]> git.ipfire.org Git - thirdparty/gcc.git/blame - gcc/cp/class.c
call.c (alloc_conversion): Use cast when converting from void *.
[thirdparty/gcc.git] / gcc / cp / class.c
CommitLineData
8d08fdba 1/* Functions related to building classes and their related objects.
06ceef4e 2 Copyright (C) 1987, 1992, 1993, 1994, 1995, 1996, 1997, 1998,
0a57b6af 3 1999, 2000, 2001, 2002, 2003, 2004, 2005 Free Software Foundation, Inc.
8d08fdba
MS
4 Contributed by Michael Tiemann (tiemann@cygnus.com)
5
f5adbb8d 6This file is part of GCC.
8d08fdba 7
f5adbb8d 8GCC is free software; you can redistribute it and/or modify
8d08fdba
MS
9it under the terms of the GNU General Public License as published by
10the Free Software Foundation; either version 2, or (at your option)
11any later version.
12
f5adbb8d 13GCC is distributed in the hope that it will be useful,
8d08fdba
MS
14but WITHOUT ANY WARRANTY; without even the implied warranty of
15MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16GNU General Public License for more details.
17
18You should have received a copy of the GNU General Public License
f5adbb8d 19along with GCC; see the file COPYING. If not, write to
1788952f
KC
20the Free Software Foundation, 51 Franklin Street, Fifth Floor,
21Boston, MA 02110-1301, USA. */
8d08fdba
MS
22
23
e92cc029 24/* High-level class interface. */
8d08fdba
MS
25
26#include "config.h"
8d052bc7 27#include "system.h"
4977bab6
ZW
28#include "coretypes.h"
29#include "tm.h"
e7a587ef 30#include "tree.h"
8d08fdba
MS
31#include "cp-tree.h"
32#include "flags.h"
28cbf42c 33#include "rtl.h"
e8abc66f 34#include "output.h"
54f92bfb 35#include "toplev.h"
1af6141b 36#include "target.h"
7b6d72fc 37#include "convert.h"
8634c649 38#include "cgraph.h"
ef330312 39#include "tree-dump.h"
8d08fdba 40
61a127b3
MM
41/* The number of nested classes being processed. If we are not in the
42 scope of any class, this is zero. */
43
8d08fdba
MS
44int current_class_depth;
45
61a127b3
MM
46/* In order to deal with nested classes, we keep a stack of classes.
47 The topmost entry is the innermost class, and is the entry at index
48 CURRENT_CLASS_DEPTH */
49
50typedef struct class_stack_node {
51 /* The name of the class. */
52 tree name;
53
54 /* The _TYPE node for the class. */
55 tree type;
56
57 /* The access specifier pending for new declarations in the scope of
58 this class. */
59 tree access;
8f032717
MM
60
61 /* If were defining TYPE, the names used in this class. */
62 splay_tree names_used;
c888c93b
MM
63
64 /* Nonzero if this class is no longer open, because of a call to
65 push_to_top_level. */
66 size_t hidden;
61a127b3
MM
67}* class_stack_node_t;
68
911a71a7 69typedef struct vtbl_init_data_s
c35cce41 70{
911a71a7
MM
71 /* The base for which we're building initializers. */
72 tree binfo;
73ea87d7 73 /* The type of the most-derived type. */
c35cce41 74 tree derived;
73ea87d7
NS
75 /* The binfo for the dynamic type. This will be TYPE_BINFO (derived),
76 unless ctor_vtbl_p is true. */
77 tree rtti_binfo;
9bab6c90
MM
78 /* The negative-index vtable initializers built up so far. These
79 are in order from least negative index to most negative index. */
80 tree inits;
d0cd8b44 81 /* The last (i.e., most negative) entry in INITS. */
9bab6c90 82 tree* last_init;
c35cce41 83 /* The binfo for the virtual base for which we're building
911a71a7 84 vcall offset initializers. */
c35cce41 85 tree vbase;
9bab6c90
MM
86 /* The functions in vbase for which we have already provided vcall
87 offsets. */
1e625046 88 VEC(tree,gc) *fns;
c35cce41
MM
89 /* The vtable index of the next vcall or vbase offset. */
90 tree index;
91 /* Nonzero if we are building the initializer for the primary
92 vtable. */
911a71a7
MM
93 int primary_vtbl_p;
94 /* Nonzero if we are building the initializer for a construction
95 vtable. */
96 int ctor_vtbl_p;
548502d3
MM
97 /* True when adding vcall offset entries to the vtable. False when
98 merely computing the indices. */
99 bool generate_vcall_entries;
911a71a7 100} vtbl_init_data;
c35cce41 101
c20118a8 102/* The type of a function passed to walk_subobject_offsets. */
94edc4ab 103typedef int (*subobject_offset_fn) (tree, tree, splay_tree);
c20118a8 104
4639c5c6 105/* The stack itself. This is a dynamically resized array. The
61a127b3
MM
106 number of elements allocated is CURRENT_CLASS_STACK_SIZE. */
107static int current_class_stack_size;
108static class_stack_node_t current_class_stack;
109
c5a35c3c
MM
110/* The size of the largest empty class seen in this translation unit. */
111static GTY (()) tree sizeof_biggest_empty_class;
112
1f6e1acc
AS
113/* An array of all local classes present in this translation unit, in
114 declaration order. */
806aa901 115VEC(tree,gc) *local_classes;
1f6e1acc 116
94edc4ab
NN
117static tree get_vfield_name (tree);
118static void finish_struct_anon (tree);
119static tree get_vtable_name (tree);
120static tree get_basefndecls (tree, tree);
121static int build_primary_vtable (tree, tree);
dbbf88d1 122static int build_secondary_vtable (tree);
94edc4ab
NN
123static void finish_vtbls (tree);
124static void modify_vtable_entry (tree, tree, tree, tree, tree *);
94edc4ab
NN
125static void finish_struct_bits (tree);
126static int alter_access (tree, tree, tree);
127static void handle_using_decl (tree, tree);
94edc4ab
NN
128static tree dfs_modify_vtables (tree, void *);
129static tree modify_all_vtables (tree, tree);
fc6633e0 130static void determine_primary_bases (tree);
94edc4ab
NN
131static void finish_struct_methods (tree);
132static void maybe_warn_about_overly_private_class (tree);
94edc4ab
NN
133static int method_name_cmp (const void *, const void *);
134static int resort_method_name_cmp (const void *, const void *);
e5e459bf 135static void add_implicitly_declared_members (tree, int, int);
94edc4ab 136static tree fixed_type_or_null (tree, int *, int *);
92af500d
NS
137static tree resolve_address_of_overloaded_function (tree, tree, tsubst_flags_t,
138 bool, tree);
00bfffa4 139static tree build_simple_base_path (tree expr, tree binfo);
94edc4ab
NN
140static tree build_vtbl_ref_1 (tree, tree);
141static tree build_vtbl_initializer (tree, tree, tree, tree, int *);
142static int count_fields (tree);
d07605f5 143static int add_fields_to_record_type (tree, struct sorted_fields_type*, int);
94edc4ab 144static void check_bitfield_decl (tree);
e5e459bf
AO
145static void check_field_decl (tree, tree, int *, int *, int *);
146static void check_field_decls (tree, tree *, int *, int *);
58731fd1
MM
147static tree *build_base_field (record_layout_info, tree, splay_tree, tree *);
148static void build_base_fields (record_layout_info, splay_tree, tree *);
94edc4ab
NN
149static void check_methods (tree);
150static void remove_zero_width_bit_fields (tree);
e5e459bf 151static void check_bases (tree, int *, int *);
58731fd1
MM
152static void check_bases_and_members (tree);
153static tree create_vtable_ptr (tree, tree *);
17bbb839 154static void include_empty_classes (record_layout_info);
e93ee644 155static void layout_class_type (tree, tree *);
94edc4ab
NN
156static void fixup_pending_inline (tree);
157static void fixup_inline_methods (tree);
dbbf88d1 158static void propagate_binfo_offsets (tree, tree);
17bbb839 159static void layout_virtual_bases (record_layout_info, splay_tree);
94edc4ab
NN
160static void build_vbase_offset_vtbl_entries (tree, vtbl_init_data *);
161static void add_vcall_offset_vtbl_entries_r (tree, vtbl_init_data *);
162static void add_vcall_offset_vtbl_entries_1 (tree, vtbl_init_data *);
163static void build_vcall_offset_vtbl_entries (tree, vtbl_init_data *);
e6a66567 164static void add_vcall_offset (tree, tree, vtbl_init_data *);
94edc4ab 165static void layout_vtable_decl (tree, int);
5d5a519f 166static tree dfs_find_final_overrider_pre (tree, void *);
dbbf88d1 167static tree dfs_find_final_overrider_post (tree, void *);
94edc4ab
NN
168static tree find_final_overrider (tree, tree, tree);
169static int make_new_vtable (tree, tree);
b5791fdc 170static tree get_primary_binfo (tree);
94edc4ab 171static int maybe_indent_hierarchy (FILE *, int, int);
dbbf88d1 172static tree dump_class_hierarchy_r (FILE *, int, tree, tree, int);
94edc4ab 173static void dump_class_hierarchy (tree);
bb885938 174static void dump_class_hierarchy_1 (FILE *, int, tree);
94edc4ab
NN
175static void dump_array (FILE *, tree);
176static void dump_vtable (tree, tree, tree);
177static void dump_vtt (tree, tree);
bb885938 178static void dump_thunk (FILE *, int, tree);
94edc4ab
NN
179static tree build_vtable (tree, tree, tree);
180static void initialize_vtable (tree, tree);
94edc4ab 181static void layout_nonempty_base_or_field (record_layout_info,
5d5a519f 182 tree, tree, splay_tree);
94edc4ab 183static tree end_of_class (tree, int);
dbbf88d1 184static bool layout_empty_base (tree, tree, splay_tree);
94edc4ab
NN
185static void accumulate_vtbl_inits (tree, tree, tree, tree, tree);
186static tree dfs_accumulate_vtbl_inits (tree, tree, tree, tree,
187 tree);
188static void build_rtti_vtbl_entries (tree, vtbl_init_data *);
5d5a519f 189static void build_vcall_and_vbase_vtbl_entries (tree, vtbl_init_data *);
94edc4ab
NN
190static void clone_constructors_and_destructors (tree);
191static tree build_clone (tree, tree);
a2ddc397 192static void update_vtable_entry_for_fn (tree, tree, tree, tree *, unsigned);
94edc4ab
NN
193static void build_ctor_vtbl_group (tree, tree);
194static void build_vtt (tree);
195static tree binfo_ctor_vtable (tree);
196static tree *build_vtt_inits (tree, tree, tree *, tree *);
197static tree dfs_build_secondary_vptr_vtt_inits (tree, void *);
94edc4ab 198static tree dfs_fixup_binfo_vtbls (tree, void *);
94edc4ab
NN
199static int record_subobject_offset (tree, tree, splay_tree);
200static int check_subobject_offset (tree, tree, splay_tree);
201static int walk_subobject_offsets (tree, subobject_offset_fn,
5d5a519f 202 tree, splay_tree, tree, int);
c5a35c3c 203static void record_subobject_offsets (tree, tree, splay_tree, bool);
94edc4ab
NN
204static int layout_conflict_p (tree, tree, splay_tree, int);
205static int splay_tree_compare_integer_csts (splay_tree_key k1,
5d5a519f 206 splay_tree_key k2);
94edc4ab
NN
207static void warn_about_ambiguous_bases (tree);
208static bool type_requires_array_cookie (tree);
956d9305 209static bool contains_empty_class_p (tree);
9368208b 210static bool base_derived_from (tree, tree);
7ba539c6 211static int empty_base_at_nonzero_offset_p (tree, tree, splay_tree);
ba9a991f 212static tree end_of_base (tree);
548502d3 213static tree get_vcall_index (tree, tree);
9965d119 214
51c184be 215/* Variables shared between class.c and call.c. */
8d08fdba 216
5566b478 217#ifdef GATHER_STATISTICS
8d08fdba
MS
218int n_vtables = 0;
219int n_vtable_entries = 0;
220int n_vtable_searches = 0;
221int n_vtable_elems = 0;
222int n_convert_harshness = 0;
223int n_compute_conversion_costs = 0;
8d08fdba 224int n_inner_fields_searched = 0;
5566b478 225#endif
8d08fdba 226
338d90b8
NS
227/* Convert to or from a base subobject. EXPR is an expression of type
228 `A' or `A*', an expression of type `B' or `B*' is returned. To
229 convert A to a base B, CODE is PLUS_EXPR and BINFO is the binfo for
230 the B base instance within A. To convert base A to derived B, CODE
231 is MINUS_EXPR and BINFO is the binfo for the A instance within B.
232 In this latter case, A must not be a morally virtual base of B.
233 NONNULL is true if EXPR is known to be non-NULL (this is only
234 needed when EXPR is of pointer type). CV qualifiers are preserved
235 from EXPR. */
ca36f057
MM
236
237tree
94edc4ab 238build_base_path (enum tree_code code,
0cbd7506
MS
239 tree expr,
240 tree binfo,
241 int nonnull)
1a588ad7 242{
338d90b8 243 tree v_binfo = NULL_TREE;
6bc34b14 244 tree d_binfo = NULL_TREE;
338d90b8
NS
245 tree probe;
246 tree offset;
247 tree target_type;
248 tree null_test = NULL;
249 tree ptr_target_type;
ca36f057 250 int fixed_type_p;
338d90b8 251 int want_pointer = TREE_CODE (TREE_TYPE (expr)) == POINTER_TYPE;
00bfffa4 252 bool has_empty = false;
d7981fd9 253 bool virtual_access;
1a588ad7 254
338d90b8
NS
255 if (expr == error_mark_node || binfo == error_mark_node || !binfo)
256 return error_mark_node;
6bc34b14
JM
257
258 for (probe = binfo; probe; probe = BINFO_INHERITANCE_CHAIN (probe))
259 {
260 d_binfo = probe;
00bfffa4
JM
261 if (is_empty_class (BINFO_TYPE (probe)))
262 has_empty = true;
809e3e7f 263 if (!v_binfo && BINFO_VIRTUAL_P (probe))
6bc34b14
JM
264 v_binfo = probe;
265 }
338d90b8
NS
266
267 probe = TYPE_MAIN_VARIANT (TREE_TYPE (expr));
268 if (want_pointer)
269 probe = TYPE_MAIN_VARIANT (TREE_TYPE (probe));
00bfffa4 270
539ed333
NS
271 gcc_assert ((code == MINUS_EXPR
272 && SAME_BINFO_TYPE_P (BINFO_TYPE (binfo), probe))
273 || (code == PLUS_EXPR
274 && SAME_BINFO_TYPE_P (BINFO_TYPE (d_binfo), probe)));
c8094d83 275
00bfffa4
JM
276 if (binfo == d_binfo)
277 /* Nothing to do. */
278 return expr;
279
338d90b8
NS
280 if (code == MINUS_EXPR && v_binfo)
281 {
1f070f2b 282 error ("cannot convert from base %qT to derived type %qT via virtual base %qT",
6bc34b14 283 BINFO_TYPE (binfo), BINFO_TYPE (d_binfo), BINFO_TYPE (v_binfo));
338d90b8
NS
284 return error_mark_node;
285 }
1a588ad7 286
f576dfc4
JM
287 if (!want_pointer)
288 /* This must happen before the call to save_expr. */
289 expr = build_unary_op (ADDR_EXPR, expr, 0);
290
00bfffa4 291 offset = BINFO_OFFSET (binfo);
ca36f057 292 fixed_type_p = resolves_to_fixed_type_p (expr, &nonnull);
0e686aa6 293 target_type = code == PLUS_EXPR ? BINFO_TYPE (binfo) : BINFO_TYPE (d_binfo);
00bfffa4 294
d7981fd9
JM
295 /* Do we need to look in the vtable for the real offset? */
296 virtual_access = (v_binfo && fixed_type_p <= 0);
297
298 /* Do we need to check for a null pointer? */
0e686aa6
MM
299 if (want_pointer && !nonnull)
300 {
301 /* If we know the conversion will not actually change the value
302 of EXPR, then we can avoid testing the expression for NULL.
303 We have to avoid generating a COMPONENT_REF for a base class
304 field, because other parts of the compiler know that such
305 expressions are always non-NULL. */
306 if (!virtual_access && integer_zerop (offset))
307 return build_nop (build_pointer_type (target_type), expr);
308 null_test = error_mark_node;
309 }
00bfffa4 310
d7981fd9
JM
311 /* Protect against multiple evaluation if necessary. */
312 if (TREE_SIDE_EFFECTS (expr) && (null_test || virtual_access))
ca36f057 313 expr = save_expr (expr);
f2606a97 314
d7981fd9 315 /* Now that we've saved expr, build the real null test. */
00bfffa4 316 if (null_test)
471a58a9
AP
317 {
318 tree zero = cp_convert (TREE_TYPE (expr), integer_zero_node);
7866705a
SB
319 null_test = fold_build2 (NE_EXPR, boolean_type_node,
320 expr, zero);
471a58a9 321 }
00bfffa4
JM
322
323 /* If this is a simple base reference, express it as a COMPONENT_REF. */
d7981fd9 324 if (code == PLUS_EXPR && !virtual_access
00bfffa4
JM
325 /* We don't build base fields for empty bases, and they aren't very
326 interesting to the optimizers anyway. */
327 && !has_empty)
328 {
329 expr = build_indirect_ref (expr, NULL);
330 expr = build_simple_base_path (expr, binfo);
331 if (want_pointer)
442c8e31 332 expr = build_address (expr);
00bfffa4
JM
333 target_type = TREE_TYPE (expr);
334 goto out;
335 }
336
d7981fd9 337 if (virtual_access)
1a588ad7 338 {
338d90b8 339 /* Going via virtual base V_BINFO. We need the static offset
0cbd7506
MS
340 from V_BINFO to BINFO, and the dynamic offset from D_BINFO to
341 V_BINFO. That offset is an entry in D_BINFO's vtable. */
1f5a253a
NS
342 tree v_offset;
343
344 if (fixed_type_p < 0 && in_base_initializer)
345 {
2acb1af9
NS
346 /* In a base member initializer, we cannot rely on the
347 vtable being set up. We have to indirect via the
348 vtt_parm. */
6de9cd9a
DN
349 tree t;
350
2acb1af9 351 t = TREE_TYPE (TYPE_VFIELD (current_class_type));
6de9cd9a
DN
352 t = build_pointer_type (t);
353 v_offset = convert (t, current_vtt_parm);
6de9cd9a 354 v_offset = build_indirect_ref (v_offset, NULL);
1f5a253a
NS
355 }
356 else
357 v_offset = build_vfield_ref (build_indirect_ref (expr, NULL),
358 TREE_TYPE (TREE_TYPE (expr)));
c8094d83 359
f293ce4b
RS
360 v_offset = build2 (PLUS_EXPR, TREE_TYPE (v_offset),
361 v_offset, BINFO_VPTR_FIELD (v_binfo));
c8094d83 362 v_offset = build1 (NOP_EXPR,
338d90b8
NS
363 build_pointer_type (ptrdiff_type_node),
364 v_offset);
365 v_offset = build_indirect_ref (v_offset, NULL);
6de9cd9a
DN
366 TREE_CONSTANT (v_offset) = 1;
367 TREE_INVARIANT (v_offset) = 1;
f63ab951 368
7b6d72fc 369 offset = convert_to_integer (ptrdiff_type_node,
c8094d83 370 size_diffop (offset,
7b6d72fc 371 BINFO_OFFSET (v_binfo)));
8d08fdba 372
338d90b8 373 if (!integer_zerop (offset))
f293ce4b 374 v_offset = build2 (code, ptrdiff_type_node, v_offset, offset);
f2606a97
JM
375
376 if (fixed_type_p < 0)
377 /* Negative fixed_type_p means this is a constructor or destructor;
378 virtual base layout is fixed in in-charge [cd]tors, but not in
379 base [cd]tors. */
f293ce4b
RS
380 offset = build3 (COND_EXPR, ptrdiff_type_node,
381 build2 (EQ_EXPR, boolean_type_node,
382 current_in_charge_parm, integer_zero_node),
383 v_offset,
aa8f5c20
AP
384 convert_to_integer (ptrdiff_type_node,
385 BINFO_OFFSET (binfo)));
338d90b8
NS
386 else
387 offset = v_offset;
8d08fdba 388 }
8d08fdba 389
338d90b8
NS
390 target_type = cp_build_qualified_type
391 (target_type, cp_type_quals (TREE_TYPE (TREE_TYPE (expr))));
392 ptr_target_type = build_pointer_type (target_type);
393 if (want_pointer)
394 target_type = ptr_target_type;
c8094d83 395
338d90b8 396 expr = build1 (NOP_EXPR, ptr_target_type, expr);
fed3cef0 397
338d90b8 398 if (!integer_zerop (offset))
f293ce4b 399 expr = build2 (code, ptr_target_type, expr, offset);
8d08fdba 400 else
338d90b8 401 null_test = NULL;
c8094d83 402
338d90b8
NS
403 if (!want_pointer)
404 expr = build_indirect_ref (expr, NULL);
8d08fdba 405
00bfffa4 406 out:
338d90b8 407 if (null_test)
7866705a
SB
408 expr = fold_build3 (COND_EXPR, target_type, null_test, expr,
409 fold_build1 (NOP_EXPR, target_type,
410 integer_zero_node));
f2606a97 411
338d90b8 412 return expr;
8d08fdba
MS
413}
414
00bfffa4
JM
415/* Subroutine of build_base_path; EXPR and BINFO are as in that function.
416 Perform a derived-to-base conversion by recursively building up a
417 sequence of COMPONENT_REFs to the appropriate base fields. */
418
419static tree
420build_simple_base_path (tree expr, tree binfo)
421{
422 tree type = BINFO_TYPE (binfo);
fc6633e0 423 tree d_binfo = BINFO_INHERITANCE_CHAIN (binfo);
00bfffa4
JM
424 tree field;
425
00bfffa4
JM
426 if (d_binfo == NULL_TREE)
427 {
12a669d1 428 tree temp;
c8094d83 429
8dc2b103 430 gcc_assert (TYPE_MAIN_VARIANT (TREE_TYPE (expr)) == type);
c8094d83 431
12a669d1 432 /* Transform `(a, b).x' into `(*(a, &b)).x', `(a ? b : c).x'
0cbd7506
MS
433 into `(*(a ? &b : &c)).x', and so on. A COND_EXPR is only
434 an lvalue in the frontend; only _DECLs and _REFs are lvalues
435 in the backend. */
12a669d1
NS
436 temp = unary_complex_lvalue (ADDR_EXPR, expr);
437 if (temp)
438 expr = build_indirect_ref (temp, NULL);
439
00bfffa4
JM
440 return expr;
441 }
442
443 /* Recurse. */
444 expr = build_simple_base_path (expr, d_binfo);
445
446 for (field = TYPE_FIELDS (BINFO_TYPE (d_binfo));
447 field; field = TREE_CHAIN (field))
448 /* Is this the base field created by build_base_field? */
449 if (TREE_CODE (field) == FIELD_DECL
642124c6
RH
450 && DECL_FIELD_IS_BASE (field)
451 && TREE_TYPE (field) == type)
12a669d1
NS
452 {
453 /* We don't use build_class_member_access_expr here, as that
454 has unnecessary checks, and more importantly results in
455 recursive calls to dfs_walk_once. */
456 int type_quals = cp_type_quals (TREE_TYPE (expr));
457
458 expr = build3 (COMPONENT_REF,
459 cp_build_qualified_type (type, type_quals),
460 expr, field, NULL_TREE);
461 expr = fold_if_not_in_template (expr);
c8094d83 462
12a669d1
NS
463 /* Mark the expression const or volatile, as appropriate.
464 Even though we've dealt with the type above, we still have
465 to mark the expression itself. */
466 if (type_quals & TYPE_QUAL_CONST)
467 TREE_READONLY (expr) = 1;
468 if (type_quals & TYPE_QUAL_VOLATILE)
469 TREE_THIS_VOLATILE (expr) = 1;
c8094d83 470
12a669d1
NS
471 return expr;
472 }
00bfffa4
JM
473
474 /* Didn't find the base field?!? */
8dc2b103 475 gcc_unreachable ();
00bfffa4
JM
476}
477
08e17d9d
MM
478/* Convert OBJECT to the base TYPE. OBJECT is an expression whose
479 type is a class type or a pointer to a class type. In the former
480 case, TYPE is also a class type; in the latter it is another
481 pointer type. If CHECK_ACCESS is true, an error message is emitted
482 if TYPE is inaccessible. If OBJECT has pointer type, the value is
483 assumed to be non-NULL. */
50ad9642
MM
484
485tree
08e17d9d 486convert_to_base (tree object, tree type, bool check_access, bool nonnull)
50ad9642
MM
487{
488 tree binfo;
08e17d9d 489 tree object_type;
50ad9642 490
08e17d9d
MM
491 if (TYPE_PTR_P (TREE_TYPE (object)))
492 {
493 object_type = TREE_TYPE (TREE_TYPE (object));
494 type = TREE_TYPE (type);
495 }
496 else
497 object_type = TREE_TYPE (object);
498
499 binfo = lookup_base (object_type, type,
c8094d83 500 check_access ? ba_check : ba_unique,
50ad9642 501 NULL);
5bfc90de 502 if (!binfo || binfo == error_mark_node)
50ad9642
MM
503 return error_mark_node;
504
08e17d9d 505 return build_base_path (PLUS_EXPR, object, binfo, nonnull);
50ad9642
MM
506}
507
539ed333
NS
508/* EXPR is an expression with unqualified class type. BASE is a base
509 binfo of that class type. Returns EXPR, converted to the BASE
22ed7e5f
MM
510 type. This function assumes that EXPR is the most derived class;
511 therefore virtual bases can be found at their static offsets. */
512
513tree
514convert_to_base_statically (tree expr, tree base)
515{
516 tree expr_type;
517
518 expr_type = TREE_TYPE (expr);
539ed333 519 if (!SAME_BINFO_TYPE_P (BINFO_TYPE (base), expr_type))
22ed7e5f
MM
520 {
521 tree pointer_type;
522
523 pointer_type = build_pointer_type (expr_type);
524 expr = build_unary_op (ADDR_EXPR, expr, /*noconvert=*/1);
525 if (!integer_zerop (BINFO_OFFSET (base)))
c8094d83 526 expr = build2 (PLUS_EXPR, pointer_type, expr,
f293ce4b 527 build_nop (pointer_type, BINFO_OFFSET (base)));
22ed7e5f
MM
528 expr = build_nop (build_pointer_type (BINFO_TYPE (base)), expr);
529 expr = build1 (INDIRECT_REF, BINFO_TYPE (base), expr);
530 }
531
532 return expr;
533}
534
f8361147 535\f
981c353e
RH
536tree
537build_vfield_ref (tree datum, tree type)
538{
539 tree vfield, vcontext;
540
541 if (datum == error_mark_node)
542 return error_mark_node;
543
981c353e
RH
544 /* First, convert to the requested type. */
545 if (!same_type_ignoring_top_level_qualifiers_p (TREE_TYPE (datum), type))
08e17d9d
MM
546 datum = convert_to_base (datum, type, /*check_access=*/false,
547 /*nonnull=*/true);
981c353e
RH
548
549 /* Second, the requested type may not be the owner of its own vptr.
550 If not, convert to the base class that owns it. We cannot use
551 convert_to_base here, because VCONTEXT may appear more than once
5995ebfb 552 in the inheritance hierarchy of TYPE, and thus direct conversion
981c353e
RH
553 between the types may be ambiguous. Following the path back up
554 one step at a time via primary bases avoids the problem. */
555 vfield = TYPE_VFIELD (type);
556 vcontext = DECL_CONTEXT (vfield);
557 while (!same_type_ignoring_top_level_qualifiers_p (vcontext, type))
558 {
559 datum = build_simple_base_path (datum, CLASSTYPE_PRIMARY_BINFO (type));
560 type = TREE_TYPE (datum);
561 }
562
563 return build3 (COMPONENT_REF, TREE_TYPE (vfield), datum, vfield, NULL_TREE);
564}
565
8d08fdba 566/* Given an object INSTANCE, return an expression which yields the
67231816
RH
567 vtable element corresponding to INDEX. There are many special
568 cases for INSTANCE which we take care of here, mainly to avoid
569 creating extra tree nodes when we don't have to. */
e92cc029 570
4a8d0c9c 571static tree
94edc4ab 572build_vtbl_ref_1 (tree instance, tree idx)
8d08fdba 573{
f63ab951
JM
574 tree aref;
575 tree vtbl = NULL_TREE;
8d08fdba 576
f63ab951
JM
577 /* Try to figure out what a reference refers to, and
578 access its virtual function table directly. */
579
580 int cdtorp = 0;
581 tree fixed_type = fixed_type_or_null (instance, NULL, &cdtorp);
582
ee76b931 583 tree basetype = non_reference (TREE_TYPE (instance));
8d08fdba 584
f63ab951 585 if (fixed_type && !cdtorp)
8d08fdba 586 {
f63ab951 587 tree binfo = lookup_base (fixed_type, basetype,
18e4be85 588 ba_unique | ba_quiet, NULL);
f63ab951 589 if (binfo)
6de9cd9a 590 vtbl = unshare_expr (BINFO_VTABLE (binfo));
f63ab951 591 }
8d08fdba 592
f63ab951 593 if (!vtbl)
dbbf88d1 594 vtbl = build_vfield_ref (instance, basetype);
c8094d83 595
e3417fcd 596 assemble_external (vtbl);
a1dd0d36 597
8d08fdba 598 aref = build_array_ref (vtbl, idx);
6de9cd9a
DN
599 TREE_CONSTANT (aref) |= TREE_CONSTANT (vtbl) && TREE_CONSTANT (idx);
600 TREE_INVARIANT (aref) = TREE_CONSTANT (aref);
8d08fdba 601
c4372ef4 602 return aref;
8d08fdba
MS
603}
604
4a8d0c9c 605tree
94edc4ab 606build_vtbl_ref (tree instance, tree idx)
4a8d0c9c
RH
607{
608 tree aref = build_vtbl_ref_1 (instance, idx);
609
4a8d0c9c
RH
610 return aref;
611}
612
0f59171d
RH
613/* Given a stable object pointer INSTANCE_PTR, return an expression which
614 yields a function pointer corresponding to vtable element INDEX. */
67231816
RH
615
616tree
0f59171d 617build_vfn_ref (tree instance_ptr, tree idx)
67231816 618{
0f59171d
RH
619 tree aref;
620
621 aref = build_vtbl_ref_1 (build_indirect_ref (instance_ptr, 0), idx);
67231816
RH
622
623 /* When using function descriptors, the address of the
624 vtable entry is treated as a function pointer. */
625 if (TARGET_VTABLE_USES_DESCRIPTORS)
4a8d0c9c 626 aref = build1 (NOP_EXPR, TREE_TYPE (aref),
67231816
RH
627 build_unary_op (ADDR_EXPR, aref, /*noconvert=*/1));
628
0f59171d 629 /* Remember this as a method reference, for later devirtualization. */
f293ce4b 630 aref = build3 (OBJ_TYPE_REF, TREE_TYPE (aref), aref, instance_ptr, idx);
0f59171d 631
67231816
RH
632 return aref;
633}
634
669ec2b4
JM
635/* Return the name of the virtual function table (as an IDENTIFIER_NODE)
636 for the given TYPE. */
637
638static tree
94edc4ab 639get_vtable_name (tree type)
669ec2b4 640{
1f84ec23 641 return mangle_vtbl_for_type (type);
669ec2b4
JM
642}
643
4684cd27
MM
644/* DECL is an entity associated with TYPE, like a virtual table or an
645 implicitly generated constructor. Determine whether or not DECL
646 should have external or internal linkage at the object file
647 level. This routine does not deal with COMDAT linkage and other
648 similar complexities; it simply sets TREE_PUBLIC if it possible for
649 entities in other translation units to contain copies of DECL, in
650 the abstract. */
651
652void
653set_linkage_according_to_type (tree type, tree decl)
654{
655 /* If TYPE involves a local class in a function with internal
656 linkage, then DECL should have internal linkage too. Other local
657 classes have no linkage -- but if their containing functions
658 have external linkage, it makes sense for DECL to have external
659 linkage too. That will allow template definitions to be merged,
660 for example. */
661 if (no_linkage_check (type, /*relaxed_p=*/true))
662 {
663 TREE_PUBLIC (decl) = 0;
664 DECL_INTERFACE_KNOWN (decl) = 1;
665 }
666 else
667 TREE_PUBLIC (decl) = 1;
668}
669
459c43ad
MM
670/* Create a VAR_DECL for a primary or secondary vtable for CLASS_TYPE.
671 (For a secondary vtable for B-in-D, CLASS_TYPE should be D, not B.)
672 Use NAME for the name of the vtable, and VTABLE_TYPE for its type. */
b9f39201
MM
673
674static tree
94edc4ab 675build_vtable (tree class_type, tree name, tree vtable_type)
b9f39201
MM
676{
677 tree decl;
678
679 decl = build_lang_decl (VAR_DECL, name, vtable_type);
90ecce3e
JM
680 /* vtable names are already mangled; give them their DECL_ASSEMBLER_NAME
681 now to avoid confusion in mangle_decl. */
682 SET_DECL_ASSEMBLER_NAME (decl, name);
b9f39201
MM
683 DECL_CONTEXT (decl) = class_type;
684 DECL_ARTIFICIAL (decl) = 1;
685 TREE_STATIC (decl) = 1;
b9f39201 686 TREE_READONLY (decl) = 1;
b9f39201 687 DECL_VIRTUAL_P (decl) = 1;
a6f5e048 688 DECL_ALIGN (decl) = TARGET_VTABLE_ENTRY_ALIGN;
d35543c0 689 DECL_VTABLE_OR_VTT_P (decl) = 1;
78d55cc8
JM
690 /* At one time the vtable info was grabbed 2 words at a time. This
691 fails on sparc unless you have 8-byte alignment. (tiemann) */
692 DECL_ALIGN (decl) = MAX (TYPE_ALIGN (double_type_node),
693 DECL_ALIGN (decl));
4684cd27
MM
694 set_linkage_according_to_type (class_type, decl);
695 /* The vtable has not been defined -- yet. */
696 DECL_EXTERNAL (decl) = 1;
697 DECL_NOT_REALLY_EXTERN (decl) = 1;
698
78e0d62b
RH
699 /* Mark the VAR_DECL node representing the vtable itself as a
700 "gratuitous" one, thereby forcing dwarfout.c to ignore it. It
701 is rather important that such things be ignored because any
702 effort to actually generate DWARF for them will run into
703 trouble when/if we encounter code like:
c8094d83 704
78e0d62b
RH
705 #pragma interface
706 struct S { virtual void member (); };
c8094d83 707
78e0d62b
RH
708 because the artificial declaration of the vtable itself (as
709 manufactured by the g++ front end) will say that the vtable is
710 a static member of `S' but only *after* the debug output for
711 the definition of `S' has already been output. This causes
712 grief because the DWARF entry for the definition of the vtable
713 will try to refer back to an earlier *declaration* of the
714 vtable as a static member of `S' and there won't be one. We
715 might be able to arrange to have the "vtable static member"
716 attached to the member list for `S' before the debug info for
717 `S' get written (which would solve the problem) but that would
718 require more intrusive changes to the g++ front end. */
719 DECL_IGNORED_P (decl) = 1;
78d55cc8 720
b9f39201
MM
721 return decl;
722}
723
1aa4ccd4
NS
724/* Get the VAR_DECL of the vtable for TYPE. TYPE need not be polymorphic,
725 or even complete. If this does not exist, create it. If COMPLETE is
838dfd8a 726 nonzero, then complete the definition of it -- that will render it
1aa4ccd4
NS
727 impossible to actually build the vtable, but is useful to get at those
728 which are known to exist in the runtime. */
729
c8094d83 730tree
94edc4ab 731get_vtable_decl (tree type, int complete)
1aa4ccd4 732{
548502d3
MM
733 tree decl;
734
735 if (CLASSTYPE_VTABLES (type))
736 return CLASSTYPE_VTABLES (type);
c8094d83 737
d1a74aa7 738 decl = build_vtable (type, get_vtable_name (type), vtbl_type_node);
548502d3
MM
739 CLASSTYPE_VTABLES (type) = decl;
740
1aa4ccd4 741 if (complete)
217f4eb9
MM
742 {
743 DECL_EXTERNAL (decl) = 1;
744 cp_finish_decl (decl, NULL_TREE, NULL_TREE, 0);
745 }
1aa4ccd4 746
1aa4ccd4
NS
747 return decl;
748}
749
28531dd0
MM
750/* Build the primary virtual function table for TYPE. If BINFO is
751 non-NULL, build the vtable starting with the initial approximation
752 that it is the same as the one which is the head of the association
838dfd8a 753 list. Returns a nonzero value if a new vtable is actually
28531dd0 754 created. */
e92cc029 755
28531dd0 756static int
94edc4ab 757build_primary_vtable (tree binfo, tree type)
8d08fdba 758{
31f8e4f3
MM
759 tree decl;
760 tree virtuals;
8d08fdba 761
1aa4ccd4 762 decl = get_vtable_decl (type, /*complete=*/0);
c8094d83 763
8d08fdba
MS
764 if (binfo)
765 {
dbbf88d1 766 if (BINFO_NEW_VTABLE_MARKED (binfo))
0533d788
MM
767 /* We have already created a vtable for this base, so there's
768 no need to do it again. */
28531dd0 769 return 0;
c8094d83 770
d1f05f93 771 virtuals = copy_list (BINFO_VIRTUALS (binfo));
c35cce41
MM
772 TREE_TYPE (decl) = TREE_TYPE (get_vtbl_decl_for_binfo (binfo));
773 DECL_SIZE (decl) = TYPE_SIZE (TREE_TYPE (decl));
774 DECL_SIZE_UNIT (decl) = TYPE_SIZE_UNIT (TREE_TYPE (decl));
8d08fdba
MS
775 }
776 else
777 {
50bc768d 778 gcc_assert (TREE_TYPE (decl) == vtbl_type_node);
8d08fdba 779 virtuals = NULL_TREE;
8d08fdba
MS
780 }
781
782#ifdef GATHER_STATISTICS
783 n_vtables += 1;
784 n_vtable_elems += list_length (virtuals);
785#endif
786
8d08fdba
MS
787 /* Initialize the association list for this type, based
788 on our first approximation. */
604a3205
NS
789 BINFO_VTABLE (TYPE_BINFO (type)) = decl;
790 BINFO_VIRTUALS (TYPE_BINFO (type)) = virtuals;
dbbf88d1 791 SET_BINFO_NEW_VTABLE_MARKED (TYPE_BINFO (type));
28531dd0 792 return 1;
8d08fdba
MS
793}
794
3461fba7 795/* Give BINFO a new virtual function table which is initialized
8d08fdba
MS
796 with a skeleton-copy of its original initialization. The only
797 entry that changes is the `delta' entry, so we can really
798 share a lot of structure.
799
3461fba7 800 FOR_TYPE is the most derived type which caused this table to
8d08fdba
MS
801 be needed.
802
838dfd8a 803 Returns nonzero if we haven't met BINFO before.
2636fde4
JM
804
805 The order in which vtables are built (by calling this function) for
806 an object must remain the same, otherwise a binary incompatibility
807 can result. */
e92cc029 808
28531dd0 809static int
dbbf88d1 810build_secondary_vtable (tree binfo)
8d08fdba 811{
dbbf88d1 812 if (BINFO_NEW_VTABLE_MARKED (binfo))
0533d788
MM
813 /* We already created a vtable for this base. There's no need to
814 do it again. */
28531dd0 815 return 0;
0533d788 816
8d7a5379
MM
817 /* Remember that we've created a vtable for this BINFO, so that we
818 don't try to do so again. */
dbbf88d1 819 SET_BINFO_NEW_VTABLE_MARKED (binfo);
c8094d83 820
8d7a5379 821 /* Make fresh virtual list, so we can smash it later. */
d1f05f93 822 BINFO_VIRTUALS (binfo) = copy_list (BINFO_VIRTUALS (binfo));
8d7a5379 823
3461fba7
NS
824 /* Secondary vtables are laid out as part of the same structure as
825 the primary vtable. */
826 BINFO_VTABLE (binfo) = NULL_TREE;
28531dd0 827 return 1;
8d08fdba
MS
828}
829
28531dd0 830/* Create a new vtable for BINFO which is the hierarchy dominated by
838dfd8a 831 T. Return nonzero if we actually created a new vtable. */
28531dd0
MM
832
833static int
94edc4ab 834make_new_vtable (tree t, tree binfo)
28531dd0
MM
835{
836 if (binfo == TYPE_BINFO (t))
837 /* In this case, it is *type*'s vtable we are modifying. We start
d0cd8b44 838 with the approximation that its vtable is that of the
28531dd0 839 immediate base class. */
981c353e 840 return build_primary_vtable (binfo, t);
28531dd0
MM
841 else
842 /* This is our very own copy of `basetype' to play with. Later,
843 we will fill in all the virtual functions that override the
844 virtual functions in these base classes which are not defined
845 by the current type. */
dbbf88d1 846 return build_secondary_vtable (binfo);
28531dd0
MM
847}
848
849/* Make *VIRTUALS, an entry on the BINFO_VIRTUALS list for BINFO
850 (which is in the hierarchy dominated by T) list FNDECL as its
4e7512c9
MM
851 BV_FN. DELTA is the required constant adjustment from the `this'
852 pointer where the vtable entry appears to the `this' required when
853 the function is actually called. */
8d08fdba
MS
854
855static void
94edc4ab 856modify_vtable_entry (tree t,
0cbd7506
MS
857 tree binfo,
858 tree fndecl,
859 tree delta,
860 tree *virtuals)
8d08fdba 861{
28531dd0 862 tree v;
c0bbf652 863
28531dd0 864 v = *virtuals;
c0bbf652 865
5e19c053 866 if (fndecl != BV_FN (v)
4e7512c9 867 || !tree_int_cst_equal (delta, BV_DELTA (v)))
c0bbf652 868 {
28531dd0
MM
869 /* We need a new vtable for BINFO. */
870 if (make_new_vtable (t, binfo))
871 {
872 /* If we really did make a new vtable, we also made a copy
873 of the BINFO_VIRTUALS list. Now, we have to find the
874 corresponding entry in that list. */
875 *virtuals = BINFO_VIRTUALS (binfo);
5e19c053 876 while (BV_FN (*virtuals) != BV_FN (v))
28531dd0
MM
877 *virtuals = TREE_CHAIN (*virtuals);
878 v = *virtuals;
879 }
8d08fdba 880
5e19c053 881 BV_DELTA (v) = delta;
aabb4cd6 882 BV_VCALL_INDEX (v) = NULL_TREE;
5e19c053 883 BV_FN (v) = fndecl;
8d08fdba 884 }
8d08fdba
MS
885}
886
8d08fdba 887\f
b2a9b208 888/* Add method METHOD to class TYPE. If USING_DECL is non-null, it is
b77fe7b4
NS
889 the USING_DECL naming METHOD. Returns true if the method could be
890 added to the method vec. */
e92cc029 891
b77fe7b4 892bool
b2a9b208 893add_method (tree type, tree method, tree using_decl)
8d08fdba 894{
9ba5ff0f 895 unsigned slot;
90ea9897 896 tree overload;
b54a07e8
NS
897 bool template_conv_p = false;
898 bool conv_p;
d4e6fecb 899 VEC(tree,gc) *method_vec;
aaaa46d2 900 bool complete_p;
9ba5ff0f
NS
901 bool insert_p = false;
902 tree current_fns;
ac2b3222
AP
903
904 if (method == error_mark_node)
b77fe7b4 905 return false;
aaaa46d2
MM
906
907 complete_p = COMPLETE_TYPE_P (type);
b54a07e8
NS
908 conv_p = DECL_CONV_FN_P (method);
909 if (conv_p)
910 template_conv_p = (TREE_CODE (method) == TEMPLATE_DECL
911 && DECL_TEMPLATE_CONV_FN_P (method));
452a394b 912
452a394b 913 method_vec = CLASSTYPE_METHOD_VEC (type);
aaaa46d2
MM
914 if (!method_vec)
915 {
916 /* Make a new method vector. We start with 8 entries. We must
917 allocate at least two (for constructors and destructors), and
918 we're going to end up with an assignment operator at some
919 point as well. */
d4e6fecb 920 method_vec = VEC_alloc (tree, gc, 8);
aaaa46d2
MM
921 /* Create slots for constructors and destructors. */
922 VEC_quick_push (tree, method_vec, NULL_TREE);
923 VEC_quick_push (tree, method_vec, NULL_TREE);
924 CLASSTYPE_METHOD_VEC (type) = method_vec;
925 }
926
452a394b
MM
927 /* Constructors and destructors go in special slots. */
928 if (DECL_MAYBE_IN_CHARGE_CONSTRUCTOR_P (method))
929 slot = CLASSTYPE_CONSTRUCTOR_SLOT;
930 else if (DECL_MAYBE_IN_CHARGE_DESTRUCTOR_P (method))
4b0d3cbe
MM
931 {
932 slot = CLASSTYPE_DESTRUCTOR_SLOT;
c8094d83 933
f5c28a15 934 if (TYPE_FOR_JAVA (type))
9f4faeae
MM
935 {
936 if (!DECL_ARTIFICIAL (method))
937 error ("Java class %qT cannot have a destructor", type);
938 else if (TYPE_HAS_NONTRIVIAL_DESTRUCTOR (type))
939 error ("Java class %qT cannot have an implicit non-trivial "
940 "destructor",
941 type);
942 }
4b0d3cbe 943 }
452a394b 944 else
61a127b3 945 {
aaaa46d2
MM
946 tree m;
947
9ba5ff0f 948 insert_p = true;
452a394b 949 /* See if we already have an entry with this name. */
c8094d83 950 for (slot = CLASSTYPE_FIRST_CONVERSION_SLOT;
9ba5ff0f 951 VEC_iterate (tree, method_vec, slot, m);
aaaa46d2 952 ++slot)
5dd236e2 953 {
5dd236e2 954 m = OVL_CURRENT (m);
5dd236e2
NS
955 if (template_conv_p)
956 {
aaaa46d2
MM
957 if (TREE_CODE (m) == TEMPLATE_DECL
958 && DECL_TEMPLATE_CONV_FN_P (m))
959 insert_p = false;
5dd236e2
NS
960 break;
961 }
aaaa46d2 962 if (conv_p && !DECL_CONV_FN_P (m))
5dd236e2 963 break;
aaaa46d2 964 if (DECL_NAME (m) == DECL_NAME (method))
452a394b 965 {
aaaa46d2
MM
966 insert_p = false;
967 break;
8d08fdba 968 }
aaaa46d2
MM
969 if (complete_p
970 && !DECL_CONV_FN_P (m)
971 && DECL_NAME (m) > DECL_NAME (method))
972 break;
61a127b3 973 }
452a394b 974 }
9ba5ff0f 975 current_fns = insert_p ? NULL_TREE : VEC_index (tree, method_vec, slot);
c8094d83 976
c353b8e3 977 if (processing_template_decl)
452a394b
MM
978 /* TYPE is a template class. Don't issue any errors now; wait
979 until instantiation time to complain. */
980 ;
981 else
982 {
983 tree fns;
03017874 984
452a394b 985 /* Check to see if we've already got this method. */
9ba5ff0f 986 for (fns = current_fns; fns; fns = OVL_NEXT (fns))
452a394b
MM
987 {
988 tree fn = OVL_CURRENT (fns);
6b20b203
MM
989 tree fn_type;
990 tree method_type;
f0ab6bf2
MM
991 tree parms1;
992 tree parms2;
f0ab6bf2 993
452a394b
MM
994 if (TREE_CODE (fn) != TREE_CODE (method))
995 continue;
03017874 996
f0ab6bf2
MM
997 /* [over.load] Member function declarations with the
998 same name and the same parameter types cannot be
999 overloaded if any of them is a static member
1000 function declaration.
1001
1002 [namespace.udecl] When a using-declaration brings names
1003 from a base class into a derived class scope, member
1004 functions in the derived class override and/or hide member
1005 functions with the same name and parameter types in a base
1006 class (rather than conflicting). */
6b20b203
MM
1007 fn_type = TREE_TYPE (fn);
1008 method_type = TREE_TYPE (method);
1009 parms1 = TYPE_ARG_TYPES (fn_type);
1010 parms2 = TYPE_ARG_TYPES (method_type);
f0ab6bf2
MM
1011
1012 /* Compare the quals on the 'this' parm. Don't compare
1013 the whole types, as used functions are treated as
1014 coming from the using class in overload resolution. */
1015 if (! DECL_STATIC_FUNCTION_P (fn)
1016 && ! DECL_STATIC_FUNCTION_P (method)
1017 && (TYPE_QUALS (TREE_TYPE (TREE_VALUE (parms1)))
1018 != TYPE_QUALS (TREE_TYPE (TREE_VALUE (parms2)))))
6b20b203 1019 continue;
c8094d83 1020
6b20b203
MM
1021 /* For templates, the return type and template parameters
1022 must be identical. */
8a188e24 1023 if (TREE_CODE (fn) == TEMPLATE_DECL
6b20b203
MM
1024 && (!same_type_p (TREE_TYPE (fn_type),
1025 TREE_TYPE (method_type))
1026 || !comp_template_parms (DECL_TEMPLATE_PARMS (fn),
1027 DECL_TEMPLATE_PARMS (method))))
1028 continue;
c8094d83 1029
f0ab6bf2
MM
1030 if (! DECL_STATIC_FUNCTION_P (fn))
1031 parms1 = TREE_CHAIN (parms1);
1032 if (! DECL_STATIC_FUNCTION_P (method))
1033 parms2 = TREE_CHAIN (parms2);
1034
6b20b203 1035 if (compparms (parms1, parms2)
c8094d83 1036 && (!DECL_CONV_FN_P (fn)
6b20b203
MM
1037 || same_type_p (TREE_TYPE (fn_type),
1038 TREE_TYPE (method_type))))
452a394b 1039 {
b2a9b208
NS
1040 if (using_decl)
1041 {
1042 if (DECL_CONTEXT (fn) == type)
1043 /* Defer to the local function. */
b77fe7b4 1044 return false;
b2a9b208 1045 if (DECL_CONTEXT (fn) == DECL_CONTEXT (method))
dee15844 1046 error ("repeated using declaration %q+D", using_decl);
b2a9b208 1047 else
dee15844
JM
1048 error ("using declaration %q+D conflicts with a previous using declaration",
1049 using_decl);
b2a9b208 1050 }
f0ab6bf2 1051 else
03017874 1052 {
dee15844
JM
1053 error ("%q+#D cannot be overloaded", method);
1054 error ("with %q+#D", fn);
03017874 1055 }
c8094d83 1056
b2a9b208
NS
1057 /* We don't call duplicate_decls here to merge the
1058 declarations because that will confuse things if the
1059 methods have inline definitions. In particular, we
1060 will crash while processing the definitions. */
b77fe7b4 1061 return false;
452a394b 1062 }
03017874 1063 }
452a394b 1064 }
03017874 1065
357d956e
MM
1066 /* A class should never have more than one destructor. */
1067 if (current_fns && DECL_MAYBE_IN_CHARGE_DESTRUCTOR_P (method))
1068 return false;
1069
c8094d83 1070 /* Add the new binding. */
9ba5ff0f 1071 overload = build_overload (method, current_fns);
c8094d83 1072
357d956e
MM
1073 if (conv_p)
1074 TYPE_HAS_CONVERSION (type) = 1;
1075 else if (slot >= CLASSTYPE_FIRST_CONVERSION_SLOT && !complete_p)
90ea9897
MM
1076 push_class_level_binding (DECL_NAME (method), overload);
1077
9ba5ff0f
NS
1078 if (insert_p)
1079 {
1080 /* We only expect to add few methods in the COMPLETE_P case, so
1081 just make room for one more method in that case. */
d4e6fecb 1082 if (VEC_reserve (tree, gc, method_vec, complete_p ? -1 : 1))
9ba5ff0f
NS
1083 CLASSTYPE_METHOD_VEC (type) = method_vec;
1084 if (slot == VEC_length (tree, method_vec))
1085 VEC_quick_push (tree, method_vec, overload);
1086 else
1087 VEC_quick_insert (tree, method_vec, slot, overload);
1088 }
1089 else
03fd3f84 1090 /* Replace the current slot. */
9ba5ff0f 1091 VEC_replace (tree, method_vec, slot, overload);
b77fe7b4 1092 return true;
8d08fdba
MS
1093}
1094
1095/* Subroutines of finish_struct. */
1096
aa52c1ff
JM
1097/* Change the access of FDECL to ACCESS in T. Return 1 if change was
1098 legit, otherwise return 0. */
e92cc029 1099
8d08fdba 1100static int
94edc4ab 1101alter_access (tree t, tree fdecl, tree access)
8d08fdba 1102{
721c3b42
MM
1103 tree elem;
1104
1105 if (!DECL_LANG_SPECIFIC (fdecl))
1106 retrofit_lang_decl (fdecl);
1107
50bc768d 1108 gcc_assert (!DECL_DISCRIMINATOR_P (fdecl));
8e4ce833 1109
721c3b42 1110 elem = purpose_member (t, DECL_ACCESS (fdecl));
38afd588 1111 if (elem)
8d08fdba 1112 {
38afd588 1113 if (TREE_VALUE (elem) != access)
8d08fdba 1114 {
38afd588 1115 if (TREE_CODE (TREE_TYPE (fdecl)) == FUNCTION_DECL)
dee15844
JM
1116 error ("conflicting access specifications for method"
1117 " %q+D, ignored", TREE_TYPE (fdecl));
38afd588 1118 else
1f070f2b 1119 error ("conflicting access specifications for field %qE, ignored",
4460cef2 1120 DECL_NAME (fdecl));
8d08fdba
MS
1121 }
1122 else
430bb96b
JL
1123 {
1124 /* They're changing the access to the same thing they changed
1125 it to before. That's OK. */
1126 ;
1127 }
db5ae43f 1128 }
38afd588 1129 else
8d08fdba 1130 {
6df5158a 1131 perform_or_defer_access_check (TYPE_BINFO (t), fdecl);
be99da77 1132 DECL_ACCESS (fdecl) = tree_cons (t, access, DECL_ACCESS (fdecl));
8d08fdba
MS
1133 return 1;
1134 }
1135 return 0;
1136}
1137
58010b57 1138/* Process the USING_DECL, which is a member of T. */
79ad62b2 1139
e9659ab0 1140static void
94edc4ab 1141handle_using_decl (tree using_decl, tree t)
79ad62b2 1142{
98ed9dae 1143 tree decl = USING_DECL_DECLS (using_decl);
79ad62b2
MM
1144 tree name = DECL_NAME (using_decl);
1145 tree access
1146 = TREE_PRIVATE (using_decl) ? access_private_node
1147 : TREE_PROTECTED (using_decl) ? access_protected_node
1148 : access_public_node;
79ad62b2 1149 tree flist = NULL_TREE;
aa52c1ff 1150 tree old_value;
79ad62b2 1151
98ed9dae 1152 gcc_assert (!processing_template_decl && decl);
c8094d83 1153
39fb05d0 1154 old_value = lookup_member (t, name, /*protect=*/0, /*want_type=*/false);
aa52c1ff 1155 if (old_value)
79ad62b2 1156 {
aa52c1ff
JM
1157 if (is_overloaded_fn (old_value))
1158 old_value = OVL_CURRENT (old_value);
1159
1160 if (DECL_P (old_value) && DECL_CONTEXT (old_value) == t)
1161 /* OK */;
1162 else
1163 old_value = NULL_TREE;
79ad62b2 1164 }
c8094d83 1165
6e976965 1166 cp_emit_debug_info_for_using (decl, USING_DECL_SCOPE (using_decl));
c8094d83 1167
98ed9dae
NS
1168 if (is_overloaded_fn (decl))
1169 flist = decl;
aa52c1ff
JM
1170
1171 if (! old_value)
1172 ;
1173 else if (is_overloaded_fn (old_value))
79ad62b2 1174 {
aa52c1ff
JM
1175 if (flist)
1176 /* It's OK to use functions from a base when there are functions with
1177 the same name already present in the current class. */;
1178 else
79ad62b2 1179 {
dee15844
JM
1180 error ("%q+D invalid in %q#T", using_decl, t);
1181 error (" because of local method %q+#D with same name",
1182 OVL_CURRENT (old_value));
aa52c1ff 1183 return;
79ad62b2
MM
1184 }
1185 }
186c0fbe 1186 else if (!DECL_ARTIFICIAL (old_value))
aa52c1ff 1187 {
dee15844
JM
1188 error ("%q+D invalid in %q#T", using_decl, t);
1189 error (" because of local member %q+#D with same name", old_value);
aa52c1ff
JM
1190 return;
1191 }
c8094d83 1192
f4f206f4 1193 /* Make type T see field decl FDECL with access ACCESS. */
aa52c1ff
JM
1194 if (flist)
1195 for (; flist; flist = OVL_NEXT (flist))
1196 {
b2a9b208 1197 add_method (t, OVL_CURRENT (flist), using_decl);
aa52c1ff
JM
1198 alter_access (t, OVL_CURRENT (flist), access);
1199 }
1200 else
98ed9dae 1201 alter_access (t, decl, access);
79ad62b2 1202}
8d08fdba 1203\f
e5e459bf
AO
1204/* Run through the base classes of T, updating CANT_HAVE_CONST_CTOR_P,
1205 and NO_CONST_ASN_REF_P. Also set flag bits in T based on
1206 properties of the bases. */
8d08fdba 1207
607cf131 1208static void
94edc4ab 1209check_bases (tree t,
0cbd7506
MS
1210 int* cant_have_const_ctor_p,
1211 int* no_const_asn_ref_p)
8d08fdba 1212{
607cf131 1213 int i;
0fb3018c 1214 int seen_non_virtual_nearly_empty_base_p;
fa743e8c
NS
1215 tree base_binfo;
1216 tree binfo;
8d08fdba 1217
0fb3018c 1218 seen_non_virtual_nearly_empty_base_p = 0;
607cf131 1219
fa743e8c
NS
1220 for (binfo = TYPE_BINFO (t), i = 0;
1221 BINFO_BASE_ITERATE (binfo, i, base_binfo); i++)
8d08fdba 1222 {
fa743e8c 1223 tree basetype = TREE_TYPE (base_binfo);
9a71c18b 1224
50bc768d 1225 gcc_assert (COMPLETE_TYPE_P (basetype));
c8094d83 1226
4c6b7393 1227 /* Effective C++ rule 14. We only need to check TYPE_POLYMORPHIC_P
607cf131
MM
1228 here because the case of virtual functions but non-virtual
1229 dtor is handled in finish_struct_1. */
74fa0285
GDR
1230 if (!TYPE_POLYMORPHIC_P (basetype))
1231 warning (OPT_Weffc__,
1232 "base class %q#T has a non-virtual destructor", basetype);
8d08fdba 1233
607cf131
MM
1234 /* If the base class doesn't have copy constructors or
1235 assignment operators that take const references, then the
1236 derived class cannot have such a member automatically
1237 generated. */
1238 if (! TYPE_HAS_CONST_INIT_REF (basetype))
1239 *cant_have_const_ctor_p = 1;
1240 if (TYPE_HAS_ASSIGN_REF (basetype)
1241 && !TYPE_HAS_CONST_ASSIGN_REF (basetype))
1242 *no_const_asn_ref_p = 1;
8d08fdba 1243
809e3e7f 1244 if (BINFO_VIRTUAL_P (base_binfo))
00a17e31 1245 /* A virtual base does not effect nearly emptiness. */
0fb3018c 1246 ;
f9c528ea 1247 else if (CLASSTYPE_NEARLY_EMPTY_P (basetype))
0fb3018c
NS
1248 {
1249 if (seen_non_virtual_nearly_empty_base_p)
1250 /* And if there is more than one nearly empty base, then the
1251 derived class is not nearly empty either. */
1252 CLASSTYPE_NEARLY_EMPTY_P (t) = 0;
1253 else
00a17e31 1254 /* Remember we've seen one. */
0fb3018c
NS
1255 seen_non_virtual_nearly_empty_base_p = 1;
1256 }
1257 else if (!is_empty_class (basetype))
1258 /* If the base class is not empty or nearly empty, then this
1259 class cannot be nearly empty. */
1260 CLASSTYPE_NEARLY_EMPTY_P (t) = 0;
f9c528ea 1261
607cf131
MM
1262 /* A lot of properties from the bases also apply to the derived
1263 class. */
8d08fdba 1264 TYPE_NEEDS_CONSTRUCTING (t) |= TYPE_NEEDS_CONSTRUCTING (basetype);
c8094d83 1265 TYPE_HAS_NONTRIVIAL_DESTRUCTOR (t)
834c6dff 1266 |= TYPE_HAS_NONTRIVIAL_DESTRUCTOR (basetype);
c8094d83 1267 TYPE_HAS_COMPLEX_ASSIGN_REF (t)
607cf131 1268 |= TYPE_HAS_COMPLEX_ASSIGN_REF (basetype);
e8abc66f 1269 TYPE_HAS_COMPLEX_INIT_REF (t) |= TYPE_HAS_COMPLEX_INIT_REF (basetype);
4c6b7393 1270 TYPE_POLYMORPHIC_P (t) |= TYPE_POLYMORPHIC_P (basetype);
c8094d83 1271 CLASSTYPE_CONTAINS_EMPTY_CLASS_P (t)
5ec1192e 1272 |= CLASSTYPE_CONTAINS_EMPTY_CLASS_P (basetype);
607cf131
MM
1273 }
1274}
1275
fc6633e0
NS
1276/* Determine all the primary bases within T. Sets BINFO_PRIMARY_BASE_P for
1277 those that are primaries. Sets BINFO_LOST_PRIMARY_P for those
1278 that have had a nearly-empty virtual primary base stolen by some
77880ae4 1279 other base in the hierarchy. Determines CLASSTYPE_PRIMARY_BASE for
fc6633e0 1280 T. */
c35cce41
MM
1281
1282static void
fc6633e0 1283determine_primary_bases (tree t)
c35cce41 1284{
fc6633e0
NS
1285 unsigned i;
1286 tree primary = NULL_TREE;
1287 tree type_binfo = TYPE_BINFO (t);
1288 tree base_binfo;
1289
1290 /* Determine the primary bases of our bases. */
1291 for (base_binfo = TREE_CHAIN (type_binfo); base_binfo;
1292 base_binfo = TREE_CHAIN (base_binfo))
c35cce41 1293 {
fc6633e0 1294 tree primary = CLASSTYPE_PRIMARY_BINFO (BINFO_TYPE (base_binfo));
c35cce41 1295
fc6633e0
NS
1296 /* See if we're the non-virtual primary of our inheritance
1297 chain. */
1298 if (!BINFO_VIRTUAL_P (base_binfo))
dbbf88d1 1299 {
fc6633e0
NS
1300 tree parent = BINFO_INHERITANCE_CHAIN (base_binfo);
1301 tree parent_primary = CLASSTYPE_PRIMARY_BINFO (BINFO_TYPE (parent));
c8094d83 1302
fc6633e0 1303 if (parent_primary
539ed333
NS
1304 && SAME_BINFO_TYPE_P (BINFO_TYPE (base_binfo),
1305 BINFO_TYPE (parent_primary)))
fc6633e0
NS
1306 /* We are the primary binfo. */
1307 BINFO_PRIMARY_P (base_binfo) = 1;
1308 }
1309 /* Determine if we have a virtual primary base, and mark it so.
1310 */
1311 if (primary && BINFO_VIRTUAL_P (primary))
1312 {
1313 tree this_primary = copied_binfo (primary, base_binfo);
1314
1315 if (BINFO_PRIMARY_P (this_primary))
1316 /* Someone already claimed this base. */
1317 BINFO_LOST_PRIMARY_P (base_binfo) = 1;
1318 else
dbbf88d1 1319 {
fc6633e0 1320 tree delta;
c8094d83 1321
fc6633e0
NS
1322 BINFO_PRIMARY_P (this_primary) = 1;
1323 BINFO_INHERITANCE_CHAIN (this_primary) = base_binfo;
c8094d83 1324
fc6633e0 1325 /* A virtual binfo might have been copied from within
0cbd7506
MS
1326 another hierarchy. As we're about to use it as a
1327 primary base, make sure the offsets match. */
fc6633e0
NS
1328 delta = size_diffop (convert (ssizetype,
1329 BINFO_OFFSET (base_binfo)),
1330 convert (ssizetype,
1331 BINFO_OFFSET (this_primary)));
c8094d83 1332
fc6633e0 1333 propagate_binfo_offsets (this_primary, delta);
dbbf88d1
NS
1334 }
1335 }
c35cce41 1336 }
8026246f 1337
fc6633e0 1338 /* First look for a dynamic direct non-virtual base. */
fa743e8c 1339 for (i = 0; BINFO_BASE_ITERATE (type_binfo, i, base_binfo); i++)
607cf131 1340 {
607cf131 1341 tree basetype = BINFO_TYPE (base_binfo);
aff08c18 1342
fc6633e0 1343 if (TYPE_CONTAINS_VPTR_P (basetype) && !BINFO_VIRTUAL_P (base_binfo))
8d08fdba 1344 {
fc6633e0
NS
1345 primary = base_binfo;
1346 goto found;
911a71a7
MM
1347 }
1348 }
8026246f 1349
3461fba7 1350 /* A "nearly-empty" virtual base class can be the primary base
fc6633e0
NS
1351 class, if no non-virtual polymorphic base can be found. Look for
1352 a nearly-empty virtual dynamic base that is not already a primary
77880ae4 1353 base of something in the hierarchy. If there is no such base,
fc6633e0
NS
1354 just pick the first nearly-empty virtual base. */
1355
1356 for (base_binfo = TREE_CHAIN (type_binfo); base_binfo;
1357 base_binfo = TREE_CHAIN (base_binfo))
1358 if (BINFO_VIRTUAL_P (base_binfo)
1359 && CLASSTYPE_NEARLY_EMPTY_P (BINFO_TYPE (base_binfo)))
1360 {
1361 if (!BINFO_PRIMARY_P (base_binfo))
1362 {
1363 /* Found one that is not primary. */
1364 primary = base_binfo;
1365 goto found;
1366 }
1367 else if (!primary)
1368 /* Remember the first candidate. */
1369 primary = base_binfo;
1370 }
c8094d83 1371
fc6633e0
NS
1372 found:
1373 /* If we've got a primary base, use it. */
1374 if (primary)
7cafdb8b 1375 {
fc6633e0 1376 tree basetype = BINFO_TYPE (primary);
c8094d83 1377
fc6633e0
NS
1378 CLASSTYPE_PRIMARY_BINFO (t) = primary;
1379 if (BINFO_PRIMARY_P (primary))
1380 /* We are stealing a primary base. */
1381 BINFO_LOST_PRIMARY_P (BINFO_INHERITANCE_CHAIN (primary)) = 1;
1382 BINFO_PRIMARY_P (primary) = 1;
1383 if (BINFO_VIRTUAL_P (primary))
7cafdb8b 1384 {
fc6633e0 1385 tree delta;
7cafdb8b 1386
fc6633e0
NS
1387 BINFO_INHERITANCE_CHAIN (primary) = type_binfo;
1388 /* A virtual binfo might have been copied from within
0cbd7506
MS
1389 another hierarchy. As we're about to use it as a primary
1390 base, make sure the offsets match. */
fc6633e0
NS
1391 delta = size_diffop (ssize_int (0),
1392 convert (ssizetype, BINFO_OFFSET (primary)));
c8094d83 1393
fc6633e0 1394 propagate_binfo_offsets (primary, delta);
7cafdb8b 1395 }
c8094d83 1396
fc6633e0 1397 primary = TYPE_BINFO (basetype);
c8094d83 1398
fc6633e0
NS
1399 TYPE_VFIELD (t) = TYPE_VFIELD (basetype);
1400 BINFO_VTABLE (type_binfo) = BINFO_VTABLE (primary);
1401 BINFO_VIRTUALS (type_binfo) = BINFO_VIRTUALS (primary);
7cafdb8b 1402 }
8d08fdba 1403}
8d08fdba 1404\f
d2c5305b
MM
1405/* Set memoizing fields and bits of T (and its variants) for later
1406 use. */
e92cc029 1407
8d08fdba 1408static void
94edc4ab 1409finish_struct_bits (tree t)
8d08fdba 1410{
090ad434 1411 tree variants;
c8094d83 1412
8d08fdba 1413 /* Fix up variants (if any). */
090ad434
NS
1414 for (variants = TYPE_NEXT_VARIANT (t);
1415 variants;
1416 variants = TYPE_NEXT_VARIANT (variants))
8d08fdba
MS
1417 {
1418 /* These fields are in the _TYPE part of the node, not in
1419 the TYPE_LANG_SPECIFIC component, so they are not shared. */
1420 TYPE_HAS_CONSTRUCTOR (variants) = TYPE_HAS_CONSTRUCTOR (t);
8d08fdba 1421 TYPE_NEEDS_CONSTRUCTING (variants) = TYPE_NEEDS_CONSTRUCTING (t);
c8094d83 1422 TYPE_HAS_NONTRIVIAL_DESTRUCTOR (variants)
834c6dff 1423 = TYPE_HAS_NONTRIVIAL_DESTRUCTOR (t);
8d08fdba 1424
4c6b7393 1425 TYPE_POLYMORPHIC_P (variants) = TYPE_POLYMORPHIC_P (t);
c8094d83 1426
cad7e87b
NS
1427 TYPE_BINFO (variants) = TYPE_BINFO (t);
1428
8d08fdba 1429 /* Copy whatever these are holding today. */
eb34af89
RK
1430 TYPE_VFIELD (variants) = TYPE_VFIELD (t);
1431 TYPE_METHODS (variants) = TYPE_METHODS (t);
5566b478 1432 TYPE_FIELDS (variants) = TYPE_FIELDS (t);
e92cc029 1433 TYPE_SIZE (variants) = TYPE_SIZE (t);
509087ae 1434 TYPE_SIZE_UNIT (variants) = TYPE_SIZE_UNIT (t);
8d08fdba
MS
1435 }
1436
fa743e8c 1437 if (BINFO_N_BASE_BINFOS (TYPE_BINFO (t)) && TYPE_POLYMORPHIC_P (t))
16ae29f1
NS
1438 /* For a class w/o baseclasses, 'finish_struct' has set
1439 CLASSTYPE_PURE_VIRTUALS correctly (by definition).
132c7dd3
NS
1440 Similarly for a class whose base classes do not have vtables.
1441 When neither of these is true, we might have removed abstract
1442 virtuals (by providing a definition), added some (by declaring
1443 new ones), or redeclared ones from a base class. We need to
1444 recalculate what's really an abstract virtual at this point (by
1445 looking in the vtables). */
1446 get_pure_virtuals (t);
c8094d83 1447
132c7dd3
NS
1448 /* If this type has a copy constructor or a destructor, force its
1449 mode to be BLKmode, and force its TREE_ADDRESSABLE bit to be
1450 nonzero. This will cause it to be passed by invisible reference
1451 and prevent it from being returned in a register. */
8b16faa2 1452 if (! TYPE_HAS_TRIVIAL_INIT_REF (t) || TYPE_HAS_NONTRIVIAL_DESTRUCTOR (t))
8d08fdba 1453 {
e8abc66f 1454 tree variants;
d2e5ee5c 1455 DECL_MODE (TYPE_MAIN_DECL (t)) = BLKmode;
e8abc66f 1456 for (variants = t; variants; variants = TYPE_NEXT_VARIANT (variants))
8d08fdba
MS
1457 {
1458 TYPE_MODE (variants) = BLKmode;
1459 TREE_ADDRESSABLE (variants) = 1;
8d08fdba
MS
1460 }
1461 }
1462}
1463
b0e0b31f 1464/* Issue warnings about T having private constructors, but no friends,
c8094d83 1465 and so forth.
aed7b2a6 1466
b0e0b31f
MM
1467 HAS_NONPRIVATE_METHOD is nonzero if T has any non-private methods or
1468 static members. HAS_NONPRIVATE_STATIC_FN is nonzero if T has any
1469 non-private static member functions. */
1470
1471static void
94edc4ab 1472maybe_warn_about_overly_private_class (tree t)
aed7b2a6 1473{
056a3b12
MM
1474 int has_member_fn = 0;
1475 int has_nonprivate_method = 0;
1476 tree fn;
1477
1478 if (!warn_ctor_dtor_privacy
b0e0b31f
MM
1479 /* If the class has friends, those entities might create and
1480 access instances, so we should not warn. */
056a3b12
MM
1481 || (CLASSTYPE_FRIEND_CLASSES (t)
1482 || DECL_FRIENDLIST (TYPE_MAIN_DECL (t)))
b0e0b31f
MM
1483 /* We will have warned when the template was declared; there's
1484 no need to warn on every instantiation. */
056a3b12 1485 || CLASSTYPE_TEMPLATE_INSTANTIATION (t))
c8094d83 1486 /* There's no reason to even consider warning about this
056a3b12
MM
1487 class. */
1488 return;
c8094d83 1489
056a3b12
MM
1490 /* We only issue one warning, if more than one applies, because
1491 otherwise, on code like:
1492
1493 class A {
1494 // Oops - forgot `public:'
1495 A();
1496 A(const A&);
1497 ~A();
1498 };
1499
1500 we warn several times about essentially the same problem. */
1501
1502 /* Check to see if all (non-constructor, non-destructor) member
1503 functions are private. (Since there are no friends or
1504 non-private statics, we can't ever call any of the private member
1505 functions.) */
1506 for (fn = TYPE_METHODS (t); fn; fn = TREE_CHAIN (fn))
1507 /* We're not interested in compiler-generated methods; they don't
1508 provide any way to call private members. */
c8094d83 1509 if (!DECL_ARTIFICIAL (fn))
056a3b12
MM
1510 {
1511 if (!TREE_PRIVATE (fn))
b0e0b31f 1512 {
c8094d83 1513 if (DECL_STATIC_FUNCTION_P (fn))
056a3b12
MM
1514 /* A non-private static member function is just like a
1515 friend; it can create and invoke private member
1516 functions, and be accessed without a class
1517 instance. */
1518 return;
c8094d83 1519
056a3b12 1520 has_nonprivate_method = 1;
f576dfc4 1521 /* Keep searching for a static member function. */
056a3b12 1522 }
ce0a5952 1523 else if (!DECL_CONSTRUCTOR_P (fn) && !DECL_DESTRUCTOR_P (fn))
056a3b12 1524 has_member_fn = 1;
c8094d83 1525 }
aed7b2a6 1526
c8094d83 1527 if (!has_nonprivate_method && has_member_fn)
056a3b12 1528 {
ce0a5952
MM
1529 /* There are no non-private methods, and there's at least one
1530 private member function that isn't a constructor or
1531 destructor. (If all the private members are
1532 constructors/destructors we want to use the code below that
1533 issues error messages specifically referring to
1534 constructors/destructors.) */
fa743e8c 1535 unsigned i;
dbbf88d1 1536 tree binfo = TYPE_BINFO (t);
c8094d83 1537
fa743e8c 1538 for (i = 0; i != BINFO_N_BASE_BINFOS (binfo); i++)
604a3205 1539 if (BINFO_BASE_ACCESS (binfo, i) != access_private_node)
056a3b12
MM
1540 {
1541 has_nonprivate_method = 1;
1542 break;
1543 }
c8094d83 1544 if (!has_nonprivate_method)
b0e0b31f 1545 {
74fa0285
GDR
1546 warning (OPT_Wctor_dtor_privacy,
1547 "all member functions in class %qT are private", t);
056a3b12 1548 return;
b0e0b31f 1549 }
056a3b12 1550 }
aed7b2a6 1551
056a3b12
MM
1552 /* Even if some of the member functions are non-private, the class
1553 won't be useful for much if all the constructors or destructors
1554 are private: such an object can never be created or destroyed. */
9f4faeae
MM
1555 fn = CLASSTYPE_DESTRUCTORS (t);
1556 if (fn && TREE_PRIVATE (fn))
056a3b12 1557 {
74fa0285
GDR
1558 warning (OPT_Wctor_dtor_privacy,
1559 "%q#T only defines a private destructor and has no friends",
4b0d3cbe
MM
1560 t);
1561 return;
056a3b12 1562 }
b0e0b31f 1563
550d1bf4
MM
1564 if (TYPE_HAS_CONSTRUCTOR (t)
1565 /* Implicitly generated constructors are always public. */
1566 && (!CLASSTYPE_LAZY_DEFAULT_CTOR (t)
1567 || !CLASSTYPE_LAZY_COPY_CTOR (t)))
056a3b12
MM
1568 {
1569 int nonprivate_ctor = 0;
c8094d83 1570
056a3b12
MM
1571 /* If a non-template class does not define a copy
1572 constructor, one is defined for it, enabling it to avoid
1573 this warning. For a template class, this does not
1574 happen, and so we would normally get a warning on:
b0e0b31f 1575
c8094d83
MS
1576 template <class T> class C { private: C(); };
1577
056a3b12
MM
1578 To avoid this asymmetry, we check TYPE_HAS_INIT_REF. All
1579 complete non-template or fully instantiated classes have this
1580 flag set. */
1581 if (!TYPE_HAS_INIT_REF (t))
1582 nonprivate_ctor = 1;
c8094d83
MS
1583 else
1584 for (fn = CLASSTYPE_CONSTRUCTORS (t); fn; fn = OVL_NEXT (fn))
056a3b12
MM
1585 {
1586 tree ctor = OVL_CURRENT (fn);
1587 /* Ideally, we wouldn't count copy constructors (or, in
1588 fact, any constructor that takes an argument of the
1589 class type as a parameter) because such things cannot
1590 be used to construct an instance of the class unless
1591 you already have one. But, for now at least, we're
1592 more generous. */
1593 if (! TREE_PRIVATE (ctor))
b0e0b31f 1594 {
056a3b12
MM
1595 nonprivate_ctor = 1;
1596 break;
b0e0b31f 1597 }
056a3b12 1598 }
aed7b2a6 1599
056a3b12
MM
1600 if (nonprivate_ctor == 0)
1601 {
74fa0285
GDR
1602 warning (OPT_Wctor_dtor_privacy,
1603 "%q#T only defines private constructors and has no friends",
0cbd7506 1604 t);
056a3b12 1605 return;
b0e0b31f
MM
1606 }
1607 }
aed7b2a6
MM
1608}
1609
17211ab5
GK
1610static struct {
1611 gt_pointer_operator new_value;
1612 void *cookie;
1613} resort_data;
1614
f90cdf34
MT
1615/* Comparison function to compare two TYPE_METHOD_VEC entries by name. */
1616
1617static int
94edc4ab 1618method_name_cmp (const void* m1_p, const void* m2_p)
f90cdf34 1619{
67f5655f
GDR
1620 const tree *const m1 = (const tree *) m1_p;
1621 const tree *const m2 = (const tree *) m2_p;
c8094d83 1622
f90cdf34
MT
1623 if (*m1 == NULL_TREE && *m2 == NULL_TREE)
1624 return 0;
1625 if (*m1 == NULL_TREE)
1626 return -1;
1627 if (*m2 == NULL_TREE)
1628 return 1;
1629 if (DECL_NAME (OVL_CURRENT (*m1)) < DECL_NAME (OVL_CURRENT (*m2)))
1630 return -1;
1631 return 1;
1632}
b0e0b31f 1633
17211ab5
GK
1634/* This routine compares two fields like method_name_cmp but using the
1635 pointer operator in resort_field_decl_data. */
1636
1637static int
94edc4ab 1638resort_method_name_cmp (const void* m1_p, const void* m2_p)
17211ab5 1639{
67f5655f
GDR
1640 const tree *const m1 = (const tree *) m1_p;
1641 const tree *const m2 = (const tree *) m2_p;
17211ab5
GK
1642 if (*m1 == NULL_TREE && *m2 == NULL_TREE)
1643 return 0;
1644 if (*m1 == NULL_TREE)
1645 return -1;
1646 if (*m2 == NULL_TREE)
1647 return 1;
1648 {
1649 tree d1 = DECL_NAME (OVL_CURRENT (*m1));
1650 tree d2 = DECL_NAME (OVL_CURRENT (*m2));
1651 resort_data.new_value (&d1, resort_data.cookie);
1652 resort_data.new_value (&d2, resort_data.cookie);
1653 if (d1 < d2)
1654 return -1;
1655 }
1656 return 1;
1657}
1658
1659/* Resort TYPE_METHOD_VEC because pointers have been reordered. */
1660
c8094d83 1661void
94edc4ab 1662resort_type_method_vec (void* obj,
0cbd7506
MS
1663 void* orig_obj ATTRIBUTE_UNUSED ,
1664 gt_pointer_operator new_value,
1665 void* cookie)
17211ab5 1666{
d4e6fecb 1667 VEC(tree,gc) *method_vec = (VEC(tree,gc) *) obj;
aaaa46d2
MM
1668 int len = VEC_length (tree, method_vec);
1669 size_t slot;
1670 tree fn;
17211ab5
GK
1671
1672 /* The type conversion ops have to live at the front of the vec, so we
1673 can't sort them. */
aaaa46d2 1674 for (slot = CLASSTYPE_FIRST_CONVERSION_SLOT;
9ba5ff0f 1675 VEC_iterate (tree, method_vec, slot, fn);
aaaa46d2
MM
1676 ++slot)
1677 if (!DECL_CONV_FN_P (OVL_CURRENT (fn)))
1678 break;
1679
17211ab5
GK
1680 if (len - slot > 1)
1681 {
1682 resort_data.new_value = new_value;
1683 resort_data.cookie = cookie;
aaaa46d2 1684 qsort (VEC_address (tree, method_vec) + slot, len - slot, sizeof (tree),
17211ab5
GK
1685 resort_method_name_cmp);
1686 }
1687}
1688
c7222c02 1689/* Warn about duplicate methods in fn_fields.
8d08fdba 1690
5b0cec3b
MM
1691 Sort methods that are not special (i.e., constructors, destructors,
1692 and type conversion operators) so that we can find them faster in
1693 search. */
8d08fdba 1694
b0e0b31f 1695static void
94edc4ab 1696finish_struct_methods (tree t)
8d08fdba 1697{
b0e0b31f 1698 tree fn_fields;
d4e6fecb 1699 VEC(tree,gc) *method_vec;
58010b57
MM
1700 int slot, len;
1701
58010b57 1702 method_vec = CLASSTYPE_METHOD_VEC (t);
508a1c9c
MM
1703 if (!method_vec)
1704 return;
1705
aaaa46d2 1706 len = VEC_length (tree, method_vec);
8d08fdba 1707
c7222c02 1708 /* Clear DECL_IN_AGGR_P for all functions. */
c8094d83 1709 for (fn_fields = TYPE_METHODS (t); fn_fields;
b0e0b31f 1710 fn_fields = TREE_CHAIN (fn_fields))
5b0cec3b 1711 DECL_IN_AGGR_P (fn_fields) = 0;
8d08fdba 1712
b0e0b31f
MM
1713 /* Issue warnings about private constructors and such. If there are
1714 no methods, then some public defaults are generated. */
f90cdf34
MT
1715 maybe_warn_about_overly_private_class (t);
1716
f90cdf34
MT
1717 /* The type conversion ops have to live at the front of the vec, so we
1718 can't sort them. */
9ba5ff0f
NS
1719 for (slot = CLASSTYPE_FIRST_CONVERSION_SLOT;
1720 VEC_iterate (tree, method_vec, slot, fn_fields);
aaaa46d2
MM
1721 ++slot)
1722 if (!DECL_CONV_FN_P (OVL_CURRENT (fn_fields)))
1723 break;
f90cdf34 1724 if (len - slot > 1)
aaaa46d2
MM
1725 qsort (VEC_address (tree, method_vec) + slot,
1726 len-slot, sizeof (tree), method_name_cmp);
8d08fdba
MS
1727}
1728
90ecce3e 1729/* Make BINFO's vtable have N entries, including RTTI entries,
8d7a5379
MM
1730 vbase and vcall offsets, etc. Set its type and call the backend
1731 to lay it out. */
1a588ad7
MM
1732
1733static void
94edc4ab 1734layout_vtable_decl (tree binfo, int n)
1a588ad7 1735{
1a588ad7 1736 tree atype;
c35cce41 1737 tree vtable;
1a588ad7 1738
c8094d83 1739 atype = build_cplus_array_type (vtable_entry_type,
442e01b6 1740 build_index_type (size_int (n - 1)));
1a588ad7
MM
1741 layout_type (atype);
1742
1743 /* We may have to grow the vtable. */
c35cce41
MM
1744 vtable = get_vtbl_decl_for_binfo (binfo);
1745 if (!same_type_p (TREE_TYPE (vtable), atype))
1a588ad7 1746 {
06ceef4e 1747 TREE_TYPE (vtable) = atype;
c35cce41 1748 DECL_SIZE (vtable) = DECL_SIZE_UNIT (vtable) = NULL_TREE;
06ceef4e 1749 layout_decl (vtable, 0);
1a588ad7
MM
1750 }
1751}
1752
9bab6c90
MM
1753/* True iff FNDECL and BASE_FNDECL (both non-static member functions)
1754 have the same signature. */
83f2ccf4 1755
e0fff4b3 1756int
94edc4ab 1757same_signature_p (tree fndecl, tree base_fndecl)
83f2ccf4 1758{
872f37f9
MM
1759 /* One destructor overrides another if they are the same kind of
1760 destructor. */
1761 if (DECL_DESTRUCTOR_P (base_fndecl) && DECL_DESTRUCTOR_P (fndecl)
1762 && special_function_p (base_fndecl) == special_function_p (fndecl))
ca36f057 1763 return 1;
872f37f9
MM
1764 /* But a non-destructor never overrides a destructor, nor vice
1765 versa, nor do different kinds of destructors override
1766 one-another. For example, a complete object destructor does not
1767 override a deleting destructor. */
0d9eb3ba 1768 if (DECL_DESTRUCTOR_P (base_fndecl) || DECL_DESTRUCTOR_P (fndecl))
ca36f057 1769 return 0;
872f37f9 1770
a6c0d772
MM
1771 if (DECL_NAME (fndecl) == DECL_NAME (base_fndecl)
1772 || (DECL_CONV_FN_P (fndecl)
1773 && DECL_CONV_FN_P (base_fndecl)
1774 && same_type_p (DECL_CONV_FN_TYPE (fndecl),
1775 DECL_CONV_FN_TYPE (base_fndecl))))
83f2ccf4 1776 {
ca36f057 1777 tree types, base_types;
ca36f057
MM
1778 types = TYPE_ARG_TYPES (TREE_TYPE (fndecl));
1779 base_types = TYPE_ARG_TYPES (TREE_TYPE (base_fndecl));
1780 if ((TYPE_QUALS (TREE_TYPE (TREE_VALUE (base_types)))
1781 == TYPE_QUALS (TREE_TYPE (TREE_VALUE (types))))
1782 && compparms (TREE_CHAIN (base_types), TREE_CHAIN (types)))
1783 return 1;
83f2ccf4 1784 }
ca36f057 1785 return 0;
83f2ccf4
MM
1786}
1787
9368208b
MM
1788/* Returns TRUE if DERIVED is a binfo containing the binfo BASE as a
1789 subobject. */
c8094d83 1790
9368208b
MM
1791static bool
1792base_derived_from (tree derived, tree base)
1793{
dbbf88d1
NS
1794 tree probe;
1795
1796 for (probe = base; probe; probe = BINFO_INHERITANCE_CHAIN (probe))
1797 {
1798 if (probe == derived)
1799 return true;
809e3e7f 1800 else if (BINFO_VIRTUAL_P (probe))
dbbf88d1
NS
1801 /* If we meet a virtual base, we can't follow the inheritance
1802 any more. See if the complete type of DERIVED contains
1803 such a virtual base. */
58c42dc2
NS
1804 return (binfo_for_vbase (BINFO_TYPE (probe), BINFO_TYPE (derived))
1805 != NULL_TREE);
dbbf88d1
NS
1806 }
1807 return false;
9368208b
MM
1808}
1809
ca36f057
MM
1810typedef struct find_final_overrider_data_s {
1811 /* The function for which we are trying to find a final overrider. */
1812 tree fn;
1813 /* The base class in which the function was declared. */
1814 tree declaring_base;
9368208b 1815 /* The candidate overriders. */
78b45a24 1816 tree candidates;
5d5a519f 1817 /* Path to most derived. */
d4e6fecb 1818 VEC(tree,heap) *path;
ca36f057 1819} find_final_overrider_data;
8d7a5379 1820
f7a8132a
MM
1821/* Add the overrider along the current path to FFOD->CANDIDATES.
1822 Returns true if an overrider was found; false otherwise. */
8d7a5379 1823
f7a8132a 1824static bool
c8094d83 1825dfs_find_final_overrider_1 (tree binfo,
5d5a519f
NS
1826 find_final_overrider_data *ffod,
1827 unsigned depth)
7177d104 1828{
741d8ca3
MM
1829 tree method;
1830
f7a8132a
MM
1831 /* If BINFO is not the most derived type, try a more derived class.
1832 A definition there will overrider a definition here. */
5d5a519f 1833 if (depth)
dbbf88d1 1834 {
5d5a519f
NS
1835 depth--;
1836 if (dfs_find_final_overrider_1
1837 (VEC_index (tree, ffod->path, depth), ffod, depth))
f7a8132a
MM
1838 return true;
1839 }
dbbf88d1 1840
741d8ca3 1841 method = look_for_overrides_here (BINFO_TYPE (binfo), ffod->fn);
f7a8132a
MM
1842 if (method)
1843 {
1844 tree *candidate = &ffod->candidates;
c8094d83 1845
f7a8132a
MM
1846 /* Remove any candidates overridden by this new function. */
1847 while (*candidate)
8d7a5379 1848 {
f7a8132a
MM
1849 /* If *CANDIDATE overrides METHOD, then METHOD
1850 cannot override anything else on the list. */
1851 if (base_derived_from (TREE_VALUE (*candidate), binfo))
1852 return true;
1853 /* If METHOD overrides *CANDIDATE, remove *CANDIDATE. */
1854 if (base_derived_from (binfo, TREE_VALUE (*candidate)))
1855 *candidate = TREE_CHAIN (*candidate);
dbbf88d1 1856 else
f7a8132a 1857 candidate = &TREE_CHAIN (*candidate);
5e19c053 1858 }
c8094d83 1859
f7a8132a
MM
1860 /* Add the new function. */
1861 ffod->candidates = tree_cons (method, binfo, ffod->candidates);
1862 return true;
dbbf88d1 1863 }
5e19c053 1864
f7a8132a
MM
1865 return false;
1866}
1867
1868/* Called from find_final_overrider via dfs_walk. */
1869
1870static tree
5d5a519f 1871dfs_find_final_overrider_pre (tree binfo, void *data)
f7a8132a
MM
1872{
1873 find_final_overrider_data *ffod = (find_final_overrider_data *) data;
1874
1875 if (binfo == ffod->declaring_base)
5d5a519f 1876 dfs_find_final_overrider_1 (binfo, ffod, VEC_length (tree, ffod->path));
d4e6fecb 1877 VEC_safe_push (tree, heap, ffod->path, binfo);
f7a8132a 1878
dbbf88d1
NS
1879 return NULL_TREE;
1880}
db3d8cde 1881
dbbf88d1 1882static tree
5d5a519f 1883dfs_find_final_overrider_post (tree binfo ATTRIBUTE_UNUSED, void *data)
dbbf88d1 1884{
dbbf88d1 1885 find_final_overrider_data *ffod = (find_final_overrider_data *) data;
5d5a519f 1886 VEC_pop (tree, ffod->path);
78b45a24 1887
dd42e135
MM
1888 return NULL_TREE;
1889}
1890
5e19c053
MM
1891/* Returns a TREE_LIST whose TREE_PURPOSE is the final overrider for
1892 FN and whose TREE_VALUE is the binfo for the base where the
95675950
MM
1893 overriding occurs. BINFO (in the hierarchy dominated by the binfo
1894 DERIVED) is the base object in which FN is declared. */
e92cc029 1895
a292b002 1896static tree
94edc4ab 1897find_final_overrider (tree derived, tree binfo, tree fn)
a292b002 1898{
5e19c053 1899 find_final_overrider_data ffod;
a292b002 1900
0e339752 1901 /* Getting this right is a little tricky. This is valid:
a292b002 1902
5e19c053
MM
1903 struct S { virtual void f (); };
1904 struct T { virtual void f (); };
1905 struct U : public S, public T { };
a292b002 1906
c8094d83 1907 even though calling `f' in `U' is ambiguous. But,
a292b002 1908
5e19c053
MM
1909 struct R { virtual void f(); };
1910 struct S : virtual public R { virtual void f (); };
1911 struct T : virtual public R { virtual void f (); };
1912 struct U : public S, public T { };
dd42e135 1913
d0cd8b44 1914 is not -- there's no way to decide whether to put `S::f' or
c8094d83
MS
1915 `T::f' in the vtable for `R'.
1916
5e19c053
MM
1917 The solution is to look at all paths to BINFO. If we find
1918 different overriders along any two, then there is a problem. */
07fa4878
NS
1919 if (DECL_THUNK_P (fn))
1920 fn = THUNK_TARGET (fn);
f7a8132a
MM
1921
1922 /* Determine the depth of the hierarchy. */
5e19c053
MM
1923 ffod.fn = fn;
1924 ffod.declaring_base = binfo;
78b45a24 1925 ffod.candidates = NULL_TREE;
d4e6fecb 1926 ffod.path = VEC_alloc (tree, heap, 30);
5e19c053 1927
5d5a519f
NS
1928 dfs_walk_all (derived, dfs_find_final_overrider_pre,
1929 dfs_find_final_overrider_post, &ffod);
f7a8132a 1930
d4e6fecb 1931 VEC_free (tree, heap, ffod.path);
c8094d83 1932
78b45a24 1933 /* If there was no winner, issue an error message. */
9368208b 1934 if (!ffod.candidates || TREE_CHAIN (ffod.candidates))
16a1369e 1935 return error_mark_node;
dd42e135 1936
9368208b 1937 return ffod.candidates;
a292b002
MS
1938}
1939
548502d3
MM
1940/* Return the index of the vcall offset for FN when TYPE is used as a
1941 virtual base. */
d0cd8b44 1942
d0cd8b44 1943static tree
548502d3 1944get_vcall_index (tree fn, tree type)
d0cd8b44 1945{
d4e6fecb 1946 VEC(tree_pair_s,gc) *indices = CLASSTYPE_VCALL_INDICES (type);
0871761b
NS
1947 tree_pair_p p;
1948 unsigned ix;
d0cd8b44 1949
0871761b
NS
1950 for (ix = 0; VEC_iterate (tree_pair_s, indices, ix, p); ix++)
1951 if ((DECL_DESTRUCTOR_P (fn) && DECL_DESTRUCTOR_P (p->purpose))
1952 || same_signature_p (fn, p->purpose))
1953 return p->value;
548502d3
MM
1954
1955 /* There should always be an appropriate index. */
8dc2b103 1956 gcc_unreachable ();
d0cd8b44 1957}
d0cd8b44
JM
1958
1959/* Update an entry in the vtable for BINFO, which is in the hierarchy
4639c5c6 1960 dominated by T. FN has been overridden in BINFO; VIRTUALS points to the
d0cd8b44 1961 corresponding position in the BINFO_VIRTUALS list. */
4e7512c9
MM
1962
1963static void
a2ddc397
NS
1964update_vtable_entry_for_fn (tree t, tree binfo, tree fn, tree* virtuals,
1965 unsigned ix)
4e7512c9
MM
1966{
1967 tree b;
1968 tree overrider;
4e7512c9 1969 tree delta;
31f8e4f3 1970 tree virtual_base;
d0cd8b44 1971 tree first_defn;
3cfabe60
NS
1972 tree overrider_fn, overrider_target;
1973 tree target_fn = DECL_THUNK_P (fn) ? THUNK_TARGET (fn) : fn;
1974 tree over_return, base_return;
f11ee281 1975 bool lost = false;
4e7512c9 1976
d0cd8b44
JM
1977 /* Find the nearest primary base (possibly binfo itself) which defines
1978 this function; this is the class the caller will convert to when
1979 calling FN through BINFO. */
1980 for (b = binfo; ; b = get_primary_binfo (b))
4e7512c9 1981 {
50bc768d 1982 gcc_assert (b);
3cfabe60 1983 if (look_for_overrides_here (BINFO_TYPE (b), target_fn))
31f8e4f3 1984 break;
f11ee281
JM
1985
1986 /* The nearest definition is from a lost primary. */
1987 if (BINFO_LOST_PRIMARY_P (b))
1988 lost = true;
4e7512c9 1989 }
d0cd8b44 1990 first_defn = b;
4e7512c9 1991
31f8e4f3 1992 /* Find the final overrider. */
3cfabe60 1993 overrider = find_final_overrider (TYPE_BINFO (t), b, target_fn);
4e7512c9 1994 if (overrider == error_mark_node)
16a1369e
JJ
1995 {
1996 error ("no unique final overrider for %qD in %qT", target_fn, t);
1997 return;
1998 }
3cfabe60 1999 overrider_target = overrider_fn = TREE_PURPOSE (overrider);
c8094d83 2000
9bcb9aae 2001 /* Check for adjusting covariant return types. */
3cfabe60
NS
2002 over_return = TREE_TYPE (TREE_TYPE (overrider_target));
2003 base_return = TREE_TYPE (TREE_TYPE (target_fn));
c8094d83 2004
3cfabe60
NS
2005 if (POINTER_TYPE_P (over_return)
2006 && TREE_CODE (over_return) == TREE_CODE (base_return)
2007 && CLASS_TYPE_P (TREE_TYPE (over_return))
b77fe7b4
NS
2008 && CLASS_TYPE_P (TREE_TYPE (base_return))
2009 /* If the overrider is invalid, don't even try. */
2010 && !DECL_INVALID_OVERRIDER_P (overrider_target))
3cfabe60
NS
2011 {
2012 /* If FN is a covariant thunk, we must figure out the adjustment
0cbd7506
MS
2013 to the final base FN was converting to. As OVERRIDER_TARGET might
2014 also be converting to the return type of FN, we have to
2015 combine the two conversions here. */
3cfabe60 2016 tree fixed_offset, virtual_offset;
12a669d1
NS
2017
2018 over_return = TREE_TYPE (over_return);
2019 base_return = TREE_TYPE (base_return);
c8094d83 2020
3cfabe60
NS
2021 if (DECL_THUNK_P (fn))
2022 {
50bc768d 2023 gcc_assert (DECL_RESULT_THUNK_P (fn));
3cfabe60
NS
2024 fixed_offset = ssize_int (THUNK_FIXED_OFFSET (fn));
2025 virtual_offset = THUNK_VIRTUAL_OFFSET (fn);
3cfabe60
NS
2026 }
2027 else
2028 fixed_offset = virtual_offset = NULL_TREE;
4977bab6 2029
e00853fd
NS
2030 if (virtual_offset)
2031 /* Find the equivalent binfo within the return type of the
2032 overriding function. We will want the vbase offset from
2033 there. */
58c42dc2 2034 virtual_offset = binfo_for_vbase (BINFO_TYPE (virtual_offset),
12a669d1
NS
2035 over_return);
2036 else if (!same_type_ignoring_top_level_qualifiers_p
2037 (over_return, base_return))
3cfabe60
NS
2038 {
2039 /* There was no existing virtual thunk (which takes
12a669d1
NS
2040 precedence). So find the binfo of the base function's
2041 return type within the overriding function's return type.
2042 We cannot call lookup base here, because we're inside a
2043 dfs_walk, and will therefore clobber the BINFO_MARKED
2044 flags. Fortunately we know the covariancy is valid (it
2045 has already been checked), so we can just iterate along
2046 the binfos, which have been chained in inheritance graph
2047 order. Of course it is lame that we have to repeat the
2048 search here anyway -- we should really be caching pieces
2049 of the vtable and avoiding this repeated work. */
2050 tree thunk_binfo, base_binfo;
2051
2052 /* Find the base binfo within the overriding function's
742f25b3
NS
2053 return type. We will always find a thunk_binfo, except
2054 when the covariancy is invalid (which we will have
2055 already diagnosed). */
12a669d1
NS
2056 for (base_binfo = TYPE_BINFO (base_return),
2057 thunk_binfo = TYPE_BINFO (over_return);
742f25b3 2058 thunk_binfo;
12a669d1 2059 thunk_binfo = TREE_CHAIN (thunk_binfo))
742f25b3
NS
2060 if (SAME_BINFO_TYPE_P (BINFO_TYPE (thunk_binfo),
2061 BINFO_TYPE (base_binfo)))
2062 break;
c8094d83 2063
12a669d1
NS
2064 /* See if virtual inheritance is involved. */
2065 for (virtual_offset = thunk_binfo;
2066 virtual_offset;
2067 virtual_offset = BINFO_INHERITANCE_CHAIN (virtual_offset))
2068 if (BINFO_VIRTUAL_P (virtual_offset))
2069 break;
c8094d83 2070
742f25b3
NS
2071 if (virtual_offset
2072 || (thunk_binfo && !BINFO_OFFSET_ZEROP (thunk_binfo)))
3cfabe60 2073 {
bb885938 2074 tree offset = convert (ssizetype, BINFO_OFFSET (thunk_binfo));
8d1f0f67 2075
12a669d1 2076 if (virtual_offset)
3cfabe60 2077 {
12a669d1
NS
2078 /* We convert via virtual base. Adjust the fixed
2079 offset to be from there. */
bb885938
NS
2080 offset = size_diffop
2081 (offset, convert
2082 (ssizetype, BINFO_OFFSET (virtual_offset)));
3cfabe60
NS
2083 }
2084 if (fixed_offset)
2085 /* There was an existing fixed offset, this must be
2086 from the base just converted to, and the base the
2087 FN was thunking to. */
2088 fixed_offset = size_binop (PLUS_EXPR, fixed_offset, offset);
2089 else
2090 fixed_offset = offset;
2091 }
2092 }
c8094d83 2093
3cfabe60
NS
2094 if (fixed_offset || virtual_offset)
2095 /* Replace the overriding function with a covariant thunk. We
2096 will emit the overriding function in its own slot as
9bcb9aae 2097 well. */
3cfabe60
NS
2098 overrider_fn = make_thunk (overrider_target, /*this_adjusting=*/0,
2099 fixed_offset, virtual_offset);
2100 }
2101 else
50bc768d 2102 gcc_assert (!DECL_THUNK_P (fn));
c8094d83 2103
31f8e4f3
MM
2104 /* Assume that we will produce a thunk that convert all the way to
2105 the final overrider, and not to an intermediate virtual base. */
9ccf6541 2106 virtual_base = NULL_TREE;
31f8e4f3 2107
f11ee281 2108 /* See if we can convert to an intermediate virtual base first, and then
3461fba7 2109 use the vcall offset located there to finish the conversion. */
f11ee281 2110 for (; b; b = BINFO_INHERITANCE_CHAIN (b))
4e7512c9 2111 {
d0cd8b44
JM
2112 /* If we find the final overrider, then we can stop
2113 walking. */
539ed333
NS
2114 if (SAME_BINFO_TYPE_P (BINFO_TYPE (b),
2115 BINFO_TYPE (TREE_VALUE (overrider))))
1f84ec23 2116 break;
31f8e4f3 2117
d0cd8b44
JM
2118 /* If we find a virtual base, and we haven't yet found the
2119 overrider, then there is a virtual base between the
2120 declaring base (first_defn) and the final overrider. */
809e3e7f 2121 if (BINFO_VIRTUAL_P (b))
dbbf88d1
NS
2122 {
2123 virtual_base = b;
2124 break;
2125 }
4e7512c9 2126 }
4e7512c9 2127
a2ddc397
NS
2128 if (overrider_fn != overrider_target && !virtual_base)
2129 {
2130 /* The ABI specifies that a covariant thunk includes a mangling
0cbd7506
MS
2131 for a this pointer adjustment. This-adjusting thunks that
2132 override a function from a virtual base have a vcall
2133 adjustment. When the virtual base in question is a primary
2134 virtual base, we know the adjustments are zero, (and in the
2135 non-covariant case, we would not use the thunk).
2136 Unfortunately we didn't notice this could happen, when
2137 designing the ABI and so never mandated that such a covariant
2138 thunk should be emitted. Because we must use the ABI mandated
2139 name, we must continue searching from the binfo where we
2140 found the most recent definition of the function, towards the
2141 primary binfo which first introduced the function into the
2142 vtable. If that enters a virtual base, we must use a vcall
2143 this-adjusting thunk. Bleah! */
bb885938
NS
2144 tree probe = first_defn;
2145
2146 while ((probe = get_primary_binfo (probe))
2147 && (unsigned) list_length (BINFO_VIRTUALS (probe)) > ix)
809e3e7f 2148 if (BINFO_VIRTUAL_P (probe))
bb885938 2149 virtual_base = probe;
c8094d83 2150
a2ddc397
NS
2151 if (virtual_base)
2152 /* Even if we find a virtual base, the correct delta is
2153 between the overrider and the binfo we're building a vtable
2154 for. */
2155 goto virtual_covariant;
2156 }
c8094d83 2157
d0cd8b44
JM
2158 /* Compute the constant adjustment to the `this' pointer. The
2159 `this' pointer, when this function is called, will point at BINFO
2160 (or one of its primary bases, which are at the same offset). */
31f8e4f3 2161 if (virtual_base)
20dde49d
NS
2162 /* The `this' pointer needs to be adjusted from the declaration to
2163 the nearest virtual base. */
bb885938
NS
2164 delta = size_diffop (convert (ssizetype, BINFO_OFFSET (virtual_base)),
2165 convert (ssizetype, BINFO_OFFSET (first_defn)));
f11ee281
JM
2166 else if (lost)
2167 /* If the nearest definition is in a lost primary, we don't need an
2168 entry in our vtable. Except possibly in a constructor vtable,
2169 if we happen to get our primary back. In that case, the offset
2170 will be zero, as it will be a primary base. */
2171 delta = size_zero_node;
4e7512c9 2172 else
548502d3
MM
2173 /* The `this' pointer needs to be adjusted from pointing to
2174 BINFO to pointing at the base where the final overrider
2175 appears. */
a2ddc397 2176 virtual_covariant:
bb885938
NS
2177 delta = size_diffop (convert (ssizetype,
2178 BINFO_OFFSET (TREE_VALUE (overrider))),
2179 convert (ssizetype, BINFO_OFFSET (binfo)));
4e7512c9 2180
3cfabe60 2181 modify_vtable_entry (t, binfo, overrider_fn, delta, virtuals);
31f8e4f3
MM
2182
2183 if (virtual_base)
c8094d83 2184 BV_VCALL_INDEX (*virtuals)
3cfabe60 2185 = get_vcall_index (overrider_target, BINFO_TYPE (virtual_base));
d1f05f93
NS
2186 else
2187 BV_VCALL_INDEX (*virtuals) = NULL_TREE;
4e7512c9
MM
2188}
2189
8026246f 2190/* Called from modify_all_vtables via dfs_walk. */
e92cc029 2191
8026246f 2192static tree
94edc4ab 2193dfs_modify_vtables (tree binfo, void* data)
8026246f 2194{
bcb1079e 2195 tree t = (tree) data;
5b94d9dd
NS
2196 tree virtuals;
2197 tree old_virtuals;
2198 unsigned ix;
2199
2200 if (!TYPE_CONTAINS_VPTR_P (BINFO_TYPE (binfo)))
2201 /* A base without a vtable needs no modification, and its bases
2202 are uninteresting. */
2203 return dfs_skip_bases;
c8094d83 2204
5b94d9dd
NS
2205 if (SAME_BINFO_TYPE_P (BINFO_TYPE (binfo), t)
2206 && !CLASSTYPE_HAS_PRIMARY_BASE_P (t))
2207 /* Don't do the primary vtable, if it's new. */
2208 return NULL_TREE;
2209
2210 if (BINFO_PRIMARY_P (binfo) && !BINFO_VIRTUAL_P (binfo))
2211 /* There's no need to modify the vtable for a non-virtual primary
2212 base; we're not going to use that vtable anyhow. We do still
2213 need to do this for virtual primary bases, as they could become
2214 non-primary in a construction vtable. */
2215 return NULL_TREE;
2216
2217 make_new_vtable (t, binfo);
c8094d83 2218
5b94d9dd
NS
2219 /* Now, go through each of the virtual functions in the virtual
2220 function table for BINFO. Find the final overrider, and update
2221 the BINFO_VIRTUALS list appropriately. */
2222 for (ix = 0, virtuals = BINFO_VIRTUALS (binfo),
2223 old_virtuals = BINFO_VIRTUALS (TYPE_BINFO (BINFO_TYPE (binfo)));
2224 virtuals;
2225 ix++, virtuals = TREE_CHAIN (virtuals),
2226 old_virtuals = TREE_CHAIN (old_virtuals))
c8094d83
MS
2227 update_vtable_entry_for_fn (t,
2228 binfo,
5b94d9dd
NS
2229 BV_FN (old_virtuals),
2230 &virtuals, ix);
8026246f 2231
8026246f
MM
2232 return NULL_TREE;
2233}
2234
a68ad5bd
MM
2235/* Update all of the primary and secondary vtables for T. Create new
2236 vtables as required, and initialize their RTTI information. Each
e6858a84
NS
2237 of the functions in VIRTUALS is declared in T and may override a
2238 virtual function from a base class; find and modify the appropriate
2239 entries to point to the overriding functions. Returns a list, in
2240 declaration order, of the virtual functions that are declared in T,
2241 but do not appear in the primary base class vtable, and which
2242 should therefore be appended to the end of the vtable for T. */
a68ad5bd
MM
2243
2244static tree
94edc4ab 2245modify_all_vtables (tree t, tree virtuals)
8026246f 2246{
3461fba7
NS
2247 tree binfo = TYPE_BINFO (t);
2248 tree *fnsp;
a68ad5bd 2249
5e19c053 2250 /* Update all of the vtables. */
5b94d9dd 2251 dfs_walk_once (binfo, dfs_modify_vtables, NULL, t);
a68ad5bd 2252
e6858a84
NS
2253 /* Add virtual functions not already in our primary vtable. These
2254 will be both those introduced by this class, and those overridden
2255 from secondary bases. It does not include virtuals merely
2256 inherited from secondary bases. */
2257 for (fnsp = &virtuals; *fnsp; )
a68ad5bd 2258 {
3461fba7 2259 tree fn = TREE_VALUE (*fnsp);
a68ad5bd 2260
e6858a84
NS
2261 if (!value_member (fn, BINFO_VIRTUALS (binfo))
2262 || DECL_VINDEX (fn) == error_mark_node)
a68ad5bd 2263 {
3461fba7
NS
2264 /* We don't need to adjust the `this' pointer when
2265 calling this function. */
2266 BV_DELTA (*fnsp) = integer_zero_node;
2267 BV_VCALL_INDEX (*fnsp) = NULL_TREE;
2268
e6858a84 2269 /* This is a function not already in our vtable. Keep it. */
3461fba7 2270 fnsp = &TREE_CHAIN (*fnsp);
a68ad5bd 2271 }
3461fba7
NS
2272 else
2273 /* We've already got an entry for this function. Skip it. */
2274 *fnsp = TREE_CHAIN (*fnsp);
a68ad5bd 2275 }
e93ee644 2276
e6858a84 2277 return virtuals;
7177d104
MS
2278}
2279
7d5b8b11
MM
2280/* Get the base virtual function declarations in T that have the
2281 indicated NAME. */
e92cc029 2282
5ddc28a5 2283static tree
94edc4ab 2284get_basefndecls (tree name, tree t)
9e9ff709 2285{
7d5b8b11 2286 tree methods;
9e9ff709 2287 tree base_fndecls = NULL_TREE;
604a3205 2288 int n_baseclasses = BINFO_N_BASE_BINFOS (TYPE_BINFO (t));
7d5b8b11 2289 int i;
9e9ff709 2290
3d1df1fa
MM
2291 /* Find virtual functions in T with the indicated NAME. */
2292 i = lookup_fnfields_1 (t, name);
2293 if (i != -1)
aaaa46d2 2294 for (methods = VEC_index (tree, CLASSTYPE_METHOD_VEC (t), i);
3d1df1fa
MM
2295 methods;
2296 methods = OVL_NEXT (methods))
2297 {
2298 tree method = OVL_CURRENT (methods);
2299
2300 if (TREE_CODE (method) == FUNCTION_DECL
2301 && DECL_VINDEX (method))
2302 base_fndecls = tree_cons (NULL_TREE, method, base_fndecls);
2303 }
9e9ff709
MS
2304
2305 if (base_fndecls)
2306 return base_fndecls;
2307
2308 for (i = 0; i < n_baseclasses; i++)
2309 {
604a3205 2310 tree basetype = BINFO_TYPE (BINFO_BASE_BINFO (TYPE_BINFO (t), i));
7d5b8b11 2311 base_fndecls = chainon (get_basefndecls (name, basetype),
9e9ff709
MS
2312 base_fndecls);
2313 }
2314
2315 return base_fndecls;
2316}
2317
2ee887f2
MS
2318/* If this declaration supersedes the declaration of
2319 a method declared virtual in the base class, then
2320 mark this field as being virtual as well. */
2321
9f4faeae 2322void
94edc4ab 2323check_for_override (tree decl, tree ctype)
2ee887f2 2324{
cbb40945
NS
2325 if (TREE_CODE (decl) == TEMPLATE_DECL)
2326 /* In [temp.mem] we have:
2ee887f2 2327
0cbd7506
MS
2328 A specialization of a member function template does not
2329 override a virtual function from a base class. */
cbb40945
NS
2330 return;
2331 if ((DECL_DESTRUCTOR_P (decl)
a6c0d772
MM
2332 || IDENTIFIER_VIRTUAL_P (DECL_NAME (decl))
2333 || DECL_CONV_FN_P (decl))
cbb40945
NS
2334 && look_for_overrides (ctype, decl)
2335 && !DECL_STATIC_FUNCTION_P (decl))
e6858a84
NS
2336 /* Set DECL_VINDEX to a value that is neither an INTEGER_CST nor
2337 the error_mark_node so that we know it is an overriding
2338 function. */
2339 DECL_VINDEX (decl) = decl;
2340
cbb40945 2341 if (DECL_VIRTUAL_P (decl))
2ee887f2 2342 {
e6858a84 2343 if (!DECL_VINDEX (decl))
2ee887f2
MS
2344 DECL_VINDEX (decl) = error_mark_node;
2345 IDENTIFIER_VIRTUAL_P (DECL_NAME (decl)) = 1;
2346 }
2347}
2348
fc378698
MS
2349/* Warn about hidden virtual functions that are not overridden in t.
2350 We know that constructors and destructors don't apply. */
e92cc029 2351
9e9ff709 2352void
94edc4ab 2353warn_hidden (tree t)
9e9ff709 2354{
d4e6fecb 2355 VEC(tree,gc) *method_vec = CLASSTYPE_METHOD_VEC (t);
aaaa46d2
MM
2356 tree fns;
2357 size_t i;
9e9ff709
MS
2358
2359 /* We go through each separately named virtual function. */
c8094d83 2360 for (i = CLASSTYPE_FIRST_CONVERSION_SLOT;
9ba5ff0f 2361 VEC_iterate (tree, method_vec, i, fns);
aaaa46d2 2362 ++i)
9e9ff709 2363 {
aaaa46d2 2364 tree fn;
7d5b8b11
MM
2365 tree name;
2366 tree fndecl;
2367 tree base_fndecls;
fa743e8c
NS
2368 tree base_binfo;
2369 tree binfo;
7d5b8b11
MM
2370 int j;
2371
2372 /* All functions in this slot in the CLASSTYPE_METHOD_VEC will
2373 have the same name. Figure out what name that is. */
aaaa46d2 2374 name = DECL_NAME (OVL_CURRENT (fns));
7d5b8b11
MM
2375 /* There are no possibly hidden functions yet. */
2376 base_fndecls = NULL_TREE;
2377 /* Iterate through all of the base classes looking for possibly
2378 hidden functions. */
fa743e8c
NS
2379 for (binfo = TYPE_BINFO (t), j = 0;
2380 BINFO_BASE_ITERATE (binfo, j, base_binfo); j++)
a4832853 2381 {
fa743e8c 2382 tree basetype = BINFO_TYPE (base_binfo);
7d5b8b11
MM
2383 base_fndecls = chainon (get_basefndecls (name, basetype),
2384 base_fndecls);
a4832853
JM
2385 }
2386
00a17e31 2387 /* If there are no functions to hide, continue. */
7d5b8b11 2388 if (!base_fndecls)
9e9ff709
MS
2389 continue;
2390
00a17e31 2391 /* Remove any overridden functions. */
aaaa46d2 2392 for (fn = fns; fn; fn = OVL_NEXT (fn))
9e9ff709 2393 {
aaaa46d2 2394 fndecl = OVL_CURRENT (fn);
7d5b8b11
MM
2395 if (DECL_VINDEX (fndecl))
2396 {
2397 tree *prev = &base_fndecls;
c8094d83
MS
2398
2399 while (*prev)
7d5b8b11
MM
2400 /* If the method from the base class has the same
2401 signature as the method from the derived class, it
2402 has been overridden. */
2403 if (same_signature_p (fndecl, TREE_VALUE (*prev)))
2404 *prev = TREE_CHAIN (*prev);
2405 else
2406 prev = &TREE_CHAIN (*prev);
2407 }
9e9ff709
MS
2408 }
2409
9e9ff709
MS
2410 /* Now give a warning for all base functions without overriders,
2411 as they are hidden. */
c8094d83 2412 while (base_fndecls)
7d5b8b11
MM
2413 {
2414 /* Here we know it is a hider, and no overrider exists. */
dee15844
JM
2415 warning (0, "%q+D was hidden", TREE_VALUE (base_fndecls));
2416 warning (0, " by %q+D", fns);
7d5b8b11
MM
2417 base_fndecls = TREE_CHAIN (base_fndecls);
2418 }
9e9ff709
MS
2419 }
2420}
2421
2422/* Check for things that are invalid. There are probably plenty of other
2423 things we should check for also. */
e92cc029 2424
9e9ff709 2425static void
94edc4ab 2426finish_struct_anon (tree t)
9e9ff709
MS
2427{
2428 tree field;
f90cdf34 2429
9e9ff709
MS
2430 for (field = TYPE_FIELDS (t); field; field = TREE_CHAIN (field))
2431 {
2432 if (TREE_STATIC (field))
2433 continue;
2434 if (TREE_CODE (field) != FIELD_DECL)
2435 continue;
2436
2437 if (DECL_NAME (field) == NULL_TREE
6bdb8141 2438 && ANON_AGGR_TYPE_P (TREE_TYPE (field)))
9e9ff709 2439 {
f90cdf34
MT
2440 tree elt = TYPE_FIELDS (TREE_TYPE (field));
2441 for (; elt; elt = TREE_CHAIN (elt))
9e9ff709 2442 {
b7076960
MM
2443 /* We're generally only interested in entities the user
2444 declared, but we also find nested classes by noticing
2445 the TYPE_DECL that we create implicitly. You're
2446 allowed to put one anonymous union inside another,
6f32162a
JM
2447 though, so we explicitly tolerate that. We use
2448 TYPE_ANONYMOUS_P rather than ANON_AGGR_TYPE_P so that
2449 we also allow unnamed types used for defining fields. */
c8094d83 2450 if (DECL_ARTIFICIAL (elt)
b7076960 2451 && (!DECL_IMPLICIT_TYPEDEF_P (elt)
6f32162a 2452 || TYPE_ANONYMOUS_P (TREE_TYPE (elt))))
9e9ff709
MS
2453 continue;
2454
f90cdf34 2455 if (TREE_CODE (elt) != FIELD_DECL)
8ebeee52 2456 {
dee15844
JM
2457 pedwarn ("%q+#D invalid; an anonymous union can "
2458 "only have non-static data members", elt);
8ebeee52
JM
2459 continue;
2460 }
2461
f90cdf34 2462 if (TREE_PRIVATE (elt))
dee15844 2463 pedwarn ("private member %q+#D in anonymous union", elt);
f90cdf34 2464 else if (TREE_PROTECTED (elt))
dee15844 2465 pedwarn ("protected member %q+#D in anonymous union", elt);
fc378698 2466
f90cdf34
MT
2467 TREE_PRIVATE (elt) = TREE_PRIVATE (field);
2468 TREE_PROTECTED (elt) = TREE_PROTECTED (field);
9e9ff709
MS
2469 }
2470 }
2471 }
2472}
2473
7088fca9
KL
2474/* Add T to CLASSTYPE_DECL_LIST of current_class_type which
2475 will be used later during class template instantiation.
2476 When FRIEND_P is zero, T can be a static member data (VAR_DECL),
2477 a non-static member data (FIELD_DECL), a member function
c8094d83 2478 (FUNCTION_DECL), a nested type (RECORD_TYPE, ENUM_TYPE),
7088fca9
KL
2479 a typedef (TYPE_DECL) or a member class template (TEMPLATE_DECL)
2480 When FRIEND_P is nonzero, T is either a friend class
2481 (RECORD_TYPE, TEMPLATE_DECL) or a friend function
2482 (FUNCTION_DECL, TEMPLATE_DECL). */
2483
2484void
94edc4ab 2485maybe_add_class_template_decl_list (tree type, tree t, int friend_p)
7088fca9
KL
2486{
2487 /* Save some memory by not creating TREE_LIST if TYPE is not template. */
2488 if (CLASSTYPE_TEMPLATE_INFO (type))
2489 CLASSTYPE_DECL_LIST (type)
2490 = tree_cons (friend_p ? NULL_TREE : type,
2491 t, CLASSTYPE_DECL_LIST (type));
2492}
2493
61a127b3 2494/* Create default constructors, assignment operators, and so forth for
e5e459bf
AO
2495 the type indicated by T, if they are needed. CANT_HAVE_CONST_CTOR,
2496 and CANT_HAVE_CONST_ASSIGNMENT are nonzero if, for whatever reason,
2497 the class cannot have a default constructor, copy constructor
2498 taking a const reference argument, or an assignment operator taking
2499 a const reference, respectively. */
61a127b3 2500
f72ab53b 2501static void
c8094d83 2502add_implicitly_declared_members (tree t,
94edc4ab
NN
2503 int cant_have_const_cctor,
2504 int cant_have_const_assignment)
61a127b3 2505{
61a127b3 2506 /* Destructor. */
9f4faeae 2507 if (!CLASSTYPE_DESTRUCTORS (t))
61a127b3 2508 {
9f4faeae
MM
2509 /* In general, we create destructors lazily. */
2510 CLASSTYPE_LAZY_DESTRUCTOR (t) = 1;
2511 /* However, if the implicit destructor is non-trivial
2512 destructor, we sometimes have to create it at this point. */
2513 if (TYPE_HAS_NONTRIVIAL_DESTRUCTOR (t))
2514 {
2515 bool lazy_p = true;
61a127b3 2516
9f4faeae
MM
2517 if (TYPE_FOR_JAVA (t))
2518 /* If this a Java class, any non-trivial destructor is
2519 invalid, even if compiler-generated. Therefore, if the
2520 destructor is non-trivial we create it now. */
2521 lazy_p = false;
2522 else
2523 {
2524 tree binfo;
2525 tree base_binfo;
2526 int ix;
2527
2528 /* If the implicit destructor will be virtual, then we must
2529 generate it now because (unfortunately) we do not
2530 generate virtual tables lazily. */
2531 binfo = TYPE_BINFO (t);
2532 for (ix = 0; BINFO_BASE_ITERATE (binfo, ix, base_binfo); ix++)
2533 {
2534 tree base_type;
2535 tree dtor;
2536
2537 base_type = BINFO_TYPE (base_binfo);
2538 dtor = CLASSTYPE_DESTRUCTORS (base_type);
2539 if (dtor && DECL_VIRTUAL_P (dtor))
2540 {
2541 lazy_p = false;
2542 break;
2543 }
2544 }
2545 }
2546
2547 /* If we can't get away with being lazy, generate the destructor
c8094d83 2548 now. */
9f4faeae
MM
2549 if (!lazy_p)
2550 lazily_declare_fn (sfk_destructor, t);
2551 }
61a127b3 2552 }
61a127b3
MM
2553
2554 /* Default constructor. */
e5e459bf 2555 if (! TYPE_HAS_CONSTRUCTOR (t))
61a127b3 2556 {
508a1c9c
MM
2557 TYPE_HAS_DEFAULT_CONSTRUCTOR (t) = 1;
2558 CLASSTYPE_LAZY_DEFAULT_CTOR (t) = 1;
61a127b3
MM
2559 }
2560
2561 /* Copy constructor. */
6eabb241 2562 if (! TYPE_HAS_INIT_REF (t) && ! TYPE_FOR_JAVA (t))
61a127b3 2563 {
508a1c9c
MM
2564 TYPE_HAS_INIT_REF (t) = 1;
2565 TYPE_HAS_CONST_INIT_REF (t) = !cant_have_const_cctor;
2566 CLASSTYPE_LAZY_COPY_CTOR (t) = 1;
2567 TYPE_HAS_CONSTRUCTOR (t) = 1;
61a127b3
MM
2568 }
2569
aaaa46d2
MM
2570 /* If there is no assignment operator, one will be created if and
2571 when it is needed. For now, just record whether or not the type
2572 of the parameter to the assignment operator will be a const or
2573 non-const reference. */
2574 if (!TYPE_HAS_ASSIGN_REF (t) && !TYPE_FOR_JAVA (t))
fb232476
MM
2575 {
2576 TYPE_HAS_ASSIGN_REF (t) = 1;
2577 TYPE_HAS_CONST_ASSIGN_REF (t) = !cant_have_const_assignment;
2578 CLASSTYPE_LAZY_ASSIGNMENT_OP (t) = 1;
2579 }
61a127b3
MM
2580}
2581
f90cdf34
MT
2582/* Subroutine of finish_struct_1. Recursively count the number of fields
2583 in TYPE, including anonymous union members. */
2584
2585static int
94edc4ab 2586count_fields (tree fields)
f90cdf34
MT
2587{
2588 tree x;
2589 int n_fields = 0;
2590 for (x = fields; x; x = TREE_CHAIN (x))
2591 {
2592 if (TREE_CODE (x) == FIELD_DECL && ANON_AGGR_TYPE_P (TREE_TYPE (x)))
2593 n_fields += count_fields (TYPE_FIELDS (TREE_TYPE (x)));
2594 else
2595 n_fields += 1;
2596 }
2597 return n_fields;
2598}
2599
2600/* Subroutine of finish_struct_1. Recursively add all the fields in the
d07605f5 2601 TREE_LIST FIELDS to the SORTED_FIELDS_TYPE elts, starting at offset IDX. */
f90cdf34
MT
2602
2603static int
d07605f5 2604add_fields_to_record_type (tree fields, struct sorted_fields_type *field_vec, int idx)
f90cdf34
MT
2605{
2606 tree x;
2607 for (x = fields; x; x = TREE_CHAIN (x))
2608 {
2609 if (TREE_CODE (x) == FIELD_DECL && ANON_AGGR_TYPE_P (TREE_TYPE (x)))
d07605f5 2610 idx = add_fields_to_record_type (TYPE_FIELDS (TREE_TYPE (x)), field_vec, idx);
f90cdf34 2611 else
d07605f5 2612 field_vec->elts[idx++] = x;
f90cdf34
MT
2613 }
2614 return idx;
2615}
2616
1e30f9b4
MM
2617/* FIELD is a bit-field. We are finishing the processing for its
2618 enclosing type. Issue any appropriate messages and set appropriate
2619 flags. */
2620
2621static void
94edc4ab 2622check_bitfield_decl (tree field)
1e30f9b4
MM
2623{
2624 tree type = TREE_TYPE (field);
cd8ed629 2625 tree w = NULL_TREE;
1e30f9b4 2626
cd8ed629 2627 /* Detect invalid bit-field type. */
1e30f9b4
MM
2628 if (DECL_INITIAL (field)
2629 && ! INTEGRAL_TYPE_P (TREE_TYPE (field)))
2630 {
dee15844 2631 error ("bit-field %q+#D with non-integral type", field);
cd8ed629 2632 w = error_mark_node;
1e30f9b4
MM
2633 }
2634
2635 /* Detect and ignore out of range field width. */
2636 if (DECL_INITIAL (field))
2637 {
cd8ed629 2638 w = DECL_INITIAL (field);
1e30f9b4
MM
2639
2640 /* Avoid the non_lvalue wrapper added by fold for PLUS_EXPRs. */
2641 STRIP_NOPS (w);
2642
2643 /* detect invalid field size. */
8a784e4a 2644 w = integral_constant_value (w);
1e30f9b4
MM
2645
2646 if (TREE_CODE (w) != INTEGER_CST)
2647 {
dee15844 2648 error ("bit-field %q+D width not an integer constant", field);
cd8ed629 2649 w = error_mark_node;
1e30f9b4 2650 }
05bccae2 2651 else if (tree_int_cst_sgn (w) < 0)
1e30f9b4 2652 {
dee15844 2653 error ("negative width in bit-field %q+D", field);
cd8ed629 2654 w = error_mark_node;
1e30f9b4 2655 }
05bccae2 2656 else if (integer_zerop (w) && DECL_NAME (field) != 0)
1e30f9b4 2657 {
dee15844 2658 error ("zero width for bit-field %q+D", field);
cd8ed629 2659 w = error_mark_node;
1e30f9b4 2660 }
05bccae2 2661 else if (compare_tree_int (w, TYPE_PRECISION (type)) > 0
1e30f9b4
MM
2662 && TREE_CODE (type) != ENUMERAL_TYPE
2663 && TREE_CODE (type) != BOOLEAN_TYPE)
dee15844 2664 warning (0, "width of %q+D exceeds its type", field);
1e30f9b4 2665 else if (TREE_CODE (type) == ENUMERAL_TYPE
05bccae2
RK
2666 && (0 > compare_tree_int (w,
2667 min_precision (TYPE_MIN_VALUE (type),
8df83eae 2668 TYPE_UNSIGNED (type)))
05bccae2
RK
2669 || 0 > compare_tree_int (w,
2670 min_precision
2671 (TYPE_MAX_VALUE (type),
8df83eae 2672 TYPE_UNSIGNED (type)))))
dee15844 2673 warning (0, "%q+D is too small to hold all values of %q#T", field, type);
cd8ed629 2674 }
c8094d83 2675
cd8ed629
MM
2676 /* Remove the bit-field width indicator so that the rest of the
2677 compiler does not treat that value as an initializer. */
2678 DECL_INITIAL (field) = NULL_TREE;
1e30f9b4 2679
cd8ed629
MM
2680 if (w != error_mark_node)
2681 {
2682 DECL_SIZE (field) = convert (bitsizetype, w);
2683 DECL_BIT_FIELD (field) = 1;
1e30f9b4
MM
2684 }
2685 else
cd8ed629
MM
2686 {
2687 /* Non-bit-fields are aligned for their type. */
2688 DECL_BIT_FIELD (field) = 0;
2689 CLEAR_DECL_C_BIT_FIELD (field);
cd8ed629 2690 }
1e30f9b4
MM
2691}
2692
2693/* FIELD is a non bit-field. We are finishing the processing for its
2694 enclosing type T. Issue any appropriate messages and set appropriate
2695 flags. */
2696
2697static void
94edc4ab 2698check_field_decl (tree field,
0cbd7506
MS
2699 tree t,
2700 int* cant_have_const_ctor,
2701 int* no_const_asn_ref,
94edc4ab 2702 int* any_default_members)
1e30f9b4
MM
2703{
2704 tree type = strip_array_types (TREE_TYPE (field));
2705
2706 /* An anonymous union cannot contain any fields which would change
2707 the settings of CANT_HAVE_CONST_CTOR and friends. */
2708 if (ANON_UNION_TYPE_P (type))
2709 ;
2710 /* And, we don't set TYPE_HAS_CONST_INIT_REF, etc., for anonymous
2711 structs. So, we recurse through their fields here. */
2712 else if (ANON_AGGR_TYPE_P (type))
2713 {
2714 tree fields;
2715
2716 for (fields = TYPE_FIELDS (type); fields; fields = TREE_CHAIN (fields))
17aec3eb 2717 if (TREE_CODE (fields) == FIELD_DECL && !DECL_C_BIT_FIELD (field))
1e30f9b4 2718 check_field_decl (fields, t, cant_have_const_ctor,
e5e459bf 2719 no_const_asn_ref, any_default_members);
1e30f9b4
MM
2720 }
2721 /* Check members with class type for constructors, destructors,
2722 etc. */
2723 else if (CLASS_TYPE_P (type))
2724 {
2725 /* Never let anything with uninheritable virtuals
2726 make it through without complaint. */
2727 abstract_virtuals_error (field, type);
c8094d83 2728
1e30f9b4
MM
2729 if (TREE_CODE (t) == UNION_TYPE)
2730 {
2731 if (TYPE_NEEDS_CONSTRUCTING (type))
dee15844
JM
2732 error ("member %q+#D with constructor not allowed in union",
2733 field);
834c6dff 2734 if (TYPE_HAS_NONTRIVIAL_DESTRUCTOR (type))
dee15844 2735 error ("member %q+#D with destructor not allowed in union", field);
1e30f9b4 2736 if (TYPE_HAS_COMPLEX_ASSIGN_REF (type))
dee15844
JM
2737 error ("member %q+#D with copy assignment operator not allowed in union",
2738 field);
1e30f9b4
MM
2739 }
2740 else
2741 {
2742 TYPE_NEEDS_CONSTRUCTING (t) |= TYPE_NEEDS_CONSTRUCTING (type);
c8094d83 2743 TYPE_HAS_NONTRIVIAL_DESTRUCTOR (t)
834c6dff 2744 |= TYPE_HAS_NONTRIVIAL_DESTRUCTOR (type);
1e30f9b4
MM
2745 TYPE_HAS_COMPLEX_ASSIGN_REF (t) |= TYPE_HAS_COMPLEX_ASSIGN_REF (type);
2746 TYPE_HAS_COMPLEX_INIT_REF (t) |= TYPE_HAS_COMPLEX_INIT_REF (type);
2747 }
2748
2749 if (!TYPE_HAS_CONST_INIT_REF (type))
2750 *cant_have_const_ctor = 1;
2751
2752 if (!TYPE_HAS_CONST_ASSIGN_REF (type))
2753 *no_const_asn_ref = 1;
1e30f9b4
MM
2754 }
2755 if (DECL_INITIAL (field) != NULL_TREE)
2756 {
2757 /* `build_class_init_list' does not recognize
2758 non-FIELD_DECLs. */
2759 if (TREE_CODE (t) == UNION_TYPE && any_default_members != 0)
1f070f2b 2760 error ("multiple fields in union %qT initialized", t);
1e30f9b4
MM
2761 *any_default_members = 1;
2762 }
6bb88f3b 2763}
1e30f9b4 2764
08b962b0
MM
2765/* Check the data members (both static and non-static), class-scoped
2766 typedefs, etc., appearing in the declaration of T. Issue
2767 appropriate diagnostics. Sets ACCESS_DECLS to a list (in
2768 declaration order) of access declarations; each TREE_VALUE in this
2769 list is a USING_DECL.
8d08fdba 2770
08b962b0 2771 In addition, set the following flags:
8d08fdba 2772
08b962b0
MM
2773 EMPTY_P
2774 The class is empty, i.e., contains no non-static data members.
8d08fdba 2775
08b962b0
MM
2776 CANT_HAVE_CONST_CTOR_P
2777 This class cannot have an implicitly generated copy constructor
2778 taking a const reference.
8d08fdba 2779
08b962b0
MM
2780 CANT_HAVE_CONST_ASN_REF
2781 This class cannot have an implicitly generated assignment
2782 operator taking a const reference.
8d08fdba 2783
08b962b0
MM
2784 All of these flags should be initialized before calling this
2785 function.
8d08fdba 2786
08b962b0
MM
2787 Returns a pointer to the end of the TYPE_FIELDs chain; additional
2788 fields can be added by adding to this chain. */
8d08fdba 2789
607cf131 2790static void
58731fd1 2791check_field_decls (tree t, tree *access_decls,
58731fd1
MM
2792 int *cant_have_const_ctor_p,
2793 int *no_const_asn_ref_p)
08b962b0
MM
2794{
2795 tree *field;
2796 tree *next;
dd29d26b 2797 bool has_pointers;
08b962b0
MM
2798 int any_default_members;
2799
2800 /* Assume there are no access declarations. */
2801 *access_decls = NULL_TREE;
2802 /* Assume this class has no pointer members. */
dd29d26b 2803 has_pointers = false;
08b962b0
MM
2804 /* Assume none of the members of this class have default
2805 initializations. */
2806 any_default_members = 0;
2807
2808 for (field = &TYPE_FIELDS (t); *field; field = next)
8d08fdba 2809 {
08b962b0
MM
2810 tree x = *field;
2811 tree type = TREE_TYPE (x);
8d08fdba 2812
08b962b0 2813 next = &TREE_CHAIN (x);
8d08fdba 2814
c91a56d2 2815 if (TREE_CODE (x) == FIELD_DECL)
691c003d 2816 {
e0d1297c
NS
2817 if (TYPE_PACKED (t))
2818 {
2819 if (!pod_type_p (TREE_TYPE (x)) && !TYPE_PACKED (TREE_TYPE (x)))
dee15844
JM
2820 warning
2821 (0,
2822 "ignoring packed attribute on unpacked non-POD field %q+#D",
e0d1297c 2823 x);
646c0835 2824 else if (TYPE_ALIGN (TREE_TYPE (x)) > BITS_PER_UNIT)
e0d1297c
NS
2825 DECL_PACKED (x) = 1;
2826 }
e6267549
JM
2827
2828 if (DECL_C_BIT_FIELD (x) && integer_zerop (DECL_INITIAL (x)))
08b962b0
MM
2829 /* We don't treat zero-width bitfields as making a class
2830 non-empty. */
2831 ;
e6267549 2832 else
f9c528ea 2833 {
5ec1192e
MM
2834 tree element_type;
2835
f9c528ea 2836 /* The class is non-empty. */
58731fd1 2837 CLASSTYPE_EMPTY_P (t) = 0;
f9c528ea
MM
2838 /* The class is not even nearly empty. */
2839 CLASSTYPE_NEARLY_EMPTY_P (t) = 0;
5ec1192e
MM
2840 /* If one of the data members contains an empty class,
2841 so does T. */
2842 element_type = strip_array_types (type);
c8094d83 2843 if (CLASS_TYPE_P (element_type)
5ec1192e 2844 && CLASSTYPE_CONTAINS_EMPTY_CLASS_P (element_type))
aa06d37b 2845 CLASSTYPE_CONTAINS_EMPTY_CLASS_P (t) = 1;
f9c528ea 2846 }
691c003d 2847 }
c91a56d2 2848
cffa8729 2849 if (TREE_CODE (x) == USING_DECL)
f30432d7 2850 {
08b962b0
MM
2851 /* Prune the access declaration from the list of fields. */
2852 *field = TREE_CHAIN (x);
2853
2854 /* Save the access declarations for our caller. */
2855 *access_decls = tree_cons (NULL_TREE, x, *access_decls);
2856
2857 /* Since we've reset *FIELD there's no reason to skip to the
2858 next field. */
2859 next = field;
f30432d7
MS
2860 continue;
2861 }
8d08fdba 2862
050367a3
MM
2863 if (TREE_CODE (x) == TYPE_DECL
2864 || TREE_CODE (x) == TEMPLATE_DECL)
f30432d7 2865 continue;
8d08fdba 2866
f30432d7 2867 /* If we've gotten this far, it's a data member, possibly static,
e92cc029 2868 or an enumerator. */
17aec3eb 2869 DECL_CONTEXT (x) = t;
8d08fdba 2870
58ec3cc5
MM
2871 /* When this goes into scope, it will be a non-local reference. */
2872 DECL_NONLOCAL (x) = 1;
2873
2874 if (TREE_CODE (t) == UNION_TYPE)
2875 {
2876 /* [class.union]
2877
2878 If a union contains a static data member, or a member of
324f9dfb 2879 reference type, the program is ill-formed. */
58ec3cc5
MM
2880 if (TREE_CODE (x) == VAR_DECL)
2881 {
dee15844 2882 error ("%q+D may not be static because it is a member of a union", x);
58ec3cc5
MM
2883 continue;
2884 }
2885 if (TREE_CODE (type) == REFERENCE_TYPE)
2886 {
dee15844
JM
2887 error ("%q+D may not have reference type %qT because"
2888 " it is a member of a union",
2889 x, type);
58ec3cc5
MM
2890 continue;
2891 }
2892 }
2893
f30432d7
MS
2894 /* ``A local class cannot have static data members.'' ARM 9.4 */
2895 if (current_function_decl && TREE_STATIC (x))
dee15844 2896 error ("field %q+D in local class cannot be static", x);
8d08fdba 2897
f30432d7
MS
2898 /* Perform error checking that did not get done in
2899 grokdeclarator. */
52fb2769 2900 if (TREE_CODE (type) == FUNCTION_TYPE)
f30432d7 2901 {
dee15844 2902 error ("field %q+D invalidly declared function type", x);
52fb2769
NS
2903 type = build_pointer_type (type);
2904 TREE_TYPE (x) = type;
f30432d7 2905 }
52fb2769 2906 else if (TREE_CODE (type) == METHOD_TYPE)
f30432d7 2907 {
dee15844 2908 error ("field %q+D invalidly declared method type", x);
52fb2769
NS
2909 type = build_pointer_type (type);
2910 TREE_TYPE (x) = type;
f30432d7 2911 }
8d08fdba 2912
52fb2769 2913 if (type == error_mark_node)
f30432d7 2914 continue;
c8094d83 2915
58ec3cc5 2916 if (TREE_CODE (x) == CONST_DECL || TREE_CODE (x) == VAR_DECL)
73a8adb6 2917 continue;
8d08fdba 2918
f30432d7 2919 /* Now it can only be a FIELD_DECL. */
8d08fdba 2920
f30432d7 2921 if (TREE_PRIVATE (x) || TREE_PROTECTED (x))
08b962b0 2922 CLASSTYPE_NON_AGGREGATE (t) = 1;
8d08fdba 2923
f30432d7
MS
2924 /* If this is of reference type, check if it needs an init.
2925 Also do a little ANSI jig if necessary. */
52fb2769 2926 if (TREE_CODE (type) == REFERENCE_TYPE)
0cbd7506 2927 {
08b962b0 2928 CLASSTYPE_NON_POD_P (t) = 1;
f30432d7 2929 if (DECL_INITIAL (x) == NULL_TREE)
6eb35968 2930 SET_CLASSTYPE_REF_FIELDS_NEED_INIT (t, 1);
8d08fdba 2931
f30432d7
MS
2932 /* ARM $12.6.2: [A member initializer list] (or, for an
2933 aggregate, initialization by a brace-enclosed list) is the
2934 only way to initialize nonstatic const and reference
2935 members. */
e349ee73 2936 TYPE_HAS_COMPLEX_ASSIGN_REF (t) = 1;
f30432d7 2937
b930e428
MA
2938 if (! TYPE_HAS_CONSTRUCTOR (t) && CLASSTYPE_NON_AGGREGATE (t)
2939 && extra_warnings)
dee15844 2940 warning (0, "non-static reference %q+#D in class without a constructor", x);
f30432d7 2941 }
8d08fdba 2942
1e30f9b4 2943 type = strip_array_types (type);
dd29d26b
GB
2944
2945 /* This is used by -Weffc++ (see below). Warn only for pointers
2946 to members which might hold dynamic memory. So do not warn
2947 for pointers to functions or pointers to members. */
2948 if (TYPE_PTR_P (type)
2949 && !TYPE_PTRFN_P (type)
2950 && !TYPE_PTR_TO_MEMBER_P (type))
2951 has_pointers = true;
824b9a4c 2952
58ec3cc5
MM
2953 if (CLASS_TYPE_P (type))
2954 {
2955 if (CLASSTYPE_REF_FIELDS_NEED_INIT (type))
2956 SET_CLASSTYPE_REF_FIELDS_NEED_INIT (t, 1);
2957 if (CLASSTYPE_READONLY_FIELDS_NEED_INIT (type))
2958 SET_CLASSTYPE_READONLY_FIELDS_NEED_INIT (t, 1);
2959 }
2960
52fb2769 2961 if (DECL_MUTABLE_P (x) || TYPE_HAS_MUTABLE_P (type))
08b962b0 2962 CLASSTYPE_HAS_MUTABLE (t) = 1;
a7a7710d 2963
d282fcb2 2964 if (! pod_type_p (type))
0cbd7506
MS
2965 /* DR 148 now allows pointers to members (which are POD themselves),
2966 to be allowed in POD structs. */
08b962b0 2967 CLASSTYPE_NON_POD_P (t) = 1;
52fb2769 2968
94e6e4c4
AO
2969 if (! zero_init_p (type))
2970 CLASSTYPE_NON_ZERO_INIT_P (t) = 1;
2971
f30432d7 2972 /* If any field is const, the structure type is pseudo-const. */
52fb2769 2973 if (CP_TYPE_CONST_P (type))
f30432d7
MS
2974 {
2975 C_TYPE_FIELDS_READONLY (t) = 1;
2976 if (DECL_INITIAL (x) == NULL_TREE)
6eb35968 2977 SET_CLASSTYPE_READONLY_FIELDS_NEED_INIT (t, 1);
f30432d7
MS
2978
2979 /* ARM $12.6.2: [A member initializer list] (or, for an
2980 aggregate, initialization by a brace-enclosed list) is the
2981 only way to initialize nonstatic const and reference
2982 members. */
e349ee73 2983 TYPE_HAS_COMPLEX_ASSIGN_REF (t) = 1;
f30432d7 2984
b930e428
MA
2985 if (! TYPE_HAS_CONSTRUCTOR (t) && CLASSTYPE_NON_AGGREGATE (t)
2986 && extra_warnings)
dee15844 2987 warning (0, "non-static const member %q+#D in class without a constructor", x);
f30432d7 2988 }
08b962b0 2989 /* A field that is pseudo-const makes the structure likewise. */
5552b43c 2990 else if (CLASS_TYPE_P (type))
f30432d7 2991 {
08b962b0 2992 C_TYPE_FIELDS_READONLY (t) |= C_TYPE_FIELDS_READONLY (type);
6eb35968
DE
2993 SET_CLASSTYPE_READONLY_FIELDS_NEED_INIT (t,
2994 CLASSTYPE_READONLY_FIELDS_NEED_INIT (t)
2995 | CLASSTYPE_READONLY_FIELDS_NEED_INIT (type));
f30432d7 2996 }
8d08fdba 2997
c10bffd0
JM
2998 /* Core issue 80: A nonstatic data member is required to have a
2999 different name from the class iff the class has a
3000 user-defined constructor. */
633221db 3001 if (constructor_name_p (DECL_NAME (x), t) && TYPE_HAS_CONSTRUCTOR (t))
dee15844 3002 pedwarn ("field %q+#D with same name as class", x);
c10bffd0 3003
162bc98d
JM
3004 /* We set DECL_C_BIT_FIELD in grokbitfield.
3005 If the type and width are valid, we'll also set DECL_BIT_FIELD. */
3006 if (DECL_C_BIT_FIELD (x))
1e30f9b4 3007 check_bitfield_decl (x);
f30432d7 3008 else
1e30f9b4 3009 check_field_decl (x, t,
08b962b0 3010 cant_have_const_ctor_p,
08b962b0 3011 no_const_asn_ref_p,
1e30f9b4 3012 &any_default_members);
8d08fdba
MS
3013 }
3014
dd29d26b
GB
3015 /* Effective C++ rule 11: if a class has dynamic memory held by pointers,
3016 it should also define a copy constructor and an assignment operator to
3017 implement the correct copy semantic (deep vs shallow, etc.). As it is
3018 not feasible to check whether the constructors do allocate dynamic memory
3019 and store it within members, we approximate the warning like this:
3020
3021 -- Warn only if there are members which are pointers
3022 -- Warn only if there is a non-trivial constructor (otherwise,
3023 there cannot be memory allocated).
3024 -- Warn only if there is a non-trivial destructor. We assume that the
3025 user at least implemented the cleanup correctly, and a destructor
3026 is needed to free dynamic memory.
c8094d83 3027
77880ae4 3028 This seems enough for practical purposes. */
dd29d26b
GB
3029 if (warn_ecpp
3030 && has_pointers
3031 && TYPE_HAS_CONSTRUCTOR (t)
9f4faeae 3032 && TYPE_HAS_NONTRIVIAL_DESTRUCTOR (t)
dd29d26b 3033 && !(TYPE_HAS_INIT_REF (t) && TYPE_HAS_ASSIGN_REF (t)))
824b9a4c 3034 {
d4ee4d25 3035 warning (0, "%q#T has pointer data members", t);
c8094d83 3036
824b9a4c
MS
3037 if (! TYPE_HAS_INIT_REF (t))
3038 {
74fa0285
GDR
3039 warning (OPT_Weffc__,
3040 " but does not override %<%T(const %T&)%>", t, t);
3041 if (!TYPE_HAS_ASSIGN_REF (t))
3042 warning (OPT_Weffc__, " or %<operator=(const %T&)%>", t);
824b9a4c
MS
3043 }
3044 else if (! TYPE_HAS_ASSIGN_REF (t))
74fa0285
GDR
3045 warning (OPT_Weffc__,
3046 " but does not override %<operator=(const %T&)%>", t);
824b9a4c 3047 }
08b962b0 3048
607cf131
MM
3049
3050 /* Check anonymous struct/anonymous union fields. */
3051 finish_struct_anon (t);
3052
08b962b0
MM
3053 /* We've built up the list of access declarations in reverse order.
3054 Fix that now. */
3055 *access_decls = nreverse (*access_decls);
08b962b0
MM
3056}
3057
c20118a8
MM
3058/* If TYPE is an empty class type, records its OFFSET in the table of
3059 OFFSETS. */
607cf131 3060
c20118a8 3061static int
94edc4ab 3062record_subobject_offset (tree type, tree offset, splay_tree offsets)
5c24fba6 3063{
c20118a8 3064 splay_tree_node n;
5c24fba6 3065
c20118a8
MM
3066 if (!is_empty_class (type))
3067 return 0;
5c24fba6 3068
c20118a8
MM
3069 /* Record the location of this empty object in OFFSETS. */
3070 n = splay_tree_lookup (offsets, (splay_tree_key) offset);
3071 if (!n)
c8094d83 3072 n = splay_tree_insert (offsets,
c20118a8
MM
3073 (splay_tree_key) offset,
3074 (splay_tree_value) NULL_TREE);
c8094d83 3075 n->value = ((splay_tree_value)
c20118a8
MM
3076 tree_cons (NULL_TREE,
3077 type,
3078 (tree) n->value));
3079
3080 return 0;
607cf131
MM
3081}
3082
838dfd8a 3083/* Returns nonzero if TYPE is an empty class type and there is
c20118a8 3084 already an entry in OFFSETS for the same TYPE as the same OFFSET. */
9785e4b1 3085
c20118a8 3086static int
94edc4ab 3087check_subobject_offset (tree type, tree offset, splay_tree offsets)
9785e4b1 3088{
c20118a8
MM
3089 splay_tree_node n;
3090 tree t;
3091
3092 if (!is_empty_class (type))
3093 return 0;
3094
3095 /* Record the location of this empty object in OFFSETS. */
3096 n = splay_tree_lookup (offsets, (splay_tree_key) offset);
3097 if (!n)
3098 return 0;
3099
3100 for (t = (tree) n->value; t; t = TREE_CHAIN (t))
3101 if (same_type_p (TREE_VALUE (t), type))
3102 return 1;
3103
3104 return 0;
9785e4b1
MM
3105}
3106
c20118a8
MM
3107/* Walk through all the subobjects of TYPE (located at OFFSET). Call
3108 F for every subobject, passing it the type, offset, and table of
2003cd37
MM
3109 OFFSETS. If VBASES_P is one, then virtual non-primary bases should
3110 be traversed.
5cdba4ff
MM
3111
3112 If MAX_OFFSET is non-NULL, then subobjects with an offset greater
3113 than MAX_OFFSET will not be walked.
3114
838dfd8a 3115 If F returns a nonzero value, the traversal ceases, and that value
5cdba4ff 3116 is returned. Otherwise, returns zero. */
d77249e7 3117
c20118a8 3118static int
c8094d83 3119walk_subobject_offsets (tree type,
0cbd7506
MS
3120 subobject_offset_fn f,
3121 tree offset,
3122 splay_tree offsets,
3123 tree max_offset,
3124 int vbases_p)
5c24fba6 3125{
c20118a8 3126 int r = 0;
ff944b49 3127 tree type_binfo = NULL_TREE;
c20118a8 3128
5cdba4ff
MM
3129 /* If this OFFSET is bigger than the MAX_OFFSET, then we should
3130 stop. */
3131 if (max_offset && INT_CST_LT (max_offset, offset))
3132 return 0;
3133
dbe91deb
NS
3134 if (type == error_mark_node)
3135 return 0;
3136
c8094d83 3137 if (!TYPE_P (type))
ff944b49
MM
3138 {
3139 if (abi_version_at_least (2))
3140 type_binfo = type;
3141 type = BINFO_TYPE (type);
3142 }
3143
c20118a8 3144 if (CLASS_TYPE_P (type))
5c24fba6 3145 {
c20118a8 3146 tree field;
17bbb839 3147 tree binfo;
c20118a8
MM
3148 int i;
3149
5ec1192e
MM
3150 /* Avoid recursing into objects that are not interesting. */
3151 if (!CLASSTYPE_CONTAINS_EMPTY_CLASS_P (type))
3152 return 0;
3153
c20118a8
MM
3154 /* Record the location of TYPE. */
3155 r = (*f) (type, offset, offsets);
3156 if (r)
3157 return r;
3158
3159 /* Iterate through the direct base classes of TYPE. */
ff944b49
MM
3160 if (!type_binfo)
3161 type_binfo = TYPE_BINFO (type);
fa743e8c 3162 for (i = 0; BINFO_BASE_ITERATE (type_binfo, i, binfo); i++)
c20118a8 3163 {
ff944b49
MM
3164 tree binfo_offset;
3165
c8094d83 3166 if (abi_version_at_least (2)
809e3e7f 3167 && BINFO_VIRTUAL_P (binfo))
17bbb839 3168 continue;
5c24fba6 3169
c8094d83
MS
3170 if (!vbases_p
3171 && BINFO_VIRTUAL_P (binfo)
9965d119 3172 && !BINFO_PRIMARY_P (binfo))
c20118a8
MM
3173 continue;
3174
ff944b49
MM
3175 if (!abi_version_at_least (2))
3176 binfo_offset = size_binop (PLUS_EXPR,
3177 offset,
3178 BINFO_OFFSET (binfo));
3179 else
3180 {
3181 tree orig_binfo;
3182 /* We cannot rely on BINFO_OFFSET being set for the base
3183 class yet, but the offsets for direct non-virtual
3184 bases can be calculated by going back to the TYPE. */
604a3205 3185 orig_binfo = BINFO_BASE_BINFO (TYPE_BINFO (type), i);
c8094d83 3186 binfo_offset = size_binop (PLUS_EXPR,
ff944b49
MM
3187 offset,
3188 BINFO_OFFSET (orig_binfo));
3189 }
3190
3191 r = walk_subobject_offsets (binfo,
c20118a8 3192 f,
ff944b49 3193 binfo_offset,
c20118a8 3194 offsets,
5cdba4ff 3195 max_offset,
c8094d83 3196 (abi_version_at_least (2)
17bbb839 3197 ? /*vbases_p=*/0 : vbases_p));
c20118a8
MM
3198 if (r)
3199 return r;
3200 }
3201
58c42dc2 3202 if (abi_version_at_least (2) && CLASSTYPE_VBASECLASSES (type))
17bbb839 3203 {
58c42dc2 3204 unsigned ix;
d4e6fecb 3205 VEC(tree,gc) *vbases;
17bbb839 3206
ff944b49
MM
3207 /* Iterate through the virtual base classes of TYPE. In G++
3208 3.2, we included virtual bases in the direct base class
3209 loop above, which results in incorrect results; the
3210 correct offsets for virtual bases are only known when
3211 working with the most derived type. */
3212 if (vbases_p)
9ba5ff0f
NS
3213 for (vbases = CLASSTYPE_VBASECLASSES (type), ix = 0;
3214 VEC_iterate (tree, vbases, ix, binfo); ix++)
ff944b49 3215 {
ff944b49
MM
3216 r = walk_subobject_offsets (binfo,
3217 f,
3218 size_binop (PLUS_EXPR,
3219 offset,
3220 BINFO_OFFSET (binfo)),
3221 offsets,
3222 max_offset,
3223 /*vbases_p=*/0);
3224 if (r)
3225 return r;
3226 }
3227 else
17bbb839 3228 {
ff944b49
MM
3229 /* We still have to walk the primary base, if it is
3230 virtual. (If it is non-virtual, then it was walked
3231 above.) */
58c42dc2 3232 tree vbase = get_primary_binfo (type_binfo);
c8094d83 3233
809e3e7f 3234 if (vbase && BINFO_VIRTUAL_P (vbase)
fc6633e0
NS
3235 && BINFO_PRIMARY_P (vbase)
3236 && BINFO_INHERITANCE_CHAIN (vbase) == type_binfo)
ff944b49 3237 {
c8094d83 3238 r = (walk_subobject_offsets
dbbf88d1
NS
3239 (vbase, f, offset,
3240 offsets, max_offset, /*vbases_p=*/0));
3241 if (r)
3242 return r;
ff944b49 3243 }
17bbb839
MM
3244 }
3245 }
3246
c20118a8
MM
3247 /* Iterate through the fields of TYPE. */
3248 for (field = TYPE_FIELDS (type); field; field = TREE_CHAIN (field))
17bbb839 3249 if (TREE_CODE (field) == FIELD_DECL && !DECL_ARTIFICIAL (field))
c20118a8 3250 {
956d9305
MM
3251 tree field_offset;
3252
3253 if (abi_version_at_least (2))
3254 field_offset = byte_position (field);
3255 else
3256 /* In G++ 3.2, DECL_FIELD_OFFSET was used. */
3257 field_offset = DECL_FIELD_OFFSET (field);
3258
c20118a8
MM
3259 r = walk_subobject_offsets (TREE_TYPE (field),
3260 f,
3261 size_binop (PLUS_EXPR,
3262 offset,
956d9305 3263 field_offset),
c20118a8 3264 offsets,
5cdba4ff 3265 max_offset,
c20118a8
MM
3266 /*vbases_p=*/1);
3267 if (r)
3268 return r;
3269 }
5c24fba6 3270 }
c20118a8
MM
3271 else if (TREE_CODE (type) == ARRAY_TYPE)
3272 {
5ec1192e 3273 tree element_type = strip_array_types (type);
c20118a8
MM
3274 tree domain = TYPE_DOMAIN (type);
3275 tree index;
5c24fba6 3276
5ec1192e
MM
3277 /* Avoid recursing into objects that are not interesting. */
3278 if (!CLASS_TYPE_P (element_type)
3279 || !CLASSTYPE_CONTAINS_EMPTY_CLASS_P (element_type))
3280 return 0;
3281
c20118a8 3282 /* Step through each of the elements in the array. */
17bbb839
MM
3283 for (index = size_zero_node;
3284 /* G++ 3.2 had an off-by-one error here. */
c8094d83 3285 (abi_version_at_least (2)
17bbb839
MM
3286 ? !INT_CST_LT (TYPE_MAX_VALUE (domain), index)
3287 : INT_CST_LT (index, TYPE_MAX_VALUE (domain)));
c20118a8
MM
3288 index = size_binop (PLUS_EXPR, index, size_one_node))
3289 {
3290 r = walk_subobject_offsets (TREE_TYPE (type),
3291 f,
3292 offset,
3293 offsets,
5cdba4ff 3294 max_offset,
c20118a8
MM
3295 /*vbases_p=*/1);
3296 if (r)
3297 return r;
c8094d83 3298 offset = size_binop (PLUS_EXPR, offset,
c20118a8 3299 TYPE_SIZE_UNIT (TREE_TYPE (type)));
5cdba4ff
MM
3300 /* If this new OFFSET is bigger than the MAX_OFFSET, then
3301 there's no point in iterating through the remaining
3302 elements of the array. */
3303 if (max_offset && INT_CST_LT (max_offset, offset))
3304 break;
c20118a8
MM
3305 }
3306 }
3307
3308 return 0;
3309}
3310
c0572427
MM
3311/* Record all of the empty subobjects of TYPE (either a type or a
3312 binfo). If IS_DATA_MEMBER is true, then a non-static data member
c5a35c3c
MM
3313 is being placed at OFFSET; otherwise, it is a base class that is
3314 being placed at OFFSET. */
c20118a8
MM
3315
3316static void
c8094d83 3317record_subobject_offsets (tree type,
0cbd7506
MS
3318 tree offset,
3319 splay_tree offsets,
c5a35c3c 3320 bool is_data_member)
c20118a8 3321{
c5a35c3c 3322 tree max_offset;
c0572427
MM
3323 /* If recording subobjects for a non-static data member or a
3324 non-empty base class , we do not need to record offsets beyond
3325 the size of the biggest empty class. Additional data members
3326 will go at the end of the class. Additional base classes will go
3327 either at offset zero (if empty, in which case they cannot
3328 overlap with offsets past the size of the biggest empty class) or
3329 at the end of the class.
3330
3331 However, if we are placing an empty base class, then we must record
c5a35c3c
MM
3332 all offsets, as either the empty class is at offset zero (where
3333 other empty classes might later be placed) or at the end of the
3334 class (where other objects might then be placed, so other empty
3335 subobjects might later overlap). */
c0572427
MM
3336 if (is_data_member
3337 || !is_empty_class (BINFO_TYPE (type)))
c5a35c3c
MM
3338 max_offset = sizeof_biggest_empty_class;
3339 else
3340 max_offset = NULL_TREE;
c20118a8 3341 walk_subobject_offsets (type, record_subobject_offset, offset,
c5a35c3c 3342 offsets, max_offset, is_data_member);
5c24fba6
MM
3343}
3344
838dfd8a
KH
3345/* Returns nonzero if any of the empty subobjects of TYPE (located at
3346 OFFSET) conflict with entries in OFFSETS. If VBASES_P is nonzero,
c20118a8 3347 virtual bases of TYPE are examined. */
9785e4b1
MM
3348
3349static int
94edc4ab 3350layout_conflict_p (tree type,
0cbd7506
MS
3351 tree offset,
3352 splay_tree offsets,
3353 int vbases_p)
9785e4b1 3354{
5cdba4ff
MM
3355 splay_tree_node max_node;
3356
3357 /* Get the node in OFFSETS that indicates the maximum offset where
3358 an empty subobject is located. */
3359 max_node = splay_tree_max (offsets);
3360 /* If there aren't any empty subobjects, then there's no point in
3361 performing this check. */
3362 if (!max_node)
3363 return 0;
3364
c20118a8 3365 return walk_subobject_offsets (type, check_subobject_offset, offset,
5cdba4ff
MM
3366 offsets, (tree) (max_node->key),
3367 vbases_p);
9785e4b1
MM
3368}
3369
5c24fba6
MM
3370/* DECL is a FIELD_DECL corresponding either to a base subobject of a
3371 non-static data member of the type indicated by RLI. BINFO is the
c20118a8 3372 binfo corresponding to the base subobject, OFFSETS maps offsets to
17bbb839
MM
3373 types already located at those offsets. This function determines
3374 the position of the DECL. */
5c24fba6
MM
3375
3376static void
c8094d83
MS
3377layout_nonempty_base_or_field (record_layout_info rli,
3378 tree decl,
3379 tree binfo,
17bbb839 3380 splay_tree offsets)
5c24fba6 3381{
c20118a8 3382 tree offset = NULL_TREE;
17bbb839
MM
3383 bool field_p;
3384 tree type;
c8094d83 3385
17bbb839
MM
3386 if (binfo)
3387 {
3388 /* For the purposes of determining layout conflicts, we want to
3389 use the class type of BINFO; TREE_TYPE (DECL) will be the
3390 CLASSTYPE_AS_BASE version, which does not contain entries for
3391 zero-sized bases. */
3392 type = TREE_TYPE (binfo);
3393 field_p = false;
3394 }
3395 else
3396 {
3397 type = TREE_TYPE (decl);
3398 field_p = true;
3399 }
c20118a8 3400
5c24fba6
MM
3401 /* Try to place the field. It may take more than one try if we have
3402 a hard time placing the field without putting two objects of the
3403 same type at the same address. */
3404 while (1)
3405 {
defd0dea 3406 struct record_layout_info_s old_rli = *rli;
5c24fba6 3407
770ae6cc
RK
3408 /* Place this field. */
3409 place_field (rli, decl);
da3d4dfa 3410 offset = byte_position (decl);
1e2e9f54 3411
5c24fba6
MM
3412 /* We have to check to see whether or not there is already
3413 something of the same type at the offset we're about to use.
1e2e9f54 3414 For example, consider:
c8094d83 3415
1e2e9f54
MM
3416 struct S {};
3417 struct T : public S { int i; };
3418 struct U : public S, public T {};
c8094d83 3419
5c24fba6
MM
3420 Here, we put S at offset zero in U. Then, we can't put T at
3421 offset zero -- its S component would be at the same address
3422 as the S we already allocated. So, we have to skip ahead.
3423 Since all data members, including those whose type is an
838dfd8a 3424 empty class, have nonzero size, any overlap can happen only
5c24fba6
MM
3425 with a direct or indirect base-class -- it can't happen with
3426 a data member. */
1e2e9f54
MM
3427 /* In a union, overlap is permitted; all members are placed at
3428 offset zero. */
3429 if (TREE_CODE (rli->t) == UNION_TYPE)
3430 break;
7ba539c6
MM
3431 /* G++ 3.2 did not check for overlaps when placing a non-empty
3432 virtual base. */
809e3e7f 3433 if (!abi_version_at_least (2) && binfo && BINFO_VIRTUAL_P (binfo))
7ba539c6 3434 break;
c8094d83 3435 if (layout_conflict_p (field_p ? type : binfo, offset,
ff944b49 3436 offsets, field_p))
5c24fba6 3437 {
5c24fba6
MM
3438 /* Strip off the size allocated to this field. That puts us
3439 at the first place we could have put the field with
3440 proper alignment. */
770ae6cc
RK
3441 *rli = old_rli;
3442
c20118a8 3443 /* Bump up by the alignment required for the type. */
770ae6cc 3444 rli->bitpos
c8094d83
MS
3445 = size_binop (PLUS_EXPR, rli->bitpos,
3446 bitsize_int (binfo
c20118a8
MM
3447 ? CLASSTYPE_ALIGN (type)
3448 : TYPE_ALIGN (type)));
770ae6cc 3449 normalize_rli (rli);
5c24fba6
MM
3450 }
3451 else
3452 /* There was no conflict. We're done laying out this field. */
3453 break;
3454 }
c20118a8 3455
623fe76a 3456 /* Now that we know where it will be placed, update its
c20118a8
MM
3457 BINFO_OFFSET. */
3458 if (binfo && CLASS_TYPE_P (BINFO_TYPE (binfo)))
90024bdc 3459 /* Indirect virtual bases may have a nonzero BINFO_OFFSET at
17bbb839
MM
3460 this point because their BINFO_OFFSET is copied from another
3461 hierarchy. Therefore, we may not need to add the entire
3462 OFFSET. */
c8094d83 3463 propagate_binfo_offsets (binfo,
17bbb839 3464 size_diffop (convert (ssizetype, offset),
c8094d83 3465 convert (ssizetype,
dbbf88d1 3466 BINFO_OFFSET (binfo))));
5c24fba6
MM
3467}
3468
90024bdc 3469/* Returns true if TYPE is empty and OFFSET is nonzero. */
7ba539c6
MM
3470
3471static int
3472empty_base_at_nonzero_offset_p (tree type,
3473 tree offset,
3474 splay_tree offsets ATTRIBUTE_UNUSED)
3475{
3476 return is_empty_class (type) && !integer_zerop (offset);
3477}
3478
9785e4b1 3479/* Layout the empty base BINFO. EOC indicates the byte currently just
ec386958 3480 past the end of the class, and should be correctly aligned for a
c20118a8 3481 class of the type indicated by BINFO; OFFSETS gives the offsets of
623fe76a 3482 the empty bases allocated so far. T is the most derived
838dfd8a 3483 type. Return nonzero iff we added it at the end. */
9785e4b1 3484
06d9f09f 3485static bool
dbbf88d1 3486layout_empty_base (tree binfo, tree eoc, splay_tree offsets)
9785e4b1 3487{
ec386958 3488 tree alignment;
9785e4b1 3489 tree basetype = BINFO_TYPE (binfo);
06d9f09f 3490 bool atend = false;
956d9305 3491
9785e4b1 3492 /* This routine should only be used for empty classes. */
50bc768d 3493 gcc_assert (is_empty_class (basetype));
1b50716d 3494 alignment = ssize_int (CLASSTYPE_ALIGN_UNIT (basetype));
9785e4b1 3495
3075b327
NS
3496 if (!integer_zerop (BINFO_OFFSET (binfo)))
3497 {
3498 if (abi_version_at_least (2))
3499 propagate_binfo_offsets
3500 (binfo, size_diffop (size_zero_node, BINFO_OFFSET (binfo)));
74fa0285
GDR
3501 else
3502 warning (OPT_Wabi,
3503 "offset of empty base %qT may not be ABI-compliant and may"
3075b327
NS
3504 "change in a future version of GCC",
3505 BINFO_TYPE (binfo));
3506 }
c8094d83 3507
9785e4b1
MM
3508 /* This is an empty base class. We first try to put it at offset
3509 zero. */
ff944b49 3510 if (layout_conflict_p (binfo,
c20118a8 3511 BINFO_OFFSET (binfo),
c8094d83 3512 offsets,
c20118a8 3513 /*vbases_p=*/0))
9785e4b1
MM
3514 {
3515 /* That didn't work. Now, we move forward from the next
3516 available spot in the class. */
06d9f09f 3517 atend = true;
dbbf88d1 3518 propagate_binfo_offsets (binfo, convert (ssizetype, eoc));
c8094d83 3519 while (1)
9785e4b1 3520 {
ff944b49 3521 if (!layout_conflict_p (binfo,
c8094d83 3522 BINFO_OFFSET (binfo),
c20118a8
MM
3523 offsets,
3524 /*vbases_p=*/0))
9785e4b1
MM
3525 /* We finally found a spot where there's no overlap. */
3526 break;
3527
3528 /* There's overlap here, too. Bump along to the next spot. */
dbbf88d1 3529 propagate_binfo_offsets (binfo, alignment);
9785e4b1
MM
3530 }
3531 }
06d9f09f 3532 return atend;
9785e4b1
MM
3533}
3534
78dcd41a 3535/* Layout the base given by BINFO in the class indicated by RLI.
58731fd1 3536 *BASE_ALIGN is a running maximum of the alignments of
17bbb839
MM
3537 any base class. OFFSETS gives the location of empty base
3538 subobjects. T is the most derived type. Return nonzero if the new
3539 object cannot be nearly-empty. A new FIELD_DECL is inserted at
c8094d83 3540 *NEXT_FIELD, unless BINFO is for an empty base class.
5c24fba6 3541
17bbb839
MM
3542 Returns the location at which the next field should be inserted. */
3543
3544static tree *
58731fd1 3545build_base_field (record_layout_info rli, tree binfo,
17bbb839 3546 splay_tree offsets, tree *next_field)
d77249e7 3547{
17bbb839 3548 tree t = rli->t;
d77249e7 3549 tree basetype = BINFO_TYPE (binfo);
d77249e7 3550
d0f062fb 3551 if (!COMPLETE_TYPE_P (basetype))
d77249e7
MM
3552 /* This error is now reported in xref_tag, thus giving better
3553 location information. */
17bbb839 3554 return next_field;
c8094d83 3555
17bbb839
MM
3556 /* Place the base class. */
3557 if (!is_empty_class (basetype))
5c24fba6 3558 {
17bbb839
MM
3559 tree decl;
3560
5c24fba6
MM
3561 /* The containing class is non-empty because it has a non-empty
3562 base class. */
58731fd1 3563 CLASSTYPE_EMPTY_P (t) = 0;
c8094d83 3564
17bbb839
MM
3565 /* Create the FIELD_DECL. */
3566 decl = build_decl (FIELD_DECL, NULL_TREE, CLASSTYPE_AS_BASE (basetype));
3567 DECL_ARTIFICIAL (decl) = 1;
78e0d62b 3568 DECL_IGNORED_P (decl) = 1;
17bbb839
MM
3569 DECL_FIELD_CONTEXT (decl) = t;
3570 DECL_SIZE (decl) = CLASSTYPE_SIZE (basetype);
3571 DECL_SIZE_UNIT (decl) = CLASSTYPE_SIZE_UNIT (basetype);
3572 DECL_ALIGN (decl) = CLASSTYPE_ALIGN (basetype);
3573 DECL_USER_ALIGN (decl) = CLASSTYPE_USER_ALIGN (basetype);
550f100c 3574 DECL_MODE (decl) = TYPE_MODE (basetype);
642124c6 3575 DECL_FIELD_IS_BASE (decl) = 1;
0f3a8219 3576
5c24fba6
MM
3577 /* Try to place the field. It may take more than one try if we
3578 have a hard time placing the field without putting two
3579 objects of the same type at the same address. */
17bbb839
MM
3580 layout_nonempty_base_or_field (rli, decl, binfo, offsets);
3581 /* Add the new FIELD_DECL to the list of fields for T. */
3582 TREE_CHAIN (decl) = *next_field;
3583 *next_field = decl;
3584 next_field = &TREE_CHAIN (decl);
5c24fba6
MM
3585 }
3586 else
ec386958 3587 {
17bbb839 3588 tree eoc;
7ba539c6 3589 bool atend;
ec386958
MM
3590
3591 /* On some platforms (ARM), even empty classes will not be
3592 byte-aligned. */
17bbb839
MM
3593 eoc = round_up (rli_size_unit_so_far (rli),
3594 CLASSTYPE_ALIGN_UNIT (basetype));
dbbf88d1 3595 atend = layout_empty_base (binfo, eoc, offsets);
7ba539c6
MM
3596 /* A nearly-empty class "has no proper base class that is empty,
3597 not morally virtual, and at an offset other than zero." */
809e3e7f 3598 if (!BINFO_VIRTUAL_P (binfo) && CLASSTYPE_NEARLY_EMPTY_P (t))
7ba539c6
MM
3599 {
3600 if (atend)
3601 CLASSTYPE_NEARLY_EMPTY_P (t) = 0;
c5a35c3c 3602 /* The check above (used in G++ 3.2) is insufficient because
7ba539c6 3603 an empty class placed at offset zero might itself have an
90024bdc 3604 empty base at a nonzero offset. */
c8094d83 3605 else if (walk_subobject_offsets (basetype,
7ba539c6
MM
3606 empty_base_at_nonzero_offset_p,
3607 size_zero_node,
3608 /*offsets=*/NULL,
3609 /*max_offset=*/NULL_TREE,
3610 /*vbases_p=*/true))
3611 {
3612 if (abi_version_at_least (2))
3613 CLASSTYPE_NEARLY_EMPTY_P (t) = 0;
74fa0285
GDR
3614 else
3615 warning (OPT_Wabi,
3616 "class %qT will be considered nearly empty in a "
7ba539c6
MM
3617 "future version of GCC", t);
3618 }
3619 }
c8094d83 3620
17bbb839
MM
3621 /* We do not create a FIELD_DECL for empty base classes because
3622 it might overlap some other field. We want to be able to
3623 create CONSTRUCTORs for the class by iterating over the
3624 FIELD_DECLs, and the back end does not handle overlapping
3625 FIELD_DECLs. */
58731fd1
MM
3626
3627 /* An empty virtual base causes a class to be non-empty
3628 -- but in that case we do not need to clear CLASSTYPE_EMPTY_P
3629 here because that was already done when the virtual table
3630 pointer was created. */
ec386958 3631 }
5c24fba6 3632
5c24fba6 3633 /* Record the offsets of BINFO and its base subobjects. */
ff944b49 3634 record_subobject_offsets (binfo,
c20118a8 3635 BINFO_OFFSET (binfo),
c8094d83 3636 offsets,
c5a35c3c 3637 /*is_data_member=*/false);
17bbb839
MM
3638
3639 return next_field;
d77249e7
MM
3640}
3641
c20118a8 3642/* Layout all of the non-virtual base classes. Record empty
17bbb839
MM
3643 subobjects in OFFSETS. T is the most derived type. Return nonzero
3644 if the type cannot be nearly empty. The fields created
3645 corresponding to the base classes will be inserted at
3646 *NEXT_FIELD. */
607cf131 3647
17bbb839 3648static void
58731fd1 3649build_base_fields (record_layout_info rli,
17bbb839 3650 splay_tree offsets, tree *next_field)
607cf131
MM
3651{
3652 /* Chain to hold all the new FIELD_DECLs which stand in for base class
3653 subobjects. */
17bbb839 3654 tree t = rli->t;
604a3205 3655 int n_baseclasses = BINFO_N_BASE_BINFOS (TYPE_BINFO (t));
5c24fba6 3656 int i;
607cf131 3657
3461fba7 3658 /* The primary base class is always allocated first. */
17bbb839
MM
3659 if (CLASSTYPE_HAS_PRIMARY_BASE_P (t))
3660 next_field = build_base_field (rli, CLASSTYPE_PRIMARY_BINFO (t),
58731fd1 3661 offsets, next_field);
d77249e7
MM
3662
3663 /* Now allocate the rest of the bases. */
607cf131
MM
3664 for (i = 0; i < n_baseclasses; ++i)
3665 {
d77249e7 3666 tree base_binfo;
607cf131 3667
604a3205 3668 base_binfo = BINFO_BASE_BINFO (TYPE_BINFO (t), i);
911a71a7 3669
3461fba7
NS
3670 /* The primary base was already allocated above, so we don't
3671 need to allocate it again here. */
17bbb839 3672 if (base_binfo == CLASSTYPE_PRIMARY_BINFO (t))
607cf131
MM
3673 continue;
3674
dbbf88d1
NS
3675 /* Virtual bases are added at the end (a primary virtual base
3676 will have already been added). */
809e3e7f 3677 if (BINFO_VIRTUAL_P (base_binfo))
607cf131
MM
3678 continue;
3679
58731fd1 3680 next_field = build_base_field (rli, base_binfo,
17bbb839 3681 offsets, next_field);
607cf131 3682 }
607cf131
MM
3683}
3684
58010b57
MM
3685/* Go through the TYPE_METHODS of T issuing any appropriate
3686 diagnostics, figuring out which methods override which other
3ef397c1 3687 methods, and so forth. */
58010b57
MM
3688
3689static void
94edc4ab 3690check_methods (tree t)
58010b57
MM
3691{
3692 tree x;
58010b57
MM
3693
3694 for (x = TYPE_METHODS (t); x; x = TREE_CHAIN (x))
3695 {
58010b57 3696 check_for_override (x, t);
fee7654e 3697 if (DECL_PURE_VIRTUAL_P (x) && ! DECL_VINDEX (x))
dee15844 3698 error ("initializer specified for non-virtual method %q+D", x);
58010b57
MM
3699 /* The name of the field is the original field name
3700 Save this in auxiliary field for later overloading. */
3701 if (DECL_VINDEX (x))
3702 {
3ef397c1 3703 TYPE_POLYMORPHIC_P (t) = 1;
fee7654e 3704 if (DECL_PURE_VIRTUAL_P (x))
d4e6fecb 3705 VEC_safe_push (tree, gc, CLASSTYPE_PURE_VIRTUALS (t), x);
58010b57 3706 }
9f4faeae
MM
3707 /* All user-declared destructors are non-trivial. */
3708 if (DECL_DESTRUCTOR_P (x))
3709 TYPE_HAS_NONTRIVIAL_DESTRUCTOR (t) = 1;
58010b57 3710 }
58010b57
MM
3711}
3712
db9b2174
MM
3713/* FN is a constructor or destructor. Clone the declaration to create
3714 a specialized in-charge or not-in-charge version, as indicated by
3715 NAME. */
3716
3717static tree
94edc4ab 3718build_clone (tree fn, tree name)
db9b2174
MM
3719{
3720 tree parms;
3721 tree clone;
3722
3723 /* Copy the function. */
3724 clone = copy_decl (fn);
3725 /* Remember where this function came from. */
3726 DECL_CLONED_FUNCTION (clone) = fn;
5daf7c0a 3727 DECL_ABSTRACT_ORIGIN (clone) = fn;
db9b2174
MM
3728 /* Reset the function name. */
3729 DECL_NAME (clone) = name;
71cb9286 3730 SET_DECL_ASSEMBLER_NAME (clone, NULL_TREE);
db9b2174
MM
3731 /* There's no pending inline data for this function. */
3732 DECL_PENDING_INLINE_INFO (clone) = NULL;
3733 DECL_PENDING_INLINE_P (clone) = 0;
3734 /* And it hasn't yet been deferred. */
3735 DECL_DEFERRED_FN (clone) = 0;
3736
298d6f60
MM
3737 /* The base-class destructor is not virtual. */
3738 if (name == base_dtor_identifier)
3739 {
3740 DECL_VIRTUAL_P (clone) = 0;
3741 if (TREE_CODE (clone) != TEMPLATE_DECL)
3742 DECL_VINDEX (clone) = NULL_TREE;
3743 }
3744
4e7512c9 3745 /* If there was an in-charge parameter, drop it from the function
db9b2174
MM
3746 type. */
3747 if (DECL_HAS_IN_CHARGE_PARM_P (clone))
3748 {
3749 tree basetype;
3750 tree parmtypes;
3751 tree exceptions;
3752
3753 exceptions = TYPE_RAISES_EXCEPTIONS (TREE_TYPE (clone));
3754 basetype = TYPE_METHOD_BASETYPE (TREE_TYPE (clone));
3755 parmtypes = TYPE_ARG_TYPES (TREE_TYPE (clone));
3756 /* Skip the `this' parameter. */
3757 parmtypes = TREE_CHAIN (parmtypes);
3758 /* Skip the in-charge parameter. */
3759 parmtypes = TREE_CHAIN (parmtypes);
e0fff4b3
JM
3760 /* And the VTT parm, in a complete [cd]tor. */
3761 if (DECL_HAS_VTT_PARM_P (fn)
3762 && ! DECL_NEEDS_VTT_PARM_P (clone))
3763 parmtypes = TREE_CHAIN (parmtypes);
3ec6bad3
MM
3764 /* If this is subobject constructor or destructor, add the vtt
3765 parameter. */
c8094d83 3766 TREE_TYPE (clone)
43dc123f
MM
3767 = build_method_type_directly (basetype,
3768 TREE_TYPE (TREE_TYPE (clone)),
3769 parmtypes);
db9b2174
MM
3770 if (exceptions)
3771 TREE_TYPE (clone) = build_exception_variant (TREE_TYPE (clone),
3772 exceptions);
c8094d83 3773 TREE_TYPE (clone)
e9525111
MM
3774 = cp_build_type_attribute_variant (TREE_TYPE (clone),
3775 TYPE_ATTRIBUTES (TREE_TYPE (fn)));
db9b2174
MM
3776 }
3777
e0fff4b3
JM
3778 /* Copy the function parameters. But, DECL_ARGUMENTS on a TEMPLATE_DECL
3779 aren't function parameters; those are the template parameters. */
db9b2174
MM
3780 if (TREE_CODE (clone) != TEMPLATE_DECL)
3781 {
3782 DECL_ARGUMENTS (clone) = copy_list (DECL_ARGUMENTS (clone));
3783 /* Remove the in-charge parameter. */
3784 if (DECL_HAS_IN_CHARGE_PARM_P (clone))
3785 {
3786 TREE_CHAIN (DECL_ARGUMENTS (clone))
3787 = TREE_CHAIN (TREE_CHAIN (DECL_ARGUMENTS (clone)));
3788 DECL_HAS_IN_CHARGE_PARM_P (clone) = 0;
3789 }
e0fff4b3
JM
3790 /* And the VTT parm, in a complete [cd]tor. */
3791 if (DECL_HAS_VTT_PARM_P (fn))
3ec6bad3 3792 {
e0fff4b3
JM
3793 if (DECL_NEEDS_VTT_PARM_P (clone))
3794 DECL_HAS_VTT_PARM_P (clone) = 1;
3795 else
3796 {
3797 TREE_CHAIN (DECL_ARGUMENTS (clone))
3798 = TREE_CHAIN (TREE_CHAIN (DECL_ARGUMENTS (clone)));
3799 DECL_HAS_VTT_PARM_P (clone) = 0;
3800 }
3ec6bad3
MM
3801 }
3802
db9b2174
MM
3803 for (parms = DECL_ARGUMENTS (clone); parms; parms = TREE_CHAIN (parms))
3804 {
3805 DECL_CONTEXT (parms) = clone;
63e1b1c4 3806 cxx_dup_lang_specific_decl (parms);
db9b2174
MM
3807 }
3808 }
3809
db9b2174 3810 /* Create the RTL for this function. */
19e7881c 3811 SET_DECL_RTL (clone, NULL_RTX);
0e6df31e 3812 rest_of_decl_compilation (clone, /*top_level=*/1, at_eof);
c8094d83 3813
db9b2174
MM
3814 /* Make it easy to find the CLONE given the FN. */
3815 TREE_CHAIN (clone) = TREE_CHAIN (fn);
3816 TREE_CHAIN (fn) = clone;
3817
3818 /* If this is a template, handle the DECL_TEMPLATE_RESULT as well. */
3819 if (TREE_CODE (clone) == TEMPLATE_DECL)
3820 {
3821 tree result;
3822
c8094d83 3823 DECL_TEMPLATE_RESULT (clone)
db9b2174
MM
3824 = build_clone (DECL_TEMPLATE_RESULT (clone), name);
3825 result = DECL_TEMPLATE_RESULT (clone);
3826 DECL_TEMPLATE_INFO (result) = copy_node (DECL_TEMPLATE_INFO (result));
3827 DECL_TI_TEMPLATE (result) = clone;
3828 }
5e2f4cd2
MM
3829 else if (pch_file)
3830 note_decl_for_pch (clone);
db9b2174
MM
3831
3832 return clone;
3833}
3834
3835/* Produce declarations for all appropriate clones of FN. If
838dfd8a 3836 UPDATE_METHOD_VEC_P is nonzero, the clones are added to the
db9b2174
MM
3837 CLASTYPE_METHOD_VEC as well. */
3838
3839void
94edc4ab 3840clone_function_decl (tree fn, int update_method_vec_p)
db9b2174
MM
3841{
3842 tree clone;
3843
c00996a3 3844 /* Avoid inappropriate cloning. */
1f84ec23
MM
3845 if (TREE_CHAIN (fn)
3846 && DECL_CLONED_FUNCTION (TREE_CHAIN (fn)))
c00996a3
JM
3847 return;
3848
298d6f60 3849 if (DECL_MAYBE_IN_CHARGE_CONSTRUCTOR_P (fn))
db9b2174 3850 {
298d6f60
MM
3851 /* For each constructor, we need two variants: an in-charge version
3852 and a not-in-charge version. */
db9b2174
MM
3853 clone = build_clone (fn, complete_ctor_identifier);
3854 if (update_method_vec_p)
b2a9b208 3855 add_method (DECL_CONTEXT (clone), clone, NULL_TREE);
db9b2174
MM
3856 clone = build_clone (fn, base_ctor_identifier);
3857 if (update_method_vec_p)
b2a9b208 3858 add_method (DECL_CONTEXT (clone), clone, NULL_TREE);
db9b2174
MM
3859 }
3860 else
298d6f60 3861 {
50bc768d 3862 gcc_assert (DECL_MAYBE_IN_CHARGE_DESTRUCTOR_P (fn));
298d6f60 3863
3ec6bad3 3864 /* For each destructor, we need three variants: an in-charge
298d6f60 3865 version, a not-in-charge version, and an in-charge deleting
4e7512c9
MM
3866 version. We clone the deleting version first because that
3867 means it will go second on the TYPE_METHODS list -- and that
3868 corresponds to the correct layout order in the virtual
c8094d83 3869 function table.
52682a1b 3870
0cbd7506 3871 For a non-virtual destructor, we do not build a deleting
52682a1b
MM
3872 destructor. */
3873 if (DECL_VIRTUAL_P (fn))
3874 {
3875 clone = build_clone (fn, deleting_dtor_identifier);
3876 if (update_method_vec_p)
b2a9b208 3877 add_method (DECL_CONTEXT (clone), clone, NULL_TREE);
52682a1b 3878 }
4e7512c9 3879 clone = build_clone (fn, complete_dtor_identifier);
298d6f60 3880 if (update_method_vec_p)
b2a9b208 3881 add_method (DECL_CONTEXT (clone), clone, NULL_TREE);
298d6f60
MM
3882 clone = build_clone (fn, base_dtor_identifier);
3883 if (update_method_vec_p)
b2a9b208 3884 add_method (DECL_CONTEXT (clone), clone, NULL_TREE);
298d6f60 3885 }
5daf7c0a
JM
3886
3887 /* Note that this is an abstract function that is never emitted. */
3888 DECL_ABSTRACT (fn) = 1;
db9b2174
MM
3889}
3890
5f6eeeb3
NS
3891/* DECL is an in charge constructor, which is being defined. This will
3892 have had an in class declaration, from whence clones were
3893 declared. An out-of-class definition can specify additional default
3894 arguments. As it is the clones that are involved in overload
3895 resolution, we must propagate the information from the DECL to its
00a17e31 3896 clones. */
5f6eeeb3
NS
3897
3898void
94edc4ab 3899adjust_clone_args (tree decl)
5f6eeeb3
NS
3900{
3901 tree clone;
c8094d83 3902
5f6eeeb3
NS
3903 for (clone = TREE_CHAIN (decl); clone && DECL_CLONED_FUNCTION (clone);
3904 clone = TREE_CHAIN (clone))
3905 {
3906 tree orig_clone_parms = TYPE_ARG_TYPES (TREE_TYPE (clone));
3907 tree orig_decl_parms = TYPE_ARG_TYPES (TREE_TYPE (decl));
3908 tree decl_parms, clone_parms;
3909
3910 clone_parms = orig_clone_parms;
c8094d83 3911
00a17e31 3912 /* Skip the 'this' parameter. */
5f6eeeb3
NS
3913 orig_clone_parms = TREE_CHAIN (orig_clone_parms);
3914 orig_decl_parms = TREE_CHAIN (orig_decl_parms);
3915
3916 if (DECL_HAS_IN_CHARGE_PARM_P (decl))
3917 orig_decl_parms = TREE_CHAIN (orig_decl_parms);
3918 if (DECL_HAS_VTT_PARM_P (decl))
3919 orig_decl_parms = TREE_CHAIN (orig_decl_parms);
c8094d83 3920
5f6eeeb3
NS
3921 clone_parms = orig_clone_parms;
3922 if (DECL_HAS_VTT_PARM_P (clone))
3923 clone_parms = TREE_CHAIN (clone_parms);
c8094d83 3924
5f6eeeb3
NS
3925 for (decl_parms = orig_decl_parms; decl_parms;
3926 decl_parms = TREE_CHAIN (decl_parms),
3927 clone_parms = TREE_CHAIN (clone_parms))
3928 {
50bc768d
NS
3929 gcc_assert (same_type_p (TREE_TYPE (decl_parms),
3930 TREE_TYPE (clone_parms)));
c8094d83 3931
5f6eeeb3
NS
3932 if (TREE_PURPOSE (decl_parms) && !TREE_PURPOSE (clone_parms))
3933 {
3934 /* A default parameter has been added. Adjust the
00a17e31 3935 clone's parameters. */
5f6eeeb3
NS
3936 tree exceptions = TYPE_RAISES_EXCEPTIONS (TREE_TYPE (clone));
3937 tree basetype = TYPE_METHOD_BASETYPE (TREE_TYPE (clone));
3938 tree type;
3939
3940 clone_parms = orig_decl_parms;
3941
3942 if (DECL_HAS_VTT_PARM_P (clone))
3943 {
3944 clone_parms = tree_cons (TREE_PURPOSE (orig_clone_parms),
3945 TREE_VALUE (orig_clone_parms),
3946 clone_parms);
3947 TREE_TYPE (clone_parms) = TREE_TYPE (orig_clone_parms);
3948 }
43dc123f
MM
3949 type = build_method_type_directly (basetype,
3950 TREE_TYPE (TREE_TYPE (clone)),
3951 clone_parms);
5f6eeeb3
NS
3952 if (exceptions)
3953 type = build_exception_variant (type, exceptions);
3954 TREE_TYPE (clone) = type;
c8094d83 3955
5f6eeeb3
NS
3956 clone_parms = NULL_TREE;
3957 break;
3958 }
3959 }
50bc768d 3960 gcc_assert (!clone_parms);
5f6eeeb3
NS
3961 }
3962}
3963
db9b2174
MM
3964/* For each of the constructors and destructors in T, create an
3965 in-charge and not-in-charge variant. */
3966
3967static void
94edc4ab 3968clone_constructors_and_destructors (tree t)
db9b2174
MM
3969{
3970 tree fns;
3971
db9b2174
MM
3972 /* If for some reason we don't have a CLASSTYPE_METHOD_VEC, we bail
3973 out now. */
3974 if (!CLASSTYPE_METHOD_VEC (t))
3975 return;
3976
db9b2174
MM
3977 for (fns = CLASSTYPE_CONSTRUCTORS (t); fns; fns = OVL_NEXT (fns))
3978 clone_function_decl (OVL_CURRENT (fns), /*update_method_vec_p=*/1);
298d6f60
MM
3979 for (fns = CLASSTYPE_DESTRUCTORS (t); fns; fns = OVL_NEXT (fns))
3980 clone_function_decl (OVL_CURRENT (fns), /*update_method_vec_p=*/1);
db9b2174
MM
3981}
3982
58010b57
MM
3983/* Remove all zero-width bit-fields from T. */
3984
3985static void
94edc4ab 3986remove_zero_width_bit_fields (tree t)
58010b57
MM
3987{
3988 tree *fieldsp;
3989
c8094d83 3990 fieldsp = &TYPE_FIELDS (t);
58010b57
MM
3991 while (*fieldsp)
3992 {
3993 if (TREE_CODE (*fieldsp) == FIELD_DECL
c8094d83 3994 && DECL_C_BIT_FIELD (*fieldsp)
58010b57
MM
3995 && DECL_INITIAL (*fieldsp))
3996 *fieldsp = TREE_CHAIN (*fieldsp);
3997 else
3998 fieldsp = &TREE_CHAIN (*fieldsp);
3999 }
4000}
4001
dbc957f1
MM
4002/* Returns TRUE iff we need a cookie when dynamically allocating an
4003 array whose elements have the indicated class TYPE. */
4004
4005static bool
94edc4ab 4006type_requires_array_cookie (tree type)
dbc957f1
MM
4007{
4008 tree fns;
18fee3ee 4009 bool has_two_argument_delete_p = false;
dbc957f1 4010
50bc768d 4011 gcc_assert (CLASS_TYPE_P (type));
dbc957f1
MM
4012
4013 /* If there's a non-trivial destructor, we need a cookie. In order
4014 to iterate through the array calling the destructor for each
4015 element, we'll have to know how many elements there are. */
4016 if (TYPE_HAS_NONTRIVIAL_DESTRUCTOR (type))
4017 return true;
4018
4019 /* If the usual deallocation function is a two-argument whose second
4020 argument is of type `size_t', then we have to pass the size of
4021 the array to the deallocation function, so we will need to store
4022 a cookie. */
c8094d83 4023 fns = lookup_fnfields (TYPE_BINFO (type),
dbc957f1
MM
4024 ansi_opname (VEC_DELETE_EXPR),
4025 /*protect=*/0);
4026 /* If there are no `operator []' members, or the lookup is
4027 ambiguous, then we don't need a cookie. */
4028 if (!fns || fns == error_mark_node)
4029 return false;
4030 /* Loop through all of the functions. */
50ad9642 4031 for (fns = BASELINK_FUNCTIONS (fns); fns; fns = OVL_NEXT (fns))
dbc957f1
MM
4032 {
4033 tree fn;
4034 tree second_parm;
4035
4036 /* Select the current function. */
4037 fn = OVL_CURRENT (fns);
4038 /* See if this function is a one-argument delete function. If
4039 it is, then it will be the usual deallocation function. */
4040 second_parm = TREE_CHAIN (TYPE_ARG_TYPES (TREE_TYPE (fn)));
4041 if (second_parm == void_list_node)
4042 return false;
4043 /* Otherwise, if we have a two-argument function and the second
4044 argument is `size_t', it will be the usual deallocation
4045 function -- unless there is one-argument function, too. */
4046 if (TREE_CHAIN (second_parm) == void_list_node
4047 && same_type_p (TREE_VALUE (second_parm), sizetype))
4048 has_two_argument_delete_p = true;
4049 }
4050
4051 return has_two_argument_delete_p;
4052}
4053
607cf131
MM
4054/* Check the validity of the bases and members declared in T. Add any
4055 implicitly-generated functions (like copy-constructors and
4056 assignment operators). Compute various flag bits (like
4057 CLASSTYPE_NON_POD_T) for T. This routine works purely at the C++
4058 level: i.e., independently of the ABI in use. */
4059
4060static void
58731fd1 4061check_bases_and_members (tree t)
607cf131 4062{
607cf131
MM
4063 /* Nonzero if the implicitly generated copy constructor should take
4064 a non-const reference argument. */
4065 int cant_have_const_ctor;
78dcd41a 4066 /* Nonzero if the implicitly generated assignment operator
607cf131
MM
4067 should take a non-const reference argument. */
4068 int no_const_asn_ref;
4069 tree access_decls;
4070
4071 /* By default, we use const reference arguments and generate default
4072 constructors. */
607cf131
MM
4073 cant_have_const_ctor = 0;
4074 no_const_asn_ref = 0;
4075
00a17e31 4076 /* Check all the base-classes. */
e5e459bf 4077 check_bases (t, &cant_have_const_ctor,
607cf131
MM
4078 &no_const_asn_ref);
4079
9f4faeae
MM
4080 /* Check all the method declarations. */
4081 check_methods (t);
4082
4083 /* Check all the data member declarations. We cannot call
4084 check_field_decls until we have called check_bases check_methods,
4085 as check_field_decls depends on TYPE_HAS_NONTRIVIAL_DESTRUCTOR
4086 being set appropriately. */
58731fd1 4087 check_field_decls (t, &access_decls,
607cf131
MM
4088 &cant_have_const_ctor,
4089 &no_const_asn_ref);
4090
bbd15aac
MM
4091 /* A nearly-empty class has to be vptr-containing; a nearly empty
4092 class contains just a vptr. */
4093 if (!TYPE_CONTAINS_VPTR_P (t))
f9c528ea
MM
4094 CLASSTYPE_NEARLY_EMPTY_P (t) = 0;
4095
607cf131
MM
4096 /* Do some bookkeeping that will guide the generation of implicitly
4097 declared member functions. */
4098 TYPE_HAS_COMPLEX_INIT_REF (t)
5775a06a 4099 |= (TYPE_HAS_INIT_REF (t) || TYPE_CONTAINS_VPTR_P (t));
607cf131 4100 TYPE_NEEDS_CONSTRUCTING (t)
5775a06a
NS
4101 |= (TYPE_HAS_CONSTRUCTOR (t) || TYPE_CONTAINS_VPTR_P (t));
4102 CLASSTYPE_NON_AGGREGATE (t)
4103 |= (TYPE_HAS_CONSTRUCTOR (t) || TYPE_POLYMORPHIC_P (t));
607cf131 4104 CLASSTYPE_NON_POD_P (t)
c8094d83 4105 |= (CLASSTYPE_NON_AGGREGATE (t)
9f4faeae 4106 || TYPE_HAS_NONTRIVIAL_DESTRUCTOR (t)
607cf131 4107 || TYPE_HAS_ASSIGN_REF (t));
607cf131 4108 TYPE_HAS_COMPLEX_ASSIGN_REF (t)
0830ae44 4109 |= TYPE_HAS_ASSIGN_REF (t) || TYPE_CONTAINS_VPTR_P (t);
607cf131 4110
03fd3f84 4111 /* Synthesize any needed methods. */
e5e459bf 4112 add_implicitly_declared_members (t,
607cf131
MM
4113 cant_have_const_ctor,
4114 no_const_asn_ref);
4115
db9b2174
MM
4116 /* Create the in-charge and not-in-charge variants of constructors
4117 and destructors. */
4118 clone_constructors_and_destructors (t);
4119
aa52c1ff
JM
4120 /* Process the using-declarations. */
4121 for (; access_decls; access_decls = TREE_CHAIN (access_decls))
4122 handle_using_decl (TREE_VALUE (access_decls), t);
4123
607cf131
MM
4124 /* Build and sort the CLASSTYPE_METHOD_VEC. */
4125 finish_struct_methods (t);
dbc957f1
MM
4126
4127 /* Figure out whether or not we will need a cookie when dynamically
4128 allocating an array of this type. */
e2500fed 4129 TYPE_LANG_SPECIFIC (t)->u.c.vec_new_uses_cookie
dbc957f1 4130 = type_requires_array_cookie (t);
607cf131
MM
4131}
4132
3ef397c1 4133/* If T needs a pointer to its virtual function table, set TYPE_VFIELD
5c24fba6
MM
4134 accordingly. If a new vfield was created (because T doesn't have a
4135 primary base class), then the newly created field is returned. It
c35cce41 4136 is not added to the TYPE_FIELDS list; it is the caller's
e6858a84
NS
4137 responsibility to do that. Accumulate declared virtual functions
4138 on VIRTUALS_P. */
3ef397c1 4139
5c24fba6 4140static tree
94edc4ab 4141create_vtable_ptr (tree t, tree* virtuals_p)
3ef397c1
MM
4142{
4143 tree fn;
4144
e6858a84 4145 /* Collect the virtual functions declared in T. */
3ef397c1 4146 for (fn = TYPE_METHODS (t); fn; fn = TREE_CHAIN (fn))
e6858a84
NS
4147 if (DECL_VINDEX (fn) && !DECL_MAYBE_IN_CHARGE_DESTRUCTOR_P (fn)
4148 && TREE_CODE (DECL_VINDEX (fn)) != INTEGER_CST)
4149 {
4150 tree new_virtual = make_node (TREE_LIST);
c8094d83 4151
e6858a84
NS
4152 BV_FN (new_virtual) = fn;
4153 BV_DELTA (new_virtual) = integer_zero_node;
d1f05f93 4154 BV_VCALL_INDEX (new_virtual) = NULL_TREE;
3ef397c1 4155
e6858a84
NS
4156 TREE_CHAIN (new_virtual) = *virtuals_p;
4157 *virtuals_p = new_virtual;
4158 }
c8094d83 4159
da3d4dfa
MM
4160 /* If we couldn't find an appropriate base class, create a new field
4161 here. Even if there weren't any new virtual functions, we might need a
bbd15aac
MM
4162 new virtual function table if we're supposed to include vptrs in
4163 all classes that need them. */
e6858a84 4164 if (!TYPE_VFIELD (t) && (*virtuals_p || TYPE_CONTAINS_VPTR_P (t)))
3ef397c1
MM
4165 {
4166 /* We build this decl with vtbl_ptr_type_node, which is a
4167 `vtable_entry_type*'. It might seem more precise to use
a692ad2e 4168 `vtable_entry_type (*)[N]' where N is the number of virtual
3ef397c1
MM
4169 functions. However, that would require the vtable pointer in
4170 base classes to have a different type than the vtable pointer
4171 in derived classes. We could make that happen, but that
4172 still wouldn't solve all the problems. In particular, the
4173 type-based alias analysis code would decide that assignments
4174 to the base class vtable pointer can't alias assignments to
4175 the derived class vtable pointer, since they have different
4639c5c6 4176 types. Thus, in a derived class destructor, where the base
3ef397c1 4177 class constructor was inlined, we could generate bad code for
c8094d83 4178 setting up the vtable pointer.
3ef397c1 4179
0cbd7506 4180 Therefore, we use one type for all vtable pointers. We still
3ef397c1
MM
4181 use a type-correct type; it's just doesn't indicate the array
4182 bounds. That's better than using `void*' or some such; it's
4183 cleaner, and it let's the alias analysis code know that these
4184 stores cannot alias stores to void*! */
0abe00c5
NS
4185 tree field;
4186
4187 field = build_decl (FIELD_DECL, get_vfield_name (t), vtbl_ptr_type_node);
0abe00c5
NS
4188 DECL_VIRTUAL_P (field) = 1;
4189 DECL_ARTIFICIAL (field) = 1;
4190 DECL_FIELD_CONTEXT (field) = t;
4191 DECL_FCONTEXT (field) = t;
c8094d83 4192
0abe00c5 4193 TYPE_VFIELD (t) = field;
c8094d83 4194
0abe00c5 4195 /* This class is non-empty. */
58731fd1 4196 CLASSTYPE_EMPTY_P (t) = 0;
3ef397c1 4197
0abe00c5 4198 return field;
3ef397c1 4199 }
5c24fba6
MM
4200
4201 return NULL_TREE;
3ef397c1
MM
4202}
4203
2ef16140
MM
4204/* Fixup the inline function given by INFO now that the class is
4205 complete. */
08b962b0 4206
2ef16140 4207static void
94edc4ab 4208fixup_pending_inline (tree fn)
2ef16140 4209{
0e5921e8 4210 if (DECL_PENDING_INLINE_INFO (fn))
2ef16140 4211 {
0e5921e8 4212 tree args = DECL_ARGUMENTS (fn);
2ef16140
MM
4213 while (args)
4214 {
4215 DECL_CONTEXT (args) = fn;
4216 args = TREE_CHAIN (args);
4217 }
4218 }
4219}
08b962b0 4220
2ef16140
MM
4221/* Fixup the inline methods and friends in TYPE now that TYPE is
4222 complete. */
08b962b0 4223
2ef16140 4224static void
94edc4ab 4225fixup_inline_methods (tree type)
08b962b0 4226{
2ef16140 4227 tree method = TYPE_METHODS (type);
d4e6fecb 4228 VEC(tree,gc) *friends;
585b44d3 4229 unsigned ix;
08b962b0 4230
2ef16140 4231 if (method && TREE_CODE (method) == TREE_VEC)
08b962b0 4232 {
2ef16140
MM
4233 if (TREE_VEC_ELT (method, 1))
4234 method = TREE_VEC_ELT (method, 1);
4235 else if (TREE_VEC_ELT (method, 0))
4236 method = TREE_VEC_ELT (method, 0);
08b962b0 4237 else
2ef16140 4238 method = TREE_VEC_ELT (method, 2);
08b962b0
MM
4239 }
4240
2ef16140
MM
4241 /* Do inline member functions. */
4242 for (; method; method = TREE_CHAIN (method))
0e5921e8 4243 fixup_pending_inline (method);
08b962b0 4244
2ef16140 4245 /* Do friends. */
585b44d3
NS
4246 for (friends = CLASSTYPE_INLINE_FRIENDS (type), ix = 0;
4247 VEC_iterate (tree, friends, ix, method); ix++)
4248 fixup_pending_inline (method);
4249 CLASSTYPE_INLINE_FRIENDS (type) = NULL;
2ef16140 4250}
08b962b0 4251
9d4c0187
MM
4252/* Add OFFSET to all base types of BINFO which is a base in the
4253 hierarchy dominated by T.
80fd5f48 4254
911a71a7 4255 OFFSET, which is a type offset, is number of bytes. */
80fd5f48
MM
4256
4257static void
dbbf88d1 4258propagate_binfo_offsets (tree binfo, tree offset)
80fd5f48 4259{
911a71a7
MM
4260 int i;
4261 tree primary_binfo;
fa743e8c 4262 tree base_binfo;
80fd5f48 4263
911a71a7
MM
4264 /* Update BINFO's offset. */
4265 BINFO_OFFSET (binfo)
c8094d83 4266 = convert (sizetype,
911a71a7
MM
4267 size_binop (PLUS_EXPR,
4268 convert (ssizetype, BINFO_OFFSET (binfo)),
4269 offset));
80fd5f48 4270
911a71a7
MM
4271 /* Find the primary base class. */
4272 primary_binfo = get_primary_binfo (binfo);
4273
fc6633e0 4274 if (primary_binfo && BINFO_INHERITANCE_CHAIN (primary_binfo) == binfo)
090ad434 4275 propagate_binfo_offsets (primary_binfo, offset);
c8094d83 4276
911a71a7
MM
4277 /* Scan all of the bases, pushing the BINFO_OFFSET adjust
4278 downwards. */
fa743e8c 4279 for (i = 0; BINFO_BASE_ITERATE (binfo, i, base_binfo); ++i)
80fd5f48 4280 {
090ad434
NS
4281 /* Don't do the primary base twice. */
4282 if (base_binfo == primary_binfo)
4283 continue;
911a71a7 4284
090ad434 4285 if (BINFO_VIRTUAL_P (base_binfo))
911a71a7
MM
4286 continue;
4287
dbbf88d1 4288 propagate_binfo_offsets (base_binfo, offset);
911a71a7 4289 }
9d4c0187
MM
4290}
4291
17bbb839 4292/* Set BINFO_OFFSET for all of the virtual bases for RLI->T. Update
c20118a8
MM
4293 TYPE_ALIGN and TYPE_SIZE for T. OFFSETS gives the location of
4294 empty subobjects of T. */
80fd5f48 4295
d2c5305b 4296static void
17bbb839 4297layout_virtual_bases (record_layout_info rli, splay_tree offsets)
80fd5f48 4298{
dbbf88d1 4299 tree vbase;
17bbb839 4300 tree t = rli->t;
eca7f13c 4301 bool first_vbase = true;
17bbb839 4302 tree *next_field;
9785e4b1 4303
604a3205 4304 if (BINFO_N_BASE_BINFOS (TYPE_BINFO (t)) == 0)
9785e4b1
MM
4305 return;
4306
17bbb839
MM
4307 if (!abi_version_at_least(2))
4308 {
4309 /* In G++ 3.2, we incorrectly rounded the size before laying out
4310 the virtual bases. */
4311 finish_record_layout (rli, /*free_p=*/false);
9785e4b1 4312#ifdef STRUCTURE_SIZE_BOUNDARY
17bbb839
MM
4313 /* Packed structures don't need to have minimum size. */
4314 if (! TYPE_PACKED (t))
fc555370 4315 TYPE_ALIGN (t) = MAX (TYPE_ALIGN (t), (unsigned) STRUCTURE_SIZE_BOUNDARY);
9785e4b1 4316#endif
17bbb839
MM
4317 rli->offset = TYPE_SIZE_UNIT (t);
4318 rli->bitpos = bitsize_zero_node;
4319 rli->record_align = TYPE_ALIGN (t);
4320 }
80fd5f48 4321
17bbb839
MM
4322 /* Find the last field. The artificial fields created for virtual
4323 bases will go after the last extant field to date. */
4324 next_field = &TYPE_FIELDS (t);
4325 while (*next_field)
4326 next_field = &TREE_CHAIN (*next_field);
80fd5f48 4327
9d4c0187 4328 /* Go through the virtual bases, allocating space for each virtual
3461fba7
NS
4329 base that is not already a primary base class. These are
4330 allocated in inheritance graph order. */
dbbf88d1 4331 for (vbase = TYPE_BINFO (t); vbase; vbase = TREE_CHAIN (vbase))
c35cce41 4332 {
809e3e7f 4333 if (!BINFO_VIRTUAL_P (vbase))
1f84ec23 4334 continue;
eca7f13c 4335
9965d119 4336 if (!BINFO_PRIMARY_P (vbase))
c35cce41 4337 {
17bbb839
MM
4338 tree basetype = TREE_TYPE (vbase);
4339
c35cce41
MM
4340 /* This virtual base is not a primary base of any class in the
4341 hierarchy, so we have to add space for it. */
58731fd1 4342 next_field = build_base_field (rli, vbase,
17bbb839 4343 offsets, next_field);
9785e4b1 4344
eca7f13c
MM
4345 /* If the first virtual base might have been placed at a
4346 lower address, had we started from CLASSTYPE_SIZE, rather
4347 than TYPE_SIZE, issue a warning. There can be both false
4348 positives and false negatives from this warning in rare
4349 cases; to deal with all the possibilities would probably
4350 require performing both layout algorithms and comparing
4351 the results which is not particularly tractable. */
4352 if (warn_abi
4353 && first_vbase
c8094d83 4354 && (tree_int_cst_lt
17bbb839
MM
4355 (size_binop (CEIL_DIV_EXPR,
4356 round_up (CLASSTYPE_SIZE (t),
4357 CLASSTYPE_ALIGN (basetype)),
4358 bitsize_unit_node),
4359 BINFO_OFFSET (vbase))))
74fa0285
GDR
4360 warning (OPT_Wabi,
4361 "offset of virtual base %qT is not ABI-compliant and "
0cbd7506 4362 "may change in a future version of GCC",
eca7f13c
MM
4363 basetype);
4364
eca7f13c 4365 first_vbase = false;
c35cce41
MM
4366 }
4367 }
80fd5f48
MM
4368}
4369
ba9a991f
MM
4370/* Returns the offset of the byte just past the end of the base class
4371 BINFO. */
4372
4373static tree
4374end_of_base (tree binfo)
4375{
4376 tree size;
4377
4378 if (is_empty_class (BINFO_TYPE (binfo)))
4379 /* An empty class has zero CLASSTYPE_SIZE_UNIT, but we need to
4380 allocate some space for it. It cannot have virtual bases, so
4381 TYPE_SIZE_UNIT is fine. */
4382 size = TYPE_SIZE_UNIT (BINFO_TYPE (binfo));
4383 else
4384 size = CLASSTYPE_SIZE_UNIT (BINFO_TYPE (binfo));
4385
4386 return size_binop (PLUS_EXPR, BINFO_OFFSET (binfo), size);
4387}
4388
9785e4b1
MM
4389/* Returns the offset of the byte just past the end of the base class
4390 with the highest offset in T. If INCLUDE_VIRTUALS_P is zero, then
4391 only non-virtual bases are included. */
80fd5f48 4392
17bbb839 4393static tree
94edc4ab 4394end_of_class (tree t, int include_virtuals_p)
80fd5f48 4395{
17bbb839 4396 tree result = size_zero_node;
d4e6fecb 4397 VEC(tree,gc) *vbases;
ba9a991f 4398 tree binfo;
9ba5ff0f 4399 tree base_binfo;
ba9a991f 4400 tree offset;
9785e4b1 4401 int i;
80fd5f48 4402
fa743e8c
NS
4403 for (binfo = TYPE_BINFO (t), i = 0;
4404 BINFO_BASE_ITERATE (binfo, i, base_binfo); ++i)
9785e4b1 4405 {
9785e4b1 4406 if (!include_virtuals_p
fc6633e0
NS
4407 && BINFO_VIRTUAL_P (base_binfo)
4408 && (!BINFO_PRIMARY_P (base_binfo)
4409 || BINFO_INHERITANCE_CHAIN (base_binfo) != TYPE_BINFO (t)))
9785e4b1 4410 continue;
80fd5f48 4411
fa743e8c 4412 offset = end_of_base (base_binfo);
17bbb839
MM
4413 if (INT_CST_LT_UNSIGNED (result, offset))
4414 result = offset;
9785e4b1 4415 }
80fd5f48 4416
ba9a991f
MM
4417 /* G++ 3.2 did not check indirect virtual bases. */
4418 if (abi_version_at_least (2) && include_virtuals_p)
9ba5ff0f
NS
4419 for (vbases = CLASSTYPE_VBASECLASSES (t), i = 0;
4420 VEC_iterate (tree, vbases, i, base_binfo); i++)
ba9a991f 4421 {
9ba5ff0f 4422 offset = end_of_base (base_binfo);
ba9a991f
MM
4423 if (INT_CST_LT_UNSIGNED (result, offset))
4424 result = offset;
4425 }
4426
9785e4b1 4427 return result;
80fd5f48
MM
4428}
4429
17bbb839 4430/* Warn about bases of T that are inaccessible because they are
78b45a24
MM
4431 ambiguous. For example:
4432
4433 struct S {};
4434 struct T : public S {};
4435 struct U : public S, public T {};
4436
4437 Here, `(S*) new U' is not allowed because there are two `S'
4438 subobjects of U. */
4439
4440static void
94edc4ab 4441warn_about_ambiguous_bases (tree t)
78b45a24
MM
4442{
4443 int i;
d4e6fecb 4444 VEC(tree,gc) *vbases;
17bbb839 4445 tree basetype;
58c42dc2 4446 tree binfo;
fa743e8c 4447 tree base_binfo;
78b45a24 4448
18e4be85
NS
4449 /* If there are no repeated bases, nothing can be ambiguous. */
4450 if (!CLASSTYPE_REPEATED_BASE_P (t))
4451 return;
c8094d83 4452
17bbb839 4453 /* Check direct bases. */
fa743e8c
NS
4454 for (binfo = TYPE_BINFO (t), i = 0;
4455 BINFO_BASE_ITERATE (binfo, i, base_binfo); ++i)
78b45a24 4456 {
fa743e8c 4457 basetype = BINFO_TYPE (base_binfo);
78b45a24 4458
18e4be85 4459 if (!lookup_base (t, basetype, ba_unique | ba_quiet, NULL))
d4ee4d25 4460 warning (0, "direct base %qT inaccessible in %qT due to ambiguity",
17bbb839 4461 basetype, t);
78b45a24 4462 }
17bbb839
MM
4463
4464 /* Check for ambiguous virtual bases. */
4465 if (extra_warnings)
9ba5ff0f
NS
4466 for (vbases = CLASSTYPE_VBASECLASSES (t), i = 0;
4467 VEC_iterate (tree, vbases, i, binfo); i++)
17bbb839 4468 {
58c42dc2 4469 basetype = BINFO_TYPE (binfo);
c8094d83 4470
18e4be85 4471 if (!lookup_base (t, basetype, ba_unique | ba_quiet, NULL))
d4ee4d25 4472 warning (0, "virtual base %qT inaccessible in %qT due to ambiguity",
17bbb839
MM
4473 basetype, t);
4474 }
78b45a24
MM
4475}
4476
c20118a8
MM
4477/* Compare two INTEGER_CSTs K1 and K2. */
4478
4479static int
94edc4ab 4480splay_tree_compare_integer_csts (splay_tree_key k1, splay_tree_key k2)
c20118a8
MM
4481{
4482 return tree_int_cst_compare ((tree) k1, (tree) k2);
4483}
4484
17bbb839
MM
4485/* Increase the size indicated in RLI to account for empty classes
4486 that are "off the end" of the class. */
4487
4488static void
4489include_empty_classes (record_layout_info rli)
4490{
4491 tree eoc;
e3ccdd50 4492 tree rli_size;
17bbb839
MM
4493
4494 /* It might be the case that we grew the class to allocate a
4495 zero-sized base class. That won't be reflected in RLI, yet,
4496 because we are willing to overlay multiple bases at the same
4497 offset. However, now we need to make sure that RLI is big enough
4498 to reflect the entire class. */
c8094d83 4499 eoc = end_of_class (rli->t,
17bbb839 4500 CLASSTYPE_AS_BASE (rli->t) != NULL_TREE);
e3ccdd50
MM
4501 rli_size = rli_size_unit_so_far (rli);
4502 if (TREE_CODE (rli_size) == INTEGER_CST
4503 && INT_CST_LT_UNSIGNED (rli_size, eoc))
17bbb839 4504 {
43fe31f6
MM
4505 if (!abi_version_at_least (2))
4506 /* In version 1 of the ABI, the size of a class that ends with
4507 a bitfield was not rounded up to a whole multiple of a
4508 byte. Because rli_size_unit_so_far returns only the number
4509 of fully allocated bytes, any extra bits were not included
4510 in the size. */
4511 rli->bitpos = round_down (rli->bitpos, BITS_PER_UNIT);
4512 else
4513 /* The size should have been rounded to a whole byte. */
50bc768d
NS
4514 gcc_assert (tree_int_cst_equal
4515 (rli->bitpos, round_down (rli->bitpos, BITS_PER_UNIT)));
c8094d83
MS
4516 rli->bitpos
4517 = size_binop (PLUS_EXPR,
e3ccdd50
MM
4518 rli->bitpos,
4519 size_binop (MULT_EXPR,
4520 convert (bitsizetype,
4521 size_binop (MINUS_EXPR,
4522 eoc, rli_size)),
4523 bitsize_int (BITS_PER_UNIT)));
4524 normalize_rli (rli);
17bbb839
MM
4525 }
4526}
4527
2ef16140
MM
4528/* Calculate the TYPE_SIZE, TYPE_ALIGN, etc for T. Calculate
4529 BINFO_OFFSETs for all of the base-classes. Position the vtable
00a17e31 4530 pointer. Accumulate declared virtual functions on VIRTUALS_P. */
607cf131 4531
2ef16140 4532static void
e93ee644 4533layout_class_type (tree t, tree *virtuals_p)
2ef16140 4534{
5c24fba6
MM
4535 tree non_static_data_members;
4536 tree field;
4537 tree vptr;
4538 record_layout_info rli;
c20118a8
MM
4539 /* Maps offsets (represented as INTEGER_CSTs) to a TREE_LIST of
4540 types that appear at that offset. */
4541 splay_tree empty_base_offsets;
eca7f13c
MM
4542 /* True if the last field layed out was a bit-field. */
4543 bool last_field_was_bitfield = false;
17bbb839
MM
4544 /* The location at which the next field should be inserted. */
4545 tree *next_field;
4546 /* T, as a base class. */
4547 tree base_t;
5c24fba6
MM
4548
4549 /* Keep track of the first non-static data member. */
4550 non_static_data_members = TYPE_FIELDS (t);
4551
770ae6cc
RK
4552 /* Start laying out the record. */
4553 rli = start_record_layout (t);
534170eb 4554
fc6633e0
NS
4555 /* Mark all the primary bases in the hierarchy. */
4556 determine_primary_bases (t);
8026246f 4557
5c24fba6 4558 /* Create a pointer to our virtual function table. */
58731fd1 4559 vptr = create_vtable_ptr (t, virtuals_p);
5c24fba6 4560
3461fba7 4561 /* The vptr is always the first thing in the class. */
1f84ec23 4562 if (vptr)
5c24fba6 4563 {
17bbb839
MM
4564 TREE_CHAIN (vptr) = TYPE_FIELDS (t);
4565 TYPE_FIELDS (t) = vptr;
4566 next_field = &TREE_CHAIN (vptr);
770ae6cc 4567 place_field (rli, vptr);
5c24fba6 4568 }
17bbb839
MM
4569 else
4570 next_field = &TYPE_FIELDS (t);
5c24fba6 4571
72a50ab0 4572 /* Build FIELD_DECLs for all of the non-virtual base-types. */
c8094d83 4573 empty_base_offsets = splay_tree_new (splay_tree_compare_integer_csts,
c20118a8 4574 NULL, NULL);
58731fd1 4575 build_base_fields (rli, empty_base_offsets, next_field);
c8094d83 4576
5c24fba6 4577 /* Layout the non-static data members. */
770ae6cc 4578 for (field = non_static_data_members; field; field = TREE_CHAIN (field))
5c24fba6 4579 {
01955e96
MM
4580 tree type;
4581 tree padding;
5c24fba6
MM
4582
4583 /* We still pass things that aren't non-static data members to
4584 the back-end, in case it wants to do something with them. */
4585 if (TREE_CODE (field) != FIELD_DECL)
4586 {
770ae6cc 4587 place_field (rli, field);
0154eaa8 4588 /* If the static data member has incomplete type, keep track
c8094d83 4589 of it so that it can be completed later. (The handling
0154eaa8
MM
4590 of pending statics in finish_record_layout is
4591 insufficient; consider:
4592
4593 struct S1;
4594 struct S2 { static S1 s1; };
c8094d83 4595
0cbd7506 4596 At this point, finish_record_layout will be called, but
0154eaa8
MM
4597 S1 is still incomplete.) */
4598 if (TREE_CODE (field) == VAR_DECL)
532b37d9
MM
4599 {
4600 maybe_register_incomplete_var (field);
4601 /* The visibility of static data members is determined
4602 at their point of declaration, not their point of
4603 definition. */
4604 determine_visibility (field);
4605 }
5c24fba6
MM
4606 continue;
4607 }
4608
01955e96 4609 type = TREE_TYPE (field);
c8094d83 4610
1e099144 4611 padding = NULL_TREE;
01955e96
MM
4612
4613 /* If this field is a bit-field whose width is greater than its
3461fba7
NS
4614 type, then there are some special rules for allocating
4615 it. */
01955e96 4616 if (DECL_C_BIT_FIELD (field)
1f84ec23 4617 && INT_CST_LT (TYPE_SIZE (type), DECL_SIZE (field)))
01955e96
MM
4618 {
4619 integer_type_kind itk;
4620 tree integer_type;
555456b1 4621 bool was_unnamed_p = false;
01955e96
MM
4622 /* We must allocate the bits as if suitably aligned for the
4623 longest integer type that fits in this many bits. type
4624 of the field. Then, we are supposed to use the left over
4625 bits as additional padding. */
4626 for (itk = itk_char; itk != itk_none; ++itk)
c8094d83 4627 if (INT_CST_LT (DECL_SIZE (field),
01955e96
MM
4628 TYPE_SIZE (integer_types[itk])))
4629 break;
4630
4631 /* ITK now indicates a type that is too large for the
4632 field. We have to back up by one to find the largest
4633 type that fits. */
4634 integer_type = integer_types[itk - 1];
2d3e278d 4635
1e099144
MM
4636 /* Figure out how much additional padding is required. GCC
4637 3.2 always created a padding field, even if it had zero
4638 width. */
4639 if (!abi_version_at_least (2)
4640 || INT_CST_LT (TYPE_SIZE (integer_type), DECL_SIZE (field)))
2d3e278d 4641 {
1e099144
MM
4642 if (abi_version_at_least (2) && TREE_CODE (t) == UNION_TYPE)
4643 /* In a union, the padding field must have the full width
4644 of the bit-field; all fields start at offset zero. */
4645 padding = DECL_SIZE (field);
4646 else
4647 {
74fa0285
GDR
4648 if (TREE_CODE (t) == UNION_TYPE)
4649 warning (OPT_Wabi, "size assigned to %qT may not be "
1e099144 4650 "ABI-compliant and may change in a future "
c8094d83 4651 "version of GCC",
1e099144
MM
4652 t);
4653 padding = size_binop (MINUS_EXPR, DECL_SIZE (field),
4654 TYPE_SIZE (integer_type));
4655 }
2d3e278d 4656 }
c9372112 4657#ifdef PCC_BITFIELD_TYPE_MATTERS
63e5f567
MM
4658 /* An unnamed bitfield does not normally affect the
4659 alignment of the containing class on a target where
4660 PCC_BITFIELD_TYPE_MATTERS. But, the C++ ABI does not
4661 make any exceptions for unnamed bitfields when the
4662 bitfields are longer than their types. Therefore, we
4663 temporarily give the field a name. */
4664 if (PCC_BITFIELD_TYPE_MATTERS && !DECL_NAME (field))
4665 {
4666 was_unnamed_p = true;
4667 DECL_NAME (field) = make_anon_name ();
4668 }
c9372112 4669#endif
01955e96
MM
4670 DECL_SIZE (field) = TYPE_SIZE (integer_type);
4671 DECL_ALIGN (field) = TYPE_ALIGN (integer_type);
11cf4d18 4672 DECL_USER_ALIGN (field) = TYPE_USER_ALIGN (integer_type);
555456b1
MM
4673 layout_nonempty_base_or_field (rli, field, NULL_TREE,
4674 empty_base_offsets);
4675 if (was_unnamed_p)
4676 DECL_NAME (field) = NULL_TREE;
4677 /* Now that layout has been performed, set the size of the
4678 field to the size of its declared type; the rest of the
4679 field is effectively invisible. */
4680 DECL_SIZE (field) = TYPE_SIZE (type);
29edb15c
MM
4681 /* We must also reset the DECL_MODE of the field. */
4682 if (abi_version_at_least (2))
4683 DECL_MODE (field) = TYPE_MODE (type);
4684 else if (warn_abi
4685 && DECL_MODE (field) != TYPE_MODE (type))
4686 /* Versions of G++ before G++ 3.4 did not reset the
4687 DECL_MODE. */
74fa0285
GDR
4688 warning (OPT_Wabi,
4689 "the offset of %qD may not be ABI-compliant and may "
29edb15c 4690 "change in a future version of GCC", field);
01955e96 4691 }
555456b1
MM
4692 else
4693 layout_nonempty_base_or_field (rli, field, NULL_TREE,
4694 empty_base_offsets);
01955e96 4695
2003cd37
MM
4696 /* Remember the location of any empty classes in FIELD. */
4697 if (abi_version_at_least (2))
c8094d83 4698 record_subobject_offsets (TREE_TYPE (field),
2003cd37
MM
4699 byte_position(field),
4700 empty_base_offsets,
c5a35c3c 4701 /*is_data_member=*/true);
2003cd37 4702
eca7f13c
MM
4703 /* If a bit-field does not immediately follow another bit-field,
4704 and yet it starts in the middle of a byte, we have failed to
4705 comply with the ABI. */
4706 if (warn_abi
c8094d83 4707 && DECL_C_BIT_FIELD (field)
660845bf
ZL
4708 /* The TREE_NO_WARNING flag gets set by Objective-C when
4709 laying out an Objective-C class. The ObjC ABI differs
4710 from the C++ ABI, and so we do not want a warning
4711 here. */
4712 && !TREE_NO_WARNING (field)
eca7f13c
MM
4713 && !last_field_was_bitfield
4714 && !integer_zerop (size_binop (TRUNC_MOD_EXPR,
4715 DECL_FIELD_BIT_OFFSET (field),
4716 bitsize_unit_node)))
74fa0285 4717 warning (OPT_Wabi, "offset of %q+D is not ABI-compliant and may "
dee15844 4718 "change in a future version of GCC", field);
eca7f13c 4719
956d9305
MM
4720 /* G++ used to use DECL_FIELD_OFFSET as if it were the byte
4721 offset of the field. */
c8094d83 4722 if (warn_abi
956d9305
MM
4723 && !tree_int_cst_equal (DECL_FIELD_OFFSET (field),
4724 byte_position (field))
4725 && contains_empty_class_p (TREE_TYPE (field)))
74fa0285 4726 warning (OPT_Wabi, "%q+D contains empty classes which may cause base "
dee15844
JM
4727 "classes to be placed at different locations in a "
4728 "future version of GCC", field);
956d9305 4729
01955e96
MM
4730 /* If we needed additional padding after this field, add it
4731 now. */
4732 if (padding)
4733 {
4734 tree padding_field;
4735
c8094d83 4736 padding_field = build_decl (FIELD_DECL,
01955e96 4737 NULL_TREE,
c8094d83 4738 char_type_node);
01955e96
MM
4739 DECL_BIT_FIELD (padding_field) = 1;
4740 DECL_SIZE (padding_field) = padding;
1e099144 4741 DECL_CONTEXT (padding_field) = t;
ea258926 4742 DECL_ARTIFICIAL (padding_field) = 1;
78e0d62b 4743 DECL_IGNORED_P (padding_field) = 1;
c20118a8 4744 layout_nonempty_base_or_field (rli, padding_field,
c8094d83 4745 NULL_TREE,
17bbb839 4746 empty_base_offsets);
01955e96 4747 }
eca7f13c
MM
4748
4749 last_field_was_bitfield = DECL_C_BIT_FIELD (field);
5c24fba6
MM
4750 }
4751
17bbb839 4752 if (abi_version_at_least (2) && !integer_zerop (rli->bitpos))
e3ccdd50
MM
4753 {
4754 /* Make sure that we are on a byte boundary so that the size of
4755 the class without virtual bases will always be a round number
4756 of bytes. */
4757 rli->bitpos = round_up (rli->bitpos, BITS_PER_UNIT);
4758 normalize_rli (rli);
4759 }
17bbb839 4760
8a874cb4
MM
4761 /* G++ 3.2 does not allow virtual bases to be overlaid with tail
4762 padding. */
4763 if (!abi_version_at_least (2))
4764 include_empty_classes(rli);
58010b57 4765
3ef397c1
MM
4766 /* Delete all zero-width bit-fields from the list of fields. Now
4767 that the type is laid out they are no longer important. */
4768 remove_zero_width_bit_fields (t);
4769
17bbb839
MM
4770 /* Create the version of T used for virtual bases. We do not use
4771 make_aggr_type for this version; this is an artificial type. For
4772 a POD type, we just reuse T. */
58731fd1 4773 if (CLASSTYPE_NON_POD_P (t) || CLASSTYPE_EMPTY_P (t))
06ceef4e 4774 {
17bbb839 4775 base_t = make_node (TREE_CODE (t));
c8094d83 4776
58731fd1
MM
4777 /* Set the size and alignment for the new type. In G++ 3.2, all
4778 empty classes were considered to have size zero when used as
4779 base classes. */
4780 if (!abi_version_at_least (2) && CLASSTYPE_EMPTY_P (t))
4781 {
4782 TYPE_SIZE (base_t) = bitsize_zero_node;
4783 TYPE_SIZE_UNIT (base_t) = size_zero_node;
4784 if (warn_abi && !integer_zerop (rli_size_unit_so_far (rli)))
74fa0285
GDR
4785 warning (OPT_Wabi,
4786 "layout of classes derived from empty class %qT "
58731fd1
MM
4787 "may change in a future version of GCC",
4788 t);
4789 }
4790 else
4791 {
6b99d1c0
MM
4792 tree eoc;
4793
4794 /* If the ABI version is not at least two, and the last
4795 field was a bit-field, RLI may not be on a byte
4796 boundary. In particular, rli_size_unit_so_far might
4797 indicate the last complete byte, while rli_size_so_far
4798 indicates the total number of bits used. Therefore,
4799 rli_size_so_far, rather than rli_size_unit_so_far, is
4800 used to compute TYPE_SIZE_UNIT. */
4801 eoc = end_of_class (t, /*include_virtuals_p=*/0);
c8094d83 4802 TYPE_SIZE_UNIT (base_t)
8a874cb4 4803 = size_binop (MAX_EXPR,
6b99d1c0
MM
4804 convert (sizetype,
4805 size_binop (CEIL_DIV_EXPR,
4806 rli_size_so_far (rli),
4807 bitsize_int (BITS_PER_UNIT))),
4808 eoc);
c8094d83 4809 TYPE_SIZE (base_t)
8a874cb4
MM
4810 = size_binop (MAX_EXPR,
4811 rli_size_so_far (rli),
4812 size_binop (MULT_EXPR,
6b99d1c0 4813 convert (bitsizetype, eoc),
8a874cb4 4814 bitsize_int (BITS_PER_UNIT)));
58731fd1 4815 }
17bbb839
MM
4816 TYPE_ALIGN (base_t) = rli->record_align;
4817 TYPE_USER_ALIGN (base_t) = TYPE_USER_ALIGN (t);
4818
4819 /* Copy the fields from T. */
4820 next_field = &TYPE_FIELDS (base_t);
4821 for (field = TYPE_FIELDS (t); field; field = TREE_CHAIN (field))
4822 if (TREE_CODE (field) == FIELD_DECL)
4823 {
4824 *next_field = build_decl (FIELD_DECL,
c8094d83 4825 DECL_NAME (field),
17bbb839
MM
4826 TREE_TYPE (field));
4827 DECL_CONTEXT (*next_field) = base_t;
4828 DECL_FIELD_OFFSET (*next_field) = DECL_FIELD_OFFSET (field);
4829 DECL_FIELD_BIT_OFFSET (*next_field)
4830 = DECL_FIELD_BIT_OFFSET (field);
4f0a2b81
MM
4831 DECL_SIZE (*next_field) = DECL_SIZE (field);
4832 DECL_MODE (*next_field) = DECL_MODE (field);
17bbb839
MM
4833 next_field = &TREE_CHAIN (*next_field);
4834 }
4835
4836 /* Record the base version of the type. */
4837 CLASSTYPE_AS_BASE (t) = base_t;
5a5cccaa 4838 TYPE_CONTEXT (base_t) = t;
83b14b88 4839 }
1f84ec23 4840 else
17bbb839 4841 CLASSTYPE_AS_BASE (t) = t;
0b41abe6 4842
5ec1192e
MM
4843 /* Every empty class contains an empty class. */
4844 if (CLASSTYPE_EMPTY_P (t))
4845 CLASSTYPE_CONTAINS_EMPTY_CLASS_P (t) = 1;
4846
8d08fdba
MS
4847 /* Set the TYPE_DECL for this type to contain the right
4848 value for DECL_OFFSET, so that we can use it as part
4849 of a COMPONENT_REF for multiple inheritance. */
d2e5ee5c 4850 layout_decl (TYPE_MAIN_DECL (t), 0);
8d08fdba 4851
7177d104
MS
4852 /* Now fix up any virtual base class types that we left lying
4853 around. We must get these done before we try to lay out the
5c24fba6
MM
4854 virtual function table. As a side-effect, this will remove the
4855 base subobject fields. */
17bbb839
MM
4856 layout_virtual_bases (rli, empty_base_offsets);
4857
c8094d83 4858 /* Make sure that empty classes are reflected in RLI at this
17bbb839
MM
4859 point. */
4860 include_empty_classes(rli);
4861
4862 /* Make sure not to create any structures with zero size. */
58731fd1 4863 if (integer_zerop (rli_size_unit_so_far (rli)) && CLASSTYPE_EMPTY_P (t))
c8094d83 4864 place_field (rli,
17bbb839
MM
4865 build_decl (FIELD_DECL, NULL_TREE, char_type_node));
4866
4867 /* Let the back-end lay out the type. */
4868 finish_record_layout (rli, /*free_p=*/true);
9785e4b1 4869
17bbb839
MM
4870 /* Warn about bases that can't be talked about due to ambiguity. */
4871 warn_about_ambiguous_bases (t);
78b45a24 4872
00bfffa4
JM
4873 /* Now that we're done with layout, give the base fields the real types. */
4874 for (field = TYPE_FIELDS (t); field; field = TREE_CHAIN (field))
4875 if (DECL_ARTIFICIAL (field) && IS_FAKE_BASE_TYPE (TREE_TYPE (field)))
4876 TREE_TYPE (field) = TYPE_CONTEXT (TREE_TYPE (field));
4877
9785e4b1 4878 /* Clean up. */
c20118a8 4879 splay_tree_delete (empty_base_offsets);
c5a35c3c
MM
4880
4881 if (CLASSTYPE_EMPTY_P (t)
c0572427
MM
4882 && tree_int_cst_lt (sizeof_biggest_empty_class,
4883 TYPE_SIZE_UNIT (t)))
4884 sizeof_biggest_empty_class = TYPE_SIZE_UNIT (t);
2ef16140 4885}
c35cce41 4886
af287697
MM
4887/* Determine the "key method" for the class type indicated by TYPE,
4888 and set CLASSTYPE_KEY_METHOD accordingly. */
9aad8f83 4889
af287697
MM
4890void
4891determine_key_method (tree type)
9aad8f83
MA
4892{
4893 tree method;
4894
4895 if (TYPE_FOR_JAVA (type)
4896 || processing_template_decl
4897 || CLASSTYPE_TEMPLATE_INSTANTIATION (type)
4898 || CLASSTYPE_INTERFACE_KNOWN (type))
af287697 4899 return;
9aad8f83 4900
af287697
MM
4901 /* The key method is the first non-pure virtual function that is not
4902 inline at the point of class definition. On some targets the
4903 key function may not be inline; those targets should not call
4904 this function until the end of the translation unit. */
9aad8f83
MA
4905 for (method = TYPE_METHODS (type); method != NULL_TREE;
4906 method = TREE_CHAIN (method))
4907 if (DECL_VINDEX (method) != NULL_TREE
4908 && ! DECL_DECLARED_INLINE_P (method)
4909 && ! DECL_PURE_VIRTUAL_P (method))
af287697
MM
4910 {
4911 CLASSTYPE_KEY_METHOD (type) = method;
4912 break;
4913 }
9aad8f83 4914
af287697 4915 return;
9aad8f83
MA
4916}
4917
548502d3
MM
4918/* Perform processing required when the definition of T (a class type)
4919 is complete. */
2ef16140
MM
4920
4921void
94edc4ab 4922finish_struct_1 (tree t)
2ef16140
MM
4923{
4924 tree x;
00a17e31 4925 /* A TREE_LIST. The TREE_VALUE of each node is a FUNCTION_DECL. */
e6858a84 4926 tree virtuals = NULL_TREE;
2ef16140 4927 int n_fields = 0;
2ef16140 4928
d0f062fb 4929 if (COMPLETE_TYPE_P (t))
2ef16140 4930 {
8dc2b103 4931 gcc_assert (IS_AGGR_TYPE (t));
1f070f2b 4932 error ("redefinition of %q#T", t);
2ef16140
MM
4933 popclass ();
4934 return;
4935 }
4936
2ef16140
MM
4937 /* If this type was previously laid out as a forward reference,
4938 make sure we lay it out again. */
2ef16140 4939 TYPE_SIZE (t) = NULL_TREE;
911a71a7 4940 CLASSTYPE_PRIMARY_BINFO (t) = NULL_TREE;
2ef16140 4941
6d0a3f67 4942 fixup_inline_methods (t);
c8094d83 4943
5ec1192e
MM
4944 /* Make assumptions about the class; we'll reset the flags if
4945 necessary. */
58731fd1
MM
4946 CLASSTYPE_EMPTY_P (t) = 1;
4947 CLASSTYPE_NEARLY_EMPTY_P (t) = 1;
5ec1192e 4948 CLASSTYPE_CONTAINS_EMPTY_CLASS_P (t) = 0;
58731fd1 4949
2ef16140 4950 /* Do end-of-class semantic processing: checking the validity of the
03702748 4951 bases and members and add implicitly generated methods. */
58731fd1 4952 check_bases_and_members (t);
2ef16140 4953
f4f206f4 4954 /* Find the key method. */
a63996f1 4955 if (TYPE_CONTAINS_VPTR_P (t))
9aad8f83 4956 {
af287697
MM
4957 /* The Itanium C++ ABI permits the key method to be chosen when
4958 the class is defined -- even though the key method so
4959 selected may later turn out to be an inline function. On
4960 some systems (such as ARM Symbian OS) the key method cannot
4961 be determined until the end of the translation unit. On such
4962 systems, we leave CLASSTYPE_KEY_METHOD set to NULL, which
4963 will cause the class to be added to KEYED_CLASSES. Then, in
4964 finish_file we will determine the key method. */
4965 if (targetm.cxx.key_method_may_be_inline ())
4966 determine_key_method (t);
9aad8f83
MA
4967
4968 /* If a polymorphic class has no key method, we may emit the vtable
9bcb9aae 4969 in every translation unit where the class definition appears. */
9aad8f83
MA
4970 if (CLASSTYPE_KEY_METHOD (t) == NULL_TREE)
4971 keyed_classes = tree_cons (NULL_TREE, t, keyed_classes);
4972 }
4973
2ef16140 4974 /* Layout the class itself. */
e93ee644 4975 layout_class_type (t, &virtuals);
a0c68737
NS
4976 if (CLASSTYPE_AS_BASE (t) != t)
4977 /* We use the base type for trivial assignments, and hence it
4978 needs a mode. */
4979 compute_record_mode (CLASSTYPE_AS_BASE (t));
8ebeee52 4980
e93ee644 4981 virtuals = modify_all_vtables (t, nreverse (virtuals));
db5ae43f 4982
5e19c053 4983 /* If necessary, create the primary vtable for this class. */
e6858a84 4984 if (virtuals || TYPE_CONTAINS_VPTR_P (t))
8d08fdba 4985 {
8d08fdba 4986 /* We must enter these virtuals into the table. */
3ef397c1 4987 if (!CLASSTYPE_HAS_PRIMARY_BASE_P (t))
da3d4dfa 4988 build_primary_vtable (NULL_TREE, t);
dbbf88d1 4989 else if (! BINFO_NEW_VTABLE_MARKED (TYPE_BINFO (t)))
0533d788
MM
4990 /* Here we know enough to change the type of our virtual
4991 function table, but we will wait until later this function. */
28531dd0 4992 build_primary_vtable (CLASSTYPE_PRIMARY_BINFO (t), t);
8d08fdba
MS
4993 }
4994
bbd15aac 4995 if (TYPE_CONTAINS_VPTR_P (t))
8d08fdba 4996 {
e93ee644
MM
4997 int vindex;
4998 tree fn;
4999
604a3205 5000 if (BINFO_VTABLE (TYPE_BINFO (t)))
50bc768d 5001 gcc_assert (DECL_VIRTUAL_P (BINFO_VTABLE (TYPE_BINFO (t))));
1eb4bea9 5002 if (!CLASSTYPE_HAS_PRIMARY_BASE_P (t))
50bc768d 5003 gcc_assert (BINFO_VIRTUALS (TYPE_BINFO (t)) == NULL_TREE);
1eb4bea9 5004
e6858a84 5005 /* Add entries for virtual functions introduced by this class. */
604a3205
NS
5006 BINFO_VIRTUALS (TYPE_BINFO (t))
5007 = chainon (BINFO_VIRTUALS (TYPE_BINFO (t)), virtuals);
e93ee644
MM
5008
5009 /* Set DECL_VINDEX for all functions declared in this class. */
c8094d83
MS
5010 for (vindex = 0, fn = BINFO_VIRTUALS (TYPE_BINFO (t));
5011 fn;
5012 fn = TREE_CHAIN (fn),
e93ee644
MM
5013 vindex += (TARGET_VTABLE_USES_DESCRIPTORS
5014 ? TARGET_VTABLE_USES_DESCRIPTORS : 1))
4977bab6
ZW
5015 {
5016 tree fndecl = BV_FN (fn);
5017
5018 if (DECL_THUNK_P (fndecl))
5019 /* A thunk. We should never be calling this entry directly
5020 from this vtable -- we'd use the entry for the non
5021 thunk base function. */
5022 DECL_VINDEX (fndecl) = NULL_TREE;
5023 else if (TREE_CODE (DECL_VINDEX (fndecl)) != INTEGER_CST)
7d60be94 5024 DECL_VINDEX (fndecl) = build_int_cst (NULL_TREE, vindex);
4977bab6 5025 }
8d08fdba
MS
5026 }
5027
d2c5305b 5028 finish_struct_bits (t);
8d08fdba 5029
f30432d7
MS
5030 /* Complete the rtl for any static member objects of the type we're
5031 working on. */
58010b57 5032 for (x = TYPE_FIELDS (t); x; x = TREE_CHAIN (x))
19e7881c 5033 if (TREE_CODE (x) == VAR_DECL && TREE_STATIC (x)
c7f4981a 5034 && same_type_p (TYPE_MAIN_VARIANT (TREE_TYPE (x)), t))
19e7881c 5035 DECL_MODE (x) = TYPE_MODE (t);
8d08fdba 5036
f90cdf34 5037 /* Done with FIELDS...now decide whether to sort these for
58010b57 5038 faster lookups later.
f90cdf34 5039
6c73ad72 5040 We use a small number because most searches fail (succeeding
f90cdf34
MT
5041 ultimately as the search bores through the inheritance
5042 hierarchy), and we want this failure to occur quickly. */
5043
58010b57
MM
5044 n_fields = count_fields (TYPE_FIELDS (t));
5045 if (n_fields > 7)
f90cdf34 5046 {
99dd239f 5047 struct sorted_fields_type *field_vec = GGC_NEWVAR
0cbd7506
MS
5048 (struct sorted_fields_type,
5049 sizeof (struct sorted_fields_type) + n_fields * sizeof (tree));
d07605f5
AP
5050 field_vec->len = n_fields;
5051 add_fields_to_record_type (TYPE_FIELDS (t), field_vec, 0);
5052 qsort (field_vec->elts, n_fields, sizeof (tree),
17211ab5 5053 field_decl_cmp);
f90cdf34
MT
5054 if (! DECL_LANG_SPECIFIC (TYPE_MAIN_DECL (t)))
5055 retrofit_lang_decl (TYPE_MAIN_DECL (t));
5056 DECL_SORTED_FIELDS (TYPE_MAIN_DECL (t)) = field_vec;
5057 }
5058
8d7a5379
MM
5059 /* Make the rtl for any new vtables we have created, and unmark
5060 the base types we marked. */
5061 finish_vtbls (t);
c8094d83 5062
23656158
MM
5063 /* Build the VTT for T. */
5064 build_vtt (t);
8d7a5379 5065
f03e8526
MM
5066 /* This warning does not make sense for Java classes, since they
5067 cannot have destructors. */
5068 if (!TYPE_FOR_JAVA (t) && warn_nonvdtor && TYPE_POLYMORPHIC_P (t))
9fd8f60d 5069 {
9f4faeae
MM
5070 tree dtor;
5071
5072 dtor = CLASSTYPE_DESTRUCTORS (t);
5073 /* Warn only if the dtor is non-private or the class has
5074 friends. */
5075 if (/* An implicitly declared destructor is always public. And,
5076 if it were virtual, we would have created it by now. */
5077 !dtor
5078 || (!DECL_VINDEX (dtor)
c8094d83
MS
5079 && (!TREE_PRIVATE (dtor)
5080 || CLASSTYPE_FRIEND_CLASSES (t)
9f4faeae 5081 || DECL_FRIENDLIST (TYPE_MAIN_DECL (t)))))
c8094d83 5082 warning (0, "%q#T has virtual functions but non-virtual destructor",
9f4faeae 5083 t);
9fd8f60d 5084 }
8d08fdba 5085
0154eaa8 5086 complete_vars (t);
8d08fdba 5087
9e9ff709
MS
5088 if (warn_overloaded_virtual)
5089 warn_hidden (t);
8d08fdba 5090
43d9ad1d
DS
5091 /* Class layout, assignment of virtual table slots, etc., is now
5092 complete. Give the back end a chance to tweak the visibility of
5093 the class or perform any other required target modifications. */
5094 targetm.cxx.adjust_class_at_definition (t);
5095
ae673f14 5096 maybe_suppress_debug_info (t);
8d08fdba 5097
b7442fb5 5098 dump_class_hierarchy (t);
c8094d83 5099
d2e5ee5c 5100 /* Finish debugging output for this type. */
881c6935 5101 rest_of_type_compilation (t, ! LOCAL_CLASS_P (t));
8d08fdba 5102}
f30432d7 5103
61a127b3
MM
5104/* When T was built up, the member declarations were added in reverse
5105 order. Rearrange them to declaration order. */
5106
5107void
94edc4ab 5108unreverse_member_declarations (tree t)
61a127b3
MM
5109{
5110 tree next;
5111 tree prev;
5112 tree x;
5113
7088fca9
KL
5114 /* The following lists are all in reverse order. Put them in
5115 declaration order now. */
61a127b3 5116 TYPE_METHODS (t) = nreverse (TYPE_METHODS (t));
7088fca9 5117 CLASSTYPE_DECL_LIST (t) = nreverse (CLASSTYPE_DECL_LIST (t));
61a127b3
MM
5118
5119 /* Actually, for the TYPE_FIELDS, only the non TYPE_DECLs are in
5120 reverse order, so we can't just use nreverse. */
5121 prev = NULL_TREE;
c8094d83
MS
5122 for (x = TYPE_FIELDS (t);
5123 x && TREE_CODE (x) != TYPE_DECL;
61a127b3
MM
5124 x = next)
5125 {
5126 next = TREE_CHAIN (x);
5127 TREE_CHAIN (x) = prev;
5128 prev = x;
5129 }
5130 if (prev)
5131 {
5132 TREE_CHAIN (TYPE_FIELDS (t)) = x;
5133 if (prev)
5134 TYPE_FIELDS (t) = prev;
5135 }
5136}
5137
f30432d7 5138tree
94edc4ab 5139finish_struct (tree t, tree attributes)
f30432d7 5140{
82a98427 5141 location_t saved_loc = input_location;
1f0d71c5 5142
61a127b3
MM
5143 /* Now that we've got all the field declarations, reverse everything
5144 as necessary. */
5145 unreverse_member_declarations (t);
f30432d7 5146
91d231cb 5147 cplus_decl_attributes (&t, attributes, (int) ATTR_FLAG_TYPE_IN_PLACE);
6467930b 5148
1f0d71c5
NS
5149 /* Nadger the current location so that diagnostics point to the start of
5150 the struct, not the end. */
f31686a3 5151 input_location = DECL_SOURCE_LOCATION (TYPE_NAME (t));
1f0d71c5 5152
5566b478 5153 if (processing_template_decl)
f30432d7 5154 {
7fb213d8
GB
5155 tree x;
5156
b0e0b31f 5157 finish_struct_methods (t);
867580ce 5158 TYPE_SIZE (t) = bitsize_zero_node;
ae54ec16 5159 TYPE_SIZE_UNIT (t) = size_zero_node;
7fb213d8
GB
5160
5161 /* We need to emit an error message if this type was used as a parameter
5162 and it is an abstract type, even if it is a template. We construct
5163 a simple CLASSTYPE_PURE_VIRTUALS list without taking bases into
5164 account and we call complete_vars with this type, which will check
5165 the PARM_DECLS. Note that while the type is being defined,
5166 CLASSTYPE_PURE_VIRTUALS contains the list of the inline friends
5167 (see CLASSTYPE_INLINE_FRIENDS) so we need to clear it. */
585b44d3 5168 CLASSTYPE_PURE_VIRTUALS (t) = NULL;
7fb213d8
GB
5169 for (x = TYPE_METHODS (t); x; x = TREE_CHAIN (x))
5170 if (DECL_PURE_VIRTUAL_P (x))
d4e6fecb 5171 VEC_safe_push (tree, gc, CLASSTYPE_PURE_VIRTUALS (t), x);
7fb213d8 5172 complete_vars (t);
6f1b4c42 5173 }
f30432d7 5174 else
9f33663b 5175 finish_struct_1 (t);
5566b478 5176
82a98427 5177 input_location = saved_loc;
1f0d71c5 5178
5566b478 5179 TYPE_BEING_DEFINED (t) = 0;
8f032717 5180
5566b478 5181 if (current_class_type)
b74a0560 5182 popclass ();
5566b478 5183 else
357351e5 5184 error ("trying to finish struct, but kicked out due to previous parse errors");
5566b478 5185
5f261ba9
MM
5186 if (processing_template_decl && at_function_scope_p ())
5187 add_stmt (build_min (TAG_DEFN, t));
ae673f14 5188
5566b478 5189 return t;
f30432d7 5190}
8d08fdba 5191\f
51ddb82e 5192/* Return the dynamic type of INSTANCE, if known.
8d08fdba
MS
5193 Used to determine whether the virtual function table is needed
5194 or not.
5195
5196 *NONNULL is set iff INSTANCE can be known to be nonnull, regardless
97d953bb
MM
5197 of our knowledge of its type. *NONNULL should be initialized
5198 before this function is called. */
e92cc029 5199
d8e178a0 5200static tree
94edc4ab 5201fixed_type_or_null (tree instance, int* nonnull, int* cdtorp)
8d08fdba
MS
5202{
5203 switch (TREE_CODE (instance))
5204 {
5205 case INDIRECT_REF:
608afcc5 5206 if (POINTER_TYPE_P (TREE_TYPE (instance)))
a0de9d20
JM
5207 return NULL_TREE;
5208 else
5209 return fixed_type_or_null (TREE_OPERAND (instance, 0),
5210 nonnull, cdtorp);
5211
8d08fdba
MS
5212 case CALL_EXPR:
5213 /* This is a call to a constructor, hence it's never zero. */
5214 if (TREE_HAS_CONSTRUCTOR (instance))
5215 {
5216 if (nonnull)
5217 *nonnull = 1;
51ddb82e 5218 return TREE_TYPE (instance);
8d08fdba 5219 }
51ddb82e 5220 return NULL_TREE;
8d08fdba
MS
5221
5222 case SAVE_EXPR:
5223 /* This is a call to a constructor, hence it's never zero. */
5224 if (TREE_HAS_CONSTRUCTOR (instance))
5225 {
5226 if (nonnull)
5227 *nonnull = 1;
51ddb82e 5228 return TREE_TYPE (instance);
8d08fdba 5229 }
394fd776 5230 return fixed_type_or_null (TREE_OPERAND (instance, 0), nonnull, cdtorp);
8d08fdba 5231
8d08fdba
MS
5232 case PLUS_EXPR:
5233 case MINUS_EXPR:
394fd776
NS
5234 if (TREE_CODE (TREE_OPERAND (instance, 0)) == ADDR_EXPR)
5235 return fixed_type_or_null (TREE_OPERAND (instance, 0), nonnull, cdtorp);
8d08fdba
MS
5236 if (TREE_CODE (TREE_OPERAND (instance, 1)) == INTEGER_CST)
5237 /* Propagate nonnull. */
f63ab951 5238 return fixed_type_or_null (TREE_OPERAND (instance, 0), nonnull, cdtorp);
51ddb82e 5239 return NULL_TREE;
8d08fdba
MS
5240
5241 case NOP_EXPR:
5242 case CONVERT_EXPR:
394fd776 5243 return fixed_type_or_null (TREE_OPERAND (instance, 0), nonnull, cdtorp);
8d08fdba
MS
5244
5245 case ADDR_EXPR:
88f19756 5246 instance = TREE_OPERAND (instance, 0);
8d08fdba 5247 if (nonnull)
88f19756
RH
5248 {
5249 /* Just because we see an ADDR_EXPR doesn't mean we're dealing
5250 with a real object -- given &p->f, p can still be null. */
5251 tree t = get_base_address (instance);
5252 /* ??? Probably should check DECL_WEAK here. */
5253 if (t && DECL_P (t))
5254 *nonnull = 1;
5255 }
5256 return fixed_type_or_null (instance, nonnull, cdtorp);
8d08fdba
MS
5257
5258 case COMPONENT_REF:
642124c6
RH
5259 /* If this component is really a base class reference, then the field
5260 itself isn't definitive. */
5261 if (DECL_FIELD_IS_BASE (TREE_OPERAND (instance, 1)))
0cbd7506 5262 return fixed_type_or_null (TREE_OPERAND (instance, 0), nonnull, cdtorp);
394fd776 5263 return fixed_type_or_null (TREE_OPERAND (instance, 1), nonnull, cdtorp);
8d08fdba 5264
8d08fdba
MS
5265 case VAR_DECL:
5266 case FIELD_DECL:
5267 if (TREE_CODE (TREE_TYPE (instance)) == ARRAY_TYPE
5268 && IS_AGGR_TYPE (TREE_TYPE (TREE_TYPE (instance))))
5269 {
5270 if (nonnull)
5271 *nonnull = 1;
51ddb82e 5272 return TREE_TYPE (TREE_TYPE (instance));
8d08fdba 5273 }
e92cc029 5274 /* fall through... */
8d08fdba
MS
5275 case TARGET_EXPR:
5276 case PARM_DECL:
f63ab951 5277 case RESULT_DECL:
8d08fdba
MS
5278 if (IS_AGGR_TYPE (TREE_TYPE (instance)))
5279 {
5280 if (nonnull)
5281 *nonnull = 1;
51ddb82e 5282 return TREE_TYPE (instance);
8d08fdba 5283 }
394fd776 5284 else if (instance == current_class_ptr)
0cbd7506
MS
5285 {
5286 if (nonnull)
5287 *nonnull = 1;
5288
5289 /* if we're in a ctor or dtor, we know our type. */
5290 if (DECL_LANG_SPECIFIC (current_function_decl)
5291 && (DECL_CONSTRUCTOR_P (current_function_decl)
5292 || DECL_DESTRUCTOR_P (current_function_decl)))
5293 {
5294 if (cdtorp)
5295 *cdtorp = 1;
5296 return TREE_TYPE (TREE_TYPE (instance));
5297 }
5298 }
394fd776 5299 else if (TREE_CODE (TREE_TYPE (instance)) == REFERENCE_TYPE)
0cbd7506
MS
5300 {
5301 /* Reference variables should be references to objects. */
5302 if (nonnull)
8d08fdba 5303 *nonnull = 1;
c8094d83 5304
772f8889
MM
5305 /* DECL_VAR_MARKED_P is used to prevent recursion; a
5306 variable's initializer may refer to the variable
5307 itself. */
c8094d83 5308 if (TREE_CODE (instance) == VAR_DECL
772f8889
MM
5309 && DECL_INITIAL (instance)
5310 && !DECL_VAR_MARKED_P (instance))
5311 {
5312 tree type;
5313 DECL_VAR_MARKED_P (instance) = 1;
5314 type = fixed_type_or_null (DECL_INITIAL (instance),
5315 nonnull, cdtorp);
5316 DECL_VAR_MARKED_P (instance) = 0;
5317 return type;
5318 }
8d08fdba 5319 }
51ddb82e 5320 return NULL_TREE;
8d08fdba
MS
5321
5322 default:
51ddb82e 5323 return NULL_TREE;
8d08fdba
MS
5324 }
5325}
51ddb82e 5326
838dfd8a 5327/* Return nonzero if the dynamic type of INSTANCE is known, and
338d90b8
NS
5328 equivalent to the static type. We also handle the case where
5329 INSTANCE is really a pointer. Return negative if this is a
5330 ctor/dtor. There the dynamic type is known, but this might not be
5331 the most derived base of the original object, and hence virtual
5332 bases may not be layed out according to this type.
51ddb82e
JM
5333
5334 Used to determine whether the virtual function table is needed
5335 or not.
5336
5337 *NONNULL is set iff INSTANCE can be known to be nonnull, regardless
97d953bb
MM
5338 of our knowledge of its type. *NONNULL should be initialized
5339 before this function is called. */
51ddb82e
JM
5340
5341int
94edc4ab 5342resolves_to_fixed_type_p (tree instance, int* nonnull)
51ddb82e
JM
5343{
5344 tree t = TREE_TYPE (instance);
394fd776 5345 int cdtorp = 0;
c8094d83 5346
394fd776 5347 tree fixed = fixed_type_or_null (instance, nonnull, &cdtorp);
51ddb82e
JM
5348 if (fixed == NULL_TREE)
5349 return 0;
5350 if (POINTER_TYPE_P (t))
5351 t = TREE_TYPE (t);
394fd776
NS
5352 if (!same_type_ignoring_top_level_qualifiers_p (t, fixed))
5353 return 0;
5354 return cdtorp ? -1 : 1;
51ddb82e
JM
5355}
5356
8d08fdba
MS
5357\f
5358void
94edc4ab 5359init_class_processing (void)
8d08fdba
MS
5360{
5361 current_class_depth = 0;
61a127b3 5362 current_class_stack_size = 10;
c8094d83 5363 current_class_stack
0ac1b889 5364 = XNEWVEC (struct class_stack_node, current_class_stack_size);
806aa901 5365 local_classes = VEC_alloc (tree, gc, 8);
c5a35c3c 5366 sizeof_biggest_empty_class = size_zero_node;
8d08fdba 5367
0e5921e8
ZW
5368 ridpointers[(int) RID_PUBLIC] = access_public_node;
5369 ridpointers[(int) RID_PRIVATE] = access_private_node;
5370 ridpointers[(int) RID_PROTECTED] = access_protected_node;
8d08fdba
MS
5371}
5372
39fb05d0
MM
5373/* Restore the cached PREVIOUS_CLASS_LEVEL. */
5374
5375static void
5376restore_class_cache (void)
5377{
39fb05d0 5378 tree type;
39fb05d0
MM
5379
5380 /* We are re-entering the same class we just left, so we don't
5381 have to search the whole inheritance matrix to find all the
5382 decls to bind again. Instead, we install the cached
5383 class_shadowed list and walk through it binding names. */
5384 push_binding_level (previous_class_level);
5385 class_binding_level = previous_class_level;
39fb05d0 5386 /* Restore IDENTIFIER_TYPE_VALUE. */
c8094d83
MS
5387 for (type = class_binding_level->type_shadowed;
5388 type;
39fb05d0
MM
5389 type = TREE_CHAIN (type))
5390 SET_IDENTIFIER_TYPE_VALUE (TREE_PURPOSE (type), TREE_TYPE (type));
5391}
5392
a723baf1
MM
5393/* Set global variables CURRENT_CLASS_NAME and CURRENT_CLASS_TYPE as
5394 appropriate for TYPE.
8d08fdba 5395
8d08fdba
MS
5396 So that we may avoid calls to lookup_name, we cache the _TYPE
5397 nodes of local TYPE_DECLs in the TREE_TYPE field of the name.
5398
5399 For multiple inheritance, we perform a two-pass depth-first search
39fb05d0 5400 of the type lattice. */
8d08fdba
MS
5401
5402void
29370796 5403pushclass (tree type)
8d08fdba 5404{
c888c93b
MM
5405 class_stack_node_t csn;
5406
7fb4a8f7 5407 type = TYPE_MAIN_VARIANT (type);
8d08fdba 5408
61a127b3 5409 /* Make sure there is enough room for the new entry on the stack. */
c8094d83 5410 if (current_class_depth + 1 >= current_class_stack_size)
8d08fdba 5411 {
61a127b3
MM
5412 current_class_stack_size *= 2;
5413 current_class_stack
7767580e
GDR
5414 = XRESIZEVEC (struct class_stack_node, current_class_stack,
5415 current_class_stack_size);
8d08fdba
MS
5416 }
5417
61a127b3 5418 /* Insert a new entry on the class stack. */
c888c93b
MM
5419 csn = current_class_stack + current_class_depth;
5420 csn->name = current_class_name;
5421 csn->type = current_class_type;
5422 csn->access = current_access_specifier;
5423 csn->names_used = 0;
5424 csn->hidden = 0;
61a127b3
MM
5425 current_class_depth++;
5426
5427 /* Now set up the new type. */
8d08fdba
MS
5428 current_class_name = TYPE_NAME (type);
5429 if (TREE_CODE (current_class_name) == TYPE_DECL)
5430 current_class_name = DECL_NAME (current_class_name);
5431 current_class_type = type;
5432
61a127b3
MM
5433 /* By default, things in classes are private, while things in
5434 structures or unions are public. */
c8094d83
MS
5435 current_access_specifier = (CLASSTYPE_DECLARED_CLASS (type)
5436 ? access_private_node
61a127b3
MM
5437 : access_public_node);
5438
89b578be
MM
5439 if (previous_class_level
5440 && type != previous_class_level->this_entity
8d08fdba
MS
5441 && current_class_depth == 1)
5442 {
5443 /* Forcibly remove any old class remnants. */
8f032717 5444 invalidate_class_lookup_cache ();
8d08fdba
MS
5445 }
5446
c8094d83 5447 if (!previous_class_level
89b578be
MM
5448 || type != previous_class_level->this_entity
5449 || current_class_depth > 1)
90ea9897 5450 pushlevel_class ();
29370796 5451 else
39fb05d0 5452 restore_class_cache ();
8f032717
MM
5453}
5454
39fb05d0
MM
5455/* When we exit a toplevel class scope, we save its binding level so
5456 that we can restore it quickly. Here, we've entered some other
5457 class, so we must invalidate our cache. */
8d08fdba 5458
8f032717 5459void
94edc4ab 5460invalidate_class_lookup_cache (void)
8f032717 5461{
89b578be 5462 previous_class_level = NULL;
8d08fdba 5463}
c8094d83 5464
8d08fdba 5465/* Get out of the current class scope. If we were in a class scope
b74a0560 5466 previously, that is the one popped to. */
e92cc029 5467
8d08fdba 5468void
94edc4ab 5469popclass (void)
8d08fdba 5470{
273a708f 5471 poplevel_class ();
8d08fdba
MS
5472
5473 current_class_depth--;
61a127b3
MM
5474 current_class_name = current_class_stack[current_class_depth].name;
5475 current_class_type = current_class_stack[current_class_depth].type;
5476 current_access_specifier = current_class_stack[current_class_depth].access;
8f032717
MM
5477 if (current_class_stack[current_class_depth].names_used)
5478 splay_tree_delete (current_class_stack[current_class_depth].names_used);
8d08fdba
MS
5479}
5480
c888c93b
MM
5481/* Mark the top of the class stack as hidden. */
5482
5483void
5484push_class_stack (void)
5485{
5486 if (current_class_depth)
5487 ++current_class_stack[current_class_depth - 1].hidden;
5488}
5489
5490/* Mark the top of the class stack as un-hidden. */
5491
5492void
5493pop_class_stack (void)
5494{
5495 if (current_class_depth)
5496 --current_class_stack[current_class_depth - 1].hidden;
5497}
5498
70adf8a9
JM
5499/* Returns 1 if current_class_type is either T or a nested type of T.
5500 We start looking from 1 because entry 0 is from global scope, and has
5501 no type. */
b9082e8a
JM
5502
5503int
94edc4ab 5504currently_open_class (tree t)
b9082e8a
JM
5505{
5506 int i;
14d22dd6 5507 if (current_class_type && same_type_p (t, current_class_type))
b9082e8a 5508 return 1;
c888c93b
MM
5509 for (i = current_class_depth - 1; i > 0; --i)
5510 {
5511 if (current_class_stack[i].hidden)
5512 break;
5513 if (current_class_stack[i].type
5514 && same_type_p (current_class_stack [i].type, t))
5515 return 1;
5516 }
b9082e8a
JM
5517 return 0;
5518}
5519
70adf8a9
JM
5520/* If either current_class_type or one of its enclosing classes are derived
5521 from T, return the appropriate type. Used to determine how we found
5522 something via unqualified lookup. */
5523
5524tree
94edc4ab 5525currently_open_derived_class (tree t)
70adf8a9
JM
5526{
5527 int i;
5528
9bcb9aae 5529 /* The bases of a dependent type are unknown. */
1fb3244a
MM
5530 if (dependent_type_p (t))
5531 return NULL_TREE;
5532
c44e68a5
KL
5533 if (!current_class_type)
5534 return NULL_TREE;
5535
70adf8a9
JM
5536 if (DERIVED_FROM_P (t, current_class_type))
5537 return current_class_type;
5538
5539 for (i = current_class_depth - 1; i > 0; --i)
c888c93b
MM
5540 {
5541 if (current_class_stack[i].hidden)
5542 break;
5543 if (DERIVED_FROM_P (t, current_class_stack[i].type))
5544 return current_class_stack[i].type;
5545 }
70adf8a9
JM
5546
5547 return NULL_TREE;
5548}
5549
8d08fdba 5550/* When entering a class scope, all enclosing class scopes' names with
14d22dd6
MM
5551 static meaning (static variables, static functions, types and
5552 enumerators) have to be visible. This recursive function calls
5553 pushclass for all enclosing class contexts until global or a local
5554 scope is reached. TYPE is the enclosed class. */
8d08fdba
MS
5555
5556void
14d22dd6 5557push_nested_class (tree type)
8d08fdba 5558{
a28e3c7f
MS
5559 tree context;
5560
b262d64c 5561 /* A namespace might be passed in error cases, like A::B:C. */
c8094d83
MS
5562 if (type == NULL_TREE
5563 || type == error_mark_node
b262d64c 5564 || TREE_CODE (type) == NAMESPACE_DECL
07c88314 5565 || ! IS_AGGR_TYPE (type)
73b0fce8 5566 || TREE_CODE (type) == TEMPLATE_TYPE_PARM
a1281f45 5567 || TREE_CODE (type) == BOUND_TEMPLATE_TEMPLATE_PARM)
a28e3c7f 5568 return;
c8094d83 5569
d2e5ee5c 5570 context = DECL_CONTEXT (TYPE_MAIN_DECL (type));
8d08fdba 5571
6b400b21 5572 if (context && CLASS_TYPE_P (context))
14d22dd6 5573 push_nested_class (context);
29370796 5574 pushclass (type);
8d08fdba
MS
5575}
5576
a723baf1 5577/* Undoes a push_nested_class call. */
8d08fdba
MS
5578
5579void
94edc4ab 5580pop_nested_class (void)
8d08fdba 5581{
d2e5ee5c 5582 tree context = DECL_CONTEXT (TYPE_MAIN_DECL (current_class_type));
8d08fdba 5583
b74a0560 5584 popclass ();
6b400b21 5585 if (context && CLASS_TYPE_P (context))
b74a0560 5586 pop_nested_class ();
8d08fdba
MS
5587}
5588
46ccf50a
JM
5589/* Returns the number of extern "LANG" blocks we are nested within. */
5590
5591int
94edc4ab 5592current_lang_depth (void)
46ccf50a 5593{
aff44741 5594 return VEC_length (tree, current_lang_base);
46ccf50a
JM
5595}
5596
8d08fdba
MS
5597/* Set global variables CURRENT_LANG_NAME to appropriate value
5598 so that behavior of name-mangling machinery is correct. */
5599
5600void
94edc4ab 5601push_lang_context (tree name)
8d08fdba 5602{
aff44741 5603 VEC_safe_push (tree, gc, current_lang_base, current_lang_name);
8d08fdba 5604
e229f2cd 5605 if (name == lang_name_cplusplus)
8d08fdba 5606 {
8d08fdba
MS
5607 current_lang_name = name;
5608 }
e229f2cd
PB
5609 else if (name == lang_name_java)
5610 {
e229f2cd
PB
5611 current_lang_name = name;
5612 /* DECL_IGNORED_P is initially set for these types, to avoid clutter.
5613 (See record_builtin_java_type in decl.c.) However, that causes
5614 incorrect debug entries if these types are actually used.
00a17e31 5615 So we re-enable debug output after extern "Java". */
e3cd9945
APB
5616 DECL_IGNORED_P (TYPE_NAME (java_byte_type_node)) = 0;
5617 DECL_IGNORED_P (TYPE_NAME (java_short_type_node)) = 0;
5618 DECL_IGNORED_P (TYPE_NAME (java_int_type_node)) = 0;
5619 DECL_IGNORED_P (TYPE_NAME (java_long_type_node)) = 0;
5620 DECL_IGNORED_P (TYPE_NAME (java_float_type_node)) = 0;
5621 DECL_IGNORED_P (TYPE_NAME (java_double_type_node)) = 0;
5622 DECL_IGNORED_P (TYPE_NAME (java_char_type_node)) = 0;
5623 DECL_IGNORED_P (TYPE_NAME (java_boolean_type_node)) = 0;
e229f2cd 5624 }
8d08fdba
MS
5625 else if (name == lang_name_c)
5626 {
8d08fdba
MS
5627 current_lang_name = name;
5628 }
5629 else
9e637a26 5630 error ("language string %<\"%E\"%> not recognized", name);
8d08fdba 5631}
c8094d83 5632
8d08fdba 5633/* Get out of the current language scope. */
e92cc029 5634
8d08fdba 5635void
94edc4ab 5636pop_lang_context (void)
8d08fdba 5637{
aff44741 5638 current_lang_name = VEC_pop (tree, current_lang_base);
8d08fdba 5639}
8d08fdba
MS
5640\f
5641/* Type instantiation routines. */
5642
104bf76a
MM
5643/* Given an OVERLOAD and a TARGET_TYPE, return the function that
5644 matches the TARGET_TYPE. If there is no satisfactory match, return
13a44ee0 5645 error_mark_node, and issue an error & warning messages under control
92af500d
NS
5646 of FLAGS. Permit pointers to member function if FLAGS permits. If
5647 TEMPLATE_ONLY, the name of the overloaded function was a
5648 template-id, and EXPLICIT_TARGS are the explicitly provided
104bf76a
MM
5649 template arguments. */
5650
2c73f9f5 5651static tree
c8094d83 5652resolve_address_of_overloaded_function (tree target_type,
94edc4ab 5653 tree overload,
92af500d
NS
5654 tsubst_flags_t flags,
5655 bool template_only,
94edc4ab 5656 tree explicit_targs)
2c73f9f5 5657{
104bf76a 5658 /* Here's what the standard says:
c8094d83 5659
104bf76a
MM
5660 [over.over]
5661
5662 If the name is a function template, template argument deduction
5663 is done, and if the argument deduction succeeds, the deduced
5664 arguments are used to generate a single template function, which
5665 is added to the set of overloaded functions considered.
5666
5667 Non-member functions and static member functions match targets of
5668 type "pointer-to-function" or "reference-to-function." Nonstatic
5669 member functions match targets of type "pointer-to-member
5670 function;" the function type of the pointer to member is used to
5671 select the member function from the set of overloaded member
5672 functions. If a nonstatic member function is selected, the
5673 reference to the overloaded function name is required to have the
5674 form of a pointer to member as described in 5.3.1.
5675
5676 If more than one function is selected, any template functions in
5677 the set are eliminated if the set also contains a non-template
5678 function, and any given template function is eliminated if the
5679 set contains a second template function that is more specialized
5680 than the first according to the partial ordering rules 14.5.5.2.
5681 After such eliminations, if any, there shall remain exactly one
5682 selected function. */
5683
5684 int is_ptrmem = 0;
5685 int is_reference = 0;
5686 /* We store the matches in a TREE_LIST rooted here. The functions
5687 are the TREE_PURPOSE, not the TREE_VALUE, in this list, for easy
5688 interoperability with most_specialized_instantiation. */
5689 tree matches = NULL_TREE;
50714e79 5690 tree fn;
104bf76a 5691
d8f8dca1
MM
5692 /* By the time we get here, we should be seeing only real
5693 pointer-to-member types, not the internal POINTER_TYPE to
5694 METHOD_TYPE representation. */
50bc768d
NS
5695 gcc_assert (TREE_CODE (target_type) != POINTER_TYPE
5696 || TREE_CODE (TREE_TYPE (target_type)) != METHOD_TYPE);
104bf76a 5697
50bc768d 5698 gcc_assert (is_overloaded_fn (overload));
c8094d83 5699
104bf76a
MM
5700 /* Check that the TARGET_TYPE is reasonable. */
5701 if (TYPE_PTRFN_P (target_type))
381ddaa6 5702 /* This is OK. */;
104bf76a
MM
5703 else if (TYPE_PTRMEMFUNC_P (target_type))
5704 /* This is OK, too. */
5705 is_ptrmem = 1;
5706 else if (TREE_CODE (target_type) == FUNCTION_TYPE)
5707 {
5708 /* This is OK, too. This comes from a conversion to reference
5709 type. */
5710 target_type = build_reference_type (target_type);
5711 is_reference = 1;
5712 }
c8094d83 5713 else
104bf76a 5714 {
92af500d 5715 if (flags & tf_error)
c4f73174 5716 error ("cannot resolve overloaded function %qD based on"
0cbd7506
MS
5717 " conversion to type %qT",
5718 DECL_NAME (OVL_FUNCTION (overload)), target_type);
104bf76a
MM
5719 return error_mark_node;
5720 }
c8094d83 5721
104bf76a
MM
5722 /* If we can find a non-template function that matches, we can just
5723 use it. There's no point in generating template instantiations
5724 if we're just going to throw them out anyhow. But, of course, we
5725 can only do this when we don't *need* a template function. */
5726 if (!template_only)
5727 {
5728 tree fns;
5729
a723baf1 5730 for (fns = overload; fns; fns = OVL_NEXT (fns))
104bf76a 5731 {
a723baf1 5732 tree fn = OVL_CURRENT (fns);
104bf76a 5733 tree fntype;
2c73f9f5 5734
104bf76a
MM
5735 if (TREE_CODE (fn) == TEMPLATE_DECL)
5736 /* We're not looking for templates just yet. */
5737 continue;
5738
5739 if ((TREE_CODE (TREE_TYPE (fn)) == METHOD_TYPE)
5740 != is_ptrmem)
5741 /* We're looking for a non-static member, and this isn't
5742 one, or vice versa. */
5743 continue;
34ff2673 5744
d63d5d0c
ILT
5745 /* Ignore functions which haven't been explicitly
5746 declared. */
34ff2673
RS
5747 if (DECL_ANTICIPATED (fn))
5748 continue;
5749
104bf76a
MM
5750 /* See if there's a match. */
5751 fntype = TREE_TYPE (fn);
5752 if (is_ptrmem)
5753 fntype = build_ptrmemfunc_type (build_pointer_type (fntype));
5754 else if (!is_reference)
5755 fntype = build_pointer_type (fntype);
5756
30f86ec3 5757 if (can_convert_arg (target_type, fntype, fn, LOOKUP_NORMAL))
e1b3e07d 5758 matches = tree_cons (fn, NULL_TREE, matches);
104bf76a
MM
5759 }
5760 }
5761
5762 /* Now, if we've already got a match (or matches), there's no need
5763 to proceed to the template functions. But, if we don't have a
5764 match we need to look at them, too. */
c8094d83 5765 if (!matches)
2c73f9f5 5766 {
104bf76a
MM
5767 tree target_fn_type;
5768 tree target_arg_types;
8d3631f8 5769 tree target_ret_type;
104bf76a
MM
5770 tree fns;
5771
5772 if (is_ptrmem)
4393e105
MM
5773 target_fn_type
5774 = TREE_TYPE (TYPE_PTRMEMFUNC_FN_TYPE (target_type));
2c73f9f5 5775 else
4393e105
MM
5776 target_fn_type = TREE_TYPE (target_type);
5777 target_arg_types = TYPE_ARG_TYPES (target_fn_type);
8d3631f8 5778 target_ret_type = TREE_TYPE (target_fn_type);
e5214479
JM
5779
5780 /* Never do unification on the 'this' parameter. */
5781 if (TREE_CODE (target_fn_type) == METHOD_TYPE)
5782 target_arg_types = TREE_CHAIN (target_arg_types);
c8094d83 5783
a723baf1 5784 for (fns = overload; fns; fns = OVL_NEXT (fns))
104bf76a 5785 {
a723baf1 5786 tree fn = OVL_CURRENT (fns);
104bf76a
MM
5787 tree instantiation;
5788 tree instantiation_type;
5789 tree targs;
5790
5791 if (TREE_CODE (fn) != TEMPLATE_DECL)
5792 /* We're only looking for templates. */
5793 continue;
5794
5795 if ((TREE_CODE (TREE_TYPE (fn)) == METHOD_TYPE)
5796 != is_ptrmem)
4393e105 5797 /* We're not looking for a non-static member, and this is
104bf76a
MM
5798 one, or vice versa. */
5799 continue;
5800
104bf76a 5801 /* Try to do argument deduction. */
f31c0a32 5802 targs = make_tree_vec (DECL_NTPARMS (fn));
4393e105 5803 if (fn_type_unification (fn, explicit_targs, targs,
8d3631f8 5804 target_arg_types, target_ret_type,
30f86ec3 5805 DEDUCE_EXACT, LOOKUP_NORMAL))
104bf76a
MM
5806 /* Argument deduction failed. */
5807 continue;
5808
5809 /* Instantiate the template. */
92af500d 5810 instantiation = instantiate_template (fn, targs, flags);
104bf76a
MM
5811 if (instantiation == error_mark_node)
5812 /* Instantiation failed. */
5813 continue;
5814
5815 /* See if there's a match. */
5816 instantiation_type = TREE_TYPE (instantiation);
5817 if (is_ptrmem)
c8094d83 5818 instantiation_type =
104bf76a
MM
5819 build_ptrmemfunc_type (build_pointer_type (instantiation_type));
5820 else if (!is_reference)
5821 instantiation_type = build_pointer_type (instantiation_type);
30f86ec3
FJ
5822 if (can_convert_arg (target_type, instantiation_type, instantiation,
5823 LOOKUP_NORMAL))
e1b3e07d 5824 matches = tree_cons (instantiation, fn, matches);
104bf76a
MM
5825 }
5826
5827 /* Now, remove all but the most specialized of the matches. */
5828 if (matches)
5829 {
e5214479 5830 tree match = most_specialized_instantiation (matches);
104bf76a
MM
5831
5832 if (match != error_mark_node)
7ca383e6
MM
5833 matches = tree_cons (TREE_PURPOSE (match),
5834 NULL_TREE,
5835 NULL_TREE);
104bf76a
MM
5836 }
5837 }
5838
5839 /* Now we should have exactly one function in MATCHES. */
5840 if (matches == NULL_TREE)
5841 {
5842 /* There were *no* matches. */
92af500d 5843 if (flags & tf_error)
104bf76a 5844 {
0cbd7506
MS
5845 error ("no matches converting function %qD to type %q#T",
5846 DECL_NAME (OVL_FUNCTION (overload)),
5847 target_type);
6b9b6b15
JM
5848
5849 /* print_candidates expects a chain with the functions in
0cbd7506
MS
5850 TREE_VALUE slots, so we cons one up here (we're losing anyway,
5851 so why be clever?). */
5852 for (; overload; overload = OVL_NEXT (overload))
5853 matches = tree_cons (NULL_TREE, OVL_CURRENT (overload),
e1b3e07d 5854 matches);
c8094d83 5855
6b9b6b15 5856 print_candidates (matches);
104bf76a
MM
5857 }
5858 return error_mark_node;
2c73f9f5 5859 }
104bf76a
MM
5860 else if (TREE_CHAIN (matches))
5861 {
5862 /* There were too many matches. */
5863
92af500d 5864 if (flags & tf_error)
104bf76a
MM
5865 {
5866 tree match;
5867
0cbd7506 5868 error ("converting overloaded function %qD to type %q#T is ambiguous",
104bf76a
MM
5869 DECL_NAME (OVL_FUNCTION (overload)),
5870 target_type);
5871
5872 /* Since print_candidates expects the functions in the
5873 TREE_VALUE slot, we flip them here. */
5874 for (match = matches; match; match = TREE_CHAIN (match))
5875 TREE_VALUE (match) = TREE_PURPOSE (match);
5876
5877 print_candidates (matches);
5878 }
c8094d83 5879
104bf76a
MM
5880 return error_mark_node;
5881 }
5882
50714e79
MM
5883 /* Good, exactly one match. Now, convert it to the correct type. */
5884 fn = TREE_PURPOSE (matches);
5885
b1ce3eb2 5886 if (DECL_NONSTATIC_MEMBER_FUNCTION_P (fn)
92af500d 5887 && !(flags & tf_ptrmem_ok) && !flag_ms_extensions)
19420d00 5888 {
b1ce3eb2 5889 static int explained;
c8094d83 5890
92af500d 5891 if (!(flags & tf_error))
0cbd7506 5892 return error_mark_node;
19420d00 5893
1f070f2b 5894 pedwarn ("assuming pointer to member %qD", fn);
b1ce3eb2 5895 if (!explained)
0cbd7506
MS
5896 {
5897 pedwarn ("(a pointer to member can only be formed with %<&%E%>)", fn);
5898 explained = 1;
5899 }
19420d00 5900 }
84583208
MM
5901
5902 /* If we're doing overload resolution purely for the purpose of
5903 determining conversion sequences, we should not consider the
5904 function used. If this conversion sequence is selected, the
5905 function will be marked as used at this point. */
5906 if (!(flags & tf_conv))
5907 mark_used (fn);
a6ecf8b6 5908
50714e79
MM
5909 if (TYPE_PTRFN_P (target_type) || TYPE_PTRMEMFUNC_P (target_type))
5910 return build_unary_op (ADDR_EXPR, fn, 0);
5911 else
5912 {
5913 /* The target must be a REFERENCE_TYPE. Above, build_unary_op
5914 will mark the function as addressed, but here we must do it
5915 explicitly. */
dffd7eb6 5916 cxx_mark_addressable (fn);
50714e79
MM
5917
5918 return fn;
5919 }
2c73f9f5
ML
5920}
5921
ec255269
MS
5922/* This function will instantiate the type of the expression given in
5923 RHS to match the type of LHSTYPE. If errors exist, then return
92af500d 5924 error_mark_node. FLAGS is a bit mask. If TF_ERROR is set, then
5e76004e
NS
5925 we complain on errors. If we are not complaining, never modify rhs,
5926 as overload resolution wants to try many possible instantiations, in
5927 the hope that at least one will work.
c8094d83 5928
e6e174e5
JM
5929 For non-recursive calls, LHSTYPE should be a function, pointer to
5930 function, or a pointer to member function. */
e92cc029 5931
8d08fdba 5932tree
94edc4ab 5933instantiate_type (tree lhstype, tree rhs, tsubst_flags_t flags)
8d08fdba 5934{
92af500d 5935 tsubst_flags_t flags_in = flags;
c8094d83 5936
c2ea3a40 5937 flags &= ~tf_ptrmem_ok;
c8094d83 5938
8d08fdba
MS
5939 if (TREE_CODE (lhstype) == UNKNOWN_TYPE)
5940 {
92af500d 5941 if (flags & tf_error)
8251199e 5942 error ("not enough type information");
8d08fdba
MS
5943 return error_mark_node;
5944 }
5945
5946 if (TREE_TYPE (rhs) != NULL_TREE && ! (type_unknown_p (rhs)))
abff8e06 5947 {
8f4b394d 5948 if (same_type_p (lhstype, TREE_TYPE (rhs)))
abff8e06 5949 return rhs;
c8094d83 5950 if (flag_ms_extensions
a723baf1
MM
5951 && TYPE_PTRMEMFUNC_P (lhstype)
5952 && !TYPE_PTRMEMFUNC_P (TREE_TYPE (rhs)))
5953 /* Microsoft allows `A::f' to be resolved to a
5954 pointer-to-member. */
5955 ;
5956 else
5957 {
92af500d 5958 if (flags & tf_error)
1f070f2b 5959 error ("argument of type %qT does not match %qT",
a723baf1
MM
5960 TREE_TYPE (rhs), lhstype);
5961 return error_mark_node;
5962 }
abff8e06 5963 }
8d08fdba 5964
50ad9642
MM
5965 if (TREE_CODE (rhs) == BASELINK)
5966 rhs = BASELINK_FUNCTIONS (rhs);
5967
5ae9ba3e
MM
5968 /* If we are in a template, and have a NON_DEPENDENT_EXPR, we cannot
5969 deduce any type information. */
5970 if (TREE_CODE (rhs) == NON_DEPENDENT_EXPR)
5971 {
5972 if (flags & tf_error)
5973 error ("not enough type information");
5974 return error_mark_node;
5975 }
5976
2c73f9f5
ML
5977 /* We don't overwrite rhs if it is an overloaded function.
5978 Copying it would destroy the tree link. */
5979 if (TREE_CODE (rhs) != OVERLOAD)
5980 rhs = copy_node (rhs);
c73964b2 5981
8d08fdba
MS
5982 /* This should really only be used when attempting to distinguish
5983 what sort of a pointer to function we have. For now, any
5984 arithmetic operation which is not supported on pointers
5985 is rejected as an error. */
5986
5987 switch (TREE_CODE (rhs))
5988 {
5989 case TYPE_EXPR:
5990 case CONVERT_EXPR:
5991 case SAVE_EXPR:
5992 case CONSTRUCTOR:
8dc2b103 5993 gcc_unreachable ();
8d08fdba
MS
5994
5995 case INDIRECT_REF:
5996 case ARRAY_REF:
ec255269
MS
5997 {
5998 tree new_rhs;
8d08fdba 5999
ec255269 6000 new_rhs = instantiate_type (build_pointer_type (lhstype),
940ff223 6001 TREE_OPERAND (rhs, 0), flags);
ec255269
MS
6002 if (new_rhs == error_mark_node)
6003 return error_mark_node;
6004
6005 TREE_TYPE (rhs) = lhstype;
6006 TREE_OPERAND (rhs, 0) = new_rhs;
6007 return rhs;
6008 }
8d08fdba
MS
6009
6010 case NOP_EXPR:
6011 rhs = copy_node (TREE_OPERAND (rhs, 0));
6012 TREE_TYPE (rhs) = unknown_type_node;
940ff223 6013 return instantiate_type (lhstype, rhs, flags);
8d08fdba
MS
6014
6015 case COMPONENT_REF:
92af500d 6016 {
5ae9ba3e 6017 tree member = TREE_OPERAND (rhs, 1);
92af500d 6018
5ae9ba3e
MM
6019 member = instantiate_type (lhstype, member, flags);
6020 if (member != error_mark_node
92af500d 6021 && TREE_SIDE_EFFECTS (TREE_OPERAND (rhs, 0)))
04c06002 6022 /* Do not lose object's side effects. */
5ae9ba3e
MM
6023 return build2 (COMPOUND_EXPR, TREE_TYPE (member),
6024 TREE_OPERAND (rhs, 0), member);
6025 return member;
92af500d 6026 }
8d08fdba 6027
2a238a97 6028 case OFFSET_REF:
05e0b2f4
JM
6029 rhs = TREE_OPERAND (rhs, 1);
6030 if (BASELINK_P (rhs))
92af500d 6031 return instantiate_type (lhstype, BASELINK_FUNCTIONS (rhs), flags_in);
05e0b2f4 6032
2a238a97
MM
6033 /* This can happen if we are forming a pointer-to-member for a
6034 member template. */
50bc768d 6035 gcc_assert (TREE_CODE (rhs) == TEMPLATE_ID_EXPR);
05e0b2f4 6036
2a238a97 6037 /* Fall through. */
874503bc 6038
386b8a85 6039 case TEMPLATE_ID_EXPR:
2bdb0643
JM
6040 {
6041 tree fns = TREE_OPERAND (rhs, 0);
6042 tree args = TREE_OPERAND (rhs, 1);
6043
19420d00 6044 return
92af500d
NS
6045 resolve_address_of_overloaded_function (lhstype, fns, flags_in,
6046 /*template_only=*/true,
2bdb0643 6047 args);
2bdb0643 6048 }
386b8a85 6049
2c73f9f5 6050 case OVERLOAD:
a723baf1 6051 case FUNCTION_DECL:
c8094d83 6052 return
92af500d
NS
6053 resolve_address_of_overloaded_function (lhstype, rhs, flags_in,
6054 /*template_only=*/false,
104bf76a 6055 /*explicit_targs=*/NULL_TREE);
2c73f9f5 6056
8d08fdba
MS
6057 case CALL_EXPR:
6058 /* This is too hard for now. */
8dc2b103 6059 gcc_unreachable ();
8d08fdba
MS
6060
6061 case PLUS_EXPR:
6062 case MINUS_EXPR:
6063 case COMPOUND_EXPR:
a0a33927 6064 TREE_OPERAND (rhs, 0)
940ff223 6065 = instantiate_type (lhstype, TREE_OPERAND (rhs, 0), flags);
8d08fdba
MS
6066 if (TREE_OPERAND (rhs, 0) == error_mark_node)
6067 return error_mark_node;
a0a33927 6068 TREE_OPERAND (rhs, 1)
940ff223 6069 = instantiate_type (lhstype, TREE_OPERAND (rhs, 1), flags);
8d08fdba
MS
6070 if (TREE_OPERAND (rhs, 1) == error_mark_node)
6071 return error_mark_node;
6072
6073 TREE_TYPE (rhs) = lhstype;
6074 return rhs;
6075
6076 case MULT_EXPR:
6077 case TRUNC_DIV_EXPR:
6078 case FLOOR_DIV_EXPR:
6079 case CEIL_DIV_EXPR:
6080 case ROUND_DIV_EXPR:
6081 case RDIV_EXPR:
6082 case TRUNC_MOD_EXPR:
6083 case FLOOR_MOD_EXPR:
6084 case CEIL_MOD_EXPR:
6085 case ROUND_MOD_EXPR:
6086 case FIX_ROUND_EXPR:
6087 case FIX_FLOOR_EXPR:
6088 case FIX_CEIL_EXPR:
6089 case FIX_TRUNC_EXPR:
6090 case FLOAT_EXPR:
6091 case NEGATE_EXPR:
6092 case ABS_EXPR:
6093 case MAX_EXPR:
6094 case MIN_EXPR:
8d08fdba
MS
6095
6096 case BIT_AND_EXPR:
6097 case BIT_IOR_EXPR:
6098 case BIT_XOR_EXPR:
6099 case LSHIFT_EXPR:
6100 case RSHIFT_EXPR:
6101 case LROTATE_EXPR:
6102 case RROTATE_EXPR:
6103
6104 case PREINCREMENT_EXPR:
6105 case PREDECREMENT_EXPR:
6106 case POSTINCREMENT_EXPR:
6107 case POSTDECREMENT_EXPR:
92af500d 6108 if (flags & tf_error)
8251199e 6109 error ("invalid operation on uninstantiated type");
8d08fdba
MS
6110 return error_mark_node;
6111
6112 case TRUTH_AND_EXPR:
6113 case TRUTH_OR_EXPR:
6114 case TRUTH_XOR_EXPR:
6115 case LT_EXPR:
6116 case LE_EXPR:
6117 case GT_EXPR:
6118 case GE_EXPR:
6119 case EQ_EXPR:
6120 case NE_EXPR:
6121 case TRUTH_ANDIF_EXPR:
6122 case TRUTH_ORIF_EXPR:
6123 case TRUTH_NOT_EXPR:
92af500d 6124 if (flags & tf_error)
8251199e 6125 error ("not enough type information");
8d08fdba
MS
6126 return error_mark_node;
6127
ca36f057
MM
6128 case COND_EXPR:
6129 if (type_unknown_p (TREE_OPERAND (rhs, 0)))
6130 {
92af500d 6131 if (flags & tf_error)
ca36f057
MM
6132 error ("not enough type information");
6133 return error_mark_node;
6134 }
6135 TREE_OPERAND (rhs, 1)
6136 = instantiate_type (lhstype, TREE_OPERAND (rhs, 1), flags);
6137 if (TREE_OPERAND (rhs, 1) == error_mark_node)
6138 return error_mark_node;
6139 TREE_OPERAND (rhs, 2)
6140 = instantiate_type (lhstype, TREE_OPERAND (rhs, 2), flags);
6141 if (TREE_OPERAND (rhs, 2) == error_mark_node)
6142 return error_mark_node;
6143
6144 TREE_TYPE (rhs) = lhstype;
6145 return rhs;
6146
6147 case MODIFY_EXPR:
6148 TREE_OPERAND (rhs, 1)
6149 = instantiate_type (lhstype, TREE_OPERAND (rhs, 1), flags);
6150 if (TREE_OPERAND (rhs, 1) == error_mark_node)
6151 return error_mark_node;
6152
6153 TREE_TYPE (rhs) = lhstype;
6154 return rhs;
c8094d83 6155
ca36f057 6156 case ADDR_EXPR:
19420d00
NS
6157 {
6158 if (PTRMEM_OK_P (rhs))
0cbd7506 6159 flags |= tf_ptrmem_ok;
c8094d83 6160
ca36f057 6161 return instantiate_type (lhstype, TREE_OPERAND (rhs, 0), flags);
19420d00 6162 }
ca36f057
MM
6163
6164 case ERROR_MARK:
6165 return error_mark_node;
6166
6167 default:
8dc2b103 6168 gcc_unreachable ();
ca36f057 6169 }
8dc2b103 6170 return error_mark_node;
ca36f057
MM
6171}
6172\f
6173/* Return the name of the virtual function pointer field
6174 (as an IDENTIFIER_NODE) for the given TYPE. Note that
6175 this may have to look back through base types to find the
6176 ultimate field name. (For single inheritance, these could
6177 all be the same name. Who knows for multiple inheritance). */
6178
6179static tree
94edc4ab 6180get_vfield_name (tree type)
ca36f057 6181{
37a247a0 6182 tree binfo, base_binfo;
ca36f057
MM
6183 char *buf;
6184
37a247a0 6185 for (binfo = TYPE_BINFO (type);
fa743e8c 6186 BINFO_N_BASE_BINFOS (binfo);
37a247a0
NS
6187 binfo = base_binfo)
6188 {
6189 base_binfo = BINFO_BASE_BINFO (binfo, 0);
ca36f057 6190
37a247a0
NS
6191 if (BINFO_VIRTUAL_P (base_binfo)
6192 || !TYPE_CONTAINS_VPTR_P (BINFO_TYPE (base_binfo)))
6193 break;
6194 }
c8094d83 6195
ca36f057 6196 type = BINFO_TYPE (binfo);
67f5655f
GDR
6197 buf = (char *) alloca (sizeof (VFIELD_NAME_FORMAT)
6198 + TYPE_NAME_LENGTH (type) + 2);
ea122333
JM
6199 sprintf (buf, VFIELD_NAME_FORMAT,
6200 IDENTIFIER_POINTER (constructor_name (type)));
ca36f057
MM
6201 return get_identifier (buf);
6202}
6203
6204void
94edc4ab 6205print_class_statistics (void)
ca36f057
MM
6206{
6207#ifdef GATHER_STATISTICS
6208 fprintf (stderr, "convert_harshness = %d\n", n_convert_harshness);
6209 fprintf (stderr, "compute_conversion_costs = %d\n", n_compute_conversion_costs);
ca36f057
MM
6210 if (n_vtables)
6211 {
6212 fprintf (stderr, "vtables = %d; vtable searches = %d\n",
6213 n_vtables, n_vtable_searches);
6214 fprintf (stderr, "vtable entries = %d; vtable elems = %d\n",
6215 n_vtable_entries, n_vtable_elems);
6216 }
6217#endif
6218}
6219
6220/* Build a dummy reference to ourselves so Derived::Base (and A::A) works,
6221 according to [class]:
0cbd7506 6222 The class-name is also inserted
ca36f057
MM
6223 into the scope of the class itself. For purposes of access checking,
6224 the inserted class name is treated as if it were a public member name. */
6225
6226void
94edc4ab 6227build_self_reference (void)
ca36f057
MM
6228{
6229 tree name = constructor_name (current_class_type);
6230 tree value = build_lang_decl (TYPE_DECL, name, current_class_type);
6231 tree saved_cas;
6232
6233 DECL_NONLOCAL (value) = 1;
6234 DECL_CONTEXT (value) = current_class_type;
6235 DECL_ARTIFICIAL (value) = 1;
a3d87771 6236 SET_DECL_SELF_REFERENCE_P (value);
ca36f057
MM
6237
6238 if (processing_template_decl)
6239 value = push_template_decl (value);
6240
6241 saved_cas = current_access_specifier;
6242 current_access_specifier = access_public_node;
6243 finish_member_declaration (value);
6244 current_access_specifier = saved_cas;
6245}
6246
6247/* Returns 1 if TYPE contains only padding bytes. */
6248
6249int
94edc4ab 6250is_empty_class (tree type)
ca36f057 6251{
ca36f057
MM
6252 if (type == error_mark_node)
6253 return 0;
6254
6255 if (! IS_AGGR_TYPE (type))
6256 return 0;
6257
58731fd1
MM
6258 /* In G++ 3.2, whether or not a class was empty was determined by
6259 looking at its size. */
6260 if (abi_version_at_least (2))
6261 return CLASSTYPE_EMPTY_P (type);
6262 else
6263 return integer_zerop (CLASSTYPE_SIZE (type));
ca36f057
MM
6264}
6265
956d9305
MM
6266/* Returns true if TYPE contains an empty class. */
6267
6268static bool
6269contains_empty_class_p (tree type)
6270{
6271 if (is_empty_class (type))
6272 return true;
6273 if (CLASS_TYPE_P (type))
6274 {
6275 tree field;
fa743e8c
NS
6276 tree binfo;
6277 tree base_binfo;
956d9305
MM
6278 int i;
6279
fa743e8c
NS
6280 for (binfo = TYPE_BINFO (type), i = 0;
6281 BINFO_BASE_ITERATE (binfo, i, base_binfo); ++i)
6282 if (contains_empty_class_p (BINFO_TYPE (base_binfo)))
956d9305
MM
6283 return true;
6284 for (field = TYPE_FIELDS (type); field; field = TREE_CHAIN (field))
17bbb839
MM
6285 if (TREE_CODE (field) == FIELD_DECL
6286 && !DECL_ARTIFICIAL (field)
6287 && is_empty_class (TREE_TYPE (field)))
956d9305
MM
6288 return true;
6289 }
6290 else if (TREE_CODE (type) == ARRAY_TYPE)
6291 return contains_empty_class_p (TREE_TYPE (type));
6292 return false;
6293}
6294
ca36f057
MM
6295/* Note that NAME was looked up while the current class was being
6296 defined and that the result of that lookup was DECL. */
6297
6298void
94edc4ab 6299maybe_note_name_used_in_class (tree name, tree decl)
ca36f057
MM
6300{
6301 splay_tree names_used;
6302
6303 /* If we're not defining a class, there's nothing to do. */
39fb05d0
MM
6304 if (!(innermost_scope_kind() == sk_class
6305 && TYPE_BEING_DEFINED (current_class_type)))
ca36f057 6306 return;
c8094d83 6307
ca36f057
MM
6308 /* If there's already a binding for this NAME, then we don't have
6309 anything to worry about. */
c8094d83 6310 if (lookup_member (current_class_type, name,
39fb05d0 6311 /*protect=*/0, /*want_type=*/false))
ca36f057
MM
6312 return;
6313
6314 if (!current_class_stack[current_class_depth - 1].names_used)
6315 current_class_stack[current_class_depth - 1].names_used
6316 = splay_tree_new (splay_tree_compare_pointers, 0, 0);
6317 names_used = current_class_stack[current_class_depth - 1].names_used;
6318
6319 splay_tree_insert (names_used,
c8094d83 6320 (splay_tree_key) name,
ca36f057
MM
6321 (splay_tree_value) decl);
6322}
6323
6324/* Note that NAME was declared (as DECL) in the current class. Check
0e339752 6325 to see that the declaration is valid. */
ca36f057
MM
6326
6327void
94edc4ab 6328note_name_declared_in_class (tree name, tree decl)
ca36f057
MM
6329{
6330 splay_tree names_used;
6331 splay_tree_node n;
6332
6333 /* Look to see if we ever used this name. */
c8094d83 6334 names_used
ca36f057
MM
6335 = current_class_stack[current_class_depth - 1].names_used;
6336 if (!names_used)
6337 return;
6338
6339 n = splay_tree_lookup (names_used, (splay_tree_key) name);
6340 if (n)
6341 {
6342 /* [basic.scope.class]
c8094d83 6343
ca36f057
MM
6344 A name N used in a class S shall refer to the same declaration
6345 in its context and when re-evaluated in the completed scope of
6346 S. */
1f070f2b 6347 error ("declaration of %q#D", decl);
dee15844
JM
6348 error ("changes meaning of %qD from %q+#D",
6349 DECL_NAME (OVL_CURRENT (decl)), (tree) n->value);
ca36f057
MM
6350 }
6351}
6352
3461fba7
NS
6353/* Returns the VAR_DECL for the complete vtable associated with BINFO.
6354 Secondary vtables are merged with primary vtables; this function
6355 will return the VAR_DECL for the primary vtable. */
ca36f057 6356
c35cce41 6357tree
94edc4ab 6358get_vtbl_decl_for_binfo (tree binfo)
c35cce41
MM
6359{
6360 tree decl;
6361
6362 decl = BINFO_VTABLE (binfo);
6363 if (decl && TREE_CODE (decl) == PLUS_EXPR)
6364 {
50bc768d 6365 gcc_assert (TREE_CODE (TREE_OPERAND (decl, 0)) == ADDR_EXPR);
c35cce41
MM
6366 decl = TREE_OPERAND (TREE_OPERAND (decl, 0), 0);
6367 }
6368 if (decl)
50bc768d 6369 gcc_assert (TREE_CODE (decl) == VAR_DECL);
c35cce41
MM
6370 return decl;
6371}
6372
911a71a7 6373
dbbf88d1
NS
6374/* Returns the binfo for the primary base of BINFO. If the resulting
6375 BINFO is a virtual base, and it is inherited elsewhere in the
6376 hierarchy, then the returned binfo might not be the primary base of
6377 BINFO in the complete object. Check BINFO_PRIMARY_P or
6378 BINFO_LOST_PRIMARY_P to be sure. */
911a71a7 6379
b5791fdc 6380static tree
94edc4ab 6381get_primary_binfo (tree binfo)
911a71a7
MM
6382{
6383 tree primary_base;
c8094d83 6384
911a71a7
MM
6385 primary_base = CLASSTYPE_PRIMARY_BINFO (BINFO_TYPE (binfo));
6386 if (!primary_base)
6387 return NULL_TREE;
6388
b5791fdc 6389 return copied_binfo (primary_base, binfo);
911a71a7
MM
6390}
6391
838dfd8a 6392/* If INDENTED_P is zero, indent to INDENT. Return nonzero. */
b7442fb5
NS
6393
6394static int
94edc4ab 6395maybe_indent_hierarchy (FILE * stream, int indent, int indented_p)
b7442fb5
NS
6396{
6397 if (!indented_p)
6398 fprintf (stream, "%*s", indent, "");
6399 return 1;
6400}
6401
dbbf88d1
NS
6402/* Dump the offsets of all the bases rooted at BINFO to STREAM.
6403 INDENT should be zero when called from the top level; it is
6404 incremented recursively. IGO indicates the next expected BINFO in
9bcb9aae 6405 inheritance graph ordering. */
c35cce41 6406
dbbf88d1
NS
6407static tree
6408dump_class_hierarchy_r (FILE *stream,
0cbd7506
MS
6409 int flags,
6410 tree binfo,
6411 tree igo,
6412 int indent)
ca36f057 6413{
b7442fb5 6414 int indented = 0;
fa743e8c
NS
6415 tree base_binfo;
6416 int i;
c8094d83 6417
b7442fb5
NS
6418 indented = maybe_indent_hierarchy (stream, indent, 0);
6419 fprintf (stream, "%s (0x%lx) ",
fc6633e0 6420 type_as_string (BINFO_TYPE (binfo), TFF_PLAIN_IDENTIFIER),
b7442fb5 6421 (unsigned long) binfo);
dbbf88d1
NS
6422 if (binfo != igo)
6423 {
6424 fprintf (stream, "alternative-path\n");
6425 return igo;
6426 }
6427 igo = TREE_CHAIN (binfo);
c8094d83 6428
9965d119 6429 fprintf (stream, HOST_WIDE_INT_PRINT_DEC,
ca36f057 6430 tree_low_cst (BINFO_OFFSET (binfo), 0));
9965d119
NS
6431 if (is_empty_class (BINFO_TYPE (binfo)))
6432 fprintf (stream, " empty");
6433 else if (CLASSTYPE_NEARLY_EMPTY_P (BINFO_TYPE (binfo)))
6434 fprintf (stream, " nearly-empty");
809e3e7f 6435 if (BINFO_VIRTUAL_P (binfo))
dbbf88d1 6436 fprintf (stream, " virtual");
9965d119 6437 fprintf (stream, "\n");
ca36f057 6438
b7442fb5 6439 indented = 0;
fc6633e0 6440 if (BINFO_PRIMARY_P (binfo))
b7442fb5
NS
6441 {
6442 indented = maybe_indent_hierarchy (stream, indent + 3, indented);
6443 fprintf (stream, " primary-for %s (0x%lx)",
fc6633e0 6444 type_as_string (BINFO_TYPE (BINFO_INHERITANCE_CHAIN (binfo)),
b7442fb5 6445 TFF_PLAIN_IDENTIFIER),
fc6633e0 6446 (unsigned long)BINFO_INHERITANCE_CHAIN (binfo));
b7442fb5
NS
6447 }
6448 if (BINFO_LOST_PRIMARY_P (binfo))
6449 {
6450 indented = maybe_indent_hierarchy (stream, indent + 3, indented);
6451 fprintf (stream, " lost-primary");
6452 }
6453 if (indented)
6454 fprintf (stream, "\n");
6455
6456 if (!(flags & TDF_SLIM))
6457 {
6458 int indented = 0;
c8094d83 6459
b7442fb5
NS
6460 if (BINFO_SUBVTT_INDEX (binfo))
6461 {
6462 indented = maybe_indent_hierarchy (stream, indent + 3, indented);
6463 fprintf (stream, " subvttidx=%s",
6464 expr_as_string (BINFO_SUBVTT_INDEX (binfo),
6465 TFF_PLAIN_IDENTIFIER));
6466 }
6467 if (BINFO_VPTR_INDEX (binfo))
6468 {
6469 indented = maybe_indent_hierarchy (stream, indent + 3, indented);
6470 fprintf (stream, " vptridx=%s",
6471 expr_as_string (BINFO_VPTR_INDEX (binfo),
6472 TFF_PLAIN_IDENTIFIER));
6473 }
6474 if (BINFO_VPTR_FIELD (binfo))
6475 {
6476 indented = maybe_indent_hierarchy (stream, indent + 3, indented);
6477 fprintf (stream, " vbaseoffset=%s",
6478 expr_as_string (BINFO_VPTR_FIELD (binfo),
6479 TFF_PLAIN_IDENTIFIER));
6480 }
6481 if (BINFO_VTABLE (binfo))
6482 {
6483 indented = maybe_indent_hierarchy (stream, indent + 3, indented);
6484 fprintf (stream, " vptr=%s",
6485 expr_as_string (BINFO_VTABLE (binfo),
6486 TFF_PLAIN_IDENTIFIER));
6487 }
c8094d83 6488
b7442fb5
NS
6489 if (indented)
6490 fprintf (stream, "\n");
6491 }
dbbf88d1 6492
fa743e8c
NS
6493 for (i = 0; BINFO_BASE_ITERATE (binfo, i, base_binfo); i++)
6494 igo = dump_class_hierarchy_r (stream, flags, base_binfo, igo, indent + 2);
c8094d83 6495
dbbf88d1 6496 return igo;
c35cce41
MM
6497}
6498
6499/* Dump the BINFO hierarchy for T. */
6500
b7442fb5 6501static void
bb885938 6502dump_class_hierarchy_1 (FILE *stream, int flags, tree t)
c35cce41 6503{
b7442fb5
NS
6504 fprintf (stream, "Class %s\n", type_as_string (t, TFF_PLAIN_IDENTIFIER));
6505 fprintf (stream, " size=%lu align=%lu\n",
6506 (unsigned long)(tree_low_cst (TYPE_SIZE (t), 0) / BITS_PER_UNIT),
6507 (unsigned long)(TYPE_ALIGN (t) / BITS_PER_UNIT));
dbbf88d1
NS
6508 fprintf (stream, " base size=%lu base align=%lu\n",
6509 (unsigned long)(tree_low_cst (TYPE_SIZE (CLASSTYPE_AS_BASE (t)), 0)
6510 / BITS_PER_UNIT),
6511 (unsigned long)(TYPE_ALIGN (CLASSTYPE_AS_BASE (t))
6512 / BITS_PER_UNIT));
6513 dump_class_hierarchy_r (stream, flags, TYPE_BINFO (t), TYPE_BINFO (t), 0);
b7442fb5 6514 fprintf (stream, "\n");
bb885938
NS
6515}
6516
da1d7781 6517/* Debug interface to hierarchy dumping. */
bb885938
NS
6518
6519extern void
6520debug_class (tree t)
6521{
6522 dump_class_hierarchy_1 (stderr, TDF_SLIM, t);
6523}
6524
6525static void
6526dump_class_hierarchy (tree t)
6527{
6528 int flags;
6529 FILE *stream = dump_begin (TDI_class, &flags);
6530
6531 if (stream)
6532 {
6533 dump_class_hierarchy_1 (stream, flags, t);
6534 dump_end (TDI_class, stream);
6535 }
b7442fb5
NS
6536}
6537
6538static void
94edc4ab 6539dump_array (FILE * stream, tree decl)
b7442fb5 6540{
4038c495
GB
6541 tree value;
6542 unsigned HOST_WIDE_INT ix;
b7442fb5
NS
6543 HOST_WIDE_INT elt;
6544 tree size = TYPE_MAX_VALUE (TYPE_DOMAIN (TREE_TYPE (decl)));
6545
6546 elt = (tree_low_cst (TYPE_SIZE (TREE_TYPE (TREE_TYPE (decl))), 0)
6547 / BITS_PER_UNIT);
6548 fprintf (stream, "%s:", decl_as_string (decl, TFF_PLAIN_IDENTIFIER));
6549 fprintf (stream, " %s entries",
6550 expr_as_string (size_binop (PLUS_EXPR, size, size_one_node),
6551 TFF_PLAIN_IDENTIFIER));
6552 fprintf (stream, "\n");
6553
4038c495
GB
6554 FOR_EACH_CONSTRUCTOR_VALUE (CONSTRUCTOR_ELTS (DECL_INITIAL (decl)),
6555 ix, value)
4fdc14ca 6556 fprintf (stream, "%-4ld %s\n", (long)(ix * elt),
4038c495 6557 expr_as_string (value, TFF_PLAIN_IDENTIFIER));
b7442fb5
NS
6558}
6559
6560static void
94edc4ab 6561dump_vtable (tree t, tree binfo, tree vtable)
b7442fb5
NS
6562{
6563 int flags;
6564 FILE *stream = dump_begin (TDI_class, &flags);
6565
6566 if (!stream)
6567 return;
6568
6569 if (!(flags & TDF_SLIM))
9965d119 6570 {
b7442fb5 6571 int ctor_vtbl_p = TYPE_BINFO (t) != binfo;
c8094d83 6572
b7442fb5
NS
6573 fprintf (stream, "%s for %s",
6574 ctor_vtbl_p ? "Construction vtable" : "Vtable",
fc6633e0 6575 type_as_string (BINFO_TYPE (binfo), TFF_PLAIN_IDENTIFIER));
b7442fb5
NS
6576 if (ctor_vtbl_p)
6577 {
809e3e7f 6578 if (!BINFO_VIRTUAL_P (binfo))
b7442fb5
NS
6579 fprintf (stream, " (0x%lx instance)", (unsigned long)binfo);
6580 fprintf (stream, " in %s", type_as_string (t, TFF_PLAIN_IDENTIFIER));
6581 }
6582 fprintf (stream, "\n");
6583 dump_array (stream, vtable);
6584 fprintf (stream, "\n");
9965d119 6585 }
c8094d83 6586
b7442fb5
NS
6587 dump_end (TDI_class, stream);
6588}
6589
6590static void
94edc4ab 6591dump_vtt (tree t, tree vtt)
b7442fb5
NS
6592{
6593 int flags;
6594 FILE *stream = dump_begin (TDI_class, &flags);
6595
6596 if (!stream)
6597 return;
6598
6599 if (!(flags & TDF_SLIM))
6600 {
6601 fprintf (stream, "VTT for %s\n",
6602 type_as_string (t, TFF_PLAIN_IDENTIFIER));
6603 dump_array (stream, vtt);
6604 fprintf (stream, "\n");
6605 }
c8094d83 6606
b7442fb5 6607 dump_end (TDI_class, stream);
ca36f057
MM
6608}
6609
bb885938
NS
6610/* Dump a function or thunk and its thunkees. */
6611
6612static void
6613dump_thunk (FILE *stream, int indent, tree thunk)
6614{
6615 static const char spaces[] = " ";
6616 tree name = DECL_NAME (thunk);
6617 tree thunks;
c8094d83 6618
bb885938
NS
6619 fprintf (stream, "%.*s%p %s %s", indent, spaces,
6620 (void *)thunk,
6621 !DECL_THUNK_P (thunk) ? "function"
6622 : DECL_THIS_THUNK_P (thunk) ? "this-thunk" : "covariant-thunk",
6623 name ? IDENTIFIER_POINTER (name) : "<unset>");
e00853fd 6624 if (DECL_THUNK_P (thunk))
bb885938
NS
6625 {
6626 HOST_WIDE_INT fixed_adjust = THUNK_FIXED_OFFSET (thunk);
6627 tree virtual_adjust = THUNK_VIRTUAL_OFFSET (thunk);
6628
6629 fprintf (stream, " fixed=" HOST_WIDE_INT_PRINT_DEC, fixed_adjust);
6630 if (!virtual_adjust)
6631 /*NOP*/;
6632 else if (DECL_THIS_THUNK_P (thunk))
6633 fprintf (stream, " vcall=" HOST_WIDE_INT_PRINT_DEC,
6634 tree_low_cst (virtual_adjust, 0));
6635 else
6636 fprintf (stream, " vbase=" HOST_WIDE_INT_PRINT_DEC "(%s)",
6637 tree_low_cst (BINFO_VPTR_FIELD (virtual_adjust), 0),
6638 type_as_string (BINFO_TYPE (virtual_adjust), TFF_SCOPE));
e00853fd
NS
6639 if (THUNK_ALIAS (thunk))
6640 fprintf (stream, " alias to %p", (void *)THUNK_ALIAS (thunk));
bb885938
NS
6641 }
6642 fprintf (stream, "\n");
6643 for (thunks = DECL_THUNKS (thunk); thunks; thunks = TREE_CHAIN (thunks))
6644 dump_thunk (stream, indent + 2, thunks);
6645}
6646
6647/* Dump the thunks for FN. */
6648
6649extern void
6650debug_thunks (tree fn)
6651{
6652 dump_thunk (stderr, 0, fn);
6653}
6654
ca36f057
MM
6655/* Virtual function table initialization. */
6656
6657/* Create all the necessary vtables for T and its base classes. */
6658
6659static void
94edc4ab 6660finish_vtbls (tree t)
ca36f057 6661{
3461fba7
NS
6662 tree list;
6663 tree vbase;
ca36f057 6664
3461fba7
NS
6665 /* We lay out the primary and secondary vtables in one contiguous
6666 vtable. The primary vtable is first, followed by the non-virtual
6667 secondary vtables in inheritance graph order. */
604a3205 6668 list = build_tree_list (BINFO_VTABLE (TYPE_BINFO (t)), NULL_TREE);
3461fba7
NS
6669 accumulate_vtbl_inits (TYPE_BINFO (t), TYPE_BINFO (t),
6670 TYPE_BINFO (t), t, list);
c8094d83 6671
3461fba7
NS
6672 /* Then come the virtual bases, also in inheritance graph order. */
6673 for (vbase = TYPE_BINFO (t); vbase; vbase = TREE_CHAIN (vbase))
6674 {
809e3e7f 6675 if (!BINFO_VIRTUAL_P (vbase))
3461fba7 6676 continue;
dbbf88d1 6677 accumulate_vtbl_inits (vbase, vbase, TYPE_BINFO (t), t, list);
ff668506
JM
6678 }
6679
604a3205 6680 if (BINFO_VTABLE (TYPE_BINFO (t)))
3461fba7 6681 initialize_vtable (TYPE_BINFO (t), TREE_VALUE (list));
ca36f057
MM
6682}
6683
6684/* Initialize the vtable for BINFO with the INITS. */
6685
6686static void
94edc4ab 6687initialize_vtable (tree binfo, tree inits)
ca36f057 6688{
ca36f057
MM
6689 tree decl;
6690
6691 layout_vtable_decl (binfo, list_length (inits));
c35cce41 6692 decl = get_vtbl_decl_for_binfo (binfo);
19c29b2f 6693 initialize_artificial_var (decl, inits);
b7442fb5 6694 dump_vtable (BINFO_TYPE (binfo), binfo, decl);
23656158
MM
6695}
6696
9965d119
NS
6697/* Build the VTT (virtual table table) for T.
6698 A class requires a VTT if it has virtual bases.
c8094d83 6699
9965d119
NS
6700 This holds
6701 1 - primary virtual pointer for complete object T
90ecce3e
JM
6702 2 - secondary VTTs for each direct non-virtual base of T which requires a
6703 VTT
9965d119
NS
6704 3 - secondary virtual pointers for each direct or indirect base of T which
6705 has virtual bases or is reachable via a virtual path from T.
6706 4 - secondary VTTs for each direct or indirect virtual base of T.
c8094d83 6707
9965d119 6708 Secondary VTTs look like complete object VTTs without part 4. */
23656158
MM
6709
6710static void
94edc4ab 6711build_vtt (tree t)
23656158
MM
6712{
6713 tree inits;
6714 tree type;
6715 tree vtt;
3ec6bad3 6716 tree index;
23656158 6717
23656158
MM
6718 /* Build up the initializers for the VTT. */
6719 inits = NULL_TREE;
3ec6bad3 6720 index = size_zero_node;
9965d119 6721 build_vtt_inits (TYPE_BINFO (t), t, &inits, &index);
23656158
MM
6722
6723 /* If we didn't need a VTT, we're done. */
6724 if (!inits)
6725 return;
6726
6727 /* Figure out the type of the VTT. */
442e01b6 6728 type = build_index_type (size_int (list_length (inits) - 1));
23656158 6729 type = build_cplus_array_type (const_ptr_type_node, type);
c8094d83 6730
23656158 6731 /* Now, build the VTT object itself. */
3e355d92 6732 vtt = build_vtable (t, mangle_vtt_for_type (t), type);
19c29b2f 6733 initialize_artificial_var (vtt, inits);
548502d3
MM
6734 /* Add the VTT to the vtables list. */
6735 TREE_CHAIN (vtt) = TREE_CHAIN (CLASSTYPE_VTABLES (t));
6736 TREE_CHAIN (CLASSTYPE_VTABLES (t)) = vtt;
b7442fb5
NS
6737
6738 dump_vtt (t, vtt);
23656158
MM
6739}
6740
13de7ec4
JM
6741/* When building a secondary VTT, BINFO_VTABLE is set to a TREE_LIST with
6742 PURPOSE the RTTI_BINFO, VALUE the real vtable pointer for this binfo,
6743 and CHAIN the vtable pointer for this binfo after construction is
00a17e31 6744 complete. VALUE can also be another BINFO, in which case we recurse. */
13de7ec4
JM
6745
6746static tree
94edc4ab 6747binfo_ctor_vtable (tree binfo)
13de7ec4
JM
6748{
6749 tree vt;
6750
6751 while (1)
6752 {
6753 vt = BINFO_VTABLE (binfo);
6754 if (TREE_CODE (vt) == TREE_LIST)
6755 vt = TREE_VALUE (vt);
95b4aca6 6756 if (TREE_CODE (vt) == TREE_BINFO)
13de7ec4
JM
6757 binfo = vt;
6758 else
6759 break;
6760 }
6761
6762 return vt;
6763}
6764
a3a0fc7f
NS
6765/* Data for secondary VTT initialization. */
6766typedef struct secondary_vptr_vtt_init_data_s
6767{
6768 /* Is this the primary VTT? */
6769 bool top_level_p;
6770
6771 /* Current index into the VTT. */
6772 tree index;
6773
6774 /* TREE_LIST of initializers built up. */
6775 tree inits;
6776
6777 /* The type being constructed by this secondary VTT. */
6778 tree type_being_constructed;
6779} secondary_vptr_vtt_init_data;
6780
23656158 6781/* Recursively build the VTT-initializer for BINFO (which is in the
9965d119
NS
6782 hierarchy dominated by T). INITS points to the end of the initializer
6783 list to date. INDEX is the VTT index where the next element will be
6784 replaced. Iff BINFO is the binfo for T, this is the top level VTT (i.e.
6785 not a subvtt for some base of T). When that is so, we emit the sub-VTTs
6786 for virtual bases of T. When it is not so, we build the constructor
6787 vtables for the BINFO-in-T variant. */
23656158
MM
6788
6789static tree *
a3a0fc7f 6790build_vtt_inits (tree binfo, tree t, tree *inits, tree *index)
23656158
MM
6791{
6792 int i;
6793 tree b;
6794 tree init;
6795 tree secondary_vptrs;
a3a0fc7f 6796 secondary_vptr_vtt_init_data data;
539ed333 6797 int top_level_p = SAME_BINFO_TYPE_P (BINFO_TYPE (binfo), t);
23656158
MM
6798
6799 /* We only need VTTs for subobjects with virtual bases. */
5775a06a 6800 if (!CLASSTYPE_VBASECLASSES (BINFO_TYPE (binfo)))
23656158
MM
6801 return inits;
6802
6803 /* We need to use a construction vtable if this is not the primary
6804 VTT. */
9965d119 6805 if (!top_level_p)
3ec6bad3
MM
6806 {
6807 build_ctor_vtbl_group (binfo, t);
6808
6809 /* Record the offset in the VTT where this sub-VTT can be found. */
6810 BINFO_SUBVTT_INDEX (binfo) = *index;
6811 }
23656158
MM
6812
6813 /* Add the address of the primary vtable for the complete object. */
13de7ec4 6814 init = binfo_ctor_vtable (binfo);
23656158
MM
6815 *inits = build_tree_list (NULL_TREE, init);
6816 inits = &TREE_CHAIN (*inits);
9965d119
NS
6817 if (top_level_p)
6818 {
50bc768d 6819 gcc_assert (!BINFO_VPTR_INDEX (binfo));
9965d119
NS
6820 BINFO_VPTR_INDEX (binfo) = *index;
6821 }
3ec6bad3 6822 *index = size_binop (PLUS_EXPR, *index, TYPE_SIZE_UNIT (ptr_type_node));
c8094d83 6823
23656158 6824 /* Recursively add the secondary VTTs for non-virtual bases. */
fa743e8c
NS
6825 for (i = 0; BINFO_BASE_ITERATE (binfo, i, b); ++i)
6826 if (!BINFO_VIRTUAL_P (b))
5d5a519f 6827 inits = build_vtt_inits (b, t, inits, index);
c8094d83 6828
23656158 6829 /* Add secondary virtual pointers for all subobjects of BINFO with
9965d119
NS
6830 either virtual bases or reachable along a virtual path, except
6831 subobjects that are non-virtual primary bases. */
a3a0fc7f
NS
6832 data.top_level_p = top_level_p;
6833 data.index = *index;
6834 data.inits = NULL;
6835 data.type_being_constructed = BINFO_TYPE (binfo);
c8094d83 6836
5d5a519f 6837 dfs_walk_once (binfo, dfs_build_secondary_vptr_vtt_inits, NULL, &data);
9965d119 6838
a3a0fc7f 6839 *index = data.index;
23656158
MM
6840
6841 /* The secondary vptrs come back in reverse order. After we reverse
6842 them, and add the INITS, the last init will be the first element
6843 of the chain. */
a3a0fc7f 6844 secondary_vptrs = data.inits;
23656158
MM
6845 if (secondary_vptrs)
6846 {
6847 *inits = nreverse (secondary_vptrs);
6848 inits = &TREE_CHAIN (secondary_vptrs);
50bc768d 6849 gcc_assert (*inits == NULL_TREE);
23656158
MM
6850 }
6851
9965d119 6852 if (top_level_p)
a3a0fc7f
NS
6853 /* Add the secondary VTTs for virtual bases in inheritance graph
6854 order. */
9ccf6541
MM
6855 for (b = TYPE_BINFO (BINFO_TYPE (binfo)); b; b = TREE_CHAIN (b))
6856 {
809e3e7f 6857 if (!BINFO_VIRTUAL_P (b))
9ccf6541 6858 continue;
c8094d83 6859
dbbf88d1 6860 inits = build_vtt_inits (b, t, inits, index);
9ccf6541 6861 }
a3a0fc7f
NS
6862 else
6863 /* Remove the ctor vtables we created. */
5d5a519f 6864 dfs_walk_all (binfo, dfs_fixup_binfo_vtbls, NULL, binfo);
23656158
MM
6865
6866 return inits;
6867}
6868
8df83eae 6869/* Called from build_vtt_inits via dfs_walk. BINFO is the binfo for the base
a3a0fc7f 6870 in most derived. DATA is a SECONDARY_VPTR_VTT_INIT_DATA structure. */
23656158
MM
6871
6872static tree
a3a0fc7f 6873dfs_build_secondary_vptr_vtt_inits (tree binfo, void *data_)
23656158 6874{
a3a0fc7f 6875 secondary_vptr_vtt_init_data *data = (secondary_vptr_vtt_init_data *)data_;
23656158 6876
23656158
MM
6877 /* We don't care about bases that don't have vtables. */
6878 if (!TYPE_VFIELD (BINFO_TYPE (binfo)))
5d5a519f 6879 return dfs_skip_bases;
23656158 6880
a3a0fc7f
NS
6881 /* We're only interested in proper subobjects of the type being
6882 constructed. */
539ed333 6883 if (SAME_BINFO_TYPE_P (BINFO_TYPE (binfo), data->type_being_constructed))
23656158
MM
6884 return NULL_TREE;
6885
a3a0fc7f
NS
6886 /* We're only interested in bases with virtual bases or reachable
6887 via a virtual path from the type being constructed. */
5d5a519f
NS
6888 if (!(CLASSTYPE_VBASECLASSES (BINFO_TYPE (binfo))
6889 || binfo_via_virtual (binfo, data->type_being_constructed)))
6890 return dfs_skip_bases;
c8094d83 6891
5d5a519f
NS
6892 /* We're not interested in non-virtual primary bases. */
6893 if (!BINFO_VIRTUAL_P (binfo) && BINFO_PRIMARY_P (binfo))
db3d8cde 6894 return NULL_TREE;
c8094d83 6895
3ec6bad3 6896 /* Record the index where this secondary vptr can be found. */
a3a0fc7f 6897 if (data->top_level_p)
9965d119 6898 {
50bc768d 6899 gcc_assert (!BINFO_VPTR_INDEX (binfo));
a3a0fc7f 6900 BINFO_VPTR_INDEX (binfo) = data->index;
3ec6bad3 6901
a3a0fc7f
NS
6902 if (BINFO_VIRTUAL_P (binfo))
6903 {
0cbd7506
MS
6904 /* It's a primary virtual base, and this is not a
6905 construction vtable. Find the base this is primary of in
6906 the inheritance graph, and use that base's vtable
6907 now. */
a3a0fc7f
NS
6908 while (BINFO_PRIMARY_P (binfo))
6909 binfo = BINFO_INHERITANCE_CHAIN (binfo);
6910 }
9965d119 6911 }
c8094d83 6912
a3a0fc7f
NS
6913 /* Add the initializer for the secondary vptr itself. */
6914 data->inits = tree_cons (NULL_TREE, binfo_ctor_vtable (binfo), data->inits);
23656158 6915
a3a0fc7f
NS
6916 /* Advance the vtt index. */
6917 data->index = size_binop (PLUS_EXPR, data->index,
6918 TYPE_SIZE_UNIT (ptr_type_node));
9965d119 6919
a3a0fc7f 6920 return NULL_TREE;
9965d119
NS
6921}
6922
a3a0fc7f
NS
6923/* Called from build_vtt_inits via dfs_walk. After building
6924 constructor vtables and generating the sub-vtt from them, we need
6925 to restore the BINFO_VTABLES that were scribbled on. DATA is the
6926 binfo of the base whose sub vtt was generated. */
23656158
MM
6927
6928static tree
94edc4ab 6929dfs_fixup_binfo_vtbls (tree binfo, void* data)
23656158 6930{
a3a0fc7f 6931 tree vtable = BINFO_VTABLE (binfo);
23656158 6932
5d5a519f
NS
6933 if (!TYPE_CONTAINS_VPTR_P (BINFO_TYPE (binfo)))
6934 /* If this class has no vtable, none of its bases do. */
6935 return dfs_skip_bases;
c8094d83 6936
5d5a519f
NS
6937 if (!vtable)
6938 /* This might be a primary base, so have no vtable in this
6939 hierarchy. */
6940 return NULL_TREE;
c8094d83 6941
23656158
MM
6942 /* If we scribbled the construction vtable vptr into BINFO, clear it
6943 out now. */
5d5a519f 6944 if (TREE_CODE (vtable) == TREE_LIST
a3a0fc7f
NS
6945 && (TREE_PURPOSE (vtable) == (tree) data))
6946 BINFO_VTABLE (binfo) = TREE_CHAIN (vtable);
23656158
MM
6947
6948 return NULL_TREE;
6949}
6950
6951/* Build the construction vtable group for BINFO which is in the
6952 hierarchy dominated by T. */
6953
6954static void
94edc4ab 6955build_ctor_vtbl_group (tree binfo, tree t)
23656158
MM
6956{
6957 tree list;
6958 tree type;
6959 tree vtbl;
6960 tree inits;
6961 tree id;
9ccf6541 6962 tree vbase;
23656158 6963
7bdcf888 6964 /* See if we've already created this construction vtable group. */
1f84ec23 6965 id = mangle_ctor_vtbl_for_type (t, binfo);
23656158
MM
6966 if (IDENTIFIER_GLOBAL_VALUE (id))
6967 return;
6968
539ed333 6969 gcc_assert (!SAME_BINFO_TYPE_P (BINFO_TYPE (binfo), t));
23656158
MM
6970 /* Build a version of VTBL (with the wrong type) for use in
6971 constructing the addresses of secondary vtables in the
6972 construction vtable group. */
459c43ad 6973 vtbl = build_vtable (t, id, ptr_type_node);
505970fc 6974 DECL_CONSTRUCTION_VTABLE_P (vtbl) = 1;
23656158
MM
6975 list = build_tree_list (vtbl, NULL_TREE);
6976 accumulate_vtbl_inits (binfo, TYPE_BINFO (TREE_TYPE (binfo)),
6977 binfo, t, list);
9965d119
NS
6978
6979 /* Add the vtables for each of our virtual bases using the vbase in T
6980 binfo. */
c8094d83
MS
6981 for (vbase = TYPE_BINFO (BINFO_TYPE (binfo));
6982 vbase;
9ccf6541
MM
6983 vbase = TREE_CHAIN (vbase))
6984 {
6985 tree b;
6986
809e3e7f 6987 if (!BINFO_VIRTUAL_P (vbase))
9ccf6541 6988 continue;
dbbf88d1 6989 b = copied_binfo (vbase, binfo);
c8094d83 6990
dbbf88d1 6991 accumulate_vtbl_inits (b, vbase, binfo, t, list);
9ccf6541 6992 }
99389463 6993 inits = TREE_VALUE (list);
23656158
MM
6994
6995 /* Figure out the type of the construction vtable. */
442e01b6 6996 type = build_index_type (size_int (list_length (inits) - 1));
23656158
MM
6997 type = build_cplus_array_type (vtable_entry_type, type);
6998 TREE_TYPE (vtbl) = type;
6999
7000 /* Initialize the construction vtable. */
548502d3 7001 CLASSTYPE_VTABLES (t) = chainon (CLASSTYPE_VTABLES (t), vtbl);
19c29b2f 7002 initialize_artificial_var (vtbl, inits);
b7442fb5 7003 dump_vtable (t, binfo, vtbl);
23656158
MM
7004}
7005
9965d119
NS
7006/* Add the vtbl initializers for BINFO (and its bases other than
7007 non-virtual primaries) to the list of INITS. BINFO is in the
7008 hierarchy dominated by T. RTTI_BINFO is the binfo within T of
7009 the constructor the vtbl inits should be accumulated for. (If this
7010 is the complete object vtbl then RTTI_BINFO will be TYPE_BINFO (T).)
7011 ORIG_BINFO is the binfo for this object within BINFO_TYPE (RTTI_BINFO).
7012 BINFO is the active base equivalent of ORIG_BINFO in the inheritance
7013 graph of T. Both BINFO and ORIG_BINFO will have the same BINFO_TYPE,
7014 but are not necessarily the same in terms of layout. */
ca36f057
MM
7015
7016static void
94edc4ab 7017accumulate_vtbl_inits (tree binfo,
0cbd7506
MS
7018 tree orig_binfo,
7019 tree rtti_binfo,
7020 tree t,
7021 tree inits)
ca36f057 7022{
23656158 7023 int i;
fa743e8c 7024 tree base_binfo;
539ed333 7025 int ctor_vtbl_p = !SAME_BINFO_TYPE_P (BINFO_TYPE (rtti_binfo), t);
23656158 7026
539ed333 7027 gcc_assert (SAME_BINFO_TYPE_P (BINFO_TYPE (binfo), BINFO_TYPE (orig_binfo)));
23656158 7028
00a17e31 7029 /* If it doesn't have a vptr, we don't do anything. */
623fe76a
NS
7030 if (!TYPE_CONTAINS_VPTR_P (BINFO_TYPE (binfo)))
7031 return;
c8094d83 7032
23656158
MM
7033 /* If we're building a construction vtable, we're not interested in
7034 subobjects that don't require construction vtables. */
c8094d83 7035 if (ctor_vtbl_p
5775a06a 7036 && !CLASSTYPE_VBASECLASSES (BINFO_TYPE (binfo))
9965d119 7037 && !binfo_via_virtual (orig_binfo, BINFO_TYPE (rtti_binfo)))
23656158
MM
7038 return;
7039
7040 /* Build the initializers for the BINFO-in-T vtable. */
c8094d83 7041 TREE_VALUE (inits)
23656158
MM
7042 = chainon (TREE_VALUE (inits),
7043 dfs_accumulate_vtbl_inits (binfo, orig_binfo,
7044 rtti_binfo, t, inits));
c8094d83 7045
c35cce41
MM
7046 /* Walk the BINFO and its bases. We walk in preorder so that as we
7047 initialize each vtable we can figure out at what offset the
23656158
MM
7048 secondary vtable lies from the primary vtable. We can't use
7049 dfs_walk here because we need to iterate through bases of BINFO
7050 and RTTI_BINFO simultaneously. */
fa743e8c 7051 for (i = 0; BINFO_BASE_ITERATE (binfo, i, base_binfo); ++i)
23656158 7052 {
23656158 7053 /* Skip virtual bases. */
809e3e7f 7054 if (BINFO_VIRTUAL_P (base_binfo))
23656158
MM
7055 continue;
7056 accumulate_vtbl_inits (base_binfo,
604a3205 7057 BINFO_BASE_BINFO (orig_binfo, i),
9965d119 7058 rtti_binfo, t,
23656158
MM
7059 inits);
7060 }
ca36f057
MM
7061}
7062
3461fba7
NS
7063/* Called from accumulate_vtbl_inits. Returns the initializers for
7064 the BINFO vtable. */
ca36f057
MM
7065
7066static tree
94edc4ab 7067dfs_accumulate_vtbl_inits (tree binfo,
0cbd7506
MS
7068 tree orig_binfo,
7069 tree rtti_binfo,
7070 tree t,
7071 tree l)
ca36f057 7072{
23656158 7073 tree inits = NULL_TREE;
9965d119 7074 tree vtbl = NULL_TREE;
539ed333 7075 int ctor_vtbl_p = !SAME_BINFO_TYPE_P (BINFO_TYPE (rtti_binfo), t);
9965d119 7076
13de7ec4 7077 if (ctor_vtbl_p
809e3e7f 7078 && BINFO_VIRTUAL_P (orig_binfo) && BINFO_PRIMARY_P (orig_binfo))
9965d119 7079 {
13de7ec4
JM
7080 /* In the hierarchy of BINFO_TYPE (RTTI_BINFO), this is a
7081 primary virtual base. If it is not the same primary in
7082 the hierarchy of T, we'll need to generate a ctor vtable
7083 for it, to place at its location in T. If it is the same
7084 primary, we still need a VTT entry for the vtable, but it
7085 should point to the ctor vtable for the base it is a
7086 primary for within the sub-hierarchy of RTTI_BINFO.
c8094d83 7087
13de7ec4 7088 There are three possible cases:
c8094d83 7089
13de7ec4
JM
7090 1) We are in the same place.
7091 2) We are a primary base within a lost primary virtual base of
7092 RTTI_BINFO.
049d2def 7093 3) We are primary to something not a base of RTTI_BINFO. */
c8094d83 7094
fc6633e0 7095 tree b;
13de7ec4 7096 tree last = NULL_TREE;
85a9a0a2 7097
13de7ec4
JM
7098 /* First, look through the bases we are primary to for RTTI_BINFO
7099 or a virtual base. */
fc6633e0
NS
7100 b = binfo;
7101 while (BINFO_PRIMARY_P (b))
7bdcf888 7102 {
fc6633e0 7103 b = BINFO_INHERITANCE_CHAIN (b);
13de7ec4 7104 last = b;
809e3e7f 7105 if (BINFO_VIRTUAL_P (b) || b == rtti_binfo)
fc6633e0 7106 goto found;
7bdcf888 7107 }
13de7ec4
JM
7108 /* If we run out of primary links, keep looking down our
7109 inheritance chain; we might be an indirect primary. */
fc6633e0
NS
7110 for (b = last; b; b = BINFO_INHERITANCE_CHAIN (b))
7111 if (BINFO_VIRTUAL_P (b) || b == rtti_binfo)
7112 break;
7113 found:
c8094d83 7114
13de7ec4
JM
7115 /* If we found RTTI_BINFO, this is case 1. If we found a virtual
7116 base B and it is a base of RTTI_BINFO, this is case 2. In
7117 either case, we share our vtable with LAST, i.e. the
7118 derived-most base within B of which we are a primary. */
7119 if (b == rtti_binfo
58c42dc2 7120 || (b && binfo_for_vbase (BINFO_TYPE (b), BINFO_TYPE (rtti_binfo))))
049d2def
JM
7121 /* Just set our BINFO_VTABLE to point to LAST, as we may not have
7122 set LAST's BINFO_VTABLE yet. We'll extract the actual vptr in
7123 binfo_ctor_vtable after everything's been set up. */
7124 vtbl = last;
13de7ec4 7125
049d2def 7126 /* Otherwise, this is case 3 and we get our own. */
9965d119 7127 }
dbbf88d1 7128 else if (!BINFO_NEW_VTABLE_MARKED (orig_binfo))
9965d119 7129 return inits;
7bdcf888 7130
9965d119 7131 if (!vtbl)
ca36f057 7132 {
c35cce41
MM
7133 tree index;
7134 int non_fn_entries;
7135
7136 /* Compute the initializer for this vtable. */
23656158 7137 inits = build_vtbl_initializer (binfo, orig_binfo, t, rtti_binfo,
aabb4cd6 7138 &non_fn_entries);
c35cce41 7139
23656158 7140 /* Figure out the position to which the VPTR should point. */
c35cce41 7141 vtbl = TREE_PURPOSE (l);
6de9cd9a 7142 vtbl = build1 (ADDR_EXPR, vtbl_ptr_type_node, vtbl);
c35cce41
MM
7143 index = size_binop (PLUS_EXPR,
7144 size_int (non_fn_entries),
7145 size_int (list_length (TREE_VALUE (l))));
23656158
MM
7146 index = size_binop (MULT_EXPR,
7147 TYPE_SIZE_UNIT (vtable_entry_type),
7148 index);
f293ce4b 7149 vtbl = build2 (PLUS_EXPR, TREE_TYPE (vtbl), vtbl, index);
9965d119 7150 }
23656158 7151
7bdcf888 7152 if (ctor_vtbl_p)
9965d119
NS
7153 /* For a construction vtable, we can't overwrite BINFO_VTABLE.
7154 So, we make a TREE_LIST. Later, dfs_fixup_binfo_vtbls will
7155 straighten this out. */
7156 BINFO_VTABLE (binfo) = tree_cons (rtti_binfo, vtbl, BINFO_VTABLE (binfo));
809e3e7f 7157 else if (BINFO_PRIMARY_P (binfo) && BINFO_VIRTUAL_P (binfo))
7bdcf888
NS
7158 inits = NULL_TREE;
7159 else
7160 /* For an ordinary vtable, set BINFO_VTABLE. */
7161 BINFO_VTABLE (binfo) = vtbl;
ca36f057 7162
23656158 7163 return inits;
ca36f057
MM
7164}
7165
1b746b0f
AP
7166static GTY(()) tree abort_fndecl_addr;
7167
90ecce3e 7168/* Construct the initializer for BINFO's virtual function table. BINFO
aabb4cd6 7169 is part of the hierarchy dominated by T. If we're building a
23656158 7170 construction vtable, the ORIG_BINFO is the binfo we should use to
9965d119
NS
7171 find the actual function pointers to put in the vtable - but they
7172 can be overridden on the path to most-derived in the graph that
7173 ORIG_BINFO belongs. Otherwise,
911a71a7 7174 ORIG_BINFO should be the same as BINFO. The RTTI_BINFO is the
23656158
MM
7175 BINFO that should be indicated by the RTTI information in the
7176 vtable; it will be a base class of T, rather than T itself, if we
7177 are building a construction vtable.
aabb4cd6
MM
7178
7179 The value returned is a TREE_LIST suitable for wrapping in a
7180 CONSTRUCTOR to use as the DECL_INITIAL for a vtable. If
7181 NON_FN_ENTRIES_P is not NULL, *NON_FN_ENTRIES_P is set to the
c8094d83 7182 number of non-function entries in the vtable.
911a71a7
MM
7183
7184 It might seem that this function should never be called with a
9965d119 7185 BINFO for which BINFO_PRIMARY_P holds, the vtable for such a
911a71a7 7186 base is always subsumed by a derived class vtable. However, when
9965d119 7187 we are building construction vtables, we do build vtables for
911a71a7
MM
7188 primary bases; we need these while the primary base is being
7189 constructed. */
ca36f057
MM
7190
7191static tree
94edc4ab 7192build_vtbl_initializer (tree binfo,
0cbd7506
MS
7193 tree orig_binfo,
7194 tree t,
7195 tree rtti_binfo,
7196 int* non_fn_entries_p)
ca36f057 7197{
d0cd8b44 7198 tree v, b;
911a71a7 7199 tree vfun_inits;
911a71a7 7200 vtbl_init_data vid;
58c42dc2
NS
7201 unsigned ix;
7202 tree vbinfo;
d4e6fecb 7203 VEC(tree,gc) *vbases;
c8094d83 7204
911a71a7 7205 /* Initialize VID. */
961192e1 7206 memset (&vid, 0, sizeof (vid));
911a71a7
MM
7207 vid.binfo = binfo;
7208 vid.derived = t;
73ea87d7 7209 vid.rtti_binfo = rtti_binfo;
911a71a7 7210 vid.last_init = &vid.inits;
539ed333
NS
7211 vid.primary_vtbl_p = SAME_BINFO_TYPE_P (BINFO_TYPE (binfo), t);
7212 vid.ctor_vtbl_p = !SAME_BINFO_TYPE_P (BINFO_TYPE (rtti_binfo), t);
548502d3 7213 vid.generate_vcall_entries = true;
c35cce41 7214 /* The first vbase or vcall offset is at index -3 in the vtable. */
ce552f75 7215 vid.index = ssize_int(-3 * TARGET_VTABLE_DATA_ENTRY_DISTANCE);
c35cce41 7216
9bab6c90 7217 /* Add entries to the vtable for RTTI. */
73ea87d7 7218 build_rtti_vtbl_entries (binfo, &vid);
9bab6c90 7219
b485e15b
MM
7220 /* Create an array for keeping track of the functions we've
7221 processed. When we see multiple functions with the same
7222 signature, we share the vcall offsets. */
1e625046 7223 vid.fns = VEC_alloc (tree, gc, 32);
c35cce41 7224 /* Add the vcall and vbase offset entries. */
911a71a7 7225 build_vcall_and_vbase_vtbl_entries (binfo, &vid);
c8094d83 7226
79cda2d1 7227 /* Clear BINFO_VTABLE_PATH_MARKED; it's set by
c35cce41 7228 build_vbase_offset_vtbl_entries. */
9ba5ff0f
NS
7229 for (vbases = CLASSTYPE_VBASECLASSES (t), ix = 0;
7230 VEC_iterate (tree, vbases, ix, vbinfo); ix++)
58c42dc2 7231 BINFO_VTABLE_PATH_MARKED (vbinfo) = 0;
ca36f057 7232
a6f5e048
RH
7233 /* If the target requires padding between data entries, add that now. */
7234 if (TARGET_VTABLE_DATA_ENTRY_DISTANCE > 1)
7235 {
7236 tree cur, *prev;
7237
7238 for (prev = &vid.inits; (cur = *prev); prev = &TREE_CHAIN (cur))
7239 {
7240 tree add = cur;
7241 int i;
7242
7243 for (i = 1; i < TARGET_VTABLE_DATA_ENTRY_DISTANCE; ++i)
7befdb9f 7244 add = tree_cons (NULL_TREE,
2e88ae22
SE
7245 build1 (NOP_EXPR, vtable_entry_type,
7246 null_pointer_node),
7befdb9f 7247 add);
a6f5e048
RH
7248 *prev = add;
7249 }
7250 }
7251
c35cce41 7252 if (non_fn_entries_p)
911a71a7 7253 *non_fn_entries_p = list_length (vid.inits);
ca36f057
MM
7254
7255 /* Go through all the ordinary virtual functions, building up
7256 initializers. */
c35cce41 7257 vfun_inits = NULL_TREE;
23656158 7258 for (v = BINFO_VIRTUALS (orig_binfo); v; v = TREE_CHAIN (v))
ca36f057
MM
7259 {
7260 tree delta;
7261 tree vcall_index;
4977bab6 7262 tree fn, fn_original;
f11ee281 7263 tree init = NULL_TREE;
c8094d83 7264
ca36f057 7265 fn = BV_FN (v);
07fa4878
NS
7266 fn_original = fn;
7267 if (DECL_THUNK_P (fn))
4977bab6 7268 {
07fa4878
NS
7269 if (!DECL_NAME (fn))
7270 finish_thunk (fn);
e00853fd 7271 if (THUNK_ALIAS (fn))
bb885938
NS
7272 {
7273 fn = THUNK_ALIAS (fn);
7274 BV_FN (v) = fn;
7275 }
07fa4878 7276 fn_original = THUNK_TARGET (fn);
4977bab6 7277 }
c8094d83 7278
d0cd8b44
JM
7279 /* If the only definition of this function signature along our
7280 primary base chain is from a lost primary, this vtable slot will
7281 never be used, so just zero it out. This is important to avoid
7282 requiring extra thunks which cannot be generated with the function.
7283
f11ee281
JM
7284 We first check this in update_vtable_entry_for_fn, so we handle
7285 restored primary bases properly; we also need to do it here so we
7286 zero out unused slots in ctor vtables, rather than filling themff
7287 with erroneous values (though harmless, apart from relocation
7288 costs). */
7289 for (b = binfo; ; b = get_primary_binfo (b))
7290 {
7291 /* We found a defn before a lost primary; go ahead as normal. */
4977bab6 7292 if (look_for_overrides_here (BINFO_TYPE (b), fn_original))
f11ee281
JM
7293 break;
7294
7295 /* The nearest definition is from a lost primary; clear the
7296 slot. */
7297 if (BINFO_LOST_PRIMARY_P (b))
7298 {
7299 init = size_zero_node;
d0cd8b44 7300 break;
f11ee281
JM
7301 }
7302 }
d0cd8b44 7303
f11ee281
JM
7304 if (! init)
7305 {
7306 /* Pull the offset for `this', and the function to call, out of
7307 the list. */
7308 delta = BV_DELTA (v);
548502d3 7309 vcall_index = BV_VCALL_INDEX (v);
f11ee281 7310
50bc768d
NS
7311 gcc_assert (TREE_CODE (delta) == INTEGER_CST);
7312 gcc_assert (TREE_CODE (fn) == FUNCTION_DECL);
f11ee281
JM
7313
7314 /* You can't call an abstract virtual function; it's abstract.
7315 So, we replace these functions with __pure_virtual. */
4977bab6 7316 if (DECL_PURE_VIRTUAL_P (fn_original))
4977bab6 7317 {
1b746b0f
AP
7318 fn = abort_fndecl;
7319 if (abort_fndecl_addr == NULL)
7320 abort_fndecl_addr = build1 (ADDR_EXPR, vfunc_ptr_type_node, fn);
7321 init = abort_fndecl_addr;
7322 }
7323 else
7324 {
7325 if (!integer_zerop (delta) || vcall_index)
7326 {
7327 fn = make_thunk (fn, /*this_adjusting=*/1, delta, vcall_index);
7328 if (!DECL_NAME (fn))
7329 finish_thunk (fn);
7330 }
7331 /* Take the address of the function, considering it to be of an
7332 appropriate generic type. */
7333 init = build1 (ADDR_EXPR, vfunc_ptr_type_node, fn);
4977bab6 7334 }
f11ee281 7335 }
d0cd8b44 7336
ca36f057 7337 /* And add it to the chain of initializers. */
67231816
RH
7338 if (TARGET_VTABLE_USES_DESCRIPTORS)
7339 {
7340 int i;
7341 if (init == size_zero_node)
7342 for (i = 0; i < TARGET_VTABLE_USES_DESCRIPTORS; ++i)
7343 vfun_inits = tree_cons (NULL_TREE, init, vfun_inits);
7344 else
7345 for (i = 0; i < TARGET_VTABLE_USES_DESCRIPTORS; ++i)
7346 {
f293ce4b
RS
7347 tree fdesc = build2 (FDESC_EXPR, vfunc_ptr_type_node,
7348 TREE_OPERAND (init, 0),
7d60be94 7349 build_int_cst (NULL_TREE, i));
67231816 7350 TREE_CONSTANT (fdesc) = 1;
6de9cd9a 7351 TREE_INVARIANT (fdesc) = 1;
67231816
RH
7352
7353 vfun_inits = tree_cons (NULL_TREE, fdesc, vfun_inits);
7354 }
7355 }
7356 else
0cbd7506 7357 vfun_inits = tree_cons (NULL_TREE, init, vfun_inits);
ca36f057
MM
7358 }
7359
c35cce41
MM
7360 /* The initializers for virtual functions were built up in reverse
7361 order; straighten them out now. */
7362 vfun_inits = nreverse (vfun_inits);
c8094d83 7363
9bab6c90 7364 /* The negative offset initializers are also in reverse order. */
911a71a7 7365 vid.inits = nreverse (vid.inits);
9bab6c90
MM
7366
7367 /* Chain the two together. */
911a71a7 7368 return chainon (vid.inits, vfun_inits);
ca36f057
MM
7369}
7370
d0cd8b44 7371/* Adds to vid->inits the initializers for the vbase and vcall
c35cce41 7372 offsets in BINFO, which is in the hierarchy dominated by T. */
ca36f057 7373
c35cce41 7374static void
94edc4ab 7375build_vcall_and_vbase_vtbl_entries (tree binfo, vtbl_init_data* vid)
ca36f057 7376{
c35cce41 7377 tree b;
8d08fdba 7378
c35cce41 7379 /* If this is a derived class, we must first create entries
9bab6c90 7380 corresponding to the primary base class. */
911a71a7 7381 b = get_primary_binfo (binfo);
c35cce41 7382 if (b)
911a71a7 7383 build_vcall_and_vbase_vtbl_entries (b, vid);
c35cce41
MM
7384
7385 /* Add the vbase entries for this base. */
911a71a7 7386 build_vbase_offset_vtbl_entries (binfo, vid);
c35cce41 7387 /* Add the vcall entries for this base. */
911a71a7 7388 build_vcall_offset_vtbl_entries (binfo, vid);
ca36f057 7389}
8d08fdba 7390
ca36f057
MM
7391/* Returns the initializers for the vbase offset entries in the vtable
7392 for BINFO (which is part of the class hierarchy dominated by T), in
c35cce41
MM
7393 reverse order. VBASE_OFFSET_INDEX gives the vtable index
7394 where the next vbase offset will go. */
8d08fdba 7395
c35cce41 7396static void
94edc4ab 7397build_vbase_offset_vtbl_entries (tree binfo, vtbl_init_data* vid)
ca36f057 7398{
c35cce41
MM
7399 tree vbase;
7400 tree t;
90b1ca2f 7401 tree non_primary_binfo;
8d08fdba 7402
ca36f057
MM
7403 /* If there are no virtual baseclasses, then there is nothing to
7404 do. */
5775a06a 7405 if (!CLASSTYPE_VBASECLASSES (BINFO_TYPE (binfo)))
c35cce41 7406 return;
ca36f057 7407
911a71a7 7408 t = vid->derived;
c8094d83 7409
90b1ca2f
NS
7410 /* We might be a primary base class. Go up the inheritance hierarchy
7411 until we find the most derived class of which we are a primary base:
7412 it is the offset of that which we need to use. */
7413 non_primary_binfo = binfo;
7414 while (BINFO_INHERITANCE_CHAIN (non_primary_binfo))
7415 {
7416 tree b;
7417
7418 /* If we have reached a virtual base, then it must be a primary
7419 base (possibly multi-level) of vid->binfo, or we wouldn't
7420 have called build_vcall_and_vbase_vtbl_entries for it. But it
7421 might be a lost primary, so just skip down to vid->binfo. */
809e3e7f 7422 if (BINFO_VIRTUAL_P (non_primary_binfo))
90b1ca2f
NS
7423 {
7424 non_primary_binfo = vid->binfo;
7425 break;
7426 }
7427
7428 b = BINFO_INHERITANCE_CHAIN (non_primary_binfo);
7429 if (get_primary_binfo (b) != non_primary_binfo)
7430 break;
7431 non_primary_binfo = b;
7432 }
ca36f057 7433
c35cce41
MM
7434 /* Go through the virtual bases, adding the offsets. */
7435 for (vbase = TYPE_BINFO (BINFO_TYPE (binfo));
7436 vbase;
7437 vbase = TREE_CHAIN (vbase))
7438 {
7439 tree b;
7440 tree delta;
c8094d83 7441
809e3e7f 7442 if (!BINFO_VIRTUAL_P (vbase))
c35cce41 7443 continue;
ca36f057 7444
c35cce41
MM
7445 /* Find the instance of this virtual base in the complete
7446 object. */
dbbf88d1 7447 b = copied_binfo (vbase, binfo);
c35cce41
MM
7448
7449 /* If we've already got an offset for this virtual base, we
7450 don't need another one. */
7451 if (BINFO_VTABLE_PATH_MARKED (b))
7452 continue;
dbbf88d1 7453 BINFO_VTABLE_PATH_MARKED (b) = 1;
c35cce41
MM
7454
7455 /* Figure out where we can find this vbase offset. */
c8094d83 7456 delta = size_binop (MULT_EXPR,
911a71a7 7457 vid->index,
c35cce41
MM
7458 convert (ssizetype,
7459 TYPE_SIZE_UNIT (vtable_entry_type)));
911a71a7 7460 if (vid->primary_vtbl_p)
c35cce41
MM
7461 BINFO_VPTR_FIELD (b) = delta;
7462
7463 if (binfo != TYPE_BINFO (t))
50bc768d
NS
7464 /* The vbase offset had better be the same. */
7465 gcc_assert (tree_int_cst_equal (delta, BINFO_VPTR_FIELD (vbase)));
c35cce41
MM
7466
7467 /* The next vbase will come at a more negative offset. */
a6f5e048
RH
7468 vid->index = size_binop (MINUS_EXPR, vid->index,
7469 ssize_int (TARGET_VTABLE_DATA_ENTRY_DISTANCE));
c35cce41
MM
7470
7471 /* The initializer is the delta from BINFO to this virtual base.
4e7512c9
MM
7472 The vbase offsets go in reverse inheritance-graph order, and
7473 we are walking in inheritance graph order so these end up in
7474 the right order. */
90b1ca2f 7475 delta = size_diffop (BINFO_OFFSET (b), BINFO_OFFSET (non_primary_binfo));
c8094d83
MS
7476
7477 *vid->last_init
9bab6c90 7478 = build_tree_list (NULL_TREE,
c8094d83 7479 fold_build1 (NOP_EXPR,
7866705a
SB
7480 vtable_entry_type,
7481 delta));
911a71a7 7482 vid->last_init = &TREE_CHAIN (*vid->last_init);
c35cce41 7483 }
8d08fdba 7484}
ca36f057 7485
b485e15b 7486/* Adds the initializers for the vcall offset entries in the vtable
d0cd8b44
JM
7487 for BINFO (which is part of the class hierarchy dominated by VID->DERIVED)
7488 to VID->INITS. */
b485e15b
MM
7489
7490static void
94edc4ab 7491build_vcall_offset_vtbl_entries (tree binfo, vtbl_init_data* vid)
b485e15b 7492{
548502d3
MM
7493 /* We only need these entries if this base is a virtual base. We
7494 compute the indices -- but do not add to the vtable -- when
7495 building the main vtable for a class. */
809e3e7f 7496 if (BINFO_VIRTUAL_P (binfo) || binfo == TYPE_BINFO (vid->derived))
548502d3
MM
7497 {
7498 /* We need a vcall offset for each of the virtual functions in this
7499 vtable. For example:
b485e15b 7500
548502d3
MM
7501 class A { virtual void f (); };
7502 class B1 : virtual public A { virtual void f (); };
7503 class B2 : virtual public A { virtual void f (); };
7504 class C: public B1, public B2 { virtual void f (); };
d0cd8b44 7505
548502d3
MM
7506 A C object has a primary base of B1, which has a primary base of A. A
7507 C also has a secondary base of B2, which no longer has a primary base
7508 of A. So the B2-in-C construction vtable needs a secondary vtable for
7509 A, which will adjust the A* to a B2* to call f. We have no way of
7510 knowing what (or even whether) this offset will be when we define B2,
7511 so we store this "vcall offset" in the A sub-vtable and look it up in
7512 a "virtual thunk" for B2::f.
b485e15b 7513
548502d3
MM
7514 We need entries for all the functions in our primary vtable and
7515 in our non-virtual bases' secondary vtables. */
7516 vid->vbase = binfo;
7517 /* If we are just computing the vcall indices -- but do not need
7518 the actual entries -- not that. */
809e3e7f 7519 if (!BINFO_VIRTUAL_P (binfo))
548502d3
MM
7520 vid->generate_vcall_entries = false;
7521 /* Now, walk through the non-virtual bases, adding vcall offsets. */
7522 add_vcall_offset_vtbl_entries_r (binfo, vid);
7523 }
b485e15b
MM
7524}
7525
7526/* Build vcall offsets, starting with those for BINFO. */
7527
7528static void
94edc4ab 7529add_vcall_offset_vtbl_entries_r (tree binfo, vtbl_init_data* vid)
b485e15b
MM
7530{
7531 int i;
7532 tree primary_binfo;
fa743e8c 7533 tree base_binfo;
b485e15b
MM
7534
7535 /* Don't walk into virtual bases -- except, of course, for the
d0cd8b44
JM
7536 virtual base for which we are building vcall offsets. Any
7537 primary virtual base will have already had its offsets generated
7538 through the recursion in build_vcall_and_vbase_vtbl_entries. */
809e3e7f 7539 if (BINFO_VIRTUAL_P (binfo) && vid->vbase != binfo)
b485e15b 7540 return;
c8094d83 7541
b485e15b
MM
7542 /* If BINFO has a primary base, process it first. */
7543 primary_binfo = get_primary_binfo (binfo);
7544 if (primary_binfo)
7545 add_vcall_offset_vtbl_entries_r (primary_binfo, vid);
7546
7547 /* Add BINFO itself to the list. */
7548 add_vcall_offset_vtbl_entries_1 (binfo, vid);
7549
7550 /* Scan the non-primary bases of BINFO. */
fa743e8c
NS
7551 for (i = 0; BINFO_BASE_ITERATE (binfo, i, base_binfo); ++i)
7552 if (base_binfo != primary_binfo)
7553 add_vcall_offset_vtbl_entries_r (base_binfo, vid);
b485e15b
MM
7554}
7555
9965d119 7556/* Called from build_vcall_offset_vtbl_entries_r. */
e92cc029 7557
b485e15b 7558static void
94edc4ab 7559add_vcall_offset_vtbl_entries_1 (tree binfo, vtbl_init_data* vid)
8d08fdba 7560{
e6a66567
MM
7561 /* Make entries for the rest of the virtuals. */
7562 if (abi_version_at_least (2))
31f8e4f3 7563 {
e6a66567 7564 tree orig_fn;
911a71a7 7565
e6a66567
MM
7566 /* The ABI requires that the methods be processed in declaration
7567 order. G++ 3.2 used the order in the vtable. */
7568 for (orig_fn = TYPE_METHODS (BINFO_TYPE (binfo));
7569 orig_fn;
7570 orig_fn = TREE_CHAIN (orig_fn))
7571 if (DECL_VINDEX (orig_fn))
95675950 7572 add_vcall_offset (orig_fn, binfo, vid);
e6a66567
MM
7573 }
7574 else
7575 {
7576 tree derived_virtuals;
7577 tree base_virtuals;
7578 tree orig_virtuals;
7579 /* If BINFO is a primary base, the most derived class which has
7580 BINFO as a primary base; otherwise, just BINFO. */
7581 tree non_primary_binfo;
7582
7583 /* We might be a primary base class. Go up the inheritance hierarchy
7584 until we find the most derived class of which we are a primary base:
7585 it is the BINFO_VIRTUALS there that we need to consider. */
7586 non_primary_binfo = binfo;
7587 while (BINFO_INHERITANCE_CHAIN (non_primary_binfo))
911a71a7 7588 {
e6a66567
MM
7589 tree b;
7590
7591 /* If we have reached a virtual base, then it must be vid->vbase,
7592 because we ignore other virtual bases in
7593 add_vcall_offset_vtbl_entries_r. In turn, it must be a primary
7594 base (possibly multi-level) of vid->binfo, or we wouldn't
7595 have called build_vcall_and_vbase_vtbl_entries for it. But it
7596 might be a lost primary, so just skip down to vid->binfo. */
809e3e7f 7597 if (BINFO_VIRTUAL_P (non_primary_binfo))
e6a66567 7598 {
8dc2b103 7599 gcc_assert (non_primary_binfo == vid->vbase);
e6a66567
MM
7600 non_primary_binfo = vid->binfo;
7601 break;
7602 }
911a71a7 7603
e6a66567
MM
7604 b = BINFO_INHERITANCE_CHAIN (non_primary_binfo);
7605 if (get_primary_binfo (b) != non_primary_binfo)
7606 break;
7607 non_primary_binfo = b;
7608 }
4e7512c9 7609
e6a66567
MM
7610 if (vid->ctor_vtbl_p)
7611 /* For a ctor vtable we need the equivalent binfo within the hierarchy
7612 where rtti_binfo is the most derived type. */
dbbf88d1
NS
7613 non_primary_binfo
7614 = original_binfo (non_primary_binfo, vid->rtti_binfo);
c8094d83 7615
e6a66567
MM
7616 for (base_virtuals = BINFO_VIRTUALS (binfo),
7617 derived_virtuals = BINFO_VIRTUALS (non_primary_binfo),
7618 orig_virtuals = BINFO_VIRTUALS (TYPE_BINFO (BINFO_TYPE (binfo)));
7619 base_virtuals;
7620 base_virtuals = TREE_CHAIN (base_virtuals),
7621 derived_virtuals = TREE_CHAIN (derived_virtuals),
7622 orig_virtuals = TREE_CHAIN (orig_virtuals))
7623 {
7624 tree orig_fn;
73ea87d7 7625
e6a66567
MM
7626 /* Find the declaration that originally caused this function to
7627 be present in BINFO_TYPE (binfo). */
7628 orig_fn = BV_FN (orig_virtuals);
9bab6c90 7629
e6a66567
MM
7630 /* When processing BINFO, we only want to generate vcall slots for
7631 function slots introduced in BINFO. So don't try to generate
7632 one if the function isn't even defined in BINFO. */
539ed333 7633 if (!SAME_BINFO_TYPE_P (BINFO_TYPE (binfo), DECL_CONTEXT (orig_fn)))
e6a66567 7634 continue;
b485e15b 7635
95675950 7636 add_vcall_offset (orig_fn, binfo, vid);
e6a66567
MM
7637 }
7638 }
7639}
b485e15b 7640
95675950 7641/* Add a vcall offset entry for ORIG_FN to the vtable. */
b485e15b 7642
e6a66567 7643static void
95675950 7644add_vcall_offset (tree orig_fn, tree binfo, vtbl_init_data *vid)
e6a66567
MM
7645{
7646 size_t i;
7647 tree vcall_offset;
1e625046 7648 tree derived_entry;
9bab6c90 7649
e6a66567
MM
7650 /* If there is already an entry for a function with the same
7651 signature as FN, then we do not need a second vcall offset.
7652 Check the list of functions already present in the derived
7653 class vtable. */
c8094d83 7654 for (i = 0; VEC_iterate (tree, vid->fns, i, derived_entry); ++i)
e6a66567 7655 {
e6a66567
MM
7656 if (same_signature_p (derived_entry, orig_fn)
7657 /* We only use one vcall offset for virtual destructors,
7658 even though there are two virtual table entries. */
7659 || (DECL_DESTRUCTOR_P (derived_entry)
7660 && DECL_DESTRUCTOR_P (orig_fn)))
7661 return;
7662 }
4e7512c9 7663
e6a66567
MM
7664 /* If we are building these vcall offsets as part of building
7665 the vtable for the most derived class, remember the vcall
7666 offset. */
7667 if (vid->binfo == TYPE_BINFO (vid->derived))
0871761b 7668 {
d4e6fecb 7669 tree_pair_p elt = VEC_safe_push (tree_pair_s, gc,
0871761b
NS
7670 CLASSTYPE_VCALL_INDICES (vid->derived),
7671 NULL);
7672 elt->purpose = orig_fn;
7673 elt->value = vid->index;
7674 }
c8094d83 7675
e6a66567
MM
7676 /* The next vcall offset will be found at a more negative
7677 offset. */
7678 vid->index = size_binop (MINUS_EXPR, vid->index,
7679 ssize_int (TARGET_VTABLE_DATA_ENTRY_DISTANCE));
7680
7681 /* Keep track of this function. */
1e625046 7682 VEC_safe_push (tree, gc, vid->fns, orig_fn);
e6a66567
MM
7683
7684 if (vid->generate_vcall_entries)
7685 {
7686 tree base;
e6a66567 7687 tree fn;
548502d3 7688
e6a66567 7689 /* Find the overriding function. */
95675950 7690 fn = find_final_overrider (vid->rtti_binfo, binfo, orig_fn);
e6a66567
MM
7691 if (fn == error_mark_node)
7692 vcall_offset = build1 (NOP_EXPR, vtable_entry_type,
7693 integer_zero_node);
7694 else
7695 {
95675950
MM
7696 base = TREE_VALUE (fn);
7697
7698 /* The vbase we're working on is a primary base of
7699 vid->binfo. But it might be a lost primary, so its
7700 BINFO_OFFSET might be wrong, so we just use the
7701 BINFO_OFFSET from vid->binfo. */
7702 vcall_offset = size_diffop (BINFO_OFFSET (base),
7703 BINFO_OFFSET (vid->binfo));
7866705a
SB
7704 vcall_offset = fold_build1 (NOP_EXPR, vtable_entry_type,
7705 vcall_offset);
548502d3 7706 }
34cd5ae7 7707 /* Add the initializer to the vtable. */
e6a66567
MM
7708 *vid->last_init = build_tree_list (NULL_TREE, vcall_offset);
7709 vid->last_init = &TREE_CHAIN (*vid->last_init);
c35cce41 7710 }
570221c2 7711}
b54ccf71 7712
34cd5ae7 7713/* Return vtbl initializers for the RTTI entries corresponding to the
aabb4cd6 7714 BINFO's vtable. The RTTI entries should indicate the object given
73ea87d7 7715 by VID->rtti_binfo. */
b54ccf71 7716
9bab6c90 7717static void
94edc4ab 7718build_rtti_vtbl_entries (tree binfo, vtbl_init_data* vid)
b54ccf71 7719{
ca36f057 7720 tree b;
aabb4cd6 7721 tree t;
ca36f057 7722 tree basetype;
ca36f057
MM
7723 tree offset;
7724 tree decl;
7725 tree init;
b54ccf71 7726
ca36f057 7727 basetype = BINFO_TYPE (binfo);
73ea87d7 7728 t = BINFO_TYPE (vid->rtti_binfo);
b54ccf71 7729
ca36f057
MM
7730 /* To find the complete object, we will first convert to our most
7731 primary base, and then add the offset in the vtbl to that value. */
7732 b = binfo;
9965d119 7733 while (CLASSTYPE_HAS_PRIMARY_BASE_P (BINFO_TYPE (b))
0cbd7506 7734 && !BINFO_LOST_PRIMARY_P (b))
b54ccf71 7735 {
c35cce41
MM
7736 tree primary_base;
7737
911a71a7 7738 primary_base = get_primary_binfo (b);
fc6633e0
NS
7739 gcc_assert (BINFO_PRIMARY_P (primary_base)
7740 && BINFO_INHERITANCE_CHAIN (primary_base) == b);
c35cce41 7741 b = primary_base;
b54ccf71 7742 }
73ea87d7 7743 offset = size_diffop (BINFO_OFFSET (vid->rtti_binfo), BINFO_OFFSET (b));
8f032717 7744
8fa33dfa
MM
7745 /* The second entry is the address of the typeinfo object. */
7746 if (flag_rtti)
7993382e 7747 decl = build_address (get_tinfo_decl (t));
ca36f057 7748 else
8fa33dfa 7749 decl = integer_zero_node;
c8094d83 7750
8fa33dfa
MM
7751 /* Convert the declaration to a type that can be stored in the
7752 vtable. */
7993382e 7753 init = build_nop (vfunc_ptr_type_node, decl);
911a71a7
MM
7754 *vid->last_init = build_tree_list (NULL_TREE, init);
7755 vid->last_init = &TREE_CHAIN (*vid->last_init);
8f032717 7756
78dcd41a
VR
7757 /* Add the offset-to-top entry. It comes earlier in the vtable than
7758 the typeinfo entry. Convert the offset to look like a
c4372ef4 7759 function pointer, so that we can put it in the vtable. */
7993382e 7760 init = build_nop (vfunc_ptr_type_node, offset);
c4372ef4
NS
7761 *vid->last_init = build_tree_list (NULL_TREE, init);
7762 vid->last_init = &TREE_CHAIN (*vid->last_init);
8f032717 7763}
0f59171d
RH
7764
7765/* Fold a OBJ_TYPE_REF expression to the address of a function.
7766 KNOWN_TYPE carries the true type of OBJ_TYPE_REF_OBJECT(REF). */
7767
7768tree
7769cp_fold_obj_type_ref (tree ref, tree known_type)
7770{
7771 HOST_WIDE_INT index = tree_low_cst (OBJ_TYPE_REF_TOKEN (ref), 1);
7772 HOST_WIDE_INT i = 0;
604a3205 7773 tree v = BINFO_VIRTUALS (TYPE_BINFO (known_type));
0f59171d
RH
7774 tree fndecl;
7775
7776 while (i != index)
7777 {
7778 i += (TARGET_VTABLE_USES_DESCRIPTORS
7779 ? TARGET_VTABLE_USES_DESCRIPTORS : 1);
7780 v = TREE_CHAIN (v);
7781 }
7782
7783 fndecl = BV_FN (v);
7784
7785#ifdef ENABLE_CHECKING
8dc2b103
NS
7786 gcc_assert (tree_int_cst_equal (OBJ_TYPE_REF_TOKEN (ref),
7787 DECL_VINDEX (fndecl)));
0f59171d
RH
7788#endif
7789
8634c649
JJ
7790 cgraph_node (fndecl)->local.vtable_method = true;
7791
0f59171d
RH
7792 return build_address (fndecl);
7793}
d7afec4b 7794
1b746b0f 7795#include "gt-cp-class.h"