Use obstack_strdup more
[deliverable/binutils-gdb.git] / gdb / ada-lang.c
CommitLineData
6e681866 1/* Ada language support routines for GDB, the GNU debugger.
10a2c479 2
42a4f53d 3 Copyright (C) 1992-2019 Free Software Foundation, Inc.
14f9c5c9 4
a9762ec7 5 This file is part of GDB.
14f9c5c9 6
a9762ec7
JB
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
14f9c5c9 11
a9762ec7
JB
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
14f9c5c9 16
a9762ec7
JB
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
14f9c5c9 19
96d887e8 20
4c4b4cd2 21#include "defs.h"
14f9c5c9 22#include <ctype.h>
14f9c5c9 23#include "demangle.h"
d55e5aa6 24#include "gdb_regex.h"
4de283e4
TT
25#include "frame.h"
26#include "symtab.h"
27#include "gdbtypes.h"
14f9c5c9 28#include "gdbcmd.h"
4de283e4
TT
29#include "expression.h"
30#include "parser-defs.h"
31#include "language.h"
32#include "varobj.h"
33#include "c-lang.h"
34#include "inferior.h"
35#include "symfile.h"
36#include "objfiles.h"
37#include "breakpoint.h"
14f9c5c9 38#include "gdbcore.h"
4c4b4cd2 39#include "hashtab.h"
4de283e4
TT
40#include "gdb_obstack.h"
41#include "ada-lang.h"
42#include "completer.h"
43#include <sys/stat.h>
44#include "ui-out.h"
45#include "block.h"
04714b91 46#include "infcall.h"
4de283e4
TT
47#include "dictionary.h"
48#include "annotate.h"
49#include "valprint.h"
d55e5aa6 50#include "source.h"
4de283e4 51#include "observable.h"
268a13a5 52#include "gdbsupport/vec.h"
692465f1 53#include "stack.h"
268a13a5 54#include "gdbsupport/gdb_vecs.h"
79d43c61 55#include "typeprint.h"
4de283e4
TT
56#include "namespace.h"
57
58#include "psymtab.h"
40bc484c 59#include "value.h"
4de283e4
TT
60#include "mi/mi-common.h"
61#include "arch-utils.h"
62#include "cli/cli-utils.h"
268a13a5
TT
63#include "gdbsupport/function-view.h"
64#include "gdbsupport/byte-vector.h"
4de283e4 65#include <algorithm>
2ff0a947 66#include <map>
ccefe4c4 67
4c4b4cd2 68/* Define whether or not the C operator '/' truncates towards zero for
0963b4bd 69 differently signed operands (truncation direction is undefined in C).
4c4b4cd2
PH
70 Copied from valarith.c. */
71
72#ifndef TRUNCATION_TOWARDS_ZERO
73#define TRUNCATION_TOWARDS_ZERO ((-5 / 2) == -2)
74#endif
75
d2e4a39e 76static struct type *desc_base_type (struct type *);
14f9c5c9 77
d2e4a39e 78static struct type *desc_bounds_type (struct type *);
14f9c5c9 79
d2e4a39e 80static struct value *desc_bounds (struct value *);
14f9c5c9 81
d2e4a39e 82static int fat_pntr_bounds_bitpos (struct type *);
14f9c5c9 83
d2e4a39e 84static int fat_pntr_bounds_bitsize (struct type *);
14f9c5c9 85
556bdfd4 86static struct type *desc_data_target_type (struct type *);
14f9c5c9 87
d2e4a39e 88static struct value *desc_data (struct value *);
14f9c5c9 89
d2e4a39e 90static int fat_pntr_data_bitpos (struct type *);
14f9c5c9 91
d2e4a39e 92static int fat_pntr_data_bitsize (struct type *);
14f9c5c9 93
d2e4a39e 94static struct value *desc_one_bound (struct value *, int, int);
14f9c5c9 95
d2e4a39e 96static int desc_bound_bitpos (struct type *, int, int);
14f9c5c9 97
d2e4a39e 98static int desc_bound_bitsize (struct type *, int, int);
14f9c5c9 99
d2e4a39e 100static struct type *desc_index_type (struct type *, int);
14f9c5c9 101
d2e4a39e 102static int desc_arity (struct type *);
14f9c5c9 103
d2e4a39e 104static int ada_type_match (struct type *, struct type *, int);
14f9c5c9 105
d2e4a39e 106static int ada_args_match (struct symbol *, struct value **, int);
14f9c5c9 107
40bc484c 108static struct value *make_array_descriptor (struct type *, struct value *);
14f9c5c9 109
4c4b4cd2 110static void ada_add_block_symbols (struct obstack *,
b5ec771e
PA
111 const struct block *,
112 const lookup_name_info &lookup_name,
113 domain_enum, struct objfile *);
14f9c5c9 114
22cee43f 115static void ada_add_all_symbols (struct obstack *, const struct block *,
b5ec771e
PA
116 const lookup_name_info &lookup_name,
117 domain_enum, int, int *);
22cee43f 118
d12307c1 119static int is_nonfunction (struct block_symbol *, int);
14f9c5c9 120
76a01679 121static void add_defn_to_vec (struct obstack *, struct symbol *,
f0c5f9b2 122 const struct block *);
14f9c5c9 123
4c4b4cd2
PH
124static int num_defns_collected (struct obstack *);
125
d12307c1 126static struct block_symbol *defns_collected (struct obstack *, int);
14f9c5c9 127
e9d9f57e 128static struct value *resolve_subexp (expression_up *, int *, int,
699bd4cf
TT
129 struct type *, int,
130 innermost_block_tracker *);
14f9c5c9 131
e9d9f57e 132static void replace_operator_with_call (expression_up *, int, int, int,
270140bd 133 struct symbol *, const struct block *);
14f9c5c9 134
d2e4a39e 135static int possible_user_operator_p (enum exp_opcode, struct value **);
14f9c5c9 136
a121b7c1 137static const char *ada_op_name (enum exp_opcode);
4c4b4cd2
PH
138
139static const char *ada_decoded_op_name (enum exp_opcode);
14f9c5c9 140
d2e4a39e 141static int numeric_type_p (struct type *);
14f9c5c9 142
d2e4a39e 143static int integer_type_p (struct type *);
14f9c5c9 144
d2e4a39e 145static int scalar_type_p (struct type *);
14f9c5c9 146
d2e4a39e 147static int discrete_type_p (struct type *);
14f9c5c9 148
a121b7c1 149static struct type *ada_lookup_struct_elt_type (struct type *, const char *,
988f6b3d 150 int, int);
4c4b4cd2 151
d2e4a39e 152static struct value *evaluate_subexp_type (struct expression *, int *);
14f9c5c9 153
b4ba55a1
JB
154static struct type *ada_find_parallel_type_with_name (struct type *,
155 const char *);
156
d2e4a39e 157static int is_dynamic_field (struct type *, int);
14f9c5c9 158
10a2c479 159static struct type *to_fixed_variant_branch_type (struct type *,
fc1a4b47 160 const gdb_byte *,
4c4b4cd2
PH
161 CORE_ADDR, struct value *);
162
163static struct type *to_fixed_array_type (struct type *, struct value *, int);
14f9c5c9 164
28c85d6c 165static struct type *to_fixed_range_type (struct type *, struct value *);
14f9c5c9 166
d2e4a39e 167static struct type *to_static_fixed_type (struct type *);
f192137b 168static struct type *static_unwrap_type (struct type *type);
14f9c5c9 169
d2e4a39e 170static struct value *unwrap_value (struct value *);
14f9c5c9 171
ad82864c 172static struct type *constrained_packed_array_type (struct type *, long *);
14f9c5c9 173
ad82864c 174static struct type *decode_constrained_packed_array_type (struct type *);
14f9c5c9 175
ad82864c
JB
176static long decode_packed_array_bitsize (struct type *);
177
178static struct value *decode_constrained_packed_array (struct value *);
179
180static int ada_is_packed_array_type (struct type *);
181
182static int ada_is_unconstrained_packed_array_type (struct type *);
14f9c5c9 183
d2e4a39e 184static struct value *value_subscript_packed (struct value *, int,
4c4b4cd2 185 struct value **);
14f9c5c9 186
4c4b4cd2
PH
187static struct value *coerce_unspec_val_to_type (struct value *,
188 struct type *);
14f9c5c9 189
d2e4a39e 190static int lesseq_defined_than (struct symbol *, struct symbol *);
14f9c5c9 191
d2e4a39e 192static int equiv_types (struct type *, struct type *);
14f9c5c9 193
d2e4a39e 194static int is_name_suffix (const char *);
14f9c5c9 195
73589123
PH
196static int advance_wild_match (const char **, const char *, int);
197
b5ec771e 198static bool wild_match (const char *name, const char *patn);
14f9c5c9 199
d2e4a39e 200static struct value *ada_coerce_ref (struct value *);
14f9c5c9 201
4c4b4cd2
PH
202static LONGEST pos_atr (struct value *);
203
3cb382c9 204static struct value *value_pos_atr (struct type *, struct value *);
14f9c5c9 205
d2e4a39e 206static struct value *value_val_atr (struct type *, struct value *);
14f9c5c9 207
4c4b4cd2
PH
208static struct symbol *standard_lookup (const char *, const struct block *,
209 domain_enum);
14f9c5c9 210
108d56a4 211static struct value *ada_search_struct_field (const char *, struct value *, int,
4c4b4cd2
PH
212 struct type *);
213
214static struct value *ada_value_primitive_field (struct value *, int, int,
215 struct type *);
216
0d5cff50 217static int find_struct_field (const char *, struct type *, int,
52ce6436 218 struct type **, int *, int *, int *, int *);
4c4b4cd2 219
d12307c1 220static int ada_resolve_function (struct block_symbol *, int,
4c4b4cd2 221 struct value **, int, const char *,
2a612529 222 struct type *, int);
4c4b4cd2 223
4c4b4cd2
PH
224static int ada_is_direct_array_type (struct type *);
225
72d5681a
PH
226static void ada_language_arch_info (struct gdbarch *,
227 struct language_arch_info *);
714e53ab 228
52ce6436
PH
229static struct value *ada_index_struct_field (int, struct value *, int,
230 struct type *);
231
232static struct value *assign_aggregate (struct value *, struct value *,
0963b4bd
MS
233 struct expression *,
234 int *, enum noside);
52ce6436
PH
235
236static void aggregate_assign_from_choices (struct value *, struct value *,
237 struct expression *,
238 int *, LONGEST *, int *,
239 int, LONGEST, LONGEST);
240
241static void aggregate_assign_positional (struct value *, struct value *,
242 struct expression *,
243 int *, LONGEST *, int *, int,
244 LONGEST, LONGEST);
245
246
247static void aggregate_assign_others (struct value *, struct value *,
248 struct expression *,
249 int *, LONGEST *, int, LONGEST, LONGEST);
250
251
252static void add_component_interval (LONGEST, LONGEST, LONGEST *, int *, int);
253
254
255static struct value *ada_evaluate_subexp (struct type *, struct expression *,
256 int *, enum noside);
257
258static void ada_forward_operator_length (struct expression *, int, int *,
259 int *);
852dff6c
JB
260
261static struct type *ada_find_any_type (const char *name);
b5ec771e
PA
262
263static symbol_name_matcher_ftype *ada_get_symbol_name_matcher
264 (const lookup_name_info &lookup_name);
265
4c4b4cd2
PH
266\f
267
ee01b665
JB
268/* The result of a symbol lookup to be stored in our symbol cache. */
269
270struct cache_entry
271{
272 /* The name used to perform the lookup. */
273 const char *name;
274 /* The namespace used during the lookup. */
fe978cb0 275 domain_enum domain;
ee01b665
JB
276 /* The symbol returned by the lookup, or NULL if no matching symbol
277 was found. */
278 struct symbol *sym;
279 /* The block where the symbol was found, or NULL if no matching
280 symbol was found. */
281 const struct block *block;
282 /* A pointer to the next entry with the same hash. */
283 struct cache_entry *next;
284};
285
286/* The Ada symbol cache, used to store the result of Ada-mode symbol
287 lookups in the course of executing the user's commands.
288
289 The cache is implemented using a simple, fixed-sized hash.
290 The size is fixed on the grounds that there are not likely to be
291 all that many symbols looked up during any given session, regardless
292 of the size of the symbol table. If we decide to go to a resizable
293 table, let's just use the stuff from libiberty instead. */
294
295#define HASH_SIZE 1009
296
297struct ada_symbol_cache
298{
299 /* An obstack used to store the entries in our cache. */
300 struct obstack cache_space;
301
302 /* The root of the hash table used to implement our symbol cache. */
303 struct cache_entry *root[HASH_SIZE];
304};
305
306static void ada_free_symbol_cache (struct ada_symbol_cache *sym_cache);
76a01679 307
4c4b4cd2 308/* Maximum-sized dynamic type. */
14f9c5c9
AS
309static unsigned int varsize_limit;
310
67cb5b2d 311static const char ada_completer_word_break_characters[] =
4c4b4cd2
PH
312#ifdef VMS
313 " \t\n!@#%^&*()+=|~`}{[]\";:?/,-";
314#else
14f9c5c9 315 " \t\n!@#$%^&*()+=|~`}{[]\";:?/,-";
4c4b4cd2 316#endif
14f9c5c9 317
4c4b4cd2 318/* The name of the symbol to use to get the name of the main subprogram. */
76a01679 319static const char ADA_MAIN_PROGRAM_SYMBOL_NAME[]
4c4b4cd2 320 = "__gnat_ada_main_program_name";
14f9c5c9 321
4c4b4cd2
PH
322/* Limit on the number of warnings to raise per expression evaluation. */
323static int warning_limit = 2;
324
325/* Number of warning messages issued; reset to 0 by cleanups after
326 expression evaluation. */
327static int warnings_issued = 0;
328
329static const char *known_runtime_file_name_patterns[] = {
330 ADA_KNOWN_RUNTIME_FILE_NAME_PATTERNS NULL
331};
332
333static const char *known_auxiliary_function_name_patterns[] = {
334 ADA_KNOWN_AUXILIARY_FUNCTION_NAME_PATTERNS NULL
335};
336
c6044dd1
JB
337/* Maintenance-related settings for this module. */
338
339static struct cmd_list_element *maint_set_ada_cmdlist;
340static struct cmd_list_element *maint_show_ada_cmdlist;
341
342/* Implement the "maintenance set ada" (prefix) command. */
343
344static void
981a3fb3 345maint_set_ada_cmd (const char *args, int from_tty)
c6044dd1 346{
635c7e8a
TT
347 help_list (maint_set_ada_cmdlist, "maintenance set ada ", all_commands,
348 gdb_stdout);
c6044dd1
JB
349}
350
351/* Implement the "maintenance show ada" (prefix) command. */
352
353static void
981a3fb3 354maint_show_ada_cmd (const char *args, int from_tty)
c6044dd1
JB
355{
356 cmd_show_list (maint_show_ada_cmdlist, from_tty, "");
357}
358
359/* The "maintenance ada set/show ignore-descriptive-type" value. */
360
361static int ada_ignore_descriptive_types_p = 0;
362
e802dbe0
JB
363 /* Inferior-specific data. */
364
365/* Per-inferior data for this module. */
366
367struct ada_inferior_data
368{
369 /* The ada__tags__type_specific_data type, which is used when decoding
370 tagged types. With older versions of GNAT, this type was directly
371 accessible through a component ("tsd") in the object tag. But this
372 is no longer the case, so we cache it for each inferior. */
f37b313d 373 struct type *tsd_type = nullptr;
3eecfa55
JB
374
375 /* The exception_support_info data. This data is used to determine
376 how to implement support for Ada exception catchpoints in a given
377 inferior. */
f37b313d 378 const struct exception_support_info *exception_info = nullptr;
e802dbe0
JB
379};
380
381/* Our key to this module's inferior data. */
f37b313d 382static const struct inferior_key<ada_inferior_data> ada_inferior_data;
e802dbe0
JB
383
384/* Return our inferior data for the given inferior (INF).
385
386 This function always returns a valid pointer to an allocated
387 ada_inferior_data structure. If INF's inferior data has not
388 been previously set, this functions creates a new one with all
389 fields set to zero, sets INF's inferior to it, and then returns
390 a pointer to that newly allocated ada_inferior_data. */
391
392static struct ada_inferior_data *
393get_ada_inferior_data (struct inferior *inf)
394{
395 struct ada_inferior_data *data;
396
f37b313d 397 data = ada_inferior_data.get (inf);
e802dbe0 398 if (data == NULL)
f37b313d 399 data = ada_inferior_data.emplace (inf);
e802dbe0
JB
400
401 return data;
402}
403
404/* Perform all necessary cleanups regarding our module's inferior data
405 that is required after the inferior INF just exited. */
406
407static void
408ada_inferior_exit (struct inferior *inf)
409{
f37b313d 410 ada_inferior_data.clear (inf);
e802dbe0
JB
411}
412
ee01b665
JB
413
414 /* program-space-specific data. */
415
416/* This module's per-program-space data. */
417struct ada_pspace_data
418{
f37b313d
TT
419 ~ada_pspace_data ()
420 {
421 if (sym_cache != NULL)
422 ada_free_symbol_cache (sym_cache);
423 }
424
ee01b665 425 /* The Ada symbol cache. */
f37b313d 426 struct ada_symbol_cache *sym_cache = nullptr;
ee01b665
JB
427};
428
429/* Key to our per-program-space data. */
f37b313d 430static const struct program_space_key<ada_pspace_data> ada_pspace_data_handle;
ee01b665
JB
431
432/* Return this module's data for the given program space (PSPACE).
433 If not is found, add a zero'ed one now.
434
435 This function always returns a valid object. */
436
437static struct ada_pspace_data *
438get_ada_pspace_data (struct program_space *pspace)
439{
440 struct ada_pspace_data *data;
441
f37b313d 442 data = ada_pspace_data_handle.get (pspace);
ee01b665 443 if (data == NULL)
f37b313d 444 data = ada_pspace_data_handle.emplace (pspace);
ee01b665
JB
445
446 return data;
447}
448
4c4b4cd2
PH
449 /* Utilities */
450
720d1a40 451/* If TYPE is a TYPE_CODE_TYPEDEF type, return the target type after
eed9788b 452 all typedef layers have been peeled. Otherwise, return TYPE.
720d1a40
JB
453
454 Normally, we really expect a typedef type to only have 1 typedef layer.
455 In other words, we really expect the target type of a typedef type to be
456 a non-typedef type. This is particularly true for Ada units, because
457 the language does not have a typedef vs not-typedef distinction.
458 In that respect, the Ada compiler has been trying to eliminate as many
459 typedef definitions in the debugging information, since they generally
460 do not bring any extra information (we still use typedef under certain
461 circumstances related mostly to the GNAT encoding).
462
463 Unfortunately, we have seen situations where the debugging information
464 generated by the compiler leads to such multiple typedef layers. For
465 instance, consider the following example with stabs:
466
467 .stabs "pck__float_array___XUP:Tt(0,46)=s16P_ARRAY:(0,47)=[...]"[...]
468 .stabs "pck__float_array___XUP:t(0,36)=(0,46)",128,0,6,0
469
470 This is an error in the debugging information which causes type
471 pck__float_array___XUP to be defined twice, and the second time,
472 it is defined as a typedef of a typedef.
473
474 This is on the fringe of legality as far as debugging information is
475 concerned, and certainly unexpected. But it is easy to handle these
476 situations correctly, so we can afford to be lenient in this case. */
477
478static struct type *
479ada_typedef_target_type (struct type *type)
480{
481 while (TYPE_CODE (type) == TYPE_CODE_TYPEDEF)
482 type = TYPE_TARGET_TYPE (type);
483 return type;
484}
485
41d27058
JB
486/* Given DECODED_NAME a string holding a symbol name in its
487 decoded form (ie using the Ada dotted notation), returns
488 its unqualified name. */
489
490static const char *
491ada_unqualified_name (const char *decoded_name)
492{
2b0f535a
JB
493 const char *result;
494
495 /* If the decoded name starts with '<', it means that the encoded
496 name does not follow standard naming conventions, and thus that
497 it is not your typical Ada symbol name. Trying to unqualify it
498 is therefore pointless and possibly erroneous. */
499 if (decoded_name[0] == '<')
500 return decoded_name;
501
502 result = strrchr (decoded_name, '.');
41d27058
JB
503 if (result != NULL)
504 result++; /* Skip the dot... */
505 else
506 result = decoded_name;
507
508 return result;
509}
510
39e7af3e 511/* Return a string starting with '<', followed by STR, and '>'. */
41d27058 512
39e7af3e 513static std::string
41d27058
JB
514add_angle_brackets (const char *str)
515{
39e7af3e 516 return string_printf ("<%s>", str);
41d27058 517}
96d887e8 518
67cb5b2d 519static const char *
4c4b4cd2
PH
520ada_get_gdb_completer_word_break_characters (void)
521{
522 return ada_completer_word_break_characters;
523}
524
e79af960
JB
525/* Print an array element index using the Ada syntax. */
526
527static void
528ada_print_array_index (struct value *index_value, struct ui_file *stream,
79a45b7d 529 const struct value_print_options *options)
e79af960 530{
79a45b7d 531 LA_VALUE_PRINT (index_value, stream, options);
e79af960
JB
532 fprintf_filtered (stream, " => ");
533}
534
e2b7af72
JB
535/* la_watch_location_expression for Ada. */
536
537gdb::unique_xmalloc_ptr<char>
538ada_watch_location_expression (struct type *type, CORE_ADDR addr)
539{
540 type = check_typedef (TYPE_TARGET_TYPE (check_typedef (type)));
541 std::string name = type_to_string (type);
542 return gdb::unique_xmalloc_ptr<char>
543 (xstrprintf ("{%s} %s", name.c_str (), core_addr_to_string (addr)));
544}
545
f27cf670 546/* Assuming VECT points to an array of *SIZE objects of size
14f9c5c9 547 ELEMENT_SIZE, grow it to contain at least MIN_SIZE objects,
f27cf670 548 updating *SIZE as necessary and returning the (new) array. */
14f9c5c9 549
f27cf670
AS
550void *
551grow_vect (void *vect, size_t *size, size_t min_size, int element_size)
14f9c5c9 552{
d2e4a39e
AS
553 if (*size < min_size)
554 {
555 *size *= 2;
556 if (*size < min_size)
4c4b4cd2 557 *size = min_size;
f27cf670 558 vect = xrealloc (vect, *size * element_size);
d2e4a39e 559 }
f27cf670 560 return vect;
14f9c5c9
AS
561}
562
563/* True (non-zero) iff TARGET matches FIELD_NAME up to any trailing
4c4b4cd2 564 suffix of FIELD_NAME beginning "___". */
14f9c5c9
AS
565
566static int
ebf56fd3 567field_name_match (const char *field_name, const char *target)
14f9c5c9
AS
568{
569 int len = strlen (target);
5b4ee69b 570
d2e4a39e 571 return
4c4b4cd2
PH
572 (strncmp (field_name, target, len) == 0
573 && (field_name[len] == '\0'
61012eef 574 || (startswith (field_name + len, "___")
76a01679
JB
575 && strcmp (field_name + strlen (field_name) - 6,
576 "___XVN") != 0)));
14f9c5c9
AS
577}
578
579
872c8b51
JB
580/* Assuming TYPE is a TYPE_CODE_STRUCT or a TYPE_CODE_TYPDEF to
581 a TYPE_CODE_STRUCT, find the field whose name matches FIELD_NAME,
582 and return its index. This function also handles fields whose name
583 have ___ suffixes because the compiler sometimes alters their name
584 by adding such a suffix to represent fields with certain constraints.
585 If the field could not be found, return a negative number if
586 MAYBE_MISSING is set. Otherwise raise an error. */
4c4b4cd2
PH
587
588int
589ada_get_field_index (const struct type *type, const char *field_name,
590 int maybe_missing)
591{
592 int fieldno;
872c8b51
JB
593 struct type *struct_type = check_typedef ((struct type *) type);
594
595 for (fieldno = 0; fieldno < TYPE_NFIELDS (struct_type); fieldno++)
596 if (field_name_match (TYPE_FIELD_NAME (struct_type, fieldno), field_name))
4c4b4cd2
PH
597 return fieldno;
598
599 if (!maybe_missing)
323e0a4a 600 error (_("Unable to find field %s in struct %s. Aborting"),
872c8b51 601 field_name, TYPE_NAME (struct_type));
4c4b4cd2
PH
602
603 return -1;
604}
605
606/* The length of the prefix of NAME prior to any "___" suffix. */
14f9c5c9
AS
607
608int
d2e4a39e 609ada_name_prefix_len (const char *name)
14f9c5c9
AS
610{
611 if (name == NULL)
612 return 0;
d2e4a39e 613 else
14f9c5c9 614 {
d2e4a39e 615 const char *p = strstr (name, "___");
5b4ee69b 616
14f9c5c9 617 if (p == NULL)
4c4b4cd2 618 return strlen (name);
14f9c5c9 619 else
4c4b4cd2 620 return p - name;
14f9c5c9
AS
621 }
622}
623
4c4b4cd2
PH
624/* Return non-zero if SUFFIX is a suffix of STR.
625 Return zero if STR is null. */
626
14f9c5c9 627static int
d2e4a39e 628is_suffix (const char *str, const char *suffix)
14f9c5c9
AS
629{
630 int len1, len2;
5b4ee69b 631
14f9c5c9
AS
632 if (str == NULL)
633 return 0;
634 len1 = strlen (str);
635 len2 = strlen (suffix);
4c4b4cd2 636 return (len1 >= len2 && strcmp (str + len1 - len2, suffix) == 0);
14f9c5c9
AS
637}
638
4c4b4cd2
PH
639/* The contents of value VAL, treated as a value of type TYPE. The
640 result is an lval in memory if VAL is. */
14f9c5c9 641
d2e4a39e 642static struct value *
4c4b4cd2 643coerce_unspec_val_to_type (struct value *val, struct type *type)
14f9c5c9 644{
61ee279c 645 type = ada_check_typedef (type);
df407dfe 646 if (value_type (val) == type)
4c4b4cd2 647 return val;
d2e4a39e 648 else
14f9c5c9 649 {
4c4b4cd2
PH
650 struct value *result;
651
652 /* Make sure that the object size is not unreasonable before
653 trying to allocate some memory for it. */
c1b5a1a6 654 ada_ensure_varsize_limit (type);
4c4b4cd2 655
41e8491f
JK
656 if (value_lazy (val)
657 || TYPE_LENGTH (type) > TYPE_LENGTH (value_type (val)))
658 result = allocate_value_lazy (type);
659 else
660 {
661 result = allocate_value (type);
9a0dc9e3 662 value_contents_copy_raw (result, 0, val, 0, TYPE_LENGTH (type));
41e8491f 663 }
74bcbdf3 664 set_value_component_location (result, val);
9bbda503
AC
665 set_value_bitsize (result, value_bitsize (val));
666 set_value_bitpos (result, value_bitpos (val));
c408a94f
TT
667 if (VALUE_LVAL (result) == lval_memory)
668 set_value_address (result, value_address (val));
14f9c5c9
AS
669 return result;
670 }
671}
672
fc1a4b47
AC
673static const gdb_byte *
674cond_offset_host (const gdb_byte *valaddr, long offset)
14f9c5c9
AS
675{
676 if (valaddr == NULL)
677 return NULL;
678 else
679 return valaddr + offset;
680}
681
682static CORE_ADDR
ebf56fd3 683cond_offset_target (CORE_ADDR address, long offset)
14f9c5c9
AS
684{
685 if (address == 0)
686 return 0;
d2e4a39e 687 else
14f9c5c9
AS
688 return address + offset;
689}
690
4c4b4cd2
PH
691/* Issue a warning (as for the definition of warning in utils.c, but
692 with exactly one argument rather than ...), unless the limit on the
693 number of warnings has passed during the evaluation of the current
694 expression. */
a2249542 695
77109804
AC
696/* FIXME: cagney/2004-10-10: This function is mimicking the behavior
697 provided by "complaint". */
a0b31db1 698static void lim_warning (const char *format, ...) ATTRIBUTE_PRINTF (1, 2);
77109804 699
14f9c5c9 700static void
a2249542 701lim_warning (const char *format, ...)
14f9c5c9 702{
a2249542 703 va_list args;
a2249542 704
5b4ee69b 705 va_start (args, format);
4c4b4cd2
PH
706 warnings_issued += 1;
707 if (warnings_issued <= warning_limit)
a2249542
MK
708 vwarning (format, args);
709
710 va_end (args);
4c4b4cd2
PH
711}
712
714e53ab
PH
713/* Issue an error if the size of an object of type T is unreasonable,
714 i.e. if it would be a bad idea to allocate a value of this type in
715 GDB. */
716
c1b5a1a6
JB
717void
718ada_ensure_varsize_limit (const struct type *type)
714e53ab
PH
719{
720 if (TYPE_LENGTH (type) > varsize_limit)
323e0a4a 721 error (_("object size is larger than varsize-limit"));
714e53ab
PH
722}
723
0963b4bd 724/* Maximum value of a SIZE-byte signed integer type. */
4c4b4cd2 725static LONGEST
c3e5cd34 726max_of_size (int size)
4c4b4cd2 727{
76a01679 728 LONGEST top_bit = (LONGEST) 1 << (size * 8 - 2);
5b4ee69b 729
76a01679 730 return top_bit | (top_bit - 1);
4c4b4cd2
PH
731}
732
0963b4bd 733/* Minimum value of a SIZE-byte signed integer type. */
4c4b4cd2 734static LONGEST
c3e5cd34 735min_of_size (int size)
4c4b4cd2 736{
c3e5cd34 737 return -max_of_size (size) - 1;
4c4b4cd2
PH
738}
739
0963b4bd 740/* Maximum value of a SIZE-byte unsigned integer type. */
4c4b4cd2 741static ULONGEST
c3e5cd34 742umax_of_size (int size)
4c4b4cd2 743{
76a01679 744 ULONGEST top_bit = (ULONGEST) 1 << (size * 8 - 1);
5b4ee69b 745
76a01679 746 return top_bit | (top_bit - 1);
4c4b4cd2
PH
747}
748
0963b4bd 749/* Maximum value of integral type T, as a signed quantity. */
c3e5cd34
PH
750static LONGEST
751max_of_type (struct type *t)
4c4b4cd2 752{
c3e5cd34
PH
753 if (TYPE_UNSIGNED (t))
754 return (LONGEST) umax_of_size (TYPE_LENGTH (t));
755 else
756 return max_of_size (TYPE_LENGTH (t));
757}
758
0963b4bd 759/* Minimum value of integral type T, as a signed quantity. */
c3e5cd34
PH
760static LONGEST
761min_of_type (struct type *t)
762{
763 if (TYPE_UNSIGNED (t))
764 return 0;
765 else
766 return min_of_size (TYPE_LENGTH (t));
4c4b4cd2
PH
767}
768
769/* The largest value in the domain of TYPE, a discrete type, as an integer. */
43bbcdc2
PH
770LONGEST
771ada_discrete_type_high_bound (struct type *type)
4c4b4cd2 772{
c3345124 773 type = resolve_dynamic_type (type, NULL, 0);
76a01679 774 switch (TYPE_CODE (type))
4c4b4cd2
PH
775 {
776 case TYPE_CODE_RANGE:
690cc4eb 777 return TYPE_HIGH_BOUND (type);
4c4b4cd2 778 case TYPE_CODE_ENUM:
14e75d8e 779 return TYPE_FIELD_ENUMVAL (type, TYPE_NFIELDS (type) - 1);
690cc4eb
PH
780 case TYPE_CODE_BOOL:
781 return 1;
782 case TYPE_CODE_CHAR:
76a01679 783 case TYPE_CODE_INT:
690cc4eb 784 return max_of_type (type);
4c4b4cd2 785 default:
43bbcdc2 786 error (_("Unexpected type in ada_discrete_type_high_bound."));
4c4b4cd2
PH
787 }
788}
789
14e75d8e 790/* The smallest value in the domain of TYPE, a discrete type, as an integer. */
43bbcdc2
PH
791LONGEST
792ada_discrete_type_low_bound (struct type *type)
4c4b4cd2 793{
c3345124 794 type = resolve_dynamic_type (type, NULL, 0);
76a01679 795 switch (TYPE_CODE (type))
4c4b4cd2
PH
796 {
797 case TYPE_CODE_RANGE:
690cc4eb 798 return TYPE_LOW_BOUND (type);
4c4b4cd2 799 case TYPE_CODE_ENUM:
14e75d8e 800 return TYPE_FIELD_ENUMVAL (type, 0);
690cc4eb
PH
801 case TYPE_CODE_BOOL:
802 return 0;
803 case TYPE_CODE_CHAR:
76a01679 804 case TYPE_CODE_INT:
690cc4eb 805 return min_of_type (type);
4c4b4cd2 806 default:
43bbcdc2 807 error (_("Unexpected type in ada_discrete_type_low_bound."));
4c4b4cd2
PH
808 }
809}
810
811/* The identity on non-range types. For range types, the underlying
76a01679 812 non-range scalar type. */
4c4b4cd2
PH
813
814static struct type *
18af8284 815get_base_type (struct type *type)
4c4b4cd2
PH
816{
817 while (type != NULL && TYPE_CODE (type) == TYPE_CODE_RANGE)
818 {
76a01679
JB
819 if (type == TYPE_TARGET_TYPE (type) || TYPE_TARGET_TYPE (type) == NULL)
820 return type;
4c4b4cd2
PH
821 type = TYPE_TARGET_TYPE (type);
822 }
823 return type;
14f9c5c9 824}
41246937
JB
825
826/* Return a decoded version of the given VALUE. This means returning
827 a value whose type is obtained by applying all the GNAT-specific
828 encondings, making the resulting type a static but standard description
829 of the initial type. */
830
831struct value *
832ada_get_decoded_value (struct value *value)
833{
834 struct type *type = ada_check_typedef (value_type (value));
835
836 if (ada_is_array_descriptor_type (type)
837 || (ada_is_constrained_packed_array_type (type)
838 && TYPE_CODE (type) != TYPE_CODE_PTR))
839 {
840 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF) /* array access type. */
841 value = ada_coerce_to_simple_array_ptr (value);
842 else
843 value = ada_coerce_to_simple_array (value);
844 }
845 else
846 value = ada_to_fixed_value (value);
847
848 return value;
849}
850
851/* Same as ada_get_decoded_value, but with the given TYPE.
852 Because there is no associated actual value for this type,
853 the resulting type might be a best-effort approximation in
854 the case of dynamic types. */
855
856struct type *
857ada_get_decoded_type (struct type *type)
858{
859 type = to_static_fixed_type (type);
860 if (ada_is_constrained_packed_array_type (type))
861 type = ada_coerce_to_simple_array_type (type);
862 return type;
863}
864
4c4b4cd2 865\f
76a01679 866
4c4b4cd2 867 /* Language Selection */
14f9c5c9
AS
868
869/* If the main program is in Ada, return language_ada, otherwise return LANG
ccefe4c4 870 (the main program is in Ada iif the adainit symbol is found). */
d2e4a39e 871
14f9c5c9 872enum language
ccefe4c4 873ada_update_initial_language (enum language lang)
14f9c5c9 874{
cafb3438 875 if (lookup_minimal_symbol ("adainit", NULL, NULL).minsym != NULL)
4c4b4cd2 876 return language_ada;
14f9c5c9
AS
877
878 return lang;
879}
96d887e8
PH
880
881/* If the main procedure is written in Ada, then return its name.
882 The result is good until the next call. Return NULL if the main
883 procedure doesn't appear to be in Ada. */
884
885char *
886ada_main_name (void)
887{
3b7344d5 888 struct bound_minimal_symbol msym;
e83e4e24 889 static gdb::unique_xmalloc_ptr<char> main_program_name;
6c038f32 890
96d887e8
PH
891 /* For Ada, the name of the main procedure is stored in a specific
892 string constant, generated by the binder. Look for that symbol,
893 extract its address, and then read that string. If we didn't find
894 that string, then most probably the main procedure is not written
895 in Ada. */
896 msym = lookup_minimal_symbol (ADA_MAIN_PROGRAM_SYMBOL_NAME, NULL, NULL);
897
3b7344d5 898 if (msym.minsym != NULL)
96d887e8 899 {
f9bc20b9
JB
900 CORE_ADDR main_program_name_addr;
901 int err_code;
902
77e371c0 903 main_program_name_addr = BMSYMBOL_VALUE_ADDRESS (msym);
96d887e8 904 if (main_program_name_addr == 0)
323e0a4a 905 error (_("Invalid address for Ada main program name."));
96d887e8 906
f9bc20b9
JB
907 target_read_string (main_program_name_addr, &main_program_name,
908 1024, &err_code);
909
910 if (err_code != 0)
911 return NULL;
e83e4e24 912 return main_program_name.get ();
96d887e8
PH
913 }
914
915 /* The main procedure doesn't seem to be in Ada. */
916 return NULL;
917}
14f9c5c9 918\f
4c4b4cd2 919 /* Symbols */
d2e4a39e 920
4c4b4cd2
PH
921/* Table of Ada operators and their GNAT-encoded names. Last entry is pair
922 of NULLs. */
14f9c5c9 923
d2e4a39e
AS
924const struct ada_opname_map ada_opname_table[] = {
925 {"Oadd", "\"+\"", BINOP_ADD},
926 {"Osubtract", "\"-\"", BINOP_SUB},
927 {"Omultiply", "\"*\"", BINOP_MUL},
928 {"Odivide", "\"/\"", BINOP_DIV},
929 {"Omod", "\"mod\"", BINOP_MOD},
930 {"Orem", "\"rem\"", BINOP_REM},
931 {"Oexpon", "\"**\"", BINOP_EXP},
932 {"Olt", "\"<\"", BINOP_LESS},
933 {"Ole", "\"<=\"", BINOP_LEQ},
934 {"Ogt", "\">\"", BINOP_GTR},
935 {"Oge", "\">=\"", BINOP_GEQ},
936 {"Oeq", "\"=\"", BINOP_EQUAL},
937 {"One", "\"/=\"", BINOP_NOTEQUAL},
938 {"Oand", "\"and\"", BINOP_BITWISE_AND},
939 {"Oor", "\"or\"", BINOP_BITWISE_IOR},
940 {"Oxor", "\"xor\"", BINOP_BITWISE_XOR},
941 {"Oconcat", "\"&\"", BINOP_CONCAT},
942 {"Oabs", "\"abs\"", UNOP_ABS},
943 {"Onot", "\"not\"", UNOP_LOGICAL_NOT},
944 {"Oadd", "\"+\"", UNOP_PLUS},
945 {"Osubtract", "\"-\"", UNOP_NEG},
946 {NULL, NULL}
14f9c5c9
AS
947};
948
b5ec771e
PA
949/* The "encoded" form of DECODED, according to GNAT conventions. The
950 result is valid until the next call to ada_encode. If
951 THROW_ERRORS, throw an error if invalid operator name is found.
952 Otherwise, return NULL in that case. */
4c4b4cd2 953
b5ec771e
PA
954static char *
955ada_encode_1 (const char *decoded, bool throw_errors)
14f9c5c9 956{
4c4b4cd2
PH
957 static char *encoding_buffer = NULL;
958 static size_t encoding_buffer_size = 0;
d2e4a39e 959 const char *p;
14f9c5c9 960 int k;
d2e4a39e 961
4c4b4cd2 962 if (decoded == NULL)
14f9c5c9
AS
963 return NULL;
964
4c4b4cd2
PH
965 GROW_VECT (encoding_buffer, encoding_buffer_size,
966 2 * strlen (decoded) + 10);
14f9c5c9
AS
967
968 k = 0;
4c4b4cd2 969 for (p = decoded; *p != '\0'; p += 1)
14f9c5c9 970 {
cdc7bb92 971 if (*p == '.')
4c4b4cd2
PH
972 {
973 encoding_buffer[k] = encoding_buffer[k + 1] = '_';
974 k += 2;
975 }
14f9c5c9 976 else if (*p == '"')
4c4b4cd2
PH
977 {
978 const struct ada_opname_map *mapping;
979
980 for (mapping = ada_opname_table;
1265e4aa 981 mapping->encoded != NULL
61012eef 982 && !startswith (p, mapping->decoded); mapping += 1)
4c4b4cd2
PH
983 ;
984 if (mapping->encoded == NULL)
b5ec771e
PA
985 {
986 if (throw_errors)
987 error (_("invalid Ada operator name: %s"), p);
988 else
989 return NULL;
990 }
4c4b4cd2
PH
991 strcpy (encoding_buffer + k, mapping->encoded);
992 k += strlen (mapping->encoded);
993 break;
994 }
d2e4a39e 995 else
4c4b4cd2
PH
996 {
997 encoding_buffer[k] = *p;
998 k += 1;
999 }
14f9c5c9
AS
1000 }
1001
4c4b4cd2
PH
1002 encoding_buffer[k] = '\0';
1003 return encoding_buffer;
14f9c5c9
AS
1004}
1005
b5ec771e
PA
1006/* The "encoded" form of DECODED, according to GNAT conventions.
1007 The result is valid until the next call to ada_encode. */
1008
1009char *
1010ada_encode (const char *decoded)
1011{
1012 return ada_encode_1 (decoded, true);
1013}
1014
14f9c5c9 1015/* Return NAME folded to lower case, or, if surrounded by single
4c4b4cd2
PH
1016 quotes, unfolded, but with the quotes stripped away. Result good
1017 to next call. */
1018
d2e4a39e
AS
1019char *
1020ada_fold_name (const char *name)
14f9c5c9 1021{
d2e4a39e 1022 static char *fold_buffer = NULL;
14f9c5c9
AS
1023 static size_t fold_buffer_size = 0;
1024
1025 int len = strlen (name);
d2e4a39e 1026 GROW_VECT (fold_buffer, fold_buffer_size, len + 1);
14f9c5c9
AS
1027
1028 if (name[0] == '\'')
1029 {
d2e4a39e
AS
1030 strncpy (fold_buffer, name + 1, len - 2);
1031 fold_buffer[len - 2] = '\000';
14f9c5c9
AS
1032 }
1033 else
1034 {
1035 int i;
5b4ee69b 1036
14f9c5c9 1037 for (i = 0; i <= len; i += 1)
4c4b4cd2 1038 fold_buffer[i] = tolower (name[i]);
14f9c5c9
AS
1039 }
1040
1041 return fold_buffer;
1042}
1043
529cad9c
PH
1044/* Return nonzero if C is either a digit or a lowercase alphabet character. */
1045
1046static int
1047is_lower_alphanum (const char c)
1048{
1049 return (isdigit (c) || (isalpha (c) && islower (c)));
1050}
1051
c90092fe
JB
1052/* ENCODED is the linkage name of a symbol and LEN contains its length.
1053 This function saves in LEN the length of that same symbol name but
1054 without either of these suffixes:
29480c32
JB
1055 . .{DIGIT}+
1056 . ${DIGIT}+
1057 . ___{DIGIT}+
1058 . __{DIGIT}+.
c90092fe 1059
29480c32
JB
1060 These are suffixes introduced by the compiler for entities such as
1061 nested subprogram for instance, in order to avoid name clashes.
1062 They do not serve any purpose for the debugger. */
1063
1064static void
1065ada_remove_trailing_digits (const char *encoded, int *len)
1066{
1067 if (*len > 1 && isdigit (encoded[*len - 1]))
1068 {
1069 int i = *len - 2;
5b4ee69b 1070
29480c32
JB
1071 while (i > 0 && isdigit (encoded[i]))
1072 i--;
1073 if (i >= 0 && encoded[i] == '.')
1074 *len = i;
1075 else if (i >= 0 && encoded[i] == '$')
1076 *len = i;
61012eef 1077 else if (i >= 2 && startswith (encoded + i - 2, "___"))
29480c32 1078 *len = i - 2;
61012eef 1079 else if (i >= 1 && startswith (encoded + i - 1, "__"))
29480c32
JB
1080 *len = i - 1;
1081 }
1082}
1083
1084/* Remove the suffix introduced by the compiler for protected object
1085 subprograms. */
1086
1087static void
1088ada_remove_po_subprogram_suffix (const char *encoded, int *len)
1089{
1090 /* Remove trailing N. */
1091
1092 /* Protected entry subprograms are broken into two
1093 separate subprograms: The first one is unprotected, and has
1094 a 'N' suffix; the second is the protected version, and has
0963b4bd 1095 the 'P' suffix. The second calls the first one after handling
29480c32
JB
1096 the protection. Since the P subprograms are internally generated,
1097 we leave these names undecoded, giving the user a clue that this
1098 entity is internal. */
1099
1100 if (*len > 1
1101 && encoded[*len - 1] == 'N'
1102 && (isdigit (encoded[*len - 2]) || islower (encoded[*len - 2])))
1103 *len = *len - 1;
1104}
1105
1106/* If ENCODED follows the GNAT entity encoding conventions, then return
1107 the decoded form of ENCODED. Otherwise, return "<%s>" where "%s" is
1108 replaced by ENCODED.
14f9c5c9 1109
4c4b4cd2 1110 The resulting string is valid until the next call of ada_decode.
29480c32 1111 If the string is unchanged by decoding, the original string pointer
4c4b4cd2
PH
1112 is returned. */
1113
1114const char *
1115ada_decode (const char *encoded)
14f9c5c9
AS
1116{
1117 int i, j;
1118 int len0;
d2e4a39e 1119 const char *p;
4c4b4cd2 1120 char *decoded;
14f9c5c9 1121 int at_start_name;
4c4b4cd2
PH
1122 static char *decoding_buffer = NULL;
1123 static size_t decoding_buffer_size = 0;
d2e4a39e 1124
0d81f350
JG
1125 /* With function descriptors on PPC64, the value of a symbol named
1126 ".FN", if it exists, is the entry point of the function "FN". */
1127 if (encoded[0] == '.')
1128 encoded += 1;
1129
29480c32
JB
1130 /* The name of the Ada main procedure starts with "_ada_".
1131 This prefix is not part of the decoded name, so skip this part
1132 if we see this prefix. */
61012eef 1133 if (startswith (encoded, "_ada_"))
4c4b4cd2 1134 encoded += 5;
14f9c5c9 1135
29480c32
JB
1136 /* If the name starts with '_', then it is not a properly encoded
1137 name, so do not attempt to decode it. Similarly, if the name
1138 starts with '<', the name should not be decoded. */
4c4b4cd2 1139 if (encoded[0] == '_' || encoded[0] == '<')
14f9c5c9
AS
1140 goto Suppress;
1141
4c4b4cd2 1142 len0 = strlen (encoded);
4c4b4cd2 1143
29480c32
JB
1144 ada_remove_trailing_digits (encoded, &len0);
1145 ada_remove_po_subprogram_suffix (encoded, &len0);
529cad9c 1146
4c4b4cd2
PH
1147 /* Remove the ___X.* suffix if present. Do not forget to verify that
1148 the suffix is located before the current "end" of ENCODED. We want
1149 to avoid re-matching parts of ENCODED that have previously been
1150 marked as discarded (by decrementing LEN0). */
1151 p = strstr (encoded, "___");
1152 if (p != NULL && p - encoded < len0 - 3)
14f9c5c9
AS
1153 {
1154 if (p[3] == 'X')
4c4b4cd2 1155 len0 = p - encoded;
14f9c5c9 1156 else
4c4b4cd2 1157 goto Suppress;
14f9c5c9 1158 }
4c4b4cd2 1159
29480c32
JB
1160 /* Remove any trailing TKB suffix. It tells us that this symbol
1161 is for the body of a task, but that information does not actually
1162 appear in the decoded name. */
1163
61012eef 1164 if (len0 > 3 && startswith (encoded + len0 - 3, "TKB"))
14f9c5c9 1165 len0 -= 3;
76a01679 1166
a10967fa
JB
1167 /* Remove any trailing TB suffix. The TB suffix is slightly different
1168 from the TKB suffix because it is used for non-anonymous task
1169 bodies. */
1170
61012eef 1171 if (len0 > 2 && startswith (encoded + len0 - 2, "TB"))
a10967fa
JB
1172 len0 -= 2;
1173
29480c32
JB
1174 /* Remove trailing "B" suffixes. */
1175 /* FIXME: brobecker/2006-04-19: Not sure what this are used for... */
1176
61012eef 1177 if (len0 > 1 && startswith (encoded + len0 - 1, "B"))
14f9c5c9
AS
1178 len0 -= 1;
1179
4c4b4cd2 1180 /* Make decoded big enough for possible expansion by operator name. */
29480c32 1181
4c4b4cd2
PH
1182 GROW_VECT (decoding_buffer, decoding_buffer_size, 2 * len0 + 1);
1183 decoded = decoding_buffer;
14f9c5c9 1184
29480c32
JB
1185 /* Remove trailing __{digit}+ or trailing ${digit}+. */
1186
4c4b4cd2 1187 if (len0 > 1 && isdigit (encoded[len0 - 1]))
d2e4a39e 1188 {
4c4b4cd2
PH
1189 i = len0 - 2;
1190 while ((i >= 0 && isdigit (encoded[i]))
1191 || (i >= 1 && encoded[i] == '_' && isdigit (encoded[i - 1])))
1192 i -= 1;
1193 if (i > 1 && encoded[i] == '_' && encoded[i - 1] == '_')
1194 len0 = i - 1;
1195 else if (encoded[i] == '$')
1196 len0 = i;
d2e4a39e 1197 }
14f9c5c9 1198
29480c32
JB
1199 /* The first few characters that are not alphabetic are not part
1200 of any encoding we use, so we can copy them over verbatim. */
1201
4c4b4cd2
PH
1202 for (i = 0, j = 0; i < len0 && !isalpha (encoded[i]); i += 1, j += 1)
1203 decoded[j] = encoded[i];
14f9c5c9
AS
1204
1205 at_start_name = 1;
1206 while (i < len0)
1207 {
29480c32 1208 /* Is this a symbol function? */
4c4b4cd2
PH
1209 if (at_start_name && encoded[i] == 'O')
1210 {
1211 int k;
5b4ee69b 1212
4c4b4cd2
PH
1213 for (k = 0; ada_opname_table[k].encoded != NULL; k += 1)
1214 {
1215 int op_len = strlen (ada_opname_table[k].encoded);
06d5cf63
JB
1216 if ((strncmp (ada_opname_table[k].encoded + 1, encoded + i + 1,
1217 op_len - 1) == 0)
1218 && !isalnum (encoded[i + op_len]))
4c4b4cd2
PH
1219 {
1220 strcpy (decoded + j, ada_opname_table[k].decoded);
1221 at_start_name = 0;
1222 i += op_len;
1223 j += strlen (ada_opname_table[k].decoded);
1224 break;
1225 }
1226 }
1227 if (ada_opname_table[k].encoded != NULL)
1228 continue;
1229 }
14f9c5c9
AS
1230 at_start_name = 0;
1231
529cad9c
PH
1232 /* Replace "TK__" with "__", which will eventually be translated
1233 into "." (just below). */
1234
61012eef 1235 if (i < len0 - 4 && startswith (encoded + i, "TK__"))
4c4b4cd2 1236 i += 2;
529cad9c 1237
29480c32
JB
1238 /* Replace "__B_{DIGITS}+__" sequences by "__", which will eventually
1239 be translated into "." (just below). These are internal names
1240 generated for anonymous blocks inside which our symbol is nested. */
1241
1242 if (len0 - i > 5 && encoded [i] == '_' && encoded [i+1] == '_'
1243 && encoded [i+2] == 'B' && encoded [i+3] == '_'
1244 && isdigit (encoded [i+4]))
1245 {
1246 int k = i + 5;
1247
1248 while (k < len0 && isdigit (encoded[k]))
1249 k++; /* Skip any extra digit. */
1250
1251 /* Double-check that the "__B_{DIGITS}+" sequence we found
1252 is indeed followed by "__". */
1253 if (len0 - k > 2 && encoded [k] == '_' && encoded [k+1] == '_')
1254 i = k;
1255 }
1256
529cad9c
PH
1257 /* Remove _E{DIGITS}+[sb] */
1258
1259 /* Just as for protected object subprograms, there are 2 categories
0963b4bd 1260 of subprograms created by the compiler for each entry. The first
529cad9c
PH
1261 one implements the actual entry code, and has a suffix following
1262 the convention above; the second one implements the barrier and
1263 uses the same convention as above, except that the 'E' is replaced
1264 by a 'B'.
1265
1266 Just as above, we do not decode the name of barrier functions
1267 to give the user a clue that the code he is debugging has been
1268 internally generated. */
1269
1270 if (len0 - i > 3 && encoded [i] == '_' && encoded[i+1] == 'E'
1271 && isdigit (encoded[i+2]))
1272 {
1273 int k = i + 3;
1274
1275 while (k < len0 && isdigit (encoded[k]))
1276 k++;
1277
1278 if (k < len0
1279 && (encoded[k] == 'b' || encoded[k] == 's'))
1280 {
1281 k++;
1282 /* Just as an extra precaution, make sure that if this
1283 suffix is followed by anything else, it is a '_'.
1284 Otherwise, we matched this sequence by accident. */
1285 if (k == len0
1286 || (k < len0 && encoded[k] == '_'))
1287 i = k;
1288 }
1289 }
1290
1291 /* Remove trailing "N" in [a-z0-9]+N__. The N is added by
1292 the GNAT front-end in protected object subprograms. */
1293
1294 if (i < len0 + 3
1295 && encoded[i] == 'N' && encoded[i+1] == '_' && encoded[i+2] == '_')
1296 {
1297 /* Backtrack a bit up until we reach either the begining of
1298 the encoded name, or "__". Make sure that we only find
1299 digits or lowercase characters. */
1300 const char *ptr = encoded + i - 1;
1301
1302 while (ptr >= encoded && is_lower_alphanum (ptr[0]))
1303 ptr--;
1304 if (ptr < encoded
1305 || (ptr > encoded && ptr[0] == '_' && ptr[-1] == '_'))
1306 i++;
1307 }
1308
4c4b4cd2
PH
1309 if (encoded[i] == 'X' && i != 0 && isalnum (encoded[i - 1]))
1310 {
29480c32
JB
1311 /* This is a X[bn]* sequence not separated from the previous
1312 part of the name with a non-alpha-numeric character (in other
1313 words, immediately following an alpha-numeric character), then
1314 verify that it is placed at the end of the encoded name. If
1315 not, then the encoding is not valid and we should abort the
1316 decoding. Otherwise, just skip it, it is used in body-nested
1317 package names. */
4c4b4cd2
PH
1318 do
1319 i += 1;
1320 while (i < len0 && (encoded[i] == 'b' || encoded[i] == 'n'));
1321 if (i < len0)
1322 goto Suppress;
1323 }
cdc7bb92 1324 else if (i < len0 - 2 && encoded[i] == '_' && encoded[i + 1] == '_')
4c4b4cd2 1325 {
29480c32 1326 /* Replace '__' by '.'. */
4c4b4cd2
PH
1327 decoded[j] = '.';
1328 at_start_name = 1;
1329 i += 2;
1330 j += 1;
1331 }
14f9c5c9 1332 else
4c4b4cd2 1333 {
29480c32
JB
1334 /* It's a character part of the decoded name, so just copy it
1335 over. */
4c4b4cd2
PH
1336 decoded[j] = encoded[i];
1337 i += 1;
1338 j += 1;
1339 }
14f9c5c9 1340 }
4c4b4cd2 1341 decoded[j] = '\000';
14f9c5c9 1342
29480c32
JB
1343 /* Decoded names should never contain any uppercase character.
1344 Double-check this, and abort the decoding if we find one. */
1345
4c4b4cd2
PH
1346 for (i = 0; decoded[i] != '\0'; i += 1)
1347 if (isupper (decoded[i]) || decoded[i] == ' ')
14f9c5c9
AS
1348 goto Suppress;
1349
4c4b4cd2
PH
1350 if (strcmp (decoded, encoded) == 0)
1351 return encoded;
1352 else
1353 return decoded;
14f9c5c9
AS
1354
1355Suppress:
4c4b4cd2
PH
1356 GROW_VECT (decoding_buffer, decoding_buffer_size, strlen (encoded) + 3);
1357 decoded = decoding_buffer;
1358 if (encoded[0] == '<')
1359 strcpy (decoded, encoded);
14f9c5c9 1360 else
88c15c34 1361 xsnprintf (decoded, decoding_buffer_size, "<%s>", encoded);
4c4b4cd2
PH
1362 return decoded;
1363
1364}
1365
1366/* Table for keeping permanent unique copies of decoded names. Once
1367 allocated, names in this table are never released. While this is a
1368 storage leak, it should not be significant unless there are massive
1369 changes in the set of decoded names in successive versions of a
1370 symbol table loaded during a single session. */
1371static struct htab *decoded_names_store;
1372
1373/* Returns the decoded name of GSYMBOL, as for ada_decode, caching it
1374 in the language-specific part of GSYMBOL, if it has not been
1375 previously computed. Tries to save the decoded name in the same
1376 obstack as GSYMBOL, if possible, and otherwise on the heap (so that,
1377 in any case, the decoded symbol has a lifetime at least that of
0963b4bd 1378 GSYMBOL).
4c4b4cd2
PH
1379 The GSYMBOL parameter is "mutable" in the C++ sense: logically
1380 const, but nevertheless modified to a semantically equivalent form
0963b4bd 1381 when a decoded name is cached in it. */
4c4b4cd2 1382
45e6c716 1383const char *
f85f34ed 1384ada_decode_symbol (const struct general_symbol_info *arg)
4c4b4cd2 1385{
f85f34ed
TT
1386 struct general_symbol_info *gsymbol = (struct general_symbol_info *) arg;
1387 const char **resultp =
615b3f62 1388 &gsymbol->language_specific.demangled_name;
5b4ee69b 1389
f85f34ed 1390 if (!gsymbol->ada_mangled)
4c4b4cd2
PH
1391 {
1392 const char *decoded = ada_decode (gsymbol->name);
f85f34ed 1393 struct obstack *obstack = gsymbol->language_specific.obstack;
5b4ee69b 1394
f85f34ed 1395 gsymbol->ada_mangled = 1;
5b4ee69b 1396
f85f34ed 1397 if (obstack != NULL)
021887d8 1398 *resultp = obstack_strdup (obstack, decoded);
f85f34ed 1399 else
76a01679 1400 {
f85f34ed
TT
1401 /* Sometimes, we can't find a corresponding objfile, in
1402 which case, we put the result on the heap. Since we only
1403 decode when needed, we hope this usually does not cause a
1404 significant memory leak (FIXME). */
1405
76a01679
JB
1406 char **slot = (char **) htab_find_slot (decoded_names_store,
1407 decoded, INSERT);
5b4ee69b 1408
76a01679
JB
1409 if (*slot == NULL)
1410 *slot = xstrdup (decoded);
1411 *resultp = *slot;
1412 }
4c4b4cd2 1413 }
14f9c5c9 1414
4c4b4cd2
PH
1415 return *resultp;
1416}
76a01679 1417
2c0b251b 1418static char *
76a01679 1419ada_la_decode (const char *encoded, int options)
4c4b4cd2
PH
1420{
1421 return xstrdup (ada_decode (encoded));
14f9c5c9
AS
1422}
1423
8b302db8
TT
1424/* Implement la_sniff_from_mangled_name for Ada. */
1425
1426static int
1427ada_sniff_from_mangled_name (const char *mangled, char **out)
1428{
1429 const char *demangled = ada_decode (mangled);
1430
1431 *out = NULL;
1432
1433 if (demangled != mangled && demangled != NULL && demangled[0] != '<')
1434 {
1435 /* Set the gsymbol language to Ada, but still return 0.
1436 Two reasons for that:
1437
1438 1. For Ada, we prefer computing the symbol's decoded name
1439 on the fly rather than pre-compute it, in order to save
1440 memory (Ada projects are typically very large).
1441
1442 2. There are some areas in the definition of the GNAT
1443 encoding where, with a bit of bad luck, we might be able
1444 to decode a non-Ada symbol, generating an incorrect
1445 demangled name (Eg: names ending with "TB" for instance
1446 are identified as task bodies and so stripped from
1447 the decoded name returned).
1448
1449 Returning 1, here, but not setting *DEMANGLED, helps us get a
1450 little bit of the best of both worlds. Because we're last,
1451 we should not affect any of the other languages that were
1452 able to demangle the symbol before us; we get to correctly
1453 tag Ada symbols as such; and even if we incorrectly tagged a
1454 non-Ada symbol, which should be rare, any routing through the
1455 Ada language should be transparent (Ada tries to behave much
1456 like C/C++ with non-Ada symbols). */
1457 return 1;
1458 }
1459
1460 return 0;
1461}
1462
14f9c5c9 1463\f
d2e4a39e 1464
4c4b4cd2 1465 /* Arrays */
14f9c5c9 1466
28c85d6c
JB
1467/* Assuming that INDEX_DESC_TYPE is an ___XA structure, a structure
1468 generated by the GNAT compiler to describe the index type used
1469 for each dimension of an array, check whether it follows the latest
1470 known encoding. If not, fix it up to conform to the latest encoding.
1471 Otherwise, do nothing. This function also does nothing if
1472 INDEX_DESC_TYPE is NULL.
1473
1474 The GNAT encoding used to describle the array index type evolved a bit.
1475 Initially, the information would be provided through the name of each
1476 field of the structure type only, while the type of these fields was
1477 described as unspecified and irrelevant. The debugger was then expected
1478 to perform a global type lookup using the name of that field in order
1479 to get access to the full index type description. Because these global
1480 lookups can be very expensive, the encoding was later enhanced to make
1481 the global lookup unnecessary by defining the field type as being
1482 the full index type description.
1483
1484 The purpose of this routine is to allow us to support older versions
1485 of the compiler by detecting the use of the older encoding, and by
1486 fixing up the INDEX_DESC_TYPE to follow the new one (at this point,
1487 we essentially replace each field's meaningless type by the associated
1488 index subtype). */
1489
1490void
1491ada_fixup_array_indexes_type (struct type *index_desc_type)
1492{
1493 int i;
1494
1495 if (index_desc_type == NULL)
1496 return;
1497 gdb_assert (TYPE_NFIELDS (index_desc_type) > 0);
1498
1499 /* Check if INDEX_DESC_TYPE follows the older encoding (it is sufficient
1500 to check one field only, no need to check them all). If not, return
1501 now.
1502
1503 If our INDEX_DESC_TYPE was generated using the older encoding,
1504 the field type should be a meaningless integer type whose name
1505 is not equal to the field name. */
1506 if (TYPE_NAME (TYPE_FIELD_TYPE (index_desc_type, 0)) != NULL
1507 && strcmp (TYPE_NAME (TYPE_FIELD_TYPE (index_desc_type, 0)),
1508 TYPE_FIELD_NAME (index_desc_type, 0)) == 0)
1509 return;
1510
1511 /* Fixup each field of INDEX_DESC_TYPE. */
1512 for (i = 0; i < TYPE_NFIELDS (index_desc_type); i++)
1513 {
0d5cff50 1514 const char *name = TYPE_FIELD_NAME (index_desc_type, i);
28c85d6c
JB
1515 struct type *raw_type = ada_check_typedef (ada_find_any_type (name));
1516
1517 if (raw_type)
1518 TYPE_FIELD_TYPE (index_desc_type, i) = raw_type;
1519 }
1520}
1521
4c4b4cd2 1522/* Names of MAX_ADA_DIMENS bounds in P_BOUNDS fields of array descriptors. */
14f9c5c9 1523
a121b7c1 1524static const char *bound_name[] = {
d2e4a39e 1525 "LB0", "UB0", "LB1", "UB1", "LB2", "UB2", "LB3", "UB3",
14f9c5c9
AS
1526 "LB4", "UB4", "LB5", "UB5", "LB6", "UB6", "LB7", "UB7"
1527};
1528
1529/* Maximum number of array dimensions we are prepared to handle. */
1530
4c4b4cd2 1531#define MAX_ADA_DIMENS (sizeof(bound_name) / (2*sizeof(char *)))
14f9c5c9 1532
14f9c5c9 1533
4c4b4cd2
PH
1534/* The desc_* routines return primitive portions of array descriptors
1535 (fat pointers). */
14f9c5c9
AS
1536
1537/* The descriptor or array type, if any, indicated by TYPE; removes
4c4b4cd2
PH
1538 level of indirection, if needed. */
1539
d2e4a39e
AS
1540static struct type *
1541desc_base_type (struct type *type)
14f9c5c9
AS
1542{
1543 if (type == NULL)
1544 return NULL;
61ee279c 1545 type = ada_check_typedef (type);
720d1a40
JB
1546 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF)
1547 type = ada_typedef_target_type (type);
1548
1265e4aa
JB
1549 if (type != NULL
1550 && (TYPE_CODE (type) == TYPE_CODE_PTR
1551 || TYPE_CODE (type) == TYPE_CODE_REF))
61ee279c 1552 return ada_check_typedef (TYPE_TARGET_TYPE (type));
14f9c5c9
AS
1553 else
1554 return type;
1555}
1556
4c4b4cd2
PH
1557/* True iff TYPE indicates a "thin" array pointer type. */
1558
14f9c5c9 1559static int
d2e4a39e 1560is_thin_pntr (struct type *type)
14f9c5c9 1561{
d2e4a39e 1562 return
14f9c5c9
AS
1563 is_suffix (ada_type_name (desc_base_type (type)), "___XUT")
1564 || is_suffix (ada_type_name (desc_base_type (type)), "___XUT___XVE");
1565}
1566
4c4b4cd2
PH
1567/* The descriptor type for thin pointer type TYPE. */
1568
d2e4a39e
AS
1569static struct type *
1570thin_descriptor_type (struct type *type)
14f9c5c9 1571{
d2e4a39e 1572 struct type *base_type = desc_base_type (type);
5b4ee69b 1573
14f9c5c9
AS
1574 if (base_type == NULL)
1575 return NULL;
1576 if (is_suffix (ada_type_name (base_type), "___XVE"))
1577 return base_type;
d2e4a39e 1578 else
14f9c5c9 1579 {
d2e4a39e 1580 struct type *alt_type = ada_find_parallel_type (base_type, "___XVE");
5b4ee69b 1581
14f9c5c9 1582 if (alt_type == NULL)
4c4b4cd2 1583 return base_type;
14f9c5c9 1584 else
4c4b4cd2 1585 return alt_type;
14f9c5c9
AS
1586 }
1587}
1588
4c4b4cd2
PH
1589/* A pointer to the array data for thin-pointer value VAL. */
1590
d2e4a39e
AS
1591static struct value *
1592thin_data_pntr (struct value *val)
14f9c5c9 1593{
828292f2 1594 struct type *type = ada_check_typedef (value_type (val));
556bdfd4 1595 struct type *data_type = desc_data_target_type (thin_descriptor_type (type));
5b4ee69b 1596
556bdfd4
UW
1597 data_type = lookup_pointer_type (data_type);
1598
14f9c5c9 1599 if (TYPE_CODE (type) == TYPE_CODE_PTR)
556bdfd4 1600 return value_cast (data_type, value_copy (val));
d2e4a39e 1601 else
42ae5230 1602 return value_from_longest (data_type, value_address (val));
14f9c5c9
AS
1603}
1604
4c4b4cd2
PH
1605/* True iff TYPE indicates a "thick" array pointer type. */
1606
14f9c5c9 1607static int
d2e4a39e 1608is_thick_pntr (struct type *type)
14f9c5c9
AS
1609{
1610 type = desc_base_type (type);
1611 return (type != NULL && TYPE_CODE (type) == TYPE_CODE_STRUCT
4c4b4cd2 1612 && lookup_struct_elt_type (type, "P_BOUNDS", 1) != NULL);
14f9c5c9
AS
1613}
1614
4c4b4cd2
PH
1615/* If TYPE is the type of an array descriptor (fat or thin pointer) or a
1616 pointer to one, the type of its bounds data; otherwise, NULL. */
76a01679 1617
d2e4a39e
AS
1618static struct type *
1619desc_bounds_type (struct type *type)
14f9c5c9 1620{
d2e4a39e 1621 struct type *r;
14f9c5c9
AS
1622
1623 type = desc_base_type (type);
1624
1625 if (type == NULL)
1626 return NULL;
1627 else if (is_thin_pntr (type))
1628 {
1629 type = thin_descriptor_type (type);
1630 if (type == NULL)
4c4b4cd2 1631 return NULL;
14f9c5c9
AS
1632 r = lookup_struct_elt_type (type, "BOUNDS", 1);
1633 if (r != NULL)
61ee279c 1634 return ada_check_typedef (r);
14f9c5c9
AS
1635 }
1636 else if (TYPE_CODE (type) == TYPE_CODE_STRUCT)
1637 {
1638 r = lookup_struct_elt_type (type, "P_BOUNDS", 1);
1639 if (r != NULL)
61ee279c 1640 return ada_check_typedef (TYPE_TARGET_TYPE (ada_check_typedef (r)));
14f9c5c9
AS
1641 }
1642 return NULL;
1643}
1644
1645/* If ARR is an array descriptor (fat or thin pointer), or pointer to
4c4b4cd2
PH
1646 one, a pointer to its bounds data. Otherwise NULL. */
1647
d2e4a39e
AS
1648static struct value *
1649desc_bounds (struct value *arr)
14f9c5c9 1650{
df407dfe 1651 struct type *type = ada_check_typedef (value_type (arr));
5b4ee69b 1652
d2e4a39e 1653 if (is_thin_pntr (type))
14f9c5c9 1654 {
d2e4a39e 1655 struct type *bounds_type =
4c4b4cd2 1656 desc_bounds_type (thin_descriptor_type (type));
14f9c5c9
AS
1657 LONGEST addr;
1658
4cdfadb1 1659 if (bounds_type == NULL)
323e0a4a 1660 error (_("Bad GNAT array descriptor"));
14f9c5c9
AS
1661
1662 /* NOTE: The following calculation is not really kosher, but
d2e4a39e 1663 since desc_type is an XVE-encoded type (and shouldn't be),
4c4b4cd2 1664 the correct calculation is a real pain. FIXME (and fix GCC). */
14f9c5c9 1665 if (TYPE_CODE (type) == TYPE_CODE_PTR)
4c4b4cd2 1666 addr = value_as_long (arr);
d2e4a39e 1667 else
42ae5230 1668 addr = value_address (arr);
14f9c5c9 1669
d2e4a39e 1670 return
4c4b4cd2
PH
1671 value_from_longest (lookup_pointer_type (bounds_type),
1672 addr - TYPE_LENGTH (bounds_type));
14f9c5c9
AS
1673 }
1674
1675 else if (is_thick_pntr (type))
05e522ef
JB
1676 {
1677 struct value *p_bounds = value_struct_elt (&arr, NULL, "P_BOUNDS", NULL,
1678 _("Bad GNAT array descriptor"));
1679 struct type *p_bounds_type = value_type (p_bounds);
1680
1681 if (p_bounds_type
1682 && TYPE_CODE (p_bounds_type) == TYPE_CODE_PTR)
1683 {
1684 struct type *target_type = TYPE_TARGET_TYPE (p_bounds_type);
1685
1686 if (TYPE_STUB (target_type))
1687 p_bounds = value_cast (lookup_pointer_type
1688 (ada_check_typedef (target_type)),
1689 p_bounds);
1690 }
1691 else
1692 error (_("Bad GNAT array descriptor"));
1693
1694 return p_bounds;
1695 }
14f9c5c9
AS
1696 else
1697 return NULL;
1698}
1699
4c4b4cd2
PH
1700/* If TYPE is the type of an array-descriptor (fat pointer), the bit
1701 position of the field containing the address of the bounds data. */
1702
14f9c5c9 1703static int
d2e4a39e 1704fat_pntr_bounds_bitpos (struct type *type)
14f9c5c9
AS
1705{
1706 return TYPE_FIELD_BITPOS (desc_base_type (type), 1);
1707}
1708
1709/* If TYPE is the type of an array-descriptor (fat pointer), the bit
4c4b4cd2
PH
1710 size of the field containing the address of the bounds data. */
1711
14f9c5c9 1712static int
d2e4a39e 1713fat_pntr_bounds_bitsize (struct type *type)
14f9c5c9
AS
1714{
1715 type = desc_base_type (type);
1716
d2e4a39e 1717 if (TYPE_FIELD_BITSIZE (type, 1) > 0)
14f9c5c9
AS
1718 return TYPE_FIELD_BITSIZE (type, 1);
1719 else
61ee279c 1720 return 8 * TYPE_LENGTH (ada_check_typedef (TYPE_FIELD_TYPE (type, 1)));
14f9c5c9
AS
1721}
1722
4c4b4cd2 1723/* If TYPE is the type of an array descriptor (fat or thin pointer) or a
556bdfd4
UW
1724 pointer to one, the type of its array data (a array-with-no-bounds type);
1725 otherwise, NULL. Use ada_type_of_array to get an array type with bounds
1726 data. */
4c4b4cd2 1727
d2e4a39e 1728static struct type *
556bdfd4 1729desc_data_target_type (struct type *type)
14f9c5c9
AS
1730{
1731 type = desc_base_type (type);
1732
4c4b4cd2 1733 /* NOTE: The following is bogus; see comment in desc_bounds. */
14f9c5c9 1734 if (is_thin_pntr (type))
556bdfd4 1735 return desc_base_type (TYPE_FIELD_TYPE (thin_descriptor_type (type), 1));
14f9c5c9 1736 else if (is_thick_pntr (type))
556bdfd4
UW
1737 {
1738 struct type *data_type = lookup_struct_elt_type (type, "P_ARRAY", 1);
1739
1740 if (data_type
1741 && TYPE_CODE (ada_check_typedef (data_type)) == TYPE_CODE_PTR)
05e522ef 1742 return ada_check_typedef (TYPE_TARGET_TYPE (data_type));
556bdfd4
UW
1743 }
1744
1745 return NULL;
14f9c5c9
AS
1746}
1747
1748/* If ARR is an array descriptor (fat or thin pointer), a pointer to
1749 its array data. */
4c4b4cd2 1750
d2e4a39e
AS
1751static struct value *
1752desc_data (struct value *arr)
14f9c5c9 1753{
df407dfe 1754 struct type *type = value_type (arr);
5b4ee69b 1755
14f9c5c9
AS
1756 if (is_thin_pntr (type))
1757 return thin_data_pntr (arr);
1758 else if (is_thick_pntr (type))
d2e4a39e 1759 return value_struct_elt (&arr, NULL, "P_ARRAY", NULL,
323e0a4a 1760 _("Bad GNAT array descriptor"));
14f9c5c9
AS
1761 else
1762 return NULL;
1763}
1764
1765
1766/* If TYPE is the type of an array-descriptor (fat pointer), the bit
4c4b4cd2
PH
1767 position of the field containing the address of the data. */
1768
14f9c5c9 1769static int
d2e4a39e 1770fat_pntr_data_bitpos (struct type *type)
14f9c5c9
AS
1771{
1772 return TYPE_FIELD_BITPOS (desc_base_type (type), 0);
1773}
1774
1775/* If TYPE is the type of an array-descriptor (fat pointer), the bit
4c4b4cd2
PH
1776 size of the field containing the address of the data. */
1777
14f9c5c9 1778static int
d2e4a39e 1779fat_pntr_data_bitsize (struct type *type)
14f9c5c9
AS
1780{
1781 type = desc_base_type (type);
1782
1783 if (TYPE_FIELD_BITSIZE (type, 0) > 0)
1784 return TYPE_FIELD_BITSIZE (type, 0);
d2e4a39e 1785 else
14f9c5c9
AS
1786 return TARGET_CHAR_BIT * TYPE_LENGTH (TYPE_FIELD_TYPE (type, 0));
1787}
1788
4c4b4cd2 1789/* If BOUNDS is an array-bounds structure (or pointer to one), return
14f9c5c9 1790 the Ith lower bound stored in it, if WHICH is 0, and the Ith upper
4c4b4cd2
PH
1791 bound, if WHICH is 1. The first bound is I=1. */
1792
d2e4a39e
AS
1793static struct value *
1794desc_one_bound (struct value *bounds, int i, int which)
14f9c5c9 1795{
d2e4a39e 1796 return value_struct_elt (&bounds, NULL, bound_name[2 * i + which - 2], NULL,
323e0a4a 1797 _("Bad GNAT array descriptor bounds"));
14f9c5c9
AS
1798}
1799
1800/* If BOUNDS is an array-bounds structure type, return the bit position
1801 of the Ith lower bound stored in it, if WHICH is 0, and the Ith upper
4c4b4cd2
PH
1802 bound, if WHICH is 1. The first bound is I=1. */
1803
14f9c5c9 1804static int
d2e4a39e 1805desc_bound_bitpos (struct type *type, int i, int which)
14f9c5c9 1806{
d2e4a39e 1807 return TYPE_FIELD_BITPOS (desc_base_type (type), 2 * i + which - 2);
14f9c5c9
AS
1808}
1809
1810/* If BOUNDS is an array-bounds structure type, return the bit field size
1811 of the Ith lower bound stored in it, if WHICH is 0, and the Ith upper
4c4b4cd2
PH
1812 bound, if WHICH is 1. The first bound is I=1. */
1813
76a01679 1814static int
d2e4a39e 1815desc_bound_bitsize (struct type *type, int i, int which)
14f9c5c9
AS
1816{
1817 type = desc_base_type (type);
1818
d2e4a39e
AS
1819 if (TYPE_FIELD_BITSIZE (type, 2 * i + which - 2) > 0)
1820 return TYPE_FIELD_BITSIZE (type, 2 * i + which - 2);
1821 else
1822 return 8 * TYPE_LENGTH (TYPE_FIELD_TYPE (type, 2 * i + which - 2));
14f9c5c9
AS
1823}
1824
1825/* If TYPE is the type of an array-bounds structure, the type of its
4c4b4cd2
PH
1826 Ith bound (numbering from 1). Otherwise, NULL. */
1827
d2e4a39e
AS
1828static struct type *
1829desc_index_type (struct type *type, int i)
14f9c5c9
AS
1830{
1831 type = desc_base_type (type);
1832
1833 if (TYPE_CODE (type) == TYPE_CODE_STRUCT)
d2e4a39e
AS
1834 return lookup_struct_elt_type (type, bound_name[2 * i - 2], 1);
1835 else
14f9c5c9
AS
1836 return NULL;
1837}
1838
4c4b4cd2
PH
1839/* The number of index positions in the array-bounds type TYPE.
1840 Return 0 if TYPE is NULL. */
1841
14f9c5c9 1842static int
d2e4a39e 1843desc_arity (struct type *type)
14f9c5c9
AS
1844{
1845 type = desc_base_type (type);
1846
1847 if (type != NULL)
1848 return TYPE_NFIELDS (type) / 2;
1849 return 0;
1850}
1851
4c4b4cd2
PH
1852/* Non-zero iff TYPE is a simple array type (not a pointer to one) or
1853 an array descriptor type (representing an unconstrained array
1854 type). */
1855
76a01679
JB
1856static int
1857ada_is_direct_array_type (struct type *type)
4c4b4cd2
PH
1858{
1859 if (type == NULL)
1860 return 0;
61ee279c 1861 type = ada_check_typedef (type);
4c4b4cd2 1862 return (TYPE_CODE (type) == TYPE_CODE_ARRAY
76a01679 1863 || ada_is_array_descriptor_type (type));
4c4b4cd2
PH
1864}
1865
52ce6436 1866/* Non-zero iff TYPE represents any kind of array in Ada, or a pointer
0963b4bd 1867 * to one. */
52ce6436 1868
2c0b251b 1869static int
52ce6436
PH
1870ada_is_array_type (struct type *type)
1871{
1872 while (type != NULL
1873 && (TYPE_CODE (type) == TYPE_CODE_PTR
1874 || TYPE_CODE (type) == TYPE_CODE_REF))
1875 type = TYPE_TARGET_TYPE (type);
1876 return ada_is_direct_array_type (type);
1877}
1878
4c4b4cd2 1879/* Non-zero iff TYPE is a simple array type or pointer to one. */
14f9c5c9 1880
14f9c5c9 1881int
4c4b4cd2 1882ada_is_simple_array_type (struct type *type)
14f9c5c9
AS
1883{
1884 if (type == NULL)
1885 return 0;
61ee279c 1886 type = ada_check_typedef (type);
14f9c5c9 1887 return (TYPE_CODE (type) == TYPE_CODE_ARRAY
4c4b4cd2 1888 || (TYPE_CODE (type) == TYPE_CODE_PTR
b0dd7688
JB
1889 && TYPE_CODE (ada_check_typedef (TYPE_TARGET_TYPE (type)))
1890 == TYPE_CODE_ARRAY));
14f9c5c9
AS
1891}
1892
4c4b4cd2
PH
1893/* Non-zero iff TYPE belongs to a GNAT array descriptor. */
1894
14f9c5c9 1895int
4c4b4cd2 1896ada_is_array_descriptor_type (struct type *type)
14f9c5c9 1897{
556bdfd4 1898 struct type *data_type = desc_data_target_type (type);
14f9c5c9
AS
1899
1900 if (type == NULL)
1901 return 0;
61ee279c 1902 type = ada_check_typedef (type);
556bdfd4
UW
1903 return (data_type != NULL
1904 && TYPE_CODE (data_type) == TYPE_CODE_ARRAY
1905 && desc_arity (desc_bounds_type (type)) > 0);
14f9c5c9
AS
1906}
1907
1908/* Non-zero iff type is a partially mal-formed GNAT array
4c4b4cd2 1909 descriptor. FIXME: This is to compensate for some problems with
14f9c5c9 1910 debugging output from GNAT. Re-examine periodically to see if it
4c4b4cd2
PH
1911 is still needed. */
1912
14f9c5c9 1913int
ebf56fd3 1914ada_is_bogus_array_descriptor (struct type *type)
14f9c5c9 1915{
d2e4a39e 1916 return
14f9c5c9
AS
1917 type != NULL
1918 && TYPE_CODE (type) == TYPE_CODE_STRUCT
1919 && (lookup_struct_elt_type (type, "P_BOUNDS", 1) != NULL
4c4b4cd2
PH
1920 || lookup_struct_elt_type (type, "P_ARRAY", 1) != NULL)
1921 && !ada_is_array_descriptor_type (type);
14f9c5c9
AS
1922}
1923
1924
4c4b4cd2 1925/* If ARR has a record type in the form of a standard GNAT array descriptor,
14f9c5c9 1926 (fat pointer) returns the type of the array data described---specifically,
4c4b4cd2 1927 a pointer-to-array type. If BOUNDS is non-zero, the bounds data are filled
14f9c5c9 1928 in from the descriptor; otherwise, they are left unspecified. If
4c4b4cd2
PH
1929 the ARR denotes a null array descriptor and BOUNDS is non-zero,
1930 returns NULL. The result is simply the type of ARR if ARR is not
14f9c5c9 1931 a descriptor. */
d2e4a39e
AS
1932struct type *
1933ada_type_of_array (struct value *arr, int bounds)
14f9c5c9 1934{
ad82864c
JB
1935 if (ada_is_constrained_packed_array_type (value_type (arr)))
1936 return decode_constrained_packed_array_type (value_type (arr));
14f9c5c9 1937
df407dfe
AC
1938 if (!ada_is_array_descriptor_type (value_type (arr)))
1939 return value_type (arr);
d2e4a39e
AS
1940
1941 if (!bounds)
ad82864c
JB
1942 {
1943 struct type *array_type =
1944 ada_check_typedef (desc_data_target_type (value_type (arr)));
1945
1946 if (ada_is_unconstrained_packed_array_type (value_type (arr)))
1947 TYPE_FIELD_BITSIZE (array_type, 0) =
1948 decode_packed_array_bitsize (value_type (arr));
1949
1950 return array_type;
1951 }
14f9c5c9
AS
1952 else
1953 {
d2e4a39e 1954 struct type *elt_type;
14f9c5c9 1955 int arity;
d2e4a39e 1956 struct value *descriptor;
14f9c5c9 1957
df407dfe
AC
1958 elt_type = ada_array_element_type (value_type (arr), -1);
1959 arity = ada_array_arity (value_type (arr));
14f9c5c9 1960
d2e4a39e 1961 if (elt_type == NULL || arity == 0)
df407dfe 1962 return ada_check_typedef (value_type (arr));
14f9c5c9
AS
1963
1964 descriptor = desc_bounds (arr);
d2e4a39e 1965 if (value_as_long (descriptor) == 0)
4c4b4cd2 1966 return NULL;
d2e4a39e 1967 while (arity > 0)
4c4b4cd2 1968 {
e9bb382b
UW
1969 struct type *range_type = alloc_type_copy (value_type (arr));
1970 struct type *array_type = alloc_type_copy (value_type (arr));
4c4b4cd2
PH
1971 struct value *low = desc_one_bound (descriptor, arity, 0);
1972 struct value *high = desc_one_bound (descriptor, arity, 1);
4c4b4cd2 1973
5b4ee69b 1974 arity -= 1;
0c9c3474
SA
1975 create_static_range_type (range_type, value_type (low),
1976 longest_to_int (value_as_long (low)),
1977 longest_to_int (value_as_long (high)));
4c4b4cd2 1978 elt_type = create_array_type (array_type, elt_type, range_type);
ad82864c
JB
1979
1980 if (ada_is_unconstrained_packed_array_type (value_type (arr)))
e67ad678
JB
1981 {
1982 /* We need to store the element packed bitsize, as well as
1983 recompute the array size, because it was previously
1984 computed based on the unpacked element size. */
1985 LONGEST lo = value_as_long (low);
1986 LONGEST hi = value_as_long (high);
1987
1988 TYPE_FIELD_BITSIZE (elt_type, 0) =
1989 decode_packed_array_bitsize (value_type (arr));
1990 /* If the array has no element, then the size is already
1991 zero, and does not need to be recomputed. */
1992 if (lo < hi)
1993 {
1994 int array_bitsize =
1995 (hi - lo + 1) * TYPE_FIELD_BITSIZE (elt_type, 0);
1996
1997 TYPE_LENGTH (array_type) = (array_bitsize + 7) / 8;
1998 }
1999 }
4c4b4cd2 2000 }
14f9c5c9
AS
2001
2002 return lookup_pointer_type (elt_type);
2003 }
2004}
2005
2006/* If ARR does not represent an array, returns ARR unchanged.
4c4b4cd2
PH
2007 Otherwise, returns either a standard GDB array with bounds set
2008 appropriately or, if ARR is a non-null fat pointer, a pointer to a standard
2009 GDB array. Returns NULL if ARR is a null fat pointer. */
2010
d2e4a39e
AS
2011struct value *
2012ada_coerce_to_simple_array_ptr (struct value *arr)
14f9c5c9 2013{
df407dfe 2014 if (ada_is_array_descriptor_type (value_type (arr)))
14f9c5c9 2015 {
d2e4a39e 2016 struct type *arrType = ada_type_of_array (arr, 1);
5b4ee69b 2017
14f9c5c9 2018 if (arrType == NULL)
4c4b4cd2 2019 return NULL;
14f9c5c9
AS
2020 return value_cast (arrType, value_copy (desc_data (arr)));
2021 }
ad82864c
JB
2022 else if (ada_is_constrained_packed_array_type (value_type (arr)))
2023 return decode_constrained_packed_array (arr);
14f9c5c9
AS
2024 else
2025 return arr;
2026}
2027
2028/* If ARR does not represent an array, returns ARR unchanged.
2029 Otherwise, returns a standard GDB array describing ARR (which may
4c4b4cd2
PH
2030 be ARR itself if it already is in the proper form). */
2031
720d1a40 2032struct value *
d2e4a39e 2033ada_coerce_to_simple_array (struct value *arr)
14f9c5c9 2034{
df407dfe 2035 if (ada_is_array_descriptor_type (value_type (arr)))
14f9c5c9 2036 {
d2e4a39e 2037 struct value *arrVal = ada_coerce_to_simple_array_ptr (arr);
5b4ee69b 2038
14f9c5c9 2039 if (arrVal == NULL)
323e0a4a 2040 error (_("Bounds unavailable for null array pointer."));
c1b5a1a6 2041 ada_ensure_varsize_limit (TYPE_TARGET_TYPE (value_type (arrVal)));
14f9c5c9
AS
2042 return value_ind (arrVal);
2043 }
ad82864c
JB
2044 else if (ada_is_constrained_packed_array_type (value_type (arr)))
2045 return decode_constrained_packed_array (arr);
d2e4a39e 2046 else
14f9c5c9
AS
2047 return arr;
2048}
2049
2050/* If TYPE represents a GNAT array type, return it translated to an
2051 ordinary GDB array type (possibly with BITSIZE fields indicating
4c4b4cd2
PH
2052 packing). For other types, is the identity. */
2053
d2e4a39e
AS
2054struct type *
2055ada_coerce_to_simple_array_type (struct type *type)
14f9c5c9 2056{
ad82864c
JB
2057 if (ada_is_constrained_packed_array_type (type))
2058 return decode_constrained_packed_array_type (type);
17280b9f
UW
2059
2060 if (ada_is_array_descriptor_type (type))
556bdfd4 2061 return ada_check_typedef (desc_data_target_type (type));
17280b9f
UW
2062
2063 return type;
14f9c5c9
AS
2064}
2065
4c4b4cd2
PH
2066/* Non-zero iff TYPE represents a standard GNAT packed-array type. */
2067
ad82864c
JB
2068static int
2069ada_is_packed_array_type (struct type *type)
14f9c5c9
AS
2070{
2071 if (type == NULL)
2072 return 0;
4c4b4cd2 2073 type = desc_base_type (type);
61ee279c 2074 type = ada_check_typedef (type);
d2e4a39e 2075 return
14f9c5c9
AS
2076 ada_type_name (type) != NULL
2077 && strstr (ada_type_name (type), "___XP") != NULL;
2078}
2079
ad82864c
JB
2080/* Non-zero iff TYPE represents a standard GNAT constrained
2081 packed-array type. */
2082
2083int
2084ada_is_constrained_packed_array_type (struct type *type)
2085{
2086 return ada_is_packed_array_type (type)
2087 && !ada_is_array_descriptor_type (type);
2088}
2089
2090/* Non-zero iff TYPE represents an array descriptor for a
2091 unconstrained packed-array type. */
2092
2093static int
2094ada_is_unconstrained_packed_array_type (struct type *type)
2095{
2096 return ada_is_packed_array_type (type)
2097 && ada_is_array_descriptor_type (type);
2098}
2099
2100/* Given that TYPE encodes a packed array type (constrained or unconstrained),
2101 return the size of its elements in bits. */
2102
2103static long
2104decode_packed_array_bitsize (struct type *type)
2105{
0d5cff50
DE
2106 const char *raw_name;
2107 const char *tail;
ad82864c
JB
2108 long bits;
2109
720d1a40
JB
2110 /* Access to arrays implemented as fat pointers are encoded as a typedef
2111 of the fat pointer type. We need the name of the fat pointer type
2112 to do the decoding, so strip the typedef layer. */
2113 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF)
2114 type = ada_typedef_target_type (type);
2115
2116 raw_name = ada_type_name (ada_check_typedef (type));
ad82864c
JB
2117 if (!raw_name)
2118 raw_name = ada_type_name (desc_base_type (type));
2119
2120 if (!raw_name)
2121 return 0;
2122
2123 tail = strstr (raw_name, "___XP");
720d1a40 2124 gdb_assert (tail != NULL);
ad82864c
JB
2125
2126 if (sscanf (tail + sizeof ("___XP") - 1, "%ld", &bits) != 1)
2127 {
2128 lim_warning
2129 (_("could not understand bit size information on packed array"));
2130 return 0;
2131 }
2132
2133 return bits;
2134}
2135
14f9c5c9
AS
2136/* Given that TYPE is a standard GDB array type with all bounds filled
2137 in, and that the element size of its ultimate scalar constituents
2138 (that is, either its elements, or, if it is an array of arrays, its
2139 elements' elements, etc.) is *ELT_BITS, return an identical type,
2140 but with the bit sizes of its elements (and those of any
2141 constituent arrays) recorded in the BITSIZE components of its
4c4b4cd2 2142 TYPE_FIELD_BITSIZE values, and with *ELT_BITS set to its total size
4a46959e
JB
2143 in bits.
2144
2145 Note that, for arrays whose index type has an XA encoding where
2146 a bound references a record discriminant, getting that discriminant,
2147 and therefore the actual value of that bound, is not possible
2148 because none of the given parameters gives us access to the record.
2149 This function assumes that it is OK in the context where it is being
2150 used to return an array whose bounds are still dynamic and where
2151 the length is arbitrary. */
4c4b4cd2 2152
d2e4a39e 2153static struct type *
ad82864c 2154constrained_packed_array_type (struct type *type, long *elt_bits)
14f9c5c9 2155{
d2e4a39e
AS
2156 struct type *new_elt_type;
2157 struct type *new_type;
99b1c762
JB
2158 struct type *index_type_desc;
2159 struct type *index_type;
14f9c5c9
AS
2160 LONGEST low_bound, high_bound;
2161
61ee279c 2162 type = ada_check_typedef (type);
14f9c5c9
AS
2163 if (TYPE_CODE (type) != TYPE_CODE_ARRAY)
2164 return type;
2165
99b1c762
JB
2166 index_type_desc = ada_find_parallel_type (type, "___XA");
2167 if (index_type_desc)
2168 index_type = to_fixed_range_type (TYPE_FIELD_TYPE (index_type_desc, 0),
2169 NULL);
2170 else
2171 index_type = TYPE_INDEX_TYPE (type);
2172
e9bb382b 2173 new_type = alloc_type_copy (type);
ad82864c
JB
2174 new_elt_type =
2175 constrained_packed_array_type (ada_check_typedef (TYPE_TARGET_TYPE (type)),
2176 elt_bits);
99b1c762 2177 create_array_type (new_type, new_elt_type, index_type);
14f9c5c9
AS
2178 TYPE_FIELD_BITSIZE (new_type, 0) = *elt_bits;
2179 TYPE_NAME (new_type) = ada_type_name (type);
2180
4a46959e
JB
2181 if ((TYPE_CODE (check_typedef (index_type)) == TYPE_CODE_RANGE
2182 && is_dynamic_type (check_typedef (index_type)))
2183 || get_discrete_bounds (index_type, &low_bound, &high_bound) < 0)
14f9c5c9
AS
2184 low_bound = high_bound = 0;
2185 if (high_bound < low_bound)
2186 *elt_bits = TYPE_LENGTH (new_type) = 0;
d2e4a39e 2187 else
14f9c5c9
AS
2188 {
2189 *elt_bits *= (high_bound - low_bound + 1);
d2e4a39e 2190 TYPE_LENGTH (new_type) =
4c4b4cd2 2191 (*elt_bits + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT;
14f9c5c9
AS
2192 }
2193
876cecd0 2194 TYPE_FIXED_INSTANCE (new_type) = 1;
14f9c5c9
AS
2195 return new_type;
2196}
2197
ad82864c
JB
2198/* The array type encoded by TYPE, where
2199 ada_is_constrained_packed_array_type (TYPE). */
4c4b4cd2 2200
d2e4a39e 2201static struct type *
ad82864c 2202decode_constrained_packed_array_type (struct type *type)
d2e4a39e 2203{
0d5cff50 2204 const char *raw_name = ada_type_name (ada_check_typedef (type));
727e3d2e 2205 char *name;
0d5cff50 2206 const char *tail;
d2e4a39e 2207 struct type *shadow_type;
14f9c5c9 2208 long bits;
14f9c5c9 2209
727e3d2e
JB
2210 if (!raw_name)
2211 raw_name = ada_type_name (desc_base_type (type));
2212
2213 if (!raw_name)
2214 return NULL;
2215
2216 name = (char *) alloca (strlen (raw_name) + 1);
2217 tail = strstr (raw_name, "___XP");
4c4b4cd2
PH
2218 type = desc_base_type (type);
2219
14f9c5c9
AS
2220 memcpy (name, raw_name, tail - raw_name);
2221 name[tail - raw_name] = '\000';
2222
b4ba55a1
JB
2223 shadow_type = ada_find_parallel_type_with_name (type, name);
2224
2225 if (shadow_type == NULL)
14f9c5c9 2226 {
323e0a4a 2227 lim_warning (_("could not find bounds information on packed array"));
14f9c5c9
AS
2228 return NULL;
2229 }
f168693b 2230 shadow_type = check_typedef (shadow_type);
14f9c5c9
AS
2231
2232 if (TYPE_CODE (shadow_type) != TYPE_CODE_ARRAY)
2233 {
0963b4bd
MS
2234 lim_warning (_("could not understand bounds "
2235 "information on packed array"));
14f9c5c9
AS
2236 return NULL;
2237 }
d2e4a39e 2238
ad82864c
JB
2239 bits = decode_packed_array_bitsize (type);
2240 return constrained_packed_array_type (shadow_type, &bits);
14f9c5c9
AS
2241}
2242
ad82864c
JB
2243/* Given that ARR is a struct value *indicating a GNAT constrained packed
2244 array, returns a simple array that denotes that array. Its type is a
14f9c5c9
AS
2245 standard GDB array type except that the BITSIZEs of the array
2246 target types are set to the number of bits in each element, and the
4c4b4cd2 2247 type length is set appropriately. */
14f9c5c9 2248
d2e4a39e 2249static struct value *
ad82864c 2250decode_constrained_packed_array (struct value *arr)
14f9c5c9 2251{
4c4b4cd2 2252 struct type *type;
14f9c5c9 2253
11aa919a
PMR
2254 /* If our value is a pointer, then dereference it. Likewise if
2255 the value is a reference. Make sure that this operation does not
2256 cause the target type to be fixed, as this would indirectly cause
2257 this array to be decoded. The rest of the routine assumes that
2258 the array hasn't been decoded yet, so we use the basic "coerce_ref"
2259 and "value_ind" routines to perform the dereferencing, as opposed
2260 to using "ada_coerce_ref" or "ada_value_ind". */
2261 arr = coerce_ref (arr);
828292f2 2262 if (TYPE_CODE (ada_check_typedef (value_type (arr))) == TYPE_CODE_PTR)
284614f0 2263 arr = value_ind (arr);
4c4b4cd2 2264
ad82864c 2265 type = decode_constrained_packed_array_type (value_type (arr));
14f9c5c9
AS
2266 if (type == NULL)
2267 {
323e0a4a 2268 error (_("can't unpack array"));
14f9c5c9
AS
2269 return NULL;
2270 }
61ee279c 2271
50810684 2272 if (gdbarch_bits_big_endian (get_type_arch (value_type (arr)))
32c9a795 2273 && ada_is_modular_type (value_type (arr)))
61ee279c
PH
2274 {
2275 /* This is a (right-justified) modular type representing a packed
2276 array with no wrapper. In order to interpret the value through
2277 the (left-justified) packed array type we just built, we must
2278 first left-justify it. */
2279 int bit_size, bit_pos;
2280 ULONGEST mod;
2281
df407dfe 2282 mod = ada_modulus (value_type (arr)) - 1;
61ee279c
PH
2283 bit_size = 0;
2284 while (mod > 0)
2285 {
2286 bit_size += 1;
2287 mod >>= 1;
2288 }
df407dfe 2289 bit_pos = HOST_CHAR_BIT * TYPE_LENGTH (value_type (arr)) - bit_size;
61ee279c
PH
2290 arr = ada_value_primitive_packed_val (arr, NULL,
2291 bit_pos / HOST_CHAR_BIT,
2292 bit_pos % HOST_CHAR_BIT,
2293 bit_size,
2294 type);
2295 }
2296
4c4b4cd2 2297 return coerce_unspec_val_to_type (arr, type);
14f9c5c9
AS
2298}
2299
2300
2301/* The value of the element of packed array ARR at the ARITY indices
4c4b4cd2 2302 given in IND. ARR must be a simple array. */
14f9c5c9 2303
d2e4a39e
AS
2304static struct value *
2305value_subscript_packed (struct value *arr, int arity, struct value **ind)
14f9c5c9
AS
2306{
2307 int i;
2308 int bits, elt_off, bit_off;
2309 long elt_total_bit_offset;
d2e4a39e
AS
2310 struct type *elt_type;
2311 struct value *v;
14f9c5c9
AS
2312
2313 bits = 0;
2314 elt_total_bit_offset = 0;
df407dfe 2315 elt_type = ada_check_typedef (value_type (arr));
d2e4a39e 2316 for (i = 0; i < arity; i += 1)
14f9c5c9 2317 {
d2e4a39e 2318 if (TYPE_CODE (elt_type) != TYPE_CODE_ARRAY
4c4b4cd2
PH
2319 || TYPE_FIELD_BITSIZE (elt_type, 0) == 0)
2320 error
0963b4bd
MS
2321 (_("attempt to do packed indexing of "
2322 "something other than a packed array"));
14f9c5c9 2323 else
4c4b4cd2
PH
2324 {
2325 struct type *range_type = TYPE_INDEX_TYPE (elt_type);
2326 LONGEST lowerbound, upperbound;
2327 LONGEST idx;
2328
2329 if (get_discrete_bounds (range_type, &lowerbound, &upperbound) < 0)
2330 {
323e0a4a 2331 lim_warning (_("don't know bounds of array"));
4c4b4cd2
PH
2332 lowerbound = upperbound = 0;
2333 }
2334
3cb382c9 2335 idx = pos_atr (ind[i]);
4c4b4cd2 2336 if (idx < lowerbound || idx > upperbound)
0963b4bd
MS
2337 lim_warning (_("packed array index %ld out of bounds"),
2338 (long) idx);
4c4b4cd2
PH
2339 bits = TYPE_FIELD_BITSIZE (elt_type, 0);
2340 elt_total_bit_offset += (idx - lowerbound) * bits;
61ee279c 2341 elt_type = ada_check_typedef (TYPE_TARGET_TYPE (elt_type));
4c4b4cd2 2342 }
14f9c5c9
AS
2343 }
2344 elt_off = elt_total_bit_offset / HOST_CHAR_BIT;
2345 bit_off = elt_total_bit_offset % HOST_CHAR_BIT;
d2e4a39e
AS
2346
2347 v = ada_value_primitive_packed_val (arr, NULL, elt_off, bit_off,
4c4b4cd2 2348 bits, elt_type);
14f9c5c9
AS
2349 return v;
2350}
2351
4c4b4cd2 2352/* Non-zero iff TYPE includes negative integer values. */
14f9c5c9
AS
2353
2354static int
d2e4a39e 2355has_negatives (struct type *type)
14f9c5c9 2356{
d2e4a39e
AS
2357 switch (TYPE_CODE (type))
2358 {
2359 default:
2360 return 0;
2361 case TYPE_CODE_INT:
2362 return !TYPE_UNSIGNED (type);
2363 case TYPE_CODE_RANGE:
2364 return TYPE_LOW_BOUND (type) < 0;
2365 }
14f9c5c9 2366}
d2e4a39e 2367
f93fca70 2368/* With SRC being a buffer containing BIT_SIZE bits of data at BIT_OFFSET,
5b639dea 2369 unpack that data into UNPACKED. UNPACKED_LEN is the size in bytes of
f93fca70 2370 the unpacked buffer.
14f9c5c9 2371
5b639dea
JB
2372 The size of the unpacked buffer (UNPACKED_LEN) is expected to be large
2373 enough to contain at least BIT_OFFSET bits. If not, an error is raised.
2374
f93fca70
JB
2375 IS_BIG_ENDIAN is nonzero if the data is stored in big endian mode,
2376 zero otherwise.
14f9c5c9 2377
f93fca70 2378 IS_SIGNED_TYPE is nonzero if the data corresponds to a signed type.
a1c95e6b 2379
f93fca70
JB
2380 IS_SCALAR is nonzero if the data corresponds to a signed type. */
2381
2382static void
2383ada_unpack_from_contents (const gdb_byte *src, int bit_offset, int bit_size,
2384 gdb_byte *unpacked, int unpacked_len,
2385 int is_big_endian, int is_signed_type,
2386 int is_scalar)
2387{
a1c95e6b
JB
2388 int src_len = (bit_size + bit_offset + HOST_CHAR_BIT - 1) / 8;
2389 int src_idx; /* Index into the source area */
2390 int src_bytes_left; /* Number of source bytes left to process. */
2391 int srcBitsLeft; /* Number of source bits left to move */
2392 int unusedLS; /* Number of bits in next significant
2393 byte of source that are unused */
2394
a1c95e6b
JB
2395 int unpacked_idx; /* Index into the unpacked buffer */
2396 int unpacked_bytes_left; /* Number of bytes left to set in unpacked. */
2397
4c4b4cd2 2398 unsigned long accum; /* Staging area for bits being transferred */
a1c95e6b 2399 int accumSize; /* Number of meaningful bits in accum */
14f9c5c9 2400 unsigned char sign;
a1c95e6b 2401
4c4b4cd2
PH
2402 /* Transmit bytes from least to most significant; delta is the direction
2403 the indices move. */
f93fca70 2404 int delta = is_big_endian ? -1 : 1;
14f9c5c9 2405
5b639dea
JB
2406 /* Make sure that unpacked is large enough to receive the BIT_SIZE
2407 bits from SRC. .*/
2408 if ((bit_size + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT > unpacked_len)
2409 error (_("Cannot unpack %d bits into buffer of %d bytes"),
2410 bit_size, unpacked_len);
2411
14f9c5c9 2412 srcBitsLeft = bit_size;
086ca51f 2413 src_bytes_left = src_len;
f93fca70 2414 unpacked_bytes_left = unpacked_len;
14f9c5c9 2415 sign = 0;
f93fca70
JB
2416
2417 if (is_big_endian)
14f9c5c9 2418 {
086ca51f 2419 src_idx = src_len - 1;
f93fca70
JB
2420 if (is_signed_type
2421 && ((src[0] << bit_offset) & (1 << (HOST_CHAR_BIT - 1))))
4c4b4cd2 2422 sign = ~0;
d2e4a39e
AS
2423
2424 unusedLS =
4c4b4cd2
PH
2425 (HOST_CHAR_BIT - (bit_size + bit_offset) % HOST_CHAR_BIT)
2426 % HOST_CHAR_BIT;
14f9c5c9 2427
f93fca70
JB
2428 if (is_scalar)
2429 {
2430 accumSize = 0;
2431 unpacked_idx = unpacked_len - 1;
2432 }
2433 else
2434 {
4c4b4cd2
PH
2435 /* Non-scalar values must be aligned at a byte boundary... */
2436 accumSize =
2437 (HOST_CHAR_BIT - bit_size % HOST_CHAR_BIT) % HOST_CHAR_BIT;
2438 /* ... And are placed at the beginning (most-significant) bytes
2439 of the target. */
086ca51f
JB
2440 unpacked_idx = (bit_size + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT - 1;
2441 unpacked_bytes_left = unpacked_idx + 1;
f93fca70 2442 }
14f9c5c9 2443 }
d2e4a39e 2444 else
14f9c5c9
AS
2445 {
2446 int sign_bit_offset = (bit_size + bit_offset - 1) % 8;
2447
086ca51f 2448 src_idx = unpacked_idx = 0;
14f9c5c9
AS
2449 unusedLS = bit_offset;
2450 accumSize = 0;
2451
f93fca70 2452 if (is_signed_type && (src[src_len - 1] & (1 << sign_bit_offset)))
4c4b4cd2 2453 sign = ~0;
14f9c5c9 2454 }
d2e4a39e 2455
14f9c5c9 2456 accum = 0;
086ca51f 2457 while (src_bytes_left > 0)
14f9c5c9
AS
2458 {
2459 /* Mask for removing bits of the next source byte that are not
4c4b4cd2 2460 part of the value. */
d2e4a39e 2461 unsigned int unusedMSMask =
4c4b4cd2
PH
2462 (1 << (srcBitsLeft >= HOST_CHAR_BIT ? HOST_CHAR_BIT : srcBitsLeft)) -
2463 1;
2464 /* Sign-extend bits for this byte. */
14f9c5c9 2465 unsigned int signMask = sign & ~unusedMSMask;
5b4ee69b 2466
d2e4a39e 2467 accum |=
086ca51f 2468 (((src[src_idx] >> unusedLS) & unusedMSMask) | signMask) << accumSize;
14f9c5c9 2469 accumSize += HOST_CHAR_BIT - unusedLS;
d2e4a39e 2470 if (accumSize >= HOST_CHAR_BIT)
4c4b4cd2 2471 {
db297a65 2472 unpacked[unpacked_idx] = accum & ~(~0UL << HOST_CHAR_BIT);
4c4b4cd2
PH
2473 accumSize -= HOST_CHAR_BIT;
2474 accum >>= HOST_CHAR_BIT;
086ca51f
JB
2475 unpacked_bytes_left -= 1;
2476 unpacked_idx += delta;
4c4b4cd2 2477 }
14f9c5c9
AS
2478 srcBitsLeft -= HOST_CHAR_BIT - unusedLS;
2479 unusedLS = 0;
086ca51f
JB
2480 src_bytes_left -= 1;
2481 src_idx += delta;
14f9c5c9 2482 }
086ca51f 2483 while (unpacked_bytes_left > 0)
14f9c5c9
AS
2484 {
2485 accum |= sign << accumSize;
db297a65 2486 unpacked[unpacked_idx] = accum & ~(~0UL << HOST_CHAR_BIT);
14f9c5c9 2487 accumSize -= HOST_CHAR_BIT;
9cd4d857
JB
2488 if (accumSize < 0)
2489 accumSize = 0;
14f9c5c9 2490 accum >>= HOST_CHAR_BIT;
086ca51f
JB
2491 unpacked_bytes_left -= 1;
2492 unpacked_idx += delta;
14f9c5c9 2493 }
f93fca70
JB
2494}
2495
2496/* Create a new value of type TYPE from the contents of OBJ starting
2497 at byte OFFSET, and bit offset BIT_OFFSET within that byte,
2498 proceeding for BIT_SIZE bits. If OBJ is an lval in memory, then
2499 assigning through the result will set the field fetched from.
2500 VALADDR is ignored unless OBJ is NULL, in which case,
2501 VALADDR+OFFSET must address the start of storage containing the
2502 packed value. The value returned in this case is never an lval.
2503 Assumes 0 <= BIT_OFFSET < HOST_CHAR_BIT. */
2504
2505struct value *
2506ada_value_primitive_packed_val (struct value *obj, const gdb_byte *valaddr,
2507 long offset, int bit_offset, int bit_size,
2508 struct type *type)
2509{
2510 struct value *v;
bfb1c796 2511 const gdb_byte *src; /* First byte containing data to unpack */
f93fca70 2512 gdb_byte *unpacked;
220475ed 2513 const int is_scalar = is_scalar_type (type);
d0a9e810 2514 const int is_big_endian = gdbarch_bits_big_endian (get_type_arch (type));
d5722aa2 2515 gdb::byte_vector staging;
f93fca70
JB
2516
2517 type = ada_check_typedef (type);
2518
d0a9e810 2519 if (obj == NULL)
bfb1c796 2520 src = valaddr + offset;
d0a9e810 2521 else
bfb1c796 2522 src = value_contents (obj) + offset;
d0a9e810
JB
2523
2524 if (is_dynamic_type (type))
2525 {
2526 /* The length of TYPE might by dynamic, so we need to resolve
2527 TYPE in order to know its actual size, which we then use
2528 to create the contents buffer of the value we return.
2529 The difficulty is that the data containing our object is
2530 packed, and therefore maybe not at a byte boundary. So, what
2531 we do, is unpack the data into a byte-aligned buffer, and then
2532 use that buffer as our object's value for resolving the type. */
d5722aa2
PA
2533 int staging_len = (bit_size + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT;
2534 staging.resize (staging_len);
d0a9e810
JB
2535
2536 ada_unpack_from_contents (src, bit_offset, bit_size,
d5722aa2 2537 staging.data (), staging.size (),
d0a9e810
JB
2538 is_big_endian, has_negatives (type),
2539 is_scalar);
d5722aa2 2540 type = resolve_dynamic_type (type, staging.data (), 0);
0cafa88c
JB
2541 if (TYPE_LENGTH (type) < (bit_size + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT)
2542 {
2543 /* This happens when the length of the object is dynamic,
2544 and is actually smaller than the space reserved for it.
2545 For instance, in an array of variant records, the bit_size
2546 we're given is the array stride, which is constant and
2547 normally equal to the maximum size of its element.
2548 But, in reality, each element only actually spans a portion
2549 of that stride. */
2550 bit_size = TYPE_LENGTH (type) * HOST_CHAR_BIT;
2551 }
d0a9e810
JB
2552 }
2553
f93fca70
JB
2554 if (obj == NULL)
2555 {
2556 v = allocate_value (type);
bfb1c796 2557 src = valaddr + offset;
f93fca70
JB
2558 }
2559 else if (VALUE_LVAL (obj) == lval_memory && value_lazy (obj))
2560 {
0cafa88c 2561 int src_len = (bit_size + bit_offset + HOST_CHAR_BIT - 1) / 8;
bfb1c796 2562 gdb_byte *buf;
0cafa88c 2563
f93fca70 2564 v = value_at (type, value_address (obj) + offset);
bfb1c796
PA
2565 buf = (gdb_byte *) alloca (src_len);
2566 read_memory (value_address (v), buf, src_len);
2567 src = buf;
f93fca70
JB
2568 }
2569 else
2570 {
2571 v = allocate_value (type);
bfb1c796 2572 src = value_contents (obj) + offset;
f93fca70
JB
2573 }
2574
2575 if (obj != NULL)
2576 {
2577 long new_offset = offset;
2578
2579 set_value_component_location (v, obj);
2580 set_value_bitpos (v, bit_offset + value_bitpos (obj));
2581 set_value_bitsize (v, bit_size);
2582 if (value_bitpos (v) >= HOST_CHAR_BIT)
2583 {
2584 ++new_offset;
2585 set_value_bitpos (v, value_bitpos (v) - HOST_CHAR_BIT);
2586 }
2587 set_value_offset (v, new_offset);
2588
2589 /* Also set the parent value. This is needed when trying to
2590 assign a new value (in inferior memory). */
2591 set_value_parent (v, obj);
2592 }
2593 else
2594 set_value_bitsize (v, bit_size);
bfb1c796 2595 unpacked = value_contents_writeable (v);
f93fca70
JB
2596
2597 if (bit_size == 0)
2598 {
2599 memset (unpacked, 0, TYPE_LENGTH (type));
2600 return v;
2601 }
2602
d5722aa2 2603 if (staging.size () == TYPE_LENGTH (type))
f93fca70 2604 {
d0a9e810
JB
2605 /* Small short-cut: If we've unpacked the data into a buffer
2606 of the same size as TYPE's length, then we can reuse that,
2607 instead of doing the unpacking again. */
d5722aa2 2608 memcpy (unpacked, staging.data (), staging.size ());
f93fca70 2609 }
d0a9e810
JB
2610 else
2611 ada_unpack_from_contents (src, bit_offset, bit_size,
2612 unpacked, TYPE_LENGTH (type),
2613 is_big_endian, has_negatives (type), is_scalar);
f93fca70 2614
14f9c5c9
AS
2615 return v;
2616}
d2e4a39e 2617
14f9c5c9
AS
2618/* Store the contents of FROMVAL into the location of TOVAL.
2619 Return a new value with the location of TOVAL and contents of
2620 FROMVAL. Handles assignment into packed fields that have
4c4b4cd2 2621 floating-point or non-scalar types. */
14f9c5c9 2622
d2e4a39e
AS
2623static struct value *
2624ada_value_assign (struct value *toval, struct value *fromval)
14f9c5c9 2625{
df407dfe
AC
2626 struct type *type = value_type (toval);
2627 int bits = value_bitsize (toval);
14f9c5c9 2628
52ce6436
PH
2629 toval = ada_coerce_ref (toval);
2630 fromval = ada_coerce_ref (fromval);
2631
2632 if (ada_is_direct_array_type (value_type (toval)))
2633 toval = ada_coerce_to_simple_array (toval);
2634 if (ada_is_direct_array_type (value_type (fromval)))
2635 fromval = ada_coerce_to_simple_array (fromval);
2636
88e3b34b 2637 if (!deprecated_value_modifiable (toval))
323e0a4a 2638 error (_("Left operand of assignment is not a modifiable lvalue."));
14f9c5c9 2639
d2e4a39e 2640 if (VALUE_LVAL (toval) == lval_memory
14f9c5c9 2641 && bits > 0
d2e4a39e 2642 && (TYPE_CODE (type) == TYPE_CODE_FLT
4c4b4cd2 2643 || TYPE_CODE (type) == TYPE_CODE_STRUCT))
14f9c5c9 2644 {
df407dfe
AC
2645 int len = (value_bitpos (toval)
2646 + bits + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT;
aced2898 2647 int from_size;
224c3ddb 2648 gdb_byte *buffer = (gdb_byte *) alloca (len);
d2e4a39e 2649 struct value *val;
42ae5230 2650 CORE_ADDR to_addr = value_address (toval);
14f9c5c9
AS
2651
2652 if (TYPE_CODE (type) == TYPE_CODE_FLT)
4c4b4cd2 2653 fromval = value_cast (type, fromval);
14f9c5c9 2654
52ce6436 2655 read_memory (to_addr, buffer, len);
aced2898
PH
2656 from_size = value_bitsize (fromval);
2657 if (from_size == 0)
2658 from_size = TYPE_LENGTH (value_type (fromval)) * TARGET_CHAR_BIT;
d48e62f4
TT
2659
2660 const int is_big_endian = gdbarch_bits_big_endian (get_type_arch (type));
2661 ULONGEST from_offset = 0;
2662 if (is_big_endian && is_scalar_type (value_type (fromval)))
2663 from_offset = from_size - bits;
2664 copy_bitwise (buffer, value_bitpos (toval),
2665 value_contents (fromval), from_offset,
2666 bits, is_big_endian);
972daa01 2667 write_memory_with_notification (to_addr, buffer, len);
8cebebb9 2668
14f9c5c9 2669 val = value_copy (toval);
0fd88904 2670 memcpy (value_contents_raw (val), value_contents (fromval),
4c4b4cd2 2671 TYPE_LENGTH (type));
04624583 2672 deprecated_set_value_type (val, type);
d2e4a39e 2673
14f9c5c9
AS
2674 return val;
2675 }
2676
2677 return value_assign (toval, fromval);
2678}
2679
2680
7c512744
JB
2681/* Given that COMPONENT is a memory lvalue that is part of the lvalue
2682 CONTAINER, assign the contents of VAL to COMPONENTS's place in
2683 CONTAINER. Modifies the VALUE_CONTENTS of CONTAINER only, not
2684 COMPONENT, and not the inferior's memory. The current contents
2685 of COMPONENT are ignored.
2686
2687 Although not part of the initial design, this function also works
2688 when CONTAINER and COMPONENT are not_lval's: it works as if CONTAINER
2689 had a null address, and COMPONENT had an address which is equal to
2690 its offset inside CONTAINER. */
2691
52ce6436
PH
2692static void
2693value_assign_to_component (struct value *container, struct value *component,
2694 struct value *val)
2695{
2696 LONGEST offset_in_container =
42ae5230 2697 (LONGEST) (value_address (component) - value_address (container));
7c512744 2698 int bit_offset_in_container =
52ce6436
PH
2699 value_bitpos (component) - value_bitpos (container);
2700 int bits;
7c512744 2701
52ce6436
PH
2702 val = value_cast (value_type (component), val);
2703
2704 if (value_bitsize (component) == 0)
2705 bits = TARGET_CHAR_BIT * TYPE_LENGTH (value_type (component));
2706 else
2707 bits = value_bitsize (component);
2708
50810684 2709 if (gdbarch_bits_big_endian (get_type_arch (value_type (container))))
2a62dfa9
JB
2710 {
2711 int src_offset;
2712
2713 if (is_scalar_type (check_typedef (value_type (component))))
2714 src_offset
2715 = TYPE_LENGTH (value_type (component)) * TARGET_CHAR_BIT - bits;
2716 else
2717 src_offset = 0;
a99bc3d2
JB
2718 copy_bitwise (value_contents_writeable (container) + offset_in_container,
2719 value_bitpos (container) + bit_offset_in_container,
2720 value_contents (val), src_offset, bits, 1);
2a62dfa9 2721 }
52ce6436 2722 else
a99bc3d2
JB
2723 copy_bitwise (value_contents_writeable (container) + offset_in_container,
2724 value_bitpos (container) + bit_offset_in_container,
2725 value_contents (val), 0, bits, 0);
7c512744
JB
2726}
2727
736ade86
XR
2728/* Determine if TYPE is an access to an unconstrained array. */
2729
d91e9ea8 2730bool
736ade86
XR
2731ada_is_access_to_unconstrained_array (struct type *type)
2732{
2733 return (TYPE_CODE (type) == TYPE_CODE_TYPEDEF
2734 && is_thick_pntr (ada_typedef_target_type (type)));
2735}
2736
4c4b4cd2
PH
2737/* The value of the element of array ARR at the ARITY indices given in IND.
2738 ARR may be either a simple array, GNAT array descriptor, or pointer
14f9c5c9
AS
2739 thereto. */
2740
d2e4a39e
AS
2741struct value *
2742ada_value_subscript (struct value *arr, int arity, struct value **ind)
14f9c5c9
AS
2743{
2744 int k;
d2e4a39e
AS
2745 struct value *elt;
2746 struct type *elt_type;
14f9c5c9
AS
2747
2748 elt = ada_coerce_to_simple_array (arr);
2749
df407dfe 2750 elt_type = ada_check_typedef (value_type (elt));
d2e4a39e 2751 if (TYPE_CODE (elt_type) == TYPE_CODE_ARRAY
14f9c5c9
AS
2752 && TYPE_FIELD_BITSIZE (elt_type, 0) > 0)
2753 return value_subscript_packed (elt, arity, ind);
2754
2755 for (k = 0; k < arity; k += 1)
2756 {
b9c50e9a
XR
2757 struct type *saved_elt_type = TYPE_TARGET_TYPE (elt_type);
2758
14f9c5c9 2759 if (TYPE_CODE (elt_type) != TYPE_CODE_ARRAY)
323e0a4a 2760 error (_("too many subscripts (%d expected)"), k);
b9c50e9a 2761
2497b498 2762 elt = value_subscript (elt, pos_atr (ind[k]));
b9c50e9a
XR
2763
2764 if (ada_is_access_to_unconstrained_array (saved_elt_type)
2765 && TYPE_CODE (value_type (elt)) != TYPE_CODE_TYPEDEF)
2766 {
2767 /* The element is a typedef to an unconstrained array,
2768 except that the value_subscript call stripped the
2769 typedef layer. The typedef layer is GNAT's way to
2770 specify that the element is, at the source level, an
2771 access to the unconstrained array, rather than the
2772 unconstrained array. So, we need to restore that
2773 typedef layer, which we can do by forcing the element's
2774 type back to its original type. Otherwise, the returned
2775 value is going to be printed as the array, rather
2776 than as an access. Another symptom of the same issue
2777 would be that an expression trying to dereference the
2778 element would also be improperly rejected. */
2779 deprecated_set_value_type (elt, saved_elt_type);
2780 }
2781
2782 elt_type = ada_check_typedef (value_type (elt));
14f9c5c9 2783 }
b9c50e9a 2784
14f9c5c9
AS
2785 return elt;
2786}
2787
deede10c
JB
2788/* Assuming ARR is a pointer to a GDB array, the value of the element
2789 of *ARR at the ARITY indices given in IND.
919e6dbe
PMR
2790 Does not read the entire array into memory.
2791
2792 Note: Unlike what one would expect, this function is used instead of
2793 ada_value_subscript for basically all non-packed array types. The reason
2794 for this is that a side effect of doing our own pointer arithmetics instead
2795 of relying on value_subscript is that there is no implicit typedef peeling.
2796 This is important for arrays of array accesses, where it allows us to
2797 preserve the fact that the array's element is an array access, where the
2798 access part os encoded in a typedef layer. */
14f9c5c9 2799
2c0b251b 2800static struct value *
deede10c 2801ada_value_ptr_subscript (struct value *arr, int arity, struct value **ind)
14f9c5c9
AS
2802{
2803 int k;
919e6dbe 2804 struct value *array_ind = ada_value_ind (arr);
deede10c 2805 struct type *type
919e6dbe
PMR
2806 = check_typedef (value_enclosing_type (array_ind));
2807
2808 if (TYPE_CODE (type) == TYPE_CODE_ARRAY
2809 && TYPE_FIELD_BITSIZE (type, 0) > 0)
2810 return value_subscript_packed (array_ind, arity, ind);
14f9c5c9
AS
2811
2812 for (k = 0; k < arity; k += 1)
2813 {
2814 LONGEST lwb, upb;
aa715135 2815 struct value *lwb_value;
14f9c5c9
AS
2816
2817 if (TYPE_CODE (type) != TYPE_CODE_ARRAY)
323e0a4a 2818 error (_("too many subscripts (%d expected)"), k);
d2e4a39e 2819 arr = value_cast (lookup_pointer_type (TYPE_TARGET_TYPE (type)),
4c4b4cd2 2820 value_copy (arr));
14f9c5c9 2821 get_discrete_bounds (TYPE_INDEX_TYPE (type), &lwb, &upb);
aa715135
JG
2822 lwb_value = value_from_longest (value_type(ind[k]), lwb);
2823 arr = value_ptradd (arr, pos_atr (ind[k]) - pos_atr (lwb_value));
14f9c5c9
AS
2824 type = TYPE_TARGET_TYPE (type);
2825 }
2826
2827 return value_ind (arr);
2828}
2829
0b5d8877 2830/* Given that ARRAY_PTR is a pointer or reference to an array of type TYPE (the
aa715135
JG
2831 actual type of ARRAY_PTR is ignored), returns the Ada slice of
2832 HIGH'Pos-LOW'Pos+1 elements starting at index LOW. The lower bound of
2833 this array is LOW, as per Ada rules. */
0b5d8877 2834static struct value *
f5938064
JG
2835ada_value_slice_from_ptr (struct value *array_ptr, struct type *type,
2836 int low, int high)
0b5d8877 2837{
b0dd7688 2838 struct type *type0 = ada_check_typedef (type);
aa715135 2839 struct type *base_index_type = TYPE_TARGET_TYPE (TYPE_INDEX_TYPE (type0));
0c9c3474 2840 struct type *index_type
aa715135 2841 = create_static_range_type (NULL, base_index_type, low, high);
9fe561ab
JB
2842 struct type *slice_type = create_array_type_with_stride
2843 (NULL, TYPE_TARGET_TYPE (type0), index_type,
2844 get_dyn_prop (DYN_PROP_BYTE_STRIDE, type0),
2845 TYPE_FIELD_BITSIZE (type0, 0));
aa715135
JG
2846 int base_low = ada_discrete_type_low_bound (TYPE_INDEX_TYPE (type0));
2847 LONGEST base_low_pos, low_pos;
2848 CORE_ADDR base;
2849
2850 if (!discrete_position (base_index_type, low, &low_pos)
2851 || !discrete_position (base_index_type, base_low, &base_low_pos))
2852 {
2853 warning (_("unable to get positions in slice, use bounds instead"));
2854 low_pos = low;
2855 base_low_pos = base_low;
2856 }
5b4ee69b 2857
aa715135
JG
2858 base = value_as_address (array_ptr)
2859 + ((low_pos - base_low_pos)
2860 * TYPE_LENGTH (TYPE_TARGET_TYPE (type0)));
f5938064 2861 return value_at_lazy (slice_type, base);
0b5d8877
PH
2862}
2863
2864
2865static struct value *
2866ada_value_slice (struct value *array, int low, int high)
2867{
b0dd7688 2868 struct type *type = ada_check_typedef (value_type (array));
aa715135 2869 struct type *base_index_type = TYPE_TARGET_TYPE (TYPE_INDEX_TYPE (type));
0c9c3474
SA
2870 struct type *index_type
2871 = create_static_range_type (NULL, TYPE_INDEX_TYPE (type), low, high);
9fe561ab
JB
2872 struct type *slice_type = create_array_type_with_stride
2873 (NULL, TYPE_TARGET_TYPE (type), index_type,
2874 get_dyn_prop (DYN_PROP_BYTE_STRIDE, type),
2875 TYPE_FIELD_BITSIZE (type, 0));
aa715135 2876 LONGEST low_pos, high_pos;
5b4ee69b 2877
aa715135
JG
2878 if (!discrete_position (base_index_type, low, &low_pos)
2879 || !discrete_position (base_index_type, high, &high_pos))
2880 {
2881 warning (_("unable to get positions in slice, use bounds instead"));
2882 low_pos = low;
2883 high_pos = high;
2884 }
2885
2886 return value_cast (slice_type,
2887 value_slice (array, low, high_pos - low_pos + 1));
0b5d8877
PH
2888}
2889
14f9c5c9
AS
2890/* If type is a record type in the form of a standard GNAT array
2891 descriptor, returns the number of dimensions for type. If arr is a
2892 simple array, returns the number of "array of"s that prefix its
4c4b4cd2 2893 type designation. Otherwise, returns 0. */
14f9c5c9
AS
2894
2895int
d2e4a39e 2896ada_array_arity (struct type *type)
14f9c5c9
AS
2897{
2898 int arity;
2899
2900 if (type == NULL)
2901 return 0;
2902
2903 type = desc_base_type (type);
2904
2905 arity = 0;
d2e4a39e 2906 if (TYPE_CODE (type) == TYPE_CODE_STRUCT)
14f9c5c9 2907 return desc_arity (desc_bounds_type (type));
d2e4a39e
AS
2908 else
2909 while (TYPE_CODE (type) == TYPE_CODE_ARRAY)
14f9c5c9 2910 {
4c4b4cd2 2911 arity += 1;
61ee279c 2912 type = ada_check_typedef (TYPE_TARGET_TYPE (type));
14f9c5c9 2913 }
d2e4a39e 2914
14f9c5c9
AS
2915 return arity;
2916}
2917
2918/* If TYPE is a record type in the form of a standard GNAT array
2919 descriptor or a simple array type, returns the element type for
2920 TYPE after indexing by NINDICES indices, or by all indices if
4c4b4cd2 2921 NINDICES is -1. Otherwise, returns NULL. */
14f9c5c9 2922
d2e4a39e
AS
2923struct type *
2924ada_array_element_type (struct type *type, int nindices)
14f9c5c9
AS
2925{
2926 type = desc_base_type (type);
2927
d2e4a39e 2928 if (TYPE_CODE (type) == TYPE_CODE_STRUCT)
14f9c5c9
AS
2929 {
2930 int k;
d2e4a39e 2931 struct type *p_array_type;
14f9c5c9 2932
556bdfd4 2933 p_array_type = desc_data_target_type (type);
14f9c5c9
AS
2934
2935 k = ada_array_arity (type);
2936 if (k == 0)
4c4b4cd2 2937 return NULL;
d2e4a39e 2938
4c4b4cd2 2939 /* Initially p_array_type = elt_type(*)[]...(k times)...[]. */
14f9c5c9 2940 if (nindices >= 0 && k > nindices)
4c4b4cd2 2941 k = nindices;
d2e4a39e 2942 while (k > 0 && p_array_type != NULL)
4c4b4cd2 2943 {
61ee279c 2944 p_array_type = ada_check_typedef (TYPE_TARGET_TYPE (p_array_type));
4c4b4cd2
PH
2945 k -= 1;
2946 }
14f9c5c9
AS
2947 return p_array_type;
2948 }
2949 else if (TYPE_CODE (type) == TYPE_CODE_ARRAY)
2950 {
2951 while (nindices != 0 && TYPE_CODE (type) == TYPE_CODE_ARRAY)
4c4b4cd2
PH
2952 {
2953 type = TYPE_TARGET_TYPE (type);
2954 nindices -= 1;
2955 }
14f9c5c9
AS
2956 return type;
2957 }
2958
2959 return NULL;
2960}
2961
4c4b4cd2 2962/* The type of nth index in arrays of given type (n numbering from 1).
dd19d49e
UW
2963 Does not examine memory. Throws an error if N is invalid or TYPE
2964 is not an array type. NAME is the name of the Ada attribute being
2965 evaluated ('range, 'first, 'last, or 'length); it is used in building
2966 the error message. */
14f9c5c9 2967
1eea4ebd
UW
2968static struct type *
2969ada_index_type (struct type *type, int n, const char *name)
14f9c5c9 2970{
4c4b4cd2
PH
2971 struct type *result_type;
2972
14f9c5c9
AS
2973 type = desc_base_type (type);
2974
1eea4ebd
UW
2975 if (n < 0 || n > ada_array_arity (type))
2976 error (_("invalid dimension number to '%s"), name);
14f9c5c9 2977
4c4b4cd2 2978 if (ada_is_simple_array_type (type))
14f9c5c9
AS
2979 {
2980 int i;
2981
2982 for (i = 1; i < n; i += 1)
4c4b4cd2 2983 type = TYPE_TARGET_TYPE (type);
262452ec 2984 result_type = TYPE_TARGET_TYPE (TYPE_INDEX_TYPE (type));
4c4b4cd2
PH
2985 /* FIXME: The stabs type r(0,0);bound;bound in an array type
2986 has a target type of TYPE_CODE_UNDEF. We compensate here, but
76a01679 2987 perhaps stabsread.c would make more sense. */
1eea4ebd
UW
2988 if (result_type && TYPE_CODE (result_type) == TYPE_CODE_UNDEF)
2989 result_type = NULL;
14f9c5c9 2990 }
d2e4a39e 2991 else
1eea4ebd
UW
2992 {
2993 result_type = desc_index_type (desc_bounds_type (type), n);
2994 if (result_type == NULL)
2995 error (_("attempt to take bound of something that is not an array"));
2996 }
2997
2998 return result_type;
14f9c5c9
AS
2999}
3000
3001/* Given that arr is an array type, returns the lower bound of the
3002 Nth index (numbering from 1) if WHICH is 0, and the upper bound if
4c4b4cd2 3003 WHICH is 1. This returns bounds 0 .. -1 if ARR_TYPE is an
1eea4ebd
UW
3004 array-descriptor type. It works for other arrays with bounds supplied
3005 by run-time quantities other than discriminants. */
14f9c5c9 3006
abb68b3e 3007static LONGEST
fb5e3d5c 3008ada_array_bound_from_type (struct type *arr_type, int n, int which)
14f9c5c9 3009{
8a48ac95 3010 struct type *type, *index_type_desc, *index_type;
1ce677a4 3011 int i;
262452ec
JK
3012
3013 gdb_assert (which == 0 || which == 1);
14f9c5c9 3014
ad82864c
JB
3015 if (ada_is_constrained_packed_array_type (arr_type))
3016 arr_type = decode_constrained_packed_array_type (arr_type);
14f9c5c9 3017
4c4b4cd2 3018 if (arr_type == NULL || !ada_is_simple_array_type (arr_type))
1eea4ebd 3019 return (LONGEST) - which;
14f9c5c9
AS
3020
3021 if (TYPE_CODE (arr_type) == TYPE_CODE_PTR)
3022 type = TYPE_TARGET_TYPE (arr_type);
3023 else
3024 type = arr_type;
3025
bafffb51
JB
3026 if (TYPE_FIXED_INSTANCE (type))
3027 {
3028 /* The array has already been fixed, so we do not need to
3029 check the parallel ___XA type again. That encoding has
3030 already been applied, so ignore it now. */
3031 index_type_desc = NULL;
3032 }
3033 else
3034 {
3035 index_type_desc = ada_find_parallel_type (type, "___XA");
3036 ada_fixup_array_indexes_type (index_type_desc);
3037 }
3038
262452ec 3039 if (index_type_desc != NULL)
28c85d6c
JB
3040 index_type = to_fixed_range_type (TYPE_FIELD_TYPE (index_type_desc, n - 1),
3041 NULL);
262452ec 3042 else
8a48ac95
JB
3043 {
3044 struct type *elt_type = check_typedef (type);
3045
3046 for (i = 1; i < n; i++)
3047 elt_type = check_typedef (TYPE_TARGET_TYPE (elt_type));
3048
3049 index_type = TYPE_INDEX_TYPE (elt_type);
3050 }
262452ec 3051
43bbcdc2
PH
3052 return
3053 (LONGEST) (which == 0
3054 ? ada_discrete_type_low_bound (index_type)
3055 : ada_discrete_type_high_bound (index_type));
14f9c5c9
AS
3056}
3057
3058/* Given that arr is an array value, returns the lower bound of the
abb68b3e
JB
3059 nth index (numbering from 1) if WHICH is 0, and the upper bound if
3060 WHICH is 1. This routine will also work for arrays with bounds
4c4b4cd2 3061 supplied by run-time quantities other than discriminants. */
14f9c5c9 3062
1eea4ebd 3063static LONGEST
4dc81987 3064ada_array_bound (struct value *arr, int n, int which)
14f9c5c9 3065{
eb479039
JB
3066 struct type *arr_type;
3067
3068 if (TYPE_CODE (check_typedef (value_type (arr))) == TYPE_CODE_PTR)
3069 arr = value_ind (arr);
3070 arr_type = value_enclosing_type (arr);
14f9c5c9 3071
ad82864c
JB
3072 if (ada_is_constrained_packed_array_type (arr_type))
3073 return ada_array_bound (decode_constrained_packed_array (arr), n, which);
4c4b4cd2 3074 else if (ada_is_simple_array_type (arr_type))
1eea4ebd 3075 return ada_array_bound_from_type (arr_type, n, which);
14f9c5c9 3076 else
1eea4ebd 3077 return value_as_long (desc_one_bound (desc_bounds (arr), n, which));
14f9c5c9
AS
3078}
3079
3080/* Given that arr is an array value, returns the length of the
3081 nth index. This routine will also work for arrays with bounds
4c4b4cd2
PH
3082 supplied by run-time quantities other than discriminants.
3083 Does not work for arrays indexed by enumeration types with representation
3084 clauses at the moment. */
14f9c5c9 3085
1eea4ebd 3086static LONGEST
d2e4a39e 3087ada_array_length (struct value *arr, int n)
14f9c5c9 3088{
aa715135
JG
3089 struct type *arr_type, *index_type;
3090 int low, high;
eb479039
JB
3091
3092 if (TYPE_CODE (check_typedef (value_type (arr))) == TYPE_CODE_PTR)
3093 arr = value_ind (arr);
3094 arr_type = value_enclosing_type (arr);
14f9c5c9 3095
ad82864c
JB
3096 if (ada_is_constrained_packed_array_type (arr_type))
3097 return ada_array_length (decode_constrained_packed_array (arr), n);
14f9c5c9 3098
4c4b4cd2 3099 if (ada_is_simple_array_type (arr_type))
aa715135
JG
3100 {
3101 low = ada_array_bound_from_type (arr_type, n, 0);
3102 high = ada_array_bound_from_type (arr_type, n, 1);
3103 }
14f9c5c9 3104 else
aa715135
JG
3105 {
3106 low = value_as_long (desc_one_bound (desc_bounds (arr), n, 0));
3107 high = value_as_long (desc_one_bound (desc_bounds (arr), n, 1));
3108 }
3109
f168693b 3110 arr_type = check_typedef (arr_type);
7150d33c 3111 index_type = ada_index_type (arr_type, n, "length");
aa715135
JG
3112 if (index_type != NULL)
3113 {
3114 struct type *base_type;
3115 if (TYPE_CODE (index_type) == TYPE_CODE_RANGE)
3116 base_type = TYPE_TARGET_TYPE (index_type);
3117 else
3118 base_type = index_type;
3119
3120 low = pos_atr (value_from_longest (base_type, low));
3121 high = pos_atr (value_from_longest (base_type, high));
3122 }
3123 return high - low + 1;
4c4b4cd2
PH
3124}
3125
bff8c71f
TT
3126/* An array whose type is that of ARR_TYPE (an array type), with
3127 bounds LOW to HIGH, but whose contents are unimportant. If HIGH is
3128 less than LOW, then LOW-1 is used. */
4c4b4cd2
PH
3129
3130static struct value *
bff8c71f 3131empty_array (struct type *arr_type, int low, int high)
4c4b4cd2 3132{
b0dd7688 3133 struct type *arr_type0 = ada_check_typedef (arr_type);
0c9c3474
SA
3134 struct type *index_type
3135 = create_static_range_type
bff8c71f
TT
3136 (NULL, TYPE_TARGET_TYPE (TYPE_INDEX_TYPE (arr_type0)), low,
3137 high < low ? low - 1 : high);
b0dd7688 3138 struct type *elt_type = ada_array_element_type (arr_type0, 1);
5b4ee69b 3139
0b5d8877 3140 return allocate_value (create_array_type (NULL, elt_type, index_type));
14f9c5c9 3141}
14f9c5c9 3142\f
d2e4a39e 3143
4c4b4cd2 3144 /* Name resolution */
14f9c5c9 3145
4c4b4cd2
PH
3146/* The "decoded" name for the user-definable Ada operator corresponding
3147 to OP. */
14f9c5c9 3148
d2e4a39e 3149static const char *
4c4b4cd2 3150ada_decoded_op_name (enum exp_opcode op)
14f9c5c9
AS
3151{
3152 int i;
3153
4c4b4cd2 3154 for (i = 0; ada_opname_table[i].encoded != NULL; i += 1)
14f9c5c9
AS
3155 {
3156 if (ada_opname_table[i].op == op)
4c4b4cd2 3157 return ada_opname_table[i].decoded;
14f9c5c9 3158 }
323e0a4a 3159 error (_("Could not find operator name for opcode"));
14f9c5c9
AS
3160}
3161
3162
4c4b4cd2
PH
3163/* Same as evaluate_type (*EXP), but resolves ambiguous symbol
3164 references (marked by OP_VAR_VALUE nodes in which the symbol has an
3165 undefined namespace) and converts operators that are
3166 user-defined into appropriate function calls. If CONTEXT_TYPE is
14f9c5c9
AS
3167 non-null, it provides a preferred result type [at the moment, only
3168 type void has any effect---causing procedures to be preferred over
3169 functions in calls]. A null CONTEXT_TYPE indicates that a non-void
4c4b4cd2 3170 return type is preferred. May change (expand) *EXP. */
14f9c5c9 3171
4c4b4cd2 3172static void
699bd4cf
TT
3173resolve (expression_up *expp, int void_context_p, int parse_completion,
3174 innermost_block_tracker *tracker)
14f9c5c9 3175{
30b15541
UW
3176 struct type *context_type = NULL;
3177 int pc = 0;
3178
3179 if (void_context_p)
3180 context_type = builtin_type ((*expp)->gdbarch)->builtin_void;
3181
699bd4cf 3182 resolve_subexp (expp, &pc, 1, context_type, parse_completion, tracker);
14f9c5c9
AS
3183}
3184
4c4b4cd2
PH
3185/* Resolve the operator of the subexpression beginning at
3186 position *POS of *EXPP. "Resolving" consists of replacing
3187 the symbols that have undefined namespaces in OP_VAR_VALUE nodes
3188 with their resolutions, replacing built-in operators with
3189 function calls to user-defined operators, where appropriate, and,
3190 when DEPROCEDURE_P is non-zero, converting function-valued variables
3191 into parameterless calls. May expand *EXPP. The CONTEXT_TYPE functions
3192 are as in ada_resolve, above. */
14f9c5c9 3193
d2e4a39e 3194static struct value *
e9d9f57e 3195resolve_subexp (expression_up *expp, int *pos, int deprocedure_p,
699bd4cf
TT
3196 struct type *context_type, int parse_completion,
3197 innermost_block_tracker *tracker)
14f9c5c9
AS
3198{
3199 int pc = *pos;
3200 int i;
4c4b4cd2 3201 struct expression *exp; /* Convenience: == *expp. */
14f9c5c9 3202 enum exp_opcode op = (*expp)->elts[pc].opcode;
4c4b4cd2
PH
3203 struct value **argvec; /* Vector of operand types (alloca'ed). */
3204 int nargs; /* Number of operands. */
52ce6436 3205 int oplen;
14f9c5c9
AS
3206
3207 argvec = NULL;
3208 nargs = 0;
e9d9f57e 3209 exp = expp->get ();
14f9c5c9 3210
52ce6436
PH
3211 /* Pass one: resolve operands, saving their types and updating *pos,
3212 if needed. */
14f9c5c9
AS
3213 switch (op)
3214 {
4c4b4cd2
PH
3215 case OP_FUNCALL:
3216 if (exp->elts[pc + 3].opcode == OP_VAR_VALUE
76a01679
JB
3217 && SYMBOL_DOMAIN (exp->elts[pc + 5].symbol) == UNDEF_DOMAIN)
3218 *pos += 7;
4c4b4cd2
PH
3219 else
3220 {
3221 *pos += 3;
699bd4cf 3222 resolve_subexp (expp, pos, 0, NULL, parse_completion, tracker);
4c4b4cd2
PH
3223 }
3224 nargs = longest_to_int (exp->elts[pc + 1].longconst);
14f9c5c9
AS
3225 break;
3226
14f9c5c9 3227 case UNOP_ADDR:
4c4b4cd2 3228 *pos += 1;
699bd4cf 3229 resolve_subexp (expp, pos, 0, NULL, parse_completion, tracker);
4c4b4cd2
PH
3230 break;
3231
52ce6436
PH
3232 case UNOP_QUAL:
3233 *pos += 3;
2a612529 3234 resolve_subexp (expp, pos, 1, check_typedef (exp->elts[pc + 1].type),
699bd4cf 3235 parse_completion, tracker);
4c4b4cd2
PH
3236 break;
3237
52ce6436 3238 case OP_ATR_MODULUS:
4c4b4cd2
PH
3239 case OP_ATR_SIZE:
3240 case OP_ATR_TAG:
4c4b4cd2
PH
3241 case OP_ATR_FIRST:
3242 case OP_ATR_LAST:
3243 case OP_ATR_LENGTH:
3244 case OP_ATR_POS:
3245 case OP_ATR_VAL:
4c4b4cd2
PH
3246 case OP_ATR_MIN:
3247 case OP_ATR_MAX:
52ce6436
PH
3248 case TERNOP_IN_RANGE:
3249 case BINOP_IN_BOUNDS:
3250 case UNOP_IN_RANGE:
3251 case OP_AGGREGATE:
3252 case OP_OTHERS:
3253 case OP_CHOICES:
3254 case OP_POSITIONAL:
3255 case OP_DISCRETE_RANGE:
3256 case OP_NAME:
3257 ada_forward_operator_length (exp, pc, &oplen, &nargs);
3258 *pos += oplen;
14f9c5c9
AS
3259 break;
3260
3261 case BINOP_ASSIGN:
3262 {
4c4b4cd2
PH
3263 struct value *arg1;
3264
3265 *pos += 1;
699bd4cf 3266 arg1 = resolve_subexp (expp, pos, 0, NULL, parse_completion, tracker);
4c4b4cd2 3267 if (arg1 == NULL)
699bd4cf 3268 resolve_subexp (expp, pos, 1, NULL, parse_completion, tracker);
4c4b4cd2 3269 else
699bd4cf
TT
3270 resolve_subexp (expp, pos, 1, value_type (arg1), parse_completion,
3271 tracker);
4c4b4cd2 3272 break;
14f9c5c9
AS
3273 }
3274
4c4b4cd2 3275 case UNOP_CAST:
4c4b4cd2
PH
3276 *pos += 3;
3277 nargs = 1;
3278 break;
14f9c5c9 3279
4c4b4cd2
PH
3280 case BINOP_ADD:
3281 case BINOP_SUB:
3282 case BINOP_MUL:
3283 case BINOP_DIV:
3284 case BINOP_REM:
3285 case BINOP_MOD:
3286 case BINOP_EXP:
3287 case BINOP_CONCAT:
3288 case BINOP_LOGICAL_AND:
3289 case BINOP_LOGICAL_OR:
3290 case BINOP_BITWISE_AND:
3291 case BINOP_BITWISE_IOR:
3292 case BINOP_BITWISE_XOR:
14f9c5c9 3293
4c4b4cd2
PH
3294 case BINOP_EQUAL:
3295 case BINOP_NOTEQUAL:
3296 case BINOP_LESS:
3297 case BINOP_GTR:
3298 case BINOP_LEQ:
3299 case BINOP_GEQ:
14f9c5c9 3300
4c4b4cd2
PH
3301 case BINOP_REPEAT:
3302 case BINOP_SUBSCRIPT:
3303 case BINOP_COMMA:
40c8aaa9
JB
3304 *pos += 1;
3305 nargs = 2;
3306 break;
14f9c5c9 3307
4c4b4cd2
PH
3308 case UNOP_NEG:
3309 case UNOP_PLUS:
3310 case UNOP_LOGICAL_NOT:
3311 case UNOP_ABS:
3312 case UNOP_IND:
3313 *pos += 1;
3314 nargs = 1;
3315 break;
14f9c5c9 3316
4c4b4cd2 3317 case OP_LONG:
edd079d9 3318 case OP_FLOAT:
4c4b4cd2 3319 case OP_VAR_VALUE:
74ea4be4 3320 case OP_VAR_MSYM_VALUE:
4c4b4cd2
PH
3321 *pos += 4;
3322 break;
14f9c5c9 3323
4c4b4cd2
PH
3324 case OP_TYPE:
3325 case OP_BOOL:
3326 case OP_LAST:
4c4b4cd2
PH
3327 case OP_INTERNALVAR:
3328 *pos += 3;
3329 break;
14f9c5c9 3330
4c4b4cd2
PH
3331 case UNOP_MEMVAL:
3332 *pos += 3;
3333 nargs = 1;
3334 break;
3335
67f3407f
DJ
3336 case OP_REGISTER:
3337 *pos += 4 + BYTES_TO_EXP_ELEM (exp->elts[pc + 1].longconst + 1);
3338 break;
3339
4c4b4cd2
PH
3340 case STRUCTOP_STRUCT:
3341 *pos += 4 + BYTES_TO_EXP_ELEM (exp->elts[pc + 1].longconst + 1);
3342 nargs = 1;
3343 break;
3344
4c4b4cd2 3345 case TERNOP_SLICE:
4c4b4cd2
PH
3346 *pos += 1;
3347 nargs = 3;
3348 break;
3349
52ce6436 3350 case OP_STRING:
14f9c5c9 3351 break;
4c4b4cd2
PH
3352
3353 default:
323e0a4a 3354 error (_("Unexpected operator during name resolution"));
14f9c5c9
AS
3355 }
3356
8d749320 3357 argvec = XALLOCAVEC (struct value *, nargs + 1);
4c4b4cd2 3358 for (i = 0; i < nargs; i += 1)
699bd4cf
TT
3359 argvec[i] = resolve_subexp (expp, pos, 1, NULL, parse_completion,
3360 tracker);
4c4b4cd2 3361 argvec[i] = NULL;
e9d9f57e 3362 exp = expp->get ();
4c4b4cd2
PH
3363
3364 /* Pass two: perform any resolution on principal operator. */
14f9c5c9
AS
3365 switch (op)
3366 {
3367 default:
3368 break;
3369
14f9c5c9 3370 case OP_VAR_VALUE:
4c4b4cd2 3371 if (SYMBOL_DOMAIN (exp->elts[pc + 2].symbol) == UNDEF_DOMAIN)
76a01679 3372 {
54d343a2 3373 std::vector<struct block_symbol> candidates;
76a01679
JB
3374 int n_candidates;
3375
3376 n_candidates =
3377 ada_lookup_symbol_list (SYMBOL_LINKAGE_NAME
3378 (exp->elts[pc + 2].symbol),
3379 exp->elts[pc + 1].block, VAR_DOMAIN,
4eeaa230 3380 &candidates);
76a01679
JB
3381
3382 if (n_candidates > 1)
3383 {
3384 /* Types tend to get re-introduced locally, so if there
3385 are any local symbols that are not types, first filter
3386 out all types. */
3387 int j;
3388 for (j = 0; j < n_candidates; j += 1)
d12307c1 3389 switch (SYMBOL_CLASS (candidates[j].symbol))
76a01679
JB
3390 {
3391 case LOC_REGISTER:
3392 case LOC_ARG:
3393 case LOC_REF_ARG:
76a01679
JB
3394 case LOC_REGPARM_ADDR:
3395 case LOC_LOCAL:
76a01679 3396 case LOC_COMPUTED:
76a01679
JB
3397 goto FoundNonType;
3398 default:
3399 break;
3400 }
3401 FoundNonType:
3402 if (j < n_candidates)
3403 {
3404 j = 0;
3405 while (j < n_candidates)
3406 {
d12307c1 3407 if (SYMBOL_CLASS (candidates[j].symbol) == LOC_TYPEDEF)
76a01679
JB
3408 {
3409 candidates[j] = candidates[n_candidates - 1];
3410 n_candidates -= 1;
3411 }
3412 else
3413 j += 1;
3414 }
3415 }
3416 }
3417
3418 if (n_candidates == 0)
323e0a4a 3419 error (_("No definition found for %s"),
76a01679
JB
3420 SYMBOL_PRINT_NAME (exp->elts[pc + 2].symbol));
3421 else if (n_candidates == 1)
3422 i = 0;
3423 else if (deprocedure_p
54d343a2 3424 && !is_nonfunction (candidates.data (), n_candidates))
76a01679 3425 {
06d5cf63 3426 i = ada_resolve_function
54d343a2 3427 (candidates.data (), n_candidates, NULL, 0,
06d5cf63 3428 SYMBOL_LINKAGE_NAME (exp->elts[pc + 2].symbol),
2a612529 3429 context_type, parse_completion);
76a01679 3430 if (i < 0)
323e0a4a 3431 error (_("Could not find a match for %s"),
76a01679
JB
3432 SYMBOL_PRINT_NAME (exp->elts[pc + 2].symbol));
3433 }
3434 else
3435 {
323e0a4a 3436 printf_filtered (_("Multiple matches for %s\n"),
76a01679 3437 SYMBOL_PRINT_NAME (exp->elts[pc + 2].symbol));
54d343a2 3438 user_select_syms (candidates.data (), n_candidates, 1);
76a01679
JB
3439 i = 0;
3440 }
3441
3442 exp->elts[pc + 1].block = candidates[i].block;
d12307c1 3443 exp->elts[pc + 2].symbol = candidates[i].symbol;
699bd4cf 3444 tracker->update (candidates[i]);
76a01679
JB
3445 }
3446
3447 if (deprocedure_p
3448 && (TYPE_CODE (SYMBOL_TYPE (exp->elts[pc + 2].symbol))
3449 == TYPE_CODE_FUNC))
3450 {
424da6cf 3451 replace_operator_with_call (expp, pc, 0, 4,
76a01679
JB
3452 exp->elts[pc + 2].symbol,
3453 exp->elts[pc + 1].block);
e9d9f57e 3454 exp = expp->get ();
76a01679 3455 }
14f9c5c9
AS
3456 break;
3457
3458 case OP_FUNCALL:
3459 {
4c4b4cd2 3460 if (exp->elts[pc + 3].opcode == OP_VAR_VALUE
76a01679 3461 && SYMBOL_DOMAIN (exp->elts[pc + 5].symbol) == UNDEF_DOMAIN)
4c4b4cd2 3462 {
54d343a2 3463 std::vector<struct block_symbol> candidates;
4c4b4cd2
PH
3464 int n_candidates;
3465
3466 n_candidates =
76a01679
JB
3467 ada_lookup_symbol_list (SYMBOL_LINKAGE_NAME
3468 (exp->elts[pc + 5].symbol),
3469 exp->elts[pc + 4].block, VAR_DOMAIN,
4eeaa230 3470 &candidates);
ec6a20c2 3471
4c4b4cd2
PH
3472 if (n_candidates == 1)
3473 i = 0;
3474 else
3475 {
06d5cf63 3476 i = ada_resolve_function
54d343a2 3477 (candidates.data (), n_candidates,
06d5cf63
JB
3478 argvec, nargs,
3479 SYMBOL_LINKAGE_NAME (exp->elts[pc + 5].symbol),
2a612529 3480 context_type, parse_completion);
4c4b4cd2 3481 if (i < 0)
323e0a4a 3482 error (_("Could not find a match for %s"),
4c4b4cd2
PH
3483 SYMBOL_PRINT_NAME (exp->elts[pc + 5].symbol));
3484 }
3485
3486 exp->elts[pc + 4].block = candidates[i].block;
d12307c1 3487 exp->elts[pc + 5].symbol = candidates[i].symbol;
699bd4cf 3488 tracker->update (candidates[i]);
4c4b4cd2 3489 }
14f9c5c9
AS
3490 }
3491 break;
3492 case BINOP_ADD:
3493 case BINOP_SUB:
3494 case BINOP_MUL:
3495 case BINOP_DIV:
3496 case BINOP_REM:
3497 case BINOP_MOD:
3498 case BINOP_CONCAT:
3499 case BINOP_BITWISE_AND:
3500 case BINOP_BITWISE_IOR:
3501 case BINOP_BITWISE_XOR:
3502 case BINOP_EQUAL:
3503 case BINOP_NOTEQUAL:
3504 case BINOP_LESS:
3505 case BINOP_GTR:
3506 case BINOP_LEQ:
3507 case BINOP_GEQ:
3508 case BINOP_EXP:
3509 case UNOP_NEG:
3510 case UNOP_PLUS:
3511 case UNOP_LOGICAL_NOT:
3512 case UNOP_ABS:
3513 if (possible_user_operator_p (op, argvec))
4c4b4cd2 3514 {
54d343a2 3515 std::vector<struct block_symbol> candidates;
4c4b4cd2
PH
3516 int n_candidates;
3517
3518 n_candidates =
b5ec771e 3519 ada_lookup_symbol_list (ada_decoded_op_name (op),
582942f4 3520 NULL, VAR_DOMAIN,
4eeaa230 3521 &candidates);
ec6a20c2 3522
54d343a2 3523 i = ada_resolve_function (candidates.data (), n_candidates, argvec,
2a612529
TT
3524 nargs, ada_decoded_op_name (op), NULL,
3525 parse_completion);
4c4b4cd2
PH
3526 if (i < 0)
3527 break;
3528
d12307c1
PMR
3529 replace_operator_with_call (expp, pc, nargs, 1,
3530 candidates[i].symbol,
3531 candidates[i].block);
e9d9f57e 3532 exp = expp->get ();
4c4b4cd2 3533 }
14f9c5c9 3534 break;
4c4b4cd2
PH
3535
3536 case OP_TYPE:
b3dbf008 3537 case OP_REGISTER:
4c4b4cd2 3538 return NULL;
14f9c5c9
AS
3539 }
3540
3541 *pos = pc;
ced9779b
JB
3542 if (exp->elts[pc].opcode == OP_VAR_MSYM_VALUE)
3543 return evaluate_var_msym_value (EVAL_AVOID_SIDE_EFFECTS,
3544 exp->elts[pc + 1].objfile,
3545 exp->elts[pc + 2].msymbol);
3546 else
3547 return evaluate_subexp_type (exp, pos);
14f9c5c9
AS
3548}
3549
3550/* Return non-zero if formal type FTYPE matches actual type ATYPE. If
4c4b4cd2 3551 MAY_DEREF is non-zero, the formal may be a pointer and the actual
5b3d5b7d 3552 a non-pointer. */
14f9c5c9 3553/* The term "match" here is rather loose. The match is heuristic and
5b3d5b7d 3554 liberal. */
14f9c5c9
AS
3555
3556static int
4dc81987 3557ada_type_match (struct type *ftype, struct type *atype, int may_deref)
14f9c5c9 3558{
61ee279c
PH
3559 ftype = ada_check_typedef (ftype);
3560 atype = ada_check_typedef (atype);
14f9c5c9
AS
3561
3562 if (TYPE_CODE (ftype) == TYPE_CODE_REF)
3563 ftype = TYPE_TARGET_TYPE (ftype);
3564 if (TYPE_CODE (atype) == TYPE_CODE_REF)
3565 atype = TYPE_TARGET_TYPE (atype);
3566
d2e4a39e 3567 switch (TYPE_CODE (ftype))
14f9c5c9
AS
3568 {
3569 default:
5b3d5b7d 3570 return TYPE_CODE (ftype) == TYPE_CODE (atype);
14f9c5c9
AS
3571 case TYPE_CODE_PTR:
3572 if (TYPE_CODE (atype) == TYPE_CODE_PTR)
4c4b4cd2
PH
3573 return ada_type_match (TYPE_TARGET_TYPE (ftype),
3574 TYPE_TARGET_TYPE (atype), 0);
d2e4a39e 3575 else
1265e4aa
JB
3576 return (may_deref
3577 && ada_type_match (TYPE_TARGET_TYPE (ftype), atype, 0));
14f9c5c9
AS
3578 case TYPE_CODE_INT:
3579 case TYPE_CODE_ENUM:
3580 case TYPE_CODE_RANGE:
3581 switch (TYPE_CODE (atype))
4c4b4cd2
PH
3582 {
3583 case TYPE_CODE_INT:
3584 case TYPE_CODE_ENUM:
3585 case TYPE_CODE_RANGE:
3586 return 1;
3587 default:
3588 return 0;
3589 }
14f9c5c9
AS
3590
3591 case TYPE_CODE_ARRAY:
d2e4a39e 3592 return (TYPE_CODE (atype) == TYPE_CODE_ARRAY
4c4b4cd2 3593 || ada_is_array_descriptor_type (atype));
14f9c5c9
AS
3594
3595 case TYPE_CODE_STRUCT:
4c4b4cd2
PH
3596 if (ada_is_array_descriptor_type (ftype))
3597 return (TYPE_CODE (atype) == TYPE_CODE_ARRAY
3598 || ada_is_array_descriptor_type (atype));
14f9c5c9 3599 else
4c4b4cd2
PH
3600 return (TYPE_CODE (atype) == TYPE_CODE_STRUCT
3601 && !ada_is_array_descriptor_type (atype));
14f9c5c9
AS
3602
3603 case TYPE_CODE_UNION:
3604 case TYPE_CODE_FLT:
3605 return (TYPE_CODE (atype) == TYPE_CODE (ftype));
3606 }
3607}
3608
3609/* Return non-zero if the formals of FUNC "sufficiently match" the
3610 vector of actual argument types ACTUALS of size N_ACTUALS. FUNC
3611 may also be an enumeral, in which case it is treated as a 0-
4c4b4cd2 3612 argument function. */
14f9c5c9
AS
3613
3614static int
d2e4a39e 3615ada_args_match (struct symbol *func, struct value **actuals, int n_actuals)
14f9c5c9
AS
3616{
3617 int i;
d2e4a39e 3618 struct type *func_type = SYMBOL_TYPE (func);
14f9c5c9 3619
1265e4aa
JB
3620 if (SYMBOL_CLASS (func) == LOC_CONST
3621 && TYPE_CODE (func_type) == TYPE_CODE_ENUM)
14f9c5c9
AS
3622 return (n_actuals == 0);
3623 else if (func_type == NULL || TYPE_CODE (func_type) != TYPE_CODE_FUNC)
3624 return 0;
3625
3626 if (TYPE_NFIELDS (func_type) != n_actuals)
3627 return 0;
3628
3629 for (i = 0; i < n_actuals; i += 1)
3630 {
4c4b4cd2 3631 if (actuals[i] == NULL)
76a01679
JB
3632 return 0;
3633 else
3634 {
5b4ee69b
MS
3635 struct type *ftype = ada_check_typedef (TYPE_FIELD_TYPE (func_type,
3636 i));
df407dfe 3637 struct type *atype = ada_check_typedef (value_type (actuals[i]));
4c4b4cd2 3638
76a01679
JB
3639 if (!ada_type_match (ftype, atype, 1))
3640 return 0;
3641 }
14f9c5c9
AS
3642 }
3643 return 1;
3644}
3645
3646/* False iff function type FUNC_TYPE definitely does not produce a value
3647 compatible with type CONTEXT_TYPE. Conservatively returns 1 if
3648 FUNC_TYPE is not a valid function type with a non-null return type
3649 or an enumerated type. A null CONTEXT_TYPE indicates any non-void type. */
3650
3651static int
d2e4a39e 3652return_match (struct type *func_type, struct type *context_type)
14f9c5c9 3653{
d2e4a39e 3654 struct type *return_type;
14f9c5c9
AS
3655
3656 if (func_type == NULL)
3657 return 1;
3658
4c4b4cd2 3659 if (TYPE_CODE (func_type) == TYPE_CODE_FUNC)
18af8284 3660 return_type = get_base_type (TYPE_TARGET_TYPE (func_type));
4c4b4cd2 3661 else
18af8284 3662 return_type = get_base_type (func_type);
14f9c5c9
AS
3663 if (return_type == NULL)
3664 return 1;
3665
18af8284 3666 context_type = get_base_type (context_type);
14f9c5c9
AS
3667
3668 if (TYPE_CODE (return_type) == TYPE_CODE_ENUM)
3669 return context_type == NULL || return_type == context_type;
3670 else if (context_type == NULL)
3671 return TYPE_CODE (return_type) != TYPE_CODE_VOID;
3672 else
3673 return TYPE_CODE (return_type) == TYPE_CODE (context_type);
3674}
3675
3676
4c4b4cd2 3677/* Returns the index in SYMS[0..NSYMS-1] that contains the symbol for the
14f9c5c9 3678 function (if any) that matches the types of the NARGS arguments in
4c4b4cd2
PH
3679 ARGS. If CONTEXT_TYPE is non-null and there is at least one match
3680 that returns that type, then eliminate matches that don't. If
3681 CONTEXT_TYPE is void and there is at least one match that does not
3682 return void, eliminate all matches that do.
3683
14f9c5c9
AS
3684 Asks the user if there is more than one match remaining. Returns -1
3685 if there is no such symbol or none is selected. NAME is used
4c4b4cd2
PH
3686 solely for messages. May re-arrange and modify SYMS in
3687 the process; the index returned is for the modified vector. */
14f9c5c9 3688
4c4b4cd2 3689static int
d12307c1 3690ada_resolve_function (struct block_symbol syms[],
4c4b4cd2 3691 int nsyms, struct value **args, int nargs,
2a612529
TT
3692 const char *name, struct type *context_type,
3693 int parse_completion)
14f9c5c9 3694{
30b15541 3695 int fallback;
14f9c5c9 3696 int k;
4c4b4cd2 3697 int m; /* Number of hits */
14f9c5c9 3698
d2e4a39e 3699 m = 0;
30b15541
UW
3700 /* In the first pass of the loop, we only accept functions matching
3701 context_type. If none are found, we add a second pass of the loop
3702 where every function is accepted. */
3703 for (fallback = 0; m == 0 && fallback < 2; fallback++)
14f9c5c9
AS
3704 {
3705 for (k = 0; k < nsyms; k += 1)
4c4b4cd2 3706 {
d12307c1 3707 struct type *type = ada_check_typedef (SYMBOL_TYPE (syms[k].symbol));
4c4b4cd2 3708
d12307c1 3709 if (ada_args_match (syms[k].symbol, args, nargs)
30b15541 3710 && (fallback || return_match (type, context_type)))
4c4b4cd2
PH
3711 {
3712 syms[m] = syms[k];
3713 m += 1;
3714 }
3715 }
14f9c5c9
AS
3716 }
3717
dc5c8746
PMR
3718 /* If we got multiple matches, ask the user which one to use. Don't do this
3719 interactive thing during completion, though, as the purpose of the
3720 completion is providing a list of all possible matches. Prompting the
3721 user to filter it down would be completely unexpected in this case. */
14f9c5c9
AS
3722 if (m == 0)
3723 return -1;
dc5c8746 3724 else if (m > 1 && !parse_completion)
14f9c5c9 3725 {
323e0a4a 3726 printf_filtered (_("Multiple matches for %s\n"), name);
4c4b4cd2 3727 user_select_syms (syms, m, 1);
14f9c5c9
AS
3728 return 0;
3729 }
3730 return 0;
3731}
3732
4c4b4cd2
PH
3733/* Returns true (non-zero) iff decoded name N0 should appear before N1
3734 in a listing of choices during disambiguation (see sort_choices, below).
3735 The idea is that overloadings of a subprogram name from the
3736 same package should sort in their source order. We settle for ordering
3737 such symbols by their trailing number (__N or $N). */
3738
14f9c5c9 3739static int
0d5cff50 3740encoded_ordered_before (const char *N0, const char *N1)
14f9c5c9
AS
3741{
3742 if (N1 == NULL)
3743 return 0;
3744 else if (N0 == NULL)
3745 return 1;
3746 else
3747 {
3748 int k0, k1;
5b4ee69b 3749
d2e4a39e 3750 for (k0 = strlen (N0) - 1; k0 > 0 && isdigit (N0[k0]); k0 -= 1)
4c4b4cd2 3751 ;
d2e4a39e 3752 for (k1 = strlen (N1) - 1; k1 > 0 && isdigit (N1[k1]); k1 -= 1)
4c4b4cd2 3753 ;
d2e4a39e 3754 if ((N0[k0] == '_' || N0[k0] == '$') && N0[k0 + 1] != '\000'
4c4b4cd2
PH
3755 && (N1[k1] == '_' || N1[k1] == '$') && N1[k1 + 1] != '\000')
3756 {
3757 int n0, n1;
5b4ee69b 3758
4c4b4cd2
PH
3759 n0 = k0;
3760 while (N0[n0] == '_' && n0 > 0 && N0[n0 - 1] == '_')
3761 n0 -= 1;
3762 n1 = k1;
3763 while (N1[n1] == '_' && n1 > 0 && N1[n1 - 1] == '_')
3764 n1 -= 1;
3765 if (n0 == n1 && strncmp (N0, N1, n0) == 0)
3766 return (atoi (N0 + k0 + 1) < atoi (N1 + k1 + 1));
3767 }
14f9c5c9
AS
3768 return (strcmp (N0, N1) < 0);
3769 }
3770}
d2e4a39e 3771
4c4b4cd2
PH
3772/* Sort SYMS[0..NSYMS-1] to put the choices in a canonical order by the
3773 encoded names. */
3774
d2e4a39e 3775static void
d12307c1 3776sort_choices (struct block_symbol syms[], int nsyms)
14f9c5c9 3777{
4c4b4cd2 3778 int i;
5b4ee69b 3779
d2e4a39e 3780 for (i = 1; i < nsyms; i += 1)
14f9c5c9 3781 {
d12307c1 3782 struct block_symbol sym = syms[i];
14f9c5c9
AS
3783 int j;
3784
d2e4a39e 3785 for (j = i - 1; j >= 0; j -= 1)
4c4b4cd2 3786 {
d12307c1
PMR
3787 if (encoded_ordered_before (SYMBOL_LINKAGE_NAME (syms[j].symbol),
3788 SYMBOL_LINKAGE_NAME (sym.symbol)))
4c4b4cd2
PH
3789 break;
3790 syms[j + 1] = syms[j];
3791 }
d2e4a39e 3792 syms[j + 1] = sym;
14f9c5c9
AS
3793 }
3794}
3795
d72413e6
PMR
3796/* Whether GDB should display formals and return types for functions in the
3797 overloads selection menu. */
3798static int print_signatures = 1;
3799
3800/* Print the signature for SYM on STREAM according to the FLAGS options. For
3801 all but functions, the signature is just the name of the symbol. For
3802 functions, this is the name of the function, the list of types for formals
3803 and the return type (if any). */
3804
3805static void
3806ada_print_symbol_signature (struct ui_file *stream, struct symbol *sym,
3807 const struct type_print_options *flags)
3808{
3809 struct type *type = SYMBOL_TYPE (sym);
3810
3811 fprintf_filtered (stream, "%s", SYMBOL_PRINT_NAME (sym));
3812 if (!print_signatures
3813 || type == NULL
3814 || TYPE_CODE (type) != TYPE_CODE_FUNC)
3815 return;
3816
3817 if (TYPE_NFIELDS (type) > 0)
3818 {
3819 int i;
3820
3821 fprintf_filtered (stream, " (");
3822 for (i = 0; i < TYPE_NFIELDS (type); ++i)
3823 {
3824 if (i > 0)
3825 fprintf_filtered (stream, "; ");
3826 ada_print_type (TYPE_FIELD_TYPE (type, i), NULL, stream, -1, 0,
3827 flags);
3828 }
3829 fprintf_filtered (stream, ")");
3830 }
3831 if (TYPE_TARGET_TYPE (type) != NULL
3832 && TYPE_CODE (TYPE_TARGET_TYPE (type)) != TYPE_CODE_VOID)
3833 {
3834 fprintf_filtered (stream, " return ");
3835 ada_print_type (TYPE_TARGET_TYPE (type), NULL, stream, -1, 0, flags);
3836 }
3837}
3838
4c4b4cd2
PH
3839/* Given a list of NSYMS symbols in SYMS, select up to MAX_RESULTS>0
3840 by asking the user (if necessary), returning the number selected,
3841 and setting the first elements of SYMS items. Error if no symbols
3842 selected. */
14f9c5c9
AS
3843
3844/* NOTE: Adapted from decode_line_2 in symtab.c, with which it ought
4c4b4cd2 3845 to be re-integrated one of these days. */
14f9c5c9
AS
3846
3847int
d12307c1 3848user_select_syms (struct block_symbol *syms, int nsyms, int max_results)
14f9c5c9
AS
3849{
3850 int i;
8d749320 3851 int *chosen = XALLOCAVEC (int , nsyms);
14f9c5c9
AS
3852 int n_chosen;
3853 int first_choice = (max_results == 1) ? 1 : 2;
717d2f5a 3854 const char *select_mode = multiple_symbols_select_mode ();
14f9c5c9
AS
3855
3856 if (max_results < 1)
323e0a4a 3857 error (_("Request to select 0 symbols!"));
14f9c5c9
AS
3858 if (nsyms <= 1)
3859 return nsyms;
3860
717d2f5a
JB
3861 if (select_mode == multiple_symbols_cancel)
3862 error (_("\
3863canceled because the command is ambiguous\n\
3864See set/show multiple-symbol."));
a0087920 3865
717d2f5a
JB
3866 /* If select_mode is "all", then return all possible symbols.
3867 Only do that if more than one symbol can be selected, of course.
3868 Otherwise, display the menu as usual. */
3869 if (select_mode == multiple_symbols_all && max_results > 1)
3870 return nsyms;
3871
a0087920 3872 printf_filtered (_("[0] cancel\n"));
14f9c5c9 3873 if (max_results > 1)
a0087920 3874 printf_filtered (_("[1] all\n"));
14f9c5c9 3875
4c4b4cd2 3876 sort_choices (syms, nsyms);
14f9c5c9
AS
3877
3878 for (i = 0; i < nsyms; i += 1)
3879 {
d12307c1 3880 if (syms[i].symbol == NULL)
4c4b4cd2
PH
3881 continue;
3882
d12307c1 3883 if (SYMBOL_CLASS (syms[i].symbol) == LOC_BLOCK)
4c4b4cd2 3884 {
76a01679 3885 struct symtab_and_line sal =
d12307c1 3886 find_function_start_sal (syms[i].symbol, 1);
5b4ee69b 3887
a0087920 3888 printf_filtered ("[%d] ", i + first_choice);
d72413e6
PMR
3889 ada_print_symbol_signature (gdb_stdout, syms[i].symbol,
3890 &type_print_raw_options);
323e0a4a 3891 if (sal.symtab == NULL)
a0087920
TT
3892 printf_filtered (_(" at <no source file available>:%d\n"),
3893 sal.line);
323e0a4a 3894 else
a0087920
TT
3895 printf_filtered (_(" at %s:%d\n"),
3896 symtab_to_filename_for_display (sal.symtab),
3897 sal.line);
4c4b4cd2
PH
3898 continue;
3899 }
d2e4a39e 3900 else
4c4b4cd2
PH
3901 {
3902 int is_enumeral =
d12307c1
PMR
3903 (SYMBOL_CLASS (syms[i].symbol) == LOC_CONST
3904 && SYMBOL_TYPE (syms[i].symbol) != NULL
3905 && TYPE_CODE (SYMBOL_TYPE (syms[i].symbol)) == TYPE_CODE_ENUM);
1994afbf
DE
3906 struct symtab *symtab = NULL;
3907
d12307c1
PMR
3908 if (SYMBOL_OBJFILE_OWNED (syms[i].symbol))
3909 symtab = symbol_symtab (syms[i].symbol);
4c4b4cd2 3910
d12307c1 3911 if (SYMBOL_LINE (syms[i].symbol) != 0 && symtab != NULL)
d72413e6 3912 {
a0087920 3913 printf_filtered ("[%d] ", i + first_choice);
d72413e6
PMR
3914 ada_print_symbol_signature (gdb_stdout, syms[i].symbol,
3915 &type_print_raw_options);
a0087920
TT
3916 printf_filtered (_(" at %s:%d\n"),
3917 symtab_to_filename_for_display (symtab),
3918 SYMBOL_LINE (syms[i].symbol));
d72413e6 3919 }
76a01679 3920 else if (is_enumeral
d12307c1 3921 && TYPE_NAME (SYMBOL_TYPE (syms[i].symbol)) != NULL)
4c4b4cd2 3922 {
a0087920 3923 printf_filtered (("[%d] "), i + first_choice);
d12307c1 3924 ada_print_type (SYMBOL_TYPE (syms[i].symbol), NULL,
79d43c61 3925 gdb_stdout, -1, 0, &type_print_raw_options);
a0087920
TT
3926 printf_filtered (_("'(%s) (enumeral)\n"),
3927 SYMBOL_PRINT_NAME (syms[i].symbol));
4c4b4cd2 3928 }
d72413e6
PMR
3929 else
3930 {
a0087920 3931 printf_filtered ("[%d] ", i + first_choice);
d72413e6
PMR
3932 ada_print_symbol_signature (gdb_stdout, syms[i].symbol,
3933 &type_print_raw_options);
3934
3935 if (symtab != NULL)
a0087920
TT
3936 printf_filtered (is_enumeral
3937 ? _(" in %s (enumeral)\n")
3938 : _(" at %s:?\n"),
3939 symtab_to_filename_for_display (symtab));
d72413e6 3940 else
a0087920
TT
3941 printf_filtered (is_enumeral
3942 ? _(" (enumeral)\n")
3943 : _(" at ?\n"));
d72413e6 3944 }
4c4b4cd2 3945 }
14f9c5c9 3946 }
d2e4a39e 3947
14f9c5c9 3948 n_chosen = get_selections (chosen, nsyms, max_results, max_results > 1,
4c4b4cd2 3949 "overload-choice");
14f9c5c9
AS
3950
3951 for (i = 0; i < n_chosen; i += 1)
4c4b4cd2 3952 syms[i] = syms[chosen[i]];
14f9c5c9
AS
3953
3954 return n_chosen;
3955}
3956
3957/* Read and validate a set of numeric choices from the user in the
4c4b4cd2 3958 range 0 .. N_CHOICES-1. Place the results in increasing
14f9c5c9
AS
3959 order in CHOICES[0 .. N-1], and return N.
3960
3961 The user types choices as a sequence of numbers on one line
3962 separated by blanks, encoding them as follows:
3963
4c4b4cd2 3964 + A choice of 0 means to cancel the selection, throwing an error.
14f9c5c9
AS
3965 + If IS_ALL_CHOICE, a choice of 1 selects the entire set 0 .. N_CHOICES-1.
3966 + The user chooses k by typing k+IS_ALL_CHOICE+1.
3967
4c4b4cd2 3968 The user is not allowed to choose more than MAX_RESULTS values.
14f9c5c9
AS
3969
3970 ANNOTATION_SUFFIX, if present, is used to annotate the input
4c4b4cd2 3971 prompts (for use with the -f switch). */
14f9c5c9
AS
3972
3973int
d2e4a39e 3974get_selections (int *choices, int n_choices, int max_results,
a121b7c1 3975 int is_all_choice, const char *annotation_suffix)
14f9c5c9 3976{
d2e4a39e 3977 char *args;
a121b7c1 3978 const char *prompt;
14f9c5c9
AS
3979 int n_chosen;
3980 int first_choice = is_all_choice ? 2 : 1;
d2e4a39e 3981
14f9c5c9
AS
3982 prompt = getenv ("PS2");
3983 if (prompt == NULL)
0bcd0149 3984 prompt = "> ";
14f9c5c9 3985
89fbedf3 3986 args = command_line_input (prompt, annotation_suffix);
d2e4a39e 3987
14f9c5c9 3988 if (args == NULL)
323e0a4a 3989 error_no_arg (_("one or more choice numbers"));
14f9c5c9
AS
3990
3991 n_chosen = 0;
76a01679 3992
4c4b4cd2
PH
3993 /* Set choices[0 .. n_chosen-1] to the users' choices in ascending
3994 order, as given in args. Choices are validated. */
14f9c5c9
AS
3995 while (1)
3996 {
d2e4a39e 3997 char *args2;
14f9c5c9
AS
3998 int choice, j;
3999
0fcd72ba 4000 args = skip_spaces (args);
14f9c5c9 4001 if (*args == '\0' && n_chosen == 0)
323e0a4a 4002 error_no_arg (_("one or more choice numbers"));
14f9c5c9 4003 else if (*args == '\0')
4c4b4cd2 4004 break;
14f9c5c9
AS
4005
4006 choice = strtol (args, &args2, 10);
d2e4a39e 4007 if (args == args2 || choice < 0
4c4b4cd2 4008 || choice > n_choices + first_choice - 1)
323e0a4a 4009 error (_("Argument must be choice number"));
14f9c5c9
AS
4010 args = args2;
4011
d2e4a39e 4012 if (choice == 0)
323e0a4a 4013 error (_("cancelled"));
14f9c5c9
AS
4014
4015 if (choice < first_choice)
4c4b4cd2
PH
4016 {
4017 n_chosen = n_choices;
4018 for (j = 0; j < n_choices; j += 1)
4019 choices[j] = j;
4020 break;
4021 }
14f9c5c9
AS
4022 choice -= first_choice;
4023
d2e4a39e 4024 for (j = n_chosen - 1; j >= 0 && choice < choices[j]; j -= 1)
4c4b4cd2
PH
4025 {
4026 }
14f9c5c9
AS
4027
4028 if (j < 0 || choice != choices[j])
4c4b4cd2
PH
4029 {
4030 int k;
5b4ee69b 4031
4c4b4cd2
PH
4032 for (k = n_chosen - 1; k > j; k -= 1)
4033 choices[k + 1] = choices[k];
4034 choices[j + 1] = choice;
4035 n_chosen += 1;
4036 }
14f9c5c9
AS
4037 }
4038
4039 if (n_chosen > max_results)
323e0a4a 4040 error (_("Select no more than %d of the above"), max_results);
d2e4a39e 4041
14f9c5c9
AS
4042 return n_chosen;
4043}
4044
4c4b4cd2
PH
4045/* Replace the operator of length OPLEN at position PC in *EXPP with a call
4046 on the function identified by SYM and BLOCK, and taking NARGS
4047 arguments. Update *EXPP as needed to hold more space. */
14f9c5c9
AS
4048
4049static void
e9d9f57e 4050replace_operator_with_call (expression_up *expp, int pc, int nargs,
4c4b4cd2 4051 int oplen, struct symbol *sym,
270140bd 4052 const struct block *block)
14f9c5c9
AS
4053{
4054 /* A new expression, with 6 more elements (3 for funcall, 4 for function
4c4b4cd2 4055 symbol, -oplen for operator being replaced). */
d2e4a39e 4056 struct expression *newexp = (struct expression *)
8c1a34e7 4057 xzalloc (sizeof (struct expression)
4c4b4cd2 4058 + EXP_ELEM_TO_BYTES ((*expp)->nelts + 7 - oplen));
e9d9f57e 4059 struct expression *exp = expp->get ();
14f9c5c9
AS
4060
4061 newexp->nelts = exp->nelts + 7 - oplen;
4062 newexp->language_defn = exp->language_defn;
3489610d 4063 newexp->gdbarch = exp->gdbarch;
14f9c5c9 4064 memcpy (newexp->elts, exp->elts, EXP_ELEM_TO_BYTES (pc));
d2e4a39e 4065 memcpy (newexp->elts + pc + 7, exp->elts + pc + oplen,
4c4b4cd2 4066 EXP_ELEM_TO_BYTES (exp->nelts - pc - oplen));
14f9c5c9
AS
4067
4068 newexp->elts[pc].opcode = newexp->elts[pc + 2].opcode = OP_FUNCALL;
4069 newexp->elts[pc + 1].longconst = (LONGEST) nargs;
4070
4071 newexp->elts[pc + 3].opcode = newexp->elts[pc + 6].opcode = OP_VAR_VALUE;
4072 newexp->elts[pc + 4].block = block;
4073 newexp->elts[pc + 5].symbol = sym;
4074
e9d9f57e 4075 expp->reset (newexp);
d2e4a39e 4076}
14f9c5c9
AS
4077
4078/* Type-class predicates */
4079
4c4b4cd2
PH
4080/* True iff TYPE is numeric (i.e., an INT, RANGE (of numeric type),
4081 or FLOAT). */
14f9c5c9
AS
4082
4083static int
d2e4a39e 4084numeric_type_p (struct type *type)
14f9c5c9
AS
4085{
4086 if (type == NULL)
4087 return 0;
d2e4a39e
AS
4088 else
4089 {
4090 switch (TYPE_CODE (type))
4c4b4cd2
PH
4091 {
4092 case TYPE_CODE_INT:
4093 case TYPE_CODE_FLT:
4094 return 1;
4095 case TYPE_CODE_RANGE:
4096 return (type == TYPE_TARGET_TYPE (type)
4097 || numeric_type_p (TYPE_TARGET_TYPE (type)));
4098 default:
4099 return 0;
4100 }
d2e4a39e 4101 }
14f9c5c9
AS
4102}
4103
4c4b4cd2 4104/* True iff TYPE is integral (an INT or RANGE of INTs). */
14f9c5c9
AS
4105
4106static int
d2e4a39e 4107integer_type_p (struct type *type)
14f9c5c9
AS
4108{
4109 if (type == NULL)
4110 return 0;
d2e4a39e
AS
4111 else
4112 {
4113 switch (TYPE_CODE (type))
4c4b4cd2
PH
4114 {
4115 case TYPE_CODE_INT:
4116 return 1;
4117 case TYPE_CODE_RANGE:
4118 return (type == TYPE_TARGET_TYPE (type)
4119 || integer_type_p (TYPE_TARGET_TYPE (type)));
4120 default:
4121 return 0;
4122 }
d2e4a39e 4123 }
14f9c5c9
AS
4124}
4125
4c4b4cd2 4126/* True iff TYPE is scalar (INT, RANGE, FLOAT, ENUM). */
14f9c5c9
AS
4127
4128static int
d2e4a39e 4129scalar_type_p (struct type *type)
14f9c5c9
AS
4130{
4131 if (type == NULL)
4132 return 0;
d2e4a39e
AS
4133 else
4134 {
4135 switch (TYPE_CODE (type))
4c4b4cd2
PH
4136 {
4137 case TYPE_CODE_INT:
4138 case TYPE_CODE_RANGE:
4139 case TYPE_CODE_ENUM:
4140 case TYPE_CODE_FLT:
4141 return 1;
4142 default:
4143 return 0;
4144 }
d2e4a39e 4145 }
14f9c5c9
AS
4146}
4147
4c4b4cd2 4148/* True iff TYPE is discrete (INT, RANGE, ENUM). */
14f9c5c9
AS
4149
4150static int
d2e4a39e 4151discrete_type_p (struct type *type)
14f9c5c9
AS
4152{
4153 if (type == NULL)
4154 return 0;
d2e4a39e
AS
4155 else
4156 {
4157 switch (TYPE_CODE (type))
4c4b4cd2
PH
4158 {
4159 case TYPE_CODE_INT:
4160 case TYPE_CODE_RANGE:
4161 case TYPE_CODE_ENUM:
872f0337 4162 case TYPE_CODE_BOOL:
4c4b4cd2
PH
4163 return 1;
4164 default:
4165 return 0;
4166 }
d2e4a39e 4167 }
14f9c5c9
AS
4168}
4169
4c4b4cd2
PH
4170/* Returns non-zero if OP with operands in the vector ARGS could be
4171 a user-defined function. Errs on the side of pre-defined operators
4172 (i.e., result 0). */
14f9c5c9
AS
4173
4174static int
d2e4a39e 4175possible_user_operator_p (enum exp_opcode op, struct value *args[])
14f9c5c9 4176{
76a01679 4177 struct type *type0 =
df407dfe 4178 (args[0] == NULL) ? NULL : ada_check_typedef (value_type (args[0]));
d2e4a39e 4179 struct type *type1 =
df407dfe 4180 (args[1] == NULL) ? NULL : ada_check_typedef (value_type (args[1]));
d2e4a39e 4181
4c4b4cd2
PH
4182 if (type0 == NULL)
4183 return 0;
4184
14f9c5c9
AS
4185 switch (op)
4186 {
4187 default:
4188 return 0;
4189
4190 case BINOP_ADD:
4191 case BINOP_SUB:
4192 case BINOP_MUL:
4193 case BINOP_DIV:
d2e4a39e 4194 return (!(numeric_type_p (type0) && numeric_type_p (type1)));
14f9c5c9
AS
4195
4196 case BINOP_REM:
4197 case BINOP_MOD:
4198 case BINOP_BITWISE_AND:
4199 case BINOP_BITWISE_IOR:
4200 case BINOP_BITWISE_XOR:
d2e4a39e 4201 return (!(integer_type_p (type0) && integer_type_p (type1)));
14f9c5c9
AS
4202
4203 case BINOP_EQUAL:
4204 case BINOP_NOTEQUAL:
4205 case BINOP_LESS:
4206 case BINOP_GTR:
4207 case BINOP_LEQ:
4208 case BINOP_GEQ:
d2e4a39e 4209 return (!(scalar_type_p (type0) && scalar_type_p (type1)));
14f9c5c9
AS
4210
4211 case BINOP_CONCAT:
ee90b9ab 4212 return !ada_is_array_type (type0) || !ada_is_array_type (type1);
14f9c5c9
AS
4213
4214 case BINOP_EXP:
d2e4a39e 4215 return (!(numeric_type_p (type0) && integer_type_p (type1)));
14f9c5c9
AS
4216
4217 case UNOP_NEG:
4218 case UNOP_PLUS:
4219 case UNOP_LOGICAL_NOT:
d2e4a39e
AS
4220 case UNOP_ABS:
4221 return (!numeric_type_p (type0));
14f9c5c9
AS
4222
4223 }
4224}
4225\f
4c4b4cd2 4226 /* Renaming */
14f9c5c9 4227
aeb5907d
JB
4228/* NOTES:
4229
4230 1. In the following, we assume that a renaming type's name may
4231 have an ___XD suffix. It would be nice if this went away at some
4232 point.
4233 2. We handle both the (old) purely type-based representation of
4234 renamings and the (new) variable-based encoding. At some point,
4235 it is devoutly to be hoped that the former goes away
4236 (FIXME: hilfinger-2007-07-09).
4237 3. Subprogram renamings are not implemented, although the XRS
4238 suffix is recognized (FIXME: hilfinger-2007-07-09). */
4239
4240/* If SYM encodes a renaming,
4241
4242 <renaming> renames <renamed entity>,
4243
4244 sets *LEN to the length of the renamed entity's name,
4245 *RENAMED_ENTITY to that name (not null-terminated), and *RENAMING_EXPR to
4246 the string describing the subcomponent selected from the renamed
0963b4bd 4247 entity. Returns ADA_NOT_RENAMING if SYM does not encode a renaming
aeb5907d
JB
4248 (in which case, the values of *RENAMED_ENTITY, *LEN, and *RENAMING_EXPR
4249 are undefined). Otherwise, returns a value indicating the category
4250 of entity renamed: an object (ADA_OBJECT_RENAMING), exception
4251 (ADA_EXCEPTION_RENAMING), package (ADA_PACKAGE_RENAMING), or
4252 subprogram (ADA_SUBPROGRAM_RENAMING). Does no allocation; the
4253 strings returned in *RENAMED_ENTITY and *RENAMING_EXPR should not be
4254 deallocated. The values of RENAMED_ENTITY, LEN, or RENAMING_EXPR
4255 may be NULL, in which case they are not assigned.
4256
4257 [Currently, however, GCC does not generate subprogram renamings.] */
4258
4259enum ada_renaming_category
4260ada_parse_renaming (struct symbol *sym,
4261 const char **renamed_entity, int *len,
4262 const char **renaming_expr)
4263{
4264 enum ada_renaming_category kind;
4265 const char *info;
4266 const char *suffix;
4267
4268 if (sym == NULL)
4269 return ADA_NOT_RENAMING;
4270 switch (SYMBOL_CLASS (sym))
14f9c5c9 4271 {
aeb5907d
JB
4272 default:
4273 return ADA_NOT_RENAMING;
aeb5907d
JB
4274 case LOC_LOCAL:
4275 case LOC_STATIC:
4276 case LOC_COMPUTED:
4277 case LOC_OPTIMIZED_OUT:
4278 info = strstr (SYMBOL_LINKAGE_NAME (sym), "___XR");
4279 if (info == NULL)
4280 return ADA_NOT_RENAMING;
4281 switch (info[5])
4282 {
4283 case '_':
4284 kind = ADA_OBJECT_RENAMING;
4285 info += 6;
4286 break;
4287 case 'E':
4288 kind = ADA_EXCEPTION_RENAMING;
4289 info += 7;
4290 break;
4291 case 'P':
4292 kind = ADA_PACKAGE_RENAMING;
4293 info += 7;
4294 break;
4295 case 'S':
4296 kind = ADA_SUBPROGRAM_RENAMING;
4297 info += 7;
4298 break;
4299 default:
4300 return ADA_NOT_RENAMING;
4301 }
14f9c5c9 4302 }
4c4b4cd2 4303
aeb5907d
JB
4304 if (renamed_entity != NULL)
4305 *renamed_entity = info;
4306 suffix = strstr (info, "___XE");
4307 if (suffix == NULL || suffix == info)
4308 return ADA_NOT_RENAMING;
4309 if (len != NULL)
4310 *len = strlen (info) - strlen (suffix);
4311 suffix += 5;
4312 if (renaming_expr != NULL)
4313 *renaming_expr = suffix;
4314 return kind;
4315}
4316
a5ee536b
JB
4317/* Compute the value of the given RENAMING_SYM, which is expected to
4318 be a symbol encoding a renaming expression. BLOCK is the block
4319 used to evaluate the renaming. */
52ce6436 4320
a5ee536b
JB
4321static struct value *
4322ada_read_renaming_var_value (struct symbol *renaming_sym,
3977b71f 4323 const struct block *block)
a5ee536b 4324{
bbc13ae3 4325 const char *sym_name;
a5ee536b 4326
bbc13ae3 4327 sym_name = SYMBOL_LINKAGE_NAME (renaming_sym);
4d01a485
PA
4328 expression_up expr = parse_exp_1 (&sym_name, 0, block, 0);
4329 return evaluate_expression (expr.get ());
a5ee536b 4330}
14f9c5c9 4331\f
d2e4a39e 4332
4c4b4cd2 4333 /* Evaluation: Function Calls */
14f9c5c9 4334
4c4b4cd2 4335/* Return an lvalue containing the value VAL. This is the identity on
40bc484c
JB
4336 lvalues, and otherwise has the side-effect of allocating memory
4337 in the inferior where a copy of the value contents is copied. */
14f9c5c9 4338
d2e4a39e 4339static struct value *
40bc484c 4340ensure_lval (struct value *val)
14f9c5c9 4341{
40bc484c
JB
4342 if (VALUE_LVAL (val) == not_lval
4343 || VALUE_LVAL (val) == lval_internalvar)
c3e5cd34 4344 {
df407dfe 4345 int len = TYPE_LENGTH (ada_check_typedef (value_type (val)));
40bc484c
JB
4346 const CORE_ADDR addr =
4347 value_as_long (value_allocate_space_in_inferior (len));
c3e5cd34 4348
a84a8a0d 4349 VALUE_LVAL (val) = lval_memory;
1a088441 4350 set_value_address (val, addr);
40bc484c 4351 write_memory (addr, value_contents (val), len);
c3e5cd34 4352 }
14f9c5c9
AS
4353
4354 return val;
4355}
4356
4357/* Return the value ACTUAL, converted to be an appropriate value for a
4358 formal of type FORMAL_TYPE. Use *SP as a stack pointer for
4359 allocating any necessary descriptors (fat pointers), or copies of
4c4b4cd2 4360 values not residing in memory, updating it as needed. */
14f9c5c9 4361
a93c0eb6 4362struct value *
40bc484c 4363ada_convert_actual (struct value *actual, struct type *formal_type0)
14f9c5c9 4364{
df407dfe 4365 struct type *actual_type = ada_check_typedef (value_type (actual));
61ee279c 4366 struct type *formal_type = ada_check_typedef (formal_type0);
d2e4a39e
AS
4367 struct type *formal_target =
4368 TYPE_CODE (formal_type) == TYPE_CODE_PTR
61ee279c 4369 ? ada_check_typedef (TYPE_TARGET_TYPE (formal_type)) : formal_type;
d2e4a39e
AS
4370 struct type *actual_target =
4371 TYPE_CODE (actual_type) == TYPE_CODE_PTR
61ee279c 4372 ? ada_check_typedef (TYPE_TARGET_TYPE (actual_type)) : actual_type;
14f9c5c9 4373
4c4b4cd2 4374 if (ada_is_array_descriptor_type (formal_target)
14f9c5c9 4375 && TYPE_CODE (actual_target) == TYPE_CODE_ARRAY)
40bc484c 4376 return make_array_descriptor (formal_type, actual);
a84a8a0d
JB
4377 else if (TYPE_CODE (formal_type) == TYPE_CODE_PTR
4378 || TYPE_CODE (formal_type) == TYPE_CODE_REF)
14f9c5c9 4379 {
a84a8a0d 4380 struct value *result;
5b4ee69b 4381
14f9c5c9 4382 if (TYPE_CODE (formal_target) == TYPE_CODE_ARRAY
4c4b4cd2 4383 && ada_is_array_descriptor_type (actual_target))
a84a8a0d 4384 result = desc_data (actual);
cb923fcc 4385 else if (TYPE_CODE (formal_type) != TYPE_CODE_PTR)
4c4b4cd2
PH
4386 {
4387 if (VALUE_LVAL (actual) != lval_memory)
4388 {
4389 struct value *val;
5b4ee69b 4390
df407dfe 4391 actual_type = ada_check_typedef (value_type (actual));
4c4b4cd2 4392 val = allocate_value (actual_type);
990a07ab 4393 memcpy ((char *) value_contents_raw (val),
0fd88904 4394 (char *) value_contents (actual),
4c4b4cd2 4395 TYPE_LENGTH (actual_type));
40bc484c 4396 actual = ensure_lval (val);
4c4b4cd2 4397 }
a84a8a0d 4398 result = value_addr (actual);
4c4b4cd2 4399 }
a84a8a0d
JB
4400 else
4401 return actual;
b1af9e97 4402 return value_cast_pointers (formal_type, result, 0);
14f9c5c9
AS
4403 }
4404 else if (TYPE_CODE (actual_type) == TYPE_CODE_PTR)
4405 return ada_value_ind (actual);
8344af1e
JB
4406 else if (ada_is_aligner_type (formal_type))
4407 {
4408 /* We need to turn this parameter into an aligner type
4409 as well. */
4410 struct value *aligner = allocate_value (formal_type);
4411 struct value *component = ada_value_struct_elt (aligner, "F", 0);
4412
4413 value_assign_to_component (aligner, component, actual);
4414 return aligner;
4415 }
14f9c5c9
AS
4416
4417 return actual;
4418}
4419
438c98a1
JB
4420/* Convert VALUE (which must be an address) to a CORE_ADDR that is a pointer of
4421 type TYPE. This is usually an inefficient no-op except on some targets
4422 (such as AVR) where the representation of a pointer and an address
4423 differs. */
4424
4425static CORE_ADDR
4426value_pointer (struct value *value, struct type *type)
4427{
4428 struct gdbarch *gdbarch = get_type_arch (type);
4429 unsigned len = TYPE_LENGTH (type);
224c3ddb 4430 gdb_byte *buf = (gdb_byte *) alloca (len);
438c98a1
JB
4431 CORE_ADDR addr;
4432
4433 addr = value_address (value);
4434 gdbarch_address_to_pointer (gdbarch, type, buf, addr);
4435 addr = extract_unsigned_integer (buf, len, gdbarch_byte_order (gdbarch));
4436 return addr;
4437}
4438
14f9c5c9 4439
4c4b4cd2
PH
4440/* Push a descriptor of type TYPE for array value ARR on the stack at
4441 *SP, updating *SP to reflect the new descriptor. Return either
14f9c5c9 4442 an lvalue representing the new descriptor, or (if TYPE is a pointer-
4c4b4cd2
PH
4443 to-descriptor type rather than a descriptor type), a struct value *
4444 representing a pointer to this descriptor. */
14f9c5c9 4445
d2e4a39e 4446static struct value *
40bc484c 4447make_array_descriptor (struct type *type, struct value *arr)
14f9c5c9 4448{
d2e4a39e
AS
4449 struct type *bounds_type = desc_bounds_type (type);
4450 struct type *desc_type = desc_base_type (type);
4451 struct value *descriptor = allocate_value (desc_type);
4452 struct value *bounds = allocate_value (bounds_type);
14f9c5c9 4453 int i;
d2e4a39e 4454
0963b4bd
MS
4455 for (i = ada_array_arity (ada_check_typedef (value_type (arr)));
4456 i > 0; i -= 1)
14f9c5c9 4457 {
19f220c3
JK
4458 modify_field (value_type (bounds), value_contents_writeable (bounds),
4459 ada_array_bound (arr, i, 0),
4460 desc_bound_bitpos (bounds_type, i, 0),
4461 desc_bound_bitsize (bounds_type, i, 0));
4462 modify_field (value_type (bounds), value_contents_writeable (bounds),
4463 ada_array_bound (arr, i, 1),
4464 desc_bound_bitpos (bounds_type, i, 1),
4465 desc_bound_bitsize (bounds_type, i, 1));
14f9c5c9 4466 }
d2e4a39e 4467
40bc484c 4468 bounds = ensure_lval (bounds);
d2e4a39e 4469
19f220c3
JK
4470 modify_field (value_type (descriptor),
4471 value_contents_writeable (descriptor),
4472 value_pointer (ensure_lval (arr),
4473 TYPE_FIELD_TYPE (desc_type, 0)),
4474 fat_pntr_data_bitpos (desc_type),
4475 fat_pntr_data_bitsize (desc_type));
4476
4477 modify_field (value_type (descriptor),
4478 value_contents_writeable (descriptor),
4479 value_pointer (bounds,
4480 TYPE_FIELD_TYPE (desc_type, 1)),
4481 fat_pntr_bounds_bitpos (desc_type),
4482 fat_pntr_bounds_bitsize (desc_type));
14f9c5c9 4483
40bc484c 4484 descriptor = ensure_lval (descriptor);
14f9c5c9
AS
4485
4486 if (TYPE_CODE (type) == TYPE_CODE_PTR)
4487 return value_addr (descriptor);
4488 else
4489 return descriptor;
4490}
14f9c5c9 4491\f
3d9434b5
JB
4492 /* Symbol Cache Module */
4493
3d9434b5 4494/* Performance measurements made as of 2010-01-15 indicate that
ee01b665 4495 this cache does bring some noticeable improvements. Depending
3d9434b5
JB
4496 on the type of entity being printed, the cache can make it as much
4497 as an order of magnitude faster than without it.
4498
4499 The descriptive type DWARF extension has significantly reduced
4500 the need for this cache, at least when DWARF is being used. However,
4501 even in this case, some expensive name-based symbol searches are still
4502 sometimes necessary - to find an XVZ variable, mostly. */
4503
ee01b665 4504/* Initialize the contents of SYM_CACHE. */
3d9434b5 4505
ee01b665
JB
4506static void
4507ada_init_symbol_cache (struct ada_symbol_cache *sym_cache)
4508{
4509 obstack_init (&sym_cache->cache_space);
4510 memset (sym_cache->root, '\000', sizeof (sym_cache->root));
4511}
3d9434b5 4512
ee01b665
JB
4513/* Free the memory used by SYM_CACHE. */
4514
4515static void
4516ada_free_symbol_cache (struct ada_symbol_cache *sym_cache)
3d9434b5 4517{
ee01b665
JB
4518 obstack_free (&sym_cache->cache_space, NULL);
4519 xfree (sym_cache);
4520}
3d9434b5 4521
ee01b665
JB
4522/* Return the symbol cache associated to the given program space PSPACE.
4523 If not allocated for this PSPACE yet, allocate and initialize one. */
3d9434b5 4524
ee01b665
JB
4525static struct ada_symbol_cache *
4526ada_get_symbol_cache (struct program_space *pspace)
4527{
4528 struct ada_pspace_data *pspace_data = get_ada_pspace_data (pspace);
ee01b665 4529
66c168ae 4530 if (pspace_data->sym_cache == NULL)
ee01b665 4531 {
66c168ae
JB
4532 pspace_data->sym_cache = XCNEW (struct ada_symbol_cache);
4533 ada_init_symbol_cache (pspace_data->sym_cache);
ee01b665
JB
4534 }
4535
66c168ae 4536 return pspace_data->sym_cache;
ee01b665 4537}
3d9434b5
JB
4538
4539/* Clear all entries from the symbol cache. */
4540
4541static void
4542ada_clear_symbol_cache (void)
4543{
ee01b665
JB
4544 struct ada_symbol_cache *sym_cache
4545 = ada_get_symbol_cache (current_program_space);
4546
4547 obstack_free (&sym_cache->cache_space, NULL);
4548 ada_init_symbol_cache (sym_cache);
3d9434b5
JB
4549}
4550
fe978cb0 4551/* Search our cache for an entry matching NAME and DOMAIN.
3d9434b5
JB
4552 Return it if found, or NULL otherwise. */
4553
4554static struct cache_entry **
fe978cb0 4555find_entry (const char *name, domain_enum domain)
3d9434b5 4556{
ee01b665
JB
4557 struct ada_symbol_cache *sym_cache
4558 = ada_get_symbol_cache (current_program_space);
3d9434b5
JB
4559 int h = msymbol_hash (name) % HASH_SIZE;
4560 struct cache_entry **e;
4561
ee01b665 4562 for (e = &sym_cache->root[h]; *e != NULL; e = &(*e)->next)
3d9434b5 4563 {
fe978cb0 4564 if (domain == (*e)->domain && strcmp (name, (*e)->name) == 0)
3d9434b5
JB
4565 return e;
4566 }
4567 return NULL;
4568}
4569
fe978cb0 4570/* Search the symbol cache for an entry matching NAME and DOMAIN.
3d9434b5
JB
4571 Return 1 if found, 0 otherwise.
4572
4573 If an entry was found and SYM is not NULL, set *SYM to the entry's
4574 SYM. Same principle for BLOCK if not NULL. */
96d887e8 4575
96d887e8 4576static int
fe978cb0 4577lookup_cached_symbol (const char *name, domain_enum domain,
f0c5f9b2 4578 struct symbol **sym, const struct block **block)
96d887e8 4579{
fe978cb0 4580 struct cache_entry **e = find_entry (name, domain);
3d9434b5
JB
4581
4582 if (e == NULL)
4583 return 0;
4584 if (sym != NULL)
4585 *sym = (*e)->sym;
4586 if (block != NULL)
4587 *block = (*e)->block;
4588 return 1;
96d887e8
PH
4589}
4590
3d9434b5 4591/* Assuming that (SYM, BLOCK) is the result of the lookup of NAME
fe978cb0 4592 in domain DOMAIN, save this result in our symbol cache. */
3d9434b5 4593
96d887e8 4594static void
fe978cb0 4595cache_symbol (const char *name, domain_enum domain, struct symbol *sym,
270140bd 4596 const struct block *block)
96d887e8 4597{
ee01b665
JB
4598 struct ada_symbol_cache *sym_cache
4599 = ada_get_symbol_cache (current_program_space);
3d9434b5
JB
4600 int h;
4601 char *copy;
4602 struct cache_entry *e;
4603
1994afbf
DE
4604 /* Symbols for builtin types don't have a block.
4605 For now don't cache such symbols. */
4606 if (sym != NULL && !SYMBOL_OBJFILE_OWNED (sym))
4607 return;
4608
3d9434b5
JB
4609 /* If the symbol is a local symbol, then do not cache it, as a search
4610 for that symbol depends on the context. To determine whether
4611 the symbol is local or not, we check the block where we found it
4612 against the global and static blocks of its associated symtab. */
4613 if (sym
08be3fe3 4614 && BLOCKVECTOR_BLOCK (SYMTAB_BLOCKVECTOR (symbol_symtab (sym)),
439247b6 4615 GLOBAL_BLOCK) != block
08be3fe3 4616 && BLOCKVECTOR_BLOCK (SYMTAB_BLOCKVECTOR (symbol_symtab (sym)),
439247b6 4617 STATIC_BLOCK) != block)
3d9434b5
JB
4618 return;
4619
4620 h = msymbol_hash (name) % HASH_SIZE;
e39db4db 4621 e = XOBNEW (&sym_cache->cache_space, cache_entry);
ee01b665
JB
4622 e->next = sym_cache->root[h];
4623 sym_cache->root[h] = e;
224c3ddb
SM
4624 e->name = copy
4625 = (char *) obstack_alloc (&sym_cache->cache_space, strlen (name) + 1);
3d9434b5
JB
4626 strcpy (copy, name);
4627 e->sym = sym;
fe978cb0 4628 e->domain = domain;
3d9434b5 4629 e->block = block;
96d887e8 4630}
4c4b4cd2
PH
4631\f
4632 /* Symbol Lookup */
4633
b5ec771e
PA
4634/* Return the symbol name match type that should be used used when
4635 searching for all symbols matching LOOKUP_NAME.
c0431670
JB
4636
4637 LOOKUP_NAME is expected to be a symbol name after transformation
f98b2e33 4638 for Ada lookups. */
c0431670 4639
b5ec771e
PA
4640static symbol_name_match_type
4641name_match_type_from_name (const char *lookup_name)
c0431670 4642{
b5ec771e
PA
4643 return (strstr (lookup_name, "__") == NULL
4644 ? symbol_name_match_type::WILD
4645 : symbol_name_match_type::FULL);
c0431670
JB
4646}
4647
4c4b4cd2
PH
4648/* Return the result of a standard (literal, C-like) lookup of NAME in
4649 given DOMAIN, visible from lexical block BLOCK. */
4650
4651static struct symbol *
4652standard_lookup (const char *name, const struct block *block,
4653 domain_enum domain)
4654{
acbd605d 4655 /* Initialize it just to avoid a GCC false warning. */
6640a367 4656 struct block_symbol sym = {};
4c4b4cd2 4657
d12307c1
PMR
4658 if (lookup_cached_symbol (name, domain, &sym.symbol, NULL))
4659 return sym.symbol;
a2cd4f14 4660 ada_lookup_encoded_symbol (name, block, domain, &sym);
d12307c1
PMR
4661 cache_symbol (name, domain, sym.symbol, sym.block);
4662 return sym.symbol;
4c4b4cd2
PH
4663}
4664
4665
4666/* Non-zero iff there is at least one non-function/non-enumeral symbol
4667 in the symbol fields of SYMS[0..N-1]. We treat enumerals as functions,
4668 since they contend in overloading in the same way. */
4669static int
d12307c1 4670is_nonfunction (struct block_symbol syms[], int n)
4c4b4cd2
PH
4671{
4672 int i;
4673
4674 for (i = 0; i < n; i += 1)
d12307c1
PMR
4675 if (TYPE_CODE (SYMBOL_TYPE (syms[i].symbol)) != TYPE_CODE_FUNC
4676 && (TYPE_CODE (SYMBOL_TYPE (syms[i].symbol)) != TYPE_CODE_ENUM
4677 || SYMBOL_CLASS (syms[i].symbol) != LOC_CONST))
14f9c5c9
AS
4678 return 1;
4679
4680 return 0;
4681}
4682
4683/* If true (non-zero), then TYPE0 and TYPE1 represent equivalent
4c4b4cd2 4684 struct types. Otherwise, they may not. */
14f9c5c9
AS
4685
4686static int
d2e4a39e 4687equiv_types (struct type *type0, struct type *type1)
14f9c5c9 4688{
d2e4a39e 4689 if (type0 == type1)
14f9c5c9 4690 return 1;
d2e4a39e 4691 if (type0 == NULL || type1 == NULL
14f9c5c9
AS
4692 || TYPE_CODE (type0) != TYPE_CODE (type1))
4693 return 0;
d2e4a39e 4694 if ((TYPE_CODE (type0) == TYPE_CODE_STRUCT
14f9c5c9
AS
4695 || TYPE_CODE (type0) == TYPE_CODE_ENUM)
4696 && ada_type_name (type0) != NULL && ada_type_name (type1) != NULL
4c4b4cd2 4697 && strcmp (ada_type_name (type0), ada_type_name (type1)) == 0)
14f9c5c9 4698 return 1;
d2e4a39e 4699
14f9c5c9
AS
4700 return 0;
4701}
4702
4703/* True iff SYM0 represents the same entity as SYM1, or one that is
4c4b4cd2 4704 no more defined than that of SYM1. */
14f9c5c9
AS
4705
4706static int
d2e4a39e 4707lesseq_defined_than (struct symbol *sym0, struct symbol *sym1)
14f9c5c9
AS
4708{
4709 if (sym0 == sym1)
4710 return 1;
176620f1 4711 if (SYMBOL_DOMAIN (sym0) != SYMBOL_DOMAIN (sym1)
14f9c5c9
AS
4712 || SYMBOL_CLASS (sym0) != SYMBOL_CLASS (sym1))
4713 return 0;
4714
d2e4a39e 4715 switch (SYMBOL_CLASS (sym0))
14f9c5c9
AS
4716 {
4717 case LOC_UNDEF:
4718 return 1;
4719 case LOC_TYPEDEF:
4720 {
4c4b4cd2
PH
4721 struct type *type0 = SYMBOL_TYPE (sym0);
4722 struct type *type1 = SYMBOL_TYPE (sym1);
0d5cff50
DE
4723 const char *name0 = SYMBOL_LINKAGE_NAME (sym0);
4724 const char *name1 = SYMBOL_LINKAGE_NAME (sym1);
4c4b4cd2 4725 int len0 = strlen (name0);
5b4ee69b 4726
4c4b4cd2
PH
4727 return
4728 TYPE_CODE (type0) == TYPE_CODE (type1)
4729 && (equiv_types (type0, type1)
4730 || (len0 < strlen (name1) && strncmp (name0, name1, len0) == 0
61012eef 4731 && startswith (name1 + len0, "___XV")));
14f9c5c9
AS
4732 }
4733 case LOC_CONST:
4734 return SYMBOL_VALUE (sym0) == SYMBOL_VALUE (sym1)
4c4b4cd2 4735 && equiv_types (SYMBOL_TYPE (sym0), SYMBOL_TYPE (sym1));
d2e4a39e
AS
4736 default:
4737 return 0;
14f9c5c9
AS
4738 }
4739}
4740
d12307c1 4741/* Append (SYM,BLOCK,SYMTAB) to the end of the array of struct block_symbol
4c4b4cd2 4742 records in OBSTACKP. Do nothing if SYM is a duplicate. */
14f9c5c9
AS
4743
4744static void
76a01679
JB
4745add_defn_to_vec (struct obstack *obstackp,
4746 struct symbol *sym,
f0c5f9b2 4747 const struct block *block)
14f9c5c9
AS
4748{
4749 int i;
d12307c1 4750 struct block_symbol *prevDefns = defns_collected (obstackp, 0);
14f9c5c9 4751
529cad9c
PH
4752 /* Do not try to complete stub types, as the debugger is probably
4753 already scanning all symbols matching a certain name at the
4754 time when this function is called. Trying to replace the stub
4755 type by its associated full type will cause us to restart a scan
4756 which may lead to an infinite recursion. Instead, the client
4757 collecting the matching symbols will end up collecting several
4758 matches, with at least one of them complete. It can then filter
4759 out the stub ones if needed. */
4760
4c4b4cd2
PH
4761 for (i = num_defns_collected (obstackp) - 1; i >= 0; i -= 1)
4762 {
d12307c1 4763 if (lesseq_defined_than (sym, prevDefns[i].symbol))
4c4b4cd2 4764 return;
d12307c1 4765 else if (lesseq_defined_than (prevDefns[i].symbol, sym))
4c4b4cd2 4766 {
d12307c1 4767 prevDefns[i].symbol = sym;
4c4b4cd2 4768 prevDefns[i].block = block;
4c4b4cd2 4769 return;
76a01679 4770 }
4c4b4cd2
PH
4771 }
4772
4773 {
d12307c1 4774 struct block_symbol info;
4c4b4cd2 4775
d12307c1 4776 info.symbol = sym;
4c4b4cd2 4777 info.block = block;
d12307c1 4778 obstack_grow (obstackp, &info, sizeof (struct block_symbol));
4c4b4cd2
PH
4779 }
4780}
4781
d12307c1
PMR
4782/* Number of block_symbol structures currently collected in current vector in
4783 OBSTACKP. */
4c4b4cd2 4784
76a01679
JB
4785static int
4786num_defns_collected (struct obstack *obstackp)
4c4b4cd2 4787{
d12307c1 4788 return obstack_object_size (obstackp) / sizeof (struct block_symbol);
4c4b4cd2
PH
4789}
4790
d12307c1
PMR
4791/* Vector of block_symbol structures currently collected in current vector in
4792 OBSTACKP. If FINISH, close off the vector and return its final address. */
4c4b4cd2 4793
d12307c1 4794static struct block_symbol *
4c4b4cd2
PH
4795defns_collected (struct obstack *obstackp, int finish)
4796{
4797 if (finish)
224c3ddb 4798 return (struct block_symbol *) obstack_finish (obstackp);
4c4b4cd2 4799 else
d12307c1 4800 return (struct block_symbol *) obstack_base (obstackp);
4c4b4cd2
PH
4801}
4802
7c7b6655
TT
4803/* Return a bound minimal symbol matching NAME according to Ada
4804 decoding rules. Returns an invalid symbol if there is no such
4805 minimal symbol. Names prefixed with "standard__" are handled
4806 specially: "standard__" is first stripped off, and only static and
4807 global symbols are searched. */
4c4b4cd2 4808
7c7b6655 4809struct bound_minimal_symbol
96d887e8 4810ada_lookup_simple_minsym (const char *name)
4c4b4cd2 4811{
7c7b6655 4812 struct bound_minimal_symbol result;
4c4b4cd2 4813
7c7b6655
TT
4814 memset (&result, 0, sizeof (result));
4815
b5ec771e
PA
4816 symbol_name_match_type match_type = name_match_type_from_name (name);
4817 lookup_name_info lookup_name (name, match_type);
4818
4819 symbol_name_matcher_ftype *match_name
4820 = ada_get_symbol_name_matcher (lookup_name);
4c4b4cd2 4821
2030c079 4822 for (objfile *objfile : current_program_space->objfiles ())
5325b9bf 4823 {
7932255d 4824 for (minimal_symbol *msymbol : objfile->msymbols ())
5325b9bf
TT
4825 {
4826 if (match_name (MSYMBOL_LINKAGE_NAME (msymbol), lookup_name, NULL)
4827 && MSYMBOL_TYPE (msymbol) != mst_solib_trampoline)
4828 {
4829 result.minsym = msymbol;
4830 result.objfile = objfile;
4831 break;
4832 }
4833 }
4834 }
4c4b4cd2 4835
7c7b6655 4836 return result;
96d887e8 4837}
4c4b4cd2 4838
2ff0a947
TT
4839/* Return all the bound minimal symbols matching NAME according to Ada
4840 decoding rules. Returns an empty vector if there is no such
4841 minimal symbol. Names prefixed with "standard__" are handled
4842 specially: "standard__" is first stripped off, and only static and
4843 global symbols are searched. */
4844
4845static std::vector<struct bound_minimal_symbol>
4846ada_lookup_simple_minsyms (const char *name)
4847{
4848 std::vector<struct bound_minimal_symbol> result;
4849
4850 symbol_name_match_type match_type = name_match_type_from_name (name);
4851 lookup_name_info lookup_name (name, match_type);
4852
4853 symbol_name_matcher_ftype *match_name
4854 = ada_get_symbol_name_matcher (lookup_name);
4855
4856 for (objfile *objfile : current_program_space->objfiles ())
4857 {
4858 for (minimal_symbol *msymbol : objfile->msymbols ())
4859 {
4860 if (match_name (MSYMBOL_LINKAGE_NAME (msymbol), lookup_name, NULL)
4861 && MSYMBOL_TYPE (msymbol) != mst_solib_trampoline)
4862 result.push_back ({msymbol, objfile});
4863 }
4864 }
4865
4866 return result;
4867}
4868
96d887e8
PH
4869/* For all subprograms that statically enclose the subprogram of the
4870 selected frame, add symbols matching identifier NAME in DOMAIN
4871 and their blocks to the list of data in OBSTACKP, as for
48b78332
JB
4872 ada_add_block_symbols (q.v.). If WILD_MATCH_P, treat as NAME
4873 with a wildcard prefix. */
4c4b4cd2 4874
96d887e8
PH
4875static void
4876add_symbols_from_enclosing_procs (struct obstack *obstackp,
b5ec771e
PA
4877 const lookup_name_info &lookup_name,
4878 domain_enum domain)
96d887e8 4879{
96d887e8 4880}
14f9c5c9 4881
96d887e8
PH
4882/* True if TYPE is definitely an artificial type supplied to a symbol
4883 for which no debugging information was given in the symbol file. */
14f9c5c9 4884
96d887e8
PH
4885static int
4886is_nondebugging_type (struct type *type)
4887{
0d5cff50 4888 const char *name = ada_type_name (type);
5b4ee69b 4889
96d887e8
PH
4890 return (name != NULL && strcmp (name, "<variable, no debug info>") == 0);
4891}
4c4b4cd2 4892
8f17729f
JB
4893/* Return nonzero if TYPE1 and TYPE2 are two enumeration types
4894 that are deemed "identical" for practical purposes.
4895
4896 This function assumes that TYPE1 and TYPE2 are both TYPE_CODE_ENUM
4897 types and that their number of enumerals is identical (in other
4898 words, TYPE_NFIELDS (type1) == TYPE_NFIELDS (type2)). */
4899
4900static int
4901ada_identical_enum_types_p (struct type *type1, struct type *type2)
4902{
4903 int i;
4904
4905 /* The heuristic we use here is fairly conservative. We consider
4906 that 2 enumerate types are identical if they have the same
4907 number of enumerals and that all enumerals have the same
4908 underlying value and name. */
4909
4910 /* All enums in the type should have an identical underlying value. */
4911 for (i = 0; i < TYPE_NFIELDS (type1); i++)
14e75d8e 4912 if (TYPE_FIELD_ENUMVAL (type1, i) != TYPE_FIELD_ENUMVAL (type2, i))
8f17729f
JB
4913 return 0;
4914
4915 /* All enumerals should also have the same name (modulo any numerical
4916 suffix). */
4917 for (i = 0; i < TYPE_NFIELDS (type1); i++)
4918 {
0d5cff50
DE
4919 const char *name_1 = TYPE_FIELD_NAME (type1, i);
4920 const char *name_2 = TYPE_FIELD_NAME (type2, i);
8f17729f
JB
4921 int len_1 = strlen (name_1);
4922 int len_2 = strlen (name_2);
4923
4924 ada_remove_trailing_digits (TYPE_FIELD_NAME (type1, i), &len_1);
4925 ada_remove_trailing_digits (TYPE_FIELD_NAME (type2, i), &len_2);
4926 if (len_1 != len_2
4927 || strncmp (TYPE_FIELD_NAME (type1, i),
4928 TYPE_FIELD_NAME (type2, i),
4929 len_1) != 0)
4930 return 0;
4931 }
4932
4933 return 1;
4934}
4935
4936/* Return nonzero if all the symbols in SYMS are all enumeral symbols
4937 that are deemed "identical" for practical purposes. Sometimes,
4938 enumerals are not strictly identical, but their types are so similar
4939 that they can be considered identical.
4940
4941 For instance, consider the following code:
4942
4943 type Color is (Black, Red, Green, Blue, White);
4944 type RGB_Color is new Color range Red .. Blue;
4945
4946 Type RGB_Color is a subrange of an implicit type which is a copy
4947 of type Color. If we call that implicit type RGB_ColorB ("B" is
4948 for "Base Type"), then type RGB_ColorB is a copy of type Color.
4949 As a result, when an expression references any of the enumeral
4950 by name (Eg. "print green"), the expression is technically
4951 ambiguous and the user should be asked to disambiguate. But
4952 doing so would only hinder the user, since it wouldn't matter
4953 what choice he makes, the outcome would always be the same.
4954 So, for practical purposes, we consider them as the same. */
4955
4956static int
54d343a2 4957symbols_are_identical_enums (const std::vector<struct block_symbol> &syms)
8f17729f
JB
4958{
4959 int i;
4960
4961 /* Before performing a thorough comparison check of each type,
4962 we perform a series of inexpensive checks. We expect that these
4963 checks will quickly fail in the vast majority of cases, and thus
4964 help prevent the unnecessary use of a more expensive comparison.
4965 Said comparison also expects us to make some of these checks
4966 (see ada_identical_enum_types_p). */
4967
4968 /* Quick check: All symbols should have an enum type. */
54d343a2 4969 for (i = 0; i < syms.size (); i++)
d12307c1 4970 if (TYPE_CODE (SYMBOL_TYPE (syms[i].symbol)) != TYPE_CODE_ENUM)
8f17729f
JB
4971 return 0;
4972
4973 /* Quick check: They should all have the same value. */
54d343a2 4974 for (i = 1; i < syms.size (); i++)
d12307c1 4975 if (SYMBOL_VALUE (syms[i].symbol) != SYMBOL_VALUE (syms[0].symbol))
8f17729f
JB
4976 return 0;
4977
4978 /* Quick check: They should all have the same number of enumerals. */
54d343a2 4979 for (i = 1; i < syms.size (); i++)
d12307c1
PMR
4980 if (TYPE_NFIELDS (SYMBOL_TYPE (syms[i].symbol))
4981 != TYPE_NFIELDS (SYMBOL_TYPE (syms[0].symbol)))
8f17729f
JB
4982 return 0;
4983
4984 /* All the sanity checks passed, so we might have a set of
4985 identical enumeration types. Perform a more complete
4986 comparison of the type of each symbol. */
54d343a2 4987 for (i = 1; i < syms.size (); i++)
d12307c1
PMR
4988 if (!ada_identical_enum_types_p (SYMBOL_TYPE (syms[i].symbol),
4989 SYMBOL_TYPE (syms[0].symbol)))
8f17729f
JB
4990 return 0;
4991
4992 return 1;
4993}
4994
54d343a2 4995/* Remove any non-debugging symbols in SYMS that definitely
96d887e8
PH
4996 duplicate other symbols in the list (The only case I know of where
4997 this happens is when object files containing stabs-in-ecoff are
4998 linked with files containing ordinary ecoff debugging symbols (or no
4999 debugging symbols)). Modifies SYMS to squeeze out deleted entries.
5000 Returns the number of items in the modified list. */
4c4b4cd2 5001
96d887e8 5002static int
54d343a2 5003remove_extra_symbols (std::vector<struct block_symbol> *syms)
96d887e8
PH
5004{
5005 int i, j;
4c4b4cd2 5006
8f17729f
JB
5007 /* We should never be called with less than 2 symbols, as there
5008 cannot be any extra symbol in that case. But it's easy to
5009 handle, since we have nothing to do in that case. */
54d343a2
TT
5010 if (syms->size () < 2)
5011 return syms->size ();
8f17729f 5012
96d887e8 5013 i = 0;
54d343a2 5014 while (i < syms->size ())
96d887e8 5015 {
a35ddb44 5016 int remove_p = 0;
339c13b6
JB
5017
5018 /* If two symbols have the same name and one of them is a stub type,
5019 the get rid of the stub. */
5020
54d343a2
TT
5021 if (TYPE_STUB (SYMBOL_TYPE ((*syms)[i].symbol))
5022 && SYMBOL_LINKAGE_NAME ((*syms)[i].symbol) != NULL)
339c13b6 5023 {
54d343a2 5024 for (j = 0; j < syms->size (); j++)
339c13b6
JB
5025 {
5026 if (j != i
54d343a2
TT
5027 && !TYPE_STUB (SYMBOL_TYPE ((*syms)[j].symbol))
5028 && SYMBOL_LINKAGE_NAME ((*syms)[j].symbol) != NULL
5029 && strcmp (SYMBOL_LINKAGE_NAME ((*syms)[i].symbol),
5030 SYMBOL_LINKAGE_NAME ((*syms)[j].symbol)) == 0)
a35ddb44 5031 remove_p = 1;
339c13b6
JB
5032 }
5033 }
5034
5035 /* Two symbols with the same name, same class and same address
5036 should be identical. */
5037
54d343a2
TT
5038 else if (SYMBOL_LINKAGE_NAME ((*syms)[i].symbol) != NULL
5039 && SYMBOL_CLASS ((*syms)[i].symbol) == LOC_STATIC
5040 && is_nondebugging_type (SYMBOL_TYPE ((*syms)[i].symbol)))
96d887e8 5041 {
54d343a2 5042 for (j = 0; j < syms->size (); j += 1)
96d887e8
PH
5043 {
5044 if (i != j
54d343a2
TT
5045 && SYMBOL_LINKAGE_NAME ((*syms)[j].symbol) != NULL
5046 && strcmp (SYMBOL_LINKAGE_NAME ((*syms)[i].symbol),
5047 SYMBOL_LINKAGE_NAME ((*syms)[j].symbol)) == 0
5048 && SYMBOL_CLASS ((*syms)[i].symbol)
5049 == SYMBOL_CLASS ((*syms)[j].symbol)
5050 && SYMBOL_VALUE_ADDRESS ((*syms)[i].symbol)
5051 == SYMBOL_VALUE_ADDRESS ((*syms)[j].symbol))
a35ddb44 5052 remove_p = 1;
4c4b4cd2 5053 }
4c4b4cd2 5054 }
339c13b6 5055
a35ddb44 5056 if (remove_p)
54d343a2 5057 syms->erase (syms->begin () + i);
339c13b6 5058
96d887e8 5059 i += 1;
14f9c5c9 5060 }
8f17729f
JB
5061
5062 /* If all the remaining symbols are identical enumerals, then
5063 just keep the first one and discard the rest.
5064
5065 Unlike what we did previously, we do not discard any entry
5066 unless they are ALL identical. This is because the symbol
5067 comparison is not a strict comparison, but rather a practical
5068 comparison. If all symbols are considered identical, then
5069 we can just go ahead and use the first one and discard the rest.
5070 But if we cannot reduce the list to a single element, we have
5071 to ask the user to disambiguate anyways. And if we have to
5072 present a multiple-choice menu, it's less confusing if the list
5073 isn't missing some choices that were identical and yet distinct. */
54d343a2
TT
5074 if (symbols_are_identical_enums (*syms))
5075 syms->resize (1);
8f17729f 5076
54d343a2 5077 return syms->size ();
14f9c5c9
AS
5078}
5079
96d887e8
PH
5080/* Given a type that corresponds to a renaming entity, use the type name
5081 to extract the scope (package name or function name, fully qualified,
5082 and following the GNAT encoding convention) where this renaming has been
49d83361 5083 defined. */
4c4b4cd2 5084
49d83361 5085static std::string
96d887e8 5086xget_renaming_scope (struct type *renaming_type)
14f9c5c9 5087{
96d887e8 5088 /* The renaming types adhere to the following convention:
0963b4bd 5089 <scope>__<rename>___<XR extension>.
96d887e8
PH
5090 So, to extract the scope, we search for the "___XR" extension,
5091 and then backtrack until we find the first "__". */
76a01679 5092
a737d952 5093 const char *name = TYPE_NAME (renaming_type);
108d56a4
SM
5094 const char *suffix = strstr (name, "___XR");
5095 const char *last;
14f9c5c9 5096
96d887e8
PH
5097 /* Now, backtrack a bit until we find the first "__". Start looking
5098 at suffix - 3, as the <rename> part is at least one character long. */
14f9c5c9 5099
96d887e8
PH
5100 for (last = suffix - 3; last > name; last--)
5101 if (last[0] == '_' && last[1] == '_')
5102 break;
76a01679 5103
96d887e8 5104 /* Make a copy of scope and return it. */
49d83361 5105 return std::string (name, last);
4c4b4cd2
PH
5106}
5107
96d887e8 5108/* Return nonzero if NAME corresponds to a package name. */
4c4b4cd2 5109
96d887e8
PH
5110static int
5111is_package_name (const char *name)
4c4b4cd2 5112{
96d887e8
PH
5113 /* Here, We take advantage of the fact that no symbols are generated
5114 for packages, while symbols are generated for each function.
5115 So the condition for NAME represent a package becomes equivalent
5116 to NAME not existing in our list of symbols. There is only one
5117 small complication with library-level functions (see below). */
4c4b4cd2 5118
96d887e8
PH
5119 /* If it is a function that has not been defined at library level,
5120 then we should be able to look it up in the symbols. */
5121 if (standard_lookup (name, NULL, VAR_DOMAIN) != NULL)
5122 return 0;
14f9c5c9 5123
96d887e8
PH
5124 /* Library-level function names start with "_ada_". See if function
5125 "_ada_" followed by NAME can be found. */
14f9c5c9 5126
96d887e8 5127 /* Do a quick check that NAME does not contain "__", since library-level
e1d5a0d2 5128 functions names cannot contain "__" in them. */
96d887e8
PH
5129 if (strstr (name, "__") != NULL)
5130 return 0;
4c4b4cd2 5131
528e1572 5132 std::string fun_name = string_printf ("_ada_%s", name);
14f9c5c9 5133
528e1572 5134 return (standard_lookup (fun_name.c_str (), NULL, VAR_DOMAIN) == NULL);
96d887e8 5135}
14f9c5c9 5136
96d887e8 5137/* Return nonzero if SYM corresponds to a renaming entity that is
aeb5907d 5138 not visible from FUNCTION_NAME. */
14f9c5c9 5139
96d887e8 5140static int
0d5cff50 5141old_renaming_is_invisible (const struct symbol *sym, const char *function_name)
96d887e8 5142{
aeb5907d
JB
5143 if (SYMBOL_CLASS (sym) != LOC_TYPEDEF)
5144 return 0;
5145
49d83361 5146 std::string scope = xget_renaming_scope (SYMBOL_TYPE (sym));
14f9c5c9 5147
96d887e8 5148 /* If the rename has been defined in a package, then it is visible. */
49d83361
TT
5149 if (is_package_name (scope.c_str ()))
5150 return 0;
14f9c5c9 5151
96d887e8
PH
5152 /* Check that the rename is in the current function scope by checking
5153 that its name starts with SCOPE. */
76a01679 5154
96d887e8
PH
5155 /* If the function name starts with "_ada_", it means that it is
5156 a library-level function. Strip this prefix before doing the
5157 comparison, as the encoding for the renaming does not contain
5158 this prefix. */
61012eef 5159 if (startswith (function_name, "_ada_"))
96d887e8 5160 function_name += 5;
f26caa11 5161
49d83361 5162 return !startswith (function_name, scope.c_str ());
f26caa11
PH
5163}
5164
aeb5907d
JB
5165/* Remove entries from SYMS that corresponds to a renaming entity that
5166 is not visible from the function associated with CURRENT_BLOCK or
5167 that is superfluous due to the presence of more specific renaming
5168 information. Places surviving symbols in the initial entries of
5169 SYMS and returns the number of surviving symbols.
96d887e8
PH
5170
5171 Rationale:
aeb5907d
JB
5172 First, in cases where an object renaming is implemented as a
5173 reference variable, GNAT may produce both the actual reference
5174 variable and the renaming encoding. In this case, we discard the
5175 latter.
5176
5177 Second, GNAT emits a type following a specified encoding for each renaming
96d887e8
PH
5178 entity. Unfortunately, STABS currently does not support the definition
5179 of types that are local to a given lexical block, so all renamings types
5180 are emitted at library level. As a consequence, if an application
5181 contains two renaming entities using the same name, and a user tries to
5182 print the value of one of these entities, the result of the ada symbol
5183 lookup will also contain the wrong renaming type.
f26caa11 5184
96d887e8
PH
5185 This function partially covers for this limitation by attempting to
5186 remove from the SYMS list renaming symbols that should be visible
5187 from CURRENT_BLOCK. However, there does not seem be a 100% reliable
5188 method with the current information available. The implementation
5189 below has a couple of limitations (FIXME: brobecker-2003-05-12):
5190
5191 - When the user tries to print a rename in a function while there
5192 is another rename entity defined in a package: Normally, the
5193 rename in the function has precedence over the rename in the
5194 package, so the latter should be removed from the list. This is
5195 currently not the case.
5196
5197 - This function will incorrectly remove valid renames if
5198 the CURRENT_BLOCK corresponds to a function which symbol name
5199 has been changed by an "Export" pragma. As a consequence,
5200 the user will be unable to print such rename entities. */
4c4b4cd2 5201
14f9c5c9 5202static int
54d343a2
TT
5203remove_irrelevant_renamings (std::vector<struct block_symbol> *syms,
5204 const struct block *current_block)
4c4b4cd2
PH
5205{
5206 struct symbol *current_function;
0d5cff50 5207 const char *current_function_name;
4c4b4cd2 5208 int i;
aeb5907d
JB
5209 int is_new_style_renaming;
5210
5211 /* If there is both a renaming foo___XR... encoded as a variable and
5212 a simple variable foo in the same block, discard the latter.
0963b4bd 5213 First, zero out such symbols, then compress. */
aeb5907d 5214 is_new_style_renaming = 0;
54d343a2 5215 for (i = 0; i < syms->size (); i += 1)
aeb5907d 5216 {
54d343a2
TT
5217 struct symbol *sym = (*syms)[i].symbol;
5218 const struct block *block = (*syms)[i].block;
aeb5907d
JB
5219 const char *name;
5220 const char *suffix;
5221
5222 if (sym == NULL || SYMBOL_CLASS (sym) == LOC_TYPEDEF)
5223 continue;
5224 name = SYMBOL_LINKAGE_NAME (sym);
5225 suffix = strstr (name, "___XR");
5226
5227 if (suffix != NULL)
5228 {
5229 int name_len = suffix - name;
5230 int j;
5b4ee69b 5231
aeb5907d 5232 is_new_style_renaming = 1;
54d343a2
TT
5233 for (j = 0; j < syms->size (); j += 1)
5234 if (i != j && (*syms)[j].symbol != NULL
5235 && strncmp (name, SYMBOL_LINKAGE_NAME ((*syms)[j].symbol),
aeb5907d 5236 name_len) == 0
54d343a2
TT
5237 && block == (*syms)[j].block)
5238 (*syms)[j].symbol = NULL;
aeb5907d
JB
5239 }
5240 }
5241 if (is_new_style_renaming)
5242 {
5243 int j, k;
5244
54d343a2
TT
5245 for (j = k = 0; j < syms->size (); j += 1)
5246 if ((*syms)[j].symbol != NULL)
aeb5907d 5247 {
54d343a2 5248 (*syms)[k] = (*syms)[j];
aeb5907d
JB
5249 k += 1;
5250 }
5251 return k;
5252 }
4c4b4cd2
PH
5253
5254 /* Extract the function name associated to CURRENT_BLOCK.
5255 Abort if unable to do so. */
76a01679 5256
4c4b4cd2 5257 if (current_block == NULL)
54d343a2 5258 return syms->size ();
76a01679 5259
7f0df278 5260 current_function = block_linkage_function (current_block);
4c4b4cd2 5261 if (current_function == NULL)
54d343a2 5262 return syms->size ();
4c4b4cd2
PH
5263
5264 current_function_name = SYMBOL_LINKAGE_NAME (current_function);
5265 if (current_function_name == NULL)
54d343a2 5266 return syms->size ();
4c4b4cd2
PH
5267
5268 /* Check each of the symbols, and remove it from the list if it is
5269 a type corresponding to a renaming that is out of the scope of
5270 the current block. */
5271
5272 i = 0;
54d343a2 5273 while (i < syms->size ())
4c4b4cd2 5274 {
54d343a2 5275 if (ada_parse_renaming ((*syms)[i].symbol, NULL, NULL, NULL)
aeb5907d 5276 == ADA_OBJECT_RENAMING
54d343a2
TT
5277 && old_renaming_is_invisible ((*syms)[i].symbol,
5278 current_function_name))
5279 syms->erase (syms->begin () + i);
4c4b4cd2
PH
5280 else
5281 i += 1;
5282 }
5283
54d343a2 5284 return syms->size ();
4c4b4cd2
PH
5285}
5286
339c13b6
JB
5287/* Add to OBSTACKP all symbols from BLOCK (and its super-blocks)
5288 whose name and domain match NAME and DOMAIN respectively.
5289 If no match was found, then extend the search to "enclosing"
5290 routines (in other words, if we're inside a nested function,
5291 search the symbols defined inside the enclosing functions).
d0a8ab18
JB
5292 If WILD_MATCH_P is nonzero, perform the naming matching in
5293 "wild" mode (see function "wild_match" for more info).
339c13b6
JB
5294
5295 Note: This function assumes that OBSTACKP has 0 (zero) element in it. */
5296
5297static void
b5ec771e
PA
5298ada_add_local_symbols (struct obstack *obstackp,
5299 const lookup_name_info &lookup_name,
5300 const struct block *block, domain_enum domain)
339c13b6
JB
5301{
5302 int block_depth = 0;
5303
5304 while (block != NULL)
5305 {
5306 block_depth += 1;
b5ec771e 5307 ada_add_block_symbols (obstackp, block, lookup_name, domain, NULL);
339c13b6
JB
5308
5309 /* If we found a non-function match, assume that's the one. */
5310 if (is_nonfunction (defns_collected (obstackp, 0),
5311 num_defns_collected (obstackp)))
5312 return;
5313
5314 block = BLOCK_SUPERBLOCK (block);
5315 }
5316
5317 /* If no luck so far, try to find NAME as a local symbol in some lexically
5318 enclosing subprogram. */
5319 if (num_defns_collected (obstackp) == 0 && block_depth > 2)
b5ec771e 5320 add_symbols_from_enclosing_procs (obstackp, lookup_name, domain);
339c13b6
JB
5321}
5322
ccefe4c4 5323/* An object of this type is used as the user_data argument when
40658b94 5324 calling the map_matching_symbols method. */
ccefe4c4 5325
40658b94 5326struct match_data
ccefe4c4 5327{
40658b94 5328 struct objfile *objfile;
ccefe4c4 5329 struct obstack *obstackp;
40658b94
PH
5330 struct symbol *arg_sym;
5331 int found_sym;
ccefe4c4
TT
5332};
5333
22cee43f 5334/* A callback for add_nonlocal_symbols that adds SYM, found in BLOCK,
40658b94
PH
5335 to a list of symbols. DATA0 is a pointer to a struct match_data *
5336 containing the obstack that collects the symbol list, the file that SYM
5337 must come from, a flag indicating whether a non-argument symbol has
5338 been found in the current block, and the last argument symbol
5339 passed in SYM within the current block (if any). When SYM is null,
5340 marking the end of a block, the argument symbol is added if no
5341 other has been found. */
ccefe4c4 5342
40658b94 5343static int
582942f4
TT
5344aux_add_nonlocal_symbols (const struct block *block, struct symbol *sym,
5345 void *data0)
ccefe4c4 5346{
40658b94
PH
5347 struct match_data *data = (struct match_data *) data0;
5348
5349 if (sym == NULL)
5350 {
5351 if (!data->found_sym && data->arg_sym != NULL)
5352 add_defn_to_vec (data->obstackp,
5353 fixup_symbol_section (data->arg_sym, data->objfile),
5354 block);
5355 data->found_sym = 0;
5356 data->arg_sym = NULL;
5357 }
5358 else
5359 {
5360 if (SYMBOL_CLASS (sym) == LOC_UNRESOLVED)
5361 return 0;
5362 else if (SYMBOL_IS_ARGUMENT (sym))
5363 data->arg_sym = sym;
5364 else
5365 {
5366 data->found_sym = 1;
5367 add_defn_to_vec (data->obstackp,
5368 fixup_symbol_section (sym, data->objfile),
5369 block);
5370 }
5371 }
5372 return 0;
5373}
5374
b5ec771e
PA
5375/* Helper for add_nonlocal_symbols. Find symbols in DOMAIN which are
5376 targeted by renamings matching LOOKUP_NAME in BLOCK. Add these
5377 symbols to OBSTACKP. Return whether we found such symbols. */
22cee43f
PMR
5378
5379static int
5380ada_add_block_renamings (struct obstack *obstackp,
5381 const struct block *block,
b5ec771e
PA
5382 const lookup_name_info &lookup_name,
5383 domain_enum domain)
22cee43f
PMR
5384{
5385 struct using_direct *renaming;
5386 int defns_mark = num_defns_collected (obstackp);
5387
b5ec771e
PA
5388 symbol_name_matcher_ftype *name_match
5389 = ada_get_symbol_name_matcher (lookup_name);
5390
22cee43f
PMR
5391 for (renaming = block_using (block);
5392 renaming != NULL;
5393 renaming = renaming->next)
5394 {
5395 const char *r_name;
22cee43f
PMR
5396
5397 /* Avoid infinite recursions: skip this renaming if we are actually
5398 already traversing it.
5399
5400 Currently, symbol lookup in Ada don't use the namespace machinery from
5401 C++/Fortran support: skip namespace imports that use them. */
5402 if (renaming->searched
5403 || (renaming->import_src != NULL
5404 && renaming->import_src[0] != '\0')
5405 || (renaming->import_dest != NULL
5406 && renaming->import_dest[0] != '\0'))
5407 continue;
5408 renaming->searched = 1;
5409
5410 /* TODO: here, we perform another name-based symbol lookup, which can
5411 pull its own multiple overloads. In theory, we should be able to do
5412 better in this case since, in DWARF, DW_AT_import is a DIE reference,
5413 not a simple name. But in order to do this, we would need to enhance
5414 the DWARF reader to associate a symbol to this renaming, instead of a
5415 name. So, for now, we do something simpler: re-use the C++/Fortran
5416 namespace machinery. */
5417 r_name = (renaming->alias != NULL
5418 ? renaming->alias
5419 : renaming->declaration);
b5ec771e
PA
5420 if (name_match (r_name, lookup_name, NULL))
5421 {
5422 lookup_name_info decl_lookup_name (renaming->declaration,
5423 lookup_name.match_type ());
5424 ada_add_all_symbols (obstackp, block, decl_lookup_name, domain,
5425 1, NULL);
5426 }
22cee43f
PMR
5427 renaming->searched = 0;
5428 }
5429 return num_defns_collected (obstackp) != defns_mark;
5430}
5431
db230ce3
JB
5432/* Implements compare_names, but only applying the comparision using
5433 the given CASING. */
5b4ee69b 5434
40658b94 5435static int
db230ce3
JB
5436compare_names_with_case (const char *string1, const char *string2,
5437 enum case_sensitivity casing)
40658b94
PH
5438{
5439 while (*string1 != '\0' && *string2 != '\0')
5440 {
db230ce3
JB
5441 char c1, c2;
5442
40658b94
PH
5443 if (isspace (*string1) || isspace (*string2))
5444 return strcmp_iw_ordered (string1, string2);
db230ce3
JB
5445
5446 if (casing == case_sensitive_off)
5447 {
5448 c1 = tolower (*string1);
5449 c2 = tolower (*string2);
5450 }
5451 else
5452 {
5453 c1 = *string1;
5454 c2 = *string2;
5455 }
5456 if (c1 != c2)
40658b94 5457 break;
db230ce3 5458
40658b94
PH
5459 string1 += 1;
5460 string2 += 1;
5461 }
db230ce3 5462
40658b94
PH
5463 switch (*string1)
5464 {
5465 case '(':
5466 return strcmp_iw_ordered (string1, string2);
5467 case '_':
5468 if (*string2 == '\0')
5469 {
052874e8 5470 if (is_name_suffix (string1))
40658b94
PH
5471 return 0;
5472 else
1a1d5513 5473 return 1;
40658b94 5474 }
dbb8534f 5475 /* FALLTHROUGH */
40658b94
PH
5476 default:
5477 if (*string2 == '(')
5478 return strcmp_iw_ordered (string1, string2);
5479 else
db230ce3
JB
5480 {
5481 if (casing == case_sensitive_off)
5482 return tolower (*string1) - tolower (*string2);
5483 else
5484 return *string1 - *string2;
5485 }
40658b94 5486 }
ccefe4c4
TT
5487}
5488
db230ce3
JB
5489/* Compare STRING1 to STRING2, with results as for strcmp.
5490 Compatible with strcmp_iw_ordered in that...
5491
5492 strcmp_iw_ordered (STRING1, STRING2) <= 0
5493
5494 ... implies...
5495
5496 compare_names (STRING1, STRING2) <= 0
5497
5498 (they may differ as to what symbols compare equal). */
5499
5500static int
5501compare_names (const char *string1, const char *string2)
5502{
5503 int result;
5504
5505 /* Similar to what strcmp_iw_ordered does, we need to perform
5506 a case-insensitive comparison first, and only resort to
5507 a second, case-sensitive, comparison if the first one was
5508 not sufficient to differentiate the two strings. */
5509
5510 result = compare_names_with_case (string1, string2, case_sensitive_off);
5511 if (result == 0)
5512 result = compare_names_with_case (string1, string2, case_sensitive_on);
5513
5514 return result;
5515}
5516
b5ec771e
PA
5517/* Convenience function to get at the Ada encoded lookup name for
5518 LOOKUP_NAME, as a C string. */
5519
5520static const char *
5521ada_lookup_name (const lookup_name_info &lookup_name)
5522{
5523 return lookup_name.ada ().lookup_name ().c_str ();
5524}
5525
339c13b6 5526/* Add to OBSTACKP all non-local symbols whose name and domain match
b5ec771e
PA
5527 LOOKUP_NAME and DOMAIN respectively. The search is performed on
5528 GLOBAL_BLOCK symbols if GLOBAL is non-zero, or on STATIC_BLOCK
5529 symbols otherwise. */
339c13b6
JB
5530
5531static void
b5ec771e
PA
5532add_nonlocal_symbols (struct obstack *obstackp,
5533 const lookup_name_info &lookup_name,
5534 domain_enum domain, int global)
339c13b6 5535{
40658b94 5536 struct match_data data;
339c13b6 5537
6475f2fe 5538 memset (&data, 0, sizeof data);
ccefe4c4 5539 data.obstackp = obstackp;
339c13b6 5540
b5ec771e
PA
5541 bool is_wild_match = lookup_name.ada ().wild_match_p ();
5542
2030c079 5543 for (objfile *objfile : current_program_space->objfiles ())
40658b94
PH
5544 {
5545 data.objfile = objfile;
5546
5547 if (is_wild_match)
b5ec771e
PA
5548 objfile->sf->qf->map_matching_symbols (objfile, lookup_name.name ().c_str (),
5549 domain, global,
4186eb54 5550 aux_add_nonlocal_symbols, &data,
b5ec771e
PA
5551 symbol_name_match_type::WILD,
5552 NULL);
40658b94 5553 else
b5ec771e
PA
5554 objfile->sf->qf->map_matching_symbols (objfile, lookup_name.name ().c_str (),
5555 domain, global,
4186eb54 5556 aux_add_nonlocal_symbols, &data,
b5ec771e
PA
5557 symbol_name_match_type::FULL,
5558 compare_names);
22cee43f 5559
b669c953 5560 for (compunit_symtab *cu : objfile->compunits ())
22cee43f
PMR
5561 {
5562 const struct block *global_block
5563 = BLOCKVECTOR_BLOCK (COMPUNIT_BLOCKVECTOR (cu), GLOBAL_BLOCK);
5564
b5ec771e
PA
5565 if (ada_add_block_renamings (obstackp, global_block, lookup_name,
5566 domain))
22cee43f
PMR
5567 data.found_sym = 1;
5568 }
40658b94
PH
5569 }
5570
5571 if (num_defns_collected (obstackp) == 0 && global && !is_wild_match)
5572 {
b5ec771e
PA
5573 const char *name = ada_lookup_name (lookup_name);
5574 std::string name1 = std::string ("<_ada_") + name + '>';
5575
2030c079 5576 for (objfile *objfile : current_program_space->objfiles ())
40658b94 5577 {
40658b94 5578 data.objfile = objfile;
b5ec771e
PA
5579 objfile->sf->qf->map_matching_symbols (objfile, name1.c_str (),
5580 domain, global,
0963b4bd
MS
5581 aux_add_nonlocal_symbols,
5582 &data,
b5ec771e
PA
5583 symbol_name_match_type::FULL,
5584 compare_names);
40658b94
PH
5585 }
5586 }
339c13b6
JB
5587}
5588
b5ec771e
PA
5589/* Find symbols in DOMAIN matching LOOKUP_NAME, in BLOCK and, if
5590 FULL_SEARCH is non-zero, enclosing scope and in global scopes,
5591 returning the number of matches. Add these to OBSTACKP.
4eeaa230 5592
22cee43f
PMR
5593 When FULL_SEARCH is non-zero, any non-function/non-enumeral
5594 symbol match within the nest of blocks whose innermost member is BLOCK,
4c4b4cd2 5595 is the one match returned (no other matches in that or
d9680e73 5596 enclosing blocks is returned). If there are any matches in or
22cee43f 5597 surrounding BLOCK, then these alone are returned.
4eeaa230 5598
b5ec771e
PA
5599 Names prefixed with "standard__" are handled specially:
5600 "standard__" is first stripped off (by the lookup_name
5601 constructor), and only static and global symbols are searched.
14f9c5c9 5602
22cee43f
PMR
5603 If MADE_GLOBAL_LOOKUP_P is non-null, set it before return to whether we had
5604 to lookup global symbols. */
5605
5606static void
5607ada_add_all_symbols (struct obstack *obstackp,
5608 const struct block *block,
b5ec771e 5609 const lookup_name_info &lookup_name,
22cee43f
PMR
5610 domain_enum domain,
5611 int full_search,
5612 int *made_global_lookup_p)
14f9c5c9
AS
5613{
5614 struct symbol *sym;
14f9c5c9 5615
22cee43f
PMR
5616 if (made_global_lookup_p)
5617 *made_global_lookup_p = 0;
339c13b6
JB
5618
5619 /* Special case: If the user specifies a symbol name inside package
5620 Standard, do a non-wild matching of the symbol name without
5621 the "standard__" prefix. This was primarily introduced in order
5622 to allow the user to specifically access the standard exceptions
5623 using, for instance, Standard.Constraint_Error when Constraint_Error
5624 is ambiguous (due to the user defining its own Constraint_Error
5625 entity inside its program). */
b5ec771e
PA
5626 if (lookup_name.ada ().standard_p ())
5627 block = NULL;
4c4b4cd2 5628
339c13b6 5629 /* Check the non-global symbols. If we have ANY match, then we're done. */
14f9c5c9 5630
4eeaa230
DE
5631 if (block != NULL)
5632 {
5633 if (full_search)
b5ec771e 5634 ada_add_local_symbols (obstackp, lookup_name, block, domain);
4eeaa230
DE
5635 else
5636 {
5637 /* In the !full_search case we're are being called by
5638 ada_iterate_over_symbols, and we don't want to search
5639 superblocks. */
b5ec771e 5640 ada_add_block_symbols (obstackp, block, lookup_name, domain, NULL);
4eeaa230 5641 }
22cee43f
PMR
5642 if (num_defns_collected (obstackp) > 0 || !full_search)
5643 return;
4eeaa230 5644 }
d2e4a39e 5645
339c13b6
JB
5646 /* No non-global symbols found. Check our cache to see if we have
5647 already performed this search before. If we have, then return
5648 the same result. */
5649
b5ec771e
PA
5650 if (lookup_cached_symbol (ada_lookup_name (lookup_name),
5651 domain, &sym, &block))
4c4b4cd2
PH
5652 {
5653 if (sym != NULL)
b5ec771e 5654 add_defn_to_vec (obstackp, sym, block);
22cee43f 5655 return;
4c4b4cd2 5656 }
14f9c5c9 5657
22cee43f
PMR
5658 if (made_global_lookup_p)
5659 *made_global_lookup_p = 1;
b1eedac9 5660
339c13b6
JB
5661 /* Search symbols from all global blocks. */
5662
b5ec771e 5663 add_nonlocal_symbols (obstackp, lookup_name, domain, 1);
d2e4a39e 5664
4c4b4cd2 5665 /* Now add symbols from all per-file blocks if we've gotten no hits
339c13b6 5666 (not strictly correct, but perhaps better than an error). */
d2e4a39e 5667
22cee43f 5668 if (num_defns_collected (obstackp) == 0)
b5ec771e 5669 add_nonlocal_symbols (obstackp, lookup_name, domain, 0);
22cee43f
PMR
5670}
5671
b5ec771e
PA
5672/* Find symbols in DOMAIN matching LOOKUP_NAME, in BLOCK and, if FULL_SEARCH
5673 is non-zero, enclosing scope and in global scopes, returning the number of
22cee43f 5674 matches.
54d343a2
TT
5675 Fills *RESULTS with (SYM,BLOCK) tuples, indicating the symbols
5676 found and the blocks and symbol tables (if any) in which they were
5677 found.
22cee43f
PMR
5678
5679 When full_search is non-zero, any non-function/non-enumeral
5680 symbol match within the nest of blocks whose innermost member is BLOCK,
5681 is the one match returned (no other matches in that or
5682 enclosing blocks is returned). If there are any matches in or
5683 surrounding BLOCK, then these alone are returned.
5684
5685 Names prefixed with "standard__" are handled specially: "standard__"
5686 is first stripped off, and only static and global symbols are searched. */
5687
5688static int
b5ec771e
PA
5689ada_lookup_symbol_list_worker (const lookup_name_info &lookup_name,
5690 const struct block *block,
22cee43f 5691 domain_enum domain,
54d343a2 5692 std::vector<struct block_symbol> *results,
22cee43f
PMR
5693 int full_search)
5694{
22cee43f
PMR
5695 int syms_from_global_search;
5696 int ndefns;
ec6a20c2 5697 auto_obstack obstack;
22cee43f 5698
ec6a20c2 5699 ada_add_all_symbols (&obstack, block, lookup_name,
b5ec771e 5700 domain, full_search, &syms_from_global_search);
14f9c5c9 5701
ec6a20c2
JB
5702 ndefns = num_defns_collected (&obstack);
5703
54d343a2
TT
5704 struct block_symbol *base = defns_collected (&obstack, 1);
5705 for (int i = 0; i < ndefns; ++i)
5706 results->push_back (base[i]);
4c4b4cd2 5707
54d343a2 5708 ndefns = remove_extra_symbols (results);
4c4b4cd2 5709
b1eedac9 5710 if (ndefns == 0 && full_search && syms_from_global_search)
b5ec771e 5711 cache_symbol (ada_lookup_name (lookup_name), domain, NULL, NULL);
14f9c5c9 5712
b1eedac9 5713 if (ndefns == 1 && full_search && syms_from_global_search)
b5ec771e
PA
5714 cache_symbol (ada_lookup_name (lookup_name), domain,
5715 (*results)[0].symbol, (*results)[0].block);
14f9c5c9 5716
54d343a2 5717 ndefns = remove_irrelevant_renamings (results, block);
ec6a20c2 5718
14f9c5c9
AS
5719 return ndefns;
5720}
5721
b5ec771e 5722/* Find symbols in DOMAIN matching NAME, in BLOCK and enclosing scope and
54d343a2
TT
5723 in global scopes, returning the number of matches, and filling *RESULTS
5724 with (SYM,BLOCK) tuples.
ec6a20c2 5725
4eeaa230
DE
5726 See ada_lookup_symbol_list_worker for further details. */
5727
5728int
b5ec771e 5729ada_lookup_symbol_list (const char *name, const struct block *block,
54d343a2
TT
5730 domain_enum domain,
5731 std::vector<struct block_symbol> *results)
4eeaa230 5732{
b5ec771e
PA
5733 symbol_name_match_type name_match_type = name_match_type_from_name (name);
5734 lookup_name_info lookup_name (name, name_match_type);
5735
5736 return ada_lookup_symbol_list_worker (lookup_name, block, domain, results, 1);
4eeaa230
DE
5737}
5738
5739/* Implementation of the la_iterate_over_symbols method. */
5740
5741static void
14bc53a8 5742ada_iterate_over_symbols
b5ec771e
PA
5743 (const struct block *block, const lookup_name_info &name,
5744 domain_enum domain,
14bc53a8 5745 gdb::function_view<symbol_found_callback_ftype> callback)
4eeaa230
DE
5746{
5747 int ndefs, i;
54d343a2 5748 std::vector<struct block_symbol> results;
4eeaa230
DE
5749
5750 ndefs = ada_lookup_symbol_list_worker (name, block, domain, &results, 0);
ec6a20c2 5751
4eeaa230
DE
5752 for (i = 0; i < ndefs; ++i)
5753 {
7e41c8db 5754 if (!callback (&results[i]))
4eeaa230
DE
5755 break;
5756 }
5757}
5758
4e5c77fe
JB
5759/* The result is as for ada_lookup_symbol_list with FULL_SEARCH set
5760 to 1, but choosing the first symbol found if there are multiple
5761 choices.
5762
5e2336be
JB
5763 The result is stored in *INFO, which must be non-NULL.
5764 If no match is found, INFO->SYM is set to NULL. */
4e5c77fe
JB
5765
5766void
5767ada_lookup_encoded_symbol (const char *name, const struct block *block,
fe978cb0 5768 domain_enum domain,
d12307c1 5769 struct block_symbol *info)
14f9c5c9 5770{
b5ec771e
PA
5771 /* Since we already have an encoded name, wrap it in '<>' to force a
5772 verbatim match. Otherwise, if the name happens to not look like
5773 an encoded name (because it doesn't include a "__"),
5774 ada_lookup_name_info would re-encode/fold it again, and that
5775 would e.g., incorrectly lowercase object renaming names like
5776 "R28b" -> "r28b". */
5777 std::string verbatim = std::string ("<") + name + '>';
5778
5e2336be 5779 gdb_assert (info != NULL);
65392b3e 5780 *info = ada_lookup_symbol (verbatim.c_str (), block, domain);
4e5c77fe 5781}
aeb5907d
JB
5782
5783/* Return a symbol in DOMAIN matching NAME, in BLOCK0 and enclosing
5784 scope and in global scopes, or NULL if none. NAME is folded and
5785 encoded first. Otherwise, the result is as for ada_lookup_symbol_list,
65392b3e 5786 choosing the first symbol if there are multiple choices. */
4e5c77fe 5787
d12307c1 5788struct block_symbol
aeb5907d 5789ada_lookup_symbol (const char *name, const struct block *block0,
65392b3e 5790 domain_enum domain)
aeb5907d 5791{
54d343a2 5792 std::vector<struct block_symbol> candidates;
f98fc17b 5793 int n_candidates;
f98fc17b
PA
5794
5795 n_candidates = ada_lookup_symbol_list (name, block0, domain, &candidates);
f98fc17b
PA
5796
5797 if (n_candidates == 0)
54d343a2 5798 return {};
f98fc17b
PA
5799
5800 block_symbol info = candidates[0];
5801 info.symbol = fixup_symbol_section (info.symbol, NULL);
d12307c1 5802 return info;
4c4b4cd2 5803}
14f9c5c9 5804
d12307c1 5805static struct block_symbol
f606139a
DE
5806ada_lookup_symbol_nonlocal (const struct language_defn *langdef,
5807 const char *name,
76a01679 5808 const struct block *block,
21b556f4 5809 const domain_enum domain)
4c4b4cd2 5810{
d12307c1 5811 struct block_symbol sym;
04dccad0 5812
65392b3e 5813 sym = ada_lookup_symbol (name, block_static_block (block), domain);
d12307c1 5814 if (sym.symbol != NULL)
04dccad0
JB
5815 return sym;
5816
5817 /* If we haven't found a match at this point, try the primitive
5818 types. In other languages, this search is performed before
5819 searching for global symbols in order to short-circuit that
5820 global-symbol search if it happens that the name corresponds
5821 to a primitive type. But we cannot do the same in Ada, because
5822 it is perfectly legitimate for a program to declare a type which
5823 has the same name as a standard type. If looking up a type in
5824 that situation, we have traditionally ignored the primitive type
5825 in favor of user-defined types. This is why, unlike most other
5826 languages, we search the primitive types this late and only after
5827 having searched the global symbols without success. */
5828
5829 if (domain == VAR_DOMAIN)
5830 {
5831 struct gdbarch *gdbarch;
5832
5833 if (block == NULL)
5834 gdbarch = target_gdbarch ();
5835 else
5836 gdbarch = block_gdbarch (block);
d12307c1
PMR
5837 sym.symbol = language_lookup_primitive_type_as_symbol (langdef, gdbarch, name);
5838 if (sym.symbol != NULL)
04dccad0
JB
5839 return sym;
5840 }
5841
6640a367 5842 return {};
14f9c5c9
AS
5843}
5844
5845
4c4b4cd2
PH
5846/* True iff STR is a possible encoded suffix of a normal Ada name
5847 that is to be ignored for matching purposes. Suffixes of parallel
5848 names (e.g., XVE) are not included here. Currently, the possible suffixes
5823c3ef 5849 are given by any of the regular expressions:
4c4b4cd2 5850
babe1480
JB
5851 [.$][0-9]+ [nested subprogram suffix, on platforms such as GNU/Linux]
5852 ___[0-9]+ [nested subprogram suffix, on platforms such as HP/UX]
9ac7f98e 5853 TKB [subprogram suffix for task bodies]
babe1480 5854 _E[0-9]+[bs]$ [protected object entry suffixes]
61ee279c 5855 (X[nb]*)?((\$|__)[0-9](_?[0-9]+)|___(JM|LJM|X([FDBUP].*|R[^T]?)))?$
babe1480
JB
5856
5857 Also, any leading "__[0-9]+" sequence is skipped before the suffix
5858 match is performed. This sequence is used to differentiate homonyms,
5859 is an optional part of a valid name suffix. */
4c4b4cd2 5860
14f9c5c9 5861static int
d2e4a39e 5862is_name_suffix (const char *str)
14f9c5c9
AS
5863{
5864 int k;
4c4b4cd2
PH
5865 const char *matching;
5866 const int len = strlen (str);
5867
babe1480
JB
5868 /* Skip optional leading __[0-9]+. */
5869
4c4b4cd2
PH
5870 if (len > 3 && str[0] == '_' && str[1] == '_' && isdigit (str[2]))
5871 {
babe1480
JB
5872 str += 3;
5873 while (isdigit (str[0]))
5874 str += 1;
4c4b4cd2 5875 }
babe1480
JB
5876
5877 /* [.$][0-9]+ */
4c4b4cd2 5878
babe1480 5879 if (str[0] == '.' || str[0] == '$')
4c4b4cd2 5880 {
babe1480 5881 matching = str + 1;
4c4b4cd2
PH
5882 while (isdigit (matching[0]))
5883 matching += 1;
5884 if (matching[0] == '\0')
5885 return 1;
5886 }
5887
5888 /* ___[0-9]+ */
babe1480 5889
4c4b4cd2
PH
5890 if (len > 3 && str[0] == '_' && str[1] == '_' && str[2] == '_')
5891 {
5892 matching = str + 3;
5893 while (isdigit (matching[0]))
5894 matching += 1;
5895 if (matching[0] == '\0')
5896 return 1;
5897 }
5898
9ac7f98e
JB
5899 /* "TKB" suffixes are used for subprograms implementing task bodies. */
5900
5901 if (strcmp (str, "TKB") == 0)
5902 return 1;
5903
529cad9c
PH
5904#if 0
5905 /* FIXME: brobecker/2005-09-23: Protected Object subprograms end
0963b4bd
MS
5906 with a N at the end. Unfortunately, the compiler uses the same
5907 convention for other internal types it creates. So treating
529cad9c 5908 all entity names that end with an "N" as a name suffix causes
0963b4bd
MS
5909 some regressions. For instance, consider the case of an enumerated
5910 type. To support the 'Image attribute, it creates an array whose
529cad9c
PH
5911 name ends with N.
5912 Having a single character like this as a suffix carrying some
0963b4bd 5913 information is a bit risky. Perhaps we should change the encoding
529cad9c
PH
5914 to be something like "_N" instead. In the meantime, do not do
5915 the following check. */
5916 /* Protected Object Subprograms */
5917 if (len == 1 && str [0] == 'N')
5918 return 1;
5919#endif
5920
5921 /* _E[0-9]+[bs]$ */
5922 if (len > 3 && str[0] == '_' && str [1] == 'E' && isdigit (str[2]))
5923 {
5924 matching = str + 3;
5925 while (isdigit (matching[0]))
5926 matching += 1;
5927 if ((matching[0] == 'b' || matching[0] == 's')
5928 && matching [1] == '\0')
5929 return 1;
5930 }
5931
4c4b4cd2
PH
5932 /* ??? We should not modify STR directly, as we are doing below. This
5933 is fine in this case, but may become problematic later if we find
5934 that this alternative did not work, and want to try matching
5935 another one from the begining of STR. Since we modified it, we
5936 won't be able to find the begining of the string anymore! */
14f9c5c9
AS
5937 if (str[0] == 'X')
5938 {
5939 str += 1;
d2e4a39e 5940 while (str[0] != '_' && str[0] != '\0')
4c4b4cd2
PH
5941 {
5942 if (str[0] != 'n' && str[0] != 'b')
5943 return 0;
5944 str += 1;
5945 }
14f9c5c9 5946 }
babe1480 5947
14f9c5c9
AS
5948 if (str[0] == '\000')
5949 return 1;
babe1480 5950
d2e4a39e 5951 if (str[0] == '_')
14f9c5c9
AS
5952 {
5953 if (str[1] != '_' || str[2] == '\000')
4c4b4cd2 5954 return 0;
d2e4a39e 5955 if (str[2] == '_')
4c4b4cd2 5956 {
61ee279c
PH
5957 if (strcmp (str + 3, "JM") == 0)
5958 return 1;
5959 /* FIXME: brobecker/2004-09-30: GNAT will soon stop using
5960 the LJM suffix in favor of the JM one. But we will
5961 still accept LJM as a valid suffix for a reasonable
5962 amount of time, just to allow ourselves to debug programs
5963 compiled using an older version of GNAT. */
4c4b4cd2
PH
5964 if (strcmp (str + 3, "LJM") == 0)
5965 return 1;
5966 if (str[3] != 'X')
5967 return 0;
1265e4aa
JB
5968 if (str[4] == 'F' || str[4] == 'D' || str[4] == 'B'
5969 || str[4] == 'U' || str[4] == 'P')
4c4b4cd2
PH
5970 return 1;
5971 if (str[4] == 'R' && str[5] != 'T')
5972 return 1;
5973 return 0;
5974 }
5975 if (!isdigit (str[2]))
5976 return 0;
5977 for (k = 3; str[k] != '\0'; k += 1)
5978 if (!isdigit (str[k]) && str[k] != '_')
5979 return 0;
14f9c5c9
AS
5980 return 1;
5981 }
4c4b4cd2 5982 if (str[0] == '$' && isdigit (str[1]))
14f9c5c9 5983 {
4c4b4cd2
PH
5984 for (k = 2; str[k] != '\0'; k += 1)
5985 if (!isdigit (str[k]) && str[k] != '_')
5986 return 0;
14f9c5c9
AS
5987 return 1;
5988 }
5989 return 0;
5990}
d2e4a39e 5991
aeb5907d
JB
5992/* Return non-zero if the string starting at NAME and ending before
5993 NAME_END contains no capital letters. */
529cad9c
PH
5994
5995static int
5996is_valid_name_for_wild_match (const char *name0)
5997{
5998 const char *decoded_name = ada_decode (name0);
5999 int i;
6000
5823c3ef
JB
6001 /* If the decoded name starts with an angle bracket, it means that
6002 NAME0 does not follow the GNAT encoding format. It should then
6003 not be allowed as a possible wild match. */
6004 if (decoded_name[0] == '<')
6005 return 0;
6006
529cad9c
PH
6007 for (i=0; decoded_name[i] != '\0'; i++)
6008 if (isalpha (decoded_name[i]) && !islower (decoded_name[i]))
6009 return 0;
6010
6011 return 1;
6012}
6013
73589123
PH
6014/* Advance *NAMEP to next occurrence of TARGET0 in the string NAME0
6015 that could start a simple name. Assumes that *NAMEP points into
6016 the string beginning at NAME0. */
4c4b4cd2 6017
14f9c5c9 6018static int
73589123 6019advance_wild_match (const char **namep, const char *name0, int target0)
14f9c5c9 6020{
73589123 6021 const char *name = *namep;
5b4ee69b 6022
5823c3ef 6023 while (1)
14f9c5c9 6024 {
aa27d0b3 6025 int t0, t1;
73589123
PH
6026
6027 t0 = *name;
6028 if (t0 == '_')
6029 {
6030 t1 = name[1];
6031 if ((t1 >= 'a' && t1 <= 'z') || (t1 >= '0' && t1 <= '9'))
6032 {
6033 name += 1;
61012eef 6034 if (name == name0 + 5 && startswith (name0, "_ada"))
73589123
PH
6035 break;
6036 else
6037 name += 1;
6038 }
aa27d0b3
JB
6039 else if (t1 == '_' && ((name[2] >= 'a' && name[2] <= 'z')
6040 || name[2] == target0))
73589123
PH
6041 {
6042 name += 2;
6043 break;
6044 }
6045 else
6046 return 0;
6047 }
6048 else if ((t0 >= 'a' && t0 <= 'z') || (t0 >= '0' && t0 <= '9'))
6049 name += 1;
6050 else
5823c3ef 6051 return 0;
73589123
PH
6052 }
6053
6054 *namep = name;
6055 return 1;
6056}
6057
b5ec771e
PA
6058/* Return true iff NAME encodes a name of the form prefix.PATN.
6059 Ignores any informational suffixes of NAME (i.e., for which
6060 is_name_suffix is true). Assumes that PATN is a lower-cased Ada
6061 simple name. */
73589123 6062
b5ec771e 6063static bool
73589123
PH
6064wild_match (const char *name, const char *patn)
6065{
22e048c9 6066 const char *p;
73589123
PH
6067 const char *name0 = name;
6068
6069 while (1)
6070 {
6071 const char *match = name;
6072
6073 if (*name == *patn)
6074 {
6075 for (name += 1, p = patn + 1; *p != '\0'; name += 1, p += 1)
6076 if (*p != *name)
6077 break;
6078 if (*p == '\0' && is_name_suffix (name))
b5ec771e 6079 return match == name0 || is_valid_name_for_wild_match (name0);
73589123
PH
6080
6081 if (name[-1] == '_')
6082 name -= 1;
6083 }
6084 if (!advance_wild_match (&name, name0, *patn))
b5ec771e 6085 return false;
96d887e8 6086 }
96d887e8
PH
6087}
6088
b5ec771e
PA
6089/* Returns true iff symbol name SYM_NAME matches SEARCH_NAME, ignoring
6090 any trailing suffixes that encode debugging information or leading
6091 _ada_ on SYM_NAME (see is_name_suffix commentary for the debugging
6092 information that is ignored). */
40658b94 6093
b5ec771e 6094static bool
c4d840bd
PH
6095full_match (const char *sym_name, const char *search_name)
6096{
b5ec771e
PA
6097 size_t search_name_len = strlen (search_name);
6098
6099 if (strncmp (sym_name, search_name, search_name_len) == 0
6100 && is_name_suffix (sym_name + search_name_len))
6101 return true;
6102
6103 if (startswith (sym_name, "_ada_")
6104 && strncmp (sym_name + 5, search_name, search_name_len) == 0
6105 && is_name_suffix (sym_name + search_name_len + 5))
6106 return true;
c4d840bd 6107
b5ec771e
PA
6108 return false;
6109}
c4d840bd 6110
b5ec771e
PA
6111/* Add symbols from BLOCK matching LOOKUP_NAME in DOMAIN to vector
6112 *defn_symbols, updating the list of symbols in OBSTACKP (if
6113 necessary). OBJFILE is the section containing BLOCK. */
96d887e8
PH
6114
6115static void
6116ada_add_block_symbols (struct obstack *obstackp,
b5ec771e
PA
6117 const struct block *block,
6118 const lookup_name_info &lookup_name,
6119 domain_enum domain, struct objfile *objfile)
96d887e8 6120{
8157b174 6121 struct block_iterator iter;
96d887e8
PH
6122 /* A matching argument symbol, if any. */
6123 struct symbol *arg_sym;
6124 /* Set true when we find a matching non-argument symbol. */
6125 int found_sym;
6126 struct symbol *sym;
6127
6128 arg_sym = NULL;
6129 found_sym = 0;
b5ec771e
PA
6130 for (sym = block_iter_match_first (block, lookup_name, &iter);
6131 sym != NULL;
6132 sym = block_iter_match_next (lookup_name, &iter))
96d887e8 6133 {
b5ec771e
PA
6134 if (symbol_matches_domain (SYMBOL_LANGUAGE (sym),
6135 SYMBOL_DOMAIN (sym), domain))
6136 {
6137 if (SYMBOL_CLASS (sym) != LOC_UNRESOLVED)
6138 {
6139 if (SYMBOL_IS_ARGUMENT (sym))
6140 arg_sym = sym;
6141 else
6142 {
6143 found_sym = 1;
6144 add_defn_to_vec (obstackp,
6145 fixup_symbol_section (sym, objfile),
6146 block);
6147 }
6148 }
6149 }
96d887e8
PH
6150 }
6151
22cee43f
PMR
6152 /* Handle renamings. */
6153
b5ec771e 6154 if (ada_add_block_renamings (obstackp, block, lookup_name, domain))
22cee43f
PMR
6155 found_sym = 1;
6156
96d887e8
PH
6157 if (!found_sym && arg_sym != NULL)
6158 {
76a01679
JB
6159 add_defn_to_vec (obstackp,
6160 fixup_symbol_section (arg_sym, objfile),
2570f2b7 6161 block);
96d887e8
PH
6162 }
6163
b5ec771e 6164 if (!lookup_name.ada ().wild_match_p ())
96d887e8
PH
6165 {
6166 arg_sym = NULL;
6167 found_sym = 0;
b5ec771e
PA
6168 const std::string &ada_lookup_name = lookup_name.ada ().lookup_name ();
6169 const char *name = ada_lookup_name.c_str ();
6170 size_t name_len = ada_lookup_name.size ();
96d887e8
PH
6171
6172 ALL_BLOCK_SYMBOLS (block, iter, sym)
76a01679 6173 {
4186eb54
KS
6174 if (symbol_matches_domain (SYMBOL_LANGUAGE (sym),
6175 SYMBOL_DOMAIN (sym), domain))
76a01679
JB
6176 {
6177 int cmp;
6178
6179 cmp = (int) '_' - (int) SYMBOL_LINKAGE_NAME (sym)[0];
6180 if (cmp == 0)
6181 {
61012eef 6182 cmp = !startswith (SYMBOL_LINKAGE_NAME (sym), "_ada_");
76a01679
JB
6183 if (cmp == 0)
6184 cmp = strncmp (name, SYMBOL_LINKAGE_NAME (sym) + 5,
6185 name_len);
6186 }
6187
6188 if (cmp == 0
6189 && is_name_suffix (SYMBOL_LINKAGE_NAME (sym) + name_len + 5))
6190 {
2a2d4dc3
AS
6191 if (SYMBOL_CLASS (sym) != LOC_UNRESOLVED)
6192 {
6193 if (SYMBOL_IS_ARGUMENT (sym))
6194 arg_sym = sym;
6195 else
6196 {
6197 found_sym = 1;
6198 add_defn_to_vec (obstackp,
6199 fixup_symbol_section (sym, objfile),
6200 block);
6201 }
6202 }
76a01679
JB
6203 }
6204 }
76a01679 6205 }
96d887e8
PH
6206
6207 /* NOTE: This really shouldn't be needed for _ada_ symbols.
6208 They aren't parameters, right? */
6209 if (!found_sym && arg_sym != NULL)
6210 {
6211 add_defn_to_vec (obstackp,
76a01679 6212 fixup_symbol_section (arg_sym, objfile),
2570f2b7 6213 block);
96d887e8
PH
6214 }
6215 }
6216}
6217\f
41d27058
JB
6218
6219 /* Symbol Completion */
6220
b5ec771e 6221/* See symtab.h. */
41d27058 6222
b5ec771e
PA
6223bool
6224ada_lookup_name_info::matches
6225 (const char *sym_name,
6226 symbol_name_match_type match_type,
a207cff2 6227 completion_match_result *comp_match_res) const
41d27058 6228{
b5ec771e
PA
6229 bool match = false;
6230 const char *text = m_encoded_name.c_str ();
6231 size_t text_len = m_encoded_name.size ();
41d27058
JB
6232
6233 /* First, test against the fully qualified name of the symbol. */
6234
6235 if (strncmp (sym_name, text, text_len) == 0)
b5ec771e 6236 match = true;
41d27058 6237
b5ec771e 6238 if (match && !m_encoded_p)
41d27058
JB
6239 {
6240 /* One needed check before declaring a positive match is to verify
6241 that iff we are doing a verbatim match, the decoded version
6242 of the symbol name starts with '<'. Otherwise, this symbol name
6243 is not a suitable completion. */
6244 const char *sym_name_copy = sym_name;
b5ec771e 6245 bool has_angle_bracket;
41d27058
JB
6246
6247 sym_name = ada_decode (sym_name);
6248 has_angle_bracket = (sym_name[0] == '<');
b5ec771e 6249 match = (has_angle_bracket == m_verbatim_p);
41d27058
JB
6250 sym_name = sym_name_copy;
6251 }
6252
b5ec771e 6253 if (match && !m_verbatim_p)
41d27058
JB
6254 {
6255 /* When doing non-verbatim match, another check that needs to
6256 be done is to verify that the potentially matching symbol name
6257 does not include capital letters, because the ada-mode would
6258 not be able to understand these symbol names without the
6259 angle bracket notation. */
6260 const char *tmp;
6261
6262 for (tmp = sym_name; *tmp != '\0' && !isupper (*tmp); tmp++);
6263 if (*tmp != '\0')
b5ec771e 6264 match = false;
41d27058
JB
6265 }
6266
6267 /* Second: Try wild matching... */
6268
b5ec771e 6269 if (!match && m_wild_match_p)
41d27058
JB
6270 {
6271 /* Since we are doing wild matching, this means that TEXT
6272 may represent an unqualified symbol name. We therefore must
6273 also compare TEXT against the unqualified name of the symbol. */
6274 sym_name = ada_unqualified_name (ada_decode (sym_name));
6275
6276 if (strncmp (sym_name, text, text_len) == 0)
b5ec771e 6277 match = true;
41d27058
JB
6278 }
6279
b5ec771e 6280 /* Finally: If we found a match, prepare the result to return. */
41d27058
JB
6281
6282 if (!match)
b5ec771e 6283 return false;
41d27058 6284
a207cff2 6285 if (comp_match_res != NULL)
b5ec771e 6286 {
a207cff2 6287 std::string &match_str = comp_match_res->match.storage ();
41d27058 6288
b5ec771e 6289 if (!m_encoded_p)
a207cff2 6290 match_str = ada_decode (sym_name);
b5ec771e
PA
6291 else
6292 {
6293 if (m_verbatim_p)
6294 match_str = add_angle_brackets (sym_name);
6295 else
6296 match_str = sym_name;
41d27058 6297
b5ec771e 6298 }
a207cff2
PA
6299
6300 comp_match_res->set_match (match_str.c_str ());
41d27058
JB
6301 }
6302
b5ec771e 6303 return true;
41d27058
JB
6304}
6305
b5ec771e 6306/* Add the list of possible symbol names completing TEXT to TRACKER.
eb3ff9a5 6307 WORD is the entire command on which completion is made. */
41d27058 6308
eb3ff9a5
PA
6309static void
6310ada_collect_symbol_completion_matches (completion_tracker &tracker,
c6756f62 6311 complete_symbol_mode mode,
b5ec771e
PA
6312 symbol_name_match_type name_match_type,
6313 const char *text, const char *word,
eb3ff9a5 6314 enum type_code code)
41d27058 6315{
41d27058 6316 struct symbol *sym;
3977b71f 6317 const struct block *b, *surrounding_static_block = 0;
8157b174 6318 struct block_iterator iter;
41d27058 6319
2f68a895
TT
6320 gdb_assert (code == TYPE_CODE_UNDEF);
6321
1b026119 6322 lookup_name_info lookup_name (text, name_match_type, true);
41d27058
JB
6323
6324 /* First, look at the partial symtab symbols. */
14bc53a8 6325 expand_symtabs_matching (NULL,
b5ec771e
PA
6326 lookup_name,
6327 NULL,
14bc53a8
PA
6328 NULL,
6329 ALL_DOMAIN);
41d27058
JB
6330
6331 /* At this point scan through the misc symbol vectors and add each
6332 symbol you find to the list. Eventually we want to ignore
6333 anything that isn't a text symbol (everything else will be
6334 handled by the psymtab code above). */
6335
2030c079 6336 for (objfile *objfile : current_program_space->objfiles ())
5325b9bf 6337 {
7932255d 6338 for (minimal_symbol *msymbol : objfile->msymbols ())
5325b9bf
TT
6339 {
6340 QUIT;
6341
6342 if (completion_skip_symbol (mode, msymbol))
6343 continue;
6344
6345 language symbol_language = MSYMBOL_LANGUAGE (msymbol);
6346
6347 /* Ada minimal symbols won't have their language set to Ada. If
6348 we let completion_list_add_name compare using the
6349 default/C-like matcher, then when completing e.g., symbols in a
6350 package named "pck", we'd match internal Ada symbols like
6351 "pckS", which are invalid in an Ada expression, unless you wrap
6352 them in '<' '>' to request a verbatim match.
6353
6354 Unfortunately, some Ada encoded names successfully demangle as
6355 C++ symbols (using an old mangling scheme), such as "name__2Xn"
6356 -> "Xn::name(void)" and thus some Ada minimal symbols end up
6357 with the wrong language set. Paper over that issue here. */
6358 if (symbol_language == language_auto
6359 || symbol_language == language_cplus)
6360 symbol_language = language_ada;
6361
6362 completion_list_add_name (tracker,
6363 symbol_language,
6364 MSYMBOL_LINKAGE_NAME (msymbol),
6365 lookup_name, text, word);
6366 }
6367 }
41d27058
JB
6368
6369 /* Search upwards from currently selected frame (so that we can
6370 complete on local vars. */
6371
6372 for (b = get_selected_block (0); b != NULL; b = BLOCK_SUPERBLOCK (b))
6373 {
6374 if (!BLOCK_SUPERBLOCK (b))
6375 surrounding_static_block = b; /* For elmin of dups */
6376
6377 ALL_BLOCK_SYMBOLS (b, iter, sym)
6378 {
f9d67a22
PA
6379 if (completion_skip_symbol (mode, sym))
6380 continue;
6381
b5ec771e
PA
6382 completion_list_add_name (tracker,
6383 SYMBOL_LANGUAGE (sym),
6384 SYMBOL_LINKAGE_NAME (sym),
1b026119 6385 lookup_name, text, word);
41d27058
JB
6386 }
6387 }
6388
6389 /* Go through the symtabs and check the externs and statics for
43f3e411 6390 symbols which match. */
41d27058 6391
2030c079 6392 for (objfile *objfile : current_program_space->objfiles ())
41d27058 6393 {
b669c953 6394 for (compunit_symtab *s : objfile->compunits ())
d8aeb77f
TT
6395 {
6396 QUIT;
6397 b = BLOCKVECTOR_BLOCK (COMPUNIT_BLOCKVECTOR (s), GLOBAL_BLOCK);
6398 ALL_BLOCK_SYMBOLS (b, iter, sym)
6399 {
6400 if (completion_skip_symbol (mode, sym))
6401 continue;
f9d67a22 6402
d8aeb77f
TT
6403 completion_list_add_name (tracker,
6404 SYMBOL_LANGUAGE (sym),
6405 SYMBOL_LINKAGE_NAME (sym),
6406 lookup_name, text, word);
6407 }
6408 }
41d27058 6409 }
41d27058 6410
2030c079 6411 for (objfile *objfile : current_program_space->objfiles ())
d8aeb77f 6412 {
b669c953 6413 for (compunit_symtab *s : objfile->compunits ())
d8aeb77f
TT
6414 {
6415 QUIT;
6416 b = BLOCKVECTOR_BLOCK (COMPUNIT_BLOCKVECTOR (s), STATIC_BLOCK);
6417 /* Don't do this block twice. */
6418 if (b == surrounding_static_block)
6419 continue;
6420 ALL_BLOCK_SYMBOLS (b, iter, sym)
6421 {
6422 if (completion_skip_symbol (mode, sym))
6423 continue;
f9d67a22 6424
d8aeb77f
TT
6425 completion_list_add_name (tracker,
6426 SYMBOL_LANGUAGE (sym),
6427 SYMBOL_LINKAGE_NAME (sym),
6428 lookup_name, text, word);
6429 }
6430 }
41d27058 6431 }
41d27058
JB
6432}
6433
963a6417 6434 /* Field Access */
96d887e8 6435
73fb9985
JB
6436/* Return non-zero if TYPE is a pointer to the GNAT dispatch table used
6437 for tagged types. */
6438
6439static int
6440ada_is_dispatch_table_ptr_type (struct type *type)
6441{
0d5cff50 6442 const char *name;
73fb9985
JB
6443
6444 if (TYPE_CODE (type) != TYPE_CODE_PTR)
6445 return 0;
6446
6447 name = TYPE_NAME (TYPE_TARGET_TYPE (type));
6448 if (name == NULL)
6449 return 0;
6450
6451 return (strcmp (name, "ada__tags__dispatch_table") == 0);
6452}
6453
ac4a2da4
JG
6454/* Return non-zero if TYPE is an interface tag. */
6455
6456static int
6457ada_is_interface_tag (struct type *type)
6458{
6459 const char *name = TYPE_NAME (type);
6460
6461 if (name == NULL)
6462 return 0;
6463
6464 return (strcmp (name, "ada__tags__interface_tag") == 0);
6465}
6466
963a6417
PH
6467/* True if field number FIELD_NUM in struct or union type TYPE is supposed
6468 to be invisible to users. */
96d887e8 6469
963a6417
PH
6470int
6471ada_is_ignored_field (struct type *type, int field_num)
96d887e8 6472{
963a6417
PH
6473 if (field_num < 0 || field_num > TYPE_NFIELDS (type))
6474 return 1;
ffde82bf 6475
73fb9985
JB
6476 /* Check the name of that field. */
6477 {
6478 const char *name = TYPE_FIELD_NAME (type, field_num);
6479
6480 /* Anonymous field names should not be printed.
6481 brobecker/2007-02-20: I don't think this can actually happen
6482 but we don't want to print the value of annonymous fields anyway. */
6483 if (name == NULL)
6484 return 1;
6485
ffde82bf
JB
6486 /* Normally, fields whose name start with an underscore ("_")
6487 are fields that have been internally generated by the compiler,
6488 and thus should not be printed. The "_parent" field is special,
6489 however: This is a field internally generated by the compiler
6490 for tagged types, and it contains the components inherited from
6491 the parent type. This field should not be printed as is, but
6492 should not be ignored either. */
61012eef 6493 if (name[0] == '_' && !startswith (name, "_parent"))
73fb9985
JB
6494 return 1;
6495 }
6496
ac4a2da4
JG
6497 /* If this is the dispatch table of a tagged type or an interface tag,
6498 then ignore. */
73fb9985 6499 if (ada_is_tagged_type (type, 1)
ac4a2da4
JG
6500 && (ada_is_dispatch_table_ptr_type (TYPE_FIELD_TYPE (type, field_num))
6501 || ada_is_interface_tag (TYPE_FIELD_TYPE (type, field_num))))
73fb9985
JB
6502 return 1;
6503
6504 /* Not a special field, so it should not be ignored. */
6505 return 0;
963a6417 6506}
96d887e8 6507
963a6417 6508/* True iff TYPE has a tag field. If REFOK, then TYPE may also be a
0963b4bd 6509 pointer or reference type whose ultimate target has a tag field. */
96d887e8 6510
963a6417
PH
6511int
6512ada_is_tagged_type (struct type *type, int refok)
6513{
988f6b3d 6514 return (ada_lookup_struct_elt_type (type, "_tag", refok, 1) != NULL);
963a6417 6515}
96d887e8 6516
963a6417 6517/* True iff TYPE represents the type of X'Tag */
96d887e8 6518
963a6417
PH
6519int
6520ada_is_tag_type (struct type *type)
6521{
460efde1
JB
6522 type = ada_check_typedef (type);
6523
963a6417
PH
6524 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_PTR)
6525 return 0;
6526 else
96d887e8 6527 {
963a6417 6528 const char *name = ada_type_name (TYPE_TARGET_TYPE (type));
5b4ee69b 6529
963a6417
PH
6530 return (name != NULL
6531 && strcmp (name, "ada__tags__dispatch_table") == 0);
96d887e8 6532 }
96d887e8
PH
6533}
6534
963a6417 6535/* The type of the tag on VAL. */
76a01679 6536
963a6417
PH
6537struct type *
6538ada_tag_type (struct value *val)
96d887e8 6539{
988f6b3d 6540 return ada_lookup_struct_elt_type (value_type (val), "_tag", 1, 0);
963a6417 6541}
96d887e8 6542
b50d69b5
JG
6543/* Return 1 if TAG follows the old scheme for Ada tags (used for Ada 95,
6544 retired at Ada 05). */
6545
6546static int
6547is_ada95_tag (struct value *tag)
6548{
6549 return ada_value_struct_elt (tag, "tsd", 1) != NULL;
6550}
6551
963a6417 6552/* The value of the tag on VAL. */
96d887e8 6553
963a6417
PH
6554struct value *
6555ada_value_tag (struct value *val)
6556{
03ee6b2e 6557 return ada_value_struct_elt (val, "_tag", 0);
96d887e8
PH
6558}
6559
963a6417
PH
6560/* The value of the tag on the object of type TYPE whose contents are
6561 saved at VALADDR, if it is non-null, or is at memory address
0963b4bd 6562 ADDRESS. */
96d887e8 6563
963a6417 6564static struct value *
10a2c479 6565value_tag_from_contents_and_address (struct type *type,
fc1a4b47 6566 const gdb_byte *valaddr,
963a6417 6567 CORE_ADDR address)
96d887e8 6568{
b5385fc0 6569 int tag_byte_offset;
963a6417 6570 struct type *tag_type;
5b4ee69b 6571
963a6417 6572 if (find_struct_field ("_tag", type, 0, &tag_type, &tag_byte_offset,
52ce6436 6573 NULL, NULL, NULL))
96d887e8 6574 {
fc1a4b47 6575 const gdb_byte *valaddr1 = ((valaddr == NULL)
10a2c479
AC
6576 ? NULL
6577 : valaddr + tag_byte_offset);
963a6417 6578 CORE_ADDR address1 = (address == 0) ? 0 : address + tag_byte_offset;
96d887e8 6579
963a6417 6580 return value_from_contents_and_address (tag_type, valaddr1, address1);
96d887e8 6581 }
963a6417
PH
6582 return NULL;
6583}
96d887e8 6584
963a6417
PH
6585static struct type *
6586type_from_tag (struct value *tag)
6587{
6588 const char *type_name = ada_tag_name (tag);
5b4ee69b 6589
963a6417
PH
6590 if (type_name != NULL)
6591 return ada_find_any_type (ada_encode (type_name));
6592 return NULL;
6593}
96d887e8 6594
b50d69b5
JG
6595/* Given a value OBJ of a tagged type, return a value of this
6596 type at the base address of the object. The base address, as
6597 defined in Ada.Tags, it is the address of the primary tag of
6598 the object, and therefore where the field values of its full
6599 view can be fetched. */
6600
6601struct value *
6602ada_tag_value_at_base_address (struct value *obj)
6603{
b50d69b5
JG
6604 struct value *val;
6605 LONGEST offset_to_top = 0;
6606 struct type *ptr_type, *obj_type;
6607 struct value *tag;
6608 CORE_ADDR base_address;
6609
6610 obj_type = value_type (obj);
6611
6612 /* It is the responsability of the caller to deref pointers. */
6613
6614 if (TYPE_CODE (obj_type) == TYPE_CODE_PTR
6615 || TYPE_CODE (obj_type) == TYPE_CODE_REF)
6616 return obj;
6617
6618 tag = ada_value_tag (obj);
6619 if (!tag)
6620 return obj;
6621
6622 /* Base addresses only appeared with Ada 05 and multiple inheritance. */
6623
6624 if (is_ada95_tag (tag))
6625 return obj;
6626
08f49010
XR
6627 ptr_type = language_lookup_primitive_type
6628 (language_def (language_ada), target_gdbarch(), "storage_offset");
b50d69b5
JG
6629 ptr_type = lookup_pointer_type (ptr_type);
6630 val = value_cast (ptr_type, tag);
6631 if (!val)
6632 return obj;
6633
6634 /* It is perfectly possible that an exception be raised while
6635 trying to determine the base address, just like for the tag;
6636 see ada_tag_name for more details. We do not print the error
6637 message for the same reason. */
6638
a70b8144 6639 try
b50d69b5
JG
6640 {
6641 offset_to_top = value_as_long (value_ind (value_ptradd (val, -2)));
6642 }
6643
230d2906 6644 catch (const gdb_exception_error &e)
492d29ea
PA
6645 {
6646 return obj;
6647 }
b50d69b5
JG
6648
6649 /* If offset is null, nothing to do. */
6650
6651 if (offset_to_top == 0)
6652 return obj;
6653
6654 /* -1 is a special case in Ada.Tags; however, what should be done
6655 is not quite clear from the documentation. So do nothing for
6656 now. */
6657
6658 if (offset_to_top == -1)
6659 return obj;
6660
08f49010
XR
6661 /* OFFSET_TO_TOP used to be a positive value to be subtracted
6662 from the base address. This was however incompatible with
6663 C++ dispatch table: C++ uses a *negative* value to *add*
6664 to the base address. Ada's convention has therefore been
6665 changed in GNAT 19.0w 20171023: since then, C++ and Ada
6666 use the same convention. Here, we support both cases by
6667 checking the sign of OFFSET_TO_TOP. */
6668
6669 if (offset_to_top > 0)
6670 offset_to_top = -offset_to_top;
6671
6672 base_address = value_address (obj) + offset_to_top;
b50d69b5
JG
6673 tag = value_tag_from_contents_and_address (obj_type, NULL, base_address);
6674
6675 /* Make sure that we have a proper tag at the new address.
6676 Otherwise, offset_to_top is bogus (which can happen when
6677 the object is not initialized yet). */
6678
6679 if (!tag)
6680 return obj;
6681
6682 obj_type = type_from_tag (tag);
6683
6684 if (!obj_type)
6685 return obj;
6686
6687 return value_from_contents_and_address (obj_type, NULL, base_address);
6688}
6689
1b611343
JB
6690/* Return the "ada__tags__type_specific_data" type. */
6691
6692static struct type *
6693ada_get_tsd_type (struct inferior *inf)
963a6417 6694{
1b611343 6695 struct ada_inferior_data *data = get_ada_inferior_data (inf);
4c4b4cd2 6696
1b611343
JB
6697 if (data->tsd_type == 0)
6698 data->tsd_type = ada_find_any_type ("ada__tags__type_specific_data");
6699 return data->tsd_type;
6700}
529cad9c 6701
1b611343
JB
6702/* Return the TSD (type-specific data) associated to the given TAG.
6703 TAG is assumed to be the tag of a tagged-type entity.
529cad9c 6704
1b611343 6705 May return NULL if we are unable to get the TSD. */
4c4b4cd2 6706
1b611343
JB
6707static struct value *
6708ada_get_tsd_from_tag (struct value *tag)
4c4b4cd2 6709{
4c4b4cd2 6710 struct value *val;
1b611343 6711 struct type *type;
5b4ee69b 6712
1b611343
JB
6713 /* First option: The TSD is simply stored as a field of our TAG.
6714 Only older versions of GNAT would use this format, but we have
6715 to test it first, because there are no visible markers for
6716 the current approach except the absence of that field. */
529cad9c 6717
1b611343
JB
6718 val = ada_value_struct_elt (tag, "tsd", 1);
6719 if (val)
6720 return val;
e802dbe0 6721
1b611343
JB
6722 /* Try the second representation for the dispatch table (in which
6723 there is no explicit 'tsd' field in the referent of the tag pointer,
6724 and instead the tsd pointer is stored just before the dispatch
6725 table. */
e802dbe0 6726
1b611343
JB
6727 type = ada_get_tsd_type (current_inferior());
6728 if (type == NULL)
6729 return NULL;
6730 type = lookup_pointer_type (lookup_pointer_type (type));
6731 val = value_cast (type, tag);
6732 if (val == NULL)
6733 return NULL;
6734 return value_ind (value_ptradd (val, -1));
e802dbe0
JB
6735}
6736
1b611343
JB
6737/* Given the TSD of a tag (type-specific data), return a string
6738 containing the name of the associated type.
6739
6740 The returned value is good until the next call. May return NULL
6741 if we are unable to determine the tag name. */
6742
6743static char *
6744ada_tag_name_from_tsd (struct value *tsd)
529cad9c 6745{
529cad9c
PH
6746 static char name[1024];
6747 char *p;
1b611343 6748 struct value *val;
529cad9c 6749
1b611343 6750 val = ada_value_struct_elt (tsd, "expanded_name", 1);
4c4b4cd2 6751 if (val == NULL)
1b611343 6752 return NULL;
4c4b4cd2
PH
6753 read_memory_string (value_as_address (val), name, sizeof (name) - 1);
6754 for (p = name; *p != '\0'; p += 1)
6755 if (isalpha (*p))
6756 *p = tolower (*p);
1b611343 6757 return name;
4c4b4cd2
PH
6758}
6759
6760/* The type name of the dynamic type denoted by the 'tag value TAG, as
1b611343
JB
6761 a C string.
6762
6763 Return NULL if the TAG is not an Ada tag, or if we were unable to
6764 determine the name of that tag. The result is good until the next
6765 call. */
4c4b4cd2
PH
6766
6767const char *
6768ada_tag_name (struct value *tag)
6769{
1b611343 6770 char *name = NULL;
5b4ee69b 6771
df407dfe 6772 if (!ada_is_tag_type (value_type (tag)))
4c4b4cd2 6773 return NULL;
1b611343
JB
6774
6775 /* It is perfectly possible that an exception be raised while trying
6776 to determine the TAG's name, even under normal circumstances:
6777 The associated variable may be uninitialized or corrupted, for
6778 instance. We do not let any exception propagate past this point.
6779 instead we return NULL.
6780
6781 We also do not print the error message either (which often is very
6782 low-level (Eg: "Cannot read memory at 0x[...]"), but instead let
6783 the caller print a more meaningful message if necessary. */
a70b8144 6784 try
1b611343
JB
6785 {
6786 struct value *tsd = ada_get_tsd_from_tag (tag);
6787
6788 if (tsd != NULL)
6789 name = ada_tag_name_from_tsd (tsd);
6790 }
230d2906 6791 catch (const gdb_exception_error &e)
492d29ea
PA
6792 {
6793 }
1b611343
JB
6794
6795 return name;
4c4b4cd2
PH
6796}
6797
6798/* The parent type of TYPE, or NULL if none. */
14f9c5c9 6799
d2e4a39e 6800struct type *
ebf56fd3 6801ada_parent_type (struct type *type)
14f9c5c9
AS
6802{
6803 int i;
6804
61ee279c 6805 type = ada_check_typedef (type);
14f9c5c9
AS
6806
6807 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_STRUCT)
6808 return NULL;
6809
6810 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
6811 if (ada_is_parent_field (type, i))
0c1f74cf
JB
6812 {
6813 struct type *parent_type = TYPE_FIELD_TYPE (type, i);
6814
6815 /* If the _parent field is a pointer, then dereference it. */
6816 if (TYPE_CODE (parent_type) == TYPE_CODE_PTR)
6817 parent_type = TYPE_TARGET_TYPE (parent_type);
6818 /* If there is a parallel XVS type, get the actual base type. */
6819 parent_type = ada_get_base_type (parent_type);
6820
6821 return ada_check_typedef (parent_type);
6822 }
14f9c5c9
AS
6823
6824 return NULL;
6825}
6826
4c4b4cd2
PH
6827/* True iff field number FIELD_NUM of structure type TYPE contains the
6828 parent-type (inherited) fields of a derived type. Assumes TYPE is
6829 a structure type with at least FIELD_NUM+1 fields. */
14f9c5c9
AS
6830
6831int
ebf56fd3 6832ada_is_parent_field (struct type *type, int field_num)
14f9c5c9 6833{
61ee279c 6834 const char *name = TYPE_FIELD_NAME (ada_check_typedef (type), field_num);
5b4ee69b 6835
4c4b4cd2 6836 return (name != NULL
61012eef
GB
6837 && (startswith (name, "PARENT")
6838 || startswith (name, "_parent")));
14f9c5c9
AS
6839}
6840
4c4b4cd2 6841/* True iff field number FIELD_NUM of structure type TYPE is a
14f9c5c9 6842 transparent wrapper field (which should be silently traversed when doing
4c4b4cd2 6843 field selection and flattened when printing). Assumes TYPE is a
14f9c5c9 6844 structure type with at least FIELD_NUM+1 fields. Such fields are always
4c4b4cd2 6845 structures. */
14f9c5c9
AS
6846
6847int
ebf56fd3 6848ada_is_wrapper_field (struct type *type, int field_num)
14f9c5c9 6849{
d2e4a39e 6850 const char *name = TYPE_FIELD_NAME (type, field_num);
5b4ee69b 6851
dddc0e16
JB
6852 if (name != NULL && strcmp (name, "RETVAL") == 0)
6853 {
6854 /* This happens in functions with "out" or "in out" parameters
6855 which are passed by copy. For such functions, GNAT describes
6856 the function's return type as being a struct where the return
6857 value is in a field called RETVAL, and where the other "out"
6858 or "in out" parameters are fields of that struct. This is not
6859 a wrapper. */
6860 return 0;
6861 }
6862
d2e4a39e 6863 return (name != NULL
61012eef 6864 && (startswith (name, "PARENT")
4c4b4cd2 6865 || strcmp (name, "REP") == 0
61012eef 6866 || startswith (name, "_parent")
4c4b4cd2 6867 || name[0] == 'S' || name[0] == 'R' || name[0] == 'O'));
14f9c5c9
AS
6868}
6869
4c4b4cd2
PH
6870/* True iff field number FIELD_NUM of structure or union type TYPE
6871 is a variant wrapper. Assumes TYPE is a structure type with at least
6872 FIELD_NUM+1 fields. */
14f9c5c9
AS
6873
6874int
ebf56fd3 6875ada_is_variant_part (struct type *type, int field_num)
14f9c5c9 6876{
8ecb59f8
TT
6877 /* Only Ada types are eligible. */
6878 if (!ADA_TYPE_P (type))
6879 return 0;
6880
d2e4a39e 6881 struct type *field_type = TYPE_FIELD_TYPE (type, field_num);
5b4ee69b 6882
14f9c5c9 6883 return (TYPE_CODE (field_type) == TYPE_CODE_UNION
4c4b4cd2 6884 || (is_dynamic_field (type, field_num)
c3e5cd34
PH
6885 && (TYPE_CODE (TYPE_TARGET_TYPE (field_type))
6886 == TYPE_CODE_UNION)));
14f9c5c9
AS
6887}
6888
6889/* Assuming that VAR_TYPE is a variant wrapper (type of the variant part)
4c4b4cd2 6890 whose discriminants are contained in the record type OUTER_TYPE,
7c964f07
UW
6891 returns the type of the controlling discriminant for the variant.
6892 May return NULL if the type could not be found. */
14f9c5c9 6893
d2e4a39e 6894struct type *
ebf56fd3 6895ada_variant_discrim_type (struct type *var_type, struct type *outer_type)
14f9c5c9 6896{
a121b7c1 6897 const char *name = ada_variant_discrim_name (var_type);
5b4ee69b 6898
988f6b3d 6899 return ada_lookup_struct_elt_type (outer_type, name, 1, 1);
14f9c5c9
AS
6900}
6901
4c4b4cd2 6902/* Assuming that TYPE is the type of a variant wrapper, and FIELD_NUM is a
14f9c5c9 6903 valid field number within it, returns 1 iff field FIELD_NUM of TYPE
4c4b4cd2 6904 represents a 'when others' clause; otherwise 0. */
14f9c5c9
AS
6905
6906int
ebf56fd3 6907ada_is_others_clause (struct type *type, int field_num)
14f9c5c9 6908{
d2e4a39e 6909 const char *name = TYPE_FIELD_NAME (type, field_num);
5b4ee69b 6910
14f9c5c9
AS
6911 return (name != NULL && name[0] == 'O');
6912}
6913
6914/* Assuming that TYPE0 is the type of the variant part of a record,
4c4b4cd2
PH
6915 returns the name of the discriminant controlling the variant.
6916 The value is valid until the next call to ada_variant_discrim_name. */
14f9c5c9 6917
a121b7c1 6918const char *
ebf56fd3 6919ada_variant_discrim_name (struct type *type0)
14f9c5c9 6920{
d2e4a39e 6921 static char *result = NULL;
14f9c5c9 6922 static size_t result_len = 0;
d2e4a39e
AS
6923 struct type *type;
6924 const char *name;
6925 const char *discrim_end;
6926 const char *discrim_start;
14f9c5c9
AS
6927
6928 if (TYPE_CODE (type0) == TYPE_CODE_PTR)
6929 type = TYPE_TARGET_TYPE (type0);
6930 else
6931 type = type0;
6932
6933 name = ada_type_name (type);
6934
6935 if (name == NULL || name[0] == '\000')
6936 return "";
6937
6938 for (discrim_end = name + strlen (name) - 6; discrim_end != name;
6939 discrim_end -= 1)
6940 {
61012eef 6941 if (startswith (discrim_end, "___XVN"))
4c4b4cd2 6942 break;
14f9c5c9
AS
6943 }
6944 if (discrim_end == name)
6945 return "";
6946
d2e4a39e 6947 for (discrim_start = discrim_end; discrim_start != name + 3;
14f9c5c9
AS
6948 discrim_start -= 1)
6949 {
d2e4a39e 6950 if (discrim_start == name + 1)
4c4b4cd2 6951 return "";
76a01679 6952 if ((discrim_start > name + 3
61012eef 6953 && startswith (discrim_start - 3, "___"))
4c4b4cd2
PH
6954 || discrim_start[-1] == '.')
6955 break;
14f9c5c9
AS
6956 }
6957
6958 GROW_VECT (result, result_len, discrim_end - discrim_start + 1);
6959 strncpy (result, discrim_start, discrim_end - discrim_start);
d2e4a39e 6960 result[discrim_end - discrim_start] = '\0';
14f9c5c9
AS
6961 return result;
6962}
6963
4c4b4cd2
PH
6964/* Scan STR for a subtype-encoded number, beginning at position K.
6965 Put the position of the character just past the number scanned in
6966 *NEW_K, if NEW_K!=NULL. Put the scanned number in *R, if R!=NULL.
6967 Return 1 if there was a valid number at the given position, and 0
6968 otherwise. A "subtype-encoded" number consists of the absolute value
6969 in decimal, followed by the letter 'm' to indicate a negative number.
6970 Assumes 0m does not occur. */
14f9c5c9
AS
6971
6972int
d2e4a39e 6973ada_scan_number (const char str[], int k, LONGEST * R, int *new_k)
14f9c5c9
AS
6974{
6975 ULONGEST RU;
6976
d2e4a39e 6977 if (!isdigit (str[k]))
14f9c5c9
AS
6978 return 0;
6979
4c4b4cd2 6980 /* Do it the hard way so as not to make any assumption about
14f9c5c9 6981 the relationship of unsigned long (%lu scan format code) and
4c4b4cd2 6982 LONGEST. */
14f9c5c9
AS
6983 RU = 0;
6984 while (isdigit (str[k]))
6985 {
d2e4a39e 6986 RU = RU * 10 + (str[k] - '0');
14f9c5c9
AS
6987 k += 1;
6988 }
6989
d2e4a39e 6990 if (str[k] == 'm')
14f9c5c9
AS
6991 {
6992 if (R != NULL)
4c4b4cd2 6993 *R = (-(LONGEST) (RU - 1)) - 1;
14f9c5c9
AS
6994 k += 1;
6995 }
6996 else if (R != NULL)
6997 *R = (LONGEST) RU;
6998
4c4b4cd2 6999 /* NOTE on the above: Technically, C does not say what the results of
14f9c5c9
AS
7000 - (LONGEST) RU or (LONGEST) -RU are for RU == largest positive
7001 number representable as a LONGEST (although either would probably work
7002 in most implementations). When RU>0, the locution in the then branch
4c4b4cd2 7003 above is always equivalent to the negative of RU. */
14f9c5c9
AS
7004
7005 if (new_k != NULL)
7006 *new_k = k;
7007 return 1;
7008}
7009
4c4b4cd2
PH
7010/* Assuming that TYPE is a variant part wrapper type (a VARIANTS field),
7011 and FIELD_NUM is a valid field number within it, returns 1 iff VAL is
7012 in the range encoded by field FIELD_NUM of TYPE; otherwise 0. */
14f9c5c9 7013
d2e4a39e 7014int
ebf56fd3 7015ada_in_variant (LONGEST val, struct type *type, int field_num)
14f9c5c9 7016{
d2e4a39e 7017 const char *name = TYPE_FIELD_NAME (type, field_num);
14f9c5c9
AS
7018 int p;
7019
7020 p = 0;
7021 while (1)
7022 {
d2e4a39e 7023 switch (name[p])
4c4b4cd2
PH
7024 {
7025 case '\0':
7026 return 0;
7027 case 'S':
7028 {
7029 LONGEST W;
5b4ee69b 7030
4c4b4cd2
PH
7031 if (!ada_scan_number (name, p + 1, &W, &p))
7032 return 0;
7033 if (val == W)
7034 return 1;
7035 break;
7036 }
7037 case 'R':
7038 {
7039 LONGEST L, U;
5b4ee69b 7040
4c4b4cd2
PH
7041 if (!ada_scan_number (name, p + 1, &L, &p)
7042 || name[p] != 'T' || !ada_scan_number (name, p + 1, &U, &p))
7043 return 0;
7044 if (val >= L && val <= U)
7045 return 1;
7046 break;
7047 }
7048 case 'O':
7049 return 1;
7050 default:
7051 return 0;
7052 }
7053 }
7054}
7055
0963b4bd 7056/* FIXME: Lots of redundancy below. Try to consolidate. */
4c4b4cd2
PH
7057
7058/* Given a value ARG1 (offset by OFFSET bytes) of a struct or union type
7059 ARG_TYPE, extract and return the value of one of its (non-static)
7060 fields. FIELDNO says which field. Differs from value_primitive_field
7061 only in that it can handle packed values of arbitrary type. */
14f9c5c9 7062
4c4b4cd2 7063static struct value *
d2e4a39e 7064ada_value_primitive_field (struct value *arg1, int offset, int fieldno,
4c4b4cd2 7065 struct type *arg_type)
14f9c5c9 7066{
14f9c5c9
AS
7067 struct type *type;
7068
61ee279c 7069 arg_type = ada_check_typedef (arg_type);
14f9c5c9
AS
7070 type = TYPE_FIELD_TYPE (arg_type, fieldno);
7071
4504bbde
TT
7072 /* Handle packed fields. It might be that the field is not packed
7073 relative to its containing structure, but the structure itself is
7074 packed; in this case we must take the bit-field path. */
7075 if (TYPE_FIELD_BITSIZE (arg_type, fieldno) != 0 || value_bitpos (arg1) != 0)
14f9c5c9
AS
7076 {
7077 int bit_pos = TYPE_FIELD_BITPOS (arg_type, fieldno);
7078 int bit_size = TYPE_FIELD_BITSIZE (arg_type, fieldno);
d2e4a39e 7079
0fd88904 7080 return ada_value_primitive_packed_val (arg1, value_contents (arg1),
4c4b4cd2
PH
7081 offset + bit_pos / 8,
7082 bit_pos % 8, bit_size, type);
14f9c5c9
AS
7083 }
7084 else
7085 return value_primitive_field (arg1, offset, fieldno, arg_type);
7086}
7087
52ce6436
PH
7088/* Find field with name NAME in object of type TYPE. If found,
7089 set the following for each argument that is non-null:
7090 - *FIELD_TYPE_P to the field's type;
7091 - *BYTE_OFFSET_P to OFFSET + the byte offset of the field within
7092 an object of that type;
7093 - *BIT_OFFSET_P to the bit offset modulo byte size of the field;
7094 - *BIT_SIZE_P to its size in bits if the field is packed, and
7095 0 otherwise;
7096 If INDEX_P is non-null, increment *INDEX_P by the number of source-visible
7097 fields up to but not including the desired field, or by the total
7098 number of fields if not found. A NULL value of NAME never
7099 matches; the function just counts visible fields in this case.
7100
828d5846
XR
7101 Notice that we need to handle when a tagged record hierarchy
7102 has some components with the same name, like in this scenario:
7103
7104 type Top_T is tagged record
7105 N : Integer := 1;
7106 U : Integer := 974;
7107 A : Integer := 48;
7108 end record;
7109
7110 type Middle_T is new Top.Top_T with record
7111 N : Character := 'a';
7112 C : Integer := 3;
7113 end record;
7114
7115 type Bottom_T is new Middle.Middle_T with record
7116 N : Float := 4.0;
7117 C : Character := '5';
7118 X : Integer := 6;
7119 A : Character := 'J';
7120 end record;
7121
7122 Let's say we now have a variable declared and initialized as follow:
7123
7124 TC : Top_A := new Bottom_T;
7125
7126 And then we use this variable to call this function
7127
7128 procedure Assign (Obj: in out Top_T; TV : Integer);
7129
7130 as follow:
7131
7132 Assign (Top_T (B), 12);
7133
7134 Now, we're in the debugger, and we're inside that procedure
7135 then and we want to print the value of obj.c:
7136
7137 Usually, the tagged record or one of the parent type owns the
7138 component to print and there's no issue but in this particular
7139 case, what does it mean to ask for Obj.C? Since the actual
7140 type for object is type Bottom_T, it could mean two things: type
7141 component C from the Middle_T view, but also component C from
7142 Bottom_T. So in that "undefined" case, when the component is
7143 not found in the non-resolved type (which includes all the
7144 components of the parent type), then resolve it and see if we
7145 get better luck once expanded.
7146
7147 In the case of homonyms in the derived tagged type, we don't
7148 guaranty anything, and pick the one that's easiest for us
7149 to program.
7150
0963b4bd 7151 Returns 1 if found, 0 otherwise. */
52ce6436 7152
4c4b4cd2 7153static int
0d5cff50 7154find_struct_field (const char *name, struct type *type, int offset,
76a01679 7155 struct type **field_type_p,
52ce6436
PH
7156 int *byte_offset_p, int *bit_offset_p, int *bit_size_p,
7157 int *index_p)
4c4b4cd2
PH
7158{
7159 int i;
828d5846 7160 int parent_offset = -1;
4c4b4cd2 7161
61ee279c 7162 type = ada_check_typedef (type);
76a01679 7163
52ce6436
PH
7164 if (field_type_p != NULL)
7165 *field_type_p = NULL;
7166 if (byte_offset_p != NULL)
d5d6fca5 7167 *byte_offset_p = 0;
52ce6436
PH
7168 if (bit_offset_p != NULL)
7169 *bit_offset_p = 0;
7170 if (bit_size_p != NULL)
7171 *bit_size_p = 0;
7172
7173 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
4c4b4cd2
PH
7174 {
7175 int bit_pos = TYPE_FIELD_BITPOS (type, i);
7176 int fld_offset = offset + bit_pos / 8;
0d5cff50 7177 const char *t_field_name = TYPE_FIELD_NAME (type, i);
76a01679 7178
4c4b4cd2
PH
7179 if (t_field_name == NULL)
7180 continue;
7181
828d5846
XR
7182 else if (ada_is_parent_field (type, i))
7183 {
7184 /* This is a field pointing us to the parent type of a tagged
7185 type. As hinted in this function's documentation, we give
7186 preference to fields in the current record first, so what
7187 we do here is just record the index of this field before
7188 we skip it. If it turns out we couldn't find our field
7189 in the current record, then we'll get back to it and search
7190 inside it whether the field might exist in the parent. */
7191
7192 parent_offset = i;
7193 continue;
7194 }
7195
52ce6436 7196 else if (name != NULL && field_name_match (t_field_name, name))
76a01679
JB
7197 {
7198 int bit_size = TYPE_FIELD_BITSIZE (type, i);
5b4ee69b 7199
52ce6436
PH
7200 if (field_type_p != NULL)
7201 *field_type_p = TYPE_FIELD_TYPE (type, i);
7202 if (byte_offset_p != NULL)
7203 *byte_offset_p = fld_offset;
7204 if (bit_offset_p != NULL)
7205 *bit_offset_p = bit_pos % 8;
7206 if (bit_size_p != NULL)
7207 *bit_size_p = bit_size;
76a01679
JB
7208 return 1;
7209 }
4c4b4cd2
PH
7210 else if (ada_is_wrapper_field (type, i))
7211 {
52ce6436
PH
7212 if (find_struct_field (name, TYPE_FIELD_TYPE (type, i), fld_offset,
7213 field_type_p, byte_offset_p, bit_offset_p,
7214 bit_size_p, index_p))
76a01679
JB
7215 return 1;
7216 }
4c4b4cd2
PH
7217 else if (ada_is_variant_part (type, i))
7218 {
52ce6436
PH
7219 /* PNH: Wait. Do we ever execute this section, or is ARG always of
7220 fixed type?? */
4c4b4cd2 7221 int j;
52ce6436
PH
7222 struct type *field_type
7223 = ada_check_typedef (TYPE_FIELD_TYPE (type, i));
4c4b4cd2 7224
52ce6436 7225 for (j = 0; j < TYPE_NFIELDS (field_type); j += 1)
4c4b4cd2 7226 {
76a01679
JB
7227 if (find_struct_field (name, TYPE_FIELD_TYPE (field_type, j),
7228 fld_offset
7229 + TYPE_FIELD_BITPOS (field_type, j) / 8,
7230 field_type_p, byte_offset_p,
52ce6436 7231 bit_offset_p, bit_size_p, index_p))
76a01679 7232 return 1;
4c4b4cd2
PH
7233 }
7234 }
52ce6436
PH
7235 else if (index_p != NULL)
7236 *index_p += 1;
4c4b4cd2 7237 }
828d5846
XR
7238
7239 /* Field not found so far. If this is a tagged type which
7240 has a parent, try finding that field in the parent now. */
7241
7242 if (parent_offset != -1)
7243 {
7244 int bit_pos = TYPE_FIELD_BITPOS (type, parent_offset);
7245 int fld_offset = offset + bit_pos / 8;
7246
7247 if (find_struct_field (name, TYPE_FIELD_TYPE (type, parent_offset),
7248 fld_offset, field_type_p, byte_offset_p,
7249 bit_offset_p, bit_size_p, index_p))
7250 return 1;
7251 }
7252
4c4b4cd2
PH
7253 return 0;
7254}
7255
0963b4bd 7256/* Number of user-visible fields in record type TYPE. */
4c4b4cd2 7257
52ce6436
PH
7258static int
7259num_visible_fields (struct type *type)
7260{
7261 int n;
5b4ee69b 7262
52ce6436
PH
7263 n = 0;
7264 find_struct_field (NULL, type, 0, NULL, NULL, NULL, NULL, &n);
7265 return n;
7266}
14f9c5c9 7267
4c4b4cd2 7268/* Look for a field NAME in ARG. Adjust the address of ARG by OFFSET bytes,
14f9c5c9
AS
7269 and search in it assuming it has (class) type TYPE.
7270 If found, return value, else return NULL.
7271
828d5846
XR
7272 Searches recursively through wrapper fields (e.g., '_parent').
7273
7274 In the case of homonyms in the tagged types, please refer to the
7275 long explanation in find_struct_field's function documentation. */
14f9c5c9 7276
4c4b4cd2 7277static struct value *
108d56a4 7278ada_search_struct_field (const char *name, struct value *arg, int offset,
4c4b4cd2 7279 struct type *type)
14f9c5c9
AS
7280{
7281 int i;
828d5846 7282 int parent_offset = -1;
14f9c5c9 7283
5b4ee69b 7284 type = ada_check_typedef (type);
52ce6436 7285 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
14f9c5c9 7286 {
0d5cff50 7287 const char *t_field_name = TYPE_FIELD_NAME (type, i);
14f9c5c9
AS
7288
7289 if (t_field_name == NULL)
4c4b4cd2 7290 continue;
14f9c5c9 7291
828d5846
XR
7292 else if (ada_is_parent_field (type, i))
7293 {
7294 /* This is a field pointing us to the parent type of a tagged
7295 type. As hinted in this function's documentation, we give
7296 preference to fields in the current record first, so what
7297 we do here is just record the index of this field before
7298 we skip it. If it turns out we couldn't find our field
7299 in the current record, then we'll get back to it and search
7300 inside it whether the field might exist in the parent. */
7301
7302 parent_offset = i;
7303 continue;
7304 }
7305
14f9c5c9 7306 else if (field_name_match (t_field_name, name))
4c4b4cd2 7307 return ada_value_primitive_field (arg, offset, i, type);
14f9c5c9
AS
7308
7309 else if (ada_is_wrapper_field (type, i))
4c4b4cd2 7310 {
0963b4bd 7311 struct value *v = /* Do not let indent join lines here. */
06d5cf63
JB
7312 ada_search_struct_field (name, arg,
7313 offset + TYPE_FIELD_BITPOS (type, i) / 8,
7314 TYPE_FIELD_TYPE (type, i));
5b4ee69b 7315
4c4b4cd2
PH
7316 if (v != NULL)
7317 return v;
7318 }
14f9c5c9
AS
7319
7320 else if (ada_is_variant_part (type, i))
4c4b4cd2 7321 {
0963b4bd 7322 /* PNH: Do we ever get here? See find_struct_field. */
4c4b4cd2 7323 int j;
5b4ee69b
MS
7324 struct type *field_type = ada_check_typedef (TYPE_FIELD_TYPE (type,
7325 i));
4c4b4cd2
PH
7326 int var_offset = offset + TYPE_FIELD_BITPOS (type, i) / 8;
7327
52ce6436 7328 for (j = 0; j < TYPE_NFIELDS (field_type); j += 1)
4c4b4cd2 7329 {
0963b4bd
MS
7330 struct value *v = ada_search_struct_field /* Force line
7331 break. */
06d5cf63
JB
7332 (name, arg,
7333 var_offset + TYPE_FIELD_BITPOS (field_type, j) / 8,
7334 TYPE_FIELD_TYPE (field_type, j));
5b4ee69b 7335
4c4b4cd2
PH
7336 if (v != NULL)
7337 return v;
7338 }
7339 }
14f9c5c9 7340 }
828d5846
XR
7341
7342 /* Field not found so far. If this is a tagged type which
7343 has a parent, try finding that field in the parent now. */
7344
7345 if (parent_offset != -1)
7346 {
7347 struct value *v = ada_search_struct_field (
7348 name, arg, offset + TYPE_FIELD_BITPOS (type, parent_offset) / 8,
7349 TYPE_FIELD_TYPE (type, parent_offset));
7350
7351 if (v != NULL)
7352 return v;
7353 }
7354
14f9c5c9
AS
7355 return NULL;
7356}
d2e4a39e 7357
52ce6436
PH
7358static struct value *ada_index_struct_field_1 (int *, struct value *,
7359 int, struct type *);
7360
7361
7362/* Return field #INDEX in ARG, where the index is that returned by
7363 * find_struct_field through its INDEX_P argument. Adjust the address
7364 * of ARG by OFFSET bytes, and search in it assuming it has (class) type TYPE.
0963b4bd 7365 * If found, return value, else return NULL. */
52ce6436
PH
7366
7367static struct value *
7368ada_index_struct_field (int index, struct value *arg, int offset,
7369 struct type *type)
7370{
7371 return ada_index_struct_field_1 (&index, arg, offset, type);
7372}
7373
7374
7375/* Auxiliary function for ada_index_struct_field. Like
7376 * ada_index_struct_field, but takes index from *INDEX_P and modifies
0963b4bd 7377 * *INDEX_P. */
52ce6436
PH
7378
7379static struct value *
7380ada_index_struct_field_1 (int *index_p, struct value *arg, int offset,
7381 struct type *type)
7382{
7383 int i;
7384 type = ada_check_typedef (type);
7385
7386 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
7387 {
7388 if (TYPE_FIELD_NAME (type, i) == NULL)
7389 continue;
7390 else if (ada_is_wrapper_field (type, i))
7391 {
0963b4bd 7392 struct value *v = /* Do not let indent join lines here. */
52ce6436
PH
7393 ada_index_struct_field_1 (index_p, arg,
7394 offset + TYPE_FIELD_BITPOS (type, i) / 8,
7395 TYPE_FIELD_TYPE (type, i));
5b4ee69b 7396
52ce6436
PH
7397 if (v != NULL)
7398 return v;
7399 }
7400
7401 else if (ada_is_variant_part (type, i))
7402 {
7403 /* PNH: Do we ever get here? See ada_search_struct_field,
0963b4bd 7404 find_struct_field. */
52ce6436
PH
7405 error (_("Cannot assign this kind of variant record"));
7406 }
7407 else if (*index_p == 0)
7408 return ada_value_primitive_field (arg, offset, i, type);
7409 else
7410 *index_p -= 1;
7411 }
7412 return NULL;
7413}
7414
4c4b4cd2
PH
7415/* Given ARG, a value of type (pointer or reference to a)*
7416 structure/union, extract the component named NAME from the ultimate
7417 target structure/union and return it as a value with its
f5938064 7418 appropriate type.
14f9c5c9 7419
4c4b4cd2
PH
7420 The routine searches for NAME among all members of the structure itself
7421 and (recursively) among all members of any wrapper members
14f9c5c9
AS
7422 (e.g., '_parent').
7423
03ee6b2e
PH
7424 If NO_ERR, then simply return NULL in case of error, rather than
7425 calling error. */
14f9c5c9 7426
d2e4a39e 7427struct value *
a121b7c1 7428ada_value_struct_elt (struct value *arg, const char *name, int no_err)
14f9c5c9 7429{
4c4b4cd2 7430 struct type *t, *t1;
d2e4a39e 7431 struct value *v;
1f5d1570 7432 int check_tag;
14f9c5c9 7433
4c4b4cd2 7434 v = NULL;
df407dfe 7435 t1 = t = ada_check_typedef (value_type (arg));
4c4b4cd2
PH
7436 if (TYPE_CODE (t) == TYPE_CODE_REF)
7437 {
7438 t1 = TYPE_TARGET_TYPE (t);
7439 if (t1 == NULL)
03ee6b2e 7440 goto BadValue;
61ee279c 7441 t1 = ada_check_typedef (t1);
4c4b4cd2 7442 if (TYPE_CODE (t1) == TYPE_CODE_PTR)
76a01679 7443 {
994b9211 7444 arg = coerce_ref (arg);
76a01679
JB
7445 t = t1;
7446 }
4c4b4cd2 7447 }
14f9c5c9 7448
4c4b4cd2
PH
7449 while (TYPE_CODE (t) == TYPE_CODE_PTR)
7450 {
7451 t1 = TYPE_TARGET_TYPE (t);
7452 if (t1 == NULL)
03ee6b2e 7453 goto BadValue;
61ee279c 7454 t1 = ada_check_typedef (t1);
4c4b4cd2 7455 if (TYPE_CODE (t1) == TYPE_CODE_PTR)
76a01679
JB
7456 {
7457 arg = value_ind (arg);
7458 t = t1;
7459 }
4c4b4cd2 7460 else
76a01679 7461 break;
4c4b4cd2 7462 }
14f9c5c9 7463
4c4b4cd2 7464 if (TYPE_CODE (t1) != TYPE_CODE_STRUCT && TYPE_CODE (t1) != TYPE_CODE_UNION)
03ee6b2e 7465 goto BadValue;
14f9c5c9 7466
4c4b4cd2
PH
7467 if (t1 == t)
7468 v = ada_search_struct_field (name, arg, 0, t);
7469 else
7470 {
7471 int bit_offset, bit_size, byte_offset;
7472 struct type *field_type;
7473 CORE_ADDR address;
7474
76a01679 7475 if (TYPE_CODE (t) == TYPE_CODE_PTR)
b50d69b5 7476 address = value_address (ada_value_ind (arg));
4c4b4cd2 7477 else
b50d69b5 7478 address = value_address (ada_coerce_ref (arg));
14f9c5c9 7479
828d5846
XR
7480 /* Check to see if this is a tagged type. We also need to handle
7481 the case where the type is a reference to a tagged type, but
7482 we have to be careful to exclude pointers to tagged types.
7483 The latter should be shown as usual (as a pointer), whereas
7484 a reference should mostly be transparent to the user. */
7485
7486 if (ada_is_tagged_type (t1, 0)
7487 || (TYPE_CODE (t1) == TYPE_CODE_REF
7488 && ada_is_tagged_type (TYPE_TARGET_TYPE (t1), 0)))
7489 {
7490 /* We first try to find the searched field in the current type.
7491 If not found then let's look in the fixed type. */
7492
7493 if (!find_struct_field (name, t1, 0,
7494 &field_type, &byte_offset, &bit_offset,
7495 &bit_size, NULL))
1f5d1570
JG
7496 check_tag = 1;
7497 else
7498 check_tag = 0;
828d5846
XR
7499 }
7500 else
1f5d1570
JG
7501 check_tag = 0;
7502
7503 /* Convert to fixed type in all cases, so that we have proper
7504 offsets to each field in unconstrained record types. */
7505 t1 = ada_to_fixed_type (ada_get_base_type (t1), NULL,
7506 address, NULL, check_tag);
828d5846 7507
76a01679
JB
7508 if (find_struct_field (name, t1, 0,
7509 &field_type, &byte_offset, &bit_offset,
52ce6436 7510 &bit_size, NULL))
76a01679
JB
7511 {
7512 if (bit_size != 0)
7513 {
714e53ab
PH
7514 if (TYPE_CODE (t) == TYPE_CODE_REF)
7515 arg = ada_coerce_ref (arg);
7516 else
7517 arg = ada_value_ind (arg);
76a01679
JB
7518 v = ada_value_primitive_packed_val (arg, NULL, byte_offset,
7519 bit_offset, bit_size,
7520 field_type);
7521 }
7522 else
f5938064 7523 v = value_at_lazy (field_type, address + byte_offset);
76a01679
JB
7524 }
7525 }
7526
03ee6b2e
PH
7527 if (v != NULL || no_err)
7528 return v;
7529 else
323e0a4a 7530 error (_("There is no member named %s."), name);
14f9c5c9 7531
03ee6b2e
PH
7532 BadValue:
7533 if (no_err)
7534 return NULL;
7535 else
0963b4bd
MS
7536 error (_("Attempt to extract a component of "
7537 "a value that is not a record."));
14f9c5c9
AS
7538}
7539
3b4de39c 7540/* Return a string representation of type TYPE. */
99bbb428 7541
3b4de39c 7542static std::string
99bbb428
PA
7543type_as_string (struct type *type)
7544{
d7e74731 7545 string_file tmp_stream;
99bbb428 7546
d7e74731 7547 type_print (type, "", &tmp_stream, -1);
99bbb428 7548
d7e74731 7549 return std::move (tmp_stream.string ());
99bbb428
PA
7550}
7551
14f9c5c9 7552/* Given a type TYPE, look up the type of the component of type named NAME.
4c4b4cd2
PH
7553 If DISPP is non-null, add its byte displacement from the beginning of a
7554 structure (pointed to by a value) of type TYPE to *DISPP (does not
14f9c5c9
AS
7555 work for packed fields).
7556
7557 Matches any field whose name has NAME as a prefix, possibly
4c4b4cd2 7558 followed by "___".
14f9c5c9 7559
0963b4bd 7560 TYPE can be either a struct or union. If REFOK, TYPE may also
4c4b4cd2
PH
7561 be a (pointer or reference)+ to a struct or union, and the
7562 ultimate target type will be searched.
14f9c5c9
AS
7563
7564 Looks recursively into variant clauses and parent types.
7565
828d5846
XR
7566 In the case of homonyms in the tagged types, please refer to the
7567 long explanation in find_struct_field's function documentation.
7568
4c4b4cd2
PH
7569 If NOERR is nonzero, return NULL if NAME is not suitably defined or
7570 TYPE is not a type of the right kind. */
14f9c5c9 7571
4c4b4cd2 7572static struct type *
a121b7c1 7573ada_lookup_struct_elt_type (struct type *type, const char *name, int refok,
988f6b3d 7574 int noerr)
14f9c5c9
AS
7575{
7576 int i;
828d5846 7577 int parent_offset = -1;
14f9c5c9
AS
7578
7579 if (name == NULL)
7580 goto BadName;
7581
76a01679 7582 if (refok && type != NULL)
4c4b4cd2
PH
7583 while (1)
7584 {
61ee279c 7585 type = ada_check_typedef (type);
76a01679
JB
7586 if (TYPE_CODE (type) != TYPE_CODE_PTR
7587 && TYPE_CODE (type) != TYPE_CODE_REF)
7588 break;
7589 type = TYPE_TARGET_TYPE (type);
4c4b4cd2 7590 }
14f9c5c9 7591
76a01679 7592 if (type == NULL
1265e4aa
JB
7593 || (TYPE_CODE (type) != TYPE_CODE_STRUCT
7594 && TYPE_CODE (type) != TYPE_CODE_UNION))
14f9c5c9 7595 {
4c4b4cd2 7596 if (noerr)
76a01679 7597 return NULL;
99bbb428 7598
3b4de39c
PA
7599 error (_("Type %s is not a structure or union type"),
7600 type != NULL ? type_as_string (type).c_str () : _("(null)"));
14f9c5c9
AS
7601 }
7602
7603 type = to_static_fixed_type (type);
7604
7605 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
7606 {
0d5cff50 7607 const char *t_field_name = TYPE_FIELD_NAME (type, i);
14f9c5c9 7608 struct type *t;
d2e4a39e 7609
14f9c5c9 7610 if (t_field_name == NULL)
4c4b4cd2 7611 continue;
14f9c5c9 7612
828d5846
XR
7613 else if (ada_is_parent_field (type, i))
7614 {
7615 /* This is a field pointing us to the parent type of a tagged
7616 type. As hinted in this function's documentation, we give
7617 preference to fields in the current record first, so what
7618 we do here is just record the index of this field before
7619 we skip it. If it turns out we couldn't find our field
7620 in the current record, then we'll get back to it and search
7621 inside it whether the field might exist in the parent. */
7622
7623 parent_offset = i;
7624 continue;
7625 }
7626
14f9c5c9 7627 else if (field_name_match (t_field_name, name))
988f6b3d 7628 return TYPE_FIELD_TYPE (type, i);
14f9c5c9
AS
7629
7630 else if (ada_is_wrapper_field (type, i))
4c4b4cd2 7631 {
4c4b4cd2 7632 t = ada_lookup_struct_elt_type (TYPE_FIELD_TYPE (type, i), name,
988f6b3d 7633 0, 1);
4c4b4cd2 7634 if (t != NULL)
988f6b3d 7635 return t;
4c4b4cd2 7636 }
14f9c5c9
AS
7637
7638 else if (ada_is_variant_part (type, i))
4c4b4cd2
PH
7639 {
7640 int j;
5b4ee69b
MS
7641 struct type *field_type = ada_check_typedef (TYPE_FIELD_TYPE (type,
7642 i));
4c4b4cd2
PH
7643
7644 for (j = TYPE_NFIELDS (field_type) - 1; j >= 0; j -= 1)
7645 {
b1f33ddd
JB
7646 /* FIXME pnh 2008/01/26: We check for a field that is
7647 NOT wrapped in a struct, since the compiler sometimes
7648 generates these for unchecked variant types. Revisit
0963b4bd 7649 if the compiler changes this practice. */
0d5cff50 7650 const char *v_field_name = TYPE_FIELD_NAME (field_type, j);
988f6b3d 7651
b1f33ddd
JB
7652 if (v_field_name != NULL
7653 && field_name_match (v_field_name, name))
460efde1 7654 t = TYPE_FIELD_TYPE (field_type, j);
b1f33ddd 7655 else
0963b4bd
MS
7656 t = ada_lookup_struct_elt_type (TYPE_FIELD_TYPE (field_type,
7657 j),
988f6b3d 7658 name, 0, 1);
b1f33ddd 7659
4c4b4cd2 7660 if (t != NULL)
988f6b3d 7661 return t;
4c4b4cd2
PH
7662 }
7663 }
14f9c5c9
AS
7664
7665 }
7666
828d5846
XR
7667 /* Field not found so far. If this is a tagged type which
7668 has a parent, try finding that field in the parent now. */
7669
7670 if (parent_offset != -1)
7671 {
7672 struct type *t;
7673
7674 t = ada_lookup_struct_elt_type (TYPE_FIELD_TYPE (type, parent_offset),
7675 name, 0, 1);
7676 if (t != NULL)
7677 return t;
7678 }
7679
14f9c5c9 7680BadName:
d2e4a39e 7681 if (!noerr)
14f9c5c9 7682 {
2b2798cc 7683 const char *name_str = name != NULL ? name : _("<null>");
99bbb428
PA
7684
7685 error (_("Type %s has no component named %s"),
3b4de39c 7686 type_as_string (type).c_str (), name_str);
14f9c5c9
AS
7687 }
7688
7689 return NULL;
7690}
7691
b1f33ddd
JB
7692/* Assuming that VAR_TYPE is the type of a variant part of a record (a union),
7693 within a value of type OUTER_TYPE, return true iff VAR_TYPE
7694 represents an unchecked union (that is, the variant part of a
0963b4bd 7695 record that is named in an Unchecked_Union pragma). */
b1f33ddd
JB
7696
7697static int
7698is_unchecked_variant (struct type *var_type, struct type *outer_type)
7699{
a121b7c1 7700 const char *discrim_name = ada_variant_discrim_name (var_type);
5b4ee69b 7701
988f6b3d 7702 return (ada_lookup_struct_elt_type (outer_type, discrim_name, 0, 1) == NULL);
b1f33ddd
JB
7703}
7704
7705
14f9c5c9
AS
7706/* Assuming that VAR_TYPE is the type of a variant part of a record (a union),
7707 within a value of type OUTER_TYPE that is stored in GDB at
4c4b4cd2
PH
7708 OUTER_VALADDR, determine which variant clause (field number in VAR_TYPE,
7709 numbering from 0) is applicable. Returns -1 if none are. */
14f9c5c9 7710
d2e4a39e 7711int
ebf56fd3 7712ada_which_variant_applies (struct type *var_type, struct type *outer_type,
fc1a4b47 7713 const gdb_byte *outer_valaddr)
14f9c5c9
AS
7714{
7715 int others_clause;
7716 int i;
a121b7c1 7717 const char *discrim_name = ada_variant_discrim_name (var_type);
0c281816
JB
7718 struct value *outer;
7719 struct value *discrim;
14f9c5c9
AS
7720 LONGEST discrim_val;
7721
012370f6
TT
7722 /* Using plain value_from_contents_and_address here causes problems
7723 because we will end up trying to resolve a type that is currently
7724 being constructed. */
7725 outer = value_from_contents_and_address_unresolved (outer_type,
7726 outer_valaddr, 0);
0c281816
JB
7727 discrim = ada_value_struct_elt (outer, discrim_name, 1);
7728 if (discrim == NULL)
14f9c5c9 7729 return -1;
0c281816 7730 discrim_val = value_as_long (discrim);
14f9c5c9
AS
7731
7732 others_clause = -1;
7733 for (i = 0; i < TYPE_NFIELDS (var_type); i += 1)
7734 {
7735 if (ada_is_others_clause (var_type, i))
4c4b4cd2 7736 others_clause = i;
14f9c5c9 7737 else if (ada_in_variant (discrim_val, var_type, i))
4c4b4cd2 7738 return i;
14f9c5c9
AS
7739 }
7740
7741 return others_clause;
7742}
d2e4a39e 7743\f
14f9c5c9
AS
7744
7745
4c4b4cd2 7746 /* Dynamic-Sized Records */
14f9c5c9
AS
7747
7748/* Strategy: The type ostensibly attached to a value with dynamic size
7749 (i.e., a size that is not statically recorded in the debugging
7750 data) does not accurately reflect the size or layout of the value.
7751 Our strategy is to convert these values to values with accurate,
4c4b4cd2 7752 conventional types that are constructed on the fly. */
14f9c5c9
AS
7753
7754/* There is a subtle and tricky problem here. In general, we cannot
7755 determine the size of dynamic records without its data. However,
7756 the 'struct value' data structure, which GDB uses to represent
7757 quantities in the inferior process (the target), requires the size
7758 of the type at the time of its allocation in order to reserve space
7759 for GDB's internal copy of the data. That's why the
7760 'to_fixed_xxx_type' routines take (target) addresses as parameters,
4c4b4cd2 7761 rather than struct value*s.
14f9c5c9
AS
7762
7763 However, GDB's internal history variables ($1, $2, etc.) are
7764 struct value*s containing internal copies of the data that are not, in
7765 general, the same as the data at their corresponding addresses in
7766 the target. Fortunately, the types we give to these values are all
7767 conventional, fixed-size types (as per the strategy described
7768 above), so that we don't usually have to perform the
7769 'to_fixed_xxx_type' conversions to look at their values.
7770 Unfortunately, there is one exception: if one of the internal
7771 history variables is an array whose elements are unconstrained
7772 records, then we will need to create distinct fixed types for each
7773 element selected. */
7774
7775/* The upshot of all of this is that many routines take a (type, host
7776 address, target address) triple as arguments to represent a value.
7777 The host address, if non-null, is supposed to contain an internal
7778 copy of the relevant data; otherwise, the program is to consult the
4c4b4cd2 7779 target at the target address. */
14f9c5c9
AS
7780
7781/* Assuming that VAL0 represents a pointer value, the result of
7782 dereferencing it. Differs from value_ind in its treatment of
4c4b4cd2 7783 dynamic-sized types. */
14f9c5c9 7784
d2e4a39e
AS
7785struct value *
7786ada_value_ind (struct value *val0)
14f9c5c9 7787{
c48db5ca 7788 struct value *val = value_ind (val0);
5b4ee69b 7789
b50d69b5
JG
7790 if (ada_is_tagged_type (value_type (val), 0))
7791 val = ada_tag_value_at_base_address (val);
7792
4c4b4cd2 7793 return ada_to_fixed_value (val);
14f9c5c9
AS
7794}
7795
7796/* The value resulting from dereferencing any "reference to"
4c4b4cd2
PH
7797 qualifiers on VAL0. */
7798
d2e4a39e
AS
7799static struct value *
7800ada_coerce_ref (struct value *val0)
7801{
df407dfe 7802 if (TYPE_CODE (value_type (val0)) == TYPE_CODE_REF)
d2e4a39e
AS
7803 {
7804 struct value *val = val0;
5b4ee69b 7805
994b9211 7806 val = coerce_ref (val);
b50d69b5
JG
7807
7808 if (ada_is_tagged_type (value_type (val), 0))
7809 val = ada_tag_value_at_base_address (val);
7810
4c4b4cd2 7811 return ada_to_fixed_value (val);
d2e4a39e
AS
7812 }
7813 else
14f9c5c9
AS
7814 return val0;
7815}
7816
7817/* Return OFF rounded upward if necessary to a multiple of
4c4b4cd2 7818 ALIGNMENT (a power of 2). */
14f9c5c9
AS
7819
7820static unsigned int
ebf56fd3 7821align_value (unsigned int off, unsigned int alignment)
14f9c5c9
AS
7822{
7823 return (off + alignment - 1) & ~(alignment - 1);
7824}
7825
4c4b4cd2 7826/* Return the bit alignment required for field #F of template type TYPE. */
14f9c5c9
AS
7827
7828static unsigned int
ebf56fd3 7829field_alignment (struct type *type, int f)
14f9c5c9 7830{
d2e4a39e 7831 const char *name = TYPE_FIELD_NAME (type, f);
64a1bf19 7832 int len;
14f9c5c9
AS
7833 int align_offset;
7834
64a1bf19
JB
7835 /* The field name should never be null, unless the debugging information
7836 is somehow malformed. In this case, we assume the field does not
7837 require any alignment. */
7838 if (name == NULL)
7839 return 1;
7840
7841 len = strlen (name);
7842
4c4b4cd2
PH
7843 if (!isdigit (name[len - 1]))
7844 return 1;
14f9c5c9 7845
d2e4a39e 7846 if (isdigit (name[len - 2]))
14f9c5c9
AS
7847 align_offset = len - 2;
7848 else
7849 align_offset = len - 1;
7850
61012eef 7851 if (align_offset < 7 || !startswith (name + align_offset - 6, "___XV"))
14f9c5c9
AS
7852 return TARGET_CHAR_BIT;
7853
4c4b4cd2
PH
7854 return atoi (name + align_offset) * TARGET_CHAR_BIT;
7855}
7856
852dff6c 7857/* Find a typedef or tag symbol named NAME. Ignores ambiguity. */
4c4b4cd2 7858
852dff6c
JB
7859static struct symbol *
7860ada_find_any_type_symbol (const char *name)
4c4b4cd2
PH
7861{
7862 struct symbol *sym;
7863
7864 sym = standard_lookup (name, get_selected_block (NULL), VAR_DOMAIN);
4186eb54 7865 if (sym != NULL && SYMBOL_CLASS (sym) == LOC_TYPEDEF)
4c4b4cd2
PH
7866 return sym;
7867
4186eb54
KS
7868 sym = standard_lookup (name, NULL, STRUCT_DOMAIN);
7869 return sym;
14f9c5c9
AS
7870}
7871
dddfab26
UW
7872/* Find a type named NAME. Ignores ambiguity. This routine will look
7873 solely for types defined by debug info, it will not search the GDB
7874 primitive types. */
4c4b4cd2 7875
852dff6c 7876static struct type *
ebf56fd3 7877ada_find_any_type (const char *name)
14f9c5c9 7878{
852dff6c 7879 struct symbol *sym = ada_find_any_type_symbol (name);
14f9c5c9 7880
14f9c5c9 7881 if (sym != NULL)
dddfab26 7882 return SYMBOL_TYPE (sym);
14f9c5c9 7883
dddfab26 7884 return NULL;
14f9c5c9
AS
7885}
7886
739593e0
JB
7887/* Given NAME_SYM and an associated BLOCK, find a "renaming" symbol
7888 associated with NAME_SYM's name. NAME_SYM may itself be a renaming
7889 symbol, in which case it is returned. Otherwise, this looks for
7890 symbols whose name is that of NAME_SYM suffixed with "___XR".
7891 Return symbol if found, and NULL otherwise. */
4c4b4cd2 7892
c0e70c62
TT
7893static bool
7894ada_is_renaming_symbol (struct symbol *name_sym)
aeb5907d 7895{
739593e0 7896 const char *name = SYMBOL_LINKAGE_NAME (name_sym);
c0e70c62 7897 return strstr (name, "___XR") != NULL;
4c4b4cd2
PH
7898}
7899
14f9c5c9 7900/* Because of GNAT encoding conventions, several GDB symbols may match a
4c4b4cd2 7901 given type name. If the type denoted by TYPE0 is to be preferred to
14f9c5c9 7902 that of TYPE1 for purposes of type printing, return non-zero;
4c4b4cd2
PH
7903 otherwise return 0. */
7904
14f9c5c9 7905int
d2e4a39e 7906ada_prefer_type (struct type *type0, struct type *type1)
14f9c5c9
AS
7907{
7908 if (type1 == NULL)
7909 return 1;
7910 else if (type0 == NULL)
7911 return 0;
7912 else if (TYPE_CODE (type1) == TYPE_CODE_VOID)
7913 return 1;
7914 else if (TYPE_CODE (type0) == TYPE_CODE_VOID)
7915 return 0;
4c4b4cd2
PH
7916 else if (TYPE_NAME (type1) == NULL && TYPE_NAME (type0) != NULL)
7917 return 1;
ad82864c 7918 else if (ada_is_constrained_packed_array_type (type0))
14f9c5c9 7919 return 1;
4c4b4cd2
PH
7920 else if (ada_is_array_descriptor_type (type0)
7921 && !ada_is_array_descriptor_type (type1))
14f9c5c9 7922 return 1;
aeb5907d
JB
7923 else
7924 {
a737d952
TT
7925 const char *type0_name = TYPE_NAME (type0);
7926 const char *type1_name = TYPE_NAME (type1);
aeb5907d
JB
7927
7928 if (type0_name != NULL && strstr (type0_name, "___XR") != NULL
7929 && (type1_name == NULL || strstr (type1_name, "___XR") == NULL))
7930 return 1;
7931 }
14f9c5c9
AS
7932 return 0;
7933}
7934
e86ca25f
TT
7935/* The name of TYPE, which is its TYPE_NAME. Null if TYPE is
7936 null. */
4c4b4cd2 7937
0d5cff50 7938const char *
d2e4a39e 7939ada_type_name (struct type *type)
14f9c5c9 7940{
d2e4a39e 7941 if (type == NULL)
14f9c5c9 7942 return NULL;
e86ca25f 7943 return TYPE_NAME (type);
14f9c5c9
AS
7944}
7945
b4ba55a1
JB
7946/* Search the list of "descriptive" types associated to TYPE for a type
7947 whose name is NAME. */
7948
7949static struct type *
7950find_parallel_type_by_descriptive_type (struct type *type, const char *name)
7951{
931e5bc3 7952 struct type *result, *tmp;
b4ba55a1 7953
c6044dd1
JB
7954 if (ada_ignore_descriptive_types_p)
7955 return NULL;
7956
b4ba55a1
JB
7957 /* If there no descriptive-type info, then there is no parallel type
7958 to be found. */
7959 if (!HAVE_GNAT_AUX_INFO (type))
7960 return NULL;
7961
7962 result = TYPE_DESCRIPTIVE_TYPE (type);
7963 while (result != NULL)
7964 {
0d5cff50 7965 const char *result_name = ada_type_name (result);
b4ba55a1
JB
7966
7967 if (result_name == NULL)
7968 {
7969 warning (_("unexpected null name on descriptive type"));
7970 return NULL;
7971 }
7972
7973 /* If the names match, stop. */
7974 if (strcmp (result_name, name) == 0)
7975 break;
7976
7977 /* Otherwise, look at the next item on the list, if any. */
7978 if (HAVE_GNAT_AUX_INFO (result))
931e5bc3
JG
7979 tmp = TYPE_DESCRIPTIVE_TYPE (result);
7980 else
7981 tmp = NULL;
7982
7983 /* If not found either, try after having resolved the typedef. */
7984 if (tmp != NULL)
7985 result = tmp;
b4ba55a1 7986 else
931e5bc3 7987 {
f168693b 7988 result = check_typedef (result);
931e5bc3
JG
7989 if (HAVE_GNAT_AUX_INFO (result))
7990 result = TYPE_DESCRIPTIVE_TYPE (result);
7991 else
7992 result = NULL;
7993 }
b4ba55a1
JB
7994 }
7995
7996 /* If we didn't find a match, see whether this is a packed array. With
7997 older compilers, the descriptive type information is either absent or
7998 irrelevant when it comes to packed arrays so the above lookup fails.
7999 Fall back to using a parallel lookup by name in this case. */
12ab9e09 8000 if (result == NULL && ada_is_constrained_packed_array_type (type))
b4ba55a1
JB
8001 return ada_find_any_type (name);
8002
8003 return result;
8004}
8005
8006/* Find a parallel type to TYPE with the specified NAME, using the
8007 descriptive type taken from the debugging information, if available,
8008 and otherwise using the (slower) name-based method. */
8009
8010static struct type *
8011ada_find_parallel_type_with_name (struct type *type, const char *name)
8012{
8013 struct type *result = NULL;
8014
8015 if (HAVE_GNAT_AUX_INFO (type))
8016 result = find_parallel_type_by_descriptive_type (type, name);
8017 else
8018 result = ada_find_any_type (name);
8019
8020 return result;
8021}
8022
8023/* Same as above, but specify the name of the parallel type by appending
4c4b4cd2 8024 SUFFIX to the name of TYPE. */
14f9c5c9 8025
d2e4a39e 8026struct type *
ebf56fd3 8027ada_find_parallel_type (struct type *type, const char *suffix)
14f9c5c9 8028{
0d5cff50 8029 char *name;
fe978cb0 8030 const char *type_name = ada_type_name (type);
14f9c5c9 8031 int len;
d2e4a39e 8032
fe978cb0 8033 if (type_name == NULL)
14f9c5c9
AS
8034 return NULL;
8035
fe978cb0 8036 len = strlen (type_name);
14f9c5c9 8037
b4ba55a1 8038 name = (char *) alloca (len + strlen (suffix) + 1);
14f9c5c9 8039
fe978cb0 8040 strcpy (name, type_name);
14f9c5c9
AS
8041 strcpy (name + len, suffix);
8042
b4ba55a1 8043 return ada_find_parallel_type_with_name (type, name);
14f9c5c9
AS
8044}
8045
14f9c5c9 8046/* If TYPE is a variable-size record type, return the corresponding template
4c4b4cd2 8047 type describing its fields. Otherwise, return NULL. */
14f9c5c9 8048
d2e4a39e
AS
8049static struct type *
8050dynamic_template_type (struct type *type)
14f9c5c9 8051{
61ee279c 8052 type = ada_check_typedef (type);
14f9c5c9
AS
8053
8054 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_STRUCT
d2e4a39e 8055 || ada_type_name (type) == NULL)
14f9c5c9 8056 return NULL;
d2e4a39e 8057 else
14f9c5c9
AS
8058 {
8059 int len = strlen (ada_type_name (type));
5b4ee69b 8060
4c4b4cd2
PH
8061 if (len > 6 && strcmp (ada_type_name (type) + len - 6, "___XVE") == 0)
8062 return type;
14f9c5c9 8063 else
4c4b4cd2 8064 return ada_find_parallel_type (type, "___XVE");
14f9c5c9
AS
8065 }
8066}
8067
8068/* Assuming that TEMPL_TYPE is a union or struct type, returns
4c4b4cd2 8069 non-zero iff field FIELD_NUM of TEMPL_TYPE has dynamic size. */
14f9c5c9 8070
d2e4a39e
AS
8071static int
8072is_dynamic_field (struct type *templ_type, int field_num)
14f9c5c9
AS
8073{
8074 const char *name = TYPE_FIELD_NAME (templ_type, field_num);
5b4ee69b 8075
d2e4a39e 8076 return name != NULL
14f9c5c9
AS
8077 && TYPE_CODE (TYPE_FIELD_TYPE (templ_type, field_num)) == TYPE_CODE_PTR
8078 && strstr (name, "___XVL") != NULL;
8079}
8080
4c4b4cd2
PH
8081/* The index of the variant field of TYPE, or -1 if TYPE does not
8082 represent a variant record type. */
14f9c5c9 8083
d2e4a39e 8084static int
4c4b4cd2 8085variant_field_index (struct type *type)
14f9c5c9
AS
8086{
8087 int f;
8088
4c4b4cd2
PH
8089 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_STRUCT)
8090 return -1;
8091
8092 for (f = 0; f < TYPE_NFIELDS (type); f += 1)
8093 {
8094 if (ada_is_variant_part (type, f))
8095 return f;
8096 }
8097 return -1;
14f9c5c9
AS
8098}
8099
4c4b4cd2
PH
8100/* A record type with no fields. */
8101
d2e4a39e 8102static struct type *
fe978cb0 8103empty_record (struct type *templ)
14f9c5c9 8104{
fe978cb0 8105 struct type *type = alloc_type_copy (templ);
5b4ee69b 8106
14f9c5c9
AS
8107 TYPE_CODE (type) = TYPE_CODE_STRUCT;
8108 TYPE_NFIELDS (type) = 0;
8109 TYPE_FIELDS (type) = NULL;
8ecb59f8 8110 INIT_NONE_SPECIFIC (type);
14f9c5c9 8111 TYPE_NAME (type) = "<empty>";
14f9c5c9
AS
8112 TYPE_LENGTH (type) = 0;
8113 return type;
8114}
8115
8116/* An ordinary record type (with fixed-length fields) that describes
4c4b4cd2
PH
8117 the value of type TYPE at VALADDR or ADDRESS (see comments at
8118 the beginning of this section) VAL according to GNAT conventions.
8119 DVAL0 should describe the (portion of a) record that contains any
df407dfe 8120 necessary discriminants. It should be NULL if value_type (VAL) is
14f9c5c9
AS
8121 an outer-level type (i.e., as opposed to a branch of a variant.) A
8122 variant field (unless unchecked) is replaced by a particular branch
4c4b4cd2 8123 of the variant.
14f9c5c9 8124
4c4b4cd2
PH
8125 If not KEEP_DYNAMIC_FIELDS, then all fields whose position or
8126 length are not statically known are discarded. As a consequence,
8127 VALADDR, ADDRESS and DVAL0 are ignored.
8128
8129 NOTE: Limitations: For now, we assume that dynamic fields and
8130 variants occupy whole numbers of bytes. However, they need not be
8131 byte-aligned. */
8132
8133struct type *
10a2c479 8134ada_template_to_fixed_record_type_1 (struct type *type,
fc1a4b47 8135 const gdb_byte *valaddr,
4c4b4cd2
PH
8136 CORE_ADDR address, struct value *dval0,
8137 int keep_dynamic_fields)
14f9c5c9 8138{
d2e4a39e
AS
8139 struct value *mark = value_mark ();
8140 struct value *dval;
8141 struct type *rtype;
14f9c5c9 8142 int nfields, bit_len;
4c4b4cd2 8143 int variant_field;
14f9c5c9 8144 long off;
d94e4f4f 8145 int fld_bit_len;
14f9c5c9
AS
8146 int f;
8147
4c4b4cd2
PH
8148 /* Compute the number of fields in this record type that are going
8149 to be processed: unless keep_dynamic_fields, this includes only
8150 fields whose position and length are static will be processed. */
8151 if (keep_dynamic_fields)
8152 nfields = TYPE_NFIELDS (type);
8153 else
8154 {
8155 nfields = 0;
76a01679 8156 while (nfields < TYPE_NFIELDS (type)
4c4b4cd2
PH
8157 && !ada_is_variant_part (type, nfields)
8158 && !is_dynamic_field (type, nfields))
8159 nfields++;
8160 }
8161
e9bb382b 8162 rtype = alloc_type_copy (type);
14f9c5c9 8163 TYPE_CODE (rtype) = TYPE_CODE_STRUCT;
8ecb59f8 8164 INIT_NONE_SPECIFIC (rtype);
14f9c5c9 8165 TYPE_NFIELDS (rtype) = nfields;
d2e4a39e 8166 TYPE_FIELDS (rtype) = (struct field *)
14f9c5c9
AS
8167 TYPE_ALLOC (rtype, nfields * sizeof (struct field));
8168 memset (TYPE_FIELDS (rtype), 0, sizeof (struct field) * nfields);
8169 TYPE_NAME (rtype) = ada_type_name (type);
876cecd0 8170 TYPE_FIXED_INSTANCE (rtype) = 1;
14f9c5c9 8171
d2e4a39e
AS
8172 off = 0;
8173 bit_len = 0;
4c4b4cd2
PH
8174 variant_field = -1;
8175
14f9c5c9
AS
8176 for (f = 0; f < nfields; f += 1)
8177 {
6c038f32
PH
8178 off = align_value (off, field_alignment (type, f))
8179 + TYPE_FIELD_BITPOS (type, f);
945b3a32 8180 SET_FIELD_BITPOS (TYPE_FIELD (rtype, f), off);
d2e4a39e 8181 TYPE_FIELD_BITSIZE (rtype, f) = 0;
14f9c5c9 8182
d2e4a39e 8183 if (ada_is_variant_part (type, f))
4c4b4cd2
PH
8184 {
8185 variant_field = f;
d94e4f4f 8186 fld_bit_len = 0;
4c4b4cd2 8187 }
14f9c5c9 8188 else if (is_dynamic_field (type, f))
4c4b4cd2 8189 {
284614f0
JB
8190 const gdb_byte *field_valaddr = valaddr;
8191 CORE_ADDR field_address = address;
8192 struct type *field_type =
8193 TYPE_TARGET_TYPE (TYPE_FIELD_TYPE (type, f));
8194
4c4b4cd2 8195 if (dval0 == NULL)
b5304971
JG
8196 {
8197 /* rtype's length is computed based on the run-time
8198 value of discriminants. If the discriminants are not
8199 initialized, the type size may be completely bogus and
0963b4bd 8200 GDB may fail to allocate a value for it. So check the
b5304971 8201 size first before creating the value. */
c1b5a1a6 8202 ada_ensure_varsize_limit (rtype);
012370f6
TT
8203 /* Using plain value_from_contents_and_address here
8204 causes problems because we will end up trying to
8205 resolve a type that is currently being
8206 constructed. */
8207 dval = value_from_contents_and_address_unresolved (rtype,
8208 valaddr,
8209 address);
9f1f738a 8210 rtype = value_type (dval);
b5304971 8211 }
4c4b4cd2
PH
8212 else
8213 dval = dval0;
8214
284614f0
JB
8215 /* If the type referenced by this field is an aligner type, we need
8216 to unwrap that aligner type, because its size might not be set.
8217 Keeping the aligner type would cause us to compute the wrong
8218 size for this field, impacting the offset of the all the fields
8219 that follow this one. */
8220 if (ada_is_aligner_type (field_type))
8221 {
8222 long field_offset = TYPE_FIELD_BITPOS (field_type, f);
8223
8224 field_valaddr = cond_offset_host (field_valaddr, field_offset);
8225 field_address = cond_offset_target (field_address, field_offset);
8226 field_type = ada_aligned_type (field_type);
8227 }
8228
8229 field_valaddr = cond_offset_host (field_valaddr,
8230 off / TARGET_CHAR_BIT);
8231 field_address = cond_offset_target (field_address,
8232 off / TARGET_CHAR_BIT);
8233
8234 /* Get the fixed type of the field. Note that, in this case,
8235 we do not want to get the real type out of the tag: if
8236 the current field is the parent part of a tagged record,
8237 we will get the tag of the object. Clearly wrong: the real
8238 type of the parent is not the real type of the child. We
8239 would end up in an infinite loop. */
8240 field_type = ada_get_base_type (field_type);
8241 field_type = ada_to_fixed_type (field_type, field_valaddr,
8242 field_address, dval, 0);
27f2a97b
JB
8243 /* If the field size is already larger than the maximum
8244 object size, then the record itself will necessarily
8245 be larger than the maximum object size. We need to make
8246 this check now, because the size might be so ridiculously
8247 large (due to an uninitialized variable in the inferior)
8248 that it would cause an overflow when adding it to the
8249 record size. */
c1b5a1a6 8250 ada_ensure_varsize_limit (field_type);
284614f0
JB
8251
8252 TYPE_FIELD_TYPE (rtype, f) = field_type;
4c4b4cd2 8253 TYPE_FIELD_NAME (rtype, f) = TYPE_FIELD_NAME (type, f);
27f2a97b
JB
8254 /* The multiplication can potentially overflow. But because
8255 the field length has been size-checked just above, and
8256 assuming that the maximum size is a reasonable value,
8257 an overflow should not happen in practice. So rather than
8258 adding overflow recovery code to this already complex code,
8259 we just assume that it's not going to happen. */
d94e4f4f 8260 fld_bit_len =
4c4b4cd2
PH
8261 TYPE_LENGTH (TYPE_FIELD_TYPE (rtype, f)) * TARGET_CHAR_BIT;
8262 }
14f9c5c9 8263 else
4c4b4cd2 8264 {
5ded5331
JB
8265 /* Note: If this field's type is a typedef, it is important
8266 to preserve the typedef layer.
8267
8268 Otherwise, we might be transforming a typedef to a fat
8269 pointer (encoding a pointer to an unconstrained array),
8270 into a basic fat pointer (encoding an unconstrained
8271 array). As both types are implemented using the same
8272 structure, the typedef is the only clue which allows us
8273 to distinguish between the two options. Stripping it
8274 would prevent us from printing this field appropriately. */
8275 TYPE_FIELD_TYPE (rtype, f) = TYPE_FIELD_TYPE (type, f);
4c4b4cd2
PH
8276 TYPE_FIELD_NAME (rtype, f) = TYPE_FIELD_NAME (type, f);
8277 if (TYPE_FIELD_BITSIZE (type, f) > 0)
d94e4f4f 8278 fld_bit_len =
4c4b4cd2
PH
8279 TYPE_FIELD_BITSIZE (rtype, f) = TYPE_FIELD_BITSIZE (type, f);
8280 else
5ded5331
JB
8281 {
8282 struct type *field_type = TYPE_FIELD_TYPE (type, f);
8283
8284 /* We need to be careful of typedefs when computing
8285 the length of our field. If this is a typedef,
8286 get the length of the target type, not the length
8287 of the typedef. */
8288 if (TYPE_CODE (field_type) == TYPE_CODE_TYPEDEF)
8289 field_type = ada_typedef_target_type (field_type);
8290
8291 fld_bit_len =
8292 TYPE_LENGTH (ada_check_typedef (field_type)) * TARGET_CHAR_BIT;
8293 }
4c4b4cd2 8294 }
14f9c5c9 8295 if (off + fld_bit_len > bit_len)
4c4b4cd2 8296 bit_len = off + fld_bit_len;
d94e4f4f 8297 off += fld_bit_len;
4c4b4cd2
PH
8298 TYPE_LENGTH (rtype) =
8299 align_value (bit_len, TARGET_CHAR_BIT) / TARGET_CHAR_BIT;
14f9c5c9 8300 }
4c4b4cd2
PH
8301
8302 /* We handle the variant part, if any, at the end because of certain
b1f33ddd 8303 odd cases in which it is re-ordered so as NOT to be the last field of
4c4b4cd2
PH
8304 the record. This can happen in the presence of representation
8305 clauses. */
8306 if (variant_field >= 0)
8307 {
8308 struct type *branch_type;
8309
8310 off = TYPE_FIELD_BITPOS (rtype, variant_field);
8311
8312 if (dval0 == NULL)
9f1f738a 8313 {
012370f6
TT
8314 /* Using plain value_from_contents_and_address here causes
8315 problems because we will end up trying to resolve a type
8316 that is currently being constructed. */
8317 dval = value_from_contents_and_address_unresolved (rtype, valaddr,
8318 address);
9f1f738a
SA
8319 rtype = value_type (dval);
8320 }
4c4b4cd2
PH
8321 else
8322 dval = dval0;
8323
8324 branch_type =
8325 to_fixed_variant_branch_type
8326 (TYPE_FIELD_TYPE (type, variant_field),
8327 cond_offset_host (valaddr, off / TARGET_CHAR_BIT),
8328 cond_offset_target (address, off / TARGET_CHAR_BIT), dval);
8329 if (branch_type == NULL)
8330 {
8331 for (f = variant_field + 1; f < TYPE_NFIELDS (rtype); f += 1)
8332 TYPE_FIELDS (rtype)[f - 1] = TYPE_FIELDS (rtype)[f];
8333 TYPE_NFIELDS (rtype) -= 1;
8334 }
8335 else
8336 {
8337 TYPE_FIELD_TYPE (rtype, variant_field) = branch_type;
8338 TYPE_FIELD_NAME (rtype, variant_field) = "S";
8339 fld_bit_len =
8340 TYPE_LENGTH (TYPE_FIELD_TYPE (rtype, variant_field)) *
8341 TARGET_CHAR_BIT;
8342 if (off + fld_bit_len > bit_len)
8343 bit_len = off + fld_bit_len;
8344 TYPE_LENGTH (rtype) =
8345 align_value (bit_len, TARGET_CHAR_BIT) / TARGET_CHAR_BIT;
8346 }
8347 }
8348
714e53ab
PH
8349 /* According to exp_dbug.ads, the size of TYPE for variable-size records
8350 should contain the alignment of that record, which should be a strictly
8351 positive value. If null or negative, then something is wrong, most
8352 probably in the debug info. In that case, we don't round up the size
0963b4bd 8353 of the resulting type. If this record is not part of another structure,
714e53ab
PH
8354 the current RTYPE length might be good enough for our purposes. */
8355 if (TYPE_LENGTH (type) <= 0)
8356 {
323e0a4a 8357 if (TYPE_NAME (rtype))
cc1defb1
KS
8358 warning (_("Invalid type size for `%s' detected: %s."),
8359 TYPE_NAME (rtype), pulongest (TYPE_LENGTH (type)));
323e0a4a 8360 else
cc1defb1
KS
8361 warning (_("Invalid type size for <unnamed> detected: %s."),
8362 pulongest (TYPE_LENGTH (type)));
714e53ab
PH
8363 }
8364 else
8365 {
8366 TYPE_LENGTH (rtype) = align_value (TYPE_LENGTH (rtype),
8367 TYPE_LENGTH (type));
8368 }
14f9c5c9
AS
8369
8370 value_free_to_mark (mark);
d2e4a39e 8371 if (TYPE_LENGTH (rtype) > varsize_limit)
323e0a4a 8372 error (_("record type with dynamic size is larger than varsize-limit"));
14f9c5c9
AS
8373 return rtype;
8374}
8375
4c4b4cd2
PH
8376/* As for ada_template_to_fixed_record_type_1 with KEEP_DYNAMIC_FIELDS
8377 of 1. */
14f9c5c9 8378
d2e4a39e 8379static struct type *
fc1a4b47 8380template_to_fixed_record_type (struct type *type, const gdb_byte *valaddr,
4c4b4cd2
PH
8381 CORE_ADDR address, struct value *dval0)
8382{
8383 return ada_template_to_fixed_record_type_1 (type, valaddr,
8384 address, dval0, 1);
8385}
8386
8387/* An ordinary record type in which ___XVL-convention fields and
8388 ___XVU- and ___XVN-convention field types in TYPE0 are replaced with
8389 static approximations, containing all possible fields. Uses
8390 no runtime values. Useless for use in values, but that's OK,
8391 since the results are used only for type determinations. Works on both
8392 structs and unions. Representation note: to save space, we memorize
8393 the result of this function in the TYPE_TARGET_TYPE of the
8394 template type. */
8395
8396static struct type *
8397template_to_static_fixed_type (struct type *type0)
14f9c5c9
AS
8398{
8399 struct type *type;
8400 int nfields;
8401 int f;
8402
9e195661
PMR
8403 /* No need no do anything if the input type is already fixed. */
8404 if (TYPE_FIXED_INSTANCE (type0))
8405 return type0;
8406
8407 /* Likewise if we already have computed the static approximation. */
4c4b4cd2
PH
8408 if (TYPE_TARGET_TYPE (type0) != NULL)
8409 return TYPE_TARGET_TYPE (type0);
8410
9e195661 8411 /* Don't clone TYPE0 until we are sure we are going to need a copy. */
4c4b4cd2 8412 type = type0;
9e195661
PMR
8413 nfields = TYPE_NFIELDS (type0);
8414
8415 /* Whether or not we cloned TYPE0, cache the result so that we don't do
8416 recompute all over next time. */
8417 TYPE_TARGET_TYPE (type0) = type;
14f9c5c9
AS
8418
8419 for (f = 0; f < nfields; f += 1)
8420 {
460efde1 8421 struct type *field_type = TYPE_FIELD_TYPE (type0, f);
4c4b4cd2 8422 struct type *new_type;
14f9c5c9 8423
4c4b4cd2 8424 if (is_dynamic_field (type0, f))
460efde1
JB
8425 {
8426 field_type = ada_check_typedef (field_type);
8427 new_type = to_static_fixed_type (TYPE_TARGET_TYPE (field_type));
8428 }
14f9c5c9 8429 else
f192137b 8430 new_type = static_unwrap_type (field_type);
9e195661
PMR
8431
8432 if (new_type != field_type)
8433 {
8434 /* Clone TYPE0 only the first time we get a new field type. */
8435 if (type == type0)
8436 {
8437 TYPE_TARGET_TYPE (type0) = type = alloc_type_copy (type0);
8438 TYPE_CODE (type) = TYPE_CODE (type0);
8ecb59f8 8439 INIT_NONE_SPECIFIC (type);
9e195661
PMR
8440 TYPE_NFIELDS (type) = nfields;
8441 TYPE_FIELDS (type) = (struct field *)
8442 TYPE_ALLOC (type, nfields * sizeof (struct field));
8443 memcpy (TYPE_FIELDS (type), TYPE_FIELDS (type0),
8444 sizeof (struct field) * nfields);
8445 TYPE_NAME (type) = ada_type_name (type0);
9e195661
PMR
8446 TYPE_FIXED_INSTANCE (type) = 1;
8447 TYPE_LENGTH (type) = 0;
8448 }
8449 TYPE_FIELD_TYPE (type, f) = new_type;
8450 TYPE_FIELD_NAME (type, f) = TYPE_FIELD_NAME (type0, f);
8451 }
14f9c5c9 8452 }
9e195661 8453
14f9c5c9
AS
8454 return type;
8455}
8456
4c4b4cd2 8457/* Given an object of type TYPE whose contents are at VALADDR and
5823c3ef
JB
8458 whose address in memory is ADDRESS, returns a revision of TYPE,
8459 which should be a non-dynamic-sized record, in which the variant
8460 part, if any, is replaced with the appropriate branch. Looks
4c4b4cd2
PH
8461 for discriminant values in DVAL0, which can be NULL if the record
8462 contains the necessary discriminant values. */
8463
d2e4a39e 8464static struct type *
fc1a4b47 8465to_record_with_fixed_variant_part (struct type *type, const gdb_byte *valaddr,
4c4b4cd2 8466 CORE_ADDR address, struct value *dval0)
14f9c5c9 8467{
d2e4a39e 8468 struct value *mark = value_mark ();
4c4b4cd2 8469 struct value *dval;
d2e4a39e 8470 struct type *rtype;
14f9c5c9
AS
8471 struct type *branch_type;
8472 int nfields = TYPE_NFIELDS (type);
4c4b4cd2 8473 int variant_field = variant_field_index (type);
14f9c5c9 8474
4c4b4cd2 8475 if (variant_field == -1)
14f9c5c9
AS
8476 return type;
8477
4c4b4cd2 8478 if (dval0 == NULL)
9f1f738a
SA
8479 {
8480 dval = value_from_contents_and_address (type, valaddr, address);
8481 type = value_type (dval);
8482 }
4c4b4cd2
PH
8483 else
8484 dval = dval0;
8485
e9bb382b 8486 rtype = alloc_type_copy (type);
14f9c5c9 8487 TYPE_CODE (rtype) = TYPE_CODE_STRUCT;
8ecb59f8 8488 INIT_NONE_SPECIFIC (rtype);
4c4b4cd2 8489 TYPE_NFIELDS (rtype) = nfields;
d2e4a39e
AS
8490 TYPE_FIELDS (rtype) =
8491 (struct field *) TYPE_ALLOC (rtype, nfields * sizeof (struct field));
8492 memcpy (TYPE_FIELDS (rtype), TYPE_FIELDS (type),
4c4b4cd2 8493 sizeof (struct field) * nfields);
14f9c5c9 8494 TYPE_NAME (rtype) = ada_type_name (type);
876cecd0 8495 TYPE_FIXED_INSTANCE (rtype) = 1;
14f9c5c9
AS
8496 TYPE_LENGTH (rtype) = TYPE_LENGTH (type);
8497
4c4b4cd2
PH
8498 branch_type = to_fixed_variant_branch_type
8499 (TYPE_FIELD_TYPE (type, variant_field),
d2e4a39e 8500 cond_offset_host (valaddr,
4c4b4cd2
PH
8501 TYPE_FIELD_BITPOS (type, variant_field)
8502 / TARGET_CHAR_BIT),
d2e4a39e 8503 cond_offset_target (address,
4c4b4cd2
PH
8504 TYPE_FIELD_BITPOS (type, variant_field)
8505 / TARGET_CHAR_BIT), dval);
d2e4a39e 8506 if (branch_type == NULL)
14f9c5c9 8507 {
4c4b4cd2 8508 int f;
5b4ee69b 8509
4c4b4cd2
PH
8510 for (f = variant_field + 1; f < nfields; f += 1)
8511 TYPE_FIELDS (rtype)[f - 1] = TYPE_FIELDS (rtype)[f];
14f9c5c9 8512 TYPE_NFIELDS (rtype) -= 1;
14f9c5c9
AS
8513 }
8514 else
8515 {
4c4b4cd2
PH
8516 TYPE_FIELD_TYPE (rtype, variant_field) = branch_type;
8517 TYPE_FIELD_NAME (rtype, variant_field) = "S";
8518 TYPE_FIELD_BITSIZE (rtype, variant_field) = 0;
14f9c5c9 8519 TYPE_LENGTH (rtype) += TYPE_LENGTH (branch_type);
14f9c5c9 8520 }
4c4b4cd2 8521 TYPE_LENGTH (rtype) -= TYPE_LENGTH (TYPE_FIELD_TYPE (type, variant_field));
d2e4a39e 8522
4c4b4cd2 8523 value_free_to_mark (mark);
14f9c5c9
AS
8524 return rtype;
8525}
8526
8527/* An ordinary record type (with fixed-length fields) that describes
8528 the value at (TYPE0, VALADDR, ADDRESS) [see explanation at
8529 beginning of this section]. Any necessary discriminants' values
4c4b4cd2
PH
8530 should be in DVAL, a record value; it may be NULL if the object
8531 at ADDR itself contains any necessary discriminant values.
8532 Additionally, VALADDR and ADDRESS may also be NULL if no discriminant
8533 values from the record are needed. Except in the case that DVAL,
8534 VALADDR, and ADDRESS are all 0 or NULL, a variant field (unless
8535 unchecked) is replaced by a particular branch of the variant.
8536
8537 NOTE: the case in which DVAL and VALADDR are NULL and ADDRESS is 0
8538 is questionable and may be removed. It can arise during the
8539 processing of an unconstrained-array-of-record type where all the
8540 variant branches have exactly the same size. This is because in
8541 such cases, the compiler does not bother to use the XVS convention
8542 when encoding the record. I am currently dubious of this
8543 shortcut and suspect the compiler should be altered. FIXME. */
14f9c5c9 8544
d2e4a39e 8545static struct type *
fc1a4b47 8546to_fixed_record_type (struct type *type0, const gdb_byte *valaddr,
4c4b4cd2 8547 CORE_ADDR address, struct value *dval)
14f9c5c9 8548{
d2e4a39e 8549 struct type *templ_type;
14f9c5c9 8550
876cecd0 8551 if (TYPE_FIXED_INSTANCE (type0))
4c4b4cd2
PH
8552 return type0;
8553
d2e4a39e 8554 templ_type = dynamic_template_type (type0);
14f9c5c9
AS
8555
8556 if (templ_type != NULL)
8557 return template_to_fixed_record_type (templ_type, valaddr, address, dval);
4c4b4cd2
PH
8558 else if (variant_field_index (type0) >= 0)
8559 {
8560 if (dval == NULL && valaddr == NULL && address == 0)
8561 return type0;
8562 return to_record_with_fixed_variant_part (type0, valaddr, address,
8563 dval);
8564 }
14f9c5c9
AS
8565 else
8566 {
876cecd0 8567 TYPE_FIXED_INSTANCE (type0) = 1;
14f9c5c9
AS
8568 return type0;
8569 }
8570
8571}
8572
8573/* An ordinary record type (with fixed-length fields) that describes
8574 the value at (VAR_TYPE0, VALADDR, ADDRESS), where VAR_TYPE0 is a
8575 union type. Any necessary discriminants' values should be in DVAL,
8576 a record value. That is, this routine selects the appropriate
8577 branch of the union at ADDR according to the discriminant value
b1f33ddd 8578 indicated in the union's type name. Returns VAR_TYPE0 itself if
0963b4bd 8579 it represents a variant subject to a pragma Unchecked_Union. */
14f9c5c9 8580
d2e4a39e 8581static struct type *
fc1a4b47 8582to_fixed_variant_branch_type (struct type *var_type0, const gdb_byte *valaddr,
4c4b4cd2 8583 CORE_ADDR address, struct value *dval)
14f9c5c9
AS
8584{
8585 int which;
d2e4a39e
AS
8586 struct type *templ_type;
8587 struct type *var_type;
14f9c5c9
AS
8588
8589 if (TYPE_CODE (var_type0) == TYPE_CODE_PTR)
8590 var_type = TYPE_TARGET_TYPE (var_type0);
d2e4a39e 8591 else
14f9c5c9
AS
8592 var_type = var_type0;
8593
8594 templ_type = ada_find_parallel_type (var_type, "___XVU");
8595
8596 if (templ_type != NULL)
8597 var_type = templ_type;
8598
b1f33ddd
JB
8599 if (is_unchecked_variant (var_type, value_type (dval)))
8600 return var_type0;
d2e4a39e
AS
8601 which =
8602 ada_which_variant_applies (var_type,
0fd88904 8603 value_type (dval), value_contents (dval));
14f9c5c9
AS
8604
8605 if (which < 0)
e9bb382b 8606 return empty_record (var_type);
14f9c5c9 8607 else if (is_dynamic_field (var_type, which))
4c4b4cd2 8608 return to_fixed_record_type
d2e4a39e
AS
8609 (TYPE_TARGET_TYPE (TYPE_FIELD_TYPE (var_type, which)),
8610 valaddr, address, dval);
4c4b4cd2 8611 else if (variant_field_index (TYPE_FIELD_TYPE (var_type, which)) >= 0)
d2e4a39e
AS
8612 return
8613 to_fixed_record_type
8614 (TYPE_FIELD_TYPE (var_type, which), valaddr, address, dval);
14f9c5c9
AS
8615 else
8616 return TYPE_FIELD_TYPE (var_type, which);
8617}
8618
8908fca5
JB
8619/* Assuming RANGE_TYPE is a TYPE_CODE_RANGE, return nonzero if
8620 ENCODING_TYPE, a type following the GNAT conventions for discrete
8621 type encodings, only carries redundant information. */
8622
8623static int
8624ada_is_redundant_range_encoding (struct type *range_type,
8625 struct type *encoding_type)
8626{
108d56a4 8627 const char *bounds_str;
8908fca5
JB
8628 int n;
8629 LONGEST lo, hi;
8630
8631 gdb_assert (TYPE_CODE (range_type) == TYPE_CODE_RANGE);
8632
005e2509
JB
8633 if (TYPE_CODE (get_base_type (range_type))
8634 != TYPE_CODE (get_base_type (encoding_type)))
8635 {
8636 /* The compiler probably used a simple base type to describe
8637 the range type instead of the range's actual base type,
8638 expecting us to get the real base type from the encoding
8639 anyway. In this situation, the encoding cannot be ignored
8640 as redundant. */
8641 return 0;
8642 }
8643
8908fca5
JB
8644 if (is_dynamic_type (range_type))
8645 return 0;
8646
8647 if (TYPE_NAME (encoding_type) == NULL)
8648 return 0;
8649
8650 bounds_str = strstr (TYPE_NAME (encoding_type), "___XDLU_");
8651 if (bounds_str == NULL)
8652 return 0;
8653
8654 n = 8; /* Skip "___XDLU_". */
8655 if (!ada_scan_number (bounds_str, n, &lo, &n))
8656 return 0;
8657 if (TYPE_LOW_BOUND (range_type) != lo)
8658 return 0;
8659
8660 n += 2; /* Skip the "__" separator between the two bounds. */
8661 if (!ada_scan_number (bounds_str, n, &hi, &n))
8662 return 0;
8663 if (TYPE_HIGH_BOUND (range_type) != hi)
8664 return 0;
8665
8666 return 1;
8667}
8668
8669/* Given the array type ARRAY_TYPE, return nonzero if DESC_TYPE,
8670 a type following the GNAT encoding for describing array type
8671 indices, only carries redundant information. */
8672
8673static int
8674ada_is_redundant_index_type_desc (struct type *array_type,
8675 struct type *desc_type)
8676{
8677 struct type *this_layer = check_typedef (array_type);
8678 int i;
8679
8680 for (i = 0; i < TYPE_NFIELDS (desc_type); i++)
8681 {
8682 if (!ada_is_redundant_range_encoding (TYPE_INDEX_TYPE (this_layer),
8683 TYPE_FIELD_TYPE (desc_type, i)))
8684 return 0;
8685 this_layer = check_typedef (TYPE_TARGET_TYPE (this_layer));
8686 }
8687
8688 return 1;
8689}
8690
14f9c5c9
AS
8691/* Assuming that TYPE0 is an array type describing the type of a value
8692 at ADDR, and that DVAL describes a record containing any
8693 discriminants used in TYPE0, returns a type for the value that
8694 contains no dynamic components (that is, no components whose sizes
8695 are determined by run-time quantities). Unless IGNORE_TOO_BIG is
8696 true, gives an error message if the resulting type's size is over
4c4b4cd2 8697 varsize_limit. */
14f9c5c9 8698
d2e4a39e
AS
8699static struct type *
8700to_fixed_array_type (struct type *type0, struct value *dval,
4c4b4cd2 8701 int ignore_too_big)
14f9c5c9 8702{
d2e4a39e
AS
8703 struct type *index_type_desc;
8704 struct type *result;
ad82864c 8705 int constrained_packed_array_p;
931e5bc3 8706 static const char *xa_suffix = "___XA";
14f9c5c9 8707
b0dd7688 8708 type0 = ada_check_typedef (type0);
284614f0 8709 if (TYPE_FIXED_INSTANCE (type0))
4c4b4cd2 8710 return type0;
14f9c5c9 8711
ad82864c
JB
8712 constrained_packed_array_p = ada_is_constrained_packed_array_type (type0);
8713 if (constrained_packed_array_p)
8714 type0 = decode_constrained_packed_array_type (type0);
284614f0 8715
931e5bc3
JG
8716 index_type_desc = ada_find_parallel_type (type0, xa_suffix);
8717
8718 /* As mentioned in exp_dbug.ads, for non bit-packed arrays an
8719 encoding suffixed with 'P' may still be generated. If so,
8720 it should be used to find the XA type. */
8721
8722 if (index_type_desc == NULL)
8723 {
1da0522e 8724 const char *type_name = ada_type_name (type0);
931e5bc3 8725
1da0522e 8726 if (type_name != NULL)
931e5bc3 8727 {
1da0522e 8728 const int len = strlen (type_name);
931e5bc3
JG
8729 char *name = (char *) alloca (len + strlen (xa_suffix));
8730
1da0522e 8731 if (type_name[len - 1] == 'P')
931e5bc3 8732 {
1da0522e 8733 strcpy (name, type_name);
931e5bc3
JG
8734 strcpy (name + len - 1, xa_suffix);
8735 index_type_desc = ada_find_parallel_type_with_name (type0, name);
8736 }
8737 }
8738 }
8739
28c85d6c 8740 ada_fixup_array_indexes_type (index_type_desc);
8908fca5
JB
8741 if (index_type_desc != NULL
8742 && ada_is_redundant_index_type_desc (type0, index_type_desc))
8743 {
8744 /* Ignore this ___XA parallel type, as it does not bring any
8745 useful information. This allows us to avoid creating fixed
8746 versions of the array's index types, which would be identical
8747 to the original ones. This, in turn, can also help avoid
8748 the creation of fixed versions of the array itself. */
8749 index_type_desc = NULL;
8750 }
8751
14f9c5c9
AS
8752 if (index_type_desc == NULL)
8753 {
61ee279c 8754 struct type *elt_type0 = ada_check_typedef (TYPE_TARGET_TYPE (type0));
5b4ee69b 8755
14f9c5c9 8756 /* NOTE: elt_type---the fixed version of elt_type0---should never
4c4b4cd2
PH
8757 depend on the contents of the array in properly constructed
8758 debugging data. */
529cad9c
PH
8759 /* Create a fixed version of the array element type.
8760 We're not providing the address of an element here,
e1d5a0d2 8761 and thus the actual object value cannot be inspected to do
529cad9c
PH
8762 the conversion. This should not be a problem, since arrays of
8763 unconstrained objects are not allowed. In particular, all
8764 the elements of an array of a tagged type should all be of
8765 the same type specified in the debugging info. No need to
8766 consult the object tag. */
1ed6ede0 8767 struct type *elt_type = ada_to_fixed_type (elt_type0, 0, 0, dval, 1);
14f9c5c9 8768
284614f0
JB
8769 /* Make sure we always create a new array type when dealing with
8770 packed array types, since we're going to fix-up the array
8771 type length and element bitsize a little further down. */
ad82864c 8772 if (elt_type0 == elt_type && !constrained_packed_array_p)
4c4b4cd2 8773 result = type0;
14f9c5c9 8774 else
e9bb382b 8775 result = create_array_type (alloc_type_copy (type0),
4c4b4cd2 8776 elt_type, TYPE_INDEX_TYPE (type0));
14f9c5c9
AS
8777 }
8778 else
8779 {
8780 int i;
8781 struct type *elt_type0;
8782
8783 elt_type0 = type0;
8784 for (i = TYPE_NFIELDS (index_type_desc); i > 0; i -= 1)
4c4b4cd2 8785 elt_type0 = TYPE_TARGET_TYPE (elt_type0);
14f9c5c9
AS
8786
8787 /* NOTE: result---the fixed version of elt_type0---should never
4c4b4cd2
PH
8788 depend on the contents of the array in properly constructed
8789 debugging data. */
529cad9c
PH
8790 /* Create a fixed version of the array element type.
8791 We're not providing the address of an element here,
e1d5a0d2 8792 and thus the actual object value cannot be inspected to do
529cad9c
PH
8793 the conversion. This should not be a problem, since arrays of
8794 unconstrained objects are not allowed. In particular, all
8795 the elements of an array of a tagged type should all be of
8796 the same type specified in the debugging info. No need to
8797 consult the object tag. */
1ed6ede0
JB
8798 result =
8799 ada_to_fixed_type (ada_check_typedef (elt_type0), 0, 0, dval, 1);
1ce677a4
UW
8800
8801 elt_type0 = type0;
14f9c5c9 8802 for (i = TYPE_NFIELDS (index_type_desc) - 1; i >= 0; i -= 1)
4c4b4cd2
PH
8803 {
8804 struct type *range_type =
28c85d6c 8805 to_fixed_range_type (TYPE_FIELD_TYPE (index_type_desc, i), dval);
5b4ee69b 8806
e9bb382b 8807 result = create_array_type (alloc_type_copy (elt_type0),
4c4b4cd2 8808 result, range_type);
1ce677a4 8809 elt_type0 = TYPE_TARGET_TYPE (elt_type0);
4c4b4cd2 8810 }
d2e4a39e 8811 if (!ignore_too_big && TYPE_LENGTH (result) > varsize_limit)
323e0a4a 8812 error (_("array type with dynamic size is larger than varsize-limit"));
14f9c5c9
AS
8813 }
8814
2e6fda7d
JB
8815 /* We want to preserve the type name. This can be useful when
8816 trying to get the type name of a value that has already been
8817 printed (for instance, if the user did "print VAR; whatis $". */
8818 TYPE_NAME (result) = TYPE_NAME (type0);
8819
ad82864c 8820 if (constrained_packed_array_p)
284614f0
JB
8821 {
8822 /* So far, the resulting type has been created as if the original
8823 type was a regular (non-packed) array type. As a result, the
8824 bitsize of the array elements needs to be set again, and the array
8825 length needs to be recomputed based on that bitsize. */
8826 int len = TYPE_LENGTH (result) / TYPE_LENGTH (TYPE_TARGET_TYPE (result));
8827 int elt_bitsize = TYPE_FIELD_BITSIZE (type0, 0);
8828
8829 TYPE_FIELD_BITSIZE (result, 0) = TYPE_FIELD_BITSIZE (type0, 0);
8830 TYPE_LENGTH (result) = len * elt_bitsize / HOST_CHAR_BIT;
8831 if (TYPE_LENGTH (result) * HOST_CHAR_BIT < len * elt_bitsize)
8832 TYPE_LENGTH (result)++;
8833 }
8834
876cecd0 8835 TYPE_FIXED_INSTANCE (result) = 1;
14f9c5c9 8836 return result;
d2e4a39e 8837}
14f9c5c9
AS
8838
8839
8840/* A standard type (containing no dynamically sized components)
8841 corresponding to TYPE for the value (TYPE, VALADDR, ADDRESS)
8842 DVAL describes a record containing any discriminants used in TYPE0,
4c4b4cd2 8843 and may be NULL if there are none, or if the object of type TYPE at
529cad9c
PH
8844 ADDRESS or in VALADDR contains these discriminants.
8845
1ed6ede0
JB
8846 If CHECK_TAG is not null, in the case of tagged types, this function
8847 attempts to locate the object's tag and use it to compute the actual
8848 type. However, when ADDRESS is null, we cannot use it to determine the
8849 location of the tag, and therefore compute the tagged type's actual type.
8850 So we return the tagged type without consulting the tag. */
529cad9c 8851
f192137b
JB
8852static struct type *
8853ada_to_fixed_type_1 (struct type *type, const gdb_byte *valaddr,
1ed6ede0 8854 CORE_ADDR address, struct value *dval, int check_tag)
14f9c5c9 8855{
61ee279c 8856 type = ada_check_typedef (type);
8ecb59f8
TT
8857
8858 /* Only un-fixed types need to be handled here. */
8859 if (!HAVE_GNAT_AUX_INFO (type))
8860 return type;
8861
d2e4a39e
AS
8862 switch (TYPE_CODE (type))
8863 {
8864 default:
14f9c5c9 8865 return type;
d2e4a39e 8866 case TYPE_CODE_STRUCT:
4c4b4cd2 8867 {
76a01679 8868 struct type *static_type = to_static_fixed_type (type);
1ed6ede0
JB
8869 struct type *fixed_record_type =
8870 to_fixed_record_type (type, valaddr, address, NULL);
5b4ee69b 8871
529cad9c
PH
8872 /* If STATIC_TYPE is a tagged type and we know the object's address,
8873 then we can determine its tag, and compute the object's actual
0963b4bd 8874 type from there. Note that we have to use the fixed record
1ed6ede0
JB
8875 type (the parent part of the record may have dynamic fields
8876 and the way the location of _tag is expressed may depend on
8877 them). */
529cad9c 8878
1ed6ede0 8879 if (check_tag && address != 0 && ada_is_tagged_type (static_type, 0))
76a01679 8880 {
b50d69b5
JG
8881 struct value *tag =
8882 value_tag_from_contents_and_address
8883 (fixed_record_type,
8884 valaddr,
8885 address);
8886 struct type *real_type = type_from_tag (tag);
8887 struct value *obj =
8888 value_from_contents_and_address (fixed_record_type,
8889 valaddr,
8890 address);
9f1f738a 8891 fixed_record_type = value_type (obj);
76a01679 8892 if (real_type != NULL)
b50d69b5
JG
8893 return to_fixed_record_type
8894 (real_type, NULL,
8895 value_address (ada_tag_value_at_base_address (obj)), NULL);
76a01679 8896 }
4af88198
JB
8897
8898 /* Check to see if there is a parallel ___XVZ variable.
8899 If there is, then it provides the actual size of our type. */
8900 else if (ada_type_name (fixed_record_type) != NULL)
8901 {
0d5cff50 8902 const char *name = ada_type_name (fixed_record_type);
224c3ddb
SM
8903 char *xvz_name
8904 = (char *) alloca (strlen (name) + 7 /* "___XVZ\0" */);
eccab96d 8905 bool xvz_found = false;
4af88198
JB
8906 LONGEST size;
8907
88c15c34 8908 xsnprintf (xvz_name, strlen (name) + 7, "%s___XVZ", name);
a70b8144 8909 try
eccab96d
JB
8910 {
8911 xvz_found = get_int_var_value (xvz_name, size);
8912 }
230d2906 8913 catch (const gdb_exception_error &except)
eccab96d
JB
8914 {
8915 /* We found the variable, but somehow failed to read
8916 its value. Rethrow the same error, but with a little
8917 bit more information, to help the user understand
8918 what went wrong (Eg: the variable might have been
8919 optimized out). */
8920 throw_error (except.error,
8921 _("unable to read value of %s (%s)"),
3d6e9d23 8922 xvz_name, except.what ());
eccab96d 8923 }
eccab96d
JB
8924
8925 if (xvz_found && TYPE_LENGTH (fixed_record_type) != size)
4af88198
JB
8926 {
8927 fixed_record_type = copy_type (fixed_record_type);
8928 TYPE_LENGTH (fixed_record_type) = size;
8929
8930 /* The FIXED_RECORD_TYPE may have be a stub. We have
8931 observed this when the debugging info is STABS, and
8932 apparently it is something that is hard to fix.
8933
8934 In practice, we don't need the actual type definition
8935 at all, because the presence of the XVZ variable allows us
8936 to assume that there must be a XVS type as well, which we
8937 should be able to use later, when we need the actual type
8938 definition.
8939
8940 In the meantime, pretend that the "fixed" type we are
8941 returning is NOT a stub, because this can cause trouble
8942 when using this type to create new types targeting it.
8943 Indeed, the associated creation routines often check
8944 whether the target type is a stub and will try to replace
0963b4bd 8945 it, thus using a type with the wrong size. This, in turn,
4af88198
JB
8946 might cause the new type to have the wrong size too.
8947 Consider the case of an array, for instance, where the size
8948 of the array is computed from the number of elements in
8949 our array multiplied by the size of its element. */
8950 TYPE_STUB (fixed_record_type) = 0;
8951 }
8952 }
1ed6ede0 8953 return fixed_record_type;
4c4b4cd2 8954 }
d2e4a39e 8955 case TYPE_CODE_ARRAY:
4c4b4cd2 8956 return to_fixed_array_type (type, dval, 1);
d2e4a39e
AS
8957 case TYPE_CODE_UNION:
8958 if (dval == NULL)
4c4b4cd2 8959 return type;
d2e4a39e 8960 else
4c4b4cd2 8961 return to_fixed_variant_branch_type (type, valaddr, address, dval);
d2e4a39e 8962 }
14f9c5c9
AS
8963}
8964
f192137b
JB
8965/* The same as ada_to_fixed_type_1, except that it preserves the type
8966 if it is a TYPE_CODE_TYPEDEF of a type that is already fixed.
96dbd2c1
JB
8967
8968 The typedef layer needs be preserved in order to differentiate between
8969 arrays and array pointers when both types are implemented using the same
8970 fat pointer. In the array pointer case, the pointer is encoded as
8971 a typedef of the pointer type. For instance, considering:
8972
8973 type String_Access is access String;
8974 S1 : String_Access := null;
8975
8976 To the debugger, S1 is defined as a typedef of type String. But
8977 to the user, it is a pointer. So if the user tries to print S1,
8978 we should not dereference the array, but print the array address
8979 instead.
8980
8981 If we didn't preserve the typedef layer, we would lose the fact that
8982 the type is to be presented as a pointer (needs de-reference before
8983 being printed). And we would also use the source-level type name. */
f192137b
JB
8984
8985struct type *
8986ada_to_fixed_type (struct type *type, const gdb_byte *valaddr,
8987 CORE_ADDR address, struct value *dval, int check_tag)
8988
8989{
8990 struct type *fixed_type =
8991 ada_to_fixed_type_1 (type, valaddr, address, dval, check_tag);
8992
96dbd2c1
JB
8993 /* If TYPE is a typedef and its target type is the same as the FIXED_TYPE,
8994 then preserve the typedef layer.
8995
8996 Implementation note: We can only check the main-type portion of
8997 the TYPE and FIXED_TYPE, because eliminating the typedef layer
8998 from TYPE now returns a type that has the same instance flags
8999 as TYPE. For instance, if TYPE is a "typedef const", and its
9000 target type is a "struct", then the typedef elimination will return
9001 a "const" version of the target type. See check_typedef for more
9002 details about how the typedef layer elimination is done.
9003
9004 brobecker/2010-11-19: It seems to me that the only case where it is
9005 useful to preserve the typedef layer is when dealing with fat pointers.
9006 Perhaps, we could add a check for that and preserve the typedef layer
9007 only in that situation. But this seems unecessary so far, probably
9008 because we call check_typedef/ada_check_typedef pretty much everywhere.
9009 */
f192137b 9010 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF
720d1a40 9011 && (TYPE_MAIN_TYPE (ada_typedef_target_type (type))
96dbd2c1 9012 == TYPE_MAIN_TYPE (fixed_type)))
f192137b
JB
9013 return type;
9014
9015 return fixed_type;
9016}
9017
14f9c5c9 9018/* A standard (static-sized) type corresponding as well as possible to
4c4b4cd2 9019 TYPE0, but based on no runtime data. */
14f9c5c9 9020
d2e4a39e
AS
9021static struct type *
9022to_static_fixed_type (struct type *type0)
14f9c5c9 9023{
d2e4a39e 9024 struct type *type;
14f9c5c9
AS
9025
9026 if (type0 == NULL)
9027 return NULL;
9028
876cecd0 9029 if (TYPE_FIXED_INSTANCE (type0))
4c4b4cd2
PH
9030 return type0;
9031
61ee279c 9032 type0 = ada_check_typedef (type0);
d2e4a39e 9033
14f9c5c9
AS
9034 switch (TYPE_CODE (type0))
9035 {
9036 default:
9037 return type0;
9038 case TYPE_CODE_STRUCT:
9039 type = dynamic_template_type (type0);
d2e4a39e 9040 if (type != NULL)
4c4b4cd2
PH
9041 return template_to_static_fixed_type (type);
9042 else
9043 return template_to_static_fixed_type (type0);
14f9c5c9
AS
9044 case TYPE_CODE_UNION:
9045 type = ada_find_parallel_type (type0, "___XVU");
9046 if (type != NULL)
4c4b4cd2
PH
9047 return template_to_static_fixed_type (type);
9048 else
9049 return template_to_static_fixed_type (type0);
14f9c5c9
AS
9050 }
9051}
9052
4c4b4cd2
PH
9053/* A static approximation of TYPE with all type wrappers removed. */
9054
d2e4a39e
AS
9055static struct type *
9056static_unwrap_type (struct type *type)
14f9c5c9
AS
9057{
9058 if (ada_is_aligner_type (type))
9059 {
61ee279c 9060 struct type *type1 = TYPE_FIELD_TYPE (ada_check_typedef (type), 0);
14f9c5c9 9061 if (ada_type_name (type1) == NULL)
4c4b4cd2 9062 TYPE_NAME (type1) = ada_type_name (type);
14f9c5c9
AS
9063
9064 return static_unwrap_type (type1);
9065 }
d2e4a39e 9066 else
14f9c5c9 9067 {
d2e4a39e 9068 struct type *raw_real_type = ada_get_base_type (type);
5b4ee69b 9069
d2e4a39e 9070 if (raw_real_type == type)
4c4b4cd2 9071 return type;
14f9c5c9 9072 else
4c4b4cd2 9073 return to_static_fixed_type (raw_real_type);
14f9c5c9
AS
9074 }
9075}
9076
9077/* In some cases, incomplete and private types require
4c4b4cd2 9078 cross-references that are not resolved as records (for example,
14f9c5c9
AS
9079 type Foo;
9080 type FooP is access Foo;
9081 V: FooP;
9082 type Foo is array ...;
4c4b4cd2 9083 ). In these cases, since there is no mechanism for producing
14f9c5c9
AS
9084 cross-references to such types, we instead substitute for FooP a
9085 stub enumeration type that is nowhere resolved, and whose tag is
4c4b4cd2 9086 the name of the actual type. Call these types "non-record stubs". */
14f9c5c9
AS
9087
9088/* A type equivalent to TYPE that is not a non-record stub, if one
4c4b4cd2
PH
9089 exists, otherwise TYPE. */
9090
d2e4a39e 9091struct type *
61ee279c 9092ada_check_typedef (struct type *type)
14f9c5c9 9093{
727e3d2e
JB
9094 if (type == NULL)
9095 return NULL;
9096
736ade86
XR
9097 /* If our type is an access to an unconstrained array, which is encoded
9098 as a TYPE_CODE_TYPEDEF of a fat pointer, then we're done.
720d1a40
JB
9099 We don't want to strip the TYPE_CODE_TYPDEF layer, because this is
9100 what allows us to distinguish between fat pointers that represent
9101 array types, and fat pointers that represent array access types
9102 (in both cases, the compiler implements them as fat pointers). */
736ade86 9103 if (ada_is_access_to_unconstrained_array (type))
720d1a40
JB
9104 return type;
9105
f168693b 9106 type = check_typedef (type);
14f9c5c9 9107 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_ENUM
529cad9c 9108 || !TYPE_STUB (type)
e86ca25f 9109 || TYPE_NAME (type) == NULL)
14f9c5c9 9110 return type;
d2e4a39e 9111 else
14f9c5c9 9112 {
e86ca25f 9113 const char *name = TYPE_NAME (type);
d2e4a39e 9114 struct type *type1 = ada_find_any_type (name);
5b4ee69b 9115
05e522ef
JB
9116 if (type1 == NULL)
9117 return type;
9118
9119 /* TYPE1 might itself be a TYPE_CODE_TYPEDEF (this can happen with
9120 stubs pointing to arrays, as we don't create symbols for array
3a867c22
JB
9121 types, only for the typedef-to-array types). If that's the case,
9122 strip the typedef layer. */
9123 if (TYPE_CODE (type1) == TYPE_CODE_TYPEDEF)
9124 type1 = ada_check_typedef (type1);
9125
9126 return type1;
14f9c5c9
AS
9127 }
9128}
9129
9130/* A value representing the data at VALADDR/ADDRESS as described by
9131 type TYPE0, but with a standard (static-sized) type that correctly
9132 describes it. If VAL0 is not NULL and TYPE0 already is a standard
9133 type, then return VAL0 [this feature is simply to avoid redundant
4c4b4cd2 9134 creation of struct values]. */
14f9c5c9 9135
4c4b4cd2
PH
9136static struct value *
9137ada_to_fixed_value_create (struct type *type0, CORE_ADDR address,
9138 struct value *val0)
14f9c5c9 9139{
1ed6ede0 9140 struct type *type = ada_to_fixed_type (type0, 0, address, NULL, 1);
5b4ee69b 9141
14f9c5c9
AS
9142 if (type == type0 && val0 != NULL)
9143 return val0;
cc0e770c
JB
9144
9145 if (VALUE_LVAL (val0) != lval_memory)
9146 {
9147 /* Our value does not live in memory; it could be a convenience
9148 variable, for instance. Create a not_lval value using val0's
9149 contents. */
9150 return value_from_contents (type, value_contents (val0));
9151 }
9152
9153 return value_from_contents_and_address (type, 0, address);
4c4b4cd2
PH
9154}
9155
9156/* A value representing VAL, but with a standard (static-sized) type
9157 that correctly describes it. Does not necessarily create a new
9158 value. */
9159
0c3acc09 9160struct value *
4c4b4cd2
PH
9161ada_to_fixed_value (struct value *val)
9162{
c48db5ca 9163 val = unwrap_value (val);
d8ce9127 9164 val = ada_to_fixed_value_create (value_type (val), value_address (val), val);
c48db5ca 9165 return val;
14f9c5c9 9166}
d2e4a39e 9167\f
14f9c5c9 9168
14f9c5c9
AS
9169/* Attributes */
9170
4c4b4cd2
PH
9171/* Table mapping attribute numbers to names.
9172 NOTE: Keep up to date with enum ada_attribute definition in ada-lang.h. */
14f9c5c9 9173
d2e4a39e 9174static const char *attribute_names[] = {
14f9c5c9
AS
9175 "<?>",
9176
d2e4a39e 9177 "first",
14f9c5c9
AS
9178 "last",
9179 "length",
9180 "image",
14f9c5c9
AS
9181 "max",
9182 "min",
4c4b4cd2
PH
9183 "modulus",
9184 "pos",
9185 "size",
9186 "tag",
14f9c5c9 9187 "val",
14f9c5c9
AS
9188 0
9189};
9190
d2e4a39e 9191const char *
4c4b4cd2 9192ada_attribute_name (enum exp_opcode n)
14f9c5c9 9193{
4c4b4cd2
PH
9194 if (n >= OP_ATR_FIRST && n <= (int) OP_ATR_VAL)
9195 return attribute_names[n - OP_ATR_FIRST + 1];
14f9c5c9
AS
9196 else
9197 return attribute_names[0];
9198}
9199
4c4b4cd2 9200/* Evaluate the 'POS attribute applied to ARG. */
14f9c5c9 9201
4c4b4cd2
PH
9202static LONGEST
9203pos_atr (struct value *arg)
14f9c5c9 9204{
24209737
PH
9205 struct value *val = coerce_ref (arg);
9206 struct type *type = value_type (val);
aa715135 9207 LONGEST result;
14f9c5c9 9208
d2e4a39e 9209 if (!discrete_type_p (type))
323e0a4a 9210 error (_("'POS only defined on discrete types"));
14f9c5c9 9211
aa715135
JG
9212 if (!discrete_position (type, value_as_long (val), &result))
9213 error (_("enumeration value is invalid: can't find 'POS"));
14f9c5c9 9214
aa715135 9215 return result;
4c4b4cd2
PH
9216}
9217
9218static struct value *
3cb382c9 9219value_pos_atr (struct type *type, struct value *arg)
4c4b4cd2 9220{
3cb382c9 9221 return value_from_longest (type, pos_atr (arg));
14f9c5c9
AS
9222}
9223
4c4b4cd2 9224/* Evaluate the TYPE'VAL attribute applied to ARG. */
14f9c5c9 9225
d2e4a39e
AS
9226static struct value *
9227value_val_atr (struct type *type, struct value *arg)
14f9c5c9 9228{
d2e4a39e 9229 if (!discrete_type_p (type))
323e0a4a 9230 error (_("'VAL only defined on discrete types"));
df407dfe 9231 if (!integer_type_p (value_type (arg)))
323e0a4a 9232 error (_("'VAL requires integral argument"));
14f9c5c9
AS
9233
9234 if (TYPE_CODE (type) == TYPE_CODE_ENUM)
9235 {
9236 long pos = value_as_long (arg);
5b4ee69b 9237
14f9c5c9 9238 if (pos < 0 || pos >= TYPE_NFIELDS (type))
323e0a4a 9239 error (_("argument to 'VAL out of range"));
14e75d8e 9240 return value_from_longest (type, TYPE_FIELD_ENUMVAL (type, pos));
14f9c5c9
AS
9241 }
9242 else
9243 return value_from_longest (type, value_as_long (arg));
9244}
14f9c5c9 9245\f
d2e4a39e 9246
4c4b4cd2 9247 /* Evaluation */
14f9c5c9 9248
4c4b4cd2
PH
9249/* True if TYPE appears to be an Ada character type.
9250 [At the moment, this is true only for Character and Wide_Character;
9251 It is a heuristic test that could stand improvement]. */
14f9c5c9 9252
fc913e53 9253bool
d2e4a39e 9254ada_is_character_type (struct type *type)
14f9c5c9 9255{
7b9f71f2
JB
9256 const char *name;
9257
9258 /* If the type code says it's a character, then assume it really is,
9259 and don't check any further. */
9260 if (TYPE_CODE (type) == TYPE_CODE_CHAR)
fc913e53 9261 return true;
7b9f71f2
JB
9262
9263 /* Otherwise, assume it's a character type iff it is a discrete type
9264 with a known character type name. */
9265 name = ada_type_name (type);
9266 return (name != NULL
9267 && (TYPE_CODE (type) == TYPE_CODE_INT
9268 || TYPE_CODE (type) == TYPE_CODE_RANGE)
9269 && (strcmp (name, "character") == 0
9270 || strcmp (name, "wide_character") == 0
5a517ebd 9271 || strcmp (name, "wide_wide_character") == 0
7b9f71f2 9272 || strcmp (name, "unsigned char") == 0));
14f9c5c9
AS
9273}
9274
4c4b4cd2 9275/* True if TYPE appears to be an Ada string type. */
14f9c5c9 9276
fc913e53 9277bool
ebf56fd3 9278ada_is_string_type (struct type *type)
14f9c5c9 9279{
61ee279c 9280 type = ada_check_typedef (type);
d2e4a39e 9281 if (type != NULL
14f9c5c9 9282 && TYPE_CODE (type) != TYPE_CODE_PTR
76a01679
JB
9283 && (ada_is_simple_array_type (type)
9284 || ada_is_array_descriptor_type (type))
14f9c5c9
AS
9285 && ada_array_arity (type) == 1)
9286 {
9287 struct type *elttype = ada_array_element_type (type, 1);
9288
9289 return ada_is_character_type (elttype);
9290 }
d2e4a39e 9291 else
fc913e53 9292 return false;
14f9c5c9
AS
9293}
9294
5bf03f13
JB
9295/* The compiler sometimes provides a parallel XVS type for a given
9296 PAD type. Normally, it is safe to follow the PAD type directly,
9297 but older versions of the compiler have a bug that causes the offset
9298 of its "F" field to be wrong. Following that field in that case
9299 would lead to incorrect results, but this can be worked around
9300 by ignoring the PAD type and using the associated XVS type instead.
9301
9302 Set to True if the debugger should trust the contents of PAD types.
9303 Otherwise, ignore the PAD type if there is a parallel XVS type. */
9304static int trust_pad_over_xvs = 1;
14f9c5c9
AS
9305
9306/* True if TYPE is a struct type introduced by the compiler to force the
9307 alignment of a value. Such types have a single field with a
4c4b4cd2 9308 distinctive name. */
14f9c5c9
AS
9309
9310int
ebf56fd3 9311ada_is_aligner_type (struct type *type)
14f9c5c9 9312{
61ee279c 9313 type = ada_check_typedef (type);
714e53ab 9314
5bf03f13 9315 if (!trust_pad_over_xvs && ada_find_parallel_type (type, "___XVS") != NULL)
714e53ab
PH
9316 return 0;
9317
14f9c5c9 9318 return (TYPE_CODE (type) == TYPE_CODE_STRUCT
4c4b4cd2
PH
9319 && TYPE_NFIELDS (type) == 1
9320 && strcmp (TYPE_FIELD_NAME (type, 0), "F") == 0);
14f9c5c9
AS
9321}
9322
9323/* If there is an ___XVS-convention type parallel to SUBTYPE, return
4c4b4cd2 9324 the parallel type. */
14f9c5c9 9325
d2e4a39e
AS
9326struct type *
9327ada_get_base_type (struct type *raw_type)
14f9c5c9 9328{
d2e4a39e
AS
9329 struct type *real_type_namer;
9330 struct type *raw_real_type;
14f9c5c9
AS
9331
9332 if (raw_type == NULL || TYPE_CODE (raw_type) != TYPE_CODE_STRUCT)
9333 return raw_type;
9334
284614f0
JB
9335 if (ada_is_aligner_type (raw_type))
9336 /* The encoding specifies that we should always use the aligner type.
9337 So, even if this aligner type has an associated XVS type, we should
9338 simply ignore it.
9339
9340 According to the compiler gurus, an XVS type parallel to an aligner
9341 type may exist because of a stabs limitation. In stabs, aligner
9342 types are empty because the field has a variable-sized type, and
9343 thus cannot actually be used as an aligner type. As a result,
9344 we need the associated parallel XVS type to decode the type.
9345 Since the policy in the compiler is to not change the internal
9346 representation based on the debugging info format, we sometimes
9347 end up having a redundant XVS type parallel to the aligner type. */
9348 return raw_type;
9349
14f9c5c9 9350 real_type_namer = ada_find_parallel_type (raw_type, "___XVS");
d2e4a39e 9351 if (real_type_namer == NULL
14f9c5c9
AS
9352 || TYPE_CODE (real_type_namer) != TYPE_CODE_STRUCT
9353 || TYPE_NFIELDS (real_type_namer) != 1)
9354 return raw_type;
9355
f80d3ff2
JB
9356 if (TYPE_CODE (TYPE_FIELD_TYPE (real_type_namer, 0)) != TYPE_CODE_REF)
9357 {
9358 /* This is an older encoding form where the base type needs to be
9359 looked up by name. We prefer the newer enconding because it is
9360 more efficient. */
9361 raw_real_type = ada_find_any_type (TYPE_FIELD_NAME (real_type_namer, 0));
9362 if (raw_real_type == NULL)
9363 return raw_type;
9364 else
9365 return raw_real_type;
9366 }
9367
9368 /* The field in our XVS type is a reference to the base type. */
9369 return TYPE_TARGET_TYPE (TYPE_FIELD_TYPE (real_type_namer, 0));
d2e4a39e 9370}
14f9c5c9 9371
4c4b4cd2 9372/* The type of value designated by TYPE, with all aligners removed. */
14f9c5c9 9373
d2e4a39e
AS
9374struct type *
9375ada_aligned_type (struct type *type)
14f9c5c9
AS
9376{
9377 if (ada_is_aligner_type (type))
9378 return ada_aligned_type (TYPE_FIELD_TYPE (type, 0));
9379 else
9380 return ada_get_base_type (type);
9381}
9382
9383
9384/* The address of the aligned value in an object at address VALADDR
4c4b4cd2 9385 having type TYPE. Assumes ada_is_aligner_type (TYPE). */
14f9c5c9 9386
fc1a4b47
AC
9387const gdb_byte *
9388ada_aligned_value_addr (struct type *type, const gdb_byte *valaddr)
14f9c5c9 9389{
d2e4a39e 9390 if (ada_is_aligner_type (type))
14f9c5c9 9391 return ada_aligned_value_addr (TYPE_FIELD_TYPE (type, 0),
4c4b4cd2
PH
9392 valaddr +
9393 TYPE_FIELD_BITPOS (type,
9394 0) / TARGET_CHAR_BIT);
14f9c5c9
AS
9395 else
9396 return valaddr;
9397}
9398
4c4b4cd2
PH
9399
9400
14f9c5c9 9401/* The printed representation of an enumeration literal with encoded
4c4b4cd2 9402 name NAME. The value is good to the next call of ada_enum_name. */
d2e4a39e
AS
9403const char *
9404ada_enum_name (const char *name)
14f9c5c9 9405{
4c4b4cd2
PH
9406 static char *result;
9407 static size_t result_len = 0;
e6a959d6 9408 const char *tmp;
14f9c5c9 9409
4c4b4cd2
PH
9410 /* First, unqualify the enumeration name:
9411 1. Search for the last '.' character. If we find one, then skip
177b42fe 9412 all the preceding characters, the unqualified name starts
76a01679 9413 right after that dot.
4c4b4cd2 9414 2. Otherwise, we may be debugging on a target where the compiler
76a01679
JB
9415 translates dots into "__". Search forward for double underscores,
9416 but stop searching when we hit an overloading suffix, which is
9417 of the form "__" followed by digits. */
4c4b4cd2 9418
c3e5cd34
PH
9419 tmp = strrchr (name, '.');
9420 if (tmp != NULL)
4c4b4cd2
PH
9421 name = tmp + 1;
9422 else
14f9c5c9 9423 {
4c4b4cd2
PH
9424 while ((tmp = strstr (name, "__")) != NULL)
9425 {
9426 if (isdigit (tmp[2]))
9427 break;
9428 else
9429 name = tmp + 2;
9430 }
14f9c5c9
AS
9431 }
9432
9433 if (name[0] == 'Q')
9434 {
14f9c5c9 9435 int v;
5b4ee69b 9436
14f9c5c9 9437 if (name[1] == 'U' || name[1] == 'W')
4c4b4cd2
PH
9438 {
9439 if (sscanf (name + 2, "%x", &v) != 1)
9440 return name;
9441 }
14f9c5c9 9442 else
4c4b4cd2 9443 return name;
14f9c5c9 9444
4c4b4cd2 9445 GROW_VECT (result, result_len, 16);
14f9c5c9 9446 if (isascii (v) && isprint (v))
88c15c34 9447 xsnprintf (result, result_len, "'%c'", v);
14f9c5c9 9448 else if (name[1] == 'U')
88c15c34 9449 xsnprintf (result, result_len, "[\"%02x\"]", v);
14f9c5c9 9450 else
88c15c34 9451 xsnprintf (result, result_len, "[\"%04x\"]", v);
14f9c5c9
AS
9452
9453 return result;
9454 }
d2e4a39e 9455 else
4c4b4cd2 9456 {
c3e5cd34
PH
9457 tmp = strstr (name, "__");
9458 if (tmp == NULL)
9459 tmp = strstr (name, "$");
9460 if (tmp != NULL)
4c4b4cd2
PH
9461 {
9462 GROW_VECT (result, result_len, tmp - name + 1);
9463 strncpy (result, name, tmp - name);
9464 result[tmp - name] = '\0';
9465 return result;
9466 }
9467
9468 return name;
9469 }
14f9c5c9
AS
9470}
9471
14f9c5c9
AS
9472/* Evaluate the subexpression of EXP starting at *POS as for
9473 evaluate_type, updating *POS to point just past the evaluated
4c4b4cd2 9474 expression. */
14f9c5c9 9475
d2e4a39e
AS
9476static struct value *
9477evaluate_subexp_type (struct expression *exp, int *pos)
14f9c5c9 9478{
4b27a620 9479 return evaluate_subexp (NULL_TYPE, exp, pos, EVAL_AVOID_SIDE_EFFECTS);
14f9c5c9
AS
9480}
9481
9482/* If VAL is wrapped in an aligner or subtype wrapper, return the
4c4b4cd2 9483 value it wraps. */
14f9c5c9 9484
d2e4a39e
AS
9485static struct value *
9486unwrap_value (struct value *val)
14f9c5c9 9487{
df407dfe 9488 struct type *type = ada_check_typedef (value_type (val));
5b4ee69b 9489
14f9c5c9
AS
9490 if (ada_is_aligner_type (type))
9491 {
de4d072f 9492 struct value *v = ada_value_struct_elt (val, "F", 0);
df407dfe 9493 struct type *val_type = ada_check_typedef (value_type (v));
5b4ee69b 9494
14f9c5c9 9495 if (ada_type_name (val_type) == NULL)
4c4b4cd2 9496 TYPE_NAME (val_type) = ada_type_name (type);
14f9c5c9
AS
9497
9498 return unwrap_value (v);
9499 }
d2e4a39e 9500 else
14f9c5c9 9501 {
d2e4a39e 9502 struct type *raw_real_type =
61ee279c 9503 ada_check_typedef (ada_get_base_type (type));
d2e4a39e 9504
5bf03f13
JB
9505 /* If there is no parallel XVS or XVE type, then the value is
9506 already unwrapped. Return it without further modification. */
9507 if ((type == raw_real_type)
9508 && ada_find_parallel_type (type, "___XVE") == NULL)
9509 return val;
14f9c5c9 9510
d2e4a39e 9511 return
4c4b4cd2
PH
9512 coerce_unspec_val_to_type
9513 (val, ada_to_fixed_type (raw_real_type, 0,
42ae5230 9514 value_address (val),
1ed6ede0 9515 NULL, 1));
14f9c5c9
AS
9516 }
9517}
d2e4a39e
AS
9518
9519static struct value *
50eff16b 9520cast_from_fixed (struct type *type, struct value *arg)
14f9c5c9 9521{
50eff16b
UW
9522 struct value *scale = ada_scaling_factor (value_type (arg));
9523 arg = value_cast (value_type (scale), arg);
14f9c5c9 9524
50eff16b
UW
9525 arg = value_binop (arg, scale, BINOP_MUL);
9526 return value_cast (type, arg);
14f9c5c9
AS
9527}
9528
d2e4a39e 9529static struct value *
50eff16b 9530cast_to_fixed (struct type *type, struct value *arg)
14f9c5c9 9531{
50eff16b
UW
9532 if (type == value_type (arg))
9533 return arg;
5b4ee69b 9534
50eff16b
UW
9535 struct value *scale = ada_scaling_factor (type);
9536 if (ada_is_fixed_point_type (value_type (arg)))
9537 arg = cast_from_fixed (value_type (scale), arg);
9538 else
9539 arg = value_cast (value_type (scale), arg);
9540
9541 arg = value_binop (arg, scale, BINOP_DIV);
9542 return value_cast (type, arg);
14f9c5c9
AS
9543}
9544
d99dcf51
JB
9545/* Given two array types T1 and T2, return nonzero iff both arrays
9546 contain the same number of elements. */
9547
9548static int
9549ada_same_array_size_p (struct type *t1, struct type *t2)
9550{
9551 LONGEST lo1, hi1, lo2, hi2;
9552
9553 /* Get the array bounds in order to verify that the size of
9554 the two arrays match. */
9555 if (!get_array_bounds (t1, &lo1, &hi1)
9556 || !get_array_bounds (t2, &lo2, &hi2))
9557 error (_("unable to determine array bounds"));
9558
9559 /* To make things easier for size comparison, normalize a bit
9560 the case of empty arrays by making sure that the difference
9561 between upper bound and lower bound is always -1. */
9562 if (lo1 > hi1)
9563 hi1 = lo1 - 1;
9564 if (lo2 > hi2)
9565 hi2 = lo2 - 1;
9566
9567 return (hi1 - lo1 == hi2 - lo2);
9568}
9569
9570/* Assuming that VAL is an array of integrals, and TYPE represents
9571 an array with the same number of elements, but with wider integral
9572 elements, return an array "casted" to TYPE. In practice, this
9573 means that the returned array is built by casting each element
9574 of the original array into TYPE's (wider) element type. */
9575
9576static struct value *
9577ada_promote_array_of_integrals (struct type *type, struct value *val)
9578{
9579 struct type *elt_type = TYPE_TARGET_TYPE (type);
9580 LONGEST lo, hi;
9581 struct value *res;
9582 LONGEST i;
9583
9584 /* Verify that both val and type are arrays of scalars, and
9585 that the size of val's elements is smaller than the size
9586 of type's element. */
9587 gdb_assert (TYPE_CODE (type) == TYPE_CODE_ARRAY);
9588 gdb_assert (is_integral_type (TYPE_TARGET_TYPE (type)));
9589 gdb_assert (TYPE_CODE (value_type (val)) == TYPE_CODE_ARRAY);
9590 gdb_assert (is_integral_type (TYPE_TARGET_TYPE (value_type (val))));
9591 gdb_assert (TYPE_LENGTH (TYPE_TARGET_TYPE (type))
9592 > TYPE_LENGTH (TYPE_TARGET_TYPE (value_type (val))));
9593
9594 if (!get_array_bounds (type, &lo, &hi))
9595 error (_("unable to determine array bounds"));
9596
9597 res = allocate_value (type);
9598
9599 /* Promote each array element. */
9600 for (i = 0; i < hi - lo + 1; i++)
9601 {
9602 struct value *elt = value_cast (elt_type, value_subscript (val, lo + i));
9603
9604 memcpy (value_contents_writeable (res) + (i * TYPE_LENGTH (elt_type)),
9605 value_contents_all (elt), TYPE_LENGTH (elt_type));
9606 }
9607
9608 return res;
9609}
9610
4c4b4cd2
PH
9611/* Coerce VAL as necessary for assignment to an lval of type TYPE, and
9612 return the converted value. */
9613
d2e4a39e
AS
9614static struct value *
9615coerce_for_assign (struct type *type, struct value *val)
14f9c5c9 9616{
df407dfe 9617 struct type *type2 = value_type (val);
5b4ee69b 9618
14f9c5c9
AS
9619 if (type == type2)
9620 return val;
9621
61ee279c
PH
9622 type2 = ada_check_typedef (type2);
9623 type = ada_check_typedef (type);
14f9c5c9 9624
d2e4a39e
AS
9625 if (TYPE_CODE (type2) == TYPE_CODE_PTR
9626 && TYPE_CODE (type) == TYPE_CODE_ARRAY)
14f9c5c9
AS
9627 {
9628 val = ada_value_ind (val);
df407dfe 9629 type2 = value_type (val);
14f9c5c9
AS
9630 }
9631
d2e4a39e 9632 if (TYPE_CODE (type2) == TYPE_CODE_ARRAY
14f9c5c9
AS
9633 && TYPE_CODE (type) == TYPE_CODE_ARRAY)
9634 {
d99dcf51
JB
9635 if (!ada_same_array_size_p (type, type2))
9636 error (_("cannot assign arrays of different length"));
9637
9638 if (is_integral_type (TYPE_TARGET_TYPE (type))
9639 && is_integral_type (TYPE_TARGET_TYPE (type2))
9640 && TYPE_LENGTH (TYPE_TARGET_TYPE (type2))
9641 < TYPE_LENGTH (TYPE_TARGET_TYPE (type)))
9642 {
9643 /* Allow implicit promotion of the array elements to
9644 a wider type. */
9645 return ada_promote_array_of_integrals (type, val);
9646 }
9647
9648 if (TYPE_LENGTH (TYPE_TARGET_TYPE (type2))
9649 != TYPE_LENGTH (TYPE_TARGET_TYPE (type)))
323e0a4a 9650 error (_("Incompatible types in assignment"));
04624583 9651 deprecated_set_value_type (val, type);
14f9c5c9 9652 }
d2e4a39e 9653 return val;
14f9c5c9
AS
9654}
9655
4c4b4cd2
PH
9656static struct value *
9657ada_value_binop (struct value *arg1, struct value *arg2, enum exp_opcode op)
9658{
9659 struct value *val;
9660 struct type *type1, *type2;
9661 LONGEST v, v1, v2;
9662
994b9211
AC
9663 arg1 = coerce_ref (arg1);
9664 arg2 = coerce_ref (arg2);
18af8284
JB
9665 type1 = get_base_type (ada_check_typedef (value_type (arg1)));
9666 type2 = get_base_type (ada_check_typedef (value_type (arg2)));
4c4b4cd2 9667
76a01679
JB
9668 if (TYPE_CODE (type1) != TYPE_CODE_INT
9669 || TYPE_CODE (type2) != TYPE_CODE_INT)
4c4b4cd2
PH
9670 return value_binop (arg1, arg2, op);
9671
76a01679 9672 switch (op)
4c4b4cd2
PH
9673 {
9674 case BINOP_MOD:
9675 case BINOP_DIV:
9676 case BINOP_REM:
9677 break;
9678 default:
9679 return value_binop (arg1, arg2, op);
9680 }
9681
9682 v2 = value_as_long (arg2);
9683 if (v2 == 0)
323e0a4a 9684 error (_("second operand of %s must not be zero."), op_string (op));
4c4b4cd2
PH
9685
9686 if (TYPE_UNSIGNED (type1) || op == BINOP_MOD)
9687 return value_binop (arg1, arg2, op);
9688
9689 v1 = value_as_long (arg1);
9690 switch (op)
9691 {
9692 case BINOP_DIV:
9693 v = v1 / v2;
76a01679
JB
9694 if (!TRUNCATION_TOWARDS_ZERO && v1 * (v1 % v2) < 0)
9695 v += v > 0 ? -1 : 1;
4c4b4cd2
PH
9696 break;
9697 case BINOP_REM:
9698 v = v1 % v2;
76a01679
JB
9699 if (v * v1 < 0)
9700 v -= v2;
4c4b4cd2
PH
9701 break;
9702 default:
9703 /* Should not reach this point. */
9704 v = 0;
9705 }
9706
9707 val = allocate_value (type1);
990a07ab 9708 store_unsigned_integer (value_contents_raw (val),
e17a4113
UW
9709 TYPE_LENGTH (value_type (val)),
9710 gdbarch_byte_order (get_type_arch (type1)), v);
4c4b4cd2
PH
9711 return val;
9712}
9713
9714static int
9715ada_value_equal (struct value *arg1, struct value *arg2)
9716{
df407dfe
AC
9717 if (ada_is_direct_array_type (value_type (arg1))
9718 || ada_is_direct_array_type (value_type (arg2)))
4c4b4cd2 9719 {
79e8fcaa
JB
9720 struct type *arg1_type, *arg2_type;
9721
f58b38bf
JB
9722 /* Automatically dereference any array reference before
9723 we attempt to perform the comparison. */
9724 arg1 = ada_coerce_ref (arg1);
9725 arg2 = ada_coerce_ref (arg2);
79e8fcaa 9726
4c4b4cd2
PH
9727 arg1 = ada_coerce_to_simple_array (arg1);
9728 arg2 = ada_coerce_to_simple_array (arg2);
79e8fcaa
JB
9729
9730 arg1_type = ada_check_typedef (value_type (arg1));
9731 arg2_type = ada_check_typedef (value_type (arg2));
9732
9733 if (TYPE_CODE (arg1_type) != TYPE_CODE_ARRAY
9734 || TYPE_CODE (arg2_type) != TYPE_CODE_ARRAY)
323e0a4a 9735 error (_("Attempt to compare array with non-array"));
4c4b4cd2 9736 /* FIXME: The following works only for types whose
76a01679
JB
9737 representations use all bits (no padding or undefined bits)
9738 and do not have user-defined equality. */
79e8fcaa
JB
9739 return (TYPE_LENGTH (arg1_type) == TYPE_LENGTH (arg2_type)
9740 && memcmp (value_contents (arg1), value_contents (arg2),
9741 TYPE_LENGTH (arg1_type)) == 0);
4c4b4cd2
PH
9742 }
9743 return value_equal (arg1, arg2);
9744}
9745
52ce6436
PH
9746/* Total number of component associations in the aggregate starting at
9747 index PC in EXP. Assumes that index PC is the start of an
0963b4bd 9748 OP_AGGREGATE. */
52ce6436
PH
9749
9750static int
9751num_component_specs (struct expression *exp, int pc)
9752{
9753 int n, m, i;
5b4ee69b 9754
52ce6436
PH
9755 m = exp->elts[pc + 1].longconst;
9756 pc += 3;
9757 n = 0;
9758 for (i = 0; i < m; i += 1)
9759 {
9760 switch (exp->elts[pc].opcode)
9761 {
9762 default:
9763 n += 1;
9764 break;
9765 case OP_CHOICES:
9766 n += exp->elts[pc + 1].longconst;
9767 break;
9768 }
9769 ada_evaluate_subexp (NULL, exp, &pc, EVAL_SKIP);
9770 }
9771 return n;
9772}
9773
9774/* Assign the result of evaluating EXP starting at *POS to the INDEXth
9775 component of LHS (a simple array or a record), updating *POS past
9776 the expression, assuming that LHS is contained in CONTAINER. Does
9777 not modify the inferior's memory, nor does it modify LHS (unless
9778 LHS == CONTAINER). */
9779
9780static void
9781assign_component (struct value *container, struct value *lhs, LONGEST index,
9782 struct expression *exp, int *pos)
9783{
9784 struct value *mark = value_mark ();
9785 struct value *elt;
0e2da9f0 9786 struct type *lhs_type = check_typedef (value_type (lhs));
5b4ee69b 9787
0e2da9f0 9788 if (TYPE_CODE (lhs_type) == TYPE_CODE_ARRAY)
52ce6436 9789 {
22601c15
UW
9790 struct type *index_type = builtin_type (exp->gdbarch)->builtin_int;
9791 struct value *index_val = value_from_longest (index_type, index);
5b4ee69b 9792
52ce6436
PH
9793 elt = unwrap_value (ada_value_subscript (lhs, 1, &index_val));
9794 }
9795 else
9796 {
9797 elt = ada_index_struct_field (index, lhs, 0, value_type (lhs));
c48db5ca 9798 elt = ada_to_fixed_value (elt);
52ce6436
PH
9799 }
9800
9801 if (exp->elts[*pos].opcode == OP_AGGREGATE)
9802 assign_aggregate (container, elt, exp, pos, EVAL_NORMAL);
9803 else
9804 value_assign_to_component (container, elt,
9805 ada_evaluate_subexp (NULL, exp, pos,
9806 EVAL_NORMAL));
9807
9808 value_free_to_mark (mark);
9809}
9810
9811/* Assuming that LHS represents an lvalue having a record or array
9812 type, and EXP->ELTS[*POS] is an OP_AGGREGATE, evaluate an assignment
9813 of that aggregate's value to LHS, advancing *POS past the
9814 aggregate. NOSIDE is as for evaluate_subexp. CONTAINER is an
9815 lvalue containing LHS (possibly LHS itself). Does not modify
9816 the inferior's memory, nor does it modify the contents of
0963b4bd 9817 LHS (unless == CONTAINER). Returns the modified CONTAINER. */
52ce6436
PH
9818
9819static struct value *
9820assign_aggregate (struct value *container,
9821 struct value *lhs, struct expression *exp,
9822 int *pos, enum noside noside)
9823{
9824 struct type *lhs_type;
9825 int n = exp->elts[*pos+1].longconst;
9826 LONGEST low_index, high_index;
9827 int num_specs;
9828 LONGEST *indices;
9829 int max_indices, num_indices;
52ce6436 9830 int i;
52ce6436
PH
9831
9832 *pos += 3;
9833 if (noside != EVAL_NORMAL)
9834 {
52ce6436
PH
9835 for (i = 0; i < n; i += 1)
9836 ada_evaluate_subexp (NULL, exp, pos, noside);
9837 return container;
9838 }
9839
9840 container = ada_coerce_ref (container);
9841 if (ada_is_direct_array_type (value_type (container)))
9842 container = ada_coerce_to_simple_array (container);
9843 lhs = ada_coerce_ref (lhs);
9844 if (!deprecated_value_modifiable (lhs))
9845 error (_("Left operand of assignment is not a modifiable lvalue."));
9846
0e2da9f0 9847 lhs_type = check_typedef (value_type (lhs));
52ce6436
PH
9848 if (ada_is_direct_array_type (lhs_type))
9849 {
9850 lhs = ada_coerce_to_simple_array (lhs);
0e2da9f0 9851 lhs_type = check_typedef (value_type (lhs));
52ce6436
PH
9852 low_index = TYPE_ARRAY_LOWER_BOUND_VALUE (lhs_type);
9853 high_index = TYPE_ARRAY_UPPER_BOUND_VALUE (lhs_type);
52ce6436
PH
9854 }
9855 else if (TYPE_CODE (lhs_type) == TYPE_CODE_STRUCT)
9856 {
9857 low_index = 0;
9858 high_index = num_visible_fields (lhs_type) - 1;
52ce6436
PH
9859 }
9860 else
9861 error (_("Left-hand side must be array or record."));
9862
9863 num_specs = num_component_specs (exp, *pos - 3);
9864 max_indices = 4 * num_specs + 4;
8d749320 9865 indices = XALLOCAVEC (LONGEST, max_indices);
52ce6436
PH
9866 indices[0] = indices[1] = low_index - 1;
9867 indices[2] = indices[3] = high_index + 1;
9868 num_indices = 4;
9869
9870 for (i = 0; i < n; i += 1)
9871 {
9872 switch (exp->elts[*pos].opcode)
9873 {
1fbf5ada
JB
9874 case OP_CHOICES:
9875 aggregate_assign_from_choices (container, lhs, exp, pos, indices,
9876 &num_indices, max_indices,
9877 low_index, high_index);
9878 break;
9879 case OP_POSITIONAL:
9880 aggregate_assign_positional (container, lhs, exp, pos, indices,
52ce6436
PH
9881 &num_indices, max_indices,
9882 low_index, high_index);
1fbf5ada
JB
9883 break;
9884 case OP_OTHERS:
9885 if (i != n-1)
9886 error (_("Misplaced 'others' clause"));
9887 aggregate_assign_others (container, lhs, exp, pos, indices,
9888 num_indices, low_index, high_index);
9889 break;
9890 default:
9891 error (_("Internal error: bad aggregate clause"));
52ce6436
PH
9892 }
9893 }
9894
9895 return container;
9896}
9897
9898/* Assign into the component of LHS indexed by the OP_POSITIONAL
9899 construct at *POS, updating *POS past the construct, given that
9900 the positions are relative to lower bound LOW, where HIGH is the
9901 upper bound. Record the position in INDICES[0 .. MAX_INDICES-1]
9902 updating *NUM_INDICES as needed. CONTAINER is as for
0963b4bd 9903 assign_aggregate. */
52ce6436
PH
9904static void
9905aggregate_assign_positional (struct value *container,
9906 struct value *lhs, struct expression *exp,
9907 int *pos, LONGEST *indices, int *num_indices,
9908 int max_indices, LONGEST low, LONGEST high)
9909{
9910 LONGEST ind = longest_to_int (exp->elts[*pos + 1].longconst) + low;
9911
9912 if (ind - 1 == high)
e1d5a0d2 9913 warning (_("Extra components in aggregate ignored."));
52ce6436
PH
9914 if (ind <= high)
9915 {
9916 add_component_interval (ind, ind, indices, num_indices, max_indices);
9917 *pos += 3;
9918 assign_component (container, lhs, ind, exp, pos);
9919 }
9920 else
9921 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9922}
9923
9924/* Assign into the components of LHS indexed by the OP_CHOICES
9925 construct at *POS, updating *POS past the construct, given that
9926 the allowable indices are LOW..HIGH. Record the indices assigned
9927 to in INDICES[0 .. MAX_INDICES-1], updating *NUM_INDICES as
0963b4bd 9928 needed. CONTAINER is as for assign_aggregate. */
52ce6436
PH
9929static void
9930aggregate_assign_from_choices (struct value *container,
9931 struct value *lhs, struct expression *exp,
9932 int *pos, LONGEST *indices, int *num_indices,
9933 int max_indices, LONGEST low, LONGEST high)
9934{
9935 int j;
9936 int n_choices = longest_to_int (exp->elts[*pos+1].longconst);
9937 int choice_pos, expr_pc;
9938 int is_array = ada_is_direct_array_type (value_type (lhs));
9939
9940 choice_pos = *pos += 3;
9941
9942 for (j = 0; j < n_choices; j += 1)
9943 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9944 expr_pc = *pos;
9945 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9946
9947 for (j = 0; j < n_choices; j += 1)
9948 {
9949 LONGEST lower, upper;
9950 enum exp_opcode op = exp->elts[choice_pos].opcode;
5b4ee69b 9951
52ce6436
PH
9952 if (op == OP_DISCRETE_RANGE)
9953 {
9954 choice_pos += 1;
9955 lower = value_as_long (ada_evaluate_subexp (NULL, exp, pos,
9956 EVAL_NORMAL));
9957 upper = value_as_long (ada_evaluate_subexp (NULL, exp, pos,
9958 EVAL_NORMAL));
9959 }
9960 else if (is_array)
9961 {
9962 lower = value_as_long (ada_evaluate_subexp (NULL, exp, &choice_pos,
9963 EVAL_NORMAL));
9964 upper = lower;
9965 }
9966 else
9967 {
9968 int ind;
0d5cff50 9969 const char *name;
5b4ee69b 9970
52ce6436
PH
9971 switch (op)
9972 {
9973 case OP_NAME:
9974 name = &exp->elts[choice_pos + 2].string;
9975 break;
9976 case OP_VAR_VALUE:
9977 name = SYMBOL_NATURAL_NAME (exp->elts[choice_pos + 2].symbol);
9978 break;
9979 default:
9980 error (_("Invalid record component association."));
9981 }
9982 ada_evaluate_subexp (NULL, exp, &choice_pos, EVAL_SKIP);
9983 ind = 0;
9984 if (! find_struct_field (name, value_type (lhs), 0,
9985 NULL, NULL, NULL, NULL, &ind))
9986 error (_("Unknown component name: %s."), name);
9987 lower = upper = ind;
9988 }
9989
9990 if (lower <= upper && (lower < low || upper > high))
9991 error (_("Index in component association out of bounds."));
9992
9993 add_component_interval (lower, upper, indices, num_indices,
9994 max_indices);
9995 while (lower <= upper)
9996 {
9997 int pos1;
5b4ee69b 9998
52ce6436
PH
9999 pos1 = expr_pc;
10000 assign_component (container, lhs, lower, exp, &pos1);
10001 lower += 1;
10002 }
10003 }
10004}
10005
10006/* Assign the value of the expression in the OP_OTHERS construct in
10007 EXP at *POS into the components of LHS indexed from LOW .. HIGH that
10008 have not been previously assigned. The index intervals already assigned
10009 are in INDICES[0 .. NUM_INDICES-1]. Updates *POS to after the
0963b4bd 10010 OP_OTHERS clause. CONTAINER is as for assign_aggregate. */
52ce6436
PH
10011static void
10012aggregate_assign_others (struct value *container,
10013 struct value *lhs, struct expression *exp,
10014 int *pos, LONGEST *indices, int num_indices,
10015 LONGEST low, LONGEST high)
10016{
10017 int i;
5ce64950 10018 int expr_pc = *pos + 1;
52ce6436
PH
10019
10020 for (i = 0; i < num_indices - 2; i += 2)
10021 {
10022 LONGEST ind;
5b4ee69b 10023
52ce6436
PH
10024 for (ind = indices[i + 1] + 1; ind < indices[i + 2]; ind += 1)
10025 {
5ce64950 10026 int localpos;
5b4ee69b 10027
5ce64950
MS
10028 localpos = expr_pc;
10029 assign_component (container, lhs, ind, exp, &localpos);
52ce6436
PH
10030 }
10031 }
10032 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
10033}
10034
10035/* Add the interval [LOW .. HIGH] to the sorted set of intervals
10036 [ INDICES[0] .. INDICES[1] ],..., [ INDICES[*SIZE-2] .. INDICES[*SIZE-1] ],
10037 modifying *SIZE as needed. It is an error if *SIZE exceeds
10038 MAX_SIZE. The resulting intervals do not overlap. */
10039static void
10040add_component_interval (LONGEST low, LONGEST high,
10041 LONGEST* indices, int *size, int max_size)
10042{
10043 int i, j;
5b4ee69b 10044
52ce6436
PH
10045 for (i = 0; i < *size; i += 2) {
10046 if (high >= indices[i] && low <= indices[i + 1])
10047 {
10048 int kh;
5b4ee69b 10049
52ce6436
PH
10050 for (kh = i + 2; kh < *size; kh += 2)
10051 if (high < indices[kh])
10052 break;
10053 if (low < indices[i])
10054 indices[i] = low;
10055 indices[i + 1] = indices[kh - 1];
10056 if (high > indices[i + 1])
10057 indices[i + 1] = high;
10058 memcpy (indices + i + 2, indices + kh, *size - kh);
10059 *size -= kh - i - 2;
10060 return;
10061 }
10062 else if (high < indices[i])
10063 break;
10064 }
10065
10066 if (*size == max_size)
10067 error (_("Internal error: miscounted aggregate components."));
10068 *size += 2;
10069 for (j = *size-1; j >= i+2; j -= 1)
10070 indices[j] = indices[j - 2];
10071 indices[i] = low;
10072 indices[i + 1] = high;
10073}
10074
6e48bd2c
JB
10075/* Perform and Ada cast of ARG2 to type TYPE if the type of ARG2
10076 is different. */
10077
10078static struct value *
b7e22850 10079ada_value_cast (struct type *type, struct value *arg2)
6e48bd2c
JB
10080{
10081 if (type == ada_check_typedef (value_type (arg2)))
10082 return arg2;
10083
10084 if (ada_is_fixed_point_type (type))
95f39a5b 10085 return cast_to_fixed (type, arg2);
6e48bd2c
JB
10086
10087 if (ada_is_fixed_point_type (value_type (arg2)))
a53b7a21 10088 return cast_from_fixed (type, arg2);
6e48bd2c
JB
10089
10090 return value_cast (type, arg2);
10091}
10092
284614f0
JB
10093/* Evaluating Ada expressions, and printing their result.
10094 ------------------------------------------------------
10095
21649b50
JB
10096 1. Introduction:
10097 ----------------
10098
284614f0
JB
10099 We usually evaluate an Ada expression in order to print its value.
10100 We also evaluate an expression in order to print its type, which
10101 happens during the EVAL_AVOID_SIDE_EFFECTS phase of the evaluation,
10102 but we'll focus mostly on the EVAL_NORMAL phase. In practice, the
10103 EVAL_AVOID_SIDE_EFFECTS phase allows us to simplify certain aspects of
10104 the evaluation compared to the EVAL_NORMAL, but is otherwise very
10105 similar.
10106
10107 Evaluating expressions is a little more complicated for Ada entities
10108 than it is for entities in languages such as C. The main reason for
10109 this is that Ada provides types whose definition might be dynamic.
10110 One example of such types is variant records. Or another example
10111 would be an array whose bounds can only be known at run time.
10112
10113 The following description is a general guide as to what should be
10114 done (and what should NOT be done) in order to evaluate an expression
10115 involving such types, and when. This does not cover how the semantic
10116 information is encoded by GNAT as this is covered separatly. For the
10117 document used as the reference for the GNAT encoding, see exp_dbug.ads
10118 in the GNAT sources.
10119
10120 Ideally, we should embed each part of this description next to its
10121 associated code. Unfortunately, the amount of code is so vast right
10122 now that it's hard to see whether the code handling a particular
10123 situation might be duplicated or not. One day, when the code is
10124 cleaned up, this guide might become redundant with the comments
10125 inserted in the code, and we might want to remove it.
10126
21649b50
JB
10127 2. ``Fixing'' an Entity, the Simple Case:
10128 -----------------------------------------
10129
284614f0
JB
10130 When evaluating Ada expressions, the tricky issue is that they may
10131 reference entities whose type contents and size are not statically
10132 known. Consider for instance a variant record:
10133
10134 type Rec (Empty : Boolean := True) is record
10135 case Empty is
10136 when True => null;
10137 when False => Value : Integer;
10138 end case;
10139 end record;
10140 Yes : Rec := (Empty => False, Value => 1);
10141 No : Rec := (empty => True);
10142
10143 The size and contents of that record depends on the value of the
10144 descriminant (Rec.Empty). At this point, neither the debugging
10145 information nor the associated type structure in GDB are able to
10146 express such dynamic types. So what the debugger does is to create
10147 "fixed" versions of the type that applies to the specific object.
10148 We also informally refer to this opperation as "fixing" an object,
10149 which means creating its associated fixed type.
10150
10151 Example: when printing the value of variable "Yes" above, its fixed
10152 type would look like this:
10153
10154 type Rec is record
10155 Empty : Boolean;
10156 Value : Integer;
10157 end record;
10158
10159 On the other hand, if we printed the value of "No", its fixed type
10160 would become:
10161
10162 type Rec is record
10163 Empty : Boolean;
10164 end record;
10165
10166 Things become a little more complicated when trying to fix an entity
10167 with a dynamic type that directly contains another dynamic type,
10168 such as an array of variant records, for instance. There are
10169 two possible cases: Arrays, and records.
10170
21649b50
JB
10171 3. ``Fixing'' Arrays:
10172 ---------------------
10173
10174 The type structure in GDB describes an array in terms of its bounds,
10175 and the type of its elements. By design, all elements in the array
10176 have the same type and we cannot represent an array of variant elements
10177 using the current type structure in GDB. When fixing an array,
10178 we cannot fix the array element, as we would potentially need one
10179 fixed type per element of the array. As a result, the best we can do
10180 when fixing an array is to produce an array whose bounds and size
10181 are correct (allowing us to read it from memory), but without having
10182 touched its element type. Fixing each element will be done later,
10183 when (if) necessary.
10184
10185 Arrays are a little simpler to handle than records, because the same
10186 amount of memory is allocated for each element of the array, even if
1b536f04 10187 the amount of space actually used by each element differs from element
21649b50 10188 to element. Consider for instance the following array of type Rec:
284614f0
JB
10189
10190 type Rec_Array is array (1 .. 2) of Rec;
10191
1b536f04
JB
10192 The actual amount of memory occupied by each element might be different
10193 from element to element, depending on the value of their discriminant.
21649b50 10194 But the amount of space reserved for each element in the array remains
1b536f04 10195 fixed regardless. So we simply need to compute that size using
21649b50
JB
10196 the debugging information available, from which we can then determine
10197 the array size (we multiply the number of elements of the array by
10198 the size of each element).
10199
10200 The simplest case is when we have an array of a constrained element
10201 type. For instance, consider the following type declarations:
10202
10203 type Bounded_String (Max_Size : Integer) is
10204 Length : Integer;
10205 Buffer : String (1 .. Max_Size);
10206 end record;
10207 type Bounded_String_Array is array (1 ..2) of Bounded_String (80);
10208
10209 In this case, the compiler describes the array as an array of
10210 variable-size elements (identified by its XVS suffix) for which
10211 the size can be read in the parallel XVZ variable.
10212
10213 In the case of an array of an unconstrained element type, the compiler
10214 wraps the array element inside a private PAD type. This type should not
10215 be shown to the user, and must be "unwrap"'ed before printing. Note
284614f0
JB
10216 that we also use the adjective "aligner" in our code to designate
10217 these wrapper types.
10218
1b536f04 10219 In some cases, the size allocated for each element is statically
21649b50
JB
10220 known. In that case, the PAD type already has the correct size,
10221 and the array element should remain unfixed.
10222
10223 But there are cases when this size is not statically known.
10224 For instance, assuming that "Five" is an integer variable:
284614f0
JB
10225
10226 type Dynamic is array (1 .. Five) of Integer;
10227 type Wrapper (Has_Length : Boolean := False) is record
10228 Data : Dynamic;
10229 case Has_Length is
10230 when True => Length : Integer;
10231 when False => null;
10232 end case;
10233 end record;
10234 type Wrapper_Array is array (1 .. 2) of Wrapper;
10235
10236 Hello : Wrapper_Array := (others => (Has_Length => True,
10237 Data => (others => 17),
10238 Length => 1));
10239
10240
10241 The debugging info would describe variable Hello as being an
10242 array of a PAD type. The size of that PAD type is not statically
10243 known, but can be determined using a parallel XVZ variable.
10244 In that case, a copy of the PAD type with the correct size should
10245 be used for the fixed array.
10246
21649b50
JB
10247 3. ``Fixing'' record type objects:
10248 ----------------------------------
10249
10250 Things are slightly different from arrays in the case of dynamic
284614f0
JB
10251 record types. In this case, in order to compute the associated
10252 fixed type, we need to determine the size and offset of each of
10253 its components. This, in turn, requires us to compute the fixed
10254 type of each of these components.
10255
10256 Consider for instance the example:
10257
10258 type Bounded_String (Max_Size : Natural) is record
10259 Str : String (1 .. Max_Size);
10260 Length : Natural;
10261 end record;
10262 My_String : Bounded_String (Max_Size => 10);
10263
10264 In that case, the position of field "Length" depends on the size
10265 of field Str, which itself depends on the value of the Max_Size
21649b50 10266 discriminant. In order to fix the type of variable My_String,
284614f0
JB
10267 we need to fix the type of field Str. Therefore, fixing a variant
10268 record requires us to fix each of its components.
10269
10270 However, if a component does not have a dynamic size, the component
10271 should not be fixed. In particular, fields that use a PAD type
10272 should not fixed. Here is an example where this might happen
10273 (assuming type Rec above):
10274
10275 type Container (Big : Boolean) is record
10276 First : Rec;
10277 After : Integer;
10278 case Big is
10279 when True => Another : Integer;
10280 when False => null;
10281 end case;
10282 end record;
10283 My_Container : Container := (Big => False,
10284 First => (Empty => True),
10285 After => 42);
10286
10287 In that example, the compiler creates a PAD type for component First,
10288 whose size is constant, and then positions the component After just
10289 right after it. The offset of component After is therefore constant
10290 in this case.
10291
10292 The debugger computes the position of each field based on an algorithm
10293 that uses, among other things, the actual position and size of the field
21649b50
JB
10294 preceding it. Let's now imagine that the user is trying to print
10295 the value of My_Container. If the type fixing was recursive, we would
284614f0
JB
10296 end up computing the offset of field After based on the size of the
10297 fixed version of field First. And since in our example First has
10298 only one actual field, the size of the fixed type is actually smaller
10299 than the amount of space allocated to that field, and thus we would
10300 compute the wrong offset of field After.
10301
21649b50
JB
10302 To make things more complicated, we need to watch out for dynamic
10303 components of variant records (identified by the ___XVL suffix in
10304 the component name). Even if the target type is a PAD type, the size
10305 of that type might not be statically known. So the PAD type needs
10306 to be unwrapped and the resulting type needs to be fixed. Otherwise,
10307 we might end up with the wrong size for our component. This can be
10308 observed with the following type declarations:
284614f0
JB
10309
10310 type Octal is new Integer range 0 .. 7;
10311 type Octal_Array is array (Positive range <>) of Octal;
10312 pragma Pack (Octal_Array);
10313
10314 type Octal_Buffer (Size : Positive) is record
10315 Buffer : Octal_Array (1 .. Size);
10316 Length : Integer;
10317 end record;
10318
10319 In that case, Buffer is a PAD type whose size is unset and needs
10320 to be computed by fixing the unwrapped type.
10321
21649b50
JB
10322 4. When to ``Fix'' un-``Fixed'' sub-elements of an entity:
10323 ----------------------------------------------------------
10324
10325 Lastly, when should the sub-elements of an entity that remained unfixed
284614f0
JB
10326 thus far, be actually fixed?
10327
10328 The answer is: Only when referencing that element. For instance
10329 when selecting one component of a record, this specific component
10330 should be fixed at that point in time. Or when printing the value
10331 of a record, each component should be fixed before its value gets
10332 printed. Similarly for arrays, the element of the array should be
10333 fixed when printing each element of the array, or when extracting
10334 one element out of that array. On the other hand, fixing should
10335 not be performed on the elements when taking a slice of an array!
10336
31432a67 10337 Note that one of the side effects of miscomputing the offset and
284614f0
JB
10338 size of each field is that we end up also miscomputing the size
10339 of the containing type. This can have adverse results when computing
10340 the value of an entity. GDB fetches the value of an entity based
10341 on the size of its type, and thus a wrong size causes GDB to fetch
10342 the wrong amount of memory. In the case where the computed size is
10343 too small, GDB fetches too little data to print the value of our
31432a67 10344 entity. Results in this case are unpredictable, as we usually read
284614f0
JB
10345 past the buffer containing the data =:-o. */
10346
ced9779b
JB
10347/* Evaluate a subexpression of EXP, at index *POS, and return a value
10348 for that subexpression cast to TO_TYPE. Advance *POS over the
10349 subexpression. */
10350
10351static value *
10352ada_evaluate_subexp_for_cast (expression *exp, int *pos,
10353 enum noside noside, struct type *to_type)
10354{
10355 int pc = *pos;
10356
10357 if (exp->elts[pc].opcode == OP_VAR_MSYM_VALUE
10358 || exp->elts[pc].opcode == OP_VAR_VALUE)
10359 {
10360 (*pos) += 4;
10361
10362 value *val;
10363 if (exp->elts[pc].opcode == OP_VAR_MSYM_VALUE)
10364 {
10365 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10366 return value_zero (to_type, not_lval);
10367
10368 val = evaluate_var_msym_value (noside,
10369 exp->elts[pc + 1].objfile,
10370 exp->elts[pc + 2].msymbol);
10371 }
10372 else
10373 val = evaluate_var_value (noside,
10374 exp->elts[pc + 1].block,
10375 exp->elts[pc + 2].symbol);
10376
10377 if (noside == EVAL_SKIP)
10378 return eval_skip_value (exp);
10379
10380 val = ada_value_cast (to_type, val);
10381
10382 /* Follow the Ada language semantics that do not allow taking
10383 an address of the result of a cast (view conversion in Ada). */
10384 if (VALUE_LVAL (val) == lval_memory)
10385 {
10386 if (value_lazy (val))
10387 value_fetch_lazy (val);
10388 VALUE_LVAL (val) = not_lval;
10389 }
10390 return val;
10391 }
10392
10393 value *val = evaluate_subexp (to_type, exp, pos, noside);
10394 if (noside == EVAL_SKIP)
10395 return eval_skip_value (exp);
10396 return ada_value_cast (to_type, val);
10397}
10398
284614f0
JB
10399/* Implement the evaluate_exp routine in the exp_descriptor structure
10400 for the Ada language. */
10401
52ce6436 10402static struct value *
ebf56fd3 10403ada_evaluate_subexp (struct type *expect_type, struct expression *exp,
4c4b4cd2 10404 int *pos, enum noside noside)
14f9c5c9
AS
10405{
10406 enum exp_opcode op;
b5385fc0 10407 int tem;
14f9c5c9 10408 int pc;
5ec18f2b 10409 int preeval_pos;
14f9c5c9
AS
10410 struct value *arg1 = NULL, *arg2 = NULL, *arg3;
10411 struct type *type;
52ce6436 10412 int nargs, oplen;
d2e4a39e 10413 struct value **argvec;
14f9c5c9 10414
d2e4a39e
AS
10415 pc = *pos;
10416 *pos += 1;
14f9c5c9
AS
10417 op = exp->elts[pc].opcode;
10418
d2e4a39e 10419 switch (op)
14f9c5c9
AS
10420 {
10421 default:
10422 *pos -= 1;
6e48bd2c 10423 arg1 = evaluate_subexp_standard (expect_type, exp, pos, noside);
ca1f964d
JG
10424
10425 if (noside == EVAL_NORMAL)
10426 arg1 = unwrap_value (arg1);
6e48bd2c 10427
edd079d9 10428 /* If evaluating an OP_FLOAT and an EXPECT_TYPE was provided,
6e48bd2c
JB
10429 then we need to perform the conversion manually, because
10430 evaluate_subexp_standard doesn't do it. This conversion is
10431 necessary in Ada because the different kinds of float/fixed
10432 types in Ada have different representations.
10433
10434 Similarly, we need to perform the conversion from OP_LONG
10435 ourselves. */
edd079d9 10436 if ((op == OP_FLOAT || op == OP_LONG) && expect_type != NULL)
b7e22850 10437 arg1 = ada_value_cast (expect_type, arg1);
6e48bd2c
JB
10438
10439 return arg1;
4c4b4cd2
PH
10440
10441 case OP_STRING:
10442 {
76a01679 10443 struct value *result;
5b4ee69b 10444
76a01679
JB
10445 *pos -= 1;
10446 result = evaluate_subexp_standard (expect_type, exp, pos, noside);
10447 /* The result type will have code OP_STRING, bashed there from
10448 OP_ARRAY. Bash it back. */
df407dfe
AC
10449 if (TYPE_CODE (value_type (result)) == TYPE_CODE_STRING)
10450 TYPE_CODE (value_type (result)) = TYPE_CODE_ARRAY;
76a01679 10451 return result;
4c4b4cd2 10452 }
14f9c5c9
AS
10453
10454 case UNOP_CAST:
10455 (*pos) += 2;
10456 type = exp->elts[pc + 1].type;
ced9779b 10457 return ada_evaluate_subexp_for_cast (exp, pos, noside, type);
14f9c5c9 10458
4c4b4cd2
PH
10459 case UNOP_QUAL:
10460 (*pos) += 2;
10461 type = exp->elts[pc + 1].type;
10462 return ada_evaluate_subexp (type, exp, pos, noside);
10463
14f9c5c9
AS
10464 case BINOP_ASSIGN:
10465 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
52ce6436
PH
10466 if (exp->elts[*pos].opcode == OP_AGGREGATE)
10467 {
10468 arg1 = assign_aggregate (arg1, arg1, exp, pos, noside);
10469 if (noside == EVAL_SKIP || noside == EVAL_AVOID_SIDE_EFFECTS)
10470 return arg1;
10471 return ada_value_assign (arg1, arg1);
10472 }
003f3813
JB
10473 /* Force the evaluation of the rhs ARG2 to the type of the lhs ARG1,
10474 except if the lhs of our assignment is a convenience variable.
10475 In the case of assigning to a convenience variable, the lhs
10476 should be exactly the result of the evaluation of the rhs. */
10477 type = value_type (arg1);
10478 if (VALUE_LVAL (arg1) == lval_internalvar)
10479 type = NULL;
10480 arg2 = evaluate_subexp (type, exp, pos, noside);
14f9c5c9 10481 if (noside == EVAL_SKIP || noside == EVAL_AVOID_SIDE_EFFECTS)
4c4b4cd2 10482 return arg1;
f411722c
TT
10483 if (VALUE_LVAL (arg1) == lval_internalvar)
10484 {
10485 /* Nothing. */
10486 }
10487 else if (ada_is_fixed_point_type (value_type (arg1)))
df407dfe
AC
10488 arg2 = cast_to_fixed (value_type (arg1), arg2);
10489 else if (ada_is_fixed_point_type (value_type (arg2)))
76a01679 10490 error
323e0a4a 10491 (_("Fixed-point values must be assigned to fixed-point variables"));
d2e4a39e 10492 else
df407dfe 10493 arg2 = coerce_for_assign (value_type (arg1), arg2);
4c4b4cd2 10494 return ada_value_assign (arg1, arg2);
14f9c5c9
AS
10495
10496 case BINOP_ADD:
10497 arg1 = evaluate_subexp_with_coercion (exp, pos, noside);
10498 arg2 = evaluate_subexp_with_coercion (exp, pos, noside);
10499 if (noside == EVAL_SKIP)
4c4b4cd2 10500 goto nosideret;
2ac8a782
JB
10501 if (TYPE_CODE (value_type (arg1)) == TYPE_CODE_PTR)
10502 return (value_from_longest
10503 (value_type (arg1),
10504 value_as_long (arg1) + value_as_long (arg2)));
c40cc657
JB
10505 if (TYPE_CODE (value_type (arg2)) == TYPE_CODE_PTR)
10506 return (value_from_longest
10507 (value_type (arg2),
10508 value_as_long (arg1) + value_as_long (arg2)));
df407dfe
AC
10509 if ((ada_is_fixed_point_type (value_type (arg1))
10510 || ada_is_fixed_point_type (value_type (arg2)))
10511 && value_type (arg1) != value_type (arg2))
323e0a4a 10512 error (_("Operands of fixed-point addition must have the same type"));
b7789565
JB
10513 /* Do the addition, and cast the result to the type of the first
10514 argument. We cannot cast the result to a reference type, so if
10515 ARG1 is a reference type, find its underlying type. */
10516 type = value_type (arg1);
10517 while (TYPE_CODE (type) == TYPE_CODE_REF)
10518 type = TYPE_TARGET_TYPE (type);
f44316fa 10519 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
89eef114 10520 return value_cast (type, value_binop (arg1, arg2, BINOP_ADD));
14f9c5c9
AS
10521
10522 case BINOP_SUB:
10523 arg1 = evaluate_subexp_with_coercion (exp, pos, noside);
10524 arg2 = evaluate_subexp_with_coercion (exp, pos, noside);
10525 if (noside == EVAL_SKIP)
4c4b4cd2 10526 goto nosideret;
2ac8a782
JB
10527 if (TYPE_CODE (value_type (arg1)) == TYPE_CODE_PTR)
10528 return (value_from_longest
10529 (value_type (arg1),
10530 value_as_long (arg1) - value_as_long (arg2)));
c40cc657
JB
10531 if (TYPE_CODE (value_type (arg2)) == TYPE_CODE_PTR)
10532 return (value_from_longest
10533 (value_type (arg2),
10534 value_as_long (arg1) - value_as_long (arg2)));
df407dfe
AC
10535 if ((ada_is_fixed_point_type (value_type (arg1))
10536 || ada_is_fixed_point_type (value_type (arg2)))
10537 && value_type (arg1) != value_type (arg2))
0963b4bd
MS
10538 error (_("Operands of fixed-point subtraction "
10539 "must have the same type"));
b7789565
JB
10540 /* Do the substraction, and cast the result to the type of the first
10541 argument. We cannot cast the result to a reference type, so if
10542 ARG1 is a reference type, find its underlying type. */
10543 type = value_type (arg1);
10544 while (TYPE_CODE (type) == TYPE_CODE_REF)
10545 type = TYPE_TARGET_TYPE (type);
f44316fa 10546 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
89eef114 10547 return value_cast (type, value_binop (arg1, arg2, BINOP_SUB));
14f9c5c9
AS
10548
10549 case BINOP_MUL:
10550 case BINOP_DIV:
e1578042
JB
10551 case BINOP_REM:
10552 case BINOP_MOD:
14f9c5c9
AS
10553 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10554 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10555 if (noside == EVAL_SKIP)
4c4b4cd2 10556 goto nosideret;
e1578042 10557 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
9c2be529
JB
10558 {
10559 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10560 return value_zero (value_type (arg1), not_lval);
10561 }
14f9c5c9 10562 else
4c4b4cd2 10563 {
a53b7a21 10564 type = builtin_type (exp->gdbarch)->builtin_double;
df407dfe 10565 if (ada_is_fixed_point_type (value_type (arg1)))
a53b7a21 10566 arg1 = cast_from_fixed (type, arg1);
df407dfe 10567 if (ada_is_fixed_point_type (value_type (arg2)))
a53b7a21 10568 arg2 = cast_from_fixed (type, arg2);
f44316fa 10569 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
4c4b4cd2
PH
10570 return ada_value_binop (arg1, arg2, op);
10571 }
10572
4c4b4cd2
PH
10573 case BINOP_EQUAL:
10574 case BINOP_NOTEQUAL:
14f9c5c9 10575 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
df407dfe 10576 arg2 = evaluate_subexp (value_type (arg1), exp, pos, noside);
14f9c5c9 10577 if (noside == EVAL_SKIP)
76a01679 10578 goto nosideret;
4c4b4cd2 10579 if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 10580 tem = 0;
4c4b4cd2 10581 else
f44316fa
UW
10582 {
10583 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10584 tem = ada_value_equal (arg1, arg2);
10585 }
4c4b4cd2 10586 if (op == BINOP_NOTEQUAL)
76a01679 10587 tem = !tem;
fbb06eb1
UW
10588 type = language_bool_type (exp->language_defn, exp->gdbarch);
10589 return value_from_longest (type, (LONGEST) tem);
4c4b4cd2
PH
10590
10591 case UNOP_NEG:
10592 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10593 if (noside == EVAL_SKIP)
10594 goto nosideret;
df407dfe
AC
10595 else if (ada_is_fixed_point_type (value_type (arg1)))
10596 return value_cast (value_type (arg1), value_neg (arg1));
14f9c5c9 10597 else
f44316fa
UW
10598 {
10599 unop_promote (exp->language_defn, exp->gdbarch, &arg1);
10600 return value_neg (arg1);
10601 }
4c4b4cd2 10602
2330c6c6
JB
10603 case BINOP_LOGICAL_AND:
10604 case BINOP_LOGICAL_OR:
10605 case UNOP_LOGICAL_NOT:
000d5124
JB
10606 {
10607 struct value *val;
10608
10609 *pos -= 1;
10610 val = evaluate_subexp_standard (expect_type, exp, pos, noside);
fbb06eb1
UW
10611 type = language_bool_type (exp->language_defn, exp->gdbarch);
10612 return value_cast (type, val);
000d5124 10613 }
2330c6c6
JB
10614
10615 case BINOP_BITWISE_AND:
10616 case BINOP_BITWISE_IOR:
10617 case BINOP_BITWISE_XOR:
000d5124
JB
10618 {
10619 struct value *val;
10620
10621 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, EVAL_AVOID_SIDE_EFFECTS);
10622 *pos = pc;
10623 val = evaluate_subexp_standard (expect_type, exp, pos, noside);
10624
10625 return value_cast (value_type (arg1), val);
10626 }
2330c6c6 10627
14f9c5c9
AS
10628 case OP_VAR_VALUE:
10629 *pos -= 1;
6799def4 10630
14f9c5c9 10631 if (noside == EVAL_SKIP)
4c4b4cd2
PH
10632 {
10633 *pos += 4;
10634 goto nosideret;
10635 }
da5c522f
JB
10636
10637 if (SYMBOL_DOMAIN (exp->elts[pc + 2].symbol) == UNDEF_DOMAIN)
76a01679
JB
10638 /* Only encountered when an unresolved symbol occurs in a
10639 context other than a function call, in which case, it is
52ce6436 10640 invalid. */
323e0a4a 10641 error (_("Unexpected unresolved symbol, %s, during evaluation"),
4c4b4cd2 10642 SYMBOL_PRINT_NAME (exp->elts[pc + 2].symbol));
da5c522f
JB
10643
10644 if (noside == EVAL_AVOID_SIDE_EFFECTS)
4c4b4cd2 10645 {
0c1f74cf 10646 type = static_unwrap_type (SYMBOL_TYPE (exp->elts[pc + 2].symbol));
31dbc1c5
JB
10647 /* Check to see if this is a tagged type. We also need to handle
10648 the case where the type is a reference to a tagged type, but
10649 we have to be careful to exclude pointers to tagged types.
10650 The latter should be shown as usual (as a pointer), whereas
10651 a reference should mostly be transparent to the user. */
10652 if (ada_is_tagged_type (type, 0)
023db19c 10653 || (TYPE_CODE (type) == TYPE_CODE_REF
31dbc1c5 10654 && ada_is_tagged_type (TYPE_TARGET_TYPE (type), 0)))
0d72a7c3
JB
10655 {
10656 /* Tagged types are a little special in the fact that the real
10657 type is dynamic and can only be determined by inspecting the
10658 object's tag. This means that we need to get the object's
10659 value first (EVAL_NORMAL) and then extract the actual object
10660 type from its tag.
10661
10662 Note that we cannot skip the final step where we extract
10663 the object type from its tag, because the EVAL_NORMAL phase
10664 results in dynamic components being resolved into fixed ones.
10665 This can cause problems when trying to print the type
10666 description of tagged types whose parent has a dynamic size:
10667 We use the type name of the "_parent" component in order
10668 to print the name of the ancestor type in the type description.
10669 If that component had a dynamic size, the resolution into
10670 a fixed type would result in the loss of that type name,
10671 thus preventing us from printing the name of the ancestor
10672 type in the type description. */
10673 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, EVAL_NORMAL);
10674
10675 if (TYPE_CODE (type) != TYPE_CODE_REF)
10676 {
10677 struct type *actual_type;
10678
10679 actual_type = type_from_tag (ada_value_tag (arg1));
10680 if (actual_type == NULL)
10681 /* If, for some reason, we were unable to determine
10682 the actual type from the tag, then use the static
10683 approximation that we just computed as a fallback.
10684 This can happen if the debugging information is
10685 incomplete, for instance. */
10686 actual_type = type;
10687 return value_zero (actual_type, not_lval);
10688 }
10689 else
10690 {
10691 /* In the case of a ref, ada_coerce_ref takes care
10692 of determining the actual type. But the evaluation
10693 should return a ref as it should be valid to ask
10694 for its address; so rebuild a ref after coerce. */
10695 arg1 = ada_coerce_ref (arg1);
a65cfae5 10696 return value_ref (arg1, TYPE_CODE_REF);
0d72a7c3
JB
10697 }
10698 }
0c1f74cf 10699
84754697
JB
10700 /* Records and unions for which GNAT encodings have been
10701 generated need to be statically fixed as well.
10702 Otherwise, non-static fixing produces a type where
10703 all dynamic properties are removed, which prevents "ptype"
10704 from being able to completely describe the type.
10705 For instance, a case statement in a variant record would be
10706 replaced by the relevant components based on the actual
10707 value of the discriminants. */
10708 if ((TYPE_CODE (type) == TYPE_CODE_STRUCT
10709 && dynamic_template_type (type) != NULL)
10710 || (TYPE_CODE (type) == TYPE_CODE_UNION
10711 && ada_find_parallel_type (type, "___XVU") != NULL))
10712 {
10713 *pos += 4;
10714 return value_zero (to_static_fixed_type (type), not_lval);
10715 }
4c4b4cd2 10716 }
da5c522f
JB
10717
10718 arg1 = evaluate_subexp_standard (expect_type, exp, pos, noside);
10719 return ada_to_fixed_value (arg1);
4c4b4cd2
PH
10720
10721 case OP_FUNCALL:
10722 (*pos) += 2;
10723
10724 /* Allocate arg vector, including space for the function to be
10725 called in argvec[0] and a terminating NULL. */
10726 nargs = longest_to_int (exp->elts[pc + 1].longconst);
8d749320 10727 argvec = XALLOCAVEC (struct value *, nargs + 2);
4c4b4cd2
PH
10728
10729 if (exp->elts[*pos].opcode == OP_VAR_VALUE
76a01679 10730 && SYMBOL_DOMAIN (exp->elts[pc + 5].symbol) == UNDEF_DOMAIN)
323e0a4a 10731 error (_("Unexpected unresolved symbol, %s, during evaluation"),
4c4b4cd2
PH
10732 SYMBOL_PRINT_NAME (exp->elts[pc + 5].symbol));
10733 else
10734 {
10735 for (tem = 0; tem <= nargs; tem += 1)
10736 argvec[tem] = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10737 argvec[tem] = 0;
10738
10739 if (noside == EVAL_SKIP)
10740 goto nosideret;
10741 }
10742
ad82864c
JB
10743 if (ada_is_constrained_packed_array_type
10744 (desc_base_type (value_type (argvec[0]))))
4c4b4cd2 10745 argvec[0] = ada_coerce_to_simple_array (argvec[0]);
284614f0
JB
10746 else if (TYPE_CODE (value_type (argvec[0])) == TYPE_CODE_ARRAY
10747 && TYPE_FIELD_BITSIZE (value_type (argvec[0]), 0) != 0)
10748 /* This is a packed array that has already been fixed, and
10749 therefore already coerced to a simple array. Nothing further
10750 to do. */
10751 ;
e6c2c623
PMR
10752 else if (TYPE_CODE (value_type (argvec[0])) == TYPE_CODE_REF)
10753 {
10754 /* Make sure we dereference references so that all the code below
10755 feels like it's really handling the referenced value. Wrapping
10756 types (for alignment) may be there, so make sure we strip them as
10757 well. */
10758 argvec[0] = ada_to_fixed_value (coerce_ref (argvec[0]));
10759 }
10760 else if (TYPE_CODE (value_type (argvec[0])) == TYPE_CODE_ARRAY
10761 && VALUE_LVAL (argvec[0]) == lval_memory)
10762 argvec[0] = value_addr (argvec[0]);
4c4b4cd2 10763
df407dfe 10764 type = ada_check_typedef (value_type (argvec[0]));
720d1a40
JB
10765
10766 /* Ada allows us to implicitly dereference arrays when subscripting
8f465ea7
JB
10767 them. So, if this is an array typedef (encoding use for array
10768 access types encoded as fat pointers), strip it now. */
720d1a40
JB
10769 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF)
10770 type = ada_typedef_target_type (type);
10771
4c4b4cd2
PH
10772 if (TYPE_CODE (type) == TYPE_CODE_PTR)
10773 {
61ee279c 10774 switch (TYPE_CODE (ada_check_typedef (TYPE_TARGET_TYPE (type))))
4c4b4cd2
PH
10775 {
10776 case TYPE_CODE_FUNC:
61ee279c 10777 type = ada_check_typedef (TYPE_TARGET_TYPE (type));
4c4b4cd2
PH
10778 break;
10779 case TYPE_CODE_ARRAY:
10780 break;
10781 case TYPE_CODE_STRUCT:
10782 if (noside != EVAL_AVOID_SIDE_EFFECTS)
10783 argvec[0] = ada_value_ind (argvec[0]);
61ee279c 10784 type = ada_check_typedef (TYPE_TARGET_TYPE (type));
4c4b4cd2
PH
10785 break;
10786 default:
323e0a4a 10787 error (_("cannot subscript or call something of type `%s'"),
df407dfe 10788 ada_type_name (value_type (argvec[0])));
4c4b4cd2
PH
10789 break;
10790 }
10791 }
10792
10793 switch (TYPE_CODE (type))
10794 {
10795 case TYPE_CODE_FUNC:
10796 if (noside == EVAL_AVOID_SIDE_EFFECTS)
c8ea1972 10797 {
7022349d
PA
10798 if (TYPE_TARGET_TYPE (type) == NULL)
10799 error_call_unknown_return_type (NULL);
10800 return allocate_value (TYPE_TARGET_TYPE (type));
c8ea1972 10801 }
e71585ff
PA
10802 return call_function_by_hand (argvec[0], NULL,
10803 gdb::make_array_view (argvec + 1,
10804 nargs));
c8ea1972
PH
10805 case TYPE_CODE_INTERNAL_FUNCTION:
10806 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10807 /* We don't know anything about what the internal
10808 function might return, but we have to return
10809 something. */
10810 return value_zero (builtin_type (exp->gdbarch)->builtin_int,
10811 not_lval);
10812 else
10813 return call_internal_function (exp->gdbarch, exp->language_defn,
10814 argvec[0], nargs, argvec + 1);
10815
4c4b4cd2
PH
10816 case TYPE_CODE_STRUCT:
10817 {
10818 int arity;
10819
4c4b4cd2
PH
10820 arity = ada_array_arity (type);
10821 type = ada_array_element_type (type, nargs);
10822 if (type == NULL)
323e0a4a 10823 error (_("cannot subscript or call a record"));
4c4b4cd2 10824 if (arity != nargs)
323e0a4a 10825 error (_("wrong number of subscripts; expecting %d"), arity);
4c4b4cd2 10826 if (noside == EVAL_AVOID_SIDE_EFFECTS)
0a07e705 10827 return value_zero (ada_aligned_type (type), lval_memory);
4c4b4cd2
PH
10828 return
10829 unwrap_value (ada_value_subscript
10830 (argvec[0], nargs, argvec + 1));
10831 }
10832 case TYPE_CODE_ARRAY:
10833 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10834 {
10835 type = ada_array_element_type (type, nargs);
10836 if (type == NULL)
323e0a4a 10837 error (_("element type of array unknown"));
4c4b4cd2 10838 else
0a07e705 10839 return value_zero (ada_aligned_type (type), lval_memory);
4c4b4cd2
PH
10840 }
10841 return
10842 unwrap_value (ada_value_subscript
10843 (ada_coerce_to_simple_array (argvec[0]),
10844 nargs, argvec + 1));
10845 case TYPE_CODE_PTR: /* Pointer to array */
4c4b4cd2
PH
10846 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10847 {
deede10c 10848 type = to_fixed_array_type (TYPE_TARGET_TYPE (type), NULL, 1);
4c4b4cd2
PH
10849 type = ada_array_element_type (type, nargs);
10850 if (type == NULL)
323e0a4a 10851 error (_("element type of array unknown"));
4c4b4cd2 10852 else
0a07e705 10853 return value_zero (ada_aligned_type (type), lval_memory);
4c4b4cd2
PH
10854 }
10855 return
deede10c
JB
10856 unwrap_value (ada_value_ptr_subscript (argvec[0],
10857 nargs, argvec + 1));
4c4b4cd2
PH
10858
10859 default:
e1d5a0d2
PH
10860 error (_("Attempt to index or call something other than an "
10861 "array or function"));
4c4b4cd2
PH
10862 }
10863
10864 case TERNOP_SLICE:
10865 {
10866 struct value *array = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10867 struct value *low_bound_val =
10868 evaluate_subexp (NULL_TYPE, exp, pos, noside);
714e53ab
PH
10869 struct value *high_bound_val =
10870 evaluate_subexp (NULL_TYPE, exp, pos, noside);
10871 LONGEST low_bound;
10872 LONGEST high_bound;
5b4ee69b 10873
994b9211
AC
10874 low_bound_val = coerce_ref (low_bound_val);
10875 high_bound_val = coerce_ref (high_bound_val);
aa715135
JG
10876 low_bound = value_as_long (low_bound_val);
10877 high_bound = value_as_long (high_bound_val);
963a6417 10878
4c4b4cd2
PH
10879 if (noside == EVAL_SKIP)
10880 goto nosideret;
10881
4c4b4cd2
PH
10882 /* If this is a reference to an aligner type, then remove all
10883 the aligners. */
df407dfe
AC
10884 if (TYPE_CODE (value_type (array)) == TYPE_CODE_REF
10885 && ada_is_aligner_type (TYPE_TARGET_TYPE (value_type (array))))
10886 TYPE_TARGET_TYPE (value_type (array)) =
10887 ada_aligned_type (TYPE_TARGET_TYPE (value_type (array)));
4c4b4cd2 10888
ad82864c 10889 if (ada_is_constrained_packed_array_type (value_type (array)))
323e0a4a 10890 error (_("cannot slice a packed array"));
4c4b4cd2
PH
10891
10892 /* If this is a reference to an array or an array lvalue,
10893 convert to a pointer. */
df407dfe
AC
10894 if (TYPE_CODE (value_type (array)) == TYPE_CODE_REF
10895 || (TYPE_CODE (value_type (array)) == TYPE_CODE_ARRAY
4c4b4cd2
PH
10896 && VALUE_LVAL (array) == lval_memory))
10897 array = value_addr (array);
10898
1265e4aa 10899 if (noside == EVAL_AVOID_SIDE_EFFECTS
61ee279c 10900 && ada_is_array_descriptor_type (ada_check_typedef
df407dfe 10901 (value_type (array))))
bff8c71f
TT
10902 return empty_array (ada_type_of_array (array, 0), low_bound,
10903 high_bound);
4c4b4cd2
PH
10904
10905 array = ada_coerce_to_simple_array_ptr (array);
10906
714e53ab
PH
10907 /* If we have more than one level of pointer indirection,
10908 dereference the value until we get only one level. */
df407dfe
AC
10909 while (TYPE_CODE (value_type (array)) == TYPE_CODE_PTR
10910 && (TYPE_CODE (TYPE_TARGET_TYPE (value_type (array)))
714e53ab
PH
10911 == TYPE_CODE_PTR))
10912 array = value_ind (array);
10913
10914 /* Make sure we really do have an array type before going further,
10915 to avoid a SEGV when trying to get the index type or the target
10916 type later down the road if the debug info generated by
10917 the compiler is incorrect or incomplete. */
df407dfe 10918 if (!ada_is_simple_array_type (value_type (array)))
323e0a4a 10919 error (_("cannot take slice of non-array"));
714e53ab 10920
828292f2
JB
10921 if (TYPE_CODE (ada_check_typedef (value_type (array)))
10922 == TYPE_CODE_PTR)
4c4b4cd2 10923 {
828292f2
JB
10924 struct type *type0 = ada_check_typedef (value_type (array));
10925
0b5d8877 10926 if (high_bound < low_bound || noside == EVAL_AVOID_SIDE_EFFECTS)
bff8c71f 10927 return empty_array (TYPE_TARGET_TYPE (type0), low_bound, high_bound);
4c4b4cd2
PH
10928 else
10929 {
10930 struct type *arr_type0 =
828292f2 10931 to_fixed_array_type (TYPE_TARGET_TYPE (type0), NULL, 1);
5b4ee69b 10932
f5938064
JG
10933 return ada_value_slice_from_ptr (array, arr_type0,
10934 longest_to_int (low_bound),
10935 longest_to_int (high_bound));
4c4b4cd2
PH
10936 }
10937 }
10938 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
10939 return array;
10940 else if (high_bound < low_bound)
bff8c71f 10941 return empty_array (value_type (array), low_bound, high_bound);
4c4b4cd2 10942 else
529cad9c
PH
10943 return ada_value_slice (array, longest_to_int (low_bound),
10944 longest_to_int (high_bound));
4c4b4cd2 10945 }
14f9c5c9 10946
4c4b4cd2
PH
10947 case UNOP_IN_RANGE:
10948 (*pos) += 2;
10949 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
8008e265 10950 type = check_typedef (exp->elts[pc + 1].type);
14f9c5c9 10951
14f9c5c9 10952 if (noside == EVAL_SKIP)
4c4b4cd2 10953 goto nosideret;
14f9c5c9 10954
4c4b4cd2
PH
10955 switch (TYPE_CODE (type))
10956 {
10957 default:
e1d5a0d2
PH
10958 lim_warning (_("Membership test incompletely implemented; "
10959 "always returns true"));
fbb06eb1
UW
10960 type = language_bool_type (exp->language_defn, exp->gdbarch);
10961 return value_from_longest (type, (LONGEST) 1);
4c4b4cd2
PH
10962
10963 case TYPE_CODE_RANGE:
030b4912
UW
10964 arg2 = value_from_longest (type, TYPE_LOW_BOUND (type));
10965 arg3 = value_from_longest (type, TYPE_HIGH_BOUND (type));
f44316fa
UW
10966 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10967 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg3);
fbb06eb1
UW
10968 type = language_bool_type (exp->language_defn, exp->gdbarch);
10969 return
10970 value_from_longest (type,
4c4b4cd2
PH
10971 (value_less (arg1, arg3)
10972 || value_equal (arg1, arg3))
10973 && (value_less (arg2, arg1)
10974 || value_equal (arg2, arg1)));
10975 }
10976
10977 case BINOP_IN_BOUNDS:
14f9c5c9 10978 (*pos) += 2;
4c4b4cd2
PH
10979 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10980 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
14f9c5c9 10981
4c4b4cd2
PH
10982 if (noside == EVAL_SKIP)
10983 goto nosideret;
14f9c5c9 10984
4c4b4cd2 10985 if (noside == EVAL_AVOID_SIDE_EFFECTS)
fbb06eb1
UW
10986 {
10987 type = language_bool_type (exp->language_defn, exp->gdbarch);
10988 return value_zero (type, not_lval);
10989 }
14f9c5c9 10990
4c4b4cd2 10991 tem = longest_to_int (exp->elts[pc + 1].longconst);
14f9c5c9 10992
1eea4ebd
UW
10993 type = ada_index_type (value_type (arg2), tem, "range");
10994 if (!type)
10995 type = value_type (arg1);
14f9c5c9 10996
1eea4ebd
UW
10997 arg3 = value_from_longest (type, ada_array_bound (arg2, tem, 1));
10998 arg2 = value_from_longest (type, ada_array_bound (arg2, tem, 0));
d2e4a39e 10999
f44316fa
UW
11000 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
11001 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg3);
fbb06eb1 11002 type = language_bool_type (exp->language_defn, exp->gdbarch);
4c4b4cd2 11003 return
fbb06eb1 11004 value_from_longest (type,
4c4b4cd2
PH
11005 (value_less (arg1, arg3)
11006 || value_equal (arg1, arg3))
11007 && (value_less (arg2, arg1)
11008 || value_equal (arg2, arg1)));
11009
11010 case TERNOP_IN_RANGE:
11011 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11012 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11013 arg3 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11014
11015 if (noside == EVAL_SKIP)
11016 goto nosideret;
11017
f44316fa
UW
11018 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
11019 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg3);
fbb06eb1 11020 type = language_bool_type (exp->language_defn, exp->gdbarch);
4c4b4cd2 11021 return
fbb06eb1 11022 value_from_longest (type,
4c4b4cd2
PH
11023 (value_less (arg1, arg3)
11024 || value_equal (arg1, arg3))
11025 && (value_less (arg2, arg1)
11026 || value_equal (arg2, arg1)));
11027
11028 case OP_ATR_FIRST:
11029 case OP_ATR_LAST:
11030 case OP_ATR_LENGTH:
11031 {
76a01679 11032 struct type *type_arg;
5b4ee69b 11033
76a01679
JB
11034 if (exp->elts[*pos].opcode == OP_TYPE)
11035 {
11036 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
11037 arg1 = NULL;
5bc23cb3 11038 type_arg = check_typedef (exp->elts[pc + 2].type);
76a01679
JB
11039 }
11040 else
11041 {
11042 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11043 type_arg = NULL;
11044 }
11045
11046 if (exp->elts[*pos].opcode != OP_LONG)
323e0a4a 11047 error (_("Invalid operand to '%s"), ada_attribute_name (op));
76a01679
JB
11048 tem = longest_to_int (exp->elts[*pos + 2].longconst);
11049 *pos += 4;
11050
11051 if (noside == EVAL_SKIP)
11052 goto nosideret;
680e1bee
TT
11053 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
11054 {
11055 if (type_arg == NULL)
11056 type_arg = value_type (arg1);
76a01679 11057
680e1bee
TT
11058 if (ada_is_constrained_packed_array_type (type_arg))
11059 type_arg = decode_constrained_packed_array_type (type_arg);
11060
11061 if (!discrete_type_p (type_arg))
11062 {
11063 switch (op)
11064 {
11065 default: /* Should never happen. */
11066 error (_("unexpected attribute encountered"));
11067 case OP_ATR_FIRST:
11068 case OP_ATR_LAST:
11069 type_arg = ada_index_type (type_arg, tem,
11070 ada_attribute_name (op));
11071 break;
11072 case OP_ATR_LENGTH:
11073 type_arg = builtin_type (exp->gdbarch)->builtin_int;
11074 break;
11075 }
11076 }
11077
11078 return value_zero (type_arg, not_lval);
11079 }
11080 else if (type_arg == NULL)
76a01679
JB
11081 {
11082 arg1 = ada_coerce_ref (arg1);
11083
ad82864c 11084 if (ada_is_constrained_packed_array_type (value_type (arg1)))
76a01679
JB
11085 arg1 = ada_coerce_to_simple_array (arg1);
11086
aa4fb036 11087 if (op == OP_ATR_LENGTH)
1eea4ebd 11088 type = builtin_type (exp->gdbarch)->builtin_int;
aa4fb036
JB
11089 else
11090 {
11091 type = ada_index_type (value_type (arg1), tem,
11092 ada_attribute_name (op));
11093 if (type == NULL)
11094 type = builtin_type (exp->gdbarch)->builtin_int;
11095 }
76a01679 11096
76a01679
JB
11097 switch (op)
11098 {
11099 default: /* Should never happen. */
323e0a4a 11100 error (_("unexpected attribute encountered"));
76a01679 11101 case OP_ATR_FIRST:
1eea4ebd
UW
11102 return value_from_longest
11103 (type, ada_array_bound (arg1, tem, 0));
76a01679 11104 case OP_ATR_LAST:
1eea4ebd
UW
11105 return value_from_longest
11106 (type, ada_array_bound (arg1, tem, 1));
76a01679 11107 case OP_ATR_LENGTH:
1eea4ebd
UW
11108 return value_from_longest
11109 (type, ada_array_length (arg1, tem));
76a01679
JB
11110 }
11111 }
11112 else if (discrete_type_p (type_arg))
11113 {
11114 struct type *range_type;
0d5cff50 11115 const char *name = ada_type_name (type_arg);
5b4ee69b 11116
76a01679
JB
11117 range_type = NULL;
11118 if (name != NULL && TYPE_CODE (type_arg) != TYPE_CODE_ENUM)
28c85d6c 11119 range_type = to_fixed_range_type (type_arg, NULL);
76a01679
JB
11120 if (range_type == NULL)
11121 range_type = type_arg;
11122 switch (op)
11123 {
11124 default:
323e0a4a 11125 error (_("unexpected attribute encountered"));
76a01679 11126 case OP_ATR_FIRST:
690cc4eb 11127 return value_from_longest
43bbcdc2 11128 (range_type, ada_discrete_type_low_bound (range_type));
76a01679 11129 case OP_ATR_LAST:
690cc4eb 11130 return value_from_longest
43bbcdc2 11131 (range_type, ada_discrete_type_high_bound (range_type));
76a01679 11132 case OP_ATR_LENGTH:
323e0a4a 11133 error (_("the 'length attribute applies only to array types"));
76a01679
JB
11134 }
11135 }
11136 else if (TYPE_CODE (type_arg) == TYPE_CODE_FLT)
323e0a4a 11137 error (_("unimplemented type attribute"));
76a01679
JB
11138 else
11139 {
11140 LONGEST low, high;
11141
ad82864c
JB
11142 if (ada_is_constrained_packed_array_type (type_arg))
11143 type_arg = decode_constrained_packed_array_type (type_arg);
76a01679 11144
aa4fb036 11145 if (op == OP_ATR_LENGTH)
1eea4ebd 11146 type = builtin_type (exp->gdbarch)->builtin_int;
aa4fb036
JB
11147 else
11148 {
11149 type = ada_index_type (type_arg, tem, ada_attribute_name (op));
11150 if (type == NULL)
11151 type = builtin_type (exp->gdbarch)->builtin_int;
11152 }
1eea4ebd 11153
76a01679
JB
11154 switch (op)
11155 {
11156 default:
323e0a4a 11157 error (_("unexpected attribute encountered"));
76a01679 11158 case OP_ATR_FIRST:
1eea4ebd 11159 low = ada_array_bound_from_type (type_arg, tem, 0);
76a01679
JB
11160 return value_from_longest (type, low);
11161 case OP_ATR_LAST:
1eea4ebd 11162 high = ada_array_bound_from_type (type_arg, tem, 1);
76a01679
JB
11163 return value_from_longest (type, high);
11164 case OP_ATR_LENGTH:
1eea4ebd
UW
11165 low = ada_array_bound_from_type (type_arg, tem, 0);
11166 high = ada_array_bound_from_type (type_arg, tem, 1);
76a01679
JB
11167 return value_from_longest (type, high - low + 1);
11168 }
11169 }
14f9c5c9
AS
11170 }
11171
4c4b4cd2
PH
11172 case OP_ATR_TAG:
11173 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11174 if (noside == EVAL_SKIP)
76a01679 11175 goto nosideret;
4c4b4cd2
PH
11176
11177 if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 11178 return value_zero (ada_tag_type (arg1), not_lval);
4c4b4cd2
PH
11179
11180 return ada_value_tag (arg1);
11181
11182 case OP_ATR_MIN:
11183 case OP_ATR_MAX:
11184 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
14f9c5c9
AS
11185 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11186 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11187 if (noside == EVAL_SKIP)
76a01679 11188 goto nosideret;
d2e4a39e 11189 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
df407dfe 11190 return value_zero (value_type (arg1), not_lval);
14f9c5c9 11191 else
f44316fa
UW
11192 {
11193 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
11194 return value_binop (arg1, arg2,
11195 op == OP_ATR_MIN ? BINOP_MIN : BINOP_MAX);
11196 }
14f9c5c9 11197
4c4b4cd2
PH
11198 case OP_ATR_MODULUS:
11199 {
31dedfee 11200 struct type *type_arg = check_typedef (exp->elts[pc + 2].type);
4c4b4cd2 11201
5b4ee69b 11202 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
76a01679
JB
11203 if (noside == EVAL_SKIP)
11204 goto nosideret;
4c4b4cd2 11205
76a01679 11206 if (!ada_is_modular_type (type_arg))
323e0a4a 11207 error (_("'modulus must be applied to modular type"));
4c4b4cd2 11208
76a01679
JB
11209 return value_from_longest (TYPE_TARGET_TYPE (type_arg),
11210 ada_modulus (type_arg));
4c4b4cd2
PH
11211 }
11212
11213
11214 case OP_ATR_POS:
11215 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
14f9c5c9
AS
11216 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11217 if (noside == EVAL_SKIP)
76a01679 11218 goto nosideret;
3cb382c9
UW
11219 type = builtin_type (exp->gdbarch)->builtin_int;
11220 if (noside == EVAL_AVOID_SIDE_EFFECTS)
11221 return value_zero (type, not_lval);
14f9c5c9 11222 else
3cb382c9 11223 return value_pos_atr (type, arg1);
14f9c5c9 11224
4c4b4cd2
PH
11225 case OP_ATR_SIZE:
11226 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
8c1c099f
JB
11227 type = value_type (arg1);
11228
11229 /* If the argument is a reference, then dereference its type, since
11230 the user is really asking for the size of the actual object,
11231 not the size of the pointer. */
11232 if (TYPE_CODE (type) == TYPE_CODE_REF)
11233 type = TYPE_TARGET_TYPE (type);
11234
4c4b4cd2 11235 if (noside == EVAL_SKIP)
76a01679 11236 goto nosideret;
4c4b4cd2 11237 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
22601c15 11238 return value_zero (builtin_type (exp->gdbarch)->builtin_int, not_lval);
4c4b4cd2 11239 else
22601c15 11240 return value_from_longest (builtin_type (exp->gdbarch)->builtin_int,
8c1c099f 11241 TARGET_CHAR_BIT * TYPE_LENGTH (type));
4c4b4cd2
PH
11242
11243 case OP_ATR_VAL:
11244 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
14f9c5c9 11245 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
4c4b4cd2 11246 type = exp->elts[pc + 2].type;
14f9c5c9 11247 if (noside == EVAL_SKIP)
76a01679 11248 goto nosideret;
4c4b4cd2 11249 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 11250 return value_zero (type, not_lval);
4c4b4cd2 11251 else
76a01679 11252 return value_val_atr (type, arg1);
4c4b4cd2
PH
11253
11254 case BINOP_EXP:
11255 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11256 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11257 if (noside == EVAL_SKIP)
11258 goto nosideret;
11259 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
df407dfe 11260 return value_zero (value_type (arg1), not_lval);
4c4b4cd2 11261 else
f44316fa
UW
11262 {
11263 /* For integer exponentiation operations,
11264 only promote the first argument. */
11265 if (is_integral_type (value_type (arg2)))
11266 unop_promote (exp->language_defn, exp->gdbarch, &arg1);
11267 else
11268 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
11269
11270 return value_binop (arg1, arg2, op);
11271 }
4c4b4cd2
PH
11272
11273 case UNOP_PLUS:
11274 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11275 if (noside == EVAL_SKIP)
11276 goto nosideret;
11277 else
11278 return arg1;
11279
11280 case UNOP_ABS:
11281 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11282 if (noside == EVAL_SKIP)
11283 goto nosideret;
f44316fa 11284 unop_promote (exp->language_defn, exp->gdbarch, &arg1);
df407dfe 11285 if (value_less (arg1, value_zero (value_type (arg1), not_lval)))
4c4b4cd2 11286 return value_neg (arg1);
14f9c5c9 11287 else
4c4b4cd2 11288 return arg1;
14f9c5c9
AS
11289
11290 case UNOP_IND:
5ec18f2b 11291 preeval_pos = *pos;
6b0d7253 11292 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
14f9c5c9 11293 if (noside == EVAL_SKIP)
4c4b4cd2 11294 goto nosideret;
df407dfe 11295 type = ada_check_typedef (value_type (arg1));
14f9c5c9 11296 if (noside == EVAL_AVOID_SIDE_EFFECTS)
4c4b4cd2
PH
11297 {
11298 if (ada_is_array_descriptor_type (type))
11299 /* GDB allows dereferencing GNAT array descriptors. */
11300 {
11301 struct type *arrType = ada_type_of_array (arg1, 0);
5b4ee69b 11302
4c4b4cd2 11303 if (arrType == NULL)
323e0a4a 11304 error (_("Attempt to dereference null array pointer."));
00a4c844 11305 return value_at_lazy (arrType, 0);
4c4b4cd2
PH
11306 }
11307 else if (TYPE_CODE (type) == TYPE_CODE_PTR
11308 || TYPE_CODE (type) == TYPE_CODE_REF
11309 /* In C you can dereference an array to get the 1st elt. */
11310 || TYPE_CODE (type) == TYPE_CODE_ARRAY)
714e53ab 11311 {
5ec18f2b
JG
11312 /* As mentioned in the OP_VAR_VALUE case, tagged types can
11313 only be determined by inspecting the object's tag.
11314 This means that we need to evaluate completely the
11315 expression in order to get its type. */
11316
023db19c
JB
11317 if ((TYPE_CODE (type) == TYPE_CODE_REF
11318 || TYPE_CODE (type) == TYPE_CODE_PTR)
5ec18f2b
JG
11319 && ada_is_tagged_type (TYPE_TARGET_TYPE (type), 0))
11320 {
11321 arg1 = evaluate_subexp (NULL_TYPE, exp, &preeval_pos,
11322 EVAL_NORMAL);
11323 type = value_type (ada_value_ind (arg1));
11324 }
11325 else
11326 {
11327 type = to_static_fixed_type
11328 (ada_aligned_type
11329 (ada_check_typedef (TYPE_TARGET_TYPE (type))));
11330 }
c1b5a1a6 11331 ada_ensure_varsize_limit (type);
714e53ab
PH
11332 return value_zero (type, lval_memory);
11333 }
4c4b4cd2 11334 else if (TYPE_CODE (type) == TYPE_CODE_INT)
6b0d7253
JB
11335 {
11336 /* GDB allows dereferencing an int. */
11337 if (expect_type == NULL)
11338 return value_zero (builtin_type (exp->gdbarch)->builtin_int,
11339 lval_memory);
11340 else
11341 {
11342 expect_type =
11343 to_static_fixed_type (ada_aligned_type (expect_type));
11344 return value_zero (expect_type, lval_memory);
11345 }
11346 }
4c4b4cd2 11347 else
323e0a4a 11348 error (_("Attempt to take contents of a non-pointer value."));
4c4b4cd2 11349 }
0963b4bd 11350 arg1 = ada_coerce_ref (arg1); /* FIXME: What is this for?? */
df407dfe 11351 type = ada_check_typedef (value_type (arg1));
d2e4a39e 11352
96967637
JB
11353 if (TYPE_CODE (type) == TYPE_CODE_INT)
11354 /* GDB allows dereferencing an int. If we were given
11355 the expect_type, then use that as the target type.
11356 Otherwise, assume that the target type is an int. */
11357 {
11358 if (expect_type != NULL)
11359 return ada_value_ind (value_cast (lookup_pointer_type (expect_type),
11360 arg1));
11361 else
11362 return value_at_lazy (builtin_type (exp->gdbarch)->builtin_int,
11363 (CORE_ADDR) value_as_address (arg1));
11364 }
6b0d7253 11365
4c4b4cd2
PH
11366 if (ada_is_array_descriptor_type (type))
11367 /* GDB allows dereferencing GNAT array descriptors. */
11368 return ada_coerce_to_simple_array (arg1);
14f9c5c9 11369 else
4c4b4cd2 11370 return ada_value_ind (arg1);
14f9c5c9
AS
11371
11372 case STRUCTOP_STRUCT:
11373 tem = longest_to_int (exp->elts[pc + 1].longconst);
11374 (*pos) += 3 + BYTES_TO_EXP_ELEM (tem + 1);
5ec18f2b 11375 preeval_pos = *pos;
14f9c5c9
AS
11376 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11377 if (noside == EVAL_SKIP)
4c4b4cd2 11378 goto nosideret;
14f9c5c9 11379 if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 11380 {
df407dfe 11381 struct type *type1 = value_type (arg1);
5b4ee69b 11382
76a01679
JB
11383 if (ada_is_tagged_type (type1, 1))
11384 {
11385 type = ada_lookup_struct_elt_type (type1,
11386 &exp->elts[pc + 2].string,
988f6b3d 11387 1, 1);
5ec18f2b
JG
11388
11389 /* If the field is not found, check if it exists in the
11390 extension of this object's type. This means that we
11391 need to evaluate completely the expression. */
11392
76a01679 11393 if (type == NULL)
5ec18f2b
JG
11394 {
11395 arg1 = evaluate_subexp (NULL_TYPE, exp, &preeval_pos,
11396 EVAL_NORMAL);
11397 arg1 = ada_value_struct_elt (arg1,
11398 &exp->elts[pc + 2].string,
11399 0);
11400 arg1 = unwrap_value (arg1);
11401 type = value_type (ada_to_fixed_value (arg1));
11402 }
76a01679
JB
11403 }
11404 else
11405 type =
11406 ada_lookup_struct_elt_type (type1, &exp->elts[pc + 2].string, 1,
988f6b3d 11407 0);
76a01679
JB
11408
11409 return value_zero (ada_aligned_type (type), lval_memory);
11410 }
14f9c5c9 11411 else
a579cd9a
MW
11412 {
11413 arg1 = ada_value_struct_elt (arg1, &exp->elts[pc + 2].string, 0);
11414 arg1 = unwrap_value (arg1);
11415 return ada_to_fixed_value (arg1);
11416 }
284614f0 11417
14f9c5c9 11418 case OP_TYPE:
4c4b4cd2
PH
11419 /* The value is not supposed to be used. This is here to make it
11420 easier to accommodate expressions that contain types. */
14f9c5c9
AS
11421 (*pos) += 2;
11422 if (noside == EVAL_SKIP)
4c4b4cd2 11423 goto nosideret;
14f9c5c9 11424 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
a6cfbe68 11425 return allocate_value (exp->elts[pc + 1].type);
14f9c5c9 11426 else
323e0a4a 11427 error (_("Attempt to use a type name as an expression"));
52ce6436
PH
11428
11429 case OP_AGGREGATE:
11430 case OP_CHOICES:
11431 case OP_OTHERS:
11432 case OP_DISCRETE_RANGE:
11433 case OP_POSITIONAL:
11434 case OP_NAME:
11435 if (noside == EVAL_NORMAL)
11436 switch (op)
11437 {
11438 case OP_NAME:
11439 error (_("Undefined name, ambiguous name, or renaming used in "
e1d5a0d2 11440 "component association: %s."), &exp->elts[pc+2].string);
52ce6436
PH
11441 case OP_AGGREGATE:
11442 error (_("Aggregates only allowed on the right of an assignment"));
11443 default:
0963b4bd
MS
11444 internal_error (__FILE__, __LINE__,
11445 _("aggregate apparently mangled"));
52ce6436
PH
11446 }
11447
11448 ada_forward_operator_length (exp, pc, &oplen, &nargs);
11449 *pos += oplen - 1;
11450 for (tem = 0; tem < nargs; tem += 1)
11451 ada_evaluate_subexp (NULL, exp, pos, noside);
11452 goto nosideret;
14f9c5c9
AS
11453 }
11454
11455nosideret:
ced9779b 11456 return eval_skip_value (exp);
14f9c5c9 11457}
14f9c5c9 11458\f
d2e4a39e 11459
4c4b4cd2 11460 /* Fixed point */
14f9c5c9
AS
11461
11462/* If TYPE encodes an Ada fixed-point type, return the suffix of the
11463 type name that encodes the 'small and 'delta information.
4c4b4cd2 11464 Otherwise, return NULL. */
14f9c5c9 11465
d2e4a39e 11466static const char *
ebf56fd3 11467fixed_type_info (struct type *type)
14f9c5c9 11468{
d2e4a39e 11469 const char *name = ada_type_name (type);
14f9c5c9
AS
11470 enum type_code code = (type == NULL) ? TYPE_CODE_UNDEF : TYPE_CODE (type);
11471
d2e4a39e
AS
11472 if ((code == TYPE_CODE_INT || code == TYPE_CODE_RANGE) && name != NULL)
11473 {
14f9c5c9 11474 const char *tail = strstr (name, "___XF_");
5b4ee69b 11475
14f9c5c9 11476 if (tail == NULL)
4c4b4cd2 11477 return NULL;
d2e4a39e 11478 else
4c4b4cd2 11479 return tail + 5;
14f9c5c9
AS
11480 }
11481 else if (code == TYPE_CODE_RANGE && TYPE_TARGET_TYPE (type) != type)
11482 return fixed_type_info (TYPE_TARGET_TYPE (type));
11483 else
11484 return NULL;
11485}
11486
4c4b4cd2 11487/* Returns non-zero iff TYPE represents an Ada fixed-point type. */
14f9c5c9
AS
11488
11489int
ebf56fd3 11490ada_is_fixed_point_type (struct type *type)
14f9c5c9
AS
11491{
11492 return fixed_type_info (type) != NULL;
11493}
11494
4c4b4cd2
PH
11495/* Return non-zero iff TYPE represents a System.Address type. */
11496
11497int
11498ada_is_system_address_type (struct type *type)
11499{
11500 return (TYPE_NAME (type)
11501 && strcmp (TYPE_NAME (type), "system__address") == 0);
11502}
11503
14f9c5c9 11504/* Assuming that TYPE is the representation of an Ada fixed-point
50eff16b
UW
11505 type, return the target floating-point type to be used to represent
11506 of this type during internal computation. */
11507
11508static struct type *
11509ada_scaling_type (struct type *type)
11510{
11511 return builtin_type (get_type_arch (type))->builtin_long_double;
11512}
11513
11514/* Assuming that TYPE is the representation of an Ada fixed-point
11515 type, return its delta, or NULL if the type is malformed and the
4c4b4cd2 11516 delta cannot be determined. */
14f9c5c9 11517
50eff16b 11518struct value *
ebf56fd3 11519ada_delta (struct type *type)
14f9c5c9
AS
11520{
11521 const char *encoding = fixed_type_info (type);
50eff16b
UW
11522 struct type *scale_type = ada_scaling_type (type);
11523
11524 long long num, den;
11525
11526 if (sscanf (encoding, "_%lld_%lld", &num, &den) < 2)
11527 return nullptr;
d2e4a39e 11528 else
50eff16b
UW
11529 return value_binop (value_from_longest (scale_type, num),
11530 value_from_longest (scale_type, den), BINOP_DIV);
14f9c5c9
AS
11531}
11532
11533/* Assuming that ada_is_fixed_point_type (TYPE), return the scaling
4c4b4cd2 11534 factor ('SMALL value) associated with the type. */
14f9c5c9 11535
50eff16b
UW
11536struct value *
11537ada_scaling_factor (struct type *type)
14f9c5c9
AS
11538{
11539 const char *encoding = fixed_type_info (type);
50eff16b
UW
11540 struct type *scale_type = ada_scaling_type (type);
11541
11542 long long num0, den0, num1, den1;
14f9c5c9 11543 int n;
d2e4a39e 11544
50eff16b 11545 n = sscanf (encoding, "_%lld_%lld_%lld_%lld",
facc390f 11546 &num0, &den0, &num1, &den1);
14f9c5c9
AS
11547
11548 if (n < 2)
50eff16b 11549 return value_from_longest (scale_type, 1);
14f9c5c9 11550 else if (n == 4)
50eff16b
UW
11551 return value_binop (value_from_longest (scale_type, num1),
11552 value_from_longest (scale_type, den1), BINOP_DIV);
d2e4a39e 11553 else
50eff16b
UW
11554 return value_binop (value_from_longest (scale_type, num0),
11555 value_from_longest (scale_type, den0), BINOP_DIV);
14f9c5c9
AS
11556}
11557
14f9c5c9 11558\f
d2e4a39e 11559
4c4b4cd2 11560 /* Range types */
14f9c5c9
AS
11561
11562/* Scan STR beginning at position K for a discriminant name, and
11563 return the value of that discriminant field of DVAL in *PX. If
11564 PNEW_K is not null, put the position of the character beyond the
11565 name scanned in *PNEW_K. Return 1 if successful; return 0 and do
4c4b4cd2 11566 not alter *PX and *PNEW_K if unsuccessful. */
14f9c5c9
AS
11567
11568static int
108d56a4 11569scan_discrim_bound (const char *str, int k, struct value *dval, LONGEST * px,
76a01679 11570 int *pnew_k)
14f9c5c9
AS
11571{
11572 static char *bound_buffer = NULL;
11573 static size_t bound_buffer_len = 0;
5da1a4d3 11574 const char *pstart, *pend, *bound;
d2e4a39e 11575 struct value *bound_val;
14f9c5c9
AS
11576
11577 if (dval == NULL || str == NULL || str[k] == '\0')
11578 return 0;
11579
5da1a4d3
SM
11580 pstart = str + k;
11581 pend = strstr (pstart, "__");
14f9c5c9
AS
11582 if (pend == NULL)
11583 {
5da1a4d3 11584 bound = pstart;
14f9c5c9
AS
11585 k += strlen (bound);
11586 }
d2e4a39e 11587 else
14f9c5c9 11588 {
5da1a4d3
SM
11589 int len = pend - pstart;
11590
11591 /* Strip __ and beyond. */
11592 GROW_VECT (bound_buffer, bound_buffer_len, len + 1);
11593 strncpy (bound_buffer, pstart, len);
11594 bound_buffer[len] = '\0';
11595
14f9c5c9 11596 bound = bound_buffer;
d2e4a39e 11597 k = pend - str;
14f9c5c9 11598 }
d2e4a39e 11599
df407dfe 11600 bound_val = ada_search_struct_field (bound, dval, 0, value_type (dval));
14f9c5c9
AS
11601 if (bound_val == NULL)
11602 return 0;
11603
11604 *px = value_as_long (bound_val);
11605 if (pnew_k != NULL)
11606 *pnew_k = k;
11607 return 1;
11608}
11609
11610/* Value of variable named NAME in the current environment. If
11611 no such variable found, then if ERR_MSG is null, returns 0, and
4c4b4cd2
PH
11612 otherwise causes an error with message ERR_MSG. */
11613
d2e4a39e 11614static struct value *
edb0c9cb 11615get_var_value (const char *name, const char *err_msg)
14f9c5c9 11616{
b5ec771e 11617 lookup_name_info lookup_name (name, symbol_name_match_type::FULL);
14f9c5c9 11618
54d343a2 11619 std::vector<struct block_symbol> syms;
b5ec771e
PA
11620 int nsyms = ada_lookup_symbol_list_worker (lookup_name,
11621 get_selected_block (0),
11622 VAR_DOMAIN, &syms, 1);
14f9c5c9
AS
11623
11624 if (nsyms != 1)
11625 {
11626 if (err_msg == NULL)
4c4b4cd2 11627 return 0;
14f9c5c9 11628 else
8a3fe4f8 11629 error (("%s"), err_msg);
14f9c5c9
AS
11630 }
11631
54d343a2 11632 return value_of_variable (syms[0].symbol, syms[0].block);
14f9c5c9 11633}
d2e4a39e 11634
edb0c9cb
PA
11635/* Value of integer variable named NAME in the current environment.
11636 If no such variable is found, returns false. Otherwise, sets VALUE
11637 to the variable's value and returns true. */
4c4b4cd2 11638
edb0c9cb
PA
11639bool
11640get_int_var_value (const char *name, LONGEST &value)
14f9c5c9 11641{
4c4b4cd2 11642 struct value *var_val = get_var_value (name, 0);
d2e4a39e 11643
14f9c5c9 11644 if (var_val == 0)
edb0c9cb
PA
11645 return false;
11646
11647 value = value_as_long (var_val);
11648 return true;
14f9c5c9 11649}
d2e4a39e 11650
14f9c5c9
AS
11651
11652/* Return a range type whose base type is that of the range type named
11653 NAME in the current environment, and whose bounds are calculated
4c4b4cd2 11654 from NAME according to the GNAT range encoding conventions.
1ce677a4
UW
11655 Extract discriminant values, if needed, from DVAL. ORIG_TYPE is the
11656 corresponding range type from debug information; fall back to using it
11657 if symbol lookup fails. If a new type must be created, allocate it
11658 like ORIG_TYPE was. The bounds information, in general, is encoded
11659 in NAME, the base type given in the named range type. */
14f9c5c9 11660
d2e4a39e 11661static struct type *
28c85d6c 11662to_fixed_range_type (struct type *raw_type, struct value *dval)
14f9c5c9 11663{
0d5cff50 11664 const char *name;
14f9c5c9 11665 struct type *base_type;
108d56a4 11666 const char *subtype_info;
14f9c5c9 11667
28c85d6c
JB
11668 gdb_assert (raw_type != NULL);
11669 gdb_assert (TYPE_NAME (raw_type) != NULL);
dddfab26 11670
1ce677a4 11671 if (TYPE_CODE (raw_type) == TYPE_CODE_RANGE)
14f9c5c9
AS
11672 base_type = TYPE_TARGET_TYPE (raw_type);
11673 else
11674 base_type = raw_type;
11675
28c85d6c 11676 name = TYPE_NAME (raw_type);
14f9c5c9
AS
11677 subtype_info = strstr (name, "___XD");
11678 if (subtype_info == NULL)
690cc4eb 11679 {
43bbcdc2
PH
11680 LONGEST L = ada_discrete_type_low_bound (raw_type);
11681 LONGEST U = ada_discrete_type_high_bound (raw_type);
5b4ee69b 11682
690cc4eb
PH
11683 if (L < INT_MIN || U > INT_MAX)
11684 return raw_type;
11685 else
0c9c3474
SA
11686 return create_static_range_type (alloc_type_copy (raw_type), raw_type,
11687 L, U);
690cc4eb 11688 }
14f9c5c9
AS
11689 else
11690 {
11691 static char *name_buf = NULL;
11692 static size_t name_len = 0;
11693 int prefix_len = subtype_info - name;
11694 LONGEST L, U;
11695 struct type *type;
108d56a4 11696 const char *bounds_str;
14f9c5c9
AS
11697 int n;
11698
11699 GROW_VECT (name_buf, name_len, prefix_len + 5);
11700 strncpy (name_buf, name, prefix_len);
11701 name_buf[prefix_len] = '\0';
11702
11703 subtype_info += 5;
11704 bounds_str = strchr (subtype_info, '_');
11705 n = 1;
11706
d2e4a39e 11707 if (*subtype_info == 'L')
4c4b4cd2
PH
11708 {
11709 if (!ada_scan_number (bounds_str, n, &L, &n)
11710 && !scan_discrim_bound (bounds_str, n, dval, &L, &n))
11711 return raw_type;
11712 if (bounds_str[n] == '_')
11713 n += 2;
0963b4bd 11714 else if (bounds_str[n] == '.') /* FIXME? SGI Workshop kludge. */
4c4b4cd2
PH
11715 n += 1;
11716 subtype_info += 1;
11717 }
d2e4a39e 11718 else
4c4b4cd2 11719 {
4c4b4cd2 11720 strcpy (name_buf + prefix_len, "___L");
edb0c9cb 11721 if (!get_int_var_value (name_buf, L))
4c4b4cd2 11722 {
323e0a4a 11723 lim_warning (_("Unknown lower bound, using 1."));
4c4b4cd2
PH
11724 L = 1;
11725 }
11726 }
14f9c5c9 11727
d2e4a39e 11728 if (*subtype_info == 'U')
4c4b4cd2
PH
11729 {
11730 if (!ada_scan_number (bounds_str, n, &U, &n)
11731 && !scan_discrim_bound (bounds_str, n, dval, &U, &n))
11732 return raw_type;
11733 }
d2e4a39e 11734 else
4c4b4cd2 11735 {
4c4b4cd2 11736 strcpy (name_buf + prefix_len, "___U");
edb0c9cb 11737 if (!get_int_var_value (name_buf, U))
4c4b4cd2 11738 {
323e0a4a 11739 lim_warning (_("Unknown upper bound, using %ld."), (long) L);
4c4b4cd2
PH
11740 U = L;
11741 }
11742 }
14f9c5c9 11743
0c9c3474
SA
11744 type = create_static_range_type (alloc_type_copy (raw_type),
11745 base_type, L, U);
f5a91472
JB
11746 /* create_static_range_type alters the resulting type's length
11747 to match the size of the base_type, which is not what we want.
11748 Set it back to the original range type's length. */
11749 TYPE_LENGTH (type) = TYPE_LENGTH (raw_type);
d2e4a39e 11750 TYPE_NAME (type) = name;
14f9c5c9
AS
11751 return type;
11752 }
11753}
11754
4c4b4cd2
PH
11755/* True iff NAME is the name of a range type. */
11756
14f9c5c9 11757int
d2e4a39e 11758ada_is_range_type_name (const char *name)
14f9c5c9
AS
11759{
11760 return (name != NULL && strstr (name, "___XD"));
d2e4a39e 11761}
14f9c5c9 11762\f
d2e4a39e 11763
4c4b4cd2
PH
11764 /* Modular types */
11765
11766/* True iff TYPE is an Ada modular type. */
14f9c5c9 11767
14f9c5c9 11768int
d2e4a39e 11769ada_is_modular_type (struct type *type)
14f9c5c9 11770{
18af8284 11771 struct type *subranged_type = get_base_type (type);
14f9c5c9
AS
11772
11773 return (subranged_type != NULL && TYPE_CODE (type) == TYPE_CODE_RANGE
690cc4eb 11774 && TYPE_CODE (subranged_type) == TYPE_CODE_INT
4c4b4cd2 11775 && TYPE_UNSIGNED (subranged_type));
14f9c5c9
AS
11776}
11777
4c4b4cd2
PH
11778/* Assuming ada_is_modular_type (TYPE), the modulus of TYPE. */
11779
61ee279c 11780ULONGEST
0056e4d5 11781ada_modulus (struct type *type)
14f9c5c9 11782{
43bbcdc2 11783 return (ULONGEST) TYPE_HIGH_BOUND (type) + 1;
14f9c5c9 11784}
d2e4a39e 11785\f
f7f9143b
JB
11786
11787/* Ada exception catchpoint support:
11788 ---------------------------------
11789
11790 We support 3 kinds of exception catchpoints:
11791 . catchpoints on Ada exceptions
11792 . catchpoints on unhandled Ada exceptions
11793 . catchpoints on failed assertions
11794
11795 Exceptions raised during failed assertions, or unhandled exceptions
11796 could perfectly be caught with the general catchpoint on Ada exceptions.
11797 However, we can easily differentiate these two special cases, and having
11798 the option to distinguish these two cases from the rest can be useful
11799 to zero-in on certain situations.
11800
11801 Exception catchpoints are a specialized form of breakpoint,
11802 since they rely on inserting breakpoints inside known routines
11803 of the GNAT runtime. The implementation therefore uses a standard
11804 breakpoint structure of the BP_BREAKPOINT type, but with its own set
11805 of breakpoint_ops.
11806
0259addd
JB
11807 Support in the runtime for exception catchpoints have been changed
11808 a few times already, and these changes affect the implementation
11809 of these catchpoints. In order to be able to support several
11810 variants of the runtime, we use a sniffer that will determine
28010a5d 11811 the runtime variant used by the program being debugged. */
f7f9143b 11812
82eacd52
JB
11813/* Ada's standard exceptions.
11814
11815 The Ada 83 standard also defined Numeric_Error. But there so many
11816 situations where it was unclear from the Ada 83 Reference Manual
11817 (RM) whether Constraint_Error or Numeric_Error should be raised,
11818 that the ARG (Ada Rapporteur Group) eventually issued a Binding
11819 Interpretation saying that anytime the RM says that Numeric_Error
11820 should be raised, the implementation may raise Constraint_Error.
11821 Ada 95 went one step further and pretty much removed Numeric_Error
11822 from the list of standard exceptions (it made it a renaming of
11823 Constraint_Error, to help preserve compatibility when compiling
11824 an Ada83 compiler). As such, we do not include Numeric_Error from
11825 this list of standard exceptions. */
3d0b0fa3 11826
a121b7c1 11827static const char *standard_exc[] = {
3d0b0fa3
JB
11828 "constraint_error",
11829 "program_error",
11830 "storage_error",
11831 "tasking_error"
11832};
11833
0259addd
JB
11834typedef CORE_ADDR (ada_unhandled_exception_name_addr_ftype) (void);
11835
11836/* A structure that describes how to support exception catchpoints
11837 for a given executable. */
11838
11839struct exception_support_info
11840{
11841 /* The name of the symbol to break on in order to insert
11842 a catchpoint on exceptions. */
11843 const char *catch_exception_sym;
11844
11845 /* The name of the symbol to break on in order to insert
11846 a catchpoint on unhandled exceptions. */
11847 const char *catch_exception_unhandled_sym;
11848
11849 /* The name of the symbol to break on in order to insert
11850 a catchpoint on failed assertions. */
11851 const char *catch_assert_sym;
11852
9f757bf7
XR
11853 /* The name of the symbol to break on in order to insert
11854 a catchpoint on exception handling. */
11855 const char *catch_handlers_sym;
11856
0259addd
JB
11857 /* Assuming that the inferior just triggered an unhandled exception
11858 catchpoint, this function is responsible for returning the address
11859 in inferior memory where the name of that exception is stored.
11860 Return zero if the address could not be computed. */
11861 ada_unhandled_exception_name_addr_ftype *unhandled_exception_name_addr;
11862};
11863
11864static CORE_ADDR ada_unhandled_exception_name_addr (void);
11865static CORE_ADDR ada_unhandled_exception_name_addr_from_raise (void);
11866
11867/* The following exception support info structure describes how to
11868 implement exception catchpoints with the latest version of the
ca683e3a 11869 Ada runtime (as of 2019-08-??). */
0259addd
JB
11870
11871static const struct exception_support_info default_exception_support_info =
ca683e3a
AO
11872{
11873 "__gnat_debug_raise_exception", /* catch_exception_sym */
11874 "__gnat_unhandled_exception", /* catch_exception_unhandled_sym */
11875 "__gnat_debug_raise_assert_failure", /* catch_assert_sym */
11876 "__gnat_begin_handler_v1", /* catch_handlers_sym */
11877 ada_unhandled_exception_name_addr
11878};
11879
11880/* The following exception support info structure describes how to
11881 implement exception catchpoints with an earlier version of the
11882 Ada runtime (as of 2007-03-06) using v0 of the EH ABI. */
11883
11884static const struct exception_support_info exception_support_info_v0 =
0259addd
JB
11885{
11886 "__gnat_debug_raise_exception", /* catch_exception_sym */
11887 "__gnat_unhandled_exception", /* catch_exception_unhandled_sym */
11888 "__gnat_debug_raise_assert_failure", /* catch_assert_sym */
9f757bf7 11889 "__gnat_begin_handler", /* catch_handlers_sym */
0259addd
JB
11890 ada_unhandled_exception_name_addr
11891};
11892
11893/* The following exception support info structure describes how to
11894 implement exception catchpoints with a slightly older version
11895 of the Ada runtime. */
11896
11897static const struct exception_support_info exception_support_info_fallback =
11898{
11899 "__gnat_raise_nodefer_with_msg", /* catch_exception_sym */
11900 "__gnat_unhandled_exception", /* catch_exception_unhandled_sym */
11901 "system__assertions__raise_assert_failure", /* catch_assert_sym */
9f757bf7 11902 "__gnat_begin_handler", /* catch_handlers_sym */
0259addd
JB
11903 ada_unhandled_exception_name_addr_from_raise
11904};
11905
f17011e0
JB
11906/* Return nonzero if we can detect the exception support routines
11907 described in EINFO.
11908
11909 This function errors out if an abnormal situation is detected
11910 (for instance, if we find the exception support routines, but
11911 that support is found to be incomplete). */
11912
11913static int
11914ada_has_this_exception_support (const struct exception_support_info *einfo)
11915{
11916 struct symbol *sym;
11917
11918 /* The symbol we're looking up is provided by a unit in the GNAT runtime
11919 that should be compiled with debugging information. As a result, we
11920 expect to find that symbol in the symtabs. */
11921
11922 sym = standard_lookup (einfo->catch_exception_sym, NULL, VAR_DOMAIN);
11923 if (sym == NULL)
a6af7abe
JB
11924 {
11925 /* Perhaps we did not find our symbol because the Ada runtime was
11926 compiled without debugging info, or simply stripped of it.
11927 It happens on some GNU/Linux distributions for instance, where
11928 users have to install a separate debug package in order to get
11929 the runtime's debugging info. In that situation, let the user
11930 know why we cannot insert an Ada exception catchpoint.
11931
11932 Note: Just for the purpose of inserting our Ada exception
11933 catchpoint, we could rely purely on the associated minimal symbol.
11934 But we would be operating in degraded mode anyway, since we are
11935 still lacking the debugging info needed later on to extract
11936 the name of the exception being raised (this name is printed in
11937 the catchpoint message, and is also used when trying to catch
11938 a specific exception). We do not handle this case for now. */
3b7344d5 11939 struct bound_minimal_symbol msym
1c8e84b0
JB
11940 = lookup_minimal_symbol (einfo->catch_exception_sym, NULL, NULL);
11941
3b7344d5 11942 if (msym.minsym && MSYMBOL_TYPE (msym.minsym) != mst_solib_trampoline)
a6af7abe
JB
11943 error (_("Your Ada runtime appears to be missing some debugging "
11944 "information.\nCannot insert Ada exception catchpoint "
11945 "in this configuration."));
11946
11947 return 0;
11948 }
f17011e0
JB
11949
11950 /* Make sure that the symbol we found corresponds to a function. */
11951
11952 if (SYMBOL_CLASS (sym) != LOC_BLOCK)
ca683e3a
AO
11953 {
11954 error (_("Symbol \"%s\" is not a function (class = %d)"),
11955 SYMBOL_LINKAGE_NAME (sym), SYMBOL_CLASS (sym));
11956 return 0;
11957 }
11958
11959 sym = standard_lookup (einfo->catch_handlers_sym, NULL, VAR_DOMAIN);
11960 if (sym == NULL)
11961 {
11962 struct bound_minimal_symbol msym
11963 = lookup_minimal_symbol (einfo->catch_handlers_sym, NULL, NULL);
11964
11965 if (msym.minsym && MSYMBOL_TYPE (msym.minsym) != mst_solib_trampoline)
11966 error (_("Your Ada runtime appears to be missing some debugging "
11967 "information.\nCannot insert Ada exception catchpoint "
11968 "in this configuration."));
11969
11970 return 0;
11971 }
11972
11973 /* Make sure that the symbol we found corresponds to a function. */
11974
11975 if (SYMBOL_CLASS (sym) != LOC_BLOCK)
11976 {
11977 error (_("Symbol \"%s\" is not a function (class = %d)"),
11978 SYMBOL_LINKAGE_NAME (sym), SYMBOL_CLASS (sym));
11979 return 0;
11980 }
f17011e0
JB
11981
11982 return 1;
11983}
11984
0259addd
JB
11985/* Inspect the Ada runtime and determine which exception info structure
11986 should be used to provide support for exception catchpoints.
11987
3eecfa55
JB
11988 This function will always set the per-inferior exception_info,
11989 or raise an error. */
0259addd
JB
11990
11991static void
11992ada_exception_support_info_sniffer (void)
11993{
3eecfa55 11994 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
0259addd
JB
11995
11996 /* If the exception info is already known, then no need to recompute it. */
3eecfa55 11997 if (data->exception_info != NULL)
0259addd
JB
11998 return;
11999
12000 /* Check the latest (default) exception support info. */
f17011e0 12001 if (ada_has_this_exception_support (&default_exception_support_info))
0259addd 12002 {
3eecfa55 12003 data->exception_info = &default_exception_support_info;
0259addd
JB
12004 return;
12005 }
12006
ca683e3a
AO
12007 /* Try the v0 exception suport info. */
12008 if (ada_has_this_exception_support (&exception_support_info_v0))
12009 {
12010 data->exception_info = &exception_support_info_v0;
12011 return;
12012 }
12013
0259addd 12014 /* Try our fallback exception suport info. */
f17011e0 12015 if (ada_has_this_exception_support (&exception_support_info_fallback))
0259addd 12016 {
3eecfa55 12017 data->exception_info = &exception_support_info_fallback;
0259addd
JB
12018 return;
12019 }
12020
12021 /* Sometimes, it is normal for us to not be able to find the routine
12022 we are looking for. This happens when the program is linked with
12023 the shared version of the GNAT runtime, and the program has not been
12024 started yet. Inform the user of these two possible causes if
12025 applicable. */
12026
ccefe4c4 12027 if (ada_update_initial_language (language_unknown) != language_ada)
0259addd
JB
12028 error (_("Unable to insert catchpoint. Is this an Ada main program?"));
12029
12030 /* If the symbol does not exist, then check that the program is
12031 already started, to make sure that shared libraries have been
12032 loaded. If it is not started, this may mean that the symbol is
12033 in a shared library. */
12034
e99b03dc 12035 if (inferior_ptid.pid () == 0)
0259addd
JB
12036 error (_("Unable to insert catchpoint. Try to start the program first."));
12037
12038 /* At this point, we know that we are debugging an Ada program and
12039 that the inferior has been started, but we still are not able to
0963b4bd 12040 find the run-time symbols. That can mean that we are in
0259addd
JB
12041 configurable run time mode, or that a-except as been optimized
12042 out by the linker... In any case, at this point it is not worth
12043 supporting this feature. */
12044
7dda8cff 12045 error (_("Cannot insert Ada exception catchpoints in this configuration."));
0259addd
JB
12046}
12047
f7f9143b
JB
12048/* True iff FRAME is very likely to be that of a function that is
12049 part of the runtime system. This is all very heuristic, but is
12050 intended to be used as advice as to what frames are uninteresting
12051 to most users. */
12052
12053static int
12054is_known_support_routine (struct frame_info *frame)
12055{
692465f1 12056 enum language func_lang;
f7f9143b 12057 int i;
f35a17b5 12058 const char *fullname;
f7f9143b 12059
4ed6b5be
JB
12060 /* If this code does not have any debugging information (no symtab),
12061 This cannot be any user code. */
f7f9143b 12062
51abb421 12063 symtab_and_line sal = find_frame_sal (frame);
f7f9143b
JB
12064 if (sal.symtab == NULL)
12065 return 1;
12066
4ed6b5be
JB
12067 /* If there is a symtab, but the associated source file cannot be
12068 located, then assume this is not user code: Selecting a frame
12069 for which we cannot display the code would not be very helpful
12070 for the user. This should also take care of case such as VxWorks
12071 where the kernel has some debugging info provided for a few units. */
f7f9143b 12072
f35a17b5
JK
12073 fullname = symtab_to_fullname (sal.symtab);
12074 if (access (fullname, R_OK) != 0)
f7f9143b
JB
12075 return 1;
12076
4ed6b5be
JB
12077 /* Check the unit filename againt the Ada runtime file naming.
12078 We also check the name of the objfile against the name of some
12079 known system libraries that sometimes come with debugging info
12080 too. */
12081
f7f9143b
JB
12082 for (i = 0; known_runtime_file_name_patterns[i] != NULL; i += 1)
12083 {
12084 re_comp (known_runtime_file_name_patterns[i]);
f69c91ad 12085 if (re_exec (lbasename (sal.symtab->filename)))
f7f9143b 12086 return 1;
eb822aa6
DE
12087 if (SYMTAB_OBJFILE (sal.symtab) != NULL
12088 && re_exec (objfile_name (SYMTAB_OBJFILE (sal.symtab))))
4ed6b5be 12089 return 1;
f7f9143b
JB
12090 }
12091
4ed6b5be 12092 /* Check whether the function is a GNAT-generated entity. */
f7f9143b 12093
c6dc63a1
TT
12094 gdb::unique_xmalloc_ptr<char> func_name
12095 = find_frame_funname (frame, &func_lang, NULL);
f7f9143b
JB
12096 if (func_name == NULL)
12097 return 1;
12098
12099 for (i = 0; known_auxiliary_function_name_patterns[i] != NULL; i += 1)
12100 {
12101 re_comp (known_auxiliary_function_name_patterns[i]);
c6dc63a1
TT
12102 if (re_exec (func_name.get ()))
12103 return 1;
f7f9143b
JB
12104 }
12105
12106 return 0;
12107}
12108
12109/* Find the first frame that contains debugging information and that is not
12110 part of the Ada run-time, starting from FI and moving upward. */
12111
0ef643c8 12112void
f7f9143b
JB
12113ada_find_printable_frame (struct frame_info *fi)
12114{
12115 for (; fi != NULL; fi = get_prev_frame (fi))
12116 {
12117 if (!is_known_support_routine (fi))
12118 {
12119 select_frame (fi);
12120 break;
12121 }
12122 }
12123
12124}
12125
12126/* Assuming that the inferior just triggered an unhandled exception
12127 catchpoint, return the address in inferior memory where the name
12128 of the exception is stored.
12129
12130 Return zero if the address could not be computed. */
12131
12132static CORE_ADDR
12133ada_unhandled_exception_name_addr (void)
0259addd
JB
12134{
12135 return parse_and_eval_address ("e.full_name");
12136}
12137
12138/* Same as ada_unhandled_exception_name_addr, except that this function
12139 should be used when the inferior uses an older version of the runtime,
12140 where the exception name needs to be extracted from a specific frame
12141 several frames up in the callstack. */
12142
12143static CORE_ADDR
12144ada_unhandled_exception_name_addr_from_raise (void)
f7f9143b
JB
12145{
12146 int frame_level;
12147 struct frame_info *fi;
3eecfa55 12148 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
f7f9143b
JB
12149
12150 /* To determine the name of this exception, we need to select
12151 the frame corresponding to RAISE_SYM_NAME. This frame is
12152 at least 3 levels up, so we simply skip the first 3 frames
12153 without checking the name of their associated function. */
12154 fi = get_current_frame ();
12155 for (frame_level = 0; frame_level < 3; frame_level += 1)
12156 if (fi != NULL)
12157 fi = get_prev_frame (fi);
12158
12159 while (fi != NULL)
12160 {
692465f1
JB
12161 enum language func_lang;
12162
c6dc63a1
TT
12163 gdb::unique_xmalloc_ptr<char> func_name
12164 = find_frame_funname (fi, &func_lang, NULL);
55b87a52
KS
12165 if (func_name != NULL)
12166 {
c6dc63a1 12167 if (strcmp (func_name.get (),
55b87a52
KS
12168 data->exception_info->catch_exception_sym) == 0)
12169 break; /* We found the frame we were looking for... */
55b87a52 12170 }
fb44b1a7 12171 fi = get_prev_frame (fi);
f7f9143b
JB
12172 }
12173
12174 if (fi == NULL)
12175 return 0;
12176
12177 select_frame (fi);
12178 return parse_and_eval_address ("id.full_name");
12179}
12180
12181/* Assuming the inferior just triggered an Ada exception catchpoint
12182 (of any type), return the address in inferior memory where the name
12183 of the exception is stored, if applicable.
12184
45db7c09
PA
12185 Assumes the selected frame is the current frame.
12186
f7f9143b
JB
12187 Return zero if the address could not be computed, or if not relevant. */
12188
12189static CORE_ADDR
761269c8 12190ada_exception_name_addr_1 (enum ada_exception_catchpoint_kind ex,
f7f9143b
JB
12191 struct breakpoint *b)
12192{
3eecfa55
JB
12193 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
12194
f7f9143b
JB
12195 switch (ex)
12196 {
761269c8 12197 case ada_catch_exception:
f7f9143b
JB
12198 return (parse_and_eval_address ("e.full_name"));
12199 break;
12200
761269c8 12201 case ada_catch_exception_unhandled:
3eecfa55 12202 return data->exception_info->unhandled_exception_name_addr ();
f7f9143b 12203 break;
9f757bf7
XR
12204
12205 case ada_catch_handlers:
12206 return 0; /* The runtimes does not provide access to the exception
12207 name. */
12208 break;
12209
761269c8 12210 case ada_catch_assert:
f7f9143b
JB
12211 return 0; /* Exception name is not relevant in this case. */
12212 break;
12213
12214 default:
12215 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12216 break;
12217 }
12218
12219 return 0; /* Should never be reached. */
12220}
12221
e547c119
JB
12222/* Assuming the inferior is stopped at an exception catchpoint,
12223 return the message which was associated to the exception, if
12224 available. Return NULL if the message could not be retrieved.
12225
e547c119
JB
12226 Note: The exception message can be associated to an exception
12227 either through the use of the Raise_Exception function, or
12228 more simply (Ada 2005 and later), via:
12229
12230 raise Exception_Name with "exception message";
12231
12232 */
12233
6f46ac85 12234static gdb::unique_xmalloc_ptr<char>
e547c119
JB
12235ada_exception_message_1 (void)
12236{
12237 struct value *e_msg_val;
e547c119 12238 int e_msg_len;
e547c119
JB
12239
12240 /* For runtimes that support this feature, the exception message
12241 is passed as an unbounded string argument called "message". */
12242 e_msg_val = parse_and_eval ("message");
12243 if (e_msg_val == NULL)
12244 return NULL; /* Exception message not supported. */
12245
12246 e_msg_val = ada_coerce_to_simple_array (e_msg_val);
12247 gdb_assert (e_msg_val != NULL);
12248 e_msg_len = TYPE_LENGTH (value_type (e_msg_val));
12249
12250 /* If the message string is empty, then treat it as if there was
12251 no exception message. */
12252 if (e_msg_len <= 0)
12253 return NULL;
12254
6f46ac85
TT
12255 gdb::unique_xmalloc_ptr<char> e_msg ((char *) xmalloc (e_msg_len + 1));
12256 read_memory_string (value_address (e_msg_val), e_msg.get (), e_msg_len + 1);
12257 e_msg.get ()[e_msg_len] = '\0';
e547c119 12258
e547c119
JB
12259 return e_msg;
12260}
12261
12262/* Same as ada_exception_message_1, except that all exceptions are
12263 contained here (returning NULL instead). */
12264
6f46ac85 12265static gdb::unique_xmalloc_ptr<char>
e547c119
JB
12266ada_exception_message (void)
12267{
6f46ac85 12268 gdb::unique_xmalloc_ptr<char> e_msg;
e547c119 12269
a70b8144 12270 try
e547c119
JB
12271 {
12272 e_msg = ada_exception_message_1 ();
12273 }
230d2906 12274 catch (const gdb_exception_error &e)
e547c119 12275 {
6f46ac85 12276 e_msg.reset (nullptr);
e547c119 12277 }
e547c119
JB
12278
12279 return e_msg;
12280}
12281
f7f9143b
JB
12282/* Same as ada_exception_name_addr_1, except that it intercepts and contains
12283 any error that ada_exception_name_addr_1 might cause to be thrown.
12284 When an error is intercepted, a warning with the error message is printed,
12285 and zero is returned. */
12286
12287static CORE_ADDR
761269c8 12288ada_exception_name_addr (enum ada_exception_catchpoint_kind ex,
f7f9143b
JB
12289 struct breakpoint *b)
12290{
f7f9143b
JB
12291 CORE_ADDR result = 0;
12292
a70b8144 12293 try
f7f9143b
JB
12294 {
12295 result = ada_exception_name_addr_1 (ex, b);
12296 }
12297
230d2906 12298 catch (const gdb_exception_error &e)
f7f9143b 12299 {
3d6e9d23 12300 warning (_("failed to get exception name: %s"), e.what ());
f7f9143b
JB
12301 return 0;
12302 }
12303
12304 return result;
12305}
12306
cb7de75e 12307static std::string ada_exception_catchpoint_cond_string
9f757bf7
XR
12308 (const char *excep_string,
12309 enum ada_exception_catchpoint_kind ex);
28010a5d
PA
12310
12311/* Ada catchpoints.
12312
12313 In the case of catchpoints on Ada exceptions, the catchpoint will
12314 stop the target on every exception the program throws. When a user
12315 specifies the name of a specific exception, we translate this
12316 request into a condition expression (in text form), and then parse
12317 it into an expression stored in each of the catchpoint's locations.
12318 We then use this condition to check whether the exception that was
12319 raised is the one the user is interested in. If not, then the
12320 target is resumed again. We store the name of the requested
12321 exception, in order to be able to re-set the condition expression
12322 when symbols change. */
12323
12324/* An instance of this type is used to represent an Ada catchpoint
5625a286 12325 breakpoint location. */
28010a5d 12326
5625a286 12327class ada_catchpoint_location : public bp_location
28010a5d 12328{
5625a286 12329public:
5f486660 12330 ada_catchpoint_location (breakpoint *owner)
f06f1252 12331 : bp_location (owner, bp_loc_software_breakpoint)
5625a286 12332 {}
28010a5d
PA
12333
12334 /* The condition that checks whether the exception that was raised
12335 is the specific exception the user specified on catchpoint
12336 creation. */
4d01a485 12337 expression_up excep_cond_expr;
28010a5d
PA
12338};
12339
c1fc2657 12340/* An instance of this type is used to represent an Ada catchpoint. */
28010a5d 12341
c1fc2657 12342struct ada_catchpoint : public breakpoint
28010a5d 12343{
28010a5d 12344 /* The name of the specific exception the user specified. */
bc18fbb5 12345 std::string excep_string;
28010a5d
PA
12346};
12347
12348/* Parse the exception condition string in the context of each of the
12349 catchpoint's locations, and store them for later evaluation. */
12350
12351static void
9f757bf7
XR
12352create_excep_cond_exprs (struct ada_catchpoint *c,
12353 enum ada_exception_catchpoint_kind ex)
28010a5d 12354{
28010a5d 12355 /* Nothing to do if there's no specific exception to catch. */
bc18fbb5 12356 if (c->excep_string.empty ())
28010a5d
PA
12357 return;
12358
12359 /* Same if there are no locations... */
c1fc2657 12360 if (c->loc == NULL)
28010a5d
PA
12361 return;
12362
2ff0a947
TT
12363 /* We have to compute the expression once for each program space,
12364 because the expression may hold the addresses of multiple symbols
12365 in some cases. */
12366 std::multimap<program_space *, struct bp_location *> loc_map;
bde09ab7 12367 for (bp_location *bl = c->loc; bl != NULL; bl = bl->next)
2ff0a947 12368 loc_map.emplace (bl->pspace, bl);
28010a5d 12369
2ff0a947
TT
12370 scoped_restore_current_program_space save_pspace;
12371
12372 std::string cond_string;
12373 program_space *last_ps = nullptr;
12374 for (auto iter : loc_map)
28010a5d
PA
12375 {
12376 struct ada_catchpoint_location *ada_loc
2ff0a947
TT
12377 = (struct ada_catchpoint_location *) iter.second;
12378
12379 if (ada_loc->pspace != last_ps)
12380 {
12381 last_ps = ada_loc->pspace;
12382 set_current_program_space (last_ps);
12383
12384 /* Compute the condition expression in text form, from the
12385 specific expection we want to catch. */
12386 cond_string
12387 = ada_exception_catchpoint_cond_string (c->excep_string.c_str (),
12388 ex);
12389 }
12390
4d01a485 12391 expression_up exp;
28010a5d 12392
2ff0a947 12393 if (!ada_loc->shlib_disabled)
28010a5d 12394 {
bbc13ae3 12395 const char *s;
28010a5d 12396
cb7de75e 12397 s = cond_string.c_str ();
a70b8144 12398 try
28010a5d 12399 {
2ff0a947
TT
12400 exp = parse_exp_1 (&s, ada_loc->address,
12401 block_for_pc (ada_loc->address),
036e657b 12402 0);
28010a5d 12403 }
230d2906 12404 catch (const gdb_exception_error &e)
849f2b52
JB
12405 {
12406 warning (_("failed to reevaluate internal exception condition "
12407 "for catchpoint %d: %s"),
3d6e9d23 12408 c->number, e.what ());
849f2b52 12409 }
28010a5d
PA
12410 }
12411
b22e99fd 12412 ada_loc->excep_cond_expr = std::move (exp);
28010a5d 12413 }
28010a5d
PA
12414}
12415
28010a5d
PA
12416/* Implement the ALLOCATE_LOCATION method in the breakpoint_ops
12417 structure for all exception catchpoint kinds. */
12418
12419static struct bp_location *
761269c8 12420allocate_location_exception (enum ada_exception_catchpoint_kind ex,
28010a5d
PA
12421 struct breakpoint *self)
12422{
5f486660 12423 return new ada_catchpoint_location (self);
28010a5d
PA
12424}
12425
12426/* Implement the RE_SET method in the breakpoint_ops structure for all
12427 exception catchpoint kinds. */
12428
12429static void
761269c8 12430re_set_exception (enum ada_exception_catchpoint_kind ex, struct breakpoint *b)
28010a5d
PA
12431{
12432 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
12433
12434 /* Call the base class's method. This updates the catchpoint's
12435 locations. */
2060206e 12436 bkpt_breakpoint_ops.re_set (b);
28010a5d
PA
12437
12438 /* Reparse the exception conditional expressions. One for each
12439 location. */
9f757bf7 12440 create_excep_cond_exprs (c, ex);
28010a5d
PA
12441}
12442
12443/* Returns true if we should stop for this breakpoint hit. If the
12444 user specified a specific exception, we only want to cause a stop
12445 if the program thrown that exception. */
12446
12447static int
12448should_stop_exception (const struct bp_location *bl)
12449{
12450 struct ada_catchpoint *c = (struct ada_catchpoint *) bl->owner;
12451 const struct ada_catchpoint_location *ada_loc
12452 = (const struct ada_catchpoint_location *) bl;
28010a5d
PA
12453 int stop;
12454
12455 /* With no specific exception, should always stop. */
bc18fbb5 12456 if (c->excep_string.empty ())
28010a5d
PA
12457 return 1;
12458
12459 if (ada_loc->excep_cond_expr == NULL)
12460 {
12461 /* We will have a NULL expression if back when we were creating
12462 the expressions, this location's had failed to parse. */
12463 return 1;
12464 }
12465
12466 stop = 1;
a70b8144 12467 try
28010a5d
PA
12468 {
12469 struct value *mark;
12470
12471 mark = value_mark ();
4d01a485 12472 stop = value_true (evaluate_expression (ada_loc->excep_cond_expr.get ()));
28010a5d
PA
12473 value_free_to_mark (mark);
12474 }
230d2906 12475 catch (const gdb_exception &ex)
492d29ea
PA
12476 {
12477 exception_fprintf (gdb_stderr, ex,
12478 _("Error in testing exception condition:\n"));
12479 }
492d29ea 12480
28010a5d
PA
12481 return stop;
12482}
12483
12484/* Implement the CHECK_STATUS method in the breakpoint_ops structure
12485 for all exception catchpoint kinds. */
12486
12487static void
761269c8 12488check_status_exception (enum ada_exception_catchpoint_kind ex, bpstat bs)
28010a5d
PA
12489{
12490 bs->stop = should_stop_exception (bs->bp_location_at);
12491}
12492
f7f9143b
JB
12493/* Implement the PRINT_IT method in the breakpoint_ops structure
12494 for all exception catchpoint kinds. */
12495
12496static enum print_stop_action
761269c8 12497print_it_exception (enum ada_exception_catchpoint_kind ex, bpstat bs)
f7f9143b 12498{
79a45e25 12499 struct ui_out *uiout = current_uiout;
348d480f
PA
12500 struct breakpoint *b = bs->breakpoint_at;
12501
956a9fb9 12502 annotate_catchpoint (b->number);
f7f9143b 12503
112e8700 12504 if (uiout->is_mi_like_p ())
f7f9143b 12505 {
112e8700 12506 uiout->field_string ("reason",
956a9fb9 12507 async_reason_lookup (EXEC_ASYNC_BREAKPOINT_HIT));
112e8700 12508 uiout->field_string ("disp", bpdisp_text (b->disposition));
f7f9143b
JB
12509 }
12510
112e8700
SM
12511 uiout->text (b->disposition == disp_del
12512 ? "\nTemporary catchpoint " : "\nCatchpoint ");
381befee 12513 uiout->field_signed ("bkptno", b->number);
112e8700 12514 uiout->text (", ");
f7f9143b 12515
45db7c09
PA
12516 /* ada_exception_name_addr relies on the selected frame being the
12517 current frame. Need to do this here because this function may be
12518 called more than once when printing a stop, and below, we'll
12519 select the first frame past the Ada run-time (see
12520 ada_find_printable_frame). */
12521 select_frame (get_current_frame ());
12522
f7f9143b
JB
12523 switch (ex)
12524 {
761269c8
JB
12525 case ada_catch_exception:
12526 case ada_catch_exception_unhandled:
9f757bf7 12527 case ada_catch_handlers:
956a9fb9
JB
12528 {
12529 const CORE_ADDR addr = ada_exception_name_addr (ex, b);
12530 char exception_name[256];
12531
12532 if (addr != 0)
12533 {
c714b426
PA
12534 read_memory (addr, (gdb_byte *) exception_name,
12535 sizeof (exception_name) - 1);
956a9fb9
JB
12536 exception_name [sizeof (exception_name) - 1] = '\0';
12537 }
12538 else
12539 {
12540 /* For some reason, we were unable to read the exception
12541 name. This could happen if the Runtime was compiled
12542 without debugging info, for instance. In that case,
12543 just replace the exception name by the generic string
12544 "exception" - it will read as "an exception" in the
12545 notification we are about to print. */
967cff16 12546 memcpy (exception_name, "exception", sizeof ("exception"));
956a9fb9
JB
12547 }
12548 /* In the case of unhandled exception breakpoints, we print
12549 the exception name as "unhandled EXCEPTION_NAME", to make
12550 it clearer to the user which kind of catchpoint just got
12551 hit. We used ui_out_text to make sure that this extra
12552 info does not pollute the exception name in the MI case. */
761269c8 12553 if (ex == ada_catch_exception_unhandled)
112e8700
SM
12554 uiout->text ("unhandled ");
12555 uiout->field_string ("exception-name", exception_name);
956a9fb9
JB
12556 }
12557 break;
761269c8 12558 case ada_catch_assert:
956a9fb9
JB
12559 /* In this case, the name of the exception is not really
12560 important. Just print "failed assertion" to make it clearer
12561 that his program just hit an assertion-failure catchpoint.
12562 We used ui_out_text because this info does not belong in
12563 the MI output. */
112e8700 12564 uiout->text ("failed assertion");
956a9fb9 12565 break;
f7f9143b 12566 }
e547c119 12567
6f46ac85 12568 gdb::unique_xmalloc_ptr<char> exception_message = ada_exception_message ();
e547c119
JB
12569 if (exception_message != NULL)
12570 {
e547c119 12571 uiout->text (" (");
6f46ac85 12572 uiout->field_string ("exception-message", exception_message.get ());
e547c119 12573 uiout->text (")");
e547c119
JB
12574 }
12575
112e8700 12576 uiout->text (" at ");
956a9fb9 12577 ada_find_printable_frame (get_current_frame ());
f7f9143b
JB
12578
12579 return PRINT_SRC_AND_LOC;
12580}
12581
12582/* Implement the PRINT_ONE method in the breakpoint_ops structure
12583 for all exception catchpoint kinds. */
12584
12585static void
761269c8 12586print_one_exception (enum ada_exception_catchpoint_kind ex,
a6d9a66e 12587 struct breakpoint *b, struct bp_location **last_loc)
f7f9143b 12588{
79a45e25 12589 struct ui_out *uiout = current_uiout;
28010a5d 12590 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
79a45b7d
TT
12591 struct value_print_options opts;
12592
12593 get_user_print_options (&opts);
f06f1252 12594
79a45b7d 12595 if (opts.addressprint)
f06f1252 12596 uiout->field_skip ("addr");
f7f9143b
JB
12597
12598 annotate_field (5);
f7f9143b
JB
12599 switch (ex)
12600 {
761269c8 12601 case ada_catch_exception:
bc18fbb5 12602 if (!c->excep_string.empty ())
f7f9143b 12603 {
bc18fbb5
TT
12604 std::string msg = string_printf (_("`%s' Ada exception"),
12605 c->excep_string.c_str ());
28010a5d 12606
112e8700 12607 uiout->field_string ("what", msg);
f7f9143b
JB
12608 }
12609 else
112e8700 12610 uiout->field_string ("what", "all Ada exceptions");
f7f9143b
JB
12611
12612 break;
12613
761269c8 12614 case ada_catch_exception_unhandled:
112e8700 12615 uiout->field_string ("what", "unhandled Ada exceptions");
f7f9143b
JB
12616 break;
12617
9f757bf7 12618 case ada_catch_handlers:
bc18fbb5 12619 if (!c->excep_string.empty ())
9f757bf7
XR
12620 {
12621 uiout->field_fmt ("what",
12622 _("`%s' Ada exception handlers"),
bc18fbb5 12623 c->excep_string.c_str ());
9f757bf7
XR
12624 }
12625 else
12626 uiout->field_string ("what", "all Ada exceptions handlers");
12627 break;
12628
761269c8 12629 case ada_catch_assert:
112e8700 12630 uiout->field_string ("what", "failed Ada assertions");
f7f9143b
JB
12631 break;
12632
12633 default:
12634 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12635 break;
12636 }
12637}
12638
12639/* Implement the PRINT_MENTION method in the breakpoint_ops structure
12640 for all exception catchpoint kinds. */
12641
12642static void
761269c8 12643print_mention_exception (enum ada_exception_catchpoint_kind ex,
f7f9143b
JB
12644 struct breakpoint *b)
12645{
28010a5d 12646 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
79a45e25 12647 struct ui_out *uiout = current_uiout;
28010a5d 12648
112e8700 12649 uiout->text (b->disposition == disp_del ? _("Temporary catchpoint ")
00eb2c4a 12650 : _("Catchpoint "));
381befee 12651 uiout->field_signed ("bkptno", b->number);
112e8700 12652 uiout->text (": ");
00eb2c4a 12653
f7f9143b
JB
12654 switch (ex)
12655 {
761269c8 12656 case ada_catch_exception:
bc18fbb5 12657 if (!c->excep_string.empty ())
00eb2c4a 12658 {
862d101a 12659 std::string info = string_printf (_("`%s' Ada exception"),
bc18fbb5 12660 c->excep_string.c_str ());
862d101a 12661 uiout->text (info.c_str ());
00eb2c4a 12662 }
f7f9143b 12663 else
112e8700 12664 uiout->text (_("all Ada exceptions"));
f7f9143b
JB
12665 break;
12666
761269c8 12667 case ada_catch_exception_unhandled:
112e8700 12668 uiout->text (_("unhandled Ada exceptions"));
f7f9143b 12669 break;
9f757bf7
XR
12670
12671 case ada_catch_handlers:
bc18fbb5 12672 if (!c->excep_string.empty ())
9f757bf7
XR
12673 {
12674 std::string info
12675 = string_printf (_("`%s' Ada exception handlers"),
bc18fbb5 12676 c->excep_string.c_str ());
9f757bf7
XR
12677 uiout->text (info.c_str ());
12678 }
12679 else
12680 uiout->text (_("all Ada exceptions handlers"));
12681 break;
12682
761269c8 12683 case ada_catch_assert:
112e8700 12684 uiout->text (_("failed Ada assertions"));
f7f9143b
JB
12685 break;
12686
12687 default:
12688 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12689 break;
12690 }
12691}
12692
6149aea9
PA
12693/* Implement the PRINT_RECREATE method in the breakpoint_ops structure
12694 for all exception catchpoint kinds. */
12695
12696static void
761269c8 12697print_recreate_exception (enum ada_exception_catchpoint_kind ex,
6149aea9
PA
12698 struct breakpoint *b, struct ui_file *fp)
12699{
28010a5d
PA
12700 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
12701
6149aea9
PA
12702 switch (ex)
12703 {
761269c8 12704 case ada_catch_exception:
6149aea9 12705 fprintf_filtered (fp, "catch exception");
bc18fbb5
TT
12706 if (!c->excep_string.empty ())
12707 fprintf_filtered (fp, " %s", c->excep_string.c_str ());
6149aea9
PA
12708 break;
12709
761269c8 12710 case ada_catch_exception_unhandled:
78076abc 12711 fprintf_filtered (fp, "catch exception unhandled");
6149aea9
PA
12712 break;
12713
9f757bf7
XR
12714 case ada_catch_handlers:
12715 fprintf_filtered (fp, "catch handlers");
12716 break;
12717
761269c8 12718 case ada_catch_assert:
6149aea9
PA
12719 fprintf_filtered (fp, "catch assert");
12720 break;
12721
12722 default:
12723 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12724 }
d9b3f62e 12725 print_recreate_thread (b, fp);
6149aea9
PA
12726}
12727
f7f9143b
JB
12728/* Virtual table for "catch exception" breakpoints. */
12729
28010a5d
PA
12730static struct bp_location *
12731allocate_location_catch_exception (struct breakpoint *self)
12732{
761269c8 12733 return allocate_location_exception (ada_catch_exception, self);
28010a5d
PA
12734}
12735
12736static void
12737re_set_catch_exception (struct breakpoint *b)
12738{
761269c8 12739 re_set_exception (ada_catch_exception, b);
28010a5d
PA
12740}
12741
12742static void
12743check_status_catch_exception (bpstat bs)
12744{
761269c8 12745 check_status_exception (ada_catch_exception, bs);
28010a5d
PA
12746}
12747
f7f9143b 12748static enum print_stop_action
348d480f 12749print_it_catch_exception (bpstat bs)
f7f9143b 12750{
761269c8 12751 return print_it_exception (ada_catch_exception, bs);
f7f9143b
JB
12752}
12753
12754static void
a6d9a66e 12755print_one_catch_exception (struct breakpoint *b, struct bp_location **last_loc)
f7f9143b 12756{
761269c8 12757 print_one_exception (ada_catch_exception, b, last_loc);
f7f9143b
JB
12758}
12759
12760static void
12761print_mention_catch_exception (struct breakpoint *b)
12762{
761269c8 12763 print_mention_exception (ada_catch_exception, b);
f7f9143b
JB
12764}
12765
6149aea9
PA
12766static void
12767print_recreate_catch_exception (struct breakpoint *b, struct ui_file *fp)
12768{
761269c8 12769 print_recreate_exception (ada_catch_exception, b, fp);
6149aea9
PA
12770}
12771
2060206e 12772static struct breakpoint_ops catch_exception_breakpoint_ops;
f7f9143b
JB
12773
12774/* Virtual table for "catch exception unhandled" breakpoints. */
12775
28010a5d
PA
12776static struct bp_location *
12777allocate_location_catch_exception_unhandled (struct breakpoint *self)
12778{
761269c8 12779 return allocate_location_exception (ada_catch_exception_unhandled, self);
28010a5d
PA
12780}
12781
12782static void
12783re_set_catch_exception_unhandled (struct breakpoint *b)
12784{
761269c8 12785 re_set_exception (ada_catch_exception_unhandled, b);
28010a5d
PA
12786}
12787
12788static void
12789check_status_catch_exception_unhandled (bpstat bs)
12790{
761269c8 12791 check_status_exception (ada_catch_exception_unhandled, bs);
28010a5d
PA
12792}
12793
f7f9143b 12794static enum print_stop_action
348d480f 12795print_it_catch_exception_unhandled (bpstat bs)
f7f9143b 12796{
761269c8 12797 return print_it_exception (ada_catch_exception_unhandled, bs);
f7f9143b
JB
12798}
12799
12800static void
a6d9a66e
UW
12801print_one_catch_exception_unhandled (struct breakpoint *b,
12802 struct bp_location **last_loc)
f7f9143b 12803{
761269c8 12804 print_one_exception (ada_catch_exception_unhandled, b, last_loc);
f7f9143b
JB
12805}
12806
12807static void
12808print_mention_catch_exception_unhandled (struct breakpoint *b)
12809{
761269c8 12810 print_mention_exception (ada_catch_exception_unhandled, b);
f7f9143b
JB
12811}
12812
6149aea9
PA
12813static void
12814print_recreate_catch_exception_unhandled (struct breakpoint *b,
12815 struct ui_file *fp)
12816{
761269c8 12817 print_recreate_exception (ada_catch_exception_unhandled, b, fp);
6149aea9
PA
12818}
12819
2060206e 12820static struct breakpoint_ops catch_exception_unhandled_breakpoint_ops;
f7f9143b
JB
12821
12822/* Virtual table for "catch assert" breakpoints. */
12823
28010a5d
PA
12824static struct bp_location *
12825allocate_location_catch_assert (struct breakpoint *self)
12826{
761269c8 12827 return allocate_location_exception (ada_catch_assert, self);
28010a5d
PA
12828}
12829
12830static void
12831re_set_catch_assert (struct breakpoint *b)
12832{
761269c8 12833 re_set_exception (ada_catch_assert, b);
28010a5d
PA
12834}
12835
12836static void
12837check_status_catch_assert (bpstat bs)
12838{
761269c8 12839 check_status_exception (ada_catch_assert, bs);
28010a5d
PA
12840}
12841
f7f9143b 12842static enum print_stop_action
348d480f 12843print_it_catch_assert (bpstat bs)
f7f9143b 12844{
761269c8 12845 return print_it_exception (ada_catch_assert, bs);
f7f9143b
JB
12846}
12847
12848static void
a6d9a66e 12849print_one_catch_assert (struct breakpoint *b, struct bp_location **last_loc)
f7f9143b 12850{
761269c8 12851 print_one_exception (ada_catch_assert, b, last_loc);
f7f9143b
JB
12852}
12853
12854static void
12855print_mention_catch_assert (struct breakpoint *b)
12856{
761269c8 12857 print_mention_exception (ada_catch_assert, b);
f7f9143b
JB
12858}
12859
6149aea9
PA
12860static void
12861print_recreate_catch_assert (struct breakpoint *b, struct ui_file *fp)
12862{
761269c8 12863 print_recreate_exception (ada_catch_assert, b, fp);
6149aea9
PA
12864}
12865
2060206e 12866static struct breakpoint_ops catch_assert_breakpoint_ops;
f7f9143b 12867
9f757bf7
XR
12868/* Virtual table for "catch handlers" breakpoints. */
12869
12870static struct bp_location *
12871allocate_location_catch_handlers (struct breakpoint *self)
12872{
12873 return allocate_location_exception (ada_catch_handlers, self);
12874}
12875
12876static void
12877re_set_catch_handlers (struct breakpoint *b)
12878{
12879 re_set_exception (ada_catch_handlers, b);
12880}
12881
12882static void
12883check_status_catch_handlers (bpstat bs)
12884{
12885 check_status_exception (ada_catch_handlers, bs);
12886}
12887
12888static enum print_stop_action
12889print_it_catch_handlers (bpstat bs)
12890{
12891 return print_it_exception (ada_catch_handlers, bs);
12892}
12893
12894static void
12895print_one_catch_handlers (struct breakpoint *b,
12896 struct bp_location **last_loc)
12897{
12898 print_one_exception (ada_catch_handlers, b, last_loc);
12899}
12900
12901static void
12902print_mention_catch_handlers (struct breakpoint *b)
12903{
12904 print_mention_exception (ada_catch_handlers, b);
12905}
12906
12907static void
12908print_recreate_catch_handlers (struct breakpoint *b,
12909 struct ui_file *fp)
12910{
12911 print_recreate_exception (ada_catch_handlers, b, fp);
12912}
12913
12914static struct breakpoint_ops catch_handlers_breakpoint_ops;
12915
f06f1252
TT
12916/* See ada-lang.h. */
12917
12918bool
12919is_ada_exception_catchpoint (breakpoint *bp)
12920{
12921 return (bp->ops == &catch_exception_breakpoint_ops
12922 || bp->ops == &catch_exception_unhandled_breakpoint_ops
12923 || bp->ops == &catch_assert_breakpoint_ops
12924 || bp->ops == &catch_handlers_breakpoint_ops);
12925}
12926
f7f9143b
JB
12927/* Split the arguments specified in a "catch exception" command.
12928 Set EX to the appropriate catchpoint type.
28010a5d 12929 Set EXCEP_STRING to the name of the specific exception if
5845583d 12930 specified by the user.
9f757bf7
XR
12931 IS_CATCH_HANDLERS_CMD: True if the arguments are for a
12932 "catch handlers" command. False otherwise.
5845583d
JB
12933 If a condition is found at the end of the arguments, the condition
12934 expression is stored in COND_STRING (memory must be deallocated
12935 after use). Otherwise COND_STRING is set to NULL. */
f7f9143b
JB
12936
12937static void
a121b7c1 12938catch_ada_exception_command_split (const char *args,
9f757bf7 12939 bool is_catch_handlers_cmd,
761269c8 12940 enum ada_exception_catchpoint_kind *ex,
bc18fbb5
TT
12941 std::string *excep_string,
12942 std::string *cond_string)
f7f9143b 12943{
bc18fbb5 12944 std::string exception_name;
f7f9143b 12945
bc18fbb5
TT
12946 exception_name = extract_arg (&args);
12947 if (exception_name == "if")
5845583d
JB
12948 {
12949 /* This is not an exception name; this is the start of a condition
12950 expression for a catchpoint on all exceptions. So, "un-get"
12951 this token, and set exception_name to NULL. */
bc18fbb5 12952 exception_name.clear ();
5845583d
JB
12953 args -= 2;
12954 }
f7f9143b 12955
5845583d 12956 /* Check to see if we have a condition. */
f7f9143b 12957
f1735a53 12958 args = skip_spaces (args);
61012eef 12959 if (startswith (args, "if")
5845583d
JB
12960 && (isspace (args[2]) || args[2] == '\0'))
12961 {
12962 args += 2;
f1735a53 12963 args = skip_spaces (args);
5845583d
JB
12964
12965 if (args[0] == '\0')
12966 error (_("Condition missing after `if' keyword"));
bc18fbb5 12967 *cond_string = args;
5845583d
JB
12968
12969 args += strlen (args);
12970 }
12971
12972 /* Check that we do not have any more arguments. Anything else
12973 is unexpected. */
f7f9143b
JB
12974
12975 if (args[0] != '\0')
12976 error (_("Junk at end of expression"));
12977
9f757bf7
XR
12978 if (is_catch_handlers_cmd)
12979 {
12980 /* Catch handling of exceptions. */
12981 *ex = ada_catch_handlers;
12982 *excep_string = exception_name;
12983 }
bc18fbb5 12984 else if (exception_name.empty ())
f7f9143b
JB
12985 {
12986 /* Catch all exceptions. */
761269c8 12987 *ex = ada_catch_exception;
bc18fbb5 12988 excep_string->clear ();
f7f9143b 12989 }
bc18fbb5 12990 else if (exception_name == "unhandled")
f7f9143b
JB
12991 {
12992 /* Catch unhandled exceptions. */
761269c8 12993 *ex = ada_catch_exception_unhandled;
bc18fbb5 12994 excep_string->clear ();
f7f9143b
JB
12995 }
12996 else
12997 {
12998 /* Catch a specific exception. */
761269c8 12999 *ex = ada_catch_exception;
28010a5d 13000 *excep_string = exception_name;
f7f9143b
JB
13001 }
13002}
13003
13004/* Return the name of the symbol on which we should break in order to
13005 implement a catchpoint of the EX kind. */
13006
13007static const char *
761269c8 13008ada_exception_sym_name (enum ada_exception_catchpoint_kind ex)
f7f9143b 13009{
3eecfa55
JB
13010 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
13011
13012 gdb_assert (data->exception_info != NULL);
0259addd 13013
f7f9143b
JB
13014 switch (ex)
13015 {
761269c8 13016 case ada_catch_exception:
3eecfa55 13017 return (data->exception_info->catch_exception_sym);
f7f9143b 13018 break;
761269c8 13019 case ada_catch_exception_unhandled:
3eecfa55 13020 return (data->exception_info->catch_exception_unhandled_sym);
f7f9143b 13021 break;
761269c8 13022 case ada_catch_assert:
3eecfa55 13023 return (data->exception_info->catch_assert_sym);
f7f9143b 13024 break;
9f757bf7
XR
13025 case ada_catch_handlers:
13026 return (data->exception_info->catch_handlers_sym);
13027 break;
f7f9143b
JB
13028 default:
13029 internal_error (__FILE__, __LINE__,
13030 _("unexpected catchpoint kind (%d)"), ex);
13031 }
13032}
13033
13034/* Return the breakpoint ops "virtual table" used for catchpoints
13035 of the EX kind. */
13036
c0a91b2b 13037static const struct breakpoint_ops *
761269c8 13038ada_exception_breakpoint_ops (enum ada_exception_catchpoint_kind ex)
f7f9143b
JB
13039{
13040 switch (ex)
13041 {
761269c8 13042 case ada_catch_exception:
f7f9143b
JB
13043 return (&catch_exception_breakpoint_ops);
13044 break;
761269c8 13045 case ada_catch_exception_unhandled:
f7f9143b
JB
13046 return (&catch_exception_unhandled_breakpoint_ops);
13047 break;
761269c8 13048 case ada_catch_assert:
f7f9143b
JB
13049 return (&catch_assert_breakpoint_ops);
13050 break;
9f757bf7
XR
13051 case ada_catch_handlers:
13052 return (&catch_handlers_breakpoint_ops);
13053 break;
f7f9143b
JB
13054 default:
13055 internal_error (__FILE__, __LINE__,
13056 _("unexpected catchpoint kind (%d)"), ex);
13057 }
13058}
13059
13060/* Return the condition that will be used to match the current exception
13061 being raised with the exception that the user wants to catch. This
13062 assumes that this condition is used when the inferior just triggered
13063 an exception catchpoint.
cb7de75e 13064 EX: the type of catchpoints used for catching Ada exceptions. */
f7f9143b 13065
cb7de75e 13066static std::string
9f757bf7
XR
13067ada_exception_catchpoint_cond_string (const char *excep_string,
13068 enum ada_exception_catchpoint_kind ex)
f7f9143b 13069{
3d0b0fa3 13070 int i;
cb7de75e 13071 std::string result;
2ff0a947 13072 const char *name;
9f757bf7
XR
13073
13074 if (ex == ada_catch_handlers)
13075 {
13076 /* For exception handlers catchpoints, the condition string does
13077 not use the same parameter as for the other exceptions. */
2ff0a947
TT
13078 name = ("long_integer (GNAT_GCC_exception_Access"
13079 "(gcc_exception).all.occurrence.id)");
9f757bf7
XR
13080 }
13081 else
2ff0a947 13082 name = "long_integer (e)";
3d0b0fa3 13083
0963b4bd 13084 /* The standard exceptions are a special case. They are defined in
3d0b0fa3 13085 runtime units that have been compiled without debugging info; if
28010a5d 13086 EXCEP_STRING is the not-fully-qualified name of a standard
3d0b0fa3
JB
13087 exception (e.g. "constraint_error") then, during the evaluation
13088 of the condition expression, the symbol lookup on this name would
0963b4bd 13089 *not* return this standard exception. The catchpoint condition
3d0b0fa3
JB
13090 may then be set only on user-defined exceptions which have the
13091 same not-fully-qualified name (e.g. my_package.constraint_error).
13092
13093 To avoid this unexcepted behavior, these standard exceptions are
0963b4bd 13094 systematically prefixed by "standard". This means that "catch
3d0b0fa3
JB
13095 exception constraint_error" is rewritten into "catch exception
13096 standard.constraint_error".
13097
13098 If an exception named contraint_error is defined in another package of
13099 the inferior program, then the only way to specify this exception as a
13100 breakpoint condition is to use its fully-qualified named:
2ff0a947
TT
13101 e.g. my_package.constraint_error.
13102
13103 Furthermore, in some situations a standard exception's symbol may
13104 be present in more than one objfile, because the compiler may
13105 choose to emit copy relocations for them. So, we have to compare
13106 against all the possible addresses. */
3d0b0fa3 13107
2ff0a947
TT
13108 /* Storage for a rewritten symbol name. */
13109 std::string std_name;
3d0b0fa3
JB
13110 for (i = 0; i < sizeof (standard_exc) / sizeof (char *); i++)
13111 {
28010a5d 13112 if (strcmp (standard_exc [i], excep_string) == 0)
3d0b0fa3 13113 {
2ff0a947
TT
13114 std_name = std::string ("standard.") + excep_string;
13115 excep_string = std_name.c_str ();
9f757bf7 13116 break;
3d0b0fa3
JB
13117 }
13118 }
9f757bf7 13119
2ff0a947
TT
13120 excep_string = ada_encode (excep_string);
13121 std::vector<struct bound_minimal_symbol> symbols
13122 = ada_lookup_simple_minsyms (excep_string);
bde09ab7 13123 for (const bound_minimal_symbol &msym : symbols)
2ff0a947
TT
13124 {
13125 if (!result.empty ())
13126 result += " or ";
13127 string_appendf (result, "%s = %s", name,
13128 pulongest (BMSYMBOL_VALUE_ADDRESS (msym)));
13129 }
9f757bf7 13130
9f757bf7 13131 return result;
f7f9143b
JB
13132}
13133
13134/* Return the symtab_and_line that should be used to insert an exception
13135 catchpoint of the TYPE kind.
13136
28010a5d
PA
13137 ADDR_STRING returns the name of the function where the real
13138 breakpoint that implements the catchpoints is set, depending on the
13139 type of catchpoint we need to create. */
f7f9143b
JB
13140
13141static struct symtab_and_line
bc18fbb5 13142ada_exception_sal (enum ada_exception_catchpoint_kind ex,
cc12f4a8 13143 std::string *addr_string, const struct breakpoint_ops **ops)
f7f9143b
JB
13144{
13145 const char *sym_name;
13146 struct symbol *sym;
f7f9143b 13147
0259addd
JB
13148 /* First, find out which exception support info to use. */
13149 ada_exception_support_info_sniffer ();
13150
13151 /* Then lookup the function on which we will break in order to catch
f7f9143b 13152 the Ada exceptions requested by the user. */
f7f9143b
JB
13153 sym_name = ada_exception_sym_name (ex);
13154 sym = standard_lookup (sym_name, NULL, VAR_DOMAIN);
13155
57aff202
JB
13156 if (sym == NULL)
13157 error (_("Catchpoint symbol not found: %s"), sym_name);
13158
13159 if (SYMBOL_CLASS (sym) != LOC_BLOCK)
13160 error (_("Unable to insert catchpoint. %s is not a function."), sym_name);
f7f9143b
JB
13161
13162 /* Set ADDR_STRING. */
cc12f4a8 13163 *addr_string = sym_name;
f7f9143b 13164
f7f9143b 13165 /* Set OPS. */
4b9eee8c 13166 *ops = ada_exception_breakpoint_ops (ex);
f7f9143b 13167
f17011e0 13168 return find_function_start_sal (sym, 1);
f7f9143b
JB
13169}
13170
b4a5b78b 13171/* Create an Ada exception catchpoint.
f7f9143b 13172
b4a5b78b 13173 EX_KIND is the kind of exception catchpoint to be created.
5845583d 13174
bc18fbb5 13175 If EXCEPT_STRING is empty, this catchpoint is expected to trigger
2df4d1d5 13176 for all exceptions. Otherwise, EXCEPT_STRING indicates the name
bc18fbb5 13177 of the exception to which this catchpoint applies.
2df4d1d5 13178
bc18fbb5 13179 COND_STRING, if not empty, is the catchpoint condition.
f7f9143b 13180
b4a5b78b
JB
13181 TEMPFLAG, if nonzero, means that the underlying breakpoint
13182 should be temporary.
28010a5d 13183
b4a5b78b 13184 FROM_TTY is the usual argument passed to all commands implementations. */
28010a5d 13185
349774ef 13186void
28010a5d 13187create_ada_exception_catchpoint (struct gdbarch *gdbarch,
761269c8 13188 enum ada_exception_catchpoint_kind ex_kind,
bc18fbb5 13189 const std::string &excep_string,
56ecd069 13190 const std::string &cond_string,
28010a5d 13191 int tempflag,
349774ef 13192 int disabled,
28010a5d
PA
13193 int from_tty)
13194{
cc12f4a8 13195 std::string addr_string;
b4a5b78b 13196 const struct breakpoint_ops *ops = NULL;
bc18fbb5 13197 struct symtab_and_line sal = ada_exception_sal (ex_kind, &addr_string, &ops);
28010a5d 13198
b270e6f9 13199 std::unique_ptr<ada_catchpoint> c (new ada_catchpoint ());
cc12f4a8 13200 init_ada_exception_breakpoint (c.get (), gdbarch, sal, addr_string.c_str (),
349774ef 13201 ops, tempflag, disabled, from_tty);
28010a5d 13202 c->excep_string = excep_string;
9f757bf7 13203 create_excep_cond_exprs (c.get (), ex_kind);
56ecd069
XR
13204 if (!cond_string.empty ())
13205 set_breakpoint_condition (c.get (), cond_string.c_str (), from_tty);
b270e6f9 13206 install_breakpoint (0, std::move (c), 1);
f7f9143b
JB
13207}
13208
9ac4176b
PA
13209/* Implement the "catch exception" command. */
13210
13211static void
eb4c3f4a 13212catch_ada_exception_command (const char *arg_entry, int from_tty,
9ac4176b
PA
13213 struct cmd_list_element *command)
13214{
a121b7c1 13215 const char *arg = arg_entry;
9ac4176b
PA
13216 struct gdbarch *gdbarch = get_current_arch ();
13217 int tempflag;
761269c8 13218 enum ada_exception_catchpoint_kind ex_kind;
bc18fbb5 13219 std::string excep_string;
56ecd069 13220 std::string cond_string;
9ac4176b
PA
13221
13222 tempflag = get_cmd_context (command) == CATCH_TEMPORARY;
13223
13224 if (!arg)
13225 arg = "";
9f757bf7 13226 catch_ada_exception_command_split (arg, false, &ex_kind, &excep_string,
bc18fbb5 13227 &cond_string);
9f757bf7
XR
13228 create_ada_exception_catchpoint (gdbarch, ex_kind,
13229 excep_string, cond_string,
13230 tempflag, 1 /* enabled */,
13231 from_tty);
13232}
13233
13234/* Implement the "catch handlers" command. */
13235
13236static void
13237catch_ada_handlers_command (const char *arg_entry, int from_tty,
13238 struct cmd_list_element *command)
13239{
13240 const char *arg = arg_entry;
13241 struct gdbarch *gdbarch = get_current_arch ();
13242 int tempflag;
13243 enum ada_exception_catchpoint_kind ex_kind;
bc18fbb5 13244 std::string excep_string;
56ecd069 13245 std::string cond_string;
9f757bf7
XR
13246
13247 tempflag = get_cmd_context (command) == CATCH_TEMPORARY;
13248
13249 if (!arg)
13250 arg = "";
13251 catch_ada_exception_command_split (arg, true, &ex_kind, &excep_string,
bc18fbb5 13252 &cond_string);
b4a5b78b
JB
13253 create_ada_exception_catchpoint (gdbarch, ex_kind,
13254 excep_string, cond_string,
349774ef
JB
13255 tempflag, 1 /* enabled */,
13256 from_tty);
9ac4176b
PA
13257}
13258
71bed2db
TT
13259/* Completion function for the Ada "catch" commands. */
13260
13261static void
13262catch_ada_completer (struct cmd_list_element *cmd, completion_tracker &tracker,
13263 const char *text, const char *word)
13264{
13265 std::vector<ada_exc_info> exceptions = ada_exceptions_list (NULL);
13266
13267 for (const ada_exc_info &info : exceptions)
13268 {
13269 if (startswith (info.name, word))
b02f78f9 13270 tracker.add_completion (make_unique_xstrdup (info.name));
71bed2db
TT
13271 }
13272}
13273
b4a5b78b 13274/* Split the arguments specified in a "catch assert" command.
5845583d 13275
b4a5b78b
JB
13276 ARGS contains the command's arguments (or the empty string if
13277 no arguments were passed).
5845583d
JB
13278
13279 If ARGS contains a condition, set COND_STRING to that condition
b4a5b78b 13280 (the memory needs to be deallocated after use). */
5845583d 13281
b4a5b78b 13282static void
56ecd069 13283catch_ada_assert_command_split (const char *args, std::string &cond_string)
f7f9143b 13284{
f1735a53 13285 args = skip_spaces (args);
f7f9143b 13286
5845583d 13287 /* Check whether a condition was provided. */
61012eef 13288 if (startswith (args, "if")
5845583d 13289 && (isspace (args[2]) || args[2] == '\0'))
f7f9143b 13290 {
5845583d 13291 args += 2;
f1735a53 13292 args = skip_spaces (args);
5845583d
JB
13293 if (args[0] == '\0')
13294 error (_("condition missing after `if' keyword"));
56ecd069 13295 cond_string.assign (args);
f7f9143b
JB
13296 }
13297
5845583d
JB
13298 /* Otherwise, there should be no other argument at the end of
13299 the command. */
13300 else if (args[0] != '\0')
13301 error (_("Junk at end of arguments."));
f7f9143b
JB
13302}
13303
9ac4176b
PA
13304/* Implement the "catch assert" command. */
13305
13306static void
eb4c3f4a 13307catch_assert_command (const char *arg_entry, int from_tty,
9ac4176b
PA
13308 struct cmd_list_element *command)
13309{
a121b7c1 13310 const char *arg = arg_entry;
9ac4176b
PA
13311 struct gdbarch *gdbarch = get_current_arch ();
13312 int tempflag;
56ecd069 13313 std::string cond_string;
9ac4176b
PA
13314
13315 tempflag = get_cmd_context (command) == CATCH_TEMPORARY;
13316
13317 if (!arg)
13318 arg = "";
56ecd069 13319 catch_ada_assert_command_split (arg, cond_string);
761269c8 13320 create_ada_exception_catchpoint (gdbarch, ada_catch_assert,
241db429 13321 "", cond_string,
349774ef
JB
13322 tempflag, 1 /* enabled */,
13323 from_tty);
9ac4176b 13324}
778865d3
JB
13325
13326/* Return non-zero if the symbol SYM is an Ada exception object. */
13327
13328static int
13329ada_is_exception_sym (struct symbol *sym)
13330{
a737d952 13331 const char *type_name = TYPE_NAME (SYMBOL_TYPE (sym));
778865d3
JB
13332
13333 return (SYMBOL_CLASS (sym) != LOC_TYPEDEF
13334 && SYMBOL_CLASS (sym) != LOC_BLOCK
13335 && SYMBOL_CLASS (sym) != LOC_CONST
13336 && SYMBOL_CLASS (sym) != LOC_UNRESOLVED
13337 && type_name != NULL && strcmp (type_name, "exception") == 0);
13338}
13339
13340/* Given a global symbol SYM, return non-zero iff SYM is a non-standard
13341 Ada exception object. This matches all exceptions except the ones
13342 defined by the Ada language. */
13343
13344static int
13345ada_is_non_standard_exception_sym (struct symbol *sym)
13346{
13347 int i;
13348
13349 if (!ada_is_exception_sym (sym))
13350 return 0;
13351
13352 for (i = 0; i < ARRAY_SIZE (standard_exc); i++)
13353 if (strcmp (SYMBOL_LINKAGE_NAME (sym), standard_exc[i]) == 0)
13354 return 0; /* A standard exception. */
13355
13356 /* Numeric_Error is also a standard exception, so exclude it.
13357 See the STANDARD_EXC description for more details as to why
13358 this exception is not listed in that array. */
13359 if (strcmp (SYMBOL_LINKAGE_NAME (sym), "numeric_error") == 0)
13360 return 0;
13361
13362 return 1;
13363}
13364
ab816a27 13365/* A helper function for std::sort, comparing two struct ada_exc_info
778865d3
JB
13366 objects.
13367
13368 The comparison is determined first by exception name, and then
13369 by exception address. */
13370
ab816a27 13371bool
cc536b21 13372ada_exc_info::operator< (const ada_exc_info &other) const
778865d3 13373{
778865d3
JB
13374 int result;
13375
ab816a27
TT
13376 result = strcmp (name, other.name);
13377 if (result < 0)
13378 return true;
13379 if (result == 0 && addr < other.addr)
13380 return true;
13381 return false;
13382}
778865d3 13383
ab816a27 13384bool
cc536b21 13385ada_exc_info::operator== (const ada_exc_info &other) const
ab816a27
TT
13386{
13387 return addr == other.addr && strcmp (name, other.name) == 0;
778865d3
JB
13388}
13389
13390/* Sort EXCEPTIONS using compare_ada_exception_info as the comparison
13391 routine, but keeping the first SKIP elements untouched.
13392
13393 All duplicates are also removed. */
13394
13395static void
ab816a27 13396sort_remove_dups_ada_exceptions_list (std::vector<ada_exc_info> *exceptions,
778865d3
JB
13397 int skip)
13398{
ab816a27
TT
13399 std::sort (exceptions->begin () + skip, exceptions->end ());
13400 exceptions->erase (std::unique (exceptions->begin () + skip, exceptions->end ()),
13401 exceptions->end ());
778865d3
JB
13402}
13403
778865d3
JB
13404/* Add all exceptions defined by the Ada standard whose name match
13405 a regular expression.
13406
13407 If PREG is not NULL, then this regexp_t object is used to
13408 perform the symbol name matching. Otherwise, no name-based
13409 filtering is performed.
13410
13411 EXCEPTIONS is a vector of exceptions to which matching exceptions
13412 gets pushed. */
13413
13414static void
2d7cc5c7 13415ada_add_standard_exceptions (compiled_regex *preg,
ab816a27 13416 std::vector<ada_exc_info> *exceptions)
778865d3
JB
13417{
13418 int i;
13419
13420 for (i = 0; i < ARRAY_SIZE (standard_exc); i++)
13421 {
13422 if (preg == NULL
2d7cc5c7 13423 || preg->exec (standard_exc[i], 0, NULL, 0) == 0)
778865d3
JB
13424 {
13425 struct bound_minimal_symbol msymbol
13426 = ada_lookup_simple_minsym (standard_exc[i]);
13427
13428 if (msymbol.minsym != NULL)
13429 {
13430 struct ada_exc_info info
77e371c0 13431 = {standard_exc[i], BMSYMBOL_VALUE_ADDRESS (msymbol)};
778865d3 13432
ab816a27 13433 exceptions->push_back (info);
778865d3
JB
13434 }
13435 }
13436 }
13437}
13438
13439/* Add all Ada exceptions defined locally and accessible from the given
13440 FRAME.
13441
13442 If PREG is not NULL, then this regexp_t object is used to
13443 perform the symbol name matching. Otherwise, no name-based
13444 filtering is performed.
13445
13446 EXCEPTIONS is a vector of exceptions to which matching exceptions
13447 gets pushed. */
13448
13449static void
2d7cc5c7
PA
13450ada_add_exceptions_from_frame (compiled_regex *preg,
13451 struct frame_info *frame,
ab816a27 13452 std::vector<ada_exc_info> *exceptions)
778865d3 13453{
3977b71f 13454 const struct block *block = get_frame_block (frame, 0);
778865d3
JB
13455
13456 while (block != 0)
13457 {
13458 struct block_iterator iter;
13459 struct symbol *sym;
13460
13461 ALL_BLOCK_SYMBOLS (block, iter, sym)
13462 {
13463 switch (SYMBOL_CLASS (sym))
13464 {
13465 case LOC_TYPEDEF:
13466 case LOC_BLOCK:
13467 case LOC_CONST:
13468 break;
13469 default:
13470 if (ada_is_exception_sym (sym))
13471 {
13472 struct ada_exc_info info = {SYMBOL_PRINT_NAME (sym),
13473 SYMBOL_VALUE_ADDRESS (sym)};
13474
ab816a27 13475 exceptions->push_back (info);
778865d3
JB
13476 }
13477 }
13478 }
13479 if (BLOCK_FUNCTION (block) != NULL)
13480 break;
13481 block = BLOCK_SUPERBLOCK (block);
13482 }
13483}
13484
14bc53a8
PA
13485/* Return true if NAME matches PREG or if PREG is NULL. */
13486
13487static bool
2d7cc5c7 13488name_matches_regex (const char *name, compiled_regex *preg)
14bc53a8
PA
13489{
13490 return (preg == NULL
2d7cc5c7 13491 || preg->exec (ada_decode (name), 0, NULL, 0) == 0);
14bc53a8
PA
13492}
13493
778865d3
JB
13494/* Add all exceptions defined globally whose name name match
13495 a regular expression, excluding standard exceptions.
13496
13497 The reason we exclude standard exceptions is that they need
13498 to be handled separately: Standard exceptions are defined inside
13499 a runtime unit which is normally not compiled with debugging info,
13500 and thus usually do not show up in our symbol search. However,
13501 if the unit was in fact built with debugging info, we need to
13502 exclude them because they would duplicate the entry we found
13503 during the special loop that specifically searches for those
13504 standard exceptions.
13505
13506 If PREG is not NULL, then this regexp_t object is used to
13507 perform the symbol name matching. Otherwise, no name-based
13508 filtering is performed.
13509
13510 EXCEPTIONS is a vector of exceptions to which matching exceptions
13511 gets pushed. */
13512
13513static void
2d7cc5c7 13514ada_add_global_exceptions (compiled_regex *preg,
ab816a27 13515 std::vector<ada_exc_info> *exceptions)
778865d3 13516{
14bc53a8
PA
13517 /* In Ada, the symbol "search name" is a linkage name, whereas the
13518 regular expression used to do the matching refers to the natural
13519 name. So match against the decoded name. */
13520 expand_symtabs_matching (NULL,
b5ec771e 13521 lookup_name_info::match_any (),
14bc53a8
PA
13522 [&] (const char *search_name)
13523 {
13524 const char *decoded = ada_decode (search_name);
13525 return name_matches_regex (decoded, preg);
13526 },
13527 NULL,
13528 VARIABLES_DOMAIN);
778865d3 13529
2030c079 13530 for (objfile *objfile : current_program_space->objfiles ())
778865d3 13531 {
b669c953 13532 for (compunit_symtab *s : objfile->compunits ())
778865d3 13533 {
d8aeb77f
TT
13534 const struct blockvector *bv = COMPUNIT_BLOCKVECTOR (s);
13535 int i;
778865d3 13536
d8aeb77f
TT
13537 for (i = GLOBAL_BLOCK; i <= STATIC_BLOCK; i++)
13538 {
582942f4 13539 const struct block *b = BLOCKVECTOR_BLOCK (bv, i);
d8aeb77f
TT
13540 struct block_iterator iter;
13541 struct symbol *sym;
778865d3 13542
d8aeb77f
TT
13543 ALL_BLOCK_SYMBOLS (b, iter, sym)
13544 if (ada_is_non_standard_exception_sym (sym)
13545 && name_matches_regex (SYMBOL_NATURAL_NAME (sym), preg))
13546 {
13547 struct ada_exc_info info
13548 = {SYMBOL_PRINT_NAME (sym), SYMBOL_VALUE_ADDRESS (sym)};
13549
13550 exceptions->push_back (info);
13551 }
13552 }
778865d3
JB
13553 }
13554 }
13555}
13556
13557/* Implements ada_exceptions_list with the regular expression passed
13558 as a regex_t, rather than a string.
13559
13560 If not NULL, PREG is used to filter out exceptions whose names
13561 do not match. Otherwise, all exceptions are listed. */
13562
ab816a27 13563static std::vector<ada_exc_info>
2d7cc5c7 13564ada_exceptions_list_1 (compiled_regex *preg)
778865d3 13565{
ab816a27 13566 std::vector<ada_exc_info> result;
778865d3
JB
13567 int prev_len;
13568
13569 /* First, list the known standard exceptions. These exceptions
13570 need to be handled separately, as they are usually defined in
13571 runtime units that have been compiled without debugging info. */
13572
13573 ada_add_standard_exceptions (preg, &result);
13574
13575 /* Next, find all exceptions whose scope is local and accessible
13576 from the currently selected frame. */
13577
13578 if (has_stack_frames ())
13579 {
ab816a27 13580 prev_len = result.size ();
778865d3
JB
13581 ada_add_exceptions_from_frame (preg, get_selected_frame (NULL),
13582 &result);
ab816a27 13583 if (result.size () > prev_len)
778865d3
JB
13584 sort_remove_dups_ada_exceptions_list (&result, prev_len);
13585 }
13586
13587 /* Add all exceptions whose scope is global. */
13588
ab816a27 13589 prev_len = result.size ();
778865d3 13590 ada_add_global_exceptions (preg, &result);
ab816a27 13591 if (result.size () > prev_len)
778865d3
JB
13592 sort_remove_dups_ada_exceptions_list (&result, prev_len);
13593
778865d3
JB
13594 return result;
13595}
13596
13597/* Return a vector of ada_exc_info.
13598
13599 If REGEXP is NULL, all exceptions are included in the result.
13600 Otherwise, it should contain a valid regular expression,
13601 and only the exceptions whose names match that regular expression
13602 are included in the result.
13603
13604 The exceptions are sorted in the following order:
13605 - Standard exceptions (defined by the Ada language), in
13606 alphabetical order;
13607 - Exceptions only visible from the current frame, in
13608 alphabetical order;
13609 - Exceptions whose scope is global, in alphabetical order. */
13610
ab816a27 13611std::vector<ada_exc_info>
778865d3
JB
13612ada_exceptions_list (const char *regexp)
13613{
2d7cc5c7
PA
13614 if (regexp == NULL)
13615 return ada_exceptions_list_1 (NULL);
778865d3 13616
2d7cc5c7
PA
13617 compiled_regex reg (regexp, REG_NOSUB, _("invalid regular expression"));
13618 return ada_exceptions_list_1 (&reg);
778865d3
JB
13619}
13620
13621/* Implement the "info exceptions" command. */
13622
13623static void
1d12d88f 13624info_exceptions_command (const char *regexp, int from_tty)
778865d3 13625{
778865d3 13626 struct gdbarch *gdbarch = get_current_arch ();
778865d3 13627
ab816a27 13628 std::vector<ada_exc_info> exceptions = ada_exceptions_list (regexp);
778865d3
JB
13629
13630 if (regexp != NULL)
13631 printf_filtered
13632 (_("All Ada exceptions matching regular expression \"%s\":\n"), regexp);
13633 else
13634 printf_filtered (_("All defined Ada exceptions:\n"));
13635
ab816a27
TT
13636 for (const ada_exc_info &info : exceptions)
13637 printf_filtered ("%s: %s\n", info.name, paddress (gdbarch, info.addr));
778865d3
JB
13638}
13639
4c4b4cd2
PH
13640 /* Operators */
13641/* Information about operators given special treatment in functions
13642 below. */
13643/* Format: OP_DEFN (<operator>, <operator length>, <# args>, <binop>). */
13644
13645#define ADA_OPERATORS \
13646 OP_DEFN (OP_VAR_VALUE, 4, 0, 0) \
13647 OP_DEFN (BINOP_IN_BOUNDS, 3, 2, 0) \
13648 OP_DEFN (TERNOP_IN_RANGE, 1, 3, 0) \
13649 OP_DEFN (OP_ATR_FIRST, 1, 2, 0) \
13650 OP_DEFN (OP_ATR_LAST, 1, 2, 0) \
13651 OP_DEFN (OP_ATR_LENGTH, 1, 2, 0) \
13652 OP_DEFN (OP_ATR_IMAGE, 1, 2, 0) \
13653 OP_DEFN (OP_ATR_MAX, 1, 3, 0) \
13654 OP_DEFN (OP_ATR_MIN, 1, 3, 0) \
13655 OP_DEFN (OP_ATR_MODULUS, 1, 1, 0) \
13656 OP_DEFN (OP_ATR_POS, 1, 2, 0) \
13657 OP_DEFN (OP_ATR_SIZE, 1, 1, 0) \
13658 OP_DEFN (OP_ATR_TAG, 1, 1, 0) \
13659 OP_DEFN (OP_ATR_VAL, 1, 2, 0) \
13660 OP_DEFN (UNOP_QUAL, 3, 1, 0) \
52ce6436
PH
13661 OP_DEFN (UNOP_IN_RANGE, 3, 1, 0) \
13662 OP_DEFN (OP_OTHERS, 1, 1, 0) \
13663 OP_DEFN (OP_POSITIONAL, 3, 1, 0) \
13664 OP_DEFN (OP_DISCRETE_RANGE, 1, 2, 0)
4c4b4cd2
PH
13665
13666static void
554794dc
SDJ
13667ada_operator_length (const struct expression *exp, int pc, int *oplenp,
13668 int *argsp)
4c4b4cd2
PH
13669{
13670 switch (exp->elts[pc - 1].opcode)
13671 {
76a01679 13672 default:
4c4b4cd2
PH
13673 operator_length_standard (exp, pc, oplenp, argsp);
13674 break;
13675
13676#define OP_DEFN(op, len, args, binop) \
13677 case op: *oplenp = len; *argsp = args; break;
13678 ADA_OPERATORS;
13679#undef OP_DEFN
52ce6436
PH
13680
13681 case OP_AGGREGATE:
13682 *oplenp = 3;
13683 *argsp = longest_to_int (exp->elts[pc - 2].longconst);
13684 break;
13685
13686 case OP_CHOICES:
13687 *oplenp = 3;
13688 *argsp = longest_to_int (exp->elts[pc - 2].longconst) + 1;
13689 break;
4c4b4cd2
PH
13690 }
13691}
13692
c0201579
JK
13693/* Implementation of the exp_descriptor method operator_check. */
13694
13695static int
13696ada_operator_check (struct expression *exp, int pos,
13697 int (*objfile_func) (struct objfile *objfile, void *data),
13698 void *data)
13699{
13700 const union exp_element *const elts = exp->elts;
13701 struct type *type = NULL;
13702
13703 switch (elts[pos].opcode)
13704 {
13705 case UNOP_IN_RANGE:
13706 case UNOP_QUAL:
13707 type = elts[pos + 1].type;
13708 break;
13709
13710 default:
13711 return operator_check_standard (exp, pos, objfile_func, data);
13712 }
13713
13714 /* Invoke callbacks for TYPE and OBJFILE if they were set as non-NULL. */
13715
13716 if (type && TYPE_OBJFILE (type)
13717 && (*objfile_func) (TYPE_OBJFILE (type), data))
13718 return 1;
13719
13720 return 0;
13721}
13722
a121b7c1 13723static const char *
4c4b4cd2
PH
13724ada_op_name (enum exp_opcode opcode)
13725{
13726 switch (opcode)
13727 {
76a01679 13728 default:
4c4b4cd2 13729 return op_name_standard (opcode);
52ce6436 13730
4c4b4cd2
PH
13731#define OP_DEFN(op, len, args, binop) case op: return #op;
13732 ADA_OPERATORS;
13733#undef OP_DEFN
52ce6436
PH
13734
13735 case OP_AGGREGATE:
13736 return "OP_AGGREGATE";
13737 case OP_CHOICES:
13738 return "OP_CHOICES";
13739 case OP_NAME:
13740 return "OP_NAME";
4c4b4cd2
PH
13741 }
13742}
13743
13744/* As for operator_length, but assumes PC is pointing at the first
13745 element of the operator, and gives meaningful results only for the
52ce6436 13746 Ada-specific operators, returning 0 for *OPLENP and *ARGSP otherwise. */
4c4b4cd2
PH
13747
13748static void
76a01679
JB
13749ada_forward_operator_length (struct expression *exp, int pc,
13750 int *oplenp, int *argsp)
4c4b4cd2 13751{
76a01679 13752 switch (exp->elts[pc].opcode)
4c4b4cd2
PH
13753 {
13754 default:
13755 *oplenp = *argsp = 0;
13756 break;
52ce6436 13757
4c4b4cd2
PH
13758#define OP_DEFN(op, len, args, binop) \
13759 case op: *oplenp = len; *argsp = args; break;
13760 ADA_OPERATORS;
13761#undef OP_DEFN
52ce6436
PH
13762
13763 case OP_AGGREGATE:
13764 *oplenp = 3;
13765 *argsp = longest_to_int (exp->elts[pc + 1].longconst);
13766 break;
13767
13768 case OP_CHOICES:
13769 *oplenp = 3;
13770 *argsp = longest_to_int (exp->elts[pc + 1].longconst) + 1;
13771 break;
13772
13773 case OP_STRING:
13774 case OP_NAME:
13775 {
13776 int len = longest_to_int (exp->elts[pc + 1].longconst);
5b4ee69b 13777
52ce6436
PH
13778 *oplenp = 4 + BYTES_TO_EXP_ELEM (len + 1);
13779 *argsp = 0;
13780 break;
13781 }
4c4b4cd2
PH
13782 }
13783}
13784
13785static int
13786ada_dump_subexp_body (struct expression *exp, struct ui_file *stream, int elt)
13787{
13788 enum exp_opcode op = exp->elts[elt].opcode;
13789 int oplen, nargs;
13790 int pc = elt;
13791 int i;
76a01679 13792
4c4b4cd2
PH
13793 ada_forward_operator_length (exp, elt, &oplen, &nargs);
13794
76a01679 13795 switch (op)
4c4b4cd2 13796 {
76a01679 13797 /* Ada attributes ('Foo). */
4c4b4cd2
PH
13798 case OP_ATR_FIRST:
13799 case OP_ATR_LAST:
13800 case OP_ATR_LENGTH:
13801 case OP_ATR_IMAGE:
13802 case OP_ATR_MAX:
13803 case OP_ATR_MIN:
13804 case OP_ATR_MODULUS:
13805 case OP_ATR_POS:
13806 case OP_ATR_SIZE:
13807 case OP_ATR_TAG:
13808 case OP_ATR_VAL:
13809 break;
13810
13811 case UNOP_IN_RANGE:
13812 case UNOP_QUAL:
323e0a4a
AC
13813 /* XXX: gdb_sprint_host_address, type_sprint */
13814 fprintf_filtered (stream, _("Type @"));
4c4b4cd2
PH
13815 gdb_print_host_address (exp->elts[pc + 1].type, stream);
13816 fprintf_filtered (stream, " (");
13817 type_print (exp->elts[pc + 1].type, NULL, stream, 0);
13818 fprintf_filtered (stream, ")");
13819 break;
13820 case BINOP_IN_BOUNDS:
52ce6436
PH
13821 fprintf_filtered (stream, " (%d)",
13822 longest_to_int (exp->elts[pc + 2].longconst));
4c4b4cd2
PH
13823 break;
13824 case TERNOP_IN_RANGE:
13825 break;
13826
52ce6436
PH
13827 case OP_AGGREGATE:
13828 case OP_OTHERS:
13829 case OP_DISCRETE_RANGE:
13830 case OP_POSITIONAL:
13831 case OP_CHOICES:
13832 break;
13833
13834 case OP_NAME:
13835 case OP_STRING:
13836 {
13837 char *name = &exp->elts[elt + 2].string;
13838 int len = longest_to_int (exp->elts[elt + 1].longconst);
5b4ee69b 13839
52ce6436
PH
13840 fprintf_filtered (stream, "Text: `%.*s'", len, name);
13841 break;
13842 }
13843
4c4b4cd2
PH
13844 default:
13845 return dump_subexp_body_standard (exp, stream, elt);
13846 }
13847
13848 elt += oplen;
13849 for (i = 0; i < nargs; i += 1)
13850 elt = dump_subexp (exp, stream, elt);
13851
13852 return elt;
13853}
13854
13855/* The Ada extension of print_subexp (q.v.). */
13856
76a01679
JB
13857static void
13858ada_print_subexp (struct expression *exp, int *pos,
13859 struct ui_file *stream, enum precedence prec)
4c4b4cd2 13860{
52ce6436 13861 int oplen, nargs, i;
4c4b4cd2
PH
13862 int pc = *pos;
13863 enum exp_opcode op = exp->elts[pc].opcode;
13864
13865 ada_forward_operator_length (exp, pc, &oplen, &nargs);
13866
52ce6436 13867 *pos += oplen;
4c4b4cd2
PH
13868 switch (op)
13869 {
13870 default:
52ce6436 13871 *pos -= oplen;
4c4b4cd2
PH
13872 print_subexp_standard (exp, pos, stream, prec);
13873 return;
13874
13875 case OP_VAR_VALUE:
4c4b4cd2
PH
13876 fputs_filtered (SYMBOL_NATURAL_NAME (exp->elts[pc + 2].symbol), stream);
13877 return;
13878
13879 case BINOP_IN_BOUNDS:
323e0a4a 13880 /* XXX: sprint_subexp */
4c4b4cd2 13881 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13882 fputs_filtered (" in ", stream);
4c4b4cd2 13883 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13884 fputs_filtered ("'range", stream);
4c4b4cd2 13885 if (exp->elts[pc + 1].longconst > 1)
76a01679
JB
13886 fprintf_filtered (stream, "(%ld)",
13887 (long) exp->elts[pc + 1].longconst);
4c4b4cd2
PH
13888 return;
13889
13890 case TERNOP_IN_RANGE:
4c4b4cd2 13891 if (prec >= PREC_EQUAL)
76a01679 13892 fputs_filtered ("(", stream);
323e0a4a 13893 /* XXX: sprint_subexp */
4c4b4cd2 13894 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13895 fputs_filtered (" in ", stream);
4c4b4cd2
PH
13896 print_subexp (exp, pos, stream, PREC_EQUAL);
13897 fputs_filtered (" .. ", stream);
13898 print_subexp (exp, pos, stream, PREC_EQUAL);
13899 if (prec >= PREC_EQUAL)
76a01679
JB
13900 fputs_filtered (")", stream);
13901 return;
4c4b4cd2
PH
13902
13903 case OP_ATR_FIRST:
13904 case OP_ATR_LAST:
13905 case OP_ATR_LENGTH:
13906 case OP_ATR_IMAGE:
13907 case OP_ATR_MAX:
13908 case OP_ATR_MIN:
13909 case OP_ATR_MODULUS:
13910 case OP_ATR_POS:
13911 case OP_ATR_SIZE:
13912 case OP_ATR_TAG:
13913 case OP_ATR_VAL:
4c4b4cd2 13914 if (exp->elts[*pos].opcode == OP_TYPE)
76a01679
JB
13915 {
13916 if (TYPE_CODE (exp->elts[*pos + 1].type) != TYPE_CODE_VOID)
79d43c61
TT
13917 LA_PRINT_TYPE (exp->elts[*pos + 1].type, "", stream, 0, 0,
13918 &type_print_raw_options);
76a01679
JB
13919 *pos += 3;
13920 }
4c4b4cd2 13921 else
76a01679 13922 print_subexp (exp, pos, stream, PREC_SUFFIX);
4c4b4cd2
PH
13923 fprintf_filtered (stream, "'%s", ada_attribute_name (op));
13924 if (nargs > 1)
76a01679
JB
13925 {
13926 int tem;
5b4ee69b 13927
76a01679
JB
13928 for (tem = 1; tem < nargs; tem += 1)
13929 {
13930 fputs_filtered ((tem == 1) ? " (" : ", ", stream);
13931 print_subexp (exp, pos, stream, PREC_ABOVE_COMMA);
13932 }
13933 fputs_filtered (")", stream);
13934 }
4c4b4cd2 13935 return;
14f9c5c9 13936
4c4b4cd2 13937 case UNOP_QUAL:
4c4b4cd2
PH
13938 type_print (exp->elts[pc + 1].type, "", stream, 0);
13939 fputs_filtered ("'(", stream);
13940 print_subexp (exp, pos, stream, PREC_PREFIX);
13941 fputs_filtered (")", stream);
13942 return;
14f9c5c9 13943
4c4b4cd2 13944 case UNOP_IN_RANGE:
323e0a4a 13945 /* XXX: sprint_subexp */
4c4b4cd2 13946 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13947 fputs_filtered (" in ", stream);
79d43c61
TT
13948 LA_PRINT_TYPE (exp->elts[pc + 1].type, "", stream, 1, 0,
13949 &type_print_raw_options);
4c4b4cd2 13950 return;
52ce6436
PH
13951
13952 case OP_DISCRETE_RANGE:
13953 print_subexp (exp, pos, stream, PREC_SUFFIX);
13954 fputs_filtered ("..", stream);
13955 print_subexp (exp, pos, stream, PREC_SUFFIX);
13956 return;
13957
13958 case OP_OTHERS:
13959 fputs_filtered ("others => ", stream);
13960 print_subexp (exp, pos, stream, PREC_SUFFIX);
13961 return;
13962
13963 case OP_CHOICES:
13964 for (i = 0; i < nargs-1; i += 1)
13965 {
13966 if (i > 0)
13967 fputs_filtered ("|", stream);
13968 print_subexp (exp, pos, stream, PREC_SUFFIX);
13969 }
13970 fputs_filtered (" => ", stream);
13971 print_subexp (exp, pos, stream, PREC_SUFFIX);
13972 return;
13973
13974 case OP_POSITIONAL:
13975 print_subexp (exp, pos, stream, PREC_SUFFIX);
13976 return;
13977
13978 case OP_AGGREGATE:
13979 fputs_filtered ("(", stream);
13980 for (i = 0; i < nargs; i += 1)
13981 {
13982 if (i > 0)
13983 fputs_filtered (", ", stream);
13984 print_subexp (exp, pos, stream, PREC_SUFFIX);
13985 }
13986 fputs_filtered (")", stream);
13987 return;
4c4b4cd2
PH
13988 }
13989}
14f9c5c9
AS
13990
13991/* Table mapping opcodes into strings for printing operators
13992 and precedences of the operators. */
13993
d2e4a39e
AS
13994static const struct op_print ada_op_print_tab[] = {
13995 {":=", BINOP_ASSIGN, PREC_ASSIGN, 1},
13996 {"or else", BINOP_LOGICAL_OR, PREC_LOGICAL_OR, 0},
13997 {"and then", BINOP_LOGICAL_AND, PREC_LOGICAL_AND, 0},
13998 {"or", BINOP_BITWISE_IOR, PREC_BITWISE_IOR, 0},
13999 {"xor", BINOP_BITWISE_XOR, PREC_BITWISE_XOR, 0},
14000 {"and", BINOP_BITWISE_AND, PREC_BITWISE_AND, 0},
14001 {"=", BINOP_EQUAL, PREC_EQUAL, 0},
14002 {"/=", BINOP_NOTEQUAL, PREC_EQUAL, 0},
14003 {"<=", BINOP_LEQ, PREC_ORDER, 0},
14004 {">=", BINOP_GEQ, PREC_ORDER, 0},
14005 {">", BINOP_GTR, PREC_ORDER, 0},
14006 {"<", BINOP_LESS, PREC_ORDER, 0},
14007 {">>", BINOP_RSH, PREC_SHIFT, 0},
14008 {"<<", BINOP_LSH, PREC_SHIFT, 0},
14009 {"+", BINOP_ADD, PREC_ADD, 0},
14010 {"-", BINOP_SUB, PREC_ADD, 0},
14011 {"&", BINOP_CONCAT, PREC_ADD, 0},
14012 {"*", BINOP_MUL, PREC_MUL, 0},
14013 {"/", BINOP_DIV, PREC_MUL, 0},
14014 {"rem", BINOP_REM, PREC_MUL, 0},
14015 {"mod", BINOP_MOD, PREC_MUL, 0},
14016 {"**", BINOP_EXP, PREC_REPEAT, 0},
14017 {"@", BINOP_REPEAT, PREC_REPEAT, 0},
14018 {"-", UNOP_NEG, PREC_PREFIX, 0},
14019 {"+", UNOP_PLUS, PREC_PREFIX, 0},
14020 {"not ", UNOP_LOGICAL_NOT, PREC_PREFIX, 0},
14021 {"not ", UNOP_COMPLEMENT, PREC_PREFIX, 0},
14022 {"abs ", UNOP_ABS, PREC_PREFIX, 0},
4c4b4cd2
PH
14023 {".all", UNOP_IND, PREC_SUFFIX, 1},
14024 {"'access", UNOP_ADDR, PREC_SUFFIX, 1},
14025 {"'size", OP_ATR_SIZE, PREC_SUFFIX, 1},
f486487f 14026 {NULL, OP_NULL, PREC_SUFFIX, 0}
14f9c5c9
AS
14027};
14028\f
72d5681a
PH
14029enum ada_primitive_types {
14030 ada_primitive_type_int,
14031 ada_primitive_type_long,
14032 ada_primitive_type_short,
14033 ada_primitive_type_char,
14034 ada_primitive_type_float,
14035 ada_primitive_type_double,
14036 ada_primitive_type_void,
14037 ada_primitive_type_long_long,
14038 ada_primitive_type_long_double,
14039 ada_primitive_type_natural,
14040 ada_primitive_type_positive,
14041 ada_primitive_type_system_address,
08f49010 14042 ada_primitive_type_storage_offset,
72d5681a
PH
14043 nr_ada_primitive_types
14044};
6c038f32
PH
14045
14046static void
d4a9a881 14047ada_language_arch_info (struct gdbarch *gdbarch,
72d5681a
PH
14048 struct language_arch_info *lai)
14049{
d4a9a881 14050 const struct builtin_type *builtin = builtin_type (gdbarch);
5b4ee69b 14051
72d5681a 14052 lai->primitive_type_vector
d4a9a881 14053 = GDBARCH_OBSTACK_CALLOC (gdbarch, nr_ada_primitive_types + 1,
72d5681a 14054 struct type *);
e9bb382b
UW
14055
14056 lai->primitive_type_vector [ada_primitive_type_int]
14057 = arch_integer_type (gdbarch, gdbarch_int_bit (gdbarch),
14058 0, "integer");
14059 lai->primitive_type_vector [ada_primitive_type_long]
14060 = arch_integer_type (gdbarch, gdbarch_long_bit (gdbarch),
14061 0, "long_integer");
14062 lai->primitive_type_vector [ada_primitive_type_short]
14063 = arch_integer_type (gdbarch, gdbarch_short_bit (gdbarch),
14064 0, "short_integer");
14065 lai->string_char_type
14066 = lai->primitive_type_vector [ada_primitive_type_char]
cd7c1778 14067 = arch_character_type (gdbarch, TARGET_CHAR_BIT, 0, "character");
e9bb382b
UW
14068 lai->primitive_type_vector [ada_primitive_type_float]
14069 = arch_float_type (gdbarch, gdbarch_float_bit (gdbarch),
49f190bc 14070 "float", gdbarch_float_format (gdbarch));
e9bb382b
UW
14071 lai->primitive_type_vector [ada_primitive_type_double]
14072 = arch_float_type (gdbarch, gdbarch_double_bit (gdbarch),
49f190bc 14073 "long_float", gdbarch_double_format (gdbarch));
e9bb382b
UW
14074 lai->primitive_type_vector [ada_primitive_type_long_long]
14075 = arch_integer_type (gdbarch, gdbarch_long_long_bit (gdbarch),
14076 0, "long_long_integer");
14077 lai->primitive_type_vector [ada_primitive_type_long_double]
5f3bceb6 14078 = arch_float_type (gdbarch, gdbarch_long_double_bit (gdbarch),
49f190bc 14079 "long_long_float", gdbarch_long_double_format (gdbarch));
e9bb382b
UW
14080 lai->primitive_type_vector [ada_primitive_type_natural]
14081 = arch_integer_type (gdbarch, gdbarch_int_bit (gdbarch),
14082 0, "natural");
14083 lai->primitive_type_vector [ada_primitive_type_positive]
14084 = arch_integer_type (gdbarch, gdbarch_int_bit (gdbarch),
14085 0, "positive");
14086 lai->primitive_type_vector [ada_primitive_type_void]
14087 = builtin->builtin_void;
14088
14089 lai->primitive_type_vector [ada_primitive_type_system_address]
77b7c781
UW
14090 = lookup_pointer_type (arch_type (gdbarch, TYPE_CODE_VOID, TARGET_CHAR_BIT,
14091 "void"));
72d5681a
PH
14092 TYPE_NAME (lai->primitive_type_vector [ada_primitive_type_system_address])
14093 = "system__address";
fbb06eb1 14094
08f49010
XR
14095 /* Create the equivalent of the System.Storage_Elements.Storage_Offset
14096 type. This is a signed integral type whose size is the same as
14097 the size of addresses. */
14098 {
14099 unsigned int addr_length = TYPE_LENGTH
14100 (lai->primitive_type_vector [ada_primitive_type_system_address]);
14101
14102 lai->primitive_type_vector [ada_primitive_type_storage_offset]
14103 = arch_integer_type (gdbarch, addr_length * HOST_CHAR_BIT, 0,
14104 "storage_offset");
14105 }
14106
47e729a8 14107 lai->bool_type_symbol = NULL;
fbb06eb1 14108 lai->bool_type_default = builtin->builtin_bool;
6c038f32 14109}
6c038f32
PH
14110\f
14111 /* Language vector */
14112
14113/* Not really used, but needed in the ada_language_defn. */
14114
14115static void
6c7a06a3 14116emit_char (int c, struct type *type, struct ui_file *stream, int quoter)
6c038f32 14117{
6c7a06a3 14118 ada_emit_char (c, type, stream, quoter, 1);
6c038f32
PH
14119}
14120
14121static int
410a0ff2 14122parse (struct parser_state *ps)
6c038f32
PH
14123{
14124 warnings_issued = 0;
410a0ff2 14125 return ada_parse (ps);
6c038f32
PH
14126}
14127
14128static const struct exp_descriptor ada_exp_descriptor = {
14129 ada_print_subexp,
14130 ada_operator_length,
c0201579 14131 ada_operator_check,
6c038f32
PH
14132 ada_op_name,
14133 ada_dump_subexp_body,
14134 ada_evaluate_subexp
14135};
14136
b5ec771e
PA
14137/* symbol_name_matcher_ftype adapter for wild_match. */
14138
14139static bool
14140do_wild_match (const char *symbol_search_name,
14141 const lookup_name_info &lookup_name,
a207cff2 14142 completion_match_result *comp_match_res)
b5ec771e
PA
14143{
14144 return wild_match (symbol_search_name, ada_lookup_name (lookup_name));
14145}
14146
14147/* symbol_name_matcher_ftype adapter for full_match. */
14148
14149static bool
14150do_full_match (const char *symbol_search_name,
14151 const lookup_name_info &lookup_name,
a207cff2 14152 completion_match_result *comp_match_res)
b5ec771e
PA
14153{
14154 return full_match (symbol_search_name, ada_lookup_name (lookup_name));
14155}
14156
a2cd4f14
JB
14157/* symbol_name_matcher_ftype for exact (verbatim) matches. */
14158
14159static bool
14160do_exact_match (const char *symbol_search_name,
14161 const lookup_name_info &lookup_name,
14162 completion_match_result *comp_match_res)
14163{
14164 return strcmp (symbol_search_name, ada_lookup_name (lookup_name)) == 0;
14165}
14166
b5ec771e
PA
14167/* Build the Ada lookup name for LOOKUP_NAME. */
14168
14169ada_lookup_name_info::ada_lookup_name_info (const lookup_name_info &lookup_name)
14170{
14171 const std::string &user_name = lookup_name.name ();
14172
14173 if (user_name[0] == '<')
14174 {
14175 if (user_name.back () == '>')
14176 m_encoded_name = user_name.substr (1, user_name.size () - 2);
14177 else
14178 m_encoded_name = user_name.substr (1, user_name.size () - 1);
14179 m_encoded_p = true;
14180 m_verbatim_p = true;
14181 m_wild_match_p = false;
14182 m_standard_p = false;
14183 }
14184 else
14185 {
14186 m_verbatim_p = false;
14187
14188 m_encoded_p = user_name.find ("__") != std::string::npos;
14189
14190 if (!m_encoded_p)
14191 {
14192 const char *folded = ada_fold_name (user_name.c_str ());
14193 const char *encoded = ada_encode_1 (folded, false);
14194 if (encoded != NULL)
14195 m_encoded_name = encoded;
14196 else
14197 m_encoded_name = user_name;
14198 }
14199 else
14200 m_encoded_name = user_name;
14201
14202 /* Handle the 'package Standard' special case. See description
14203 of m_standard_p. */
14204 if (startswith (m_encoded_name.c_str (), "standard__"))
14205 {
14206 m_encoded_name = m_encoded_name.substr (sizeof ("standard__") - 1);
14207 m_standard_p = true;
14208 }
14209 else
14210 m_standard_p = false;
74ccd7f5 14211
b5ec771e
PA
14212 /* If the name contains a ".", then the user is entering a fully
14213 qualified entity name, and the match must not be done in wild
14214 mode. Similarly, if the user wants to complete what looks
14215 like an encoded name, the match must not be done in wild
14216 mode. Also, in the standard__ special case always do
14217 non-wild matching. */
14218 m_wild_match_p
14219 = (lookup_name.match_type () != symbol_name_match_type::FULL
14220 && !m_encoded_p
14221 && !m_standard_p
14222 && user_name.find ('.') == std::string::npos);
14223 }
14224}
14225
14226/* symbol_name_matcher_ftype method for Ada. This only handles
14227 completion mode. */
14228
14229static bool
14230ada_symbol_name_matches (const char *symbol_search_name,
14231 const lookup_name_info &lookup_name,
a207cff2 14232 completion_match_result *comp_match_res)
74ccd7f5 14233{
b5ec771e
PA
14234 return lookup_name.ada ().matches (symbol_search_name,
14235 lookup_name.match_type (),
a207cff2 14236 comp_match_res);
b5ec771e
PA
14237}
14238
de63c46b
PA
14239/* A name matcher that matches the symbol name exactly, with
14240 strcmp. */
14241
14242static bool
14243literal_symbol_name_matcher (const char *symbol_search_name,
14244 const lookup_name_info &lookup_name,
14245 completion_match_result *comp_match_res)
14246{
14247 const std::string &name = lookup_name.name ();
14248
14249 int cmp = (lookup_name.completion_mode ()
14250 ? strncmp (symbol_search_name, name.c_str (), name.size ())
14251 : strcmp (symbol_search_name, name.c_str ()));
14252 if (cmp == 0)
14253 {
14254 if (comp_match_res != NULL)
14255 comp_match_res->set_match (symbol_search_name);
14256 return true;
14257 }
14258 else
14259 return false;
14260}
14261
b5ec771e
PA
14262/* Implement the "la_get_symbol_name_matcher" language_defn method for
14263 Ada. */
14264
14265static symbol_name_matcher_ftype *
14266ada_get_symbol_name_matcher (const lookup_name_info &lookup_name)
14267{
de63c46b
PA
14268 if (lookup_name.match_type () == symbol_name_match_type::SEARCH_NAME)
14269 return literal_symbol_name_matcher;
14270
b5ec771e
PA
14271 if (lookup_name.completion_mode ())
14272 return ada_symbol_name_matches;
74ccd7f5 14273 else
b5ec771e
PA
14274 {
14275 if (lookup_name.ada ().wild_match_p ())
14276 return do_wild_match;
a2cd4f14
JB
14277 else if (lookup_name.ada ().verbatim_p ())
14278 return do_exact_match;
b5ec771e
PA
14279 else
14280 return do_full_match;
14281 }
74ccd7f5
JB
14282}
14283
a5ee536b
JB
14284/* Implement the "la_read_var_value" language_defn method for Ada. */
14285
14286static struct value *
63e43d3a
PMR
14287ada_read_var_value (struct symbol *var, const struct block *var_block,
14288 struct frame_info *frame)
a5ee536b 14289{
a5ee536b
JB
14290 /* The only case where default_read_var_value is not sufficient
14291 is when VAR is a renaming... */
c0e70c62
TT
14292 if (frame != nullptr)
14293 {
14294 const struct block *frame_block = get_frame_block (frame, NULL);
14295 if (frame_block != nullptr && ada_is_renaming_symbol (var))
14296 return ada_read_renaming_var_value (var, frame_block);
14297 }
a5ee536b
JB
14298
14299 /* This is a typical case where we expect the default_read_var_value
14300 function to work. */
63e43d3a 14301 return default_read_var_value (var, var_block, frame);
a5ee536b
JB
14302}
14303
56618e20
TT
14304static const char *ada_extensions[] =
14305{
14306 ".adb", ".ads", ".a", ".ada", ".dg", NULL
14307};
14308
47e77640 14309extern const struct language_defn ada_language_defn = {
6c038f32 14310 "ada", /* Language name */
6abde28f 14311 "Ada",
6c038f32 14312 language_ada,
6c038f32 14313 range_check_off,
6c038f32
PH
14314 case_sensitive_on, /* Yes, Ada is case-insensitive, but
14315 that's not quite what this means. */
6c038f32 14316 array_row_major,
9a044a89 14317 macro_expansion_no,
56618e20 14318 ada_extensions,
6c038f32
PH
14319 &ada_exp_descriptor,
14320 parse,
6c038f32
PH
14321 resolve,
14322 ada_printchar, /* Print a character constant */
14323 ada_printstr, /* Function to print string constant */
14324 emit_char, /* Function to print single char (not used) */
6c038f32 14325 ada_print_type, /* Print a type using appropriate syntax */
be942545 14326 ada_print_typedef, /* Print a typedef using appropriate syntax */
6c038f32
PH
14327 ada_val_print, /* Print a value using appropriate syntax */
14328 ada_value_print, /* Print a top-level value */
a5ee536b 14329 ada_read_var_value, /* la_read_var_value */
6c038f32 14330 NULL, /* Language specific skip_trampoline */
2b2d9e11 14331 NULL, /* name_of_this */
59cc4834 14332 true, /* la_store_sym_names_in_linkage_form_p */
6c038f32
PH
14333 ada_lookup_symbol_nonlocal, /* Looking up non-local symbols. */
14334 basic_lookup_transparent_type, /* lookup_transparent_type */
14335 ada_la_decode, /* Language specific symbol demangler */
8b302db8 14336 ada_sniff_from_mangled_name,
0963b4bd
MS
14337 NULL, /* Language specific
14338 class_name_from_physname */
6c038f32
PH
14339 ada_op_print_tab, /* expression operators for printing */
14340 0, /* c-style arrays */
14341 1, /* String lower bound */
6c038f32 14342 ada_get_gdb_completer_word_break_characters,
eb3ff9a5 14343 ada_collect_symbol_completion_matches,
72d5681a 14344 ada_language_arch_info,
e79af960 14345 ada_print_array_index,
41f1b697 14346 default_pass_by_reference,
ae6a3a4c 14347 c_get_string,
e2b7af72 14348 ada_watch_location_expression,
b5ec771e 14349 ada_get_symbol_name_matcher, /* la_get_symbol_name_matcher */
f8eba3c6 14350 ada_iterate_over_symbols,
5ffa0793 14351 default_search_name_hash,
a53b64ea 14352 &ada_varobj_ops,
bb2ec1b3 14353 NULL,
721b08c6 14354 NULL,
4be290b2 14355 ada_is_string_type,
721b08c6 14356 "(...)" /* la_struct_too_deep_ellipsis */
6c038f32
PH
14357};
14358
5bf03f13
JB
14359/* Command-list for the "set/show ada" prefix command. */
14360static struct cmd_list_element *set_ada_list;
14361static struct cmd_list_element *show_ada_list;
14362
14363/* Implement the "set ada" prefix command. */
14364
14365static void
981a3fb3 14366set_ada_command (const char *arg, int from_tty)
5bf03f13
JB
14367{
14368 printf_unfiltered (_(\
14369"\"set ada\" must be followed by the name of a setting.\n"));
635c7e8a 14370 help_list (set_ada_list, "set ada ", all_commands, gdb_stdout);
5bf03f13
JB
14371}
14372
14373/* Implement the "show ada" prefix command. */
14374
14375static void
981a3fb3 14376show_ada_command (const char *args, int from_tty)
5bf03f13
JB
14377{
14378 cmd_show_list (show_ada_list, from_tty, "");
14379}
14380
2060206e
PA
14381static void
14382initialize_ada_catchpoint_ops (void)
14383{
14384 struct breakpoint_ops *ops;
14385
14386 initialize_breakpoint_ops ();
14387
14388 ops = &catch_exception_breakpoint_ops;
14389 *ops = bkpt_breakpoint_ops;
2060206e
PA
14390 ops->allocate_location = allocate_location_catch_exception;
14391 ops->re_set = re_set_catch_exception;
14392 ops->check_status = check_status_catch_exception;
14393 ops->print_it = print_it_catch_exception;
14394 ops->print_one = print_one_catch_exception;
14395 ops->print_mention = print_mention_catch_exception;
14396 ops->print_recreate = print_recreate_catch_exception;
14397
14398 ops = &catch_exception_unhandled_breakpoint_ops;
14399 *ops = bkpt_breakpoint_ops;
2060206e
PA
14400 ops->allocate_location = allocate_location_catch_exception_unhandled;
14401 ops->re_set = re_set_catch_exception_unhandled;
14402 ops->check_status = check_status_catch_exception_unhandled;
14403 ops->print_it = print_it_catch_exception_unhandled;
14404 ops->print_one = print_one_catch_exception_unhandled;
14405 ops->print_mention = print_mention_catch_exception_unhandled;
14406 ops->print_recreate = print_recreate_catch_exception_unhandled;
14407
14408 ops = &catch_assert_breakpoint_ops;
14409 *ops = bkpt_breakpoint_ops;
2060206e
PA
14410 ops->allocate_location = allocate_location_catch_assert;
14411 ops->re_set = re_set_catch_assert;
14412 ops->check_status = check_status_catch_assert;
14413 ops->print_it = print_it_catch_assert;
14414 ops->print_one = print_one_catch_assert;
14415 ops->print_mention = print_mention_catch_assert;
14416 ops->print_recreate = print_recreate_catch_assert;
9f757bf7
XR
14417
14418 ops = &catch_handlers_breakpoint_ops;
14419 *ops = bkpt_breakpoint_ops;
14420 ops->allocate_location = allocate_location_catch_handlers;
14421 ops->re_set = re_set_catch_handlers;
14422 ops->check_status = check_status_catch_handlers;
14423 ops->print_it = print_it_catch_handlers;
14424 ops->print_one = print_one_catch_handlers;
14425 ops->print_mention = print_mention_catch_handlers;
14426 ops->print_recreate = print_recreate_catch_handlers;
2060206e
PA
14427}
14428
3d9434b5
JB
14429/* This module's 'new_objfile' observer. */
14430
14431static void
14432ada_new_objfile_observer (struct objfile *objfile)
14433{
14434 ada_clear_symbol_cache ();
14435}
14436
14437/* This module's 'free_objfile' observer. */
14438
14439static void
14440ada_free_objfile_observer (struct objfile *objfile)
14441{
14442 ada_clear_symbol_cache ();
14443}
14444
d2e4a39e 14445void
6c038f32 14446_initialize_ada_language (void)
14f9c5c9 14447{
2060206e
PA
14448 initialize_ada_catchpoint_ops ();
14449
5bf03f13 14450 add_prefix_cmd ("ada", no_class, set_ada_command,
590042fc 14451 _("Prefix command for changing Ada-specific settings."),
5bf03f13
JB
14452 &set_ada_list, "set ada ", 0, &setlist);
14453
14454 add_prefix_cmd ("ada", no_class, show_ada_command,
14455 _("Generic command for showing Ada-specific settings."),
14456 &show_ada_list, "show ada ", 0, &showlist);
14457
14458 add_setshow_boolean_cmd ("trust-PAD-over-XVS", class_obscure,
14459 &trust_pad_over_xvs, _("\
590042fc
PW
14460Enable or disable an optimization trusting PAD types over XVS types."), _("\
14461Show whether an optimization trusting PAD types over XVS types is activated."),
5bf03f13
JB
14462 _("\
14463This is related to the encoding used by the GNAT compiler. The debugger\n\
14464should normally trust the contents of PAD types, but certain older versions\n\
14465of GNAT have a bug that sometimes causes the information in the PAD type\n\
14466to be incorrect. Turning this setting \"off\" allows the debugger to\n\
14467work around this bug. It is always safe to turn this option \"off\", but\n\
14468this incurs a slight performance penalty, so it is recommended to NOT change\n\
14469this option to \"off\" unless necessary."),
14470 NULL, NULL, &set_ada_list, &show_ada_list);
14471
d72413e6
PMR
14472 add_setshow_boolean_cmd ("print-signatures", class_vars,
14473 &print_signatures, _("\
14474Enable or disable the output of formal and return types for functions in the \
590042fc 14475overloads selection menu."), _("\
d72413e6 14476Show whether the output of formal and return types for functions in the \
590042fc 14477overloads selection menu is activated."),
d72413e6
PMR
14478 NULL, NULL, NULL, &set_ada_list, &show_ada_list);
14479
9ac4176b
PA
14480 add_catch_command ("exception", _("\
14481Catch Ada exceptions, when raised.\n\
9bf7038b 14482Usage: catch exception [ARG] [if CONDITION]\n\
60a90376
JB
14483Without any argument, stop when any Ada exception is raised.\n\
14484If ARG is \"unhandled\" (without the quotes), only stop when the exception\n\
14485being raised does not have a handler (and will therefore lead to the task's\n\
14486termination).\n\
14487Otherwise, the catchpoint only stops when the name of the exception being\n\
9bf7038b
TT
14488raised is the same as ARG.\n\
14489CONDITION is a boolean expression that is evaluated to see whether the\n\
14490exception should cause a stop."),
9ac4176b 14491 catch_ada_exception_command,
71bed2db 14492 catch_ada_completer,
9ac4176b
PA
14493 CATCH_PERMANENT,
14494 CATCH_TEMPORARY);
9f757bf7
XR
14495
14496 add_catch_command ("handlers", _("\
14497Catch Ada exceptions, when handled.\n\
9bf7038b
TT
14498Usage: catch handlers [ARG] [if CONDITION]\n\
14499Without any argument, stop when any Ada exception is handled.\n\
14500With an argument, catch only exceptions with the given name.\n\
14501CONDITION is a boolean expression that is evaluated to see whether the\n\
14502exception should cause a stop."),
9f757bf7 14503 catch_ada_handlers_command,
71bed2db 14504 catch_ada_completer,
9f757bf7
XR
14505 CATCH_PERMANENT,
14506 CATCH_TEMPORARY);
9ac4176b
PA
14507 add_catch_command ("assert", _("\
14508Catch failed Ada assertions, when raised.\n\
9bf7038b
TT
14509Usage: catch assert [if CONDITION]\n\
14510CONDITION is a boolean expression that is evaluated to see whether the\n\
14511exception should cause a stop."),
9ac4176b
PA
14512 catch_assert_command,
14513 NULL,
14514 CATCH_PERMANENT,
14515 CATCH_TEMPORARY);
14516
6c038f32 14517 varsize_limit = 65536;
3fcded8f
JB
14518 add_setshow_uinteger_cmd ("varsize-limit", class_support,
14519 &varsize_limit, _("\
14520Set the maximum number of bytes allowed in a variable-size object."), _("\
14521Show the maximum number of bytes allowed in a variable-size object."), _("\
14522Attempts to access an object whose size is not a compile-time constant\n\
14523and exceeds this limit will cause an error."),
14524 NULL, NULL, &setlist, &showlist);
6c038f32 14525
778865d3
JB
14526 add_info ("exceptions", info_exceptions_command,
14527 _("\
14528List all Ada exception names.\n\
9bf7038b 14529Usage: info exceptions [REGEXP]\n\
778865d3
JB
14530If a regular expression is passed as an argument, only those matching\n\
14531the regular expression are listed."));
14532
c6044dd1
JB
14533 add_prefix_cmd ("ada", class_maintenance, maint_set_ada_cmd,
14534 _("Set Ada maintenance-related variables."),
14535 &maint_set_ada_cmdlist, "maintenance set ada ",
14536 0/*allow-unknown*/, &maintenance_set_cmdlist);
14537
14538 add_prefix_cmd ("ada", class_maintenance, maint_show_ada_cmd,
590042fc 14539 _("Show Ada maintenance-related variables."),
c6044dd1
JB
14540 &maint_show_ada_cmdlist, "maintenance show ada ",
14541 0/*allow-unknown*/, &maintenance_show_cmdlist);
14542
14543 add_setshow_boolean_cmd
14544 ("ignore-descriptive-types", class_maintenance,
14545 &ada_ignore_descriptive_types_p,
14546 _("Set whether descriptive types generated by GNAT should be ignored."),
14547 _("Show whether descriptive types generated by GNAT should be ignored."),
14548 _("\
14549When enabled, the debugger will stop using the DW_AT_GNAT_descriptive_type\n\
14550DWARF attribute."),
14551 NULL, NULL, &maint_set_ada_cmdlist, &maint_show_ada_cmdlist);
14552
459a2e4c
TT
14553 decoded_names_store = htab_create_alloc (256, htab_hash_string, streq_hash,
14554 NULL, xcalloc, xfree);
6b69afc4 14555
3d9434b5 14556 /* The ada-lang observers. */
76727919
TT
14557 gdb::observers::new_objfile.attach (ada_new_objfile_observer);
14558 gdb::observers::free_objfile.attach (ada_free_objfile_observer);
14559 gdb::observers::inferior_exit.attach (ada_inferior_exit);
14f9c5c9 14560}
This page took 3.25065 seconds and 4 git commands to generate.