gdb: add type::code / type::set_code
[deliverable/binutils-gdb.git] / gdb / ada-lang.c
CommitLineData
6e681866 1/* Ada language support routines for GDB, the GNU debugger.
10a2c479 2
b811d2c2 3 Copyright (C) 1992-2020 Free Software Foundation, Inc.
14f9c5c9 4
a9762ec7 5 This file is part of GDB.
14f9c5c9 6
a9762ec7
JB
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
14f9c5c9 11
a9762ec7
JB
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
14f9c5c9 16
a9762ec7
JB
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
14f9c5c9 19
96d887e8 20
4c4b4cd2 21#include "defs.h"
14f9c5c9 22#include <ctype.h>
d55e5aa6 23#include "gdb_regex.h"
4de283e4
TT
24#include "frame.h"
25#include "symtab.h"
26#include "gdbtypes.h"
14f9c5c9 27#include "gdbcmd.h"
4de283e4
TT
28#include "expression.h"
29#include "parser-defs.h"
30#include "language.h"
31#include "varobj.h"
4de283e4
TT
32#include "inferior.h"
33#include "symfile.h"
34#include "objfiles.h"
35#include "breakpoint.h"
14f9c5c9 36#include "gdbcore.h"
4c4b4cd2 37#include "hashtab.h"
4de283e4
TT
38#include "gdb_obstack.h"
39#include "ada-lang.h"
40#include "completer.h"
4de283e4
TT
41#include "ui-out.h"
42#include "block.h"
04714b91 43#include "infcall.h"
4de283e4
TT
44#include "annotate.h"
45#include "valprint.h"
d55e5aa6 46#include "source.h"
4de283e4 47#include "observable.h"
692465f1 48#include "stack.h"
79d43c61 49#include "typeprint.h"
4de283e4 50#include "namespace.h"
7f6aba03 51#include "cli/cli-style.h"
4de283e4 52
40bc484c 53#include "value.h"
4de283e4
TT
54#include "mi/mi-common.h"
55#include "arch-utils.h"
56#include "cli/cli-utils.h"
268a13a5
TT
57#include "gdbsupport/function-view.h"
58#include "gdbsupport/byte-vector.h"
4de283e4 59#include <algorithm>
ccefe4c4 60
4c4b4cd2 61/* Define whether or not the C operator '/' truncates towards zero for
0963b4bd 62 differently signed operands (truncation direction is undefined in C).
4c4b4cd2
PH
63 Copied from valarith.c. */
64
65#ifndef TRUNCATION_TOWARDS_ZERO
66#define TRUNCATION_TOWARDS_ZERO ((-5 / 2) == -2)
67#endif
68
d2e4a39e 69static struct type *desc_base_type (struct type *);
14f9c5c9 70
d2e4a39e 71static struct type *desc_bounds_type (struct type *);
14f9c5c9 72
d2e4a39e 73static struct value *desc_bounds (struct value *);
14f9c5c9 74
d2e4a39e 75static int fat_pntr_bounds_bitpos (struct type *);
14f9c5c9 76
d2e4a39e 77static int fat_pntr_bounds_bitsize (struct type *);
14f9c5c9 78
556bdfd4 79static struct type *desc_data_target_type (struct type *);
14f9c5c9 80
d2e4a39e 81static struct value *desc_data (struct value *);
14f9c5c9 82
d2e4a39e 83static int fat_pntr_data_bitpos (struct type *);
14f9c5c9 84
d2e4a39e 85static int fat_pntr_data_bitsize (struct type *);
14f9c5c9 86
d2e4a39e 87static struct value *desc_one_bound (struct value *, int, int);
14f9c5c9 88
d2e4a39e 89static int desc_bound_bitpos (struct type *, int, int);
14f9c5c9 90
d2e4a39e 91static int desc_bound_bitsize (struct type *, int, int);
14f9c5c9 92
d2e4a39e 93static struct type *desc_index_type (struct type *, int);
14f9c5c9 94
d2e4a39e 95static int desc_arity (struct type *);
14f9c5c9 96
d2e4a39e 97static int ada_type_match (struct type *, struct type *, int);
14f9c5c9 98
d2e4a39e 99static int ada_args_match (struct symbol *, struct value **, int);
14f9c5c9 100
40bc484c 101static struct value *make_array_descriptor (struct type *, struct value *);
14f9c5c9 102
4c4b4cd2 103static void ada_add_block_symbols (struct obstack *,
b5ec771e
PA
104 const struct block *,
105 const lookup_name_info &lookup_name,
106 domain_enum, struct objfile *);
14f9c5c9 107
22cee43f 108static void ada_add_all_symbols (struct obstack *, const struct block *,
b5ec771e
PA
109 const lookup_name_info &lookup_name,
110 domain_enum, int, int *);
22cee43f 111
d12307c1 112static int is_nonfunction (struct block_symbol *, int);
14f9c5c9 113
76a01679 114static void add_defn_to_vec (struct obstack *, struct symbol *,
f0c5f9b2 115 const struct block *);
14f9c5c9 116
4c4b4cd2
PH
117static int num_defns_collected (struct obstack *);
118
d12307c1 119static struct block_symbol *defns_collected (struct obstack *, int);
14f9c5c9 120
e9d9f57e 121static struct value *resolve_subexp (expression_up *, int *, int,
699bd4cf
TT
122 struct type *, int,
123 innermost_block_tracker *);
14f9c5c9 124
e9d9f57e 125static void replace_operator_with_call (expression_up *, int, int, int,
270140bd 126 struct symbol *, const struct block *);
14f9c5c9 127
d2e4a39e 128static int possible_user_operator_p (enum exp_opcode, struct value **);
14f9c5c9 129
a121b7c1 130static const char *ada_op_name (enum exp_opcode);
4c4b4cd2
PH
131
132static const char *ada_decoded_op_name (enum exp_opcode);
14f9c5c9 133
d2e4a39e 134static int numeric_type_p (struct type *);
14f9c5c9 135
d2e4a39e 136static int integer_type_p (struct type *);
14f9c5c9 137
d2e4a39e 138static int scalar_type_p (struct type *);
14f9c5c9 139
d2e4a39e 140static int discrete_type_p (struct type *);
14f9c5c9 141
a121b7c1 142static struct type *ada_lookup_struct_elt_type (struct type *, const char *,
988f6b3d 143 int, int);
4c4b4cd2 144
d2e4a39e 145static struct value *evaluate_subexp_type (struct expression *, int *);
14f9c5c9 146
b4ba55a1
JB
147static struct type *ada_find_parallel_type_with_name (struct type *,
148 const char *);
149
d2e4a39e 150static int is_dynamic_field (struct type *, int);
14f9c5c9 151
10a2c479 152static struct type *to_fixed_variant_branch_type (struct type *,
fc1a4b47 153 const gdb_byte *,
4c4b4cd2
PH
154 CORE_ADDR, struct value *);
155
156static struct type *to_fixed_array_type (struct type *, struct value *, int);
14f9c5c9 157
28c85d6c 158static struct type *to_fixed_range_type (struct type *, struct value *);
14f9c5c9 159
d2e4a39e 160static struct type *to_static_fixed_type (struct type *);
f192137b 161static struct type *static_unwrap_type (struct type *type);
14f9c5c9 162
d2e4a39e 163static struct value *unwrap_value (struct value *);
14f9c5c9 164
ad82864c 165static struct type *constrained_packed_array_type (struct type *, long *);
14f9c5c9 166
ad82864c 167static struct type *decode_constrained_packed_array_type (struct type *);
14f9c5c9 168
ad82864c
JB
169static long decode_packed_array_bitsize (struct type *);
170
171static struct value *decode_constrained_packed_array (struct value *);
172
173static int ada_is_packed_array_type (struct type *);
174
175static int ada_is_unconstrained_packed_array_type (struct type *);
14f9c5c9 176
d2e4a39e 177static struct value *value_subscript_packed (struct value *, int,
4c4b4cd2 178 struct value **);
14f9c5c9 179
4c4b4cd2
PH
180static struct value *coerce_unspec_val_to_type (struct value *,
181 struct type *);
14f9c5c9 182
d2e4a39e 183static int lesseq_defined_than (struct symbol *, struct symbol *);
14f9c5c9 184
d2e4a39e 185static int equiv_types (struct type *, struct type *);
14f9c5c9 186
d2e4a39e 187static int is_name_suffix (const char *);
14f9c5c9 188
73589123
PH
189static int advance_wild_match (const char **, const char *, int);
190
b5ec771e 191static bool wild_match (const char *name, const char *patn);
14f9c5c9 192
d2e4a39e 193static struct value *ada_coerce_ref (struct value *);
14f9c5c9 194
4c4b4cd2
PH
195static LONGEST pos_atr (struct value *);
196
3cb382c9 197static struct value *value_pos_atr (struct type *, struct value *);
14f9c5c9 198
d2e4a39e 199static struct value *value_val_atr (struct type *, struct value *);
14f9c5c9 200
4c4b4cd2
PH
201static struct symbol *standard_lookup (const char *, const struct block *,
202 domain_enum);
14f9c5c9 203
108d56a4 204static struct value *ada_search_struct_field (const char *, struct value *, int,
4c4b4cd2
PH
205 struct type *);
206
0d5cff50 207static int find_struct_field (const char *, struct type *, int,
52ce6436 208 struct type **, int *, int *, int *, int *);
4c4b4cd2 209
d12307c1 210static int ada_resolve_function (struct block_symbol *, int,
4c4b4cd2 211 struct value **, int, const char *,
2a612529 212 struct type *, int);
4c4b4cd2 213
4c4b4cd2
PH
214static int ada_is_direct_array_type (struct type *);
215
72d5681a
PH
216static void ada_language_arch_info (struct gdbarch *,
217 struct language_arch_info *);
714e53ab 218
52ce6436
PH
219static struct value *ada_index_struct_field (int, struct value *, int,
220 struct type *);
221
222static struct value *assign_aggregate (struct value *, struct value *,
0963b4bd
MS
223 struct expression *,
224 int *, enum noside);
52ce6436
PH
225
226static void aggregate_assign_from_choices (struct value *, struct value *,
227 struct expression *,
228 int *, LONGEST *, int *,
229 int, LONGEST, LONGEST);
230
231static void aggregate_assign_positional (struct value *, struct value *,
232 struct expression *,
233 int *, LONGEST *, int *, int,
234 LONGEST, LONGEST);
235
236
237static void aggregate_assign_others (struct value *, struct value *,
238 struct expression *,
239 int *, LONGEST *, int, LONGEST, LONGEST);
240
241
242static void add_component_interval (LONGEST, LONGEST, LONGEST *, int *, int);
243
244
245static struct value *ada_evaluate_subexp (struct type *, struct expression *,
246 int *, enum noside);
247
248static void ada_forward_operator_length (struct expression *, int, int *,
249 int *);
852dff6c
JB
250
251static struct type *ada_find_any_type (const char *name);
b5ec771e
PA
252
253static symbol_name_matcher_ftype *ada_get_symbol_name_matcher
254 (const lookup_name_info &lookup_name);
255
4c4b4cd2
PH
256\f
257
ee01b665
JB
258/* The result of a symbol lookup to be stored in our symbol cache. */
259
260struct cache_entry
261{
262 /* The name used to perform the lookup. */
263 const char *name;
264 /* The namespace used during the lookup. */
fe978cb0 265 domain_enum domain;
ee01b665
JB
266 /* The symbol returned by the lookup, or NULL if no matching symbol
267 was found. */
268 struct symbol *sym;
269 /* The block where the symbol was found, or NULL if no matching
270 symbol was found. */
271 const struct block *block;
272 /* A pointer to the next entry with the same hash. */
273 struct cache_entry *next;
274};
275
276/* The Ada symbol cache, used to store the result of Ada-mode symbol
277 lookups in the course of executing the user's commands.
278
279 The cache is implemented using a simple, fixed-sized hash.
280 The size is fixed on the grounds that there are not likely to be
281 all that many symbols looked up during any given session, regardless
282 of the size of the symbol table. If we decide to go to a resizable
283 table, let's just use the stuff from libiberty instead. */
284
285#define HASH_SIZE 1009
286
287struct ada_symbol_cache
288{
289 /* An obstack used to store the entries in our cache. */
290 struct obstack cache_space;
291
292 /* The root of the hash table used to implement our symbol cache. */
293 struct cache_entry *root[HASH_SIZE];
294};
295
296static void ada_free_symbol_cache (struct ada_symbol_cache *sym_cache);
76a01679 297
4c4b4cd2 298/* Maximum-sized dynamic type. */
14f9c5c9
AS
299static unsigned int varsize_limit;
300
67cb5b2d 301static const char ada_completer_word_break_characters[] =
4c4b4cd2
PH
302#ifdef VMS
303 " \t\n!@#%^&*()+=|~`}{[]\";:?/,-";
304#else
14f9c5c9 305 " \t\n!@#$%^&*()+=|~`}{[]\";:?/,-";
4c4b4cd2 306#endif
14f9c5c9 307
4c4b4cd2 308/* The name of the symbol to use to get the name of the main subprogram. */
76a01679 309static const char ADA_MAIN_PROGRAM_SYMBOL_NAME[]
4c4b4cd2 310 = "__gnat_ada_main_program_name";
14f9c5c9 311
4c4b4cd2
PH
312/* Limit on the number of warnings to raise per expression evaluation. */
313static int warning_limit = 2;
314
315/* Number of warning messages issued; reset to 0 by cleanups after
316 expression evaluation. */
317static int warnings_issued = 0;
318
319static const char *known_runtime_file_name_patterns[] = {
320 ADA_KNOWN_RUNTIME_FILE_NAME_PATTERNS NULL
321};
322
323static const char *known_auxiliary_function_name_patterns[] = {
324 ADA_KNOWN_AUXILIARY_FUNCTION_NAME_PATTERNS NULL
325};
326
c6044dd1
JB
327/* Maintenance-related settings for this module. */
328
329static struct cmd_list_element *maint_set_ada_cmdlist;
330static struct cmd_list_element *maint_show_ada_cmdlist;
331
c6044dd1
JB
332/* The "maintenance ada set/show ignore-descriptive-type" value. */
333
491144b5 334static bool ada_ignore_descriptive_types_p = false;
c6044dd1 335
e802dbe0
JB
336 /* Inferior-specific data. */
337
338/* Per-inferior data for this module. */
339
340struct ada_inferior_data
341{
342 /* The ada__tags__type_specific_data type, which is used when decoding
343 tagged types. With older versions of GNAT, this type was directly
344 accessible through a component ("tsd") in the object tag. But this
345 is no longer the case, so we cache it for each inferior. */
f37b313d 346 struct type *tsd_type = nullptr;
3eecfa55
JB
347
348 /* The exception_support_info data. This data is used to determine
349 how to implement support for Ada exception catchpoints in a given
350 inferior. */
f37b313d 351 const struct exception_support_info *exception_info = nullptr;
e802dbe0
JB
352};
353
354/* Our key to this module's inferior data. */
f37b313d 355static const struct inferior_key<ada_inferior_data> ada_inferior_data;
e802dbe0
JB
356
357/* Return our inferior data for the given inferior (INF).
358
359 This function always returns a valid pointer to an allocated
360 ada_inferior_data structure. If INF's inferior data has not
361 been previously set, this functions creates a new one with all
362 fields set to zero, sets INF's inferior to it, and then returns
363 a pointer to that newly allocated ada_inferior_data. */
364
365static struct ada_inferior_data *
366get_ada_inferior_data (struct inferior *inf)
367{
368 struct ada_inferior_data *data;
369
f37b313d 370 data = ada_inferior_data.get (inf);
e802dbe0 371 if (data == NULL)
f37b313d 372 data = ada_inferior_data.emplace (inf);
e802dbe0
JB
373
374 return data;
375}
376
377/* Perform all necessary cleanups regarding our module's inferior data
378 that is required after the inferior INF just exited. */
379
380static void
381ada_inferior_exit (struct inferior *inf)
382{
f37b313d 383 ada_inferior_data.clear (inf);
e802dbe0
JB
384}
385
ee01b665
JB
386
387 /* program-space-specific data. */
388
389/* This module's per-program-space data. */
390struct ada_pspace_data
391{
f37b313d
TT
392 ~ada_pspace_data ()
393 {
394 if (sym_cache != NULL)
395 ada_free_symbol_cache (sym_cache);
396 }
397
ee01b665 398 /* The Ada symbol cache. */
f37b313d 399 struct ada_symbol_cache *sym_cache = nullptr;
ee01b665
JB
400};
401
402/* Key to our per-program-space data. */
f37b313d 403static const struct program_space_key<ada_pspace_data> ada_pspace_data_handle;
ee01b665
JB
404
405/* Return this module's data for the given program space (PSPACE).
406 If not is found, add a zero'ed one now.
407
408 This function always returns a valid object. */
409
410static struct ada_pspace_data *
411get_ada_pspace_data (struct program_space *pspace)
412{
413 struct ada_pspace_data *data;
414
f37b313d 415 data = ada_pspace_data_handle.get (pspace);
ee01b665 416 if (data == NULL)
f37b313d 417 data = ada_pspace_data_handle.emplace (pspace);
ee01b665
JB
418
419 return data;
420}
421
4c4b4cd2
PH
422 /* Utilities */
423
720d1a40 424/* If TYPE is a TYPE_CODE_TYPEDEF type, return the target type after
eed9788b 425 all typedef layers have been peeled. Otherwise, return TYPE.
720d1a40
JB
426
427 Normally, we really expect a typedef type to only have 1 typedef layer.
428 In other words, we really expect the target type of a typedef type to be
429 a non-typedef type. This is particularly true for Ada units, because
430 the language does not have a typedef vs not-typedef distinction.
431 In that respect, the Ada compiler has been trying to eliminate as many
432 typedef definitions in the debugging information, since they generally
433 do not bring any extra information (we still use typedef under certain
434 circumstances related mostly to the GNAT encoding).
435
436 Unfortunately, we have seen situations where the debugging information
437 generated by the compiler leads to such multiple typedef layers. For
438 instance, consider the following example with stabs:
439
440 .stabs "pck__float_array___XUP:Tt(0,46)=s16P_ARRAY:(0,47)=[...]"[...]
441 .stabs "pck__float_array___XUP:t(0,36)=(0,46)",128,0,6,0
442
443 This is an error in the debugging information which causes type
444 pck__float_array___XUP to be defined twice, and the second time,
445 it is defined as a typedef of a typedef.
446
447 This is on the fringe of legality as far as debugging information is
448 concerned, and certainly unexpected. But it is easy to handle these
449 situations correctly, so we can afford to be lenient in this case. */
450
451static struct type *
452ada_typedef_target_type (struct type *type)
453{
454 while (TYPE_CODE (type) == TYPE_CODE_TYPEDEF)
455 type = TYPE_TARGET_TYPE (type);
456 return type;
457}
458
41d27058
JB
459/* Given DECODED_NAME a string holding a symbol name in its
460 decoded form (ie using the Ada dotted notation), returns
461 its unqualified name. */
462
463static const char *
464ada_unqualified_name (const char *decoded_name)
465{
2b0f535a
JB
466 const char *result;
467
468 /* If the decoded name starts with '<', it means that the encoded
469 name does not follow standard naming conventions, and thus that
470 it is not your typical Ada symbol name. Trying to unqualify it
471 is therefore pointless and possibly erroneous. */
472 if (decoded_name[0] == '<')
473 return decoded_name;
474
475 result = strrchr (decoded_name, '.');
41d27058
JB
476 if (result != NULL)
477 result++; /* Skip the dot... */
478 else
479 result = decoded_name;
480
481 return result;
482}
483
39e7af3e 484/* Return a string starting with '<', followed by STR, and '>'. */
41d27058 485
39e7af3e 486static std::string
41d27058
JB
487add_angle_brackets (const char *str)
488{
39e7af3e 489 return string_printf ("<%s>", str);
41d27058 490}
96d887e8 491
67cb5b2d 492static const char *
4c4b4cd2
PH
493ada_get_gdb_completer_word_break_characters (void)
494{
495 return ada_completer_word_break_characters;
496}
497
e79af960
JB
498/* Print an array element index using the Ada syntax. */
499
500static void
501ada_print_array_index (struct value *index_value, struct ui_file *stream,
79a45b7d 502 const struct value_print_options *options)
e79af960 503{
79a45b7d 504 LA_VALUE_PRINT (index_value, stream, options);
e79af960
JB
505 fprintf_filtered (stream, " => ");
506}
507
e2b7af72
JB
508/* la_watch_location_expression for Ada. */
509
de93309a 510static gdb::unique_xmalloc_ptr<char>
e2b7af72
JB
511ada_watch_location_expression (struct type *type, CORE_ADDR addr)
512{
513 type = check_typedef (TYPE_TARGET_TYPE (check_typedef (type)));
514 std::string name = type_to_string (type);
515 return gdb::unique_xmalloc_ptr<char>
516 (xstrprintf ("{%s} %s", name.c_str (), core_addr_to_string (addr)));
517}
518
de93309a
SM
519/* Assuming V points to an array of S objects, make sure that it contains at
520 least M objects, updating V and S as necessary. */
521
522#define GROW_VECT(v, s, m) \
523 if ((s) < (m)) (v) = (char *) grow_vect (v, &(s), m, sizeof *(v));
524
f27cf670 525/* Assuming VECT points to an array of *SIZE objects of size
14f9c5c9 526 ELEMENT_SIZE, grow it to contain at least MIN_SIZE objects,
f27cf670 527 updating *SIZE as necessary and returning the (new) array. */
14f9c5c9 528
de93309a 529static void *
f27cf670 530grow_vect (void *vect, size_t *size, size_t min_size, int element_size)
14f9c5c9 531{
d2e4a39e
AS
532 if (*size < min_size)
533 {
534 *size *= 2;
535 if (*size < min_size)
4c4b4cd2 536 *size = min_size;
f27cf670 537 vect = xrealloc (vect, *size * element_size);
d2e4a39e 538 }
f27cf670 539 return vect;
14f9c5c9
AS
540}
541
542/* True (non-zero) iff TARGET matches FIELD_NAME up to any trailing
4c4b4cd2 543 suffix of FIELD_NAME beginning "___". */
14f9c5c9
AS
544
545static int
ebf56fd3 546field_name_match (const char *field_name, const char *target)
14f9c5c9
AS
547{
548 int len = strlen (target);
5b4ee69b 549
d2e4a39e 550 return
4c4b4cd2
PH
551 (strncmp (field_name, target, len) == 0
552 && (field_name[len] == '\0'
61012eef 553 || (startswith (field_name + len, "___")
76a01679
JB
554 && strcmp (field_name + strlen (field_name) - 6,
555 "___XVN") != 0)));
14f9c5c9
AS
556}
557
558
872c8b51
JB
559/* Assuming TYPE is a TYPE_CODE_STRUCT or a TYPE_CODE_TYPDEF to
560 a TYPE_CODE_STRUCT, find the field whose name matches FIELD_NAME,
561 and return its index. This function also handles fields whose name
562 have ___ suffixes because the compiler sometimes alters their name
563 by adding such a suffix to represent fields with certain constraints.
564 If the field could not be found, return a negative number if
565 MAYBE_MISSING is set. Otherwise raise an error. */
4c4b4cd2
PH
566
567int
568ada_get_field_index (const struct type *type, const char *field_name,
569 int maybe_missing)
570{
571 int fieldno;
872c8b51
JB
572 struct type *struct_type = check_typedef ((struct type *) type);
573
574 for (fieldno = 0; fieldno < TYPE_NFIELDS (struct_type); fieldno++)
575 if (field_name_match (TYPE_FIELD_NAME (struct_type, fieldno), field_name))
4c4b4cd2
PH
576 return fieldno;
577
578 if (!maybe_missing)
323e0a4a 579 error (_("Unable to find field %s in struct %s. Aborting"),
872c8b51 580 field_name, TYPE_NAME (struct_type));
4c4b4cd2
PH
581
582 return -1;
583}
584
585/* The length of the prefix of NAME prior to any "___" suffix. */
14f9c5c9
AS
586
587int
d2e4a39e 588ada_name_prefix_len (const char *name)
14f9c5c9
AS
589{
590 if (name == NULL)
591 return 0;
d2e4a39e 592 else
14f9c5c9 593 {
d2e4a39e 594 const char *p = strstr (name, "___");
5b4ee69b 595
14f9c5c9 596 if (p == NULL)
4c4b4cd2 597 return strlen (name);
14f9c5c9 598 else
4c4b4cd2 599 return p - name;
14f9c5c9
AS
600 }
601}
602
4c4b4cd2
PH
603/* Return non-zero if SUFFIX is a suffix of STR.
604 Return zero if STR is null. */
605
14f9c5c9 606static int
d2e4a39e 607is_suffix (const char *str, const char *suffix)
14f9c5c9
AS
608{
609 int len1, len2;
5b4ee69b 610
14f9c5c9
AS
611 if (str == NULL)
612 return 0;
613 len1 = strlen (str);
614 len2 = strlen (suffix);
4c4b4cd2 615 return (len1 >= len2 && strcmp (str + len1 - len2, suffix) == 0);
14f9c5c9
AS
616}
617
4c4b4cd2
PH
618/* The contents of value VAL, treated as a value of type TYPE. The
619 result is an lval in memory if VAL is. */
14f9c5c9 620
d2e4a39e 621static struct value *
4c4b4cd2 622coerce_unspec_val_to_type (struct value *val, struct type *type)
14f9c5c9 623{
61ee279c 624 type = ada_check_typedef (type);
df407dfe 625 if (value_type (val) == type)
4c4b4cd2 626 return val;
d2e4a39e 627 else
14f9c5c9 628 {
4c4b4cd2
PH
629 struct value *result;
630
631 /* Make sure that the object size is not unreasonable before
632 trying to allocate some memory for it. */
c1b5a1a6 633 ada_ensure_varsize_limit (type);
4c4b4cd2 634
41e8491f
JK
635 if (value_lazy (val)
636 || TYPE_LENGTH (type) > TYPE_LENGTH (value_type (val)))
637 result = allocate_value_lazy (type);
638 else
639 {
640 result = allocate_value (type);
9a0dc9e3 641 value_contents_copy_raw (result, 0, val, 0, TYPE_LENGTH (type));
41e8491f 642 }
74bcbdf3 643 set_value_component_location (result, val);
9bbda503
AC
644 set_value_bitsize (result, value_bitsize (val));
645 set_value_bitpos (result, value_bitpos (val));
c408a94f
TT
646 if (VALUE_LVAL (result) == lval_memory)
647 set_value_address (result, value_address (val));
14f9c5c9
AS
648 return result;
649 }
650}
651
fc1a4b47
AC
652static const gdb_byte *
653cond_offset_host (const gdb_byte *valaddr, long offset)
14f9c5c9
AS
654{
655 if (valaddr == NULL)
656 return NULL;
657 else
658 return valaddr + offset;
659}
660
661static CORE_ADDR
ebf56fd3 662cond_offset_target (CORE_ADDR address, long offset)
14f9c5c9
AS
663{
664 if (address == 0)
665 return 0;
d2e4a39e 666 else
14f9c5c9
AS
667 return address + offset;
668}
669
4c4b4cd2
PH
670/* Issue a warning (as for the definition of warning in utils.c, but
671 with exactly one argument rather than ...), unless the limit on the
672 number of warnings has passed during the evaluation of the current
673 expression. */
a2249542 674
77109804
AC
675/* FIXME: cagney/2004-10-10: This function is mimicking the behavior
676 provided by "complaint". */
a0b31db1 677static void lim_warning (const char *format, ...) ATTRIBUTE_PRINTF (1, 2);
77109804 678
14f9c5c9 679static void
a2249542 680lim_warning (const char *format, ...)
14f9c5c9 681{
a2249542 682 va_list args;
a2249542 683
5b4ee69b 684 va_start (args, format);
4c4b4cd2
PH
685 warnings_issued += 1;
686 if (warnings_issued <= warning_limit)
a2249542
MK
687 vwarning (format, args);
688
689 va_end (args);
4c4b4cd2
PH
690}
691
714e53ab
PH
692/* Issue an error if the size of an object of type T is unreasonable,
693 i.e. if it would be a bad idea to allocate a value of this type in
694 GDB. */
695
c1b5a1a6
JB
696void
697ada_ensure_varsize_limit (const struct type *type)
714e53ab
PH
698{
699 if (TYPE_LENGTH (type) > varsize_limit)
323e0a4a 700 error (_("object size is larger than varsize-limit"));
714e53ab
PH
701}
702
0963b4bd 703/* Maximum value of a SIZE-byte signed integer type. */
4c4b4cd2 704static LONGEST
c3e5cd34 705max_of_size (int size)
4c4b4cd2 706{
76a01679 707 LONGEST top_bit = (LONGEST) 1 << (size * 8 - 2);
5b4ee69b 708
76a01679 709 return top_bit | (top_bit - 1);
4c4b4cd2
PH
710}
711
0963b4bd 712/* Minimum value of a SIZE-byte signed integer type. */
4c4b4cd2 713static LONGEST
c3e5cd34 714min_of_size (int size)
4c4b4cd2 715{
c3e5cd34 716 return -max_of_size (size) - 1;
4c4b4cd2
PH
717}
718
0963b4bd 719/* Maximum value of a SIZE-byte unsigned integer type. */
4c4b4cd2 720static ULONGEST
c3e5cd34 721umax_of_size (int size)
4c4b4cd2 722{
76a01679 723 ULONGEST top_bit = (ULONGEST) 1 << (size * 8 - 1);
5b4ee69b 724
76a01679 725 return top_bit | (top_bit - 1);
4c4b4cd2
PH
726}
727
0963b4bd 728/* Maximum value of integral type T, as a signed quantity. */
c3e5cd34
PH
729static LONGEST
730max_of_type (struct type *t)
4c4b4cd2 731{
c3e5cd34
PH
732 if (TYPE_UNSIGNED (t))
733 return (LONGEST) umax_of_size (TYPE_LENGTH (t));
734 else
735 return max_of_size (TYPE_LENGTH (t));
736}
737
0963b4bd 738/* Minimum value of integral type T, as a signed quantity. */
c3e5cd34
PH
739static LONGEST
740min_of_type (struct type *t)
741{
742 if (TYPE_UNSIGNED (t))
743 return 0;
744 else
745 return min_of_size (TYPE_LENGTH (t));
4c4b4cd2
PH
746}
747
748/* The largest value in the domain of TYPE, a discrete type, as an integer. */
43bbcdc2
PH
749LONGEST
750ada_discrete_type_high_bound (struct type *type)
4c4b4cd2 751{
b249d2c2 752 type = resolve_dynamic_type (type, {}, 0);
76a01679 753 switch (TYPE_CODE (type))
4c4b4cd2
PH
754 {
755 case TYPE_CODE_RANGE:
690cc4eb 756 return TYPE_HIGH_BOUND (type);
4c4b4cd2 757 case TYPE_CODE_ENUM:
14e75d8e 758 return TYPE_FIELD_ENUMVAL (type, TYPE_NFIELDS (type) - 1);
690cc4eb
PH
759 case TYPE_CODE_BOOL:
760 return 1;
761 case TYPE_CODE_CHAR:
76a01679 762 case TYPE_CODE_INT:
690cc4eb 763 return max_of_type (type);
4c4b4cd2 764 default:
43bbcdc2 765 error (_("Unexpected type in ada_discrete_type_high_bound."));
4c4b4cd2
PH
766 }
767}
768
14e75d8e 769/* The smallest value in the domain of TYPE, a discrete type, as an integer. */
43bbcdc2
PH
770LONGEST
771ada_discrete_type_low_bound (struct type *type)
4c4b4cd2 772{
b249d2c2 773 type = resolve_dynamic_type (type, {}, 0);
76a01679 774 switch (TYPE_CODE (type))
4c4b4cd2
PH
775 {
776 case TYPE_CODE_RANGE:
690cc4eb 777 return TYPE_LOW_BOUND (type);
4c4b4cd2 778 case TYPE_CODE_ENUM:
14e75d8e 779 return TYPE_FIELD_ENUMVAL (type, 0);
690cc4eb
PH
780 case TYPE_CODE_BOOL:
781 return 0;
782 case TYPE_CODE_CHAR:
76a01679 783 case TYPE_CODE_INT:
690cc4eb 784 return min_of_type (type);
4c4b4cd2 785 default:
43bbcdc2 786 error (_("Unexpected type in ada_discrete_type_low_bound."));
4c4b4cd2
PH
787 }
788}
789
790/* The identity on non-range types. For range types, the underlying
76a01679 791 non-range scalar type. */
4c4b4cd2
PH
792
793static struct type *
18af8284 794get_base_type (struct type *type)
4c4b4cd2
PH
795{
796 while (type != NULL && TYPE_CODE (type) == TYPE_CODE_RANGE)
797 {
76a01679
JB
798 if (type == TYPE_TARGET_TYPE (type) || TYPE_TARGET_TYPE (type) == NULL)
799 return type;
4c4b4cd2
PH
800 type = TYPE_TARGET_TYPE (type);
801 }
802 return type;
14f9c5c9 803}
41246937
JB
804
805/* Return a decoded version of the given VALUE. This means returning
806 a value whose type is obtained by applying all the GNAT-specific
85102364 807 encodings, making the resulting type a static but standard description
41246937
JB
808 of the initial type. */
809
810struct value *
811ada_get_decoded_value (struct value *value)
812{
813 struct type *type = ada_check_typedef (value_type (value));
814
815 if (ada_is_array_descriptor_type (type)
816 || (ada_is_constrained_packed_array_type (type)
817 && TYPE_CODE (type) != TYPE_CODE_PTR))
818 {
819 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF) /* array access type. */
820 value = ada_coerce_to_simple_array_ptr (value);
821 else
822 value = ada_coerce_to_simple_array (value);
823 }
824 else
825 value = ada_to_fixed_value (value);
826
827 return value;
828}
829
830/* Same as ada_get_decoded_value, but with the given TYPE.
831 Because there is no associated actual value for this type,
832 the resulting type might be a best-effort approximation in
833 the case of dynamic types. */
834
835struct type *
836ada_get_decoded_type (struct type *type)
837{
838 type = to_static_fixed_type (type);
839 if (ada_is_constrained_packed_array_type (type))
840 type = ada_coerce_to_simple_array_type (type);
841 return type;
842}
843
4c4b4cd2 844\f
76a01679 845
4c4b4cd2 846 /* Language Selection */
14f9c5c9
AS
847
848/* If the main program is in Ada, return language_ada, otherwise return LANG
ccefe4c4 849 (the main program is in Ada iif the adainit symbol is found). */
d2e4a39e 850
de93309a 851static enum language
ccefe4c4 852ada_update_initial_language (enum language lang)
14f9c5c9 853{
cafb3438 854 if (lookup_minimal_symbol ("adainit", NULL, NULL).minsym != NULL)
4c4b4cd2 855 return language_ada;
14f9c5c9
AS
856
857 return lang;
858}
96d887e8
PH
859
860/* If the main procedure is written in Ada, then return its name.
861 The result is good until the next call. Return NULL if the main
862 procedure doesn't appear to be in Ada. */
863
864char *
865ada_main_name (void)
866{
3b7344d5 867 struct bound_minimal_symbol msym;
e83e4e24 868 static gdb::unique_xmalloc_ptr<char> main_program_name;
6c038f32 869
96d887e8
PH
870 /* For Ada, the name of the main procedure is stored in a specific
871 string constant, generated by the binder. Look for that symbol,
872 extract its address, and then read that string. If we didn't find
873 that string, then most probably the main procedure is not written
874 in Ada. */
875 msym = lookup_minimal_symbol (ADA_MAIN_PROGRAM_SYMBOL_NAME, NULL, NULL);
876
3b7344d5 877 if (msym.minsym != NULL)
96d887e8 878 {
f9bc20b9
JB
879 CORE_ADDR main_program_name_addr;
880 int err_code;
881
77e371c0 882 main_program_name_addr = BMSYMBOL_VALUE_ADDRESS (msym);
96d887e8 883 if (main_program_name_addr == 0)
323e0a4a 884 error (_("Invalid address for Ada main program name."));
96d887e8 885
f9bc20b9
JB
886 target_read_string (main_program_name_addr, &main_program_name,
887 1024, &err_code);
888
889 if (err_code != 0)
890 return NULL;
e83e4e24 891 return main_program_name.get ();
96d887e8
PH
892 }
893
894 /* The main procedure doesn't seem to be in Ada. */
895 return NULL;
896}
14f9c5c9 897\f
4c4b4cd2 898 /* Symbols */
d2e4a39e 899
4c4b4cd2
PH
900/* Table of Ada operators and their GNAT-encoded names. Last entry is pair
901 of NULLs. */
14f9c5c9 902
d2e4a39e
AS
903const struct ada_opname_map ada_opname_table[] = {
904 {"Oadd", "\"+\"", BINOP_ADD},
905 {"Osubtract", "\"-\"", BINOP_SUB},
906 {"Omultiply", "\"*\"", BINOP_MUL},
907 {"Odivide", "\"/\"", BINOP_DIV},
908 {"Omod", "\"mod\"", BINOP_MOD},
909 {"Orem", "\"rem\"", BINOP_REM},
910 {"Oexpon", "\"**\"", BINOP_EXP},
911 {"Olt", "\"<\"", BINOP_LESS},
912 {"Ole", "\"<=\"", BINOP_LEQ},
913 {"Ogt", "\">\"", BINOP_GTR},
914 {"Oge", "\">=\"", BINOP_GEQ},
915 {"Oeq", "\"=\"", BINOP_EQUAL},
916 {"One", "\"/=\"", BINOP_NOTEQUAL},
917 {"Oand", "\"and\"", BINOP_BITWISE_AND},
918 {"Oor", "\"or\"", BINOP_BITWISE_IOR},
919 {"Oxor", "\"xor\"", BINOP_BITWISE_XOR},
920 {"Oconcat", "\"&\"", BINOP_CONCAT},
921 {"Oabs", "\"abs\"", UNOP_ABS},
922 {"Onot", "\"not\"", UNOP_LOGICAL_NOT},
923 {"Oadd", "\"+\"", UNOP_PLUS},
924 {"Osubtract", "\"-\"", UNOP_NEG},
925 {NULL, NULL}
14f9c5c9
AS
926};
927
b5ec771e
PA
928/* The "encoded" form of DECODED, according to GNAT conventions. The
929 result is valid until the next call to ada_encode. If
930 THROW_ERRORS, throw an error if invalid operator name is found.
931 Otherwise, return NULL in that case. */
4c4b4cd2 932
b5ec771e
PA
933static char *
934ada_encode_1 (const char *decoded, bool throw_errors)
14f9c5c9 935{
4c4b4cd2
PH
936 static char *encoding_buffer = NULL;
937 static size_t encoding_buffer_size = 0;
d2e4a39e 938 const char *p;
14f9c5c9 939 int k;
d2e4a39e 940
4c4b4cd2 941 if (decoded == NULL)
14f9c5c9
AS
942 return NULL;
943
4c4b4cd2
PH
944 GROW_VECT (encoding_buffer, encoding_buffer_size,
945 2 * strlen (decoded) + 10);
14f9c5c9
AS
946
947 k = 0;
4c4b4cd2 948 for (p = decoded; *p != '\0'; p += 1)
14f9c5c9 949 {
cdc7bb92 950 if (*p == '.')
4c4b4cd2
PH
951 {
952 encoding_buffer[k] = encoding_buffer[k + 1] = '_';
953 k += 2;
954 }
14f9c5c9 955 else if (*p == '"')
4c4b4cd2
PH
956 {
957 const struct ada_opname_map *mapping;
958
959 for (mapping = ada_opname_table;
1265e4aa 960 mapping->encoded != NULL
61012eef 961 && !startswith (p, mapping->decoded); mapping += 1)
4c4b4cd2
PH
962 ;
963 if (mapping->encoded == NULL)
b5ec771e
PA
964 {
965 if (throw_errors)
966 error (_("invalid Ada operator name: %s"), p);
967 else
968 return NULL;
969 }
4c4b4cd2
PH
970 strcpy (encoding_buffer + k, mapping->encoded);
971 k += strlen (mapping->encoded);
972 break;
973 }
d2e4a39e 974 else
4c4b4cd2
PH
975 {
976 encoding_buffer[k] = *p;
977 k += 1;
978 }
14f9c5c9
AS
979 }
980
4c4b4cd2
PH
981 encoding_buffer[k] = '\0';
982 return encoding_buffer;
14f9c5c9
AS
983}
984
b5ec771e
PA
985/* The "encoded" form of DECODED, according to GNAT conventions.
986 The result is valid until the next call to ada_encode. */
987
988char *
989ada_encode (const char *decoded)
990{
991 return ada_encode_1 (decoded, true);
992}
993
14f9c5c9 994/* Return NAME folded to lower case, or, if surrounded by single
4c4b4cd2
PH
995 quotes, unfolded, but with the quotes stripped away. Result good
996 to next call. */
997
de93309a 998static char *
e0802d59 999ada_fold_name (gdb::string_view name)
14f9c5c9 1000{
d2e4a39e 1001 static char *fold_buffer = NULL;
14f9c5c9
AS
1002 static size_t fold_buffer_size = 0;
1003
e0802d59 1004 int len = name.size ();
d2e4a39e 1005 GROW_VECT (fold_buffer, fold_buffer_size, len + 1);
14f9c5c9
AS
1006
1007 if (name[0] == '\'')
1008 {
e0802d59 1009 strncpy (fold_buffer, name.data () + 1, len - 2);
d2e4a39e 1010 fold_buffer[len - 2] = '\000';
14f9c5c9
AS
1011 }
1012 else
1013 {
1014 int i;
5b4ee69b 1015
14f9c5c9 1016 for (i = 0; i <= len; i += 1)
4c4b4cd2 1017 fold_buffer[i] = tolower (name[i]);
14f9c5c9
AS
1018 }
1019
1020 return fold_buffer;
1021}
1022
529cad9c
PH
1023/* Return nonzero if C is either a digit or a lowercase alphabet character. */
1024
1025static int
1026is_lower_alphanum (const char c)
1027{
1028 return (isdigit (c) || (isalpha (c) && islower (c)));
1029}
1030
c90092fe
JB
1031/* ENCODED is the linkage name of a symbol and LEN contains its length.
1032 This function saves in LEN the length of that same symbol name but
1033 without either of these suffixes:
29480c32
JB
1034 . .{DIGIT}+
1035 . ${DIGIT}+
1036 . ___{DIGIT}+
1037 . __{DIGIT}+.
c90092fe 1038
29480c32
JB
1039 These are suffixes introduced by the compiler for entities such as
1040 nested subprogram for instance, in order to avoid name clashes.
1041 They do not serve any purpose for the debugger. */
1042
1043static void
1044ada_remove_trailing_digits (const char *encoded, int *len)
1045{
1046 if (*len > 1 && isdigit (encoded[*len - 1]))
1047 {
1048 int i = *len - 2;
5b4ee69b 1049
29480c32
JB
1050 while (i > 0 && isdigit (encoded[i]))
1051 i--;
1052 if (i >= 0 && encoded[i] == '.')
1053 *len = i;
1054 else if (i >= 0 && encoded[i] == '$')
1055 *len = i;
61012eef 1056 else if (i >= 2 && startswith (encoded + i - 2, "___"))
29480c32 1057 *len = i - 2;
61012eef 1058 else if (i >= 1 && startswith (encoded + i - 1, "__"))
29480c32
JB
1059 *len = i - 1;
1060 }
1061}
1062
1063/* Remove the suffix introduced by the compiler for protected object
1064 subprograms. */
1065
1066static void
1067ada_remove_po_subprogram_suffix (const char *encoded, int *len)
1068{
1069 /* Remove trailing N. */
1070
1071 /* Protected entry subprograms are broken into two
1072 separate subprograms: The first one is unprotected, and has
1073 a 'N' suffix; the second is the protected version, and has
0963b4bd 1074 the 'P' suffix. The second calls the first one after handling
29480c32
JB
1075 the protection. Since the P subprograms are internally generated,
1076 we leave these names undecoded, giving the user a clue that this
1077 entity is internal. */
1078
1079 if (*len > 1
1080 && encoded[*len - 1] == 'N'
1081 && (isdigit (encoded[*len - 2]) || islower (encoded[*len - 2])))
1082 *len = *len - 1;
1083}
1084
1085/* If ENCODED follows the GNAT entity encoding conventions, then return
1086 the decoded form of ENCODED. Otherwise, return "<%s>" where "%s" is
f945dedf 1087 replaced by ENCODED. */
14f9c5c9 1088
f945dedf 1089std::string
4c4b4cd2 1090ada_decode (const char *encoded)
14f9c5c9
AS
1091{
1092 int i, j;
1093 int len0;
d2e4a39e 1094 const char *p;
14f9c5c9 1095 int at_start_name;
f945dedf 1096 std::string decoded;
d2e4a39e 1097
0d81f350
JG
1098 /* With function descriptors on PPC64, the value of a symbol named
1099 ".FN", if it exists, is the entry point of the function "FN". */
1100 if (encoded[0] == '.')
1101 encoded += 1;
1102
29480c32
JB
1103 /* The name of the Ada main procedure starts with "_ada_".
1104 This prefix is not part of the decoded name, so skip this part
1105 if we see this prefix. */
61012eef 1106 if (startswith (encoded, "_ada_"))
4c4b4cd2 1107 encoded += 5;
14f9c5c9 1108
29480c32
JB
1109 /* If the name starts with '_', then it is not a properly encoded
1110 name, so do not attempt to decode it. Similarly, if the name
1111 starts with '<', the name should not be decoded. */
4c4b4cd2 1112 if (encoded[0] == '_' || encoded[0] == '<')
14f9c5c9
AS
1113 goto Suppress;
1114
4c4b4cd2 1115 len0 = strlen (encoded);
4c4b4cd2 1116
29480c32
JB
1117 ada_remove_trailing_digits (encoded, &len0);
1118 ada_remove_po_subprogram_suffix (encoded, &len0);
529cad9c 1119
4c4b4cd2
PH
1120 /* Remove the ___X.* suffix if present. Do not forget to verify that
1121 the suffix is located before the current "end" of ENCODED. We want
1122 to avoid re-matching parts of ENCODED that have previously been
1123 marked as discarded (by decrementing LEN0). */
1124 p = strstr (encoded, "___");
1125 if (p != NULL && p - encoded < len0 - 3)
14f9c5c9
AS
1126 {
1127 if (p[3] == 'X')
4c4b4cd2 1128 len0 = p - encoded;
14f9c5c9 1129 else
4c4b4cd2 1130 goto Suppress;
14f9c5c9 1131 }
4c4b4cd2 1132
29480c32
JB
1133 /* Remove any trailing TKB suffix. It tells us that this symbol
1134 is for the body of a task, but that information does not actually
1135 appear in the decoded name. */
1136
61012eef 1137 if (len0 > 3 && startswith (encoded + len0 - 3, "TKB"))
14f9c5c9 1138 len0 -= 3;
76a01679 1139
a10967fa
JB
1140 /* Remove any trailing TB suffix. The TB suffix is slightly different
1141 from the TKB suffix because it is used for non-anonymous task
1142 bodies. */
1143
61012eef 1144 if (len0 > 2 && startswith (encoded + len0 - 2, "TB"))
a10967fa
JB
1145 len0 -= 2;
1146
29480c32
JB
1147 /* Remove trailing "B" suffixes. */
1148 /* FIXME: brobecker/2006-04-19: Not sure what this are used for... */
1149
61012eef 1150 if (len0 > 1 && startswith (encoded + len0 - 1, "B"))
14f9c5c9
AS
1151 len0 -= 1;
1152
4c4b4cd2 1153 /* Make decoded big enough for possible expansion by operator name. */
29480c32 1154
f945dedf 1155 decoded.resize (2 * len0 + 1, 'X');
14f9c5c9 1156
29480c32
JB
1157 /* Remove trailing __{digit}+ or trailing ${digit}+. */
1158
4c4b4cd2 1159 if (len0 > 1 && isdigit (encoded[len0 - 1]))
d2e4a39e 1160 {
4c4b4cd2
PH
1161 i = len0 - 2;
1162 while ((i >= 0 && isdigit (encoded[i]))
1163 || (i >= 1 && encoded[i] == '_' && isdigit (encoded[i - 1])))
1164 i -= 1;
1165 if (i > 1 && encoded[i] == '_' && encoded[i - 1] == '_')
1166 len0 = i - 1;
1167 else if (encoded[i] == '$')
1168 len0 = i;
d2e4a39e 1169 }
14f9c5c9 1170
29480c32
JB
1171 /* The first few characters that are not alphabetic are not part
1172 of any encoding we use, so we can copy them over verbatim. */
1173
4c4b4cd2
PH
1174 for (i = 0, j = 0; i < len0 && !isalpha (encoded[i]); i += 1, j += 1)
1175 decoded[j] = encoded[i];
14f9c5c9
AS
1176
1177 at_start_name = 1;
1178 while (i < len0)
1179 {
29480c32 1180 /* Is this a symbol function? */
4c4b4cd2
PH
1181 if (at_start_name && encoded[i] == 'O')
1182 {
1183 int k;
5b4ee69b 1184
4c4b4cd2
PH
1185 for (k = 0; ada_opname_table[k].encoded != NULL; k += 1)
1186 {
1187 int op_len = strlen (ada_opname_table[k].encoded);
06d5cf63
JB
1188 if ((strncmp (ada_opname_table[k].encoded + 1, encoded + i + 1,
1189 op_len - 1) == 0)
1190 && !isalnum (encoded[i + op_len]))
4c4b4cd2 1191 {
f945dedf 1192 strcpy (&decoded.front() + j, ada_opname_table[k].decoded);
4c4b4cd2
PH
1193 at_start_name = 0;
1194 i += op_len;
1195 j += strlen (ada_opname_table[k].decoded);
1196 break;
1197 }
1198 }
1199 if (ada_opname_table[k].encoded != NULL)
1200 continue;
1201 }
14f9c5c9
AS
1202 at_start_name = 0;
1203
529cad9c
PH
1204 /* Replace "TK__" with "__", which will eventually be translated
1205 into "." (just below). */
1206
61012eef 1207 if (i < len0 - 4 && startswith (encoded + i, "TK__"))
4c4b4cd2 1208 i += 2;
529cad9c 1209
29480c32
JB
1210 /* Replace "__B_{DIGITS}+__" sequences by "__", which will eventually
1211 be translated into "." (just below). These are internal names
1212 generated for anonymous blocks inside which our symbol is nested. */
1213
1214 if (len0 - i > 5 && encoded [i] == '_' && encoded [i+1] == '_'
1215 && encoded [i+2] == 'B' && encoded [i+3] == '_'
1216 && isdigit (encoded [i+4]))
1217 {
1218 int k = i + 5;
1219
1220 while (k < len0 && isdigit (encoded[k]))
1221 k++; /* Skip any extra digit. */
1222
1223 /* Double-check that the "__B_{DIGITS}+" sequence we found
1224 is indeed followed by "__". */
1225 if (len0 - k > 2 && encoded [k] == '_' && encoded [k+1] == '_')
1226 i = k;
1227 }
1228
529cad9c
PH
1229 /* Remove _E{DIGITS}+[sb] */
1230
1231 /* Just as for protected object subprograms, there are 2 categories
0963b4bd 1232 of subprograms created by the compiler for each entry. The first
529cad9c
PH
1233 one implements the actual entry code, and has a suffix following
1234 the convention above; the second one implements the barrier and
1235 uses the same convention as above, except that the 'E' is replaced
1236 by a 'B'.
1237
1238 Just as above, we do not decode the name of barrier functions
1239 to give the user a clue that the code he is debugging has been
1240 internally generated. */
1241
1242 if (len0 - i > 3 && encoded [i] == '_' && encoded[i+1] == 'E'
1243 && isdigit (encoded[i+2]))
1244 {
1245 int k = i + 3;
1246
1247 while (k < len0 && isdigit (encoded[k]))
1248 k++;
1249
1250 if (k < len0
1251 && (encoded[k] == 'b' || encoded[k] == 's'))
1252 {
1253 k++;
1254 /* Just as an extra precaution, make sure that if this
1255 suffix is followed by anything else, it is a '_'.
1256 Otherwise, we matched this sequence by accident. */
1257 if (k == len0
1258 || (k < len0 && encoded[k] == '_'))
1259 i = k;
1260 }
1261 }
1262
1263 /* Remove trailing "N" in [a-z0-9]+N__. The N is added by
1264 the GNAT front-end in protected object subprograms. */
1265
1266 if (i < len0 + 3
1267 && encoded[i] == 'N' && encoded[i+1] == '_' && encoded[i+2] == '_')
1268 {
1269 /* Backtrack a bit up until we reach either the begining of
1270 the encoded name, or "__". Make sure that we only find
1271 digits or lowercase characters. */
1272 const char *ptr = encoded + i - 1;
1273
1274 while (ptr >= encoded && is_lower_alphanum (ptr[0]))
1275 ptr--;
1276 if (ptr < encoded
1277 || (ptr > encoded && ptr[0] == '_' && ptr[-1] == '_'))
1278 i++;
1279 }
1280
4c4b4cd2
PH
1281 if (encoded[i] == 'X' && i != 0 && isalnum (encoded[i - 1]))
1282 {
29480c32
JB
1283 /* This is a X[bn]* sequence not separated from the previous
1284 part of the name with a non-alpha-numeric character (in other
1285 words, immediately following an alpha-numeric character), then
1286 verify that it is placed at the end of the encoded name. If
1287 not, then the encoding is not valid and we should abort the
1288 decoding. Otherwise, just skip it, it is used in body-nested
1289 package names. */
4c4b4cd2
PH
1290 do
1291 i += 1;
1292 while (i < len0 && (encoded[i] == 'b' || encoded[i] == 'n'));
1293 if (i < len0)
1294 goto Suppress;
1295 }
cdc7bb92 1296 else if (i < len0 - 2 && encoded[i] == '_' && encoded[i + 1] == '_')
4c4b4cd2 1297 {
29480c32 1298 /* Replace '__' by '.'. */
4c4b4cd2
PH
1299 decoded[j] = '.';
1300 at_start_name = 1;
1301 i += 2;
1302 j += 1;
1303 }
14f9c5c9 1304 else
4c4b4cd2 1305 {
29480c32
JB
1306 /* It's a character part of the decoded name, so just copy it
1307 over. */
4c4b4cd2
PH
1308 decoded[j] = encoded[i];
1309 i += 1;
1310 j += 1;
1311 }
14f9c5c9 1312 }
f945dedf 1313 decoded.resize (j);
14f9c5c9 1314
29480c32
JB
1315 /* Decoded names should never contain any uppercase character.
1316 Double-check this, and abort the decoding if we find one. */
1317
f945dedf 1318 for (i = 0; i < decoded.length(); ++i)
4c4b4cd2 1319 if (isupper (decoded[i]) || decoded[i] == ' ')
14f9c5c9
AS
1320 goto Suppress;
1321
f945dedf 1322 return decoded;
14f9c5c9
AS
1323
1324Suppress:
4c4b4cd2 1325 if (encoded[0] == '<')
f945dedf 1326 decoded = encoded;
14f9c5c9 1327 else
f945dedf 1328 decoded = '<' + std::string(encoded) + '>';
4c4b4cd2
PH
1329 return decoded;
1330
1331}
1332
1333/* Table for keeping permanent unique copies of decoded names. Once
1334 allocated, names in this table are never released. While this is a
1335 storage leak, it should not be significant unless there are massive
1336 changes in the set of decoded names in successive versions of a
1337 symbol table loaded during a single session. */
1338static struct htab *decoded_names_store;
1339
1340/* Returns the decoded name of GSYMBOL, as for ada_decode, caching it
1341 in the language-specific part of GSYMBOL, if it has not been
1342 previously computed. Tries to save the decoded name in the same
1343 obstack as GSYMBOL, if possible, and otherwise on the heap (so that,
1344 in any case, the decoded symbol has a lifetime at least that of
0963b4bd 1345 GSYMBOL).
4c4b4cd2
PH
1346 The GSYMBOL parameter is "mutable" in the C++ sense: logically
1347 const, but nevertheless modified to a semantically equivalent form
0963b4bd 1348 when a decoded name is cached in it. */
4c4b4cd2 1349
45e6c716 1350const char *
f85f34ed 1351ada_decode_symbol (const struct general_symbol_info *arg)
4c4b4cd2 1352{
f85f34ed
TT
1353 struct general_symbol_info *gsymbol = (struct general_symbol_info *) arg;
1354 const char **resultp =
615b3f62 1355 &gsymbol->language_specific.demangled_name;
5b4ee69b 1356
f85f34ed 1357 if (!gsymbol->ada_mangled)
4c4b4cd2 1358 {
4d4eaa30 1359 std::string decoded = ada_decode (gsymbol->linkage_name ());
f85f34ed 1360 struct obstack *obstack = gsymbol->language_specific.obstack;
5b4ee69b 1361
f85f34ed 1362 gsymbol->ada_mangled = 1;
5b4ee69b 1363
f85f34ed 1364 if (obstack != NULL)
f945dedf 1365 *resultp = obstack_strdup (obstack, decoded.c_str ());
f85f34ed 1366 else
76a01679 1367 {
f85f34ed
TT
1368 /* Sometimes, we can't find a corresponding objfile, in
1369 which case, we put the result on the heap. Since we only
1370 decode when needed, we hope this usually does not cause a
1371 significant memory leak (FIXME). */
1372
76a01679 1373 char **slot = (char **) htab_find_slot (decoded_names_store,
f945dedf 1374 decoded.c_str (), INSERT);
5b4ee69b 1375
76a01679 1376 if (*slot == NULL)
f945dedf 1377 *slot = xstrdup (decoded.c_str ());
76a01679
JB
1378 *resultp = *slot;
1379 }
4c4b4cd2 1380 }
14f9c5c9 1381
4c4b4cd2
PH
1382 return *resultp;
1383}
76a01679 1384
2c0b251b 1385static char *
76a01679 1386ada_la_decode (const char *encoded, int options)
4c4b4cd2 1387{
f945dedf 1388 return xstrdup (ada_decode (encoded).c_str ());
14f9c5c9
AS
1389}
1390
8b302db8
TT
1391/* Implement la_sniff_from_mangled_name for Ada. */
1392
1393static int
1394ada_sniff_from_mangled_name (const char *mangled, char **out)
1395{
f945dedf 1396 std::string demangled = ada_decode (mangled);
8b302db8
TT
1397
1398 *out = NULL;
1399
f945dedf 1400 if (demangled != mangled && demangled[0] != '<')
8b302db8
TT
1401 {
1402 /* Set the gsymbol language to Ada, but still return 0.
1403 Two reasons for that:
1404
1405 1. For Ada, we prefer computing the symbol's decoded name
1406 on the fly rather than pre-compute it, in order to save
1407 memory (Ada projects are typically very large).
1408
1409 2. There are some areas in the definition of the GNAT
1410 encoding where, with a bit of bad luck, we might be able
1411 to decode a non-Ada symbol, generating an incorrect
1412 demangled name (Eg: names ending with "TB" for instance
1413 are identified as task bodies and so stripped from
1414 the decoded name returned).
1415
1416 Returning 1, here, but not setting *DEMANGLED, helps us get a
1417 little bit of the best of both worlds. Because we're last,
1418 we should not affect any of the other languages that were
1419 able to demangle the symbol before us; we get to correctly
1420 tag Ada symbols as such; and even if we incorrectly tagged a
1421 non-Ada symbol, which should be rare, any routing through the
1422 Ada language should be transparent (Ada tries to behave much
1423 like C/C++ with non-Ada symbols). */
1424 return 1;
1425 }
1426
1427 return 0;
1428}
1429
14f9c5c9 1430\f
d2e4a39e 1431
4c4b4cd2 1432 /* Arrays */
14f9c5c9 1433
28c85d6c
JB
1434/* Assuming that INDEX_DESC_TYPE is an ___XA structure, a structure
1435 generated by the GNAT compiler to describe the index type used
1436 for each dimension of an array, check whether it follows the latest
1437 known encoding. If not, fix it up to conform to the latest encoding.
1438 Otherwise, do nothing. This function also does nothing if
1439 INDEX_DESC_TYPE is NULL.
1440
85102364 1441 The GNAT encoding used to describe the array index type evolved a bit.
28c85d6c
JB
1442 Initially, the information would be provided through the name of each
1443 field of the structure type only, while the type of these fields was
1444 described as unspecified and irrelevant. The debugger was then expected
1445 to perform a global type lookup using the name of that field in order
1446 to get access to the full index type description. Because these global
1447 lookups can be very expensive, the encoding was later enhanced to make
1448 the global lookup unnecessary by defining the field type as being
1449 the full index type description.
1450
1451 The purpose of this routine is to allow us to support older versions
1452 of the compiler by detecting the use of the older encoding, and by
1453 fixing up the INDEX_DESC_TYPE to follow the new one (at this point,
1454 we essentially replace each field's meaningless type by the associated
1455 index subtype). */
1456
1457void
1458ada_fixup_array_indexes_type (struct type *index_desc_type)
1459{
1460 int i;
1461
1462 if (index_desc_type == NULL)
1463 return;
1464 gdb_assert (TYPE_NFIELDS (index_desc_type) > 0);
1465
1466 /* Check if INDEX_DESC_TYPE follows the older encoding (it is sufficient
1467 to check one field only, no need to check them all). If not, return
1468 now.
1469
1470 If our INDEX_DESC_TYPE was generated using the older encoding,
1471 the field type should be a meaningless integer type whose name
1472 is not equal to the field name. */
1473 if (TYPE_NAME (TYPE_FIELD_TYPE (index_desc_type, 0)) != NULL
1474 && strcmp (TYPE_NAME (TYPE_FIELD_TYPE (index_desc_type, 0)),
1475 TYPE_FIELD_NAME (index_desc_type, 0)) == 0)
1476 return;
1477
1478 /* Fixup each field of INDEX_DESC_TYPE. */
1479 for (i = 0; i < TYPE_NFIELDS (index_desc_type); i++)
1480 {
0d5cff50 1481 const char *name = TYPE_FIELD_NAME (index_desc_type, i);
28c85d6c
JB
1482 struct type *raw_type = ada_check_typedef (ada_find_any_type (name));
1483
1484 if (raw_type)
1485 TYPE_FIELD_TYPE (index_desc_type, i) = raw_type;
1486 }
1487}
1488
4c4b4cd2 1489/* Names of MAX_ADA_DIMENS bounds in P_BOUNDS fields of array descriptors. */
14f9c5c9 1490
a121b7c1 1491static const char *bound_name[] = {
d2e4a39e 1492 "LB0", "UB0", "LB1", "UB1", "LB2", "UB2", "LB3", "UB3",
14f9c5c9
AS
1493 "LB4", "UB4", "LB5", "UB5", "LB6", "UB6", "LB7", "UB7"
1494};
1495
1496/* Maximum number of array dimensions we are prepared to handle. */
1497
4c4b4cd2 1498#define MAX_ADA_DIMENS (sizeof(bound_name) / (2*sizeof(char *)))
14f9c5c9 1499
14f9c5c9 1500
4c4b4cd2
PH
1501/* The desc_* routines return primitive portions of array descriptors
1502 (fat pointers). */
14f9c5c9
AS
1503
1504/* The descriptor or array type, if any, indicated by TYPE; removes
4c4b4cd2
PH
1505 level of indirection, if needed. */
1506
d2e4a39e
AS
1507static struct type *
1508desc_base_type (struct type *type)
14f9c5c9
AS
1509{
1510 if (type == NULL)
1511 return NULL;
61ee279c 1512 type = ada_check_typedef (type);
720d1a40
JB
1513 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF)
1514 type = ada_typedef_target_type (type);
1515
1265e4aa
JB
1516 if (type != NULL
1517 && (TYPE_CODE (type) == TYPE_CODE_PTR
1518 || TYPE_CODE (type) == TYPE_CODE_REF))
61ee279c 1519 return ada_check_typedef (TYPE_TARGET_TYPE (type));
14f9c5c9
AS
1520 else
1521 return type;
1522}
1523
4c4b4cd2
PH
1524/* True iff TYPE indicates a "thin" array pointer type. */
1525
14f9c5c9 1526static int
d2e4a39e 1527is_thin_pntr (struct type *type)
14f9c5c9 1528{
d2e4a39e 1529 return
14f9c5c9
AS
1530 is_suffix (ada_type_name (desc_base_type (type)), "___XUT")
1531 || is_suffix (ada_type_name (desc_base_type (type)), "___XUT___XVE");
1532}
1533
4c4b4cd2
PH
1534/* The descriptor type for thin pointer type TYPE. */
1535
d2e4a39e
AS
1536static struct type *
1537thin_descriptor_type (struct type *type)
14f9c5c9 1538{
d2e4a39e 1539 struct type *base_type = desc_base_type (type);
5b4ee69b 1540
14f9c5c9
AS
1541 if (base_type == NULL)
1542 return NULL;
1543 if (is_suffix (ada_type_name (base_type), "___XVE"))
1544 return base_type;
d2e4a39e 1545 else
14f9c5c9 1546 {
d2e4a39e 1547 struct type *alt_type = ada_find_parallel_type (base_type, "___XVE");
5b4ee69b 1548
14f9c5c9 1549 if (alt_type == NULL)
4c4b4cd2 1550 return base_type;
14f9c5c9 1551 else
4c4b4cd2 1552 return alt_type;
14f9c5c9
AS
1553 }
1554}
1555
4c4b4cd2
PH
1556/* A pointer to the array data for thin-pointer value VAL. */
1557
d2e4a39e
AS
1558static struct value *
1559thin_data_pntr (struct value *val)
14f9c5c9 1560{
828292f2 1561 struct type *type = ada_check_typedef (value_type (val));
556bdfd4 1562 struct type *data_type = desc_data_target_type (thin_descriptor_type (type));
5b4ee69b 1563
556bdfd4
UW
1564 data_type = lookup_pointer_type (data_type);
1565
14f9c5c9 1566 if (TYPE_CODE (type) == TYPE_CODE_PTR)
556bdfd4 1567 return value_cast (data_type, value_copy (val));
d2e4a39e 1568 else
42ae5230 1569 return value_from_longest (data_type, value_address (val));
14f9c5c9
AS
1570}
1571
4c4b4cd2
PH
1572/* True iff TYPE indicates a "thick" array pointer type. */
1573
14f9c5c9 1574static int
d2e4a39e 1575is_thick_pntr (struct type *type)
14f9c5c9
AS
1576{
1577 type = desc_base_type (type);
1578 return (type != NULL && TYPE_CODE (type) == TYPE_CODE_STRUCT
4c4b4cd2 1579 && lookup_struct_elt_type (type, "P_BOUNDS", 1) != NULL);
14f9c5c9
AS
1580}
1581
4c4b4cd2
PH
1582/* If TYPE is the type of an array descriptor (fat or thin pointer) or a
1583 pointer to one, the type of its bounds data; otherwise, NULL. */
76a01679 1584
d2e4a39e
AS
1585static struct type *
1586desc_bounds_type (struct type *type)
14f9c5c9 1587{
d2e4a39e 1588 struct type *r;
14f9c5c9
AS
1589
1590 type = desc_base_type (type);
1591
1592 if (type == NULL)
1593 return NULL;
1594 else if (is_thin_pntr (type))
1595 {
1596 type = thin_descriptor_type (type);
1597 if (type == NULL)
4c4b4cd2 1598 return NULL;
14f9c5c9
AS
1599 r = lookup_struct_elt_type (type, "BOUNDS", 1);
1600 if (r != NULL)
61ee279c 1601 return ada_check_typedef (r);
14f9c5c9
AS
1602 }
1603 else if (TYPE_CODE (type) == TYPE_CODE_STRUCT)
1604 {
1605 r = lookup_struct_elt_type (type, "P_BOUNDS", 1);
1606 if (r != NULL)
61ee279c 1607 return ada_check_typedef (TYPE_TARGET_TYPE (ada_check_typedef (r)));
14f9c5c9
AS
1608 }
1609 return NULL;
1610}
1611
1612/* If ARR is an array descriptor (fat or thin pointer), or pointer to
4c4b4cd2
PH
1613 one, a pointer to its bounds data. Otherwise NULL. */
1614
d2e4a39e
AS
1615static struct value *
1616desc_bounds (struct value *arr)
14f9c5c9 1617{
df407dfe 1618 struct type *type = ada_check_typedef (value_type (arr));
5b4ee69b 1619
d2e4a39e 1620 if (is_thin_pntr (type))
14f9c5c9 1621 {
d2e4a39e 1622 struct type *bounds_type =
4c4b4cd2 1623 desc_bounds_type (thin_descriptor_type (type));
14f9c5c9
AS
1624 LONGEST addr;
1625
4cdfadb1 1626 if (bounds_type == NULL)
323e0a4a 1627 error (_("Bad GNAT array descriptor"));
14f9c5c9
AS
1628
1629 /* NOTE: The following calculation is not really kosher, but
d2e4a39e 1630 since desc_type is an XVE-encoded type (and shouldn't be),
4c4b4cd2 1631 the correct calculation is a real pain. FIXME (and fix GCC). */
14f9c5c9 1632 if (TYPE_CODE (type) == TYPE_CODE_PTR)
4c4b4cd2 1633 addr = value_as_long (arr);
d2e4a39e 1634 else
42ae5230 1635 addr = value_address (arr);
14f9c5c9 1636
d2e4a39e 1637 return
4c4b4cd2
PH
1638 value_from_longest (lookup_pointer_type (bounds_type),
1639 addr - TYPE_LENGTH (bounds_type));
14f9c5c9
AS
1640 }
1641
1642 else if (is_thick_pntr (type))
05e522ef
JB
1643 {
1644 struct value *p_bounds = value_struct_elt (&arr, NULL, "P_BOUNDS", NULL,
1645 _("Bad GNAT array descriptor"));
1646 struct type *p_bounds_type = value_type (p_bounds);
1647
1648 if (p_bounds_type
1649 && TYPE_CODE (p_bounds_type) == TYPE_CODE_PTR)
1650 {
1651 struct type *target_type = TYPE_TARGET_TYPE (p_bounds_type);
1652
1653 if (TYPE_STUB (target_type))
1654 p_bounds = value_cast (lookup_pointer_type
1655 (ada_check_typedef (target_type)),
1656 p_bounds);
1657 }
1658 else
1659 error (_("Bad GNAT array descriptor"));
1660
1661 return p_bounds;
1662 }
14f9c5c9
AS
1663 else
1664 return NULL;
1665}
1666
4c4b4cd2
PH
1667/* If TYPE is the type of an array-descriptor (fat pointer), the bit
1668 position of the field containing the address of the bounds data. */
1669
14f9c5c9 1670static int
d2e4a39e 1671fat_pntr_bounds_bitpos (struct type *type)
14f9c5c9
AS
1672{
1673 return TYPE_FIELD_BITPOS (desc_base_type (type), 1);
1674}
1675
1676/* If TYPE is the type of an array-descriptor (fat pointer), the bit
4c4b4cd2
PH
1677 size of the field containing the address of the bounds data. */
1678
14f9c5c9 1679static int
d2e4a39e 1680fat_pntr_bounds_bitsize (struct type *type)
14f9c5c9
AS
1681{
1682 type = desc_base_type (type);
1683
d2e4a39e 1684 if (TYPE_FIELD_BITSIZE (type, 1) > 0)
14f9c5c9
AS
1685 return TYPE_FIELD_BITSIZE (type, 1);
1686 else
61ee279c 1687 return 8 * TYPE_LENGTH (ada_check_typedef (TYPE_FIELD_TYPE (type, 1)));
14f9c5c9
AS
1688}
1689
4c4b4cd2 1690/* If TYPE is the type of an array descriptor (fat or thin pointer) or a
556bdfd4
UW
1691 pointer to one, the type of its array data (a array-with-no-bounds type);
1692 otherwise, NULL. Use ada_type_of_array to get an array type with bounds
1693 data. */
4c4b4cd2 1694
d2e4a39e 1695static struct type *
556bdfd4 1696desc_data_target_type (struct type *type)
14f9c5c9
AS
1697{
1698 type = desc_base_type (type);
1699
4c4b4cd2 1700 /* NOTE: The following is bogus; see comment in desc_bounds. */
14f9c5c9 1701 if (is_thin_pntr (type))
556bdfd4 1702 return desc_base_type (TYPE_FIELD_TYPE (thin_descriptor_type (type), 1));
14f9c5c9 1703 else if (is_thick_pntr (type))
556bdfd4
UW
1704 {
1705 struct type *data_type = lookup_struct_elt_type (type, "P_ARRAY", 1);
1706
1707 if (data_type
1708 && TYPE_CODE (ada_check_typedef (data_type)) == TYPE_CODE_PTR)
05e522ef 1709 return ada_check_typedef (TYPE_TARGET_TYPE (data_type));
556bdfd4
UW
1710 }
1711
1712 return NULL;
14f9c5c9
AS
1713}
1714
1715/* If ARR is an array descriptor (fat or thin pointer), a pointer to
1716 its array data. */
4c4b4cd2 1717
d2e4a39e
AS
1718static struct value *
1719desc_data (struct value *arr)
14f9c5c9 1720{
df407dfe 1721 struct type *type = value_type (arr);
5b4ee69b 1722
14f9c5c9
AS
1723 if (is_thin_pntr (type))
1724 return thin_data_pntr (arr);
1725 else if (is_thick_pntr (type))
d2e4a39e 1726 return value_struct_elt (&arr, NULL, "P_ARRAY", NULL,
323e0a4a 1727 _("Bad GNAT array descriptor"));
14f9c5c9
AS
1728 else
1729 return NULL;
1730}
1731
1732
1733/* If TYPE is the type of an array-descriptor (fat pointer), the bit
4c4b4cd2
PH
1734 position of the field containing the address of the data. */
1735
14f9c5c9 1736static int
d2e4a39e 1737fat_pntr_data_bitpos (struct type *type)
14f9c5c9
AS
1738{
1739 return TYPE_FIELD_BITPOS (desc_base_type (type), 0);
1740}
1741
1742/* If TYPE is the type of an array-descriptor (fat pointer), the bit
4c4b4cd2
PH
1743 size of the field containing the address of the data. */
1744
14f9c5c9 1745static int
d2e4a39e 1746fat_pntr_data_bitsize (struct type *type)
14f9c5c9
AS
1747{
1748 type = desc_base_type (type);
1749
1750 if (TYPE_FIELD_BITSIZE (type, 0) > 0)
1751 return TYPE_FIELD_BITSIZE (type, 0);
d2e4a39e 1752 else
14f9c5c9
AS
1753 return TARGET_CHAR_BIT * TYPE_LENGTH (TYPE_FIELD_TYPE (type, 0));
1754}
1755
4c4b4cd2 1756/* If BOUNDS is an array-bounds structure (or pointer to one), return
14f9c5c9 1757 the Ith lower bound stored in it, if WHICH is 0, and the Ith upper
4c4b4cd2
PH
1758 bound, if WHICH is 1. The first bound is I=1. */
1759
d2e4a39e
AS
1760static struct value *
1761desc_one_bound (struct value *bounds, int i, int which)
14f9c5c9 1762{
d2e4a39e 1763 return value_struct_elt (&bounds, NULL, bound_name[2 * i + which - 2], NULL,
323e0a4a 1764 _("Bad GNAT array descriptor bounds"));
14f9c5c9
AS
1765}
1766
1767/* If BOUNDS is an array-bounds structure type, return the bit position
1768 of the Ith lower bound stored in it, if WHICH is 0, and the Ith upper
4c4b4cd2
PH
1769 bound, if WHICH is 1. The first bound is I=1. */
1770
14f9c5c9 1771static int
d2e4a39e 1772desc_bound_bitpos (struct type *type, int i, int which)
14f9c5c9 1773{
d2e4a39e 1774 return TYPE_FIELD_BITPOS (desc_base_type (type), 2 * i + which - 2);
14f9c5c9
AS
1775}
1776
1777/* If BOUNDS is an array-bounds structure type, return the bit field size
1778 of the Ith lower bound stored in it, if WHICH is 0, and the Ith upper
4c4b4cd2
PH
1779 bound, if WHICH is 1. The first bound is I=1. */
1780
76a01679 1781static int
d2e4a39e 1782desc_bound_bitsize (struct type *type, int i, int which)
14f9c5c9
AS
1783{
1784 type = desc_base_type (type);
1785
d2e4a39e
AS
1786 if (TYPE_FIELD_BITSIZE (type, 2 * i + which - 2) > 0)
1787 return TYPE_FIELD_BITSIZE (type, 2 * i + which - 2);
1788 else
1789 return 8 * TYPE_LENGTH (TYPE_FIELD_TYPE (type, 2 * i + which - 2));
14f9c5c9
AS
1790}
1791
1792/* If TYPE is the type of an array-bounds structure, the type of its
4c4b4cd2
PH
1793 Ith bound (numbering from 1). Otherwise, NULL. */
1794
d2e4a39e
AS
1795static struct type *
1796desc_index_type (struct type *type, int i)
14f9c5c9
AS
1797{
1798 type = desc_base_type (type);
1799
1800 if (TYPE_CODE (type) == TYPE_CODE_STRUCT)
d2e4a39e
AS
1801 return lookup_struct_elt_type (type, bound_name[2 * i - 2], 1);
1802 else
14f9c5c9
AS
1803 return NULL;
1804}
1805
4c4b4cd2
PH
1806/* The number of index positions in the array-bounds type TYPE.
1807 Return 0 if TYPE is NULL. */
1808
14f9c5c9 1809static int
d2e4a39e 1810desc_arity (struct type *type)
14f9c5c9
AS
1811{
1812 type = desc_base_type (type);
1813
1814 if (type != NULL)
1815 return TYPE_NFIELDS (type) / 2;
1816 return 0;
1817}
1818
4c4b4cd2
PH
1819/* Non-zero iff TYPE is a simple array type (not a pointer to one) or
1820 an array descriptor type (representing an unconstrained array
1821 type). */
1822
76a01679
JB
1823static int
1824ada_is_direct_array_type (struct type *type)
4c4b4cd2
PH
1825{
1826 if (type == NULL)
1827 return 0;
61ee279c 1828 type = ada_check_typedef (type);
4c4b4cd2 1829 return (TYPE_CODE (type) == TYPE_CODE_ARRAY
76a01679 1830 || ada_is_array_descriptor_type (type));
4c4b4cd2
PH
1831}
1832
52ce6436 1833/* Non-zero iff TYPE represents any kind of array in Ada, or a pointer
0963b4bd 1834 * to one. */
52ce6436 1835
2c0b251b 1836static int
52ce6436
PH
1837ada_is_array_type (struct type *type)
1838{
1839 while (type != NULL
1840 && (TYPE_CODE (type) == TYPE_CODE_PTR
1841 || TYPE_CODE (type) == TYPE_CODE_REF))
1842 type = TYPE_TARGET_TYPE (type);
1843 return ada_is_direct_array_type (type);
1844}
1845
4c4b4cd2 1846/* Non-zero iff TYPE is a simple array type or pointer to one. */
14f9c5c9 1847
14f9c5c9 1848int
4c4b4cd2 1849ada_is_simple_array_type (struct type *type)
14f9c5c9
AS
1850{
1851 if (type == NULL)
1852 return 0;
61ee279c 1853 type = ada_check_typedef (type);
14f9c5c9 1854 return (TYPE_CODE (type) == TYPE_CODE_ARRAY
4c4b4cd2 1855 || (TYPE_CODE (type) == TYPE_CODE_PTR
b0dd7688
JB
1856 && TYPE_CODE (ada_check_typedef (TYPE_TARGET_TYPE (type)))
1857 == TYPE_CODE_ARRAY));
14f9c5c9
AS
1858}
1859
4c4b4cd2
PH
1860/* Non-zero iff TYPE belongs to a GNAT array descriptor. */
1861
14f9c5c9 1862int
4c4b4cd2 1863ada_is_array_descriptor_type (struct type *type)
14f9c5c9 1864{
556bdfd4 1865 struct type *data_type = desc_data_target_type (type);
14f9c5c9
AS
1866
1867 if (type == NULL)
1868 return 0;
61ee279c 1869 type = ada_check_typedef (type);
556bdfd4
UW
1870 return (data_type != NULL
1871 && TYPE_CODE (data_type) == TYPE_CODE_ARRAY
1872 && desc_arity (desc_bounds_type (type)) > 0);
14f9c5c9
AS
1873}
1874
1875/* Non-zero iff type is a partially mal-formed GNAT array
4c4b4cd2 1876 descriptor. FIXME: This is to compensate for some problems with
14f9c5c9 1877 debugging output from GNAT. Re-examine periodically to see if it
4c4b4cd2
PH
1878 is still needed. */
1879
14f9c5c9 1880int
ebf56fd3 1881ada_is_bogus_array_descriptor (struct type *type)
14f9c5c9 1882{
d2e4a39e 1883 return
14f9c5c9
AS
1884 type != NULL
1885 && TYPE_CODE (type) == TYPE_CODE_STRUCT
1886 && (lookup_struct_elt_type (type, "P_BOUNDS", 1) != NULL
4c4b4cd2
PH
1887 || lookup_struct_elt_type (type, "P_ARRAY", 1) != NULL)
1888 && !ada_is_array_descriptor_type (type);
14f9c5c9
AS
1889}
1890
1891
4c4b4cd2 1892/* If ARR has a record type in the form of a standard GNAT array descriptor,
14f9c5c9 1893 (fat pointer) returns the type of the array data described---specifically,
4c4b4cd2 1894 a pointer-to-array type. If BOUNDS is non-zero, the bounds data are filled
14f9c5c9 1895 in from the descriptor; otherwise, they are left unspecified. If
4c4b4cd2
PH
1896 the ARR denotes a null array descriptor and BOUNDS is non-zero,
1897 returns NULL. The result is simply the type of ARR if ARR is not
14f9c5c9 1898 a descriptor. */
de93309a
SM
1899
1900static struct type *
d2e4a39e 1901ada_type_of_array (struct value *arr, int bounds)
14f9c5c9 1902{
ad82864c
JB
1903 if (ada_is_constrained_packed_array_type (value_type (arr)))
1904 return decode_constrained_packed_array_type (value_type (arr));
14f9c5c9 1905
df407dfe
AC
1906 if (!ada_is_array_descriptor_type (value_type (arr)))
1907 return value_type (arr);
d2e4a39e
AS
1908
1909 if (!bounds)
ad82864c
JB
1910 {
1911 struct type *array_type =
1912 ada_check_typedef (desc_data_target_type (value_type (arr)));
1913
1914 if (ada_is_unconstrained_packed_array_type (value_type (arr)))
1915 TYPE_FIELD_BITSIZE (array_type, 0) =
1916 decode_packed_array_bitsize (value_type (arr));
1917
1918 return array_type;
1919 }
14f9c5c9
AS
1920 else
1921 {
d2e4a39e 1922 struct type *elt_type;
14f9c5c9 1923 int arity;
d2e4a39e 1924 struct value *descriptor;
14f9c5c9 1925
df407dfe
AC
1926 elt_type = ada_array_element_type (value_type (arr), -1);
1927 arity = ada_array_arity (value_type (arr));
14f9c5c9 1928
d2e4a39e 1929 if (elt_type == NULL || arity == 0)
df407dfe 1930 return ada_check_typedef (value_type (arr));
14f9c5c9
AS
1931
1932 descriptor = desc_bounds (arr);
d2e4a39e 1933 if (value_as_long (descriptor) == 0)
4c4b4cd2 1934 return NULL;
d2e4a39e 1935 while (arity > 0)
4c4b4cd2 1936 {
e9bb382b
UW
1937 struct type *range_type = alloc_type_copy (value_type (arr));
1938 struct type *array_type = alloc_type_copy (value_type (arr));
4c4b4cd2
PH
1939 struct value *low = desc_one_bound (descriptor, arity, 0);
1940 struct value *high = desc_one_bound (descriptor, arity, 1);
4c4b4cd2 1941
5b4ee69b 1942 arity -= 1;
0c9c3474
SA
1943 create_static_range_type (range_type, value_type (low),
1944 longest_to_int (value_as_long (low)),
1945 longest_to_int (value_as_long (high)));
4c4b4cd2 1946 elt_type = create_array_type (array_type, elt_type, range_type);
ad82864c
JB
1947
1948 if (ada_is_unconstrained_packed_array_type (value_type (arr)))
e67ad678
JB
1949 {
1950 /* We need to store the element packed bitsize, as well as
1951 recompute the array size, because it was previously
1952 computed based on the unpacked element size. */
1953 LONGEST lo = value_as_long (low);
1954 LONGEST hi = value_as_long (high);
1955
1956 TYPE_FIELD_BITSIZE (elt_type, 0) =
1957 decode_packed_array_bitsize (value_type (arr));
1958 /* If the array has no element, then the size is already
1959 zero, and does not need to be recomputed. */
1960 if (lo < hi)
1961 {
1962 int array_bitsize =
1963 (hi - lo + 1) * TYPE_FIELD_BITSIZE (elt_type, 0);
1964
1965 TYPE_LENGTH (array_type) = (array_bitsize + 7) / 8;
1966 }
1967 }
4c4b4cd2 1968 }
14f9c5c9
AS
1969
1970 return lookup_pointer_type (elt_type);
1971 }
1972}
1973
1974/* If ARR does not represent an array, returns ARR unchanged.
4c4b4cd2
PH
1975 Otherwise, returns either a standard GDB array with bounds set
1976 appropriately or, if ARR is a non-null fat pointer, a pointer to a standard
1977 GDB array. Returns NULL if ARR is a null fat pointer. */
1978
d2e4a39e
AS
1979struct value *
1980ada_coerce_to_simple_array_ptr (struct value *arr)
14f9c5c9 1981{
df407dfe 1982 if (ada_is_array_descriptor_type (value_type (arr)))
14f9c5c9 1983 {
d2e4a39e 1984 struct type *arrType = ada_type_of_array (arr, 1);
5b4ee69b 1985
14f9c5c9 1986 if (arrType == NULL)
4c4b4cd2 1987 return NULL;
14f9c5c9
AS
1988 return value_cast (arrType, value_copy (desc_data (arr)));
1989 }
ad82864c
JB
1990 else if (ada_is_constrained_packed_array_type (value_type (arr)))
1991 return decode_constrained_packed_array (arr);
14f9c5c9
AS
1992 else
1993 return arr;
1994}
1995
1996/* If ARR does not represent an array, returns ARR unchanged.
1997 Otherwise, returns a standard GDB array describing ARR (which may
4c4b4cd2
PH
1998 be ARR itself if it already is in the proper form). */
1999
720d1a40 2000struct value *
d2e4a39e 2001ada_coerce_to_simple_array (struct value *arr)
14f9c5c9 2002{
df407dfe 2003 if (ada_is_array_descriptor_type (value_type (arr)))
14f9c5c9 2004 {
d2e4a39e 2005 struct value *arrVal = ada_coerce_to_simple_array_ptr (arr);
5b4ee69b 2006
14f9c5c9 2007 if (arrVal == NULL)
323e0a4a 2008 error (_("Bounds unavailable for null array pointer."));
c1b5a1a6 2009 ada_ensure_varsize_limit (TYPE_TARGET_TYPE (value_type (arrVal)));
14f9c5c9
AS
2010 return value_ind (arrVal);
2011 }
ad82864c
JB
2012 else if (ada_is_constrained_packed_array_type (value_type (arr)))
2013 return decode_constrained_packed_array (arr);
d2e4a39e 2014 else
14f9c5c9
AS
2015 return arr;
2016}
2017
2018/* If TYPE represents a GNAT array type, return it translated to an
2019 ordinary GDB array type (possibly with BITSIZE fields indicating
4c4b4cd2
PH
2020 packing). For other types, is the identity. */
2021
d2e4a39e
AS
2022struct type *
2023ada_coerce_to_simple_array_type (struct type *type)
14f9c5c9 2024{
ad82864c
JB
2025 if (ada_is_constrained_packed_array_type (type))
2026 return decode_constrained_packed_array_type (type);
17280b9f
UW
2027
2028 if (ada_is_array_descriptor_type (type))
556bdfd4 2029 return ada_check_typedef (desc_data_target_type (type));
17280b9f
UW
2030
2031 return type;
14f9c5c9
AS
2032}
2033
4c4b4cd2
PH
2034/* Non-zero iff TYPE represents a standard GNAT packed-array type. */
2035
ad82864c
JB
2036static int
2037ada_is_packed_array_type (struct type *type)
14f9c5c9
AS
2038{
2039 if (type == NULL)
2040 return 0;
4c4b4cd2 2041 type = desc_base_type (type);
61ee279c 2042 type = ada_check_typedef (type);
d2e4a39e 2043 return
14f9c5c9
AS
2044 ada_type_name (type) != NULL
2045 && strstr (ada_type_name (type), "___XP") != NULL;
2046}
2047
ad82864c
JB
2048/* Non-zero iff TYPE represents a standard GNAT constrained
2049 packed-array type. */
2050
2051int
2052ada_is_constrained_packed_array_type (struct type *type)
2053{
2054 return ada_is_packed_array_type (type)
2055 && !ada_is_array_descriptor_type (type);
2056}
2057
2058/* Non-zero iff TYPE represents an array descriptor for a
2059 unconstrained packed-array type. */
2060
2061static int
2062ada_is_unconstrained_packed_array_type (struct type *type)
2063{
2064 return ada_is_packed_array_type (type)
2065 && ada_is_array_descriptor_type (type);
2066}
2067
2068/* Given that TYPE encodes a packed array type (constrained or unconstrained),
2069 return the size of its elements in bits. */
2070
2071static long
2072decode_packed_array_bitsize (struct type *type)
2073{
0d5cff50
DE
2074 const char *raw_name;
2075 const char *tail;
ad82864c
JB
2076 long bits;
2077
720d1a40
JB
2078 /* Access to arrays implemented as fat pointers are encoded as a typedef
2079 of the fat pointer type. We need the name of the fat pointer type
2080 to do the decoding, so strip the typedef layer. */
2081 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF)
2082 type = ada_typedef_target_type (type);
2083
2084 raw_name = ada_type_name (ada_check_typedef (type));
ad82864c
JB
2085 if (!raw_name)
2086 raw_name = ada_type_name (desc_base_type (type));
2087
2088 if (!raw_name)
2089 return 0;
2090
2091 tail = strstr (raw_name, "___XP");
720d1a40 2092 gdb_assert (tail != NULL);
ad82864c
JB
2093
2094 if (sscanf (tail + sizeof ("___XP") - 1, "%ld", &bits) != 1)
2095 {
2096 lim_warning
2097 (_("could not understand bit size information on packed array"));
2098 return 0;
2099 }
2100
2101 return bits;
2102}
2103
14f9c5c9
AS
2104/* Given that TYPE is a standard GDB array type with all bounds filled
2105 in, and that the element size of its ultimate scalar constituents
2106 (that is, either its elements, or, if it is an array of arrays, its
2107 elements' elements, etc.) is *ELT_BITS, return an identical type,
2108 but with the bit sizes of its elements (and those of any
2109 constituent arrays) recorded in the BITSIZE components of its
4c4b4cd2 2110 TYPE_FIELD_BITSIZE values, and with *ELT_BITS set to its total size
4a46959e
JB
2111 in bits.
2112
2113 Note that, for arrays whose index type has an XA encoding where
2114 a bound references a record discriminant, getting that discriminant,
2115 and therefore the actual value of that bound, is not possible
2116 because none of the given parameters gives us access to the record.
2117 This function assumes that it is OK in the context where it is being
2118 used to return an array whose bounds are still dynamic and where
2119 the length is arbitrary. */
4c4b4cd2 2120
d2e4a39e 2121static struct type *
ad82864c 2122constrained_packed_array_type (struct type *type, long *elt_bits)
14f9c5c9 2123{
d2e4a39e
AS
2124 struct type *new_elt_type;
2125 struct type *new_type;
99b1c762
JB
2126 struct type *index_type_desc;
2127 struct type *index_type;
14f9c5c9
AS
2128 LONGEST low_bound, high_bound;
2129
61ee279c 2130 type = ada_check_typedef (type);
14f9c5c9
AS
2131 if (TYPE_CODE (type) != TYPE_CODE_ARRAY)
2132 return type;
2133
99b1c762
JB
2134 index_type_desc = ada_find_parallel_type (type, "___XA");
2135 if (index_type_desc)
2136 index_type = to_fixed_range_type (TYPE_FIELD_TYPE (index_type_desc, 0),
2137 NULL);
2138 else
2139 index_type = TYPE_INDEX_TYPE (type);
2140
e9bb382b 2141 new_type = alloc_type_copy (type);
ad82864c
JB
2142 new_elt_type =
2143 constrained_packed_array_type (ada_check_typedef (TYPE_TARGET_TYPE (type)),
2144 elt_bits);
99b1c762 2145 create_array_type (new_type, new_elt_type, index_type);
14f9c5c9
AS
2146 TYPE_FIELD_BITSIZE (new_type, 0) = *elt_bits;
2147 TYPE_NAME (new_type) = ada_type_name (type);
2148
4a46959e
JB
2149 if ((TYPE_CODE (check_typedef (index_type)) == TYPE_CODE_RANGE
2150 && is_dynamic_type (check_typedef (index_type)))
2151 || get_discrete_bounds (index_type, &low_bound, &high_bound) < 0)
14f9c5c9
AS
2152 low_bound = high_bound = 0;
2153 if (high_bound < low_bound)
2154 *elt_bits = TYPE_LENGTH (new_type) = 0;
d2e4a39e 2155 else
14f9c5c9
AS
2156 {
2157 *elt_bits *= (high_bound - low_bound + 1);
d2e4a39e 2158 TYPE_LENGTH (new_type) =
4c4b4cd2 2159 (*elt_bits + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT;
14f9c5c9
AS
2160 }
2161
876cecd0 2162 TYPE_FIXED_INSTANCE (new_type) = 1;
14f9c5c9
AS
2163 return new_type;
2164}
2165
ad82864c
JB
2166/* The array type encoded by TYPE, where
2167 ada_is_constrained_packed_array_type (TYPE). */
4c4b4cd2 2168
d2e4a39e 2169static struct type *
ad82864c 2170decode_constrained_packed_array_type (struct type *type)
d2e4a39e 2171{
0d5cff50 2172 const char *raw_name = ada_type_name (ada_check_typedef (type));
727e3d2e 2173 char *name;
0d5cff50 2174 const char *tail;
d2e4a39e 2175 struct type *shadow_type;
14f9c5c9 2176 long bits;
14f9c5c9 2177
727e3d2e
JB
2178 if (!raw_name)
2179 raw_name = ada_type_name (desc_base_type (type));
2180
2181 if (!raw_name)
2182 return NULL;
2183
2184 name = (char *) alloca (strlen (raw_name) + 1);
2185 tail = strstr (raw_name, "___XP");
4c4b4cd2
PH
2186 type = desc_base_type (type);
2187
14f9c5c9
AS
2188 memcpy (name, raw_name, tail - raw_name);
2189 name[tail - raw_name] = '\000';
2190
b4ba55a1
JB
2191 shadow_type = ada_find_parallel_type_with_name (type, name);
2192
2193 if (shadow_type == NULL)
14f9c5c9 2194 {
323e0a4a 2195 lim_warning (_("could not find bounds information on packed array"));
14f9c5c9
AS
2196 return NULL;
2197 }
f168693b 2198 shadow_type = check_typedef (shadow_type);
14f9c5c9
AS
2199
2200 if (TYPE_CODE (shadow_type) != TYPE_CODE_ARRAY)
2201 {
0963b4bd
MS
2202 lim_warning (_("could not understand bounds "
2203 "information on packed array"));
14f9c5c9
AS
2204 return NULL;
2205 }
d2e4a39e 2206
ad82864c
JB
2207 bits = decode_packed_array_bitsize (type);
2208 return constrained_packed_array_type (shadow_type, &bits);
14f9c5c9
AS
2209}
2210
ad82864c
JB
2211/* Given that ARR is a struct value *indicating a GNAT constrained packed
2212 array, returns a simple array that denotes that array. Its type is a
14f9c5c9
AS
2213 standard GDB array type except that the BITSIZEs of the array
2214 target types are set to the number of bits in each element, and the
4c4b4cd2 2215 type length is set appropriately. */
14f9c5c9 2216
d2e4a39e 2217static struct value *
ad82864c 2218decode_constrained_packed_array (struct value *arr)
14f9c5c9 2219{
4c4b4cd2 2220 struct type *type;
14f9c5c9 2221
11aa919a
PMR
2222 /* If our value is a pointer, then dereference it. Likewise if
2223 the value is a reference. Make sure that this operation does not
2224 cause the target type to be fixed, as this would indirectly cause
2225 this array to be decoded. The rest of the routine assumes that
2226 the array hasn't been decoded yet, so we use the basic "coerce_ref"
2227 and "value_ind" routines to perform the dereferencing, as opposed
2228 to using "ada_coerce_ref" or "ada_value_ind". */
2229 arr = coerce_ref (arr);
828292f2 2230 if (TYPE_CODE (ada_check_typedef (value_type (arr))) == TYPE_CODE_PTR)
284614f0 2231 arr = value_ind (arr);
4c4b4cd2 2232
ad82864c 2233 type = decode_constrained_packed_array_type (value_type (arr));
14f9c5c9
AS
2234 if (type == NULL)
2235 {
323e0a4a 2236 error (_("can't unpack array"));
14f9c5c9
AS
2237 return NULL;
2238 }
61ee279c 2239
d5a22e77 2240 if (type_byte_order (value_type (arr)) == BFD_ENDIAN_BIG
32c9a795 2241 && ada_is_modular_type (value_type (arr)))
61ee279c
PH
2242 {
2243 /* This is a (right-justified) modular type representing a packed
2244 array with no wrapper. In order to interpret the value through
2245 the (left-justified) packed array type we just built, we must
2246 first left-justify it. */
2247 int bit_size, bit_pos;
2248 ULONGEST mod;
2249
df407dfe 2250 mod = ada_modulus (value_type (arr)) - 1;
61ee279c
PH
2251 bit_size = 0;
2252 while (mod > 0)
2253 {
2254 bit_size += 1;
2255 mod >>= 1;
2256 }
df407dfe 2257 bit_pos = HOST_CHAR_BIT * TYPE_LENGTH (value_type (arr)) - bit_size;
61ee279c
PH
2258 arr = ada_value_primitive_packed_val (arr, NULL,
2259 bit_pos / HOST_CHAR_BIT,
2260 bit_pos % HOST_CHAR_BIT,
2261 bit_size,
2262 type);
2263 }
2264
4c4b4cd2 2265 return coerce_unspec_val_to_type (arr, type);
14f9c5c9
AS
2266}
2267
2268
2269/* The value of the element of packed array ARR at the ARITY indices
4c4b4cd2 2270 given in IND. ARR must be a simple array. */
14f9c5c9 2271
d2e4a39e
AS
2272static struct value *
2273value_subscript_packed (struct value *arr, int arity, struct value **ind)
14f9c5c9
AS
2274{
2275 int i;
2276 int bits, elt_off, bit_off;
2277 long elt_total_bit_offset;
d2e4a39e
AS
2278 struct type *elt_type;
2279 struct value *v;
14f9c5c9
AS
2280
2281 bits = 0;
2282 elt_total_bit_offset = 0;
df407dfe 2283 elt_type = ada_check_typedef (value_type (arr));
d2e4a39e 2284 for (i = 0; i < arity; i += 1)
14f9c5c9 2285 {
d2e4a39e 2286 if (TYPE_CODE (elt_type) != TYPE_CODE_ARRAY
4c4b4cd2
PH
2287 || TYPE_FIELD_BITSIZE (elt_type, 0) == 0)
2288 error
0963b4bd
MS
2289 (_("attempt to do packed indexing of "
2290 "something other than a packed array"));
14f9c5c9 2291 else
4c4b4cd2
PH
2292 {
2293 struct type *range_type = TYPE_INDEX_TYPE (elt_type);
2294 LONGEST lowerbound, upperbound;
2295 LONGEST idx;
2296
2297 if (get_discrete_bounds (range_type, &lowerbound, &upperbound) < 0)
2298 {
323e0a4a 2299 lim_warning (_("don't know bounds of array"));
4c4b4cd2
PH
2300 lowerbound = upperbound = 0;
2301 }
2302
3cb382c9 2303 idx = pos_atr (ind[i]);
4c4b4cd2 2304 if (idx < lowerbound || idx > upperbound)
0963b4bd
MS
2305 lim_warning (_("packed array index %ld out of bounds"),
2306 (long) idx);
4c4b4cd2
PH
2307 bits = TYPE_FIELD_BITSIZE (elt_type, 0);
2308 elt_total_bit_offset += (idx - lowerbound) * bits;
61ee279c 2309 elt_type = ada_check_typedef (TYPE_TARGET_TYPE (elt_type));
4c4b4cd2 2310 }
14f9c5c9
AS
2311 }
2312 elt_off = elt_total_bit_offset / HOST_CHAR_BIT;
2313 bit_off = elt_total_bit_offset % HOST_CHAR_BIT;
d2e4a39e
AS
2314
2315 v = ada_value_primitive_packed_val (arr, NULL, elt_off, bit_off,
4c4b4cd2 2316 bits, elt_type);
14f9c5c9
AS
2317 return v;
2318}
2319
4c4b4cd2 2320/* Non-zero iff TYPE includes negative integer values. */
14f9c5c9
AS
2321
2322static int
d2e4a39e 2323has_negatives (struct type *type)
14f9c5c9 2324{
d2e4a39e
AS
2325 switch (TYPE_CODE (type))
2326 {
2327 default:
2328 return 0;
2329 case TYPE_CODE_INT:
2330 return !TYPE_UNSIGNED (type);
2331 case TYPE_CODE_RANGE:
4e962e74 2332 return TYPE_LOW_BOUND (type) - TYPE_RANGE_DATA (type)->bias < 0;
d2e4a39e 2333 }
14f9c5c9 2334}
d2e4a39e 2335
f93fca70 2336/* With SRC being a buffer containing BIT_SIZE bits of data at BIT_OFFSET,
5b639dea 2337 unpack that data into UNPACKED. UNPACKED_LEN is the size in bytes of
f93fca70 2338 the unpacked buffer.
14f9c5c9 2339
5b639dea
JB
2340 The size of the unpacked buffer (UNPACKED_LEN) is expected to be large
2341 enough to contain at least BIT_OFFSET bits. If not, an error is raised.
2342
f93fca70
JB
2343 IS_BIG_ENDIAN is nonzero if the data is stored in big endian mode,
2344 zero otherwise.
14f9c5c9 2345
f93fca70 2346 IS_SIGNED_TYPE is nonzero if the data corresponds to a signed type.
a1c95e6b 2347
f93fca70
JB
2348 IS_SCALAR is nonzero if the data corresponds to a signed type. */
2349
2350static void
2351ada_unpack_from_contents (const gdb_byte *src, int bit_offset, int bit_size,
2352 gdb_byte *unpacked, int unpacked_len,
2353 int is_big_endian, int is_signed_type,
2354 int is_scalar)
2355{
a1c95e6b
JB
2356 int src_len = (bit_size + bit_offset + HOST_CHAR_BIT - 1) / 8;
2357 int src_idx; /* Index into the source area */
2358 int src_bytes_left; /* Number of source bytes left to process. */
2359 int srcBitsLeft; /* Number of source bits left to move */
2360 int unusedLS; /* Number of bits in next significant
2361 byte of source that are unused */
2362
a1c95e6b
JB
2363 int unpacked_idx; /* Index into the unpacked buffer */
2364 int unpacked_bytes_left; /* Number of bytes left to set in unpacked. */
2365
4c4b4cd2 2366 unsigned long accum; /* Staging area for bits being transferred */
a1c95e6b 2367 int accumSize; /* Number of meaningful bits in accum */
14f9c5c9 2368 unsigned char sign;
a1c95e6b 2369
4c4b4cd2
PH
2370 /* Transmit bytes from least to most significant; delta is the direction
2371 the indices move. */
f93fca70 2372 int delta = is_big_endian ? -1 : 1;
14f9c5c9 2373
5b639dea
JB
2374 /* Make sure that unpacked is large enough to receive the BIT_SIZE
2375 bits from SRC. .*/
2376 if ((bit_size + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT > unpacked_len)
2377 error (_("Cannot unpack %d bits into buffer of %d bytes"),
2378 bit_size, unpacked_len);
2379
14f9c5c9 2380 srcBitsLeft = bit_size;
086ca51f 2381 src_bytes_left = src_len;
f93fca70 2382 unpacked_bytes_left = unpacked_len;
14f9c5c9 2383 sign = 0;
f93fca70
JB
2384
2385 if (is_big_endian)
14f9c5c9 2386 {
086ca51f 2387 src_idx = src_len - 1;
f93fca70
JB
2388 if (is_signed_type
2389 && ((src[0] << bit_offset) & (1 << (HOST_CHAR_BIT - 1))))
4c4b4cd2 2390 sign = ~0;
d2e4a39e
AS
2391
2392 unusedLS =
4c4b4cd2
PH
2393 (HOST_CHAR_BIT - (bit_size + bit_offset) % HOST_CHAR_BIT)
2394 % HOST_CHAR_BIT;
14f9c5c9 2395
f93fca70
JB
2396 if (is_scalar)
2397 {
2398 accumSize = 0;
2399 unpacked_idx = unpacked_len - 1;
2400 }
2401 else
2402 {
4c4b4cd2
PH
2403 /* Non-scalar values must be aligned at a byte boundary... */
2404 accumSize =
2405 (HOST_CHAR_BIT - bit_size % HOST_CHAR_BIT) % HOST_CHAR_BIT;
2406 /* ... And are placed at the beginning (most-significant) bytes
2407 of the target. */
086ca51f
JB
2408 unpacked_idx = (bit_size + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT - 1;
2409 unpacked_bytes_left = unpacked_idx + 1;
f93fca70 2410 }
14f9c5c9 2411 }
d2e4a39e 2412 else
14f9c5c9
AS
2413 {
2414 int sign_bit_offset = (bit_size + bit_offset - 1) % 8;
2415
086ca51f 2416 src_idx = unpacked_idx = 0;
14f9c5c9
AS
2417 unusedLS = bit_offset;
2418 accumSize = 0;
2419
f93fca70 2420 if (is_signed_type && (src[src_len - 1] & (1 << sign_bit_offset)))
4c4b4cd2 2421 sign = ~0;
14f9c5c9 2422 }
d2e4a39e 2423
14f9c5c9 2424 accum = 0;
086ca51f 2425 while (src_bytes_left > 0)
14f9c5c9
AS
2426 {
2427 /* Mask for removing bits of the next source byte that are not
4c4b4cd2 2428 part of the value. */
d2e4a39e 2429 unsigned int unusedMSMask =
4c4b4cd2
PH
2430 (1 << (srcBitsLeft >= HOST_CHAR_BIT ? HOST_CHAR_BIT : srcBitsLeft)) -
2431 1;
2432 /* Sign-extend bits for this byte. */
14f9c5c9 2433 unsigned int signMask = sign & ~unusedMSMask;
5b4ee69b 2434
d2e4a39e 2435 accum |=
086ca51f 2436 (((src[src_idx] >> unusedLS) & unusedMSMask) | signMask) << accumSize;
14f9c5c9 2437 accumSize += HOST_CHAR_BIT - unusedLS;
d2e4a39e 2438 if (accumSize >= HOST_CHAR_BIT)
4c4b4cd2 2439 {
db297a65 2440 unpacked[unpacked_idx] = accum & ~(~0UL << HOST_CHAR_BIT);
4c4b4cd2
PH
2441 accumSize -= HOST_CHAR_BIT;
2442 accum >>= HOST_CHAR_BIT;
086ca51f
JB
2443 unpacked_bytes_left -= 1;
2444 unpacked_idx += delta;
4c4b4cd2 2445 }
14f9c5c9
AS
2446 srcBitsLeft -= HOST_CHAR_BIT - unusedLS;
2447 unusedLS = 0;
086ca51f
JB
2448 src_bytes_left -= 1;
2449 src_idx += delta;
14f9c5c9 2450 }
086ca51f 2451 while (unpacked_bytes_left > 0)
14f9c5c9
AS
2452 {
2453 accum |= sign << accumSize;
db297a65 2454 unpacked[unpacked_idx] = accum & ~(~0UL << HOST_CHAR_BIT);
14f9c5c9 2455 accumSize -= HOST_CHAR_BIT;
9cd4d857
JB
2456 if (accumSize < 0)
2457 accumSize = 0;
14f9c5c9 2458 accum >>= HOST_CHAR_BIT;
086ca51f
JB
2459 unpacked_bytes_left -= 1;
2460 unpacked_idx += delta;
14f9c5c9 2461 }
f93fca70
JB
2462}
2463
2464/* Create a new value of type TYPE from the contents of OBJ starting
2465 at byte OFFSET, and bit offset BIT_OFFSET within that byte,
2466 proceeding for BIT_SIZE bits. If OBJ is an lval in memory, then
2467 assigning through the result will set the field fetched from.
2468 VALADDR is ignored unless OBJ is NULL, in which case,
2469 VALADDR+OFFSET must address the start of storage containing the
2470 packed value. The value returned in this case is never an lval.
2471 Assumes 0 <= BIT_OFFSET < HOST_CHAR_BIT. */
2472
2473struct value *
2474ada_value_primitive_packed_val (struct value *obj, const gdb_byte *valaddr,
2475 long offset, int bit_offset, int bit_size,
2476 struct type *type)
2477{
2478 struct value *v;
bfb1c796 2479 const gdb_byte *src; /* First byte containing data to unpack */
f93fca70 2480 gdb_byte *unpacked;
220475ed 2481 const int is_scalar = is_scalar_type (type);
d5a22e77 2482 const int is_big_endian = type_byte_order (type) == BFD_ENDIAN_BIG;
d5722aa2 2483 gdb::byte_vector staging;
f93fca70
JB
2484
2485 type = ada_check_typedef (type);
2486
d0a9e810 2487 if (obj == NULL)
bfb1c796 2488 src = valaddr + offset;
d0a9e810 2489 else
bfb1c796 2490 src = value_contents (obj) + offset;
d0a9e810
JB
2491
2492 if (is_dynamic_type (type))
2493 {
2494 /* The length of TYPE might by dynamic, so we need to resolve
2495 TYPE in order to know its actual size, which we then use
2496 to create the contents buffer of the value we return.
2497 The difficulty is that the data containing our object is
2498 packed, and therefore maybe not at a byte boundary. So, what
2499 we do, is unpack the data into a byte-aligned buffer, and then
2500 use that buffer as our object's value for resolving the type. */
d5722aa2
PA
2501 int staging_len = (bit_size + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT;
2502 staging.resize (staging_len);
d0a9e810
JB
2503
2504 ada_unpack_from_contents (src, bit_offset, bit_size,
d5722aa2 2505 staging.data (), staging.size (),
d0a9e810
JB
2506 is_big_endian, has_negatives (type),
2507 is_scalar);
b249d2c2 2508 type = resolve_dynamic_type (type, staging, 0);
0cafa88c
JB
2509 if (TYPE_LENGTH (type) < (bit_size + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT)
2510 {
2511 /* This happens when the length of the object is dynamic,
2512 and is actually smaller than the space reserved for it.
2513 For instance, in an array of variant records, the bit_size
2514 we're given is the array stride, which is constant and
2515 normally equal to the maximum size of its element.
2516 But, in reality, each element only actually spans a portion
2517 of that stride. */
2518 bit_size = TYPE_LENGTH (type) * HOST_CHAR_BIT;
2519 }
d0a9e810
JB
2520 }
2521
f93fca70
JB
2522 if (obj == NULL)
2523 {
2524 v = allocate_value (type);
bfb1c796 2525 src = valaddr + offset;
f93fca70
JB
2526 }
2527 else if (VALUE_LVAL (obj) == lval_memory && value_lazy (obj))
2528 {
0cafa88c 2529 int src_len = (bit_size + bit_offset + HOST_CHAR_BIT - 1) / 8;
bfb1c796 2530 gdb_byte *buf;
0cafa88c 2531
f93fca70 2532 v = value_at (type, value_address (obj) + offset);
bfb1c796
PA
2533 buf = (gdb_byte *) alloca (src_len);
2534 read_memory (value_address (v), buf, src_len);
2535 src = buf;
f93fca70
JB
2536 }
2537 else
2538 {
2539 v = allocate_value (type);
bfb1c796 2540 src = value_contents (obj) + offset;
f93fca70
JB
2541 }
2542
2543 if (obj != NULL)
2544 {
2545 long new_offset = offset;
2546
2547 set_value_component_location (v, obj);
2548 set_value_bitpos (v, bit_offset + value_bitpos (obj));
2549 set_value_bitsize (v, bit_size);
2550 if (value_bitpos (v) >= HOST_CHAR_BIT)
2551 {
2552 ++new_offset;
2553 set_value_bitpos (v, value_bitpos (v) - HOST_CHAR_BIT);
2554 }
2555 set_value_offset (v, new_offset);
2556
2557 /* Also set the parent value. This is needed when trying to
2558 assign a new value (in inferior memory). */
2559 set_value_parent (v, obj);
2560 }
2561 else
2562 set_value_bitsize (v, bit_size);
bfb1c796 2563 unpacked = value_contents_writeable (v);
f93fca70
JB
2564
2565 if (bit_size == 0)
2566 {
2567 memset (unpacked, 0, TYPE_LENGTH (type));
2568 return v;
2569 }
2570
d5722aa2 2571 if (staging.size () == TYPE_LENGTH (type))
f93fca70 2572 {
d0a9e810
JB
2573 /* Small short-cut: If we've unpacked the data into a buffer
2574 of the same size as TYPE's length, then we can reuse that,
2575 instead of doing the unpacking again. */
d5722aa2 2576 memcpy (unpacked, staging.data (), staging.size ());
f93fca70 2577 }
d0a9e810
JB
2578 else
2579 ada_unpack_from_contents (src, bit_offset, bit_size,
2580 unpacked, TYPE_LENGTH (type),
2581 is_big_endian, has_negatives (type), is_scalar);
f93fca70 2582
14f9c5c9
AS
2583 return v;
2584}
d2e4a39e 2585
14f9c5c9
AS
2586/* Store the contents of FROMVAL into the location of TOVAL.
2587 Return a new value with the location of TOVAL and contents of
2588 FROMVAL. Handles assignment into packed fields that have
4c4b4cd2 2589 floating-point or non-scalar types. */
14f9c5c9 2590
d2e4a39e
AS
2591static struct value *
2592ada_value_assign (struct value *toval, struct value *fromval)
14f9c5c9 2593{
df407dfe
AC
2594 struct type *type = value_type (toval);
2595 int bits = value_bitsize (toval);
14f9c5c9 2596
52ce6436
PH
2597 toval = ada_coerce_ref (toval);
2598 fromval = ada_coerce_ref (fromval);
2599
2600 if (ada_is_direct_array_type (value_type (toval)))
2601 toval = ada_coerce_to_simple_array (toval);
2602 if (ada_is_direct_array_type (value_type (fromval)))
2603 fromval = ada_coerce_to_simple_array (fromval);
2604
88e3b34b 2605 if (!deprecated_value_modifiable (toval))
323e0a4a 2606 error (_("Left operand of assignment is not a modifiable lvalue."));
14f9c5c9 2607
d2e4a39e 2608 if (VALUE_LVAL (toval) == lval_memory
14f9c5c9 2609 && bits > 0
d2e4a39e 2610 && (TYPE_CODE (type) == TYPE_CODE_FLT
4c4b4cd2 2611 || TYPE_CODE (type) == TYPE_CODE_STRUCT))
14f9c5c9 2612 {
df407dfe
AC
2613 int len = (value_bitpos (toval)
2614 + bits + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT;
aced2898 2615 int from_size;
224c3ddb 2616 gdb_byte *buffer = (gdb_byte *) alloca (len);
d2e4a39e 2617 struct value *val;
42ae5230 2618 CORE_ADDR to_addr = value_address (toval);
14f9c5c9
AS
2619
2620 if (TYPE_CODE (type) == TYPE_CODE_FLT)
4c4b4cd2 2621 fromval = value_cast (type, fromval);
14f9c5c9 2622
52ce6436 2623 read_memory (to_addr, buffer, len);
aced2898
PH
2624 from_size = value_bitsize (fromval);
2625 if (from_size == 0)
2626 from_size = TYPE_LENGTH (value_type (fromval)) * TARGET_CHAR_BIT;
d48e62f4 2627
d5a22e77 2628 const int is_big_endian = type_byte_order (type) == BFD_ENDIAN_BIG;
d48e62f4
TT
2629 ULONGEST from_offset = 0;
2630 if (is_big_endian && is_scalar_type (value_type (fromval)))
2631 from_offset = from_size - bits;
2632 copy_bitwise (buffer, value_bitpos (toval),
2633 value_contents (fromval), from_offset,
2634 bits, is_big_endian);
972daa01 2635 write_memory_with_notification (to_addr, buffer, len);
8cebebb9 2636
14f9c5c9 2637 val = value_copy (toval);
0fd88904 2638 memcpy (value_contents_raw (val), value_contents (fromval),
4c4b4cd2 2639 TYPE_LENGTH (type));
04624583 2640 deprecated_set_value_type (val, type);
d2e4a39e 2641
14f9c5c9
AS
2642 return val;
2643 }
2644
2645 return value_assign (toval, fromval);
2646}
2647
2648
7c512744
JB
2649/* Given that COMPONENT is a memory lvalue that is part of the lvalue
2650 CONTAINER, assign the contents of VAL to COMPONENTS's place in
2651 CONTAINER. Modifies the VALUE_CONTENTS of CONTAINER only, not
2652 COMPONENT, and not the inferior's memory. The current contents
2653 of COMPONENT are ignored.
2654
2655 Although not part of the initial design, this function also works
2656 when CONTAINER and COMPONENT are not_lval's: it works as if CONTAINER
2657 had a null address, and COMPONENT had an address which is equal to
2658 its offset inside CONTAINER. */
2659
52ce6436
PH
2660static void
2661value_assign_to_component (struct value *container, struct value *component,
2662 struct value *val)
2663{
2664 LONGEST offset_in_container =
42ae5230 2665 (LONGEST) (value_address (component) - value_address (container));
7c512744 2666 int bit_offset_in_container =
52ce6436
PH
2667 value_bitpos (component) - value_bitpos (container);
2668 int bits;
7c512744 2669
52ce6436
PH
2670 val = value_cast (value_type (component), val);
2671
2672 if (value_bitsize (component) == 0)
2673 bits = TARGET_CHAR_BIT * TYPE_LENGTH (value_type (component));
2674 else
2675 bits = value_bitsize (component);
2676
d5a22e77 2677 if (type_byte_order (value_type (container)) == BFD_ENDIAN_BIG)
2a62dfa9
JB
2678 {
2679 int src_offset;
2680
2681 if (is_scalar_type (check_typedef (value_type (component))))
2682 src_offset
2683 = TYPE_LENGTH (value_type (component)) * TARGET_CHAR_BIT - bits;
2684 else
2685 src_offset = 0;
a99bc3d2
JB
2686 copy_bitwise (value_contents_writeable (container) + offset_in_container,
2687 value_bitpos (container) + bit_offset_in_container,
2688 value_contents (val), src_offset, bits, 1);
2a62dfa9 2689 }
52ce6436 2690 else
a99bc3d2
JB
2691 copy_bitwise (value_contents_writeable (container) + offset_in_container,
2692 value_bitpos (container) + bit_offset_in_container,
2693 value_contents (val), 0, bits, 0);
7c512744
JB
2694}
2695
736ade86
XR
2696/* Determine if TYPE is an access to an unconstrained array. */
2697
d91e9ea8 2698bool
736ade86
XR
2699ada_is_access_to_unconstrained_array (struct type *type)
2700{
2701 return (TYPE_CODE (type) == TYPE_CODE_TYPEDEF
2702 && is_thick_pntr (ada_typedef_target_type (type)));
2703}
2704
4c4b4cd2
PH
2705/* The value of the element of array ARR at the ARITY indices given in IND.
2706 ARR may be either a simple array, GNAT array descriptor, or pointer
14f9c5c9
AS
2707 thereto. */
2708
d2e4a39e
AS
2709struct value *
2710ada_value_subscript (struct value *arr, int arity, struct value **ind)
14f9c5c9
AS
2711{
2712 int k;
d2e4a39e
AS
2713 struct value *elt;
2714 struct type *elt_type;
14f9c5c9
AS
2715
2716 elt = ada_coerce_to_simple_array (arr);
2717
df407dfe 2718 elt_type = ada_check_typedef (value_type (elt));
d2e4a39e 2719 if (TYPE_CODE (elt_type) == TYPE_CODE_ARRAY
14f9c5c9
AS
2720 && TYPE_FIELD_BITSIZE (elt_type, 0) > 0)
2721 return value_subscript_packed (elt, arity, ind);
2722
2723 for (k = 0; k < arity; k += 1)
2724 {
b9c50e9a
XR
2725 struct type *saved_elt_type = TYPE_TARGET_TYPE (elt_type);
2726
14f9c5c9 2727 if (TYPE_CODE (elt_type) != TYPE_CODE_ARRAY)
323e0a4a 2728 error (_("too many subscripts (%d expected)"), k);
b9c50e9a 2729
2497b498 2730 elt = value_subscript (elt, pos_atr (ind[k]));
b9c50e9a
XR
2731
2732 if (ada_is_access_to_unconstrained_array (saved_elt_type)
2733 && TYPE_CODE (value_type (elt)) != TYPE_CODE_TYPEDEF)
2734 {
2735 /* The element is a typedef to an unconstrained array,
2736 except that the value_subscript call stripped the
2737 typedef layer. The typedef layer is GNAT's way to
2738 specify that the element is, at the source level, an
2739 access to the unconstrained array, rather than the
2740 unconstrained array. So, we need to restore that
2741 typedef layer, which we can do by forcing the element's
2742 type back to its original type. Otherwise, the returned
2743 value is going to be printed as the array, rather
2744 than as an access. Another symptom of the same issue
2745 would be that an expression trying to dereference the
2746 element would also be improperly rejected. */
2747 deprecated_set_value_type (elt, saved_elt_type);
2748 }
2749
2750 elt_type = ada_check_typedef (value_type (elt));
14f9c5c9 2751 }
b9c50e9a 2752
14f9c5c9
AS
2753 return elt;
2754}
2755
deede10c
JB
2756/* Assuming ARR is a pointer to a GDB array, the value of the element
2757 of *ARR at the ARITY indices given in IND.
919e6dbe
PMR
2758 Does not read the entire array into memory.
2759
2760 Note: Unlike what one would expect, this function is used instead of
2761 ada_value_subscript for basically all non-packed array types. The reason
2762 for this is that a side effect of doing our own pointer arithmetics instead
2763 of relying on value_subscript is that there is no implicit typedef peeling.
2764 This is important for arrays of array accesses, where it allows us to
2765 preserve the fact that the array's element is an array access, where the
2766 access part os encoded in a typedef layer. */
14f9c5c9 2767
2c0b251b 2768static struct value *
deede10c 2769ada_value_ptr_subscript (struct value *arr, int arity, struct value **ind)
14f9c5c9
AS
2770{
2771 int k;
919e6dbe 2772 struct value *array_ind = ada_value_ind (arr);
deede10c 2773 struct type *type
919e6dbe
PMR
2774 = check_typedef (value_enclosing_type (array_ind));
2775
2776 if (TYPE_CODE (type) == TYPE_CODE_ARRAY
2777 && TYPE_FIELD_BITSIZE (type, 0) > 0)
2778 return value_subscript_packed (array_ind, arity, ind);
14f9c5c9
AS
2779
2780 for (k = 0; k < arity; k += 1)
2781 {
2782 LONGEST lwb, upb;
aa715135 2783 struct value *lwb_value;
14f9c5c9
AS
2784
2785 if (TYPE_CODE (type) != TYPE_CODE_ARRAY)
323e0a4a 2786 error (_("too many subscripts (%d expected)"), k);
d2e4a39e 2787 arr = value_cast (lookup_pointer_type (TYPE_TARGET_TYPE (type)),
4c4b4cd2 2788 value_copy (arr));
14f9c5c9 2789 get_discrete_bounds (TYPE_INDEX_TYPE (type), &lwb, &upb);
aa715135
JG
2790 lwb_value = value_from_longest (value_type(ind[k]), lwb);
2791 arr = value_ptradd (arr, pos_atr (ind[k]) - pos_atr (lwb_value));
14f9c5c9
AS
2792 type = TYPE_TARGET_TYPE (type);
2793 }
2794
2795 return value_ind (arr);
2796}
2797
0b5d8877 2798/* Given that ARRAY_PTR is a pointer or reference to an array of type TYPE (the
aa715135
JG
2799 actual type of ARRAY_PTR is ignored), returns the Ada slice of
2800 HIGH'Pos-LOW'Pos+1 elements starting at index LOW. The lower bound of
2801 this array is LOW, as per Ada rules. */
0b5d8877 2802static struct value *
f5938064
JG
2803ada_value_slice_from_ptr (struct value *array_ptr, struct type *type,
2804 int low, int high)
0b5d8877 2805{
b0dd7688 2806 struct type *type0 = ada_check_typedef (type);
aa715135 2807 struct type *base_index_type = TYPE_TARGET_TYPE (TYPE_INDEX_TYPE (type0));
0c9c3474 2808 struct type *index_type
aa715135 2809 = create_static_range_type (NULL, base_index_type, low, high);
9fe561ab
JB
2810 struct type *slice_type = create_array_type_with_stride
2811 (NULL, TYPE_TARGET_TYPE (type0), index_type,
24e99c6c 2812 type0->dyn_prop (DYN_PROP_BYTE_STRIDE),
9fe561ab 2813 TYPE_FIELD_BITSIZE (type0, 0));
aa715135
JG
2814 int base_low = ada_discrete_type_low_bound (TYPE_INDEX_TYPE (type0));
2815 LONGEST base_low_pos, low_pos;
2816 CORE_ADDR base;
2817
2818 if (!discrete_position (base_index_type, low, &low_pos)
2819 || !discrete_position (base_index_type, base_low, &base_low_pos))
2820 {
2821 warning (_("unable to get positions in slice, use bounds instead"));
2822 low_pos = low;
2823 base_low_pos = base_low;
2824 }
5b4ee69b 2825
aa715135
JG
2826 base = value_as_address (array_ptr)
2827 + ((low_pos - base_low_pos)
2828 * TYPE_LENGTH (TYPE_TARGET_TYPE (type0)));
f5938064 2829 return value_at_lazy (slice_type, base);
0b5d8877
PH
2830}
2831
2832
2833static struct value *
2834ada_value_slice (struct value *array, int low, int high)
2835{
b0dd7688 2836 struct type *type = ada_check_typedef (value_type (array));
aa715135 2837 struct type *base_index_type = TYPE_TARGET_TYPE (TYPE_INDEX_TYPE (type));
0c9c3474
SA
2838 struct type *index_type
2839 = create_static_range_type (NULL, TYPE_INDEX_TYPE (type), low, high);
9fe561ab
JB
2840 struct type *slice_type = create_array_type_with_stride
2841 (NULL, TYPE_TARGET_TYPE (type), index_type,
24e99c6c 2842 type->dyn_prop (DYN_PROP_BYTE_STRIDE),
9fe561ab 2843 TYPE_FIELD_BITSIZE (type, 0));
aa715135 2844 LONGEST low_pos, high_pos;
5b4ee69b 2845
aa715135
JG
2846 if (!discrete_position (base_index_type, low, &low_pos)
2847 || !discrete_position (base_index_type, high, &high_pos))
2848 {
2849 warning (_("unable to get positions in slice, use bounds instead"));
2850 low_pos = low;
2851 high_pos = high;
2852 }
2853
2854 return value_cast (slice_type,
2855 value_slice (array, low, high_pos - low_pos + 1));
0b5d8877
PH
2856}
2857
14f9c5c9
AS
2858/* If type is a record type in the form of a standard GNAT array
2859 descriptor, returns the number of dimensions for type. If arr is a
2860 simple array, returns the number of "array of"s that prefix its
4c4b4cd2 2861 type designation. Otherwise, returns 0. */
14f9c5c9
AS
2862
2863int
d2e4a39e 2864ada_array_arity (struct type *type)
14f9c5c9
AS
2865{
2866 int arity;
2867
2868 if (type == NULL)
2869 return 0;
2870
2871 type = desc_base_type (type);
2872
2873 arity = 0;
d2e4a39e 2874 if (TYPE_CODE (type) == TYPE_CODE_STRUCT)
14f9c5c9 2875 return desc_arity (desc_bounds_type (type));
d2e4a39e
AS
2876 else
2877 while (TYPE_CODE (type) == TYPE_CODE_ARRAY)
14f9c5c9 2878 {
4c4b4cd2 2879 arity += 1;
61ee279c 2880 type = ada_check_typedef (TYPE_TARGET_TYPE (type));
14f9c5c9 2881 }
d2e4a39e 2882
14f9c5c9
AS
2883 return arity;
2884}
2885
2886/* If TYPE is a record type in the form of a standard GNAT array
2887 descriptor or a simple array type, returns the element type for
2888 TYPE after indexing by NINDICES indices, or by all indices if
4c4b4cd2 2889 NINDICES is -1. Otherwise, returns NULL. */
14f9c5c9 2890
d2e4a39e
AS
2891struct type *
2892ada_array_element_type (struct type *type, int nindices)
14f9c5c9
AS
2893{
2894 type = desc_base_type (type);
2895
d2e4a39e 2896 if (TYPE_CODE (type) == TYPE_CODE_STRUCT)
14f9c5c9
AS
2897 {
2898 int k;
d2e4a39e 2899 struct type *p_array_type;
14f9c5c9 2900
556bdfd4 2901 p_array_type = desc_data_target_type (type);
14f9c5c9
AS
2902
2903 k = ada_array_arity (type);
2904 if (k == 0)
4c4b4cd2 2905 return NULL;
d2e4a39e 2906
4c4b4cd2 2907 /* Initially p_array_type = elt_type(*)[]...(k times)...[]. */
14f9c5c9 2908 if (nindices >= 0 && k > nindices)
4c4b4cd2 2909 k = nindices;
d2e4a39e 2910 while (k > 0 && p_array_type != NULL)
4c4b4cd2 2911 {
61ee279c 2912 p_array_type = ada_check_typedef (TYPE_TARGET_TYPE (p_array_type));
4c4b4cd2
PH
2913 k -= 1;
2914 }
14f9c5c9
AS
2915 return p_array_type;
2916 }
2917 else if (TYPE_CODE (type) == TYPE_CODE_ARRAY)
2918 {
2919 while (nindices != 0 && TYPE_CODE (type) == TYPE_CODE_ARRAY)
4c4b4cd2
PH
2920 {
2921 type = TYPE_TARGET_TYPE (type);
2922 nindices -= 1;
2923 }
14f9c5c9
AS
2924 return type;
2925 }
2926
2927 return NULL;
2928}
2929
4c4b4cd2 2930/* The type of nth index in arrays of given type (n numbering from 1).
dd19d49e
UW
2931 Does not examine memory. Throws an error if N is invalid or TYPE
2932 is not an array type. NAME is the name of the Ada attribute being
2933 evaluated ('range, 'first, 'last, or 'length); it is used in building
2934 the error message. */
14f9c5c9 2935
1eea4ebd
UW
2936static struct type *
2937ada_index_type (struct type *type, int n, const char *name)
14f9c5c9 2938{
4c4b4cd2
PH
2939 struct type *result_type;
2940
14f9c5c9
AS
2941 type = desc_base_type (type);
2942
1eea4ebd
UW
2943 if (n < 0 || n > ada_array_arity (type))
2944 error (_("invalid dimension number to '%s"), name);
14f9c5c9 2945
4c4b4cd2 2946 if (ada_is_simple_array_type (type))
14f9c5c9
AS
2947 {
2948 int i;
2949
2950 for (i = 1; i < n; i += 1)
4c4b4cd2 2951 type = TYPE_TARGET_TYPE (type);
262452ec 2952 result_type = TYPE_TARGET_TYPE (TYPE_INDEX_TYPE (type));
4c4b4cd2
PH
2953 /* FIXME: The stabs type r(0,0);bound;bound in an array type
2954 has a target type of TYPE_CODE_UNDEF. We compensate here, but
76a01679 2955 perhaps stabsread.c would make more sense. */
1eea4ebd
UW
2956 if (result_type && TYPE_CODE (result_type) == TYPE_CODE_UNDEF)
2957 result_type = NULL;
14f9c5c9 2958 }
d2e4a39e 2959 else
1eea4ebd
UW
2960 {
2961 result_type = desc_index_type (desc_bounds_type (type), n);
2962 if (result_type == NULL)
2963 error (_("attempt to take bound of something that is not an array"));
2964 }
2965
2966 return result_type;
14f9c5c9
AS
2967}
2968
2969/* Given that arr is an array type, returns the lower bound of the
2970 Nth index (numbering from 1) if WHICH is 0, and the upper bound if
4c4b4cd2 2971 WHICH is 1. This returns bounds 0 .. -1 if ARR_TYPE is an
1eea4ebd
UW
2972 array-descriptor type. It works for other arrays with bounds supplied
2973 by run-time quantities other than discriminants. */
14f9c5c9 2974
abb68b3e 2975static LONGEST
fb5e3d5c 2976ada_array_bound_from_type (struct type *arr_type, int n, int which)
14f9c5c9 2977{
8a48ac95 2978 struct type *type, *index_type_desc, *index_type;
1ce677a4 2979 int i;
262452ec
JK
2980
2981 gdb_assert (which == 0 || which == 1);
14f9c5c9 2982
ad82864c
JB
2983 if (ada_is_constrained_packed_array_type (arr_type))
2984 arr_type = decode_constrained_packed_array_type (arr_type);
14f9c5c9 2985
4c4b4cd2 2986 if (arr_type == NULL || !ada_is_simple_array_type (arr_type))
1eea4ebd 2987 return (LONGEST) - which;
14f9c5c9
AS
2988
2989 if (TYPE_CODE (arr_type) == TYPE_CODE_PTR)
2990 type = TYPE_TARGET_TYPE (arr_type);
2991 else
2992 type = arr_type;
2993
bafffb51
JB
2994 if (TYPE_FIXED_INSTANCE (type))
2995 {
2996 /* The array has already been fixed, so we do not need to
2997 check the parallel ___XA type again. That encoding has
2998 already been applied, so ignore it now. */
2999 index_type_desc = NULL;
3000 }
3001 else
3002 {
3003 index_type_desc = ada_find_parallel_type (type, "___XA");
3004 ada_fixup_array_indexes_type (index_type_desc);
3005 }
3006
262452ec 3007 if (index_type_desc != NULL)
28c85d6c
JB
3008 index_type = to_fixed_range_type (TYPE_FIELD_TYPE (index_type_desc, n - 1),
3009 NULL);
262452ec 3010 else
8a48ac95
JB
3011 {
3012 struct type *elt_type = check_typedef (type);
3013
3014 for (i = 1; i < n; i++)
3015 elt_type = check_typedef (TYPE_TARGET_TYPE (elt_type));
3016
3017 index_type = TYPE_INDEX_TYPE (elt_type);
3018 }
262452ec 3019
43bbcdc2
PH
3020 return
3021 (LONGEST) (which == 0
3022 ? ada_discrete_type_low_bound (index_type)
3023 : ada_discrete_type_high_bound (index_type));
14f9c5c9
AS
3024}
3025
3026/* Given that arr is an array value, returns the lower bound of the
abb68b3e
JB
3027 nth index (numbering from 1) if WHICH is 0, and the upper bound if
3028 WHICH is 1. This routine will also work for arrays with bounds
4c4b4cd2 3029 supplied by run-time quantities other than discriminants. */
14f9c5c9 3030
1eea4ebd 3031static LONGEST
4dc81987 3032ada_array_bound (struct value *arr, int n, int which)
14f9c5c9 3033{
eb479039
JB
3034 struct type *arr_type;
3035
3036 if (TYPE_CODE (check_typedef (value_type (arr))) == TYPE_CODE_PTR)
3037 arr = value_ind (arr);
3038 arr_type = value_enclosing_type (arr);
14f9c5c9 3039
ad82864c
JB
3040 if (ada_is_constrained_packed_array_type (arr_type))
3041 return ada_array_bound (decode_constrained_packed_array (arr), n, which);
4c4b4cd2 3042 else if (ada_is_simple_array_type (arr_type))
1eea4ebd 3043 return ada_array_bound_from_type (arr_type, n, which);
14f9c5c9 3044 else
1eea4ebd 3045 return value_as_long (desc_one_bound (desc_bounds (arr), n, which));
14f9c5c9
AS
3046}
3047
3048/* Given that arr is an array value, returns the length of the
3049 nth index. This routine will also work for arrays with bounds
4c4b4cd2
PH
3050 supplied by run-time quantities other than discriminants.
3051 Does not work for arrays indexed by enumeration types with representation
3052 clauses at the moment. */
14f9c5c9 3053
1eea4ebd 3054static LONGEST
d2e4a39e 3055ada_array_length (struct value *arr, int n)
14f9c5c9 3056{
aa715135
JG
3057 struct type *arr_type, *index_type;
3058 int low, high;
eb479039
JB
3059
3060 if (TYPE_CODE (check_typedef (value_type (arr))) == TYPE_CODE_PTR)
3061 arr = value_ind (arr);
3062 arr_type = value_enclosing_type (arr);
14f9c5c9 3063
ad82864c
JB
3064 if (ada_is_constrained_packed_array_type (arr_type))
3065 return ada_array_length (decode_constrained_packed_array (arr), n);
14f9c5c9 3066
4c4b4cd2 3067 if (ada_is_simple_array_type (arr_type))
aa715135
JG
3068 {
3069 low = ada_array_bound_from_type (arr_type, n, 0);
3070 high = ada_array_bound_from_type (arr_type, n, 1);
3071 }
14f9c5c9 3072 else
aa715135
JG
3073 {
3074 low = value_as_long (desc_one_bound (desc_bounds (arr), n, 0));
3075 high = value_as_long (desc_one_bound (desc_bounds (arr), n, 1));
3076 }
3077
f168693b 3078 arr_type = check_typedef (arr_type);
7150d33c 3079 index_type = ada_index_type (arr_type, n, "length");
aa715135
JG
3080 if (index_type != NULL)
3081 {
3082 struct type *base_type;
3083 if (TYPE_CODE (index_type) == TYPE_CODE_RANGE)
3084 base_type = TYPE_TARGET_TYPE (index_type);
3085 else
3086 base_type = index_type;
3087
3088 low = pos_atr (value_from_longest (base_type, low));
3089 high = pos_atr (value_from_longest (base_type, high));
3090 }
3091 return high - low + 1;
4c4b4cd2
PH
3092}
3093
bff8c71f
TT
3094/* An array whose type is that of ARR_TYPE (an array type), with
3095 bounds LOW to HIGH, but whose contents are unimportant. If HIGH is
3096 less than LOW, then LOW-1 is used. */
4c4b4cd2
PH
3097
3098static struct value *
bff8c71f 3099empty_array (struct type *arr_type, int low, int high)
4c4b4cd2 3100{
b0dd7688 3101 struct type *arr_type0 = ada_check_typedef (arr_type);
0c9c3474
SA
3102 struct type *index_type
3103 = create_static_range_type
bff8c71f
TT
3104 (NULL, TYPE_TARGET_TYPE (TYPE_INDEX_TYPE (arr_type0)), low,
3105 high < low ? low - 1 : high);
b0dd7688 3106 struct type *elt_type = ada_array_element_type (arr_type0, 1);
5b4ee69b 3107
0b5d8877 3108 return allocate_value (create_array_type (NULL, elt_type, index_type));
14f9c5c9 3109}
14f9c5c9 3110\f
d2e4a39e 3111
4c4b4cd2 3112 /* Name resolution */
14f9c5c9 3113
4c4b4cd2
PH
3114/* The "decoded" name for the user-definable Ada operator corresponding
3115 to OP. */
14f9c5c9 3116
d2e4a39e 3117static const char *
4c4b4cd2 3118ada_decoded_op_name (enum exp_opcode op)
14f9c5c9
AS
3119{
3120 int i;
3121
4c4b4cd2 3122 for (i = 0; ada_opname_table[i].encoded != NULL; i += 1)
14f9c5c9
AS
3123 {
3124 if (ada_opname_table[i].op == op)
4c4b4cd2 3125 return ada_opname_table[i].decoded;
14f9c5c9 3126 }
323e0a4a 3127 error (_("Could not find operator name for opcode"));
14f9c5c9
AS
3128}
3129
de93309a
SM
3130/* Returns true (non-zero) iff decoded name N0 should appear before N1
3131 in a listing of choices during disambiguation (see sort_choices, below).
3132 The idea is that overloadings of a subprogram name from the
3133 same package should sort in their source order. We settle for ordering
3134 such symbols by their trailing number (__N or $N). */
14f9c5c9 3135
de93309a
SM
3136static int
3137encoded_ordered_before (const char *N0, const char *N1)
14f9c5c9 3138{
de93309a
SM
3139 if (N1 == NULL)
3140 return 0;
3141 else if (N0 == NULL)
3142 return 1;
3143 else
3144 {
3145 int k0, k1;
30b15541 3146
de93309a
SM
3147 for (k0 = strlen (N0) - 1; k0 > 0 && isdigit (N0[k0]); k0 -= 1)
3148 ;
3149 for (k1 = strlen (N1) - 1; k1 > 0 && isdigit (N1[k1]); k1 -= 1)
3150 ;
3151 if ((N0[k0] == '_' || N0[k0] == '$') && N0[k0 + 1] != '\000'
3152 && (N1[k1] == '_' || N1[k1] == '$') && N1[k1 + 1] != '\000')
3153 {
3154 int n0, n1;
30b15541 3155
de93309a
SM
3156 n0 = k0;
3157 while (N0[n0] == '_' && n0 > 0 && N0[n0 - 1] == '_')
3158 n0 -= 1;
3159 n1 = k1;
3160 while (N1[n1] == '_' && n1 > 0 && N1[n1 - 1] == '_')
3161 n1 -= 1;
3162 if (n0 == n1 && strncmp (N0, N1, n0) == 0)
3163 return (atoi (N0 + k0 + 1) < atoi (N1 + k1 + 1));
3164 }
3165 return (strcmp (N0, N1) < 0);
3166 }
14f9c5c9
AS
3167}
3168
de93309a
SM
3169/* Sort SYMS[0..NSYMS-1] to put the choices in a canonical order by the
3170 encoded names. */
14f9c5c9 3171
de93309a
SM
3172static void
3173sort_choices (struct block_symbol syms[], int nsyms)
14f9c5c9 3174{
14f9c5c9 3175 int i;
14f9c5c9 3176
de93309a 3177 for (i = 1; i < nsyms; i += 1)
14f9c5c9 3178 {
de93309a
SM
3179 struct block_symbol sym = syms[i];
3180 int j;
3181
3182 for (j = i - 1; j >= 0; j -= 1)
4c4b4cd2 3183 {
987012b8
CB
3184 if (encoded_ordered_before (syms[j].symbol->linkage_name (),
3185 sym.symbol->linkage_name ()))
de93309a
SM
3186 break;
3187 syms[j + 1] = syms[j];
4c4b4cd2 3188 }
de93309a
SM
3189 syms[j + 1] = sym;
3190 }
3191}
14f9c5c9 3192
de93309a
SM
3193/* Whether GDB should display formals and return types for functions in the
3194 overloads selection menu. */
3195static bool print_signatures = true;
4c4b4cd2 3196
de93309a
SM
3197/* Print the signature for SYM on STREAM according to the FLAGS options. For
3198 all but functions, the signature is just the name of the symbol. For
3199 functions, this is the name of the function, the list of types for formals
3200 and the return type (if any). */
4c4b4cd2 3201
de93309a
SM
3202static void
3203ada_print_symbol_signature (struct ui_file *stream, struct symbol *sym,
3204 const struct type_print_options *flags)
3205{
3206 struct type *type = SYMBOL_TYPE (sym);
14f9c5c9 3207
987012b8 3208 fprintf_filtered (stream, "%s", sym->print_name ());
de93309a
SM
3209 if (!print_signatures
3210 || type == NULL
3211 || TYPE_CODE (type) != TYPE_CODE_FUNC)
3212 return;
4c4b4cd2 3213
de93309a
SM
3214 if (TYPE_NFIELDS (type) > 0)
3215 {
3216 int i;
14f9c5c9 3217
de93309a
SM
3218 fprintf_filtered (stream, " (");
3219 for (i = 0; i < TYPE_NFIELDS (type); ++i)
3220 {
3221 if (i > 0)
3222 fprintf_filtered (stream, "; ");
3223 ada_print_type (TYPE_FIELD_TYPE (type, i), NULL, stream, -1, 0,
3224 flags);
3225 }
3226 fprintf_filtered (stream, ")");
3227 }
3228 if (TYPE_TARGET_TYPE (type) != NULL
3229 && TYPE_CODE (TYPE_TARGET_TYPE (type)) != TYPE_CODE_VOID)
3230 {
3231 fprintf_filtered (stream, " return ");
3232 ada_print_type (TYPE_TARGET_TYPE (type), NULL, stream, -1, 0, flags);
3233 }
3234}
14f9c5c9 3235
de93309a
SM
3236/* Read and validate a set of numeric choices from the user in the
3237 range 0 .. N_CHOICES-1. Place the results in increasing
3238 order in CHOICES[0 .. N-1], and return N.
14f9c5c9 3239
de93309a
SM
3240 The user types choices as a sequence of numbers on one line
3241 separated by blanks, encoding them as follows:
14f9c5c9 3242
de93309a
SM
3243 + A choice of 0 means to cancel the selection, throwing an error.
3244 + If IS_ALL_CHOICE, a choice of 1 selects the entire set 0 .. N_CHOICES-1.
3245 + The user chooses k by typing k+IS_ALL_CHOICE+1.
14f9c5c9 3246
de93309a 3247 The user is not allowed to choose more than MAX_RESULTS values.
14f9c5c9 3248
de93309a
SM
3249 ANNOTATION_SUFFIX, if present, is used to annotate the input
3250 prompts (for use with the -f switch). */
14f9c5c9 3251
de93309a
SM
3252static int
3253get_selections (int *choices, int n_choices, int max_results,
3254 int is_all_choice, const char *annotation_suffix)
3255{
992a7040 3256 const char *args;
de93309a
SM
3257 const char *prompt;
3258 int n_chosen;
3259 int first_choice = is_all_choice ? 2 : 1;
14f9c5c9 3260
de93309a
SM
3261 prompt = getenv ("PS2");
3262 if (prompt == NULL)
3263 prompt = "> ";
4c4b4cd2 3264
de93309a 3265 args = command_line_input (prompt, annotation_suffix);
4c4b4cd2 3266
de93309a
SM
3267 if (args == NULL)
3268 error_no_arg (_("one or more choice numbers"));
14f9c5c9 3269
de93309a 3270 n_chosen = 0;
4c4b4cd2 3271
de93309a
SM
3272 /* Set choices[0 .. n_chosen-1] to the users' choices in ascending
3273 order, as given in args. Choices are validated. */
3274 while (1)
14f9c5c9 3275 {
de93309a
SM
3276 char *args2;
3277 int choice, j;
76a01679 3278
de93309a
SM
3279 args = skip_spaces (args);
3280 if (*args == '\0' && n_chosen == 0)
3281 error_no_arg (_("one or more choice numbers"));
3282 else if (*args == '\0')
3283 break;
76a01679 3284
de93309a
SM
3285 choice = strtol (args, &args2, 10);
3286 if (args == args2 || choice < 0
3287 || choice > n_choices + first_choice - 1)
3288 error (_("Argument must be choice number"));
3289 args = args2;
76a01679 3290
de93309a
SM
3291 if (choice == 0)
3292 error (_("cancelled"));
76a01679 3293
de93309a
SM
3294 if (choice < first_choice)
3295 {
3296 n_chosen = n_choices;
3297 for (j = 0; j < n_choices; j += 1)
3298 choices[j] = j;
3299 break;
76a01679 3300 }
de93309a 3301 choice -= first_choice;
76a01679 3302
de93309a 3303 for (j = n_chosen - 1; j >= 0 && choice < choices[j]; j -= 1)
76a01679 3304 {
76a01679 3305 }
4c4b4cd2 3306
de93309a 3307 if (j < 0 || choice != choices[j])
4c4b4cd2 3308 {
de93309a 3309 int k;
4c4b4cd2 3310
de93309a
SM
3311 for (k = n_chosen - 1; k > j; k -= 1)
3312 choices[k + 1] = choices[k];
3313 choices[j + 1] = choice;
3314 n_chosen += 1;
4c4b4cd2 3315 }
14f9c5c9
AS
3316 }
3317
de93309a
SM
3318 if (n_chosen > max_results)
3319 error (_("Select no more than %d of the above"), max_results);
3320
3321 return n_chosen;
14f9c5c9
AS
3322}
3323
de93309a
SM
3324/* Given a list of NSYMS symbols in SYMS, select up to MAX_RESULTS>0
3325 by asking the user (if necessary), returning the number selected,
3326 and setting the first elements of SYMS items. Error if no symbols
3327 selected. */
3328
3329/* NOTE: Adapted from decode_line_2 in symtab.c, with which it ought
3330 to be re-integrated one of these days. */
14f9c5c9
AS
3331
3332static int
de93309a 3333user_select_syms (struct block_symbol *syms, int nsyms, int max_results)
14f9c5c9 3334{
de93309a
SM
3335 int i;
3336 int *chosen = XALLOCAVEC (int , nsyms);
3337 int n_chosen;
3338 int first_choice = (max_results == 1) ? 1 : 2;
3339 const char *select_mode = multiple_symbols_select_mode ();
14f9c5c9 3340
de93309a
SM
3341 if (max_results < 1)
3342 error (_("Request to select 0 symbols!"));
3343 if (nsyms <= 1)
3344 return nsyms;
14f9c5c9 3345
de93309a
SM
3346 if (select_mode == multiple_symbols_cancel)
3347 error (_("\
3348canceled because the command is ambiguous\n\
3349See set/show multiple-symbol."));
14f9c5c9 3350
de93309a
SM
3351 /* If select_mode is "all", then return all possible symbols.
3352 Only do that if more than one symbol can be selected, of course.
3353 Otherwise, display the menu as usual. */
3354 if (select_mode == multiple_symbols_all && max_results > 1)
3355 return nsyms;
14f9c5c9 3356
de93309a
SM
3357 printf_filtered (_("[0] cancel\n"));
3358 if (max_results > 1)
3359 printf_filtered (_("[1] all\n"));
14f9c5c9 3360
de93309a 3361 sort_choices (syms, nsyms);
14f9c5c9 3362
de93309a
SM
3363 for (i = 0; i < nsyms; i += 1)
3364 {
3365 if (syms[i].symbol == NULL)
3366 continue;
14f9c5c9 3367
de93309a
SM
3368 if (SYMBOL_CLASS (syms[i].symbol) == LOC_BLOCK)
3369 {
3370 struct symtab_and_line sal =
3371 find_function_start_sal (syms[i].symbol, 1);
14f9c5c9 3372
de93309a
SM
3373 printf_filtered ("[%d] ", i + first_choice);
3374 ada_print_symbol_signature (gdb_stdout, syms[i].symbol,
3375 &type_print_raw_options);
3376 if (sal.symtab == NULL)
3377 printf_filtered (_(" at %p[<no source file available>%p]:%d\n"),
3378 metadata_style.style ().ptr (), nullptr, sal.line);
3379 else
3380 printf_filtered
3381 (_(" at %ps:%d\n"),
3382 styled_string (file_name_style.style (),
3383 symtab_to_filename_for_display (sal.symtab)),
3384 sal.line);
3385 continue;
3386 }
76a01679
JB
3387 else
3388 {
de93309a
SM
3389 int is_enumeral =
3390 (SYMBOL_CLASS (syms[i].symbol) == LOC_CONST
3391 && SYMBOL_TYPE (syms[i].symbol) != NULL
3392 && TYPE_CODE (SYMBOL_TYPE (syms[i].symbol)) == TYPE_CODE_ENUM);
3393 struct symtab *symtab = NULL;
4c4b4cd2 3394
de93309a
SM
3395 if (SYMBOL_OBJFILE_OWNED (syms[i].symbol))
3396 symtab = symbol_symtab (syms[i].symbol);
3397
3398 if (SYMBOL_LINE (syms[i].symbol) != 0 && symtab != NULL)
3399 {
3400 printf_filtered ("[%d] ", i + first_choice);
3401 ada_print_symbol_signature (gdb_stdout, syms[i].symbol,
3402 &type_print_raw_options);
3403 printf_filtered (_(" at %s:%d\n"),
3404 symtab_to_filename_for_display (symtab),
3405 SYMBOL_LINE (syms[i].symbol));
3406 }
3407 else if (is_enumeral
3408 && TYPE_NAME (SYMBOL_TYPE (syms[i].symbol)) != NULL)
3409 {
3410 printf_filtered (("[%d] "), i + first_choice);
3411 ada_print_type (SYMBOL_TYPE (syms[i].symbol), NULL,
3412 gdb_stdout, -1, 0, &type_print_raw_options);
3413 printf_filtered (_("'(%s) (enumeral)\n"),
987012b8 3414 syms[i].symbol->print_name ());
de93309a
SM
3415 }
3416 else
3417 {
3418 printf_filtered ("[%d] ", i + first_choice);
3419 ada_print_symbol_signature (gdb_stdout, syms[i].symbol,
3420 &type_print_raw_options);
3421
3422 if (symtab != NULL)
3423 printf_filtered (is_enumeral
3424 ? _(" in %s (enumeral)\n")
3425 : _(" at %s:?\n"),
3426 symtab_to_filename_for_display (symtab));
3427 else
3428 printf_filtered (is_enumeral
3429 ? _(" (enumeral)\n")
3430 : _(" at ?\n"));
3431 }
76a01679 3432 }
14f9c5c9 3433 }
14f9c5c9 3434
de93309a
SM
3435 n_chosen = get_selections (chosen, nsyms, max_results, max_results > 1,
3436 "overload-choice");
14f9c5c9 3437
de93309a
SM
3438 for (i = 0; i < n_chosen; i += 1)
3439 syms[i] = syms[chosen[i]];
14f9c5c9 3440
de93309a
SM
3441 return n_chosen;
3442}
14f9c5c9 3443
de93309a
SM
3444/* Same as evaluate_type (*EXP), but resolves ambiguous symbol
3445 references (marked by OP_VAR_VALUE nodes in which the symbol has an
3446 undefined namespace) and converts operators that are
3447 user-defined into appropriate function calls. If CONTEXT_TYPE is
3448 non-null, it provides a preferred result type [at the moment, only
3449 type void has any effect---causing procedures to be preferred over
3450 functions in calls]. A null CONTEXT_TYPE indicates that a non-void
3451 return type is preferred. May change (expand) *EXP. */
14f9c5c9 3452
de93309a
SM
3453static void
3454resolve (expression_up *expp, int void_context_p, int parse_completion,
3455 innermost_block_tracker *tracker)
3456{
3457 struct type *context_type = NULL;
3458 int pc = 0;
14f9c5c9 3459
de93309a
SM
3460 if (void_context_p)
3461 context_type = builtin_type ((*expp)->gdbarch)->builtin_void;
14f9c5c9 3462
de93309a
SM
3463 resolve_subexp (expp, &pc, 1, context_type, parse_completion, tracker);
3464}
4c4b4cd2 3465
de93309a
SM
3466/* Resolve the operator of the subexpression beginning at
3467 position *POS of *EXPP. "Resolving" consists of replacing
3468 the symbols that have undefined namespaces in OP_VAR_VALUE nodes
3469 with their resolutions, replacing built-in operators with
3470 function calls to user-defined operators, where appropriate, and,
3471 when DEPROCEDURE_P is non-zero, converting function-valued variables
3472 into parameterless calls. May expand *EXPP. The CONTEXT_TYPE functions
3473 are as in ada_resolve, above. */
14f9c5c9 3474
de93309a
SM
3475static struct value *
3476resolve_subexp (expression_up *expp, int *pos, int deprocedure_p,
3477 struct type *context_type, int parse_completion,
3478 innermost_block_tracker *tracker)
14f9c5c9 3479{
de93309a
SM
3480 int pc = *pos;
3481 int i;
3482 struct expression *exp; /* Convenience: == *expp. */
3483 enum exp_opcode op = (*expp)->elts[pc].opcode;
3484 struct value **argvec; /* Vector of operand types (alloca'ed). */
3485 int nargs; /* Number of operands. */
3486 int oplen;
14f9c5c9 3487
de93309a
SM
3488 argvec = NULL;
3489 nargs = 0;
3490 exp = expp->get ();
4c4b4cd2 3491
de93309a
SM
3492 /* Pass one: resolve operands, saving their types and updating *pos,
3493 if needed. */
3494 switch (op)
3495 {
3496 case OP_FUNCALL:
3497 if (exp->elts[pc + 3].opcode == OP_VAR_VALUE
3498 && SYMBOL_DOMAIN (exp->elts[pc + 5].symbol) == UNDEF_DOMAIN)
3499 *pos += 7;
3500 else
3501 {
3502 *pos += 3;
3503 resolve_subexp (expp, pos, 0, NULL, parse_completion, tracker);
4c4b4cd2 3504 }
de93309a
SM
3505 nargs = longest_to_int (exp->elts[pc + 1].longconst);
3506 break;
14f9c5c9 3507
de93309a
SM
3508 case UNOP_ADDR:
3509 *pos += 1;
3510 resolve_subexp (expp, pos, 0, NULL, parse_completion, tracker);
3511 break;
3512
3513 case UNOP_QUAL:
3514 *pos += 3;
3515 resolve_subexp (expp, pos, 1, check_typedef (exp->elts[pc + 1].type),
3516 parse_completion, tracker);
3517 break;
3518
3519 case OP_ATR_MODULUS:
3520 case OP_ATR_SIZE:
3521 case OP_ATR_TAG:
3522 case OP_ATR_FIRST:
3523 case OP_ATR_LAST:
3524 case OP_ATR_LENGTH:
3525 case OP_ATR_POS:
3526 case OP_ATR_VAL:
3527 case OP_ATR_MIN:
3528 case OP_ATR_MAX:
3529 case TERNOP_IN_RANGE:
3530 case BINOP_IN_BOUNDS:
3531 case UNOP_IN_RANGE:
3532 case OP_AGGREGATE:
3533 case OP_OTHERS:
3534 case OP_CHOICES:
3535 case OP_POSITIONAL:
3536 case OP_DISCRETE_RANGE:
3537 case OP_NAME:
3538 ada_forward_operator_length (exp, pc, &oplen, &nargs);
3539 *pos += oplen;
3540 break;
3541
3542 case BINOP_ASSIGN:
3543 {
3544 struct value *arg1;
3545
3546 *pos += 1;
3547 arg1 = resolve_subexp (expp, pos, 0, NULL, parse_completion, tracker);
3548 if (arg1 == NULL)
3549 resolve_subexp (expp, pos, 1, NULL, parse_completion, tracker);
3550 else
3551 resolve_subexp (expp, pos, 1, value_type (arg1), parse_completion,
3552 tracker);
3553 break;
3554 }
3555
3556 case UNOP_CAST:
3557 *pos += 3;
3558 nargs = 1;
3559 break;
3560
3561 case BINOP_ADD:
3562 case BINOP_SUB:
3563 case BINOP_MUL:
3564 case BINOP_DIV:
3565 case BINOP_REM:
3566 case BINOP_MOD:
3567 case BINOP_EXP:
3568 case BINOP_CONCAT:
3569 case BINOP_LOGICAL_AND:
3570 case BINOP_LOGICAL_OR:
3571 case BINOP_BITWISE_AND:
3572 case BINOP_BITWISE_IOR:
3573 case BINOP_BITWISE_XOR:
3574
3575 case BINOP_EQUAL:
3576 case BINOP_NOTEQUAL:
3577 case BINOP_LESS:
3578 case BINOP_GTR:
3579 case BINOP_LEQ:
3580 case BINOP_GEQ:
3581
3582 case BINOP_REPEAT:
3583 case BINOP_SUBSCRIPT:
3584 case BINOP_COMMA:
3585 *pos += 1;
3586 nargs = 2;
3587 break;
3588
3589 case UNOP_NEG:
3590 case UNOP_PLUS:
3591 case UNOP_LOGICAL_NOT:
3592 case UNOP_ABS:
3593 case UNOP_IND:
3594 *pos += 1;
3595 nargs = 1;
3596 break;
3597
3598 case OP_LONG:
3599 case OP_FLOAT:
3600 case OP_VAR_VALUE:
3601 case OP_VAR_MSYM_VALUE:
3602 *pos += 4;
3603 break;
3604
3605 case OP_TYPE:
3606 case OP_BOOL:
3607 case OP_LAST:
3608 case OP_INTERNALVAR:
3609 *pos += 3;
3610 break;
3611
3612 case UNOP_MEMVAL:
3613 *pos += 3;
3614 nargs = 1;
3615 break;
3616
3617 case OP_REGISTER:
3618 *pos += 4 + BYTES_TO_EXP_ELEM (exp->elts[pc + 1].longconst + 1);
3619 break;
3620
3621 case STRUCTOP_STRUCT:
3622 *pos += 4 + BYTES_TO_EXP_ELEM (exp->elts[pc + 1].longconst + 1);
3623 nargs = 1;
3624 break;
3625
3626 case TERNOP_SLICE:
3627 *pos += 1;
3628 nargs = 3;
3629 break;
3630
3631 case OP_STRING:
3632 break;
3633
3634 default:
3635 error (_("Unexpected operator during name resolution"));
14f9c5c9 3636 }
14f9c5c9 3637
de93309a
SM
3638 argvec = XALLOCAVEC (struct value *, nargs + 1);
3639 for (i = 0; i < nargs; i += 1)
3640 argvec[i] = resolve_subexp (expp, pos, 1, NULL, parse_completion,
3641 tracker);
3642 argvec[i] = NULL;
3643 exp = expp->get ();
4c4b4cd2 3644
de93309a
SM
3645 /* Pass two: perform any resolution on principal operator. */
3646 switch (op)
14f9c5c9 3647 {
de93309a
SM
3648 default:
3649 break;
5b4ee69b 3650
de93309a
SM
3651 case OP_VAR_VALUE:
3652 if (SYMBOL_DOMAIN (exp->elts[pc + 2].symbol) == UNDEF_DOMAIN)
4c4b4cd2 3653 {
de93309a
SM
3654 std::vector<struct block_symbol> candidates;
3655 int n_candidates;
5b4ee69b 3656
de93309a 3657 n_candidates =
987012b8 3658 ada_lookup_symbol_list (exp->elts[pc + 2].symbol->linkage_name (),
de93309a
SM
3659 exp->elts[pc + 1].block, VAR_DOMAIN,
3660 &candidates);
d2e4a39e 3661
de93309a
SM
3662 if (n_candidates > 1)
3663 {
3664 /* Types tend to get re-introduced locally, so if there
3665 are any local symbols that are not types, first filter
3666 out all types. */
3667 int j;
3668 for (j = 0; j < n_candidates; j += 1)
3669 switch (SYMBOL_CLASS (candidates[j].symbol))
3670 {
3671 case LOC_REGISTER:
3672 case LOC_ARG:
3673 case LOC_REF_ARG:
3674 case LOC_REGPARM_ADDR:
3675 case LOC_LOCAL:
3676 case LOC_COMPUTED:
3677 goto FoundNonType;
3678 default:
3679 break;
3680 }
3681 FoundNonType:
3682 if (j < n_candidates)
3683 {
3684 j = 0;
3685 while (j < n_candidates)
3686 {
3687 if (SYMBOL_CLASS (candidates[j].symbol) == LOC_TYPEDEF)
3688 {
3689 candidates[j] = candidates[n_candidates - 1];
3690 n_candidates -= 1;
3691 }
3692 else
3693 j += 1;
3694 }
3695 }
3696 }
4c4b4cd2 3697
de93309a
SM
3698 if (n_candidates == 0)
3699 error (_("No definition found for %s"),
987012b8 3700 exp->elts[pc + 2].symbol->print_name ());
de93309a
SM
3701 else if (n_candidates == 1)
3702 i = 0;
3703 else if (deprocedure_p
3704 && !is_nonfunction (candidates.data (), n_candidates))
3705 {
3706 i = ada_resolve_function
3707 (candidates.data (), n_candidates, NULL, 0,
987012b8 3708 exp->elts[pc + 2].symbol->linkage_name (),
de93309a
SM
3709 context_type, parse_completion);
3710 if (i < 0)
3711 error (_("Could not find a match for %s"),
987012b8 3712 exp->elts[pc + 2].symbol->print_name ());
de93309a
SM
3713 }
3714 else
3715 {
3716 printf_filtered (_("Multiple matches for %s\n"),
987012b8 3717 exp->elts[pc + 2].symbol->print_name ());
de93309a
SM
3718 user_select_syms (candidates.data (), n_candidates, 1);
3719 i = 0;
3720 }
5b4ee69b 3721
de93309a
SM
3722 exp->elts[pc + 1].block = candidates[i].block;
3723 exp->elts[pc + 2].symbol = candidates[i].symbol;
3724 tracker->update (candidates[i]);
3725 }
14f9c5c9 3726
de93309a
SM
3727 if (deprocedure_p
3728 && (TYPE_CODE (SYMBOL_TYPE (exp->elts[pc + 2].symbol))
3729 == TYPE_CODE_FUNC))
4c4b4cd2 3730 {
de93309a
SM
3731 replace_operator_with_call (expp, pc, 0, 4,
3732 exp->elts[pc + 2].symbol,
3733 exp->elts[pc + 1].block);
3734 exp = expp->get ();
4c4b4cd2 3735 }
de93309a
SM
3736 break;
3737
3738 case OP_FUNCALL:
3739 {
3740 if (exp->elts[pc + 3].opcode == OP_VAR_VALUE
3741 && SYMBOL_DOMAIN (exp->elts[pc + 5].symbol) == UNDEF_DOMAIN)
3742 {
3743 std::vector<struct block_symbol> candidates;
3744 int n_candidates;
3745
3746 n_candidates =
987012b8 3747 ada_lookup_symbol_list (exp->elts[pc + 5].symbol->linkage_name (),
de93309a
SM
3748 exp->elts[pc + 4].block, VAR_DOMAIN,
3749 &candidates);
14f9c5c9 3750
de93309a
SM
3751 if (n_candidates == 1)
3752 i = 0;
3753 else
3754 {
3755 i = ada_resolve_function
3756 (candidates.data (), n_candidates,
3757 argvec, nargs,
987012b8 3758 exp->elts[pc + 5].symbol->linkage_name (),
de93309a
SM
3759 context_type, parse_completion);
3760 if (i < 0)
3761 error (_("Could not find a match for %s"),
987012b8 3762 exp->elts[pc + 5].symbol->print_name ());
de93309a 3763 }
d72413e6 3764
de93309a
SM
3765 exp->elts[pc + 4].block = candidates[i].block;
3766 exp->elts[pc + 5].symbol = candidates[i].symbol;
3767 tracker->update (candidates[i]);
3768 }
3769 }
3770 break;
3771 case BINOP_ADD:
3772 case BINOP_SUB:
3773 case BINOP_MUL:
3774 case BINOP_DIV:
3775 case BINOP_REM:
3776 case BINOP_MOD:
3777 case BINOP_CONCAT:
3778 case BINOP_BITWISE_AND:
3779 case BINOP_BITWISE_IOR:
3780 case BINOP_BITWISE_XOR:
3781 case BINOP_EQUAL:
3782 case BINOP_NOTEQUAL:
3783 case BINOP_LESS:
3784 case BINOP_GTR:
3785 case BINOP_LEQ:
3786 case BINOP_GEQ:
3787 case BINOP_EXP:
3788 case UNOP_NEG:
3789 case UNOP_PLUS:
3790 case UNOP_LOGICAL_NOT:
3791 case UNOP_ABS:
3792 if (possible_user_operator_p (op, argvec))
3793 {
3794 std::vector<struct block_symbol> candidates;
3795 int n_candidates;
d72413e6 3796
de93309a
SM
3797 n_candidates =
3798 ada_lookup_symbol_list (ada_decoded_op_name (op),
3799 NULL, VAR_DOMAIN,
3800 &candidates);
d72413e6 3801
de93309a
SM
3802 i = ada_resolve_function (candidates.data (), n_candidates, argvec,
3803 nargs, ada_decoded_op_name (op), NULL,
3804 parse_completion);
3805 if (i < 0)
3806 break;
d72413e6 3807
de93309a
SM
3808 replace_operator_with_call (expp, pc, nargs, 1,
3809 candidates[i].symbol,
3810 candidates[i].block);
3811 exp = expp->get ();
3812 }
3813 break;
d72413e6 3814
de93309a
SM
3815 case OP_TYPE:
3816 case OP_REGISTER:
3817 return NULL;
d72413e6 3818 }
d72413e6 3819
de93309a
SM
3820 *pos = pc;
3821 if (exp->elts[pc].opcode == OP_VAR_MSYM_VALUE)
3822 return evaluate_var_msym_value (EVAL_AVOID_SIDE_EFFECTS,
3823 exp->elts[pc + 1].objfile,
3824 exp->elts[pc + 2].msymbol);
3825 else
3826 return evaluate_subexp_type (exp, pos);
3827}
14f9c5c9 3828
de93309a
SM
3829/* Return non-zero if formal type FTYPE matches actual type ATYPE. If
3830 MAY_DEREF is non-zero, the formal may be a pointer and the actual
3831 a non-pointer. */
3832/* The term "match" here is rather loose. The match is heuristic and
3833 liberal. */
14f9c5c9 3834
de93309a
SM
3835static int
3836ada_type_match (struct type *ftype, struct type *atype, int may_deref)
14f9c5c9 3837{
de93309a
SM
3838 ftype = ada_check_typedef (ftype);
3839 atype = ada_check_typedef (atype);
14f9c5c9 3840
de93309a
SM
3841 if (TYPE_CODE (ftype) == TYPE_CODE_REF)
3842 ftype = TYPE_TARGET_TYPE (ftype);
3843 if (TYPE_CODE (atype) == TYPE_CODE_REF)
3844 atype = TYPE_TARGET_TYPE (atype);
14f9c5c9 3845
de93309a 3846 switch (TYPE_CODE (ftype))
14f9c5c9 3847 {
de93309a
SM
3848 default:
3849 return TYPE_CODE (ftype) == TYPE_CODE (atype);
3850 case TYPE_CODE_PTR:
3851 if (TYPE_CODE (atype) == TYPE_CODE_PTR)
3852 return ada_type_match (TYPE_TARGET_TYPE (ftype),
3853 TYPE_TARGET_TYPE (atype), 0);
d2e4a39e 3854 else
de93309a
SM
3855 return (may_deref
3856 && ada_type_match (TYPE_TARGET_TYPE (ftype), atype, 0));
3857 case TYPE_CODE_INT:
3858 case TYPE_CODE_ENUM:
3859 case TYPE_CODE_RANGE:
3860 switch (TYPE_CODE (atype))
4c4b4cd2 3861 {
de93309a
SM
3862 case TYPE_CODE_INT:
3863 case TYPE_CODE_ENUM:
3864 case TYPE_CODE_RANGE:
3865 return 1;
3866 default:
3867 return 0;
4c4b4cd2 3868 }
d2e4a39e 3869
de93309a
SM
3870 case TYPE_CODE_ARRAY:
3871 return (TYPE_CODE (atype) == TYPE_CODE_ARRAY
3872 || ada_is_array_descriptor_type (atype));
14f9c5c9 3873
de93309a
SM
3874 case TYPE_CODE_STRUCT:
3875 if (ada_is_array_descriptor_type (ftype))
3876 return (TYPE_CODE (atype) == TYPE_CODE_ARRAY
3877 || ada_is_array_descriptor_type (atype));
3878 else
3879 return (TYPE_CODE (atype) == TYPE_CODE_STRUCT
3880 && !ada_is_array_descriptor_type (atype));
14f9c5c9 3881
de93309a
SM
3882 case TYPE_CODE_UNION:
3883 case TYPE_CODE_FLT:
3884 return (TYPE_CODE (atype) == TYPE_CODE (ftype));
3885 }
14f9c5c9
AS
3886}
3887
de93309a
SM
3888/* Return non-zero if the formals of FUNC "sufficiently match" the
3889 vector of actual argument types ACTUALS of size N_ACTUALS. FUNC
3890 may also be an enumeral, in which case it is treated as a 0-
3891 argument function. */
14f9c5c9 3892
de93309a
SM
3893static int
3894ada_args_match (struct symbol *func, struct value **actuals, int n_actuals)
3895{
3896 int i;
3897 struct type *func_type = SYMBOL_TYPE (func);
14f9c5c9 3898
de93309a
SM
3899 if (SYMBOL_CLASS (func) == LOC_CONST
3900 && TYPE_CODE (func_type) == TYPE_CODE_ENUM)
3901 return (n_actuals == 0);
3902 else if (func_type == NULL || TYPE_CODE (func_type) != TYPE_CODE_FUNC)
3903 return 0;
14f9c5c9 3904
de93309a
SM
3905 if (TYPE_NFIELDS (func_type) != n_actuals)
3906 return 0;
14f9c5c9 3907
de93309a
SM
3908 for (i = 0; i < n_actuals; i += 1)
3909 {
3910 if (actuals[i] == NULL)
3911 return 0;
3912 else
3913 {
3914 struct type *ftype = ada_check_typedef (TYPE_FIELD_TYPE (func_type,
3915 i));
3916 struct type *atype = ada_check_typedef (value_type (actuals[i]));
14f9c5c9 3917
de93309a
SM
3918 if (!ada_type_match (ftype, atype, 1))
3919 return 0;
3920 }
3921 }
3922 return 1;
3923}
d2e4a39e 3924
de93309a
SM
3925/* False iff function type FUNC_TYPE definitely does not produce a value
3926 compatible with type CONTEXT_TYPE. Conservatively returns 1 if
3927 FUNC_TYPE is not a valid function type with a non-null return type
3928 or an enumerated type. A null CONTEXT_TYPE indicates any non-void type. */
14f9c5c9 3929
de93309a
SM
3930static int
3931return_match (struct type *func_type, struct type *context_type)
3932{
3933 struct type *return_type;
d2e4a39e 3934
de93309a
SM
3935 if (func_type == NULL)
3936 return 1;
14f9c5c9 3937
de93309a
SM
3938 if (TYPE_CODE (func_type) == TYPE_CODE_FUNC)
3939 return_type = get_base_type (TYPE_TARGET_TYPE (func_type));
3940 else
3941 return_type = get_base_type (func_type);
3942 if (return_type == NULL)
3943 return 1;
76a01679 3944
de93309a 3945 context_type = get_base_type (context_type);
14f9c5c9 3946
de93309a
SM
3947 if (TYPE_CODE (return_type) == TYPE_CODE_ENUM)
3948 return context_type == NULL || return_type == context_type;
3949 else if (context_type == NULL)
3950 return TYPE_CODE (return_type) != TYPE_CODE_VOID;
3951 else
3952 return TYPE_CODE (return_type) == TYPE_CODE (context_type);
3953}
14f9c5c9 3954
14f9c5c9 3955
de93309a
SM
3956/* Returns the index in SYMS[0..NSYMS-1] that contains the symbol for the
3957 function (if any) that matches the types of the NARGS arguments in
3958 ARGS. If CONTEXT_TYPE is non-null and there is at least one match
3959 that returns that type, then eliminate matches that don't. If
3960 CONTEXT_TYPE is void and there is at least one match that does not
3961 return void, eliminate all matches that do.
14f9c5c9 3962
de93309a
SM
3963 Asks the user if there is more than one match remaining. Returns -1
3964 if there is no such symbol or none is selected. NAME is used
3965 solely for messages. May re-arrange and modify SYMS in
3966 the process; the index returned is for the modified vector. */
14f9c5c9 3967
de93309a
SM
3968static int
3969ada_resolve_function (struct block_symbol syms[],
3970 int nsyms, struct value **args, int nargs,
3971 const char *name, struct type *context_type,
3972 int parse_completion)
3973{
3974 int fallback;
3975 int k;
3976 int m; /* Number of hits */
14f9c5c9 3977
de93309a
SM
3978 m = 0;
3979 /* In the first pass of the loop, we only accept functions matching
3980 context_type. If none are found, we add a second pass of the loop
3981 where every function is accepted. */
3982 for (fallback = 0; m == 0 && fallback < 2; fallback++)
3983 {
3984 for (k = 0; k < nsyms; k += 1)
4c4b4cd2 3985 {
de93309a 3986 struct type *type = ada_check_typedef (SYMBOL_TYPE (syms[k].symbol));
5b4ee69b 3987
de93309a
SM
3988 if (ada_args_match (syms[k].symbol, args, nargs)
3989 && (fallback || return_match (type, context_type)))
3990 {
3991 syms[m] = syms[k];
3992 m += 1;
3993 }
4c4b4cd2 3994 }
14f9c5c9
AS
3995 }
3996
de93309a
SM
3997 /* If we got multiple matches, ask the user which one to use. Don't do this
3998 interactive thing during completion, though, as the purpose of the
3999 completion is providing a list of all possible matches. Prompting the
4000 user to filter it down would be completely unexpected in this case. */
4001 if (m == 0)
4002 return -1;
4003 else if (m > 1 && !parse_completion)
4004 {
4005 printf_filtered (_("Multiple matches for %s\n"), name);
4006 user_select_syms (syms, m, 1);
4007 return 0;
4008 }
4009 return 0;
14f9c5c9
AS
4010}
4011
4c4b4cd2
PH
4012/* Replace the operator of length OPLEN at position PC in *EXPP with a call
4013 on the function identified by SYM and BLOCK, and taking NARGS
4014 arguments. Update *EXPP as needed to hold more space. */
14f9c5c9
AS
4015
4016static void
e9d9f57e 4017replace_operator_with_call (expression_up *expp, int pc, int nargs,
4c4b4cd2 4018 int oplen, struct symbol *sym,
270140bd 4019 const struct block *block)
14f9c5c9
AS
4020{
4021 /* A new expression, with 6 more elements (3 for funcall, 4 for function
4c4b4cd2 4022 symbol, -oplen for operator being replaced). */
d2e4a39e 4023 struct expression *newexp = (struct expression *)
8c1a34e7 4024 xzalloc (sizeof (struct expression)
4c4b4cd2 4025 + EXP_ELEM_TO_BYTES ((*expp)->nelts + 7 - oplen));
e9d9f57e 4026 struct expression *exp = expp->get ();
14f9c5c9
AS
4027
4028 newexp->nelts = exp->nelts + 7 - oplen;
4029 newexp->language_defn = exp->language_defn;
3489610d 4030 newexp->gdbarch = exp->gdbarch;
14f9c5c9 4031 memcpy (newexp->elts, exp->elts, EXP_ELEM_TO_BYTES (pc));
d2e4a39e 4032 memcpy (newexp->elts + pc + 7, exp->elts + pc + oplen,
4c4b4cd2 4033 EXP_ELEM_TO_BYTES (exp->nelts - pc - oplen));
14f9c5c9
AS
4034
4035 newexp->elts[pc].opcode = newexp->elts[pc + 2].opcode = OP_FUNCALL;
4036 newexp->elts[pc + 1].longconst = (LONGEST) nargs;
4037
4038 newexp->elts[pc + 3].opcode = newexp->elts[pc + 6].opcode = OP_VAR_VALUE;
4039 newexp->elts[pc + 4].block = block;
4040 newexp->elts[pc + 5].symbol = sym;
4041
e9d9f57e 4042 expp->reset (newexp);
d2e4a39e 4043}
14f9c5c9
AS
4044
4045/* Type-class predicates */
4046
4c4b4cd2
PH
4047/* True iff TYPE is numeric (i.e., an INT, RANGE (of numeric type),
4048 or FLOAT). */
14f9c5c9
AS
4049
4050static int
d2e4a39e 4051numeric_type_p (struct type *type)
14f9c5c9
AS
4052{
4053 if (type == NULL)
4054 return 0;
d2e4a39e
AS
4055 else
4056 {
4057 switch (TYPE_CODE (type))
4c4b4cd2
PH
4058 {
4059 case TYPE_CODE_INT:
4060 case TYPE_CODE_FLT:
4061 return 1;
4062 case TYPE_CODE_RANGE:
4063 return (type == TYPE_TARGET_TYPE (type)
4064 || numeric_type_p (TYPE_TARGET_TYPE (type)));
4065 default:
4066 return 0;
4067 }
d2e4a39e 4068 }
14f9c5c9
AS
4069}
4070
4c4b4cd2 4071/* True iff TYPE is integral (an INT or RANGE of INTs). */
14f9c5c9
AS
4072
4073static int
d2e4a39e 4074integer_type_p (struct type *type)
14f9c5c9
AS
4075{
4076 if (type == NULL)
4077 return 0;
d2e4a39e
AS
4078 else
4079 {
4080 switch (TYPE_CODE (type))
4c4b4cd2
PH
4081 {
4082 case TYPE_CODE_INT:
4083 return 1;
4084 case TYPE_CODE_RANGE:
4085 return (type == TYPE_TARGET_TYPE (type)
4086 || integer_type_p (TYPE_TARGET_TYPE (type)));
4087 default:
4088 return 0;
4089 }
d2e4a39e 4090 }
14f9c5c9
AS
4091}
4092
4c4b4cd2 4093/* True iff TYPE is scalar (INT, RANGE, FLOAT, ENUM). */
14f9c5c9
AS
4094
4095static int
d2e4a39e 4096scalar_type_p (struct type *type)
14f9c5c9
AS
4097{
4098 if (type == NULL)
4099 return 0;
d2e4a39e
AS
4100 else
4101 {
4102 switch (TYPE_CODE (type))
4c4b4cd2
PH
4103 {
4104 case TYPE_CODE_INT:
4105 case TYPE_CODE_RANGE:
4106 case TYPE_CODE_ENUM:
4107 case TYPE_CODE_FLT:
4108 return 1;
4109 default:
4110 return 0;
4111 }
d2e4a39e 4112 }
14f9c5c9
AS
4113}
4114
4c4b4cd2 4115/* True iff TYPE is discrete (INT, RANGE, ENUM). */
14f9c5c9
AS
4116
4117static int
d2e4a39e 4118discrete_type_p (struct type *type)
14f9c5c9
AS
4119{
4120 if (type == NULL)
4121 return 0;
d2e4a39e
AS
4122 else
4123 {
4124 switch (TYPE_CODE (type))
4c4b4cd2
PH
4125 {
4126 case TYPE_CODE_INT:
4127 case TYPE_CODE_RANGE:
4128 case TYPE_CODE_ENUM:
872f0337 4129 case TYPE_CODE_BOOL:
4c4b4cd2
PH
4130 return 1;
4131 default:
4132 return 0;
4133 }
d2e4a39e 4134 }
14f9c5c9
AS
4135}
4136
4c4b4cd2
PH
4137/* Returns non-zero if OP with operands in the vector ARGS could be
4138 a user-defined function. Errs on the side of pre-defined operators
4139 (i.e., result 0). */
14f9c5c9
AS
4140
4141static int
d2e4a39e 4142possible_user_operator_p (enum exp_opcode op, struct value *args[])
14f9c5c9 4143{
76a01679 4144 struct type *type0 =
df407dfe 4145 (args[0] == NULL) ? NULL : ada_check_typedef (value_type (args[0]));
d2e4a39e 4146 struct type *type1 =
df407dfe 4147 (args[1] == NULL) ? NULL : ada_check_typedef (value_type (args[1]));
d2e4a39e 4148
4c4b4cd2
PH
4149 if (type0 == NULL)
4150 return 0;
4151
14f9c5c9
AS
4152 switch (op)
4153 {
4154 default:
4155 return 0;
4156
4157 case BINOP_ADD:
4158 case BINOP_SUB:
4159 case BINOP_MUL:
4160 case BINOP_DIV:
d2e4a39e 4161 return (!(numeric_type_p (type0) && numeric_type_p (type1)));
14f9c5c9
AS
4162
4163 case BINOP_REM:
4164 case BINOP_MOD:
4165 case BINOP_BITWISE_AND:
4166 case BINOP_BITWISE_IOR:
4167 case BINOP_BITWISE_XOR:
d2e4a39e 4168 return (!(integer_type_p (type0) && integer_type_p (type1)));
14f9c5c9
AS
4169
4170 case BINOP_EQUAL:
4171 case BINOP_NOTEQUAL:
4172 case BINOP_LESS:
4173 case BINOP_GTR:
4174 case BINOP_LEQ:
4175 case BINOP_GEQ:
d2e4a39e 4176 return (!(scalar_type_p (type0) && scalar_type_p (type1)));
14f9c5c9
AS
4177
4178 case BINOP_CONCAT:
ee90b9ab 4179 return !ada_is_array_type (type0) || !ada_is_array_type (type1);
14f9c5c9
AS
4180
4181 case BINOP_EXP:
d2e4a39e 4182 return (!(numeric_type_p (type0) && integer_type_p (type1)));
14f9c5c9
AS
4183
4184 case UNOP_NEG:
4185 case UNOP_PLUS:
4186 case UNOP_LOGICAL_NOT:
d2e4a39e
AS
4187 case UNOP_ABS:
4188 return (!numeric_type_p (type0));
14f9c5c9
AS
4189
4190 }
4191}
4192\f
4c4b4cd2 4193 /* Renaming */
14f9c5c9 4194
aeb5907d
JB
4195/* NOTES:
4196
4197 1. In the following, we assume that a renaming type's name may
4198 have an ___XD suffix. It would be nice if this went away at some
4199 point.
4200 2. We handle both the (old) purely type-based representation of
4201 renamings and the (new) variable-based encoding. At some point,
4202 it is devoutly to be hoped that the former goes away
4203 (FIXME: hilfinger-2007-07-09).
4204 3. Subprogram renamings are not implemented, although the XRS
4205 suffix is recognized (FIXME: hilfinger-2007-07-09). */
4206
4207/* If SYM encodes a renaming,
4208
4209 <renaming> renames <renamed entity>,
4210
4211 sets *LEN to the length of the renamed entity's name,
4212 *RENAMED_ENTITY to that name (not null-terminated), and *RENAMING_EXPR to
4213 the string describing the subcomponent selected from the renamed
0963b4bd 4214 entity. Returns ADA_NOT_RENAMING if SYM does not encode a renaming
aeb5907d
JB
4215 (in which case, the values of *RENAMED_ENTITY, *LEN, and *RENAMING_EXPR
4216 are undefined). Otherwise, returns a value indicating the category
4217 of entity renamed: an object (ADA_OBJECT_RENAMING), exception
4218 (ADA_EXCEPTION_RENAMING), package (ADA_PACKAGE_RENAMING), or
4219 subprogram (ADA_SUBPROGRAM_RENAMING). Does no allocation; the
4220 strings returned in *RENAMED_ENTITY and *RENAMING_EXPR should not be
4221 deallocated. The values of RENAMED_ENTITY, LEN, or RENAMING_EXPR
4222 may be NULL, in which case they are not assigned.
4223
4224 [Currently, however, GCC does not generate subprogram renamings.] */
4225
4226enum ada_renaming_category
4227ada_parse_renaming (struct symbol *sym,
4228 const char **renamed_entity, int *len,
4229 const char **renaming_expr)
4230{
4231 enum ada_renaming_category kind;
4232 const char *info;
4233 const char *suffix;
4234
4235 if (sym == NULL)
4236 return ADA_NOT_RENAMING;
4237 switch (SYMBOL_CLASS (sym))
14f9c5c9 4238 {
aeb5907d
JB
4239 default:
4240 return ADA_NOT_RENAMING;
aeb5907d
JB
4241 case LOC_LOCAL:
4242 case LOC_STATIC:
4243 case LOC_COMPUTED:
4244 case LOC_OPTIMIZED_OUT:
987012b8 4245 info = strstr (sym->linkage_name (), "___XR");
aeb5907d
JB
4246 if (info == NULL)
4247 return ADA_NOT_RENAMING;
4248 switch (info[5])
4249 {
4250 case '_':
4251 kind = ADA_OBJECT_RENAMING;
4252 info += 6;
4253 break;
4254 case 'E':
4255 kind = ADA_EXCEPTION_RENAMING;
4256 info += 7;
4257 break;
4258 case 'P':
4259 kind = ADA_PACKAGE_RENAMING;
4260 info += 7;
4261 break;
4262 case 'S':
4263 kind = ADA_SUBPROGRAM_RENAMING;
4264 info += 7;
4265 break;
4266 default:
4267 return ADA_NOT_RENAMING;
4268 }
14f9c5c9 4269 }
4c4b4cd2 4270
de93309a
SM
4271 if (renamed_entity != NULL)
4272 *renamed_entity = info;
4273 suffix = strstr (info, "___XE");
4274 if (suffix == NULL || suffix == info)
4275 return ADA_NOT_RENAMING;
4276 if (len != NULL)
4277 *len = strlen (info) - strlen (suffix);
4278 suffix += 5;
4279 if (renaming_expr != NULL)
4280 *renaming_expr = suffix;
4281 return kind;
4282}
4283
4284/* Compute the value of the given RENAMING_SYM, which is expected to
4285 be a symbol encoding a renaming expression. BLOCK is the block
4286 used to evaluate the renaming. */
4287
4288static struct value *
4289ada_read_renaming_var_value (struct symbol *renaming_sym,
4290 const struct block *block)
4291{
4292 const char *sym_name;
4293
987012b8 4294 sym_name = renaming_sym->linkage_name ();
de93309a
SM
4295 expression_up expr = parse_exp_1 (&sym_name, 0, block, 0);
4296 return evaluate_expression (expr.get ());
4297}
4298\f
4299
4300 /* Evaluation: Function Calls */
4301
4302/* Return an lvalue containing the value VAL. This is the identity on
4303 lvalues, and otherwise has the side-effect of allocating memory
4304 in the inferior where a copy of the value contents is copied. */
4305
4306static struct value *
4307ensure_lval (struct value *val)
4308{
4309 if (VALUE_LVAL (val) == not_lval
4310 || VALUE_LVAL (val) == lval_internalvar)
4311 {
4312 int len = TYPE_LENGTH (ada_check_typedef (value_type (val)));
4313 const CORE_ADDR addr =
4314 value_as_long (value_allocate_space_in_inferior (len));
4315
4316 VALUE_LVAL (val) = lval_memory;
4317 set_value_address (val, addr);
4318 write_memory (addr, value_contents (val), len);
4319 }
4320
4321 return val;
4322}
4323
4324/* Given ARG, a value of type (pointer or reference to a)*
4325 structure/union, extract the component named NAME from the ultimate
4326 target structure/union and return it as a value with its
4327 appropriate type.
4328
4329 The routine searches for NAME among all members of the structure itself
4330 and (recursively) among all members of any wrapper members
4331 (e.g., '_parent').
4332
4333 If NO_ERR, then simply return NULL in case of error, rather than
4334 calling error. */
4335
4336static struct value *
4337ada_value_struct_elt (struct value *arg, const char *name, int no_err)
4338{
4339 struct type *t, *t1;
4340 struct value *v;
4341 int check_tag;
4342
4343 v = NULL;
4344 t1 = t = ada_check_typedef (value_type (arg));
4345 if (TYPE_CODE (t) == TYPE_CODE_REF)
4346 {
4347 t1 = TYPE_TARGET_TYPE (t);
4348 if (t1 == NULL)
4349 goto BadValue;
4350 t1 = ada_check_typedef (t1);
4351 if (TYPE_CODE (t1) == TYPE_CODE_PTR)
4352 {
4353 arg = coerce_ref (arg);
4354 t = t1;
4355 }
4356 }
4357
4358 while (TYPE_CODE (t) == TYPE_CODE_PTR)
4359 {
4360 t1 = TYPE_TARGET_TYPE (t);
4361 if (t1 == NULL)
4362 goto BadValue;
4363 t1 = ada_check_typedef (t1);
4364 if (TYPE_CODE (t1) == TYPE_CODE_PTR)
4365 {
4366 arg = value_ind (arg);
4367 t = t1;
4368 }
4369 else
4370 break;
4371 }
aeb5907d 4372
de93309a
SM
4373 if (TYPE_CODE (t1) != TYPE_CODE_STRUCT && TYPE_CODE (t1) != TYPE_CODE_UNION)
4374 goto BadValue;
52ce6436 4375
de93309a
SM
4376 if (t1 == t)
4377 v = ada_search_struct_field (name, arg, 0, t);
4378 else
4379 {
4380 int bit_offset, bit_size, byte_offset;
4381 struct type *field_type;
4382 CORE_ADDR address;
a5ee536b 4383
de93309a
SM
4384 if (TYPE_CODE (t) == TYPE_CODE_PTR)
4385 address = value_address (ada_value_ind (arg));
4386 else
4387 address = value_address (ada_coerce_ref (arg));
d2e4a39e 4388
de93309a
SM
4389 /* Check to see if this is a tagged type. We also need to handle
4390 the case where the type is a reference to a tagged type, but
4391 we have to be careful to exclude pointers to tagged types.
4392 The latter should be shown as usual (as a pointer), whereas
4393 a reference should mostly be transparent to the user. */
14f9c5c9 4394
de93309a
SM
4395 if (ada_is_tagged_type (t1, 0)
4396 || (TYPE_CODE (t1) == TYPE_CODE_REF
4397 && ada_is_tagged_type (TYPE_TARGET_TYPE (t1), 0)))
4398 {
4399 /* We first try to find the searched field in the current type.
4400 If not found then let's look in the fixed type. */
14f9c5c9 4401
de93309a
SM
4402 if (!find_struct_field (name, t1, 0,
4403 &field_type, &byte_offset, &bit_offset,
4404 &bit_size, NULL))
4405 check_tag = 1;
4406 else
4407 check_tag = 0;
4408 }
4409 else
4410 check_tag = 0;
c3e5cd34 4411
de93309a
SM
4412 /* Convert to fixed type in all cases, so that we have proper
4413 offsets to each field in unconstrained record types. */
4414 t1 = ada_to_fixed_type (ada_get_base_type (t1), NULL,
4415 address, NULL, check_tag);
4416
4417 if (find_struct_field (name, t1, 0,
4418 &field_type, &byte_offset, &bit_offset,
4419 &bit_size, NULL))
4420 {
4421 if (bit_size != 0)
4422 {
4423 if (TYPE_CODE (t) == TYPE_CODE_REF)
4424 arg = ada_coerce_ref (arg);
4425 else
4426 arg = ada_value_ind (arg);
4427 v = ada_value_primitive_packed_val (arg, NULL, byte_offset,
4428 bit_offset, bit_size,
4429 field_type);
4430 }
4431 else
4432 v = value_at_lazy (field_type, address + byte_offset);
4433 }
c3e5cd34 4434 }
14f9c5c9 4435
de93309a
SM
4436 if (v != NULL || no_err)
4437 return v;
4438 else
4439 error (_("There is no member named %s."), name);
4440
4441 BadValue:
4442 if (no_err)
4443 return NULL;
4444 else
4445 error (_("Attempt to extract a component of "
4446 "a value that is not a record."));
14f9c5c9
AS
4447}
4448
4449/* Return the value ACTUAL, converted to be an appropriate value for a
4450 formal of type FORMAL_TYPE. Use *SP as a stack pointer for
4451 allocating any necessary descriptors (fat pointers), or copies of
4c4b4cd2 4452 values not residing in memory, updating it as needed. */
14f9c5c9 4453
a93c0eb6 4454struct value *
40bc484c 4455ada_convert_actual (struct value *actual, struct type *formal_type0)
14f9c5c9 4456{
df407dfe 4457 struct type *actual_type = ada_check_typedef (value_type (actual));
61ee279c 4458 struct type *formal_type = ada_check_typedef (formal_type0);
d2e4a39e
AS
4459 struct type *formal_target =
4460 TYPE_CODE (formal_type) == TYPE_CODE_PTR
61ee279c 4461 ? ada_check_typedef (TYPE_TARGET_TYPE (formal_type)) : formal_type;
d2e4a39e
AS
4462 struct type *actual_target =
4463 TYPE_CODE (actual_type) == TYPE_CODE_PTR
61ee279c 4464 ? ada_check_typedef (TYPE_TARGET_TYPE (actual_type)) : actual_type;
14f9c5c9 4465
4c4b4cd2 4466 if (ada_is_array_descriptor_type (formal_target)
14f9c5c9 4467 && TYPE_CODE (actual_target) == TYPE_CODE_ARRAY)
40bc484c 4468 return make_array_descriptor (formal_type, actual);
a84a8a0d
JB
4469 else if (TYPE_CODE (formal_type) == TYPE_CODE_PTR
4470 || TYPE_CODE (formal_type) == TYPE_CODE_REF)
14f9c5c9 4471 {
a84a8a0d 4472 struct value *result;
5b4ee69b 4473
14f9c5c9 4474 if (TYPE_CODE (formal_target) == TYPE_CODE_ARRAY
4c4b4cd2 4475 && ada_is_array_descriptor_type (actual_target))
a84a8a0d 4476 result = desc_data (actual);
cb923fcc 4477 else if (TYPE_CODE (formal_type) != TYPE_CODE_PTR)
4c4b4cd2
PH
4478 {
4479 if (VALUE_LVAL (actual) != lval_memory)
4480 {
4481 struct value *val;
5b4ee69b 4482
df407dfe 4483 actual_type = ada_check_typedef (value_type (actual));
4c4b4cd2 4484 val = allocate_value (actual_type);
990a07ab 4485 memcpy ((char *) value_contents_raw (val),
0fd88904 4486 (char *) value_contents (actual),
4c4b4cd2 4487 TYPE_LENGTH (actual_type));
40bc484c 4488 actual = ensure_lval (val);
4c4b4cd2 4489 }
a84a8a0d 4490 result = value_addr (actual);
4c4b4cd2 4491 }
a84a8a0d
JB
4492 else
4493 return actual;
b1af9e97 4494 return value_cast_pointers (formal_type, result, 0);
14f9c5c9
AS
4495 }
4496 else if (TYPE_CODE (actual_type) == TYPE_CODE_PTR)
4497 return ada_value_ind (actual);
8344af1e
JB
4498 else if (ada_is_aligner_type (formal_type))
4499 {
4500 /* We need to turn this parameter into an aligner type
4501 as well. */
4502 struct value *aligner = allocate_value (formal_type);
4503 struct value *component = ada_value_struct_elt (aligner, "F", 0);
4504
4505 value_assign_to_component (aligner, component, actual);
4506 return aligner;
4507 }
14f9c5c9
AS
4508
4509 return actual;
4510}
4511
438c98a1
JB
4512/* Convert VALUE (which must be an address) to a CORE_ADDR that is a pointer of
4513 type TYPE. This is usually an inefficient no-op except on some targets
4514 (such as AVR) where the representation of a pointer and an address
4515 differs. */
4516
4517static CORE_ADDR
4518value_pointer (struct value *value, struct type *type)
4519{
4520 struct gdbarch *gdbarch = get_type_arch (type);
4521 unsigned len = TYPE_LENGTH (type);
224c3ddb 4522 gdb_byte *buf = (gdb_byte *) alloca (len);
438c98a1
JB
4523 CORE_ADDR addr;
4524
4525 addr = value_address (value);
4526 gdbarch_address_to_pointer (gdbarch, type, buf, addr);
34877895 4527 addr = extract_unsigned_integer (buf, len, type_byte_order (type));
438c98a1
JB
4528 return addr;
4529}
4530
14f9c5c9 4531
4c4b4cd2
PH
4532/* Push a descriptor of type TYPE for array value ARR on the stack at
4533 *SP, updating *SP to reflect the new descriptor. Return either
14f9c5c9 4534 an lvalue representing the new descriptor, or (if TYPE is a pointer-
4c4b4cd2
PH
4535 to-descriptor type rather than a descriptor type), a struct value *
4536 representing a pointer to this descriptor. */
14f9c5c9 4537
d2e4a39e 4538static struct value *
40bc484c 4539make_array_descriptor (struct type *type, struct value *arr)
14f9c5c9 4540{
d2e4a39e
AS
4541 struct type *bounds_type = desc_bounds_type (type);
4542 struct type *desc_type = desc_base_type (type);
4543 struct value *descriptor = allocate_value (desc_type);
4544 struct value *bounds = allocate_value (bounds_type);
14f9c5c9 4545 int i;
d2e4a39e 4546
0963b4bd
MS
4547 for (i = ada_array_arity (ada_check_typedef (value_type (arr)));
4548 i > 0; i -= 1)
14f9c5c9 4549 {
19f220c3
JK
4550 modify_field (value_type (bounds), value_contents_writeable (bounds),
4551 ada_array_bound (arr, i, 0),
4552 desc_bound_bitpos (bounds_type, i, 0),
4553 desc_bound_bitsize (bounds_type, i, 0));
4554 modify_field (value_type (bounds), value_contents_writeable (bounds),
4555 ada_array_bound (arr, i, 1),
4556 desc_bound_bitpos (bounds_type, i, 1),
4557 desc_bound_bitsize (bounds_type, i, 1));
14f9c5c9 4558 }
d2e4a39e 4559
40bc484c 4560 bounds = ensure_lval (bounds);
d2e4a39e 4561
19f220c3
JK
4562 modify_field (value_type (descriptor),
4563 value_contents_writeable (descriptor),
4564 value_pointer (ensure_lval (arr),
4565 TYPE_FIELD_TYPE (desc_type, 0)),
4566 fat_pntr_data_bitpos (desc_type),
4567 fat_pntr_data_bitsize (desc_type));
4568
4569 modify_field (value_type (descriptor),
4570 value_contents_writeable (descriptor),
4571 value_pointer (bounds,
4572 TYPE_FIELD_TYPE (desc_type, 1)),
4573 fat_pntr_bounds_bitpos (desc_type),
4574 fat_pntr_bounds_bitsize (desc_type));
14f9c5c9 4575
40bc484c 4576 descriptor = ensure_lval (descriptor);
14f9c5c9
AS
4577
4578 if (TYPE_CODE (type) == TYPE_CODE_PTR)
4579 return value_addr (descriptor);
4580 else
4581 return descriptor;
4582}
14f9c5c9 4583\f
3d9434b5
JB
4584 /* Symbol Cache Module */
4585
3d9434b5 4586/* Performance measurements made as of 2010-01-15 indicate that
ee01b665 4587 this cache does bring some noticeable improvements. Depending
3d9434b5
JB
4588 on the type of entity being printed, the cache can make it as much
4589 as an order of magnitude faster than without it.
4590
4591 The descriptive type DWARF extension has significantly reduced
4592 the need for this cache, at least when DWARF is being used. However,
4593 even in this case, some expensive name-based symbol searches are still
4594 sometimes necessary - to find an XVZ variable, mostly. */
4595
ee01b665 4596/* Initialize the contents of SYM_CACHE. */
3d9434b5 4597
ee01b665
JB
4598static void
4599ada_init_symbol_cache (struct ada_symbol_cache *sym_cache)
4600{
4601 obstack_init (&sym_cache->cache_space);
4602 memset (sym_cache->root, '\000', sizeof (sym_cache->root));
4603}
3d9434b5 4604
ee01b665
JB
4605/* Free the memory used by SYM_CACHE. */
4606
4607static void
4608ada_free_symbol_cache (struct ada_symbol_cache *sym_cache)
3d9434b5 4609{
ee01b665
JB
4610 obstack_free (&sym_cache->cache_space, NULL);
4611 xfree (sym_cache);
4612}
3d9434b5 4613
ee01b665
JB
4614/* Return the symbol cache associated to the given program space PSPACE.
4615 If not allocated for this PSPACE yet, allocate and initialize one. */
3d9434b5 4616
ee01b665
JB
4617static struct ada_symbol_cache *
4618ada_get_symbol_cache (struct program_space *pspace)
4619{
4620 struct ada_pspace_data *pspace_data = get_ada_pspace_data (pspace);
ee01b665 4621
66c168ae 4622 if (pspace_data->sym_cache == NULL)
ee01b665 4623 {
66c168ae
JB
4624 pspace_data->sym_cache = XCNEW (struct ada_symbol_cache);
4625 ada_init_symbol_cache (pspace_data->sym_cache);
ee01b665
JB
4626 }
4627
66c168ae 4628 return pspace_data->sym_cache;
ee01b665 4629}
3d9434b5
JB
4630
4631/* Clear all entries from the symbol cache. */
4632
4633static void
4634ada_clear_symbol_cache (void)
4635{
ee01b665
JB
4636 struct ada_symbol_cache *sym_cache
4637 = ada_get_symbol_cache (current_program_space);
4638
4639 obstack_free (&sym_cache->cache_space, NULL);
4640 ada_init_symbol_cache (sym_cache);
3d9434b5
JB
4641}
4642
fe978cb0 4643/* Search our cache for an entry matching NAME and DOMAIN.
3d9434b5
JB
4644 Return it if found, or NULL otherwise. */
4645
4646static struct cache_entry **
fe978cb0 4647find_entry (const char *name, domain_enum domain)
3d9434b5 4648{
ee01b665
JB
4649 struct ada_symbol_cache *sym_cache
4650 = ada_get_symbol_cache (current_program_space);
3d9434b5
JB
4651 int h = msymbol_hash (name) % HASH_SIZE;
4652 struct cache_entry **e;
4653
ee01b665 4654 for (e = &sym_cache->root[h]; *e != NULL; e = &(*e)->next)
3d9434b5 4655 {
fe978cb0 4656 if (domain == (*e)->domain && strcmp (name, (*e)->name) == 0)
3d9434b5
JB
4657 return e;
4658 }
4659 return NULL;
4660}
4661
fe978cb0 4662/* Search the symbol cache for an entry matching NAME and DOMAIN.
3d9434b5
JB
4663 Return 1 if found, 0 otherwise.
4664
4665 If an entry was found and SYM is not NULL, set *SYM to the entry's
4666 SYM. Same principle for BLOCK if not NULL. */
96d887e8 4667
96d887e8 4668static int
fe978cb0 4669lookup_cached_symbol (const char *name, domain_enum domain,
f0c5f9b2 4670 struct symbol **sym, const struct block **block)
96d887e8 4671{
fe978cb0 4672 struct cache_entry **e = find_entry (name, domain);
3d9434b5
JB
4673
4674 if (e == NULL)
4675 return 0;
4676 if (sym != NULL)
4677 *sym = (*e)->sym;
4678 if (block != NULL)
4679 *block = (*e)->block;
4680 return 1;
96d887e8
PH
4681}
4682
3d9434b5 4683/* Assuming that (SYM, BLOCK) is the result of the lookup of NAME
fe978cb0 4684 in domain DOMAIN, save this result in our symbol cache. */
3d9434b5 4685
96d887e8 4686static void
fe978cb0 4687cache_symbol (const char *name, domain_enum domain, struct symbol *sym,
270140bd 4688 const struct block *block)
96d887e8 4689{
ee01b665
JB
4690 struct ada_symbol_cache *sym_cache
4691 = ada_get_symbol_cache (current_program_space);
3d9434b5 4692 int h;
3d9434b5
JB
4693 struct cache_entry *e;
4694
1994afbf
DE
4695 /* Symbols for builtin types don't have a block.
4696 For now don't cache such symbols. */
4697 if (sym != NULL && !SYMBOL_OBJFILE_OWNED (sym))
4698 return;
4699
3d9434b5
JB
4700 /* If the symbol is a local symbol, then do not cache it, as a search
4701 for that symbol depends on the context. To determine whether
4702 the symbol is local or not, we check the block where we found it
4703 against the global and static blocks of its associated symtab. */
4704 if (sym
08be3fe3 4705 && BLOCKVECTOR_BLOCK (SYMTAB_BLOCKVECTOR (symbol_symtab (sym)),
439247b6 4706 GLOBAL_BLOCK) != block
08be3fe3 4707 && BLOCKVECTOR_BLOCK (SYMTAB_BLOCKVECTOR (symbol_symtab (sym)),
439247b6 4708 STATIC_BLOCK) != block)
3d9434b5
JB
4709 return;
4710
4711 h = msymbol_hash (name) % HASH_SIZE;
e39db4db 4712 e = XOBNEW (&sym_cache->cache_space, cache_entry);
ee01b665
JB
4713 e->next = sym_cache->root[h];
4714 sym_cache->root[h] = e;
2ef5453b 4715 e->name = obstack_strdup (&sym_cache->cache_space, name);
3d9434b5 4716 e->sym = sym;
fe978cb0 4717 e->domain = domain;
3d9434b5 4718 e->block = block;
96d887e8 4719}
4c4b4cd2
PH
4720\f
4721 /* Symbol Lookup */
4722
b5ec771e
PA
4723/* Return the symbol name match type that should be used used when
4724 searching for all symbols matching LOOKUP_NAME.
c0431670
JB
4725
4726 LOOKUP_NAME is expected to be a symbol name after transformation
f98b2e33 4727 for Ada lookups. */
c0431670 4728
b5ec771e
PA
4729static symbol_name_match_type
4730name_match_type_from_name (const char *lookup_name)
c0431670 4731{
b5ec771e
PA
4732 return (strstr (lookup_name, "__") == NULL
4733 ? symbol_name_match_type::WILD
4734 : symbol_name_match_type::FULL);
c0431670
JB
4735}
4736
4c4b4cd2
PH
4737/* Return the result of a standard (literal, C-like) lookup of NAME in
4738 given DOMAIN, visible from lexical block BLOCK. */
4739
4740static struct symbol *
4741standard_lookup (const char *name, const struct block *block,
4742 domain_enum domain)
4743{
acbd605d 4744 /* Initialize it just to avoid a GCC false warning. */
6640a367 4745 struct block_symbol sym = {};
4c4b4cd2 4746
d12307c1
PMR
4747 if (lookup_cached_symbol (name, domain, &sym.symbol, NULL))
4748 return sym.symbol;
a2cd4f14 4749 ada_lookup_encoded_symbol (name, block, domain, &sym);
d12307c1
PMR
4750 cache_symbol (name, domain, sym.symbol, sym.block);
4751 return sym.symbol;
4c4b4cd2
PH
4752}
4753
4754
4755/* Non-zero iff there is at least one non-function/non-enumeral symbol
4756 in the symbol fields of SYMS[0..N-1]. We treat enumerals as functions,
4757 since they contend in overloading in the same way. */
4758static int
d12307c1 4759is_nonfunction (struct block_symbol syms[], int n)
4c4b4cd2
PH
4760{
4761 int i;
4762
4763 for (i = 0; i < n; i += 1)
d12307c1
PMR
4764 if (TYPE_CODE (SYMBOL_TYPE (syms[i].symbol)) != TYPE_CODE_FUNC
4765 && (TYPE_CODE (SYMBOL_TYPE (syms[i].symbol)) != TYPE_CODE_ENUM
4766 || SYMBOL_CLASS (syms[i].symbol) != LOC_CONST))
14f9c5c9
AS
4767 return 1;
4768
4769 return 0;
4770}
4771
4772/* If true (non-zero), then TYPE0 and TYPE1 represent equivalent
4c4b4cd2 4773 struct types. Otherwise, they may not. */
14f9c5c9
AS
4774
4775static int
d2e4a39e 4776equiv_types (struct type *type0, struct type *type1)
14f9c5c9 4777{
d2e4a39e 4778 if (type0 == type1)
14f9c5c9 4779 return 1;
d2e4a39e 4780 if (type0 == NULL || type1 == NULL
14f9c5c9
AS
4781 || TYPE_CODE (type0) != TYPE_CODE (type1))
4782 return 0;
d2e4a39e 4783 if ((TYPE_CODE (type0) == TYPE_CODE_STRUCT
14f9c5c9
AS
4784 || TYPE_CODE (type0) == TYPE_CODE_ENUM)
4785 && ada_type_name (type0) != NULL && ada_type_name (type1) != NULL
4c4b4cd2 4786 && strcmp (ada_type_name (type0), ada_type_name (type1)) == 0)
14f9c5c9 4787 return 1;
d2e4a39e 4788
14f9c5c9
AS
4789 return 0;
4790}
4791
4792/* True iff SYM0 represents the same entity as SYM1, or one that is
4c4b4cd2 4793 no more defined than that of SYM1. */
14f9c5c9
AS
4794
4795static int
d2e4a39e 4796lesseq_defined_than (struct symbol *sym0, struct symbol *sym1)
14f9c5c9
AS
4797{
4798 if (sym0 == sym1)
4799 return 1;
176620f1 4800 if (SYMBOL_DOMAIN (sym0) != SYMBOL_DOMAIN (sym1)
14f9c5c9
AS
4801 || SYMBOL_CLASS (sym0) != SYMBOL_CLASS (sym1))
4802 return 0;
4803
d2e4a39e 4804 switch (SYMBOL_CLASS (sym0))
14f9c5c9
AS
4805 {
4806 case LOC_UNDEF:
4807 return 1;
4808 case LOC_TYPEDEF:
4809 {
4c4b4cd2
PH
4810 struct type *type0 = SYMBOL_TYPE (sym0);
4811 struct type *type1 = SYMBOL_TYPE (sym1);
987012b8
CB
4812 const char *name0 = sym0->linkage_name ();
4813 const char *name1 = sym1->linkage_name ();
4c4b4cd2 4814 int len0 = strlen (name0);
5b4ee69b 4815
4c4b4cd2
PH
4816 return
4817 TYPE_CODE (type0) == TYPE_CODE (type1)
4818 && (equiv_types (type0, type1)
4819 || (len0 < strlen (name1) && strncmp (name0, name1, len0) == 0
61012eef 4820 && startswith (name1 + len0, "___XV")));
14f9c5c9
AS
4821 }
4822 case LOC_CONST:
4823 return SYMBOL_VALUE (sym0) == SYMBOL_VALUE (sym1)
4c4b4cd2 4824 && equiv_types (SYMBOL_TYPE (sym0), SYMBOL_TYPE (sym1));
4b610737
TT
4825
4826 case LOC_STATIC:
4827 {
987012b8
CB
4828 const char *name0 = sym0->linkage_name ();
4829 const char *name1 = sym1->linkage_name ();
4b610737
TT
4830 return (strcmp (name0, name1) == 0
4831 && SYMBOL_VALUE_ADDRESS (sym0) == SYMBOL_VALUE_ADDRESS (sym1));
4832 }
4833
d2e4a39e
AS
4834 default:
4835 return 0;
14f9c5c9
AS
4836 }
4837}
4838
d12307c1 4839/* Append (SYM,BLOCK,SYMTAB) to the end of the array of struct block_symbol
4c4b4cd2 4840 records in OBSTACKP. Do nothing if SYM is a duplicate. */
14f9c5c9
AS
4841
4842static void
76a01679
JB
4843add_defn_to_vec (struct obstack *obstackp,
4844 struct symbol *sym,
f0c5f9b2 4845 const struct block *block)
14f9c5c9
AS
4846{
4847 int i;
d12307c1 4848 struct block_symbol *prevDefns = defns_collected (obstackp, 0);
14f9c5c9 4849
529cad9c
PH
4850 /* Do not try to complete stub types, as the debugger is probably
4851 already scanning all symbols matching a certain name at the
4852 time when this function is called. Trying to replace the stub
4853 type by its associated full type will cause us to restart a scan
4854 which may lead to an infinite recursion. Instead, the client
4855 collecting the matching symbols will end up collecting several
4856 matches, with at least one of them complete. It can then filter
4857 out the stub ones if needed. */
4858
4c4b4cd2
PH
4859 for (i = num_defns_collected (obstackp) - 1; i >= 0; i -= 1)
4860 {
d12307c1 4861 if (lesseq_defined_than (sym, prevDefns[i].symbol))
4c4b4cd2 4862 return;
d12307c1 4863 else if (lesseq_defined_than (prevDefns[i].symbol, sym))
4c4b4cd2 4864 {
d12307c1 4865 prevDefns[i].symbol = sym;
4c4b4cd2 4866 prevDefns[i].block = block;
4c4b4cd2 4867 return;
76a01679 4868 }
4c4b4cd2
PH
4869 }
4870
4871 {
d12307c1 4872 struct block_symbol info;
4c4b4cd2 4873
d12307c1 4874 info.symbol = sym;
4c4b4cd2 4875 info.block = block;
d12307c1 4876 obstack_grow (obstackp, &info, sizeof (struct block_symbol));
4c4b4cd2
PH
4877 }
4878}
4879
d12307c1
PMR
4880/* Number of block_symbol structures currently collected in current vector in
4881 OBSTACKP. */
4c4b4cd2 4882
76a01679
JB
4883static int
4884num_defns_collected (struct obstack *obstackp)
4c4b4cd2 4885{
d12307c1 4886 return obstack_object_size (obstackp) / sizeof (struct block_symbol);
4c4b4cd2
PH
4887}
4888
d12307c1
PMR
4889/* Vector of block_symbol structures currently collected in current vector in
4890 OBSTACKP. If FINISH, close off the vector and return its final address. */
4c4b4cd2 4891
d12307c1 4892static struct block_symbol *
4c4b4cd2
PH
4893defns_collected (struct obstack *obstackp, int finish)
4894{
4895 if (finish)
224c3ddb 4896 return (struct block_symbol *) obstack_finish (obstackp);
4c4b4cd2 4897 else
d12307c1 4898 return (struct block_symbol *) obstack_base (obstackp);
4c4b4cd2
PH
4899}
4900
7c7b6655
TT
4901/* Return a bound minimal symbol matching NAME according to Ada
4902 decoding rules. Returns an invalid symbol if there is no such
4903 minimal symbol. Names prefixed with "standard__" are handled
4904 specially: "standard__" is first stripped off, and only static and
4905 global symbols are searched. */
4c4b4cd2 4906
7c7b6655 4907struct bound_minimal_symbol
96d887e8 4908ada_lookup_simple_minsym (const char *name)
4c4b4cd2 4909{
7c7b6655 4910 struct bound_minimal_symbol result;
4c4b4cd2 4911
7c7b6655
TT
4912 memset (&result, 0, sizeof (result));
4913
b5ec771e
PA
4914 symbol_name_match_type match_type = name_match_type_from_name (name);
4915 lookup_name_info lookup_name (name, match_type);
4916
4917 symbol_name_matcher_ftype *match_name
4918 = ada_get_symbol_name_matcher (lookup_name);
4c4b4cd2 4919
2030c079 4920 for (objfile *objfile : current_program_space->objfiles ())
5325b9bf 4921 {
7932255d 4922 for (minimal_symbol *msymbol : objfile->msymbols ())
5325b9bf 4923 {
c9d95fa3 4924 if (match_name (msymbol->linkage_name (), lookup_name, NULL)
5325b9bf
TT
4925 && MSYMBOL_TYPE (msymbol) != mst_solib_trampoline)
4926 {
4927 result.minsym = msymbol;
4928 result.objfile = objfile;
4929 break;
4930 }
4931 }
4932 }
4c4b4cd2 4933
7c7b6655 4934 return result;
96d887e8 4935}
4c4b4cd2 4936
96d887e8
PH
4937/* For all subprograms that statically enclose the subprogram of the
4938 selected frame, add symbols matching identifier NAME in DOMAIN
4939 and their blocks to the list of data in OBSTACKP, as for
48b78332
JB
4940 ada_add_block_symbols (q.v.). If WILD_MATCH_P, treat as NAME
4941 with a wildcard prefix. */
4c4b4cd2 4942
96d887e8
PH
4943static void
4944add_symbols_from_enclosing_procs (struct obstack *obstackp,
b5ec771e
PA
4945 const lookup_name_info &lookup_name,
4946 domain_enum domain)
96d887e8 4947{
96d887e8 4948}
14f9c5c9 4949
96d887e8
PH
4950/* True if TYPE is definitely an artificial type supplied to a symbol
4951 for which no debugging information was given in the symbol file. */
14f9c5c9 4952
96d887e8
PH
4953static int
4954is_nondebugging_type (struct type *type)
4955{
0d5cff50 4956 const char *name = ada_type_name (type);
5b4ee69b 4957
96d887e8
PH
4958 return (name != NULL && strcmp (name, "<variable, no debug info>") == 0);
4959}
4c4b4cd2 4960
8f17729f
JB
4961/* Return nonzero if TYPE1 and TYPE2 are two enumeration types
4962 that are deemed "identical" for practical purposes.
4963
4964 This function assumes that TYPE1 and TYPE2 are both TYPE_CODE_ENUM
4965 types and that their number of enumerals is identical (in other
4966 words, TYPE_NFIELDS (type1) == TYPE_NFIELDS (type2)). */
4967
4968static int
4969ada_identical_enum_types_p (struct type *type1, struct type *type2)
4970{
4971 int i;
4972
4973 /* The heuristic we use here is fairly conservative. We consider
4974 that 2 enumerate types are identical if they have the same
4975 number of enumerals and that all enumerals have the same
4976 underlying value and name. */
4977
4978 /* All enums in the type should have an identical underlying value. */
4979 for (i = 0; i < TYPE_NFIELDS (type1); i++)
14e75d8e 4980 if (TYPE_FIELD_ENUMVAL (type1, i) != TYPE_FIELD_ENUMVAL (type2, i))
8f17729f
JB
4981 return 0;
4982
4983 /* All enumerals should also have the same name (modulo any numerical
4984 suffix). */
4985 for (i = 0; i < TYPE_NFIELDS (type1); i++)
4986 {
0d5cff50
DE
4987 const char *name_1 = TYPE_FIELD_NAME (type1, i);
4988 const char *name_2 = TYPE_FIELD_NAME (type2, i);
8f17729f
JB
4989 int len_1 = strlen (name_1);
4990 int len_2 = strlen (name_2);
4991
4992 ada_remove_trailing_digits (TYPE_FIELD_NAME (type1, i), &len_1);
4993 ada_remove_trailing_digits (TYPE_FIELD_NAME (type2, i), &len_2);
4994 if (len_1 != len_2
4995 || strncmp (TYPE_FIELD_NAME (type1, i),
4996 TYPE_FIELD_NAME (type2, i),
4997 len_1) != 0)
4998 return 0;
4999 }
5000
5001 return 1;
5002}
5003
5004/* Return nonzero if all the symbols in SYMS are all enumeral symbols
5005 that are deemed "identical" for practical purposes. Sometimes,
5006 enumerals are not strictly identical, but their types are so similar
5007 that they can be considered identical.
5008
5009 For instance, consider the following code:
5010
5011 type Color is (Black, Red, Green, Blue, White);
5012 type RGB_Color is new Color range Red .. Blue;
5013
5014 Type RGB_Color is a subrange of an implicit type which is a copy
5015 of type Color. If we call that implicit type RGB_ColorB ("B" is
5016 for "Base Type"), then type RGB_ColorB is a copy of type Color.
5017 As a result, when an expression references any of the enumeral
5018 by name (Eg. "print green"), the expression is technically
5019 ambiguous and the user should be asked to disambiguate. But
5020 doing so would only hinder the user, since it wouldn't matter
5021 what choice he makes, the outcome would always be the same.
5022 So, for practical purposes, we consider them as the same. */
5023
5024static int
54d343a2 5025symbols_are_identical_enums (const std::vector<struct block_symbol> &syms)
8f17729f
JB
5026{
5027 int i;
5028
5029 /* Before performing a thorough comparison check of each type,
5030 we perform a series of inexpensive checks. We expect that these
5031 checks will quickly fail in the vast majority of cases, and thus
5032 help prevent the unnecessary use of a more expensive comparison.
5033 Said comparison also expects us to make some of these checks
5034 (see ada_identical_enum_types_p). */
5035
5036 /* Quick check: All symbols should have an enum type. */
54d343a2 5037 for (i = 0; i < syms.size (); i++)
d12307c1 5038 if (TYPE_CODE (SYMBOL_TYPE (syms[i].symbol)) != TYPE_CODE_ENUM)
8f17729f
JB
5039 return 0;
5040
5041 /* Quick check: They should all have the same value. */
54d343a2 5042 for (i = 1; i < syms.size (); i++)
d12307c1 5043 if (SYMBOL_VALUE (syms[i].symbol) != SYMBOL_VALUE (syms[0].symbol))
8f17729f
JB
5044 return 0;
5045
5046 /* Quick check: They should all have the same number of enumerals. */
54d343a2 5047 for (i = 1; i < syms.size (); i++)
d12307c1
PMR
5048 if (TYPE_NFIELDS (SYMBOL_TYPE (syms[i].symbol))
5049 != TYPE_NFIELDS (SYMBOL_TYPE (syms[0].symbol)))
8f17729f
JB
5050 return 0;
5051
5052 /* All the sanity checks passed, so we might have a set of
5053 identical enumeration types. Perform a more complete
5054 comparison of the type of each symbol. */
54d343a2 5055 for (i = 1; i < syms.size (); i++)
d12307c1
PMR
5056 if (!ada_identical_enum_types_p (SYMBOL_TYPE (syms[i].symbol),
5057 SYMBOL_TYPE (syms[0].symbol)))
8f17729f
JB
5058 return 0;
5059
5060 return 1;
5061}
5062
54d343a2 5063/* Remove any non-debugging symbols in SYMS that definitely
96d887e8
PH
5064 duplicate other symbols in the list (The only case I know of where
5065 this happens is when object files containing stabs-in-ecoff are
5066 linked with files containing ordinary ecoff debugging symbols (or no
5067 debugging symbols)). Modifies SYMS to squeeze out deleted entries.
5068 Returns the number of items in the modified list. */
4c4b4cd2 5069
96d887e8 5070static int
54d343a2 5071remove_extra_symbols (std::vector<struct block_symbol> *syms)
96d887e8
PH
5072{
5073 int i, j;
4c4b4cd2 5074
8f17729f
JB
5075 /* We should never be called with less than 2 symbols, as there
5076 cannot be any extra symbol in that case. But it's easy to
5077 handle, since we have nothing to do in that case. */
54d343a2
TT
5078 if (syms->size () < 2)
5079 return syms->size ();
8f17729f 5080
96d887e8 5081 i = 0;
54d343a2 5082 while (i < syms->size ())
96d887e8 5083 {
a35ddb44 5084 int remove_p = 0;
339c13b6
JB
5085
5086 /* If two symbols have the same name and one of them is a stub type,
5087 the get rid of the stub. */
5088
54d343a2 5089 if (TYPE_STUB (SYMBOL_TYPE ((*syms)[i].symbol))
987012b8 5090 && (*syms)[i].symbol->linkage_name () != NULL)
339c13b6 5091 {
54d343a2 5092 for (j = 0; j < syms->size (); j++)
339c13b6
JB
5093 {
5094 if (j != i
54d343a2 5095 && !TYPE_STUB (SYMBOL_TYPE ((*syms)[j].symbol))
987012b8
CB
5096 && (*syms)[j].symbol->linkage_name () != NULL
5097 && strcmp ((*syms)[i].symbol->linkage_name (),
5098 (*syms)[j].symbol->linkage_name ()) == 0)
a35ddb44 5099 remove_p = 1;
339c13b6
JB
5100 }
5101 }
5102
5103 /* Two symbols with the same name, same class and same address
5104 should be identical. */
5105
987012b8 5106 else if ((*syms)[i].symbol->linkage_name () != NULL
54d343a2
TT
5107 && SYMBOL_CLASS ((*syms)[i].symbol) == LOC_STATIC
5108 && is_nondebugging_type (SYMBOL_TYPE ((*syms)[i].symbol)))
96d887e8 5109 {
54d343a2 5110 for (j = 0; j < syms->size (); j += 1)
96d887e8
PH
5111 {
5112 if (i != j
987012b8
CB
5113 && (*syms)[j].symbol->linkage_name () != NULL
5114 && strcmp ((*syms)[i].symbol->linkage_name (),
5115 (*syms)[j].symbol->linkage_name ()) == 0
54d343a2
TT
5116 && SYMBOL_CLASS ((*syms)[i].symbol)
5117 == SYMBOL_CLASS ((*syms)[j].symbol)
5118 && SYMBOL_VALUE_ADDRESS ((*syms)[i].symbol)
5119 == SYMBOL_VALUE_ADDRESS ((*syms)[j].symbol))
a35ddb44 5120 remove_p = 1;
4c4b4cd2 5121 }
4c4b4cd2 5122 }
339c13b6 5123
a35ddb44 5124 if (remove_p)
54d343a2 5125 syms->erase (syms->begin () + i);
339c13b6 5126
96d887e8 5127 i += 1;
14f9c5c9 5128 }
8f17729f
JB
5129
5130 /* If all the remaining symbols are identical enumerals, then
5131 just keep the first one and discard the rest.
5132
5133 Unlike what we did previously, we do not discard any entry
5134 unless they are ALL identical. This is because the symbol
5135 comparison is not a strict comparison, but rather a practical
5136 comparison. If all symbols are considered identical, then
5137 we can just go ahead and use the first one and discard the rest.
5138 But if we cannot reduce the list to a single element, we have
5139 to ask the user to disambiguate anyways. And if we have to
5140 present a multiple-choice menu, it's less confusing if the list
5141 isn't missing some choices that were identical and yet distinct. */
54d343a2
TT
5142 if (symbols_are_identical_enums (*syms))
5143 syms->resize (1);
8f17729f 5144
54d343a2 5145 return syms->size ();
14f9c5c9
AS
5146}
5147
96d887e8
PH
5148/* Given a type that corresponds to a renaming entity, use the type name
5149 to extract the scope (package name or function name, fully qualified,
5150 and following the GNAT encoding convention) where this renaming has been
49d83361 5151 defined. */
4c4b4cd2 5152
49d83361 5153static std::string
96d887e8 5154xget_renaming_scope (struct type *renaming_type)
14f9c5c9 5155{
96d887e8 5156 /* The renaming types adhere to the following convention:
0963b4bd 5157 <scope>__<rename>___<XR extension>.
96d887e8
PH
5158 So, to extract the scope, we search for the "___XR" extension,
5159 and then backtrack until we find the first "__". */
76a01679 5160
a737d952 5161 const char *name = TYPE_NAME (renaming_type);
108d56a4
SM
5162 const char *suffix = strstr (name, "___XR");
5163 const char *last;
14f9c5c9 5164
96d887e8
PH
5165 /* Now, backtrack a bit until we find the first "__". Start looking
5166 at suffix - 3, as the <rename> part is at least one character long. */
14f9c5c9 5167
96d887e8
PH
5168 for (last = suffix - 3; last > name; last--)
5169 if (last[0] == '_' && last[1] == '_')
5170 break;
76a01679 5171
96d887e8 5172 /* Make a copy of scope and return it. */
49d83361 5173 return std::string (name, last);
4c4b4cd2
PH
5174}
5175
96d887e8 5176/* Return nonzero if NAME corresponds to a package name. */
4c4b4cd2 5177
96d887e8
PH
5178static int
5179is_package_name (const char *name)
4c4b4cd2 5180{
96d887e8
PH
5181 /* Here, We take advantage of the fact that no symbols are generated
5182 for packages, while symbols are generated for each function.
5183 So the condition for NAME represent a package becomes equivalent
5184 to NAME not existing in our list of symbols. There is only one
5185 small complication with library-level functions (see below). */
4c4b4cd2 5186
96d887e8
PH
5187 /* If it is a function that has not been defined at library level,
5188 then we should be able to look it up in the symbols. */
5189 if (standard_lookup (name, NULL, VAR_DOMAIN) != NULL)
5190 return 0;
14f9c5c9 5191
96d887e8
PH
5192 /* Library-level function names start with "_ada_". See if function
5193 "_ada_" followed by NAME can be found. */
14f9c5c9 5194
96d887e8 5195 /* Do a quick check that NAME does not contain "__", since library-level
e1d5a0d2 5196 functions names cannot contain "__" in them. */
96d887e8
PH
5197 if (strstr (name, "__") != NULL)
5198 return 0;
4c4b4cd2 5199
528e1572 5200 std::string fun_name = string_printf ("_ada_%s", name);
14f9c5c9 5201
528e1572 5202 return (standard_lookup (fun_name.c_str (), NULL, VAR_DOMAIN) == NULL);
96d887e8 5203}
14f9c5c9 5204
96d887e8 5205/* Return nonzero if SYM corresponds to a renaming entity that is
aeb5907d 5206 not visible from FUNCTION_NAME. */
14f9c5c9 5207
96d887e8 5208static int
0d5cff50 5209old_renaming_is_invisible (const struct symbol *sym, const char *function_name)
96d887e8 5210{
aeb5907d
JB
5211 if (SYMBOL_CLASS (sym) != LOC_TYPEDEF)
5212 return 0;
5213
49d83361 5214 std::string scope = xget_renaming_scope (SYMBOL_TYPE (sym));
14f9c5c9 5215
96d887e8 5216 /* If the rename has been defined in a package, then it is visible. */
49d83361
TT
5217 if (is_package_name (scope.c_str ()))
5218 return 0;
14f9c5c9 5219
96d887e8
PH
5220 /* Check that the rename is in the current function scope by checking
5221 that its name starts with SCOPE. */
76a01679 5222
96d887e8
PH
5223 /* If the function name starts with "_ada_", it means that it is
5224 a library-level function. Strip this prefix before doing the
5225 comparison, as the encoding for the renaming does not contain
5226 this prefix. */
61012eef 5227 if (startswith (function_name, "_ada_"))
96d887e8 5228 function_name += 5;
f26caa11 5229
49d83361 5230 return !startswith (function_name, scope.c_str ());
f26caa11
PH
5231}
5232
aeb5907d
JB
5233/* Remove entries from SYMS that corresponds to a renaming entity that
5234 is not visible from the function associated with CURRENT_BLOCK or
5235 that is superfluous due to the presence of more specific renaming
5236 information. Places surviving symbols in the initial entries of
5237 SYMS and returns the number of surviving symbols.
96d887e8
PH
5238
5239 Rationale:
aeb5907d
JB
5240 First, in cases where an object renaming is implemented as a
5241 reference variable, GNAT may produce both the actual reference
5242 variable and the renaming encoding. In this case, we discard the
5243 latter.
5244
5245 Second, GNAT emits a type following a specified encoding for each renaming
96d887e8
PH
5246 entity. Unfortunately, STABS currently does not support the definition
5247 of types that are local to a given lexical block, so all renamings types
5248 are emitted at library level. As a consequence, if an application
5249 contains two renaming entities using the same name, and a user tries to
5250 print the value of one of these entities, the result of the ada symbol
5251 lookup will also contain the wrong renaming type.
f26caa11 5252
96d887e8
PH
5253 This function partially covers for this limitation by attempting to
5254 remove from the SYMS list renaming symbols that should be visible
5255 from CURRENT_BLOCK. However, there does not seem be a 100% reliable
5256 method with the current information available. The implementation
5257 below has a couple of limitations (FIXME: brobecker-2003-05-12):
5258
5259 - When the user tries to print a rename in a function while there
5260 is another rename entity defined in a package: Normally, the
5261 rename in the function has precedence over the rename in the
5262 package, so the latter should be removed from the list. This is
5263 currently not the case.
5264
5265 - This function will incorrectly remove valid renames if
5266 the CURRENT_BLOCK corresponds to a function which symbol name
5267 has been changed by an "Export" pragma. As a consequence,
5268 the user will be unable to print such rename entities. */
4c4b4cd2 5269
14f9c5c9 5270static int
54d343a2
TT
5271remove_irrelevant_renamings (std::vector<struct block_symbol> *syms,
5272 const struct block *current_block)
4c4b4cd2
PH
5273{
5274 struct symbol *current_function;
0d5cff50 5275 const char *current_function_name;
4c4b4cd2 5276 int i;
aeb5907d
JB
5277 int is_new_style_renaming;
5278
5279 /* If there is both a renaming foo___XR... encoded as a variable and
5280 a simple variable foo in the same block, discard the latter.
0963b4bd 5281 First, zero out such symbols, then compress. */
aeb5907d 5282 is_new_style_renaming = 0;
54d343a2 5283 for (i = 0; i < syms->size (); i += 1)
aeb5907d 5284 {
54d343a2
TT
5285 struct symbol *sym = (*syms)[i].symbol;
5286 const struct block *block = (*syms)[i].block;
aeb5907d
JB
5287 const char *name;
5288 const char *suffix;
5289
5290 if (sym == NULL || SYMBOL_CLASS (sym) == LOC_TYPEDEF)
5291 continue;
987012b8 5292 name = sym->linkage_name ();
aeb5907d
JB
5293 suffix = strstr (name, "___XR");
5294
5295 if (suffix != NULL)
5296 {
5297 int name_len = suffix - name;
5298 int j;
5b4ee69b 5299
aeb5907d 5300 is_new_style_renaming = 1;
54d343a2
TT
5301 for (j = 0; j < syms->size (); j += 1)
5302 if (i != j && (*syms)[j].symbol != NULL
987012b8 5303 && strncmp (name, (*syms)[j].symbol->linkage_name (),
aeb5907d 5304 name_len) == 0
54d343a2
TT
5305 && block == (*syms)[j].block)
5306 (*syms)[j].symbol = NULL;
aeb5907d
JB
5307 }
5308 }
5309 if (is_new_style_renaming)
5310 {
5311 int j, k;
5312
54d343a2
TT
5313 for (j = k = 0; j < syms->size (); j += 1)
5314 if ((*syms)[j].symbol != NULL)
aeb5907d 5315 {
54d343a2 5316 (*syms)[k] = (*syms)[j];
aeb5907d
JB
5317 k += 1;
5318 }
5319 return k;
5320 }
4c4b4cd2
PH
5321
5322 /* Extract the function name associated to CURRENT_BLOCK.
5323 Abort if unable to do so. */
76a01679 5324
4c4b4cd2 5325 if (current_block == NULL)
54d343a2 5326 return syms->size ();
76a01679 5327
7f0df278 5328 current_function = block_linkage_function (current_block);
4c4b4cd2 5329 if (current_function == NULL)
54d343a2 5330 return syms->size ();
4c4b4cd2 5331
987012b8 5332 current_function_name = current_function->linkage_name ();
4c4b4cd2 5333 if (current_function_name == NULL)
54d343a2 5334 return syms->size ();
4c4b4cd2
PH
5335
5336 /* Check each of the symbols, and remove it from the list if it is
5337 a type corresponding to a renaming that is out of the scope of
5338 the current block. */
5339
5340 i = 0;
54d343a2 5341 while (i < syms->size ())
4c4b4cd2 5342 {
54d343a2 5343 if (ada_parse_renaming ((*syms)[i].symbol, NULL, NULL, NULL)
aeb5907d 5344 == ADA_OBJECT_RENAMING
54d343a2
TT
5345 && old_renaming_is_invisible ((*syms)[i].symbol,
5346 current_function_name))
5347 syms->erase (syms->begin () + i);
4c4b4cd2
PH
5348 else
5349 i += 1;
5350 }
5351
54d343a2 5352 return syms->size ();
4c4b4cd2
PH
5353}
5354
339c13b6
JB
5355/* Add to OBSTACKP all symbols from BLOCK (and its super-blocks)
5356 whose name and domain match NAME and DOMAIN respectively.
5357 If no match was found, then extend the search to "enclosing"
5358 routines (in other words, if we're inside a nested function,
5359 search the symbols defined inside the enclosing functions).
d0a8ab18
JB
5360 If WILD_MATCH_P is nonzero, perform the naming matching in
5361 "wild" mode (see function "wild_match" for more info).
339c13b6
JB
5362
5363 Note: This function assumes that OBSTACKP has 0 (zero) element in it. */
5364
5365static void
b5ec771e
PA
5366ada_add_local_symbols (struct obstack *obstackp,
5367 const lookup_name_info &lookup_name,
5368 const struct block *block, domain_enum domain)
339c13b6
JB
5369{
5370 int block_depth = 0;
5371
5372 while (block != NULL)
5373 {
5374 block_depth += 1;
b5ec771e 5375 ada_add_block_symbols (obstackp, block, lookup_name, domain, NULL);
339c13b6
JB
5376
5377 /* If we found a non-function match, assume that's the one. */
5378 if (is_nonfunction (defns_collected (obstackp, 0),
5379 num_defns_collected (obstackp)))
5380 return;
5381
5382 block = BLOCK_SUPERBLOCK (block);
5383 }
5384
5385 /* If no luck so far, try to find NAME as a local symbol in some lexically
5386 enclosing subprogram. */
5387 if (num_defns_collected (obstackp) == 0 && block_depth > 2)
b5ec771e 5388 add_symbols_from_enclosing_procs (obstackp, lookup_name, domain);
339c13b6
JB
5389}
5390
ccefe4c4 5391/* An object of this type is used as the user_data argument when
40658b94 5392 calling the map_matching_symbols method. */
ccefe4c4 5393
40658b94 5394struct match_data
ccefe4c4 5395{
40658b94 5396 struct objfile *objfile;
ccefe4c4 5397 struct obstack *obstackp;
40658b94
PH
5398 struct symbol *arg_sym;
5399 int found_sym;
ccefe4c4
TT
5400};
5401
199b4314
TT
5402/* A callback for add_nonlocal_symbols that adds symbol, found in BSYM,
5403 to a list of symbols. DATA is a pointer to a struct match_data *
40658b94
PH
5404 containing the obstack that collects the symbol list, the file that SYM
5405 must come from, a flag indicating whether a non-argument symbol has
5406 been found in the current block, and the last argument symbol
5407 passed in SYM within the current block (if any). When SYM is null,
5408 marking the end of a block, the argument symbol is added if no
5409 other has been found. */
ccefe4c4 5410
199b4314
TT
5411static bool
5412aux_add_nonlocal_symbols (struct block_symbol *bsym,
5413 struct match_data *data)
ccefe4c4 5414{
199b4314
TT
5415 const struct block *block = bsym->block;
5416 struct symbol *sym = bsym->symbol;
5417
40658b94
PH
5418 if (sym == NULL)
5419 {
5420 if (!data->found_sym && data->arg_sym != NULL)
5421 add_defn_to_vec (data->obstackp,
5422 fixup_symbol_section (data->arg_sym, data->objfile),
5423 block);
5424 data->found_sym = 0;
5425 data->arg_sym = NULL;
5426 }
5427 else
5428 {
5429 if (SYMBOL_CLASS (sym) == LOC_UNRESOLVED)
199b4314 5430 return true;
40658b94
PH
5431 else if (SYMBOL_IS_ARGUMENT (sym))
5432 data->arg_sym = sym;
5433 else
5434 {
5435 data->found_sym = 1;
5436 add_defn_to_vec (data->obstackp,
5437 fixup_symbol_section (sym, data->objfile),
5438 block);
5439 }
5440 }
199b4314 5441 return true;
40658b94
PH
5442}
5443
b5ec771e
PA
5444/* Helper for add_nonlocal_symbols. Find symbols in DOMAIN which are
5445 targeted by renamings matching LOOKUP_NAME in BLOCK. Add these
5446 symbols to OBSTACKP. Return whether we found such symbols. */
22cee43f
PMR
5447
5448static int
5449ada_add_block_renamings (struct obstack *obstackp,
5450 const struct block *block,
b5ec771e
PA
5451 const lookup_name_info &lookup_name,
5452 domain_enum domain)
22cee43f
PMR
5453{
5454 struct using_direct *renaming;
5455 int defns_mark = num_defns_collected (obstackp);
5456
b5ec771e
PA
5457 symbol_name_matcher_ftype *name_match
5458 = ada_get_symbol_name_matcher (lookup_name);
5459
22cee43f
PMR
5460 for (renaming = block_using (block);
5461 renaming != NULL;
5462 renaming = renaming->next)
5463 {
5464 const char *r_name;
22cee43f
PMR
5465
5466 /* Avoid infinite recursions: skip this renaming if we are actually
5467 already traversing it.
5468
5469 Currently, symbol lookup in Ada don't use the namespace machinery from
5470 C++/Fortran support: skip namespace imports that use them. */
5471 if (renaming->searched
5472 || (renaming->import_src != NULL
5473 && renaming->import_src[0] != '\0')
5474 || (renaming->import_dest != NULL
5475 && renaming->import_dest[0] != '\0'))
5476 continue;
5477 renaming->searched = 1;
5478
5479 /* TODO: here, we perform another name-based symbol lookup, which can
5480 pull its own multiple overloads. In theory, we should be able to do
5481 better in this case since, in DWARF, DW_AT_import is a DIE reference,
5482 not a simple name. But in order to do this, we would need to enhance
5483 the DWARF reader to associate a symbol to this renaming, instead of a
5484 name. So, for now, we do something simpler: re-use the C++/Fortran
5485 namespace machinery. */
5486 r_name = (renaming->alias != NULL
5487 ? renaming->alias
5488 : renaming->declaration);
b5ec771e
PA
5489 if (name_match (r_name, lookup_name, NULL))
5490 {
5491 lookup_name_info decl_lookup_name (renaming->declaration,
5492 lookup_name.match_type ());
5493 ada_add_all_symbols (obstackp, block, decl_lookup_name, domain,
5494 1, NULL);
5495 }
22cee43f
PMR
5496 renaming->searched = 0;
5497 }
5498 return num_defns_collected (obstackp) != defns_mark;
5499}
5500
db230ce3
JB
5501/* Implements compare_names, but only applying the comparision using
5502 the given CASING. */
5b4ee69b 5503
40658b94 5504static int
db230ce3
JB
5505compare_names_with_case (const char *string1, const char *string2,
5506 enum case_sensitivity casing)
40658b94
PH
5507{
5508 while (*string1 != '\0' && *string2 != '\0')
5509 {
db230ce3
JB
5510 char c1, c2;
5511
40658b94
PH
5512 if (isspace (*string1) || isspace (*string2))
5513 return strcmp_iw_ordered (string1, string2);
db230ce3
JB
5514
5515 if (casing == case_sensitive_off)
5516 {
5517 c1 = tolower (*string1);
5518 c2 = tolower (*string2);
5519 }
5520 else
5521 {
5522 c1 = *string1;
5523 c2 = *string2;
5524 }
5525 if (c1 != c2)
40658b94 5526 break;
db230ce3 5527
40658b94
PH
5528 string1 += 1;
5529 string2 += 1;
5530 }
db230ce3 5531
40658b94
PH
5532 switch (*string1)
5533 {
5534 case '(':
5535 return strcmp_iw_ordered (string1, string2);
5536 case '_':
5537 if (*string2 == '\0')
5538 {
052874e8 5539 if (is_name_suffix (string1))
40658b94
PH
5540 return 0;
5541 else
1a1d5513 5542 return 1;
40658b94 5543 }
dbb8534f 5544 /* FALLTHROUGH */
40658b94
PH
5545 default:
5546 if (*string2 == '(')
5547 return strcmp_iw_ordered (string1, string2);
5548 else
db230ce3
JB
5549 {
5550 if (casing == case_sensitive_off)
5551 return tolower (*string1) - tolower (*string2);
5552 else
5553 return *string1 - *string2;
5554 }
40658b94 5555 }
ccefe4c4
TT
5556}
5557
db230ce3
JB
5558/* Compare STRING1 to STRING2, with results as for strcmp.
5559 Compatible with strcmp_iw_ordered in that...
5560
5561 strcmp_iw_ordered (STRING1, STRING2) <= 0
5562
5563 ... implies...
5564
5565 compare_names (STRING1, STRING2) <= 0
5566
5567 (they may differ as to what symbols compare equal). */
5568
5569static int
5570compare_names (const char *string1, const char *string2)
5571{
5572 int result;
5573
5574 /* Similar to what strcmp_iw_ordered does, we need to perform
5575 a case-insensitive comparison first, and only resort to
5576 a second, case-sensitive, comparison if the first one was
5577 not sufficient to differentiate the two strings. */
5578
5579 result = compare_names_with_case (string1, string2, case_sensitive_off);
5580 if (result == 0)
5581 result = compare_names_with_case (string1, string2, case_sensitive_on);
5582
5583 return result;
5584}
5585
b5ec771e
PA
5586/* Convenience function to get at the Ada encoded lookup name for
5587 LOOKUP_NAME, as a C string. */
5588
5589static const char *
5590ada_lookup_name (const lookup_name_info &lookup_name)
5591{
5592 return lookup_name.ada ().lookup_name ().c_str ();
5593}
5594
339c13b6 5595/* Add to OBSTACKP all non-local symbols whose name and domain match
b5ec771e
PA
5596 LOOKUP_NAME and DOMAIN respectively. The search is performed on
5597 GLOBAL_BLOCK symbols if GLOBAL is non-zero, or on STATIC_BLOCK
5598 symbols otherwise. */
339c13b6
JB
5599
5600static void
b5ec771e
PA
5601add_nonlocal_symbols (struct obstack *obstackp,
5602 const lookup_name_info &lookup_name,
5603 domain_enum domain, int global)
339c13b6 5604{
40658b94 5605 struct match_data data;
339c13b6 5606
6475f2fe 5607 memset (&data, 0, sizeof data);
ccefe4c4 5608 data.obstackp = obstackp;
339c13b6 5609
b5ec771e
PA
5610 bool is_wild_match = lookup_name.ada ().wild_match_p ();
5611
199b4314
TT
5612 auto callback = [&] (struct block_symbol *bsym)
5613 {
5614 return aux_add_nonlocal_symbols (bsym, &data);
5615 };
5616
2030c079 5617 for (objfile *objfile : current_program_space->objfiles ())
40658b94
PH
5618 {
5619 data.objfile = objfile;
5620
b054970d
TT
5621 objfile->sf->qf->map_matching_symbols (objfile, lookup_name,
5622 domain, global, callback,
5623 (is_wild_match
5624 ? NULL : compare_names));
22cee43f 5625
b669c953 5626 for (compunit_symtab *cu : objfile->compunits ())
22cee43f
PMR
5627 {
5628 const struct block *global_block
5629 = BLOCKVECTOR_BLOCK (COMPUNIT_BLOCKVECTOR (cu), GLOBAL_BLOCK);
5630
b5ec771e
PA
5631 if (ada_add_block_renamings (obstackp, global_block, lookup_name,
5632 domain))
22cee43f
PMR
5633 data.found_sym = 1;
5634 }
40658b94
PH
5635 }
5636
5637 if (num_defns_collected (obstackp) == 0 && global && !is_wild_match)
5638 {
b5ec771e 5639 const char *name = ada_lookup_name (lookup_name);
e0802d59
TT
5640 std::string bracket_name = std::string ("<_ada_") + name + '>';
5641 lookup_name_info name1 (bracket_name, symbol_name_match_type::FULL);
b5ec771e 5642
2030c079 5643 for (objfile *objfile : current_program_space->objfiles ())
40658b94 5644 {
40658b94 5645 data.objfile = objfile;
b054970d 5646 objfile->sf->qf->map_matching_symbols (objfile, name1,
199b4314 5647 domain, global, callback,
b5ec771e 5648 compare_names);
40658b94
PH
5649 }
5650 }
339c13b6
JB
5651}
5652
b5ec771e
PA
5653/* Find symbols in DOMAIN matching LOOKUP_NAME, in BLOCK and, if
5654 FULL_SEARCH is non-zero, enclosing scope and in global scopes,
5655 returning the number of matches. Add these to OBSTACKP.
4eeaa230 5656
22cee43f
PMR
5657 When FULL_SEARCH is non-zero, any non-function/non-enumeral
5658 symbol match within the nest of blocks whose innermost member is BLOCK,
4c4b4cd2 5659 is the one match returned (no other matches in that or
d9680e73 5660 enclosing blocks is returned). If there are any matches in or
22cee43f 5661 surrounding BLOCK, then these alone are returned.
4eeaa230 5662
b5ec771e
PA
5663 Names prefixed with "standard__" are handled specially:
5664 "standard__" is first stripped off (by the lookup_name
5665 constructor), and only static and global symbols are searched.
14f9c5c9 5666
22cee43f
PMR
5667 If MADE_GLOBAL_LOOKUP_P is non-null, set it before return to whether we had
5668 to lookup global symbols. */
5669
5670static void
5671ada_add_all_symbols (struct obstack *obstackp,
5672 const struct block *block,
b5ec771e 5673 const lookup_name_info &lookup_name,
22cee43f
PMR
5674 domain_enum domain,
5675 int full_search,
5676 int *made_global_lookup_p)
14f9c5c9
AS
5677{
5678 struct symbol *sym;
14f9c5c9 5679
22cee43f
PMR
5680 if (made_global_lookup_p)
5681 *made_global_lookup_p = 0;
339c13b6
JB
5682
5683 /* Special case: If the user specifies a symbol name inside package
5684 Standard, do a non-wild matching of the symbol name without
5685 the "standard__" prefix. This was primarily introduced in order
5686 to allow the user to specifically access the standard exceptions
5687 using, for instance, Standard.Constraint_Error when Constraint_Error
5688 is ambiguous (due to the user defining its own Constraint_Error
5689 entity inside its program). */
b5ec771e
PA
5690 if (lookup_name.ada ().standard_p ())
5691 block = NULL;
4c4b4cd2 5692
339c13b6 5693 /* Check the non-global symbols. If we have ANY match, then we're done. */
14f9c5c9 5694
4eeaa230
DE
5695 if (block != NULL)
5696 {
5697 if (full_search)
b5ec771e 5698 ada_add_local_symbols (obstackp, lookup_name, block, domain);
4eeaa230
DE
5699 else
5700 {
5701 /* In the !full_search case we're are being called by
5702 ada_iterate_over_symbols, and we don't want to search
5703 superblocks. */
b5ec771e 5704 ada_add_block_symbols (obstackp, block, lookup_name, domain, NULL);
4eeaa230 5705 }
22cee43f
PMR
5706 if (num_defns_collected (obstackp) > 0 || !full_search)
5707 return;
4eeaa230 5708 }
d2e4a39e 5709
339c13b6
JB
5710 /* No non-global symbols found. Check our cache to see if we have
5711 already performed this search before. If we have, then return
5712 the same result. */
5713
b5ec771e
PA
5714 if (lookup_cached_symbol (ada_lookup_name (lookup_name),
5715 domain, &sym, &block))
4c4b4cd2
PH
5716 {
5717 if (sym != NULL)
b5ec771e 5718 add_defn_to_vec (obstackp, sym, block);
22cee43f 5719 return;
4c4b4cd2 5720 }
14f9c5c9 5721
22cee43f
PMR
5722 if (made_global_lookup_p)
5723 *made_global_lookup_p = 1;
b1eedac9 5724
339c13b6
JB
5725 /* Search symbols from all global blocks. */
5726
b5ec771e 5727 add_nonlocal_symbols (obstackp, lookup_name, domain, 1);
d2e4a39e 5728
4c4b4cd2 5729 /* Now add symbols from all per-file blocks if we've gotten no hits
339c13b6 5730 (not strictly correct, but perhaps better than an error). */
d2e4a39e 5731
22cee43f 5732 if (num_defns_collected (obstackp) == 0)
b5ec771e 5733 add_nonlocal_symbols (obstackp, lookup_name, domain, 0);
22cee43f
PMR
5734}
5735
b5ec771e
PA
5736/* Find symbols in DOMAIN matching LOOKUP_NAME, in BLOCK and, if FULL_SEARCH
5737 is non-zero, enclosing scope and in global scopes, returning the number of
22cee43f 5738 matches.
54d343a2
TT
5739 Fills *RESULTS with (SYM,BLOCK) tuples, indicating the symbols
5740 found and the blocks and symbol tables (if any) in which they were
5741 found.
22cee43f
PMR
5742
5743 When full_search is non-zero, any non-function/non-enumeral
5744 symbol match within the nest of blocks whose innermost member is BLOCK,
5745 is the one match returned (no other matches in that or
5746 enclosing blocks is returned). If there are any matches in or
5747 surrounding BLOCK, then these alone are returned.
5748
5749 Names prefixed with "standard__" are handled specially: "standard__"
5750 is first stripped off, and only static and global symbols are searched. */
5751
5752static int
b5ec771e
PA
5753ada_lookup_symbol_list_worker (const lookup_name_info &lookup_name,
5754 const struct block *block,
22cee43f 5755 domain_enum domain,
54d343a2 5756 std::vector<struct block_symbol> *results,
22cee43f
PMR
5757 int full_search)
5758{
22cee43f
PMR
5759 int syms_from_global_search;
5760 int ndefns;
ec6a20c2 5761 auto_obstack obstack;
22cee43f 5762
ec6a20c2 5763 ada_add_all_symbols (&obstack, block, lookup_name,
b5ec771e 5764 domain, full_search, &syms_from_global_search);
14f9c5c9 5765
ec6a20c2
JB
5766 ndefns = num_defns_collected (&obstack);
5767
54d343a2
TT
5768 struct block_symbol *base = defns_collected (&obstack, 1);
5769 for (int i = 0; i < ndefns; ++i)
5770 results->push_back (base[i]);
4c4b4cd2 5771
54d343a2 5772 ndefns = remove_extra_symbols (results);
4c4b4cd2 5773
b1eedac9 5774 if (ndefns == 0 && full_search && syms_from_global_search)
b5ec771e 5775 cache_symbol (ada_lookup_name (lookup_name), domain, NULL, NULL);
14f9c5c9 5776
b1eedac9 5777 if (ndefns == 1 && full_search && syms_from_global_search)
b5ec771e
PA
5778 cache_symbol (ada_lookup_name (lookup_name), domain,
5779 (*results)[0].symbol, (*results)[0].block);
14f9c5c9 5780
54d343a2 5781 ndefns = remove_irrelevant_renamings (results, block);
ec6a20c2 5782
14f9c5c9
AS
5783 return ndefns;
5784}
5785
b5ec771e 5786/* Find symbols in DOMAIN matching NAME, in BLOCK and enclosing scope and
54d343a2
TT
5787 in global scopes, returning the number of matches, and filling *RESULTS
5788 with (SYM,BLOCK) tuples.
ec6a20c2 5789
4eeaa230
DE
5790 See ada_lookup_symbol_list_worker for further details. */
5791
5792int
b5ec771e 5793ada_lookup_symbol_list (const char *name, const struct block *block,
54d343a2
TT
5794 domain_enum domain,
5795 std::vector<struct block_symbol> *results)
4eeaa230 5796{
b5ec771e
PA
5797 symbol_name_match_type name_match_type = name_match_type_from_name (name);
5798 lookup_name_info lookup_name (name, name_match_type);
5799
5800 return ada_lookup_symbol_list_worker (lookup_name, block, domain, results, 1);
4eeaa230
DE
5801}
5802
5803/* Implementation of the la_iterate_over_symbols method. */
5804
6969f124 5805static bool
14bc53a8 5806ada_iterate_over_symbols
b5ec771e
PA
5807 (const struct block *block, const lookup_name_info &name,
5808 domain_enum domain,
14bc53a8 5809 gdb::function_view<symbol_found_callback_ftype> callback)
4eeaa230
DE
5810{
5811 int ndefs, i;
54d343a2 5812 std::vector<struct block_symbol> results;
4eeaa230
DE
5813
5814 ndefs = ada_lookup_symbol_list_worker (name, block, domain, &results, 0);
ec6a20c2 5815
4eeaa230
DE
5816 for (i = 0; i < ndefs; ++i)
5817 {
7e41c8db 5818 if (!callback (&results[i]))
6969f124 5819 return false;
4eeaa230 5820 }
6969f124
TT
5821
5822 return true;
4eeaa230
DE
5823}
5824
4e5c77fe
JB
5825/* The result is as for ada_lookup_symbol_list with FULL_SEARCH set
5826 to 1, but choosing the first symbol found if there are multiple
5827 choices.
5828
5e2336be
JB
5829 The result is stored in *INFO, which must be non-NULL.
5830 If no match is found, INFO->SYM is set to NULL. */
4e5c77fe
JB
5831
5832void
5833ada_lookup_encoded_symbol (const char *name, const struct block *block,
fe978cb0 5834 domain_enum domain,
d12307c1 5835 struct block_symbol *info)
14f9c5c9 5836{
b5ec771e
PA
5837 /* Since we already have an encoded name, wrap it in '<>' to force a
5838 verbatim match. Otherwise, if the name happens to not look like
5839 an encoded name (because it doesn't include a "__"),
5840 ada_lookup_name_info would re-encode/fold it again, and that
5841 would e.g., incorrectly lowercase object renaming names like
5842 "R28b" -> "r28b". */
5843 std::string verbatim = std::string ("<") + name + '>';
5844
5e2336be 5845 gdb_assert (info != NULL);
65392b3e 5846 *info = ada_lookup_symbol (verbatim.c_str (), block, domain);
4e5c77fe 5847}
aeb5907d
JB
5848
5849/* Return a symbol in DOMAIN matching NAME, in BLOCK0 and enclosing
5850 scope and in global scopes, or NULL if none. NAME is folded and
5851 encoded first. Otherwise, the result is as for ada_lookup_symbol_list,
65392b3e 5852 choosing the first symbol if there are multiple choices. */
4e5c77fe 5853
d12307c1 5854struct block_symbol
aeb5907d 5855ada_lookup_symbol (const char *name, const struct block *block0,
65392b3e 5856 domain_enum domain)
aeb5907d 5857{
54d343a2 5858 std::vector<struct block_symbol> candidates;
f98fc17b 5859 int n_candidates;
f98fc17b
PA
5860
5861 n_candidates = ada_lookup_symbol_list (name, block0, domain, &candidates);
f98fc17b
PA
5862
5863 if (n_candidates == 0)
54d343a2 5864 return {};
f98fc17b
PA
5865
5866 block_symbol info = candidates[0];
5867 info.symbol = fixup_symbol_section (info.symbol, NULL);
d12307c1 5868 return info;
4c4b4cd2 5869}
14f9c5c9 5870
d12307c1 5871static struct block_symbol
f606139a
DE
5872ada_lookup_symbol_nonlocal (const struct language_defn *langdef,
5873 const char *name,
76a01679 5874 const struct block *block,
21b556f4 5875 const domain_enum domain)
4c4b4cd2 5876{
d12307c1 5877 struct block_symbol sym;
04dccad0 5878
65392b3e 5879 sym = ada_lookup_symbol (name, block_static_block (block), domain);
d12307c1 5880 if (sym.symbol != NULL)
04dccad0
JB
5881 return sym;
5882
5883 /* If we haven't found a match at this point, try the primitive
5884 types. In other languages, this search is performed before
5885 searching for global symbols in order to short-circuit that
5886 global-symbol search if it happens that the name corresponds
5887 to a primitive type. But we cannot do the same in Ada, because
5888 it is perfectly legitimate for a program to declare a type which
5889 has the same name as a standard type. If looking up a type in
5890 that situation, we have traditionally ignored the primitive type
5891 in favor of user-defined types. This is why, unlike most other
5892 languages, we search the primitive types this late and only after
5893 having searched the global symbols without success. */
5894
5895 if (domain == VAR_DOMAIN)
5896 {
5897 struct gdbarch *gdbarch;
5898
5899 if (block == NULL)
5900 gdbarch = target_gdbarch ();
5901 else
5902 gdbarch = block_gdbarch (block);
d12307c1
PMR
5903 sym.symbol = language_lookup_primitive_type_as_symbol (langdef, gdbarch, name);
5904 if (sym.symbol != NULL)
04dccad0
JB
5905 return sym;
5906 }
5907
6640a367 5908 return {};
14f9c5c9
AS
5909}
5910
5911
4c4b4cd2
PH
5912/* True iff STR is a possible encoded suffix of a normal Ada name
5913 that is to be ignored for matching purposes. Suffixes of parallel
5914 names (e.g., XVE) are not included here. Currently, the possible suffixes
5823c3ef 5915 are given by any of the regular expressions:
4c4b4cd2 5916
babe1480
JB
5917 [.$][0-9]+ [nested subprogram suffix, on platforms such as GNU/Linux]
5918 ___[0-9]+ [nested subprogram suffix, on platforms such as HP/UX]
9ac7f98e 5919 TKB [subprogram suffix for task bodies]
babe1480 5920 _E[0-9]+[bs]$ [protected object entry suffixes]
61ee279c 5921 (X[nb]*)?((\$|__)[0-9](_?[0-9]+)|___(JM|LJM|X([FDBUP].*|R[^T]?)))?$
babe1480
JB
5922
5923 Also, any leading "__[0-9]+" sequence is skipped before the suffix
5924 match is performed. This sequence is used to differentiate homonyms,
5925 is an optional part of a valid name suffix. */
4c4b4cd2 5926
14f9c5c9 5927static int
d2e4a39e 5928is_name_suffix (const char *str)
14f9c5c9
AS
5929{
5930 int k;
4c4b4cd2
PH
5931 const char *matching;
5932 const int len = strlen (str);
5933
babe1480
JB
5934 /* Skip optional leading __[0-9]+. */
5935
4c4b4cd2
PH
5936 if (len > 3 && str[0] == '_' && str[1] == '_' && isdigit (str[2]))
5937 {
babe1480
JB
5938 str += 3;
5939 while (isdigit (str[0]))
5940 str += 1;
4c4b4cd2 5941 }
babe1480
JB
5942
5943 /* [.$][0-9]+ */
4c4b4cd2 5944
babe1480 5945 if (str[0] == '.' || str[0] == '$')
4c4b4cd2 5946 {
babe1480 5947 matching = str + 1;
4c4b4cd2
PH
5948 while (isdigit (matching[0]))
5949 matching += 1;
5950 if (matching[0] == '\0')
5951 return 1;
5952 }
5953
5954 /* ___[0-9]+ */
babe1480 5955
4c4b4cd2
PH
5956 if (len > 3 && str[0] == '_' && str[1] == '_' && str[2] == '_')
5957 {
5958 matching = str + 3;
5959 while (isdigit (matching[0]))
5960 matching += 1;
5961 if (matching[0] == '\0')
5962 return 1;
5963 }
5964
9ac7f98e
JB
5965 /* "TKB" suffixes are used for subprograms implementing task bodies. */
5966
5967 if (strcmp (str, "TKB") == 0)
5968 return 1;
5969
529cad9c
PH
5970#if 0
5971 /* FIXME: brobecker/2005-09-23: Protected Object subprograms end
0963b4bd
MS
5972 with a N at the end. Unfortunately, the compiler uses the same
5973 convention for other internal types it creates. So treating
529cad9c 5974 all entity names that end with an "N" as a name suffix causes
0963b4bd
MS
5975 some regressions. For instance, consider the case of an enumerated
5976 type. To support the 'Image attribute, it creates an array whose
529cad9c
PH
5977 name ends with N.
5978 Having a single character like this as a suffix carrying some
0963b4bd 5979 information is a bit risky. Perhaps we should change the encoding
529cad9c
PH
5980 to be something like "_N" instead. In the meantime, do not do
5981 the following check. */
5982 /* Protected Object Subprograms */
5983 if (len == 1 && str [0] == 'N')
5984 return 1;
5985#endif
5986
5987 /* _E[0-9]+[bs]$ */
5988 if (len > 3 && str[0] == '_' && str [1] == 'E' && isdigit (str[2]))
5989 {
5990 matching = str + 3;
5991 while (isdigit (matching[0]))
5992 matching += 1;
5993 if ((matching[0] == 'b' || matching[0] == 's')
5994 && matching [1] == '\0')
5995 return 1;
5996 }
5997
4c4b4cd2
PH
5998 /* ??? We should not modify STR directly, as we are doing below. This
5999 is fine in this case, but may become problematic later if we find
6000 that this alternative did not work, and want to try matching
6001 another one from the begining of STR. Since we modified it, we
6002 won't be able to find the begining of the string anymore! */
14f9c5c9
AS
6003 if (str[0] == 'X')
6004 {
6005 str += 1;
d2e4a39e 6006 while (str[0] != '_' && str[0] != '\0')
4c4b4cd2
PH
6007 {
6008 if (str[0] != 'n' && str[0] != 'b')
6009 return 0;
6010 str += 1;
6011 }
14f9c5c9 6012 }
babe1480 6013
14f9c5c9
AS
6014 if (str[0] == '\000')
6015 return 1;
babe1480 6016
d2e4a39e 6017 if (str[0] == '_')
14f9c5c9
AS
6018 {
6019 if (str[1] != '_' || str[2] == '\000')
4c4b4cd2 6020 return 0;
d2e4a39e 6021 if (str[2] == '_')
4c4b4cd2 6022 {
61ee279c
PH
6023 if (strcmp (str + 3, "JM") == 0)
6024 return 1;
6025 /* FIXME: brobecker/2004-09-30: GNAT will soon stop using
6026 the LJM suffix in favor of the JM one. But we will
6027 still accept LJM as a valid suffix for a reasonable
6028 amount of time, just to allow ourselves to debug programs
6029 compiled using an older version of GNAT. */
4c4b4cd2
PH
6030 if (strcmp (str + 3, "LJM") == 0)
6031 return 1;
6032 if (str[3] != 'X')
6033 return 0;
1265e4aa
JB
6034 if (str[4] == 'F' || str[4] == 'D' || str[4] == 'B'
6035 || str[4] == 'U' || str[4] == 'P')
4c4b4cd2
PH
6036 return 1;
6037 if (str[4] == 'R' && str[5] != 'T')
6038 return 1;
6039 return 0;
6040 }
6041 if (!isdigit (str[2]))
6042 return 0;
6043 for (k = 3; str[k] != '\0'; k += 1)
6044 if (!isdigit (str[k]) && str[k] != '_')
6045 return 0;
14f9c5c9
AS
6046 return 1;
6047 }
4c4b4cd2 6048 if (str[0] == '$' && isdigit (str[1]))
14f9c5c9 6049 {
4c4b4cd2
PH
6050 for (k = 2; str[k] != '\0'; k += 1)
6051 if (!isdigit (str[k]) && str[k] != '_')
6052 return 0;
14f9c5c9
AS
6053 return 1;
6054 }
6055 return 0;
6056}
d2e4a39e 6057
aeb5907d
JB
6058/* Return non-zero if the string starting at NAME and ending before
6059 NAME_END contains no capital letters. */
529cad9c
PH
6060
6061static int
6062is_valid_name_for_wild_match (const char *name0)
6063{
f945dedf 6064 std::string decoded_name = ada_decode (name0);
529cad9c
PH
6065 int i;
6066
5823c3ef
JB
6067 /* If the decoded name starts with an angle bracket, it means that
6068 NAME0 does not follow the GNAT encoding format. It should then
6069 not be allowed as a possible wild match. */
6070 if (decoded_name[0] == '<')
6071 return 0;
6072
529cad9c
PH
6073 for (i=0; decoded_name[i] != '\0'; i++)
6074 if (isalpha (decoded_name[i]) && !islower (decoded_name[i]))
6075 return 0;
6076
6077 return 1;
6078}
6079
73589123
PH
6080/* Advance *NAMEP to next occurrence of TARGET0 in the string NAME0
6081 that could start a simple name. Assumes that *NAMEP points into
6082 the string beginning at NAME0. */
4c4b4cd2 6083
14f9c5c9 6084static int
73589123 6085advance_wild_match (const char **namep, const char *name0, int target0)
14f9c5c9 6086{
73589123 6087 const char *name = *namep;
5b4ee69b 6088
5823c3ef 6089 while (1)
14f9c5c9 6090 {
aa27d0b3 6091 int t0, t1;
73589123
PH
6092
6093 t0 = *name;
6094 if (t0 == '_')
6095 {
6096 t1 = name[1];
6097 if ((t1 >= 'a' && t1 <= 'z') || (t1 >= '0' && t1 <= '9'))
6098 {
6099 name += 1;
61012eef 6100 if (name == name0 + 5 && startswith (name0, "_ada"))
73589123
PH
6101 break;
6102 else
6103 name += 1;
6104 }
aa27d0b3
JB
6105 else if (t1 == '_' && ((name[2] >= 'a' && name[2] <= 'z')
6106 || name[2] == target0))
73589123
PH
6107 {
6108 name += 2;
6109 break;
6110 }
6111 else
6112 return 0;
6113 }
6114 else if ((t0 >= 'a' && t0 <= 'z') || (t0 >= '0' && t0 <= '9'))
6115 name += 1;
6116 else
5823c3ef 6117 return 0;
73589123
PH
6118 }
6119
6120 *namep = name;
6121 return 1;
6122}
6123
b5ec771e
PA
6124/* Return true iff NAME encodes a name of the form prefix.PATN.
6125 Ignores any informational suffixes of NAME (i.e., for which
6126 is_name_suffix is true). Assumes that PATN is a lower-cased Ada
6127 simple name. */
73589123 6128
b5ec771e 6129static bool
73589123
PH
6130wild_match (const char *name, const char *patn)
6131{
22e048c9 6132 const char *p;
73589123
PH
6133 const char *name0 = name;
6134
6135 while (1)
6136 {
6137 const char *match = name;
6138
6139 if (*name == *patn)
6140 {
6141 for (name += 1, p = patn + 1; *p != '\0'; name += 1, p += 1)
6142 if (*p != *name)
6143 break;
6144 if (*p == '\0' && is_name_suffix (name))
b5ec771e 6145 return match == name0 || is_valid_name_for_wild_match (name0);
73589123
PH
6146
6147 if (name[-1] == '_')
6148 name -= 1;
6149 }
6150 if (!advance_wild_match (&name, name0, *patn))
b5ec771e 6151 return false;
96d887e8 6152 }
96d887e8
PH
6153}
6154
b5ec771e
PA
6155/* Returns true iff symbol name SYM_NAME matches SEARCH_NAME, ignoring
6156 any trailing suffixes that encode debugging information or leading
6157 _ada_ on SYM_NAME (see is_name_suffix commentary for the debugging
6158 information that is ignored). */
40658b94 6159
b5ec771e 6160static bool
c4d840bd
PH
6161full_match (const char *sym_name, const char *search_name)
6162{
b5ec771e
PA
6163 size_t search_name_len = strlen (search_name);
6164
6165 if (strncmp (sym_name, search_name, search_name_len) == 0
6166 && is_name_suffix (sym_name + search_name_len))
6167 return true;
6168
6169 if (startswith (sym_name, "_ada_")
6170 && strncmp (sym_name + 5, search_name, search_name_len) == 0
6171 && is_name_suffix (sym_name + search_name_len + 5))
6172 return true;
c4d840bd 6173
b5ec771e
PA
6174 return false;
6175}
c4d840bd 6176
b5ec771e
PA
6177/* Add symbols from BLOCK matching LOOKUP_NAME in DOMAIN to vector
6178 *defn_symbols, updating the list of symbols in OBSTACKP (if
6179 necessary). OBJFILE is the section containing BLOCK. */
96d887e8
PH
6180
6181static void
6182ada_add_block_symbols (struct obstack *obstackp,
b5ec771e
PA
6183 const struct block *block,
6184 const lookup_name_info &lookup_name,
6185 domain_enum domain, struct objfile *objfile)
96d887e8 6186{
8157b174 6187 struct block_iterator iter;
96d887e8
PH
6188 /* A matching argument symbol, if any. */
6189 struct symbol *arg_sym;
6190 /* Set true when we find a matching non-argument symbol. */
6191 int found_sym;
6192 struct symbol *sym;
6193
6194 arg_sym = NULL;
6195 found_sym = 0;
b5ec771e
PA
6196 for (sym = block_iter_match_first (block, lookup_name, &iter);
6197 sym != NULL;
6198 sym = block_iter_match_next (lookup_name, &iter))
96d887e8 6199 {
c1b5c1eb 6200 if (symbol_matches_domain (sym->language (), SYMBOL_DOMAIN (sym), domain))
b5ec771e
PA
6201 {
6202 if (SYMBOL_CLASS (sym) != LOC_UNRESOLVED)
6203 {
6204 if (SYMBOL_IS_ARGUMENT (sym))
6205 arg_sym = sym;
6206 else
6207 {
6208 found_sym = 1;
6209 add_defn_to_vec (obstackp,
6210 fixup_symbol_section (sym, objfile),
6211 block);
6212 }
6213 }
6214 }
96d887e8
PH
6215 }
6216
22cee43f
PMR
6217 /* Handle renamings. */
6218
b5ec771e 6219 if (ada_add_block_renamings (obstackp, block, lookup_name, domain))
22cee43f
PMR
6220 found_sym = 1;
6221
96d887e8
PH
6222 if (!found_sym && arg_sym != NULL)
6223 {
76a01679
JB
6224 add_defn_to_vec (obstackp,
6225 fixup_symbol_section (arg_sym, objfile),
2570f2b7 6226 block);
96d887e8
PH
6227 }
6228
b5ec771e 6229 if (!lookup_name.ada ().wild_match_p ())
96d887e8
PH
6230 {
6231 arg_sym = NULL;
6232 found_sym = 0;
b5ec771e
PA
6233 const std::string &ada_lookup_name = lookup_name.ada ().lookup_name ();
6234 const char *name = ada_lookup_name.c_str ();
6235 size_t name_len = ada_lookup_name.size ();
96d887e8
PH
6236
6237 ALL_BLOCK_SYMBOLS (block, iter, sym)
76a01679 6238 {
c1b5c1eb 6239 if (symbol_matches_domain (sym->language (),
4186eb54 6240 SYMBOL_DOMAIN (sym), domain))
76a01679
JB
6241 {
6242 int cmp;
6243
987012b8 6244 cmp = (int) '_' - (int) sym->linkage_name ()[0];
76a01679
JB
6245 if (cmp == 0)
6246 {
987012b8 6247 cmp = !startswith (sym->linkage_name (), "_ada_");
76a01679 6248 if (cmp == 0)
987012b8 6249 cmp = strncmp (name, sym->linkage_name () + 5,
76a01679
JB
6250 name_len);
6251 }
6252
6253 if (cmp == 0
987012b8 6254 && is_name_suffix (sym->linkage_name () + name_len + 5))
76a01679 6255 {
2a2d4dc3
AS
6256 if (SYMBOL_CLASS (sym) != LOC_UNRESOLVED)
6257 {
6258 if (SYMBOL_IS_ARGUMENT (sym))
6259 arg_sym = sym;
6260 else
6261 {
6262 found_sym = 1;
6263 add_defn_to_vec (obstackp,
6264 fixup_symbol_section (sym, objfile),
6265 block);
6266 }
6267 }
76a01679
JB
6268 }
6269 }
76a01679 6270 }
96d887e8
PH
6271
6272 /* NOTE: This really shouldn't be needed for _ada_ symbols.
6273 They aren't parameters, right? */
6274 if (!found_sym && arg_sym != NULL)
6275 {
6276 add_defn_to_vec (obstackp,
76a01679 6277 fixup_symbol_section (arg_sym, objfile),
2570f2b7 6278 block);
96d887e8
PH
6279 }
6280 }
6281}
6282\f
41d27058
JB
6283
6284 /* Symbol Completion */
6285
b5ec771e 6286/* See symtab.h. */
41d27058 6287
b5ec771e
PA
6288bool
6289ada_lookup_name_info::matches
6290 (const char *sym_name,
6291 symbol_name_match_type match_type,
a207cff2 6292 completion_match_result *comp_match_res) const
41d27058 6293{
b5ec771e
PA
6294 bool match = false;
6295 const char *text = m_encoded_name.c_str ();
6296 size_t text_len = m_encoded_name.size ();
41d27058
JB
6297
6298 /* First, test against the fully qualified name of the symbol. */
6299
6300 if (strncmp (sym_name, text, text_len) == 0)
b5ec771e 6301 match = true;
41d27058 6302
f945dedf 6303 std::string decoded_name = ada_decode (sym_name);
b5ec771e 6304 if (match && !m_encoded_p)
41d27058
JB
6305 {
6306 /* One needed check before declaring a positive match is to verify
6307 that iff we are doing a verbatim match, the decoded version
6308 of the symbol name starts with '<'. Otherwise, this symbol name
6309 is not a suitable completion. */
41d27058 6310
f945dedf 6311 bool has_angle_bracket = (decoded_name[0] == '<');
b5ec771e 6312 match = (has_angle_bracket == m_verbatim_p);
41d27058
JB
6313 }
6314
b5ec771e 6315 if (match && !m_verbatim_p)
41d27058
JB
6316 {
6317 /* When doing non-verbatim match, another check that needs to
6318 be done is to verify that the potentially matching symbol name
6319 does not include capital letters, because the ada-mode would
6320 not be able to understand these symbol names without the
6321 angle bracket notation. */
6322 const char *tmp;
6323
6324 for (tmp = sym_name; *tmp != '\0' && !isupper (*tmp); tmp++);
6325 if (*tmp != '\0')
b5ec771e 6326 match = false;
41d27058
JB
6327 }
6328
6329 /* Second: Try wild matching... */
6330
b5ec771e 6331 if (!match && m_wild_match_p)
41d27058
JB
6332 {
6333 /* Since we are doing wild matching, this means that TEXT
6334 may represent an unqualified symbol name. We therefore must
6335 also compare TEXT against the unqualified name of the symbol. */
f945dedf 6336 sym_name = ada_unqualified_name (decoded_name.c_str ());
41d27058
JB
6337
6338 if (strncmp (sym_name, text, text_len) == 0)
b5ec771e 6339 match = true;
41d27058
JB
6340 }
6341
b5ec771e 6342 /* Finally: If we found a match, prepare the result to return. */
41d27058
JB
6343
6344 if (!match)
b5ec771e 6345 return false;
41d27058 6346
a207cff2 6347 if (comp_match_res != NULL)
b5ec771e 6348 {
a207cff2 6349 std::string &match_str = comp_match_res->match.storage ();
41d27058 6350
b5ec771e 6351 if (!m_encoded_p)
a207cff2 6352 match_str = ada_decode (sym_name);
b5ec771e
PA
6353 else
6354 {
6355 if (m_verbatim_p)
6356 match_str = add_angle_brackets (sym_name);
6357 else
6358 match_str = sym_name;
41d27058 6359
b5ec771e 6360 }
a207cff2
PA
6361
6362 comp_match_res->set_match (match_str.c_str ());
41d27058
JB
6363 }
6364
b5ec771e 6365 return true;
41d27058
JB
6366}
6367
b5ec771e 6368/* Add the list of possible symbol names completing TEXT to TRACKER.
eb3ff9a5 6369 WORD is the entire command on which completion is made. */
41d27058 6370
eb3ff9a5
PA
6371static void
6372ada_collect_symbol_completion_matches (completion_tracker &tracker,
c6756f62 6373 complete_symbol_mode mode,
b5ec771e
PA
6374 symbol_name_match_type name_match_type,
6375 const char *text, const char *word,
eb3ff9a5 6376 enum type_code code)
41d27058 6377{
41d27058 6378 struct symbol *sym;
3977b71f 6379 const struct block *b, *surrounding_static_block = 0;
8157b174 6380 struct block_iterator iter;
41d27058 6381
2f68a895
TT
6382 gdb_assert (code == TYPE_CODE_UNDEF);
6383
1b026119 6384 lookup_name_info lookup_name (text, name_match_type, true);
41d27058
JB
6385
6386 /* First, look at the partial symtab symbols. */
14bc53a8 6387 expand_symtabs_matching (NULL,
b5ec771e
PA
6388 lookup_name,
6389 NULL,
14bc53a8
PA
6390 NULL,
6391 ALL_DOMAIN);
41d27058
JB
6392
6393 /* At this point scan through the misc symbol vectors and add each
6394 symbol you find to the list. Eventually we want to ignore
6395 anything that isn't a text symbol (everything else will be
6396 handled by the psymtab code above). */
6397
2030c079 6398 for (objfile *objfile : current_program_space->objfiles ())
5325b9bf 6399 {
7932255d 6400 for (minimal_symbol *msymbol : objfile->msymbols ())
5325b9bf
TT
6401 {
6402 QUIT;
6403
6404 if (completion_skip_symbol (mode, msymbol))
6405 continue;
6406
c1b5c1eb 6407 language symbol_language = msymbol->language ();
5325b9bf
TT
6408
6409 /* Ada minimal symbols won't have their language set to Ada. If
6410 we let completion_list_add_name compare using the
6411 default/C-like matcher, then when completing e.g., symbols in a
6412 package named "pck", we'd match internal Ada symbols like
6413 "pckS", which are invalid in an Ada expression, unless you wrap
6414 them in '<' '>' to request a verbatim match.
6415
6416 Unfortunately, some Ada encoded names successfully demangle as
6417 C++ symbols (using an old mangling scheme), such as "name__2Xn"
6418 -> "Xn::name(void)" and thus some Ada minimal symbols end up
6419 with the wrong language set. Paper over that issue here. */
6420 if (symbol_language == language_auto
6421 || symbol_language == language_cplus)
6422 symbol_language = language_ada;
6423
6424 completion_list_add_name (tracker,
6425 symbol_language,
c9d95fa3 6426 msymbol->linkage_name (),
5325b9bf
TT
6427 lookup_name, text, word);
6428 }
6429 }
41d27058
JB
6430
6431 /* Search upwards from currently selected frame (so that we can
6432 complete on local vars. */
6433
6434 for (b = get_selected_block (0); b != NULL; b = BLOCK_SUPERBLOCK (b))
6435 {
6436 if (!BLOCK_SUPERBLOCK (b))
6437 surrounding_static_block = b; /* For elmin of dups */
6438
6439 ALL_BLOCK_SYMBOLS (b, iter, sym)
6440 {
f9d67a22
PA
6441 if (completion_skip_symbol (mode, sym))
6442 continue;
6443
b5ec771e 6444 completion_list_add_name (tracker,
c1b5c1eb 6445 sym->language (),
987012b8 6446 sym->linkage_name (),
1b026119 6447 lookup_name, text, word);
41d27058
JB
6448 }
6449 }
6450
6451 /* Go through the symtabs and check the externs and statics for
43f3e411 6452 symbols which match. */
41d27058 6453
2030c079 6454 for (objfile *objfile : current_program_space->objfiles ())
41d27058 6455 {
b669c953 6456 for (compunit_symtab *s : objfile->compunits ())
d8aeb77f
TT
6457 {
6458 QUIT;
6459 b = BLOCKVECTOR_BLOCK (COMPUNIT_BLOCKVECTOR (s), GLOBAL_BLOCK);
6460 ALL_BLOCK_SYMBOLS (b, iter, sym)
6461 {
6462 if (completion_skip_symbol (mode, sym))
6463 continue;
f9d67a22 6464
d8aeb77f 6465 completion_list_add_name (tracker,
c1b5c1eb 6466 sym->language (),
987012b8 6467 sym->linkage_name (),
d8aeb77f
TT
6468 lookup_name, text, word);
6469 }
6470 }
41d27058 6471 }
41d27058 6472
2030c079 6473 for (objfile *objfile : current_program_space->objfiles ())
d8aeb77f 6474 {
b669c953 6475 for (compunit_symtab *s : objfile->compunits ())
d8aeb77f
TT
6476 {
6477 QUIT;
6478 b = BLOCKVECTOR_BLOCK (COMPUNIT_BLOCKVECTOR (s), STATIC_BLOCK);
6479 /* Don't do this block twice. */
6480 if (b == surrounding_static_block)
6481 continue;
6482 ALL_BLOCK_SYMBOLS (b, iter, sym)
6483 {
6484 if (completion_skip_symbol (mode, sym))
6485 continue;
f9d67a22 6486
d8aeb77f 6487 completion_list_add_name (tracker,
c1b5c1eb 6488 sym->language (),
987012b8 6489 sym->linkage_name (),
d8aeb77f
TT
6490 lookup_name, text, word);
6491 }
6492 }
41d27058 6493 }
41d27058
JB
6494}
6495
963a6417 6496 /* Field Access */
96d887e8 6497
73fb9985
JB
6498/* Return non-zero if TYPE is a pointer to the GNAT dispatch table used
6499 for tagged types. */
6500
6501static int
6502ada_is_dispatch_table_ptr_type (struct type *type)
6503{
0d5cff50 6504 const char *name;
73fb9985
JB
6505
6506 if (TYPE_CODE (type) != TYPE_CODE_PTR)
6507 return 0;
6508
6509 name = TYPE_NAME (TYPE_TARGET_TYPE (type));
6510 if (name == NULL)
6511 return 0;
6512
6513 return (strcmp (name, "ada__tags__dispatch_table") == 0);
6514}
6515
ac4a2da4
JG
6516/* Return non-zero if TYPE is an interface tag. */
6517
6518static int
6519ada_is_interface_tag (struct type *type)
6520{
6521 const char *name = TYPE_NAME (type);
6522
6523 if (name == NULL)
6524 return 0;
6525
6526 return (strcmp (name, "ada__tags__interface_tag") == 0);
6527}
6528
963a6417
PH
6529/* True if field number FIELD_NUM in struct or union type TYPE is supposed
6530 to be invisible to users. */
96d887e8 6531
963a6417
PH
6532int
6533ada_is_ignored_field (struct type *type, int field_num)
96d887e8 6534{
963a6417
PH
6535 if (field_num < 0 || field_num > TYPE_NFIELDS (type))
6536 return 1;
ffde82bf 6537
73fb9985
JB
6538 /* Check the name of that field. */
6539 {
6540 const char *name = TYPE_FIELD_NAME (type, field_num);
6541
6542 /* Anonymous field names should not be printed.
6543 brobecker/2007-02-20: I don't think this can actually happen
30baf67b 6544 but we don't want to print the value of anonymous fields anyway. */
73fb9985
JB
6545 if (name == NULL)
6546 return 1;
6547
ffde82bf
JB
6548 /* Normally, fields whose name start with an underscore ("_")
6549 are fields that have been internally generated by the compiler,
6550 and thus should not be printed. The "_parent" field is special,
6551 however: This is a field internally generated by the compiler
6552 for tagged types, and it contains the components inherited from
6553 the parent type. This field should not be printed as is, but
6554 should not be ignored either. */
61012eef 6555 if (name[0] == '_' && !startswith (name, "_parent"))
73fb9985
JB
6556 return 1;
6557 }
6558
ac4a2da4
JG
6559 /* If this is the dispatch table of a tagged type or an interface tag,
6560 then ignore. */
73fb9985 6561 if (ada_is_tagged_type (type, 1)
ac4a2da4
JG
6562 && (ada_is_dispatch_table_ptr_type (TYPE_FIELD_TYPE (type, field_num))
6563 || ada_is_interface_tag (TYPE_FIELD_TYPE (type, field_num))))
73fb9985
JB
6564 return 1;
6565
6566 /* Not a special field, so it should not be ignored. */
6567 return 0;
963a6417 6568}
96d887e8 6569
963a6417 6570/* True iff TYPE has a tag field. If REFOK, then TYPE may also be a
0963b4bd 6571 pointer or reference type whose ultimate target has a tag field. */
96d887e8 6572
963a6417
PH
6573int
6574ada_is_tagged_type (struct type *type, int refok)
6575{
988f6b3d 6576 return (ada_lookup_struct_elt_type (type, "_tag", refok, 1) != NULL);
963a6417 6577}
96d887e8 6578
963a6417 6579/* True iff TYPE represents the type of X'Tag */
96d887e8 6580
963a6417
PH
6581int
6582ada_is_tag_type (struct type *type)
6583{
460efde1
JB
6584 type = ada_check_typedef (type);
6585
963a6417
PH
6586 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_PTR)
6587 return 0;
6588 else
96d887e8 6589 {
963a6417 6590 const char *name = ada_type_name (TYPE_TARGET_TYPE (type));
5b4ee69b 6591
963a6417
PH
6592 return (name != NULL
6593 && strcmp (name, "ada__tags__dispatch_table") == 0);
96d887e8 6594 }
96d887e8
PH
6595}
6596
963a6417 6597/* The type of the tag on VAL. */
76a01679 6598
de93309a 6599static struct type *
963a6417 6600ada_tag_type (struct value *val)
96d887e8 6601{
988f6b3d 6602 return ada_lookup_struct_elt_type (value_type (val), "_tag", 1, 0);
963a6417 6603}
96d887e8 6604
b50d69b5
JG
6605/* Return 1 if TAG follows the old scheme for Ada tags (used for Ada 95,
6606 retired at Ada 05). */
6607
6608static int
6609is_ada95_tag (struct value *tag)
6610{
6611 return ada_value_struct_elt (tag, "tsd", 1) != NULL;
6612}
6613
963a6417 6614/* The value of the tag on VAL. */
96d887e8 6615
de93309a 6616static struct value *
963a6417
PH
6617ada_value_tag (struct value *val)
6618{
03ee6b2e 6619 return ada_value_struct_elt (val, "_tag", 0);
96d887e8
PH
6620}
6621
963a6417
PH
6622/* The value of the tag on the object of type TYPE whose contents are
6623 saved at VALADDR, if it is non-null, or is at memory address
0963b4bd 6624 ADDRESS. */
96d887e8 6625
963a6417 6626static struct value *
10a2c479 6627value_tag_from_contents_and_address (struct type *type,
fc1a4b47 6628 const gdb_byte *valaddr,
963a6417 6629 CORE_ADDR address)
96d887e8 6630{
b5385fc0 6631 int tag_byte_offset;
963a6417 6632 struct type *tag_type;
5b4ee69b 6633
963a6417 6634 if (find_struct_field ("_tag", type, 0, &tag_type, &tag_byte_offset,
52ce6436 6635 NULL, NULL, NULL))
96d887e8 6636 {
fc1a4b47 6637 const gdb_byte *valaddr1 = ((valaddr == NULL)
10a2c479
AC
6638 ? NULL
6639 : valaddr + tag_byte_offset);
963a6417 6640 CORE_ADDR address1 = (address == 0) ? 0 : address + tag_byte_offset;
96d887e8 6641
963a6417 6642 return value_from_contents_and_address (tag_type, valaddr1, address1);
96d887e8 6643 }
963a6417
PH
6644 return NULL;
6645}
96d887e8 6646
963a6417
PH
6647static struct type *
6648type_from_tag (struct value *tag)
6649{
6650 const char *type_name = ada_tag_name (tag);
5b4ee69b 6651
963a6417
PH
6652 if (type_name != NULL)
6653 return ada_find_any_type (ada_encode (type_name));
6654 return NULL;
6655}
96d887e8 6656
b50d69b5
JG
6657/* Given a value OBJ of a tagged type, return a value of this
6658 type at the base address of the object. The base address, as
6659 defined in Ada.Tags, it is the address of the primary tag of
6660 the object, and therefore where the field values of its full
6661 view can be fetched. */
6662
6663struct value *
6664ada_tag_value_at_base_address (struct value *obj)
6665{
b50d69b5
JG
6666 struct value *val;
6667 LONGEST offset_to_top = 0;
6668 struct type *ptr_type, *obj_type;
6669 struct value *tag;
6670 CORE_ADDR base_address;
6671
6672 obj_type = value_type (obj);
6673
6674 /* It is the responsability of the caller to deref pointers. */
6675
6676 if (TYPE_CODE (obj_type) == TYPE_CODE_PTR
6677 || TYPE_CODE (obj_type) == TYPE_CODE_REF)
6678 return obj;
6679
6680 tag = ada_value_tag (obj);
6681 if (!tag)
6682 return obj;
6683
6684 /* Base addresses only appeared with Ada 05 and multiple inheritance. */
6685
6686 if (is_ada95_tag (tag))
6687 return obj;
6688
08f49010
XR
6689 ptr_type = language_lookup_primitive_type
6690 (language_def (language_ada), target_gdbarch(), "storage_offset");
b50d69b5
JG
6691 ptr_type = lookup_pointer_type (ptr_type);
6692 val = value_cast (ptr_type, tag);
6693 if (!val)
6694 return obj;
6695
6696 /* It is perfectly possible that an exception be raised while
6697 trying to determine the base address, just like for the tag;
6698 see ada_tag_name for more details. We do not print the error
6699 message for the same reason. */
6700
a70b8144 6701 try
b50d69b5
JG
6702 {
6703 offset_to_top = value_as_long (value_ind (value_ptradd (val, -2)));
6704 }
6705
230d2906 6706 catch (const gdb_exception_error &e)
492d29ea
PA
6707 {
6708 return obj;
6709 }
b50d69b5
JG
6710
6711 /* If offset is null, nothing to do. */
6712
6713 if (offset_to_top == 0)
6714 return obj;
6715
6716 /* -1 is a special case in Ada.Tags; however, what should be done
6717 is not quite clear from the documentation. So do nothing for
6718 now. */
6719
6720 if (offset_to_top == -1)
6721 return obj;
6722
08f49010
XR
6723 /* OFFSET_TO_TOP used to be a positive value to be subtracted
6724 from the base address. This was however incompatible with
6725 C++ dispatch table: C++ uses a *negative* value to *add*
6726 to the base address. Ada's convention has therefore been
6727 changed in GNAT 19.0w 20171023: since then, C++ and Ada
6728 use the same convention. Here, we support both cases by
6729 checking the sign of OFFSET_TO_TOP. */
6730
6731 if (offset_to_top > 0)
6732 offset_to_top = -offset_to_top;
6733
6734 base_address = value_address (obj) + offset_to_top;
b50d69b5
JG
6735 tag = value_tag_from_contents_and_address (obj_type, NULL, base_address);
6736
6737 /* Make sure that we have a proper tag at the new address.
6738 Otherwise, offset_to_top is bogus (which can happen when
6739 the object is not initialized yet). */
6740
6741 if (!tag)
6742 return obj;
6743
6744 obj_type = type_from_tag (tag);
6745
6746 if (!obj_type)
6747 return obj;
6748
6749 return value_from_contents_and_address (obj_type, NULL, base_address);
6750}
6751
1b611343
JB
6752/* Return the "ada__tags__type_specific_data" type. */
6753
6754static struct type *
6755ada_get_tsd_type (struct inferior *inf)
963a6417 6756{
1b611343 6757 struct ada_inferior_data *data = get_ada_inferior_data (inf);
4c4b4cd2 6758
1b611343
JB
6759 if (data->tsd_type == 0)
6760 data->tsd_type = ada_find_any_type ("ada__tags__type_specific_data");
6761 return data->tsd_type;
6762}
529cad9c 6763
1b611343
JB
6764/* Return the TSD (type-specific data) associated to the given TAG.
6765 TAG is assumed to be the tag of a tagged-type entity.
529cad9c 6766
1b611343 6767 May return NULL if we are unable to get the TSD. */
4c4b4cd2 6768
1b611343
JB
6769static struct value *
6770ada_get_tsd_from_tag (struct value *tag)
4c4b4cd2 6771{
4c4b4cd2 6772 struct value *val;
1b611343 6773 struct type *type;
5b4ee69b 6774
1b611343
JB
6775 /* First option: The TSD is simply stored as a field of our TAG.
6776 Only older versions of GNAT would use this format, but we have
6777 to test it first, because there are no visible markers for
6778 the current approach except the absence of that field. */
529cad9c 6779
1b611343
JB
6780 val = ada_value_struct_elt (tag, "tsd", 1);
6781 if (val)
6782 return val;
e802dbe0 6783
1b611343
JB
6784 /* Try the second representation for the dispatch table (in which
6785 there is no explicit 'tsd' field in the referent of the tag pointer,
6786 and instead the tsd pointer is stored just before the dispatch
6787 table. */
e802dbe0 6788
1b611343
JB
6789 type = ada_get_tsd_type (current_inferior());
6790 if (type == NULL)
6791 return NULL;
6792 type = lookup_pointer_type (lookup_pointer_type (type));
6793 val = value_cast (type, tag);
6794 if (val == NULL)
6795 return NULL;
6796 return value_ind (value_ptradd (val, -1));
e802dbe0
JB
6797}
6798
1b611343
JB
6799/* Given the TSD of a tag (type-specific data), return a string
6800 containing the name of the associated type.
6801
6802 The returned value is good until the next call. May return NULL
6803 if we are unable to determine the tag name. */
6804
6805static char *
6806ada_tag_name_from_tsd (struct value *tsd)
529cad9c 6807{
529cad9c
PH
6808 static char name[1024];
6809 char *p;
1b611343 6810 struct value *val;
529cad9c 6811
1b611343 6812 val = ada_value_struct_elt (tsd, "expanded_name", 1);
4c4b4cd2 6813 if (val == NULL)
1b611343 6814 return NULL;
4c4b4cd2
PH
6815 read_memory_string (value_as_address (val), name, sizeof (name) - 1);
6816 for (p = name; *p != '\0'; p += 1)
6817 if (isalpha (*p))
6818 *p = tolower (*p);
1b611343 6819 return name;
4c4b4cd2
PH
6820}
6821
6822/* The type name of the dynamic type denoted by the 'tag value TAG, as
1b611343
JB
6823 a C string.
6824
6825 Return NULL if the TAG is not an Ada tag, or if we were unable to
6826 determine the name of that tag. The result is good until the next
6827 call. */
4c4b4cd2
PH
6828
6829const char *
6830ada_tag_name (struct value *tag)
6831{
1b611343 6832 char *name = NULL;
5b4ee69b 6833
df407dfe 6834 if (!ada_is_tag_type (value_type (tag)))
4c4b4cd2 6835 return NULL;
1b611343
JB
6836
6837 /* It is perfectly possible that an exception be raised while trying
6838 to determine the TAG's name, even under normal circumstances:
6839 The associated variable may be uninitialized or corrupted, for
6840 instance. We do not let any exception propagate past this point.
6841 instead we return NULL.
6842
6843 We also do not print the error message either (which often is very
6844 low-level (Eg: "Cannot read memory at 0x[...]"), but instead let
6845 the caller print a more meaningful message if necessary. */
a70b8144 6846 try
1b611343
JB
6847 {
6848 struct value *tsd = ada_get_tsd_from_tag (tag);
6849
6850 if (tsd != NULL)
6851 name = ada_tag_name_from_tsd (tsd);
6852 }
230d2906 6853 catch (const gdb_exception_error &e)
492d29ea
PA
6854 {
6855 }
1b611343
JB
6856
6857 return name;
4c4b4cd2
PH
6858}
6859
6860/* The parent type of TYPE, or NULL if none. */
14f9c5c9 6861
d2e4a39e 6862struct type *
ebf56fd3 6863ada_parent_type (struct type *type)
14f9c5c9
AS
6864{
6865 int i;
6866
61ee279c 6867 type = ada_check_typedef (type);
14f9c5c9
AS
6868
6869 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_STRUCT)
6870 return NULL;
6871
6872 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
6873 if (ada_is_parent_field (type, i))
0c1f74cf
JB
6874 {
6875 struct type *parent_type = TYPE_FIELD_TYPE (type, i);
6876
6877 /* If the _parent field is a pointer, then dereference it. */
6878 if (TYPE_CODE (parent_type) == TYPE_CODE_PTR)
6879 parent_type = TYPE_TARGET_TYPE (parent_type);
6880 /* If there is a parallel XVS type, get the actual base type. */
6881 parent_type = ada_get_base_type (parent_type);
6882
6883 return ada_check_typedef (parent_type);
6884 }
14f9c5c9
AS
6885
6886 return NULL;
6887}
6888
4c4b4cd2
PH
6889/* True iff field number FIELD_NUM of structure type TYPE contains the
6890 parent-type (inherited) fields of a derived type. Assumes TYPE is
6891 a structure type with at least FIELD_NUM+1 fields. */
14f9c5c9
AS
6892
6893int
ebf56fd3 6894ada_is_parent_field (struct type *type, int field_num)
14f9c5c9 6895{
61ee279c 6896 const char *name = TYPE_FIELD_NAME (ada_check_typedef (type), field_num);
5b4ee69b 6897
4c4b4cd2 6898 return (name != NULL
61012eef
GB
6899 && (startswith (name, "PARENT")
6900 || startswith (name, "_parent")));
14f9c5c9
AS
6901}
6902
4c4b4cd2 6903/* True iff field number FIELD_NUM of structure type TYPE is a
14f9c5c9 6904 transparent wrapper field (which should be silently traversed when doing
4c4b4cd2 6905 field selection and flattened when printing). Assumes TYPE is a
14f9c5c9 6906 structure type with at least FIELD_NUM+1 fields. Such fields are always
4c4b4cd2 6907 structures. */
14f9c5c9
AS
6908
6909int
ebf56fd3 6910ada_is_wrapper_field (struct type *type, int field_num)
14f9c5c9 6911{
d2e4a39e 6912 const char *name = TYPE_FIELD_NAME (type, field_num);
5b4ee69b 6913
dddc0e16
JB
6914 if (name != NULL && strcmp (name, "RETVAL") == 0)
6915 {
6916 /* This happens in functions with "out" or "in out" parameters
6917 which are passed by copy. For such functions, GNAT describes
6918 the function's return type as being a struct where the return
6919 value is in a field called RETVAL, and where the other "out"
6920 or "in out" parameters are fields of that struct. This is not
6921 a wrapper. */
6922 return 0;
6923 }
6924
d2e4a39e 6925 return (name != NULL
61012eef 6926 && (startswith (name, "PARENT")
4c4b4cd2 6927 || strcmp (name, "REP") == 0
61012eef 6928 || startswith (name, "_parent")
4c4b4cd2 6929 || name[0] == 'S' || name[0] == 'R' || name[0] == 'O'));
14f9c5c9
AS
6930}
6931
4c4b4cd2
PH
6932/* True iff field number FIELD_NUM of structure or union type TYPE
6933 is a variant wrapper. Assumes TYPE is a structure type with at least
6934 FIELD_NUM+1 fields. */
14f9c5c9
AS
6935
6936int
ebf56fd3 6937ada_is_variant_part (struct type *type, int field_num)
14f9c5c9 6938{
8ecb59f8
TT
6939 /* Only Ada types are eligible. */
6940 if (!ADA_TYPE_P (type))
6941 return 0;
6942
d2e4a39e 6943 struct type *field_type = TYPE_FIELD_TYPE (type, field_num);
5b4ee69b 6944
14f9c5c9 6945 return (TYPE_CODE (field_type) == TYPE_CODE_UNION
4c4b4cd2 6946 || (is_dynamic_field (type, field_num)
c3e5cd34
PH
6947 && (TYPE_CODE (TYPE_TARGET_TYPE (field_type))
6948 == TYPE_CODE_UNION)));
14f9c5c9
AS
6949}
6950
6951/* Assuming that VAR_TYPE is a variant wrapper (type of the variant part)
4c4b4cd2 6952 whose discriminants are contained in the record type OUTER_TYPE,
7c964f07
UW
6953 returns the type of the controlling discriminant for the variant.
6954 May return NULL if the type could not be found. */
14f9c5c9 6955
d2e4a39e 6956struct type *
ebf56fd3 6957ada_variant_discrim_type (struct type *var_type, struct type *outer_type)
14f9c5c9 6958{
a121b7c1 6959 const char *name = ada_variant_discrim_name (var_type);
5b4ee69b 6960
988f6b3d 6961 return ada_lookup_struct_elt_type (outer_type, name, 1, 1);
14f9c5c9
AS
6962}
6963
4c4b4cd2 6964/* Assuming that TYPE is the type of a variant wrapper, and FIELD_NUM is a
14f9c5c9 6965 valid field number within it, returns 1 iff field FIELD_NUM of TYPE
4c4b4cd2 6966 represents a 'when others' clause; otherwise 0. */
14f9c5c9 6967
de93309a 6968static int
ebf56fd3 6969ada_is_others_clause (struct type *type, int field_num)
14f9c5c9 6970{
d2e4a39e 6971 const char *name = TYPE_FIELD_NAME (type, field_num);
5b4ee69b 6972
14f9c5c9
AS
6973 return (name != NULL && name[0] == 'O');
6974}
6975
6976/* Assuming that TYPE0 is the type of the variant part of a record,
4c4b4cd2
PH
6977 returns the name of the discriminant controlling the variant.
6978 The value is valid until the next call to ada_variant_discrim_name. */
14f9c5c9 6979
a121b7c1 6980const char *
ebf56fd3 6981ada_variant_discrim_name (struct type *type0)
14f9c5c9 6982{
d2e4a39e 6983 static char *result = NULL;
14f9c5c9 6984 static size_t result_len = 0;
d2e4a39e
AS
6985 struct type *type;
6986 const char *name;
6987 const char *discrim_end;
6988 const char *discrim_start;
14f9c5c9
AS
6989
6990 if (TYPE_CODE (type0) == TYPE_CODE_PTR)
6991 type = TYPE_TARGET_TYPE (type0);
6992 else
6993 type = type0;
6994
6995 name = ada_type_name (type);
6996
6997 if (name == NULL || name[0] == '\000')
6998 return "";
6999
7000 for (discrim_end = name + strlen (name) - 6; discrim_end != name;
7001 discrim_end -= 1)
7002 {
61012eef 7003 if (startswith (discrim_end, "___XVN"))
4c4b4cd2 7004 break;
14f9c5c9
AS
7005 }
7006 if (discrim_end == name)
7007 return "";
7008
d2e4a39e 7009 for (discrim_start = discrim_end; discrim_start != name + 3;
14f9c5c9
AS
7010 discrim_start -= 1)
7011 {
d2e4a39e 7012 if (discrim_start == name + 1)
4c4b4cd2 7013 return "";
76a01679 7014 if ((discrim_start > name + 3
61012eef 7015 && startswith (discrim_start - 3, "___"))
4c4b4cd2
PH
7016 || discrim_start[-1] == '.')
7017 break;
14f9c5c9
AS
7018 }
7019
7020 GROW_VECT (result, result_len, discrim_end - discrim_start + 1);
7021 strncpy (result, discrim_start, discrim_end - discrim_start);
d2e4a39e 7022 result[discrim_end - discrim_start] = '\0';
14f9c5c9
AS
7023 return result;
7024}
7025
4c4b4cd2
PH
7026/* Scan STR for a subtype-encoded number, beginning at position K.
7027 Put the position of the character just past the number scanned in
7028 *NEW_K, if NEW_K!=NULL. Put the scanned number in *R, if R!=NULL.
7029 Return 1 if there was a valid number at the given position, and 0
7030 otherwise. A "subtype-encoded" number consists of the absolute value
7031 in decimal, followed by the letter 'm' to indicate a negative number.
7032 Assumes 0m does not occur. */
14f9c5c9
AS
7033
7034int
d2e4a39e 7035ada_scan_number (const char str[], int k, LONGEST * R, int *new_k)
14f9c5c9
AS
7036{
7037 ULONGEST RU;
7038
d2e4a39e 7039 if (!isdigit (str[k]))
14f9c5c9
AS
7040 return 0;
7041
4c4b4cd2 7042 /* Do it the hard way so as not to make any assumption about
14f9c5c9 7043 the relationship of unsigned long (%lu scan format code) and
4c4b4cd2 7044 LONGEST. */
14f9c5c9
AS
7045 RU = 0;
7046 while (isdigit (str[k]))
7047 {
d2e4a39e 7048 RU = RU * 10 + (str[k] - '0');
14f9c5c9
AS
7049 k += 1;
7050 }
7051
d2e4a39e 7052 if (str[k] == 'm')
14f9c5c9
AS
7053 {
7054 if (R != NULL)
4c4b4cd2 7055 *R = (-(LONGEST) (RU - 1)) - 1;
14f9c5c9
AS
7056 k += 1;
7057 }
7058 else if (R != NULL)
7059 *R = (LONGEST) RU;
7060
4c4b4cd2 7061 /* NOTE on the above: Technically, C does not say what the results of
14f9c5c9
AS
7062 - (LONGEST) RU or (LONGEST) -RU are for RU == largest positive
7063 number representable as a LONGEST (although either would probably work
7064 in most implementations). When RU>0, the locution in the then branch
4c4b4cd2 7065 above is always equivalent to the negative of RU. */
14f9c5c9
AS
7066
7067 if (new_k != NULL)
7068 *new_k = k;
7069 return 1;
7070}
7071
4c4b4cd2
PH
7072/* Assuming that TYPE is a variant part wrapper type (a VARIANTS field),
7073 and FIELD_NUM is a valid field number within it, returns 1 iff VAL is
7074 in the range encoded by field FIELD_NUM of TYPE; otherwise 0. */
14f9c5c9 7075
de93309a 7076static int
ebf56fd3 7077ada_in_variant (LONGEST val, struct type *type, int field_num)
14f9c5c9 7078{
d2e4a39e 7079 const char *name = TYPE_FIELD_NAME (type, field_num);
14f9c5c9
AS
7080 int p;
7081
7082 p = 0;
7083 while (1)
7084 {
d2e4a39e 7085 switch (name[p])
4c4b4cd2
PH
7086 {
7087 case '\0':
7088 return 0;
7089 case 'S':
7090 {
7091 LONGEST W;
5b4ee69b 7092
4c4b4cd2
PH
7093 if (!ada_scan_number (name, p + 1, &W, &p))
7094 return 0;
7095 if (val == W)
7096 return 1;
7097 break;
7098 }
7099 case 'R':
7100 {
7101 LONGEST L, U;
5b4ee69b 7102
4c4b4cd2
PH
7103 if (!ada_scan_number (name, p + 1, &L, &p)
7104 || name[p] != 'T' || !ada_scan_number (name, p + 1, &U, &p))
7105 return 0;
7106 if (val >= L && val <= U)
7107 return 1;
7108 break;
7109 }
7110 case 'O':
7111 return 1;
7112 default:
7113 return 0;
7114 }
7115 }
7116}
7117
0963b4bd 7118/* FIXME: Lots of redundancy below. Try to consolidate. */
4c4b4cd2
PH
7119
7120/* Given a value ARG1 (offset by OFFSET bytes) of a struct or union type
7121 ARG_TYPE, extract and return the value of one of its (non-static)
7122 fields. FIELDNO says which field. Differs from value_primitive_field
7123 only in that it can handle packed values of arbitrary type. */
14f9c5c9 7124
5eb68a39 7125struct value *
d2e4a39e 7126ada_value_primitive_field (struct value *arg1, int offset, int fieldno,
4c4b4cd2 7127 struct type *arg_type)
14f9c5c9 7128{
14f9c5c9
AS
7129 struct type *type;
7130
61ee279c 7131 arg_type = ada_check_typedef (arg_type);
14f9c5c9
AS
7132 type = TYPE_FIELD_TYPE (arg_type, fieldno);
7133
4504bbde
TT
7134 /* Handle packed fields. It might be that the field is not packed
7135 relative to its containing structure, but the structure itself is
7136 packed; in this case we must take the bit-field path. */
7137 if (TYPE_FIELD_BITSIZE (arg_type, fieldno) != 0 || value_bitpos (arg1) != 0)
14f9c5c9
AS
7138 {
7139 int bit_pos = TYPE_FIELD_BITPOS (arg_type, fieldno);
7140 int bit_size = TYPE_FIELD_BITSIZE (arg_type, fieldno);
d2e4a39e 7141
0fd88904 7142 return ada_value_primitive_packed_val (arg1, value_contents (arg1),
4c4b4cd2
PH
7143 offset + bit_pos / 8,
7144 bit_pos % 8, bit_size, type);
14f9c5c9
AS
7145 }
7146 else
7147 return value_primitive_field (arg1, offset, fieldno, arg_type);
7148}
7149
52ce6436
PH
7150/* Find field with name NAME in object of type TYPE. If found,
7151 set the following for each argument that is non-null:
7152 - *FIELD_TYPE_P to the field's type;
7153 - *BYTE_OFFSET_P to OFFSET + the byte offset of the field within
7154 an object of that type;
7155 - *BIT_OFFSET_P to the bit offset modulo byte size of the field;
7156 - *BIT_SIZE_P to its size in bits if the field is packed, and
7157 0 otherwise;
7158 If INDEX_P is non-null, increment *INDEX_P by the number of source-visible
7159 fields up to but not including the desired field, or by the total
7160 number of fields if not found. A NULL value of NAME never
7161 matches; the function just counts visible fields in this case.
7162
828d5846
XR
7163 Notice that we need to handle when a tagged record hierarchy
7164 has some components with the same name, like in this scenario:
7165
7166 type Top_T is tagged record
7167 N : Integer := 1;
7168 U : Integer := 974;
7169 A : Integer := 48;
7170 end record;
7171
7172 type Middle_T is new Top.Top_T with record
7173 N : Character := 'a';
7174 C : Integer := 3;
7175 end record;
7176
7177 type Bottom_T is new Middle.Middle_T with record
7178 N : Float := 4.0;
7179 C : Character := '5';
7180 X : Integer := 6;
7181 A : Character := 'J';
7182 end record;
7183
7184 Let's say we now have a variable declared and initialized as follow:
7185
7186 TC : Top_A := new Bottom_T;
7187
7188 And then we use this variable to call this function
7189
7190 procedure Assign (Obj: in out Top_T; TV : Integer);
7191
7192 as follow:
7193
7194 Assign (Top_T (B), 12);
7195
7196 Now, we're in the debugger, and we're inside that procedure
7197 then and we want to print the value of obj.c:
7198
7199 Usually, the tagged record or one of the parent type owns the
7200 component to print and there's no issue but in this particular
7201 case, what does it mean to ask for Obj.C? Since the actual
7202 type for object is type Bottom_T, it could mean two things: type
7203 component C from the Middle_T view, but also component C from
7204 Bottom_T. So in that "undefined" case, when the component is
7205 not found in the non-resolved type (which includes all the
7206 components of the parent type), then resolve it and see if we
7207 get better luck once expanded.
7208
7209 In the case of homonyms in the derived tagged type, we don't
7210 guaranty anything, and pick the one that's easiest for us
7211 to program.
7212
0963b4bd 7213 Returns 1 if found, 0 otherwise. */
52ce6436 7214
4c4b4cd2 7215static int
0d5cff50 7216find_struct_field (const char *name, struct type *type, int offset,
76a01679 7217 struct type **field_type_p,
52ce6436
PH
7218 int *byte_offset_p, int *bit_offset_p, int *bit_size_p,
7219 int *index_p)
4c4b4cd2
PH
7220{
7221 int i;
828d5846 7222 int parent_offset = -1;
4c4b4cd2 7223
61ee279c 7224 type = ada_check_typedef (type);
76a01679 7225
52ce6436
PH
7226 if (field_type_p != NULL)
7227 *field_type_p = NULL;
7228 if (byte_offset_p != NULL)
d5d6fca5 7229 *byte_offset_p = 0;
52ce6436
PH
7230 if (bit_offset_p != NULL)
7231 *bit_offset_p = 0;
7232 if (bit_size_p != NULL)
7233 *bit_size_p = 0;
7234
7235 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
4c4b4cd2
PH
7236 {
7237 int bit_pos = TYPE_FIELD_BITPOS (type, i);
7238 int fld_offset = offset + bit_pos / 8;
0d5cff50 7239 const char *t_field_name = TYPE_FIELD_NAME (type, i);
76a01679 7240
4c4b4cd2
PH
7241 if (t_field_name == NULL)
7242 continue;
7243
828d5846
XR
7244 else if (ada_is_parent_field (type, i))
7245 {
7246 /* This is a field pointing us to the parent type of a tagged
7247 type. As hinted in this function's documentation, we give
7248 preference to fields in the current record first, so what
7249 we do here is just record the index of this field before
7250 we skip it. If it turns out we couldn't find our field
7251 in the current record, then we'll get back to it and search
7252 inside it whether the field might exist in the parent. */
7253
7254 parent_offset = i;
7255 continue;
7256 }
7257
52ce6436 7258 else if (name != NULL && field_name_match (t_field_name, name))
76a01679
JB
7259 {
7260 int bit_size = TYPE_FIELD_BITSIZE (type, i);
5b4ee69b 7261
52ce6436
PH
7262 if (field_type_p != NULL)
7263 *field_type_p = TYPE_FIELD_TYPE (type, i);
7264 if (byte_offset_p != NULL)
7265 *byte_offset_p = fld_offset;
7266 if (bit_offset_p != NULL)
7267 *bit_offset_p = bit_pos % 8;
7268 if (bit_size_p != NULL)
7269 *bit_size_p = bit_size;
76a01679
JB
7270 return 1;
7271 }
4c4b4cd2
PH
7272 else if (ada_is_wrapper_field (type, i))
7273 {
52ce6436
PH
7274 if (find_struct_field (name, TYPE_FIELD_TYPE (type, i), fld_offset,
7275 field_type_p, byte_offset_p, bit_offset_p,
7276 bit_size_p, index_p))
76a01679
JB
7277 return 1;
7278 }
4c4b4cd2
PH
7279 else if (ada_is_variant_part (type, i))
7280 {
52ce6436
PH
7281 /* PNH: Wait. Do we ever execute this section, or is ARG always of
7282 fixed type?? */
4c4b4cd2 7283 int j;
52ce6436
PH
7284 struct type *field_type
7285 = ada_check_typedef (TYPE_FIELD_TYPE (type, i));
4c4b4cd2 7286
52ce6436 7287 for (j = 0; j < TYPE_NFIELDS (field_type); j += 1)
4c4b4cd2 7288 {
76a01679
JB
7289 if (find_struct_field (name, TYPE_FIELD_TYPE (field_type, j),
7290 fld_offset
7291 + TYPE_FIELD_BITPOS (field_type, j) / 8,
7292 field_type_p, byte_offset_p,
52ce6436 7293 bit_offset_p, bit_size_p, index_p))
76a01679 7294 return 1;
4c4b4cd2
PH
7295 }
7296 }
52ce6436
PH
7297 else if (index_p != NULL)
7298 *index_p += 1;
4c4b4cd2 7299 }
828d5846
XR
7300
7301 /* Field not found so far. If this is a tagged type which
7302 has a parent, try finding that field in the parent now. */
7303
7304 if (parent_offset != -1)
7305 {
7306 int bit_pos = TYPE_FIELD_BITPOS (type, parent_offset);
7307 int fld_offset = offset + bit_pos / 8;
7308
7309 if (find_struct_field (name, TYPE_FIELD_TYPE (type, parent_offset),
7310 fld_offset, field_type_p, byte_offset_p,
7311 bit_offset_p, bit_size_p, index_p))
7312 return 1;
7313 }
7314
4c4b4cd2
PH
7315 return 0;
7316}
7317
0963b4bd 7318/* Number of user-visible fields in record type TYPE. */
4c4b4cd2 7319
52ce6436
PH
7320static int
7321num_visible_fields (struct type *type)
7322{
7323 int n;
5b4ee69b 7324
52ce6436
PH
7325 n = 0;
7326 find_struct_field (NULL, type, 0, NULL, NULL, NULL, NULL, &n);
7327 return n;
7328}
14f9c5c9 7329
4c4b4cd2 7330/* Look for a field NAME in ARG. Adjust the address of ARG by OFFSET bytes,
14f9c5c9
AS
7331 and search in it assuming it has (class) type TYPE.
7332 If found, return value, else return NULL.
7333
828d5846
XR
7334 Searches recursively through wrapper fields (e.g., '_parent').
7335
7336 In the case of homonyms in the tagged types, please refer to the
7337 long explanation in find_struct_field's function documentation. */
14f9c5c9 7338
4c4b4cd2 7339static struct value *
108d56a4 7340ada_search_struct_field (const char *name, struct value *arg, int offset,
4c4b4cd2 7341 struct type *type)
14f9c5c9
AS
7342{
7343 int i;
828d5846 7344 int parent_offset = -1;
14f9c5c9 7345
5b4ee69b 7346 type = ada_check_typedef (type);
52ce6436 7347 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
14f9c5c9 7348 {
0d5cff50 7349 const char *t_field_name = TYPE_FIELD_NAME (type, i);
14f9c5c9
AS
7350
7351 if (t_field_name == NULL)
4c4b4cd2 7352 continue;
14f9c5c9 7353
828d5846
XR
7354 else if (ada_is_parent_field (type, i))
7355 {
7356 /* This is a field pointing us to the parent type of a tagged
7357 type. As hinted in this function's documentation, we give
7358 preference to fields in the current record first, so what
7359 we do here is just record the index of this field before
7360 we skip it. If it turns out we couldn't find our field
7361 in the current record, then we'll get back to it and search
7362 inside it whether the field might exist in the parent. */
7363
7364 parent_offset = i;
7365 continue;
7366 }
7367
14f9c5c9 7368 else if (field_name_match (t_field_name, name))
4c4b4cd2 7369 return ada_value_primitive_field (arg, offset, i, type);
14f9c5c9
AS
7370
7371 else if (ada_is_wrapper_field (type, i))
4c4b4cd2 7372 {
0963b4bd 7373 struct value *v = /* Do not let indent join lines here. */
06d5cf63
JB
7374 ada_search_struct_field (name, arg,
7375 offset + TYPE_FIELD_BITPOS (type, i) / 8,
7376 TYPE_FIELD_TYPE (type, i));
5b4ee69b 7377
4c4b4cd2
PH
7378 if (v != NULL)
7379 return v;
7380 }
14f9c5c9
AS
7381
7382 else if (ada_is_variant_part (type, i))
4c4b4cd2 7383 {
0963b4bd 7384 /* PNH: Do we ever get here? See find_struct_field. */
4c4b4cd2 7385 int j;
5b4ee69b
MS
7386 struct type *field_type = ada_check_typedef (TYPE_FIELD_TYPE (type,
7387 i));
4c4b4cd2
PH
7388 int var_offset = offset + TYPE_FIELD_BITPOS (type, i) / 8;
7389
52ce6436 7390 for (j = 0; j < TYPE_NFIELDS (field_type); j += 1)
4c4b4cd2 7391 {
0963b4bd
MS
7392 struct value *v = ada_search_struct_field /* Force line
7393 break. */
06d5cf63
JB
7394 (name, arg,
7395 var_offset + TYPE_FIELD_BITPOS (field_type, j) / 8,
7396 TYPE_FIELD_TYPE (field_type, j));
5b4ee69b 7397
4c4b4cd2
PH
7398 if (v != NULL)
7399 return v;
7400 }
7401 }
14f9c5c9 7402 }
828d5846
XR
7403
7404 /* Field not found so far. If this is a tagged type which
7405 has a parent, try finding that field in the parent now. */
7406
7407 if (parent_offset != -1)
7408 {
7409 struct value *v = ada_search_struct_field (
7410 name, arg, offset + TYPE_FIELD_BITPOS (type, parent_offset) / 8,
7411 TYPE_FIELD_TYPE (type, parent_offset));
7412
7413 if (v != NULL)
7414 return v;
7415 }
7416
14f9c5c9
AS
7417 return NULL;
7418}
d2e4a39e 7419
52ce6436
PH
7420static struct value *ada_index_struct_field_1 (int *, struct value *,
7421 int, struct type *);
7422
7423
7424/* Return field #INDEX in ARG, where the index is that returned by
7425 * find_struct_field through its INDEX_P argument. Adjust the address
7426 * of ARG by OFFSET bytes, and search in it assuming it has (class) type TYPE.
0963b4bd 7427 * If found, return value, else return NULL. */
52ce6436
PH
7428
7429static struct value *
7430ada_index_struct_field (int index, struct value *arg, int offset,
7431 struct type *type)
7432{
7433 return ada_index_struct_field_1 (&index, arg, offset, type);
7434}
7435
7436
7437/* Auxiliary function for ada_index_struct_field. Like
7438 * ada_index_struct_field, but takes index from *INDEX_P and modifies
0963b4bd 7439 * *INDEX_P. */
52ce6436
PH
7440
7441static struct value *
7442ada_index_struct_field_1 (int *index_p, struct value *arg, int offset,
7443 struct type *type)
7444{
7445 int i;
7446 type = ada_check_typedef (type);
7447
7448 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
7449 {
7450 if (TYPE_FIELD_NAME (type, i) == NULL)
7451 continue;
7452 else if (ada_is_wrapper_field (type, i))
7453 {
0963b4bd 7454 struct value *v = /* Do not let indent join lines here. */
52ce6436
PH
7455 ada_index_struct_field_1 (index_p, arg,
7456 offset + TYPE_FIELD_BITPOS (type, i) / 8,
7457 TYPE_FIELD_TYPE (type, i));
5b4ee69b 7458
52ce6436
PH
7459 if (v != NULL)
7460 return v;
7461 }
7462
7463 else if (ada_is_variant_part (type, i))
7464 {
7465 /* PNH: Do we ever get here? See ada_search_struct_field,
0963b4bd 7466 find_struct_field. */
52ce6436
PH
7467 error (_("Cannot assign this kind of variant record"));
7468 }
7469 else if (*index_p == 0)
7470 return ada_value_primitive_field (arg, offset, i, type);
7471 else
7472 *index_p -= 1;
7473 }
7474 return NULL;
7475}
7476
3b4de39c 7477/* Return a string representation of type TYPE. */
99bbb428 7478
3b4de39c 7479static std::string
99bbb428
PA
7480type_as_string (struct type *type)
7481{
d7e74731 7482 string_file tmp_stream;
99bbb428 7483
d7e74731 7484 type_print (type, "", &tmp_stream, -1);
99bbb428 7485
d7e74731 7486 return std::move (tmp_stream.string ());
99bbb428
PA
7487}
7488
14f9c5c9 7489/* Given a type TYPE, look up the type of the component of type named NAME.
4c4b4cd2
PH
7490 If DISPP is non-null, add its byte displacement from the beginning of a
7491 structure (pointed to by a value) of type TYPE to *DISPP (does not
14f9c5c9
AS
7492 work for packed fields).
7493
7494 Matches any field whose name has NAME as a prefix, possibly
4c4b4cd2 7495 followed by "___".
14f9c5c9 7496
0963b4bd 7497 TYPE can be either a struct or union. If REFOK, TYPE may also
4c4b4cd2
PH
7498 be a (pointer or reference)+ to a struct or union, and the
7499 ultimate target type will be searched.
14f9c5c9
AS
7500
7501 Looks recursively into variant clauses and parent types.
7502
828d5846
XR
7503 In the case of homonyms in the tagged types, please refer to the
7504 long explanation in find_struct_field's function documentation.
7505
4c4b4cd2
PH
7506 If NOERR is nonzero, return NULL if NAME is not suitably defined or
7507 TYPE is not a type of the right kind. */
14f9c5c9 7508
4c4b4cd2 7509static struct type *
a121b7c1 7510ada_lookup_struct_elt_type (struct type *type, const char *name, int refok,
988f6b3d 7511 int noerr)
14f9c5c9
AS
7512{
7513 int i;
828d5846 7514 int parent_offset = -1;
14f9c5c9
AS
7515
7516 if (name == NULL)
7517 goto BadName;
7518
76a01679 7519 if (refok && type != NULL)
4c4b4cd2
PH
7520 while (1)
7521 {
61ee279c 7522 type = ada_check_typedef (type);
76a01679
JB
7523 if (TYPE_CODE (type) != TYPE_CODE_PTR
7524 && TYPE_CODE (type) != TYPE_CODE_REF)
7525 break;
7526 type = TYPE_TARGET_TYPE (type);
4c4b4cd2 7527 }
14f9c5c9 7528
76a01679 7529 if (type == NULL
1265e4aa
JB
7530 || (TYPE_CODE (type) != TYPE_CODE_STRUCT
7531 && TYPE_CODE (type) != TYPE_CODE_UNION))
14f9c5c9 7532 {
4c4b4cd2 7533 if (noerr)
76a01679 7534 return NULL;
99bbb428 7535
3b4de39c
PA
7536 error (_("Type %s is not a structure or union type"),
7537 type != NULL ? type_as_string (type).c_str () : _("(null)"));
14f9c5c9
AS
7538 }
7539
7540 type = to_static_fixed_type (type);
7541
7542 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
7543 {
0d5cff50 7544 const char *t_field_name = TYPE_FIELD_NAME (type, i);
14f9c5c9 7545 struct type *t;
d2e4a39e 7546
14f9c5c9 7547 if (t_field_name == NULL)
4c4b4cd2 7548 continue;
14f9c5c9 7549
828d5846
XR
7550 else if (ada_is_parent_field (type, i))
7551 {
7552 /* This is a field pointing us to the parent type of a tagged
7553 type. As hinted in this function's documentation, we give
7554 preference to fields in the current record first, so what
7555 we do here is just record the index of this field before
7556 we skip it. If it turns out we couldn't find our field
7557 in the current record, then we'll get back to it and search
7558 inside it whether the field might exist in the parent. */
7559
7560 parent_offset = i;
7561 continue;
7562 }
7563
14f9c5c9 7564 else if (field_name_match (t_field_name, name))
988f6b3d 7565 return TYPE_FIELD_TYPE (type, i);
14f9c5c9
AS
7566
7567 else if (ada_is_wrapper_field (type, i))
4c4b4cd2 7568 {
4c4b4cd2 7569 t = ada_lookup_struct_elt_type (TYPE_FIELD_TYPE (type, i), name,
988f6b3d 7570 0, 1);
4c4b4cd2 7571 if (t != NULL)
988f6b3d 7572 return t;
4c4b4cd2 7573 }
14f9c5c9
AS
7574
7575 else if (ada_is_variant_part (type, i))
4c4b4cd2
PH
7576 {
7577 int j;
5b4ee69b
MS
7578 struct type *field_type = ada_check_typedef (TYPE_FIELD_TYPE (type,
7579 i));
4c4b4cd2
PH
7580
7581 for (j = TYPE_NFIELDS (field_type) - 1; j >= 0; j -= 1)
7582 {
b1f33ddd
JB
7583 /* FIXME pnh 2008/01/26: We check for a field that is
7584 NOT wrapped in a struct, since the compiler sometimes
7585 generates these for unchecked variant types. Revisit
0963b4bd 7586 if the compiler changes this practice. */
0d5cff50 7587 const char *v_field_name = TYPE_FIELD_NAME (field_type, j);
988f6b3d 7588
b1f33ddd
JB
7589 if (v_field_name != NULL
7590 && field_name_match (v_field_name, name))
460efde1 7591 t = TYPE_FIELD_TYPE (field_type, j);
b1f33ddd 7592 else
0963b4bd
MS
7593 t = ada_lookup_struct_elt_type (TYPE_FIELD_TYPE (field_type,
7594 j),
988f6b3d 7595 name, 0, 1);
b1f33ddd 7596
4c4b4cd2 7597 if (t != NULL)
988f6b3d 7598 return t;
4c4b4cd2
PH
7599 }
7600 }
14f9c5c9
AS
7601
7602 }
7603
828d5846
XR
7604 /* Field not found so far. If this is a tagged type which
7605 has a parent, try finding that field in the parent now. */
7606
7607 if (parent_offset != -1)
7608 {
7609 struct type *t;
7610
7611 t = ada_lookup_struct_elt_type (TYPE_FIELD_TYPE (type, parent_offset),
7612 name, 0, 1);
7613 if (t != NULL)
7614 return t;
7615 }
7616
14f9c5c9 7617BadName:
d2e4a39e 7618 if (!noerr)
14f9c5c9 7619 {
2b2798cc 7620 const char *name_str = name != NULL ? name : _("<null>");
99bbb428
PA
7621
7622 error (_("Type %s has no component named %s"),
3b4de39c 7623 type_as_string (type).c_str (), name_str);
14f9c5c9
AS
7624 }
7625
7626 return NULL;
7627}
7628
b1f33ddd
JB
7629/* Assuming that VAR_TYPE is the type of a variant part of a record (a union),
7630 within a value of type OUTER_TYPE, return true iff VAR_TYPE
7631 represents an unchecked union (that is, the variant part of a
0963b4bd 7632 record that is named in an Unchecked_Union pragma). */
b1f33ddd
JB
7633
7634static int
7635is_unchecked_variant (struct type *var_type, struct type *outer_type)
7636{
a121b7c1 7637 const char *discrim_name = ada_variant_discrim_name (var_type);
5b4ee69b 7638
988f6b3d 7639 return (ada_lookup_struct_elt_type (outer_type, discrim_name, 0, 1) == NULL);
b1f33ddd
JB
7640}
7641
7642
14f9c5c9 7643/* Assuming that VAR_TYPE is the type of a variant part of a record (a union),
d8af9068 7644 within OUTER, determine which variant clause (field number in VAR_TYPE,
4c4b4cd2 7645 numbering from 0) is applicable. Returns -1 if none are. */
14f9c5c9 7646
d2e4a39e 7647int
d8af9068 7648ada_which_variant_applies (struct type *var_type, struct value *outer)
14f9c5c9
AS
7649{
7650 int others_clause;
7651 int i;
a121b7c1 7652 const char *discrim_name = ada_variant_discrim_name (var_type);
0c281816 7653 struct value *discrim;
14f9c5c9
AS
7654 LONGEST discrim_val;
7655
012370f6
TT
7656 /* Using plain value_from_contents_and_address here causes problems
7657 because we will end up trying to resolve a type that is currently
7658 being constructed. */
0c281816
JB
7659 discrim = ada_value_struct_elt (outer, discrim_name, 1);
7660 if (discrim == NULL)
14f9c5c9 7661 return -1;
0c281816 7662 discrim_val = value_as_long (discrim);
14f9c5c9
AS
7663
7664 others_clause = -1;
7665 for (i = 0; i < TYPE_NFIELDS (var_type); i += 1)
7666 {
7667 if (ada_is_others_clause (var_type, i))
4c4b4cd2 7668 others_clause = i;
14f9c5c9 7669 else if (ada_in_variant (discrim_val, var_type, i))
4c4b4cd2 7670 return i;
14f9c5c9
AS
7671 }
7672
7673 return others_clause;
7674}
d2e4a39e 7675\f
14f9c5c9
AS
7676
7677
4c4b4cd2 7678 /* Dynamic-Sized Records */
14f9c5c9
AS
7679
7680/* Strategy: The type ostensibly attached to a value with dynamic size
7681 (i.e., a size that is not statically recorded in the debugging
7682 data) does not accurately reflect the size or layout of the value.
7683 Our strategy is to convert these values to values with accurate,
4c4b4cd2 7684 conventional types that are constructed on the fly. */
14f9c5c9
AS
7685
7686/* There is a subtle and tricky problem here. In general, we cannot
7687 determine the size of dynamic records without its data. However,
7688 the 'struct value' data structure, which GDB uses to represent
7689 quantities in the inferior process (the target), requires the size
7690 of the type at the time of its allocation in order to reserve space
7691 for GDB's internal copy of the data. That's why the
7692 'to_fixed_xxx_type' routines take (target) addresses as parameters,
4c4b4cd2 7693 rather than struct value*s.
14f9c5c9
AS
7694
7695 However, GDB's internal history variables ($1, $2, etc.) are
7696 struct value*s containing internal copies of the data that are not, in
7697 general, the same as the data at their corresponding addresses in
7698 the target. Fortunately, the types we give to these values are all
7699 conventional, fixed-size types (as per the strategy described
7700 above), so that we don't usually have to perform the
7701 'to_fixed_xxx_type' conversions to look at their values.
7702 Unfortunately, there is one exception: if one of the internal
7703 history variables is an array whose elements are unconstrained
7704 records, then we will need to create distinct fixed types for each
7705 element selected. */
7706
7707/* The upshot of all of this is that many routines take a (type, host
7708 address, target address) triple as arguments to represent a value.
7709 The host address, if non-null, is supposed to contain an internal
7710 copy of the relevant data; otherwise, the program is to consult the
4c4b4cd2 7711 target at the target address. */
14f9c5c9
AS
7712
7713/* Assuming that VAL0 represents a pointer value, the result of
7714 dereferencing it. Differs from value_ind in its treatment of
4c4b4cd2 7715 dynamic-sized types. */
14f9c5c9 7716
d2e4a39e
AS
7717struct value *
7718ada_value_ind (struct value *val0)
14f9c5c9 7719{
c48db5ca 7720 struct value *val = value_ind (val0);
5b4ee69b 7721
b50d69b5
JG
7722 if (ada_is_tagged_type (value_type (val), 0))
7723 val = ada_tag_value_at_base_address (val);
7724
4c4b4cd2 7725 return ada_to_fixed_value (val);
14f9c5c9
AS
7726}
7727
7728/* The value resulting from dereferencing any "reference to"
4c4b4cd2
PH
7729 qualifiers on VAL0. */
7730
d2e4a39e
AS
7731static struct value *
7732ada_coerce_ref (struct value *val0)
7733{
df407dfe 7734 if (TYPE_CODE (value_type (val0)) == TYPE_CODE_REF)
d2e4a39e
AS
7735 {
7736 struct value *val = val0;
5b4ee69b 7737
994b9211 7738 val = coerce_ref (val);
b50d69b5
JG
7739
7740 if (ada_is_tagged_type (value_type (val), 0))
7741 val = ada_tag_value_at_base_address (val);
7742
4c4b4cd2 7743 return ada_to_fixed_value (val);
d2e4a39e
AS
7744 }
7745 else
14f9c5c9
AS
7746 return val0;
7747}
7748
4c4b4cd2 7749/* Return the bit alignment required for field #F of template type TYPE. */
14f9c5c9
AS
7750
7751static unsigned int
ebf56fd3 7752field_alignment (struct type *type, int f)
14f9c5c9 7753{
d2e4a39e 7754 const char *name = TYPE_FIELD_NAME (type, f);
64a1bf19 7755 int len;
14f9c5c9
AS
7756 int align_offset;
7757
64a1bf19
JB
7758 /* The field name should never be null, unless the debugging information
7759 is somehow malformed. In this case, we assume the field does not
7760 require any alignment. */
7761 if (name == NULL)
7762 return 1;
7763
7764 len = strlen (name);
7765
4c4b4cd2
PH
7766 if (!isdigit (name[len - 1]))
7767 return 1;
14f9c5c9 7768
d2e4a39e 7769 if (isdigit (name[len - 2]))
14f9c5c9
AS
7770 align_offset = len - 2;
7771 else
7772 align_offset = len - 1;
7773
61012eef 7774 if (align_offset < 7 || !startswith (name + align_offset - 6, "___XV"))
14f9c5c9
AS
7775 return TARGET_CHAR_BIT;
7776
4c4b4cd2
PH
7777 return atoi (name + align_offset) * TARGET_CHAR_BIT;
7778}
7779
852dff6c 7780/* Find a typedef or tag symbol named NAME. Ignores ambiguity. */
4c4b4cd2 7781
852dff6c
JB
7782static struct symbol *
7783ada_find_any_type_symbol (const char *name)
4c4b4cd2
PH
7784{
7785 struct symbol *sym;
7786
7787 sym = standard_lookup (name, get_selected_block (NULL), VAR_DOMAIN);
4186eb54 7788 if (sym != NULL && SYMBOL_CLASS (sym) == LOC_TYPEDEF)
4c4b4cd2
PH
7789 return sym;
7790
4186eb54
KS
7791 sym = standard_lookup (name, NULL, STRUCT_DOMAIN);
7792 return sym;
14f9c5c9
AS
7793}
7794
dddfab26
UW
7795/* Find a type named NAME. Ignores ambiguity. This routine will look
7796 solely for types defined by debug info, it will not search the GDB
7797 primitive types. */
4c4b4cd2 7798
852dff6c 7799static struct type *
ebf56fd3 7800ada_find_any_type (const char *name)
14f9c5c9 7801{
852dff6c 7802 struct symbol *sym = ada_find_any_type_symbol (name);
14f9c5c9 7803
14f9c5c9 7804 if (sym != NULL)
dddfab26 7805 return SYMBOL_TYPE (sym);
14f9c5c9 7806
dddfab26 7807 return NULL;
14f9c5c9
AS
7808}
7809
739593e0
JB
7810/* Given NAME_SYM and an associated BLOCK, find a "renaming" symbol
7811 associated with NAME_SYM's name. NAME_SYM may itself be a renaming
7812 symbol, in which case it is returned. Otherwise, this looks for
7813 symbols whose name is that of NAME_SYM suffixed with "___XR".
7814 Return symbol if found, and NULL otherwise. */
4c4b4cd2 7815
c0e70c62
TT
7816static bool
7817ada_is_renaming_symbol (struct symbol *name_sym)
aeb5907d 7818{
987012b8 7819 const char *name = name_sym->linkage_name ();
c0e70c62 7820 return strstr (name, "___XR") != NULL;
4c4b4cd2
PH
7821}
7822
14f9c5c9 7823/* Because of GNAT encoding conventions, several GDB symbols may match a
4c4b4cd2 7824 given type name. If the type denoted by TYPE0 is to be preferred to
14f9c5c9 7825 that of TYPE1 for purposes of type printing, return non-zero;
4c4b4cd2
PH
7826 otherwise return 0. */
7827
14f9c5c9 7828int
d2e4a39e 7829ada_prefer_type (struct type *type0, struct type *type1)
14f9c5c9
AS
7830{
7831 if (type1 == NULL)
7832 return 1;
7833 else if (type0 == NULL)
7834 return 0;
7835 else if (TYPE_CODE (type1) == TYPE_CODE_VOID)
7836 return 1;
7837 else if (TYPE_CODE (type0) == TYPE_CODE_VOID)
7838 return 0;
4c4b4cd2
PH
7839 else if (TYPE_NAME (type1) == NULL && TYPE_NAME (type0) != NULL)
7840 return 1;
ad82864c 7841 else if (ada_is_constrained_packed_array_type (type0))
14f9c5c9 7842 return 1;
4c4b4cd2
PH
7843 else if (ada_is_array_descriptor_type (type0)
7844 && !ada_is_array_descriptor_type (type1))
14f9c5c9 7845 return 1;
aeb5907d
JB
7846 else
7847 {
a737d952
TT
7848 const char *type0_name = TYPE_NAME (type0);
7849 const char *type1_name = TYPE_NAME (type1);
aeb5907d
JB
7850
7851 if (type0_name != NULL && strstr (type0_name, "___XR") != NULL
7852 && (type1_name == NULL || strstr (type1_name, "___XR") == NULL))
7853 return 1;
7854 }
14f9c5c9
AS
7855 return 0;
7856}
7857
e86ca25f
TT
7858/* The name of TYPE, which is its TYPE_NAME. Null if TYPE is
7859 null. */
4c4b4cd2 7860
0d5cff50 7861const char *
d2e4a39e 7862ada_type_name (struct type *type)
14f9c5c9 7863{
d2e4a39e 7864 if (type == NULL)
14f9c5c9 7865 return NULL;
e86ca25f 7866 return TYPE_NAME (type);
14f9c5c9
AS
7867}
7868
b4ba55a1
JB
7869/* Search the list of "descriptive" types associated to TYPE for a type
7870 whose name is NAME. */
7871
7872static struct type *
7873find_parallel_type_by_descriptive_type (struct type *type, const char *name)
7874{
931e5bc3 7875 struct type *result, *tmp;
b4ba55a1 7876
c6044dd1
JB
7877 if (ada_ignore_descriptive_types_p)
7878 return NULL;
7879
b4ba55a1
JB
7880 /* If there no descriptive-type info, then there is no parallel type
7881 to be found. */
7882 if (!HAVE_GNAT_AUX_INFO (type))
7883 return NULL;
7884
7885 result = TYPE_DESCRIPTIVE_TYPE (type);
7886 while (result != NULL)
7887 {
0d5cff50 7888 const char *result_name = ada_type_name (result);
b4ba55a1
JB
7889
7890 if (result_name == NULL)
7891 {
7892 warning (_("unexpected null name on descriptive type"));
7893 return NULL;
7894 }
7895
7896 /* If the names match, stop. */
7897 if (strcmp (result_name, name) == 0)
7898 break;
7899
7900 /* Otherwise, look at the next item on the list, if any. */
7901 if (HAVE_GNAT_AUX_INFO (result))
931e5bc3
JG
7902 tmp = TYPE_DESCRIPTIVE_TYPE (result);
7903 else
7904 tmp = NULL;
7905
7906 /* If not found either, try after having resolved the typedef. */
7907 if (tmp != NULL)
7908 result = tmp;
b4ba55a1 7909 else
931e5bc3 7910 {
f168693b 7911 result = check_typedef (result);
931e5bc3
JG
7912 if (HAVE_GNAT_AUX_INFO (result))
7913 result = TYPE_DESCRIPTIVE_TYPE (result);
7914 else
7915 result = NULL;
7916 }
b4ba55a1
JB
7917 }
7918
7919 /* If we didn't find a match, see whether this is a packed array. With
7920 older compilers, the descriptive type information is either absent or
7921 irrelevant when it comes to packed arrays so the above lookup fails.
7922 Fall back to using a parallel lookup by name in this case. */
12ab9e09 7923 if (result == NULL && ada_is_constrained_packed_array_type (type))
b4ba55a1
JB
7924 return ada_find_any_type (name);
7925
7926 return result;
7927}
7928
7929/* Find a parallel type to TYPE with the specified NAME, using the
7930 descriptive type taken from the debugging information, if available,
7931 and otherwise using the (slower) name-based method. */
7932
7933static struct type *
7934ada_find_parallel_type_with_name (struct type *type, const char *name)
7935{
7936 struct type *result = NULL;
7937
7938 if (HAVE_GNAT_AUX_INFO (type))
7939 result = find_parallel_type_by_descriptive_type (type, name);
7940 else
7941 result = ada_find_any_type (name);
7942
7943 return result;
7944}
7945
7946/* Same as above, but specify the name of the parallel type by appending
4c4b4cd2 7947 SUFFIX to the name of TYPE. */
14f9c5c9 7948
d2e4a39e 7949struct type *
ebf56fd3 7950ada_find_parallel_type (struct type *type, const char *suffix)
14f9c5c9 7951{
0d5cff50 7952 char *name;
fe978cb0 7953 const char *type_name = ada_type_name (type);
14f9c5c9 7954 int len;
d2e4a39e 7955
fe978cb0 7956 if (type_name == NULL)
14f9c5c9
AS
7957 return NULL;
7958
fe978cb0 7959 len = strlen (type_name);
14f9c5c9 7960
b4ba55a1 7961 name = (char *) alloca (len + strlen (suffix) + 1);
14f9c5c9 7962
fe978cb0 7963 strcpy (name, type_name);
14f9c5c9
AS
7964 strcpy (name + len, suffix);
7965
b4ba55a1 7966 return ada_find_parallel_type_with_name (type, name);
14f9c5c9
AS
7967}
7968
14f9c5c9 7969/* If TYPE is a variable-size record type, return the corresponding template
4c4b4cd2 7970 type describing its fields. Otherwise, return NULL. */
14f9c5c9 7971
d2e4a39e
AS
7972static struct type *
7973dynamic_template_type (struct type *type)
14f9c5c9 7974{
61ee279c 7975 type = ada_check_typedef (type);
14f9c5c9
AS
7976
7977 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_STRUCT
d2e4a39e 7978 || ada_type_name (type) == NULL)
14f9c5c9 7979 return NULL;
d2e4a39e 7980 else
14f9c5c9
AS
7981 {
7982 int len = strlen (ada_type_name (type));
5b4ee69b 7983
4c4b4cd2
PH
7984 if (len > 6 && strcmp (ada_type_name (type) + len - 6, "___XVE") == 0)
7985 return type;
14f9c5c9 7986 else
4c4b4cd2 7987 return ada_find_parallel_type (type, "___XVE");
14f9c5c9
AS
7988 }
7989}
7990
7991/* Assuming that TEMPL_TYPE is a union or struct type, returns
4c4b4cd2 7992 non-zero iff field FIELD_NUM of TEMPL_TYPE has dynamic size. */
14f9c5c9 7993
d2e4a39e
AS
7994static int
7995is_dynamic_field (struct type *templ_type, int field_num)
14f9c5c9
AS
7996{
7997 const char *name = TYPE_FIELD_NAME (templ_type, field_num);
5b4ee69b 7998
d2e4a39e 7999 return name != NULL
14f9c5c9
AS
8000 && TYPE_CODE (TYPE_FIELD_TYPE (templ_type, field_num)) == TYPE_CODE_PTR
8001 && strstr (name, "___XVL") != NULL;
8002}
8003
4c4b4cd2
PH
8004/* The index of the variant field of TYPE, or -1 if TYPE does not
8005 represent a variant record type. */
14f9c5c9 8006
d2e4a39e 8007static int
4c4b4cd2 8008variant_field_index (struct type *type)
14f9c5c9
AS
8009{
8010 int f;
8011
4c4b4cd2
PH
8012 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_STRUCT)
8013 return -1;
8014
8015 for (f = 0; f < TYPE_NFIELDS (type); f += 1)
8016 {
8017 if (ada_is_variant_part (type, f))
8018 return f;
8019 }
8020 return -1;
14f9c5c9
AS
8021}
8022
4c4b4cd2
PH
8023/* A record type with no fields. */
8024
d2e4a39e 8025static struct type *
fe978cb0 8026empty_record (struct type *templ)
14f9c5c9 8027{
fe978cb0 8028 struct type *type = alloc_type_copy (templ);
5b4ee69b 8029
67607e24 8030 type->set_code (TYPE_CODE_STRUCT);
14f9c5c9
AS
8031 TYPE_NFIELDS (type) = 0;
8032 TYPE_FIELDS (type) = NULL;
8ecb59f8 8033 INIT_NONE_SPECIFIC (type);
14f9c5c9 8034 TYPE_NAME (type) = "<empty>";
14f9c5c9
AS
8035 TYPE_LENGTH (type) = 0;
8036 return type;
8037}
8038
8039/* An ordinary record type (with fixed-length fields) that describes
4c4b4cd2
PH
8040 the value of type TYPE at VALADDR or ADDRESS (see comments at
8041 the beginning of this section) VAL according to GNAT conventions.
8042 DVAL0 should describe the (portion of a) record that contains any
df407dfe 8043 necessary discriminants. It should be NULL if value_type (VAL) is
14f9c5c9
AS
8044 an outer-level type (i.e., as opposed to a branch of a variant.) A
8045 variant field (unless unchecked) is replaced by a particular branch
4c4b4cd2 8046 of the variant.
14f9c5c9 8047
4c4b4cd2
PH
8048 If not KEEP_DYNAMIC_FIELDS, then all fields whose position or
8049 length are not statically known are discarded. As a consequence,
8050 VALADDR, ADDRESS and DVAL0 are ignored.
8051
8052 NOTE: Limitations: For now, we assume that dynamic fields and
8053 variants occupy whole numbers of bytes. However, they need not be
8054 byte-aligned. */
8055
8056struct type *
10a2c479 8057ada_template_to_fixed_record_type_1 (struct type *type,
fc1a4b47 8058 const gdb_byte *valaddr,
4c4b4cd2
PH
8059 CORE_ADDR address, struct value *dval0,
8060 int keep_dynamic_fields)
14f9c5c9 8061{
d2e4a39e
AS
8062 struct value *mark = value_mark ();
8063 struct value *dval;
8064 struct type *rtype;
14f9c5c9 8065 int nfields, bit_len;
4c4b4cd2 8066 int variant_field;
14f9c5c9 8067 long off;
d94e4f4f 8068 int fld_bit_len;
14f9c5c9
AS
8069 int f;
8070
4c4b4cd2
PH
8071 /* Compute the number of fields in this record type that are going
8072 to be processed: unless keep_dynamic_fields, this includes only
8073 fields whose position and length are static will be processed. */
8074 if (keep_dynamic_fields)
8075 nfields = TYPE_NFIELDS (type);
8076 else
8077 {
8078 nfields = 0;
76a01679 8079 while (nfields < TYPE_NFIELDS (type)
4c4b4cd2
PH
8080 && !ada_is_variant_part (type, nfields)
8081 && !is_dynamic_field (type, nfields))
8082 nfields++;
8083 }
8084
e9bb382b 8085 rtype = alloc_type_copy (type);
67607e24 8086 rtype->set_code (TYPE_CODE_STRUCT);
8ecb59f8 8087 INIT_NONE_SPECIFIC (rtype);
14f9c5c9 8088 TYPE_NFIELDS (rtype) = nfields;
d2e4a39e 8089 TYPE_FIELDS (rtype) = (struct field *)
14f9c5c9
AS
8090 TYPE_ALLOC (rtype, nfields * sizeof (struct field));
8091 memset (TYPE_FIELDS (rtype), 0, sizeof (struct field) * nfields);
8092 TYPE_NAME (rtype) = ada_type_name (type);
876cecd0 8093 TYPE_FIXED_INSTANCE (rtype) = 1;
14f9c5c9 8094
d2e4a39e
AS
8095 off = 0;
8096 bit_len = 0;
4c4b4cd2
PH
8097 variant_field = -1;
8098
14f9c5c9
AS
8099 for (f = 0; f < nfields; f += 1)
8100 {
a89febbd 8101 off = align_up (off, field_alignment (type, f))
6c038f32 8102 + TYPE_FIELD_BITPOS (type, f);
945b3a32 8103 SET_FIELD_BITPOS (TYPE_FIELD (rtype, f), off);
d2e4a39e 8104 TYPE_FIELD_BITSIZE (rtype, f) = 0;
14f9c5c9 8105
d2e4a39e 8106 if (ada_is_variant_part (type, f))
4c4b4cd2
PH
8107 {
8108 variant_field = f;
d94e4f4f 8109 fld_bit_len = 0;
4c4b4cd2 8110 }
14f9c5c9 8111 else if (is_dynamic_field (type, f))
4c4b4cd2 8112 {
284614f0
JB
8113 const gdb_byte *field_valaddr = valaddr;
8114 CORE_ADDR field_address = address;
8115 struct type *field_type =
8116 TYPE_TARGET_TYPE (TYPE_FIELD_TYPE (type, f));
8117
4c4b4cd2 8118 if (dval0 == NULL)
b5304971
JG
8119 {
8120 /* rtype's length is computed based on the run-time
8121 value of discriminants. If the discriminants are not
8122 initialized, the type size may be completely bogus and
0963b4bd 8123 GDB may fail to allocate a value for it. So check the
b5304971 8124 size first before creating the value. */
c1b5a1a6 8125 ada_ensure_varsize_limit (rtype);
012370f6
TT
8126 /* Using plain value_from_contents_and_address here
8127 causes problems because we will end up trying to
8128 resolve a type that is currently being
8129 constructed. */
8130 dval = value_from_contents_and_address_unresolved (rtype,
8131 valaddr,
8132 address);
9f1f738a 8133 rtype = value_type (dval);
b5304971 8134 }
4c4b4cd2
PH
8135 else
8136 dval = dval0;
8137
284614f0
JB
8138 /* If the type referenced by this field is an aligner type, we need
8139 to unwrap that aligner type, because its size might not be set.
8140 Keeping the aligner type would cause us to compute the wrong
8141 size for this field, impacting the offset of the all the fields
8142 that follow this one. */
8143 if (ada_is_aligner_type (field_type))
8144 {
8145 long field_offset = TYPE_FIELD_BITPOS (field_type, f);
8146
8147 field_valaddr = cond_offset_host (field_valaddr, field_offset);
8148 field_address = cond_offset_target (field_address, field_offset);
8149 field_type = ada_aligned_type (field_type);
8150 }
8151
8152 field_valaddr = cond_offset_host (field_valaddr,
8153 off / TARGET_CHAR_BIT);
8154 field_address = cond_offset_target (field_address,
8155 off / TARGET_CHAR_BIT);
8156
8157 /* Get the fixed type of the field. Note that, in this case,
8158 we do not want to get the real type out of the tag: if
8159 the current field is the parent part of a tagged record,
8160 we will get the tag of the object. Clearly wrong: the real
8161 type of the parent is not the real type of the child. We
8162 would end up in an infinite loop. */
8163 field_type = ada_get_base_type (field_type);
8164 field_type = ada_to_fixed_type (field_type, field_valaddr,
8165 field_address, dval, 0);
27f2a97b
JB
8166 /* If the field size is already larger than the maximum
8167 object size, then the record itself will necessarily
8168 be larger than the maximum object size. We need to make
8169 this check now, because the size might be so ridiculously
8170 large (due to an uninitialized variable in the inferior)
8171 that it would cause an overflow when adding it to the
8172 record size. */
c1b5a1a6 8173 ada_ensure_varsize_limit (field_type);
284614f0
JB
8174
8175 TYPE_FIELD_TYPE (rtype, f) = field_type;
4c4b4cd2 8176 TYPE_FIELD_NAME (rtype, f) = TYPE_FIELD_NAME (type, f);
27f2a97b
JB
8177 /* The multiplication can potentially overflow. But because
8178 the field length has been size-checked just above, and
8179 assuming that the maximum size is a reasonable value,
8180 an overflow should not happen in practice. So rather than
8181 adding overflow recovery code to this already complex code,
8182 we just assume that it's not going to happen. */
d94e4f4f 8183 fld_bit_len =
4c4b4cd2
PH
8184 TYPE_LENGTH (TYPE_FIELD_TYPE (rtype, f)) * TARGET_CHAR_BIT;
8185 }
14f9c5c9 8186 else
4c4b4cd2 8187 {
5ded5331
JB
8188 /* Note: If this field's type is a typedef, it is important
8189 to preserve the typedef layer.
8190
8191 Otherwise, we might be transforming a typedef to a fat
8192 pointer (encoding a pointer to an unconstrained array),
8193 into a basic fat pointer (encoding an unconstrained
8194 array). As both types are implemented using the same
8195 structure, the typedef is the only clue which allows us
8196 to distinguish between the two options. Stripping it
8197 would prevent us from printing this field appropriately. */
8198 TYPE_FIELD_TYPE (rtype, f) = TYPE_FIELD_TYPE (type, f);
4c4b4cd2
PH
8199 TYPE_FIELD_NAME (rtype, f) = TYPE_FIELD_NAME (type, f);
8200 if (TYPE_FIELD_BITSIZE (type, f) > 0)
d94e4f4f 8201 fld_bit_len =
4c4b4cd2
PH
8202 TYPE_FIELD_BITSIZE (rtype, f) = TYPE_FIELD_BITSIZE (type, f);
8203 else
5ded5331
JB
8204 {
8205 struct type *field_type = TYPE_FIELD_TYPE (type, f);
8206
8207 /* We need to be careful of typedefs when computing
8208 the length of our field. If this is a typedef,
8209 get the length of the target type, not the length
8210 of the typedef. */
8211 if (TYPE_CODE (field_type) == TYPE_CODE_TYPEDEF)
8212 field_type = ada_typedef_target_type (field_type);
8213
8214 fld_bit_len =
8215 TYPE_LENGTH (ada_check_typedef (field_type)) * TARGET_CHAR_BIT;
8216 }
4c4b4cd2 8217 }
14f9c5c9 8218 if (off + fld_bit_len > bit_len)
4c4b4cd2 8219 bit_len = off + fld_bit_len;
d94e4f4f 8220 off += fld_bit_len;
4c4b4cd2 8221 TYPE_LENGTH (rtype) =
a89febbd 8222 align_up (bit_len, TARGET_CHAR_BIT) / TARGET_CHAR_BIT;
14f9c5c9 8223 }
4c4b4cd2
PH
8224
8225 /* We handle the variant part, if any, at the end because of certain
b1f33ddd 8226 odd cases in which it is re-ordered so as NOT to be the last field of
4c4b4cd2
PH
8227 the record. This can happen in the presence of representation
8228 clauses. */
8229 if (variant_field >= 0)
8230 {
8231 struct type *branch_type;
8232
8233 off = TYPE_FIELD_BITPOS (rtype, variant_field);
8234
8235 if (dval0 == NULL)
9f1f738a 8236 {
012370f6
TT
8237 /* Using plain value_from_contents_and_address here causes
8238 problems because we will end up trying to resolve a type
8239 that is currently being constructed. */
8240 dval = value_from_contents_and_address_unresolved (rtype, valaddr,
8241 address);
9f1f738a
SA
8242 rtype = value_type (dval);
8243 }
4c4b4cd2
PH
8244 else
8245 dval = dval0;
8246
8247 branch_type =
8248 to_fixed_variant_branch_type
8249 (TYPE_FIELD_TYPE (type, variant_field),
8250 cond_offset_host (valaddr, off / TARGET_CHAR_BIT),
8251 cond_offset_target (address, off / TARGET_CHAR_BIT), dval);
8252 if (branch_type == NULL)
8253 {
8254 for (f = variant_field + 1; f < TYPE_NFIELDS (rtype); f += 1)
8255 TYPE_FIELDS (rtype)[f - 1] = TYPE_FIELDS (rtype)[f];
8256 TYPE_NFIELDS (rtype) -= 1;
8257 }
8258 else
8259 {
8260 TYPE_FIELD_TYPE (rtype, variant_field) = branch_type;
8261 TYPE_FIELD_NAME (rtype, variant_field) = "S";
8262 fld_bit_len =
8263 TYPE_LENGTH (TYPE_FIELD_TYPE (rtype, variant_field)) *
8264 TARGET_CHAR_BIT;
8265 if (off + fld_bit_len > bit_len)
8266 bit_len = off + fld_bit_len;
8267 TYPE_LENGTH (rtype) =
a89febbd 8268 align_up (bit_len, TARGET_CHAR_BIT) / TARGET_CHAR_BIT;
4c4b4cd2
PH
8269 }
8270 }
8271
714e53ab
PH
8272 /* According to exp_dbug.ads, the size of TYPE for variable-size records
8273 should contain the alignment of that record, which should be a strictly
8274 positive value. If null or negative, then something is wrong, most
8275 probably in the debug info. In that case, we don't round up the size
0963b4bd 8276 of the resulting type. If this record is not part of another structure,
714e53ab
PH
8277 the current RTYPE length might be good enough for our purposes. */
8278 if (TYPE_LENGTH (type) <= 0)
8279 {
323e0a4a 8280 if (TYPE_NAME (rtype))
cc1defb1
KS
8281 warning (_("Invalid type size for `%s' detected: %s."),
8282 TYPE_NAME (rtype), pulongest (TYPE_LENGTH (type)));
323e0a4a 8283 else
cc1defb1
KS
8284 warning (_("Invalid type size for <unnamed> detected: %s."),
8285 pulongest (TYPE_LENGTH (type)));
714e53ab
PH
8286 }
8287 else
8288 {
a89febbd
TT
8289 TYPE_LENGTH (rtype) = align_up (TYPE_LENGTH (rtype),
8290 TYPE_LENGTH (type));
714e53ab 8291 }
14f9c5c9
AS
8292
8293 value_free_to_mark (mark);
d2e4a39e 8294 if (TYPE_LENGTH (rtype) > varsize_limit)
323e0a4a 8295 error (_("record type with dynamic size is larger than varsize-limit"));
14f9c5c9
AS
8296 return rtype;
8297}
8298
4c4b4cd2
PH
8299/* As for ada_template_to_fixed_record_type_1 with KEEP_DYNAMIC_FIELDS
8300 of 1. */
14f9c5c9 8301
d2e4a39e 8302static struct type *
fc1a4b47 8303template_to_fixed_record_type (struct type *type, const gdb_byte *valaddr,
4c4b4cd2
PH
8304 CORE_ADDR address, struct value *dval0)
8305{
8306 return ada_template_to_fixed_record_type_1 (type, valaddr,
8307 address, dval0, 1);
8308}
8309
8310/* An ordinary record type in which ___XVL-convention fields and
8311 ___XVU- and ___XVN-convention field types in TYPE0 are replaced with
8312 static approximations, containing all possible fields. Uses
8313 no runtime values. Useless for use in values, but that's OK,
8314 since the results are used only for type determinations. Works on both
8315 structs and unions. Representation note: to save space, we memorize
8316 the result of this function in the TYPE_TARGET_TYPE of the
8317 template type. */
8318
8319static struct type *
8320template_to_static_fixed_type (struct type *type0)
14f9c5c9
AS
8321{
8322 struct type *type;
8323 int nfields;
8324 int f;
8325
9e195661
PMR
8326 /* No need no do anything if the input type is already fixed. */
8327 if (TYPE_FIXED_INSTANCE (type0))
8328 return type0;
8329
8330 /* Likewise if we already have computed the static approximation. */
4c4b4cd2
PH
8331 if (TYPE_TARGET_TYPE (type0) != NULL)
8332 return TYPE_TARGET_TYPE (type0);
8333
9e195661 8334 /* Don't clone TYPE0 until we are sure we are going to need a copy. */
4c4b4cd2 8335 type = type0;
9e195661
PMR
8336 nfields = TYPE_NFIELDS (type0);
8337
8338 /* Whether or not we cloned TYPE0, cache the result so that we don't do
8339 recompute all over next time. */
8340 TYPE_TARGET_TYPE (type0) = type;
14f9c5c9
AS
8341
8342 for (f = 0; f < nfields; f += 1)
8343 {
460efde1 8344 struct type *field_type = TYPE_FIELD_TYPE (type0, f);
4c4b4cd2 8345 struct type *new_type;
14f9c5c9 8346
4c4b4cd2 8347 if (is_dynamic_field (type0, f))
460efde1
JB
8348 {
8349 field_type = ada_check_typedef (field_type);
8350 new_type = to_static_fixed_type (TYPE_TARGET_TYPE (field_type));
8351 }
14f9c5c9 8352 else
f192137b 8353 new_type = static_unwrap_type (field_type);
9e195661
PMR
8354
8355 if (new_type != field_type)
8356 {
8357 /* Clone TYPE0 only the first time we get a new field type. */
8358 if (type == type0)
8359 {
8360 TYPE_TARGET_TYPE (type0) = type = alloc_type_copy (type0);
67607e24 8361 type->set_code (TYPE_CODE(type0));
8ecb59f8 8362 INIT_NONE_SPECIFIC (type);
9e195661
PMR
8363 TYPE_NFIELDS (type) = nfields;
8364 TYPE_FIELDS (type) = (struct field *)
8365 TYPE_ALLOC (type, nfields * sizeof (struct field));
8366 memcpy (TYPE_FIELDS (type), TYPE_FIELDS (type0),
8367 sizeof (struct field) * nfields);
8368 TYPE_NAME (type) = ada_type_name (type0);
9e195661
PMR
8369 TYPE_FIXED_INSTANCE (type) = 1;
8370 TYPE_LENGTH (type) = 0;
8371 }
8372 TYPE_FIELD_TYPE (type, f) = new_type;
8373 TYPE_FIELD_NAME (type, f) = TYPE_FIELD_NAME (type0, f);
8374 }
14f9c5c9 8375 }
9e195661 8376
14f9c5c9
AS
8377 return type;
8378}
8379
4c4b4cd2 8380/* Given an object of type TYPE whose contents are at VALADDR and
5823c3ef
JB
8381 whose address in memory is ADDRESS, returns a revision of TYPE,
8382 which should be a non-dynamic-sized record, in which the variant
8383 part, if any, is replaced with the appropriate branch. Looks
4c4b4cd2
PH
8384 for discriminant values in DVAL0, which can be NULL if the record
8385 contains the necessary discriminant values. */
8386
d2e4a39e 8387static struct type *
fc1a4b47 8388to_record_with_fixed_variant_part (struct type *type, const gdb_byte *valaddr,
4c4b4cd2 8389 CORE_ADDR address, struct value *dval0)
14f9c5c9 8390{
d2e4a39e 8391 struct value *mark = value_mark ();
4c4b4cd2 8392 struct value *dval;
d2e4a39e 8393 struct type *rtype;
14f9c5c9
AS
8394 struct type *branch_type;
8395 int nfields = TYPE_NFIELDS (type);
4c4b4cd2 8396 int variant_field = variant_field_index (type);
14f9c5c9 8397
4c4b4cd2 8398 if (variant_field == -1)
14f9c5c9
AS
8399 return type;
8400
4c4b4cd2 8401 if (dval0 == NULL)
9f1f738a
SA
8402 {
8403 dval = value_from_contents_and_address (type, valaddr, address);
8404 type = value_type (dval);
8405 }
4c4b4cd2
PH
8406 else
8407 dval = dval0;
8408
e9bb382b 8409 rtype = alloc_type_copy (type);
67607e24 8410 rtype->set_code (TYPE_CODE_STRUCT);
8ecb59f8 8411 INIT_NONE_SPECIFIC (rtype);
4c4b4cd2 8412 TYPE_NFIELDS (rtype) = nfields;
d2e4a39e
AS
8413 TYPE_FIELDS (rtype) =
8414 (struct field *) TYPE_ALLOC (rtype, nfields * sizeof (struct field));
8415 memcpy (TYPE_FIELDS (rtype), TYPE_FIELDS (type),
4c4b4cd2 8416 sizeof (struct field) * nfields);
14f9c5c9 8417 TYPE_NAME (rtype) = ada_type_name (type);
876cecd0 8418 TYPE_FIXED_INSTANCE (rtype) = 1;
14f9c5c9
AS
8419 TYPE_LENGTH (rtype) = TYPE_LENGTH (type);
8420
4c4b4cd2
PH
8421 branch_type = to_fixed_variant_branch_type
8422 (TYPE_FIELD_TYPE (type, variant_field),
d2e4a39e 8423 cond_offset_host (valaddr,
4c4b4cd2
PH
8424 TYPE_FIELD_BITPOS (type, variant_field)
8425 / TARGET_CHAR_BIT),
d2e4a39e 8426 cond_offset_target (address,
4c4b4cd2
PH
8427 TYPE_FIELD_BITPOS (type, variant_field)
8428 / TARGET_CHAR_BIT), dval);
d2e4a39e 8429 if (branch_type == NULL)
14f9c5c9 8430 {
4c4b4cd2 8431 int f;
5b4ee69b 8432
4c4b4cd2
PH
8433 for (f = variant_field + 1; f < nfields; f += 1)
8434 TYPE_FIELDS (rtype)[f - 1] = TYPE_FIELDS (rtype)[f];
14f9c5c9 8435 TYPE_NFIELDS (rtype) -= 1;
14f9c5c9
AS
8436 }
8437 else
8438 {
4c4b4cd2
PH
8439 TYPE_FIELD_TYPE (rtype, variant_field) = branch_type;
8440 TYPE_FIELD_NAME (rtype, variant_field) = "S";
8441 TYPE_FIELD_BITSIZE (rtype, variant_field) = 0;
14f9c5c9 8442 TYPE_LENGTH (rtype) += TYPE_LENGTH (branch_type);
14f9c5c9 8443 }
4c4b4cd2 8444 TYPE_LENGTH (rtype) -= TYPE_LENGTH (TYPE_FIELD_TYPE (type, variant_field));
d2e4a39e 8445
4c4b4cd2 8446 value_free_to_mark (mark);
14f9c5c9
AS
8447 return rtype;
8448}
8449
8450/* An ordinary record type (with fixed-length fields) that describes
8451 the value at (TYPE0, VALADDR, ADDRESS) [see explanation at
8452 beginning of this section]. Any necessary discriminants' values
4c4b4cd2
PH
8453 should be in DVAL, a record value; it may be NULL if the object
8454 at ADDR itself contains any necessary discriminant values.
8455 Additionally, VALADDR and ADDRESS may also be NULL if no discriminant
8456 values from the record are needed. Except in the case that DVAL,
8457 VALADDR, and ADDRESS are all 0 or NULL, a variant field (unless
8458 unchecked) is replaced by a particular branch of the variant.
8459
8460 NOTE: the case in which DVAL and VALADDR are NULL and ADDRESS is 0
8461 is questionable and may be removed. It can arise during the
8462 processing of an unconstrained-array-of-record type where all the
8463 variant branches have exactly the same size. This is because in
8464 such cases, the compiler does not bother to use the XVS convention
8465 when encoding the record. I am currently dubious of this
8466 shortcut and suspect the compiler should be altered. FIXME. */
14f9c5c9 8467
d2e4a39e 8468static struct type *
fc1a4b47 8469to_fixed_record_type (struct type *type0, const gdb_byte *valaddr,
4c4b4cd2 8470 CORE_ADDR address, struct value *dval)
14f9c5c9 8471{
d2e4a39e 8472 struct type *templ_type;
14f9c5c9 8473
876cecd0 8474 if (TYPE_FIXED_INSTANCE (type0))
4c4b4cd2
PH
8475 return type0;
8476
d2e4a39e 8477 templ_type = dynamic_template_type (type0);
14f9c5c9
AS
8478
8479 if (templ_type != NULL)
8480 return template_to_fixed_record_type (templ_type, valaddr, address, dval);
4c4b4cd2
PH
8481 else if (variant_field_index (type0) >= 0)
8482 {
8483 if (dval == NULL && valaddr == NULL && address == 0)
8484 return type0;
8485 return to_record_with_fixed_variant_part (type0, valaddr, address,
8486 dval);
8487 }
14f9c5c9
AS
8488 else
8489 {
876cecd0 8490 TYPE_FIXED_INSTANCE (type0) = 1;
14f9c5c9
AS
8491 return type0;
8492 }
8493
8494}
8495
8496/* An ordinary record type (with fixed-length fields) that describes
8497 the value at (VAR_TYPE0, VALADDR, ADDRESS), where VAR_TYPE0 is a
8498 union type. Any necessary discriminants' values should be in DVAL,
8499 a record value. That is, this routine selects the appropriate
8500 branch of the union at ADDR according to the discriminant value
b1f33ddd 8501 indicated in the union's type name. Returns VAR_TYPE0 itself if
0963b4bd 8502 it represents a variant subject to a pragma Unchecked_Union. */
14f9c5c9 8503
d2e4a39e 8504static struct type *
fc1a4b47 8505to_fixed_variant_branch_type (struct type *var_type0, const gdb_byte *valaddr,
4c4b4cd2 8506 CORE_ADDR address, struct value *dval)
14f9c5c9
AS
8507{
8508 int which;
d2e4a39e
AS
8509 struct type *templ_type;
8510 struct type *var_type;
14f9c5c9
AS
8511
8512 if (TYPE_CODE (var_type0) == TYPE_CODE_PTR)
8513 var_type = TYPE_TARGET_TYPE (var_type0);
d2e4a39e 8514 else
14f9c5c9
AS
8515 var_type = var_type0;
8516
8517 templ_type = ada_find_parallel_type (var_type, "___XVU");
8518
8519 if (templ_type != NULL)
8520 var_type = templ_type;
8521
b1f33ddd
JB
8522 if (is_unchecked_variant (var_type, value_type (dval)))
8523 return var_type0;
d8af9068 8524 which = ada_which_variant_applies (var_type, dval);
14f9c5c9
AS
8525
8526 if (which < 0)
e9bb382b 8527 return empty_record (var_type);
14f9c5c9 8528 else if (is_dynamic_field (var_type, which))
4c4b4cd2 8529 return to_fixed_record_type
d2e4a39e
AS
8530 (TYPE_TARGET_TYPE (TYPE_FIELD_TYPE (var_type, which)),
8531 valaddr, address, dval);
4c4b4cd2 8532 else if (variant_field_index (TYPE_FIELD_TYPE (var_type, which)) >= 0)
d2e4a39e
AS
8533 return
8534 to_fixed_record_type
8535 (TYPE_FIELD_TYPE (var_type, which), valaddr, address, dval);
14f9c5c9
AS
8536 else
8537 return TYPE_FIELD_TYPE (var_type, which);
8538}
8539
8908fca5
JB
8540/* Assuming RANGE_TYPE is a TYPE_CODE_RANGE, return nonzero if
8541 ENCODING_TYPE, a type following the GNAT conventions for discrete
8542 type encodings, only carries redundant information. */
8543
8544static int
8545ada_is_redundant_range_encoding (struct type *range_type,
8546 struct type *encoding_type)
8547{
108d56a4 8548 const char *bounds_str;
8908fca5
JB
8549 int n;
8550 LONGEST lo, hi;
8551
8552 gdb_assert (TYPE_CODE (range_type) == TYPE_CODE_RANGE);
8553
005e2509
JB
8554 if (TYPE_CODE (get_base_type (range_type))
8555 != TYPE_CODE (get_base_type (encoding_type)))
8556 {
8557 /* The compiler probably used a simple base type to describe
8558 the range type instead of the range's actual base type,
8559 expecting us to get the real base type from the encoding
8560 anyway. In this situation, the encoding cannot be ignored
8561 as redundant. */
8562 return 0;
8563 }
8564
8908fca5
JB
8565 if (is_dynamic_type (range_type))
8566 return 0;
8567
8568 if (TYPE_NAME (encoding_type) == NULL)
8569 return 0;
8570
8571 bounds_str = strstr (TYPE_NAME (encoding_type), "___XDLU_");
8572 if (bounds_str == NULL)
8573 return 0;
8574
8575 n = 8; /* Skip "___XDLU_". */
8576 if (!ada_scan_number (bounds_str, n, &lo, &n))
8577 return 0;
8578 if (TYPE_LOW_BOUND (range_type) != lo)
8579 return 0;
8580
8581 n += 2; /* Skip the "__" separator between the two bounds. */
8582 if (!ada_scan_number (bounds_str, n, &hi, &n))
8583 return 0;
8584 if (TYPE_HIGH_BOUND (range_type) != hi)
8585 return 0;
8586
8587 return 1;
8588}
8589
8590/* Given the array type ARRAY_TYPE, return nonzero if DESC_TYPE,
8591 a type following the GNAT encoding for describing array type
8592 indices, only carries redundant information. */
8593
8594static int
8595ada_is_redundant_index_type_desc (struct type *array_type,
8596 struct type *desc_type)
8597{
8598 struct type *this_layer = check_typedef (array_type);
8599 int i;
8600
8601 for (i = 0; i < TYPE_NFIELDS (desc_type); i++)
8602 {
8603 if (!ada_is_redundant_range_encoding (TYPE_INDEX_TYPE (this_layer),
8604 TYPE_FIELD_TYPE (desc_type, i)))
8605 return 0;
8606 this_layer = check_typedef (TYPE_TARGET_TYPE (this_layer));
8607 }
8608
8609 return 1;
8610}
8611
14f9c5c9
AS
8612/* Assuming that TYPE0 is an array type describing the type of a value
8613 at ADDR, and that DVAL describes a record containing any
8614 discriminants used in TYPE0, returns a type for the value that
8615 contains no dynamic components (that is, no components whose sizes
8616 are determined by run-time quantities). Unless IGNORE_TOO_BIG is
8617 true, gives an error message if the resulting type's size is over
4c4b4cd2 8618 varsize_limit. */
14f9c5c9 8619
d2e4a39e
AS
8620static struct type *
8621to_fixed_array_type (struct type *type0, struct value *dval,
4c4b4cd2 8622 int ignore_too_big)
14f9c5c9 8623{
d2e4a39e
AS
8624 struct type *index_type_desc;
8625 struct type *result;
ad82864c 8626 int constrained_packed_array_p;
931e5bc3 8627 static const char *xa_suffix = "___XA";
14f9c5c9 8628
b0dd7688 8629 type0 = ada_check_typedef (type0);
284614f0 8630 if (TYPE_FIXED_INSTANCE (type0))
4c4b4cd2 8631 return type0;
14f9c5c9 8632
ad82864c
JB
8633 constrained_packed_array_p = ada_is_constrained_packed_array_type (type0);
8634 if (constrained_packed_array_p)
8635 type0 = decode_constrained_packed_array_type (type0);
284614f0 8636
931e5bc3
JG
8637 index_type_desc = ada_find_parallel_type (type0, xa_suffix);
8638
8639 /* As mentioned in exp_dbug.ads, for non bit-packed arrays an
8640 encoding suffixed with 'P' may still be generated. If so,
8641 it should be used to find the XA type. */
8642
8643 if (index_type_desc == NULL)
8644 {
1da0522e 8645 const char *type_name = ada_type_name (type0);
931e5bc3 8646
1da0522e 8647 if (type_name != NULL)
931e5bc3 8648 {
1da0522e 8649 const int len = strlen (type_name);
931e5bc3
JG
8650 char *name = (char *) alloca (len + strlen (xa_suffix));
8651
1da0522e 8652 if (type_name[len - 1] == 'P')
931e5bc3 8653 {
1da0522e 8654 strcpy (name, type_name);
931e5bc3
JG
8655 strcpy (name + len - 1, xa_suffix);
8656 index_type_desc = ada_find_parallel_type_with_name (type0, name);
8657 }
8658 }
8659 }
8660
28c85d6c 8661 ada_fixup_array_indexes_type (index_type_desc);
8908fca5
JB
8662 if (index_type_desc != NULL
8663 && ada_is_redundant_index_type_desc (type0, index_type_desc))
8664 {
8665 /* Ignore this ___XA parallel type, as it does not bring any
8666 useful information. This allows us to avoid creating fixed
8667 versions of the array's index types, which would be identical
8668 to the original ones. This, in turn, can also help avoid
8669 the creation of fixed versions of the array itself. */
8670 index_type_desc = NULL;
8671 }
8672
14f9c5c9
AS
8673 if (index_type_desc == NULL)
8674 {
61ee279c 8675 struct type *elt_type0 = ada_check_typedef (TYPE_TARGET_TYPE (type0));
5b4ee69b 8676
14f9c5c9 8677 /* NOTE: elt_type---the fixed version of elt_type0---should never
4c4b4cd2
PH
8678 depend on the contents of the array in properly constructed
8679 debugging data. */
529cad9c
PH
8680 /* Create a fixed version of the array element type.
8681 We're not providing the address of an element here,
e1d5a0d2 8682 and thus the actual object value cannot be inspected to do
529cad9c
PH
8683 the conversion. This should not be a problem, since arrays of
8684 unconstrained objects are not allowed. In particular, all
8685 the elements of an array of a tagged type should all be of
8686 the same type specified in the debugging info. No need to
8687 consult the object tag. */
1ed6ede0 8688 struct type *elt_type = ada_to_fixed_type (elt_type0, 0, 0, dval, 1);
14f9c5c9 8689
284614f0
JB
8690 /* Make sure we always create a new array type when dealing with
8691 packed array types, since we're going to fix-up the array
8692 type length and element bitsize a little further down. */
ad82864c 8693 if (elt_type0 == elt_type && !constrained_packed_array_p)
4c4b4cd2 8694 result = type0;
14f9c5c9 8695 else
e9bb382b 8696 result = create_array_type (alloc_type_copy (type0),
4c4b4cd2 8697 elt_type, TYPE_INDEX_TYPE (type0));
14f9c5c9
AS
8698 }
8699 else
8700 {
8701 int i;
8702 struct type *elt_type0;
8703
8704 elt_type0 = type0;
8705 for (i = TYPE_NFIELDS (index_type_desc); i > 0; i -= 1)
4c4b4cd2 8706 elt_type0 = TYPE_TARGET_TYPE (elt_type0);
14f9c5c9
AS
8707
8708 /* NOTE: result---the fixed version of elt_type0---should never
4c4b4cd2
PH
8709 depend on the contents of the array in properly constructed
8710 debugging data. */
529cad9c
PH
8711 /* Create a fixed version of the array element type.
8712 We're not providing the address of an element here,
e1d5a0d2 8713 and thus the actual object value cannot be inspected to do
529cad9c
PH
8714 the conversion. This should not be a problem, since arrays of
8715 unconstrained objects are not allowed. In particular, all
8716 the elements of an array of a tagged type should all be of
8717 the same type specified in the debugging info. No need to
8718 consult the object tag. */
1ed6ede0
JB
8719 result =
8720 ada_to_fixed_type (ada_check_typedef (elt_type0), 0, 0, dval, 1);
1ce677a4
UW
8721
8722 elt_type0 = type0;
14f9c5c9 8723 for (i = TYPE_NFIELDS (index_type_desc) - 1; i >= 0; i -= 1)
4c4b4cd2
PH
8724 {
8725 struct type *range_type =
28c85d6c 8726 to_fixed_range_type (TYPE_FIELD_TYPE (index_type_desc, i), dval);
5b4ee69b 8727
e9bb382b 8728 result = create_array_type (alloc_type_copy (elt_type0),
4c4b4cd2 8729 result, range_type);
1ce677a4 8730 elt_type0 = TYPE_TARGET_TYPE (elt_type0);
4c4b4cd2 8731 }
d2e4a39e 8732 if (!ignore_too_big && TYPE_LENGTH (result) > varsize_limit)
323e0a4a 8733 error (_("array type with dynamic size is larger than varsize-limit"));
14f9c5c9
AS
8734 }
8735
2e6fda7d
JB
8736 /* We want to preserve the type name. This can be useful when
8737 trying to get the type name of a value that has already been
8738 printed (for instance, if the user did "print VAR; whatis $". */
8739 TYPE_NAME (result) = TYPE_NAME (type0);
8740
ad82864c 8741 if (constrained_packed_array_p)
284614f0
JB
8742 {
8743 /* So far, the resulting type has been created as if the original
8744 type was a regular (non-packed) array type. As a result, the
8745 bitsize of the array elements needs to be set again, and the array
8746 length needs to be recomputed based on that bitsize. */
8747 int len = TYPE_LENGTH (result) / TYPE_LENGTH (TYPE_TARGET_TYPE (result));
8748 int elt_bitsize = TYPE_FIELD_BITSIZE (type0, 0);
8749
8750 TYPE_FIELD_BITSIZE (result, 0) = TYPE_FIELD_BITSIZE (type0, 0);
8751 TYPE_LENGTH (result) = len * elt_bitsize / HOST_CHAR_BIT;
8752 if (TYPE_LENGTH (result) * HOST_CHAR_BIT < len * elt_bitsize)
8753 TYPE_LENGTH (result)++;
8754 }
8755
876cecd0 8756 TYPE_FIXED_INSTANCE (result) = 1;
14f9c5c9 8757 return result;
d2e4a39e 8758}
14f9c5c9
AS
8759
8760
8761/* A standard type (containing no dynamically sized components)
8762 corresponding to TYPE for the value (TYPE, VALADDR, ADDRESS)
8763 DVAL describes a record containing any discriminants used in TYPE0,
4c4b4cd2 8764 and may be NULL if there are none, or if the object of type TYPE at
529cad9c
PH
8765 ADDRESS or in VALADDR contains these discriminants.
8766
1ed6ede0
JB
8767 If CHECK_TAG is not null, in the case of tagged types, this function
8768 attempts to locate the object's tag and use it to compute the actual
8769 type. However, when ADDRESS is null, we cannot use it to determine the
8770 location of the tag, and therefore compute the tagged type's actual type.
8771 So we return the tagged type without consulting the tag. */
529cad9c 8772
f192137b
JB
8773static struct type *
8774ada_to_fixed_type_1 (struct type *type, const gdb_byte *valaddr,
1ed6ede0 8775 CORE_ADDR address, struct value *dval, int check_tag)
14f9c5c9 8776{
61ee279c 8777 type = ada_check_typedef (type);
8ecb59f8
TT
8778
8779 /* Only un-fixed types need to be handled here. */
8780 if (!HAVE_GNAT_AUX_INFO (type))
8781 return type;
8782
d2e4a39e
AS
8783 switch (TYPE_CODE (type))
8784 {
8785 default:
14f9c5c9 8786 return type;
d2e4a39e 8787 case TYPE_CODE_STRUCT:
4c4b4cd2 8788 {
76a01679 8789 struct type *static_type = to_static_fixed_type (type);
1ed6ede0
JB
8790 struct type *fixed_record_type =
8791 to_fixed_record_type (type, valaddr, address, NULL);
5b4ee69b 8792
529cad9c
PH
8793 /* If STATIC_TYPE is a tagged type and we know the object's address,
8794 then we can determine its tag, and compute the object's actual
0963b4bd 8795 type from there. Note that we have to use the fixed record
1ed6ede0
JB
8796 type (the parent part of the record may have dynamic fields
8797 and the way the location of _tag is expressed may depend on
8798 them). */
529cad9c 8799
1ed6ede0 8800 if (check_tag && address != 0 && ada_is_tagged_type (static_type, 0))
76a01679 8801 {
b50d69b5
JG
8802 struct value *tag =
8803 value_tag_from_contents_and_address
8804 (fixed_record_type,
8805 valaddr,
8806 address);
8807 struct type *real_type = type_from_tag (tag);
8808 struct value *obj =
8809 value_from_contents_and_address (fixed_record_type,
8810 valaddr,
8811 address);
9f1f738a 8812 fixed_record_type = value_type (obj);
76a01679 8813 if (real_type != NULL)
b50d69b5
JG
8814 return to_fixed_record_type
8815 (real_type, NULL,
8816 value_address (ada_tag_value_at_base_address (obj)), NULL);
76a01679 8817 }
4af88198
JB
8818
8819 /* Check to see if there is a parallel ___XVZ variable.
8820 If there is, then it provides the actual size of our type. */
8821 else if (ada_type_name (fixed_record_type) != NULL)
8822 {
0d5cff50 8823 const char *name = ada_type_name (fixed_record_type);
224c3ddb
SM
8824 char *xvz_name
8825 = (char *) alloca (strlen (name) + 7 /* "___XVZ\0" */);
eccab96d 8826 bool xvz_found = false;
4af88198
JB
8827 LONGEST size;
8828
88c15c34 8829 xsnprintf (xvz_name, strlen (name) + 7, "%s___XVZ", name);
a70b8144 8830 try
eccab96d
JB
8831 {
8832 xvz_found = get_int_var_value (xvz_name, size);
8833 }
230d2906 8834 catch (const gdb_exception_error &except)
eccab96d
JB
8835 {
8836 /* We found the variable, but somehow failed to read
8837 its value. Rethrow the same error, but with a little
8838 bit more information, to help the user understand
8839 what went wrong (Eg: the variable might have been
8840 optimized out). */
8841 throw_error (except.error,
8842 _("unable to read value of %s (%s)"),
3d6e9d23 8843 xvz_name, except.what ());
eccab96d 8844 }
eccab96d
JB
8845
8846 if (xvz_found && TYPE_LENGTH (fixed_record_type) != size)
4af88198
JB
8847 {
8848 fixed_record_type = copy_type (fixed_record_type);
8849 TYPE_LENGTH (fixed_record_type) = size;
8850
8851 /* The FIXED_RECORD_TYPE may have be a stub. We have
8852 observed this when the debugging info is STABS, and
8853 apparently it is something that is hard to fix.
8854
8855 In practice, we don't need the actual type definition
8856 at all, because the presence of the XVZ variable allows us
8857 to assume that there must be a XVS type as well, which we
8858 should be able to use later, when we need the actual type
8859 definition.
8860
8861 In the meantime, pretend that the "fixed" type we are
8862 returning is NOT a stub, because this can cause trouble
8863 when using this type to create new types targeting it.
8864 Indeed, the associated creation routines often check
8865 whether the target type is a stub and will try to replace
0963b4bd 8866 it, thus using a type with the wrong size. This, in turn,
4af88198
JB
8867 might cause the new type to have the wrong size too.
8868 Consider the case of an array, for instance, where the size
8869 of the array is computed from the number of elements in
8870 our array multiplied by the size of its element. */
8871 TYPE_STUB (fixed_record_type) = 0;
8872 }
8873 }
1ed6ede0 8874 return fixed_record_type;
4c4b4cd2 8875 }
d2e4a39e 8876 case TYPE_CODE_ARRAY:
4c4b4cd2 8877 return to_fixed_array_type (type, dval, 1);
d2e4a39e
AS
8878 case TYPE_CODE_UNION:
8879 if (dval == NULL)
4c4b4cd2 8880 return type;
d2e4a39e 8881 else
4c4b4cd2 8882 return to_fixed_variant_branch_type (type, valaddr, address, dval);
d2e4a39e 8883 }
14f9c5c9
AS
8884}
8885
f192137b
JB
8886/* The same as ada_to_fixed_type_1, except that it preserves the type
8887 if it is a TYPE_CODE_TYPEDEF of a type that is already fixed.
96dbd2c1
JB
8888
8889 The typedef layer needs be preserved in order to differentiate between
8890 arrays and array pointers when both types are implemented using the same
8891 fat pointer. In the array pointer case, the pointer is encoded as
8892 a typedef of the pointer type. For instance, considering:
8893
8894 type String_Access is access String;
8895 S1 : String_Access := null;
8896
8897 To the debugger, S1 is defined as a typedef of type String. But
8898 to the user, it is a pointer. So if the user tries to print S1,
8899 we should not dereference the array, but print the array address
8900 instead.
8901
8902 If we didn't preserve the typedef layer, we would lose the fact that
8903 the type is to be presented as a pointer (needs de-reference before
8904 being printed). And we would also use the source-level type name. */
f192137b
JB
8905
8906struct type *
8907ada_to_fixed_type (struct type *type, const gdb_byte *valaddr,
8908 CORE_ADDR address, struct value *dval, int check_tag)
8909
8910{
8911 struct type *fixed_type =
8912 ada_to_fixed_type_1 (type, valaddr, address, dval, check_tag);
8913
96dbd2c1
JB
8914 /* If TYPE is a typedef and its target type is the same as the FIXED_TYPE,
8915 then preserve the typedef layer.
8916
8917 Implementation note: We can only check the main-type portion of
8918 the TYPE and FIXED_TYPE, because eliminating the typedef layer
8919 from TYPE now returns a type that has the same instance flags
8920 as TYPE. For instance, if TYPE is a "typedef const", and its
8921 target type is a "struct", then the typedef elimination will return
8922 a "const" version of the target type. See check_typedef for more
8923 details about how the typedef layer elimination is done.
8924
8925 brobecker/2010-11-19: It seems to me that the only case where it is
8926 useful to preserve the typedef layer is when dealing with fat pointers.
8927 Perhaps, we could add a check for that and preserve the typedef layer
85102364 8928 only in that situation. But this seems unnecessary so far, probably
96dbd2c1
JB
8929 because we call check_typedef/ada_check_typedef pretty much everywhere.
8930 */
f192137b 8931 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF
720d1a40 8932 && (TYPE_MAIN_TYPE (ada_typedef_target_type (type))
96dbd2c1 8933 == TYPE_MAIN_TYPE (fixed_type)))
f192137b
JB
8934 return type;
8935
8936 return fixed_type;
8937}
8938
14f9c5c9 8939/* A standard (static-sized) type corresponding as well as possible to
4c4b4cd2 8940 TYPE0, but based on no runtime data. */
14f9c5c9 8941
d2e4a39e
AS
8942static struct type *
8943to_static_fixed_type (struct type *type0)
14f9c5c9 8944{
d2e4a39e 8945 struct type *type;
14f9c5c9
AS
8946
8947 if (type0 == NULL)
8948 return NULL;
8949
876cecd0 8950 if (TYPE_FIXED_INSTANCE (type0))
4c4b4cd2
PH
8951 return type0;
8952
61ee279c 8953 type0 = ada_check_typedef (type0);
d2e4a39e 8954
14f9c5c9
AS
8955 switch (TYPE_CODE (type0))
8956 {
8957 default:
8958 return type0;
8959 case TYPE_CODE_STRUCT:
8960 type = dynamic_template_type (type0);
d2e4a39e 8961 if (type != NULL)
4c4b4cd2
PH
8962 return template_to_static_fixed_type (type);
8963 else
8964 return template_to_static_fixed_type (type0);
14f9c5c9
AS
8965 case TYPE_CODE_UNION:
8966 type = ada_find_parallel_type (type0, "___XVU");
8967 if (type != NULL)
4c4b4cd2
PH
8968 return template_to_static_fixed_type (type);
8969 else
8970 return template_to_static_fixed_type (type0);
14f9c5c9
AS
8971 }
8972}
8973
4c4b4cd2
PH
8974/* A static approximation of TYPE with all type wrappers removed. */
8975
d2e4a39e
AS
8976static struct type *
8977static_unwrap_type (struct type *type)
14f9c5c9
AS
8978{
8979 if (ada_is_aligner_type (type))
8980 {
61ee279c 8981 struct type *type1 = TYPE_FIELD_TYPE (ada_check_typedef (type), 0);
14f9c5c9 8982 if (ada_type_name (type1) == NULL)
4c4b4cd2 8983 TYPE_NAME (type1) = ada_type_name (type);
14f9c5c9
AS
8984
8985 return static_unwrap_type (type1);
8986 }
d2e4a39e 8987 else
14f9c5c9 8988 {
d2e4a39e 8989 struct type *raw_real_type = ada_get_base_type (type);
5b4ee69b 8990
d2e4a39e 8991 if (raw_real_type == type)
4c4b4cd2 8992 return type;
14f9c5c9 8993 else
4c4b4cd2 8994 return to_static_fixed_type (raw_real_type);
14f9c5c9
AS
8995 }
8996}
8997
8998/* In some cases, incomplete and private types require
4c4b4cd2 8999 cross-references that are not resolved as records (for example,
14f9c5c9
AS
9000 type Foo;
9001 type FooP is access Foo;
9002 V: FooP;
9003 type Foo is array ...;
4c4b4cd2 9004 ). In these cases, since there is no mechanism for producing
14f9c5c9
AS
9005 cross-references to such types, we instead substitute for FooP a
9006 stub enumeration type that is nowhere resolved, and whose tag is
4c4b4cd2 9007 the name of the actual type. Call these types "non-record stubs". */
14f9c5c9
AS
9008
9009/* A type equivalent to TYPE that is not a non-record stub, if one
4c4b4cd2
PH
9010 exists, otherwise TYPE. */
9011
d2e4a39e 9012struct type *
61ee279c 9013ada_check_typedef (struct type *type)
14f9c5c9 9014{
727e3d2e
JB
9015 if (type == NULL)
9016 return NULL;
9017
736ade86
XR
9018 /* If our type is an access to an unconstrained array, which is encoded
9019 as a TYPE_CODE_TYPEDEF of a fat pointer, then we're done.
720d1a40
JB
9020 We don't want to strip the TYPE_CODE_TYPDEF layer, because this is
9021 what allows us to distinguish between fat pointers that represent
9022 array types, and fat pointers that represent array access types
9023 (in both cases, the compiler implements them as fat pointers). */
736ade86 9024 if (ada_is_access_to_unconstrained_array (type))
720d1a40
JB
9025 return type;
9026
f168693b 9027 type = check_typedef (type);
14f9c5c9 9028 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_ENUM
529cad9c 9029 || !TYPE_STUB (type)
e86ca25f 9030 || TYPE_NAME (type) == NULL)
14f9c5c9 9031 return type;
d2e4a39e 9032 else
14f9c5c9 9033 {
e86ca25f 9034 const char *name = TYPE_NAME (type);
d2e4a39e 9035 struct type *type1 = ada_find_any_type (name);
5b4ee69b 9036
05e522ef
JB
9037 if (type1 == NULL)
9038 return type;
9039
9040 /* TYPE1 might itself be a TYPE_CODE_TYPEDEF (this can happen with
9041 stubs pointing to arrays, as we don't create symbols for array
3a867c22
JB
9042 types, only for the typedef-to-array types). If that's the case,
9043 strip the typedef layer. */
9044 if (TYPE_CODE (type1) == TYPE_CODE_TYPEDEF)
9045 type1 = ada_check_typedef (type1);
9046
9047 return type1;
14f9c5c9
AS
9048 }
9049}
9050
9051/* A value representing the data at VALADDR/ADDRESS as described by
9052 type TYPE0, but with a standard (static-sized) type that correctly
9053 describes it. If VAL0 is not NULL and TYPE0 already is a standard
9054 type, then return VAL0 [this feature is simply to avoid redundant
4c4b4cd2 9055 creation of struct values]. */
14f9c5c9 9056
4c4b4cd2
PH
9057static struct value *
9058ada_to_fixed_value_create (struct type *type0, CORE_ADDR address,
9059 struct value *val0)
14f9c5c9 9060{
1ed6ede0 9061 struct type *type = ada_to_fixed_type (type0, 0, address, NULL, 1);
5b4ee69b 9062
14f9c5c9
AS
9063 if (type == type0 && val0 != NULL)
9064 return val0;
cc0e770c
JB
9065
9066 if (VALUE_LVAL (val0) != lval_memory)
9067 {
9068 /* Our value does not live in memory; it could be a convenience
9069 variable, for instance. Create a not_lval value using val0's
9070 contents. */
9071 return value_from_contents (type, value_contents (val0));
9072 }
9073
9074 return value_from_contents_and_address (type, 0, address);
4c4b4cd2
PH
9075}
9076
9077/* A value representing VAL, but with a standard (static-sized) type
9078 that correctly describes it. Does not necessarily create a new
9079 value. */
9080
0c3acc09 9081struct value *
4c4b4cd2
PH
9082ada_to_fixed_value (struct value *val)
9083{
c48db5ca 9084 val = unwrap_value (val);
d8ce9127 9085 val = ada_to_fixed_value_create (value_type (val), value_address (val), val);
c48db5ca 9086 return val;
14f9c5c9 9087}
d2e4a39e 9088\f
14f9c5c9 9089
14f9c5c9
AS
9090/* Attributes */
9091
4c4b4cd2
PH
9092/* Table mapping attribute numbers to names.
9093 NOTE: Keep up to date with enum ada_attribute definition in ada-lang.h. */
14f9c5c9 9094
d2e4a39e 9095static const char *attribute_names[] = {
14f9c5c9
AS
9096 "<?>",
9097
d2e4a39e 9098 "first",
14f9c5c9
AS
9099 "last",
9100 "length",
9101 "image",
14f9c5c9
AS
9102 "max",
9103 "min",
4c4b4cd2
PH
9104 "modulus",
9105 "pos",
9106 "size",
9107 "tag",
14f9c5c9 9108 "val",
14f9c5c9
AS
9109 0
9110};
9111
de93309a 9112static const char *
4c4b4cd2 9113ada_attribute_name (enum exp_opcode n)
14f9c5c9 9114{
4c4b4cd2
PH
9115 if (n >= OP_ATR_FIRST && n <= (int) OP_ATR_VAL)
9116 return attribute_names[n - OP_ATR_FIRST + 1];
14f9c5c9
AS
9117 else
9118 return attribute_names[0];
9119}
9120
4c4b4cd2 9121/* Evaluate the 'POS attribute applied to ARG. */
14f9c5c9 9122
4c4b4cd2
PH
9123static LONGEST
9124pos_atr (struct value *arg)
14f9c5c9 9125{
24209737
PH
9126 struct value *val = coerce_ref (arg);
9127 struct type *type = value_type (val);
aa715135 9128 LONGEST result;
14f9c5c9 9129
d2e4a39e 9130 if (!discrete_type_p (type))
323e0a4a 9131 error (_("'POS only defined on discrete types"));
14f9c5c9 9132
aa715135
JG
9133 if (!discrete_position (type, value_as_long (val), &result))
9134 error (_("enumeration value is invalid: can't find 'POS"));
14f9c5c9 9135
aa715135 9136 return result;
4c4b4cd2
PH
9137}
9138
9139static struct value *
3cb382c9 9140value_pos_atr (struct type *type, struct value *arg)
4c4b4cd2 9141{
3cb382c9 9142 return value_from_longest (type, pos_atr (arg));
14f9c5c9
AS
9143}
9144
4c4b4cd2 9145/* Evaluate the TYPE'VAL attribute applied to ARG. */
14f9c5c9 9146
d2e4a39e
AS
9147static struct value *
9148value_val_atr (struct type *type, struct value *arg)
14f9c5c9 9149{
d2e4a39e 9150 if (!discrete_type_p (type))
323e0a4a 9151 error (_("'VAL only defined on discrete types"));
df407dfe 9152 if (!integer_type_p (value_type (arg)))
323e0a4a 9153 error (_("'VAL requires integral argument"));
14f9c5c9
AS
9154
9155 if (TYPE_CODE (type) == TYPE_CODE_ENUM)
9156 {
9157 long pos = value_as_long (arg);
5b4ee69b 9158
14f9c5c9 9159 if (pos < 0 || pos >= TYPE_NFIELDS (type))
323e0a4a 9160 error (_("argument to 'VAL out of range"));
14e75d8e 9161 return value_from_longest (type, TYPE_FIELD_ENUMVAL (type, pos));
14f9c5c9
AS
9162 }
9163 else
9164 return value_from_longest (type, value_as_long (arg));
9165}
14f9c5c9 9166\f
d2e4a39e 9167
4c4b4cd2 9168 /* Evaluation */
14f9c5c9 9169
4c4b4cd2
PH
9170/* True if TYPE appears to be an Ada character type.
9171 [At the moment, this is true only for Character and Wide_Character;
9172 It is a heuristic test that could stand improvement]. */
14f9c5c9 9173
fc913e53 9174bool
d2e4a39e 9175ada_is_character_type (struct type *type)
14f9c5c9 9176{
7b9f71f2
JB
9177 const char *name;
9178
9179 /* If the type code says it's a character, then assume it really is,
9180 and don't check any further. */
9181 if (TYPE_CODE (type) == TYPE_CODE_CHAR)
fc913e53 9182 return true;
7b9f71f2
JB
9183
9184 /* Otherwise, assume it's a character type iff it is a discrete type
9185 with a known character type name. */
9186 name = ada_type_name (type);
9187 return (name != NULL
9188 && (TYPE_CODE (type) == TYPE_CODE_INT
9189 || TYPE_CODE (type) == TYPE_CODE_RANGE)
9190 && (strcmp (name, "character") == 0
9191 || strcmp (name, "wide_character") == 0
5a517ebd 9192 || strcmp (name, "wide_wide_character") == 0
7b9f71f2 9193 || strcmp (name, "unsigned char") == 0));
14f9c5c9
AS
9194}
9195
4c4b4cd2 9196/* True if TYPE appears to be an Ada string type. */
14f9c5c9 9197
fc913e53 9198bool
ebf56fd3 9199ada_is_string_type (struct type *type)
14f9c5c9 9200{
61ee279c 9201 type = ada_check_typedef (type);
d2e4a39e 9202 if (type != NULL
14f9c5c9 9203 && TYPE_CODE (type) != TYPE_CODE_PTR
76a01679
JB
9204 && (ada_is_simple_array_type (type)
9205 || ada_is_array_descriptor_type (type))
14f9c5c9
AS
9206 && ada_array_arity (type) == 1)
9207 {
9208 struct type *elttype = ada_array_element_type (type, 1);
9209
9210 return ada_is_character_type (elttype);
9211 }
d2e4a39e 9212 else
fc913e53 9213 return false;
14f9c5c9
AS
9214}
9215
5bf03f13
JB
9216/* The compiler sometimes provides a parallel XVS type for a given
9217 PAD type. Normally, it is safe to follow the PAD type directly,
9218 but older versions of the compiler have a bug that causes the offset
9219 of its "F" field to be wrong. Following that field in that case
9220 would lead to incorrect results, but this can be worked around
9221 by ignoring the PAD type and using the associated XVS type instead.
9222
9223 Set to True if the debugger should trust the contents of PAD types.
9224 Otherwise, ignore the PAD type if there is a parallel XVS type. */
491144b5 9225static bool trust_pad_over_xvs = true;
14f9c5c9
AS
9226
9227/* True if TYPE is a struct type introduced by the compiler to force the
9228 alignment of a value. Such types have a single field with a
4c4b4cd2 9229 distinctive name. */
14f9c5c9
AS
9230
9231int
ebf56fd3 9232ada_is_aligner_type (struct type *type)
14f9c5c9 9233{
61ee279c 9234 type = ada_check_typedef (type);
714e53ab 9235
5bf03f13 9236 if (!trust_pad_over_xvs && ada_find_parallel_type (type, "___XVS") != NULL)
714e53ab
PH
9237 return 0;
9238
14f9c5c9 9239 return (TYPE_CODE (type) == TYPE_CODE_STRUCT
4c4b4cd2
PH
9240 && TYPE_NFIELDS (type) == 1
9241 && strcmp (TYPE_FIELD_NAME (type, 0), "F") == 0);
14f9c5c9
AS
9242}
9243
9244/* If there is an ___XVS-convention type parallel to SUBTYPE, return
4c4b4cd2 9245 the parallel type. */
14f9c5c9 9246
d2e4a39e
AS
9247struct type *
9248ada_get_base_type (struct type *raw_type)
14f9c5c9 9249{
d2e4a39e
AS
9250 struct type *real_type_namer;
9251 struct type *raw_real_type;
14f9c5c9
AS
9252
9253 if (raw_type == NULL || TYPE_CODE (raw_type) != TYPE_CODE_STRUCT)
9254 return raw_type;
9255
284614f0
JB
9256 if (ada_is_aligner_type (raw_type))
9257 /* The encoding specifies that we should always use the aligner type.
9258 So, even if this aligner type has an associated XVS type, we should
9259 simply ignore it.
9260
9261 According to the compiler gurus, an XVS type parallel to an aligner
9262 type may exist because of a stabs limitation. In stabs, aligner
9263 types are empty because the field has a variable-sized type, and
9264 thus cannot actually be used as an aligner type. As a result,
9265 we need the associated parallel XVS type to decode the type.
9266 Since the policy in the compiler is to not change the internal
9267 representation based on the debugging info format, we sometimes
9268 end up having a redundant XVS type parallel to the aligner type. */
9269 return raw_type;
9270
14f9c5c9 9271 real_type_namer = ada_find_parallel_type (raw_type, "___XVS");
d2e4a39e 9272 if (real_type_namer == NULL
14f9c5c9
AS
9273 || TYPE_CODE (real_type_namer) != TYPE_CODE_STRUCT
9274 || TYPE_NFIELDS (real_type_namer) != 1)
9275 return raw_type;
9276
f80d3ff2
JB
9277 if (TYPE_CODE (TYPE_FIELD_TYPE (real_type_namer, 0)) != TYPE_CODE_REF)
9278 {
9279 /* This is an older encoding form where the base type needs to be
85102364 9280 looked up by name. We prefer the newer encoding because it is
f80d3ff2
JB
9281 more efficient. */
9282 raw_real_type = ada_find_any_type (TYPE_FIELD_NAME (real_type_namer, 0));
9283 if (raw_real_type == NULL)
9284 return raw_type;
9285 else
9286 return raw_real_type;
9287 }
9288
9289 /* The field in our XVS type is a reference to the base type. */
9290 return TYPE_TARGET_TYPE (TYPE_FIELD_TYPE (real_type_namer, 0));
d2e4a39e 9291}
14f9c5c9 9292
4c4b4cd2 9293/* The type of value designated by TYPE, with all aligners removed. */
14f9c5c9 9294
d2e4a39e
AS
9295struct type *
9296ada_aligned_type (struct type *type)
14f9c5c9
AS
9297{
9298 if (ada_is_aligner_type (type))
9299 return ada_aligned_type (TYPE_FIELD_TYPE (type, 0));
9300 else
9301 return ada_get_base_type (type);
9302}
9303
9304
9305/* The address of the aligned value in an object at address VALADDR
4c4b4cd2 9306 having type TYPE. Assumes ada_is_aligner_type (TYPE). */
14f9c5c9 9307
fc1a4b47
AC
9308const gdb_byte *
9309ada_aligned_value_addr (struct type *type, const gdb_byte *valaddr)
14f9c5c9 9310{
d2e4a39e 9311 if (ada_is_aligner_type (type))
14f9c5c9 9312 return ada_aligned_value_addr (TYPE_FIELD_TYPE (type, 0),
4c4b4cd2
PH
9313 valaddr +
9314 TYPE_FIELD_BITPOS (type,
9315 0) / TARGET_CHAR_BIT);
14f9c5c9
AS
9316 else
9317 return valaddr;
9318}
9319
4c4b4cd2
PH
9320
9321
14f9c5c9 9322/* The printed representation of an enumeration literal with encoded
4c4b4cd2 9323 name NAME. The value is good to the next call of ada_enum_name. */
d2e4a39e
AS
9324const char *
9325ada_enum_name (const char *name)
14f9c5c9 9326{
4c4b4cd2
PH
9327 static char *result;
9328 static size_t result_len = 0;
e6a959d6 9329 const char *tmp;
14f9c5c9 9330
4c4b4cd2
PH
9331 /* First, unqualify the enumeration name:
9332 1. Search for the last '.' character. If we find one, then skip
177b42fe 9333 all the preceding characters, the unqualified name starts
76a01679 9334 right after that dot.
4c4b4cd2 9335 2. Otherwise, we may be debugging on a target where the compiler
76a01679
JB
9336 translates dots into "__". Search forward for double underscores,
9337 but stop searching when we hit an overloading suffix, which is
9338 of the form "__" followed by digits. */
4c4b4cd2 9339
c3e5cd34
PH
9340 tmp = strrchr (name, '.');
9341 if (tmp != NULL)
4c4b4cd2
PH
9342 name = tmp + 1;
9343 else
14f9c5c9 9344 {
4c4b4cd2
PH
9345 while ((tmp = strstr (name, "__")) != NULL)
9346 {
9347 if (isdigit (tmp[2]))
9348 break;
9349 else
9350 name = tmp + 2;
9351 }
14f9c5c9
AS
9352 }
9353
9354 if (name[0] == 'Q')
9355 {
14f9c5c9 9356 int v;
5b4ee69b 9357
14f9c5c9 9358 if (name[1] == 'U' || name[1] == 'W')
4c4b4cd2
PH
9359 {
9360 if (sscanf (name + 2, "%x", &v) != 1)
9361 return name;
9362 }
272560b5
TT
9363 else if (((name[1] >= '0' && name[1] <= '9')
9364 || (name[1] >= 'a' && name[1] <= 'z'))
9365 && name[2] == '\0')
9366 {
9367 GROW_VECT (result, result_len, 4);
9368 xsnprintf (result, result_len, "'%c'", name[1]);
9369 return result;
9370 }
14f9c5c9 9371 else
4c4b4cd2 9372 return name;
14f9c5c9 9373
4c4b4cd2 9374 GROW_VECT (result, result_len, 16);
14f9c5c9 9375 if (isascii (v) && isprint (v))
88c15c34 9376 xsnprintf (result, result_len, "'%c'", v);
14f9c5c9 9377 else if (name[1] == 'U')
88c15c34 9378 xsnprintf (result, result_len, "[\"%02x\"]", v);
14f9c5c9 9379 else
88c15c34 9380 xsnprintf (result, result_len, "[\"%04x\"]", v);
14f9c5c9
AS
9381
9382 return result;
9383 }
d2e4a39e 9384 else
4c4b4cd2 9385 {
c3e5cd34
PH
9386 tmp = strstr (name, "__");
9387 if (tmp == NULL)
9388 tmp = strstr (name, "$");
9389 if (tmp != NULL)
4c4b4cd2
PH
9390 {
9391 GROW_VECT (result, result_len, tmp - name + 1);
9392 strncpy (result, name, tmp - name);
9393 result[tmp - name] = '\0';
9394 return result;
9395 }
9396
9397 return name;
9398 }
14f9c5c9
AS
9399}
9400
14f9c5c9
AS
9401/* Evaluate the subexpression of EXP starting at *POS as for
9402 evaluate_type, updating *POS to point just past the evaluated
4c4b4cd2 9403 expression. */
14f9c5c9 9404
d2e4a39e
AS
9405static struct value *
9406evaluate_subexp_type (struct expression *exp, int *pos)
14f9c5c9 9407{
4b27a620 9408 return evaluate_subexp (NULL_TYPE, exp, pos, EVAL_AVOID_SIDE_EFFECTS);
14f9c5c9
AS
9409}
9410
9411/* If VAL is wrapped in an aligner or subtype wrapper, return the
4c4b4cd2 9412 value it wraps. */
14f9c5c9 9413
d2e4a39e
AS
9414static struct value *
9415unwrap_value (struct value *val)
14f9c5c9 9416{
df407dfe 9417 struct type *type = ada_check_typedef (value_type (val));
5b4ee69b 9418
14f9c5c9
AS
9419 if (ada_is_aligner_type (type))
9420 {
de4d072f 9421 struct value *v = ada_value_struct_elt (val, "F", 0);
df407dfe 9422 struct type *val_type = ada_check_typedef (value_type (v));
5b4ee69b 9423
14f9c5c9 9424 if (ada_type_name (val_type) == NULL)
4c4b4cd2 9425 TYPE_NAME (val_type) = ada_type_name (type);
14f9c5c9
AS
9426
9427 return unwrap_value (v);
9428 }
d2e4a39e 9429 else
14f9c5c9 9430 {
d2e4a39e 9431 struct type *raw_real_type =
61ee279c 9432 ada_check_typedef (ada_get_base_type (type));
d2e4a39e 9433
5bf03f13
JB
9434 /* If there is no parallel XVS or XVE type, then the value is
9435 already unwrapped. Return it without further modification. */
9436 if ((type == raw_real_type)
9437 && ada_find_parallel_type (type, "___XVE") == NULL)
9438 return val;
14f9c5c9 9439
d2e4a39e 9440 return
4c4b4cd2
PH
9441 coerce_unspec_val_to_type
9442 (val, ada_to_fixed_type (raw_real_type, 0,
42ae5230 9443 value_address (val),
1ed6ede0 9444 NULL, 1));
14f9c5c9
AS
9445 }
9446}
d2e4a39e
AS
9447
9448static struct value *
50eff16b 9449cast_from_fixed (struct type *type, struct value *arg)
14f9c5c9 9450{
50eff16b
UW
9451 struct value *scale = ada_scaling_factor (value_type (arg));
9452 arg = value_cast (value_type (scale), arg);
14f9c5c9 9453
50eff16b
UW
9454 arg = value_binop (arg, scale, BINOP_MUL);
9455 return value_cast (type, arg);
14f9c5c9
AS
9456}
9457
d2e4a39e 9458static struct value *
50eff16b 9459cast_to_fixed (struct type *type, struct value *arg)
14f9c5c9 9460{
50eff16b
UW
9461 if (type == value_type (arg))
9462 return arg;
5b4ee69b 9463
50eff16b
UW
9464 struct value *scale = ada_scaling_factor (type);
9465 if (ada_is_fixed_point_type (value_type (arg)))
9466 arg = cast_from_fixed (value_type (scale), arg);
9467 else
9468 arg = value_cast (value_type (scale), arg);
9469
9470 arg = value_binop (arg, scale, BINOP_DIV);
9471 return value_cast (type, arg);
14f9c5c9
AS
9472}
9473
d99dcf51
JB
9474/* Given two array types T1 and T2, return nonzero iff both arrays
9475 contain the same number of elements. */
9476
9477static int
9478ada_same_array_size_p (struct type *t1, struct type *t2)
9479{
9480 LONGEST lo1, hi1, lo2, hi2;
9481
9482 /* Get the array bounds in order to verify that the size of
9483 the two arrays match. */
9484 if (!get_array_bounds (t1, &lo1, &hi1)
9485 || !get_array_bounds (t2, &lo2, &hi2))
9486 error (_("unable to determine array bounds"));
9487
9488 /* To make things easier for size comparison, normalize a bit
9489 the case of empty arrays by making sure that the difference
9490 between upper bound and lower bound is always -1. */
9491 if (lo1 > hi1)
9492 hi1 = lo1 - 1;
9493 if (lo2 > hi2)
9494 hi2 = lo2 - 1;
9495
9496 return (hi1 - lo1 == hi2 - lo2);
9497}
9498
9499/* Assuming that VAL is an array of integrals, and TYPE represents
9500 an array with the same number of elements, but with wider integral
9501 elements, return an array "casted" to TYPE. In practice, this
9502 means that the returned array is built by casting each element
9503 of the original array into TYPE's (wider) element type. */
9504
9505static struct value *
9506ada_promote_array_of_integrals (struct type *type, struct value *val)
9507{
9508 struct type *elt_type = TYPE_TARGET_TYPE (type);
9509 LONGEST lo, hi;
9510 struct value *res;
9511 LONGEST i;
9512
9513 /* Verify that both val and type are arrays of scalars, and
9514 that the size of val's elements is smaller than the size
9515 of type's element. */
9516 gdb_assert (TYPE_CODE (type) == TYPE_CODE_ARRAY);
9517 gdb_assert (is_integral_type (TYPE_TARGET_TYPE (type)));
9518 gdb_assert (TYPE_CODE (value_type (val)) == TYPE_CODE_ARRAY);
9519 gdb_assert (is_integral_type (TYPE_TARGET_TYPE (value_type (val))));
9520 gdb_assert (TYPE_LENGTH (TYPE_TARGET_TYPE (type))
9521 > TYPE_LENGTH (TYPE_TARGET_TYPE (value_type (val))));
9522
9523 if (!get_array_bounds (type, &lo, &hi))
9524 error (_("unable to determine array bounds"));
9525
9526 res = allocate_value (type);
9527
9528 /* Promote each array element. */
9529 for (i = 0; i < hi - lo + 1; i++)
9530 {
9531 struct value *elt = value_cast (elt_type, value_subscript (val, lo + i));
9532
9533 memcpy (value_contents_writeable (res) + (i * TYPE_LENGTH (elt_type)),
9534 value_contents_all (elt), TYPE_LENGTH (elt_type));
9535 }
9536
9537 return res;
9538}
9539
4c4b4cd2
PH
9540/* Coerce VAL as necessary for assignment to an lval of type TYPE, and
9541 return the converted value. */
9542
d2e4a39e
AS
9543static struct value *
9544coerce_for_assign (struct type *type, struct value *val)
14f9c5c9 9545{
df407dfe 9546 struct type *type2 = value_type (val);
5b4ee69b 9547
14f9c5c9
AS
9548 if (type == type2)
9549 return val;
9550
61ee279c
PH
9551 type2 = ada_check_typedef (type2);
9552 type = ada_check_typedef (type);
14f9c5c9 9553
d2e4a39e
AS
9554 if (TYPE_CODE (type2) == TYPE_CODE_PTR
9555 && TYPE_CODE (type) == TYPE_CODE_ARRAY)
14f9c5c9
AS
9556 {
9557 val = ada_value_ind (val);
df407dfe 9558 type2 = value_type (val);
14f9c5c9
AS
9559 }
9560
d2e4a39e 9561 if (TYPE_CODE (type2) == TYPE_CODE_ARRAY
14f9c5c9
AS
9562 && TYPE_CODE (type) == TYPE_CODE_ARRAY)
9563 {
d99dcf51
JB
9564 if (!ada_same_array_size_p (type, type2))
9565 error (_("cannot assign arrays of different length"));
9566
9567 if (is_integral_type (TYPE_TARGET_TYPE (type))
9568 && is_integral_type (TYPE_TARGET_TYPE (type2))
9569 && TYPE_LENGTH (TYPE_TARGET_TYPE (type2))
9570 < TYPE_LENGTH (TYPE_TARGET_TYPE (type)))
9571 {
9572 /* Allow implicit promotion of the array elements to
9573 a wider type. */
9574 return ada_promote_array_of_integrals (type, val);
9575 }
9576
9577 if (TYPE_LENGTH (TYPE_TARGET_TYPE (type2))
9578 != TYPE_LENGTH (TYPE_TARGET_TYPE (type)))
323e0a4a 9579 error (_("Incompatible types in assignment"));
04624583 9580 deprecated_set_value_type (val, type);
14f9c5c9 9581 }
d2e4a39e 9582 return val;
14f9c5c9
AS
9583}
9584
4c4b4cd2
PH
9585static struct value *
9586ada_value_binop (struct value *arg1, struct value *arg2, enum exp_opcode op)
9587{
9588 struct value *val;
9589 struct type *type1, *type2;
9590 LONGEST v, v1, v2;
9591
994b9211
AC
9592 arg1 = coerce_ref (arg1);
9593 arg2 = coerce_ref (arg2);
18af8284
JB
9594 type1 = get_base_type (ada_check_typedef (value_type (arg1)));
9595 type2 = get_base_type (ada_check_typedef (value_type (arg2)));
4c4b4cd2 9596
76a01679
JB
9597 if (TYPE_CODE (type1) != TYPE_CODE_INT
9598 || TYPE_CODE (type2) != TYPE_CODE_INT)
4c4b4cd2
PH
9599 return value_binop (arg1, arg2, op);
9600
76a01679 9601 switch (op)
4c4b4cd2
PH
9602 {
9603 case BINOP_MOD:
9604 case BINOP_DIV:
9605 case BINOP_REM:
9606 break;
9607 default:
9608 return value_binop (arg1, arg2, op);
9609 }
9610
9611 v2 = value_as_long (arg2);
9612 if (v2 == 0)
323e0a4a 9613 error (_("second operand of %s must not be zero."), op_string (op));
4c4b4cd2
PH
9614
9615 if (TYPE_UNSIGNED (type1) || op == BINOP_MOD)
9616 return value_binop (arg1, arg2, op);
9617
9618 v1 = value_as_long (arg1);
9619 switch (op)
9620 {
9621 case BINOP_DIV:
9622 v = v1 / v2;
76a01679
JB
9623 if (!TRUNCATION_TOWARDS_ZERO && v1 * (v1 % v2) < 0)
9624 v += v > 0 ? -1 : 1;
4c4b4cd2
PH
9625 break;
9626 case BINOP_REM:
9627 v = v1 % v2;
76a01679
JB
9628 if (v * v1 < 0)
9629 v -= v2;
4c4b4cd2
PH
9630 break;
9631 default:
9632 /* Should not reach this point. */
9633 v = 0;
9634 }
9635
9636 val = allocate_value (type1);
990a07ab 9637 store_unsigned_integer (value_contents_raw (val),
e17a4113 9638 TYPE_LENGTH (value_type (val)),
34877895 9639 type_byte_order (type1), v);
4c4b4cd2
PH
9640 return val;
9641}
9642
9643static int
9644ada_value_equal (struct value *arg1, struct value *arg2)
9645{
df407dfe
AC
9646 if (ada_is_direct_array_type (value_type (arg1))
9647 || ada_is_direct_array_type (value_type (arg2)))
4c4b4cd2 9648 {
79e8fcaa
JB
9649 struct type *arg1_type, *arg2_type;
9650
f58b38bf
JB
9651 /* Automatically dereference any array reference before
9652 we attempt to perform the comparison. */
9653 arg1 = ada_coerce_ref (arg1);
9654 arg2 = ada_coerce_ref (arg2);
79e8fcaa 9655
4c4b4cd2
PH
9656 arg1 = ada_coerce_to_simple_array (arg1);
9657 arg2 = ada_coerce_to_simple_array (arg2);
79e8fcaa
JB
9658
9659 arg1_type = ada_check_typedef (value_type (arg1));
9660 arg2_type = ada_check_typedef (value_type (arg2));
9661
9662 if (TYPE_CODE (arg1_type) != TYPE_CODE_ARRAY
9663 || TYPE_CODE (arg2_type) != TYPE_CODE_ARRAY)
323e0a4a 9664 error (_("Attempt to compare array with non-array"));
4c4b4cd2 9665 /* FIXME: The following works only for types whose
76a01679
JB
9666 representations use all bits (no padding or undefined bits)
9667 and do not have user-defined equality. */
79e8fcaa
JB
9668 return (TYPE_LENGTH (arg1_type) == TYPE_LENGTH (arg2_type)
9669 && memcmp (value_contents (arg1), value_contents (arg2),
9670 TYPE_LENGTH (arg1_type)) == 0);
4c4b4cd2
PH
9671 }
9672 return value_equal (arg1, arg2);
9673}
9674
52ce6436
PH
9675/* Total number of component associations in the aggregate starting at
9676 index PC in EXP. Assumes that index PC is the start of an
0963b4bd 9677 OP_AGGREGATE. */
52ce6436
PH
9678
9679static int
9680num_component_specs (struct expression *exp, int pc)
9681{
9682 int n, m, i;
5b4ee69b 9683
52ce6436
PH
9684 m = exp->elts[pc + 1].longconst;
9685 pc += 3;
9686 n = 0;
9687 for (i = 0; i < m; i += 1)
9688 {
9689 switch (exp->elts[pc].opcode)
9690 {
9691 default:
9692 n += 1;
9693 break;
9694 case OP_CHOICES:
9695 n += exp->elts[pc + 1].longconst;
9696 break;
9697 }
9698 ada_evaluate_subexp (NULL, exp, &pc, EVAL_SKIP);
9699 }
9700 return n;
9701}
9702
9703/* Assign the result of evaluating EXP starting at *POS to the INDEXth
9704 component of LHS (a simple array or a record), updating *POS past
9705 the expression, assuming that LHS is contained in CONTAINER. Does
9706 not modify the inferior's memory, nor does it modify LHS (unless
9707 LHS == CONTAINER). */
9708
9709static void
9710assign_component (struct value *container, struct value *lhs, LONGEST index,
9711 struct expression *exp, int *pos)
9712{
9713 struct value *mark = value_mark ();
9714 struct value *elt;
0e2da9f0 9715 struct type *lhs_type = check_typedef (value_type (lhs));
5b4ee69b 9716
0e2da9f0 9717 if (TYPE_CODE (lhs_type) == TYPE_CODE_ARRAY)
52ce6436 9718 {
22601c15
UW
9719 struct type *index_type = builtin_type (exp->gdbarch)->builtin_int;
9720 struct value *index_val = value_from_longest (index_type, index);
5b4ee69b 9721
52ce6436
PH
9722 elt = unwrap_value (ada_value_subscript (lhs, 1, &index_val));
9723 }
9724 else
9725 {
9726 elt = ada_index_struct_field (index, lhs, 0, value_type (lhs));
c48db5ca 9727 elt = ada_to_fixed_value (elt);
52ce6436
PH
9728 }
9729
9730 if (exp->elts[*pos].opcode == OP_AGGREGATE)
9731 assign_aggregate (container, elt, exp, pos, EVAL_NORMAL);
9732 else
9733 value_assign_to_component (container, elt,
9734 ada_evaluate_subexp (NULL, exp, pos,
9735 EVAL_NORMAL));
9736
9737 value_free_to_mark (mark);
9738}
9739
9740/* Assuming that LHS represents an lvalue having a record or array
9741 type, and EXP->ELTS[*POS] is an OP_AGGREGATE, evaluate an assignment
9742 of that aggregate's value to LHS, advancing *POS past the
9743 aggregate. NOSIDE is as for evaluate_subexp. CONTAINER is an
9744 lvalue containing LHS (possibly LHS itself). Does not modify
9745 the inferior's memory, nor does it modify the contents of
0963b4bd 9746 LHS (unless == CONTAINER). Returns the modified CONTAINER. */
52ce6436
PH
9747
9748static struct value *
9749assign_aggregate (struct value *container,
9750 struct value *lhs, struct expression *exp,
9751 int *pos, enum noside noside)
9752{
9753 struct type *lhs_type;
9754 int n = exp->elts[*pos+1].longconst;
9755 LONGEST low_index, high_index;
9756 int num_specs;
9757 LONGEST *indices;
9758 int max_indices, num_indices;
52ce6436 9759 int i;
52ce6436
PH
9760
9761 *pos += 3;
9762 if (noside != EVAL_NORMAL)
9763 {
52ce6436
PH
9764 for (i = 0; i < n; i += 1)
9765 ada_evaluate_subexp (NULL, exp, pos, noside);
9766 return container;
9767 }
9768
9769 container = ada_coerce_ref (container);
9770 if (ada_is_direct_array_type (value_type (container)))
9771 container = ada_coerce_to_simple_array (container);
9772 lhs = ada_coerce_ref (lhs);
9773 if (!deprecated_value_modifiable (lhs))
9774 error (_("Left operand of assignment is not a modifiable lvalue."));
9775
0e2da9f0 9776 lhs_type = check_typedef (value_type (lhs));
52ce6436
PH
9777 if (ada_is_direct_array_type (lhs_type))
9778 {
9779 lhs = ada_coerce_to_simple_array (lhs);
0e2da9f0 9780 lhs_type = check_typedef (value_type (lhs));
52ce6436
PH
9781 low_index = TYPE_ARRAY_LOWER_BOUND_VALUE (lhs_type);
9782 high_index = TYPE_ARRAY_UPPER_BOUND_VALUE (lhs_type);
52ce6436
PH
9783 }
9784 else if (TYPE_CODE (lhs_type) == TYPE_CODE_STRUCT)
9785 {
9786 low_index = 0;
9787 high_index = num_visible_fields (lhs_type) - 1;
52ce6436
PH
9788 }
9789 else
9790 error (_("Left-hand side must be array or record."));
9791
9792 num_specs = num_component_specs (exp, *pos - 3);
9793 max_indices = 4 * num_specs + 4;
8d749320 9794 indices = XALLOCAVEC (LONGEST, max_indices);
52ce6436
PH
9795 indices[0] = indices[1] = low_index - 1;
9796 indices[2] = indices[3] = high_index + 1;
9797 num_indices = 4;
9798
9799 for (i = 0; i < n; i += 1)
9800 {
9801 switch (exp->elts[*pos].opcode)
9802 {
1fbf5ada
JB
9803 case OP_CHOICES:
9804 aggregate_assign_from_choices (container, lhs, exp, pos, indices,
9805 &num_indices, max_indices,
9806 low_index, high_index);
9807 break;
9808 case OP_POSITIONAL:
9809 aggregate_assign_positional (container, lhs, exp, pos, indices,
52ce6436
PH
9810 &num_indices, max_indices,
9811 low_index, high_index);
1fbf5ada
JB
9812 break;
9813 case OP_OTHERS:
9814 if (i != n-1)
9815 error (_("Misplaced 'others' clause"));
9816 aggregate_assign_others (container, lhs, exp, pos, indices,
9817 num_indices, low_index, high_index);
9818 break;
9819 default:
9820 error (_("Internal error: bad aggregate clause"));
52ce6436
PH
9821 }
9822 }
9823
9824 return container;
9825}
9826
9827/* Assign into the component of LHS indexed by the OP_POSITIONAL
9828 construct at *POS, updating *POS past the construct, given that
9829 the positions are relative to lower bound LOW, where HIGH is the
9830 upper bound. Record the position in INDICES[0 .. MAX_INDICES-1]
9831 updating *NUM_INDICES as needed. CONTAINER is as for
0963b4bd 9832 assign_aggregate. */
52ce6436
PH
9833static void
9834aggregate_assign_positional (struct value *container,
9835 struct value *lhs, struct expression *exp,
9836 int *pos, LONGEST *indices, int *num_indices,
9837 int max_indices, LONGEST low, LONGEST high)
9838{
9839 LONGEST ind = longest_to_int (exp->elts[*pos + 1].longconst) + low;
9840
9841 if (ind - 1 == high)
e1d5a0d2 9842 warning (_("Extra components in aggregate ignored."));
52ce6436
PH
9843 if (ind <= high)
9844 {
9845 add_component_interval (ind, ind, indices, num_indices, max_indices);
9846 *pos += 3;
9847 assign_component (container, lhs, ind, exp, pos);
9848 }
9849 else
9850 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9851}
9852
9853/* Assign into the components of LHS indexed by the OP_CHOICES
9854 construct at *POS, updating *POS past the construct, given that
9855 the allowable indices are LOW..HIGH. Record the indices assigned
9856 to in INDICES[0 .. MAX_INDICES-1], updating *NUM_INDICES as
0963b4bd 9857 needed. CONTAINER is as for assign_aggregate. */
52ce6436
PH
9858static void
9859aggregate_assign_from_choices (struct value *container,
9860 struct value *lhs, struct expression *exp,
9861 int *pos, LONGEST *indices, int *num_indices,
9862 int max_indices, LONGEST low, LONGEST high)
9863{
9864 int j;
9865 int n_choices = longest_to_int (exp->elts[*pos+1].longconst);
9866 int choice_pos, expr_pc;
9867 int is_array = ada_is_direct_array_type (value_type (lhs));
9868
9869 choice_pos = *pos += 3;
9870
9871 for (j = 0; j < n_choices; j += 1)
9872 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9873 expr_pc = *pos;
9874 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9875
9876 for (j = 0; j < n_choices; j += 1)
9877 {
9878 LONGEST lower, upper;
9879 enum exp_opcode op = exp->elts[choice_pos].opcode;
5b4ee69b 9880
52ce6436
PH
9881 if (op == OP_DISCRETE_RANGE)
9882 {
9883 choice_pos += 1;
9884 lower = value_as_long (ada_evaluate_subexp (NULL, exp, pos,
9885 EVAL_NORMAL));
9886 upper = value_as_long (ada_evaluate_subexp (NULL, exp, pos,
9887 EVAL_NORMAL));
9888 }
9889 else if (is_array)
9890 {
9891 lower = value_as_long (ada_evaluate_subexp (NULL, exp, &choice_pos,
9892 EVAL_NORMAL));
9893 upper = lower;
9894 }
9895 else
9896 {
9897 int ind;
0d5cff50 9898 const char *name;
5b4ee69b 9899
52ce6436
PH
9900 switch (op)
9901 {
9902 case OP_NAME:
9903 name = &exp->elts[choice_pos + 2].string;
9904 break;
9905 case OP_VAR_VALUE:
987012b8 9906 name = exp->elts[choice_pos + 2].symbol->natural_name ();
52ce6436
PH
9907 break;
9908 default:
9909 error (_("Invalid record component association."));
9910 }
9911 ada_evaluate_subexp (NULL, exp, &choice_pos, EVAL_SKIP);
9912 ind = 0;
9913 if (! find_struct_field (name, value_type (lhs), 0,
9914 NULL, NULL, NULL, NULL, &ind))
9915 error (_("Unknown component name: %s."), name);
9916 lower = upper = ind;
9917 }
9918
9919 if (lower <= upper && (lower < low || upper > high))
9920 error (_("Index in component association out of bounds."));
9921
9922 add_component_interval (lower, upper, indices, num_indices,
9923 max_indices);
9924 while (lower <= upper)
9925 {
9926 int pos1;
5b4ee69b 9927
52ce6436
PH
9928 pos1 = expr_pc;
9929 assign_component (container, lhs, lower, exp, &pos1);
9930 lower += 1;
9931 }
9932 }
9933}
9934
9935/* Assign the value of the expression in the OP_OTHERS construct in
9936 EXP at *POS into the components of LHS indexed from LOW .. HIGH that
9937 have not been previously assigned. The index intervals already assigned
9938 are in INDICES[0 .. NUM_INDICES-1]. Updates *POS to after the
0963b4bd 9939 OP_OTHERS clause. CONTAINER is as for assign_aggregate. */
52ce6436
PH
9940static void
9941aggregate_assign_others (struct value *container,
9942 struct value *lhs, struct expression *exp,
9943 int *pos, LONGEST *indices, int num_indices,
9944 LONGEST low, LONGEST high)
9945{
9946 int i;
5ce64950 9947 int expr_pc = *pos + 1;
52ce6436
PH
9948
9949 for (i = 0; i < num_indices - 2; i += 2)
9950 {
9951 LONGEST ind;
5b4ee69b 9952
52ce6436
PH
9953 for (ind = indices[i + 1] + 1; ind < indices[i + 2]; ind += 1)
9954 {
5ce64950 9955 int localpos;
5b4ee69b 9956
5ce64950
MS
9957 localpos = expr_pc;
9958 assign_component (container, lhs, ind, exp, &localpos);
52ce6436
PH
9959 }
9960 }
9961 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9962}
9963
9964/* Add the interval [LOW .. HIGH] to the sorted set of intervals
9965 [ INDICES[0] .. INDICES[1] ],..., [ INDICES[*SIZE-2] .. INDICES[*SIZE-1] ],
9966 modifying *SIZE as needed. It is an error if *SIZE exceeds
9967 MAX_SIZE. The resulting intervals do not overlap. */
9968static void
9969add_component_interval (LONGEST low, LONGEST high,
9970 LONGEST* indices, int *size, int max_size)
9971{
9972 int i, j;
5b4ee69b 9973
52ce6436
PH
9974 for (i = 0; i < *size; i += 2) {
9975 if (high >= indices[i] && low <= indices[i + 1])
9976 {
9977 int kh;
5b4ee69b 9978
52ce6436
PH
9979 for (kh = i + 2; kh < *size; kh += 2)
9980 if (high < indices[kh])
9981 break;
9982 if (low < indices[i])
9983 indices[i] = low;
9984 indices[i + 1] = indices[kh - 1];
9985 if (high > indices[i + 1])
9986 indices[i + 1] = high;
9987 memcpy (indices + i + 2, indices + kh, *size - kh);
9988 *size -= kh - i - 2;
9989 return;
9990 }
9991 else if (high < indices[i])
9992 break;
9993 }
9994
9995 if (*size == max_size)
9996 error (_("Internal error: miscounted aggregate components."));
9997 *size += 2;
9998 for (j = *size-1; j >= i+2; j -= 1)
9999 indices[j] = indices[j - 2];
10000 indices[i] = low;
10001 indices[i + 1] = high;
10002}
10003
6e48bd2c
JB
10004/* Perform and Ada cast of ARG2 to type TYPE if the type of ARG2
10005 is different. */
10006
10007static struct value *
b7e22850 10008ada_value_cast (struct type *type, struct value *arg2)
6e48bd2c
JB
10009{
10010 if (type == ada_check_typedef (value_type (arg2)))
10011 return arg2;
10012
10013 if (ada_is_fixed_point_type (type))
95f39a5b 10014 return cast_to_fixed (type, arg2);
6e48bd2c
JB
10015
10016 if (ada_is_fixed_point_type (value_type (arg2)))
a53b7a21 10017 return cast_from_fixed (type, arg2);
6e48bd2c
JB
10018
10019 return value_cast (type, arg2);
10020}
10021
284614f0
JB
10022/* Evaluating Ada expressions, and printing their result.
10023 ------------------------------------------------------
10024
21649b50
JB
10025 1. Introduction:
10026 ----------------
10027
284614f0
JB
10028 We usually evaluate an Ada expression in order to print its value.
10029 We also evaluate an expression in order to print its type, which
10030 happens during the EVAL_AVOID_SIDE_EFFECTS phase of the evaluation,
10031 but we'll focus mostly on the EVAL_NORMAL phase. In practice, the
10032 EVAL_AVOID_SIDE_EFFECTS phase allows us to simplify certain aspects of
10033 the evaluation compared to the EVAL_NORMAL, but is otherwise very
10034 similar.
10035
10036 Evaluating expressions is a little more complicated for Ada entities
10037 than it is for entities in languages such as C. The main reason for
10038 this is that Ada provides types whose definition might be dynamic.
10039 One example of such types is variant records. Or another example
10040 would be an array whose bounds can only be known at run time.
10041
10042 The following description is a general guide as to what should be
10043 done (and what should NOT be done) in order to evaluate an expression
10044 involving such types, and when. This does not cover how the semantic
10045 information is encoded by GNAT as this is covered separatly. For the
10046 document used as the reference for the GNAT encoding, see exp_dbug.ads
10047 in the GNAT sources.
10048
10049 Ideally, we should embed each part of this description next to its
10050 associated code. Unfortunately, the amount of code is so vast right
10051 now that it's hard to see whether the code handling a particular
10052 situation might be duplicated or not. One day, when the code is
10053 cleaned up, this guide might become redundant with the comments
10054 inserted in the code, and we might want to remove it.
10055
21649b50
JB
10056 2. ``Fixing'' an Entity, the Simple Case:
10057 -----------------------------------------
10058
284614f0
JB
10059 When evaluating Ada expressions, the tricky issue is that they may
10060 reference entities whose type contents and size are not statically
10061 known. Consider for instance a variant record:
10062
10063 type Rec (Empty : Boolean := True) is record
10064 case Empty is
10065 when True => null;
10066 when False => Value : Integer;
10067 end case;
10068 end record;
10069 Yes : Rec := (Empty => False, Value => 1);
10070 No : Rec := (empty => True);
10071
10072 The size and contents of that record depends on the value of the
10073 descriminant (Rec.Empty). At this point, neither the debugging
10074 information nor the associated type structure in GDB are able to
10075 express such dynamic types. So what the debugger does is to create
10076 "fixed" versions of the type that applies to the specific object.
30baf67b 10077 We also informally refer to this operation as "fixing" an object,
284614f0
JB
10078 which means creating its associated fixed type.
10079
10080 Example: when printing the value of variable "Yes" above, its fixed
10081 type would look like this:
10082
10083 type Rec is record
10084 Empty : Boolean;
10085 Value : Integer;
10086 end record;
10087
10088 On the other hand, if we printed the value of "No", its fixed type
10089 would become:
10090
10091 type Rec is record
10092 Empty : Boolean;
10093 end record;
10094
10095 Things become a little more complicated when trying to fix an entity
10096 with a dynamic type that directly contains another dynamic type,
10097 such as an array of variant records, for instance. There are
10098 two possible cases: Arrays, and records.
10099
21649b50
JB
10100 3. ``Fixing'' Arrays:
10101 ---------------------
10102
10103 The type structure in GDB describes an array in terms of its bounds,
10104 and the type of its elements. By design, all elements in the array
10105 have the same type and we cannot represent an array of variant elements
10106 using the current type structure in GDB. When fixing an array,
10107 we cannot fix the array element, as we would potentially need one
10108 fixed type per element of the array. As a result, the best we can do
10109 when fixing an array is to produce an array whose bounds and size
10110 are correct (allowing us to read it from memory), but without having
10111 touched its element type. Fixing each element will be done later,
10112 when (if) necessary.
10113
10114 Arrays are a little simpler to handle than records, because the same
10115 amount of memory is allocated for each element of the array, even if
1b536f04 10116 the amount of space actually used by each element differs from element
21649b50 10117 to element. Consider for instance the following array of type Rec:
284614f0
JB
10118
10119 type Rec_Array is array (1 .. 2) of Rec;
10120
1b536f04
JB
10121 The actual amount of memory occupied by each element might be different
10122 from element to element, depending on the value of their discriminant.
21649b50 10123 But the amount of space reserved for each element in the array remains
1b536f04 10124 fixed regardless. So we simply need to compute that size using
21649b50
JB
10125 the debugging information available, from which we can then determine
10126 the array size (we multiply the number of elements of the array by
10127 the size of each element).
10128
10129 The simplest case is when we have an array of a constrained element
10130 type. For instance, consider the following type declarations:
10131
10132 type Bounded_String (Max_Size : Integer) is
10133 Length : Integer;
10134 Buffer : String (1 .. Max_Size);
10135 end record;
10136 type Bounded_String_Array is array (1 ..2) of Bounded_String (80);
10137
10138 In this case, the compiler describes the array as an array of
10139 variable-size elements (identified by its XVS suffix) for which
10140 the size can be read in the parallel XVZ variable.
10141
10142 In the case of an array of an unconstrained element type, the compiler
10143 wraps the array element inside a private PAD type. This type should not
10144 be shown to the user, and must be "unwrap"'ed before printing. Note
284614f0
JB
10145 that we also use the adjective "aligner" in our code to designate
10146 these wrapper types.
10147
1b536f04 10148 In some cases, the size allocated for each element is statically
21649b50
JB
10149 known. In that case, the PAD type already has the correct size,
10150 and the array element should remain unfixed.
10151
10152 But there are cases when this size is not statically known.
10153 For instance, assuming that "Five" is an integer variable:
284614f0
JB
10154
10155 type Dynamic is array (1 .. Five) of Integer;
10156 type Wrapper (Has_Length : Boolean := False) is record
10157 Data : Dynamic;
10158 case Has_Length is
10159 when True => Length : Integer;
10160 when False => null;
10161 end case;
10162 end record;
10163 type Wrapper_Array is array (1 .. 2) of Wrapper;
10164
10165 Hello : Wrapper_Array := (others => (Has_Length => True,
10166 Data => (others => 17),
10167 Length => 1));
10168
10169
10170 The debugging info would describe variable Hello as being an
10171 array of a PAD type. The size of that PAD type is not statically
10172 known, but can be determined using a parallel XVZ variable.
10173 In that case, a copy of the PAD type with the correct size should
10174 be used for the fixed array.
10175
21649b50
JB
10176 3. ``Fixing'' record type objects:
10177 ----------------------------------
10178
10179 Things are slightly different from arrays in the case of dynamic
284614f0
JB
10180 record types. In this case, in order to compute the associated
10181 fixed type, we need to determine the size and offset of each of
10182 its components. This, in turn, requires us to compute the fixed
10183 type of each of these components.
10184
10185 Consider for instance the example:
10186
10187 type Bounded_String (Max_Size : Natural) is record
10188 Str : String (1 .. Max_Size);
10189 Length : Natural;
10190 end record;
10191 My_String : Bounded_String (Max_Size => 10);
10192
10193 In that case, the position of field "Length" depends on the size
10194 of field Str, which itself depends on the value of the Max_Size
21649b50 10195 discriminant. In order to fix the type of variable My_String,
284614f0
JB
10196 we need to fix the type of field Str. Therefore, fixing a variant
10197 record requires us to fix each of its components.
10198
10199 However, if a component does not have a dynamic size, the component
10200 should not be fixed. In particular, fields that use a PAD type
10201 should not fixed. Here is an example where this might happen
10202 (assuming type Rec above):
10203
10204 type Container (Big : Boolean) is record
10205 First : Rec;
10206 After : Integer;
10207 case Big is
10208 when True => Another : Integer;
10209 when False => null;
10210 end case;
10211 end record;
10212 My_Container : Container := (Big => False,
10213 First => (Empty => True),
10214 After => 42);
10215
10216 In that example, the compiler creates a PAD type for component First,
10217 whose size is constant, and then positions the component After just
10218 right after it. The offset of component After is therefore constant
10219 in this case.
10220
10221 The debugger computes the position of each field based on an algorithm
10222 that uses, among other things, the actual position and size of the field
21649b50
JB
10223 preceding it. Let's now imagine that the user is trying to print
10224 the value of My_Container. If the type fixing was recursive, we would
284614f0
JB
10225 end up computing the offset of field After based on the size of the
10226 fixed version of field First. And since in our example First has
10227 only one actual field, the size of the fixed type is actually smaller
10228 than the amount of space allocated to that field, and thus we would
10229 compute the wrong offset of field After.
10230
21649b50
JB
10231 To make things more complicated, we need to watch out for dynamic
10232 components of variant records (identified by the ___XVL suffix in
10233 the component name). Even if the target type is a PAD type, the size
10234 of that type might not be statically known. So the PAD type needs
10235 to be unwrapped and the resulting type needs to be fixed. Otherwise,
10236 we might end up with the wrong size for our component. This can be
10237 observed with the following type declarations:
284614f0
JB
10238
10239 type Octal is new Integer range 0 .. 7;
10240 type Octal_Array is array (Positive range <>) of Octal;
10241 pragma Pack (Octal_Array);
10242
10243 type Octal_Buffer (Size : Positive) is record
10244 Buffer : Octal_Array (1 .. Size);
10245 Length : Integer;
10246 end record;
10247
10248 In that case, Buffer is a PAD type whose size is unset and needs
10249 to be computed by fixing the unwrapped type.
10250
21649b50
JB
10251 4. When to ``Fix'' un-``Fixed'' sub-elements of an entity:
10252 ----------------------------------------------------------
10253
10254 Lastly, when should the sub-elements of an entity that remained unfixed
284614f0
JB
10255 thus far, be actually fixed?
10256
10257 The answer is: Only when referencing that element. For instance
10258 when selecting one component of a record, this specific component
10259 should be fixed at that point in time. Or when printing the value
10260 of a record, each component should be fixed before its value gets
10261 printed. Similarly for arrays, the element of the array should be
10262 fixed when printing each element of the array, or when extracting
10263 one element out of that array. On the other hand, fixing should
10264 not be performed on the elements when taking a slice of an array!
10265
31432a67 10266 Note that one of the side effects of miscomputing the offset and
284614f0
JB
10267 size of each field is that we end up also miscomputing the size
10268 of the containing type. This can have adverse results when computing
10269 the value of an entity. GDB fetches the value of an entity based
10270 on the size of its type, and thus a wrong size causes GDB to fetch
10271 the wrong amount of memory. In the case where the computed size is
10272 too small, GDB fetches too little data to print the value of our
31432a67 10273 entity. Results in this case are unpredictable, as we usually read
284614f0
JB
10274 past the buffer containing the data =:-o. */
10275
ced9779b
JB
10276/* Evaluate a subexpression of EXP, at index *POS, and return a value
10277 for that subexpression cast to TO_TYPE. Advance *POS over the
10278 subexpression. */
10279
10280static value *
10281ada_evaluate_subexp_for_cast (expression *exp, int *pos,
10282 enum noside noside, struct type *to_type)
10283{
10284 int pc = *pos;
10285
10286 if (exp->elts[pc].opcode == OP_VAR_MSYM_VALUE
10287 || exp->elts[pc].opcode == OP_VAR_VALUE)
10288 {
10289 (*pos) += 4;
10290
10291 value *val;
10292 if (exp->elts[pc].opcode == OP_VAR_MSYM_VALUE)
10293 {
10294 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10295 return value_zero (to_type, not_lval);
10296
10297 val = evaluate_var_msym_value (noside,
10298 exp->elts[pc + 1].objfile,
10299 exp->elts[pc + 2].msymbol);
10300 }
10301 else
10302 val = evaluate_var_value (noside,
10303 exp->elts[pc + 1].block,
10304 exp->elts[pc + 2].symbol);
10305
10306 if (noside == EVAL_SKIP)
10307 return eval_skip_value (exp);
10308
10309 val = ada_value_cast (to_type, val);
10310
10311 /* Follow the Ada language semantics that do not allow taking
10312 an address of the result of a cast (view conversion in Ada). */
10313 if (VALUE_LVAL (val) == lval_memory)
10314 {
10315 if (value_lazy (val))
10316 value_fetch_lazy (val);
10317 VALUE_LVAL (val) = not_lval;
10318 }
10319 return val;
10320 }
10321
10322 value *val = evaluate_subexp (to_type, exp, pos, noside);
10323 if (noside == EVAL_SKIP)
10324 return eval_skip_value (exp);
10325 return ada_value_cast (to_type, val);
10326}
10327
284614f0
JB
10328/* Implement the evaluate_exp routine in the exp_descriptor structure
10329 for the Ada language. */
10330
52ce6436 10331static struct value *
ebf56fd3 10332ada_evaluate_subexp (struct type *expect_type, struct expression *exp,
4c4b4cd2 10333 int *pos, enum noside noside)
14f9c5c9
AS
10334{
10335 enum exp_opcode op;
b5385fc0 10336 int tem;
14f9c5c9 10337 int pc;
5ec18f2b 10338 int preeval_pos;
14f9c5c9
AS
10339 struct value *arg1 = NULL, *arg2 = NULL, *arg3;
10340 struct type *type;
52ce6436 10341 int nargs, oplen;
d2e4a39e 10342 struct value **argvec;
14f9c5c9 10343
d2e4a39e
AS
10344 pc = *pos;
10345 *pos += 1;
14f9c5c9
AS
10346 op = exp->elts[pc].opcode;
10347
d2e4a39e 10348 switch (op)
14f9c5c9
AS
10349 {
10350 default:
10351 *pos -= 1;
6e48bd2c 10352 arg1 = evaluate_subexp_standard (expect_type, exp, pos, noside);
ca1f964d
JG
10353
10354 if (noside == EVAL_NORMAL)
10355 arg1 = unwrap_value (arg1);
6e48bd2c 10356
edd079d9 10357 /* If evaluating an OP_FLOAT and an EXPECT_TYPE was provided,
6e48bd2c
JB
10358 then we need to perform the conversion manually, because
10359 evaluate_subexp_standard doesn't do it. This conversion is
10360 necessary in Ada because the different kinds of float/fixed
10361 types in Ada have different representations.
10362
10363 Similarly, we need to perform the conversion from OP_LONG
10364 ourselves. */
edd079d9 10365 if ((op == OP_FLOAT || op == OP_LONG) && expect_type != NULL)
b7e22850 10366 arg1 = ada_value_cast (expect_type, arg1);
6e48bd2c
JB
10367
10368 return arg1;
4c4b4cd2
PH
10369
10370 case OP_STRING:
10371 {
76a01679 10372 struct value *result;
5b4ee69b 10373
76a01679
JB
10374 *pos -= 1;
10375 result = evaluate_subexp_standard (expect_type, exp, pos, noside);
10376 /* The result type will have code OP_STRING, bashed there from
10377 OP_ARRAY. Bash it back. */
df407dfe 10378 if (TYPE_CODE (value_type (result)) == TYPE_CODE_STRING)
67607e24 10379 value_type (result)->set_code (TYPE_CODE_ARRAY);
76a01679 10380 return result;
4c4b4cd2 10381 }
14f9c5c9
AS
10382
10383 case UNOP_CAST:
10384 (*pos) += 2;
10385 type = exp->elts[pc + 1].type;
ced9779b 10386 return ada_evaluate_subexp_for_cast (exp, pos, noside, type);
14f9c5c9 10387
4c4b4cd2
PH
10388 case UNOP_QUAL:
10389 (*pos) += 2;
10390 type = exp->elts[pc + 1].type;
10391 return ada_evaluate_subexp (type, exp, pos, noside);
10392
14f9c5c9
AS
10393 case BINOP_ASSIGN:
10394 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
52ce6436
PH
10395 if (exp->elts[*pos].opcode == OP_AGGREGATE)
10396 {
10397 arg1 = assign_aggregate (arg1, arg1, exp, pos, noside);
10398 if (noside == EVAL_SKIP || noside == EVAL_AVOID_SIDE_EFFECTS)
10399 return arg1;
10400 return ada_value_assign (arg1, arg1);
10401 }
003f3813
JB
10402 /* Force the evaluation of the rhs ARG2 to the type of the lhs ARG1,
10403 except if the lhs of our assignment is a convenience variable.
10404 In the case of assigning to a convenience variable, the lhs
10405 should be exactly the result of the evaluation of the rhs. */
10406 type = value_type (arg1);
10407 if (VALUE_LVAL (arg1) == lval_internalvar)
10408 type = NULL;
10409 arg2 = evaluate_subexp (type, exp, pos, noside);
14f9c5c9 10410 if (noside == EVAL_SKIP || noside == EVAL_AVOID_SIDE_EFFECTS)
4c4b4cd2 10411 return arg1;
f411722c
TT
10412 if (VALUE_LVAL (arg1) == lval_internalvar)
10413 {
10414 /* Nothing. */
10415 }
10416 else if (ada_is_fixed_point_type (value_type (arg1)))
df407dfe
AC
10417 arg2 = cast_to_fixed (value_type (arg1), arg2);
10418 else if (ada_is_fixed_point_type (value_type (arg2)))
76a01679 10419 error
323e0a4a 10420 (_("Fixed-point values must be assigned to fixed-point variables"));
d2e4a39e 10421 else
df407dfe 10422 arg2 = coerce_for_assign (value_type (arg1), arg2);
4c4b4cd2 10423 return ada_value_assign (arg1, arg2);
14f9c5c9
AS
10424
10425 case BINOP_ADD:
10426 arg1 = evaluate_subexp_with_coercion (exp, pos, noside);
10427 arg2 = evaluate_subexp_with_coercion (exp, pos, noside);
10428 if (noside == EVAL_SKIP)
4c4b4cd2 10429 goto nosideret;
2ac8a782
JB
10430 if (TYPE_CODE (value_type (arg1)) == TYPE_CODE_PTR)
10431 return (value_from_longest
10432 (value_type (arg1),
10433 value_as_long (arg1) + value_as_long (arg2)));
c40cc657
JB
10434 if (TYPE_CODE (value_type (arg2)) == TYPE_CODE_PTR)
10435 return (value_from_longest
10436 (value_type (arg2),
10437 value_as_long (arg1) + value_as_long (arg2)));
df407dfe
AC
10438 if ((ada_is_fixed_point_type (value_type (arg1))
10439 || ada_is_fixed_point_type (value_type (arg2)))
10440 && value_type (arg1) != value_type (arg2))
323e0a4a 10441 error (_("Operands of fixed-point addition must have the same type"));
b7789565
JB
10442 /* Do the addition, and cast the result to the type of the first
10443 argument. We cannot cast the result to a reference type, so if
10444 ARG1 is a reference type, find its underlying type. */
10445 type = value_type (arg1);
10446 while (TYPE_CODE (type) == TYPE_CODE_REF)
10447 type = TYPE_TARGET_TYPE (type);
f44316fa 10448 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
89eef114 10449 return value_cast (type, value_binop (arg1, arg2, BINOP_ADD));
14f9c5c9
AS
10450
10451 case BINOP_SUB:
10452 arg1 = evaluate_subexp_with_coercion (exp, pos, noside);
10453 arg2 = evaluate_subexp_with_coercion (exp, pos, noside);
10454 if (noside == EVAL_SKIP)
4c4b4cd2 10455 goto nosideret;
2ac8a782
JB
10456 if (TYPE_CODE (value_type (arg1)) == TYPE_CODE_PTR)
10457 return (value_from_longest
10458 (value_type (arg1),
10459 value_as_long (arg1) - value_as_long (arg2)));
c40cc657
JB
10460 if (TYPE_CODE (value_type (arg2)) == TYPE_CODE_PTR)
10461 return (value_from_longest
10462 (value_type (arg2),
10463 value_as_long (arg1) - value_as_long (arg2)));
df407dfe
AC
10464 if ((ada_is_fixed_point_type (value_type (arg1))
10465 || ada_is_fixed_point_type (value_type (arg2)))
10466 && value_type (arg1) != value_type (arg2))
0963b4bd
MS
10467 error (_("Operands of fixed-point subtraction "
10468 "must have the same type"));
b7789565
JB
10469 /* Do the substraction, and cast the result to the type of the first
10470 argument. We cannot cast the result to a reference type, so if
10471 ARG1 is a reference type, find its underlying type. */
10472 type = value_type (arg1);
10473 while (TYPE_CODE (type) == TYPE_CODE_REF)
10474 type = TYPE_TARGET_TYPE (type);
f44316fa 10475 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
89eef114 10476 return value_cast (type, value_binop (arg1, arg2, BINOP_SUB));
14f9c5c9
AS
10477
10478 case BINOP_MUL:
10479 case BINOP_DIV:
e1578042
JB
10480 case BINOP_REM:
10481 case BINOP_MOD:
14f9c5c9
AS
10482 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10483 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10484 if (noside == EVAL_SKIP)
4c4b4cd2 10485 goto nosideret;
e1578042 10486 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
9c2be529
JB
10487 {
10488 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10489 return value_zero (value_type (arg1), not_lval);
10490 }
14f9c5c9 10491 else
4c4b4cd2 10492 {
a53b7a21 10493 type = builtin_type (exp->gdbarch)->builtin_double;
df407dfe 10494 if (ada_is_fixed_point_type (value_type (arg1)))
a53b7a21 10495 arg1 = cast_from_fixed (type, arg1);
df407dfe 10496 if (ada_is_fixed_point_type (value_type (arg2)))
a53b7a21 10497 arg2 = cast_from_fixed (type, arg2);
f44316fa 10498 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
4c4b4cd2
PH
10499 return ada_value_binop (arg1, arg2, op);
10500 }
10501
4c4b4cd2
PH
10502 case BINOP_EQUAL:
10503 case BINOP_NOTEQUAL:
14f9c5c9 10504 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
df407dfe 10505 arg2 = evaluate_subexp (value_type (arg1), exp, pos, noside);
14f9c5c9 10506 if (noside == EVAL_SKIP)
76a01679 10507 goto nosideret;
4c4b4cd2 10508 if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 10509 tem = 0;
4c4b4cd2 10510 else
f44316fa
UW
10511 {
10512 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10513 tem = ada_value_equal (arg1, arg2);
10514 }
4c4b4cd2 10515 if (op == BINOP_NOTEQUAL)
76a01679 10516 tem = !tem;
fbb06eb1
UW
10517 type = language_bool_type (exp->language_defn, exp->gdbarch);
10518 return value_from_longest (type, (LONGEST) tem);
4c4b4cd2
PH
10519
10520 case UNOP_NEG:
10521 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10522 if (noside == EVAL_SKIP)
10523 goto nosideret;
df407dfe
AC
10524 else if (ada_is_fixed_point_type (value_type (arg1)))
10525 return value_cast (value_type (arg1), value_neg (arg1));
14f9c5c9 10526 else
f44316fa
UW
10527 {
10528 unop_promote (exp->language_defn, exp->gdbarch, &arg1);
10529 return value_neg (arg1);
10530 }
4c4b4cd2 10531
2330c6c6
JB
10532 case BINOP_LOGICAL_AND:
10533 case BINOP_LOGICAL_OR:
10534 case UNOP_LOGICAL_NOT:
000d5124
JB
10535 {
10536 struct value *val;
10537
10538 *pos -= 1;
10539 val = evaluate_subexp_standard (expect_type, exp, pos, noside);
fbb06eb1
UW
10540 type = language_bool_type (exp->language_defn, exp->gdbarch);
10541 return value_cast (type, val);
000d5124 10542 }
2330c6c6
JB
10543
10544 case BINOP_BITWISE_AND:
10545 case BINOP_BITWISE_IOR:
10546 case BINOP_BITWISE_XOR:
000d5124
JB
10547 {
10548 struct value *val;
10549
10550 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, EVAL_AVOID_SIDE_EFFECTS);
10551 *pos = pc;
10552 val = evaluate_subexp_standard (expect_type, exp, pos, noside);
10553
10554 return value_cast (value_type (arg1), val);
10555 }
2330c6c6 10556
14f9c5c9
AS
10557 case OP_VAR_VALUE:
10558 *pos -= 1;
6799def4 10559
14f9c5c9 10560 if (noside == EVAL_SKIP)
4c4b4cd2
PH
10561 {
10562 *pos += 4;
10563 goto nosideret;
10564 }
da5c522f
JB
10565
10566 if (SYMBOL_DOMAIN (exp->elts[pc + 2].symbol) == UNDEF_DOMAIN)
76a01679
JB
10567 /* Only encountered when an unresolved symbol occurs in a
10568 context other than a function call, in which case, it is
52ce6436 10569 invalid. */
323e0a4a 10570 error (_("Unexpected unresolved symbol, %s, during evaluation"),
987012b8 10571 exp->elts[pc + 2].symbol->print_name ());
da5c522f
JB
10572
10573 if (noside == EVAL_AVOID_SIDE_EFFECTS)
4c4b4cd2 10574 {
0c1f74cf 10575 type = static_unwrap_type (SYMBOL_TYPE (exp->elts[pc + 2].symbol));
31dbc1c5
JB
10576 /* Check to see if this is a tagged type. We also need to handle
10577 the case where the type is a reference to a tagged type, but
10578 we have to be careful to exclude pointers to tagged types.
10579 The latter should be shown as usual (as a pointer), whereas
10580 a reference should mostly be transparent to the user. */
10581 if (ada_is_tagged_type (type, 0)
023db19c 10582 || (TYPE_CODE (type) == TYPE_CODE_REF
31dbc1c5 10583 && ada_is_tagged_type (TYPE_TARGET_TYPE (type), 0)))
0d72a7c3
JB
10584 {
10585 /* Tagged types are a little special in the fact that the real
10586 type is dynamic and can only be determined by inspecting the
10587 object's tag. This means that we need to get the object's
10588 value first (EVAL_NORMAL) and then extract the actual object
10589 type from its tag.
10590
10591 Note that we cannot skip the final step where we extract
10592 the object type from its tag, because the EVAL_NORMAL phase
10593 results in dynamic components being resolved into fixed ones.
10594 This can cause problems when trying to print the type
10595 description of tagged types whose parent has a dynamic size:
10596 We use the type name of the "_parent" component in order
10597 to print the name of the ancestor type in the type description.
10598 If that component had a dynamic size, the resolution into
10599 a fixed type would result in the loss of that type name,
10600 thus preventing us from printing the name of the ancestor
10601 type in the type description. */
10602 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, EVAL_NORMAL);
10603
10604 if (TYPE_CODE (type) != TYPE_CODE_REF)
10605 {
10606 struct type *actual_type;
10607
10608 actual_type = type_from_tag (ada_value_tag (arg1));
10609 if (actual_type == NULL)
10610 /* If, for some reason, we were unable to determine
10611 the actual type from the tag, then use the static
10612 approximation that we just computed as a fallback.
10613 This can happen if the debugging information is
10614 incomplete, for instance. */
10615 actual_type = type;
10616 return value_zero (actual_type, not_lval);
10617 }
10618 else
10619 {
10620 /* In the case of a ref, ada_coerce_ref takes care
10621 of determining the actual type. But the evaluation
10622 should return a ref as it should be valid to ask
10623 for its address; so rebuild a ref after coerce. */
10624 arg1 = ada_coerce_ref (arg1);
a65cfae5 10625 return value_ref (arg1, TYPE_CODE_REF);
0d72a7c3
JB
10626 }
10627 }
0c1f74cf 10628
84754697
JB
10629 /* Records and unions for which GNAT encodings have been
10630 generated need to be statically fixed as well.
10631 Otherwise, non-static fixing produces a type where
10632 all dynamic properties are removed, which prevents "ptype"
10633 from being able to completely describe the type.
10634 For instance, a case statement in a variant record would be
10635 replaced by the relevant components based on the actual
10636 value of the discriminants. */
10637 if ((TYPE_CODE (type) == TYPE_CODE_STRUCT
10638 && dynamic_template_type (type) != NULL)
10639 || (TYPE_CODE (type) == TYPE_CODE_UNION
10640 && ada_find_parallel_type (type, "___XVU") != NULL))
10641 {
10642 *pos += 4;
10643 return value_zero (to_static_fixed_type (type), not_lval);
10644 }
4c4b4cd2 10645 }
da5c522f
JB
10646
10647 arg1 = evaluate_subexp_standard (expect_type, exp, pos, noside);
10648 return ada_to_fixed_value (arg1);
4c4b4cd2
PH
10649
10650 case OP_FUNCALL:
10651 (*pos) += 2;
10652
10653 /* Allocate arg vector, including space for the function to be
10654 called in argvec[0] and a terminating NULL. */
10655 nargs = longest_to_int (exp->elts[pc + 1].longconst);
8d749320 10656 argvec = XALLOCAVEC (struct value *, nargs + 2);
4c4b4cd2
PH
10657
10658 if (exp->elts[*pos].opcode == OP_VAR_VALUE
76a01679 10659 && SYMBOL_DOMAIN (exp->elts[pc + 5].symbol) == UNDEF_DOMAIN)
323e0a4a 10660 error (_("Unexpected unresolved symbol, %s, during evaluation"),
987012b8 10661 exp->elts[pc + 5].symbol->print_name ());
4c4b4cd2
PH
10662 else
10663 {
10664 for (tem = 0; tem <= nargs; tem += 1)
10665 argvec[tem] = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10666 argvec[tem] = 0;
10667
10668 if (noside == EVAL_SKIP)
10669 goto nosideret;
10670 }
10671
ad82864c
JB
10672 if (ada_is_constrained_packed_array_type
10673 (desc_base_type (value_type (argvec[0]))))
4c4b4cd2 10674 argvec[0] = ada_coerce_to_simple_array (argvec[0]);
284614f0
JB
10675 else if (TYPE_CODE (value_type (argvec[0])) == TYPE_CODE_ARRAY
10676 && TYPE_FIELD_BITSIZE (value_type (argvec[0]), 0) != 0)
10677 /* This is a packed array that has already been fixed, and
10678 therefore already coerced to a simple array. Nothing further
10679 to do. */
10680 ;
e6c2c623
PMR
10681 else if (TYPE_CODE (value_type (argvec[0])) == TYPE_CODE_REF)
10682 {
10683 /* Make sure we dereference references so that all the code below
10684 feels like it's really handling the referenced value. Wrapping
10685 types (for alignment) may be there, so make sure we strip them as
10686 well. */
10687 argvec[0] = ada_to_fixed_value (coerce_ref (argvec[0]));
10688 }
10689 else if (TYPE_CODE (value_type (argvec[0])) == TYPE_CODE_ARRAY
10690 && VALUE_LVAL (argvec[0]) == lval_memory)
10691 argvec[0] = value_addr (argvec[0]);
4c4b4cd2 10692
df407dfe 10693 type = ada_check_typedef (value_type (argvec[0]));
720d1a40
JB
10694
10695 /* Ada allows us to implicitly dereference arrays when subscripting
8f465ea7
JB
10696 them. So, if this is an array typedef (encoding use for array
10697 access types encoded as fat pointers), strip it now. */
720d1a40
JB
10698 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF)
10699 type = ada_typedef_target_type (type);
10700
4c4b4cd2
PH
10701 if (TYPE_CODE (type) == TYPE_CODE_PTR)
10702 {
61ee279c 10703 switch (TYPE_CODE (ada_check_typedef (TYPE_TARGET_TYPE (type))))
4c4b4cd2
PH
10704 {
10705 case TYPE_CODE_FUNC:
61ee279c 10706 type = ada_check_typedef (TYPE_TARGET_TYPE (type));
4c4b4cd2
PH
10707 break;
10708 case TYPE_CODE_ARRAY:
10709 break;
10710 case TYPE_CODE_STRUCT:
10711 if (noside != EVAL_AVOID_SIDE_EFFECTS)
10712 argvec[0] = ada_value_ind (argvec[0]);
61ee279c 10713 type = ada_check_typedef (TYPE_TARGET_TYPE (type));
4c4b4cd2
PH
10714 break;
10715 default:
323e0a4a 10716 error (_("cannot subscript or call something of type `%s'"),
df407dfe 10717 ada_type_name (value_type (argvec[0])));
4c4b4cd2
PH
10718 break;
10719 }
10720 }
10721
10722 switch (TYPE_CODE (type))
10723 {
10724 case TYPE_CODE_FUNC:
10725 if (noside == EVAL_AVOID_SIDE_EFFECTS)
c8ea1972 10726 {
7022349d
PA
10727 if (TYPE_TARGET_TYPE (type) == NULL)
10728 error_call_unknown_return_type (NULL);
10729 return allocate_value (TYPE_TARGET_TYPE (type));
c8ea1972 10730 }
e71585ff
PA
10731 return call_function_by_hand (argvec[0], NULL,
10732 gdb::make_array_view (argvec + 1,
10733 nargs));
c8ea1972
PH
10734 case TYPE_CODE_INTERNAL_FUNCTION:
10735 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10736 /* We don't know anything about what the internal
10737 function might return, but we have to return
10738 something. */
10739 return value_zero (builtin_type (exp->gdbarch)->builtin_int,
10740 not_lval);
10741 else
10742 return call_internal_function (exp->gdbarch, exp->language_defn,
10743 argvec[0], nargs, argvec + 1);
10744
4c4b4cd2
PH
10745 case TYPE_CODE_STRUCT:
10746 {
10747 int arity;
10748
4c4b4cd2
PH
10749 arity = ada_array_arity (type);
10750 type = ada_array_element_type (type, nargs);
10751 if (type == NULL)
323e0a4a 10752 error (_("cannot subscript or call a record"));
4c4b4cd2 10753 if (arity != nargs)
323e0a4a 10754 error (_("wrong number of subscripts; expecting %d"), arity);
4c4b4cd2 10755 if (noside == EVAL_AVOID_SIDE_EFFECTS)
0a07e705 10756 return value_zero (ada_aligned_type (type), lval_memory);
4c4b4cd2
PH
10757 return
10758 unwrap_value (ada_value_subscript
10759 (argvec[0], nargs, argvec + 1));
10760 }
10761 case TYPE_CODE_ARRAY:
10762 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10763 {
10764 type = ada_array_element_type (type, nargs);
10765 if (type == NULL)
323e0a4a 10766 error (_("element type of array unknown"));
4c4b4cd2 10767 else
0a07e705 10768 return value_zero (ada_aligned_type (type), lval_memory);
4c4b4cd2
PH
10769 }
10770 return
10771 unwrap_value (ada_value_subscript
10772 (ada_coerce_to_simple_array (argvec[0]),
10773 nargs, argvec + 1));
10774 case TYPE_CODE_PTR: /* Pointer to array */
4c4b4cd2
PH
10775 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10776 {
deede10c 10777 type = to_fixed_array_type (TYPE_TARGET_TYPE (type), NULL, 1);
4c4b4cd2
PH
10778 type = ada_array_element_type (type, nargs);
10779 if (type == NULL)
323e0a4a 10780 error (_("element type of array unknown"));
4c4b4cd2 10781 else
0a07e705 10782 return value_zero (ada_aligned_type (type), lval_memory);
4c4b4cd2
PH
10783 }
10784 return
deede10c
JB
10785 unwrap_value (ada_value_ptr_subscript (argvec[0],
10786 nargs, argvec + 1));
4c4b4cd2
PH
10787
10788 default:
e1d5a0d2
PH
10789 error (_("Attempt to index or call something other than an "
10790 "array or function"));
4c4b4cd2
PH
10791 }
10792
10793 case TERNOP_SLICE:
10794 {
10795 struct value *array = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10796 struct value *low_bound_val =
10797 evaluate_subexp (NULL_TYPE, exp, pos, noside);
714e53ab
PH
10798 struct value *high_bound_val =
10799 evaluate_subexp (NULL_TYPE, exp, pos, noside);
10800 LONGEST low_bound;
10801 LONGEST high_bound;
5b4ee69b 10802
994b9211
AC
10803 low_bound_val = coerce_ref (low_bound_val);
10804 high_bound_val = coerce_ref (high_bound_val);
aa715135
JG
10805 low_bound = value_as_long (low_bound_val);
10806 high_bound = value_as_long (high_bound_val);
963a6417 10807
4c4b4cd2
PH
10808 if (noside == EVAL_SKIP)
10809 goto nosideret;
10810
4c4b4cd2
PH
10811 /* If this is a reference to an aligner type, then remove all
10812 the aligners. */
df407dfe
AC
10813 if (TYPE_CODE (value_type (array)) == TYPE_CODE_REF
10814 && ada_is_aligner_type (TYPE_TARGET_TYPE (value_type (array))))
10815 TYPE_TARGET_TYPE (value_type (array)) =
10816 ada_aligned_type (TYPE_TARGET_TYPE (value_type (array)));
4c4b4cd2 10817
ad82864c 10818 if (ada_is_constrained_packed_array_type (value_type (array)))
323e0a4a 10819 error (_("cannot slice a packed array"));
4c4b4cd2
PH
10820
10821 /* If this is a reference to an array or an array lvalue,
10822 convert to a pointer. */
df407dfe
AC
10823 if (TYPE_CODE (value_type (array)) == TYPE_CODE_REF
10824 || (TYPE_CODE (value_type (array)) == TYPE_CODE_ARRAY
4c4b4cd2
PH
10825 && VALUE_LVAL (array) == lval_memory))
10826 array = value_addr (array);
10827
1265e4aa 10828 if (noside == EVAL_AVOID_SIDE_EFFECTS
61ee279c 10829 && ada_is_array_descriptor_type (ada_check_typedef
df407dfe 10830 (value_type (array))))
bff8c71f
TT
10831 return empty_array (ada_type_of_array (array, 0), low_bound,
10832 high_bound);
4c4b4cd2
PH
10833
10834 array = ada_coerce_to_simple_array_ptr (array);
10835
714e53ab
PH
10836 /* If we have more than one level of pointer indirection,
10837 dereference the value until we get only one level. */
df407dfe
AC
10838 while (TYPE_CODE (value_type (array)) == TYPE_CODE_PTR
10839 && (TYPE_CODE (TYPE_TARGET_TYPE (value_type (array)))
714e53ab
PH
10840 == TYPE_CODE_PTR))
10841 array = value_ind (array);
10842
10843 /* Make sure we really do have an array type before going further,
10844 to avoid a SEGV when trying to get the index type or the target
10845 type later down the road if the debug info generated by
10846 the compiler is incorrect or incomplete. */
df407dfe 10847 if (!ada_is_simple_array_type (value_type (array)))
323e0a4a 10848 error (_("cannot take slice of non-array"));
714e53ab 10849
828292f2
JB
10850 if (TYPE_CODE (ada_check_typedef (value_type (array)))
10851 == TYPE_CODE_PTR)
4c4b4cd2 10852 {
828292f2
JB
10853 struct type *type0 = ada_check_typedef (value_type (array));
10854
0b5d8877 10855 if (high_bound < low_bound || noside == EVAL_AVOID_SIDE_EFFECTS)
bff8c71f 10856 return empty_array (TYPE_TARGET_TYPE (type0), low_bound, high_bound);
4c4b4cd2
PH
10857 else
10858 {
10859 struct type *arr_type0 =
828292f2 10860 to_fixed_array_type (TYPE_TARGET_TYPE (type0), NULL, 1);
5b4ee69b 10861
f5938064
JG
10862 return ada_value_slice_from_ptr (array, arr_type0,
10863 longest_to_int (low_bound),
10864 longest_to_int (high_bound));
4c4b4cd2
PH
10865 }
10866 }
10867 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
10868 return array;
10869 else if (high_bound < low_bound)
bff8c71f 10870 return empty_array (value_type (array), low_bound, high_bound);
4c4b4cd2 10871 else
529cad9c
PH
10872 return ada_value_slice (array, longest_to_int (low_bound),
10873 longest_to_int (high_bound));
4c4b4cd2 10874 }
14f9c5c9 10875
4c4b4cd2
PH
10876 case UNOP_IN_RANGE:
10877 (*pos) += 2;
10878 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
8008e265 10879 type = check_typedef (exp->elts[pc + 1].type);
14f9c5c9 10880
14f9c5c9 10881 if (noside == EVAL_SKIP)
4c4b4cd2 10882 goto nosideret;
14f9c5c9 10883
4c4b4cd2
PH
10884 switch (TYPE_CODE (type))
10885 {
10886 default:
e1d5a0d2
PH
10887 lim_warning (_("Membership test incompletely implemented; "
10888 "always returns true"));
fbb06eb1
UW
10889 type = language_bool_type (exp->language_defn, exp->gdbarch);
10890 return value_from_longest (type, (LONGEST) 1);
4c4b4cd2
PH
10891
10892 case TYPE_CODE_RANGE:
030b4912
UW
10893 arg2 = value_from_longest (type, TYPE_LOW_BOUND (type));
10894 arg3 = value_from_longest (type, TYPE_HIGH_BOUND (type));
f44316fa
UW
10895 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10896 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg3);
fbb06eb1
UW
10897 type = language_bool_type (exp->language_defn, exp->gdbarch);
10898 return
10899 value_from_longest (type,
4c4b4cd2
PH
10900 (value_less (arg1, arg3)
10901 || value_equal (arg1, arg3))
10902 && (value_less (arg2, arg1)
10903 || value_equal (arg2, arg1)));
10904 }
10905
10906 case BINOP_IN_BOUNDS:
14f9c5c9 10907 (*pos) += 2;
4c4b4cd2
PH
10908 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10909 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
14f9c5c9 10910
4c4b4cd2
PH
10911 if (noside == EVAL_SKIP)
10912 goto nosideret;
14f9c5c9 10913
4c4b4cd2 10914 if (noside == EVAL_AVOID_SIDE_EFFECTS)
fbb06eb1
UW
10915 {
10916 type = language_bool_type (exp->language_defn, exp->gdbarch);
10917 return value_zero (type, not_lval);
10918 }
14f9c5c9 10919
4c4b4cd2 10920 tem = longest_to_int (exp->elts[pc + 1].longconst);
14f9c5c9 10921
1eea4ebd
UW
10922 type = ada_index_type (value_type (arg2), tem, "range");
10923 if (!type)
10924 type = value_type (arg1);
14f9c5c9 10925
1eea4ebd
UW
10926 arg3 = value_from_longest (type, ada_array_bound (arg2, tem, 1));
10927 arg2 = value_from_longest (type, ada_array_bound (arg2, tem, 0));
d2e4a39e 10928
f44316fa
UW
10929 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10930 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg3);
fbb06eb1 10931 type = language_bool_type (exp->language_defn, exp->gdbarch);
4c4b4cd2 10932 return
fbb06eb1 10933 value_from_longest (type,
4c4b4cd2
PH
10934 (value_less (arg1, arg3)
10935 || value_equal (arg1, arg3))
10936 && (value_less (arg2, arg1)
10937 || value_equal (arg2, arg1)));
10938
10939 case TERNOP_IN_RANGE:
10940 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10941 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10942 arg3 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10943
10944 if (noside == EVAL_SKIP)
10945 goto nosideret;
10946
f44316fa
UW
10947 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10948 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg3);
fbb06eb1 10949 type = language_bool_type (exp->language_defn, exp->gdbarch);
4c4b4cd2 10950 return
fbb06eb1 10951 value_from_longest (type,
4c4b4cd2
PH
10952 (value_less (arg1, arg3)
10953 || value_equal (arg1, arg3))
10954 && (value_less (arg2, arg1)
10955 || value_equal (arg2, arg1)));
10956
10957 case OP_ATR_FIRST:
10958 case OP_ATR_LAST:
10959 case OP_ATR_LENGTH:
10960 {
76a01679 10961 struct type *type_arg;
5b4ee69b 10962
76a01679
JB
10963 if (exp->elts[*pos].opcode == OP_TYPE)
10964 {
10965 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
10966 arg1 = NULL;
5bc23cb3 10967 type_arg = check_typedef (exp->elts[pc + 2].type);
76a01679
JB
10968 }
10969 else
10970 {
10971 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10972 type_arg = NULL;
10973 }
10974
10975 if (exp->elts[*pos].opcode != OP_LONG)
323e0a4a 10976 error (_("Invalid operand to '%s"), ada_attribute_name (op));
76a01679
JB
10977 tem = longest_to_int (exp->elts[*pos + 2].longconst);
10978 *pos += 4;
10979
10980 if (noside == EVAL_SKIP)
10981 goto nosideret;
680e1bee
TT
10982 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
10983 {
10984 if (type_arg == NULL)
10985 type_arg = value_type (arg1);
76a01679 10986
680e1bee
TT
10987 if (ada_is_constrained_packed_array_type (type_arg))
10988 type_arg = decode_constrained_packed_array_type (type_arg);
10989
10990 if (!discrete_type_p (type_arg))
10991 {
10992 switch (op)
10993 {
10994 default: /* Should never happen. */
10995 error (_("unexpected attribute encountered"));
10996 case OP_ATR_FIRST:
10997 case OP_ATR_LAST:
10998 type_arg = ada_index_type (type_arg, tem,
10999 ada_attribute_name (op));
11000 break;
11001 case OP_ATR_LENGTH:
11002 type_arg = builtin_type (exp->gdbarch)->builtin_int;
11003 break;
11004 }
11005 }
11006
11007 return value_zero (type_arg, not_lval);
11008 }
11009 else if (type_arg == NULL)
76a01679
JB
11010 {
11011 arg1 = ada_coerce_ref (arg1);
11012
ad82864c 11013 if (ada_is_constrained_packed_array_type (value_type (arg1)))
76a01679
JB
11014 arg1 = ada_coerce_to_simple_array (arg1);
11015
aa4fb036 11016 if (op == OP_ATR_LENGTH)
1eea4ebd 11017 type = builtin_type (exp->gdbarch)->builtin_int;
aa4fb036
JB
11018 else
11019 {
11020 type = ada_index_type (value_type (arg1), tem,
11021 ada_attribute_name (op));
11022 if (type == NULL)
11023 type = builtin_type (exp->gdbarch)->builtin_int;
11024 }
76a01679 11025
76a01679
JB
11026 switch (op)
11027 {
11028 default: /* Should never happen. */
323e0a4a 11029 error (_("unexpected attribute encountered"));
76a01679 11030 case OP_ATR_FIRST:
1eea4ebd
UW
11031 return value_from_longest
11032 (type, ada_array_bound (arg1, tem, 0));
76a01679 11033 case OP_ATR_LAST:
1eea4ebd
UW
11034 return value_from_longest
11035 (type, ada_array_bound (arg1, tem, 1));
76a01679 11036 case OP_ATR_LENGTH:
1eea4ebd
UW
11037 return value_from_longest
11038 (type, ada_array_length (arg1, tem));
76a01679
JB
11039 }
11040 }
11041 else if (discrete_type_p (type_arg))
11042 {
11043 struct type *range_type;
0d5cff50 11044 const char *name = ada_type_name (type_arg);
5b4ee69b 11045
76a01679
JB
11046 range_type = NULL;
11047 if (name != NULL && TYPE_CODE (type_arg) != TYPE_CODE_ENUM)
28c85d6c 11048 range_type = to_fixed_range_type (type_arg, NULL);
76a01679
JB
11049 if (range_type == NULL)
11050 range_type = type_arg;
11051 switch (op)
11052 {
11053 default:
323e0a4a 11054 error (_("unexpected attribute encountered"));
76a01679 11055 case OP_ATR_FIRST:
690cc4eb 11056 return value_from_longest
43bbcdc2 11057 (range_type, ada_discrete_type_low_bound (range_type));
76a01679 11058 case OP_ATR_LAST:
690cc4eb 11059 return value_from_longest
43bbcdc2 11060 (range_type, ada_discrete_type_high_bound (range_type));
76a01679 11061 case OP_ATR_LENGTH:
323e0a4a 11062 error (_("the 'length attribute applies only to array types"));
76a01679
JB
11063 }
11064 }
11065 else if (TYPE_CODE (type_arg) == TYPE_CODE_FLT)
323e0a4a 11066 error (_("unimplemented type attribute"));
76a01679
JB
11067 else
11068 {
11069 LONGEST low, high;
11070
ad82864c
JB
11071 if (ada_is_constrained_packed_array_type (type_arg))
11072 type_arg = decode_constrained_packed_array_type (type_arg);
76a01679 11073
aa4fb036 11074 if (op == OP_ATR_LENGTH)
1eea4ebd 11075 type = builtin_type (exp->gdbarch)->builtin_int;
aa4fb036
JB
11076 else
11077 {
11078 type = ada_index_type (type_arg, tem, ada_attribute_name (op));
11079 if (type == NULL)
11080 type = builtin_type (exp->gdbarch)->builtin_int;
11081 }
1eea4ebd 11082
76a01679
JB
11083 switch (op)
11084 {
11085 default:
323e0a4a 11086 error (_("unexpected attribute encountered"));
76a01679 11087 case OP_ATR_FIRST:
1eea4ebd 11088 low = ada_array_bound_from_type (type_arg, tem, 0);
76a01679
JB
11089 return value_from_longest (type, low);
11090 case OP_ATR_LAST:
1eea4ebd 11091 high = ada_array_bound_from_type (type_arg, tem, 1);
76a01679
JB
11092 return value_from_longest (type, high);
11093 case OP_ATR_LENGTH:
1eea4ebd
UW
11094 low = ada_array_bound_from_type (type_arg, tem, 0);
11095 high = ada_array_bound_from_type (type_arg, tem, 1);
76a01679
JB
11096 return value_from_longest (type, high - low + 1);
11097 }
11098 }
14f9c5c9
AS
11099 }
11100
4c4b4cd2
PH
11101 case OP_ATR_TAG:
11102 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11103 if (noside == EVAL_SKIP)
76a01679 11104 goto nosideret;
4c4b4cd2
PH
11105
11106 if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 11107 return value_zero (ada_tag_type (arg1), not_lval);
4c4b4cd2
PH
11108
11109 return ada_value_tag (arg1);
11110
11111 case OP_ATR_MIN:
11112 case OP_ATR_MAX:
11113 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
14f9c5c9
AS
11114 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11115 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11116 if (noside == EVAL_SKIP)
76a01679 11117 goto nosideret;
d2e4a39e 11118 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
df407dfe 11119 return value_zero (value_type (arg1), not_lval);
14f9c5c9 11120 else
f44316fa
UW
11121 {
11122 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
11123 return value_binop (arg1, arg2,
11124 op == OP_ATR_MIN ? BINOP_MIN : BINOP_MAX);
11125 }
14f9c5c9 11126
4c4b4cd2
PH
11127 case OP_ATR_MODULUS:
11128 {
31dedfee 11129 struct type *type_arg = check_typedef (exp->elts[pc + 2].type);
4c4b4cd2 11130
5b4ee69b 11131 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
76a01679
JB
11132 if (noside == EVAL_SKIP)
11133 goto nosideret;
4c4b4cd2 11134
76a01679 11135 if (!ada_is_modular_type (type_arg))
323e0a4a 11136 error (_("'modulus must be applied to modular type"));
4c4b4cd2 11137
76a01679
JB
11138 return value_from_longest (TYPE_TARGET_TYPE (type_arg),
11139 ada_modulus (type_arg));
4c4b4cd2
PH
11140 }
11141
11142
11143 case OP_ATR_POS:
11144 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
14f9c5c9
AS
11145 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11146 if (noside == EVAL_SKIP)
76a01679 11147 goto nosideret;
3cb382c9
UW
11148 type = builtin_type (exp->gdbarch)->builtin_int;
11149 if (noside == EVAL_AVOID_SIDE_EFFECTS)
11150 return value_zero (type, not_lval);
14f9c5c9 11151 else
3cb382c9 11152 return value_pos_atr (type, arg1);
14f9c5c9 11153
4c4b4cd2
PH
11154 case OP_ATR_SIZE:
11155 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
8c1c099f
JB
11156 type = value_type (arg1);
11157
11158 /* If the argument is a reference, then dereference its type, since
11159 the user is really asking for the size of the actual object,
11160 not the size of the pointer. */
11161 if (TYPE_CODE (type) == TYPE_CODE_REF)
11162 type = TYPE_TARGET_TYPE (type);
11163
4c4b4cd2 11164 if (noside == EVAL_SKIP)
76a01679 11165 goto nosideret;
4c4b4cd2 11166 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
22601c15 11167 return value_zero (builtin_type (exp->gdbarch)->builtin_int, not_lval);
4c4b4cd2 11168 else
22601c15 11169 return value_from_longest (builtin_type (exp->gdbarch)->builtin_int,
8c1c099f 11170 TARGET_CHAR_BIT * TYPE_LENGTH (type));
4c4b4cd2
PH
11171
11172 case OP_ATR_VAL:
11173 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
14f9c5c9 11174 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
4c4b4cd2 11175 type = exp->elts[pc + 2].type;
14f9c5c9 11176 if (noside == EVAL_SKIP)
76a01679 11177 goto nosideret;
4c4b4cd2 11178 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 11179 return value_zero (type, not_lval);
4c4b4cd2 11180 else
76a01679 11181 return value_val_atr (type, arg1);
4c4b4cd2
PH
11182
11183 case BINOP_EXP:
11184 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11185 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11186 if (noside == EVAL_SKIP)
11187 goto nosideret;
11188 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
df407dfe 11189 return value_zero (value_type (arg1), not_lval);
4c4b4cd2 11190 else
f44316fa
UW
11191 {
11192 /* For integer exponentiation operations,
11193 only promote the first argument. */
11194 if (is_integral_type (value_type (arg2)))
11195 unop_promote (exp->language_defn, exp->gdbarch, &arg1);
11196 else
11197 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
11198
11199 return value_binop (arg1, arg2, op);
11200 }
4c4b4cd2
PH
11201
11202 case UNOP_PLUS:
11203 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11204 if (noside == EVAL_SKIP)
11205 goto nosideret;
11206 else
11207 return arg1;
11208
11209 case UNOP_ABS:
11210 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11211 if (noside == EVAL_SKIP)
11212 goto nosideret;
f44316fa 11213 unop_promote (exp->language_defn, exp->gdbarch, &arg1);
df407dfe 11214 if (value_less (arg1, value_zero (value_type (arg1), not_lval)))
4c4b4cd2 11215 return value_neg (arg1);
14f9c5c9 11216 else
4c4b4cd2 11217 return arg1;
14f9c5c9
AS
11218
11219 case UNOP_IND:
5ec18f2b 11220 preeval_pos = *pos;
6b0d7253 11221 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
14f9c5c9 11222 if (noside == EVAL_SKIP)
4c4b4cd2 11223 goto nosideret;
df407dfe 11224 type = ada_check_typedef (value_type (arg1));
14f9c5c9 11225 if (noside == EVAL_AVOID_SIDE_EFFECTS)
4c4b4cd2
PH
11226 {
11227 if (ada_is_array_descriptor_type (type))
11228 /* GDB allows dereferencing GNAT array descriptors. */
11229 {
11230 struct type *arrType = ada_type_of_array (arg1, 0);
5b4ee69b 11231
4c4b4cd2 11232 if (arrType == NULL)
323e0a4a 11233 error (_("Attempt to dereference null array pointer."));
00a4c844 11234 return value_at_lazy (arrType, 0);
4c4b4cd2
PH
11235 }
11236 else if (TYPE_CODE (type) == TYPE_CODE_PTR
11237 || TYPE_CODE (type) == TYPE_CODE_REF
11238 /* In C you can dereference an array to get the 1st elt. */
11239 || TYPE_CODE (type) == TYPE_CODE_ARRAY)
714e53ab 11240 {
5ec18f2b
JG
11241 /* As mentioned in the OP_VAR_VALUE case, tagged types can
11242 only be determined by inspecting the object's tag.
11243 This means that we need to evaluate completely the
11244 expression in order to get its type. */
11245
023db19c
JB
11246 if ((TYPE_CODE (type) == TYPE_CODE_REF
11247 || TYPE_CODE (type) == TYPE_CODE_PTR)
5ec18f2b
JG
11248 && ada_is_tagged_type (TYPE_TARGET_TYPE (type), 0))
11249 {
11250 arg1 = evaluate_subexp (NULL_TYPE, exp, &preeval_pos,
11251 EVAL_NORMAL);
11252 type = value_type (ada_value_ind (arg1));
11253 }
11254 else
11255 {
11256 type = to_static_fixed_type
11257 (ada_aligned_type
11258 (ada_check_typedef (TYPE_TARGET_TYPE (type))));
11259 }
c1b5a1a6 11260 ada_ensure_varsize_limit (type);
714e53ab
PH
11261 return value_zero (type, lval_memory);
11262 }
4c4b4cd2 11263 else if (TYPE_CODE (type) == TYPE_CODE_INT)
6b0d7253
JB
11264 {
11265 /* GDB allows dereferencing an int. */
11266 if (expect_type == NULL)
11267 return value_zero (builtin_type (exp->gdbarch)->builtin_int,
11268 lval_memory);
11269 else
11270 {
11271 expect_type =
11272 to_static_fixed_type (ada_aligned_type (expect_type));
11273 return value_zero (expect_type, lval_memory);
11274 }
11275 }
4c4b4cd2 11276 else
323e0a4a 11277 error (_("Attempt to take contents of a non-pointer value."));
4c4b4cd2 11278 }
0963b4bd 11279 arg1 = ada_coerce_ref (arg1); /* FIXME: What is this for?? */
df407dfe 11280 type = ada_check_typedef (value_type (arg1));
d2e4a39e 11281
96967637
JB
11282 if (TYPE_CODE (type) == TYPE_CODE_INT)
11283 /* GDB allows dereferencing an int. If we were given
11284 the expect_type, then use that as the target type.
11285 Otherwise, assume that the target type is an int. */
11286 {
11287 if (expect_type != NULL)
11288 return ada_value_ind (value_cast (lookup_pointer_type (expect_type),
11289 arg1));
11290 else
11291 return value_at_lazy (builtin_type (exp->gdbarch)->builtin_int,
11292 (CORE_ADDR) value_as_address (arg1));
11293 }
6b0d7253 11294
4c4b4cd2
PH
11295 if (ada_is_array_descriptor_type (type))
11296 /* GDB allows dereferencing GNAT array descriptors. */
11297 return ada_coerce_to_simple_array (arg1);
14f9c5c9 11298 else
4c4b4cd2 11299 return ada_value_ind (arg1);
14f9c5c9
AS
11300
11301 case STRUCTOP_STRUCT:
11302 tem = longest_to_int (exp->elts[pc + 1].longconst);
11303 (*pos) += 3 + BYTES_TO_EXP_ELEM (tem + 1);
5ec18f2b 11304 preeval_pos = *pos;
14f9c5c9
AS
11305 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11306 if (noside == EVAL_SKIP)
4c4b4cd2 11307 goto nosideret;
14f9c5c9 11308 if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 11309 {
df407dfe 11310 struct type *type1 = value_type (arg1);
5b4ee69b 11311
76a01679
JB
11312 if (ada_is_tagged_type (type1, 1))
11313 {
11314 type = ada_lookup_struct_elt_type (type1,
11315 &exp->elts[pc + 2].string,
988f6b3d 11316 1, 1);
5ec18f2b
JG
11317
11318 /* If the field is not found, check if it exists in the
11319 extension of this object's type. This means that we
11320 need to evaluate completely the expression. */
11321
76a01679 11322 if (type == NULL)
5ec18f2b
JG
11323 {
11324 arg1 = evaluate_subexp (NULL_TYPE, exp, &preeval_pos,
11325 EVAL_NORMAL);
11326 arg1 = ada_value_struct_elt (arg1,
11327 &exp->elts[pc + 2].string,
11328 0);
11329 arg1 = unwrap_value (arg1);
11330 type = value_type (ada_to_fixed_value (arg1));
11331 }
76a01679
JB
11332 }
11333 else
11334 type =
11335 ada_lookup_struct_elt_type (type1, &exp->elts[pc + 2].string, 1,
988f6b3d 11336 0);
76a01679
JB
11337
11338 return value_zero (ada_aligned_type (type), lval_memory);
11339 }
14f9c5c9 11340 else
a579cd9a
MW
11341 {
11342 arg1 = ada_value_struct_elt (arg1, &exp->elts[pc + 2].string, 0);
11343 arg1 = unwrap_value (arg1);
11344 return ada_to_fixed_value (arg1);
11345 }
284614f0 11346
14f9c5c9 11347 case OP_TYPE:
4c4b4cd2
PH
11348 /* The value is not supposed to be used. This is here to make it
11349 easier to accommodate expressions that contain types. */
14f9c5c9
AS
11350 (*pos) += 2;
11351 if (noside == EVAL_SKIP)
4c4b4cd2 11352 goto nosideret;
14f9c5c9 11353 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
a6cfbe68 11354 return allocate_value (exp->elts[pc + 1].type);
14f9c5c9 11355 else
323e0a4a 11356 error (_("Attempt to use a type name as an expression"));
52ce6436
PH
11357
11358 case OP_AGGREGATE:
11359 case OP_CHOICES:
11360 case OP_OTHERS:
11361 case OP_DISCRETE_RANGE:
11362 case OP_POSITIONAL:
11363 case OP_NAME:
11364 if (noside == EVAL_NORMAL)
11365 switch (op)
11366 {
11367 case OP_NAME:
11368 error (_("Undefined name, ambiguous name, or renaming used in "
e1d5a0d2 11369 "component association: %s."), &exp->elts[pc+2].string);
52ce6436
PH
11370 case OP_AGGREGATE:
11371 error (_("Aggregates only allowed on the right of an assignment"));
11372 default:
0963b4bd
MS
11373 internal_error (__FILE__, __LINE__,
11374 _("aggregate apparently mangled"));
52ce6436
PH
11375 }
11376
11377 ada_forward_operator_length (exp, pc, &oplen, &nargs);
11378 *pos += oplen - 1;
11379 for (tem = 0; tem < nargs; tem += 1)
11380 ada_evaluate_subexp (NULL, exp, pos, noside);
11381 goto nosideret;
14f9c5c9
AS
11382 }
11383
11384nosideret:
ced9779b 11385 return eval_skip_value (exp);
14f9c5c9 11386}
14f9c5c9 11387\f
d2e4a39e 11388
4c4b4cd2 11389 /* Fixed point */
14f9c5c9
AS
11390
11391/* If TYPE encodes an Ada fixed-point type, return the suffix of the
11392 type name that encodes the 'small and 'delta information.
4c4b4cd2 11393 Otherwise, return NULL. */
14f9c5c9 11394
d2e4a39e 11395static const char *
ebf56fd3 11396fixed_type_info (struct type *type)
14f9c5c9 11397{
d2e4a39e 11398 const char *name = ada_type_name (type);
14f9c5c9
AS
11399 enum type_code code = (type == NULL) ? TYPE_CODE_UNDEF : TYPE_CODE (type);
11400
d2e4a39e
AS
11401 if ((code == TYPE_CODE_INT || code == TYPE_CODE_RANGE) && name != NULL)
11402 {
14f9c5c9 11403 const char *tail = strstr (name, "___XF_");
5b4ee69b 11404
14f9c5c9 11405 if (tail == NULL)
4c4b4cd2 11406 return NULL;
d2e4a39e 11407 else
4c4b4cd2 11408 return tail + 5;
14f9c5c9
AS
11409 }
11410 else if (code == TYPE_CODE_RANGE && TYPE_TARGET_TYPE (type) != type)
11411 return fixed_type_info (TYPE_TARGET_TYPE (type));
11412 else
11413 return NULL;
11414}
11415
4c4b4cd2 11416/* Returns non-zero iff TYPE represents an Ada fixed-point type. */
14f9c5c9
AS
11417
11418int
ebf56fd3 11419ada_is_fixed_point_type (struct type *type)
14f9c5c9
AS
11420{
11421 return fixed_type_info (type) != NULL;
11422}
11423
4c4b4cd2
PH
11424/* Return non-zero iff TYPE represents a System.Address type. */
11425
11426int
11427ada_is_system_address_type (struct type *type)
11428{
11429 return (TYPE_NAME (type)
11430 && strcmp (TYPE_NAME (type), "system__address") == 0);
11431}
11432
14f9c5c9 11433/* Assuming that TYPE is the representation of an Ada fixed-point
50eff16b
UW
11434 type, return the target floating-point type to be used to represent
11435 of this type during internal computation. */
11436
11437static struct type *
11438ada_scaling_type (struct type *type)
11439{
11440 return builtin_type (get_type_arch (type))->builtin_long_double;
11441}
11442
11443/* Assuming that TYPE is the representation of an Ada fixed-point
11444 type, return its delta, or NULL if the type is malformed and the
4c4b4cd2 11445 delta cannot be determined. */
14f9c5c9 11446
50eff16b 11447struct value *
ebf56fd3 11448ada_delta (struct type *type)
14f9c5c9
AS
11449{
11450 const char *encoding = fixed_type_info (type);
50eff16b
UW
11451 struct type *scale_type = ada_scaling_type (type);
11452
11453 long long num, den;
11454
11455 if (sscanf (encoding, "_%lld_%lld", &num, &den) < 2)
11456 return nullptr;
d2e4a39e 11457 else
50eff16b
UW
11458 return value_binop (value_from_longest (scale_type, num),
11459 value_from_longest (scale_type, den), BINOP_DIV);
14f9c5c9
AS
11460}
11461
11462/* Assuming that ada_is_fixed_point_type (TYPE), return the scaling
4c4b4cd2 11463 factor ('SMALL value) associated with the type. */
14f9c5c9 11464
50eff16b
UW
11465struct value *
11466ada_scaling_factor (struct type *type)
14f9c5c9
AS
11467{
11468 const char *encoding = fixed_type_info (type);
50eff16b
UW
11469 struct type *scale_type = ada_scaling_type (type);
11470
11471 long long num0, den0, num1, den1;
14f9c5c9 11472 int n;
d2e4a39e 11473
50eff16b 11474 n = sscanf (encoding, "_%lld_%lld_%lld_%lld",
facc390f 11475 &num0, &den0, &num1, &den1);
14f9c5c9
AS
11476
11477 if (n < 2)
50eff16b 11478 return value_from_longest (scale_type, 1);
14f9c5c9 11479 else if (n == 4)
50eff16b
UW
11480 return value_binop (value_from_longest (scale_type, num1),
11481 value_from_longest (scale_type, den1), BINOP_DIV);
d2e4a39e 11482 else
50eff16b
UW
11483 return value_binop (value_from_longest (scale_type, num0),
11484 value_from_longest (scale_type, den0), BINOP_DIV);
14f9c5c9
AS
11485}
11486
14f9c5c9 11487\f
d2e4a39e 11488
4c4b4cd2 11489 /* Range types */
14f9c5c9
AS
11490
11491/* Scan STR beginning at position K for a discriminant name, and
11492 return the value of that discriminant field of DVAL in *PX. If
11493 PNEW_K is not null, put the position of the character beyond the
11494 name scanned in *PNEW_K. Return 1 if successful; return 0 and do
4c4b4cd2 11495 not alter *PX and *PNEW_K if unsuccessful. */
14f9c5c9
AS
11496
11497static int
108d56a4 11498scan_discrim_bound (const char *str, int k, struct value *dval, LONGEST * px,
76a01679 11499 int *pnew_k)
14f9c5c9
AS
11500{
11501 static char *bound_buffer = NULL;
11502 static size_t bound_buffer_len = 0;
5da1a4d3 11503 const char *pstart, *pend, *bound;
d2e4a39e 11504 struct value *bound_val;
14f9c5c9
AS
11505
11506 if (dval == NULL || str == NULL || str[k] == '\0')
11507 return 0;
11508
5da1a4d3
SM
11509 pstart = str + k;
11510 pend = strstr (pstart, "__");
14f9c5c9
AS
11511 if (pend == NULL)
11512 {
5da1a4d3 11513 bound = pstart;
14f9c5c9
AS
11514 k += strlen (bound);
11515 }
d2e4a39e 11516 else
14f9c5c9 11517 {
5da1a4d3
SM
11518 int len = pend - pstart;
11519
11520 /* Strip __ and beyond. */
11521 GROW_VECT (bound_buffer, bound_buffer_len, len + 1);
11522 strncpy (bound_buffer, pstart, len);
11523 bound_buffer[len] = '\0';
11524
14f9c5c9 11525 bound = bound_buffer;
d2e4a39e 11526 k = pend - str;
14f9c5c9 11527 }
d2e4a39e 11528
df407dfe 11529 bound_val = ada_search_struct_field (bound, dval, 0, value_type (dval));
14f9c5c9
AS
11530 if (bound_val == NULL)
11531 return 0;
11532
11533 *px = value_as_long (bound_val);
11534 if (pnew_k != NULL)
11535 *pnew_k = k;
11536 return 1;
11537}
11538
11539/* Value of variable named NAME in the current environment. If
11540 no such variable found, then if ERR_MSG is null, returns 0, and
4c4b4cd2
PH
11541 otherwise causes an error with message ERR_MSG. */
11542
d2e4a39e 11543static struct value *
edb0c9cb 11544get_var_value (const char *name, const char *err_msg)
14f9c5c9 11545{
b5ec771e 11546 lookup_name_info lookup_name (name, symbol_name_match_type::FULL);
14f9c5c9 11547
54d343a2 11548 std::vector<struct block_symbol> syms;
b5ec771e
PA
11549 int nsyms = ada_lookup_symbol_list_worker (lookup_name,
11550 get_selected_block (0),
11551 VAR_DOMAIN, &syms, 1);
14f9c5c9
AS
11552
11553 if (nsyms != 1)
11554 {
11555 if (err_msg == NULL)
4c4b4cd2 11556 return 0;
14f9c5c9 11557 else
8a3fe4f8 11558 error (("%s"), err_msg);
14f9c5c9
AS
11559 }
11560
54d343a2 11561 return value_of_variable (syms[0].symbol, syms[0].block);
14f9c5c9 11562}
d2e4a39e 11563
edb0c9cb
PA
11564/* Value of integer variable named NAME in the current environment.
11565 If no such variable is found, returns false. Otherwise, sets VALUE
11566 to the variable's value and returns true. */
4c4b4cd2 11567
edb0c9cb
PA
11568bool
11569get_int_var_value (const char *name, LONGEST &value)
14f9c5c9 11570{
4c4b4cd2 11571 struct value *var_val = get_var_value (name, 0);
d2e4a39e 11572
14f9c5c9 11573 if (var_val == 0)
edb0c9cb
PA
11574 return false;
11575
11576 value = value_as_long (var_val);
11577 return true;
14f9c5c9 11578}
d2e4a39e 11579
14f9c5c9
AS
11580
11581/* Return a range type whose base type is that of the range type named
11582 NAME in the current environment, and whose bounds are calculated
4c4b4cd2 11583 from NAME according to the GNAT range encoding conventions.
1ce677a4
UW
11584 Extract discriminant values, if needed, from DVAL. ORIG_TYPE is the
11585 corresponding range type from debug information; fall back to using it
11586 if symbol lookup fails. If a new type must be created, allocate it
11587 like ORIG_TYPE was. The bounds information, in general, is encoded
11588 in NAME, the base type given in the named range type. */
14f9c5c9 11589
d2e4a39e 11590static struct type *
28c85d6c 11591to_fixed_range_type (struct type *raw_type, struct value *dval)
14f9c5c9 11592{
0d5cff50 11593 const char *name;
14f9c5c9 11594 struct type *base_type;
108d56a4 11595 const char *subtype_info;
14f9c5c9 11596
28c85d6c
JB
11597 gdb_assert (raw_type != NULL);
11598 gdb_assert (TYPE_NAME (raw_type) != NULL);
dddfab26 11599
1ce677a4 11600 if (TYPE_CODE (raw_type) == TYPE_CODE_RANGE)
14f9c5c9
AS
11601 base_type = TYPE_TARGET_TYPE (raw_type);
11602 else
11603 base_type = raw_type;
11604
28c85d6c 11605 name = TYPE_NAME (raw_type);
14f9c5c9
AS
11606 subtype_info = strstr (name, "___XD");
11607 if (subtype_info == NULL)
690cc4eb 11608 {
43bbcdc2
PH
11609 LONGEST L = ada_discrete_type_low_bound (raw_type);
11610 LONGEST U = ada_discrete_type_high_bound (raw_type);
5b4ee69b 11611
690cc4eb
PH
11612 if (L < INT_MIN || U > INT_MAX)
11613 return raw_type;
11614 else
0c9c3474
SA
11615 return create_static_range_type (alloc_type_copy (raw_type), raw_type,
11616 L, U);
690cc4eb 11617 }
14f9c5c9
AS
11618 else
11619 {
11620 static char *name_buf = NULL;
11621 static size_t name_len = 0;
11622 int prefix_len = subtype_info - name;
11623 LONGEST L, U;
11624 struct type *type;
108d56a4 11625 const char *bounds_str;
14f9c5c9
AS
11626 int n;
11627
11628 GROW_VECT (name_buf, name_len, prefix_len + 5);
11629 strncpy (name_buf, name, prefix_len);
11630 name_buf[prefix_len] = '\0';
11631
11632 subtype_info += 5;
11633 bounds_str = strchr (subtype_info, '_');
11634 n = 1;
11635
d2e4a39e 11636 if (*subtype_info == 'L')
4c4b4cd2
PH
11637 {
11638 if (!ada_scan_number (bounds_str, n, &L, &n)
11639 && !scan_discrim_bound (bounds_str, n, dval, &L, &n))
11640 return raw_type;
11641 if (bounds_str[n] == '_')
11642 n += 2;
0963b4bd 11643 else if (bounds_str[n] == '.') /* FIXME? SGI Workshop kludge. */
4c4b4cd2
PH
11644 n += 1;
11645 subtype_info += 1;
11646 }
d2e4a39e 11647 else
4c4b4cd2 11648 {
4c4b4cd2 11649 strcpy (name_buf + prefix_len, "___L");
edb0c9cb 11650 if (!get_int_var_value (name_buf, L))
4c4b4cd2 11651 {
323e0a4a 11652 lim_warning (_("Unknown lower bound, using 1."));
4c4b4cd2
PH
11653 L = 1;
11654 }
11655 }
14f9c5c9 11656
d2e4a39e 11657 if (*subtype_info == 'U')
4c4b4cd2
PH
11658 {
11659 if (!ada_scan_number (bounds_str, n, &U, &n)
11660 && !scan_discrim_bound (bounds_str, n, dval, &U, &n))
11661 return raw_type;
11662 }
d2e4a39e 11663 else
4c4b4cd2 11664 {
4c4b4cd2 11665 strcpy (name_buf + prefix_len, "___U");
edb0c9cb 11666 if (!get_int_var_value (name_buf, U))
4c4b4cd2 11667 {
323e0a4a 11668 lim_warning (_("Unknown upper bound, using %ld."), (long) L);
4c4b4cd2
PH
11669 U = L;
11670 }
11671 }
14f9c5c9 11672
0c9c3474
SA
11673 type = create_static_range_type (alloc_type_copy (raw_type),
11674 base_type, L, U);
f5a91472
JB
11675 /* create_static_range_type alters the resulting type's length
11676 to match the size of the base_type, which is not what we want.
11677 Set it back to the original range type's length. */
11678 TYPE_LENGTH (type) = TYPE_LENGTH (raw_type);
d2e4a39e 11679 TYPE_NAME (type) = name;
14f9c5c9
AS
11680 return type;
11681 }
11682}
11683
4c4b4cd2
PH
11684/* True iff NAME is the name of a range type. */
11685
14f9c5c9 11686int
d2e4a39e 11687ada_is_range_type_name (const char *name)
14f9c5c9
AS
11688{
11689 return (name != NULL && strstr (name, "___XD"));
d2e4a39e 11690}
14f9c5c9 11691\f
d2e4a39e 11692
4c4b4cd2
PH
11693 /* Modular types */
11694
11695/* True iff TYPE is an Ada modular type. */
14f9c5c9 11696
14f9c5c9 11697int
d2e4a39e 11698ada_is_modular_type (struct type *type)
14f9c5c9 11699{
18af8284 11700 struct type *subranged_type = get_base_type (type);
14f9c5c9
AS
11701
11702 return (subranged_type != NULL && TYPE_CODE (type) == TYPE_CODE_RANGE
690cc4eb 11703 && TYPE_CODE (subranged_type) == TYPE_CODE_INT
4c4b4cd2 11704 && TYPE_UNSIGNED (subranged_type));
14f9c5c9
AS
11705}
11706
4c4b4cd2
PH
11707/* Assuming ada_is_modular_type (TYPE), the modulus of TYPE. */
11708
61ee279c 11709ULONGEST
0056e4d5 11710ada_modulus (struct type *type)
14f9c5c9 11711{
43bbcdc2 11712 return (ULONGEST) TYPE_HIGH_BOUND (type) + 1;
14f9c5c9 11713}
d2e4a39e 11714\f
f7f9143b
JB
11715
11716/* Ada exception catchpoint support:
11717 ---------------------------------
11718
11719 We support 3 kinds of exception catchpoints:
11720 . catchpoints on Ada exceptions
11721 . catchpoints on unhandled Ada exceptions
11722 . catchpoints on failed assertions
11723
11724 Exceptions raised during failed assertions, or unhandled exceptions
11725 could perfectly be caught with the general catchpoint on Ada exceptions.
11726 However, we can easily differentiate these two special cases, and having
11727 the option to distinguish these two cases from the rest can be useful
11728 to zero-in on certain situations.
11729
11730 Exception catchpoints are a specialized form of breakpoint,
11731 since they rely on inserting breakpoints inside known routines
11732 of the GNAT runtime. The implementation therefore uses a standard
11733 breakpoint structure of the BP_BREAKPOINT type, but with its own set
11734 of breakpoint_ops.
11735
0259addd
JB
11736 Support in the runtime for exception catchpoints have been changed
11737 a few times already, and these changes affect the implementation
11738 of these catchpoints. In order to be able to support several
11739 variants of the runtime, we use a sniffer that will determine
28010a5d 11740 the runtime variant used by the program being debugged. */
f7f9143b 11741
82eacd52
JB
11742/* Ada's standard exceptions.
11743
11744 The Ada 83 standard also defined Numeric_Error. But there so many
11745 situations where it was unclear from the Ada 83 Reference Manual
11746 (RM) whether Constraint_Error or Numeric_Error should be raised,
11747 that the ARG (Ada Rapporteur Group) eventually issued a Binding
11748 Interpretation saying that anytime the RM says that Numeric_Error
11749 should be raised, the implementation may raise Constraint_Error.
11750 Ada 95 went one step further and pretty much removed Numeric_Error
11751 from the list of standard exceptions (it made it a renaming of
11752 Constraint_Error, to help preserve compatibility when compiling
11753 an Ada83 compiler). As such, we do not include Numeric_Error from
11754 this list of standard exceptions. */
3d0b0fa3 11755
a121b7c1 11756static const char *standard_exc[] = {
3d0b0fa3
JB
11757 "constraint_error",
11758 "program_error",
11759 "storage_error",
11760 "tasking_error"
11761};
11762
0259addd
JB
11763typedef CORE_ADDR (ada_unhandled_exception_name_addr_ftype) (void);
11764
11765/* A structure that describes how to support exception catchpoints
11766 for a given executable. */
11767
11768struct exception_support_info
11769{
11770 /* The name of the symbol to break on in order to insert
11771 a catchpoint on exceptions. */
11772 const char *catch_exception_sym;
11773
11774 /* The name of the symbol to break on in order to insert
11775 a catchpoint on unhandled exceptions. */
11776 const char *catch_exception_unhandled_sym;
11777
11778 /* The name of the symbol to break on in order to insert
11779 a catchpoint on failed assertions. */
11780 const char *catch_assert_sym;
11781
9f757bf7
XR
11782 /* The name of the symbol to break on in order to insert
11783 a catchpoint on exception handling. */
11784 const char *catch_handlers_sym;
11785
0259addd
JB
11786 /* Assuming that the inferior just triggered an unhandled exception
11787 catchpoint, this function is responsible for returning the address
11788 in inferior memory where the name of that exception is stored.
11789 Return zero if the address could not be computed. */
11790 ada_unhandled_exception_name_addr_ftype *unhandled_exception_name_addr;
11791};
11792
11793static CORE_ADDR ada_unhandled_exception_name_addr (void);
11794static CORE_ADDR ada_unhandled_exception_name_addr_from_raise (void);
11795
11796/* The following exception support info structure describes how to
11797 implement exception catchpoints with the latest version of the
ca683e3a 11798 Ada runtime (as of 2019-08-??). */
0259addd
JB
11799
11800static const struct exception_support_info default_exception_support_info =
ca683e3a
AO
11801{
11802 "__gnat_debug_raise_exception", /* catch_exception_sym */
11803 "__gnat_unhandled_exception", /* catch_exception_unhandled_sym */
11804 "__gnat_debug_raise_assert_failure", /* catch_assert_sym */
11805 "__gnat_begin_handler_v1", /* catch_handlers_sym */
11806 ada_unhandled_exception_name_addr
11807};
11808
11809/* The following exception support info structure describes how to
11810 implement exception catchpoints with an earlier version of the
11811 Ada runtime (as of 2007-03-06) using v0 of the EH ABI. */
11812
11813static const struct exception_support_info exception_support_info_v0 =
0259addd
JB
11814{
11815 "__gnat_debug_raise_exception", /* catch_exception_sym */
11816 "__gnat_unhandled_exception", /* catch_exception_unhandled_sym */
11817 "__gnat_debug_raise_assert_failure", /* catch_assert_sym */
9f757bf7 11818 "__gnat_begin_handler", /* catch_handlers_sym */
0259addd
JB
11819 ada_unhandled_exception_name_addr
11820};
11821
11822/* The following exception support info structure describes how to
11823 implement exception catchpoints with a slightly older version
11824 of the Ada runtime. */
11825
11826static const struct exception_support_info exception_support_info_fallback =
11827{
11828 "__gnat_raise_nodefer_with_msg", /* catch_exception_sym */
11829 "__gnat_unhandled_exception", /* catch_exception_unhandled_sym */
11830 "system__assertions__raise_assert_failure", /* catch_assert_sym */
9f757bf7 11831 "__gnat_begin_handler", /* catch_handlers_sym */
0259addd
JB
11832 ada_unhandled_exception_name_addr_from_raise
11833};
11834
f17011e0
JB
11835/* Return nonzero if we can detect the exception support routines
11836 described in EINFO.
11837
11838 This function errors out if an abnormal situation is detected
11839 (for instance, if we find the exception support routines, but
11840 that support is found to be incomplete). */
11841
11842static int
11843ada_has_this_exception_support (const struct exception_support_info *einfo)
11844{
11845 struct symbol *sym;
11846
11847 /* The symbol we're looking up is provided by a unit in the GNAT runtime
11848 that should be compiled with debugging information. As a result, we
11849 expect to find that symbol in the symtabs. */
11850
11851 sym = standard_lookup (einfo->catch_exception_sym, NULL, VAR_DOMAIN);
11852 if (sym == NULL)
a6af7abe
JB
11853 {
11854 /* Perhaps we did not find our symbol because the Ada runtime was
11855 compiled without debugging info, or simply stripped of it.
11856 It happens on some GNU/Linux distributions for instance, where
11857 users have to install a separate debug package in order to get
11858 the runtime's debugging info. In that situation, let the user
11859 know why we cannot insert an Ada exception catchpoint.
11860
11861 Note: Just for the purpose of inserting our Ada exception
11862 catchpoint, we could rely purely on the associated minimal symbol.
11863 But we would be operating in degraded mode anyway, since we are
11864 still lacking the debugging info needed later on to extract
11865 the name of the exception being raised (this name is printed in
11866 the catchpoint message, and is also used when trying to catch
11867 a specific exception). We do not handle this case for now. */
3b7344d5 11868 struct bound_minimal_symbol msym
1c8e84b0
JB
11869 = lookup_minimal_symbol (einfo->catch_exception_sym, NULL, NULL);
11870
3b7344d5 11871 if (msym.minsym && MSYMBOL_TYPE (msym.minsym) != mst_solib_trampoline)
a6af7abe
JB
11872 error (_("Your Ada runtime appears to be missing some debugging "
11873 "information.\nCannot insert Ada exception catchpoint "
11874 "in this configuration."));
11875
11876 return 0;
11877 }
f17011e0
JB
11878
11879 /* Make sure that the symbol we found corresponds to a function. */
11880
11881 if (SYMBOL_CLASS (sym) != LOC_BLOCK)
ca683e3a
AO
11882 {
11883 error (_("Symbol \"%s\" is not a function (class = %d)"),
987012b8 11884 sym->linkage_name (), SYMBOL_CLASS (sym));
ca683e3a
AO
11885 return 0;
11886 }
11887
11888 sym = standard_lookup (einfo->catch_handlers_sym, NULL, VAR_DOMAIN);
11889 if (sym == NULL)
11890 {
11891 struct bound_minimal_symbol msym
11892 = lookup_minimal_symbol (einfo->catch_handlers_sym, NULL, NULL);
11893
11894 if (msym.minsym && MSYMBOL_TYPE (msym.minsym) != mst_solib_trampoline)
11895 error (_("Your Ada runtime appears to be missing some debugging "
11896 "information.\nCannot insert Ada exception catchpoint "
11897 "in this configuration."));
11898
11899 return 0;
11900 }
11901
11902 /* Make sure that the symbol we found corresponds to a function. */
11903
11904 if (SYMBOL_CLASS (sym) != LOC_BLOCK)
11905 {
11906 error (_("Symbol \"%s\" is not a function (class = %d)"),
987012b8 11907 sym->linkage_name (), SYMBOL_CLASS (sym));
ca683e3a
AO
11908 return 0;
11909 }
f17011e0
JB
11910
11911 return 1;
11912}
11913
0259addd
JB
11914/* Inspect the Ada runtime and determine which exception info structure
11915 should be used to provide support for exception catchpoints.
11916
3eecfa55
JB
11917 This function will always set the per-inferior exception_info,
11918 or raise an error. */
0259addd
JB
11919
11920static void
11921ada_exception_support_info_sniffer (void)
11922{
3eecfa55 11923 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
0259addd
JB
11924
11925 /* If the exception info is already known, then no need to recompute it. */
3eecfa55 11926 if (data->exception_info != NULL)
0259addd
JB
11927 return;
11928
11929 /* Check the latest (default) exception support info. */
f17011e0 11930 if (ada_has_this_exception_support (&default_exception_support_info))
0259addd 11931 {
3eecfa55 11932 data->exception_info = &default_exception_support_info;
0259addd
JB
11933 return;
11934 }
11935
ca683e3a
AO
11936 /* Try the v0 exception suport info. */
11937 if (ada_has_this_exception_support (&exception_support_info_v0))
11938 {
11939 data->exception_info = &exception_support_info_v0;
11940 return;
11941 }
11942
0259addd 11943 /* Try our fallback exception suport info. */
f17011e0 11944 if (ada_has_this_exception_support (&exception_support_info_fallback))
0259addd 11945 {
3eecfa55 11946 data->exception_info = &exception_support_info_fallback;
0259addd
JB
11947 return;
11948 }
11949
11950 /* Sometimes, it is normal for us to not be able to find the routine
11951 we are looking for. This happens when the program is linked with
11952 the shared version of the GNAT runtime, and the program has not been
11953 started yet. Inform the user of these two possible causes if
11954 applicable. */
11955
ccefe4c4 11956 if (ada_update_initial_language (language_unknown) != language_ada)
0259addd
JB
11957 error (_("Unable to insert catchpoint. Is this an Ada main program?"));
11958
11959 /* If the symbol does not exist, then check that the program is
11960 already started, to make sure that shared libraries have been
11961 loaded. If it is not started, this may mean that the symbol is
11962 in a shared library. */
11963
e99b03dc 11964 if (inferior_ptid.pid () == 0)
0259addd
JB
11965 error (_("Unable to insert catchpoint. Try to start the program first."));
11966
11967 /* At this point, we know that we are debugging an Ada program and
11968 that the inferior has been started, but we still are not able to
0963b4bd 11969 find the run-time symbols. That can mean that we are in
0259addd
JB
11970 configurable run time mode, or that a-except as been optimized
11971 out by the linker... In any case, at this point it is not worth
11972 supporting this feature. */
11973
7dda8cff 11974 error (_("Cannot insert Ada exception catchpoints in this configuration."));
0259addd
JB
11975}
11976
f7f9143b
JB
11977/* True iff FRAME is very likely to be that of a function that is
11978 part of the runtime system. This is all very heuristic, but is
11979 intended to be used as advice as to what frames are uninteresting
11980 to most users. */
11981
11982static int
11983is_known_support_routine (struct frame_info *frame)
11984{
692465f1 11985 enum language func_lang;
f7f9143b 11986 int i;
f35a17b5 11987 const char *fullname;
f7f9143b 11988
4ed6b5be
JB
11989 /* If this code does not have any debugging information (no symtab),
11990 This cannot be any user code. */
f7f9143b 11991
51abb421 11992 symtab_and_line sal = find_frame_sal (frame);
f7f9143b
JB
11993 if (sal.symtab == NULL)
11994 return 1;
11995
4ed6b5be
JB
11996 /* If there is a symtab, but the associated source file cannot be
11997 located, then assume this is not user code: Selecting a frame
11998 for which we cannot display the code would not be very helpful
11999 for the user. This should also take care of case such as VxWorks
12000 where the kernel has some debugging info provided for a few units. */
f7f9143b 12001
f35a17b5
JK
12002 fullname = symtab_to_fullname (sal.symtab);
12003 if (access (fullname, R_OK) != 0)
f7f9143b
JB
12004 return 1;
12005
85102364 12006 /* Check the unit filename against the Ada runtime file naming.
4ed6b5be
JB
12007 We also check the name of the objfile against the name of some
12008 known system libraries that sometimes come with debugging info
12009 too. */
12010
f7f9143b
JB
12011 for (i = 0; known_runtime_file_name_patterns[i] != NULL; i += 1)
12012 {
12013 re_comp (known_runtime_file_name_patterns[i]);
f69c91ad 12014 if (re_exec (lbasename (sal.symtab->filename)))
f7f9143b 12015 return 1;
eb822aa6
DE
12016 if (SYMTAB_OBJFILE (sal.symtab) != NULL
12017 && re_exec (objfile_name (SYMTAB_OBJFILE (sal.symtab))))
4ed6b5be 12018 return 1;
f7f9143b
JB
12019 }
12020
4ed6b5be 12021 /* Check whether the function is a GNAT-generated entity. */
f7f9143b 12022
c6dc63a1
TT
12023 gdb::unique_xmalloc_ptr<char> func_name
12024 = find_frame_funname (frame, &func_lang, NULL);
f7f9143b
JB
12025 if (func_name == NULL)
12026 return 1;
12027
12028 for (i = 0; known_auxiliary_function_name_patterns[i] != NULL; i += 1)
12029 {
12030 re_comp (known_auxiliary_function_name_patterns[i]);
c6dc63a1
TT
12031 if (re_exec (func_name.get ()))
12032 return 1;
f7f9143b
JB
12033 }
12034
12035 return 0;
12036}
12037
12038/* Find the first frame that contains debugging information and that is not
12039 part of the Ada run-time, starting from FI and moving upward. */
12040
0ef643c8 12041void
f7f9143b
JB
12042ada_find_printable_frame (struct frame_info *fi)
12043{
12044 for (; fi != NULL; fi = get_prev_frame (fi))
12045 {
12046 if (!is_known_support_routine (fi))
12047 {
12048 select_frame (fi);
12049 break;
12050 }
12051 }
12052
12053}
12054
12055/* Assuming that the inferior just triggered an unhandled exception
12056 catchpoint, return the address in inferior memory where the name
12057 of the exception is stored.
12058
12059 Return zero if the address could not be computed. */
12060
12061static CORE_ADDR
12062ada_unhandled_exception_name_addr (void)
0259addd
JB
12063{
12064 return parse_and_eval_address ("e.full_name");
12065}
12066
12067/* Same as ada_unhandled_exception_name_addr, except that this function
12068 should be used when the inferior uses an older version of the runtime,
12069 where the exception name needs to be extracted from a specific frame
12070 several frames up in the callstack. */
12071
12072static CORE_ADDR
12073ada_unhandled_exception_name_addr_from_raise (void)
f7f9143b
JB
12074{
12075 int frame_level;
12076 struct frame_info *fi;
3eecfa55 12077 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
f7f9143b
JB
12078
12079 /* To determine the name of this exception, we need to select
12080 the frame corresponding to RAISE_SYM_NAME. This frame is
12081 at least 3 levels up, so we simply skip the first 3 frames
12082 without checking the name of their associated function. */
12083 fi = get_current_frame ();
12084 for (frame_level = 0; frame_level < 3; frame_level += 1)
12085 if (fi != NULL)
12086 fi = get_prev_frame (fi);
12087
12088 while (fi != NULL)
12089 {
692465f1
JB
12090 enum language func_lang;
12091
c6dc63a1
TT
12092 gdb::unique_xmalloc_ptr<char> func_name
12093 = find_frame_funname (fi, &func_lang, NULL);
55b87a52
KS
12094 if (func_name != NULL)
12095 {
c6dc63a1 12096 if (strcmp (func_name.get (),
55b87a52
KS
12097 data->exception_info->catch_exception_sym) == 0)
12098 break; /* We found the frame we were looking for... */
55b87a52 12099 }
fb44b1a7 12100 fi = get_prev_frame (fi);
f7f9143b
JB
12101 }
12102
12103 if (fi == NULL)
12104 return 0;
12105
12106 select_frame (fi);
12107 return parse_and_eval_address ("id.full_name");
12108}
12109
12110/* Assuming the inferior just triggered an Ada exception catchpoint
12111 (of any type), return the address in inferior memory where the name
12112 of the exception is stored, if applicable.
12113
45db7c09
PA
12114 Assumes the selected frame is the current frame.
12115
f7f9143b
JB
12116 Return zero if the address could not be computed, or if not relevant. */
12117
12118static CORE_ADDR
761269c8 12119ada_exception_name_addr_1 (enum ada_exception_catchpoint_kind ex,
f7f9143b
JB
12120 struct breakpoint *b)
12121{
3eecfa55
JB
12122 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
12123
f7f9143b
JB
12124 switch (ex)
12125 {
761269c8 12126 case ada_catch_exception:
f7f9143b
JB
12127 return (parse_and_eval_address ("e.full_name"));
12128 break;
12129
761269c8 12130 case ada_catch_exception_unhandled:
3eecfa55 12131 return data->exception_info->unhandled_exception_name_addr ();
f7f9143b 12132 break;
9f757bf7
XR
12133
12134 case ada_catch_handlers:
12135 return 0; /* The runtimes does not provide access to the exception
12136 name. */
12137 break;
12138
761269c8 12139 case ada_catch_assert:
f7f9143b
JB
12140 return 0; /* Exception name is not relevant in this case. */
12141 break;
12142
12143 default:
12144 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12145 break;
12146 }
12147
12148 return 0; /* Should never be reached. */
12149}
12150
e547c119
JB
12151/* Assuming the inferior is stopped at an exception catchpoint,
12152 return the message which was associated to the exception, if
12153 available. Return NULL if the message could not be retrieved.
12154
e547c119
JB
12155 Note: The exception message can be associated to an exception
12156 either through the use of the Raise_Exception function, or
12157 more simply (Ada 2005 and later), via:
12158
12159 raise Exception_Name with "exception message";
12160
12161 */
12162
6f46ac85 12163static gdb::unique_xmalloc_ptr<char>
e547c119
JB
12164ada_exception_message_1 (void)
12165{
12166 struct value *e_msg_val;
e547c119 12167 int e_msg_len;
e547c119
JB
12168
12169 /* For runtimes that support this feature, the exception message
12170 is passed as an unbounded string argument called "message". */
12171 e_msg_val = parse_and_eval ("message");
12172 if (e_msg_val == NULL)
12173 return NULL; /* Exception message not supported. */
12174
12175 e_msg_val = ada_coerce_to_simple_array (e_msg_val);
12176 gdb_assert (e_msg_val != NULL);
12177 e_msg_len = TYPE_LENGTH (value_type (e_msg_val));
12178
12179 /* If the message string is empty, then treat it as if there was
12180 no exception message. */
12181 if (e_msg_len <= 0)
12182 return NULL;
12183
6f46ac85
TT
12184 gdb::unique_xmalloc_ptr<char> e_msg ((char *) xmalloc (e_msg_len + 1));
12185 read_memory_string (value_address (e_msg_val), e_msg.get (), e_msg_len + 1);
12186 e_msg.get ()[e_msg_len] = '\0';
e547c119 12187
e547c119
JB
12188 return e_msg;
12189}
12190
12191/* Same as ada_exception_message_1, except that all exceptions are
12192 contained here (returning NULL instead). */
12193
6f46ac85 12194static gdb::unique_xmalloc_ptr<char>
e547c119
JB
12195ada_exception_message (void)
12196{
6f46ac85 12197 gdb::unique_xmalloc_ptr<char> e_msg;
e547c119 12198
a70b8144 12199 try
e547c119
JB
12200 {
12201 e_msg = ada_exception_message_1 ();
12202 }
230d2906 12203 catch (const gdb_exception_error &e)
e547c119 12204 {
6f46ac85 12205 e_msg.reset (nullptr);
e547c119 12206 }
e547c119
JB
12207
12208 return e_msg;
12209}
12210
f7f9143b
JB
12211/* Same as ada_exception_name_addr_1, except that it intercepts and contains
12212 any error that ada_exception_name_addr_1 might cause to be thrown.
12213 When an error is intercepted, a warning with the error message is printed,
12214 and zero is returned. */
12215
12216static CORE_ADDR
761269c8 12217ada_exception_name_addr (enum ada_exception_catchpoint_kind ex,
f7f9143b
JB
12218 struct breakpoint *b)
12219{
f7f9143b
JB
12220 CORE_ADDR result = 0;
12221
a70b8144 12222 try
f7f9143b
JB
12223 {
12224 result = ada_exception_name_addr_1 (ex, b);
12225 }
12226
230d2906 12227 catch (const gdb_exception_error &e)
f7f9143b 12228 {
3d6e9d23 12229 warning (_("failed to get exception name: %s"), e.what ());
f7f9143b
JB
12230 return 0;
12231 }
12232
12233 return result;
12234}
12235
cb7de75e 12236static std::string ada_exception_catchpoint_cond_string
9f757bf7
XR
12237 (const char *excep_string,
12238 enum ada_exception_catchpoint_kind ex);
28010a5d
PA
12239
12240/* Ada catchpoints.
12241
12242 In the case of catchpoints on Ada exceptions, the catchpoint will
12243 stop the target on every exception the program throws. When a user
12244 specifies the name of a specific exception, we translate this
12245 request into a condition expression (in text form), and then parse
12246 it into an expression stored in each of the catchpoint's locations.
12247 We then use this condition to check whether the exception that was
12248 raised is the one the user is interested in. If not, then the
12249 target is resumed again. We store the name of the requested
12250 exception, in order to be able to re-set the condition expression
12251 when symbols change. */
12252
12253/* An instance of this type is used to represent an Ada catchpoint
5625a286 12254 breakpoint location. */
28010a5d 12255
5625a286 12256class ada_catchpoint_location : public bp_location
28010a5d 12257{
5625a286 12258public:
5f486660 12259 ada_catchpoint_location (breakpoint *owner)
f06f1252 12260 : bp_location (owner, bp_loc_software_breakpoint)
5625a286 12261 {}
28010a5d
PA
12262
12263 /* The condition that checks whether the exception that was raised
12264 is the specific exception the user specified on catchpoint
12265 creation. */
4d01a485 12266 expression_up excep_cond_expr;
28010a5d
PA
12267};
12268
c1fc2657 12269/* An instance of this type is used to represent an Ada catchpoint. */
28010a5d 12270
c1fc2657 12271struct ada_catchpoint : public breakpoint
28010a5d 12272{
37f6a7f4
TT
12273 explicit ada_catchpoint (enum ada_exception_catchpoint_kind kind)
12274 : m_kind (kind)
12275 {
12276 }
12277
28010a5d 12278 /* The name of the specific exception the user specified. */
bc18fbb5 12279 std::string excep_string;
37f6a7f4
TT
12280
12281 /* What kind of catchpoint this is. */
12282 enum ada_exception_catchpoint_kind m_kind;
28010a5d
PA
12283};
12284
12285/* Parse the exception condition string in the context of each of the
12286 catchpoint's locations, and store them for later evaluation. */
12287
12288static void
9f757bf7
XR
12289create_excep_cond_exprs (struct ada_catchpoint *c,
12290 enum ada_exception_catchpoint_kind ex)
28010a5d 12291{
fccf9de1
TT
12292 struct bp_location *bl;
12293
28010a5d 12294 /* Nothing to do if there's no specific exception to catch. */
bc18fbb5 12295 if (c->excep_string.empty ())
28010a5d
PA
12296 return;
12297
12298 /* Same if there are no locations... */
c1fc2657 12299 if (c->loc == NULL)
28010a5d
PA
12300 return;
12301
fccf9de1
TT
12302 /* Compute the condition expression in text form, from the specific
12303 expection we want to catch. */
12304 std::string cond_string
12305 = ada_exception_catchpoint_cond_string (c->excep_string.c_str (), ex);
28010a5d 12306
fccf9de1
TT
12307 /* Iterate over all the catchpoint's locations, and parse an
12308 expression for each. */
12309 for (bl = c->loc; bl != NULL; bl = bl->next)
28010a5d
PA
12310 {
12311 struct ada_catchpoint_location *ada_loc
fccf9de1 12312 = (struct ada_catchpoint_location *) bl;
4d01a485 12313 expression_up exp;
28010a5d 12314
fccf9de1 12315 if (!bl->shlib_disabled)
28010a5d 12316 {
bbc13ae3 12317 const char *s;
28010a5d 12318
cb7de75e 12319 s = cond_string.c_str ();
a70b8144 12320 try
28010a5d 12321 {
fccf9de1
TT
12322 exp = parse_exp_1 (&s, bl->address,
12323 block_for_pc (bl->address),
036e657b 12324 0);
28010a5d 12325 }
230d2906 12326 catch (const gdb_exception_error &e)
849f2b52
JB
12327 {
12328 warning (_("failed to reevaluate internal exception condition "
12329 "for catchpoint %d: %s"),
3d6e9d23 12330 c->number, e.what ());
849f2b52 12331 }
28010a5d
PA
12332 }
12333
b22e99fd 12334 ada_loc->excep_cond_expr = std::move (exp);
28010a5d 12335 }
28010a5d
PA
12336}
12337
28010a5d
PA
12338/* Implement the ALLOCATE_LOCATION method in the breakpoint_ops
12339 structure for all exception catchpoint kinds. */
12340
12341static struct bp_location *
37f6a7f4 12342allocate_location_exception (struct breakpoint *self)
28010a5d 12343{
5f486660 12344 return new ada_catchpoint_location (self);
28010a5d
PA
12345}
12346
12347/* Implement the RE_SET method in the breakpoint_ops structure for all
12348 exception catchpoint kinds. */
12349
12350static void
37f6a7f4 12351re_set_exception (struct breakpoint *b)
28010a5d
PA
12352{
12353 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
12354
12355 /* Call the base class's method. This updates the catchpoint's
12356 locations. */
2060206e 12357 bkpt_breakpoint_ops.re_set (b);
28010a5d
PA
12358
12359 /* Reparse the exception conditional expressions. One for each
12360 location. */
37f6a7f4 12361 create_excep_cond_exprs (c, c->m_kind);
28010a5d
PA
12362}
12363
12364/* Returns true if we should stop for this breakpoint hit. If the
12365 user specified a specific exception, we only want to cause a stop
12366 if the program thrown that exception. */
12367
12368static int
12369should_stop_exception (const struct bp_location *bl)
12370{
12371 struct ada_catchpoint *c = (struct ada_catchpoint *) bl->owner;
12372 const struct ada_catchpoint_location *ada_loc
12373 = (const struct ada_catchpoint_location *) bl;
28010a5d
PA
12374 int stop;
12375
37f6a7f4
TT
12376 struct internalvar *var = lookup_internalvar ("_ada_exception");
12377 if (c->m_kind == ada_catch_assert)
12378 clear_internalvar (var);
12379 else
12380 {
12381 try
12382 {
12383 const char *expr;
12384
12385 if (c->m_kind == ada_catch_handlers)
12386 expr = ("GNAT_GCC_exception_Access(gcc_exception)"
12387 ".all.occurrence.id");
12388 else
12389 expr = "e";
12390
12391 struct value *exc = parse_and_eval (expr);
12392 set_internalvar (var, exc);
12393 }
12394 catch (const gdb_exception_error &ex)
12395 {
12396 clear_internalvar (var);
12397 }
12398 }
12399
28010a5d 12400 /* With no specific exception, should always stop. */
bc18fbb5 12401 if (c->excep_string.empty ())
28010a5d
PA
12402 return 1;
12403
12404 if (ada_loc->excep_cond_expr == NULL)
12405 {
12406 /* We will have a NULL expression if back when we were creating
12407 the expressions, this location's had failed to parse. */
12408 return 1;
12409 }
12410
12411 stop = 1;
a70b8144 12412 try
28010a5d
PA
12413 {
12414 struct value *mark;
12415
12416 mark = value_mark ();
4d01a485 12417 stop = value_true (evaluate_expression (ada_loc->excep_cond_expr.get ()));
28010a5d
PA
12418 value_free_to_mark (mark);
12419 }
230d2906 12420 catch (const gdb_exception &ex)
492d29ea
PA
12421 {
12422 exception_fprintf (gdb_stderr, ex,
12423 _("Error in testing exception condition:\n"));
12424 }
492d29ea 12425
28010a5d
PA
12426 return stop;
12427}
12428
12429/* Implement the CHECK_STATUS method in the breakpoint_ops structure
12430 for all exception catchpoint kinds. */
12431
12432static void
37f6a7f4 12433check_status_exception (bpstat bs)
28010a5d
PA
12434{
12435 bs->stop = should_stop_exception (bs->bp_location_at);
12436}
12437
f7f9143b
JB
12438/* Implement the PRINT_IT method in the breakpoint_ops structure
12439 for all exception catchpoint kinds. */
12440
12441static enum print_stop_action
37f6a7f4 12442print_it_exception (bpstat bs)
f7f9143b 12443{
79a45e25 12444 struct ui_out *uiout = current_uiout;
348d480f
PA
12445 struct breakpoint *b = bs->breakpoint_at;
12446
956a9fb9 12447 annotate_catchpoint (b->number);
f7f9143b 12448
112e8700 12449 if (uiout->is_mi_like_p ())
f7f9143b 12450 {
112e8700 12451 uiout->field_string ("reason",
956a9fb9 12452 async_reason_lookup (EXEC_ASYNC_BREAKPOINT_HIT));
112e8700 12453 uiout->field_string ("disp", bpdisp_text (b->disposition));
f7f9143b
JB
12454 }
12455
112e8700
SM
12456 uiout->text (b->disposition == disp_del
12457 ? "\nTemporary catchpoint " : "\nCatchpoint ");
381befee 12458 uiout->field_signed ("bkptno", b->number);
112e8700 12459 uiout->text (", ");
f7f9143b 12460
45db7c09
PA
12461 /* ada_exception_name_addr relies on the selected frame being the
12462 current frame. Need to do this here because this function may be
12463 called more than once when printing a stop, and below, we'll
12464 select the first frame past the Ada run-time (see
12465 ada_find_printable_frame). */
12466 select_frame (get_current_frame ());
12467
37f6a7f4
TT
12468 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
12469 switch (c->m_kind)
f7f9143b 12470 {
761269c8
JB
12471 case ada_catch_exception:
12472 case ada_catch_exception_unhandled:
9f757bf7 12473 case ada_catch_handlers:
956a9fb9 12474 {
37f6a7f4 12475 const CORE_ADDR addr = ada_exception_name_addr (c->m_kind, b);
956a9fb9
JB
12476 char exception_name[256];
12477
12478 if (addr != 0)
12479 {
c714b426
PA
12480 read_memory (addr, (gdb_byte *) exception_name,
12481 sizeof (exception_name) - 1);
956a9fb9
JB
12482 exception_name [sizeof (exception_name) - 1] = '\0';
12483 }
12484 else
12485 {
12486 /* For some reason, we were unable to read the exception
12487 name. This could happen if the Runtime was compiled
12488 without debugging info, for instance. In that case,
12489 just replace the exception name by the generic string
12490 "exception" - it will read as "an exception" in the
12491 notification we are about to print. */
967cff16 12492 memcpy (exception_name, "exception", sizeof ("exception"));
956a9fb9
JB
12493 }
12494 /* In the case of unhandled exception breakpoints, we print
12495 the exception name as "unhandled EXCEPTION_NAME", to make
12496 it clearer to the user which kind of catchpoint just got
12497 hit. We used ui_out_text to make sure that this extra
12498 info does not pollute the exception name in the MI case. */
37f6a7f4 12499 if (c->m_kind == ada_catch_exception_unhandled)
112e8700
SM
12500 uiout->text ("unhandled ");
12501 uiout->field_string ("exception-name", exception_name);
956a9fb9
JB
12502 }
12503 break;
761269c8 12504 case ada_catch_assert:
956a9fb9
JB
12505 /* In this case, the name of the exception is not really
12506 important. Just print "failed assertion" to make it clearer
12507 that his program just hit an assertion-failure catchpoint.
12508 We used ui_out_text because this info does not belong in
12509 the MI output. */
112e8700 12510 uiout->text ("failed assertion");
956a9fb9 12511 break;
f7f9143b 12512 }
e547c119 12513
6f46ac85 12514 gdb::unique_xmalloc_ptr<char> exception_message = ada_exception_message ();
e547c119
JB
12515 if (exception_message != NULL)
12516 {
e547c119 12517 uiout->text (" (");
6f46ac85 12518 uiout->field_string ("exception-message", exception_message.get ());
e547c119 12519 uiout->text (")");
e547c119
JB
12520 }
12521
112e8700 12522 uiout->text (" at ");
956a9fb9 12523 ada_find_printable_frame (get_current_frame ());
f7f9143b
JB
12524
12525 return PRINT_SRC_AND_LOC;
12526}
12527
12528/* Implement the PRINT_ONE method in the breakpoint_ops structure
12529 for all exception catchpoint kinds. */
12530
12531static void
37f6a7f4 12532print_one_exception (struct breakpoint *b, struct bp_location **last_loc)
f7f9143b 12533{
79a45e25 12534 struct ui_out *uiout = current_uiout;
28010a5d 12535 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
79a45b7d
TT
12536 struct value_print_options opts;
12537
12538 get_user_print_options (&opts);
f06f1252 12539
79a45b7d 12540 if (opts.addressprint)
f06f1252 12541 uiout->field_skip ("addr");
f7f9143b
JB
12542
12543 annotate_field (5);
37f6a7f4 12544 switch (c->m_kind)
f7f9143b 12545 {
761269c8 12546 case ada_catch_exception:
bc18fbb5 12547 if (!c->excep_string.empty ())
f7f9143b 12548 {
bc18fbb5
TT
12549 std::string msg = string_printf (_("`%s' Ada exception"),
12550 c->excep_string.c_str ());
28010a5d 12551
112e8700 12552 uiout->field_string ("what", msg);
f7f9143b
JB
12553 }
12554 else
112e8700 12555 uiout->field_string ("what", "all Ada exceptions");
f7f9143b
JB
12556
12557 break;
12558
761269c8 12559 case ada_catch_exception_unhandled:
112e8700 12560 uiout->field_string ("what", "unhandled Ada exceptions");
f7f9143b
JB
12561 break;
12562
9f757bf7 12563 case ada_catch_handlers:
bc18fbb5 12564 if (!c->excep_string.empty ())
9f757bf7
XR
12565 {
12566 uiout->field_fmt ("what",
12567 _("`%s' Ada exception handlers"),
bc18fbb5 12568 c->excep_string.c_str ());
9f757bf7
XR
12569 }
12570 else
12571 uiout->field_string ("what", "all Ada exceptions handlers");
12572 break;
12573
761269c8 12574 case ada_catch_assert:
112e8700 12575 uiout->field_string ("what", "failed Ada assertions");
f7f9143b
JB
12576 break;
12577
12578 default:
12579 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12580 break;
12581 }
12582}
12583
12584/* Implement the PRINT_MENTION method in the breakpoint_ops structure
12585 for all exception catchpoint kinds. */
12586
12587static void
37f6a7f4 12588print_mention_exception (struct breakpoint *b)
f7f9143b 12589{
28010a5d 12590 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
79a45e25 12591 struct ui_out *uiout = current_uiout;
28010a5d 12592
112e8700 12593 uiout->text (b->disposition == disp_del ? _("Temporary catchpoint ")
00eb2c4a 12594 : _("Catchpoint "));
381befee 12595 uiout->field_signed ("bkptno", b->number);
112e8700 12596 uiout->text (": ");
00eb2c4a 12597
37f6a7f4 12598 switch (c->m_kind)
f7f9143b 12599 {
761269c8 12600 case ada_catch_exception:
bc18fbb5 12601 if (!c->excep_string.empty ())
00eb2c4a 12602 {
862d101a 12603 std::string info = string_printf (_("`%s' Ada exception"),
bc18fbb5 12604 c->excep_string.c_str ());
862d101a 12605 uiout->text (info.c_str ());
00eb2c4a 12606 }
f7f9143b 12607 else
112e8700 12608 uiout->text (_("all Ada exceptions"));
f7f9143b
JB
12609 break;
12610
761269c8 12611 case ada_catch_exception_unhandled:
112e8700 12612 uiout->text (_("unhandled Ada exceptions"));
f7f9143b 12613 break;
9f757bf7
XR
12614
12615 case ada_catch_handlers:
bc18fbb5 12616 if (!c->excep_string.empty ())
9f757bf7
XR
12617 {
12618 std::string info
12619 = string_printf (_("`%s' Ada exception handlers"),
bc18fbb5 12620 c->excep_string.c_str ());
9f757bf7
XR
12621 uiout->text (info.c_str ());
12622 }
12623 else
12624 uiout->text (_("all Ada exceptions handlers"));
12625 break;
12626
761269c8 12627 case ada_catch_assert:
112e8700 12628 uiout->text (_("failed Ada assertions"));
f7f9143b
JB
12629 break;
12630
12631 default:
12632 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12633 break;
12634 }
12635}
12636
6149aea9
PA
12637/* Implement the PRINT_RECREATE method in the breakpoint_ops structure
12638 for all exception catchpoint kinds. */
12639
12640static void
37f6a7f4 12641print_recreate_exception (struct breakpoint *b, struct ui_file *fp)
6149aea9 12642{
28010a5d
PA
12643 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
12644
37f6a7f4 12645 switch (c->m_kind)
6149aea9 12646 {
761269c8 12647 case ada_catch_exception:
6149aea9 12648 fprintf_filtered (fp, "catch exception");
bc18fbb5
TT
12649 if (!c->excep_string.empty ())
12650 fprintf_filtered (fp, " %s", c->excep_string.c_str ());
6149aea9
PA
12651 break;
12652
761269c8 12653 case ada_catch_exception_unhandled:
78076abc 12654 fprintf_filtered (fp, "catch exception unhandled");
6149aea9
PA
12655 break;
12656
9f757bf7
XR
12657 case ada_catch_handlers:
12658 fprintf_filtered (fp, "catch handlers");
12659 break;
12660
761269c8 12661 case ada_catch_assert:
6149aea9
PA
12662 fprintf_filtered (fp, "catch assert");
12663 break;
12664
12665 default:
12666 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12667 }
d9b3f62e 12668 print_recreate_thread (b, fp);
6149aea9
PA
12669}
12670
37f6a7f4 12671/* Virtual tables for various breakpoint types. */
2060206e 12672static struct breakpoint_ops catch_exception_breakpoint_ops;
2060206e 12673static struct breakpoint_ops catch_exception_unhandled_breakpoint_ops;
2060206e 12674static struct breakpoint_ops catch_assert_breakpoint_ops;
9f757bf7
XR
12675static struct breakpoint_ops catch_handlers_breakpoint_ops;
12676
f06f1252
TT
12677/* See ada-lang.h. */
12678
12679bool
12680is_ada_exception_catchpoint (breakpoint *bp)
12681{
12682 return (bp->ops == &catch_exception_breakpoint_ops
12683 || bp->ops == &catch_exception_unhandled_breakpoint_ops
12684 || bp->ops == &catch_assert_breakpoint_ops
12685 || bp->ops == &catch_handlers_breakpoint_ops);
12686}
12687
f7f9143b
JB
12688/* Split the arguments specified in a "catch exception" command.
12689 Set EX to the appropriate catchpoint type.
28010a5d 12690 Set EXCEP_STRING to the name of the specific exception if
5845583d 12691 specified by the user.
9f757bf7
XR
12692 IS_CATCH_HANDLERS_CMD: True if the arguments are for a
12693 "catch handlers" command. False otherwise.
5845583d
JB
12694 If a condition is found at the end of the arguments, the condition
12695 expression is stored in COND_STRING (memory must be deallocated
12696 after use). Otherwise COND_STRING is set to NULL. */
f7f9143b
JB
12697
12698static void
a121b7c1 12699catch_ada_exception_command_split (const char *args,
9f757bf7 12700 bool is_catch_handlers_cmd,
761269c8 12701 enum ada_exception_catchpoint_kind *ex,
bc18fbb5
TT
12702 std::string *excep_string,
12703 std::string *cond_string)
f7f9143b 12704{
bc18fbb5 12705 std::string exception_name;
f7f9143b 12706
bc18fbb5
TT
12707 exception_name = extract_arg (&args);
12708 if (exception_name == "if")
5845583d
JB
12709 {
12710 /* This is not an exception name; this is the start of a condition
12711 expression for a catchpoint on all exceptions. So, "un-get"
12712 this token, and set exception_name to NULL. */
bc18fbb5 12713 exception_name.clear ();
5845583d
JB
12714 args -= 2;
12715 }
f7f9143b 12716
5845583d 12717 /* Check to see if we have a condition. */
f7f9143b 12718
f1735a53 12719 args = skip_spaces (args);
61012eef 12720 if (startswith (args, "if")
5845583d
JB
12721 && (isspace (args[2]) || args[2] == '\0'))
12722 {
12723 args += 2;
f1735a53 12724 args = skip_spaces (args);
5845583d
JB
12725
12726 if (args[0] == '\0')
12727 error (_("Condition missing after `if' keyword"));
bc18fbb5 12728 *cond_string = args;
5845583d
JB
12729
12730 args += strlen (args);
12731 }
12732
12733 /* Check that we do not have any more arguments. Anything else
12734 is unexpected. */
f7f9143b
JB
12735
12736 if (args[0] != '\0')
12737 error (_("Junk at end of expression"));
12738
9f757bf7
XR
12739 if (is_catch_handlers_cmd)
12740 {
12741 /* Catch handling of exceptions. */
12742 *ex = ada_catch_handlers;
12743 *excep_string = exception_name;
12744 }
bc18fbb5 12745 else if (exception_name.empty ())
f7f9143b
JB
12746 {
12747 /* Catch all exceptions. */
761269c8 12748 *ex = ada_catch_exception;
bc18fbb5 12749 excep_string->clear ();
f7f9143b 12750 }
bc18fbb5 12751 else if (exception_name == "unhandled")
f7f9143b
JB
12752 {
12753 /* Catch unhandled exceptions. */
761269c8 12754 *ex = ada_catch_exception_unhandled;
bc18fbb5 12755 excep_string->clear ();
f7f9143b
JB
12756 }
12757 else
12758 {
12759 /* Catch a specific exception. */
761269c8 12760 *ex = ada_catch_exception;
28010a5d 12761 *excep_string = exception_name;
f7f9143b
JB
12762 }
12763}
12764
12765/* Return the name of the symbol on which we should break in order to
12766 implement a catchpoint of the EX kind. */
12767
12768static const char *
761269c8 12769ada_exception_sym_name (enum ada_exception_catchpoint_kind ex)
f7f9143b 12770{
3eecfa55
JB
12771 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
12772
12773 gdb_assert (data->exception_info != NULL);
0259addd 12774
f7f9143b
JB
12775 switch (ex)
12776 {
761269c8 12777 case ada_catch_exception:
3eecfa55 12778 return (data->exception_info->catch_exception_sym);
f7f9143b 12779 break;
761269c8 12780 case ada_catch_exception_unhandled:
3eecfa55 12781 return (data->exception_info->catch_exception_unhandled_sym);
f7f9143b 12782 break;
761269c8 12783 case ada_catch_assert:
3eecfa55 12784 return (data->exception_info->catch_assert_sym);
f7f9143b 12785 break;
9f757bf7
XR
12786 case ada_catch_handlers:
12787 return (data->exception_info->catch_handlers_sym);
12788 break;
f7f9143b
JB
12789 default:
12790 internal_error (__FILE__, __LINE__,
12791 _("unexpected catchpoint kind (%d)"), ex);
12792 }
12793}
12794
12795/* Return the breakpoint ops "virtual table" used for catchpoints
12796 of the EX kind. */
12797
c0a91b2b 12798static const struct breakpoint_ops *
761269c8 12799ada_exception_breakpoint_ops (enum ada_exception_catchpoint_kind ex)
f7f9143b
JB
12800{
12801 switch (ex)
12802 {
761269c8 12803 case ada_catch_exception:
f7f9143b
JB
12804 return (&catch_exception_breakpoint_ops);
12805 break;
761269c8 12806 case ada_catch_exception_unhandled:
f7f9143b
JB
12807 return (&catch_exception_unhandled_breakpoint_ops);
12808 break;
761269c8 12809 case ada_catch_assert:
f7f9143b
JB
12810 return (&catch_assert_breakpoint_ops);
12811 break;
9f757bf7
XR
12812 case ada_catch_handlers:
12813 return (&catch_handlers_breakpoint_ops);
12814 break;
f7f9143b
JB
12815 default:
12816 internal_error (__FILE__, __LINE__,
12817 _("unexpected catchpoint kind (%d)"), ex);
12818 }
12819}
12820
12821/* Return the condition that will be used to match the current exception
12822 being raised with the exception that the user wants to catch. This
12823 assumes that this condition is used when the inferior just triggered
12824 an exception catchpoint.
cb7de75e 12825 EX: the type of catchpoints used for catching Ada exceptions. */
f7f9143b 12826
cb7de75e 12827static std::string
9f757bf7
XR
12828ada_exception_catchpoint_cond_string (const char *excep_string,
12829 enum ada_exception_catchpoint_kind ex)
f7f9143b 12830{
3d0b0fa3 12831 int i;
fccf9de1 12832 bool is_standard_exc = false;
cb7de75e 12833 std::string result;
9f757bf7
XR
12834
12835 if (ex == ada_catch_handlers)
12836 {
12837 /* For exception handlers catchpoints, the condition string does
12838 not use the same parameter as for the other exceptions. */
fccf9de1
TT
12839 result = ("long_integer (GNAT_GCC_exception_Access"
12840 "(gcc_exception).all.occurrence.id)");
9f757bf7
XR
12841 }
12842 else
fccf9de1 12843 result = "long_integer (e)";
3d0b0fa3 12844
0963b4bd 12845 /* The standard exceptions are a special case. They are defined in
3d0b0fa3 12846 runtime units that have been compiled without debugging info; if
28010a5d 12847 EXCEP_STRING is the not-fully-qualified name of a standard
3d0b0fa3
JB
12848 exception (e.g. "constraint_error") then, during the evaluation
12849 of the condition expression, the symbol lookup on this name would
0963b4bd 12850 *not* return this standard exception. The catchpoint condition
3d0b0fa3
JB
12851 may then be set only on user-defined exceptions which have the
12852 same not-fully-qualified name (e.g. my_package.constraint_error).
12853
12854 To avoid this unexcepted behavior, these standard exceptions are
0963b4bd 12855 systematically prefixed by "standard". This means that "catch
3d0b0fa3
JB
12856 exception constraint_error" is rewritten into "catch exception
12857 standard.constraint_error".
12858
85102364 12859 If an exception named constraint_error is defined in another package of
3d0b0fa3
JB
12860 the inferior program, then the only way to specify this exception as a
12861 breakpoint condition is to use its fully-qualified named:
fccf9de1 12862 e.g. my_package.constraint_error. */
3d0b0fa3
JB
12863
12864 for (i = 0; i < sizeof (standard_exc) / sizeof (char *); i++)
12865 {
28010a5d 12866 if (strcmp (standard_exc [i], excep_string) == 0)
3d0b0fa3 12867 {
fccf9de1 12868 is_standard_exc = true;
9f757bf7 12869 break;
3d0b0fa3
JB
12870 }
12871 }
9f757bf7 12872
fccf9de1
TT
12873 result += " = ";
12874
12875 if (is_standard_exc)
12876 string_appendf (result, "long_integer (&standard.%s)", excep_string);
12877 else
12878 string_appendf (result, "long_integer (&%s)", excep_string);
9f757bf7 12879
9f757bf7 12880 return result;
f7f9143b
JB
12881}
12882
12883/* Return the symtab_and_line that should be used to insert an exception
12884 catchpoint of the TYPE kind.
12885
28010a5d
PA
12886 ADDR_STRING returns the name of the function where the real
12887 breakpoint that implements the catchpoints is set, depending on the
12888 type of catchpoint we need to create. */
f7f9143b
JB
12889
12890static struct symtab_and_line
bc18fbb5 12891ada_exception_sal (enum ada_exception_catchpoint_kind ex,
cc12f4a8 12892 std::string *addr_string, const struct breakpoint_ops **ops)
f7f9143b
JB
12893{
12894 const char *sym_name;
12895 struct symbol *sym;
f7f9143b 12896
0259addd
JB
12897 /* First, find out which exception support info to use. */
12898 ada_exception_support_info_sniffer ();
12899
12900 /* Then lookup the function on which we will break in order to catch
f7f9143b 12901 the Ada exceptions requested by the user. */
f7f9143b
JB
12902 sym_name = ada_exception_sym_name (ex);
12903 sym = standard_lookup (sym_name, NULL, VAR_DOMAIN);
12904
57aff202
JB
12905 if (sym == NULL)
12906 error (_("Catchpoint symbol not found: %s"), sym_name);
12907
12908 if (SYMBOL_CLASS (sym) != LOC_BLOCK)
12909 error (_("Unable to insert catchpoint. %s is not a function."), sym_name);
f7f9143b
JB
12910
12911 /* Set ADDR_STRING. */
cc12f4a8 12912 *addr_string = sym_name;
f7f9143b 12913
f7f9143b 12914 /* Set OPS. */
4b9eee8c 12915 *ops = ada_exception_breakpoint_ops (ex);
f7f9143b 12916
f17011e0 12917 return find_function_start_sal (sym, 1);
f7f9143b
JB
12918}
12919
b4a5b78b 12920/* Create an Ada exception catchpoint.
f7f9143b 12921
b4a5b78b 12922 EX_KIND is the kind of exception catchpoint to be created.
5845583d 12923
bc18fbb5 12924 If EXCEPT_STRING is empty, this catchpoint is expected to trigger
2df4d1d5 12925 for all exceptions. Otherwise, EXCEPT_STRING indicates the name
bc18fbb5 12926 of the exception to which this catchpoint applies.
2df4d1d5 12927
bc18fbb5 12928 COND_STRING, if not empty, is the catchpoint condition.
f7f9143b 12929
b4a5b78b
JB
12930 TEMPFLAG, if nonzero, means that the underlying breakpoint
12931 should be temporary.
28010a5d 12932
b4a5b78b 12933 FROM_TTY is the usual argument passed to all commands implementations. */
28010a5d 12934
349774ef 12935void
28010a5d 12936create_ada_exception_catchpoint (struct gdbarch *gdbarch,
761269c8 12937 enum ada_exception_catchpoint_kind ex_kind,
bc18fbb5 12938 const std::string &excep_string,
56ecd069 12939 const std::string &cond_string,
28010a5d 12940 int tempflag,
349774ef 12941 int disabled,
28010a5d
PA
12942 int from_tty)
12943{
cc12f4a8 12944 std::string addr_string;
b4a5b78b 12945 const struct breakpoint_ops *ops = NULL;
bc18fbb5 12946 struct symtab_and_line sal = ada_exception_sal (ex_kind, &addr_string, &ops);
28010a5d 12947
37f6a7f4 12948 std::unique_ptr<ada_catchpoint> c (new ada_catchpoint (ex_kind));
cc12f4a8 12949 init_ada_exception_breakpoint (c.get (), gdbarch, sal, addr_string.c_str (),
349774ef 12950 ops, tempflag, disabled, from_tty);
28010a5d 12951 c->excep_string = excep_string;
9f757bf7 12952 create_excep_cond_exprs (c.get (), ex_kind);
56ecd069
XR
12953 if (!cond_string.empty ())
12954 set_breakpoint_condition (c.get (), cond_string.c_str (), from_tty);
b270e6f9 12955 install_breakpoint (0, std::move (c), 1);
f7f9143b
JB
12956}
12957
9ac4176b
PA
12958/* Implement the "catch exception" command. */
12959
12960static void
eb4c3f4a 12961catch_ada_exception_command (const char *arg_entry, int from_tty,
9ac4176b
PA
12962 struct cmd_list_element *command)
12963{
a121b7c1 12964 const char *arg = arg_entry;
9ac4176b
PA
12965 struct gdbarch *gdbarch = get_current_arch ();
12966 int tempflag;
761269c8 12967 enum ada_exception_catchpoint_kind ex_kind;
bc18fbb5 12968 std::string excep_string;
56ecd069 12969 std::string cond_string;
9ac4176b
PA
12970
12971 tempflag = get_cmd_context (command) == CATCH_TEMPORARY;
12972
12973 if (!arg)
12974 arg = "";
9f757bf7 12975 catch_ada_exception_command_split (arg, false, &ex_kind, &excep_string,
bc18fbb5 12976 &cond_string);
9f757bf7
XR
12977 create_ada_exception_catchpoint (gdbarch, ex_kind,
12978 excep_string, cond_string,
12979 tempflag, 1 /* enabled */,
12980 from_tty);
12981}
12982
12983/* Implement the "catch handlers" command. */
12984
12985static void
12986catch_ada_handlers_command (const char *arg_entry, int from_tty,
12987 struct cmd_list_element *command)
12988{
12989 const char *arg = arg_entry;
12990 struct gdbarch *gdbarch = get_current_arch ();
12991 int tempflag;
12992 enum ada_exception_catchpoint_kind ex_kind;
bc18fbb5 12993 std::string excep_string;
56ecd069 12994 std::string cond_string;
9f757bf7
XR
12995
12996 tempflag = get_cmd_context (command) == CATCH_TEMPORARY;
12997
12998 if (!arg)
12999 arg = "";
13000 catch_ada_exception_command_split (arg, true, &ex_kind, &excep_string,
bc18fbb5 13001 &cond_string);
b4a5b78b
JB
13002 create_ada_exception_catchpoint (gdbarch, ex_kind,
13003 excep_string, cond_string,
349774ef
JB
13004 tempflag, 1 /* enabled */,
13005 from_tty);
9ac4176b
PA
13006}
13007
71bed2db
TT
13008/* Completion function for the Ada "catch" commands. */
13009
13010static void
13011catch_ada_completer (struct cmd_list_element *cmd, completion_tracker &tracker,
13012 const char *text, const char *word)
13013{
13014 std::vector<ada_exc_info> exceptions = ada_exceptions_list (NULL);
13015
13016 for (const ada_exc_info &info : exceptions)
13017 {
13018 if (startswith (info.name, word))
b02f78f9 13019 tracker.add_completion (make_unique_xstrdup (info.name));
71bed2db
TT
13020 }
13021}
13022
b4a5b78b 13023/* Split the arguments specified in a "catch assert" command.
5845583d 13024
b4a5b78b
JB
13025 ARGS contains the command's arguments (or the empty string if
13026 no arguments were passed).
5845583d
JB
13027
13028 If ARGS contains a condition, set COND_STRING to that condition
b4a5b78b 13029 (the memory needs to be deallocated after use). */
5845583d 13030
b4a5b78b 13031static void
56ecd069 13032catch_ada_assert_command_split (const char *args, std::string &cond_string)
f7f9143b 13033{
f1735a53 13034 args = skip_spaces (args);
f7f9143b 13035
5845583d 13036 /* Check whether a condition was provided. */
61012eef 13037 if (startswith (args, "if")
5845583d 13038 && (isspace (args[2]) || args[2] == '\0'))
f7f9143b 13039 {
5845583d 13040 args += 2;
f1735a53 13041 args = skip_spaces (args);
5845583d
JB
13042 if (args[0] == '\0')
13043 error (_("condition missing after `if' keyword"));
56ecd069 13044 cond_string.assign (args);
f7f9143b
JB
13045 }
13046
5845583d
JB
13047 /* Otherwise, there should be no other argument at the end of
13048 the command. */
13049 else if (args[0] != '\0')
13050 error (_("Junk at end of arguments."));
f7f9143b
JB
13051}
13052
9ac4176b
PA
13053/* Implement the "catch assert" command. */
13054
13055static void
eb4c3f4a 13056catch_assert_command (const char *arg_entry, int from_tty,
9ac4176b
PA
13057 struct cmd_list_element *command)
13058{
a121b7c1 13059 const char *arg = arg_entry;
9ac4176b
PA
13060 struct gdbarch *gdbarch = get_current_arch ();
13061 int tempflag;
56ecd069 13062 std::string cond_string;
9ac4176b
PA
13063
13064 tempflag = get_cmd_context (command) == CATCH_TEMPORARY;
13065
13066 if (!arg)
13067 arg = "";
56ecd069 13068 catch_ada_assert_command_split (arg, cond_string);
761269c8 13069 create_ada_exception_catchpoint (gdbarch, ada_catch_assert,
241db429 13070 "", cond_string,
349774ef
JB
13071 tempflag, 1 /* enabled */,
13072 from_tty);
9ac4176b 13073}
778865d3
JB
13074
13075/* Return non-zero if the symbol SYM is an Ada exception object. */
13076
13077static int
13078ada_is_exception_sym (struct symbol *sym)
13079{
a737d952 13080 const char *type_name = TYPE_NAME (SYMBOL_TYPE (sym));
778865d3
JB
13081
13082 return (SYMBOL_CLASS (sym) != LOC_TYPEDEF
13083 && SYMBOL_CLASS (sym) != LOC_BLOCK
13084 && SYMBOL_CLASS (sym) != LOC_CONST
13085 && SYMBOL_CLASS (sym) != LOC_UNRESOLVED
13086 && type_name != NULL && strcmp (type_name, "exception") == 0);
13087}
13088
13089/* Given a global symbol SYM, return non-zero iff SYM is a non-standard
13090 Ada exception object. This matches all exceptions except the ones
13091 defined by the Ada language. */
13092
13093static int
13094ada_is_non_standard_exception_sym (struct symbol *sym)
13095{
13096 int i;
13097
13098 if (!ada_is_exception_sym (sym))
13099 return 0;
13100
13101 for (i = 0; i < ARRAY_SIZE (standard_exc); i++)
987012b8 13102 if (strcmp (sym->linkage_name (), standard_exc[i]) == 0)
778865d3
JB
13103 return 0; /* A standard exception. */
13104
13105 /* Numeric_Error is also a standard exception, so exclude it.
13106 See the STANDARD_EXC description for more details as to why
13107 this exception is not listed in that array. */
987012b8 13108 if (strcmp (sym->linkage_name (), "numeric_error") == 0)
778865d3
JB
13109 return 0;
13110
13111 return 1;
13112}
13113
ab816a27 13114/* A helper function for std::sort, comparing two struct ada_exc_info
778865d3
JB
13115 objects.
13116
13117 The comparison is determined first by exception name, and then
13118 by exception address. */
13119
ab816a27 13120bool
cc536b21 13121ada_exc_info::operator< (const ada_exc_info &other) const
778865d3 13122{
778865d3
JB
13123 int result;
13124
ab816a27
TT
13125 result = strcmp (name, other.name);
13126 if (result < 0)
13127 return true;
13128 if (result == 0 && addr < other.addr)
13129 return true;
13130 return false;
13131}
778865d3 13132
ab816a27 13133bool
cc536b21 13134ada_exc_info::operator== (const ada_exc_info &other) const
ab816a27
TT
13135{
13136 return addr == other.addr && strcmp (name, other.name) == 0;
778865d3
JB
13137}
13138
13139/* Sort EXCEPTIONS using compare_ada_exception_info as the comparison
13140 routine, but keeping the first SKIP elements untouched.
13141
13142 All duplicates are also removed. */
13143
13144static void
ab816a27 13145sort_remove_dups_ada_exceptions_list (std::vector<ada_exc_info> *exceptions,
778865d3
JB
13146 int skip)
13147{
ab816a27
TT
13148 std::sort (exceptions->begin () + skip, exceptions->end ());
13149 exceptions->erase (std::unique (exceptions->begin () + skip, exceptions->end ()),
13150 exceptions->end ());
778865d3
JB
13151}
13152
778865d3
JB
13153/* Add all exceptions defined by the Ada standard whose name match
13154 a regular expression.
13155
13156 If PREG is not NULL, then this regexp_t object is used to
13157 perform the symbol name matching. Otherwise, no name-based
13158 filtering is performed.
13159
13160 EXCEPTIONS is a vector of exceptions to which matching exceptions
13161 gets pushed. */
13162
13163static void
2d7cc5c7 13164ada_add_standard_exceptions (compiled_regex *preg,
ab816a27 13165 std::vector<ada_exc_info> *exceptions)
778865d3
JB
13166{
13167 int i;
13168
13169 for (i = 0; i < ARRAY_SIZE (standard_exc); i++)
13170 {
13171 if (preg == NULL
2d7cc5c7 13172 || preg->exec (standard_exc[i], 0, NULL, 0) == 0)
778865d3
JB
13173 {
13174 struct bound_minimal_symbol msymbol
13175 = ada_lookup_simple_minsym (standard_exc[i]);
13176
13177 if (msymbol.minsym != NULL)
13178 {
13179 struct ada_exc_info info
77e371c0 13180 = {standard_exc[i], BMSYMBOL_VALUE_ADDRESS (msymbol)};
778865d3 13181
ab816a27 13182 exceptions->push_back (info);
778865d3
JB
13183 }
13184 }
13185 }
13186}
13187
13188/* Add all Ada exceptions defined locally and accessible from the given
13189 FRAME.
13190
13191 If PREG is not NULL, then this regexp_t object is used to
13192 perform the symbol name matching. Otherwise, no name-based
13193 filtering is performed.
13194
13195 EXCEPTIONS is a vector of exceptions to which matching exceptions
13196 gets pushed. */
13197
13198static void
2d7cc5c7
PA
13199ada_add_exceptions_from_frame (compiled_regex *preg,
13200 struct frame_info *frame,
ab816a27 13201 std::vector<ada_exc_info> *exceptions)
778865d3 13202{
3977b71f 13203 const struct block *block = get_frame_block (frame, 0);
778865d3
JB
13204
13205 while (block != 0)
13206 {
13207 struct block_iterator iter;
13208 struct symbol *sym;
13209
13210 ALL_BLOCK_SYMBOLS (block, iter, sym)
13211 {
13212 switch (SYMBOL_CLASS (sym))
13213 {
13214 case LOC_TYPEDEF:
13215 case LOC_BLOCK:
13216 case LOC_CONST:
13217 break;
13218 default:
13219 if (ada_is_exception_sym (sym))
13220 {
987012b8 13221 struct ada_exc_info info = {sym->print_name (),
778865d3
JB
13222 SYMBOL_VALUE_ADDRESS (sym)};
13223
ab816a27 13224 exceptions->push_back (info);
778865d3
JB
13225 }
13226 }
13227 }
13228 if (BLOCK_FUNCTION (block) != NULL)
13229 break;
13230 block = BLOCK_SUPERBLOCK (block);
13231 }
13232}
13233
14bc53a8
PA
13234/* Return true if NAME matches PREG or if PREG is NULL. */
13235
13236static bool
2d7cc5c7 13237name_matches_regex (const char *name, compiled_regex *preg)
14bc53a8
PA
13238{
13239 return (preg == NULL
f945dedf 13240 || preg->exec (ada_decode (name).c_str (), 0, NULL, 0) == 0);
14bc53a8
PA
13241}
13242
778865d3
JB
13243/* Add all exceptions defined globally whose name name match
13244 a regular expression, excluding standard exceptions.
13245
13246 The reason we exclude standard exceptions is that they need
13247 to be handled separately: Standard exceptions are defined inside
13248 a runtime unit which is normally not compiled with debugging info,
13249 and thus usually do not show up in our symbol search. However,
13250 if the unit was in fact built with debugging info, we need to
13251 exclude them because they would duplicate the entry we found
13252 during the special loop that specifically searches for those
13253 standard exceptions.
13254
13255 If PREG is not NULL, then this regexp_t object is used to
13256 perform the symbol name matching. Otherwise, no name-based
13257 filtering is performed.
13258
13259 EXCEPTIONS is a vector of exceptions to which matching exceptions
13260 gets pushed. */
13261
13262static void
2d7cc5c7 13263ada_add_global_exceptions (compiled_regex *preg,
ab816a27 13264 std::vector<ada_exc_info> *exceptions)
778865d3 13265{
14bc53a8
PA
13266 /* In Ada, the symbol "search name" is a linkage name, whereas the
13267 regular expression used to do the matching refers to the natural
13268 name. So match against the decoded name. */
13269 expand_symtabs_matching (NULL,
b5ec771e 13270 lookup_name_info::match_any (),
14bc53a8
PA
13271 [&] (const char *search_name)
13272 {
f945dedf
CB
13273 std::string decoded = ada_decode (search_name);
13274 return name_matches_regex (decoded.c_str (), preg);
14bc53a8
PA
13275 },
13276 NULL,
13277 VARIABLES_DOMAIN);
778865d3 13278
2030c079 13279 for (objfile *objfile : current_program_space->objfiles ())
778865d3 13280 {
b669c953 13281 for (compunit_symtab *s : objfile->compunits ())
778865d3 13282 {
d8aeb77f
TT
13283 const struct blockvector *bv = COMPUNIT_BLOCKVECTOR (s);
13284 int i;
778865d3 13285
d8aeb77f
TT
13286 for (i = GLOBAL_BLOCK; i <= STATIC_BLOCK; i++)
13287 {
582942f4 13288 const struct block *b = BLOCKVECTOR_BLOCK (bv, i);
d8aeb77f
TT
13289 struct block_iterator iter;
13290 struct symbol *sym;
778865d3 13291
d8aeb77f
TT
13292 ALL_BLOCK_SYMBOLS (b, iter, sym)
13293 if (ada_is_non_standard_exception_sym (sym)
987012b8 13294 && name_matches_regex (sym->natural_name (), preg))
d8aeb77f
TT
13295 {
13296 struct ada_exc_info info
987012b8 13297 = {sym->print_name (), SYMBOL_VALUE_ADDRESS (sym)};
d8aeb77f
TT
13298
13299 exceptions->push_back (info);
13300 }
13301 }
778865d3
JB
13302 }
13303 }
13304}
13305
13306/* Implements ada_exceptions_list with the regular expression passed
13307 as a regex_t, rather than a string.
13308
13309 If not NULL, PREG is used to filter out exceptions whose names
13310 do not match. Otherwise, all exceptions are listed. */
13311
ab816a27 13312static std::vector<ada_exc_info>
2d7cc5c7 13313ada_exceptions_list_1 (compiled_regex *preg)
778865d3 13314{
ab816a27 13315 std::vector<ada_exc_info> result;
778865d3
JB
13316 int prev_len;
13317
13318 /* First, list the known standard exceptions. These exceptions
13319 need to be handled separately, as they are usually defined in
13320 runtime units that have been compiled without debugging info. */
13321
13322 ada_add_standard_exceptions (preg, &result);
13323
13324 /* Next, find all exceptions whose scope is local and accessible
13325 from the currently selected frame. */
13326
13327 if (has_stack_frames ())
13328 {
ab816a27 13329 prev_len = result.size ();
778865d3
JB
13330 ada_add_exceptions_from_frame (preg, get_selected_frame (NULL),
13331 &result);
ab816a27 13332 if (result.size () > prev_len)
778865d3
JB
13333 sort_remove_dups_ada_exceptions_list (&result, prev_len);
13334 }
13335
13336 /* Add all exceptions whose scope is global. */
13337
ab816a27 13338 prev_len = result.size ();
778865d3 13339 ada_add_global_exceptions (preg, &result);
ab816a27 13340 if (result.size () > prev_len)
778865d3
JB
13341 sort_remove_dups_ada_exceptions_list (&result, prev_len);
13342
778865d3
JB
13343 return result;
13344}
13345
13346/* Return a vector of ada_exc_info.
13347
13348 If REGEXP is NULL, all exceptions are included in the result.
13349 Otherwise, it should contain a valid regular expression,
13350 and only the exceptions whose names match that regular expression
13351 are included in the result.
13352
13353 The exceptions are sorted in the following order:
13354 - Standard exceptions (defined by the Ada language), in
13355 alphabetical order;
13356 - Exceptions only visible from the current frame, in
13357 alphabetical order;
13358 - Exceptions whose scope is global, in alphabetical order. */
13359
ab816a27 13360std::vector<ada_exc_info>
778865d3
JB
13361ada_exceptions_list (const char *regexp)
13362{
2d7cc5c7
PA
13363 if (regexp == NULL)
13364 return ada_exceptions_list_1 (NULL);
778865d3 13365
2d7cc5c7
PA
13366 compiled_regex reg (regexp, REG_NOSUB, _("invalid regular expression"));
13367 return ada_exceptions_list_1 (&reg);
778865d3
JB
13368}
13369
13370/* Implement the "info exceptions" command. */
13371
13372static void
1d12d88f 13373info_exceptions_command (const char *regexp, int from_tty)
778865d3 13374{
778865d3 13375 struct gdbarch *gdbarch = get_current_arch ();
778865d3 13376
ab816a27 13377 std::vector<ada_exc_info> exceptions = ada_exceptions_list (regexp);
778865d3
JB
13378
13379 if (regexp != NULL)
13380 printf_filtered
13381 (_("All Ada exceptions matching regular expression \"%s\":\n"), regexp);
13382 else
13383 printf_filtered (_("All defined Ada exceptions:\n"));
13384
ab816a27
TT
13385 for (const ada_exc_info &info : exceptions)
13386 printf_filtered ("%s: %s\n", info.name, paddress (gdbarch, info.addr));
778865d3
JB
13387}
13388
4c4b4cd2
PH
13389 /* Operators */
13390/* Information about operators given special treatment in functions
13391 below. */
13392/* Format: OP_DEFN (<operator>, <operator length>, <# args>, <binop>). */
13393
13394#define ADA_OPERATORS \
13395 OP_DEFN (OP_VAR_VALUE, 4, 0, 0) \
13396 OP_DEFN (BINOP_IN_BOUNDS, 3, 2, 0) \
13397 OP_DEFN (TERNOP_IN_RANGE, 1, 3, 0) \
13398 OP_DEFN (OP_ATR_FIRST, 1, 2, 0) \
13399 OP_DEFN (OP_ATR_LAST, 1, 2, 0) \
13400 OP_DEFN (OP_ATR_LENGTH, 1, 2, 0) \
13401 OP_DEFN (OP_ATR_IMAGE, 1, 2, 0) \
13402 OP_DEFN (OP_ATR_MAX, 1, 3, 0) \
13403 OP_DEFN (OP_ATR_MIN, 1, 3, 0) \
13404 OP_DEFN (OP_ATR_MODULUS, 1, 1, 0) \
13405 OP_DEFN (OP_ATR_POS, 1, 2, 0) \
13406 OP_DEFN (OP_ATR_SIZE, 1, 1, 0) \
13407 OP_DEFN (OP_ATR_TAG, 1, 1, 0) \
13408 OP_DEFN (OP_ATR_VAL, 1, 2, 0) \
13409 OP_DEFN (UNOP_QUAL, 3, 1, 0) \
52ce6436
PH
13410 OP_DEFN (UNOP_IN_RANGE, 3, 1, 0) \
13411 OP_DEFN (OP_OTHERS, 1, 1, 0) \
13412 OP_DEFN (OP_POSITIONAL, 3, 1, 0) \
13413 OP_DEFN (OP_DISCRETE_RANGE, 1, 2, 0)
4c4b4cd2
PH
13414
13415static void
554794dc
SDJ
13416ada_operator_length (const struct expression *exp, int pc, int *oplenp,
13417 int *argsp)
4c4b4cd2
PH
13418{
13419 switch (exp->elts[pc - 1].opcode)
13420 {
76a01679 13421 default:
4c4b4cd2
PH
13422 operator_length_standard (exp, pc, oplenp, argsp);
13423 break;
13424
13425#define OP_DEFN(op, len, args, binop) \
13426 case op: *oplenp = len; *argsp = args; break;
13427 ADA_OPERATORS;
13428#undef OP_DEFN
52ce6436
PH
13429
13430 case OP_AGGREGATE:
13431 *oplenp = 3;
13432 *argsp = longest_to_int (exp->elts[pc - 2].longconst);
13433 break;
13434
13435 case OP_CHOICES:
13436 *oplenp = 3;
13437 *argsp = longest_to_int (exp->elts[pc - 2].longconst) + 1;
13438 break;
4c4b4cd2
PH
13439 }
13440}
13441
c0201579
JK
13442/* Implementation of the exp_descriptor method operator_check. */
13443
13444static int
13445ada_operator_check (struct expression *exp, int pos,
13446 int (*objfile_func) (struct objfile *objfile, void *data),
13447 void *data)
13448{
13449 const union exp_element *const elts = exp->elts;
13450 struct type *type = NULL;
13451
13452 switch (elts[pos].opcode)
13453 {
13454 case UNOP_IN_RANGE:
13455 case UNOP_QUAL:
13456 type = elts[pos + 1].type;
13457 break;
13458
13459 default:
13460 return operator_check_standard (exp, pos, objfile_func, data);
13461 }
13462
13463 /* Invoke callbacks for TYPE and OBJFILE if they were set as non-NULL. */
13464
13465 if (type && TYPE_OBJFILE (type)
13466 && (*objfile_func) (TYPE_OBJFILE (type), data))
13467 return 1;
13468
13469 return 0;
13470}
13471
a121b7c1 13472static const char *
4c4b4cd2
PH
13473ada_op_name (enum exp_opcode opcode)
13474{
13475 switch (opcode)
13476 {
76a01679 13477 default:
4c4b4cd2 13478 return op_name_standard (opcode);
52ce6436 13479
4c4b4cd2
PH
13480#define OP_DEFN(op, len, args, binop) case op: return #op;
13481 ADA_OPERATORS;
13482#undef OP_DEFN
52ce6436
PH
13483
13484 case OP_AGGREGATE:
13485 return "OP_AGGREGATE";
13486 case OP_CHOICES:
13487 return "OP_CHOICES";
13488 case OP_NAME:
13489 return "OP_NAME";
4c4b4cd2
PH
13490 }
13491}
13492
13493/* As for operator_length, but assumes PC is pointing at the first
13494 element of the operator, and gives meaningful results only for the
52ce6436 13495 Ada-specific operators, returning 0 for *OPLENP and *ARGSP otherwise. */
4c4b4cd2
PH
13496
13497static void
76a01679
JB
13498ada_forward_operator_length (struct expression *exp, int pc,
13499 int *oplenp, int *argsp)
4c4b4cd2 13500{
76a01679 13501 switch (exp->elts[pc].opcode)
4c4b4cd2
PH
13502 {
13503 default:
13504 *oplenp = *argsp = 0;
13505 break;
52ce6436 13506
4c4b4cd2
PH
13507#define OP_DEFN(op, len, args, binop) \
13508 case op: *oplenp = len; *argsp = args; break;
13509 ADA_OPERATORS;
13510#undef OP_DEFN
52ce6436
PH
13511
13512 case OP_AGGREGATE:
13513 *oplenp = 3;
13514 *argsp = longest_to_int (exp->elts[pc + 1].longconst);
13515 break;
13516
13517 case OP_CHOICES:
13518 *oplenp = 3;
13519 *argsp = longest_to_int (exp->elts[pc + 1].longconst) + 1;
13520 break;
13521
13522 case OP_STRING:
13523 case OP_NAME:
13524 {
13525 int len = longest_to_int (exp->elts[pc + 1].longconst);
5b4ee69b 13526
52ce6436
PH
13527 *oplenp = 4 + BYTES_TO_EXP_ELEM (len + 1);
13528 *argsp = 0;
13529 break;
13530 }
4c4b4cd2
PH
13531 }
13532}
13533
13534static int
13535ada_dump_subexp_body (struct expression *exp, struct ui_file *stream, int elt)
13536{
13537 enum exp_opcode op = exp->elts[elt].opcode;
13538 int oplen, nargs;
13539 int pc = elt;
13540 int i;
76a01679 13541
4c4b4cd2
PH
13542 ada_forward_operator_length (exp, elt, &oplen, &nargs);
13543
76a01679 13544 switch (op)
4c4b4cd2 13545 {
76a01679 13546 /* Ada attributes ('Foo). */
4c4b4cd2
PH
13547 case OP_ATR_FIRST:
13548 case OP_ATR_LAST:
13549 case OP_ATR_LENGTH:
13550 case OP_ATR_IMAGE:
13551 case OP_ATR_MAX:
13552 case OP_ATR_MIN:
13553 case OP_ATR_MODULUS:
13554 case OP_ATR_POS:
13555 case OP_ATR_SIZE:
13556 case OP_ATR_TAG:
13557 case OP_ATR_VAL:
13558 break;
13559
13560 case UNOP_IN_RANGE:
13561 case UNOP_QUAL:
323e0a4a
AC
13562 /* XXX: gdb_sprint_host_address, type_sprint */
13563 fprintf_filtered (stream, _("Type @"));
4c4b4cd2
PH
13564 gdb_print_host_address (exp->elts[pc + 1].type, stream);
13565 fprintf_filtered (stream, " (");
13566 type_print (exp->elts[pc + 1].type, NULL, stream, 0);
13567 fprintf_filtered (stream, ")");
13568 break;
13569 case BINOP_IN_BOUNDS:
52ce6436
PH
13570 fprintf_filtered (stream, " (%d)",
13571 longest_to_int (exp->elts[pc + 2].longconst));
4c4b4cd2
PH
13572 break;
13573 case TERNOP_IN_RANGE:
13574 break;
13575
52ce6436
PH
13576 case OP_AGGREGATE:
13577 case OP_OTHERS:
13578 case OP_DISCRETE_RANGE:
13579 case OP_POSITIONAL:
13580 case OP_CHOICES:
13581 break;
13582
13583 case OP_NAME:
13584 case OP_STRING:
13585 {
13586 char *name = &exp->elts[elt + 2].string;
13587 int len = longest_to_int (exp->elts[elt + 1].longconst);
5b4ee69b 13588
52ce6436
PH
13589 fprintf_filtered (stream, "Text: `%.*s'", len, name);
13590 break;
13591 }
13592
4c4b4cd2
PH
13593 default:
13594 return dump_subexp_body_standard (exp, stream, elt);
13595 }
13596
13597 elt += oplen;
13598 for (i = 0; i < nargs; i += 1)
13599 elt = dump_subexp (exp, stream, elt);
13600
13601 return elt;
13602}
13603
13604/* The Ada extension of print_subexp (q.v.). */
13605
76a01679
JB
13606static void
13607ada_print_subexp (struct expression *exp, int *pos,
13608 struct ui_file *stream, enum precedence prec)
4c4b4cd2 13609{
52ce6436 13610 int oplen, nargs, i;
4c4b4cd2
PH
13611 int pc = *pos;
13612 enum exp_opcode op = exp->elts[pc].opcode;
13613
13614 ada_forward_operator_length (exp, pc, &oplen, &nargs);
13615
52ce6436 13616 *pos += oplen;
4c4b4cd2
PH
13617 switch (op)
13618 {
13619 default:
52ce6436 13620 *pos -= oplen;
4c4b4cd2
PH
13621 print_subexp_standard (exp, pos, stream, prec);
13622 return;
13623
13624 case OP_VAR_VALUE:
987012b8 13625 fputs_filtered (exp->elts[pc + 2].symbol->natural_name (), stream);
4c4b4cd2
PH
13626 return;
13627
13628 case BINOP_IN_BOUNDS:
323e0a4a 13629 /* XXX: sprint_subexp */
4c4b4cd2 13630 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13631 fputs_filtered (" in ", stream);
4c4b4cd2 13632 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13633 fputs_filtered ("'range", stream);
4c4b4cd2 13634 if (exp->elts[pc + 1].longconst > 1)
76a01679
JB
13635 fprintf_filtered (stream, "(%ld)",
13636 (long) exp->elts[pc + 1].longconst);
4c4b4cd2
PH
13637 return;
13638
13639 case TERNOP_IN_RANGE:
4c4b4cd2 13640 if (prec >= PREC_EQUAL)
76a01679 13641 fputs_filtered ("(", stream);
323e0a4a 13642 /* XXX: sprint_subexp */
4c4b4cd2 13643 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13644 fputs_filtered (" in ", stream);
4c4b4cd2
PH
13645 print_subexp (exp, pos, stream, PREC_EQUAL);
13646 fputs_filtered (" .. ", stream);
13647 print_subexp (exp, pos, stream, PREC_EQUAL);
13648 if (prec >= PREC_EQUAL)
76a01679
JB
13649 fputs_filtered (")", stream);
13650 return;
4c4b4cd2
PH
13651
13652 case OP_ATR_FIRST:
13653 case OP_ATR_LAST:
13654 case OP_ATR_LENGTH:
13655 case OP_ATR_IMAGE:
13656 case OP_ATR_MAX:
13657 case OP_ATR_MIN:
13658 case OP_ATR_MODULUS:
13659 case OP_ATR_POS:
13660 case OP_ATR_SIZE:
13661 case OP_ATR_TAG:
13662 case OP_ATR_VAL:
4c4b4cd2 13663 if (exp->elts[*pos].opcode == OP_TYPE)
76a01679
JB
13664 {
13665 if (TYPE_CODE (exp->elts[*pos + 1].type) != TYPE_CODE_VOID)
79d43c61
TT
13666 LA_PRINT_TYPE (exp->elts[*pos + 1].type, "", stream, 0, 0,
13667 &type_print_raw_options);
76a01679
JB
13668 *pos += 3;
13669 }
4c4b4cd2 13670 else
76a01679 13671 print_subexp (exp, pos, stream, PREC_SUFFIX);
4c4b4cd2
PH
13672 fprintf_filtered (stream, "'%s", ada_attribute_name (op));
13673 if (nargs > 1)
76a01679
JB
13674 {
13675 int tem;
5b4ee69b 13676
76a01679
JB
13677 for (tem = 1; tem < nargs; tem += 1)
13678 {
13679 fputs_filtered ((tem == 1) ? " (" : ", ", stream);
13680 print_subexp (exp, pos, stream, PREC_ABOVE_COMMA);
13681 }
13682 fputs_filtered (")", stream);
13683 }
4c4b4cd2 13684 return;
14f9c5c9 13685
4c4b4cd2 13686 case UNOP_QUAL:
4c4b4cd2
PH
13687 type_print (exp->elts[pc + 1].type, "", stream, 0);
13688 fputs_filtered ("'(", stream);
13689 print_subexp (exp, pos, stream, PREC_PREFIX);
13690 fputs_filtered (")", stream);
13691 return;
14f9c5c9 13692
4c4b4cd2 13693 case UNOP_IN_RANGE:
323e0a4a 13694 /* XXX: sprint_subexp */
4c4b4cd2 13695 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13696 fputs_filtered (" in ", stream);
79d43c61
TT
13697 LA_PRINT_TYPE (exp->elts[pc + 1].type, "", stream, 1, 0,
13698 &type_print_raw_options);
4c4b4cd2 13699 return;
52ce6436
PH
13700
13701 case OP_DISCRETE_RANGE:
13702 print_subexp (exp, pos, stream, PREC_SUFFIX);
13703 fputs_filtered ("..", stream);
13704 print_subexp (exp, pos, stream, PREC_SUFFIX);
13705 return;
13706
13707 case OP_OTHERS:
13708 fputs_filtered ("others => ", stream);
13709 print_subexp (exp, pos, stream, PREC_SUFFIX);
13710 return;
13711
13712 case OP_CHOICES:
13713 for (i = 0; i < nargs-1; i += 1)
13714 {
13715 if (i > 0)
13716 fputs_filtered ("|", stream);
13717 print_subexp (exp, pos, stream, PREC_SUFFIX);
13718 }
13719 fputs_filtered (" => ", stream);
13720 print_subexp (exp, pos, stream, PREC_SUFFIX);
13721 return;
13722
13723 case OP_POSITIONAL:
13724 print_subexp (exp, pos, stream, PREC_SUFFIX);
13725 return;
13726
13727 case OP_AGGREGATE:
13728 fputs_filtered ("(", stream);
13729 for (i = 0; i < nargs; i += 1)
13730 {
13731 if (i > 0)
13732 fputs_filtered (", ", stream);
13733 print_subexp (exp, pos, stream, PREC_SUFFIX);
13734 }
13735 fputs_filtered (")", stream);
13736 return;
4c4b4cd2
PH
13737 }
13738}
14f9c5c9
AS
13739
13740/* Table mapping opcodes into strings for printing operators
13741 and precedences of the operators. */
13742
d2e4a39e
AS
13743static const struct op_print ada_op_print_tab[] = {
13744 {":=", BINOP_ASSIGN, PREC_ASSIGN, 1},
13745 {"or else", BINOP_LOGICAL_OR, PREC_LOGICAL_OR, 0},
13746 {"and then", BINOP_LOGICAL_AND, PREC_LOGICAL_AND, 0},
13747 {"or", BINOP_BITWISE_IOR, PREC_BITWISE_IOR, 0},
13748 {"xor", BINOP_BITWISE_XOR, PREC_BITWISE_XOR, 0},
13749 {"and", BINOP_BITWISE_AND, PREC_BITWISE_AND, 0},
13750 {"=", BINOP_EQUAL, PREC_EQUAL, 0},
13751 {"/=", BINOP_NOTEQUAL, PREC_EQUAL, 0},
13752 {"<=", BINOP_LEQ, PREC_ORDER, 0},
13753 {">=", BINOP_GEQ, PREC_ORDER, 0},
13754 {">", BINOP_GTR, PREC_ORDER, 0},
13755 {"<", BINOP_LESS, PREC_ORDER, 0},
13756 {">>", BINOP_RSH, PREC_SHIFT, 0},
13757 {"<<", BINOP_LSH, PREC_SHIFT, 0},
13758 {"+", BINOP_ADD, PREC_ADD, 0},
13759 {"-", BINOP_SUB, PREC_ADD, 0},
13760 {"&", BINOP_CONCAT, PREC_ADD, 0},
13761 {"*", BINOP_MUL, PREC_MUL, 0},
13762 {"/", BINOP_DIV, PREC_MUL, 0},
13763 {"rem", BINOP_REM, PREC_MUL, 0},
13764 {"mod", BINOP_MOD, PREC_MUL, 0},
13765 {"**", BINOP_EXP, PREC_REPEAT, 0},
13766 {"@", BINOP_REPEAT, PREC_REPEAT, 0},
13767 {"-", UNOP_NEG, PREC_PREFIX, 0},
13768 {"+", UNOP_PLUS, PREC_PREFIX, 0},
13769 {"not ", UNOP_LOGICAL_NOT, PREC_PREFIX, 0},
13770 {"not ", UNOP_COMPLEMENT, PREC_PREFIX, 0},
13771 {"abs ", UNOP_ABS, PREC_PREFIX, 0},
4c4b4cd2
PH
13772 {".all", UNOP_IND, PREC_SUFFIX, 1},
13773 {"'access", UNOP_ADDR, PREC_SUFFIX, 1},
13774 {"'size", OP_ATR_SIZE, PREC_SUFFIX, 1},
f486487f 13775 {NULL, OP_NULL, PREC_SUFFIX, 0}
14f9c5c9
AS
13776};
13777\f
72d5681a
PH
13778enum ada_primitive_types {
13779 ada_primitive_type_int,
13780 ada_primitive_type_long,
13781 ada_primitive_type_short,
13782 ada_primitive_type_char,
13783 ada_primitive_type_float,
13784 ada_primitive_type_double,
13785 ada_primitive_type_void,
13786 ada_primitive_type_long_long,
13787 ada_primitive_type_long_double,
13788 ada_primitive_type_natural,
13789 ada_primitive_type_positive,
13790 ada_primitive_type_system_address,
08f49010 13791 ada_primitive_type_storage_offset,
72d5681a
PH
13792 nr_ada_primitive_types
13793};
6c038f32
PH
13794
13795static void
d4a9a881 13796ada_language_arch_info (struct gdbarch *gdbarch,
72d5681a
PH
13797 struct language_arch_info *lai)
13798{
d4a9a881 13799 const struct builtin_type *builtin = builtin_type (gdbarch);
5b4ee69b 13800
72d5681a 13801 lai->primitive_type_vector
d4a9a881 13802 = GDBARCH_OBSTACK_CALLOC (gdbarch, nr_ada_primitive_types + 1,
72d5681a 13803 struct type *);
e9bb382b
UW
13804
13805 lai->primitive_type_vector [ada_primitive_type_int]
13806 = arch_integer_type (gdbarch, gdbarch_int_bit (gdbarch),
13807 0, "integer");
13808 lai->primitive_type_vector [ada_primitive_type_long]
13809 = arch_integer_type (gdbarch, gdbarch_long_bit (gdbarch),
13810 0, "long_integer");
13811 lai->primitive_type_vector [ada_primitive_type_short]
13812 = arch_integer_type (gdbarch, gdbarch_short_bit (gdbarch),
13813 0, "short_integer");
13814 lai->string_char_type
13815 = lai->primitive_type_vector [ada_primitive_type_char]
cd7c1778 13816 = arch_character_type (gdbarch, TARGET_CHAR_BIT, 0, "character");
e9bb382b
UW
13817 lai->primitive_type_vector [ada_primitive_type_float]
13818 = arch_float_type (gdbarch, gdbarch_float_bit (gdbarch),
49f190bc 13819 "float", gdbarch_float_format (gdbarch));
e9bb382b
UW
13820 lai->primitive_type_vector [ada_primitive_type_double]
13821 = arch_float_type (gdbarch, gdbarch_double_bit (gdbarch),
49f190bc 13822 "long_float", gdbarch_double_format (gdbarch));
e9bb382b
UW
13823 lai->primitive_type_vector [ada_primitive_type_long_long]
13824 = arch_integer_type (gdbarch, gdbarch_long_long_bit (gdbarch),
13825 0, "long_long_integer");
13826 lai->primitive_type_vector [ada_primitive_type_long_double]
5f3bceb6 13827 = arch_float_type (gdbarch, gdbarch_long_double_bit (gdbarch),
49f190bc 13828 "long_long_float", gdbarch_long_double_format (gdbarch));
e9bb382b
UW
13829 lai->primitive_type_vector [ada_primitive_type_natural]
13830 = arch_integer_type (gdbarch, gdbarch_int_bit (gdbarch),
13831 0, "natural");
13832 lai->primitive_type_vector [ada_primitive_type_positive]
13833 = arch_integer_type (gdbarch, gdbarch_int_bit (gdbarch),
13834 0, "positive");
13835 lai->primitive_type_vector [ada_primitive_type_void]
13836 = builtin->builtin_void;
13837
13838 lai->primitive_type_vector [ada_primitive_type_system_address]
77b7c781
UW
13839 = lookup_pointer_type (arch_type (gdbarch, TYPE_CODE_VOID, TARGET_CHAR_BIT,
13840 "void"));
72d5681a
PH
13841 TYPE_NAME (lai->primitive_type_vector [ada_primitive_type_system_address])
13842 = "system__address";
fbb06eb1 13843
08f49010
XR
13844 /* Create the equivalent of the System.Storage_Elements.Storage_Offset
13845 type. This is a signed integral type whose size is the same as
13846 the size of addresses. */
13847 {
13848 unsigned int addr_length = TYPE_LENGTH
13849 (lai->primitive_type_vector [ada_primitive_type_system_address]);
13850
13851 lai->primitive_type_vector [ada_primitive_type_storage_offset]
13852 = arch_integer_type (gdbarch, addr_length * HOST_CHAR_BIT, 0,
13853 "storage_offset");
13854 }
13855
47e729a8 13856 lai->bool_type_symbol = NULL;
fbb06eb1 13857 lai->bool_type_default = builtin->builtin_bool;
6c038f32 13858}
6c038f32
PH
13859\f
13860 /* Language vector */
13861
13862/* Not really used, but needed in the ada_language_defn. */
13863
13864static void
6c7a06a3 13865emit_char (int c, struct type *type, struct ui_file *stream, int quoter)
6c038f32 13866{
6c7a06a3 13867 ada_emit_char (c, type, stream, quoter, 1);
6c038f32
PH
13868}
13869
13870static int
410a0ff2 13871parse (struct parser_state *ps)
6c038f32
PH
13872{
13873 warnings_issued = 0;
410a0ff2 13874 return ada_parse (ps);
6c038f32
PH
13875}
13876
13877static const struct exp_descriptor ada_exp_descriptor = {
13878 ada_print_subexp,
13879 ada_operator_length,
c0201579 13880 ada_operator_check,
6c038f32
PH
13881 ada_op_name,
13882 ada_dump_subexp_body,
13883 ada_evaluate_subexp
13884};
13885
b5ec771e
PA
13886/* symbol_name_matcher_ftype adapter for wild_match. */
13887
13888static bool
13889do_wild_match (const char *symbol_search_name,
13890 const lookup_name_info &lookup_name,
a207cff2 13891 completion_match_result *comp_match_res)
b5ec771e
PA
13892{
13893 return wild_match (symbol_search_name, ada_lookup_name (lookup_name));
13894}
13895
13896/* symbol_name_matcher_ftype adapter for full_match. */
13897
13898static bool
13899do_full_match (const char *symbol_search_name,
13900 const lookup_name_info &lookup_name,
a207cff2 13901 completion_match_result *comp_match_res)
b5ec771e
PA
13902{
13903 return full_match (symbol_search_name, ada_lookup_name (lookup_name));
13904}
13905
a2cd4f14
JB
13906/* symbol_name_matcher_ftype for exact (verbatim) matches. */
13907
13908static bool
13909do_exact_match (const char *symbol_search_name,
13910 const lookup_name_info &lookup_name,
13911 completion_match_result *comp_match_res)
13912{
13913 return strcmp (symbol_search_name, ada_lookup_name (lookup_name)) == 0;
13914}
13915
b5ec771e
PA
13916/* Build the Ada lookup name for LOOKUP_NAME. */
13917
13918ada_lookup_name_info::ada_lookup_name_info (const lookup_name_info &lookup_name)
13919{
e0802d59 13920 gdb::string_view user_name = lookup_name.name ();
b5ec771e
PA
13921
13922 if (user_name[0] == '<')
13923 {
13924 if (user_name.back () == '>')
e0802d59
TT
13925 m_encoded_name
13926 = user_name.substr (1, user_name.size () - 2).to_string ();
b5ec771e 13927 else
e0802d59
TT
13928 m_encoded_name
13929 = user_name.substr (1, user_name.size () - 1).to_string ();
b5ec771e
PA
13930 m_encoded_p = true;
13931 m_verbatim_p = true;
13932 m_wild_match_p = false;
13933 m_standard_p = false;
13934 }
13935 else
13936 {
13937 m_verbatim_p = false;
13938
e0802d59 13939 m_encoded_p = user_name.find ("__") != gdb::string_view::npos;
b5ec771e
PA
13940
13941 if (!m_encoded_p)
13942 {
e0802d59 13943 const char *folded = ada_fold_name (user_name);
b5ec771e
PA
13944 const char *encoded = ada_encode_1 (folded, false);
13945 if (encoded != NULL)
13946 m_encoded_name = encoded;
13947 else
e0802d59 13948 m_encoded_name = user_name.to_string ();
b5ec771e
PA
13949 }
13950 else
e0802d59 13951 m_encoded_name = user_name.to_string ();
b5ec771e
PA
13952
13953 /* Handle the 'package Standard' special case. See description
13954 of m_standard_p. */
13955 if (startswith (m_encoded_name.c_str (), "standard__"))
13956 {
13957 m_encoded_name = m_encoded_name.substr (sizeof ("standard__") - 1);
13958 m_standard_p = true;
13959 }
13960 else
13961 m_standard_p = false;
74ccd7f5 13962
b5ec771e
PA
13963 /* If the name contains a ".", then the user is entering a fully
13964 qualified entity name, and the match must not be done in wild
13965 mode. Similarly, if the user wants to complete what looks
13966 like an encoded name, the match must not be done in wild
13967 mode. Also, in the standard__ special case always do
13968 non-wild matching. */
13969 m_wild_match_p
13970 = (lookup_name.match_type () != symbol_name_match_type::FULL
13971 && !m_encoded_p
13972 && !m_standard_p
13973 && user_name.find ('.') == std::string::npos);
13974 }
13975}
13976
13977/* symbol_name_matcher_ftype method for Ada. This only handles
13978 completion mode. */
13979
13980static bool
13981ada_symbol_name_matches (const char *symbol_search_name,
13982 const lookup_name_info &lookup_name,
a207cff2 13983 completion_match_result *comp_match_res)
74ccd7f5 13984{
b5ec771e
PA
13985 return lookup_name.ada ().matches (symbol_search_name,
13986 lookup_name.match_type (),
a207cff2 13987 comp_match_res);
b5ec771e
PA
13988}
13989
de63c46b
PA
13990/* A name matcher that matches the symbol name exactly, with
13991 strcmp. */
13992
13993static bool
13994literal_symbol_name_matcher (const char *symbol_search_name,
13995 const lookup_name_info &lookup_name,
13996 completion_match_result *comp_match_res)
13997{
e0802d59 13998 gdb::string_view name_view = lookup_name.name ();
de63c46b 13999
e0802d59
TT
14000 if (lookup_name.completion_mode ()
14001 ? (strncmp (symbol_search_name, name_view.data (),
14002 name_view.size ()) == 0)
14003 : symbol_search_name == name_view)
de63c46b
PA
14004 {
14005 if (comp_match_res != NULL)
14006 comp_match_res->set_match (symbol_search_name);
14007 return true;
14008 }
14009 else
14010 return false;
14011}
14012
b5ec771e
PA
14013/* Implement the "la_get_symbol_name_matcher" language_defn method for
14014 Ada. */
14015
14016static symbol_name_matcher_ftype *
14017ada_get_symbol_name_matcher (const lookup_name_info &lookup_name)
14018{
de63c46b
PA
14019 if (lookup_name.match_type () == symbol_name_match_type::SEARCH_NAME)
14020 return literal_symbol_name_matcher;
14021
b5ec771e
PA
14022 if (lookup_name.completion_mode ())
14023 return ada_symbol_name_matches;
74ccd7f5 14024 else
b5ec771e
PA
14025 {
14026 if (lookup_name.ada ().wild_match_p ())
14027 return do_wild_match;
a2cd4f14
JB
14028 else if (lookup_name.ada ().verbatim_p ())
14029 return do_exact_match;
b5ec771e
PA
14030 else
14031 return do_full_match;
14032 }
74ccd7f5
JB
14033}
14034
a5ee536b
JB
14035/* Implement the "la_read_var_value" language_defn method for Ada. */
14036
14037static struct value *
63e43d3a
PMR
14038ada_read_var_value (struct symbol *var, const struct block *var_block,
14039 struct frame_info *frame)
a5ee536b 14040{
a5ee536b
JB
14041 /* The only case where default_read_var_value is not sufficient
14042 is when VAR is a renaming... */
c0e70c62
TT
14043 if (frame != nullptr)
14044 {
14045 const struct block *frame_block = get_frame_block (frame, NULL);
14046 if (frame_block != nullptr && ada_is_renaming_symbol (var))
14047 return ada_read_renaming_var_value (var, frame_block);
14048 }
a5ee536b
JB
14049
14050 /* This is a typical case where we expect the default_read_var_value
14051 function to work. */
63e43d3a 14052 return default_read_var_value (var, var_block, frame);
a5ee536b
JB
14053}
14054
56618e20
TT
14055static const char *ada_extensions[] =
14056{
14057 ".adb", ".ads", ".a", ".ada", ".dg", NULL
14058};
14059
47e77640 14060extern const struct language_defn ada_language_defn = {
6c038f32 14061 "ada", /* Language name */
6abde28f 14062 "Ada",
6c038f32 14063 language_ada,
6c038f32 14064 range_check_off,
6c038f32
PH
14065 case_sensitive_on, /* Yes, Ada is case-insensitive, but
14066 that's not quite what this means. */
6c038f32 14067 array_row_major,
9a044a89 14068 macro_expansion_no,
56618e20 14069 ada_extensions,
6c038f32
PH
14070 &ada_exp_descriptor,
14071 parse,
6c038f32
PH
14072 resolve,
14073 ada_printchar, /* Print a character constant */
14074 ada_printstr, /* Function to print string constant */
14075 emit_char, /* Function to print single char (not used) */
6c038f32 14076 ada_print_type, /* Print a type using appropriate syntax */
be942545 14077 ada_print_typedef, /* Print a typedef using appropriate syntax */
26792ee0 14078 ada_value_print_inner, /* la_value_print_inner */
6c038f32 14079 ada_value_print, /* Print a top-level value */
a5ee536b 14080 ada_read_var_value, /* la_read_var_value */
6c038f32 14081 NULL, /* Language specific skip_trampoline */
2b2d9e11 14082 NULL, /* name_of_this */
59cc4834 14083 true, /* la_store_sym_names_in_linkage_form_p */
6c038f32
PH
14084 ada_lookup_symbol_nonlocal, /* Looking up non-local symbols. */
14085 basic_lookup_transparent_type, /* lookup_transparent_type */
14086 ada_la_decode, /* Language specific symbol demangler */
8b302db8 14087 ada_sniff_from_mangled_name,
0963b4bd
MS
14088 NULL, /* Language specific
14089 class_name_from_physname */
6c038f32
PH
14090 ada_op_print_tab, /* expression operators for printing */
14091 0, /* c-style arrays */
14092 1, /* String lower bound */
6c038f32 14093 ada_get_gdb_completer_word_break_characters,
eb3ff9a5 14094 ada_collect_symbol_completion_matches,
72d5681a 14095 ada_language_arch_info,
e79af960 14096 ada_print_array_index,
41f1b697 14097 default_pass_by_reference,
e2b7af72 14098 ada_watch_location_expression,
b5ec771e 14099 ada_get_symbol_name_matcher, /* la_get_symbol_name_matcher */
f8eba3c6 14100 ada_iterate_over_symbols,
5ffa0793 14101 default_search_name_hash,
a53b64ea 14102 &ada_varobj_ops,
bb2ec1b3 14103 NULL,
721b08c6 14104 NULL,
4be290b2 14105 ada_is_string_type,
721b08c6 14106 "(...)" /* la_struct_too_deep_ellipsis */
6c038f32
PH
14107};
14108
5bf03f13
JB
14109/* Command-list for the "set/show ada" prefix command. */
14110static struct cmd_list_element *set_ada_list;
14111static struct cmd_list_element *show_ada_list;
14112
2060206e
PA
14113static void
14114initialize_ada_catchpoint_ops (void)
14115{
14116 struct breakpoint_ops *ops;
14117
14118 initialize_breakpoint_ops ();
14119
14120 ops = &catch_exception_breakpoint_ops;
14121 *ops = bkpt_breakpoint_ops;
37f6a7f4
TT
14122 ops->allocate_location = allocate_location_exception;
14123 ops->re_set = re_set_exception;
14124 ops->check_status = check_status_exception;
14125 ops->print_it = print_it_exception;
14126 ops->print_one = print_one_exception;
14127 ops->print_mention = print_mention_exception;
14128 ops->print_recreate = print_recreate_exception;
2060206e
PA
14129
14130 ops = &catch_exception_unhandled_breakpoint_ops;
14131 *ops = bkpt_breakpoint_ops;
37f6a7f4
TT
14132 ops->allocate_location = allocate_location_exception;
14133 ops->re_set = re_set_exception;
14134 ops->check_status = check_status_exception;
14135 ops->print_it = print_it_exception;
14136 ops->print_one = print_one_exception;
14137 ops->print_mention = print_mention_exception;
14138 ops->print_recreate = print_recreate_exception;
2060206e
PA
14139
14140 ops = &catch_assert_breakpoint_ops;
14141 *ops = bkpt_breakpoint_ops;
37f6a7f4
TT
14142 ops->allocate_location = allocate_location_exception;
14143 ops->re_set = re_set_exception;
14144 ops->check_status = check_status_exception;
14145 ops->print_it = print_it_exception;
14146 ops->print_one = print_one_exception;
14147 ops->print_mention = print_mention_exception;
14148 ops->print_recreate = print_recreate_exception;
9f757bf7
XR
14149
14150 ops = &catch_handlers_breakpoint_ops;
14151 *ops = bkpt_breakpoint_ops;
37f6a7f4
TT
14152 ops->allocate_location = allocate_location_exception;
14153 ops->re_set = re_set_exception;
14154 ops->check_status = check_status_exception;
14155 ops->print_it = print_it_exception;
14156 ops->print_one = print_one_exception;
14157 ops->print_mention = print_mention_exception;
14158 ops->print_recreate = print_recreate_exception;
2060206e
PA
14159}
14160
3d9434b5
JB
14161/* This module's 'new_objfile' observer. */
14162
14163static void
14164ada_new_objfile_observer (struct objfile *objfile)
14165{
14166 ada_clear_symbol_cache ();
14167}
14168
14169/* This module's 'free_objfile' observer. */
14170
14171static void
14172ada_free_objfile_observer (struct objfile *objfile)
14173{
14174 ada_clear_symbol_cache ();
14175}
14176
6c265988 14177void _initialize_ada_language ();
d2e4a39e 14178void
6c265988 14179_initialize_ada_language ()
14f9c5c9 14180{
2060206e
PA
14181 initialize_ada_catchpoint_ops ();
14182
0743fc83
TT
14183 add_basic_prefix_cmd ("ada", no_class,
14184 _("Prefix command for changing Ada-specific settings."),
14185 &set_ada_list, "set ada ", 0, &setlist);
5bf03f13 14186
0743fc83
TT
14187 add_show_prefix_cmd ("ada", no_class,
14188 _("Generic command for showing Ada-specific settings."),
14189 &show_ada_list, "show ada ", 0, &showlist);
5bf03f13
JB
14190
14191 add_setshow_boolean_cmd ("trust-PAD-over-XVS", class_obscure,
14192 &trust_pad_over_xvs, _("\
590042fc
PW
14193Enable or disable an optimization trusting PAD types over XVS types."), _("\
14194Show whether an optimization trusting PAD types over XVS types is activated."),
5bf03f13
JB
14195 _("\
14196This is related to the encoding used by the GNAT compiler. The debugger\n\
14197should normally trust the contents of PAD types, but certain older versions\n\
14198of GNAT have a bug that sometimes causes the information in the PAD type\n\
14199to be incorrect. Turning this setting \"off\" allows the debugger to\n\
14200work around this bug. It is always safe to turn this option \"off\", but\n\
14201this incurs a slight performance penalty, so it is recommended to NOT change\n\
14202this option to \"off\" unless necessary."),
14203 NULL, NULL, &set_ada_list, &show_ada_list);
14204
d72413e6
PMR
14205 add_setshow_boolean_cmd ("print-signatures", class_vars,
14206 &print_signatures, _("\
14207Enable or disable the output of formal and return types for functions in the \
590042fc 14208overloads selection menu."), _("\
d72413e6 14209Show whether the output of formal and return types for functions in the \
590042fc 14210overloads selection menu is activated."),
d72413e6
PMR
14211 NULL, NULL, NULL, &set_ada_list, &show_ada_list);
14212
9ac4176b
PA
14213 add_catch_command ("exception", _("\
14214Catch Ada exceptions, when raised.\n\
9bf7038b 14215Usage: catch exception [ARG] [if CONDITION]\n\
60a90376
JB
14216Without any argument, stop when any Ada exception is raised.\n\
14217If ARG is \"unhandled\" (without the quotes), only stop when the exception\n\
14218being raised does not have a handler (and will therefore lead to the task's\n\
14219termination).\n\
14220Otherwise, the catchpoint only stops when the name of the exception being\n\
9bf7038b
TT
14221raised is the same as ARG.\n\
14222CONDITION is a boolean expression that is evaluated to see whether the\n\
14223exception should cause a stop."),
9ac4176b 14224 catch_ada_exception_command,
71bed2db 14225 catch_ada_completer,
9ac4176b
PA
14226 CATCH_PERMANENT,
14227 CATCH_TEMPORARY);
9f757bf7
XR
14228
14229 add_catch_command ("handlers", _("\
14230Catch Ada exceptions, when handled.\n\
9bf7038b
TT
14231Usage: catch handlers [ARG] [if CONDITION]\n\
14232Without any argument, stop when any Ada exception is handled.\n\
14233With an argument, catch only exceptions with the given name.\n\
14234CONDITION is a boolean expression that is evaluated to see whether the\n\
14235exception should cause a stop."),
9f757bf7 14236 catch_ada_handlers_command,
71bed2db 14237 catch_ada_completer,
9f757bf7
XR
14238 CATCH_PERMANENT,
14239 CATCH_TEMPORARY);
9ac4176b
PA
14240 add_catch_command ("assert", _("\
14241Catch failed Ada assertions, when raised.\n\
9bf7038b
TT
14242Usage: catch assert [if CONDITION]\n\
14243CONDITION is a boolean expression that is evaluated to see whether the\n\
14244exception should cause a stop."),
9ac4176b
PA
14245 catch_assert_command,
14246 NULL,
14247 CATCH_PERMANENT,
14248 CATCH_TEMPORARY);
14249
6c038f32 14250 varsize_limit = 65536;
3fcded8f
JB
14251 add_setshow_uinteger_cmd ("varsize-limit", class_support,
14252 &varsize_limit, _("\
14253Set the maximum number of bytes allowed in a variable-size object."), _("\
14254Show the maximum number of bytes allowed in a variable-size object."), _("\
14255Attempts to access an object whose size is not a compile-time constant\n\
14256and exceeds this limit will cause an error."),
14257 NULL, NULL, &setlist, &showlist);
6c038f32 14258
778865d3
JB
14259 add_info ("exceptions", info_exceptions_command,
14260 _("\
14261List all Ada exception names.\n\
9bf7038b 14262Usage: info exceptions [REGEXP]\n\
778865d3
JB
14263If a regular expression is passed as an argument, only those matching\n\
14264the regular expression are listed."));
14265
0743fc83
TT
14266 add_basic_prefix_cmd ("ada", class_maintenance,
14267 _("Set Ada maintenance-related variables."),
14268 &maint_set_ada_cmdlist, "maintenance set ada ",
14269 0/*allow-unknown*/, &maintenance_set_cmdlist);
c6044dd1 14270
0743fc83
TT
14271 add_show_prefix_cmd ("ada", class_maintenance,
14272 _("Show Ada maintenance-related variables."),
14273 &maint_show_ada_cmdlist, "maintenance show ada ",
14274 0/*allow-unknown*/, &maintenance_show_cmdlist);
c6044dd1
JB
14275
14276 add_setshow_boolean_cmd
14277 ("ignore-descriptive-types", class_maintenance,
14278 &ada_ignore_descriptive_types_p,
14279 _("Set whether descriptive types generated by GNAT should be ignored."),
14280 _("Show whether descriptive types generated by GNAT should be ignored."),
14281 _("\
14282When enabled, the debugger will stop using the DW_AT_GNAT_descriptive_type\n\
14283DWARF attribute."),
14284 NULL, NULL, &maint_set_ada_cmdlist, &maint_show_ada_cmdlist);
14285
459a2e4c
TT
14286 decoded_names_store = htab_create_alloc (256, htab_hash_string, streq_hash,
14287 NULL, xcalloc, xfree);
6b69afc4 14288
3d9434b5 14289 /* The ada-lang observers. */
76727919
TT
14290 gdb::observers::new_objfile.attach (ada_new_objfile_observer);
14291 gdb::observers::free_objfile.attach (ada_free_objfile_observer);
14292 gdb::observers::inferior_exit.attach (ada_inferior_exit);
14f9c5c9 14293}
This page took 2.774798 seconds and 4 git commands to generate.