Remove obsolete declaration
[deliverable/binutils-gdb.git] / gdb / ada-lang.c
CommitLineData
6e681866 1/* Ada language support routines for GDB, the GNU debugger.
10a2c479 2
b811d2c2 3 Copyright (C) 1992-2020 Free Software Foundation, Inc.
14f9c5c9 4
a9762ec7 5 This file is part of GDB.
14f9c5c9 6
a9762ec7
JB
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
14f9c5c9 11
a9762ec7
JB
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
14f9c5c9 16
a9762ec7
JB
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
14f9c5c9 19
96d887e8 20
4c4b4cd2 21#include "defs.h"
14f9c5c9 22#include <ctype.h>
d55e5aa6 23#include "gdb_regex.h"
4de283e4
TT
24#include "frame.h"
25#include "symtab.h"
26#include "gdbtypes.h"
14f9c5c9 27#include "gdbcmd.h"
4de283e4
TT
28#include "expression.h"
29#include "parser-defs.h"
30#include "language.h"
31#include "varobj.h"
4de283e4
TT
32#include "inferior.h"
33#include "symfile.h"
34#include "objfiles.h"
35#include "breakpoint.h"
14f9c5c9 36#include "gdbcore.h"
4c4b4cd2 37#include "hashtab.h"
4de283e4
TT
38#include "gdb_obstack.h"
39#include "ada-lang.h"
40#include "completer.h"
4de283e4
TT
41#include "ui-out.h"
42#include "block.h"
04714b91 43#include "infcall.h"
4de283e4
TT
44#include "annotate.h"
45#include "valprint.h"
d55e5aa6 46#include "source.h"
4de283e4 47#include "observable.h"
692465f1 48#include "stack.h"
79d43c61 49#include "typeprint.h"
4de283e4 50#include "namespace.h"
7f6aba03 51#include "cli/cli-style.h"
4de283e4 52
40bc484c 53#include "value.h"
4de283e4
TT
54#include "mi/mi-common.h"
55#include "arch-utils.h"
56#include "cli/cli-utils.h"
268a13a5
TT
57#include "gdbsupport/function-view.h"
58#include "gdbsupport/byte-vector.h"
4de283e4 59#include <algorithm>
ccefe4c4 60
4c4b4cd2 61/* Define whether or not the C operator '/' truncates towards zero for
0963b4bd 62 differently signed operands (truncation direction is undefined in C).
4c4b4cd2
PH
63 Copied from valarith.c. */
64
65#ifndef TRUNCATION_TOWARDS_ZERO
66#define TRUNCATION_TOWARDS_ZERO ((-5 / 2) == -2)
67#endif
68
d2e4a39e 69static struct type *desc_base_type (struct type *);
14f9c5c9 70
d2e4a39e 71static struct type *desc_bounds_type (struct type *);
14f9c5c9 72
d2e4a39e 73static struct value *desc_bounds (struct value *);
14f9c5c9 74
d2e4a39e 75static int fat_pntr_bounds_bitpos (struct type *);
14f9c5c9 76
d2e4a39e 77static int fat_pntr_bounds_bitsize (struct type *);
14f9c5c9 78
556bdfd4 79static struct type *desc_data_target_type (struct type *);
14f9c5c9 80
d2e4a39e 81static struct value *desc_data (struct value *);
14f9c5c9 82
d2e4a39e 83static int fat_pntr_data_bitpos (struct type *);
14f9c5c9 84
d2e4a39e 85static int fat_pntr_data_bitsize (struct type *);
14f9c5c9 86
d2e4a39e 87static struct value *desc_one_bound (struct value *, int, int);
14f9c5c9 88
d2e4a39e 89static int desc_bound_bitpos (struct type *, int, int);
14f9c5c9 90
d2e4a39e 91static int desc_bound_bitsize (struct type *, int, int);
14f9c5c9 92
d2e4a39e 93static struct type *desc_index_type (struct type *, int);
14f9c5c9 94
d2e4a39e 95static int desc_arity (struct type *);
14f9c5c9 96
d2e4a39e 97static int ada_type_match (struct type *, struct type *, int);
14f9c5c9 98
d2e4a39e 99static int ada_args_match (struct symbol *, struct value **, int);
14f9c5c9 100
40bc484c 101static struct value *make_array_descriptor (struct type *, struct value *);
14f9c5c9 102
4c4b4cd2 103static void ada_add_block_symbols (struct obstack *,
b5ec771e
PA
104 const struct block *,
105 const lookup_name_info &lookup_name,
106 domain_enum, struct objfile *);
14f9c5c9 107
22cee43f 108static void ada_add_all_symbols (struct obstack *, const struct block *,
b5ec771e
PA
109 const lookup_name_info &lookup_name,
110 domain_enum, int, int *);
22cee43f 111
d12307c1 112static int is_nonfunction (struct block_symbol *, int);
14f9c5c9 113
76a01679 114static void add_defn_to_vec (struct obstack *, struct symbol *,
f0c5f9b2 115 const struct block *);
14f9c5c9 116
4c4b4cd2
PH
117static int num_defns_collected (struct obstack *);
118
d12307c1 119static struct block_symbol *defns_collected (struct obstack *, int);
14f9c5c9 120
e9d9f57e 121static struct value *resolve_subexp (expression_up *, int *, int,
699bd4cf
TT
122 struct type *, int,
123 innermost_block_tracker *);
14f9c5c9 124
e9d9f57e 125static void replace_operator_with_call (expression_up *, int, int, int,
270140bd 126 struct symbol *, const struct block *);
14f9c5c9 127
d2e4a39e 128static int possible_user_operator_p (enum exp_opcode, struct value **);
14f9c5c9 129
a121b7c1 130static const char *ada_op_name (enum exp_opcode);
4c4b4cd2
PH
131
132static const char *ada_decoded_op_name (enum exp_opcode);
14f9c5c9 133
d2e4a39e 134static int numeric_type_p (struct type *);
14f9c5c9 135
d2e4a39e 136static int integer_type_p (struct type *);
14f9c5c9 137
d2e4a39e 138static int scalar_type_p (struct type *);
14f9c5c9 139
d2e4a39e 140static int discrete_type_p (struct type *);
14f9c5c9 141
a121b7c1 142static struct type *ada_lookup_struct_elt_type (struct type *, const char *,
988f6b3d 143 int, int);
4c4b4cd2 144
d2e4a39e 145static struct value *evaluate_subexp_type (struct expression *, int *);
14f9c5c9 146
b4ba55a1
JB
147static struct type *ada_find_parallel_type_with_name (struct type *,
148 const char *);
149
d2e4a39e 150static int is_dynamic_field (struct type *, int);
14f9c5c9 151
10a2c479 152static struct type *to_fixed_variant_branch_type (struct type *,
fc1a4b47 153 const gdb_byte *,
4c4b4cd2
PH
154 CORE_ADDR, struct value *);
155
156static struct type *to_fixed_array_type (struct type *, struct value *, int);
14f9c5c9 157
28c85d6c 158static struct type *to_fixed_range_type (struct type *, struct value *);
14f9c5c9 159
d2e4a39e 160static struct type *to_static_fixed_type (struct type *);
f192137b 161static struct type *static_unwrap_type (struct type *type);
14f9c5c9 162
d2e4a39e 163static struct value *unwrap_value (struct value *);
14f9c5c9 164
ad82864c 165static struct type *constrained_packed_array_type (struct type *, long *);
14f9c5c9 166
ad82864c 167static struct type *decode_constrained_packed_array_type (struct type *);
14f9c5c9 168
ad82864c
JB
169static long decode_packed_array_bitsize (struct type *);
170
171static struct value *decode_constrained_packed_array (struct value *);
172
173static int ada_is_packed_array_type (struct type *);
174
175static int ada_is_unconstrained_packed_array_type (struct type *);
14f9c5c9 176
d2e4a39e 177static struct value *value_subscript_packed (struct value *, int,
4c4b4cd2 178 struct value **);
14f9c5c9 179
4c4b4cd2
PH
180static struct value *coerce_unspec_val_to_type (struct value *,
181 struct type *);
14f9c5c9 182
d2e4a39e 183static int lesseq_defined_than (struct symbol *, struct symbol *);
14f9c5c9 184
d2e4a39e 185static int equiv_types (struct type *, struct type *);
14f9c5c9 186
d2e4a39e 187static int is_name_suffix (const char *);
14f9c5c9 188
73589123
PH
189static int advance_wild_match (const char **, const char *, int);
190
b5ec771e 191static bool wild_match (const char *name, const char *patn);
14f9c5c9 192
d2e4a39e 193static struct value *ada_coerce_ref (struct value *);
14f9c5c9 194
4c4b4cd2
PH
195static LONGEST pos_atr (struct value *);
196
3cb382c9 197static struct value *value_pos_atr (struct type *, struct value *);
14f9c5c9 198
d2e4a39e 199static struct value *value_val_atr (struct type *, struct value *);
14f9c5c9 200
4c4b4cd2
PH
201static struct symbol *standard_lookup (const char *, const struct block *,
202 domain_enum);
14f9c5c9 203
108d56a4 204static struct value *ada_search_struct_field (const char *, struct value *, int,
4c4b4cd2
PH
205 struct type *);
206
0d5cff50 207static int find_struct_field (const char *, struct type *, int,
52ce6436 208 struct type **, int *, int *, int *, int *);
4c4b4cd2 209
d12307c1 210static int ada_resolve_function (struct block_symbol *, int,
4c4b4cd2 211 struct value **, int, const char *,
2a612529 212 struct type *, int);
4c4b4cd2 213
4c4b4cd2
PH
214static int ada_is_direct_array_type (struct type *);
215
72d5681a
PH
216static void ada_language_arch_info (struct gdbarch *,
217 struct language_arch_info *);
714e53ab 218
52ce6436
PH
219static struct value *ada_index_struct_field (int, struct value *, int,
220 struct type *);
221
222static struct value *assign_aggregate (struct value *, struct value *,
0963b4bd
MS
223 struct expression *,
224 int *, enum noside);
52ce6436
PH
225
226static void aggregate_assign_from_choices (struct value *, struct value *,
227 struct expression *,
228 int *, LONGEST *, int *,
229 int, LONGEST, LONGEST);
230
231static void aggregate_assign_positional (struct value *, struct value *,
232 struct expression *,
233 int *, LONGEST *, int *, int,
234 LONGEST, LONGEST);
235
236
237static void aggregate_assign_others (struct value *, struct value *,
238 struct expression *,
239 int *, LONGEST *, int, LONGEST, LONGEST);
240
241
242static void add_component_interval (LONGEST, LONGEST, LONGEST *, int *, int);
243
244
245static struct value *ada_evaluate_subexp (struct type *, struct expression *,
246 int *, enum noside);
247
248static void ada_forward_operator_length (struct expression *, int, int *,
249 int *);
852dff6c
JB
250
251static struct type *ada_find_any_type (const char *name);
b5ec771e
PA
252
253static symbol_name_matcher_ftype *ada_get_symbol_name_matcher
254 (const lookup_name_info &lookup_name);
255
4c4b4cd2
PH
256\f
257
ee01b665
JB
258/* The result of a symbol lookup to be stored in our symbol cache. */
259
260struct cache_entry
261{
262 /* The name used to perform the lookup. */
263 const char *name;
264 /* The namespace used during the lookup. */
fe978cb0 265 domain_enum domain;
ee01b665
JB
266 /* The symbol returned by the lookup, or NULL if no matching symbol
267 was found. */
268 struct symbol *sym;
269 /* The block where the symbol was found, or NULL if no matching
270 symbol was found. */
271 const struct block *block;
272 /* A pointer to the next entry with the same hash. */
273 struct cache_entry *next;
274};
275
276/* The Ada symbol cache, used to store the result of Ada-mode symbol
277 lookups in the course of executing the user's commands.
278
279 The cache is implemented using a simple, fixed-sized hash.
280 The size is fixed on the grounds that there are not likely to be
281 all that many symbols looked up during any given session, regardless
282 of the size of the symbol table. If we decide to go to a resizable
283 table, let's just use the stuff from libiberty instead. */
284
285#define HASH_SIZE 1009
286
287struct ada_symbol_cache
288{
289 /* An obstack used to store the entries in our cache. */
290 struct obstack cache_space;
291
292 /* The root of the hash table used to implement our symbol cache. */
293 struct cache_entry *root[HASH_SIZE];
294};
295
296static void ada_free_symbol_cache (struct ada_symbol_cache *sym_cache);
76a01679 297
4c4b4cd2 298/* Maximum-sized dynamic type. */
14f9c5c9
AS
299static unsigned int varsize_limit;
300
67cb5b2d 301static const char ada_completer_word_break_characters[] =
4c4b4cd2
PH
302#ifdef VMS
303 " \t\n!@#%^&*()+=|~`}{[]\";:?/,-";
304#else
14f9c5c9 305 " \t\n!@#$%^&*()+=|~`}{[]\";:?/,-";
4c4b4cd2 306#endif
14f9c5c9 307
4c4b4cd2 308/* The name of the symbol to use to get the name of the main subprogram. */
76a01679 309static const char ADA_MAIN_PROGRAM_SYMBOL_NAME[]
4c4b4cd2 310 = "__gnat_ada_main_program_name";
14f9c5c9 311
4c4b4cd2
PH
312/* Limit on the number of warnings to raise per expression evaluation. */
313static int warning_limit = 2;
314
315/* Number of warning messages issued; reset to 0 by cleanups after
316 expression evaluation. */
317static int warnings_issued = 0;
318
319static const char *known_runtime_file_name_patterns[] = {
320 ADA_KNOWN_RUNTIME_FILE_NAME_PATTERNS NULL
321};
322
323static const char *known_auxiliary_function_name_patterns[] = {
324 ADA_KNOWN_AUXILIARY_FUNCTION_NAME_PATTERNS NULL
325};
326
c6044dd1
JB
327/* Maintenance-related settings for this module. */
328
329static struct cmd_list_element *maint_set_ada_cmdlist;
330static struct cmd_list_element *maint_show_ada_cmdlist;
331
c6044dd1
JB
332/* The "maintenance ada set/show ignore-descriptive-type" value. */
333
491144b5 334static bool ada_ignore_descriptive_types_p = false;
c6044dd1 335
e802dbe0
JB
336 /* Inferior-specific data. */
337
338/* Per-inferior data for this module. */
339
340struct ada_inferior_data
341{
342 /* The ada__tags__type_specific_data type, which is used when decoding
343 tagged types. With older versions of GNAT, this type was directly
344 accessible through a component ("tsd") in the object tag. But this
345 is no longer the case, so we cache it for each inferior. */
f37b313d 346 struct type *tsd_type = nullptr;
3eecfa55
JB
347
348 /* The exception_support_info data. This data is used to determine
349 how to implement support for Ada exception catchpoints in a given
350 inferior. */
f37b313d 351 const struct exception_support_info *exception_info = nullptr;
e802dbe0
JB
352};
353
354/* Our key to this module's inferior data. */
f37b313d 355static const struct inferior_key<ada_inferior_data> ada_inferior_data;
e802dbe0
JB
356
357/* Return our inferior data for the given inferior (INF).
358
359 This function always returns a valid pointer to an allocated
360 ada_inferior_data structure. If INF's inferior data has not
361 been previously set, this functions creates a new one with all
362 fields set to zero, sets INF's inferior to it, and then returns
363 a pointer to that newly allocated ada_inferior_data. */
364
365static struct ada_inferior_data *
366get_ada_inferior_data (struct inferior *inf)
367{
368 struct ada_inferior_data *data;
369
f37b313d 370 data = ada_inferior_data.get (inf);
e802dbe0 371 if (data == NULL)
f37b313d 372 data = ada_inferior_data.emplace (inf);
e802dbe0
JB
373
374 return data;
375}
376
377/* Perform all necessary cleanups regarding our module's inferior data
378 that is required after the inferior INF just exited. */
379
380static void
381ada_inferior_exit (struct inferior *inf)
382{
f37b313d 383 ada_inferior_data.clear (inf);
e802dbe0
JB
384}
385
ee01b665
JB
386
387 /* program-space-specific data. */
388
389/* This module's per-program-space data. */
390struct ada_pspace_data
391{
f37b313d
TT
392 ~ada_pspace_data ()
393 {
394 if (sym_cache != NULL)
395 ada_free_symbol_cache (sym_cache);
396 }
397
ee01b665 398 /* The Ada symbol cache. */
f37b313d 399 struct ada_symbol_cache *sym_cache = nullptr;
ee01b665
JB
400};
401
402/* Key to our per-program-space data. */
f37b313d 403static const struct program_space_key<ada_pspace_data> ada_pspace_data_handle;
ee01b665
JB
404
405/* Return this module's data for the given program space (PSPACE).
406 If not is found, add a zero'ed one now.
407
408 This function always returns a valid object. */
409
410static struct ada_pspace_data *
411get_ada_pspace_data (struct program_space *pspace)
412{
413 struct ada_pspace_data *data;
414
f37b313d 415 data = ada_pspace_data_handle.get (pspace);
ee01b665 416 if (data == NULL)
f37b313d 417 data = ada_pspace_data_handle.emplace (pspace);
ee01b665
JB
418
419 return data;
420}
421
4c4b4cd2
PH
422 /* Utilities */
423
720d1a40 424/* If TYPE is a TYPE_CODE_TYPEDEF type, return the target type after
eed9788b 425 all typedef layers have been peeled. Otherwise, return TYPE.
720d1a40
JB
426
427 Normally, we really expect a typedef type to only have 1 typedef layer.
428 In other words, we really expect the target type of a typedef type to be
429 a non-typedef type. This is particularly true for Ada units, because
430 the language does not have a typedef vs not-typedef distinction.
431 In that respect, the Ada compiler has been trying to eliminate as many
432 typedef definitions in the debugging information, since they generally
433 do not bring any extra information (we still use typedef under certain
434 circumstances related mostly to the GNAT encoding).
435
436 Unfortunately, we have seen situations where the debugging information
437 generated by the compiler leads to such multiple typedef layers. For
438 instance, consider the following example with stabs:
439
440 .stabs "pck__float_array___XUP:Tt(0,46)=s16P_ARRAY:(0,47)=[...]"[...]
441 .stabs "pck__float_array___XUP:t(0,36)=(0,46)",128,0,6,0
442
443 This is an error in the debugging information which causes type
444 pck__float_array___XUP to be defined twice, and the second time,
445 it is defined as a typedef of a typedef.
446
447 This is on the fringe of legality as far as debugging information is
448 concerned, and certainly unexpected. But it is easy to handle these
449 situations correctly, so we can afford to be lenient in this case. */
450
451static struct type *
452ada_typedef_target_type (struct type *type)
453{
78134374 454 while (type->code () == TYPE_CODE_TYPEDEF)
720d1a40
JB
455 type = TYPE_TARGET_TYPE (type);
456 return type;
457}
458
41d27058
JB
459/* Given DECODED_NAME a string holding a symbol name in its
460 decoded form (ie using the Ada dotted notation), returns
461 its unqualified name. */
462
463static const char *
464ada_unqualified_name (const char *decoded_name)
465{
2b0f535a
JB
466 const char *result;
467
468 /* If the decoded name starts with '<', it means that the encoded
469 name does not follow standard naming conventions, and thus that
470 it is not your typical Ada symbol name. Trying to unqualify it
471 is therefore pointless and possibly erroneous. */
472 if (decoded_name[0] == '<')
473 return decoded_name;
474
475 result = strrchr (decoded_name, '.');
41d27058
JB
476 if (result != NULL)
477 result++; /* Skip the dot... */
478 else
479 result = decoded_name;
480
481 return result;
482}
483
39e7af3e 484/* Return a string starting with '<', followed by STR, and '>'. */
41d27058 485
39e7af3e 486static std::string
41d27058
JB
487add_angle_brackets (const char *str)
488{
39e7af3e 489 return string_printf ("<%s>", str);
41d27058 490}
96d887e8 491
67cb5b2d 492static const char *
4c4b4cd2
PH
493ada_get_gdb_completer_word_break_characters (void)
494{
495 return ada_completer_word_break_characters;
496}
497
e79af960
JB
498/* Print an array element index using the Ada syntax. */
499
500static void
501ada_print_array_index (struct value *index_value, struct ui_file *stream,
79a45b7d 502 const struct value_print_options *options)
e79af960 503{
79a45b7d 504 LA_VALUE_PRINT (index_value, stream, options);
e79af960
JB
505 fprintf_filtered (stream, " => ");
506}
507
e2b7af72
JB
508/* la_watch_location_expression for Ada. */
509
de93309a 510static gdb::unique_xmalloc_ptr<char>
e2b7af72
JB
511ada_watch_location_expression (struct type *type, CORE_ADDR addr)
512{
513 type = check_typedef (TYPE_TARGET_TYPE (check_typedef (type)));
514 std::string name = type_to_string (type);
515 return gdb::unique_xmalloc_ptr<char>
516 (xstrprintf ("{%s} %s", name.c_str (), core_addr_to_string (addr)));
517}
518
de93309a
SM
519/* Assuming V points to an array of S objects, make sure that it contains at
520 least M objects, updating V and S as necessary. */
521
522#define GROW_VECT(v, s, m) \
523 if ((s) < (m)) (v) = (char *) grow_vect (v, &(s), m, sizeof *(v));
524
f27cf670 525/* Assuming VECT points to an array of *SIZE objects of size
14f9c5c9 526 ELEMENT_SIZE, grow it to contain at least MIN_SIZE objects,
f27cf670 527 updating *SIZE as necessary and returning the (new) array. */
14f9c5c9 528
de93309a 529static void *
f27cf670 530grow_vect (void *vect, size_t *size, size_t min_size, int element_size)
14f9c5c9 531{
d2e4a39e
AS
532 if (*size < min_size)
533 {
534 *size *= 2;
535 if (*size < min_size)
4c4b4cd2 536 *size = min_size;
f27cf670 537 vect = xrealloc (vect, *size * element_size);
d2e4a39e 538 }
f27cf670 539 return vect;
14f9c5c9
AS
540}
541
542/* True (non-zero) iff TARGET matches FIELD_NAME up to any trailing
4c4b4cd2 543 suffix of FIELD_NAME beginning "___". */
14f9c5c9
AS
544
545static int
ebf56fd3 546field_name_match (const char *field_name, const char *target)
14f9c5c9
AS
547{
548 int len = strlen (target);
5b4ee69b 549
d2e4a39e 550 return
4c4b4cd2
PH
551 (strncmp (field_name, target, len) == 0
552 && (field_name[len] == '\0'
61012eef 553 || (startswith (field_name + len, "___")
76a01679
JB
554 && strcmp (field_name + strlen (field_name) - 6,
555 "___XVN") != 0)));
14f9c5c9
AS
556}
557
558
872c8b51
JB
559/* Assuming TYPE is a TYPE_CODE_STRUCT or a TYPE_CODE_TYPDEF to
560 a TYPE_CODE_STRUCT, find the field whose name matches FIELD_NAME,
561 and return its index. This function also handles fields whose name
562 have ___ suffixes because the compiler sometimes alters their name
563 by adding such a suffix to represent fields with certain constraints.
564 If the field could not be found, return a negative number if
565 MAYBE_MISSING is set. Otherwise raise an error. */
4c4b4cd2
PH
566
567int
568ada_get_field_index (const struct type *type, const char *field_name,
569 int maybe_missing)
570{
571 int fieldno;
872c8b51
JB
572 struct type *struct_type = check_typedef ((struct type *) type);
573
574 for (fieldno = 0; fieldno < TYPE_NFIELDS (struct_type); fieldno++)
575 if (field_name_match (TYPE_FIELD_NAME (struct_type, fieldno), field_name))
4c4b4cd2
PH
576 return fieldno;
577
578 if (!maybe_missing)
323e0a4a 579 error (_("Unable to find field %s in struct %s. Aborting"),
7d93a1e0 580 field_name, struct_type->name ());
4c4b4cd2
PH
581
582 return -1;
583}
584
585/* The length of the prefix of NAME prior to any "___" suffix. */
14f9c5c9
AS
586
587int
d2e4a39e 588ada_name_prefix_len (const char *name)
14f9c5c9
AS
589{
590 if (name == NULL)
591 return 0;
d2e4a39e 592 else
14f9c5c9 593 {
d2e4a39e 594 const char *p = strstr (name, "___");
5b4ee69b 595
14f9c5c9 596 if (p == NULL)
4c4b4cd2 597 return strlen (name);
14f9c5c9 598 else
4c4b4cd2 599 return p - name;
14f9c5c9
AS
600 }
601}
602
4c4b4cd2
PH
603/* Return non-zero if SUFFIX is a suffix of STR.
604 Return zero if STR is null. */
605
14f9c5c9 606static int
d2e4a39e 607is_suffix (const char *str, const char *suffix)
14f9c5c9
AS
608{
609 int len1, len2;
5b4ee69b 610
14f9c5c9
AS
611 if (str == NULL)
612 return 0;
613 len1 = strlen (str);
614 len2 = strlen (suffix);
4c4b4cd2 615 return (len1 >= len2 && strcmp (str + len1 - len2, suffix) == 0);
14f9c5c9
AS
616}
617
4c4b4cd2
PH
618/* The contents of value VAL, treated as a value of type TYPE. The
619 result is an lval in memory if VAL is. */
14f9c5c9 620
d2e4a39e 621static struct value *
4c4b4cd2 622coerce_unspec_val_to_type (struct value *val, struct type *type)
14f9c5c9 623{
61ee279c 624 type = ada_check_typedef (type);
df407dfe 625 if (value_type (val) == type)
4c4b4cd2 626 return val;
d2e4a39e 627 else
14f9c5c9 628 {
4c4b4cd2
PH
629 struct value *result;
630
631 /* Make sure that the object size is not unreasonable before
632 trying to allocate some memory for it. */
c1b5a1a6 633 ada_ensure_varsize_limit (type);
4c4b4cd2 634
41e8491f
JK
635 if (value_lazy (val)
636 || TYPE_LENGTH (type) > TYPE_LENGTH (value_type (val)))
637 result = allocate_value_lazy (type);
638 else
639 {
640 result = allocate_value (type);
9a0dc9e3 641 value_contents_copy_raw (result, 0, val, 0, TYPE_LENGTH (type));
41e8491f 642 }
74bcbdf3 643 set_value_component_location (result, val);
9bbda503
AC
644 set_value_bitsize (result, value_bitsize (val));
645 set_value_bitpos (result, value_bitpos (val));
c408a94f
TT
646 if (VALUE_LVAL (result) == lval_memory)
647 set_value_address (result, value_address (val));
14f9c5c9
AS
648 return result;
649 }
650}
651
fc1a4b47
AC
652static const gdb_byte *
653cond_offset_host (const gdb_byte *valaddr, long offset)
14f9c5c9
AS
654{
655 if (valaddr == NULL)
656 return NULL;
657 else
658 return valaddr + offset;
659}
660
661static CORE_ADDR
ebf56fd3 662cond_offset_target (CORE_ADDR address, long offset)
14f9c5c9
AS
663{
664 if (address == 0)
665 return 0;
d2e4a39e 666 else
14f9c5c9
AS
667 return address + offset;
668}
669
4c4b4cd2
PH
670/* Issue a warning (as for the definition of warning in utils.c, but
671 with exactly one argument rather than ...), unless the limit on the
672 number of warnings has passed during the evaluation of the current
673 expression. */
a2249542 674
77109804
AC
675/* FIXME: cagney/2004-10-10: This function is mimicking the behavior
676 provided by "complaint". */
a0b31db1 677static void lim_warning (const char *format, ...) ATTRIBUTE_PRINTF (1, 2);
77109804 678
14f9c5c9 679static void
a2249542 680lim_warning (const char *format, ...)
14f9c5c9 681{
a2249542 682 va_list args;
a2249542 683
5b4ee69b 684 va_start (args, format);
4c4b4cd2
PH
685 warnings_issued += 1;
686 if (warnings_issued <= warning_limit)
a2249542
MK
687 vwarning (format, args);
688
689 va_end (args);
4c4b4cd2
PH
690}
691
714e53ab
PH
692/* Issue an error if the size of an object of type T is unreasonable,
693 i.e. if it would be a bad idea to allocate a value of this type in
694 GDB. */
695
c1b5a1a6
JB
696void
697ada_ensure_varsize_limit (const struct type *type)
714e53ab
PH
698{
699 if (TYPE_LENGTH (type) > varsize_limit)
323e0a4a 700 error (_("object size is larger than varsize-limit"));
714e53ab
PH
701}
702
0963b4bd 703/* Maximum value of a SIZE-byte signed integer type. */
4c4b4cd2 704static LONGEST
c3e5cd34 705max_of_size (int size)
4c4b4cd2 706{
76a01679 707 LONGEST top_bit = (LONGEST) 1 << (size * 8 - 2);
5b4ee69b 708
76a01679 709 return top_bit | (top_bit - 1);
4c4b4cd2
PH
710}
711
0963b4bd 712/* Minimum value of a SIZE-byte signed integer type. */
4c4b4cd2 713static LONGEST
c3e5cd34 714min_of_size (int size)
4c4b4cd2 715{
c3e5cd34 716 return -max_of_size (size) - 1;
4c4b4cd2
PH
717}
718
0963b4bd 719/* Maximum value of a SIZE-byte unsigned integer type. */
4c4b4cd2 720static ULONGEST
c3e5cd34 721umax_of_size (int size)
4c4b4cd2 722{
76a01679 723 ULONGEST top_bit = (ULONGEST) 1 << (size * 8 - 1);
5b4ee69b 724
76a01679 725 return top_bit | (top_bit - 1);
4c4b4cd2
PH
726}
727
0963b4bd 728/* Maximum value of integral type T, as a signed quantity. */
c3e5cd34
PH
729static LONGEST
730max_of_type (struct type *t)
4c4b4cd2 731{
c3e5cd34
PH
732 if (TYPE_UNSIGNED (t))
733 return (LONGEST) umax_of_size (TYPE_LENGTH (t));
734 else
735 return max_of_size (TYPE_LENGTH (t));
736}
737
0963b4bd 738/* Minimum value of integral type T, as a signed quantity. */
c3e5cd34
PH
739static LONGEST
740min_of_type (struct type *t)
741{
742 if (TYPE_UNSIGNED (t))
743 return 0;
744 else
745 return min_of_size (TYPE_LENGTH (t));
4c4b4cd2
PH
746}
747
748/* The largest value in the domain of TYPE, a discrete type, as an integer. */
43bbcdc2
PH
749LONGEST
750ada_discrete_type_high_bound (struct type *type)
4c4b4cd2 751{
b249d2c2 752 type = resolve_dynamic_type (type, {}, 0);
78134374 753 switch (type->code ())
4c4b4cd2
PH
754 {
755 case TYPE_CODE_RANGE:
690cc4eb 756 return TYPE_HIGH_BOUND (type);
4c4b4cd2 757 case TYPE_CODE_ENUM:
14e75d8e 758 return TYPE_FIELD_ENUMVAL (type, TYPE_NFIELDS (type) - 1);
690cc4eb
PH
759 case TYPE_CODE_BOOL:
760 return 1;
761 case TYPE_CODE_CHAR:
76a01679 762 case TYPE_CODE_INT:
690cc4eb 763 return max_of_type (type);
4c4b4cd2 764 default:
43bbcdc2 765 error (_("Unexpected type in ada_discrete_type_high_bound."));
4c4b4cd2
PH
766 }
767}
768
14e75d8e 769/* The smallest value in the domain of TYPE, a discrete type, as an integer. */
43bbcdc2
PH
770LONGEST
771ada_discrete_type_low_bound (struct type *type)
4c4b4cd2 772{
b249d2c2 773 type = resolve_dynamic_type (type, {}, 0);
78134374 774 switch (type->code ())
4c4b4cd2
PH
775 {
776 case TYPE_CODE_RANGE:
690cc4eb 777 return TYPE_LOW_BOUND (type);
4c4b4cd2 778 case TYPE_CODE_ENUM:
14e75d8e 779 return TYPE_FIELD_ENUMVAL (type, 0);
690cc4eb
PH
780 case TYPE_CODE_BOOL:
781 return 0;
782 case TYPE_CODE_CHAR:
76a01679 783 case TYPE_CODE_INT:
690cc4eb 784 return min_of_type (type);
4c4b4cd2 785 default:
43bbcdc2 786 error (_("Unexpected type in ada_discrete_type_low_bound."));
4c4b4cd2
PH
787 }
788}
789
790/* The identity on non-range types. For range types, the underlying
76a01679 791 non-range scalar type. */
4c4b4cd2
PH
792
793static struct type *
18af8284 794get_base_type (struct type *type)
4c4b4cd2 795{
78134374 796 while (type != NULL && type->code () == TYPE_CODE_RANGE)
4c4b4cd2 797 {
76a01679
JB
798 if (type == TYPE_TARGET_TYPE (type) || TYPE_TARGET_TYPE (type) == NULL)
799 return type;
4c4b4cd2
PH
800 type = TYPE_TARGET_TYPE (type);
801 }
802 return type;
14f9c5c9 803}
41246937
JB
804
805/* Return a decoded version of the given VALUE. This means returning
806 a value whose type is obtained by applying all the GNAT-specific
85102364 807 encodings, making the resulting type a static but standard description
41246937
JB
808 of the initial type. */
809
810struct value *
811ada_get_decoded_value (struct value *value)
812{
813 struct type *type = ada_check_typedef (value_type (value));
814
815 if (ada_is_array_descriptor_type (type)
816 || (ada_is_constrained_packed_array_type (type)
78134374 817 && type->code () != TYPE_CODE_PTR))
41246937 818 {
78134374 819 if (type->code () == TYPE_CODE_TYPEDEF) /* array access type. */
41246937
JB
820 value = ada_coerce_to_simple_array_ptr (value);
821 else
822 value = ada_coerce_to_simple_array (value);
823 }
824 else
825 value = ada_to_fixed_value (value);
826
827 return value;
828}
829
830/* Same as ada_get_decoded_value, but with the given TYPE.
831 Because there is no associated actual value for this type,
832 the resulting type might be a best-effort approximation in
833 the case of dynamic types. */
834
835struct type *
836ada_get_decoded_type (struct type *type)
837{
838 type = to_static_fixed_type (type);
839 if (ada_is_constrained_packed_array_type (type))
840 type = ada_coerce_to_simple_array_type (type);
841 return type;
842}
843
4c4b4cd2 844\f
76a01679 845
4c4b4cd2 846 /* Language Selection */
14f9c5c9
AS
847
848/* If the main program is in Ada, return language_ada, otherwise return LANG
ccefe4c4 849 (the main program is in Ada iif the adainit symbol is found). */
d2e4a39e 850
de93309a 851static enum language
ccefe4c4 852ada_update_initial_language (enum language lang)
14f9c5c9 853{
cafb3438 854 if (lookup_minimal_symbol ("adainit", NULL, NULL).minsym != NULL)
4c4b4cd2 855 return language_ada;
14f9c5c9
AS
856
857 return lang;
858}
96d887e8
PH
859
860/* If the main procedure is written in Ada, then return its name.
861 The result is good until the next call. Return NULL if the main
862 procedure doesn't appear to be in Ada. */
863
864char *
865ada_main_name (void)
866{
3b7344d5 867 struct bound_minimal_symbol msym;
e83e4e24 868 static gdb::unique_xmalloc_ptr<char> main_program_name;
6c038f32 869
96d887e8
PH
870 /* For Ada, the name of the main procedure is stored in a specific
871 string constant, generated by the binder. Look for that symbol,
872 extract its address, and then read that string. If we didn't find
873 that string, then most probably the main procedure is not written
874 in Ada. */
875 msym = lookup_minimal_symbol (ADA_MAIN_PROGRAM_SYMBOL_NAME, NULL, NULL);
876
3b7344d5 877 if (msym.minsym != NULL)
96d887e8 878 {
f9bc20b9
JB
879 CORE_ADDR main_program_name_addr;
880 int err_code;
881
77e371c0 882 main_program_name_addr = BMSYMBOL_VALUE_ADDRESS (msym);
96d887e8 883 if (main_program_name_addr == 0)
323e0a4a 884 error (_("Invalid address for Ada main program name."));
96d887e8 885
f9bc20b9
JB
886 target_read_string (main_program_name_addr, &main_program_name,
887 1024, &err_code);
888
889 if (err_code != 0)
890 return NULL;
e83e4e24 891 return main_program_name.get ();
96d887e8
PH
892 }
893
894 /* The main procedure doesn't seem to be in Ada. */
895 return NULL;
896}
14f9c5c9 897\f
4c4b4cd2 898 /* Symbols */
d2e4a39e 899
4c4b4cd2
PH
900/* Table of Ada operators and their GNAT-encoded names. Last entry is pair
901 of NULLs. */
14f9c5c9 902
d2e4a39e
AS
903const struct ada_opname_map ada_opname_table[] = {
904 {"Oadd", "\"+\"", BINOP_ADD},
905 {"Osubtract", "\"-\"", BINOP_SUB},
906 {"Omultiply", "\"*\"", BINOP_MUL},
907 {"Odivide", "\"/\"", BINOP_DIV},
908 {"Omod", "\"mod\"", BINOP_MOD},
909 {"Orem", "\"rem\"", BINOP_REM},
910 {"Oexpon", "\"**\"", BINOP_EXP},
911 {"Olt", "\"<\"", BINOP_LESS},
912 {"Ole", "\"<=\"", BINOP_LEQ},
913 {"Ogt", "\">\"", BINOP_GTR},
914 {"Oge", "\">=\"", BINOP_GEQ},
915 {"Oeq", "\"=\"", BINOP_EQUAL},
916 {"One", "\"/=\"", BINOP_NOTEQUAL},
917 {"Oand", "\"and\"", BINOP_BITWISE_AND},
918 {"Oor", "\"or\"", BINOP_BITWISE_IOR},
919 {"Oxor", "\"xor\"", BINOP_BITWISE_XOR},
920 {"Oconcat", "\"&\"", BINOP_CONCAT},
921 {"Oabs", "\"abs\"", UNOP_ABS},
922 {"Onot", "\"not\"", UNOP_LOGICAL_NOT},
923 {"Oadd", "\"+\"", UNOP_PLUS},
924 {"Osubtract", "\"-\"", UNOP_NEG},
925 {NULL, NULL}
14f9c5c9
AS
926};
927
b5ec771e
PA
928/* The "encoded" form of DECODED, according to GNAT conventions. The
929 result is valid until the next call to ada_encode. If
930 THROW_ERRORS, throw an error if invalid operator name is found.
931 Otherwise, return NULL in that case. */
4c4b4cd2 932
b5ec771e
PA
933static char *
934ada_encode_1 (const char *decoded, bool throw_errors)
14f9c5c9 935{
4c4b4cd2
PH
936 static char *encoding_buffer = NULL;
937 static size_t encoding_buffer_size = 0;
d2e4a39e 938 const char *p;
14f9c5c9 939 int k;
d2e4a39e 940
4c4b4cd2 941 if (decoded == NULL)
14f9c5c9
AS
942 return NULL;
943
4c4b4cd2
PH
944 GROW_VECT (encoding_buffer, encoding_buffer_size,
945 2 * strlen (decoded) + 10);
14f9c5c9
AS
946
947 k = 0;
4c4b4cd2 948 for (p = decoded; *p != '\0'; p += 1)
14f9c5c9 949 {
cdc7bb92 950 if (*p == '.')
4c4b4cd2
PH
951 {
952 encoding_buffer[k] = encoding_buffer[k + 1] = '_';
953 k += 2;
954 }
14f9c5c9 955 else if (*p == '"')
4c4b4cd2
PH
956 {
957 const struct ada_opname_map *mapping;
958
959 for (mapping = ada_opname_table;
1265e4aa 960 mapping->encoded != NULL
61012eef 961 && !startswith (p, mapping->decoded); mapping += 1)
4c4b4cd2
PH
962 ;
963 if (mapping->encoded == NULL)
b5ec771e
PA
964 {
965 if (throw_errors)
966 error (_("invalid Ada operator name: %s"), p);
967 else
968 return NULL;
969 }
4c4b4cd2
PH
970 strcpy (encoding_buffer + k, mapping->encoded);
971 k += strlen (mapping->encoded);
972 break;
973 }
d2e4a39e 974 else
4c4b4cd2
PH
975 {
976 encoding_buffer[k] = *p;
977 k += 1;
978 }
14f9c5c9
AS
979 }
980
4c4b4cd2
PH
981 encoding_buffer[k] = '\0';
982 return encoding_buffer;
14f9c5c9
AS
983}
984
b5ec771e
PA
985/* The "encoded" form of DECODED, according to GNAT conventions.
986 The result is valid until the next call to ada_encode. */
987
988char *
989ada_encode (const char *decoded)
990{
991 return ada_encode_1 (decoded, true);
992}
993
14f9c5c9 994/* Return NAME folded to lower case, or, if surrounded by single
4c4b4cd2
PH
995 quotes, unfolded, but with the quotes stripped away. Result good
996 to next call. */
997
de93309a 998static char *
e0802d59 999ada_fold_name (gdb::string_view name)
14f9c5c9 1000{
d2e4a39e 1001 static char *fold_buffer = NULL;
14f9c5c9
AS
1002 static size_t fold_buffer_size = 0;
1003
e0802d59 1004 int len = name.size ();
d2e4a39e 1005 GROW_VECT (fold_buffer, fold_buffer_size, len + 1);
14f9c5c9
AS
1006
1007 if (name[0] == '\'')
1008 {
e0802d59 1009 strncpy (fold_buffer, name.data () + 1, len - 2);
d2e4a39e 1010 fold_buffer[len - 2] = '\000';
14f9c5c9
AS
1011 }
1012 else
1013 {
1014 int i;
5b4ee69b 1015
14f9c5c9 1016 for (i = 0; i <= len; i += 1)
4c4b4cd2 1017 fold_buffer[i] = tolower (name[i]);
14f9c5c9
AS
1018 }
1019
1020 return fold_buffer;
1021}
1022
529cad9c
PH
1023/* Return nonzero if C is either a digit or a lowercase alphabet character. */
1024
1025static int
1026is_lower_alphanum (const char c)
1027{
1028 return (isdigit (c) || (isalpha (c) && islower (c)));
1029}
1030
c90092fe
JB
1031/* ENCODED is the linkage name of a symbol and LEN contains its length.
1032 This function saves in LEN the length of that same symbol name but
1033 without either of these suffixes:
29480c32
JB
1034 . .{DIGIT}+
1035 . ${DIGIT}+
1036 . ___{DIGIT}+
1037 . __{DIGIT}+.
c90092fe 1038
29480c32
JB
1039 These are suffixes introduced by the compiler for entities such as
1040 nested subprogram for instance, in order to avoid name clashes.
1041 They do not serve any purpose for the debugger. */
1042
1043static void
1044ada_remove_trailing_digits (const char *encoded, int *len)
1045{
1046 if (*len > 1 && isdigit (encoded[*len - 1]))
1047 {
1048 int i = *len - 2;
5b4ee69b 1049
29480c32
JB
1050 while (i > 0 && isdigit (encoded[i]))
1051 i--;
1052 if (i >= 0 && encoded[i] == '.')
1053 *len = i;
1054 else if (i >= 0 && encoded[i] == '$')
1055 *len = i;
61012eef 1056 else if (i >= 2 && startswith (encoded + i - 2, "___"))
29480c32 1057 *len = i - 2;
61012eef 1058 else if (i >= 1 && startswith (encoded + i - 1, "__"))
29480c32
JB
1059 *len = i - 1;
1060 }
1061}
1062
1063/* Remove the suffix introduced by the compiler for protected object
1064 subprograms. */
1065
1066static void
1067ada_remove_po_subprogram_suffix (const char *encoded, int *len)
1068{
1069 /* Remove trailing N. */
1070
1071 /* Protected entry subprograms are broken into two
1072 separate subprograms: The first one is unprotected, and has
1073 a 'N' suffix; the second is the protected version, and has
0963b4bd 1074 the 'P' suffix. The second calls the first one after handling
29480c32
JB
1075 the protection. Since the P subprograms are internally generated,
1076 we leave these names undecoded, giving the user a clue that this
1077 entity is internal. */
1078
1079 if (*len > 1
1080 && encoded[*len - 1] == 'N'
1081 && (isdigit (encoded[*len - 2]) || islower (encoded[*len - 2])))
1082 *len = *len - 1;
1083}
1084
1085/* If ENCODED follows the GNAT entity encoding conventions, then return
1086 the decoded form of ENCODED. Otherwise, return "<%s>" where "%s" is
f945dedf 1087 replaced by ENCODED. */
14f9c5c9 1088
f945dedf 1089std::string
4c4b4cd2 1090ada_decode (const char *encoded)
14f9c5c9
AS
1091{
1092 int i, j;
1093 int len0;
d2e4a39e 1094 const char *p;
14f9c5c9 1095 int at_start_name;
f945dedf 1096 std::string decoded;
d2e4a39e 1097
0d81f350
JG
1098 /* With function descriptors on PPC64, the value of a symbol named
1099 ".FN", if it exists, is the entry point of the function "FN". */
1100 if (encoded[0] == '.')
1101 encoded += 1;
1102
29480c32
JB
1103 /* The name of the Ada main procedure starts with "_ada_".
1104 This prefix is not part of the decoded name, so skip this part
1105 if we see this prefix. */
61012eef 1106 if (startswith (encoded, "_ada_"))
4c4b4cd2 1107 encoded += 5;
14f9c5c9 1108
29480c32
JB
1109 /* If the name starts with '_', then it is not a properly encoded
1110 name, so do not attempt to decode it. Similarly, if the name
1111 starts with '<', the name should not be decoded. */
4c4b4cd2 1112 if (encoded[0] == '_' || encoded[0] == '<')
14f9c5c9
AS
1113 goto Suppress;
1114
4c4b4cd2 1115 len0 = strlen (encoded);
4c4b4cd2 1116
29480c32
JB
1117 ada_remove_trailing_digits (encoded, &len0);
1118 ada_remove_po_subprogram_suffix (encoded, &len0);
529cad9c 1119
4c4b4cd2
PH
1120 /* Remove the ___X.* suffix if present. Do not forget to verify that
1121 the suffix is located before the current "end" of ENCODED. We want
1122 to avoid re-matching parts of ENCODED that have previously been
1123 marked as discarded (by decrementing LEN0). */
1124 p = strstr (encoded, "___");
1125 if (p != NULL && p - encoded < len0 - 3)
14f9c5c9
AS
1126 {
1127 if (p[3] == 'X')
4c4b4cd2 1128 len0 = p - encoded;
14f9c5c9 1129 else
4c4b4cd2 1130 goto Suppress;
14f9c5c9 1131 }
4c4b4cd2 1132
29480c32
JB
1133 /* Remove any trailing TKB suffix. It tells us that this symbol
1134 is for the body of a task, but that information does not actually
1135 appear in the decoded name. */
1136
61012eef 1137 if (len0 > 3 && startswith (encoded + len0 - 3, "TKB"))
14f9c5c9 1138 len0 -= 3;
76a01679 1139
a10967fa
JB
1140 /* Remove any trailing TB suffix. The TB suffix is slightly different
1141 from the TKB suffix because it is used for non-anonymous task
1142 bodies. */
1143
61012eef 1144 if (len0 > 2 && startswith (encoded + len0 - 2, "TB"))
a10967fa
JB
1145 len0 -= 2;
1146
29480c32
JB
1147 /* Remove trailing "B" suffixes. */
1148 /* FIXME: brobecker/2006-04-19: Not sure what this are used for... */
1149
61012eef 1150 if (len0 > 1 && startswith (encoded + len0 - 1, "B"))
14f9c5c9
AS
1151 len0 -= 1;
1152
4c4b4cd2 1153 /* Make decoded big enough for possible expansion by operator name. */
29480c32 1154
f945dedf 1155 decoded.resize (2 * len0 + 1, 'X');
14f9c5c9 1156
29480c32
JB
1157 /* Remove trailing __{digit}+ or trailing ${digit}+. */
1158
4c4b4cd2 1159 if (len0 > 1 && isdigit (encoded[len0 - 1]))
d2e4a39e 1160 {
4c4b4cd2
PH
1161 i = len0 - 2;
1162 while ((i >= 0 && isdigit (encoded[i]))
1163 || (i >= 1 && encoded[i] == '_' && isdigit (encoded[i - 1])))
1164 i -= 1;
1165 if (i > 1 && encoded[i] == '_' && encoded[i - 1] == '_')
1166 len0 = i - 1;
1167 else if (encoded[i] == '$')
1168 len0 = i;
d2e4a39e 1169 }
14f9c5c9 1170
29480c32
JB
1171 /* The first few characters that are not alphabetic are not part
1172 of any encoding we use, so we can copy them over verbatim. */
1173
4c4b4cd2
PH
1174 for (i = 0, j = 0; i < len0 && !isalpha (encoded[i]); i += 1, j += 1)
1175 decoded[j] = encoded[i];
14f9c5c9
AS
1176
1177 at_start_name = 1;
1178 while (i < len0)
1179 {
29480c32 1180 /* Is this a symbol function? */
4c4b4cd2
PH
1181 if (at_start_name && encoded[i] == 'O')
1182 {
1183 int k;
5b4ee69b 1184
4c4b4cd2
PH
1185 for (k = 0; ada_opname_table[k].encoded != NULL; k += 1)
1186 {
1187 int op_len = strlen (ada_opname_table[k].encoded);
06d5cf63
JB
1188 if ((strncmp (ada_opname_table[k].encoded + 1, encoded + i + 1,
1189 op_len - 1) == 0)
1190 && !isalnum (encoded[i + op_len]))
4c4b4cd2 1191 {
f945dedf 1192 strcpy (&decoded.front() + j, ada_opname_table[k].decoded);
4c4b4cd2
PH
1193 at_start_name = 0;
1194 i += op_len;
1195 j += strlen (ada_opname_table[k].decoded);
1196 break;
1197 }
1198 }
1199 if (ada_opname_table[k].encoded != NULL)
1200 continue;
1201 }
14f9c5c9
AS
1202 at_start_name = 0;
1203
529cad9c
PH
1204 /* Replace "TK__" with "__", which will eventually be translated
1205 into "." (just below). */
1206
61012eef 1207 if (i < len0 - 4 && startswith (encoded + i, "TK__"))
4c4b4cd2 1208 i += 2;
529cad9c 1209
29480c32
JB
1210 /* Replace "__B_{DIGITS}+__" sequences by "__", which will eventually
1211 be translated into "." (just below). These are internal names
1212 generated for anonymous blocks inside which our symbol is nested. */
1213
1214 if (len0 - i > 5 && encoded [i] == '_' && encoded [i+1] == '_'
1215 && encoded [i+2] == 'B' && encoded [i+3] == '_'
1216 && isdigit (encoded [i+4]))
1217 {
1218 int k = i + 5;
1219
1220 while (k < len0 && isdigit (encoded[k]))
1221 k++; /* Skip any extra digit. */
1222
1223 /* Double-check that the "__B_{DIGITS}+" sequence we found
1224 is indeed followed by "__". */
1225 if (len0 - k > 2 && encoded [k] == '_' && encoded [k+1] == '_')
1226 i = k;
1227 }
1228
529cad9c
PH
1229 /* Remove _E{DIGITS}+[sb] */
1230
1231 /* Just as for protected object subprograms, there are 2 categories
0963b4bd 1232 of subprograms created by the compiler for each entry. The first
529cad9c
PH
1233 one implements the actual entry code, and has a suffix following
1234 the convention above; the second one implements the barrier and
1235 uses the same convention as above, except that the 'E' is replaced
1236 by a 'B'.
1237
1238 Just as above, we do not decode the name of barrier functions
1239 to give the user a clue that the code he is debugging has been
1240 internally generated. */
1241
1242 if (len0 - i > 3 && encoded [i] == '_' && encoded[i+1] == 'E'
1243 && isdigit (encoded[i+2]))
1244 {
1245 int k = i + 3;
1246
1247 while (k < len0 && isdigit (encoded[k]))
1248 k++;
1249
1250 if (k < len0
1251 && (encoded[k] == 'b' || encoded[k] == 's'))
1252 {
1253 k++;
1254 /* Just as an extra precaution, make sure that if this
1255 suffix is followed by anything else, it is a '_'.
1256 Otherwise, we matched this sequence by accident. */
1257 if (k == len0
1258 || (k < len0 && encoded[k] == '_'))
1259 i = k;
1260 }
1261 }
1262
1263 /* Remove trailing "N" in [a-z0-9]+N__. The N is added by
1264 the GNAT front-end in protected object subprograms. */
1265
1266 if (i < len0 + 3
1267 && encoded[i] == 'N' && encoded[i+1] == '_' && encoded[i+2] == '_')
1268 {
1269 /* Backtrack a bit up until we reach either the begining of
1270 the encoded name, or "__". Make sure that we only find
1271 digits or lowercase characters. */
1272 const char *ptr = encoded + i - 1;
1273
1274 while (ptr >= encoded && is_lower_alphanum (ptr[0]))
1275 ptr--;
1276 if (ptr < encoded
1277 || (ptr > encoded && ptr[0] == '_' && ptr[-1] == '_'))
1278 i++;
1279 }
1280
4c4b4cd2
PH
1281 if (encoded[i] == 'X' && i != 0 && isalnum (encoded[i - 1]))
1282 {
29480c32
JB
1283 /* This is a X[bn]* sequence not separated from the previous
1284 part of the name with a non-alpha-numeric character (in other
1285 words, immediately following an alpha-numeric character), then
1286 verify that it is placed at the end of the encoded name. If
1287 not, then the encoding is not valid and we should abort the
1288 decoding. Otherwise, just skip it, it is used in body-nested
1289 package names. */
4c4b4cd2
PH
1290 do
1291 i += 1;
1292 while (i < len0 && (encoded[i] == 'b' || encoded[i] == 'n'));
1293 if (i < len0)
1294 goto Suppress;
1295 }
cdc7bb92 1296 else if (i < len0 - 2 && encoded[i] == '_' && encoded[i + 1] == '_')
4c4b4cd2 1297 {
29480c32 1298 /* Replace '__' by '.'. */
4c4b4cd2
PH
1299 decoded[j] = '.';
1300 at_start_name = 1;
1301 i += 2;
1302 j += 1;
1303 }
14f9c5c9 1304 else
4c4b4cd2 1305 {
29480c32
JB
1306 /* It's a character part of the decoded name, so just copy it
1307 over. */
4c4b4cd2
PH
1308 decoded[j] = encoded[i];
1309 i += 1;
1310 j += 1;
1311 }
14f9c5c9 1312 }
f945dedf 1313 decoded.resize (j);
14f9c5c9 1314
29480c32
JB
1315 /* Decoded names should never contain any uppercase character.
1316 Double-check this, and abort the decoding if we find one. */
1317
f945dedf 1318 for (i = 0; i < decoded.length(); ++i)
4c4b4cd2 1319 if (isupper (decoded[i]) || decoded[i] == ' ')
14f9c5c9
AS
1320 goto Suppress;
1321
f945dedf 1322 return decoded;
14f9c5c9
AS
1323
1324Suppress:
4c4b4cd2 1325 if (encoded[0] == '<')
f945dedf 1326 decoded = encoded;
14f9c5c9 1327 else
f945dedf 1328 decoded = '<' + std::string(encoded) + '>';
4c4b4cd2
PH
1329 return decoded;
1330
1331}
1332
1333/* Table for keeping permanent unique copies of decoded names. Once
1334 allocated, names in this table are never released. While this is a
1335 storage leak, it should not be significant unless there are massive
1336 changes in the set of decoded names in successive versions of a
1337 symbol table loaded during a single session. */
1338static struct htab *decoded_names_store;
1339
1340/* Returns the decoded name of GSYMBOL, as for ada_decode, caching it
1341 in the language-specific part of GSYMBOL, if it has not been
1342 previously computed. Tries to save the decoded name in the same
1343 obstack as GSYMBOL, if possible, and otherwise on the heap (so that,
1344 in any case, the decoded symbol has a lifetime at least that of
0963b4bd 1345 GSYMBOL).
4c4b4cd2
PH
1346 The GSYMBOL parameter is "mutable" in the C++ sense: logically
1347 const, but nevertheless modified to a semantically equivalent form
0963b4bd 1348 when a decoded name is cached in it. */
4c4b4cd2 1349
45e6c716 1350const char *
f85f34ed 1351ada_decode_symbol (const struct general_symbol_info *arg)
4c4b4cd2 1352{
f85f34ed
TT
1353 struct general_symbol_info *gsymbol = (struct general_symbol_info *) arg;
1354 const char **resultp =
615b3f62 1355 &gsymbol->language_specific.demangled_name;
5b4ee69b 1356
f85f34ed 1357 if (!gsymbol->ada_mangled)
4c4b4cd2 1358 {
4d4eaa30 1359 std::string decoded = ada_decode (gsymbol->linkage_name ());
f85f34ed 1360 struct obstack *obstack = gsymbol->language_specific.obstack;
5b4ee69b 1361
f85f34ed 1362 gsymbol->ada_mangled = 1;
5b4ee69b 1363
f85f34ed 1364 if (obstack != NULL)
f945dedf 1365 *resultp = obstack_strdup (obstack, decoded.c_str ());
f85f34ed 1366 else
76a01679 1367 {
f85f34ed
TT
1368 /* Sometimes, we can't find a corresponding objfile, in
1369 which case, we put the result on the heap. Since we only
1370 decode when needed, we hope this usually does not cause a
1371 significant memory leak (FIXME). */
1372
76a01679 1373 char **slot = (char **) htab_find_slot (decoded_names_store,
f945dedf 1374 decoded.c_str (), INSERT);
5b4ee69b 1375
76a01679 1376 if (*slot == NULL)
f945dedf 1377 *slot = xstrdup (decoded.c_str ());
76a01679
JB
1378 *resultp = *slot;
1379 }
4c4b4cd2 1380 }
14f9c5c9 1381
4c4b4cd2
PH
1382 return *resultp;
1383}
76a01679 1384
2c0b251b 1385static char *
76a01679 1386ada_la_decode (const char *encoded, int options)
4c4b4cd2 1387{
f945dedf 1388 return xstrdup (ada_decode (encoded).c_str ());
14f9c5c9
AS
1389}
1390
8b302db8
TT
1391/* Implement la_sniff_from_mangled_name for Ada. */
1392
1393static int
1394ada_sniff_from_mangled_name (const char *mangled, char **out)
1395{
f945dedf 1396 std::string demangled = ada_decode (mangled);
8b302db8
TT
1397
1398 *out = NULL;
1399
f945dedf 1400 if (demangled != mangled && demangled[0] != '<')
8b302db8
TT
1401 {
1402 /* Set the gsymbol language to Ada, but still return 0.
1403 Two reasons for that:
1404
1405 1. For Ada, we prefer computing the symbol's decoded name
1406 on the fly rather than pre-compute it, in order to save
1407 memory (Ada projects are typically very large).
1408
1409 2. There are some areas in the definition of the GNAT
1410 encoding where, with a bit of bad luck, we might be able
1411 to decode a non-Ada symbol, generating an incorrect
1412 demangled name (Eg: names ending with "TB" for instance
1413 are identified as task bodies and so stripped from
1414 the decoded name returned).
1415
1416 Returning 1, here, but not setting *DEMANGLED, helps us get a
1417 little bit of the best of both worlds. Because we're last,
1418 we should not affect any of the other languages that were
1419 able to demangle the symbol before us; we get to correctly
1420 tag Ada symbols as such; and even if we incorrectly tagged a
1421 non-Ada symbol, which should be rare, any routing through the
1422 Ada language should be transparent (Ada tries to behave much
1423 like C/C++ with non-Ada symbols). */
1424 return 1;
1425 }
1426
1427 return 0;
1428}
1429
14f9c5c9 1430\f
d2e4a39e 1431
4c4b4cd2 1432 /* Arrays */
14f9c5c9 1433
28c85d6c
JB
1434/* Assuming that INDEX_DESC_TYPE is an ___XA structure, a structure
1435 generated by the GNAT compiler to describe the index type used
1436 for each dimension of an array, check whether it follows the latest
1437 known encoding. If not, fix it up to conform to the latest encoding.
1438 Otherwise, do nothing. This function also does nothing if
1439 INDEX_DESC_TYPE is NULL.
1440
85102364 1441 The GNAT encoding used to describe the array index type evolved a bit.
28c85d6c
JB
1442 Initially, the information would be provided through the name of each
1443 field of the structure type only, while the type of these fields was
1444 described as unspecified and irrelevant. The debugger was then expected
1445 to perform a global type lookup using the name of that field in order
1446 to get access to the full index type description. Because these global
1447 lookups can be very expensive, the encoding was later enhanced to make
1448 the global lookup unnecessary by defining the field type as being
1449 the full index type description.
1450
1451 The purpose of this routine is to allow us to support older versions
1452 of the compiler by detecting the use of the older encoding, and by
1453 fixing up the INDEX_DESC_TYPE to follow the new one (at this point,
1454 we essentially replace each field's meaningless type by the associated
1455 index subtype). */
1456
1457void
1458ada_fixup_array_indexes_type (struct type *index_desc_type)
1459{
1460 int i;
1461
1462 if (index_desc_type == NULL)
1463 return;
1464 gdb_assert (TYPE_NFIELDS (index_desc_type) > 0);
1465
1466 /* Check if INDEX_DESC_TYPE follows the older encoding (it is sufficient
1467 to check one field only, no need to check them all). If not, return
1468 now.
1469
1470 If our INDEX_DESC_TYPE was generated using the older encoding,
1471 the field type should be a meaningless integer type whose name
1472 is not equal to the field name. */
7d93a1e0
SM
1473 if (TYPE_FIELD_TYPE (index_desc_type, 0)->name () != NULL
1474 && strcmp (TYPE_FIELD_TYPE (index_desc_type, 0)->name (),
28c85d6c
JB
1475 TYPE_FIELD_NAME (index_desc_type, 0)) == 0)
1476 return;
1477
1478 /* Fixup each field of INDEX_DESC_TYPE. */
1479 for (i = 0; i < TYPE_NFIELDS (index_desc_type); i++)
1480 {
0d5cff50 1481 const char *name = TYPE_FIELD_NAME (index_desc_type, i);
28c85d6c
JB
1482 struct type *raw_type = ada_check_typedef (ada_find_any_type (name));
1483
1484 if (raw_type)
1485 TYPE_FIELD_TYPE (index_desc_type, i) = raw_type;
1486 }
1487}
1488
4c4b4cd2
PH
1489/* The desc_* routines return primitive portions of array descriptors
1490 (fat pointers). */
14f9c5c9
AS
1491
1492/* The descriptor or array type, if any, indicated by TYPE; removes
4c4b4cd2
PH
1493 level of indirection, if needed. */
1494
d2e4a39e
AS
1495static struct type *
1496desc_base_type (struct type *type)
14f9c5c9
AS
1497{
1498 if (type == NULL)
1499 return NULL;
61ee279c 1500 type = ada_check_typedef (type);
78134374 1501 if (type->code () == TYPE_CODE_TYPEDEF)
720d1a40
JB
1502 type = ada_typedef_target_type (type);
1503
1265e4aa 1504 if (type != NULL
78134374
SM
1505 && (type->code () == TYPE_CODE_PTR
1506 || type->code () == TYPE_CODE_REF))
61ee279c 1507 return ada_check_typedef (TYPE_TARGET_TYPE (type));
14f9c5c9
AS
1508 else
1509 return type;
1510}
1511
4c4b4cd2
PH
1512/* True iff TYPE indicates a "thin" array pointer type. */
1513
14f9c5c9 1514static int
d2e4a39e 1515is_thin_pntr (struct type *type)
14f9c5c9 1516{
d2e4a39e 1517 return
14f9c5c9
AS
1518 is_suffix (ada_type_name (desc_base_type (type)), "___XUT")
1519 || is_suffix (ada_type_name (desc_base_type (type)), "___XUT___XVE");
1520}
1521
4c4b4cd2
PH
1522/* The descriptor type for thin pointer type TYPE. */
1523
d2e4a39e
AS
1524static struct type *
1525thin_descriptor_type (struct type *type)
14f9c5c9 1526{
d2e4a39e 1527 struct type *base_type = desc_base_type (type);
5b4ee69b 1528
14f9c5c9
AS
1529 if (base_type == NULL)
1530 return NULL;
1531 if (is_suffix (ada_type_name (base_type), "___XVE"))
1532 return base_type;
d2e4a39e 1533 else
14f9c5c9 1534 {
d2e4a39e 1535 struct type *alt_type = ada_find_parallel_type (base_type, "___XVE");
5b4ee69b 1536
14f9c5c9 1537 if (alt_type == NULL)
4c4b4cd2 1538 return base_type;
14f9c5c9 1539 else
4c4b4cd2 1540 return alt_type;
14f9c5c9
AS
1541 }
1542}
1543
4c4b4cd2
PH
1544/* A pointer to the array data for thin-pointer value VAL. */
1545
d2e4a39e
AS
1546static struct value *
1547thin_data_pntr (struct value *val)
14f9c5c9 1548{
828292f2 1549 struct type *type = ada_check_typedef (value_type (val));
556bdfd4 1550 struct type *data_type = desc_data_target_type (thin_descriptor_type (type));
5b4ee69b 1551
556bdfd4
UW
1552 data_type = lookup_pointer_type (data_type);
1553
78134374 1554 if (type->code () == TYPE_CODE_PTR)
556bdfd4 1555 return value_cast (data_type, value_copy (val));
d2e4a39e 1556 else
42ae5230 1557 return value_from_longest (data_type, value_address (val));
14f9c5c9
AS
1558}
1559
4c4b4cd2
PH
1560/* True iff TYPE indicates a "thick" array pointer type. */
1561
14f9c5c9 1562static int
d2e4a39e 1563is_thick_pntr (struct type *type)
14f9c5c9
AS
1564{
1565 type = desc_base_type (type);
78134374 1566 return (type != NULL && type->code () == TYPE_CODE_STRUCT
4c4b4cd2 1567 && lookup_struct_elt_type (type, "P_BOUNDS", 1) != NULL);
14f9c5c9
AS
1568}
1569
4c4b4cd2
PH
1570/* If TYPE is the type of an array descriptor (fat or thin pointer) or a
1571 pointer to one, the type of its bounds data; otherwise, NULL. */
76a01679 1572
d2e4a39e
AS
1573static struct type *
1574desc_bounds_type (struct type *type)
14f9c5c9 1575{
d2e4a39e 1576 struct type *r;
14f9c5c9
AS
1577
1578 type = desc_base_type (type);
1579
1580 if (type == NULL)
1581 return NULL;
1582 else if (is_thin_pntr (type))
1583 {
1584 type = thin_descriptor_type (type);
1585 if (type == NULL)
4c4b4cd2 1586 return NULL;
14f9c5c9
AS
1587 r = lookup_struct_elt_type (type, "BOUNDS", 1);
1588 if (r != NULL)
61ee279c 1589 return ada_check_typedef (r);
14f9c5c9 1590 }
78134374 1591 else if (type->code () == TYPE_CODE_STRUCT)
14f9c5c9
AS
1592 {
1593 r = lookup_struct_elt_type (type, "P_BOUNDS", 1);
1594 if (r != NULL)
61ee279c 1595 return ada_check_typedef (TYPE_TARGET_TYPE (ada_check_typedef (r)));
14f9c5c9
AS
1596 }
1597 return NULL;
1598}
1599
1600/* If ARR is an array descriptor (fat or thin pointer), or pointer to
4c4b4cd2
PH
1601 one, a pointer to its bounds data. Otherwise NULL. */
1602
d2e4a39e
AS
1603static struct value *
1604desc_bounds (struct value *arr)
14f9c5c9 1605{
df407dfe 1606 struct type *type = ada_check_typedef (value_type (arr));
5b4ee69b 1607
d2e4a39e 1608 if (is_thin_pntr (type))
14f9c5c9 1609 {
d2e4a39e 1610 struct type *bounds_type =
4c4b4cd2 1611 desc_bounds_type (thin_descriptor_type (type));
14f9c5c9
AS
1612 LONGEST addr;
1613
4cdfadb1 1614 if (bounds_type == NULL)
323e0a4a 1615 error (_("Bad GNAT array descriptor"));
14f9c5c9
AS
1616
1617 /* NOTE: The following calculation is not really kosher, but
d2e4a39e 1618 since desc_type is an XVE-encoded type (and shouldn't be),
4c4b4cd2 1619 the correct calculation is a real pain. FIXME (and fix GCC). */
78134374 1620 if (type->code () == TYPE_CODE_PTR)
4c4b4cd2 1621 addr = value_as_long (arr);
d2e4a39e 1622 else
42ae5230 1623 addr = value_address (arr);
14f9c5c9 1624
d2e4a39e 1625 return
4c4b4cd2
PH
1626 value_from_longest (lookup_pointer_type (bounds_type),
1627 addr - TYPE_LENGTH (bounds_type));
14f9c5c9
AS
1628 }
1629
1630 else if (is_thick_pntr (type))
05e522ef
JB
1631 {
1632 struct value *p_bounds = value_struct_elt (&arr, NULL, "P_BOUNDS", NULL,
1633 _("Bad GNAT array descriptor"));
1634 struct type *p_bounds_type = value_type (p_bounds);
1635
1636 if (p_bounds_type
78134374 1637 && p_bounds_type->code () == TYPE_CODE_PTR)
05e522ef
JB
1638 {
1639 struct type *target_type = TYPE_TARGET_TYPE (p_bounds_type);
1640
1641 if (TYPE_STUB (target_type))
1642 p_bounds = value_cast (lookup_pointer_type
1643 (ada_check_typedef (target_type)),
1644 p_bounds);
1645 }
1646 else
1647 error (_("Bad GNAT array descriptor"));
1648
1649 return p_bounds;
1650 }
14f9c5c9
AS
1651 else
1652 return NULL;
1653}
1654
4c4b4cd2
PH
1655/* If TYPE is the type of an array-descriptor (fat pointer), the bit
1656 position of the field containing the address of the bounds data. */
1657
14f9c5c9 1658static int
d2e4a39e 1659fat_pntr_bounds_bitpos (struct type *type)
14f9c5c9
AS
1660{
1661 return TYPE_FIELD_BITPOS (desc_base_type (type), 1);
1662}
1663
1664/* If TYPE is the type of an array-descriptor (fat pointer), the bit
4c4b4cd2
PH
1665 size of the field containing the address of the bounds data. */
1666
14f9c5c9 1667static int
d2e4a39e 1668fat_pntr_bounds_bitsize (struct type *type)
14f9c5c9
AS
1669{
1670 type = desc_base_type (type);
1671
d2e4a39e 1672 if (TYPE_FIELD_BITSIZE (type, 1) > 0)
14f9c5c9
AS
1673 return TYPE_FIELD_BITSIZE (type, 1);
1674 else
61ee279c 1675 return 8 * TYPE_LENGTH (ada_check_typedef (TYPE_FIELD_TYPE (type, 1)));
14f9c5c9
AS
1676}
1677
4c4b4cd2 1678/* If TYPE is the type of an array descriptor (fat or thin pointer) or a
556bdfd4
UW
1679 pointer to one, the type of its array data (a array-with-no-bounds type);
1680 otherwise, NULL. Use ada_type_of_array to get an array type with bounds
1681 data. */
4c4b4cd2 1682
d2e4a39e 1683static struct type *
556bdfd4 1684desc_data_target_type (struct type *type)
14f9c5c9
AS
1685{
1686 type = desc_base_type (type);
1687
4c4b4cd2 1688 /* NOTE: The following is bogus; see comment in desc_bounds. */
14f9c5c9 1689 if (is_thin_pntr (type))
556bdfd4 1690 return desc_base_type (TYPE_FIELD_TYPE (thin_descriptor_type (type), 1));
14f9c5c9 1691 else if (is_thick_pntr (type))
556bdfd4
UW
1692 {
1693 struct type *data_type = lookup_struct_elt_type (type, "P_ARRAY", 1);
1694
1695 if (data_type
78134374 1696 && ada_check_typedef (data_type)->code () == TYPE_CODE_PTR)
05e522ef 1697 return ada_check_typedef (TYPE_TARGET_TYPE (data_type));
556bdfd4
UW
1698 }
1699
1700 return NULL;
14f9c5c9
AS
1701}
1702
1703/* If ARR is an array descriptor (fat or thin pointer), a pointer to
1704 its array data. */
4c4b4cd2 1705
d2e4a39e
AS
1706static struct value *
1707desc_data (struct value *arr)
14f9c5c9 1708{
df407dfe 1709 struct type *type = value_type (arr);
5b4ee69b 1710
14f9c5c9
AS
1711 if (is_thin_pntr (type))
1712 return thin_data_pntr (arr);
1713 else if (is_thick_pntr (type))
d2e4a39e 1714 return value_struct_elt (&arr, NULL, "P_ARRAY", NULL,
323e0a4a 1715 _("Bad GNAT array descriptor"));
14f9c5c9
AS
1716 else
1717 return NULL;
1718}
1719
1720
1721/* If TYPE is the type of an array-descriptor (fat pointer), the bit
4c4b4cd2
PH
1722 position of the field containing the address of the data. */
1723
14f9c5c9 1724static int
d2e4a39e 1725fat_pntr_data_bitpos (struct type *type)
14f9c5c9
AS
1726{
1727 return TYPE_FIELD_BITPOS (desc_base_type (type), 0);
1728}
1729
1730/* If TYPE is the type of an array-descriptor (fat pointer), the bit
4c4b4cd2
PH
1731 size of the field containing the address of the data. */
1732
14f9c5c9 1733static int
d2e4a39e 1734fat_pntr_data_bitsize (struct type *type)
14f9c5c9
AS
1735{
1736 type = desc_base_type (type);
1737
1738 if (TYPE_FIELD_BITSIZE (type, 0) > 0)
1739 return TYPE_FIELD_BITSIZE (type, 0);
d2e4a39e 1740 else
14f9c5c9
AS
1741 return TARGET_CHAR_BIT * TYPE_LENGTH (TYPE_FIELD_TYPE (type, 0));
1742}
1743
4c4b4cd2 1744/* If BOUNDS is an array-bounds structure (or pointer to one), return
14f9c5c9 1745 the Ith lower bound stored in it, if WHICH is 0, and the Ith upper
4c4b4cd2
PH
1746 bound, if WHICH is 1. The first bound is I=1. */
1747
d2e4a39e
AS
1748static struct value *
1749desc_one_bound (struct value *bounds, int i, int which)
14f9c5c9 1750{
250106a7
TT
1751 char bound_name[20];
1752 xsnprintf (bound_name, sizeof (bound_name), "%cB%d",
1753 which ? 'U' : 'L', i - 1);
1754 return value_struct_elt (&bounds, NULL, bound_name, NULL,
323e0a4a 1755 _("Bad GNAT array descriptor bounds"));
14f9c5c9
AS
1756}
1757
1758/* If BOUNDS is an array-bounds structure type, return the bit position
1759 of the Ith lower bound stored in it, if WHICH is 0, and the Ith upper
4c4b4cd2
PH
1760 bound, if WHICH is 1. The first bound is I=1. */
1761
14f9c5c9 1762static int
d2e4a39e 1763desc_bound_bitpos (struct type *type, int i, int which)
14f9c5c9 1764{
d2e4a39e 1765 return TYPE_FIELD_BITPOS (desc_base_type (type), 2 * i + which - 2);
14f9c5c9
AS
1766}
1767
1768/* If BOUNDS is an array-bounds structure type, return the bit field size
1769 of the Ith lower bound stored in it, if WHICH is 0, and the Ith upper
4c4b4cd2
PH
1770 bound, if WHICH is 1. The first bound is I=1. */
1771
76a01679 1772static int
d2e4a39e 1773desc_bound_bitsize (struct type *type, int i, int which)
14f9c5c9
AS
1774{
1775 type = desc_base_type (type);
1776
d2e4a39e
AS
1777 if (TYPE_FIELD_BITSIZE (type, 2 * i + which - 2) > 0)
1778 return TYPE_FIELD_BITSIZE (type, 2 * i + which - 2);
1779 else
1780 return 8 * TYPE_LENGTH (TYPE_FIELD_TYPE (type, 2 * i + which - 2));
14f9c5c9
AS
1781}
1782
1783/* If TYPE is the type of an array-bounds structure, the type of its
4c4b4cd2
PH
1784 Ith bound (numbering from 1). Otherwise, NULL. */
1785
d2e4a39e
AS
1786static struct type *
1787desc_index_type (struct type *type, int i)
14f9c5c9
AS
1788{
1789 type = desc_base_type (type);
1790
78134374 1791 if (type->code () == TYPE_CODE_STRUCT)
250106a7
TT
1792 {
1793 char bound_name[20];
1794 xsnprintf (bound_name, sizeof (bound_name), "LB%d", i - 1);
1795 return lookup_struct_elt_type (type, bound_name, 1);
1796 }
d2e4a39e 1797 else
14f9c5c9
AS
1798 return NULL;
1799}
1800
4c4b4cd2
PH
1801/* The number of index positions in the array-bounds type TYPE.
1802 Return 0 if TYPE is NULL. */
1803
14f9c5c9 1804static int
d2e4a39e 1805desc_arity (struct type *type)
14f9c5c9
AS
1806{
1807 type = desc_base_type (type);
1808
1809 if (type != NULL)
1810 return TYPE_NFIELDS (type) / 2;
1811 return 0;
1812}
1813
4c4b4cd2
PH
1814/* Non-zero iff TYPE is a simple array type (not a pointer to one) or
1815 an array descriptor type (representing an unconstrained array
1816 type). */
1817
76a01679
JB
1818static int
1819ada_is_direct_array_type (struct type *type)
4c4b4cd2
PH
1820{
1821 if (type == NULL)
1822 return 0;
61ee279c 1823 type = ada_check_typedef (type);
78134374 1824 return (type->code () == TYPE_CODE_ARRAY
76a01679 1825 || ada_is_array_descriptor_type (type));
4c4b4cd2
PH
1826}
1827
52ce6436 1828/* Non-zero iff TYPE represents any kind of array in Ada, or a pointer
0963b4bd 1829 * to one. */
52ce6436 1830
2c0b251b 1831static int
52ce6436
PH
1832ada_is_array_type (struct type *type)
1833{
78134374
SM
1834 while (type != NULL
1835 && (type->code () == TYPE_CODE_PTR
1836 || type->code () == TYPE_CODE_REF))
52ce6436
PH
1837 type = TYPE_TARGET_TYPE (type);
1838 return ada_is_direct_array_type (type);
1839}
1840
4c4b4cd2 1841/* Non-zero iff TYPE is a simple array type or pointer to one. */
14f9c5c9 1842
14f9c5c9 1843int
4c4b4cd2 1844ada_is_simple_array_type (struct type *type)
14f9c5c9
AS
1845{
1846 if (type == NULL)
1847 return 0;
61ee279c 1848 type = ada_check_typedef (type);
78134374
SM
1849 return (type->code () == TYPE_CODE_ARRAY
1850 || (type->code () == TYPE_CODE_PTR
1851 && (ada_check_typedef (TYPE_TARGET_TYPE (type))->code ()
1852 == TYPE_CODE_ARRAY)));
14f9c5c9
AS
1853}
1854
4c4b4cd2
PH
1855/* Non-zero iff TYPE belongs to a GNAT array descriptor. */
1856
14f9c5c9 1857int
4c4b4cd2 1858ada_is_array_descriptor_type (struct type *type)
14f9c5c9 1859{
556bdfd4 1860 struct type *data_type = desc_data_target_type (type);
14f9c5c9
AS
1861
1862 if (type == NULL)
1863 return 0;
61ee279c 1864 type = ada_check_typedef (type);
556bdfd4 1865 return (data_type != NULL
78134374 1866 && data_type->code () == TYPE_CODE_ARRAY
556bdfd4 1867 && desc_arity (desc_bounds_type (type)) > 0);
14f9c5c9
AS
1868}
1869
1870/* Non-zero iff type is a partially mal-formed GNAT array
4c4b4cd2 1871 descriptor. FIXME: This is to compensate for some problems with
14f9c5c9 1872 debugging output from GNAT. Re-examine periodically to see if it
4c4b4cd2
PH
1873 is still needed. */
1874
14f9c5c9 1875int
ebf56fd3 1876ada_is_bogus_array_descriptor (struct type *type)
14f9c5c9 1877{
d2e4a39e 1878 return
14f9c5c9 1879 type != NULL
78134374 1880 && type->code () == TYPE_CODE_STRUCT
14f9c5c9 1881 && (lookup_struct_elt_type (type, "P_BOUNDS", 1) != NULL
4c4b4cd2
PH
1882 || lookup_struct_elt_type (type, "P_ARRAY", 1) != NULL)
1883 && !ada_is_array_descriptor_type (type);
14f9c5c9
AS
1884}
1885
1886
4c4b4cd2 1887/* If ARR has a record type in the form of a standard GNAT array descriptor,
14f9c5c9 1888 (fat pointer) returns the type of the array data described---specifically,
4c4b4cd2 1889 a pointer-to-array type. If BOUNDS is non-zero, the bounds data are filled
14f9c5c9 1890 in from the descriptor; otherwise, they are left unspecified. If
4c4b4cd2
PH
1891 the ARR denotes a null array descriptor and BOUNDS is non-zero,
1892 returns NULL. The result is simply the type of ARR if ARR is not
14f9c5c9 1893 a descriptor. */
de93309a
SM
1894
1895static struct type *
d2e4a39e 1896ada_type_of_array (struct value *arr, int bounds)
14f9c5c9 1897{
ad82864c
JB
1898 if (ada_is_constrained_packed_array_type (value_type (arr)))
1899 return decode_constrained_packed_array_type (value_type (arr));
14f9c5c9 1900
df407dfe
AC
1901 if (!ada_is_array_descriptor_type (value_type (arr)))
1902 return value_type (arr);
d2e4a39e
AS
1903
1904 if (!bounds)
ad82864c
JB
1905 {
1906 struct type *array_type =
1907 ada_check_typedef (desc_data_target_type (value_type (arr)));
1908
1909 if (ada_is_unconstrained_packed_array_type (value_type (arr)))
1910 TYPE_FIELD_BITSIZE (array_type, 0) =
1911 decode_packed_array_bitsize (value_type (arr));
1912
1913 return array_type;
1914 }
14f9c5c9
AS
1915 else
1916 {
d2e4a39e 1917 struct type *elt_type;
14f9c5c9 1918 int arity;
d2e4a39e 1919 struct value *descriptor;
14f9c5c9 1920
df407dfe
AC
1921 elt_type = ada_array_element_type (value_type (arr), -1);
1922 arity = ada_array_arity (value_type (arr));
14f9c5c9 1923
d2e4a39e 1924 if (elt_type == NULL || arity == 0)
df407dfe 1925 return ada_check_typedef (value_type (arr));
14f9c5c9
AS
1926
1927 descriptor = desc_bounds (arr);
d2e4a39e 1928 if (value_as_long (descriptor) == 0)
4c4b4cd2 1929 return NULL;
d2e4a39e 1930 while (arity > 0)
4c4b4cd2 1931 {
e9bb382b
UW
1932 struct type *range_type = alloc_type_copy (value_type (arr));
1933 struct type *array_type = alloc_type_copy (value_type (arr));
4c4b4cd2
PH
1934 struct value *low = desc_one_bound (descriptor, arity, 0);
1935 struct value *high = desc_one_bound (descriptor, arity, 1);
4c4b4cd2 1936
5b4ee69b 1937 arity -= 1;
0c9c3474
SA
1938 create_static_range_type (range_type, value_type (low),
1939 longest_to_int (value_as_long (low)),
1940 longest_to_int (value_as_long (high)));
4c4b4cd2 1941 elt_type = create_array_type (array_type, elt_type, range_type);
ad82864c
JB
1942
1943 if (ada_is_unconstrained_packed_array_type (value_type (arr)))
e67ad678
JB
1944 {
1945 /* We need to store the element packed bitsize, as well as
1946 recompute the array size, because it was previously
1947 computed based on the unpacked element size. */
1948 LONGEST lo = value_as_long (low);
1949 LONGEST hi = value_as_long (high);
1950
1951 TYPE_FIELD_BITSIZE (elt_type, 0) =
1952 decode_packed_array_bitsize (value_type (arr));
1953 /* If the array has no element, then the size is already
1954 zero, and does not need to be recomputed. */
1955 if (lo < hi)
1956 {
1957 int array_bitsize =
1958 (hi - lo + 1) * TYPE_FIELD_BITSIZE (elt_type, 0);
1959
1960 TYPE_LENGTH (array_type) = (array_bitsize + 7) / 8;
1961 }
1962 }
4c4b4cd2 1963 }
14f9c5c9
AS
1964
1965 return lookup_pointer_type (elt_type);
1966 }
1967}
1968
1969/* If ARR does not represent an array, returns ARR unchanged.
4c4b4cd2
PH
1970 Otherwise, returns either a standard GDB array with bounds set
1971 appropriately or, if ARR is a non-null fat pointer, a pointer to a standard
1972 GDB array. Returns NULL if ARR is a null fat pointer. */
1973
d2e4a39e
AS
1974struct value *
1975ada_coerce_to_simple_array_ptr (struct value *arr)
14f9c5c9 1976{
df407dfe 1977 if (ada_is_array_descriptor_type (value_type (arr)))
14f9c5c9 1978 {
d2e4a39e 1979 struct type *arrType = ada_type_of_array (arr, 1);
5b4ee69b 1980
14f9c5c9 1981 if (arrType == NULL)
4c4b4cd2 1982 return NULL;
14f9c5c9
AS
1983 return value_cast (arrType, value_copy (desc_data (arr)));
1984 }
ad82864c
JB
1985 else if (ada_is_constrained_packed_array_type (value_type (arr)))
1986 return decode_constrained_packed_array (arr);
14f9c5c9
AS
1987 else
1988 return arr;
1989}
1990
1991/* If ARR does not represent an array, returns ARR unchanged.
1992 Otherwise, returns a standard GDB array describing ARR (which may
4c4b4cd2
PH
1993 be ARR itself if it already is in the proper form). */
1994
720d1a40 1995struct value *
d2e4a39e 1996ada_coerce_to_simple_array (struct value *arr)
14f9c5c9 1997{
df407dfe 1998 if (ada_is_array_descriptor_type (value_type (arr)))
14f9c5c9 1999 {
d2e4a39e 2000 struct value *arrVal = ada_coerce_to_simple_array_ptr (arr);
5b4ee69b 2001
14f9c5c9 2002 if (arrVal == NULL)
323e0a4a 2003 error (_("Bounds unavailable for null array pointer."));
c1b5a1a6 2004 ada_ensure_varsize_limit (TYPE_TARGET_TYPE (value_type (arrVal)));
14f9c5c9
AS
2005 return value_ind (arrVal);
2006 }
ad82864c
JB
2007 else if (ada_is_constrained_packed_array_type (value_type (arr)))
2008 return decode_constrained_packed_array (arr);
d2e4a39e 2009 else
14f9c5c9
AS
2010 return arr;
2011}
2012
2013/* If TYPE represents a GNAT array type, return it translated to an
2014 ordinary GDB array type (possibly with BITSIZE fields indicating
4c4b4cd2
PH
2015 packing). For other types, is the identity. */
2016
d2e4a39e
AS
2017struct type *
2018ada_coerce_to_simple_array_type (struct type *type)
14f9c5c9 2019{
ad82864c
JB
2020 if (ada_is_constrained_packed_array_type (type))
2021 return decode_constrained_packed_array_type (type);
17280b9f
UW
2022
2023 if (ada_is_array_descriptor_type (type))
556bdfd4 2024 return ada_check_typedef (desc_data_target_type (type));
17280b9f
UW
2025
2026 return type;
14f9c5c9
AS
2027}
2028
4c4b4cd2
PH
2029/* Non-zero iff TYPE represents a standard GNAT packed-array type. */
2030
ad82864c
JB
2031static int
2032ada_is_packed_array_type (struct type *type)
14f9c5c9
AS
2033{
2034 if (type == NULL)
2035 return 0;
4c4b4cd2 2036 type = desc_base_type (type);
61ee279c 2037 type = ada_check_typedef (type);
d2e4a39e 2038 return
14f9c5c9
AS
2039 ada_type_name (type) != NULL
2040 && strstr (ada_type_name (type), "___XP") != NULL;
2041}
2042
ad82864c
JB
2043/* Non-zero iff TYPE represents a standard GNAT constrained
2044 packed-array type. */
2045
2046int
2047ada_is_constrained_packed_array_type (struct type *type)
2048{
2049 return ada_is_packed_array_type (type)
2050 && !ada_is_array_descriptor_type (type);
2051}
2052
2053/* Non-zero iff TYPE represents an array descriptor for a
2054 unconstrained packed-array type. */
2055
2056static int
2057ada_is_unconstrained_packed_array_type (struct type *type)
2058{
2059 return ada_is_packed_array_type (type)
2060 && ada_is_array_descriptor_type (type);
2061}
2062
2063/* Given that TYPE encodes a packed array type (constrained or unconstrained),
2064 return the size of its elements in bits. */
2065
2066static long
2067decode_packed_array_bitsize (struct type *type)
2068{
0d5cff50
DE
2069 const char *raw_name;
2070 const char *tail;
ad82864c
JB
2071 long bits;
2072
720d1a40
JB
2073 /* Access to arrays implemented as fat pointers are encoded as a typedef
2074 of the fat pointer type. We need the name of the fat pointer type
2075 to do the decoding, so strip the typedef layer. */
78134374 2076 if (type->code () == TYPE_CODE_TYPEDEF)
720d1a40
JB
2077 type = ada_typedef_target_type (type);
2078
2079 raw_name = ada_type_name (ada_check_typedef (type));
ad82864c
JB
2080 if (!raw_name)
2081 raw_name = ada_type_name (desc_base_type (type));
2082
2083 if (!raw_name)
2084 return 0;
2085
2086 tail = strstr (raw_name, "___XP");
720d1a40 2087 gdb_assert (tail != NULL);
ad82864c
JB
2088
2089 if (sscanf (tail + sizeof ("___XP") - 1, "%ld", &bits) != 1)
2090 {
2091 lim_warning
2092 (_("could not understand bit size information on packed array"));
2093 return 0;
2094 }
2095
2096 return bits;
2097}
2098
14f9c5c9
AS
2099/* Given that TYPE is a standard GDB array type with all bounds filled
2100 in, and that the element size of its ultimate scalar constituents
2101 (that is, either its elements, or, if it is an array of arrays, its
2102 elements' elements, etc.) is *ELT_BITS, return an identical type,
2103 but with the bit sizes of its elements (and those of any
2104 constituent arrays) recorded in the BITSIZE components of its
4c4b4cd2 2105 TYPE_FIELD_BITSIZE values, and with *ELT_BITS set to its total size
4a46959e
JB
2106 in bits.
2107
2108 Note that, for arrays whose index type has an XA encoding where
2109 a bound references a record discriminant, getting that discriminant,
2110 and therefore the actual value of that bound, is not possible
2111 because none of the given parameters gives us access to the record.
2112 This function assumes that it is OK in the context where it is being
2113 used to return an array whose bounds are still dynamic and where
2114 the length is arbitrary. */
4c4b4cd2 2115
d2e4a39e 2116static struct type *
ad82864c 2117constrained_packed_array_type (struct type *type, long *elt_bits)
14f9c5c9 2118{
d2e4a39e
AS
2119 struct type *new_elt_type;
2120 struct type *new_type;
99b1c762
JB
2121 struct type *index_type_desc;
2122 struct type *index_type;
14f9c5c9
AS
2123 LONGEST low_bound, high_bound;
2124
61ee279c 2125 type = ada_check_typedef (type);
78134374 2126 if (type->code () != TYPE_CODE_ARRAY)
14f9c5c9
AS
2127 return type;
2128
99b1c762
JB
2129 index_type_desc = ada_find_parallel_type (type, "___XA");
2130 if (index_type_desc)
2131 index_type = to_fixed_range_type (TYPE_FIELD_TYPE (index_type_desc, 0),
2132 NULL);
2133 else
2134 index_type = TYPE_INDEX_TYPE (type);
2135
e9bb382b 2136 new_type = alloc_type_copy (type);
ad82864c
JB
2137 new_elt_type =
2138 constrained_packed_array_type (ada_check_typedef (TYPE_TARGET_TYPE (type)),
2139 elt_bits);
99b1c762 2140 create_array_type (new_type, new_elt_type, index_type);
14f9c5c9 2141 TYPE_FIELD_BITSIZE (new_type, 0) = *elt_bits;
d0e39ea2 2142 new_type->set_name (ada_type_name (type));
14f9c5c9 2143
78134374 2144 if ((check_typedef (index_type)->code () == TYPE_CODE_RANGE
4a46959e
JB
2145 && is_dynamic_type (check_typedef (index_type)))
2146 || get_discrete_bounds (index_type, &low_bound, &high_bound) < 0)
14f9c5c9
AS
2147 low_bound = high_bound = 0;
2148 if (high_bound < low_bound)
2149 *elt_bits = TYPE_LENGTH (new_type) = 0;
d2e4a39e 2150 else
14f9c5c9
AS
2151 {
2152 *elt_bits *= (high_bound - low_bound + 1);
d2e4a39e 2153 TYPE_LENGTH (new_type) =
4c4b4cd2 2154 (*elt_bits + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT;
14f9c5c9
AS
2155 }
2156
876cecd0 2157 TYPE_FIXED_INSTANCE (new_type) = 1;
14f9c5c9
AS
2158 return new_type;
2159}
2160
ad82864c
JB
2161/* The array type encoded by TYPE, where
2162 ada_is_constrained_packed_array_type (TYPE). */
4c4b4cd2 2163
d2e4a39e 2164static struct type *
ad82864c 2165decode_constrained_packed_array_type (struct type *type)
d2e4a39e 2166{
0d5cff50 2167 const char *raw_name = ada_type_name (ada_check_typedef (type));
727e3d2e 2168 char *name;
0d5cff50 2169 const char *tail;
d2e4a39e 2170 struct type *shadow_type;
14f9c5c9 2171 long bits;
14f9c5c9 2172
727e3d2e
JB
2173 if (!raw_name)
2174 raw_name = ada_type_name (desc_base_type (type));
2175
2176 if (!raw_name)
2177 return NULL;
2178
2179 name = (char *) alloca (strlen (raw_name) + 1);
2180 tail = strstr (raw_name, "___XP");
4c4b4cd2
PH
2181 type = desc_base_type (type);
2182
14f9c5c9
AS
2183 memcpy (name, raw_name, tail - raw_name);
2184 name[tail - raw_name] = '\000';
2185
b4ba55a1
JB
2186 shadow_type = ada_find_parallel_type_with_name (type, name);
2187
2188 if (shadow_type == NULL)
14f9c5c9 2189 {
323e0a4a 2190 lim_warning (_("could not find bounds information on packed array"));
14f9c5c9
AS
2191 return NULL;
2192 }
f168693b 2193 shadow_type = check_typedef (shadow_type);
14f9c5c9 2194
78134374 2195 if (shadow_type->code () != TYPE_CODE_ARRAY)
14f9c5c9 2196 {
0963b4bd
MS
2197 lim_warning (_("could not understand bounds "
2198 "information on packed array"));
14f9c5c9
AS
2199 return NULL;
2200 }
d2e4a39e 2201
ad82864c
JB
2202 bits = decode_packed_array_bitsize (type);
2203 return constrained_packed_array_type (shadow_type, &bits);
14f9c5c9
AS
2204}
2205
ad82864c
JB
2206/* Given that ARR is a struct value *indicating a GNAT constrained packed
2207 array, returns a simple array that denotes that array. Its type is a
14f9c5c9
AS
2208 standard GDB array type except that the BITSIZEs of the array
2209 target types are set to the number of bits in each element, and the
4c4b4cd2 2210 type length is set appropriately. */
14f9c5c9 2211
d2e4a39e 2212static struct value *
ad82864c 2213decode_constrained_packed_array (struct value *arr)
14f9c5c9 2214{
4c4b4cd2 2215 struct type *type;
14f9c5c9 2216
11aa919a
PMR
2217 /* If our value is a pointer, then dereference it. Likewise if
2218 the value is a reference. Make sure that this operation does not
2219 cause the target type to be fixed, as this would indirectly cause
2220 this array to be decoded. The rest of the routine assumes that
2221 the array hasn't been decoded yet, so we use the basic "coerce_ref"
2222 and "value_ind" routines to perform the dereferencing, as opposed
2223 to using "ada_coerce_ref" or "ada_value_ind". */
2224 arr = coerce_ref (arr);
78134374 2225 if (ada_check_typedef (value_type (arr))->code () == TYPE_CODE_PTR)
284614f0 2226 arr = value_ind (arr);
4c4b4cd2 2227
ad82864c 2228 type = decode_constrained_packed_array_type (value_type (arr));
14f9c5c9
AS
2229 if (type == NULL)
2230 {
323e0a4a 2231 error (_("can't unpack array"));
14f9c5c9
AS
2232 return NULL;
2233 }
61ee279c 2234
d5a22e77 2235 if (type_byte_order (value_type (arr)) == BFD_ENDIAN_BIG
32c9a795 2236 && ada_is_modular_type (value_type (arr)))
61ee279c
PH
2237 {
2238 /* This is a (right-justified) modular type representing a packed
2239 array with no wrapper. In order to interpret the value through
2240 the (left-justified) packed array type we just built, we must
2241 first left-justify it. */
2242 int bit_size, bit_pos;
2243 ULONGEST mod;
2244
df407dfe 2245 mod = ada_modulus (value_type (arr)) - 1;
61ee279c
PH
2246 bit_size = 0;
2247 while (mod > 0)
2248 {
2249 bit_size += 1;
2250 mod >>= 1;
2251 }
df407dfe 2252 bit_pos = HOST_CHAR_BIT * TYPE_LENGTH (value_type (arr)) - bit_size;
61ee279c
PH
2253 arr = ada_value_primitive_packed_val (arr, NULL,
2254 bit_pos / HOST_CHAR_BIT,
2255 bit_pos % HOST_CHAR_BIT,
2256 bit_size,
2257 type);
2258 }
2259
4c4b4cd2 2260 return coerce_unspec_val_to_type (arr, type);
14f9c5c9
AS
2261}
2262
2263
2264/* The value of the element of packed array ARR at the ARITY indices
4c4b4cd2 2265 given in IND. ARR must be a simple array. */
14f9c5c9 2266
d2e4a39e
AS
2267static struct value *
2268value_subscript_packed (struct value *arr, int arity, struct value **ind)
14f9c5c9
AS
2269{
2270 int i;
2271 int bits, elt_off, bit_off;
2272 long elt_total_bit_offset;
d2e4a39e
AS
2273 struct type *elt_type;
2274 struct value *v;
14f9c5c9
AS
2275
2276 bits = 0;
2277 elt_total_bit_offset = 0;
df407dfe 2278 elt_type = ada_check_typedef (value_type (arr));
d2e4a39e 2279 for (i = 0; i < arity; i += 1)
14f9c5c9 2280 {
78134374 2281 if (elt_type->code () != TYPE_CODE_ARRAY
4c4b4cd2
PH
2282 || TYPE_FIELD_BITSIZE (elt_type, 0) == 0)
2283 error
0963b4bd
MS
2284 (_("attempt to do packed indexing of "
2285 "something other than a packed array"));
14f9c5c9 2286 else
4c4b4cd2
PH
2287 {
2288 struct type *range_type = TYPE_INDEX_TYPE (elt_type);
2289 LONGEST lowerbound, upperbound;
2290 LONGEST idx;
2291
2292 if (get_discrete_bounds (range_type, &lowerbound, &upperbound) < 0)
2293 {
323e0a4a 2294 lim_warning (_("don't know bounds of array"));
4c4b4cd2
PH
2295 lowerbound = upperbound = 0;
2296 }
2297
3cb382c9 2298 idx = pos_atr (ind[i]);
4c4b4cd2 2299 if (idx < lowerbound || idx > upperbound)
0963b4bd
MS
2300 lim_warning (_("packed array index %ld out of bounds"),
2301 (long) idx);
4c4b4cd2
PH
2302 bits = TYPE_FIELD_BITSIZE (elt_type, 0);
2303 elt_total_bit_offset += (idx - lowerbound) * bits;
61ee279c 2304 elt_type = ada_check_typedef (TYPE_TARGET_TYPE (elt_type));
4c4b4cd2 2305 }
14f9c5c9
AS
2306 }
2307 elt_off = elt_total_bit_offset / HOST_CHAR_BIT;
2308 bit_off = elt_total_bit_offset % HOST_CHAR_BIT;
d2e4a39e
AS
2309
2310 v = ada_value_primitive_packed_val (arr, NULL, elt_off, bit_off,
4c4b4cd2 2311 bits, elt_type);
14f9c5c9
AS
2312 return v;
2313}
2314
4c4b4cd2 2315/* Non-zero iff TYPE includes negative integer values. */
14f9c5c9
AS
2316
2317static int
d2e4a39e 2318has_negatives (struct type *type)
14f9c5c9 2319{
78134374 2320 switch (type->code ())
d2e4a39e
AS
2321 {
2322 default:
2323 return 0;
2324 case TYPE_CODE_INT:
2325 return !TYPE_UNSIGNED (type);
2326 case TYPE_CODE_RANGE:
4e962e74 2327 return TYPE_LOW_BOUND (type) - TYPE_RANGE_DATA (type)->bias < 0;
d2e4a39e 2328 }
14f9c5c9 2329}
d2e4a39e 2330
f93fca70 2331/* With SRC being a buffer containing BIT_SIZE bits of data at BIT_OFFSET,
5b639dea 2332 unpack that data into UNPACKED. UNPACKED_LEN is the size in bytes of
f93fca70 2333 the unpacked buffer.
14f9c5c9 2334
5b639dea
JB
2335 The size of the unpacked buffer (UNPACKED_LEN) is expected to be large
2336 enough to contain at least BIT_OFFSET bits. If not, an error is raised.
2337
f93fca70
JB
2338 IS_BIG_ENDIAN is nonzero if the data is stored in big endian mode,
2339 zero otherwise.
14f9c5c9 2340
f93fca70 2341 IS_SIGNED_TYPE is nonzero if the data corresponds to a signed type.
a1c95e6b 2342
f93fca70
JB
2343 IS_SCALAR is nonzero if the data corresponds to a signed type. */
2344
2345static void
2346ada_unpack_from_contents (const gdb_byte *src, int bit_offset, int bit_size,
2347 gdb_byte *unpacked, int unpacked_len,
2348 int is_big_endian, int is_signed_type,
2349 int is_scalar)
2350{
a1c95e6b
JB
2351 int src_len = (bit_size + bit_offset + HOST_CHAR_BIT - 1) / 8;
2352 int src_idx; /* Index into the source area */
2353 int src_bytes_left; /* Number of source bytes left to process. */
2354 int srcBitsLeft; /* Number of source bits left to move */
2355 int unusedLS; /* Number of bits in next significant
2356 byte of source that are unused */
2357
a1c95e6b
JB
2358 int unpacked_idx; /* Index into the unpacked buffer */
2359 int unpacked_bytes_left; /* Number of bytes left to set in unpacked. */
2360
4c4b4cd2 2361 unsigned long accum; /* Staging area for bits being transferred */
a1c95e6b 2362 int accumSize; /* Number of meaningful bits in accum */
14f9c5c9 2363 unsigned char sign;
a1c95e6b 2364
4c4b4cd2
PH
2365 /* Transmit bytes from least to most significant; delta is the direction
2366 the indices move. */
f93fca70 2367 int delta = is_big_endian ? -1 : 1;
14f9c5c9 2368
5b639dea
JB
2369 /* Make sure that unpacked is large enough to receive the BIT_SIZE
2370 bits from SRC. .*/
2371 if ((bit_size + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT > unpacked_len)
2372 error (_("Cannot unpack %d bits into buffer of %d bytes"),
2373 bit_size, unpacked_len);
2374
14f9c5c9 2375 srcBitsLeft = bit_size;
086ca51f 2376 src_bytes_left = src_len;
f93fca70 2377 unpacked_bytes_left = unpacked_len;
14f9c5c9 2378 sign = 0;
f93fca70
JB
2379
2380 if (is_big_endian)
14f9c5c9 2381 {
086ca51f 2382 src_idx = src_len - 1;
f93fca70
JB
2383 if (is_signed_type
2384 && ((src[0] << bit_offset) & (1 << (HOST_CHAR_BIT - 1))))
4c4b4cd2 2385 sign = ~0;
d2e4a39e
AS
2386
2387 unusedLS =
4c4b4cd2
PH
2388 (HOST_CHAR_BIT - (bit_size + bit_offset) % HOST_CHAR_BIT)
2389 % HOST_CHAR_BIT;
14f9c5c9 2390
f93fca70
JB
2391 if (is_scalar)
2392 {
2393 accumSize = 0;
2394 unpacked_idx = unpacked_len - 1;
2395 }
2396 else
2397 {
4c4b4cd2
PH
2398 /* Non-scalar values must be aligned at a byte boundary... */
2399 accumSize =
2400 (HOST_CHAR_BIT - bit_size % HOST_CHAR_BIT) % HOST_CHAR_BIT;
2401 /* ... And are placed at the beginning (most-significant) bytes
2402 of the target. */
086ca51f
JB
2403 unpacked_idx = (bit_size + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT - 1;
2404 unpacked_bytes_left = unpacked_idx + 1;
f93fca70 2405 }
14f9c5c9 2406 }
d2e4a39e 2407 else
14f9c5c9
AS
2408 {
2409 int sign_bit_offset = (bit_size + bit_offset - 1) % 8;
2410
086ca51f 2411 src_idx = unpacked_idx = 0;
14f9c5c9
AS
2412 unusedLS = bit_offset;
2413 accumSize = 0;
2414
f93fca70 2415 if (is_signed_type && (src[src_len - 1] & (1 << sign_bit_offset)))
4c4b4cd2 2416 sign = ~0;
14f9c5c9 2417 }
d2e4a39e 2418
14f9c5c9 2419 accum = 0;
086ca51f 2420 while (src_bytes_left > 0)
14f9c5c9
AS
2421 {
2422 /* Mask for removing bits of the next source byte that are not
4c4b4cd2 2423 part of the value. */
d2e4a39e 2424 unsigned int unusedMSMask =
4c4b4cd2
PH
2425 (1 << (srcBitsLeft >= HOST_CHAR_BIT ? HOST_CHAR_BIT : srcBitsLeft)) -
2426 1;
2427 /* Sign-extend bits for this byte. */
14f9c5c9 2428 unsigned int signMask = sign & ~unusedMSMask;
5b4ee69b 2429
d2e4a39e 2430 accum |=
086ca51f 2431 (((src[src_idx] >> unusedLS) & unusedMSMask) | signMask) << accumSize;
14f9c5c9 2432 accumSize += HOST_CHAR_BIT - unusedLS;
d2e4a39e 2433 if (accumSize >= HOST_CHAR_BIT)
4c4b4cd2 2434 {
db297a65 2435 unpacked[unpacked_idx] = accum & ~(~0UL << HOST_CHAR_BIT);
4c4b4cd2
PH
2436 accumSize -= HOST_CHAR_BIT;
2437 accum >>= HOST_CHAR_BIT;
086ca51f
JB
2438 unpacked_bytes_left -= 1;
2439 unpacked_idx += delta;
4c4b4cd2 2440 }
14f9c5c9
AS
2441 srcBitsLeft -= HOST_CHAR_BIT - unusedLS;
2442 unusedLS = 0;
086ca51f
JB
2443 src_bytes_left -= 1;
2444 src_idx += delta;
14f9c5c9 2445 }
086ca51f 2446 while (unpacked_bytes_left > 0)
14f9c5c9
AS
2447 {
2448 accum |= sign << accumSize;
db297a65 2449 unpacked[unpacked_idx] = accum & ~(~0UL << HOST_CHAR_BIT);
14f9c5c9 2450 accumSize -= HOST_CHAR_BIT;
9cd4d857
JB
2451 if (accumSize < 0)
2452 accumSize = 0;
14f9c5c9 2453 accum >>= HOST_CHAR_BIT;
086ca51f
JB
2454 unpacked_bytes_left -= 1;
2455 unpacked_idx += delta;
14f9c5c9 2456 }
f93fca70
JB
2457}
2458
2459/* Create a new value of type TYPE from the contents of OBJ starting
2460 at byte OFFSET, and bit offset BIT_OFFSET within that byte,
2461 proceeding for BIT_SIZE bits. If OBJ is an lval in memory, then
2462 assigning through the result will set the field fetched from.
2463 VALADDR is ignored unless OBJ is NULL, in which case,
2464 VALADDR+OFFSET must address the start of storage containing the
2465 packed value. The value returned in this case is never an lval.
2466 Assumes 0 <= BIT_OFFSET < HOST_CHAR_BIT. */
2467
2468struct value *
2469ada_value_primitive_packed_val (struct value *obj, const gdb_byte *valaddr,
2470 long offset, int bit_offset, int bit_size,
2471 struct type *type)
2472{
2473 struct value *v;
bfb1c796 2474 const gdb_byte *src; /* First byte containing data to unpack */
f93fca70 2475 gdb_byte *unpacked;
220475ed 2476 const int is_scalar = is_scalar_type (type);
d5a22e77 2477 const int is_big_endian = type_byte_order (type) == BFD_ENDIAN_BIG;
d5722aa2 2478 gdb::byte_vector staging;
f93fca70
JB
2479
2480 type = ada_check_typedef (type);
2481
d0a9e810 2482 if (obj == NULL)
bfb1c796 2483 src = valaddr + offset;
d0a9e810 2484 else
bfb1c796 2485 src = value_contents (obj) + offset;
d0a9e810
JB
2486
2487 if (is_dynamic_type (type))
2488 {
2489 /* The length of TYPE might by dynamic, so we need to resolve
2490 TYPE in order to know its actual size, which we then use
2491 to create the contents buffer of the value we return.
2492 The difficulty is that the data containing our object is
2493 packed, and therefore maybe not at a byte boundary. So, what
2494 we do, is unpack the data into a byte-aligned buffer, and then
2495 use that buffer as our object's value for resolving the type. */
d5722aa2
PA
2496 int staging_len = (bit_size + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT;
2497 staging.resize (staging_len);
d0a9e810
JB
2498
2499 ada_unpack_from_contents (src, bit_offset, bit_size,
d5722aa2 2500 staging.data (), staging.size (),
d0a9e810
JB
2501 is_big_endian, has_negatives (type),
2502 is_scalar);
b249d2c2 2503 type = resolve_dynamic_type (type, staging, 0);
0cafa88c
JB
2504 if (TYPE_LENGTH (type) < (bit_size + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT)
2505 {
2506 /* This happens when the length of the object is dynamic,
2507 and is actually smaller than the space reserved for it.
2508 For instance, in an array of variant records, the bit_size
2509 we're given is the array stride, which is constant and
2510 normally equal to the maximum size of its element.
2511 But, in reality, each element only actually spans a portion
2512 of that stride. */
2513 bit_size = TYPE_LENGTH (type) * HOST_CHAR_BIT;
2514 }
d0a9e810
JB
2515 }
2516
f93fca70
JB
2517 if (obj == NULL)
2518 {
2519 v = allocate_value (type);
bfb1c796 2520 src = valaddr + offset;
f93fca70
JB
2521 }
2522 else if (VALUE_LVAL (obj) == lval_memory && value_lazy (obj))
2523 {
0cafa88c 2524 int src_len = (bit_size + bit_offset + HOST_CHAR_BIT - 1) / 8;
bfb1c796 2525 gdb_byte *buf;
0cafa88c 2526
f93fca70 2527 v = value_at (type, value_address (obj) + offset);
bfb1c796
PA
2528 buf = (gdb_byte *) alloca (src_len);
2529 read_memory (value_address (v), buf, src_len);
2530 src = buf;
f93fca70
JB
2531 }
2532 else
2533 {
2534 v = allocate_value (type);
bfb1c796 2535 src = value_contents (obj) + offset;
f93fca70
JB
2536 }
2537
2538 if (obj != NULL)
2539 {
2540 long new_offset = offset;
2541
2542 set_value_component_location (v, obj);
2543 set_value_bitpos (v, bit_offset + value_bitpos (obj));
2544 set_value_bitsize (v, bit_size);
2545 if (value_bitpos (v) >= HOST_CHAR_BIT)
2546 {
2547 ++new_offset;
2548 set_value_bitpos (v, value_bitpos (v) - HOST_CHAR_BIT);
2549 }
2550 set_value_offset (v, new_offset);
2551
2552 /* Also set the parent value. This is needed when trying to
2553 assign a new value (in inferior memory). */
2554 set_value_parent (v, obj);
2555 }
2556 else
2557 set_value_bitsize (v, bit_size);
bfb1c796 2558 unpacked = value_contents_writeable (v);
f93fca70
JB
2559
2560 if (bit_size == 0)
2561 {
2562 memset (unpacked, 0, TYPE_LENGTH (type));
2563 return v;
2564 }
2565
d5722aa2 2566 if (staging.size () == TYPE_LENGTH (type))
f93fca70 2567 {
d0a9e810
JB
2568 /* Small short-cut: If we've unpacked the data into a buffer
2569 of the same size as TYPE's length, then we can reuse that,
2570 instead of doing the unpacking again. */
d5722aa2 2571 memcpy (unpacked, staging.data (), staging.size ());
f93fca70 2572 }
d0a9e810
JB
2573 else
2574 ada_unpack_from_contents (src, bit_offset, bit_size,
2575 unpacked, TYPE_LENGTH (type),
2576 is_big_endian, has_negatives (type), is_scalar);
f93fca70 2577
14f9c5c9
AS
2578 return v;
2579}
d2e4a39e 2580
14f9c5c9
AS
2581/* Store the contents of FROMVAL into the location of TOVAL.
2582 Return a new value with the location of TOVAL and contents of
2583 FROMVAL. Handles assignment into packed fields that have
4c4b4cd2 2584 floating-point or non-scalar types. */
14f9c5c9 2585
d2e4a39e
AS
2586static struct value *
2587ada_value_assign (struct value *toval, struct value *fromval)
14f9c5c9 2588{
df407dfe
AC
2589 struct type *type = value_type (toval);
2590 int bits = value_bitsize (toval);
14f9c5c9 2591
52ce6436
PH
2592 toval = ada_coerce_ref (toval);
2593 fromval = ada_coerce_ref (fromval);
2594
2595 if (ada_is_direct_array_type (value_type (toval)))
2596 toval = ada_coerce_to_simple_array (toval);
2597 if (ada_is_direct_array_type (value_type (fromval)))
2598 fromval = ada_coerce_to_simple_array (fromval);
2599
88e3b34b 2600 if (!deprecated_value_modifiable (toval))
323e0a4a 2601 error (_("Left operand of assignment is not a modifiable lvalue."));
14f9c5c9 2602
d2e4a39e 2603 if (VALUE_LVAL (toval) == lval_memory
14f9c5c9 2604 && bits > 0
78134374
SM
2605 && (type->code () == TYPE_CODE_FLT
2606 || type->code () == TYPE_CODE_STRUCT))
14f9c5c9 2607 {
df407dfe
AC
2608 int len = (value_bitpos (toval)
2609 + bits + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT;
aced2898 2610 int from_size;
224c3ddb 2611 gdb_byte *buffer = (gdb_byte *) alloca (len);
d2e4a39e 2612 struct value *val;
42ae5230 2613 CORE_ADDR to_addr = value_address (toval);
14f9c5c9 2614
78134374 2615 if (type->code () == TYPE_CODE_FLT)
4c4b4cd2 2616 fromval = value_cast (type, fromval);
14f9c5c9 2617
52ce6436 2618 read_memory (to_addr, buffer, len);
aced2898
PH
2619 from_size = value_bitsize (fromval);
2620 if (from_size == 0)
2621 from_size = TYPE_LENGTH (value_type (fromval)) * TARGET_CHAR_BIT;
d48e62f4 2622
d5a22e77 2623 const int is_big_endian = type_byte_order (type) == BFD_ENDIAN_BIG;
d48e62f4
TT
2624 ULONGEST from_offset = 0;
2625 if (is_big_endian && is_scalar_type (value_type (fromval)))
2626 from_offset = from_size - bits;
2627 copy_bitwise (buffer, value_bitpos (toval),
2628 value_contents (fromval), from_offset,
2629 bits, is_big_endian);
972daa01 2630 write_memory_with_notification (to_addr, buffer, len);
8cebebb9 2631
14f9c5c9 2632 val = value_copy (toval);
0fd88904 2633 memcpy (value_contents_raw (val), value_contents (fromval),
4c4b4cd2 2634 TYPE_LENGTH (type));
04624583 2635 deprecated_set_value_type (val, type);
d2e4a39e 2636
14f9c5c9
AS
2637 return val;
2638 }
2639
2640 return value_assign (toval, fromval);
2641}
2642
2643
7c512744
JB
2644/* Given that COMPONENT is a memory lvalue that is part of the lvalue
2645 CONTAINER, assign the contents of VAL to COMPONENTS's place in
2646 CONTAINER. Modifies the VALUE_CONTENTS of CONTAINER only, not
2647 COMPONENT, and not the inferior's memory. The current contents
2648 of COMPONENT are ignored.
2649
2650 Although not part of the initial design, this function also works
2651 when CONTAINER and COMPONENT are not_lval's: it works as if CONTAINER
2652 had a null address, and COMPONENT had an address which is equal to
2653 its offset inside CONTAINER. */
2654
52ce6436
PH
2655static void
2656value_assign_to_component (struct value *container, struct value *component,
2657 struct value *val)
2658{
2659 LONGEST offset_in_container =
42ae5230 2660 (LONGEST) (value_address (component) - value_address (container));
7c512744 2661 int bit_offset_in_container =
52ce6436
PH
2662 value_bitpos (component) - value_bitpos (container);
2663 int bits;
7c512744 2664
52ce6436
PH
2665 val = value_cast (value_type (component), val);
2666
2667 if (value_bitsize (component) == 0)
2668 bits = TARGET_CHAR_BIT * TYPE_LENGTH (value_type (component));
2669 else
2670 bits = value_bitsize (component);
2671
d5a22e77 2672 if (type_byte_order (value_type (container)) == BFD_ENDIAN_BIG)
2a62dfa9
JB
2673 {
2674 int src_offset;
2675
2676 if (is_scalar_type (check_typedef (value_type (component))))
2677 src_offset
2678 = TYPE_LENGTH (value_type (component)) * TARGET_CHAR_BIT - bits;
2679 else
2680 src_offset = 0;
a99bc3d2
JB
2681 copy_bitwise (value_contents_writeable (container) + offset_in_container,
2682 value_bitpos (container) + bit_offset_in_container,
2683 value_contents (val), src_offset, bits, 1);
2a62dfa9 2684 }
52ce6436 2685 else
a99bc3d2
JB
2686 copy_bitwise (value_contents_writeable (container) + offset_in_container,
2687 value_bitpos (container) + bit_offset_in_container,
2688 value_contents (val), 0, bits, 0);
7c512744
JB
2689}
2690
736ade86
XR
2691/* Determine if TYPE is an access to an unconstrained array. */
2692
d91e9ea8 2693bool
736ade86
XR
2694ada_is_access_to_unconstrained_array (struct type *type)
2695{
78134374 2696 return (type->code () == TYPE_CODE_TYPEDEF
736ade86
XR
2697 && is_thick_pntr (ada_typedef_target_type (type)));
2698}
2699
4c4b4cd2
PH
2700/* The value of the element of array ARR at the ARITY indices given in IND.
2701 ARR may be either a simple array, GNAT array descriptor, or pointer
14f9c5c9
AS
2702 thereto. */
2703
d2e4a39e
AS
2704struct value *
2705ada_value_subscript (struct value *arr, int arity, struct value **ind)
14f9c5c9
AS
2706{
2707 int k;
d2e4a39e
AS
2708 struct value *elt;
2709 struct type *elt_type;
14f9c5c9
AS
2710
2711 elt = ada_coerce_to_simple_array (arr);
2712
df407dfe 2713 elt_type = ada_check_typedef (value_type (elt));
78134374 2714 if (elt_type->code () == TYPE_CODE_ARRAY
14f9c5c9
AS
2715 && TYPE_FIELD_BITSIZE (elt_type, 0) > 0)
2716 return value_subscript_packed (elt, arity, ind);
2717
2718 for (k = 0; k < arity; k += 1)
2719 {
b9c50e9a
XR
2720 struct type *saved_elt_type = TYPE_TARGET_TYPE (elt_type);
2721
78134374 2722 if (elt_type->code () != TYPE_CODE_ARRAY)
323e0a4a 2723 error (_("too many subscripts (%d expected)"), k);
b9c50e9a 2724
2497b498 2725 elt = value_subscript (elt, pos_atr (ind[k]));
b9c50e9a
XR
2726
2727 if (ada_is_access_to_unconstrained_array (saved_elt_type)
78134374 2728 && value_type (elt)->code () != TYPE_CODE_TYPEDEF)
b9c50e9a
XR
2729 {
2730 /* The element is a typedef to an unconstrained array,
2731 except that the value_subscript call stripped the
2732 typedef layer. The typedef layer is GNAT's way to
2733 specify that the element is, at the source level, an
2734 access to the unconstrained array, rather than the
2735 unconstrained array. So, we need to restore that
2736 typedef layer, which we can do by forcing the element's
2737 type back to its original type. Otherwise, the returned
2738 value is going to be printed as the array, rather
2739 than as an access. Another symptom of the same issue
2740 would be that an expression trying to dereference the
2741 element would also be improperly rejected. */
2742 deprecated_set_value_type (elt, saved_elt_type);
2743 }
2744
2745 elt_type = ada_check_typedef (value_type (elt));
14f9c5c9 2746 }
b9c50e9a 2747
14f9c5c9
AS
2748 return elt;
2749}
2750
deede10c
JB
2751/* Assuming ARR is a pointer to a GDB array, the value of the element
2752 of *ARR at the ARITY indices given in IND.
919e6dbe
PMR
2753 Does not read the entire array into memory.
2754
2755 Note: Unlike what one would expect, this function is used instead of
2756 ada_value_subscript for basically all non-packed array types. The reason
2757 for this is that a side effect of doing our own pointer arithmetics instead
2758 of relying on value_subscript is that there is no implicit typedef peeling.
2759 This is important for arrays of array accesses, where it allows us to
2760 preserve the fact that the array's element is an array access, where the
2761 access part os encoded in a typedef layer. */
14f9c5c9 2762
2c0b251b 2763static struct value *
deede10c 2764ada_value_ptr_subscript (struct value *arr, int arity, struct value **ind)
14f9c5c9
AS
2765{
2766 int k;
919e6dbe 2767 struct value *array_ind = ada_value_ind (arr);
deede10c 2768 struct type *type
919e6dbe
PMR
2769 = check_typedef (value_enclosing_type (array_ind));
2770
78134374 2771 if (type->code () == TYPE_CODE_ARRAY
919e6dbe
PMR
2772 && TYPE_FIELD_BITSIZE (type, 0) > 0)
2773 return value_subscript_packed (array_ind, arity, ind);
14f9c5c9
AS
2774
2775 for (k = 0; k < arity; k += 1)
2776 {
2777 LONGEST lwb, upb;
aa715135 2778 struct value *lwb_value;
14f9c5c9 2779
78134374 2780 if (type->code () != TYPE_CODE_ARRAY)
323e0a4a 2781 error (_("too many subscripts (%d expected)"), k);
d2e4a39e 2782 arr = value_cast (lookup_pointer_type (TYPE_TARGET_TYPE (type)),
4c4b4cd2 2783 value_copy (arr));
14f9c5c9 2784 get_discrete_bounds (TYPE_INDEX_TYPE (type), &lwb, &upb);
78134374 2785 lwb_value = value_from_longest (value_type (ind[k]), lwb);
aa715135 2786 arr = value_ptradd (arr, pos_atr (ind[k]) - pos_atr (lwb_value));
14f9c5c9
AS
2787 type = TYPE_TARGET_TYPE (type);
2788 }
2789
2790 return value_ind (arr);
2791}
2792
0b5d8877 2793/* Given that ARRAY_PTR is a pointer or reference to an array of type TYPE (the
aa715135
JG
2794 actual type of ARRAY_PTR is ignored), returns the Ada slice of
2795 HIGH'Pos-LOW'Pos+1 elements starting at index LOW. The lower bound of
2796 this array is LOW, as per Ada rules. */
0b5d8877 2797static struct value *
f5938064
JG
2798ada_value_slice_from_ptr (struct value *array_ptr, struct type *type,
2799 int low, int high)
0b5d8877 2800{
b0dd7688 2801 struct type *type0 = ada_check_typedef (type);
aa715135 2802 struct type *base_index_type = TYPE_TARGET_TYPE (TYPE_INDEX_TYPE (type0));
0c9c3474 2803 struct type *index_type
aa715135 2804 = create_static_range_type (NULL, base_index_type, low, high);
9fe561ab
JB
2805 struct type *slice_type = create_array_type_with_stride
2806 (NULL, TYPE_TARGET_TYPE (type0), index_type,
24e99c6c 2807 type0->dyn_prop (DYN_PROP_BYTE_STRIDE),
9fe561ab 2808 TYPE_FIELD_BITSIZE (type0, 0));
aa715135
JG
2809 int base_low = ada_discrete_type_low_bound (TYPE_INDEX_TYPE (type0));
2810 LONGEST base_low_pos, low_pos;
2811 CORE_ADDR base;
2812
2813 if (!discrete_position (base_index_type, low, &low_pos)
2814 || !discrete_position (base_index_type, base_low, &base_low_pos))
2815 {
2816 warning (_("unable to get positions in slice, use bounds instead"));
2817 low_pos = low;
2818 base_low_pos = base_low;
2819 }
5b4ee69b 2820
aa715135
JG
2821 base = value_as_address (array_ptr)
2822 + ((low_pos - base_low_pos)
2823 * TYPE_LENGTH (TYPE_TARGET_TYPE (type0)));
f5938064 2824 return value_at_lazy (slice_type, base);
0b5d8877
PH
2825}
2826
2827
2828static struct value *
2829ada_value_slice (struct value *array, int low, int high)
2830{
b0dd7688 2831 struct type *type = ada_check_typedef (value_type (array));
aa715135 2832 struct type *base_index_type = TYPE_TARGET_TYPE (TYPE_INDEX_TYPE (type));
0c9c3474
SA
2833 struct type *index_type
2834 = create_static_range_type (NULL, TYPE_INDEX_TYPE (type), low, high);
9fe561ab
JB
2835 struct type *slice_type = create_array_type_with_stride
2836 (NULL, TYPE_TARGET_TYPE (type), index_type,
24e99c6c 2837 type->dyn_prop (DYN_PROP_BYTE_STRIDE),
9fe561ab 2838 TYPE_FIELD_BITSIZE (type, 0));
aa715135 2839 LONGEST low_pos, high_pos;
5b4ee69b 2840
aa715135
JG
2841 if (!discrete_position (base_index_type, low, &low_pos)
2842 || !discrete_position (base_index_type, high, &high_pos))
2843 {
2844 warning (_("unable to get positions in slice, use bounds instead"));
2845 low_pos = low;
2846 high_pos = high;
2847 }
2848
2849 return value_cast (slice_type,
2850 value_slice (array, low, high_pos - low_pos + 1));
0b5d8877
PH
2851}
2852
14f9c5c9
AS
2853/* If type is a record type in the form of a standard GNAT array
2854 descriptor, returns the number of dimensions for type. If arr is a
2855 simple array, returns the number of "array of"s that prefix its
4c4b4cd2 2856 type designation. Otherwise, returns 0. */
14f9c5c9
AS
2857
2858int
d2e4a39e 2859ada_array_arity (struct type *type)
14f9c5c9
AS
2860{
2861 int arity;
2862
2863 if (type == NULL)
2864 return 0;
2865
2866 type = desc_base_type (type);
2867
2868 arity = 0;
78134374 2869 if (type->code () == TYPE_CODE_STRUCT)
14f9c5c9 2870 return desc_arity (desc_bounds_type (type));
d2e4a39e 2871 else
78134374 2872 while (type->code () == TYPE_CODE_ARRAY)
14f9c5c9 2873 {
4c4b4cd2 2874 arity += 1;
61ee279c 2875 type = ada_check_typedef (TYPE_TARGET_TYPE (type));
14f9c5c9 2876 }
d2e4a39e 2877
14f9c5c9
AS
2878 return arity;
2879}
2880
2881/* If TYPE is a record type in the form of a standard GNAT array
2882 descriptor or a simple array type, returns the element type for
2883 TYPE after indexing by NINDICES indices, or by all indices if
4c4b4cd2 2884 NINDICES is -1. Otherwise, returns NULL. */
14f9c5c9 2885
d2e4a39e
AS
2886struct type *
2887ada_array_element_type (struct type *type, int nindices)
14f9c5c9
AS
2888{
2889 type = desc_base_type (type);
2890
78134374 2891 if (type->code () == TYPE_CODE_STRUCT)
14f9c5c9
AS
2892 {
2893 int k;
d2e4a39e 2894 struct type *p_array_type;
14f9c5c9 2895
556bdfd4 2896 p_array_type = desc_data_target_type (type);
14f9c5c9
AS
2897
2898 k = ada_array_arity (type);
2899 if (k == 0)
4c4b4cd2 2900 return NULL;
d2e4a39e 2901
4c4b4cd2 2902 /* Initially p_array_type = elt_type(*)[]...(k times)...[]. */
14f9c5c9 2903 if (nindices >= 0 && k > nindices)
4c4b4cd2 2904 k = nindices;
d2e4a39e 2905 while (k > 0 && p_array_type != NULL)
4c4b4cd2 2906 {
61ee279c 2907 p_array_type = ada_check_typedef (TYPE_TARGET_TYPE (p_array_type));
4c4b4cd2
PH
2908 k -= 1;
2909 }
14f9c5c9
AS
2910 return p_array_type;
2911 }
78134374 2912 else if (type->code () == TYPE_CODE_ARRAY)
14f9c5c9 2913 {
78134374 2914 while (nindices != 0 && type->code () == TYPE_CODE_ARRAY)
4c4b4cd2
PH
2915 {
2916 type = TYPE_TARGET_TYPE (type);
2917 nindices -= 1;
2918 }
14f9c5c9
AS
2919 return type;
2920 }
2921
2922 return NULL;
2923}
2924
4c4b4cd2 2925/* The type of nth index in arrays of given type (n numbering from 1).
dd19d49e
UW
2926 Does not examine memory. Throws an error if N is invalid or TYPE
2927 is not an array type. NAME is the name of the Ada attribute being
2928 evaluated ('range, 'first, 'last, or 'length); it is used in building
2929 the error message. */
14f9c5c9 2930
1eea4ebd
UW
2931static struct type *
2932ada_index_type (struct type *type, int n, const char *name)
14f9c5c9 2933{
4c4b4cd2
PH
2934 struct type *result_type;
2935
14f9c5c9
AS
2936 type = desc_base_type (type);
2937
1eea4ebd
UW
2938 if (n < 0 || n > ada_array_arity (type))
2939 error (_("invalid dimension number to '%s"), name);
14f9c5c9 2940
4c4b4cd2 2941 if (ada_is_simple_array_type (type))
14f9c5c9
AS
2942 {
2943 int i;
2944
2945 for (i = 1; i < n; i += 1)
4c4b4cd2 2946 type = TYPE_TARGET_TYPE (type);
262452ec 2947 result_type = TYPE_TARGET_TYPE (TYPE_INDEX_TYPE (type));
4c4b4cd2
PH
2948 /* FIXME: The stabs type r(0,0);bound;bound in an array type
2949 has a target type of TYPE_CODE_UNDEF. We compensate here, but
76a01679 2950 perhaps stabsread.c would make more sense. */
78134374 2951 if (result_type && result_type->code () == TYPE_CODE_UNDEF)
1eea4ebd 2952 result_type = NULL;
14f9c5c9 2953 }
d2e4a39e 2954 else
1eea4ebd
UW
2955 {
2956 result_type = desc_index_type (desc_bounds_type (type), n);
2957 if (result_type == NULL)
2958 error (_("attempt to take bound of something that is not an array"));
2959 }
2960
2961 return result_type;
14f9c5c9
AS
2962}
2963
2964/* Given that arr is an array type, returns the lower bound of the
2965 Nth index (numbering from 1) if WHICH is 0, and the upper bound if
4c4b4cd2 2966 WHICH is 1. This returns bounds 0 .. -1 if ARR_TYPE is an
1eea4ebd
UW
2967 array-descriptor type. It works for other arrays with bounds supplied
2968 by run-time quantities other than discriminants. */
14f9c5c9 2969
abb68b3e 2970static LONGEST
fb5e3d5c 2971ada_array_bound_from_type (struct type *arr_type, int n, int which)
14f9c5c9 2972{
8a48ac95 2973 struct type *type, *index_type_desc, *index_type;
1ce677a4 2974 int i;
262452ec
JK
2975
2976 gdb_assert (which == 0 || which == 1);
14f9c5c9 2977
ad82864c
JB
2978 if (ada_is_constrained_packed_array_type (arr_type))
2979 arr_type = decode_constrained_packed_array_type (arr_type);
14f9c5c9 2980
4c4b4cd2 2981 if (arr_type == NULL || !ada_is_simple_array_type (arr_type))
1eea4ebd 2982 return (LONGEST) - which;
14f9c5c9 2983
78134374 2984 if (arr_type->code () == TYPE_CODE_PTR)
14f9c5c9
AS
2985 type = TYPE_TARGET_TYPE (arr_type);
2986 else
2987 type = arr_type;
2988
bafffb51
JB
2989 if (TYPE_FIXED_INSTANCE (type))
2990 {
2991 /* The array has already been fixed, so we do not need to
2992 check the parallel ___XA type again. That encoding has
2993 already been applied, so ignore it now. */
2994 index_type_desc = NULL;
2995 }
2996 else
2997 {
2998 index_type_desc = ada_find_parallel_type (type, "___XA");
2999 ada_fixup_array_indexes_type (index_type_desc);
3000 }
3001
262452ec 3002 if (index_type_desc != NULL)
28c85d6c
JB
3003 index_type = to_fixed_range_type (TYPE_FIELD_TYPE (index_type_desc, n - 1),
3004 NULL);
262452ec 3005 else
8a48ac95
JB
3006 {
3007 struct type *elt_type = check_typedef (type);
3008
3009 for (i = 1; i < n; i++)
3010 elt_type = check_typedef (TYPE_TARGET_TYPE (elt_type));
3011
3012 index_type = TYPE_INDEX_TYPE (elt_type);
3013 }
262452ec 3014
43bbcdc2
PH
3015 return
3016 (LONGEST) (which == 0
3017 ? ada_discrete_type_low_bound (index_type)
3018 : ada_discrete_type_high_bound (index_type));
14f9c5c9
AS
3019}
3020
3021/* Given that arr is an array value, returns the lower bound of the
abb68b3e
JB
3022 nth index (numbering from 1) if WHICH is 0, and the upper bound if
3023 WHICH is 1. This routine will also work for arrays with bounds
4c4b4cd2 3024 supplied by run-time quantities other than discriminants. */
14f9c5c9 3025
1eea4ebd 3026static LONGEST
4dc81987 3027ada_array_bound (struct value *arr, int n, int which)
14f9c5c9 3028{
eb479039
JB
3029 struct type *arr_type;
3030
78134374 3031 if (check_typedef (value_type (arr))->code () == TYPE_CODE_PTR)
eb479039
JB
3032 arr = value_ind (arr);
3033 arr_type = value_enclosing_type (arr);
14f9c5c9 3034
ad82864c
JB
3035 if (ada_is_constrained_packed_array_type (arr_type))
3036 return ada_array_bound (decode_constrained_packed_array (arr), n, which);
4c4b4cd2 3037 else if (ada_is_simple_array_type (arr_type))
1eea4ebd 3038 return ada_array_bound_from_type (arr_type, n, which);
14f9c5c9 3039 else
1eea4ebd 3040 return value_as_long (desc_one_bound (desc_bounds (arr), n, which));
14f9c5c9
AS
3041}
3042
3043/* Given that arr is an array value, returns the length of the
3044 nth index. This routine will also work for arrays with bounds
4c4b4cd2
PH
3045 supplied by run-time quantities other than discriminants.
3046 Does not work for arrays indexed by enumeration types with representation
3047 clauses at the moment. */
14f9c5c9 3048
1eea4ebd 3049static LONGEST
d2e4a39e 3050ada_array_length (struct value *arr, int n)
14f9c5c9 3051{
aa715135
JG
3052 struct type *arr_type, *index_type;
3053 int low, high;
eb479039 3054
78134374 3055 if (check_typedef (value_type (arr))->code () == TYPE_CODE_PTR)
eb479039
JB
3056 arr = value_ind (arr);
3057 arr_type = value_enclosing_type (arr);
14f9c5c9 3058
ad82864c
JB
3059 if (ada_is_constrained_packed_array_type (arr_type))
3060 return ada_array_length (decode_constrained_packed_array (arr), n);
14f9c5c9 3061
4c4b4cd2 3062 if (ada_is_simple_array_type (arr_type))
aa715135
JG
3063 {
3064 low = ada_array_bound_from_type (arr_type, n, 0);
3065 high = ada_array_bound_from_type (arr_type, n, 1);
3066 }
14f9c5c9 3067 else
aa715135
JG
3068 {
3069 low = value_as_long (desc_one_bound (desc_bounds (arr), n, 0));
3070 high = value_as_long (desc_one_bound (desc_bounds (arr), n, 1));
3071 }
3072
f168693b 3073 arr_type = check_typedef (arr_type);
7150d33c 3074 index_type = ada_index_type (arr_type, n, "length");
aa715135
JG
3075 if (index_type != NULL)
3076 {
3077 struct type *base_type;
78134374 3078 if (index_type->code () == TYPE_CODE_RANGE)
aa715135
JG
3079 base_type = TYPE_TARGET_TYPE (index_type);
3080 else
3081 base_type = index_type;
3082
3083 low = pos_atr (value_from_longest (base_type, low));
3084 high = pos_atr (value_from_longest (base_type, high));
3085 }
3086 return high - low + 1;
4c4b4cd2
PH
3087}
3088
bff8c71f
TT
3089/* An array whose type is that of ARR_TYPE (an array type), with
3090 bounds LOW to HIGH, but whose contents are unimportant. If HIGH is
3091 less than LOW, then LOW-1 is used. */
4c4b4cd2
PH
3092
3093static struct value *
bff8c71f 3094empty_array (struct type *arr_type, int low, int high)
4c4b4cd2 3095{
b0dd7688 3096 struct type *arr_type0 = ada_check_typedef (arr_type);
0c9c3474
SA
3097 struct type *index_type
3098 = create_static_range_type
bff8c71f
TT
3099 (NULL, TYPE_TARGET_TYPE (TYPE_INDEX_TYPE (arr_type0)), low,
3100 high < low ? low - 1 : high);
b0dd7688 3101 struct type *elt_type = ada_array_element_type (arr_type0, 1);
5b4ee69b 3102
0b5d8877 3103 return allocate_value (create_array_type (NULL, elt_type, index_type));
14f9c5c9 3104}
14f9c5c9 3105\f
d2e4a39e 3106
4c4b4cd2 3107 /* Name resolution */
14f9c5c9 3108
4c4b4cd2
PH
3109/* The "decoded" name for the user-definable Ada operator corresponding
3110 to OP. */
14f9c5c9 3111
d2e4a39e 3112static const char *
4c4b4cd2 3113ada_decoded_op_name (enum exp_opcode op)
14f9c5c9
AS
3114{
3115 int i;
3116
4c4b4cd2 3117 for (i = 0; ada_opname_table[i].encoded != NULL; i += 1)
14f9c5c9
AS
3118 {
3119 if (ada_opname_table[i].op == op)
4c4b4cd2 3120 return ada_opname_table[i].decoded;
14f9c5c9 3121 }
323e0a4a 3122 error (_("Could not find operator name for opcode"));
14f9c5c9
AS
3123}
3124
de93309a
SM
3125/* Returns true (non-zero) iff decoded name N0 should appear before N1
3126 in a listing of choices during disambiguation (see sort_choices, below).
3127 The idea is that overloadings of a subprogram name from the
3128 same package should sort in their source order. We settle for ordering
3129 such symbols by their trailing number (__N or $N). */
14f9c5c9 3130
de93309a
SM
3131static int
3132encoded_ordered_before (const char *N0, const char *N1)
14f9c5c9 3133{
de93309a
SM
3134 if (N1 == NULL)
3135 return 0;
3136 else if (N0 == NULL)
3137 return 1;
3138 else
3139 {
3140 int k0, k1;
30b15541 3141
de93309a
SM
3142 for (k0 = strlen (N0) - 1; k0 > 0 && isdigit (N0[k0]); k0 -= 1)
3143 ;
3144 for (k1 = strlen (N1) - 1; k1 > 0 && isdigit (N1[k1]); k1 -= 1)
3145 ;
3146 if ((N0[k0] == '_' || N0[k0] == '$') && N0[k0 + 1] != '\000'
3147 && (N1[k1] == '_' || N1[k1] == '$') && N1[k1 + 1] != '\000')
3148 {
3149 int n0, n1;
30b15541 3150
de93309a
SM
3151 n0 = k0;
3152 while (N0[n0] == '_' && n0 > 0 && N0[n0 - 1] == '_')
3153 n0 -= 1;
3154 n1 = k1;
3155 while (N1[n1] == '_' && n1 > 0 && N1[n1 - 1] == '_')
3156 n1 -= 1;
3157 if (n0 == n1 && strncmp (N0, N1, n0) == 0)
3158 return (atoi (N0 + k0 + 1) < atoi (N1 + k1 + 1));
3159 }
3160 return (strcmp (N0, N1) < 0);
3161 }
14f9c5c9
AS
3162}
3163
de93309a
SM
3164/* Sort SYMS[0..NSYMS-1] to put the choices in a canonical order by the
3165 encoded names. */
14f9c5c9 3166
de93309a
SM
3167static void
3168sort_choices (struct block_symbol syms[], int nsyms)
14f9c5c9 3169{
14f9c5c9 3170 int i;
14f9c5c9 3171
de93309a 3172 for (i = 1; i < nsyms; i += 1)
14f9c5c9 3173 {
de93309a
SM
3174 struct block_symbol sym = syms[i];
3175 int j;
3176
3177 for (j = i - 1; j >= 0; j -= 1)
4c4b4cd2 3178 {
987012b8
CB
3179 if (encoded_ordered_before (syms[j].symbol->linkage_name (),
3180 sym.symbol->linkage_name ()))
de93309a
SM
3181 break;
3182 syms[j + 1] = syms[j];
4c4b4cd2 3183 }
de93309a
SM
3184 syms[j + 1] = sym;
3185 }
3186}
14f9c5c9 3187
de93309a
SM
3188/* Whether GDB should display formals and return types for functions in the
3189 overloads selection menu. */
3190static bool print_signatures = true;
4c4b4cd2 3191
de93309a
SM
3192/* Print the signature for SYM on STREAM according to the FLAGS options. For
3193 all but functions, the signature is just the name of the symbol. For
3194 functions, this is the name of the function, the list of types for formals
3195 and the return type (if any). */
4c4b4cd2 3196
de93309a
SM
3197static void
3198ada_print_symbol_signature (struct ui_file *stream, struct symbol *sym,
3199 const struct type_print_options *flags)
3200{
3201 struct type *type = SYMBOL_TYPE (sym);
14f9c5c9 3202
987012b8 3203 fprintf_filtered (stream, "%s", sym->print_name ());
de93309a
SM
3204 if (!print_signatures
3205 || type == NULL
78134374 3206 || type->code () != TYPE_CODE_FUNC)
de93309a 3207 return;
4c4b4cd2 3208
de93309a
SM
3209 if (TYPE_NFIELDS (type) > 0)
3210 {
3211 int i;
14f9c5c9 3212
de93309a
SM
3213 fprintf_filtered (stream, " (");
3214 for (i = 0; i < TYPE_NFIELDS (type); ++i)
3215 {
3216 if (i > 0)
3217 fprintf_filtered (stream, "; ");
3218 ada_print_type (TYPE_FIELD_TYPE (type, i), NULL, stream, -1, 0,
3219 flags);
3220 }
3221 fprintf_filtered (stream, ")");
3222 }
3223 if (TYPE_TARGET_TYPE (type) != NULL
78134374 3224 && TYPE_TARGET_TYPE (type)->code () != TYPE_CODE_VOID)
de93309a
SM
3225 {
3226 fprintf_filtered (stream, " return ");
3227 ada_print_type (TYPE_TARGET_TYPE (type), NULL, stream, -1, 0, flags);
3228 }
3229}
14f9c5c9 3230
de93309a
SM
3231/* Read and validate a set of numeric choices from the user in the
3232 range 0 .. N_CHOICES-1. Place the results in increasing
3233 order in CHOICES[0 .. N-1], and return N.
14f9c5c9 3234
de93309a
SM
3235 The user types choices as a sequence of numbers on one line
3236 separated by blanks, encoding them as follows:
14f9c5c9 3237
de93309a
SM
3238 + A choice of 0 means to cancel the selection, throwing an error.
3239 + If IS_ALL_CHOICE, a choice of 1 selects the entire set 0 .. N_CHOICES-1.
3240 + The user chooses k by typing k+IS_ALL_CHOICE+1.
14f9c5c9 3241
de93309a 3242 The user is not allowed to choose more than MAX_RESULTS values.
14f9c5c9 3243
de93309a
SM
3244 ANNOTATION_SUFFIX, if present, is used to annotate the input
3245 prompts (for use with the -f switch). */
14f9c5c9 3246
de93309a
SM
3247static int
3248get_selections (int *choices, int n_choices, int max_results,
3249 int is_all_choice, const char *annotation_suffix)
3250{
992a7040 3251 const char *args;
de93309a
SM
3252 const char *prompt;
3253 int n_chosen;
3254 int first_choice = is_all_choice ? 2 : 1;
14f9c5c9 3255
de93309a
SM
3256 prompt = getenv ("PS2");
3257 if (prompt == NULL)
3258 prompt = "> ";
4c4b4cd2 3259
de93309a 3260 args = command_line_input (prompt, annotation_suffix);
4c4b4cd2 3261
de93309a
SM
3262 if (args == NULL)
3263 error_no_arg (_("one or more choice numbers"));
14f9c5c9 3264
de93309a 3265 n_chosen = 0;
4c4b4cd2 3266
de93309a
SM
3267 /* Set choices[0 .. n_chosen-1] to the users' choices in ascending
3268 order, as given in args. Choices are validated. */
3269 while (1)
14f9c5c9 3270 {
de93309a
SM
3271 char *args2;
3272 int choice, j;
76a01679 3273
de93309a
SM
3274 args = skip_spaces (args);
3275 if (*args == '\0' && n_chosen == 0)
3276 error_no_arg (_("one or more choice numbers"));
3277 else if (*args == '\0')
3278 break;
76a01679 3279
de93309a
SM
3280 choice = strtol (args, &args2, 10);
3281 if (args == args2 || choice < 0
3282 || choice > n_choices + first_choice - 1)
3283 error (_("Argument must be choice number"));
3284 args = args2;
76a01679 3285
de93309a
SM
3286 if (choice == 0)
3287 error (_("cancelled"));
76a01679 3288
de93309a
SM
3289 if (choice < first_choice)
3290 {
3291 n_chosen = n_choices;
3292 for (j = 0; j < n_choices; j += 1)
3293 choices[j] = j;
3294 break;
76a01679 3295 }
de93309a 3296 choice -= first_choice;
76a01679 3297
de93309a 3298 for (j = n_chosen - 1; j >= 0 && choice < choices[j]; j -= 1)
76a01679 3299 {
76a01679 3300 }
4c4b4cd2 3301
de93309a 3302 if (j < 0 || choice != choices[j])
4c4b4cd2 3303 {
de93309a 3304 int k;
4c4b4cd2 3305
de93309a
SM
3306 for (k = n_chosen - 1; k > j; k -= 1)
3307 choices[k + 1] = choices[k];
3308 choices[j + 1] = choice;
3309 n_chosen += 1;
4c4b4cd2 3310 }
14f9c5c9
AS
3311 }
3312
de93309a
SM
3313 if (n_chosen > max_results)
3314 error (_("Select no more than %d of the above"), max_results);
3315
3316 return n_chosen;
14f9c5c9
AS
3317}
3318
de93309a
SM
3319/* Given a list of NSYMS symbols in SYMS, select up to MAX_RESULTS>0
3320 by asking the user (if necessary), returning the number selected,
3321 and setting the first elements of SYMS items. Error if no symbols
3322 selected. */
3323
3324/* NOTE: Adapted from decode_line_2 in symtab.c, with which it ought
3325 to be re-integrated one of these days. */
14f9c5c9
AS
3326
3327static int
de93309a 3328user_select_syms (struct block_symbol *syms, int nsyms, int max_results)
14f9c5c9 3329{
de93309a
SM
3330 int i;
3331 int *chosen = XALLOCAVEC (int , nsyms);
3332 int n_chosen;
3333 int first_choice = (max_results == 1) ? 1 : 2;
3334 const char *select_mode = multiple_symbols_select_mode ();
14f9c5c9 3335
de93309a
SM
3336 if (max_results < 1)
3337 error (_("Request to select 0 symbols!"));
3338 if (nsyms <= 1)
3339 return nsyms;
14f9c5c9 3340
de93309a
SM
3341 if (select_mode == multiple_symbols_cancel)
3342 error (_("\
3343canceled because the command is ambiguous\n\
3344See set/show multiple-symbol."));
14f9c5c9 3345
de93309a
SM
3346 /* If select_mode is "all", then return all possible symbols.
3347 Only do that if more than one symbol can be selected, of course.
3348 Otherwise, display the menu as usual. */
3349 if (select_mode == multiple_symbols_all && max_results > 1)
3350 return nsyms;
14f9c5c9 3351
de93309a
SM
3352 printf_filtered (_("[0] cancel\n"));
3353 if (max_results > 1)
3354 printf_filtered (_("[1] all\n"));
14f9c5c9 3355
de93309a 3356 sort_choices (syms, nsyms);
14f9c5c9 3357
de93309a
SM
3358 for (i = 0; i < nsyms; i += 1)
3359 {
3360 if (syms[i].symbol == NULL)
3361 continue;
14f9c5c9 3362
de93309a
SM
3363 if (SYMBOL_CLASS (syms[i].symbol) == LOC_BLOCK)
3364 {
3365 struct symtab_and_line sal =
3366 find_function_start_sal (syms[i].symbol, 1);
14f9c5c9 3367
de93309a
SM
3368 printf_filtered ("[%d] ", i + first_choice);
3369 ada_print_symbol_signature (gdb_stdout, syms[i].symbol,
3370 &type_print_raw_options);
3371 if (sal.symtab == NULL)
3372 printf_filtered (_(" at %p[<no source file available>%p]:%d\n"),
3373 metadata_style.style ().ptr (), nullptr, sal.line);
3374 else
3375 printf_filtered
3376 (_(" at %ps:%d\n"),
3377 styled_string (file_name_style.style (),
3378 symtab_to_filename_for_display (sal.symtab)),
3379 sal.line);
3380 continue;
3381 }
76a01679
JB
3382 else
3383 {
de93309a
SM
3384 int is_enumeral =
3385 (SYMBOL_CLASS (syms[i].symbol) == LOC_CONST
3386 && SYMBOL_TYPE (syms[i].symbol) != NULL
78134374 3387 && SYMBOL_TYPE (syms[i].symbol)->code () == TYPE_CODE_ENUM);
de93309a 3388 struct symtab *symtab = NULL;
4c4b4cd2 3389
de93309a
SM
3390 if (SYMBOL_OBJFILE_OWNED (syms[i].symbol))
3391 symtab = symbol_symtab (syms[i].symbol);
3392
3393 if (SYMBOL_LINE (syms[i].symbol) != 0 && symtab != NULL)
3394 {
3395 printf_filtered ("[%d] ", i + first_choice);
3396 ada_print_symbol_signature (gdb_stdout, syms[i].symbol,
3397 &type_print_raw_options);
3398 printf_filtered (_(" at %s:%d\n"),
3399 symtab_to_filename_for_display (symtab),
3400 SYMBOL_LINE (syms[i].symbol));
3401 }
3402 else if (is_enumeral
7d93a1e0 3403 && SYMBOL_TYPE (syms[i].symbol)->name () != NULL)
de93309a
SM
3404 {
3405 printf_filtered (("[%d] "), i + first_choice);
3406 ada_print_type (SYMBOL_TYPE (syms[i].symbol), NULL,
3407 gdb_stdout, -1, 0, &type_print_raw_options);
3408 printf_filtered (_("'(%s) (enumeral)\n"),
987012b8 3409 syms[i].symbol->print_name ());
de93309a
SM
3410 }
3411 else
3412 {
3413 printf_filtered ("[%d] ", i + first_choice);
3414 ada_print_symbol_signature (gdb_stdout, syms[i].symbol,
3415 &type_print_raw_options);
3416
3417 if (symtab != NULL)
3418 printf_filtered (is_enumeral
3419 ? _(" in %s (enumeral)\n")
3420 : _(" at %s:?\n"),
3421 symtab_to_filename_for_display (symtab));
3422 else
3423 printf_filtered (is_enumeral
3424 ? _(" (enumeral)\n")
3425 : _(" at ?\n"));
3426 }
76a01679 3427 }
14f9c5c9 3428 }
14f9c5c9 3429
de93309a
SM
3430 n_chosen = get_selections (chosen, nsyms, max_results, max_results > 1,
3431 "overload-choice");
14f9c5c9 3432
de93309a
SM
3433 for (i = 0; i < n_chosen; i += 1)
3434 syms[i] = syms[chosen[i]];
14f9c5c9 3435
de93309a
SM
3436 return n_chosen;
3437}
14f9c5c9 3438
de93309a
SM
3439/* Same as evaluate_type (*EXP), but resolves ambiguous symbol
3440 references (marked by OP_VAR_VALUE nodes in which the symbol has an
3441 undefined namespace) and converts operators that are
3442 user-defined into appropriate function calls. If CONTEXT_TYPE is
3443 non-null, it provides a preferred result type [at the moment, only
3444 type void has any effect---causing procedures to be preferred over
3445 functions in calls]. A null CONTEXT_TYPE indicates that a non-void
3446 return type is preferred. May change (expand) *EXP. */
14f9c5c9 3447
de93309a
SM
3448static void
3449resolve (expression_up *expp, int void_context_p, int parse_completion,
3450 innermost_block_tracker *tracker)
3451{
3452 struct type *context_type = NULL;
3453 int pc = 0;
14f9c5c9 3454
de93309a
SM
3455 if (void_context_p)
3456 context_type = builtin_type ((*expp)->gdbarch)->builtin_void;
14f9c5c9 3457
de93309a
SM
3458 resolve_subexp (expp, &pc, 1, context_type, parse_completion, tracker);
3459}
4c4b4cd2 3460
de93309a
SM
3461/* Resolve the operator of the subexpression beginning at
3462 position *POS of *EXPP. "Resolving" consists of replacing
3463 the symbols that have undefined namespaces in OP_VAR_VALUE nodes
3464 with their resolutions, replacing built-in operators with
3465 function calls to user-defined operators, where appropriate, and,
3466 when DEPROCEDURE_P is non-zero, converting function-valued variables
3467 into parameterless calls. May expand *EXPP. The CONTEXT_TYPE functions
3468 are as in ada_resolve, above. */
14f9c5c9 3469
de93309a
SM
3470static struct value *
3471resolve_subexp (expression_up *expp, int *pos, int deprocedure_p,
3472 struct type *context_type, int parse_completion,
3473 innermost_block_tracker *tracker)
14f9c5c9 3474{
de93309a
SM
3475 int pc = *pos;
3476 int i;
3477 struct expression *exp; /* Convenience: == *expp. */
3478 enum exp_opcode op = (*expp)->elts[pc].opcode;
3479 struct value **argvec; /* Vector of operand types (alloca'ed). */
3480 int nargs; /* Number of operands. */
3481 int oplen;
14f9c5c9 3482
de93309a
SM
3483 argvec = NULL;
3484 nargs = 0;
3485 exp = expp->get ();
4c4b4cd2 3486
de93309a
SM
3487 /* Pass one: resolve operands, saving their types and updating *pos,
3488 if needed. */
3489 switch (op)
3490 {
3491 case OP_FUNCALL:
3492 if (exp->elts[pc + 3].opcode == OP_VAR_VALUE
3493 && SYMBOL_DOMAIN (exp->elts[pc + 5].symbol) == UNDEF_DOMAIN)
3494 *pos += 7;
3495 else
3496 {
3497 *pos += 3;
3498 resolve_subexp (expp, pos, 0, NULL, parse_completion, tracker);
4c4b4cd2 3499 }
de93309a
SM
3500 nargs = longest_to_int (exp->elts[pc + 1].longconst);
3501 break;
14f9c5c9 3502
de93309a
SM
3503 case UNOP_ADDR:
3504 *pos += 1;
3505 resolve_subexp (expp, pos, 0, NULL, parse_completion, tracker);
3506 break;
3507
3508 case UNOP_QUAL:
3509 *pos += 3;
3510 resolve_subexp (expp, pos, 1, check_typedef (exp->elts[pc + 1].type),
3511 parse_completion, tracker);
3512 break;
3513
3514 case OP_ATR_MODULUS:
3515 case OP_ATR_SIZE:
3516 case OP_ATR_TAG:
3517 case OP_ATR_FIRST:
3518 case OP_ATR_LAST:
3519 case OP_ATR_LENGTH:
3520 case OP_ATR_POS:
3521 case OP_ATR_VAL:
3522 case OP_ATR_MIN:
3523 case OP_ATR_MAX:
3524 case TERNOP_IN_RANGE:
3525 case BINOP_IN_BOUNDS:
3526 case UNOP_IN_RANGE:
3527 case OP_AGGREGATE:
3528 case OP_OTHERS:
3529 case OP_CHOICES:
3530 case OP_POSITIONAL:
3531 case OP_DISCRETE_RANGE:
3532 case OP_NAME:
3533 ada_forward_operator_length (exp, pc, &oplen, &nargs);
3534 *pos += oplen;
3535 break;
3536
3537 case BINOP_ASSIGN:
3538 {
3539 struct value *arg1;
3540
3541 *pos += 1;
3542 arg1 = resolve_subexp (expp, pos, 0, NULL, parse_completion, tracker);
3543 if (arg1 == NULL)
3544 resolve_subexp (expp, pos, 1, NULL, parse_completion, tracker);
3545 else
3546 resolve_subexp (expp, pos, 1, value_type (arg1), parse_completion,
3547 tracker);
3548 break;
3549 }
3550
3551 case UNOP_CAST:
3552 *pos += 3;
3553 nargs = 1;
3554 break;
3555
3556 case BINOP_ADD:
3557 case BINOP_SUB:
3558 case BINOP_MUL:
3559 case BINOP_DIV:
3560 case BINOP_REM:
3561 case BINOP_MOD:
3562 case BINOP_EXP:
3563 case BINOP_CONCAT:
3564 case BINOP_LOGICAL_AND:
3565 case BINOP_LOGICAL_OR:
3566 case BINOP_BITWISE_AND:
3567 case BINOP_BITWISE_IOR:
3568 case BINOP_BITWISE_XOR:
3569
3570 case BINOP_EQUAL:
3571 case BINOP_NOTEQUAL:
3572 case BINOP_LESS:
3573 case BINOP_GTR:
3574 case BINOP_LEQ:
3575 case BINOP_GEQ:
3576
3577 case BINOP_REPEAT:
3578 case BINOP_SUBSCRIPT:
3579 case BINOP_COMMA:
3580 *pos += 1;
3581 nargs = 2;
3582 break;
3583
3584 case UNOP_NEG:
3585 case UNOP_PLUS:
3586 case UNOP_LOGICAL_NOT:
3587 case UNOP_ABS:
3588 case UNOP_IND:
3589 *pos += 1;
3590 nargs = 1;
3591 break;
3592
3593 case OP_LONG:
3594 case OP_FLOAT:
3595 case OP_VAR_VALUE:
3596 case OP_VAR_MSYM_VALUE:
3597 *pos += 4;
3598 break;
3599
3600 case OP_TYPE:
3601 case OP_BOOL:
3602 case OP_LAST:
3603 case OP_INTERNALVAR:
3604 *pos += 3;
3605 break;
3606
3607 case UNOP_MEMVAL:
3608 *pos += 3;
3609 nargs = 1;
3610 break;
3611
3612 case OP_REGISTER:
3613 *pos += 4 + BYTES_TO_EXP_ELEM (exp->elts[pc + 1].longconst + 1);
3614 break;
3615
3616 case STRUCTOP_STRUCT:
3617 *pos += 4 + BYTES_TO_EXP_ELEM (exp->elts[pc + 1].longconst + 1);
3618 nargs = 1;
3619 break;
3620
3621 case TERNOP_SLICE:
3622 *pos += 1;
3623 nargs = 3;
3624 break;
3625
3626 case OP_STRING:
3627 break;
3628
3629 default:
3630 error (_("Unexpected operator during name resolution"));
14f9c5c9 3631 }
14f9c5c9 3632
de93309a
SM
3633 argvec = XALLOCAVEC (struct value *, nargs + 1);
3634 for (i = 0; i < nargs; i += 1)
3635 argvec[i] = resolve_subexp (expp, pos, 1, NULL, parse_completion,
3636 tracker);
3637 argvec[i] = NULL;
3638 exp = expp->get ();
4c4b4cd2 3639
de93309a
SM
3640 /* Pass two: perform any resolution on principal operator. */
3641 switch (op)
14f9c5c9 3642 {
de93309a
SM
3643 default:
3644 break;
5b4ee69b 3645
de93309a
SM
3646 case OP_VAR_VALUE:
3647 if (SYMBOL_DOMAIN (exp->elts[pc + 2].symbol) == UNDEF_DOMAIN)
4c4b4cd2 3648 {
de93309a
SM
3649 std::vector<struct block_symbol> candidates;
3650 int n_candidates;
5b4ee69b 3651
de93309a 3652 n_candidates =
987012b8 3653 ada_lookup_symbol_list (exp->elts[pc + 2].symbol->linkage_name (),
de93309a
SM
3654 exp->elts[pc + 1].block, VAR_DOMAIN,
3655 &candidates);
d2e4a39e 3656
de93309a
SM
3657 if (n_candidates > 1)
3658 {
3659 /* Types tend to get re-introduced locally, so if there
3660 are any local symbols that are not types, first filter
3661 out all types. */
3662 int j;
3663 for (j = 0; j < n_candidates; j += 1)
3664 switch (SYMBOL_CLASS (candidates[j].symbol))
3665 {
3666 case LOC_REGISTER:
3667 case LOC_ARG:
3668 case LOC_REF_ARG:
3669 case LOC_REGPARM_ADDR:
3670 case LOC_LOCAL:
3671 case LOC_COMPUTED:
3672 goto FoundNonType;
3673 default:
3674 break;
3675 }
3676 FoundNonType:
3677 if (j < n_candidates)
3678 {
3679 j = 0;
3680 while (j < n_candidates)
3681 {
3682 if (SYMBOL_CLASS (candidates[j].symbol) == LOC_TYPEDEF)
3683 {
3684 candidates[j] = candidates[n_candidates - 1];
3685 n_candidates -= 1;
3686 }
3687 else
3688 j += 1;
3689 }
3690 }
3691 }
4c4b4cd2 3692
de93309a
SM
3693 if (n_candidates == 0)
3694 error (_("No definition found for %s"),
987012b8 3695 exp->elts[pc + 2].symbol->print_name ());
de93309a
SM
3696 else if (n_candidates == 1)
3697 i = 0;
3698 else if (deprocedure_p
3699 && !is_nonfunction (candidates.data (), n_candidates))
3700 {
3701 i = ada_resolve_function
3702 (candidates.data (), n_candidates, NULL, 0,
987012b8 3703 exp->elts[pc + 2].symbol->linkage_name (),
de93309a
SM
3704 context_type, parse_completion);
3705 if (i < 0)
3706 error (_("Could not find a match for %s"),
987012b8 3707 exp->elts[pc + 2].symbol->print_name ());
de93309a
SM
3708 }
3709 else
3710 {
3711 printf_filtered (_("Multiple matches for %s\n"),
987012b8 3712 exp->elts[pc + 2].symbol->print_name ());
de93309a
SM
3713 user_select_syms (candidates.data (), n_candidates, 1);
3714 i = 0;
3715 }
5b4ee69b 3716
de93309a
SM
3717 exp->elts[pc + 1].block = candidates[i].block;
3718 exp->elts[pc + 2].symbol = candidates[i].symbol;
3719 tracker->update (candidates[i]);
3720 }
14f9c5c9 3721
de93309a 3722 if (deprocedure_p
78134374 3723 && (SYMBOL_TYPE (exp->elts[pc + 2].symbol)->code ()
de93309a 3724 == TYPE_CODE_FUNC))
4c4b4cd2 3725 {
de93309a
SM
3726 replace_operator_with_call (expp, pc, 0, 4,
3727 exp->elts[pc + 2].symbol,
3728 exp->elts[pc + 1].block);
3729 exp = expp->get ();
4c4b4cd2 3730 }
de93309a
SM
3731 break;
3732
3733 case OP_FUNCALL:
3734 {
3735 if (exp->elts[pc + 3].opcode == OP_VAR_VALUE
3736 && SYMBOL_DOMAIN (exp->elts[pc + 5].symbol) == UNDEF_DOMAIN)
3737 {
3738 std::vector<struct block_symbol> candidates;
3739 int n_candidates;
3740
3741 n_candidates =
987012b8 3742 ada_lookup_symbol_list (exp->elts[pc + 5].symbol->linkage_name (),
de93309a
SM
3743 exp->elts[pc + 4].block, VAR_DOMAIN,
3744 &candidates);
14f9c5c9 3745
de93309a
SM
3746 if (n_candidates == 1)
3747 i = 0;
3748 else
3749 {
3750 i = ada_resolve_function
3751 (candidates.data (), n_candidates,
3752 argvec, nargs,
987012b8 3753 exp->elts[pc + 5].symbol->linkage_name (),
de93309a
SM
3754 context_type, parse_completion);
3755 if (i < 0)
3756 error (_("Could not find a match for %s"),
987012b8 3757 exp->elts[pc + 5].symbol->print_name ());
de93309a 3758 }
d72413e6 3759
de93309a
SM
3760 exp->elts[pc + 4].block = candidates[i].block;
3761 exp->elts[pc + 5].symbol = candidates[i].symbol;
3762 tracker->update (candidates[i]);
3763 }
3764 }
3765 break;
3766 case BINOP_ADD:
3767 case BINOP_SUB:
3768 case BINOP_MUL:
3769 case BINOP_DIV:
3770 case BINOP_REM:
3771 case BINOP_MOD:
3772 case BINOP_CONCAT:
3773 case BINOP_BITWISE_AND:
3774 case BINOP_BITWISE_IOR:
3775 case BINOP_BITWISE_XOR:
3776 case BINOP_EQUAL:
3777 case BINOP_NOTEQUAL:
3778 case BINOP_LESS:
3779 case BINOP_GTR:
3780 case BINOP_LEQ:
3781 case BINOP_GEQ:
3782 case BINOP_EXP:
3783 case UNOP_NEG:
3784 case UNOP_PLUS:
3785 case UNOP_LOGICAL_NOT:
3786 case UNOP_ABS:
3787 if (possible_user_operator_p (op, argvec))
3788 {
3789 std::vector<struct block_symbol> candidates;
3790 int n_candidates;
d72413e6 3791
de93309a
SM
3792 n_candidates =
3793 ada_lookup_symbol_list (ada_decoded_op_name (op),
3794 NULL, VAR_DOMAIN,
3795 &candidates);
d72413e6 3796
de93309a
SM
3797 i = ada_resolve_function (candidates.data (), n_candidates, argvec,
3798 nargs, ada_decoded_op_name (op), NULL,
3799 parse_completion);
3800 if (i < 0)
3801 break;
d72413e6 3802
de93309a
SM
3803 replace_operator_with_call (expp, pc, nargs, 1,
3804 candidates[i].symbol,
3805 candidates[i].block);
3806 exp = expp->get ();
3807 }
3808 break;
d72413e6 3809
de93309a
SM
3810 case OP_TYPE:
3811 case OP_REGISTER:
3812 return NULL;
d72413e6 3813 }
d72413e6 3814
de93309a
SM
3815 *pos = pc;
3816 if (exp->elts[pc].opcode == OP_VAR_MSYM_VALUE)
3817 return evaluate_var_msym_value (EVAL_AVOID_SIDE_EFFECTS,
3818 exp->elts[pc + 1].objfile,
3819 exp->elts[pc + 2].msymbol);
3820 else
3821 return evaluate_subexp_type (exp, pos);
3822}
14f9c5c9 3823
de93309a
SM
3824/* Return non-zero if formal type FTYPE matches actual type ATYPE. If
3825 MAY_DEREF is non-zero, the formal may be a pointer and the actual
3826 a non-pointer. */
3827/* The term "match" here is rather loose. The match is heuristic and
3828 liberal. */
14f9c5c9 3829
de93309a
SM
3830static int
3831ada_type_match (struct type *ftype, struct type *atype, int may_deref)
14f9c5c9 3832{
de93309a
SM
3833 ftype = ada_check_typedef (ftype);
3834 atype = ada_check_typedef (atype);
14f9c5c9 3835
78134374 3836 if (ftype->code () == TYPE_CODE_REF)
de93309a 3837 ftype = TYPE_TARGET_TYPE (ftype);
78134374 3838 if (atype->code () == TYPE_CODE_REF)
de93309a 3839 atype = TYPE_TARGET_TYPE (atype);
14f9c5c9 3840
78134374 3841 switch (ftype->code ())
14f9c5c9 3842 {
de93309a 3843 default:
78134374 3844 return ftype->code () == atype->code ();
de93309a 3845 case TYPE_CODE_PTR:
78134374 3846 if (atype->code () == TYPE_CODE_PTR)
de93309a
SM
3847 return ada_type_match (TYPE_TARGET_TYPE (ftype),
3848 TYPE_TARGET_TYPE (atype), 0);
d2e4a39e 3849 else
de93309a
SM
3850 return (may_deref
3851 && ada_type_match (TYPE_TARGET_TYPE (ftype), atype, 0));
3852 case TYPE_CODE_INT:
3853 case TYPE_CODE_ENUM:
3854 case TYPE_CODE_RANGE:
78134374 3855 switch (atype->code ())
4c4b4cd2 3856 {
de93309a
SM
3857 case TYPE_CODE_INT:
3858 case TYPE_CODE_ENUM:
3859 case TYPE_CODE_RANGE:
3860 return 1;
3861 default:
3862 return 0;
4c4b4cd2 3863 }
d2e4a39e 3864
de93309a 3865 case TYPE_CODE_ARRAY:
78134374 3866 return (atype->code () == TYPE_CODE_ARRAY
de93309a 3867 || ada_is_array_descriptor_type (atype));
14f9c5c9 3868
de93309a
SM
3869 case TYPE_CODE_STRUCT:
3870 if (ada_is_array_descriptor_type (ftype))
78134374 3871 return (atype->code () == TYPE_CODE_ARRAY
de93309a
SM
3872 || ada_is_array_descriptor_type (atype));
3873 else
78134374 3874 return (atype->code () == TYPE_CODE_STRUCT
de93309a 3875 && !ada_is_array_descriptor_type (atype));
14f9c5c9 3876
de93309a
SM
3877 case TYPE_CODE_UNION:
3878 case TYPE_CODE_FLT:
78134374 3879 return (atype->code () == ftype->code ());
de93309a 3880 }
14f9c5c9
AS
3881}
3882
de93309a
SM
3883/* Return non-zero if the formals of FUNC "sufficiently match" the
3884 vector of actual argument types ACTUALS of size N_ACTUALS. FUNC
3885 may also be an enumeral, in which case it is treated as a 0-
3886 argument function. */
14f9c5c9 3887
de93309a
SM
3888static int
3889ada_args_match (struct symbol *func, struct value **actuals, int n_actuals)
3890{
3891 int i;
3892 struct type *func_type = SYMBOL_TYPE (func);
14f9c5c9 3893
de93309a 3894 if (SYMBOL_CLASS (func) == LOC_CONST
78134374 3895 && func_type->code () == TYPE_CODE_ENUM)
de93309a 3896 return (n_actuals == 0);
78134374 3897 else if (func_type == NULL || func_type->code () != TYPE_CODE_FUNC)
de93309a 3898 return 0;
14f9c5c9 3899
de93309a
SM
3900 if (TYPE_NFIELDS (func_type) != n_actuals)
3901 return 0;
14f9c5c9 3902
de93309a
SM
3903 for (i = 0; i < n_actuals; i += 1)
3904 {
3905 if (actuals[i] == NULL)
3906 return 0;
3907 else
3908 {
3909 struct type *ftype = ada_check_typedef (TYPE_FIELD_TYPE (func_type,
3910 i));
3911 struct type *atype = ada_check_typedef (value_type (actuals[i]));
14f9c5c9 3912
de93309a
SM
3913 if (!ada_type_match (ftype, atype, 1))
3914 return 0;
3915 }
3916 }
3917 return 1;
3918}
d2e4a39e 3919
de93309a
SM
3920/* False iff function type FUNC_TYPE definitely does not produce a value
3921 compatible with type CONTEXT_TYPE. Conservatively returns 1 if
3922 FUNC_TYPE is not a valid function type with a non-null return type
3923 or an enumerated type. A null CONTEXT_TYPE indicates any non-void type. */
14f9c5c9 3924
de93309a
SM
3925static int
3926return_match (struct type *func_type, struct type *context_type)
3927{
3928 struct type *return_type;
d2e4a39e 3929
de93309a
SM
3930 if (func_type == NULL)
3931 return 1;
14f9c5c9 3932
78134374 3933 if (func_type->code () == TYPE_CODE_FUNC)
de93309a
SM
3934 return_type = get_base_type (TYPE_TARGET_TYPE (func_type));
3935 else
3936 return_type = get_base_type (func_type);
3937 if (return_type == NULL)
3938 return 1;
76a01679 3939
de93309a 3940 context_type = get_base_type (context_type);
14f9c5c9 3941
78134374 3942 if (return_type->code () == TYPE_CODE_ENUM)
de93309a
SM
3943 return context_type == NULL || return_type == context_type;
3944 else if (context_type == NULL)
78134374 3945 return return_type->code () != TYPE_CODE_VOID;
de93309a 3946 else
78134374 3947 return return_type->code () == context_type->code ();
de93309a 3948}
14f9c5c9 3949
14f9c5c9 3950
de93309a
SM
3951/* Returns the index in SYMS[0..NSYMS-1] that contains the symbol for the
3952 function (if any) that matches the types of the NARGS arguments in
3953 ARGS. If CONTEXT_TYPE is non-null and there is at least one match
3954 that returns that type, then eliminate matches that don't. If
3955 CONTEXT_TYPE is void and there is at least one match that does not
3956 return void, eliminate all matches that do.
14f9c5c9 3957
de93309a
SM
3958 Asks the user if there is more than one match remaining. Returns -1
3959 if there is no such symbol or none is selected. NAME is used
3960 solely for messages. May re-arrange and modify SYMS in
3961 the process; the index returned is for the modified vector. */
14f9c5c9 3962
de93309a
SM
3963static int
3964ada_resolve_function (struct block_symbol syms[],
3965 int nsyms, struct value **args, int nargs,
3966 const char *name, struct type *context_type,
3967 int parse_completion)
3968{
3969 int fallback;
3970 int k;
3971 int m; /* Number of hits */
14f9c5c9 3972
de93309a
SM
3973 m = 0;
3974 /* In the first pass of the loop, we only accept functions matching
3975 context_type. If none are found, we add a second pass of the loop
3976 where every function is accepted. */
3977 for (fallback = 0; m == 0 && fallback < 2; fallback++)
3978 {
3979 for (k = 0; k < nsyms; k += 1)
4c4b4cd2 3980 {
de93309a 3981 struct type *type = ada_check_typedef (SYMBOL_TYPE (syms[k].symbol));
5b4ee69b 3982
de93309a
SM
3983 if (ada_args_match (syms[k].symbol, args, nargs)
3984 && (fallback || return_match (type, context_type)))
3985 {
3986 syms[m] = syms[k];
3987 m += 1;
3988 }
4c4b4cd2 3989 }
14f9c5c9
AS
3990 }
3991
de93309a
SM
3992 /* If we got multiple matches, ask the user which one to use. Don't do this
3993 interactive thing during completion, though, as the purpose of the
3994 completion is providing a list of all possible matches. Prompting the
3995 user to filter it down would be completely unexpected in this case. */
3996 if (m == 0)
3997 return -1;
3998 else if (m > 1 && !parse_completion)
3999 {
4000 printf_filtered (_("Multiple matches for %s\n"), name);
4001 user_select_syms (syms, m, 1);
4002 return 0;
4003 }
4004 return 0;
14f9c5c9
AS
4005}
4006
4c4b4cd2
PH
4007/* Replace the operator of length OPLEN at position PC in *EXPP with a call
4008 on the function identified by SYM and BLOCK, and taking NARGS
4009 arguments. Update *EXPP as needed to hold more space. */
14f9c5c9
AS
4010
4011static void
e9d9f57e 4012replace_operator_with_call (expression_up *expp, int pc, int nargs,
4c4b4cd2 4013 int oplen, struct symbol *sym,
270140bd 4014 const struct block *block)
14f9c5c9
AS
4015{
4016 /* A new expression, with 6 more elements (3 for funcall, 4 for function
4c4b4cd2 4017 symbol, -oplen for operator being replaced). */
d2e4a39e 4018 struct expression *newexp = (struct expression *)
8c1a34e7 4019 xzalloc (sizeof (struct expression)
4c4b4cd2 4020 + EXP_ELEM_TO_BYTES ((*expp)->nelts + 7 - oplen));
e9d9f57e 4021 struct expression *exp = expp->get ();
14f9c5c9
AS
4022
4023 newexp->nelts = exp->nelts + 7 - oplen;
4024 newexp->language_defn = exp->language_defn;
3489610d 4025 newexp->gdbarch = exp->gdbarch;
14f9c5c9 4026 memcpy (newexp->elts, exp->elts, EXP_ELEM_TO_BYTES (pc));
d2e4a39e 4027 memcpy (newexp->elts + pc + 7, exp->elts + pc + oplen,
4c4b4cd2 4028 EXP_ELEM_TO_BYTES (exp->nelts - pc - oplen));
14f9c5c9
AS
4029
4030 newexp->elts[pc].opcode = newexp->elts[pc + 2].opcode = OP_FUNCALL;
4031 newexp->elts[pc + 1].longconst = (LONGEST) nargs;
4032
4033 newexp->elts[pc + 3].opcode = newexp->elts[pc + 6].opcode = OP_VAR_VALUE;
4034 newexp->elts[pc + 4].block = block;
4035 newexp->elts[pc + 5].symbol = sym;
4036
e9d9f57e 4037 expp->reset (newexp);
d2e4a39e 4038}
14f9c5c9
AS
4039
4040/* Type-class predicates */
4041
4c4b4cd2
PH
4042/* True iff TYPE is numeric (i.e., an INT, RANGE (of numeric type),
4043 or FLOAT). */
14f9c5c9
AS
4044
4045static int
d2e4a39e 4046numeric_type_p (struct type *type)
14f9c5c9
AS
4047{
4048 if (type == NULL)
4049 return 0;
d2e4a39e
AS
4050 else
4051 {
78134374 4052 switch (type->code ())
4c4b4cd2
PH
4053 {
4054 case TYPE_CODE_INT:
4055 case TYPE_CODE_FLT:
4056 return 1;
4057 case TYPE_CODE_RANGE:
4058 return (type == TYPE_TARGET_TYPE (type)
4059 || numeric_type_p (TYPE_TARGET_TYPE (type)));
4060 default:
4061 return 0;
4062 }
d2e4a39e 4063 }
14f9c5c9
AS
4064}
4065
4c4b4cd2 4066/* True iff TYPE is integral (an INT or RANGE of INTs). */
14f9c5c9
AS
4067
4068static int
d2e4a39e 4069integer_type_p (struct type *type)
14f9c5c9
AS
4070{
4071 if (type == NULL)
4072 return 0;
d2e4a39e
AS
4073 else
4074 {
78134374 4075 switch (type->code ())
4c4b4cd2
PH
4076 {
4077 case TYPE_CODE_INT:
4078 return 1;
4079 case TYPE_CODE_RANGE:
4080 return (type == TYPE_TARGET_TYPE (type)
4081 || integer_type_p (TYPE_TARGET_TYPE (type)));
4082 default:
4083 return 0;
4084 }
d2e4a39e 4085 }
14f9c5c9
AS
4086}
4087
4c4b4cd2 4088/* True iff TYPE is scalar (INT, RANGE, FLOAT, ENUM). */
14f9c5c9
AS
4089
4090static int
d2e4a39e 4091scalar_type_p (struct type *type)
14f9c5c9
AS
4092{
4093 if (type == NULL)
4094 return 0;
d2e4a39e
AS
4095 else
4096 {
78134374 4097 switch (type->code ())
4c4b4cd2
PH
4098 {
4099 case TYPE_CODE_INT:
4100 case TYPE_CODE_RANGE:
4101 case TYPE_CODE_ENUM:
4102 case TYPE_CODE_FLT:
4103 return 1;
4104 default:
4105 return 0;
4106 }
d2e4a39e 4107 }
14f9c5c9
AS
4108}
4109
4c4b4cd2 4110/* True iff TYPE is discrete (INT, RANGE, ENUM). */
14f9c5c9
AS
4111
4112static int
d2e4a39e 4113discrete_type_p (struct type *type)
14f9c5c9
AS
4114{
4115 if (type == NULL)
4116 return 0;
d2e4a39e
AS
4117 else
4118 {
78134374 4119 switch (type->code ())
4c4b4cd2
PH
4120 {
4121 case TYPE_CODE_INT:
4122 case TYPE_CODE_RANGE:
4123 case TYPE_CODE_ENUM:
872f0337 4124 case TYPE_CODE_BOOL:
4c4b4cd2
PH
4125 return 1;
4126 default:
4127 return 0;
4128 }
d2e4a39e 4129 }
14f9c5c9
AS
4130}
4131
4c4b4cd2
PH
4132/* Returns non-zero if OP with operands in the vector ARGS could be
4133 a user-defined function. Errs on the side of pre-defined operators
4134 (i.e., result 0). */
14f9c5c9
AS
4135
4136static int
d2e4a39e 4137possible_user_operator_p (enum exp_opcode op, struct value *args[])
14f9c5c9 4138{
76a01679 4139 struct type *type0 =
df407dfe 4140 (args[0] == NULL) ? NULL : ada_check_typedef (value_type (args[0]));
d2e4a39e 4141 struct type *type1 =
df407dfe 4142 (args[1] == NULL) ? NULL : ada_check_typedef (value_type (args[1]));
d2e4a39e 4143
4c4b4cd2
PH
4144 if (type0 == NULL)
4145 return 0;
4146
14f9c5c9
AS
4147 switch (op)
4148 {
4149 default:
4150 return 0;
4151
4152 case BINOP_ADD:
4153 case BINOP_SUB:
4154 case BINOP_MUL:
4155 case BINOP_DIV:
d2e4a39e 4156 return (!(numeric_type_p (type0) && numeric_type_p (type1)));
14f9c5c9
AS
4157
4158 case BINOP_REM:
4159 case BINOP_MOD:
4160 case BINOP_BITWISE_AND:
4161 case BINOP_BITWISE_IOR:
4162 case BINOP_BITWISE_XOR:
d2e4a39e 4163 return (!(integer_type_p (type0) && integer_type_p (type1)));
14f9c5c9
AS
4164
4165 case BINOP_EQUAL:
4166 case BINOP_NOTEQUAL:
4167 case BINOP_LESS:
4168 case BINOP_GTR:
4169 case BINOP_LEQ:
4170 case BINOP_GEQ:
d2e4a39e 4171 return (!(scalar_type_p (type0) && scalar_type_p (type1)));
14f9c5c9
AS
4172
4173 case BINOP_CONCAT:
ee90b9ab 4174 return !ada_is_array_type (type0) || !ada_is_array_type (type1);
14f9c5c9
AS
4175
4176 case BINOP_EXP:
d2e4a39e 4177 return (!(numeric_type_p (type0) && integer_type_p (type1)));
14f9c5c9
AS
4178
4179 case UNOP_NEG:
4180 case UNOP_PLUS:
4181 case UNOP_LOGICAL_NOT:
d2e4a39e
AS
4182 case UNOP_ABS:
4183 return (!numeric_type_p (type0));
14f9c5c9
AS
4184
4185 }
4186}
4187\f
4c4b4cd2 4188 /* Renaming */
14f9c5c9 4189
aeb5907d
JB
4190/* NOTES:
4191
4192 1. In the following, we assume that a renaming type's name may
4193 have an ___XD suffix. It would be nice if this went away at some
4194 point.
4195 2. We handle both the (old) purely type-based representation of
4196 renamings and the (new) variable-based encoding. At some point,
4197 it is devoutly to be hoped that the former goes away
4198 (FIXME: hilfinger-2007-07-09).
4199 3. Subprogram renamings are not implemented, although the XRS
4200 suffix is recognized (FIXME: hilfinger-2007-07-09). */
4201
4202/* If SYM encodes a renaming,
4203
4204 <renaming> renames <renamed entity>,
4205
4206 sets *LEN to the length of the renamed entity's name,
4207 *RENAMED_ENTITY to that name (not null-terminated), and *RENAMING_EXPR to
4208 the string describing the subcomponent selected from the renamed
0963b4bd 4209 entity. Returns ADA_NOT_RENAMING if SYM does not encode a renaming
aeb5907d
JB
4210 (in which case, the values of *RENAMED_ENTITY, *LEN, and *RENAMING_EXPR
4211 are undefined). Otherwise, returns a value indicating the category
4212 of entity renamed: an object (ADA_OBJECT_RENAMING), exception
4213 (ADA_EXCEPTION_RENAMING), package (ADA_PACKAGE_RENAMING), or
4214 subprogram (ADA_SUBPROGRAM_RENAMING). Does no allocation; the
4215 strings returned in *RENAMED_ENTITY and *RENAMING_EXPR should not be
4216 deallocated. The values of RENAMED_ENTITY, LEN, or RENAMING_EXPR
4217 may be NULL, in which case they are not assigned.
4218
4219 [Currently, however, GCC does not generate subprogram renamings.] */
4220
4221enum ada_renaming_category
4222ada_parse_renaming (struct symbol *sym,
4223 const char **renamed_entity, int *len,
4224 const char **renaming_expr)
4225{
4226 enum ada_renaming_category kind;
4227 const char *info;
4228 const char *suffix;
4229
4230 if (sym == NULL)
4231 return ADA_NOT_RENAMING;
4232 switch (SYMBOL_CLASS (sym))
14f9c5c9 4233 {
aeb5907d
JB
4234 default:
4235 return ADA_NOT_RENAMING;
aeb5907d
JB
4236 case LOC_LOCAL:
4237 case LOC_STATIC:
4238 case LOC_COMPUTED:
4239 case LOC_OPTIMIZED_OUT:
987012b8 4240 info = strstr (sym->linkage_name (), "___XR");
aeb5907d
JB
4241 if (info == NULL)
4242 return ADA_NOT_RENAMING;
4243 switch (info[5])
4244 {
4245 case '_':
4246 kind = ADA_OBJECT_RENAMING;
4247 info += 6;
4248 break;
4249 case 'E':
4250 kind = ADA_EXCEPTION_RENAMING;
4251 info += 7;
4252 break;
4253 case 'P':
4254 kind = ADA_PACKAGE_RENAMING;
4255 info += 7;
4256 break;
4257 case 'S':
4258 kind = ADA_SUBPROGRAM_RENAMING;
4259 info += 7;
4260 break;
4261 default:
4262 return ADA_NOT_RENAMING;
4263 }
14f9c5c9 4264 }
4c4b4cd2 4265
de93309a
SM
4266 if (renamed_entity != NULL)
4267 *renamed_entity = info;
4268 suffix = strstr (info, "___XE");
4269 if (suffix == NULL || suffix == info)
4270 return ADA_NOT_RENAMING;
4271 if (len != NULL)
4272 *len = strlen (info) - strlen (suffix);
4273 suffix += 5;
4274 if (renaming_expr != NULL)
4275 *renaming_expr = suffix;
4276 return kind;
4277}
4278
4279/* Compute the value of the given RENAMING_SYM, which is expected to
4280 be a symbol encoding a renaming expression. BLOCK is the block
4281 used to evaluate the renaming. */
4282
4283static struct value *
4284ada_read_renaming_var_value (struct symbol *renaming_sym,
4285 const struct block *block)
4286{
4287 const char *sym_name;
4288
987012b8 4289 sym_name = renaming_sym->linkage_name ();
de93309a
SM
4290 expression_up expr = parse_exp_1 (&sym_name, 0, block, 0);
4291 return evaluate_expression (expr.get ());
4292}
4293\f
4294
4295 /* Evaluation: Function Calls */
4296
4297/* Return an lvalue containing the value VAL. This is the identity on
4298 lvalues, and otherwise has the side-effect of allocating memory
4299 in the inferior where a copy of the value contents is copied. */
4300
4301static struct value *
4302ensure_lval (struct value *val)
4303{
4304 if (VALUE_LVAL (val) == not_lval
4305 || VALUE_LVAL (val) == lval_internalvar)
4306 {
4307 int len = TYPE_LENGTH (ada_check_typedef (value_type (val)));
4308 const CORE_ADDR addr =
4309 value_as_long (value_allocate_space_in_inferior (len));
4310
4311 VALUE_LVAL (val) = lval_memory;
4312 set_value_address (val, addr);
4313 write_memory (addr, value_contents (val), len);
4314 }
4315
4316 return val;
4317}
4318
4319/* Given ARG, a value of type (pointer or reference to a)*
4320 structure/union, extract the component named NAME from the ultimate
4321 target structure/union and return it as a value with its
4322 appropriate type.
4323
4324 The routine searches for NAME among all members of the structure itself
4325 and (recursively) among all members of any wrapper members
4326 (e.g., '_parent').
4327
4328 If NO_ERR, then simply return NULL in case of error, rather than
4329 calling error. */
4330
4331static struct value *
4332ada_value_struct_elt (struct value *arg, const char *name, int no_err)
4333{
4334 struct type *t, *t1;
4335 struct value *v;
4336 int check_tag;
4337
4338 v = NULL;
4339 t1 = t = ada_check_typedef (value_type (arg));
78134374 4340 if (t->code () == TYPE_CODE_REF)
de93309a
SM
4341 {
4342 t1 = TYPE_TARGET_TYPE (t);
4343 if (t1 == NULL)
4344 goto BadValue;
4345 t1 = ada_check_typedef (t1);
78134374 4346 if (t1->code () == TYPE_CODE_PTR)
de93309a
SM
4347 {
4348 arg = coerce_ref (arg);
4349 t = t1;
4350 }
4351 }
4352
78134374 4353 while (t->code () == TYPE_CODE_PTR)
de93309a
SM
4354 {
4355 t1 = TYPE_TARGET_TYPE (t);
4356 if (t1 == NULL)
4357 goto BadValue;
4358 t1 = ada_check_typedef (t1);
78134374 4359 if (t1->code () == TYPE_CODE_PTR)
de93309a
SM
4360 {
4361 arg = value_ind (arg);
4362 t = t1;
4363 }
4364 else
4365 break;
4366 }
aeb5907d 4367
78134374 4368 if (t1->code () != TYPE_CODE_STRUCT && t1->code () != TYPE_CODE_UNION)
de93309a 4369 goto BadValue;
52ce6436 4370
de93309a
SM
4371 if (t1 == t)
4372 v = ada_search_struct_field (name, arg, 0, t);
4373 else
4374 {
4375 int bit_offset, bit_size, byte_offset;
4376 struct type *field_type;
4377 CORE_ADDR address;
a5ee536b 4378
78134374 4379 if (t->code () == TYPE_CODE_PTR)
de93309a
SM
4380 address = value_address (ada_value_ind (arg));
4381 else
4382 address = value_address (ada_coerce_ref (arg));
d2e4a39e 4383
de93309a
SM
4384 /* Check to see if this is a tagged type. We also need to handle
4385 the case where the type is a reference to a tagged type, but
4386 we have to be careful to exclude pointers to tagged types.
4387 The latter should be shown as usual (as a pointer), whereas
4388 a reference should mostly be transparent to the user. */
14f9c5c9 4389
de93309a 4390 if (ada_is_tagged_type (t1, 0)
78134374 4391 || (t1->code () == TYPE_CODE_REF
de93309a
SM
4392 && ada_is_tagged_type (TYPE_TARGET_TYPE (t1), 0)))
4393 {
4394 /* We first try to find the searched field in the current type.
4395 If not found then let's look in the fixed type. */
14f9c5c9 4396
de93309a
SM
4397 if (!find_struct_field (name, t1, 0,
4398 &field_type, &byte_offset, &bit_offset,
4399 &bit_size, NULL))
4400 check_tag = 1;
4401 else
4402 check_tag = 0;
4403 }
4404 else
4405 check_tag = 0;
c3e5cd34 4406
de93309a
SM
4407 /* Convert to fixed type in all cases, so that we have proper
4408 offsets to each field in unconstrained record types. */
4409 t1 = ada_to_fixed_type (ada_get_base_type (t1), NULL,
4410 address, NULL, check_tag);
4411
4412 if (find_struct_field (name, t1, 0,
4413 &field_type, &byte_offset, &bit_offset,
4414 &bit_size, NULL))
4415 {
4416 if (bit_size != 0)
4417 {
78134374 4418 if (t->code () == TYPE_CODE_REF)
de93309a
SM
4419 arg = ada_coerce_ref (arg);
4420 else
4421 arg = ada_value_ind (arg);
4422 v = ada_value_primitive_packed_val (arg, NULL, byte_offset,
4423 bit_offset, bit_size,
4424 field_type);
4425 }
4426 else
4427 v = value_at_lazy (field_type, address + byte_offset);
4428 }
c3e5cd34 4429 }
14f9c5c9 4430
de93309a
SM
4431 if (v != NULL || no_err)
4432 return v;
4433 else
4434 error (_("There is no member named %s."), name);
4435
4436 BadValue:
4437 if (no_err)
4438 return NULL;
4439 else
4440 error (_("Attempt to extract a component of "
4441 "a value that is not a record."));
14f9c5c9
AS
4442}
4443
4444/* Return the value ACTUAL, converted to be an appropriate value for a
4445 formal of type FORMAL_TYPE. Use *SP as a stack pointer for
4446 allocating any necessary descriptors (fat pointers), or copies of
4c4b4cd2 4447 values not residing in memory, updating it as needed. */
14f9c5c9 4448
a93c0eb6 4449struct value *
40bc484c 4450ada_convert_actual (struct value *actual, struct type *formal_type0)
14f9c5c9 4451{
df407dfe 4452 struct type *actual_type = ada_check_typedef (value_type (actual));
61ee279c 4453 struct type *formal_type = ada_check_typedef (formal_type0);
d2e4a39e 4454 struct type *formal_target =
78134374 4455 formal_type->code () == TYPE_CODE_PTR
61ee279c 4456 ? ada_check_typedef (TYPE_TARGET_TYPE (formal_type)) : formal_type;
d2e4a39e 4457 struct type *actual_target =
78134374 4458 actual_type->code () == TYPE_CODE_PTR
61ee279c 4459 ? ada_check_typedef (TYPE_TARGET_TYPE (actual_type)) : actual_type;
14f9c5c9 4460
4c4b4cd2 4461 if (ada_is_array_descriptor_type (formal_target)
78134374 4462 && actual_target->code () == TYPE_CODE_ARRAY)
40bc484c 4463 return make_array_descriptor (formal_type, actual);
78134374
SM
4464 else if (formal_type->code () == TYPE_CODE_PTR
4465 || formal_type->code () == TYPE_CODE_REF)
14f9c5c9 4466 {
a84a8a0d 4467 struct value *result;
5b4ee69b 4468
78134374 4469 if (formal_target->code () == TYPE_CODE_ARRAY
4c4b4cd2 4470 && ada_is_array_descriptor_type (actual_target))
a84a8a0d 4471 result = desc_data (actual);
78134374 4472 else if (formal_type->code () != TYPE_CODE_PTR)
4c4b4cd2
PH
4473 {
4474 if (VALUE_LVAL (actual) != lval_memory)
4475 {
4476 struct value *val;
5b4ee69b 4477
df407dfe 4478 actual_type = ada_check_typedef (value_type (actual));
4c4b4cd2 4479 val = allocate_value (actual_type);
990a07ab 4480 memcpy ((char *) value_contents_raw (val),
0fd88904 4481 (char *) value_contents (actual),
4c4b4cd2 4482 TYPE_LENGTH (actual_type));
40bc484c 4483 actual = ensure_lval (val);
4c4b4cd2 4484 }
a84a8a0d 4485 result = value_addr (actual);
4c4b4cd2 4486 }
a84a8a0d
JB
4487 else
4488 return actual;
b1af9e97 4489 return value_cast_pointers (formal_type, result, 0);
14f9c5c9 4490 }
78134374 4491 else if (actual_type->code () == TYPE_CODE_PTR)
14f9c5c9 4492 return ada_value_ind (actual);
8344af1e
JB
4493 else if (ada_is_aligner_type (formal_type))
4494 {
4495 /* We need to turn this parameter into an aligner type
4496 as well. */
4497 struct value *aligner = allocate_value (formal_type);
4498 struct value *component = ada_value_struct_elt (aligner, "F", 0);
4499
4500 value_assign_to_component (aligner, component, actual);
4501 return aligner;
4502 }
14f9c5c9
AS
4503
4504 return actual;
4505}
4506
438c98a1
JB
4507/* Convert VALUE (which must be an address) to a CORE_ADDR that is a pointer of
4508 type TYPE. This is usually an inefficient no-op except on some targets
4509 (such as AVR) where the representation of a pointer and an address
4510 differs. */
4511
4512static CORE_ADDR
4513value_pointer (struct value *value, struct type *type)
4514{
4515 struct gdbarch *gdbarch = get_type_arch (type);
4516 unsigned len = TYPE_LENGTH (type);
224c3ddb 4517 gdb_byte *buf = (gdb_byte *) alloca (len);
438c98a1
JB
4518 CORE_ADDR addr;
4519
4520 addr = value_address (value);
4521 gdbarch_address_to_pointer (gdbarch, type, buf, addr);
34877895 4522 addr = extract_unsigned_integer (buf, len, type_byte_order (type));
438c98a1
JB
4523 return addr;
4524}
4525
14f9c5c9 4526
4c4b4cd2
PH
4527/* Push a descriptor of type TYPE for array value ARR on the stack at
4528 *SP, updating *SP to reflect the new descriptor. Return either
14f9c5c9 4529 an lvalue representing the new descriptor, or (if TYPE is a pointer-
4c4b4cd2
PH
4530 to-descriptor type rather than a descriptor type), a struct value *
4531 representing a pointer to this descriptor. */
14f9c5c9 4532
d2e4a39e 4533static struct value *
40bc484c 4534make_array_descriptor (struct type *type, struct value *arr)
14f9c5c9 4535{
d2e4a39e
AS
4536 struct type *bounds_type = desc_bounds_type (type);
4537 struct type *desc_type = desc_base_type (type);
4538 struct value *descriptor = allocate_value (desc_type);
4539 struct value *bounds = allocate_value (bounds_type);
14f9c5c9 4540 int i;
d2e4a39e 4541
0963b4bd
MS
4542 for (i = ada_array_arity (ada_check_typedef (value_type (arr)));
4543 i > 0; i -= 1)
14f9c5c9 4544 {
19f220c3
JK
4545 modify_field (value_type (bounds), value_contents_writeable (bounds),
4546 ada_array_bound (arr, i, 0),
4547 desc_bound_bitpos (bounds_type, i, 0),
4548 desc_bound_bitsize (bounds_type, i, 0));
4549 modify_field (value_type (bounds), value_contents_writeable (bounds),
4550 ada_array_bound (arr, i, 1),
4551 desc_bound_bitpos (bounds_type, i, 1),
4552 desc_bound_bitsize (bounds_type, i, 1));
14f9c5c9 4553 }
d2e4a39e 4554
40bc484c 4555 bounds = ensure_lval (bounds);
d2e4a39e 4556
19f220c3
JK
4557 modify_field (value_type (descriptor),
4558 value_contents_writeable (descriptor),
4559 value_pointer (ensure_lval (arr),
4560 TYPE_FIELD_TYPE (desc_type, 0)),
4561 fat_pntr_data_bitpos (desc_type),
4562 fat_pntr_data_bitsize (desc_type));
4563
4564 modify_field (value_type (descriptor),
4565 value_contents_writeable (descriptor),
4566 value_pointer (bounds,
4567 TYPE_FIELD_TYPE (desc_type, 1)),
4568 fat_pntr_bounds_bitpos (desc_type),
4569 fat_pntr_bounds_bitsize (desc_type));
14f9c5c9 4570
40bc484c 4571 descriptor = ensure_lval (descriptor);
14f9c5c9 4572
78134374 4573 if (type->code () == TYPE_CODE_PTR)
14f9c5c9
AS
4574 return value_addr (descriptor);
4575 else
4576 return descriptor;
4577}
14f9c5c9 4578\f
3d9434b5
JB
4579 /* Symbol Cache Module */
4580
3d9434b5 4581/* Performance measurements made as of 2010-01-15 indicate that
ee01b665 4582 this cache does bring some noticeable improvements. Depending
3d9434b5
JB
4583 on the type of entity being printed, the cache can make it as much
4584 as an order of magnitude faster than without it.
4585
4586 The descriptive type DWARF extension has significantly reduced
4587 the need for this cache, at least when DWARF is being used. However,
4588 even in this case, some expensive name-based symbol searches are still
4589 sometimes necessary - to find an XVZ variable, mostly. */
4590
ee01b665 4591/* Initialize the contents of SYM_CACHE. */
3d9434b5 4592
ee01b665
JB
4593static void
4594ada_init_symbol_cache (struct ada_symbol_cache *sym_cache)
4595{
4596 obstack_init (&sym_cache->cache_space);
4597 memset (sym_cache->root, '\000', sizeof (sym_cache->root));
4598}
3d9434b5 4599
ee01b665
JB
4600/* Free the memory used by SYM_CACHE. */
4601
4602static void
4603ada_free_symbol_cache (struct ada_symbol_cache *sym_cache)
3d9434b5 4604{
ee01b665
JB
4605 obstack_free (&sym_cache->cache_space, NULL);
4606 xfree (sym_cache);
4607}
3d9434b5 4608
ee01b665
JB
4609/* Return the symbol cache associated to the given program space PSPACE.
4610 If not allocated for this PSPACE yet, allocate and initialize one. */
3d9434b5 4611
ee01b665
JB
4612static struct ada_symbol_cache *
4613ada_get_symbol_cache (struct program_space *pspace)
4614{
4615 struct ada_pspace_data *pspace_data = get_ada_pspace_data (pspace);
ee01b665 4616
66c168ae 4617 if (pspace_data->sym_cache == NULL)
ee01b665 4618 {
66c168ae
JB
4619 pspace_data->sym_cache = XCNEW (struct ada_symbol_cache);
4620 ada_init_symbol_cache (pspace_data->sym_cache);
ee01b665
JB
4621 }
4622
66c168ae 4623 return pspace_data->sym_cache;
ee01b665 4624}
3d9434b5
JB
4625
4626/* Clear all entries from the symbol cache. */
4627
4628static void
4629ada_clear_symbol_cache (void)
4630{
ee01b665
JB
4631 struct ada_symbol_cache *sym_cache
4632 = ada_get_symbol_cache (current_program_space);
4633
4634 obstack_free (&sym_cache->cache_space, NULL);
4635 ada_init_symbol_cache (sym_cache);
3d9434b5
JB
4636}
4637
fe978cb0 4638/* Search our cache for an entry matching NAME and DOMAIN.
3d9434b5
JB
4639 Return it if found, or NULL otherwise. */
4640
4641static struct cache_entry **
fe978cb0 4642find_entry (const char *name, domain_enum domain)
3d9434b5 4643{
ee01b665
JB
4644 struct ada_symbol_cache *sym_cache
4645 = ada_get_symbol_cache (current_program_space);
3d9434b5
JB
4646 int h = msymbol_hash (name) % HASH_SIZE;
4647 struct cache_entry **e;
4648
ee01b665 4649 for (e = &sym_cache->root[h]; *e != NULL; e = &(*e)->next)
3d9434b5 4650 {
fe978cb0 4651 if (domain == (*e)->domain && strcmp (name, (*e)->name) == 0)
3d9434b5
JB
4652 return e;
4653 }
4654 return NULL;
4655}
4656
fe978cb0 4657/* Search the symbol cache for an entry matching NAME and DOMAIN.
3d9434b5
JB
4658 Return 1 if found, 0 otherwise.
4659
4660 If an entry was found and SYM is not NULL, set *SYM to the entry's
4661 SYM. Same principle for BLOCK if not NULL. */
96d887e8 4662
96d887e8 4663static int
fe978cb0 4664lookup_cached_symbol (const char *name, domain_enum domain,
f0c5f9b2 4665 struct symbol **sym, const struct block **block)
96d887e8 4666{
fe978cb0 4667 struct cache_entry **e = find_entry (name, domain);
3d9434b5
JB
4668
4669 if (e == NULL)
4670 return 0;
4671 if (sym != NULL)
4672 *sym = (*e)->sym;
4673 if (block != NULL)
4674 *block = (*e)->block;
4675 return 1;
96d887e8
PH
4676}
4677
3d9434b5 4678/* Assuming that (SYM, BLOCK) is the result of the lookup of NAME
fe978cb0 4679 in domain DOMAIN, save this result in our symbol cache. */
3d9434b5 4680
96d887e8 4681static void
fe978cb0 4682cache_symbol (const char *name, domain_enum domain, struct symbol *sym,
270140bd 4683 const struct block *block)
96d887e8 4684{
ee01b665
JB
4685 struct ada_symbol_cache *sym_cache
4686 = ada_get_symbol_cache (current_program_space);
3d9434b5 4687 int h;
3d9434b5
JB
4688 struct cache_entry *e;
4689
1994afbf
DE
4690 /* Symbols for builtin types don't have a block.
4691 For now don't cache such symbols. */
4692 if (sym != NULL && !SYMBOL_OBJFILE_OWNED (sym))
4693 return;
4694
3d9434b5
JB
4695 /* If the symbol is a local symbol, then do not cache it, as a search
4696 for that symbol depends on the context. To determine whether
4697 the symbol is local or not, we check the block where we found it
4698 against the global and static blocks of its associated symtab. */
4699 if (sym
08be3fe3 4700 && BLOCKVECTOR_BLOCK (SYMTAB_BLOCKVECTOR (symbol_symtab (sym)),
439247b6 4701 GLOBAL_BLOCK) != block
08be3fe3 4702 && BLOCKVECTOR_BLOCK (SYMTAB_BLOCKVECTOR (symbol_symtab (sym)),
439247b6 4703 STATIC_BLOCK) != block)
3d9434b5
JB
4704 return;
4705
4706 h = msymbol_hash (name) % HASH_SIZE;
e39db4db 4707 e = XOBNEW (&sym_cache->cache_space, cache_entry);
ee01b665
JB
4708 e->next = sym_cache->root[h];
4709 sym_cache->root[h] = e;
2ef5453b 4710 e->name = obstack_strdup (&sym_cache->cache_space, name);
3d9434b5 4711 e->sym = sym;
fe978cb0 4712 e->domain = domain;
3d9434b5 4713 e->block = block;
96d887e8 4714}
4c4b4cd2
PH
4715\f
4716 /* Symbol Lookup */
4717
b5ec771e
PA
4718/* Return the symbol name match type that should be used used when
4719 searching for all symbols matching LOOKUP_NAME.
c0431670
JB
4720
4721 LOOKUP_NAME is expected to be a symbol name after transformation
f98b2e33 4722 for Ada lookups. */
c0431670 4723
b5ec771e
PA
4724static symbol_name_match_type
4725name_match_type_from_name (const char *lookup_name)
c0431670 4726{
b5ec771e
PA
4727 return (strstr (lookup_name, "__") == NULL
4728 ? symbol_name_match_type::WILD
4729 : symbol_name_match_type::FULL);
c0431670
JB
4730}
4731
4c4b4cd2
PH
4732/* Return the result of a standard (literal, C-like) lookup of NAME in
4733 given DOMAIN, visible from lexical block BLOCK. */
4734
4735static struct symbol *
4736standard_lookup (const char *name, const struct block *block,
4737 domain_enum domain)
4738{
acbd605d 4739 /* Initialize it just to avoid a GCC false warning. */
6640a367 4740 struct block_symbol sym = {};
4c4b4cd2 4741
d12307c1
PMR
4742 if (lookup_cached_symbol (name, domain, &sym.symbol, NULL))
4743 return sym.symbol;
a2cd4f14 4744 ada_lookup_encoded_symbol (name, block, domain, &sym);
d12307c1
PMR
4745 cache_symbol (name, domain, sym.symbol, sym.block);
4746 return sym.symbol;
4c4b4cd2
PH
4747}
4748
4749
4750/* Non-zero iff there is at least one non-function/non-enumeral symbol
4751 in the symbol fields of SYMS[0..N-1]. We treat enumerals as functions,
4752 since they contend in overloading in the same way. */
4753static int
d12307c1 4754is_nonfunction (struct block_symbol syms[], int n)
4c4b4cd2
PH
4755{
4756 int i;
4757
4758 for (i = 0; i < n; i += 1)
78134374
SM
4759 if (SYMBOL_TYPE (syms[i].symbol)->code () != TYPE_CODE_FUNC
4760 && (SYMBOL_TYPE (syms[i].symbol)->code () != TYPE_CODE_ENUM
d12307c1 4761 || SYMBOL_CLASS (syms[i].symbol) != LOC_CONST))
14f9c5c9
AS
4762 return 1;
4763
4764 return 0;
4765}
4766
4767/* If true (non-zero), then TYPE0 and TYPE1 represent equivalent
4c4b4cd2 4768 struct types. Otherwise, they may not. */
14f9c5c9
AS
4769
4770static int
d2e4a39e 4771equiv_types (struct type *type0, struct type *type1)
14f9c5c9 4772{
d2e4a39e 4773 if (type0 == type1)
14f9c5c9 4774 return 1;
d2e4a39e 4775 if (type0 == NULL || type1 == NULL
78134374 4776 || type0->code () != type1->code ())
14f9c5c9 4777 return 0;
78134374
SM
4778 if ((type0->code () == TYPE_CODE_STRUCT
4779 || type0->code () == TYPE_CODE_ENUM)
14f9c5c9 4780 && ada_type_name (type0) != NULL && ada_type_name (type1) != NULL
4c4b4cd2 4781 && strcmp (ada_type_name (type0), ada_type_name (type1)) == 0)
14f9c5c9 4782 return 1;
d2e4a39e 4783
14f9c5c9
AS
4784 return 0;
4785}
4786
4787/* True iff SYM0 represents the same entity as SYM1, or one that is
4c4b4cd2 4788 no more defined than that of SYM1. */
14f9c5c9
AS
4789
4790static int
d2e4a39e 4791lesseq_defined_than (struct symbol *sym0, struct symbol *sym1)
14f9c5c9
AS
4792{
4793 if (sym0 == sym1)
4794 return 1;
176620f1 4795 if (SYMBOL_DOMAIN (sym0) != SYMBOL_DOMAIN (sym1)
14f9c5c9
AS
4796 || SYMBOL_CLASS (sym0) != SYMBOL_CLASS (sym1))
4797 return 0;
4798
d2e4a39e 4799 switch (SYMBOL_CLASS (sym0))
14f9c5c9
AS
4800 {
4801 case LOC_UNDEF:
4802 return 1;
4803 case LOC_TYPEDEF:
4804 {
4c4b4cd2
PH
4805 struct type *type0 = SYMBOL_TYPE (sym0);
4806 struct type *type1 = SYMBOL_TYPE (sym1);
987012b8
CB
4807 const char *name0 = sym0->linkage_name ();
4808 const char *name1 = sym1->linkage_name ();
4c4b4cd2 4809 int len0 = strlen (name0);
5b4ee69b 4810
4c4b4cd2 4811 return
78134374 4812 type0->code () == type1->code ()
4c4b4cd2
PH
4813 && (equiv_types (type0, type1)
4814 || (len0 < strlen (name1) && strncmp (name0, name1, len0) == 0
61012eef 4815 && startswith (name1 + len0, "___XV")));
14f9c5c9
AS
4816 }
4817 case LOC_CONST:
4818 return SYMBOL_VALUE (sym0) == SYMBOL_VALUE (sym1)
4c4b4cd2 4819 && equiv_types (SYMBOL_TYPE (sym0), SYMBOL_TYPE (sym1));
4b610737
TT
4820
4821 case LOC_STATIC:
4822 {
987012b8
CB
4823 const char *name0 = sym0->linkage_name ();
4824 const char *name1 = sym1->linkage_name ();
4b610737
TT
4825 return (strcmp (name0, name1) == 0
4826 && SYMBOL_VALUE_ADDRESS (sym0) == SYMBOL_VALUE_ADDRESS (sym1));
4827 }
4828
d2e4a39e
AS
4829 default:
4830 return 0;
14f9c5c9
AS
4831 }
4832}
4833
d12307c1 4834/* Append (SYM,BLOCK,SYMTAB) to the end of the array of struct block_symbol
4c4b4cd2 4835 records in OBSTACKP. Do nothing if SYM is a duplicate. */
14f9c5c9
AS
4836
4837static void
76a01679
JB
4838add_defn_to_vec (struct obstack *obstackp,
4839 struct symbol *sym,
f0c5f9b2 4840 const struct block *block)
14f9c5c9
AS
4841{
4842 int i;
d12307c1 4843 struct block_symbol *prevDefns = defns_collected (obstackp, 0);
14f9c5c9 4844
529cad9c
PH
4845 /* Do not try to complete stub types, as the debugger is probably
4846 already scanning all symbols matching a certain name at the
4847 time when this function is called. Trying to replace the stub
4848 type by its associated full type will cause us to restart a scan
4849 which may lead to an infinite recursion. Instead, the client
4850 collecting the matching symbols will end up collecting several
4851 matches, with at least one of them complete. It can then filter
4852 out the stub ones if needed. */
4853
4c4b4cd2
PH
4854 for (i = num_defns_collected (obstackp) - 1; i >= 0; i -= 1)
4855 {
d12307c1 4856 if (lesseq_defined_than (sym, prevDefns[i].symbol))
4c4b4cd2 4857 return;
d12307c1 4858 else if (lesseq_defined_than (prevDefns[i].symbol, sym))
4c4b4cd2 4859 {
d12307c1 4860 prevDefns[i].symbol = sym;
4c4b4cd2 4861 prevDefns[i].block = block;
4c4b4cd2 4862 return;
76a01679 4863 }
4c4b4cd2
PH
4864 }
4865
4866 {
d12307c1 4867 struct block_symbol info;
4c4b4cd2 4868
d12307c1 4869 info.symbol = sym;
4c4b4cd2 4870 info.block = block;
d12307c1 4871 obstack_grow (obstackp, &info, sizeof (struct block_symbol));
4c4b4cd2
PH
4872 }
4873}
4874
d12307c1
PMR
4875/* Number of block_symbol structures currently collected in current vector in
4876 OBSTACKP. */
4c4b4cd2 4877
76a01679
JB
4878static int
4879num_defns_collected (struct obstack *obstackp)
4c4b4cd2 4880{
d12307c1 4881 return obstack_object_size (obstackp) / sizeof (struct block_symbol);
4c4b4cd2
PH
4882}
4883
d12307c1
PMR
4884/* Vector of block_symbol structures currently collected in current vector in
4885 OBSTACKP. If FINISH, close off the vector and return its final address. */
4c4b4cd2 4886
d12307c1 4887static struct block_symbol *
4c4b4cd2
PH
4888defns_collected (struct obstack *obstackp, int finish)
4889{
4890 if (finish)
224c3ddb 4891 return (struct block_symbol *) obstack_finish (obstackp);
4c4b4cd2 4892 else
d12307c1 4893 return (struct block_symbol *) obstack_base (obstackp);
4c4b4cd2
PH
4894}
4895
7c7b6655
TT
4896/* Return a bound minimal symbol matching NAME according to Ada
4897 decoding rules. Returns an invalid symbol if there is no such
4898 minimal symbol. Names prefixed with "standard__" are handled
4899 specially: "standard__" is first stripped off, and only static and
4900 global symbols are searched. */
4c4b4cd2 4901
7c7b6655 4902struct bound_minimal_symbol
96d887e8 4903ada_lookup_simple_minsym (const char *name)
4c4b4cd2 4904{
7c7b6655 4905 struct bound_minimal_symbol result;
4c4b4cd2 4906
7c7b6655
TT
4907 memset (&result, 0, sizeof (result));
4908
b5ec771e
PA
4909 symbol_name_match_type match_type = name_match_type_from_name (name);
4910 lookup_name_info lookup_name (name, match_type);
4911
4912 symbol_name_matcher_ftype *match_name
4913 = ada_get_symbol_name_matcher (lookup_name);
4c4b4cd2 4914
2030c079 4915 for (objfile *objfile : current_program_space->objfiles ())
5325b9bf 4916 {
7932255d 4917 for (minimal_symbol *msymbol : objfile->msymbols ())
5325b9bf 4918 {
c9d95fa3 4919 if (match_name (msymbol->linkage_name (), lookup_name, NULL)
5325b9bf
TT
4920 && MSYMBOL_TYPE (msymbol) != mst_solib_trampoline)
4921 {
4922 result.minsym = msymbol;
4923 result.objfile = objfile;
4924 break;
4925 }
4926 }
4927 }
4c4b4cd2 4928
7c7b6655 4929 return result;
96d887e8 4930}
4c4b4cd2 4931
96d887e8
PH
4932/* For all subprograms that statically enclose the subprogram of the
4933 selected frame, add symbols matching identifier NAME in DOMAIN
4934 and their blocks to the list of data in OBSTACKP, as for
48b78332
JB
4935 ada_add_block_symbols (q.v.). If WILD_MATCH_P, treat as NAME
4936 with a wildcard prefix. */
4c4b4cd2 4937
96d887e8
PH
4938static void
4939add_symbols_from_enclosing_procs (struct obstack *obstackp,
b5ec771e
PA
4940 const lookup_name_info &lookup_name,
4941 domain_enum domain)
96d887e8 4942{
96d887e8 4943}
14f9c5c9 4944
96d887e8
PH
4945/* True if TYPE is definitely an artificial type supplied to a symbol
4946 for which no debugging information was given in the symbol file. */
14f9c5c9 4947
96d887e8
PH
4948static int
4949is_nondebugging_type (struct type *type)
4950{
0d5cff50 4951 const char *name = ada_type_name (type);
5b4ee69b 4952
96d887e8
PH
4953 return (name != NULL && strcmp (name, "<variable, no debug info>") == 0);
4954}
4c4b4cd2 4955
8f17729f
JB
4956/* Return nonzero if TYPE1 and TYPE2 are two enumeration types
4957 that are deemed "identical" for practical purposes.
4958
4959 This function assumes that TYPE1 and TYPE2 are both TYPE_CODE_ENUM
4960 types and that their number of enumerals is identical (in other
4961 words, TYPE_NFIELDS (type1) == TYPE_NFIELDS (type2)). */
4962
4963static int
4964ada_identical_enum_types_p (struct type *type1, struct type *type2)
4965{
4966 int i;
4967
4968 /* The heuristic we use here is fairly conservative. We consider
4969 that 2 enumerate types are identical if they have the same
4970 number of enumerals and that all enumerals have the same
4971 underlying value and name. */
4972
4973 /* All enums in the type should have an identical underlying value. */
4974 for (i = 0; i < TYPE_NFIELDS (type1); i++)
14e75d8e 4975 if (TYPE_FIELD_ENUMVAL (type1, i) != TYPE_FIELD_ENUMVAL (type2, i))
8f17729f
JB
4976 return 0;
4977
4978 /* All enumerals should also have the same name (modulo any numerical
4979 suffix). */
4980 for (i = 0; i < TYPE_NFIELDS (type1); i++)
4981 {
0d5cff50
DE
4982 const char *name_1 = TYPE_FIELD_NAME (type1, i);
4983 const char *name_2 = TYPE_FIELD_NAME (type2, i);
8f17729f
JB
4984 int len_1 = strlen (name_1);
4985 int len_2 = strlen (name_2);
4986
4987 ada_remove_trailing_digits (TYPE_FIELD_NAME (type1, i), &len_1);
4988 ada_remove_trailing_digits (TYPE_FIELD_NAME (type2, i), &len_2);
4989 if (len_1 != len_2
4990 || strncmp (TYPE_FIELD_NAME (type1, i),
4991 TYPE_FIELD_NAME (type2, i),
4992 len_1) != 0)
4993 return 0;
4994 }
4995
4996 return 1;
4997}
4998
4999/* Return nonzero if all the symbols in SYMS are all enumeral symbols
5000 that are deemed "identical" for practical purposes. Sometimes,
5001 enumerals are not strictly identical, but their types are so similar
5002 that they can be considered identical.
5003
5004 For instance, consider the following code:
5005
5006 type Color is (Black, Red, Green, Blue, White);
5007 type RGB_Color is new Color range Red .. Blue;
5008
5009 Type RGB_Color is a subrange of an implicit type which is a copy
5010 of type Color. If we call that implicit type RGB_ColorB ("B" is
5011 for "Base Type"), then type RGB_ColorB is a copy of type Color.
5012 As a result, when an expression references any of the enumeral
5013 by name (Eg. "print green"), the expression is technically
5014 ambiguous and the user should be asked to disambiguate. But
5015 doing so would only hinder the user, since it wouldn't matter
5016 what choice he makes, the outcome would always be the same.
5017 So, for practical purposes, we consider them as the same. */
5018
5019static int
54d343a2 5020symbols_are_identical_enums (const std::vector<struct block_symbol> &syms)
8f17729f
JB
5021{
5022 int i;
5023
5024 /* Before performing a thorough comparison check of each type,
5025 we perform a series of inexpensive checks. We expect that these
5026 checks will quickly fail in the vast majority of cases, and thus
5027 help prevent the unnecessary use of a more expensive comparison.
5028 Said comparison also expects us to make some of these checks
5029 (see ada_identical_enum_types_p). */
5030
5031 /* Quick check: All symbols should have an enum type. */
54d343a2 5032 for (i = 0; i < syms.size (); i++)
78134374 5033 if (SYMBOL_TYPE (syms[i].symbol)->code () != TYPE_CODE_ENUM)
8f17729f
JB
5034 return 0;
5035
5036 /* Quick check: They should all have the same value. */
54d343a2 5037 for (i = 1; i < syms.size (); i++)
d12307c1 5038 if (SYMBOL_VALUE (syms[i].symbol) != SYMBOL_VALUE (syms[0].symbol))
8f17729f
JB
5039 return 0;
5040
5041 /* Quick check: They should all have the same number of enumerals. */
54d343a2 5042 for (i = 1; i < syms.size (); i++)
d12307c1
PMR
5043 if (TYPE_NFIELDS (SYMBOL_TYPE (syms[i].symbol))
5044 != TYPE_NFIELDS (SYMBOL_TYPE (syms[0].symbol)))
8f17729f
JB
5045 return 0;
5046
5047 /* All the sanity checks passed, so we might have a set of
5048 identical enumeration types. Perform a more complete
5049 comparison of the type of each symbol. */
54d343a2 5050 for (i = 1; i < syms.size (); i++)
d12307c1
PMR
5051 if (!ada_identical_enum_types_p (SYMBOL_TYPE (syms[i].symbol),
5052 SYMBOL_TYPE (syms[0].symbol)))
8f17729f
JB
5053 return 0;
5054
5055 return 1;
5056}
5057
54d343a2 5058/* Remove any non-debugging symbols in SYMS that definitely
96d887e8
PH
5059 duplicate other symbols in the list (The only case I know of where
5060 this happens is when object files containing stabs-in-ecoff are
5061 linked with files containing ordinary ecoff debugging symbols (or no
5062 debugging symbols)). Modifies SYMS to squeeze out deleted entries.
5063 Returns the number of items in the modified list. */
4c4b4cd2 5064
96d887e8 5065static int
54d343a2 5066remove_extra_symbols (std::vector<struct block_symbol> *syms)
96d887e8
PH
5067{
5068 int i, j;
4c4b4cd2 5069
8f17729f
JB
5070 /* We should never be called with less than 2 symbols, as there
5071 cannot be any extra symbol in that case. But it's easy to
5072 handle, since we have nothing to do in that case. */
54d343a2
TT
5073 if (syms->size () < 2)
5074 return syms->size ();
8f17729f 5075
96d887e8 5076 i = 0;
54d343a2 5077 while (i < syms->size ())
96d887e8 5078 {
a35ddb44 5079 int remove_p = 0;
339c13b6
JB
5080
5081 /* If two symbols have the same name and one of them is a stub type,
5082 the get rid of the stub. */
5083
54d343a2 5084 if (TYPE_STUB (SYMBOL_TYPE ((*syms)[i].symbol))
987012b8 5085 && (*syms)[i].symbol->linkage_name () != NULL)
339c13b6 5086 {
54d343a2 5087 for (j = 0; j < syms->size (); j++)
339c13b6
JB
5088 {
5089 if (j != i
54d343a2 5090 && !TYPE_STUB (SYMBOL_TYPE ((*syms)[j].symbol))
987012b8
CB
5091 && (*syms)[j].symbol->linkage_name () != NULL
5092 && strcmp ((*syms)[i].symbol->linkage_name (),
5093 (*syms)[j].symbol->linkage_name ()) == 0)
a35ddb44 5094 remove_p = 1;
339c13b6
JB
5095 }
5096 }
5097
5098 /* Two symbols with the same name, same class and same address
5099 should be identical. */
5100
987012b8 5101 else if ((*syms)[i].symbol->linkage_name () != NULL
54d343a2
TT
5102 && SYMBOL_CLASS ((*syms)[i].symbol) == LOC_STATIC
5103 && is_nondebugging_type (SYMBOL_TYPE ((*syms)[i].symbol)))
96d887e8 5104 {
54d343a2 5105 for (j = 0; j < syms->size (); j += 1)
96d887e8
PH
5106 {
5107 if (i != j
987012b8
CB
5108 && (*syms)[j].symbol->linkage_name () != NULL
5109 && strcmp ((*syms)[i].symbol->linkage_name (),
5110 (*syms)[j].symbol->linkage_name ()) == 0
54d343a2
TT
5111 && SYMBOL_CLASS ((*syms)[i].symbol)
5112 == SYMBOL_CLASS ((*syms)[j].symbol)
5113 && SYMBOL_VALUE_ADDRESS ((*syms)[i].symbol)
5114 == SYMBOL_VALUE_ADDRESS ((*syms)[j].symbol))
a35ddb44 5115 remove_p = 1;
4c4b4cd2 5116 }
4c4b4cd2 5117 }
339c13b6 5118
a35ddb44 5119 if (remove_p)
54d343a2 5120 syms->erase (syms->begin () + i);
339c13b6 5121
96d887e8 5122 i += 1;
14f9c5c9 5123 }
8f17729f
JB
5124
5125 /* If all the remaining symbols are identical enumerals, then
5126 just keep the first one and discard the rest.
5127
5128 Unlike what we did previously, we do not discard any entry
5129 unless they are ALL identical. This is because the symbol
5130 comparison is not a strict comparison, but rather a practical
5131 comparison. If all symbols are considered identical, then
5132 we can just go ahead and use the first one and discard the rest.
5133 But if we cannot reduce the list to a single element, we have
5134 to ask the user to disambiguate anyways. And if we have to
5135 present a multiple-choice menu, it's less confusing if the list
5136 isn't missing some choices that were identical and yet distinct. */
54d343a2
TT
5137 if (symbols_are_identical_enums (*syms))
5138 syms->resize (1);
8f17729f 5139
54d343a2 5140 return syms->size ();
14f9c5c9
AS
5141}
5142
96d887e8
PH
5143/* Given a type that corresponds to a renaming entity, use the type name
5144 to extract the scope (package name or function name, fully qualified,
5145 and following the GNAT encoding convention) where this renaming has been
49d83361 5146 defined. */
4c4b4cd2 5147
49d83361 5148static std::string
96d887e8 5149xget_renaming_scope (struct type *renaming_type)
14f9c5c9 5150{
96d887e8 5151 /* The renaming types adhere to the following convention:
0963b4bd 5152 <scope>__<rename>___<XR extension>.
96d887e8
PH
5153 So, to extract the scope, we search for the "___XR" extension,
5154 and then backtrack until we find the first "__". */
76a01679 5155
7d93a1e0 5156 const char *name = renaming_type->name ();
108d56a4
SM
5157 const char *suffix = strstr (name, "___XR");
5158 const char *last;
14f9c5c9 5159
96d887e8
PH
5160 /* Now, backtrack a bit until we find the first "__". Start looking
5161 at suffix - 3, as the <rename> part is at least one character long. */
14f9c5c9 5162
96d887e8
PH
5163 for (last = suffix - 3; last > name; last--)
5164 if (last[0] == '_' && last[1] == '_')
5165 break;
76a01679 5166
96d887e8 5167 /* Make a copy of scope and return it. */
49d83361 5168 return std::string (name, last);
4c4b4cd2
PH
5169}
5170
96d887e8 5171/* Return nonzero if NAME corresponds to a package name. */
4c4b4cd2 5172
96d887e8
PH
5173static int
5174is_package_name (const char *name)
4c4b4cd2 5175{
96d887e8
PH
5176 /* Here, We take advantage of the fact that no symbols are generated
5177 for packages, while symbols are generated for each function.
5178 So the condition for NAME represent a package becomes equivalent
5179 to NAME not existing in our list of symbols. There is only one
5180 small complication with library-level functions (see below). */
4c4b4cd2 5181
96d887e8
PH
5182 /* If it is a function that has not been defined at library level,
5183 then we should be able to look it up in the symbols. */
5184 if (standard_lookup (name, NULL, VAR_DOMAIN) != NULL)
5185 return 0;
14f9c5c9 5186
96d887e8
PH
5187 /* Library-level function names start with "_ada_". See if function
5188 "_ada_" followed by NAME can be found. */
14f9c5c9 5189
96d887e8 5190 /* Do a quick check that NAME does not contain "__", since library-level
e1d5a0d2 5191 functions names cannot contain "__" in them. */
96d887e8
PH
5192 if (strstr (name, "__") != NULL)
5193 return 0;
4c4b4cd2 5194
528e1572 5195 std::string fun_name = string_printf ("_ada_%s", name);
14f9c5c9 5196
528e1572 5197 return (standard_lookup (fun_name.c_str (), NULL, VAR_DOMAIN) == NULL);
96d887e8 5198}
14f9c5c9 5199
96d887e8 5200/* Return nonzero if SYM corresponds to a renaming entity that is
aeb5907d 5201 not visible from FUNCTION_NAME. */
14f9c5c9 5202
96d887e8 5203static int
0d5cff50 5204old_renaming_is_invisible (const struct symbol *sym, const char *function_name)
96d887e8 5205{
aeb5907d
JB
5206 if (SYMBOL_CLASS (sym) != LOC_TYPEDEF)
5207 return 0;
5208
49d83361 5209 std::string scope = xget_renaming_scope (SYMBOL_TYPE (sym));
14f9c5c9 5210
96d887e8 5211 /* If the rename has been defined in a package, then it is visible. */
49d83361
TT
5212 if (is_package_name (scope.c_str ()))
5213 return 0;
14f9c5c9 5214
96d887e8
PH
5215 /* Check that the rename is in the current function scope by checking
5216 that its name starts with SCOPE. */
76a01679 5217
96d887e8
PH
5218 /* If the function name starts with "_ada_", it means that it is
5219 a library-level function. Strip this prefix before doing the
5220 comparison, as the encoding for the renaming does not contain
5221 this prefix. */
61012eef 5222 if (startswith (function_name, "_ada_"))
96d887e8 5223 function_name += 5;
f26caa11 5224
49d83361 5225 return !startswith (function_name, scope.c_str ());
f26caa11
PH
5226}
5227
aeb5907d
JB
5228/* Remove entries from SYMS that corresponds to a renaming entity that
5229 is not visible from the function associated with CURRENT_BLOCK or
5230 that is superfluous due to the presence of more specific renaming
5231 information. Places surviving symbols in the initial entries of
5232 SYMS and returns the number of surviving symbols.
96d887e8
PH
5233
5234 Rationale:
aeb5907d
JB
5235 First, in cases where an object renaming is implemented as a
5236 reference variable, GNAT may produce both the actual reference
5237 variable and the renaming encoding. In this case, we discard the
5238 latter.
5239
5240 Second, GNAT emits a type following a specified encoding for each renaming
96d887e8
PH
5241 entity. Unfortunately, STABS currently does not support the definition
5242 of types that are local to a given lexical block, so all renamings types
5243 are emitted at library level. As a consequence, if an application
5244 contains two renaming entities using the same name, and a user tries to
5245 print the value of one of these entities, the result of the ada symbol
5246 lookup will also contain the wrong renaming type.
f26caa11 5247
96d887e8
PH
5248 This function partially covers for this limitation by attempting to
5249 remove from the SYMS list renaming symbols that should be visible
5250 from CURRENT_BLOCK. However, there does not seem be a 100% reliable
5251 method with the current information available. The implementation
5252 below has a couple of limitations (FIXME: brobecker-2003-05-12):
5253
5254 - When the user tries to print a rename in a function while there
5255 is another rename entity defined in a package: Normally, the
5256 rename in the function has precedence over the rename in the
5257 package, so the latter should be removed from the list. This is
5258 currently not the case.
5259
5260 - This function will incorrectly remove valid renames if
5261 the CURRENT_BLOCK corresponds to a function which symbol name
5262 has been changed by an "Export" pragma. As a consequence,
5263 the user will be unable to print such rename entities. */
4c4b4cd2 5264
14f9c5c9 5265static int
54d343a2
TT
5266remove_irrelevant_renamings (std::vector<struct block_symbol> *syms,
5267 const struct block *current_block)
4c4b4cd2
PH
5268{
5269 struct symbol *current_function;
0d5cff50 5270 const char *current_function_name;
4c4b4cd2 5271 int i;
aeb5907d
JB
5272 int is_new_style_renaming;
5273
5274 /* If there is both a renaming foo___XR... encoded as a variable and
5275 a simple variable foo in the same block, discard the latter.
0963b4bd 5276 First, zero out such symbols, then compress. */
aeb5907d 5277 is_new_style_renaming = 0;
54d343a2 5278 for (i = 0; i < syms->size (); i += 1)
aeb5907d 5279 {
54d343a2
TT
5280 struct symbol *sym = (*syms)[i].symbol;
5281 const struct block *block = (*syms)[i].block;
aeb5907d
JB
5282 const char *name;
5283 const char *suffix;
5284
5285 if (sym == NULL || SYMBOL_CLASS (sym) == LOC_TYPEDEF)
5286 continue;
987012b8 5287 name = sym->linkage_name ();
aeb5907d
JB
5288 suffix = strstr (name, "___XR");
5289
5290 if (suffix != NULL)
5291 {
5292 int name_len = suffix - name;
5293 int j;
5b4ee69b 5294
aeb5907d 5295 is_new_style_renaming = 1;
54d343a2
TT
5296 for (j = 0; j < syms->size (); j += 1)
5297 if (i != j && (*syms)[j].symbol != NULL
987012b8 5298 && strncmp (name, (*syms)[j].symbol->linkage_name (),
aeb5907d 5299 name_len) == 0
54d343a2
TT
5300 && block == (*syms)[j].block)
5301 (*syms)[j].symbol = NULL;
aeb5907d
JB
5302 }
5303 }
5304 if (is_new_style_renaming)
5305 {
5306 int j, k;
5307
54d343a2
TT
5308 for (j = k = 0; j < syms->size (); j += 1)
5309 if ((*syms)[j].symbol != NULL)
aeb5907d 5310 {
54d343a2 5311 (*syms)[k] = (*syms)[j];
aeb5907d
JB
5312 k += 1;
5313 }
5314 return k;
5315 }
4c4b4cd2
PH
5316
5317 /* Extract the function name associated to CURRENT_BLOCK.
5318 Abort if unable to do so. */
76a01679 5319
4c4b4cd2 5320 if (current_block == NULL)
54d343a2 5321 return syms->size ();
76a01679 5322
7f0df278 5323 current_function = block_linkage_function (current_block);
4c4b4cd2 5324 if (current_function == NULL)
54d343a2 5325 return syms->size ();
4c4b4cd2 5326
987012b8 5327 current_function_name = current_function->linkage_name ();
4c4b4cd2 5328 if (current_function_name == NULL)
54d343a2 5329 return syms->size ();
4c4b4cd2
PH
5330
5331 /* Check each of the symbols, and remove it from the list if it is
5332 a type corresponding to a renaming that is out of the scope of
5333 the current block. */
5334
5335 i = 0;
54d343a2 5336 while (i < syms->size ())
4c4b4cd2 5337 {
54d343a2 5338 if (ada_parse_renaming ((*syms)[i].symbol, NULL, NULL, NULL)
aeb5907d 5339 == ADA_OBJECT_RENAMING
54d343a2
TT
5340 && old_renaming_is_invisible ((*syms)[i].symbol,
5341 current_function_name))
5342 syms->erase (syms->begin () + i);
4c4b4cd2
PH
5343 else
5344 i += 1;
5345 }
5346
54d343a2 5347 return syms->size ();
4c4b4cd2
PH
5348}
5349
339c13b6
JB
5350/* Add to OBSTACKP all symbols from BLOCK (and its super-blocks)
5351 whose name and domain match NAME and DOMAIN respectively.
5352 If no match was found, then extend the search to "enclosing"
5353 routines (in other words, if we're inside a nested function,
5354 search the symbols defined inside the enclosing functions).
d0a8ab18
JB
5355 If WILD_MATCH_P is nonzero, perform the naming matching in
5356 "wild" mode (see function "wild_match" for more info).
339c13b6
JB
5357
5358 Note: This function assumes that OBSTACKP has 0 (zero) element in it. */
5359
5360static void
b5ec771e
PA
5361ada_add_local_symbols (struct obstack *obstackp,
5362 const lookup_name_info &lookup_name,
5363 const struct block *block, domain_enum domain)
339c13b6
JB
5364{
5365 int block_depth = 0;
5366
5367 while (block != NULL)
5368 {
5369 block_depth += 1;
b5ec771e 5370 ada_add_block_symbols (obstackp, block, lookup_name, domain, NULL);
339c13b6
JB
5371
5372 /* If we found a non-function match, assume that's the one. */
5373 if (is_nonfunction (defns_collected (obstackp, 0),
5374 num_defns_collected (obstackp)))
5375 return;
5376
5377 block = BLOCK_SUPERBLOCK (block);
5378 }
5379
5380 /* If no luck so far, try to find NAME as a local symbol in some lexically
5381 enclosing subprogram. */
5382 if (num_defns_collected (obstackp) == 0 && block_depth > 2)
b5ec771e 5383 add_symbols_from_enclosing_procs (obstackp, lookup_name, domain);
339c13b6
JB
5384}
5385
ccefe4c4 5386/* An object of this type is used as the user_data argument when
40658b94 5387 calling the map_matching_symbols method. */
ccefe4c4 5388
40658b94 5389struct match_data
ccefe4c4 5390{
40658b94 5391 struct objfile *objfile;
ccefe4c4 5392 struct obstack *obstackp;
40658b94
PH
5393 struct symbol *arg_sym;
5394 int found_sym;
ccefe4c4
TT
5395};
5396
199b4314
TT
5397/* A callback for add_nonlocal_symbols that adds symbol, found in BSYM,
5398 to a list of symbols. DATA is a pointer to a struct match_data *
40658b94
PH
5399 containing the obstack that collects the symbol list, the file that SYM
5400 must come from, a flag indicating whether a non-argument symbol has
5401 been found in the current block, and the last argument symbol
5402 passed in SYM within the current block (if any). When SYM is null,
5403 marking the end of a block, the argument symbol is added if no
5404 other has been found. */
ccefe4c4 5405
199b4314
TT
5406static bool
5407aux_add_nonlocal_symbols (struct block_symbol *bsym,
5408 struct match_data *data)
ccefe4c4 5409{
199b4314
TT
5410 const struct block *block = bsym->block;
5411 struct symbol *sym = bsym->symbol;
5412
40658b94
PH
5413 if (sym == NULL)
5414 {
5415 if (!data->found_sym && data->arg_sym != NULL)
5416 add_defn_to_vec (data->obstackp,
5417 fixup_symbol_section (data->arg_sym, data->objfile),
5418 block);
5419 data->found_sym = 0;
5420 data->arg_sym = NULL;
5421 }
5422 else
5423 {
5424 if (SYMBOL_CLASS (sym) == LOC_UNRESOLVED)
199b4314 5425 return true;
40658b94
PH
5426 else if (SYMBOL_IS_ARGUMENT (sym))
5427 data->arg_sym = sym;
5428 else
5429 {
5430 data->found_sym = 1;
5431 add_defn_to_vec (data->obstackp,
5432 fixup_symbol_section (sym, data->objfile),
5433 block);
5434 }
5435 }
199b4314 5436 return true;
40658b94
PH
5437}
5438
b5ec771e
PA
5439/* Helper for add_nonlocal_symbols. Find symbols in DOMAIN which are
5440 targeted by renamings matching LOOKUP_NAME in BLOCK. Add these
5441 symbols to OBSTACKP. Return whether we found such symbols. */
22cee43f
PMR
5442
5443static int
5444ada_add_block_renamings (struct obstack *obstackp,
5445 const struct block *block,
b5ec771e
PA
5446 const lookup_name_info &lookup_name,
5447 domain_enum domain)
22cee43f
PMR
5448{
5449 struct using_direct *renaming;
5450 int defns_mark = num_defns_collected (obstackp);
5451
b5ec771e
PA
5452 symbol_name_matcher_ftype *name_match
5453 = ada_get_symbol_name_matcher (lookup_name);
5454
22cee43f
PMR
5455 for (renaming = block_using (block);
5456 renaming != NULL;
5457 renaming = renaming->next)
5458 {
5459 const char *r_name;
22cee43f
PMR
5460
5461 /* Avoid infinite recursions: skip this renaming if we are actually
5462 already traversing it.
5463
5464 Currently, symbol lookup in Ada don't use the namespace machinery from
5465 C++/Fortran support: skip namespace imports that use them. */
5466 if (renaming->searched
5467 || (renaming->import_src != NULL
5468 && renaming->import_src[0] != '\0')
5469 || (renaming->import_dest != NULL
5470 && renaming->import_dest[0] != '\0'))
5471 continue;
5472 renaming->searched = 1;
5473
5474 /* TODO: here, we perform another name-based symbol lookup, which can
5475 pull its own multiple overloads. In theory, we should be able to do
5476 better in this case since, in DWARF, DW_AT_import is a DIE reference,
5477 not a simple name. But in order to do this, we would need to enhance
5478 the DWARF reader to associate a symbol to this renaming, instead of a
5479 name. So, for now, we do something simpler: re-use the C++/Fortran
5480 namespace machinery. */
5481 r_name = (renaming->alias != NULL
5482 ? renaming->alias
5483 : renaming->declaration);
b5ec771e
PA
5484 if (name_match (r_name, lookup_name, NULL))
5485 {
5486 lookup_name_info decl_lookup_name (renaming->declaration,
5487 lookup_name.match_type ());
5488 ada_add_all_symbols (obstackp, block, decl_lookup_name, domain,
5489 1, NULL);
5490 }
22cee43f
PMR
5491 renaming->searched = 0;
5492 }
5493 return num_defns_collected (obstackp) != defns_mark;
5494}
5495
db230ce3
JB
5496/* Implements compare_names, but only applying the comparision using
5497 the given CASING. */
5b4ee69b 5498
40658b94 5499static int
db230ce3
JB
5500compare_names_with_case (const char *string1, const char *string2,
5501 enum case_sensitivity casing)
40658b94
PH
5502{
5503 while (*string1 != '\0' && *string2 != '\0')
5504 {
db230ce3
JB
5505 char c1, c2;
5506
40658b94
PH
5507 if (isspace (*string1) || isspace (*string2))
5508 return strcmp_iw_ordered (string1, string2);
db230ce3
JB
5509
5510 if (casing == case_sensitive_off)
5511 {
5512 c1 = tolower (*string1);
5513 c2 = tolower (*string2);
5514 }
5515 else
5516 {
5517 c1 = *string1;
5518 c2 = *string2;
5519 }
5520 if (c1 != c2)
40658b94 5521 break;
db230ce3 5522
40658b94
PH
5523 string1 += 1;
5524 string2 += 1;
5525 }
db230ce3 5526
40658b94
PH
5527 switch (*string1)
5528 {
5529 case '(':
5530 return strcmp_iw_ordered (string1, string2);
5531 case '_':
5532 if (*string2 == '\0')
5533 {
052874e8 5534 if (is_name_suffix (string1))
40658b94
PH
5535 return 0;
5536 else
1a1d5513 5537 return 1;
40658b94 5538 }
dbb8534f 5539 /* FALLTHROUGH */
40658b94
PH
5540 default:
5541 if (*string2 == '(')
5542 return strcmp_iw_ordered (string1, string2);
5543 else
db230ce3
JB
5544 {
5545 if (casing == case_sensitive_off)
5546 return tolower (*string1) - tolower (*string2);
5547 else
5548 return *string1 - *string2;
5549 }
40658b94 5550 }
ccefe4c4
TT
5551}
5552
db230ce3
JB
5553/* Compare STRING1 to STRING2, with results as for strcmp.
5554 Compatible with strcmp_iw_ordered in that...
5555
5556 strcmp_iw_ordered (STRING1, STRING2) <= 0
5557
5558 ... implies...
5559
5560 compare_names (STRING1, STRING2) <= 0
5561
5562 (they may differ as to what symbols compare equal). */
5563
5564static int
5565compare_names (const char *string1, const char *string2)
5566{
5567 int result;
5568
5569 /* Similar to what strcmp_iw_ordered does, we need to perform
5570 a case-insensitive comparison first, and only resort to
5571 a second, case-sensitive, comparison if the first one was
5572 not sufficient to differentiate the two strings. */
5573
5574 result = compare_names_with_case (string1, string2, case_sensitive_off);
5575 if (result == 0)
5576 result = compare_names_with_case (string1, string2, case_sensitive_on);
5577
5578 return result;
5579}
5580
b5ec771e
PA
5581/* Convenience function to get at the Ada encoded lookup name for
5582 LOOKUP_NAME, as a C string. */
5583
5584static const char *
5585ada_lookup_name (const lookup_name_info &lookup_name)
5586{
5587 return lookup_name.ada ().lookup_name ().c_str ();
5588}
5589
339c13b6 5590/* Add to OBSTACKP all non-local symbols whose name and domain match
b5ec771e
PA
5591 LOOKUP_NAME and DOMAIN respectively. The search is performed on
5592 GLOBAL_BLOCK symbols if GLOBAL is non-zero, or on STATIC_BLOCK
5593 symbols otherwise. */
339c13b6
JB
5594
5595static void
b5ec771e
PA
5596add_nonlocal_symbols (struct obstack *obstackp,
5597 const lookup_name_info &lookup_name,
5598 domain_enum domain, int global)
339c13b6 5599{
40658b94 5600 struct match_data data;
339c13b6 5601
6475f2fe 5602 memset (&data, 0, sizeof data);
ccefe4c4 5603 data.obstackp = obstackp;
339c13b6 5604
b5ec771e
PA
5605 bool is_wild_match = lookup_name.ada ().wild_match_p ();
5606
199b4314
TT
5607 auto callback = [&] (struct block_symbol *bsym)
5608 {
5609 return aux_add_nonlocal_symbols (bsym, &data);
5610 };
5611
2030c079 5612 for (objfile *objfile : current_program_space->objfiles ())
40658b94
PH
5613 {
5614 data.objfile = objfile;
5615
b054970d
TT
5616 objfile->sf->qf->map_matching_symbols (objfile, lookup_name,
5617 domain, global, callback,
5618 (is_wild_match
5619 ? NULL : compare_names));
22cee43f 5620
b669c953 5621 for (compunit_symtab *cu : objfile->compunits ())
22cee43f
PMR
5622 {
5623 const struct block *global_block
5624 = BLOCKVECTOR_BLOCK (COMPUNIT_BLOCKVECTOR (cu), GLOBAL_BLOCK);
5625
b5ec771e
PA
5626 if (ada_add_block_renamings (obstackp, global_block, lookup_name,
5627 domain))
22cee43f
PMR
5628 data.found_sym = 1;
5629 }
40658b94
PH
5630 }
5631
5632 if (num_defns_collected (obstackp) == 0 && global && !is_wild_match)
5633 {
b5ec771e 5634 const char *name = ada_lookup_name (lookup_name);
e0802d59
TT
5635 std::string bracket_name = std::string ("<_ada_") + name + '>';
5636 lookup_name_info name1 (bracket_name, symbol_name_match_type::FULL);
b5ec771e 5637
2030c079 5638 for (objfile *objfile : current_program_space->objfiles ())
40658b94 5639 {
40658b94 5640 data.objfile = objfile;
b054970d 5641 objfile->sf->qf->map_matching_symbols (objfile, name1,
199b4314 5642 domain, global, callback,
b5ec771e 5643 compare_names);
40658b94
PH
5644 }
5645 }
339c13b6
JB
5646}
5647
b5ec771e
PA
5648/* Find symbols in DOMAIN matching LOOKUP_NAME, in BLOCK and, if
5649 FULL_SEARCH is non-zero, enclosing scope and in global scopes,
5650 returning the number of matches. Add these to OBSTACKP.
4eeaa230 5651
22cee43f
PMR
5652 When FULL_SEARCH is non-zero, any non-function/non-enumeral
5653 symbol match within the nest of blocks whose innermost member is BLOCK,
4c4b4cd2 5654 is the one match returned (no other matches in that or
d9680e73 5655 enclosing blocks is returned). If there are any matches in or
22cee43f 5656 surrounding BLOCK, then these alone are returned.
4eeaa230 5657
b5ec771e
PA
5658 Names prefixed with "standard__" are handled specially:
5659 "standard__" is first stripped off (by the lookup_name
5660 constructor), and only static and global symbols are searched.
14f9c5c9 5661
22cee43f
PMR
5662 If MADE_GLOBAL_LOOKUP_P is non-null, set it before return to whether we had
5663 to lookup global symbols. */
5664
5665static void
5666ada_add_all_symbols (struct obstack *obstackp,
5667 const struct block *block,
b5ec771e 5668 const lookup_name_info &lookup_name,
22cee43f
PMR
5669 domain_enum domain,
5670 int full_search,
5671 int *made_global_lookup_p)
14f9c5c9
AS
5672{
5673 struct symbol *sym;
14f9c5c9 5674
22cee43f
PMR
5675 if (made_global_lookup_p)
5676 *made_global_lookup_p = 0;
339c13b6
JB
5677
5678 /* Special case: If the user specifies a symbol name inside package
5679 Standard, do a non-wild matching of the symbol name without
5680 the "standard__" prefix. This was primarily introduced in order
5681 to allow the user to specifically access the standard exceptions
5682 using, for instance, Standard.Constraint_Error when Constraint_Error
5683 is ambiguous (due to the user defining its own Constraint_Error
5684 entity inside its program). */
b5ec771e
PA
5685 if (lookup_name.ada ().standard_p ())
5686 block = NULL;
4c4b4cd2 5687
339c13b6 5688 /* Check the non-global symbols. If we have ANY match, then we're done. */
14f9c5c9 5689
4eeaa230
DE
5690 if (block != NULL)
5691 {
5692 if (full_search)
b5ec771e 5693 ada_add_local_symbols (obstackp, lookup_name, block, domain);
4eeaa230
DE
5694 else
5695 {
5696 /* In the !full_search case we're are being called by
5697 ada_iterate_over_symbols, and we don't want to search
5698 superblocks. */
b5ec771e 5699 ada_add_block_symbols (obstackp, block, lookup_name, domain, NULL);
4eeaa230 5700 }
22cee43f
PMR
5701 if (num_defns_collected (obstackp) > 0 || !full_search)
5702 return;
4eeaa230 5703 }
d2e4a39e 5704
339c13b6
JB
5705 /* No non-global symbols found. Check our cache to see if we have
5706 already performed this search before. If we have, then return
5707 the same result. */
5708
b5ec771e
PA
5709 if (lookup_cached_symbol (ada_lookup_name (lookup_name),
5710 domain, &sym, &block))
4c4b4cd2
PH
5711 {
5712 if (sym != NULL)
b5ec771e 5713 add_defn_to_vec (obstackp, sym, block);
22cee43f 5714 return;
4c4b4cd2 5715 }
14f9c5c9 5716
22cee43f
PMR
5717 if (made_global_lookup_p)
5718 *made_global_lookup_p = 1;
b1eedac9 5719
339c13b6
JB
5720 /* Search symbols from all global blocks. */
5721
b5ec771e 5722 add_nonlocal_symbols (obstackp, lookup_name, domain, 1);
d2e4a39e 5723
4c4b4cd2 5724 /* Now add symbols from all per-file blocks if we've gotten no hits
339c13b6 5725 (not strictly correct, but perhaps better than an error). */
d2e4a39e 5726
22cee43f 5727 if (num_defns_collected (obstackp) == 0)
b5ec771e 5728 add_nonlocal_symbols (obstackp, lookup_name, domain, 0);
22cee43f
PMR
5729}
5730
b5ec771e
PA
5731/* Find symbols in DOMAIN matching LOOKUP_NAME, in BLOCK and, if FULL_SEARCH
5732 is non-zero, enclosing scope and in global scopes, returning the number of
22cee43f 5733 matches.
54d343a2
TT
5734 Fills *RESULTS with (SYM,BLOCK) tuples, indicating the symbols
5735 found and the blocks and symbol tables (if any) in which they were
5736 found.
22cee43f
PMR
5737
5738 When full_search is non-zero, any non-function/non-enumeral
5739 symbol match within the nest of blocks whose innermost member is BLOCK,
5740 is the one match returned (no other matches in that or
5741 enclosing blocks is returned). If there are any matches in or
5742 surrounding BLOCK, then these alone are returned.
5743
5744 Names prefixed with "standard__" are handled specially: "standard__"
5745 is first stripped off, and only static and global symbols are searched. */
5746
5747static int
b5ec771e
PA
5748ada_lookup_symbol_list_worker (const lookup_name_info &lookup_name,
5749 const struct block *block,
22cee43f 5750 domain_enum domain,
54d343a2 5751 std::vector<struct block_symbol> *results,
22cee43f
PMR
5752 int full_search)
5753{
22cee43f
PMR
5754 int syms_from_global_search;
5755 int ndefns;
ec6a20c2 5756 auto_obstack obstack;
22cee43f 5757
ec6a20c2 5758 ada_add_all_symbols (&obstack, block, lookup_name,
b5ec771e 5759 domain, full_search, &syms_from_global_search);
14f9c5c9 5760
ec6a20c2
JB
5761 ndefns = num_defns_collected (&obstack);
5762
54d343a2
TT
5763 struct block_symbol *base = defns_collected (&obstack, 1);
5764 for (int i = 0; i < ndefns; ++i)
5765 results->push_back (base[i]);
4c4b4cd2 5766
54d343a2 5767 ndefns = remove_extra_symbols (results);
4c4b4cd2 5768
b1eedac9 5769 if (ndefns == 0 && full_search && syms_from_global_search)
b5ec771e 5770 cache_symbol (ada_lookup_name (lookup_name), domain, NULL, NULL);
14f9c5c9 5771
b1eedac9 5772 if (ndefns == 1 && full_search && syms_from_global_search)
b5ec771e
PA
5773 cache_symbol (ada_lookup_name (lookup_name), domain,
5774 (*results)[0].symbol, (*results)[0].block);
14f9c5c9 5775
54d343a2 5776 ndefns = remove_irrelevant_renamings (results, block);
ec6a20c2 5777
14f9c5c9
AS
5778 return ndefns;
5779}
5780
b5ec771e 5781/* Find symbols in DOMAIN matching NAME, in BLOCK and enclosing scope and
54d343a2
TT
5782 in global scopes, returning the number of matches, and filling *RESULTS
5783 with (SYM,BLOCK) tuples.
ec6a20c2 5784
4eeaa230
DE
5785 See ada_lookup_symbol_list_worker for further details. */
5786
5787int
b5ec771e 5788ada_lookup_symbol_list (const char *name, const struct block *block,
54d343a2
TT
5789 domain_enum domain,
5790 std::vector<struct block_symbol> *results)
4eeaa230 5791{
b5ec771e
PA
5792 symbol_name_match_type name_match_type = name_match_type_from_name (name);
5793 lookup_name_info lookup_name (name, name_match_type);
5794
5795 return ada_lookup_symbol_list_worker (lookup_name, block, domain, results, 1);
4eeaa230
DE
5796}
5797
5798/* Implementation of the la_iterate_over_symbols method. */
5799
6969f124 5800static bool
14bc53a8 5801ada_iterate_over_symbols
b5ec771e
PA
5802 (const struct block *block, const lookup_name_info &name,
5803 domain_enum domain,
14bc53a8 5804 gdb::function_view<symbol_found_callback_ftype> callback)
4eeaa230
DE
5805{
5806 int ndefs, i;
54d343a2 5807 std::vector<struct block_symbol> results;
4eeaa230
DE
5808
5809 ndefs = ada_lookup_symbol_list_worker (name, block, domain, &results, 0);
ec6a20c2 5810
4eeaa230
DE
5811 for (i = 0; i < ndefs; ++i)
5812 {
7e41c8db 5813 if (!callback (&results[i]))
6969f124 5814 return false;
4eeaa230 5815 }
6969f124
TT
5816
5817 return true;
4eeaa230
DE
5818}
5819
4e5c77fe
JB
5820/* The result is as for ada_lookup_symbol_list with FULL_SEARCH set
5821 to 1, but choosing the first symbol found if there are multiple
5822 choices.
5823
5e2336be
JB
5824 The result is stored in *INFO, which must be non-NULL.
5825 If no match is found, INFO->SYM is set to NULL. */
4e5c77fe
JB
5826
5827void
5828ada_lookup_encoded_symbol (const char *name, const struct block *block,
fe978cb0 5829 domain_enum domain,
d12307c1 5830 struct block_symbol *info)
14f9c5c9 5831{
b5ec771e
PA
5832 /* Since we already have an encoded name, wrap it in '<>' to force a
5833 verbatim match. Otherwise, if the name happens to not look like
5834 an encoded name (because it doesn't include a "__"),
5835 ada_lookup_name_info would re-encode/fold it again, and that
5836 would e.g., incorrectly lowercase object renaming names like
5837 "R28b" -> "r28b". */
5838 std::string verbatim = std::string ("<") + name + '>';
5839
5e2336be 5840 gdb_assert (info != NULL);
65392b3e 5841 *info = ada_lookup_symbol (verbatim.c_str (), block, domain);
4e5c77fe 5842}
aeb5907d
JB
5843
5844/* Return a symbol in DOMAIN matching NAME, in BLOCK0 and enclosing
5845 scope and in global scopes, or NULL if none. NAME is folded and
5846 encoded first. Otherwise, the result is as for ada_lookup_symbol_list,
65392b3e 5847 choosing the first symbol if there are multiple choices. */
4e5c77fe 5848
d12307c1 5849struct block_symbol
aeb5907d 5850ada_lookup_symbol (const char *name, const struct block *block0,
65392b3e 5851 domain_enum domain)
aeb5907d 5852{
54d343a2 5853 std::vector<struct block_symbol> candidates;
f98fc17b 5854 int n_candidates;
f98fc17b
PA
5855
5856 n_candidates = ada_lookup_symbol_list (name, block0, domain, &candidates);
f98fc17b
PA
5857
5858 if (n_candidates == 0)
54d343a2 5859 return {};
f98fc17b
PA
5860
5861 block_symbol info = candidates[0];
5862 info.symbol = fixup_symbol_section (info.symbol, NULL);
d12307c1 5863 return info;
4c4b4cd2 5864}
14f9c5c9 5865
d12307c1 5866static struct block_symbol
f606139a
DE
5867ada_lookup_symbol_nonlocal (const struct language_defn *langdef,
5868 const char *name,
76a01679 5869 const struct block *block,
21b556f4 5870 const domain_enum domain)
4c4b4cd2 5871{
d12307c1 5872 struct block_symbol sym;
04dccad0 5873
65392b3e 5874 sym = ada_lookup_symbol (name, block_static_block (block), domain);
d12307c1 5875 if (sym.symbol != NULL)
04dccad0
JB
5876 return sym;
5877
5878 /* If we haven't found a match at this point, try the primitive
5879 types. In other languages, this search is performed before
5880 searching for global symbols in order to short-circuit that
5881 global-symbol search if it happens that the name corresponds
5882 to a primitive type. But we cannot do the same in Ada, because
5883 it is perfectly legitimate for a program to declare a type which
5884 has the same name as a standard type. If looking up a type in
5885 that situation, we have traditionally ignored the primitive type
5886 in favor of user-defined types. This is why, unlike most other
5887 languages, we search the primitive types this late and only after
5888 having searched the global symbols without success. */
5889
5890 if (domain == VAR_DOMAIN)
5891 {
5892 struct gdbarch *gdbarch;
5893
5894 if (block == NULL)
5895 gdbarch = target_gdbarch ();
5896 else
5897 gdbarch = block_gdbarch (block);
d12307c1
PMR
5898 sym.symbol = language_lookup_primitive_type_as_symbol (langdef, gdbarch, name);
5899 if (sym.symbol != NULL)
04dccad0
JB
5900 return sym;
5901 }
5902
6640a367 5903 return {};
14f9c5c9
AS
5904}
5905
5906
4c4b4cd2
PH
5907/* True iff STR is a possible encoded suffix of a normal Ada name
5908 that is to be ignored for matching purposes. Suffixes of parallel
5909 names (e.g., XVE) are not included here. Currently, the possible suffixes
5823c3ef 5910 are given by any of the regular expressions:
4c4b4cd2 5911
babe1480
JB
5912 [.$][0-9]+ [nested subprogram suffix, on platforms such as GNU/Linux]
5913 ___[0-9]+ [nested subprogram suffix, on platforms such as HP/UX]
9ac7f98e 5914 TKB [subprogram suffix for task bodies]
babe1480 5915 _E[0-9]+[bs]$ [protected object entry suffixes]
61ee279c 5916 (X[nb]*)?((\$|__)[0-9](_?[0-9]+)|___(JM|LJM|X([FDBUP].*|R[^T]?)))?$
babe1480
JB
5917
5918 Also, any leading "__[0-9]+" sequence is skipped before the suffix
5919 match is performed. This sequence is used to differentiate homonyms,
5920 is an optional part of a valid name suffix. */
4c4b4cd2 5921
14f9c5c9 5922static int
d2e4a39e 5923is_name_suffix (const char *str)
14f9c5c9
AS
5924{
5925 int k;
4c4b4cd2
PH
5926 const char *matching;
5927 const int len = strlen (str);
5928
babe1480
JB
5929 /* Skip optional leading __[0-9]+. */
5930
4c4b4cd2
PH
5931 if (len > 3 && str[0] == '_' && str[1] == '_' && isdigit (str[2]))
5932 {
babe1480
JB
5933 str += 3;
5934 while (isdigit (str[0]))
5935 str += 1;
4c4b4cd2 5936 }
babe1480
JB
5937
5938 /* [.$][0-9]+ */
4c4b4cd2 5939
babe1480 5940 if (str[0] == '.' || str[0] == '$')
4c4b4cd2 5941 {
babe1480 5942 matching = str + 1;
4c4b4cd2
PH
5943 while (isdigit (matching[0]))
5944 matching += 1;
5945 if (matching[0] == '\0')
5946 return 1;
5947 }
5948
5949 /* ___[0-9]+ */
babe1480 5950
4c4b4cd2
PH
5951 if (len > 3 && str[0] == '_' && str[1] == '_' && str[2] == '_')
5952 {
5953 matching = str + 3;
5954 while (isdigit (matching[0]))
5955 matching += 1;
5956 if (matching[0] == '\0')
5957 return 1;
5958 }
5959
9ac7f98e
JB
5960 /* "TKB" suffixes are used for subprograms implementing task bodies. */
5961
5962 if (strcmp (str, "TKB") == 0)
5963 return 1;
5964
529cad9c
PH
5965#if 0
5966 /* FIXME: brobecker/2005-09-23: Protected Object subprograms end
0963b4bd
MS
5967 with a N at the end. Unfortunately, the compiler uses the same
5968 convention for other internal types it creates. So treating
529cad9c 5969 all entity names that end with an "N" as a name suffix causes
0963b4bd
MS
5970 some regressions. For instance, consider the case of an enumerated
5971 type. To support the 'Image attribute, it creates an array whose
529cad9c
PH
5972 name ends with N.
5973 Having a single character like this as a suffix carrying some
0963b4bd 5974 information is a bit risky. Perhaps we should change the encoding
529cad9c
PH
5975 to be something like "_N" instead. In the meantime, do not do
5976 the following check. */
5977 /* Protected Object Subprograms */
5978 if (len == 1 && str [0] == 'N')
5979 return 1;
5980#endif
5981
5982 /* _E[0-9]+[bs]$ */
5983 if (len > 3 && str[0] == '_' && str [1] == 'E' && isdigit (str[2]))
5984 {
5985 matching = str + 3;
5986 while (isdigit (matching[0]))
5987 matching += 1;
5988 if ((matching[0] == 'b' || matching[0] == 's')
5989 && matching [1] == '\0')
5990 return 1;
5991 }
5992
4c4b4cd2
PH
5993 /* ??? We should not modify STR directly, as we are doing below. This
5994 is fine in this case, but may become problematic later if we find
5995 that this alternative did not work, and want to try matching
5996 another one from the begining of STR. Since we modified it, we
5997 won't be able to find the begining of the string anymore! */
14f9c5c9
AS
5998 if (str[0] == 'X')
5999 {
6000 str += 1;
d2e4a39e 6001 while (str[0] != '_' && str[0] != '\0')
4c4b4cd2
PH
6002 {
6003 if (str[0] != 'n' && str[0] != 'b')
6004 return 0;
6005 str += 1;
6006 }
14f9c5c9 6007 }
babe1480 6008
14f9c5c9
AS
6009 if (str[0] == '\000')
6010 return 1;
babe1480 6011
d2e4a39e 6012 if (str[0] == '_')
14f9c5c9
AS
6013 {
6014 if (str[1] != '_' || str[2] == '\000')
4c4b4cd2 6015 return 0;
d2e4a39e 6016 if (str[2] == '_')
4c4b4cd2 6017 {
61ee279c
PH
6018 if (strcmp (str + 3, "JM") == 0)
6019 return 1;
6020 /* FIXME: brobecker/2004-09-30: GNAT will soon stop using
6021 the LJM suffix in favor of the JM one. But we will
6022 still accept LJM as a valid suffix for a reasonable
6023 amount of time, just to allow ourselves to debug programs
6024 compiled using an older version of GNAT. */
4c4b4cd2
PH
6025 if (strcmp (str + 3, "LJM") == 0)
6026 return 1;
6027 if (str[3] != 'X')
6028 return 0;
1265e4aa
JB
6029 if (str[4] == 'F' || str[4] == 'D' || str[4] == 'B'
6030 || str[4] == 'U' || str[4] == 'P')
4c4b4cd2
PH
6031 return 1;
6032 if (str[4] == 'R' && str[5] != 'T')
6033 return 1;
6034 return 0;
6035 }
6036 if (!isdigit (str[2]))
6037 return 0;
6038 for (k = 3; str[k] != '\0'; k += 1)
6039 if (!isdigit (str[k]) && str[k] != '_')
6040 return 0;
14f9c5c9
AS
6041 return 1;
6042 }
4c4b4cd2 6043 if (str[0] == '$' && isdigit (str[1]))
14f9c5c9 6044 {
4c4b4cd2
PH
6045 for (k = 2; str[k] != '\0'; k += 1)
6046 if (!isdigit (str[k]) && str[k] != '_')
6047 return 0;
14f9c5c9
AS
6048 return 1;
6049 }
6050 return 0;
6051}
d2e4a39e 6052
aeb5907d
JB
6053/* Return non-zero if the string starting at NAME and ending before
6054 NAME_END contains no capital letters. */
529cad9c
PH
6055
6056static int
6057is_valid_name_for_wild_match (const char *name0)
6058{
f945dedf 6059 std::string decoded_name = ada_decode (name0);
529cad9c
PH
6060 int i;
6061
5823c3ef
JB
6062 /* If the decoded name starts with an angle bracket, it means that
6063 NAME0 does not follow the GNAT encoding format. It should then
6064 not be allowed as a possible wild match. */
6065 if (decoded_name[0] == '<')
6066 return 0;
6067
529cad9c
PH
6068 for (i=0; decoded_name[i] != '\0'; i++)
6069 if (isalpha (decoded_name[i]) && !islower (decoded_name[i]))
6070 return 0;
6071
6072 return 1;
6073}
6074
73589123
PH
6075/* Advance *NAMEP to next occurrence of TARGET0 in the string NAME0
6076 that could start a simple name. Assumes that *NAMEP points into
6077 the string beginning at NAME0. */
4c4b4cd2 6078
14f9c5c9 6079static int
73589123 6080advance_wild_match (const char **namep, const char *name0, int target0)
14f9c5c9 6081{
73589123 6082 const char *name = *namep;
5b4ee69b 6083
5823c3ef 6084 while (1)
14f9c5c9 6085 {
aa27d0b3 6086 int t0, t1;
73589123
PH
6087
6088 t0 = *name;
6089 if (t0 == '_')
6090 {
6091 t1 = name[1];
6092 if ((t1 >= 'a' && t1 <= 'z') || (t1 >= '0' && t1 <= '9'))
6093 {
6094 name += 1;
61012eef 6095 if (name == name0 + 5 && startswith (name0, "_ada"))
73589123
PH
6096 break;
6097 else
6098 name += 1;
6099 }
aa27d0b3
JB
6100 else if (t1 == '_' && ((name[2] >= 'a' && name[2] <= 'z')
6101 || name[2] == target0))
73589123
PH
6102 {
6103 name += 2;
6104 break;
6105 }
6106 else
6107 return 0;
6108 }
6109 else if ((t0 >= 'a' && t0 <= 'z') || (t0 >= '0' && t0 <= '9'))
6110 name += 1;
6111 else
5823c3ef 6112 return 0;
73589123
PH
6113 }
6114
6115 *namep = name;
6116 return 1;
6117}
6118
b5ec771e
PA
6119/* Return true iff NAME encodes a name of the form prefix.PATN.
6120 Ignores any informational suffixes of NAME (i.e., for which
6121 is_name_suffix is true). Assumes that PATN is a lower-cased Ada
6122 simple name. */
73589123 6123
b5ec771e 6124static bool
73589123
PH
6125wild_match (const char *name, const char *patn)
6126{
22e048c9 6127 const char *p;
73589123
PH
6128 const char *name0 = name;
6129
6130 while (1)
6131 {
6132 const char *match = name;
6133
6134 if (*name == *patn)
6135 {
6136 for (name += 1, p = patn + 1; *p != '\0'; name += 1, p += 1)
6137 if (*p != *name)
6138 break;
6139 if (*p == '\0' && is_name_suffix (name))
b5ec771e 6140 return match == name0 || is_valid_name_for_wild_match (name0);
73589123
PH
6141
6142 if (name[-1] == '_')
6143 name -= 1;
6144 }
6145 if (!advance_wild_match (&name, name0, *patn))
b5ec771e 6146 return false;
96d887e8 6147 }
96d887e8
PH
6148}
6149
b5ec771e
PA
6150/* Returns true iff symbol name SYM_NAME matches SEARCH_NAME, ignoring
6151 any trailing suffixes that encode debugging information or leading
6152 _ada_ on SYM_NAME (see is_name_suffix commentary for the debugging
6153 information that is ignored). */
40658b94 6154
b5ec771e 6155static bool
c4d840bd
PH
6156full_match (const char *sym_name, const char *search_name)
6157{
b5ec771e
PA
6158 size_t search_name_len = strlen (search_name);
6159
6160 if (strncmp (sym_name, search_name, search_name_len) == 0
6161 && is_name_suffix (sym_name + search_name_len))
6162 return true;
6163
6164 if (startswith (sym_name, "_ada_")
6165 && strncmp (sym_name + 5, search_name, search_name_len) == 0
6166 && is_name_suffix (sym_name + search_name_len + 5))
6167 return true;
c4d840bd 6168
b5ec771e
PA
6169 return false;
6170}
c4d840bd 6171
b5ec771e
PA
6172/* Add symbols from BLOCK matching LOOKUP_NAME in DOMAIN to vector
6173 *defn_symbols, updating the list of symbols in OBSTACKP (if
6174 necessary). OBJFILE is the section containing BLOCK. */
96d887e8
PH
6175
6176static void
6177ada_add_block_symbols (struct obstack *obstackp,
b5ec771e
PA
6178 const struct block *block,
6179 const lookup_name_info &lookup_name,
6180 domain_enum domain, struct objfile *objfile)
96d887e8 6181{
8157b174 6182 struct block_iterator iter;
96d887e8
PH
6183 /* A matching argument symbol, if any. */
6184 struct symbol *arg_sym;
6185 /* Set true when we find a matching non-argument symbol. */
6186 int found_sym;
6187 struct symbol *sym;
6188
6189 arg_sym = NULL;
6190 found_sym = 0;
b5ec771e
PA
6191 for (sym = block_iter_match_first (block, lookup_name, &iter);
6192 sym != NULL;
6193 sym = block_iter_match_next (lookup_name, &iter))
96d887e8 6194 {
c1b5c1eb 6195 if (symbol_matches_domain (sym->language (), SYMBOL_DOMAIN (sym), domain))
b5ec771e
PA
6196 {
6197 if (SYMBOL_CLASS (sym) != LOC_UNRESOLVED)
6198 {
6199 if (SYMBOL_IS_ARGUMENT (sym))
6200 arg_sym = sym;
6201 else
6202 {
6203 found_sym = 1;
6204 add_defn_to_vec (obstackp,
6205 fixup_symbol_section (sym, objfile),
6206 block);
6207 }
6208 }
6209 }
96d887e8
PH
6210 }
6211
22cee43f
PMR
6212 /* Handle renamings. */
6213
b5ec771e 6214 if (ada_add_block_renamings (obstackp, block, lookup_name, domain))
22cee43f
PMR
6215 found_sym = 1;
6216
96d887e8
PH
6217 if (!found_sym && arg_sym != NULL)
6218 {
76a01679
JB
6219 add_defn_to_vec (obstackp,
6220 fixup_symbol_section (arg_sym, objfile),
2570f2b7 6221 block);
96d887e8
PH
6222 }
6223
b5ec771e 6224 if (!lookup_name.ada ().wild_match_p ())
96d887e8
PH
6225 {
6226 arg_sym = NULL;
6227 found_sym = 0;
b5ec771e
PA
6228 const std::string &ada_lookup_name = lookup_name.ada ().lookup_name ();
6229 const char *name = ada_lookup_name.c_str ();
6230 size_t name_len = ada_lookup_name.size ();
96d887e8
PH
6231
6232 ALL_BLOCK_SYMBOLS (block, iter, sym)
76a01679 6233 {
c1b5c1eb 6234 if (symbol_matches_domain (sym->language (),
4186eb54 6235 SYMBOL_DOMAIN (sym), domain))
76a01679
JB
6236 {
6237 int cmp;
6238
987012b8 6239 cmp = (int) '_' - (int) sym->linkage_name ()[0];
76a01679
JB
6240 if (cmp == 0)
6241 {
987012b8 6242 cmp = !startswith (sym->linkage_name (), "_ada_");
76a01679 6243 if (cmp == 0)
987012b8 6244 cmp = strncmp (name, sym->linkage_name () + 5,
76a01679
JB
6245 name_len);
6246 }
6247
6248 if (cmp == 0
987012b8 6249 && is_name_suffix (sym->linkage_name () + name_len + 5))
76a01679 6250 {
2a2d4dc3
AS
6251 if (SYMBOL_CLASS (sym) != LOC_UNRESOLVED)
6252 {
6253 if (SYMBOL_IS_ARGUMENT (sym))
6254 arg_sym = sym;
6255 else
6256 {
6257 found_sym = 1;
6258 add_defn_to_vec (obstackp,
6259 fixup_symbol_section (sym, objfile),
6260 block);
6261 }
6262 }
76a01679
JB
6263 }
6264 }
76a01679 6265 }
96d887e8
PH
6266
6267 /* NOTE: This really shouldn't be needed for _ada_ symbols.
6268 They aren't parameters, right? */
6269 if (!found_sym && arg_sym != NULL)
6270 {
6271 add_defn_to_vec (obstackp,
76a01679 6272 fixup_symbol_section (arg_sym, objfile),
2570f2b7 6273 block);
96d887e8
PH
6274 }
6275 }
6276}
6277\f
41d27058
JB
6278
6279 /* Symbol Completion */
6280
b5ec771e 6281/* See symtab.h. */
41d27058 6282
b5ec771e
PA
6283bool
6284ada_lookup_name_info::matches
6285 (const char *sym_name,
6286 symbol_name_match_type match_type,
a207cff2 6287 completion_match_result *comp_match_res) const
41d27058 6288{
b5ec771e
PA
6289 bool match = false;
6290 const char *text = m_encoded_name.c_str ();
6291 size_t text_len = m_encoded_name.size ();
41d27058
JB
6292
6293 /* First, test against the fully qualified name of the symbol. */
6294
6295 if (strncmp (sym_name, text, text_len) == 0)
b5ec771e 6296 match = true;
41d27058 6297
f945dedf 6298 std::string decoded_name = ada_decode (sym_name);
b5ec771e 6299 if (match && !m_encoded_p)
41d27058
JB
6300 {
6301 /* One needed check before declaring a positive match is to verify
6302 that iff we are doing a verbatim match, the decoded version
6303 of the symbol name starts with '<'. Otherwise, this symbol name
6304 is not a suitable completion. */
41d27058 6305
f945dedf 6306 bool has_angle_bracket = (decoded_name[0] == '<');
b5ec771e 6307 match = (has_angle_bracket == m_verbatim_p);
41d27058
JB
6308 }
6309
b5ec771e 6310 if (match && !m_verbatim_p)
41d27058
JB
6311 {
6312 /* When doing non-verbatim match, another check that needs to
6313 be done is to verify that the potentially matching symbol name
6314 does not include capital letters, because the ada-mode would
6315 not be able to understand these symbol names without the
6316 angle bracket notation. */
6317 const char *tmp;
6318
6319 for (tmp = sym_name; *tmp != '\0' && !isupper (*tmp); tmp++);
6320 if (*tmp != '\0')
b5ec771e 6321 match = false;
41d27058
JB
6322 }
6323
6324 /* Second: Try wild matching... */
6325
b5ec771e 6326 if (!match && m_wild_match_p)
41d27058
JB
6327 {
6328 /* Since we are doing wild matching, this means that TEXT
6329 may represent an unqualified symbol name. We therefore must
6330 also compare TEXT against the unqualified name of the symbol. */
f945dedf 6331 sym_name = ada_unqualified_name (decoded_name.c_str ());
41d27058
JB
6332
6333 if (strncmp (sym_name, text, text_len) == 0)
b5ec771e 6334 match = true;
41d27058
JB
6335 }
6336
b5ec771e 6337 /* Finally: If we found a match, prepare the result to return. */
41d27058
JB
6338
6339 if (!match)
b5ec771e 6340 return false;
41d27058 6341
a207cff2 6342 if (comp_match_res != NULL)
b5ec771e 6343 {
a207cff2 6344 std::string &match_str = comp_match_res->match.storage ();
41d27058 6345
b5ec771e 6346 if (!m_encoded_p)
a207cff2 6347 match_str = ada_decode (sym_name);
b5ec771e
PA
6348 else
6349 {
6350 if (m_verbatim_p)
6351 match_str = add_angle_brackets (sym_name);
6352 else
6353 match_str = sym_name;
41d27058 6354
b5ec771e 6355 }
a207cff2
PA
6356
6357 comp_match_res->set_match (match_str.c_str ());
41d27058
JB
6358 }
6359
b5ec771e 6360 return true;
41d27058
JB
6361}
6362
b5ec771e 6363/* Add the list of possible symbol names completing TEXT to TRACKER.
eb3ff9a5 6364 WORD is the entire command on which completion is made. */
41d27058 6365
eb3ff9a5
PA
6366static void
6367ada_collect_symbol_completion_matches (completion_tracker &tracker,
c6756f62 6368 complete_symbol_mode mode,
b5ec771e
PA
6369 symbol_name_match_type name_match_type,
6370 const char *text, const char *word,
eb3ff9a5 6371 enum type_code code)
41d27058 6372{
41d27058 6373 struct symbol *sym;
3977b71f 6374 const struct block *b, *surrounding_static_block = 0;
8157b174 6375 struct block_iterator iter;
41d27058 6376
2f68a895
TT
6377 gdb_assert (code == TYPE_CODE_UNDEF);
6378
1b026119 6379 lookup_name_info lookup_name (text, name_match_type, true);
41d27058
JB
6380
6381 /* First, look at the partial symtab symbols. */
14bc53a8 6382 expand_symtabs_matching (NULL,
b5ec771e
PA
6383 lookup_name,
6384 NULL,
14bc53a8
PA
6385 NULL,
6386 ALL_DOMAIN);
41d27058
JB
6387
6388 /* At this point scan through the misc symbol vectors and add each
6389 symbol you find to the list. Eventually we want to ignore
6390 anything that isn't a text symbol (everything else will be
6391 handled by the psymtab code above). */
6392
2030c079 6393 for (objfile *objfile : current_program_space->objfiles ())
5325b9bf 6394 {
7932255d 6395 for (minimal_symbol *msymbol : objfile->msymbols ())
5325b9bf
TT
6396 {
6397 QUIT;
6398
6399 if (completion_skip_symbol (mode, msymbol))
6400 continue;
6401
c1b5c1eb 6402 language symbol_language = msymbol->language ();
5325b9bf
TT
6403
6404 /* Ada minimal symbols won't have their language set to Ada. If
6405 we let completion_list_add_name compare using the
6406 default/C-like matcher, then when completing e.g., symbols in a
6407 package named "pck", we'd match internal Ada symbols like
6408 "pckS", which are invalid in an Ada expression, unless you wrap
6409 them in '<' '>' to request a verbatim match.
6410
6411 Unfortunately, some Ada encoded names successfully demangle as
6412 C++ symbols (using an old mangling scheme), such as "name__2Xn"
6413 -> "Xn::name(void)" and thus some Ada minimal symbols end up
6414 with the wrong language set. Paper over that issue here. */
6415 if (symbol_language == language_auto
6416 || symbol_language == language_cplus)
6417 symbol_language = language_ada;
6418
6419 completion_list_add_name (tracker,
6420 symbol_language,
c9d95fa3 6421 msymbol->linkage_name (),
5325b9bf
TT
6422 lookup_name, text, word);
6423 }
6424 }
41d27058
JB
6425
6426 /* Search upwards from currently selected frame (so that we can
6427 complete on local vars. */
6428
6429 for (b = get_selected_block (0); b != NULL; b = BLOCK_SUPERBLOCK (b))
6430 {
6431 if (!BLOCK_SUPERBLOCK (b))
6432 surrounding_static_block = b; /* For elmin of dups */
6433
6434 ALL_BLOCK_SYMBOLS (b, iter, sym)
6435 {
f9d67a22
PA
6436 if (completion_skip_symbol (mode, sym))
6437 continue;
6438
b5ec771e 6439 completion_list_add_name (tracker,
c1b5c1eb 6440 sym->language (),
987012b8 6441 sym->linkage_name (),
1b026119 6442 lookup_name, text, word);
41d27058
JB
6443 }
6444 }
6445
6446 /* Go through the symtabs and check the externs and statics for
43f3e411 6447 symbols which match. */
41d27058 6448
2030c079 6449 for (objfile *objfile : current_program_space->objfiles ())
41d27058 6450 {
b669c953 6451 for (compunit_symtab *s : objfile->compunits ())
d8aeb77f
TT
6452 {
6453 QUIT;
6454 b = BLOCKVECTOR_BLOCK (COMPUNIT_BLOCKVECTOR (s), GLOBAL_BLOCK);
6455 ALL_BLOCK_SYMBOLS (b, iter, sym)
6456 {
6457 if (completion_skip_symbol (mode, sym))
6458 continue;
f9d67a22 6459
d8aeb77f 6460 completion_list_add_name (tracker,
c1b5c1eb 6461 sym->language (),
987012b8 6462 sym->linkage_name (),
d8aeb77f
TT
6463 lookup_name, text, word);
6464 }
6465 }
41d27058 6466 }
41d27058 6467
2030c079 6468 for (objfile *objfile : current_program_space->objfiles ())
d8aeb77f 6469 {
b669c953 6470 for (compunit_symtab *s : objfile->compunits ())
d8aeb77f
TT
6471 {
6472 QUIT;
6473 b = BLOCKVECTOR_BLOCK (COMPUNIT_BLOCKVECTOR (s), STATIC_BLOCK);
6474 /* Don't do this block twice. */
6475 if (b == surrounding_static_block)
6476 continue;
6477 ALL_BLOCK_SYMBOLS (b, iter, sym)
6478 {
6479 if (completion_skip_symbol (mode, sym))
6480 continue;
f9d67a22 6481
d8aeb77f 6482 completion_list_add_name (tracker,
c1b5c1eb 6483 sym->language (),
987012b8 6484 sym->linkage_name (),
d8aeb77f
TT
6485 lookup_name, text, word);
6486 }
6487 }
41d27058 6488 }
41d27058
JB
6489}
6490
963a6417 6491 /* Field Access */
96d887e8 6492
73fb9985
JB
6493/* Return non-zero if TYPE is a pointer to the GNAT dispatch table used
6494 for tagged types. */
6495
6496static int
6497ada_is_dispatch_table_ptr_type (struct type *type)
6498{
0d5cff50 6499 const char *name;
73fb9985 6500
78134374 6501 if (type->code () != TYPE_CODE_PTR)
73fb9985
JB
6502 return 0;
6503
7d93a1e0 6504 name = TYPE_TARGET_TYPE (type)->name ();
73fb9985
JB
6505 if (name == NULL)
6506 return 0;
6507
6508 return (strcmp (name, "ada__tags__dispatch_table") == 0);
6509}
6510
ac4a2da4
JG
6511/* Return non-zero if TYPE is an interface tag. */
6512
6513static int
6514ada_is_interface_tag (struct type *type)
6515{
7d93a1e0 6516 const char *name = type->name ();
ac4a2da4
JG
6517
6518 if (name == NULL)
6519 return 0;
6520
6521 return (strcmp (name, "ada__tags__interface_tag") == 0);
6522}
6523
963a6417
PH
6524/* True if field number FIELD_NUM in struct or union type TYPE is supposed
6525 to be invisible to users. */
96d887e8 6526
963a6417
PH
6527int
6528ada_is_ignored_field (struct type *type, int field_num)
96d887e8 6529{
963a6417
PH
6530 if (field_num < 0 || field_num > TYPE_NFIELDS (type))
6531 return 1;
ffde82bf 6532
73fb9985
JB
6533 /* Check the name of that field. */
6534 {
6535 const char *name = TYPE_FIELD_NAME (type, field_num);
6536
6537 /* Anonymous field names should not be printed.
6538 brobecker/2007-02-20: I don't think this can actually happen
30baf67b 6539 but we don't want to print the value of anonymous fields anyway. */
73fb9985
JB
6540 if (name == NULL)
6541 return 1;
6542
ffde82bf
JB
6543 /* Normally, fields whose name start with an underscore ("_")
6544 are fields that have been internally generated by the compiler,
6545 and thus should not be printed. The "_parent" field is special,
6546 however: This is a field internally generated by the compiler
6547 for tagged types, and it contains the components inherited from
6548 the parent type. This field should not be printed as is, but
6549 should not be ignored either. */
61012eef 6550 if (name[0] == '_' && !startswith (name, "_parent"))
73fb9985
JB
6551 return 1;
6552 }
6553
ac4a2da4
JG
6554 /* If this is the dispatch table of a tagged type or an interface tag,
6555 then ignore. */
73fb9985 6556 if (ada_is_tagged_type (type, 1)
ac4a2da4
JG
6557 && (ada_is_dispatch_table_ptr_type (TYPE_FIELD_TYPE (type, field_num))
6558 || ada_is_interface_tag (TYPE_FIELD_TYPE (type, field_num))))
73fb9985
JB
6559 return 1;
6560
6561 /* Not a special field, so it should not be ignored. */
6562 return 0;
963a6417 6563}
96d887e8 6564
963a6417 6565/* True iff TYPE has a tag field. If REFOK, then TYPE may also be a
0963b4bd 6566 pointer or reference type whose ultimate target has a tag field. */
96d887e8 6567
963a6417
PH
6568int
6569ada_is_tagged_type (struct type *type, int refok)
6570{
988f6b3d 6571 return (ada_lookup_struct_elt_type (type, "_tag", refok, 1) != NULL);
963a6417 6572}
96d887e8 6573
963a6417 6574/* True iff TYPE represents the type of X'Tag */
96d887e8 6575
963a6417
PH
6576int
6577ada_is_tag_type (struct type *type)
6578{
460efde1
JB
6579 type = ada_check_typedef (type);
6580
78134374 6581 if (type == NULL || type->code () != TYPE_CODE_PTR)
963a6417
PH
6582 return 0;
6583 else
96d887e8 6584 {
963a6417 6585 const char *name = ada_type_name (TYPE_TARGET_TYPE (type));
5b4ee69b 6586
963a6417
PH
6587 return (name != NULL
6588 && strcmp (name, "ada__tags__dispatch_table") == 0);
96d887e8 6589 }
96d887e8
PH
6590}
6591
963a6417 6592/* The type of the tag on VAL. */
76a01679 6593
de93309a 6594static struct type *
963a6417 6595ada_tag_type (struct value *val)
96d887e8 6596{
988f6b3d 6597 return ada_lookup_struct_elt_type (value_type (val), "_tag", 1, 0);
963a6417 6598}
96d887e8 6599
b50d69b5
JG
6600/* Return 1 if TAG follows the old scheme for Ada tags (used for Ada 95,
6601 retired at Ada 05). */
6602
6603static int
6604is_ada95_tag (struct value *tag)
6605{
6606 return ada_value_struct_elt (tag, "tsd", 1) != NULL;
6607}
6608
963a6417 6609/* The value of the tag on VAL. */
96d887e8 6610
de93309a 6611static struct value *
963a6417
PH
6612ada_value_tag (struct value *val)
6613{
03ee6b2e 6614 return ada_value_struct_elt (val, "_tag", 0);
96d887e8
PH
6615}
6616
963a6417
PH
6617/* The value of the tag on the object of type TYPE whose contents are
6618 saved at VALADDR, if it is non-null, or is at memory address
0963b4bd 6619 ADDRESS. */
96d887e8 6620
963a6417 6621static struct value *
10a2c479 6622value_tag_from_contents_and_address (struct type *type,
fc1a4b47 6623 const gdb_byte *valaddr,
963a6417 6624 CORE_ADDR address)
96d887e8 6625{
b5385fc0 6626 int tag_byte_offset;
963a6417 6627 struct type *tag_type;
5b4ee69b 6628
963a6417 6629 if (find_struct_field ("_tag", type, 0, &tag_type, &tag_byte_offset,
52ce6436 6630 NULL, NULL, NULL))
96d887e8 6631 {
fc1a4b47 6632 const gdb_byte *valaddr1 = ((valaddr == NULL)
10a2c479
AC
6633 ? NULL
6634 : valaddr + tag_byte_offset);
963a6417 6635 CORE_ADDR address1 = (address == 0) ? 0 : address + tag_byte_offset;
96d887e8 6636
963a6417 6637 return value_from_contents_and_address (tag_type, valaddr1, address1);
96d887e8 6638 }
963a6417
PH
6639 return NULL;
6640}
96d887e8 6641
963a6417
PH
6642static struct type *
6643type_from_tag (struct value *tag)
6644{
6645 const char *type_name = ada_tag_name (tag);
5b4ee69b 6646
963a6417
PH
6647 if (type_name != NULL)
6648 return ada_find_any_type (ada_encode (type_name));
6649 return NULL;
6650}
96d887e8 6651
b50d69b5
JG
6652/* Given a value OBJ of a tagged type, return a value of this
6653 type at the base address of the object. The base address, as
6654 defined in Ada.Tags, it is the address of the primary tag of
6655 the object, and therefore where the field values of its full
6656 view can be fetched. */
6657
6658struct value *
6659ada_tag_value_at_base_address (struct value *obj)
6660{
b50d69b5
JG
6661 struct value *val;
6662 LONGEST offset_to_top = 0;
6663 struct type *ptr_type, *obj_type;
6664 struct value *tag;
6665 CORE_ADDR base_address;
6666
6667 obj_type = value_type (obj);
6668
6669 /* It is the responsability of the caller to deref pointers. */
6670
78134374 6671 if (obj_type->code () == TYPE_CODE_PTR || obj_type->code () == TYPE_CODE_REF)
b50d69b5
JG
6672 return obj;
6673
6674 tag = ada_value_tag (obj);
6675 if (!tag)
6676 return obj;
6677
6678 /* Base addresses only appeared with Ada 05 and multiple inheritance. */
6679
6680 if (is_ada95_tag (tag))
6681 return obj;
6682
08f49010
XR
6683 ptr_type = language_lookup_primitive_type
6684 (language_def (language_ada), target_gdbarch(), "storage_offset");
b50d69b5
JG
6685 ptr_type = lookup_pointer_type (ptr_type);
6686 val = value_cast (ptr_type, tag);
6687 if (!val)
6688 return obj;
6689
6690 /* It is perfectly possible that an exception be raised while
6691 trying to determine the base address, just like for the tag;
6692 see ada_tag_name for more details. We do not print the error
6693 message for the same reason. */
6694
a70b8144 6695 try
b50d69b5
JG
6696 {
6697 offset_to_top = value_as_long (value_ind (value_ptradd (val, -2)));
6698 }
6699
230d2906 6700 catch (const gdb_exception_error &e)
492d29ea
PA
6701 {
6702 return obj;
6703 }
b50d69b5
JG
6704
6705 /* If offset is null, nothing to do. */
6706
6707 if (offset_to_top == 0)
6708 return obj;
6709
6710 /* -1 is a special case in Ada.Tags; however, what should be done
6711 is not quite clear from the documentation. So do nothing for
6712 now. */
6713
6714 if (offset_to_top == -1)
6715 return obj;
6716
08f49010
XR
6717 /* OFFSET_TO_TOP used to be a positive value to be subtracted
6718 from the base address. This was however incompatible with
6719 C++ dispatch table: C++ uses a *negative* value to *add*
6720 to the base address. Ada's convention has therefore been
6721 changed in GNAT 19.0w 20171023: since then, C++ and Ada
6722 use the same convention. Here, we support both cases by
6723 checking the sign of OFFSET_TO_TOP. */
6724
6725 if (offset_to_top > 0)
6726 offset_to_top = -offset_to_top;
6727
6728 base_address = value_address (obj) + offset_to_top;
b50d69b5
JG
6729 tag = value_tag_from_contents_and_address (obj_type, NULL, base_address);
6730
6731 /* Make sure that we have a proper tag at the new address.
6732 Otherwise, offset_to_top is bogus (which can happen when
6733 the object is not initialized yet). */
6734
6735 if (!tag)
6736 return obj;
6737
6738 obj_type = type_from_tag (tag);
6739
6740 if (!obj_type)
6741 return obj;
6742
6743 return value_from_contents_and_address (obj_type, NULL, base_address);
6744}
6745
1b611343
JB
6746/* Return the "ada__tags__type_specific_data" type. */
6747
6748static struct type *
6749ada_get_tsd_type (struct inferior *inf)
963a6417 6750{
1b611343 6751 struct ada_inferior_data *data = get_ada_inferior_data (inf);
4c4b4cd2 6752
1b611343
JB
6753 if (data->tsd_type == 0)
6754 data->tsd_type = ada_find_any_type ("ada__tags__type_specific_data");
6755 return data->tsd_type;
6756}
529cad9c 6757
1b611343
JB
6758/* Return the TSD (type-specific data) associated to the given TAG.
6759 TAG is assumed to be the tag of a tagged-type entity.
529cad9c 6760
1b611343 6761 May return NULL if we are unable to get the TSD. */
4c4b4cd2 6762
1b611343
JB
6763static struct value *
6764ada_get_tsd_from_tag (struct value *tag)
4c4b4cd2 6765{
4c4b4cd2 6766 struct value *val;
1b611343 6767 struct type *type;
5b4ee69b 6768
1b611343
JB
6769 /* First option: The TSD is simply stored as a field of our TAG.
6770 Only older versions of GNAT would use this format, but we have
6771 to test it first, because there are no visible markers for
6772 the current approach except the absence of that field. */
529cad9c 6773
1b611343
JB
6774 val = ada_value_struct_elt (tag, "tsd", 1);
6775 if (val)
6776 return val;
e802dbe0 6777
1b611343
JB
6778 /* Try the second representation for the dispatch table (in which
6779 there is no explicit 'tsd' field in the referent of the tag pointer,
6780 and instead the tsd pointer is stored just before the dispatch
6781 table. */
e802dbe0 6782
1b611343
JB
6783 type = ada_get_tsd_type (current_inferior());
6784 if (type == NULL)
6785 return NULL;
6786 type = lookup_pointer_type (lookup_pointer_type (type));
6787 val = value_cast (type, tag);
6788 if (val == NULL)
6789 return NULL;
6790 return value_ind (value_ptradd (val, -1));
e802dbe0
JB
6791}
6792
1b611343
JB
6793/* Given the TSD of a tag (type-specific data), return a string
6794 containing the name of the associated type.
6795
6796 The returned value is good until the next call. May return NULL
6797 if we are unable to determine the tag name. */
6798
6799static char *
6800ada_tag_name_from_tsd (struct value *tsd)
529cad9c 6801{
529cad9c
PH
6802 static char name[1024];
6803 char *p;
1b611343 6804 struct value *val;
529cad9c 6805
1b611343 6806 val = ada_value_struct_elt (tsd, "expanded_name", 1);
4c4b4cd2 6807 if (val == NULL)
1b611343 6808 return NULL;
4c4b4cd2
PH
6809 read_memory_string (value_as_address (val), name, sizeof (name) - 1);
6810 for (p = name; *p != '\0'; p += 1)
6811 if (isalpha (*p))
6812 *p = tolower (*p);
1b611343 6813 return name;
4c4b4cd2
PH
6814}
6815
6816/* The type name of the dynamic type denoted by the 'tag value TAG, as
1b611343
JB
6817 a C string.
6818
6819 Return NULL if the TAG is not an Ada tag, or if we were unable to
6820 determine the name of that tag. The result is good until the next
6821 call. */
4c4b4cd2
PH
6822
6823const char *
6824ada_tag_name (struct value *tag)
6825{
1b611343 6826 char *name = NULL;
5b4ee69b 6827
df407dfe 6828 if (!ada_is_tag_type (value_type (tag)))
4c4b4cd2 6829 return NULL;
1b611343
JB
6830
6831 /* It is perfectly possible that an exception be raised while trying
6832 to determine the TAG's name, even under normal circumstances:
6833 The associated variable may be uninitialized or corrupted, for
6834 instance. We do not let any exception propagate past this point.
6835 instead we return NULL.
6836
6837 We also do not print the error message either (which often is very
6838 low-level (Eg: "Cannot read memory at 0x[...]"), but instead let
6839 the caller print a more meaningful message if necessary. */
a70b8144 6840 try
1b611343
JB
6841 {
6842 struct value *tsd = ada_get_tsd_from_tag (tag);
6843
6844 if (tsd != NULL)
6845 name = ada_tag_name_from_tsd (tsd);
6846 }
230d2906 6847 catch (const gdb_exception_error &e)
492d29ea
PA
6848 {
6849 }
1b611343
JB
6850
6851 return name;
4c4b4cd2
PH
6852}
6853
6854/* The parent type of TYPE, or NULL if none. */
14f9c5c9 6855
d2e4a39e 6856struct type *
ebf56fd3 6857ada_parent_type (struct type *type)
14f9c5c9
AS
6858{
6859 int i;
6860
61ee279c 6861 type = ada_check_typedef (type);
14f9c5c9 6862
78134374 6863 if (type == NULL || type->code () != TYPE_CODE_STRUCT)
14f9c5c9
AS
6864 return NULL;
6865
6866 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
6867 if (ada_is_parent_field (type, i))
0c1f74cf
JB
6868 {
6869 struct type *parent_type = TYPE_FIELD_TYPE (type, i);
6870
6871 /* If the _parent field is a pointer, then dereference it. */
78134374 6872 if (parent_type->code () == TYPE_CODE_PTR)
0c1f74cf
JB
6873 parent_type = TYPE_TARGET_TYPE (parent_type);
6874 /* If there is a parallel XVS type, get the actual base type. */
6875 parent_type = ada_get_base_type (parent_type);
6876
6877 return ada_check_typedef (parent_type);
6878 }
14f9c5c9
AS
6879
6880 return NULL;
6881}
6882
4c4b4cd2
PH
6883/* True iff field number FIELD_NUM of structure type TYPE contains the
6884 parent-type (inherited) fields of a derived type. Assumes TYPE is
6885 a structure type with at least FIELD_NUM+1 fields. */
14f9c5c9
AS
6886
6887int
ebf56fd3 6888ada_is_parent_field (struct type *type, int field_num)
14f9c5c9 6889{
61ee279c 6890 const char *name = TYPE_FIELD_NAME (ada_check_typedef (type), field_num);
5b4ee69b 6891
4c4b4cd2 6892 return (name != NULL
61012eef
GB
6893 && (startswith (name, "PARENT")
6894 || startswith (name, "_parent")));
14f9c5c9
AS
6895}
6896
4c4b4cd2 6897/* True iff field number FIELD_NUM of structure type TYPE is a
14f9c5c9 6898 transparent wrapper field (which should be silently traversed when doing
4c4b4cd2 6899 field selection and flattened when printing). Assumes TYPE is a
14f9c5c9 6900 structure type with at least FIELD_NUM+1 fields. Such fields are always
4c4b4cd2 6901 structures. */
14f9c5c9
AS
6902
6903int
ebf56fd3 6904ada_is_wrapper_field (struct type *type, int field_num)
14f9c5c9 6905{
d2e4a39e 6906 const char *name = TYPE_FIELD_NAME (type, field_num);
5b4ee69b 6907
dddc0e16
JB
6908 if (name != NULL && strcmp (name, "RETVAL") == 0)
6909 {
6910 /* This happens in functions with "out" or "in out" parameters
6911 which are passed by copy. For such functions, GNAT describes
6912 the function's return type as being a struct where the return
6913 value is in a field called RETVAL, and where the other "out"
6914 or "in out" parameters are fields of that struct. This is not
6915 a wrapper. */
6916 return 0;
6917 }
6918
d2e4a39e 6919 return (name != NULL
61012eef 6920 && (startswith (name, "PARENT")
4c4b4cd2 6921 || strcmp (name, "REP") == 0
61012eef 6922 || startswith (name, "_parent")
4c4b4cd2 6923 || name[0] == 'S' || name[0] == 'R' || name[0] == 'O'));
14f9c5c9
AS
6924}
6925
4c4b4cd2
PH
6926/* True iff field number FIELD_NUM of structure or union type TYPE
6927 is a variant wrapper. Assumes TYPE is a structure type with at least
6928 FIELD_NUM+1 fields. */
14f9c5c9
AS
6929
6930int
ebf56fd3 6931ada_is_variant_part (struct type *type, int field_num)
14f9c5c9 6932{
8ecb59f8
TT
6933 /* Only Ada types are eligible. */
6934 if (!ADA_TYPE_P (type))
6935 return 0;
6936
d2e4a39e 6937 struct type *field_type = TYPE_FIELD_TYPE (type, field_num);
5b4ee69b 6938
78134374
SM
6939 return (field_type->code () == TYPE_CODE_UNION
6940 || (is_dynamic_field (type, field_num)
6941 && (TYPE_TARGET_TYPE (field_type)->code ()
c3e5cd34 6942 == TYPE_CODE_UNION)));
14f9c5c9
AS
6943}
6944
6945/* Assuming that VAR_TYPE is a variant wrapper (type of the variant part)
4c4b4cd2 6946 whose discriminants are contained in the record type OUTER_TYPE,
7c964f07
UW
6947 returns the type of the controlling discriminant for the variant.
6948 May return NULL if the type could not be found. */
14f9c5c9 6949
d2e4a39e 6950struct type *
ebf56fd3 6951ada_variant_discrim_type (struct type *var_type, struct type *outer_type)
14f9c5c9 6952{
a121b7c1 6953 const char *name = ada_variant_discrim_name (var_type);
5b4ee69b 6954
988f6b3d 6955 return ada_lookup_struct_elt_type (outer_type, name, 1, 1);
14f9c5c9
AS
6956}
6957
4c4b4cd2 6958/* Assuming that TYPE is the type of a variant wrapper, and FIELD_NUM is a
14f9c5c9 6959 valid field number within it, returns 1 iff field FIELD_NUM of TYPE
4c4b4cd2 6960 represents a 'when others' clause; otherwise 0. */
14f9c5c9 6961
de93309a 6962static int
ebf56fd3 6963ada_is_others_clause (struct type *type, int field_num)
14f9c5c9 6964{
d2e4a39e 6965 const char *name = TYPE_FIELD_NAME (type, field_num);
5b4ee69b 6966
14f9c5c9
AS
6967 return (name != NULL && name[0] == 'O');
6968}
6969
6970/* Assuming that TYPE0 is the type of the variant part of a record,
4c4b4cd2
PH
6971 returns the name of the discriminant controlling the variant.
6972 The value is valid until the next call to ada_variant_discrim_name. */
14f9c5c9 6973
a121b7c1 6974const char *
ebf56fd3 6975ada_variant_discrim_name (struct type *type0)
14f9c5c9 6976{
d2e4a39e 6977 static char *result = NULL;
14f9c5c9 6978 static size_t result_len = 0;
d2e4a39e
AS
6979 struct type *type;
6980 const char *name;
6981 const char *discrim_end;
6982 const char *discrim_start;
14f9c5c9 6983
78134374 6984 if (type0->code () == TYPE_CODE_PTR)
14f9c5c9
AS
6985 type = TYPE_TARGET_TYPE (type0);
6986 else
6987 type = type0;
6988
6989 name = ada_type_name (type);
6990
6991 if (name == NULL || name[0] == '\000')
6992 return "";
6993
6994 for (discrim_end = name + strlen (name) - 6; discrim_end != name;
6995 discrim_end -= 1)
6996 {
61012eef 6997 if (startswith (discrim_end, "___XVN"))
4c4b4cd2 6998 break;
14f9c5c9
AS
6999 }
7000 if (discrim_end == name)
7001 return "";
7002
d2e4a39e 7003 for (discrim_start = discrim_end; discrim_start != name + 3;
14f9c5c9
AS
7004 discrim_start -= 1)
7005 {
d2e4a39e 7006 if (discrim_start == name + 1)
4c4b4cd2 7007 return "";
76a01679 7008 if ((discrim_start > name + 3
61012eef 7009 && startswith (discrim_start - 3, "___"))
4c4b4cd2
PH
7010 || discrim_start[-1] == '.')
7011 break;
14f9c5c9
AS
7012 }
7013
7014 GROW_VECT (result, result_len, discrim_end - discrim_start + 1);
7015 strncpy (result, discrim_start, discrim_end - discrim_start);
d2e4a39e 7016 result[discrim_end - discrim_start] = '\0';
14f9c5c9
AS
7017 return result;
7018}
7019
4c4b4cd2
PH
7020/* Scan STR for a subtype-encoded number, beginning at position K.
7021 Put the position of the character just past the number scanned in
7022 *NEW_K, if NEW_K!=NULL. Put the scanned number in *R, if R!=NULL.
7023 Return 1 if there was a valid number at the given position, and 0
7024 otherwise. A "subtype-encoded" number consists of the absolute value
7025 in decimal, followed by the letter 'm' to indicate a negative number.
7026 Assumes 0m does not occur. */
14f9c5c9
AS
7027
7028int
d2e4a39e 7029ada_scan_number (const char str[], int k, LONGEST * R, int *new_k)
14f9c5c9
AS
7030{
7031 ULONGEST RU;
7032
d2e4a39e 7033 if (!isdigit (str[k]))
14f9c5c9
AS
7034 return 0;
7035
4c4b4cd2 7036 /* Do it the hard way so as not to make any assumption about
14f9c5c9 7037 the relationship of unsigned long (%lu scan format code) and
4c4b4cd2 7038 LONGEST. */
14f9c5c9
AS
7039 RU = 0;
7040 while (isdigit (str[k]))
7041 {
d2e4a39e 7042 RU = RU * 10 + (str[k] - '0');
14f9c5c9
AS
7043 k += 1;
7044 }
7045
d2e4a39e 7046 if (str[k] == 'm')
14f9c5c9
AS
7047 {
7048 if (R != NULL)
4c4b4cd2 7049 *R = (-(LONGEST) (RU - 1)) - 1;
14f9c5c9
AS
7050 k += 1;
7051 }
7052 else if (R != NULL)
7053 *R = (LONGEST) RU;
7054
4c4b4cd2 7055 /* NOTE on the above: Technically, C does not say what the results of
14f9c5c9
AS
7056 - (LONGEST) RU or (LONGEST) -RU are for RU == largest positive
7057 number representable as a LONGEST (although either would probably work
7058 in most implementations). When RU>0, the locution in the then branch
4c4b4cd2 7059 above is always equivalent to the negative of RU. */
14f9c5c9
AS
7060
7061 if (new_k != NULL)
7062 *new_k = k;
7063 return 1;
7064}
7065
4c4b4cd2
PH
7066/* Assuming that TYPE is a variant part wrapper type (a VARIANTS field),
7067 and FIELD_NUM is a valid field number within it, returns 1 iff VAL is
7068 in the range encoded by field FIELD_NUM of TYPE; otherwise 0. */
14f9c5c9 7069
de93309a 7070static int
ebf56fd3 7071ada_in_variant (LONGEST val, struct type *type, int field_num)
14f9c5c9 7072{
d2e4a39e 7073 const char *name = TYPE_FIELD_NAME (type, field_num);
14f9c5c9
AS
7074 int p;
7075
7076 p = 0;
7077 while (1)
7078 {
d2e4a39e 7079 switch (name[p])
4c4b4cd2
PH
7080 {
7081 case '\0':
7082 return 0;
7083 case 'S':
7084 {
7085 LONGEST W;
5b4ee69b 7086
4c4b4cd2
PH
7087 if (!ada_scan_number (name, p + 1, &W, &p))
7088 return 0;
7089 if (val == W)
7090 return 1;
7091 break;
7092 }
7093 case 'R':
7094 {
7095 LONGEST L, U;
5b4ee69b 7096
4c4b4cd2
PH
7097 if (!ada_scan_number (name, p + 1, &L, &p)
7098 || name[p] != 'T' || !ada_scan_number (name, p + 1, &U, &p))
7099 return 0;
7100 if (val >= L && val <= U)
7101 return 1;
7102 break;
7103 }
7104 case 'O':
7105 return 1;
7106 default:
7107 return 0;
7108 }
7109 }
7110}
7111
0963b4bd 7112/* FIXME: Lots of redundancy below. Try to consolidate. */
4c4b4cd2
PH
7113
7114/* Given a value ARG1 (offset by OFFSET bytes) of a struct or union type
7115 ARG_TYPE, extract and return the value of one of its (non-static)
7116 fields. FIELDNO says which field. Differs from value_primitive_field
7117 only in that it can handle packed values of arbitrary type. */
14f9c5c9 7118
5eb68a39 7119struct value *
d2e4a39e 7120ada_value_primitive_field (struct value *arg1, int offset, int fieldno,
4c4b4cd2 7121 struct type *arg_type)
14f9c5c9 7122{
14f9c5c9
AS
7123 struct type *type;
7124
61ee279c 7125 arg_type = ada_check_typedef (arg_type);
14f9c5c9
AS
7126 type = TYPE_FIELD_TYPE (arg_type, fieldno);
7127
4504bbde
TT
7128 /* Handle packed fields. It might be that the field is not packed
7129 relative to its containing structure, but the structure itself is
7130 packed; in this case we must take the bit-field path. */
7131 if (TYPE_FIELD_BITSIZE (arg_type, fieldno) != 0 || value_bitpos (arg1) != 0)
14f9c5c9
AS
7132 {
7133 int bit_pos = TYPE_FIELD_BITPOS (arg_type, fieldno);
7134 int bit_size = TYPE_FIELD_BITSIZE (arg_type, fieldno);
d2e4a39e 7135
0fd88904 7136 return ada_value_primitive_packed_val (arg1, value_contents (arg1),
4c4b4cd2
PH
7137 offset + bit_pos / 8,
7138 bit_pos % 8, bit_size, type);
14f9c5c9
AS
7139 }
7140 else
7141 return value_primitive_field (arg1, offset, fieldno, arg_type);
7142}
7143
52ce6436
PH
7144/* Find field with name NAME in object of type TYPE. If found,
7145 set the following for each argument that is non-null:
7146 - *FIELD_TYPE_P to the field's type;
7147 - *BYTE_OFFSET_P to OFFSET + the byte offset of the field within
7148 an object of that type;
7149 - *BIT_OFFSET_P to the bit offset modulo byte size of the field;
7150 - *BIT_SIZE_P to its size in bits if the field is packed, and
7151 0 otherwise;
7152 If INDEX_P is non-null, increment *INDEX_P by the number of source-visible
7153 fields up to but not including the desired field, or by the total
7154 number of fields if not found. A NULL value of NAME never
7155 matches; the function just counts visible fields in this case.
7156
828d5846
XR
7157 Notice that we need to handle when a tagged record hierarchy
7158 has some components with the same name, like in this scenario:
7159
7160 type Top_T is tagged record
7161 N : Integer := 1;
7162 U : Integer := 974;
7163 A : Integer := 48;
7164 end record;
7165
7166 type Middle_T is new Top.Top_T with record
7167 N : Character := 'a';
7168 C : Integer := 3;
7169 end record;
7170
7171 type Bottom_T is new Middle.Middle_T with record
7172 N : Float := 4.0;
7173 C : Character := '5';
7174 X : Integer := 6;
7175 A : Character := 'J';
7176 end record;
7177
7178 Let's say we now have a variable declared and initialized as follow:
7179
7180 TC : Top_A := new Bottom_T;
7181
7182 And then we use this variable to call this function
7183
7184 procedure Assign (Obj: in out Top_T; TV : Integer);
7185
7186 as follow:
7187
7188 Assign (Top_T (B), 12);
7189
7190 Now, we're in the debugger, and we're inside that procedure
7191 then and we want to print the value of obj.c:
7192
7193 Usually, the tagged record or one of the parent type owns the
7194 component to print and there's no issue but in this particular
7195 case, what does it mean to ask for Obj.C? Since the actual
7196 type for object is type Bottom_T, it could mean two things: type
7197 component C from the Middle_T view, but also component C from
7198 Bottom_T. So in that "undefined" case, when the component is
7199 not found in the non-resolved type (which includes all the
7200 components of the parent type), then resolve it and see if we
7201 get better luck once expanded.
7202
7203 In the case of homonyms in the derived tagged type, we don't
7204 guaranty anything, and pick the one that's easiest for us
7205 to program.
7206
0963b4bd 7207 Returns 1 if found, 0 otherwise. */
52ce6436 7208
4c4b4cd2 7209static int
0d5cff50 7210find_struct_field (const char *name, struct type *type, int offset,
76a01679 7211 struct type **field_type_p,
52ce6436
PH
7212 int *byte_offset_p, int *bit_offset_p, int *bit_size_p,
7213 int *index_p)
4c4b4cd2
PH
7214{
7215 int i;
828d5846 7216 int parent_offset = -1;
4c4b4cd2 7217
61ee279c 7218 type = ada_check_typedef (type);
76a01679 7219
52ce6436
PH
7220 if (field_type_p != NULL)
7221 *field_type_p = NULL;
7222 if (byte_offset_p != NULL)
d5d6fca5 7223 *byte_offset_p = 0;
52ce6436
PH
7224 if (bit_offset_p != NULL)
7225 *bit_offset_p = 0;
7226 if (bit_size_p != NULL)
7227 *bit_size_p = 0;
7228
7229 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
4c4b4cd2
PH
7230 {
7231 int bit_pos = TYPE_FIELD_BITPOS (type, i);
7232 int fld_offset = offset + bit_pos / 8;
0d5cff50 7233 const char *t_field_name = TYPE_FIELD_NAME (type, i);
76a01679 7234
4c4b4cd2
PH
7235 if (t_field_name == NULL)
7236 continue;
7237
828d5846
XR
7238 else if (ada_is_parent_field (type, i))
7239 {
7240 /* This is a field pointing us to the parent type of a tagged
7241 type. As hinted in this function's documentation, we give
7242 preference to fields in the current record first, so what
7243 we do here is just record the index of this field before
7244 we skip it. If it turns out we couldn't find our field
7245 in the current record, then we'll get back to it and search
7246 inside it whether the field might exist in the parent. */
7247
7248 parent_offset = i;
7249 continue;
7250 }
7251
52ce6436 7252 else if (name != NULL && field_name_match (t_field_name, name))
76a01679
JB
7253 {
7254 int bit_size = TYPE_FIELD_BITSIZE (type, i);
5b4ee69b 7255
52ce6436
PH
7256 if (field_type_p != NULL)
7257 *field_type_p = TYPE_FIELD_TYPE (type, i);
7258 if (byte_offset_p != NULL)
7259 *byte_offset_p = fld_offset;
7260 if (bit_offset_p != NULL)
7261 *bit_offset_p = bit_pos % 8;
7262 if (bit_size_p != NULL)
7263 *bit_size_p = bit_size;
76a01679
JB
7264 return 1;
7265 }
4c4b4cd2
PH
7266 else if (ada_is_wrapper_field (type, i))
7267 {
52ce6436
PH
7268 if (find_struct_field (name, TYPE_FIELD_TYPE (type, i), fld_offset,
7269 field_type_p, byte_offset_p, bit_offset_p,
7270 bit_size_p, index_p))
76a01679
JB
7271 return 1;
7272 }
4c4b4cd2
PH
7273 else if (ada_is_variant_part (type, i))
7274 {
52ce6436
PH
7275 /* PNH: Wait. Do we ever execute this section, or is ARG always of
7276 fixed type?? */
4c4b4cd2 7277 int j;
52ce6436
PH
7278 struct type *field_type
7279 = ada_check_typedef (TYPE_FIELD_TYPE (type, i));
4c4b4cd2 7280
52ce6436 7281 for (j = 0; j < TYPE_NFIELDS (field_type); j += 1)
4c4b4cd2 7282 {
76a01679
JB
7283 if (find_struct_field (name, TYPE_FIELD_TYPE (field_type, j),
7284 fld_offset
7285 + TYPE_FIELD_BITPOS (field_type, j) / 8,
7286 field_type_p, byte_offset_p,
52ce6436 7287 bit_offset_p, bit_size_p, index_p))
76a01679 7288 return 1;
4c4b4cd2
PH
7289 }
7290 }
52ce6436
PH
7291 else if (index_p != NULL)
7292 *index_p += 1;
4c4b4cd2 7293 }
828d5846
XR
7294
7295 /* Field not found so far. If this is a tagged type which
7296 has a parent, try finding that field in the parent now. */
7297
7298 if (parent_offset != -1)
7299 {
7300 int bit_pos = TYPE_FIELD_BITPOS (type, parent_offset);
7301 int fld_offset = offset + bit_pos / 8;
7302
7303 if (find_struct_field (name, TYPE_FIELD_TYPE (type, parent_offset),
7304 fld_offset, field_type_p, byte_offset_p,
7305 bit_offset_p, bit_size_p, index_p))
7306 return 1;
7307 }
7308
4c4b4cd2
PH
7309 return 0;
7310}
7311
0963b4bd 7312/* Number of user-visible fields in record type TYPE. */
4c4b4cd2 7313
52ce6436
PH
7314static int
7315num_visible_fields (struct type *type)
7316{
7317 int n;
5b4ee69b 7318
52ce6436
PH
7319 n = 0;
7320 find_struct_field (NULL, type, 0, NULL, NULL, NULL, NULL, &n);
7321 return n;
7322}
14f9c5c9 7323
4c4b4cd2 7324/* Look for a field NAME in ARG. Adjust the address of ARG by OFFSET bytes,
14f9c5c9
AS
7325 and search in it assuming it has (class) type TYPE.
7326 If found, return value, else return NULL.
7327
828d5846
XR
7328 Searches recursively through wrapper fields (e.g., '_parent').
7329
7330 In the case of homonyms in the tagged types, please refer to the
7331 long explanation in find_struct_field's function documentation. */
14f9c5c9 7332
4c4b4cd2 7333static struct value *
108d56a4 7334ada_search_struct_field (const char *name, struct value *arg, int offset,
4c4b4cd2 7335 struct type *type)
14f9c5c9
AS
7336{
7337 int i;
828d5846 7338 int parent_offset = -1;
14f9c5c9 7339
5b4ee69b 7340 type = ada_check_typedef (type);
52ce6436 7341 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
14f9c5c9 7342 {
0d5cff50 7343 const char *t_field_name = TYPE_FIELD_NAME (type, i);
14f9c5c9
AS
7344
7345 if (t_field_name == NULL)
4c4b4cd2 7346 continue;
14f9c5c9 7347
828d5846
XR
7348 else if (ada_is_parent_field (type, i))
7349 {
7350 /* This is a field pointing us to the parent type of a tagged
7351 type. As hinted in this function's documentation, we give
7352 preference to fields in the current record first, so what
7353 we do here is just record the index of this field before
7354 we skip it. If it turns out we couldn't find our field
7355 in the current record, then we'll get back to it and search
7356 inside it whether the field might exist in the parent. */
7357
7358 parent_offset = i;
7359 continue;
7360 }
7361
14f9c5c9 7362 else if (field_name_match (t_field_name, name))
4c4b4cd2 7363 return ada_value_primitive_field (arg, offset, i, type);
14f9c5c9
AS
7364
7365 else if (ada_is_wrapper_field (type, i))
4c4b4cd2 7366 {
0963b4bd 7367 struct value *v = /* Do not let indent join lines here. */
06d5cf63
JB
7368 ada_search_struct_field (name, arg,
7369 offset + TYPE_FIELD_BITPOS (type, i) / 8,
7370 TYPE_FIELD_TYPE (type, i));
5b4ee69b 7371
4c4b4cd2
PH
7372 if (v != NULL)
7373 return v;
7374 }
14f9c5c9
AS
7375
7376 else if (ada_is_variant_part (type, i))
4c4b4cd2 7377 {
0963b4bd 7378 /* PNH: Do we ever get here? See find_struct_field. */
4c4b4cd2 7379 int j;
5b4ee69b
MS
7380 struct type *field_type = ada_check_typedef (TYPE_FIELD_TYPE (type,
7381 i));
4c4b4cd2
PH
7382 int var_offset = offset + TYPE_FIELD_BITPOS (type, i) / 8;
7383
52ce6436 7384 for (j = 0; j < TYPE_NFIELDS (field_type); j += 1)
4c4b4cd2 7385 {
0963b4bd
MS
7386 struct value *v = ada_search_struct_field /* Force line
7387 break. */
06d5cf63
JB
7388 (name, arg,
7389 var_offset + TYPE_FIELD_BITPOS (field_type, j) / 8,
7390 TYPE_FIELD_TYPE (field_type, j));
5b4ee69b 7391
4c4b4cd2
PH
7392 if (v != NULL)
7393 return v;
7394 }
7395 }
14f9c5c9 7396 }
828d5846
XR
7397
7398 /* Field not found so far. If this is a tagged type which
7399 has a parent, try finding that field in the parent now. */
7400
7401 if (parent_offset != -1)
7402 {
7403 struct value *v = ada_search_struct_field (
7404 name, arg, offset + TYPE_FIELD_BITPOS (type, parent_offset) / 8,
7405 TYPE_FIELD_TYPE (type, parent_offset));
7406
7407 if (v != NULL)
7408 return v;
7409 }
7410
14f9c5c9
AS
7411 return NULL;
7412}
d2e4a39e 7413
52ce6436
PH
7414static struct value *ada_index_struct_field_1 (int *, struct value *,
7415 int, struct type *);
7416
7417
7418/* Return field #INDEX in ARG, where the index is that returned by
7419 * find_struct_field through its INDEX_P argument. Adjust the address
7420 * of ARG by OFFSET bytes, and search in it assuming it has (class) type TYPE.
0963b4bd 7421 * If found, return value, else return NULL. */
52ce6436
PH
7422
7423static struct value *
7424ada_index_struct_field (int index, struct value *arg, int offset,
7425 struct type *type)
7426{
7427 return ada_index_struct_field_1 (&index, arg, offset, type);
7428}
7429
7430
7431/* Auxiliary function for ada_index_struct_field. Like
7432 * ada_index_struct_field, but takes index from *INDEX_P and modifies
0963b4bd 7433 * *INDEX_P. */
52ce6436
PH
7434
7435static struct value *
7436ada_index_struct_field_1 (int *index_p, struct value *arg, int offset,
7437 struct type *type)
7438{
7439 int i;
7440 type = ada_check_typedef (type);
7441
7442 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
7443 {
7444 if (TYPE_FIELD_NAME (type, i) == NULL)
7445 continue;
7446 else if (ada_is_wrapper_field (type, i))
7447 {
0963b4bd 7448 struct value *v = /* Do not let indent join lines here. */
52ce6436
PH
7449 ada_index_struct_field_1 (index_p, arg,
7450 offset + TYPE_FIELD_BITPOS (type, i) / 8,
7451 TYPE_FIELD_TYPE (type, i));
5b4ee69b 7452
52ce6436
PH
7453 if (v != NULL)
7454 return v;
7455 }
7456
7457 else if (ada_is_variant_part (type, i))
7458 {
7459 /* PNH: Do we ever get here? See ada_search_struct_field,
0963b4bd 7460 find_struct_field. */
52ce6436
PH
7461 error (_("Cannot assign this kind of variant record"));
7462 }
7463 else if (*index_p == 0)
7464 return ada_value_primitive_field (arg, offset, i, type);
7465 else
7466 *index_p -= 1;
7467 }
7468 return NULL;
7469}
7470
3b4de39c 7471/* Return a string representation of type TYPE. */
99bbb428 7472
3b4de39c 7473static std::string
99bbb428
PA
7474type_as_string (struct type *type)
7475{
d7e74731 7476 string_file tmp_stream;
99bbb428 7477
d7e74731 7478 type_print (type, "", &tmp_stream, -1);
99bbb428 7479
d7e74731 7480 return std::move (tmp_stream.string ());
99bbb428
PA
7481}
7482
14f9c5c9 7483/* Given a type TYPE, look up the type of the component of type named NAME.
4c4b4cd2
PH
7484 If DISPP is non-null, add its byte displacement from the beginning of a
7485 structure (pointed to by a value) of type TYPE to *DISPP (does not
14f9c5c9
AS
7486 work for packed fields).
7487
7488 Matches any field whose name has NAME as a prefix, possibly
4c4b4cd2 7489 followed by "___".
14f9c5c9 7490
0963b4bd 7491 TYPE can be either a struct or union. If REFOK, TYPE may also
4c4b4cd2
PH
7492 be a (pointer or reference)+ to a struct or union, and the
7493 ultimate target type will be searched.
14f9c5c9
AS
7494
7495 Looks recursively into variant clauses and parent types.
7496
828d5846
XR
7497 In the case of homonyms in the tagged types, please refer to the
7498 long explanation in find_struct_field's function documentation.
7499
4c4b4cd2
PH
7500 If NOERR is nonzero, return NULL if NAME is not suitably defined or
7501 TYPE is not a type of the right kind. */
14f9c5c9 7502
4c4b4cd2 7503static struct type *
a121b7c1 7504ada_lookup_struct_elt_type (struct type *type, const char *name, int refok,
988f6b3d 7505 int noerr)
14f9c5c9
AS
7506{
7507 int i;
828d5846 7508 int parent_offset = -1;
14f9c5c9
AS
7509
7510 if (name == NULL)
7511 goto BadName;
7512
76a01679 7513 if (refok && type != NULL)
4c4b4cd2
PH
7514 while (1)
7515 {
61ee279c 7516 type = ada_check_typedef (type);
78134374 7517 if (type->code () != TYPE_CODE_PTR && type->code () != TYPE_CODE_REF)
76a01679
JB
7518 break;
7519 type = TYPE_TARGET_TYPE (type);
4c4b4cd2 7520 }
14f9c5c9 7521
76a01679 7522 if (type == NULL
78134374
SM
7523 || (type->code () != TYPE_CODE_STRUCT
7524 && type->code () != TYPE_CODE_UNION))
14f9c5c9 7525 {
4c4b4cd2 7526 if (noerr)
76a01679 7527 return NULL;
99bbb428 7528
3b4de39c
PA
7529 error (_("Type %s is not a structure or union type"),
7530 type != NULL ? type_as_string (type).c_str () : _("(null)"));
14f9c5c9
AS
7531 }
7532
7533 type = to_static_fixed_type (type);
7534
7535 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
7536 {
0d5cff50 7537 const char *t_field_name = TYPE_FIELD_NAME (type, i);
14f9c5c9 7538 struct type *t;
d2e4a39e 7539
14f9c5c9 7540 if (t_field_name == NULL)
4c4b4cd2 7541 continue;
14f9c5c9 7542
828d5846
XR
7543 else if (ada_is_parent_field (type, i))
7544 {
7545 /* This is a field pointing us to the parent type of a tagged
7546 type. As hinted in this function's documentation, we give
7547 preference to fields in the current record first, so what
7548 we do here is just record the index of this field before
7549 we skip it. If it turns out we couldn't find our field
7550 in the current record, then we'll get back to it and search
7551 inside it whether the field might exist in the parent. */
7552
7553 parent_offset = i;
7554 continue;
7555 }
7556
14f9c5c9 7557 else if (field_name_match (t_field_name, name))
988f6b3d 7558 return TYPE_FIELD_TYPE (type, i);
14f9c5c9
AS
7559
7560 else if (ada_is_wrapper_field (type, i))
4c4b4cd2 7561 {
4c4b4cd2 7562 t = ada_lookup_struct_elt_type (TYPE_FIELD_TYPE (type, i), name,
988f6b3d 7563 0, 1);
4c4b4cd2 7564 if (t != NULL)
988f6b3d 7565 return t;
4c4b4cd2 7566 }
14f9c5c9
AS
7567
7568 else if (ada_is_variant_part (type, i))
4c4b4cd2
PH
7569 {
7570 int j;
5b4ee69b
MS
7571 struct type *field_type = ada_check_typedef (TYPE_FIELD_TYPE (type,
7572 i));
4c4b4cd2
PH
7573
7574 for (j = TYPE_NFIELDS (field_type) - 1; j >= 0; j -= 1)
7575 {
b1f33ddd
JB
7576 /* FIXME pnh 2008/01/26: We check for a field that is
7577 NOT wrapped in a struct, since the compiler sometimes
7578 generates these for unchecked variant types. Revisit
0963b4bd 7579 if the compiler changes this practice. */
0d5cff50 7580 const char *v_field_name = TYPE_FIELD_NAME (field_type, j);
988f6b3d 7581
b1f33ddd
JB
7582 if (v_field_name != NULL
7583 && field_name_match (v_field_name, name))
460efde1 7584 t = TYPE_FIELD_TYPE (field_type, j);
b1f33ddd 7585 else
0963b4bd
MS
7586 t = ada_lookup_struct_elt_type (TYPE_FIELD_TYPE (field_type,
7587 j),
988f6b3d 7588 name, 0, 1);
b1f33ddd 7589
4c4b4cd2 7590 if (t != NULL)
988f6b3d 7591 return t;
4c4b4cd2
PH
7592 }
7593 }
14f9c5c9
AS
7594
7595 }
7596
828d5846
XR
7597 /* Field not found so far. If this is a tagged type which
7598 has a parent, try finding that field in the parent now. */
7599
7600 if (parent_offset != -1)
7601 {
7602 struct type *t;
7603
7604 t = ada_lookup_struct_elt_type (TYPE_FIELD_TYPE (type, parent_offset),
7605 name, 0, 1);
7606 if (t != NULL)
7607 return t;
7608 }
7609
14f9c5c9 7610BadName:
d2e4a39e 7611 if (!noerr)
14f9c5c9 7612 {
2b2798cc 7613 const char *name_str = name != NULL ? name : _("<null>");
99bbb428
PA
7614
7615 error (_("Type %s has no component named %s"),
3b4de39c 7616 type_as_string (type).c_str (), name_str);
14f9c5c9
AS
7617 }
7618
7619 return NULL;
7620}
7621
b1f33ddd
JB
7622/* Assuming that VAR_TYPE is the type of a variant part of a record (a union),
7623 within a value of type OUTER_TYPE, return true iff VAR_TYPE
7624 represents an unchecked union (that is, the variant part of a
0963b4bd 7625 record that is named in an Unchecked_Union pragma). */
b1f33ddd
JB
7626
7627static int
7628is_unchecked_variant (struct type *var_type, struct type *outer_type)
7629{
a121b7c1 7630 const char *discrim_name = ada_variant_discrim_name (var_type);
5b4ee69b 7631
988f6b3d 7632 return (ada_lookup_struct_elt_type (outer_type, discrim_name, 0, 1) == NULL);
b1f33ddd
JB
7633}
7634
7635
14f9c5c9 7636/* Assuming that VAR_TYPE is the type of a variant part of a record (a union),
d8af9068 7637 within OUTER, determine which variant clause (field number in VAR_TYPE,
4c4b4cd2 7638 numbering from 0) is applicable. Returns -1 if none are. */
14f9c5c9 7639
d2e4a39e 7640int
d8af9068 7641ada_which_variant_applies (struct type *var_type, struct value *outer)
14f9c5c9
AS
7642{
7643 int others_clause;
7644 int i;
a121b7c1 7645 const char *discrim_name = ada_variant_discrim_name (var_type);
0c281816 7646 struct value *discrim;
14f9c5c9
AS
7647 LONGEST discrim_val;
7648
012370f6
TT
7649 /* Using plain value_from_contents_and_address here causes problems
7650 because we will end up trying to resolve a type that is currently
7651 being constructed. */
0c281816
JB
7652 discrim = ada_value_struct_elt (outer, discrim_name, 1);
7653 if (discrim == NULL)
14f9c5c9 7654 return -1;
0c281816 7655 discrim_val = value_as_long (discrim);
14f9c5c9
AS
7656
7657 others_clause = -1;
7658 for (i = 0; i < TYPE_NFIELDS (var_type); i += 1)
7659 {
7660 if (ada_is_others_clause (var_type, i))
4c4b4cd2 7661 others_clause = i;
14f9c5c9 7662 else if (ada_in_variant (discrim_val, var_type, i))
4c4b4cd2 7663 return i;
14f9c5c9
AS
7664 }
7665
7666 return others_clause;
7667}
d2e4a39e 7668\f
14f9c5c9
AS
7669
7670
4c4b4cd2 7671 /* Dynamic-Sized Records */
14f9c5c9
AS
7672
7673/* Strategy: The type ostensibly attached to a value with dynamic size
7674 (i.e., a size that is not statically recorded in the debugging
7675 data) does not accurately reflect the size or layout of the value.
7676 Our strategy is to convert these values to values with accurate,
4c4b4cd2 7677 conventional types that are constructed on the fly. */
14f9c5c9
AS
7678
7679/* There is a subtle and tricky problem here. In general, we cannot
7680 determine the size of dynamic records without its data. However,
7681 the 'struct value' data structure, which GDB uses to represent
7682 quantities in the inferior process (the target), requires the size
7683 of the type at the time of its allocation in order to reserve space
7684 for GDB's internal copy of the data. That's why the
7685 'to_fixed_xxx_type' routines take (target) addresses as parameters,
4c4b4cd2 7686 rather than struct value*s.
14f9c5c9
AS
7687
7688 However, GDB's internal history variables ($1, $2, etc.) are
7689 struct value*s containing internal copies of the data that are not, in
7690 general, the same as the data at their corresponding addresses in
7691 the target. Fortunately, the types we give to these values are all
7692 conventional, fixed-size types (as per the strategy described
7693 above), so that we don't usually have to perform the
7694 'to_fixed_xxx_type' conversions to look at their values.
7695 Unfortunately, there is one exception: if one of the internal
7696 history variables is an array whose elements are unconstrained
7697 records, then we will need to create distinct fixed types for each
7698 element selected. */
7699
7700/* The upshot of all of this is that many routines take a (type, host
7701 address, target address) triple as arguments to represent a value.
7702 The host address, if non-null, is supposed to contain an internal
7703 copy of the relevant data; otherwise, the program is to consult the
4c4b4cd2 7704 target at the target address. */
14f9c5c9
AS
7705
7706/* Assuming that VAL0 represents a pointer value, the result of
7707 dereferencing it. Differs from value_ind in its treatment of
4c4b4cd2 7708 dynamic-sized types. */
14f9c5c9 7709
d2e4a39e
AS
7710struct value *
7711ada_value_ind (struct value *val0)
14f9c5c9 7712{
c48db5ca 7713 struct value *val = value_ind (val0);
5b4ee69b 7714
b50d69b5
JG
7715 if (ada_is_tagged_type (value_type (val), 0))
7716 val = ada_tag_value_at_base_address (val);
7717
4c4b4cd2 7718 return ada_to_fixed_value (val);
14f9c5c9
AS
7719}
7720
7721/* The value resulting from dereferencing any "reference to"
4c4b4cd2
PH
7722 qualifiers on VAL0. */
7723
d2e4a39e
AS
7724static struct value *
7725ada_coerce_ref (struct value *val0)
7726{
78134374 7727 if (value_type (val0)->code () == TYPE_CODE_REF)
d2e4a39e
AS
7728 {
7729 struct value *val = val0;
5b4ee69b 7730
994b9211 7731 val = coerce_ref (val);
b50d69b5
JG
7732
7733 if (ada_is_tagged_type (value_type (val), 0))
7734 val = ada_tag_value_at_base_address (val);
7735
4c4b4cd2 7736 return ada_to_fixed_value (val);
d2e4a39e
AS
7737 }
7738 else
14f9c5c9
AS
7739 return val0;
7740}
7741
4c4b4cd2 7742/* Return the bit alignment required for field #F of template type TYPE. */
14f9c5c9
AS
7743
7744static unsigned int
ebf56fd3 7745field_alignment (struct type *type, int f)
14f9c5c9 7746{
d2e4a39e 7747 const char *name = TYPE_FIELD_NAME (type, f);
64a1bf19 7748 int len;
14f9c5c9
AS
7749 int align_offset;
7750
64a1bf19
JB
7751 /* The field name should never be null, unless the debugging information
7752 is somehow malformed. In this case, we assume the field does not
7753 require any alignment. */
7754 if (name == NULL)
7755 return 1;
7756
7757 len = strlen (name);
7758
4c4b4cd2
PH
7759 if (!isdigit (name[len - 1]))
7760 return 1;
14f9c5c9 7761
d2e4a39e 7762 if (isdigit (name[len - 2]))
14f9c5c9
AS
7763 align_offset = len - 2;
7764 else
7765 align_offset = len - 1;
7766
61012eef 7767 if (align_offset < 7 || !startswith (name + align_offset - 6, "___XV"))
14f9c5c9
AS
7768 return TARGET_CHAR_BIT;
7769
4c4b4cd2
PH
7770 return atoi (name + align_offset) * TARGET_CHAR_BIT;
7771}
7772
852dff6c 7773/* Find a typedef or tag symbol named NAME. Ignores ambiguity. */
4c4b4cd2 7774
852dff6c
JB
7775static struct symbol *
7776ada_find_any_type_symbol (const char *name)
4c4b4cd2
PH
7777{
7778 struct symbol *sym;
7779
7780 sym = standard_lookup (name, get_selected_block (NULL), VAR_DOMAIN);
4186eb54 7781 if (sym != NULL && SYMBOL_CLASS (sym) == LOC_TYPEDEF)
4c4b4cd2
PH
7782 return sym;
7783
4186eb54
KS
7784 sym = standard_lookup (name, NULL, STRUCT_DOMAIN);
7785 return sym;
14f9c5c9
AS
7786}
7787
dddfab26
UW
7788/* Find a type named NAME. Ignores ambiguity. This routine will look
7789 solely for types defined by debug info, it will not search the GDB
7790 primitive types. */
4c4b4cd2 7791
852dff6c 7792static struct type *
ebf56fd3 7793ada_find_any_type (const char *name)
14f9c5c9 7794{
852dff6c 7795 struct symbol *sym = ada_find_any_type_symbol (name);
14f9c5c9 7796
14f9c5c9 7797 if (sym != NULL)
dddfab26 7798 return SYMBOL_TYPE (sym);
14f9c5c9 7799
dddfab26 7800 return NULL;
14f9c5c9
AS
7801}
7802
739593e0
JB
7803/* Given NAME_SYM and an associated BLOCK, find a "renaming" symbol
7804 associated with NAME_SYM's name. NAME_SYM may itself be a renaming
7805 symbol, in which case it is returned. Otherwise, this looks for
7806 symbols whose name is that of NAME_SYM suffixed with "___XR".
7807 Return symbol if found, and NULL otherwise. */
4c4b4cd2 7808
c0e70c62
TT
7809static bool
7810ada_is_renaming_symbol (struct symbol *name_sym)
aeb5907d 7811{
987012b8 7812 const char *name = name_sym->linkage_name ();
c0e70c62 7813 return strstr (name, "___XR") != NULL;
4c4b4cd2
PH
7814}
7815
14f9c5c9 7816/* Because of GNAT encoding conventions, several GDB symbols may match a
4c4b4cd2 7817 given type name. If the type denoted by TYPE0 is to be preferred to
14f9c5c9 7818 that of TYPE1 for purposes of type printing, return non-zero;
4c4b4cd2
PH
7819 otherwise return 0. */
7820
14f9c5c9 7821int
d2e4a39e 7822ada_prefer_type (struct type *type0, struct type *type1)
14f9c5c9
AS
7823{
7824 if (type1 == NULL)
7825 return 1;
7826 else if (type0 == NULL)
7827 return 0;
78134374 7828 else if (type1->code () == TYPE_CODE_VOID)
14f9c5c9 7829 return 1;
78134374 7830 else if (type0->code () == TYPE_CODE_VOID)
14f9c5c9 7831 return 0;
7d93a1e0 7832 else if (type1->name () == NULL && type0->name () != NULL)
4c4b4cd2 7833 return 1;
ad82864c 7834 else if (ada_is_constrained_packed_array_type (type0))
14f9c5c9 7835 return 1;
4c4b4cd2
PH
7836 else if (ada_is_array_descriptor_type (type0)
7837 && !ada_is_array_descriptor_type (type1))
14f9c5c9 7838 return 1;
aeb5907d
JB
7839 else
7840 {
7d93a1e0
SM
7841 const char *type0_name = type0->name ();
7842 const char *type1_name = type1->name ();
aeb5907d
JB
7843
7844 if (type0_name != NULL && strstr (type0_name, "___XR") != NULL
7845 && (type1_name == NULL || strstr (type1_name, "___XR") == NULL))
7846 return 1;
7847 }
14f9c5c9
AS
7848 return 0;
7849}
7850
e86ca25f
TT
7851/* The name of TYPE, which is its TYPE_NAME. Null if TYPE is
7852 null. */
4c4b4cd2 7853
0d5cff50 7854const char *
d2e4a39e 7855ada_type_name (struct type *type)
14f9c5c9 7856{
d2e4a39e 7857 if (type == NULL)
14f9c5c9 7858 return NULL;
7d93a1e0 7859 return type->name ();
14f9c5c9
AS
7860}
7861
b4ba55a1
JB
7862/* Search the list of "descriptive" types associated to TYPE for a type
7863 whose name is NAME. */
7864
7865static struct type *
7866find_parallel_type_by_descriptive_type (struct type *type, const char *name)
7867{
931e5bc3 7868 struct type *result, *tmp;
b4ba55a1 7869
c6044dd1
JB
7870 if (ada_ignore_descriptive_types_p)
7871 return NULL;
7872
b4ba55a1
JB
7873 /* If there no descriptive-type info, then there is no parallel type
7874 to be found. */
7875 if (!HAVE_GNAT_AUX_INFO (type))
7876 return NULL;
7877
7878 result = TYPE_DESCRIPTIVE_TYPE (type);
7879 while (result != NULL)
7880 {
0d5cff50 7881 const char *result_name = ada_type_name (result);
b4ba55a1
JB
7882
7883 if (result_name == NULL)
7884 {
7885 warning (_("unexpected null name on descriptive type"));
7886 return NULL;
7887 }
7888
7889 /* If the names match, stop. */
7890 if (strcmp (result_name, name) == 0)
7891 break;
7892
7893 /* Otherwise, look at the next item on the list, if any. */
7894 if (HAVE_GNAT_AUX_INFO (result))
931e5bc3
JG
7895 tmp = TYPE_DESCRIPTIVE_TYPE (result);
7896 else
7897 tmp = NULL;
7898
7899 /* If not found either, try after having resolved the typedef. */
7900 if (tmp != NULL)
7901 result = tmp;
b4ba55a1 7902 else
931e5bc3 7903 {
f168693b 7904 result = check_typedef (result);
931e5bc3
JG
7905 if (HAVE_GNAT_AUX_INFO (result))
7906 result = TYPE_DESCRIPTIVE_TYPE (result);
7907 else
7908 result = NULL;
7909 }
b4ba55a1
JB
7910 }
7911
7912 /* If we didn't find a match, see whether this is a packed array. With
7913 older compilers, the descriptive type information is either absent or
7914 irrelevant when it comes to packed arrays so the above lookup fails.
7915 Fall back to using a parallel lookup by name in this case. */
12ab9e09 7916 if (result == NULL && ada_is_constrained_packed_array_type (type))
b4ba55a1
JB
7917 return ada_find_any_type (name);
7918
7919 return result;
7920}
7921
7922/* Find a parallel type to TYPE with the specified NAME, using the
7923 descriptive type taken from the debugging information, if available,
7924 and otherwise using the (slower) name-based method. */
7925
7926static struct type *
7927ada_find_parallel_type_with_name (struct type *type, const char *name)
7928{
7929 struct type *result = NULL;
7930
7931 if (HAVE_GNAT_AUX_INFO (type))
7932 result = find_parallel_type_by_descriptive_type (type, name);
7933 else
7934 result = ada_find_any_type (name);
7935
7936 return result;
7937}
7938
7939/* Same as above, but specify the name of the parallel type by appending
4c4b4cd2 7940 SUFFIX to the name of TYPE. */
14f9c5c9 7941
d2e4a39e 7942struct type *
ebf56fd3 7943ada_find_parallel_type (struct type *type, const char *suffix)
14f9c5c9 7944{
0d5cff50 7945 char *name;
fe978cb0 7946 const char *type_name = ada_type_name (type);
14f9c5c9 7947 int len;
d2e4a39e 7948
fe978cb0 7949 if (type_name == NULL)
14f9c5c9
AS
7950 return NULL;
7951
fe978cb0 7952 len = strlen (type_name);
14f9c5c9 7953
b4ba55a1 7954 name = (char *) alloca (len + strlen (suffix) + 1);
14f9c5c9 7955
fe978cb0 7956 strcpy (name, type_name);
14f9c5c9
AS
7957 strcpy (name + len, suffix);
7958
b4ba55a1 7959 return ada_find_parallel_type_with_name (type, name);
14f9c5c9
AS
7960}
7961
14f9c5c9 7962/* If TYPE is a variable-size record type, return the corresponding template
4c4b4cd2 7963 type describing its fields. Otherwise, return NULL. */
14f9c5c9 7964
d2e4a39e
AS
7965static struct type *
7966dynamic_template_type (struct type *type)
14f9c5c9 7967{
61ee279c 7968 type = ada_check_typedef (type);
14f9c5c9 7969
78134374 7970 if (type == NULL || type->code () != TYPE_CODE_STRUCT
d2e4a39e 7971 || ada_type_name (type) == NULL)
14f9c5c9 7972 return NULL;
d2e4a39e 7973 else
14f9c5c9
AS
7974 {
7975 int len = strlen (ada_type_name (type));
5b4ee69b 7976
4c4b4cd2
PH
7977 if (len > 6 && strcmp (ada_type_name (type) + len - 6, "___XVE") == 0)
7978 return type;
14f9c5c9 7979 else
4c4b4cd2 7980 return ada_find_parallel_type (type, "___XVE");
14f9c5c9
AS
7981 }
7982}
7983
7984/* Assuming that TEMPL_TYPE is a union or struct type, returns
4c4b4cd2 7985 non-zero iff field FIELD_NUM of TEMPL_TYPE has dynamic size. */
14f9c5c9 7986
d2e4a39e
AS
7987static int
7988is_dynamic_field (struct type *templ_type, int field_num)
14f9c5c9
AS
7989{
7990 const char *name = TYPE_FIELD_NAME (templ_type, field_num);
5b4ee69b 7991
d2e4a39e 7992 return name != NULL
78134374 7993 && TYPE_FIELD_TYPE (templ_type, field_num)->code () == TYPE_CODE_PTR
14f9c5c9
AS
7994 && strstr (name, "___XVL") != NULL;
7995}
7996
4c4b4cd2
PH
7997/* The index of the variant field of TYPE, or -1 if TYPE does not
7998 represent a variant record type. */
14f9c5c9 7999
d2e4a39e 8000static int
4c4b4cd2 8001variant_field_index (struct type *type)
14f9c5c9
AS
8002{
8003 int f;
8004
78134374 8005 if (type == NULL || type->code () != TYPE_CODE_STRUCT)
4c4b4cd2
PH
8006 return -1;
8007
8008 for (f = 0; f < TYPE_NFIELDS (type); f += 1)
8009 {
8010 if (ada_is_variant_part (type, f))
8011 return f;
8012 }
8013 return -1;
14f9c5c9
AS
8014}
8015
4c4b4cd2
PH
8016/* A record type with no fields. */
8017
d2e4a39e 8018static struct type *
fe978cb0 8019empty_record (struct type *templ)
14f9c5c9 8020{
fe978cb0 8021 struct type *type = alloc_type_copy (templ);
5b4ee69b 8022
67607e24 8023 type->set_code (TYPE_CODE_STRUCT);
14f9c5c9
AS
8024 TYPE_NFIELDS (type) = 0;
8025 TYPE_FIELDS (type) = NULL;
8ecb59f8 8026 INIT_NONE_SPECIFIC (type);
d0e39ea2 8027 type->set_name ("<empty>");
14f9c5c9
AS
8028 TYPE_LENGTH (type) = 0;
8029 return type;
8030}
8031
8032/* An ordinary record type (with fixed-length fields) that describes
4c4b4cd2
PH
8033 the value of type TYPE at VALADDR or ADDRESS (see comments at
8034 the beginning of this section) VAL according to GNAT conventions.
8035 DVAL0 should describe the (portion of a) record that contains any
df407dfe 8036 necessary discriminants. It should be NULL if value_type (VAL) is
14f9c5c9
AS
8037 an outer-level type (i.e., as opposed to a branch of a variant.) A
8038 variant field (unless unchecked) is replaced by a particular branch
4c4b4cd2 8039 of the variant.
14f9c5c9 8040
4c4b4cd2
PH
8041 If not KEEP_DYNAMIC_FIELDS, then all fields whose position or
8042 length are not statically known are discarded. As a consequence,
8043 VALADDR, ADDRESS and DVAL0 are ignored.
8044
8045 NOTE: Limitations: For now, we assume that dynamic fields and
8046 variants occupy whole numbers of bytes. However, they need not be
8047 byte-aligned. */
8048
8049struct type *
10a2c479 8050ada_template_to_fixed_record_type_1 (struct type *type,
fc1a4b47 8051 const gdb_byte *valaddr,
4c4b4cd2
PH
8052 CORE_ADDR address, struct value *dval0,
8053 int keep_dynamic_fields)
14f9c5c9 8054{
d2e4a39e
AS
8055 struct value *mark = value_mark ();
8056 struct value *dval;
8057 struct type *rtype;
14f9c5c9 8058 int nfields, bit_len;
4c4b4cd2 8059 int variant_field;
14f9c5c9 8060 long off;
d94e4f4f 8061 int fld_bit_len;
14f9c5c9
AS
8062 int f;
8063
4c4b4cd2
PH
8064 /* Compute the number of fields in this record type that are going
8065 to be processed: unless keep_dynamic_fields, this includes only
8066 fields whose position and length are static will be processed. */
8067 if (keep_dynamic_fields)
8068 nfields = TYPE_NFIELDS (type);
8069 else
8070 {
8071 nfields = 0;
76a01679 8072 while (nfields < TYPE_NFIELDS (type)
4c4b4cd2
PH
8073 && !ada_is_variant_part (type, nfields)
8074 && !is_dynamic_field (type, nfields))
8075 nfields++;
8076 }
8077
e9bb382b 8078 rtype = alloc_type_copy (type);
67607e24 8079 rtype->set_code (TYPE_CODE_STRUCT);
8ecb59f8 8080 INIT_NONE_SPECIFIC (rtype);
14f9c5c9 8081 TYPE_NFIELDS (rtype) = nfields;
d2e4a39e 8082 TYPE_FIELDS (rtype) = (struct field *)
14f9c5c9
AS
8083 TYPE_ALLOC (rtype, nfields * sizeof (struct field));
8084 memset (TYPE_FIELDS (rtype), 0, sizeof (struct field) * nfields);
d0e39ea2 8085 rtype->set_name (ada_type_name (type));
876cecd0 8086 TYPE_FIXED_INSTANCE (rtype) = 1;
14f9c5c9 8087
d2e4a39e
AS
8088 off = 0;
8089 bit_len = 0;
4c4b4cd2
PH
8090 variant_field = -1;
8091
14f9c5c9
AS
8092 for (f = 0; f < nfields; f += 1)
8093 {
a89febbd 8094 off = align_up (off, field_alignment (type, f))
6c038f32 8095 + TYPE_FIELD_BITPOS (type, f);
945b3a32 8096 SET_FIELD_BITPOS (TYPE_FIELD (rtype, f), off);
d2e4a39e 8097 TYPE_FIELD_BITSIZE (rtype, f) = 0;
14f9c5c9 8098
d2e4a39e 8099 if (ada_is_variant_part (type, f))
4c4b4cd2
PH
8100 {
8101 variant_field = f;
d94e4f4f 8102 fld_bit_len = 0;
4c4b4cd2 8103 }
14f9c5c9 8104 else if (is_dynamic_field (type, f))
4c4b4cd2 8105 {
284614f0
JB
8106 const gdb_byte *field_valaddr = valaddr;
8107 CORE_ADDR field_address = address;
8108 struct type *field_type =
8109 TYPE_TARGET_TYPE (TYPE_FIELD_TYPE (type, f));
8110
4c4b4cd2 8111 if (dval0 == NULL)
b5304971
JG
8112 {
8113 /* rtype's length is computed based on the run-time
8114 value of discriminants. If the discriminants are not
8115 initialized, the type size may be completely bogus and
0963b4bd 8116 GDB may fail to allocate a value for it. So check the
b5304971 8117 size first before creating the value. */
c1b5a1a6 8118 ada_ensure_varsize_limit (rtype);
012370f6
TT
8119 /* Using plain value_from_contents_and_address here
8120 causes problems because we will end up trying to
8121 resolve a type that is currently being
8122 constructed. */
8123 dval = value_from_contents_and_address_unresolved (rtype,
8124 valaddr,
8125 address);
9f1f738a 8126 rtype = value_type (dval);
b5304971 8127 }
4c4b4cd2
PH
8128 else
8129 dval = dval0;
8130
284614f0
JB
8131 /* If the type referenced by this field is an aligner type, we need
8132 to unwrap that aligner type, because its size might not be set.
8133 Keeping the aligner type would cause us to compute the wrong
8134 size for this field, impacting the offset of the all the fields
8135 that follow this one. */
8136 if (ada_is_aligner_type (field_type))
8137 {
8138 long field_offset = TYPE_FIELD_BITPOS (field_type, f);
8139
8140 field_valaddr = cond_offset_host (field_valaddr, field_offset);
8141 field_address = cond_offset_target (field_address, field_offset);
8142 field_type = ada_aligned_type (field_type);
8143 }
8144
8145 field_valaddr = cond_offset_host (field_valaddr,
8146 off / TARGET_CHAR_BIT);
8147 field_address = cond_offset_target (field_address,
8148 off / TARGET_CHAR_BIT);
8149
8150 /* Get the fixed type of the field. Note that, in this case,
8151 we do not want to get the real type out of the tag: if
8152 the current field is the parent part of a tagged record,
8153 we will get the tag of the object. Clearly wrong: the real
8154 type of the parent is not the real type of the child. We
8155 would end up in an infinite loop. */
8156 field_type = ada_get_base_type (field_type);
8157 field_type = ada_to_fixed_type (field_type, field_valaddr,
8158 field_address, dval, 0);
27f2a97b
JB
8159 /* If the field size is already larger than the maximum
8160 object size, then the record itself will necessarily
8161 be larger than the maximum object size. We need to make
8162 this check now, because the size might be so ridiculously
8163 large (due to an uninitialized variable in the inferior)
8164 that it would cause an overflow when adding it to the
8165 record size. */
c1b5a1a6 8166 ada_ensure_varsize_limit (field_type);
284614f0
JB
8167
8168 TYPE_FIELD_TYPE (rtype, f) = field_type;
4c4b4cd2 8169 TYPE_FIELD_NAME (rtype, f) = TYPE_FIELD_NAME (type, f);
27f2a97b
JB
8170 /* The multiplication can potentially overflow. But because
8171 the field length has been size-checked just above, and
8172 assuming that the maximum size is a reasonable value,
8173 an overflow should not happen in practice. So rather than
8174 adding overflow recovery code to this already complex code,
8175 we just assume that it's not going to happen. */
d94e4f4f 8176 fld_bit_len =
4c4b4cd2
PH
8177 TYPE_LENGTH (TYPE_FIELD_TYPE (rtype, f)) * TARGET_CHAR_BIT;
8178 }
14f9c5c9 8179 else
4c4b4cd2 8180 {
5ded5331
JB
8181 /* Note: If this field's type is a typedef, it is important
8182 to preserve the typedef layer.
8183
8184 Otherwise, we might be transforming a typedef to a fat
8185 pointer (encoding a pointer to an unconstrained array),
8186 into a basic fat pointer (encoding an unconstrained
8187 array). As both types are implemented using the same
8188 structure, the typedef is the only clue which allows us
8189 to distinguish between the two options. Stripping it
8190 would prevent us from printing this field appropriately. */
8191 TYPE_FIELD_TYPE (rtype, f) = TYPE_FIELD_TYPE (type, f);
4c4b4cd2
PH
8192 TYPE_FIELD_NAME (rtype, f) = TYPE_FIELD_NAME (type, f);
8193 if (TYPE_FIELD_BITSIZE (type, f) > 0)
d94e4f4f 8194 fld_bit_len =
4c4b4cd2
PH
8195 TYPE_FIELD_BITSIZE (rtype, f) = TYPE_FIELD_BITSIZE (type, f);
8196 else
5ded5331
JB
8197 {
8198 struct type *field_type = TYPE_FIELD_TYPE (type, f);
8199
8200 /* We need to be careful of typedefs when computing
8201 the length of our field. If this is a typedef,
8202 get the length of the target type, not the length
8203 of the typedef. */
78134374 8204 if (field_type->code () == TYPE_CODE_TYPEDEF)
5ded5331
JB
8205 field_type = ada_typedef_target_type (field_type);
8206
8207 fld_bit_len =
8208 TYPE_LENGTH (ada_check_typedef (field_type)) * TARGET_CHAR_BIT;
8209 }
4c4b4cd2 8210 }
14f9c5c9 8211 if (off + fld_bit_len > bit_len)
4c4b4cd2 8212 bit_len = off + fld_bit_len;
d94e4f4f 8213 off += fld_bit_len;
4c4b4cd2 8214 TYPE_LENGTH (rtype) =
a89febbd 8215 align_up (bit_len, TARGET_CHAR_BIT) / TARGET_CHAR_BIT;
14f9c5c9 8216 }
4c4b4cd2
PH
8217
8218 /* We handle the variant part, if any, at the end because of certain
b1f33ddd 8219 odd cases in which it is re-ordered so as NOT to be the last field of
4c4b4cd2
PH
8220 the record. This can happen in the presence of representation
8221 clauses. */
8222 if (variant_field >= 0)
8223 {
8224 struct type *branch_type;
8225
8226 off = TYPE_FIELD_BITPOS (rtype, variant_field);
8227
8228 if (dval0 == NULL)
9f1f738a 8229 {
012370f6
TT
8230 /* Using plain value_from_contents_and_address here causes
8231 problems because we will end up trying to resolve a type
8232 that is currently being constructed. */
8233 dval = value_from_contents_and_address_unresolved (rtype, valaddr,
8234 address);
9f1f738a
SA
8235 rtype = value_type (dval);
8236 }
4c4b4cd2
PH
8237 else
8238 dval = dval0;
8239
8240 branch_type =
8241 to_fixed_variant_branch_type
8242 (TYPE_FIELD_TYPE (type, variant_field),
8243 cond_offset_host (valaddr, off / TARGET_CHAR_BIT),
8244 cond_offset_target (address, off / TARGET_CHAR_BIT), dval);
8245 if (branch_type == NULL)
8246 {
8247 for (f = variant_field + 1; f < TYPE_NFIELDS (rtype); f += 1)
8248 TYPE_FIELDS (rtype)[f - 1] = TYPE_FIELDS (rtype)[f];
8249 TYPE_NFIELDS (rtype) -= 1;
8250 }
8251 else
8252 {
8253 TYPE_FIELD_TYPE (rtype, variant_field) = branch_type;
8254 TYPE_FIELD_NAME (rtype, variant_field) = "S";
8255 fld_bit_len =
8256 TYPE_LENGTH (TYPE_FIELD_TYPE (rtype, variant_field)) *
8257 TARGET_CHAR_BIT;
8258 if (off + fld_bit_len > bit_len)
8259 bit_len = off + fld_bit_len;
8260 TYPE_LENGTH (rtype) =
a89febbd 8261 align_up (bit_len, TARGET_CHAR_BIT) / TARGET_CHAR_BIT;
4c4b4cd2
PH
8262 }
8263 }
8264
714e53ab
PH
8265 /* According to exp_dbug.ads, the size of TYPE for variable-size records
8266 should contain the alignment of that record, which should be a strictly
8267 positive value. If null or negative, then something is wrong, most
8268 probably in the debug info. In that case, we don't round up the size
0963b4bd 8269 of the resulting type. If this record is not part of another structure,
714e53ab
PH
8270 the current RTYPE length might be good enough for our purposes. */
8271 if (TYPE_LENGTH (type) <= 0)
8272 {
7d93a1e0 8273 if (rtype->name ())
cc1defb1 8274 warning (_("Invalid type size for `%s' detected: %s."),
7d93a1e0 8275 rtype->name (), pulongest (TYPE_LENGTH (type)));
323e0a4a 8276 else
cc1defb1
KS
8277 warning (_("Invalid type size for <unnamed> detected: %s."),
8278 pulongest (TYPE_LENGTH (type)));
714e53ab
PH
8279 }
8280 else
8281 {
a89febbd
TT
8282 TYPE_LENGTH (rtype) = align_up (TYPE_LENGTH (rtype),
8283 TYPE_LENGTH (type));
714e53ab 8284 }
14f9c5c9
AS
8285
8286 value_free_to_mark (mark);
d2e4a39e 8287 if (TYPE_LENGTH (rtype) > varsize_limit)
323e0a4a 8288 error (_("record type with dynamic size is larger than varsize-limit"));
14f9c5c9
AS
8289 return rtype;
8290}
8291
4c4b4cd2
PH
8292/* As for ada_template_to_fixed_record_type_1 with KEEP_DYNAMIC_FIELDS
8293 of 1. */
14f9c5c9 8294
d2e4a39e 8295static struct type *
fc1a4b47 8296template_to_fixed_record_type (struct type *type, const gdb_byte *valaddr,
4c4b4cd2
PH
8297 CORE_ADDR address, struct value *dval0)
8298{
8299 return ada_template_to_fixed_record_type_1 (type, valaddr,
8300 address, dval0, 1);
8301}
8302
8303/* An ordinary record type in which ___XVL-convention fields and
8304 ___XVU- and ___XVN-convention field types in TYPE0 are replaced with
8305 static approximations, containing all possible fields. Uses
8306 no runtime values. Useless for use in values, but that's OK,
8307 since the results are used only for type determinations. Works on both
8308 structs and unions. Representation note: to save space, we memorize
8309 the result of this function in the TYPE_TARGET_TYPE of the
8310 template type. */
8311
8312static struct type *
8313template_to_static_fixed_type (struct type *type0)
14f9c5c9
AS
8314{
8315 struct type *type;
8316 int nfields;
8317 int f;
8318
9e195661
PMR
8319 /* No need no do anything if the input type is already fixed. */
8320 if (TYPE_FIXED_INSTANCE (type0))
8321 return type0;
8322
8323 /* Likewise if we already have computed the static approximation. */
4c4b4cd2
PH
8324 if (TYPE_TARGET_TYPE (type0) != NULL)
8325 return TYPE_TARGET_TYPE (type0);
8326
9e195661 8327 /* Don't clone TYPE0 until we are sure we are going to need a copy. */
4c4b4cd2 8328 type = type0;
9e195661
PMR
8329 nfields = TYPE_NFIELDS (type0);
8330
8331 /* Whether or not we cloned TYPE0, cache the result so that we don't do
8332 recompute all over next time. */
8333 TYPE_TARGET_TYPE (type0) = type;
14f9c5c9
AS
8334
8335 for (f = 0; f < nfields; f += 1)
8336 {
460efde1 8337 struct type *field_type = TYPE_FIELD_TYPE (type0, f);
4c4b4cd2 8338 struct type *new_type;
14f9c5c9 8339
4c4b4cd2 8340 if (is_dynamic_field (type0, f))
460efde1
JB
8341 {
8342 field_type = ada_check_typedef (field_type);
8343 new_type = to_static_fixed_type (TYPE_TARGET_TYPE (field_type));
8344 }
14f9c5c9 8345 else
f192137b 8346 new_type = static_unwrap_type (field_type);
9e195661
PMR
8347
8348 if (new_type != field_type)
8349 {
8350 /* Clone TYPE0 only the first time we get a new field type. */
8351 if (type == type0)
8352 {
8353 TYPE_TARGET_TYPE (type0) = type = alloc_type_copy (type0);
78134374 8354 type->set_code (type0->code ());
8ecb59f8 8355 INIT_NONE_SPECIFIC (type);
9e195661
PMR
8356 TYPE_NFIELDS (type) = nfields;
8357 TYPE_FIELDS (type) = (struct field *)
8358 TYPE_ALLOC (type, nfields * sizeof (struct field));
8359 memcpy (TYPE_FIELDS (type), TYPE_FIELDS (type0),
8360 sizeof (struct field) * nfields);
d0e39ea2 8361 type->set_name (ada_type_name (type0));
9e195661
PMR
8362 TYPE_FIXED_INSTANCE (type) = 1;
8363 TYPE_LENGTH (type) = 0;
8364 }
8365 TYPE_FIELD_TYPE (type, f) = new_type;
8366 TYPE_FIELD_NAME (type, f) = TYPE_FIELD_NAME (type0, f);
8367 }
14f9c5c9 8368 }
9e195661 8369
14f9c5c9
AS
8370 return type;
8371}
8372
4c4b4cd2 8373/* Given an object of type TYPE whose contents are at VALADDR and
5823c3ef
JB
8374 whose address in memory is ADDRESS, returns a revision of TYPE,
8375 which should be a non-dynamic-sized record, in which the variant
8376 part, if any, is replaced with the appropriate branch. Looks
4c4b4cd2
PH
8377 for discriminant values in DVAL0, which can be NULL if the record
8378 contains the necessary discriminant values. */
8379
d2e4a39e 8380static struct type *
fc1a4b47 8381to_record_with_fixed_variant_part (struct type *type, const gdb_byte *valaddr,
4c4b4cd2 8382 CORE_ADDR address, struct value *dval0)
14f9c5c9 8383{
d2e4a39e 8384 struct value *mark = value_mark ();
4c4b4cd2 8385 struct value *dval;
d2e4a39e 8386 struct type *rtype;
14f9c5c9
AS
8387 struct type *branch_type;
8388 int nfields = TYPE_NFIELDS (type);
4c4b4cd2 8389 int variant_field = variant_field_index (type);
14f9c5c9 8390
4c4b4cd2 8391 if (variant_field == -1)
14f9c5c9
AS
8392 return type;
8393
4c4b4cd2 8394 if (dval0 == NULL)
9f1f738a
SA
8395 {
8396 dval = value_from_contents_and_address (type, valaddr, address);
8397 type = value_type (dval);
8398 }
4c4b4cd2
PH
8399 else
8400 dval = dval0;
8401
e9bb382b 8402 rtype = alloc_type_copy (type);
67607e24 8403 rtype->set_code (TYPE_CODE_STRUCT);
8ecb59f8 8404 INIT_NONE_SPECIFIC (rtype);
4c4b4cd2 8405 TYPE_NFIELDS (rtype) = nfields;
d2e4a39e
AS
8406 TYPE_FIELDS (rtype) =
8407 (struct field *) TYPE_ALLOC (rtype, nfields * sizeof (struct field));
8408 memcpy (TYPE_FIELDS (rtype), TYPE_FIELDS (type),
4c4b4cd2 8409 sizeof (struct field) * nfields);
d0e39ea2 8410 rtype->set_name (ada_type_name (type));
876cecd0 8411 TYPE_FIXED_INSTANCE (rtype) = 1;
14f9c5c9
AS
8412 TYPE_LENGTH (rtype) = TYPE_LENGTH (type);
8413
4c4b4cd2
PH
8414 branch_type = to_fixed_variant_branch_type
8415 (TYPE_FIELD_TYPE (type, variant_field),
d2e4a39e 8416 cond_offset_host (valaddr,
4c4b4cd2
PH
8417 TYPE_FIELD_BITPOS (type, variant_field)
8418 / TARGET_CHAR_BIT),
d2e4a39e 8419 cond_offset_target (address,
4c4b4cd2
PH
8420 TYPE_FIELD_BITPOS (type, variant_field)
8421 / TARGET_CHAR_BIT), dval);
d2e4a39e 8422 if (branch_type == NULL)
14f9c5c9 8423 {
4c4b4cd2 8424 int f;
5b4ee69b 8425
4c4b4cd2
PH
8426 for (f = variant_field + 1; f < nfields; f += 1)
8427 TYPE_FIELDS (rtype)[f - 1] = TYPE_FIELDS (rtype)[f];
14f9c5c9 8428 TYPE_NFIELDS (rtype) -= 1;
14f9c5c9
AS
8429 }
8430 else
8431 {
4c4b4cd2
PH
8432 TYPE_FIELD_TYPE (rtype, variant_field) = branch_type;
8433 TYPE_FIELD_NAME (rtype, variant_field) = "S";
8434 TYPE_FIELD_BITSIZE (rtype, variant_field) = 0;
14f9c5c9 8435 TYPE_LENGTH (rtype) += TYPE_LENGTH (branch_type);
14f9c5c9 8436 }
4c4b4cd2 8437 TYPE_LENGTH (rtype) -= TYPE_LENGTH (TYPE_FIELD_TYPE (type, variant_field));
d2e4a39e 8438
4c4b4cd2 8439 value_free_to_mark (mark);
14f9c5c9
AS
8440 return rtype;
8441}
8442
8443/* An ordinary record type (with fixed-length fields) that describes
8444 the value at (TYPE0, VALADDR, ADDRESS) [see explanation at
8445 beginning of this section]. Any necessary discriminants' values
4c4b4cd2
PH
8446 should be in DVAL, a record value; it may be NULL if the object
8447 at ADDR itself contains any necessary discriminant values.
8448 Additionally, VALADDR and ADDRESS may also be NULL if no discriminant
8449 values from the record are needed. Except in the case that DVAL,
8450 VALADDR, and ADDRESS are all 0 or NULL, a variant field (unless
8451 unchecked) is replaced by a particular branch of the variant.
8452
8453 NOTE: the case in which DVAL and VALADDR are NULL and ADDRESS is 0
8454 is questionable and may be removed. It can arise during the
8455 processing of an unconstrained-array-of-record type where all the
8456 variant branches have exactly the same size. This is because in
8457 such cases, the compiler does not bother to use the XVS convention
8458 when encoding the record. I am currently dubious of this
8459 shortcut and suspect the compiler should be altered. FIXME. */
14f9c5c9 8460
d2e4a39e 8461static struct type *
fc1a4b47 8462to_fixed_record_type (struct type *type0, const gdb_byte *valaddr,
4c4b4cd2 8463 CORE_ADDR address, struct value *dval)
14f9c5c9 8464{
d2e4a39e 8465 struct type *templ_type;
14f9c5c9 8466
876cecd0 8467 if (TYPE_FIXED_INSTANCE (type0))
4c4b4cd2
PH
8468 return type0;
8469
d2e4a39e 8470 templ_type = dynamic_template_type (type0);
14f9c5c9
AS
8471
8472 if (templ_type != NULL)
8473 return template_to_fixed_record_type (templ_type, valaddr, address, dval);
4c4b4cd2
PH
8474 else if (variant_field_index (type0) >= 0)
8475 {
8476 if (dval == NULL && valaddr == NULL && address == 0)
8477 return type0;
8478 return to_record_with_fixed_variant_part (type0, valaddr, address,
8479 dval);
8480 }
14f9c5c9
AS
8481 else
8482 {
876cecd0 8483 TYPE_FIXED_INSTANCE (type0) = 1;
14f9c5c9
AS
8484 return type0;
8485 }
8486
8487}
8488
8489/* An ordinary record type (with fixed-length fields) that describes
8490 the value at (VAR_TYPE0, VALADDR, ADDRESS), where VAR_TYPE0 is a
8491 union type. Any necessary discriminants' values should be in DVAL,
8492 a record value. That is, this routine selects the appropriate
8493 branch of the union at ADDR according to the discriminant value
b1f33ddd 8494 indicated in the union's type name. Returns VAR_TYPE0 itself if
0963b4bd 8495 it represents a variant subject to a pragma Unchecked_Union. */
14f9c5c9 8496
d2e4a39e 8497static struct type *
fc1a4b47 8498to_fixed_variant_branch_type (struct type *var_type0, const gdb_byte *valaddr,
4c4b4cd2 8499 CORE_ADDR address, struct value *dval)
14f9c5c9
AS
8500{
8501 int which;
d2e4a39e
AS
8502 struct type *templ_type;
8503 struct type *var_type;
14f9c5c9 8504
78134374 8505 if (var_type0->code () == TYPE_CODE_PTR)
14f9c5c9 8506 var_type = TYPE_TARGET_TYPE (var_type0);
d2e4a39e 8507 else
14f9c5c9
AS
8508 var_type = var_type0;
8509
8510 templ_type = ada_find_parallel_type (var_type, "___XVU");
8511
8512 if (templ_type != NULL)
8513 var_type = templ_type;
8514
b1f33ddd
JB
8515 if (is_unchecked_variant (var_type, value_type (dval)))
8516 return var_type0;
d8af9068 8517 which = ada_which_variant_applies (var_type, dval);
14f9c5c9
AS
8518
8519 if (which < 0)
e9bb382b 8520 return empty_record (var_type);
14f9c5c9 8521 else if (is_dynamic_field (var_type, which))
4c4b4cd2 8522 return to_fixed_record_type
d2e4a39e
AS
8523 (TYPE_TARGET_TYPE (TYPE_FIELD_TYPE (var_type, which)),
8524 valaddr, address, dval);
4c4b4cd2 8525 else if (variant_field_index (TYPE_FIELD_TYPE (var_type, which)) >= 0)
d2e4a39e
AS
8526 return
8527 to_fixed_record_type
8528 (TYPE_FIELD_TYPE (var_type, which), valaddr, address, dval);
14f9c5c9
AS
8529 else
8530 return TYPE_FIELD_TYPE (var_type, which);
8531}
8532
8908fca5
JB
8533/* Assuming RANGE_TYPE is a TYPE_CODE_RANGE, return nonzero if
8534 ENCODING_TYPE, a type following the GNAT conventions for discrete
8535 type encodings, only carries redundant information. */
8536
8537static int
8538ada_is_redundant_range_encoding (struct type *range_type,
8539 struct type *encoding_type)
8540{
108d56a4 8541 const char *bounds_str;
8908fca5
JB
8542 int n;
8543 LONGEST lo, hi;
8544
78134374 8545 gdb_assert (range_type->code () == TYPE_CODE_RANGE);
8908fca5 8546
78134374
SM
8547 if (get_base_type (range_type)->code ()
8548 != get_base_type (encoding_type)->code ())
005e2509
JB
8549 {
8550 /* The compiler probably used a simple base type to describe
8551 the range type instead of the range's actual base type,
8552 expecting us to get the real base type from the encoding
8553 anyway. In this situation, the encoding cannot be ignored
8554 as redundant. */
8555 return 0;
8556 }
8557
8908fca5
JB
8558 if (is_dynamic_type (range_type))
8559 return 0;
8560
7d93a1e0 8561 if (encoding_type->name () == NULL)
8908fca5
JB
8562 return 0;
8563
7d93a1e0 8564 bounds_str = strstr (encoding_type->name (), "___XDLU_");
8908fca5
JB
8565 if (bounds_str == NULL)
8566 return 0;
8567
8568 n = 8; /* Skip "___XDLU_". */
8569 if (!ada_scan_number (bounds_str, n, &lo, &n))
8570 return 0;
8571 if (TYPE_LOW_BOUND (range_type) != lo)
8572 return 0;
8573
8574 n += 2; /* Skip the "__" separator between the two bounds. */
8575 if (!ada_scan_number (bounds_str, n, &hi, &n))
8576 return 0;
8577 if (TYPE_HIGH_BOUND (range_type) != hi)
8578 return 0;
8579
8580 return 1;
8581}
8582
8583/* Given the array type ARRAY_TYPE, return nonzero if DESC_TYPE,
8584 a type following the GNAT encoding for describing array type
8585 indices, only carries redundant information. */
8586
8587static int
8588ada_is_redundant_index_type_desc (struct type *array_type,
8589 struct type *desc_type)
8590{
8591 struct type *this_layer = check_typedef (array_type);
8592 int i;
8593
8594 for (i = 0; i < TYPE_NFIELDS (desc_type); i++)
8595 {
8596 if (!ada_is_redundant_range_encoding (TYPE_INDEX_TYPE (this_layer),
8597 TYPE_FIELD_TYPE (desc_type, i)))
8598 return 0;
8599 this_layer = check_typedef (TYPE_TARGET_TYPE (this_layer));
8600 }
8601
8602 return 1;
8603}
8604
14f9c5c9
AS
8605/* Assuming that TYPE0 is an array type describing the type of a value
8606 at ADDR, and that DVAL describes a record containing any
8607 discriminants used in TYPE0, returns a type for the value that
8608 contains no dynamic components (that is, no components whose sizes
8609 are determined by run-time quantities). Unless IGNORE_TOO_BIG is
8610 true, gives an error message if the resulting type's size is over
4c4b4cd2 8611 varsize_limit. */
14f9c5c9 8612
d2e4a39e
AS
8613static struct type *
8614to_fixed_array_type (struct type *type0, struct value *dval,
4c4b4cd2 8615 int ignore_too_big)
14f9c5c9 8616{
d2e4a39e
AS
8617 struct type *index_type_desc;
8618 struct type *result;
ad82864c 8619 int constrained_packed_array_p;
931e5bc3 8620 static const char *xa_suffix = "___XA";
14f9c5c9 8621
b0dd7688 8622 type0 = ada_check_typedef (type0);
284614f0 8623 if (TYPE_FIXED_INSTANCE (type0))
4c4b4cd2 8624 return type0;
14f9c5c9 8625
ad82864c
JB
8626 constrained_packed_array_p = ada_is_constrained_packed_array_type (type0);
8627 if (constrained_packed_array_p)
8628 type0 = decode_constrained_packed_array_type (type0);
284614f0 8629
931e5bc3
JG
8630 index_type_desc = ada_find_parallel_type (type0, xa_suffix);
8631
8632 /* As mentioned in exp_dbug.ads, for non bit-packed arrays an
8633 encoding suffixed with 'P' may still be generated. If so,
8634 it should be used to find the XA type. */
8635
8636 if (index_type_desc == NULL)
8637 {
1da0522e 8638 const char *type_name = ada_type_name (type0);
931e5bc3 8639
1da0522e 8640 if (type_name != NULL)
931e5bc3 8641 {
1da0522e 8642 const int len = strlen (type_name);
931e5bc3
JG
8643 char *name = (char *) alloca (len + strlen (xa_suffix));
8644
1da0522e 8645 if (type_name[len - 1] == 'P')
931e5bc3 8646 {
1da0522e 8647 strcpy (name, type_name);
931e5bc3
JG
8648 strcpy (name + len - 1, xa_suffix);
8649 index_type_desc = ada_find_parallel_type_with_name (type0, name);
8650 }
8651 }
8652 }
8653
28c85d6c 8654 ada_fixup_array_indexes_type (index_type_desc);
8908fca5
JB
8655 if (index_type_desc != NULL
8656 && ada_is_redundant_index_type_desc (type0, index_type_desc))
8657 {
8658 /* Ignore this ___XA parallel type, as it does not bring any
8659 useful information. This allows us to avoid creating fixed
8660 versions of the array's index types, which would be identical
8661 to the original ones. This, in turn, can also help avoid
8662 the creation of fixed versions of the array itself. */
8663 index_type_desc = NULL;
8664 }
8665
14f9c5c9
AS
8666 if (index_type_desc == NULL)
8667 {
61ee279c 8668 struct type *elt_type0 = ada_check_typedef (TYPE_TARGET_TYPE (type0));
5b4ee69b 8669
14f9c5c9 8670 /* NOTE: elt_type---the fixed version of elt_type0---should never
4c4b4cd2
PH
8671 depend on the contents of the array in properly constructed
8672 debugging data. */
529cad9c
PH
8673 /* Create a fixed version of the array element type.
8674 We're not providing the address of an element here,
e1d5a0d2 8675 and thus the actual object value cannot be inspected to do
529cad9c
PH
8676 the conversion. This should not be a problem, since arrays of
8677 unconstrained objects are not allowed. In particular, all
8678 the elements of an array of a tagged type should all be of
8679 the same type specified in the debugging info. No need to
8680 consult the object tag. */
1ed6ede0 8681 struct type *elt_type = ada_to_fixed_type (elt_type0, 0, 0, dval, 1);
14f9c5c9 8682
284614f0
JB
8683 /* Make sure we always create a new array type when dealing with
8684 packed array types, since we're going to fix-up the array
8685 type length and element bitsize a little further down. */
ad82864c 8686 if (elt_type0 == elt_type && !constrained_packed_array_p)
4c4b4cd2 8687 result = type0;
14f9c5c9 8688 else
e9bb382b 8689 result = create_array_type (alloc_type_copy (type0),
4c4b4cd2 8690 elt_type, TYPE_INDEX_TYPE (type0));
14f9c5c9
AS
8691 }
8692 else
8693 {
8694 int i;
8695 struct type *elt_type0;
8696
8697 elt_type0 = type0;
8698 for (i = TYPE_NFIELDS (index_type_desc); i > 0; i -= 1)
4c4b4cd2 8699 elt_type0 = TYPE_TARGET_TYPE (elt_type0);
14f9c5c9
AS
8700
8701 /* NOTE: result---the fixed version of elt_type0---should never
4c4b4cd2
PH
8702 depend on the contents of the array in properly constructed
8703 debugging data. */
529cad9c
PH
8704 /* Create a fixed version of the array element type.
8705 We're not providing the address of an element here,
e1d5a0d2 8706 and thus the actual object value cannot be inspected to do
529cad9c
PH
8707 the conversion. This should not be a problem, since arrays of
8708 unconstrained objects are not allowed. In particular, all
8709 the elements of an array of a tagged type should all be of
8710 the same type specified in the debugging info. No need to
8711 consult the object tag. */
1ed6ede0
JB
8712 result =
8713 ada_to_fixed_type (ada_check_typedef (elt_type0), 0, 0, dval, 1);
1ce677a4
UW
8714
8715 elt_type0 = type0;
14f9c5c9 8716 for (i = TYPE_NFIELDS (index_type_desc) - 1; i >= 0; i -= 1)
4c4b4cd2
PH
8717 {
8718 struct type *range_type =
28c85d6c 8719 to_fixed_range_type (TYPE_FIELD_TYPE (index_type_desc, i), dval);
5b4ee69b 8720
e9bb382b 8721 result = create_array_type (alloc_type_copy (elt_type0),
4c4b4cd2 8722 result, range_type);
1ce677a4 8723 elt_type0 = TYPE_TARGET_TYPE (elt_type0);
4c4b4cd2 8724 }
d2e4a39e 8725 if (!ignore_too_big && TYPE_LENGTH (result) > varsize_limit)
323e0a4a 8726 error (_("array type with dynamic size is larger than varsize-limit"));
14f9c5c9
AS
8727 }
8728
2e6fda7d
JB
8729 /* We want to preserve the type name. This can be useful when
8730 trying to get the type name of a value that has already been
8731 printed (for instance, if the user did "print VAR; whatis $". */
7d93a1e0 8732 result->set_name (type0->name ());
2e6fda7d 8733
ad82864c 8734 if (constrained_packed_array_p)
284614f0
JB
8735 {
8736 /* So far, the resulting type has been created as if the original
8737 type was a regular (non-packed) array type. As a result, the
8738 bitsize of the array elements needs to be set again, and the array
8739 length needs to be recomputed based on that bitsize. */
8740 int len = TYPE_LENGTH (result) / TYPE_LENGTH (TYPE_TARGET_TYPE (result));
8741 int elt_bitsize = TYPE_FIELD_BITSIZE (type0, 0);
8742
8743 TYPE_FIELD_BITSIZE (result, 0) = TYPE_FIELD_BITSIZE (type0, 0);
8744 TYPE_LENGTH (result) = len * elt_bitsize / HOST_CHAR_BIT;
8745 if (TYPE_LENGTH (result) * HOST_CHAR_BIT < len * elt_bitsize)
8746 TYPE_LENGTH (result)++;
8747 }
8748
876cecd0 8749 TYPE_FIXED_INSTANCE (result) = 1;
14f9c5c9 8750 return result;
d2e4a39e 8751}
14f9c5c9
AS
8752
8753
8754/* A standard type (containing no dynamically sized components)
8755 corresponding to TYPE for the value (TYPE, VALADDR, ADDRESS)
8756 DVAL describes a record containing any discriminants used in TYPE0,
4c4b4cd2 8757 and may be NULL if there are none, or if the object of type TYPE at
529cad9c
PH
8758 ADDRESS or in VALADDR contains these discriminants.
8759
1ed6ede0
JB
8760 If CHECK_TAG is not null, in the case of tagged types, this function
8761 attempts to locate the object's tag and use it to compute the actual
8762 type. However, when ADDRESS is null, we cannot use it to determine the
8763 location of the tag, and therefore compute the tagged type's actual type.
8764 So we return the tagged type without consulting the tag. */
529cad9c 8765
f192137b
JB
8766static struct type *
8767ada_to_fixed_type_1 (struct type *type, const gdb_byte *valaddr,
1ed6ede0 8768 CORE_ADDR address, struct value *dval, int check_tag)
14f9c5c9 8769{
61ee279c 8770 type = ada_check_typedef (type);
8ecb59f8
TT
8771
8772 /* Only un-fixed types need to be handled here. */
8773 if (!HAVE_GNAT_AUX_INFO (type))
8774 return type;
8775
78134374 8776 switch (type->code ())
d2e4a39e
AS
8777 {
8778 default:
14f9c5c9 8779 return type;
d2e4a39e 8780 case TYPE_CODE_STRUCT:
4c4b4cd2 8781 {
76a01679 8782 struct type *static_type = to_static_fixed_type (type);
1ed6ede0
JB
8783 struct type *fixed_record_type =
8784 to_fixed_record_type (type, valaddr, address, NULL);
5b4ee69b 8785
529cad9c
PH
8786 /* If STATIC_TYPE is a tagged type and we know the object's address,
8787 then we can determine its tag, and compute the object's actual
0963b4bd 8788 type from there. Note that we have to use the fixed record
1ed6ede0
JB
8789 type (the parent part of the record may have dynamic fields
8790 and the way the location of _tag is expressed may depend on
8791 them). */
529cad9c 8792
1ed6ede0 8793 if (check_tag && address != 0 && ada_is_tagged_type (static_type, 0))
76a01679 8794 {
b50d69b5
JG
8795 struct value *tag =
8796 value_tag_from_contents_and_address
8797 (fixed_record_type,
8798 valaddr,
8799 address);
8800 struct type *real_type = type_from_tag (tag);
8801 struct value *obj =
8802 value_from_contents_and_address (fixed_record_type,
8803 valaddr,
8804 address);
9f1f738a 8805 fixed_record_type = value_type (obj);
76a01679 8806 if (real_type != NULL)
b50d69b5
JG
8807 return to_fixed_record_type
8808 (real_type, NULL,
8809 value_address (ada_tag_value_at_base_address (obj)), NULL);
76a01679 8810 }
4af88198
JB
8811
8812 /* Check to see if there is a parallel ___XVZ variable.
8813 If there is, then it provides the actual size of our type. */
8814 else if (ada_type_name (fixed_record_type) != NULL)
8815 {
0d5cff50 8816 const char *name = ada_type_name (fixed_record_type);
224c3ddb
SM
8817 char *xvz_name
8818 = (char *) alloca (strlen (name) + 7 /* "___XVZ\0" */);
eccab96d 8819 bool xvz_found = false;
4af88198
JB
8820 LONGEST size;
8821
88c15c34 8822 xsnprintf (xvz_name, strlen (name) + 7, "%s___XVZ", name);
a70b8144 8823 try
eccab96d
JB
8824 {
8825 xvz_found = get_int_var_value (xvz_name, size);
8826 }
230d2906 8827 catch (const gdb_exception_error &except)
eccab96d
JB
8828 {
8829 /* We found the variable, but somehow failed to read
8830 its value. Rethrow the same error, but with a little
8831 bit more information, to help the user understand
8832 what went wrong (Eg: the variable might have been
8833 optimized out). */
8834 throw_error (except.error,
8835 _("unable to read value of %s (%s)"),
3d6e9d23 8836 xvz_name, except.what ());
eccab96d 8837 }
eccab96d
JB
8838
8839 if (xvz_found && TYPE_LENGTH (fixed_record_type) != size)
4af88198
JB
8840 {
8841 fixed_record_type = copy_type (fixed_record_type);
8842 TYPE_LENGTH (fixed_record_type) = size;
8843
8844 /* The FIXED_RECORD_TYPE may have be a stub. We have
8845 observed this when the debugging info is STABS, and
8846 apparently it is something that is hard to fix.
8847
8848 In practice, we don't need the actual type definition
8849 at all, because the presence of the XVZ variable allows us
8850 to assume that there must be a XVS type as well, which we
8851 should be able to use later, when we need the actual type
8852 definition.
8853
8854 In the meantime, pretend that the "fixed" type we are
8855 returning is NOT a stub, because this can cause trouble
8856 when using this type to create new types targeting it.
8857 Indeed, the associated creation routines often check
8858 whether the target type is a stub and will try to replace
0963b4bd 8859 it, thus using a type with the wrong size. This, in turn,
4af88198
JB
8860 might cause the new type to have the wrong size too.
8861 Consider the case of an array, for instance, where the size
8862 of the array is computed from the number of elements in
8863 our array multiplied by the size of its element. */
8864 TYPE_STUB (fixed_record_type) = 0;
8865 }
8866 }
1ed6ede0 8867 return fixed_record_type;
4c4b4cd2 8868 }
d2e4a39e 8869 case TYPE_CODE_ARRAY:
4c4b4cd2 8870 return to_fixed_array_type (type, dval, 1);
d2e4a39e
AS
8871 case TYPE_CODE_UNION:
8872 if (dval == NULL)
4c4b4cd2 8873 return type;
d2e4a39e 8874 else
4c4b4cd2 8875 return to_fixed_variant_branch_type (type, valaddr, address, dval);
d2e4a39e 8876 }
14f9c5c9
AS
8877}
8878
f192137b
JB
8879/* The same as ada_to_fixed_type_1, except that it preserves the type
8880 if it is a TYPE_CODE_TYPEDEF of a type that is already fixed.
96dbd2c1
JB
8881
8882 The typedef layer needs be preserved in order to differentiate between
8883 arrays and array pointers when both types are implemented using the same
8884 fat pointer. In the array pointer case, the pointer is encoded as
8885 a typedef of the pointer type. For instance, considering:
8886
8887 type String_Access is access String;
8888 S1 : String_Access := null;
8889
8890 To the debugger, S1 is defined as a typedef of type String. But
8891 to the user, it is a pointer. So if the user tries to print S1,
8892 we should not dereference the array, but print the array address
8893 instead.
8894
8895 If we didn't preserve the typedef layer, we would lose the fact that
8896 the type is to be presented as a pointer (needs de-reference before
8897 being printed). And we would also use the source-level type name. */
f192137b
JB
8898
8899struct type *
8900ada_to_fixed_type (struct type *type, const gdb_byte *valaddr,
8901 CORE_ADDR address, struct value *dval, int check_tag)
8902
8903{
8904 struct type *fixed_type =
8905 ada_to_fixed_type_1 (type, valaddr, address, dval, check_tag);
8906
96dbd2c1
JB
8907 /* If TYPE is a typedef and its target type is the same as the FIXED_TYPE,
8908 then preserve the typedef layer.
8909
8910 Implementation note: We can only check the main-type portion of
8911 the TYPE and FIXED_TYPE, because eliminating the typedef layer
8912 from TYPE now returns a type that has the same instance flags
8913 as TYPE. For instance, if TYPE is a "typedef const", and its
8914 target type is a "struct", then the typedef elimination will return
8915 a "const" version of the target type. See check_typedef for more
8916 details about how the typedef layer elimination is done.
8917
8918 brobecker/2010-11-19: It seems to me that the only case where it is
8919 useful to preserve the typedef layer is when dealing with fat pointers.
8920 Perhaps, we could add a check for that and preserve the typedef layer
85102364 8921 only in that situation. But this seems unnecessary so far, probably
96dbd2c1
JB
8922 because we call check_typedef/ada_check_typedef pretty much everywhere.
8923 */
78134374 8924 if (type->code () == TYPE_CODE_TYPEDEF
720d1a40 8925 && (TYPE_MAIN_TYPE (ada_typedef_target_type (type))
96dbd2c1 8926 == TYPE_MAIN_TYPE (fixed_type)))
f192137b
JB
8927 return type;
8928
8929 return fixed_type;
8930}
8931
14f9c5c9 8932/* A standard (static-sized) type corresponding as well as possible to
4c4b4cd2 8933 TYPE0, but based on no runtime data. */
14f9c5c9 8934
d2e4a39e
AS
8935static struct type *
8936to_static_fixed_type (struct type *type0)
14f9c5c9 8937{
d2e4a39e 8938 struct type *type;
14f9c5c9
AS
8939
8940 if (type0 == NULL)
8941 return NULL;
8942
876cecd0 8943 if (TYPE_FIXED_INSTANCE (type0))
4c4b4cd2
PH
8944 return type0;
8945
61ee279c 8946 type0 = ada_check_typedef (type0);
d2e4a39e 8947
78134374 8948 switch (type0->code ())
14f9c5c9
AS
8949 {
8950 default:
8951 return type0;
8952 case TYPE_CODE_STRUCT:
8953 type = dynamic_template_type (type0);
d2e4a39e 8954 if (type != NULL)
4c4b4cd2
PH
8955 return template_to_static_fixed_type (type);
8956 else
8957 return template_to_static_fixed_type (type0);
14f9c5c9
AS
8958 case TYPE_CODE_UNION:
8959 type = ada_find_parallel_type (type0, "___XVU");
8960 if (type != NULL)
4c4b4cd2
PH
8961 return template_to_static_fixed_type (type);
8962 else
8963 return template_to_static_fixed_type (type0);
14f9c5c9
AS
8964 }
8965}
8966
4c4b4cd2
PH
8967/* A static approximation of TYPE with all type wrappers removed. */
8968
d2e4a39e
AS
8969static struct type *
8970static_unwrap_type (struct type *type)
14f9c5c9
AS
8971{
8972 if (ada_is_aligner_type (type))
8973 {
61ee279c 8974 struct type *type1 = TYPE_FIELD_TYPE (ada_check_typedef (type), 0);
14f9c5c9 8975 if (ada_type_name (type1) == NULL)
d0e39ea2 8976 type1->set_name (ada_type_name (type));
14f9c5c9
AS
8977
8978 return static_unwrap_type (type1);
8979 }
d2e4a39e 8980 else
14f9c5c9 8981 {
d2e4a39e 8982 struct type *raw_real_type = ada_get_base_type (type);
5b4ee69b 8983
d2e4a39e 8984 if (raw_real_type == type)
4c4b4cd2 8985 return type;
14f9c5c9 8986 else
4c4b4cd2 8987 return to_static_fixed_type (raw_real_type);
14f9c5c9
AS
8988 }
8989}
8990
8991/* In some cases, incomplete and private types require
4c4b4cd2 8992 cross-references that are not resolved as records (for example,
14f9c5c9
AS
8993 type Foo;
8994 type FooP is access Foo;
8995 V: FooP;
8996 type Foo is array ...;
4c4b4cd2 8997 ). In these cases, since there is no mechanism for producing
14f9c5c9
AS
8998 cross-references to such types, we instead substitute for FooP a
8999 stub enumeration type that is nowhere resolved, and whose tag is
4c4b4cd2 9000 the name of the actual type. Call these types "non-record stubs". */
14f9c5c9
AS
9001
9002/* A type equivalent to TYPE that is not a non-record stub, if one
4c4b4cd2
PH
9003 exists, otherwise TYPE. */
9004
d2e4a39e 9005struct type *
61ee279c 9006ada_check_typedef (struct type *type)
14f9c5c9 9007{
727e3d2e
JB
9008 if (type == NULL)
9009 return NULL;
9010
736ade86
XR
9011 /* If our type is an access to an unconstrained array, which is encoded
9012 as a TYPE_CODE_TYPEDEF of a fat pointer, then we're done.
720d1a40
JB
9013 We don't want to strip the TYPE_CODE_TYPDEF layer, because this is
9014 what allows us to distinguish between fat pointers that represent
9015 array types, and fat pointers that represent array access types
9016 (in both cases, the compiler implements them as fat pointers). */
736ade86 9017 if (ada_is_access_to_unconstrained_array (type))
720d1a40
JB
9018 return type;
9019
f168693b 9020 type = check_typedef (type);
78134374 9021 if (type == NULL || type->code () != TYPE_CODE_ENUM
529cad9c 9022 || !TYPE_STUB (type)
7d93a1e0 9023 || type->name () == NULL)
14f9c5c9 9024 return type;
d2e4a39e 9025 else
14f9c5c9 9026 {
7d93a1e0 9027 const char *name = type->name ();
d2e4a39e 9028 struct type *type1 = ada_find_any_type (name);
5b4ee69b 9029
05e522ef
JB
9030 if (type1 == NULL)
9031 return type;
9032
9033 /* TYPE1 might itself be a TYPE_CODE_TYPEDEF (this can happen with
9034 stubs pointing to arrays, as we don't create symbols for array
3a867c22
JB
9035 types, only for the typedef-to-array types). If that's the case,
9036 strip the typedef layer. */
78134374 9037 if (type1->code () == TYPE_CODE_TYPEDEF)
3a867c22
JB
9038 type1 = ada_check_typedef (type1);
9039
9040 return type1;
14f9c5c9
AS
9041 }
9042}
9043
9044/* A value representing the data at VALADDR/ADDRESS as described by
9045 type TYPE0, but with a standard (static-sized) type that correctly
9046 describes it. If VAL0 is not NULL and TYPE0 already is a standard
9047 type, then return VAL0 [this feature is simply to avoid redundant
4c4b4cd2 9048 creation of struct values]. */
14f9c5c9 9049
4c4b4cd2
PH
9050static struct value *
9051ada_to_fixed_value_create (struct type *type0, CORE_ADDR address,
9052 struct value *val0)
14f9c5c9 9053{
1ed6ede0 9054 struct type *type = ada_to_fixed_type (type0, 0, address, NULL, 1);
5b4ee69b 9055
14f9c5c9
AS
9056 if (type == type0 && val0 != NULL)
9057 return val0;
cc0e770c
JB
9058
9059 if (VALUE_LVAL (val0) != lval_memory)
9060 {
9061 /* Our value does not live in memory; it could be a convenience
9062 variable, for instance. Create a not_lval value using val0's
9063 contents. */
9064 return value_from_contents (type, value_contents (val0));
9065 }
9066
9067 return value_from_contents_and_address (type, 0, address);
4c4b4cd2
PH
9068}
9069
9070/* A value representing VAL, but with a standard (static-sized) type
9071 that correctly describes it. Does not necessarily create a new
9072 value. */
9073
0c3acc09 9074struct value *
4c4b4cd2
PH
9075ada_to_fixed_value (struct value *val)
9076{
c48db5ca 9077 val = unwrap_value (val);
d8ce9127 9078 val = ada_to_fixed_value_create (value_type (val), value_address (val), val);
c48db5ca 9079 return val;
14f9c5c9 9080}
d2e4a39e 9081\f
14f9c5c9 9082
14f9c5c9
AS
9083/* Attributes */
9084
4c4b4cd2
PH
9085/* Table mapping attribute numbers to names.
9086 NOTE: Keep up to date with enum ada_attribute definition in ada-lang.h. */
14f9c5c9 9087
d2e4a39e 9088static const char *attribute_names[] = {
14f9c5c9
AS
9089 "<?>",
9090
d2e4a39e 9091 "first",
14f9c5c9
AS
9092 "last",
9093 "length",
9094 "image",
14f9c5c9
AS
9095 "max",
9096 "min",
4c4b4cd2
PH
9097 "modulus",
9098 "pos",
9099 "size",
9100 "tag",
14f9c5c9 9101 "val",
14f9c5c9
AS
9102 0
9103};
9104
de93309a 9105static const char *
4c4b4cd2 9106ada_attribute_name (enum exp_opcode n)
14f9c5c9 9107{
4c4b4cd2
PH
9108 if (n >= OP_ATR_FIRST && n <= (int) OP_ATR_VAL)
9109 return attribute_names[n - OP_ATR_FIRST + 1];
14f9c5c9
AS
9110 else
9111 return attribute_names[0];
9112}
9113
4c4b4cd2 9114/* Evaluate the 'POS attribute applied to ARG. */
14f9c5c9 9115
4c4b4cd2
PH
9116static LONGEST
9117pos_atr (struct value *arg)
14f9c5c9 9118{
24209737
PH
9119 struct value *val = coerce_ref (arg);
9120 struct type *type = value_type (val);
aa715135 9121 LONGEST result;
14f9c5c9 9122
d2e4a39e 9123 if (!discrete_type_p (type))
323e0a4a 9124 error (_("'POS only defined on discrete types"));
14f9c5c9 9125
aa715135
JG
9126 if (!discrete_position (type, value_as_long (val), &result))
9127 error (_("enumeration value is invalid: can't find 'POS"));
14f9c5c9 9128
aa715135 9129 return result;
4c4b4cd2
PH
9130}
9131
9132static struct value *
3cb382c9 9133value_pos_atr (struct type *type, struct value *arg)
4c4b4cd2 9134{
3cb382c9 9135 return value_from_longest (type, pos_atr (arg));
14f9c5c9
AS
9136}
9137
4c4b4cd2 9138/* Evaluate the TYPE'VAL attribute applied to ARG. */
14f9c5c9 9139
d2e4a39e
AS
9140static struct value *
9141value_val_atr (struct type *type, struct value *arg)
14f9c5c9 9142{
d2e4a39e 9143 if (!discrete_type_p (type))
323e0a4a 9144 error (_("'VAL only defined on discrete types"));
df407dfe 9145 if (!integer_type_p (value_type (arg)))
323e0a4a 9146 error (_("'VAL requires integral argument"));
14f9c5c9 9147
78134374 9148 if (type->code () == TYPE_CODE_ENUM)
14f9c5c9
AS
9149 {
9150 long pos = value_as_long (arg);
5b4ee69b 9151
14f9c5c9 9152 if (pos < 0 || pos >= TYPE_NFIELDS (type))
323e0a4a 9153 error (_("argument to 'VAL out of range"));
14e75d8e 9154 return value_from_longest (type, TYPE_FIELD_ENUMVAL (type, pos));
14f9c5c9
AS
9155 }
9156 else
9157 return value_from_longest (type, value_as_long (arg));
9158}
14f9c5c9 9159\f
d2e4a39e 9160
4c4b4cd2 9161 /* Evaluation */
14f9c5c9 9162
4c4b4cd2
PH
9163/* True if TYPE appears to be an Ada character type.
9164 [At the moment, this is true only for Character and Wide_Character;
9165 It is a heuristic test that could stand improvement]. */
14f9c5c9 9166
fc913e53 9167bool
d2e4a39e 9168ada_is_character_type (struct type *type)
14f9c5c9 9169{
7b9f71f2
JB
9170 const char *name;
9171
9172 /* If the type code says it's a character, then assume it really is,
9173 and don't check any further. */
78134374 9174 if (type->code () == TYPE_CODE_CHAR)
fc913e53 9175 return true;
7b9f71f2
JB
9176
9177 /* Otherwise, assume it's a character type iff it is a discrete type
9178 with a known character type name. */
9179 name = ada_type_name (type);
9180 return (name != NULL
78134374
SM
9181 && (type->code () == TYPE_CODE_INT
9182 || type->code () == TYPE_CODE_RANGE)
7b9f71f2
JB
9183 && (strcmp (name, "character") == 0
9184 || strcmp (name, "wide_character") == 0
5a517ebd 9185 || strcmp (name, "wide_wide_character") == 0
7b9f71f2 9186 || strcmp (name, "unsigned char") == 0));
14f9c5c9
AS
9187}
9188
4c4b4cd2 9189/* True if TYPE appears to be an Ada string type. */
14f9c5c9 9190
fc913e53 9191bool
ebf56fd3 9192ada_is_string_type (struct type *type)
14f9c5c9 9193{
61ee279c 9194 type = ada_check_typedef (type);
d2e4a39e 9195 if (type != NULL
78134374 9196 && type->code () != TYPE_CODE_PTR
76a01679
JB
9197 && (ada_is_simple_array_type (type)
9198 || ada_is_array_descriptor_type (type))
14f9c5c9
AS
9199 && ada_array_arity (type) == 1)
9200 {
9201 struct type *elttype = ada_array_element_type (type, 1);
9202
9203 return ada_is_character_type (elttype);
9204 }
d2e4a39e 9205 else
fc913e53 9206 return false;
14f9c5c9
AS
9207}
9208
5bf03f13
JB
9209/* The compiler sometimes provides a parallel XVS type for a given
9210 PAD type. Normally, it is safe to follow the PAD type directly,
9211 but older versions of the compiler have a bug that causes the offset
9212 of its "F" field to be wrong. Following that field in that case
9213 would lead to incorrect results, but this can be worked around
9214 by ignoring the PAD type and using the associated XVS type instead.
9215
9216 Set to True if the debugger should trust the contents of PAD types.
9217 Otherwise, ignore the PAD type if there is a parallel XVS type. */
491144b5 9218static bool trust_pad_over_xvs = true;
14f9c5c9
AS
9219
9220/* True if TYPE is a struct type introduced by the compiler to force the
9221 alignment of a value. Such types have a single field with a
4c4b4cd2 9222 distinctive name. */
14f9c5c9
AS
9223
9224int
ebf56fd3 9225ada_is_aligner_type (struct type *type)
14f9c5c9 9226{
61ee279c 9227 type = ada_check_typedef (type);
714e53ab 9228
5bf03f13 9229 if (!trust_pad_over_xvs && ada_find_parallel_type (type, "___XVS") != NULL)
714e53ab
PH
9230 return 0;
9231
78134374 9232 return (type->code () == TYPE_CODE_STRUCT
4c4b4cd2
PH
9233 && TYPE_NFIELDS (type) == 1
9234 && strcmp (TYPE_FIELD_NAME (type, 0), "F") == 0);
14f9c5c9
AS
9235}
9236
9237/* If there is an ___XVS-convention type parallel to SUBTYPE, return
4c4b4cd2 9238 the parallel type. */
14f9c5c9 9239
d2e4a39e
AS
9240struct type *
9241ada_get_base_type (struct type *raw_type)
14f9c5c9 9242{
d2e4a39e
AS
9243 struct type *real_type_namer;
9244 struct type *raw_real_type;
14f9c5c9 9245
78134374 9246 if (raw_type == NULL || raw_type->code () != TYPE_CODE_STRUCT)
14f9c5c9
AS
9247 return raw_type;
9248
284614f0
JB
9249 if (ada_is_aligner_type (raw_type))
9250 /* The encoding specifies that we should always use the aligner type.
9251 So, even if this aligner type has an associated XVS type, we should
9252 simply ignore it.
9253
9254 According to the compiler gurus, an XVS type parallel to an aligner
9255 type may exist because of a stabs limitation. In stabs, aligner
9256 types are empty because the field has a variable-sized type, and
9257 thus cannot actually be used as an aligner type. As a result,
9258 we need the associated parallel XVS type to decode the type.
9259 Since the policy in the compiler is to not change the internal
9260 representation based on the debugging info format, we sometimes
9261 end up having a redundant XVS type parallel to the aligner type. */
9262 return raw_type;
9263
14f9c5c9 9264 real_type_namer = ada_find_parallel_type (raw_type, "___XVS");
d2e4a39e 9265 if (real_type_namer == NULL
78134374 9266 || real_type_namer->code () != TYPE_CODE_STRUCT
14f9c5c9
AS
9267 || TYPE_NFIELDS (real_type_namer) != 1)
9268 return raw_type;
9269
78134374 9270 if (TYPE_FIELD_TYPE (real_type_namer, 0)->code () != TYPE_CODE_REF)
f80d3ff2
JB
9271 {
9272 /* This is an older encoding form where the base type needs to be
85102364 9273 looked up by name. We prefer the newer encoding because it is
f80d3ff2
JB
9274 more efficient. */
9275 raw_real_type = ada_find_any_type (TYPE_FIELD_NAME (real_type_namer, 0));
9276 if (raw_real_type == NULL)
9277 return raw_type;
9278 else
9279 return raw_real_type;
9280 }
9281
9282 /* The field in our XVS type is a reference to the base type. */
9283 return TYPE_TARGET_TYPE (TYPE_FIELD_TYPE (real_type_namer, 0));
d2e4a39e 9284}
14f9c5c9 9285
4c4b4cd2 9286/* The type of value designated by TYPE, with all aligners removed. */
14f9c5c9 9287
d2e4a39e
AS
9288struct type *
9289ada_aligned_type (struct type *type)
14f9c5c9
AS
9290{
9291 if (ada_is_aligner_type (type))
9292 return ada_aligned_type (TYPE_FIELD_TYPE (type, 0));
9293 else
9294 return ada_get_base_type (type);
9295}
9296
9297
9298/* The address of the aligned value in an object at address VALADDR
4c4b4cd2 9299 having type TYPE. Assumes ada_is_aligner_type (TYPE). */
14f9c5c9 9300
fc1a4b47
AC
9301const gdb_byte *
9302ada_aligned_value_addr (struct type *type, const gdb_byte *valaddr)
14f9c5c9 9303{
d2e4a39e 9304 if (ada_is_aligner_type (type))
14f9c5c9 9305 return ada_aligned_value_addr (TYPE_FIELD_TYPE (type, 0),
4c4b4cd2
PH
9306 valaddr +
9307 TYPE_FIELD_BITPOS (type,
9308 0) / TARGET_CHAR_BIT);
14f9c5c9
AS
9309 else
9310 return valaddr;
9311}
9312
4c4b4cd2
PH
9313
9314
14f9c5c9 9315/* The printed representation of an enumeration literal with encoded
4c4b4cd2 9316 name NAME. The value is good to the next call of ada_enum_name. */
d2e4a39e
AS
9317const char *
9318ada_enum_name (const char *name)
14f9c5c9 9319{
4c4b4cd2
PH
9320 static char *result;
9321 static size_t result_len = 0;
e6a959d6 9322 const char *tmp;
14f9c5c9 9323
4c4b4cd2
PH
9324 /* First, unqualify the enumeration name:
9325 1. Search for the last '.' character. If we find one, then skip
177b42fe 9326 all the preceding characters, the unqualified name starts
76a01679 9327 right after that dot.
4c4b4cd2 9328 2. Otherwise, we may be debugging on a target where the compiler
76a01679
JB
9329 translates dots into "__". Search forward for double underscores,
9330 but stop searching when we hit an overloading suffix, which is
9331 of the form "__" followed by digits. */
4c4b4cd2 9332
c3e5cd34
PH
9333 tmp = strrchr (name, '.');
9334 if (tmp != NULL)
4c4b4cd2
PH
9335 name = tmp + 1;
9336 else
14f9c5c9 9337 {
4c4b4cd2
PH
9338 while ((tmp = strstr (name, "__")) != NULL)
9339 {
9340 if (isdigit (tmp[2]))
9341 break;
9342 else
9343 name = tmp + 2;
9344 }
14f9c5c9
AS
9345 }
9346
9347 if (name[0] == 'Q')
9348 {
14f9c5c9 9349 int v;
5b4ee69b 9350
14f9c5c9 9351 if (name[1] == 'U' || name[1] == 'W')
4c4b4cd2
PH
9352 {
9353 if (sscanf (name + 2, "%x", &v) != 1)
9354 return name;
9355 }
272560b5
TT
9356 else if (((name[1] >= '0' && name[1] <= '9')
9357 || (name[1] >= 'a' && name[1] <= 'z'))
9358 && name[2] == '\0')
9359 {
9360 GROW_VECT (result, result_len, 4);
9361 xsnprintf (result, result_len, "'%c'", name[1]);
9362 return result;
9363 }
14f9c5c9 9364 else
4c4b4cd2 9365 return name;
14f9c5c9 9366
4c4b4cd2 9367 GROW_VECT (result, result_len, 16);
14f9c5c9 9368 if (isascii (v) && isprint (v))
88c15c34 9369 xsnprintf (result, result_len, "'%c'", v);
14f9c5c9 9370 else if (name[1] == 'U')
88c15c34 9371 xsnprintf (result, result_len, "[\"%02x\"]", v);
14f9c5c9 9372 else
88c15c34 9373 xsnprintf (result, result_len, "[\"%04x\"]", v);
14f9c5c9
AS
9374
9375 return result;
9376 }
d2e4a39e 9377 else
4c4b4cd2 9378 {
c3e5cd34
PH
9379 tmp = strstr (name, "__");
9380 if (tmp == NULL)
9381 tmp = strstr (name, "$");
9382 if (tmp != NULL)
4c4b4cd2
PH
9383 {
9384 GROW_VECT (result, result_len, tmp - name + 1);
9385 strncpy (result, name, tmp - name);
9386 result[tmp - name] = '\0';
9387 return result;
9388 }
9389
9390 return name;
9391 }
14f9c5c9
AS
9392}
9393
14f9c5c9
AS
9394/* Evaluate the subexpression of EXP starting at *POS as for
9395 evaluate_type, updating *POS to point just past the evaluated
4c4b4cd2 9396 expression. */
14f9c5c9 9397
d2e4a39e
AS
9398static struct value *
9399evaluate_subexp_type (struct expression *exp, int *pos)
14f9c5c9 9400{
4b27a620 9401 return evaluate_subexp (NULL_TYPE, exp, pos, EVAL_AVOID_SIDE_EFFECTS);
14f9c5c9
AS
9402}
9403
9404/* If VAL is wrapped in an aligner or subtype wrapper, return the
4c4b4cd2 9405 value it wraps. */
14f9c5c9 9406
d2e4a39e
AS
9407static struct value *
9408unwrap_value (struct value *val)
14f9c5c9 9409{
df407dfe 9410 struct type *type = ada_check_typedef (value_type (val));
5b4ee69b 9411
14f9c5c9
AS
9412 if (ada_is_aligner_type (type))
9413 {
de4d072f 9414 struct value *v = ada_value_struct_elt (val, "F", 0);
df407dfe 9415 struct type *val_type = ada_check_typedef (value_type (v));
5b4ee69b 9416
14f9c5c9 9417 if (ada_type_name (val_type) == NULL)
d0e39ea2 9418 val_type->set_name (ada_type_name (type));
14f9c5c9
AS
9419
9420 return unwrap_value (v);
9421 }
d2e4a39e 9422 else
14f9c5c9 9423 {
d2e4a39e 9424 struct type *raw_real_type =
61ee279c 9425 ada_check_typedef (ada_get_base_type (type));
d2e4a39e 9426
5bf03f13
JB
9427 /* If there is no parallel XVS or XVE type, then the value is
9428 already unwrapped. Return it without further modification. */
9429 if ((type == raw_real_type)
9430 && ada_find_parallel_type (type, "___XVE") == NULL)
9431 return val;
14f9c5c9 9432
d2e4a39e 9433 return
4c4b4cd2
PH
9434 coerce_unspec_val_to_type
9435 (val, ada_to_fixed_type (raw_real_type, 0,
42ae5230 9436 value_address (val),
1ed6ede0 9437 NULL, 1));
14f9c5c9
AS
9438 }
9439}
d2e4a39e
AS
9440
9441static struct value *
50eff16b 9442cast_from_fixed (struct type *type, struct value *arg)
14f9c5c9 9443{
50eff16b
UW
9444 struct value *scale = ada_scaling_factor (value_type (arg));
9445 arg = value_cast (value_type (scale), arg);
14f9c5c9 9446
50eff16b
UW
9447 arg = value_binop (arg, scale, BINOP_MUL);
9448 return value_cast (type, arg);
14f9c5c9
AS
9449}
9450
d2e4a39e 9451static struct value *
50eff16b 9452cast_to_fixed (struct type *type, struct value *arg)
14f9c5c9 9453{
50eff16b
UW
9454 if (type == value_type (arg))
9455 return arg;
5b4ee69b 9456
50eff16b 9457 struct value *scale = ada_scaling_factor (type);
b2188a06 9458 if (ada_is_gnat_encoded_fixed_point_type (value_type (arg)))
50eff16b
UW
9459 arg = cast_from_fixed (value_type (scale), arg);
9460 else
9461 arg = value_cast (value_type (scale), arg);
9462
9463 arg = value_binop (arg, scale, BINOP_DIV);
9464 return value_cast (type, arg);
14f9c5c9
AS
9465}
9466
d99dcf51
JB
9467/* Given two array types T1 and T2, return nonzero iff both arrays
9468 contain the same number of elements. */
9469
9470static int
9471ada_same_array_size_p (struct type *t1, struct type *t2)
9472{
9473 LONGEST lo1, hi1, lo2, hi2;
9474
9475 /* Get the array bounds in order to verify that the size of
9476 the two arrays match. */
9477 if (!get_array_bounds (t1, &lo1, &hi1)
9478 || !get_array_bounds (t2, &lo2, &hi2))
9479 error (_("unable to determine array bounds"));
9480
9481 /* To make things easier for size comparison, normalize a bit
9482 the case of empty arrays by making sure that the difference
9483 between upper bound and lower bound is always -1. */
9484 if (lo1 > hi1)
9485 hi1 = lo1 - 1;
9486 if (lo2 > hi2)
9487 hi2 = lo2 - 1;
9488
9489 return (hi1 - lo1 == hi2 - lo2);
9490}
9491
9492/* Assuming that VAL is an array of integrals, and TYPE represents
9493 an array with the same number of elements, but with wider integral
9494 elements, return an array "casted" to TYPE. In practice, this
9495 means that the returned array is built by casting each element
9496 of the original array into TYPE's (wider) element type. */
9497
9498static struct value *
9499ada_promote_array_of_integrals (struct type *type, struct value *val)
9500{
9501 struct type *elt_type = TYPE_TARGET_TYPE (type);
9502 LONGEST lo, hi;
9503 struct value *res;
9504 LONGEST i;
9505
9506 /* Verify that both val and type are arrays of scalars, and
9507 that the size of val's elements is smaller than the size
9508 of type's element. */
78134374 9509 gdb_assert (type->code () == TYPE_CODE_ARRAY);
d99dcf51 9510 gdb_assert (is_integral_type (TYPE_TARGET_TYPE (type)));
78134374 9511 gdb_assert (value_type (val)->code () == TYPE_CODE_ARRAY);
d99dcf51
JB
9512 gdb_assert (is_integral_type (TYPE_TARGET_TYPE (value_type (val))));
9513 gdb_assert (TYPE_LENGTH (TYPE_TARGET_TYPE (type))
9514 > TYPE_LENGTH (TYPE_TARGET_TYPE (value_type (val))));
9515
9516 if (!get_array_bounds (type, &lo, &hi))
9517 error (_("unable to determine array bounds"));
9518
9519 res = allocate_value (type);
9520
9521 /* Promote each array element. */
9522 for (i = 0; i < hi - lo + 1; i++)
9523 {
9524 struct value *elt = value_cast (elt_type, value_subscript (val, lo + i));
9525
9526 memcpy (value_contents_writeable (res) + (i * TYPE_LENGTH (elt_type)),
9527 value_contents_all (elt), TYPE_LENGTH (elt_type));
9528 }
9529
9530 return res;
9531}
9532
4c4b4cd2
PH
9533/* Coerce VAL as necessary for assignment to an lval of type TYPE, and
9534 return the converted value. */
9535
d2e4a39e
AS
9536static struct value *
9537coerce_for_assign (struct type *type, struct value *val)
14f9c5c9 9538{
df407dfe 9539 struct type *type2 = value_type (val);
5b4ee69b 9540
14f9c5c9
AS
9541 if (type == type2)
9542 return val;
9543
61ee279c
PH
9544 type2 = ada_check_typedef (type2);
9545 type = ada_check_typedef (type);
14f9c5c9 9546
78134374
SM
9547 if (type2->code () == TYPE_CODE_PTR
9548 && type->code () == TYPE_CODE_ARRAY)
14f9c5c9
AS
9549 {
9550 val = ada_value_ind (val);
df407dfe 9551 type2 = value_type (val);
14f9c5c9
AS
9552 }
9553
78134374
SM
9554 if (type2->code () == TYPE_CODE_ARRAY
9555 && type->code () == TYPE_CODE_ARRAY)
14f9c5c9 9556 {
d99dcf51
JB
9557 if (!ada_same_array_size_p (type, type2))
9558 error (_("cannot assign arrays of different length"));
9559
9560 if (is_integral_type (TYPE_TARGET_TYPE (type))
9561 && is_integral_type (TYPE_TARGET_TYPE (type2))
9562 && TYPE_LENGTH (TYPE_TARGET_TYPE (type2))
9563 < TYPE_LENGTH (TYPE_TARGET_TYPE (type)))
9564 {
9565 /* Allow implicit promotion of the array elements to
9566 a wider type. */
9567 return ada_promote_array_of_integrals (type, val);
9568 }
9569
9570 if (TYPE_LENGTH (TYPE_TARGET_TYPE (type2))
9571 != TYPE_LENGTH (TYPE_TARGET_TYPE (type)))
323e0a4a 9572 error (_("Incompatible types in assignment"));
04624583 9573 deprecated_set_value_type (val, type);
14f9c5c9 9574 }
d2e4a39e 9575 return val;
14f9c5c9
AS
9576}
9577
4c4b4cd2
PH
9578static struct value *
9579ada_value_binop (struct value *arg1, struct value *arg2, enum exp_opcode op)
9580{
9581 struct value *val;
9582 struct type *type1, *type2;
9583 LONGEST v, v1, v2;
9584
994b9211
AC
9585 arg1 = coerce_ref (arg1);
9586 arg2 = coerce_ref (arg2);
18af8284
JB
9587 type1 = get_base_type (ada_check_typedef (value_type (arg1)));
9588 type2 = get_base_type (ada_check_typedef (value_type (arg2)));
4c4b4cd2 9589
78134374
SM
9590 if (type1->code () != TYPE_CODE_INT
9591 || type2->code () != TYPE_CODE_INT)
4c4b4cd2
PH
9592 return value_binop (arg1, arg2, op);
9593
76a01679 9594 switch (op)
4c4b4cd2
PH
9595 {
9596 case BINOP_MOD:
9597 case BINOP_DIV:
9598 case BINOP_REM:
9599 break;
9600 default:
9601 return value_binop (arg1, arg2, op);
9602 }
9603
9604 v2 = value_as_long (arg2);
9605 if (v2 == 0)
323e0a4a 9606 error (_("second operand of %s must not be zero."), op_string (op));
4c4b4cd2
PH
9607
9608 if (TYPE_UNSIGNED (type1) || op == BINOP_MOD)
9609 return value_binop (arg1, arg2, op);
9610
9611 v1 = value_as_long (arg1);
9612 switch (op)
9613 {
9614 case BINOP_DIV:
9615 v = v1 / v2;
76a01679
JB
9616 if (!TRUNCATION_TOWARDS_ZERO && v1 * (v1 % v2) < 0)
9617 v += v > 0 ? -1 : 1;
4c4b4cd2
PH
9618 break;
9619 case BINOP_REM:
9620 v = v1 % v2;
76a01679
JB
9621 if (v * v1 < 0)
9622 v -= v2;
4c4b4cd2
PH
9623 break;
9624 default:
9625 /* Should not reach this point. */
9626 v = 0;
9627 }
9628
9629 val = allocate_value (type1);
990a07ab 9630 store_unsigned_integer (value_contents_raw (val),
e17a4113 9631 TYPE_LENGTH (value_type (val)),
34877895 9632 type_byte_order (type1), v);
4c4b4cd2
PH
9633 return val;
9634}
9635
9636static int
9637ada_value_equal (struct value *arg1, struct value *arg2)
9638{
df407dfe
AC
9639 if (ada_is_direct_array_type (value_type (arg1))
9640 || ada_is_direct_array_type (value_type (arg2)))
4c4b4cd2 9641 {
79e8fcaa
JB
9642 struct type *arg1_type, *arg2_type;
9643
f58b38bf
JB
9644 /* Automatically dereference any array reference before
9645 we attempt to perform the comparison. */
9646 arg1 = ada_coerce_ref (arg1);
9647 arg2 = ada_coerce_ref (arg2);
79e8fcaa 9648
4c4b4cd2
PH
9649 arg1 = ada_coerce_to_simple_array (arg1);
9650 arg2 = ada_coerce_to_simple_array (arg2);
79e8fcaa
JB
9651
9652 arg1_type = ada_check_typedef (value_type (arg1));
9653 arg2_type = ada_check_typedef (value_type (arg2));
9654
78134374
SM
9655 if (arg1_type->code () != TYPE_CODE_ARRAY
9656 || arg2_type->code () != TYPE_CODE_ARRAY)
323e0a4a 9657 error (_("Attempt to compare array with non-array"));
4c4b4cd2 9658 /* FIXME: The following works only for types whose
76a01679
JB
9659 representations use all bits (no padding or undefined bits)
9660 and do not have user-defined equality. */
79e8fcaa
JB
9661 return (TYPE_LENGTH (arg1_type) == TYPE_LENGTH (arg2_type)
9662 && memcmp (value_contents (arg1), value_contents (arg2),
9663 TYPE_LENGTH (arg1_type)) == 0);
4c4b4cd2
PH
9664 }
9665 return value_equal (arg1, arg2);
9666}
9667
52ce6436
PH
9668/* Total number of component associations in the aggregate starting at
9669 index PC in EXP. Assumes that index PC is the start of an
0963b4bd 9670 OP_AGGREGATE. */
52ce6436
PH
9671
9672static int
9673num_component_specs (struct expression *exp, int pc)
9674{
9675 int n, m, i;
5b4ee69b 9676
52ce6436
PH
9677 m = exp->elts[pc + 1].longconst;
9678 pc += 3;
9679 n = 0;
9680 for (i = 0; i < m; i += 1)
9681 {
9682 switch (exp->elts[pc].opcode)
9683 {
9684 default:
9685 n += 1;
9686 break;
9687 case OP_CHOICES:
9688 n += exp->elts[pc + 1].longconst;
9689 break;
9690 }
9691 ada_evaluate_subexp (NULL, exp, &pc, EVAL_SKIP);
9692 }
9693 return n;
9694}
9695
9696/* Assign the result of evaluating EXP starting at *POS to the INDEXth
9697 component of LHS (a simple array or a record), updating *POS past
9698 the expression, assuming that LHS is contained in CONTAINER. Does
9699 not modify the inferior's memory, nor does it modify LHS (unless
9700 LHS == CONTAINER). */
9701
9702static void
9703assign_component (struct value *container, struct value *lhs, LONGEST index,
9704 struct expression *exp, int *pos)
9705{
9706 struct value *mark = value_mark ();
9707 struct value *elt;
0e2da9f0 9708 struct type *lhs_type = check_typedef (value_type (lhs));
5b4ee69b 9709
78134374 9710 if (lhs_type->code () == TYPE_CODE_ARRAY)
52ce6436 9711 {
22601c15
UW
9712 struct type *index_type = builtin_type (exp->gdbarch)->builtin_int;
9713 struct value *index_val = value_from_longest (index_type, index);
5b4ee69b 9714
52ce6436
PH
9715 elt = unwrap_value (ada_value_subscript (lhs, 1, &index_val));
9716 }
9717 else
9718 {
9719 elt = ada_index_struct_field (index, lhs, 0, value_type (lhs));
c48db5ca 9720 elt = ada_to_fixed_value (elt);
52ce6436
PH
9721 }
9722
9723 if (exp->elts[*pos].opcode == OP_AGGREGATE)
9724 assign_aggregate (container, elt, exp, pos, EVAL_NORMAL);
9725 else
9726 value_assign_to_component (container, elt,
9727 ada_evaluate_subexp (NULL, exp, pos,
9728 EVAL_NORMAL));
9729
9730 value_free_to_mark (mark);
9731}
9732
9733/* Assuming that LHS represents an lvalue having a record or array
9734 type, and EXP->ELTS[*POS] is an OP_AGGREGATE, evaluate an assignment
9735 of that aggregate's value to LHS, advancing *POS past the
9736 aggregate. NOSIDE is as for evaluate_subexp. CONTAINER is an
9737 lvalue containing LHS (possibly LHS itself). Does not modify
9738 the inferior's memory, nor does it modify the contents of
0963b4bd 9739 LHS (unless == CONTAINER). Returns the modified CONTAINER. */
52ce6436
PH
9740
9741static struct value *
9742assign_aggregate (struct value *container,
9743 struct value *lhs, struct expression *exp,
9744 int *pos, enum noside noside)
9745{
9746 struct type *lhs_type;
9747 int n = exp->elts[*pos+1].longconst;
9748 LONGEST low_index, high_index;
9749 int num_specs;
9750 LONGEST *indices;
9751 int max_indices, num_indices;
52ce6436 9752 int i;
52ce6436
PH
9753
9754 *pos += 3;
9755 if (noside != EVAL_NORMAL)
9756 {
52ce6436
PH
9757 for (i = 0; i < n; i += 1)
9758 ada_evaluate_subexp (NULL, exp, pos, noside);
9759 return container;
9760 }
9761
9762 container = ada_coerce_ref (container);
9763 if (ada_is_direct_array_type (value_type (container)))
9764 container = ada_coerce_to_simple_array (container);
9765 lhs = ada_coerce_ref (lhs);
9766 if (!deprecated_value_modifiable (lhs))
9767 error (_("Left operand of assignment is not a modifiable lvalue."));
9768
0e2da9f0 9769 lhs_type = check_typedef (value_type (lhs));
52ce6436
PH
9770 if (ada_is_direct_array_type (lhs_type))
9771 {
9772 lhs = ada_coerce_to_simple_array (lhs);
0e2da9f0 9773 lhs_type = check_typedef (value_type (lhs));
52ce6436
PH
9774 low_index = TYPE_ARRAY_LOWER_BOUND_VALUE (lhs_type);
9775 high_index = TYPE_ARRAY_UPPER_BOUND_VALUE (lhs_type);
52ce6436 9776 }
78134374 9777 else if (lhs_type->code () == TYPE_CODE_STRUCT)
52ce6436
PH
9778 {
9779 low_index = 0;
9780 high_index = num_visible_fields (lhs_type) - 1;
52ce6436
PH
9781 }
9782 else
9783 error (_("Left-hand side must be array or record."));
9784
9785 num_specs = num_component_specs (exp, *pos - 3);
9786 max_indices = 4 * num_specs + 4;
8d749320 9787 indices = XALLOCAVEC (LONGEST, max_indices);
52ce6436
PH
9788 indices[0] = indices[1] = low_index - 1;
9789 indices[2] = indices[3] = high_index + 1;
9790 num_indices = 4;
9791
9792 for (i = 0; i < n; i += 1)
9793 {
9794 switch (exp->elts[*pos].opcode)
9795 {
1fbf5ada
JB
9796 case OP_CHOICES:
9797 aggregate_assign_from_choices (container, lhs, exp, pos, indices,
9798 &num_indices, max_indices,
9799 low_index, high_index);
9800 break;
9801 case OP_POSITIONAL:
9802 aggregate_assign_positional (container, lhs, exp, pos, indices,
52ce6436
PH
9803 &num_indices, max_indices,
9804 low_index, high_index);
1fbf5ada
JB
9805 break;
9806 case OP_OTHERS:
9807 if (i != n-1)
9808 error (_("Misplaced 'others' clause"));
9809 aggregate_assign_others (container, lhs, exp, pos, indices,
9810 num_indices, low_index, high_index);
9811 break;
9812 default:
9813 error (_("Internal error: bad aggregate clause"));
52ce6436
PH
9814 }
9815 }
9816
9817 return container;
9818}
9819
9820/* Assign into the component of LHS indexed by the OP_POSITIONAL
9821 construct at *POS, updating *POS past the construct, given that
9822 the positions are relative to lower bound LOW, where HIGH is the
9823 upper bound. Record the position in INDICES[0 .. MAX_INDICES-1]
9824 updating *NUM_INDICES as needed. CONTAINER is as for
0963b4bd 9825 assign_aggregate. */
52ce6436
PH
9826static void
9827aggregate_assign_positional (struct value *container,
9828 struct value *lhs, struct expression *exp,
9829 int *pos, LONGEST *indices, int *num_indices,
9830 int max_indices, LONGEST low, LONGEST high)
9831{
9832 LONGEST ind = longest_to_int (exp->elts[*pos + 1].longconst) + low;
9833
9834 if (ind - 1 == high)
e1d5a0d2 9835 warning (_("Extra components in aggregate ignored."));
52ce6436
PH
9836 if (ind <= high)
9837 {
9838 add_component_interval (ind, ind, indices, num_indices, max_indices);
9839 *pos += 3;
9840 assign_component (container, lhs, ind, exp, pos);
9841 }
9842 else
9843 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9844}
9845
9846/* Assign into the components of LHS indexed by the OP_CHOICES
9847 construct at *POS, updating *POS past the construct, given that
9848 the allowable indices are LOW..HIGH. Record the indices assigned
9849 to in INDICES[0 .. MAX_INDICES-1], updating *NUM_INDICES as
0963b4bd 9850 needed. CONTAINER is as for assign_aggregate. */
52ce6436
PH
9851static void
9852aggregate_assign_from_choices (struct value *container,
9853 struct value *lhs, struct expression *exp,
9854 int *pos, LONGEST *indices, int *num_indices,
9855 int max_indices, LONGEST low, LONGEST high)
9856{
9857 int j;
9858 int n_choices = longest_to_int (exp->elts[*pos+1].longconst);
9859 int choice_pos, expr_pc;
9860 int is_array = ada_is_direct_array_type (value_type (lhs));
9861
9862 choice_pos = *pos += 3;
9863
9864 for (j = 0; j < n_choices; j += 1)
9865 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9866 expr_pc = *pos;
9867 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9868
9869 for (j = 0; j < n_choices; j += 1)
9870 {
9871 LONGEST lower, upper;
9872 enum exp_opcode op = exp->elts[choice_pos].opcode;
5b4ee69b 9873
52ce6436
PH
9874 if (op == OP_DISCRETE_RANGE)
9875 {
9876 choice_pos += 1;
9877 lower = value_as_long (ada_evaluate_subexp (NULL, exp, pos,
9878 EVAL_NORMAL));
9879 upper = value_as_long (ada_evaluate_subexp (NULL, exp, pos,
9880 EVAL_NORMAL));
9881 }
9882 else if (is_array)
9883 {
9884 lower = value_as_long (ada_evaluate_subexp (NULL, exp, &choice_pos,
9885 EVAL_NORMAL));
9886 upper = lower;
9887 }
9888 else
9889 {
9890 int ind;
0d5cff50 9891 const char *name;
5b4ee69b 9892
52ce6436
PH
9893 switch (op)
9894 {
9895 case OP_NAME:
9896 name = &exp->elts[choice_pos + 2].string;
9897 break;
9898 case OP_VAR_VALUE:
987012b8 9899 name = exp->elts[choice_pos + 2].symbol->natural_name ();
52ce6436
PH
9900 break;
9901 default:
9902 error (_("Invalid record component association."));
9903 }
9904 ada_evaluate_subexp (NULL, exp, &choice_pos, EVAL_SKIP);
9905 ind = 0;
9906 if (! find_struct_field (name, value_type (lhs), 0,
9907 NULL, NULL, NULL, NULL, &ind))
9908 error (_("Unknown component name: %s."), name);
9909 lower = upper = ind;
9910 }
9911
9912 if (lower <= upper && (lower < low || upper > high))
9913 error (_("Index in component association out of bounds."));
9914
9915 add_component_interval (lower, upper, indices, num_indices,
9916 max_indices);
9917 while (lower <= upper)
9918 {
9919 int pos1;
5b4ee69b 9920
52ce6436
PH
9921 pos1 = expr_pc;
9922 assign_component (container, lhs, lower, exp, &pos1);
9923 lower += 1;
9924 }
9925 }
9926}
9927
9928/* Assign the value of the expression in the OP_OTHERS construct in
9929 EXP at *POS into the components of LHS indexed from LOW .. HIGH that
9930 have not been previously assigned. The index intervals already assigned
9931 are in INDICES[0 .. NUM_INDICES-1]. Updates *POS to after the
0963b4bd 9932 OP_OTHERS clause. CONTAINER is as for assign_aggregate. */
52ce6436
PH
9933static void
9934aggregate_assign_others (struct value *container,
9935 struct value *lhs, struct expression *exp,
9936 int *pos, LONGEST *indices, int num_indices,
9937 LONGEST low, LONGEST high)
9938{
9939 int i;
5ce64950 9940 int expr_pc = *pos + 1;
52ce6436
PH
9941
9942 for (i = 0; i < num_indices - 2; i += 2)
9943 {
9944 LONGEST ind;
5b4ee69b 9945
52ce6436
PH
9946 for (ind = indices[i + 1] + 1; ind < indices[i + 2]; ind += 1)
9947 {
5ce64950 9948 int localpos;
5b4ee69b 9949
5ce64950
MS
9950 localpos = expr_pc;
9951 assign_component (container, lhs, ind, exp, &localpos);
52ce6436
PH
9952 }
9953 }
9954 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9955}
9956
9957/* Add the interval [LOW .. HIGH] to the sorted set of intervals
9958 [ INDICES[0] .. INDICES[1] ],..., [ INDICES[*SIZE-2] .. INDICES[*SIZE-1] ],
9959 modifying *SIZE as needed. It is an error if *SIZE exceeds
9960 MAX_SIZE. The resulting intervals do not overlap. */
9961static void
9962add_component_interval (LONGEST low, LONGEST high,
9963 LONGEST* indices, int *size, int max_size)
9964{
9965 int i, j;
5b4ee69b 9966
52ce6436
PH
9967 for (i = 0; i < *size; i += 2) {
9968 if (high >= indices[i] && low <= indices[i + 1])
9969 {
9970 int kh;
5b4ee69b 9971
52ce6436
PH
9972 for (kh = i + 2; kh < *size; kh += 2)
9973 if (high < indices[kh])
9974 break;
9975 if (low < indices[i])
9976 indices[i] = low;
9977 indices[i + 1] = indices[kh - 1];
9978 if (high > indices[i + 1])
9979 indices[i + 1] = high;
9980 memcpy (indices + i + 2, indices + kh, *size - kh);
9981 *size -= kh - i - 2;
9982 return;
9983 }
9984 else if (high < indices[i])
9985 break;
9986 }
9987
9988 if (*size == max_size)
9989 error (_("Internal error: miscounted aggregate components."));
9990 *size += 2;
9991 for (j = *size-1; j >= i+2; j -= 1)
9992 indices[j] = indices[j - 2];
9993 indices[i] = low;
9994 indices[i + 1] = high;
9995}
9996
6e48bd2c
JB
9997/* Perform and Ada cast of ARG2 to type TYPE if the type of ARG2
9998 is different. */
9999
10000static struct value *
b7e22850 10001ada_value_cast (struct type *type, struct value *arg2)
6e48bd2c
JB
10002{
10003 if (type == ada_check_typedef (value_type (arg2)))
10004 return arg2;
10005
b2188a06 10006 if (ada_is_gnat_encoded_fixed_point_type (type))
95f39a5b 10007 return cast_to_fixed (type, arg2);
6e48bd2c 10008
b2188a06 10009 if (ada_is_gnat_encoded_fixed_point_type (value_type (arg2)))
a53b7a21 10010 return cast_from_fixed (type, arg2);
6e48bd2c
JB
10011
10012 return value_cast (type, arg2);
10013}
10014
284614f0
JB
10015/* Evaluating Ada expressions, and printing their result.
10016 ------------------------------------------------------
10017
21649b50
JB
10018 1. Introduction:
10019 ----------------
10020
284614f0
JB
10021 We usually evaluate an Ada expression in order to print its value.
10022 We also evaluate an expression in order to print its type, which
10023 happens during the EVAL_AVOID_SIDE_EFFECTS phase of the evaluation,
10024 but we'll focus mostly on the EVAL_NORMAL phase. In practice, the
10025 EVAL_AVOID_SIDE_EFFECTS phase allows us to simplify certain aspects of
10026 the evaluation compared to the EVAL_NORMAL, but is otherwise very
10027 similar.
10028
10029 Evaluating expressions is a little more complicated for Ada entities
10030 than it is for entities in languages such as C. The main reason for
10031 this is that Ada provides types whose definition might be dynamic.
10032 One example of such types is variant records. Or another example
10033 would be an array whose bounds can only be known at run time.
10034
10035 The following description is a general guide as to what should be
10036 done (and what should NOT be done) in order to evaluate an expression
10037 involving such types, and when. This does not cover how the semantic
10038 information is encoded by GNAT as this is covered separatly. For the
10039 document used as the reference for the GNAT encoding, see exp_dbug.ads
10040 in the GNAT sources.
10041
10042 Ideally, we should embed each part of this description next to its
10043 associated code. Unfortunately, the amount of code is so vast right
10044 now that it's hard to see whether the code handling a particular
10045 situation might be duplicated or not. One day, when the code is
10046 cleaned up, this guide might become redundant with the comments
10047 inserted in the code, and we might want to remove it.
10048
21649b50
JB
10049 2. ``Fixing'' an Entity, the Simple Case:
10050 -----------------------------------------
10051
284614f0
JB
10052 When evaluating Ada expressions, the tricky issue is that they may
10053 reference entities whose type contents and size are not statically
10054 known. Consider for instance a variant record:
10055
10056 type Rec (Empty : Boolean := True) is record
10057 case Empty is
10058 when True => null;
10059 when False => Value : Integer;
10060 end case;
10061 end record;
10062 Yes : Rec := (Empty => False, Value => 1);
10063 No : Rec := (empty => True);
10064
10065 The size and contents of that record depends on the value of the
10066 descriminant (Rec.Empty). At this point, neither the debugging
10067 information nor the associated type structure in GDB are able to
10068 express such dynamic types. So what the debugger does is to create
10069 "fixed" versions of the type that applies to the specific object.
30baf67b 10070 We also informally refer to this operation as "fixing" an object,
284614f0
JB
10071 which means creating its associated fixed type.
10072
10073 Example: when printing the value of variable "Yes" above, its fixed
10074 type would look like this:
10075
10076 type Rec is record
10077 Empty : Boolean;
10078 Value : Integer;
10079 end record;
10080
10081 On the other hand, if we printed the value of "No", its fixed type
10082 would become:
10083
10084 type Rec is record
10085 Empty : Boolean;
10086 end record;
10087
10088 Things become a little more complicated when trying to fix an entity
10089 with a dynamic type that directly contains another dynamic type,
10090 such as an array of variant records, for instance. There are
10091 two possible cases: Arrays, and records.
10092
21649b50
JB
10093 3. ``Fixing'' Arrays:
10094 ---------------------
10095
10096 The type structure in GDB describes an array in terms of its bounds,
10097 and the type of its elements. By design, all elements in the array
10098 have the same type and we cannot represent an array of variant elements
10099 using the current type structure in GDB. When fixing an array,
10100 we cannot fix the array element, as we would potentially need one
10101 fixed type per element of the array. As a result, the best we can do
10102 when fixing an array is to produce an array whose bounds and size
10103 are correct (allowing us to read it from memory), but without having
10104 touched its element type. Fixing each element will be done later,
10105 when (if) necessary.
10106
10107 Arrays are a little simpler to handle than records, because the same
10108 amount of memory is allocated for each element of the array, even if
1b536f04 10109 the amount of space actually used by each element differs from element
21649b50 10110 to element. Consider for instance the following array of type Rec:
284614f0
JB
10111
10112 type Rec_Array is array (1 .. 2) of Rec;
10113
1b536f04
JB
10114 The actual amount of memory occupied by each element might be different
10115 from element to element, depending on the value of their discriminant.
21649b50 10116 But the amount of space reserved for each element in the array remains
1b536f04 10117 fixed regardless. So we simply need to compute that size using
21649b50
JB
10118 the debugging information available, from which we can then determine
10119 the array size (we multiply the number of elements of the array by
10120 the size of each element).
10121
10122 The simplest case is when we have an array of a constrained element
10123 type. For instance, consider the following type declarations:
10124
10125 type Bounded_String (Max_Size : Integer) is
10126 Length : Integer;
10127 Buffer : String (1 .. Max_Size);
10128 end record;
10129 type Bounded_String_Array is array (1 ..2) of Bounded_String (80);
10130
10131 In this case, the compiler describes the array as an array of
10132 variable-size elements (identified by its XVS suffix) for which
10133 the size can be read in the parallel XVZ variable.
10134
10135 In the case of an array of an unconstrained element type, the compiler
10136 wraps the array element inside a private PAD type. This type should not
10137 be shown to the user, and must be "unwrap"'ed before printing. Note
284614f0
JB
10138 that we also use the adjective "aligner" in our code to designate
10139 these wrapper types.
10140
1b536f04 10141 In some cases, the size allocated for each element is statically
21649b50
JB
10142 known. In that case, the PAD type already has the correct size,
10143 and the array element should remain unfixed.
10144
10145 But there are cases when this size is not statically known.
10146 For instance, assuming that "Five" is an integer variable:
284614f0
JB
10147
10148 type Dynamic is array (1 .. Five) of Integer;
10149 type Wrapper (Has_Length : Boolean := False) is record
10150 Data : Dynamic;
10151 case Has_Length is
10152 when True => Length : Integer;
10153 when False => null;
10154 end case;
10155 end record;
10156 type Wrapper_Array is array (1 .. 2) of Wrapper;
10157
10158 Hello : Wrapper_Array := (others => (Has_Length => True,
10159 Data => (others => 17),
10160 Length => 1));
10161
10162
10163 The debugging info would describe variable Hello as being an
10164 array of a PAD type. The size of that PAD type is not statically
10165 known, but can be determined using a parallel XVZ variable.
10166 In that case, a copy of the PAD type with the correct size should
10167 be used for the fixed array.
10168
21649b50
JB
10169 3. ``Fixing'' record type objects:
10170 ----------------------------------
10171
10172 Things are slightly different from arrays in the case of dynamic
284614f0
JB
10173 record types. In this case, in order to compute the associated
10174 fixed type, we need to determine the size and offset of each of
10175 its components. This, in turn, requires us to compute the fixed
10176 type of each of these components.
10177
10178 Consider for instance the example:
10179
10180 type Bounded_String (Max_Size : Natural) is record
10181 Str : String (1 .. Max_Size);
10182 Length : Natural;
10183 end record;
10184 My_String : Bounded_String (Max_Size => 10);
10185
10186 In that case, the position of field "Length" depends on the size
10187 of field Str, which itself depends on the value of the Max_Size
21649b50 10188 discriminant. In order to fix the type of variable My_String,
284614f0
JB
10189 we need to fix the type of field Str. Therefore, fixing a variant
10190 record requires us to fix each of its components.
10191
10192 However, if a component does not have a dynamic size, the component
10193 should not be fixed. In particular, fields that use a PAD type
10194 should not fixed. Here is an example where this might happen
10195 (assuming type Rec above):
10196
10197 type Container (Big : Boolean) is record
10198 First : Rec;
10199 After : Integer;
10200 case Big is
10201 when True => Another : Integer;
10202 when False => null;
10203 end case;
10204 end record;
10205 My_Container : Container := (Big => False,
10206 First => (Empty => True),
10207 After => 42);
10208
10209 In that example, the compiler creates a PAD type for component First,
10210 whose size is constant, and then positions the component After just
10211 right after it. The offset of component After is therefore constant
10212 in this case.
10213
10214 The debugger computes the position of each field based on an algorithm
10215 that uses, among other things, the actual position and size of the field
21649b50
JB
10216 preceding it. Let's now imagine that the user is trying to print
10217 the value of My_Container. If the type fixing was recursive, we would
284614f0
JB
10218 end up computing the offset of field After based on the size of the
10219 fixed version of field First. And since in our example First has
10220 only one actual field, the size of the fixed type is actually smaller
10221 than the amount of space allocated to that field, and thus we would
10222 compute the wrong offset of field After.
10223
21649b50
JB
10224 To make things more complicated, we need to watch out for dynamic
10225 components of variant records (identified by the ___XVL suffix in
10226 the component name). Even if the target type is a PAD type, the size
10227 of that type might not be statically known. So the PAD type needs
10228 to be unwrapped and the resulting type needs to be fixed. Otherwise,
10229 we might end up with the wrong size for our component. This can be
10230 observed with the following type declarations:
284614f0
JB
10231
10232 type Octal is new Integer range 0 .. 7;
10233 type Octal_Array is array (Positive range <>) of Octal;
10234 pragma Pack (Octal_Array);
10235
10236 type Octal_Buffer (Size : Positive) is record
10237 Buffer : Octal_Array (1 .. Size);
10238 Length : Integer;
10239 end record;
10240
10241 In that case, Buffer is a PAD type whose size is unset and needs
10242 to be computed by fixing the unwrapped type.
10243
21649b50
JB
10244 4. When to ``Fix'' un-``Fixed'' sub-elements of an entity:
10245 ----------------------------------------------------------
10246
10247 Lastly, when should the sub-elements of an entity that remained unfixed
284614f0
JB
10248 thus far, be actually fixed?
10249
10250 The answer is: Only when referencing that element. For instance
10251 when selecting one component of a record, this specific component
10252 should be fixed at that point in time. Or when printing the value
10253 of a record, each component should be fixed before its value gets
10254 printed. Similarly for arrays, the element of the array should be
10255 fixed when printing each element of the array, or when extracting
10256 one element out of that array. On the other hand, fixing should
10257 not be performed on the elements when taking a slice of an array!
10258
31432a67 10259 Note that one of the side effects of miscomputing the offset and
284614f0
JB
10260 size of each field is that we end up also miscomputing the size
10261 of the containing type. This can have adverse results when computing
10262 the value of an entity. GDB fetches the value of an entity based
10263 on the size of its type, and thus a wrong size causes GDB to fetch
10264 the wrong amount of memory. In the case where the computed size is
10265 too small, GDB fetches too little data to print the value of our
31432a67 10266 entity. Results in this case are unpredictable, as we usually read
284614f0
JB
10267 past the buffer containing the data =:-o. */
10268
ced9779b
JB
10269/* Evaluate a subexpression of EXP, at index *POS, and return a value
10270 for that subexpression cast to TO_TYPE. Advance *POS over the
10271 subexpression. */
10272
10273static value *
10274ada_evaluate_subexp_for_cast (expression *exp, int *pos,
10275 enum noside noside, struct type *to_type)
10276{
10277 int pc = *pos;
10278
10279 if (exp->elts[pc].opcode == OP_VAR_MSYM_VALUE
10280 || exp->elts[pc].opcode == OP_VAR_VALUE)
10281 {
10282 (*pos) += 4;
10283
10284 value *val;
10285 if (exp->elts[pc].opcode == OP_VAR_MSYM_VALUE)
10286 {
10287 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10288 return value_zero (to_type, not_lval);
10289
10290 val = evaluate_var_msym_value (noside,
10291 exp->elts[pc + 1].objfile,
10292 exp->elts[pc + 2].msymbol);
10293 }
10294 else
10295 val = evaluate_var_value (noside,
10296 exp->elts[pc + 1].block,
10297 exp->elts[pc + 2].symbol);
10298
10299 if (noside == EVAL_SKIP)
10300 return eval_skip_value (exp);
10301
10302 val = ada_value_cast (to_type, val);
10303
10304 /* Follow the Ada language semantics that do not allow taking
10305 an address of the result of a cast (view conversion in Ada). */
10306 if (VALUE_LVAL (val) == lval_memory)
10307 {
10308 if (value_lazy (val))
10309 value_fetch_lazy (val);
10310 VALUE_LVAL (val) = not_lval;
10311 }
10312 return val;
10313 }
10314
10315 value *val = evaluate_subexp (to_type, exp, pos, noside);
10316 if (noside == EVAL_SKIP)
10317 return eval_skip_value (exp);
10318 return ada_value_cast (to_type, val);
10319}
10320
284614f0
JB
10321/* Implement the evaluate_exp routine in the exp_descriptor structure
10322 for the Ada language. */
10323
52ce6436 10324static struct value *
ebf56fd3 10325ada_evaluate_subexp (struct type *expect_type, struct expression *exp,
4c4b4cd2 10326 int *pos, enum noside noside)
14f9c5c9
AS
10327{
10328 enum exp_opcode op;
b5385fc0 10329 int tem;
14f9c5c9 10330 int pc;
5ec18f2b 10331 int preeval_pos;
14f9c5c9
AS
10332 struct value *arg1 = NULL, *arg2 = NULL, *arg3;
10333 struct type *type;
52ce6436 10334 int nargs, oplen;
d2e4a39e 10335 struct value **argvec;
14f9c5c9 10336
d2e4a39e
AS
10337 pc = *pos;
10338 *pos += 1;
14f9c5c9
AS
10339 op = exp->elts[pc].opcode;
10340
d2e4a39e 10341 switch (op)
14f9c5c9
AS
10342 {
10343 default:
10344 *pos -= 1;
6e48bd2c 10345 arg1 = evaluate_subexp_standard (expect_type, exp, pos, noside);
ca1f964d
JG
10346
10347 if (noside == EVAL_NORMAL)
10348 arg1 = unwrap_value (arg1);
6e48bd2c 10349
edd079d9 10350 /* If evaluating an OP_FLOAT and an EXPECT_TYPE was provided,
6e48bd2c
JB
10351 then we need to perform the conversion manually, because
10352 evaluate_subexp_standard doesn't do it. This conversion is
10353 necessary in Ada because the different kinds of float/fixed
10354 types in Ada have different representations.
10355
10356 Similarly, we need to perform the conversion from OP_LONG
10357 ourselves. */
edd079d9 10358 if ((op == OP_FLOAT || op == OP_LONG) && expect_type != NULL)
b7e22850 10359 arg1 = ada_value_cast (expect_type, arg1);
6e48bd2c
JB
10360
10361 return arg1;
4c4b4cd2
PH
10362
10363 case OP_STRING:
10364 {
76a01679 10365 struct value *result;
5b4ee69b 10366
76a01679
JB
10367 *pos -= 1;
10368 result = evaluate_subexp_standard (expect_type, exp, pos, noside);
10369 /* The result type will have code OP_STRING, bashed there from
10370 OP_ARRAY. Bash it back. */
78134374 10371 if (value_type (result)->code () == TYPE_CODE_STRING)
67607e24 10372 value_type (result)->set_code (TYPE_CODE_ARRAY);
76a01679 10373 return result;
4c4b4cd2 10374 }
14f9c5c9
AS
10375
10376 case UNOP_CAST:
10377 (*pos) += 2;
10378 type = exp->elts[pc + 1].type;
ced9779b 10379 return ada_evaluate_subexp_for_cast (exp, pos, noside, type);
14f9c5c9 10380
4c4b4cd2
PH
10381 case UNOP_QUAL:
10382 (*pos) += 2;
10383 type = exp->elts[pc + 1].type;
10384 return ada_evaluate_subexp (type, exp, pos, noside);
10385
14f9c5c9
AS
10386 case BINOP_ASSIGN:
10387 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
52ce6436
PH
10388 if (exp->elts[*pos].opcode == OP_AGGREGATE)
10389 {
10390 arg1 = assign_aggregate (arg1, arg1, exp, pos, noside);
10391 if (noside == EVAL_SKIP || noside == EVAL_AVOID_SIDE_EFFECTS)
10392 return arg1;
10393 return ada_value_assign (arg1, arg1);
10394 }
003f3813
JB
10395 /* Force the evaluation of the rhs ARG2 to the type of the lhs ARG1,
10396 except if the lhs of our assignment is a convenience variable.
10397 In the case of assigning to a convenience variable, the lhs
10398 should be exactly the result of the evaluation of the rhs. */
10399 type = value_type (arg1);
10400 if (VALUE_LVAL (arg1) == lval_internalvar)
10401 type = NULL;
10402 arg2 = evaluate_subexp (type, exp, pos, noside);
14f9c5c9 10403 if (noside == EVAL_SKIP || noside == EVAL_AVOID_SIDE_EFFECTS)
4c4b4cd2 10404 return arg1;
f411722c
TT
10405 if (VALUE_LVAL (arg1) == lval_internalvar)
10406 {
10407 /* Nothing. */
10408 }
b2188a06 10409 else if (ada_is_gnat_encoded_fixed_point_type (value_type (arg1)))
df407dfe 10410 arg2 = cast_to_fixed (value_type (arg1), arg2);
b2188a06 10411 else if (ada_is_gnat_encoded_fixed_point_type (value_type (arg2)))
76a01679 10412 error
323e0a4a 10413 (_("Fixed-point values must be assigned to fixed-point variables"));
d2e4a39e 10414 else
df407dfe 10415 arg2 = coerce_for_assign (value_type (arg1), arg2);
4c4b4cd2 10416 return ada_value_assign (arg1, arg2);
14f9c5c9
AS
10417
10418 case BINOP_ADD:
10419 arg1 = evaluate_subexp_with_coercion (exp, pos, noside);
10420 arg2 = evaluate_subexp_with_coercion (exp, pos, noside);
10421 if (noside == EVAL_SKIP)
4c4b4cd2 10422 goto nosideret;
78134374 10423 if (value_type (arg1)->code () == TYPE_CODE_PTR)
2ac8a782
JB
10424 return (value_from_longest
10425 (value_type (arg1),
10426 value_as_long (arg1) + value_as_long (arg2)));
78134374 10427 if (value_type (arg2)->code () == TYPE_CODE_PTR)
c40cc657
JB
10428 return (value_from_longest
10429 (value_type (arg2),
10430 value_as_long (arg1) + value_as_long (arg2)));
b2188a06
JB
10431 if ((ada_is_gnat_encoded_fixed_point_type (value_type (arg1))
10432 || ada_is_gnat_encoded_fixed_point_type (value_type (arg2)))
df407dfe 10433 && value_type (arg1) != value_type (arg2))
323e0a4a 10434 error (_("Operands of fixed-point addition must have the same type"));
b7789565
JB
10435 /* Do the addition, and cast the result to the type of the first
10436 argument. We cannot cast the result to a reference type, so if
10437 ARG1 is a reference type, find its underlying type. */
10438 type = value_type (arg1);
78134374 10439 while (type->code () == TYPE_CODE_REF)
b7789565 10440 type = TYPE_TARGET_TYPE (type);
f44316fa 10441 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
89eef114 10442 return value_cast (type, value_binop (arg1, arg2, BINOP_ADD));
14f9c5c9
AS
10443
10444 case BINOP_SUB:
10445 arg1 = evaluate_subexp_with_coercion (exp, pos, noside);
10446 arg2 = evaluate_subexp_with_coercion (exp, pos, noside);
10447 if (noside == EVAL_SKIP)
4c4b4cd2 10448 goto nosideret;
78134374 10449 if (value_type (arg1)->code () == TYPE_CODE_PTR)
2ac8a782
JB
10450 return (value_from_longest
10451 (value_type (arg1),
10452 value_as_long (arg1) - value_as_long (arg2)));
78134374 10453 if (value_type (arg2)->code () == TYPE_CODE_PTR)
c40cc657
JB
10454 return (value_from_longest
10455 (value_type (arg2),
10456 value_as_long (arg1) - value_as_long (arg2)));
b2188a06
JB
10457 if ((ada_is_gnat_encoded_fixed_point_type (value_type (arg1))
10458 || ada_is_gnat_encoded_fixed_point_type (value_type (arg2)))
df407dfe 10459 && value_type (arg1) != value_type (arg2))
0963b4bd
MS
10460 error (_("Operands of fixed-point subtraction "
10461 "must have the same type"));
b7789565
JB
10462 /* Do the substraction, and cast the result to the type of the first
10463 argument. We cannot cast the result to a reference type, so if
10464 ARG1 is a reference type, find its underlying type. */
10465 type = value_type (arg1);
78134374 10466 while (type->code () == TYPE_CODE_REF)
b7789565 10467 type = TYPE_TARGET_TYPE (type);
f44316fa 10468 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
89eef114 10469 return value_cast (type, value_binop (arg1, arg2, BINOP_SUB));
14f9c5c9
AS
10470
10471 case BINOP_MUL:
10472 case BINOP_DIV:
e1578042
JB
10473 case BINOP_REM:
10474 case BINOP_MOD:
14f9c5c9
AS
10475 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10476 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10477 if (noside == EVAL_SKIP)
4c4b4cd2 10478 goto nosideret;
e1578042 10479 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
9c2be529
JB
10480 {
10481 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10482 return value_zero (value_type (arg1), not_lval);
10483 }
14f9c5c9 10484 else
4c4b4cd2 10485 {
a53b7a21 10486 type = builtin_type (exp->gdbarch)->builtin_double;
b2188a06 10487 if (ada_is_gnat_encoded_fixed_point_type (value_type (arg1)))
a53b7a21 10488 arg1 = cast_from_fixed (type, arg1);
b2188a06 10489 if (ada_is_gnat_encoded_fixed_point_type (value_type (arg2)))
a53b7a21 10490 arg2 = cast_from_fixed (type, arg2);
f44316fa 10491 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
4c4b4cd2
PH
10492 return ada_value_binop (arg1, arg2, op);
10493 }
10494
4c4b4cd2
PH
10495 case BINOP_EQUAL:
10496 case BINOP_NOTEQUAL:
14f9c5c9 10497 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
df407dfe 10498 arg2 = evaluate_subexp (value_type (arg1), exp, pos, noside);
14f9c5c9 10499 if (noside == EVAL_SKIP)
76a01679 10500 goto nosideret;
4c4b4cd2 10501 if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 10502 tem = 0;
4c4b4cd2 10503 else
f44316fa
UW
10504 {
10505 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10506 tem = ada_value_equal (arg1, arg2);
10507 }
4c4b4cd2 10508 if (op == BINOP_NOTEQUAL)
76a01679 10509 tem = !tem;
fbb06eb1
UW
10510 type = language_bool_type (exp->language_defn, exp->gdbarch);
10511 return value_from_longest (type, (LONGEST) tem);
4c4b4cd2
PH
10512
10513 case UNOP_NEG:
10514 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10515 if (noside == EVAL_SKIP)
10516 goto nosideret;
b2188a06 10517 else if (ada_is_gnat_encoded_fixed_point_type (value_type (arg1)))
df407dfe 10518 return value_cast (value_type (arg1), value_neg (arg1));
14f9c5c9 10519 else
f44316fa
UW
10520 {
10521 unop_promote (exp->language_defn, exp->gdbarch, &arg1);
10522 return value_neg (arg1);
10523 }
4c4b4cd2 10524
2330c6c6
JB
10525 case BINOP_LOGICAL_AND:
10526 case BINOP_LOGICAL_OR:
10527 case UNOP_LOGICAL_NOT:
000d5124
JB
10528 {
10529 struct value *val;
10530
10531 *pos -= 1;
10532 val = evaluate_subexp_standard (expect_type, exp, pos, noside);
fbb06eb1
UW
10533 type = language_bool_type (exp->language_defn, exp->gdbarch);
10534 return value_cast (type, val);
000d5124 10535 }
2330c6c6
JB
10536
10537 case BINOP_BITWISE_AND:
10538 case BINOP_BITWISE_IOR:
10539 case BINOP_BITWISE_XOR:
000d5124
JB
10540 {
10541 struct value *val;
10542
10543 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, EVAL_AVOID_SIDE_EFFECTS);
10544 *pos = pc;
10545 val = evaluate_subexp_standard (expect_type, exp, pos, noside);
10546
10547 return value_cast (value_type (arg1), val);
10548 }
2330c6c6 10549
14f9c5c9
AS
10550 case OP_VAR_VALUE:
10551 *pos -= 1;
6799def4 10552
14f9c5c9 10553 if (noside == EVAL_SKIP)
4c4b4cd2
PH
10554 {
10555 *pos += 4;
10556 goto nosideret;
10557 }
da5c522f
JB
10558
10559 if (SYMBOL_DOMAIN (exp->elts[pc + 2].symbol) == UNDEF_DOMAIN)
76a01679
JB
10560 /* Only encountered when an unresolved symbol occurs in a
10561 context other than a function call, in which case, it is
52ce6436 10562 invalid. */
323e0a4a 10563 error (_("Unexpected unresolved symbol, %s, during evaluation"),
987012b8 10564 exp->elts[pc + 2].symbol->print_name ());
da5c522f
JB
10565
10566 if (noside == EVAL_AVOID_SIDE_EFFECTS)
4c4b4cd2 10567 {
0c1f74cf 10568 type = static_unwrap_type (SYMBOL_TYPE (exp->elts[pc + 2].symbol));
31dbc1c5
JB
10569 /* Check to see if this is a tagged type. We also need to handle
10570 the case where the type is a reference to a tagged type, but
10571 we have to be careful to exclude pointers to tagged types.
10572 The latter should be shown as usual (as a pointer), whereas
10573 a reference should mostly be transparent to the user. */
10574 if (ada_is_tagged_type (type, 0)
78134374 10575 || (type->code () == TYPE_CODE_REF
31dbc1c5 10576 && ada_is_tagged_type (TYPE_TARGET_TYPE (type), 0)))
0d72a7c3
JB
10577 {
10578 /* Tagged types are a little special in the fact that the real
10579 type is dynamic and can only be determined by inspecting the
10580 object's tag. This means that we need to get the object's
10581 value first (EVAL_NORMAL) and then extract the actual object
10582 type from its tag.
10583
10584 Note that we cannot skip the final step where we extract
10585 the object type from its tag, because the EVAL_NORMAL phase
10586 results in dynamic components being resolved into fixed ones.
10587 This can cause problems when trying to print the type
10588 description of tagged types whose parent has a dynamic size:
10589 We use the type name of the "_parent" component in order
10590 to print the name of the ancestor type in the type description.
10591 If that component had a dynamic size, the resolution into
10592 a fixed type would result in the loss of that type name,
10593 thus preventing us from printing the name of the ancestor
10594 type in the type description. */
10595 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, EVAL_NORMAL);
10596
78134374 10597 if (type->code () != TYPE_CODE_REF)
0d72a7c3
JB
10598 {
10599 struct type *actual_type;
10600
10601 actual_type = type_from_tag (ada_value_tag (arg1));
10602 if (actual_type == NULL)
10603 /* If, for some reason, we were unable to determine
10604 the actual type from the tag, then use the static
10605 approximation that we just computed as a fallback.
10606 This can happen if the debugging information is
10607 incomplete, for instance. */
10608 actual_type = type;
10609 return value_zero (actual_type, not_lval);
10610 }
10611 else
10612 {
10613 /* In the case of a ref, ada_coerce_ref takes care
10614 of determining the actual type. But the evaluation
10615 should return a ref as it should be valid to ask
10616 for its address; so rebuild a ref after coerce. */
10617 arg1 = ada_coerce_ref (arg1);
a65cfae5 10618 return value_ref (arg1, TYPE_CODE_REF);
0d72a7c3
JB
10619 }
10620 }
0c1f74cf 10621
84754697
JB
10622 /* Records and unions for which GNAT encodings have been
10623 generated need to be statically fixed as well.
10624 Otherwise, non-static fixing produces a type where
10625 all dynamic properties are removed, which prevents "ptype"
10626 from being able to completely describe the type.
10627 For instance, a case statement in a variant record would be
10628 replaced by the relevant components based on the actual
10629 value of the discriminants. */
78134374 10630 if ((type->code () == TYPE_CODE_STRUCT
84754697 10631 && dynamic_template_type (type) != NULL)
78134374 10632 || (type->code () == TYPE_CODE_UNION
84754697
JB
10633 && ada_find_parallel_type (type, "___XVU") != NULL))
10634 {
10635 *pos += 4;
10636 return value_zero (to_static_fixed_type (type), not_lval);
10637 }
4c4b4cd2 10638 }
da5c522f
JB
10639
10640 arg1 = evaluate_subexp_standard (expect_type, exp, pos, noside);
10641 return ada_to_fixed_value (arg1);
4c4b4cd2
PH
10642
10643 case OP_FUNCALL:
10644 (*pos) += 2;
10645
10646 /* Allocate arg vector, including space for the function to be
10647 called in argvec[0] and a terminating NULL. */
10648 nargs = longest_to_int (exp->elts[pc + 1].longconst);
8d749320 10649 argvec = XALLOCAVEC (struct value *, nargs + 2);
4c4b4cd2
PH
10650
10651 if (exp->elts[*pos].opcode == OP_VAR_VALUE
76a01679 10652 && SYMBOL_DOMAIN (exp->elts[pc + 5].symbol) == UNDEF_DOMAIN)
323e0a4a 10653 error (_("Unexpected unresolved symbol, %s, during evaluation"),
987012b8 10654 exp->elts[pc + 5].symbol->print_name ());
4c4b4cd2
PH
10655 else
10656 {
10657 for (tem = 0; tem <= nargs; tem += 1)
10658 argvec[tem] = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10659 argvec[tem] = 0;
10660
10661 if (noside == EVAL_SKIP)
10662 goto nosideret;
10663 }
10664
ad82864c
JB
10665 if (ada_is_constrained_packed_array_type
10666 (desc_base_type (value_type (argvec[0]))))
4c4b4cd2 10667 argvec[0] = ada_coerce_to_simple_array (argvec[0]);
78134374 10668 else if (value_type (argvec[0])->code () == TYPE_CODE_ARRAY
284614f0
JB
10669 && TYPE_FIELD_BITSIZE (value_type (argvec[0]), 0) != 0)
10670 /* This is a packed array that has already been fixed, and
10671 therefore already coerced to a simple array. Nothing further
10672 to do. */
10673 ;
78134374 10674 else if (value_type (argvec[0])->code () == TYPE_CODE_REF)
e6c2c623
PMR
10675 {
10676 /* Make sure we dereference references so that all the code below
10677 feels like it's really handling the referenced value. Wrapping
10678 types (for alignment) may be there, so make sure we strip them as
10679 well. */
10680 argvec[0] = ada_to_fixed_value (coerce_ref (argvec[0]));
10681 }
78134374 10682 else if (value_type (argvec[0])->code () == TYPE_CODE_ARRAY
e6c2c623
PMR
10683 && VALUE_LVAL (argvec[0]) == lval_memory)
10684 argvec[0] = value_addr (argvec[0]);
4c4b4cd2 10685
df407dfe 10686 type = ada_check_typedef (value_type (argvec[0]));
720d1a40
JB
10687
10688 /* Ada allows us to implicitly dereference arrays when subscripting
8f465ea7
JB
10689 them. So, if this is an array typedef (encoding use for array
10690 access types encoded as fat pointers), strip it now. */
78134374 10691 if (type->code () == TYPE_CODE_TYPEDEF)
720d1a40
JB
10692 type = ada_typedef_target_type (type);
10693
78134374 10694 if (type->code () == TYPE_CODE_PTR)
4c4b4cd2 10695 {
78134374 10696 switch (ada_check_typedef (TYPE_TARGET_TYPE (type))->code ())
4c4b4cd2
PH
10697 {
10698 case TYPE_CODE_FUNC:
61ee279c 10699 type = ada_check_typedef (TYPE_TARGET_TYPE (type));
4c4b4cd2
PH
10700 break;
10701 case TYPE_CODE_ARRAY:
10702 break;
10703 case TYPE_CODE_STRUCT:
10704 if (noside != EVAL_AVOID_SIDE_EFFECTS)
10705 argvec[0] = ada_value_ind (argvec[0]);
61ee279c 10706 type = ada_check_typedef (TYPE_TARGET_TYPE (type));
4c4b4cd2
PH
10707 break;
10708 default:
323e0a4a 10709 error (_("cannot subscript or call something of type `%s'"),
df407dfe 10710 ada_type_name (value_type (argvec[0])));
4c4b4cd2
PH
10711 break;
10712 }
10713 }
10714
78134374 10715 switch (type->code ())
4c4b4cd2
PH
10716 {
10717 case TYPE_CODE_FUNC:
10718 if (noside == EVAL_AVOID_SIDE_EFFECTS)
c8ea1972 10719 {
7022349d
PA
10720 if (TYPE_TARGET_TYPE (type) == NULL)
10721 error_call_unknown_return_type (NULL);
10722 return allocate_value (TYPE_TARGET_TYPE (type));
c8ea1972 10723 }
e71585ff
PA
10724 return call_function_by_hand (argvec[0], NULL,
10725 gdb::make_array_view (argvec + 1,
10726 nargs));
c8ea1972
PH
10727 case TYPE_CODE_INTERNAL_FUNCTION:
10728 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10729 /* We don't know anything about what the internal
10730 function might return, but we have to return
10731 something. */
10732 return value_zero (builtin_type (exp->gdbarch)->builtin_int,
10733 not_lval);
10734 else
10735 return call_internal_function (exp->gdbarch, exp->language_defn,
10736 argvec[0], nargs, argvec + 1);
10737
4c4b4cd2
PH
10738 case TYPE_CODE_STRUCT:
10739 {
10740 int arity;
10741
4c4b4cd2
PH
10742 arity = ada_array_arity (type);
10743 type = ada_array_element_type (type, nargs);
10744 if (type == NULL)
323e0a4a 10745 error (_("cannot subscript or call a record"));
4c4b4cd2 10746 if (arity != nargs)
323e0a4a 10747 error (_("wrong number of subscripts; expecting %d"), arity);
4c4b4cd2 10748 if (noside == EVAL_AVOID_SIDE_EFFECTS)
0a07e705 10749 return value_zero (ada_aligned_type (type), lval_memory);
4c4b4cd2
PH
10750 return
10751 unwrap_value (ada_value_subscript
10752 (argvec[0], nargs, argvec + 1));
10753 }
10754 case TYPE_CODE_ARRAY:
10755 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10756 {
10757 type = ada_array_element_type (type, nargs);
10758 if (type == NULL)
323e0a4a 10759 error (_("element type of array unknown"));
4c4b4cd2 10760 else
0a07e705 10761 return value_zero (ada_aligned_type (type), lval_memory);
4c4b4cd2
PH
10762 }
10763 return
10764 unwrap_value (ada_value_subscript
10765 (ada_coerce_to_simple_array (argvec[0]),
10766 nargs, argvec + 1));
10767 case TYPE_CODE_PTR: /* Pointer to array */
4c4b4cd2
PH
10768 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10769 {
deede10c 10770 type = to_fixed_array_type (TYPE_TARGET_TYPE (type), NULL, 1);
4c4b4cd2
PH
10771 type = ada_array_element_type (type, nargs);
10772 if (type == NULL)
323e0a4a 10773 error (_("element type of array unknown"));
4c4b4cd2 10774 else
0a07e705 10775 return value_zero (ada_aligned_type (type), lval_memory);
4c4b4cd2
PH
10776 }
10777 return
deede10c
JB
10778 unwrap_value (ada_value_ptr_subscript (argvec[0],
10779 nargs, argvec + 1));
4c4b4cd2
PH
10780
10781 default:
e1d5a0d2
PH
10782 error (_("Attempt to index or call something other than an "
10783 "array or function"));
4c4b4cd2
PH
10784 }
10785
10786 case TERNOP_SLICE:
10787 {
10788 struct value *array = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10789 struct value *low_bound_val =
10790 evaluate_subexp (NULL_TYPE, exp, pos, noside);
714e53ab
PH
10791 struct value *high_bound_val =
10792 evaluate_subexp (NULL_TYPE, exp, pos, noside);
10793 LONGEST low_bound;
10794 LONGEST high_bound;
5b4ee69b 10795
994b9211
AC
10796 low_bound_val = coerce_ref (low_bound_val);
10797 high_bound_val = coerce_ref (high_bound_val);
aa715135
JG
10798 low_bound = value_as_long (low_bound_val);
10799 high_bound = value_as_long (high_bound_val);
963a6417 10800
4c4b4cd2
PH
10801 if (noside == EVAL_SKIP)
10802 goto nosideret;
10803
4c4b4cd2
PH
10804 /* If this is a reference to an aligner type, then remove all
10805 the aligners. */
78134374 10806 if (value_type (array)->code () == TYPE_CODE_REF
df407dfe
AC
10807 && ada_is_aligner_type (TYPE_TARGET_TYPE (value_type (array))))
10808 TYPE_TARGET_TYPE (value_type (array)) =
10809 ada_aligned_type (TYPE_TARGET_TYPE (value_type (array)));
4c4b4cd2 10810
ad82864c 10811 if (ada_is_constrained_packed_array_type (value_type (array)))
323e0a4a 10812 error (_("cannot slice a packed array"));
4c4b4cd2
PH
10813
10814 /* If this is a reference to an array or an array lvalue,
10815 convert to a pointer. */
78134374
SM
10816 if (value_type (array)->code () == TYPE_CODE_REF
10817 || (value_type (array)->code () == TYPE_CODE_ARRAY
4c4b4cd2
PH
10818 && VALUE_LVAL (array) == lval_memory))
10819 array = value_addr (array);
10820
1265e4aa 10821 if (noside == EVAL_AVOID_SIDE_EFFECTS
61ee279c 10822 && ada_is_array_descriptor_type (ada_check_typedef
df407dfe 10823 (value_type (array))))
bff8c71f
TT
10824 return empty_array (ada_type_of_array (array, 0), low_bound,
10825 high_bound);
4c4b4cd2
PH
10826
10827 array = ada_coerce_to_simple_array_ptr (array);
10828
714e53ab
PH
10829 /* If we have more than one level of pointer indirection,
10830 dereference the value until we get only one level. */
78134374
SM
10831 while (value_type (array)->code () == TYPE_CODE_PTR
10832 && (TYPE_TARGET_TYPE (value_type (array))->code ()
714e53ab
PH
10833 == TYPE_CODE_PTR))
10834 array = value_ind (array);
10835
10836 /* Make sure we really do have an array type before going further,
10837 to avoid a SEGV when trying to get the index type or the target
10838 type later down the road if the debug info generated by
10839 the compiler is incorrect or incomplete. */
df407dfe 10840 if (!ada_is_simple_array_type (value_type (array)))
323e0a4a 10841 error (_("cannot take slice of non-array"));
714e53ab 10842
78134374 10843 if (ada_check_typedef (value_type (array))->code ()
828292f2 10844 == TYPE_CODE_PTR)
4c4b4cd2 10845 {
828292f2
JB
10846 struct type *type0 = ada_check_typedef (value_type (array));
10847
0b5d8877 10848 if (high_bound < low_bound || noside == EVAL_AVOID_SIDE_EFFECTS)
bff8c71f 10849 return empty_array (TYPE_TARGET_TYPE (type0), low_bound, high_bound);
4c4b4cd2
PH
10850 else
10851 {
10852 struct type *arr_type0 =
828292f2 10853 to_fixed_array_type (TYPE_TARGET_TYPE (type0), NULL, 1);
5b4ee69b 10854
f5938064
JG
10855 return ada_value_slice_from_ptr (array, arr_type0,
10856 longest_to_int (low_bound),
10857 longest_to_int (high_bound));
4c4b4cd2
PH
10858 }
10859 }
10860 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
10861 return array;
10862 else if (high_bound < low_bound)
bff8c71f 10863 return empty_array (value_type (array), low_bound, high_bound);
4c4b4cd2 10864 else
529cad9c
PH
10865 return ada_value_slice (array, longest_to_int (low_bound),
10866 longest_to_int (high_bound));
4c4b4cd2 10867 }
14f9c5c9 10868
4c4b4cd2
PH
10869 case UNOP_IN_RANGE:
10870 (*pos) += 2;
10871 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
8008e265 10872 type = check_typedef (exp->elts[pc + 1].type);
14f9c5c9 10873
14f9c5c9 10874 if (noside == EVAL_SKIP)
4c4b4cd2 10875 goto nosideret;
14f9c5c9 10876
78134374 10877 switch (type->code ())
4c4b4cd2
PH
10878 {
10879 default:
e1d5a0d2
PH
10880 lim_warning (_("Membership test incompletely implemented; "
10881 "always returns true"));
fbb06eb1
UW
10882 type = language_bool_type (exp->language_defn, exp->gdbarch);
10883 return value_from_longest (type, (LONGEST) 1);
4c4b4cd2
PH
10884
10885 case TYPE_CODE_RANGE:
030b4912
UW
10886 arg2 = value_from_longest (type, TYPE_LOW_BOUND (type));
10887 arg3 = value_from_longest (type, TYPE_HIGH_BOUND (type));
f44316fa
UW
10888 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10889 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg3);
fbb06eb1
UW
10890 type = language_bool_type (exp->language_defn, exp->gdbarch);
10891 return
10892 value_from_longest (type,
4c4b4cd2
PH
10893 (value_less (arg1, arg3)
10894 || value_equal (arg1, arg3))
10895 && (value_less (arg2, arg1)
10896 || value_equal (arg2, arg1)));
10897 }
10898
10899 case BINOP_IN_BOUNDS:
14f9c5c9 10900 (*pos) += 2;
4c4b4cd2
PH
10901 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10902 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
14f9c5c9 10903
4c4b4cd2
PH
10904 if (noside == EVAL_SKIP)
10905 goto nosideret;
14f9c5c9 10906
4c4b4cd2 10907 if (noside == EVAL_AVOID_SIDE_EFFECTS)
fbb06eb1
UW
10908 {
10909 type = language_bool_type (exp->language_defn, exp->gdbarch);
10910 return value_zero (type, not_lval);
10911 }
14f9c5c9 10912
4c4b4cd2 10913 tem = longest_to_int (exp->elts[pc + 1].longconst);
14f9c5c9 10914
1eea4ebd
UW
10915 type = ada_index_type (value_type (arg2), tem, "range");
10916 if (!type)
10917 type = value_type (arg1);
14f9c5c9 10918
1eea4ebd
UW
10919 arg3 = value_from_longest (type, ada_array_bound (arg2, tem, 1));
10920 arg2 = value_from_longest (type, ada_array_bound (arg2, tem, 0));
d2e4a39e 10921
f44316fa
UW
10922 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10923 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg3);
fbb06eb1 10924 type = language_bool_type (exp->language_defn, exp->gdbarch);
4c4b4cd2 10925 return
fbb06eb1 10926 value_from_longest (type,
4c4b4cd2
PH
10927 (value_less (arg1, arg3)
10928 || value_equal (arg1, arg3))
10929 && (value_less (arg2, arg1)
10930 || value_equal (arg2, arg1)));
10931
10932 case TERNOP_IN_RANGE:
10933 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10934 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10935 arg3 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10936
10937 if (noside == EVAL_SKIP)
10938 goto nosideret;
10939
f44316fa
UW
10940 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10941 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg3);
fbb06eb1 10942 type = language_bool_type (exp->language_defn, exp->gdbarch);
4c4b4cd2 10943 return
fbb06eb1 10944 value_from_longest (type,
4c4b4cd2
PH
10945 (value_less (arg1, arg3)
10946 || value_equal (arg1, arg3))
10947 && (value_less (arg2, arg1)
10948 || value_equal (arg2, arg1)));
10949
10950 case OP_ATR_FIRST:
10951 case OP_ATR_LAST:
10952 case OP_ATR_LENGTH:
10953 {
76a01679 10954 struct type *type_arg;
5b4ee69b 10955
76a01679
JB
10956 if (exp->elts[*pos].opcode == OP_TYPE)
10957 {
10958 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
10959 arg1 = NULL;
5bc23cb3 10960 type_arg = check_typedef (exp->elts[pc + 2].type);
76a01679
JB
10961 }
10962 else
10963 {
10964 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10965 type_arg = NULL;
10966 }
10967
10968 if (exp->elts[*pos].opcode != OP_LONG)
323e0a4a 10969 error (_("Invalid operand to '%s"), ada_attribute_name (op));
76a01679
JB
10970 tem = longest_to_int (exp->elts[*pos + 2].longconst);
10971 *pos += 4;
10972
10973 if (noside == EVAL_SKIP)
10974 goto nosideret;
680e1bee
TT
10975 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
10976 {
10977 if (type_arg == NULL)
10978 type_arg = value_type (arg1);
76a01679 10979
680e1bee
TT
10980 if (ada_is_constrained_packed_array_type (type_arg))
10981 type_arg = decode_constrained_packed_array_type (type_arg);
10982
10983 if (!discrete_type_p (type_arg))
10984 {
10985 switch (op)
10986 {
10987 default: /* Should never happen. */
10988 error (_("unexpected attribute encountered"));
10989 case OP_ATR_FIRST:
10990 case OP_ATR_LAST:
10991 type_arg = ada_index_type (type_arg, tem,
10992 ada_attribute_name (op));
10993 break;
10994 case OP_ATR_LENGTH:
10995 type_arg = builtin_type (exp->gdbarch)->builtin_int;
10996 break;
10997 }
10998 }
10999
11000 return value_zero (type_arg, not_lval);
11001 }
11002 else if (type_arg == NULL)
76a01679
JB
11003 {
11004 arg1 = ada_coerce_ref (arg1);
11005
ad82864c 11006 if (ada_is_constrained_packed_array_type (value_type (arg1)))
76a01679
JB
11007 arg1 = ada_coerce_to_simple_array (arg1);
11008
aa4fb036 11009 if (op == OP_ATR_LENGTH)
1eea4ebd 11010 type = builtin_type (exp->gdbarch)->builtin_int;
aa4fb036
JB
11011 else
11012 {
11013 type = ada_index_type (value_type (arg1), tem,
11014 ada_attribute_name (op));
11015 if (type == NULL)
11016 type = builtin_type (exp->gdbarch)->builtin_int;
11017 }
76a01679 11018
76a01679
JB
11019 switch (op)
11020 {
11021 default: /* Should never happen. */
323e0a4a 11022 error (_("unexpected attribute encountered"));
76a01679 11023 case OP_ATR_FIRST:
1eea4ebd
UW
11024 return value_from_longest
11025 (type, ada_array_bound (arg1, tem, 0));
76a01679 11026 case OP_ATR_LAST:
1eea4ebd
UW
11027 return value_from_longest
11028 (type, ada_array_bound (arg1, tem, 1));
76a01679 11029 case OP_ATR_LENGTH:
1eea4ebd
UW
11030 return value_from_longest
11031 (type, ada_array_length (arg1, tem));
76a01679
JB
11032 }
11033 }
11034 else if (discrete_type_p (type_arg))
11035 {
11036 struct type *range_type;
0d5cff50 11037 const char *name = ada_type_name (type_arg);
5b4ee69b 11038
76a01679 11039 range_type = NULL;
78134374 11040 if (name != NULL && type_arg->code () != TYPE_CODE_ENUM)
28c85d6c 11041 range_type = to_fixed_range_type (type_arg, NULL);
76a01679
JB
11042 if (range_type == NULL)
11043 range_type = type_arg;
11044 switch (op)
11045 {
11046 default:
323e0a4a 11047 error (_("unexpected attribute encountered"));
76a01679 11048 case OP_ATR_FIRST:
690cc4eb 11049 return value_from_longest
43bbcdc2 11050 (range_type, ada_discrete_type_low_bound (range_type));
76a01679 11051 case OP_ATR_LAST:
690cc4eb 11052 return value_from_longest
43bbcdc2 11053 (range_type, ada_discrete_type_high_bound (range_type));
76a01679 11054 case OP_ATR_LENGTH:
323e0a4a 11055 error (_("the 'length attribute applies only to array types"));
76a01679
JB
11056 }
11057 }
78134374 11058 else if (type_arg->code () == TYPE_CODE_FLT)
323e0a4a 11059 error (_("unimplemented type attribute"));
76a01679
JB
11060 else
11061 {
11062 LONGEST low, high;
11063
ad82864c
JB
11064 if (ada_is_constrained_packed_array_type (type_arg))
11065 type_arg = decode_constrained_packed_array_type (type_arg);
76a01679 11066
aa4fb036 11067 if (op == OP_ATR_LENGTH)
1eea4ebd 11068 type = builtin_type (exp->gdbarch)->builtin_int;
aa4fb036
JB
11069 else
11070 {
11071 type = ada_index_type (type_arg, tem, ada_attribute_name (op));
11072 if (type == NULL)
11073 type = builtin_type (exp->gdbarch)->builtin_int;
11074 }
1eea4ebd 11075
76a01679
JB
11076 switch (op)
11077 {
11078 default:
323e0a4a 11079 error (_("unexpected attribute encountered"));
76a01679 11080 case OP_ATR_FIRST:
1eea4ebd 11081 low = ada_array_bound_from_type (type_arg, tem, 0);
76a01679
JB
11082 return value_from_longest (type, low);
11083 case OP_ATR_LAST:
1eea4ebd 11084 high = ada_array_bound_from_type (type_arg, tem, 1);
76a01679
JB
11085 return value_from_longest (type, high);
11086 case OP_ATR_LENGTH:
1eea4ebd
UW
11087 low = ada_array_bound_from_type (type_arg, tem, 0);
11088 high = ada_array_bound_from_type (type_arg, tem, 1);
76a01679
JB
11089 return value_from_longest (type, high - low + 1);
11090 }
11091 }
14f9c5c9
AS
11092 }
11093
4c4b4cd2
PH
11094 case OP_ATR_TAG:
11095 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11096 if (noside == EVAL_SKIP)
76a01679 11097 goto nosideret;
4c4b4cd2
PH
11098
11099 if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 11100 return value_zero (ada_tag_type (arg1), not_lval);
4c4b4cd2
PH
11101
11102 return ada_value_tag (arg1);
11103
11104 case OP_ATR_MIN:
11105 case OP_ATR_MAX:
11106 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
14f9c5c9
AS
11107 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11108 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11109 if (noside == EVAL_SKIP)
76a01679 11110 goto nosideret;
d2e4a39e 11111 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
df407dfe 11112 return value_zero (value_type (arg1), not_lval);
14f9c5c9 11113 else
f44316fa
UW
11114 {
11115 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
11116 return value_binop (arg1, arg2,
11117 op == OP_ATR_MIN ? BINOP_MIN : BINOP_MAX);
11118 }
14f9c5c9 11119
4c4b4cd2
PH
11120 case OP_ATR_MODULUS:
11121 {
31dedfee 11122 struct type *type_arg = check_typedef (exp->elts[pc + 2].type);
4c4b4cd2 11123
5b4ee69b 11124 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
76a01679
JB
11125 if (noside == EVAL_SKIP)
11126 goto nosideret;
4c4b4cd2 11127
76a01679 11128 if (!ada_is_modular_type (type_arg))
323e0a4a 11129 error (_("'modulus must be applied to modular type"));
4c4b4cd2 11130
76a01679
JB
11131 return value_from_longest (TYPE_TARGET_TYPE (type_arg),
11132 ada_modulus (type_arg));
4c4b4cd2
PH
11133 }
11134
11135
11136 case OP_ATR_POS:
11137 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
14f9c5c9
AS
11138 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11139 if (noside == EVAL_SKIP)
76a01679 11140 goto nosideret;
3cb382c9
UW
11141 type = builtin_type (exp->gdbarch)->builtin_int;
11142 if (noside == EVAL_AVOID_SIDE_EFFECTS)
11143 return value_zero (type, not_lval);
14f9c5c9 11144 else
3cb382c9 11145 return value_pos_atr (type, arg1);
14f9c5c9 11146
4c4b4cd2
PH
11147 case OP_ATR_SIZE:
11148 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
8c1c099f
JB
11149 type = value_type (arg1);
11150
11151 /* If the argument is a reference, then dereference its type, since
11152 the user is really asking for the size of the actual object,
11153 not the size of the pointer. */
78134374 11154 if (type->code () == TYPE_CODE_REF)
8c1c099f
JB
11155 type = TYPE_TARGET_TYPE (type);
11156
4c4b4cd2 11157 if (noside == EVAL_SKIP)
76a01679 11158 goto nosideret;
4c4b4cd2 11159 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
22601c15 11160 return value_zero (builtin_type (exp->gdbarch)->builtin_int, not_lval);
4c4b4cd2 11161 else
22601c15 11162 return value_from_longest (builtin_type (exp->gdbarch)->builtin_int,
8c1c099f 11163 TARGET_CHAR_BIT * TYPE_LENGTH (type));
4c4b4cd2
PH
11164
11165 case OP_ATR_VAL:
11166 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
14f9c5c9 11167 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
4c4b4cd2 11168 type = exp->elts[pc + 2].type;
14f9c5c9 11169 if (noside == EVAL_SKIP)
76a01679 11170 goto nosideret;
4c4b4cd2 11171 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 11172 return value_zero (type, not_lval);
4c4b4cd2 11173 else
76a01679 11174 return value_val_atr (type, arg1);
4c4b4cd2
PH
11175
11176 case BINOP_EXP:
11177 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11178 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11179 if (noside == EVAL_SKIP)
11180 goto nosideret;
11181 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
df407dfe 11182 return value_zero (value_type (arg1), not_lval);
4c4b4cd2 11183 else
f44316fa
UW
11184 {
11185 /* For integer exponentiation operations,
11186 only promote the first argument. */
11187 if (is_integral_type (value_type (arg2)))
11188 unop_promote (exp->language_defn, exp->gdbarch, &arg1);
11189 else
11190 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
11191
11192 return value_binop (arg1, arg2, op);
11193 }
4c4b4cd2
PH
11194
11195 case UNOP_PLUS:
11196 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11197 if (noside == EVAL_SKIP)
11198 goto nosideret;
11199 else
11200 return arg1;
11201
11202 case UNOP_ABS:
11203 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11204 if (noside == EVAL_SKIP)
11205 goto nosideret;
f44316fa 11206 unop_promote (exp->language_defn, exp->gdbarch, &arg1);
df407dfe 11207 if (value_less (arg1, value_zero (value_type (arg1), not_lval)))
4c4b4cd2 11208 return value_neg (arg1);
14f9c5c9 11209 else
4c4b4cd2 11210 return arg1;
14f9c5c9
AS
11211
11212 case UNOP_IND:
5ec18f2b 11213 preeval_pos = *pos;
6b0d7253 11214 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
14f9c5c9 11215 if (noside == EVAL_SKIP)
4c4b4cd2 11216 goto nosideret;
df407dfe 11217 type = ada_check_typedef (value_type (arg1));
14f9c5c9 11218 if (noside == EVAL_AVOID_SIDE_EFFECTS)
4c4b4cd2
PH
11219 {
11220 if (ada_is_array_descriptor_type (type))
11221 /* GDB allows dereferencing GNAT array descriptors. */
11222 {
11223 struct type *arrType = ada_type_of_array (arg1, 0);
5b4ee69b 11224
4c4b4cd2 11225 if (arrType == NULL)
323e0a4a 11226 error (_("Attempt to dereference null array pointer."));
00a4c844 11227 return value_at_lazy (arrType, 0);
4c4b4cd2 11228 }
78134374
SM
11229 else if (type->code () == TYPE_CODE_PTR
11230 || type->code () == TYPE_CODE_REF
4c4b4cd2 11231 /* In C you can dereference an array to get the 1st elt. */
78134374 11232 || type->code () == TYPE_CODE_ARRAY)
714e53ab 11233 {
5ec18f2b
JG
11234 /* As mentioned in the OP_VAR_VALUE case, tagged types can
11235 only be determined by inspecting the object's tag.
11236 This means that we need to evaluate completely the
11237 expression in order to get its type. */
11238
78134374
SM
11239 if ((type->code () == TYPE_CODE_REF
11240 || type->code () == TYPE_CODE_PTR)
5ec18f2b
JG
11241 && ada_is_tagged_type (TYPE_TARGET_TYPE (type), 0))
11242 {
11243 arg1 = evaluate_subexp (NULL_TYPE, exp, &preeval_pos,
11244 EVAL_NORMAL);
11245 type = value_type (ada_value_ind (arg1));
11246 }
11247 else
11248 {
11249 type = to_static_fixed_type
11250 (ada_aligned_type
11251 (ada_check_typedef (TYPE_TARGET_TYPE (type))));
11252 }
c1b5a1a6 11253 ada_ensure_varsize_limit (type);
714e53ab
PH
11254 return value_zero (type, lval_memory);
11255 }
78134374 11256 else if (type->code () == TYPE_CODE_INT)
6b0d7253
JB
11257 {
11258 /* GDB allows dereferencing an int. */
11259 if (expect_type == NULL)
11260 return value_zero (builtin_type (exp->gdbarch)->builtin_int,
11261 lval_memory);
11262 else
11263 {
11264 expect_type =
11265 to_static_fixed_type (ada_aligned_type (expect_type));
11266 return value_zero (expect_type, lval_memory);
11267 }
11268 }
4c4b4cd2 11269 else
323e0a4a 11270 error (_("Attempt to take contents of a non-pointer value."));
4c4b4cd2 11271 }
0963b4bd 11272 arg1 = ada_coerce_ref (arg1); /* FIXME: What is this for?? */
df407dfe 11273 type = ada_check_typedef (value_type (arg1));
d2e4a39e 11274
78134374 11275 if (type->code () == TYPE_CODE_INT)
96967637
JB
11276 /* GDB allows dereferencing an int. If we were given
11277 the expect_type, then use that as the target type.
11278 Otherwise, assume that the target type is an int. */
11279 {
11280 if (expect_type != NULL)
11281 return ada_value_ind (value_cast (lookup_pointer_type (expect_type),
11282 arg1));
11283 else
11284 return value_at_lazy (builtin_type (exp->gdbarch)->builtin_int,
11285 (CORE_ADDR) value_as_address (arg1));
11286 }
6b0d7253 11287
4c4b4cd2
PH
11288 if (ada_is_array_descriptor_type (type))
11289 /* GDB allows dereferencing GNAT array descriptors. */
11290 return ada_coerce_to_simple_array (arg1);
14f9c5c9 11291 else
4c4b4cd2 11292 return ada_value_ind (arg1);
14f9c5c9
AS
11293
11294 case STRUCTOP_STRUCT:
11295 tem = longest_to_int (exp->elts[pc + 1].longconst);
11296 (*pos) += 3 + BYTES_TO_EXP_ELEM (tem + 1);
5ec18f2b 11297 preeval_pos = *pos;
14f9c5c9
AS
11298 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11299 if (noside == EVAL_SKIP)
4c4b4cd2 11300 goto nosideret;
14f9c5c9 11301 if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 11302 {
df407dfe 11303 struct type *type1 = value_type (arg1);
5b4ee69b 11304
76a01679
JB
11305 if (ada_is_tagged_type (type1, 1))
11306 {
11307 type = ada_lookup_struct_elt_type (type1,
11308 &exp->elts[pc + 2].string,
988f6b3d 11309 1, 1);
5ec18f2b
JG
11310
11311 /* If the field is not found, check if it exists in the
11312 extension of this object's type. This means that we
11313 need to evaluate completely the expression. */
11314
76a01679 11315 if (type == NULL)
5ec18f2b
JG
11316 {
11317 arg1 = evaluate_subexp (NULL_TYPE, exp, &preeval_pos,
11318 EVAL_NORMAL);
11319 arg1 = ada_value_struct_elt (arg1,
11320 &exp->elts[pc + 2].string,
11321 0);
11322 arg1 = unwrap_value (arg1);
11323 type = value_type (ada_to_fixed_value (arg1));
11324 }
76a01679
JB
11325 }
11326 else
11327 type =
11328 ada_lookup_struct_elt_type (type1, &exp->elts[pc + 2].string, 1,
988f6b3d 11329 0);
76a01679
JB
11330
11331 return value_zero (ada_aligned_type (type), lval_memory);
11332 }
14f9c5c9 11333 else
a579cd9a
MW
11334 {
11335 arg1 = ada_value_struct_elt (arg1, &exp->elts[pc + 2].string, 0);
11336 arg1 = unwrap_value (arg1);
11337 return ada_to_fixed_value (arg1);
11338 }
284614f0 11339
14f9c5c9 11340 case OP_TYPE:
4c4b4cd2
PH
11341 /* The value is not supposed to be used. This is here to make it
11342 easier to accommodate expressions that contain types. */
14f9c5c9
AS
11343 (*pos) += 2;
11344 if (noside == EVAL_SKIP)
4c4b4cd2 11345 goto nosideret;
14f9c5c9 11346 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
a6cfbe68 11347 return allocate_value (exp->elts[pc + 1].type);
14f9c5c9 11348 else
323e0a4a 11349 error (_("Attempt to use a type name as an expression"));
52ce6436
PH
11350
11351 case OP_AGGREGATE:
11352 case OP_CHOICES:
11353 case OP_OTHERS:
11354 case OP_DISCRETE_RANGE:
11355 case OP_POSITIONAL:
11356 case OP_NAME:
11357 if (noside == EVAL_NORMAL)
11358 switch (op)
11359 {
11360 case OP_NAME:
11361 error (_("Undefined name, ambiguous name, or renaming used in "
e1d5a0d2 11362 "component association: %s."), &exp->elts[pc+2].string);
52ce6436
PH
11363 case OP_AGGREGATE:
11364 error (_("Aggregates only allowed on the right of an assignment"));
11365 default:
0963b4bd
MS
11366 internal_error (__FILE__, __LINE__,
11367 _("aggregate apparently mangled"));
52ce6436
PH
11368 }
11369
11370 ada_forward_operator_length (exp, pc, &oplen, &nargs);
11371 *pos += oplen - 1;
11372 for (tem = 0; tem < nargs; tem += 1)
11373 ada_evaluate_subexp (NULL, exp, pos, noside);
11374 goto nosideret;
14f9c5c9
AS
11375 }
11376
11377nosideret:
ced9779b 11378 return eval_skip_value (exp);
14f9c5c9 11379}
14f9c5c9 11380\f
d2e4a39e 11381
4c4b4cd2 11382 /* Fixed point */
14f9c5c9
AS
11383
11384/* If TYPE encodes an Ada fixed-point type, return the suffix of the
11385 type name that encodes the 'small and 'delta information.
4c4b4cd2 11386 Otherwise, return NULL. */
14f9c5c9 11387
d2e4a39e 11388static const char *
b2188a06 11389gnat_encoded_fixed_type_info (struct type *type)
14f9c5c9 11390{
d2e4a39e 11391 const char *name = ada_type_name (type);
78134374 11392 enum type_code code = (type == NULL) ? TYPE_CODE_UNDEF : type->code ();
14f9c5c9 11393
d2e4a39e
AS
11394 if ((code == TYPE_CODE_INT || code == TYPE_CODE_RANGE) && name != NULL)
11395 {
14f9c5c9 11396 const char *tail = strstr (name, "___XF_");
5b4ee69b 11397
14f9c5c9 11398 if (tail == NULL)
4c4b4cd2 11399 return NULL;
d2e4a39e 11400 else
4c4b4cd2 11401 return tail + 5;
14f9c5c9
AS
11402 }
11403 else if (code == TYPE_CODE_RANGE && TYPE_TARGET_TYPE (type) != type)
b2188a06 11404 return gnat_encoded_fixed_type_info (TYPE_TARGET_TYPE (type));
14f9c5c9
AS
11405 else
11406 return NULL;
11407}
11408
4c4b4cd2 11409/* Returns non-zero iff TYPE represents an Ada fixed-point type. */
14f9c5c9
AS
11410
11411int
b2188a06 11412ada_is_gnat_encoded_fixed_point_type (struct type *type)
14f9c5c9 11413{
b2188a06 11414 return gnat_encoded_fixed_type_info (type) != NULL;
14f9c5c9
AS
11415}
11416
4c4b4cd2
PH
11417/* Return non-zero iff TYPE represents a System.Address type. */
11418
11419int
11420ada_is_system_address_type (struct type *type)
11421{
7d93a1e0 11422 return (type->name () && strcmp (type->name (), "system__address") == 0);
4c4b4cd2
PH
11423}
11424
14f9c5c9 11425/* Assuming that TYPE is the representation of an Ada fixed-point
50eff16b
UW
11426 type, return the target floating-point type to be used to represent
11427 of this type during internal computation. */
11428
11429static struct type *
11430ada_scaling_type (struct type *type)
11431{
11432 return builtin_type (get_type_arch (type))->builtin_long_double;
11433}
11434
11435/* Assuming that TYPE is the representation of an Ada fixed-point
11436 type, return its delta, or NULL if the type is malformed and the
4c4b4cd2 11437 delta cannot be determined. */
14f9c5c9 11438
50eff16b 11439struct value *
b2188a06 11440gnat_encoded_fixed_point_delta (struct type *type)
14f9c5c9 11441{
b2188a06 11442 const char *encoding = gnat_encoded_fixed_type_info (type);
50eff16b
UW
11443 struct type *scale_type = ada_scaling_type (type);
11444
11445 long long num, den;
11446
11447 if (sscanf (encoding, "_%lld_%lld", &num, &den) < 2)
11448 return nullptr;
d2e4a39e 11449 else
50eff16b
UW
11450 return value_binop (value_from_longest (scale_type, num),
11451 value_from_longest (scale_type, den), BINOP_DIV);
14f9c5c9
AS
11452}
11453
b2188a06
JB
11454/* Assuming that ada_is_gnat_encoded_fixed_point_type (TYPE), return
11455 the scaling factor ('SMALL value) associated with the type. */
14f9c5c9 11456
50eff16b
UW
11457struct value *
11458ada_scaling_factor (struct type *type)
14f9c5c9 11459{
b2188a06 11460 const char *encoding = gnat_encoded_fixed_type_info (type);
50eff16b
UW
11461 struct type *scale_type = ada_scaling_type (type);
11462
11463 long long num0, den0, num1, den1;
14f9c5c9 11464 int n;
d2e4a39e 11465
50eff16b 11466 n = sscanf (encoding, "_%lld_%lld_%lld_%lld",
facc390f 11467 &num0, &den0, &num1, &den1);
14f9c5c9
AS
11468
11469 if (n < 2)
50eff16b 11470 return value_from_longest (scale_type, 1);
14f9c5c9 11471 else if (n == 4)
50eff16b
UW
11472 return value_binop (value_from_longest (scale_type, num1),
11473 value_from_longest (scale_type, den1), BINOP_DIV);
d2e4a39e 11474 else
50eff16b
UW
11475 return value_binop (value_from_longest (scale_type, num0),
11476 value_from_longest (scale_type, den0), BINOP_DIV);
14f9c5c9
AS
11477}
11478
14f9c5c9 11479\f
d2e4a39e 11480
4c4b4cd2 11481 /* Range types */
14f9c5c9
AS
11482
11483/* Scan STR beginning at position K for a discriminant name, and
11484 return the value of that discriminant field of DVAL in *PX. If
11485 PNEW_K is not null, put the position of the character beyond the
11486 name scanned in *PNEW_K. Return 1 if successful; return 0 and do
4c4b4cd2 11487 not alter *PX and *PNEW_K if unsuccessful. */
14f9c5c9
AS
11488
11489static int
108d56a4 11490scan_discrim_bound (const char *str, int k, struct value *dval, LONGEST * px,
76a01679 11491 int *pnew_k)
14f9c5c9
AS
11492{
11493 static char *bound_buffer = NULL;
11494 static size_t bound_buffer_len = 0;
5da1a4d3 11495 const char *pstart, *pend, *bound;
d2e4a39e 11496 struct value *bound_val;
14f9c5c9
AS
11497
11498 if (dval == NULL || str == NULL || str[k] == '\0')
11499 return 0;
11500
5da1a4d3
SM
11501 pstart = str + k;
11502 pend = strstr (pstart, "__");
14f9c5c9
AS
11503 if (pend == NULL)
11504 {
5da1a4d3 11505 bound = pstart;
14f9c5c9
AS
11506 k += strlen (bound);
11507 }
d2e4a39e 11508 else
14f9c5c9 11509 {
5da1a4d3
SM
11510 int len = pend - pstart;
11511
11512 /* Strip __ and beyond. */
11513 GROW_VECT (bound_buffer, bound_buffer_len, len + 1);
11514 strncpy (bound_buffer, pstart, len);
11515 bound_buffer[len] = '\0';
11516
14f9c5c9 11517 bound = bound_buffer;
d2e4a39e 11518 k = pend - str;
14f9c5c9 11519 }
d2e4a39e 11520
df407dfe 11521 bound_val = ada_search_struct_field (bound, dval, 0, value_type (dval));
14f9c5c9
AS
11522 if (bound_val == NULL)
11523 return 0;
11524
11525 *px = value_as_long (bound_val);
11526 if (pnew_k != NULL)
11527 *pnew_k = k;
11528 return 1;
11529}
11530
11531/* Value of variable named NAME in the current environment. If
11532 no such variable found, then if ERR_MSG is null, returns 0, and
4c4b4cd2
PH
11533 otherwise causes an error with message ERR_MSG. */
11534
d2e4a39e 11535static struct value *
edb0c9cb 11536get_var_value (const char *name, const char *err_msg)
14f9c5c9 11537{
b5ec771e 11538 lookup_name_info lookup_name (name, symbol_name_match_type::FULL);
14f9c5c9 11539
54d343a2 11540 std::vector<struct block_symbol> syms;
b5ec771e
PA
11541 int nsyms = ada_lookup_symbol_list_worker (lookup_name,
11542 get_selected_block (0),
11543 VAR_DOMAIN, &syms, 1);
14f9c5c9
AS
11544
11545 if (nsyms != 1)
11546 {
11547 if (err_msg == NULL)
4c4b4cd2 11548 return 0;
14f9c5c9 11549 else
8a3fe4f8 11550 error (("%s"), err_msg);
14f9c5c9
AS
11551 }
11552
54d343a2 11553 return value_of_variable (syms[0].symbol, syms[0].block);
14f9c5c9 11554}
d2e4a39e 11555
edb0c9cb
PA
11556/* Value of integer variable named NAME in the current environment.
11557 If no such variable is found, returns false. Otherwise, sets VALUE
11558 to the variable's value and returns true. */
4c4b4cd2 11559
edb0c9cb
PA
11560bool
11561get_int_var_value (const char *name, LONGEST &value)
14f9c5c9 11562{
4c4b4cd2 11563 struct value *var_val = get_var_value (name, 0);
d2e4a39e 11564
14f9c5c9 11565 if (var_val == 0)
edb0c9cb
PA
11566 return false;
11567
11568 value = value_as_long (var_val);
11569 return true;
14f9c5c9 11570}
d2e4a39e 11571
14f9c5c9
AS
11572
11573/* Return a range type whose base type is that of the range type named
11574 NAME in the current environment, and whose bounds are calculated
4c4b4cd2 11575 from NAME according to the GNAT range encoding conventions.
1ce677a4
UW
11576 Extract discriminant values, if needed, from DVAL. ORIG_TYPE is the
11577 corresponding range type from debug information; fall back to using it
11578 if symbol lookup fails. If a new type must be created, allocate it
11579 like ORIG_TYPE was. The bounds information, in general, is encoded
11580 in NAME, the base type given in the named range type. */
14f9c5c9 11581
d2e4a39e 11582static struct type *
28c85d6c 11583to_fixed_range_type (struct type *raw_type, struct value *dval)
14f9c5c9 11584{
0d5cff50 11585 const char *name;
14f9c5c9 11586 struct type *base_type;
108d56a4 11587 const char *subtype_info;
14f9c5c9 11588
28c85d6c 11589 gdb_assert (raw_type != NULL);
7d93a1e0 11590 gdb_assert (raw_type->name () != NULL);
dddfab26 11591
78134374 11592 if (raw_type->code () == TYPE_CODE_RANGE)
14f9c5c9
AS
11593 base_type = TYPE_TARGET_TYPE (raw_type);
11594 else
11595 base_type = raw_type;
11596
7d93a1e0 11597 name = raw_type->name ();
14f9c5c9
AS
11598 subtype_info = strstr (name, "___XD");
11599 if (subtype_info == NULL)
690cc4eb 11600 {
43bbcdc2
PH
11601 LONGEST L = ada_discrete_type_low_bound (raw_type);
11602 LONGEST U = ada_discrete_type_high_bound (raw_type);
5b4ee69b 11603
690cc4eb
PH
11604 if (L < INT_MIN || U > INT_MAX)
11605 return raw_type;
11606 else
0c9c3474
SA
11607 return create_static_range_type (alloc_type_copy (raw_type), raw_type,
11608 L, U);
690cc4eb 11609 }
14f9c5c9
AS
11610 else
11611 {
11612 static char *name_buf = NULL;
11613 static size_t name_len = 0;
11614 int prefix_len = subtype_info - name;
11615 LONGEST L, U;
11616 struct type *type;
108d56a4 11617 const char *bounds_str;
14f9c5c9
AS
11618 int n;
11619
11620 GROW_VECT (name_buf, name_len, prefix_len + 5);
11621 strncpy (name_buf, name, prefix_len);
11622 name_buf[prefix_len] = '\0';
11623
11624 subtype_info += 5;
11625 bounds_str = strchr (subtype_info, '_');
11626 n = 1;
11627
d2e4a39e 11628 if (*subtype_info == 'L')
4c4b4cd2
PH
11629 {
11630 if (!ada_scan_number (bounds_str, n, &L, &n)
11631 && !scan_discrim_bound (bounds_str, n, dval, &L, &n))
11632 return raw_type;
11633 if (bounds_str[n] == '_')
11634 n += 2;
0963b4bd 11635 else if (bounds_str[n] == '.') /* FIXME? SGI Workshop kludge. */
4c4b4cd2
PH
11636 n += 1;
11637 subtype_info += 1;
11638 }
d2e4a39e 11639 else
4c4b4cd2 11640 {
4c4b4cd2 11641 strcpy (name_buf + prefix_len, "___L");
edb0c9cb 11642 if (!get_int_var_value (name_buf, L))
4c4b4cd2 11643 {
323e0a4a 11644 lim_warning (_("Unknown lower bound, using 1."));
4c4b4cd2
PH
11645 L = 1;
11646 }
11647 }
14f9c5c9 11648
d2e4a39e 11649 if (*subtype_info == 'U')
4c4b4cd2
PH
11650 {
11651 if (!ada_scan_number (bounds_str, n, &U, &n)
11652 && !scan_discrim_bound (bounds_str, n, dval, &U, &n))
11653 return raw_type;
11654 }
d2e4a39e 11655 else
4c4b4cd2 11656 {
4c4b4cd2 11657 strcpy (name_buf + prefix_len, "___U");
edb0c9cb 11658 if (!get_int_var_value (name_buf, U))
4c4b4cd2 11659 {
323e0a4a 11660 lim_warning (_("Unknown upper bound, using %ld."), (long) L);
4c4b4cd2
PH
11661 U = L;
11662 }
11663 }
14f9c5c9 11664
0c9c3474
SA
11665 type = create_static_range_type (alloc_type_copy (raw_type),
11666 base_type, L, U);
f5a91472
JB
11667 /* create_static_range_type alters the resulting type's length
11668 to match the size of the base_type, which is not what we want.
11669 Set it back to the original range type's length. */
11670 TYPE_LENGTH (type) = TYPE_LENGTH (raw_type);
d0e39ea2 11671 type->set_name (name);
14f9c5c9
AS
11672 return type;
11673 }
11674}
11675
4c4b4cd2
PH
11676/* True iff NAME is the name of a range type. */
11677
14f9c5c9 11678int
d2e4a39e 11679ada_is_range_type_name (const char *name)
14f9c5c9
AS
11680{
11681 return (name != NULL && strstr (name, "___XD"));
d2e4a39e 11682}
14f9c5c9 11683\f
d2e4a39e 11684
4c4b4cd2
PH
11685 /* Modular types */
11686
11687/* True iff TYPE is an Ada modular type. */
14f9c5c9 11688
14f9c5c9 11689int
d2e4a39e 11690ada_is_modular_type (struct type *type)
14f9c5c9 11691{
18af8284 11692 struct type *subranged_type = get_base_type (type);
14f9c5c9 11693
78134374
SM
11694 return (subranged_type != NULL && type->code () == TYPE_CODE_RANGE
11695 && subranged_type->code () == TYPE_CODE_INT
4c4b4cd2 11696 && TYPE_UNSIGNED (subranged_type));
14f9c5c9
AS
11697}
11698
4c4b4cd2
PH
11699/* Assuming ada_is_modular_type (TYPE), the modulus of TYPE. */
11700
61ee279c 11701ULONGEST
0056e4d5 11702ada_modulus (struct type *type)
14f9c5c9 11703{
43bbcdc2 11704 return (ULONGEST) TYPE_HIGH_BOUND (type) + 1;
14f9c5c9 11705}
d2e4a39e 11706\f
f7f9143b
JB
11707
11708/* Ada exception catchpoint support:
11709 ---------------------------------
11710
11711 We support 3 kinds of exception catchpoints:
11712 . catchpoints on Ada exceptions
11713 . catchpoints on unhandled Ada exceptions
11714 . catchpoints on failed assertions
11715
11716 Exceptions raised during failed assertions, or unhandled exceptions
11717 could perfectly be caught with the general catchpoint on Ada exceptions.
11718 However, we can easily differentiate these two special cases, and having
11719 the option to distinguish these two cases from the rest can be useful
11720 to zero-in on certain situations.
11721
11722 Exception catchpoints are a specialized form of breakpoint,
11723 since they rely on inserting breakpoints inside known routines
11724 of the GNAT runtime. The implementation therefore uses a standard
11725 breakpoint structure of the BP_BREAKPOINT type, but with its own set
11726 of breakpoint_ops.
11727
0259addd
JB
11728 Support in the runtime for exception catchpoints have been changed
11729 a few times already, and these changes affect the implementation
11730 of these catchpoints. In order to be able to support several
11731 variants of the runtime, we use a sniffer that will determine
28010a5d 11732 the runtime variant used by the program being debugged. */
f7f9143b 11733
82eacd52
JB
11734/* Ada's standard exceptions.
11735
11736 The Ada 83 standard also defined Numeric_Error. But there so many
11737 situations where it was unclear from the Ada 83 Reference Manual
11738 (RM) whether Constraint_Error or Numeric_Error should be raised,
11739 that the ARG (Ada Rapporteur Group) eventually issued a Binding
11740 Interpretation saying that anytime the RM says that Numeric_Error
11741 should be raised, the implementation may raise Constraint_Error.
11742 Ada 95 went one step further and pretty much removed Numeric_Error
11743 from the list of standard exceptions (it made it a renaming of
11744 Constraint_Error, to help preserve compatibility when compiling
11745 an Ada83 compiler). As such, we do not include Numeric_Error from
11746 this list of standard exceptions. */
3d0b0fa3 11747
a121b7c1 11748static const char *standard_exc[] = {
3d0b0fa3
JB
11749 "constraint_error",
11750 "program_error",
11751 "storage_error",
11752 "tasking_error"
11753};
11754
0259addd
JB
11755typedef CORE_ADDR (ada_unhandled_exception_name_addr_ftype) (void);
11756
11757/* A structure that describes how to support exception catchpoints
11758 for a given executable. */
11759
11760struct exception_support_info
11761{
11762 /* The name of the symbol to break on in order to insert
11763 a catchpoint on exceptions. */
11764 const char *catch_exception_sym;
11765
11766 /* The name of the symbol to break on in order to insert
11767 a catchpoint on unhandled exceptions. */
11768 const char *catch_exception_unhandled_sym;
11769
11770 /* The name of the symbol to break on in order to insert
11771 a catchpoint on failed assertions. */
11772 const char *catch_assert_sym;
11773
9f757bf7
XR
11774 /* The name of the symbol to break on in order to insert
11775 a catchpoint on exception handling. */
11776 const char *catch_handlers_sym;
11777
0259addd
JB
11778 /* Assuming that the inferior just triggered an unhandled exception
11779 catchpoint, this function is responsible for returning the address
11780 in inferior memory where the name of that exception is stored.
11781 Return zero if the address could not be computed. */
11782 ada_unhandled_exception_name_addr_ftype *unhandled_exception_name_addr;
11783};
11784
11785static CORE_ADDR ada_unhandled_exception_name_addr (void);
11786static CORE_ADDR ada_unhandled_exception_name_addr_from_raise (void);
11787
11788/* The following exception support info structure describes how to
11789 implement exception catchpoints with the latest version of the
ca683e3a 11790 Ada runtime (as of 2019-08-??). */
0259addd
JB
11791
11792static const struct exception_support_info default_exception_support_info =
ca683e3a
AO
11793{
11794 "__gnat_debug_raise_exception", /* catch_exception_sym */
11795 "__gnat_unhandled_exception", /* catch_exception_unhandled_sym */
11796 "__gnat_debug_raise_assert_failure", /* catch_assert_sym */
11797 "__gnat_begin_handler_v1", /* catch_handlers_sym */
11798 ada_unhandled_exception_name_addr
11799};
11800
11801/* The following exception support info structure describes how to
11802 implement exception catchpoints with an earlier version of the
11803 Ada runtime (as of 2007-03-06) using v0 of the EH ABI. */
11804
11805static const struct exception_support_info exception_support_info_v0 =
0259addd
JB
11806{
11807 "__gnat_debug_raise_exception", /* catch_exception_sym */
11808 "__gnat_unhandled_exception", /* catch_exception_unhandled_sym */
11809 "__gnat_debug_raise_assert_failure", /* catch_assert_sym */
9f757bf7 11810 "__gnat_begin_handler", /* catch_handlers_sym */
0259addd
JB
11811 ada_unhandled_exception_name_addr
11812};
11813
11814/* The following exception support info structure describes how to
11815 implement exception catchpoints with a slightly older version
11816 of the Ada runtime. */
11817
11818static const struct exception_support_info exception_support_info_fallback =
11819{
11820 "__gnat_raise_nodefer_with_msg", /* catch_exception_sym */
11821 "__gnat_unhandled_exception", /* catch_exception_unhandled_sym */
11822 "system__assertions__raise_assert_failure", /* catch_assert_sym */
9f757bf7 11823 "__gnat_begin_handler", /* catch_handlers_sym */
0259addd
JB
11824 ada_unhandled_exception_name_addr_from_raise
11825};
11826
f17011e0
JB
11827/* Return nonzero if we can detect the exception support routines
11828 described in EINFO.
11829
11830 This function errors out if an abnormal situation is detected
11831 (for instance, if we find the exception support routines, but
11832 that support is found to be incomplete). */
11833
11834static int
11835ada_has_this_exception_support (const struct exception_support_info *einfo)
11836{
11837 struct symbol *sym;
11838
11839 /* The symbol we're looking up is provided by a unit in the GNAT runtime
11840 that should be compiled with debugging information. As a result, we
11841 expect to find that symbol in the symtabs. */
11842
11843 sym = standard_lookup (einfo->catch_exception_sym, NULL, VAR_DOMAIN);
11844 if (sym == NULL)
a6af7abe
JB
11845 {
11846 /* Perhaps we did not find our symbol because the Ada runtime was
11847 compiled without debugging info, or simply stripped of it.
11848 It happens on some GNU/Linux distributions for instance, where
11849 users have to install a separate debug package in order to get
11850 the runtime's debugging info. In that situation, let the user
11851 know why we cannot insert an Ada exception catchpoint.
11852
11853 Note: Just for the purpose of inserting our Ada exception
11854 catchpoint, we could rely purely on the associated minimal symbol.
11855 But we would be operating in degraded mode anyway, since we are
11856 still lacking the debugging info needed later on to extract
11857 the name of the exception being raised (this name is printed in
11858 the catchpoint message, and is also used when trying to catch
11859 a specific exception). We do not handle this case for now. */
3b7344d5 11860 struct bound_minimal_symbol msym
1c8e84b0
JB
11861 = lookup_minimal_symbol (einfo->catch_exception_sym, NULL, NULL);
11862
3b7344d5 11863 if (msym.minsym && MSYMBOL_TYPE (msym.minsym) != mst_solib_trampoline)
a6af7abe
JB
11864 error (_("Your Ada runtime appears to be missing some debugging "
11865 "information.\nCannot insert Ada exception catchpoint "
11866 "in this configuration."));
11867
11868 return 0;
11869 }
f17011e0
JB
11870
11871 /* Make sure that the symbol we found corresponds to a function. */
11872
11873 if (SYMBOL_CLASS (sym) != LOC_BLOCK)
ca683e3a
AO
11874 {
11875 error (_("Symbol \"%s\" is not a function (class = %d)"),
987012b8 11876 sym->linkage_name (), SYMBOL_CLASS (sym));
ca683e3a
AO
11877 return 0;
11878 }
11879
11880 sym = standard_lookup (einfo->catch_handlers_sym, NULL, VAR_DOMAIN);
11881 if (sym == NULL)
11882 {
11883 struct bound_minimal_symbol msym
11884 = lookup_minimal_symbol (einfo->catch_handlers_sym, NULL, NULL);
11885
11886 if (msym.minsym && MSYMBOL_TYPE (msym.minsym) != mst_solib_trampoline)
11887 error (_("Your Ada runtime appears to be missing some debugging "
11888 "information.\nCannot insert Ada exception catchpoint "
11889 "in this configuration."));
11890
11891 return 0;
11892 }
11893
11894 /* Make sure that the symbol we found corresponds to a function. */
11895
11896 if (SYMBOL_CLASS (sym) != LOC_BLOCK)
11897 {
11898 error (_("Symbol \"%s\" is not a function (class = %d)"),
987012b8 11899 sym->linkage_name (), SYMBOL_CLASS (sym));
ca683e3a
AO
11900 return 0;
11901 }
f17011e0
JB
11902
11903 return 1;
11904}
11905
0259addd
JB
11906/* Inspect the Ada runtime and determine which exception info structure
11907 should be used to provide support for exception catchpoints.
11908
3eecfa55
JB
11909 This function will always set the per-inferior exception_info,
11910 or raise an error. */
0259addd
JB
11911
11912static void
11913ada_exception_support_info_sniffer (void)
11914{
3eecfa55 11915 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
0259addd
JB
11916
11917 /* If the exception info is already known, then no need to recompute it. */
3eecfa55 11918 if (data->exception_info != NULL)
0259addd
JB
11919 return;
11920
11921 /* Check the latest (default) exception support info. */
f17011e0 11922 if (ada_has_this_exception_support (&default_exception_support_info))
0259addd 11923 {
3eecfa55 11924 data->exception_info = &default_exception_support_info;
0259addd
JB
11925 return;
11926 }
11927
ca683e3a
AO
11928 /* Try the v0 exception suport info. */
11929 if (ada_has_this_exception_support (&exception_support_info_v0))
11930 {
11931 data->exception_info = &exception_support_info_v0;
11932 return;
11933 }
11934
0259addd 11935 /* Try our fallback exception suport info. */
f17011e0 11936 if (ada_has_this_exception_support (&exception_support_info_fallback))
0259addd 11937 {
3eecfa55 11938 data->exception_info = &exception_support_info_fallback;
0259addd
JB
11939 return;
11940 }
11941
11942 /* Sometimes, it is normal for us to not be able to find the routine
11943 we are looking for. This happens when the program is linked with
11944 the shared version of the GNAT runtime, and the program has not been
11945 started yet. Inform the user of these two possible causes if
11946 applicable. */
11947
ccefe4c4 11948 if (ada_update_initial_language (language_unknown) != language_ada)
0259addd
JB
11949 error (_("Unable to insert catchpoint. Is this an Ada main program?"));
11950
11951 /* If the symbol does not exist, then check that the program is
11952 already started, to make sure that shared libraries have been
11953 loaded. If it is not started, this may mean that the symbol is
11954 in a shared library. */
11955
e99b03dc 11956 if (inferior_ptid.pid () == 0)
0259addd
JB
11957 error (_("Unable to insert catchpoint. Try to start the program first."));
11958
11959 /* At this point, we know that we are debugging an Ada program and
11960 that the inferior has been started, but we still are not able to
0963b4bd 11961 find the run-time symbols. That can mean that we are in
0259addd
JB
11962 configurable run time mode, or that a-except as been optimized
11963 out by the linker... In any case, at this point it is not worth
11964 supporting this feature. */
11965
7dda8cff 11966 error (_("Cannot insert Ada exception catchpoints in this configuration."));
0259addd
JB
11967}
11968
f7f9143b
JB
11969/* True iff FRAME is very likely to be that of a function that is
11970 part of the runtime system. This is all very heuristic, but is
11971 intended to be used as advice as to what frames are uninteresting
11972 to most users. */
11973
11974static int
11975is_known_support_routine (struct frame_info *frame)
11976{
692465f1 11977 enum language func_lang;
f7f9143b 11978 int i;
f35a17b5 11979 const char *fullname;
f7f9143b 11980
4ed6b5be
JB
11981 /* If this code does not have any debugging information (no symtab),
11982 This cannot be any user code. */
f7f9143b 11983
51abb421 11984 symtab_and_line sal = find_frame_sal (frame);
f7f9143b
JB
11985 if (sal.symtab == NULL)
11986 return 1;
11987
4ed6b5be
JB
11988 /* If there is a symtab, but the associated source file cannot be
11989 located, then assume this is not user code: Selecting a frame
11990 for which we cannot display the code would not be very helpful
11991 for the user. This should also take care of case such as VxWorks
11992 where the kernel has some debugging info provided for a few units. */
f7f9143b 11993
f35a17b5
JK
11994 fullname = symtab_to_fullname (sal.symtab);
11995 if (access (fullname, R_OK) != 0)
f7f9143b
JB
11996 return 1;
11997
85102364 11998 /* Check the unit filename against the Ada runtime file naming.
4ed6b5be
JB
11999 We also check the name of the objfile against the name of some
12000 known system libraries that sometimes come with debugging info
12001 too. */
12002
f7f9143b
JB
12003 for (i = 0; known_runtime_file_name_patterns[i] != NULL; i += 1)
12004 {
12005 re_comp (known_runtime_file_name_patterns[i]);
f69c91ad 12006 if (re_exec (lbasename (sal.symtab->filename)))
f7f9143b 12007 return 1;
eb822aa6
DE
12008 if (SYMTAB_OBJFILE (sal.symtab) != NULL
12009 && re_exec (objfile_name (SYMTAB_OBJFILE (sal.symtab))))
4ed6b5be 12010 return 1;
f7f9143b
JB
12011 }
12012
4ed6b5be 12013 /* Check whether the function is a GNAT-generated entity. */
f7f9143b 12014
c6dc63a1
TT
12015 gdb::unique_xmalloc_ptr<char> func_name
12016 = find_frame_funname (frame, &func_lang, NULL);
f7f9143b
JB
12017 if (func_name == NULL)
12018 return 1;
12019
12020 for (i = 0; known_auxiliary_function_name_patterns[i] != NULL; i += 1)
12021 {
12022 re_comp (known_auxiliary_function_name_patterns[i]);
c6dc63a1
TT
12023 if (re_exec (func_name.get ()))
12024 return 1;
f7f9143b
JB
12025 }
12026
12027 return 0;
12028}
12029
12030/* Find the first frame that contains debugging information and that is not
12031 part of the Ada run-time, starting from FI and moving upward. */
12032
0ef643c8 12033void
f7f9143b
JB
12034ada_find_printable_frame (struct frame_info *fi)
12035{
12036 for (; fi != NULL; fi = get_prev_frame (fi))
12037 {
12038 if (!is_known_support_routine (fi))
12039 {
12040 select_frame (fi);
12041 break;
12042 }
12043 }
12044
12045}
12046
12047/* Assuming that the inferior just triggered an unhandled exception
12048 catchpoint, return the address in inferior memory where the name
12049 of the exception is stored.
12050
12051 Return zero if the address could not be computed. */
12052
12053static CORE_ADDR
12054ada_unhandled_exception_name_addr (void)
0259addd
JB
12055{
12056 return parse_and_eval_address ("e.full_name");
12057}
12058
12059/* Same as ada_unhandled_exception_name_addr, except that this function
12060 should be used when the inferior uses an older version of the runtime,
12061 where the exception name needs to be extracted from a specific frame
12062 several frames up in the callstack. */
12063
12064static CORE_ADDR
12065ada_unhandled_exception_name_addr_from_raise (void)
f7f9143b
JB
12066{
12067 int frame_level;
12068 struct frame_info *fi;
3eecfa55 12069 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
f7f9143b
JB
12070
12071 /* To determine the name of this exception, we need to select
12072 the frame corresponding to RAISE_SYM_NAME. This frame is
12073 at least 3 levels up, so we simply skip the first 3 frames
12074 without checking the name of their associated function. */
12075 fi = get_current_frame ();
12076 for (frame_level = 0; frame_level < 3; frame_level += 1)
12077 if (fi != NULL)
12078 fi = get_prev_frame (fi);
12079
12080 while (fi != NULL)
12081 {
692465f1
JB
12082 enum language func_lang;
12083
c6dc63a1
TT
12084 gdb::unique_xmalloc_ptr<char> func_name
12085 = find_frame_funname (fi, &func_lang, NULL);
55b87a52
KS
12086 if (func_name != NULL)
12087 {
c6dc63a1 12088 if (strcmp (func_name.get (),
55b87a52
KS
12089 data->exception_info->catch_exception_sym) == 0)
12090 break; /* We found the frame we were looking for... */
55b87a52 12091 }
fb44b1a7 12092 fi = get_prev_frame (fi);
f7f9143b
JB
12093 }
12094
12095 if (fi == NULL)
12096 return 0;
12097
12098 select_frame (fi);
12099 return parse_and_eval_address ("id.full_name");
12100}
12101
12102/* Assuming the inferior just triggered an Ada exception catchpoint
12103 (of any type), return the address in inferior memory where the name
12104 of the exception is stored, if applicable.
12105
45db7c09
PA
12106 Assumes the selected frame is the current frame.
12107
f7f9143b
JB
12108 Return zero if the address could not be computed, or if not relevant. */
12109
12110static CORE_ADDR
761269c8 12111ada_exception_name_addr_1 (enum ada_exception_catchpoint_kind ex,
f7f9143b
JB
12112 struct breakpoint *b)
12113{
3eecfa55
JB
12114 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
12115
f7f9143b
JB
12116 switch (ex)
12117 {
761269c8 12118 case ada_catch_exception:
f7f9143b
JB
12119 return (parse_and_eval_address ("e.full_name"));
12120 break;
12121
761269c8 12122 case ada_catch_exception_unhandled:
3eecfa55 12123 return data->exception_info->unhandled_exception_name_addr ();
f7f9143b 12124 break;
9f757bf7
XR
12125
12126 case ada_catch_handlers:
12127 return 0; /* The runtimes does not provide access to the exception
12128 name. */
12129 break;
12130
761269c8 12131 case ada_catch_assert:
f7f9143b
JB
12132 return 0; /* Exception name is not relevant in this case. */
12133 break;
12134
12135 default:
12136 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12137 break;
12138 }
12139
12140 return 0; /* Should never be reached. */
12141}
12142
e547c119
JB
12143/* Assuming the inferior is stopped at an exception catchpoint,
12144 return the message which was associated to the exception, if
12145 available. Return NULL if the message could not be retrieved.
12146
e547c119
JB
12147 Note: The exception message can be associated to an exception
12148 either through the use of the Raise_Exception function, or
12149 more simply (Ada 2005 and later), via:
12150
12151 raise Exception_Name with "exception message";
12152
12153 */
12154
6f46ac85 12155static gdb::unique_xmalloc_ptr<char>
e547c119
JB
12156ada_exception_message_1 (void)
12157{
12158 struct value *e_msg_val;
e547c119 12159 int e_msg_len;
e547c119
JB
12160
12161 /* For runtimes that support this feature, the exception message
12162 is passed as an unbounded string argument called "message". */
12163 e_msg_val = parse_and_eval ("message");
12164 if (e_msg_val == NULL)
12165 return NULL; /* Exception message not supported. */
12166
12167 e_msg_val = ada_coerce_to_simple_array (e_msg_val);
12168 gdb_assert (e_msg_val != NULL);
12169 e_msg_len = TYPE_LENGTH (value_type (e_msg_val));
12170
12171 /* If the message string is empty, then treat it as if there was
12172 no exception message. */
12173 if (e_msg_len <= 0)
12174 return NULL;
12175
6f46ac85
TT
12176 gdb::unique_xmalloc_ptr<char> e_msg ((char *) xmalloc (e_msg_len + 1));
12177 read_memory_string (value_address (e_msg_val), e_msg.get (), e_msg_len + 1);
12178 e_msg.get ()[e_msg_len] = '\0';
e547c119 12179
e547c119
JB
12180 return e_msg;
12181}
12182
12183/* Same as ada_exception_message_1, except that all exceptions are
12184 contained here (returning NULL instead). */
12185
6f46ac85 12186static gdb::unique_xmalloc_ptr<char>
e547c119
JB
12187ada_exception_message (void)
12188{
6f46ac85 12189 gdb::unique_xmalloc_ptr<char> e_msg;
e547c119 12190
a70b8144 12191 try
e547c119
JB
12192 {
12193 e_msg = ada_exception_message_1 ();
12194 }
230d2906 12195 catch (const gdb_exception_error &e)
e547c119 12196 {
6f46ac85 12197 e_msg.reset (nullptr);
e547c119 12198 }
e547c119
JB
12199
12200 return e_msg;
12201}
12202
f7f9143b
JB
12203/* Same as ada_exception_name_addr_1, except that it intercepts and contains
12204 any error that ada_exception_name_addr_1 might cause to be thrown.
12205 When an error is intercepted, a warning with the error message is printed,
12206 and zero is returned. */
12207
12208static CORE_ADDR
761269c8 12209ada_exception_name_addr (enum ada_exception_catchpoint_kind ex,
f7f9143b
JB
12210 struct breakpoint *b)
12211{
f7f9143b
JB
12212 CORE_ADDR result = 0;
12213
a70b8144 12214 try
f7f9143b
JB
12215 {
12216 result = ada_exception_name_addr_1 (ex, b);
12217 }
12218
230d2906 12219 catch (const gdb_exception_error &e)
f7f9143b 12220 {
3d6e9d23 12221 warning (_("failed to get exception name: %s"), e.what ());
f7f9143b
JB
12222 return 0;
12223 }
12224
12225 return result;
12226}
12227
cb7de75e 12228static std::string ada_exception_catchpoint_cond_string
9f757bf7
XR
12229 (const char *excep_string,
12230 enum ada_exception_catchpoint_kind ex);
28010a5d
PA
12231
12232/* Ada catchpoints.
12233
12234 In the case of catchpoints on Ada exceptions, the catchpoint will
12235 stop the target on every exception the program throws. When a user
12236 specifies the name of a specific exception, we translate this
12237 request into a condition expression (in text form), and then parse
12238 it into an expression stored in each of the catchpoint's locations.
12239 We then use this condition to check whether the exception that was
12240 raised is the one the user is interested in. If not, then the
12241 target is resumed again. We store the name of the requested
12242 exception, in order to be able to re-set the condition expression
12243 when symbols change. */
12244
12245/* An instance of this type is used to represent an Ada catchpoint
5625a286 12246 breakpoint location. */
28010a5d 12247
5625a286 12248class ada_catchpoint_location : public bp_location
28010a5d 12249{
5625a286 12250public:
5f486660 12251 ada_catchpoint_location (breakpoint *owner)
f06f1252 12252 : bp_location (owner, bp_loc_software_breakpoint)
5625a286 12253 {}
28010a5d
PA
12254
12255 /* The condition that checks whether the exception that was raised
12256 is the specific exception the user specified on catchpoint
12257 creation. */
4d01a485 12258 expression_up excep_cond_expr;
28010a5d
PA
12259};
12260
c1fc2657 12261/* An instance of this type is used to represent an Ada catchpoint. */
28010a5d 12262
c1fc2657 12263struct ada_catchpoint : public breakpoint
28010a5d 12264{
37f6a7f4
TT
12265 explicit ada_catchpoint (enum ada_exception_catchpoint_kind kind)
12266 : m_kind (kind)
12267 {
12268 }
12269
28010a5d 12270 /* The name of the specific exception the user specified. */
bc18fbb5 12271 std::string excep_string;
37f6a7f4
TT
12272
12273 /* What kind of catchpoint this is. */
12274 enum ada_exception_catchpoint_kind m_kind;
28010a5d
PA
12275};
12276
12277/* Parse the exception condition string in the context of each of the
12278 catchpoint's locations, and store them for later evaluation. */
12279
12280static void
9f757bf7
XR
12281create_excep_cond_exprs (struct ada_catchpoint *c,
12282 enum ada_exception_catchpoint_kind ex)
28010a5d 12283{
fccf9de1
TT
12284 struct bp_location *bl;
12285
28010a5d 12286 /* Nothing to do if there's no specific exception to catch. */
bc18fbb5 12287 if (c->excep_string.empty ())
28010a5d
PA
12288 return;
12289
12290 /* Same if there are no locations... */
c1fc2657 12291 if (c->loc == NULL)
28010a5d
PA
12292 return;
12293
fccf9de1
TT
12294 /* Compute the condition expression in text form, from the specific
12295 expection we want to catch. */
12296 std::string cond_string
12297 = ada_exception_catchpoint_cond_string (c->excep_string.c_str (), ex);
28010a5d 12298
fccf9de1
TT
12299 /* Iterate over all the catchpoint's locations, and parse an
12300 expression for each. */
12301 for (bl = c->loc; bl != NULL; bl = bl->next)
28010a5d
PA
12302 {
12303 struct ada_catchpoint_location *ada_loc
fccf9de1 12304 = (struct ada_catchpoint_location *) bl;
4d01a485 12305 expression_up exp;
28010a5d 12306
fccf9de1 12307 if (!bl->shlib_disabled)
28010a5d 12308 {
bbc13ae3 12309 const char *s;
28010a5d 12310
cb7de75e 12311 s = cond_string.c_str ();
a70b8144 12312 try
28010a5d 12313 {
fccf9de1
TT
12314 exp = parse_exp_1 (&s, bl->address,
12315 block_for_pc (bl->address),
036e657b 12316 0);
28010a5d 12317 }
230d2906 12318 catch (const gdb_exception_error &e)
849f2b52
JB
12319 {
12320 warning (_("failed to reevaluate internal exception condition "
12321 "for catchpoint %d: %s"),
3d6e9d23 12322 c->number, e.what ());
849f2b52 12323 }
28010a5d
PA
12324 }
12325
b22e99fd 12326 ada_loc->excep_cond_expr = std::move (exp);
28010a5d 12327 }
28010a5d
PA
12328}
12329
28010a5d
PA
12330/* Implement the ALLOCATE_LOCATION method in the breakpoint_ops
12331 structure for all exception catchpoint kinds. */
12332
12333static struct bp_location *
37f6a7f4 12334allocate_location_exception (struct breakpoint *self)
28010a5d 12335{
5f486660 12336 return new ada_catchpoint_location (self);
28010a5d
PA
12337}
12338
12339/* Implement the RE_SET method in the breakpoint_ops structure for all
12340 exception catchpoint kinds. */
12341
12342static void
37f6a7f4 12343re_set_exception (struct breakpoint *b)
28010a5d
PA
12344{
12345 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
12346
12347 /* Call the base class's method. This updates the catchpoint's
12348 locations. */
2060206e 12349 bkpt_breakpoint_ops.re_set (b);
28010a5d
PA
12350
12351 /* Reparse the exception conditional expressions. One for each
12352 location. */
37f6a7f4 12353 create_excep_cond_exprs (c, c->m_kind);
28010a5d
PA
12354}
12355
12356/* Returns true if we should stop for this breakpoint hit. If the
12357 user specified a specific exception, we only want to cause a stop
12358 if the program thrown that exception. */
12359
12360static int
12361should_stop_exception (const struct bp_location *bl)
12362{
12363 struct ada_catchpoint *c = (struct ada_catchpoint *) bl->owner;
12364 const struct ada_catchpoint_location *ada_loc
12365 = (const struct ada_catchpoint_location *) bl;
28010a5d
PA
12366 int stop;
12367
37f6a7f4
TT
12368 struct internalvar *var = lookup_internalvar ("_ada_exception");
12369 if (c->m_kind == ada_catch_assert)
12370 clear_internalvar (var);
12371 else
12372 {
12373 try
12374 {
12375 const char *expr;
12376
12377 if (c->m_kind == ada_catch_handlers)
12378 expr = ("GNAT_GCC_exception_Access(gcc_exception)"
12379 ".all.occurrence.id");
12380 else
12381 expr = "e";
12382
12383 struct value *exc = parse_and_eval (expr);
12384 set_internalvar (var, exc);
12385 }
12386 catch (const gdb_exception_error &ex)
12387 {
12388 clear_internalvar (var);
12389 }
12390 }
12391
28010a5d 12392 /* With no specific exception, should always stop. */
bc18fbb5 12393 if (c->excep_string.empty ())
28010a5d
PA
12394 return 1;
12395
12396 if (ada_loc->excep_cond_expr == NULL)
12397 {
12398 /* We will have a NULL expression if back when we were creating
12399 the expressions, this location's had failed to parse. */
12400 return 1;
12401 }
12402
12403 stop = 1;
a70b8144 12404 try
28010a5d
PA
12405 {
12406 struct value *mark;
12407
12408 mark = value_mark ();
4d01a485 12409 stop = value_true (evaluate_expression (ada_loc->excep_cond_expr.get ()));
28010a5d
PA
12410 value_free_to_mark (mark);
12411 }
230d2906 12412 catch (const gdb_exception &ex)
492d29ea
PA
12413 {
12414 exception_fprintf (gdb_stderr, ex,
12415 _("Error in testing exception condition:\n"));
12416 }
492d29ea 12417
28010a5d
PA
12418 return stop;
12419}
12420
12421/* Implement the CHECK_STATUS method in the breakpoint_ops structure
12422 for all exception catchpoint kinds. */
12423
12424static void
37f6a7f4 12425check_status_exception (bpstat bs)
28010a5d
PA
12426{
12427 bs->stop = should_stop_exception (bs->bp_location_at);
12428}
12429
f7f9143b
JB
12430/* Implement the PRINT_IT method in the breakpoint_ops structure
12431 for all exception catchpoint kinds. */
12432
12433static enum print_stop_action
37f6a7f4 12434print_it_exception (bpstat bs)
f7f9143b 12435{
79a45e25 12436 struct ui_out *uiout = current_uiout;
348d480f
PA
12437 struct breakpoint *b = bs->breakpoint_at;
12438
956a9fb9 12439 annotate_catchpoint (b->number);
f7f9143b 12440
112e8700 12441 if (uiout->is_mi_like_p ())
f7f9143b 12442 {
112e8700 12443 uiout->field_string ("reason",
956a9fb9 12444 async_reason_lookup (EXEC_ASYNC_BREAKPOINT_HIT));
112e8700 12445 uiout->field_string ("disp", bpdisp_text (b->disposition));
f7f9143b
JB
12446 }
12447
112e8700
SM
12448 uiout->text (b->disposition == disp_del
12449 ? "\nTemporary catchpoint " : "\nCatchpoint ");
381befee 12450 uiout->field_signed ("bkptno", b->number);
112e8700 12451 uiout->text (", ");
f7f9143b 12452
45db7c09
PA
12453 /* ada_exception_name_addr relies on the selected frame being the
12454 current frame. Need to do this here because this function may be
12455 called more than once when printing a stop, and below, we'll
12456 select the first frame past the Ada run-time (see
12457 ada_find_printable_frame). */
12458 select_frame (get_current_frame ());
12459
37f6a7f4
TT
12460 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
12461 switch (c->m_kind)
f7f9143b 12462 {
761269c8
JB
12463 case ada_catch_exception:
12464 case ada_catch_exception_unhandled:
9f757bf7 12465 case ada_catch_handlers:
956a9fb9 12466 {
37f6a7f4 12467 const CORE_ADDR addr = ada_exception_name_addr (c->m_kind, b);
956a9fb9
JB
12468 char exception_name[256];
12469
12470 if (addr != 0)
12471 {
c714b426
PA
12472 read_memory (addr, (gdb_byte *) exception_name,
12473 sizeof (exception_name) - 1);
956a9fb9
JB
12474 exception_name [sizeof (exception_name) - 1] = '\0';
12475 }
12476 else
12477 {
12478 /* For some reason, we were unable to read the exception
12479 name. This could happen if the Runtime was compiled
12480 without debugging info, for instance. In that case,
12481 just replace the exception name by the generic string
12482 "exception" - it will read as "an exception" in the
12483 notification we are about to print. */
967cff16 12484 memcpy (exception_name, "exception", sizeof ("exception"));
956a9fb9
JB
12485 }
12486 /* In the case of unhandled exception breakpoints, we print
12487 the exception name as "unhandled EXCEPTION_NAME", to make
12488 it clearer to the user which kind of catchpoint just got
12489 hit. We used ui_out_text to make sure that this extra
12490 info does not pollute the exception name in the MI case. */
37f6a7f4 12491 if (c->m_kind == ada_catch_exception_unhandled)
112e8700
SM
12492 uiout->text ("unhandled ");
12493 uiout->field_string ("exception-name", exception_name);
956a9fb9
JB
12494 }
12495 break;
761269c8 12496 case ada_catch_assert:
956a9fb9
JB
12497 /* In this case, the name of the exception is not really
12498 important. Just print "failed assertion" to make it clearer
12499 that his program just hit an assertion-failure catchpoint.
12500 We used ui_out_text because this info does not belong in
12501 the MI output. */
112e8700 12502 uiout->text ("failed assertion");
956a9fb9 12503 break;
f7f9143b 12504 }
e547c119 12505
6f46ac85 12506 gdb::unique_xmalloc_ptr<char> exception_message = ada_exception_message ();
e547c119
JB
12507 if (exception_message != NULL)
12508 {
e547c119 12509 uiout->text (" (");
6f46ac85 12510 uiout->field_string ("exception-message", exception_message.get ());
e547c119 12511 uiout->text (")");
e547c119
JB
12512 }
12513
112e8700 12514 uiout->text (" at ");
956a9fb9 12515 ada_find_printable_frame (get_current_frame ());
f7f9143b
JB
12516
12517 return PRINT_SRC_AND_LOC;
12518}
12519
12520/* Implement the PRINT_ONE method in the breakpoint_ops structure
12521 for all exception catchpoint kinds. */
12522
12523static void
37f6a7f4 12524print_one_exception (struct breakpoint *b, struct bp_location **last_loc)
f7f9143b 12525{
79a45e25 12526 struct ui_out *uiout = current_uiout;
28010a5d 12527 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
79a45b7d
TT
12528 struct value_print_options opts;
12529
12530 get_user_print_options (&opts);
f06f1252 12531
79a45b7d 12532 if (opts.addressprint)
f06f1252 12533 uiout->field_skip ("addr");
f7f9143b
JB
12534
12535 annotate_field (5);
37f6a7f4 12536 switch (c->m_kind)
f7f9143b 12537 {
761269c8 12538 case ada_catch_exception:
bc18fbb5 12539 if (!c->excep_string.empty ())
f7f9143b 12540 {
bc18fbb5
TT
12541 std::string msg = string_printf (_("`%s' Ada exception"),
12542 c->excep_string.c_str ());
28010a5d 12543
112e8700 12544 uiout->field_string ("what", msg);
f7f9143b
JB
12545 }
12546 else
112e8700 12547 uiout->field_string ("what", "all Ada exceptions");
f7f9143b
JB
12548
12549 break;
12550
761269c8 12551 case ada_catch_exception_unhandled:
112e8700 12552 uiout->field_string ("what", "unhandled Ada exceptions");
f7f9143b
JB
12553 break;
12554
9f757bf7 12555 case ada_catch_handlers:
bc18fbb5 12556 if (!c->excep_string.empty ())
9f757bf7
XR
12557 {
12558 uiout->field_fmt ("what",
12559 _("`%s' Ada exception handlers"),
bc18fbb5 12560 c->excep_string.c_str ());
9f757bf7
XR
12561 }
12562 else
12563 uiout->field_string ("what", "all Ada exceptions handlers");
12564 break;
12565
761269c8 12566 case ada_catch_assert:
112e8700 12567 uiout->field_string ("what", "failed Ada assertions");
f7f9143b
JB
12568 break;
12569
12570 default:
12571 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12572 break;
12573 }
12574}
12575
12576/* Implement the PRINT_MENTION method in the breakpoint_ops structure
12577 for all exception catchpoint kinds. */
12578
12579static void
37f6a7f4 12580print_mention_exception (struct breakpoint *b)
f7f9143b 12581{
28010a5d 12582 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
79a45e25 12583 struct ui_out *uiout = current_uiout;
28010a5d 12584
112e8700 12585 uiout->text (b->disposition == disp_del ? _("Temporary catchpoint ")
00eb2c4a 12586 : _("Catchpoint "));
381befee 12587 uiout->field_signed ("bkptno", b->number);
112e8700 12588 uiout->text (": ");
00eb2c4a 12589
37f6a7f4 12590 switch (c->m_kind)
f7f9143b 12591 {
761269c8 12592 case ada_catch_exception:
bc18fbb5 12593 if (!c->excep_string.empty ())
00eb2c4a 12594 {
862d101a 12595 std::string info = string_printf (_("`%s' Ada exception"),
bc18fbb5 12596 c->excep_string.c_str ());
862d101a 12597 uiout->text (info.c_str ());
00eb2c4a 12598 }
f7f9143b 12599 else
112e8700 12600 uiout->text (_("all Ada exceptions"));
f7f9143b
JB
12601 break;
12602
761269c8 12603 case ada_catch_exception_unhandled:
112e8700 12604 uiout->text (_("unhandled Ada exceptions"));
f7f9143b 12605 break;
9f757bf7
XR
12606
12607 case ada_catch_handlers:
bc18fbb5 12608 if (!c->excep_string.empty ())
9f757bf7
XR
12609 {
12610 std::string info
12611 = string_printf (_("`%s' Ada exception handlers"),
bc18fbb5 12612 c->excep_string.c_str ());
9f757bf7
XR
12613 uiout->text (info.c_str ());
12614 }
12615 else
12616 uiout->text (_("all Ada exceptions handlers"));
12617 break;
12618
761269c8 12619 case ada_catch_assert:
112e8700 12620 uiout->text (_("failed Ada assertions"));
f7f9143b
JB
12621 break;
12622
12623 default:
12624 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12625 break;
12626 }
12627}
12628
6149aea9
PA
12629/* Implement the PRINT_RECREATE method in the breakpoint_ops structure
12630 for all exception catchpoint kinds. */
12631
12632static void
37f6a7f4 12633print_recreate_exception (struct breakpoint *b, struct ui_file *fp)
6149aea9 12634{
28010a5d
PA
12635 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
12636
37f6a7f4 12637 switch (c->m_kind)
6149aea9 12638 {
761269c8 12639 case ada_catch_exception:
6149aea9 12640 fprintf_filtered (fp, "catch exception");
bc18fbb5
TT
12641 if (!c->excep_string.empty ())
12642 fprintf_filtered (fp, " %s", c->excep_string.c_str ());
6149aea9
PA
12643 break;
12644
761269c8 12645 case ada_catch_exception_unhandled:
78076abc 12646 fprintf_filtered (fp, "catch exception unhandled");
6149aea9
PA
12647 break;
12648
9f757bf7
XR
12649 case ada_catch_handlers:
12650 fprintf_filtered (fp, "catch handlers");
12651 break;
12652
761269c8 12653 case ada_catch_assert:
6149aea9
PA
12654 fprintf_filtered (fp, "catch assert");
12655 break;
12656
12657 default:
12658 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12659 }
d9b3f62e 12660 print_recreate_thread (b, fp);
6149aea9
PA
12661}
12662
37f6a7f4 12663/* Virtual tables for various breakpoint types. */
2060206e 12664static struct breakpoint_ops catch_exception_breakpoint_ops;
2060206e 12665static struct breakpoint_ops catch_exception_unhandled_breakpoint_ops;
2060206e 12666static struct breakpoint_ops catch_assert_breakpoint_ops;
9f757bf7
XR
12667static struct breakpoint_ops catch_handlers_breakpoint_ops;
12668
f06f1252
TT
12669/* See ada-lang.h. */
12670
12671bool
12672is_ada_exception_catchpoint (breakpoint *bp)
12673{
12674 return (bp->ops == &catch_exception_breakpoint_ops
12675 || bp->ops == &catch_exception_unhandled_breakpoint_ops
12676 || bp->ops == &catch_assert_breakpoint_ops
12677 || bp->ops == &catch_handlers_breakpoint_ops);
12678}
12679
f7f9143b
JB
12680/* Split the arguments specified in a "catch exception" command.
12681 Set EX to the appropriate catchpoint type.
28010a5d 12682 Set EXCEP_STRING to the name of the specific exception if
5845583d 12683 specified by the user.
9f757bf7
XR
12684 IS_CATCH_HANDLERS_CMD: True if the arguments are for a
12685 "catch handlers" command. False otherwise.
5845583d
JB
12686 If a condition is found at the end of the arguments, the condition
12687 expression is stored in COND_STRING (memory must be deallocated
12688 after use). Otherwise COND_STRING is set to NULL. */
f7f9143b
JB
12689
12690static void
a121b7c1 12691catch_ada_exception_command_split (const char *args,
9f757bf7 12692 bool is_catch_handlers_cmd,
761269c8 12693 enum ada_exception_catchpoint_kind *ex,
bc18fbb5
TT
12694 std::string *excep_string,
12695 std::string *cond_string)
f7f9143b 12696{
bc18fbb5 12697 std::string exception_name;
f7f9143b 12698
bc18fbb5
TT
12699 exception_name = extract_arg (&args);
12700 if (exception_name == "if")
5845583d
JB
12701 {
12702 /* This is not an exception name; this is the start of a condition
12703 expression for a catchpoint on all exceptions. So, "un-get"
12704 this token, and set exception_name to NULL. */
bc18fbb5 12705 exception_name.clear ();
5845583d
JB
12706 args -= 2;
12707 }
f7f9143b 12708
5845583d 12709 /* Check to see if we have a condition. */
f7f9143b 12710
f1735a53 12711 args = skip_spaces (args);
61012eef 12712 if (startswith (args, "if")
5845583d
JB
12713 && (isspace (args[2]) || args[2] == '\0'))
12714 {
12715 args += 2;
f1735a53 12716 args = skip_spaces (args);
5845583d
JB
12717
12718 if (args[0] == '\0')
12719 error (_("Condition missing after `if' keyword"));
bc18fbb5 12720 *cond_string = args;
5845583d
JB
12721
12722 args += strlen (args);
12723 }
12724
12725 /* Check that we do not have any more arguments. Anything else
12726 is unexpected. */
f7f9143b
JB
12727
12728 if (args[0] != '\0')
12729 error (_("Junk at end of expression"));
12730
9f757bf7
XR
12731 if (is_catch_handlers_cmd)
12732 {
12733 /* Catch handling of exceptions. */
12734 *ex = ada_catch_handlers;
12735 *excep_string = exception_name;
12736 }
bc18fbb5 12737 else if (exception_name.empty ())
f7f9143b
JB
12738 {
12739 /* Catch all exceptions. */
761269c8 12740 *ex = ada_catch_exception;
bc18fbb5 12741 excep_string->clear ();
f7f9143b 12742 }
bc18fbb5 12743 else if (exception_name == "unhandled")
f7f9143b
JB
12744 {
12745 /* Catch unhandled exceptions. */
761269c8 12746 *ex = ada_catch_exception_unhandled;
bc18fbb5 12747 excep_string->clear ();
f7f9143b
JB
12748 }
12749 else
12750 {
12751 /* Catch a specific exception. */
761269c8 12752 *ex = ada_catch_exception;
28010a5d 12753 *excep_string = exception_name;
f7f9143b
JB
12754 }
12755}
12756
12757/* Return the name of the symbol on which we should break in order to
12758 implement a catchpoint of the EX kind. */
12759
12760static const char *
761269c8 12761ada_exception_sym_name (enum ada_exception_catchpoint_kind ex)
f7f9143b 12762{
3eecfa55
JB
12763 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
12764
12765 gdb_assert (data->exception_info != NULL);
0259addd 12766
f7f9143b
JB
12767 switch (ex)
12768 {
761269c8 12769 case ada_catch_exception:
3eecfa55 12770 return (data->exception_info->catch_exception_sym);
f7f9143b 12771 break;
761269c8 12772 case ada_catch_exception_unhandled:
3eecfa55 12773 return (data->exception_info->catch_exception_unhandled_sym);
f7f9143b 12774 break;
761269c8 12775 case ada_catch_assert:
3eecfa55 12776 return (data->exception_info->catch_assert_sym);
f7f9143b 12777 break;
9f757bf7
XR
12778 case ada_catch_handlers:
12779 return (data->exception_info->catch_handlers_sym);
12780 break;
f7f9143b
JB
12781 default:
12782 internal_error (__FILE__, __LINE__,
12783 _("unexpected catchpoint kind (%d)"), ex);
12784 }
12785}
12786
12787/* Return the breakpoint ops "virtual table" used for catchpoints
12788 of the EX kind. */
12789
c0a91b2b 12790static const struct breakpoint_ops *
761269c8 12791ada_exception_breakpoint_ops (enum ada_exception_catchpoint_kind ex)
f7f9143b
JB
12792{
12793 switch (ex)
12794 {
761269c8 12795 case ada_catch_exception:
f7f9143b
JB
12796 return (&catch_exception_breakpoint_ops);
12797 break;
761269c8 12798 case ada_catch_exception_unhandled:
f7f9143b
JB
12799 return (&catch_exception_unhandled_breakpoint_ops);
12800 break;
761269c8 12801 case ada_catch_assert:
f7f9143b
JB
12802 return (&catch_assert_breakpoint_ops);
12803 break;
9f757bf7
XR
12804 case ada_catch_handlers:
12805 return (&catch_handlers_breakpoint_ops);
12806 break;
f7f9143b
JB
12807 default:
12808 internal_error (__FILE__, __LINE__,
12809 _("unexpected catchpoint kind (%d)"), ex);
12810 }
12811}
12812
12813/* Return the condition that will be used to match the current exception
12814 being raised with the exception that the user wants to catch. This
12815 assumes that this condition is used when the inferior just triggered
12816 an exception catchpoint.
cb7de75e 12817 EX: the type of catchpoints used for catching Ada exceptions. */
f7f9143b 12818
cb7de75e 12819static std::string
9f757bf7
XR
12820ada_exception_catchpoint_cond_string (const char *excep_string,
12821 enum ada_exception_catchpoint_kind ex)
f7f9143b 12822{
3d0b0fa3 12823 int i;
fccf9de1 12824 bool is_standard_exc = false;
cb7de75e 12825 std::string result;
9f757bf7
XR
12826
12827 if (ex == ada_catch_handlers)
12828 {
12829 /* For exception handlers catchpoints, the condition string does
12830 not use the same parameter as for the other exceptions. */
fccf9de1
TT
12831 result = ("long_integer (GNAT_GCC_exception_Access"
12832 "(gcc_exception).all.occurrence.id)");
9f757bf7
XR
12833 }
12834 else
fccf9de1 12835 result = "long_integer (e)";
3d0b0fa3 12836
0963b4bd 12837 /* The standard exceptions are a special case. They are defined in
3d0b0fa3 12838 runtime units that have been compiled without debugging info; if
28010a5d 12839 EXCEP_STRING is the not-fully-qualified name of a standard
3d0b0fa3
JB
12840 exception (e.g. "constraint_error") then, during the evaluation
12841 of the condition expression, the symbol lookup on this name would
0963b4bd 12842 *not* return this standard exception. The catchpoint condition
3d0b0fa3
JB
12843 may then be set only on user-defined exceptions which have the
12844 same not-fully-qualified name (e.g. my_package.constraint_error).
12845
12846 To avoid this unexcepted behavior, these standard exceptions are
0963b4bd 12847 systematically prefixed by "standard". This means that "catch
3d0b0fa3
JB
12848 exception constraint_error" is rewritten into "catch exception
12849 standard.constraint_error".
12850
85102364 12851 If an exception named constraint_error is defined in another package of
3d0b0fa3
JB
12852 the inferior program, then the only way to specify this exception as a
12853 breakpoint condition is to use its fully-qualified named:
fccf9de1 12854 e.g. my_package.constraint_error. */
3d0b0fa3
JB
12855
12856 for (i = 0; i < sizeof (standard_exc) / sizeof (char *); i++)
12857 {
28010a5d 12858 if (strcmp (standard_exc [i], excep_string) == 0)
3d0b0fa3 12859 {
fccf9de1 12860 is_standard_exc = true;
9f757bf7 12861 break;
3d0b0fa3
JB
12862 }
12863 }
9f757bf7 12864
fccf9de1
TT
12865 result += " = ";
12866
12867 if (is_standard_exc)
12868 string_appendf (result, "long_integer (&standard.%s)", excep_string);
12869 else
12870 string_appendf (result, "long_integer (&%s)", excep_string);
9f757bf7 12871
9f757bf7 12872 return result;
f7f9143b
JB
12873}
12874
12875/* Return the symtab_and_line that should be used to insert an exception
12876 catchpoint of the TYPE kind.
12877
28010a5d
PA
12878 ADDR_STRING returns the name of the function where the real
12879 breakpoint that implements the catchpoints is set, depending on the
12880 type of catchpoint we need to create. */
f7f9143b
JB
12881
12882static struct symtab_and_line
bc18fbb5 12883ada_exception_sal (enum ada_exception_catchpoint_kind ex,
cc12f4a8 12884 std::string *addr_string, const struct breakpoint_ops **ops)
f7f9143b
JB
12885{
12886 const char *sym_name;
12887 struct symbol *sym;
f7f9143b 12888
0259addd
JB
12889 /* First, find out which exception support info to use. */
12890 ada_exception_support_info_sniffer ();
12891
12892 /* Then lookup the function on which we will break in order to catch
f7f9143b 12893 the Ada exceptions requested by the user. */
f7f9143b
JB
12894 sym_name = ada_exception_sym_name (ex);
12895 sym = standard_lookup (sym_name, NULL, VAR_DOMAIN);
12896
57aff202
JB
12897 if (sym == NULL)
12898 error (_("Catchpoint symbol not found: %s"), sym_name);
12899
12900 if (SYMBOL_CLASS (sym) != LOC_BLOCK)
12901 error (_("Unable to insert catchpoint. %s is not a function."), sym_name);
f7f9143b
JB
12902
12903 /* Set ADDR_STRING. */
cc12f4a8 12904 *addr_string = sym_name;
f7f9143b 12905
f7f9143b 12906 /* Set OPS. */
4b9eee8c 12907 *ops = ada_exception_breakpoint_ops (ex);
f7f9143b 12908
f17011e0 12909 return find_function_start_sal (sym, 1);
f7f9143b
JB
12910}
12911
b4a5b78b 12912/* Create an Ada exception catchpoint.
f7f9143b 12913
b4a5b78b 12914 EX_KIND is the kind of exception catchpoint to be created.
5845583d 12915
bc18fbb5 12916 If EXCEPT_STRING is empty, this catchpoint is expected to trigger
2df4d1d5 12917 for all exceptions. Otherwise, EXCEPT_STRING indicates the name
bc18fbb5 12918 of the exception to which this catchpoint applies.
2df4d1d5 12919
bc18fbb5 12920 COND_STRING, if not empty, is the catchpoint condition.
f7f9143b 12921
b4a5b78b
JB
12922 TEMPFLAG, if nonzero, means that the underlying breakpoint
12923 should be temporary.
28010a5d 12924
b4a5b78b 12925 FROM_TTY is the usual argument passed to all commands implementations. */
28010a5d 12926
349774ef 12927void
28010a5d 12928create_ada_exception_catchpoint (struct gdbarch *gdbarch,
761269c8 12929 enum ada_exception_catchpoint_kind ex_kind,
bc18fbb5 12930 const std::string &excep_string,
56ecd069 12931 const std::string &cond_string,
28010a5d 12932 int tempflag,
349774ef 12933 int disabled,
28010a5d
PA
12934 int from_tty)
12935{
cc12f4a8 12936 std::string addr_string;
b4a5b78b 12937 const struct breakpoint_ops *ops = NULL;
bc18fbb5 12938 struct symtab_and_line sal = ada_exception_sal (ex_kind, &addr_string, &ops);
28010a5d 12939
37f6a7f4 12940 std::unique_ptr<ada_catchpoint> c (new ada_catchpoint (ex_kind));
cc12f4a8 12941 init_ada_exception_breakpoint (c.get (), gdbarch, sal, addr_string.c_str (),
349774ef 12942 ops, tempflag, disabled, from_tty);
28010a5d 12943 c->excep_string = excep_string;
9f757bf7 12944 create_excep_cond_exprs (c.get (), ex_kind);
56ecd069
XR
12945 if (!cond_string.empty ())
12946 set_breakpoint_condition (c.get (), cond_string.c_str (), from_tty);
b270e6f9 12947 install_breakpoint (0, std::move (c), 1);
f7f9143b
JB
12948}
12949
9ac4176b
PA
12950/* Implement the "catch exception" command. */
12951
12952static void
eb4c3f4a 12953catch_ada_exception_command (const char *arg_entry, int from_tty,
9ac4176b
PA
12954 struct cmd_list_element *command)
12955{
a121b7c1 12956 const char *arg = arg_entry;
9ac4176b
PA
12957 struct gdbarch *gdbarch = get_current_arch ();
12958 int tempflag;
761269c8 12959 enum ada_exception_catchpoint_kind ex_kind;
bc18fbb5 12960 std::string excep_string;
56ecd069 12961 std::string cond_string;
9ac4176b
PA
12962
12963 tempflag = get_cmd_context (command) == CATCH_TEMPORARY;
12964
12965 if (!arg)
12966 arg = "";
9f757bf7 12967 catch_ada_exception_command_split (arg, false, &ex_kind, &excep_string,
bc18fbb5 12968 &cond_string);
9f757bf7
XR
12969 create_ada_exception_catchpoint (gdbarch, ex_kind,
12970 excep_string, cond_string,
12971 tempflag, 1 /* enabled */,
12972 from_tty);
12973}
12974
12975/* Implement the "catch handlers" command. */
12976
12977static void
12978catch_ada_handlers_command (const char *arg_entry, int from_tty,
12979 struct cmd_list_element *command)
12980{
12981 const char *arg = arg_entry;
12982 struct gdbarch *gdbarch = get_current_arch ();
12983 int tempflag;
12984 enum ada_exception_catchpoint_kind ex_kind;
bc18fbb5 12985 std::string excep_string;
56ecd069 12986 std::string cond_string;
9f757bf7
XR
12987
12988 tempflag = get_cmd_context (command) == CATCH_TEMPORARY;
12989
12990 if (!arg)
12991 arg = "";
12992 catch_ada_exception_command_split (arg, true, &ex_kind, &excep_string,
bc18fbb5 12993 &cond_string);
b4a5b78b
JB
12994 create_ada_exception_catchpoint (gdbarch, ex_kind,
12995 excep_string, cond_string,
349774ef
JB
12996 tempflag, 1 /* enabled */,
12997 from_tty);
9ac4176b
PA
12998}
12999
71bed2db
TT
13000/* Completion function for the Ada "catch" commands. */
13001
13002static void
13003catch_ada_completer (struct cmd_list_element *cmd, completion_tracker &tracker,
13004 const char *text, const char *word)
13005{
13006 std::vector<ada_exc_info> exceptions = ada_exceptions_list (NULL);
13007
13008 for (const ada_exc_info &info : exceptions)
13009 {
13010 if (startswith (info.name, word))
b02f78f9 13011 tracker.add_completion (make_unique_xstrdup (info.name));
71bed2db
TT
13012 }
13013}
13014
b4a5b78b 13015/* Split the arguments specified in a "catch assert" command.
5845583d 13016
b4a5b78b
JB
13017 ARGS contains the command's arguments (or the empty string if
13018 no arguments were passed).
5845583d
JB
13019
13020 If ARGS contains a condition, set COND_STRING to that condition
b4a5b78b 13021 (the memory needs to be deallocated after use). */
5845583d 13022
b4a5b78b 13023static void
56ecd069 13024catch_ada_assert_command_split (const char *args, std::string &cond_string)
f7f9143b 13025{
f1735a53 13026 args = skip_spaces (args);
f7f9143b 13027
5845583d 13028 /* Check whether a condition was provided. */
61012eef 13029 if (startswith (args, "if")
5845583d 13030 && (isspace (args[2]) || args[2] == '\0'))
f7f9143b 13031 {
5845583d 13032 args += 2;
f1735a53 13033 args = skip_spaces (args);
5845583d
JB
13034 if (args[0] == '\0')
13035 error (_("condition missing after `if' keyword"));
56ecd069 13036 cond_string.assign (args);
f7f9143b
JB
13037 }
13038
5845583d
JB
13039 /* Otherwise, there should be no other argument at the end of
13040 the command. */
13041 else if (args[0] != '\0')
13042 error (_("Junk at end of arguments."));
f7f9143b
JB
13043}
13044
9ac4176b
PA
13045/* Implement the "catch assert" command. */
13046
13047static void
eb4c3f4a 13048catch_assert_command (const char *arg_entry, int from_tty,
9ac4176b
PA
13049 struct cmd_list_element *command)
13050{
a121b7c1 13051 const char *arg = arg_entry;
9ac4176b
PA
13052 struct gdbarch *gdbarch = get_current_arch ();
13053 int tempflag;
56ecd069 13054 std::string cond_string;
9ac4176b
PA
13055
13056 tempflag = get_cmd_context (command) == CATCH_TEMPORARY;
13057
13058 if (!arg)
13059 arg = "";
56ecd069 13060 catch_ada_assert_command_split (arg, cond_string);
761269c8 13061 create_ada_exception_catchpoint (gdbarch, ada_catch_assert,
241db429 13062 "", cond_string,
349774ef
JB
13063 tempflag, 1 /* enabled */,
13064 from_tty);
9ac4176b 13065}
778865d3
JB
13066
13067/* Return non-zero if the symbol SYM is an Ada exception object. */
13068
13069static int
13070ada_is_exception_sym (struct symbol *sym)
13071{
7d93a1e0 13072 const char *type_name = SYMBOL_TYPE (sym)->name ();
778865d3
JB
13073
13074 return (SYMBOL_CLASS (sym) != LOC_TYPEDEF
13075 && SYMBOL_CLASS (sym) != LOC_BLOCK
13076 && SYMBOL_CLASS (sym) != LOC_CONST
13077 && SYMBOL_CLASS (sym) != LOC_UNRESOLVED
13078 && type_name != NULL && strcmp (type_name, "exception") == 0);
13079}
13080
13081/* Given a global symbol SYM, return non-zero iff SYM is a non-standard
13082 Ada exception object. This matches all exceptions except the ones
13083 defined by the Ada language. */
13084
13085static int
13086ada_is_non_standard_exception_sym (struct symbol *sym)
13087{
13088 int i;
13089
13090 if (!ada_is_exception_sym (sym))
13091 return 0;
13092
13093 for (i = 0; i < ARRAY_SIZE (standard_exc); i++)
987012b8 13094 if (strcmp (sym->linkage_name (), standard_exc[i]) == 0)
778865d3
JB
13095 return 0; /* A standard exception. */
13096
13097 /* Numeric_Error is also a standard exception, so exclude it.
13098 See the STANDARD_EXC description for more details as to why
13099 this exception is not listed in that array. */
987012b8 13100 if (strcmp (sym->linkage_name (), "numeric_error") == 0)
778865d3
JB
13101 return 0;
13102
13103 return 1;
13104}
13105
ab816a27 13106/* A helper function for std::sort, comparing two struct ada_exc_info
778865d3
JB
13107 objects.
13108
13109 The comparison is determined first by exception name, and then
13110 by exception address. */
13111
ab816a27 13112bool
cc536b21 13113ada_exc_info::operator< (const ada_exc_info &other) const
778865d3 13114{
778865d3
JB
13115 int result;
13116
ab816a27
TT
13117 result = strcmp (name, other.name);
13118 if (result < 0)
13119 return true;
13120 if (result == 0 && addr < other.addr)
13121 return true;
13122 return false;
13123}
778865d3 13124
ab816a27 13125bool
cc536b21 13126ada_exc_info::operator== (const ada_exc_info &other) const
ab816a27
TT
13127{
13128 return addr == other.addr && strcmp (name, other.name) == 0;
778865d3
JB
13129}
13130
13131/* Sort EXCEPTIONS using compare_ada_exception_info as the comparison
13132 routine, but keeping the first SKIP elements untouched.
13133
13134 All duplicates are also removed. */
13135
13136static void
ab816a27 13137sort_remove_dups_ada_exceptions_list (std::vector<ada_exc_info> *exceptions,
778865d3
JB
13138 int skip)
13139{
ab816a27
TT
13140 std::sort (exceptions->begin () + skip, exceptions->end ());
13141 exceptions->erase (std::unique (exceptions->begin () + skip, exceptions->end ()),
13142 exceptions->end ());
778865d3
JB
13143}
13144
778865d3
JB
13145/* Add all exceptions defined by the Ada standard whose name match
13146 a regular expression.
13147
13148 If PREG is not NULL, then this regexp_t object is used to
13149 perform the symbol name matching. Otherwise, no name-based
13150 filtering is performed.
13151
13152 EXCEPTIONS is a vector of exceptions to which matching exceptions
13153 gets pushed. */
13154
13155static void
2d7cc5c7 13156ada_add_standard_exceptions (compiled_regex *preg,
ab816a27 13157 std::vector<ada_exc_info> *exceptions)
778865d3
JB
13158{
13159 int i;
13160
13161 for (i = 0; i < ARRAY_SIZE (standard_exc); i++)
13162 {
13163 if (preg == NULL
2d7cc5c7 13164 || preg->exec (standard_exc[i], 0, NULL, 0) == 0)
778865d3
JB
13165 {
13166 struct bound_minimal_symbol msymbol
13167 = ada_lookup_simple_minsym (standard_exc[i]);
13168
13169 if (msymbol.minsym != NULL)
13170 {
13171 struct ada_exc_info info
77e371c0 13172 = {standard_exc[i], BMSYMBOL_VALUE_ADDRESS (msymbol)};
778865d3 13173
ab816a27 13174 exceptions->push_back (info);
778865d3
JB
13175 }
13176 }
13177 }
13178}
13179
13180/* Add all Ada exceptions defined locally and accessible from the given
13181 FRAME.
13182
13183 If PREG is not NULL, then this regexp_t object is used to
13184 perform the symbol name matching. Otherwise, no name-based
13185 filtering is performed.
13186
13187 EXCEPTIONS is a vector of exceptions to which matching exceptions
13188 gets pushed. */
13189
13190static void
2d7cc5c7
PA
13191ada_add_exceptions_from_frame (compiled_regex *preg,
13192 struct frame_info *frame,
ab816a27 13193 std::vector<ada_exc_info> *exceptions)
778865d3 13194{
3977b71f 13195 const struct block *block = get_frame_block (frame, 0);
778865d3
JB
13196
13197 while (block != 0)
13198 {
13199 struct block_iterator iter;
13200 struct symbol *sym;
13201
13202 ALL_BLOCK_SYMBOLS (block, iter, sym)
13203 {
13204 switch (SYMBOL_CLASS (sym))
13205 {
13206 case LOC_TYPEDEF:
13207 case LOC_BLOCK:
13208 case LOC_CONST:
13209 break;
13210 default:
13211 if (ada_is_exception_sym (sym))
13212 {
987012b8 13213 struct ada_exc_info info = {sym->print_name (),
778865d3
JB
13214 SYMBOL_VALUE_ADDRESS (sym)};
13215
ab816a27 13216 exceptions->push_back (info);
778865d3
JB
13217 }
13218 }
13219 }
13220 if (BLOCK_FUNCTION (block) != NULL)
13221 break;
13222 block = BLOCK_SUPERBLOCK (block);
13223 }
13224}
13225
14bc53a8
PA
13226/* Return true if NAME matches PREG or if PREG is NULL. */
13227
13228static bool
2d7cc5c7 13229name_matches_regex (const char *name, compiled_regex *preg)
14bc53a8
PA
13230{
13231 return (preg == NULL
f945dedf 13232 || preg->exec (ada_decode (name).c_str (), 0, NULL, 0) == 0);
14bc53a8
PA
13233}
13234
778865d3
JB
13235/* Add all exceptions defined globally whose name name match
13236 a regular expression, excluding standard exceptions.
13237
13238 The reason we exclude standard exceptions is that they need
13239 to be handled separately: Standard exceptions are defined inside
13240 a runtime unit which is normally not compiled with debugging info,
13241 and thus usually do not show up in our symbol search. However,
13242 if the unit was in fact built with debugging info, we need to
13243 exclude them because they would duplicate the entry we found
13244 during the special loop that specifically searches for those
13245 standard exceptions.
13246
13247 If PREG is not NULL, then this regexp_t object is used to
13248 perform the symbol name matching. Otherwise, no name-based
13249 filtering is performed.
13250
13251 EXCEPTIONS is a vector of exceptions to which matching exceptions
13252 gets pushed. */
13253
13254static void
2d7cc5c7 13255ada_add_global_exceptions (compiled_regex *preg,
ab816a27 13256 std::vector<ada_exc_info> *exceptions)
778865d3 13257{
14bc53a8
PA
13258 /* In Ada, the symbol "search name" is a linkage name, whereas the
13259 regular expression used to do the matching refers to the natural
13260 name. So match against the decoded name. */
13261 expand_symtabs_matching (NULL,
b5ec771e 13262 lookup_name_info::match_any (),
14bc53a8
PA
13263 [&] (const char *search_name)
13264 {
f945dedf
CB
13265 std::string decoded = ada_decode (search_name);
13266 return name_matches_regex (decoded.c_str (), preg);
14bc53a8
PA
13267 },
13268 NULL,
13269 VARIABLES_DOMAIN);
778865d3 13270
2030c079 13271 for (objfile *objfile : current_program_space->objfiles ())
778865d3 13272 {
b669c953 13273 for (compunit_symtab *s : objfile->compunits ())
778865d3 13274 {
d8aeb77f
TT
13275 const struct blockvector *bv = COMPUNIT_BLOCKVECTOR (s);
13276 int i;
778865d3 13277
d8aeb77f
TT
13278 for (i = GLOBAL_BLOCK; i <= STATIC_BLOCK; i++)
13279 {
582942f4 13280 const struct block *b = BLOCKVECTOR_BLOCK (bv, i);
d8aeb77f
TT
13281 struct block_iterator iter;
13282 struct symbol *sym;
778865d3 13283
d8aeb77f
TT
13284 ALL_BLOCK_SYMBOLS (b, iter, sym)
13285 if (ada_is_non_standard_exception_sym (sym)
987012b8 13286 && name_matches_regex (sym->natural_name (), preg))
d8aeb77f
TT
13287 {
13288 struct ada_exc_info info
987012b8 13289 = {sym->print_name (), SYMBOL_VALUE_ADDRESS (sym)};
d8aeb77f
TT
13290
13291 exceptions->push_back (info);
13292 }
13293 }
778865d3
JB
13294 }
13295 }
13296}
13297
13298/* Implements ada_exceptions_list with the regular expression passed
13299 as a regex_t, rather than a string.
13300
13301 If not NULL, PREG is used to filter out exceptions whose names
13302 do not match. Otherwise, all exceptions are listed. */
13303
ab816a27 13304static std::vector<ada_exc_info>
2d7cc5c7 13305ada_exceptions_list_1 (compiled_regex *preg)
778865d3 13306{
ab816a27 13307 std::vector<ada_exc_info> result;
778865d3
JB
13308 int prev_len;
13309
13310 /* First, list the known standard exceptions. These exceptions
13311 need to be handled separately, as they are usually defined in
13312 runtime units that have been compiled without debugging info. */
13313
13314 ada_add_standard_exceptions (preg, &result);
13315
13316 /* Next, find all exceptions whose scope is local and accessible
13317 from the currently selected frame. */
13318
13319 if (has_stack_frames ())
13320 {
ab816a27 13321 prev_len = result.size ();
778865d3
JB
13322 ada_add_exceptions_from_frame (preg, get_selected_frame (NULL),
13323 &result);
ab816a27 13324 if (result.size () > prev_len)
778865d3
JB
13325 sort_remove_dups_ada_exceptions_list (&result, prev_len);
13326 }
13327
13328 /* Add all exceptions whose scope is global. */
13329
ab816a27 13330 prev_len = result.size ();
778865d3 13331 ada_add_global_exceptions (preg, &result);
ab816a27 13332 if (result.size () > prev_len)
778865d3
JB
13333 sort_remove_dups_ada_exceptions_list (&result, prev_len);
13334
778865d3
JB
13335 return result;
13336}
13337
13338/* Return a vector of ada_exc_info.
13339
13340 If REGEXP is NULL, all exceptions are included in the result.
13341 Otherwise, it should contain a valid regular expression,
13342 and only the exceptions whose names match that regular expression
13343 are included in the result.
13344
13345 The exceptions are sorted in the following order:
13346 - Standard exceptions (defined by the Ada language), in
13347 alphabetical order;
13348 - Exceptions only visible from the current frame, in
13349 alphabetical order;
13350 - Exceptions whose scope is global, in alphabetical order. */
13351
ab816a27 13352std::vector<ada_exc_info>
778865d3
JB
13353ada_exceptions_list (const char *regexp)
13354{
2d7cc5c7
PA
13355 if (regexp == NULL)
13356 return ada_exceptions_list_1 (NULL);
778865d3 13357
2d7cc5c7
PA
13358 compiled_regex reg (regexp, REG_NOSUB, _("invalid regular expression"));
13359 return ada_exceptions_list_1 (&reg);
778865d3
JB
13360}
13361
13362/* Implement the "info exceptions" command. */
13363
13364static void
1d12d88f 13365info_exceptions_command (const char *regexp, int from_tty)
778865d3 13366{
778865d3 13367 struct gdbarch *gdbarch = get_current_arch ();
778865d3 13368
ab816a27 13369 std::vector<ada_exc_info> exceptions = ada_exceptions_list (regexp);
778865d3
JB
13370
13371 if (regexp != NULL)
13372 printf_filtered
13373 (_("All Ada exceptions matching regular expression \"%s\":\n"), regexp);
13374 else
13375 printf_filtered (_("All defined Ada exceptions:\n"));
13376
ab816a27
TT
13377 for (const ada_exc_info &info : exceptions)
13378 printf_filtered ("%s: %s\n", info.name, paddress (gdbarch, info.addr));
778865d3
JB
13379}
13380
4c4b4cd2
PH
13381 /* Operators */
13382/* Information about operators given special treatment in functions
13383 below. */
13384/* Format: OP_DEFN (<operator>, <operator length>, <# args>, <binop>). */
13385
13386#define ADA_OPERATORS \
13387 OP_DEFN (OP_VAR_VALUE, 4, 0, 0) \
13388 OP_DEFN (BINOP_IN_BOUNDS, 3, 2, 0) \
13389 OP_DEFN (TERNOP_IN_RANGE, 1, 3, 0) \
13390 OP_DEFN (OP_ATR_FIRST, 1, 2, 0) \
13391 OP_DEFN (OP_ATR_LAST, 1, 2, 0) \
13392 OP_DEFN (OP_ATR_LENGTH, 1, 2, 0) \
13393 OP_DEFN (OP_ATR_IMAGE, 1, 2, 0) \
13394 OP_DEFN (OP_ATR_MAX, 1, 3, 0) \
13395 OP_DEFN (OP_ATR_MIN, 1, 3, 0) \
13396 OP_DEFN (OP_ATR_MODULUS, 1, 1, 0) \
13397 OP_DEFN (OP_ATR_POS, 1, 2, 0) \
13398 OP_DEFN (OP_ATR_SIZE, 1, 1, 0) \
13399 OP_DEFN (OP_ATR_TAG, 1, 1, 0) \
13400 OP_DEFN (OP_ATR_VAL, 1, 2, 0) \
13401 OP_DEFN (UNOP_QUAL, 3, 1, 0) \
52ce6436
PH
13402 OP_DEFN (UNOP_IN_RANGE, 3, 1, 0) \
13403 OP_DEFN (OP_OTHERS, 1, 1, 0) \
13404 OP_DEFN (OP_POSITIONAL, 3, 1, 0) \
13405 OP_DEFN (OP_DISCRETE_RANGE, 1, 2, 0)
4c4b4cd2
PH
13406
13407static void
554794dc
SDJ
13408ada_operator_length (const struct expression *exp, int pc, int *oplenp,
13409 int *argsp)
4c4b4cd2
PH
13410{
13411 switch (exp->elts[pc - 1].opcode)
13412 {
76a01679 13413 default:
4c4b4cd2
PH
13414 operator_length_standard (exp, pc, oplenp, argsp);
13415 break;
13416
13417#define OP_DEFN(op, len, args, binop) \
13418 case op: *oplenp = len; *argsp = args; break;
13419 ADA_OPERATORS;
13420#undef OP_DEFN
52ce6436
PH
13421
13422 case OP_AGGREGATE:
13423 *oplenp = 3;
13424 *argsp = longest_to_int (exp->elts[pc - 2].longconst);
13425 break;
13426
13427 case OP_CHOICES:
13428 *oplenp = 3;
13429 *argsp = longest_to_int (exp->elts[pc - 2].longconst) + 1;
13430 break;
4c4b4cd2
PH
13431 }
13432}
13433
c0201579
JK
13434/* Implementation of the exp_descriptor method operator_check. */
13435
13436static int
13437ada_operator_check (struct expression *exp, int pos,
13438 int (*objfile_func) (struct objfile *objfile, void *data),
13439 void *data)
13440{
13441 const union exp_element *const elts = exp->elts;
13442 struct type *type = NULL;
13443
13444 switch (elts[pos].opcode)
13445 {
13446 case UNOP_IN_RANGE:
13447 case UNOP_QUAL:
13448 type = elts[pos + 1].type;
13449 break;
13450
13451 default:
13452 return operator_check_standard (exp, pos, objfile_func, data);
13453 }
13454
13455 /* Invoke callbacks for TYPE and OBJFILE if they were set as non-NULL. */
13456
13457 if (type && TYPE_OBJFILE (type)
13458 && (*objfile_func) (TYPE_OBJFILE (type), data))
13459 return 1;
13460
13461 return 0;
13462}
13463
a121b7c1 13464static const char *
4c4b4cd2
PH
13465ada_op_name (enum exp_opcode opcode)
13466{
13467 switch (opcode)
13468 {
76a01679 13469 default:
4c4b4cd2 13470 return op_name_standard (opcode);
52ce6436 13471
4c4b4cd2
PH
13472#define OP_DEFN(op, len, args, binop) case op: return #op;
13473 ADA_OPERATORS;
13474#undef OP_DEFN
52ce6436
PH
13475
13476 case OP_AGGREGATE:
13477 return "OP_AGGREGATE";
13478 case OP_CHOICES:
13479 return "OP_CHOICES";
13480 case OP_NAME:
13481 return "OP_NAME";
4c4b4cd2
PH
13482 }
13483}
13484
13485/* As for operator_length, but assumes PC is pointing at the first
13486 element of the operator, and gives meaningful results only for the
52ce6436 13487 Ada-specific operators, returning 0 for *OPLENP and *ARGSP otherwise. */
4c4b4cd2
PH
13488
13489static void
76a01679
JB
13490ada_forward_operator_length (struct expression *exp, int pc,
13491 int *oplenp, int *argsp)
4c4b4cd2 13492{
76a01679 13493 switch (exp->elts[pc].opcode)
4c4b4cd2
PH
13494 {
13495 default:
13496 *oplenp = *argsp = 0;
13497 break;
52ce6436 13498
4c4b4cd2
PH
13499#define OP_DEFN(op, len, args, binop) \
13500 case op: *oplenp = len; *argsp = args; break;
13501 ADA_OPERATORS;
13502#undef OP_DEFN
52ce6436
PH
13503
13504 case OP_AGGREGATE:
13505 *oplenp = 3;
13506 *argsp = longest_to_int (exp->elts[pc + 1].longconst);
13507 break;
13508
13509 case OP_CHOICES:
13510 *oplenp = 3;
13511 *argsp = longest_to_int (exp->elts[pc + 1].longconst) + 1;
13512 break;
13513
13514 case OP_STRING:
13515 case OP_NAME:
13516 {
13517 int len = longest_to_int (exp->elts[pc + 1].longconst);
5b4ee69b 13518
52ce6436
PH
13519 *oplenp = 4 + BYTES_TO_EXP_ELEM (len + 1);
13520 *argsp = 0;
13521 break;
13522 }
4c4b4cd2
PH
13523 }
13524}
13525
13526static int
13527ada_dump_subexp_body (struct expression *exp, struct ui_file *stream, int elt)
13528{
13529 enum exp_opcode op = exp->elts[elt].opcode;
13530 int oplen, nargs;
13531 int pc = elt;
13532 int i;
76a01679 13533
4c4b4cd2
PH
13534 ada_forward_operator_length (exp, elt, &oplen, &nargs);
13535
76a01679 13536 switch (op)
4c4b4cd2 13537 {
76a01679 13538 /* Ada attributes ('Foo). */
4c4b4cd2
PH
13539 case OP_ATR_FIRST:
13540 case OP_ATR_LAST:
13541 case OP_ATR_LENGTH:
13542 case OP_ATR_IMAGE:
13543 case OP_ATR_MAX:
13544 case OP_ATR_MIN:
13545 case OP_ATR_MODULUS:
13546 case OP_ATR_POS:
13547 case OP_ATR_SIZE:
13548 case OP_ATR_TAG:
13549 case OP_ATR_VAL:
13550 break;
13551
13552 case UNOP_IN_RANGE:
13553 case UNOP_QUAL:
323e0a4a
AC
13554 /* XXX: gdb_sprint_host_address, type_sprint */
13555 fprintf_filtered (stream, _("Type @"));
4c4b4cd2
PH
13556 gdb_print_host_address (exp->elts[pc + 1].type, stream);
13557 fprintf_filtered (stream, " (");
13558 type_print (exp->elts[pc + 1].type, NULL, stream, 0);
13559 fprintf_filtered (stream, ")");
13560 break;
13561 case BINOP_IN_BOUNDS:
52ce6436
PH
13562 fprintf_filtered (stream, " (%d)",
13563 longest_to_int (exp->elts[pc + 2].longconst));
4c4b4cd2
PH
13564 break;
13565 case TERNOP_IN_RANGE:
13566 break;
13567
52ce6436
PH
13568 case OP_AGGREGATE:
13569 case OP_OTHERS:
13570 case OP_DISCRETE_RANGE:
13571 case OP_POSITIONAL:
13572 case OP_CHOICES:
13573 break;
13574
13575 case OP_NAME:
13576 case OP_STRING:
13577 {
13578 char *name = &exp->elts[elt + 2].string;
13579 int len = longest_to_int (exp->elts[elt + 1].longconst);
5b4ee69b 13580
52ce6436
PH
13581 fprintf_filtered (stream, "Text: `%.*s'", len, name);
13582 break;
13583 }
13584
4c4b4cd2
PH
13585 default:
13586 return dump_subexp_body_standard (exp, stream, elt);
13587 }
13588
13589 elt += oplen;
13590 for (i = 0; i < nargs; i += 1)
13591 elt = dump_subexp (exp, stream, elt);
13592
13593 return elt;
13594}
13595
13596/* The Ada extension of print_subexp (q.v.). */
13597
76a01679
JB
13598static void
13599ada_print_subexp (struct expression *exp, int *pos,
13600 struct ui_file *stream, enum precedence prec)
4c4b4cd2 13601{
52ce6436 13602 int oplen, nargs, i;
4c4b4cd2
PH
13603 int pc = *pos;
13604 enum exp_opcode op = exp->elts[pc].opcode;
13605
13606 ada_forward_operator_length (exp, pc, &oplen, &nargs);
13607
52ce6436 13608 *pos += oplen;
4c4b4cd2
PH
13609 switch (op)
13610 {
13611 default:
52ce6436 13612 *pos -= oplen;
4c4b4cd2
PH
13613 print_subexp_standard (exp, pos, stream, prec);
13614 return;
13615
13616 case OP_VAR_VALUE:
987012b8 13617 fputs_filtered (exp->elts[pc + 2].symbol->natural_name (), stream);
4c4b4cd2
PH
13618 return;
13619
13620 case BINOP_IN_BOUNDS:
323e0a4a 13621 /* XXX: sprint_subexp */
4c4b4cd2 13622 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13623 fputs_filtered (" in ", stream);
4c4b4cd2 13624 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13625 fputs_filtered ("'range", stream);
4c4b4cd2 13626 if (exp->elts[pc + 1].longconst > 1)
76a01679
JB
13627 fprintf_filtered (stream, "(%ld)",
13628 (long) exp->elts[pc + 1].longconst);
4c4b4cd2
PH
13629 return;
13630
13631 case TERNOP_IN_RANGE:
4c4b4cd2 13632 if (prec >= PREC_EQUAL)
76a01679 13633 fputs_filtered ("(", stream);
323e0a4a 13634 /* XXX: sprint_subexp */
4c4b4cd2 13635 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13636 fputs_filtered (" in ", stream);
4c4b4cd2
PH
13637 print_subexp (exp, pos, stream, PREC_EQUAL);
13638 fputs_filtered (" .. ", stream);
13639 print_subexp (exp, pos, stream, PREC_EQUAL);
13640 if (prec >= PREC_EQUAL)
76a01679
JB
13641 fputs_filtered (")", stream);
13642 return;
4c4b4cd2
PH
13643
13644 case OP_ATR_FIRST:
13645 case OP_ATR_LAST:
13646 case OP_ATR_LENGTH:
13647 case OP_ATR_IMAGE:
13648 case OP_ATR_MAX:
13649 case OP_ATR_MIN:
13650 case OP_ATR_MODULUS:
13651 case OP_ATR_POS:
13652 case OP_ATR_SIZE:
13653 case OP_ATR_TAG:
13654 case OP_ATR_VAL:
4c4b4cd2 13655 if (exp->elts[*pos].opcode == OP_TYPE)
76a01679 13656 {
78134374 13657 if (exp->elts[*pos + 1].type->code () != TYPE_CODE_VOID)
79d43c61
TT
13658 LA_PRINT_TYPE (exp->elts[*pos + 1].type, "", stream, 0, 0,
13659 &type_print_raw_options);
76a01679
JB
13660 *pos += 3;
13661 }
4c4b4cd2 13662 else
76a01679 13663 print_subexp (exp, pos, stream, PREC_SUFFIX);
4c4b4cd2
PH
13664 fprintf_filtered (stream, "'%s", ada_attribute_name (op));
13665 if (nargs > 1)
76a01679
JB
13666 {
13667 int tem;
5b4ee69b 13668
76a01679
JB
13669 for (tem = 1; tem < nargs; tem += 1)
13670 {
13671 fputs_filtered ((tem == 1) ? " (" : ", ", stream);
13672 print_subexp (exp, pos, stream, PREC_ABOVE_COMMA);
13673 }
13674 fputs_filtered (")", stream);
13675 }
4c4b4cd2 13676 return;
14f9c5c9 13677
4c4b4cd2 13678 case UNOP_QUAL:
4c4b4cd2
PH
13679 type_print (exp->elts[pc + 1].type, "", stream, 0);
13680 fputs_filtered ("'(", stream);
13681 print_subexp (exp, pos, stream, PREC_PREFIX);
13682 fputs_filtered (")", stream);
13683 return;
14f9c5c9 13684
4c4b4cd2 13685 case UNOP_IN_RANGE:
323e0a4a 13686 /* XXX: sprint_subexp */
4c4b4cd2 13687 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13688 fputs_filtered (" in ", stream);
79d43c61
TT
13689 LA_PRINT_TYPE (exp->elts[pc + 1].type, "", stream, 1, 0,
13690 &type_print_raw_options);
4c4b4cd2 13691 return;
52ce6436
PH
13692
13693 case OP_DISCRETE_RANGE:
13694 print_subexp (exp, pos, stream, PREC_SUFFIX);
13695 fputs_filtered ("..", stream);
13696 print_subexp (exp, pos, stream, PREC_SUFFIX);
13697 return;
13698
13699 case OP_OTHERS:
13700 fputs_filtered ("others => ", stream);
13701 print_subexp (exp, pos, stream, PREC_SUFFIX);
13702 return;
13703
13704 case OP_CHOICES:
13705 for (i = 0; i < nargs-1; i += 1)
13706 {
13707 if (i > 0)
13708 fputs_filtered ("|", stream);
13709 print_subexp (exp, pos, stream, PREC_SUFFIX);
13710 }
13711 fputs_filtered (" => ", stream);
13712 print_subexp (exp, pos, stream, PREC_SUFFIX);
13713 return;
13714
13715 case OP_POSITIONAL:
13716 print_subexp (exp, pos, stream, PREC_SUFFIX);
13717 return;
13718
13719 case OP_AGGREGATE:
13720 fputs_filtered ("(", stream);
13721 for (i = 0; i < nargs; i += 1)
13722 {
13723 if (i > 0)
13724 fputs_filtered (", ", stream);
13725 print_subexp (exp, pos, stream, PREC_SUFFIX);
13726 }
13727 fputs_filtered (")", stream);
13728 return;
4c4b4cd2
PH
13729 }
13730}
14f9c5c9
AS
13731
13732/* Table mapping opcodes into strings for printing operators
13733 and precedences of the operators. */
13734
d2e4a39e
AS
13735static const struct op_print ada_op_print_tab[] = {
13736 {":=", BINOP_ASSIGN, PREC_ASSIGN, 1},
13737 {"or else", BINOP_LOGICAL_OR, PREC_LOGICAL_OR, 0},
13738 {"and then", BINOP_LOGICAL_AND, PREC_LOGICAL_AND, 0},
13739 {"or", BINOP_BITWISE_IOR, PREC_BITWISE_IOR, 0},
13740 {"xor", BINOP_BITWISE_XOR, PREC_BITWISE_XOR, 0},
13741 {"and", BINOP_BITWISE_AND, PREC_BITWISE_AND, 0},
13742 {"=", BINOP_EQUAL, PREC_EQUAL, 0},
13743 {"/=", BINOP_NOTEQUAL, PREC_EQUAL, 0},
13744 {"<=", BINOP_LEQ, PREC_ORDER, 0},
13745 {">=", BINOP_GEQ, PREC_ORDER, 0},
13746 {">", BINOP_GTR, PREC_ORDER, 0},
13747 {"<", BINOP_LESS, PREC_ORDER, 0},
13748 {">>", BINOP_RSH, PREC_SHIFT, 0},
13749 {"<<", BINOP_LSH, PREC_SHIFT, 0},
13750 {"+", BINOP_ADD, PREC_ADD, 0},
13751 {"-", BINOP_SUB, PREC_ADD, 0},
13752 {"&", BINOP_CONCAT, PREC_ADD, 0},
13753 {"*", BINOP_MUL, PREC_MUL, 0},
13754 {"/", BINOP_DIV, PREC_MUL, 0},
13755 {"rem", BINOP_REM, PREC_MUL, 0},
13756 {"mod", BINOP_MOD, PREC_MUL, 0},
13757 {"**", BINOP_EXP, PREC_REPEAT, 0},
13758 {"@", BINOP_REPEAT, PREC_REPEAT, 0},
13759 {"-", UNOP_NEG, PREC_PREFIX, 0},
13760 {"+", UNOP_PLUS, PREC_PREFIX, 0},
13761 {"not ", UNOP_LOGICAL_NOT, PREC_PREFIX, 0},
13762 {"not ", UNOP_COMPLEMENT, PREC_PREFIX, 0},
13763 {"abs ", UNOP_ABS, PREC_PREFIX, 0},
4c4b4cd2
PH
13764 {".all", UNOP_IND, PREC_SUFFIX, 1},
13765 {"'access", UNOP_ADDR, PREC_SUFFIX, 1},
13766 {"'size", OP_ATR_SIZE, PREC_SUFFIX, 1},
f486487f 13767 {NULL, OP_NULL, PREC_SUFFIX, 0}
14f9c5c9
AS
13768};
13769\f
72d5681a
PH
13770enum ada_primitive_types {
13771 ada_primitive_type_int,
13772 ada_primitive_type_long,
13773 ada_primitive_type_short,
13774 ada_primitive_type_char,
13775 ada_primitive_type_float,
13776 ada_primitive_type_double,
13777 ada_primitive_type_void,
13778 ada_primitive_type_long_long,
13779 ada_primitive_type_long_double,
13780 ada_primitive_type_natural,
13781 ada_primitive_type_positive,
13782 ada_primitive_type_system_address,
08f49010 13783 ada_primitive_type_storage_offset,
72d5681a
PH
13784 nr_ada_primitive_types
13785};
6c038f32
PH
13786
13787static void
d4a9a881 13788ada_language_arch_info (struct gdbarch *gdbarch,
72d5681a
PH
13789 struct language_arch_info *lai)
13790{
d4a9a881 13791 const struct builtin_type *builtin = builtin_type (gdbarch);
5b4ee69b 13792
72d5681a 13793 lai->primitive_type_vector
d4a9a881 13794 = GDBARCH_OBSTACK_CALLOC (gdbarch, nr_ada_primitive_types + 1,
72d5681a 13795 struct type *);
e9bb382b
UW
13796
13797 lai->primitive_type_vector [ada_primitive_type_int]
13798 = arch_integer_type (gdbarch, gdbarch_int_bit (gdbarch),
13799 0, "integer");
13800 lai->primitive_type_vector [ada_primitive_type_long]
13801 = arch_integer_type (gdbarch, gdbarch_long_bit (gdbarch),
13802 0, "long_integer");
13803 lai->primitive_type_vector [ada_primitive_type_short]
13804 = arch_integer_type (gdbarch, gdbarch_short_bit (gdbarch),
13805 0, "short_integer");
13806 lai->string_char_type
13807 = lai->primitive_type_vector [ada_primitive_type_char]
cd7c1778 13808 = arch_character_type (gdbarch, TARGET_CHAR_BIT, 0, "character");
e9bb382b
UW
13809 lai->primitive_type_vector [ada_primitive_type_float]
13810 = arch_float_type (gdbarch, gdbarch_float_bit (gdbarch),
49f190bc 13811 "float", gdbarch_float_format (gdbarch));
e9bb382b
UW
13812 lai->primitive_type_vector [ada_primitive_type_double]
13813 = arch_float_type (gdbarch, gdbarch_double_bit (gdbarch),
49f190bc 13814 "long_float", gdbarch_double_format (gdbarch));
e9bb382b
UW
13815 lai->primitive_type_vector [ada_primitive_type_long_long]
13816 = arch_integer_type (gdbarch, gdbarch_long_long_bit (gdbarch),
13817 0, "long_long_integer");
13818 lai->primitive_type_vector [ada_primitive_type_long_double]
5f3bceb6 13819 = arch_float_type (gdbarch, gdbarch_long_double_bit (gdbarch),
49f190bc 13820 "long_long_float", gdbarch_long_double_format (gdbarch));
e9bb382b
UW
13821 lai->primitive_type_vector [ada_primitive_type_natural]
13822 = arch_integer_type (gdbarch, gdbarch_int_bit (gdbarch),
13823 0, "natural");
13824 lai->primitive_type_vector [ada_primitive_type_positive]
13825 = arch_integer_type (gdbarch, gdbarch_int_bit (gdbarch),
13826 0, "positive");
13827 lai->primitive_type_vector [ada_primitive_type_void]
13828 = builtin->builtin_void;
13829
13830 lai->primitive_type_vector [ada_primitive_type_system_address]
77b7c781
UW
13831 = lookup_pointer_type (arch_type (gdbarch, TYPE_CODE_VOID, TARGET_CHAR_BIT,
13832 "void"));
d0e39ea2
SM
13833 lai->primitive_type_vector [ada_primitive_type_system_address]
13834 ->set_name ("system__address");
fbb06eb1 13835
08f49010
XR
13836 /* Create the equivalent of the System.Storage_Elements.Storage_Offset
13837 type. This is a signed integral type whose size is the same as
13838 the size of addresses. */
13839 {
13840 unsigned int addr_length = TYPE_LENGTH
13841 (lai->primitive_type_vector [ada_primitive_type_system_address]);
13842
13843 lai->primitive_type_vector [ada_primitive_type_storage_offset]
13844 = arch_integer_type (gdbarch, addr_length * HOST_CHAR_BIT, 0,
13845 "storage_offset");
13846 }
13847
47e729a8 13848 lai->bool_type_symbol = NULL;
fbb06eb1 13849 lai->bool_type_default = builtin->builtin_bool;
6c038f32 13850}
6c038f32
PH
13851\f
13852 /* Language vector */
13853
13854/* Not really used, but needed in the ada_language_defn. */
13855
13856static void
6c7a06a3 13857emit_char (int c, struct type *type, struct ui_file *stream, int quoter)
6c038f32 13858{
6c7a06a3 13859 ada_emit_char (c, type, stream, quoter, 1);
6c038f32
PH
13860}
13861
13862static int
410a0ff2 13863parse (struct parser_state *ps)
6c038f32
PH
13864{
13865 warnings_issued = 0;
410a0ff2 13866 return ada_parse (ps);
6c038f32
PH
13867}
13868
13869static const struct exp_descriptor ada_exp_descriptor = {
13870 ada_print_subexp,
13871 ada_operator_length,
c0201579 13872 ada_operator_check,
6c038f32
PH
13873 ada_op_name,
13874 ada_dump_subexp_body,
13875 ada_evaluate_subexp
13876};
13877
b5ec771e
PA
13878/* symbol_name_matcher_ftype adapter for wild_match. */
13879
13880static bool
13881do_wild_match (const char *symbol_search_name,
13882 const lookup_name_info &lookup_name,
a207cff2 13883 completion_match_result *comp_match_res)
b5ec771e
PA
13884{
13885 return wild_match (symbol_search_name, ada_lookup_name (lookup_name));
13886}
13887
13888/* symbol_name_matcher_ftype adapter for full_match. */
13889
13890static bool
13891do_full_match (const char *symbol_search_name,
13892 const lookup_name_info &lookup_name,
a207cff2 13893 completion_match_result *comp_match_res)
b5ec771e
PA
13894{
13895 return full_match (symbol_search_name, ada_lookup_name (lookup_name));
13896}
13897
a2cd4f14
JB
13898/* symbol_name_matcher_ftype for exact (verbatim) matches. */
13899
13900static bool
13901do_exact_match (const char *symbol_search_name,
13902 const lookup_name_info &lookup_name,
13903 completion_match_result *comp_match_res)
13904{
13905 return strcmp (symbol_search_name, ada_lookup_name (lookup_name)) == 0;
13906}
13907
b5ec771e
PA
13908/* Build the Ada lookup name for LOOKUP_NAME. */
13909
13910ada_lookup_name_info::ada_lookup_name_info (const lookup_name_info &lookup_name)
13911{
e0802d59 13912 gdb::string_view user_name = lookup_name.name ();
b5ec771e
PA
13913
13914 if (user_name[0] == '<')
13915 {
13916 if (user_name.back () == '>')
e0802d59
TT
13917 m_encoded_name
13918 = user_name.substr (1, user_name.size () - 2).to_string ();
b5ec771e 13919 else
e0802d59
TT
13920 m_encoded_name
13921 = user_name.substr (1, user_name.size () - 1).to_string ();
b5ec771e
PA
13922 m_encoded_p = true;
13923 m_verbatim_p = true;
13924 m_wild_match_p = false;
13925 m_standard_p = false;
13926 }
13927 else
13928 {
13929 m_verbatim_p = false;
13930
e0802d59 13931 m_encoded_p = user_name.find ("__") != gdb::string_view::npos;
b5ec771e
PA
13932
13933 if (!m_encoded_p)
13934 {
e0802d59 13935 const char *folded = ada_fold_name (user_name);
b5ec771e
PA
13936 const char *encoded = ada_encode_1 (folded, false);
13937 if (encoded != NULL)
13938 m_encoded_name = encoded;
13939 else
e0802d59 13940 m_encoded_name = user_name.to_string ();
b5ec771e
PA
13941 }
13942 else
e0802d59 13943 m_encoded_name = user_name.to_string ();
b5ec771e
PA
13944
13945 /* Handle the 'package Standard' special case. See description
13946 of m_standard_p. */
13947 if (startswith (m_encoded_name.c_str (), "standard__"))
13948 {
13949 m_encoded_name = m_encoded_name.substr (sizeof ("standard__") - 1);
13950 m_standard_p = true;
13951 }
13952 else
13953 m_standard_p = false;
74ccd7f5 13954
b5ec771e
PA
13955 /* If the name contains a ".", then the user is entering a fully
13956 qualified entity name, and the match must not be done in wild
13957 mode. Similarly, if the user wants to complete what looks
13958 like an encoded name, the match must not be done in wild
13959 mode. Also, in the standard__ special case always do
13960 non-wild matching. */
13961 m_wild_match_p
13962 = (lookup_name.match_type () != symbol_name_match_type::FULL
13963 && !m_encoded_p
13964 && !m_standard_p
13965 && user_name.find ('.') == std::string::npos);
13966 }
13967}
13968
13969/* symbol_name_matcher_ftype method for Ada. This only handles
13970 completion mode. */
13971
13972static bool
13973ada_symbol_name_matches (const char *symbol_search_name,
13974 const lookup_name_info &lookup_name,
a207cff2 13975 completion_match_result *comp_match_res)
74ccd7f5 13976{
b5ec771e
PA
13977 return lookup_name.ada ().matches (symbol_search_name,
13978 lookup_name.match_type (),
a207cff2 13979 comp_match_res);
b5ec771e
PA
13980}
13981
de63c46b
PA
13982/* A name matcher that matches the symbol name exactly, with
13983 strcmp. */
13984
13985static bool
13986literal_symbol_name_matcher (const char *symbol_search_name,
13987 const lookup_name_info &lookup_name,
13988 completion_match_result *comp_match_res)
13989{
e0802d59 13990 gdb::string_view name_view = lookup_name.name ();
de63c46b 13991
e0802d59
TT
13992 if (lookup_name.completion_mode ()
13993 ? (strncmp (symbol_search_name, name_view.data (),
13994 name_view.size ()) == 0)
13995 : symbol_search_name == name_view)
de63c46b
PA
13996 {
13997 if (comp_match_res != NULL)
13998 comp_match_res->set_match (symbol_search_name);
13999 return true;
14000 }
14001 else
14002 return false;
14003}
14004
b5ec771e
PA
14005/* Implement the "la_get_symbol_name_matcher" language_defn method for
14006 Ada. */
14007
14008static symbol_name_matcher_ftype *
14009ada_get_symbol_name_matcher (const lookup_name_info &lookup_name)
14010{
de63c46b
PA
14011 if (lookup_name.match_type () == symbol_name_match_type::SEARCH_NAME)
14012 return literal_symbol_name_matcher;
14013
b5ec771e
PA
14014 if (lookup_name.completion_mode ())
14015 return ada_symbol_name_matches;
74ccd7f5 14016 else
b5ec771e
PA
14017 {
14018 if (lookup_name.ada ().wild_match_p ())
14019 return do_wild_match;
a2cd4f14
JB
14020 else if (lookup_name.ada ().verbatim_p ())
14021 return do_exact_match;
b5ec771e
PA
14022 else
14023 return do_full_match;
14024 }
74ccd7f5
JB
14025}
14026
a5ee536b
JB
14027/* Implement the "la_read_var_value" language_defn method for Ada. */
14028
14029static struct value *
63e43d3a
PMR
14030ada_read_var_value (struct symbol *var, const struct block *var_block,
14031 struct frame_info *frame)
a5ee536b 14032{
a5ee536b
JB
14033 /* The only case where default_read_var_value is not sufficient
14034 is when VAR is a renaming... */
c0e70c62
TT
14035 if (frame != nullptr)
14036 {
14037 const struct block *frame_block = get_frame_block (frame, NULL);
14038 if (frame_block != nullptr && ada_is_renaming_symbol (var))
14039 return ada_read_renaming_var_value (var, frame_block);
14040 }
a5ee536b
JB
14041
14042 /* This is a typical case where we expect the default_read_var_value
14043 function to work. */
63e43d3a 14044 return default_read_var_value (var, var_block, frame);
a5ee536b
JB
14045}
14046
56618e20
TT
14047static const char *ada_extensions[] =
14048{
14049 ".adb", ".ads", ".a", ".ada", ".dg", NULL
14050};
14051
47e77640 14052extern const struct language_defn ada_language_defn = {
6c038f32 14053 "ada", /* Language name */
6abde28f 14054 "Ada",
6c038f32 14055 language_ada,
6c038f32 14056 range_check_off,
6c038f32
PH
14057 case_sensitive_on, /* Yes, Ada is case-insensitive, but
14058 that's not quite what this means. */
6c038f32 14059 array_row_major,
9a044a89 14060 macro_expansion_no,
56618e20 14061 ada_extensions,
6c038f32
PH
14062 &ada_exp_descriptor,
14063 parse,
6c038f32
PH
14064 resolve,
14065 ada_printchar, /* Print a character constant */
14066 ada_printstr, /* Function to print string constant */
14067 emit_char, /* Function to print single char (not used) */
6c038f32 14068 ada_print_type, /* Print a type using appropriate syntax */
be942545 14069 ada_print_typedef, /* Print a typedef using appropriate syntax */
26792ee0 14070 ada_value_print_inner, /* la_value_print_inner */
6c038f32 14071 ada_value_print, /* Print a top-level value */
a5ee536b 14072 ada_read_var_value, /* la_read_var_value */
6c038f32 14073 NULL, /* Language specific skip_trampoline */
2b2d9e11 14074 NULL, /* name_of_this */
59cc4834 14075 true, /* la_store_sym_names_in_linkage_form_p */
6c038f32
PH
14076 ada_lookup_symbol_nonlocal, /* Looking up non-local symbols. */
14077 basic_lookup_transparent_type, /* lookup_transparent_type */
14078 ada_la_decode, /* Language specific symbol demangler */
8b302db8 14079 ada_sniff_from_mangled_name,
0963b4bd
MS
14080 NULL, /* Language specific
14081 class_name_from_physname */
6c038f32
PH
14082 ada_op_print_tab, /* expression operators for printing */
14083 0, /* c-style arrays */
14084 1, /* String lower bound */
6c038f32 14085 ada_get_gdb_completer_word_break_characters,
eb3ff9a5 14086 ada_collect_symbol_completion_matches,
72d5681a 14087 ada_language_arch_info,
e79af960 14088 ada_print_array_index,
41f1b697 14089 default_pass_by_reference,
e2b7af72 14090 ada_watch_location_expression,
b5ec771e 14091 ada_get_symbol_name_matcher, /* la_get_symbol_name_matcher */
f8eba3c6 14092 ada_iterate_over_symbols,
5ffa0793 14093 default_search_name_hash,
a53b64ea 14094 &ada_varobj_ops,
bb2ec1b3 14095 NULL,
721b08c6 14096 NULL,
4be290b2 14097 ada_is_string_type,
721b08c6 14098 "(...)" /* la_struct_too_deep_ellipsis */
6c038f32
PH
14099};
14100
5bf03f13
JB
14101/* Command-list for the "set/show ada" prefix command. */
14102static struct cmd_list_element *set_ada_list;
14103static struct cmd_list_element *show_ada_list;
14104
2060206e
PA
14105static void
14106initialize_ada_catchpoint_ops (void)
14107{
14108 struct breakpoint_ops *ops;
14109
14110 initialize_breakpoint_ops ();
14111
14112 ops = &catch_exception_breakpoint_ops;
14113 *ops = bkpt_breakpoint_ops;
37f6a7f4
TT
14114 ops->allocate_location = allocate_location_exception;
14115 ops->re_set = re_set_exception;
14116 ops->check_status = check_status_exception;
14117 ops->print_it = print_it_exception;
14118 ops->print_one = print_one_exception;
14119 ops->print_mention = print_mention_exception;
14120 ops->print_recreate = print_recreate_exception;
2060206e
PA
14121
14122 ops = &catch_exception_unhandled_breakpoint_ops;
14123 *ops = bkpt_breakpoint_ops;
37f6a7f4
TT
14124 ops->allocate_location = allocate_location_exception;
14125 ops->re_set = re_set_exception;
14126 ops->check_status = check_status_exception;
14127 ops->print_it = print_it_exception;
14128 ops->print_one = print_one_exception;
14129 ops->print_mention = print_mention_exception;
14130 ops->print_recreate = print_recreate_exception;
2060206e
PA
14131
14132 ops = &catch_assert_breakpoint_ops;
14133 *ops = bkpt_breakpoint_ops;
37f6a7f4
TT
14134 ops->allocate_location = allocate_location_exception;
14135 ops->re_set = re_set_exception;
14136 ops->check_status = check_status_exception;
14137 ops->print_it = print_it_exception;
14138 ops->print_one = print_one_exception;
14139 ops->print_mention = print_mention_exception;
14140 ops->print_recreate = print_recreate_exception;
9f757bf7
XR
14141
14142 ops = &catch_handlers_breakpoint_ops;
14143 *ops = bkpt_breakpoint_ops;
37f6a7f4
TT
14144 ops->allocate_location = allocate_location_exception;
14145 ops->re_set = re_set_exception;
14146 ops->check_status = check_status_exception;
14147 ops->print_it = print_it_exception;
14148 ops->print_one = print_one_exception;
14149 ops->print_mention = print_mention_exception;
14150 ops->print_recreate = print_recreate_exception;
2060206e
PA
14151}
14152
3d9434b5
JB
14153/* This module's 'new_objfile' observer. */
14154
14155static void
14156ada_new_objfile_observer (struct objfile *objfile)
14157{
14158 ada_clear_symbol_cache ();
14159}
14160
14161/* This module's 'free_objfile' observer. */
14162
14163static void
14164ada_free_objfile_observer (struct objfile *objfile)
14165{
14166 ada_clear_symbol_cache ();
14167}
14168
6c265988 14169void _initialize_ada_language ();
d2e4a39e 14170void
6c265988 14171_initialize_ada_language ()
14f9c5c9 14172{
2060206e
PA
14173 initialize_ada_catchpoint_ops ();
14174
0743fc83
TT
14175 add_basic_prefix_cmd ("ada", no_class,
14176 _("Prefix command for changing Ada-specific settings."),
14177 &set_ada_list, "set ada ", 0, &setlist);
5bf03f13 14178
0743fc83
TT
14179 add_show_prefix_cmd ("ada", no_class,
14180 _("Generic command for showing Ada-specific settings."),
14181 &show_ada_list, "show ada ", 0, &showlist);
5bf03f13
JB
14182
14183 add_setshow_boolean_cmd ("trust-PAD-over-XVS", class_obscure,
14184 &trust_pad_over_xvs, _("\
590042fc
PW
14185Enable or disable an optimization trusting PAD types over XVS types."), _("\
14186Show whether an optimization trusting PAD types over XVS types is activated."),
5bf03f13
JB
14187 _("\
14188This is related to the encoding used by the GNAT compiler. The debugger\n\
14189should normally trust the contents of PAD types, but certain older versions\n\
14190of GNAT have a bug that sometimes causes the information in the PAD type\n\
14191to be incorrect. Turning this setting \"off\" allows the debugger to\n\
14192work around this bug. It is always safe to turn this option \"off\", but\n\
14193this incurs a slight performance penalty, so it is recommended to NOT change\n\
14194this option to \"off\" unless necessary."),
14195 NULL, NULL, &set_ada_list, &show_ada_list);
14196
d72413e6
PMR
14197 add_setshow_boolean_cmd ("print-signatures", class_vars,
14198 &print_signatures, _("\
14199Enable or disable the output of formal and return types for functions in the \
590042fc 14200overloads selection menu."), _("\
d72413e6 14201Show whether the output of formal and return types for functions in the \
590042fc 14202overloads selection menu is activated."),
d72413e6
PMR
14203 NULL, NULL, NULL, &set_ada_list, &show_ada_list);
14204
9ac4176b
PA
14205 add_catch_command ("exception", _("\
14206Catch Ada exceptions, when raised.\n\
9bf7038b 14207Usage: catch exception [ARG] [if CONDITION]\n\
60a90376
JB
14208Without any argument, stop when any Ada exception is raised.\n\
14209If ARG is \"unhandled\" (without the quotes), only stop when the exception\n\
14210being raised does not have a handler (and will therefore lead to the task's\n\
14211termination).\n\
14212Otherwise, the catchpoint only stops when the name of the exception being\n\
9bf7038b
TT
14213raised is the same as ARG.\n\
14214CONDITION is a boolean expression that is evaluated to see whether the\n\
14215exception should cause a stop."),
9ac4176b 14216 catch_ada_exception_command,
71bed2db 14217 catch_ada_completer,
9ac4176b
PA
14218 CATCH_PERMANENT,
14219 CATCH_TEMPORARY);
9f757bf7
XR
14220
14221 add_catch_command ("handlers", _("\
14222Catch Ada exceptions, when handled.\n\
9bf7038b
TT
14223Usage: catch handlers [ARG] [if CONDITION]\n\
14224Without any argument, stop when any Ada exception is handled.\n\
14225With an argument, catch only exceptions with the given name.\n\
14226CONDITION is a boolean expression that is evaluated to see whether the\n\
14227exception should cause a stop."),
9f757bf7 14228 catch_ada_handlers_command,
71bed2db 14229 catch_ada_completer,
9f757bf7
XR
14230 CATCH_PERMANENT,
14231 CATCH_TEMPORARY);
9ac4176b
PA
14232 add_catch_command ("assert", _("\
14233Catch failed Ada assertions, when raised.\n\
9bf7038b
TT
14234Usage: catch assert [if CONDITION]\n\
14235CONDITION is a boolean expression that is evaluated to see whether the\n\
14236exception should cause a stop."),
9ac4176b
PA
14237 catch_assert_command,
14238 NULL,
14239 CATCH_PERMANENT,
14240 CATCH_TEMPORARY);
14241
6c038f32 14242 varsize_limit = 65536;
3fcded8f
JB
14243 add_setshow_uinteger_cmd ("varsize-limit", class_support,
14244 &varsize_limit, _("\
14245Set the maximum number of bytes allowed in a variable-size object."), _("\
14246Show the maximum number of bytes allowed in a variable-size object."), _("\
14247Attempts to access an object whose size is not a compile-time constant\n\
14248and exceeds this limit will cause an error."),
14249 NULL, NULL, &setlist, &showlist);
6c038f32 14250
778865d3
JB
14251 add_info ("exceptions", info_exceptions_command,
14252 _("\
14253List all Ada exception names.\n\
9bf7038b 14254Usage: info exceptions [REGEXP]\n\
778865d3
JB
14255If a regular expression is passed as an argument, only those matching\n\
14256the regular expression are listed."));
14257
0743fc83
TT
14258 add_basic_prefix_cmd ("ada", class_maintenance,
14259 _("Set Ada maintenance-related variables."),
14260 &maint_set_ada_cmdlist, "maintenance set ada ",
14261 0/*allow-unknown*/, &maintenance_set_cmdlist);
c6044dd1 14262
0743fc83
TT
14263 add_show_prefix_cmd ("ada", class_maintenance,
14264 _("Show Ada maintenance-related variables."),
14265 &maint_show_ada_cmdlist, "maintenance show ada ",
14266 0/*allow-unknown*/, &maintenance_show_cmdlist);
c6044dd1
JB
14267
14268 add_setshow_boolean_cmd
14269 ("ignore-descriptive-types", class_maintenance,
14270 &ada_ignore_descriptive_types_p,
14271 _("Set whether descriptive types generated by GNAT should be ignored."),
14272 _("Show whether descriptive types generated by GNAT should be ignored."),
14273 _("\
14274When enabled, the debugger will stop using the DW_AT_GNAT_descriptive_type\n\
14275DWARF attribute."),
14276 NULL, NULL, &maint_set_ada_cmdlist, &maint_show_ada_cmdlist);
14277
459a2e4c
TT
14278 decoded_names_store = htab_create_alloc (256, htab_hash_string, streq_hash,
14279 NULL, xcalloc, xfree);
6b69afc4 14280
3d9434b5 14281 /* The ada-lang observers. */
76727919
TT
14282 gdb::observers::new_objfile.attach (ada_new_objfile_observer);
14283 gdb::observers::free_objfile.attach (ada_free_objfile_observer);
14284 gdb::observers::inferior_exit.attach (ada_inferior_exit);
14f9c5c9 14285}
This page took 3.401527 seconds and 4 git commands to generate.