rfg@paris.ics.uci.edu (Ronald Guilmette) (02/15/90)
// cfront 2.0 bug 900214_01
// cfront 2.0 generates only a warning when an attempt is made to assign the
// address of a "bound" member function to a pointer-to-member-function
// variable.
// Furthermore, cfront generates invalid C code for such cases.
// Such cases should either generate errors or be perfectly legal. If
// such usage is deemed legal, no warnings should be issued and proper C
// code should be generated.
struct struct0 {
int struct0_function_member_0 ();
};
int (struct0::*fmp) ();
int (*fp) ();
struct0 *ptr;
void global_function_0 ()
{
//fp = &ptr->struct0_function_member_0; // definitely illegal
fmp = &ptr->struct0_function_member_0; // ERROR
}
int main () { return 0; }