fe7dee4700
GCC-2.6.1 COMES TO FREEBSD-current ---------------------------------- Everybody needs to 'make world'. Oakland, Nov 2nd 1994. In a surprise move this sunny afternoon, the release- engineer for the slightly delayed FreeBSD-2.0, Poul-Henning Kamp (28), decided to pull in the new version 2.6.1 of the GNU C-compiler. The new version of the compiler was release today at noon, and hardly 9 hours later it was committed into the FreeBSD-current source-repository. "It's is simply because we have had too much trouble with the version 2.6.0 of the compiler" Poul-Henning told the FreeBSD-Gazette, "we took a gamble when we decided to use that as our compiler for the 2.0 release, but it seems to pay of in the end now" he concludes. The move has not been discussed on the "core" list at all, and will come as a surprise for most Poul-Hennings peers. "I have only discussed it with Jordan [J. K. Hubbard, the FreeBSD's resident humourist], and we agreed that we needed to do it, so ... I did it!". After a breath he added with a grin: "My email will probably get an all time 'disk-full' now!". This will bring quite a flag-day to the FreeBSD developers, the patch-file is almost 1.4 Megabyte, and they will have to run "make world" to get entirely -current again. "Too bad, but we just had to do this." Was the only comment from Poul-Henning to these problems. When asked how this move would impact the 2.0 release-date, Poul-Hennings face grew dark, he mumbled some very Danish words while he moved his fingers in strange geometrical patterns. Immediately something ecclipsed the Sun, a minor tremor shook the buildings, and the temperature fell significantly. We decided not to pursure the question. ----------- JOB-SECTION ----------- Are you a dedicated GCC-hacker ? We BADLY need somebody to look at the 'freebsd' OS in gcc, sanitize it and carry the patches back to the GNU people. In particular, we need to get out of the "i386-only" spot we are in now. I have the stuff to take a gnu-dist into bmake-form, and will do that part. Please apply to phk@freebsd.org No Novice Need Apply.
3216 lines
93 KiB
C
3216 lines
93 KiB
C
/* Breadth-first and depth-first routines for
|
||
searching multiple-inheritance lattice for GNU C++.
|
||
Copyright (C) 1987, 1989, 1992, 1993 Free Software Foundation, Inc.
|
||
Contributed by Michael Tiemann (tiemann@cygnus.com)
|
||
|
||
This file is part of GNU CC.
|
||
|
||
GNU CC is free software; you can redistribute it and/or modify
|
||
it under the terms of the GNU General Public License as published by
|
||
the Free Software Foundation; either version 2, or (at your option)
|
||
any later version.
|
||
|
||
GNU CC is distributed in the hope that it will be useful,
|
||
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||
GNU General Public License for more details.
|
||
|
||
You should have received a copy of the GNU General Public License
|
||
along with GNU CC; see the file COPYING. If not, write to
|
||
the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA. */
|
||
|
||
/* High-level class interface. */
|
||
|
||
#include "config.h"
|
||
#include "tree.h"
|
||
#include <stdio.h>
|
||
#include "cp-tree.h"
|
||
#include "obstack.h"
|
||
#include "flags.h"
|
||
|
||
#define obstack_chunk_alloc xmalloc
|
||
#define obstack_chunk_free free
|
||
|
||
void init_search ();
|
||
extern struct obstack *current_obstack;
|
||
|
||
#include "stack.h"
|
||
|
||
/* Obstack used for remembering decision points of breadth-first. */
|
||
static struct obstack search_obstack;
|
||
|
||
/* Methods for pushing and popping objects to and from obstacks. */
|
||
struct stack_level *
|
||
push_stack_level (obstack, tp, size)
|
||
struct obstack *obstack;
|
||
char *tp; /* Sony NewsOS 5.0 compiler doesn't like void * here. */
|
||
int size;
|
||
{
|
||
struct stack_level *stack;
|
||
obstack_grow (obstack, tp, size);
|
||
stack = (struct stack_level *) ((char*)obstack_next_free (obstack) - size);
|
||
obstack_finish (obstack);
|
||
stack->obstack = obstack;
|
||
stack->first = (tree *) obstack_base (obstack);
|
||
stack->limit = obstack_room (obstack) / sizeof (tree *);
|
||
return stack;
|
||
}
|
||
|
||
struct stack_level *
|
||
pop_stack_level (stack)
|
||
struct stack_level *stack;
|
||
{
|
||
struct stack_level *tem = stack;
|
||
struct obstack *obstack = tem->obstack;
|
||
stack = tem->prev;
|
||
obstack_free (obstack, tem);
|
||
return stack;
|
||
}
|
||
|
||
#define search_level stack_level
|
||
static struct search_level *search_stack;
|
||
|
||
static tree lookup_field_1 ();
|
||
static int lookup_fnfields_1 ();
|
||
static void dfs_walk ();
|
||
static int markedp ();
|
||
static void dfs_unmark ();
|
||
static void dfs_init_vbase_pointers ();
|
||
|
||
static tree vbase_types;
|
||
static tree vbase_decl, vbase_decl_ptr;
|
||
static tree vbase_decl_ptr_intermediate;
|
||
static tree vbase_init_result;
|
||
|
||
/* Allocate a level of searching. */
|
||
static struct search_level *
|
||
push_search_level (stack, obstack)
|
||
struct stack_level *stack;
|
||
struct obstack *obstack;
|
||
{
|
||
struct search_level tem;
|
||
|
||
tem.prev = stack;
|
||
return push_stack_level (obstack, (char *)&tem, sizeof (tem));
|
||
}
|
||
|
||
/* Discard a level of search allocation. */
|
||
static struct search_level *
|
||
pop_search_level (obstack)
|
||
struct stack_level *obstack;
|
||
{
|
||
register struct search_level *stack = pop_stack_level (obstack);
|
||
|
||
return stack;
|
||
}
|
||
|
||
/* Search memoization. */
|
||
struct type_level
|
||
{
|
||
struct stack_level base;
|
||
|
||
/* First object allocated in obstack of entries. */
|
||
char *entries;
|
||
|
||
/* Number of types memoized in this context. */
|
||
int len;
|
||
|
||
/* Type being memoized; save this if we are saving
|
||
memoized contexts. */
|
||
tree type;
|
||
};
|
||
|
||
/* Obstack used for memoizing member and member function lookup. */
|
||
|
||
static struct obstack type_obstack, type_obstack_entries;
|
||
static struct type_level *type_stack;
|
||
static tree _vptr_name;
|
||
|
||
/* Make things that look like tree nodes, but allocate them
|
||
on type_obstack_entries. */
|
||
static int my_tree_node_counter;
|
||
static tree my_tree_cons (), my_build_string ();
|
||
|
||
extern int flag_memoize_lookups, flag_save_memoized_contexts;
|
||
|
||
/* Variables for gathering statistics. */
|
||
static int my_memoized_entry_counter;
|
||
static int memoized_fast_finds[2], memoized_adds[2], memoized_fast_rejects[2];
|
||
static int memoized_fields_searched[2];
|
||
static int n_fields_searched;
|
||
static int n_calls_lookup_field, n_calls_lookup_field_1;
|
||
static int n_calls_lookup_fnfields, n_calls_lookup_fnfields_1;
|
||
static int n_calls_get_base_type;
|
||
static int n_outer_fields_searched;
|
||
static int n_contexts_saved;
|
||
|
||
/* Local variables to help save memoization contexts. */
|
||
static tree prev_type_memoized;
|
||
static struct type_level *prev_type_stack;
|
||
|
||
/* This list is used by push_class_decls to know what decls need to
|
||
be pushed into class scope. */
|
||
static tree closed_envelopes = NULL_TREE;
|
||
|
||
/* Allocate a level of type memoization context. */
|
||
static struct type_level *
|
||
push_type_level (stack, obstack)
|
||
struct stack_level *stack;
|
||
struct obstack *obstack;
|
||
{
|
||
struct type_level tem;
|
||
|
||
tem.base.prev = stack;
|
||
|
||
obstack_finish (&type_obstack_entries);
|
||
tem.entries = (char *) obstack_base (&type_obstack_entries);
|
||
tem.len = 0;
|
||
tem.type = NULL_TREE;
|
||
|
||
return (struct type_level *)push_stack_level (obstack, (char *)&tem, sizeof (tem));
|
||
}
|
||
|
||
/* Discard a level of type memoization context. */
|
||
|
||
static struct type_level *
|
||
pop_type_level (stack)
|
||
struct type_level *stack;
|
||
{
|
||
obstack_free (&type_obstack_entries, stack->entries);
|
||
return (struct type_level *)pop_stack_level ((struct stack_level *)stack);
|
||
}
|
||
|
||
/* Make something that looks like a TREE_LIST, but
|
||
do it on the type_obstack_entries obstack. */
|
||
static tree
|
||
my_tree_cons (purpose, value, chain)
|
||
tree purpose, value, chain;
|
||
{
|
||
tree p = (tree)obstack_alloc (&type_obstack_entries, sizeof (struct tree_list));
|
||
++my_tree_node_counter;
|
||
TREE_TYPE (p) = NULL_TREE;
|
||
((HOST_WIDE_INT *)p)[3] = 0;
|
||
TREE_SET_CODE (p, TREE_LIST);
|
||
TREE_PURPOSE (p) = purpose;
|
||
TREE_VALUE (p) = value;
|
||
TREE_CHAIN (p) = chain;
|
||
return p;
|
||
}
|
||
|
||
static tree
|
||
my_build_string (str)
|
||
char *str;
|
||
{
|
||
tree p = (tree)obstack_alloc (&type_obstack_entries, sizeof (struct tree_string));
|
||
++my_tree_node_counter;
|
||
TREE_TYPE (p) = 0;
|
||
((int *)p)[3] = 0;
|
||
TREE_SET_CODE (p, STRING_CST);
|
||
TREE_STRING_POINTER (p) = str;
|
||
TREE_STRING_LENGTH (p) = strlen (str);
|
||
return p;
|
||
}
|
||
|
||
/* Memoizing machinery to make searches for multiple inheritance
|
||
reasonably efficient. */
|
||
#define MEMOIZE_HASHSIZE 8
|
||
typedef struct memoized_entry
|
||
{
|
||
struct memoized_entry *chain;
|
||
int uid;
|
||
tree data_members[MEMOIZE_HASHSIZE];
|
||
tree function_members[MEMOIZE_HASHSIZE];
|
||
} *ME;
|
||
|
||
#define MEMOIZED_CHAIN(ENTRY) (((ME)ENTRY)->chain)
|
||
#define MEMOIZED_UID(ENTRY) (((ME)ENTRY)->uid)
|
||
#define MEMOIZED_FIELDS(ENTRY,INDEX) (((ME)ENTRY)->data_members[INDEX])
|
||
#define MEMOIZED_FNFIELDS(ENTRY,INDEX) (((ME)ENTRY)->function_members[INDEX])
|
||
/* The following is probably a lousy hash function. */
|
||
#define MEMOIZED_HASH_FN(NODE) (((long)(NODE)>>4)&(MEMOIZE_HASHSIZE - 1))
|
||
|
||
static struct memoized_entry *
|
||
my_new_memoized_entry (chain)
|
||
struct memoized_entry *chain;
|
||
{
|
||
struct memoized_entry *p =
|
||
(struct memoized_entry *)obstack_alloc (&type_obstack_entries,
|
||
sizeof (struct memoized_entry));
|
||
bzero ((char *) p, sizeof (struct memoized_entry));
|
||
MEMOIZED_CHAIN (p) = chain;
|
||
MEMOIZED_UID (p) = ++my_memoized_entry_counter;
|
||
return p;
|
||
}
|
||
|
||
/* Make an entry in the memoized table for type TYPE
|
||
that the entry for NAME is FIELD. */
|
||
|
||
tree
|
||
make_memoized_table_entry (type, name, function_p)
|
||
tree type, name;
|
||
int function_p;
|
||
{
|
||
int index = MEMOIZED_HASH_FN (name);
|
||
tree entry, *prev_entry;
|
||
|
||
memoized_adds[function_p] += 1;
|
||
if (CLASSTYPE_MTABLE_ENTRY (type) == 0)
|
||
{
|
||
obstack_ptr_grow (&type_obstack, type);
|
||
obstack_blank (&type_obstack, sizeof (struct memoized_entry *));
|
||
CLASSTYPE_MTABLE_ENTRY (type) = (char *)my_new_memoized_entry ((struct memoized_entry *)0);
|
||
type_stack->len++;
|
||
if (type_stack->len * 2 >= type_stack->base.limit)
|
||
my_friendly_abort (88);
|
||
}
|
||
if (function_p)
|
||
prev_entry = &MEMOIZED_FNFIELDS (CLASSTYPE_MTABLE_ENTRY (type), index);
|
||
else
|
||
prev_entry = &MEMOIZED_FIELDS (CLASSTYPE_MTABLE_ENTRY (type), index);
|
||
|
||
entry = my_tree_cons (name, NULL_TREE, *prev_entry);
|
||
*prev_entry = entry;
|
||
|
||
/* Don't know the error message to give yet. */
|
||
TREE_TYPE (entry) = error_mark_node;
|
||
|
||
return entry;
|
||
}
|
||
|
||
/* When a new function or class context is entered, we build
|
||
a table of types which have been searched for members.
|
||
The table is an array (obstack) of types. When a type is
|
||
entered into the obstack, its CLASSTYPE_MTABLE_ENTRY
|
||
field is set to point to a new record, of type struct memoized_entry.
|
||
|
||
A non-NULL TREE_TYPE of the entry contains an access control error message.
|
||
|
||
The slots for the data members are arrays of tree nodes.
|
||
These tree nodes are lists, with the TREE_PURPOSE
|
||
of this list the known member name, and the TREE_VALUE
|
||
as the FIELD_DECL for the member.
|
||
|
||
For member functions, the TREE_PURPOSE is again the
|
||
name of the member functions for that class,
|
||
and the TREE_VALUE of the list is a pairs
|
||
whose TREE_PURPOSE is a member functions of this name,
|
||
and whose TREE_VALUE is a list of known argument lists this
|
||
member function has been called with. The TREE_TYPE of the pair,
|
||
if non-NULL, is an error message to print. */
|
||
|
||
/* Tell search machinery that we are entering a new context, and
|
||
to update tables appropriately.
|
||
|
||
TYPE is the type of the context we are entering, which can
|
||
be NULL_TREE if we are not in a class's scope.
|
||
|
||
USE_OLD, if nonzero tries to use previous context. */
|
||
void
|
||
push_memoized_context (type, use_old)
|
||
tree type;
|
||
int use_old;
|
||
{
|
||
int len;
|
||
tree *tem;
|
||
|
||
if (prev_type_stack)
|
||
{
|
||
if (use_old && prev_type_memoized == type)
|
||
{
|
||
#ifdef GATHER_STATISTICS
|
||
n_contexts_saved++;
|
||
#endif
|
||
type_stack = prev_type_stack;
|
||
prev_type_stack = 0;
|
||
|
||
tem = &type_stack->base.first[0];
|
||
len = type_stack->len;
|
||
while (len--)
|
||
CLASSTYPE_MTABLE_ENTRY (tem[len*2]) = (char *)tem[len*2+1];
|
||
return;
|
||
}
|
||
/* Otherwise, need to pop old stack here. */
|
||
type_stack = pop_type_level (prev_type_stack);
|
||
prev_type_memoized = 0;
|
||
prev_type_stack = 0;
|
||
}
|
||
|
||
type_stack = push_type_level ((struct stack_level *)type_stack,
|
||
&type_obstack);
|
||
type_stack->type = type;
|
||
}
|
||
|
||
/* Tell search machinery that we have left a context.
|
||
We do not currently save these contexts for later use.
|
||
If we wanted to, we could not use pop_search_level, since
|
||
poping that level allows the data we have collected to
|
||
be clobbered; a stack of obstacks would be needed. */
|
||
void
|
||
pop_memoized_context (use_old)
|
||
int use_old;
|
||
{
|
||
int len;
|
||
tree *tem = &type_stack->base.first[0];
|
||
|
||
if (! flag_save_memoized_contexts)
|
||
use_old = 0;
|
||
else if (use_old)
|
||
{
|
||
len = type_stack->len;
|
||
while (len--)
|
||
tem[len*2+1] = (tree)CLASSTYPE_MTABLE_ENTRY (tem[len*2]);
|
||
|
||
prev_type_stack = type_stack;
|
||
prev_type_memoized = type_stack->type;
|
||
}
|
||
|
||
if (flag_memoize_lookups)
|
||
{
|
||
len = type_stack->len;
|
||
while (len--)
|
||
CLASSTYPE_MTABLE_ENTRY (tem[len*2])
|
||
= (char *)MEMOIZED_CHAIN (CLASSTYPE_MTABLE_ENTRY (tem[len*2]));
|
||
}
|
||
if (! use_old)
|
||
type_stack = pop_type_level (type_stack);
|
||
else
|
||
type_stack = (struct type_level *)type_stack->base.prev;
|
||
}
|
||
|
||
#if 0 /* unused */
|
||
/* This is the newer recursive depth first search routine. */
|
||
/* Return non-zero if PARENT is directly derived from TYPE. By directly
|
||
we mean it's only one step up the inheritance lattice. We check this
|
||
by walking horizontally across the types that TYPE directly inherits
|
||
from, to see if PARENT is among them. This is used by get_binfo and
|
||
by compute_access. */
|
||
static int
|
||
immediately_derived (parent, type)
|
||
tree parent, type;
|
||
{
|
||
if (TYPE_BINFO (type))
|
||
{
|
||
tree binfos = BINFO_BASETYPES (TYPE_BINFO (type));
|
||
int i, n_baselinks = binfos ? TREE_VEC_LENGTH (binfos) : 0;
|
||
|
||
for (i = 0; i < n_baselinks; i++)
|
||
{
|
||
tree base_binfo = TREE_VEC_ELT (binfos, i);
|
||
|
||
if (parent == BINFO_TYPE (base_binfo))
|
||
return 1;
|
||
}
|
||
}
|
||
return 0;
|
||
}
|
||
#endif
|
||
|
||
/* Check whether the type given in BINFO is derived from PARENT. If
|
||
it isn't, return 0. If it is, but the derivation is MI-ambiguous
|
||
AND protect != 0, emit an error message and return error_mark_node.
|
||
|
||
Otherwise, if TYPE is derived from PARENT, return the actual base
|
||
information, unless a one of the protection violations below
|
||
occurs, in which case emit an error message and return error_mark_node.
|
||
|
||
If PROTECT is 1, then check if access to a public field of PARENT
|
||
would be private. Also check for ambiguity. */
|
||
|
||
tree
|
||
get_binfo (parent, binfo, protect)
|
||
register tree parent, binfo;
|
||
int protect;
|
||
{
|
||
tree type;
|
||
int dist;
|
||
tree rval = NULL_TREE;
|
||
|
||
if (TREE_CODE (parent) == TREE_VEC)
|
||
parent = BINFO_TYPE (parent);
|
||
/* unions cannot participate in inheritance relationships */
|
||
else if (TREE_CODE (parent) == UNION_TYPE)
|
||
return NULL_TREE;
|
||
else if (TREE_CODE (parent) != RECORD_TYPE)
|
||
my_friendly_abort (89);
|
||
|
||
if (TREE_CODE (binfo) == TREE_VEC)
|
||
type = BINFO_TYPE (binfo);
|
||
else if (TREE_CODE (binfo) == RECORD_TYPE)
|
||
type = binfo;
|
||
else if (TREE_CODE (binfo) == UNION_TYPE)
|
||
return NULL_TREE;
|
||
else
|
||
my_friendly_abort (90);
|
||
|
||
dist = get_base_distance (parent, binfo, protect, &rval);
|
||
|
||
if (dist == -3)
|
||
{
|
||
cp_error ("fields of `%T' are inaccessible in `%T' due to private inheritance",
|
||
parent, type);
|
||
return error_mark_node;
|
||
}
|
||
else if (dist == -2 && protect)
|
||
{
|
||
cp_error ("type `%T' is ambiguous base class for type `%T'", parent,
|
||
type);
|
||
return error_mark_node;
|
||
}
|
||
|
||
return rval;
|
||
}
|
||
|
||
/* This is the newer depth first get_base_distance routine. */
|
||
static int
|
||
get_base_distance_recursive (binfo, depth, is_private, basetype_path, rval,
|
||
rval_private_ptr, new_binfo_ptr, parent, path_ptr,
|
||
protect, via_virtual_ptr, via_virtual)
|
||
tree binfo, basetype_path, *new_binfo_ptr, parent, *path_ptr;
|
||
int *rval_private_ptr, depth, is_private, rval, protect, *via_virtual_ptr,
|
||
via_virtual;
|
||
{
|
||
tree binfos;
|
||
int i, n_baselinks;
|
||
|
||
if (BINFO_TYPE (binfo) == parent || binfo == parent)
|
||
{
|
||
if (rval == -1)
|
||
{
|
||
rval = depth;
|
||
*rval_private_ptr = is_private;
|
||
*new_binfo_ptr = binfo;
|
||
*via_virtual_ptr = via_virtual;
|
||
}
|
||
else
|
||
{
|
||
int same_object = (tree_int_cst_equal (BINFO_OFFSET (*new_binfo_ptr),
|
||
BINFO_OFFSET (binfo))
|
||
&& *via_virtual_ptr && via_virtual);
|
||
|
||
if (*via_virtual_ptr && via_virtual==0)
|
||
{
|
||
*rval_private_ptr = is_private;
|
||
*new_binfo_ptr = binfo;
|
||
*via_virtual_ptr = via_virtual;
|
||
}
|
||
else if (same_object)
|
||
{
|
||
if (*rval_private_ptr && ! is_private)
|
||
{
|
||
*rval_private_ptr = is_private;
|
||
*new_binfo_ptr = binfo;
|
||
*via_virtual_ptr = via_virtual;
|
||
}
|
||
return rval;
|
||
}
|
||
|
||
rval = -2;
|
||
}
|
||
return rval;
|
||
}
|
||
|
||
binfos = BINFO_BASETYPES (binfo);
|
||
n_baselinks = binfos ? TREE_VEC_LENGTH (binfos) : 0;
|
||
depth += 1;
|
||
|
||
/* Process base types. */
|
||
for (i = 0; i < n_baselinks; i++)
|
||
{
|
||
tree base_binfo = TREE_VEC_ELT (binfos, i);
|
||
|
||
/* Find any specific instance of a virtual base, when searching with
|
||
a binfo... */
|
||
if (BINFO_MARKED (base_binfo) == 0 || TREE_CODE (parent) == TREE_VEC)
|
||
{
|
||
int via_private
|
||
= (protect
|
||
&& (is_private
|
||
|| (!TREE_VIA_PUBLIC (base_binfo)
|
||
&& !is_friend (BINFO_TYPE (binfo), current_scope ()))));
|
||
int this_virtual = via_virtual || TREE_VIA_VIRTUAL (base_binfo);
|
||
int was;
|
||
|
||
/* When searching for a non-virtual, we cannot mark
|
||
virtually found binfos. */
|
||
if (! this_virtual)
|
||
SET_BINFO_MARKED (base_binfo);
|
||
|
||
#define WATCH_VALUES(rval, via_private) (rval == -1 ? 3 : via_private)
|
||
|
||
was = WATCH_VALUES (rval, *via_virtual_ptr);
|
||
rval = get_base_distance_recursive (base_binfo, depth, via_private,
|
||
binfo, rval, rval_private_ptr,
|
||
new_binfo_ptr, parent, path_ptr,
|
||
protect, via_virtual_ptr,
|
||
this_virtual);
|
||
/* watch for updates; only update if path is good. */
|
||
if (path_ptr && WATCH_VALUES (rval, *via_virtual_ptr) != was)
|
||
BINFO_INHERITANCE_CHAIN (base_binfo) = binfo;
|
||
if (rval == -2 && *via_virtual_ptr == 0)
|
||
return rval;
|
||
|
||
#undef WATCH_VALUES
|
||
|
||
}
|
||
}
|
||
|
||
return rval;
|
||
}
|
||
|
||
/* Return the number of levels between type PARENT and the type given
|
||
in BINFO, following the leftmost path to PARENT not found along a
|
||
virtual path, if there are no real PARENTs (all come from virtual
|
||
base classes), then follow the leftmost path to PARENT.
|
||
|
||
Return -1 if TYPE is not derived from PARENT.
|
||
Return -2 if PARENT is an ambiguous base class of TYPE, and PROTECT is
|
||
non-negative.
|
||
Return -3 if PARENT is private to TYPE, and PROTECT is non-zero.
|
||
|
||
If PATH_PTR is non-NULL, then also build the list of types
|
||
from PARENT to TYPE, with TREE_VIA_VIRUAL and TREE_VIA_PUBLIC
|
||
set.
|
||
|
||
PARENT can also be a binfo, in which case that exact parent is found
|
||
and no other. convert_pointer_to_real uses this functionality.
|
||
|
||
If BINFO is a binfo, its BINFO_INHERITANCE_CHAIN will be left alone. */
|
||
|
||
int
|
||
get_base_distance (parent, binfo, protect, path_ptr)
|
||
register tree parent, binfo;
|
||
int protect;
|
||
tree *path_ptr;
|
||
{
|
||
int rval;
|
||
int rval_private = 0;
|
||
tree type;
|
||
tree new_binfo = NULL_TREE;
|
||
int via_virtual;
|
||
int watch_access = protect;
|
||
|
||
if (TREE_CODE (parent) != TREE_VEC)
|
||
parent = TYPE_MAIN_VARIANT (parent);
|
||
|
||
if (TREE_CODE (binfo) == TREE_VEC)
|
||
type = BINFO_TYPE (binfo);
|
||
else if (IS_AGGR_TYPE_CODE (TREE_CODE (binfo)))
|
||
{
|
||
type = binfo;
|
||
binfo = TYPE_BINFO (type);
|
||
|
||
if (path_ptr)
|
||
BINFO_INHERITANCE_CHAIN (binfo) = NULL_TREE;
|
||
}
|
||
else
|
||
my_friendly_abort (92);
|
||
|
||
if (parent == type || parent == binfo)
|
||
{
|
||
/* If the distance is 0, then we don't really need
|
||
a path pointer, but we shouldn't let garbage go back. */
|
||
if (path_ptr)
|
||
*path_ptr = binfo;
|
||
return 0;
|
||
}
|
||
|
||
if (path_ptr)
|
||
watch_access = 1;
|
||
|
||
rval = get_base_distance_recursive (binfo, 0, 0, NULL_TREE, -1,
|
||
&rval_private, &new_binfo, parent,
|
||
path_ptr, watch_access, &via_virtual, 0);
|
||
|
||
dfs_walk (binfo, dfs_unmark, markedp);
|
||
|
||
/* Access restrictions don't count if we found an ambiguous basetype. */
|
||
if (rval == -2 && protect >= 0)
|
||
rval_private = 0;
|
||
|
||
if (rval && protect && rval_private)
|
||
return -3;
|
||
|
||
/* find real virtual base classes. */
|
||
if (rval == -1 && TREE_CODE (parent) == TREE_VEC
|
||
&& parent == binfo_member (BINFO_TYPE (parent),
|
||
CLASSTYPE_VBASECLASSES (type)))
|
||
{
|
||
BINFO_INHERITANCE_CHAIN (parent) = binfo;
|
||
new_binfo = parent;
|
||
rval = 1;
|
||
}
|
||
|
||
if (path_ptr)
|
||
*path_ptr = new_binfo;
|
||
return rval;
|
||
}
|
||
|
||
/* Search for a member with name NAME in a multiple inheritance lattice
|
||
specified by TYPE. If it does not exist, return NULL_TREE.
|
||
If the member is ambiguously referenced, return `error_mark_node'.
|
||
Otherwise, return the FIELD_DECL. */
|
||
|
||
/* Do a 1-level search for NAME as a member of TYPE. The caller must
|
||
figure out whether it can access this field. (Since it is only one
|
||
level, this is reasonable.) */
|
||
static tree
|
||
lookup_field_1 (type, name)
|
||
tree type, name;
|
||
{
|
||
register tree field = TYPE_FIELDS (type);
|
||
|
||
#ifdef GATHER_STATISTICS
|
||
n_calls_lookup_field_1++;
|
||
#endif
|
||
while (field)
|
||
{
|
||
#ifdef GATHER_STATISTICS
|
||
n_fields_searched++;
|
||
#endif
|
||
if (DECL_NAME (field) == NULL_TREE
|
||
&& TREE_CODE (TREE_TYPE (field)) == UNION_TYPE)
|
||
{
|
||
tree temp = lookup_field_1 (TREE_TYPE (field), name);
|
||
if (temp)
|
||
return temp;
|
||
}
|
||
if (DECL_NAME (field) == name)
|
||
{
|
||
if ((TREE_CODE(field) == VAR_DECL || TREE_CODE(field) == CONST_DECL)
|
||
&& DECL_ASSEMBLER_NAME (field) != NULL)
|
||
GNU_xref_ref(current_function_decl,
|
||
IDENTIFIER_POINTER (DECL_ASSEMBLER_NAME (field)));
|
||
return field;
|
||
}
|
||
field = TREE_CHAIN (field);
|
||
}
|
||
/* Not found. */
|
||
if (name == _vptr_name)
|
||
{
|
||
/* Give the user what s/he thinks s/he wants. */
|
||
if (TYPE_VIRTUAL_P (type))
|
||
return CLASSTYPE_VFIELD (type);
|
||
}
|
||
return NULL_TREE;
|
||
}
|
||
|
||
/* There are a number of cases we need to be aware of here:
|
||
current_class_type current_function_decl
|
||
* global NULL NULL
|
||
* fn-local NULL SET
|
||
* class-local SET NULL
|
||
* class->fn SET SET
|
||
* fn->class SET SET
|
||
|
||
Those last two make life interesting. If we're in a function which is
|
||
itself inside a class, we need decls to go into the fn's decls (our
|
||
second case below). But if we're in a class and the class itself is
|
||
inside a function, we need decls to go into the decls for the class. To
|
||
achieve this last goal, we must see if, when both current_class_decl and
|
||
current_function_decl are set, the class was declared inside that
|
||
function. If so, we know to put the decls into the class's scope. */
|
||
|
||
tree
|
||
current_scope ()
|
||
{
|
||
if (current_function_decl == NULL_TREE)
|
||
return current_class_type;
|
||
if (current_class_type == NULL_TREE)
|
||
return current_function_decl;
|
||
if (DECL_CLASS_CONTEXT (current_function_decl) == current_class_type)
|
||
return current_function_decl;
|
||
|
||
return current_class_type;
|
||
}
|
||
|
||
/* Compute the access of FIELD. This is done by computing
|
||
the access available to each type in BASETYPES (which comes
|
||
as a list of [via_public/basetype] in reverse order, namely base
|
||
class before derived class). The first one which defines a
|
||
access defines the access for the field. Otherwise, the
|
||
access of the field is that which occurs normally.
|
||
|
||
Uses global variables CURRENT_CLASS_TYPE and
|
||
CURRENT_FUNCTION_DECL to use friend relationships
|
||
if necessary.
|
||
|
||
This will be static when lookup_fnfield comes into this file.
|
||
|
||
access_public means that the field can be accessed by the current lexical
|
||
scope.
|
||
|
||
access_protected means that the field cannot be accessed by the current
|
||
lexical scope because it is protected.
|
||
|
||
access_private means that the field cannot be accessed by the current
|
||
lexical scope because it is private. */
|
||
|
||
#if 0
|
||
#define PUBLIC_RETURN return (DECL_PUBLIC (field) = 1), access_public
|
||
#define PROTECTED_RETURN return (DECL_PROTECTED (field) = 1), access_protected
|
||
#define PRIVATE_RETURN return (DECL_PRIVATE (field) = 1), access_private
|
||
#else
|
||
#define PUBLIC_RETURN return access_public
|
||
#define PROTECTED_RETURN return access_protected
|
||
#define PRIVATE_RETURN return access_private
|
||
#endif
|
||
|
||
#if 0
|
||
/* Disabled with DECL_PUBLIC &c. */
|
||
static tree previous_scope = NULL_TREE;
|
||
#endif
|
||
|
||
enum access_type
|
||
compute_access (basetype_path, field)
|
||
tree basetype_path, field;
|
||
{
|
||
enum access_type access;
|
||
tree types;
|
||
tree context;
|
||
int protected_ok, via_protected;
|
||
extern int flag_access_control;
|
||
#if 1
|
||
/* Replaces static decl above. */
|
||
tree previous_scope;
|
||
#endif
|
||
int static_mem =
|
||
((TREE_CODE (field) == FUNCTION_DECL && DECL_STATIC_FUNCTION_P (field))
|
||
|| (TREE_CODE (field) != FUNCTION_DECL && TREE_STATIC (field)));
|
||
|
||
if (! flag_access_control)
|
||
return access_public;
|
||
|
||
/* The field lives in the current class. */
|
||
if (BINFO_TYPE (basetype_path) == current_class_type)
|
||
return access_public;
|
||
|
||
#if 0
|
||
/* Disabled until pushing function scope clears these out. If ever. */
|
||
/* Make these special cases fast. */
|
||
if (current_scope () == previous_scope)
|
||
{
|
||
if (DECL_PUBLIC (field))
|
||
return access_public;
|
||
if (DECL_PROTECTED (field))
|
||
return access_protected;
|
||
if (DECL_PRIVATE (field))
|
||
return access_private;
|
||
}
|
||
#endif
|
||
|
||
previous_scope = current_scope ();
|
||
|
||
context = DECL_CLASS_CONTEXT (field);
|
||
if (context == NULL_TREE)
|
||
context = DECL_CONTEXT (field);
|
||
|
||
/* Fields coming from nested anonymous unions have their DECL_CLASS_CONTEXT
|
||
slot set to the union type rather than the record type containing
|
||
the anonymous union. In this case, DECL_FIELD_CONTEXT is correct. */
|
||
if (context && TREE_CODE (context) == UNION_TYPE
|
||
&& ANON_AGGRNAME_P (TYPE_IDENTIFIER (context)))
|
||
context = DECL_FIELD_CONTEXT (field);
|
||
|
||
/* Virtual function tables are never private. But we should know that
|
||
we are looking for this, and not even try to hide it. */
|
||
if (DECL_NAME (field) && VFIELD_NAME_P (DECL_NAME (field)) == 1)
|
||
PUBLIC_RETURN;
|
||
|
||
/* Member found immediately within object. */
|
||
if (BINFO_INHERITANCE_CHAIN (basetype_path) == NULL_TREE)
|
||
{
|
||
/* Are we (or an enclosing scope) friends with the class that has
|
||
FIELD? */
|
||
if (is_friend (context, previous_scope))
|
||
PUBLIC_RETURN;
|
||
|
||
/* If it's private, it's private, you letch. */
|
||
if (TREE_PRIVATE (field))
|
||
PRIVATE_RETURN;
|
||
|
||
/* ARM $11.5. Member functions of a derived class can access the
|
||
non-static protected members of a base class only through a
|
||
pointer to the derived class, a reference to it, or an object
|
||
of it. Also any subsequently derived classes also have
|
||
access. */
|
||
else if (TREE_PROTECTED (field))
|
||
{
|
||
if (current_class_type
|
||
&& static_mem
|
||
&& ACCESSIBLY_DERIVED_FROM_P (context, current_class_type))
|
||
PUBLIC_RETURN;
|
||
else
|
||
PROTECTED_RETURN;
|
||
}
|
||
else
|
||
PUBLIC_RETURN;
|
||
}
|
||
|
||
/* must reverse more than one element */
|
||
basetype_path = reverse_path (basetype_path);
|
||
types = basetype_path;
|
||
via_protected = 0;
|
||
access = access_default;
|
||
protected_ok = static_mem && current_class_type
|
||
&& ACCESSIBLY_DERIVED_FROM_P (BINFO_TYPE (types), current_class_type);
|
||
|
||
while (1)
|
||
{
|
||
tree member;
|
||
tree binfo = types;
|
||
tree type = BINFO_TYPE (binfo);
|
||
int private_ok = 0;
|
||
|
||
/* Friends of a class can see protected members of its bases.
|
||
Note that classes are their own friends. */
|
||
if (is_friend (type, previous_scope))
|
||
{
|
||
protected_ok = 1;
|
||
private_ok = 1;
|
||
}
|
||
|
||
member = purpose_member (type, DECL_ACCESS (field));
|
||
if (member)
|
||
{
|
||
access = (enum access_type) TREE_VALUE (member);
|
||
break;
|
||
}
|
||
|
||
types = BINFO_INHERITANCE_CHAIN (types);
|
||
|
||
/* If the next type was VIA_PROTECTED, then fields of all remaining
|
||
classes past that one are *at least* protected. */
|
||
if (types)
|
||
{
|
||
if (TREE_VIA_PROTECTED (types))
|
||
via_protected = 1;
|
||
else if (! TREE_VIA_PUBLIC (types) && ! private_ok)
|
||
{
|
||
access = access_private;
|
||
break;
|
||
}
|
||
}
|
||
else
|
||
break;
|
||
}
|
||
reverse_path (basetype_path);
|
||
|
||
/* No special visibilities apply. Use normal rules. */
|
||
|
||
if (access == access_default)
|
||
{
|
||
if (is_friend (context, previous_scope))
|
||
access = access_public;
|
||
else if (TREE_PRIVATE (field))
|
||
access = access_private;
|
||
else if (TREE_PROTECTED (field))
|
||
access = access_protected;
|
||
else
|
||
access = access_public;
|
||
}
|
||
|
||
if (access == access_public && via_protected)
|
||
access = access_protected;
|
||
|
||
if (access == access_protected && protected_ok)
|
||
access = access_public;
|
||
|
||
#if 0
|
||
if (access == access_public)
|
||
DECL_PUBLIC (field) = 1;
|
||
else if (access == access_protected)
|
||
DECL_PROTECTED (field) = 1;
|
||
else if (access == access_private)
|
||
DECL_PRIVATE (field) = 1;
|
||
else my_friendly_abort (96);
|
||
#endif
|
||
return access;
|
||
}
|
||
|
||
/* Routine to see if the sub-object denoted by the binfo PARENT can be
|
||
found as a base class and sub-object of the object denoted by
|
||
BINFO. This routine relies upon binfos not being shared, except
|
||
for binfos for virtual bases. */
|
||
static int
|
||
is_subobject_of_p (parent, binfo)
|
||
tree parent, binfo;
|
||
{
|
||
tree binfos = BINFO_BASETYPES (binfo);
|
||
int i, n_baselinks = binfos ? TREE_VEC_LENGTH (binfos) : 0;
|
||
|
||
if (parent == binfo)
|
||
return 1;
|
||
|
||
/* Process and/or queue base types. */
|
||
for (i = 0; i < n_baselinks; i++)
|
||
{
|
||
tree base_binfo = TREE_VEC_ELT (binfos, i);
|
||
if (TREE_VIA_VIRTUAL (base_binfo))
|
||
base_binfo = TYPE_BINFO (BINFO_TYPE (base_binfo));
|
||
if (is_subobject_of_p (parent, base_binfo))
|
||
return 1;
|
||
}
|
||
return 0;
|
||
}
|
||
|
||
/* See if a one FIELD_DECL hides another. This routine is meant to
|
||
correspond to ANSI working paper Sept 17, 1992 10p4. The two
|
||
binfos given are the binfos corresponding to the particular places
|
||
the FIELD_DECLs are found. This routine relies upon binfos not
|
||
being shared, except for virtual bases. */
|
||
static int
|
||
hides (hider_binfo, hidee_binfo)
|
||
tree hider_binfo, hidee_binfo;
|
||
{
|
||
/* hider hides hidee, if hider has hidee as a base class and
|
||
the instance of hidee is a sub-object of hider. The first
|
||
part is always true is the second part is true.
|
||
|
||
When hider and hidee are the same (two ways to get to the exact
|
||
same member) we consider either one as hiding the other. */
|
||
return is_subobject_of_p (hidee_binfo, hider_binfo);
|
||
}
|
||
|
||
/* Very similar to lookup_fnfields_1 but it ensures that at least one
|
||
function was declared inside the class given by TYPE. It really should
|
||
only return functions that match the given TYPE. */
|
||
static int
|
||
lookup_fnfields_here (type, name)
|
||
tree type, name;
|
||
{
|
||
int index = lookup_fnfields_1 (type, name);
|
||
tree fndecls;
|
||
|
||
if (index <= 0)
|
||
return index;
|
||
fndecls = TREE_VEC_ELT (CLASSTYPE_METHOD_VEC (type), index);
|
||
while (fndecls)
|
||
{
|
||
if (TYPE_MAIN_VARIANT (DECL_CLASS_CONTEXT (fndecls))
|
||
== TYPE_MAIN_VARIANT (type))
|
||
return index;
|
||
fndecls = TREE_CHAIN (fndecls);
|
||
}
|
||
return -1;
|
||
}
|
||
|
||
/* Look for a field named NAME in an inheritance lattice dominated by
|
||
XBASETYPE. PROTECT is zero if we can avoid computing access
|
||
information, otherwise it is 1. WANT_TYPE is 1 when we should only
|
||
return TYPE_DECLs, if no TYPE_DECL can be found return NULL_TREE.
|
||
|
||
It was not clear what should happen if WANT_TYPE is set, and an
|
||
ambiguity is found. At least one use (lookup_name) to not see
|
||
the error. */
|
||
tree
|
||
lookup_field (xbasetype, name, protect, want_type)
|
||
register tree xbasetype, name;
|
||
int protect, want_type;
|
||
{
|
||
int head = 0, tail = 0;
|
||
tree rval, rval_binfo = NULL_TREE, rval_binfo_h;
|
||
tree type, basetype_chain, basetype_path;
|
||
enum access_type this_v = access_default;
|
||
tree entry, binfo, binfo_h;
|
||
enum access_type own_access = access_default;
|
||
int vbase_name_p = VBASE_NAME_P (name);
|
||
|
||
/* rval_binfo is the binfo associated with the found member, note,
|
||
this can be set with useful information, even when rval is not
|
||
set, because it must deal with ALL members, not just non-function
|
||
members. It is used for ambiguity checking and the hidden
|
||
checks. Whereas rval is only set if a proper (not hidden)
|
||
non-function member is found. */
|
||
|
||
/* rval_binfo_h and binfo_h are binfo values used when we perform the
|
||
hiding checks, as virtual base classes may not be shared. The strategy
|
||
is we always go into the the binfo hierarchy owned by TYPE_BINFO of
|
||
virtual base classes, as we cross virtual base class lines. This way
|
||
we know that binfo of a virtual base class will always == itself when
|
||
found along any line. (mrs) */
|
||
|
||
char *errstr = 0;
|
||
|
||
/* Set this to nonzero if we don't know how to compute
|
||
accurate error messages for access control. */
|
||
int index = MEMOIZED_HASH_FN (name);
|
||
|
||
/* If we are looking for a constructor in a templated type, use the
|
||
unspecialized name, as that is how we store it. */
|
||
if (IDENTIFIER_TEMPLATE (name))
|
||
name = constructor_name (name);
|
||
|
||
if (TREE_CODE (xbasetype) == TREE_VEC)
|
||
{
|
||
type = BINFO_TYPE (xbasetype);
|
||
basetype_path = xbasetype;
|
||
}
|
||
else if (IS_AGGR_TYPE_CODE (TREE_CODE (xbasetype)))
|
||
{
|
||
type = xbasetype;
|
||
basetype_path = TYPE_BINFO (xbasetype);
|
||
BINFO_VIA_PUBLIC (basetype_path) = 1;
|
||
BINFO_INHERITANCE_CHAIN (basetype_path) = NULL_TREE;
|
||
}
|
||
else my_friendly_abort (97);
|
||
|
||
if (CLASSTYPE_MTABLE_ENTRY (type))
|
||
{
|
||
tree tem = MEMOIZED_FIELDS (CLASSTYPE_MTABLE_ENTRY (type), index);
|
||
|
||
while (tem && TREE_PURPOSE (tem) != name)
|
||
{
|
||
memoized_fields_searched[0]++;
|
||
tem = TREE_CHAIN (tem);
|
||
}
|
||
if (tem)
|
||
{
|
||
if (protect && TREE_TYPE (tem))
|
||
{
|
||
error (TREE_STRING_POINTER (TREE_TYPE (tem)),
|
||
IDENTIFIER_POINTER (name),
|
||
TYPE_NAME_STRING (DECL_FIELD_CONTEXT (TREE_VALUE (tem))));
|
||
return error_mark_node;
|
||
}
|
||
if (TREE_VALUE (tem) == NULL_TREE)
|
||
memoized_fast_rejects[0] += 1;
|
||
else
|
||
memoized_fast_finds[0] += 1;
|
||
return TREE_VALUE (tem);
|
||
}
|
||
}
|
||
|
||
#ifdef GATHER_STATISTICS
|
||
n_calls_lookup_field++;
|
||
#endif
|
||
if (protect && flag_memoize_lookups && ! global_bindings_p ())
|
||
entry = make_memoized_table_entry (type, name, 0);
|
||
else
|
||
entry = 0;
|
||
|
||
rval = lookup_field_1 (type, name);
|
||
if (rval || lookup_fnfields_here (type, name)>=0)
|
||
{
|
||
rval_binfo = basetype_path;
|
||
rval_binfo_h = rval_binfo;
|
||
}
|
||
|
||
if (rval && TREE_CODE (rval) != TYPE_DECL && want_type)
|
||
rval = NULL_TREE;
|
||
|
||
if (rval)
|
||
{
|
||
if (protect)
|
||
{
|
||
if (TREE_PRIVATE (rval) | TREE_PROTECTED (rval))
|
||
this_v = compute_access (basetype_path, rval);
|
||
if (TREE_CODE (rval) == CONST_DECL)
|
||
{
|
||
if (this_v == access_private)
|
||
errstr = "enum `%D' is a private value of class `%T'";
|
||
else if (this_v == access_protected)
|
||
errstr = "enum `%D' is a protected value of class `%T'";
|
||
}
|
||
else
|
||
{
|
||
if (this_v == access_private)
|
||
errstr = "member `%D' is a private member of class `%T'";
|
||
else if (this_v == access_protected)
|
||
errstr = "member `%D' is a protected member of class `%T'";
|
||
}
|
||
}
|
||
|
||
if (entry)
|
||
{
|
||
if (errstr)
|
||
{
|
||
/* This depends on behavior of lookup_field_1! */
|
||
tree error_string = my_build_string (errstr);
|
||
TREE_TYPE (entry) = error_string;
|
||
}
|
||
else
|
||
{
|
||
/* Let entry know there is no problem with this access. */
|
||
TREE_TYPE (entry) = NULL_TREE;
|
||
}
|
||
TREE_VALUE (entry) = rval;
|
||
}
|
||
|
||
if (errstr && protect)
|
||
{
|
||
cp_error (errstr, name, type);
|
||
return error_mark_node;
|
||
}
|
||
return rval;
|
||
}
|
||
|
||
basetype_chain = build_tree_list (NULL_TREE, basetype_path);
|
||
TREE_VIA_PUBLIC (basetype_chain) = TREE_VIA_PUBLIC (basetype_path);
|
||
TREE_VIA_PROTECTED (basetype_chain) = TREE_VIA_PROTECTED (basetype_path);
|
||
TREE_VIA_VIRTUAL (basetype_chain) = TREE_VIA_VIRTUAL (basetype_path);
|
||
|
||
/* The ambiguity check relies upon breadth first searching. */
|
||
|
||
search_stack = push_search_level (search_stack, &search_obstack);
|
||
binfo = basetype_path;
|
||
binfo_h = binfo;
|
||
|
||
while (1)
|
||
{
|
||
tree binfos = BINFO_BASETYPES (binfo);
|
||
int i, n_baselinks = binfos ? TREE_VEC_LENGTH (binfos) : 0;
|
||
tree nval;
|
||
|
||
/* Process and/or queue base types. */
|
||
for (i = 0; i < n_baselinks; i++)
|
||
{
|
||
tree base_binfo = TREE_VEC_ELT (binfos, i);
|
||
if (BINFO_FIELDS_MARKED (base_binfo) == 0)
|
||
{
|
||
tree btypes;
|
||
|
||
SET_BINFO_FIELDS_MARKED (base_binfo);
|
||
btypes = my_tree_cons (NULL_TREE, base_binfo, basetype_chain);
|
||
TREE_VIA_PUBLIC (btypes) = TREE_VIA_PUBLIC (base_binfo);
|
||
TREE_VIA_PROTECTED (btypes) = TREE_VIA_PROTECTED (base_binfo);
|
||
TREE_VIA_VIRTUAL (btypes) = TREE_VIA_VIRTUAL (base_binfo);
|
||
if (TREE_VIA_VIRTUAL (base_binfo))
|
||
btypes = tree_cons (NULL_TREE,
|
||
TYPE_BINFO (BINFO_TYPE (TREE_VEC_ELT (BINFO_BASETYPES (binfo_h), i))),
|
||
btypes);
|
||
else
|
||
btypes = tree_cons (NULL_TREE,
|
||
TREE_VEC_ELT (BINFO_BASETYPES (binfo_h), i),
|
||
btypes);
|
||
obstack_ptr_grow (&search_obstack, btypes);
|
||
tail += 1;
|
||
if (tail >= search_stack->limit)
|
||
my_friendly_abort (98);
|
||
}
|
||
}
|
||
|
||
/* Process head of queue, if one exists. */
|
||
if (head >= tail)
|
||
break;
|
||
|
||
basetype_chain = search_stack->first[head++];
|
||
binfo_h = TREE_VALUE (basetype_chain);
|
||
basetype_chain = TREE_CHAIN (basetype_chain);
|
||
basetype_path = TREE_VALUE (basetype_chain);
|
||
if (TREE_CHAIN (basetype_chain))
|
||
BINFO_INHERITANCE_CHAIN (basetype_path) = TREE_VALUE (TREE_CHAIN (basetype_chain));
|
||
else
|
||
BINFO_INHERITANCE_CHAIN (basetype_path) = NULL_TREE;
|
||
|
||
binfo = basetype_path;
|
||
type = BINFO_TYPE (binfo);
|
||
|
||
/* See if we can find NAME in TYPE. If RVAL is nonzero,
|
||
and we do find NAME in TYPE, verify that such a second
|
||
sighting is in fact legal. */
|
||
|
||
nval = lookup_field_1 (type, name);
|
||
|
||
if (nval || lookup_fnfields_here (type, name)>=0)
|
||
{
|
||
if (nval && nval == rval && SHARED_MEMBER_P (nval))
|
||
{
|
||
/* This is ok, the member found is the same [class.ambig] */
|
||
}
|
||
else if (rval_binfo && hides (rval_binfo_h, binfo_h))
|
||
{
|
||
/* This is ok, the member found is in rval_binfo, not
|
||
here (binfo). */
|
||
}
|
||
else if (rval_binfo==NULL_TREE || hides (binfo_h, rval_binfo_h))
|
||
{
|
||
/* This is ok, the member found is here (binfo), not in
|
||
rval_binfo. */
|
||
if (nval)
|
||
{
|
||
rval = nval;
|
||
if (entry || protect)
|
||
this_v = compute_access (basetype_path, rval);
|
||
/* These may look ambiguous, but they really are not. */
|
||
if (vbase_name_p)
|
||
break;
|
||
}
|
||
else
|
||
{
|
||
/* Undo finding it before, as something else hides it. */
|
||
rval = NULL_TREE;
|
||
}
|
||
rval_binfo = binfo;
|
||
rval_binfo_h = binfo_h;
|
||
}
|
||
else
|
||
{
|
||
/* This is ambiguous. */
|
||
errstr = "request for member `%D' is ambiguous";
|
||
protect = 2;
|
||
break;
|
||
}
|
||
}
|
||
}
|
||
{
|
||
tree *tp = search_stack->first;
|
||
tree *search_tail = tp + tail;
|
||
|
||
if (entry)
|
||
TREE_VALUE (entry) = rval;
|
||
|
||
if (want_type && (rval == NULL_TREE || TREE_CODE (rval) != TYPE_DECL))
|
||
{
|
||
rval = NULL_TREE;
|
||
errstr = 0;
|
||
}
|
||
|
||
/* If this FIELD_DECL defines its own access level, deal with that. */
|
||
if (rval && errstr == 0
|
||
&& ((protect&1) || entry)
|
||
&& DECL_LANG_SPECIFIC (rval)
|
||
&& DECL_ACCESS (rval))
|
||
{
|
||
while (tp < search_tail)
|
||
{
|
||
/* If is possible for one of the derived types on the path to
|
||
have defined special access for this field. Look for such
|
||
declarations and report an error if a conflict is found. */
|
||
enum access_type new_v;
|
||
|
||
if (this_v != access_default)
|
||
new_v = compute_access (TREE_VALUE (TREE_CHAIN (*tp)), rval);
|
||
if (this_v != access_default && new_v != this_v)
|
||
{
|
||
errstr = "conflicting access to member `%D'";
|
||
this_v = access_default;
|
||
}
|
||
own_access = new_v;
|
||
CLEAR_BINFO_FIELDS_MARKED (TREE_VALUE (TREE_CHAIN (*tp)));
|
||
tp += 1;
|
||
}
|
||
}
|
||
else
|
||
{
|
||
while (tp < search_tail)
|
||
{
|
||
CLEAR_BINFO_FIELDS_MARKED (TREE_VALUE (TREE_CHAIN (*tp)));
|
||
tp += 1;
|
||
}
|
||
}
|
||
}
|
||
search_stack = pop_search_level (search_stack);
|
||
|
||
if (errstr == 0)
|
||
{
|
||
if (own_access == access_private)
|
||
errstr = "member `%D' declared private";
|
||
else if (own_access == access_protected)
|
||
errstr = "member `%D' declared protected";
|
||
else if (this_v == access_private)
|
||
errstr = TREE_PRIVATE (rval)
|
||
? "member `%D' is private"
|
||
: "member `%D' is from private base class";
|
||
else if (this_v == access_protected)
|
||
errstr = TREE_PROTECTED (rval)
|
||
? "member `%D' is protected"
|
||
: "member `%D' is from protected base class";
|
||
}
|
||
|
||
if (entry)
|
||
{
|
||
if (errstr)
|
||
{
|
||
tree error_string = my_build_string (errstr);
|
||
/* Save error message with entry. */
|
||
TREE_TYPE (entry) = error_string;
|
||
}
|
||
else
|
||
{
|
||
/* Mark entry as having no error string. */
|
||
TREE_TYPE (entry) = NULL_TREE;
|
||
}
|
||
}
|
||
|
||
if (errstr && protect)
|
||
{
|
||
cp_error (errstr, name, type);
|
||
rval = error_mark_node;
|
||
}
|
||
return rval;
|
||
}
|
||
|
||
/* Try to find NAME inside a nested class. */
|
||
tree
|
||
lookup_nested_field (name, complain)
|
||
tree name;
|
||
int complain;
|
||
{
|
||
register tree t;
|
||
|
||
tree id = NULL_TREE;
|
||
if (TREE_CHAIN (current_class_type))
|
||
{
|
||
/* Climb our way up the nested ladder, seeing if we're trying to
|
||
modify a field in an enclosing class. If so, we should only
|
||
be able to modify if it's static. */
|
||
for (t = TREE_CHAIN (current_class_type);
|
||
t && DECL_CONTEXT (t);
|
||
t = TREE_CHAIN (DECL_CONTEXT (t)))
|
||
{
|
||
if (TREE_CODE (DECL_CONTEXT (t)) != RECORD_TYPE)
|
||
break;
|
||
|
||
/* N.B.: lookup_field will do the access checking for us */
|
||
id = lookup_field (DECL_CONTEXT (t), name, complain, 0);
|
||
if (id == error_mark_node)
|
||
{
|
||
id = NULL_TREE;
|
||
continue;
|
||
}
|
||
|
||
if (id != NULL_TREE)
|
||
{
|
||
if (TREE_CODE (id) == FIELD_DECL
|
||
&& ! TREE_STATIC (id)
|
||
&& TREE_TYPE (id) != error_mark_node)
|
||
{
|
||
if (complain)
|
||
{
|
||
/* At parse time, we don't want to give this error, since
|
||
we won't have enough state to make this kind of
|
||
decision properly. But there are times (e.g., with
|
||
enums in nested classes) when we do need to call
|
||
this fn at parse time. So, in those cases, we pass
|
||
complain as a 0 and just return a NULL_TREE. */
|
||
error ("assignment to non-static member `%s' of enclosing class `%s'",
|
||
lang_printable_name (id),
|
||
IDENTIFIER_POINTER (TYPE_IDENTIFIER
|
||
(DECL_CONTEXT (t))));
|
||
/* Mark this for do_identifier(). It would otherwise
|
||
claim that the variable was undeclared. */
|
||
TREE_TYPE (id) = error_mark_node;
|
||
}
|
||
else
|
||
{
|
||
id = NULL_TREE;
|
||
continue;
|
||
}
|
||
}
|
||
break;
|
||
}
|
||
}
|
||
}
|
||
|
||
return id;
|
||
}
|
||
|
||
/* TYPE is a class type. Return the index of the fields within
|
||
the method vector with name NAME, or -1 is no such field exists. */
|
||
static int
|
||
lookup_fnfields_1 (type, name)
|
||
tree type, name;
|
||
{
|
||
register tree method_vec = CLASSTYPE_METHOD_VEC (type);
|
||
|
||
if (method_vec != 0)
|
||
{
|
||
register tree *methods = &TREE_VEC_ELT (method_vec, 0);
|
||
register tree *end = TREE_VEC_END (method_vec);
|
||
|
||
#ifdef GATHER_STATISTICS
|
||
n_calls_lookup_fnfields_1++;
|
||
#endif
|
||
if (*methods && name == constructor_name (type))
|
||
return 0;
|
||
|
||
while (++methods != end)
|
||
{
|
||
#ifdef GATHER_STATISTICS
|
||
n_outer_fields_searched++;
|
||
#endif
|
||
if (DECL_NAME (*methods) == name)
|
||
break;
|
||
}
|
||
if (methods != end)
|
||
return methods - &TREE_VEC_ELT (method_vec, 0);
|
||
}
|
||
|
||
return -1;
|
||
}
|
||
|
||
/* Starting from BASETYPE, return a TREE_BASELINK-like object
|
||
which gives the following information (in a list):
|
||
|
||
TREE_TYPE: list of basetypes needed to get to...
|
||
TREE_VALUE: list of all functions in of given type
|
||
which have name NAME.
|
||
|
||
No access information is computed by this function,
|
||
other then to adorn the list of basetypes with
|
||
TREE_VIA_PUBLIC.
|
||
|
||
If there are two ways to find a name (two members), if COMPLAIN is
|
||
non-zero, then error_mark_node is returned, and an error message is
|
||
printed, otherwise, just an error_mark_node is returned.
|
||
|
||
As a special case, is COMPLAIN is -1, we don't complain, and we
|
||
don't return error_mark_node, but rather the complete list of
|
||
virtuals. This is used by get_virtuals_named_this. */
|
||
tree
|
||
lookup_fnfields (basetype_path, name, complain)
|
||
tree basetype_path, name;
|
||
int complain;
|
||
{
|
||
int head = 0, tail = 0;
|
||
tree type, rval, rval_binfo = NULL_TREE, rvals = NULL_TREE, rval_binfo_h;
|
||
tree entry, binfo, basetype_chain, binfo_h;
|
||
int find_all = 0;
|
||
|
||
/* rval_binfo is the binfo associated with the found member, note,
|
||
this can be set with useful information, even when rval is not
|
||
set, because it must deal with ALL members, not just function
|
||
members. It is used for ambiguity checking and the hidden
|
||
checks. Whereas rval is only set if a proper (not hidden)
|
||
function member is found. */
|
||
|
||
/* rval_binfo_h and binfo_h are binfo values used when we perform the
|
||
hiding checks, as virtual base classes may not be shared. The strategy
|
||
is we always go into the the binfo hierarchy owned by TYPE_BINFO of
|
||
virtual base classes, as we cross virtual base class lines. This way
|
||
we know that binfo of a virtual base class will always == itself when
|
||
found along any line. (mrs) */
|
||
|
||
/* For now, don't try this. */
|
||
int protect = complain;
|
||
|
||
char *errstr = 0;
|
||
|
||
/* Set this to nonzero if we don't know how to compute
|
||
accurate error messages for access control. */
|
||
int index = MEMOIZED_HASH_FN (name);
|
||
|
||
if (complain == -1)
|
||
{
|
||
find_all = 1;
|
||
protect = complain = 0;
|
||
}
|
||
|
||
/* If we are looking for a constructor in a templated type, use the
|
||
unspecialized name, as that is how we store it. */
|
||
if (IDENTIFIER_TEMPLATE (name))
|
||
name = constructor_name (name);
|
||
|
||
binfo = basetype_path;
|
||
binfo_h = binfo;
|
||
type = BINFO_TYPE (basetype_path);
|
||
|
||
/* The memoization code is in need of maintenance. */
|
||
if (!find_all && CLASSTYPE_MTABLE_ENTRY (type))
|
||
{
|
||
tree tem = MEMOIZED_FNFIELDS (CLASSTYPE_MTABLE_ENTRY (type), index);
|
||
|
||
while (tem && TREE_PURPOSE (tem) != name)
|
||
{
|
||
memoized_fields_searched[1]++;
|
||
tem = TREE_CHAIN (tem);
|
||
}
|
||
if (tem)
|
||
{
|
||
if (protect && TREE_TYPE (tem))
|
||
{
|
||
error (TREE_STRING_POINTER (TREE_TYPE (tem)),
|
||
IDENTIFIER_POINTER (name),
|
||
TYPE_NAME_STRING (DECL_CLASS_CONTEXT (TREE_VALUE (TREE_VALUE (tem)))));
|
||
return error_mark_node;
|
||
}
|
||
if (TREE_VALUE (tem) == NULL_TREE)
|
||
{
|
||
memoized_fast_rejects[1] += 1;
|
||
return NULL_TREE;
|
||
}
|
||
else
|
||
{
|
||
/* Want to return this, but we must make sure
|
||
that access information is consistent. */
|
||
tree baselink = TREE_VALUE (tem);
|
||
tree memoized_basetypes = TREE_PURPOSE (baselink);
|
||
tree these_basetypes = basetype_path;
|
||
while (memoized_basetypes && these_basetypes)
|
||
{
|
||
memoized_fields_searched[1]++;
|
||
if (TREE_VALUE (memoized_basetypes) != these_basetypes)
|
||
break;
|
||
memoized_basetypes = TREE_CHAIN (memoized_basetypes);
|
||
these_basetypes = BINFO_INHERITANCE_CHAIN (these_basetypes);
|
||
}
|
||
/* The following statement is true only when both are NULL. */
|
||
if (memoized_basetypes == these_basetypes)
|
||
{
|
||
memoized_fast_finds[1] += 1;
|
||
return TREE_VALUE (tem);
|
||
}
|
||
/* else, we must re-find this field by hand. */
|
||
baselink = tree_cons (basetype_path, TREE_VALUE (baselink), TREE_CHAIN (baselink));
|
||
return baselink;
|
||
}
|
||
}
|
||
}
|
||
|
||
#ifdef GATHER_STATISTICS
|
||
n_calls_lookup_fnfields++;
|
||
#endif
|
||
if (protect && flag_memoize_lookups && ! global_bindings_p ())
|
||
entry = make_memoized_table_entry (type, name, 1);
|
||
else
|
||
entry = 0;
|
||
|
||
index = lookup_fnfields_here (type, name);
|
||
if (index >= 0 || lookup_field_1 (type, name))
|
||
{
|
||
rval_binfo = basetype_path;
|
||
rval_binfo_h = rval_binfo;
|
||
}
|
||
|
||
if (index >= 0)
|
||
{
|
||
rval = TREE_VEC_ELT (CLASSTYPE_METHOD_VEC (type), index);
|
||
rvals = my_tree_cons (basetype_path, rval, rvals);
|
||
if (BINFO_BASETYPES (binfo) && CLASSTYPE_BASELINK_VEC (type))
|
||
TREE_TYPE (rvals) = TREE_VEC_ELT (CLASSTYPE_BASELINK_VEC (type), index);
|
||
|
||
if (entry)
|
||
{
|
||
TREE_VALUE (entry) = rvals;
|
||
TREE_TYPE (entry) = NULL_TREE;
|
||
}
|
||
|
||
return rvals;
|
||
}
|
||
rval = NULL_TREE;
|
||
|
||
if (basetype_path == TYPE_BINFO (type))
|
||
{
|
||
basetype_chain = CLASSTYPE_BINFO_AS_LIST (type);
|
||
TREE_VIA_PUBLIC (basetype_chain) = 1;
|
||
BINFO_VIA_PUBLIC (basetype_path) = 1;
|
||
BINFO_INHERITANCE_CHAIN (basetype_path) = NULL_TREE;
|
||
}
|
||
else
|
||
{
|
||
basetype_chain = build_tree_list (NULL_TREE, basetype_path);
|
||
TREE_VIA_PUBLIC (basetype_chain) = TREE_VIA_PUBLIC (basetype_path);
|
||
TREE_VIA_PROTECTED (basetype_chain) = TREE_VIA_PROTECTED (basetype_path);
|
||
TREE_VIA_VIRTUAL (basetype_chain) = TREE_VIA_VIRTUAL (basetype_path);
|
||
}
|
||
|
||
/* The ambiguity check relies upon breadth first searching. */
|
||
|
||
search_stack = push_search_level (search_stack, &search_obstack);
|
||
binfo = basetype_path;
|
||
binfo_h = binfo;
|
||
|
||
while (1)
|
||
{
|
||
tree binfos = BINFO_BASETYPES (binfo);
|
||
int i, n_baselinks = binfos ? TREE_VEC_LENGTH (binfos) : 0;
|
||
int index;
|
||
|
||
/* Process and/or queue base types. */
|
||
for (i = 0; i < n_baselinks; i++)
|
||
{
|
||
tree base_binfo = TREE_VEC_ELT (binfos, i);
|
||
if (BINFO_FIELDS_MARKED (base_binfo) == 0)
|
||
{
|
||
tree btypes;
|
||
|
||
SET_BINFO_FIELDS_MARKED (base_binfo);
|
||
btypes = my_tree_cons (NULL_TREE, base_binfo, basetype_chain);
|
||
TREE_VIA_PUBLIC (btypes) = TREE_VIA_PUBLIC (base_binfo);
|
||
TREE_VIA_PROTECTED (btypes) = TREE_VIA_PROTECTED (base_binfo);
|
||
TREE_VIA_VIRTUAL (btypes) = TREE_VIA_VIRTUAL (base_binfo);
|
||
if (TREE_VIA_VIRTUAL (base_binfo))
|
||
btypes = tree_cons (NULL_TREE,
|
||
TYPE_BINFO (BINFO_TYPE (TREE_VEC_ELT (BINFO_BASETYPES (binfo_h), i))),
|
||
btypes);
|
||
else
|
||
btypes = tree_cons (NULL_TREE,
|
||
TREE_VEC_ELT (BINFO_BASETYPES (binfo_h), i),
|
||
btypes);
|
||
obstack_ptr_grow (&search_obstack, btypes);
|
||
tail += 1;
|
||
if (tail >= search_stack->limit)
|
||
my_friendly_abort (99);
|
||
}
|
||
}
|
||
|
||
/* Process head of queue, if one exists. */
|
||
if (head >= tail)
|
||
break;
|
||
|
||
basetype_chain = search_stack->first[head++];
|
||
binfo_h = TREE_VALUE (basetype_chain);
|
||
basetype_chain = TREE_CHAIN (basetype_chain);
|
||
basetype_path = TREE_VALUE (basetype_chain);
|
||
if (TREE_CHAIN (basetype_chain))
|
||
BINFO_INHERITANCE_CHAIN (basetype_path) = TREE_VALUE (TREE_CHAIN (basetype_chain));
|
||
else
|
||
BINFO_INHERITANCE_CHAIN (basetype_path) = NULL_TREE;
|
||
|
||
binfo = basetype_path;
|
||
type = BINFO_TYPE (binfo);
|
||
|
||
/* See if we can find NAME in TYPE. If RVAL is nonzero,
|
||
and we do find NAME in TYPE, verify that such a second
|
||
sighting is in fact legal. */
|
||
|
||
index = lookup_fnfields_here (type, name);
|
||
|
||
if (index >= 0 || (lookup_field_1 (type, name)!=NULL_TREE && !find_all))
|
||
{
|
||
if (rval_binfo && !find_all && hides (rval_binfo_h, binfo_h))
|
||
{
|
||
/* This is ok, the member found is in rval_binfo, not
|
||
here (binfo). */
|
||
}
|
||
else if (rval_binfo==NULL_TREE || find_all || hides (binfo_h, rval_binfo_h))
|
||
{
|
||
/* This is ok, the member found is here (binfo), not in
|
||
rval_binfo. */
|
||
if (index >= 0)
|
||
{
|
||
rval = TREE_VEC_ELT (CLASSTYPE_METHOD_VEC (type), index);
|
||
/* Note, rvals can only be previously set if find_all is
|
||
true. */
|
||
rvals = my_tree_cons (basetype_path, rval, rvals);
|
||
if (TYPE_BINFO_BASETYPES (type)
|
||
&& CLASSTYPE_BASELINK_VEC (type))
|
||
TREE_TYPE (rvals) = TREE_VEC_ELT (CLASSTYPE_BASELINK_VEC (type), index);
|
||
}
|
||
else
|
||
{
|
||
/* Undo finding it before, as something else hides it. */
|
||
rval = NULL_TREE;
|
||
rvals = NULL_TREE;
|
||
}
|
||
rval_binfo = binfo;
|
||
rval_binfo_h = binfo_h;
|
||
}
|
||
else
|
||
{
|
||
/* This is ambiguous. */
|
||
errstr = "request for method `%D' is ambiguous";
|
||
rvals = error_mark_node;
|
||
break;
|
||
}
|
||
}
|
||
}
|
||
{
|
||
tree *tp = search_stack->first;
|
||
tree *search_tail = tp + tail;
|
||
|
||
while (tp < search_tail)
|
||
{
|
||
CLEAR_BINFO_FIELDS_MARKED (TREE_VALUE (TREE_CHAIN (*tp)));
|
||
tp += 1;
|
||
}
|
||
}
|
||
search_stack = pop_search_level (search_stack);
|
||
|
||
if (entry)
|
||
{
|
||
if (errstr)
|
||
{
|
||
tree error_string = my_build_string (errstr);
|
||
/* Save error message with entry. */
|
||
TREE_TYPE (entry) = error_string;
|
||
}
|
||
else
|
||
{
|
||
/* Mark entry as having no error string. */
|
||
TREE_TYPE (entry) = NULL_TREE;
|
||
TREE_VALUE (entry) = rvals;
|
||
}
|
||
}
|
||
|
||
if (errstr && protect)
|
||
{
|
||
cp_error (errstr, name);
|
||
rvals = error_mark_node;
|
||
}
|
||
|
||
return rvals;
|
||
}
|
||
|
||
/* BREADTH-FIRST SEARCH ROUTINES. */
|
||
|
||
/* Search a multiple inheritance hierarchy by breadth-first search.
|
||
|
||
TYPE is an aggregate type, possibly in a multiple-inheritance hierarchy.
|
||
TESTFN is a function, which, if true, means that our condition has been met,
|
||
and its return value should be returned.
|
||
QFN, if non-NULL, is a predicate dictating whether the type should
|
||
even be queued. */
|
||
|
||
HOST_WIDE_INT
|
||
breadth_first_search (binfo, testfn, qfn)
|
||
tree binfo;
|
||
int (*testfn)();
|
||
int (*qfn)();
|
||
{
|
||
int head = 0, tail = 0;
|
||
int rval = 0;
|
||
|
||
search_stack = push_search_level (search_stack, &search_obstack);
|
||
|
||
while (1)
|
||
{
|
||
tree binfos = BINFO_BASETYPES (binfo);
|
||
int n_baselinks = binfos ? TREE_VEC_LENGTH (binfos) : 0;
|
||
int i;
|
||
|
||
/* Process and/or queue base types. */
|
||
for (i = 0; i < n_baselinks; i++)
|
||
{
|
||
tree base_binfo = TREE_VEC_ELT (binfos, i);
|
||
|
||
if (BINFO_MARKED (base_binfo) == 0
|
||
&& (qfn == 0 || (*qfn) (binfo, i)))
|
||
{
|
||
SET_BINFO_MARKED (base_binfo);
|
||
obstack_ptr_grow (&search_obstack, binfo);
|
||
obstack_ptr_grow (&search_obstack, (HOST_WIDE_INT) i);
|
||
tail += 2;
|
||
if (tail >= search_stack->limit)
|
||
my_friendly_abort (100);
|
||
}
|
||
}
|
||
/* Process head of queue, if one exists. */
|
||
if (head >= tail)
|
||
{
|
||
rval = 0;
|
||
break;
|
||
}
|
||
|
||
binfo = search_stack->first[head++];
|
||
i = (HOST_WIDE_INT) search_stack->first[head++];
|
||
if (rval = (*testfn) (binfo, i))
|
||
break;
|
||
binfo = BINFO_BASETYPE (binfo, i);
|
||
}
|
||
{
|
||
tree *tp = search_stack->first;
|
||
tree *search_tail = tp + tail;
|
||
while (tp < search_tail)
|
||
{
|
||
tree binfo = *tp++;
|
||
int i = (HOST_WIDE_INT)(*tp++);
|
||
CLEAR_BINFO_MARKED (BINFO_BASETYPE (binfo, i));
|
||
}
|
||
}
|
||
|
||
search_stack = pop_search_level (search_stack);
|
||
return rval;
|
||
}
|
||
|
||
/* Functions to use in breadth first searches. */
|
||
typedef tree (*pft)();
|
||
typedef int (*pfi)();
|
||
|
||
int tree_needs_constructor_p (binfo, i)
|
||
tree binfo;
|
||
int i;
|
||
{
|
||
tree basetype;
|
||
my_friendly_assert (i != 0, 296);
|
||
basetype = BINFO_TYPE (BINFO_BASETYPE (binfo, i));
|
||
return TYPE_NEEDS_CONSTRUCTING (basetype);
|
||
}
|
||
|
||
static tree declarator;
|
||
|
||
static tree
|
||
get_virtuals_named_this (binfo)
|
||
tree binfo;
|
||
{
|
||
tree fields;
|
||
|
||
fields = lookup_fnfields (binfo, declarator, -1);
|
||
/* fields cannot be error_mark_node */
|
||
|
||
if (fields == 0)
|
||
return 0;
|
||
|
||
/* Get to the function decls, and return the first virtual function
|
||
with this name, if there is one. */
|
||
while (fields)
|
||
{
|
||
tree fndecl;
|
||
|
||
for (fndecl = TREE_VALUE (fields); fndecl; fndecl = DECL_CHAIN (fndecl))
|
||
if (DECL_VINDEX (fndecl))
|
||
return fields;
|
||
fields = next_baselink (fields);
|
||
}
|
||
return NULL_TREE;
|
||
}
|
||
|
||
static tree get_virtual_destructor (binfo, i)
|
||
tree binfo;
|
||
int i;
|
||
{
|
||
tree type = BINFO_TYPE (binfo);
|
||
if (i >= 0)
|
||
type = BINFO_TYPE (TREE_VEC_ELT (BINFO_BASETYPES (binfo), i));
|
||
if (TYPE_HAS_DESTRUCTOR (type)
|
||
&& DECL_VINDEX (TREE_VEC_ELT (CLASSTYPE_METHOD_VEC (type), 0)))
|
||
return TREE_VEC_ELT (CLASSTYPE_METHOD_VEC (type), 0);
|
||
return 0;
|
||
}
|
||
|
||
int tree_has_any_destructor_p (binfo, i)
|
||
tree binfo;
|
||
int i;
|
||
{
|
||
tree type = BINFO_TYPE (binfo);
|
||
if (i >= 0)
|
||
type = BINFO_TYPE (TREE_VEC_ELT (BINFO_BASETYPES (binfo), i));
|
||
return TYPE_NEEDS_DESTRUCTOR (type);
|
||
}
|
||
|
||
/* Given a class type TYPE, and a function decl FNDECL, look for a
|
||
virtual function in TYPE's hierarchy which FNDECL could match as a
|
||
virtual function. It doesn't matter which one we find.
|
||
|
||
DTORP is nonzero if we are looking for a destructor. Destructors
|
||
need special treatment because they do not match by name. */
|
||
tree
|
||
get_matching_virtual (binfo, fndecl, dtorp)
|
||
tree binfo, fndecl;
|
||
int dtorp;
|
||
{
|
||
tree tmp = NULL_TREE;
|
||
|
||
/* Breadth first search routines start searching basetypes
|
||
of TYPE, so we must perform first ply of search here. */
|
||
if (dtorp)
|
||
{
|
||
if (tree_has_any_destructor_p (binfo, -1))
|
||
tmp = get_virtual_destructor (binfo, -1);
|
||
|
||
if (tmp)
|
||
return tmp;
|
||
|
||
tmp = (tree) breadth_first_search (binfo,
|
||
(pfi) get_virtual_destructor,
|
||
tree_has_any_destructor_p);
|
||
return tmp;
|
||
}
|
||
else
|
||
{
|
||
tree drettype, dtypes, btypes, instptr_type;
|
||
tree basetype = DECL_CLASS_CONTEXT (fndecl);
|
||
tree baselink, best = NULL_TREE;
|
||
tree name = DECL_ASSEMBLER_NAME (fndecl);
|
||
|
||
declarator = DECL_NAME (fndecl);
|
||
if (IDENTIFIER_VIRTUAL_P (declarator) == 0)
|
||
return NULL_TREE;
|
||
|
||
baselink = get_virtuals_named_this (binfo);
|
||
if (baselink == NULL_TREE)
|
||
return NULL_TREE;
|
||
|
||
drettype = TREE_TYPE (TREE_TYPE (fndecl));
|
||
dtypes = TYPE_ARG_TYPES (TREE_TYPE (fndecl));
|
||
if (DECL_STATIC_FUNCTION_P (fndecl))
|
||
instptr_type = NULL_TREE;
|
||
else
|
||
instptr_type = TREE_TYPE (TREE_VALUE (dtypes));
|
||
|
||
for (; baselink; baselink = next_baselink (baselink))
|
||
{
|
||
for (tmp = TREE_VALUE (baselink); tmp; tmp = DECL_CHAIN (tmp))
|
||
{
|
||
if (! DECL_VINDEX (tmp))
|
||
continue;
|
||
|
||
btypes = TYPE_ARG_TYPES (TREE_TYPE (tmp));
|
||
if (instptr_type == NULL_TREE)
|
||
{
|
||
if (compparms (TREE_CHAIN (btypes), dtypes, 3))
|
||
/* Caller knows to give error in this case. */
|
||
return tmp;
|
||
return NULL_TREE;
|
||
}
|
||
|
||
if ((TYPE_READONLY (TREE_TYPE (TREE_VALUE (btypes)))
|
||
== TYPE_READONLY (instptr_type))
|
||
&& compparms (TREE_CHAIN (btypes), TREE_CHAIN (dtypes), 3))
|
||
{
|
||
if (IDENTIFIER_ERROR_LOCUS (name) == NULL_TREE
|
||
&& ! comptypes (TREE_TYPE (TREE_TYPE (tmp)), drettype, 1))
|
||
{
|
||
cp_error ("conflicting return type specified for virtual function `%#D'", fndecl);
|
||
cp_error_at ("overriding definition as `%#D'", tmp);
|
||
SET_IDENTIFIER_ERROR_LOCUS (name, basetype);
|
||
}
|
||
break;
|
||
}
|
||
}
|
||
if (tmp)
|
||
{
|
||
best = tmp;
|
||
break;
|
||
}
|
||
}
|
||
if (best == NULL_TREE && warn_overloaded_virtual)
|
||
cp_warning_at ("conflicting specification deriving virtual function `%D'", fndecl);
|
||
|
||
return best;
|
||
}
|
||
}
|
||
|
||
/* Return the list of virtual functions which are abstract in type
|
||
TYPE that come from non virtual base classes. See
|
||
expand_direct_vtbls_init for the style of search we do. */
|
||
static tree
|
||
get_abstract_virtuals_1 (binfo, do_self, abstract_virtuals)
|
||
tree binfo, abstract_virtuals;
|
||
int do_self;
|
||
{
|
||
tree binfos = BINFO_BASETYPES (binfo);
|
||
int i, n_baselinks = binfos ? TREE_VEC_LENGTH (binfos) : 0;
|
||
|
||
for (i = 0; i < n_baselinks; i++)
|
||
{
|
||
tree base_binfo = TREE_VEC_ELT (binfos, i);
|
||
int is_not_base_vtable =
|
||
i != CLASSTYPE_VFIELD_PARENT (BINFO_TYPE (binfo));
|
||
if (! TREE_VIA_VIRTUAL (base_binfo))
|
||
abstract_virtuals
|
||
= get_abstract_virtuals_1 (base_binfo, is_not_base_vtable,
|
||
abstract_virtuals);
|
||
}
|
||
/* Should we use something besides CLASSTYPE_VFIELDS? */
|
||
if (do_self && CLASSTYPE_VFIELDS (BINFO_TYPE (binfo)))
|
||
{
|
||
tree tmp = TREE_CHAIN (BINFO_VIRTUALS (binfo));
|
||
|
||
/* Get around dossier entry if there is one. */
|
||
if (flag_dossier)
|
||
tmp = TREE_CHAIN (tmp);
|
||
|
||
while (tmp)
|
||
{
|
||
tree base_pfn = FNADDR_FROM_VTABLE_ENTRY (TREE_VALUE (tmp));
|
||
tree base_fndecl = TREE_OPERAND (base_pfn, 0);
|
||
if (DECL_ABSTRACT_VIRTUAL_P (base_fndecl))
|
||
abstract_virtuals = tree_cons (NULL_TREE, base_fndecl, abstract_virtuals);
|
||
tmp = TREE_CHAIN (tmp);
|
||
}
|
||
}
|
||
return abstract_virtuals;
|
||
}
|
||
|
||
/* Return the list of virtual functions which are abstract in type TYPE.
|
||
This information is cached, and so must be built on a
|
||
non-temporary obstack. */
|
||
tree
|
||
get_abstract_virtuals (type)
|
||
tree type;
|
||
{
|
||
tree vbases, tmp;
|
||
tree abstract_virtuals = CLASSTYPE_ABSTRACT_VIRTUALS (type);
|
||
|
||
/* First get all from non-virtual bases. */
|
||
abstract_virtuals
|
||
= get_abstract_virtuals_1 (TYPE_BINFO (type), 1, abstract_virtuals);
|
||
|
||
for (vbases = CLASSTYPE_VBASECLASSES (type); vbases; vbases = TREE_CHAIN (vbases))
|
||
{
|
||
if (! BINFO_VIRTUALS (vbases))
|
||
continue;
|
||
|
||
tmp = TREE_CHAIN (BINFO_VIRTUALS (vbases));
|
||
while (tmp)
|
||
{
|
||
tree base_pfn = FNADDR_FROM_VTABLE_ENTRY (TREE_VALUE (tmp));
|
||
tree base_fndecl = TREE_OPERAND (base_pfn, 0);
|
||
if (DECL_ABSTRACT_VIRTUAL_P (base_fndecl))
|
||
abstract_virtuals = tree_cons (NULL_TREE, base_fndecl, abstract_virtuals);
|
||
tmp = TREE_CHAIN (tmp);
|
||
}
|
||
}
|
||
return nreverse (abstract_virtuals);
|
||
}
|
||
|
||
/* For the type TYPE, return a list of member functions available from
|
||
base classes with name NAME. The TREE_VALUE of the list is a chain of
|
||
member functions with name NAME. The TREE_PURPOSE of the list is a
|
||
basetype, or a list of base types (in reverse order) which were
|
||
traversed to reach the chain of member functions. If we reach a base
|
||
type which provides a member function of name NAME, and which has at
|
||
most one base type itself, then we can terminate the search. */
|
||
|
||
tree
|
||
get_baselinks (type_as_binfo_list, type, name)
|
||
tree type_as_binfo_list;
|
||
tree type, name;
|
||
{
|
||
int head = 0, tail = 0, index;
|
||
tree rval = 0, nval = 0;
|
||
tree basetypes = type_as_binfo_list;
|
||
tree binfo = TYPE_BINFO (type);
|
||
|
||
search_stack = push_search_level (search_stack, &search_obstack);
|
||
|
||
while (1)
|
||
{
|
||
tree binfos = BINFO_BASETYPES (binfo);
|
||
int i, n_baselinks = binfos ? TREE_VEC_LENGTH (binfos) : 0;
|
||
|
||
/* Process and/or queue base types. */
|
||
for (i = 0; i < n_baselinks; i++)
|
||
{
|
||
tree base_binfo = TREE_VEC_ELT (binfos, i);
|
||
tree btypes;
|
||
|
||
btypes = hash_tree_cons (TREE_VIA_PUBLIC (base_binfo),
|
||
TREE_VIA_VIRTUAL (base_binfo),
|
||
TREE_VIA_PROTECTED (base_binfo),
|
||
NULL_TREE, base_binfo,
|
||
basetypes);
|
||
obstack_ptr_grow (&search_obstack, btypes);
|
||
search_stack->first = (tree *)obstack_base (&search_obstack);
|
||
tail += 1;
|
||
}
|
||
|
||
dont_queue:
|
||
/* Process head of queue, if one exists. */
|
||
if (head >= tail)
|
||
break;
|
||
|
||
basetypes = search_stack->first[head++];
|
||
binfo = TREE_VALUE (basetypes);
|
||
type = BINFO_TYPE (binfo);
|
||
index = lookup_fnfields_1 (type, name);
|
||
if (index >= 0)
|
||
{
|
||
nval = TREE_VEC_ELT (CLASSTYPE_METHOD_VEC (type), index);
|
||
rval = hash_tree_cons (0, 0, 0, basetypes, nval, rval);
|
||
if (TYPE_BINFO_BASETYPES (type) == 0)
|
||
goto dont_queue;
|
||
else if (TREE_VEC_LENGTH (TYPE_BINFO_BASETYPES (type)) == 1)
|
||
{
|
||
if (CLASSTYPE_BASELINK_VEC (type))
|
||
TREE_TYPE (rval) = TREE_VEC_ELT (CLASSTYPE_BASELINK_VEC (type), index);
|
||
goto dont_queue;
|
||
}
|
||
}
|
||
nval = NULL_TREE;
|
||
}
|
||
|
||
search_stack = pop_search_level (search_stack);
|
||
return rval;
|
||
}
|
||
|
||
tree
|
||
next_baselink (baselink)
|
||
tree baselink;
|
||
{
|
||
tree tmp = TREE_TYPE (baselink);
|
||
baselink = TREE_CHAIN (baselink);
|
||
while (tmp)
|
||
{
|
||
/* @@ does not yet add previous base types. */
|
||
baselink = tree_cons (TREE_PURPOSE (tmp), TREE_VALUE (tmp),
|
||
baselink);
|
||
TREE_TYPE (baselink) = TREE_TYPE (tmp);
|
||
tmp = TREE_CHAIN (tmp);
|
||
}
|
||
return baselink;
|
||
}
|
||
|
||
/* DEPTH-FIRST SEARCH ROUTINES. */
|
||
|
||
/* Assign unique numbers to _CLASSTYPE members of the lattice
|
||
specified by TYPE. The root nodes are marked first; the nodes
|
||
are marked depth-fisrt, left-right. */
|
||
|
||
static int cid;
|
||
|
||
/* Matrix implementing a relation from CLASSTYPE X CLASSTYPE => INT.
|
||
Relation yields 1 if C1 <= C2, 0 otherwise. */
|
||
typedef char mi_boolean;
|
||
static mi_boolean *mi_matrix;
|
||
|
||
/* Type for which this matrix is defined. */
|
||
static tree mi_type;
|
||
|
||
/* Size of the matrix for indexing purposes. */
|
||
static int mi_size;
|
||
|
||
/* Return nonzero if class C2 derives from class C1. */
|
||
#define BINFO_DERIVES_FROM(C1, C2) \
|
||
((mi_matrix+mi_size*(BINFO_CID (C1)-1))[BINFO_CID (C2)-1])
|
||
#define TYPE_DERIVES_FROM(C1, C2) \
|
||
((mi_matrix+mi_size*(CLASSTYPE_CID (C1)-1))[CLASSTYPE_CID (C2)-1])
|
||
#define BINFO_DERIVES_FROM_STAR(C) \
|
||
(mi_matrix+(BINFO_CID (C)-1))
|
||
|
||
/* This routine converts a pointer to be a pointer of an immediate
|
||
base class. The normal convert_pointer_to routine would diagnose
|
||
the conversion as ambiguous, under MI code that has the base class
|
||
as an ambiguous base class. */
|
||
static tree
|
||
convert_pointer_to_single_level (to_type, expr)
|
||
tree to_type, expr;
|
||
{
|
||
tree binfo_of_derived;
|
||
tree last;
|
||
|
||
binfo_of_derived = TYPE_BINFO (TREE_TYPE (TREE_TYPE (expr)));
|
||
last = get_binfo (to_type, TREE_TYPE (TREE_TYPE (expr)), 0);
|
||
BINFO_INHERITANCE_CHAIN (last) = binfo_of_derived;
|
||
BINFO_INHERITANCE_CHAIN (binfo_of_derived) = NULL_TREE;
|
||
return build_vbase_path (PLUS_EXPR, TYPE_POINTER_TO (to_type), expr, last, 1);
|
||
}
|
||
|
||
/* The main function which implements depth first search.
|
||
|
||
This routine has to remember the path it walked up, when
|
||
dfs_init_vbase_pointers is the work function, as otherwise there
|
||
would be no record. */
|
||
static void
|
||
dfs_walk (binfo, fn, qfn)
|
||
tree binfo;
|
||
void (*fn)();
|
||
int (*qfn)();
|
||
{
|
||
tree binfos = BINFO_BASETYPES (binfo);
|
||
int i, n_baselinks = binfos ? TREE_VEC_LENGTH (binfos) : 0;
|
||
|
||
for (i = 0; i < n_baselinks; i++)
|
||
{
|
||
tree base_binfo = TREE_VEC_ELT (binfos, i);
|
||
|
||
if ((*qfn)(base_binfo))
|
||
{
|
||
if (fn == dfs_init_vbase_pointers)
|
||
{
|
||
/* When traversing an arbitrary MI hierarchy, we need to keep
|
||
a record of the path we took to get down to the final base
|
||
type, as otherwise there would be no record of it, and just
|
||
trying to blindly convert at the bottom would be ambiguous.
|
||
|
||
The easiest way is to do the conversions one step at a time,
|
||
as we know we want the immediate base class at each step.
|
||
|
||
The only special trick to converting one step at a time,
|
||
is that when we hit the last virtual base class, we must
|
||
use the SLOT value for it, and not use the normal convert
|
||
routine. We use the last virtual base class, as in our
|
||
implementation, we have pointers to all virtual base
|
||
classes in the base object. */
|
||
|
||
tree saved_vbase_decl_ptr_intermediate
|
||
= vbase_decl_ptr_intermediate;
|
||
|
||
if (TREE_VIA_VIRTUAL (base_binfo))
|
||
{
|
||
/* No need for the conversion here, as we know it is the
|
||
right type. */
|
||
vbase_decl_ptr_intermediate
|
||
= (tree)CLASSTYPE_SEARCH_SLOT (BINFO_TYPE (base_binfo));
|
||
}
|
||
else
|
||
{
|
||
vbase_decl_ptr_intermediate
|
||
= convert_pointer_to_single_level (BINFO_TYPE (base_binfo),
|
||
vbase_decl_ptr_intermediate);
|
||
}
|
||
|
||
dfs_walk (base_binfo, fn, qfn);
|
||
|
||
vbase_decl_ptr_intermediate = saved_vbase_decl_ptr_intermediate;
|
||
} else
|
||
dfs_walk (base_binfo, fn, qfn);
|
||
}
|
||
}
|
||
|
||
fn (binfo);
|
||
}
|
||
|
||
/* Predicate functions which serve for dfs_walk. */
|
||
static int numberedp (binfo) tree binfo;
|
||
{ return BINFO_CID (binfo); }
|
||
static int unnumberedp (binfo) tree binfo;
|
||
{ return BINFO_CID (binfo) == 0; }
|
||
|
||
static int markedp (binfo) tree binfo;
|
||
{ return BINFO_MARKED (binfo); }
|
||
static int bfs_markedp (binfo, i) tree binfo; int i;
|
||
{ return BINFO_MARKED (BINFO_BASETYPE (binfo, i)); }
|
||
static int unmarkedp (binfo) tree binfo;
|
||
{ return BINFO_MARKED (binfo) == 0; }
|
||
static int bfs_unmarkedp (binfo, i) tree binfo; int i;
|
||
{ return BINFO_MARKED (BINFO_BASETYPE (binfo, i)) == 0; }
|
||
static int marked_vtable_pathp (binfo) tree binfo;
|
||
{ return BINFO_VTABLE_PATH_MARKED (binfo); }
|
||
static int bfs_marked_vtable_pathp (binfo, i) tree binfo; int i;
|
||
{ return BINFO_VTABLE_PATH_MARKED (BINFO_BASETYPE (binfo, i)); }
|
||
static int unmarked_vtable_pathp (binfo) tree binfo;
|
||
{ return BINFO_VTABLE_PATH_MARKED (binfo) == 0; }
|
||
static int bfs_unmarked_vtable_pathp (binfo, i) tree binfo; int i;
|
||
{ return BINFO_VTABLE_PATH_MARKED (BINFO_BASETYPE (binfo, i)) == 0; }
|
||
static int marked_new_vtablep (binfo) tree binfo;
|
||
{ return BINFO_NEW_VTABLE_MARKED (binfo); }
|
||
static int bfs_marked_new_vtablep (binfo, i) tree binfo; int i;
|
||
{ return BINFO_NEW_VTABLE_MARKED (BINFO_BASETYPE (binfo, i)); }
|
||
static int unmarked_new_vtablep (binfo) tree binfo;
|
||
{ return BINFO_NEW_VTABLE_MARKED (binfo) == 0; }
|
||
static int bfs_unmarked_new_vtablep (binfo, i) tree binfo; int i;
|
||
{ return BINFO_NEW_VTABLE_MARKED (BINFO_BASETYPE (binfo, i)) == 0; }
|
||
|
||
static int dfs_search_slot_nonempty_p (binfo) tree binfo;
|
||
{ return CLASSTYPE_SEARCH_SLOT (BINFO_TYPE (binfo)) != 0; }
|
||
|
||
static int dfs_debug_unmarkedp (binfo) tree binfo;
|
||
{ return CLASSTYPE_DEBUG_REQUESTED (BINFO_TYPE (binfo)) == 0; }
|
||
|
||
/* The worker functions for `dfs_walk'. These do not need to
|
||
test anything (vis a vis marking) if they are paired with
|
||
a predicate function (above). */
|
||
|
||
/* Assign each type within the lattice a number which is unique
|
||
in the lattice. The first number assigned is 1. */
|
||
|
||
static void
|
||
dfs_number (binfo)
|
||
tree binfo;
|
||
{
|
||
BINFO_CID (binfo) = ++cid;
|
||
}
|
||
|
||
static void
|
||
dfs_unnumber (binfo)
|
||
tree binfo;
|
||
{
|
||
BINFO_CID (binfo) = 0;
|
||
}
|
||
|
||
static void
|
||
dfs_mark (binfo) tree binfo;
|
||
{ SET_BINFO_MARKED (binfo); }
|
||
|
||
static void
|
||
dfs_unmark (binfo) tree binfo;
|
||
{ CLEAR_BINFO_MARKED (binfo); }
|
||
|
||
static void
|
||
dfs_mark_vtable_path (binfo) tree binfo;
|
||
{ SET_BINFO_VTABLE_PATH_MARKED (binfo); }
|
||
|
||
static void
|
||
dfs_unmark_vtable_path (binfo) tree binfo;
|
||
{ CLEAR_BINFO_VTABLE_PATH_MARKED (binfo); }
|
||
|
||
static void
|
||
dfs_mark_new_vtable (binfo) tree binfo;
|
||
{ SET_BINFO_NEW_VTABLE_MARKED (binfo); }
|
||
|
||
static void
|
||
dfs_unmark_new_vtable (binfo) tree binfo;
|
||
{ CLEAR_BINFO_NEW_VTABLE_MARKED (binfo); }
|
||
|
||
static void
|
||
dfs_clear_search_slot (binfo) tree binfo;
|
||
{ CLASSTYPE_SEARCH_SLOT (BINFO_TYPE (binfo)) = 0; }
|
||
|
||
static void
|
||
dfs_debug_mark (binfo)
|
||
tree binfo;
|
||
{
|
||
tree t = BINFO_TYPE (binfo);
|
||
|
||
/* Use heuristic that if there are virtual functions,
|
||
ignore until we see a non-inline virtual function. */
|
||
tree methods = CLASSTYPE_METHOD_VEC (t);
|
||
|
||
CLASSTYPE_DEBUG_REQUESTED (t) = 1;
|
||
|
||
/* If interface info is known, the value of (?@@?) is correct. */
|
||
if (methods == 0
|
||
|| CLASSTYPE_INTERFACE_KNOWN (t)
|
||
|| (write_virtuals == 2 && TYPE_VIRTUAL_P (t)))
|
||
return;
|
||
|
||
/* If debug info is requested from this context for this type, supply it.
|
||
If debug info is requested from another context for this type,
|
||
see if some third context can supply it. */
|
||
if (current_function_decl == NULL_TREE
|
||
|| DECL_CLASS_CONTEXT (current_function_decl) != t)
|
||
{
|
||
if (TREE_VEC_ELT (methods, 0))
|
||
methods = TREE_VEC_ELT (methods, 0);
|
||
else
|
||
methods = TREE_VEC_ELT (methods, 1);
|
||
while (methods)
|
||
{
|
||
if (DECL_VINDEX (methods)
|
||
&& DECL_SAVED_INSNS (methods) == 0
|
||
&& DECL_PENDING_INLINE_INFO (methods) == 0
|
||
&& DECL_ABSTRACT_VIRTUAL_P (methods) == 0)
|
||
{
|
||
/* Somebody, somewhere is going to have to define this
|
||
virtual function. When they do, they will provide
|
||
the debugging info. */
|
||
return;
|
||
}
|
||
methods = TREE_CHAIN (methods);
|
||
}
|
||
}
|
||
/* We cannot rely on some alien method to solve our problems,
|
||
so we must write out the debug info ourselves. */
|
||
TYPE_DECL_SUPPRESS_DEBUG (TYPE_NAME (t)) = 0;
|
||
rest_of_type_compilation (t, global_bindings_p ());
|
||
}
|
||
|
||
/* Attach to the type of the virtual base class, the pointer to the
|
||
virtual base class, given the global pointer vbase_decl_ptr.
|
||
|
||
We use the global vbase_types. ICK! */
|
||
static void
|
||
dfs_find_vbases (binfo)
|
||
tree binfo;
|
||
{
|
||
tree binfos = BINFO_BASETYPES (binfo);
|
||
int i, n_baselinks = binfos ? TREE_VEC_LENGTH (binfos) : 0;
|
||
|
||
for (i = n_baselinks-1; i >= 0; i--)
|
||
{
|
||
tree base_binfo = TREE_VEC_ELT (binfos, i);
|
||
|
||
if (TREE_VIA_VIRTUAL (base_binfo)
|
||
&& CLASSTYPE_SEARCH_SLOT (BINFO_TYPE (base_binfo)) == 0)
|
||
{
|
||
tree vbase = BINFO_TYPE (base_binfo);
|
||
tree binfo = binfo_member (vbase, vbase_types);
|
||
|
||
CLASSTYPE_SEARCH_SLOT (vbase)
|
||
= (char *) build (PLUS_EXPR, TYPE_POINTER_TO (vbase),
|
||
vbase_decl_ptr, BINFO_OFFSET (binfo));
|
||
}
|
||
}
|
||
SET_BINFO_VTABLE_PATH_MARKED (binfo);
|
||
SET_BINFO_NEW_VTABLE_MARKED (binfo);
|
||
}
|
||
|
||
static void
|
||
dfs_init_vbase_pointers (binfo)
|
||
tree binfo;
|
||
{
|
||
tree type = BINFO_TYPE (binfo);
|
||
tree fields = TYPE_FIELDS (type);
|
||
tree this_vbase_ptr;
|
||
|
||
CLEAR_BINFO_VTABLE_PATH_MARKED (binfo);
|
||
|
||
/* If there is a dossier, it is the first field, though perhaps from
|
||
the base class. Otherwise, the first fields are virtual base class
|
||
pointer fields. */
|
||
if (CLASSTYPE_DOSSIER (type) && VFIELD_NAME_P (DECL_NAME (fields)))
|
||
/* Get past vtable for the object. */
|
||
fields = TREE_CHAIN (fields);
|
||
|
||
if (fields == NULL_TREE
|
||
|| DECL_NAME (fields) == NULL_TREE
|
||
|| ! VBASE_NAME_P (DECL_NAME (fields)))
|
||
return;
|
||
|
||
this_vbase_ptr = vbase_decl_ptr_intermediate;
|
||
|
||
if (TYPE_POINTER_TO (type) != TYPE_MAIN_VARIANT (TREE_TYPE (this_vbase_ptr)))
|
||
my_friendly_abort (125);
|
||
|
||
while (fields && DECL_NAME (fields)
|
||
&& VBASE_NAME_P (DECL_NAME (fields)))
|
||
{
|
||
tree ref = build (COMPONENT_REF, TREE_TYPE (fields),
|
||
build_indirect_ref (this_vbase_ptr, NULL_PTR), fields);
|
||
tree init = (tree)CLASSTYPE_SEARCH_SLOT (TREE_TYPE (TREE_TYPE (fields)));
|
||
vbase_init_result = tree_cons (binfo_member (TREE_TYPE (TREE_TYPE (fields)),
|
||
vbase_types),
|
||
build_modify_expr (ref, NOP_EXPR, init),
|
||
vbase_init_result);
|
||
fields = TREE_CHAIN (fields);
|
||
}
|
||
}
|
||
|
||
/* Sometimes this needs to clear both VTABLE_PATH and NEW_VTABLE. Other
|
||
times, just NEW_VTABLE, but optimizer should make both with equal
|
||
efficiency (though it does not currently). */
|
||
static void
|
||
dfs_clear_vbase_slots (binfo)
|
||
tree binfo;
|
||
{
|
||
tree type = BINFO_TYPE (binfo);
|
||
CLASSTYPE_SEARCH_SLOT (type) = 0;
|
||
CLEAR_BINFO_VTABLE_PATH_MARKED (binfo);
|
||
CLEAR_BINFO_NEW_VTABLE_MARKED (binfo);
|
||
}
|
||
|
||
tree
|
||
init_vbase_pointers (type, decl_ptr)
|
||
tree type;
|
||
tree decl_ptr;
|
||
{
|
||
if (TYPE_USES_VIRTUAL_BASECLASSES (type))
|
||
{
|
||
int old_flag = flag_this_is_variable;
|
||
tree binfo = TYPE_BINFO (type);
|
||
flag_this_is_variable = -2;
|
||
vbase_types = CLASSTYPE_VBASECLASSES (type);
|
||
vbase_decl_ptr = decl_ptr;
|
||
vbase_decl = build_indirect_ref (decl_ptr, NULL_PTR);
|
||
vbase_decl_ptr_intermediate = vbase_decl_ptr;
|
||
vbase_init_result = NULL_TREE;
|
||
dfs_walk (binfo, dfs_find_vbases, unmarked_vtable_pathp);
|
||
dfs_walk (binfo, dfs_init_vbase_pointers, marked_vtable_pathp);
|
||
dfs_walk (binfo, dfs_clear_vbase_slots, marked_new_vtablep);
|
||
flag_this_is_variable = old_flag;
|
||
return vbase_init_result;
|
||
}
|
||
return 0;
|
||
}
|
||
|
||
/* Build a COMPOUND_EXPR which when expanded will generate the code
|
||
needed to initialize all the virtual function table slots of all
|
||
the virtual baseclasses. MAIN_BINFO is the binfo which determines
|
||
the virtual baseclasses to use; TYPE is the type of the object to
|
||
which the initialization applies. TRUE_EXP is the true object we
|
||
are initializing, and DECL_PTR is the pointer to the sub-object we
|
||
are initializing.
|
||
|
||
When USE_COMPUTED_OFFSETS is non-zero, we can assume that the
|
||
object was laidout by a top-level contructor and the computed
|
||
offsets are valid to store vtables. When zero, we must store new
|
||
vtables through virtual baseclass pointers.
|
||
|
||
We setup and use the globals: vbase_decl, vbase_decl_ptr, vbase_types
|
||
ICK! */
|
||
|
||
void
|
||
expand_indirect_vtbls_init (binfo, true_exp, decl_ptr, use_computed_offsets)
|
||
tree binfo;
|
||
tree true_exp, decl_ptr;
|
||
int use_computed_offsets;
|
||
{
|
||
tree type = BINFO_TYPE (binfo);
|
||
if (TYPE_USES_VIRTUAL_BASECLASSES (type))
|
||
{
|
||
int old_flag = flag_this_is_variable;
|
||
tree vbases = CLASSTYPE_VBASECLASSES (type);
|
||
vbase_types = vbases;
|
||
vbase_decl_ptr = true_exp ? build_unary_op (ADDR_EXPR, true_exp, 0) : decl_ptr;
|
||
vbase_decl = true_exp ? true_exp : build_indirect_ref (decl_ptr, NULL_PTR);
|
||
|
||
if (use_computed_offsets)
|
||
{
|
||
/* This is an object of type IN_TYPE, */
|
||
flag_this_is_variable = -2;
|
||
dfs_walk (binfo, dfs_find_vbases, unmarked_new_vtablep);
|
||
}
|
||
|
||
/* Initialized with vtables of type TYPE. */
|
||
for (; vbases; vbases = TREE_CHAIN (vbases))
|
||
{
|
||
tree addr;
|
||
if (use_computed_offsets)
|
||
addr = (tree)CLASSTYPE_SEARCH_SLOT (BINFO_TYPE (vbases));
|
||
else
|
||
{
|
||
tree vbinfo = get_binfo (TREE_TYPE (vbases),
|
||
TREE_TYPE (vbase_decl),
|
||
0);
|
||
|
||
/* See is we can get lucky. */
|
||
if (TREE_VIA_VIRTUAL (vbinfo))
|
||
addr = convert_pointer_to_real (vbinfo, vbase_decl_ptr);
|
||
else
|
||
{
|
||
/* We go through all these contortions to avoid this
|
||
call, as it will fail when the virtual base type
|
||
is ambiguous from here. We don't yet have a way
|
||
to search for and find just an instance of the
|
||
virtual base class. Searching for the binfo in
|
||
vbases won't work, as we don't have the vbase
|
||
pointer field, for all vbases in the main class,
|
||
only direct vbases. */
|
||
addr = convert_pointer_to_real (TREE_TYPE (vbases),
|
||
vbase_decl_ptr);
|
||
if (addr == error_mark_node)
|
||
continue;
|
||
}
|
||
}
|
||
|
||
/* Do all vtables from this virtual base. */
|
||
/* This assumes that virtual bases can never serve as parent
|
||
binfos. (in the CLASSTPE_VFIELD_PARENT sense) */
|
||
expand_direct_vtbls_init (vbases, TYPE_BINFO (BINFO_TYPE (vbases)),
|
||
1, 0, addr);
|
||
}
|
||
|
||
dfs_walk (binfo, dfs_clear_vbase_slots, marked_new_vtablep);
|
||
|
||
flag_this_is_variable = old_flag;
|
||
}
|
||
}
|
||
|
||
void
|
||
clear_search_slots (type)
|
||
tree type;
|
||
{
|
||
dfs_walk (TYPE_BINFO (type),
|
||
dfs_clear_search_slot, dfs_search_slot_nonempty_p);
|
||
}
|
||
|
||
/* get virtual base class types.
|
||
This adds type to the vbase_types list in reverse dfs order.
|
||
Ordering is very important, so don't change it. */
|
||
|
||
static void
|
||
dfs_get_vbase_types (binfo)
|
||
tree binfo;
|
||
{
|
||
if (TREE_VIA_VIRTUAL (binfo) && ! BINFO_VBASE_MARKED (binfo))
|
||
{
|
||
vbase_types = make_binfo (integer_zero_node, binfo,
|
||
BINFO_VTABLE (binfo),
|
||
BINFO_VIRTUALS (binfo), vbase_types);
|
||
TREE_VIA_VIRTUAL (vbase_types) = 1;
|
||
SET_BINFO_VBASE_MARKED (binfo);
|
||
}
|
||
SET_BINFO_MARKED (binfo);
|
||
}
|
||
|
||
/* get a list of virtual base classes in dfs order. */
|
||
tree
|
||
get_vbase_types (type)
|
||
tree type;
|
||
{
|
||
tree vbases;
|
||
tree binfo;
|
||
|
||
if (TREE_CODE (type) == TREE_VEC)
|
||
binfo = type;
|
||
else
|
||
binfo = TYPE_BINFO (type);
|
||
|
||
vbase_types = NULL_TREE;
|
||
dfs_walk (binfo, dfs_get_vbase_types, unmarkedp);
|
||
dfs_walk (binfo, dfs_unmark, markedp);
|
||
/* Rely upon the reverse dfs ordering from dfs_get_vbase_types, and now
|
||
reverse it so that we get normal dfs ordering. */
|
||
vbase_types = nreverse (vbase_types);
|
||
|
||
/* unmark marked vbases */
|
||
for (vbases = vbase_types; vbases; vbases = TREE_CHAIN (vbases))
|
||
CLEAR_BINFO_VBASE_MARKED (vbases);
|
||
|
||
return vbase_types;
|
||
}
|
||
|
||
static void
|
||
dfs_record_inheritance (binfo)
|
||
tree binfo;
|
||
{
|
||
tree binfos = BINFO_BASETYPES (binfo);
|
||
int i, n_baselinks = binfos ? TREE_VEC_LENGTH (binfos) : 0;
|
||
mi_boolean *derived_row = BINFO_DERIVES_FROM_STAR (binfo);
|
||
|
||
for (i = n_baselinks-1; i >= 0; i--)
|
||
{
|
||
int j;
|
||
tree base_binfo = TREE_VEC_ELT (binfos, i);
|
||
tree baseclass = BINFO_TYPE (base_binfo);
|
||
mi_boolean *base_row = BINFO_DERIVES_FROM_STAR (base_binfo);
|
||
|
||
/* Don't search if there's nothing there! MI_SIZE can be
|
||
zero as a result of parse errors. */
|
||
if (TYPE_BINFO_BASETYPES (baseclass) && mi_size > 0)
|
||
for (j = mi_size*(CLASSTYPE_CID (baseclass)-1); j >= 0; j -= mi_size)
|
||
derived_row[j] |= base_row[j];
|
||
TYPE_DERIVES_FROM (baseclass, BINFO_TYPE (binfo)) = 1;
|
||
}
|
||
|
||
SET_BINFO_MARKED (binfo);
|
||
}
|
||
|
||
/* Given a _CLASSTYPE node in a multiple inheritance lattice,
|
||
convert the lattice into a simple relation such that,
|
||
given to CIDs, C1 and C2, one can determine if C1 <= C2
|
||
or C2 <= C1 or C1 <> C2.
|
||
|
||
Once constructed, we walk the lattice depth fisrt,
|
||
applying various functions to elements as they are encountered.
|
||
|
||
We use xmalloc here, in case we want to randomly free these tables. */
|
||
|
||
#define SAVE_MI_MATRIX
|
||
|
||
void
|
||
build_mi_matrix (type)
|
||
tree type;
|
||
{
|
||
tree binfo = TYPE_BINFO (type);
|
||
cid = 0;
|
||
|
||
#ifdef SAVE_MI_MATRIX
|
||
if (CLASSTYPE_MI_MATRIX (type))
|
||
{
|
||
mi_size = CLASSTYPE_N_SUPERCLASSES (type) + CLASSTYPE_N_VBASECLASSES (type);
|
||
mi_matrix = CLASSTYPE_MI_MATRIX (type);
|
||
mi_type = type;
|
||
dfs_walk (binfo, dfs_number, unnumberedp);
|
||
return;
|
||
}
|
||
#endif
|
||
|
||
mi_size = CLASSTYPE_N_SUPERCLASSES (type) + CLASSTYPE_N_VBASECLASSES (type);
|
||
mi_matrix = (char *)xmalloc ((mi_size + 1) * (mi_size + 1));
|
||
mi_type = type;
|
||
bzero (mi_matrix, (mi_size + 1) * (mi_size + 1));
|
||
dfs_walk (binfo, dfs_number, unnumberedp);
|
||
dfs_walk (binfo, dfs_record_inheritance, unmarkedp);
|
||
dfs_walk (binfo, dfs_unmark, markedp);
|
||
}
|
||
|
||
void
|
||
free_mi_matrix ()
|
||
{
|
||
dfs_walk (TYPE_BINFO (mi_type), dfs_unnumber, numberedp);
|
||
|
||
#ifdef SAVE_MI_MATRIX
|
||
CLASSTYPE_MI_MATRIX (mi_type) = mi_matrix;
|
||
#else
|
||
free (mi_matrix);
|
||
mi_size = 0;
|
||
cid = 0;
|
||
#endif
|
||
}
|
||
|
||
/* If we want debug info for a type TYPE, make sure all its base types
|
||
are also marked as being potentially interesting. This avoids
|
||
the problem of not writing any debug info for intermediate basetypes
|
||
that have abstract virtual functions. Also mark member types. */
|
||
|
||
void
|
||
note_debug_info_needed (type)
|
||
tree type;
|
||
{
|
||
tree field;
|
||
dfs_walk (TYPE_BINFO (type), dfs_debug_mark, dfs_debug_unmarkedp);
|
||
for (field = TYPE_FIELDS (type); field; field = TREE_CHAIN (field))
|
||
{
|
||
tree ttype;
|
||
if (TREE_CODE (field) == FIELD_DECL
|
||
&& IS_AGGR_TYPE (ttype = target_type (TREE_TYPE (field)))
|
||
&& dfs_debug_unmarkedp (TYPE_BINFO (ttype)))
|
||
note_debug_info_needed (ttype);
|
||
}
|
||
}
|
||
|
||
/* Subroutines of push_class_decls (). */
|
||
|
||
/* Add the instance variables which this class contributed to the
|
||
current class binding contour. When a redefinition occurs,
|
||
if the redefinition is strictly within a single inheritance path,
|
||
we just overwrite (in the case of a data field) or
|
||
cons (in the case of a member function) the old declaration with
|
||
the new. If the fields are not within a single inheritance path,
|
||
we must cons them in either case.
|
||
|
||
In order to know what decls are new (stemming from the current
|
||
invocation of push_class_decls) we enclose them in an "envelope",
|
||
which is a TREE_LIST node where the TREE_PURPOSE slot contains the
|
||
new decl (or possibly a list of competing ones), the TREE_VALUE slot
|
||
points to the old value and the TREE_CHAIN slot chains together all
|
||
envelopes which needs to be "opened" in push_class_decls. Opening an
|
||
envelope means: push the old value onto the class_shadowed list,
|
||
install the new one and if it's a TYPE_DECL do the same to the
|
||
IDENTIFIER_TYPE_VALUE. Such an envelope is recognized by seeing that
|
||
the TREE_PURPOSE slot is non-null, and that it is not an identifier.
|
||
Because if it is, it could be a set of overloaded methods from an
|
||
outer scope. */
|
||
|
||
static void
|
||
dfs_pushdecls (binfo)
|
||
tree binfo;
|
||
{
|
||
tree type = BINFO_TYPE (binfo);
|
||
tree fields, *methods, *end;
|
||
tree method_vec;
|
||
|
||
for (fields = TYPE_FIELDS (type); fields; fields = TREE_CHAIN (fields))
|
||
{
|
||
/* Unmark so that if we are in a constructor, and then find that
|
||
this field was initialized by a base initializer,
|
||
we can emit an error message. */
|
||
if (TREE_CODE (fields) == FIELD_DECL)
|
||
TREE_USED (fields) = 0;
|
||
|
||
/* Recurse into anonymous unions. */
|
||
if (DECL_NAME (fields) == NULL_TREE
|
||
&& TREE_CODE (TREE_TYPE (fields)) == UNION_TYPE)
|
||
{
|
||
dfs_pushdecls (TYPE_BINFO (TREE_TYPE (fields)));
|
||
continue;
|
||
}
|
||
|
||
#if 0
|
||
if (TREE_CODE (fields) != TYPE_DECL)
|
||
{
|
||
DECL_PUBLIC (fields) = 0;
|
||
DECL_PROTECTED (fields) = 0;
|
||
DECL_PRIVATE (fields) = 0;
|
||
}
|
||
#endif
|
||
|
||
if (DECL_NAME (fields))
|
||
{
|
||
tree class_value = IDENTIFIER_CLASS_VALUE (DECL_NAME (fields));
|
||
|
||
/* If the class value is an envelope of the kind described in
|
||
the comment above, we try to rule out possible ambiguities.
|
||
If we can't do that, keep a TREE_LIST with possibly ambiguous
|
||
decls in there. */
|
||
if (class_value && TREE_CODE (class_value) == TREE_LIST
|
||
&& TREE_PURPOSE (class_value) != NULL_TREE
|
||
&& (TREE_CODE (TREE_PURPOSE (class_value))
|
||
!= IDENTIFIER_NODE))
|
||
{
|
||
tree value = TREE_PURPOSE (class_value);
|
||
tree context;
|
||
|
||
/* Possible ambiguity. If its defining type(s)
|
||
is (are all) derived from us, no problem. */
|
||
if (TREE_CODE (value) != TREE_LIST)
|
||
{
|
||
context = (TREE_CODE (value) == FUNCTION_DECL
|
||
&& DECL_VIRTUAL_P (value))
|
||
? DECL_CLASS_CONTEXT (value)
|
||
: DECL_CONTEXT (value);
|
||
|
||
if (context && (context == type
|
||
|| TYPE_DERIVES_FROM (context, type)))
|
||
value = fields;
|
||
else
|
||
value = tree_cons (NULL_TREE, fields,
|
||
build_tree_list (NULL_TREE, value));
|
||
}
|
||
else
|
||
{
|
||
/* All children may derive from us, in which case
|
||
there is no problem. Otherwise, we have to
|
||
keep lists around of what the ambiguities might be. */
|
||
tree values;
|
||
int problem = 0;
|
||
|
||
for (values = value; values; values = TREE_CHAIN (values))
|
||
{
|
||
tree sub_values = TREE_VALUE (values);
|
||
|
||
if (TREE_CODE (sub_values) == TREE_LIST)
|
||
{
|
||
for (; sub_values; sub_values = TREE_CHAIN (sub_values))
|
||
{
|
||
register tree list_mbr = TREE_VALUE (sub_values);
|
||
|
||
context = (TREE_CODE (list_mbr) == FUNCTION_DECL
|
||
&& DECL_VIRTUAL_P (list_mbr))
|
||
? DECL_CLASS_CONTEXT (list_mbr)
|
||
: DECL_CONTEXT (list_mbr);
|
||
|
||
if (! TYPE_DERIVES_FROM (context, type))
|
||
{
|
||
value = tree_cons (NULL_TREE, TREE_VALUE (values), value);
|
||
problem = 1;
|
||
break;
|
||
}
|
||
}
|
||
}
|
||
else
|
||
{
|
||
context = (TREE_CODE (sub_values) == FUNCTION_DECL
|
||
&& DECL_VIRTUAL_P (sub_values))
|
||
? DECL_CLASS_CONTEXT (sub_values)
|
||
: DECL_CONTEXT (sub_values);
|
||
|
||
if (context && ! TYPE_DERIVES_FROM (context, type))
|
||
{
|
||
value = tree_cons (NULL_TREE, values, value);
|
||
problem = 1;
|
||
break;
|
||
}
|
||
}
|
||
}
|
||
if (! problem) value = fields;
|
||
}
|
||
|
||
/* Mark this as a potentially ambiguous member. */
|
||
if (TREE_CODE (value) == TREE_LIST)
|
||
{
|
||
/* Leaving TREE_TYPE blank is intentional.
|
||
We cannot use `error_mark_node' (lookup_name)
|
||
or `unknown_type_node' (all member functions use this). */
|
||
TREE_NONLOCAL_FLAG (value) = 1;
|
||
}
|
||
|
||
/* Put the new contents in our envelope. */
|
||
TREE_PURPOSE (class_value) = value;
|
||
}
|
||
else
|
||
{
|
||
/* See comment above for a description of envelopes. */
|
||
tree envelope = tree_cons (fields, class_value,
|
||
closed_envelopes);
|
||
|
||
closed_envelopes = envelope;
|
||
IDENTIFIER_CLASS_VALUE (DECL_NAME (fields)) = envelope;
|
||
}
|
||
}
|
||
}
|
||
|
||
method_vec = CLASSTYPE_METHOD_VEC (type);
|
||
if (method_vec != 0)
|
||
{
|
||
/* Farm out constructors and destructors. */
|
||
methods = &TREE_VEC_ELT (method_vec, 1);
|
||
end = TREE_VEC_END (method_vec);
|
||
|
||
/* This does not work for multiple inheritance yet. */
|
||
while (methods != end)
|
||
{
|
||
/* This will cause lookup_name to return a pointer
|
||
to the tree_list of possible methods of this name.
|
||
If the order is a problem, we can nreverse them. */
|
||
tree tmp;
|
||
tree class_value = IDENTIFIER_CLASS_VALUE (DECL_NAME (*methods));
|
||
|
||
if (class_value && TREE_CODE (class_value) == TREE_LIST
|
||
&& TREE_PURPOSE (class_value) != NULL_TREE
|
||
&& TREE_CODE (TREE_PURPOSE (class_value)) != IDENTIFIER_NODE)
|
||
{
|
||
tree old = TREE_PURPOSE (class_value);
|
||
|
||
maybe_push_cache_obstack ();
|
||
if (TREE_CODE (old) == TREE_LIST)
|
||
tmp = tree_cons (DECL_NAME (*methods), *methods, old);
|
||
else
|
||
{
|
||
/* Only complain if we shadow something we can access. */
|
||
if (old
|
||
&& warn_shadow
|
||
&& ((DECL_LANG_SPECIFIC (old)
|
||
&& DECL_CLASS_CONTEXT (old) == current_class_type)
|
||
|| ! TREE_PRIVATE (old)))
|
||
/* Should figure out access control more accurately. */
|
||
{
|
||
cp_warning_at ("member `%#D' is shadowed", old);
|
||
cp_warning_at ("by member function `%#D'", *methods);
|
||
warning ("in this context");
|
||
}
|
||
tmp = build_tree_list (DECL_NAME (*methods), *methods);
|
||
}
|
||
pop_obstacks ();
|
||
|
||
TREE_TYPE (tmp) = unknown_type_node;
|
||
#if 0
|
||
TREE_OVERLOADED (tmp) = DECL_OVERLOADED (*methods);
|
||
#endif
|
||
TREE_NONLOCAL_FLAG (tmp) = 1;
|
||
|
||
/* Put the new contents in our envelope. */
|
||
TREE_PURPOSE (class_value) = tmp;
|
||
}
|
||
else
|
||
{
|
||
maybe_push_cache_obstack ();
|
||
tmp = build_tree_list (DECL_NAME (*methods), *methods);
|
||
pop_obstacks ();
|
||
|
||
TREE_TYPE (tmp) = unknown_type_node;
|
||
#if 0
|
||
TREE_OVERLOADED (tmp) = DECL_OVERLOADED (*methods);
|
||
#endif
|
||
TREE_NONLOCAL_FLAG (tmp) = 1;
|
||
|
||
/* See comment above for a description of envelopes. */
|
||
closed_envelopes = tree_cons (tmp, class_value,
|
||
closed_envelopes);
|
||
IDENTIFIER_CLASS_VALUE (DECL_NAME (*methods)) = closed_envelopes;
|
||
}
|
||
#if 0
|
||
tmp = *methods;
|
||
while (tmp != 0)
|
||
{
|
||
DECL_PUBLIC (tmp) = 0;
|
||
DECL_PROTECTED (tmp) = 0;
|
||
DECL_PRIVATE (tmp) = 0;
|
||
tmp = DECL_CHAIN (tmp);
|
||
}
|
||
#endif
|
||
|
||
methods++;
|
||
}
|
||
}
|
||
SET_BINFO_MARKED (binfo);
|
||
}
|
||
|
||
/* Consolidate unique (by name) member functions. */
|
||
static void
|
||
dfs_compress_decls (binfo)
|
||
tree binfo;
|
||
{
|
||
tree type = BINFO_TYPE (binfo);
|
||
tree method_vec = CLASSTYPE_METHOD_VEC (type);
|
||
|
||
if (method_vec != 0)
|
||
{
|
||
/* Farm out constructors and destructors. */
|
||
tree *methods = &TREE_VEC_ELT (method_vec, 1);
|
||
tree *end = TREE_VEC_END (method_vec);
|
||
|
||
for (; methods != end; methods++)
|
||
{
|
||
/* This is known to be an envelope of the kind described before
|
||
dfs_pushdecls. */
|
||
tree class_value = IDENTIFIER_CLASS_VALUE (DECL_NAME (*methods));
|
||
tree tmp = TREE_PURPOSE (class_value);
|
||
|
||
/* This was replaced in scope by somebody else. Just leave it
|
||
alone. */
|
||
if (TREE_CODE (tmp) != TREE_LIST)
|
||
continue;
|
||
|
||
if (TREE_CHAIN (tmp) == NULL_TREE
|
||
&& TREE_VALUE (tmp)
|
||
&& DECL_CHAIN (TREE_VALUE (tmp)) == NULL_TREE)
|
||
{
|
||
TREE_PURPOSE (class_value) = TREE_VALUE (tmp);
|
||
}
|
||
}
|
||
}
|
||
CLEAR_BINFO_MARKED (binfo);
|
||
}
|
||
|
||
/* When entering the scope of a class, we cache all of the
|
||
fields that that class provides within its inheritance
|
||
lattice. Where ambiguities result, we mark them
|
||
with `error_mark_node' so that if they are encountered
|
||
without explicit qualification, we can emit an error
|
||
message. */
|
||
void
|
||
push_class_decls (type)
|
||
tree type;
|
||
{
|
||
tree id;
|
||
struct obstack *ambient_obstack = current_obstack;
|
||
|
||
#if 0
|
||
tree tags = CLASSTYPE_TAGS (type);
|
||
|
||
while (tags)
|
||
{
|
||
tree code_type_node;
|
||
tree tag;
|
||
|
||
switch (TREE_CODE (TREE_VALUE (tags)))
|
||
{
|
||
case ENUMERAL_TYPE:
|
||
code_type_node = enum_type_node;
|
||
break;
|
||
case RECORD_TYPE:
|
||
code_type_node = record_type_node;
|
||
break;
|
||
case CLASS_TYPE:
|
||
code_type_node = class_type_node;
|
||
break;
|
||
case UNION_TYPE:
|
||
code_type_node = union_type_node;
|
||
break;
|
||
default:
|
||
my_friendly_abort (297);
|
||
}
|
||
tag = xref_tag (code_type_node, TREE_PURPOSE (tags),
|
||
TYPE_BINFO_BASETYPE (TREE_VALUE (tags), 0), 0);
|
||
#if 0 /* not yet, should get fixed properly later */
|
||
pushdecl (make_type_decl (TREE_PURPOSE (tags), TREE_VALUE (tags)));
|
||
#else
|
||
pushdecl (build_decl (TYPE_DECL, TREE_PURPOSE (tags), TREE_VALUE (tags)));
|
||
#endif
|
||
}
|
||
#endif
|
||
|
||
search_stack = push_search_level (search_stack, &search_obstack);
|
||
|
||
id = TYPE_IDENTIFIER (type);
|
||
#if 0
|
||
if (IDENTIFIER_TEMPLATE (id) != 0)
|
||
{
|
||
tree tmpl = IDENTIFIER_TEMPLATE (id);
|
||
push_template_decls (DECL_ARGUMENTS (TREE_PURPOSE (tmpl)),
|
||
TREE_VALUE (tmpl), 1);
|
||
overload_template_name (id, 1);
|
||
}
|
||
#endif
|
||
|
||
/* Push class fields into CLASS_VALUE scope, and mark. */
|
||
dfs_walk (TYPE_BINFO (type), dfs_pushdecls, unmarkedp);
|
||
|
||
/* Compress fields which have only a single entry
|
||
by a given name, and unmark. */
|
||
dfs_walk (TYPE_BINFO (type), dfs_compress_decls, markedp);
|
||
|
||
/* Open up all the closed envelopes and push the contained decls into
|
||
class scope. */
|
||
while (closed_envelopes)
|
||
{
|
||
tree new = TREE_PURPOSE (closed_envelopes);
|
||
tree id;
|
||
|
||
/* This is messy because the class value may be a *_DECL, or a
|
||
TREE_LIST of overloaded *_DECLs or even a TREE_LIST of ambiguous
|
||
*_DECLs. The name is stored at different places in these three
|
||
cases. */
|
||
if (TREE_CODE (new) == TREE_LIST)
|
||
{
|
||
if (TREE_PURPOSE (new) != NULL_TREE)
|
||
id = TREE_PURPOSE (new);
|
||
else
|
||
{
|
||
tree node = TREE_VALUE (new);
|
||
|
||
while (TREE_CODE (node) == TREE_LIST)
|
||
node = TREE_VALUE (node);
|
||
id = DECL_NAME (node);
|
||
}
|
||
}
|
||
else
|
||
id = DECL_NAME (new);
|
||
|
||
/* Install the original class value in order to make
|
||
pushdecl_class_level work correctly. */
|
||
IDENTIFIER_CLASS_VALUE (id) = TREE_VALUE (closed_envelopes);
|
||
if (TREE_CODE (new) == TREE_LIST)
|
||
push_class_level_binding (id, new);
|
||
else
|
||
pushdecl_class_level (new);
|
||
closed_envelopes = TREE_CHAIN (closed_envelopes);
|
||
}
|
||
current_obstack = ambient_obstack;
|
||
}
|
||
|
||
/* Here's a subroutine we need because C lacks lambdas. */
|
||
static void
|
||
dfs_unuse_fields (binfo)
|
||
tree binfo;
|
||
{
|
||
tree type = TREE_TYPE (binfo);
|
||
tree fields;
|
||
|
||
for (fields = TYPE_FIELDS (type); fields; fields = TREE_CHAIN (fields))
|
||
{
|
||
if (TREE_CODE (fields) != FIELD_DECL)
|
||
continue;
|
||
|
||
TREE_USED (fields) = 0;
|
||
if (DECL_NAME (fields) == NULL_TREE
|
||
&& TREE_CODE (TREE_TYPE (fields)) == UNION_TYPE)
|
||
unuse_fields (TREE_TYPE (fields));
|
||
}
|
||
}
|
||
|
||
void
|
||
unuse_fields (type)
|
||
tree type;
|
||
{
|
||
dfs_walk (TYPE_BINFO (type), dfs_unuse_fields, unmarkedp);
|
||
}
|
||
|
||
void
|
||
pop_class_decls (type)
|
||
tree type;
|
||
{
|
||
/* We haven't pushed a search level when dealing with cached classes,
|
||
so we'd better not try to pop it. */
|
||
if (search_stack)
|
||
search_stack = pop_search_level (search_stack);
|
||
}
|
||
|
||
void
|
||
print_search_statistics ()
|
||
{
|
||
#ifdef GATHER_STATISTICS
|
||
if (flag_memoize_lookups)
|
||
{
|
||
fprintf (stderr, "%d memoized contexts saved\n",
|
||
n_contexts_saved);
|
||
fprintf (stderr, "%d local tree nodes made\n", my_tree_node_counter);
|
||
fprintf (stderr, "%d local hash nodes made\n", my_memoized_entry_counter);
|
||
fprintf (stderr, "fields statistics:\n");
|
||
fprintf (stderr, " memoized finds = %d; rejects = %d; (searches = %d)\n",
|
||
memoized_fast_finds[0], memoized_fast_rejects[0],
|
||
memoized_fields_searched[0]);
|
||
fprintf (stderr, " memoized_adds = %d\n", memoized_adds[0]);
|
||
fprintf (stderr, "fnfields statistics:\n");
|
||
fprintf (stderr, " memoized finds = %d; rejects = %d; (searches = %d)\n",
|
||
memoized_fast_finds[1], memoized_fast_rejects[1],
|
||
memoized_fields_searched[1]);
|
||
fprintf (stderr, " memoized_adds = %d\n", memoized_adds[1]);
|
||
}
|
||
fprintf (stderr, "%d fields searched in %d[%d] calls to lookup_field[_1]\n",
|
||
n_fields_searched, n_calls_lookup_field, n_calls_lookup_field_1);
|
||
fprintf (stderr, "%d fnfields searched in %d calls to lookup_fnfields\n",
|
||
n_outer_fields_searched, n_calls_lookup_fnfields);
|
||
fprintf (stderr, "%d calls to get_base_type\n", n_calls_get_base_type);
|
||
#else
|
||
fprintf (stderr, "no search statistics\n");
|
||
#endif
|
||
}
|
||
|
||
void
|
||
init_search_processing ()
|
||
{
|
||
gcc_obstack_init (&search_obstack);
|
||
gcc_obstack_init (&type_obstack);
|
||
gcc_obstack_init (&type_obstack_entries);
|
||
|
||
/* This gives us room to build our chains of basetypes,
|
||
whether or not we decide to memoize them. */
|
||
type_stack = push_type_level (0, &type_obstack);
|
||
_vptr_name = get_identifier ("_vptr");
|
||
}
|
||
|
||
void
|
||
reinit_search_statistics ()
|
||
{
|
||
my_memoized_entry_counter = 0;
|
||
memoized_fast_finds[0] = 0;
|
||
memoized_fast_finds[1] = 0;
|
||
memoized_adds[0] = 0;
|
||
memoized_adds[1] = 0;
|
||
memoized_fast_rejects[0] = 0;
|
||
memoized_fast_rejects[1] = 0;
|
||
memoized_fields_searched[0] = 0;
|
||
memoized_fields_searched[1] = 0;
|
||
n_fields_searched = 0;
|
||
n_calls_lookup_field = 0, n_calls_lookup_field_1 = 0;
|
||
n_calls_lookup_fnfields = 0, n_calls_lookup_fnfields_1 = 0;
|
||
n_calls_get_base_type = 0;
|
||
n_outer_fields_searched = 0;
|
||
n_contexts_saved = 0;
|
||
}
|