
1454 variants = TYPE_NEXT_VARIANT (variants))
8d08fdba
MS
1455 {
1456 /* These fields are in the _TYPE part of the node, not in
1457 the TYPE_LANG_SPECIFIC component, so they are not shared. */
0fcedd9c 1458 TYPE_HAS_USER_CONSTRUCTOR (variants) = TYPE_HAS_USER_CONSTRUCTOR (t);
8d08fdba 1459 TYPE_NEEDS_CONSTRUCTING (variants) = TYPE_NEEDS_CONSTRUCTING (t);
c8094d83 1460 TYPE_HAS_NONTRIVIAL_DESTRUCTOR (variants)
834c6dff 1461 = TYPE_HAS_NONTRIVIAL_DESTRUCTOR (t);
8d08fdba 1462
4c6b7393 1463 TYPE_POLYMORPHIC_P (variants) = TYPE_POLYMORPHIC_P (t);
c8094d83 1464
cad7e87b
NS
1465 TYPE_BINFO (variants) = TYPE_BINFO (t);
1466
8d08fdba 1467 /* Copy whatever these are holding today. */
eb34af89
RK
1468 TYPE_VFIELD (variants) = TYPE_VFIELD (t);
1469 TYPE_METHODS (variants) = TYPE_METHODS (t);
5566b478 1470 TYPE_FIELDS (variants) = TYPE_FIELDS (t);
5818c8e4
JM
1471
1472 /* All variants of a class have the same attributes. */
1473 TYPE_ATTRIBUTES (variants) = TYPE_ATTRIBUTES (t);
8d08fdba
MS
1474 }
1475
fa743e8c 1476 if (BINFO_N_BASE_BINFOS (TYPE_BINFO (t)) && TYPE_POLYMORPHIC_P (t))
16ae29f1
NS
1477 /* For a class w/o baseclasses, 'finish_struct' has set
1478 CLASSTYPE_PURE_VIRTUALS correctly (by definition).
132c7dd3
NS
1479 Similarly for a class whose base classes do not have vtables.
1480 When neither of these is true, we might have removed abstract
1481 virtuals (by providing a definition), added some (by declaring
1482 new ones), or redeclared ones from a base class. We need to
1483 recalculate what's really an abstract virtual at this point (by
1484 looking in the vtables). */
1485 get_pure_virtuals (t);
c8094d83 1486
132c7dd3
NS
1487 /* If this type has a copy constructor or a destructor, force its
1488 mode to be BLKmode, and force its TREE_ADDRESSABLE bit to be
1489 nonzero. This will cause it to be passed by invisible reference
1490 and prevent it from being returned in a register. */
8b16faa2 1491 if (! TYPE_HAS_TRIVIAL_INIT_REF (t) || TYPE_HAS_NONTRIVIAL_DESTRUCTOR (t))
8d08fdba 1492 {
e8abc66f 1493 tree variants;
d2e5ee5c 1494 DECL_MODE (TYPE_MAIN_DECL (t)) = BLKmode;
e8abc66f 1495 for (variants = t; variants; variants = TYPE_NEXT_VARIANT (variants))
8d08fdba
MS
1496 {
1497 TYPE_MODE (variants) = BLKmode;
1498 TREE_ADDRESSABLE (variants) = 1;
8d08fdba
MS
1499 }
1500 }
1501}
1502
b0e0b31f 1503/* Issue warnings about T having private constructors, but no friends,
c8094d83 1504 and so forth.
aed7b2a6 1505
b0e0b31f
MM
1506 HAS_NONPRIVATE_METHOD is nonzero if T has any non-private methods or
1507 static members. HAS_NONPRIVATE_STATIC_FN is nonzero if T has any
1508 non-private static member functions. */
1509
1510static void
94edc4ab 1511maybe_warn_about_overly_private_class (tree t)
aed7b2a6 1512{
056a3b12
MM
1513 int has_member_fn = 0;
1514 int has_nonprivate_method = 0;
1515 tree fn;
1516
1517 if (!warn_ctor_dtor_privacy
b0e0b31f
MM
1518 /* If the class has friends, those entities might create and
1519 access instances, so we should not warn. */
056a3b12
MM
1520 || (CLASSTYPE_FRIEND_CLASSES (t)
1521 || DECL_FRIENDLIST (TYPE_MAIN_DECL (t)))
b0e0b31f
MM
1522 /* We will have warned when the template was declared; there's
1523 no need to warn on every instantiation. */
056a3b12 1524 || CLASSTYPE_TEMPLATE_INSTANTIATION (t))
c8094d83 1525 /* There's no reason to even consider warning about this
056a3b12
MM
1526 class. */
1527 return;
c8094d83 1528
056a3b12
MM
1529 /* We only issue one warning, if more than one applies, because
1530 otherwise, on code like:
1531
1532 class A {
1533 // Oops - forgot `public:'
1534 A();
1535 A(const A&);
1536 ~A();
1537 };
1538
1539 we warn several times about essentially the same problem. */
1540
1541 /* Check to see if all (non-constructor, non-destructor) member
1542 functions are private. (Since there are no friends or
1543 non-private statics, we can't ever call any of the private member
1544 functions.) */
1545 for (fn = TYPE_METHODS (t); fn; fn = TREE_CHAIN (fn))
1546 /* We're not interested in compiler-generated methods; they don't
1547 provide any way to call private members. */
c8094d83 1548 if (!DECL_ARTIFICIAL (fn))
056a3b12
MM
1549 {
1550 if (!TREE_PRIVATE (fn))
b0e0b31f 1551 {
c8094d83 1552 if (DECL_STATIC_FUNCTION_P (fn))
056a3b12
MM
1553 /* A non-private static member function is just like a
1554 friend; it can create and invoke private member
1555 functions, and be accessed without a class
1556 instance. */
1557 return;
c8094d83 1558
056a3b12 1559 has_nonprivate_method = 1;
f576dfc4 1560 /* Keep searching for a static member function. */
056a3b12 1561 }
ce0a5952 1562 else if (!DECL_CONSTRUCTOR_P (fn) && !DECL_DESTRUCTOR_P (fn))
056a3b12 1563 has_member_fn = 1;
c8094d83 1564 }
aed7b2a6 1565
c8094d83 1566 if (!has_nonprivate_method && has_member_fn)
056a3b12 1567 {
ce0a5952
MM
1568 /* There are no non-private methods, and there's at least one
1569 private member function that isn't a constructor or
1570 destructor. (If all the private members are
1571 constructors/destructors we want to use the code below that
1572 issues error messages specifically referring to
1573 constructors/destructors.) */
fa743e8c 1574 unsigned i;
dbbf88d1 1575 tree binfo = TYPE_BINFO (t);
c8094d83 1576
fa743e8c 1577 for (i = 0; i != BINFO_N_BASE_BINFOS (binfo); i++)
604a3205 1578 if (BINFO_BASE_ACCESS (binfo, i) != access_private_node)
056a3b12
MM
1579 {
1580 has_nonprivate_method = 1;
1581 break;
1582 }
c8094d83 1583 if (!has_nonprivate_method)
b0e0b31f 1584 {
74fa0285 1585 warning (OPT_Wctor_dtor_privacy,
3db45ab5 1586 "all member functions in class %qT are private", t);
056a3b12 1587 return;
b0e0b31f 1588 }
056a3b12 1589 }
aed7b2a6 1590
056a3b12
MM
1591 /* Even if some of the member functions are non-private, the class
1592 won't be useful for much if all the constructors or destructors
1593 are private: such an object can never be created or destroyed. */
9f4faeae
MM
1594 fn = CLASSTYPE_DESTRUCTORS (t);
1595 if (fn && TREE_PRIVATE (fn))
056a3b12 1596 {
74fa0285 1597 warning (OPT_Wctor_dtor_privacy,
3db45ab5 1598 "%q#T only defines a private destructor and has no friends",
4b0d3cbe
MM
1599 t);
1600 return;
056a3b12 1601 }
b0e0b31f 1602
0fcedd9c
JM
1603 /* Warn about classes that have private constructors and no friends. */
1604 if (TYPE_HAS_USER_CONSTRUCTOR (t)
550d1bf4
MM
1605 /* Implicitly generated constructors are always public. */
1606 && (!CLASSTYPE_LAZY_DEFAULT_CTOR (t)
1607 || !CLASSTYPE_LAZY_COPY_CTOR (t)))
056a3b12
MM
1608 {
1609 int nonprivate_ctor = 0;
c8094d83 1610
056a3b12
MM
1611 /* If a non-template class does not define a copy
1612 constructor, one is defined for it, enabling it to avoid
1613 this warning. For a template class, this does not
1614 happen, and so we would normally get a warning on:
b0e0b31f 1615
c8094d83
MS
1616 template <class T> class C { private: C(); };
1617
056a3b12
MM
1618 To avoid this asymmetry, we check TYPE_HAS_INIT_REF. All
1619 complete non-template or fully instantiated classes have this
1620 flag set. */
1621 if (!TYPE_HAS_INIT_REF (t))
1622 nonprivate_ctor = 1;
c8094d83
MS
1623 else
1624 for (fn = CLASSTYPE_CONSTRUCTORS (t); fn; fn = OVL_NEXT (fn))
056a3b12
MM
1625 {
1626 tree ctor = OVL_CURRENT (fn);
1627 /* Ideally, we wouldn't count copy constructors (or, in
1628 fact, any constructor that takes an argument of the
1629 class type as a parameter) because such things cannot
1630 be used to construct an instance of the class unless
1631 you already have one. But, for now at least, we're
1632 more generous. */
1633 if (! TREE_PRIVATE (ctor))
b0e0b31f 1634 {
056a3b12
MM
1635 nonprivate_ctor = 1;
1636 break;
b0e0b31f 1637 }
056a3b12 1638 }
aed7b2a6 1639
056a3b12
MM
1640 if (nonprivate_ctor == 0)
1641 {
74fa0285 1642 warning (OPT_Wctor_dtor_privacy,
3db45ab5 1643 "%q#T only defines private constructors and has no friends",
0cbd7506 1644 t);
056a3b12 1645 return;
b0e0b31f
MM
1646 }
1647 }
aed7b2a6
MM
1648}
1649
17211ab5
GK
1650static struct {
1651 gt_pointer_operator new_value;
1652 void *cookie;
1653} resort_data;
1654
f90cdf34
MT
1655/* Comparison function to compare two TYPE_METHOD_VEC entries by name. */
1656
1657static int
94edc4ab 1658method_name_cmp (const void* m1_p, const void* m2_p)
f90cdf34 1659{
67f5655f
GDR
1660 const tree *const m1 = (const tree *) m1_p;
1661 const tree *const m2 = (const tree *) m2_p;
c8094d83 1662
f90cdf34
MT
1663 if (*m1 == NULL_TREE && *m2 == NULL_TREE)
1664 return 0;
1665 if (*m1 == NULL_TREE)
1666 return -1;
1667 if (*m2 == NULL_TREE)
1668 return 1;
1669 if (DECL_NAME (OVL_CURRENT (*m1)) < DECL_NAME (OVL_CURRENT (*m2)))
1670 return -1;
1671 return 1;
1672}
b0e0b31f 1673
17211ab5
GK
1674/* This routine compares two fields like method_name_cmp but using the
1675 pointer operator in resort_field_decl_data. */
1676
1677static int
94edc4ab 1678resort_method_name_cmp (const void* m1_p, const void* m2_p)
17211ab5 1679{
67f5655f
GDR
1680 const tree *const m1 = (const tree *) m1_p;
1681 const tree *const m2 = (const tree *) m2_p;
17211ab5
GK
1682 if (*m1 == NULL_TREE && *m2 == NULL_TREE)
1683 return 0;
1684 if (*m1 == NULL_TREE)
1685 return -1;
1686 if (*m2 == NULL_TREE)
1687 return 1;
1688 {
1689 tree d1 = DECL_NAME (OVL_CURRENT (*m1));
1690 tree d2 = DECL_NAME (OVL_CURRENT (*m2));
1691 resort_data.new_value (&d1, resort_data.cookie);
1692 resort_data.new_value (&d2, resort_data.cookie);
1693 if (d1 < d2)
1694 return -1;
1695 }
1696 return 1;
1697}
1698
1699/* Resort TYPE_METHOD_VEC because pointers have been reordered. */
1700
c8094d83 1701void
94edc4ab 1702resort_type_method_vec (void* obj,
0cbd7506
MS
1703 void* orig_obj ATTRIBUTE_UNUSED ,
1704 gt_pointer_operator new_value,
1705 void* cookie)
17211ab5 1706{
d4e6fecb 1707 VEC(tree,gc) *method_vec = (VEC(tree,gc) *) obj;
aaaa46d2
MM
1708 int len = VEC_length (tree, method_vec);
1709 size_t slot;
1710 tree fn;
17211ab5
GK
1711
1712 /* The type conversion ops have to live at the front of the vec, so we
1713 can't sort them. */
aaaa46d2 1714 for (slot = CLASSTYPE_FIRST_CONVERSION_SLOT;
9ba5ff0f 1715 VEC_iterate (tree, method_vec, slot, fn);
aaaa46d2
MM
1716 ++slot)
1717 if (!DECL_CONV_FN_P (OVL_CURRENT (fn)))
1718 break;
1719
17211ab5
GK
1720 if (len - slot > 1)
1721 {
1722 resort_data.new_value = new_value;
1723 resort_data.cookie = cookie;
aaaa46d2 1724 qsort (VEC_address (tree, method_vec) + slot, len - slot, sizeof (tree),
17211ab5
GK
1725 resort_method_name_cmp);
1726 }
1727}
1728
c7222c02 1729/* Warn about duplicate methods in fn_fields.
8d08fdba 1730
5b0cec3b
MM
1731 Sort methods that are not special (i.e., constructors, destructors,
1732 and type conversion operators) so that we can find them faster in
1733 search. */
8d08fdba 1734
b0e0b31f 1735static void
94edc4ab 1736finish_struct_methods (tree t)
8d08fdba 1737{
b0e0b31f 1738 tree fn_fields;
d4e6fecb 1739 VEC(tree,gc) *method_vec;
58010b57
MM
1740 int slot, len;
1741
58010b57 1742 method_vec = CLASSTYPE_METHOD_VEC (t);
508a1c9c
MM
1743 if (!method_vec)
1744 return;
1745
aaaa46d2 1746 len = VEC_length (tree, method_vec);
8d08fdba 1747
c7222c02 1748 /* Clear DECL_IN_AGGR_P for all functions. */
c8094d83 1749 for (fn_fields = TYPE_METHODS (t); fn_fields;
b0e0b31f 1750 fn_fields = TREE_CHAIN (fn_fields))
5b0cec3b 1751 DECL_IN_AGGR_P (fn_fields) = 0;
8d08fdba 1752
b0e0b31f
MM
1753 /* Issue warnings about private constructors and such. If there are
1754 no methods, then some public defaults are generated. */
f90cdf34
MT
1755 maybe_warn_about_overly_private_class (t);
1756
f90cdf34
MT
1757 /* The type conversion ops have to live at the front of the vec, so we
1758 can't sort them. */
9ba5ff0f
NS
1759 for (slot = CLASSTYPE_FIRST_CONVERSION_SLOT;
1760 VEC_iterate (tree, method_vec, slot, fn_fields);
aaaa46d2
MM
1761 ++slot)
1762 if (!DECL_CONV_FN_P (OVL_CURRENT (fn_fields)))
1763 break;
f90cdf34 1764 if (len - slot > 1)
aaaa46d2
MM
1765 qsort (VEC_address (tree, method_vec) + slot,
1766 len-slot, sizeof (tree), method_name_cmp);
8d08fdba
MS
1767}
1768
90ecce3e 1769/* Make BINFO's vtable have N entries, including RTTI entries,
3b426391 1770 vbase and vcall offsets, etc. Set its type and call the back end
8d7a5379 1771 to lay it out. */
1a588ad7
MM
1772
1773static void
94edc4ab 1774layout_vtable_decl (tree binfo, int n)
1a588ad7 1775{
1a588ad7 1776 tree atype;
c35cce41 1777 tree vtable;
1a588ad7 1778
c8094d83 1779 atype = build_cplus_array_type (vtable_entry_type,
442e01b6 1780 build_index_type (size_int (n - 1)));
1a588ad7
MM
1781 layout_type (atype);
1782
1783 /* We may have to grow the vtable. */
c35cce41
MM
1784 vtable = get_vtbl_decl_for_binfo (binfo);
1785 if (!same_type_p (TREE_TYPE (vtable), atype))
1a588ad7 1786 {
06ceef4e 1787 TREE_TYPE (vtable) = atype;
c35cce41 1788 DECL_SIZE (vtable) = DECL_SIZE_UNIT (vtable) = NULL_TREE;
06ceef4e 1789 layout_decl (vtable, 0);
1a588ad7
MM
1790 }
1791}
1792
9bab6c90
MM
1793/* True iff FNDECL and BASE_FNDECL (both non-static member functions)
1794 have the same signature. */
83f2ccf4 1795
e0fff4b3 1796int
58f9752a 1797same_signature_p (const_tree fndecl, const_tree base_fndecl)
83f2ccf4 1798{
872f37f9
MM
1799 /* One destructor overrides another if they are the same kind of
1800 destructor. */
1801 if (DECL_DESTRUCTOR_P (base_fndecl) && DECL_DESTRUCTOR_P (fndecl)
1802 && special_function_p (base_fndecl) == special_function_p (fndecl))
ca36f057 1803 return 1;
872f37f9
MM
1804 /* But a non-destructor never overrides a destructor, nor vice
1805 versa, nor do different kinds of destructors override
1806 one-another. For example, a complete object destructor does not
1807 override a deleting destructor. */
0d9eb3ba 1808 if (DECL_DESTRUCTOR_P (base_fndecl) || DECL_DESTRUCTOR_P (fndecl))
ca36f057 1809 return 0;
872f37f9 1810
a6c0d772
MM
1811 if (DECL_NAME (fndecl) == DECL_NAME (base_fndecl)
1812 || (DECL_CONV_FN_P (fndecl)
1813 && DECL_CONV_FN_P (base_fndecl)
1814 && same_type_p (DECL_CONV_FN_TYPE (fndecl),
1815 DECL_CONV_FN_TYPE (base_fndecl))))
83f2ccf4 1816 {
ca36f057 1817 tree types, base_types;
ca36f057
MM
1818 types = TYPE_ARG_TYPES (TREE_TYPE (fndecl));
1819 base_types = TYPE_ARG_TYPES (TREE_TYPE (base_fndecl));
1820 if ((TYPE_QUALS (TREE_TYPE (TREE_VALUE (base_types)))
1821 == TYPE_QUALS (TREE_TYPE (TREE_VALUE (types))))
1822 && compparms (TREE_CHAIN (base_types), TREE_CHAIN (types)))
1823 return 1;
83f2ccf4 1824 }
ca36f057 1825 return 0;
83f2ccf4
MM
1826}
1827
9368208b
MM
1828/* Returns TRUE if DERIVED is a binfo containing the binfo BASE as a
1829 subobject. */
c8094d83 1830
9368208b
MM
1831static bool
1832base_derived_from (tree derived, tree base)
1833{
dbbf88d1
NS
1834 tree probe;
1835
1836 for (probe = base; probe; probe = BINFO_INHERITANCE_CHAIN (probe))
1837 {
1838 if (probe == derived)
1839 return true;
809e3e7f 1840 else if (BINFO_VIRTUAL_P (probe))
dbbf88d1
NS
1841 /* If we meet a virtual base, we can't follow the inheritance
1842 any more. See if the complete type of DERIVED contains
1843 such a virtual base. */
58c42dc2
NS
1844 return (binfo_for_vbase (BINFO_TYPE (probe), BINFO_TYPE (derived))
1845 != NULL_TREE);
dbbf88d1
NS
1846 }
1847 return false;
9368208b
MM
1848}
1849
ca36f057
MM
1850typedef struct find_final_overrider_data_s {
1851 /* The function for which we are trying to find a final overrider. */
1852 tree fn;
1853 /* The base class in which the function was declared. */
1854 tree declaring_base;
9368208b 1855 /* The candidate overriders. */
78b45a24 1856 tree candidates;
5d5a519f 1857 /* Path to most derived. */
d4e6fecb 1858 VEC(tree,heap) *path;
ca36f057 1859} find_final_overrider_data;
8d7a5379 1860
f7a8132a
MM
1861/* Add the overrider along the current path to FFOD->CANDIDATES.
1862 Returns true if an overrider was found; false otherwise. */
8d7a5379 1863
f7a8132a 1864static bool
c8094d83 1865dfs_find_final_overrider_1 (tree binfo,
5d5a519f
NS
1866 find_final_overrider_data *ffod,
1867 unsigned depth)
7177d104 1868{
741d8ca3
MM
1869 tree method;
1870
f7a8132a
MM
1871 /* If BINFO is not the most derived type, try a more derived class.
1872 A definition there will overrider a definition here. */
5d5a519f 1873 if (depth)
dbbf88d1 1874 {
5d5a519f
NS
1875 depth--;
1876 if (dfs_find_final_overrider_1
1877 (VEC_index (tree, ffod->path, depth), ffod, depth))
f7a8132a
MM
1878 return true;
1879 }
dbbf88d1 1880
741d8ca3 1881 method = look_for_overrides_here (BINFO_TYPE (binfo), ffod->fn);
f7a8132a
MM
1882 if (method)
1883 {
1884 tree *candidate = &ffod->candidates;
c8094d83 1885
f7a8132a
MM
1886 /* Remove any candidates overridden by this new function. */
1887 while (*candidate)
8d7a5379 1888 {
f7a8132a
MM
1889 /* If *CANDIDATE overrides METHOD, then METHOD
1890 cannot override anything else on the list. */
1891 if (base_derived_from (TREE_VALUE (*candidate), binfo))
1892 return true;
1893 /* If METHOD overrides *CANDIDATE, remove *CANDIDATE. */
1894 if (base_derived_from (binfo, TREE_VALUE (*candidate)))
1895 *candidate = TREE_CHAIN (*candidate);
dbbf88d1 1896 else
f7a8132a 1897 candidate = &TREE_CHAIN (*candidate);
5e19c053 1898 }
c8094d83 1899
f7a8132a
MM
1900 /* Add the new function. */
1901 ffod->candidates = tree_cons (method, binfo, ffod->candidates);
1902 return true;
dbbf88d1 1903 }
5e19c053 1904
f7a8132a
MM
1905 return false;
1906}
1907
1908/* Called from find_final_overrider via dfs_walk. */
1909
1910static tree
5d5a519f 1911dfs_find_final_overrider_pre (tree binfo, void *data)
f7a8132a
MM
1912{
1913 find_final_overrider_data *ffod = (find_final_overrider_data *) data;
1914
1915 if (binfo == ffod->declaring_base)
5d5a519f 1916 dfs_find_final_overrider_1 (binfo, ffod, VEC_length (tree, ffod->path));
d4e6fecb 1917 VEC_safe_push (tree, heap, ffod->path, binfo);
f7a8132a 1918
dbbf88d1
NS
1919 return NULL_TREE;
1920}
db3d8cde 1921
dbbf88d1 1922static tree
5d5a519f 1923dfs_find_final_overrider_post (tree binfo ATTRIBUTE_UNUSED, void *data)
dbbf88d1 1924{
dbbf88d1 1925 find_final_overrider_data *ffod = (find_final_overrider_data *) data;
5d5a519f 1926 VEC_pop (tree, ffod->path);
78b45a24 1927
dd42e135
MM
1928 return NULL_TREE;
1929}
1930
5e19c053
MM
1931/* Returns a TREE_LIST whose TREE_PURPOSE is the final overrider for
1932 FN and whose TREE_VALUE is the binfo for the base where the
95675950
MM
1933 overriding occurs. BINFO (in the hierarchy dominated by the binfo
1934 DERIVED) is the base object in which FN is declared. */
e92cc029 1935
a292b002 1936static tree
94edc4ab 1937find_final_overrider (tree derived, tree binfo, tree fn)
a292b002 1938{
5e19c053 1939 find_final_overrider_data ffod;
a292b002 1940
0e339752 1941 /* Getting this right is a little tricky. This is valid:
a292b002 1942
5e19c053
MM
1943 struct S { virtual void f (); };
1944 struct T { virtual void f (); };
1945 struct U : public S, public T { };
a292b002 1946
c8094d83 1947 even though calling `f' in `U' is ambiguous. But,
a292b002 1948
5e19c053
MM
1949 struct R { virtual void f(); };
1950 struct S : virtual public R { virtual void f (); };
1951 struct T : virtual public R { virtual void f (); };
1952 struct U : public S, public T { };
dd42e135 1953
d0cd8b44 1954 is not -- there's no way to decide whether to put `S::f' or
c8094d83
MS
1955 `T::f' in the vtable for `R'.
1956
5e19c053
MM
1957 The solution is to look at all paths to BINFO. If we find
1958 different overriders along any two, then there is a problem. */
07fa4878
NS
1959 if (DECL_THUNK_P (fn))
1960 fn = THUNK_TARGET (fn);
f7a8132a
MM
1961
1962 /* Determine the depth of the hierarchy. */
5e19c053
MM
1963 ffod.fn = fn;
1964 ffod.declaring_base = binfo;
78b45a24 1965 ffod.candidates = NULL_TREE;
d4e6fecb 1966 ffod.path = VEC_alloc (tree, heap, 30);
5e19c053 1967
5d5a519f
NS
1968 dfs_walk_all (derived, dfs_find_final_overrider_pre,
1969 dfs_find_final_overrider_post, &ffod);
f7a8132a 1970
d4e6fecb 1971 VEC_free (tree, heap, ffod.path);
c8094d83 1972
78b45a24 1973 /* If there was no winner, issue an error message. */
9368208b 1974 if (!ffod.candidates || TREE_CHAIN (ffod.candidates))
16a1369e 1975 return error_mark_node;
dd42e135 1976
9368208b 1977 return ffod.candidates;
a292b002
MS
1978}
1979
548502d3
MM
1980/* Return the index of the vcall offset for FN when TYPE is used as a
1981 virtual base. */
d0cd8b44 1982
d0cd8b44 1983static tree
548502d3 1984get_vcall_index (tree fn, tree type)
d0cd8b44 1985{
d4e6fecb 1986 VEC(tree_pair_s,gc) *indices = CLASSTYPE_VCALL_INDICES (type);
0871761b
NS
1987 tree_pair_p p;
1988 unsigned ix;
d0cd8b44 1989
0871761b
NS
1990 for (ix = 0; VEC_iterate (tree_pair_s, indices, ix, p); ix++)
1991 if ((DECL_DESTRUCTOR_P (fn) && DECL_DESTRUCTOR_P (p->purpose))
1992 || same_signature_p (fn, p->purpose))
1993 return p->value;
548502d3
MM
1994
1995 /* There should always be an appropriate index. */
8dc2b103 1996 gcc_unreachable ();
d0cd8b44 1997}
d0cd8b44
JM
1998
1999/* Update an entry in the vtable for BINFO, which is in the hierarchy
4639c5c6 2000 dominated by T. FN has been overridden in BINFO; VIRTUALS points to the
d0cd8b44 2001 corresponding position in the BINFO_VIRTUALS list. */
4e7512c9
MM
2002
2003static void
a2ddc397
NS
2004update_vtable_entry_for_fn (tree t, tree binfo, tree fn, tree* virtuals,
2005 unsigned ix)
4e7512c9
MM
2006{
2007 tree b;
2008 tree overrider;
4e7512c9 2009 tree delta;
31f8e4f3 2010 tree virtual_base;
d0cd8b44 2011 tree first_defn;
3cfabe60
NS
2012 tree overrider_fn, overrider_target;
2013 tree target_fn = DECL_THUNK_P (fn) ? THUNK_TARGET (fn) : fn;
2014 tree over_return, base_return;
f11ee281 2015 bool lost = false;
4e7512c9 2016
d0cd8b44
JM
2017 /* Find the nearest primary base (possibly binfo itself) which defines
2018 this function; this is the class the caller will convert to when
2019 calling FN through BINFO. */
2020 for (b = binfo; ; b = get_primary_binfo (b))
4e7512c9 2021 {
50bc768d 2022 gcc_assert (b);
3cfabe60 2023 if (look_for_overrides_here (BINFO_TYPE (b), target_fn))
31f8e4f3 2024 break;
f11ee281
JM
2025
2026 /* The nearest definition is from a lost primary. */
2027 if (BINFO_LOST_PRIMARY_P (b))
2028 lost = true;
4e7512c9 2029 }
d0cd8b44 2030 first_defn = b;
4e7512c9 2031
31f8e4f3 2032 /* Find the final overrider. */
3cfabe60 2033 overrider = find_final_overrider (TYPE_BINFO (t), b, target_fn);
4e7512c9 2034 if (overrider == error_mark_node)
16a1369e
JJ
2035 {
2036 error ("no unique final overrider for %qD in %qT", target_fn, t);
2037 return;
2038 }
3cfabe60 2039 overrider_target = overrider_fn = TREE_PURPOSE (overrider);
c8094d83 2040
9bcb9aae 2041 /* Check for adjusting covariant return types. */
3cfabe60
NS
2042 over_return = TREE_TYPE (TREE_TYPE (overrider_target));
2043 base_return = TREE_TYPE (TREE_TYPE (target_fn));
c8094d83 2044
3cfabe60
NS
2045 if (POINTER_TYPE_P (over_return)
2046 && TREE_CODE (over_return) == TREE_CODE (base_return)
2047 && CLASS_TYPE_P (TREE_TYPE (over_return))
b77fe7b4
NS
2048 && CLASS_TYPE_P (TREE_TYPE (base_return))
2049 /* If the overrider is invalid, don't even try. */
2050 && !DECL_INVALID_OVERRIDER_P (overrider_target))
3cfabe60
NS
2051 {
2052 /* If FN is a covariant thunk, we must figure out the adjustment
0cbd7506
MS
2053 to the final base FN was converting to. As OVERRIDER_TARGET might
2054 also be converting to the return type of FN, we have to
2055 combine the two conversions here. */
3cfabe60 2056 tree fixed_offset, virtual_offset;
12a669d1
NS
2057
2058 over_return = TREE_TYPE (over_return);
2059 base_return = TREE_TYPE (base_return);
c8094d83 2060
3cfabe60
NS
2061 if (DECL_THUNK_P (fn))
2062 {
50bc768d 2063 gcc_assert (DECL_RESULT_THUNK_P (fn));
3cfabe60
NS
2064 fixed_offset = ssize_int (THUNK_FIXED_OFFSET (fn));
2065 virtual_offset = THUNK_VIRTUAL_OFFSET (fn);
3cfabe60
NS
2066 }
2067 else
2068 fixed_offset = virtual_offset = NULL_TREE;
4977bab6 2069
e00853fd
NS
2070 if (virtual_offset)
2071 /* Find the equivalent binfo within the return type of the
2072 overriding function. We will want the vbase offset from
2073 there. */
58c42dc2 2074 virtual_offset = binfo_for_vbase (BINFO_TYPE (virtual_offset),
12a669d1
NS
2075 over_return);
2076 else if (!same_type_ignoring_top_level_qualifiers_p
2077 (over_return, base_return))
3cfabe60
NS
2078 {
2079 /* There was no existing virtual thunk (which takes
12a669d1
NS
2080 precedence). So find the binfo of the base function's
2081 return type within the overriding function's return type.
2082 We cannot call lookup base here, because we're inside a
2083 dfs_walk, and will therefore clobber the BINFO_MARKED
2084 flags. Fortunately we know the covariancy is valid (it
2085 has already been checked), so we can just iterate along
2086 the binfos, which have been chained in inheritance graph
2087 order. Of course it is lame that we have to repeat the
2088 search here anyway -- we should really be caching pieces
2089 of the vtable and avoiding this repeated work. */
2090 tree thunk_binfo, base_binfo;
2091
2092 /* Find the base binfo within the overriding function's
742f25b3
NS
2093 return type. We will always find a thunk_binfo, except
2094 when the covariancy is invalid (which we will have
2095 already diagnosed). */
12a669d1
NS
2096 for (base_binfo = TYPE_BINFO (base_return),
2097 thunk_binfo = TYPE_BINFO (over_return);
742f25b3 2098 thunk_binfo;
12a669d1 2099 thunk_binfo = TREE_CHAIN (thunk_binfo))
742f25b3
NS
2100 if (SAME_BINFO_TYPE_P (BINFO_TYPE (thunk_binfo),
2101 BINFO_TYPE (base_binfo)))
2102 break;
c8094d83 2103
12a669d1
NS
2104 /* See if virtual inheritance is involved. */
2105 for (virtual_offset = thunk_binfo;
2106 virtual_offset;
2107 virtual_offset = BINFO_INHERITANCE_CHAIN (virtual_offset))
2108 if (BINFO_VIRTUAL_P (virtual_offset))
2109 break;
c8094d83 2110
742f25b3
NS
2111 if (virtual_offset
2112 || (thunk_binfo && !BINFO_OFFSET_ZEROP (thunk_binfo)))
3cfabe60 2113 {
bb885938 2114 tree offset = convert (ssizetype, BINFO_OFFSET (thunk_binfo));
8d1f0f67 2115
12a669d1 2116 if (virtual_offset)
3cfabe60 2117 {
12a669d1
NS
2118 /* We convert via virtual base. Adjust the fixed
2119 offset to be from there. */
bb885938
NS
2120 offset = size_diffop
2121 (offset, convert
2122 (ssizetype, BINFO_OFFSET (virtual_offset)));
3cfabe60
NS
2123 }
2124 if (fixed_offset)
2125 /* There was an existing fixed offset, this must be
2126 from the base just converted to, and the base the
2127 FN was thunking to. */
2128 fixed_offset = size_binop (PLUS_EXPR, fixed_offset, offset);
2129 else
2130 fixed_offset = offset;
2131 }
2132 }
c8094d83 2133
3cfabe60
NS
2134 if (fixed_offset || virtual_offset)
2135 /* Replace the overriding function with a covariant thunk. We
2136 will emit the overriding function in its own slot as
9bcb9aae 2137 well. */
3cfabe60
NS
2138 overrider_fn = make_thunk (overrider_target, /*this_adjusting=*/0,
2139 fixed_offset, virtual_offset);
2140 }
2141 else
49fedf5a
SM
2142 gcc_assert (DECL_INVALID_OVERRIDER_P (overrider_target) ||
2143 !DECL_THUNK_P (fn));
c8094d83 2144
31f8e4f3
MM
2145 /* Assume that we will produce a thunk that convert all the way to
2146 the final overrider, and not to an intermediate virtual base. */
9ccf6541 2147 virtual_base = NULL_TREE;
31f8e4f3 2148
f11ee281 2149 /* See if we can convert to an intermediate virtual base first, and then
3461fba7 2150 use the vcall offset located there to finish the conversion. */
f11ee281 2151 for (; b; b = BINFO_INHERITANCE_CHAIN (b))
4e7512c9 2152 {
d0cd8b44
JM
2153 /* If we find the final overrider, then we can stop
2154 walking. */
539ed333
NS
2155 if (SAME_BINFO_TYPE_P (BINFO_TYPE (b),
2156 BINFO_TYPE (TREE_VALUE (overrider))))
1f84ec23 2157 break;
31f8e4f3 2158
d0cd8b44
JM
2159 /* If we find a virtual base, and we haven't yet found the
2160 overrider, then there is a virtual base between the
2161 declaring base (first_defn) and the final overrider. */
809e3e7f 2162 if (BINFO_VIRTUAL_P (b))
dbbf88d1
NS
2163 {
2164 virtual_base = b;
2165 break;
2166 }
4e7512c9 2167 }
4e7512c9 2168
a2ddc397
NS
2169 if (overrider_fn != overrider_target && !virtual_base)
2170 {
2171 /* The ABI specifies that a covariant thunk includes a mangling
0cbd7506
MS
2172 for a this pointer adjustment. This-adjusting thunks that
2173 override a function from a virtual base have a vcall
2174 adjustment. When the virtual base in question is a primary
2175 virtual base, we know the adjustments are zero, (and in the
2176 non-covariant case, we would not use the thunk).
2177 Unfortunately we didn't notice this could happen, when
2178 designing the ABI and so never mandated that such a covariant
2179 thunk should be emitted. Because we must use the ABI mandated
2180 name, we must continue searching from the binfo where we
2181 found the most recent definition of the function, towards the
2182 primary binfo which first introduced the function into the
2183 vtable. If that enters a virtual base, we must use a vcall
2184 this-adjusting thunk. Bleah! */
bb885938
NS
2185 tree probe = first_defn;
2186
2187 while ((probe = get_primary_binfo (probe))
2188 && (unsigned) list_length (BINFO_VIRTUALS (probe)) > ix)
809e3e7f 2189 if (BINFO_VIRTUAL_P (probe))
bb885938 2190 virtual_base = probe;
c8094d83 2191
a2ddc397
NS
2192 if (virtual_base)
2193 /* Even if we find a virtual base, the correct delta is
2194 between the overrider and the binfo we're building a vtable
2195 for. */
2196 goto virtual_covariant;
2197 }
c8094d83 2198
d0cd8b44
JM
2199 /* Compute the constant adjustment to the `this' pointer. The
2200 `this' pointer, when this function is called, will point at BINFO
2201 (or one of its primary bases, which are at the same offset). */
31f8e4f3 2202 if (virtual_base)
20dde49d
NS
2203 /* The `this' pointer needs to be adjusted from the declaration to
2204 the nearest virtual base. */
bb885938
NS
2205 delta = size_diffop (convert (ssizetype, BINFO_OFFSET (virtual_base)),
2206 convert (ssizetype, BINFO_OFFSET (first_defn)));
f11ee281
JM
2207 else if (lost)
2208 /* If the nearest definition is in a lost primary, we don't need an
2209 entry in our vtable. Except possibly in a constructor vtable,
2210 if we happen to get our primary back. In that case, the offset
2211 will be zero, as it will be a primary base. */
2212 delta = size_zero_node;
4e7512c9 2213 else
548502d3
MM
2214 /* The `this' pointer needs to be adjusted from pointing to
2215 BINFO to pointing at the base where the final overrider
2216 appears. */
a2ddc397 2217 virtual_covariant:
bb885938
NS
2218 delta = size_diffop (convert (ssizetype,
2219 BINFO_OFFSET (TREE_VALUE (overrider))),
2220 convert (ssizetype, BINFO_OFFSET (binfo)));
4e7512c9 2221
3cfabe60 2222 modify_vtable_entry (t, binfo, overrider_fn, delta, virtuals);
31f8e4f3
MM
2223
2224 if (virtual_base)
c8094d83 2225 BV_VCALL_INDEX (*virtuals)
3cfabe60 2226 = get_vcall_index (overrider_target, BINFO_TYPE (virtual_base));
d1f05f93
NS
2227 else
2228 BV_VCALL_INDEX (*virtuals) = NULL_TREE;
4e7512c9
MM
2229}
2230
8026246f 2231/* Called from modify_all_vtables via dfs_walk. */
e92cc029 2232
8026246f 2233static tree
94edc4ab 2234dfs_modify_vtables (tree binfo, void* data)
8026246f 2235{
bcb1079e 2236 tree t = (tree) data;
5b94d9dd
NS
2237 tree virtuals;
2238 tree old_virtuals;
2239 unsigned ix;
2240
2241 if (!TYPE_CONTAINS_VPTR_P (BINFO_TYPE (binfo)))
2242 /* A base without a vtable needs no modification, and its bases
2243 are uninteresting. */
2244 return dfs_skip_bases;
c8094d83 2245
5b94d9dd
NS
2246 if (SAME_BINFO_TYPE_P (BINFO_TYPE (binfo), t)
2247 && !CLASSTYPE_HAS_PRIMARY_BASE_P (t))
2248 /* Don't do the primary vtable, if it's new. */
2249 return NULL_TREE;
2250
2251 if (BINFO_PRIMARY_P (binfo) && !BINFO_VIRTUAL_P (binfo))
2252 /* There's no need to modify the vtable for a non-virtual primary
2253 base; we're not going to use that vtable anyhow. We do still
2254 need to do this for virtual primary bases, as they could become
2255 non-primary in a construction vtable. */
2256 return NULL_TREE;
2257
2258 make_new_vtable (t, binfo);
c8094d83 2259
5b94d9dd
NS
2260 /* Now, go through each of the virtual functions in the virtual
2261 function table for BINFO. Find the final overrider, and update
2262 the BINFO_VIRTUALS list appropriately. */
2263 for (ix = 0, virtuals = BINFO_VIRTUALS (binfo),
2264 old_virtuals = BINFO_VIRTUALS (TYPE_BINFO (BINFO_TYPE (binfo)));
2265 virtuals;
2266 ix++, virtuals = TREE_CHAIN (virtuals),
2267 old_virtuals = TREE_CHAIN (old_virtuals))
c8094d83
MS
2268 update_vtable_entry_for_fn (t,
2269 binfo,
5b94d9dd
NS
2270 BV_FN (old_virtuals),
2271 &virtuals, ix);
8026246f 2272
8026246f
MM
2273 return NULL_TREE;
2274}
2275
a68ad5bd
MM
2276/* Update all of the primary and secondary vtables for T. Create new
2277 vtables as required, and initialize their RTTI information. Each
e6858a84
NS
2278 of the functions in VIRTUALS is declared in T and may override a
2279 virtual function from a base class; find and modify the appropriate
2280 entries to point to the overriding functions. Returns a list, in
2281 declaration order, of the virtual functions that are declared in T,
2282 but do not appear in the primary base class vtable, and which
2283 should therefore be appended to the end of the vtable for T. */
a68ad5bd
MM
2284
2285static tree
94edc4ab 2286modify_all_vtables (tree t, tree virtuals)
8026246f 2287{
3461fba7
NS
2288 tree binfo = TYPE_BINFO (t);
2289 tree *fnsp;
a68ad5bd 2290
5e19c053 2291 /* Update all of the vtables. */
5b94d9dd 2292 dfs_walk_once (binfo, dfs_modify_vtables, NULL, t);
a68ad5bd 2293
e6858a84
NS
2294 /* Add virtual functions not already in our primary vtable. These
2295 will be both those introduced by this class, and those overridden
2296 from secondary bases. It does not include virtuals merely
2297 inherited from secondary bases. */
2298 for (fnsp = &virtuals; *fnsp; )
a68ad5bd 2299 {
3461fba7 2300 tree fn = TREE_VALUE (*fnsp);
a68ad5bd 2301
e6858a84
NS
2302 if (!value_member (fn, BINFO_VIRTUALS (binfo))
2303 || DECL_VINDEX (fn) == error_mark_node)
a68ad5bd 2304 {
3461fba7
NS
2305 /* We don't need to adjust the `this' pointer when
2306 calling this function. */
2307 BV_DELTA (*fnsp) = integer_zero_node;
2308 BV_VCALL_INDEX (*fnsp) = NULL_TREE;
2309
e6858a84 2310 /* This is a function not already in our vtable. Keep it. */
3461fba7 2311 fnsp = &TREE_CHAIN (*fnsp);
a68ad5bd 2312 }
3461fba7
NS
2313 else
2314 /* We've already got an entry for this function. Skip it. */
2315 *fnsp = TREE_CHAIN (*fnsp);
a68ad5bd 2316 }
e93ee644 2317
e6858a84 2318 return virtuals;
7177d104
MS
2319}
2320
7d5b8b11
MM
2321/* Get the base virtual function declarations in T that have the
2322 indicated NAME. */
e92cc029 2323
5ddc28a5 2324static tree
94edc4ab 2325get_basefndecls (tree name, tree t)
9e9ff709 2326{
7d5b8b11 2327 tree methods;
9e9ff709 2328 tree base_fndecls = NULL_TREE;
604a3205 2329 int n_baseclasses = BINFO_N_BASE_BINFOS (TYPE_BINFO (t));
7d5b8b11 2330 int i;
9e9ff709 2331
3d1df1fa
MM
2332 /* Find virtual functions in T with the indicated NAME. */
2333 i = lookup_fnfields_1 (t, name);
2334 if (i != -1)
aaaa46d2 2335 for (methods = VEC_index (tree, CLASSTYPE_METHOD_VEC (t), i);
3d1df1fa
MM
2336 methods;
2337 methods = OVL_NEXT (methods))
2338 {
2339 tree method = OVL_CURRENT (methods);
2340
2341 if (TREE_CODE (method) == FUNCTION_DECL
2342 && DECL_VINDEX (method))
2343 base_fndecls = tree_cons (NULL_TREE, method, base_fndecls);
2344 }
9e9ff709
MS
2345
2346 if (base_fndecls)
2347 return base_fndecls;
2348
2349 for (i = 0; i < n_baseclasses; i++)
2350 {
604a3205 2351 tree basetype = BINFO_TYPE (BINFO_BASE_BINFO (TYPE_BINFO (t), i));
7d5b8b11 2352 base_fndecls = chainon (get_basefndecls (name, basetype),
9e9ff709
MS
2353 base_fndecls);
2354 }
2355
2356 return base_fndecls;
2357}
2358
2ee887f2
MS
2359/* If this declaration supersedes the declaration of
2360 a method declared virtual in the base class, then
2361 mark this field as being virtual as well. */
2362
9f4faeae 2363void
94edc4ab 2364check_for_override (tree decl, tree ctype)
2ee887f2 2365{
cbb40945
NS
2366 if (TREE_CODE (decl) == TEMPLATE_DECL)
2367 /* In [temp.mem] we have:
2ee887f2 2368
0cbd7506
MS
2369 A specialization of a member function template does not
2370 override a virtual function from a base class. */
cbb40945
NS
2371 return;
2372 if ((DECL_DESTRUCTOR_P (decl)
a6c0d772
MM
2373 || IDENTIFIER_VIRTUAL_P (DECL_NAME (decl))
2374 || DECL_CONV_FN_P (decl))
cbb40945
NS
2375 && look_for_overrides (ctype, decl)
2376 && !DECL_STATIC_FUNCTION_P (decl))
e6858a84
NS
2377 /* Set DECL_VINDEX to a value that is neither an INTEGER_CST nor
2378 the error_mark_node so that we know it is an overriding
2379 function. */
2380 DECL_VINDEX (decl) = decl;
2381
cbb40945 2382 if (DECL_VIRTUAL_P (decl))
2ee887f2 2383 {
e6858a84 2384 if (!DECL_VINDEX (decl))
2ee887f2
MS
2385 DECL_VINDEX (decl) = error_mark_node;
2386 IDENTIFIER_VIRTUAL_P (DECL_NAME (decl)) = 1;
2387 }
2388}
2389
fc378698
MS
2390/* Warn about hidden virtual functions that are not overridden in t.
2391 We know that constructors and destructors don't apply. */
e92cc029 2392
b23e103b 2393static void
94edc4ab 2394warn_hidden (tree t)
9e9ff709 2395{
d4e6fecb 2396 VEC(tree,gc) *method_vec = CLASSTYPE_METHOD_VEC (t);
aaaa46d2
MM
2397 tree fns;
2398 size_t i;
9e9ff709
MS
2399
2400 /* We go through each separately named virtual function. */
c8094d83 2401 for (i = CLASSTYPE_FIRST_CONVERSION_SLOT;
9ba5ff0f 2402 VEC_iterate (tree, method_vec, i, fns);
aaaa46d2 2403 ++i)
9e9ff709 2404 {
aaaa46d2 2405 tree fn;
7d5b8b11
MM
2406 tree name;
2407 tree fndecl;
2408 tree base_fndecls;
fa743e8c
NS
2409 tree base_binfo;
2410 tree binfo;
7d5b8b11
MM
2411 int j;
2412
2413 /* All functions in this slot in the CLASSTYPE_METHOD_VEC will
2414 have the same name. Figure out what name that is. */
aaaa46d2 2415 name = DECL_NAME (OVL_CURRENT (fns));
7d5b8b11
MM
2416 /* There are no possibly hidden functions yet. */
2417 base_fndecls = NULL_TREE;
2418 /* Iterate through all of the base classes looking for possibly
2419 hidden functions. */
fa743e8c
NS
2420 for (binfo = TYPE_BINFO (t), j = 0;
2421 BINFO_BASE_ITERATE (binfo, j, base_binfo); j++)
a4832853 2422 {
fa743e8c 2423 tree basetype = BINFO_TYPE (base_binfo);
7d5b8b11
MM
2424 base_fndecls = chainon (get_basefndecls (name, basetype),
2425 base_fndecls);
a4832853
JM
2426 }
2427
00a17e31 2428 /* If there are no functions to hide, continue. */
7d5b8b11 2429 if (!base_fndecls)
9e9ff709
MS
2430 continue;
2431
00a17e31 2432 /* Remove any overridden functions. */
aaaa46d2 2433 for (fn = fns; fn; fn = OVL_NEXT (fn))
9e9ff709 2434 {
aaaa46d2 2435 fndecl = OVL_CURRENT (fn);
7d5b8b11
MM
2436 if (DECL_VINDEX (fndecl))
2437 {
2438 tree *prev = &base_fndecls;
c8094d83
MS
2439
2440 while (*prev)
7d5b8b11
MM
2441 /* If the method from the base class has the same
2442 signature as the method from the derived class, it
2443 has been overridden. */
2444 if (same_signature_p (fndecl, TREE_VALUE (*prev)))
2445 *prev = TREE_CHAIN (*prev);
2446 else
2447 prev = &TREE_CHAIN (*prev);
2448 }
9e9ff709
MS
2449 }
2450
9e9ff709
MS
2451 /* Now give a warning for all base functions without overriders,
2452 as they are hidden. */
c8094d83 2453 while (base_fndecls)
7d5b8b11
MM
2454 {
2455 /* Here we know it is a hider, and no overrider exists. */
286d12f9
MLI
2456 warning (OPT_Woverloaded_virtual, "%q+D was hidden", TREE_VALUE (base_fndecls));
2457 warning (OPT_Woverloaded_virtual, " by %q+D", fns);
7d5b8b11
MM
2458 base_fndecls = TREE_CHAIN (base_fndecls);
2459 }
9e9ff709
MS
2460 }
2461}
2462
2463/* Check for things that are invalid. There are probably plenty of other
2464 things we should check for also. */
e92cc029 2465
9e9ff709 2466static void
94edc4ab 2467finish_struct_anon (tree t)
9e9ff709
MS
2468{
2469 tree field;
f90cdf34 2470
9e9ff709
MS
2471 for (field = TYPE_FIELDS (t); field; field = TREE_CHAIN (field))
2472 {
2473 if (TREE_STATIC (field))
2474 continue;
2475 if (TREE_CODE (field) != FIELD_DECL)
2476 continue;
2477
2478 if (DECL_NAME (field) == NULL_TREE
6bdb8141 2479 && ANON_AGGR_TYPE_P (TREE_TYPE (field)))
9e9ff709 2480 {
61fdc9d7 2481 bool is_union = TREE_CODE (TREE_TYPE (field)) == UNION_TYPE;
f90cdf34
MT
2482 tree elt = TYPE_FIELDS (TREE_TYPE (field));
2483 for (; elt; elt = TREE_CHAIN (elt))
9e9ff709 2484 {
b7076960
MM
2485 /* We're generally only interested in entities the user
2486 declared, but we also find nested classes by noticing
2487 the TYPE_DECL that we create implicitly. You're
2488 allowed to put one anonymous union inside another,
6f32162a
JM
2489 though, so we explicitly tolerate that. We use
2490 TYPE_ANONYMOUS_P rather than ANON_AGGR_TYPE_P so that
2491 we also allow unnamed types used for defining fields. */
c8094d83 2492 if (DECL_ARTIFICIAL (elt)
b7076960 2493 && (!DECL_IMPLICIT_TYPEDEF_P (elt)
6f32162a 2494 || TYPE_ANONYMOUS_P (TREE_TYPE (elt))))
9e9ff709
MS
2495 continue;
2496
f90cdf34 2497 if (TREE_CODE (elt) != FIELD_DECL)
8ebeee52 2498 {
61fdc9d7 2499 if (is_union)
393eda6a
MLI
2500 permerror ("%q+#D invalid; an anonymous union can "
2501 "only have non-static data members", elt);
61fdc9d7 2502 else
393eda6a
MLI
2503 permerror ("%q+#D invalid; an anonymous struct can "
2504 "only have non-static data members", elt);
8ebeee52
JM
2505 continue;
2506 }
2507
f90cdf34 2508 if (TREE_PRIVATE (elt))
61fdc9d7
PC
2509 {
2510 if (is_union)
393eda6a 2511 permerror ("private member %q+#D in anonymous union", elt);
61fdc9d7 2512 else
393eda6a 2513 permerror ("private member %q+#D in anonymous struct", elt);
61fdc9d7 2514 }
f90cdf34 2515 else if (TREE_PROTECTED (elt))
61fdc9d7
PC
2516 {
2517 if (is_union)
393eda6a 2518 permerror ("protected member %q+#D in anonymous union", elt);
61fdc9d7 2519 else
393eda6a 2520 permerror ("protected member %q+#D in anonymous struct", elt);
61fdc9d7 2521 }
fc378698 2522
f90cdf34
MT
2523 TREE_PRIVATE (elt) = TREE_PRIVATE (field);
2524 TREE_PROTECTED (elt) = TREE_PROTECTED (field);
9e9ff709
MS
2525 }
2526 }
2527 }
2528}
2529
7088fca9
KL
2530/* Add T to CLASSTYPE_DECL_LIST of current_class_type which
2531 will be used later during class template instantiation.
2532 When FRIEND_P is zero, T can be a static member data (VAR_DECL),
2533 a non-static member data (FIELD_DECL), a member function
c8094d83 2534 (FUNCTION_DECL), a nested type (RECORD_TYPE, ENUM_TYPE),
7088fca9
KL
2535 a typedef (TYPE_DECL) or a member class template (TEMPLATE_DECL)
2536 When FRIEND_P is nonzero, T is either a friend class
2537 (RECORD_TYPE, TEMPLATE_DECL) or a friend function
2538 (FUNCTION_DECL, TEMPLATE_DECL). */
2539
2540void
94edc4ab 2541maybe_add_class_template_decl_list (tree type, tree t, int friend_p)
7088fca9
KL
2542{
2543 /* Save some memory by not creating TREE_LIST if TYPE is not template. */
2544 if (CLASSTYPE_TEMPLATE_INFO (type))
2545 CLASSTYPE_DECL_LIST (type)
2546 = tree_cons (friend_p ? NULL_TREE : type,
2547 t, CLASSTYPE_DECL_LIST (type));
2548}
2549
61a127b3 2550/* Create default constructors, assignment operators, and so forth for
e5e459bf
AO
2551 the type indicated by T, if they are needed. CANT_HAVE_CONST_CTOR,
2552 and CANT_HAVE_CONST_ASSIGNMENT are nonzero if, for whatever reason,
2553 the class cannot have a default constructor, copy constructor
2554 taking a const reference argument, or an assignment operator taking
2555 a const reference, respectively. */
61a127b3 2556
f72ab53b 2557static void
c8094d83 2558add_implicitly_declared_members (tree t,
94edc4ab
NN
2559 int cant_have_const_cctor,
2560 int cant_have_const_assignment)
61a127b3 2561{
61a127b3 2562 /* Destructor. */
9f4faeae 2563 if (!CLASSTYPE_DESTRUCTORS (t))
61a127b3 2564 {
9f4faeae
MM
2565 /* In general, we create destructors lazily. */
2566 CLASSTYPE_LAZY_DESTRUCTOR (t) = 1;
2567 /* However, if the implicit destructor is non-trivial
2568 destructor, we sometimes have to create it at this point. */
2569 if (TYPE_HAS_NONTRIVIAL_DESTRUCTOR (t))
2570 {
2571 bool lazy_p = true;
61a127b3 2572
9f4faeae
MM
2573 if (TYPE_FOR_JAVA (t))
2574 /* If this a Java class, any non-trivial destructor is
2575 invalid, even if compiler-generated. Therefore, if the
2576 destructor is non-trivial we create it now. */
2577 lazy_p = false;
2578 else
2579 {
2580 tree binfo;
2581 tree base_binfo;
2582 int ix;
2583
2584 /* If the implicit destructor will be virtual, then we must
2585 generate it now because (unfortunately) we do not
2586 generate virtual tables lazily. */
2587 binfo = TYPE_BINFO (t);
2588 for (ix = 0; BINFO_BASE_ITERATE (binfo, ix, base_binfo); ix++)
2589 {
2590 tree base_type;
2591 tree dtor;
2592
2593 base_type = BINFO_TYPE (base_binfo);
2594 dtor = CLASSTYPE_DESTRUCTORS (base_type);
2595 if (dtor && DECL_VIRTUAL_P (dtor))
2596 {
2597 lazy_p = false;
2598 break;
2599 }
2600 }
2601 }
2602
2603 /* If we can't get away with being lazy, generate the destructor
c8094d83 2604 now. */
9f4faeae
MM
2605 if (!lazy_p)
2606 lazily_declare_fn (sfk_destructor, t);
2607 }
61a127b3 2608 }
61a127b3 2609
0fcedd9c
JM
2610 /* [class.ctor]
2611
2612 If there is no user-declared constructor for a class, a default
2613 constructor is implicitly declared. */
2614 if (! TYPE_HAS_USER_CONSTRUCTOR (t))
61a127b3 2615 {
508a1c9c
MM
2616 TYPE_HAS_DEFAULT_CONSTRUCTOR (t) = 1;
2617 CLASSTYPE_LAZY_DEFAULT_CTOR (t) = 1;
61a127b3
MM
2618 }
2619
0fcedd9c
JM
2620 /* [class.ctor]
2621
2622 If a class definition does not explicitly declare a copy
2623 constructor, one is declared implicitly. */
6eabb241 2624 if (! TYPE_HAS_INIT_REF (t) && ! TYPE_FOR_JAVA (t))
61a127b3 2625 {
508a1c9c
MM
2626 TYPE_HAS_INIT_REF (t) = 1;
2627 TYPE_HAS_CONST_INIT_REF (t) = !cant_have_const_cctor;
2628 CLASSTYPE_LAZY_COPY_CTOR (t) = 1;
61a127b3
MM
2629 }
2630
aaaa46d2
MM
2631 /* If there is no assignment operator, one will be created if and
2632 when it is needed. For now, just record whether or not the type
2633 of the parameter to the assignment operator will be a const or
2634 non-const reference. */
2635 if (!TYPE_HAS_ASSIGN_REF (t) && !TYPE_FOR_JAVA (t))
fb232476
MM
2636 {
2637 TYPE_HAS_ASSIGN_REF (t) = 1;
2638 TYPE_HAS_CONST_ASSIGN_REF (t) = !cant_have_const_assignment;
2639 CLASSTYPE_LAZY_ASSIGNMENT_OP (t) = 1;
2640 }
61a127b3
MM
2641}
2642
f90cdf34
MT
2643/* Subroutine of finish_struct_1. Recursively count the number of fields
2644 in TYPE, including anonymous union members. */
2645
2646static int
94edc4ab 2647count_fields (tree fields)
f90cdf34
MT
2648{
2649 tree x;
2650 int n_fields = 0;
2651 for (x = fields; x; x = TREE_CHAIN (x))
2652 {
2653 if (TREE_CODE (x) == FIELD_DECL && ANON_AGGR_TYPE_P (TREE_TYPE (x)))
2654 n_fields += count_fields (TYPE_FIELDS (TREE_TYPE (x)));
2655 else
2656 n_fields += 1;
2657 }
2658 return n_fields;
2659}
2660
2661/* Subroutine of finish_struct_1. Recursively add all the fields in the
d07605f5 2662 TREE_LIST FIELDS to the SORTED_FIELDS_TYPE elts, starting at offset IDX. */
f90cdf34
MT
2663
2664static int
d07605f5 2665add_fields_to_record_type (tree fields, struct sorted_fields_type *field_vec, int idx)
f90cdf34
MT
2666{
2667 tree x;
2668 for (x = fields; x; x = TREE_CHAIN (x))
2669 {
2670 if (TREE_CODE (x) == FIELD_DECL && ANON_AGGR_TYPE_P (TREE_TYPE (x)))
d07605f5 2671 idx = add_fields_to_record_type (TYPE_FIELDS (TREE_TYPE (x)), field_vec, idx);
f90cdf34 2672 else
d07605f5 2673 field_vec->elts[idx++] = x;
f90cdf34
MT
2674 }
2675 return idx;
2676}
2677
1e30f9b4
MM
2678/* FIELD is a bit-field. We are finishing the processing for its
2679 enclosing type. Issue any appropriate messages and set appropriate
e7df0180 2680 flags. Returns false if an error has been diagnosed. */
1e30f9b4 2681
e7df0180 2682static bool
94edc4ab 2683check_bitfield_decl (tree field)
1e30f9b4
MM
2684{
2685 tree type = TREE_TYPE (field);
606791f6
MM
2686 tree w;
2687
2688 /* Extract the declared width of the bitfield, which has been
2689 temporarily stashed in DECL_INITIAL. */
2690 w = DECL_INITIAL (field);
3db45ab5 2691 gcc_assert (w != NULL_TREE);
606791f6
MM
2692 /* Remove the bit-field width indicator so that the rest of the
2693 compiler does not treat that value as an initializer. */
2694 DECL_INITIAL (field) = NULL_TREE;
1e30f9b4 2695
cd8ed629 2696 /* Detect invalid bit-field type. */
606791f6 2697 if (!INTEGRAL_TYPE_P (type))
1e30f9b4 2698 {
dee15844 2699 error ("bit-field %q+#D with non-integral type", field);
cd8ed629 2700 w = error_mark_node;
1e30f9b4 2701 }
606791f6 2702 else
1e30f9b4 2703 {
1e30f9b4
MM
2704 /* Avoid the non_lvalue wrapper added by fold for PLUS_EXPRs. */
2705 STRIP_NOPS (w);
2706
2707 /* detect invalid field size. */
8a784e4a 2708 w = integral_constant_value (w);
1e30f9b4
MM
2709
2710 if (TREE_CODE (w) != INTEGER_CST)
2711 {
dee15844 2712 error ("bit-field %q+D width not an integer constant", field);
cd8ed629 2713 w = error_mark_node;
1e30f9b4 2714 }
05bccae2 2715 else if (tree_int_cst_sgn (w) < 0)
1e30f9b4 2716 {
dee15844 2717 error ("negative width in bit-field %q+D", field);
cd8ed629 2718 w = error_mark_node;
1e30f9b4 2719 }
05bccae2 2720 else if (integer_zerop (w) && DECL_NAME (field) != 0)
1e30f9b4 2721 {
dee15844 2722 error ("zero width for bit-field %q+D", field);
cd8ed629 2723 w = error_mark_node;
1e30f9b4 2724 }
05bccae2 2725 else if (compare_tree_int (w, TYPE_PRECISION (type)) > 0
1e30f9b4
MM
2726 && TREE_CODE (type) != ENUMERAL_TYPE
2727 && TREE_CODE (type) != BOOLEAN_TYPE)
dee15844 2728 warning (0, "width of %q+D exceeds its type", field);
1e30f9b4 2729 else if (TREE_CODE (type) == ENUMERAL_TYPE
05bccae2
RK
2730 && (0 > compare_tree_int (w,
2731 min_precision (TYPE_MIN_VALUE (type),
8df83eae 2732 TYPE_UNSIGNED (type)))
05bccae2
RK
2733 || 0 > compare_tree_int (w,
2734 min_precision
2735 (TYPE_MAX_VALUE (type),
8df83eae 2736 TYPE_UNSIGNED (type)))))
dee15844 2737 warning (0, "%q+D is too small to hold all values of %q#T", field, type);
cd8ed629 2738 }
c8094d83 2739
cd8ed629
MM
2740 if (w != error_mark_node)
2741 {
2742 DECL_SIZE (field) = convert (bitsizetype, w);
2743 DECL_BIT_FIELD (field) = 1;
e7df0180 2744 return true;
1e30f9b4
MM
2745 }
2746 else
cd8ed629
MM
2747 {
2748 /* Non-bit-fields are aligned for their type. */
2749 DECL_BIT_FIELD (field) = 0;
2750 CLEAR_DECL_C_BIT_FIELD (field);
e7df0180 2751 return false;
cd8ed629 2752 }
1e30f9b4
MM
2753}
2754
2755/* FIELD is a non bit-field. We are finishing the processing for its
2756 enclosing type T. Issue any appropriate messages and set appropriate
2757 flags. */
2758
2759static void
94edc4ab 2760check_field_decl (tree field,
0cbd7506
MS
2761 tree t,
2762 int* cant_have_const_ctor,
2763 int* no_const_asn_ref,
94edc4ab 2764 int* any_default_members)
1e30f9b4
MM
2765{
2766 tree type = strip_array_types (TREE_TYPE (field));
2767
2768 /* An anonymous union cannot contain any fields which would change
2769 the settings of CANT_HAVE_CONST_CTOR and friends. */
2770 if (ANON_UNION_TYPE_P (type))
2771 ;
2772 /* And, we don't set TYPE_HAS_CONST_INIT_REF, etc., for anonymous
2773 structs. So, we recurse through their fields here. */
2774 else if (ANON_AGGR_TYPE_P (type))
2775 {
2776 tree fields;
2777
2778 for (fields = TYPE_FIELDS (type); fields; fields = TREE_CHAIN (fields))
17aec3eb 2779 if (TREE_CODE (fields) == FIELD_DECL && !DECL_C_BIT_FIELD (field))
1e30f9b4 2780 check_field_decl (fields, t, cant_have_const_ctor,
e5e459bf 2781 no_const_asn_ref, any_default_members);
1e30f9b4
MM
2782 }
2783 /* Check members with class type for constructors, destructors,
2784 etc. */
2785 else if (CLASS_TYPE_P (type))
2786 {
2787 /* Never let anything with uninheritable virtuals
2788 make it through without complaint. */
2789 abstract_virtuals_error (field, type);
c8094d83 2790
1e30f9b4
MM
2791 if (TREE_CODE (t) == UNION_TYPE)
2792 {
2793 if (TYPE_NEEDS_CONSTRUCTING (type))
dee15844
JM
2794 error ("member %q+#D with constructor not allowed in union",
2795 field);
834c6dff 2796 if (TYPE_HAS_NONTRIVIAL_DESTRUCTOR (type))
dee15844 2797 error ("member %q+#D with destructor not allowed in union", field);
1e30f9b4 2798 if (TYPE_HAS_COMPLEX_ASSIGN_REF (type))
dee15844
JM
2799 error ("member %q+#D with copy assignment operator not allowed in union",
2800 field);
1e30f9b4
MM
2801 }
2802 else
2803 {
2804 TYPE_NEEDS_CONSTRUCTING (t) |= TYPE_NEEDS_CONSTRUCTING (type);
c8094d83 2805 TYPE_HAS_NONTRIVIAL_DESTRUCTOR (t)
834c6dff 2806 |= TYPE_HAS_NONTRIVIAL_DESTRUCTOR (type);
1e30f9b4
MM
2807 TYPE_HAS_COMPLEX_ASSIGN_REF (t) |= TYPE_HAS_COMPLEX_ASSIGN_REF (type);
2808 TYPE_HAS_COMPLEX_INIT_REF (t) |= TYPE_HAS_COMPLEX_INIT_REF (type);
cb68ec50 2809 TYPE_HAS_COMPLEX_DFLT (t) |= TYPE_HAS_COMPLEX_DFLT (type);
1e30f9b4
MM
2810 }
2811
2812 if (!TYPE_HAS_CONST_INIT_REF (type))
2813 *cant_have_const_ctor = 1;
2814
2815 if (!TYPE_HAS_CONST_ASSIGN_REF (type))
2816 *no_const_asn_ref = 1;
1e30f9b4
MM
2817 }
2818 if (DECL_INITIAL (field) != NULL_TREE)
2819 {
2820 /* `build_class_init_list' does not recognize
2821 non-FIELD_DECLs. */
2822 if (TREE_CODE (t) == UNION_TYPE && any_default_members != 0)
1f070f2b 2823 error ("multiple fields in union %qT initialized", t);
1e30f9b4
MM
2824 *any_default_members = 1;
2825 }
6bb88f3b 2826}
1e30f9b4 2827
08b962b0
MM
2828/* Check the data members (both static and non-static), class-scoped
2829 typedefs, etc., appearing in the declaration of T. Issue
2830 appropriate diagnostics. Sets ACCESS_DECLS to a list (in
2831 declaration order) of access declarations; each TREE_VALUE in this
2832 list is a USING_DECL.
8d08fdba 2833
08b962b0 2834 In addition, set the following flags:
8d08fdba 2835
08b962b0
MM
2836 EMPTY_P
2837 The class is empty, i.e., contains no non-static data members.
8d08fdba 2838
08b962b0
MM
2839 CANT_HAVE_CONST_CTOR_P
2840 This class cannot have an implicitly generated copy constructor
2841 taking a const reference.
8d08fdba 2842
08b962b0
MM
2843 CANT_HAVE_CONST_ASN_REF
2844 This class cannot have an implicitly generated assignment
2845 operator taking a const reference.
8d08fdba 2846
08b962b0
MM
2847 All of these flags should be initialized before calling this
2848 function.
8d08fdba 2849
08b962b0
MM
2850 Returns a pointer to the end of the TYPE_FIELDs chain; additional
2851 fields can be added by adding to this chain. */
8d08fdba 2852
607cf131 2853static void
58731fd1 2854check_field_decls (tree t, tree *access_decls,
58731fd1
MM
2855 int *cant_have_const_ctor_p,
2856 int *no_const_asn_ref_p)
08b962b0
MM
2857{
2858 tree *field;
2859 tree *next;
dd29d26b 2860 bool has_pointers;
08b962b0 2861 int any_default_members;
22002050 2862 int cant_pack = 0;
08b962b0
MM
2863
2864 /* Assume there are no access declarations. */
2865 *access_decls = NULL_TREE;
2866 /* Assume this class has no pointer members. */
dd29d26b 2867 has_pointers = false;
08b962b0
MM
2868 /* Assume none of the members of this class have default
2869 initializations. */
2870 any_default_members = 0;
2871
2872 for (field = &TYPE_FIELDS (t); *field; field = next)
8d08fdba 2873 {
08b962b0
MM
2874 tree x = *field;
2875 tree type = TREE_TYPE (x);
8d08fdba 2876
08b962b0 2877 next = &TREE_CHAIN (x);
8d08fdba 2878
cffa8729 2879 if (TREE_CODE (x) == USING_DECL)
f30432d7 2880 {
08b962b0
MM
2881 /* Prune the access declaration from the list of fields. */
2882 *field = TREE_CHAIN (x);
2883
2884 /* Save the access declarations for our caller. */
2885 *access_decls = tree_cons (NULL_TREE, x, *access_decls);
2886
2887 /* Since we've reset *FIELD there's no reason to skip to the
2888 next field. */
2889 next = field;
f30432d7
MS
2890 continue;
2891 }
8d08fdba 2892
050367a3
MM
2893 if (TREE_CODE (x) == TYPE_DECL
2894 || TREE_CODE (x) == TEMPLATE_DECL)
f30432d7 2895 continue;
8d08fdba 2896
f30432d7 2897 /* If we've gotten this far, it's a data member, possibly static,
e92cc029 2898 or an enumerator. */
17aec3eb 2899 DECL_CONTEXT (x) = t;
8d08fdba 2900
58ec3cc5
MM
2901 /* When this goes into scope, it will be a non-local reference. */
2902 DECL_NONLOCAL (x) = 1;
2903
2904 if (TREE_CODE (t) == UNION_TYPE)
2905 {
2906 /* [class.union]
2907
2908 If a union contains a static data member, or a member of
324f9dfb 2909 reference type, the program is ill-formed. */
58ec3cc5
MM
2910 if (TREE_CODE (x) == VAR_DECL)
2911 {
dee15844 2912 error ("%q+D may not be static because it is a member of a union", x);
58ec3cc5
MM
2913 continue;
2914 }
2915 if (TREE_CODE (type) == REFERENCE_TYPE)
2916 {
dee15844
JM
2917 error ("%q+D may not have reference type %qT because"
2918 " it is a member of a union",
2919 x, type);
58ec3cc5
MM
2920 continue;
2921 }
2922 }
2923
f30432d7
MS
2924 /* Perform error checking that did not get done in
2925 grokdeclarator. */
52fb2769 2926 if (TREE_CODE (type) == FUNCTION_TYPE)
f30432d7 2927 {
dee15844 2928 error ("field %q+D invalidly declared function type", x);
52fb2769
NS
2929 type = build_pointer_type (type);
2930 TREE_TYPE (x) = type;
f30432d7 2931 }
52fb2769 2932 else if (TREE_CODE (type) == METHOD_TYPE)
f30432d7 2933 {
dee15844 2934 error ("field %q+D invalidly declared method type", x);
52fb2769
NS
2935 type = build_pointer_type (type);
2936 TREE_TYPE (x) = type;
f30432d7 2937 }
8d08fdba 2938
52fb2769 2939 if (type == error_mark_node)
f30432d7 2940 continue;
c8094d83 2941
58ec3cc5 2942 if (TREE_CODE (x) == CONST_DECL || TREE_CODE (x) == VAR_DECL)
73a8adb6 2943 continue;
8d08fdba 2944
f30432d7 2945 /* Now it can only be a FIELD_DECL. */
8d08fdba 2946
f30432d7 2947 if (TREE_PRIVATE (x) || TREE_PROTECTED (x))
08b962b0 2948 CLASSTYPE_NON_AGGREGATE (t) = 1;
8d08fdba 2949
0fcedd9c 2950 /* If this is of reference type, check if it needs an init. */
52fb2769 2951 if (TREE_CODE (type) == REFERENCE_TYPE)
0cbd7506 2952 {
08b962b0 2953 CLASSTYPE_NON_POD_P (t) = 1;
f30432d7 2954 if (DECL_INITIAL (x) == NULL_TREE)
6eb35968 2955 SET_CLASSTYPE_REF_FIELDS_NEED_INIT (t, 1);
8d08fdba 2956
f30432d7
MS
2957 /* ARM $12.6.2: [A member initializer list] (or, for an
2958 aggregate, initialization by a brace-enclosed list) is the
2959 only way to initialize nonstatic const and reference
2960 members. */
e349ee73 2961 TYPE_HAS_COMPLEX_ASSIGN_REF (t) = 1;
f30432d7 2962 }
8d08fdba 2963
1e30f9b4 2964 type = strip_array_types (type);
dd29d26b 2965
1937f939
JM
2966 if (TYPE_PACKED (t))
2967 {
2968 if (!pod_type_p (type) && !TYPE_PACKED (type))
4666cd04
JM
2969 {
2970 warning
2971 (0,
2972 "ignoring packed attribute because of unpacked non-POD field %q+#D",
2973 x);
22002050 2974 cant_pack = 1;
4666cd04 2975 }
1937f939
JM
2976 else if (TYPE_ALIGN (TREE_TYPE (x)) > BITS_PER_UNIT)
2977 DECL_PACKED (x) = 1;
2978 }
2979
2980 if (DECL_C_BIT_FIELD (x) && integer_zerop (DECL_INITIAL (x)))
2981 /* We don't treat zero-width bitfields as making a class
2982 non-empty. */
2983 ;
2984 else
2985 {
2986 /* The class is non-empty. */
2987 CLASSTYPE_EMPTY_P (t) = 0;
2988 /* The class is not even nearly empty. */
2989 CLASSTYPE_NEARLY_EMPTY_P (t) = 0;
2990 /* If one of the data members contains an empty class,
2991 so does T. */
2992 if (CLASS_TYPE_P (type)
2993 && CLASSTYPE_CONTAINS_EMPTY_CLASS_P (type))
2994 CLASSTYPE_CONTAINS_EMPTY_CLASS_P (t) = 1;
2995 }
2996
dd29d26b
GB
2997 /* This is used by -Weffc++ (see below). Warn only for pointers
2998 to members which might hold dynamic memory. So do not warn
2999 for pointers to functions or pointers to members. */
3000 if (TYPE_PTR_P (type)
3001 && !TYPE_PTRFN_P (type)
3002 && !TYPE_PTR_TO_MEMBER_P (type))
3003 has_pointers = true;
824b9a4c 3004
58ec3cc5
MM
3005 if (CLASS_TYPE_P (type))
3006 {
3007 if (CLASSTYPE_REF_FIELDS_NEED_INIT (type))
3008 SET_CLASSTYPE_REF_FIELDS_NEED_INIT (t, 1);
3009 if (CLASSTYPE_READONLY_FIELDS_NEED_INIT (type))
3010 SET_CLASSTYPE_READONLY_FIELDS_NEED_INIT (t, 1);
3011 }
3012
52fb2769 3013 if (DECL_MUTABLE_P (x) || TYPE_HAS_MUTABLE_P (type))
08b962b0 3014 CLASSTYPE_HAS_MUTABLE (t) = 1;
a7a7710d 3015
d282fcb2 3016 if (! pod_type_p (type))
0cbd7506
MS
3017 /* DR 148 now allows pointers to members (which are POD themselves),
3018 to be allowed in POD structs. */
08b962b0 3019 CLASSTYPE_NON_POD_P (t) = 1;
52fb2769 3020
94e6e4c4
AO
3021 if (! zero_init_p (type))
3022 CLASSTYPE_NON_ZERO_INIT_P (t) = 1;
3023
f30432d7 3024 /* If any field is const, the structure type is pseudo-const. */
52fb2769 3025 if (CP_TYPE_CONST_P (type))
f30432d7
MS
3026 {
3027 C_TYPE_FIELDS_READONLY (t) = 1;
3028 if (DECL_INITIAL (x) == NULL_TREE)
6eb35968 3029 SET_CLASSTYPE_READONLY_FIELDS_NEED_INIT (t, 1);
f30432d7
MS
3030
3031 /* ARM $12.6.2: [A member initializer list] (or, for an
3032 aggregate, initialization by a brace-enclosed list) is the
3033 only way to initialize nonstatic const and reference
3034 members. */
e349ee73 3035 TYPE_HAS_COMPLEX_ASSIGN_REF (t) = 1;
f30432d7 3036 }
08b962b0 3037 /* A field that is pseudo-const makes the structure likewise. */
5552b43c 3038 else if (CLASS_TYPE_P (type))
f30432d7 3039 {
08b962b0 3040 C_TYPE_FIELDS_READONLY (t) |= C_TYPE_FIELDS_READONLY (type);
6eb35968
DE
3041 SET_CLASSTYPE_READONLY_FIELDS_NEED_INIT (t,
3042 CLASSTYPE_READONLY_FIELDS_NEED_INIT (t)
3043 | CLASSTYPE_READONLY_FIELDS_NEED_INIT (type));
f30432d7 3044 }
8d08fdba 3045
c10bffd0
JM
3046 /* Core issue 80: A nonstatic data member is required to have a
3047 different name from the class iff the class has a
b87d79e6 3048 user-declared constructor. */
0fcedd9c
JM
3049 if (constructor_name_p (DECL_NAME (x), t)
3050 && TYPE_HAS_USER_CONSTRUCTOR (t))
393eda6a 3051 permerror ("field %q+#D with same name as class", x);
c10bffd0 3052
162bc98d
JM
3053 /* We set DECL_C_BIT_FIELD in grokbitfield.
3054 If the type and width are valid, we'll also set DECL_BIT_FIELD. */
e7df0180 3055 if (! DECL_C_BIT_FIELD (x) || ! check_bitfield_decl (x))
1e30f9b4 3056 check_field_decl (x, t,
08b962b0 3057 cant_have_const_ctor_p,
08b962b0 3058 no_const_asn_ref_p,
1e30f9b4 3059 &any_default_members);
8d08fdba
MS
3060 }
3061
dd29d26b
GB
3062 /* Effective C++ rule 11: if a class has dynamic memory held by pointers,
3063 it should also define a copy constructor and an assignment operator to
3064 implement the correct copy semantic (deep vs shallow, etc.). As it is
3065 not feasible to check whether the constructors do allocate dynamic memory
3066 and store it within members, we approximate the warning like this:
3067
3068 -- Warn only if there are members which are pointers
3069 -- Warn only if there is a non-trivial constructor (otherwise,
3070 there cannot be memory allocated).
3071 -- Warn only if there is a non-trivial destructor. We assume that the
3072 user at least implemented the cleanup correctly, and a destructor
3073 is needed to free dynamic memory.
c8094d83 3074
77880ae4 3075 This seems enough for practical purposes. */
22002050
JM
3076 if (warn_ecpp
3077 && has_pointers
0fcedd9c 3078 && TYPE_HAS_USER_CONSTRUCTOR (t)
22002050
JM
3079 && TYPE_HAS_NONTRIVIAL_DESTRUCTOR (t)
3080 && !(TYPE_HAS_INIT_REF (t) && TYPE_HAS_ASSIGN_REF (t)))
824b9a4c 3081 {
b323323f 3082 warning (OPT_Weffc__, "%q#T has pointer data members", t);
c8094d83 3083
824b9a4c
MS
3084 if (! TYPE_HAS_INIT_REF (t))
3085 {
74fa0285 3086 warning (OPT_Weffc__,
3db45ab5 3087 " but does not override %<%T(const %T&)%>", t, t);
74fa0285
GDR
3088 if (!TYPE_HAS_ASSIGN_REF (t))
3089 warning (OPT_Weffc__, " or %<operator=(const %T&)%>", t);
824b9a4c
MS
3090 }
3091 else if (! TYPE_HAS_ASSIGN_REF (t))
74fa0285 3092 warning (OPT_Weffc__,
3db45ab5 3093 " but does not override %<operator=(const %T&)%>", t);
824b9a4c 3094 }
08b962b0 3095
22002050
JM
3096 /* If any of the fields couldn't be packed, unset TYPE_PACKED. */
3097 if (cant_pack)
3098 TYPE_PACKED (t) = 0;
607cf131
MM
3099
3100 /* Check anonymous struct/anonymous union fields. */
3101 finish_struct_anon (t);
3102
08b962b0
MM
3103 /* We've built up the list of access declarations in reverse order.
3104 Fix that now. */
3105 *access_decls = nreverse (*access_decls);
08b962b0
MM
3106}
3107
c20118a8
MM
3108/* If TYPE is an empty class type, records its OFFSET in the table of
3109 OFFSETS. */
607cf131 3110
c20118a8 3111static int
94edc4ab 3112record_subobject_offset (tree type, tree offset, splay_tree offsets)
5c24fba6 3113{
c20118a8 3114 splay_tree_node n;
5c24fba6 3115
c20118a8
MM
3116 if (!is_empty_class (type))
3117 return 0;
5c24fba6 3118
c20118a8
MM
3119 /* Record the location of this empty object in OFFSETS. */
3120 n = splay_tree_lookup (offsets, (splay_tree_key) offset);
3121 if (!n)
c8094d83 3122 n = splay_tree_insert (offsets,
c20118a8
MM
3123 (splay_tree_key) offset,
3124 (splay_tree_value) NULL_TREE);
c8094d83 3125 n->value = ((splay_tree_value)
c20118a8
MM
3126 tree_cons (NULL_TREE,
3127 type,
3128 (tree) n->value));
3129
3130 return 0;
607cf131
MM
3131}
3132
838dfd8a 3133/* Returns nonzero if TYPE is an empty class type and there is
c20118a8 3134 already an entry in OFFSETS for the same TYPE as the same OFFSET. */
9785e4b1 3135
c20118a8 3136static int
94edc4ab 3137check_subobject_offset (tree type, tree offset, splay_tree offsets)
9785e4b1 3138{
c20118a8
MM
3139 splay_tree_node n;
3140 tree t;
3141
3142 if (!is_empty_class (type))
3143 return 0;
3144
3145 /* Record the location of this empty object in OFFSETS. */
3146 n = splay_tree_lookup (offsets, (splay_tree_key) offset);
3147 if (!n)
3148 return 0;
3149
3150 for (t = (tree) n->value; t; t = TREE_CHAIN (t))
3151 if (same_type_p (TREE_VALUE (t), type))
3152 return 1;
3153
3154 return 0;
9785e4b1
MM
3155}
3156
c20118a8
MM
3157/* Walk through all the subobjects of TYPE (located at OFFSET). Call
3158 F for every subobject, passing it the type, offset, and table of
2003cd37
MM
3159 OFFSETS. If VBASES_P is one, then virtual non-primary bases should
3160 be traversed.
5cdba4ff
MM
3161
3162 If MAX_OFFSET is non-NULL, then subobjects with an offset greater
3163 than MAX_OFFSET will not be walked.
3164
838dfd8a 3165 If F returns a nonzero value, the traversal ceases, and that value
5cdba4ff 3166 is returned. Otherwise, returns zero. */
d77249e7 3167
c20118a8 3168static int
c8094d83 3169walk_subobject_offsets (tree type,
0cbd7506
MS
3170 subobject_offset_fn f,
3171 tree offset,
3172 splay_tree offsets,
3173 tree max_offset,
3174 int vbases_p)
5c24fba6 3175{
c20118a8 3176 int r = 0;
ff944b49 3177 tree type_binfo = NULL_TREE;
c20118a8 3178
5cdba4ff
MM
3179 /* If this OFFSET is bigger than the MAX_OFFSET, then we should
3180 stop. */
3181 if (max_offset && INT_CST_LT (max_offset, offset))
3182 return 0;
3183
dbe91deb
NS
3184 if (type == error_mark_node)
3185 return 0;
3db45ab5 3186
c8094d83 3187 if (!TYPE_P (type))
ff944b49
MM
3188 {
3189 if (abi_version_at_least (2))
3190 type_binfo = type;
3191 type = BINFO_TYPE (type);
3192 }
3193
c20118a8 3194 if (CLASS_TYPE_P (type))
5c24fba6 3195 {
c20118a8 3196 tree field;
17bbb839 3197 tree binfo;
c20118a8
MM
3198 int i;
3199
5ec1192e
MM
3200 /* Avoid recursing into objects that are not interesting. */
3201 if (!CLASSTYPE_CONTAINS_EMPTY_CLASS_P (type))
3202 return 0;
3203
c20118a8
MM
3204 /* Record the location of TYPE. */
3205 r = (*f) (type, offset, offsets);
3206 if (r)
3207 return r;
3208
3209 /* Iterate through the direct base classes of TYPE. */
ff944b49
MM
3210 if (!type_binfo)
3211 type_binfo = TYPE_BINFO (type);
fa743e8c 3212 for (i = 0; BINFO_BASE_ITERATE (type_binfo, i, binfo); i++)
c20118a8 3213 {
ff944b49
MM
3214 tree binfo_offset;
3215
c8094d83 3216 if (abi_version_at_least (2)
809e3e7f 3217 && BINFO_VIRTUAL_P (binfo))
17bbb839 3218 continue;
5c24fba6 3219
c8094d83
MS
3220 if (!vbases_p
3221 && BINFO_VIRTUAL_P (binfo)
9965d119 3222 && !BINFO_PRIMARY_P (binfo))
c20118a8
MM
3223 continue;
3224
ff944b49
MM
3225 if (!abi_version_at_least (2))
3226 binfo_offset = size_binop (PLUS_EXPR,
3227 offset,
3228 BINFO_OFFSET (binfo));
3229 else
3230 {
3231 tree orig_binfo;
3232 /* We cannot rely on BINFO_OFFSET being set for the base
3233 class yet, but the offsets for direct non-virtual
3234 bases can be calculated by going back to the TYPE. */
604a3205 3235 orig_binfo = BINFO_BASE_BINFO (TYPE_BINFO (type), i);
c8094d83 3236 binfo_offset = size_binop (PLUS_EXPR,
ff944b49
MM
3237 offset,
3238 BINFO_OFFSET (orig_binfo));
3239 }
3240
3241 r = walk_subobject_offsets (binfo,
c20118a8 3242 f,
ff944b49 3243 binfo_offset,
c20118a8 3244 offsets,
5cdba4ff 3245 max_offset,
c8094d83 3246 (abi_version_at_least (2)
17bbb839 3247 ? /*vbases_p=*/0 : vbases_p));
c20118a8
MM
3248 if (r)
3249 return r;
3250 }
3251
58c42dc2 3252 if (abi_version_at_least (2) && CLASSTYPE_VBASECLASSES (type))
17bbb839 3253 {
58c42dc2 3254 unsigned ix;
d4e6fecb 3255 VEC(tree,gc) *vbases;
17bbb839 3256
ff944b49
MM
3257 /* Iterate through the virtual base classes of TYPE. In G++
3258 3.2, we included virtual bases in the direct base class
3259 loop above, which results in incorrect results; the
3260 correct offsets for virtual bases are only known when
3261 working with the most derived type. */
3262 if (vbases_p)
9ba5ff0f
NS
3263 for (vbases = CLASSTYPE_VBASECLASSES (type), ix = 0;
3264 VEC_iterate (tree, vbases, ix, binfo); ix++)
ff944b49 3265 {
ff944b49
MM
3266 r = walk_subobject_offsets (binfo,
3267 f,
3268 size_binop (PLUS_EXPR,
3269 offset,
3270 BINFO_OFFSET (binfo)),
3271 offsets,
3272 max_offset,
3273 /*vbases_p=*/0);
3274 if (r)
3275 return r;
3276 }
3277 else
17bbb839 3278 {
ff944b49
MM
3279 /* We still have to walk the primary base, if it is
3280 virtual. (If it is non-virtual, then it was walked
3281 above.) */
58c42dc2 3282 tree vbase = get_primary_binfo (type_binfo);
c8094d83 3283
809e3e7f 3284 if (vbase && BINFO_VIRTUAL_P (vbase)
fc6633e0
NS
3285 && BINFO_PRIMARY_P (vbase)
3286 && BINFO_INHERITANCE_CHAIN (vbase) == type_binfo)
ff944b49 3287 {
c8094d83 3288 r = (walk_subobject_offsets
dbbf88d1
NS
3289 (vbase, f, offset,
3290 offsets, max_offset, /*vbases_p=*/0));
3291 if (r)
3292 return r;
ff944b49 3293 }
17bbb839
MM
3294 }
3295 }
3296
c20118a8
MM
3297 /* Iterate through the fields of TYPE. */
3298 for (field = TYPE_FIELDS (type); field; field = TREE_CHAIN (field))
17bbb839 3299 if (TREE_CODE (field) == FIELD_DECL && !DECL_ARTIFICIAL (field))
c20118a8 3300 {
956d9305
MM
3301 tree field_offset;
3302
3303 if (abi_version_at_least (2))
3304 field_offset = byte_position (field);
3305 else
3306 /* In G++ 3.2, DECL_FIELD_OFFSET was used. */
3307 field_offset = DECL_FIELD_OFFSET (field);
3308
c20118a8
MM
3309 r = walk_subobject_offsets (TREE_TYPE (field),
3310 f,
3311 size_binop (PLUS_EXPR,
3312 offset,
956d9305 3313 field_offset),
c20118a8 3314 offsets,
5cdba4ff 3315 max_offset,
c20118a8
MM
3316 /*vbases_p=*/1);
3317 if (r)
3318 return r;
3319 }
5c24fba6 3320 }
c20118a8
MM
3321 else if (TREE_CODE (type) == ARRAY_TYPE)
3322 {
5ec1192e 3323 tree element_type = strip_array_types (type);
c20118a8
MM
3324 tree domain = TYPE_DOMAIN (type);
3325 tree index;
5c24fba6 3326
5ec1192e
MM
3327 /* Avoid recursing into objects that are not interesting. */
3328 if (!CLASS_TYPE_P (element_type)
3329 || !CLASSTYPE_CONTAINS_EMPTY_CLASS_P (element_type))
3330 return 0;
3331
c20118a8 3332 /* Step through each of the elements in the array. */
17bbb839
MM
3333 for (index = size_zero_node;
3334 /* G++ 3.2 had an off-by-one error here. */
c8094d83 3335 (abi_version_at_least (2)
17bbb839
MM
3336 ? !INT_CST_LT (TYPE_MAX_VALUE (domain), index)
3337 : INT_CST_LT (index, TYPE_MAX_VALUE (domain)));
c20118a8
MM
3338 index = size_binop (PLUS_EXPR, index, size_one_node))
3339 {
3340 r = walk_subobject_offsets (TREE_TYPE (type),
3341 f,
3342 offset,
3343 offsets,
5cdba4ff 3344 max_offset,
c20118a8
MM
3345 /*vbases_p=*/1);
3346 if (r)
3347 return r;
c8094d83 3348 offset = size_binop (PLUS_EXPR, offset,
c20118a8 3349 TYPE_SIZE_UNIT (TREE_TYPE (type)));
5cdba4ff
MM
3350 /* If this new OFFSET is bigger than the MAX_OFFSET, then
3351 there's no point in iterating through the remaining
3352 elements of the array. */
3353 if (max_offset && INT_CST_LT (max_offset, offset))
3354 break;
c20118a8
MM
3355 }
3356 }
3357
3358 return 0;
3359}
3360
c0572427
MM
3361/* Record all of the empty subobjects of TYPE (either a type or a
3362 binfo). If IS_DATA_MEMBER is true, then a non-static data member
c5a35c3c
MM
3363 is being placed at OFFSET; otherwise, it is a base class that is
3364 being placed at OFFSET. */
c20118a8
MM
3365
3366static void
c8094d83 3367record_subobject_offsets (tree type,
0cbd7506
MS
3368 tree offset,
3369 splay_tree offsets,
c5a35c3c 3370 bool is_data_member)
c20118a8 3371{
c5a35c3c 3372 tree max_offset;
c0572427
MM
3373 /* If recording subobjects for a non-static data member or a
3374 non-empty base class , we do not need to record offsets beyond
3375 the size of the biggest empty class. Additional data members
3376 will go at the end of the class. Additional base classes will go
3377 either at offset zero (if empty, in which case they cannot
3378 overlap with offsets past the size of the biggest empty class) or
3379 at the end of the class.
3380
3381 However, if we are placing an empty base class, then we must record
c5a35c3c
MM
3382 all offsets, as either the empty class is at offset zero (where
3383 other empty classes might later be placed) or at the end of the
3384 class (where other objects might then be placed, so other empty
3385 subobjects might later overlap). */
3db45ab5 3386 if (is_data_member
c0572427 3387 || !is_empty_class (BINFO_TYPE (type)))
c5a35c3c
MM
3388 max_offset = sizeof_biggest_empty_class;
3389 else
3390 max_offset = NULL_TREE;
c20118a8 3391 walk_subobject_offsets (type, record_subobject_offset, offset,
c5a35c3c 3392 offsets, max_offset, is_data_member);
5c24fba6
MM
3393}
3394
838dfd8a
KH
3395/* Returns nonzero if any of the empty subobjects of TYPE (located at
3396 OFFSET) conflict with entries in OFFSETS. If VBASES_P is nonzero,
c20118a8 3397 virtual bases of TYPE are examined. */
9785e4b1
MM
3398
3399static int
94edc4ab 3400layout_conflict_p (tree type,
0cbd7506
MS
3401 tree offset,
3402 splay_tree offsets,
3403 int vbases_p)
9785e4b1 3404{
5cdba4ff
MM
3405 splay_tree_node max_node;
3406
3407 /* Get the node in OFFSETS that indicates the maximum offset where
3408 an empty subobject is located. */
3409 max_node = splay_tree_max (offsets);
3410 /* If there aren't any empty subobjects, then there's no point in
3411 performing this check. */
3412 if (!max_node)
3413 return 0;
3414
c20118a8 3415 return walk_subobject_offsets (type, check_subobject_offset, offset,
5cdba4ff
MM
3416 offsets, (tree) (max_node->key),
3417 vbases_p);
9785e4b1
MM
3418}
3419
5c24fba6
MM
3420/* DECL is a FIELD_DECL corresponding either to a base subobject of a
3421 non-static data member of the type indicated by RLI. BINFO is the
c20118a8 3422 binfo corresponding to the base subobject, OFFSETS maps offsets to
17bbb839
MM
3423 types already located at those offsets. This function determines
3424 the position of the DECL. */
5c24fba6
MM
3425
3426static void
c8094d83
MS
3427layout_nonempty_base_or_field (record_layout_info rli,
3428 tree decl,
3429 tree binfo,
17bbb839 3430 splay_tree offsets)
5c24fba6 3431{
c20118a8 3432 tree offset = NULL_TREE;
17bbb839
MM
3433 bool field_p;
3434 tree type;
c8094d83 3435
17bbb839
MM
3436 if (binfo)
3437 {
3438 /* For the purposes of determining layout conflicts, we want to
3439 use the class type of BINFO; TREE_TYPE (DECL) will be the
3440 CLASSTYPE_AS_BASE version, which does not contain entries for
3441 zero-sized bases. */
3442 type = TREE_TYPE (binfo);
3443 field_p = false;
3444 }
3445 else
3446 {
3447 type = TREE_TYPE (decl);
3448 field_p = true;
3449 }
c20118a8 3450
5c24fba6
MM
3451 /* Try to place the field. It may take more than one try if we have
3452 a hard time placing the field without putting two objects of the
3453 same type at the same address. */
3454 while (1)
3455 {
defd0dea 3456 struct record_layout_info_s old_rli = *rli;
5c24fba6 3457
770ae6cc
RK
3458 /* Place this field. */
3459 place_field (rli, decl);
da3d4dfa 3460 offset = byte_position (decl);
1e2e9f54 3461
5c24fba6
MM
3462 /* We have to check to see whether or not there is already
3463 something of the same type at the offset we're about to use.
1e2e9f54 3464 For example, consider:
c8094d83 3465
1e2e9f54
MM
3466 struct S {};
3467 struct T : public S { int i; };
3468 struct U : public S, public T {};
c8094d83 3469
5c24fba6
MM
3470 Here, we put S at offset zero in U. Then, we can't put T at
3471 offset zero -- its S component would be at the same address
3472 as the S we already allocated. So, we have to skip ahead.
3473 Since all data members, including those whose type is an
838dfd8a 3474 empty class, have nonzero size, any overlap can happen only
5c24fba6
MM
3475 with a direct or indirect base-class -- it can't happen with
3476 a data member. */
1e2e9f54
MM
3477 /* In a union, overlap is permitted; all members are placed at
3478 offset zero. */
3479 if (TREE_CODE (rli->t) == UNION_TYPE)
3480 break;
7ba539c6
MM
3481 /* G++ 3.2 did not check for overlaps when placing a non-empty
3482 virtual base. */
809e3e7f 3483 if (!abi_version_at_least (2) && binfo && BINFO_VIRTUAL_P (binfo))
7ba539c6 3484 break;
c8094d83 3485 if (layout_conflict_p (field_p ? type : binfo, offset,
ff944b49 3486 offsets, field_p))
5c24fba6 3487 {
5c24fba6
MM
3488 /* Strip off the size allocated to this field. That puts us
3489 at the first place we could have put the field with
3490 proper alignment. */
770ae6cc
RK
3491 *rli = old_rli;
3492
c20118a8 3493 /* Bump up by the alignment required for the type. */
770ae6cc 3494 rli->bitpos
c8094d83
MS
3495 = size_binop (PLUS_EXPR, rli->bitpos,
3496 bitsize_int (binfo
c20118a8
MM
3497 ? CLASSTYPE_ALIGN (type)
3498 : TYPE_ALIGN (type)));
770ae6cc 3499 normalize_rli (rli);
5c24fba6
MM
3500 }
3501 else
3502 /* There was no conflict. We're done laying out this field. */
3503 break;
3504 }
c20118a8 3505
623fe76a 3506 /* Now that we know where it will be placed, update its
c20118a8
MM
3507 BINFO_OFFSET. */
3508 if (binfo && CLASS_TYPE_P (BINFO_TYPE (binfo)))
90024bdc 3509 /* Indirect virtual bases may have a nonzero BINFO_OFFSET at
17bbb839
MM
3510 this point because their BINFO_OFFSET is copied from another
3511 hierarchy. Therefore, we may not need to add the entire
3512 OFFSET. */
c8094d83 3513 propagate_binfo_offsets (binfo,
17bbb839 3514 size_diffop (convert (ssizetype, offset),
c8094d83 3515 convert (ssizetype,
dbbf88d1 3516 BINFO_OFFSET (binfo))));
5c24fba6
MM
3517}
3518
90024bdc 3519/* Returns true if TYPE is empty and OFFSET is nonzero. */
7ba539c6
MM
3520
3521static int
3522empty_base_at_nonzero_offset_p (tree type,
3523 tree offset,
3524 splay_tree offsets ATTRIBUTE_UNUSED)
3525{
3526 return is_empty_class (type) && !integer_zerop (offset);
3527}
3528
9785e4b1 3529/* Layout the empty base BINFO. EOC indicates the byte currently just
ec386958 3530 past the end of the class, and should be correctly aligned for a
c20118a8 3531 class of the type indicated by BINFO; OFFSETS gives the offsets of
623fe76a 3532 the empty bases allocated so far. T is the most derived
838dfd8a 3533 type. Return nonzero iff we added it at the end. */
9785e4b1 3534
06d9f09f 3535static bool
d9d9dbc0
JM
3536layout_empty_base (record_layout_info rli, tree binfo,
3537 tree eoc, splay_tree offsets)
9785e4b1 3538{
ec386958 3539 tree alignment;
9785e4b1 3540 tree basetype = BINFO_TYPE (binfo);
06d9f09f 3541 bool atend = false;
956d9305 3542
9785e4b1 3543 /* This routine should only be used for empty classes. */
50bc768d 3544 gcc_assert (is_empty_class (basetype));
1b50716d 3545 alignment = ssize_int (CLASSTYPE_ALIGN_UNIT (basetype));
9785e4b1 3546
3075b327
NS
3547 if (!integer_zerop (BINFO_OFFSET (binfo)))
3548 {
3549 if (abi_version_at_least (2))
3550 propagate_binfo_offsets
3551 (binfo, size_diffop (size_zero_node, BINFO_OFFSET (binfo)));
74fa0285
GDR
3552 else
3553 warning (OPT_Wabi,
3db45ab5 3554 "offset of empty base %qT may not be ABI-compliant and may"
3075b327
NS
3555 "change in a future version of GCC",
3556 BINFO_TYPE (binfo));
3557 }
c8094d83 3558
9785e4b1
MM
3559 /* This is an empty base class. We first try to put it at offset
3560 zero. */
ff944b49 3561 if (layout_conflict_p (binfo,
c20118a8 3562 BINFO_OFFSET (binfo),
c8094d83 3563 offsets,
c20118a8 3564 /*vbases_p=*/0))
9785e4b1
MM
3565 {
3566 /* That didn't work. Now, we move forward from the next
3567 available spot in the class. */
06d9f09f 3568 atend = true;
dbbf88d1 3569 propagate_binfo_offsets (binfo, convert (ssizetype, eoc));
c8094d83 3570 while (1)
9785e4b1 3571 {
ff944b49 3572 if (!layout_conflict_p (binfo,
c8094d83 3573 BINFO_OFFSET (binfo),
c20118a8
MM
3574 offsets,
3575 /*vbases_p=*/0))
9785e4b1
MM
3576 /* We finally found a spot where there's no overlap. */
3577 break;
3578
3579 /* There's overlap here, too. Bump along to the next spot. */
dbbf88d1 3580 propagate_binfo_offsets (binfo, alignment);
9785e4b1
MM
3581 }
3582 }
d9d9dbc0
JM
3583
3584 if (CLASSTYPE_USER_ALIGN (basetype))
3585 {
3586 rli->record_align = MAX (rli->record_align, CLASSTYPE_ALIGN (basetype));
3587 if (warn_packed)
3588 rli->unpacked_align = MAX (rli->unpacked_align, CLASSTYPE_ALIGN (basetype));
3589 TYPE_USER_ALIGN (rli->t) = 1;
3590 }
3591
06d9f09f 3592 return atend;
9785e4b1
MM
3593}
3594
78dcd41a 3595/* Layout the base given by BINFO in the class indicated by RLI.
58731fd1 3596 *BASE_ALIGN is a running maximum of the alignments of
17bbb839
MM
3597 any base class. OFFSETS gives the location of empty base
3598 subobjects. T is the most derived type. Return nonzero if the new
3599 object cannot be nearly-empty. A new FIELD_DECL is inserted at
c8094d83 3600 *NEXT_FIELD, unless BINFO is for an empty base class.
5c24fba6 3601
17bbb839
MM
3602 Returns the location at which the next field should be inserted. */
3603
3604static tree *
58731fd1 3605build_base_field (record_layout_info rli, tree binfo,
17bbb839 3606 splay_tree offsets, tree *next_field)
d77249e7 3607{
17bbb839 3608 tree t = rli->t;
d77249e7 3609 tree basetype = BINFO_TYPE (binfo);
d77249e7 3610
d0f062fb 3611 if (!COMPLETE_TYPE_P (basetype))
d77249e7
MM
3612 /* This error is now reported in xref_tag, thus giving better
3613 location information. */
17bbb839 3614 return next_field;
c8094d83 3615
17bbb839
MM
3616 /* Place the base class. */
3617 if (!is_empty_class (basetype))
5c24fba6 3618 {
17bbb839
MM
3619 tree decl;
3620
5c24fba6
MM
3621 /* The containing class is non-empty because it has a non-empty
3622 base class. */
58731fd1 3623 CLASSTYPE_EMPTY_P (t) = 0;
c8094d83 3624
17bbb839
MM
3625 /* Create the FIELD_DECL. */
3626 decl = build_decl (FIELD_DECL, NULL_TREE, CLASSTYPE_AS_BASE (basetype));
3627 DECL_ARTIFICIAL (decl) = 1;
78e0d62b 3628 DECL_IGNORED_P (decl) = 1;
17bbb839 3629 DECL_FIELD_CONTEXT (decl) = t;
1ad8aeeb
DG
3630 if (CLASSTYPE_AS_BASE (basetype))
3631 {
3632 DECL_SIZE (decl) = CLASSTYPE_SIZE (basetype);
3633 DECL_SIZE_UNIT (decl) = CLASSTYPE_SIZE_UNIT (basetype);
3634 DECL_ALIGN (decl) = CLASSTYPE_ALIGN (basetype);
3635 DECL_USER_ALIGN (decl) = CLASSTYPE_USER_ALIGN (basetype);
3636 DECL_MODE (decl) = TYPE_MODE (basetype);
3637 DECL_FIELD_IS_BASE (decl) = 1;
3638
3639 /* Try to place the field. It may take more than one try if we
3640 have a hard time placing the field without putting two
3641 objects of the same type at the same address. */
3642 layout_nonempty_base_or_field (rli, decl, binfo, offsets);
3643 /* Add the new FIELD_DECL to the list of fields for T. */
3644 TREE_CHAIN (decl) = *next_field;
3645 *next_field = decl;
3646 next_field = &TREE_CHAIN (decl);
3647 }
5c24fba6
MM
3648 }
3649 else
ec386958 3650 {
17bbb839 3651 tree eoc;
7ba539c6 3652 bool atend;
ec386958
MM
3653
3654 /* On some platforms (ARM), even empty classes will not be
3655 byte-aligned. */
17bbb839
MM
3656 eoc = round_up (rli_size_unit_so_far (rli),
3657 CLASSTYPE_ALIGN_UNIT (basetype));
d9d9dbc0 3658 atend = layout_empty_base (rli, binfo, eoc, offsets);
7ba539c6
MM
3659 /* A nearly-empty class "has no proper base class that is empty,
3660 not morally virtual, and at an offset other than zero." */
809e3e7f 3661 if (!BINFO_VIRTUAL_P (binfo) && CLASSTYPE_NEARLY_EMPTY_P (t))
7ba539c6
MM
3662 {
3663 if (atend)
3664 CLASSTYPE_NEARLY_EMPTY_P (t) = 0;
c5a35c3c 3665 /* The check above (used in G++ 3.2) is insufficient because
7ba539c6 3666 an empty class placed at offset zero might itself have an
90024bdc 3667 empty base at a nonzero offset. */
c8094d83 3668 else if (walk_subobject_offsets (basetype,
7ba539c6
MM
3669 empty_base_at_nonzero_offset_p,
3670 size_zero_node,
3671 /*offsets=*/NULL,
3672 /*max_offset=*/NULL_TREE,
3673 /*vbases_p=*/true))
3674 {
3675 if (abi_version_at_least (2))
3676 CLASSTYPE_NEARLY_EMPTY_P (t) = 0;
74fa0285
GDR
3677 else
3678 warning (OPT_Wabi,
3db45ab5 3679 "class %qT will be considered nearly empty in a "
7ba539c6
MM
3680 "future version of GCC", t);
3681 }
3682 }
c8094d83 3683
17bbb839
MM
3684 /* We do not create a FIELD_DECL for empty base classes because
3685 it might overlap some other field. We want to be able to
3686 create CONSTRUCTORs for the class by iterating over the
3687 FIELD_DECLs, and the back end does not handle overlapping
3688 FIELD_DECLs. */
58731fd1
MM
3689
3690 /* An empty virtual base causes a class to be non-empty
3691 -- but in that case we do not need to clear CLASSTYPE_EMPTY_P
3692 here because that was already done when the virtual table
3693 pointer was created. */
ec386958 3694 }
5c24fba6 3695
5c24fba6 3696 /* Record the offsets of BINFO and its base subobjects. */
ff944b49 3697 record_subobject_offsets (binfo,
c20118a8 3698 BINFO_OFFSET (binfo),
c8094d83 3699 offsets,
c5a35c3c 3700 /*is_data_member=*/false);
17bbb839
MM
3701
3702 return next_field;
d77249e7
MM
3703}
3704
c20118a8 3705/* Layout all of the non-virtual base classes. Record empty
17bbb839
MM
3706 subobjects in OFFSETS. T is the most derived type. Return nonzero
3707 if the type cannot be nearly empty. The fields created
3708 corresponding to the base classes will be inserted at
3709 *NEXT_FIELD. */
607cf131 3710
17bbb839 3711static void
58731fd1 3712build_base_fields (record_layout_info rli,
17bbb839 3713 splay_tree offsets, tree *next_field)
607cf131
MM
3714{
3715 /* Chain to hold all the new FIELD_DECLs which stand in for base class
3716 subobjects. */
17bbb839 3717 tree t = rli->t;
604a3205 3718 int n_baseclasses = BINFO_N_BASE_BINFOS (TYPE_BINFO (t));
5c24fba6 3719 int i;
607cf131 3720
3461fba7 3721 /* The primary base class is always allocated first. */
17bbb839
MM
3722 if (CLASSTYPE_HAS_PRIMARY_BASE_P (t))
3723 next_field = build_base_field (rli, CLASSTYPE_PRIMARY_BINFO (t),
58731fd1 3724 offsets, next_field);
d77249e7
MM
3725
3726 /* Now allocate the rest of the bases. */
607cf131
MM
3727 for (i = 0; i < n_baseclasses; ++i)
3728 {
d77249e7 3729 tree base_binfo;
607cf131 3730
604a3205 3731 base_binfo = BINFO_BASE_BINFO (TYPE_BINFO (t), i);
911a71a7 3732
3461fba7
NS
3733 /* The primary base was already allocated above, so we don't
3734 need to allocate it again here. */
17bbb839 3735 if (base_binfo == CLASSTYPE_PRIMARY_BINFO (t))
607cf131
MM
3736 continue;
3737
dbbf88d1
NS
3738 /* Virtual bases are added at the end (a primary virtual base
3739 will have already been added). */
809e3e7f 3740 if (BINFO_VIRTUAL_P (base_binfo))
607cf131
MM
3741 continue;
3742
58731fd1 3743 next_field = build_base_field (rli, base_binfo,
17bbb839 3744 offsets, next_field);
607cf131 3745 }
607cf131
MM
3746}
3747
58010b57
MM
3748/* Go through the TYPE_METHODS of T issuing any appropriate
3749 diagnostics, figuring out which methods override which other
3ef397c1 3750 methods, and so forth. */
58010b57
MM
3751
3752static void
94edc4ab 3753check_methods (tree t)
58010b57
MM
3754{
3755 tree x;
58010b57
MM
3756
3757 for (x = TYPE_METHODS (t); x; x = TREE_CHAIN (x))
3758 {
58010b57 3759 check_for_override (x, t);
fee7654e 3760 if (DECL_PURE_VIRTUAL_P (x) && ! DECL_VINDEX (x))
dee15844 3761 error ("initializer specified for non-virtual method %q+D", x);
58010b57
MM
3762 /* The name of the field is the original field name
3763 Save this in auxiliary field for later overloading. */
3764 if (DECL_VINDEX (x))
3765 {
3ef397c1 3766 TYPE_POLYMORPHIC_P (t) = 1;
fee7654e 3767 if (DECL_PURE_VIRTUAL_P (x))
d4e6fecb 3768 VEC_safe_push (tree, gc, CLASSTYPE_PURE_VIRTUALS (t), x);
58010b57 3769 }
b87d79e6
JM
3770 /* All user-provided destructors are non-trivial. */
3771 if (DECL_DESTRUCTOR_P (x) && !DECL_DEFAULTED_FN (x))
9f4faeae 3772 TYPE_HAS_NONTRIVIAL_DESTRUCTOR (t) = 1;
58010b57 3773 }
58010b57
MM
3774}
3775
db9b2174
MM
3776/* FN is a constructor or destructor. Clone the declaration to create
3777 a specialized in-charge or not-in-charge version, as indicated by
3778 NAME. */
3779
3780static tree
94edc4ab 3781build_clone (tree fn, tree name)
db9b2174
MM
3782{
3783 tree parms;
3784 tree clone;
3785
3786 /* Copy the function. */
3787 clone = copy_decl (fn);
3788 /* Remember where this function came from. */
3789 DECL_CLONED_FUNCTION (clone) = fn;
5daf7c0a 3790 DECL_ABSTRACT_ORIGIN (clone) = fn;
db9b2174
MM
3791 /* Reset the function name. */
3792 DECL_NAME (clone) = name;
71cb9286 3793 SET_DECL_ASSEMBLER_NAME (clone, NULL_TREE);
db9b2174
MM
3794 /* There's no pending inline data for this function. */
3795 DECL_PENDING_INLINE_INFO (clone) = NULL;
3796 DECL_PENDING_INLINE_P (clone) = 0;
3797 /* And it hasn't yet been deferred. */
3798 DECL_DEFERRED_FN (clone) = 0;
3799
298d6f60
MM
3800 /* The base-class destructor is not virtual. */
3801 if (name == base_dtor_identifier)
3802 {
3803 DECL_VIRTUAL_P (clone) = 0;
3804 if (TREE_CODE (clone) != TEMPLATE_DECL)
3805 DECL_VINDEX (clone) = NULL_TREE;
3806 }
3807
4e7512c9 3808 /* If there was an in-charge parameter, drop it from the function
db9b2174
MM
3809 type. */
3810 if (DECL_HAS_IN_CHARGE_PARM_P (clone))
3811 {
3812 tree basetype;
3813 tree parmtypes;
3814 tree exceptions;
3815
3816 exceptions = TYPE_RAISES_EXCEPTIONS (TREE_TYPE (clone));
3817 basetype = TYPE_METHOD_BASETYPE (TREE_TYPE (clone));
3818 parmtypes = TYPE_ARG_TYPES (TREE_TYPE (clone));
3819 /* Skip the `this' parameter. */
3820 parmtypes = TREE_CHAIN (parmtypes);
3821 /* Skip the in-charge parameter. */
3822 parmtypes = TREE_CHAIN (parmtypes);
e0fff4b3
JM
3823 /* And the VTT parm, in a complete [cd]tor. */
3824 if (DECL_HAS_VTT_PARM_P (fn)
3825 && ! DECL_NEEDS_VTT_PARM_P (clone))
3826 parmtypes = TREE_CHAIN (parmtypes);
3ec6bad3
MM
3827 /* If this is subobject constructor or destructor, add the vtt
3828 parameter. */
c8094d83 3829 TREE_TYPE (clone)
43dc123f
MM
3830 = build_method_type_directly (basetype,
3831 TREE_TYPE (TREE_TYPE (clone)),
3832 parmtypes);
db9b2174
MM
3833 if (exceptions)
3834 TREE_TYPE (clone) = build_exception_variant (TREE_TYPE (clone),
3835 exceptions);
c8094d83 3836 TREE_TYPE (clone)
e9525111
MM
3837 = cp_build_type_attribute_variant (TREE_TYPE (clone),
3838 TYPE_ATTRIBUTES (TREE_TYPE (fn)));
db9b2174
MM
3839 }
3840
e0fff4b3
JM
3841 /* Copy the function parameters. But, DECL_ARGUMENTS on a TEMPLATE_DECL
3842 aren't function parameters; those are the template parameters. */
db9b2174
MM
3843 if (TREE_CODE (clone) != TEMPLATE_DECL)
3844 {
3845 DECL_ARGUMENTS (clone) = copy_list (DECL_ARGUMENTS (clone));
3846 /* Remove the in-charge parameter. */
3847 if (DECL_HAS_IN_CHARGE_PARM_P (clone))
3848 {
3849 TREE_CHAIN (DECL_ARGUMENTS (clone))
3850 = TREE_CHAIN (TREE_CHAIN (DECL_ARGUMENTS (clone)));
3851 DECL_HAS_IN_CHARGE_PARM_P (clone) = 0;
3852 }
e0fff4b3
JM
3853 /* And the VTT parm, in a complete [cd]tor. */
3854 if (DECL_HAS_VTT_PARM_P (fn))
3ec6bad3 3855 {
e0fff4b3
JM
3856 if (DECL_NEEDS_VTT_PARM_P (clone))
3857 DECL_HAS_VTT_PARM_P (clone) = 1;
3858 else
3859 {
3860 TREE_CHAIN (DECL_ARGUMENTS (clone))
3861 = TREE_CHAIN (TREE_CHAIN (DECL_ARGUMENTS (clone)));
3862 DECL_HAS_VTT_PARM_P (clone) = 0;
3863 }
3ec6bad3
MM
3864 }
3865
db9b2174
MM
3866 for (parms = DECL_ARGUMENTS (clone); parms; parms = TREE_CHAIN (parms))
3867 {
3868 DECL_CONTEXT (parms) = clone;
63e1b1c4 3869 cxx_dup_lang_specific_decl (parms);
db9b2174
MM
3870 }
3871 }
3872
db9b2174 3873 /* Create the RTL for this function. */
19e7881c 3874 SET_DECL_RTL (clone, NULL_RTX);
0e6df31e 3875 rest_of_decl_compilation (clone, /*top_level=*/1, at_eof);
c8094d83 3876
db9b2174
MM
3877 /* Make it easy to find the CLONE given the FN. */
3878 TREE_CHAIN (clone) = TREE_CHAIN (fn);
3879 TREE_CHAIN (fn) = clone;
3880
3881 /* If this is a template, handle the DECL_TEMPLATE_RESULT as well. */
3882 if (TREE_CODE (clone) == TEMPLATE_DECL)
3883 {
3884 tree result;
3885
c8094d83 3886 DECL_TEMPLATE_RESULT (clone)
db9b2174
MM
3887 = build_clone (DECL_TEMPLATE_RESULT (clone), name);
3888 result = DECL_TEMPLATE_RESULT (clone);
3889 DECL_TEMPLATE_INFO (result) = copy_node (DECL_TEMPLATE_INFO (result));
3890 DECL_TI_TEMPLATE (result) = clone;
3891 }
5e2f4cd2
MM
3892 else if (pch_file)
3893 note_decl_for_pch (clone);
db9b2174
MM
3894
3895 return clone;
3896}
3897
3898/* Produce declarations for all appropriate clones of FN. If
838dfd8a 3899 UPDATE_METHOD_VEC_P is nonzero, the clones are added to the
db9b2174
MM
3900 CLASTYPE_METHOD_VEC as well. */
3901
3902void
94edc4ab 3903clone_function_decl (tree fn, int update_method_vec_p)
db9b2174
MM
3904{
3905 tree clone;
3906
c00996a3 3907 /* Avoid inappropriate cloning. */
1f84ec23
MM
3908 if (TREE_CHAIN (fn)
3909 && DECL_CLONED_FUNCTION (TREE_CHAIN (fn)))
c00996a3
JM
3910 return;
3911
298d6f60 3912 if (DECL_MAYBE_IN_CHARGE_CONSTRUCTOR_P (fn))
db9b2174 3913 {
298d6f60
MM
3914 /* For each constructor, we need two variants: an in-charge version
3915 and a not-in-charge version. */
db9b2174
MM
3916 clone = build_clone (fn, complete_ctor_identifier);
3917 if (update_method_vec_p)
b2a9b208 3918 add_method (DECL_CONTEXT (clone), clone, NULL_TREE);
db9b2174
MM
3919 clone = build_clone (fn, base_ctor_identifier);
3920 if (update_method_vec_p)
b2a9b208 3921 add_method (DECL_CONTEXT (clone), clone, NULL_TREE);
db9b2174
MM
3922 }
3923 else
298d6f60 3924 {
50bc768d 3925 gcc_assert (DECL_MAYBE_IN_CHARGE_DESTRUCTOR_P (fn));
298d6f60 3926
3ec6bad3 3927 /* For each destructor, we need three variants: an in-charge
298d6f60 3928 version, a not-in-charge version, and an in-charge deleting
4e7512c9
MM
3929 version. We clone the deleting version first because that
3930 means it will go second on the TYPE_METHODS list -- and that
3931 corresponds to the correct layout order in the virtual
c8094d83 3932 function table.
52682a1b 3933
0cbd7506 3934 For a non-virtual destructor, we do not build a deleting
52682a1b
MM
3935 destructor. */
3936 if (DECL_VIRTUAL_P (fn))
3937 {
3938 clone = build_clone (fn, deleting_dtor_identifier);
3939 if (update_method_vec_p)
b2a9b208 3940 add_method (DECL_CONTEXT (clone), clone, NULL_TREE);
52682a1b 3941 }
4e7512c9 3942 clone = build_clone (fn, complete_dtor_identifier);
298d6f60 3943 if (update_method_vec_p)
b2a9b208 3944 add_method (DECL_CONTEXT (clone), clone, NULL_TREE);
298d6f60
MM
3945 clone = build_clone (fn, base_dtor_identifier);
3946 if (update_method_vec_p)
b2a9b208 3947 add_method (DECL_CONTEXT (clone), clone, NULL_TREE);
298d6f60 3948 }
5daf7c0a
JM
3949
3950 /* Note that this is an abstract function that is never emitted. */
3951 DECL_ABSTRACT (fn) = 1;
db9b2174
MM
3952}
3953
5f6eeeb3
NS
3954/* DECL is an in charge constructor, which is being defined. This will
3955 have had an in class declaration, from whence clones were
3956 declared. An out-of-class definition can specify additional default
3957 arguments. As it is the clones that are involved in overload
3958 resolution, we must propagate the information from the DECL to its
00a17e31 3959 clones. */
5f6eeeb3
NS
3960
3961void
94edc4ab 3962adjust_clone_args (tree decl)
5f6eeeb3
NS
3963{
3964 tree clone;
c8094d83 3965
5f6eeeb3
NS
3966 for (clone = TREE_CHAIN (decl); clone && DECL_CLONED_FUNCTION (clone);
3967 clone = TREE_CHAIN (clone))
3968 {
3969 tree orig_clone_parms = TYPE_ARG_TYPES (TREE_TYPE (clone));
3970 tree orig_decl_parms = TYPE_ARG_TYPES (TREE_TYPE (decl));
3971 tree decl_parms, clone_parms;
3972
3973 clone_parms = orig_clone_parms;
c8094d83 3974
00a17e31 3975 /* Skip the 'this' parameter. */
5f6eeeb3
NS
3976 orig_clone_parms = TREE_CHAIN (orig_clone_parms);
3977 orig_decl_parms = TREE_CHAIN (orig_decl_parms);
3978
3979 if (DECL_HAS_IN_CHARGE_PARM_P (decl))
3980 orig_decl_parms = TREE_CHAIN (orig_decl_parms);
3981 if (DECL_HAS_VTT_PARM_P (decl))
3982 orig_decl_parms = TREE_CHAIN (orig_decl_parms);
c8094d83 3983
5f6eeeb3
NS
3984 clone_parms = orig_clone_parms;
3985 if (DECL_HAS_VTT_PARM_P (clone))
3986 clone_parms = TREE_CHAIN (clone_parms);
c8094d83 3987
5f6eeeb3
NS
3988 for (decl_parms = orig_decl_parms; decl_parms;
3989 decl_parms = TREE_CHAIN (decl_parms),
3990 clone_parms = TREE_CHAIN (clone_parms))
3991 {
50bc768d
NS
3992 gcc_assert (same_type_p (TREE_TYPE (decl_parms),
3993 TREE_TYPE (clone_parms)));
c8094d83 3994
5f6eeeb3
NS
3995 if (TREE_PURPOSE (decl_parms) && !TREE_PURPOSE (clone_parms))
3996 {
3997 /* A default parameter has been added. Adjust the
00a17e31 3998 clone's parameters. */
5f6eeeb3
NS
3999 tree exceptions = TYPE_RAISES_EXCEPTIONS (TREE_TYPE (clone));
4000 tree basetype = TYPE_METHOD_BASETYPE (TREE_TYPE (clone));
4001 tree type;
4002
4003 clone_parms = orig_decl_parms;
4004
4005 if (DECL_HAS_VTT_PARM_P (clone))
4006 {
4007 clone_parms = tree_cons (TREE_PURPOSE (orig_clone_parms),
4008 TREE_VALUE (orig_clone_parms),
4009 clone_parms);
4010 TREE_TYPE (clone_parms) = TREE_TYPE (orig_clone_parms);
4011 }
43dc123f
MM
4012 type = build_method_type_directly (basetype,
4013 TREE_TYPE (TREE_TYPE (clone)),
4014 clone_parms);
5f6eeeb3
NS
4015 if (exceptions)
4016 type = build_exception_variant (type, exceptions);
4017 TREE_TYPE (clone) = type;
c8094d83 4018
5f6eeeb3
NS
4019 clone_parms = NULL_TREE;
4020 break;
4021 }
4022 }
50bc768d 4023 gcc_assert (!clone_parms);
5f6eeeb3
NS
4024 }
4025}
4026
db9b2174
MM
4027/* For each of the constructors and destructors in T, create an
4028 in-charge and not-in-charge variant. */
4029
4030static void
94edc4ab 4031clone_constructors_and_destructors (tree t)
db9b2174
MM
4032{
4033 tree fns;
4034
db9b2174
MM
4035 /* If for some reason we don't have a CLASSTYPE_METHOD_VEC, we bail
4036 out now. */
4037 if (!CLASSTYPE_METHOD_VEC (t))
4038 return;
4039
db9b2174
MM
4040 for (fns = CLASSTYPE_CONSTRUCTORS (t); fns; fns = OVL_NEXT (fns))
4041 clone_function_decl (OVL_CURRENT (fns), /*update_method_vec_p=*/1);
298d6f60
MM
4042 for (fns = CLASSTYPE_DESTRUCTORS (t); fns; fns = OVL_NEXT (fns))
4043 clone_function_decl (OVL_CURRENT (fns), /*update_method_vec_p=*/1);
db9b2174
MM
4044}
4045
8c95264b
MLI
4046/* Returns true iff class T has a user-defined constructor other than
4047 the default constructor. */
4048
4049bool
4050type_has_user_nondefault_constructor (tree t)
4051{
4052 tree fns;
4053
4054 if (!TYPE_HAS_USER_CONSTRUCTOR (t))
4055 return false;
4056
4057 for (fns = CLASSTYPE_CONSTRUCTORS (t); fns; fns = OVL_NEXT (fns))
4058 {
4059 tree fn = OVL_CURRENT (fns);
4060 if (!DECL_ARTIFICIAL (fn)
c2b58ba2
JM
4061 && (TREE_CODE (fn) == TEMPLATE_DECL
4062 || (skip_artificial_parms_for (fn, DECL_ARGUMENTS (fn))
4063 != NULL_TREE)))
8c95264b
MLI
4064 return true;
4065 }
4066
4067 return false;
4068}
4069
b87d79e6
JM
4070/* Returns true iff FN is a user-provided function, i.e. user-declared
4071 and not defaulted at its first declaration. */
4072
4073static bool
4074user_provided_p (tree fn)
4075{
4076 if (TREE_CODE (fn) == TEMPLATE_DECL)
4077 return true;
4078 else
4079 return (!DECL_ARTIFICIAL (fn)
4080 && !(DECL_DEFAULTED_FN (fn)
4081 && DECL_INITIALIZED_IN_CLASS_P (fn)));
4082}
4083
4084/* Returns true iff class T has a user-provided constructor. */
4085
4086bool
4087type_has_user_provided_constructor (tree t)
4088{
4089 tree fns;
4090
4091 if (!TYPE_HAS_USER_CONSTRUCTOR (t))
4092 return false;
4093
4094 /* This can happen in error cases; avoid crashing. */
4095 if (!CLASSTYPE_METHOD_VEC (t))
4096 return false;
4097
4098 for (fns = CLASSTYPE_CONSTRUCTORS (t); fns; fns = OVL_NEXT (fns))
4099 if (user_provided_p (OVL_CURRENT (fns)))
4100 return true;
4101
4102 return false;
4103}
4104
4105/* Returns true iff class T has a user-provided default constructor. */
4106
4107bool
4108type_has_user_provided_default_constructor (tree t)
4109{
ff60c668 4110 tree fns, args;
b87d79e6
JM
4111
4112 if (!TYPE_HAS_USER_CONSTRUCTOR (t))
4113 return false;
4114
4115 for (fns = CLASSTYPE_CONSTRUCTORS (t); fns; fns = OVL_NEXT (fns))
4116 {
4117 tree fn = OVL_CURRENT (fns);
7ad8d488 4118 if (TREE_CODE (fn) == FUNCTION_DECL
ff60c668
L
4119 && user_provided_p (fn))
4120 {
4121 args = FUNCTION_FIRST_USER_PARMTYPE (fn);
4122 while (args && TREE_PURPOSE (args))
4123 args = TREE_CHAIN (args);
4124 if (!args || args == void_list_node)
4125 return true;
4126 }
b87d79e6
JM
4127 }
4128
4129 return false;
4130}
4131
4132/* Returns true if FN can be explicitly defaulted. */
4133
4134bool
4135defaultable_fn_p (tree fn)
4136{
4137 if (DECL_CONSTRUCTOR_P (fn))
4138 {
4139 if (skip_artificial_parms_for (fn, DECL_ARGUMENTS (fn))
4140 == NULL_TREE)
4141 return true;
4142 else if (copy_fn_p (fn) > 0)
4143 return true;
4144 else
4145 return false;
4146 }
4147 else if (DECL_DESTRUCTOR_P (fn))
4148 return true;
4149 else if (DECL_ASSIGNMENT_OPERATOR_P (fn))
4150 return copy_fn_p (fn);
4151 else
4152 return false;
4153}
4154
58010b57
MM
4155/* Remove all zero-width bit-fields from T. */
4156
4157static void
94edc4ab 4158remove_zero_width_bit_fields (tree t)
58010b57
MM
4159{
4160 tree *fieldsp;
4161
c8094d83 4162 fieldsp = &TYPE_FIELDS (t);
58010b57
MM
4163 while (*fieldsp)
4164 {
4165 if (TREE_CODE (*fieldsp) == FIELD_DECL
c8094d83 4166 && DECL_C_BIT_FIELD (*fieldsp)
58010b57
MM
4167 && DECL_INITIAL (*fieldsp))
4168 *fieldsp = TREE_CHAIN (*fieldsp);
4169 else
4170 fieldsp = &TREE_CHAIN (*fieldsp);
4171 }
4172}
4173
dbc957f1
MM
4174/* Returns TRUE iff we need a cookie when dynamically allocating an
4175 array whose elements have the indicated class TYPE. */
4176
4177static bool
94edc4ab 4178type_requires_array_cookie (tree type)
dbc957f1
MM
4179{
4180 tree fns;
18fee3ee 4181 bool has_two_argument_delete_p = false;
dbc957f1 4182
50bc768d 4183 gcc_assert (CLASS_TYPE_P (type));
dbc957f1
MM
4184
4185 /* If there's a non-trivial destructor, we need a cookie. In order
4186 to iterate through the array calling the destructor for each
4187 element, we'll have to know how many elements there are. */
4188 if (TYPE_HAS_NONTRIVIAL_DESTRUCTOR (type))
4189 return true;
4190
4191 /* If the usual deallocation function is a two-argument whose second
4192 argument is of type `size_t', then we have to pass the size of
4193 the array to the deallocation function, so we will need to store
4194 a cookie. */
c8094d83 4195 fns = lookup_fnfields (TYPE_BINFO (type),
dbc957f1
MM
4196 ansi_opname (VEC_DELETE_EXPR),
4197 /*protect=*/0);
4198 /* If there are no `operator []' members, or the lookup is
4199 ambiguous, then we don't need a cookie. */
4200 if (!fns || fns == error_mark_node)
4201 return false;
4202 /* Loop through all of the functions. */
50ad9642 4203 for (fns = BASELINK_FUNCTIONS (fns); fns; fns = OVL_NEXT (fns))
dbc957f1
MM
4204 {
4205 tree fn;
4206 tree second_parm;
4207
4208 /* Select the current function. */
4209 fn = OVL_CURRENT (fns);
4210 /* See if this function is a one-argument delete function. If
4211 it is, then it will be the usual deallocation function. */
4212 second_parm = TREE_CHAIN (TYPE_ARG_TYPES (TREE_TYPE (fn)));
4213 if (second_parm == void_list_node)
4214 return false;
4b8cb94c
SM
4215 /* Do not consider this function if its second argument is an
4216 ellipsis. */
4217 if (!second_parm)
4218 continue;
dbc957f1
MM
4219 /* Otherwise, if we have a two-argument function and the second
4220 argument is `size_t', it will be the usual deallocation
4221 function -- unless there is one-argument function, too. */
4222 if (TREE_CHAIN (second_parm) == void_list_node
c79154c4 4223 && same_type_p (TREE_VALUE (second_parm), size_type_node))
dbc957f1
MM
4224 has_two_argument_delete_p = true;
4225 }
4226
4227 return has_two_argument_delete_p;
4228}
4229
607cf131
MM
4230/* Check the validity of the bases and members declared in T. Add any
4231 implicitly-generated functions (like copy-constructors and
4232 assignment operators). Compute various flag bits (like
4233 CLASSTYPE_NON_POD_T) for T. This routine works purely at the C++
4234 level: i.e., independently of the ABI in use. */
4235
4236static void
58731fd1 4237check_bases_and_members (tree t)
607cf131 4238{
607cf131
MM
4239 /* Nonzero if the implicitly generated copy constructor should take
4240 a non-const reference argument. */
4241 int cant_have_const_ctor;
78dcd41a 4242 /* Nonzero if the implicitly generated assignment operator
607cf131
MM
4243 should take a non-const reference argument. */
4244 int no_const_asn_ref;
4245 tree access_decls;
b87d79e6
JM
4246 bool saved_complex_asn_ref;
4247 bool saved_nontrivial_dtor;
607cf131
MM
4248
4249 /* By default, we use const reference arguments and generate default
4250 constructors. */
607cf131
MM
4251 cant_have_const_ctor = 0;
4252 no_const_asn_ref = 0;
4253
00a17e31 4254 /* Check all the base-classes. */
e5e459bf 4255 check_bases (t, &cant_have_const_ctor,
607cf131
MM
4256 &no_const_asn_ref);
4257
9f4faeae
MM
4258 /* Check all the method declarations. */
4259 check_methods (t);
4260
b87d79e6
JM
4261 /* Save the initial values of these flags which only indicate whether
4262 or not the class has user-provided functions. As we analyze the
4263 bases and members we can set these flags for other reasons. */
4264 saved_complex_asn_ref = TYPE_HAS_COMPLEX_ASSIGN_REF (t);
4265 saved_nontrivial_dtor = TYPE_HAS_NONTRIVIAL_DESTRUCTOR (t);
4266
9f4faeae
MM
4267 /* Check all the data member declarations. We cannot call
4268 check_field_decls until we have called check_bases check_methods,
4269 as check_field_decls depends on TYPE_HAS_NONTRIVIAL_DESTRUCTOR
4270 being set appropriately. */
58731fd1 4271 check_field_decls (t, &access_decls,
607cf131
MM
4272 &cant_have_const_ctor,
4273 &no_const_asn_ref);
4274
bbd15aac
MM
4275 /* A nearly-empty class has to be vptr-containing; a nearly empty
4276 class contains just a vptr. */
4277 if (!TYPE_CONTAINS_VPTR_P (t))
f9c528ea
MM
4278 CLASSTYPE_NEARLY_EMPTY_P (t) = 0;
4279
607cf131
MM
4280 /* Do some bookkeeping that will guide the generation of implicitly
4281 declared member functions. */
b87d79e6 4282 TYPE_HAS_COMPLEX_INIT_REF (t) |= TYPE_CONTAINS_VPTR_P (t);
0fcedd9c 4283 /* We need to call a constructor for this class if it has a
b87d79e6 4284 user-provided constructor, or if the default constructor is going
0fcedd9c
JM
4285 to initialize the vptr. (This is not an if-and-only-if;
4286 TYPE_NEEDS_CONSTRUCTING is set elsewhere if bases or members
4287 themselves need constructing.) */
607cf131 4288 TYPE_NEEDS_CONSTRUCTING (t)
b87d79e6 4289 |= (type_has_user_provided_constructor (t) || TYPE_CONTAINS_VPTR_P (t));
0fcedd9c
JM
4290 /* [dcl.init.aggr]
4291
b87d79e6 4292 An aggregate is an array or a class with no user-provided
0fcedd9c
JM
4293 constructors ... and no virtual functions.
4294
4295 Again, other conditions for being an aggregate are checked
4296 elsewhere. */
5775a06a 4297 CLASSTYPE_NON_AGGREGATE (t)
b87d79e6 4298 |= (type_has_user_provided_constructor (t) || TYPE_POLYMORPHIC_P (t));
607cf131 4299 CLASSTYPE_NON_POD_P (t)
c8094d83 4300 |= (CLASSTYPE_NON_AGGREGATE (t)
b87d79e6
JM
4301 || saved_nontrivial_dtor || saved_complex_asn_ref);
4302 TYPE_HAS_COMPLEX_ASSIGN_REF (t) |= TYPE_CONTAINS_VPTR_P (t);
cb68ec50
PC
4303 TYPE_HAS_COMPLEX_DFLT (t)
4304 |= (TYPE_HAS_DEFAULT_CONSTRUCTOR (t) || TYPE_CONTAINS_VPTR_P (t));
607cf131 4305
0fcedd9c
JM
4306 /* If the class has no user-declared constructor, but does have
4307 non-static const or reference data members that can never be
4308 initialized, issue a warning. */
4309 if (extra_warnings
4310 /* Classes with user-declared constructors are presumed to
4311 initialize these members. */
4312 && !TYPE_HAS_USER_CONSTRUCTOR (t)
4313 /* Aggregates can be initialized with brace-enclosed
4314 initializers. */
4315 && CLASSTYPE_NON_AGGREGATE (t))
4316 {
4317 tree field;
4318
4319 for (field = TYPE_FIELDS (t); field; field = TREE_CHAIN (field))
4320 {
4321 tree type;
4322
4323 if (TREE_CODE (field) != FIELD_DECL)
4324 continue;
4325
4326 type = TREE_TYPE (field);
4327 if (TREE_CODE (type) == REFERENCE_TYPE)
4328 warning (OPT_Wextra, "non-static reference %q+#D in class "
4329 "without a constructor", field);
4330 else if (CP_TYPE_CONST_P (type)
4331 && (!CLASS_TYPE_P (type)
4332 || !TYPE_HAS_DEFAULT_CONSTRUCTOR (type)))
4333 warning (OPT_Wextra, "non-static const member %q+#D in class "
4334 "without a constructor", field);
4335 }
4336 }
4337
03fd3f84 4338 /* Synthesize any needed methods. */
e5e459bf 4339 add_implicitly_declared_members (t,
607cf131
MM
4340 cant_have_const_ctor,
4341 no_const_asn_ref);
4342
db9b2174
MM
4343 /* Create the in-charge and not-in-charge variants of constructors
4344 and destructors. */
4345 clone_constructors_and_destructors (t);
4346
aa52c1ff
JM
4347 /* Process the using-declarations. */
4348 for (; access_decls; access_decls = TREE_CHAIN (access_decls))
4349 handle_using_decl (TREE_VALUE (access_decls), t);
4350
607cf131
MM
4351 /* Build and sort the CLASSTYPE_METHOD_VEC. */
4352 finish_struct_methods (t);
dbc957f1
MM
4353
4354 /* Figure out whether or not we will need a cookie when dynamically
4355 allocating an array of this type. */
e2500fed 4356 TYPE_LANG_SPECIFIC (t)->u.c.vec_new_uses_cookie
dbc957f1 4357 = type_requires_array_cookie (t);
607cf131
MM
4358}
4359
3ef397c1 4360/* If T needs a pointer to its virtual function table, set TYPE_VFIELD
5c24fba6
MM
4361 accordingly. If a new vfield was created (because T doesn't have a
4362 primary base class), then the newly created field is returned. It
c35cce41 4363 is not added to the TYPE_FIELDS list; it is the caller's
e6858a84
NS
4364 responsibility to do that. Accumulate declared virtual functions
4365 on VIRTUALS_P. */
3ef397c1 4366
5c24fba6 4367static tree
94edc4ab 4368create_vtable_ptr (tree t, tree* virtuals_p)
3ef397c1
MM
4369{
4370 tree fn;
4371
e6858a84 4372 /* Collect the virtual functions declared in T. */
3ef397c1 4373 for (fn = TYPE_METHODS (t); fn; fn = TREE_CHAIN (fn))
e6858a84
NS
4374 if (DECL_VINDEX (fn) && !DECL_MAYBE_IN_CHARGE_DESTRUCTOR_P (fn)
4375 && TREE_CODE (DECL_VINDEX (fn)) != INTEGER_CST)
4376 {
4377 tree new_virtual = make_node (TREE_LIST);
c8094d83 4378
e6858a84
NS
4379 BV_FN (new_virtual) = fn;
4380 BV_DELTA (new_virtual) = integer_zero_node;
d1f05f93 4381 BV_VCALL_INDEX (new_virtual) = NULL_TREE;
3ef397c1 4382
e6858a84
NS
4383 TREE_CHAIN (new_virtual) = *virtuals_p;
4384 *virtuals_p = new_virtual;
4385 }
c8094d83 4386
da3d4dfa
MM
4387 /* If we couldn't find an appropriate base class, create a new field
4388 here. Even if there weren't any new virtual functions, we might need a
bbd15aac
MM
4389 new virtual function table if we're supposed to include vptrs in
4390 all classes that need them. */
e6858a84 4391 if (!TYPE_VFIELD (t) && (*virtuals_p || TYPE_CONTAINS_VPTR_P (t)))
3ef397c1
MM
4392 {
4393 /* We build this decl with vtbl_ptr_type_node, which is a
4394 `vtable_entry_type*'. It might seem more precise to use
a692ad2e 4395 `vtable_entry_type (*)[N]' where N is the number of virtual
3ef397c1
MM
4396 functions. However, that would require the vtable pointer in
4397 base classes to have a different type than the vtable pointer
4398 in derived classes. We could make that happen, but that
4399 still wouldn't solve all the problems. In particular, the
4400 type-based alias analysis code would decide that assignments
4401 to the base class vtable pointer can't alias assignments to
4402 the derived class vtable pointer, since they have different
4639c5c6 4403 types. Thus, in a derived class destructor, where the base
3ef397c1 4404 class constructor was inlined, we could generate bad code for
c8094d83 4405 setting up the vtable pointer.
3ef397c1 4406
0cbd7506 4407 Therefore, we use one type for all vtable pointers. We still
3ef397c1
MM
4408 use a type-correct type; it's just doesn't indicate the array
4409 bounds. That's better than using `void*' or some such; it's
4410 cleaner, and it let's the alias analysis code know that these
4411 stores cannot alias stores to void*! */
0abe00c5
NS
4412 tree field;
4413
4414 field = build_decl (FIELD_DECL, get_vfield_name (t), vtbl_ptr_type_node);
0abe00c5
NS
4415 DECL_VIRTUAL_P (field) = 1;
4416 DECL_ARTIFICIAL (field) = 1;
4417 DECL_FIELD_CONTEXT (field) = t;
4418 DECL_FCONTEXT (field) = t;
c8094d83 4419
0abe00c5 4420 TYPE_VFIELD (t) = field;
c8094d83 4421
0abe00c5 4422 /* This class is non-empty. */
58731fd1 4423 CLASSTYPE_EMPTY_P (t) = 0;
3ef397c1 4424
0abe00c5 4425 return field;
3ef397c1 4426 }
5c24fba6
MM
4427
4428 return NULL_TREE;
3ef397c1
MM
4429}
4430
2ef16140
MM
4431/* Fixup the inline function given by INFO now that the class is
4432 complete. */
08b962b0 4433
2ef16140 4434static void
94edc4ab 4435fixup_pending_inline (tree fn)
2ef16140 4436{
0e5921e8 4437 if (DECL_PENDING_INLINE_INFO (fn))
2ef16140 4438 {
0e5921e8 4439 tree args = DECL_ARGUMENTS (fn);
2ef16140
MM
4440 while (args)
4441 {
4442 DECL_CONTEXT (args) = fn;
4443 args = TREE_CHAIN (args);
4444 }
4445 }
4446}
08b962b0 4447
2ef16140
MM
4448/* Fixup the inline methods and friends in TYPE now that TYPE is
4449 complete. */
08b962b0 4450
2ef16140 4451static void
94edc4ab 4452fixup_inline_methods (tree type)
08b962b0 4453{
2ef16140 4454 tree method = TYPE_METHODS (type);
d4e6fecb 4455 VEC(tree,gc) *friends;
585b44d3 4456 unsigned ix;
08b962b0 4457
2ef16140 4458 if (method && TREE_CODE (method) == TREE_VEC)
08b962b0 4459 {
2ef16140
MM
4460 if (TREE_VEC_ELT (method, 1))
4461 method = TREE_VEC_ELT (method, 1);
4462 else if (TREE_VEC_ELT (method, 0))
4463 method = TREE_VEC_ELT (method, 0);
08b962b0 4464 else
2ef16140 4465 method = TREE_VEC_ELT (method, 2);
08b962b0
MM
4466 }
4467
2ef16140
MM
4468 /* Do inline member functions. */
4469 for (; method; method = TREE_CHAIN (method))
0e5921e8 4470 fixup_pending_inline (method);
08b962b0 4471
2ef16140 4472 /* Do friends. */
585b44d3
NS
4473 for (friends = CLASSTYPE_INLINE_FRIENDS (type), ix = 0;
4474 VEC_iterate (tree, friends, ix, method); ix++)
4475 fixup_pending_inline (method);
4476 CLASSTYPE_INLINE_FRIENDS (type) = NULL;
2ef16140 4477}
08b962b0 4478
9d4c0187
MM
4479/* Add OFFSET to all base types of BINFO which is a base in the
4480 hierarchy dominated by T.
80fd5f48 4481
911a71a7 4482 OFFSET, which is a type offset, is number of bytes. */
80fd5f48
MM
4483
4484static void
dbbf88d1 4485propagate_binfo_offsets (tree binfo, tree offset)
80fd5f48 4486{
911a71a7
MM
4487 int i;
4488 tree primary_binfo;
fa743e8c 4489 tree base_binfo;
80fd5f48 4490
911a71a7
MM
4491 /* Update BINFO's offset. */
4492 BINFO_OFFSET (binfo)
c8094d83 4493 = convert (sizetype,
911a71a7
MM
4494 size_binop (PLUS_EXPR,
4495 convert (ssizetype, BINFO_OFFSET (binfo)),
4496 offset));
80fd5f48 4497
911a71a7
MM
4498 /* Find the primary base class. */
4499 primary_binfo = get_primary_binfo (binfo);
4500
fc6633e0 4501 if (primary_binfo && BINFO_INHERITANCE_CHAIN (primary_binfo) == binfo)
090ad434 4502 propagate_binfo_offsets (primary_binfo, offset);
c8094d83 4503
911a71a7
MM
4504 /* Scan all of the bases, pushing the BINFO_OFFSET adjust
4505 downwards. */
fa743e8c 4506 for (i = 0; BINFO_BASE_ITERATE (binfo, i, base_binfo); ++i)
80fd5f48 4507 {
090ad434
NS
4508 /* Don't do the primary base twice. */
4509 if (base_binfo == primary_binfo)
4510 continue;
911a71a7 4511
090ad434 4512 if (BINFO_VIRTUAL_P (base_binfo))
911a71a7
MM
4513 continue;
4514
dbbf88d1 4515 propagate_binfo_offsets (base_binfo, offset);
911a71a7 4516 }
9d4c0187
MM
4517}
4518
17bbb839 4519/* Set BINFO_OFFSET for all of the virtual bases for RLI->T. Update
c20118a8
MM
4520 TYPE_ALIGN and TYPE_SIZE for T. OFFSETS gives the location of
4521 empty subobjects of T. */
80fd5f48 4522
d2c5305b 4523static void
17bbb839 4524layout_virtual_bases (record_layout_info rli, splay_tree offsets)
80fd5f48 4525{
dbbf88d1 4526 tree vbase;
17bbb839 4527 tree t = rli->t;
eca7f13c 4528 bool first_vbase = true;
17bbb839 4529 tree *next_field;
9785e4b1 4530
604a3205 4531 if (BINFO_N_BASE_BINFOS (TYPE_BINFO (t)) == 0)
9785e4b1
MM
4532 return;
4533
17bbb839
MM
4534 if (!abi_version_at_least(2))
4535 {
4536 /* In G++ 3.2, we incorrectly rounded the size before laying out
4537 the virtual bases. */
4538 finish_record_layout (rli, /*free_p=*/false);
9785e4b1 4539#ifdef STRUCTURE_SIZE_BOUNDARY
17bbb839
MM
4540 /* Packed structures don't need to have minimum size. */
4541 if (! TYPE_PACKED (t))
fc555370 4542 TYPE_ALIGN (t) = MAX (TYPE_ALIGN (t), (unsigned) STRUCTURE_SIZE_BOUNDARY);
9785e4b1 4543#endif
17bbb839
MM
4544 rli->offset = TYPE_SIZE_UNIT (t);
4545 rli->bitpos = bitsize_zero_node;
4546 rli->record_align = TYPE_ALIGN (t);
4547 }
80fd5f48 4548
17bbb839
MM
4549 /* Find the last field. The artificial fields created for virtual
4550 bases will go after the last extant field to date. */
4551 next_field = &TYPE_FIELDS (t);
4552 while (*next_field)
4553 next_field = &TREE_CHAIN (*next_field);
80fd5f48 4554
9d4c0187 4555 /* Go through the virtual bases, allocating space for each virtual
3461fba7
NS
4556 base that is not already a primary base class. These are
4557 allocated in inheritance graph order. */
dbbf88d1 4558 for (vbase = TYPE_BINFO (t); vbase; vbase = TREE_CHAIN (vbase))
c35cce41 4559 {
809e3e7f 4560 if (!BINFO_VIRTUAL_P (vbase))
1f84ec23 4561 continue;
eca7f13c 4562
9965d119 4563 if (!BINFO_PRIMARY_P (vbase))
c35cce41 4564 {
17bbb839
MM
4565 tree basetype = TREE_TYPE (vbase);
4566
c35cce41
MM
4567 /* This virtual base is not a primary base of any class in the
4568 hierarchy, so we have to add space for it. */
58731fd1 4569 next_field = build_base_field (rli, vbase,
17bbb839 4570 offsets, next_field);
9785e4b1 4571
eca7f13c
MM
4572 /* If the first virtual base might have been placed at a
4573 lower address, had we started from CLASSTYPE_SIZE, rather
4574 than TYPE_SIZE, issue a warning. There can be both false
4575 positives and false negatives from this warning in rare
4576 cases; to deal with all the possibilities would probably
4577 require performing both layout algorithms and comparing
4578 the results which is not particularly tractable. */
4579 if (warn_abi
4580 && first_vbase
c8094d83 4581 && (tree_int_cst_lt
17bbb839
MM
4582 (size_binop (CEIL_DIV_EXPR,
4583 round_up (CLASSTYPE_SIZE (t),
4584 CLASSTYPE_ALIGN (basetype)),
4585 bitsize_unit_node),
4586 BINFO_OFFSET (vbase))))
74fa0285 4587 warning (OPT_Wabi,
3db45ab5 4588 "offset of virtual base %qT is not ABI-compliant and "
0cbd7506 4589 "may change in a future version of GCC",
eca7f13c
MM
4590 basetype);
4591
eca7f13c 4592 first_vbase = false;
c35cce41
MM
4593 }
4594 }
80fd5f48
MM
4595}
4596
ba9a991f
MM
4597/* Returns the offset of the byte just past the end of the base class
4598 BINFO. */
4599
4600static tree
4601end_of_base (tree binfo)
4602{
4603 tree size;
4604
1ad8aeeb
DG
4605 if (!CLASSTYPE_AS_BASE (BINFO_TYPE (binfo)))
4606 size = TYPE_SIZE_UNIT (char_type_node);
4607 else if (is_empty_class (BINFO_TYPE (binfo)))
ba9a991f
MM
4608 /* An empty class has zero CLASSTYPE_SIZE_UNIT, but we need to
4609 allocate some space for it. It cannot have virtual bases, so
4610 TYPE_SIZE_UNIT is fine. */
4611 size = TYPE_SIZE_UNIT (BINFO_TYPE (binfo));
4612 else
4613 size = CLASSTYPE_SIZE_UNIT (BINFO_TYPE (binfo));
4614
4615 return size_binop (PLUS_EXPR, BINFO_OFFSET (binfo), size);
4616}
4617
9785e4b1
MM
4618/* Returns the offset of the byte just past the end of the base class
4619 with the highest offset in T. If INCLUDE_VIRTUALS_P is zero, then
4620 only non-virtual bases are included. */
80fd5f48 4621
17bbb839 4622static tree
94edc4ab 4623end_of_class (tree t, int include_virtuals_p)
80fd5f48 4624{
17bbb839 4625 tree result = size_zero_node;
d4e6fecb 4626 VEC(tree,gc) *vbases;
ba9a991f 4627 tree binfo;
9ba5ff0f 4628 tree base_binfo;
ba9a991f 4629 tree offset;
9785e4b1 4630 int i;
80fd5f48 4631
fa743e8c
NS
4632 for (binfo = TYPE_BINFO (t), i = 0;
4633 BINFO_BASE_ITERATE (binfo, i, base_binfo); ++i)
9785e4b1 4634 {
9785e4b1 4635 if (!include_virtuals_p
fc6633e0
NS
4636 && BINFO_VIRTUAL_P (base_binfo)
4637 && (!BINFO_PRIMARY_P (base_binfo)
4638 || BINFO_INHERITANCE_CHAIN (base_binfo) != TYPE_BINFO (t)))
9785e4b1 4639 continue;
80fd5f48 4640
fa743e8c 4641 offset = end_of_base (base_binfo);
17bbb839
MM
4642 if (INT_CST_LT_UNSIGNED (result, offset))
4643 result = offset;
9785e4b1 4644 }
80fd5f48 4645
ba9a991f
MM
4646 /* G++ 3.2 did not check indirect virtual bases. */
4647 if (abi_version_at_least (2) && include_virtuals_p)
9ba5ff0f
NS
4648 for (vbases = CLASSTYPE_VBASECLASSES (t), i = 0;
4649 VEC_iterate (tree, vbases, i, base_binfo); i++)
ba9a991f 4650 {
9ba5ff0f 4651 offset = end_of_base (base_binfo);
ba9a991f
MM
4652 if (INT_CST_LT_UNSIGNED (result, offset))
4653 result = offset;
4654 }
4655
9785e4b1 4656 return result;
80fd5f48
MM
4657}
4658
17bbb839 4659/* Warn about bases of T that are inaccessible because they are
78b45a24
MM
4660 ambiguous. For example:
4661
4662 struct S {};
4663 struct T : public S {};
4664 struct U : public S, public T {};
4665
4666 Here, `(S*) new U' is not allowed because there are two `S'
4667 subobjects of U. */
4668
4669static void
94edc4ab 4670warn_about_ambiguous_bases (tree t)
78b45a24
MM
4671{
4672 int i;
d4e6fecb 4673 VEC(tree,gc) *vbases;
17bbb839 4674 tree basetype;
58c42dc2 4675 tree binfo;
fa743e8c 4676 tree base_binfo;
78b45a24 4677
18e4be85
NS
4678 /* If there are no repeated bases, nothing can be ambiguous. */
4679 if (!CLASSTYPE_REPEATED_BASE_P (t))
4680 return;
c8094d83 4681
17bbb839 4682 /* Check direct bases. */
fa743e8c
NS
4683 for (binfo = TYPE_BINFO (t), i = 0;
4684 BINFO_BASE_ITERATE (binfo, i, base_binfo); ++i)
78b45a24 4685 {
fa743e8c 4686 basetype = BINFO_TYPE (base_binfo);
78b45a24 4687
18e4be85 4688 if (!lookup_base (t, basetype, ba_unique | ba_quiet, NULL))
d4ee4d25 4689 warning (0, "direct base %qT inaccessible in %qT due to ambiguity",
17bbb839 4690 basetype, t);
78b45a24 4691 }
17bbb839
MM
4692
4693 /* Check for ambiguous virtual bases. */
4694 if (extra_warnings)
9ba5ff0f
NS
4695 for (vbases = CLASSTYPE_VBASECLASSES (t), i = 0;
4696 VEC_iterate (tree, vbases, i, binfo); i++)
17bbb839 4697 {
58c42dc2 4698 basetype = BINFO_TYPE (binfo);
c8094d83 4699
18e4be85 4700 if (!lookup_base (t, basetype, ba_unique | ba_quiet, NULL))
b323323f 4701 warning (OPT_Wextra, "virtual base %qT inaccessible in %qT due to ambiguity",
17bbb839
MM
4702 basetype, t);
4703 }
78b45a24
MM
4704}
4705
c20118a8
MM
4706/* Compare two INTEGER_CSTs K1 and K2. */
4707
4708static int
94edc4ab 4709splay_tree_compare_integer_csts (splay_tree_key k1, splay_tree_key k2)
c20118a8
MM
4710{
4711 return tree_int_cst_compare ((tree) k1, (tree) k2);
4712}
4713
17bbb839
MM
4714/* Increase the size indicated in RLI to account for empty classes
4715 that are "off the end" of the class. */
4716
4717static void
4718include_empty_classes (record_layout_info rli)
4719{
4720 tree eoc;
e3ccdd50 4721 tree rli_size;
17bbb839
MM
4722
4723 /* It might be the case that we grew the class to allocate a
4724 zero-sized base class. That won't be reflected in RLI, yet,
4725 because we are willing to overlay multiple bases at the same
4726 offset. However, now we need to make sure that RLI is big enough
4727 to reflect the entire class. */
c8094d83 4728 eoc = end_of_class (rli->t,
17bbb839 4729 CLASSTYPE_AS_BASE (rli->t) != NULL_TREE);
e3ccdd50
MM
4730 rli_size = rli_size_unit_so_far (rli);
4731 if (TREE_CODE (rli_size) == INTEGER_CST
4732 && INT_CST_LT_UNSIGNED (rli_size, eoc))
17bbb839 4733 {
43fe31f6
MM
4734 if (!abi_version_at_least (2))
4735 /* In version 1 of the ABI, the size of a class that ends with
4736 a bitfield was not rounded up to a whole multiple of a
4737 byte. Because rli_size_unit_so_far returns only the number
4738 of fully allocated bytes, any extra bits were not included
4739 in the size. */
4740 rli->bitpos = round_down (rli->bitpos, BITS_PER_UNIT);
4741 else
4742 /* The size should have been rounded to a whole byte. */
50bc768d
NS
4743 gcc_assert (tree_int_cst_equal
4744 (rli->bitpos, round_down (rli->bitpos, BITS_PER_UNIT)));
c8094d83
MS
4745 rli->bitpos
4746 = size_binop (PLUS_EXPR,
e3ccdd50
MM
4747 rli->bitpos,
4748 size_binop (MULT_EXPR,
4749 convert (bitsizetype,
4750 size_binop (MINUS_EXPR,
4751 eoc, rli_size)),
4752 bitsize_int (BITS_PER_UNIT)));
4753 normalize_rli (rli);
17bbb839
MM
4754 }
4755}
4756
2ef16140
MM
4757/* Calculate the TYPE_SIZE, TYPE_ALIGN, etc for T. Calculate
4758 BINFO_OFFSETs for all of the base-classes. Position the vtable
00a17e31 4759 pointer. Accumulate declared virtual functions on VIRTUALS_P. */
607cf131 4760
2ef16140 4761static void
e93ee644 4762layout_class_type (tree t, tree *virtuals_p)
2ef16140 4763{
5c24fba6
MM
4764 tree non_static_data_members;
4765 tree field;
4766 tree vptr;
4767 record_layout_info rli;
c20118a8
MM
4768 /* Maps offsets (represented as INTEGER_CSTs) to a TREE_LIST of
4769 types that appear at that offset. */
4770 splay_tree empty_base_offsets;
eca7f13c
MM
4771 /* True if the last field layed out was a bit-field. */
4772 bool last_field_was_bitfield = false;
17bbb839
MM
4773 /* The location at which the next field should be inserted. */
4774 tree *next_field;
4775 /* T, as a base class. */
4776 tree base_t;
5c24fba6
MM
4777
4778 /* Keep track of the first non-static data member. */
4779 non_static_data_members = TYPE_FIELDS (t);
4780
770ae6cc
RK
4781 /* Start laying out the record. */
4782 rli = start_record_layout (t);
534170eb 4783
fc6633e0
NS
4784 /* Mark all the primary bases in the hierarchy. */
4785 determine_primary_bases (t);
8026246f 4786
5c24fba6 4787 /* Create a pointer to our virtual function table. */
58731fd1 4788 vptr = create_vtable_ptr (t, virtuals_p);
5c24fba6 4789
3461fba7 4790 /* The vptr is always the first thing in the class. */
1f84ec23 4791 if (vptr)
5c24fba6 4792 {
17bbb839
MM
4793 TREE_CHAIN (vptr) = TYPE_FIELDS (t);
4794 TYPE_FIELDS (t) = vptr;
4795 next_field = &TREE_CHAIN (vptr);
770ae6cc 4796 place_field (rli, vptr);
5c24fba6 4797 }
17bbb839
MM
4798 else
4799 next_field = &TYPE_FIELDS (t);
5c24fba6 4800
72a50ab0 4801 /* Build FIELD_DECLs for all of the non-virtual base-types. */
c8094d83 4802 empty_base_offsets = splay_tree_new (splay_tree_compare_integer_csts,
c20118a8 4803 NULL, NULL);
58731fd1 4804 build_base_fields (rli, empty_base_offsets, next_field);
c8094d83 4805
5c24fba6 4806 /* Layout the non-static data members. */
770ae6cc 4807 for (field = non_static_data_members; field; field = TREE_CHAIN (field))
5c24fba6 4808 {
01955e96
MM
4809 tree type;
4810 tree padding;
5c24fba6
MM
4811
4812 /* We still pass things that aren't non-static data members to
3b426391 4813 the back end, in case it wants to do something with them. */
5c24fba6
MM
4814 if (TREE_CODE (field) != FIELD_DECL)
4815 {
770ae6cc 4816 place_field (rli, field);
0154eaa8 4817 /* If the static data member has incomplete type, keep track
c8094d83 4818 of it so that it can be completed later. (The handling
0154eaa8
MM
4819 of pending statics in finish_record_layout is
4820 insufficient; consider:
4821
4822 struct S1;
4823 struct S2 { static S1 s1; };
c8094d83 4824
0cbd7506 4825 At this point, finish_record_layout will be called, but
0154eaa8
MM
4826 S1 is still incomplete.) */
4827 if (TREE_CODE (field) == VAR_DECL)
532b37d9
MM
4828 {
4829 maybe_register_incomplete_var (field);
4830 /* The visibility of static data members is determined
4831 at their point of declaration, not their point of
4832 definition. */
4833 determine_visibility (field);
4834 }
5c24fba6
MM
4835 continue;
4836 }
4837
01955e96 4838 type = TREE_TYPE (field);
4e3bd7d5
VR
4839 if (type == error_mark_node)
4840 continue;
c8094d83 4841
1e099144 4842 padding = NULL_TREE;
01955e96
MM
4843
4844 /* If this field is a bit-field whose width is greater than its
3461fba7
NS
4845 type, then there are some special rules for allocating
4846 it. */
01955e96 4847 if (DECL_C_BIT_FIELD (field)
1f84ec23 4848 && INT_CST_LT (TYPE_SIZE (type), DECL_SIZE (field)))
01955e96
MM
4849 {
4850 integer_type_kind itk;
4851 tree integer_type;
555456b1 4852 bool was_unnamed_p = false;
01955e96
MM
4853 /* We must allocate the bits as if suitably aligned for the
4854 longest integer type that fits in this many bits. type
4855 of the field. Then, we are supposed to use the left over
4856 bits as additional padding. */
4857 for (itk = itk_char; itk != itk_none; ++itk)
c8094d83 4858 if (INT_CST_LT (DECL_SIZE (field),
01955e96
MM
4859 TYPE_SIZE (integer_types[itk])))
4860 break;
4861
4862 /* ITK now indicates a type that is too large for the
4863 field. We have to back up by one to find the largest
4864 type that fits. */
4865 integer_type = integer_types[itk - 1];
2d3e278d 4866
1e099144
MM
4867 /* Figure out how much additional padding is required. GCC
4868 3.2 always created a padding field, even if it had zero
4869 width. */
4870 if (!abi_version_at_least (2)
4871 || INT_CST_LT (TYPE_SIZE (integer_type), DECL_SIZE (field)))
2d3e278d 4872 {
1e099144
MM
4873 if (abi_version_at_least (2) && TREE_CODE (t) == UNION_TYPE)
4874 /* In a union, the padding field must have the full width
4875 of the bit-field; all fields start at offset zero. */
4876 padding = DECL_SIZE (field);
4877 else
4878 {
74fa0285
GDR
4879 if (TREE_CODE (t) == UNION_TYPE)
4880 warning (OPT_Wabi, "size assigned to %qT may not be "
1e099144 4881 "ABI-compliant and may change in a future "
c8094d83 4882 "version of GCC",
1e099144
MM
4883 t);
4884 padding = size_binop (MINUS_EXPR, DECL_SIZE (field),
4885 TYPE_SIZE (integer_type));
4886 }
2d3e278d 4887 }
c9372112 4888#ifdef PCC_BITFIELD_TYPE_MATTERS
63e5f567
MM
4889 /* An unnamed bitfield does not normally affect the
4890 alignment of the containing class on a target where
4891 PCC_BITFIELD_TYPE_MATTERS. But, the C++ ABI does not
4892 make any exceptions for unnamed bitfields when the
4893 bitfields are longer than their types. Therefore, we
4894 temporarily give the field a name. */
4895 if (PCC_BITFIELD_TYPE_MATTERS && !DECL_NAME (field))
4896 {
4897 was_unnamed_p = true;
4898 DECL_NAME (field) = make_anon_name ();
4899 }
c9372112 4900#endif
01955e96
MM
4901 DECL_SIZE (field) = TYPE_SIZE (integer_type);
4902 DECL_ALIGN (field) = TYPE_ALIGN (integer_type);
11cf4d18 4903 DECL_USER_ALIGN (field) = TYPE_USER_ALIGN (integer_type);
555456b1
MM
4904 layout_nonempty_base_or_field (rli, field, NULL_TREE,
4905 empty_base_offsets);
4906 if (was_unnamed_p)
4907 DECL_NAME (field) = NULL_TREE;
4908 /* Now that layout has been performed, set the size of the
4909 field to the size of its declared type; the rest of the
4910 field is effectively invisible. */
4911 DECL_SIZE (field) = TYPE_SIZE (type);
29edb15c
MM
4912 /* We must also reset the DECL_MODE of the field. */
4913 if (abi_version_at_least (2))
4914 DECL_MODE (field) = TYPE_MODE (type);
4915 else if (warn_abi
4916 && DECL_MODE (field) != TYPE_MODE (type))
4917 /* Versions of G++ before G++ 3.4 did not reset the
4918 DECL_MODE. */
74fa0285 4919 warning (OPT_Wabi,
3db45ab5 4920 "the offset of %qD may not be ABI-compliant and may "
29edb15c 4921 "change in a future version of GCC", field);
01955e96 4922 }
555456b1
MM
4923 else
4924 layout_nonempty_base_or_field (rli, field, NULL_TREE,
4925 empty_base_offsets);
01955e96 4926
2003cd37
MM
4927 /* Remember the location of any empty classes in FIELD. */
4928 if (abi_version_at_least (2))
c8094d83 4929 record_subobject_offsets (TREE_TYPE (field),
2003cd37
MM
4930 byte_position(field),
4931 empty_base_offsets,
c5a35c3c 4932 /*is_data_member=*/true);
2003cd37 4933
eca7f13c
MM
4934 /* If a bit-field does not immediately follow another bit-field,
4935 and yet it starts in the middle of a byte, we have failed to
4936 comply with the ABI. */
4937 if (warn_abi
c8094d83 4938 && DECL_C_BIT_FIELD (field)
660845bf
ZL
4939 /* The TREE_NO_WARNING flag gets set by Objective-C when
4940 laying out an Objective-C class. The ObjC ABI differs
4941 from the C++ ABI, and so we do not want a warning
4942 here. */
4943 && !TREE_NO_WARNING (field)
eca7f13c
MM
4944 && !last_field_was_bitfield
4945 && !integer_zerop (size_binop (TRUNC_MOD_EXPR,
4946 DECL_FIELD_BIT_OFFSET (field),
4947 bitsize_unit_node)))
74fa0285 4948 warning (OPT_Wabi, "offset of %q+D is not ABI-compliant and may "
dee15844 4949 "change in a future version of GCC", field);
eca7f13c 4950
956d9305
MM
4951 /* G++ used to use DECL_FIELD_OFFSET as if it were the byte
4952 offset of the field. */
c8094d83 4953 if (warn_abi
956d9305
MM
4954 && !tree_int_cst_equal (DECL_FIELD_OFFSET (field),
4955 byte_position (field))
4956 && contains_empty_class_p (TREE_TYPE (field)))
74fa0285 4957 warning (OPT_Wabi, "%q+D contains empty classes which may cause base "
dee15844
JM
4958 "classes to be placed at different locations in a "
4959 "future version of GCC", field);
956d9305 4960
38a4afee
MM
4961 /* The middle end uses the type of expressions to determine the
4962 possible range of expression values. In order to optimize
4963 "x.i > 7" to "false" for a 2-bit bitfield "i", the middle end
3db45ab5 4964 must be made aware of the width of "i", via its type.
38a4afee 4965
3db45ab5 4966 Because C++ does not have integer types of arbitrary width,
38a4afee
MM
4967 we must (for the purposes of the front end) convert from the
4968 type assigned here to the declared type of the bitfield
4969 whenever a bitfield expression is used as an rvalue.
4970 Similarly, when assigning a value to a bitfield, the value
4971 must be converted to the type given the bitfield here. */
4972 if (DECL_C_BIT_FIELD (field))
4973 {
38a4afee 4974 unsigned HOST_WIDE_INT width;
24030e4c 4975 tree ftype = TREE_TYPE (field);
38a4afee
MM
4976 width = tree_low_cst (DECL_SIZE (field), /*unsignedp=*/1);
4977 if (width != TYPE_PRECISION (ftype))
24030e4c
JJ
4978 {
4979 TREE_TYPE (field)
4980 = c_build_bitfield_integer_type (width,
4981 TYPE_UNSIGNED (ftype));
4982 TREE_TYPE (field)
4983 = cp_build_qualified_type (TREE_TYPE (field),
4984 TYPE_QUALS (ftype));
4985 }
38a4afee
MM
4986 }
4987
01955e96
MM
4988 /* If we needed additional padding after this field, add it
4989 now. */
4990 if (padding)
4991 {
4992 tree padding_field;
4993
c8094d83 4994 padding_field = build_decl (FIELD_DECL,
01955e96 4995 NULL_TREE,
c8094d83 4996 char_type_node);
01955e96
MM
4997 DECL_BIT_FIELD (padding_field) = 1;
4998 DECL_SIZE (padding_field) = padding;
1e099144 4999 DECL_CONTEXT (padding_field) = t;
ea258926 5000 DECL_ARTIFICIAL (padding_field) = 1;
78e0d62b 5001 DECL_IGNORED_P (padding_field) = 1;
c20118a8 5002 layout_nonempty_base_or_field (rli, padding_field,
c8094d83 5003 NULL_TREE,
17bbb839 5004 empty_base_offsets);
01955e96 5005 }
eca7f13c
MM
5006
5007 last_field_was_bitfield = DECL_C_BIT_FIELD (field);
5c24fba6
MM
5008 }
5009
17bbb839 5010 if (abi_version_at_least (2) && !integer_zerop (rli->bitpos))
e3ccdd50
MM
5011 {
5012 /* Make sure that we are on a byte boundary so that the size of
5013 the class without virtual bases will always be a round number
5014 of bytes. */
5015 rli->bitpos = round_up (rli->bitpos, BITS_PER_UNIT);
5016 normalize_rli (rli);
5017 }
17bbb839 5018
8a874cb4
MM
5019 /* G++ 3.2 does not allow virtual bases to be overlaid with tail
5020 padding. */
5021 if (!abi_version_at_least (2))
5022 include_empty_classes(rli);
58010b57 5023
3ef397c1
MM
5024 /* Delete all zero-width bit-fields from the list of fields. Now
5025 that the type is laid out they are no longer important. */
5026 remove_zero_width_bit_fields (t);
5027
17bbb839 5028 /* Create the version of T used for virtual bases. We do not use
9e1e64ec 5029 make_class_type for this version; this is an artificial type. For
17bbb839 5030 a POD type, we just reuse T. */
58731fd1 5031 if (CLASSTYPE_NON_POD_P (t) || CLASSTYPE_EMPTY_P (t))
06ceef4e 5032 {
17bbb839 5033 base_t = make_node (TREE_CODE (t));
c8094d83 5034
58731fd1
MM
5035 /* Set the size and alignment for the new type. In G++ 3.2, all
5036 empty classes were considered to have size zero when used as
5037 base classes. */
5038 if (!abi_version_at_least (2) && CLASSTYPE_EMPTY_P (t))
5039 {
5040 TYPE_SIZE (base_t) = bitsize_zero_node;
5041 TYPE_SIZE_UNIT (base_t) = size_zero_node;
5042 if (warn_abi && !integer_zerop (rli_size_unit_so_far (rli)))
74fa0285 5043 warning (OPT_Wabi,
3db45ab5 5044 "layout of classes derived from empty class %qT "
58731fd1
MM
5045 "may change in a future version of GCC",
5046 t);
5047 }
5048 else
5049 {
6b99d1c0
MM
5050 tree eoc;
5051
5052 /* If the ABI version is not at least two, and the last
5053 field was a bit-field, RLI may not be on a byte
5054 boundary. In particular, rli_size_unit_so_far might
5055 indicate the last complete byte, while rli_size_so_far
5056 indicates the total number of bits used. Therefore,
5057 rli_size_so_far, rather than rli_size_unit_so_far, is
5058 used to compute TYPE_SIZE_UNIT. */
5059 eoc = end_of_class (t, /*include_virtuals_p=*/0);
c8094d83 5060 TYPE_SIZE_UNIT (base_t)
8a874cb4 5061 = size_binop (MAX_EXPR,
6b99d1c0
MM
5062 convert (sizetype,
5063 size_binop (CEIL_DIV_EXPR,
5064 rli_size_so_far (rli),
5065 bitsize_int (BITS_PER_UNIT))),
5066 eoc);
c8094d83 5067 TYPE_SIZE (base_t)
8a874cb4
MM
5068 = size_binop (MAX_EXPR,
5069 rli_size_so_far (rli),
5070 size_binop (MULT_EXPR,
6b99d1c0 5071 convert (bitsizetype, eoc),
8a874cb4 5072 bitsize_int (BITS_PER_UNIT)));
58731fd1 5073 }
17bbb839
MM
5074 TYPE_ALIGN (base_t) = rli->record_align;
5075 TYPE_USER_ALIGN (base_t) = TYPE_USER_ALIGN (t);
5076
5077 /* Copy the fields from T. */
5078 next_field = &TYPE_FIELDS (base_t);
5079 for (field = TYPE_FIELDS (t); field; field = TREE_CHAIN (field))
5080 if (TREE_CODE (field) == FIELD_DECL)
5081 {
5082 *next_field = build_decl (FIELD_DECL,
c8094d83 5083 DECL_NAME (field),
17bbb839
MM
5084 TREE_TYPE (field));
5085 DECL_CONTEXT (*next_field) = base_t;
5086 DECL_FIELD_OFFSET (*next_field) = DECL_FIELD_OFFSET (field);
5087 DECL_FIELD_BIT_OFFSET (*next_field)
5088 = DECL_FIELD_BIT_OFFSET (field);
4f0a2b81
MM
5089 DECL_SIZE (*next_field) = DECL_SIZE (field);
5090 DECL_MODE (*next_field) = DECL_MODE (field);
17bbb839
MM
5091 next_field = &TREE_CHAIN (*next_field);
5092 }
5093
5094 /* Record the base version of the type. */
5095 CLASSTYPE_AS_BASE (t) = base_t;
5a5cccaa 5096 TYPE_CONTEXT (base_t) = t;
83b14b88 5097 }
1f84ec23 5098 else
17bbb839 5099 CLASSTYPE_AS_BASE (t) = t;
0b41abe6 5100
5ec1192e
MM
5101 /* Every empty class contains an empty class. */
5102 if (CLASSTYPE_EMPTY_P (t))
5103 CLASSTYPE_CONTAINS_EMPTY_CLASS_P (t) = 1;
5104
8d08fdba
MS
5105 /* Set the TYPE_DECL for this type to contain the right
5106 value for DECL_OFFSET, so that we can use it as part
5107 of a COMPONENT_REF for multiple inheritance. */
d2e5ee5c 5108 layout_decl (TYPE_MAIN_DECL (t), 0);
8d08fdba 5109
7177d104
MS
5110 /* Now fix up any virtual base class types that we left lying
5111 around. We must get these done before we try to lay out the
5c24fba6
MM
5112 virtual function table. As a side-effect, this will remove the
5113 base subobject fields. */
17bbb839
MM
5114 layout_virtual_bases (rli, empty_base_offsets);
5115
c8094d83 5116 /* Make sure that empty classes are reflected in RLI at this
17bbb839
MM
5117 point. */
5118 include_empty_classes(rli);
5119
5120 /* Make sure not to create any structures with zero size. */
58731fd1 5121 if (integer_zerop (rli_size_unit_so_far (rli)) && CLASSTYPE_EMPTY_P (t))
c8094d83 5122 place_field (rli,
17bbb839
MM
5123 build_decl (FIELD_DECL, NULL_TREE, char_type_node));
5124
3b426391 5125 /* Let the back end lay out the type. */
17bbb839 5126 finish_record_layout (rli, /*free_p=*/true);
9785e4b1 5127
17bbb839
MM
5128 /* Warn about bases that can't be talked about due to ambiguity. */
5129 warn_about_ambiguous_bases (t);
78b45a24 5130
00bfffa4
JM
5131 /* Now that we're done with layout, give the base fields the real types. */
5132 for (field = TYPE_FIELDS (t); field; field = TREE_CHAIN (field))
5133 if (DECL_ARTIFICIAL (field) && IS_FAKE_BASE_TYPE (TREE_TYPE (field)))
5134 TREE_TYPE (field) = TYPE_CONTEXT (TREE_TYPE (field));
5135
9785e4b1 5136 /* Clean up. */
c20118a8 5137 splay_tree_delete (empty_base_offsets);
c5a35c3c
MM
5138
5139 if (CLASSTYPE_EMPTY_P (t)
3db45ab5 5140 && tree_int_cst_lt (sizeof_biggest_empty_class,
c0572427
MM
5141 TYPE_SIZE_UNIT (t)))
5142 sizeof_biggest_empty_class = TYPE_SIZE_UNIT (t);
2ef16140 5143}
c35cce41 5144
af287697
MM
5145/* Determine the "key method" for the class type indicated by TYPE,
5146 and set CLASSTYPE_KEY_METHOD accordingly. */
9aad8f83 5147
af287697
MM
5148void
5149determine_key_method (tree type)
9aad8f83
MA
5150{
5151 tree method;
5152
5153 if (TYPE_FOR_JAVA (type)
5154 || processing_template_decl
5155 || CLASSTYPE_TEMPLATE_INSTANTIATION (type)
5156 || CLASSTYPE_INTERFACE_KNOWN (type))
af287697 5157 return;
9aad8f83 5158
af287697
MM
5159 /* The key method is the first non-pure virtual function that is not
5160 inline at the point of class definition. On some targets the
5161 key function may not be inline; those targets should not call
5162 this function until the end of the translation unit. */
9aad8f83
MA
5163 for (method = TYPE_METHODS (type); method != NULL_TREE;
5164 method = TREE_CHAIN (method))
5165 if (DECL_VINDEX (method) != NULL_TREE
5166 && ! DECL_DECLARED_INLINE_P (method)
5167 && ! DECL_PURE_VIRTUAL_P (method))
af287697
MM
5168 {
5169 CLASSTYPE_KEY_METHOD (type) = method;
5170 break;
5171 }
9aad8f83 5172
af287697 5173 return;
9aad8f83
MA
5174}
5175
548502d3
MM
5176/* Perform processing required when the definition of T (a class type)
5177 is complete. */
2ef16140
MM
5178
5179void
94edc4ab 5180finish_struct_1 (tree t)
2ef16140
MM
5181{
5182 tree x;
00a17e31 5183 /* A TREE_LIST. The TREE_VALUE of each node is a FUNCTION_DECL. */
e6858a84 5184 tree virtuals = NULL_TREE;
2ef16140 5185 int n_fields = 0;
2ef16140 5186
d0f062fb 5187 if (COMPLETE_TYPE_P (t))
2ef16140 5188 {
9e1e64ec 5189 gcc_assert (MAYBE_CLASS_TYPE_P (t));
1f070f2b 5190 error ("redefinition of %q#T", t);
2ef16140
MM
5191 popclass ();
5192 return;
5193 }
5194
2ef16140
MM
5195 /* If this type was previously laid out as a forward reference,
5196 make sure we lay it out again. */
2ef16140 5197 TYPE_SIZE (t) = NULL_TREE;
911a71a7 5198 CLASSTYPE_PRIMARY_BINFO (t) = NULL_TREE;
2ef16140 5199
6d0a3f67 5200 fixup_inline_methods (t);
c8094d83 5201
5ec1192e
MM
5202 /* Make assumptions about the class; we'll reset the flags if
5203 necessary. */
58731fd1
MM
5204 CLASSTYPE_EMPTY_P (t) = 1;
5205 CLASSTYPE_NEARLY_EMPTY_P (t) = 1;
5ec1192e 5206 CLASSTYPE_CONTAINS_EMPTY_CLASS_P (t) = 0;
58731fd1 5207
2ef16140 5208 /* Do end-of-class semantic processing: checking the validity of the
03702748 5209 bases and members and add implicitly generated methods. */
58731fd1 5210 check_bases_and_members (t);
2ef16140 5211
f4f206f4 5212 /* Find the key method. */
a63996f1 5213 if (TYPE_CONTAINS_VPTR_P (t))
9aad8f83 5214 {
af287697
MM
5215 /* The Itanium C++ ABI permits the key method to be chosen when
5216 the class is defined -- even though the key method so
5217 selected may later turn out to be an inline function. On
5218 some systems (such as ARM Symbian OS) the key method cannot
5219 be determined until the end of the translation unit. On such
5220 systems, we leave CLASSTYPE_KEY_METHOD set to NULL, which
5221 will cause the class to be added to KEYED_CLASSES. Then, in
5222 finish_file we will determine the key method. */
5223 if (targetm.cxx.key_method_may_be_inline ())
5224 determine_key_method (t);
9aad8f83
MA
5225
5226 /* If a polymorphic class has no key method, we may emit the vtable
9bcb9aae 5227 in every translation unit where the class definition appears. */
9aad8f83
MA
5228 if (CLASSTYPE_KEY_METHOD (t) == NULL_TREE)
5229 keyed_classes = tree_cons (NULL_TREE, t, keyed_classes);
5230 }
5231
2ef16140 5232 /* Layout the class itself. */
e93ee644 5233 layout_class_type (t, &virtuals);
a0c68737
NS
5234 if (CLASSTYPE_AS_BASE (t) != t)
5235 /* We use the base type for trivial assignments, and hence it
5236 needs a mode. */
5237 compute_record_mode (CLASSTYPE_AS_BASE (t));
8ebeee52 5238
e93ee644 5239 virtuals = modify_all_vtables (t, nreverse (virtuals));
db5ae43f 5240
5e19c053 5241 /* If necessary, create the primary vtable for this class. */
e6858a84 5242 if (virtuals || TYPE_CONTAINS_VPTR_P (t))
8d08fdba 5243 {
8d08fdba 5244 /* We must enter these virtuals into the table. */
3ef397c1 5245 if (!CLASSTYPE_HAS_PRIMARY_BASE_P (t))
da3d4dfa 5246 build_primary_vtable (NULL_TREE, t);
dbbf88d1 5247 else if (! BINFO_NEW_VTABLE_MARKED (TYPE_BINFO (t)))
0533d788
MM
5248 /* Here we know enough to change the type of our virtual
5249 function table, but we will wait until later this function. */
28531dd0 5250 build_primary_vtable (CLASSTYPE_PRIMARY_BINFO (t), t);
8d08fdba
MS
5251 }
5252
bbd15aac 5253 if (TYPE_CONTAINS_VPTR_P (t))
8d08fdba 5254 {
e93ee644
MM
5255 int vindex;
5256 tree fn;
5257
604a3205 5258 if (BINFO_VTABLE (TYPE_BINFO (t)))
50bc768d 5259 gcc_assert (DECL_VIRTUAL_P (BINFO_VTABLE (TYPE_BINFO (t))));
1eb4bea9 5260 if (!CLASSTYPE_HAS_PRIMARY_BASE_P (t))
50bc768d 5261 gcc_assert (BINFO_VIRTUALS (TYPE_BINFO (t)) == NULL_TREE);
1eb4bea9 5262
e6858a84 5263 /* Add entries for virtual functions introduced by this class. */
604a3205
NS
5264 BINFO_VIRTUALS (TYPE_BINFO (t))
5265 = chainon (BINFO_VIRTUALS (TYPE_BINFO (t)), virtuals);
e93ee644
MM
5266
5267 /* Set DECL_VINDEX for all functions declared in this class. */
c8094d83
MS
5268 for (vindex = 0, fn = BINFO_VIRTUALS (TYPE_BINFO (t));
5269 fn;
5270 fn = TREE_CHAIN (fn),
e93ee644
MM
5271 vindex += (TARGET_VTABLE_USES_DESCRIPTORS
5272 ? TARGET_VTABLE_USES_DESCRIPTORS : 1))
4977bab6
ZW
5273 {
5274 tree fndecl = BV_FN (fn);
5275
5276 if (DECL_THUNK_P (fndecl))
5277 /* A thunk. We should never be calling this entry directly
5278 from this vtable -- we'd use the entry for the non
5279 thunk base function. */
5280 DECL_VINDEX (fndecl) = NULL_TREE;
5281 else if (TREE_CODE (DECL_VINDEX (fndecl)) != INTEGER_CST)
7d60be94 5282 DECL_VINDEX (fndecl) = build_int_cst (NULL_TREE, vindex);
4977bab6 5283 }
8d08fdba
MS
5284 }
5285
d2c5305b 5286 finish_struct_bits (t);
8d08fdba 5287
f30432d7
MS
5288 /* Complete the rtl for any static member objects of the type we're
5289 working on. */
58010b57 5290 for (x = TYPE_FIELDS (t); x; x = TREE_CHAIN (x))
19e7881c 5291 if (TREE_CODE (x) == VAR_DECL && TREE_STATIC (x)
650fcd07 5292 && TREE_TYPE (x) != error_mark_node
c7f4981a 5293 && same_type_p (TYPE_MAIN_VARIANT (TREE_TYPE (x)), t))
19e7881c 5294 DECL_MODE (x) = TYPE_MODE (t);
8d08fdba 5295
f90cdf34 5296 /* Done with FIELDS...now decide whether to sort these for
58010b57 5297 faster lookups later.
f90cdf34 5298
6c73ad72 5299 We use a small number because most searches fail (succeeding
f90cdf34
MT
5300 ultimately as the search bores through the inheritance
5301 hierarchy), and we want this failure to occur quickly. */
5302
58010b57
MM
5303 n_fields = count_fields (TYPE_FIELDS (t));
5304 if (n_fields > 7)
f90cdf34 5305 {
99dd239f 5306 struct sorted_fields_type *field_vec = GGC_NEWVAR
0cbd7506
MS
5307 (struct sorted_fields_type,
5308 sizeof (struct sorted_fields_type) + n_fields * sizeof (tree));
d07605f5
AP
5309 field_vec->len = n_fields;
5310 add_fields_to_record_type (TYPE_FIELDS (t), field_vec, 0);
5311 qsort (field_vec->elts, n_fields, sizeof (tree),
17211ab5 5312 field_decl_cmp);
f90cdf34
MT
5313 if (! DECL_LANG_SPECIFIC (TYPE_MAIN_DECL (t)))
5314 retrofit_lang_decl (TYPE_MAIN_DECL (t));
5315 DECL_SORTED_FIELDS (TYPE_MAIN_DECL (t)) = field_vec;
5316 }
5317
b9e75696
JM
5318 /* Complain if one of the field types requires lower visibility. */
5319 constrain_class_visibility (t);
5320
8d7a5379
MM
5321 /* Make the rtl for any new vtables we have created, and unmark
5322 the base types we marked. */
5323 finish_vtbls (t);
c8094d83 5324
23656158
MM
5325 /* Build the VTT for T. */
5326 build_vtt (t);
8d7a5379 5327
f03e8526
MM
5328 /* This warning does not make sense for Java classes, since they
5329 cannot have destructors. */
5330 if (!TYPE_FOR_JAVA (t) && warn_nonvdtor && TYPE_POLYMORPHIC_P (t))
9fd8f60d 5331 {
9f4faeae
MM
5332 tree dtor;
5333
5334 dtor = CLASSTYPE_DESTRUCTORS (t);
9f4faeae
MM
5335 if (/* An implicitly declared destructor is always public. And,
5336 if it were virtual, we would have created it by now. */
5337 !dtor
5338 || (!DECL_VINDEX (dtor)
43f14744
PS
5339 && (/* public non-virtual */
5340 (!TREE_PRIVATE (dtor) && !TREE_PROTECTED (dtor))
5341 || (/* non-public non-virtual with friends */
5342 (TREE_PRIVATE (dtor) || TREE_PROTECTED (dtor))
5343 && (CLASSTYPE_FRIEND_CLASSES (t)
5344 || DECL_FRIENDLIST (TYPE_MAIN_DECL (t)))))))
5345 warning (OPT_Wnon_virtual_dtor,
5346 "%q#T has virtual functions and accessible"
5347 " non-virtual destructor", t);
9fd8f60d 5348 }
8d08fdba 5349
0154eaa8 5350 complete_vars (t);
8d08fdba 5351
9e9ff709
MS
5352 if (warn_overloaded_virtual)
5353 warn_hidden (t);
8d08fdba 5354
43d9ad1d
DS
5355 /* Class layout, assignment of virtual table slots, etc., is now
5356 complete. Give the back end a chance to tweak the visibility of
5357 the class or perform any other required target modifications. */
5358 targetm.cxx.adjust_class_at_definition (t);
5359
ae673f14 5360 maybe_suppress_debug_info (t);
8d08fdba 5361
b7442fb5 5362 dump_class_hierarchy (t);
c8094d83 5363
d2e5ee5c 5364 /* Finish debugging output for this type. */
881c6935 5365 rest_of_type_compilation (t, ! LOCAL_CLASS_P (t));
8d08fdba 5366}
f30432d7 5367
61a127b3
MM
5368/* When T was built up, the member declarations were added in reverse
5369 order. Rearrange them to declaration order. */
5370
5371void
94edc4ab 5372unreverse_member_declarations (tree t)
61a127b3
MM
5373{
5374 tree next;
5375 tree prev;
5376 tree x;
5377
7088fca9
KL
5378 /* The following lists are all in reverse order. Put them in
5379 declaration order now. */
61a127b3 5380 TYPE_METHODS (t) = nreverse (TYPE_METHODS (t));
7088fca9 5381 CLASSTYPE_DECL_LIST (t) = nreverse (CLASSTYPE_DECL_LIST (t));
61a127b3
MM
5382
5383 /* Actually, for the TYPE_FIELDS, only the non TYPE_DECLs are in
5384 reverse order, so we can't just use nreverse. */
5385 prev = NULL_TREE;
c8094d83
MS
5386 for (x = TYPE_FIELDS (t);
5387 x && TREE_CODE (x) != TYPE_DECL;
61a127b3
MM
5388 x = next)
5389 {
5390 next = TREE_CHAIN (x);
5391 TREE_CHAIN (x) = prev;
5392 prev = x;
5393 }
5394 if (prev)
5395 {
5396 TREE_CHAIN (TYPE_FIELDS (t)) = x;
5397 if (prev)
5398 TYPE_FIELDS (t) = prev;
5399 }
5400}
5401
f30432d7 5402tree
94edc4ab 5403finish_struct (tree t, tree attributes)
f30432d7 5404{
82a98427 5405 location_t saved_loc = input_location;
1f0d71c5 5406
61a127b3
MM
5407 /* Now that we've got all the field declarations, reverse everything
5408 as necessary. */
5409 unreverse_member_declarations (t);
f30432d7 5410
91d231cb 5411 cplus_decl_attributes (&t, attributes, (int) ATTR_FLAG_TYPE_IN_PLACE);
6467930b 5412
1f0d71c5
NS
5413 /* Nadger the current location so that diagnostics point to the start of
5414 the struct, not the end. */
f31686a3 5415 input_location = DECL_SOURCE_LOCATION (TYPE_NAME (t));
1f0d71c5 5416
5566b478 5417 if (processing_template_decl)
f30432d7 5418 {
7fb213d8
GB
5419 tree x;
5420
b0e0b31f 5421 finish_struct_methods (t);
867580ce 5422 TYPE_SIZE (t) = bitsize_zero_node;
ae54ec16 5423 TYPE_SIZE_UNIT (t) = size_zero_node;
7fb213d8
GB
5424
5425 /* We need to emit an error message if this type was used as a parameter
5426 and it is an abstract type, even if it is a template. We construct
5427 a simple CLASSTYPE_PURE_VIRTUALS list without taking bases into
5428 account and we call complete_vars with this type, which will check
5429 the PARM_DECLS. Note that while the type is being defined,
5430 CLASSTYPE_PURE_VIRTUALS contains the list of the inline friends
5431 (see CLASSTYPE_INLINE_FRIENDS) so we need to clear it. */
585b44d3 5432 CLASSTYPE_PURE_VIRTUALS (t) = NULL;
7fb213d8
GB
5433 for (x = TYPE_METHODS (t); x; x = TREE_CHAIN (x))
5434 if (DECL_PURE_VIRTUAL_P (x))
d4e6fecb 5435 VEC_safe_push (tree, gc, CLASSTYPE_PURE_VIRTUALS (t), x);
7fb213d8 5436 complete_vars (t);
6f1b4c42 5437 }
f30432d7 5438 else
9f33663b 5439 finish_struct_1 (t);
5566b478 5440
82a98427 5441 input_location = saved_loc;
1f0d71c5 5442
5566b478 5443 TYPE_BEING_DEFINED (t) = 0;
8f032717 5444
5566b478 5445 if (current_class_type)
b74a0560 5446 popclass ();
5566b478 5447 else
357351e5 5448 error ("trying to finish struct, but kicked out due to previous parse errors");
5566b478 5449
5f261ba9
MM
5450 if (processing_template_decl && at_function_scope_p ())
5451 add_stmt (build_min (TAG_DEFN, t));
ae673f14 5452
5566b478 5453 return t;
f30432d7 5454}
8d08fdba 5455\f
51ddb82e 5456/* Return the dynamic type of INSTANCE, if known.
8d08fdba
MS
5457 Used to determine whether the virtual function table is needed
5458 or not.
5459
5460 *NONNULL is set iff INSTANCE can be known to be nonnull, regardless
97d953bb
MM
5461 of our knowledge of its type. *NONNULL should be initialized
5462 before this function is called. */
e92cc029 5463
d8e178a0 5464static tree
555551c2 5465fixed_type_or_null (tree instance, int *nonnull, int *cdtorp)
8d08fdba 5466{
555551c2
MM
5467#define RECUR(T) fixed_type_or_null((T), nonnull, cdtorp)
5468
8d08fdba
MS
5469 switch (TREE_CODE (instance))
5470 {
5471 case INDIRECT_REF:
608afcc5 5472 if (POINTER_TYPE_P (TREE_TYPE (instance)))
a0de9d20
JM
5473 return NULL_TREE;
5474 else
555551c2 5475 return RECUR (TREE_OPERAND (instance, 0));
a0de9d20 5476
8d08fdba
MS
5477 case CALL_EXPR:
5478 /* This is a call to a constructor, hence it's never zero. */
5479 if (TREE_HAS_CONSTRUCTOR (instance))
5480 {
5481 if (nonnull)
5482 *nonnull = 1;
51ddb82e 5483 return TREE_TYPE (instance);
8d08fdba 5484 }
51ddb82e 5485 return NULL_TREE;
8d08fdba
MS
5486
5487 case SAVE_EXPR:
5488 /* This is a call to a constructor, hence it's never zero. */
5489 if (TREE_HAS_CONSTRUCTOR (instance))
5490 {
5491 if (nonnull)
5492 *nonnull = 1;
51ddb82e 5493 return TREE_TYPE (instance);
8d08fdba 5494 }
555551c2 5495 return RECUR (TREE_OPERAND (instance, 0));
8d08fdba 5496
5be014d5 5497 case POINTER_PLUS_EXPR:
8d08fdba
MS
5498 case PLUS_EXPR:
5499 case MINUS_EXPR:
394fd776 5500 if (TREE_CODE (TREE_OPERAND (instance, 0)) == ADDR_EXPR)
555551c2 5501 return RECUR (TREE_OPERAND (instance, 0));
8d08fdba
MS
5502 if (TREE_CODE (TREE_OPERAND (instance, 1)) == INTEGER_CST)
5503 /* Propagate nonnull. */
555551c2
MM
5504 return RECUR (TREE_OPERAND (instance, 0));
5505
51ddb82e 5506 return NULL_TREE;
8d08fdba 5507
63a906f0 5508 CASE_CONVERT:
555551c2 5509 return RECUR (TREE_OPERAND (instance, 0));
8d08fdba
MS
5510
5511 case ADDR_EXPR:
88f19756 5512 instance = TREE_OPERAND (instance, 0);
8d08fdba 5513 if (nonnull)
88f19756
RH
5514 {
5515 /* Just because we see an ADDR_EXPR doesn't mean we're dealing
5516 with a real object -- given &p->f, p can still be null. */
5517 tree t = get_base_address (instance);
5518 /* ??? Probably should check DECL_WEAK here. */
5519 if (t && DECL_P (t))
5520 *nonnull = 1;
5521 }
555551c2 5522 return RECUR (instance);
8d08fdba
MS
5523
5524 case COMPONENT_REF:
642124c6
RH
5525 /* If this component is really a base class reference, then the field
5526 itself isn't definitive. */
5527 if (DECL_FIELD_IS_BASE (TREE_OPERAND (instance, 1)))
555551c2
MM
5528 return RECUR (TREE_OPERAND (instance, 0));
5529 return RECUR (TREE_OPERAND (instance, 1));
8d08fdba 5530
8d08fdba
MS
5531 case VAR_DECL:
5532 case FIELD_DECL:
5533 if (TREE_CODE (TREE_TYPE (instance)) == ARRAY_TYPE
9e1e64ec 5534 && MAYBE_CLASS_TYPE_P (TREE_TYPE (TREE_TYPE (instance))))
8d08fdba
MS
5535 {
5536 if (nonnull)
5537 *nonnull = 1;
51ddb82e 5538 return TREE_TYPE (TREE_TYPE (instance));
8d08fdba 5539 }
e92cc029 5540 /* fall through... */
8d08fdba
MS
5541 case TARGET_EXPR:
5542 case PARM_DECL:
f63ab951 5543 case RESULT_DECL:
9e1e64ec 5544 if (MAYBE_CLASS_TYPE_P (TREE_TYPE (instance)))
8d08fdba
MS
5545 {
5546 if (nonnull)
5547 *nonnull = 1;
51ddb82e 5548 return TREE_TYPE (instance);
8d08fdba 5549 }
394fd776 5550 else if (instance == current_class_ptr)
0cbd7506
MS
5551 {
5552 if (nonnull)
5553 *nonnull = 1;
5554
5555 /* if we're in a ctor or dtor, we know our type. */
5556 if (DECL_LANG_SPECIFIC (current_function_decl)
5557 && (DECL_CONSTRUCTOR_P (current_function_decl)
5558 || DECL_DESTRUCTOR_P (current_function_decl)))
5559 {
5560 if (cdtorp)
5561 *cdtorp = 1;
5562 return TREE_TYPE (TREE_TYPE (instance));
5563 }
5564 }
394fd776 5565 else if (TREE_CODE (TREE_TYPE (instance)) == REFERENCE_TYPE)
0cbd7506 5566 {
555551c2
MM
5567 /* We only need one hash table because it is always left empty. */
5568 static htab_t ht;
5569 if (!ht)
5570 ht = htab_create (37,
5571 htab_hash_pointer,
5572 htab_eq_pointer,
5573 /*htab_del=*/NULL);
5574
0cbd7506
MS
5575 /* Reference variables should be references to objects. */
5576 if (nonnull)
8d08fdba 5577 *nonnull = 1;
c8094d83 5578
555551c2 5579 /* Enter the INSTANCE in a table to prevent recursion; a
772f8889
MM
5580 variable's initializer may refer to the variable
5581 itself. */
c8094d83 5582 if (TREE_CODE (instance) == VAR_DECL
772f8889 5583 && DECL_INITIAL (instance)
555551c2 5584 && !htab_find (ht, instance))
772f8889
MM
5585 {
5586 tree type;
555551c2
MM
5587 void **slot;
5588
5589 slot = htab_find_slot (ht, instance, INSERT);
5590 *slot = instance;
5591 type = RECUR (DECL_INITIAL (instance));
e656a465 5592 htab_remove_elt (ht, instance);
555551c2 5593
772f8889
MM
5594 return type;
5595 }
8d08fdba 5596 }
51ddb82e 5597 return NULL_TREE;
8d08fdba
MS
5598
5599 default:
51ddb82e 5600 return NULL_TREE;
8d08fdba 5601 }
555551c2 5602#undef RECUR
8d08fdba 5603}
51ddb82e 5604
838dfd8a 5605/* Return nonzero if the dynamic type of INSTANCE is known, and
338d90b8
NS
5606 equivalent to the static type. We also handle the case where
5607 INSTANCE is really a pointer. Return negative if this is a
5608 ctor/dtor. There the dynamic type is known, but this might not be
5609 the most derived base of the original object, and hence virtual
5610 bases may not be layed out according to this type.
51ddb82e
JM
5611
5612 Used to determine whether the virtual function table is needed
5613 or not.
5614
5615 *NONNULL is set iff INSTANCE can be known to be nonnull, regardless
97d953bb
MM
5616 of our knowledge of its type. *NONNULL should be initialized
5617 before this function is called. */
51ddb82e
JM
5618
5619int
94edc4ab 5620resolves_to_fixed_type_p (tree instance, int* nonnull)
51ddb82e
JM
5621{
5622 tree t = TREE_TYPE (instance);
394fd776 5623 int cdtorp = 0;
394fd776 5624 tree fixed = fixed_type_or_null (instance, nonnull, &cdtorp);
51ddb82e
JM
5625 if (fixed == NULL_TREE)
5626 return 0;
5627 if (POINTER_TYPE_P (t))
5628 t = TREE_TYPE (t);
394fd776
NS
5629 if (!same_type_ignoring_top_level_qualifiers_p (t, fixed))
5630 return 0;
5631 return cdtorp ? -1 : 1;
51ddb82e
JM
5632}
5633
8d08fdba
MS
5634\f
5635void
94edc4ab 5636init_class_processing (void)
8d08fdba
MS
5637{
5638 current_class_depth = 0;
61a127b3 5639 current_class_stack_size = 10;
c8094d83 5640 current_class_stack
0ac1b889 5641 = XNEWVEC (struct class_stack_node, current_class_stack_size);
806aa901 5642 local_classes = VEC_alloc (tree, gc, 8);
c5a35c3c 5643 sizeof_biggest_empty_class = size_zero_node;
8d08fdba 5644
0e5921e8
ZW
5645 ridpointers[(int) RID_PUBLIC] = access_public_node;
5646 ridpointers[(int) RID_PRIVATE] = access_private_node;
5647 ridpointers[(int) RID_PROTECTED] = access_protected_node;
8d08fdba
MS
5648}
5649
39fb05d0
MM
5650/* Restore the cached PREVIOUS_CLASS_LEVEL. */
5651
5652static void
5653restore_class_cache (void)
5654{
39fb05d0 5655 tree type;
39fb05d0
MM
5656
5657 /* We are re-entering the same class we just left, so we don't
5658 have to search the whole inheritance matrix to find all the
5659 decls to bind again. Instead, we install the cached
5660 class_shadowed list and walk through it binding names. */
5661 push_binding_level (previous_class_level);
5662 class_binding_level = previous_class_level;
39fb05d0 5663 /* Restore IDENTIFIER_TYPE_VALUE. */
c8094d83
MS
5664 for (type = class_binding_level->type_shadowed;
5665 type;
39fb05d0
MM
5666 type = TREE_CHAIN (type))
5667 SET_IDENTIFIER_TYPE_VALUE (TREE_PURPOSE (type), TREE_TYPE (type));
5668}
5669
a723baf1
MM
5670/* Set global variables CURRENT_CLASS_NAME and CURRENT_CLASS_TYPE as
5671 appropriate for TYPE.
8d08fdba 5672
8d08fdba
MS
5673 So that we may avoid calls to lookup_name, we cache the _TYPE
5674 nodes of local TYPE_DECLs in the TREE_TYPE field of the name.
5675
5676 For multiple inheritance, we perform a two-pass depth-first search
39fb05d0 5677 of the type lattice. */
8d08fdba
MS
5678
5679void
29370796 5680pushclass (tree type)
8d08fdba 5681{
c888c93b
MM
5682 class_stack_node_t csn;
5683
7fb4a8f7 5684 type = TYPE_MAIN_VARIANT (type);
8d08fdba 5685
61a127b3 5686 /* Make sure there is enough room for the new entry on the stack. */
c8094d83 5687 if (current_class_depth + 1 >= current_class_stack_size)
8d08fdba 5688 {
61a127b3
MM
5689 current_class_stack_size *= 2;
5690 current_class_stack
7767580e 5691 = XRESIZEVEC (struct class_stack_node, current_class_stack,
3db45ab5 5692 current_class_stack_size);
8d08fdba
MS
5693 }
5694
61a127b3 5695 /* Insert a new entry on the class stack. */
c888c93b
MM
5696 csn = current_class_stack + current_class_depth;
5697 csn->name = current_class_name;
5698 csn->type = current_class_type;
5699 csn->access = current_access_specifier;
5700 csn->names_used = 0;
5701 csn->hidden = 0;
61a127b3
MM
5702 current_class_depth++;
5703
5704 /* Now set up the new type. */
8d08fdba
MS
5705 current_class_name = TYPE_NAME (type);
5706 if (TREE_CODE (current_class_name) == TYPE_DECL)
5707 current_class_name = DECL_NAME (current_class_name);
5708 current_class_type = type;
5709
61a127b3
MM
5710 /* By default, things in classes are private, while things in
5711 structures or unions are public. */
c8094d83
MS
5712 current_access_specifier = (CLASSTYPE_DECLARED_CLASS (type)
5713 ? access_private_node
61a127b3
MM
5714 : access_public_node);
5715
89b578be
MM
5716 if (previous_class_level
5717 && type != previous_class_level->this_entity
8d08fdba
MS
5718 && current_class_depth == 1)
5719 {
5720 /* Forcibly remove any old class remnants. */
8f032717 5721 invalidate_class_lookup_cache ();
8d08fdba
MS
5722 }
5723
c8094d83 5724 if (!previous_class_level
89b578be
MM
5725 || type != previous_class_level->this_entity
5726 || current_class_depth > 1)
90ea9897 5727 pushlevel_class ();
29370796 5728 else
39fb05d0 5729 restore_class_cache ();
8f032717
MM
5730}
5731
39fb05d0
MM
5732/* When we exit a toplevel class scope, we save its binding level so
5733 that we can restore it quickly. Here, we've entered some other
5734 class, so we must invalidate our cache. */
8d08fdba 5735
8f032717 5736void
94edc4ab 5737invalidate_class_lookup_cache (void)
8f032717 5738{
89b578be 5739 previous_class_level = NULL;
8d08fdba 5740}
c8094d83 5741
8d08fdba 5742/* Get out of the current class scope. If we were in a class scope
b74a0560 5743 previously, that is the one popped to. */
e92cc029 5744
8d08fdba 5745void
94edc4ab 5746popclass (void)
8d08fdba 5747{
273a708f 5748 poplevel_class ();
8d08fdba
MS
5749
5750 current_class_depth--;
61a127b3
MM
5751 current_class_name = current_class_stack[current_class_depth].name;
5752 current_class_type = current_class_stack[current_class_depth].type;
5753 current_access_specifier = current_class_stack[current_class_depth].access;
8f032717
MM
5754 if (current_class_stack[current_class_depth].names_used)
5755 splay_tree_delete (current_class_stack[current_class_depth].names_used);
8d08fdba
MS
5756}
5757
c888c93b
MM
5758/* Mark the top of the class stack as hidden. */
5759
5760void
5761push_class_stack (void)
5762{
5763 if (current_class_depth)
5764 ++current_class_stack[current_class_depth - 1].hidden;
5765}
5766
5767/* Mark the top of the class stack as un-hidden. */
5768
5769void
5770pop_class_stack (void)
5771{
5772 if (current_class_depth)
5773 --current_class_stack[current_class_depth - 1].hidden;
5774}
5775
fa6098f8
MM
5776/* Returns 1 if the class type currently being defined is either T or
5777 a nested type of T. */
b9082e8a 5778
fa6098f8 5779bool
94edc4ab 5780currently_open_class (tree t)
b9082e8a
JM
5781{
5782 int i;
fa6098f8
MM
5783
5784 /* We start looking from 1 because entry 0 is from global scope,
5785 and has no type. */
5786 for (i = current_class_depth; i > 0; --i)
c888c93b 5787 {
fa6098f8
MM
5788 tree c;
5789 if (i == current_class_depth)
5790 c = current_class_type;
5791 else
5792 {
5793 if (current_class_stack[i].hidden)
5794 break;
5795 c = current_class_stack[i].type;
5796 }
5797 if (!c)
5798 continue;
5799 if (same_type_p (c, t))
5800 return true;
c888c93b 5801 }
fa6098f8 5802 return false;
b9082e8a
JM
5803}
5804
70adf8a9
JM
5805/* If either current_class_type or one of its enclosing classes are derived
5806 from T, return the appropriate type. Used to determine how we found
5807 something via unqualified lookup. */
5808
5809tree
94edc4ab 5810currently_open_derived_class (tree t)
70adf8a9
JM
5811{
5812 int i;
5813
9bcb9aae 5814 /* The bases of a dependent type are unknown. */
1fb3244a
MM
5815 if (dependent_type_p (t))
5816 return NULL_TREE;
5817
c44e68a5
KL
5818 if (!current_class_type)
5819 return NULL_TREE;
5820
70adf8a9
JM
5821 if (DERIVED_FROM_P (t, current_class_type))
5822 return current_class_type;
5823
5824 for (i = current_class_depth - 1; i > 0; --i)
c888c93b
MM
5825 {
5826 if (current_class_stack[i].hidden)
5827 break;
5828 if (DERIVED_FROM_P (t, current_class_stack[i].type))
5829 return current_class_stack[i].type;
5830 }
70adf8a9
JM
5831
5832 return NULL_TREE;
5833}
5834
8d08fdba 5835/* When entering a class scope, all enclosing class scopes' names with
14d22dd6
MM
5836 static meaning (static variables, static functions, types and
5837 enumerators) have to be visible. This recursive function calls
5838 pushclass for all enclosing class contexts until global or a local
5839 scope is reached. TYPE is the enclosed class. */
8d08fdba
MS
5840
5841void
14d22dd6 5842push_nested_class (tree type)
8d08fdba 5843{
b262d64c 5844 /* A namespace might be passed in error cases, like A::B:C. */
c8094d83 5845 if (type == NULL_TREE
56d0c6e3 5846 || !CLASS_TYPE_P (type))
a28e3c7f 5847 return;
c8094d83 5848
56d0c6e3 5849 push_nested_class (DECL_CONTEXT (TYPE_MAIN_DECL (type)));
8d08fdba 5850
29370796 5851 pushclass (type);
8d08fdba
MS
5852}
5853
a723baf1 5854/* Undoes a push_nested_class call. */
8d08fdba
MS
5855
5856void
94edc4ab 5857pop_nested_class (void)
8d08fdba 5858{
d2e5ee5c 5859 tree context = DECL_CONTEXT (TYPE_MAIN_DECL (current_class_type));
8d08fdba 5860
b74a0560 5861 popclass ();
6b400b21 5862 if (context && CLASS_TYPE_P (context))
b74a0560 5863 pop_nested_class ();
8d08fdba
MS
5864}
5865
46ccf50a
JM
5866/* Returns the number of extern "LANG" blocks we are nested within. */
5867
5868int
94edc4ab 5869current_lang_depth (void)
46ccf50a 5870{
aff44741 5871 return VEC_length (tree, current_lang_base);
46ccf50a
JM
5872}
5873
8d08fdba
MS
5874/* Set global variables CURRENT_LANG_NAME to appropriate value
5875 so that behavior of name-mangling machinery is correct. */
5876
5877void
94edc4ab 5878push_lang_context (tree name)
8d08fdba 5879{
aff44741 5880 VEC_safe_push (tree, gc, current_lang_base, current_lang_name);
8d08fdba 5881
e229f2cd 5882 if (name == lang_name_cplusplus)
8d08fdba 5883 {
8d08fdba
MS
5884 current_lang_name = name;
5885 }
e229f2cd
PB
5886 else if (name == lang_name_java)
5887 {
e229f2cd
PB
5888 current_lang_name = name;
5889 /* DECL_IGNORED_P is initially set for these types, to avoid clutter.
5890 (See record_builtin_java_type in decl.c.) However, that causes
5891 incorrect debug entries if these types are actually used.
00a17e31 5892 So we re-enable debug output after extern "Java". */
e3cd9945
APB
5893 DECL_IGNORED_P (TYPE_NAME (java_byte_type_node)) = 0;
5894 DECL_IGNORED_P (TYPE_NAME (java_short_type_node)) = 0;
5895 DECL_IGNORED_P (TYPE_NAME (java_int_type_node)) = 0;
5896 DECL_IGNORED_P (TYPE_NAME (java_long_type_node)) = 0;
5897 DECL_IGNORED_P (TYPE_NAME (java_float_type_node)) = 0;
5898 DECL_IGNORED_P (TYPE_NAME (java_double_type_node)) = 0;
5899 DECL_IGNORED_P (TYPE_NAME (java_char_type_node)) = 0;
5900 DECL_IGNORED_P (TYPE_NAME (java_boolean_type_node)) = 0;
e229f2cd 5901 }
8d08fdba
MS
5902 else if (name == lang_name_c)
5903 {
8d08fdba
MS
5904 current_lang_name = name;
5905 }
5906 else
9e637a26 5907 error ("language string %<\"%E\"%> not recognized", name);
8d08fdba 5908}
c8094d83 5909
8d08fdba 5910/* Get out of the current language scope. */
e92cc029 5911
8d08fdba 5912void
94edc4ab 5913pop_lang_context (void)
8d08fdba 5914{
aff44741 5915 current_lang_name = VEC_pop (tree, current_lang_base);
8d08fdba 5916}
8d08fdba
MS
5917\f
5918/* Type instantiation routines. */
5919
104bf76a
MM
5920/* Given an OVERLOAD and a TARGET_TYPE, return the function that
5921 matches the TARGET_TYPE. If there is no satisfactory match, return
eff3a276
MM
5922 error_mark_node, and issue an error & warning messages under
5923 control of FLAGS. Permit pointers to member function if FLAGS
5924 permits. If TEMPLATE_ONLY, the name of the overloaded function was
5925 a template-id, and EXPLICIT_TARGS are the explicitly provided
5926 template arguments. If OVERLOAD is for one or more member
5927 functions, then ACCESS_PATH is the base path used to reference
5928 those member functions. */
104bf76a 5929
2c73f9f5 5930static tree
c8094d83 5931resolve_address_of_overloaded_function (tree target_type,
94edc4ab 5932 tree overload,
92af500d
NS
5933 tsubst_flags_t flags,
5934 bool template_only,
eff3a276
MM
5935 tree explicit_targs,
5936 tree access_path)
2c73f9f5 5937{
104bf76a 5938 /* Here's what the standard says:
c8094d83 5939
104bf76a
MM
5940 [over.over]
5941
5942 If the name is a function template, template argument deduction
5943 is done, and if the argument deduction succeeds, the deduced
5944 arguments are used to generate a single template function, which
5945 is added to the set of overloaded functions considered.
5946
5947 Non-member functions and static member functions match targets of
5948 type "pointer-to-function" or "reference-to-function." Nonstatic
5949 member functions match targets of type "pointer-to-member
5950 function;" the function type of the pointer to member is used to
5951 select the member function from the set of overloaded member
5952 functions. If a nonstatic member function is selected, the
5953 reference to the overloaded function name is required to have the
5954 form of a pointer to member as described in 5.3.1.
5955
5956 If more than one function is selected, any template functions in
5957 the set are eliminated if the set also contains a non-template
5958 function, and any given template function is eliminated if the
5959 set contains a second template function that is more specialized
5960 than the first according to the partial ordering rules 14.5.5.2.
5961 After such eliminations, if any, there shall remain exactly one
5962 selected function. */
5963
5964 int is_ptrmem = 0;
5965 int is_reference = 0;
5966 /* We store the matches in a TREE_LIST rooted here. The functions
5967 are the TREE_PURPOSE, not the TREE_VALUE, in this list, for easy
5968 interoperability with most_specialized_instantiation. */
5969 tree matches = NULL_TREE;
50714e79 5970 tree fn;
104bf76a 5971
d8f8dca1
MM
5972 /* By the time we get here, we should be seeing only real
5973 pointer-to-member types, not the internal POINTER_TYPE to
5974 METHOD_TYPE representation. */
50bc768d
NS
5975 gcc_assert (TREE_CODE (target_type) != POINTER_TYPE
5976 || TREE_CODE (TREE_TYPE (target_type)) != METHOD_TYPE);
104bf76a 5977
50bc768d 5978 gcc_assert (is_overloaded_fn (overload));
c8094d83 5979
104bf76a
MM
5980 /* Check that the TARGET_TYPE is reasonable. */
5981 if (TYPE_PTRFN_P (target_type))
381ddaa6 5982 /* This is OK. */;
104bf76a
MM
5983 else if (TYPE_PTRMEMFUNC_P (target_type))
5984 /* This is OK, too. */
5985 is_ptrmem = 1;
5986 else if (TREE_CODE (target_type) == FUNCTION_TYPE)
5987 {
5988 /* This is OK, too. This comes from a conversion to reference
5989 type. */
5990 target_type = build_reference_type (target_type);
5991 is_reference = 1;
5992 }
c8094d83 5993 else
104bf76a 5994 {
92af500d 5995 if (flags & tf_error)
c4f73174 5996 error ("cannot resolve overloaded function %qD based on"
0cbd7506
MS
5997 " conversion to type %qT",
5998 DECL_NAME (OVL_FUNCTION (overload)), target_type);
104bf76a
MM
5999 return error_mark_node;
6000 }
c8094d83 6001
104bf76a
MM
6002 /* If we can find a non-template function that matches, we can just
6003 use it. There's no point in generating template instantiations
6004 if we're just going to throw them out anyhow. But, of course, we
6005 can only do this when we don't *need* a template function. */
6006 if (!template_only)
6007 {
6008 tree fns;
6009
a723baf1 6010 for (fns = overload; fns; fns = OVL_NEXT (fns))
104bf76a 6011 {
a723baf1 6012 tree fn = OVL_CURRENT (fns);
104bf76a 6013 tree fntype;
2c73f9f5 6014
104bf76a
MM
6015 if (TREE_CODE (fn) == TEMPLATE_DECL)
6016 /* We're not looking for templates just yet. */
6017 continue;
6018
6019 if ((TREE_CODE (TREE_TYPE (fn)) == METHOD_TYPE)
6020 != is_ptrmem)
6021 /* We're looking for a non-static member, and this isn't
6022 one, or vice versa. */
6023 continue;
34ff2673 6024
d63d5d0c
ILT
6025 /* Ignore functions which haven't been explicitly
6026 declared. */
34ff2673
RS
6027 if (DECL_ANTICIPATED (fn))
6028 continue;
6029
104bf76a
MM
6030 /* See if there's a match. */
6031 fntype = TREE_TYPE (fn);
6032 if (is_ptrmem)
6033 fntype = build_ptrmemfunc_type (build_pointer_type (fntype));
6034 else if (!is_reference)
6035 fntype = build_pointer_type (fntype);
6036
30f86ec3 6037 if (can_convert_arg (target_type, fntype, fn, LOOKUP_NORMAL))
e1b3e07d 6038 matches = tree_cons (fn, NULL_TREE, matches);
104bf76a
MM
6039 }
6040 }
6041
6042 /* Now, if we've already got a match (or matches), there's no need
6043 to proceed to the template functions. But, if we don't have a
6044 match we need to look at them, too. */
c8094d83 6045 if (!matches)
2c73f9f5 6046 {
104bf76a
MM
6047 tree target_fn_type;
6048 tree target_arg_types;
8d3631f8 6049 tree target_ret_type;
104bf76a
MM
6050 tree fns;
6051
6052 if (is_ptrmem)
4393e105
MM
6053 target_fn_type
6054 = TREE_TYPE (TYPE_PTRMEMFUNC_FN_TYPE (target_type));
2c73f9f5 6055 else
4393e105
MM
6056 target_fn_type = TREE_TYPE (target_type);
6057 target_arg_types = TYPE_ARG_TYPES (target_fn_type);
8d3631f8 6058 target_ret_type = TREE_TYPE (target_fn_type);
e5214479
JM
6059
6060 /* Never do unification on the 'this' parameter. */
6061 if (TREE_CODE (target_fn_type) == METHOD_TYPE)
6062 target_arg_types = TREE_CHAIN (target_arg_types);
c8094d83 6063
a723baf1 6064 for (fns = overload; fns; fns = OVL_NEXT (fns))
104bf76a 6065 {
a723baf1 6066 tree fn = OVL_CURRENT (fns);
104bf76a
MM
6067 tree instantiation;
6068 tree instantiation_type;
6069 tree targs;
6070
6071 if (TREE_CODE (fn) != TEMPLATE_DECL)
6072 /* We're only looking for templates. */
6073 continue;
6074
6075 if ((TREE_CODE (TREE_TYPE (fn)) == METHOD_TYPE)
6076 != is_ptrmem)
4393e105 6077 /* We're not looking for a non-static member, and this is
104bf76a
MM
6078 one, or vice versa. */
6079 continue;
6080
104bf76a 6081 /* Try to do argument deduction. */
f31c0a32 6082 targs = make_tree_vec (DECL_NTPARMS (fn));
4393e105 6083 if (fn_type_unification (fn, explicit_targs, targs,
8d3631f8 6084 target_arg_types, target_ret_type,
30f86ec3 6085 DEDUCE_EXACT, LOOKUP_NORMAL))
104bf76a
MM
6086 /* Argument deduction failed. */
6087 continue;
6088
6089 /* Instantiate the template. */
92af500d 6090 instantiation = instantiate_template (fn, targs, flags);
104bf76a
MM
6091 if (instantiation == error_mark_node)
6092 /* Instantiation failed. */
6093 continue;
6094
6095 /* See if there's a match. */
6096 instantiation_type = TREE_TYPE (instantiation);
6097 if (is_ptrmem)
c8094d83 6098 instantiation_type =
104bf76a
MM
6099 build_ptrmemfunc_type (build_pointer_type (instantiation_type));
6100 else if (!is_reference)
6101 instantiation_type = build_pointer_type (instantiation_type);
3db45ab5 6102 if (can_convert_arg (target_type, instantiation_type, instantiation,
30f86ec3 6103 LOOKUP_NORMAL))
e1b3e07d 6104 matches = tree_cons (instantiation, fn, matches);
104bf76a
MM
6105 }
6106
6107 /* Now, remove all but the most specialized of the matches. */
6108 if (matches)
6109 {
e5214479 6110 tree match = most_specialized_instantiation (matches);
104bf76a
MM
6111
6112 if (match != error_mark_node)
3db45ab5
MS
6113 matches = tree_cons (TREE_PURPOSE (match),
6114 NULL_TREE,
7ca383e6 6115 NULL_TREE);
104bf76a
MM
6116 }
6117 }
6118
6119 /* Now we should have exactly one function in MATCHES. */
6120 if (matches == NULL_TREE)
6121 {
6122 /* There were *no* matches. */
92af500d 6123 if (flags & tf_error)
104bf76a 6124 {
0cbd7506
MS
6125 error ("no matches converting function %qD to type %q#T",
6126 DECL_NAME (OVL_FUNCTION (overload)),
6127 target_type);
6b9b6b15
JM
6128
6129 /* print_candidates expects a chain with the functions in
0cbd7506
MS
6130 TREE_VALUE slots, so we cons one up here (we're losing anyway,
6131 so why be clever?). */
6132 for (; overload; overload = OVL_NEXT (overload))
6133 matches = tree_cons (NULL_TREE, OVL_CURRENT (overload),
e1b3e07d 6134 matches);
c8094d83 6135
6b9b6b15 6136 print_candidates (matches);
104bf76a
MM
6137 }
6138 return error_mark_node;
2c73f9f5 6139 }
104bf76a
MM
6140 else if (TREE_CHAIN (matches))
6141 {
6142 /* There were too many matches. */
6143
92af500d 6144 if (flags & tf_error)
104bf76a
MM
6145 {
6146 tree match;
6147
0cbd7506 6148 error ("converting overloaded function %qD to type %q#T is ambiguous",
104bf76a
MM
6149 DECL_NAME (OVL_FUNCTION (overload)),
6150 target_type);
6151
6152 /* Since print_candidates expects the functions in the
6153 TREE_VALUE slot, we flip them here. */
6154 for (match = matches; match; match = TREE_CHAIN (match))
6155 TREE_VALUE (match) = TREE_PURPOSE (match);
6156
6157 print_candidates (matches);
6158 }
c8094d83 6159
104bf76a
MM
6160 return error_mark_node;
6161 }
6162
50714e79
MM
6163 /* Good, exactly one match. Now, convert it to the correct type. */
6164 fn = TREE_PURPOSE (matches);
6165
b1ce3eb2 6166 if (DECL_NONSTATIC_MEMBER_FUNCTION_P (fn)
92af500d 6167 && !(flags & tf_ptrmem_ok) && !flag_ms_extensions)
19420d00 6168 {
b1ce3eb2 6169 static int explained;
c8094d83 6170
92af500d 6171 if (!(flags & tf_error))
0cbd7506 6172 return error_mark_node;
19420d00 6173
393eda6a 6174 permerror ("assuming pointer to member %qD", fn);
b1ce3eb2 6175 if (!explained)
0cbd7506 6176 {
393eda6a 6177 inform ("(a pointer to member can only be formed with %<&%E%>)", fn);
0cbd7506
MS
6178 explained = 1;
6179 }
19420d00 6180 }
84583208
MM
6181
6182 /* If we're doing overload resolution purely for the purpose of
6183 determining conversion sequences, we should not consider the
6184 function used. If this conversion sequence is selected, the
6185 function will be marked as used at this point. */
6186 if (!(flags & tf_conv))
eff3a276
MM
6187 {
6188 mark_used (fn);
6189 /* We could not check access when this expression was originally
6190 created since we did not know at that time to which function
6191 the expression referred. */
6192 if (DECL_FUNCTION_MEMBER_P (fn))
6193 {
6194 gcc_assert (access_path);
02022f3a 6195 perform_or_defer_access_check (access_path, fn, fn);
eff3a276
MM
6196 }
6197 }
a6ecf8b6 6198
50714e79 6199 if (TYPE_PTRFN_P (target_type) || TYPE_PTRMEMFUNC_P (target_type))
5ade1ed2 6200 return cp_build_unary_op (ADDR_EXPR, fn, 0, flags);
50714e79
MM
6201 else
6202 {
5ade1ed2 6203 /* The target must be a REFERENCE_TYPE. Above, cp_build_unary_op
50714e79
MM
6204 will mark the function as addressed, but here we must do it
6205 explicitly. */
dffd7eb6 6206 cxx_mark_addressable (fn);
50714e79
MM
6207
6208 return fn;
6209 }
2c73f9f5
ML
6210}
6211
ec255269
MS
6212/* This function will instantiate the type of the expression given in
6213 RHS to match the type of LHSTYPE. If errors exist, then return
92af500d 6214 error_mark_node. FLAGS is a bit mask. If TF_ERROR is set, then
5e76004e
NS
6215 we complain on errors. If we are not complaining, never modify rhs,
6216 as overload resolution wants to try many possible instantiations, in
6217 the hope that at least one will work.
c8094d83 6218
e6e174e5
JM
6219 For non-recursive calls, LHSTYPE should be a function, pointer to
6220 function, or a pointer to member function. */
e92cc029 6221
8d08fdba 6222tree
94edc4ab 6223instantiate_type (tree lhstype, tree rhs, tsubst_flags_t flags)
8d08fdba 6224{
92af500d 6225 tsubst_flags_t flags_in = flags;
eff3a276 6226 tree access_path = NULL_TREE;
c8094d83 6227
c2ea3a40 6228 flags &= ~tf_ptrmem_ok;
c8094d83 6229
8d08fdba
MS
6230 if (TREE_CODE (lhstype) == UNKNOWN_TYPE)
6231 {
92af500d 6232 if (flags & tf_error)
8251199e 6233 error ("not enough type information");
8d08fdba
MS
6234 return error_mark_node;
6235 }
6236
6237 if (TREE_TYPE (rhs) != NULL_TREE && ! (type_unknown_p (rhs)))
abff8e06 6238 {
8f4b394d 6239 if (same_type_p (lhstype, TREE_TYPE (rhs)))
abff8e06 6240 return rhs;
c8094d83 6241 if (flag_ms_extensions
a723baf1
MM
6242 && TYPE_PTRMEMFUNC_P (lhstype)
6243 && !TYPE_PTRMEMFUNC_P (TREE_TYPE (rhs)))
6244 /* Microsoft allows `A::f' to be resolved to a
6245 pointer-to-member. */
6246 ;
6247 else
6248 {
92af500d 6249 if (flags & tf_error)
1f070f2b 6250 error ("argument of type %qT does not match %qT",
a723baf1
MM
6251 TREE_TYPE (rhs), lhstype);
6252 return error_mark_node;
6253 }
abff8e06 6254 }
8d08fdba 6255
50ad9642 6256 if (TREE_CODE (rhs) == BASELINK)
eff3a276
MM
6257 {
6258 access_path = BASELINK_ACCESS_BINFO (rhs);
6259 rhs = BASELINK_FUNCTIONS (rhs);
6260 }
50ad9642 6261
5ae9ba3e
MM
6262 /* If we are in a template, and have a NON_DEPENDENT_EXPR, we cannot
6263 deduce any type information. */
6264 if (TREE_CODE (rhs) == NON_DEPENDENT_EXPR)
6265 {
6266 if (flags & tf_error)
6267 error ("not enough type information");
6268 return error_mark_node;
6269 }
6270
eff3a276
MM
6271 /* There only a few kinds of expressions that may have a type
6272 dependent on overload resolution. */
6273 gcc_assert (TREE_CODE (rhs) == ADDR_EXPR
6274 || TREE_CODE (rhs) == COMPONENT_REF
6275 || TREE_CODE (rhs) == COMPOUND_EXPR
6276 || really_overloaded_fn (rhs));
6277
2c73f9f5
ML
6278 /* We don't overwrite rhs if it is an overloaded function.
6279 Copying it would destroy the tree link. */
6280 if (TREE_CODE (rhs) != OVERLOAD)
6281 rhs = copy_node (rhs);
c73964b2 6282
8d08fdba
MS
6283 /* This should really only be used when attempting to distinguish
6284 what sort of a pointer to function we have. For now, any
6285 arithmetic operation which is not supported on pointers
6286 is rejected as an error. */
6287
6288 switch (TREE_CODE (rhs))
6289 {
8d08fdba 6290 case COMPONENT_REF:
92af500d 6291 {
5ae9ba3e 6292 tree member = TREE_OPERAND (rhs, 1);
92af500d 6293
5ae9ba3e
MM
6294 member = instantiate_type (lhstype, member, flags);
6295 if (member != error_mark_node
92af500d 6296 && TREE_SIDE_EFFECTS (TREE_OPERAND (rhs, 0)))
04c06002 6297 /* Do not lose object's side effects. */
5ae9ba3e
MM
6298 return build2 (COMPOUND_EXPR, TREE_TYPE (member),
6299 TREE_OPERAND (rhs, 0), member);
6300 return member;
92af500d 6301 }
8d08fdba 6302
2a238a97 6303 case OFFSET_REF:
05e0b2f4
JM
6304 rhs = TREE_OPERAND (rhs, 1);
6305 if (BASELINK_P (rhs))
eff3a276 6306 return instantiate_type (lhstype, rhs, flags_in);
05e0b2f4 6307
2a238a97
MM
6308 /* This can happen if we are forming a pointer-to-member for a
6309 member template. */
50bc768d 6310 gcc_assert (TREE_CODE (rhs) == TEMPLATE_ID_EXPR);
05e0b2f4 6311
2a238a97 6312 /* Fall through. */
874503bc 6313
386b8a85 6314 case TEMPLATE_ID_EXPR:
2bdb0643
JM
6315 {
6316 tree fns = TREE_OPERAND (rhs, 0);
6317 tree args = TREE_OPERAND (rhs, 1);
6318
19420d00 6319 return
92af500d
NS
6320 resolve_address_of_overloaded_function (lhstype, fns, flags_in,
6321 /*template_only=*/true,
eff3a276 6322 args, access_path);
2bdb0643 6323 }
386b8a85 6324
2c73f9f5 6325 case OVERLOAD:
a723baf1 6326 case FUNCTION_DECL:
c8094d83 6327 return
92af500d
NS
6328 resolve_address_of_overloaded_function (lhstype, rhs, flags_in,
6329 /*template_only=*/false,
eff3a276
MM
6330 /*explicit_targs=*/NULL_TREE,
6331 access_path);
2c73f9f5 6332
8d08fdba 6333 case COMPOUND_EXPR:
a0a33927 6334 TREE_OPERAND (rhs, 0)
940ff223 6335 = instantiate_type (lhstype, TREE_OPERAND (rhs, 0), flags);
8d08fdba
MS
6336 if (TREE_OPERAND (rhs, 0) == error_mark_node)
6337 return error_mark_node;
a0a33927 6338 TREE_OPERAND (rhs, 1)
940ff223 6339 = instantiate_type (lhstype, TREE_OPERAND (rhs, 1), flags);
8d08fdba
MS
6340 if (TREE_OPERAND (rhs, 1) == error_mark_node)
6341 return error_mark_node;
6342
6343 TREE_TYPE (rhs) = lhstype;
6344 return rhs;
6345
ca36f057 6346 case ADDR_EXPR:
19420d00
NS
6347 {
6348 if (PTRMEM_OK_P (rhs))
0cbd7506 6349 flags |= tf_ptrmem_ok;
c8094d83 6350
ca36f057 6351 return instantiate_type (lhstype, TREE_OPERAND (rhs, 0), flags);
19420d00 6352 }
ca36f057
MM
6353
6354 case ERROR_MARK:
6355 return error_mark_node;
6356
6357 default:
8dc2b103 6358 gcc_unreachable ();
ca36f057 6359 }
8dc2b103 6360 return error_mark_node;
ca36f057
MM
6361}
6362\f
6363/* Return the name of the virtual function pointer field
6364 (as an IDENTIFIER_NODE) for the given TYPE. Note that
6365 this may have to look back through base types to find the
6366 ultimate field name. (For single inheritance, these could
6367 all be the same name. Who knows for multiple inheritance). */
6368
6369static tree
94edc4ab 6370get_vfield_name (tree type)
ca36f057 6371{
37a247a0 6372 tree binfo, base_binfo;
ca36f057
MM
6373 char *buf;
6374
37a247a0 6375 for (binfo = TYPE_BINFO (type);
fa743e8c 6376 BINFO_N_BASE_BINFOS (binfo);
37a247a0
NS
6377 binfo = base_binfo)
6378 {
6379 base_binfo = BINFO_BASE_BINFO (binfo, 0);
ca36f057 6380
37a247a0
NS
6381 if (BINFO_VIRTUAL_P (base_binfo)
6382 || !TYPE_CONTAINS_VPTR_P (BINFO_TYPE (base_binfo)))
6383 break;
6384 }
c8094d83 6385
ca36f057 6386 type = BINFO_TYPE (binfo);
67f5655f 6387 buf = (char *) alloca (sizeof (VFIELD_NAME_FORMAT)
3db45ab5 6388 + TYPE_NAME_LENGTH (type) + 2);
ea122333
JM
6389 sprintf (buf, VFIELD_NAME_FORMAT,
6390 IDENTIFIER_POINTER (constructor_name (type)));
ca36f057
MM
6391 return get_identifier (buf);
6392}
6393
6394void
94edc4ab 6395print_class_statistics (void)
ca36f057
MM
6396{
6397#ifdef GATHER_STATISTICS
6398 fprintf (stderr, "convert_harshness = %d\n", n_convert_harshness);
6399 fprintf (stderr, "compute_conversion_costs = %d\n", n_compute_conversion_costs);
ca36f057
MM
6400 if (n_vtables)
6401 {
6402 fprintf (stderr, "vtables = %d; vtable searches = %d\n",
6403 n_vtables, n_vtable_searches);
6404 fprintf (stderr, "vtable entries = %d; vtable elems = %d\n",
6405 n_vtable_entries, n_vtable_elems);
6406 }
6407#endif
6408}
6409
6410/* Build a dummy reference to ourselves so Derived::Base (and A::A) works,
6411 according to [class]:
0cbd7506 6412 The class-name is also inserted
ca36f057
MM
6413 into the scope of the class itself. For purposes of access checking,
6414 the inserted class name is treated as if it were a public member name. */
6415
6416void
94edc4ab 6417build_self_reference (void)
ca36f057
MM
6418{
6419 tree name = constructor_name (current_class_type);
6420 tree value = build_lang_decl (TYPE_DECL, name, current_class_type);
6421 tree saved_cas;
6422
6423 DECL_NONLOCAL (value) = 1;
6424 DECL_CONTEXT (value) = current_class_type;
6425 DECL_ARTIFICIAL (value) = 1;
a3d87771 6426 SET_DECL_SELF_REFERENCE_P (value);
ca36f057
MM
6427
6428 if (processing_template_decl)
6429 value = push_template_decl (value);
6430
6431 saved_cas = current_access_specifier;
6432 current_access_specifier = access_public_node;
6433 finish_member_declaration (value);
6434 current_access_specifier = saved_cas;
6435}
6436
6437/* Returns 1 if TYPE contains only padding bytes. */
6438
6439int
94edc4ab 6440is_empty_class (tree type)
ca36f057 6441{
ca36f057
MM
6442 if (type == error_mark_node)
6443 return 0;
6444
9e1e64ec 6445 if (! MAYBE_CLASS_TYPE_P (type))
ca36f057
MM
6446 return 0;
6447
58731fd1
MM
6448 /* In G++ 3.2, whether or not a class was empty was determined by
6449 looking at its size. */
6450 if (abi_version_at_least (2))
6451 return CLASSTYPE_EMPTY_P (type);
6452 else
6453 return integer_zerop (CLASSTYPE_SIZE (type));
ca36f057
MM
6454}
6455
956d9305
MM
6456/* Returns true if TYPE contains an empty class. */
6457
6458static bool
6459contains_empty_class_p (tree type)
6460{
6461 if (is_empty_class (type))
6462 return true;
6463 if (CLASS_TYPE_P (type))
6464 {
6465 tree field;
fa743e8c
NS
6466 tree binfo;
6467 tree base_binfo;
956d9305
MM
6468 int i;
6469
fa743e8c
NS
6470 for (binfo = TYPE_BINFO (type), i = 0;
6471 BINFO_BASE_ITERATE (binfo, i, base_binfo); ++i)
6472 if (contains_empty_class_p (BINFO_TYPE (base_binfo)))
956d9305
MM
6473 return true;
6474 for (field = TYPE_FIELDS (type); field; field = TREE_CHAIN (field))
17bbb839
MM
6475 if (TREE_CODE (field) == FIELD_DECL
6476 && !DECL_ARTIFICIAL (field)
6477 && is_empty_class (TREE_TYPE (field)))
956d9305
MM
6478 return true;
6479 }
6480 else if (TREE_CODE (type) == ARRAY_TYPE)
6481 return contains_empty_class_p (TREE_TYPE (type));
6482 return false;
6483}
6484
ca36f057
MM
6485/* Note that NAME was looked up while the current class was being
6486 defined and that the result of that lookup was DECL. */
6487
6488void
94edc4ab 6489maybe_note_name_used_in_class (tree name, tree decl)
ca36f057
MM
6490{
6491 splay_tree names_used;
6492
6493 /* If we're not defining a class, there's nothing to do. */
39fb05d0
MM
6494 if (!(innermost_scope_kind() == sk_class
6495 && TYPE_BEING_DEFINED (current_class_type)))
ca36f057 6496 return;
c8094d83 6497
ca36f057
MM
6498 /* If there's already a binding for this NAME, then we don't have
6499 anything to worry about. */
c8094d83 6500 if (lookup_member (current_class_type, name,
39fb05d0 6501 /*protect=*/0, /*want_type=*/false))
ca36f057
MM
6502 return;
6503
6504 if (!current_class_stack[current_class_depth - 1].names_used)
6505 current_class_stack[current_class_depth - 1].names_used
6506 = splay_tree_new (splay_tree_compare_pointers, 0, 0);
6507 names_used = current_class_stack[current_class_depth - 1].names_used;
6508
6509 splay_tree_insert (names_used,
c8094d83 6510 (splay_tree_key) name,
ca36f057
MM
6511 (splay_tree_value) decl);
6512}
6513
6514/* Note that NAME was declared (as DECL) in the current class. Check
0e339752 6515 to see that the declaration is valid. */
ca36f057
MM
6516
6517void
94edc4ab 6518note_name_declared_in_class (tree name, tree decl)
ca36f057
MM
6519{
6520 splay_tree names_used;
6521 splay_tree_node n;
6522
6523 /* Look to see if we ever used this name. */
c8094d83 6524 names_used
ca36f057
MM
6525 = current_class_stack[current_class_depth - 1].names_used;
6526 if (!names_used)
6527 return;
6528
6529 n = splay_tree_lookup (names_used, (splay_tree_key) name);
6530 if (n)
6531 {
6532 /* [basic.scope.class]
c8094d83 6533
ca36f057
MM
6534 A name N used in a class S shall refer to the same declaration
6535 in its context and when re-evaluated in the completed scope of
6536 S. */
393eda6a
MLI
6537 permerror ("declaration of %q#D", decl);
6538 permerror ("changes meaning of %qD from %q+#D",
2ae2031e 6539 DECL_NAME (OVL_CURRENT (decl)), (tree) n->value);
ca36f057
MM
6540 }
6541}
6542
3461fba7
NS
6543/* Returns the VAR_DECL for the complete vtable associated with BINFO.
6544 Secondary vtables are merged with primary vtables; this function
6545 will return the VAR_DECL for the primary vtable. */
ca36f057 6546
c35cce41 6547tree
94edc4ab 6548get_vtbl_decl_for_binfo (tree binfo)
c35cce41
MM
6549{
6550 tree decl;
6551
6552 decl = BINFO_VTABLE (binfo);
5be014d5 6553 if (decl && TREE_CODE (decl) == POINTER_PLUS_EXPR)
c35cce41 6554 {
50bc768d 6555 gcc_assert (TREE_CODE (TREE_OPERAND (decl, 0)) == ADDR_EXPR);
c35cce41
MM
6556 decl = TREE_OPERAND (TREE_OPERAND (decl, 0), 0);
6557 }
6558 if (decl)
50bc768d 6559 gcc_assert (TREE_CODE (decl) == VAR_DECL);
c35cce41
MM
6560 return decl;
6561}
6562
911a71a7 6563
dbbf88d1
NS
6564/* Returns the binfo for the primary base of BINFO. If the resulting
6565 BINFO is a virtual base, and it is inherited elsewhere in the
6566 hierarchy, then the returned binfo might not be the primary base of
6567 BINFO in the complete object. Check BINFO_PRIMARY_P or
6568 BINFO_LOST_PRIMARY_P to be sure. */
911a71a7 6569
b5791fdc 6570static tree
94edc4ab 6571get_primary_binfo (tree binfo)
911a71a7
MM
6572{
6573 tree primary_base;
c8094d83 6574
911a71a7
MM
6575 primary_base = CLASSTYPE_PRIMARY_BINFO (BINFO_TYPE (binfo));
6576 if (!primary_base)
6577 return NULL_TREE;
6578
b5791fdc 6579 return copied_binfo (primary_base, binfo);
911a71a7
MM
6580}
6581
838dfd8a 6582/* If INDENTED_P is zero, indent to INDENT. Return nonzero. */
b7442fb5
NS
6583
6584static int
94edc4ab 6585maybe_indent_hierarchy (FILE * stream, int indent, int indented_p)
b7442fb5
NS
6586{
6587 if (!indented_p)
6588 fprintf (stream, "%*s", indent, "");
6589 return 1;
6590}
6591
dbbf88d1
NS
6592/* Dump the offsets of all the bases rooted at BINFO to STREAM.
6593 INDENT should be zero when called from the top level; it is
6594 incremented recursively. IGO indicates the next expected BINFO in
9bcb9aae 6595 inheritance graph ordering. */
c35cce41 6596
dbbf88d1
NS
6597static tree
6598dump_class_hierarchy_r (FILE *stream,
0cbd7506
MS
6599 int flags,
6600 tree binfo,
6601 tree igo,
6602 int indent)
ca36f057 6603{
b7442fb5 6604 int indented = 0;
fa743e8c
NS
6605 tree base_binfo;
6606 int i;
c8094d83 6607
b7442fb5
NS
6608 indented = maybe_indent_hierarchy (stream, indent, 0);
6609 fprintf (stream, "%s (0x%lx) ",
fc6633e0 6610 type_as_string (BINFO_TYPE (binfo), TFF_PLAIN_IDENTIFIER),
b7442fb5 6611 (unsigned long) binfo);
dbbf88d1
NS
6612 if (binfo != igo)
6613 {
6614 fprintf (stream, "alternative-path\n");
6615 return igo;
6616 }
6617 igo = TREE_CHAIN (binfo);
c8094d83 6618
9965d119 6619 fprintf (stream, HOST_WIDE_INT_PRINT_DEC,
ca36f057 6620 tree_low_cst (BINFO_OFFSET (binfo), 0));
9965d119
NS
6621 if (is_empty_class (BINFO_TYPE (binfo)))
6622 fprintf (stream, " empty");
6623 else if (CLASSTYPE_NEARLY_EMPTY_P (BINFO_TYPE (binfo)))
6624 fprintf (stream, " nearly-empty");
809e3e7f 6625 if (BINFO_VIRTUAL_P (binfo))
dbbf88d1 6626 fprintf (stream, " virtual");
9965d119 6627 fprintf (stream, "\n");
ca36f057 6628
b7442fb5 6629 indented = 0;
fc6633e0 6630 if (BINFO_PRIMARY_P (binfo))
b7442fb5
NS
6631 {
6632 indented = maybe_indent_hierarchy (stream, indent + 3, indented);
6633 fprintf (stream, " primary-for %s (0x%lx)",
fc6633e0 6634 type_as_string (BINFO_TYPE (BINFO_INHERITANCE_CHAIN (binfo)),
b7442fb5 6635 TFF_PLAIN_IDENTIFIER),
fc6633e0 6636 (unsigned long)BINFO_INHERITANCE_CHAIN (binfo));
b7442fb5
NS
6637 }
6638 if (BINFO_LOST_PRIMARY_P (binfo))
6639 {
6640 indented = maybe_indent_hierarchy (stream, indent + 3, indented);
6641 fprintf (stream, " lost-primary");
6642 }
6643 if (indented)
6644 fprintf (stream, "\n");
6645
6646 if (!(flags & TDF_SLIM))
6647 {
6648 int indented = 0;
c8094d83 6649
b7442fb5
NS
6650 if (BINFO_SUBVTT_INDEX (binfo))
6651 {
6652 indented = maybe_indent_hierarchy (stream, indent + 3, indented);
6653 fprintf (stream, " subvttidx=%s",
6654 expr_as_string (BINFO_SUBVTT_INDEX (binfo),
6655 TFF_PLAIN_IDENTIFIER));
6656 }
6657 if (BINFO_VPTR_INDEX (binfo))
6658 {
6659 indented = maybe_indent_hierarchy (stream, indent + 3, indented);
6660 fprintf (stream, " vptridx=%s",
6661 expr_as_string (BINFO_VPTR_INDEX (binfo),
6662 TFF_PLAIN_IDENTIFIER));
6663 }
6664 if (BINFO_VPTR_FIELD (binfo))
6665 {
6666 indented = maybe_indent_hierarchy (stream, indent + 3, indented);
6667 fprintf (stream, " vbaseoffset=%s",
6668 expr_as_string (BINFO_VPTR_FIELD (binfo),
6669 TFF_PLAIN_IDENTIFIER));
6670 }
6671 if (BINFO_VTABLE (binfo))
6672 {
6673 indented = maybe_indent_hierarchy (stream, indent + 3, indented);
6674 fprintf (stream, " vptr=%s",
6675 expr_as_string (BINFO_VTABLE (binfo),
6676 TFF_PLAIN_IDENTIFIER));
6677 }
c8094d83 6678
b7442fb5
NS
6679 if (indented)
6680 fprintf (stream, "\n");
6681 }
dbbf88d1 6682
fa743e8c
NS
6683 for (i = 0; BINFO_BASE_ITERATE (binfo, i, base_binfo); i++)
6684 igo = dump_class_hierarchy_r (stream, flags, base_binfo, igo, indent + 2);
c8094d83 6685
dbbf88d1 6686 return igo;
c35cce41
MM
6687}
6688
6689/* Dump the BINFO hierarchy for T. */
6690
b7442fb5 6691static void
bb885938 6692dump_class_hierarchy_1 (FILE *stream, int flags, tree t)
c35cce41 6693{
b7442fb5
NS
6694 fprintf (stream, "Class %s\n", type_as_string (t, TFF_PLAIN_IDENTIFIER));
6695 fprintf (stream, " size=%lu align=%lu\n",
6696 (unsigned long)(tree_low_cst (TYPE_SIZE (t), 0) / BITS_PER_UNIT),
6697 (unsigned long)(TYPE_ALIGN (t) / BITS_PER_UNIT));
dbbf88d1
NS
6698 fprintf (stream, " base size=%lu base align=%lu\n",
6699 (unsigned long)(tree_low_cst (TYPE_SIZE (CLASSTYPE_AS_BASE (t)), 0)
6700 / BITS_PER_UNIT),
6701 (unsigned long)(TYPE_ALIGN (CLASSTYPE_AS_BASE (t))
6702 / BITS_PER_UNIT));
6703 dump_class_hierarchy_r (stream, flags, TYPE_BINFO (t), TYPE_BINFO (t), 0);
b7442fb5 6704 fprintf (stream, "\n");
bb885938
NS
6705}
6706
da1d7781 6707/* Debug interface to hierarchy dumping. */
bb885938 6708
ac1f3b7e 6709void
bb885938
NS
6710debug_class (tree t)
6711{
6712 dump_class_hierarchy_1 (stderr, TDF_SLIM, t);
6713}
6714
6715static void
6716dump_class_hierarchy (tree t)
6717{
6718 int flags;
6719 FILE *stream = dump_begin (TDI_class, &flags);
6720
6721 if (stream)
6722 {
6723 dump_class_hierarchy_1 (stream, flags, t);
6724 dump_end (TDI_class, stream);
6725 }
b7442fb5
NS
6726}
6727
6728static void
94edc4ab 6729dump_array (FILE * stream, tree decl)
b7442fb5 6730{
4038c495
GB
6731 tree value;
6732 unsigned HOST_WIDE_INT ix;
b7442fb5
NS
6733 HOST_WIDE_INT elt;
6734 tree size = TYPE_MAX_VALUE (TYPE_DOMAIN (TREE_TYPE (decl)));
6735
6736 elt = (tree_low_cst (TYPE_SIZE (TREE_TYPE (TREE_TYPE (decl))), 0)
6737 / BITS_PER_UNIT);
6738 fprintf (stream, "%s:", decl_as_string (decl, TFF_PLAIN_IDENTIFIER));
6739 fprintf (stream, " %s entries",
6740 expr_as_string (size_binop (PLUS_EXPR, size, size_one_node),
6741 TFF_PLAIN_IDENTIFIER));
6742 fprintf (stream, "\n");
6743
4038c495
GB
6744 FOR_EACH_CONSTRUCTOR_VALUE (CONSTRUCTOR_ELTS (DECL_INITIAL (decl)),
6745 ix, value)
4fdc14ca 6746 fprintf (stream, "%-4ld %s\n", (long)(ix * elt),
4038c495 6747 expr_as_string (value, TFF_PLAIN_IDENTIFIER));
b7442fb5
NS
6748}
6749
6750static void
94edc4ab 6751dump_vtable (tree t, tree binfo, tree vtable)
b7442fb5
NS
6752{
6753 int flags;
6754 FILE *stream = dump_begin (TDI_class, &flags);
6755
6756 if (!stream)
6757 return;
6758
6759 if (!(flags & TDF_SLIM))
9965d119 6760 {
b7442fb5 6761 int ctor_vtbl_p = TYPE_BINFO (t) != binfo;
c8094d83 6762
b7442fb5
NS
6763 fprintf (stream, "%s for %s",
6764 ctor_vtbl_p ? "Construction vtable" : "Vtable",
fc6633e0 6765 type_as_string (BINFO_TYPE (binfo), TFF_PLAIN_IDENTIFIER));
b7442fb5
NS
6766 if (ctor_vtbl_p)
6767 {
809e3e7f 6768 if (!BINFO_VIRTUAL_P (binfo))
b7442fb5
NS
6769 fprintf (stream, " (0x%lx instance)", (unsigned long)binfo);
6770 fprintf (stream, " in %s", type_as_string (t, TFF_PLAIN_IDENTIFIER));
6771 }
6772 fprintf (stream, "\n");
6773 dump_array (stream, vtable);
6774 fprintf (stream, "\n");
9965d119 6775 }
c8094d83 6776
b7442fb5
NS
6777 dump_end (TDI_class, stream);
6778}
6779
6780static void
94edc4ab 6781dump_vtt (tree t, tree vtt)
b7442fb5
NS
6782{
6783 int flags;
6784 FILE *stream = dump_begin (TDI_class, &flags);
6785
6786 if (!stream)
6787 return;
6788
6789 if (!(flags & TDF_SLIM))
6790 {
6791 fprintf (stream, "VTT for %s\n",
6792 type_as_string (t, TFF_PLAIN_IDENTIFIER));
6793 dump_array (stream, vtt);
6794 fprintf (stream, "\n");
6795 }
c8094d83 6796
b7442fb5 6797 dump_end (TDI_class, stream);
ca36f057
MM
6798}
6799
bb885938
NS
6800/* Dump a function or thunk and its thunkees. */
6801
6802static void
6803dump_thunk (FILE *stream, int indent, tree thunk)
6804{
6805 static const char spaces[] = " ";
6806 tree name = DECL_NAME (thunk);
6807 tree thunks;
c8094d83 6808
bb885938
NS
6809 fprintf (stream, "%.*s%p %s %s", indent, spaces,
6810 (void *)thunk,
6811 !DECL_THUNK_P (thunk) ? "function"
6812 : DECL_THIS_THUNK_P (thunk) ? "this-thunk" : "covariant-thunk",
6813 name ? IDENTIFIER_POINTER (name) : "<unset>");
e00853fd 6814 if (DECL_THUNK_P (thunk))
bb885938
NS
6815 {
6816 HOST_WIDE_INT fixed_adjust = THUNK_FIXED_OFFSET (thunk);
6817 tree virtual_adjust = THUNK_VIRTUAL_OFFSET (thunk);
6818
6819 fprintf (stream, " fixed=" HOST_WIDE_INT_PRINT_DEC, fixed_adjust);
6820 if (!virtual_adjust)
6821 /*NOP*/;
6822 else if (DECL_THIS_THUNK_P (thunk))
6823 fprintf (stream, " vcall=" HOST_WIDE_INT_PRINT_DEC,
6824 tree_low_cst (virtual_adjust, 0));
6825 else
6826 fprintf (stream, " vbase=" HOST_WIDE_INT_PRINT_DEC "(%s)",
6827 tree_low_cst (BINFO_VPTR_FIELD (virtual_adjust), 0),
6828 type_as_string (BINFO_TYPE (virtual_adjust), TFF_SCOPE));
e00853fd
NS
6829 if (THUNK_ALIAS (thunk))
6830 fprintf (stream, " alias to %p", (void *)THUNK_ALIAS (thunk));
bb885938
NS
6831 }
6832 fprintf (stream, "\n");
6833 for (thunks = DECL_THUNKS (thunk); thunks; thunks = TREE_CHAIN (thunks))
6834 dump_thunk (stream, indent + 2, thunks);
6835}
6836
6837/* Dump the thunks for FN. */
6838
ac1f3b7e 6839void
bb885938
NS
6840debug_thunks (tree fn)
6841{
6842 dump_thunk (stderr, 0, fn);
6843}
6844
ca36f057
MM
6845/* Virtual function table initialization. */
6846
6847/* Create all the necessary vtables for T and its base classes. */
6848
6849static void
94edc4ab 6850finish_vtbls (tree t)
ca36f057 6851{
3461fba7
NS
6852 tree list;
6853 tree vbase;
ca36f057 6854
3461fba7
NS
6855 /* We lay out the primary and secondary vtables in one contiguous
6856 vtable. The primary vtable is first, followed by the non-virtual
6857 secondary vtables in inheritance graph order. */
604a3205 6858 list = build_tree_list (BINFO_VTABLE (TYPE_BINFO (t)), NULL_TREE);
3461fba7
NS
6859 accumulate_vtbl_inits (TYPE_BINFO (t), TYPE_BINFO (t),
6860 TYPE_BINFO (t), t, list);
c8094d83 6861
3461fba7
NS
6862 /* Then come the virtual bases, also in inheritance graph order. */
6863 for (vbase = TYPE_BINFO (t); vbase; vbase = TREE_CHAIN (vbase))
6864 {
809e3e7f 6865 if (!BINFO_VIRTUAL_P (vbase))
3461fba7 6866 continue;
dbbf88d1 6867 accumulate_vtbl_inits (vbase, vbase, TYPE_BINFO (t), t, list);
ff668506
JM
6868 }
6869
604a3205 6870 if (BINFO_VTABLE (TYPE_BINFO (t)))
3461fba7 6871 initialize_vtable (TYPE_BINFO (t), TREE_VALUE (list));
ca36f057
MM
6872}
6873
6874/* Initialize the vtable for BINFO with the INITS. */
6875
6876static void
94edc4ab 6877initialize_vtable (tree binfo, tree inits)
ca36f057 6878{
ca36f057
MM
6879 tree decl;
6880
6881 layout_vtable_decl (binfo, list_length (inits));
c35cce41 6882 decl = get_vtbl_decl_for_binfo (binfo);
19c29b2f 6883 initialize_artificial_var (decl, inits);
b7442fb5 6884 dump_vtable (BINFO_TYPE (binfo), binfo, decl);
23656158
MM
6885}
6886
9965d119
NS
6887/* Build the VTT (virtual table table) for T.
6888 A class requires a VTT if it has virtual bases.
c8094d83 6889
9965d119
NS
6890 This holds
6891 1 - primary virtual pointer for complete object T
90ecce3e
JM
6892 2 - secondary VTTs for each direct non-virtual base of T which requires a
6893 VTT
9965d119
NS
6894 3 - secondary virtual pointers for each direct or indirect base of T which
6895 has virtual bases or is reachable via a virtual path from T.
6896 4 - secondary VTTs for each direct or indirect virtual base of T.
c8094d83 6897
9965d119 6898 Secondary VTTs look like complete object VTTs without part 4. */
23656158
MM
6899
6900static void
94edc4ab 6901build_vtt (tree t)
23656158
MM
6902{
6903 tree inits;
6904 tree type;
6905 tree vtt;
3ec6bad3 6906 tree index;
23656158 6907
23656158
MM
6908 /* Build up the initializers for the VTT. */
6909 inits = NULL_TREE;
3ec6bad3 6910 index = size_zero_node;
9965d119 6911 build_vtt_inits (TYPE_BINFO (t), t, &inits, &index);
23656158
MM
6912
6913 /* If we didn't need a VTT, we're done. */
6914 if (!inits)
6915 return;
6916
6917 /* Figure out the type of the VTT. */
442e01b6 6918 type = build_index_type (size_int (list_length (inits) - 1));
23656158 6919 type = build_cplus_array_type (const_ptr_type_node, type);
c8094d83 6920
23656158 6921 /* Now, build the VTT object itself. */
3e355d92 6922 vtt = build_vtable (t, mangle_vtt_for_type (t), type);
19c29b2f 6923 initialize_artificial_var (vtt, inits);
548502d3
MM
6924 /* Add the VTT to the vtables list. */
6925 TREE_CHAIN (vtt) = TREE_CHAIN (CLASSTYPE_VTABLES (t));
6926 TREE_CHAIN (CLASSTYPE_VTABLES (t)) = vtt;
b7442fb5
NS
6927
6928 dump_vtt (t, vtt);
23656158
MM
6929}
6930
13de7ec4
JM
6931/* When building a secondary VTT, BINFO_VTABLE is set to a TREE_LIST with
6932 PURPOSE the RTTI_BINFO, VALUE the real vtable pointer for this binfo,
6933 and CHAIN the vtable pointer for this binfo after construction is
00a17e31 6934 complete. VALUE can also be another BINFO, in which case we recurse. */
13de7ec4
JM
6935
6936static tree
94edc4ab 6937binfo_ctor_vtable (tree binfo)
13de7ec4
JM
6938{
6939 tree vt;
6940
6941 while (1)
6942 {
6943 vt = BINFO_VTABLE (binfo);
6944 if (TREE_CODE (vt) == TREE_LIST)
6945 vt = TREE_VALUE (vt);
95b4aca6 6946 if (TREE_CODE (vt) == TREE_BINFO)
13de7ec4
JM
6947 binfo = vt;
6948 else
6949 break;
6950 }
6951
6952 return vt;
6953}
6954
a3a0fc7f
NS
6955/* Data for secondary VTT initialization. */
6956typedef struct secondary_vptr_vtt_init_data_s
6957{
6958 /* Is this the primary VTT? */
6959 bool top_level_p;
6960
6961 /* Current index into the VTT. */
6962 tree index;
6963
6964 /* TREE_LIST of initializers built up. */
6965 tree inits;
6966
6967 /* The type being constructed by this secondary VTT. */
6968 tree type_being_constructed;
6969} secondary_vptr_vtt_init_data;
6970
23656158 6971/* Recursively build the VTT-initializer for BINFO (which is in the
9965d119
NS
6972 hierarchy dominated by T). INITS points to the end of the initializer
6973 list to date. INDEX is the VTT index where the next element will be
6974 replaced. Iff BINFO is the binfo for T, this is the top level VTT (i.e.
6975 not a subvtt for some base of T). When that is so, we emit the sub-VTTs
6976 for virtual bases of T. When it is not so, we build the constructor
6977 vtables for the BINFO-in-T variant. */
23656158
MM
6978
6979static tree *
a3a0fc7f 6980build_vtt_inits (tree binfo, tree t, tree *inits, tree *index)
23656158
MM
6981{
6982 int i;
6983 tree b;
6984 tree init;
6985 tree secondary_vptrs;
a3a0fc7f 6986 secondary_vptr_vtt_init_data data;
539ed333 6987 int top_level_p = SAME_BINFO_TYPE_P (BINFO_TYPE (binfo), t);
23656158
MM
6988
6989 /* We only need VTTs for subobjects with virtual bases. */
5775a06a 6990 if (!CLASSTYPE_VBASECLASSES (BINFO_TYPE (binfo)))
23656158
MM
6991 return inits;
6992
6993 /* We need to use a construction vtable if this is not the primary
6994 VTT. */
9965d119 6995 if (!top_level_p)
3ec6bad3
MM
6996 {
6997 build_ctor_vtbl_group (binfo, t);
6998
6999 /* Record the offset in the VTT where this sub-VTT can be found. */
7000 BINFO_SUBVTT_INDEX (binfo) = *index;
7001 }
23656158
MM
7002
7003 /* Add the address of the primary vtable for the complete object. */
13de7ec4 7004 init = binfo_ctor_vtable (binfo);
23656158
MM
7005 *inits = build_tree_list (NULL_TREE, init);
7006 inits = &TREE_CHAIN (*inits);
9965d119
NS
7007 if (top_level_p)
7008 {
50bc768d 7009 gcc_assert (!BINFO_VPTR_INDEX (binfo));
9965d119
NS
7010 BINFO_VPTR_INDEX (binfo) = *index;
7011 }
3ec6bad3 7012 *index = size_binop (PLUS_EXPR, *index, TYPE_SIZE_UNIT (ptr_type_node));
c8094d83 7013
23656158 7014 /* Recursively add the secondary VTTs for non-virtual bases. */
fa743e8c
NS
7015 for (i = 0; BINFO_BASE_ITERATE (binfo, i, b); ++i)
7016 if (!BINFO_VIRTUAL_P (b))
5d5a519f 7017 inits = build_vtt_inits (b, t, inits, index);
c8094d83 7018
23656158 7019 /* Add secondary virtual pointers for all subobjects of BINFO with
9965d119
NS
7020 either virtual bases or reachable along a virtual path, except
7021 subobjects that are non-virtual primary bases. */
a3a0fc7f
NS
7022 data.top_level_p = top_level_p;
7023 data.index = *index;
7024 data.inits = NULL;
7025 data.type_being_constructed = BINFO_TYPE (binfo);
c8094d83 7026
5d5a519f 7027 dfs_walk_once (binfo, dfs_build_secondary_vptr_vtt_inits, NULL, &data);
9965d119 7028
a3a0fc7f 7029 *index = data.index;
23656158
MM
7030
7031 /* The secondary vptrs come back in reverse order. After we reverse
7032 them, and add the INITS, the last init will be the first element
7033 of the chain. */
a3a0fc7f 7034 secondary_vptrs = data.inits;
23656158
MM
7035 if (secondary_vptrs)
7036 {
7037 *inits = nreverse (secondary_vptrs);
7038 inits = &TREE_CHAIN (secondary_vptrs);
50bc768d 7039 gcc_assert (*inits == NULL_TREE);
23656158
MM
7040 }
7041
9965d119 7042 if (top_level_p)
a3a0fc7f
NS
7043 /* Add the secondary VTTs for virtual bases in inheritance graph
7044 order. */
9ccf6541
MM
7045 for (b = TYPE_BINFO (BINFO_TYPE (binfo)); b; b = TREE_CHAIN (b))
7046 {
809e3e7f 7047 if (!BINFO_VIRTUAL_P (b))
9ccf6541 7048 continue;
c8094d83 7049
dbbf88d1 7050 inits = build_vtt_inits (b, t, inits, index);
9ccf6541 7051 }
a3a0fc7f
NS
7052 else
7053 /* Remove the ctor vtables we created. */
5d5a519f 7054 dfs_walk_all (binfo, dfs_fixup_binfo_vtbls, NULL, binfo);
23656158
MM
7055
7056 return inits;
7057}
7058
8df83eae 7059/* Called from build_vtt_inits via dfs_walk. BINFO is the binfo for the base
a3a0fc7f 7060 in most derived. DATA is a SECONDARY_VPTR_VTT_INIT_DATA structure. */
23656158
MM
7061
7062static tree
a3a0fc7f 7063dfs_build_secondary_vptr_vtt_inits (tree binfo, void *data_)
23656158 7064{
a3a0fc7f 7065 secondary_vptr_vtt_init_data *data = (secondary_vptr_vtt_init_data *)data_;
23656158 7066
23656158
MM
7067 /* We don't care about bases that don't have vtables. */
7068 if (!TYPE_VFIELD (BINFO_TYPE (binfo)))
5d5a519f 7069 return dfs_skip_bases;
23656158 7070
a3a0fc7f
NS
7071 /* We're only interested in proper subobjects of the type being
7072 constructed. */
539ed333 7073 if (SAME_BINFO_TYPE_P (BINFO_TYPE (binfo), data->type_being_constructed))
23656158
MM
7074 return NULL_TREE;
7075
a3a0fc7f
NS
7076 /* We're only interested in bases with virtual bases or reachable
7077 via a virtual path from the type being constructed. */
5d5a519f
NS
7078 if (!(CLASSTYPE_VBASECLASSES (BINFO_TYPE (binfo))
7079 || binfo_via_virtual (binfo, data->type_being_constructed)))
7080 return dfs_skip_bases;
c8094d83 7081
5d5a519f
NS
7082 /* We're not interested in non-virtual primary bases. */
7083 if (!BINFO_VIRTUAL_P (binfo) && BINFO_PRIMARY_P (binfo))
db3d8cde 7084 return NULL_TREE;
c8094d83 7085
3ec6bad3 7086 /* Record the index where this secondary vptr can be found. */
a3a0fc7f 7087 if (data->top_level_p)
9965d119 7088 {
50bc768d 7089 gcc_assert (!BINFO_VPTR_INDEX (binfo));
a3a0fc7f 7090 BINFO_VPTR_INDEX (binfo) = data->index;
3ec6bad3 7091
a3a0fc7f
NS
7092 if (BINFO_VIRTUAL_P (binfo))
7093 {
0cbd7506
MS
7094 /* It's a primary virtual base, and this is not a
7095 construction vtable. Find the base this is primary of in
7096 the inheritance graph, and use that base's vtable
7097 now. */
a3a0fc7f
NS
7098 while (BINFO_PRIMARY_P (binfo))
7099 binfo = BINFO_INHERITANCE_CHAIN (binfo);
7100 }
9965d119 7101 }
c8094d83 7102
a3a0fc7f
NS
7103 /* Add the initializer for the secondary vptr itself. */
7104 data->inits = tree_cons (NULL_TREE, binfo_ctor_vtable (binfo), data->inits);
23656158 7105
a3a0fc7f
NS
7106 /* Advance the vtt index. */
7107 data->index = size_binop (PLUS_EXPR, data->index,
7108 TYPE_SIZE_UNIT (ptr_type_node));
9965d119 7109
a3a0fc7f 7110 return NULL_TREE;
9965d119
NS
7111}
7112
a3a0fc7f
NS
7113/* Called from build_vtt_inits via dfs_walk. After building
7114 constructor vtables and generating the sub-vtt from them, we need
7115 to restore the BINFO_VTABLES that were scribbled on. DATA is the
7116 binfo of the base whose sub vtt was generated. */
23656158
MM
7117
7118static tree
94edc4ab 7119dfs_fixup_binfo_vtbls (tree binfo, void* data)
23656158 7120{
a3a0fc7f 7121 tree vtable = BINFO_VTABLE (binfo);
23656158 7122
5d5a519f
NS
7123 if (!TYPE_CONTAINS_VPTR_P (BINFO_TYPE (binfo)))
7124 /* If this class has no vtable, none of its bases do. */
7125 return dfs_skip_bases;
c8094d83 7126
5d5a519f
NS
7127 if (!vtable)
7128 /* This might be a primary base, so have no vtable in this
7129 hierarchy. */
7130 return NULL_TREE;
c8094d83 7131
23656158
MM
7132 /* If we scribbled the construction vtable vptr into BINFO, clear it
7133 out now. */
5d5a519f 7134 if (TREE_CODE (vtable) == TREE_LIST
a3a0fc7f
NS
7135 && (TREE_PURPOSE (vtable) == (tree) data))
7136 BINFO_VTABLE (binfo) = TREE_CHAIN (vtable);
23656158
MM
7137
7138 return NULL_TREE;
7139}
7140
7141/* Build the construction vtable group for BINFO which is in the
7142 hierarchy dominated by T. */
7143
7144static void
94edc4ab 7145build_ctor_vtbl_group (tree binfo, tree t)
23656158
MM
7146{
7147 tree list;
7148 tree type;
7149 tree vtbl;
7150 tree inits;
7151 tree id;
9ccf6541 7152 tree vbase;
23656158 7153
7bdcf888 7154 /* See if we've already created this construction vtable group. */
1f84ec23 7155 id = mangle_ctor_vtbl_for_type (t, binfo);
23656158
MM
7156 if (IDENTIFIER_GLOBAL_VALUE (id))
7157 return;
7158
539ed333 7159 gcc_assert (!SAME_BINFO_TYPE_P (BINFO_TYPE (binfo), t));
23656158
MM
7160 /* Build a version of VTBL (with the wrong type) for use in
7161 constructing the addresses of secondary vtables in the
7162 construction vtable group. */
459c43ad 7163 vtbl = build_vtable (t, id, ptr_type_node);
505970fc 7164 DECL_CONSTRUCTION_VTABLE_P (vtbl) = 1;
23656158
MM
7165 list = build_tree_list (vtbl, NULL_TREE);
7166 accumulate_vtbl_inits (binfo, TYPE_BINFO (TREE_TYPE (binfo)),
7167 binfo, t, list);
9965d119
NS
7168
7169 /* Add the vtables for each of our virtual bases using the vbase in T
7170 binfo. */
c8094d83
MS
7171 for (vbase = TYPE_BINFO (BINFO_TYPE (binfo));
7172 vbase;
9ccf6541
MM
7173 vbase = TREE_CHAIN (vbase))
7174 {
7175 tree b;
7176
809e3e7f 7177 if (!BINFO_VIRTUAL_P (vbase))
9ccf6541 7178 continue;
dbbf88d1 7179 b = copied_binfo (vbase, binfo);
c8094d83 7180
dbbf88d1 7181 accumulate_vtbl_inits (b, vbase, binfo, t, list);
9ccf6541 7182 }
99389463 7183 inits = TREE_VALUE (list);
23656158
MM
7184
7185 /* Figure out the type of the construction vtable. */
442e01b6 7186 type = build_index_type (size_int (list_length (inits) - 1));
23656158 7187 type = build_cplus_array_type (vtable_entry_type, type);
8208d7dc 7188 layout_type (type);
23656158 7189 TREE_TYPE (vtbl) = type;
8208d7dc
DJ
7190 DECL_SIZE (vtbl) = DECL_SIZE_UNIT (vtbl) = NULL_TREE;
7191 layout_decl (vtbl, 0);
23656158
MM
7192
7193 /* Initialize the construction vtable. */
548502d3 7194 CLASSTYPE_VTABLES (t) = chainon (CLASSTYPE_VTABLES (t), vtbl);
19c29b2f 7195 initialize_artificial_var (vtbl, inits);
b7442fb5 7196 dump_vtable (t, binfo, vtbl);
23656158
MM
7197}
7198
9965d119
NS
7199/* Add the vtbl initializers for BINFO (and its bases other than
7200 non-virtual primaries) to the list of INITS. BINFO is in the
7201 hierarchy dominated by T. RTTI_BINFO is the binfo within T of
7202 the constructor the vtbl inits should be accumulated for. (If this
7203 is the complete object vtbl then RTTI_BINFO will be TYPE_BINFO (T).)
7204 ORIG_BINFO is the binfo for this object within BINFO_TYPE (RTTI_BINFO).
7205 BINFO is the active base equivalent of ORIG_BINFO in the inheritance
7206 graph of T. Both BINFO and ORIG_BINFO will have the same BINFO_TYPE,
7207 but are not necessarily the same in terms of layout. */
ca36f057
MM
7208
7209static void
94edc4ab 7210accumulate_vtbl_inits (tree binfo,
0cbd7506
MS
7211 tree orig_binfo,
7212 tree rtti_binfo,
7213 tree t,
7214 tree inits)
ca36f057 7215{
23656158 7216 int i;
fa743e8c 7217 tree base_binfo;
539ed333 7218 int ctor_vtbl_p = !SAME_BINFO_TYPE_P (BINFO_TYPE (rtti_binfo), t);
23656158 7219
539ed333 7220 gcc_assert (SAME_BINFO_TYPE_P (BINFO_TYPE (binfo), BINFO_TYPE (orig_binfo)));
23656158 7221
00a17e31 7222 /* If it doesn't have a vptr, we don't do anything. */
623fe76a
NS
7223 if (!TYPE_CONTAINS_VPTR_P (BINFO_TYPE (binfo)))
7224 return;
c8094d83 7225
23656158
MM
7226 /* If we're building a construction vtable, we're not interested in
7227 subobjects that don't require construction vtables. */
c8094d83 7228 if (ctor_vtbl_p
5775a06a 7229 && !CLASSTYPE_VBASECLASSES (BINFO_TYPE (binfo))
9965d119 7230 && !binfo_via_virtual (orig_binfo, BINFO_TYPE (rtti_binfo)))
23656158
MM
7231 return;
7232
7233 /* Build the initializers for the BINFO-in-T vtable. */
c8094d83 7234 TREE_VALUE (inits)
23656158
MM
7235 = chainon (TREE_VALUE (inits),
7236 dfs_accumulate_vtbl_inits (binfo, orig_binfo,
7237 rtti_binfo, t, inits));
c8094d83 7238
c35cce41
MM
7239 /* Walk the BINFO and its bases. We walk in preorder so that as we
7240 initialize each vtable we can figure out at what offset the
23656158
MM
7241 secondary vtable lies from the primary vtable. We can't use
7242 dfs_walk here because we need to iterate through bases of BINFO
7243 and RTTI_BINFO simultaneously. */
fa743e8c 7244 for (i = 0; BINFO_BASE_ITERATE (binfo, i, base_binfo); ++i)
23656158 7245 {
23656158 7246 /* Skip virtual bases. */
809e3e7f 7247 if (BINFO_VIRTUAL_P (base_binfo))
23656158
MM
7248 continue;
7249 accumulate_vtbl_inits (base_binfo,
604a3205 7250 BINFO_BASE_BINFO (orig_binfo, i),
9965d119 7251 rtti_binfo, t,
23656158
MM
7252 inits);
7253 }
ca36f057
MM
7254}
7255
3461fba7
NS
7256/* Called from accumulate_vtbl_inits. Returns the initializers for
7257 the BINFO vtable. */
ca36f057
MM
7258
7259static tree
94edc4ab 7260dfs_accumulate_vtbl_inits (tree binfo,
0cbd7506
MS
7261 tree orig_binfo,
7262 tree rtti_binfo,
7263 tree t,
7264 tree l)
ca36f057 7265{
23656158 7266 tree inits = NULL_TREE;
9965d119 7267 tree vtbl = NULL_TREE;
539ed333 7268 int ctor_vtbl_p = !SAME_BINFO_TYPE_P (BINFO_TYPE (rtti_binfo), t);
9965d119 7269
13de7ec4 7270 if (ctor_vtbl_p
809e3e7f 7271 && BINFO_VIRTUAL_P (orig_binfo) && BINFO_PRIMARY_P (orig_binfo))
9965d119 7272 {
13de7ec4
JM
7273 /* In the hierarchy of BINFO_TYPE (RTTI_BINFO), this is a
7274 primary virtual base. If it is not the same primary in
7275 the hierarchy of T, we'll need to generate a ctor vtable
7276 for it, to place at its location in T. If it is the same
7277 primary, we still need a VTT entry for the vtable, but it
7278 should point to the ctor vtable for the base it is a
7279 primary for within the sub-hierarchy of RTTI_BINFO.
c8094d83 7280
13de7ec4 7281 There are three possible cases:
c8094d83 7282
13de7ec4
JM
7283 1) We are in the same place.
7284 2) We are a primary base within a lost primary virtual base of
7285 RTTI_BINFO.
049d2def 7286 3) We are primary to something not a base of RTTI_BINFO. */
c8094d83 7287
fc6633e0 7288 tree b;
13de7ec4 7289 tree last = NULL_TREE;
85a9a0a2 7290
13de7ec4
JM
7291 /* First, look through the bases we are primary to for RTTI_BINFO
7292 or a virtual base. */
fc6633e0
NS
7293 b = binfo;
7294 while (BINFO_PRIMARY_P (b))
7bdcf888 7295 {
fc6633e0 7296 b = BINFO_INHERITANCE_CHAIN (b);
13de7ec4 7297 last = b;
809e3e7f 7298 if (BINFO_VIRTUAL_P (b) || b == rtti_binfo)
fc6633e0 7299 goto found;
7bdcf888 7300 }
13de7ec4
JM
7301 /* If we run out of primary links, keep looking down our
7302 inheritance chain; we might be an indirect primary. */
fc6633e0
NS
7303 for (b = last; b; b = BINFO_INHERITANCE_CHAIN (b))
7304 if (BINFO_VIRTUAL_P (b) || b == rtti_binfo)
7305 break;
7306 found:
c8094d83 7307
13de7ec4
JM
7308 /* If we found RTTI_BINFO, this is case 1. If we found a virtual
7309 base B and it is a base of RTTI_BINFO, this is case 2. In
7310 either case, we share our vtable with LAST, i.e. the
7311 derived-most base within B of which we are a primary. */
7312 if (b == rtti_binfo
58c42dc2 7313 || (b && binfo_for_vbase (BINFO_TYPE (b), BINFO_TYPE (rtti_binfo))))
049d2def
JM
7314 /* Just set our BINFO_VTABLE to point to LAST, as we may not have
7315 set LAST's BINFO_VTABLE yet. We'll extract the actual vptr in
7316 binfo_ctor_vtable after everything's been set up. */
7317 vtbl = last;
13de7ec4 7318
049d2def 7319 /* Otherwise, this is case 3 and we get our own. */
9965d119 7320 }
dbbf88d1 7321 else if (!BINFO_NEW_VTABLE_MARKED (orig_binfo))
9965d119 7322 return inits;
7bdcf888 7323
9965d119 7324 if (!vtbl)
ca36f057 7325 {
c35cce41
MM
7326 tree index;
7327 int non_fn_entries;
7328
7329 /* Compute the initializer for this vtable. */
23656158 7330 inits = build_vtbl_initializer (binfo, orig_binfo, t, rtti_binfo,
aabb4cd6 7331 &non_fn_entries);
c35cce41 7332
23656158 7333 /* Figure out the position to which the VPTR should point. */
c35cce41 7334 vtbl = TREE_PURPOSE (l);
6de9cd9a 7335 vtbl = build1 (ADDR_EXPR, vtbl_ptr_type_node, vtbl);
c35cce41
MM
7336 index = size_binop (PLUS_EXPR,
7337 size_int (non_fn_entries),
7338 size_int (list_length (TREE_VALUE (l))));
23656158
MM
7339 index = size_binop (MULT_EXPR,
7340 TYPE_SIZE_UNIT (vtable_entry_type),
7341 index);
5be014d5 7342 vtbl = build2 (POINTER_PLUS_EXPR, TREE_TYPE (vtbl), vtbl, index);
9965d119 7343 }
23656158 7344
7bdcf888 7345 if (ctor_vtbl_p)
9965d119
NS
7346 /* For a construction vtable, we can't overwrite BINFO_VTABLE.
7347 So, we make a TREE_LIST. Later, dfs_fixup_binfo_vtbls will
7348 straighten this out. */
7349 BINFO_VTABLE (binfo) = tree_cons (rtti_binfo, vtbl, BINFO_VTABLE (binfo));
809e3e7f 7350 else if (BINFO_PRIMARY_P (binfo) && BINFO_VIRTUAL_P (binfo))
7bdcf888
NS
7351 inits = NULL_TREE;
7352 else
7353 /* For an ordinary vtable, set BINFO_VTABLE. */
7354 BINFO_VTABLE (binfo) = vtbl;
ca36f057 7355
23656158 7356 return inits;
ca36f057
MM
7357}
7358
1b746b0f
AP
7359static GTY(()) tree abort_fndecl_addr;
7360
90ecce3e 7361/* Construct the initializer for BINFO's virtual function table. BINFO
aabb4cd6 7362 is part of the hierarchy dominated by T. If we're building a
23656158 7363 construction vtable, the ORIG_BINFO is the binfo we should use to
9965d119
NS
7364 find the actual function pointers to put in the vtable - but they
7365 can be overridden on the path to most-derived in the graph that
7366 ORIG_BINFO belongs. Otherwise,
911a71a7 7367 ORIG_BINFO should be the same as BINFO. The RTTI_BINFO is the
23656158
MM
7368 BINFO that should be indicated by the RTTI information in the
7369 vtable; it will be a base class of T, rather than T itself, if we
7370 are building a construction vtable.
aabb4cd6
MM
7371
7372 The value returned is a TREE_LIST suitable for wrapping in a
7373 CONSTRUCTOR to use as the DECL_INITIAL for a vtable. If
7374 NON_FN_ENTRIES_P is not NULL, *NON_FN_ENTRIES_P is set to the
c8094d83 7375 number of non-function entries in the vtable.
911a71a7
MM
7376
7377 It might seem that this function should never be called with a
9965d119 7378 BINFO for which BINFO_PRIMARY_P holds, the vtable for such a
911a71a7 7379 base is always subsumed by a derived class vtable. However, when
9965d119 7380 we are building construction vtables, we do build vtables for
911a71a7
MM
7381 primary bases; we need these while the primary base is being
7382 constructed. */
ca36f057
MM
7383
7384static tree
94edc4ab 7385build_vtbl_initializer (tree binfo,
0cbd7506
MS
7386 tree orig_binfo,
7387 tree t,
7388 tree rtti_binfo,
7389 int* non_fn_entries_p)
ca36f057 7390{
d0cd8b44 7391 tree v, b;
911a71a7 7392 tree vfun_inits;
911a71a7 7393 vtbl_init_data vid;
58c42dc2
NS
7394 unsigned ix;
7395 tree vbinfo;
d4e6fecb 7396 VEC(tree,gc) *vbases;
c8094d83 7397
911a71a7 7398 /* Initialize VID. */
961192e1 7399 memset (&vid, 0, sizeof (vid));
911a71a7
MM
7400 vid.binfo = binfo;
7401 vid.derived = t;
73ea87d7 7402 vid.rtti_binfo = rtti_binfo;
911a71a7 7403 vid.last_init = &vid.inits;
539ed333
NS
7404 vid.primary_vtbl_p = SAME_BINFO_TYPE_P (BINFO_TYPE (binfo), t);
7405 vid.ctor_vtbl_p = !SAME_BINFO_TYPE_P (BINFO_TYPE (rtti_binfo), t);
548502d3 7406 vid.generate_vcall_entries = true;
c35cce41 7407 /* The first vbase or vcall offset is at index -3 in the vtable. */
ce552f75 7408 vid.index = ssize_int(-3 * TARGET_VTABLE_DATA_ENTRY_DISTANCE);
c35cce41 7409
9bab6c90 7410 /* Add entries to the vtable for RTTI. */
73ea87d7 7411 build_rtti_vtbl_entries (binfo, &vid);
9bab6c90 7412
b485e15b
MM
7413 /* Create an array for keeping track of the functions we've
7414 processed. When we see multiple functions with the same
7415 signature, we share the vcall offsets. */
1e625046 7416 vid.fns = VEC_alloc (tree, gc, 32);
c35cce41 7417 /* Add the vcall and vbase offset entries. */
911a71a7 7418 build_vcall_and_vbase_vtbl_entries (binfo, &vid);
c8094d83 7419
79cda2d1 7420 /* Clear BINFO_VTABLE_PATH_MARKED; it's set by
c35cce41 7421 build_vbase_offset_vtbl_entries. */
9ba5ff0f
NS
7422 for (vbases = CLASSTYPE_VBASECLASSES (t), ix = 0;
7423 VEC_iterate (tree, vbases, ix, vbinfo); ix++)
58c42dc2 7424 BINFO_VTABLE_PATH_MARKED (vbinfo) = 0;
ca36f057 7425
a6f5e048
RH
7426 /* If the target requires padding between data entries, add that now. */
7427 if (TARGET_VTABLE_DATA_ENTRY_DISTANCE > 1)
7428 {
7429 tree cur, *prev;
7430
7431 for (prev = &vid.inits; (cur = *prev); prev = &TREE_CHAIN (cur))
7432 {
7433 tree add = cur;
7434 int i;
7435
7436 for (i = 1; i < TARGET_VTABLE_DATA_ENTRY_DISTANCE; ++i)
7befdb9f 7437 add = tree_cons (NULL_TREE,
2e88ae22
SE
7438 build1 (NOP_EXPR, vtable_entry_type,
7439 null_pointer_node),
7befdb9f 7440 add);
a6f5e048
RH
7441 *prev = add;
7442 }
7443 }
7444
c35cce41 7445 if (non_fn_entries_p)
911a71a7 7446 *non_fn_entries_p = list_length (vid.inits);
ca36f057
MM
7447
7448 /* Go through all the ordinary virtual functions, building up
7449 initializers. */
c35cce41 7450 vfun_inits = NULL_TREE;
23656158 7451 for (v = BINFO_VIRTUALS (orig_binfo); v; v = TREE_CHAIN (v))
ca36f057
MM
7452 {
7453 tree delta;
7454 tree vcall_index;
4977bab6 7455 tree fn, fn_original;
f11ee281 7456 tree init = NULL_TREE;
c8094d83 7457
ca36f057 7458 fn = BV_FN (v);
07fa4878
NS
7459 fn_original = fn;
7460 if (DECL_THUNK_P (fn))
4977bab6 7461 {
07fa4878
NS
7462 if (!DECL_NAME (fn))
7463 finish_thunk (fn);
e00853fd 7464 if (THUNK_ALIAS (fn))
bb885938
NS
7465 {
7466 fn = THUNK_ALIAS (fn);
7467 BV_FN (v) = fn;
7468 }
07fa4878 7469 fn_original = THUNK_TARGET (fn);
4977bab6 7470 }
c8094d83 7471
d0cd8b44
JM
7472 /* If the only definition of this function signature along our
7473 primary base chain is from a lost primary, this vtable slot will
7474 never be used, so just zero it out. This is important to avoid
7475 requiring extra thunks which cannot be generated with the function.
7476
f11ee281
JM
7477 We first check this in update_vtable_entry_for_fn, so we handle
7478 restored primary bases properly; we also need to do it here so we
39a13be5 7479 zero out unused slots in ctor vtables, rather than filling them
f11ee281
JM
7480 with erroneous values (though harmless, apart from relocation
7481 costs). */
7482 for (b = binfo; ; b = get_primary_binfo (b))
7483 {
7484 /* We found a defn before a lost primary; go ahead as normal. */
4977bab6 7485 if (look_for_overrides_here (BINFO_TYPE (b), fn_original))
f11ee281
JM
7486 break;
7487
7488 /* The nearest definition is from a lost primary; clear the
7489 slot. */
7490 if (BINFO_LOST_PRIMARY_P (b))
7491 {
7492 init = size_zero_node;
d0cd8b44 7493 break;
f11ee281
JM
7494 }
7495 }
d0cd8b44 7496
f11ee281
JM
7497 if (! init)
7498 {
7499 /* Pull the offset for `this', and the function to call, out of
7500 the list. */
7501 delta = BV_DELTA (v);
548502d3 7502 vcall_index = BV_VCALL_INDEX (v);
f11ee281 7503
50bc768d
NS
7504 gcc_assert (TREE_CODE (delta) == INTEGER_CST);
7505 gcc_assert (TREE_CODE (fn) == FUNCTION_DECL);
f11ee281
JM
7506
7507 /* You can't call an abstract virtual function; it's abstract.
7508 So, we replace these functions with __pure_virtual. */
4977bab6 7509 if (DECL_PURE_VIRTUAL_P (fn_original))
4977bab6 7510 {
1b746b0f
AP
7511 fn = abort_fndecl;
7512 if (abort_fndecl_addr == NULL)
7513 abort_fndecl_addr = build1 (ADDR_EXPR, vfunc_ptr_type_node, fn);
7514 init = abort_fndecl_addr;
7515 }
7516 else
7517 {
7518 if (!integer_zerop (delta) || vcall_index)
7519 {
7520 fn = make_thunk (fn, /*this_adjusting=*/1, delta, vcall_index);
7521 if (!DECL_NAME (fn))
7522 finish_thunk (fn);
7523 }
7524 /* Take the address of the function, considering it to be of an
7525 appropriate generic type. */
7526 init = build1 (ADDR_EXPR, vfunc_ptr_type_node, fn);
4977bab6 7527 }
f11ee281 7528 }
d0cd8b44 7529
ca36f057 7530 /* And add it to the chain of initializers. */
67231816
RH
7531 if (TARGET_VTABLE_USES_DESCRIPTORS)
7532 {
7533 int i;
7534 if (init == size_zero_node)
7535 for (i = 0; i < TARGET_VTABLE_USES_DESCRIPTORS; ++i)
7536 vfun_inits = tree_cons (NULL_TREE, init, vfun_inits);
7537 else
7538 for (i = 0; i < TARGET_VTABLE_USES_DESCRIPTORS; ++i)
7539 {
f293ce4b
RS
7540 tree fdesc = build2 (FDESC_EXPR, vfunc_ptr_type_node,
7541 TREE_OPERAND (init, 0),
7d60be94 7542 build_int_cst (NULL_TREE, i));
67231816
RH
7543 TREE_CONSTANT (fdesc) = 1;
7544
7545 vfun_inits = tree_cons (NULL_TREE, fdesc, vfun_inits);
7546 }
7547 }
7548 else
0cbd7506 7549 vfun_inits = tree_cons (NULL_TREE, init, vfun_inits);
ca36f057
MM
7550 }
7551
c35cce41
MM
7552 /* The initializers for virtual functions were built up in reverse
7553 order; straighten them out now. */
7554 vfun_inits = nreverse (vfun_inits);
c8094d83 7555
9bab6c90 7556 /* The negative offset initializers are also in reverse order. */
911a71a7 7557 vid.inits = nreverse (vid.inits);
9bab6c90
MM
7558
7559 /* Chain the two together. */
911a71a7 7560 return chainon (vid.inits, vfun_inits);
ca36f057
MM
7561}
7562
d0cd8b44 7563/* Adds to vid->inits the initializers for the vbase and vcall
c35cce41 7564 offsets in BINFO, which is in the hierarchy dominated by T. */
ca36f057 7565
c35cce41 7566static void
94edc4ab 7567build_vcall_and_vbase_vtbl_entries (tree binfo, vtbl_init_data* vid)
ca36f057 7568{
c35cce41 7569 tree b;
8d08fdba 7570
c35cce41 7571 /* If this is a derived class, we must first create entries
9bab6c90 7572 corresponding to the primary base class. */
911a71a7 7573 b = get_primary_binfo (binfo);
c35cce41 7574 if (b)
911a71a7 7575 build_vcall_and_vbase_vtbl_entries (b, vid);
c35cce41
MM
7576
7577 /* Add the vbase entries for this base. */
911a71a7 7578 build_vbase_offset_vtbl_entries (binfo, vid);
c35cce41 7579 /* Add the vcall entries for this base. */
911a71a7 7580 build_vcall_offset_vtbl_entries (binfo, vid);
ca36f057 7581}
8d08fdba 7582
ca36f057
MM
7583/* Returns the initializers for the vbase offset entries in the vtable
7584 for BINFO (which is part of the class hierarchy dominated by T), in
c35cce41
MM
7585 reverse order. VBASE_OFFSET_INDEX gives the vtable index
7586 where the next vbase offset will go. */
8d08fdba 7587
c35cce41 7588static void
94edc4ab 7589build_vbase_offset_vtbl_entries (tree binfo, vtbl_init_data* vid)
ca36f057 7590{
c35cce41
MM
7591 tree vbase;
7592 tree t;
90b1ca2f 7593 tree non_primary_binfo;
8d08fdba 7594
ca36f057
MM
7595 /* If there are no virtual baseclasses, then there is nothing to
7596 do. */
5775a06a 7597 if (!CLASSTYPE_VBASECLASSES (BINFO_TYPE (binfo)))
c35cce41 7598 return;
ca36f057 7599
911a71a7 7600 t = vid->derived;
c8094d83 7601
90b1ca2f
NS
7602 /* We might be a primary base class. Go up the inheritance hierarchy
7603 until we find the most derived class of which we are a primary base:
7604 it is the offset of that which we need to use. */
7605 non_primary_binfo = binfo;
7606 while (BINFO_INHERITANCE_CHAIN (non_primary_binfo))
7607 {
7608 tree b;
7609
7610 /* If we have reached a virtual base, then it must be a primary
7611 base (possibly multi-level) of vid->binfo, or we wouldn't
7612 have called build_vcall_and_vbase_vtbl_entries for it. But it
7613 might be a lost primary, so just skip down to vid->binfo. */
809e3e7f 7614 if (BINFO_VIRTUAL_P (non_primary_binfo))
90b1ca2f
NS
7615 {
7616 non_primary_binfo = vid->binfo;
7617 break;
7618 }
7619
7620 b = BINFO_INHERITANCE_CHAIN (non_primary_binfo);
7621 if (get_primary_binfo (b) != non_primary_binfo)
7622 break;
7623 non_primary_binfo = b;
7624 }
ca36f057 7625
c35cce41
MM
7626 /* Go through the virtual bases, adding the offsets. */
7627 for (vbase = TYPE_BINFO (BINFO_TYPE (binfo));
7628 vbase;
7629 vbase = TREE_CHAIN (vbase))
7630 {
7631 tree b;
7632 tree delta;
c8094d83 7633
809e3e7f 7634 if (!BINFO_VIRTUAL_P (vbase))
c35cce41 7635 continue;
ca36f057 7636
c35cce41
MM
7637 /* Find the instance of this virtual base in the complete
7638 object. */
dbbf88d1 7639 b = copied_binfo (vbase, binfo);
c35cce41
MM
7640
7641 /* If we've already got an offset for this virtual base, we
7642 don't need another one. */
7643 if (BINFO_VTABLE_PATH_MARKED (b))
7644 continue;
dbbf88d1 7645 BINFO_VTABLE_PATH_MARKED (b) = 1;
c35cce41
MM
7646
7647 /* Figure out where we can find this vbase offset. */
c8094d83 7648 delta = size_binop (MULT_EXPR,
911a71a7 7649 vid->index,
c35cce41
MM
7650 convert (ssizetype,
7651 TYPE_SIZE_UNIT (vtable_entry_type)));
911a71a7 7652 if (vid->primary_vtbl_p)
c35cce41
MM
7653 BINFO_VPTR_FIELD (b) = delta;
7654
7655 if (binfo != TYPE_BINFO (t))
50bc768d
NS
7656 /* The vbase offset had better be the same. */
7657 gcc_assert (tree_int_cst_equal (delta, BINFO_VPTR_FIELD (vbase)));
c35cce41
MM
7658
7659 /* The next vbase will come at a more negative offset. */
a6f5e048
RH
7660 vid->index = size_binop (MINUS_EXPR, vid->index,
7661 ssize_int (TARGET_VTABLE_DATA_ENTRY_DISTANCE));
c35cce41
MM
7662
7663 /* The initializer is the delta from BINFO to this virtual base.
4e7512c9
MM
7664 The vbase offsets go in reverse inheritance-graph order, and
7665 we are walking in inheritance graph order so these end up in
7666 the right order. */
90b1ca2f 7667 delta = size_diffop (BINFO_OFFSET (b), BINFO_OFFSET (non_primary_binfo));
c8094d83
MS
7668
7669 *vid->last_init
9bab6c90 7670 = build_tree_list (NULL_TREE,
c8094d83 7671 fold_build1 (NOP_EXPR,
7866705a
SB
7672 vtable_entry_type,
7673 delta));
911a71a7 7674 vid->last_init = &TREE_CHAIN (*vid->last_init);
c35cce41 7675 }
8d08fdba 7676}
ca36f057 7677
b485e15b 7678/* Adds the initializers for the vcall offset entries in the vtable
d0cd8b44
JM
7679 for BINFO (which is part of the class hierarchy dominated by VID->DERIVED)
7680 to VID->INITS. */
b485e15b
MM
7681
7682static void
94edc4ab 7683build_vcall_offset_vtbl_entries (tree binfo, vtbl_init_data* vid)
b485e15b 7684{
548502d3
MM
7685 /* We only need these entries if this base is a virtual base. We
7686 compute the indices -- but do not add to the vtable -- when
7687 building the main vtable for a class. */
b9302915
MM
7688 if (binfo == TYPE_BINFO (vid->derived)
7689 || (BINFO_VIRTUAL_P (binfo)
7690 /* If BINFO is RTTI_BINFO, then (since BINFO does not
7691 correspond to VID->DERIVED), we are building a primary
7692 construction virtual table. Since this is a primary
7693 virtual table, we do not need the vcall offsets for
7694 BINFO. */
7695 && binfo != vid->rtti_binfo))
548502d3
MM
7696 {
7697 /* We need a vcall offset for each of the virtual functions in this
7698 vtable. For example:
b485e15b 7699
548502d3
MM
7700 class A { virtual void f (); };
7701 class B1 : virtual public A { virtual void f (); };
7702 class B2 : virtual public A { virtual void f (); };
7703 class C: public B1, public B2 { virtual void f (); };
d0cd8b44 7704
548502d3
MM
7705 A C object has a primary base of B1, which has a primary base of A. A
7706 C also has a secondary base of B2, which no longer has a primary base
7707 of A. So the B2-in-C construction vtable needs a secondary vtable for
7708 A, which will adjust the A* to a B2* to call f. We have no way of
7709 knowing what (or even whether) this offset will be when we define B2,
7710 so we store this "vcall offset" in the A sub-vtable and look it up in
7711 a "virtual thunk" for B2::f.
b485e15b 7712
548502d3
MM
7713 We need entries for all the functions in our primary vtable and
7714 in our non-virtual bases' secondary vtables. */
7715 vid->vbase = binfo;
7716 /* If we are just computing the vcall indices -- but do not need
7717 the actual entries -- not that. */
809e3e7f 7718 if (!BINFO_VIRTUAL_P (binfo))
548502d3
MM
7719 vid->generate_vcall_entries = false;
7720 /* Now, walk through the non-virtual bases, adding vcall offsets. */
7721 add_vcall_offset_vtbl_entries_r (binfo, vid);
7722 }
b485e15b
MM
7723}
7724
7725/* Build vcall offsets, starting with those for BINFO. */
7726
7727static void
94edc4ab 7728add_vcall_offset_vtbl_entries_r (tree binfo, vtbl_init_data* vid)
b485e15b
MM
7729{
7730 int i;
7731 tree primary_binfo;
fa743e8c 7732 tree base_binfo;
b485e15b
MM
7733
7734 /* Don't walk into virtual bases -- except, of course, for the
d0cd8b44
JM
7735 virtual base for which we are building vcall offsets. Any
7736 primary virtual base will have already had its offsets generated
7737 through the recursion in build_vcall_and_vbase_vtbl_entries. */
809e3e7f 7738 if (BINFO_VIRTUAL_P (binfo) && vid->vbase != binfo)
b485e15b 7739 return;
c8094d83 7740
b485e15b
MM
7741 /* If BINFO has a primary base, process it first. */
7742 primary_binfo = get_primary_binfo (binfo);
7743 if (primary_binfo)
7744 add_vcall_offset_vtbl_entries_r (primary_binfo, vid);
7745
7746 /* Add BINFO itself to the list. */
7747 add_vcall_offset_vtbl_entries_1 (binfo, vid);
7748
7749 /* Scan the non-primary bases of BINFO. */
fa743e8c
NS
7750 for (i = 0; BINFO_BASE_ITERATE (binfo, i, base_binfo); ++i)
7751 if (base_binfo != primary_binfo)
7752 add_vcall_offset_vtbl_entries_r (base_binfo, vid);
b485e15b
MM
7753}
7754
9965d119 7755/* Called from build_vcall_offset_vtbl_entries_r. */
e92cc029 7756
b485e15b 7757static void
94edc4ab 7758add_vcall_offset_vtbl_entries_1 (tree binfo, vtbl_init_data* vid)
8d08fdba 7759{
e6a66567
MM
7760 /* Make entries for the rest of the virtuals. */
7761 if (abi_version_at_least (2))
31f8e4f3 7762 {
e6a66567 7763 tree orig_fn;
911a71a7 7764
e6a66567
MM
7765 /* The ABI requires that the methods be processed in declaration
7766 order. G++ 3.2 used the order in the vtable. */
7767 for (orig_fn = TYPE_METHODS (BINFO_TYPE (binfo));
7768 orig_fn;
7769 orig_fn = TREE_CHAIN (orig_fn))
7770 if (DECL_VINDEX (orig_fn))
95675950 7771 add_vcall_offset (orig_fn, binfo, vid);
e6a66567
MM
7772 }
7773 else
7774 {
7775 tree derived_virtuals;
7776 tree base_virtuals;
7777 tree orig_virtuals;
7778 /* If BINFO is a primary base, the most derived class which has
7779 BINFO as a primary base; otherwise, just BINFO. */
7780 tree non_primary_binfo;
7781
7782 /* We might be a primary base class. Go up the inheritance hierarchy
7783 until we find the most derived class of which we are a primary base:
7784 it is the BINFO_VIRTUALS there that we need to consider. */
7785 non_primary_binfo = binfo;
7786 while (BINFO_INHERITANCE_CHAIN (non_primary_binfo))
911a71a7 7787 {
e6a66567
MM
7788 tree b;
7789
7790 /* If we have reached a virtual base, then it must be vid->vbase,
7791 because we ignore other virtual bases in
7792 add_vcall_offset_vtbl_entries_r. In turn, it must be a primary
7793 base (possibly multi-level) of vid->binfo, or we wouldn't
7794 have called build_vcall_and_vbase_vtbl_entries for it. But it
7795 might be a lost primary, so just skip down to vid->binfo. */
809e3e7f 7796 if (BINFO_VIRTUAL_P (non_primary_binfo))
e6a66567 7797 {
8dc2b103 7798 gcc_assert (non_primary_binfo == vid->vbase);
e6a66567
MM
7799 non_primary_binfo = vid->binfo;
7800 break;
7801 }
911a71a7 7802
e6a66567
MM
7803 b = BINFO_INHERITANCE_CHAIN (non_primary_binfo);
7804 if (get_primary_binfo (b) != non_primary_binfo)
7805 break;
7806 non_primary_binfo = b;
7807 }
4e7512c9 7808
e6a66567
MM
7809 if (vid->ctor_vtbl_p)
7810 /* For a ctor vtable we need the equivalent binfo within the hierarchy
7811 where rtti_binfo is the most derived type. */
dbbf88d1
NS
7812 non_primary_binfo
7813 = original_binfo (non_primary_binfo, vid->rtti_binfo);
c8094d83 7814
e6a66567
MM
7815 for (base_virtuals = BINFO_VIRTUALS (binfo),
7816 derived_virtuals = BINFO_VIRTUALS (non_primary_binfo),
7817 orig_virtuals = BINFO_VIRTUALS (TYPE_BINFO (BINFO_TYPE (binfo)));
7818 base_virtuals;
7819 base_virtuals = TREE_CHAIN (base_virtuals),
7820 derived_virtuals = TREE_CHAIN (derived_virtuals),
7821 orig_virtuals = TREE_CHAIN (orig_virtuals))
7822 {
7823 tree orig_fn;
73ea87d7 7824
e6a66567
MM
7825 /* Find the declaration that originally caused this function to
7826 be present in BINFO_TYPE (binfo). */
7827 orig_fn = BV_FN (orig_virtuals);
9bab6c90 7828
e6a66567
MM
7829 /* When processing BINFO, we only want to generate vcall slots for
7830 function slots introduced in BINFO. So don't try to generate
7831 one if the function isn't even defined in BINFO. */
539ed333 7832 if (!SAME_BINFO_TYPE_P (BINFO_TYPE (binfo), DECL_CONTEXT (orig_fn)))
e6a66567 7833 continue;
b485e15b 7834
95675950 7835 add_vcall_offset (orig_fn, binfo, vid);
e6a66567
MM
7836 }
7837 }
7838}
b485e15b 7839
95675950 7840/* Add a vcall offset entry for ORIG_FN to the vtable. */
b485e15b 7841
e6a66567 7842static void
95675950 7843add_vcall_offset (tree orig_fn, tree binfo, vtbl_init_data *vid)
e6a66567
MM
7844{
7845 size_t i;
7846 tree vcall_offset;
1e625046 7847 tree derived_entry;
9bab6c90 7848
e6a66567
MM
7849 /* If there is already an entry for a function with the same
7850 signature as FN, then we do not need a second vcall offset.
7851 Check the list of functions already present in the derived
7852 class vtable. */
c8094d83 7853 for (i = 0; VEC_iterate (tree, vid->fns, i, derived_entry); ++i)
e6a66567 7854 {
e6a66567
MM
7855 if (same_signature_p (derived_entry, orig_fn)
7856 /* We only use one vcall offset for virtual destructors,
7857 even though there are two virtual table entries. */
7858 || (DECL_DESTRUCTOR_P (derived_entry)
7859 && DECL_DESTRUCTOR_P (orig_fn)))
7860 return;
7861 }
4e7512c9 7862
e6a66567
MM
7863 /* If we are building these vcall offsets as part of building
7864 the vtable for the most derived class, remember the vcall
7865 offset. */
7866 if (vid->binfo == TYPE_BINFO (vid->derived))
0871761b 7867 {
d4e6fecb 7868 tree_pair_p elt = VEC_safe_push (tree_pair_s, gc,
0871761b
NS
7869 CLASSTYPE_VCALL_INDICES (vid->derived),
7870 NULL);
7871 elt->purpose = orig_fn;
7872 elt->value = vid->index;
7873 }
c8094d83 7874
e6a66567
MM
7875 /* The next vcall offset will be found at a more negative
7876 offset. */
7877 vid->index = size_binop (MINUS_EXPR, vid->index,
7878 ssize_int (TARGET_VTABLE_DATA_ENTRY_DISTANCE));
7879
7880 /* Keep track of this function. */
1e625046 7881 VEC_safe_push (tree, gc, vid->fns, orig_fn);
e6a66567
MM
7882
7883 if (vid->generate_vcall_entries)
7884 {
7885 tree base;
e6a66567 7886 tree fn;
548502d3 7887
e6a66567 7888 /* Find the overriding function. */
95675950 7889 fn = find_final_overrider (vid->rtti_binfo, binfo, orig_fn);
e6a66567
MM
7890 if (fn == error_mark_node)
7891 vcall_offset = build1 (NOP_EXPR, vtable_entry_type,
7892 integer_zero_node);
7893 else
7894 {
95675950
MM
7895 base = TREE_VALUE (fn);
7896
7897 /* The vbase we're working on is a primary base of
7898 vid->binfo. But it might be a lost primary, so its
7899 BINFO_OFFSET might be wrong, so we just use the
7900 BINFO_OFFSET from vid->binfo. */
7901 vcall_offset = size_diffop (BINFO_OFFSET (base),
7902 BINFO_OFFSET (vid->binfo));
7866705a
SB
7903 vcall_offset = fold_build1 (NOP_EXPR, vtable_entry_type,
7904 vcall_offset);
548502d3 7905 }
34cd5ae7 7906 /* Add the initializer to the vtable. */
e6a66567
MM
7907 *vid->last_init = build_tree_list (NULL_TREE, vcall_offset);
7908 vid->last_init = &TREE_CHAIN (*vid->last_init);
c35cce41 7909 }
570221c2 7910}
b54ccf71 7911
34cd5ae7 7912/* Return vtbl initializers for the RTTI entries corresponding to the
aabb4cd6 7913 BINFO's vtable. The RTTI entries should indicate the object given
73ea87d7 7914 by VID->rtti_binfo. */
b54ccf71 7915
9bab6c90 7916static void
94edc4ab 7917build_rtti_vtbl_entries (tree binfo, vtbl_init_data* vid)
b54ccf71 7918{
ca36f057 7919 tree b;
aabb4cd6 7920 tree t;
ca36f057 7921 tree basetype;
ca36f057
MM
7922 tree offset;
7923 tree decl;
7924 tree init;
b54ccf71 7925
ca36f057 7926 basetype = BINFO_TYPE (binfo);
73ea87d7 7927 t = BINFO_TYPE (vid->rtti_binfo);
b54ccf71 7928
ca36f057
MM
7929 /* To find the complete object, we will first convert to our most
7930 primary base, and then add the offset in the vtbl to that value. */
7931 b = binfo;
9965d119 7932 while (CLASSTYPE_HAS_PRIMARY_BASE_P (BINFO_TYPE (b))
0cbd7506 7933 && !BINFO_LOST_PRIMARY_P (b))
b54ccf71 7934 {
c35cce41
MM
7935 tree primary_base;
7936
911a71a7 7937 primary_base = get_primary_binfo (b);
fc6633e0
NS
7938 gcc_assert (BINFO_PRIMARY_P (primary_base)
7939 && BINFO_INHERITANCE_CHAIN (primary_base) == b);
c35cce41 7940 b = primary_base;
b54ccf71 7941 }
73ea87d7 7942 offset = size_diffop (BINFO_OFFSET (vid->rtti_binfo), BINFO_OFFSET (b));
8f032717 7943
8fa33dfa
MM
7944 /* The second entry is the address of the typeinfo object. */
7945 if (flag_rtti)
7993382e 7946 decl = build_address (get_tinfo_decl (t));
ca36f057 7947 else
8fa33dfa 7948 decl = integer_zero_node;
c8094d83 7949
8fa33dfa
MM
7950 /* Convert the declaration to a type that can be stored in the
7951 vtable. */
7993382e 7952 init = build_nop (vfunc_ptr_type_node, decl);
911a71a7
MM
7953 *vid->last_init = build_tree_list (NULL_TREE, init);
7954 vid->last_init = &TREE_CHAIN (*vid->last_init);
8f032717 7955
78dcd41a
VR
7956 /* Add the offset-to-top entry. It comes earlier in the vtable than
7957 the typeinfo entry. Convert the offset to look like a
c4372ef4 7958 function pointer, so that we can put it in the vtable. */
7993382e 7959 init = build_nop (vfunc_ptr_type_node, offset);
c4372ef4
NS
7960 *vid->last_init = build_tree_list (NULL_TREE, init);
7961 vid->last_init = &TREE_CHAIN (*vid->last_init);
8f032717 7962}
0f59171d
RH
7963
7964/* Fold a OBJ_TYPE_REF expression to the address of a function.
7965 KNOWN_TYPE carries the true type of OBJ_TYPE_REF_OBJECT(REF). */
7966
7967tree
7968cp_fold_obj_type_ref (tree ref, tree known_type)
7969{
7970 HOST_WIDE_INT index = tree_low_cst (OBJ_TYPE_REF_TOKEN (ref), 1);
7971 HOST_WIDE_INT i = 0;
604a3205 7972 tree v = BINFO_VIRTUALS (TYPE_BINFO (known_type));
0f59171d
RH
7973 tree fndecl;
7974
7975 while (i != index)
7976 {
7977 i += (TARGET_VTABLE_USES_DESCRIPTORS
7978 ? TARGET_VTABLE_USES_DESCRIPTORS : 1);
7979 v = TREE_CHAIN (v);
7980 }
7981
7982 fndecl = BV_FN (v);
7983
7984#ifdef ENABLE_CHECKING
8dc2b103
NS
7985 gcc_assert (tree_int_cst_equal (OBJ_TYPE_REF_TOKEN (ref),
7986 DECL_VINDEX (fndecl)));
0f59171d
RH
7987#endif
7988
8634c649
JJ
7989 cgraph_node (fndecl)->local.vtable_method = true;
7990
0f59171d
RH
7991 return build_address (fndecl);
7992}
d7afec4b 7993
1b746b0f 7994#include "gt-cp-class.h"