]> git.ipfire.org Git - thirdparty/gcc.git/blame - gcc/cp/class.c
re PR middle-end/28683 (ICE (segfault in add_reg_br_prob_note) when comparing pointer...
[thirdparty/gcc.git] / gcc / cp / class.c
CommitLineData
8d08fdba 1/* Functions related to building classes and their related objects.
06ceef4e 2 Copyright (C) 1987, 1992, 1993, 1994, 1995, 1996, 1997, 1998,
0a57b6af 3 1999, 2000, 2001, 2002, 2003, 2004, 2005 Free Software Foundation, Inc.
8d08fdba
MS
4 Contributed by Michael Tiemann (tiemann@cygnus.com)
5
f5adbb8d 6This file is part of GCC.
8d08fdba 7
f5adbb8d 8GCC is free software; you can redistribute it and/or modify
8d08fdba
MS
9it under the terms of the GNU General Public License as published by
10the Free Software Foundation; either version 2, or (at your option)
11any later version.
12
f5adbb8d 13GCC is distributed in the hope that it will be useful,
8d08fdba
MS
14but WITHOUT ANY WARRANTY; without even the implied warranty of
15MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16GNU General Public License for more details.
17
18You should have received a copy of the GNU General Public License
f5adbb8d 19along with GCC; see the file COPYING. If not, write to
1788952f
KC
20the Free Software Foundation, 51 Franklin Street, Fifth Floor,
21Boston, MA 02110-1301, USA. */
8d08fdba
MS
22
23
e92cc029 24/* High-level class interface. */
8d08fdba
MS
25
26#include "config.h"
8d052bc7 27#include "system.h"
4977bab6
ZW
28#include "coretypes.h"
29#include "tm.h"
e7a587ef 30#include "tree.h"
8d08fdba
MS
31#include "cp-tree.h"
32#include "flags.h"
28cbf42c 33#include "rtl.h"
e8abc66f 34#include "output.h"
54f92bfb 35#include "toplev.h"
1af6141b 36#include "target.h"
7b6d72fc 37#include "convert.h"
8634c649 38#include "cgraph.h"
ef330312 39#include "tree-dump.h"
8d08fdba 40
61a127b3
MM
41/* The number of nested classes being processed. If we are not in the
42 scope of any class, this is zero. */
43
8d08fdba
MS
44int current_class_depth;
45
61a127b3
MM
46/* In order to deal with nested classes, we keep a stack of classes.
47 The topmost entry is the innermost class, and is the entry at index
48 CURRENT_CLASS_DEPTH */
49
50typedef struct class_stack_node {
51 /* The name of the class. */
52 tree name;
53
54 /* The _TYPE node for the class. */
55 tree type;
56
57 /* The access specifier pending for new declarations in the scope of
58 this class. */
59 tree access;
8f032717
MM
60
61 /* If were defining TYPE, the names used in this class. */
62 splay_tree names_used;
c888c93b
MM
63
64 /* Nonzero if this class is no longer open, because of a call to
65 push_to_top_level. */
66 size_t hidden;
61a127b3
MM
67}* class_stack_node_t;
68
911a71a7 69typedef struct vtbl_init_data_s
c35cce41 70{
911a71a7
MM
71 /* The base for which we're building initializers. */
72 tree binfo;
73ea87d7 73 /* The type of the most-derived type. */
c35cce41 74 tree derived;
73ea87d7
NS
75 /* The binfo for the dynamic type. This will be TYPE_BINFO (derived),
76 unless ctor_vtbl_p is true. */
77 tree rtti_binfo;
9bab6c90
MM
78 /* The negative-index vtable initializers built up so far. These
79 are in order from least negative index to most negative index. */
80 tree inits;
d0cd8b44 81 /* The last (i.e., most negative) entry in INITS. */
9bab6c90 82 tree* last_init;
c35cce41 83 /* The binfo for the virtual base for which we're building
911a71a7 84 vcall offset initializers. */
c35cce41 85 tree vbase;
9bab6c90
MM
86 /* The functions in vbase for which we have already provided vcall
87 offsets. */
1e625046 88 VEC(tree,gc) *fns;
c35cce41
MM
89 /* The vtable index of the next vcall or vbase offset. */
90 tree index;
91 /* Nonzero if we are building the initializer for the primary
92 vtable. */
911a71a7
MM
93 int primary_vtbl_p;
94 /* Nonzero if we are building the initializer for a construction
95 vtable. */
96 int ctor_vtbl_p;
548502d3
MM
97 /* True when adding vcall offset entries to the vtable. False when
98 merely computing the indices. */
99 bool generate_vcall_entries;
911a71a7 100} vtbl_init_data;
c35cce41 101
c20118a8 102/* The type of a function passed to walk_subobject_offsets. */
94edc4ab 103typedef int (*subobject_offset_fn) (tree, tree, splay_tree);
c20118a8 104
4639c5c6 105/* The stack itself. This is a dynamically resized array. The
61a127b3
MM
106 number of elements allocated is CURRENT_CLASS_STACK_SIZE. */
107static int current_class_stack_size;
108static class_stack_node_t current_class_stack;
109
c5a35c3c
MM
110/* The size of the largest empty class seen in this translation unit. */
111static GTY (()) tree sizeof_biggest_empty_class;
112
1f6e1acc
AS
113/* An array of all local classes present in this translation unit, in
114 declaration order. */
806aa901 115VEC(tree,gc) *local_classes;
1f6e1acc 116
94edc4ab
NN
117static tree get_vfield_name (tree);
118static void finish_struct_anon (tree);
119static tree get_vtable_name (tree);
120static tree get_basefndecls (tree, tree);
121static int build_primary_vtable (tree, tree);
dbbf88d1 122static int build_secondary_vtable (tree);
94edc4ab
NN
123static void finish_vtbls (tree);
124static void modify_vtable_entry (tree, tree, tree, tree, tree *);
94edc4ab
NN
125static void finish_struct_bits (tree);
126static int alter_access (tree, tree, tree);
127static void handle_using_decl (tree, tree);
94edc4ab
NN
128static tree dfs_modify_vtables (tree, void *);
129static tree modify_all_vtables (tree, tree);
fc6633e0 130static void determine_primary_bases (tree);
94edc4ab
NN
131static void finish_struct_methods (tree);
132static void maybe_warn_about_overly_private_class (tree);
94edc4ab
NN
133static int method_name_cmp (const void *, const void *);
134static int resort_method_name_cmp (const void *, const void *);
e5e459bf 135static void add_implicitly_declared_members (tree, int, int);
94edc4ab 136static tree fixed_type_or_null (tree, int *, int *);
92af500d
NS
137static tree resolve_address_of_overloaded_function (tree, tree, tsubst_flags_t,
138 bool, tree);
00bfffa4 139static tree build_simple_base_path (tree expr, tree binfo);
94edc4ab
NN
140static tree build_vtbl_ref_1 (tree, tree);
141static tree build_vtbl_initializer (tree, tree, tree, tree, int *);
142static int count_fields (tree);
d07605f5 143static int add_fields_to_record_type (tree, struct sorted_fields_type*, int);
94edc4ab 144static void check_bitfield_decl (tree);
e5e459bf
AO
145static void check_field_decl (tree, tree, int *, int *, int *);
146static void check_field_decls (tree, tree *, int *, int *);
58731fd1
MM
147static tree *build_base_field (record_layout_info, tree, splay_tree, tree *);
148static void build_base_fields (record_layout_info, splay_tree, tree *);
94edc4ab
NN
149static void check_methods (tree);
150static void remove_zero_width_bit_fields (tree);
e5e459bf 151static void check_bases (tree, int *, int *);
58731fd1
MM
152static void check_bases_and_members (tree);
153static tree create_vtable_ptr (tree, tree *);
17bbb839 154static void include_empty_classes (record_layout_info);
e93ee644 155static void layout_class_type (tree, tree *);
94edc4ab
NN
156static void fixup_pending_inline (tree);
157static void fixup_inline_methods (tree);
dbbf88d1 158static void propagate_binfo_offsets (tree, tree);
17bbb839 159static void layout_virtual_bases (record_layout_info, splay_tree);
94edc4ab
NN
160static void build_vbase_offset_vtbl_entries (tree, vtbl_init_data *);
161static void add_vcall_offset_vtbl_entries_r (tree, vtbl_init_data *);
162static void add_vcall_offset_vtbl_entries_1 (tree, vtbl_init_data *);
163static void build_vcall_offset_vtbl_entries (tree, vtbl_init_data *);
e6a66567 164static void add_vcall_offset (tree, tree, vtbl_init_data *);
94edc4ab 165static void layout_vtable_decl (tree, int);
5d5a519f 166static tree dfs_find_final_overrider_pre (tree, void *);
dbbf88d1 167static tree dfs_find_final_overrider_post (tree, void *);
94edc4ab
NN
168static tree find_final_overrider (tree, tree, tree);
169static int make_new_vtable (tree, tree);
b5791fdc 170static tree get_primary_binfo (tree);
94edc4ab 171static int maybe_indent_hierarchy (FILE *, int, int);
dbbf88d1 172static tree dump_class_hierarchy_r (FILE *, int, tree, tree, int);
94edc4ab 173static void dump_class_hierarchy (tree);
bb885938 174static void dump_class_hierarchy_1 (FILE *, int, tree);
94edc4ab
NN
175static void dump_array (FILE *, tree);
176static void dump_vtable (tree, tree, tree);
177static void dump_vtt (tree, tree);
bb885938 178static void dump_thunk (FILE *, int, tree);
94edc4ab
NN
179static tree build_vtable (tree, tree, tree);
180static void initialize_vtable (tree, tree);
94edc4ab 181static void layout_nonempty_base_or_field (record_layout_info,
5d5a519f 182 tree, tree, splay_tree);
94edc4ab 183static tree end_of_class (tree, int);
dbbf88d1 184static bool layout_empty_base (tree, tree, splay_tree);
94edc4ab
NN
185static void accumulate_vtbl_inits (tree, tree, tree, tree, tree);
186static tree dfs_accumulate_vtbl_inits (tree, tree, tree, tree,
187 tree);
188static void build_rtti_vtbl_entries (tree, vtbl_init_data *);
5d5a519f 189static void build_vcall_and_vbase_vtbl_entries (tree, vtbl_init_data *);
94edc4ab
NN
190static void clone_constructors_and_destructors (tree);
191static tree build_clone (tree, tree);
a2ddc397 192static void update_vtable_entry_for_fn (tree, tree, tree, tree *, unsigned);
94edc4ab
NN
193static void build_ctor_vtbl_group (tree, tree);
194static void build_vtt (tree);
195static tree binfo_ctor_vtable (tree);
196static tree *build_vtt_inits (tree, tree, tree *, tree *);
197static tree dfs_build_secondary_vptr_vtt_inits (tree, void *);
94edc4ab 198static tree dfs_fixup_binfo_vtbls (tree, void *);
94edc4ab
NN
199static int record_subobject_offset (tree, tree, splay_tree);
200static int check_subobject_offset (tree, tree, splay_tree);
201static int walk_subobject_offsets (tree, subobject_offset_fn,
5d5a519f 202 tree, splay_tree, tree, int);
c5a35c3c 203static void record_subobject_offsets (tree, tree, splay_tree, bool);
94edc4ab
NN
204static int layout_conflict_p (tree, tree, splay_tree, int);
205static int splay_tree_compare_integer_csts (splay_tree_key k1,
5d5a519f 206 splay_tree_key k2);
94edc4ab
NN
207static void warn_about_ambiguous_bases (tree);
208static bool type_requires_array_cookie (tree);
956d9305 209static bool contains_empty_class_p (tree);
9368208b 210static bool base_derived_from (tree, tree);
7ba539c6 211static int empty_base_at_nonzero_offset_p (tree, tree, splay_tree);
ba9a991f 212static tree end_of_base (tree);
548502d3 213static tree get_vcall_index (tree, tree);
9965d119 214
51c184be 215/* Variables shared between class.c and call.c. */
8d08fdba 216
5566b478 217#ifdef GATHER_STATISTICS
8d08fdba
MS
218int n_vtables = 0;
219int n_vtable_entries = 0;
220int n_vtable_searches = 0;
221int n_vtable_elems = 0;
222int n_convert_harshness = 0;
223int n_compute_conversion_costs = 0;
8d08fdba 224int n_inner_fields_searched = 0;
5566b478 225#endif
8d08fdba 226
338d90b8
NS
227/* Convert to or from a base subobject. EXPR is an expression of type
228 `A' or `A*', an expression of type `B' or `B*' is returned. To
229 convert A to a base B, CODE is PLUS_EXPR and BINFO is the binfo for
230 the B base instance within A. To convert base A to derived B, CODE
231 is MINUS_EXPR and BINFO is the binfo for the A instance within B.
232 In this latter case, A must not be a morally virtual base of B.
233 NONNULL is true if EXPR is known to be non-NULL (this is only
234 needed when EXPR is of pointer type). CV qualifiers are preserved
235 from EXPR. */
ca36f057
MM
236
237tree
94edc4ab 238build_base_path (enum tree_code code,
0cbd7506
MS
239 tree expr,
240 tree binfo,
241 int nonnull)
1a588ad7 242{
338d90b8 243 tree v_binfo = NULL_TREE;
6bc34b14 244 tree d_binfo = NULL_TREE;
338d90b8
NS
245 tree probe;
246 tree offset;
247 tree target_type;
248 tree null_test = NULL;
249 tree ptr_target_type;
ca36f057 250 int fixed_type_p;
338d90b8 251 int want_pointer = TREE_CODE (TREE_TYPE (expr)) == POINTER_TYPE;
00bfffa4 252 bool has_empty = false;
d7981fd9 253 bool virtual_access;
1a588ad7 254
338d90b8
NS
255 if (expr == error_mark_node || binfo == error_mark_node || !binfo)
256 return error_mark_node;
6bc34b14
JM
257
258 for (probe = binfo; probe; probe = BINFO_INHERITANCE_CHAIN (probe))
259 {
260 d_binfo = probe;
00bfffa4
JM
261 if (is_empty_class (BINFO_TYPE (probe)))
262 has_empty = true;
809e3e7f 263 if (!v_binfo && BINFO_VIRTUAL_P (probe))
6bc34b14
JM
264 v_binfo = probe;
265 }
338d90b8
NS
266
267 probe = TYPE_MAIN_VARIANT (TREE_TYPE (expr));
268 if (want_pointer)
269 probe = TYPE_MAIN_VARIANT (TREE_TYPE (probe));
00bfffa4 270
539ed333
NS
271 gcc_assert ((code == MINUS_EXPR
272 && SAME_BINFO_TYPE_P (BINFO_TYPE (binfo), probe))
273 || (code == PLUS_EXPR
274 && SAME_BINFO_TYPE_P (BINFO_TYPE (d_binfo), probe)));
c8094d83 275
00bfffa4
JM
276 if (binfo == d_binfo)
277 /* Nothing to do. */
278 return expr;
279
338d90b8
NS
280 if (code == MINUS_EXPR && v_binfo)
281 {
1f070f2b 282 error ("cannot convert from base %qT to derived type %qT via virtual base %qT",
6bc34b14 283 BINFO_TYPE (binfo), BINFO_TYPE (d_binfo), BINFO_TYPE (v_binfo));
338d90b8
NS
284 return error_mark_node;
285 }
1a588ad7 286
f576dfc4
JM
287 if (!want_pointer)
288 /* This must happen before the call to save_expr. */
289 expr = build_unary_op (ADDR_EXPR, expr, 0);
290
00bfffa4 291 offset = BINFO_OFFSET (binfo);
ca36f057 292 fixed_type_p = resolves_to_fixed_type_p (expr, &nonnull);
0e686aa6 293 target_type = code == PLUS_EXPR ? BINFO_TYPE (binfo) : BINFO_TYPE (d_binfo);
00bfffa4 294
d7981fd9
JM
295 /* Do we need to look in the vtable for the real offset? */
296 virtual_access = (v_binfo && fixed_type_p <= 0);
297
298 /* Do we need to check for a null pointer? */
0e686aa6
MM
299 if (want_pointer && !nonnull)
300 {
301 /* If we know the conversion will not actually change the value
302 of EXPR, then we can avoid testing the expression for NULL.
303 We have to avoid generating a COMPONENT_REF for a base class
304 field, because other parts of the compiler know that such
305 expressions are always non-NULL. */
306 if (!virtual_access && integer_zerop (offset))
307 return build_nop (build_pointer_type (target_type), expr);
308 null_test = error_mark_node;
309 }
00bfffa4 310
d7981fd9
JM
311 /* Protect against multiple evaluation if necessary. */
312 if (TREE_SIDE_EFFECTS (expr) && (null_test || virtual_access))
ca36f057 313 expr = save_expr (expr);
f2606a97 314
d7981fd9 315 /* Now that we've saved expr, build the real null test. */
00bfffa4 316 if (null_test)
471a58a9
AP
317 {
318 tree zero = cp_convert (TREE_TYPE (expr), integer_zero_node);
7866705a
SB
319 null_test = fold_build2 (NE_EXPR, boolean_type_node,
320 expr, zero);
471a58a9 321 }
00bfffa4
JM
322
323 /* If this is a simple base reference, express it as a COMPONENT_REF. */
d7981fd9 324 if (code == PLUS_EXPR && !virtual_access
00bfffa4
JM
325 /* We don't build base fields for empty bases, and they aren't very
326 interesting to the optimizers anyway. */
327 && !has_empty)
328 {
329 expr = build_indirect_ref (expr, NULL);
330 expr = build_simple_base_path (expr, binfo);
331 if (want_pointer)
442c8e31 332 expr = build_address (expr);
00bfffa4
JM
333 target_type = TREE_TYPE (expr);
334 goto out;
335 }
336
d7981fd9 337 if (virtual_access)
1a588ad7 338 {
338d90b8 339 /* Going via virtual base V_BINFO. We need the static offset
0cbd7506
MS
340 from V_BINFO to BINFO, and the dynamic offset from D_BINFO to
341 V_BINFO. That offset is an entry in D_BINFO's vtable. */
1f5a253a
NS
342 tree v_offset;
343
344 if (fixed_type_p < 0 && in_base_initializer)
345 {
2acb1af9
NS
346 /* In a base member initializer, we cannot rely on the
347 vtable being set up. We have to indirect via the
348 vtt_parm. */
6de9cd9a
DN
349 tree t;
350
2acb1af9 351 t = TREE_TYPE (TYPE_VFIELD (current_class_type));
6de9cd9a
DN
352 t = build_pointer_type (t);
353 v_offset = convert (t, current_vtt_parm);
6de9cd9a 354 v_offset = build_indirect_ref (v_offset, NULL);
1f5a253a
NS
355 }
356 else
357 v_offset = build_vfield_ref (build_indirect_ref (expr, NULL),
358 TREE_TYPE (TREE_TYPE (expr)));
c8094d83 359
f293ce4b
RS
360 v_offset = build2 (PLUS_EXPR, TREE_TYPE (v_offset),
361 v_offset, BINFO_VPTR_FIELD (v_binfo));
c8094d83 362 v_offset = build1 (NOP_EXPR,
338d90b8
NS
363 build_pointer_type (ptrdiff_type_node),
364 v_offset);
365 v_offset = build_indirect_ref (v_offset, NULL);
6de9cd9a
DN
366 TREE_CONSTANT (v_offset) = 1;
367 TREE_INVARIANT (v_offset) = 1;
f63ab951 368
7b6d72fc 369 offset = convert_to_integer (ptrdiff_type_node,
c8094d83 370 size_diffop (offset,
7b6d72fc 371 BINFO_OFFSET (v_binfo)));
8d08fdba 372
338d90b8 373 if (!integer_zerop (offset))
f293ce4b 374 v_offset = build2 (code, ptrdiff_type_node, v_offset, offset);
f2606a97
JM
375
376 if (fixed_type_p < 0)
377 /* Negative fixed_type_p means this is a constructor or destructor;
378 virtual base layout is fixed in in-charge [cd]tors, but not in
379 base [cd]tors. */
f293ce4b
RS
380 offset = build3 (COND_EXPR, ptrdiff_type_node,
381 build2 (EQ_EXPR, boolean_type_node,
382 current_in_charge_parm, integer_zero_node),
383 v_offset,
aa8f5c20
AP
384 convert_to_integer (ptrdiff_type_node,
385 BINFO_OFFSET (binfo)));
338d90b8
NS
386 else
387 offset = v_offset;
8d08fdba 388 }
8d08fdba 389
338d90b8
NS
390 target_type = cp_build_qualified_type
391 (target_type, cp_type_quals (TREE_TYPE (TREE_TYPE (expr))));
392 ptr_target_type = build_pointer_type (target_type);
393 if (want_pointer)
394 target_type = ptr_target_type;
c8094d83 395
338d90b8 396 expr = build1 (NOP_EXPR, ptr_target_type, expr);
fed3cef0 397
338d90b8 398 if (!integer_zerop (offset))
f293ce4b 399 expr = build2 (code, ptr_target_type, expr, offset);
8d08fdba 400 else
338d90b8 401 null_test = NULL;
c8094d83 402
338d90b8
NS
403 if (!want_pointer)
404 expr = build_indirect_ref (expr, NULL);
8d08fdba 405
00bfffa4 406 out:
338d90b8 407 if (null_test)
7866705a
SB
408 expr = fold_build3 (COND_EXPR, target_type, null_test, expr,
409 fold_build1 (NOP_EXPR, target_type,
410 integer_zero_node));
f2606a97 411
338d90b8 412 return expr;
8d08fdba
MS
413}
414
00bfffa4
JM
415/* Subroutine of build_base_path; EXPR and BINFO are as in that function.
416 Perform a derived-to-base conversion by recursively building up a
417 sequence of COMPONENT_REFs to the appropriate base fields. */
418
419static tree
420build_simple_base_path (tree expr, tree binfo)
421{
422 tree type = BINFO_TYPE (binfo);
fc6633e0 423 tree d_binfo = BINFO_INHERITANCE_CHAIN (binfo);
00bfffa4
JM
424 tree field;
425
00bfffa4
JM
426 if (d_binfo == NULL_TREE)
427 {
12a669d1 428 tree temp;
c8094d83 429
8dc2b103 430 gcc_assert (TYPE_MAIN_VARIANT (TREE_TYPE (expr)) == type);
c8094d83 431
12a669d1 432 /* Transform `(a, b).x' into `(*(a, &b)).x', `(a ? b : c).x'
0cbd7506
MS
433 into `(*(a ? &b : &c)).x', and so on. A COND_EXPR is only
434 an lvalue in the frontend; only _DECLs and _REFs are lvalues
435 in the backend. */
12a669d1
NS
436 temp = unary_complex_lvalue (ADDR_EXPR, expr);
437 if (temp)
438 expr = build_indirect_ref (temp, NULL);
439
00bfffa4
JM
440 return expr;
441 }
442
443 /* Recurse. */
444 expr = build_simple_base_path (expr, d_binfo);
445
446 for (field = TYPE_FIELDS (BINFO_TYPE (d_binfo));
447 field; field = TREE_CHAIN (field))
448 /* Is this the base field created by build_base_field? */
449 if (TREE_CODE (field) == FIELD_DECL
642124c6
RH
450 && DECL_FIELD_IS_BASE (field)
451 && TREE_TYPE (field) == type)
12a669d1
NS
452 {
453 /* We don't use build_class_member_access_expr here, as that
454 has unnecessary checks, and more importantly results in
455 recursive calls to dfs_walk_once. */
456 int type_quals = cp_type_quals (TREE_TYPE (expr));
457
458 expr = build3 (COMPONENT_REF,
459 cp_build_qualified_type (type, type_quals),
460 expr, field, NULL_TREE);
461 expr = fold_if_not_in_template (expr);
c8094d83 462
12a669d1
NS
463 /* Mark the expression const or volatile, as appropriate.
464 Even though we've dealt with the type above, we still have
465 to mark the expression itself. */
466 if (type_quals & TYPE_QUAL_CONST)
467 TREE_READONLY (expr) = 1;
468 if (type_quals & TYPE_QUAL_VOLATILE)
469 TREE_THIS_VOLATILE (expr) = 1;
c8094d83 470
12a669d1
NS
471 return expr;
472 }
00bfffa4
JM
473
474 /* Didn't find the base field?!? */
8dc2b103 475 gcc_unreachable ();
00bfffa4
JM
476}
477
08e17d9d
MM
478/* Convert OBJECT to the base TYPE. OBJECT is an expression whose
479 type is a class type or a pointer to a class type. In the former
480 case, TYPE is also a class type; in the latter it is another
481 pointer type. If CHECK_ACCESS is true, an error message is emitted
482 if TYPE is inaccessible. If OBJECT has pointer type, the value is
483 assumed to be non-NULL. */
50ad9642
MM
484
485tree
08e17d9d 486convert_to_base (tree object, tree type, bool check_access, bool nonnull)
50ad9642
MM
487{
488 tree binfo;
08e17d9d 489 tree object_type;
50ad9642 490
08e17d9d
MM
491 if (TYPE_PTR_P (TREE_TYPE (object)))
492 {
493 object_type = TREE_TYPE (TREE_TYPE (object));
494 type = TREE_TYPE (type);
495 }
496 else
497 object_type = TREE_TYPE (object);
498
499 binfo = lookup_base (object_type, type,
c8094d83 500 check_access ? ba_check : ba_unique,
50ad9642 501 NULL);
5bfc90de 502 if (!binfo || binfo == error_mark_node)
50ad9642
MM
503 return error_mark_node;
504
08e17d9d 505 return build_base_path (PLUS_EXPR, object, binfo, nonnull);
50ad9642
MM
506}
507
539ed333
NS
508/* EXPR is an expression with unqualified class type. BASE is a base
509 binfo of that class type. Returns EXPR, converted to the BASE
22ed7e5f
MM
510 type. This function assumes that EXPR is the most derived class;
511 therefore virtual bases can be found at their static offsets. */
512
513tree
514convert_to_base_statically (tree expr, tree base)
515{
516 tree expr_type;
517
518 expr_type = TREE_TYPE (expr);
539ed333 519 if (!SAME_BINFO_TYPE_P (BINFO_TYPE (base), expr_type))
22ed7e5f
MM
520 {
521 tree pointer_type;
522
523 pointer_type = build_pointer_type (expr_type);
524 expr = build_unary_op (ADDR_EXPR, expr, /*noconvert=*/1);
525 if (!integer_zerop (BINFO_OFFSET (base)))
c8094d83 526 expr = build2 (PLUS_EXPR, pointer_type, expr,
f293ce4b 527 build_nop (pointer_type, BINFO_OFFSET (base)));
22ed7e5f
MM
528 expr = build_nop (build_pointer_type (BINFO_TYPE (base)), expr);
529 expr = build1 (INDIRECT_REF, BINFO_TYPE (base), expr);
530 }
531
532 return expr;
533}
534
f8361147 535\f
981c353e
RH
536tree
537build_vfield_ref (tree datum, tree type)
538{
539 tree vfield, vcontext;
540
541 if (datum == error_mark_node)
542 return error_mark_node;
543
981c353e
RH
544 /* First, convert to the requested type. */
545 if (!same_type_ignoring_top_level_qualifiers_p (TREE_TYPE (datum), type))
08e17d9d
MM
546 datum = convert_to_base (datum, type, /*check_access=*/false,
547 /*nonnull=*/true);
981c353e
RH
548
549 /* Second, the requested type may not be the owner of its own vptr.
550 If not, convert to the base class that owns it. We cannot use
551 convert_to_base here, because VCONTEXT may appear more than once
5995ebfb 552 in the inheritance hierarchy of TYPE, and thus direct conversion
981c353e
RH
553 between the types may be ambiguous. Following the path back up
554 one step at a time via primary bases avoids the problem. */
555 vfield = TYPE_VFIELD (type);
556 vcontext = DECL_CONTEXT (vfield);
557 while (!same_type_ignoring_top_level_qualifiers_p (vcontext, type))
558 {
559 datum = build_simple_base_path (datum, CLASSTYPE_PRIMARY_BINFO (type));
560 type = TREE_TYPE (datum);
561 }
562
563 return build3 (COMPONENT_REF, TREE_TYPE (vfield), datum, vfield, NULL_TREE);
564}
565
8d08fdba 566/* Given an object INSTANCE, return an expression which yields the
67231816
RH
567 vtable element corresponding to INDEX. There are many special
568 cases for INSTANCE which we take care of here, mainly to avoid
569 creating extra tree nodes when we don't have to. */
e92cc029 570
4a8d0c9c 571static tree
94edc4ab 572build_vtbl_ref_1 (tree instance, tree idx)
8d08fdba 573{
f63ab951
JM
574 tree aref;
575 tree vtbl = NULL_TREE;
8d08fdba 576
f63ab951
JM
577 /* Try to figure out what a reference refers to, and
578 access its virtual function table directly. */
579
580 int cdtorp = 0;
581 tree fixed_type = fixed_type_or_null (instance, NULL, &cdtorp);
582
ee76b931 583 tree basetype = non_reference (TREE_TYPE (instance));
8d08fdba 584
f63ab951 585 if (fixed_type && !cdtorp)
8d08fdba 586 {
f63ab951 587 tree binfo = lookup_base (fixed_type, basetype,
18e4be85 588 ba_unique | ba_quiet, NULL);
f63ab951 589 if (binfo)
6de9cd9a 590 vtbl = unshare_expr (BINFO_VTABLE (binfo));
f63ab951 591 }
8d08fdba 592
f63ab951 593 if (!vtbl)
dbbf88d1 594 vtbl = build_vfield_ref (instance, basetype);
c8094d83 595
e3417fcd 596 assemble_external (vtbl);
a1dd0d36 597
8d08fdba 598 aref = build_array_ref (vtbl, idx);
6de9cd9a
DN
599 TREE_CONSTANT (aref) |= TREE_CONSTANT (vtbl) && TREE_CONSTANT (idx);
600 TREE_INVARIANT (aref) = TREE_CONSTANT (aref);
8d08fdba 601
c4372ef4 602 return aref;
8d08fdba
MS
603}
604
4a8d0c9c 605tree
94edc4ab 606build_vtbl_ref (tree instance, tree idx)
4a8d0c9c
RH
607{
608 tree aref = build_vtbl_ref_1 (instance, idx);
609
4a8d0c9c
RH
610 return aref;
611}
612
0f59171d
RH
613/* Given a stable object pointer INSTANCE_PTR, return an expression which
614 yields a function pointer corresponding to vtable element INDEX. */
67231816
RH
615
616tree
0f59171d 617build_vfn_ref (tree instance_ptr, tree idx)
67231816 618{
0f59171d
RH
619 tree aref;
620
621 aref = build_vtbl_ref_1 (build_indirect_ref (instance_ptr, 0), idx);
67231816
RH
622
623 /* When using function descriptors, the address of the
624 vtable entry is treated as a function pointer. */
625 if (TARGET_VTABLE_USES_DESCRIPTORS)
4a8d0c9c 626 aref = build1 (NOP_EXPR, TREE_TYPE (aref),
67231816
RH
627 build_unary_op (ADDR_EXPR, aref, /*noconvert=*/1));
628
0f59171d 629 /* Remember this as a method reference, for later devirtualization. */
f293ce4b 630 aref = build3 (OBJ_TYPE_REF, TREE_TYPE (aref), aref, instance_ptr, idx);
0f59171d 631
67231816
RH
632 return aref;
633}
634
669ec2b4
JM
635/* Return the name of the virtual function table (as an IDENTIFIER_NODE)
636 for the given TYPE. */
637
638static tree
94edc4ab 639get_vtable_name (tree type)
669ec2b4 640{
1f84ec23 641 return mangle_vtbl_for_type (type);
669ec2b4
JM
642}
643
4684cd27
MM
644/* DECL is an entity associated with TYPE, like a virtual table or an
645 implicitly generated constructor. Determine whether or not DECL
646 should have external or internal linkage at the object file
647 level. This routine does not deal with COMDAT linkage and other
648 similar complexities; it simply sets TREE_PUBLIC if it possible for
649 entities in other translation units to contain copies of DECL, in
650 the abstract. */
651
652void
653set_linkage_according_to_type (tree type, tree decl)
654{
655 /* If TYPE involves a local class in a function with internal
656 linkage, then DECL should have internal linkage too. Other local
657 classes have no linkage -- but if their containing functions
658 have external linkage, it makes sense for DECL to have external
659 linkage too. That will allow template definitions to be merged,
660 for example. */
661 if (no_linkage_check (type, /*relaxed_p=*/true))
662 {
663 TREE_PUBLIC (decl) = 0;
664 DECL_INTERFACE_KNOWN (decl) = 1;
665 }
666 else
667 TREE_PUBLIC (decl) = 1;
668}
669
459c43ad
MM
670/* Create a VAR_DECL for a primary or secondary vtable for CLASS_TYPE.
671 (For a secondary vtable for B-in-D, CLASS_TYPE should be D, not B.)
672 Use NAME for the name of the vtable, and VTABLE_TYPE for its type. */
b9f39201
MM
673
674static tree
94edc4ab 675build_vtable (tree class_type, tree name, tree vtable_type)
b9f39201
MM
676{
677 tree decl;
678
679 decl = build_lang_decl (VAR_DECL, name, vtable_type);
90ecce3e
JM
680 /* vtable names are already mangled; give them their DECL_ASSEMBLER_NAME
681 now to avoid confusion in mangle_decl. */
682 SET_DECL_ASSEMBLER_NAME (decl, name);
b9f39201
MM
683 DECL_CONTEXT (decl) = class_type;
684 DECL_ARTIFICIAL (decl) = 1;
685 TREE_STATIC (decl) = 1;
b9f39201 686 TREE_READONLY (decl) = 1;
b9f39201 687 DECL_VIRTUAL_P (decl) = 1;
a6f5e048 688 DECL_ALIGN (decl) = TARGET_VTABLE_ENTRY_ALIGN;
d35543c0 689 DECL_VTABLE_OR_VTT_P (decl) = 1;
78d55cc8
JM
690 /* At one time the vtable info was grabbed 2 words at a time. This
691 fails on sparc unless you have 8-byte alignment. (tiemann) */
692 DECL_ALIGN (decl) = MAX (TYPE_ALIGN (double_type_node),
693 DECL_ALIGN (decl));
4684cd27
MM
694 set_linkage_according_to_type (class_type, decl);
695 /* The vtable has not been defined -- yet. */
696 DECL_EXTERNAL (decl) = 1;
697 DECL_NOT_REALLY_EXTERN (decl) = 1;
698
78e0d62b
RH
699 /* Mark the VAR_DECL node representing the vtable itself as a
700 "gratuitous" one, thereby forcing dwarfout.c to ignore it. It
701 is rather important that such things be ignored because any
702 effort to actually generate DWARF for them will run into
703 trouble when/if we encounter code like:
c8094d83 704
78e0d62b
RH
705 #pragma interface
706 struct S { virtual void member (); };
c8094d83 707
78e0d62b
RH
708 because the artificial declaration of the vtable itself (as
709 manufactured by the g++ front end) will say that the vtable is
710 a static member of `S' but only *after* the debug output for
711 the definition of `S' has already been output. This causes
712 grief because the DWARF entry for the definition of the vtable
713 will try to refer back to an earlier *declaration* of the
714 vtable as a static member of `S' and there won't be one. We
715 might be able to arrange to have the "vtable static member"
716 attached to the member list for `S' before the debug info for
717 `S' get written (which would solve the problem) but that would
718 require more intrusive changes to the g++ front end. */
719 DECL_IGNORED_P (decl) = 1;
78d55cc8 720
b9f39201
MM
721 return decl;
722}
723
1aa4ccd4
NS
724/* Get the VAR_DECL of the vtable for TYPE. TYPE need not be polymorphic,
725 or even complete. If this does not exist, create it. If COMPLETE is
838dfd8a 726 nonzero, then complete the definition of it -- that will render it
1aa4ccd4
NS
727 impossible to actually build the vtable, but is useful to get at those
728 which are known to exist in the runtime. */
729
c8094d83 730tree
94edc4ab 731get_vtable_decl (tree type, int complete)
1aa4ccd4 732{
548502d3
MM
733 tree decl;
734
735 if (CLASSTYPE_VTABLES (type))
736 return CLASSTYPE_VTABLES (type);
c8094d83 737
d1a74aa7 738 decl = build_vtable (type, get_vtable_name (type), vtbl_type_node);
548502d3
MM
739 CLASSTYPE_VTABLES (type) = decl;
740
1aa4ccd4 741 if (complete)
217f4eb9
MM
742 {
743 DECL_EXTERNAL (decl) = 1;
d174af6c 744 finish_decl (decl, NULL_TREE, NULL_TREE);
217f4eb9 745 }
1aa4ccd4 746
1aa4ccd4
NS
747 return decl;
748}
749
28531dd0
MM
750/* Build the primary virtual function table for TYPE. If BINFO is
751 non-NULL, build the vtable starting with the initial approximation
752 that it is the same as the one which is the head of the association
838dfd8a 753 list. Returns a nonzero value if a new vtable is actually
28531dd0 754 created. */
e92cc029 755
28531dd0 756static int
94edc4ab 757build_primary_vtable (tree binfo, tree type)
8d08fdba 758{
31f8e4f3
MM
759 tree decl;
760 tree virtuals;
8d08fdba 761
1aa4ccd4 762 decl = get_vtable_decl (type, /*complete=*/0);
c8094d83 763
8d08fdba
MS
764 if (binfo)
765 {
dbbf88d1 766 if (BINFO_NEW_VTABLE_MARKED (binfo))
0533d788
MM
767 /* We have already created a vtable for this base, so there's
768 no need to do it again. */
28531dd0 769 return 0;
c8094d83 770
d1f05f93 771 virtuals = copy_list (BINFO_VIRTUALS (binfo));
c35cce41
MM
772 TREE_TYPE (decl) = TREE_TYPE (get_vtbl_decl_for_binfo (binfo));
773 DECL_SIZE (decl) = TYPE_SIZE (TREE_TYPE (decl));
774 DECL_SIZE_UNIT (decl) = TYPE_SIZE_UNIT (TREE_TYPE (decl));
8d08fdba
MS
775 }
776 else
777 {
50bc768d 778 gcc_assert (TREE_TYPE (decl) == vtbl_type_node);
8d08fdba 779 virtuals = NULL_TREE;
8d08fdba
MS
780 }
781
782#ifdef GATHER_STATISTICS
783 n_vtables += 1;
784 n_vtable_elems += list_length (virtuals);
785#endif
786
8d08fdba
MS
787 /* Initialize the association list for this type, based
788 on our first approximation. */
604a3205
NS
789 BINFO_VTABLE (TYPE_BINFO (type)) = decl;
790 BINFO_VIRTUALS (TYPE_BINFO (type)) = virtuals;
dbbf88d1 791 SET_BINFO_NEW_VTABLE_MARKED (TYPE_BINFO (type));
28531dd0 792 return 1;
8d08fdba
MS
793}
794
3461fba7 795/* Give BINFO a new virtual function table which is initialized
8d08fdba
MS
796 with a skeleton-copy of its original initialization. The only
797 entry that changes is the `delta' entry, so we can really
798 share a lot of structure.
799
3461fba7 800 FOR_TYPE is the most derived type which caused this table to
8d08fdba
MS
801 be needed.
802
838dfd8a 803 Returns nonzero if we haven't met BINFO before.
2636fde4
JM
804
805 The order in which vtables are built (by calling this function) for
806 an object must remain the same, otherwise a binary incompatibility
807 can result. */
e92cc029 808
28531dd0 809static int
dbbf88d1 810build_secondary_vtable (tree binfo)
8d08fdba 811{
dbbf88d1 812 if (BINFO_NEW_VTABLE_MARKED (binfo))
0533d788
MM
813 /* We already created a vtable for this base. There's no need to
814 do it again. */
28531dd0 815 return 0;
0533d788 816
8d7a5379
MM
817 /* Remember that we've created a vtable for this BINFO, so that we
818 don't try to do so again. */
dbbf88d1 819 SET_BINFO_NEW_VTABLE_MARKED (binfo);
c8094d83 820
8d7a5379 821 /* Make fresh virtual list, so we can smash it later. */
d1f05f93 822 BINFO_VIRTUALS (binfo) = copy_list (BINFO_VIRTUALS (binfo));
8d7a5379 823
3461fba7
NS
824 /* Secondary vtables are laid out as part of the same structure as
825 the primary vtable. */
826 BINFO_VTABLE (binfo) = NULL_TREE;
28531dd0 827 return 1;
8d08fdba
MS
828}
829
28531dd0 830/* Create a new vtable for BINFO which is the hierarchy dominated by
838dfd8a 831 T. Return nonzero if we actually created a new vtable. */
28531dd0
MM
832
833static int
94edc4ab 834make_new_vtable (tree t, tree binfo)
28531dd0
MM
835{
836 if (binfo == TYPE_BINFO (t))
837 /* In this case, it is *type*'s vtable we are modifying. We start
d0cd8b44 838 with the approximation that its vtable is that of the
28531dd0 839 immediate base class. */
981c353e 840 return build_primary_vtable (binfo, t);
28531dd0
MM
841 else
842 /* This is our very own copy of `basetype' to play with. Later,
843 we will fill in all the virtual functions that override the
844 virtual functions in these base classes which are not defined
845 by the current type. */
dbbf88d1 846 return build_secondary_vtable (binfo);
28531dd0
MM
847}
848
849/* Make *VIRTUALS, an entry on the BINFO_VIRTUALS list for BINFO
850 (which is in the hierarchy dominated by T) list FNDECL as its
4e7512c9
MM
851 BV_FN. DELTA is the required constant adjustment from the `this'
852 pointer where the vtable entry appears to the `this' required when
853 the function is actually called. */
8d08fdba
MS
854
855static void
94edc4ab 856modify_vtable_entry (tree t,
0cbd7506
MS
857 tree binfo,
858 tree fndecl,
859 tree delta,
860 tree *virtuals)
8d08fdba 861{
28531dd0 862 tree v;
c0bbf652 863
28531dd0 864 v = *virtuals;
c0bbf652 865
5e19c053 866 if (fndecl != BV_FN (v)
4e7512c9 867 || !tree_int_cst_equal (delta, BV_DELTA (v)))
c0bbf652 868 {
28531dd0
MM
869 /* We need a new vtable for BINFO. */
870 if (make_new_vtable (t, binfo))
871 {
872 /* If we really did make a new vtable, we also made a copy
873 of the BINFO_VIRTUALS list. Now, we have to find the
874 corresponding entry in that list. */
875 *virtuals = BINFO_VIRTUALS (binfo);
5e19c053 876 while (BV_FN (*virtuals) != BV_FN (v))
28531dd0
MM
877 *virtuals = TREE_CHAIN (*virtuals);
878 v = *virtuals;
879 }
8d08fdba 880
5e19c053 881 BV_DELTA (v) = delta;
aabb4cd6 882 BV_VCALL_INDEX (v) = NULL_TREE;
5e19c053 883 BV_FN (v) = fndecl;
8d08fdba 884 }
8d08fdba
MS
885}
886
8d08fdba 887\f
b2a9b208 888/* Add method METHOD to class TYPE. If USING_DECL is non-null, it is
b77fe7b4
NS
889 the USING_DECL naming METHOD. Returns true if the method could be
890 added to the method vec. */
e92cc029 891
b77fe7b4 892bool
b2a9b208 893add_method (tree type, tree method, tree using_decl)
8d08fdba 894{
9ba5ff0f 895 unsigned slot;
90ea9897 896 tree overload;
b54a07e8
NS
897 bool template_conv_p = false;
898 bool conv_p;
d4e6fecb 899 VEC(tree,gc) *method_vec;
aaaa46d2 900 bool complete_p;
9ba5ff0f
NS
901 bool insert_p = false;
902 tree current_fns;
ac2b3222
AP
903
904 if (method == error_mark_node)
b77fe7b4 905 return false;
aaaa46d2
MM
906
907 complete_p = COMPLETE_TYPE_P (type);
b54a07e8
NS
908 conv_p = DECL_CONV_FN_P (method);
909 if (conv_p)
910 template_conv_p = (TREE_CODE (method) == TEMPLATE_DECL
911 && DECL_TEMPLATE_CONV_FN_P (method));
452a394b 912
452a394b 913 method_vec = CLASSTYPE_METHOD_VEC (type);
aaaa46d2
MM
914 if (!method_vec)
915 {
916 /* Make a new method vector. We start with 8 entries. We must
917 allocate at least two (for constructors and destructors), and
918 we're going to end up with an assignment operator at some
919 point as well. */
d4e6fecb 920 method_vec = VEC_alloc (tree, gc, 8);
aaaa46d2
MM
921 /* Create slots for constructors and destructors. */
922 VEC_quick_push (tree, method_vec, NULL_TREE);
923 VEC_quick_push (tree, method_vec, NULL_TREE);
924 CLASSTYPE_METHOD_VEC (type) = method_vec;
925 }
926
7137605e
MM
927 /* Maintain TYPE_HAS_CONSTRUCTOR, etc. */
928 grok_special_member_properties (method);
929
452a394b
MM
930 /* Constructors and destructors go in special slots. */
931 if (DECL_MAYBE_IN_CHARGE_CONSTRUCTOR_P (method))
932 slot = CLASSTYPE_CONSTRUCTOR_SLOT;
933 else if (DECL_MAYBE_IN_CHARGE_DESTRUCTOR_P (method))
4b0d3cbe
MM
934 {
935 slot = CLASSTYPE_DESTRUCTOR_SLOT;
c8094d83 936
f5c28a15 937 if (TYPE_FOR_JAVA (type))
9f4faeae
MM
938 {
939 if (!DECL_ARTIFICIAL (method))
940 error ("Java class %qT cannot have a destructor", type);
941 else if (TYPE_HAS_NONTRIVIAL_DESTRUCTOR (type))
942 error ("Java class %qT cannot have an implicit non-trivial "
943 "destructor",
944 type);
945 }
4b0d3cbe 946 }
452a394b 947 else
61a127b3 948 {
aaaa46d2
MM
949 tree m;
950
9ba5ff0f 951 insert_p = true;
452a394b 952 /* See if we already have an entry with this name. */
c8094d83 953 for (slot = CLASSTYPE_FIRST_CONVERSION_SLOT;
9ba5ff0f 954 VEC_iterate (tree, method_vec, slot, m);
aaaa46d2 955 ++slot)
5dd236e2 956 {
5dd236e2 957 m = OVL_CURRENT (m);
5dd236e2
NS
958 if (template_conv_p)
959 {
aaaa46d2
MM
960 if (TREE_CODE (m) == TEMPLATE_DECL
961 && DECL_TEMPLATE_CONV_FN_P (m))
962 insert_p = false;
5dd236e2
NS
963 break;
964 }
aaaa46d2 965 if (conv_p && !DECL_CONV_FN_P (m))
5dd236e2 966 break;
aaaa46d2 967 if (DECL_NAME (m) == DECL_NAME (method))
452a394b 968 {
aaaa46d2
MM
969 insert_p = false;
970 break;
8d08fdba 971 }
aaaa46d2
MM
972 if (complete_p
973 && !DECL_CONV_FN_P (m)
974 && DECL_NAME (m) > DECL_NAME (method))
975 break;
61a127b3 976 }
452a394b 977 }
9ba5ff0f 978 current_fns = insert_p ? NULL_TREE : VEC_index (tree, method_vec, slot);
c8094d83 979
c353b8e3 980 if (processing_template_decl)
452a394b
MM
981 /* TYPE is a template class. Don't issue any errors now; wait
982 until instantiation time to complain. */
983 ;
984 else
985 {
986 tree fns;
03017874 987
452a394b 988 /* Check to see if we've already got this method. */
9ba5ff0f 989 for (fns = current_fns; fns; fns = OVL_NEXT (fns))
452a394b
MM
990 {
991 tree fn = OVL_CURRENT (fns);
6b20b203
MM
992 tree fn_type;
993 tree method_type;
f0ab6bf2
MM
994 tree parms1;
995 tree parms2;
f0ab6bf2 996
452a394b
MM
997 if (TREE_CODE (fn) != TREE_CODE (method))
998 continue;
03017874 999
f0ab6bf2
MM
1000 /* [over.load] Member function declarations with the
1001 same name and the same parameter types cannot be
1002 overloaded if any of them is a static member
1003 function declaration.
1004
1005 [namespace.udecl] When a using-declaration brings names
1006 from a base class into a derived class scope, member
1007 functions in the derived class override and/or hide member
1008 functions with the same name and parameter types in a base
1009 class (rather than conflicting). */
6b20b203
MM
1010 fn_type = TREE_TYPE (fn);
1011 method_type = TREE_TYPE (method);
1012 parms1 = TYPE_ARG_TYPES (fn_type);
1013 parms2 = TYPE_ARG_TYPES (method_type);
f0ab6bf2
MM
1014
1015 /* Compare the quals on the 'this' parm. Don't compare
1016 the whole types, as used functions are treated as
1017 coming from the using class in overload resolution. */
1018 if (! DECL_STATIC_FUNCTION_P (fn)
1019 && ! DECL_STATIC_FUNCTION_P (method)
1020 && (TYPE_QUALS (TREE_TYPE (TREE_VALUE (parms1)))
1021 != TYPE_QUALS (TREE_TYPE (TREE_VALUE (parms2)))))
6b20b203 1022 continue;
c8094d83 1023
6b20b203
MM
1024 /* For templates, the return type and template parameters
1025 must be identical. */
8a188e24 1026 if (TREE_CODE (fn) == TEMPLATE_DECL
6b20b203
MM
1027 && (!same_type_p (TREE_TYPE (fn_type),
1028 TREE_TYPE (method_type))
1029 || !comp_template_parms (DECL_TEMPLATE_PARMS (fn),
1030 DECL_TEMPLATE_PARMS (method))))
1031 continue;
c8094d83 1032
f0ab6bf2
MM
1033 if (! DECL_STATIC_FUNCTION_P (fn))
1034 parms1 = TREE_CHAIN (parms1);
1035 if (! DECL_STATIC_FUNCTION_P (method))
1036 parms2 = TREE_CHAIN (parms2);
1037
6b20b203 1038 if (compparms (parms1, parms2)
c8094d83 1039 && (!DECL_CONV_FN_P (fn)
6b20b203
MM
1040 || same_type_p (TREE_TYPE (fn_type),
1041 TREE_TYPE (method_type))))
452a394b 1042 {
b2a9b208
NS
1043 if (using_decl)
1044 {
1045 if (DECL_CONTEXT (fn) == type)
1046 /* Defer to the local function. */
b77fe7b4 1047 return false;
b2a9b208 1048 if (DECL_CONTEXT (fn) == DECL_CONTEXT (method))
dee15844 1049 error ("repeated using declaration %q+D", using_decl);
b2a9b208 1050 else
dee15844
JM
1051 error ("using declaration %q+D conflicts with a previous using declaration",
1052 using_decl);
b2a9b208 1053 }
f0ab6bf2 1054 else
03017874 1055 {
dee15844
JM
1056 error ("%q+#D cannot be overloaded", method);
1057 error ("with %q+#D", fn);
03017874 1058 }
c8094d83 1059
b2a9b208
NS
1060 /* We don't call duplicate_decls here to merge the
1061 declarations because that will confuse things if the
1062 methods have inline definitions. In particular, we
1063 will crash while processing the definitions. */
b77fe7b4 1064 return false;
452a394b 1065 }
03017874 1066 }
452a394b 1067 }
03017874 1068
3db45ab5 1069 /* A class should never have more than one destructor. */
357d956e
MM
1070 if (current_fns && DECL_MAYBE_IN_CHARGE_DESTRUCTOR_P (method))
1071 return false;
1072
c8094d83 1073 /* Add the new binding. */
9ba5ff0f 1074 overload = build_overload (method, current_fns);
c8094d83 1075
357d956e
MM
1076 if (conv_p)
1077 TYPE_HAS_CONVERSION (type) = 1;
1078 else if (slot >= CLASSTYPE_FIRST_CONVERSION_SLOT && !complete_p)
90ea9897
MM
1079 push_class_level_binding (DECL_NAME (method), overload);
1080
9ba5ff0f
NS
1081 if (insert_p)
1082 {
1083 /* We only expect to add few methods in the COMPLETE_P case, so
1084 just make room for one more method in that case. */
d4e6fecb 1085 if (VEC_reserve (tree, gc, method_vec, complete_p ? -1 : 1))
9ba5ff0f
NS
1086 CLASSTYPE_METHOD_VEC (type) = method_vec;
1087 if (slot == VEC_length (tree, method_vec))
1088 VEC_quick_push (tree, method_vec, overload);
1089 else
1090 VEC_quick_insert (tree, method_vec, slot, overload);
1091 }
1092 else
03fd3f84 1093 /* Replace the current slot. */
9ba5ff0f 1094 VEC_replace (tree, method_vec, slot, overload);
b77fe7b4 1095 return true;
8d08fdba
MS
1096}
1097
1098/* Subroutines of finish_struct. */
1099
aa52c1ff
JM
1100/* Change the access of FDECL to ACCESS in T. Return 1 if change was
1101 legit, otherwise return 0. */
e92cc029 1102
8d08fdba 1103static int
94edc4ab 1104alter_access (tree t, tree fdecl, tree access)
8d08fdba 1105{
721c3b42
MM
1106 tree elem;
1107
1108 if (!DECL_LANG_SPECIFIC (fdecl))
1109 retrofit_lang_decl (fdecl);
1110
50bc768d 1111 gcc_assert (!DECL_DISCRIMINATOR_P (fdecl));
8e4ce833 1112
721c3b42 1113 elem = purpose_member (t, DECL_ACCESS (fdecl));
38afd588 1114 if (elem)
8d08fdba 1115 {
38afd588 1116 if (TREE_VALUE (elem) != access)
8d08fdba 1117 {
38afd588 1118 if (TREE_CODE (TREE_TYPE (fdecl)) == FUNCTION_DECL)
dee15844
JM
1119 error ("conflicting access specifications for method"
1120 " %q+D, ignored", TREE_TYPE (fdecl));
38afd588 1121 else
1f070f2b 1122 error ("conflicting access specifications for field %qE, ignored",
4460cef2 1123 DECL_NAME (fdecl));
8d08fdba
MS
1124 }
1125 else
430bb96b
JL
1126 {
1127 /* They're changing the access to the same thing they changed
1128 it to before. That's OK. */
1129 ;
1130 }
db5ae43f 1131 }
38afd588 1132 else
8d08fdba 1133 {
6df5158a 1134 perform_or_defer_access_check (TYPE_BINFO (t), fdecl);
be99da77 1135 DECL_ACCESS (fdecl) = tree_cons (t, access, DECL_ACCESS (fdecl));
8d08fdba
MS
1136 return 1;
1137 }
1138 return 0;
1139}
1140
58010b57 1141/* Process the USING_DECL, which is a member of T. */
79ad62b2 1142
e9659ab0 1143static void
94edc4ab 1144handle_using_decl (tree using_decl, tree t)
79ad62b2 1145{
98ed9dae 1146 tree decl = USING_DECL_DECLS (using_decl);
79ad62b2
MM
1147 tree name = DECL_NAME (using_decl);
1148 tree access
1149 = TREE_PRIVATE (using_decl) ? access_private_node
1150 : TREE_PROTECTED (using_decl) ? access_protected_node
1151 : access_public_node;
79ad62b2 1152 tree flist = NULL_TREE;
aa52c1ff 1153 tree old_value;
79ad62b2 1154
98ed9dae 1155 gcc_assert (!processing_template_decl && decl);
c8094d83 1156
39fb05d0 1157 old_value = lookup_member (t, name, /*protect=*/0, /*want_type=*/false);
aa52c1ff 1158 if (old_value)
79ad62b2 1159 {
aa52c1ff
JM
1160 if (is_overloaded_fn (old_value))
1161 old_value = OVL_CURRENT (old_value);
1162
1163 if (DECL_P (old_value) && DECL_CONTEXT (old_value) == t)
1164 /* OK */;
1165 else
1166 old_value = NULL_TREE;
79ad62b2 1167 }
c8094d83 1168
6e976965 1169 cp_emit_debug_info_for_using (decl, USING_DECL_SCOPE (using_decl));
c8094d83 1170
98ed9dae
NS
1171 if (is_overloaded_fn (decl))
1172 flist = decl;
aa52c1ff
JM
1173
1174 if (! old_value)
1175 ;
1176 else if (is_overloaded_fn (old_value))
79ad62b2 1177 {
aa52c1ff
JM
1178 if (flist)
1179 /* It's OK to use functions from a base when there are functions with
1180 the same name already present in the current class. */;
1181 else
79ad62b2 1182 {
dee15844
JM
1183 error ("%q+D invalid in %q#T", using_decl, t);
1184 error (" because of local method %q+#D with same name",
1185 OVL_CURRENT (old_value));
aa52c1ff 1186 return;
79ad62b2
MM
1187 }
1188 }
186c0fbe 1189 else if (!DECL_ARTIFICIAL (old_value))
aa52c1ff 1190 {
dee15844
JM
1191 error ("%q+D invalid in %q#T", using_decl, t);
1192 error (" because of local member %q+#D with same name", old_value);
aa52c1ff
JM
1193 return;
1194 }
c8094d83 1195
f4f206f4 1196 /* Make type T see field decl FDECL with access ACCESS. */
aa52c1ff
JM
1197 if (flist)
1198 for (; flist; flist = OVL_NEXT (flist))
1199 {
b2a9b208 1200 add_method (t, OVL_CURRENT (flist), using_decl);
aa52c1ff
JM
1201 alter_access (t, OVL_CURRENT (flist), access);
1202 }
1203 else
98ed9dae 1204 alter_access (t, decl, access);
79ad62b2 1205}
8d08fdba 1206\f
e5e459bf
AO
1207/* Run through the base classes of T, updating CANT_HAVE_CONST_CTOR_P,
1208 and NO_CONST_ASN_REF_P. Also set flag bits in T based on
1209 properties of the bases. */
8d08fdba 1210
607cf131 1211static void
94edc4ab 1212check_bases (tree t,
0cbd7506
MS
1213 int* cant_have_const_ctor_p,
1214 int* no_const_asn_ref_p)
8d08fdba 1215{
607cf131 1216 int i;
0fb3018c 1217 int seen_non_virtual_nearly_empty_base_p;
fa743e8c
NS
1218 tree base_binfo;
1219 tree binfo;
8d08fdba 1220
0fb3018c 1221 seen_non_virtual_nearly_empty_base_p = 0;
607cf131 1222
fa743e8c
NS
1223 for (binfo = TYPE_BINFO (t), i = 0;
1224 BINFO_BASE_ITERATE (binfo, i, base_binfo); i++)
8d08fdba 1225 {
fa743e8c 1226 tree basetype = TREE_TYPE (base_binfo);
9a71c18b 1227
50bc768d 1228 gcc_assert (COMPLETE_TYPE_P (basetype));
c8094d83 1229
4c6b7393 1230 /* Effective C++ rule 14. We only need to check TYPE_POLYMORPHIC_P
607cf131
MM
1231 here because the case of virtual functions but non-virtual
1232 dtor is handled in finish_struct_1. */
74fa0285
GDR
1233 if (!TYPE_POLYMORPHIC_P (basetype))
1234 warning (OPT_Weffc__,
3db45ab5 1235 "base class %q#T has a non-virtual destructor", basetype);
8d08fdba 1236
607cf131
MM
1237 /* If the base class doesn't have copy constructors or
1238 assignment operators that take const references, then the
1239 derived class cannot have such a member automatically
1240 generated. */
1241 if (! TYPE_HAS_CONST_INIT_REF (basetype))
1242 *cant_have_const_ctor_p = 1;
1243 if (TYPE_HAS_ASSIGN_REF (basetype)
1244 && !TYPE_HAS_CONST_ASSIGN_REF (basetype))
1245 *no_const_asn_ref_p = 1;
8d08fdba 1246
809e3e7f 1247 if (BINFO_VIRTUAL_P (base_binfo))
00a17e31 1248 /* A virtual base does not effect nearly emptiness. */
0fb3018c 1249 ;
f9c528ea 1250 else if (CLASSTYPE_NEARLY_EMPTY_P (basetype))
0fb3018c
NS
1251 {
1252 if (seen_non_virtual_nearly_empty_base_p)
1253 /* And if there is more than one nearly empty base, then the
1254 derived class is not nearly empty either. */
1255 CLASSTYPE_NEARLY_EMPTY_P (t) = 0;
1256 else
00a17e31 1257 /* Remember we've seen one. */
0fb3018c
NS
1258 seen_non_virtual_nearly_empty_base_p = 1;
1259 }
1260 else if (!is_empty_class (basetype))
1261 /* If the base class is not empty or nearly empty, then this
1262 class cannot be nearly empty. */
1263 CLASSTYPE_NEARLY_EMPTY_P (t) = 0;
f9c528ea 1264
607cf131
MM
1265 /* A lot of properties from the bases also apply to the derived
1266 class. */
8d08fdba 1267 TYPE_NEEDS_CONSTRUCTING (t) |= TYPE_NEEDS_CONSTRUCTING (basetype);
c8094d83 1268 TYPE_HAS_NONTRIVIAL_DESTRUCTOR (t)
834c6dff 1269 |= TYPE_HAS_NONTRIVIAL_DESTRUCTOR (basetype);
c8094d83 1270 TYPE_HAS_COMPLEX_ASSIGN_REF (t)
607cf131 1271 |= TYPE_HAS_COMPLEX_ASSIGN_REF (basetype);
e8abc66f 1272 TYPE_HAS_COMPLEX_INIT_REF (t) |= TYPE_HAS_COMPLEX_INIT_REF (basetype);
4c6b7393 1273 TYPE_POLYMORPHIC_P (t) |= TYPE_POLYMORPHIC_P (basetype);
c8094d83 1274 CLASSTYPE_CONTAINS_EMPTY_CLASS_P (t)
5ec1192e 1275 |= CLASSTYPE_CONTAINS_EMPTY_CLASS_P (basetype);
607cf131
MM
1276 }
1277}
1278
fc6633e0
NS
1279/* Determine all the primary bases within T. Sets BINFO_PRIMARY_BASE_P for
1280 those that are primaries. Sets BINFO_LOST_PRIMARY_P for those
1281 that have had a nearly-empty virtual primary base stolen by some
77880ae4 1282 other base in the hierarchy. Determines CLASSTYPE_PRIMARY_BASE for
fc6633e0 1283 T. */
c35cce41
MM
1284
1285static void
fc6633e0 1286determine_primary_bases (tree t)
c35cce41 1287{
fc6633e0
NS
1288 unsigned i;
1289 tree primary = NULL_TREE;
1290 tree type_binfo = TYPE_BINFO (t);
1291 tree base_binfo;
1292
1293 /* Determine the primary bases of our bases. */
1294 for (base_binfo = TREE_CHAIN (type_binfo); base_binfo;
1295 base_binfo = TREE_CHAIN (base_binfo))
c35cce41 1296 {
fc6633e0 1297 tree primary = CLASSTYPE_PRIMARY_BINFO (BINFO_TYPE (base_binfo));
c35cce41 1298
fc6633e0
NS
1299 /* See if we're the non-virtual primary of our inheritance
1300 chain. */
1301 if (!BINFO_VIRTUAL_P (base_binfo))
dbbf88d1 1302 {
fc6633e0
NS
1303 tree parent = BINFO_INHERITANCE_CHAIN (base_binfo);
1304 tree parent_primary = CLASSTYPE_PRIMARY_BINFO (BINFO_TYPE (parent));
c8094d83 1305
fc6633e0 1306 if (parent_primary
539ed333
NS
1307 && SAME_BINFO_TYPE_P (BINFO_TYPE (base_binfo),
1308 BINFO_TYPE (parent_primary)))
fc6633e0
NS
1309 /* We are the primary binfo. */
1310 BINFO_PRIMARY_P (base_binfo) = 1;
1311 }
1312 /* Determine if we have a virtual primary base, and mark it so.
1313 */
1314 if (primary && BINFO_VIRTUAL_P (primary))
1315 {
1316 tree this_primary = copied_binfo (primary, base_binfo);
1317
1318 if (BINFO_PRIMARY_P (this_primary))
1319 /* Someone already claimed this base. */
1320 BINFO_LOST_PRIMARY_P (base_binfo) = 1;
1321 else
dbbf88d1 1322 {
fc6633e0 1323 tree delta;
c8094d83 1324
fc6633e0
NS
1325 BINFO_PRIMARY_P (this_primary) = 1;
1326 BINFO_INHERITANCE_CHAIN (this_primary) = base_binfo;
c8094d83 1327
fc6633e0 1328 /* A virtual binfo might have been copied from within
0cbd7506
MS
1329 another hierarchy. As we're about to use it as a
1330 primary base, make sure the offsets match. */
fc6633e0
NS
1331 delta = size_diffop (convert (ssizetype,
1332 BINFO_OFFSET (base_binfo)),
1333 convert (ssizetype,
1334 BINFO_OFFSET (this_primary)));
c8094d83 1335
fc6633e0 1336 propagate_binfo_offsets (this_primary, delta);
dbbf88d1
NS
1337 }
1338 }
c35cce41 1339 }
8026246f 1340
fc6633e0 1341 /* First look for a dynamic direct non-virtual base. */
fa743e8c 1342 for (i = 0; BINFO_BASE_ITERATE (type_binfo, i, base_binfo); i++)
607cf131 1343 {
607cf131 1344 tree basetype = BINFO_TYPE (base_binfo);
aff08c18 1345
fc6633e0 1346 if (TYPE_CONTAINS_VPTR_P (basetype) && !BINFO_VIRTUAL_P (base_binfo))
8d08fdba 1347 {
fc6633e0
NS
1348 primary = base_binfo;
1349 goto found;
911a71a7
MM
1350 }
1351 }
8026246f 1352
3461fba7 1353 /* A "nearly-empty" virtual base class can be the primary base
fc6633e0
NS
1354 class, if no non-virtual polymorphic base can be found. Look for
1355 a nearly-empty virtual dynamic base that is not already a primary
77880ae4 1356 base of something in the hierarchy. If there is no such base,
fc6633e0
NS
1357 just pick the first nearly-empty virtual base. */
1358
1359 for (base_binfo = TREE_CHAIN (type_binfo); base_binfo;
1360 base_binfo = TREE_CHAIN (base_binfo))
1361 if (BINFO_VIRTUAL_P (base_binfo)
1362 && CLASSTYPE_NEARLY_EMPTY_P (BINFO_TYPE (base_binfo)))
1363 {
1364 if (!BINFO_PRIMARY_P (base_binfo))
1365 {
1366 /* Found one that is not primary. */
1367 primary = base_binfo;
1368 goto found;
1369 }
1370 else if (!primary)
1371 /* Remember the first candidate. */
1372 primary = base_binfo;
1373 }
c8094d83 1374
fc6633e0
NS
1375 found:
1376 /* If we've got a primary base, use it. */
1377 if (primary)
7cafdb8b 1378 {
fc6633e0 1379 tree basetype = BINFO_TYPE (primary);
c8094d83 1380
fc6633e0
NS
1381 CLASSTYPE_PRIMARY_BINFO (t) = primary;
1382 if (BINFO_PRIMARY_P (primary))
1383 /* We are stealing a primary base. */
1384 BINFO_LOST_PRIMARY_P (BINFO_INHERITANCE_CHAIN (primary)) = 1;
1385 BINFO_PRIMARY_P (primary) = 1;
1386 if (BINFO_VIRTUAL_P (primary))
7cafdb8b 1387 {
fc6633e0 1388 tree delta;
7cafdb8b 1389
fc6633e0
NS
1390 BINFO_INHERITANCE_CHAIN (primary) = type_binfo;
1391 /* A virtual binfo might have been copied from within
0cbd7506
MS
1392 another hierarchy. As we're about to use it as a primary
1393 base, make sure the offsets match. */
fc6633e0
NS
1394 delta = size_diffop (ssize_int (0),
1395 convert (ssizetype, BINFO_OFFSET (primary)));
c8094d83 1396
fc6633e0 1397 propagate_binfo_offsets (primary, delta);
7cafdb8b 1398 }
c8094d83 1399
fc6633e0 1400 primary = TYPE_BINFO (basetype);
c8094d83 1401
fc6633e0
NS
1402 TYPE_VFIELD (t) = TYPE_VFIELD (basetype);
1403 BINFO_VTABLE (type_binfo) = BINFO_VTABLE (primary);
1404 BINFO_VIRTUALS (type_binfo) = BINFO_VIRTUALS (primary);
7cafdb8b 1405 }
8d08fdba 1406}
8d08fdba 1407\f
d2c5305b
MM
1408/* Set memoizing fields and bits of T (and its variants) for later
1409 use. */
e92cc029 1410
8d08fdba 1411static void
94edc4ab 1412finish_struct_bits (tree t)
8d08fdba 1413{
090ad434 1414 tree variants;
c8094d83 1415
8d08fdba 1416 /* Fix up variants (if any). */
090ad434
NS
1417 for (variants = TYPE_NEXT_VARIANT (t);
1418 variants;
1419 variants = TYPE_NEXT_VARIANT (variants))
8d08fdba
MS
1420 {
1421 /* These fields are in the _TYPE part of the node, not in
1422 the TYPE_LANG_SPECIFIC component, so they are not shared. */
1423 TYPE_HAS_CONSTRUCTOR (variants) = TYPE_HAS_CONSTRUCTOR (t);
8d08fdba 1424 TYPE_NEEDS_CONSTRUCTING (variants) = TYPE_NEEDS_CONSTRUCTING (t);
c8094d83 1425 TYPE_HAS_NONTRIVIAL_DESTRUCTOR (variants)
834c6dff 1426 = TYPE_HAS_NONTRIVIAL_DESTRUCTOR (t);
8d08fdba 1427
4c6b7393 1428 TYPE_POLYMORPHIC_P (variants) = TYPE_POLYMORPHIC_P (t);
c8094d83 1429
cad7e87b
NS
1430 TYPE_BINFO (variants) = TYPE_BINFO (t);
1431
8d08fdba 1432 /* Copy whatever these are holding today. */
eb34af89
RK
1433 TYPE_VFIELD (variants) = TYPE_VFIELD (t);
1434 TYPE_METHODS (variants) = TYPE_METHODS (t);
5566b478 1435 TYPE_FIELDS (variants) = TYPE_FIELDS (t);
8d08fdba
MS
1436 }
1437
fa743e8c 1438 if (BINFO_N_BASE_BINFOS (TYPE_BINFO (t)) && TYPE_POLYMORPHIC_P (t))
16ae29f1
NS
1439 /* For a class w/o baseclasses, 'finish_struct' has set
1440 CLASSTYPE_PURE_VIRTUALS correctly (by definition).
132c7dd3
NS
1441 Similarly for a class whose base classes do not have vtables.
1442 When neither of these is true, we might have removed abstract
1443 virtuals (by providing a definition), added some (by declaring
1444 new ones), or redeclared ones from a base class. We need to
1445 recalculate what's really an abstract virtual at this point (by
1446 looking in the vtables). */
1447 get_pure_virtuals (t);
c8094d83 1448
132c7dd3
NS
1449 /* If this type has a copy constructor or a destructor, force its
1450 mode to be BLKmode, and force its TREE_ADDRESSABLE bit to be
1451 nonzero. This will cause it to be passed by invisible reference
1452 and prevent it from being returned in a register. */
8b16faa2 1453 if (! TYPE_HAS_TRIVIAL_INIT_REF (t) || TYPE_HAS_NONTRIVIAL_DESTRUCTOR (t))
8d08fdba 1454 {
e8abc66f 1455 tree variants;
d2e5ee5c 1456 DECL_MODE (TYPE_MAIN_DECL (t)) = BLKmode;
e8abc66f 1457 for (variants = t; variants; variants = TYPE_NEXT_VARIANT (variants))
8d08fdba
MS
1458 {
1459 TYPE_MODE (variants) = BLKmode;
1460 TREE_ADDRESSABLE (variants) = 1;
8d08fdba
MS
1461 }
1462 }
1463}
1464
b0e0b31f 1465/* Issue warnings about T having private constructors, but no friends,
c8094d83 1466 and so forth.
aed7b2a6 1467
b0e0b31f
MM
1468 HAS_NONPRIVATE_METHOD is nonzero if T has any non-private methods or
1469 static members. HAS_NONPRIVATE_STATIC_FN is nonzero if T has any
1470 non-private static member functions. */
1471
1472static void
94edc4ab 1473maybe_warn_about_overly_private_class (tree t)
aed7b2a6 1474{
056a3b12
MM
1475 int has_member_fn = 0;
1476 int has_nonprivate_method = 0;
1477 tree fn;
1478
1479 if (!warn_ctor_dtor_privacy
b0e0b31f
MM
1480 /* If the class has friends, those entities might create and
1481 access instances, so we should not warn. */
056a3b12
MM
1482 || (CLASSTYPE_FRIEND_CLASSES (t)
1483 || DECL_FRIENDLIST (TYPE_MAIN_DECL (t)))
b0e0b31f
MM
1484 /* We will have warned when the template was declared; there's
1485 no need to warn on every instantiation. */
056a3b12 1486 || CLASSTYPE_TEMPLATE_INSTANTIATION (t))
c8094d83 1487 /* There's no reason to even consider warning about this
056a3b12
MM
1488 class. */
1489 return;
c8094d83 1490
056a3b12
MM
1491 /* We only issue one warning, if more than one applies, because
1492 otherwise, on code like:
1493
1494 class A {
1495 // Oops - forgot `public:'
1496 A();
1497 A(const A&);
1498 ~A();
1499 };
1500
1501 we warn several times about essentially the same problem. */
1502
1503 /* Check to see if all (non-constructor, non-destructor) member
1504 functions are private. (Since there are no friends or
1505 non-private statics, we can't ever call any of the private member
1506 functions.) */
1507 for (fn = TYPE_METHODS (t); fn; fn = TREE_CHAIN (fn))
1508 /* We're not interested in compiler-generated methods; they don't
1509 provide any way to call private members. */
c8094d83 1510 if (!DECL_ARTIFICIAL (fn))
056a3b12
MM
1511 {
1512 if (!TREE_PRIVATE (fn))
b0e0b31f 1513 {
c8094d83 1514 if (DECL_STATIC_FUNCTION_P (fn))
056a3b12
MM
1515 /* A non-private static member function is just like a
1516 friend; it can create and invoke private member
1517 functions, and be accessed without a class
1518 instance. */
1519 return;
c8094d83 1520
056a3b12 1521 has_nonprivate_method = 1;
f576dfc4 1522 /* Keep searching for a static member function. */
056a3b12 1523 }
ce0a5952 1524 else if (!DECL_CONSTRUCTOR_P (fn) && !DECL_DESTRUCTOR_P (fn))
056a3b12 1525 has_member_fn = 1;
c8094d83 1526 }
aed7b2a6 1527
c8094d83 1528 if (!has_nonprivate_method && has_member_fn)
056a3b12 1529 {
ce0a5952
MM
1530 /* There are no non-private methods, and there's at least one
1531 private member function that isn't a constructor or
1532 destructor. (If all the private members are
1533 constructors/destructors we want to use the code below that
1534 issues error messages specifically referring to
1535 constructors/destructors.) */
fa743e8c 1536 unsigned i;
dbbf88d1 1537 tree binfo = TYPE_BINFO (t);
c8094d83 1538
fa743e8c 1539 for (i = 0; i != BINFO_N_BASE_BINFOS (binfo); i++)
604a3205 1540 if (BINFO_BASE_ACCESS (binfo, i) != access_private_node)
056a3b12
MM
1541 {
1542 has_nonprivate_method = 1;
1543 break;
1544 }
c8094d83 1545 if (!has_nonprivate_method)
b0e0b31f 1546 {
74fa0285 1547 warning (OPT_Wctor_dtor_privacy,
3db45ab5 1548 "all member functions in class %qT are private", t);
056a3b12 1549 return;
b0e0b31f 1550 }
056a3b12 1551 }
aed7b2a6 1552
056a3b12
MM
1553 /* Even if some of the member functions are non-private, the class
1554 won't be useful for much if all the constructors or destructors
1555 are private: such an object can never be created or destroyed. */
9f4faeae
MM
1556 fn = CLASSTYPE_DESTRUCTORS (t);
1557 if (fn && TREE_PRIVATE (fn))
056a3b12 1558 {
74fa0285 1559 warning (OPT_Wctor_dtor_privacy,
3db45ab5 1560 "%q#T only defines a private destructor and has no friends",
4b0d3cbe
MM
1561 t);
1562 return;
056a3b12 1563 }
b0e0b31f 1564
550d1bf4
MM
1565 if (TYPE_HAS_CONSTRUCTOR (t)
1566 /* Implicitly generated constructors are always public. */
1567 && (!CLASSTYPE_LAZY_DEFAULT_CTOR (t)
1568 || !CLASSTYPE_LAZY_COPY_CTOR (t)))
056a3b12
MM
1569 {
1570 int nonprivate_ctor = 0;
c8094d83 1571
056a3b12
MM
1572 /* If a non-template class does not define a copy
1573 constructor, one is defined for it, enabling it to avoid
1574 this warning. For a template class, this does not
1575 happen, and so we would normally get a warning on:
b0e0b31f 1576
c8094d83
MS
1577 template <class T> class C { private: C(); };
1578
056a3b12
MM
1579 To avoid this asymmetry, we check TYPE_HAS_INIT_REF. All
1580 complete non-template or fully instantiated classes have this
1581 flag set. */
1582 if (!TYPE_HAS_INIT_REF (t))
1583 nonprivate_ctor = 1;
c8094d83
MS
1584 else
1585 for (fn = CLASSTYPE_CONSTRUCTORS (t); fn; fn = OVL_NEXT (fn))
056a3b12
MM
1586 {
1587 tree ctor = OVL_CURRENT (fn);
1588 /* Ideally, we wouldn't count copy constructors (or, in
1589 fact, any constructor that takes an argument of the
1590 class type as a parameter) because such things cannot
1591 be used to construct an instance of the class unless
1592 you already have one. But, for now at least, we're
1593 more generous. */
1594 if (! TREE_PRIVATE (ctor))
b0e0b31f 1595 {
056a3b12
MM
1596 nonprivate_ctor = 1;
1597 break;
b0e0b31f 1598 }
056a3b12 1599 }
aed7b2a6 1600
056a3b12
MM
1601 if (nonprivate_ctor == 0)
1602 {
74fa0285 1603 warning (OPT_Wctor_dtor_privacy,
3db45ab5 1604 "%q#T only defines private constructors and has no friends",
0cbd7506 1605 t);
056a3b12 1606 return;
b0e0b31f
MM
1607 }
1608 }
aed7b2a6
MM
1609}
1610
17211ab5
GK
1611static struct {
1612 gt_pointer_operator new_value;
1613 void *cookie;
1614} resort_data;
1615
f90cdf34
MT
1616/* Comparison function to compare two TYPE_METHOD_VEC entries by name. */
1617
1618static int
94edc4ab 1619method_name_cmp (const void* m1_p, const void* m2_p)
f90cdf34 1620{
67f5655f
GDR
1621 const tree *const m1 = (const tree *) m1_p;
1622 const tree *const m2 = (const tree *) m2_p;
c8094d83 1623
f90cdf34
MT
1624 if (*m1 == NULL_TREE && *m2 == NULL_TREE)
1625 return 0;
1626 if (*m1 == NULL_TREE)
1627 return -1;
1628 if (*m2 == NULL_TREE)
1629 return 1;
1630 if (DECL_NAME (OVL_CURRENT (*m1)) < DECL_NAME (OVL_CURRENT (*m2)))
1631 return -1;
1632 return 1;
1633}
b0e0b31f 1634
17211ab5
GK
1635/* This routine compares two fields like method_name_cmp but using the
1636 pointer operator in resort_field_decl_data. */
1637
1638static int
94edc4ab 1639resort_method_name_cmp (const void* m1_p, const void* m2_p)
17211ab5 1640{
67f5655f
GDR
1641 const tree *const m1 = (const tree *) m1_p;
1642 const tree *const m2 = (const tree *) m2_p;
17211ab5
GK
1643 if (*m1 == NULL_TREE && *m2 == NULL_TREE)
1644 return 0;
1645 if (*m1 == NULL_TREE)
1646 return -1;
1647 if (*m2 == NULL_TREE)
1648 return 1;
1649 {
1650 tree d1 = DECL_NAME (OVL_CURRENT (*m1));
1651 tree d2 = DECL_NAME (OVL_CURRENT (*m2));
1652 resort_data.new_value (&d1, resort_data.cookie);
1653 resort_data.new_value (&d2, resort_data.cookie);
1654 if (d1 < d2)
1655 return -1;
1656 }
1657 return 1;
1658}
1659
1660/* Resort TYPE_METHOD_VEC because pointers have been reordered. */
1661
c8094d83 1662void
94edc4ab 1663resort_type_method_vec (void* obj,
0cbd7506
MS
1664 void* orig_obj ATTRIBUTE_UNUSED ,
1665 gt_pointer_operator new_value,
1666 void* cookie)
17211ab5 1667{
d4e6fecb 1668 VEC(tree,gc) *method_vec = (VEC(tree,gc) *) obj;
aaaa46d2
MM
1669 int len = VEC_length (tree, method_vec);
1670 size_t slot;
1671 tree fn;
17211ab5
GK
1672
1673 /* The type conversion ops have to live at the front of the vec, so we
1674 can't sort them. */
aaaa46d2 1675 for (slot = CLASSTYPE_FIRST_CONVERSION_SLOT;
9ba5ff0f 1676 VEC_iterate (tree, method_vec, slot, fn);
aaaa46d2
MM
1677 ++slot)
1678 if (!DECL_CONV_FN_P (OVL_CURRENT (fn)))
1679 break;
1680
17211ab5
GK
1681 if (len - slot > 1)
1682 {
1683 resort_data.new_value = new_value;
1684 resort_data.cookie = cookie;
aaaa46d2 1685 qsort (VEC_address (tree, method_vec) + slot, len - slot, sizeof (tree),
17211ab5
GK
1686 resort_method_name_cmp);
1687 }
1688}
1689
c7222c02 1690/* Warn about duplicate methods in fn_fields.
8d08fdba 1691
5b0cec3b
MM
1692 Sort methods that are not special (i.e., constructors, destructors,
1693 and type conversion operators) so that we can find them faster in
1694 search. */
8d08fdba 1695
b0e0b31f 1696static void
94edc4ab 1697finish_struct_methods (tree t)
8d08fdba 1698{
b0e0b31f 1699 tree fn_fields;
d4e6fecb 1700 VEC(tree,gc) *method_vec;
58010b57
MM
1701 int slot, len;
1702
58010b57 1703 method_vec = CLASSTYPE_METHOD_VEC (t);
508a1c9c
MM
1704 if (!method_vec)
1705 return;
1706
aaaa46d2 1707 len = VEC_length (tree, method_vec);
8d08fdba 1708
c7222c02 1709 /* Clear DECL_IN_AGGR_P for all functions. */
c8094d83 1710 for (fn_fields = TYPE_METHODS (t); fn_fields;
b0e0b31f 1711 fn_fields = TREE_CHAIN (fn_fields))
5b0cec3b 1712 DECL_IN_AGGR_P (fn_fields) = 0;
8d08fdba 1713
b0e0b31f
MM
1714 /* Issue warnings about private constructors and such. If there are
1715 no methods, then some public defaults are generated. */
f90cdf34
MT
1716 maybe_warn_about_overly_private_class (t);
1717
f90cdf34
MT
1718 /* The type conversion ops have to live at the front of the vec, so we
1719 can't sort them. */
9ba5ff0f
NS
1720 for (slot = CLASSTYPE_FIRST_CONVERSION_SLOT;
1721 VEC_iterate (tree, method_vec, slot, fn_fields);
aaaa46d2
MM
1722 ++slot)
1723 if (!DECL_CONV_FN_P (OVL_CURRENT (fn_fields)))
1724 break;
f90cdf34 1725 if (len - slot > 1)
aaaa46d2
MM
1726 qsort (VEC_address (tree, method_vec) + slot,
1727 len-slot, sizeof (tree), method_name_cmp);
8d08fdba
MS
1728}
1729
90ecce3e 1730/* Make BINFO's vtable have N entries, including RTTI entries,
8d7a5379
MM
1731 vbase and vcall offsets, etc. Set its type and call the backend
1732 to lay it out. */
1a588ad7
MM
1733
1734static void
94edc4ab 1735layout_vtable_decl (tree binfo, int n)
1a588ad7 1736{
1a588ad7 1737 tree atype;
c35cce41 1738 tree vtable;
1a588ad7 1739
c8094d83 1740 atype = build_cplus_array_type (vtable_entry_type,
442e01b6 1741 build_index_type (size_int (n - 1)));
1a588ad7
MM
1742 layout_type (atype);
1743
1744 /* We may have to grow the vtable. */
c35cce41
MM
1745 vtable = get_vtbl_decl_for_binfo (binfo);
1746 if (!same_type_p (TREE_TYPE (vtable), atype))
1a588ad7 1747 {
06ceef4e 1748 TREE_TYPE (vtable) = atype;
c35cce41 1749 DECL_SIZE (vtable) = DECL_SIZE_UNIT (vtable) = NULL_TREE;
06ceef4e 1750 layout_decl (vtable, 0);
1a588ad7
MM
1751 }
1752}
1753
9bab6c90
MM
1754/* True iff FNDECL and BASE_FNDECL (both non-static member functions)
1755 have the same signature. */
83f2ccf4 1756
e0fff4b3 1757int
94edc4ab 1758same_signature_p (tree fndecl, tree base_fndecl)
83f2ccf4 1759{
872f37f9
MM
1760 /* One destructor overrides another if they are the same kind of
1761 destructor. */
1762 if (DECL_DESTRUCTOR_P (base_fndecl) && DECL_DESTRUCTOR_P (fndecl)
1763 && special_function_p (base_fndecl) == special_function_p (fndecl))
ca36f057 1764 return 1;
872f37f9
MM
1765 /* But a non-destructor never overrides a destructor, nor vice
1766 versa, nor do different kinds of destructors override
1767 one-another. For example, a complete object destructor does not
1768 override a deleting destructor. */
0d9eb3ba 1769 if (DECL_DESTRUCTOR_P (base_fndecl) || DECL_DESTRUCTOR_P (fndecl))
ca36f057 1770 return 0;
872f37f9 1771
a6c0d772
MM
1772 if (DECL_NAME (fndecl) == DECL_NAME (base_fndecl)
1773 || (DECL_CONV_FN_P (fndecl)
1774 && DECL_CONV_FN_P (base_fndecl)
1775 && same_type_p (DECL_CONV_FN_TYPE (fndecl),
1776 DECL_CONV_FN_TYPE (base_fndecl))))
83f2ccf4 1777 {
ca36f057 1778 tree types, base_types;
ca36f057
MM
1779 types = TYPE_ARG_TYPES (TREE_TYPE (fndecl));
1780 base_types = TYPE_ARG_TYPES (TREE_TYPE (base_fndecl));
1781 if ((TYPE_QUALS (TREE_TYPE (TREE_VALUE (base_types)))
1782 == TYPE_QUALS (TREE_TYPE (TREE_VALUE (types))))
1783 && compparms (TREE_CHAIN (base_types), TREE_CHAIN (types)))
1784 return 1;
83f2ccf4 1785 }
ca36f057 1786 return 0;
83f2ccf4
MM
1787}
1788
9368208b
MM
1789/* Returns TRUE if DERIVED is a binfo containing the binfo BASE as a
1790 subobject. */
c8094d83 1791
9368208b
MM
1792static bool
1793base_derived_from (tree derived, tree base)
1794{
dbbf88d1
NS
1795 tree probe;
1796
1797 for (probe = base; probe; probe = BINFO_INHERITANCE_CHAIN (probe))
1798 {
1799 if (probe == derived)
1800 return true;
809e3e7f 1801 else if (BINFO_VIRTUAL_P (probe))
dbbf88d1
NS
1802 /* If we meet a virtual base, we can't follow the inheritance
1803 any more. See if the complete type of DERIVED contains
1804 such a virtual base. */
58c42dc2
NS
1805 return (binfo_for_vbase (BINFO_TYPE (probe), BINFO_TYPE (derived))
1806 != NULL_TREE);
dbbf88d1
NS
1807 }
1808 return false;
9368208b
MM
1809}
1810
ca36f057
MM
1811typedef struct find_final_overrider_data_s {
1812 /* The function for which we are trying to find a final overrider. */
1813 tree fn;
1814 /* The base class in which the function was declared. */
1815 tree declaring_base;
9368208b 1816 /* The candidate overriders. */
78b45a24 1817 tree candidates;
5d5a519f 1818 /* Path to most derived. */
d4e6fecb 1819 VEC(tree,heap) *path;
ca36f057 1820} find_final_overrider_data;
8d7a5379 1821
f7a8132a
MM
1822/* Add the overrider along the current path to FFOD->CANDIDATES.
1823 Returns true if an overrider was found; false otherwise. */
8d7a5379 1824
f7a8132a 1825static bool
c8094d83 1826dfs_find_final_overrider_1 (tree binfo,
5d5a519f
NS
1827 find_final_overrider_data *ffod,
1828 unsigned depth)
7177d104 1829{
741d8ca3
MM
1830 tree method;
1831
f7a8132a
MM
1832 /* If BINFO is not the most derived type, try a more derived class.
1833 A definition there will overrider a definition here. */
5d5a519f 1834 if (depth)
dbbf88d1 1835 {
5d5a519f
NS
1836 depth--;
1837 if (dfs_find_final_overrider_1
1838 (VEC_index (tree, ffod->path, depth), ffod, depth))
f7a8132a
MM
1839 return true;
1840 }
dbbf88d1 1841
741d8ca3 1842 method = look_for_overrides_here (BINFO_TYPE (binfo), ffod->fn);
f7a8132a
MM
1843 if (method)
1844 {
1845 tree *candidate = &ffod->candidates;
c8094d83 1846
f7a8132a
MM
1847 /* Remove any candidates overridden by this new function. */
1848 while (*candidate)
8d7a5379 1849 {
f7a8132a
MM
1850 /* If *CANDIDATE overrides METHOD, then METHOD
1851 cannot override anything else on the list. */
1852 if (base_derived_from (TREE_VALUE (*candidate), binfo))
1853 return true;
1854 /* If METHOD overrides *CANDIDATE, remove *CANDIDATE. */
1855 if (base_derived_from (binfo, TREE_VALUE (*candidate)))
1856 *candidate = TREE_CHAIN (*candidate);
dbbf88d1 1857 else
f7a8132a 1858 candidate = &TREE_CHAIN (*candidate);
5e19c053 1859 }
c8094d83 1860
f7a8132a
MM
1861 /* Add the new function. */
1862 ffod->candidates = tree_cons (method, binfo, ffod->candidates);
1863 return true;
dbbf88d1 1864 }
5e19c053 1865
f7a8132a
MM
1866 return false;
1867}
1868
1869/* Called from find_final_overrider via dfs_walk. */
1870
1871static tree
5d5a519f 1872dfs_find_final_overrider_pre (tree binfo, void *data)
f7a8132a
MM
1873{
1874 find_final_overrider_data *ffod = (find_final_overrider_data *) data;
1875
1876 if (binfo == ffod->declaring_base)
5d5a519f 1877 dfs_find_final_overrider_1 (binfo, ffod, VEC_length (tree, ffod->path));
d4e6fecb 1878 VEC_safe_push (tree, heap, ffod->path, binfo);
f7a8132a 1879
dbbf88d1
NS
1880 return NULL_TREE;
1881}
db3d8cde 1882
dbbf88d1 1883static tree
5d5a519f 1884dfs_find_final_overrider_post (tree binfo ATTRIBUTE_UNUSED, void *data)
dbbf88d1 1885{
dbbf88d1 1886 find_final_overrider_data *ffod = (find_final_overrider_data *) data;
5d5a519f 1887 VEC_pop (tree, ffod->path);
78b45a24 1888
dd42e135
MM
1889 return NULL_TREE;
1890}
1891
5e19c053
MM
1892/* Returns a TREE_LIST whose TREE_PURPOSE is the final overrider for
1893 FN and whose TREE_VALUE is the binfo for the base where the
95675950
MM
1894 overriding occurs. BINFO (in the hierarchy dominated by the binfo
1895 DERIVED) is the base object in which FN is declared. */
e92cc029 1896
a292b002 1897static tree
94edc4ab 1898find_final_overrider (tree derived, tree binfo, tree fn)
a292b002 1899{
5e19c053 1900 find_final_overrider_data ffod;
a292b002 1901
0e339752 1902 /* Getting this right is a little tricky. This is valid:
a292b002 1903
5e19c053
MM
1904 struct S { virtual void f (); };
1905 struct T { virtual void f (); };
1906 struct U : public S, public T { };
a292b002 1907
c8094d83 1908 even though calling `f' in `U' is ambiguous. But,
a292b002 1909
5e19c053
MM
1910 struct R { virtual void f(); };
1911 struct S : virtual public R { virtual void f (); };
1912 struct T : virtual public R { virtual void f (); };
1913 struct U : public S, public T { };
dd42e135 1914
d0cd8b44 1915 is not -- there's no way to decide whether to put `S::f' or
c8094d83
MS
1916 `T::f' in the vtable for `R'.
1917
5e19c053
MM
1918 The solution is to look at all paths to BINFO. If we find
1919 different overriders along any two, then there is a problem. */
07fa4878
NS
1920 if (DECL_THUNK_P (fn))
1921 fn = THUNK_TARGET (fn);
f7a8132a
MM
1922
1923 /* Determine the depth of the hierarchy. */
5e19c053
MM
1924 ffod.fn = fn;
1925 ffod.declaring_base = binfo;
78b45a24 1926 ffod.candidates = NULL_TREE;
d4e6fecb 1927 ffod.path = VEC_alloc (tree, heap, 30);
5e19c053 1928
5d5a519f
NS
1929 dfs_walk_all (derived, dfs_find_final_overrider_pre,
1930 dfs_find_final_overrider_post, &ffod);
f7a8132a 1931
d4e6fecb 1932 VEC_free (tree, heap, ffod.path);
c8094d83 1933
78b45a24 1934 /* If there was no winner, issue an error message. */
9368208b 1935 if (!ffod.candidates || TREE_CHAIN (ffod.candidates))
16a1369e 1936 return error_mark_node;
dd42e135 1937
9368208b 1938 return ffod.candidates;
a292b002
MS
1939}
1940
548502d3
MM
1941/* Return the index of the vcall offset for FN when TYPE is used as a
1942 virtual base. */
d0cd8b44 1943
d0cd8b44 1944static tree
548502d3 1945get_vcall_index (tree fn, tree type)
d0cd8b44 1946{
d4e6fecb 1947 VEC(tree_pair_s,gc) *indices = CLASSTYPE_VCALL_INDICES (type);
0871761b
NS
1948 tree_pair_p p;
1949 unsigned ix;
d0cd8b44 1950
0871761b
NS
1951 for (ix = 0; VEC_iterate (tree_pair_s, indices, ix, p); ix++)
1952 if ((DECL_DESTRUCTOR_P (fn) && DECL_DESTRUCTOR_P (p->purpose))
1953 || same_signature_p (fn, p->purpose))
1954 return p->value;
548502d3
MM
1955
1956 /* There should always be an appropriate index. */
8dc2b103 1957 gcc_unreachable ();
d0cd8b44 1958}
d0cd8b44
JM
1959
1960/* Update an entry in the vtable for BINFO, which is in the hierarchy
4639c5c6 1961 dominated by T. FN has been overridden in BINFO; VIRTUALS points to the
d0cd8b44 1962 corresponding position in the BINFO_VIRTUALS list. */
4e7512c9
MM
1963
1964static void
a2ddc397
NS
1965update_vtable_entry_for_fn (tree t, tree binfo, tree fn, tree* virtuals,
1966 unsigned ix)
4e7512c9
MM
1967{
1968 tree b;
1969 tree overrider;
4e7512c9 1970 tree delta;
31f8e4f3 1971 tree virtual_base;
d0cd8b44 1972 tree first_defn;
3cfabe60
NS
1973 tree overrider_fn, overrider_target;
1974 tree target_fn = DECL_THUNK_P (fn) ? THUNK_TARGET (fn) : fn;
1975 tree over_return, base_return;
f11ee281 1976 bool lost = false;
4e7512c9 1977
d0cd8b44
JM
1978 /* Find the nearest primary base (possibly binfo itself) which defines
1979 this function; this is the class the caller will convert to when
1980 calling FN through BINFO. */
1981 for (b = binfo; ; b = get_primary_binfo (b))
4e7512c9 1982 {
50bc768d 1983 gcc_assert (b);
3cfabe60 1984 if (look_for_overrides_here (BINFO_TYPE (b), target_fn))
31f8e4f3 1985 break;
f11ee281
JM
1986
1987 /* The nearest definition is from a lost primary. */
1988 if (BINFO_LOST_PRIMARY_P (b))
1989 lost = true;
4e7512c9 1990 }
d0cd8b44 1991 first_defn = b;
4e7512c9 1992
31f8e4f3 1993 /* Find the final overrider. */
3cfabe60 1994 overrider = find_final_overrider (TYPE_BINFO (t), b, target_fn);
4e7512c9 1995 if (overrider == error_mark_node)
16a1369e
JJ
1996 {
1997 error ("no unique final overrider for %qD in %qT", target_fn, t);
1998 return;
1999 }
3cfabe60 2000 overrider_target = overrider_fn = TREE_PURPOSE (overrider);
c8094d83 2001
9bcb9aae 2002 /* Check for adjusting covariant return types. */
3cfabe60
NS
2003 over_return = TREE_TYPE (TREE_TYPE (overrider_target));
2004 base_return = TREE_TYPE (TREE_TYPE (target_fn));
c8094d83 2005
3cfabe60
NS
2006 if (POINTER_TYPE_P (over_return)
2007 && TREE_CODE (over_return) == TREE_CODE (base_return)
2008 && CLASS_TYPE_P (TREE_TYPE (over_return))
b77fe7b4
NS
2009 && CLASS_TYPE_P (TREE_TYPE (base_return))
2010 /* If the overrider is invalid, don't even try. */
2011 && !DECL_INVALID_OVERRIDER_P (overrider_target))
3cfabe60
NS
2012 {
2013 /* If FN is a covariant thunk, we must figure out the adjustment
0cbd7506
MS
2014 to the final base FN was converting to. As OVERRIDER_TARGET might
2015 also be converting to the return type of FN, we have to
2016 combine the two conversions here. */
3cfabe60 2017 tree fixed_offset, virtual_offset;
12a669d1
NS
2018
2019 over_return = TREE_TYPE (over_return);
2020 base_return = TREE_TYPE (base_return);
c8094d83 2021
3cfabe60
NS
2022 if (DECL_THUNK_P (fn))
2023 {
50bc768d 2024 gcc_assert (DECL_RESULT_THUNK_P (fn));
3cfabe60
NS
2025 fixed_offset = ssize_int (THUNK_FIXED_OFFSET (fn));
2026 virtual_offset = THUNK_VIRTUAL_OFFSET (fn);
3cfabe60
NS
2027 }
2028 else
2029 fixed_offset = virtual_offset = NULL_TREE;
4977bab6 2030
e00853fd
NS
2031 if (virtual_offset)
2032 /* Find the equivalent binfo within the return type of the
2033 overriding function. We will want the vbase offset from
2034 there. */
58c42dc2 2035 virtual_offset = binfo_for_vbase (BINFO_TYPE (virtual_offset),
12a669d1
NS
2036 over_return);
2037 else if (!same_type_ignoring_top_level_qualifiers_p
2038 (over_return, base_return))
3cfabe60
NS
2039 {
2040 /* There was no existing virtual thunk (which takes
12a669d1
NS
2041 precedence). So find the binfo of the base function's
2042 return type within the overriding function's return type.
2043 We cannot call lookup base here, because we're inside a
2044 dfs_walk, and will therefore clobber the BINFO_MARKED
2045 flags. Fortunately we know the covariancy is valid (it
2046 has already been checked), so we can just iterate along
2047 the binfos, which have been chained in inheritance graph
2048 order. Of course it is lame that we have to repeat the
2049 search here anyway -- we should really be caching pieces
2050 of the vtable and avoiding this repeated work. */
2051 tree thunk_binfo, base_binfo;
2052
2053 /* Find the base binfo within the overriding function's
742f25b3
NS
2054 return type. We will always find a thunk_binfo, except
2055 when the covariancy is invalid (which we will have
2056 already diagnosed). */
12a669d1
NS
2057 for (base_binfo = TYPE_BINFO (base_return),
2058 thunk_binfo = TYPE_BINFO (over_return);
742f25b3 2059 thunk_binfo;
12a669d1 2060 thunk_binfo = TREE_CHAIN (thunk_binfo))
742f25b3
NS
2061 if (SAME_BINFO_TYPE_P (BINFO_TYPE (thunk_binfo),
2062 BINFO_TYPE (base_binfo)))
2063 break;
c8094d83 2064
12a669d1
NS
2065 /* See if virtual inheritance is involved. */
2066 for (virtual_offset = thunk_binfo;
2067 virtual_offset;
2068 virtual_offset = BINFO_INHERITANCE_CHAIN (virtual_offset))
2069 if (BINFO_VIRTUAL_P (virtual_offset))
2070 break;
c8094d83 2071
742f25b3
NS
2072 if (virtual_offset
2073 || (thunk_binfo && !BINFO_OFFSET_ZEROP (thunk_binfo)))
3cfabe60 2074 {
bb885938 2075 tree offset = convert (ssizetype, BINFO_OFFSET (thunk_binfo));
8d1f0f67 2076
12a669d1 2077 if (virtual_offset)
3cfabe60 2078 {
12a669d1
NS
2079 /* We convert via virtual base. Adjust the fixed
2080 offset to be from there. */
bb885938
NS
2081 offset = size_diffop
2082 (offset, convert
2083 (ssizetype, BINFO_OFFSET (virtual_offset)));
3cfabe60
NS
2084 }
2085 if (fixed_offset)
2086 /* There was an existing fixed offset, this must be
2087 from the base just converted to, and the base the
2088 FN was thunking to. */
2089 fixed_offset = size_binop (PLUS_EXPR, fixed_offset, offset);
2090 else
2091 fixed_offset = offset;
2092 }
2093 }
c8094d83 2094
3cfabe60
NS
2095 if (fixed_offset || virtual_offset)
2096 /* Replace the overriding function with a covariant thunk. We
2097 will emit the overriding function in its own slot as
9bcb9aae 2098 well. */
3cfabe60
NS
2099 overrider_fn = make_thunk (overrider_target, /*this_adjusting=*/0,
2100 fixed_offset, virtual_offset);
2101 }
2102 else
50bc768d 2103 gcc_assert (!DECL_THUNK_P (fn));
c8094d83 2104
31f8e4f3
MM
2105 /* Assume that we will produce a thunk that convert all the way to
2106 the final overrider, and not to an intermediate virtual base. */
9ccf6541 2107 virtual_base = NULL_TREE;
31f8e4f3 2108
f11ee281 2109 /* See if we can convert to an intermediate virtual base first, and then
3461fba7 2110 use the vcall offset located there to finish the conversion. */
f11ee281 2111 for (; b; b = BINFO_INHERITANCE_CHAIN (b))
4e7512c9 2112 {
d0cd8b44
JM
2113 /* If we find the final overrider, then we can stop
2114 walking. */
539ed333
NS
2115 if (SAME_BINFO_TYPE_P (BINFO_TYPE (b),
2116 BINFO_TYPE (TREE_VALUE (overrider))))
1f84ec23 2117 break;
31f8e4f3 2118
d0cd8b44
JM
2119 /* If we find a virtual base, and we haven't yet found the
2120 overrider, then there is a virtual base between the
2121 declaring base (first_defn) and the final overrider. */
809e3e7f 2122 if (BINFO_VIRTUAL_P (b))
dbbf88d1
NS
2123 {
2124 virtual_base = b;
2125 break;
2126 }
4e7512c9 2127 }
4e7512c9 2128
a2ddc397
NS
2129 if (overrider_fn != overrider_target && !virtual_base)
2130 {
2131 /* The ABI specifies that a covariant thunk includes a mangling
0cbd7506
MS
2132 for a this pointer adjustment. This-adjusting thunks that
2133 override a function from a virtual base have a vcall
2134 adjustment. When the virtual base in question is a primary
2135 virtual base, we know the adjustments are zero, (and in the
2136 non-covariant case, we would not use the thunk).
2137 Unfortunately we didn't notice this could happen, when
2138 designing the ABI and so never mandated that such a covariant
2139 thunk should be emitted. Because we must use the ABI mandated
2140 name, we must continue searching from the binfo where we
2141 found the most recent definition of the function, towards the
2142 primary binfo which first introduced the function into the
2143 vtable. If that enters a virtual base, we must use a vcall
2144 this-adjusting thunk. Bleah! */
bb885938
NS
2145 tree probe = first_defn;
2146
2147 while ((probe = get_primary_binfo (probe))
2148 && (unsigned) list_length (BINFO_VIRTUALS (probe)) > ix)
809e3e7f 2149 if (BINFO_VIRTUAL_P (probe))
bb885938 2150 virtual_base = probe;
c8094d83 2151
a2ddc397
NS
2152 if (virtual_base)
2153 /* Even if we find a virtual base, the correct delta is
2154 between the overrider and the binfo we're building a vtable
2155 for. */
2156 goto virtual_covariant;
2157 }
c8094d83 2158
d0cd8b44
JM
2159 /* Compute the constant adjustment to the `this' pointer. The
2160 `this' pointer, when this function is called, will point at BINFO
2161 (or one of its primary bases, which are at the same offset). */
31f8e4f3 2162 if (virtual_base)
20dde49d
NS
2163 /* The `this' pointer needs to be adjusted from the declaration to
2164 the nearest virtual base. */
bb885938
NS
2165 delta = size_diffop (convert (ssizetype, BINFO_OFFSET (virtual_base)),
2166 convert (ssizetype, BINFO_OFFSET (first_defn)));
f11ee281
JM
2167 else if (lost)
2168 /* If the nearest definition is in a lost primary, we don't need an
2169 entry in our vtable. Except possibly in a constructor vtable,
2170 if we happen to get our primary back. In that case, the offset
2171 will be zero, as it will be a primary base. */
2172 delta = size_zero_node;
4e7512c9 2173 else
548502d3
MM
2174 /* The `this' pointer needs to be adjusted from pointing to
2175 BINFO to pointing at the base where the final overrider
2176 appears. */
a2ddc397 2177 virtual_covariant:
bb885938
NS
2178 delta = size_diffop (convert (ssizetype,
2179 BINFO_OFFSET (TREE_VALUE (overrider))),
2180 convert (ssizetype, BINFO_OFFSET (binfo)));
4e7512c9 2181
3cfabe60 2182 modify_vtable_entry (t, binfo, overrider_fn, delta, virtuals);
31f8e4f3
MM
2183
2184 if (virtual_base)
c8094d83 2185 BV_VCALL_INDEX (*virtuals)
3cfabe60 2186 = get_vcall_index (overrider_target, BINFO_TYPE (virtual_base));
d1f05f93
NS
2187 else
2188 BV_VCALL_INDEX (*virtuals) = NULL_TREE;
4e7512c9
MM
2189}
2190
8026246f 2191/* Called from modify_all_vtables via dfs_walk. */
e92cc029 2192
8026246f 2193static tree
94edc4ab 2194dfs_modify_vtables (tree binfo, void* data)
8026246f 2195{
bcb1079e 2196 tree t = (tree) data;
5b94d9dd
NS
2197 tree virtuals;
2198 tree old_virtuals;
2199 unsigned ix;
2200
2201 if (!TYPE_CONTAINS_VPTR_P (BINFO_TYPE (binfo)))
2202 /* A base without a vtable needs no modification, and its bases
2203 are uninteresting. */
2204 return dfs_skip_bases;
c8094d83 2205
5b94d9dd
NS
2206 if (SAME_BINFO_TYPE_P (BINFO_TYPE (binfo), t)
2207 && !CLASSTYPE_HAS_PRIMARY_BASE_P (t))
2208 /* Don't do the primary vtable, if it's new. */
2209 return NULL_TREE;
2210
2211 if (BINFO_PRIMARY_P (binfo) && !BINFO_VIRTUAL_P (binfo))
2212 /* There's no need to modify the vtable for a non-virtual primary
2213 base; we're not going to use that vtable anyhow. We do still
2214 need to do this for virtual primary bases, as they could become
2215 non-primary in a construction vtable. */
2216 return NULL_TREE;
2217
2218 make_new_vtable (t, binfo);
c8094d83 2219
5b94d9dd
NS
2220 /* Now, go through each of the virtual functions in the virtual
2221 function table for BINFO. Find the final overrider, and update
2222 the BINFO_VIRTUALS list appropriately. */
2223 for (ix = 0, virtuals = BINFO_VIRTUALS (binfo),
2224 old_virtuals = BINFO_VIRTUALS (TYPE_BINFO (BINFO_TYPE (binfo)));
2225 virtuals;
2226 ix++, virtuals = TREE_CHAIN (virtuals),
2227 old_virtuals = TREE_CHAIN (old_virtuals))
c8094d83
MS
2228 update_vtable_entry_for_fn (t,
2229 binfo,
5b94d9dd
NS
2230 BV_FN (old_virtuals),
2231 &virtuals, ix);
8026246f 2232
8026246f
MM
2233 return NULL_TREE;
2234}
2235
a68ad5bd
MM
2236/* Update all of the primary and secondary vtables for T. Create new
2237 vtables as required, and initialize their RTTI information. Each
e6858a84
NS
2238 of the functions in VIRTUALS is declared in T and may override a
2239 virtual function from a base class; find and modify the appropriate
2240 entries to point to the overriding functions. Returns a list, in
2241 declaration order, of the virtual functions that are declared in T,
2242 but do not appear in the primary base class vtable, and which
2243 should therefore be appended to the end of the vtable for T. */
a68ad5bd
MM
2244
2245static tree
94edc4ab 2246modify_all_vtables (tree t, tree virtuals)
8026246f 2247{
3461fba7
NS
2248 tree binfo = TYPE_BINFO (t);
2249 tree *fnsp;
a68ad5bd 2250
5e19c053 2251 /* Update all of the vtables. */
5b94d9dd 2252 dfs_walk_once (binfo, dfs_modify_vtables, NULL, t);
a68ad5bd 2253
e6858a84
NS
2254 /* Add virtual functions not already in our primary vtable. These
2255 will be both those introduced by this class, and those overridden
2256 from secondary bases. It does not include virtuals merely
2257 inherited from secondary bases. */
2258 for (fnsp = &virtuals; *fnsp; )
a68ad5bd 2259 {
3461fba7 2260 tree fn = TREE_VALUE (*fnsp);
a68ad5bd 2261
e6858a84
NS
2262 if (!value_member (fn, BINFO_VIRTUALS (binfo))
2263 || DECL_VINDEX (fn) == error_mark_node)
a68ad5bd 2264 {
3461fba7
NS
2265 /* We don't need to adjust the `this' pointer when
2266 calling this function. */
2267 BV_DELTA (*fnsp) = integer_zero_node;
2268 BV_VCALL_INDEX (*fnsp) = NULL_TREE;
2269
e6858a84 2270 /* This is a function not already in our vtable. Keep it. */
3461fba7 2271 fnsp = &TREE_CHAIN (*fnsp);
a68ad5bd 2272 }
3461fba7
NS
2273 else
2274 /* We've already got an entry for this function. Skip it. */
2275 *fnsp = TREE_CHAIN (*fnsp);
a68ad5bd 2276 }
e93ee644 2277
e6858a84 2278 return virtuals;
7177d104
MS
2279}
2280
7d5b8b11
MM
2281/* Get the base virtual function declarations in T that have the
2282 indicated NAME. */
e92cc029 2283
5ddc28a5 2284static tree
94edc4ab 2285get_basefndecls (tree name, tree t)
9e9ff709 2286{
7d5b8b11 2287 tree methods;
9e9ff709 2288 tree base_fndecls = NULL_TREE;
604a3205 2289 int n_baseclasses = BINFO_N_BASE_BINFOS (TYPE_BINFO (t));
7d5b8b11 2290 int i;
9e9ff709 2291
3d1df1fa
MM
2292 /* Find virtual functions in T with the indicated NAME. */
2293 i = lookup_fnfields_1 (t, name);
2294 if (i != -1)
aaaa46d2 2295 for (methods = VEC_index (tree, CLASSTYPE_METHOD_VEC (t), i);
3d1df1fa
MM
2296 methods;
2297 methods = OVL_NEXT (methods))
2298 {
2299 tree method = OVL_CURRENT (methods);
2300
2301 if (TREE_CODE (method) == FUNCTION_DECL
2302 && DECL_VINDEX (method))
2303 base_fndecls = tree_cons (NULL_TREE, method, base_fndecls);
2304 }
9e9ff709
MS
2305
2306 if (base_fndecls)
2307 return base_fndecls;
2308
2309 for (i = 0; i < n_baseclasses; i++)
2310 {
604a3205 2311 tree basetype = BINFO_TYPE (BINFO_BASE_BINFO (TYPE_BINFO (t), i));
7d5b8b11 2312 base_fndecls = chainon (get_basefndecls (name, basetype),
9e9ff709
MS
2313 base_fndecls);
2314 }
2315
2316 return base_fndecls;
2317}
2318
2ee887f2
MS
2319/* If this declaration supersedes the declaration of
2320 a method declared virtual in the base class, then
2321 mark this field as being virtual as well. */
2322
9f4faeae 2323void
94edc4ab 2324check_for_override (tree decl, tree ctype)
2ee887f2 2325{
cbb40945
NS
2326 if (TREE_CODE (decl) == TEMPLATE_DECL)
2327 /* In [temp.mem] we have:
2ee887f2 2328
0cbd7506
MS
2329 A specialization of a member function template does not
2330 override a virtual function from a base class. */
cbb40945
NS
2331 return;
2332 if ((DECL_DESTRUCTOR_P (decl)
a6c0d772
MM
2333 || IDENTIFIER_VIRTUAL_P (DECL_NAME (decl))
2334 || DECL_CONV_FN_P (decl))
cbb40945
NS
2335 && look_for_overrides (ctype, decl)
2336 && !DECL_STATIC_FUNCTION_P (decl))
e6858a84
NS
2337 /* Set DECL_VINDEX to a value that is neither an INTEGER_CST nor
2338 the error_mark_node so that we know it is an overriding
2339 function. */
2340 DECL_VINDEX (decl) = decl;
2341
cbb40945 2342 if (DECL_VIRTUAL_P (decl))
2ee887f2 2343 {
e6858a84 2344 if (!DECL_VINDEX (decl))
2ee887f2
MS
2345 DECL_VINDEX (decl) = error_mark_node;
2346 IDENTIFIER_VIRTUAL_P (DECL_NAME (decl)) = 1;
2347 }
2348}
2349
fc378698
MS
2350/* Warn about hidden virtual functions that are not overridden in t.
2351 We know that constructors and destructors don't apply. */
e92cc029 2352
b23e103b 2353static void
94edc4ab 2354warn_hidden (tree t)
9e9ff709 2355{
d4e6fecb 2356 VEC(tree,gc) *method_vec = CLASSTYPE_METHOD_VEC (t);
aaaa46d2
MM
2357 tree fns;
2358 size_t i;
9e9ff709
MS
2359
2360 /* We go through each separately named virtual function. */
c8094d83 2361 for (i = CLASSTYPE_FIRST_CONVERSION_SLOT;
9ba5ff0f 2362 VEC_iterate (tree, method_vec, i, fns);
aaaa46d2 2363 ++i)
9e9ff709 2364 {
aaaa46d2 2365 tree fn;
7d5b8b11
MM
2366 tree name;
2367 tree fndecl;
2368 tree base_fndecls;
fa743e8c
NS
2369 tree base_binfo;
2370 tree binfo;
7d5b8b11
MM
2371 int j;
2372
2373 /* All functions in this slot in the CLASSTYPE_METHOD_VEC will
2374 have the same name. Figure out what name that is. */
aaaa46d2 2375 name = DECL_NAME (OVL_CURRENT (fns));
7d5b8b11
MM
2376 /* There are no possibly hidden functions yet. */
2377 base_fndecls = NULL_TREE;
2378 /* Iterate through all of the base classes looking for possibly
2379 hidden functions. */
fa743e8c
NS
2380 for (binfo = TYPE_BINFO (t), j = 0;
2381 BINFO_BASE_ITERATE (binfo, j, base_binfo); j++)
a4832853 2382 {
fa743e8c 2383 tree basetype = BINFO_TYPE (base_binfo);
7d5b8b11
MM
2384 base_fndecls = chainon (get_basefndecls (name, basetype),
2385 base_fndecls);
a4832853
JM
2386 }
2387
00a17e31 2388 /* If there are no functions to hide, continue. */
7d5b8b11 2389 if (!base_fndecls)
9e9ff709
MS
2390 continue;
2391
00a17e31 2392 /* Remove any overridden functions. */
aaaa46d2 2393 for (fn = fns; fn; fn = OVL_NEXT (fn))
9e9ff709 2394 {
aaaa46d2 2395 fndecl = OVL_CURRENT (fn);
7d5b8b11
MM
2396 if (DECL_VINDEX (fndecl))
2397 {
2398 tree *prev = &base_fndecls;
c8094d83
MS
2399
2400 while (*prev)
7d5b8b11
MM
2401 /* If the method from the base class has the same
2402 signature as the method from the derived class, it
2403 has been overridden. */
2404 if (same_signature_p (fndecl, TREE_VALUE (*prev)))
2405 *prev = TREE_CHAIN (*prev);
2406 else
2407 prev = &TREE_CHAIN (*prev);
2408 }
9e9ff709
MS
2409 }
2410
9e9ff709
MS
2411 /* Now give a warning for all base functions without overriders,
2412 as they are hidden. */
c8094d83 2413 while (base_fndecls)
7d5b8b11
MM
2414 {
2415 /* Here we know it is a hider, and no overrider exists. */
dee15844
JM
2416 warning (0, "%q+D was hidden", TREE_VALUE (base_fndecls));
2417 warning (0, " by %q+D", fns);
7d5b8b11
MM
2418 base_fndecls = TREE_CHAIN (base_fndecls);
2419 }
9e9ff709
MS
2420 }
2421}
2422
2423/* Check for things that are invalid. There are probably plenty of other
2424 things we should check for also. */
e92cc029 2425
9e9ff709 2426static void
94edc4ab 2427finish_struct_anon (tree t)
9e9ff709
MS
2428{
2429 tree field;
f90cdf34 2430
9e9ff709
MS
2431 for (field = TYPE_FIELDS (t); field; field = TREE_CHAIN (field))
2432 {
2433 if (TREE_STATIC (field))
2434 continue;
2435 if (TREE_CODE (field) != FIELD_DECL)
2436 continue;
2437
2438 if (DECL_NAME (field) == NULL_TREE
6bdb8141 2439 && ANON_AGGR_TYPE_P (TREE_TYPE (field)))
9e9ff709 2440 {
f90cdf34
MT
2441 tree elt = TYPE_FIELDS (TREE_TYPE (field));
2442 for (; elt; elt = TREE_CHAIN (elt))
9e9ff709 2443 {
b7076960
MM
2444 /* We're generally only interested in entities the user
2445 declared, but we also find nested classes by noticing
2446 the TYPE_DECL that we create implicitly. You're
2447 allowed to put one anonymous union inside another,
6f32162a
JM
2448 though, so we explicitly tolerate that. We use
2449 TYPE_ANONYMOUS_P rather than ANON_AGGR_TYPE_P so that
2450 we also allow unnamed types used for defining fields. */
c8094d83 2451 if (DECL_ARTIFICIAL (elt)
b7076960 2452 && (!DECL_IMPLICIT_TYPEDEF_P (elt)
6f32162a 2453 || TYPE_ANONYMOUS_P (TREE_TYPE (elt))))
9e9ff709
MS
2454 continue;
2455
f90cdf34 2456 if (TREE_CODE (elt) != FIELD_DECL)
8ebeee52 2457 {
dee15844
JM
2458 pedwarn ("%q+#D invalid; an anonymous union can "
2459 "only have non-static data members", elt);
8ebeee52
JM
2460 continue;
2461 }
2462
f90cdf34 2463 if (TREE_PRIVATE (elt))
dee15844 2464 pedwarn ("private member %q+#D in anonymous union", elt);
f90cdf34 2465 else if (TREE_PROTECTED (elt))
dee15844 2466 pedwarn ("protected member %q+#D in anonymous union", elt);
fc378698 2467
f90cdf34
MT
2468 TREE_PRIVATE (elt) = TREE_PRIVATE (field);
2469 TREE_PROTECTED (elt) = TREE_PROTECTED (field);
9e9ff709
MS
2470 }
2471 }
2472 }
2473}
2474
7088fca9
KL
2475/* Add T to CLASSTYPE_DECL_LIST of current_class_type which
2476 will be used later during class template instantiation.
2477 When FRIEND_P is zero, T can be a static member data (VAR_DECL),
2478 a non-static member data (FIELD_DECL), a member function
c8094d83 2479 (FUNCTION_DECL), a nested type (RECORD_TYPE, ENUM_TYPE),
7088fca9
KL
2480 a typedef (TYPE_DECL) or a member class template (TEMPLATE_DECL)
2481 When FRIEND_P is nonzero, T is either a friend class
2482 (RECORD_TYPE, TEMPLATE_DECL) or a friend function
2483 (FUNCTION_DECL, TEMPLATE_DECL). */
2484
2485void
94edc4ab 2486maybe_add_class_template_decl_list (tree type, tree t, int friend_p)
7088fca9
KL
2487{
2488 /* Save some memory by not creating TREE_LIST if TYPE is not template. */
2489 if (CLASSTYPE_TEMPLATE_INFO (type))
2490 CLASSTYPE_DECL_LIST (type)
2491 = tree_cons (friend_p ? NULL_TREE : type,
2492 t, CLASSTYPE_DECL_LIST (type));
2493}
2494
61a127b3 2495/* Create default constructors, assignment operators, and so forth for
e5e459bf
AO
2496 the type indicated by T, if they are needed. CANT_HAVE_CONST_CTOR,
2497 and CANT_HAVE_CONST_ASSIGNMENT are nonzero if, for whatever reason,
2498 the class cannot have a default constructor, copy constructor
2499 taking a const reference argument, or an assignment operator taking
2500 a const reference, respectively. */
61a127b3 2501
f72ab53b 2502static void
c8094d83 2503add_implicitly_declared_members (tree t,
94edc4ab
NN
2504 int cant_have_const_cctor,
2505 int cant_have_const_assignment)
61a127b3 2506{
61a127b3 2507 /* Destructor. */
9f4faeae 2508 if (!CLASSTYPE_DESTRUCTORS (t))
61a127b3 2509 {
9f4faeae
MM
2510 /* In general, we create destructors lazily. */
2511 CLASSTYPE_LAZY_DESTRUCTOR (t) = 1;
2512 /* However, if the implicit destructor is non-trivial
2513 destructor, we sometimes have to create it at this point. */
2514 if (TYPE_HAS_NONTRIVIAL_DESTRUCTOR (t))
2515 {
2516 bool lazy_p = true;
61a127b3 2517
9f4faeae
MM
2518 if (TYPE_FOR_JAVA (t))
2519 /* If this a Java class, any non-trivial destructor is
2520 invalid, even if compiler-generated. Therefore, if the
2521 destructor is non-trivial we create it now. */
2522 lazy_p = false;
2523 else
2524 {
2525 tree binfo;
2526 tree base_binfo;
2527 int ix;
2528
2529 /* If the implicit destructor will be virtual, then we must
2530 generate it now because (unfortunately) we do not
2531 generate virtual tables lazily. */
2532 binfo = TYPE_BINFO (t);
2533 for (ix = 0; BINFO_BASE_ITERATE (binfo, ix, base_binfo); ix++)
2534 {
2535 tree base_type;
2536 tree dtor;
2537
2538 base_type = BINFO_TYPE (base_binfo);
2539 dtor = CLASSTYPE_DESTRUCTORS (base_type);
2540 if (dtor && DECL_VIRTUAL_P (dtor))
2541 {
2542 lazy_p = false;
2543 break;
2544 }
2545 }
2546 }
2547
2548 /* If we can't get away with being lazy, generate the destructor
c8094d83 2549 now. */
9f4faeae
MM
2550 if (!lazy_p)
2551 lazily_declare_fn (sfk_destructor, t);
2552 }
61a127b3 2553 }
61a127b3
MM
2554
2555 /* Default constructor. */
e5e459bf 2556 if (! TYPE_HAS_CONSTRUCTOR (t))
61a127b3 2557 {
508a1c9c
MM
2558 TYPE_HAS_DEFAULT_CONSTRUCTOR (t) = 1;
2559 CLASSTYPE_LAZY_DEFAULT_CTOR (t) = 1;
61a127b3
MM
2560 }
2561
2562 /* Copy constructor. */
6eabb241 2563 if (! TYPE_HAS_INIT_REF (t) && ! TYPE_FOR_JAVA (t))
61a127b3 2564 {
508a1c9c
MM
2565 TYPE_HAS_INIT_REF (t) = 1;
2566 TYPE_HAS_CONST_INIT_REF (t) = !cant_have_const_cctor;
2567 CLASSTYPE_LAZY_COPY_CTOR (t) = 1;
2568 TYPE_HAS_CONSTRUCTOR (t) = 1;
61a127b3
MM
2569 }
2570
aaaa46d2
MM
2571 /* If there is no assignment operator, one will be created if and
2572 when it is needed. For now, just record whether or not the type
2573 of the parameter to the assignment operator will be a const or
2574 non-const reference. */
2575 if (!TYPE_HAS_ASSIGN_REF (t) && !TYPE_FOR_JAVA (t))
fb232476
MM
2576 {
2577 TYPE_HAS_ASSIGN_REF (t) = 1;
2578 TYPE_HAS_CONST_ASSIGN_REF (t) = !cant_have_const_assignment;
2579 CLASSTYPE_LAZY_ASSIGNMENT_OP (t) = 1;
2580 }
61a127b3
MM
2581}
2582
f90cdf34
MT
2583/* Subroutine of finish_struct_1. Recursively count the number of fields
2584 in TYPE, including anonymous union members. */
2585
2586static int
94edc4ab 2587count_fields (tree fields)
f90cdf34
MT
2588{
2589 tree x;
2590 int n_fields = 0;
2591 for (x = fields; x; x = TREE_CHAIN (x))
2592 {
2593 if (TREE_CODE (x) == FIELD_DECL && ANON_AGGR_TYPE_P (TREE_TYPE (x)))
2594 n_fields += count_fields (TYPE_FIELDS (TREE_TYPE (x)));
2595 else
2596 n_fields += 1;
2597 }
2598 return n_fields;
2599}
2600
2601/* Subroutine of finish_struct_1. Recursively add all the fields in the
d07605f5 2602 TREE_LIST FIELDS to the SORTED_FIELDS_TYPE elts, starting at offset IDX. */
f90cdf34
MT
2603
2604static int
d07605f5 2605add_fields_to_record_type (tree fields, struct sorted_fields_type *field_vec, int idx)
f90cdf34
MT
2606{
2607 tree x;
2608 for (x = fields; x; x = TREE_CHAIN (x))
2609 {
2610 if (TREE_CODE (x) == FIELD_DECL && ANON_AGGR_TYPE_P (TREE_TYPE (x)))
d07605f5 2611 idx = add_fields_to_record_type (TYPE_FIELDS (TREE_TYPE (x)), field_vec, idx);
f90cdf34 2612 else
d07605f5 2613 field_vec->elts[idx++] = x;
f90cdf34
MT
2614 }
2615 return idx;
2616}
2617
1e30f9b4
MM
2618/* FIELD is a bit-field. We are finishing the processing for its
2619 enclosing type. Issue any appropriate messages and set appropriate
2620 flags. */
2621
2622static void
94edc4ab 2623check_bitfield_decl (tree field)
1e30f9b4
MM
2624{
2625 tree type = TREE_TYPE (field);
606791f6
MM
2626 tree w;
2627
2628 /* Extract the declared width of the bitfield, which has been
2629 temporarily stashed in DECL_INITIAL. */
2630 w = DECL_INITIAL (field);
3db45ab5 2631 gcc_assert (w != NULL_TREE);
606791f6
MM
2632 /* Remove the bit-field width indicator so that the rest of the
2633 compiler does not treat that value as an initializer. */
2634 DECL_INITIAL (field) = NULL_TREE;
1e30f9b4 2635
cd8ed629 2636 /* Detect invalid bit-field type. */
606791f6 2637 if (!INTEGRAL_TYPE_P (type))
1e30f9b4 2638 {
dee15844 2639 error ("bit-field %q+#D with non-integral type", field);
606791f6 2640 TREE_TYPE (field) = error_mark_node;
cd8ed629 2641 w = error_mark_node;
1e30f9b4 2642 }
606791f6 2643 else
1e30f9b4 2644 {
1e30f9b4
MM
2645 /* Avoid the non_lvalue wrapper added by fold for PLUS_EXPRs. */
2646 STRIP_NOPS (w);
2647
2648 /* detect invalid field size. */
8a784e4a 2649 w = integral_constant_value (w);
1e30f9b4
MM
2650
2651 if (TREE_CODE (w) != INTEGER_CST)
2652 {
dee15844 2653 error ("bit-field %q+D width not an integer constant", field);
cd8ed629 2654 w = error_mark_node;
1e30f9b4 2655 }
05bccae2 2656 else if (tree_int_cst_sgn (w) < 0)
1e30f9b4 2657 {
dee15844 2658 error ("negative width in bit-field %q+D", field);
cd8ed629 2659 w = error_mark_node;
1e30f9b4 2660 }
05bccae2 2661 else if (integer_zerop (w) && DECL_NAME (field) != 0)
1e30f9b4 2662 {
dee15844 2663 error ("zero width for bit-field %q+D", field);
cd8ed629 2664 w = error_mark_node;
1e30f9b4 2665 }
05bccae2 2666 else if (compare_tree_int (w, TYPE_PRECISION (type)) > 0
1e30f9b4
MM
2667 && TREE_CODE (type) != ENUMERAL_TYPE
2668 && TREE_CODE (type) != BOOLEAN_TYPE)
dee15844 2669 warning (0, "width of %q+D exceeds its type", field);
1e30f9b4 2670 else if (TREE_CODE (type) == ENUMERAL_TYPE
05bccae2
RK
2671 && (0 > compare_tree_int (w,
2672 min_precision (TYPE_MIN_VALUE (type),
8df83eae 2673 TYPE_UNSIGNED (type)))
05bccae2
RK
2674 || 0 > compare_tree_int (w,
2675 min_precision
2676 (TYPE_MAX_VALUE (type),
8df83eae 2677 TYPE_UNSIGNED (type)))))
dee15844 2678 warning (0, "%q+D is too small to hold all values of %q#T", field, type);
cd8ed629 2679 }
c8094d83 2680
cd8ed629
MM
2681 if (w != error_mark_node)
2682 {
2683 DECL_SIZE (field) = convert (bitsizetype, w);
2684 DECL_BIT_FIELD (field) = 1;
1e30f9b4
MM
2685 }
2686 else
cd8ed629
MM
2687 {
2688 /* Non-bit-fields are aligned for their type. */
2689 DECL_BIT_FIELD (field) = 0;
2690 CLEAR_DECL_C_BIT_FIELD (field);
cd8ed629 2691 }
1e30f9b4
MM
2692}
2693
2694/* FIELD is a non bit-field. We are finishing the processing for its
2695 enclosing type T. Issue any appropriate messages and set appropriate
2696 flags. */
2697
2698static void
94edc4ab 2699check_field_decl (tree field,
0cbd7506
MS
2700 tree t,
2701 int* cant_have_const_ctor,
2702 int* no_const_asn_ref,
94edc4ab 2703 int* any_default_members)
1e30f9b4
MM
2704{
2705 tree type = strip_array_types (TREE_TYPE (field));
2706
2707 /* An anonymous union cannot contain any fields which would change
2708 the settings of CANT_HAVE_CONST_CTOR and friends. */
2709 if (ANON_UNION_TYPE_P (type))
2710 ;
2711 /* And, we don't set TYPE_HAS_CONST_INIT_REF, etc., for anonymous
2712 structs. So, we recurse through their fields here. */
2713 else if (ANON_AGGR_TYPE_P (type))
2714 {
2715 tree fields;
2716
2717 for (fields = TYPE_FIELDS (type); fields; fields = TREE_CHAIN (fields))
17aec3eb 2718 if (TREE_CODE (fields) == FIELD_DECL && !DECL_C_BIT_FIELD (field))
1e30f9b4 2719 check_field_decl (fields, t, cant_have_const_ctor,
e5e459bf 2720 no_const_asn_ref, any_default_members);
1e30f9b4
MM
2721 }
2722 /* Check members with class type for constructors, destructors,
2723 etc. */
2724 else if (CLASS_TYPE_P (type))
2725 {
2726 /* Never let anything with uninheritable virtuals
2727 make it through without complaint. */
2728 abstract_virtuals_error (field, type);
c8094d83 2729
1e30f9b4
MM
2730 if (TREE_CODE (t) == UNION_TYPE)
2731 {
2732 if (TYPE_NEEDS_CONSTRUCTING (type))
dee15844
JM
2733 error ("member %q+#D with constructor not allowed in union",
2734 field);
834c6dff 2735 if (TYPE_HAS_NONTRIVIAL_DESTRUCTOR (type))
dee15844 2736 error ("member %q+#D with destructor not allowed in union", field);
1e30f9b4 2737 if (TYPE_HAS_COMPLEX_ASSIGN_REF (type))
dee15844
JM
2738 error ("member %q+#D with copy assignment operator not allowed in union",
2739 field);
1e30f9b4
MM
2740 }
2741 else
2742 {
2743 TYPE_NEEDS_CONSTRUCTING (t) |= TYPE_NEEDS_CONSTRUCTING (type);
c8094d83 2744 TYPE_HAS_NONTRIVIAL_DESTRUCTOR (t)
834c6dff 2745 |= TYPE_HAS_NONTRIVIAL_DESTRUCTOR (type);
1e30f9b4
MM
2746 TYPE_HAS_COMPLEX_ASSIGN_REF (t) |= TYPE_HAS_COMPLEX_ASSIGN_REF (type);
2747 TYPE_HAS_COMPLEX_INIT_REF (t) |= TYPE_HAS_COMPLEX_INIT_REF (type);
2748 }
2749
2750 if (!TYPE_HAS_CONST_INIT_REF (type))
2751 *cant_have_const_ctor = 1;
2752
2753 if (!TYPE_HAS_CONST_ASSIGN_REF (type))
2754 *no_const_asn_ref = 1;
1e30f9b4
MM
2755 }
2756 if (DECL_INITIAL (field) != NULL_TREE)
2757 {
2758 /* `build_class_init_list' does not recognize
2759 non-FIELD_DECLs. */
2760 if (TREE_CODE (t) == UNION_TYPE && any_default_members != 0)
1f070f2b 2761 error ("multiple fields in union %qT initialized", t);
1e30f9b4
MM
2762 *any_default_members = 1;
2763 }
6bb88f3b 2764}
1e30f9b4 2765
08b962b0
MM
2766/* Check the data members (both static and non-static), class-scoped
2767 typedefs, etc., appearing in the declaration of T. Issue
2768 appropriate diagnostics. Sets ACCESS_DECLS to a list (in
2769 declaration order) of access declarations; each TREE_VALUE in this
2770 list is a USING_DECL.
8d08fdba 2771
08b962b0 2772 In addition, set the following flags:
8d08fdba 2773
08b962b0
MM
2774 EMPTY_P
2775 The class is empty, i.e., contains no non-static data members.
8d08fdba 2776
08b962b0
MM
2777 CANT_HAVE_CONST_CTOR_P
2778 This class cannot have an implicitly generated copy constructor
2779 taking a const reference.
8d08fdba 2780
08b962b0
MM
2781 CANT_HAVE_CONST_ASN_REF
2782 This class cannot have an implicitly generated assignment
2783 operator taking a const reference.
8d08fdba 2784
08b962b0
MM
2785 All of these flags should be initialized before calling this
2786 function.
8d08fdba 2787
08b962b0
MM
2788 Returns a pointer to the end of the TYPE_FIELDs chain; additional
2789 fields can be added by adding to this chain. */
8d08fdba 2790
607cf131 2791static void
58731fd1 2792check_field_decls (tree t, tree *access_decls,
58731fd1
MM
2793 int *cant_have_const_ctor_p,
2794 int *no_const_asn_ref_p)
08b962b0
MM
2795{
2796 tree *field;
2797 tree *next;
dd29d26b 2798 bool has_pointers;
08b962b0
MM
2799 int any_default_members;
2800
2801 /* Assume there are no access declarations. */
2802 *access_decls = NULL_TREE;
2803 /* Assume this class has no pointer members. */
dd29d26b 2804 has_pointers = false;
08b962b0
MM
2805 /* Assume none of the members of this class have default
2806 initializations. */
2807 any_default_members = 0;
2808
2809 for (field = &TYPE_FIELDS (t); *field; field = next)
8d08fdba 2810 {
08b962b0
MM
2811 tree x = *field;
2812 tree type = TREE_TYPE (x);
8d08fdba 2813
08b962b0 2814 next = &TREE_CHAIN (x);
8d08fdba 2815
cffa8729 2816 if (TREE_CODE (x) == USING_DECL)
f30432d7 2817 {
08b962b0
MM
2818 /* Prune the access declaration from the list of fields. */
2819 *field = TREE_CHAIN (x);
2820
2821 /* Save the access declarations for our caller. */
2822 *access_decls = tree_cons (NULL_TREE, x, *access_decls);
2823
2824 /* Since we've reset *FIELD there's no reason to skip to the
2825 next field. */
2826 next = field;
f30432d7
MS
2827 continue;
2828 }
8d08fdba 2829
050367a3
MM
2830 if (TREE_CODE (x) == TYPE_DECL
2831 || TREE_CODE (x) == TEMPLATE_DECL)
f30432d7 2832 continue;
8d08fdba 2833
f30432d7 2834 /* If we've gotten this far, it's a data member, possibly static,
e92cc029 2835 or an enumerator. */
17aec3eb 2836 DECL_CONTEXT (x) = t;
8d08fdba 2837
58ec3cc5
MM
2838 /* When this goes into scope, it will be a non-local reference. */
2839 DECL_NONLOCAL (x) = 1;
2840
2841 if (TREE_CODE (t) == UNION_TYPE)
2842 {
2843 /* [class.union]
2844
2845 If a union contains a static data member, or a member of
324f9dfb 2846 reference type, the program is ill-formed. */
58ec3cc5
MM
2847 if (TREE_CODE (x) == VAR_DECL)
2848 {
dee15844 2849 error ("%q+D may not be static because it is a member of a union", x);
58ec3cc5
MM
2850 continue;
2851 }
2852 if (TREE_CODE (type) == REFERENCE_TYPE)
2853 {
dee15844
JM
2854 error ("%q+D may not have reference type %qT because"
2855 " it is a member of a union",
2856 x, type);
58ec3cc5
MM
2857 continue;
2858 }
2859 }
2860
f30432d7
MS
2861 /* ``A local class cannot have static data members.'' ARM 9.4 */
2862 if (current_function_decl && TREE_STATIC (x))
dee15844 2863 error ("field %q+D in local class cannot be static", x);
8d08fdba 2864
f30432d7
MS
2865 /* Perform error checking that did not get done in
2866 grokdeclarator. */
52fb2769 2867 if (TREE_CODE (type) == FUNCTION_TYPE)
f30432d7 2868 {
dee15844 2869 error ("field %q+D invalidly declared function type", x);
52fb2769
NS
2870 type = build_pointer_type (type);
2871 TREE_TYPE (x) = type;
f30432d7 2872 }
52fb2769 2873 else if (TREE_CODE (type) == METHOD_TYPE)
f30432d7 2874 {
dee15844 2875 error ("field %q+D invalidly declared method type", x);
52fb2769
NS
2876 type = build_pointer_type (type);
2877 TREE_TYPE (x) = type;
f30432d7 2878 }
8d08fdba 2879
52fb2769 2880 if (type == error_mark_node)
f30432d7 2881 continue;
c8094d83 2882
58ec3cc5 2883 if (TREE_CODE (x) == CONST_DECL || TREE_CODE (x) == VAR_DECL)
73a8adb6 2884 continue;
8d08fdba 2885
f30432d7 2886 /* Now it can only be a FIELD_DECL. */
8d08fdba 2887
f30432d7 2888 if (TREE_PRIVATE (x) || TREE_PROTECTED (x))
08b962b0 2889 CLASSTYPE_NON_AGGREGATE (t) = 1;
8d08fdba 2890
f30432d7
MS
2891 /* If this is of reference type, check if it needs an init.
2892 Also do a little ANSI jig if necessary. */
52fb2769 2893 if (TREE_CODE (type) == REFERENCE_TYPE)
0cbd7506 2894 {
08b962b0 2895 CLASSTYPE_NON_POD_P (t) = 1;
f30432d7 2896 if (DECL_INITIAL (x) == NULL_TREE)
6eb35968 2897 SET_CLASSTYPE_REF_FIELDS_NEED_INIT (t, 1);
8d08fdba 2898
f30432d7
MS
2899 /* ARM $12.6.2: [A member initializer list] (or, for an
2900 aggregate, initialization by a brace-enclosed list) is the
2901 only way to initialize nonstatic const and reference
2902 members. */
e349ee73 2903 TYPE_HAS_COMPLEX_ASSIGN_REF (t) = 1;
f30432d7 2904
778f6a08
JJ
2905 if (! TYPE_HAS_CONSTRUCTOR (t) && CLASSTYPE_NON_AGGREGATE (t)
2906 && extra_warnings)
b323323f 2907 warning (OPT_Wextra, "non-static reference %q+#D in class without a constructor", x);
f30432d7 2908 }
8d08fdba 2909
1e30f9b4 2910 type = strip_array_types (type);
dd29d26b 2911
1937f939
JM
2912 if (TYPE_PACKED (t))
2913 {
2914 if (!pod_type_p (type) && !TYPE_PACKED (type))
2915 warning
2916 (0,
2917 "ignoring packed attribute on unpacked non-POD field %q+#D",
2918 x);
2919 else if (TYPE_ALIGN (TREE_TYPE (x)) > BITS_PER_UNIT)
2920 DECL_PACKED (x) = 1;
2921 }
2922
2923 if (DECL_C_BIT_FIELD (x) && integer_zerop (DECL_INITIAL (x)))
2924 /* We don't treat zero-width bitfields as making a class
2925 non-empty. */
2926 ;
2927 else
2928 {
2929 /* The class is non-empty. */
2930 CLASSTYPE_EMPTY_P (t) = 0;
2931 /* The class is not even nearly empty. */
2932 CLASSTYPE_NEARLY_EMPTY_P (t) = 0;
2933 /* If one of the data members contains an empty class,
2934 so does T. */
2935 if (CLASS_TYPE_P (type)
2936 && CLASSTYPE_CONTAINS_EMPTY_CLASS_P (type))
2937 CLASSTYPE_CONTAINS_EMPTY_CLASS_P (t) = 1;
2938 }
2939
dd29d26b
GB
2940 /* This is used by -Weffc++ (see below). Warn only for pointers
2941 to members which might hold dynamic memory. So do not warn
2942 for pointers to functions or pointers to members. */
2943 if (TYPE_PTR_P (type)
2944 && !TYPE_PTRFN_P (type)
2945 && !TYPE_PTR_TO_MEMBER_P (type))
2946 has_pointers = true;
824b9a4c 2947
58ec3cc5
MM
2948 if (CLASS_TYPE_P (type))
2949 {
2950 if (CLASSTYPE_REF_FIELDS_NEED_INIT (type))
2951 SET_CLASSTYPE_REF_FIELDS_NEED_INIT (t, 1);
2952 if (CLASSTYPE_READONLY_FIELDS_NEED_INIT (type))
2953 SET_CLASSTYPE_READONLY_FIELDS_NEED_INIT (t, 1);
2954 }
2955
52fb2769 2956 if (DECL_MUTABLE_P (x) || TYPE_HAS_MUTABLE_P (type))
08b962b0 2957 CLASSTYPE_HAS_MUTABLE (t) = 1;
a7a7710d 2958
d282fcb2 2959 if (! pod_type_p (type))
0cbd7506
MS
2960 /* DR 148 now allows pointers to members (which are POD themselves),
2961 to be allowed in POD structs. */
08b962b0 2962 CLASSTYPE_NON_POD_P (t) = 1;
52fb2769 2963
94e6e4c4
AO
2964 if (! zero_init_p (type))
2965 CLASSTYPE_NON_ZERO_INIT_P (t) = 1;
2966
f30432d7 2967 /* If any field is const, the structure type is pseudo-const. */
52fb2769 2968 if (CP_TYPE_CONST_P (type))
f30432d7
MS
2969 {
2970 C_TYPE_FIELDS_READONLY (t) = 1;
2971 if (DECL_INITIAL (x) == NULL_TREE)
6eb35968 2972 SET_CLASSTYPE_READONLY_FIELDS_NEED_INIT (t, 1);
f30432d7
MS
2973
2974 /* ARM $12.6.2: [A member initializer list] (or, for an
2975 aggregate, initialization by a brace-enclosed list) is the
2976 only way to initialize nonstatic const and reference
2977 members. */
e349ee73 2978 TYPE_HAS_COMPLEX_ASSIGN_REF (t) = 1;
f30432d7 2979
778f6a08
JJ
2980 if (! TYPE_HAS_CONSTRUCTOR (t) && CLASSTYPE_NON_AGGREGATE (t)
2981 && extra_warnings)
b323323f 2982 warning (OPT_Wextra, "non-static const member %q+#D in class without a constructor", x);
f30432d7 2983 }
08b962b0 2984 /* A field that is pseudo-const makes the structure likewise. */
5552b43c 2985 else if (CLASS_TYPE_P (type))
f30432d7 2986 {
08b962b0 2987 C_TYPE_FIELDS_READONLY (t) |= C_TYPE_FIELDS_READONLY (type);
6eb35968
DE
2988 SET_CLASSTYPE_READONLY_FIELDS_NEED_INIT (t,
2989 CLASSTYPE_READONLY_FIELDS_NEED_INIT (t)
2990 | CLASSTYPE_READONLY_FIELDS_NEED_INIT (type));
f30432d7 2991 }
8d08fdba 2992
c10bffd0
JM
2993 /* Core issue 80: A nonstatic data member is required to have a
2994 different name from the class iff the class has a
2995 user-defined constructor. */
633221db 2996 if (constructor_name_p (DECL_NAME (x), t) && TYPE_HAS_CONSTRUCTOR (t))
dee15844 2997 pedwarn ("field %q+#D with same name as class", x);
c10bffd0 2998
162bc98d
JM
2999 /* We set DECL_C_BIT_FIELD in grokbitfield.
3000 If the type and width are valid, we'll also set DECL_BIT_FIELD. */
3001 if (DECL_C_BIT_FIELD (x))
1e30f9b4 3002 check_bitfield_decl (x);
f30432d7 3003 else
1e30f9b4 3004 check_field_decl (x, t,
08b962b0 3005 cant_have_const_ctor_p,
08b962b0 3006 no_const_asn_ref_p,
1e30f9b4 3007 &any_default_members);
8d08fdba
MS
3008 }
3009
dd29d26b
GB
3010 /* Effective C++ rule 11: if a class has dynamic memory held by pointers,
3011 it should also define a copy constructor and an assignment operator to
3012 implement the correct copy semantic (deep vs shallow, etc.). As it is
3013 not feasible to check whether the constructors do allocate dynamic memory
3014 and store it within members, we approximate the warning like this:
3015
3016 -- Warn only if there are members which are pointers
3017 -- Warn only if there is a non-trivial constructor (otherwise,
3018 there cannot be memory allocated).
3019 -- Warn only if there is a non-trivial destructor. We assume that the
3020 user at least implemented the cleanup correctly, and a destructor
3021 is needed to free dynamic memory.
c8094d83 3022
77880ae4 3023 This seems enough for practical purposes. */
dd29d26b
GB
3024 if (warn_ecpp
3025 && has_pointers
3026 && TYPE_HAS_CONSTRUCTOR (t)
9f4faeae 3027 && TYPE_HAS_NONTRIVIAL_DESTRUCTOR (t)
dd29d26b 3028 && !(TYPE_HAS_INIT_REF (t) && TYPE_HAS_ASSIGN_REF (t)))
824b9a4c 3029 {
b323323f 3030 warning (OPT_Weffc__, "%q#T has pointer data members", t);
c8094d83 3031
824b9a4c
MS
3032 if (! TYPE_HAS_INIT_REF (t))
3033 {
74fa0285 3034 warning (OPT_Weffc__,
3db45ab5 3035 " but does not override %<%T(const %T&)%>", t, t);
74fa0285
GDR
3036 if (!TYPE_HAS_ASSIGN_REF (t))
3037 warning (OPT_Weffc__, " or %<operator=(const %T&)%>", t);
824b9a4c
MS
3038 }
3039 else if (! TYPE_HAS_ASSIGN_REF (t))
74fa0285 3040 warning (OPT_Weffc__,
3db45ab5 3041 " but does not override %<operator=(const %T&)%>", t);
824b9a4c 3042 }
08b962b0 3043
607cf131
MM
3044
3045 /* Check anonymous struct/anonymous union fields. */
3046 finish_struct_anon (t);
3047
08b962b0
MM
3048 /* We've built up the list of access declarations in reverse order.
3049 Fix that now. */
3050 *access_decls = nreverse (*access_decls);
08b962b0
MM
3051}
3052
c20118a8
MM
3053/* If TYPE is an empty class type, records its OFFSET in the table of
3054 OFFSETS. */
607cf131 3055
c20118a8 3056static int
94edc4ab 3057record_subobject_offset (tree type, tree offset, splay_tree offsets)
5c24fba6 3058{
c20118a8 3059 splay_tree_node n;
5c24fba6 3060
c20118a8
MM
3061 if (!is_empty_class (type))
3062 return 0;
5c24fba6 3063
c20118a8
MM
3064 /* Record the location of this empty object in OFFSETS. */
3065 n = splay_tree_lookup (offsets, (splay_tree_key) offset);
3066 if (!n)
c8094d83 3067 n = splay_tree_insert (offsets,
c20118a8
MM
3068 (splay_tree_key) offset,
3069 (splay_tree_value) NULL_TREE);
c8094d83 3070 n->value = ((splay_tree_value)
c20118a8
MM
3071 tree_cons (NULL_TREE,
3072 type,
3073 (tree) n->value));
3074
3075 return 0;
607cf131
MM
3076}
3077
838dfd8a 3078/* Returns nonzero if TYPE is an empty class type and there is
c20118a8 3079 already an entry in OFFSETS for the same TYPE as the same OFFSET. */
9785e4b1 3080
c20118a8 3081static int
94edc4ab 3082check_subobject_offset (tree type, tree offset, splay_tree offsets)
9785e4b1 3083{
c20118a8
MM
3084 splay_tree_node n;
3085 tree t;
3086
3087 if (!is_empty_class (type))
3088 return 0;
3089
3090 /* Record the location of this empty object in OFFSETS. */
3091 n = splay_tree_lookup (offsets, (splay_tree_key) offset);
3092 if (!n)
3093 return 0;
3094
3095 for (t = (tree) n->value; t; t = TREE_CHAIN (t))
3096 if (same_type_p (TREE_VALUE (t), type))
3097 return 1;
3098
3099 return 0;
9785e4b1
MM
3100}
3101
c20118a8
MM
3102/* Walk through all the subobjects of TYPE (located at OFFSET). Call
3103 F for every subobject, passing it the type, offset, and table of
2003cd37
MM
3104 OFFSETS. If VBASES_P is one, then virtual non-primary bases should
3105 be traversed.
5cdba4ff
MM
3106
3107 If MAX_OFFSET is non-NULL, then subobjects with an offset greater
3108 than MAX_OFFSET will not be walked.
3109
838dfd8a 3110 If F returns a nonzero value, the traversal ceases, and that value
5cdba4ff 3111 is returned. Otherwise, returns zero. */
d77249e7 3112
c20118a8 3113static int
c8094d83 3114walk_subobject_offsets (tree type,
0cbd7506
MS
3115 subobject_offset_fn f,
3116 tree offset,
3117 splay_tree offsets,
3118 tree max_offset,
3119 int vbases_p)
5c24fba6 3120{
c20118a8 3121 int r = 0;
ff944b49 3122 tree type_binfo = NULL_TREE;
c20118a8 3123
5cdba4ff
MM
3124 /* If this OFFSET is bigger than the MAX_OFFSET, then we should
3125 stop. */
3126 if (max_offset && INT_CST_LT (max_offset, offset))
3127 return 0;
3128
dbe91deb
NS
3129 if (type == error_mark_node)
3130 return 0;
3db45ab5 3131
c8094d83 3132 if (!TYPE_P (type))
ff944b49
MM
3133 {
3134 if (abi_version_at_least (2))
3135 type_binfo = type;
3136 type = BINFO_TYPE (type);
3137 }
3138
c20118a8 3139 if (CLASS_TYPE_P (type))
5c24fba6 3140 {
c20118a8 3141 tree field;
17bbb839 3142 tree binfo;
c20118a8
MM
3143 int i;
3144
5ec1192e
MM
3145 /* Avoid recursing into objects that are not interesting. */
3146 if (!CLASSTYPE_CONTAINS_EMPTY_CLASS_P (type))
3147 return 0;
3148
c20118a8
MM
3149 /* Record the location of TYPE. */
3150 r = (*f) (type, offset, offsets);
3151 if (r)
3152 return r;
3153
3154 /* Iterate through the direct base classes of TYPE. */
ff944b49
MM
3155 if (!type_binfo)
3156 type_binfo = TYPE_BINFO (type);
fa743e8c 3157 for (i = 0; BINFO_BASE_ITERATE (type_binfo, i, binfo); i++)
c20118a8 3158 {
ff944b49
MM
3159 tree binfo_offset;
3160
c8094d83 3161 if (abi_version_at_least (2)
809e3e7f 3162 && BINFO_VIRTUAL_P (binfo))
17bbb839 3163 continue;
5c24fba6 3164
c8094d83
MS
3165 if (!vbases_p
3166 && BINFO_VIRTUAL_P (binfo)
9965d119 3167 && !BINFO_PRIMARY_P (binfo))
c20118a8
MM
3168 continue;
3169
ff944b49
MM
3170 if (!abi_version_at_least (2))
3171 binfo_offset = size_binop (PLUS_EXPR,
3172 offset,
3173 BINFO_OFFSET (binfo));
3174 else
3175 {
3176 tree orig_binfo;
3177 /* We cannot rely on BINFO_OFFSET being set for the base
3178 class yet, but the offsets for direct non-virtual
3179 bases can be calculated by going back to the TYPE. */
604a3205 3180 orig_binfo = BINFO_BASE_BINFO (TYPE_BINFO (type), i);
c8094d83 3181 binfo_offset = size_binop (PLUS_EXPR,
ff944b49
MM
3182 offset,
3183 BINFO_OFFSET (orig_binfo));
3184 }
3185
3186 r = walk_subobject_offsets (binfo,
c20118a8 3187 f,
ff944b49 3188 binfo_offset,
c20118a8 3189 offsets,
5cdba4ff 3190 max_offset,
c8094d83 3191 (abi_version_at_least (2)
17bbb839 3192 ? /*vbases_p=*/0 : vbases_p));
c20118a8
MM
3193 if (r)
3194 return r;
3195 }
3196
58c42dc2 3197 if (abi_version_at_least (2) && CLASSTYPE_VBASECLASSES (type))
17bbb839 3198 {
58c42dc2 3199 unsigned ix;
d4e6fecb 3200 VEC(tree,gc) *vbases;
17bbb839 3201
ff944b49
MM
3202 /* Iterate through the virtual base classes of TYPE. In G++
3203 3.2, we included virtual bases in the direct base class
3204 loop above, which results in incorrect results; the
3205 correct offsets for virtual bases are only known when
3206 working with the most derived type. */
3207 if (vbases_p)
9ba5ff0f
NS
3208 for (vbases = CLASSTYPE_VBASECLASSES (type), ix = 0;
3209 VEC_iterate (tree, vbases, ix, binfo); ix++)
ff944b49 3210 {
ff944b49
MM
3211 r = walk_subobject_offsets (binfo,
3212 f,
3213 size_binop (PLUS_EXPR,
3214 offset,
3215 BINFO_OFFSET (binfo)),
3216 offsets,
3217 max_offset,
3218 /*vbases_p=*/0);
3219 if (r)
3220 return r;
3221 }
3222 else
17bbb839 3223 {
ff944b49
MM
3224 /* We still have to walk the primary base, if it is
3225 virtual. (If it is non-virtual, then it was walked
3226 above.) */
58c42dc2 3227 tree vbase = get_primary_binfo (type_binfo);
c8094d83 3228
809e3e7f 3229 if (vbase && BINFO_VIRTUAL_P (vbase)
fc6633e0
NS
3230 && BINFO_PRIMARY_P (vbase)
3231 && BINFO_INHERITANCE_CHAIN (vbase) == type_binfo)
ff944b49 3232 {
c8094d83 3233 r = (walk_subobject_offsets
dbbf88d1
NS
3234 (vbase, f, offset,
3235 offsets, max_offset, /*vbases_p=*/0));
3236 if (r)
3237 return r;
ff944b49 3238 }
17bbb839
MM
3239 }
3240 }
3241
c20118a8
MM
3242 /* Iterate through the fields of TYPE. */
3243 for (field = TYPE_FIELDS (type); field; field = TREE_CHAIN (field))
17bbb839 3244 if (TREE_CODE (field) == FIELD_DECL && !DECL_ARTIFICIAL (field))
c20118a8 3245 {
956d9305
MM
3246 tree field_offset;
3247
3248 if (abi_version_at_least (2))
3249 field_offset = byte_position (field);
3250 else
3251 /* In G++ 3.2, DECL_FIELD_OFFSET was used. */
3252 field_offset = DECL_FIELD_OFFSET (field);
3253
c20118a8
MM
3254 r = walk_subobject_offsets (TREE_TYPE (field),
3255 f,
3256 size_binop (PLUS_EXPR,
3257 offset,
956d9305 3258 field_offset),
c20118a8 3259 offsets,
5cdba4ff 3260 max_offset,
c20118a8
MM
3261 /*vbases_p=*/1);
3262 if (r)
3263 return r;
3264 }
5c24fba6 3265 }
c20118a8
MM
3266 else if (TREE_CODE (type) == ARRAY_TYPE)
3267 {
5ec1192e 3268 tree element_type = strip_array_types (type);
c20118a8
MM
3269 tree domain = TYPE_DOMAIN (type);
3270 tree index;
5c24fba6 3271
5ec1192e
MM
3272 /* Avoid recursing into objects that are not interesting. */
3273 if (!CLASS_TYPE_P (element_type)
3274 || !CLASSTYPE_CONTAINS_EMPTY_CLASS_P (element_type))
3275 return 0;
3276
c20118a8 3277 /* Step through each of the elements in the array. */
17bbb839
MM
3278 for (index = size_zero_node;
3279 /* G++ 3.2 had an off-by-one error here. */
c8094d83 3280 (abi_version_at_least (2)
17bbb839
MM
3281 ? !INT_CST_LT (TYPE_MAX_VALUE (domain), index)
3282 : INT_CST_LT (index, TYPE_MAX_VALUE (domain)));
c20118a8
MM
3283 index = size_binop (PLUS_EXPR, index, size_one_node))
3284 {
3285 r = walk_subobject_offsets (TREE_TYPE (type),
3286 f,
3287 offset,
3288 offsets,
5cdba4ff 3289 max_offset,
c20118a8
MM
3290 /*vbases_p=*/1);
3291 if (r)
3292 return r;
c8094d83 3293 offset = size_binop (PLUS_EXPR, offset,
c20118a8 3294 TYPE_SIZE_UNIT (TREE_TYPE (type)));
5cdba4ff
MM
3295 /* If this new OFFSET is bigger than the MAX_OFFSET, then
3296 there's no point in iterating through the remaining
3297 elements of the array. */
3298 if (max_offset && INT_CST_LT (max_offset, offset))
3299 break;
c20118a8
MM
3300 }
3301 }
3302
3303 return 0;
3304}
3305
c0572427
MM
3306/* Record all of the empty subobjects of TYPE (either a type or a
3307 binfo). If IS_DATA_MEMBER is true, then a non-static data member
c5a35c3c
MM
3308 is being placed at OFFSET; otherwise, it is a base class that is
3309 being placed at OFFSET. */
c20118a8
MM
3310
3311static void
c8094d83 3312record_subobject_offsets (tree type,
0cbd7506
MS
3313 tree offset,
3314 splay_tree offsets,
c5a35c3c 3315 bool is_data_member)
c20118a8 3316{
c5a35c3c 3317 tree max_offset;
c0572427
MM
3318 /* If recording subobjects for a non-static data member or a
3319 non-empty base class , we do not need to record offsets beyond
3320 the size of the biggest empty class. Additional data members
3321 will go at the end of the class. Additional base classes will go
3322 either at offset zero (if empty, in which case they cannot
3323 overlap with offsets past the size of the biggest empty class) or
3324 at the end of the class.
3325
3326 However, if we are placing an empty base class, then we must record
c5a35c3c
MM
3327 all offsets, as either the empty class is at offset zero (where
3328 other empty classes might later be placed) or at the end of the
3329 class (where other objects might then be placed, so other empty
3330 subobjects might later overlap). */
3db45ab5 3331 if (is_data_member
c0572427 3332 || !is_empty_class (BINFO_TYPE (type)))
c5a35c3c
MM
3333 max_offset = sizeof_biggest_empty_class;
3334 else
3335 max_offset = NULL_TREE;
c20118a8 3336 walk_subobject_offsets (type, record_subobject_offset, offset,
c5a35c3c 3337 offsets, max_offset, is_data_member);
5c24fba6
MM
3338}
3339
838dfd8a
KH
3340/* Returns nonzero if any of the empty subobjects of TYPE (located at
3341 OFFSET) conflict with entries in OFFSETS. If VBASES_P is nonzero,
c20118a8 3342 virtual bases of TYPE are examined. */
9785e4b1
MM
3343
3344static int
94edc4ab 3345layout_conflict_p (tree type,
0cbd7506
MS
3346 tree offset,
3347 splay_tree offsets,
3348 int vbases_p)
9785e4b1 3349{
5cdba4ff
MM
3350 splay_tree_node max_node;
3351
3352 /* Get the node in OFFSETS that indicates the maximum offset where
3353 an empty subobject is located. */
3354 max_node = splay_tree_max (offsets);
3355 /* If there aren't any empty subobjects, then there's no point in
3356 performing this check. */
3357 if (!max_node)
3358 return 0;
3359
c20118a8 3360 return walk_subobject_offsets (type, check_subobject_offset, offset,
5cdba4ff
MM
3361 offsets, (tree) (max_node->key),
3362 vbases_p);
9785e4b1
MM
3363}
3364
5c24fba6
MM
3365/* DECL is a FIELD_DECL corresponding either to a base subobject of a
3366 non-static data member of the type indicated by RLI. BINFO is the
c20118a8 3367 binfo corresponding to the base subobject, OFFSETS maps offsets to
17bbb839
MM
3368 types already located at those offsets. This function determines
3369 the position of the DECL. */
5c24fba6
MM
3370
3371static void
c8094d83
MS
3372layout_nonempty_base_or_field (record_layout_info rli,
3373 tree decl,
3374 tree binfo,
17bbb839 3375 splay_tree offsets)
5c24fba6 3376{
c20118a8 3377 tree offset = NULL_TREE;
17bbb839
MM
3378 bool field_p;
3379 tree type;
c8094d83 3380
17bbb839
MM
3381 if (binfo)
3382 {
3383 /* For the purposes of determining layout conflicts, we want to
3384 use the class type of BINFO; TREE_TYPE (DECL) will be the
3385 CLASSTYPE_AS_BASE version, which does not contain entries for
3386 zero-sized bases. */
3387 type = TREE_TYPE (binfo);
3388 field_p = false;
3389 }
3390 else
3391 {
3392 type = TREE_TYPE (decl);
3393 field_p = true;
3394 }
c20118a8 3395
5c24fba6
MM
3396 /* Try to place the field. It may take more than one try if we have
3397 a hard time placing the field without putting two objects of the
3398 same type at the same address. */
3399 while (1)
3400 {
defd0dea 3401 struct record_layout_info_s old_rli = *rli;
5c24fba6 3402
770ae6cc
RK
3403 /* Place this field. */
3404 place_field (rli, decl);
da3d4dfa 3405 offset = byte_position (decl);
1e2e9f54 3406
5c24fba6
MM
3407 /* We have to check to see whether or not there is already
3408 something of the same type at the offset we're about to use.
1e2e9f54 3409 For example, consider:
c8094d83 3410
1e2e9f54
MM
3411 struct S {};
3412 struct T : public S { int i; };
3413 struct U : public S, public T {};
c8094d83 3414
5c24fba6
MM
3415 Here, we put S at offset zero in U. Then, we can't put T at
3416 offset zero -- its S component would be at the same address
3417 as the S we already allocated. So, we have to skip ahead.
3418 Since all data members, including those whose type is an
838dfd8a 3419 empty class, have nonzero size, any overlap can happen only
5c24fba6
MM
3420 with a direct or indirect base-class -- it can't happen with
3421 a data member. */
1e2e9f54
MM
3422 /* In a union, overlap is permitted; all members are placed at
3423 offset zero. */
3424 if (TREE_CODE (rli->t) == UNION_TYPE)
3425 break;
7ba539c6
MM
3426 /* G++ 3.2 did not check for overlaps when placing a non-empty
3427 virtual base. */
809e3e7f 3428 if (!abi_version_at_least (2) && binfo && BINFO_VIRTUAL_P (binfo))
7ba539c6 3429 break;
c8094d83 3430 if (layout_conflict_p (field_p ? type : binfo, offset,
ff944b49 3431 offsets, field_p))
5c24fba6 3432 {
5c24fba6
MM
3433 /* Strip off the size allocated to this field. That puts us
3434 at the first place we could have put the field with
3435 proper alignment. */
770ae6cc
RK
3436 *rli = old_rli;
3437
c20118a8 3438 /* Bump up by the alignment required for the type. */
770ae6cc 3439 rli->bitpos
c8094d83
MS
3440 = size_binop (PLUS_EXPR, rli->bitpos,
3441 bitsize_int (binfo
c20118a8
MM
3442 ? CLASSTYPE_ALIGN (type)
3443 : TYPE_ALIGN (type)));
770ae6cc 3444 normalize_rli (rli);
5c24fba6
MM
3445 }
3446 else
3447 /* There was no conflict. We're done laying out this field. */
3448 break;
3449 }
c20118a8 3450
623fe76a 3451 /* Now that we know where it will be placed, update its
c20118a8
MM
3452 BINFO_OFFSET. */
3453 if (binfo && CLASS_TYPE_P (BINFO_TYPE (binfo)))
90024bdc 3454 /* Indirect virtual bases may have a nonzero BINFO_OFFSET at
17bbb839
MM
3455 this point because their BINFO_OFFSET is copied from another
3456 hierarchy. Therefore, we may not need to add the entire
3457 OFFSET. */
c8094d83 3458 propagate_binfo_offsets (binfo,
17bbb839 3459 size_diffop (convert (ssizetype, offset),
c8094d83 3460 convert (ssizetype,
dbbf88d1 3461 BINFO_OFFSET (binfo))));
5c24fba6
MM
3462}
3463
90024bdc 3464/* Returns true if TYPE is empty and OFFSET is nonzero. */
7ba539c6
MM
3465
3466static int
3467empty_base_at_nonzero_offset_p (tree type,
3468 tree offset,
3469 splay_tree offsets ATTRIBUTE_UNUSED)
3470{
3471 return is_empty_class (type) && !integer_zerop (offset);
3472}
3473
9785e4b1 3474/* Layout the empty base BINFO. EOC indicates the byte currently just
ec386958 3475 past the end of the class, and should be correctly aligned for a
c20118a8 3476 class of the type indicated by BINFO; OFFSETS gives the offsets of
623fe76a 3477 the empty bases allocated so far. T is the most derived
838dfd8a 3478 type. Return nonzero iff we added it at the end. */
9785e4b1 3479
06d9f09f 3480static bool
dbbf88d1 3481layout_empty_base (tree binfo, tree eoc, splay_tree offsets)
9785e4b1 3482{
ec386958 3483 tree alignment;
9785e4b1 3484 tree basetype = BINFO_TYPE (binfo);
06d9f09f 3485 bool atend = false;
956d9305 3486
9785e4b1 3487 /* This routine should only be used for empty classes. */
50bc768d 3488 gcc_assert (is_empty_class (basetype));
1b50716d 3489 alignment = ssize_int (CLASSTYPE_ALIGN_UNIT (basetype));
9785e4b1 3490
3075b327
NS
3491 if (!integer_zerop (BINFO_OFFSET (binfo)))
3492 {
3493 if (abi_version_at_least (2))
3494 propagate_binfo_offsets
3495 (binfo, size_diffop (size_zero_node, BINFO_OFFSET (binfo)));
74fa0285
GDR
3496 else
3497 warning (OPT_Wabi,
3db45ab5 3498 "offset of empty base %qT may not be ABI-compliant and may"
3075b327
NS
3499 "change in a future version of GCC",
3500 BINFO_TYPE (binfo));
3501 }
c8094d83 3502
9785e4b1
MM
3503 /* This is an empty base class. We first try to put it at offset
3504 zero. */
ff944b49 3505 if (layout_conflict_p (binfo,
c20118a8 3506 BINFO_OFFSET (binfo),
c8094d83 3507 offsets,
c20118a8 3508 /*vbases_p=*/0))
9785e4b1
MM
3509 {
3510 /* That didn't work. Now, we move forward from the next
3511 available spot in the class. */
06d9f09f 3512 atend = true;
dbbf88d1 3513 propagate_binfo_offsets (binfo, convert (ssizetype, eoc));
c8094d83 3514 while (1)
9785e4b1 3515 {
ff944b49 3516 if (!layout_conflict_p (binfo,
c8094d83 3517 BINFO_OFFSET (binfo),
c20118a8
MM
3518 offsets,
3519 /*vbases_p=*/0))
9785e4b1
MM
3520 /* We finally found a spot where there's no overlap. */
3521 break;
3522
3523 /* There's overlap here, too. Bump along to the next spot. */
dbbf88d1 3524 propagate_binfo_offsets (binfo, alignment);
9785e4b1
MM
3525 }
3526 }
06d9f09f 3527 return atend;
9785e4b1
MM
3528}
3529
78dcd41a 3530/* Layout the base given by BINFO in the class indicated by RLI.
58731fd1 3531 *BASE_ALIGN is a running maximum of the alignments of
17bbb839
MM
3532 any base class. OFFSETS gives the location of empty base
3533 subobjects. T is the most derived type. Return nonzero if the new
3534 object cannot be nearly-empty. A new FIELD_DECL is inserted at
c8094d83 3535 *NEXT_FIELD, unless BINFO is for an empty base class.
5c24fba6 3536
17bbb839
MM
3537 Returns the location at which the next field should be inserted. */
3538
3539static tree *
58731fd1 3540build_base_field (record_layout_info rli, tree binfo,
17bbb839 3541 splay_tree offsets, tree *next_field)
d77249e7 3542{
17bbb839 3543 tree t = rli->t;
d77249e7 3544 tree basetype = BINFO_TYPE (binfo);
d77249e7 3545
d0f062fb 3546 if (!COMPLETE_TYPE_P (basetype))
d77249e7
MM
3547 /* This error is now reported in xref_tag, thus giving better
3548 location information. */
17bbb839 3549 return next_field;
c8094d83 3550
17bbb839
MM
3551 /* Place the base class. */
3552 if (!is_empty_class (basetype))
5c24fba6 3553 {
17bbb839
MM
3554 tree decl;
3555
5c24fba6
MM
3556 /* The containing class is non-empty because it has a non-empty
3557 base class. */
58731fd1 3558 CLASSTYPE_EMPTY_P (t) = 0;
c8094d83 3559
17bbb839
MM
3560 /* Create the FIELD_DECL. */
3561 decl = build_decl (FIELD_DECL, NULL_TREE, CLASSTYPE_AS_BASE (basetype));
3562 DECL_ARTIFICIAL (decl) = 1;
78e0d62b 3563 DECL_IGNORED_P (decl) = 1;
17bbb839
MM
3564 DECL_FIELD_CONTEXT (decl) = t;
3565 DECL_SIZE (decl) = CLASSTYPE_SIZE (basetype);
3566 DECL_SIZE_UNIT (decl) = CLASSTYPE_SIZE_UNIT (basetype);
3567 DECL_ALIGN (decl) = CLASSTYPE_ALIGN (basetype);
3568 DECL_USER_ALIGN (decl) = CLASSTYPE_USER_ALIGN (basetype);
550f100c 3569 DECL_MODE (decl) = TYPE_MODE (basetype);
642124c6 3570 DECL_FIELD_IS_BASE (decl) = 1;
0f3a8219 3571
5c24fba6
MM
3572 /* Try to place the field. It may take more than one try if we
3573 have a hard time placing the field without putting two
3574 objects of the same type at the same address. */
17bbb839
MM
3575 layout_nonempty_base_or_field (rli, decl, binfo, offsets);
3576 /* Add the new FIELD_DECL to the list of fields for T. */
3577 TREE_CHAIN (decl) = *next_field;
3578 *next_field = decl;
3579 next_field = &TREE_CHAIN (decl);
5c24fba6
MM
3580 }
3581 else
ec386958 3582 {
17bbb839 3583 tree eoc;
7ba539c6 3584 bool atend;
ec386958
MM
3585
3586 /* On some platforms (ARM), even empty classes will not be
3587 byte-aligned. */
17bbb839
MM
3588 eoc = round_up (rli_size_unit_so_far (rli),
3589 CLASSTYPE_ALIGN_UNIT (basetype));
dbbf88d1 3590 atend = layout_empty_base (binfo, eoc, offsets);
7ba539c6
MM
3591 /* A nearly-empty class "has no proper base class that is empty,
3592 not morally virtual, and at an offset other than zero." */
809e3e7f 3593 if (!BINFO_VIRTUAL_P (binfo) && CLASSTYPE_NEARLY_EMPTY_P (t))
7ba539c6
MM
3594 {
3595 if (atend)
3596 CLASSTYPE_NEARLY_EMPTY_P (t) = 0;
c5a35c3c 3597 /* The check above (used in G++ 3.2) is insufficient because
7ba539c6 3598 an empty class placed at offset zero might itself have an
90024bdc 3599 empty base at a nonzero offset. */
c8094d83 3600 else if (walk_subobject_offsets (basetype,
7ba539c6
MM
3601 empty_base_at_nonzero_offset_p,
3602 size_zero_node,
3603 /*offsets=*/NULL,
3604 /*max_offset=*/NULL_TREE,
3605 /*vbases_p=*/true))
3606 {
3607 if (abi_version_at_least (2))
3608 CLASSTYPE_NEARLY_EMPTY_P (t) = 0;
74fa0285
GDR
3609 else
3610 warning (OPT_Wabi,
3db45ab5 3611 "class %qT will be considered nearly empty in a "
7ba539c6
MM
3612 "future version of GCC", t);
3613 }
3614 }
c8094d83 3615
17bbb839
MM
3616 /* We do not create a FIELD_DECL for empty base classes because
3617 it might overlap some other field. We want to be able to
3618 create CONSTRUCTORs for the class by iterating over the
3619 FIELD_DECLs, and the back end does not handle overlapping
3620 FIELD_DECLs. */
58731fd1
MM
3621
3622 /* An empty virtual base causes a class to be non-empty
3623 -- but in that case we do not need to clear CLASSTYPE_EMPTY_P
3624 here because that was already done when the virtual table
3625 pointer was created. */
ec386958 3626 }
5c24fba6 3627
5c24fba6 3628 /* Record the offsets of BINFO and its base subobjects. */
ff944b49 3629 record_subobject_offsets (binfo,
c20118a8 3630 BINFO_OFFSET (binfo),
c8094d83 3631 offsets,
c5a35c3c 3632 /*is_data_member=*/false);
17bbb839
MM
3633
3634 return next_field;
d77249e7
MM
3635}
3636
c20118a8 3637/* Layout all of the non-virtual base classes. Record empty
17bbb839
MM
3638 subobjects in OFFSETS. T is the most derived type. Return nonzero
3639 if the type cannot be nearly empty. The fields created
3640 corresponding to the base classes will be inserted at
3641 *NEXT_FIELD. */
607cf131 3642
17bbb839 3643static void
58731fd1 3644build_base_fields (record_layout_info rli,
17bbb839 3645 splay_tree offsets, tree *next_field)
607cf131
MM
3646{
3647 /* Chain to hold all the new FIELD_DECLs which stand in for base class
3648 subobjects. */
17bbb839 3649 tree t = rli->t;
604a3205 3650 int n_baseclasses = BINFO_N_BASE_BINFOS (TYPE_BINFO (t));
5c24fba6 3651 int i;
607cf131 3652
3461fba7 3653 /* The primary base class is always allocated first. */
17bbb839
MM
3654 if (CLASSTYPE_HAS_PRIMARY_BASE_P (t))
3655 next_field = build_base_field (rli, CLASSTYPE_PRIMARY_BINFO (t),
58731fd1 3656 offsets, next_field);
d77249e7
MM
3657
3658 /* Now allocate the rest of the bases. */
607cf131
MM
3659 for (i = 0; i < n_baseclasses; ++i)
3660 {
d77249e7 3661 tree base_binfo;
607cf131 3662
604a3205 3663 base_binfo = BINFO_BASE_BINFO (TYPE_BINFO (t), i);
911a71a7 3664
3461fba7
NS
3665 /* The primary base was already allocated above, so we don't
3666 need to allocate it again here. */
17bbb839 3667 if (base_binfo == CLASSTYPE_PRIMARY_BINFO (t))
607cf131
MM
3668 continue;
3669
dbbf88d1
NS
3670 /* Virtual bases are added at the end (a primary virtual base
3671 will have already been added). */
809e3e7f 3672 if (BINFO_VIRTUAL_P (base_binfo))
607cf131
MM
3673 continue;
3674
58731fd1 3675 next_field = build_base_field (rli, base_binfo,
17bbb839 3676 offsets, next_field);
607cf131 3677 }
607cf131
MM
3678}
3679
58010b57
MM
3680/* Go through the TYPE_METHODS of T issuing any appropriate
3681 diagnostics, figuring out which methods override which other
3ef397c1 3682 methods, and so forth. */
58010b57
MM
3683
3684static void
94edc4ab 3685check_methods (tree t)
58010b57
MM
3686{
3687 tree x;
58010b57
MM
3688
3689 for (x = TYPE_METHODS (t); x; x = TREE_CHAIN (x))
3690 {
58010b57 3691 check_for_override (x, t);
fee7654e 3692 if (DECL_PURE_VIRTUAL_P (x) && ! DECL_VINDEX (x))
dee15844 3693 error ("initializer specified for non-virtual method %q+D", x);
58010b57
MM
3694 /* The name of the field is the original field name
3695 Save this in auxiliary field for later overloading. */
3696 if (DECL_VINDEX (x))
3697 {
3ef397c1 3698 TYPE_POLYMORPHIC_P (t) = 1;
fee7654e 3699 if (DECL_PURE_VIRTUAL_P (x))
d4e6fecb 3700 VEC_safe_push (tree, gc, CLASSTYPE_PURE_VIRTUALS (t), x);
58010b57 3701 }
9f4faeae
MM
3702 /* All user-declared destructors are non-trivial. */
3703 if (DECL_DESTRUCTOR_P (x))
3704 TYPE_HAS_NONTRIVIAL_DESTRUCTOR (t) = 1;
58010b57 3705 }
58010b57
MM
3706}
3707
db9b2174
MM
3708/* FN is a constructor or destructor. Clone the declaration to create
3709 a specialized in-charge or not-in-charge version, as indicated by
3710 NAME. */
3711
3712static tree
94edc4ab 3713build_clone (tree fn, tree name)
db9b2174
MM
3714{
3715 tree parms;
3716 tree clone;
3717
3718 /* Copy the function. */
3719 clone = copy_decl (fn);
3720 /* Remember where this function came from. */
3721 DECL_CLONED_FUNCTION (clone) = fn;
5daf7c0a 3722 DECL_ABSTRACT_ORIGIN (clone) = fn;
db9b2174
MM
3723 /* Reset the function name. */
3724 DECL_NAME (clone) = name;
71cb9286 3725 SET_DECL_ASSEMBLER_NAME (clone, NULL_TREE);
db9b2174
MM
3726 /* There's no pending inline data for this function. */
3727 DECL_PENDING_INLINE_INFO (clone) = NULL;
3728 DECL_PENDING_INLINE_P (clone) = 0;
3729 /* And it hasn't yet been deferred. */
3730 DECL_DEFERRED_FN (clone) = 0;
3731
298d6f60
MM
3732 /* The base-class destructor is not virtual. */
3733 if (name == base_dtor_identifier)
3734 {
3735 DECL_VIRTUAL_P (clone) = 0;
3736 if (TREE_CODE (clone) != TEMPLATE_DECL)
3737 DECL_VINDEX (clone) = NULL_TREE;
3738 }
3739
4e7512c9 3740 /* If there was an in-charge parameter, drop it from the function
db9b2174
MM
3741 type. */
3742 if (DECL_HAS_IN_CHARGE_PARM_P (clone))
3743 {
3744 tree basetype;
3745 tree parmtypes;
3746 tree exceptions;
3747
3748 exceptions = TYPE_RAISES_EXCEPTIONS (TREE_TYPE (clone));
3749 basetype = TYPE_METHOD_BASETYPE (TREE_TYPE (clone));
3750 parmtypes = TYPE_ARG_TYPES (TREE_TYPE (clone));
3751 /* Skip the `this' parameter. */
3752 parmtypes = TREE_CHAIN (parmtypes);
3753 /* Skip the in-charge parameter. */
3754 parmtypes = TREE_CHAIN (parmtypes);
e0fff4b3
JM
3755 /* And the VTT parm, in a complete [cd]tor. */
3756 if (DECL_HAS_VTT_PARM_P (fn)
3757 && ! DECL_NEEDS_VTT_PARM_P (clone))
3758 parmtypes = TREE_CHAIN (parmtypes);
3ec6bad3
MM
3759 /* If this is subobject constructor or destructor, add the vtt
3760 parameter. */
c8094d83 3761 TREE_TYPE (clone)
43dc123f
MM
3762 = build_method_type_directly (basetype,
3763 TREE_TYPE (TREE_TYPE (clone)),
3764 parmtypes);
db9b2174
MM
3765 if (exceptions)
3766 TREE_TYPE (clone) = build_exception_variant (TREE_TYPE (clone),
3767 exceptions);
c8094d83 3768 TREE_TYPE (clone)
e9525111
MM
3769 = cp_build_type_attribute_variant (TREE_TYPE (clone),
3770 TYPE_ATTRIBUTES (TREE_TYPE (fn)));
db9b2174
MM
3771 }
3772
e0fff4b3
JM
3773 /* Copy the function parameters. But, DECL_ARGUMENTS on a TEMPLATE_DECL
3774 aren't function parameters; those are the template parameters. */
db9b2174
MM
3775 if (TREE_CODE (clone) != TEMPLATE_DECL)
3776 {
3777 DECL_ARGUMENTS (clone) = copy_list (DECL_ARGUMENTS (clone));
3778 /* Remove the in-charge parameter. */
3779 if (DECL_HAS_IN_CHARGE_PARM_P (clone))
3780 {
3781 TREE_CHAIN (DECL_ARGUMENTS (clone))
3782 = TREE_CHAIN (TREE_CHAIN (DECL_ARGUMENTS (clone)));
3783 DECL_HAS_IN_CHARGE_PARM_P (clone) = 0;
3784 }
e0fff4b3
JM
3785 /* And the VTT parm, in a complete [cd]tor. */
3786 if (DECL_HAS_VTT_PARM_P (fn))
3ec6bad3 3787 {
e0fff4b3
JM
3788 if (DECL_NEEDS_VTT_PARM_P (clone))
3789 DECL_HAS_VTT_PARM_P (clone) = 1;
3790 else
3791 {
3792 TREE_CHAIN (DECL_ARGUMENTS (clone))
3793 = TREE_CHAIN (TREE_CHAIN (DECL_ARGUMENTS (clone)));
3794 DECL_HAS_VTT_PARM_P (clone) = 0;
3795 }
3ec6bad3
MM
3796 }
3797
db9b2174
MM
3798 for (parms = DECL_ARGUMENTS (clone); parms; parms = TREE_CHAIN (parms))
3799 {
3800 DECL_CONTEXT (parms) = clone;
63e1b1c4 3801 cxx_dup_lang_specific_decl (parms);
db9b2174
MM
3802 }
3803 }
3804
db9b2174 3805 /* Create the RTL for this function. */
19e7881c 3806 SET_DECL_RTL (clone, NULL_RTX);
0e6df31e 3807 rest_of_decl_compilation (clone, /*top_level=*/1, at_eof);
c8094d83 3808
db9b2174
MM
3809 /* Make it easy to find the CLONE given the FN. */
3810 TREE_CHAIN (clone) = TREE_CHAIN (fn);
3811 TREE_CHAIN (fn) = clone;
3812
3813 /* If this is a template, handle the DECL_TEMPLATE_RESULT as well. */
3814 if (TREE_CODE (clone) == TEMPLATE_DECL)
3815 {
3816 tree result;
3817
c8094d83 3818 DECL_TEMPLATE_RESULT (clone)
db9b2174
MM
3819 = build_clone (DECL_TEMPLATE_RESULT (clone), name);
3820 result = DECL_TEMPLATE_RESULT (clone);
3821 DECL_TEMPLATE_INFO (result) = copy_node (DECL_TEMPLATE_INFO (result));
3822 DECL_TI_TEMPLATE (result) = clone;
3823 }
5e2f4cd2
MM
3824 else if (pch_file)
3825 note_decl_for_pch (clone);
db9b2174
MM
3826
3827 return clone;
3828}
3829
3830/* Produce declarations for all appropriate clones of FN. If
838dfd8a 3831 UPDATE_METHOD_VEC_P is nonzero, the clones are added to the
db9b2174
MM
3832 CLASTYPE_METHOD_VEC as well. */
3833
3834void
94edc4ab 3835clone_function_decl (tree fn, int update_method_vec_p)
db9b2174
MM
3836{
3837 tree clone;
3838
c00996a3 3839 /* Avoid inappropriate cloning. */
1f84ec23
MM
3840 if (TREE_CHAIN (fn)
3841 && DECL_CLONED_FUNCTION (TREE_CHAIN (fn)))
c00996a3
JM
3842 return;
3843
298d6f60 3844 if (DECL_MAYBE_IN_CHARGE_CONSTRUCTOR_P (fn))
db9b2174 3845 {
298d6f60
MM
3846 /* For each constructor, we need two variants: an in-charge version
3847 and a not-in-charge version. */
db9b2174
MM
3848 clone = build_clone (fn, complete_ctor_identifier);
3849 if (update_method_vec_p)
b2a9b208 3850 add_method (DECL_CONTEXT (clone), clone, NULL_TREE);
db9b2174
MM
3851 clone = build_clone (fn, base_ctor_identifier);
3852 if (update_method_vec_p)
b2a9b208 3853 add_method (DECL_CONTEXT (clone), clone, NULL_TREE);
db9b2174
MM
3854 }
3855 else
298d6f60 3856 {
50bc768d 3857 gcc_assert (DECL_MAYBE_IN_CHARGE_DESTRUCTOR_P (fn));
298d6f60 3858
3ec6bad3 3859 /* For each destructor, we need three variants: an in-charge
298d6f60 3860 version, a not-in-charge version, and an in-charge deleting
4e7512c9
MM
3861 version. We clone the deleting version first because that
3862 means it will go second on the TYPE_METHODS list -- and that
3863 corresponds to the correct layout order in the virtual
c8094d83 3864 function table.
52682a1b 3865
0cbd7506 3866 For a non-virtual destructor, we do not build a deleting
52682a1b
MM
3867 destructor. */
3868 if (DECL_VIRTUAL_P (fn))
3869 {
3870 clone = build_clone (fn, deleting_dtor_identifier);
3871 if (update_method_vec_p)
b2a9b208 3872 add_method (DECL_CONTEXT (clone), clone, NULL_TREE);
52682a1b 3873 }
4e7512c9 3874 clone = build_clone (fn, complete_dtor_identifier);
298d6f60 3875 if (update_method_vec_p)
b2a9b208 3876 add_method (DECL_CONTEXT (clone), clone, NULL_TREE);
298d6f60
MM
3877 clone = build_clone (fn, base_dtor_identifier);
3878 if (update_method_vec_p)
b2a9b208 3879 add_method (DECL_CONTEXT (clone), clone, NULL_TREE);
298d6f60 3880 }
5daf7c0a
JM
3881
3882 /* Note that this is an abstract function that is never emitted. */
3883 DECL_ABSTRACT (fn) = 1;
db9b2174
MM
3884}
3885
5f6eeeb3
NS
3886/* DECL is an in charge constructor, which is being defined. This will
3887 have had an in class declaration, from whence clones were
3888 declared. An out-of-class definition can specify additional default
3889 arguments. As it is the clones that are involved in overload
3890 resolution, we must propagate the information from the DECL to its
00a17e31 3891 clones. */
5f6eeeb3
NS
3892
3893void
94edc4ab 3894adjust_clone_args (tree decl)
5f6eeeb3
NS
3895{
3896 tree clone;
c8094d83 3897
5f6eeeb3
NS
3898 for (clone = TREE_CHAIN (decl); clone && DECL_CLONED_FUNCTION (clone);
3899 clone = TREE_CHAIN (clone))
3900 {
3901 tree orig_clone_parms = TYPE_ARG_TYPES (TREE_TYPE (clone));
3902 tree orig_decl_parms = TYPE_ARG_TYPES (TREE_TYPE (decl));
3903 tree decl_parms, clone_parms;
3904
3905 clone_parms = orig_clone_parms;
c8094d83 3906
00a17e31 3907 /* Skip the 'this' parameter. */
5f6eeeb3
NS
3908 orig_clone_parms = TREE_CHAIN (orig_clone_parms);
3909 orig_decl_parms = TREE_CHAIN (orig_decl_parms);
3910
3911 if (DECL_HAS_IN_CHARGE_PARM_P (decl))
3912 orig_decl_parms = TREE_CHAIN (orig_decl_parms);
3913 if (DECL_HAS_VTT_PARM_P (decl))
3914 orig_decl_parms = TREE_CHAIN (orig_decl_parms);
c8094d83 3915
5f6eeeb3
NS
3916 clone_parms = orig_clone_parms;
3917 if (DECL_HAS_VTT_PARM_P (clone))
3918 clone_parms = TREE_CHAIN (clone_parms);
c8094d83 3919
5f6eeeb3
NS
3920 for (decl_parms = orig_decl_parms; decl_parms;
3921 decl_parms = TREE_CHAIN (decl_parms),
3922 clone_parms = TREE_CHAIN (clone_parms))
3923 {
50bc768d
NS
3924 gcc_assert (same_type_p (TREE_TYPE (decl_parms),
3925 TREE_TYPE (clone_parms)));
c8094d83 3926
5f6eeeb3
NS
3927 if (TREE_PURPOSE (decl_parms) && !TREE_PURPOSE (clone_parms))
3928 {
3929 /* A default parameter has been added. Adjust the
00a17e31 3930 clone's parameters. */
5f6eeeb3
NS
3931 tree exceptions = TYPE_RAISES_EXCEPTIONS (TREE_TYPE (clone));
3932 tree basetype = TYPE_METHOD_BASETYPE (TREE_TYPE (clone));
3933 tree type;
3934
3935 clone_parms = orig_decl_parms;
3936
3937 if (DECL_HAS_VTT_PARM_P (clone))
3938 {
3939 clone_parms = tree_cons (TREE_PURPOSE (orig_clone_parms),
3940 TREE_VALUE (orig_clone_parms),
3941 clone_parms);
3942 TREE_TYPE (clone_parms) = TREE_TYPE (orig_clone_parms);
3943 }
43dc123f
MM
3944 type = build_method_type_directly (basetype,
3945 TREE_TYPE (TREE_TYPE (clone)),
3946 clone_parms);
5f6eeeb3
NS
3947 if (exceptions)
3948 type = build_exception_variant (type, exceptions);
3949 TREE_TYPE (clone) = type;
c8094d83 3950
5f6eeeb3
NS
3951 clone_parms = NULL_TREE;
3952 break;
3953 }
3954 }
50bc768d 3955 gcc_assert (!clone_parms);
5f6eeeb3
NS
3956 }
3957}
3958
db9b2174
MM
3959/* For each of the constructors and destructors in T, create an
3960 in-charge and not-in-charge variant. */
3961
3962static void
94edc4ab 3963clone_constructors_and_destructors (tree t)
db9b2174
MM
3964{
3965 tree fns;
3966
db9b2174
MM
3967 /* If for some reason we don't have a CLASSTYPE_METHOD_VEC, we bail
3968 out now. */
3969 if (!CLASSTYPE_METHOD_VEC (t))
3970 return;
3971
db9b2174
MM
3972 for (fns = CLASSTYPE_CONSTRUCTORS (t); fns; fns = OVL_NEXT (fns))
3973 clone_function_decl (OVL_CURRENT (fns), /*update_method_vec_p=*/1);
298d6f60
MM
3974 for (fns = CLASSTYPE_DESTRUCTORS (t); fns; fns = OVL_NEXT (fns))
3975 clone_function_decl (OVL_CURRENT (fns), /*update_method_vec_p=*/1);
db9b2174
MM
3976}
3977
58010b57
MM
3978/* Remove all zero-width bit-fields from T. */
3979
3980static void
94edc4ab 3981remove_zero_width_bit_fields (tree t)
58010b57
MM
3982{
3983 tree *fieldsp;
3984
c8094d83 3985 fieldsp = &TYPE_FIELDS (t);
58010b57
MM
3986 while (*fieldsp)
3987 {
3988 if (TREE_CODE (*fieldsp) == FIELD_DECL
c8094d83 3989 && DECL_C_BIT_FIELD (*fieldsp)
58010b57
MM
3990 && DECL_INITIAL (*fieldsp))
3991 *fieldsp = TREE_CHAIN (*fieldsp);
3992 else
3993 fieldsp = &TREE_CHAIN (*fieldsp);
3994 }
3995}
3996
dbc957f1
MM
3997/* Returns TRUE iff we need a cookie when dynamically allocating an
3998 array whose elements have the indicated class TYPE. */
3999
4000static bool
94edc4ab 4001type_requires_array_cookie (tree type)
dbc957f1
MM
4002{
4003 tree fns;
18fee3ee 4004 bool has_two_argument_delete_p = false;
dbc957f1 4005
50bc768d 4006 gcc_assert (CLASS_TYPE_P (type));
dbc957f1
MM
4007
4008 /* If there's a non-trivial destructor, we need a cookie. In order
4009 to iterate through the array calling the destructor for each
4010 element, we'll have to know how many elements there are. */
4011 if (TYPE_HAS_NONTRIVIAL_DESTRUCTOR (type))
4012 return true;
4013
4014 /* If the usual deallocation function is a two-argument whose second
4015 argument is of type `size_t', then we have to pass the size of
4016 the array to the deallocation function, so we will need to store
4017 a cookie. */
c8094d83 4018 fns = lookup_fnfields (TYPE_BINFO (type),
dbc957f1
MM
4019 ansi_opname (VEC_DELETE_EXPR),
4020 /*protect=*/0);
4021 /* If there are no `operator []' members, or the lookup is
4022 ambiguous, then we don't need a cookie. */
4023 if (!fns || fns == error_mark_node)
4024 return false;
4025 /* Loop through all of the functions. */
50ad9642 4026 for (fns = BASELINK_FUNCTIONS (fns); fns; fns = OVL_NEXT (fns))
dbc957f1
MM
4027 {
4028 tree fn;
4029 tree second_parm;
4030
4031 /* Select the current function. */
4032 fn = OVL_CURRENT (fns);
4033 /* See if this function is a one-argument delete function. If
4034 it is, then it will be the usual deallocation function. */
4035 second_parm = TREE_CHAIN (TYPE_ARG_TYPES (TREE_TYPE (fn)));
4036 if (second_parm == void_list_node)
4037 return false;
4038 /* Otherwise, if we have a two-argument function and the second
4039 argument is `size_t', it will be the usual deallocation
4040 function -- unless there is one-argument function, too. */
4041 if (TREE_CHAIN (second_parm) == void_list_node
4042 && same_type_p (TREE_VALUE (second_parm), sizetype))
4043 has_two_argument_delete_p = true;
4044 }
4045
4046 return has_two_argument_delete_p;
4047}
4048
607cf131
MM
4049/* Check the validity of the bases and members declared in T. Add any
4050 implicitly-generated functions (like copy-constructors and
4051 assignment operators). Compute various flag bits (like
4052 CLASSTYPE_NON_POD_T) for T. This routine works purely at the C++
4053 level: i.e., independently of the ABI in use. */
4054
4055static void
58731fd1 4056check_bases_and_members (tree t)
607cf131 4057{
607cf131
MM
4058 /* Nonzero if the implicitly generated copy constructor should take
4059 a non-const reference argument. */
4060 int cant_have_const_ctor;
78dcd41a 4061 /* Nonzero if the implicitly generated assignment operator
607cf131
MM
4062 should take a non-const reference argument. */
4063 int no_const_asn_ref;
4064 tree access_decls;
4065
4066 /* By default, we use const reference arguments and generate default
4067 constructors. */
607cf131
MM
4068 cant_have_const_ctor = 0;
4069 no_const_asn_ref = 0;
4070
00a17e31 4071 /* Check all the base-classes. */
e5e459bf 4072 check_bases (t, &cant_have_const_ctor,
607cf131
MM
4073 &no_const_asn_ref);
4074
9f4faeae
MM
4075 /* Check all the method declarations. */
4076 check_methods (t);
4077
4078 /* Check all the data member declarations. We cannot call
4079 check_field_decls until we have called check_bases check_methods,
4080 as check_field_decls depends on TYPE_HAS_NONTRIVIAL_DESTRUCTOR
4081 being set appropriately. */
58731fd1 4082 check_field_decls (t, &access_decls,
607cf131
MM
4083 &cant_have_const_ctor,
4084 &no_const_asn_ref);
4085
bbd15aac
MM
4086 /* A nearly-empty class has to be vptr-containing; a nearly empty
4087 class contains just a vptr. */
4088 if (!TYPE_CONTAINS_VPTR_P (t))
f9c528ea
MM
4089 CLASSTYPE_NEARLY_EMPTY_P (t) = 0;
4090
607cf131
MM
4091 /* Do some bookkeeping that will guide the generation of implicitly
4092 declared member functions. */
4093 TYPE_HAS_COMPLEX_INIT_REF (t)
5775a06a 4094 |= (TYPE_HAS_INIT_REF (t) || TYPE_CONTAINS_VPTR_P (t));
607cf131 4095 TYPE_NEEDS_CONSTRUCTING (t)
5775a06a
NS
4096 |= (TYPE_HAS_CONSTRUCTOR (t) || TYPE_CONTAINS_VPTR_P (t));
4097 CLASSTYPE_NON_AGGREGATE (t)
4098 |= (TYPE_HAS_CONSTRUCTOR (t) || TYPE_POLYMORPHIC_P (t));
607cf131 4099 CLASSTYPE_NON_POD_P (t)
c8094d83 4100 |= (CLASSTYPE_NON_AGGREGATE (t)
9f4faeae 4101 || TYPE_HAS_NONTRIVIAL_DESTRUCTOR (t)
607cf131 4102 || TYPE_HAS_ASSIGN_REF (t));
607cf131 4103 TYPE_HAS_COMPLEX_ASSIGN_REF (t)
0830ae44 4104 |= TYPE_HAS_ASSIGN_REF (t) || TYPE_CONTAINS_VPTR_P (t);
607cf131 4105
03fd3f84 4106 /* Synthesize any needed methods. */
e5e459bf 4107 add_implicitly_declared_members (t,
607cf131
MM
4108 cant_have_const_ctor,
4109 no_const_asn_ref);
4110
db9b2174
MM
4111 /* Create the in-charge and not-in-charge variants of constructors
4112 and destructors. */
4113 clone_constructors_and_destructors (t);
4114
aa52c1ff
JM
4115 /* Process the using-declarations. */
4116 for (; access_decls; access_decls = TREE_CHAIN (access_decls))
4117 handle_using_decl (TREE_VALUE (access_decls), t);
4118
607cf131
MM
4119 /* Build and sort the CLASSTYPE_METHOD_VEC. */
4120 finish_struct_methods (t);
dbc957f1
MM
4121
4122 /* Figure out whether or not we will need a cookie when dynamically
4123 allocating an array of this type. */
e2500fed 4124 TYPE_LANG_SPECIFIC (t)->u.c.vec_new_uses_cookie
dbc957f1 4125 = type_requires_array_cookie (t);
607cf131
MM
4126}
4127
3ef397c1 4128/* If T needs a pointer to its virtual function table, set TYPE_VFIELD
5c24fba6
MM
4129 accordingly. If a new vfield was created (because T doesn't have a
4130 primary base class), then the newly created field is returned. It
c35cce41 4131 is not added to the TYPE_FIELDS list; it is the caller's
e6858a84
NS
4132 responsibility to do that. Accumulate declared virtual functions
4133 on VIRTUALS_P. */
3ef397c1 4134
5c24fba6 4135static tree
94edc4ab 4136create_vtable_ptr (tree t, tree* virtuals_p)
3ef397c1
MM
4137{
4138 tree fn;
4139
e6858a84 4140 /* Collect the virtual functions declared in T. */
3ef397c1 4141 for (fn = TYPE_METHODS (t); fn; fn = TREE_CHAIN (fn))
e6858a84
NS
4142 if (DECL_VINDEX (fn) && !DECL_MAYBE_IN_CHARGE_DESTRUCTOR_P (fn)
4143 && TREE_CODE (DECL_VINDEX (fn)) != INTEGER_CST)
4144 {
4145 tree new_virtual = make_node (TREE_LIST);
c8094d83 4146
e6858a84
NS
4147 BV_FN (new_virtual) = fn;
4148 BV_DELTA (new_virtual) = integer_zero_node;
d1f05f93 4149 BV_VCALL_INDEX (new_virtual) = NULL_TREE;
3ef397c1 4150
e6858a84
NS
4151 TREE_CHAIN (new_virtual) = *virtuals_p;
4152 *virtuals_p = new_virtual;
4153 }
c8094d83 4154
da3d4dfa
MM
4155 /* If we couldn't find an appropriate base class, create a new field
4156 here. Even if there weren't any new virtual functions, we might need a
bbd15aac
MM
4157 new virtual function table if we're supposed to include vptrs in
4158 all classes that need them. */
e6858a84 4159 if (!TYPE_VFIELD (t) && (*virtuals_p || TYPE_CONTAINS_VPTR_P (t)))
3ef397c1
MM
4160 {
4161 /* We build this decl with vtbl_ptr_type_node, which is a
4162 `vtable_entry_type*'. It might seem more precise to use
a692ad2e 4163 `vtable_entry_type (*)[N]' where N is the number of virtual
3ef397c1
MM
4164 functions. However, that would require the vtable pointer in
4165 base classes to have a different type than the vtable pointer
4166 in derived classes. We could make that happen, but that
4167 still wouldn't solve all the problems. In particular, the
4168 type-based alias analysis code would decide that assignments
4169 to the base class vtable pointer can't alias assignments to
4170 the derived class vtable pointer, since they have different
4639c5c6 4171 types. Thus, in a derived class destructor, where the base
3ef397c1 4172 class constructor was inlined, we could generate bad code for
c8094d83 4173 setting up the vtable pointer.
3ef397c1 4174
0cbd7506 4175 Therefore, we use one type for all vtable pointers. We still
3ef397c1
MM
4176 use a type-correct type; it's just doesn't indicate the array
4177 bounds. That's better than using `void*' or some such; it's
4178 cleaner, and it let's the alias analysis code know that these
4179 stores cannot alias stores to void*! */
0abe00c5
NS
4180 tree field;
4181
4182 field = build_decl (FIELD_DECL, get_vfield_name (t), vtbl_ptr_type_node);
0abe00c5
NS
4183 DECL_VIRTUAL_P (field) = 1;
4184 DECL_ARTIFICIAL (field) = 1;
4185 DECL_FIELD_CONTEXT (field) = t;
4186 DECL_FCONTEXT (field) = t;
c8094d83 4187
0abe00c5 4188 TYPE_VFIELD (t) = field;
c8094d83 4189
0abe00c5 4190 /* This class is non-empty. */
58731fd1 4191 CLASSTYPE_EMPTY_P (t) = 0;
3ef397c1 4192
0abe00c5 4193 return field;
3ef397c1 4194 }
5c24fba6
MM
4195
4196 return NULL_TREE;
3ef397c1
MM
4197}
4198
2ef16140
MM
4199/* Fixup the inline function given by INFO now that the class is
4200 complete. */
08b962b0 4201
2ef16140 4202static void
94edc4ab 4203fixup_pending_inline (tree fn)
2ef16140 4204{
0e5921e8 4205 if (DECL_PENDING_INLINE_INFO (fn))
2ef16140 4206 {
0e5921e8 4207 tree args = DECL_ARGUMENTS (fn);
2ef16140
MM
4208 while (args)
4209 {
4210 DECL_CONTEXT (args) = fn;
4211 args = TREE_CHAIN (args);
4212 }
4213 }
4214}
08b962b0 4215
2ef16140
MM
4216/* Fixup the inline methods and friends in TYPE now that TYPE is
4217 complete. */
08b962b0 4218
2ef16140 4219static void
94edc4ab 4220fixup_inline_methods (tree type)
08b962b0 4221{
2ef16140 4222 tree method = TYPE_METHODS (type);
d4e6fecb 4223 VEC(tree,gc) *friends;
585b44d3 4224 unsigned ix;
08b962b0 4225
2ef16140 4226 if (method && TREE_CODE (method) == TREE_VEC)
08b962b0 4227 {
2ef16140
MM
4228 if (TREE_VEC_ELT (method, 1))
4229 method = TREE_VEC_ELT (method, 1);
4230 else if (TREE_VEC_ELT (method, 0))
4231 method = TREE_VEC_ELT (method, 0);
08b962b0 4232 else
2ef16140 4233 method = TREE_VEC_ELT (method, 2);
08b962b0
MM
4234 }
4235
2ef16140
MM
4236 /* Do inline member functions. */
4237 for (; method; method = TREE_CHAIN (method))
0e5921e8 4238 fixup_pending_inline (method);
08b962b0 4239
2ef16140 4240 /* Do friends. */
585b44d3
NS
4241 for (friends = CLASSTYPE_INLINE_FRIENDS (type), ix = 0;
4242 VEC_iterate (tree, friends, ix, method); ix++)
4243 fixup_pending_inline (method);
4244 CLASSTYPE_INLINE_FRIENDS (type) = NULL;
2ef16140 4245}
08b962b0 4246
9d4c0187
MM
4247/* Add OFFSET to all base types of BINFO which is a base in the
4248 hierarchy dominated by T.
80fd5f48 4249
911a71a7 4250 OFFSET, which is a type offset, is number of bytes. */
80fd5f48
MM
4251
4252static void
dbbf88d1 4253propagate_binfo_offsets (tree binfo, tree offset)
80fd5f48 4254{
911a71a7
MM
4255 int i;
4256 tree primary_binfo;
fa743e8c 4257 tree base_binfo;
80fd5f48 4258
911a71a7
MM
4259 /* Update BINFO's offset. */
4260 BINFO_OFFSET (binfo)
c8094d83 4261 = convert (sizetype,
911a71a7
MM
4262 size_binop (PLUS_EXPR,
4263 convert (ssizetype, BINFO_OFFSET (binfo)),
4264 offset));
80fd5f48 4265
911a71a7
MM
4266 /* Find the primary base class. */
4267 primary_binfo = get_primary_binfo (binfo);
4268
fc6633e0 4269 if (primary_binfo && BINFO_INHERITANCE_CHAIN (primary_binfo) == binfo)
090ad434 4270 propagate_binfo_offsets (primary_binfo, offset);
c8094d83 4271
911a71a7
MM
4272 /* Scan all of the bases, pushing the BINFO_OFFSET adjust
4273 downwards. */
fa743e8c 4274 for (i = 0; BINFO_BASE_ITERATE (binfo, i, base_binfo); ++i)
80fd5f48 4275 {
090ad434
NS
4276 /* Don't do the primary base twice. */
4277 if (base_binfo == primary_binfo)
4278 continue;
911a71a7 4279
090ad434 4280 if (BINFO_VIRTUAL_P (base_binfo))
911a71a7
MM
4281 continue;
4282
dbbf88d1 4283 propagate_binfo_offsets (base_binfo, offset);
911a71a7 4284 }
9d4c0187
MM
4285}
4286
17bbb839 4287/* Set BINFO_OFFSET for all of the virtual bases for RLI->T. Update
c20118a8
MM
4288 TYPE_ALIGN and TYPE_SIZE for T. OFFSETS gives the location of
4289 empty subobjects of T. */
80fd5f48 4290
d2c5305b 4291static void
17bbb839 4292layout_virtual_bases (record_layout_info rli, splay_tree offsets)
80fd5f48 4293{
dbbf88d1 4294 tree vbase;
17bbb839 4295 tree t = rli->t;
eca7f13c 4296 bool first_vbase = true;
17bbb839 4297 tree *next_field;
9785e4b1 4298
604a3205 4299 if (BINFO_N_BASE_BINFOS (TYPE_BINFO (t)) == 0)
9785e4b1
MM
4300 return;
4301
17bbb839
MM
4302 if (!abi_version_at_least(2))
4303 {
4304 /* In G++ 3.2, we incorrectly rounded the size before laying out
4305 the virtual bases. */
4306 finish_record_layout (rli, /*free_p=*/false);
9785e4b1 4307#ifdef STRUCTURE_SIZE_BOUNDARY
17bbb839
MM
4308 /* Packed structures don't need to have minimum size. */
4309 if (! TYPE_PACKED (t))
fc555370 4310 TYPE_ALIGN (t) = MAX (TYPE_ALIGN (t), (unsigned) STRUCTURE_SIZE_BOUNDARY);
9785e4b1 4311#endif
17bbb839
MM
4312 rli->offset = TYPE_SIZE_UNIT (t);
4313 rli->bitpos = bitsize_zero_node;
4314 rli->record_align = TYPE_ALIGN (t);
4315 }
80fd5f48 4316
17bbb839
MM
4317 /* Find the last field. The artificial fields created for virtual
4318 bases will go after the last extant field to date. */
4319 next_field = &TYPE_FIELDS (t);
4320 while (*next_field)
4321 next_field = &TREE_CHAIN (*next_field);
80fd5f48 4322
9d4c0187 4323 /* Go through the virtual bases, allocating space for each virtual
3461fba7
NS
4324 base that is not already a primary base class. These are
4325 allocated in inheritance graph order. */
dbbf88d1 4326 for (vbase = TYPE_BINFO (t); vbase; vbase = TREE_CHAIN (vbase))
c35cce41 4327 {
809e3e7f 4328 if (!BINFO_VIRTUAL_P (vbase))
1f84ec23 4329 continue;
eca7f13c 4330
9965d119 4331 if (!BINFO_PRIMARY_P (vbase))
c35cce41 4332 {
17bbb839
MM
4333 tree basetype = TREE_TYPE (vbase);
4334
c35cce41
MM
4335 /* This virtual base is not a primary base of any class in the
4336 hierarchy, so we have to add space for it. */
58731fd1 4337 next_field = build_base_field (rli, vbase,
17bbb839 4338 offsets, next_field);
9785e4b1 4339
eca7f13c
MM
4340 /* If the first virtual base might have been placed at a
4341 lower address, had we started from CLASSTYPE_SIZE, rather
4342 than TYPE_SIZE, issue a warning. There can be both false
4343 positives and false negatives from this warning in rare
4344 cases; to deal with all the possibilities would probably
4345 require performing both layout algorithms and comparing
4346 the results which is not particularly tractable. */
4347 if (warn_abi
4348 && first_vbase
c8094d83 4349 && (tree_int_cst_lt
17bbb839
MM
4350 (size_binop (CEIL_DIV_EXPR,
4351 round_up (CLASSTYPE_SIZE (t),
4352 CLASSTYPE_ALIGN (basetype)),
4353 bitsize_unit_node),
4354 BINFO_OFFSET (vbase))))
74fa0285 4355 warning (OPT_Wabi,
3db45ab5 4356 "offset of virtual base %qT is not ABI-compliant and "
0cbd7506 4357 "may change in a future version of GCC",
eca7f13c
MM
4358 basetype);
4359
eca7f13c 4360 first_vbase = false;
c35cce41
MM
4361 }
4362 }
80fd5f48
MM
4363}
4364
ba9a991f
MM
4365/* Returns the offset of the byte just past the end of the base class
4366 BINFO. */
4367
4368static tree
4369end_of_base (tree binfo)
4370{
4371 tree size;
4372
4373 if (is_empty_class (BINFO_TYPE (binfo)))
4374 /* An empty class has zero CLASSTYPE_SIZE_UNIT, but we need to
4375 allocate some space for it. It cannot have virtual bases, so
4376 TYPE_SIZE_UNIT is fine. */
4377 size = TYPE_SIZE_UNIT (BINFO_TYPE (binfo));
4378 else
4379 size = CLASSTYPE_SIZE_UNIT (BINFO_TYPE (binfo));
4380
4381 return size_binop (PLUS_EXPR, BINFO_OFFSET (binfo), size);
4382}
4383
9785e4b1
MM
4384/* Returns the offset of the byte just past the end of the base class
4385 with the highest offset in T. If INCLUDE_VIRTUALS_P is zero, then
4386 only non-virtual bases are included. */
80fd5f48 4387
17bbb839 4388static tree
94edc4ab 4389end_of_class (tree t, int include_virtuals_p)
80fd5f48 4390{
17bbb839 4391 tree result = size_zero_node;
d4e6fecb 4392 VEC(tree,gc) *vbases;
ba9a991f 4393 tree binfo;
9ba5ff0f 4394 tree base_binfo;
ba9a991f 4395 tree offset;
9785e4b1 4396 int i;
80fd5f48 4397
fa743e8c
NS
4398 for (binfo = TYPE_BINFO (t), i = 0;
4399 BINFO_BASE_ITERATE (binfo, i, base_binfo); ++i)
9785e4b1 4400 {
9785e4b1 4401 if (!include_virtuals_p
fc6633e0
NS
4402 && BINFO_VIRTUAL_P (base_binfo)
4403 && (!BINFO_PRIMARY_P (base_binfo)
4404 || BINFO_INHERITANCE_CHAIN (base_binfo) != TYPE_BINFO (t)))
9785e4b1 4405 continue;
80fd5f48 4406
fa743e8c 4407 offset = end_of_base (base_binfo);
17bbb839
MM
4408 if (INT_CST_LT_UNSIGNED (result, offset))
4409 result = offset;
9785e4b1 4410 }
80fd5f48 4411
ba9a991f
MM
4412 /* G++ 3.2 did not check indirect virtual bases. */
4413 if (abi_version_at_least (2) && include_virtuals_p)
9ba5ff0f
NS
4414 for (vbases = CLASSTYPE_VBASECLASSES (t), i = 0;
4415 VEC_iterate (tree, vbases, i, base_binfo); i++)
ba9a991f 4416 {
9ba5ff0f 4417 offset = end_of_base (base_binfo);
ba9a991f
MM
4418 if (INT_CST_LT_UNSIGNED (result, offset))
4419 result = offset;
4420 }
4421
9785e4b1 4422 return result;
80fd5f48
MM
4423}
4424
17bbb839 4425/* Warn about bases of T that are inaccessible because they are
78b45a24
MM
4426 ambiguous. For example:
4427
4428 struct S {};
4429 struct T : public S {};
4430 struct U : public S, public T {};
4431
4432 Here, `(S*) new U' is not allowed because there are two `S'
4433 subobjects of U. */
4434
4435static void
94edc4ab 4436warn_about_ambiguous_bases (tree t)
78b45a24
MM
4437{
4438 int i;
d4e6fecb 4439 VEC(tree,gc) *vbases;
17bbb839 4440 tree basetype;
58c42dc2 4441 tree binfo;
fa743e8c 4442 tree base_binfo;
78b45a24 4443
18e4be85
NS
4444 /* If there are no repeated bases, nothing can be ambiguous. */
4445 if (!CLASSTYPE_REPEATED_BASE_P (t))
4446 return;
c8094d83 4447
17bbb839 4448 /* Check direct bases. */
fa743e8c
NS
4449 for (binfo = TYPE_BINFO (t), i = 0;
4450 BINFO_BASE_ITERATE (binfo, i, base_binfo); ++i)
78b45a24 4451 {
fa743e8c 4452 basetype = BINFO_TYPE (base_binfo);
78b45a24 4453
18e4be85 4454 if (!lookup_base (t, basetype, ba_unique | ba_quiet, NULL))
d4ee4d25 4455 warning (0, "direct base %qT inaccessible in %qT due to ambiguity",
17bbb839 4456 basetype, t);
78b45a24 4457 }
17bbb839
MM
4458
4459 /* Check for ambiguous virtual bases. */
4460 if (extra_warnings)
9ba5ff0f
NS
4461 for (vbases = CLASSTYPE_VBASECLASSES (t), i = 0;
4462 VEC_iterate (tree, vbases, i, binfo); i++)
17bbb839 4463 {
58c42dc2 4464 basetype = BINFO_TYPE (binfo);
c8094d83 4465
18e4be85 4466 if (!lookup_base (t, basetype, ba_unique | ba_quiet, NULL))
b323323f 4467 warning (OPT_Wextra, "virtual base %qT inaccessible in %qT due to ambiguity",
17bbb839
MM
4468 basetype, t);
4469 }
78b45a24
MM
4470}
4471
c20118a8
MM
4472/* Compare two INTEGER_CSTs K1 and K2. */
4473
4474static int
94edc4ab 4475splay_tree_compare_integer_csts (splay_tree_key k1, splay_tree_key k2)
c20118a8
MM
4476{
4477 return tree_int_cst_compare ((tree) k1, (tree) k2);
4478}
4479
17bbb839
MM
4480/* Increase the size indicated in RLI to account for empty classes
4481 that are "off the end" of the class. */
4482
4483static void
4484include_empty_classes (record_layout_info rli)
4485{
4486 tree eoc;
e3ccdd50 4487 tree rli_size;
17bbb839
MM
4488
4489 /* It might be the case that we grew the class to allocate a
4490 zero-sized base class. That won't be reflected in RLI, yet,
4491 because we are willing to overlay multiple bases at the same
4492 offset. However, now we need to make sure that RLI is big enough
4493 to reflect the entire class. */
c8094d83 4494 eoc = end_of_class (rli->t,
17bbb839 4495 CLASSTYPE_AS_BASE (rli->t) != NULL_TREE);
e3ccdd50
MM
4496 rli_size = rli_size_unit_so_far (rli);
4497 if (TREE_CODE (rli_size) == INTEGER_CST
4498 && INT_CST_LT_UNSIGNED (rli_size, eoc))
17bbb839 4499 {
43fe31f6
MM
4500 if (!abi_version_at_least (2))
4501 /* In version 1 of the ABI, the size of a class that ends with
4502 a bitfield was not rounded up to a whole multiple of a
4503 byte. Because rli_size_unit_so_far returns only the number
4504 of fully allocated bytes, any extra bits were not included
4505 in the size. */
4506 rli->bitpos = round_down (rli->bitpos, BITS_PER_UNIT);
4507 else
4508 /* The size should have been rounded to a whole byte. */
50bc768d
NS
4509 gcc_assert (tree_int_cst_equal
4510 (rli->bitpos, round_down (rli->bitpos, BITS_PER_UNIT)));
c8094d83
MS
4511 rli->bitpos
4512 = size_binop (PLUS_EXPR,
e3ccdd50
MM
4513 rli->bitpos,
4514 size_binop (MULT_EXPR,
4515 convert (bitsizetype,
4516 size_binop (MINUS_EXPR,
4517 eoc, rli_size)),
4518 bitsize_int (BITS_PER_UNIT)));
4519 normalize_rli (rli);
17bbb839
MM
4520 }
4521}
4522
2ef16140
MM
4523/* Calculate the TYPE_SIZE, TYPE_ALIGN, etc for T. Calculate
4524 BINFO_OFFSETs for all of the base-classes. Position the vtable
00a17e31 4525 pointer. Accumulate declared virtual functions on VIRTUALS_P. */
607cf131 4526
2ef16140 4527static void
e93ee644 4528layout_class_type (tree t, tree *virtuals_p)
2ef16140 4529{
5c24fba6
MM
4530 tree non_static_data_members;
4531 tree field;
4532 tree vptr;
4533 record_layout_info rli;
c20118a8
MM
4534 /* Maps offsets (represented as INTEGER_CSTs) to a TREE_LIST of
4535 types that appear at that offset. */
4536 splay_tree empty_base_offsets;
eca7f13c
MM
4537 /* True if the last field layed out was a bit-field. */
4538 bool last_field_was_bitfield = false;
17bbb839
MM
4539 /* The location at which the next field should be inserted. */
4540 tree *next_field;
4541 /* T, as a base class. */
4542 tree base_t;
5c24fba6
MM
4543
4544 /* Keep track of the first non-static data member. */
4545 non_static_data_members = TYPE_FIELDS (t);
4546
770ae6cc
RK
4547 /* Start laying out the record. */
4548 rli = start_record_layout (t);
534170eb 4549
fc6633e0
NS
4550 /* Mark all the primary bases in the hierarchy. */
4551 determine_primary_bases (t);
8026246f 4552
5c24fba6 4553 /* Create a pointer to our virtual function table. */
58731fd1 4554 vptr = create_vtable_ptr (t, virtuals_p);
5c24fba6 4555
3461fba7 4556 /* The vptr is always the first thing in the class. */
1f84ec23 4557 if (vptr)
5c24fba6 4558 {
17bbb839
MM
4559 TREE_CHAIN (vptr) = TYPE_FIELDS (t);
4560 TYPE_FIELDS (t) = vptr;
4561 next_field = &TREE_CHAIN (vptr);
770ae6cc 4562 place_field (rli, vptr);
5c24fba6 4563 }
17bbb839
MM
4564 else
4565 next_field = &TYPE_FIELDS (t);
5c24fba6 4566
72a50ab0 4567 /* Build FIELD_DECLs for all of the non-virtual base-types. */
c8094d83 4568 empty_base_offsets = splay_tree_new (splay_tree_compare_integer_csts,
c20118a8 4569 NULL, NULL);
58731fd1 4570 build_base_fields (rli, empty_base_offsets, next_field);
c8094d83 4571
5c24fba6 4572 /* Layout the non-static data members. */
770ae6cc 4573 for (field = non_static_data_members; field; field = TREE_CHAIN (field))
5c24fba6 4574 {
01955e96
MM
4575 tree type;
4576 tree padding;
5c24fba6
MM
4577
4578 /* We still pass things that aren't non-static data members to
4579 the back-end, in case it wants to do something with them. */
4580 if (TREE_CODE (field) != FIELD_DECL)
4581 {
770ae6cc 4582 place_field (rli, field);
0154eaa8 4583 /* If the static data member has incomplete type, keep track
c8094d83 4584 of it so that it can be completed later. (The handling
0154eaa8
MM
4585 of pending statics in finish_record_layout is
4586 insufficient; consider:
4587
4588 struct S1;
4589 struct S2 { static S1 s1; };
c8094d83 4590
0cbd7506 4591 At this point, finish_record_layout will be called, but
0154eaa8
MM
4592 S1 is still incomplete.) */
4593 if (TREE_CODE (field) == VAR_DECL)
532b37d9
MM
4594 {
4595 maybe_register_incomplete_var (field);
4596 /* The visibility of static data members is determined
4597 at their point of declaration, not their point of
4598 definition. */
4599 determine_visibility (field);
4600 }
5c24fba6
MM
4601 continue;
4602 }
4603
01955e96 4604 type = TREE_TYPE (field);
4e3bd7d5
VR
4605 if (type == error_mark_node)
4606 continue;
c8094d83 4607
1e099144 4608 padding = NULL_TREE;
01955e96
MM
4609
4610 /* If this field is a bit-field whose width is greater than its
3461fba7
NS
4611 type, then there are some special rules for allocating
4612 it. */
01955e96 4613 if (DECL_C_BIT_FIELD (field)
1f84ec23 4614 && INT_CST_LT (TYPE_SIZE (type), DECL_SIZE (field)))
01955e96
MM
4615 {
4616 integer_type_kind itk;
4617 tree integer_type;
555456b1 4618 bool was_unnamed_p = false;
01955e96
MM
4619 /* We must allocate the bits as if suitably aligned for the
4620 longest integer type that fits in this many bits. type
4621 of the field. Then, we are supposed to use the left over
4622 bits as additional padding. */
4623 for (itk = itk_char; itk != itk_none; ++itk)
c8094d83 4624 if (INT_CST_LT (DECL_SIZE (field),
01955e96
MM
4625 TYPE_SIZE (integer_types[itk])))
4626 break;
4627
4628 /* ITK now indicates a type that is too large for the
4629 field. We have to back up by one to find the largest
4630 type that fits. */
4631 integer_type = integer_types[itk - 1];
2d3e278d 4632
1e099144
MM
4633 /* Figure out how much additional padding is required. GCC
4634 3.2 always created a padding field, even if it had zero
4635 width. */
4636 if (!abi_version_at_least (2)
4637 || INT_CST_LT (TYPE_SIZE (integer_type), DECL_SIZE (field)))
2d3e278d 4638 {
1e099144
MM
4639 if (abi_version_at_least (2) && TREE_CODE (t) == UNION_TYPE)
4640 /* In a union, the padding field must have the full width
4641 of the bit-field; all fields start at offset zero. */
4642 padding = DECL_SIZE (field);
4643 else
4644 {
74fa0285
GDR
4645 if (TREE_CODE (t) == UNION_TYPE)
4646 warning (OPT_Wabi, "size assigned to %qT may not be "
1e099144 4647 "ABI-compliant and may change in a future "
c8094d83 4648 "version of GCC",
1e099144
MM
4649 t);
4650 padding = size_binop (MINUS_EXPR, DECL_SIZE (field),
4651 TYPE_SIZE (integer_type));
4652 }
2d3e278d 4653 }
c9372112 4654#ifdef PCC_BITFIELD_TYPE_MATTERS
63e5f567
MM
4655 /* An unnamed bitfield does not normally affect the
4656 alignment of the containing class on a target where
4657 PCC_BITFIELD_TYPE_MATTERS. But, the C++ ABI does not
4658 make any exceptions for unnamed bitfields when the
4659 bitfields are longer than their types. Therefore, we
4660 temporarily give the field a name. */
4661 if (PCC_BITFIELD_TYPE_MATTERS && !DECL_NAME (field))
4662 {
4663 was_unnamed_p = true;
4664 DECL_NAME (field) = make_anon_name ();
4665 }
c9372112 4666#endif
01955e96
MM
4667 DECL_SIZE (field) = TYPE_SIZE (integer_type);
4668 DECL_ALIGN (field) = TYPE_ALIGN (integer_type);
11cf4d18 4669 DECL_USER_ALIGN (field) = TYPE_USER_ALIGN (integer_type);
555456b1
MM
4670 layout_nonempty_base_or_field (rli, field, NULL_TREE,
4671 empty_base_offsets);
4672 if (was_unnamed_p)
4673 DECL_NAME (field) = NULL_TREE;
4674 /* Now that layout has been performed, set the size of the
4675 field to the size of its declared type; the rest of the
4676 field is effectively invisible. */
4677 DECL_SIZE (field) = TYPE_SIZE (type);
29edb15c
MM
4678 /* We must also reset the DECL_MODE of the field. */
4679 if (abi_version_at_least (2))
4680 DECL_MODE (field) = TYPE_MODE (type);
4681 else if (warn_abi
4682 && DECL_MODE (field) != TYPE_MODE (type))
4683 /* Versions of G++ before G++ 3.4 did not reset the
4684 DECL_MODE. */
74fa0285 4685 warning (OPT_Wabi,
3db45ab5 4686 "the offset of %qD may not be ABI-compliant and may "
29edb15c 4687 "change in a future version of GCC", field);
01955e96 4688 }
555456b1
MM
4689 else
4690 layout_nonempty_base_or_field (rli, field, NULL_TREE,
4691 empty_base_offsets);
01955e96 4692
2003cd37
MM
4693 /* Remember the location of any empty classes in FIELD. */
4694 if (abi_version_at_least (2))
c8094d83 4695 record_subobject_offsets (TREE_TYPE (field),
2003cd37
MM
4696 byte_position(field),
4697 empty_base_offsets,
c5a35c3c 4698 /*is_data_member=*/true);
2003cd37 4699
eca7f13c
MM
4700 /* If a bit-field does not immediately follow another bit-field,
4701 and yet it starts in the middle of a byte, we have failed to
4702 comply with the ABI. */
4703 if (warn_abi
c8094d83 4704 && DECL_C_BIT_FIELD (field)
660845bf
ZL
4705 /* The TREE_NO_WARNING flag gets set by Objective-C when
4706 laying out an Objective-C class. The ObjC ABI differs
4707 from the C++ ABI, and so we do not want a warning
4708 here. */
4709 && !TREE_NO_WARNING (field)
eca7f13c
MM
4710 && !last_field_was_bitfield
4711 && !integer_zerop (size_binop (TRUNC_MOD_EXPR,
4712 DECL_FIELD_BIT_OFFSET (field),
4713 bitsize_unit_node)))
74fa0285 4714 warning (OPT_Wabi, "offset of %q+D is not ABI-compliant and may "
dee15844 4715 "change in a future version of GCC", field);
eca7f13c 4716
956d9305
MM
4717 /* G++ used to use DECL_FIELD_OFFSET as if it were the byte
4718 offset of the field. */
c8094d83 4719 if (warn_abi
956d9305
MM
4720 && !tree_int_cst_equal (DECL_FIELD_OFFSET (field),
4721 byte_position (field))
4722 && contains_empty_class_p (TREE_TYPE (field)))
74fa0285 4723 warning (OPT_Wabi, "%q+D contains empty classes which may cause base "
dee15844
JM
4724 "classes to be placed at different locations in a "
4725 "future version of GCC", field);
956d9305 4726
38a4afee
MM
4727 /* The middle end uses the type of expressions to determine the
4728 possible range of expression values. In order to optimize
4729 "x.i > 7" to "false" for a 2-bit bitfield "i", the middle end
3db45ab5 4730 must be made aware of the width of "i", via its type.
38a4afee 4731
3db45ab5 4732 Because C++ does not have integer types of arbitrary width,
38a4afee
MM
4733 we must (for the purposes of the front end) convert from the
4734 type assigned here to the declared type of the bitfield
4735 whenever a bitfield expression is used as an rvalue.
4736 Similarly, when assigning a value to a bitfield, the value
4737 must be converted to the type given the bitfield here. */
4738 if (DECL_C_BIT_FIELD (field))
4739 {
4740 tree ftype;
4741 unsigned HOST_WIDE_INT width;
4742 ftype = TREE_TYPE (field);
4743 width = tree_low_cst (DECL_SIZE (field), /*unsignedp=*/1);
4744 if (width != TYPE_PRECISION (ftype))
3db45ab5
MS
4745 TREE_TYPE (field)
4746 = c_build_bitfield_integer_type (width,
38a4afee
MM
4747 TYPE_UNSIGNED (ftype));
4748 }
4749
01955e96
MM
4750 /* If we needed additional padding after this field, add it
4751 now. */
4752 if (padding)
4753 {
4754 tree padding_field;
4755
c8094d83 4756 padding_field = build_decl (FIELD_DECL,
01955e96 4757 NULL_TREE,
c8094d83 4758 char_type_node);
01955e96
MM
4759 DECL_BIT_FIELD (padding_field) = 1;
4760 DECL_SIZE (padding_field) = padding;
1e099144 4761 DECL_CONTEXT (padding_field) = t;
ea258926 4762 DECL_ARTIFICIAL (padding_field) = 1;
78e0d62b 4763 DECL_IGNORED_P (padding_field) = 1;
c20118a8 4764 layout_nonempty_base_or_field (rli, padding_field,
c8094d83 4765 NULL_TREE,
17bbb839 4766 empty_base_offsets);
01955e96 4767 }
eca7f13c
MM
4768
4769 last_field_was_bitfield = DECL_C_BIT_FIELD (field);
5c24fba6
MM
4770 }
4771
17bbb839 4772 if (abi_version_at_least (2) && !integer_zerop (rli->bitpos))
e3ccdd50
MM
4773 {
4774 /* Make sure that we are on a byte boundary so that the size of
4775 the class without virtual bases will always be a round number
4776 of bytes. */
4777 rli->bitpos = round_up (rli->bitpos, BITS_PER_UNIT);
4778 normalize_rli (rli);
4779 }
17bbb839 4780
8a874cb4
MM
4781 /* G++ 3.2 does not allow virtual bases to be overlaid with tail
4782 padding. */
4783 if (!abi_version_at_least (2))
4784 include_empty_classes(rli);
58010b57 4785
3ef397c1
MM
4786 /* Delete all zero-width bit-fields from the list of fields. Now
4787 that the type is laid out they are no longer important. */
4788 remove_zero_width_bit_fields (t);
4789
17bbb839
MM
4790 /* Create the version of T used for virtual bases. We do not use
4791 make_aggr_type for this version; this is an artificial type. For
4792 a POD type, we just reuse T. */
58731fd1 4793 if (CLASSTYPE_NON_POD_P (t) || CLASSTYPE_EMPTY_P (t))
06ceef4e 4794 {
17bbb839 4795 base_t = make_node (TREE_CODE (t));
c8094d83 4796
58731fd1
MM
4797 /* Set the size and alignment for the new type. In G++ 3.2, all
4798 empty classes were considered to have size zero when used as
4799 base classes. */
4800 if (!abi_version_at_least (2) && CLASSTYPE_EMPTY_P (t))
4801 {
4802 TYPE_SIZE (base_t) = bitsize_zero_node;
4803 TYPE_SIZE_UNIT (base_t) = size_zero_node;
4804 if (warn_abi && !integer_zerop (rli_size_unit_so_far (rli)))
74fa0285 4805 warning (OPT_Wabi,
3db45ab5 4806 "layout of classes derived from empty class %qT "
58731fd1
MM
4807 "may change in a future version of GCC",
4808 t);
4809 }
4810 else
4811 {
6b99d1c0
MM
4812 tree eoc;
4813
4814 /* If the ABI version is not at least two, and the last
4815 field was a bit-field, RLI may not be on a byte
4816 boundary. In particular, rli_size_unit_so_far might
4817 indicate the last complete byte, while rli_size_so_far
4818 indicates the total number of bits used. Therefore,
4819 rli_size_so_far, rather than rli_size_unit_so_far, is
4820 used to compute TYPE_SIZE_UNIT. */
4821 eoc = end_of_class (t, /*include_virtuals_p=*/0);
c8094d83 4822 TYPE_SIZE_UNIT (base_t)
8a874cb4 4823 = size_binop (MAX_EXPR,
6b99d1c0
MM
4824 convert (sizetype,
4825 size_binop (CEIL_DIV_EXPR,
4826 rli_size_so_far (rli),
4827 bitsize_int (BITS_PER_UNIT))),
4828 eoc);
c8094d83 4829 TYPE_SIZE (base_t)
8a874cb4
MM
4830 = size_binop (MAX_EXPR,
4831 rli_size_so_far (rli),
4832 size_binop (MULT_EXPR,
6b99d1c0 4833 convert (bitsizetype, eoc),
8a874cb4 4834 bitsize_int (BITS_PER_UNIT)));
58731fd1 4835 }
17bbb839
MM
4836 TYPE_ALIGN (base_t) = rli->record_align;
4837 TYPE_USER_ALIGN (base_t) = TYPE_USER_ALIGN (t);
4838
4839 /* Copy the fields from T. */
4840 next_field = &TYPE_FIELDS (base_t);
4841 for (field = TYPE_FIELDS (t); field; field = TREE_CHAIN (field))
4842 if (TREE_CODE (field) == FIELD_DECL)
4843 {
4844 *next_field = build_decl (FIELD_DECL,
c8094d83 4845 DECL_NAME (field),
17bbb839
MM
4846 TREE_TYPE (field));
4847 DECL_CONTEXT (*next_field) = base_t;
4848 DECL_FIELD_OFFSET (*next_field) = DECL_FIELD_OFFSET (field);
4849 DECL_FIELD_BIT_OFFSET (*next_field)
4850 = DECL_FIELD_BIT_OFFSET (field);
4f0a2b81
MM
4851 DECL_SIZE (*next_field) = DECL_SIZE (field);
4852 DECL_MODE (*next_field) = DECL_MODE (field);
17bbb839
MM
4853 next_field = &TREE_CHAIN (*next_field);
4854 }
4855
4856 /* Record the base version of the type. */
4857 CLASSTYPE_AS_BASE (t) = base_t;
5a5cccaa 4858 TYPE_CONTEXT (base_t) = t;
83b14b88 4859 }
1f84ec23 4860 else
17bbb839 4861 CLASSTYPE_AS_BASE (t) = t;
0b41abe6 4862
5ec1192e
MM
4863 /* Every empty class contains an empty class. */
4864 if (CLASSTYPE_EMPTY_P (t))
4865 CLASSTYPE_CONTAINS_EMPTY_CLASS_P (t) = 1;
4866
8d08fdba
MS
4867 /* Set the TYPE_DECL for this type to contain the right
4868 value for DECL_OFFSET, so that we can use it as part
4869 of a COMPONENT_REF for multiple inheritance. */
d2e5ee5c 4870 layout_decl (TYPE_MAIN_DECL (t), 0);
8d08fdba 4871
7177d104
MS
4872 /* Now fix up any virtual base class types that we left lying
4873 around. We must get these done before we try to lay out the
5c24fba6
MM
4874 virtual function table. As a side-effect, this will remove the
4875 base subobject fields. */
17bbb839
MM
4876 layout_virtual_bases (rli, empty_base_offsets);
4877
c8094d83 4878 /* Make sure that empty classes are reflected in RLI at this
17bbb839
MM
4879 point. */
4880 include_empty_classes(rli);
4881
4882 /* Make sure not to create any structures with zero size. */
58731fd1 4883 if (integer_zerop (rli_size_unit_so_far (rli)) && CLASSTYPE_EMPTY_P (t))
c8094d83 4884 place_field (rli,
17bbb839
MM
4885 build_decl (FIELD_DECL, NULL_TREE, char_type_node));
4886
4887 /* Let the back-end lay out the type. */
4888 finish_record_layout (rli, /*free_p=*/true);
9785e4b1 4889
17bbb839
MM
4890 /* Warn about bases that can't be talked about due to ambiguity. */
4891 warn_about_ambiguous_bases (t);
78b45a24 4892
00bfffa4
JM
4893 /* Now that we're done with layout, give the base fields the real types. */
4894 for (field = TYPE_FIELDS (t); field; field = TREE_CHAIN (field))
4895 if (DECL_ARTIFICIAL (field) && IS_FAKE_BASE_TYPE (TREE_TYPE (field)))
4896 TREE_TYPE (field) = TYPE_CONTEXT (TREE_TYPE (field));
4897
9785e4b1 4898 /* Clean up. */
c20118a8 4899 splay_tree_delete (empty_base_offsets);
c5a35c3c
MM
4900
4901 if (CLASSTYPE_EMPTY_P (t)
3db45ab5 4902 && tree_int_cst_lt (sizeof_biggest_empty_class,
c0572427
MM
4903 TYPE_SIZE_UNIT (t)))
4904 sizeof_biggest_empty_class = TYPE_SIZE_UNIT (t);
2ef16140 4905}
c35cce41 4906
af287697
MM
4907/* Determine the "key method" for the class type indicated by TYPE,
4908 and set CLASSTYPE_KEY_METHOD accordingly. */
9aad8f83 4909
af287697
MM
4910void
4911determine_key_method (tree type)
9aad8f83
MA
4912{
4913 tree method;
4914
4915 if (TYPE_FOR_JAVA (type)
4916 || processing_template_decl
4917 || CLASSTYPE_TEMPLATE_INSTANTIATION (type)
4918 || CLASSTYPE_INTERFACE_KNOWN (type))
af287697 4919 return;
9aad8f83 4920
af287697
MM
4921 /* The key method is the first non-pure virtual function that is not
4922 inline at the point of class definition. On some targets the
4923 key function may not be inline; those targets should not call
4924 this function until the end of the translation unit. */
9aad8f83
MA
4925 for (method = TYPE_METHODS (type); method != NULL_TREE;
4926 method = TREE_CHAIN (method))
4927 if (DECL_VINDEX (method) != NULL_TREE
4928 && ! DECL_DECLARED_INLINE_P (method)
4929 && ! DECL_PURE_VIRTUAL_P (method))
af287697
MM
4930 {
4931 CLASSTYPE_KEY_METHOD (type) = method;
4932 break;
4933 }
9aad8f83 4934
af287697 4935 return;
9aad8f83
MA
4936}
4937
548502d3
MM
4938/* Perform processing required when the definition of T (a class type)
4939 is complete. */
2ef16140
MM
4940
4941void
94edc4ab 4942finish_struct_1 (tree t)
2ef16140
MM
4943{
4944 tree x;
00a17e31 4945 /* A TREE_LIST. The TREE_VALUE of each node is a FUNCTION_DECL. */
e6858a84 4946 tree virtuals = NULL_TREE;
2ef16140 4947 int n_fields = 0;
2ef16140 4948
d0f062fb 4949 if (COMPLETE_TYPE_P (t))
2ef16140 4950 {
8dc2b103 4951 gcc_assert (IS_AGGR_TYPE (t));
1f070f2b 4952 error ("redefinition of %q#T", t);
2ef16140
MM
4953 popclass ();
4954 return;
4955 }
4956
2ef16140
MM
4957 /* If this type was previously laid out as a forward reference,
4958 make sure we lay it out again. */
2ef16140 4959 TYPE_SIZE (t) = NULL_TREE;
911a71a7 4960 CLASSTYPE_PRIMARY_BINFO (t) = NULL_TREE;
2ef16140 4961
6d0a3f67 4962 fixup_inline_methods (t);
c8094d83 4963
5ec1192e
MM
4964 /* Make assumptions about the class; we'll reset the flags if
4965 necessary. */
58731fd1
MM
4966 CLASSTYPE_EMPTY_P (t) = 1;
4967 CLASSTYPE_NEARLY_EMPTY_P (t) = 1;
5ec1192e 4968 CLASSTYPE_CONTAINS_EMPTY_CLASS_P (t) = 0;
58731fd1 4969
2ef16140 4970 /* Do end-of-class semantic processing: checking the validity of the
03702748 4971 bases and members and add implicitly generated methods. */
58731fd1 4972 check_bases_and_members (t);
2ef16140 4973
f4f206f4 4974 /* Find the key method. */
a63996f1 4975 if (TYPE_CONTAINS_VPTR_P (t))
9aad8f83 4976 {
af287697
MM
4977 /* The Itanium C++ ABI permits the key method to be chosen when
4978 the class is defined -- even though the key method so
4979 selected may later turn out to be an inline function. On
4980 some systems (such as ARM Symbian OS) the key method cannot
4981 be determined until the end of the translation unit. On such
4982 systems, we leave CLASSTYPE_KEY_METHOD set to NULL, which
4983 will cause the class to be added to KEYED_CLASSES. Then, in
4984 finish_file we will determine the key method. */
4985 if (targetm.cxx.key_method_may_be_inline ())
4986 determine_key_method (t);
9aad8f83
MA
4987
4988 /* If a polymorphic class has no key method, we may emit the vtable
9bcb9aae 4989 in every translation unit where the class definition appears. */
9aad8f83
MA
4990 if (CLASSTYPE_KEY_METHOD (t) == NULL_TREE)
4991 keyed_classes = tree_cons (NULL_TREE, t, keyed_classes);
4992 }
4993
2ef16140 4994 /* Layout the class itself. */
e93ee644 4995 layout_class_type (t, &virtuals);
a0c68737
NS
4996 if (CLASSTYPE_AS_BASE (t) != t)
4997 /* We use the base type for trivial assignments, and hence it
4998 needs a mode. */
4999 compute_record_mode (CLASSTYPE_AS_BASE (t));
8ebeee52 5000
e93ee644 5001 virtuals = modify_all_vtables (t, nreverse (virtuals));
db5ae43f 5002
5e19c053 5003 /* If necessary, create the primary vtable for this class. */
e6858a84 5004 if (virtuals || TYPE_CONTAINS_VPTR_P (t))
8d08fdba 5005 {
8d08fdba 5006 /* We must enter these virtuals into the table. */
3ef397c1 5007 if (!CLASSTYPE_HAS_PRIMARY_BASE_P (t))
da3d4dfa 5008 build_primary_vtable (NULL_TREE, t);
dbbf88d1 5009 else if (! BINFO_NEW_VTABLE_MARKED (TYPE_BINFO (t)))
0533d788
MM
5010 /* Here we know enough to change the type of our virtual
5011 function table, but we will wait until later this function. */
28531dd0 5012 build_primary_vtable (CLASSTYPE_PRIMARY_BINFO (t), t);
8d08fdba
MS
5013 }
5014
bbd15aac 5015 if (TYPE_CONTAINS_VPTR_P (t))
8d08fdba 5016 {
e93ee644
MM
5017 int vindex;
5018 tree fn;
5019
604a3205 5020 if (BINFO_VTABLE (TYPE_BINFO (t)))
50bc768d 5021 gcc_assert (DECL_VIRTUAL_P (BINFO_VTABLE (TYPE_BINFO (t))));
1eb4bea9 5022 if (!CLASSTYPE_HAS_PRIMARY_BASE_P (t))
50bc768d 5023 gcc_assert (BINFO_VIRTUALS (TYPE_BINFO (t)) == NULL_TREE);
1eb4bea9 5024
e6858a84 5025 /* Add entries for virtual functions introduced by this class. */
604a3205
NS
5026 BINFO_VIRTUALS (TYPE_BINFO (t))
5027 = chainon (BINFO_VIRTUALS (TYPE_BINFO (t)), virtuals);
e93ee644
MM
5028
5029 /* Set DECL_VINDEX for all functions declared in this class. */
c8094d83
MS
5030 for (vindex = 0, fn = BINFO_VIRTUALS (TYPE_BINFO (t));
5031 fn;
5032 fn = TREE_CHAIN (fn),
e93ee644
MM
5033 vindex += (TARGET_VTABLE_USES_DESCRIPTORS
5034 ? TARGET_VTABLE_USES_DESCRIPTORS : 1))
4977bab6
ZW
5035 {
5036 tree fndecl = BV_FN (fn);
5037
5038 if (DECL_THUNK_P (fndecl))
5039 /* A thunk. We should never be calling this entry directly
5040 from this vtable -- we'd use the entry for the non
5041 thunk base function. */
5042 DECL_VINDEX (fndecl) = NULL_TREE;
5043 else if (TREE_CODE (DECL_VINDEX (fndecl)) != INTEGER_CST)
7d60be94 5044 DECL_VINDEX (fndecl) = build_int_cst (NULL_TREE, vindex);
4977bab6 5045 }
8d08fdba
MS
5046 }
5047
d2c5305b 5048 finish_struct_bits (t);
8d08fdba 5049
f30432d7
MS
5050 /* Complete the rtl for any static member objects of the type we're
5051 working on. */
58010b57 5052 for (x = TYPE_FIELDS (t); x; x = TREE_CHAIN (x))
19e7881c 5053 if (TREE_CODE (x) == VAR_DECL && TREE_STATIC (x)
c7f4981a 5054 && same_type_p (TYPE_MAIN_VARIANT (TREE_TYPE (x)), t))
19e7881c 5055 DECL_MODE (x) = TYPE_MODE (t);
8d08fdba 5056
f90cdf34 5057 /* Done with FIELDS...now decide whether to sort these for
58010b57 5058 faster lookups later.
f90cdf34 5059
6c73ad72 5060 We use a small number because most searches fail (succeeding
f90cdf34
MT
5061 ultimately as the search bores through the inheritance
5062 hierarchy), and we want this failure to occur quickly. */
5063
58010b57
MM
5064 n_fields = count_fields (TYPE_FIELDS (t));
5065 if (n_fields > 7)
f90cdf34 5066 {
99dd239f 5067 struct sorted_fields_type *field_vec = GGC_NEWVAR
0cbd7506
MS
5068 (struct sorted_fields_type,
5069 sizeof (struct sorted_fields_type) + n_fields * sizeof (tree));
d07605f5
AP
5070 field_vec->len = n_fields;
5071 add_fields_to_record_type (TYPE_FIELDS (t), field_vec, 0);
5072 qsort (field_vec->elts, n_fields, sizeof (tree),
17211ab5 5073 field_decl_cmp);
f90cdf34
MT
5074 if (! DECL_LANG_SPECIFIC (TYPE_MAIN_DECL (t)))
5075 retrofit_lang_decl (TYPE_MAIN_DECL (t));
5076 DECL_SORTED_FIELDS (TYPE_MAIN_DECL (t)) = field_vec;
5077 }
5078
b9e75696
JM
5079 /* Complain if one of the field types requires lower visibility. */
5080 constrain_class_visibility (t);
5081
8d7a5379
MM
5082 /* Make the rtl for any new vtables we have created, and unmark
5083 the base types we marked. */
5084 finish_vtbls (t);
c8094d83 5085
23656158
MM
5086 /* Build the VTT for T. */
5087 build_vtt (t);
8d7a5379 5088
f03e8526
MM
5089 /* This warning does not make sense for Java classes, since they
5090 cannot have destructors. */
5091 if (!TYPE_FOR_JAVA (t) && warn_nonvdtor && TYPE_POLYMORPHIC_P (t))
9fd8f60d 5092 {
9f4faeae
MM
5093 tree dtor;
5094
5095 dtor = CLASSTYPE_DESTRUCTORS (t);
5096 /* Warn only if the dtor is non-private or the class has
5097 friends. */
5098 if (/* An implicitly declared destructor is always public. And,
5099 if it were virtual, we would have created it by now. */
5100 !dtor
5101 || (!DECL_VINDEX (dtor)
c8094d83
MS
5102 && (!TREE_PRIVATE (dtor)
5103 || CLASSTYPE_FRIEND_CLASSES (t)
9f4faeae 5104 || DECL_FRIENDLIST (TYPE_MAIN_DECL (t)))))
c8094d83 5105 warning (0, "%q#T has virtual functions but non-virtual destructor",
9f4faeae 5106 t);
9fd8f60d 5107 }
8d08fdba 5108
0154eaa8 5109 complete_vars (t);
8d08fdba 5110
9e9ff709
MS
5111 if (warn_overloaded_virtual)
5112 warn_hidden (t);
8d08fdba 5113
43d9ad1d
DS
5114 /* Class layout, assignment of virtual table slots, etc., is now
5115 complete. Give the back end a chance to tweak the visibility of
5116 the class or perform any other required target modifications. */
5117 targetm.cxx.adjust_class_at_definition (t);
5118
ae673f14 5119 maybe_suppress_debug_info (t);
8d08fdba 5120
b7442fb5 5121 dump_class_hierarchy (t);
c8094d83 5122
d2e5ee5c 5123 /* Finish debugging output for this type. */
881c6935 5124 rest_of_type_compilation (t, ! LOCAL_CLASS_P (t));
8d08fdba 5125}
f30432d7 5126
61a127b3
MM
5127/* When T was built up, the member declarations were added in reverse
5128 order. Rearrange them to declaration order. */
5129
5130void
94edc4ab 5131unreverse_member_declarations (tree t)
61a127b3
MM
5132{
5133 tree next;
5134 tree prev;
5135 tree x;
5136
7088fca9
KL
5137 /* The following lists are all in reverse order. Put them in
5138 declaration order now. */
61a127b3 5139 TYPE_METHODS (t) = nreverse (TYPE_METHODS (t));
7088fca9 5140 CLASSTYPE_DECL_LIST (t) = nreverse (CLASSTYPE_DECL_LIST (t));
61a127b3
MM
5141
5142 /* Actually, for the TYPE_FIELDS, only the non TYPE_DECLs are in
5143 reverse order, so we can't just use nreverse. */
5144 prev = NULL_TREE;
c8094d83
MS
5145 for (x = TYPE_FIELDS (t);
5146 x && TREE_CODE (x) != TYPE_DECL;
61a127b3
MM
5147 x = next)
5148 {
5149 next = TREE_CHAIN (x);
5150 TREE_CHAIN (x) = prev;
5151 prev = x;
5152 }
5153 if (prev)
5154 {
5155 TREE_CHAIN (TYPE_FIELDS (t)) = x;
5156 if (prev)
5157 TYPE_FIELDS (t) = prev;
5158 }
5159}
5160
f30432d7 5161tree
94edc4ab 5162finish_struct (tree t, tree attributes)
f30432d7 5163{
82a98427 5164 location_t saved_loc = input_location;
1f0d71c5 5165
61a127b3
MM
5166 /* Now that we've got all the field declarations, reverse everything
5167 as necessary. */
5168 unreverse_member_declarations (t);
f30432d7 5169
91d231cb 5170 cplus_decl_attributes (&t, attributes, (int) ATTR_FLAG_TYPE_IN_PLACE);
6467930b 5171
1f0d71c5
NS
5172 /* Nadger the current location so that diagnostics point to the start of
5173 the struct, not the end. */
f31686a3 5174 input_location = DECL_SOURCE_LOCATION (TYPE_NAME (t));
1f0d71c5 5175
5566b478 5176 if (processing_template_decl)
f30432d7 5177 {
7fb213d8
GB
5178 tree x;
5179
b0e0b31f 5180 finish_struct_methods (t);
867580ce 5181 TYPE_SIZE (t) = bitsize_zero_node;
ae54ec16 5182 TYPE_SIZE_UNIT (t) = size_zero_node;
7fb213d8
GB
5183
5184 /* We need to emit an error message if this type was used as a parameter
5185 and it is an abstract type, even if it is a template. We construct
5186 a simple CLASSTYPE_PURE_VIRTUALS list without taking bases into
5187 account and we call complete_vars with this type, which will check
5188 the PARM_DECLS. Note that while the type is being defined,
5189 CLASSTYPE_PURE_VIRTUALS contains the list of the inline friends
5190 (see CLASSTYPE_INLINE_FRIENDS) so we need to clear it. */
585b44d3 5191 CLASSTYPE_PURE_VIRTUALS (t) = NULL;
7fb213d8
GB
5192 for (x = TYPE_METHODS (t); x; x = TREE_CHAIN (x))
5193 if (DECL_PURE_VIRTUAL_P (x))
d4e6fecb 5194 VEC_safe_push (tree, gc, CLASSTYPE_PURE_VIRTUALS (t), x);
7fb213d8 5195 complete_vars (t);
6f1b4c42 5196 }
f30432d7 5197 else
9f33663b 5198 finish_struct_1 (t);
5566b478 5199
82a98427 5200 input_location = saved_loc;
1f0d71c5 5201
5566b478 5202 TYPE_BEING_DEFINED (t) = 0;
8f032717 5203
5566b478 5204 if (current_class_type)
b74a0560 5205 popclass ();
5566b478 5206 else
357351e5 5207 error ("trying to finish struct, but kicked out due to previous parse errors");
5566b478 5208
5f261ba9
MM
5209 if (processing_template_decl && at_function_scope_p ())
5210 add_stmt (build_min (TAG_DEFN, t));
ae673f14 5211
5566b478 5212 return t;
f30432d7 5213}
8d08fdba 5214\f
51ddb82e 5215/* Return the dynamic type of INSTANCE, if known.
8d08fdba
MS
5216 Used to determine whether the virtual function table is needed
5217 or not.
5218
5219 *NONNULL is set iff INSTANCE can be known to be nonnull, regardless
97d953bb
MM
5220 of our knowledge of its type. *NONNULL should be initialized
5221 before this function is called. */
e92cc029 5222
d8e178a0 5223static tree
94edc4ab 5224fixed_type_or_null (tree instance, int* nonnull, int* cdtorp)
8d08fdba
MS
5225{
5226 switch (TREE_CODE (instance))
5227 {
5228 case INDIRECT_REF:
608afcc5 5229 if (POINTER_TYPE_P (TREE_TYPE (instance)))
a0de9d20
JM
5230 return NULL_TREE;
5231 else
5232 return fixed_type_or_null (TREE_OPERAND (instance, 0),
5233 nonnull, cdtorp);
5234
8d08fdba
MS
5235 case CALL_EXPR:
5236 /* This is a call to a constructor, hence it's never zero. */
5237 if (TREE_HAS_CONSTRUCTOR (instance))
5238 {
5239 if (nonnull)
5240 *nonnull = 1;
51ddb82e 5241 return TREE_TYPE (instance);
8d08fdba 5242 }
51ddb82e 5243 return NULL_TREE;
8d08fdba
MS
5244
5245 case SAVE_EXPR:
5246 /* This is a call to a constructor, hence it's never zero. */
5247 if (TREE_HAS_CONSTRUCTOR (instance))
5248 {
5249 if (nonnull)
5250 *nonnull = 1;
51ddb82e 5251 return TREE_TYPE (instance);
8d08fdba 5252 }
394fd776 5253 return fixed_type_or_null (TREE_OPERAND (instance, 0), nonnull, cdtorp);
8d08fdba 5254
8d08fdba
MS
5255 case PLUS_EXPR:
5256 case MINUS_EXPR:
394fd776
NS
5257 if (TREE_CODE (TREE_OPERAND (instance, 0)) == ADDR_EXPR)
5258 return fixed_type_or_null (TREE_OPERAND (instance, 0), nonnull, cdtorp);
8d08fdba
MS
5259 if (TREE_CODE (TREE_OPERAND (instance, 1)) == INTEGER_CST)
5260 /* Propagate nonnull. */
f63ab951 5261 return fixed_type_or_null (TREE_OPERAND (instance, 0), nonnull, cdtorp);
51ddb82e 5262 return NULL_TREE;
8d08fdba
MS
5263
5264 case NOP_EXPR:
5265 case CONVERT_EXPR:
394fd776 5266 return fixed_type_or_null (TREE_OPERAND (instance, 0), nonnull, cdtorp);
8d08fdba
MS
5267
5268 case ADDR_EXPR:
88f19756 5269 instance = TREE_OPERAND (instance, 0);
8d08fdba 5270 if (nonnull)
88f19756
RH
5271 {
5272 /* Just because we see an ADDR_EXPR doesn't mean we're dealing
5273 with a real object -- given &p->f, p can still be null. */
5274 tree t = get_base_address (instance);
5275 /* ??? Probably should check DECL_WEAK here. */
5276 if (t && DECL_P (t))
5277 *nonnull = 1;
5278 }
5279 return fixed_type_or_null (instance, nonnull, cdtorp);
8d08fdba
MS
5280
5281 case COMPONENT_REF:
642124c6
RH
5282 /* If this component is really a base class reference, then the field
5283 itself isn't definitive. */
5284 if (DECL_FIELD_IS_BASE (TREE_OPERAND (instance, 1)))
0cbd7506 5285 return fixed_type_or_null (TREE_OPERAND (instance, 0), nonnull, cdtorp);
394fd776 5286 return fixed_type_or_null (TREE_OPERAND (instance, 1), nonnull, cdtorp);
8d08fdba 5287
8d08fdba
MS
5288 case VAR_DECL:
5289 case FIELD_DECL:
5290 if (TREE_CODE (TREE_TYPE (instance)) == ARRAY_TYPE
5291 && IS_AGGR_TYPE (TREE_TYPE (TREE_TYPE (instance))))
5292 {
5293 if (nonnull)
5294 *nonnull = 1;
51ddb82e 5295 return TREE_TYPE (TREE_TYPE (instance));
8d08fdba 5296 }
e92cc029 5297 /* fall through... */
8d08fdba
MS
5298 case TARGET_EXPR:
5299 case PARM_DECL:
f63ab951 5300 case RESULT_DECL:
8d08fdba
MS
5301 if (IS_AGGR_TYPE (TREE_TYPE (instance)))
5302 {
5303 if (nonnull)
5304 *nonnull = 1;
51ddb82e 5305 return TREE_TYPE (instance);
8d08fdba 5306 }
394fd776 5307 else if (instance == current_class_ptr)
0cbd7506
MS
5308 {
5309 if (nonnull)
5310 *nonnull = 1;
5311
5312 /* if we're in a ctor or dtor, we know our type. */
5313 if (DECL_LANG_SPECIFIC (current_function_decl)
5314 && (DECL_CONSTRUCTOR_P (current_function_decl)
5315 || DECL_DESTRUCTOR_P (current_function_decl)))
5316 {
5317 if (cdtorp)
5318 *cdtorp = 1;
5319 return TREE_TYPE (TREE_TYPE (instance));
5320 }
5321 }
394fd776 5322 else if (TREE_CODE (TREE_TYPE (instance)) == REFERENCE_TYPE)
0cbd7506
MS
5323 {
5324 /* Reference variables should be references to objects. */
5325 if (nonnull)
8d08fdba 5326 *nonnull = 1;
c8094d83 5327
772f8889
MM
5328 /* DECL_VAR_MARKED_P is used to prevent recursion; a
5329 variable's initializer may refer to the variable
5330 itself. */
c8094d83 5331 if (TREE_CODE (instance) == VAR_DECL
772f8889
MM
5332 && DECL_INITIAL (instance)
5333 && !DECL_VAR_MARKED_P (instance))
5334 {
5335 tree type;
5336 DECL_VAR_MARKED_P (instance) = 1;
5337 type = fixed_type_or_null (DECL_INITIAL (instance),
5338 nonnull, cdtorp);
5339 DECL_VAR_MARKED_P (instance) = 0;
5340 return type;
5341 }
8d08fdba 5342 }
51ddb82e 5343 return NULL_TREE;
8d08fdba
MS
5344
5345 default:
51ddb82e 5346 return NULL_TREE;
8d08fdba
MS
5347 }
5348}
51ddb82e 5349
838dfd8a 5350/* Return nonzero if the dynamic type of INSTANCE is known, and
338d90b8
NS
5351 equivalent to the static type. We also handle the case where
5352 INSTANCE is really a pointer. Return negative if this is a
5353 ctor/dtor. There the dynamic type is known, but this might not be
5354 the most derived base of the original object, and hence virtual
5355 bases may not be layed out according to this type.
51ddb82e
JM
5356
5357 Used to determine whether the virtual function table is needed
5358 or not.
5359
5360 *NONNULL is set iff INSTANCE can be known to be nonnull, regardless
97d953bb
MM
5361 of our knowledge of its type. *NONNULL should be initialized
5362 before this function is called. */
51ddb82e
JM
5363
5364int
94edc4ab 5365resolves_to_fixed_type_p (tree instance, int* nonnull)
51ddb82e
JM
5366{
5367 tree t = TREE_TYPE (instance);
394fd776 5368 int cdtorp = 0;
c8094d83 5369
394fd776 5370 tree fixed = fixed_type_or_null (instance, nonnull, &cdtorp);
51ddb82e
JM
5371 if (fixed == NULL_TREE)
5372 return 0;
5373 if (POINTER_TYPE_P (t))
5374 t = TREE_TYPE (t);
394fd776
NS
5375 if (!same_type_ignoring_top_level_qualifiers_p (t, fixed))
5376 return 0;
5377 return cdtorp ? -1 : 1;
51ddb82e
JM
5378}
5379
8d08fdba
MS
5380\f
5381void
94edc4ab 5382init_class_processing (void)
8d08fdba
MS
5383{
5384 current_class_depth = 0;
61a127b3 5385 current_class_stack_size = 10;
c8094d83 5386 current_class_stack
0ac1b889 5387 = XNEWVEC (struct class_stack_node, current_class_stack_size);
806aa901 5388 local_classes = VEC_alloc (tree, gc, 8);
c5a35c3c 5389 sizeof_biggest_empty_class = size_zero_node;
8d08fdba 5390
0e5921e8
ZW
5391 ridpointers[(int) RID_PUBLIC] = access_public_node;
5392 ridpointers[(int) RID_PRIVATE] = access_private_node;
5393 ridpointers[(int) RID_PROTECTED] = access_protected_node;
8d08fdba
MS
5394}
5395
39fb05d0
MM
5396/* Restore the cached PREVIOUS_CLASS_LEVEL. */
5397
5398static void
5399restore_class_cache (void)
5400{
39fb05d0 5401 tree type;
39fb05d0
MM
5402
5403 /* We are re-entering the same class we just left, so we don't
5404 have to search the whole inheritance matrix to find all the
5405 decls to bind again. Instead, we install the cached
5406 class_shadowed list and walk through it binding names. */
5407 push_binding_level (previous_class_level);
5408 class_binding_level = previous_class_level;
39fb05d0 5409 /* Restore IDENTIFIER_TYPE_VALUE. */
c8094d83
MS
5410 for (type = class_binding_level->type_shadowed;
5411 type;
39fb05d0
MM
5412 type = TREE_CHAIN (type))
5413 SET_IDENTIFIER_TYPE_VALUE (TREE_PURPOSE (type), TREE_TYPE (type));
5414}
5415
a723baf1
MM
5416/* Set global variables CURRENT_CLASS_NAME and CURRENT_CLASS_TYPE as
5417 appropriate for TYPE.
8d08fdba 5418
8d08fdba
MS
5419 So that we may avoid calls to lookup_name, we cache the _TYPE
5420 nodes of local TYPE_DECLs in the TREE_TYPE field of the name.
5421
5422 For multiple inheritance, we perform a two-pass depth-first search
39fb05d0 5423 of the type lattice. */
8d08fdba
MS
5424
5425void
29370796 5426pushclass (tree type)
8d08fdba 5427{
c888c93b
MM
5428 class_stack_node_t csn;
5429
7fb4a8f7 5430 type = TYPE_MAIN_VARIANT (type);
8d08fdba 5431
61a127b3 5432 /* Make sure there is enough room for the new entry on the stack. */
c8094d83 5433 if (current_class_depth + 1 >= current_class_stack_size)
8d08fdba 5434 {
61a127b3
MM
5435 current_class_stack_size *= 2;
5436 current_class_stack
7767580e 5437 = XRESIZEVEC (struct class_stack_node, current_class_stack,
3db45ab5 5438 current_class_stack_size);
8d08fdba
MS
5439 }
5440
61a127b3 5441 /* Insert a new entry on the class stack. */
c888c93b
MM
5442 csn = current_class_stack + current_class_depth;
5443 csn->name = current_class_name;
5444 csn->type = current_class_type;
5445 csn->access = current_access_specifier;
5446 csn->names_used = 0;
5447 csn->hidden = 0;
61a127b3
MM
5448 current_class_depth++;
5449
5450 /* Now set up the new type. */
8d08fdba
MS
5451 current_class_name = TYPE_NAME (type);
5452 if (TREE_CODE (current_class_name) == TYPE_DECL)
5453 current_class_name = DECL_NAME (current_class_name);
5454 current_class_type = type;
5455
61a127b3
MM
5456 /* By default, things in classes are private, while things in
5457 structures or unions are public. */
c8094d83
MS
5458 current_access_specifier = (CLASSTYPE_DECLARED_CLASS (type)
5459 ? access_private_node
61a127b3
MM
5460 : access_public_node);
5461
89b578be
MM
5462 if (previous_class_level
5463 && type != previous_class_level->this_entity
8d08fdba
MS
5464 && current_class_depth == 1)
5465 {
5466 /* Forcibly remove any old class remnants. */
8f032717 5467 invalidate_class_lookup_cache ();
8d08fdba
MS
5468 }
5469
c8094d83 5470 if (!previous_class_level
89b578be
MM
5471 || type != previous_class_level->this_entity
5472 || current_class_depth > 1)
90ea9897 5473 pushlevel_class ();
29370796 5474 else
39fb05d0 5475 restore_class_cache ();
8f032717
MM
5476}
5477
39fb05d0
MM
5478/* When we exit a toplevel class scope, we save its binding level so
5479 that we can restore it quickly. Here, we've entered some other
5480 class, so we must invalidate our cache. */
8d08fdba 5481
8f032717 5482void
94edc4ab 5483invalidate_class_lookup_cache (void)
8f032717 5484{
89b578be 5485 previous_class_level = NULL;
8d08fdba 5486}
c8094d83 5487
8d08fdba 5488/* Get out of the current class scope. If we were in a class scope
b74a0560 5489 previously, that is the one popped to. */
e92cc029 5490
8d08fdba 5491void
94edc4ab 5492popclass (void)
8d08fdba 5493{
273a708f 5494 poplevel_class ();
8d08fdba
MS
5495
5496 current_class_depth--;
61a127b3
MM
5497 current_class_name = current_class_stack[current_class_depth].name;
5498 current_class_type = current_class_stack[current_class_depth].type;
5499 current_access_specifier = current_class_stack[current_class_depth].access;
8f032717
MM
5500 if (current_class_stack[current_class_depth].names_used)
5501 splay_tree_delete (current_class_stack[current_class_depth].names_used);
8d08fdba
MS
5502}
5503
c888c93b
MM
5504/* Mark the top of the class stack as hidden. */
5505
5506void
5507push_class_stack (void)
5508{
5509 if (current_class_depth)
5510 ++current_class_stack[current_class_depth - 1].hidden;
5511}
5512
5513/* Mark the top of the class stack as un-hidden. */
5514
5515void
5516pop_class_stack (void)
5517{
5518 if (current_class_depth)
5519 --current_class_stack[current_class_depth - 1].hidden;
5520}
5521
fa6098f8
MM
5522/* Returns 1 if the class type currently being defined is either T or
5523 a nested type of T. */
b9082e8a 5524
fa6098f8 5525bool
94edc4ab 5526currently_open_class (tree t)
b9082e8a
JM
5527{
5528 int i;
fa6098f8
MM
5529
5530 /* We start looking from 1 because entry 0 is from global scope,
5531 and has no type. */
5532 for (i = current_class_depth; i > 0; --i)
c888c93b 5533 {
fa6098f8
MM
5534 tree c;
5535 if (i == current_class_depth)
5536 c = current_class_type;
5537 else
5538 {
5539 if (current_class_stack[i].hidden)
5540 break;
5541 c = current_class_stack[i].type;
5542 }
5543 if (!c)
5544 continue;
5545 if (same_type_p (c, t))
5546 return true;
c888c93b 5547 }
fa6098f8 5548 return false;
b9082e8a
JM
5549}
5550
70adf8a9
JM
5551/* If either current_class_type or one of its enclosing classes are derived
5552 from T, return the appropriate type. Used to determine how we found
5553 something via unqualified lookup. */
5554
5555tree
94edc4ab 5556currently_open_derived_class (tree t)
70adf8a9
JM
5557{
5558 int i;
5559
9bcb9aae 5560 /* The bases of a dependent type are unknown. */
1fb3244a
MM
5561 if (dependent_type_p (t))
5562 return NULL_TREE;
5563
c44e68a5
KL
5564 if (!current_class_type)
5565 return NULL_TREE;
5566
70adf8a9
JM
5567 if (DERIVED_FROM_P (t, current_class_type))
5568 return current_class_type;
5569
5570 for (i = current_class_depth - 1; i > 0; --i)
c888c93b
MM
5571 {
5572 if (current_class_stack[i].hidden)
5573 break;
5574 if (DERIVED_FROM_P (t, current_class_stack[i].type))
5575 return current_class_stack[i].type;
5576 }
70adf8a9
JM
5577
5578 return NULL_TREE;
5579}
5580
8d08fdba 5581/* When entering a class scope, all enclosing class scopes' names with
14d22dd6
MM
5582 static meaning (static variables, static functions, types and
5583 enumerators) have to be visible. This recursive function calls
5584 pushclass for all enclosing class contexts until global or a local
5585 scope is reached. TYPE is the enclosed class. */
8d08fdba
MS
5586
5587void
14d22dd6 5588push_nested_class (tree type)
8d08fdba 5589{
a28e3c7f
MS
5590 tree context;
5591
b262d64c 5592 /* A namespace might be passed in error cases, like A::B:C. */
c8094d83
MS
5593 if (type == NULL_TREE
5594 || type == error_mark_node
b262d64c 5595 || TREE_CODE (type) == NAMESPACE_DECL
07c88314 5596 || ! IS_AGGR_TYPE (type)
73b0fce8 5597 || TREE_CODE (type) == TEMPLATE_TYPE_PARM
a1281f45 5598 || TREE_CODE (type) == BOUND_TEMPLATE_TEMPLATE_PARM)
a28e3c7f 5599 return;
c8094d83 5600
d2e5ee5c 5601 context = DECL_CONTEXT (TYPE_MAIN_DECL (type));
8d08fdba 5602
6b400b21 5603 if (context && CLASS_TYPE_P (context))
14d22dd6 5604 push_nested_class (context);
29370796 5605 pushclass (type);
8d08fdba
MS
5606}
5607
a723baf1 5608/* Undoes a push_nested_class call. */
8d08fdba
MS
5609
5610void
94edc4ab 5611pop_nested_class (void)
8d08fdba 5612{
d2e5ee5c 5613 tree context = DECL_CONTEXT (TYPE_MAIN_DECL (current_class_type));
8d08fdba 5614
b74a0560 5615 popclass ();
6b400b21 5616 if (context && CLASS_TYPE_P (context))
b74a0560 5617 pop_nested_class ();
8d08fdba
MS
5618}
5619
46ccf50a
JM
5620/* Returns the number of extern "LANG" blocks we are nested within. */
5621
5622int
94edc4ab 5623current_lang_depth (void)
46ccf50a 5624{
aff44741 5625 return VEC_length (tree, current_lang_base);
46ccf50a
JM
5626}
5627
8d08fdba
MS
5628/* Set global variables CURRENT_LANG_NAME to appropriate value
5629 so that behavior of name-mangling machinery is correct. */
5630
5631void
94edc4ab 5632push_lang_context (tree name)
8d08fdba 5633{
aff44741 5634 VEC_safe_push (tree, gc, current_lang_base, current_lang_name);
8d08fdba 5635
e229f2cd 5636 if (name == lang_name_cplusplus)
8d08fdba 5637 {
8d08fdba
MS
5638 current_lang_name = name;
5639 }
e229f2cd
PB
5640 else if (name == lang_name_java)
5641 {
e229f2cd
PB
5642 current_lang_name = name;
5643 /* DECL_IGNORED_P is initially set for these types, to avoid clutter.
5644 (See record_builtin_java_type in decl.c.) However, that causes
5645 incorrect debug entries if these types are actually used.
00a17e31 5646 So we re-enable debug output after extern "Java". */
e3cd9945
APB
5647 DECL_IGNORED_P (TYPE_NAME (java_byte_type_node)) = 0;
5648 DECL_IGNORED_P (TYPE_NAME (java_short_type_node)) = 0;
5649 DECL_IGNORED_P (TYPE_NAME (java_int_type_node)) = 0;
5650 DECL_IGNORED_P (TYPE_NAME (java_long_type_node)) = 0;
5651 DECL_IGNORED_P (TYPE_NAME (java_float_type_node)) = 0;
5652 DECL_IGNORED_P (TYPE_NAME (java_double_type_node)) = 0;
5653 DECL_IGNORED_P (TYPE_NAME (java_char_type_node)) = 0;
5654 DECL_IGNORED_P (TYPE_NAME (java_boolean_type_node)) = 0;
e229f2cd 5655 }
8d08fdba
MS
5656 else if (name == lang_name_c)
5657 {
8d08fdba
MS
5658 current_lang_name = name;
5659 }
5660 else
9e637a26 5661 error ("language string %<\"%E\"%> not recognized", name);
8d08fdba 5662}
c8094d83 5663
8d08fdba 5664/* Get out of the current language scope. */
e92cc029 5665
8d08fdba 5666void
94edc4ab 5667pop_lang_context (void)
8d08fdba 5668{
aff44741 5669 current_lang_name = VEC_pop (tree, current_lang_base);
8d08fdba 5670}
8d08fdba
MS
5671\f
5672/* Type instantiation routines. */
5673
104bf76a
MM
5674/* Given an OVERLOAD and a TARGET_TYPE, return the function that
5675 matches the TARGET_TYPE. If there is no satisfactory match, return
13a44ee0 5676 error_mark_node, and issue an error & warning messages under control
92af500d
NS
5677 of FLAGS. Permit pointers to member function if FLAGS permits. If
5678 TEMPLATE_ONLY, the name of the overloaded function was a
5679 template-id, and EXPLICIT_TARGS are the explicitly provided
104bf76a
MM
5680 template arguments. */
5681
2c73f9f5 5682static tree
c8094d83 5683resolve_address_of_overloaded_function (tree target_type,
94edc4ab 5684 tree overload,
92af500d
NS
5685 tsubst_flags_t flags,
5686 bool template_only,
94edc4ab 5687 tree explicit_targs)
2c73f9f5 5688{
104bf76a 5689 /* Here's what the standard says:
c8094d83 5690
104bf76a
MM
5691 [over.over]
5692
5693 If the name is a function template, template argument deduction
5694 is done, and if the argument deduction succeeds, the deduced
5695 arguments are used to generate a single template function, which
5696 is added to the set of overloaded functions considered.
5697
5698 Non-member functions and static member functions match targets of
5699 type "pointer-to-function" or "reference-to-function." Nonstatic
5700 member functions match targets of type "pointer-to-member
5701 function;" the function type of the pointer to member is used to
5702 select the member function from the set of overloaded member
5703 functions. If a nonstatic member function is selected, the
5704 reference to the overloaded function name is required to have the
5705 form of a pointer to member as described in 5.3.1.
5706
5707 If more than one function is selected, any template functions in
5708 the set are eliminated if the set also contains a non-template
5709 function, and any given template function is eliminated if the
5710 set contains a second template function that is more specialized
5711 than the first according to the partial ordering rules 14.5.5.2.
5712 After such eliminations, if any, there shall remain exactly one
5713 selected function. */
5714
5715 int is_ptrmem = 0;
5716 int is_reference = 0;
5717 /* We store the matches in a TREE_LIST rooted here. The functions
5718 are the TREE_PURPOSE, not the TREE_VALUE, in this list, for easy
5719 interoperability with most_specialized_instantiation. */
5720 tree matches = NULL_TREE;
50714e79 5721 tree fn;
104bf76a 5722
d8f8dca1
MM
5723 /* By the time we get here, we should be seeing only real
5724 pointer-to-member types, not the internal POINTER_TYPE to
5725 METHOD_TYPE representation. */
50bc768d
NS
5726 gcc_assert (TREE_CODE (target_type) != POINTER_TYPE
5727 || TREE_CODE (TREE_TYPE (target_type)) != METHOD_TYPE);
104bf76a 5728
50bc768d 5729 gcc_assert (is_overloaded_fn (overload));
c8094d83 5730
104bf76a
MM
5731 /* Check that the TARGET_TYPE is reasonable. */
5732 if (TYPE_PTRFN_P (target_type))
381ddaa6 5733 /* This is OK. */;
104bf76a
MM
5734 else if (TYPE_PTRMEMFUNC_P (target_type))
5735 /* This is OK, too. */
5736 is_ptrmem = 1;
5737 else if (TREE_CODE (target_type) == FUNCTION_TYPE)
5738 {
5739 /* This is OK, too. This comes from a conversion to reference
5740 type. */
5741 target_type = build_reference_type (target_type);
5742 is_reference = 1;
5743 }
c8094d83 5744 else
104bf76a 5745 {
92af500d 5746 if (flags & tf_error)
c4f73174 5747 error ("cannot resolve overloaded function %qD based on"
0cbd7506
MS
5748 " conversion to type %qT",
5749 DECL_NAME (OVL_FUNCTION (overload)), target_type);
104bf76a
MM
5750 return error_mark_node;
5751 }
c8094d83 5752
104bf76a
MM
5753 /* If we can find a non-template function that matches, we can just
5754 use it. There's no point in generating template instantiations
5755 if we're just going to throw them out anyhow. But, of course, we
5756 can only do this when we don't *need* a template function. */
5757 if (!template_only)
5758 {
5759 tree fns;
5760
a723baf1 5761 for (fns = overload; fns; fns = OVL_NEXT (fns))
104bf76a 5762 {
a723baf1 5763 tree fn = OVL_CURRENT (fns);
104bf76a 5764 tree fntype;
2c73f9f5 5765
104bf76a
MM
5766 if (TREE_CODE (fn) == TEMPLATE_DECL)
5767 /* We're not looking for templates just yet. */
5768 continue;
5769
5770 if ((TREE_CODE (TREE_TYPE (fn)) == METHOD_TYPE)
5771 != is_ptrmem)
5772 /* We're looking for a non-static member, and this isn't
5773 one, or vice versa. */
5774 continue;
34ff2673 5775
d63d5d0c
ILT
5776 /* Ignore functions which haven't been explicitly
5777 declared. */
34ff2673
RS
5778 if (DECL_ANTICIPATED (fn))
5779 continue;
5780
104bf76a
MM
5781 /* See if there's a match. */
5782 fntype = TREE_TYPE (fn);
5783 if (is_ptrmem)
5784 fntype = build_ptrmemfunc_type (build_pointer_type (fntype));
5785 else if (!is_reference)
5786 fntype = build_pointer_type (fntype);
5787
30f86ec3 5788 if (can_convert_arg (target_type, fntype, fn, LOOKUP_NORMAL))
e1b3e07d 5789 matches = tree_cons (fn, NULL_TREE, matches);
104bf76a
MM
5790 }
5791 }
5792
5793 /* Now, if we've already got a match (or matches), there's no need
5794 to proceed to the template functions. But, if we don't have a
5795 match we need to look at them, too. */
c8094d83 5796 if (!matches)
2c73f9f5 5797 {
104bf76a
MM
5798 tree target_fn_type;
5799 tree target_arg_types;
8d3631f8 5800 tree target_ret_type;
104bf76a
MM
5801 tree fns;
5802
5803 if (is_ptrmem)
4393e105
MM
5804 target_fn_type
5805 = TREE_TYPE (TYPE_PTRMEMFUNC_FN_TYPE (target_type));
2c73f9f5 5806 else
4393e105
MM
5807 target_fn_type = TREE_TYPE (target_type);
5808 target_arg_types = TYPE_ARG_TYPES (target_fn_type);
8d3631f8 5809 target_ret_type = TREE_TYPE (target_fn_type);
e5214479
JM
5810
5811 /* Never do unification on the 'this' parameter. */
5812 if (TREE_CODE (target_fn_type) == METHOD_TYPE)
5813 target_arg_types = TREE_CHAIN (target_arg_types);
c8094d83 5814
a723baf1 5815 for (fns = overload; fns; fns = OVL_NEXT (fns))
104bf76a 5816 {
a723baf1 5817 tree fn = OVL_CURRENT (fns);
104bf76a
MM
5818 tree instantiation;
5819 tree instantiation_type;
5820 tree targs;
5821
5822 if (TREE_CODE (fn) != TEMPLATE_DECL)
5823 /* We're only looking for templates. */
5824 continue;
5825
5826 if ((TREE_CODE (TREE_TYPE (fn)) == METHOD_TYPE)
5827 != is_ptrmem)
4393e105 5828 /* We're not looking for a non-static member, and this is
104bf76a
MM
5829 one, or vice versa. */
5830 continue;
5831
104bf76a 5832 /* Try to do argument deduction. */
f31c0a32 5833 targs = make_tree_vec (DECL_NTPARMS (fn));
4393e105 5834 if (fn_type_unification (fn, explicit_targs, targs,
8d3631f8 5835 target_arg_types, target_ret_type,
30f86ec3 5836 DEDUCE_EXACT, LOOKUP_NORMAL))
104bf76a
MM
5837 /* Argument deduction failed. */
5838 continue;
5839
5840 /* Instantiate the template. */
92af500d 5841 instantiation = instantiate_template (fn, targs, flags);
104bf76a
MM
5842 if (instantiation == error_mark_node)
5843 /* Instantiation failed. */
5844 continue;
5845
5846 /* See if there's a match. */
5847 instantiation_type = TREE_TYPE (instantiation);
5848 if (is_ptrmem)
c8094d83 5849 instantiation_type =
104bf76a
MM
5850 build_ptrmemfunc_type (build_pointer_type (instantiation_type));
5851 else if (!is_reference)
5852 instantiation_type = build_pointer_type (instantiation_type);
3db45ab5 5853 if (can_convert_arg (target_type, instantiation_type, instantiation,
30f86ec3 5854 LOOKUP_NORMAL))
e1b3e07d 5855 matches = tree_cons (instantiation, fn, matches);
104bf76a
MM
5856 }
5857
5858 /* Now, remove all but the most specialized of the matches. */
5859 if (matches)
5860 {
e5214479 5861 tree match = most_specialized_instantiation (matches);
104bf76a
MM
5862
5863 if (match != error_mark_node)
3db45ab5
MS
5864 matches = tree_cons (TREE_PURPOSE (match),
5865 NULL_TREE,
7ca383e6 5866 NULL_TREE);
104bf76a
MM
5867 }
5868 }
5869
5870 /* Now we should have exactly one function in MATCHES. */
5871 if (matches == NULL_TREE)
5872 {
5873 /* There were *no* matches. */
92af500d 5874 if (flags & tf_error)
104bf76a 5875 {
0cbd7506
MS
5876 error ("no matches converting function %qD to type %q#T",
5877 DECL_NAME (OVL_FUNCTION (overload)),
5878 target_type);
6b9b6b15
JM
5879
5880 /* print_candidates expects a chain with the functions in
0cbd7506
MS
5881 TREE_VALUE slots, so we cons one up here (we're losing anyway,
5882 so why be clever?). */
5883 for (; overload; overload = OVL_NEXT (overload))
5884 matches = tree_cons (NULL_TREE, OVL_CURRENT (overload),
e1b3e07d 5885 matches);
c8094d83 5886
6b9b6b15 5887 print_candidates (matches);
104bf76a
MM
5888 }
5889 return error_mark_node;
2c73f9f5 5890 }
104bf76a
MM
5891 else if (TREE_CHAIN (matches))
5892 {
5893 /* There were too many matches. */
5894
92af500d 5895 if (flags & tf_error)
104bf76a
MM
5896 {
5897 tree match;
5898
0cbd7506 5899 error ("converting overloaded function %qD to type %q#T is ambiguous",
104bf76a
MM
5900 DECL_NAME (OVL_FUNCTION (overload)),
5901 target_type);
5902
5903 /* Since print_candidates expects the functions in the
5904 TREE_VALUE slot, we flip them here. */
5905 for (match = matches; match; match = TREE_CHAIN (match))
5906 TREE_VALUE (match) = TREE_PURPOSE (match);
5907
5908 print_candidates (matches);
5909 }
c8094d83 5910
104bf76a
MM
5911 return error_mark_node;
5912 }
5913
50714e79
MM
5914 /* Good, exactly one match. Now, convert it to the correct type. */
5915 fn = TREE_PURPOSE (matches);
5916
b1ce3eb2 5917 if (DECL_NONSTATIC_MEMBER_FUNCTION_P (fn)
92af500d 5918 && !(flags & tf_ptrmem_ok) && !flag_ms_extensions)
19420d00 5919 {
b1ce3eb2 5920 static int explained;
c8094d83 5921
92af500d 5922 if (!(flags & tf_error))
0cbd7506 5923 return error_mark_node;
19420d00 5924
1f070f2b 5925 pedwarn ("assuming pointer to member %qD", fn);
b1ce3eb2 5926 if (!explained)
0cbd7506
MS
5927 {
5928 pedwarn ("(a pointer to member can only be formed with %<&%E%>)", fn);
5929 explained = 1;
5930 }
19420d00 5931 }
84583208
MM
5932
5933 /* If we're doing overload resolution purely for the purpose of
5934 determining conversion sequences, we should not consider the
5935 function used. If this conversion sequence is selected, the
5936 function will be marked as used at this point. */
5937 if (!(flags & tf_conv))
5938 mark_used (fn);
a6ecf8b6 5939
50714e79
MM
5940 if (TYPE_PTRFN_P (target_type) || TYPE_PTRMEMFUNC_P (target_type))
5941 return build_unary_op (ADDR_EXPR, fn, 0);
5942 else
5943 {
5944 /* The target must be a REFERENCE_TYPE. Above, build_unary_op
5945 will mark the function as addressed, but here we must do it
5946 explicitly. */
dffd7eb6 5947 cxx_mark_addressable (fn);
50714e79
MM
5948
5949 return fn;
5950 }
2c73f9f5
ML
5951}
5952
ec255269
MS
5953/* This function will instantiate the type of the expression given in
5954 RHS to match the type of LHSTYPE. If errors exist, then return
92af500d 5955 error_mark_node. FLAGS is a bit mask. If TF_ERROR is set, then
5e76004e
NS
5956 we complain on errors. If we are not complaining, never modify rhs,
5957 as overload resolution wants to try many possible instantiations, in
5958 the hope that at least one will work.
c8094d83 5959
e6e174e5
JM
5960 For non-recursive calls, LHSTYPE should be a function, pointer to
5961 function, or a pointer to member function. */
e92cc029 5962
8d08fdba 5963tree
94edc4ab 5964instantiate_type (tree lhstype, tree rhs, tsubst_flags_t flags)
8d08fdba 5965{
92af500d 5966 tsubst_flags_t flags_in = flags;
c8094d83 5967
c2ea3a40 5968 flags &= ~tf_ptrmem_ok;
c8094d83 5969
8d08fdba
MS
5970 if (TREE_CODE (lhstype) == UNKNOWN_TYPE)
5971 {
92af500d 5972 if (flags & tf_error)
8251199e 5973 error ("not enough type information");
8d08fdba
MS
5974 return error_mark_node;
5975 }
5976
5977 if (TREE_TYPE (rhs) != NULL_TREE && ! (type_unknown_p (rhs)))
abff8e06 5978 {
8f4b394d 5979 if (same_type_p (lhstype, TREE_TYPE (rhs)))
abff8e06 5980 return rhs;
c8094d83 5981 if (flag_ms_extensions
a723baf1
MM
5982 && TYPE_PTRMEMFUNC_P (lhstype)
5983 && !TYPE_PTRMEMFUNC_P (TREE_TYPE (rhs)))
5984 /* Microsoft allows `A::f' to be resolved to a
5985 pointer-to-member. */
5986 ;
5987 else
5988 {
92af500d 5989 if (flags & tf_error)
1f070f2b 5990 error ("argument of type %qT does not match %qT",
a723baf1
MM
5991 TREE_TYPE (rhs), lhstype);
5992 return error_mark_node;
5993 }
abff8e06 5994 }
8d08fdba 5995
50ad9642
MM
5996 if (TREE_CODE (rhs) == BASELINK)
5997 rhs = BASELINK_FUNCTIONS (rhs);
5998
5ae9ba3e
MM
5999 /* If we are in a template, and have a NON_DEPENDENT_EXPR, we cannot
6000 deduce any type information. */
6001 if (TREE_CODE (rhs) == NON_DEPENDENT_EXPR)
6002 {
6003 if (flags & tf_error)
6004 error ("not enough type information");
6005 return error_mark_node;
6006 }
6007
2c73f9f5
ML
6008 /* We don't overwrite rhs if it is an overloaded function.
6009 Copying it would destroy the tree link. */
6010 if (TREE_CODE (rhs) != OVERLOAD)
6011 rhs = copy_node (rhs);
c73964b2 6012
8d08fdba
MS
6013 /* This should really only be used when attempting to distinguish
6014 what sort of a pointer to function we have. For now, any
6015 arithmetic operation which is not supported on pointers
6016 is rejected as an error. */
6017
6018 switch (TREE_CODE (rhs))
6019 {
6020 case TYPE_EXPR:
6021 case CONVERT_EXPR:
6022 case SAVE_EXPR:
6023 case CONSTRUCTOR:
8dc2b103 6024 gcc_unreachable ();
8d08fdba
MS
6025
6026 case INDIRECT_REF:
6027 case ARRAY_REF:
ec255269
MS
6028 {
6029 tree new_rhs;
8d08fdba 6030
ec255269 6031 new_rhs = instantiate_type (build_pointer_type (lhstype),
940ff223 6032 TREE_OPERAND (rhs, 0), flags);
ec255269
MS
6033 if (new_rhs == error_mark_node)
6034 return error_mark_node;
6035
6036 TREE_TYPE (rhs) = lhstype;
6037 TREE_OPERAND (rhs, 0) = new_rhs;
6038 return rhs;
6039 }
8d08fdba
MS
6040
6041 case NOP_EXPR:
6042 rhs = copy_node (TREE_OPERAND (rhs, 0));
6043 TREE_TYPE (rhs) = unknown_type_node;
940ff223 6044 return instantiate_type (lhstype, rhs, flags);
8d08fdba
MS
6045
6046 case COMPONENT_REF:
92af500d 6047 {
5ae9ba3e 6048 tree member = TREE_OPERAND (rhs, 1);
92af500d 6049
5ae9ba3e
MM
6050 member = instantiate_type (lhstype, member, flags);
6051 if (member != error_mark_node
92af500d 6052 && TREE_SIDE_EFFECTS (TREE_OPERAND (rhs, 0)))
04c06002 6053 /* Do not lose object's side effects. */
5ae9ba3e
MM
6054 return build2 (COMPOUND_EXPR, TREE_TYPE (member),
6055 TREE_OPERAND (rhs, 0), member);
6056 return member;
92af500d 6057 }
8d08fdba 6058
2a238a97 6059 case OFFSET_REF:
05e0b2f4
JM
6060 rhs = TREE_OPERAND (rhs, 1);
6061 if (BASELINK_P (rhs))
92af500d 6062 return instantiate_type (lhstype, BASELINK_FUNCTIONS (rhs), flags_in);
05e0b2f4 6063
2a238a97
MM
6064 /* This can happen if we are forming a pointer-to-member for a
6065 member template. */
50bc768d 6066 gcc_assert (TREE_CODE (rhs) == TEMPLATE_ID_EXPR);
05e0b2f4 6067
2a238a97 6068 /* Fall through. */
874503bc 6069
386b8a85 6070 case TEMPLATE_ID_EXPR:
2bdb0643
JM
6071 {
6072 tree fns = TREE_OPERAND (rhs, 0);
6073 tree args = TREE_OPERAND (rhs, 1);
6074
19420d00 6075 return
92af500d
NS
6076 resolve_address_of_overloaded_function (lhstype, fns, flags_in,
6077 /*template_only=*/true,
2bdb0643 6078 args);
2bdb0643 6079 }
386b8a85 6080
2c73f9f5 6081 case OVERLOAD:
a723baf1 6082 case FUNCTION_DECL:
c8094d83 6083 return
92af500d
NS
6084 resolve_address_of_overloaded_function (lhstype, rhs, flags_in,
6085 /*template_only=*/false,
104bf76a 6086 /*explicit_targs=*/NULL_TREE);
2c73f9f5 6087
8d08fdba
MS
6088 case CALL_EXPR:
6089 /* This is too hard for now. */
8dc2b103 6090 gcc_unreachable ();
8d08fdba
MS
6091
6092 case PLUS_EXPR:
6093 case MINUS_EXPR:
6094 case COMPOUND_EXPR:
a0a33927 6095 TREE_OPERAND (rhs, 0)
940ff223 6096 = instantiate_type (lhstype, TREE_OPERAND (rhs, 0), flags);
8d08fdba
MS
6097 if (TREE_OPERAND (rhs, 0) == error_mark_node)
6098 return error_mark_node;
a0a33927 6099 TREE_OPERAND (rhs, 1)
940ff223 6100 = instantiate_type (lhstype, TREE_OPERAND (rhs, 1), flags);
8d08fdba
MS
6101 if (TREE_OPERAND (rhs, 1) == error_mark_node)
6102 return error_mark_node;
6103
6104 TREE_TYPE (rhs) = lhstype;
6105 return rhs;
6106
6107 case MULT_EXPR:
6108 case TRUNC_DIV_EXPR:
6109 case FLOOR_DIV_EXPR:
6110 case CEIL_DIV_EXPR:
6111 case ROUND_DIV_EXPR:
6112 case RDIV_EXPR:
6113 case TRUNC_MOD_EXPR:
6114 case FLOOR_MOD_EXPR:
6115 case CEIL_MOD_EXPR:
6116 case ROUND_MOD_EXPR:
6117 case FIX_ROUND_EXPR:
6118 case FIX_FLOOR_EXPR:
6119 case FIX_CEIL_EXPR:
6120 case FIX_TRUNC_EXPR:
6121 case FLOAT_EXPR:
6122 case NEGATE_EXPR:
6123 case ABS_EXPR:
6124 case MAX_EXPR:
6125 case MIN_EXPR:
8d08fdba
MS
6126
6127 case BIT_AND_EXPR:
6128 case BIT_IOR_EXPR:
6129 case BIT_XOR_EXPR:
6130 case LSHIFT_EXPR:
6131 case RSHIFT_EXPR:
6132 case LROTATE_EXPR:
6133 case RROTATE_EXPR:
6134
6135 case PREINCREMENT_EXPR:
6136 case PREDECREMENT_EXPR:
6137 case POSTINCREMENT_EXPR:
6138 case POSTDECREMENT_EXPR:
92af500d 6139 if (flags & tf_error)
8251199e 6140 error ("invalid operation on uninstantiated type");
8d08fdba
MS
6141 return error_mark_node;
6142
6143 case TRUTH_AND_EXPR:
6144 case TRUTH_OR_EXPR:
6145 case TRUTH_XOR_EXPR:
6146 case LT_EXPR:
6147 case LE_EXPR:
6148 case GT_EXPR:
6149 case GE_EXPR:
6150 case EQ_EXPR:
6151 case NE_EXPR:
6152 case TRUTH_ANDIF_EXPR:
6153 case TRUTH_ORIF_EXPR:
6154 case TRUTH_NOT_EXPR:
92af500d 6155 if (flags & tf_error)
8251199e 6156 error ("not enough type information");
8d08fdba
MS
6157 return error_mark_node;
6158
ca36f057
MM
6159 case COND_EXPR:
6160 if (type_unknown_p (TREE_OPERAND (rhs, 0)))
6161 {
92af500d 6162 if (flags & tf_error)
ca36f057
MM
6163 error ("not enough type information");
6164 return error_mark_node;
6165 }
6166 TREE_OPERAND (rhs, 1)
6167 = instantiate_type (lhstype, TREE_OPERAND (rhs, 1), flags);
6168 if (TREE_OPERAND (rhs, 1) == error_mark_node)
6169 return error_mark_node;
6170 TREE_OPERAND (rhs, 2)
6171 = instantiate_type (lhstype, TREE_OPERAND (rhs, 2), flags);
6172 if (TREE_OPERAND (rhs, 2) == error_mark_node)
6173 return error_mark_node;
6174
6175 TREE_TYPE (rhs) = lhstype;
6176 return rhs;
6177
6178 case MODIFY_EXPR:
6179 TREE_OPERAND (rhs, 1)
6180 = instantiate_type (lhstype, TREE_OPERAND (rhs, 1), flags);
6181 if (TREE_OPERAND (rhs, 1) == error_mark_node)
6182 return error_mark_node;
6183
6184 TREE_TYPE (rhs) = lhstype;
6185 return rhs;
c8094d83 6186
ca36f057 6187 case ADDR_EXPR:
19420d00
NS
6188 {
6189 if (PTRMEM_OK_P (rhs))
0cbd7506 6190 flags |= tf_ptrmem_ok;
c8094d83 6191
ca36f057 6192 return instantiate_type (lhstype, TREE_OPERAND (rhs, 0), flags);
19420d00 6193 }
ca36f057
MM
6194
6195 case ERROR_MARK:
6196 return error_mark_node;
6197
6198 default:
8dc2b103 6199 gcc_unreachable ();
ca36f057 6200 }
8dc2b103 6201 return error_mark_node;
ca36f057
MM
6202}
6203\f
6204/* Return the name of the virtual function pointer field
6205 (as an IDENTIFIER_NODE) for the given TYPE. Note that
6206 this may have to look back through base types to find the
6207 ultimate field name. (For single inheritance, these could
6208 all be the same name. Who knows for multiple inheritance). */
6209
6210static tree
94edc4ab 6211get_vfield_name (tree type)
ca36f057 6212{
37a247a0 6213 tree binfo, base_binfo;
ca36f057
MM
6214 char *buf;
6215
37a247a0 6216 for (binfo = TYPE_BINFO (type);
fa743e8c 6217 BINFO_N_BASE_BINFOS (binfo);
37a247a0
NS
6218 binfo = base_binfo)
6219 {
6220 base_binfo = BINFO_BASE_BINFO (binfo, 0);
ca36f057 6221
37a247a0
NS
6222 if (BINFO_VIRTUAL_P (base_binfo)
6223 || !TYPE_CONTAINS_VPTR_P (BINFO_TYPE (base_binfo)))
6224 break;
6225 }
c8094d83 6226
ca36f057 6227 type = BINFO_TYPE (binfo);
67f5655f 6228 buf = (char *) alloca (sizeof (VFIELD_NAME_FORMAT)
3db45ab5 6229 + TYPE_NAME_LENGTH (type) + 2);
ea122333
JM
6230 sprintf (buf, VFIELD_NAME_FORMAT,
6231 IDENTIFIER_POINTER (constructor_name (type)));
ca36f057
MM
6232 return get_identifier (buf);
6233}
6234
6235void
94edc4ab 6236print_class_statistics (void)
ca36f057
MM
6237{
6238#ifdef GATHER_STATISTICS
6239 fprintf (stderr, "convert_harshness = %d\n", n_convert_harshness);
6240 fprintf (stderr, "compute_conversion_costs = %d\n", n_compute_conversion_costs);
ca36f057
MM
6241 if (n_vtables)
6242 {
6243 fprintf (stderr, "vtables = %d; vtable searches = %d\n",
6244 n_vtables, n_vtable_searches);
6245 fprintf (stderr, "vtable entries = %d; vtable elems = %d\n",
6246 n_vtable_entries, n_vtable_elems);
6247 }
6248#endif
6249}
6250
6251/* Build a dummy reference to ourselves so Derived::Base (and A::A) works,
6252 according to [class]:
0cbd7506 6253 The class-name is also inserted
ca36f057
MM
6254 into the scope of the class itself. For purposes of access checking,
6255 the inserted class name is treated as if it were a public member name. */
6256
6257void
94edc4ab 6258build_self_reference (void)
ca36f057
MM
6259{
6260 tree name = constructor_name (current_class_type);
6261 tree value = build_lang_decl (TYPE_DECL, name, current_class_type);
6262 tree saved_cas;
6263
6264 DECL_NONLOCAL (value) = 1;
6265 DECL_CONTEXT (value) = current_class_type;
6266 DECL_ARTIFICIAL (value) = 1;
a3d87771 6267 SET_DECL_SELF_REFERENCE_P (value);
ca36f057
MM
6268
6269 if (processing_template_decl)
6270 value = push_template_decl (value);
6271
6272 saved_cas = current_access_specifier;
6273 current_access_specifier = access_public_node;
6274 finish_member_declaration (value);
6275 current_access_specifier = saved_cas;
6276}
6277
6278/* Returns 1 if TYPE contains only padding bytes. */
6279
6280int
94edc4ab 6281is_empty_class (tree type)
ca36f057 6282{
ca36f057
MM
6283 if (type == error_mark_node)
6284 return 0;
6285
6286 if (! IS_AGGR_TYPE (type))
6287 return 0;
6288
58731fd1
MM
6289 /* In G++ 3.2, whether or not a class was empty was determined by
6290 looking at its size. */
6291 if (abi_version_at_least (2))
6292 return CLASSTYPE_EMPTY_P (type);
6293 else
6294 return integer_zerop (CLASSTYPE_SIZE (type));
ca36f057
MM
6295}
6296
956d9305
MM
6297/* Returns true if TYPE contains an empty class. */
6298
6299static bool
6300contains_empty_class_p (tree type)
6301{
6302 if (is_empty_class (type))
6303 return true;
6304 if (CLASS_TYPE_P (type))
6305 {
6306 tree field;
fa743e8c
NS
6307 tree binfo;
6308 tree base_binfo;
956d9305
MM
6309 int i;
6310
fa743e8c
NS
6311 for (binfo = TYPE_BINFO (type), i = 0;
6312 BINFO_BASE_ITERATE (binfo, i, base_binfo); ++i)
6313 if (contains_empty_class_p (BINFO_TYPE (base_binfo)))
956d9305
MM
6314 return true;
6315 for (field = TYPE_FIELDS (type); field; field = TREE_CHAIN (field))
17bbb839
MM
6316 if (TREE_CODE (field) == FIELD_DECL
6317 && !DECL_ARTIFICIAL (field)
6318 && is_empty_class (TREE_TYPE (field)))
956d9305
MM
6319 return true;
6320 }
6321 else if (TREE_CODE (type) == ARRAY_TYPE)
6322 return contains_empty_class_p (TREE_TYPE (type));
6323 return false;
6324}
6325
ca36f057
MM
6326/* Note that NAME was looked up while the current class was being
6327 defined and that the result of that lookup was DECL. */
6328
6329void
94edc4ab 6330maybe_note_name_used_in_class (tree name, tree decl)
ca36f057
MM
6331{
6332 splay_tree names_used;
6333
6334 /* If we're not defining a class, there's nothing to do. */
39fb05d0
MM
6335 if (!(innermost_scope_kind() == sk_class
6336 && TYPE_BEING_DEFINED (current_class_type)))
ca36f057 6337 return;
c8094d83 6338
ca36f057
MM
6339 /* If there's already a binding for this NAME, then we don't have
6340 anything to worry about. */
c8094d83 6341 if (lookup_member (current_class_type, name,
39fb05d0 6342 /*protect=*/0, /*want_type=*/false))
ca36f057
MM
6343 return;
6344
6345 if (!current_class_stack[current_class_depth - 1].names_used)
6346 current_class_stack[current_class_depth - 1].names_used
6347 = splay_tree_new (splay_tree_compare_pointers, 0, 0);
6348 names_used = current_class_stack[current_class_depth - 1].names_used;
6349
6350 splay_tree_insert (names_used,
c8094d83 6351 (splay_tree_key) name,
ca36f057
MM
6352 (splay_tree_value) decl);
6353}
6354
6355/* Note that NAME was declared (as DECL) in the current class. Check
0e339752 6356 to see that the declaration is valid. */
ca36f057
MM
6357
6358void
94edc4ab 6359note_name_declared_in_class (tree name, tree decl)
ca36f057
MM
6360{
6361 splay_tree names_used;
6362 splay_tree_node n;
6363
6364 /* Look to see if we ever used this name. */
c8094d83 6365 names_used
ca36f057
MM
6366 = current_class_stack[current_class_depth - 1].names_used;
6367 if (!names_used)
6368 return;
6369
6370 n = splay_tree_lookup (names_used, (splay_tree_key) name);
6371 if (n)
6372 {
6373 /* [basic.scope.class]
c8094d83 6374
ca36f057
MM
6375 A name N used in a class S shall refer to the same declaration
6376 in its context and when re-evaluated in the completed scope of
6377 S. */
1f070f2b 6378 error ("declaration of %q#D", decl);
dee15844
JM
6379 error ("changes meaning of %qD from %q+#D",
6380 DECL_NAME (OVL_CURRENT (decl)), (tree) n->value);
ca36f057
MM
6381 }
6382}
6383
3461fba7
NS
6384/* Returns the VAR_DECL for the complete vtable associated with BINFO.
6385 Secondary vtables are merged with primary vtables; this function
6386 will return the VAR_DECL for the primary vtable. */
ca36f057 6387
c35cce41 6388tree
94edc4ab 6389get_vtbl_decl_for_binfo (tree binfo)
c35cce41
MM
6390{
6391 tree decl;
6392
6393 decl = BINFO_VTABLE (binfo);
6394 if (decl && TREE_CODE (decl) == PLUS_EXPR)
6395 {
50bc768d 6396 gcc_assert (TREE_CODE (TREE_OPERAND (decl, 0)) == ADDR_EXPR);
c35cce41
MM
6397 decl = TREE_OPERAND (TREE_OPERAND (decl, 0), 0);
6398 }
6399 if (decl)
50bc768d 6400 gcc_assert (TREE_CODE (decl) == VAR_DECL);
c35cce41
MM
6401 return decl;
6402}
6403
911a71a7 6404
dbbf88d1
NS
6405/* Returns the binfo for the primary base of BINFO. If the resulting
6406 BINFO is a virtual base, and it is inherited elsewhere in the
6407 hierarchy, then the returned binfo might not be the primary base of
6408 BINFO in the complete object. Check BINFO_PRIMARY_P or
6409 BINFO_LOST_PRIMARY_P to be sure. */
911a71a7 6410
b5791fdc 6411static tree
94edc4ab 6412get_primary_binfo (tree binfo)
911a71a7
MM
6413{
6414 tree primary_base;
c8094d83 6415
911a71a7
MM
6416 primary_base = CLASSTYPE_PRIMARY_BINFO (BINFO_TYPE (binfo));
6417 if (!primary_base)
6418 return NULL_TREE;
6419
b5791fdc 6420 return copied_binfo (primary_base, binfo);
911a71a7
MM
6421}
6422
838dfd8a 6423/* If INDENTED_P is zero, indent to INDENT. Return nonzero. */
b7442fb5
NS
6424
6425static int
94edc4ab 6426maybe_indent_hierarchy (FILE * stream, int indent, int indented_p)
b7442fb5
NS
6427{
6428 if (!indented_p)
6429 fprintf (stream, "%*s", indent, "");
6430 return 1;
6431}
6432
dbbf88d1
NS
6433/* Dump the offsets of all the bases rooted at BINFO to STREAM.
6434 INDENT should be zero when called from the top level; it is
6435 incremented recursively. IGO indicates the next expected BINFO in
9bcb9aae 6436 inheritance graph ordering. */
c35cce41 6437
dbbf88d1
NS
6438static tree
6439dump_class_hierarchy_r (FILE *stream,
0cbd7506
MS
6440 int flags,
6441 tree binfo,
6442 tree igo,
6443 int indent)
ca36f057 6444{
b7442fb5 6445 int indented = 0;
fa743e8c
NS
6446 tree base_binfo;
6447 int i;
c8094d83 6448
b7442fb5
NS
6449 indented = maybe_indent_hierarchy (stream, indent, 0);
6450 fprintf (stream, "%s (0x%lx) ",
fc6633e0 6451 type_as_string (BINFO_TYPE (binfo), TFF_PLAIN_IDENTIFIER),
b7442fb5 6452 (unsigned long) binfo);
dbbf88d1
NS
6453 if (binfo != igo)
6454 {
6455 fprintf (stream, "alternative-path\n");
6456 return igo;
6457 }
6458 igo = TREE_CHAIN (binfo);
c8094d83 6459
9965d119 6460 fprintf (stream, HOST_WIDE_INT_PRINT_DEC,
ca36f057 6461 tree_low_cst (BINFO_OFFSET (binfo), 0));
9965d119
NS
6462 if (is_empty_class (BINFO_TYPE (binfo)))
6463 fprintf (stream, " empty");
6464 else if (CLASSTYPE_NEARLY_EMPTY_P (BINFO_TYPE (binfo)))
6465 fprintf (stream, " nearly-empty");
809e3e7f 6466 if (BINFO_VIRTUAL_P (binfo))
dbbf88d1 6467 fprintf (stream, " virtual");
9965d119 6468 fprintf (stream, "\n");
ca36f057 6469
b7442fb5 6470 indented = 0;
fc6633e0 6471 if (BINFO_PRIMARY_P (binfo))
b7442fb5
NS
6472 {
6473 indented = maybe_indent_hierarchy (stream, indent + 3, indented);
6474 fprintf (stream, " primary-for %s (0x%lx)",
fc6633e0 6475 type_as_string (BINFO_TYPE (BINFO_INHERITANCE_CHAIN (binfo)),
b7442fb5 6476 TFF_PLAIN_IDENTIFIER),
fc6633e0 6477 (unsigned long)BINFO_INHERITANCE_CHAIN (binfo));
b7442fb5
NS
6478 }
6479 if (BINFO_LOST_PRIMARY_P (binfo))
6480 {
6481 indented = maybe_indent_hierarchy (stream, indent + 3, indented);
6482 fprintf (stream, " lost-primary");
6483 }
6484 if (indented)
6485 fprintf (stream, "\n");
6486
6487 if (!(flags & TDF_SLIM))
6488 {
6489 int indented = 0;
c8094d83 6490
b7442fb5
NS
6491 if (BINFO_SUBVTT_INDEX (binfo))
6492 {
6493 indented = maybe_indent_hierarchy (stream, indent + 3, indented);
6494 fprintf (stream, " subvttidx=%s",
6495 expr_as_string (BINFO_SUBVTT_INDEX (binfo),
6496 TFF_PLAIN_IDENTIFIER));
6497 }
6498 if (BINFO_VPTR_INDEX (binfo))
6499 {
6500 indented = maybe_indent_hierarchy (stream, indent + 3, indented);
6501 fprintf (stream, " vptridx=%s",
6502 expr_as_string (BINFO_VPTR_INDEX (binfo),
6503 TFF_PLAIN_IDENTIFIER));
6504 }
6505 if (BINFO_VPTR_FIELD (binfo))
6506 {
6507 indented = maybe_indent_hierarchy (stream, indent + 3, indented);
6508 fprintf (stream, " vbaseoffset=%s",
6509 expr_as_string (BINFO_VPTR_FIELD (binfo),
6510 TFF_PLAIN_IDENTIFIER));
6511 }
6512 if (BINFO_VTABLE (binfo))
6513 {
6514 indented = maybe_indent_hierarchy (stream, indent + 3, indented);
6515 fprintf (stream, " vptr=%s",
6516 expr_as_string (BINFO_VTABLE (binfo),
6517 TFF_PLAIN_IDENTIFIER));
6518 }
c8094d83 6519
b7442fb5
NS
6520 if (indented)
6521 fprintf (stream, "\n");
6522 }
dbbf88d1 6523
fa743e8c
NS
6524 for (i = 0; BINFO_BASE_ITERATE (binfo, i, base_binfo); i++)
6525 igo = dump_class_hierarchy_r (stream, flags, base_binfo, igo, indent + 2);
c8094d83 6526
dbbf88d1 6527 return igo;
c35cce41
MM
6528}
6529
6530/* Dump the BINFO hierarchy for T. */
6531
b7442fb5 6532static void
bb885938 6533dump_class_hierarchy_1 (FILE *stream, int flags, tree t)
c35cce41 6534{
b7442fb5
NS
6535 fprintf (stream, "Class %s\n", type_as_string (t, TFF_PLAIN_IDENTIFIER));
6536 fprintf (stream, " size=%lu align=%lu\n",
6537 (unsigned long)(tree_low_cst (TYPE_SIZE (t), 0) / BITS_PER_UNIT),
6538 (unsigned long)(TYPE_ALIGN (t) / BITS_PER_UNIT));
dbbf88d1
NS
6539 fprintf (stream, " base size=%lu base align=%lu\n",
6540 (unsigned long)(tree_low_cst (TYPE_SIZE (CLASSTYPE_AS_BASE (t)), 0)
6541 / BITS_PER_UNIT),
6542 (unsigned long)(TYPE_ALIGN (CLASSTYPE_AS_BASE (t))
6543 / BITS_PER_UNIT));
6544 dump_class_hierarchy_r (stream, flags, TYPE_BINFO (t), TYPE_BINFO (t), 0);
b7442fb5 6545 fprintf (stream, "\n");
bb885938
NS
6546}
6547
da1d7781 6548/* Debug interface to hierarchy dumping. */
bb885938 6549
ac1f3b7e 6550void
bb885938
NS
6551debug_class (tree t)
6552{
6553 dump_class_hierarchy_1 (stderr, TDF_SLIM, t);
6554}
6555
6556static void
6557dump_class_hierarchy (tree t)
6558{
6559 int flags;
6560 FILE *stream = dump_begin (TDI_class, &flags);
6561
6562 if (stream)
6563 {
6564 dump_class_hierarchy_1 (stream, flags, t);
6565 dump_end (TDI_class, stream);
6566 }
b7442fb5
NS
6567}
6568
6569static void
94edc4ab 6570dump_array (FILE * stream, tree decl)
b7442fb5 6571{
4038c495
GB
6572 tree value;
6573 unsigned HOST_WIDE_INT ix;
b7442fb5
NS
6574 HOST_WIDE_INT elt;
6575 tree size = TYPE_MAX_VALUE (TYPE_DOMAIN (TREE_TYPE (decl)));
6576
6577 elt = (tree_low_cst (TYPE_SIZE (TREE_TYPE (TREE_TYPE (decl))), 0)
6578 / BITS_PER_UNIT);
6579 fprintf (stream, "%s:", decl_as_string (decl, TFF_PLAIN_IDENTIFIER));
6580 fprintf (stream, " %s entries",
6581 expr_as_string (size_binop (PLUS_EXPR, size, size_one_node),
6582 TFF_PLAIN_IDENTIFIER));
6583 fprintf (stream, "\n");
6584
4038c495
GB
6585 FOR_EACH_CONSTRUCTOR_VALUE (CONSTRUCTOR_ELTS (DECL_INITIAL (decl)),
6586 ix, value)
4fdc14ca 6587 fprintf (stream, "%-4ld %s\n", (long)(ix * elt),
4038c495 6588 expr_as_string (value, TFF_PLAIN_IDENTIFIER));
b7442fb5
NS
6589}
6590
6591static void
94edc4ab 6592dump_vtable (tree t, tree binfo, tree vtable)
b7442fb5
NS
6593{
6594 int flags;
6595 FILE *stream = dump_begin (TDI_class, &flags);
6596
6597 if (!stream)
6598 return;
6599
6600 if (!(flags & TDF_SLIM))
9965d119 6601 {
b7442fb5 6602 int ctor_vtbl_p = TYPE_BINFO (t) != binfo;
c8094d83 6603
b7442fb5
NS
6604 fprintf (stream, "%s for %s",
6605 ctor_vtbl_p ? "Construction vtable" : "Vtable",
fc6633e0 6606 type_as_string (BINFO_TYPE (binfo), TFF_PLAIN_IDENTIFIER));
b7442fb5
NS
6607 if (ctor_vtbl_p)
6608 {
809e3e7f 6609 if (!BINFO_VIRTUAL_P (binfo))
b7442fb5
NS
6610 fprintf (stream, " (0x%lx instance)", (unsigned long)binfo);
6611 fprintf (stream, " in %s", type_as_string (t, TFF_PLAIN_IDENTIFIER));
6612 }
6613 fprintf (stream, "\n");
6614 dump_array (stream, vtable);
6615 fprintf (stream, "\n");
9965d119 6616 }
c8094d83 6617
b7442fb5
NS
6618 dump_end (TDI_class, stream);
6619}
6620
6621static void
94edc4ab 6622dump_vtt (tree t, tree vtt)
b7442fb5
NS
6623{
6624 int flags;
6625 FILE *stream = dump_begin (TDI_class, &flags);
6626
6627 if (!stream)
6628 return;
6629
6630 if (!(flags & TDF_SLIM))
6631 {
6632 fprintf (stream, "VTT for %s\n",
6633 type_as_string (t, TFF_PLAIN_IDENTIFIER));
6634 dump_array (stream, vtt);
6635 fprintf (stream, "\n");
6636 }
c8094d83 6637
b7442fb5 6638 dump_end (TDI_class, stream);
ca36f057
MM
6639}
6640
bb885938
NS
6641/* Dump a function or thunk and its thunkees. */
6642
6643static void
6644dump_thunk (FILE *stream, int indent, tree thunk)
6645{
6646 static const char spaces[] = " ";
6647 tree name = DECL_NAME (thunk);
6648 tree thunks;
c8094d83 6649
bb885938
NS
6650 fprintf (stream, "%.*s%p %s %s", indent, spaces,
6651 (void *)thunk,
6652 !DECL_THUNK_P (thunk) ? "function"
6653 : DECL_THIS_THUNK_P (thunk) ? "this-thunk" : "covariant-thunk",
6654 name ? IDENTIFIER_POINTER (name) : "<unset>");
e00853fd 6655 if (DECL_THUNK_P (thunk))
bb885938
NS
6656 {
6657 HOST_WIDE_INT fixed_adjust = THUNK_FIXED_OFFSET (thunk);
6658 tree virtual_adjust = THUNK_VIRTUAL_OFFSET (thunk);
6659
6660 fprintf (stream, " fixed=" HOST_WIDE_INT_PRINT_DEC, fixed_adjust);
6661 if (!virtual_adjust)
6662 /*NOP*/;
6663 else if (DECL_THIS_THUNK_P (thunk))
6664 fprintf (stream, " vcall=" HOST_WIDE_INT_PRINT_DEC,
6665 tree_low_cst (virtual_adjust, 0));
6666 else
6667 fprintf (stream, " vbase=" HOST_WIDE_INT_PRINT_DEC "(%s)",
6668 tree_low_cst (BINFO_VPTR_FIELD (virtual_adjust), 0),
6669 type_as_string (BINFO_TYPE (virtual_adjust), TFF_SCOPE));
e00853fd
NS
6670 if (THUNK_ALIAS (thunk))
6671 fprintf (stream, " alias to %p", (void *)THUNK_ALIAS (thunk));
bb885938
NS
6672 }
6673 fprintf (stream, "\n");
6674 for (thunks = DECL_THUNKS (thunk); thunks; thunks = TREE_CHAIN (thunks))
6675 dump_thunk (stream, indent + 2, thunks);
6676}
6677
6678/* Dump the thunks for FN. */
6679
ac1f3b7e 6680void
bb885938
NS
6681debug_thunks (tree fn)
6682{
6683 dump_thunk (stderr, 0, fn);
6684}
6685
ca36f057
MM
6686/* Virtual function table initialization. */
6687
6688/* Create all the necessary vtables for T and its base classes. */
6689
6690static void
94edc4ab 6691finish_vtbls (tree t)
ca36f057 6692{
3461fba7
NS
6693 tree list;
6694 tree vbase;
ca36f057 6695
3461fba7
NS
6696 /* We lay out the primary and secondary vtables in one contiguous
6697 vtable. The primary vtable is first, followed by the non-virtual
6698 secondary vtables in inheritance graph order. */
604a3205 6699 list = build_tree_list (BINFO_VTABLE (TYPE_BINFO (t)), NULL_TREE);
3461fba7
NS
6700 accumulate_vtbl_inits (TYPE_BINFO (t), TYPE_BINFO (t),
6701 TYPE_BINFO (t), t, list);
c8094d83 6702
3461fba7
NS
6703 /* Then come the virtual bases, also in inheritance graph order. */
6704 for (vbase = TYPE_BINFO (t); vbase; vbase = TREE_CHAIN (vbase))
6705 {
809e3e7f 6706 if (!BINFO_VIRTUAL_P (vbase))
3461fba7 6707 continue;
dbbf88d1 6708 accumulate_vtbl_inits (vbase, vbase, TYPE_BINFO (t), t, list);
ff668506
JM
6709 }
6710
604a3205 6711 if (BINFO_VTABLE (TYPE_BINFO (t)))
3461fba7 6712 initialize_vtable (TYPE_BINFO (t), TREE_VALUE (list));
ca36f057
MM
6713}
6714
6715/* Initialize the vtable for BINFO with the INITS. */
6716
6717static void
94edc4ab 6718initialize_vtable (tree binfo, tree inits)
ca36f057 6719{
ca36f057
MM
6720 tree decl;
6721
6722 layout_vtable_decl (binfo, list_length (inits));
c35cce41 6723 decl = get_vtbl_decl_for_binfo (binfo);
19c29b2f 6724 initialize_artificial_var (decl, inits);
b7442fb5 6725 dump_vtable (BINFO_TYPE (binfo), binfo, decl);
23656158
MM
6726}
6727
9965d119
NS
6728/* Build the VTT (virtual table table) for T.
6729 A class requires a VTT if it has virtual bases.
c8094d83 6730
9965d119
NS
6731 This holds
6732 1 - primary virtual pointer for complete object T
90ecce3e
JM
6733 2 - secondary VTTs for each direct non-virtual base of T which requires a
6734 VTT
9965d119
NS
6735 3 - secondary virtual pointers for each direct or indirect base of T which
6736 has virtual bases or is reachable via a virtual path from T.
6737 4 - secondary VTTs for each direct or indirect virtual base of T.
c8094d83 6738
9965d119 6739 Secondary VTTs look like complete object VTTs without part 4. */
23656158
MM
6740
6741static void
94edc4ab 6742build_vtt (tree t)
23656158
MM
6743{
6744 tree inits;
6745 tree type;
6746 tree vtt;
3ec6bad3 6747 tree index;
23656158 6748
23656158
MM
6749 /* Build up the initializers for the VTT. */
6750 inits = NULL_TREE;
3ec6bad3 6751 index = size_zero_node;
9965d119 6752 build_vtt_inits (TYPE_BINFO (t), t, &inits, &index);
23656158
MM
6753
6754 /* If we didn't need a VTT, we're done. */
6755 if (!inits)
6756 return;
6757
6758 /* Figure out the type of the VTT. */
442e01b6 6759 type = build_index_type (size_int (list_length (inits) - 1));
23656158 6760 type = build_cplus_array_type (const_ptr_type_node, type);
c8094d83 6761
23656158 6762 /* Now, build the VTT object itself. */
3e355d92 6763 vtt = build_vtable (t, mangle_vtt_for_type (t), type);
19c29b2f 6764 initialize_artificial_var (vtt, inits);
548502d3
MM
6765 /* Add the VTT to the vtables list. */
6766 TREE_CHAIN (vtt) = TREE_CHAIN (CLASSTYPE_VTABLES (t));
6767 TREE_CHAIN (CLASSTYPE_VTABLES (t)) = vtt;
b7442fb5
NS
6768
6769 dump_vtt (t, vtt);
23656158
MM
6770}
6771
13de7ec4
JM
6772/* When building a secondary VTT, BINFO_VTABLE is set to a TREE_LIST with
6773 PURPOSE the RTTI_BINFO, VALUE the real vtable pointer for this binfo,
6774 and CHAIN the vtable pointer for this binfo after construction is
00a17e31 6775 complete. VALUE can also be another BINFO, in which case we recurse. */
13de7ec4
JM
6776
6777static tree
94edc4ab 6778binfo_ctor_vtable (tree binfo)
13de7ec4
JM
6779{
6780 tree vt;
6781
6782 while (1)
6783 {
6784 vt = BINFO_VTABLE (binfo);
6785 if (TREE_CODE (vt) == TREE_LIST)
6786 vt = TREE_VALUE (vt);
95b4aca6 6787 if (TREE_CODE (vt) == TREE_BINFO)
13de7ec4
JM
6788 binfo = vt;
6789 else
6790 break;
6791 }
6792
6793 return vt;
6794}
6795
a3a0fc7f
NS
6796/* Data for secondary VTT initialization. */
6797typedef struct secondary_vptr_vtt_init_data_s
6798{
6799 /* Is this the primary VTT? */
6800 bool top_level_p;
6801
6802 /* Current index into the VTT. */
6803 tree index;
6804
6805 /* TREE_LIST of initializers built up. */
6806 tree inits;
6807
6808 /* The type being constructed by this secondary VTT. */
6809 tree type_being_constructed;
6810} secondary_vptr_vtt_init_data;
6811
23656158 6812/* Recursively build the VTT-initializer for BINFO (which is in the
9965d119
NS
6813 hierarchy dominated by T). INITS points to the end of the initializer
6814 list to date. INDEX is the VTT index where the next element will be
6815 replaced. Iff BINFO is the binfo for T, this is the top level VTT (i.e.
6816 not a subvtt for some base of T). When that is so, we emit the sub-VTTs
6817 for virtual bases of T. When it is not so, we build the constructor
6818 vtables for the BINFO-in-T variant. */
23656158
MM
6819
6820static tree *
a3a0fc7f 6821build_vtt_inits (tree binfo, tree t, tree *inits, tree *index)
23656158
MM
6822{
6823 int i;
6824 tree b;
6825 tree init;
6826 tree secondary_vptrs;
a3a0fc7f 6827 secondary_vptr_vtt_init_data data;
539ed333 6828 int top_level_p = SAME_BINFO_TYPE_P (BINFO_TYPE (binfo), t);
23656158
MM
6829
6830 /* We only need VTTs for subobjects with virtual bases. */
5775a06a 6831 if (!CLASSTYPE_VBASECLASSES (BINFO_TYPE (binfo)))
23656158
MM
6832 return inits;
6833
6834 /* We need to use a construction vtable if this is not the primary
6835 VTT. */
9965d119 6836 if (!top_level_p)
3ec6bad3
MM
6837 {
6838 build_ctor_vtbl_group (binfo, t);
6839
6840 /* Record the offset in the VTT where this sub-VTT can be found. */
6841 BINFO_SUBVTT_INDEX (binfo) = *index;
6842 }
23656158
MM
6843
6844 /* Add the address of the primary vtable for the complete object. */
13de7ec4 6845 init = binfo_ctor_vtable (binfo);
23656158
MM
6846 *inits = build_tree_list (NULL_TREE, init);
6847 inits = &TREE_CHAIN (*inits);
9965d119
NS
6848 if (top_level_p)
6849 {
50bc768d 6850 gcc_assert (!BINFO_VPTR_INDEX (binfo));
9965d119
NS
6851 BINFO_VPTR_INDEX (binfo) = *index;
6852 }
3ec6bad3 6853 *index = size_binop (PLUS_EXPR, *index, TYPE_SIZE_UNIT (ptr_type_node));
c8094d83 6854
23656158 6855 /* Recursively add the secondary VTTs for non-virtual bases. */
fa743e8c
NS
6856 for (i = 0; BINFO_BASE_ITERATE (binfo, i, b); ++i)
6857 if (!BINFO_VIRTUAL_P (b))
5d5a519f 6858 inits = build_vtt_inits (b, t, inits, index);
c8094d83 6859
23656158 6860 /* Add secondary virtual pointers for all subobjects of BINFO with
9965d119
NS
6861 either virtual bases or reachable along a virtual path, except
6862 subobjects that are non-virtual primary bases. */
a3a0fc7f
NS
6863 data.top_level_p = top_level_p;
6864 data.index = *index;
6865 data.inits = NULL;
6866 data.type_being_constructed = BINFO_TYPE (binfo);
c8094d83 6867
5d5a519f 6868 dfs_walk_once (binfo, dfs_build_secondary_vptr_vtt_inits, NULL, &data);
9965d119 6869
a3a0fc7f 6870 *index = data.index;
23656158
MM
6871
6872 /* The secondary vptrs come back in reverse order. After we reverse
6873 them, and add the INITS, the last init will be the first element
6874 of the chain. */
a3a0fc7f 6875 secondary_vptrs = data.inits;
23656158
MM
6876 if (secondary_vptrs)
6877 {
6878 *inits = nreverse (secondary_vptrs);
6879 inits = &TREE_CHAIN (secondary_vptrs);
50bc768d 6880 gcc_assert (*inits == NULL_TREE);
23656158
MM
6881 }
6882
9965d119 6883 if (top_level_p)
a3a0fc7f
NS
6884 /* Add the secondary VTTs for virtual bases in inheritance graph
6885 order. */
9ccf6541
MM
6886 for (b = TYPE_BINFO (BINFO_TYPE (binfo)); b; b = TREE_CHAIN (b))
6887 {
809e3e7f 6888 if (!BINFO_VIRTUAL_P (b))
9ccf6541 6889 continue;
c8094d83 6890
dbbf88d1 6891 inits = build_vtt_inits (b, t, inits, index);
9ccf6541 6892 }
a3a0fc7f
NS
6893 else
6894 /* Remove the ctor vtables we created. */
5d5a519f 6895 dfs_walk_all (binfo, dfs_fixup_binfo_vtbls, NULL, binfo);
23656158
MM
6896
6897 return inits;
6898}
6899
8df83eae 6900/* Called from build_vtt_inits via dfs_walk. BINFO is the binfo for the base
a3a0fc7f 6901 in most derived. DATA is a SECONDARY_VPTR_VTT_INIT_DATA structure. */
23656158
MM
6902
6903static tree
a3a0fc7f 6904dfs_build_secondary_vptr_vtt_inits (tree binfo, void *data_)
23656158 6905{
a3a0fc7f 6906 secondary_vptr_vtt_init_data *data = (secondary_vptr_vtt_init_data *)data_;
23656158 6907
23656158
MM
6908 /* We don't care about bases that don't have vtables. */
6909 if (!TYPE_VFIELD (BINFO_TYPE (binfo)))
5d5a519f 6910 return dfs_skip_bases;
23656158 6911
a3a0fc7f
NS
6912 /* We're only interested in proper subobjects of the type being
6913 constructed. */
539ed333 6914 if (SAME_BINFO_TYPE_P (BINFO_TYPE (binfo), data->type_being_constructed))
23656158
MM
6915 return NULL_TREE;
6916
a3a0fc7f
NS
6917 /* We're only interested in bases with virtual bases or reachable
6918 via a virtual path from the type being constructed. */
5d5a519f
NS
6919 if (!(CLASSTYPE_VBASECLASSES (BINFO_TYPE (binfo))
6920 || binfo_via_virtual (binfo, data->type_being_constructed)))
6921 return dfs_skip_bases;
c8094d83 6922
5d5a519f
NS
6923 /* We're not interested in non-virtual primary bases. */
6924 if (!BINFO_VIRTUAL_P (binfo) && BINFO_PRIMARY_P (binfo))
db3d8cde 6925 return NULL_TREE;
c8094d83 6926
3ec6bad3 6927 /* Record the index where this secondary vptr can be found. */
a3a0fc7f 6928 if (data->top_level_p)
9965d119 6929 {
50bc768d 6930 gcc_assert (!BINFO_VPTR_INDEX (binfo));
a3a0fc7f 6931 BINFO_VPTR_INDEX (binfo) = data->index;
3ec6bad3 6932
a3a0fc7f
NS
6933 if (BINFO_VIRTUAL_P (binfo))
6934 {
0cbd7506
MS
6935 /* It's a primary virtual base, and this is not a
6936 construction vtable. Find the base this is primary of in
6937 the inheritance graph, and use that base's vtable
6938 now. */
a3a0fc7f
NS
6939 while (BINFO_PRIMARY_P (binfo))
6940 binfo = BINFO_INHERITANCE_CHAIN (binfo);
6941 }
9965d119 6942 }
c8094d83 6943
a3a0fc7f
NS
6944 /* Add the initializer for the secondary vptr itself. */
6945 data->inits = tree_cons (NULL_TREE, binfo_ctor_vtable (binfo), data->inits);
23656158 6946
a3a0fc7f
NS
6947 /* Advance the vtt index. */
6948 data->index = size_binop (PLUS_EXPR, data->index,
6949 TYPE_SIZE_UNIT (ptr_type_node));
9965d119 6950
a3a0fc7f 6951 return NULL_TREE;
9965d119
NS
6952}
6953
a3a0fc7f
NS
6954/* Called from build_vtt_inits via dfs_walk. After building
6955 constructor vtables and generating the sub-vtt from them, we need
6956 to restore the BINFO_VTABLES that were scribbled on. DATA is the
6957 binfo of the base whose sub vtt was generated. */
23656158
MM
6958
6959static tree
94edc4ab 6960dfs_fixup_binfo_vtbls (tree binfo, void* data)
23656158 6961{
a3a0fc7f 6962 tree vtable = BINFO_VTABLE (binfo);
23656158 6963
5d5a519f
NS
6964 if (!TYPE_CONTAINS_VPTR_P (BINFO_TYPE (binfo)))
6965 /* If this class has no vtable, none of its bases do. */
6966 return dfs_skip_bases;
c8094d83 6967
5d5a519f
NS
6968 if (!vtable)
6969 /* This might be a primary base, so have no vtable in this
6970 hierarchy. */
6971 return NULL_TREE;
c8094d83 6972
23656158
MM
6973 /* If we scribbled the construction vtable vptr into BINFO, clear it
6974 out now. */
5d5a519f 6975 if (TREE_CODE (vtable) == TREE_LIST
a3a0fc7f
NS
6976 && (TREE_PURPOSE (vtable) == (tree) data))
6977 BINFO_VTABLE (binfo) = TREE_CHAIN (vtable);
23656158
MM
6978
6979 return NULL_TREE;
6980}
6981
6982/* Build the construction vtable group for BINFO which is in the
6983 hierarchy dominated by T. */
6984
6985static void
94edc4ab 6986build_ctor_vtbl_group (tree binfo, tree t)
23656158
MM
6987{
6988 tree list;
6989 tree type;
6990 tree vtbl;
6991 tree inits;
6992 tree id;
9ccf6541 6993 tree vbase;
23656158 6994
7bdcf888 6995 /* See if we've already created this construction vtable group. */
1f84ec23 6996 id = mangle_ctor_vtbl_for_type (t, binfo);
23656158
MM
6997 if (IDENTIFIER_GLOBAL_VALUE (id))
6998 return;
6999
539ed333 7000 gcc_assert (!SAME_BINFO_TYPE_P (BINFO_TYPE (binfo), t));
23656158
MM
7001 /* Build a version of VTBL (with the wrong type) for use in
7002 constructing the addresses of secondary vtables in the
7003 construction vtable group. */
459c43ad 7004 vtbl = build_vtable (t, id, ptr_type_node);
505970fc 7005 DECL_CONSTRUCTION_VTABLE_P (vtbl) = 1;
23656158
MM
7006 list = build_tree_list (vtbl, NULL_TREE);
7007 accumulate_vtbl_inits (binfo, TYPE_BINFO (TREE_TYPE (binfo)),
7008 binfo, t, list);
9965d119
NS
7009
7010 /* Add the vtables for each of our virtual bases using the vbase in T
7011 binfo. */
c8094d83
MS
7012 for (vbase = TYPE_BINFO (BINFO_TYPE (binfo));
7013 vbase;
9ccf6541
MM
7014 vbase = TREE_CHAIN (vbase))
7015 {
7016 tree b;
7017
809e3e7f 7018 if (!BINFO_VIRTUAL_P (vbase))
9ccf6541 7019 continue;
dbbf88d1 7020 b = copied_binfo (vbase, binfo);
c8094d83 7021
dbbf88d1 7022 accumulate_vtbl_inits (b, vbase, binfo, t, list);
9ccf6541 7023 }
99389463 7024 inits = TREE_VALUE (list);
23656158
MM
7025
7026 /* Figure out the type of the construction vtable. */
442e01b6 7027 type = build_index_type (size_int (list_length (inits) - 1));
23656158
MM
7028 type = build_cplus_array_type (vtable_entry_type, type);
7029 TREE_TYPE (vtbl) = type;
7030
7031 /* Initialize the construction vtable. */
548502d3 7032 CLASSTYPE_VTABLES (t) = chainon (CLASSTYPE_VTABLES (t), vtbl);
19c29b2f 7033 initialize_artificial_var (vtbl, inits);
b7442fb5 7034 dump_vtable (t, binfo, vtbl);
23656158
MM
7035}
7036
9965d119
NS
7037/* Add the vtbl initializers for BINFO (and its bases other than
7038 non-virtual primaries) to the list of INITS. BINFO is in the
7039 hierarchy dominated by T. RTTI_BINFO is the binfo within T of
7040 the constructor the vtbl inits should be accumulated for. (If this
7041 is the complete object vtbl then RTTI_BINFO will be TYPE_BINFO (T).)
7042 ORIG_BINFO is the binfo for this object within BINFO_TYPE (RTTI_BINFO).
7043 BINFO is the active base equivalent of ORIG_BINFO in the inheritance
7044 graph of T. Both BINFO and ORIG_BINFO will have the same BINFO_TYPE,
7045 but are not necessarily the same in terms of layout. */
ca36f057
MM
7046
7047static void
94edc4ab 7048accumulate_vtbl_inits (tree binfo,
0cbd7506
MS
7049 tree orig_binfo,
7050 tree rtti_binfo,
7051 tree t,
7052 tree inits)
ca36f057 7053{
23656158 7054 int i;
fa743e8c 7055 tree base_binfo;
539ed333 7056 int ctor_vtbl_p = !SAME_BINFO_TYPE_P (BINFO_TYPE (rtti_binfo), t);
23656158 7057
539ed333 7058 gcc_assert (SAME_BINFO_TYPE_P (BINFO_TYPE (binfo), BINFO_TYPE (orig_binfo)));
23656158 7059
00a17e31 7060 /* If it doesn't have a vptr, we don't do anything. */
623fe76a
NS
7061 if (!TYPE_CONTAINS_VPTR_P (BINFO_TYPE (binfo)))
7062 return;
c8094d83 7063
23656158
MM
7064 /* If we're building a construction vtable, we're not interested in
7065 subobjects that don't require construction vtables. */
c8094d83 7066 if (ctor_vtbl_p
5775a06a 7067 && !CLASSTYPE_VBASECLASSES (BINFO_TYPE (binfo))
9965d119 7068 && !binfo_via_virtual (orig_binfo, BINFO_TYPE (rtti_binfo)))
23656158
MM
7069 return;
7070
7071 /* Build the initializers for the BINFO-in-T vtable. */
c8094d83 7072 TREE_VALUE (inits)
23656158
MM
7073 = chainon (TREE_VALUE (inits),
7074 dfs_accumulate_vtbl_inits (binfo, orig_binfo,
7075 rtti_binfo, t, inits));
c8094d83 7076
c35cce41
MM
7077 /* Walk the BINFO and its bases. We walk in preorder so that as we
7078 initialize each vtable we can figure out at what offset the
23656158
MM
7079 secondary vtable lies from the primary vtable. We can't use
7080 dfs_walk here because we need to iterate through bases of BINFO
7081 and RTTI_BINFO simultaneously. */
fa743e8c 7082 for (i = 0; BINFO_BASE_ITERATE (binfo, i, base_binfo); ++i)
23656158 7083 {
23656158 7084 /* Skip virtual bases. */
809e3e7f 7085 if (BINFO_VIRTUAL_P (base_binfo))
23656158
MM
7086 continue;
7087 accumulate_vtbl_inits (base_binfo,
604a3205 7088 BINFO_BASE_BINFO (orig_binfo, i),
9965d119 7089 rtti_binfo, t,
23656158
MM
7090 inits);
7091 }
ca36f057
MM
7092}
7093
3461fba7
NS
7094/* Called from accumulate_vtbl_inits. Returns the initializers for
7095 the BINFO vtable. */
ca36f057
MM
7096
7097static tree
94edc4ab 7098dfs_accumulate_vtbl_inits (tree binfo,
0cbd7506
MS
7099 tree orig_binfo,
7100 tree rtti_binfo,
7101 tree t,
7102 tree l)
ca36f057 7103{
23656158 7104 tree inits = NULL_TREE;
9965d119 7105 tree vtbl = NULL_TREE;
539ed333 7106 int ctor_vtbl_p = !SAME_BINFO_TYPE_P (BINFO_TYPE (rtti_binfo), t);
9965d119 7107
13de7ec4 7108 if (ctor_vtbl_p
809e3e7f 7109 && BINFO_VIRTUAL_P (orig_binfo) && BINFO_PRIMARY_P (orig_binfo))
9965d119 7110 {
13de7ec4
JM
7111 /* In the hierarchy of BINFO_TYPE (RTTI_BINFO), this is a
7112 primary virtual base. If it is not the same primary in
7113 the hierarchy of T, we'll need to generate a ctor vtable
7114 for it, to place at its location in T. If it is the same
7115 primary, we still need a VTT entry for the vtable, but it
7116 should point to the ctor vtable for the base it is a
7117 primary for within the sub-hierarchy of RTTI_BINFO.
c8094d83 7118
13de7ec4 7119 There are three possible cases:
c8094d83 7120
13de7ec4
JM
7121 1) We are in the same place.
7122 2) We are a primary base within a lost primary virtual base of
7123 RTTI_BINFO.
049d2def 7124 3) We are primary to something not a base of RTTI_BINFO. */
c8094d83 7125
fc6633e0 7126 tree b;
13de7ec4 7127 tree last = NULL_TREE;
85a9a0a2 7128
13de7ec4
JM
7129 /* First, look through the bases we are primary to for RTTI_BINFO
7130 or a virtual base. */
fc6633e0
NS
7131 b = binfo;
7132 while (BINFO_PRIMARY_P (b))
7bdcf888 7133 {
fc6633e0 7134 b = BINFO_INHERITANCE_CHAIN (b);
13de7ec4 7135 last = b;
809e3e7f 7136 if (BINFO_VIRTUAL_P (b) || b == rtti_binfo)
fc6633e0 7137 goto found;
7bdcf888 7138 }
13de7ec4
JM
7139 /* If we run out of primary links, keep looking down our
7140 inheritance chain; we might be an indirect primary. */
fc6633e0
NS
7141 for (b = last; b; b = BINFO_INHERITANCE_CHAIN (b))
7142 if (BINFO_VIRTUAL_P (b) || b == rtti_binfo)
7143 break;
7144 found:
c8094d83 7145
13de7ec4
JM
7146 /* If we found RTTI_BINFO, this is case 1. If we found a virtual
7147 base B and it is a base of RTTI_BINFO, this is case 2. In
7148 either case, we share our vtable with LAST, i.e. the
7149 derived-most base within B of which we are a primary. */
7150 if (b == rtti_binfo
58c42dc2 7151 || (b && binfo_for_vbase (BINFO_TYPE (b), BINFO_TYPE (rtti_binfo))))
049d2def
JM
7152 /* Just set our BINFO_VTABLE to point to LAST, as we may not have
7153 set LAST's BINFO_VTABLE yet. We'll extract the actual vptr in
7154 binfo_ctor_vtable after everything's been set up. */
7155 vtbl = last;
13de7ec4 7156
049d2def 7157 /* Otherwise, this is case 3 and we get our own. */
9965d119 7158 }
dbbf88d1 7159 else if (!BINFO_NEW_VTABLE_MARKED (orig_binfo))
9965d119 7160 return inits;
7bdcf888 7161
9965d119 7162 if (!vtbl)
ca36f057 7163 {
c35cce41
MM
7164 tree index;
7165 int non_fn_entries;
7166
7167 /* Compute the initializer for this vtable. */
23656158 7168 inits = build_vtbl_initializer (binfo, orig_binfo, t, rtti_binfo,
aabb4cd6 7169 &non_fn_entries);
c35cce41 7170
23656158 7171 /* Figure out the position to which the VPTR should point. */
c35cce41 7172 vtbl = TREE_PURPOSE (l);
6de9cd9a 7173 vtbl = build1 (ADDR_EXPR, vtbl_ptr_type_node, vtbl);
c35cce41
MM
7174 index = size_binop (PLUS_EXPR,
7175 size_int (non_fn_entries),
7176 size_int (list_length (TREE_VALUE (l))));
23656158
MM
7177 index = size_binop (MULT_EXPR,
7178 TYPE_SIZE_UNIT (vtable_entry_type),
7179 index);
f293ce4b 7180 vtbl = build2 (PLUS_EXPR, TREE_TYPE (vtbl), vtbl, index);
9965d119 7181 }
23656158 7182
7bdcf888 7183 if (ctor_vtbl_p)
9965d119
NS
7184 /* For a construction vtable, we can't overwrite BINFO_VTABLE.
7185 So, we make a TREE_LIST. Later, dfs_fixup_binfo_vtbls will
7186 straighten this out. */
7187 BINFO_VTABLE (binfo) = tree_cons (rtti_binfo, vtbl, BINFO_VTABLE (binfo));
809e3e7f 7188 else if (BINFO_PRIMARY_P (binfo) && BINFO_VIRTUAL_P (binfo))
7bdcf888
NS
7189 inits = NULL_TREE;
7190 else
7191 /* For an ordinary vtable, set BINFO_VTABLE. */
7192 BINFO_VTABLE (binfo) = vtbl;
ca36f057 7193
23656158 7194 return inits;
ca36f057
MM
7195}
7196
1b746b0f
AP
7197static GTY(()) tree abort_fndecl_addr;
7198
90ecce3e 7199/* Construct the initializer for BINFO's virtual function table. BINFO
aabb4cd6 7200 is part of the hierarchy dominated by T. If we're building a
23656158 7201 construction vtable, the ORIG_BINFO is the binfo we should use to
9965d119
NS
7202 find the actual function pointers to put in the vtable - but they
7203 can be overridden on the path to most-derived in the graph that
7204 ORIG_BINFO belongs. Otherwise,
911a71a7 7205 ORIG_BINFO should be the same as BINFO. The RTTI_BINFO is the
23656158
MM
7206 BINFO that should be indicated by the RTTI information in the
7207 vtable; it will be a base class of T, rather than T itself, if we
7208 are building a construction vtable.
aabb4cd6
MM
7209
7210 The value returned is a TREE_LIST suitable for wrapping in a
7211 CONSTRUCTOR to use as the DECL_INITIAL for a vtable. If
7212 NON_FN_ENTRIES_P is not NULL, *NON_FN_ENTRIES_P is set to the
c8094d83 7213 number of non-function entries in the vtable.
911a71a7
MM
7214
7215 It might seem that this function should never be called with a
9965d119 7216 BINFO for which BINFO_PRIMARY_P holds, the vtable for such a
911a71a7 7217 base is always subsumed by a derived class vtable. However, when
9965d119 7218 we are building construction vtables, we do build vtables for
911a71a7
MM
7219 primary bases; we need these while the primary base is being
7220 constructed. */
ca36f057
MM
7221
7222static tree
94edc4ab 7223build_vtbl_initializer (tree binfo,
0cbd7506
MS
7224 tree orig_binfo,
7225 tree t,
7226 tree rtti_binfo,
7227 int* non_fn_entries_p)
ca36f057 7228{
d0cd8b44 7229 tree v, b;
911a71a7 7230 tree vfun_inits;
911a71a7 7231 vtbl_init_data vid;
58c42dc2
NS
7232 unsigned ix;
7233 tree vbinfo;
d4e6fecb 7234 VEC(tree,gc) *vbases;
c8094d83 7235
911a71a7 7236 /* Initialize VID. */
961192e1 7237 memset (&vid, 0, sizeof (vid));
911a71a7
MM
7238 vid.binfo = binfo;
7239 vid.derived = t;
73ea87d7 7240 vid.rtti_binfo = rtti_binfo;
911a71a7 7241 vid.last_init = &vid.inits;
539ed333
NS
7242 vid.primary_vtbl_p = SAME_BINFO_TYPE_P (BINFO_TYPE (binfo), t);
7243 vid.ctor_vtbl_p = !SAME_BINFO_TYPE_P (BINFO_TYPE (rtti_binfo), t);
548502d3 7244 vid.generate_vcall_entries = true;
c35cce41 7245 /* The first vbase or vcall offset is at index -3 in the vtable. */
ce552f75 7246 vid.index = ssize_int(-3 * TARGET_VTABLE_DATA_ENTRY_DISTANCE);
c35cce41 7247
9bab6c90 7248 /* Add entries to the vtable for RTTI. */
73ea87d7 7249 build_rtti_vtbl_entries (binfo, &vid);
9bab6c90 7250
b485e15b
MM
7251 /* Create an array for keeping track of the functions we've
7252 processed. When we see multiple functions with the same
7253 signature, we share the vcall offsets. */
1e625046 7254 vid.fns = VEC_alloc (tree, gc, 32);
c35cce41 7255 /* Add the vcall and vbase offset entries. */
911a71a7 7256 build_vcall_and_vbase_vtbl_entries (binfo, &vid);
c8094d83 7257
79cda2d1 7258 /* Clear BINFO_VTABLE_PATH_MARKED; it's set by
c35cce41 7259 build_vbase_offset_vtbl_entries. */
9ba5ff0f
NS
7260 for (vbases = CLASSTYPE_VBASECLASSES (t), ix = 0;
7261 VEC_iterate (tree, vbases, ix, vbinfo); ix++)
58c42dc2 7262 BINFO_VTABLE_PATH_MARKED (vbinfo) = 0;
ca36f057 7263
a6f5e048
RH
7264 /* If the target requires padding between data entries, add that now. */
7265 if (TARGET_VTABLE_DATA_ENTRY_DISTANCE > 1)
7266 {
7267 tree cur, *prev;
7268
7269 for (prev = &vid.inits; (cur = *prev); prev = &TREE_CHAIN (cur))
7270 {
7271 tree add = cur;
7272 int i;
7273
7274 for (i = 1; i < TARGET_VTABLE_DATA_ENTRY_DISTANCE; ++i)
7befdb9f 7275 add = tree_cons (NULL_TREE,
2e88ae22
SE
7276 build1 (NOP_EXPR, vtable_entry_type,
7277 null_pointer_node),
7befdb9f 7278 add);
a6f5e048
RH
7279 *prev = add;
7280 }
7281 }
7282
c35cce41 7283 if (non_fn_entries_p)
911a71a7 7284 *non_fn_entries_p = list_length (vid.inits);
ca36f057
MM
7285
7286 /* Go through all the ordinary virtual functions, building up
7287 initializers. */
c35cce41 7288 vfun_inits = NULL_TREE;
23656158 7289 for (v = BINFO_VIRTUALS (orig_binfo); v; v = TREE_CHAIN (v))
ca36f057
MM
7290 {
7291 tree delta;
7292 tree vcall_index;
4977bab6 7293 tree fn, fn_original;
f11ee281 7294 tree init = NULL_TREE;
c8094d83 7295
ca36f057 7296 fn = BV_FN (v);
07fa4878
NS
7297 fn_original = fn;
7298 if (DECL_THUNK_P (fn))
4977bab6 7299 {
07fa4878
NS
7300 if (!DECL_NAME (fn))
7301 finish_thunk (fn);
e00853fd 7302 if (THUNK_ALIAS (fn))
bb885938
NS
7303 {
7304 fn = THUNK_ALIAS (fn);
7305 BV_FN (v) = fn;
7306 }
07fa4878 7307 fn_original = THUNK_TARGET (fn);
4977bab6 7308 }
c8094d83 7309
d0cd8b44
JM
7310 /* If the only definition of this function signature along our
7311 primary base chain is from a lost primary, this vtable slot will
7312 never be used, so just zero it out. This is important to avoid
7313 requiring extra thunks which cannot be generated with the function.
7314
f11ee281
JM
7315 We first check this in update_vtable_entry_for_fn, so we handle
7316 restored primary bases properly; we also need to do it here so we
7317 zero out unused slots in ctor vtables, rather than filling themff
7318 with erroneous values (though harmless, apart from relocation
7319 costs). */
7320 for (b = binfo; ; b = get_primary_binfo (b))
7321 {
7322 /* We found a defn before a lost primary; go ahead as normal. */
4977bab6 7323 if (look_for_overrides_here (BINFO_TYPE (b), fn_original))
f11ee281
JM
7324 break;
7325
7326 /* The nearest definition is from a lost primary; clear the
7327 slot. */
7328 if (BINFO_LOST_PRIMARY_P (b))
7329 {
7330 init = size_zero_node;
d0cd8b44 7331 break;
f11ee281
JM
7332 }
7333 }
d0cd8b44 7334
f11ee281
JM
7335 if (! init)
7336 {
7337 /* Pull the offset for `this', and the function to call, out of
7338 the list. */
7339 delta = BV_DELTA (v);
548502d3 7340 vcall_index = BV_VCALL_INDEX (v);
f11ee281 7341
50bc768d
NS
7342 gcc_assert (TREE_CODE (delta) == INTEGER_CST);
7343 gcc_assert (TREE_CODE (fn) == FUNCTION_DECL);
f11ee281
JM
7344
7345 /* You can't call an abstract virtual function; it's abstract.
7346 So, we replace these functions with __pure_virtual. */
4977bab6 7347 if (DECL_PURE_VIRTUAL_P (fn_original))
4977bab6 7348 {
1b746b0f
AP
7349 fn = abort_fndecl;
7350 if (abort_fndecl_addr == NULL)
7351 abort_fndecl_addr = build1 (ADDR_EXPR, vfunc_ptr_type_node, fn);
7352 init = abort_fndecl_addr;
7353 }
7354 else
7355 {
7356 if (!integer_zerop (delta) || vcall_index)
7357 {
7358 fn = make_thunk (fn, /*this_adjusting=*/1, delta, vcall_index);
7359 if (!DECL_NAME (fn))
7360 finish_thunk (fn);
7361 }
7362 /* Take the address of the function, considering it to be of an
7363 appropriate generic type. */
7364 init = build1 (ADDR_EXPR, vfunc_ptr_type_node, fn);
4977bab6 7365 }
f11ee281 7366 }
d0cd8b44 7367
ca36f057 7368 /* And add it to the chain of initializers. */
67231816
RH
7369 if (TARGET_VTABLE_USES_DESCRIPTORS)
7370 {
7371 int i;
7372 if (init == size_zero_node)
7373 for (i = 0; i < TARGET_VTABLE_USES_DESCRIPTORS; ++i)
7374 vfun_inits = tree_cons (NULL_TREE, init, vfun_inits);
7375 else
7376 for (i = 0; i < TARGET_VTABLE_USES_DESCRIPTORS; ++i)
7377 {
f293ce4b
RS
7378 tree fdesc = build2 (FDESC_EXPR, vfunc_ptr_type_node,
7379 TREE_OPERAND (init, 0),
7d60be94 7380 build_int_cst (NULL_TREE, i));
67231816 7381 TREE_CONSTANT (fdesc) = 1;
6de9cd9a 7382 TREE_INVARIANT (fdesc) = 1;
67231816
RH
7383
7384 vfun_inits = tree_cons (NULL_TREE, fdesc, vfun_inits);
7385 }
7386 }
7387 else
0cbd7506 7388 vfun_inits = tree_cons (NULL_TREE, init, vfun_inits);
ca36f057
MM
7389 }
7390
c35cce41
MM
7391 /* The initializers for virtual functions were built up in reverse
7392 order; straighten them out now. */
7393 vfun_inits = nreverse (vfun_inits);
c8094d83 7394
9bab6c90 7395 /* The negative offset initializers are also in reverse order. */
911a71a7 7396 vid.inits = nreverse (vid.inits);
9bab6c90
MM
7397
7398 /* Chain the two together. */
911a71a7 7399 return chainon (vid.inits, vfun_inits);
ca36f057
MM
7400}
7401
d0cd8b44 7402/* Adds to vid->inits the initializers for the vbase and vcall
c35cce41 7403 offsets in BINFO, which is in the hierarchy dominated by T. */
ca36f057 7404
c35cce41 7405static void
94edc4ab 7406build_vcall_and_vbase_vtbl_entries (tree binfo, vtbl_init_data* vid)
ca36f057 7407{
c35cce41 7408 tree b;
8d08fdba 7409
c35cce41 7410 /* If this is a derived class, we must first create entries
9bab6c90 7411 corresponding to the primary base class. */
911a71a7 7412 b = get_primary_binfo (binfo);
c35cce41 7413 if (b)
911a71a7 7414 build_vcall_and_vbase_vtbl_entries (b, vid);
c35cce41
MM
7415
7416 /* Add the vbase entries for this base. */
911a71a7 7417 build_vbase_offset_vtbl_entries (binfo, vid);
c35cce41 7418 /* Add the vcall entries for this base. */
911a71a7 7419 build_vcall_offset_vtbl_entries (binfo, vid);
ca36f057 7420}
8d08fdba 7421
ca36f057
MM
7422/* Returns the initializers for the vbase offset entries in the vtable
7423 for BINFO (which is part of the class hierarchy dominated by T), in
c35cce41
MM
7424 reverse order. VBASE_OFFSET_INDEX gives the vtable index
7425 where the next vbase offset will go. */
8d08fdba 7426
c35cce41 7427static void
94edc4ab 7428build_vbase_offset_vtbl_entries (tree binfo, vtbl_init_data* vid)
ca36f057 7429{
c35cce41
MM
7430 tree vbase;
7431 tree t;
90b1ca2f 7432 tree non_primary_binfo;
8d08fdba 7433
ca36f057
MM
7434 /* If there are no virtual baseclasses, then there is nothing to
7435 do. */
5775a06a 7436 if (!CLASSTYPE_VBASECLASSES (BINFO_TYPE (binfo)))
c35cce41 7437 return;
ca36f057 7438
911a71a7 7439 t = vid->derived;
c8094d83 7440
90b1ca2f
NS
7441 /* We might be a primary base class. Go up the inheritance hierarchy
7442 until we find the most derived class of which we are a primary base:
7443 it is the offset of that which we need to use. */
7444 non_primary_binfo = binfo;
7445 while (BINFO_INHERITANCE_CHAIN (non_primary_binfo))
7446 {
7447 tree b;
7448
7449 /* If we have reached a virtual base, then it must be a primary
7450 base (possibly multi-level) of vid->binfo, or we wouldn't
7451 have called build_vcall_and_vbase_vtbl_entries for it. But it
7452 might be a lost primary, so just skip down to vid->binfo. */
809e3e7f 7453 if (BINFO_VIRTUAL_P (non_primary_binfo))
90b1ca2f
NS
7454 {
7455 non_primary_binfo = vid->binfo;
7456 break;
7457 }
7458
7459 b = BINFO_INHERITANCE_CHAIN (non_primary_binfo);
7460 if (get_primary_binfo (b) != non_primary_binfo)
7461 break;
7462 non_primary_binfo = b;
7463 }
ca36f057 7464
c35cce41
MM
7465 /* Go through the virtual bases, adding the offsets. */
7466 for (vbase = TYPE_BINFO (BINFO_TYPE (binfo));
7467 vbase;
7468 vbase = TREE_CHAIN (vbase))
7469 {
7470 tree b;
7471 tree delta;
c8094d83 7472
809e3e7f 7473 if (!BINFO_VIRTUAL_P (vbase))
c35cce41 7474 continue;
ca36f057 7475
c35cce41
MM
7476 /* Find the instance of this virtual base in the complete
7477 object. */
dbbf88d1 7478 b = copied_binfo (vbase, binfo);
c35cce41
MM
7479
7480 /* If we've already got an offset for this virtual base, we
7481 don't need another one. */
7482 if (BINFO_VTABLE_PATH_MARKED (b))
7483 continue;
dbbf88d1 7484 BINFO_VTABLE_PATH_MARKED (b) = 1;
c35cce41
MM
7485
7486 /* Figure out where we can find this vbase offset. */
c8094d83 7487 delta = size_binop (MULT_EXPR,
911a71a7 7488 vid->index,
c35cce41
MM
7489 convert (ssizetype,
7490 TYPE_SIZE_UNIT (vtable_entry_type)));
911a71a7 7491 if (vid->primary_vtbl_p)
c35cce41
MM
7492 BINFO_VPTR_FIELD (b) = delta;
7493
7494 if (binfo != TYPE_BINFO (t))
50bc768d
NS
7495 /* The vbase offset had better be the same. */
7496 gcc_assert (tree_int_cst_equal (delta, BINFO_VPTR_FIELD (vbase)));
c35cce41
MM
7497
7498 /* The next vbase will come at a more negative offset. */
a6f5e048
RH
7499 vid->index = size_binop (MINUS_EXPR, vid->index,
7500 ssize_int (TARGET_VTABLE_DATA_ENTRY_DISTANCE));
c35cce41
MM
7501
7502 /* The initializer is the delta from BINFO to this virtual base.
4e7512c9
MM
7503 The vbase offsets go in reverse inheritance-graph order, and
7504 we are walking in inheritance graph order so these end up in
7505 the right order. */
90b1ca2f 7506 delta = size_diffop (BINFO_OFFSET (b), BINFO_OFFSET (non_primary_binfo));
c8094d83
MS
7507
7508 *vid->last_init
9bab6c90 7509 = build_tree_list (NULL_TREE,
c8094d83 7510 fold_build1 (NOP_EXPR,
7866705a
SB
7511 vtable_entry_type,
7512 delta));
911a71a7 7513 vid->last_init = &TREE_CHAIN (*vid->last_init);
c35cce41 7514 }
8d08fdba 7515}
ca36f057 7516
b485e15b 7517/* Adds the initializers for the vcall offset entries in the vtable
d0cd8b44
JM
7518 for BINFO (which is part of the class hierarchy dominated by VID->DERIVED)
7519 to VID->INITS. */
b485e15b
MM
7520
7521static void
94edc4ab 7522build_vcall_offset_vtbl_entries (tree binfo, vtbl_init_data* vid)
b485e15b 7523{
548502d3
MM
7524 /* We only need these entries if this base is a virtual base. We
7525 compute the indices -- but do not add to the vtable -- when
7526 building the main vtable for a class. */
809e3e7f 7527 if (BINFO_VIRTUAL_P (binfo) || binfo == TYPE_BINFO (vid->derived))
548502d3
MM
7528 {
7529 /* We need a vcall offset for each of the virtual functions in this
7530 vtable. For example:
b485e15b 7531
548502d3
MM
7532 class A { virtual void f (); };
7533 class B1 : virtual public A { virtual void f (); };
7534 class B2 : virtual public A { virtual void f (); };
7535 class C: public B1, public B2 { virtual void f (); };
d0cd8b44 7536
548502d3
MM
7537 A C object has a primary base of B1, which has a primary base of A. A
7538 C also has a secondary base of B2, which no longer has a primary base
7539 of A. So the B2-in-C construction vtable needs a secondary vtable for
7540 A, which will adjust the A* to a B2* to call f. We have no way of
7541 knowing what (or even whether) this offset will be when we define B2,
7542 so we store this "vcall offset" in the A sub-vtable and look it up in
7543 a "virtual thunk" for B2::f.
b485e15b 7544
548502d3
MM
7545 We need entries for all the functions in our primary vtable and
7546 in our non-virtual bases' secondary vtables. */
7547 vid->vbase = binfo;
7548 /* If we are just computing the vcall indices -- but do not need
7549 the actual entries -- not that. */
809e3e7f 7550 if (!BINFO_VIRTUAL_P (binfo))
548502d3
MM
7551 vid->generate_vcall_entries = false;
7552 /* Now, walk through the non-virtual bases, adding vcall offsets. */
7553 add_vcall_offset_vtbl_entries_r (binfo, vid);
7554 }
b485e15b
MM
7555}
7556
7557/* Build vcall offsets, starting with those for BINFO. */
7558
7559static void
94edc4ab 7560add_vcall_offset_vtbl_entries_r (tree binfo, vtbl_init_data* vid)
b485e15b
MM
7561{
7562 int i;
7563 tree primary_binfo;
fa743e8c 7564 tree base_binfo;
b485e15b
MM
7565
7566 /* Don't walk into virtual bases -- except, of course, for the
d0cd8b44
JM
7567 virtual base for which we are building vcall offsets. Any
7568 primary virtual base will have already had its offsets generated
7569 through the recursion in build_vcall_and_vbase_vtbl_entries. */
809e3e7f 7570 if (BINFO_VIRTUAL_P (binfo) && vid->vbase != binfo)
b485e15b 7571 return;
c8094d83 7572
b485e15b
MM
7573 /* If BINFO has a primary base, process it first. */
7574 primary_binfo = get_primary_binfo (binfo);
7575 if (primary_binfo)
7576 add_vcall_offset_vtbl_entries_r (primary_binfo, vid);
7577
7578 /* Add BINFO itself to the list. */
7579 add_vcall_offset_vtbl_entries_1 (binfo, vid);
7580
7581 /* Scan the non-primary bases of BINFO. */
fa743e8c
NS
7582 for (i = 0; BINFO_BASE_ITERATE (binfo, i, base_binfo); ++i)
7583 if (base_binfo != primary_binfo)
7584 add_vcall_offset_vtbl_entries_r (base_binfo, vid);
b485e15b
MM
7585}
7586
9965d119 7587/* Called from build_vcall_offset_vtbl_entries_r. */
e92cc029 7588
b485e15b 7589static void
94edc4ab 7590add_vcall_offset_vtbl_entries_1 (tree binfo, vtbl_init_data* vid)
8d08fdba 7591{
e6a66567
MM
7592 /* Make entries for the rest of the virtuals. */
7593 if (abi_version_at_least (2))
31f8e4f3 7594 {
e6a66567 7595 tree orig_fn;
911a71a7 7596
e6a66567
MM
7597 /* The ABI requires that the methods be processed in declaration
7598 order. G++ 3.2 used the order in the vtable. */
7599 for (orig_fn = TYPE_METHODS (BINFO_TYPE (binfo));
7600 orig_fn;
7601 orig_fn = TREE_CHAIN (orig_fn))
7602 if (DECL_VINDEX (orig_fn))
95675950 7603 add_vcall_offset (orig_fn, binfo, vid);
e6a66567
MM
7604 }
7605 else
7606 {
7607 tree derived_virtuals;
7608 tree base_virtuals;
7609 tree orig_virtuals;
7610 /* If BINFO is a primary base, the most derived class which has
7611 BINFO as a primary base; otherwise, just BINFO. */
7612 tree non_primary_binfo;
7613
7614 /* We might be a primary base class. Go up the inheritance hierarchy
7615 until we find the most derived class of which we are a primary base:
7616 it is the BINFO_VIRTUALS there that we need to consider. */
7617 non_primary_binfo = binfo;
7618 while (BINFO_INHERITANCE_CHAIN (non_primary_binfo))
911a71a7 7619 {
e6a66567
MM
7620 tree b;
7621
7622 /* If we have reached a virtual base, then it must be vid->vbase,
7623 because we ignore other virtual bases in
7624 add_vcall_offset_vtbl_entries_r. In turn, it must be a primary
7625 base (possibly multi-level) of vid->binfo, or we wouldn't
7626 have called build_vcall_and_vbase_vtbl_entries for it. But it
7627 might be a lost primary, so just skip down to vid->binfo. */
809e3e7f 7628 if (BINFO_VIRTUAL_P (non_primary_binfo))
e6a66567 7629 {
8dc2b103 7630 gcc_assert (non_primary_binfo == vid->vbase);
e6a66567
MM
7631 non_primary_binfo = vid->binfo;
7632 break;
7633 }
911a71a7 7634
e6a66567
MM
7635 b = BINFO_INHERITANCE_CHAIN (non_primary_binfo);
7636 if (get_primary_binfo (b) != non_primary_binfo)
7637 break;
7638 non_primary_binfo = b;
7639 }
4e7512c9 7640
e6a66567
MM
7641 if (vid->ctor_vtbl_p)
7642 /* For a ctor vtable we need the equivalent binfo within the hierarchy
7643 where rtti_binfo is the most derived type. */
dbbf88d1
NS
7644 non_primary_binfo
7645 = original_binfo (non_primary_binfo, vid->rtti_binfo);
c8094d83 7646
e6a66567
MM
7647 for (base_virtuals = BINFO_VIRTUALS (binfo),
7648 derived_virtuals = BINFO_VIRTUALS (non_primary_binfo),
7649 orig_virtuals = BINFO_VIRTUALS (TYPE_BINFO (BINFO_TYPE (binfo)));
7650 base_virtuals;
7651 base_virtuals = TREE_CHAIN (base_virtuals),
7652 derived_virtuals = TREE_CHAIN (derived_virtuals),
7653 orig_virtuals = TREE_CHAIN (orig_virtuals))
7654 {
7655 tree orig_fn;
73ea87d7 7656
e6a66567
MM
7657 /* Find the declaration that originally caused this function to
7658 be present in BINFO_TYPE (binfo). */
7659 orig_fn = BV_FN (orig_virtuals);
9bab6c90 7660
e6a66567
MM
7661 /* When processing BINFO, we only want to generate vcall slots for
7662 function slots introduced in BINFO. So don't try to generate
7663 one if the function isn't even defined in BINFO. */
539ed333 7664 if (!SAME_BINFO_TYPE_P (BINFO_TYPE (binfo), DECL_CONTEXT (orig_fn)))
e6a66567 7665 continue;
b485e15b 7666
95675950 7667 add_vcall_offset (orig_fn, binfo, vid);
e6a66567
MM
7668 }
7669 }
7670}
b485e15b 7671
95675950 7672/* Add a vcall offset entry for ORIG_FN to the vtable. */
b485e15b 7673
e6a66567 7674static void
95675950 7675add_vcall_offset (tree orig_fn, tree binfo, vtbl_init_data *vid)
e6a66567
MM
7676{
7677 size_t i;
7678 tree vcall_offset;
1e625046 7679 tree derived_entry;
9bab6c90 7680
e6a66567
MM
7681 /* If there is already an entry for a function with the same
7682 signature as FN, then we do not need a second vcall offset.
7683 Check the list of functions already present in the derived
7684 class vtable. */
c8094d83 7685 for (i = 0; VEC_iterate (tree, vid->fns, i, derived_entry); ++i)
e6a66567 7686 {
e6a66567
MM
7687 if (same_signature_p (derived_entry, orig_fn)
7688 /* We only use one vcall offset for virtual destructors,
7689 even though there are two virtual table entries. */
7690 || (DECL_DESTRUCTOR_P (derived_entry)
7691 && DECL_DESTRUCTOR_P (orig_fn)))
7692 return;
7693 }
4e7512c9 7694
e6a66567
MM
7695 /* If we are building these vcall offsets as part of building
7696 the vtable for the most derived class, remember the vcall
7697 offset. */
7698 if (vid->binfo == TYPE_BINFO (vid->derived))
0871761b 7699 {
d4e6fecb 7700 tree_pair_p elt = VEC_safe_push (tree_pair_s, gc,
0871761b
NS
7701 CLASSTYPE_VCALL_INDICES (vid->derived),
7702 NULL);
7703 elt->purpose = orig_fn;
7704 elt->value = vid->index;
7705 }
c8094d83 7706
e6a66567
MM
7707 /* The next vcall offset will be found at a more negative
7708 offset. */
7709 vid->index = size_binop (MINUS_EXPR, vid->index,
7710 ssize_int (TARGET_VTABLE_DATA_ENTRY_DISTANCE));
7711
7712 /* Keep track of this function. */
1e625046 7713 VEC_safe_push (tree, gc, vid->fns, orig_fn);
e6a66567
MM
7714
7715 if (vid->generate_vcall_entries)
7716 {
7717 tree base;
e6a66567 7718 tree fn;
548502d3 7719
e6a66567 7720 /* Find the overriding function. */
95675950 7721 fn = find_final_overrider (vid->rtti_binfo, binfo, orig_fn);
e6a66567
MM
7722 if (fn == error_mark_node)
7723 vcall_offset = build1 (NOP_EXPR, vtable_entry_type,
7724 integer_zero_node);
7725 else
7726 {
95675950
MM
7727 base = TREE_VALUE (fn);
7728
7729 /* The vbase we're working on is a primary base of
7730 vid->binfo. But it might be a lost primary, so its
7731 BINFO_OFFSET might be wrong, so we just use the
7732 BINFO_OFFSET from vid->binfo. */
7733 vcall_offset = size_diffop (BINFO_OFFSET (base),
7734 BINFO_OFFSET (vid->binfo));
7866705a
SB
7735 vcall_offset = fold_build1 (NOP_EXPR, vtable_entry_type,
7736 vcall_offset);
548502d3 7737 }
34cd5ae7 7738 /* Add the initializer to the vtable. */
e6a66567
MM
7739 *vid->last_init = build_tree_list (NULL_TREE, vcall_offset);
7740 vid->last_init = &TREE_CHAIN (*vid->last_init);
c35cce41 7741 }
570221c2 7742}
b54ccf71 7743
34cd5ae7 7744/* Return vtbl initializers for the RTTI entries corresponding to the
aabb4cd6 7745 BINFO's vtable. The RTTI entries should indicate the object given
73ea87d7 7746 by VID->rtti_binfo. */
b54ccf71 7747
9bab6c90 7748static void
94edc4ab 7749build_rtti_vtbl_entries (tree binfo, vtbl_init_data* vid)
b54ccf71 7750{
ca36f057 7751 tree b;
aabb4cd6 7752 tree t;
ca36f057 7753 tree basetype;
ca36f057
MM
7754 tree offset;
7755 tree decl;
7756 tree init;
b54ccf71 7757
ca36f057 7758 basetype = BINFO_TYPE (binfo);
73ea87d7 7759 t = BINFO_TYPE (vid->rtti_binfo);
b54ccf71 7760
ca36f057
MM
7761 /* To find the complete object, we will first convert to our most
7762 primary base, and then add the offset in the vtbl to that value. */
7763 b = binfo;
9965d119 7764 while (CLASSTYPE_HAS_PRIMARY_BASE_P (BINFO_TYPE (b))
0cbd7506 7765 && !BINFO_LOST_PRIMARY_P (b))
b54ccf71 7766 {
c35cce41
MM
7767 tree primary_base;
7768
911a71a7 7769 primary_base = get_primary_binfo (b);
fc6633e0
NS
7770 gcc_assert (BINFO_PRIMARY_P (primary_base)
7771 && BINFO_INHERITANCE_CHAIN (primary_base) == b);
c35cce41 7772 b = primary_base;
b54ccf71 7773 }
73ea87d7 7774 offset = size_diffop (BINFO_OFFSET (vid->rtti_binfo), BINFO_OFFSET (b));
8f032717 7775
8fa33dfa
MM
7776 /* The second entry is the address of the typeinfo object. */
7777 if (flag_rtti)
7993382e 7778 decl = build_address (get_tinfo_decl (t));
ca36f057 7779 else
8fa33dfa 7780 decl = integer_zero_node;
c8094d83 7781
8fa33dfa
MM
7782 /* Convert the declaration to a type that can be stored in the
7783 vtable. */
7993382e 7784 init = build_nop (vfunc_ptr_type_node, decl);
911a71a7
MM
7785 *vid->last_init = build_tree_list (NULL_TREE, init);
7786 vid->last_init = &TREE_CHAIN (*vid->last_init);
8f032717 7787
78dcd41a
VR
7788 /* Add the offset-to-top entry. It comes earlier in the vtable than
7789 the typeinfo entry. Convert the offset to look like a
c4372ef4 7790 function pointer, so that we can put it in the vtable. */
7993382e 7791 init = build_nop (vfunc_ptr_type_node, offset);
c4372ef4
NS
7792 *vid->last_init = build_tree_list (NULL_TREE, init);
7793 vid->last_init = &TREE_CHAIN (*vid->last_init);
8f032717 7794}
0f59171d
RH
7795
7796/* Fold a OBJ_TYPE_REF expression to the address of a function.
7797 KNOWN_TYPE carries the true type of OBJ_TYPE_REF_OBJECT(REF). */
7798
7799tree
7800cp_fold_obj_type_ref (tree ref, tree known_type)
7801{
7802 HOST_WIDE_INT index = tree_low_cst (OBJ_TYPE_REF_TOKEN (ref), 1);
7803 HOST_WIDE_INT i = 0;
604a3205 7804 tree v = BINFO_VIRTUALS (TYPE_BINFO (known_type));
0f59171d
RH
7805 tree fndecl;
7806
7807 while (i != index)
7808 {
7809 i += (TARGET_VTABLE_USES_DESCRIPTORS
7810 ? TARGET_VTABLE_USES_DESCRIPTORS : 1);
7811 v = TREE_CHAIN (v);
7812 }
7813
7814 fndecl = BV_FN (v);
7815
7816#ifdef ENABLE_CHECKING
8dc2b103
NS
7817 gcc_assert (tree_int_cst_equal (OBJ_TYPE_REF_TOKEN (ref),
7818 DECL_VINDEX (fndecl)));
0f59171d
RH
7819#endif
7820
8634c649
JJ
7821 cgraph_node (fndecl)->local.vtable_method = true;
7822
0f59171d
RH
7823 return build_address (fndecl);
7824}
d7afec4b 7825
1b746b0f 7826#include "gt-cp-class.h"