breakpoint: Make is_*point functions return bool
[deliverable/binutils-gdb.git] / gdb / valops.c
CommitLineData
c906108c 1/* Perform non-arithmetic operations on values, for GDB.
990a07ab 2
42a4f53d 3 Copyright (C) 1986-2019 Free Software Foundation, Inc.
c906108c 4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
c5aa993b 10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b 17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
19
20#include "defs.h"
21#include "symtab.h"
22#include "gdbtypes.h"
23#include "value.h"
24#include "frame.h"
25#include "inferior.h"
26#include "gdbcore.h"
27#include "target.h"
28#include "demangle.h"
29#include "language.h"
30#include "gdbcmd.h"
4e052eda 31#include "regcache.h"
015a42b4 32#include "cp-abi.h"
fe898f56 33#include "block.h"
04714b91 34#include "infcall.h"
de4f826b 35#include "dictionary.h"
b6429628 36#include "cp-support.h"
50637b26 37#include "target-float.h"
e6ca34fc 38#include "tracepoint.h"
76727919 39#include "observable.h"
3e3b026f 40#include "objfiles.h"
233e8b28 41#include "extension.h"
268a13a5 42#include "gdbsupport/byte-vector.h"
c906108c 43
ccce17b0 44extern unsigned int overload_debug;
c906108c
SS
45/* Local functions. */
46
ad2f7632
DJ
47static int typecmp (int staticp, int varargs, int nargs,
48 struct field t1[], struct value *t2[]);
c906108c 49
714f19d5 50static struct value *search_struct_field (const char *, struct value *,
8a13d42d 51 struct type *, int);
c906108c 52
714f19d5
TT
53static struct value *search_struct_method (const char *, struct value **,
54 struct value **,
6b850546 55 LONGEST, int *, struct type *);
c906108c 56
6b1747cd 57static int find_oload_champ_namespace (gdb::array_view<value *> args,
ac3eeb49 58 const char *, const char *,
0891c3cc 59 std::vector<symbol *> *oload_syms,
82ceee50 60 badness_vector *,
7322dca9 61 const int no_adl);
8d577d32 62
6b1747cd
PA
63static int find_oload_champ_namespace_loop (gdb::array_view<value *> args,
64 const char *, const char *,
0891c3cc 65 int, std::vector<symbol *> *oload_syms,
82ceee50 66 badness_vector *, int *,
6b1747cd 67 const int no_adl);
ac3eeb49 68
85cca2bc
PA
69static int find_oload_champ (gdb::array_view<value *> args,
70 size_t num_fns,
38139a96
PA
71 fn_field *methods,
72 xmethod_worker_up *xmethods,
73 symbol **functions,
85cca2bc 74 badness_vector *oload_champ_bv);
ac3eeb49 75
2bca57ba 76static int oload_method_static_p (struct fn_field *, int);
8d577d32
DC
77
78enum oload_classification { STANDARD, NON_STANDARD, INCOMPATIBLE };
79
82ceee50
PA
80static enum oload_classification classify_oload_match
81 (const badness_vector &, int, int);
8d577d32 82
ac3eeb49
MS
83static struct value *value_struct_elt_for_reference (struct type *,
84 int, struct type *,
c848d642 85 const char *,
ac3eeb49
MS
86 struct type *,
87 int, enum noside);
79c2c32d 88
ac3eeb49 89static struct value *value_namespace_elt (const struct type *,
c848d642 90 const char *, int , enum noside);
79c2c32d 91
ac3eeb49 92static struct value *value_maybe_namespace_elt (const struct type *,
c848d642 93 const char *, int,
ac3eeb49 94 enum noside);
63d06c5c 95
a14ed312 96static CORE_ADDR allocate_space_in_inferior (int);
c906108c 97
f23631e4 98static struct value *cast_into_complex (struct type *, struct value *);
c906108c 99
c906108c 100int overload_resolution = 0;
920d2a44
AC
101static void
102show_overload_resolution (struct ui_file *file, int from_tty,
ac3eeb49
MS
103 struct cmd_list_element *c,
104 const char *value)
920d2a44 105{
3e43a32a
MS
106 fprintf_filtered (file, _("Overload resolution in evaluating "
107 "C++ functions is %s.\n"),
920d2a44
AC
108 value);
109}
242bfc55 110
3e3b026f
UW
111/* Find the address of function name NAME in the inferior. If OBJF_P
112 is non-NULL, *OBJF_P will be set to the OBJFILE where the function
113 is defined. */
c906108c 114
f23631e4 115struct value *
3e3b026f 116find_function_in_inferior (const char *name, struct objfile **objf_p)
c906108c 117{
d12307c1 118 struct block_symbol sym;
a109c7c1 119
2570f2b7 120 sym = lookup_symbol (name, 0, VAR_DOMAIN, 0);
d12307c1 121 if (sym.symbol != NULL)
c906108c 122 {
d12307c1 123 if (SYMBOL_CLASS (sym.symbol) != LOC_BLOCK)
c906108c 124 {
8a3fe4f8 125 error (_("\"%s\" exists in this program but is not a function."),
c906108c
SS
126 name);
127 }
3e3b026f
UW
128
129 if (objf_p)
d12307c1 130 *objf_p = symbol_objfile (sym.symbol);
3e3b026f 131
d12307c1 132 return value_of_variable (sym.symbol, sym.block);
c906108c
SS
133 }
134 else
135 {
7c7b6655
TT
136 struct bound_minimal_symbol msymbol =
137 lookup_bound_minimal_symbol (name);
a109c7c1 138
7c7b6655 139 if (msymbol.minsym != NULL)
c906108c 140 {
7c7b6655 141 struct objfile *objfile = msymbol.objfile;
3e3b026f
UW
142 struct gdbarch *gdbarch = get_objfile_arch (objfile);
143
c906108c 144 struct type *type;
4478b372 145 CORE_ADDR maddr;
3e3b026f 146 type = lookup_pointer_type (builtin_type (gdbarch)->builtin_char);
c906108c
SS
147 type = lookup_function_type (type);
148 type = lookup_pointer_type (type);
77e371c0 149 maddr = BMSYMBOL_VALUE_ADDRESS (msymbol);
3e3b026f
UW
150
151 if (objf_p)
152 *objf_p = objfile;
153
4478b372 154 return value_from_pointer (type, maddr);
c906108c
SS
155 }
156 else
157 {
c5aa993b 158 if (!target_has_execution)
3e43a32a
MS
159 error (_("evaluation of this expression "
160 "requires the target program to be active"));
c5aa993b 161 else
3e43a32a
MS
162 error (_("evaluation of this expression requires the "
163 "program to have a function \"%s\"."),
164 name);
c906108c
SS
165 }
166 }
167}
168
ac3eeb49
MS
169/* Allocate NBYTES of space in the inferior using the inferior's
170 malloc and return a value that is a pointer to the allocated
171 space. */
c906108c 172
f23631e4 173struct value *
fba45db2 174value_allocate_space_in_inferior (int len)
c906108c 175{
3e3b026f
UW
176 struct objfile *objf;
177 struct value *val = find_function_in_inferior ("malloc", &objf);
178 struct gdbarch *gdbarch = get_objfile_arch (objf);
f23631e4 179 struct value *blocklen;
c906108c 180
3e3b026f 181 blocklen = value_from_longest (builtin_type (gdbarch)->builtin_int, len);
e71585ff 182 val = call_function_by_hand (val, NULL, blocklen);
c906108c
SS
183 if (value_logical_not (val))
184 {
185 if (!target_has_execution)
3e43a32a
MS
186 error (_("No memory available to program now: "
187 "you need to start the target first"));
c5aa993b 188 else
8a3fe4f8 189 error (_("No memory available to program: call to malloc failed"));
c906108c
SS
190 }
191 return val;
192}
193
194static CORE_ADDR
fba45db2 195allocate_space_in_inferior (int len)
c906108c
SS
196{
197 return value_as_long (value_allocate_space_in_inferior (len));
198}
199
6af87b03
AR
200/* Cast struct value VAL to type TYPE and return as a value.
201 Both type and val must be of TYPE_CODE_STRUCT or TYPE_CODE_UNION
694182d2
DJ
202 for this to work. Typedef to one of the codes is permitted.
203 Returns NULL if the cast is neither an upcast nor a downcast. */
6af87b03
AR
204
205static struct value *
206value_cast_structs (struct type *type, struct value *v2)
207{
208 struct type *t1;
209 struct type *t2;
210 struct value *v;
211
212 gdb_assert (type != NULL && v2 != NULL);
213
214 t1 = check_typedef (type);
215 t2 = check_typedef (value_type (v2));
216
217 /* Check preconditions. */
218 gdb_assert ((TYPE_CODE (t1) == TYPE_CODE_STRUCT
219 || TYPE_CODE (t1) == TYPE_CODE_UNION)
220 && !!"Precondition is that type is of STRUCT or UNION kind.");
221 gdb_assert ((TYPE_CODE (t2) == TYPE_CODE_STRUCT
222 || TYPE_CODE (t2) == TYPE_CODE_UNION)
223 && !!"Precondition is that value is of STRUCT or UNION kind");
224
191ca0a1
CM
225 if (TYPE_NAME (t1) != NULL
226 && TYPE_NAME (t2) != NULL
227 && !strcmp (TYPE_NAME (t1), TYPE_NAME (t2)))
228 return NULL;
229
6af87b03
AR
230 /* Upcasting: look in the type of the source to see if it contains the
231 type of the target as a superclass. If so, we'll need to
232 offset the pointer rather than just change its type. */
233 if (TYPE_NAME (t1) != NULL)
234 {
a737d952 235 v = search_struct_field (TYPE_NAME (t1),
8a13d42d 236 v2, t2, 1);
6af87b03
AR
237 if (v)
238 return v;
239 }
240
241 /* Downcasting: look in the type of the target to see if it contains the
242 type of the source as a superclass. If so, we'll need to
9c3c02fd 243 offset the pointer rather than just change its type. */
6af87b03
AR
244 if (TYPE_NAME (t2) != NULL)
245 {
9c3c02fd 246 /* Try downcasting using the run-time type of the value. */
6b850546
DT
247 int full, using_enc;
248 LONGEST top;
9c3c02fd
TT
249 struct type *real_type;
250
251 real_type = value_rtti_type (v2, &full, &top, &using_enc);
252 if (real_type)
253 {
254 v = value_full_object (v2, real_type, full, top, using_enc);
255 v = value_at_lazy (real_type, value_address (v));
9f1f738a 256 real_type = value_type (v);
9c3c02fd
TT
257
258 /* We might be trying to cast to the outermost enclosing
259 type, in which case search_struct_field won't work. */
260 if (TYPE_NAME (real_type) != NULL
261 && !strcmp (TYPE_NAME (real_type), TYPE_NAME (t1)))
262 return v;
263
a737d952 264 v = search_struct_field (TYPE_NAME (t2), v, real_type, 1);
9c3c02fd
TT
265 if (v)
266 return v;
267 }
268
269 /* Try downcasting using information from the destination type
270 T2. This wouldn't work properly for classes with virtual
271 bases, but those were handled above. */
a737d952 272 v = search_struct_field (TYPE_NAME (t2),
8a13d42d 273 value_zero (t1, not_lval), t1, 1);
6af87b03
AR
274 if (v)
275 {
276 /* Downcasting is possible (t1 is superclass of v2). */
42ae5230 277 CORE_ADDR addr2 = value_address (v2);
a109c7c1 278
42ae5230 279 addr2 -= value_address (v) + value_embedded_offset (v);
6af87b03
AR
280 return value_at (type, addr2);
281 }
282 }
694182d2
DJ
283
284 return NULL;
6af87b03
AR
285}
286
fb933624
DJ
287/* Cast one pointer or reference type to another. Both TYPE and
288 the type of ARG2 should be pointer types, or else both should be
b1af9e97
TT
289 reference types. If SUBCLASS_CHECK is non-zero, this will force a
290 check to see whether TYPE is a superclass of ARG2's type. If
291 SUBCLASS_CHECK is zero, then the subclass check is done only when
292 ARG2 is itself non-zero. Returns the new pointer or reference. */
fb933624
DJ
293
294struct value *
b1af9e97
TT
295value_cast_pointers (struct type *type, struct value *arg2,
296 int subclass_check)
fb933624 297{
d160942f 298 struct type *type1 = check_typedef (type);
fb933624 299 struct type *type2 = check_typedef (value_type (arg2));
d160942f 300 struct type *t1 = check_typedef (TYPE_TARGET_TYPE (type1));
fb933624
DJ
301 struct type *t2 = check_typedef (TYPE_TARGET_TYPE (type2));
302
303 if (TYPE_CODE (t1) == TYPE_CODE_STRUCT
304 && TYPE_CODE (t2) == TYPE_CODE_STRUCT
b1af9e97 305 && (subclass_check || !value_logical_not (arg2)))
fb933624 306 {
6af87b03 307 struct value *v2;
fb933624 308
aa006118 309 if (TYPE_IS_REFERENCE (type2))
6af87b03
AR
310 v2 = coerce_ref (arg2);
311 else
312 v2 = value_ind (arg2);
3e43a32a
MS
313 gdb_assert (TYPE_CODE (check_typedef (value_type (v2)))
314 == TYPE_CODE_STRUCT && !!"Why did coercion fail?");
6af87b03
AR
315 v2 = value_cast_structs (t1, v2);
316 /* At this point we have what we can have, un-dereference if needed. */
317 if (v2)
fb933624 318 {
6af87b03 319 struct value *v = value_addr (v2);
a109c7c1 320
6af87b03
AR
321 deprecated_set_value_type (v, type);
322 return v;
fb933624 323 }
8301c89e 324 }
fb933624
DJ
325
326 /* No superclass found, just change the pointer type. */
0d5de010 327 arg2 = value_copy (arg2);
fb933624 328 deprecated_set_value_type (arg2, type);
4dfea560 329 set_value_enclosing_type (arg2, type);
fb933624
DJ
330 set_value_pointed_to_offset (arg2, 0); /* pai: chk_val */
331 return arg2;
332}
333
c906108c
SS
334/* Cast value ARG2 to type TYPE and return as a value.
335 More general than a C cast: accepts any two types of the same length,
336 and if ARG2 is an lvalue it can be cast into anything at all. */
337/* In C++, casts may change pointer or object representations. */
338
f23631e4
AC
339struct value *
340value_cast (struct type *type, struct value *arg2)
c906108c 341{
52f0bd74
AC
342 enum type_code code1;
343 enum type_code code2;
344 int scalar;
c906108c
SS
345 struct type *type2;
346
347 int convert_to_boolean = 0;
c5aa993b 348
df407dfe 349 if (value_type (arg2) == type)
c906108c
SS
350 return arg2;
351
6af87b03 352 /* Check if we are casting struct reference to struct reference. */
aa006118 353 if (TYPE_IS_REFERENCE (check_typedef (type)))
6af87b03
AR
354 {
355 /* We dereference type; then we recurse and finally
581e13c1 356 we generate value of the given reference. Nothing wrong with
6af87b03
AR
357 that. */
358 struct type *t1 = check_typedef (type);
359 struct type *dereftype = check_typedef (TYPE_TARGET_TYPE (t1));
aa006118 360 struct value *val = value_cast (dereftype, arg2);
a109c7c1 361
a65cfae5 362 return value_ref (val, TYPE_CODE (t1));
6af87b03
AR
363 }
364
aa006118 365 if (TYPE_IS_REFERENCE (check_typedef (value_type (arg2))))
6af87b03
AR
366 /* We deref the value and then do the cast. */
367 return value_cast (type, coerce_ref (arg2));
368
c973d0aa
PA
369 /* Strip typedefs / resolve stubs in order to get at the type's
370 code/length, but remember the original type, to use as the
371 resulting type of the cast, in case it was a typedef. */
372 struct type *to_type = type;
373
f168693b 374 type = check_typedef (type);
c906108c 375 code1 = TYPE_CODE (type);
994b9211 376 arg2 = coerce_ref (arg2);
df407dfe 377 type2 = check_typedef (value_type (arg2));
c906108c 378
fb933624
DJ
379 /* You can't cast to a reference type. See value_cast_pointers
380 instead. */
aa006118 381 gdb_assert (!TYPE_IS_REFERENCE (type));
fb933624 382
ac3eeb49
MS
383 /* A cast to an undetermined-length array_type, such as
384 (TYPE [])OBJECT, is treated like a cast to (TYPE [N])OBJECT,
385 where N is sizeof(OBJECT)/sizeof(TYPE). */
c906108c
SS
386 if (code1 == TYPE_CODE_ARRAY)
387 {
388 struct type *element_type = TYPE_TARGET_TYPE (type);
389 unsigned element_length = TYPE_LENGTH (check_typedef (element_type));
a109c7c1 390
d78df370 391 if (element_length > 0 && TYPE_ARRAY_UPPER_BOUND_IS_UNDEFINED (type))
c906108c
SS
392 {
393 struct type *range_type = TYPE_INDEX_TYPE (type);
394 int val_length = TYPE_LENGTH (type2);
395 LONGEST low_bound, high_bound, new_length;
a109c7c1 396
c906108c
SS
397 if (get_discrete_bounds (range_type, &low_bound, &high_bound) < 0)
398 low_bound = 0, high_bound = 0;
399 new_length = val_length / element_length;
400 if (val_length % element_length != 0)
3e43a32a
MS
401 warning (_("array element type size does not "
402 "divide object size in cast"));
ac3eeb49
MS
403 /* FIXME-type-allocation: need a way to free this type when
404 we are done with it. */
cafb3438 405 range_type = create_static_range_type (NULL,
0c9c3474
SA
406 TYPE_TARGET_TYPE (range_type),
407 low_bound,
408 new_length + low_bound - 1);
ac3eeb49 409 deprecated_set_value_type (arg2,
cafb3438 410 create_array_type (NULL,
ac3eeb49
MS
411 element_type,
412 range_type));
c906108c
SS
413 return arg2;
414 }
415 }
416
417 if (current_language->c_style_arrays
3bdf2bbd
KW
418 && TYPE_CODE (type2) == TYPE_CODE_ARRAY
419 && !TYPE_VECTOR (type2))
c906108c
SS
420 arg2 = value_coerce_array (arg2);
421
422 if (TYPE_CODE (type2) == TYPE_CODE_FUNC)
423 arg2 = value_coerce_function (arg2);
424
df407dfe 425 type2 = check_typedef (value_type (arg2));
c906108c
SS
426 code2 = TYPE_CODE (type2);
427
428 if (code1 == TYPE_CODE_COMPLEX)
c973d0aa 429 return cast_into_complex (to_type, arg2);
c906108c
SS
430 if (code1 == TYPE_CODE_BOOL)
431 {
432 code1 = TYPE_CODE_INT;
433 convert_to_boolean = 1;
434 }
435 if (code1 == TYPE_CODE_CHAR)
436 code1 = TYPE_CODE_INT;
437 if (code2 == TYPE_CODE_BOOL || code2 == TYPE_CODE_CHAR)
438 code2 = TYPE_CODE_INT;
439
440 scalar = (code2 == TYPE_CODE_INT || code2 == TYPE_CODE_FLT
4ef30785
TJB
441 || code2 == TYPE_CODE_DECFLOAT || code2 == TYPE_CODE_ENUM
442 || code2 == TYPE_CODE_RANGE);
c906108c 443
6af87b03
AR
444 if ((code1 == TYPE_CODE_STRUCT || code1 == TYPE_CODE_UNION)
445 && (code2 == TYPE_CODE_STRUCT || code2 == TYPE_CODE_UNION)
c906108c 446 && TYPE_NAME (type) != 0)
694182d2 447 {
c973d0aa 448 struct value *v = value_cast_structs (to_type, arg2);
a109c7c1 449
694182d2
DJ
450 if (v)
451 return v;
452 }
453
50637b26 454 if (is_floating_type (type) && scalar)
4ef30785 455 {
50637b26
UW
456 if (is_floating_value (arg2))
457 {
458 struct value *v = allocate_value (to_type);
459 target_float_convert (value_contents (arg2), type2,
460 value_contents_raw (v), type);
461 return v;
462 }
463
3b4b2f16 464 /* The only option left is an integral type. */
50637b26
UW
465 if (TYPE_UNSIGNED (type2))
466 return value_from_ulongest (to_type, value_as_long (arg2));
4ef30785 467 else
50637b26 468 return value_from_longest (to_type, value_as_long (arg2));
4ef30785 469 }
c906108c
SS
470 else if ((code1 == TYPE_CODE_INT || code1 == TYPE_CODE_ENUM
471 || code1 == TYPE_CODE_RANGE)
0d5de010
DJ
472 && (scalar || code2 == TYPE_CODE_PTR
473 || code2 == TYPE_CODE_MEMBERPTR))
c906108c
SS
474 {
475 LONGEST longest;
c5aa993b 476
2bf1f4a1 477 /* When we cast pointers to integers, we mustn't use
76e71323 478 gdbarch_pointer_to_address to find the address the pointer
2bf1f4a1
JB
479 represents, as value_as_long would. GDB should evaluate
480 expressions just as the compiler would --- and the compiler
481 sees a cast as a simple reinterpretation of the pointer's
482 bits. */
483 if (code2 == TYPE_CODE_PTR)
e17a4113
UW
484 longest = extract_unsigned_integer
485 (value_contents (arg2), TYPE_LENGTH (type2),
486 gdbarch_byte_order (get_type_arch (type2)));
2bf1f4a1
JB
487 else
488 longest = value_as_long (arg2);
c973d0aa 489 return value_from_longest (to_type, convert_to_boolean ?
716c501e 490 (LONGEST) (longest ? 1 : 0) : longest);
c906108c 491 }
ac3eeb49
MS
492 else if (code1 == TYPE_CODE_PTR && (code2 == TYPE_CODE_INT
493 || code2 == TYPE_CODE_ENUM
494 || code2 == TYPE_CODE_RANGE))
634acd5f 495 {
4603e466
DT
496 /* TYPE_LENGTH (type) is the length of a pointer, but we really
497 want the length of an address! -- we are really dealing with
498 addresses (i.e., gdb representations) not pointers (i.e.,
499 target representations) here.
500
501 This allows things like "print *(int *)0x01000234" to work
502 without printing a misleading message -- which would
503 otherwise occur when dealing with a target having two byte
504 pointers and four byte addresses. */
505
50810684 506 int addr_bit = gdbarch_addr_bit (get_type_arch (type2));
634acd5f 507 LONGEST longest = value_as_long (arg2);
a109c7c1 508
4603e466 509 if (addr_bit < sizeof (LONGEST) * HOST_CHAR_BIT)
634acd5f 510 {
4603e466
DT
511 if (longest >= ((LONGEST) 1 << addr_bit)
512 || longest <= -((LONGEST) 1 << addr_bit))
8a3fe4f8 513 warning (_("value truncated"));
634acd5f 514 }
c973d0aa 515 return value_from_longest (to_type, longest);
634acd5f 516 }
0d5de010
DJ
517 else if (code1 == TYPE_CODE_METHODPTR && code2 == TYPE_CODE_INT
518 && value_as_long (arg2) == 0)
519 {
c973d0aa 520 struct value *result = allocate_value (to_type);
a109c7c1 521
c973d0aa 522 cplus_make_method_ptr (to_type, value_contents_writeable (result), 0, 0);
0d5de010
DJ
523 return result;
524 }
525 else if (code1 == TYPE_CODE_MEMBERPTR && code2 == TYPE_CODE_INT
526 && value_as_long (arg2) == 0)
527 {
528 /* The Itanium C++ ABI represents NULL pointers to members as
529 minus one, instead of biasing the normal case. */
c973d0aa 530 return value_from_longest (to_type, -1);
0d5de010 531 }
8954db33
AB
532 else if (code1 == TYPE_CODE_ARRAY && TYPE_VECTOR (type)
533 && code2 == TYPE_CODE_ARRAY && TYPE_VECTOR (type2)
534 && TYPE_LENGTH (type) != TYPE_LENGTH (type2))
535 error (_("Cannot convert between vector values of different sizes"));
536 else if (code1 == TYPE_CODE_ARRAY && TYPE_VECTOR (type) && scalar
537 && TYPE_LENGTH (type) != TYPE_LENGTH (type2))
538 error (_("can only cast scalar to vector of same size"));
0ba2eb0f
TT
539 else if (code1 == TYPE_CODE_VOID)
540 {
c973d0aa 541 return value_zero (to_type, not_lval);
0ba2eb0f 542 }
c906108c
SS
543 else if (TYPE_LENGTH (type) == TYPE_LENGTH (type2))
544 {
545 if (code1 == TYPE_CODE_PTR && code2 == TYPE_CODE_PTR)
c973d0aa 546 return value_cast_pointers (to_type, arg2, 0);
fb933624 547
0d5de010 548 arg2 = value_copy (arg2);
c973d0aa
PA
549 deprecated_set_value_type (arg2, to_type);
550 set_value_enclosing_type (arg2, to_type);
b44d461b 551 set_value_pointed_to_offset (arg2, 0); /* pai: chk_val */
c906108c
SS
552 return arg2;
553 }
c906108c 554 else if (VALUE_LVAL (arg2) == lval_memory)
c973d0aa 555 return value_at_lazy (to_type, value_address (arg2));
c906108c
SS
556 else
557 {
32372d80
TT
558 if (current_language->la_language == language_ada)
559 error (_("Invalid type conversion."));
8a3fe4f8 560 error (_("Invalid cast."));
c906108c
SS
561 }
562}
563
4e8f195d
TT
564/* The C++ reinterpret_cast operator. */
565
566struct value *
567value_reinterpret_cast (struct type *type, struct value *arg)
568{
569 struct value *result;
570 struct type *real_type = check_typedef (type);
571 struct type *arg_type, *dest_type;
572 int is_ref = 0;
573 enum type_code dest_code, arg_code;
574
575 /* Do reference, function, and array conversion. */
576 arg = coerce_array (arg);
577
578 /* Attempt to preserve the type the user asked for. */
579 dest_type = type;
580
581 /* If we are casting to a reference type, transform
aa006118
AV
582 reinterpret_cast<T&[&]>(V) to *reinterpret_cast<T*>(&V). */
583 if (TYPE_IS_REFERENCE (real_type))
4e8f195d
TT
584 {
585 is_ref = 1;
586 arg = value_addr (arg);
587 dest_type = lookup_pointer_type (TYPE_TARGET_TYPE (dest_type));
588 real_type = lookup_pointer_type (real_type);
589 }
590
591 arg_type = value_type (arg);
592
593 dest_code = TYPE_CODE (real_type);
594 arg_code = TYPE_CODE (arg_type);
595
596 /* We can convert pointer types, or any pointer type to int, or int
597 type to pointer. */
598 if ((dest_code == TYPE_CODE_PTR && arg_code == TYPE_CODE_INT)
599 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_PTR)
600 || (dest_code == TYPE_CODE_METHODPTR && arg_code == TYPE_CODE_INT)
601 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_METHODPTR)
602 || (dest_code == TYPE_CODE_MEMBERPTR && arg_code == TYPE_CODE_INT)
603 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_MEMBERPTR)
604 || (dest_code == arg_code
605 && (dest_code == TYPE_CODE_PTR
606 || dest_code == TYPE_CODE_METHODPTR
607 || dest_code == TYPE_CODE_MEMBERPTR)))
608 result = value_cast (dest_type, arg);
609 else
610 error (_("Invalid reinterpret_cast"));
611
612 if (is_ref)
a65cfae5
AV
613 result = value_cast (type, value_ref (value_ind (result),
614 TYPE_CODE (type)));
4e8f195d
TT
615
616 return result;
617}
618
619/* A helper for value_dynamic_cast. This implements the first of two
620 runtime checks: we iterate over all the base classes of the value's
621 class which are equal to the desired class; if only one of these
622 holds the value, then it is the answer. */
623
624static int
625dynamic_cast_check_1 (struct type *desired_type,
8af8e3bc 626 const gdb_byte *valaddr,
6b850546 627 LONGEST embedded_offset,
4e8f195d 628 CORE_ADDR address,
8af8e3bc 629 struct value *val,
4e8f195d
TT
630 struct type *search_type,
631 CORE_ADDR arg_addr,
632 struct type *arg_type,
633 struct value **result)
634{
635 int i, result_count = 0;
636
637 for (i = 0; i < TYPE_N_BASECLASSES (search_type) && result_count < 2; ++i)
638 {
6b850546
DT
639 LONGEST offset = baseclass_offset (search_type, i, valaddr,
640 embedded_offset,
641 address, val);
a109c7c1 642
4e8f195d
TT
643 if (class_types_same_p (desired_type, TYPE_BASECLASS (search_type, i)))
644 {
8af8e3bc
PA
645 if (address + embedded_offset + offset >= arg_addr
646 && address + embedded_offset + offset < arg_addr + TYPE_LENGTH (arg_type))
4e8f195d
TT
647 {
648 ++result_count;
649 if (!*result)
650 *result = value_at_lazy (TYPE_BASECLASS (search_type, i),
8af8e3bc 651 address + embedded_offset + offset);
4e8f195d
TT
652 }
653 }
654 else
655 result_count += dynamic_cast_check_1 (desired_type,
8af8e3bc
PA
656 valaddr,
657 embedded_offset + offset,
658 address, val,
4e8f195d
TT
659 TYPE_BASECLASS (search_type, i),
660 arg_addr,
661 arg_type,
662 result);
663 }
664
665 return result_count;
666}
667
668/* A helper for value_dynamic_cast. This implements the second of two
669 runtime checks: we look for a unique public sibling class of the
670 argument's declared class. */
671
672static int
673dynamic_cast_check_2 (struct type *desired_type,
8af8e3bc 674 const gdb_byte *valaddr,
6b850546 675 LONGEST embedded_offset,
4e8f195d 676 CORE_ADDR address,
8af8e3bc 677 struct value *val,
4e8f195d
TT
678 struct type *search_type,
679 struct value **result)
680{
681 int i, result_count = 0;
682
683 for (i = 0; i < TYPE_N_BASECLASSES (search_type) && result_count < 2; ++i)
684 {
6b850546 685 LONGEST offset;
4e8f195d
TT
686
687 if (! BASETYPE_VIA_PUBLIC (search_type, i))
688 continue;
689
8af8e3bc
PA
690 offset = baseclass_offset (search_type, i, valaddr, embedded_offset,
691 address, val);
4e8f195d
TT
692 if (class_types_same_p (desired_type, TYPE_BASECLASS (search_type, i)))
693 {
694 ++result_count;
695 if (*result == NULL)
696 *result = value_at_lazy (TYPE_BASECLASS (search_type, i),
8af8e3bc 697 address + embedded_offset + offset);
4e8f195d
TT
698 }
699 else
700 result_count += dynamic_cast_check_2 (desired_type,
8af8e3bc
PA
701 valaddr,
702 embedded_offset + offset,
703 address, val,
4e8f195d
TT
704 TYPE_BASECLASS (search_type, i),
705 result);
706 }
707
708 return result_count;
709}
710
711/* The C++ dynamic_cast operator. */
712
713struct value *
714value_dynamic_cast (struct type *type, struct value *arg)
715{
6b850546
DT
716 int full, using_enc;
717 LONGEST top;
4e8f195d
TT
718 struct type *resolved_type = check_typedef (type);
719 struct type *arg_type = check_typedef (value_type (arg));
720 struct type *class_type, *rtti_type;
721 struct value *result, *tem, *original_arg = arg;
722 CORE_ADDR addr;
aa006118 723 int is_ref = TYPE_IS_REFERENCE (resolved_type);
4e8f195d
TT
724
725 if (TYPE_CODE (resolved_type) != TYPE_CODE_PTR
aa006118 726 && !TYPE_IS_REFERENCE (resolved_type))
4e8f195d
TT
727 error (_("Argument to dynamic_cast must be a pointer or reference type"));
728 if (TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) != TYPE_CODE_VOID
4753d33b 729 && TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) != TYPE_CODE_STRUCT)
4e8f195d
TT
730 error (_("Argument to dynamic_cast must be pointer to class or `void *'"));
731
732 class_type = check_typedef (TYPE_TARGET_TYPE (resolved_type));
733 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR)
734 {
735 if (TYPE_CODE (arg_type) != TYPE_CODE_PTR
736 && ! (TYPE_CODE (arg_type) == TYPE_CODE_INT
737 && value_as_long (arg) == 0))
738 error (_("Argument to dynamic_cast does not have pointer type"));
739 if (TYPE_CODE (arg_type) == TYPE_CODE_PTR)
740 {
741 arg_type = check_typedef (TYPE_TARGET_TYPE (arg_type));
4753d33b 742 if (TYPE_CODE (arg_type) != TYPE_CODE_STRUCT)
3e43a32a
MS
743 error (_("Argument to dynamic_cast does "
744 "not have pointer to class type"));
4e8f195d
TT
745 }
746
747 /* Handle NULL pointers. */
748 if (value_as_long (arg) == 0)
749 return value_zero (type, not_lval);
750
751 arg = value_ind (arg);
752 }
753 else
754 {
4753d33b 755 if (TYPE_CODE (arg_type) != TYPE_CODE_STRUCT)
4e8f195d
TT
756 error (_("Argument to dynamic_cast does not have class type"));
757 }
758
759 /* If the classes are the same, just return the argument. */
760 if (class_types_same_p (class_type, arg_type))
761 return value_cast (type, arg);
762
763 /* If the target type is a unique base class of the argument's
764 declared type, just cast it. */
765 if (is_ancestor (class_type, arg_type))
766 {
767 if (is_unique_ancestor (class_type, arg))
768 return value_cast (type, original_arg);
769 error (_("Ambiguous dynamic_cast"));
770 }
771
772 rtti_type = value_rtti_type (arg, &full, &top, &using_enc);
773 if (! rtti_type)
774 error (_("Couldn't determine value's most derived type for dynamic_cast"));
775
776 /* Compute the most derived object's address. */
777 addr = value_address (arg);
778 if (full)
779 {
780 /* Done. */
781 }
782 else if (using_enc)
783 addr += top;
784 else
785 addr += top + value_embedded_offset (arg);
786
787 /* dynamic_cast<void *> means to return a pointer to the
788 most-derived object. */
789 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR
790 && TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) == TYPE_CODE_VOID)
791 return value_at_lazy (type, addr);
792
793 tem = value_at (type, addr);
9f1f738a 794 type = value_type (tem);
4e8f195d
TT
795
796 /* The first dynamic check specified in 5.2.7. */
797 if (is_public_ancestor (arg_type, TYPE_TARGET_TYPE (resolved_type)))
798 {
799 if (class_types_same_p (rtti_type, TYPE_TARGET_TYPE (resolved_type)))
800 return tem;
801 result = NULL;
802 if (dynamic_cast_check_1 (TYPE_TARGET_TYPE (resolved_type),
8af8e3bc
PA
803 value_contents_for_printing (tem),
804 value_embedded_offset (tem),
805 value_address (tem), tem,
4e8f195d
TT
806 rtti_type, addr,
807 arg_type,
808 &result) == 1)
809 return value_cast (type,
a65cfae5
AV
810 is_ref
811 ? value_ref (result, TYPE_CODE (resolved_type))
812 : value_addr (result));
4e8f195d
TT
813 }
814
815 /* The second dynamic check specified in 5.2.7. */
816 result = NULL;
817 if (is_public_ancestor (arg_type, rtti_type)
818 && dynamic_cast_check_2 (TYPE_TARGET_TYPE (resolved_type),
8af8e3bc
PA
819 value_contents_for_printing (tem),
820 value_embedded_offset (tem),
821 value_address (tem), tem,
4e8f195d
TT
822 rtti_type, &result) == 1)
823 return value_cast (type,
a65cfae5
AV
824 is_ref
825 ? value_ref (result, TYPE_CODE (resolved_type))
826 : value_addr (result));
4e8f195d
TT
827
828 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR)
829 return value_zero (type, not_lval);
830
831 error (_("dynamic_cast failed"));
832}
833
c906108c
SS
834/* Create a value of type TYPE that is zero, and return it. */
835
f23631e4 836struct value *
fba45db2 837value_zero (struct type *type, enum lval_type lv)
c906108c 838{
f23631e4 839 struct value *val = allocate_value (type);
c906108c 840
bb7da2bf 841 VALUE_LVAL (val) = (lv == lval_computed ? not_lval : lv);
c906108c
SS
842 return val;
843}
844
18a46dbe 845/* Create a not_lval value of numeric type TYPE that is one, and return it. */
301f0ecf
DE
846
847struct value *
18a46dbe 848value_one (struct type *type)
301f0ecf
DE
849{
850 struct type *type1 = check_typedef (type);
4e608b4f 851 struct value *val;
301f0ecf 852
50637b26 853 if (is_integral_type (type1) || is_floating_type (type1))
301f0ecf
DE
854 {
855 val = value_from_longest (type, (LONGEST) 1);
856 }
120bd360
KW
857 else if (TYPE_CODE (type1) == TYPE_CODE_ARRAY && TYPE_VECTOR (type1))
858 {
859 struct type *eltype = check_typedef (TYPE_TARGET_TYPE (type1));
cfa6f054
KW
860 int i;
861 LONGEST low_bound, high_bound;
120bd360
KW
862 struct value *tmp;
863
cfa6f054
KW
864 if (!get_array_bounds (type1, &low_bound, &high_bound))
865 error (_("Could not determine the vector bounds"));
866
120bd360 867 val = allocate_value (type);
cfa6f054 868 for (i = 0; i < high_bound - low_bound + 1; i++)
120bd360 869 {
18a46dbe 870 tmp = value_one (eltype);
120bd360
KW
871 memcpy (value_contents_writeable (val) + i * TYPE_LENGTH (eltype),
872 value_contents_all (tmp), TYPE_LENGTH (eltype));
873 }
874 }
301f0ecf
DE
875 else
876 {
877 error (_("Not a numeric type."));
878 }
879
18a46dbe
JK
880 /* value_one result is never used for assignments to. */
881 gdb_assert (VALUE_LVAL (val) == not_lval);
882
301f0ecf
DE
883 return val;
884}
885
80180f79
SA
886/* Helper function for value_at, value_at_lazy, and value_at_lazy_stack.
887 The type of the created value may differ from the passed type TYPE.
888 Make sure to retrieve the returned values's new type after this call
889 e.g. in case the type is a variable length array. */
4e5d721f
DE
890
891static struct value *
892get_value_at (struct type *type, CORE_ADDR addr, int lazy)
893{
894 struct value *val;
895
896 if (TYPE_CODE (check_typedef (type)) == TYPE_CODE_VOID)
897 error (_("Attempt to dereference a generic pointer."));
898
a3d34bf4 899 val = value_from_contents_and_address (type, NULL, addr);
4e5d721f 900
a3d34bf4
PA
901 if (!lazy)
902 value_fetch_lazy (val);
4e5d721f
DE
903
904 return val;
905}
906
070ad9f0 907/* Return a value with type TYPE located at ADDR.
c906108c
SS
908
909 Call value_at only if the data needs to be fetched immediately;
910 if we can be 'lazy' and defer the fetch, perhaps indefinately, call
911 value_at_lazy instead. value_at_lazy simply records the address of
070ad9f0 912 the data and sets the lazy-evaluation-required flag. The lazy flag
0fd88904 913 is tested in the value_contents macro, which is used if and when
80180f79
SA
914 the contents are actually required. The type of the created value
915 may differ from the passed type TYPE. Make sure to retrieve the
916 returned values's new type after this call e.g. in case the type
917 is a variable length array.
c906108c
SS
918
919 Note: value_at does *NOT* handle embedded offsets; perform such
ac3eeb49 920 adjustments before or after calling it. */
c906108c 921
f23631e4 922struct value *
00a4c844 923value_at (struct type *type, CORE_ADDR addr)
c906108c 924{
4e5d721f 925 return get_value_at (type, addr, 0);
c906108c
SS
926}
927
80180f79
SA
928/* Return a lazy value with type TYPE located at ADDR (cf. value_at).
929 The type of the created value may differ from the passed type TYPE.
930 Make sure to retrieve the returned values's new type after this call
931 e.g. in case the type is a variable length array. */
c906108c 932
f23631e4 933struct value *
00a4c844 934value_at_lazy (struct type *type, CORE_ADDR addr)
c906108c 935{
4e5d721f 936 return get_value_at (type, addr, 1);
c906108c
SS
937}
938
e6ca34fc 939void
23f945bf 940read_value_memory (struct value *val, LONGEST bit_offset,
e6ca34fc
PA
941 int stack, CORE_ADDR memaddr,
942 gdb_byte *buffer, size_t length)
943{
3ae385af
SM
944 ULONGEST xfered_total = 0;
945 struct gdbarch *arch = get_value_arch (val);
946 int unit_size = gdbarch_addressable_memory_unit_size (arch);
6d7e9d3b
YQ
947 enum target_object object;
948
949 object = stack ? TARGET_OBJECT_STACK_MEMORY : TARGET_OBJECT_MEMORY;
5a2eb0ef 950
3ae385af 951 while (xfered_total < length)
5a2eb0ef
YQ
952 {
953 enum target_xfer_status status;
3ae385af 954 ULONGEST xfered_partial;
5a2eb0ef 955
8b88a78e 956 status = target_xfer_partial (current_top_target (),
6d7e9d3b 957 object, NULL,
3ae385af
SM
958 buffer + xfered_total * unit_size, NULL,
959 memaddr + xfered_total,
960 length - xfered_total,
961 &xfered_partial);
5a2eb0ef
YQ
962
963 if (status == TARGET_XFER_OK)
964 /* nothing */;
bc113b4e 965 else if (status == TARGET_XFER_UNAVAILABLE)
23f945bf
AA
966 mark_value_bits_unavailable (val, (xfered_total * HOST_CHAR_BIT
967 + bit_offset),
968 xfered_partial * HOST_CHAR_BIT);
5a2eb0ef 969 else if (status == TARGET_XFER_EOF)
3ae385af 970 memory_error (TARGET_XFER_E_IO, memaddr + xfered_total);
e6ca34fc 971 else
3ae385af 972 memory_error (status, memaddr + xfered_total);
e6ca34fc 973
3ae385af 974 xfered_total += xfered_partial;
5a2eb0ef 975 QUIT;
e6ca34fc
PA
976 }
977}
c906108c
SS
978
979/* Store the contents of FROMVAL into the location of TOVAL.
980 Return a new value with the location of TOVAL and contents of FROMVAL. */
981
f23631e4
AC
982struct value *
983value_assign (struct value *toval, struct value *fromval)
c906108c 984{
52f0bd74 985 struct type *type;
f23631e4 986 struct value *val;
cb741690 987 struct frame_id old_frame;
c906108c 988
88e3b34b 989 if (!deprecated_value_modifiable (toval))
8a3fe4f8 990 error (_("Left operand of assignment is not a modifiable lvalue."));
c906108c 991
994b9211 992 toval = coerce_ref (toval);
c906108c 993
df407dfe 994 type = value_type (toval);
c906108c 995 if (VALUE_LVAL (toval) != lval_internalvar)
3cbaedff 996 fromval = value_cast (type, fromval);
c906108c 997 else
63092375
DJ
998 {
999 /* Coerce arrays and functions to pointers, except for arrays
1000 which only live in GDB's storage. */
1001 if (!value_must_coerce_to_target (fromval))
1002 fromval = coerce_array (fromval);
1003 }
1004
f168693b 1005 type = check_typedef (type);
c906108c 1006
ac3eeb49
MS
1007 /* Since modifying a register can trash the frame chain, and
1008 modifying memory can trash the frame cache, we save the old frame
1009 and then restore the new frame afterwards. */
206415a3 1010 old_frame = get_frame_id (deprecated_safe_get_selected_frame ());
cb741690 1011
c906108c
SS
1012 switch (VALUE_LVAL (toval))
1013 {
1014 case lval_internalvar:
1015 set_internalvar (VALUE_INTERNALVAR (toval), fromval);
4aac0db7
UW
1016 return value_of_internalvar (get_type_arch (type),
1017 VALUE_INTERNALVAR (toval));
c906108c
SS
1018
1019 case lval_internalvar_component:
d9e98382 1020 {
6b850546 1021 LONGEST offset = value_offset (toval);
d9e98382
SDJ
1022
1023 /* Are we dealing with a bitfield?
1024
1025 It is important to mention that `value_parent (toval)' is
1026 non-NULL iff `value_bitsize (toval)' is non-zero. */
1027 if (value_bitsize (toval))
1028 {
1029 /* VALUE_INTERNALVAR below refers to the parent value, while
1030 the offset is relative to this parent value. */
1031 gdb_assert (value_parent (value_parent (toval)) == NULL);
1032 offset += value_offset (value_parent (toval));
1033 }
1034
1035 set_internalvar_component (VALUE_INTERNALVAR (toval),
1036 offset,
1037 value_bitpos (toval),
1038 value_bitsize (toval),
1039 fromval);
1040 }
c906108c
SS
1041 break;
1042
1043 case lval_memory:
1044 {
fc1a4b47 1045 const gdb_byte *dest_buffer;
c5aa993b
JM
1046 CORE_ADDR changed_addr;
1047 int changed_len;
10c42a71 1048 gdb_byte buffer[sizeof (LONGEST)];
c906108c 1049
df407dfe 1050 if (value_bitsize (toval))
c5aa993b 1051 {
2d88202a 1052 struct value *parent = value_parent (toval);
2d88202a 1053
a109c7c1 1054 changed_addr = value_address (parent) + value_offset (toval);
df407dfe
AC
1055 changed_len = (value_bitpos (toval)
1056 + value_bitsize (toval)
c5aa993b
JM
1057 + HOST_CHAR_BIT - 1)
1058 / HOST_CHAR_BIT;
c906108c 1059
4ea48cc1
DJ
1060 /* If we can read-modify-write exactly the size of the
1061 containing type (e.g. short or int) then do so. This
1062 is safer for volatile bitfields mapped to hardware
1063 registers. */
1064 if (changed_len < TYPE_LENGTH (type)
1065 && TYPE_LENGTH (type) <= (int) sizeof (LONGEST)
2d88202a 1066 && ((LONGEST) changed_addr % TYPE_LENGTH (type)) == 0)
4ea48cc1
DJ
1067 changed_len = TYPE_LENGTH (type);
1068
c906108c 1069 if (changed_len > (int) sizeof (LONGEST))
3e43a32a
MS
1070 error (_("Can't handle bitfields which "
1071 "don't fit in a %d bit word."),
baa6f10b 1072 (int) sizeof (LONGEST) * HOST_CHAR_BIT);
c906108c 1073
2d88202a 1074 read_memory (changed_addr, buffer, changed_len);
50810684 1075 modify_field (type, buffer, value_as_long (fromval),
df407dfe 1076 value_bitpos (toval), value_bitsize (toval));
c906108c
SS
1077 dest_buffer = buffer;
1078 }
c906108c
SS
1079 else
1080 {
42ae5230 1081 changed_addr = value_address (toval);
3ae385af 1082 changed_len = type_length_units (type);
0fd88904 1083 dest_buffer = value_contents (fromval);
c906108c
SS
1084 }
1085
972daa01 1086 write_memory_with_notification (changed_addr, dest_buffer, changed_len);
c906108c
SS
1087 }
1088 break;
1089
492254e9 1090 case lval_register:
c906108c 1091 {
c906108c 1092 struct frame_info *frame;
d80b854b 1093 struct gdbarch *gdbarch;
ff2e87ac 1094 int value_reg;
c906108c 1095
41b56feb
KB
1096 /* Figure out which frame this is in currently.
1097
1098 We use VALUE_FRAME_ID for obtaining the value's frame id instead of
1099 VALUE_NEXT_FRAME_ID due to requiring a frame which may be passed to
1100 put_frame_register_bytes() below. That function will (eventually)
1101 perform the necessary unwind operation by first obtaining the next
1102 frame. */
0c16dd26 1103 frame = frame_find_by_id (VALUE_FRAME_ID (toval));
41b56feb 1104
0c16dd26 1105 value_reg = VALUE_REGNUM (toval);
c906108c
SS
1106
1107 if (!frame)
8a3fe4f8 1108 error (_("Value being assigned to is no longer active."));
d80b854b
UW
1109
1110 gdbarch = get_frame_arch (frame);
3e871532
LM
1111
1112 if (value_bitsize (toval))
492254e9 1113 {
3e871532 1114 struct value *parent = value_parent (toval);
6b850546 1115 LONGEST offset = value_offset (parent) + value_offset (toval);
3e871532
LM
1116 int changed_len;
1117 gdb_byte buffer[sizeof (LONGEST)];
1118 int optim, unavail;
1119
1120 changed_len = (value_bitpos (toval)
1121 + value_bitsize (toval)
1122 + HOST_CHAR_BIT - 1)
1123 / HOST_CHAR_BIT;
1124
1125 if (changed_len > (int) sizeof (LONGEST))
1126 error (_("Can't handle bitfields which "
1127 "don't fit in a %d bit word."),
1128 (int) sizeof (LONGEST) * HOST_CHAR_BIT);
1129
1130 if (!get_frame_register_bytes (frame, value_reg, offset,
1131 changed_len, buffer,
1132 &optim, &unavail))
1133 {
1134 if (optim)
1135 throw_error (OPTIMIZED_OUT_ERROR,
1136 _("value has been optimized out"));
1137 if (unavail)
1138 throw_error (NOT_AVAILABLE_ERROR,
1139 _("value is not available"));
1140 }
1141
1142 modify_field (type, buffer, value_as_long (fromval),
1143 value_bitpos (toval), value_bitsize (toval));
1144
1145 put_frame_register_bytes (frame, value_reg, offset,
1146 changed_len, buffer);
492254e9 1147 }
c906108c 1148 else
492254e9 1149 {
3e871532
LM
1150 if (gdbarch_convert_register_p (gdbarch, VALUE_REGNUM (toval),
1151 type))
00fa51f6 1152 {
3e871532
LM
1153 /* If TOVAL is a special machine register requiring
1154 conversion of program values to a special raw
1155 format. */
1156 gdbarch_value_to_register (gdbarch, frame,
1157 VALUE_REGNUM (toval), type,
1158 value_contents (fromval));
00fa51f6 1159 }
c906108c 1160 else
00fa51f6
UW
1161 {
1162 put_frame_register_bytes (frame, value_reg,
1163 value_offset (toval),
1164 TYPE_LENGTH (type),
1165 value_contents (fromval));
1166 }
ff2e87ac 1167 }
00fa51f6 1168
76727919 1169 gdb::observers::register_changed.notify (frame, value_reg);
ff2e87ac 1170 break;
c906108c 1171 }
5f5233d4
PA
1172
1173 case lval_computed:
1174 {
c8f2448a 1175 const struct lval_funcs *funcs = value_computed_funcs (toval);
5f5233d4 1176
ac71a68c
JK
1177 if (funcs->write != NULL)
1178 {
1179 funcs->write (toval, fromval);
1180 break;
1181 }
5f5233d4 1182 }
ac71a68c 1183 /* Fall through. */
5f5233d4 1184
c906108c 1185 default:
8a3fe4f8 1186 error (_("Left operand of assignment is not an lvalue."));
c906108c
SS
1187 }
1188
cb741690
DJ
1189 /* Assigning to the stack pointer, frame pointer, and other
1190 (architecture and calling convention specific) registers may
d649a38e 1191 cause the frame cache and regcache to be out of date. Assigning to memory
cb741690
DJ
1192 also can. We just do this on all assignments to registers or
1193 memory, for simplicity's sake; I doubt the slowdown matters. */
1194 switch (VALUE_LVAL (toval))
1195 {
1196 case lval_memory:
1197 case lval_register:
0e03807e 1198 case lval_computed:
cb741690 1199
8b88a78e 1200 gdb::observers::target_changed.notify (current_top_target ());
cb741690 1201
ac3eeb49
MS
1202 /* Having destroyed the frame cache, restore the selected
1203 frame. */
cb741690
DJ
1204
1205 /* FIXME: cagney/2002-11-02: There has to be a better way of
1206 doing this. Instead of constantly saving/restoring the
1207 frame. Why not create a get_selected_frame() function that,
1208 having saved the selected frame's ID can automatically
1209 re-find the previously selected frame automatically. */
1210
1211 {
1212 struct frame_info *fi = frame_find_by_id (old_frame);
a109c7c1 1213
cb741690
DJ
1214 if (fi != NULL)
1215 select_frame (fi);
1216 }
1217
1218 break;
1219 default:
1220 break;
1221 }
1222
ac3eeb49
MS
1223 /* If the field does not entirely fill a LONGEST, then zero the sign
1224 bits. If the field is signed, and is negative, then sign
1225 extend. */
df407dfe
AC
1226 if ((value_bitsize (toval) > 0)
1227 && (value_bitsize (toval) < 8 * (int) sizeof (LONGEST)))
c906108c
SS
1228 {
1229 LONGEST fieldval = value_as_long (fromval);
df407dfe 1230 LONGEST valmask = (((ULONGEST) 1) << value_bitsize (toval)) - 1;
c906108c
SS
1231
1232 fieldval &= valmask;
ac3eeb49
MS
1233 if (!TYPE_UNSIGNED (type)
1234 && (fieldval & (valmask ^ (valmask >> 1))))
c906108c
SS
1235 fieldval |= ~valmask;
1236
1237 fromval = value_from_longest (type, fieldval);
1238 }
1239
4aac0db7
UW
1240 /* The return value is a copy of TOVAL so it shares its location
1241 information, but its contents are updated from FROMVAL. This
1242 implies the returned value is not lazy, even if TOVAL was. */
c906108c 1243 val = value_copy (toval);
4aac0db7 1244 set_value_lazy (val, 0);
0fd88904 1245 memcpy (value_contents_raw (val), value_contents (fromval),
c906108c 1246 TYPE_LENGTH (type));
4aac0db7
UW
1247
1248 /* We copy over the enclosing type and pointed-to offset from FROMVAL
1249 in the case of pointer types. For object types, the enclosing type
1250 and embedded offset must *not* be copied: the target object refered
1251 to by TOVAL retains its original dynamic type after assignment. */
1252 if (TYPE_CODE (type) == TYPE_CODE_PTR)
1253 {
1254 set_value_enclosing_type (val, value_enclosing_type (fromval));
1255 set_value_pointed_to_offset (val, value_pointed_to_offset (fromval));
1256 }
c5aa993b 1257
c906108c
SS
1258 return val;
1259}
1260
1261/* Extend a value VAL to COUNT repetitions of its type. */
1262
f23631e4
AC
1263struct value *
1264value_repeat (struct value *arg1, int count)
c906108c 1265{
f23631e4 1266 struct value *val;
c906108c
SS
1267
1268 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1269 error (_("Only values in memory can be extended with '@'."));
c906108c 1270 if (count < 1)
8a3fe4f8 1271 error (_("Invalid number %d of repetitions."), count);
c906108c 1272
4754a64e 1273 val = allocate_repeat_value (value_enclosing_type (arg1), count);
c906108c 1274
c906108c 1275 VALUE_LVAL (val) = lval_memory;
42ae5230 1276 set_value_address (val, value_address (arg1));
c906108c 1277
24e6bcee
PA
1278 read_value_memory (val, 0, value_stack (val), value_address (val),
1279 value_contents_all_raw (val),
3ae385af 1280 type_length_units (value_enclosing_type (val)));
24e6bcee 1281
c906108c
SS
1282 return val;
1283}
1284
f23631e4 1285struct value *
9df2fbc4 1286value_of_variable (struct symbol *var, const struct block *b)
c906108c 1287{
63e43d3a 1288 struct frame_info *frame = NULL;
c906108c 1289
63e43d3a 1290 if (symbol_read_needs_frame (var))
61212c0f 1291 frame = get_selected_frame (_("No frame selected."));
c906108c 1292
63e43d3a 1293 return read_var_value (var, b, frame);
c906108c
SS
1294}
1295
61212c0f 1296struct value *
270140bd 1297address_of_variable (struct symbol *var, const struct block *b)
61212c0f
UW
1298{
1299 struct type *type = SYMBOL_TYPE (var);
1300 struct value *val;
1301
1302 /* Evaluate it first; if the result is a memory address, we're fine.
581e13c1 1303 Lazy evaluation pays off here. */
61212c0f
UW
1304
1305 val = value_of_variable (var, b);
9f1f738a 1306 type = value_type (val);
61212c0f
UW
1307
1308 if ((VALUE_LVAL (val) == lval_memory && value_lazy (val))
1309 || TYPE_CODE (type) == TYPE_CODE_FUNC)
1310 {
42ae5230 1311 CORE_ADDR addr = value_address (val);
a109c7c1 1312
61212c0f
UW
1313 return value_from_pointer (lookup_pointer_type (type), addr);
1314 }
1315
1316 /* Not a memory address; check what the problem was. */
1317 switch (VALUE_LVAL (val))
1318 {
1319 case lval_register:
1320 {
1321 struct frame_info *frame;
1322 const char *regname;
1323
41b56feb 1324 frame = frame_find_by_id (VALUE_NEXT_FRAME_ID (val));
61212c0f
UW
1325 gdb_assert (frame);
1326
1327 regname = gdbarch_register_name (get_frame_arch (frame),
1328 VALUE_REGNUM (val));
1329 gdb_assert (regname && *regname);
1330
1331 error (_("Address requested for identifier "
1332 "\"%s\" which is in register $%s"),
1333 SYMBOL_PRINT_NAME (var), regname);
1334 break;
1335 }
1336
1337 default:
1338 error (_("Can't take address of \"%s\" which isn't an lvalue."),
1339 SYMBOL_PRINT_NAME (var));
1340 break;
1341 }
1342
1343 return val;
1344}
1345
63092375
DJ
1346/* Return one if VAL does not live in target memory, but should in order
1347 to operate on it. Otherwise return zero. */
1348
1349int
1350value_must_coerce_to_target (struct value *val)
1351{
1352 struct type *valtype;
1353
1354 /* The only lval kinds which do not live in target memory. */
1355 if (VALUE_LVAL (val) != not_lval
e81e7f5e
SC
1356 && VALUE_LVAL (val) != lval_internalvar
1357 && VALUE_LVAL (val) != lval_xcallable)
63092375
DJ
1358 return 0;
1359
1360 valtype = check_typedef (value_type (val));
1361
1362 switch (TYPE_CODE (valtype))
1363 {
1364 case TYPE_CODE_ARRAY:
3cbaedff 1365 return TYPE_VECTOR (valtype) ? 0 : 1;
63092375
DJ
1366 case TYPE_CODE_STRING:
1367 return 1;
1368 default:
1369 return 0;
1370 }
1371}
1372
3e43a32a
MS
1373/* Make sure that VAL lives in target memory if it's supposed to. For
1374 instance, strings are constructed as character arrays in GDB's
1375 storage, and this function copies them to the target. */
63092375
DJ
1376
1377struct value *
1378value_coerce_to_target (struct value *val)
1379{
1380 LONGEST length;
1381 CORE_ADDR addr;
1382
1383 if (!value_must_coerce_to_target (val))
1384 return val;
1385
1386 length = TYPE_LENGTH (check_typedef (value_type (val)));
1387 addr = allocate_space_in_inferior (length);
1388 write_memory (addr, value_contents (val), length);
1389 return value_at_lazy (value_type (val), addr);
1390}
1391
ac3eeb49
MS
1392/* Given a value which is an array, return a value which is a pointer
1393 to its first element, regardless of whether or not the array has a
1394 nonzero lower bound.
c906108c 1395
ac3eeb49
MS
1396 FIXME: A previous comment here indicated that this routine should
1397 be substracting the array's lower bound. It's not clear to me that
1398 this is correct. Given an array subscripting operation, it would
1399 certainly work to do the adjustment here, essentially computing:
c906108c
SS
1400
1401 (&array[0] - (lowerbound * sizeof array[0])) + (index * sizeof array[0])
1402
ac3eeb49
MS
1403 However I believe a more appropriate and logical place to account
1404 for the lower bound is to do so in value_subscript, essentially
1405 computing:
c906108c
SS
1406
1407 (&array[0] + ((index - lowerbound) * sizeof array[0]))
1408
ac3eeb49
MS
1409 As further evidence consider what would happen with operations
1410 other than array subscripting, where the caller would get back a
1411 value that had an address somewhere before the actual first element
1412 of the array, and the information about the lower bound would be
581e13c1 1413 lost because of the coercion to pointer type. */
c906108c 1414
f23631e4
AC
1415struct value *
1416value_coerce_array (struct value *arg1)
c906108c 1417{
df407dfe 1418 struct type *type = check_typedef (value_type (arg1));
c906108c 1419
63092375
DJ
1420 /* If the user tries to do something requiring a pointer with an
1421 array that has not yet been pushed to the target, then this would
1422 be a good time to do so. */
1423 arg1 = value_coerce_to_target (arg1);
1424
c906108c 1425 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1426 error (_("Attempt to take address of value not located in memory."));
c906108c 1427
4478b372 1428 return value_from_pointer (lookup_pointer_type (TYPE_TARGET_TYPE (type)),
42ae5230 1429 value_address (arg1));
c906108c
SS
1430}
1431
1432/* Given a value which is a function, return a value which is a pointer
1433 to it. */
1434
f23631e4
AC
1435struct value *
1436value_coerce_function (struct value *arg1)
c906108c 1437{
f23631e4 1438 struct value *retval;
c906108c
SS
1439
1440 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1441 error (_("Attempt to take address of value not located in memory."));
c906108c 1442
df407dfe 1443 retval = value_from_pointer (lookup_pointer_type (value_type (arg1)),
42ae5230 1444 value_address (arg1));
c906108c 1445 return retval;
c5aa993b 1446}
c906108c 1447
ac3eeb49
MS
1448/* Return a pointer value for the object for which ARG1 is the
1449 contents. */
c906108c 1450
f23631e4
AC
1451struct value *
1452value_addr (struct value *arg1)
c906108c 1453{
f23631e4 1454 struct value *arg2;
df407dfe 1455 struct type *type = check_typedef (value_type (arg1));
a109c7c1 1456
aa006118 1457 if (TYPE_IS_REFERENCE (type))
c906108c 1458 {
3326303b
MG
1459 if (value_bits_synthetic_pointer (arg1, value_embedded_offset (arg1),
1460 TARGET_CHAR_BIT * TYPE_LENGTH (type)))
1461 arg1 = coerce_ref (arg1);
1462 else
1463 {
1464 /* Copy the value, but change the type from (T&) to (T*). We
1465 keep the same location information, which is efficient, and
1466 allows &(&X) to get the location containing the reference.
1467 Do the same to its enclosing type for consistency. */
1468 struct type *type_ptr
1469 = lookup_pointer_type (TYPE_TARGET_TYPE (type));
1470 struct type *enclosing_type
1471 = check_typedef (value_enclosing_type (arg1));
1472 struct type *enclosing_type_ptr
1473 = lookup_pointer_type (TYPE_TARGET_TYPE (enclosing_type));
1474
1475 arg2 = value_copy (arg1);
1476 deprecated_set_value_type (arg2, type_ptr);
1477 set_value_enclosing_type (arg2, enclosing_type_ptr);
a22df60a 1478
3326303b
MG
1479 return arg2;
1480 }
c906108c
SS
1481 }
1482 if (TYPE_CODE (type) == TYPE_CODE_FUNC)
1483 return value_coerce_function (arg1);
1484
63092375
DJ
1485 /* If this is an array that has not yet been pushed to the target,
1486 then this would be a good time to force it to memory. */
1487 arg1 = value_coerce_to_target (arg1);
1488
c906108c 1489 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1490 error (_("Attempt to take address of value not located in memory."));
c906108c 1491
581e13c1 1492 /* Get target memory address. */
df407dfe 1493 arg2 = value_from_pointer (lookup_pointer_type (value_type (arg1)),
42ae5230 1494 (value_address (arg1)
13c3b5f5 1495 + value_embedded_offset (arg1)));
c906108c
SS
1496
1497 /* This may be a pointer to a base subobject; so remember the
ac3eeb49 1498 full derived object's type ... */
4dfea560
DE
1499 set_value_enclosing_type (arg2,
1500 lookup_pointer_type (value_enclosing_type (arg1)));
ac3eeb49
MS
1501 /* ... and also the relative position of the subobject in the full
1502 object. */
b44d461b 1503 set_value_pointed_to_offset (arg2, value_embedded_offset (arg1));
c906108c
SS
1504 return arg2;
1505}
1506
ac3eeb49
MS
1507/* Return a reference value for the object for which ARG1 is the
1508 contents. */
fb933624
DJ
1509
1510struct value *
a65cfae5 1511value_ref (struct value *arg1, enum type_code refcode)
fb933624
DJ
1512{
1513 struct value *arg2;
fb933624 1514 struct type *type = check_typedef (value_type (arg1));
a109c7c1 1515
a65cfae5
AV
1516 gdb_assert (refcode == TYPE_CODE_REF || refcode == TYPE_CODE_RVALUE_REF);
1517
1518 if ((TYPE_CODE (type) == TYPE_CODE_REF
1519 || TYPE_CODE (type) == TYPE_CODE_RVALUE_REF)
1520 && TYPE_CODE (type) == refcode)
fb933624
DJ
1521 return arg1;
1522
1523 arg2 = value_addr (arg1);
a65cfae5 1524 deprecated_set_value_type (arg2, lookup_reference_type (type, refcode));
fb933624
DJ
1525 return arg2;
1526}
1527
ac3eeb49
MS
1528/* Given a value of a pointer type, apply the C unary * operator to
1529 it. */
c906108c 1530
f23631e4
AC
1531struct value *
1532value_ind (struct value *arg1)
c906108c
SS
1533{
1534 struct type *base_type;
f23631e4 1535 struct value *arg2;
c906108c 1536
994b9211 1537 arg1 = coerce_array (arg1);
c906108c 1538
df407dfe 1539 base_type = check_typedef (value_type (arg1));
c906108c 1540
8cf6f0b1
TT
1541 if (VALUE_LVAL (arg1) == lval_computed)
1542 {
c8f2448a 1543 const struct lval_funcs *funcs = value_computed_funcs (arg1);
8cf6f0b1
TT
1544
1545 if (funcs->indirect)
1546 {
1547 struct value *result = funcs->indirect (arg1);
1548
1549 if (result)
1550 return result;
1551 }
1552 }
1553
22fe0fbb 1554 if (TYPE_CODE (base_type) == TYPE_CODE_PTR)
c906108c
SS
1555 {
1556 struct type *enc_type;
a109c7c1 1557
ac3eeb49
MS
1558 /* We may be pointing to something embedded in a larger object.
1559 Get the real type of the enclosing object. */
4754a64e 1560 enc_type = check_typedef (value_enclosing_type (arg1));
c906108c 1561 enc_type = TYPE_TARGET_TYPE (enc_type);
0d5de010
DJ
1562
1563 if (TYPE_CODE (check_typedef (enc_type)) == TYPE_CODE_FUNC
1564 || TYPE_CODE (check_typedef (enc_type)) == TYPE_CODE_METHOD)
1565 /* For functions, go through find_function_addr, which knows
1566 how to handle function descriptors. */
ac3eeb49
MS
1567 arg2 = value_at_lazy (enc_type,
1568 find_function_addr (arg1, NULL));
0d5de010 1569 else
581e13c1 1570 /* Retrieve the enclosing object pointed to. */
ac3eeb49
MS
1571 arg2 = value_at_lazy (enc_type,
1572 (value_as_address (arg1)
1573 - value_pointed_to_offset (arg1)));
0d5de010 1574
9f1f738a 1575 enc_type = value_type (arg2);
dfcee124 1576 return readjust_indirect_value_type (arg2, enc_type, base_type, arg1);
c906108c
SS
1577 }
1578
8a3fe4f8 1579 error (_("Attempt to take contents of a non-pointer value."));
c906108c
SS
1580}
1581\f
39d37385
PA
1582/* Create a value for an array by allocating space in GDB, copying the
1583 data into that space, and then setting up an array value.
c906108c 1584
ac3eeb49
MS
1585 The array bounds are set from LOWBOUND and HIGHBOUND, and the array
1586 is populated from the values passed in ELEMVEC.
c906108c
SS
1587
1588 The element type of the array is inherited from the type of the
1589 first element, and all elements must have the same size (though we
ac3eeb49 1590 don't currently enforce any restriction on their types). */
c906108c 1591
f23631e4
AC
1592struct value *
1593value_array (int lowbound, int highbound, struct value **elemvec)
c906108c
SS
1594{
1595 int nelem;
1596 int idx;
6b850546 1597 ULONGEST typelength;
f23631e4 1598 struct value *val;
c906108c 1599 struct type *arraytype;
c906108c 1600
ac3eeb49
MS
1601 /* Validate that the bounds are reasonable and that each of the
1602 elements have the same size. */
c906108c
SS
1603
1604 nelem = highbound - lowbound + 1;
1605 if (nelem <= 0)
1606 {
8a3fe4f8 1607 error (_("bad array bounds (%d, %d)"), lowbound, highbound);
c906108c 1608 }
3ae385af 1609 typelength = type_length_units (value_enclosing_type (elemvec[0]));
c906108c
SS
1610 for (idx = 1; idx < nelem; idx++)
1611 {
3ae385af
SM
1612 if (type_length_units (value_enclosing_type (elemvec[idx]))
1613 != typelength)
c906108c 1614 {
8a3fe4f8 1615 error (_("array elements must all be the same size"));
c906108c
SS
1616 }
1617 }
1618
e3506a9f
UW
1619 arraytype = lookup_array_range_type (value_enclosing_type (elemvec[0]),
1620 lowbound, highbound);
c906108c
SS
1621
1622 if (!current_language->c_style_arrays)
1623 {
1624 val = allocate_value (arraytype);
1625 for (idx = 0; idx < nelem; idx++)
39d37385
PA
1626 value_contents_copy (val, idx * typelength, elemvec[idx], 0,
1627 typelength);
c906108c
SS
1628 return val;
1629 }
1630
63092375
DJ
1631 /* Allocate space to store the array, and then initialize it by
1632 copying in each element. */
c906108c 1633
63092375 1634 val = allocate_value (arraytype);
c906108c 1635 for (idx = 0; idx < nelem; idx++)
39d37385 1636 value_contents_copy (val, idx * typelength, elemvec[idx], 0, typelength);
63092375 1637 return val;
c906108c
SS
1638}
1639
6c7a06a3 1640struct value *
e3a3797e 1641value_cstring (const char *ptr, ssize_t len, struct type *char_type)
6c7a06a3
TT
1642{
1643 struct value *val;
1644 int lowbound = current_language->string_lower_bound;
63375b74 1645 ssize_t highbound = len / TYPE_LENGTH (char_type);
6c7a06a3 1646 struct type *stringtype
e3506a9f 1647 = lookup_array_range_type (char_type, lowbound, highbound + lowbound - 1);
6c7a06a3
TT
1648
1649 val = allocate_value (stringtype);
1650 memcpy (value_contents_raw (val), ptr, len);
1651 return val;
1652}
1653
ac3eeb49
MS
1654/* Create a value for a string constant by allocating space in the
1655 inferior, copying the data into that space, and returning the
1656 address with type TYPE_CODE_STRING. PTR points to the string
1657 constant data; LEN is number of characters.
1658
1659 Note that string types are like array of char types with a lower
1660 bound of zero and an upper bound of LEN - 1. Also note that the
1661 string may contain embedded null bytes. */
c906108c 1662
f23631e4 1663struct value *
7cc3f8e2 1664value_string (const char *ptr, ssize_t len, struct type *char_type)
c906108c 1665{
f23631e4 1666 struct value *val;
c906108c 1667 int lowbound = current_language->string_lower_bound;
63375b74 1668 ssize_t highbound = len / TYPE_LENGTH (char_type);
c906108c 1669 struct type *stringtype
e3506a9f 1670 = lookup_string_range_type (char_type, lowbound, highbound + lowbound - 1);
c906108c 1671
3b7538c0
UW
1672 val = allocate_value (stringtype);
1673 memcpy (value_contents_raw (val), ptr, len);
1674 return val;
c906108c
SS
1675}
1676
c906108c 1677\f
ac3eeb49
MS
1678/* See if we can pass arguments in T2 to a function which takes
1679 arguments of types T1. T1 is a list of NARGS arguments, and T2 is
1680 a NULL-terminated vector. If some arguments need coercion of some
1681 sort, then the coerced values are written into T2. Return value is
1682 0 if the arguments could be matched, or the position at which they
1683 differ if not.
c906108c 1684
ac3eeb49
MS
1685 STATICP is nonzero if the T1 argument list came from a static
1686 member function. T2 will still include the ``this'' pointer, but
1687 it will be skipped.
c906108c
SS
1688
1689 For non-static member functions, we ignore the first argument,
ac3eeb49
MS
1690 which is the type of the instance variable. This is because we
1691 want to handle calls with objects from derived classes. This is
1692 not entirely correct: we should actually check to make sure that a
c906108c
SS
1693 requested operation is type secure, shouldn't we? FIXME. */
1694
1695static int
ad2f7632
DJ
1696typecmp (int staticp, int varargs, int nargs,
1697 struct field t1[], struct value *t2[])
c906108c
SS
1698{
1699 int i;
1700
1701 if (t2 == 0)
ac3eeb49
MS
1702 internal_error (__FILE__, __LINE__,
1703 _("typecmp: no argument list"));
ad2f7632 1704
ac3eeb49
MS
1705 /* Skip ``this'' argument if applicable. T2 will always include
1706 THIS. */
4a1970e4 1707 if (staticp)
ad2f7632
DJ
1708 t2 ++;
1709
1710 for (i = 0;
1711 (i < nargs) && TYPE_CODE (t1[i].type) != TYPE_CODE_VOID;
1712 i++)
c906108c 1713 {
c5aa993b 1714 struct type *tt1, *tt2;
ad2f7632 1715
c5aa993b
JM
1716 if (!t2[i])
1717 return i + 1;
ad2f7632
DJ
1718
1719 tt1 = check_typedef (t1[i].type);
df407dfe 1720 tt2 = check_typedef (value_type (t2[i]));
ad2f7632 1721
aa006118 1722 if (TYPE_IS_REFERENCE (tt1)
8301c89e 1723 /* We should be doing hairy argument matching, as below. */
3e43a32a
MS
1724 && (TYPE_CODE (check_typedef (TYPE_TARGET_TYPE (tt1)))
1725 == TYPE_CODE (tt2)))
c906108c
SS
1726 {
1727 if (TYPE_CODE (tt2) == TYPE_CODE_ARRAY)
1728 t2[i] = value_coerce_array (t2[i]);
1729 else
a65cfae5 1730 t2[i] = value_ref (t2[i], TYPE_CODE (tt1));
c906108c
SS
1731 continue;
1732 }
1733
802db21b
DB
1734 /* djb - 20000715 - Until the new type structure is in the
1735 place, and we can attempt things like implicit conversions,
1736 we need to do this so you can take something like a map<const
1737 char *>, and properly access map["hello"], because the
1738 argument to [] will be a reference to a pointer to a char,
ac3eeb49 1739 and the argument will be a pointer to a char. */
aa006118 1740 while (TYPE_IS_REFERENCE (tt1) || TYPE_CODE (tt1) == TYPE_CODE_PTR)
802db21b
DB
1741 {
1742 tt1 = check_typedef( TYPE_TARGET_TYPE(tt1) );
1743 }
ac3eeb49
MS
1744 while (TYPE_CODE(tt2) == TYPE_CODE_ARRAY
1745 || TYPE_CODE(tt2) == TYPE_CODE_PTR
aa006118 1746 || TYPE_IS_REFERENCE (tt2))
c906108c 1747 {
ac3eeb49 1748 tt2 = check_typedef (TYPE_TARGET_TYPE(tt2));
c906108c 1749 }
c5aa993b
JM
1750 if (TYPE_CODE (tt1) == TYPE_CODE (tt2))
1751 continue;
ac3eeb49
MS
1752 /* Array to pointer is a `trivial conversion' according to the
1753 ARM. */
c906108c 1754
ac3eeb49
MS
1755 /* We should be doing much hairier argument matching (see
1756 section 13.2 of the ARM), but as a quick kludge, just check
1757 for the same type code. */
df407dfe 1758 if (TYPE_CODE (t1[i].type) != TYPE_CODE (value_type (t2[i])))
c5aa993b 1759 return i + 1;
c906108c 1760 }
ad2f7632 1761 if (varargs || t2[i] == NULL)
c5aa993b 1762 return 0;
ad2f7632 1763 return i + 1;
c906108c
SS
1764}
1765
b1af9e97
TT
1766/* Helper class for do_search_struct_field that updates *RESULT_PTR
1767 and *LAST_BOFFSET, and possibly throws an exception if the field
1768 search has yielded ambiguous results. */
c906108c 1769
b1af9e97
TT
1770static void
1771update_search_result (struct value **result_ptr, struct value *v,
6b850546 1772 LONGEST *last_boffset, LONGEST boffset,
b1af9e97
TT
1773 const char *name, struct type *type)
1774{
1775 if (v != NULL)
1776 {
1777 if (*result_ptr != NULL
1778 /* The result is not ambiguous if all the classes that are
1779 found occupy the same space. */
1780 && *last_boffset != boffset)
1781 error (_("base class '%s' is ambiguous in type '%s'"),
1782 name, TYPE_SAFE_NAME (type));
1783 *result_ptr = v;
1784 *last_boffset = boffset;
1785 }
1786}
c906108c 1787
b1af9e97
TT
1788/* A helper for search_struct_field. This does all the work; most
1789 arguments are as passed to search_struct_field. The result is
1790 stored in *RESULT_PTR, which must be initialized to NULL.
1791 OUTERMOST_TYPE is the type of the initial type passed to
1792 search_struct_field; this is used for error reporting when the
1793 lookup is ambiguous. */
1794
1795static void
6b850546 1796do_search_struct_field (const char *name, struct value *arg1, LONGEST offset,
b1af9e97
TT
1797 struct type *type, int looking_for_baseclass,
1798 struct value **result_ptr,
6b850546 1799 LONGEST *last_boffset,
b1af9e97 1800 struct type *outermost_type)
c906108c
SS
1801{
1802 int i;
edf3d5f3 1803 int nbases;
c906108c 1804
f168693b 1805 type = check_typedef (type);
edf3d5f3 1806 nbases = TYPE_N_BASECLASSES (type);
c906108c 1807
c5aa993b 1808 if (!looking_for_baseclass)
c906108c
SS
1809 for (i = TYPE_NFIELDS (type) - 1; i >= nbases; i--)
1810 {
0d5cff50 1811 const char *t_field_name = TYPE_FIELD_NAME (type, i);
c906108c 1812
db577aea 1813 if (t_field_name && (strcmp_iw (t_field_name, name) == 0))
c906108c 1814 {
f23631e4 1815 struct value *v;
a109c7c1 1816
d6a843b5 1817 if (field_is_static (&TYPE_FIELD (type, i)))
686d4def 1818 v = value_static_field (type, i);
c906108c 1819 else
b1af9e97
TT
1820 v = value_primitive_field (arg1, offset, i, type);
1821 *result_ptr = v;
1822 return;
c906108c
SS
1823 }
1824
1825 if (t_field_name
47c6ee49 1826 && t_field_name[0] == '\0')
c906108c
SS
1827 {
1828 struct type *field_type = TYPE_FIELD_TYPE (type, i);
a109c7c1 1829
c906108c
SS
1830 if (TYPE_CODE (field_type) == TYPE_CODE_UNION
1831 || TYPE_CODE (field_type) == TYPE_CODE_STRUCT)
1832 {
ac3eeb49
MS
1833 /* Look for a match through the fields of an anonymous
1834 union, or anonymous struct. C++ provides anonymous
1835 unions.
c906108c 1836
1b831c93
AC
1837 In the GNU Chill (now deleted from GDB)
1838 implementation of variant record types, each
1839 <alternative field> has an (anonymous) union type,
1840 each member of the union represents a <variant
1841 alternative>. Each <variant alternative> is
1842 represented as a struct, with a member for each
1843 <variant field>. */
c5aa993b 1844
b1af9e97 1845 struct value *v = NULL;
6b850546 1846 LONGEST new_offset = offset;
c906108c 1847
db034ac5
AC
1848 /* This is pretty gross. In G++, the offset in an
1849 anonymous union is relative to the beginning of the
1b831c93
AC
1850 enclosing struct. In the GNU Chill (now deleted
1851 from GDB) implementation of variant records, the
1852 bitpos is zero in an anonymous union field, so we
ac3eeb49 1853 have to add the offset of the union here. */
c906108c
SS
1854 if (TYPE_CODE (field_type) == TYPE_CODE_STRUCT
1855 || (TYPE_NFIELDS (field_type) > 0
1856 && TYPE_FIELD_BITPOS (field_type, 0) == 0))
1857 new_offset += TYPE_FIELD_BITPOS (type, i) / 8;
1858
b1af9e97
TT
1859 do_search_struct_field (name, arg1, new_offset,
1860 field_type,
1861 looking_for_baseclass, &v,
1862 last_boffset,
1863 outermost_type);
c906108c 1864 if (v)
b1af9e97
TT
1865 {
1866 *result_ptr = v;
1867 return;
1868 }
c906108c
SS
1869 }
1870 }
1871 }
1872
c5aa993b 1873 for (i = 0; i < nbases; i++)
c906108c 1874 {
b1af9e97 1875 struct value *v = NULL;
c906108c 1876 struct type *basetype = check_typedef (TYPE_BASECLASS (type, i));
ac3eeb49
MS
1877 /* If we are looking for baseclasses, this is what we get when
1878 we hit them. But it could happen that the base part's member
1879 name is not yet filled in. */
c906108c
SS
1880 int found_baseclass = (looking_for_baseclass
1881 && TYPE_BASECLASS_NAME (type, i) != NULL
ac3eeb49
MS
1882 && (strcmp_iw (name,
1883 TYPE_BASECLASS_NAME (type,
1884 i)) == 0));
6b850546 1885 LONGEST boffset = value_embedded_offset (arg1) + offset;
c906108c
SS
1886
1887 if (BASETYPE_VIA_VIRTUAL (type, i))
1888 {
3e3d7139 1889 struct value *v2;
c906108c
SS
1890
1891 boffset = baseclass_offset (type, i,
8af8e3bc
PA
1892 value_contents_for_printing (arg1),
1893 value_embedded_offset (arg1) + offset,
1894 value_address (arg1),
1895 arg1);
c906108c 1896
ac3eeb49 1897 /* The virtual base class pointer might have been clobbered
581e13c1 1898 by the user program. Make sure that it still points to a
ac3eeb49 1899 valid memory location. */
c906108c 1900
1a334831
TT
1901 boffset += value_embedded_offset (arg1) + offset;
1902 if (boffset < 0
1903 || boffset >= TYPE_LENGTH (value_enclosing_type (arg1)))
c906108c
SS
1904 {
1905 CORE_ADDR base_addr;
c5aa993b 1906
42ae5230 1907 base_addr = value_address (arg1) + boffset;
08039c9e 1908 v2 = value_at_lazy (basetype, base_addr);
ac3eeb49
MS
1909 if (target_read_memory (base_addr,
1910 value_contents_raw (v2),
acc900c2 1911 TYPE_LENGTH (value_type (v2))) != 0)
8a3fe4f8 1912 error (_("virtual baseclass botch"));
c906108c
SS
1913 }
1914 else
1915 {
1a334831
TT
1916 v2 = value_copy (arg1);
1917 deprecated_set_value_type (v2, basetype);
1918 set_value_embedded_offset (v2, boffset);
c906108c
SS
1919 }
1920
1921 if (found_baseclass)
b1af9e97
TT
1922 v = v2;
1923 else
1924 {
1925 do_search_struct_field (name, v2, 0,
1926 TYPE_BASECLASS (type, i),
1927 looking_for_baseclass,
1928 result_ptr, last_boffset,
1929 outermost_type);
1930 }
c906108c
SS
1931 }
1932 else if (found_baseclass)
1933 v = value_primitive_field (arg1, offset, i, type);
1934 else
b1af9e97
TT
1935 {
1936 do_search_struct_field (name, arg1,
1937 offset + TYPE_BASECLASS_BITPOS (type,
1938 i) / 8,
1939 basetype, looking_for_baseclass,
1940 result_ptr, last_boffset,
1941 outermost_type);
1942 }
1943
1944 update_search_result (result_ptr, v, last_boffset,
1945 boffset, name, outermost_type);
c906108c 1946 }
b1af9e97
TT
1947}
1948
1949/* Helper function used by value_struct_elt to recurse through
8a13d42d
SM
1950 baseclasses. Look for a field NAME in ARG1. Search in it assuming
1951 it has (class) type TYPE. If found, return value, else return NULL.
b1af9e97
TT
1952
1953 If LOOKING_FOR_BASECLASS, then instead of looking for struct
1954 fields, look for a baseclass named NAME. */
1955
1956static struct value *
8a13d42d 1957search_struct_field (const char *name, struct value *arg1,
b1af9e97
TT
1958 struct type *type, int looking_for_baseclass)
1959{
1960 struct value *result = NULL;
6b850546 1961 LONGEST boffset = 0;
b1af9e97 1962
8a13d42d 1963 do_search_struct_field (name, arg1, 0, type, looking_for_baseclass,
b1af9e97
TT
1964 &result, &boffset, type);
1965 return result;
c906108c
SS
1966}
1967
ac3eeb49 1968/* Helper function used by value_struct_elt to recurse through
581e13c1 1969 baseclasses. Look for a field NAME in ARG1. Adjust the address of
ac3eeb49
MS
1970 ARG1 by OFFSET bytes, and search in it assuming it has (class) type
1971 TYPE.
1972
1973 If found, return value, else if name matched and args not return
1974 (value) -1, else return NULL. */
c906108c 1975
f23631e4 1976static struct value *
714f19d5 1977search_struct_method (const char *name, struct value **arg1p,
6b850546 1978 struct value **args, LONGEST offset,
aa1ee363 1979 int *static_memfuncp, struct type *type)
c906108c
SS
1980{
1981 int i;
f23631e4 1982 struct value *v;
c906108c 1983 int name_matched = 0;
c906108c 1984
f168693b 1985 type = check_typedef (type);
c906108c
SS
1986 for (i = TYPE_NFN_FIELDS (type) - 1; i >= 0; i--)
1987 {
0d5cff50 1988 const char *t_field_name = TYPE_FN_FIELDLIST_NAME (type, i);
a109c7c1 1989
db577aea 1990 if (t_field_name && (strcmp_iw (t_field_name, name) == 0))
c906108c
SS
1991 {
1992 int j = TYPE_FN_FIELDLIST_LENGTH (type, i) - 1;
1993 struct fn_field *f = TYPE_FN_FIELDLIST1 (type, i);
c906108c 1994
a109c7c1 1995 name_matched = 1;
de17c821 1996 check_stub_method_group (type, i);
c906108c 1997 if (j > 0 && args == 0)
3e43a32a
MS
1998 error (_("cannot resolve overloaded method "
1999 "`%s': no arguments supplied"), name);
acf5ed49 2000 else if (j == 0 && args == 0)
c906108c 2001 {
acf5ed49
DJ
2002 v = value_fn_field (arg1p, f, j, type, offset);
2003 if (v != NULL)
2004 return v;
c906108c 2005 }
acf5ed49
DJ
2006 else
2007 while (j >= 0)
2008 {
acf5ed49 2009 if (!typecmp (TYPE_FN_FIELD_STATIC_P (f, j),
ad2f7632
DJ
2010 TYPE_VARARGS (TYPE_FN_FIELD_TYPE (f, j)),
2011 TYPE_NFIELDS (TYPE_FN_FIELD_TYPE (f, j)),
acf5ed49
DJ
2012 TYPE_FN_FIELD_ARGS (f, j), args))
2013 {
2014 if (TYPE_FN_FIELD_VIRTUAL_P (f, j))
ac3eeb49
MS
2015 return value_virtual_fn_field (arg1p, f, j,
2016 type, offset);
2017 if (TYPE_FN_FIELD_STATIC_P (f, j)
2018 && static_memfuncp)
acf5ed49
DJ
2019 *static_memfuncp = 1;
2020 v = value_fn_field (arg1p, f, j, type, offset);
2021 if (v != NULL)
2022 return v;
2023 }
2024 j--;
2025 }
c906108c
SS
2026 }
2027 }
2028
2029 for (i = TYPE_N_BASECLASSES (type) - 1; i >= 0; i--)
2030 {
6b850546
DT
2031 LONGEST base_offset;
2032 LONGEST this_offset;
c906108c
SS
2033
2034 if (BASETYPE_VIA_VIRTUAL (type, i))
2035 {
086280be 2036 struct type *baseclass = check_typedef (TYPE_BASECLASS (type, i));
8af8e3bc 2037 struct value *base_val;
086280be
UW
2038 const gdb_byte *base_valaddr;
2039
2040 /* The virtual base class pointer might have been
581e13c1 2041 clobbered by the user program. Make sure that it
8301c89e 2042 still points to a valid memory location. */
086280be
UW
2043
2044 if (offset < 0 || offset >= TYPE_LENGTH (type))
c5aa993b 2045 {
6c18f3e0
SP
2046 CORE_ADDR address;
2047
26fcd5d7 2048 gdb::byte_vector tmp (TYPE_LENGTH (baseclass));
6c18f3e0 2049 address = value_address (*arg1p);
a109c7c1 2050
8af8e3bc 2051 if (target_read_memory (address + offset,
26fcd5d7 2052 tmp.data (), TYPE_LENGTH (baseclass)) != 0)
086280be 2053 error (_("virtual baseclass botch"));
8af8e3bc
PA
2054
2055 base_val = value_from_contents_and_address (baseclass,
26fcd5d7 2056 tmp.data (),
8af8e3bc
PA
2057 address + offset);
2058 base_valaddr = value_contents_for_printing (base_val);
2059 this_offset = 0;
c5aa993b
JM
2060 }
2061 else
8af8e3bc
PA
2062 {
2063 base_val = *arg1p;
2064 base_valaddr = value_contents_for_printing (*arg1p);
2065 this_offset = offset;
2066 }
c5aa993b 2067
086280be 2068 base_offset = baseclass_offset (type, i, base_valaddr,
8af8e3bc
PA
2069 this_offset, value_address (base_val),
2070 base_val);
c5aa993b 2071 }
c906108c
SS
2072 else
2073 {
2074 base_offset = TYPE_BASECLASS_BITPOS (type, i) / 8;
c5aa993b 2075 }
c906108c
SS
2076 v = search_struct_method (name, arg1p, args, base_offset + offset,
2077 static_memfuncp, TYPE_BASECLASS (type, i));
f23631e4 2078 if (v == (struct value *) - 1)
c906108c
SS
2079 {
2080 name_matched = 1;
2081 }
2082 else if (v)
2083 {
ac3eeb49
MS
2084 /* FIXME-bothner: Why is this commented out? Why is it here? */
2085 /* *arg1p = arg1_tmp; */
c906108c 2086 return v;
c5aa993b 2087 }
c906108c 2088 }
c5aa993b 2089 if (name_matched)
f23631e4 2090 return (struct value *) - 1;
c5aa993b
JM
2091 else
2092 return NULL;
c906108c
SS
2093}
2094
2095/* Given *ARGP, a value of type (pointer to a)* structure/union,
ac3eeb49
MS
2096 extract the component named NAME from the ultimate target
2097 structure/union and return it as a value with its appropriate type.
c906108c
SS
2098 ERR is used in the error message if *ARGP's type is wrong.
2099
2100 C++: ARGS is a list of argument types to aid in the selection of
581e13c1 2101 an appropriate method. Also, handle derived types.
c906108c
SS
2102
2103 STATIC_MEMFUNCP, if non-NULL, points to a caller-supplied location
2104 where the truthvalue of whether the function that was resolved was
2105 a static member function or not is stored.
2106
ac3eeb49
MS
2107 ERR is an error message to be printed in case the field is not
2108 found. */
c906108c 2109
f23631e4
AC
2110struct value *
2111value_struct_elt (struct value **argp, struct value **args,
714f19d5 2112 const char *name, int *static_memfuncp, const char *err)
c906108c 2113{
52f0bd74 2114 struct type *t;
f23631e4 2115 struct value *v;
c906108c 2116
994b9211 2117 *argp = coerce_array (*argp);
c906108c 2118
df407dfe 2119 t = check_typedef (value_type (*argp));
c906108c
SS
2120
2121 /* Follow pointers until we get to a non-pointer. */
2122
aa006118 2123 while (TYPE_CODE (t) == TYPE_CODE_PTR || TYPE_IS_REFERENCE (t))
c906108c
SS
2124 {
2125 *argp = value_ind (*argp);
2126 /* Don't coerce fn pointer to fn and then back again! */
b846d303 2127 if (TYPE_CODE (check_typedef (value_type (*argp))) != TYPE_CODE_FUNC)
994b9211 2128 *argp = coerce_array (*argp);
df407dfe 2129 t = check_typedef (value_type (*argp));
c906108c
SS
2130 }
2131
c5aa993b 2132 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
c906108c 2133 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
2134 error (_("Attempt to extract a component of a value that is not a %s."),
2135 err);
c906108c
SS
2136
2137 /* Assume it's not, unless we see that it is. */
2138 if (static_memfuncp)
c5aa993b 2139 *static_memfuncp = 0;
c906108c
SS
2140
2141 if (!args)
2142 {
2143 /* if there are no arguments ...do this... */
2144
ac3eeb49
MS
2145 /* Try as a field first, because if we succeed, there is less
2146 work to be done. */
8a13d42d 2147 v = search_struct_field (name, *argp, t, 0);
c906108c
SS
2148 if (v)
2149 return v;
2150
2151 /* C++: If it was not found as a data field, then try to
7b83ea04 2152 return it as a pointer to a method. */
ac3eeb49
MS
2153 v = search_struct_method (name, argp, args, 0,
2154 static_memfuncp, t);
c906108c 2155
f23631e4 2156 if (v == (struct value *) - 1)
55b39184 2157 error (_("Cannot take address of method %s."), name);
c906108c
SS
2158 else if (v == 0)
2159 {
2160 if (TYPE_NFN_FIELDS (t))
8a3fe4f8 2161 error (_("There is no member or method named %s."), name);
c906108c 2162 else
8a3fe4f8 2163 error (_("There is no member named %s."), name);
c906108c
SS
2164 }
2165 return v;
2166 }
2167
8301c89e
DE
2168 v = search_struct_method (name, argp, args, 0,
2169 static_memfuncp, t);
7168a814 2170
f23631e4 2171 if (v == (struct value *) - 1)
c906108c 2172 {
3e43a32a
MS
2173 error (_("One of the arguments you tried to pass to %s could not "
2174 "be converted to what the function wants."), name);
c906108c
SS
2175 }
2176 else if (v == 0)
2177 {
ac3eeb49
MS
2178 /* See if user tried to invoke data as function. If so, hand it
2179 back. If it's not callable (i.e., a pointer to function),
7b83ea04 2180 gdb should give an error. */
8a13d42d 2181 v = search_struct_field (name, *argp, t, 0);
fa8de41e
TT
2182 /* If we found an ordinary field, then it is not a method call.
2183 So, treat it as if it were a static member function. */
2184 if (v && static_memfuncp)
2185 *static_memfuncp = 1;
c906108c
SS
2186 }
2187
2188 if (!v)
79afc5ef
SW
2189 throw_error (NOT_FOUND_ERROR,
2190 _("Structure has no component named %s."), name);
c906108c
SS
2191 return v;
2192}
2193
b5b08fb4
SC
2194/* Given *ARGP, a value of type structure or union, or a pointer/reference
2195 to a structure or union, extract and return its component (field) of
2196 type FTYPE at the specified BITPOS.
2197 Throw an exception on error. */
2198
2199struct value *
2200value_struct_elt_bitpos (struct value **argp, int bitpos, struct type *ftype,
2201 const char *err)
2202{
2203 struct type *t;
b5b08fb4 2204 int i;
b5b08fb4
SC
2205
2206 *argp = coerce_array (*argp);
2207
2208 t = check_typedef (value_type (*argp));
2209
aa006118 2210 while (TYPE_CODE (t) == TYPE_CODE_PTR || TYPE_IS_REFERENCE (t))
b5b08fb4
SC
2211 {
2212 *argp = value_ind (*argp);
2213 if (TYPE_CODE (check_typedef (value_type (*argp))) != TYPE_CODE_FUNC)
2214 *argp = coerce_array (*argp);
2215 t = check_typedef (value_type (*argp));
2216 }
2217
2218 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
2219 && TYPE_CODE (t) != TYPE_CODE_UNION)
2220 error (_("Attempt to extract a component of a value that is not a %s."),
2221 err);
2222
2223 for (i = TYPE_N_BASECLASSES (t); i < TYPE_NFIELDS (t); i++)
2224 {
2225 if (!field_is_static (&TYPE_FIELD (t, i))
2226 && bitpos == TYPE_FIELD_BITPOS (t, i)
2227 && types_equal (ftype, TYPE_FIELD_TYPE (t, i)))
2228 return value_primitive_field (*argp, 0, i, t);
2229 }
2230
2231 error (_("No field with matching bitpos and type."));
2232
2233 /* Never hit. */
2234 return NULL;
2235}
2236
7c22600a
TT
2237/* See value.h. */
2238
2239int
2240value_union_variant (struct type *union_type, const gdb_byte *contents)
2241{
2242 gdb_assert (TYPE_CODE (union_type) == TYPE_CODE_UNION
2243 && TYPE_FLAG_DISCRIMINATED_UNION (union_type));
2244
2245 struct dynamic_prop *discriminant_prop
2246 = get_dyn_prop (DYN_PROP_DISCRIMINATED, union_type);
2247 gdb_assert (discriminant_prop != nullptr);
2248
2249 struct discriminant_info *info
2250 = (struct discriminant_info *) discriminant_prop->data.baton;
2251 gdb_assert (info != nullptr);
2252
2253 /* If this is a univariant union, just return the sole field. */
2254 if (TYPE_NFIELDS (union_type) == 1)
2255 return 0;
2256 /* This should only happen for univariants, which we already dealt
2257 with. */
2258 gdb_assert (info->discriminant_index != -1);
2259
2260 /* Compute the discriminant. Note that unpack_field_as_long handles
2261 sign extension when necessary, as does the DWARF reader -- so
2262 signed discriminants will be handled correctly despite the use of
2263 an unsigned type here. */
2264 ULONGEST discriminant = unpack_field_as_long (union_type, contents,
2265 info->discriminant_index);
2266
2267 for (int i = 0; i < TYPE_NFIELDS (union_type); ++i)
2268 {
2269 if (i != info->default_index
2270 && i != info->discriminant_index
2271 && discriminant == info->discriminants[i])
2272 return i;
2273 }
2274
2275 if (info->default_index == -1)
2276 error (_("Could not find variant corresponding to discriminant %s"),
2277 pulongest (discriminant));
2278 return info->default_index;
2279}
2280
ac3eeb49 2281/* Search through the methods of an object (and its bases) to find a
38139a96 2282 specified method. Return a reference to the fn_field list METHODS of
233e8b28
SC
2283 overloaded instances defined in the source language. If available
2284 and matching, a vector of matching xmethods defined in extension
38139a96 2285 languages are also returned in XMETHODS.
ac3eeb49
MS
2286
2287 Helper function for value_find_oload_list.
2288 ARGP is a pointer to a pointer to a value (the object).
2289 METHOD is a string containing the method name.
2290 OFFSET is the offset within the value.
2291 TYPE is the assumed type of the object.
38139a96
PA
2292 METHODS is a pointer to the matching overloaded instances defined
2293 in the source language. Since this is a recursive function,
2294 *METHODS should be set to NULL when calling this function.
233e8b28
SC
2295 NUM_FNS is the number of overloaded instances. *NUM_FNS should be set to
2296 0 when calling this function.
38139a96 2297 XMETHODS is the vector of matching xmethod workers. *XMETHODS
233e8b28 2298 should also be set to NULL when calling this function.
ac3eeb49
MS
2299 BASETYPE is set to the actual type of the subobject where the
2300 method is found.
581e13c1 2301 BOFFSET is the offset of the base subobject where the method is found. */
c906108c 2302
233e8b28 2303static void
714f19d5 2304find_method_list (struct value **argp, const char *method,
6b850546 2305 LONGEST offset, struct type *type,
38139a96
PA
2306 gdb::array_view<fn_field> *methods,
2307 std::vector<xmethod_worker_up> *xmethods,
6b850546 2308 struct type **basetype, LONGEST *boffset)
c906108c
SS
2309{
2310 int i;
233e8b28 2311 struct fn_field *f = NULL;
c906108c 2312
38139a96 2313 gdb_assert (methods != NULL && xmethods != NULL);
f168693b 2314 type = check_typedef (type);
c906108c 2315
233e8b28
SC
2316 /* First check in object itself.
2317 This function is called recursively to search through base classes.
2318 If there is a source method match found at some stage, then we need not
2319 look for source methods in consequent recursive calls. */
38139a96 2320 if (methods->empty ())
c906108c 2321 {
233e8b28 2322 for (i = TYPE_NFN_FIELDS (type) - 1; i >= 0; i--)
c5aa993b 2323 {
233e8b28
SC
2324 /* pai: FIXME What about operators and type conversions? */
2325 const char *fn_field_name = TYPE_FN_FIELDLIST_NAME (type, i);
2326
2327 if (fn_field_name && (strcmp_iw (fn_field_name, method) == 0))
2328 {
2329 int len = TYPE_FN_FIELDLIST_LENGTH (type, i);
2330 f = TYPE_FN_FIELDLIST1 (type, i);
38139a96 2331 *methods = gdb::make_array_view (f, len);
4a1970e4 2332
233e8b28
SC
2333 *basetype = type;
2334 *boffset = offset;
4a1970e4 2335
233e8b28
SC
2336 /* Resolve any stub methods. */
2337 check_stub_method_group (type, i);
4a1970e4 2338
233e8b28
SC
2339 break;
2340 }
c5aa993b
JM
2341 }
2342 }
2343
233e8b28
SC
2344 /* Unlike source methods, xmethods can be accumulated over successive
2345 recursive calls. In other words, an xmethod named 'm' in a class
2346 will not hide an xmethod named 'm' in its base class(es). We want
2347 it to be this way because xmethods are after all convenience functions
2348 and hence there is no point restricting them with something like method
2349 hiding. Moreover, if hiding is done for xmethods as well, then we will
2350 have to provide a mechanism to un-hide (like the 'using' construct). */
38139a96 2351 get_matching_xmethod_workers (type, method, xmethods);
233e8b28
SC
2352
2353 /* If source methods are not found in current class, look for them in the
2354 base classes. We also have to go through the base classes to gather
2355 extension methods. */
c906108c
SS
2356 for (i = TYPE_N_BASECLASSES (type) - 1; i >= 0; i--)
2357 {
6b850546 2358 LONGEST base_offset;
a109c7c1 2359
c906108c
SS
2360 if (BASETYPE_VIA_VIRTUAL (type, i))
2361 {
086280be 2362 base_offset = baseclass_offset (type, i,
8af8e3bc
PA
2363 value_contents_for_printing (*argp),
2364 value_offset (*argp) + offset,
2365 value_address (*argp), *argp);
c5aa993b 2366 }
ac3eeb49
MS
2367 else /* Non-virtual base, simply use bit position from debug
2368 info. */
c906108c
SS
2369 {
2370 base_offset = TYPE_BASECLASS_BITPOS (type, i) / 8;
c5aa993b 2371 }
233e8b28
SC
2372
2373 find_method_list (argp, method, base_offset + offset,
38139a96
PA
2374 TYPE_BASECLASS (type, i), methods,
2375 xmethods, basetype, boffset);
c906108c 2376 }
c906108c
SS
2377}
2378
233e8b28
SC
2379/* Return the list of overloaded methods of a specified name. The methods
2380 could be those GDB finds in the binary, or xmethod. Methods found in
38139a96
PA
2381 the binary are returned in METHODS, and xmethods are returned in
2382 XMETHODS.
ac3eeb49
MS
2383
2384 ARGP is a pointer to a pointer to a value (the object).
2385 METHOD is the method name.
2386 OFFSET is the offset within the value contents.
38139a96
PA
2387 METHODS is the list of matching overloaded instances defined in
2388 the source language.
2389 XMETHODS is the vector of matching xmethod workers defined in
233e8b28 2390 extension languages.
ac3eeb49
MS
2391 BASETYPE is set to the type of the base subobject that defines the
2392 method.
581e13c1 2393 BOFFSET is the offset of the base subobject which defines the method. */
c906108c 2394
233e8b28 2395static void
714f19d5 2396value_find_oload_method_list (struct value **argp, const char *method,
85cca2bc 2397 LONGEST offset,
38139a96
PA
2398 gdb::array_view<fn_field> *methods,
2399 std::vector<xmethod_worker_up> *xmethods,
6b850546 2400 struct type **basetype, LONGEST *boffset)
c906108c 2401{
c5aa993b 2402 struct type *t;
c906108c 2403
df407dfe 2404 t = check_typedef (value_type (*argp));
c906108c 2405
ac3eeb49 2406 /* Code snarfed from value_struct_elt. */
aa006118 2407 while (TYPE_CODE (t) == TYPE_CODE_PTR || TYPE_IS_REFERENCE (t))
c906108c
SS
2408 {
2409 *argp = value_ind (*argp);
2410 /* Don't coerce fn pointer to fn and then back again! */
b846d303 2411 if (TYPE_CODE (check_typedef (value_type (*argp))) != TYPE_CODE_FUNC)
994b9211 2412 *argp = coerce_array (*argp);
df407dfe 2413 t = check_typedef (value_type (*argp));
c906108c 2414 }
c5aa993b 2415
c5aa993b
JM
2416 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
2417 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
2418 error (_("Attempt to extract a component of a "
2419 "value that is not a struct or union"));
c5aa993b 2420
38139a96 2421 gdb_assert (methods != NULL && xmethods != NULL);
233e8b28
SC
2422
2423 /* Clear the lists. */
38139a96
PA
2424 *methods = {};
2425 xmethods->clear ();
233e8b28 2426
38139a96 2427 find_method_list (argp, method, 0, t, methods, xmethods,
233e8b28 2428 basetype, boffset);
c906108c
SS
2429}
2430
6b1747cd
PA
2431/* Given an array of arguments (ARGS) (which includes an entry for
2432 "this" in the case of C++ methods), the NAME of a function, and
2433 whether it's a method or not (METHOD), find the best function that
2434 matches on the argument types according to the overload resolution
2435 rules.
c906108c 2436
4c3376c8
SW
2437 METHOD can be one of three values:
2438 NON_METHOD for non-member functions.
2439 METHOD: for member functions.
2440 BOTH: used for overload resolution of operators where the
2441 candidates are expected to be either member or non member
581e13c1 2442 functions. In this case the first argument ARGTYPES
4c3376c8
SW
2443 (representing 'this') is expected to be a reference to the
2444 target object, and will be dereferenced when attempting the
2445 non-member search.
2446
c906108c
SS
2447 In the case of class methods, the parameter OBJ is an object value
2448 in which to search for overloaded methods.
2449
2450 In the case of non-method functions, the parameter FSYM is a symbol
2451 corresponding to one of the overloaded functions.
2452
2453 Return value is an integer: 0 -> good match, 10 -> debugger applied
2454 non-standard coercions, 100 -> incompatible.
2455
2456 If a method is being searched for, VALP will hold the value.
ac3eeb49
MS
2457 If a non-method is being searched for, SYMP will hold the symbol
2458 for it.
c906108c
SS
2459
2460 If a method is being searched for, and it is a static method,
2461 then STATICP will point to a non-zero value.
2462
7322dca9
SW
2463 If NO_ADL argument dependent lookup is disabled. This is used to prevent
2464 ADL overload candidates when performing overload resolution for a fully
2465 qualified name.
2466
e66d4446
SC
2467 If NOSIDE is EVAL_AVOID_SIDE_EFFECTS, then OBJP's memory cannot be
2468 read while picking the best overload match (it may be all zeroes and thus
2469 not have a vtable pointer), in which case skip virtual function lookup.
2470 This is ok as typically EVAL_AVOID_SIDE_EFFECTS is only used to determine
2471 the result type.
2472
c906108c
SS
2473 Note: This function does *not* check the value of
2474 overload_resolution. Caller must check it to see whether overload
581e13c1 2475 resolution is permitted. */
c906108c
SS
2476
2477int
6b1747cd 2478find_overload_match (gdb::array_view<value *> args,
4c3376c8 2479 const char *name, enum oload_search_type method,
28c64fc2 2480 struct value **objp, struct symbol *fsym,
ac3eeb49 2481 struct value **valp, struct symbol **symp,
e66d4446
SC
2482 int *staticp, const int no_adl,
2483 const enum noside noside)
c906108c 2484{
7f8c9282 2485 struct value *obj = (objp ? *objp : NULL);
da096638 2486 struct type *obj_type = obj ? value_type (obj) : NULL;
ac3eeb49 2487 /* Index of best overloaded function. */
4c3376c8
SW
2488 int func_oload_champ = -1;
2489 int method_oload_champ = -1;
233e8b28
SC
2490 int src_method_oload_champ = -1;
2491 int ext_method_oload_champ = -1;
4c3376c8 2492
ac3eeb49 2493 /* The measure for the current best match. */
82ceee50
PA
2494 badness_vector method_badness;
2495 badness_vector func_badness;
2496 badness_vector ext_method_badness;
2497 badness_vector src_method_badness;
4c3376c8 2498
f23631e4 2499 struct value *temp = obj;
ac3eeb49 2500 /* For methods, the list of overloaded methods. */
38139a96 2501 gdb::array_view<fn_field> methods;
ac3eeb49 2502 /* For non-methods, the list of overloaded function symbols. */
38139a96 2503 std::vector<symbol *> functions;
ba18742c 2504 /* For xmethods, the vector of xmethod workers. */
38139a96 2505 std::vector<xmethod_worker_up> xmethods;
c5aa993b 2506 struct type *basetype = NULL;
6b850546 2507 LONGEST boffset;
7322dca9 2508
8d577d32 2509 const char *obj_type_name = NULL;
7322dca9 2510 const char *func_name = NULL;
06d3e5b0 2511 gdb::unique_xmalloc_ptr<char> temp_func;
8d577d32 2512 enum oload_classification match_quality;
4c3376c8 2513 enum oload_classification method_match_quality = INCOMPATIBLE;
233e8b28
SC
2514 enum oload_classification src_method_match_quality = INCOMPATIBLE;
2515 enum oload_classification ext_method_match_quality = INCOMPATIBLE;
4c3376c8 2516 enum oload_classification func_match_quality = INCOMPATIBLE;
c906108c 2517
ac3eeb49 2518 /* Get the list of overloaded methods or functions. */
4c3376c8 2519 if (method == METHOD || method == BOTH)
c906108c 2520 {
a2ca50ae 2521 gdb_assert (obj);
94af9270
KS
2522
2523 /* OBJ may be a pointer value rather than the object itself. */
2524 obj = coerce_ref (obj);
2525 while (TYPE_CODE (check_typedef (value_type (obj))) == TYPE_CODE_PTR)
2526 obj = coerce_ref (value_ind (obj));
df407dfe 2527 obj_type_name = TYPE_NAME (value_type (obj));
94af9270
KS
2528
2529 /* First check whether this is a data member, e.g. a pointer to
2530 a function. */
2531 if (TYPE_CODE (check_typedef (value_type (obj))) == TYPE_CODE_STRUCT)
2532 {
8a13d42d 2533 *valp = search_struct_field (name, obj,
94af9270
KS
2534 check_typedef (value_type (obj)), 0);
2535 if (*valp)
2536 {
2537 *staticp = 1;
2538 return 0;
2539 }
2540 }
c906108c 2541
4c3376c8 2542 /* Retrieve the list of methods with the name NAME. */
38139a96
PA
2543 value_find_oload_method_list (&temp, name, 0, &methods,
2544 &xmethods, &basetype, &boffset);
4c3376c8 2545 /* If this is a method only search, and no methods were found
ba18742c 2546 the search has failed. */
38139a96 2547 if (method == METHOD && methods.empty () && xmethods.empty ())
8a3fe4f8 2548 error (_("Couldn't find method %s%s%s"),
c5aa993b
JM
2549 obj_type_name,
2550 (obj_type_name && *obj_type_name) ? "::" : "",
2551 name);
4a1970e4 2552 /* If we are dealing with stub method types, they should have
ac3eeb49
MS
2553 been resolved by find_method_list via
2554 value_find_oload_method_list above. */
38139a96 2555 if (!methods.empty ())
4c3376c8 2556 {
38139a96 2557 gdb_assert (TYPE_SELF_TYPE (methods[0].type) != NULL);
4c3376c8 2558
85cca2bc
PA
2559 src_method_oload_champ
2560 = find_oload_champ (args,
38139a96
PA
2561 methods.size (),
2562 methods.data (), NULL, NULL,
85cca2bc 2563 &src_method_badness);
233e8b28
SC
2564
2565 src_method_match_quality = classify_oload_match
6b1747cd 2566 (src_method_badness, args.size (),
38139a96 2567 oload_method_static_p (methods.data (), src_method_oload_champ));
233e8b28 2568 }
4c3376c8 2569
38139a96 2570 if (!xmethods.empty ())
233e8b28 2571 {
85cca2bc
PA
2572 ext_method_oload_champ
2573 = find_oload_champ (args,
38139a96
PA
2574 xmethods.size (),
2575 NULL, xmethods.data (), NULL,
85cca2bc 2576 &ext_method_badness);
233e8b28 2577 ext_method_match_quality = classify_oload_match (ext_method_badness,
6b1747cd 2578 args.size (), 0);
4c3376c8
SW
2579 }
2580
233e8b28
SC
2581 if (src_method_oload_champ >= 0 && ext_method_oload_champ >= 0)
2582 {
2583 switch (compare_badness (ext_method_badness, src_method_badness))
2584 {
2585 case 0: /* Src method and xmethod are equally good. */
233e8b28
SC
2586 /* If src method and xmethod are equally good, then
2587 xmethod should be the winner. Hence, fall through to the
2588 case where a xmethod is better than the source
2589 method, except when the xmethod match quality is
2590 non-standard. */
2591 /* FALLTHROUGH */
2592 case 1: /* Src method and ext method are incompatible. */
2593 /* If ext method match is not standard, then let source method
2594 win. Otherwise, fallthrough to let xmethod win. */
2595 if (ext_method_match_quality != STANDARD)
2596 {
2597 method_oload_champ = src_method_oload_champ;
2598 method_badness = src_method_badness;
2599 ext_method_oload_champ = -1;
2600 method_match_quality = src_method_match_quality;
2601 break;
2602 }
2603 /* FALLTHROUGH */
2604 case 2: /* Ext method is champion. */
2605 method_oload_champ = ext_method_oload_champ;
2606 method_badness = ext_method_badness;
2607 src_method_oload_champ = -1;
2608 method_match_quality = ext_method_match_quality;
2609 break;
2610 case 3: /* Src method is champion. */
2611 method_oload_champ = src_method_oload_champ;
2612 method_badness = src_method_badness;
2613 ext_method_oload_champ = -1;
2614 method_match_quality = src_method_match_quality;
2615 break;
2616 default:
2617 gdb_assert_not_reached ("Unexpected overload comparison "
2618 "result");
2619 break;
2620 }
2621 }
2622 else if (src_method_oload_champ >= 0)
2623 {
2624 method_oload_champ = src_method_oload_champ;
2625 method_badness = src_method_badness;
2626 method_match_quality = src_method_match_quality;
2627 }
2628 else if (ext_method_oload_champ >= 0)
2629 {
2630 method_oload_champ = ext_method_oload_champ;
2631 method_badness = ext_method_badness;
2632 method_match_quality = ext_method_match_quality;
2633 }
c906108c 2634 }
4c3376c8
SW
2635
2636 if (method == NON_METHOD || method == BOTH)
c906108c 2637 {
7322dca9 2638 const char *qualified_name = NULL;
c906108c 2639
b021a221
MS
2640 /* If the overload match is being search for both as a method
2641 and non member function, the first argument must now be
2642 dereferenced. */
4c3376c8 2643 if (method == BOTH)
2b214ea6 2644 args[0] = value_ind (args[0]);
4c3376c8 2645
7322dca9
SW
2646 if (fsym)
2647 {
2648 qualified_name = SYMBOL_NATURAL_NAME (fsym);
2649
2650 /* If we have a function with a C++ name, try to extract just
2651 the function part. Do not try this for non-functions (e.g.
2652 function pointers). */
2653 if (qualified_name
3e43a32a
MS
2654 && TYPE_CODE (check_typedef (SYMBOL_TYPE (fsym)))
2655 == TYPE_CODE_FUNC)
7322dca9 2656 {
b926417a 2657 temp_func = cp_func_name (qualified_name);
7322dca9
SW
2658
2659 /* If cp_func_name did not remove anything, the name of the
2660 symbol did not include scope or argument types - it was
2661 probably a C-style function. */
06d3e5b0 2662 if (temp_func != nullptr)
7322dca9 2663 {
06d3e5b0 2664 if (strcmp (temp_func.get (), qualified_name) == 0)
7322dca9
SW
2665 func_name = NULL;
2666 else
06d3e5b0 2667 func_name = temp_func.get ();
7322dca9
SW
2668 }
2669 }
2670 }
2671 else
94af9270 2672 {
7322dca9
SW
2673 func_name = name;
2674 qualified_name = name;
94af9270 2675 }
d9639e13 2676
94af9270
KS
2677 /* If there was no C++ name, this must be a C-style function or
2678 not a function at all. Just return the same symbol. Do the
2679 same if cp_func_name fails for some reason. */
8d577d32 2680 if (func_name == NULL)
7b83ea04 2681 {
917317f4 2682 *symp = fsym;
7b83ea04
AC
2683 return 0;
2684 }
917317f4 2685
6b1747cd 2686 func_oload_champ = find_oload_champ_namespace (args,
4c3376c8
SW
2687 func_name,
2688 qualified_name,
38139a96 2689 &functions,
4c3376c8
SW
2690 &func_badness,
2691 no_adl);
8d577d32 2692
4c3376c8 2693 if (func_oload_champ >= 0)
6b1747cd
PA
2694 func_match_quality = classify_oload_match (func_badness,
2695 args.size (), 0);
8d577d32
DC
2696 }
2697
7322dca9 2698 /* Did we find a match ? */
4c3376c8 2699 if (method_oload_champ == -1 && func_oload_champ == -1)
79afc5ef
SW
2700 throw_error (NOT_FOUND_ERROR,
2701 _("No symbol \"%s\" in current context."),
2702 name);
8d577d32 2703
4c3376c8
SW
2704 /* If we have found both a method match and a function
2705 match, find out which one is better, and calculate match
2706 quality. */
2707 if (method_oload_champ >= 0 && func_oload_champ >= 0)
2708 {
2709 switch (compare_badness (func_badness, method_badness))
2710 {
2711 case 0: /* Top two contenders are equally good. */
b021a221
MS
2712 /* FIXME: GDB does not support the general ambiguous case.
2713 All candidates should be collected and presented the
2714 user. */
4c3376c8
SW
2715 error (_("Ambiguous overload resolution"));
2716 break;
2717 case 1: /* Incomparable top contenders. */
2718 /* This is an error incompatible candidates
2719 should not have been proposed. */
3e43a32a
MS
2720 error (_("Internal error: incompatible "
2721 "overload candidates proposed"));
4c3376c8
SW
2722 break;
2723 case 2: /* Function champion. */
2724 method_oload_champ = -1;
2725 match_quality = func_match_quality;
2726 break;
2727 case 3: /* Method champion. */
2728 func_oload_champ = -1;
2729 match_quality = method_match_quality;
2730 break;
2731 default:
2732 error (_("Internal error: unexpected overload comparison result"));
2733 break;
2734 }
2735 }
2736 else
2737 {
2738 /* We have either a method match or a function match. */
2739 if (method_oload_champ >= 0)
2740 match_quality = method_match_quality;
2741 else
2742 match_quality = func_match_quality;
2743 }
8d577d32
DC
2744
2745 if (match_quality == INCOMPATIBLE)
2746 {
4c3376c8 2747 if (method == METHOD)
8a3fe4f8 2748 error (_("Cannot resolve method %s%s%s to any overloaded instance"),
8d577d32
DC
2749 obj_type_name,
2750 (obj_type_name && *obj_type_name) ? "::" : "",
2751 name);
2752 else
8a3fe4f8 2753 error (_("Cannot resolve function %s to any overloaded instance"),
8d577d32
DC
2754 func_name);
2755 }
2756 else if (match_quality == NON_STANDARD)
2757 {
4c3376c8 2758 if (method == METHOD)
3e43a32a
MS
2759 warning (_("Using non-standard conversion to match "
2760 "method %s%s%s to supplied arguments"),
8d577d32
DC
2761 obj_type_name,
2762 (obj_type_name && *obj_type_name) ? "::" : "",
2763 name);
2764 else
3e43a32a
MS
2765 warning (_("Using non-standard conversion to match "
2766 "function %s to supplied arguments"),
8d577d32
DC
2767 func_name);
2768 }
2769
4c3376c8 2770 if (staticp != NULL)
38139a96 2771 *staticp = oload_method_static_p (methods.data (), method_oload_champ);
4c3376c8
SW
2772
2773 if (method_oload_champ >= 0)
8d577d32 2774 {
233e8b28
SC
2775 if (src_method_oload_champ >= 0)
2776 {
38139a96 2777 if (TYPE_FN_FIELD_VIRTUAL_P (methods, method_oload_champ)
e66d4446
SC
2778 && noside != EVAL_AVOID_SIDE_EFFECTS)
2779 {
38139a96 2780 *valp = value_virtual_fn_field (&temp, methods.data (),
e66d4446
SC
2781 method_oload_champ, basetype,
2782 boffset);
2783 }
233e8b28 2784 else
38139a96 2785 *valp = value_fn_field (&temp, methods.data (),
85cca2bc 2786 method_oload_champ, basetype, boffset);
233e8b28 2787 }
8d577d32 2788 else
ba18742c 2789 *valp = value_from_xmethod
38139a96 2790 (std::move (xmethods[ext_method_oload_champ]));
8d577d32
DC
2791 }
2792 else
38139a96 2793 *symp = functions[func_oload_champ];
8d577d32
DC
2794
2795 if (objp)
2796 {
a4295225 2797 struct type *temp_type = check_typedef (value_type (temp));
da096638 2798 struct type *objtype = check_typedef (obj_type);
a109c7c1 2799
a4295225 2800 if (TYPE_CODE (temp_type) != TYPE_CODE_PTR
da096638 2801 && (TYPE_CODE (objtype) == TYPE_CODE_PTR
aa006118 2802 || TYPE_IS_REFERENCE (objtype)))
8d577d32
DC
2803 {
2804 temp = value_addr (temp);
2805 }
2806 *objp = temp;
2807 }
7322dca9 2808
8d577d32
DC
2809 switch (match_quality)
2810 {
2811 case INCOMPATIBLE:
2812 return 100;
2813 case NON_STANDARD:
2814 return 10;
2815 default: /* STANDARD */
2816 return 0;
2817 }
2818}
2819
2820/* Find the best overload match, searching for FUNC_NAME in namespaces
2821 contained in QUALIFIED_NAME until it either finds a good match or
2822 runs out of namespaces. It stores the overloaded functions in
82ceee50
PA
2823 *OLOAD_SYMS, and the badness vector in *OLOAD_CHAMP_BV. If NO_ADL,
2824 argument dependent lookup is not performned. */
8d577d32
DC
2825
2826static int
6b1747cd 2827find_oload_champ_namespace (gdb::array_view<value *> args,
8d577d32
DC
2828 const char *func_name,
2829 const char *qualified_name,
0891c3cc 2830 std::vector<symbol *> *oload_syms,
82ceee50 2831 badness_vector *oload_champ_bv,
7322dca9 2832 const int no_adl)
8d577d32
DC
2833{
2834 int oload_champ;
2835
6b1747cd 2836 find_oload_champ_namespace_loop (args,
8d577d32
DC
2837 func_name,
2838 qualified_name, 0,
2839 oload_syms, oload_champ_bv,
7322dca9
SW
2840 &oload_champ,
2841 no_adl);
8d577d32
DC
2842
2843 return oload_champ;
2844}
2845
2846/* Helper function for find_oload_champ_namespace; NAMESPACE_LEN is
2847 how deep we've looked for namespaces, and the champ is stored in
2848 OLOAD_CHAMP. The return value is 1 if the champ is a good one, 0
7322dca9 2849 if it isn't. Other arguments are the same as in
82ceee50 2850 find_oload_champ_namespace. */
8d577d32
DC
2851
2852static int
6b1747cd 2853find_oload_champ_namespace_loop (gdb::array_view<value *> args,
8d577d32
DC
2854 const char *func_name,
2855 const char *qualified_name,
2856 int namespace_len,
0891c3cc 2857 std::vector<symbol *> *oload_syms,
82ceee50 2858 badness_vector *oload_champ_bv,
7322dca9
SW
2859 int *oload_champ,
2860 const int no_adl)
8d577d32
DC
2861{
2862 int next_namespace_len = namespace_len;
2863 int searched_deeper = 0;
8d577d32 2864 int new_oload_champ;
8d577d32
DC
2865 char *new_namespace;
2866
2867 if (next_namespace_len != 0)
2868 {
2869 gdb_assert (qualified_name[next_namespace_len] == ':');
2870 next_namespace_len += 2;
c906108c 2871 }
ac3eeb49
MS
2872 next_namespace_len +=
2873 cp_find_first_component (qualified_name + next_namespace_len);
8d577d32 2874
581e13c1 2875 /* First, see if we have a deeper namespace we can search in.
ac3eeb49 2876 If we get a good match there, use it. */
8d577d32
DC
2877
2878 if (qualified_name[next_namespace_len] == ':')
2879 {
2880 searched_deeper = 1;
2881
6b1747cd 2882 if (find_oload_champ_namespace_loop (args,
8d577d32
DC
2883 func_name, qualified_name,
2884 next_namespace_len,
2885 oload_syms, oload_champ_bv,
7322dca9 2886 oload_champ, no_adl))
8d577d32
DC
2887 {
2888 return 1;
2889 }
2890 };
2891
2892 /* If we reach here, either we're in the deepest namespace or we
2893 didn't find a good match in a deeper namespace. But, in the
2894 latter case, we still have a bad match in a deeper namespace;
2895 note that we might not find any match at all in the current
2896 namespace. (There's always a match in the deepest namespace,
2897 because this overload mechanism only gets called if there's a
2898 function symbol to start off with.) */
2899
224c3ddb 2900 new_namespace = (char *) alloca (namespace_len + 1);
8d577d32
DC
2901 strncpy (new_namespace, qualified_name, namespace_len);
2902 new_namespace[namespace_len] = '\0';
0891c3cc
PA
2903
2904 std::vector<symbol *> new_oload_syms
2905 = make_symbol_overload_list (func_name, new_namespace);
7322dca9
SW
2906
2907 /* If we have reached the deepest level perform argument
2908 determined lookup. */
2909 if (!searched_deeper && !no_adl)
da096638
KS
2910 {
2911 int ix;
2912 struct type **arg_types;
2913
2914 /* Prepare list of argument types for overload resolution. */
2915 arg_types = (struct type **)
6b1747cd
PA
2916 alloca (args.size () * (sizeof (struct type *)));
2917 for (ix = 0; ix < args.size (); ix++)
da096638 2918 arg_types[ix] = value_type (args[ix]);
0891c3cc
PA
2919 add_symbol_overload_list_adl ({arg_types, args.size ()}, func_name,
2920 &new_oload_syms);
da096638 2921 }
7322dca9 2922
82ceee50 2923 badness_vector new_oload_champ_bv;
85cca2bc
PA
2924 new_oload_champ = find_oload_champ (args,
2925 new_oload_syms.size (),
0891c3cc 2926 NULL, NULL, new_oload_syms.data (),
8d577d32
DC
2927 &new_oload_champ_bv);
2928
2929 /* Case 1: We found a good match. Free earlier matches (if any),
2930 and return it. Case 2: We didn't find a good match, but we're
2931 not the deepest function. Then go with the bad match that the
2932 deeper function found. Case 3: We found a bad match, and we're
2933 the deepest function. Then return what we found, even though
2934 it's a bad match. */
2935
2936 if (new_oload_champ != -1
6b1747cd 2937 && classify_oload_match (new_oload_champ_bv, args.size (), 0) == STANDARD)
8d577d32 2938 {
0891c3cc 2939 *oload_syms = std::move (new_oload_syms);
8d577d32 2940 *oload_champ = new_oload_champ;
82ceee50 2941 *oload_champ_bv = std::move (new_oload_champ_bv);
8d577d32
DC
2942 return 1;
2943 }
2944 else if (searched_deeper)
2945 {
8d577d32
DC
2946 return 0;
2947 }
2948 else
2949 {
0891c3cc 2950 *oload_syms = std::move (new_oload_syms);
8d577d32 2951 *oload_champ = new_oload_champ;
82ceee50 2952 *oload_champ_bv = std::move (new_oload_champ_bv);
8d577d32
DC
2953 return 0;
2954 }
2955}
2956
6b1747cd 2957/* Look for a function to take ARGS. Find the best match from among
38139a96
PA
2958 the overloaded methods or functions given by METHODS or FUNCTIONS
2959 or XMETHODS, respectively. One, and only one of METHODS, FUNCTIONS
2960 and XMETHODS can be non-NULL.
233e8b28 2961
38139a96
PA
2962 NUM_FNS is the length of the array pointed at by METHODS, FUNCTIONS
2963 or XMETHODS, whichever is non-NULL.
233e8b28 2964
8d577d32 2965 Return the index of the best match; store an indication of the
82ceee50 2966 quality of the match in OLOAD_CHAMP_BV. */
8d577d32
DC
2967
2968static int
6b1747cd 2969find_oload_champ (gdb::array_view<value *> args,
85cca2bc 2970 size_t num_fns,
38139a96
PA
2971 fn_field *methods,
2972 xmethod_worker_up *xmethods,
2973 symbol **functions,
82ceee50 2974 badness_vector *oload_champ_bv)
8d577d32 2975{
ac3eeb49 2976 /* A measure of how good an overloaded instance is. */
82ceee50 2977 badness_vector bv;
ac3eeb49
MS
2978 /* Index of best overloaded function. */
2979 int oload_champ = -1;
2980 /* Current ambiguity state for overload resolution. */
2981 int oload_ambiguous = 0;
2982 /* 0 => no ambiguity, 1 => two good funcs, 2 => incomparable funcs. */
8d577d32 2983
9cf95373 2984 /* A champion can be found among methods alone, or among functions
233e8b28
SC
2985 alone, or in xmethods alone, but not in more than one of these
2986 groups. */
38139a96 2987 gdb_assert ((methods != NULL) + (functions != NULL) + (xmethods != NULL)
233e8b28 2988 == 1);
9cf95373 2989
ac3eeb49 2990 /* Consider each candidate in turn. */
85cca2bc 2991 for (size_t ix = 0; ix < num_fns; ix++)
c906108c 2992 {
8d577d32 2993 int jj;
233e8b28 2994 int static_offset = 0;
6b1747cd 2995 std::vector<type *> parm_types;
8d577d32 2996
38139a96
PA
2997 if (xmethods != NULL)
2998 parm_types = xmethods[ix]->get_arg_types ();
db577aea
AC
2999 else
3000 {
6b1747cd
PA
3001 size_t nparms;
3002
38139a96 3003 if (methods != NULL)
233e8b28 3004 {
38139a96
PA
3005 nparms = TYPE_NFIELDS (TYPE_FN_FIELD_TYPE (methods, ix));
3006 static_offset = oload_method_static_p (methods, ix);
233e8b28
SC
3007 }
3008 else
38139a96 3009 nparms = TYPE_NFIELDS (SYMBOL_TYPE (functions[ix]));
233e8b28 3010
6b1747cd 3011 parm_types.reserve (nparms);
233e8b28 3012 for (jj = 0; jj < nparms; jj++)
6b1747cd 3013 {
38139a96
PA
3014 type *t = (methods != NULL
3015 ? (TYPE_FN_FIELD_ARGS (methods, ix)[jj].type)
3016 : TYPE_FIELD_TYPE (SYMBOL_TYPE (functions[ix]),
6b1747cd
PA
3017 jj));
3018 parm_types.push_back (t);
3019 }
db577aea 3020 }
c906108c 3021
ac3eeb49
MS
3022 /* Compare parameter types to supplied argument types. Skip
3023 THIS for static methods. */
6b1747cd
PA
3024 bv = rank_function (parm_types,
3025 args.slice (static_offset));
c5aa993b 3026
82ceee50 3027 if (oload_champ_bv->empty ())
c5aa993b 3028 {
82ceee50 3029 *oload_champ_bv = std::move (bv);
c5aa993b 3030 oload_champ = 0;
c5aa993b 3031 }
ac3eeb49
MS
3032 else /* See whether current candidate is better or worse than
3033 previous best. */
8d577d32 3034 switch (compare_badness (bv, *oload_champ_bv))
c5aa993b 3035 {
ac3eeb49
MS
3036 case 0: /* Top two contenders are equally good. */
3037 oload_ambiguous = 1;
c5aa993b 3038 break;
ac3eeb49
MS
3039 case 1: /* Incomparable top contenders. */
3040 oload_ambiguous = 2;
c5aa993b 3041 break;
ac3eeb49 3042 case 2: /* New champion, record details. */
82ceee50 3043 *oload_champ_bv = std::move (bv);
c5aa993b
JM
3044 oload_ambiguous = 0;
3045 oload_champ = ix;
c5aa993b
JM
3046 break;
3047 case 3:
3048 default:
3049 break;
3050 }
6b1ba9a0
ND
3051 if (overload_debug)
3052 {
38139a96 3053 if (methods != NULL)
ac3eeb49 3054 fprintf_filtered (gdb_stderr,
3e43a32a 3055 "Overloaded method instance %s, # of parms %d\n",
38139a96
PA
3056 methods[ix].physname, (int) parm_types.size ());
3057 else if (xmethods != NULL)
233e8b28
SC
3058 fprintf_filtered (gdb_stderr,
3059 "Xmethod worker, # of parms %d\n",
6b1747cd 3060 (int) parm_types.size ());
6b1ba9a0 3061 else
ac3eeb49 3062 fprintf_filtered (gdb_stderr,
3e43a32a
MS
3063 "Overloaded function instance "
3064 "%s # of parms %d\n",
38139a96 3065 SYMBOL_DEMANGLED_NAME (functions[ix]),
6b1747cd
PA
3066 (int) parm_types.size ());
3067 for (jj = 0; jj < args.size () - static_offset; jj++)
ac3eeb49
MS
3068 fprintf_filtered (gdb_stderr,
3069 "...Badness @ %d : %d\n",
82ceee50 3070 jj, bv[jj].rank);
3e43a32a
MS
3071 fprintf_filtered (gdb_stderr, "Overload resolution "
3072 "champion is %d, ambiguous? %d\n",
ac3eeb49 3073 oload_champ, oload_ambiguous);
6b1ba9a0 3074 }
c906108c
SS
3075 }
3076
8d577d32
DC
3077 return oload_champ;
3078}
6b1ba9a0 3079
8d577d32
DC
3080/* Return 1 if we're looking at a static method, 0 if we're looking at
3081 a non-static method or a function that isn't a method. */
c906108c 3082
8d577d32 3083static int
2bca57ba 3084oload_method_static_p (struct fn_field *fns_ptr, int index)
8d577d32 3085{
2bca57ba 3086 if (fns_ptr && index >= 0 && TYPE_FN_FIELD_STATIC_P (fns_ptr, index))
8d577d32 3087 return 1;
c906108c 3088 else
8d577d32
DC
3089 return 0;
3090}
c906108c 3091
8d577d32
DC
3092/* Check how good an overload match OLOAD_CHAMP_BV represents. */
3093
3094static enum oload_classification
82ceee50 3095classify_oload_match (const badness_vector &oload_champ_bv,
8d577d32
DC
3096 int nargs,
3097 int static_offset)
3098{
3099 int ix;
da096638 3100 enum oload_classification worst = STANDARD;
8d577d32
DC
3101
3102 for (ix = 1; ix <= nargs - static_offset; ix++)
7f8c9282 3103 {
6403aeea
SW
3104 /* If this conversion is as bad as INCOMPATIBLE_TYPE_BADNESS
3105 or worse return INCOMPATIBLE. */
82ceee50 3106 if (compare_ranks (oload_champ_bv[ix],
6403aeea 3107 INCOMPATIBLE_TYPE_BADNESS) <= 0)
ac3eeb49 3108 return INCOMPATIBLE; /* Truly mismatched types. */
6403aeea
SW
3109 /* Otherwise If this conversion is as bad as
3110 NS_POINTER_CONVERSION_BADNESS or worse return NON_STANDARD. */
82ceee50 3111 else if (compare_ranks (oload_champ_bv[ix],
6403aeea 3112 NS_POINTER_CONVERSION_BADNESS) <= 0)
da096638 3113 worst = NON_STANDARD; /* Non-standard type conversions
ac3eeb49 3114 needed. */
7f8c9282 3115 }
02f0d45d 3116
da096638
KS
3117 /* If no INCOMPATIBLE classification was found, return the worst one
3118 that was found (if any). */
3119 return worst;
c906108c
SS
3120}
3121
ac3eeb49
MS
3122/* C++: return 1 is NAME is a legitimate name for the destructor of
3123 type TYPE. If TYPE does not have a destructor, or if NAME is
d8228535
JK
3124 inappropriate for TYPE, an error is signaled. Parameter TYPE should not yet
3125 have CHECK_TYPEDEF applied, this function will apply it itself. */
3126
c906108c 3127int
d8228535 3128destructor_name_p (const char *name, struct type *type)
c906108c 3129{
c906108c
SS
3130 if (name[0] == '~')
3131 {
a737d952 3132 const char *dname = type_name_or_error (type);
d8228535 3133 const char *cp = strchr (dname, '<');
c906108c
SS
3134 unsigned int len;
3135
3136 /* Do not compare the template part for template classes. */
3137 if (cp == NULL)
3138 len = strlen (dname);
3139 else
3140 len = cp - dname;
bf896cb0 3141 if (strlen (name + 1) != len || strncmp (dname, name + 1, len) != 0)
8a3fe4f8 3142 error (_("name of destructor must equal name of class"));
c906108c
SS
3143 else
3144 return 1;
3145 }
3146 return 0;
3147}
3148
3d567982
TT
3149/* Find an enum constant named NAME in TYPE. TYPE must be an "enum
3150 class". If the name is found, return a value representing it;
3151 otherwise throw an exception. */
3152
3153static struct value *
3154enum_constant_from_type (struct type *type, const char *name)
3155{
3156 int i;
3157 int name_len = strlen (name);
3158
3159 gdb_assert (TYPE_CODE (type) == TYPE_CODE_ENUM
3160 && TYPE_DECLARED_CLASS (type));
3161
3162 for (i = TYPE_N_BASECLASSES (type); i < TYPE_NFIELDS (type); ++i)
3163 {
3164 const char *fname = TYPE_FIELD_NAME (type, i);
3165 int len;
3166
3167 if (TYPE_FIELD_LOC_KIND (type, i) != FIELD_LOC_KIND_ENUMVAL
3168 || fname == NULL)
3169 continue;
3170
3171 /* Look for the trailing "::NAME", since enum class constant
3172 names are qualified here. */
3173 len = strlen (fname);
3174 if (len + 2 >= name_len
3175 && fname[len - name_len - 2] == ':'
3176 && fname[len - name_len - 1] == ':'
3177 && strcmp (&fname[len - name_len], name) == 0)
3178 return value_from_longest (type, TYPE_FIELD_ENUMVAL (type, i));
3179 }
3180
3181 error (_("no constant named \"%s\" in enum \"%s\""),
e86ca25f 3182 name, TYPE_NAME (type));
3d567982
TT
3183}
3184
79c2c32d 3185/* C++: Given an aggregate type CURTYPE, and a member name NAME,
0d5de010
DJ
3186 return the appropriate member (or the address of the member, if
3187 WANT_ADDRESS). This function is used to resolve user expressions
3188 of the form "DOMAIN::NAME". For more details on what happens, see
3189 the comment before value_struct_elt_for_reference. */
79c2c32d
DC
3190
3191struct value *
c848d642 3192value_aggregate_elt (struct type *curtype, const char *name,
072bba3b 3193 struct type *expect_type, int want_address,
79c2c32d
DC
3194 enum noside noside)
3195{
3196 switch (TYPE_CODE (curtype))
3197 {
3198 case TYPE_CODE_STRUCT:
3199 case TYPE_CODE_UNION:
ac3eeb49 3200 return value_struct_elt_for_reference (curtype, 0, curtype,
072bba3b 3201 name, expect_type,
0d5de010 3202 want_address, noside);
79c2c32d 3203 case TYPE_CODE_NAMESPACE:
ac3eeb49
MS
3204 return value_namespace_elt (curtype, name,
3205 want_address, noside);
3d567982
TT
3206
3207 case TYPE_CODE_ENUM:
3208 return enum_constant_from_type (curtype, name);
3209
79c2c32d
DC
3210 default:
3211 internal_error (__FILE__, __LINE__,
e2e0b3e5 3212 _("non-aggregate type in value_aggregate_elt"));
79c2c32d
DC
3213 }
3214}
3215
072bba3b 3216/* Compares the two method/function types T1 and T2 for "equality"
b021a221 3217 with respect to the methods' parameters. If the types of the
072bba3b
KS
3218 two parameter lists are the same, returns 1; 0 otherwise. This
3219 comparison may ignore any artificial parameters in T1 if
3220 SKIP_ARTIFICIAL is non-zero. This function will ALWAYS skip
3221 the first artificial parameter in T1, assumed to be a 'this' pointer.
3222
3223 The type T2 is expected to have come from make_params (in eval.c). */
3224
3225static int
3226compare_parameters (struct type *t1, struct type *t2, int skip_artificial)
3227{
3228 int start = 0;
3229
80b23b6a 3230 if (TYPE_NFIELDS (t1) > 0 && TYPE_FIELD_ARTIFICIAL (t1, 0))
072bba3b
KS
3231 ++start;
3232
3233 /* If skipping artificial fields, find the first real field
581e13c1 3234 in T1. */
072bba3b
KS
3235 if (skip_artificial)
3236 {
3237 while (start < TYPE_NFIELDS (t1)
3238 && TYPE_FIELD_ARTIFICIAL (t1, start))
3239 ++start;
3240 }
3241
581e13c1 3242 /* Now compare parameters. */
072bba3b
KS
3243
3244 /* Special case: a method taking void. T1 will contain no
3245 non-artificial fields, and T2 will contain TYPE_CODE_VOID. */
3246 if ((TYPE_NFIELDS (t1) - start) == 0 && TYPE_NFIELDS (t2) == 1
3247 && TYPE_CODE (TYPE_FIELD_TYPE (t2, 0)) == TYPE_CODE_VOID)
3248 return 1;
3249
3250 if ((TYPE_NFIELDS (t1) - start) == TYPE_NFIELDS (t2))
3251 {
3252 int i;
a109c7c1 3253
072bba3b
KS
3254 for (i = 0; i < TYPE_NFIELDS (t2); ++i)
3255 {
6403aeea 3256 if (compare_ranks (rank_one_type (TYPE_FIELD_TYPE (t1, start + i),
da096638 3257 TYPE_FIELD_TYPE (t2, i), NULL),
6403aeea 3258 EXACT_MATCH_BADNESS) != 0)
072bba3b
KS
3259 return 0;
3260 }
3261
3262 return 1;
3263 }
3264
3265 return 0;
3266}
3267
9f6b697b
WP
3268/* C++: Given an aggregate type VT, and a class type CLS, search
3269 recursively for CLS using value V; If found, store the offset
3270 which is either fetched from the virtual base pointer if CLS
3271 is virtual or accumulated offset of its parent classes if
3272 CLS is non-virtual in *BOFFS, set ISVIRT to indicate if CLS
3273 is virtual, and return true. If not found, return false. */
3274
3275static bool
3276get_baseclass_offset (struct type *vt, struct type *cls,
3277 struct value *v, int *boffs, bool *isvirt)
3278{
3279 for (int i = 0; i < TYPE_N_BASECLASSES (vt); i++)
3280 {
3281 struct type *t = TYPE_FIELD_TYPE (vt, i);
3282 if (types_equal (t, cls))
3283 {
3284 if (BASETYPE_VIA_VIRTUAL (vt, i))
3285 {
3286 const gdb_byte *adr = value_contents_for_printing (v);
3287 *boffs = baseclass_offset (vt, i, adr, value_offset (v),
3288 value_as_long (v), v);
3289 *isvirt = true;
3290 }
3291 else
3292 *isvirt = false;
3293 return true;
3294 }
3295
3296 if (get_baseclass_offset (check_typedef (t), cls, v, boffs, isvirt))
3297 {
3298 if (*isvirt == false) /* Add non-virtual base offset. */
3299 {
3300 const gdb_byte *adr = value_contents_for_printing (v);
3301 *boffs += baseclass_offset (vt, i, adr, value_offset (v),
3302 value_as_long (v), v);
3303 }
3304 return true;
3305 }
3306 }
3307
3308 return false;
3309}
3310
c906108c 3311/* C++: Given an aggregate type CURTYPE, and a member name NAME,
ac3eeb49
MS
3312 return the address of this member as a "pointer to member" type.
3313 If INTYPE is non-null, then it will be the type of the member we
3314 are looking for. This will help us resolve "pointers to member
3315 functions". This function is used to resolve user expressions of
3316 the form "DOMAIN::NAME". */
c906108c 3317
63d06c5c 3318static struct value *
fba45db2 3319value_struct_elt_for_reference (struct type *domain, int offset,
c848d642 3320 struct type *curtype, const char *name,
ac3eeb49
MS
3321 struct type *intype,
3322 int want_address,
63d06c5c 3323 enum noside noside)
c906108c 3324{
bf2977b5 3325 struct type *t = check_typedef (curtype);
52f0bd74 3326 int i;
b926417a 3327 struct value *result;
c906108c 3328
c5aa993b 3329 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
c906108c 3330 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
3331 error (_("Internal error: non-aggregate type "
3332 "to value_struct_elt_for_reference"));
c906108c
SS
3333
3334 for (i = TYPE_NFIELDS (t) - 1; i >= TYPE_N_BASECLASSES (t); i--)
3335 {
0d5cff50 3336 const char *t_field_name = TYPE_FIELD_NAME (t, i);
c5aa993b 3337
6314a349 3338 if (t_field_name && strcmp (t_field_name, name) == 0)
c906108c 3339 {
d6a843b5 3340 if (field_is_static (&TYPE_FIELD (t, i)))
c906108c 3341 {
b926417a 3342 struct value *v = value_static_field (t, i);
0d5de010
DJ
3343 if (want_address)
3344 v = value_addr (v);
c906108c
SS
3345 return v;
3346 }
3347 if (TYPE_FIELD_PACKED (t, i))
8a3fe4f8 3348 error (_("pointers to bitfield members not allowed"));
c5aa993b 3349
0d5de010
DJ
3350 if (want_address)
3351 return value_from_longest
3352 (lookup_memberptr_type (TYPE_FIELD_TYPE (t, i), domain),
3353 offset + (LONGEST) (TYPE_FIELD_BITPOS (t, i) >> 3));
f7e3ecae 3354 else if (noside != EVAL_NORMAL)
0d5de010
DJ
3355 return allocate_value (TYPE_FIELD_TYPE (t, i));
3356 else
f7e3ecae
KS
3357 {
3358 /* Try to evaluate NAME as a qualified name with implicit
3359 this pointer. In this case, attempt to return the
3360 equivalent to `this->*(&TYPE::NAME)'. */
b926417a 3361 struct value *v = value_of_this_silent (current_language);
f7e3ecae
KS
3362 if (v != NULL)
3363 {
9f6b697b 3364 struct value *ptr, *this_v = v;
f7e3ecae
KS
3365 long mem_offset;
3366 struct type *type, *tmp;
3367
3368 ptr = value_aggregate_elt (domain, name, NULL, 1, noside);
3369 type = check_typedef (value_type (ptr));
3370 gdb_assert (type != NULL
3371 && TYPE_CODE (type) == TYPE_CODE_MEMBERPTR);
4bfb94b8 3372 tmp = lookup_pointer_type (TYPE_SELF_TYPE (type));
f7e3ecae
KS
3373 v = value_cast_pointers (tmp, v, 1);
3374 mem_offset = value_as_long (ptr);
9f6b697b
WP
3375 if (domain != curtype)
3376 {
3377 /* Find class offset of type CURTYPE from either its
3378 parent type DOMAIN or the type of implied this. */
3379 int boff = 0;
3380 bool isvirt = false;
3381 if (get_baseclass_offset (domain, curtype, v, &boff,
3382 &isvirt))
3383 mem_offset += boff;
3384 else
3385 {
a51bb70c
WP
3386 struct type *p = check_typedef (value_type (this_v));
3387 p = check_typedef (TYPE_TARGET_TYPE (p));
3388 if (get_baseclass_offset (p, curtype, this_v,
9f6b697b
WP
3389 &boff, &isvirt))
3390 mem_offset += boff;
3391 }
3392 }
f7e3ecae
KS
3393 tmp = lookup_pointer_type (TYPE_TARGET_TYPE (type));
3394 result = value_from_pointer (tmp,
3395 value_as_long (v) + mem_offset);
3396 return value_ind (result);
3397 }
3398
3399 error (_("Cannot reference non-static field \"%s\""), name);
3400 }
c906108c
SS
3401 }
3402 }
3403
ac3eeb49
MS
3404 /* C++: If it was not found as a data field, then try to return it
3405 as a pointer to a method. */
c906108c 3406
c906108c
SS
3407 /* Perform all necessary dereferencing. */
3408 while (intype && TYPE_CODE (intype) == TYPE_CODE_PTR)
3409 intype = TYPE_TARGET_TYPE (intype);
3410
3411 for (i = TYPE_NFN_FIELDS (t) - 1; i >= 0; --i)
3412 {
0d5cff50 3413 const char *t_field_name = TYPE_FN_FIELDLIST_NAME (t, i);
c906108c 3414
6314a349 3415 if (t_field_name && strcmp (t_field_name, name) == 0)
c906108c 3416 {
072bba3b
KS
3417 int j;
3418 int len = TYPE_FN_FIELDLIST_LENGTH (t, i);
c906108c 3419 struct fn_field *f = TYPE_FN_FIELDLIST1 (t, i);
c5aa993b 3420
de17c821
DJ
3421 check_stub_method_group (t, i);
3422
c906108c
SS
3423 if (intype)
3424 {
072bba3b
KS
3425 for (j = 0; j < len; ++j)
3426 {
3693fdb3
PA
3427 if (TYPE_CONST (intype) != TYPE_FN_FIELD_CONST (f, j))
3428 continue;
3429 if (TYPE_VOLATILE (intype) != TYPE_FN_FIELD_VOLATILE (f, j))
3430 continue;
3431
072bba3b 3432 if (compare_parameters (TYPE_FN_FIELD_TYPE (f, j), intype, 0)
3e43a32a
MS
3433 || compare_parameters (TYPE_FN_FIELD_TYPE (f, j),
3434 intype, 1))
072bba3b
KS
3435 break;
3436 }
3437
3438 if (j == len)
3e43a32a
MS
3439 error (_("no member function matches "
3440 "that type instantiation"));
7f79b1c5 3441 }
c906108c 3442 else
072bba3b
KS
3443 {
3444 int ii;
7f79b1c5
DJ
3445
3446 j = -1;
53832f31 3447 for (ii = 0; ii < len; ++ii)
072bba3b 3448 {
7f79b1c5
DJ
3449 /* Skip artificial methods. This is necessary if,
3450 for example, the user wants to "print
3451 subclass::subclass" with only one user-defined
53832f31
TT
3452 constructor. There is no ambiguity in this case.
3453 We are careful here to allow artificial methods
3454 if they are the unique result. */
072bba3b 3455 if (TYPE_FN_FIELD_ARTIFICIAL (f, ii))
53832f31
TT
3456 {
3457 if (j == -1)
3458 j = ii;
3459 continue;
3460 }
072bba3b 3461
7f79b1c5
DJ
3462 /* Desired method is ambiguous if more than one
3463 method is defined. */
53832f31 3464 if (j != -1 && !TYPE_FN_FIELD_ARTIFICIAL (f, j))
3e43a32a
MS
3465 error (_("non-unique member `%s' requires "
3466 "type instantiation"), name);
072bba3b 3467
7f79b1c5
DJ
3468 j = ii;
3469 }
53832f31
TT
3470
3471 if (j == -1)
3472 error (_("no matching member function"));
072bba3b 3473 }
c5aa993b 3474
0d5de010
DJ
3475 if (TYPE_FN_FIELD_STATIC_P (f, j))
3476 {
ac3eeb49
MS
3477 struct symbol *s =
3478 lookup_symbol (TYPE_FN_FIELD_PHYSNAME (f, j),
d12307c1 3479 0, VAR_DOMAIN, 0).symbol;
a109c7c1 3480
0d5de010
DJ
3481 if (s == NULL)
3482 return NULL;
3483
3484 if (want_address)
63e43d3a 3485 return value_addr (read_var_value (s, 0, 0));
0d5de010 3486 else
63e43d3a 3487 return read_var_value (s, 0, 0);
0d5de010
DJ
3488 }
3489
c906108c
SS
3490 if (TYPE_FN_FIELD_VIRTUAL_P (f, j))
3491 {
0d5de010
DJ
3492 if (want_address)
3493 {
3494 result = allocate_value
3495 (lookup_methodptr_type (TYPE_FN_FIELD_TYPE (f, j)));
ad4820ab
UW
3496 cplus_make_method_ptr (value_type (result),
3497 value_contents_writeable (result),
0d5de010
DJ
3498 TYPE_FN_FIELD_VOFFSET (f, j), 1);
3499 }
3500 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
3501 return allocate_value (TYPE_FN_FIELD_TYPE (f, j));
3502 else
3503 error (_("Cannot reference virtual member function \"%s\""),
3504 name);
c906108c
SS
3505 }
3506 else
3507 {
ac3eeb49
MS
3508 struct symbol *s =
3509 lookup_symbol (TYPE_FN_FIELD_PHYSNAME (f, j),
d12307c1 3510 0, VAR_DOMAIN, 0).symbol;
a109c7c1 3511
c906108c 3512 if (s == NULL)
0d5de010
DJ
3513 return NULL;
3514
b926417a 3515 struct value *v = read_var_value (s, 0, 0);
0d5de010
DJ
3516 if (!want_address)
3517 result = v;
c906108c
SS
3518 else
3519 {
0d5de010 3520 result = allocate_value (lookup_methodptr_type (TYPE_FN_FIELD_TYPE (f, j)));
ad4820ab
UW
3521 cplus_make_method_ptr (value_type (result),
3522 value_contents_writeable (result),
42ae5230 3523 value_address (v), 0);
c906108c 3524 }
c906108c 3525 }
0d5de010 3526 return result;
c906108c
SS
3527 }
3528 }
3529 for (i = TYPE_N_BASECLASSES (t) - 1; i >= 0; i--)
3530 {
f23631e4 3531 struct value *v;
c906108c
SS
3532 int base_offset;
3533
3534 if (BASETYPE_VIA_VIRTUAL (t, i))
3535 base_offset = 0;
3536 else
3537 base_offset = TYPE_BASECLASS_BITPOS (t, i) / 8;
3538 v = value_struct_elt_for_reference (domain,
3539 offset + base_offset,
3540 TYPE_BASECLASS (t, i),
ac3eeb49
MS
3541 name, intype,
3542 want_address, noside);
c906108c
SS
3543 if (v)
3544 return v;
3545 }
63d06c5c
DC
3546
3547 /* As a last chance, pretend that CURTYPE is a namespace, and look
3548 it up that way; this (frequently) works for types nested inside
3549 classes. */
3550
ac3eeb49
MS
3551 return value_maybe_namespace_elt (curtype, name,
3552 want_address, noside);
c906108c
SS
3553}
3554
79c2c32d
DC
3555/* C++: Return the member NAME of the namespace given by the type
3556 CURTYPE. */
3557
3558static struct value *
3559value_namespace_elt (const struct type *curtype,
c848d642 3560 const char *name, int want_address,
79c2c32d 3561 enum noside noside)
63d06c5c
DC
3562{
3563 struct value *retval = value_maybe_namespace_elt (curtype, name,
ac3eeb49
MS
3564 want_address,
3565 noside);
63d06c5c
DC
3566
3567 if (retval == NULL)
ac3eeb49 3568 error (_("No symbol \"%s\" in namespace \"%s\"."),
e86ca25f 3569 name, TYPE_NAME (curtype));
63d06c5c
DC
3570
3571 return retval;
3572}
3573
3574/* A helper function used by value_namespace_elt and
3575 value_struct_elt_for_reference. It looks up NAME inside the
3576 context CURTYPE; this works if CURTYPE is a namespace or if CURTYPE
3577 is a class and NAME refers to a type in CURTYPE itself (as opposed
3578 to, say, some base class of CURTYPE). */
3579
3580static struct value *
3581value_maybe_namespace_elt (const struct type *curtype,
c848d642 3582 const char *name, int want_address,
63d06c5c 3583 enum noside noside)
79c2c32d 3584{
e86ca25f 3585 const char *namespace_name = TYPE_NAME (curtype);
d12307c1 3586 struct block_symbol sym;
0d5de010 3587 struct value *result;
79c2c32d 3588
13387711 3589 sym = cp_lookup_symbol_namespace (namespace_name, name,
41f62f39
JK
3590 get_selected_block (0), VAR_DOMAIN);
3591
d12307c1 3592 if (sym.symbol == NULL)
63d06c5c 3593 return NULL;
79c2c32d 3594 else if ((noside == EVAL_AVOID_SIDE_EFFECTS)
d12307c1
PMR
3595 && (SYMBOL_CLASS (sym.symbol) == LOC_TYPEDEF))
3596 result = allocate_value (SYMBOL_TYPE (sym.symbol));
79c2c32d 3597 else
d12307c1 3598 result = value_of_variable (sym.symbol, sym.block);
0d5de010 3599
ae6a105d 3600 if (want_address)
0d5de010
DJ
3601 result = value_addr (result);
3602
3603 return result;
79c2c32d
DC
3604}
3605
dfcee124 3606/* Given a pointer or a reference value V, find its real (RTTI) type.
ac3eeb49 3607
c906108c 3608 Other parameters FULL, TOP, USING_ENC as with value_rtti_type()
ac3eeb49 3609 and refer to the values computed for the object pointed to. */
c906108c
SS
3610
3611struct type *
dfcee124 3612value_rtti_indirect_type (struct value *v, int *full,
6b850546 3613 LONGEST *top, int *using_enc)
c906108c 3614{
f7e5394d 3615 struct value *target = NULL;
dfcee124
AG
3616 struct type *type, *real_type, *target_type;
3617
3618 type = value_type (v);
3619 type = check_typedef (type);
aa006118 3620 if (TYPE_IS_REFERENCE (type))
dfcee124
AG
3621 target = coerce_ref (v);
3622 else if (TYPE_CODE (type) == TYPE_CODE_PTR)
f7e5394d 3623 {
f7e5394d 3624
a70b8144 3625 try
f7e5394d
SM
3626 {
3627 target = value_ind (v);
3628 }
230d2906 3629 catch (const gdb_exception_error &except)
f7e5394d
SM
3630 {
3631 if (except.error == MEMORY_ERROR)
3632 {
3633 /* value_ind threw a memory error. The pointer is NULL or
3634 contains an uninitialized value: we can't determine any
3635 type. */
3636 return NULL;
3637 }
eedc3f4f 3638 throw;
f7e5394d
SM
3639 }
3640 }
dfcee124
AG
3641 else
3642 return NULL;
c906108c 3643
dfcee124
AG
3644 real_type = value_rtti_type (target, full, top, using_enc);
3645
3646 if (real_type)
3647 {
3648 /* Copy qualifiers to the referenced object. */
3649 target_type = value_type (target);
3650 real_type = make_cv_type (TYPE_CONST (target_type),
3651 TYPE_VOLATILE (target_type), real_type, NULL);
aa006118
AV
3652 if (TYPE_IS_REFERENCE (type))
3653 real_type = lookup_reference_type (real_type, TYPE_CODE (type));
dfcee124
AG
3654 else if (TYPE_CODE (type) == TYPE_CODE_PTR)
3655 real_type = lookup_pointer_type (real_type);
3656 else
3657 internal_error (__FILE__, __LINE__, _("Unexpected value type."));
3658
3659 /* Copy qualifiers to the pointer/reference. */
3660 real_type = make_cv_type (TYPE_CONST (type), TYPE_VOLATILE (type),
3661 real_type, NULL);
3662 }
c906108c 3663
dfcee124 3664 return real_type;
c906108c
SS
3665}
3666
3667/* Given a value pointed to by ARGP, check its real run-time type, and
3668 if that is different from the enclosing type, create a new value
3669 using the real run-time type as the enclosing type (and of the same
3670 type as ARGP) and return it, with the embedded offset adjusted to
ac3eeb49
MS
3671 be the correct offset to the enclosed object. RTYPE is the type,
3672 and XFULL, XTOP, and XUSING_ENC are the other parameters, computed
3673 by value_rtti_type(). If these are available, they can be supplied
3674 and a second call to value_rtti_type() is avoided. (Pass RTYPE ==
3675 NULL if they're not available. */
c906108c 3676
f23631e4 3677struct value *
ac3eeb49
MS
3678value_full_object (struct value *argp,
3679 struct type *rtype,
3680 int xfull, int xtop,
fba45db2 3681 int xusing_enc)
c906108c 3682{
c5aa993b 3683 struct type *real_type;
c906108c 3684 int full = 0;
6b850546 3685 LONGEST top = -1;
c906108c 3686 int using_enc = 0;
f23631e4 3687 struct value *new_val;
c906108c
SS
3688
3689 if (rtype)
3690 {
3691 real_type = rtype;
3692 full = xfull;
3693 top = xtop;
3694 using_enc = xusing_enc;
3695 }
3696 else
3697 real_type = value_rtti_type (argp, &full, &top, &using_enc);
3698
ac3eeb49 3699 /* If no RTTI data, or if object is already complete, do nothing. */
4754a64e 3700 if (!real_type || real_type == value_enclosing_type (argp))
c906108c
SS
3701 return argp;
3702
a7860e76
TT
3703 /* In a destructor we might see a real type that is a superclass of
3704 the object's type. In this case it is better to leave the object
3705 as-is. */
3706 if (full
3707 && TYPE_LENGTH (real_type) < TYPE_LENGTH (value_enclosing_type (argp)))
3708 return argp;
3709
c906108c 3710 /* If we have the full object, but for some reason the enclosing
ac3eeb49
MS
3711 type is wrong, set it. */
3712 /* pai: FIXME -- sounds iffy */
c906108c
SS
3713 if (full)
3714 {
4dfea560
DE
3715 argp = value_copy (argp);
3716 set_value_enclosing_type (argp, real_type);
c906108c
SS
3717 return argp;
3718 }
3719
581e13c1 3720 /* Check if object is in memory. */
c906108c
SS
3721 if (VALUE_LVAL (argp) != lval_memory)
3722 {
3e43a32a
MS
3723 warning (_("Couldn't retrieve complete object of RTTI "
3724 "type %s; object may be in register(s)."),
ac3eeb49 3725 TYPE_NAME (real_type));
c5aa993b 3726
c906108c
SS
3727 return argp;
3728 }
c5aa993b 3729
ac3eeb49
MS
3730 /* All other cases -- retrieve the complete object. */
3731 /* Go back by the computed top_offset from the beginning of the
3732 object, adjusting for the embedded offset of argp if that's what
3733 value_rtti_type used for its computation. */
42ae5230 3734 new_val = value_at_lazy (real_type, value_address (argp) - top +
13c3b5f5 3735 (using_enc ? 0 : value_embedded_offset (argp)));
04624583 3736 deprecated_set_value_type (new_val, value_type (argp));
13c3b5f5
AC
3737 set_value_embedded_offset (new_val, (using_enc
3738 ? top + value_embedded_offset (argp)
3739 : top));
c906108c
SS
3740 return new_val;
3741}
3742
389e51db 3743
85bc8cb7
JK
3744/* Return the value of the local variable, if one exists. Throw error
3745 otherwise, such as if the request is made in an inappropriate context. */
c906108c 3746
f23631e4 3747struct value *
85bc8cb7 3748value_of_this (const struct language_defn *lang)
c906108c 3749{
63e43d3a 3750 struct block_symbol sym;
3977b71f 3751 const struct block *b;
206415a3 3752 struct frame_info *frame;
c906108c 3753
66a17cb6 3754 if (!lang->la_name_of_this)
85bc8cb7 3755 error (_("no `this' in current language"));
aee28ec6 3756
85bc8cb7 3757 frame = get_selected_frame (_("no frame selected"));
c906108c 3758
66a17cb6 3759 b = get_frame_block (frame, NULL);
c906108c 3760
63e43d3a
PMR
3761 sym = lookup_language_this (lang, b);
3762 if (sym.symbol == NULL)
85bc8cb7
JK
3763 error (_("current stack frame does not contain a variable named `%s'"),
3764 lang->la_name_of_this);
3765
63e43d3a 3766 return read_var_value (sym.symbol, sym.block, frame);
85bc8cb7
JK
3767}
3768
3769/* Return the value of the local variable, if one exists. Return NULL
3770 otherwise. Never throw error. */
3771
3772struct value *
3773value_of_this_silent (const struct language_defn *lang)
3774{
3775 struct value *ret = NULL;
85bc8cb7 3776
a70b8144 3777 try
c906108c 3778 {
85bc8cb7 3779 ret = value_of_this (lang);
c906108c 3780 }
230d2906 3781 catch (const gdb_exception_error &except)
492d29ea
PA
3782 {
3783 }
c906108c 3784
d069f99d
AF
3785 return ret;
3786}
3787
ac3eeb49
MS
3788/* Create a slice (sub-string, sub-array) of ARRAY, that is LENGTH
3789 elements long, starting at LOWBOUND. The result has the same lower
3790 bound as the original ARRAY. */
c906108c 3791
f23631e4
AC
3792struct value *
3793value_slice (struct value *array, int lowbound, int length)
c906108c
SS
3794{
3795 struct type *slice_range_type, *slice_type, *range_type;
7a67d0fe 3796 LONGEST lowerbound, upperbound;
f23631e4 3797 struct value *slice;
c906108c 3798 struct type *array_type;
ac3eeb49 3799
df407dfe 3800 array_type = check_typedef (value_type (array));
c906108c 3801 if (TYPE_CODE (array_type) != TYPE_CODE_ARRAY
6b1755ce 3802 && TYPE_CODE (array_type) != TYPE_CODE_STRING)
8a3fe4f8 3803 error (_("cannot take slice of non-array"));
ac3eeb49 3804
a7067863
AB
3805 if (type_not_allocated (array_type))
3806 error (_("array not allocated"));
3807 if (type_not_associated (array_type))
3808 error (_("array not associated"));
3809
c906108c
SS
3810 range_type = TYPE_INDEX_TYPE (array_type);
3811 if (get_discrete_bounds (range_type, &lowerbound, &upperbound) < 0)
8a3fe4f8 3812 error (_("slice from bad array or bitstring"));
ac3eeb49 3813
c906108c 3814 if (lowbound < lowerbound || length < 0
db034ac5 3815 || lowbound + length - 1 > upperbound)
8a3fe4f8 3816 error (_("slice out of range"));
ac3eeb49 3817
c906108c
SS
3818 /* FIXME-type-allocation: need a way to free this type when we are
3819 done with it. */
cafb3438 3820 slice_range_type = create_static_range_type (NULL,
0c9c3474
SA
3821 TYPE_TARGET_TYPE (range_type),
3822 lowbound,
3823 lowbound + length - 1);
ac3eeb49 3824
a7c88acd
JB
3825 {
3826 struct type *element_type = TYPE_TARGET_TYPE (array_type);
3827 LONGEST offset
3828 = (lowbound - lowerbound) * TYPE_LENGTH (check_typedef (element_type));
ac3eeb49 3829
cafb3438 3830 slice_type = create_array_type (NULL,
a7c88acd
JB
3831 element_type,
3832 slice_range_type);
3833 TYPE_CODE (slice_type) = TYPE_CODE (array_type);
ac3eeb49 3834
a7c88acd
JB
3835 if (VALUE_LVAL (array) == lval_memory && value_lazy (array))
3836 slice = allocate_value_lazy (slice_type);
3837 else
3838 {
3839 slice = allocate_value (slice_type);
3840 value_contents_copy (slice, 0, array, offset,
3ae385af 3841 type_length_units (slice_type));
a7c88acd
JB
3842 }
3843
3844 set_value_component_location (slice, array);
a7c88acd
JB
3845 set_value_offset (slice, value_offset (array) + offset);
3846 }
ac3eeb49 3847
c906108c
SS
3848 return slice;
3849}
3850
ac3eeb49
MS
3851/* Create a value for a FORTRAN complex number. Currently most of the
3852 time values are coerced to COMPLEX*16 (i.e. a complex number
070ad9f0
DB
3853 composed of 2 doubles. This really should be a smarter routine
3854 that figures out precision inteligently as opposed to assuming
ac3eeb49 3855 doubles. FIXME: fmb */
c906108c 3856
f23631e4 3857struct value *
ac3eeb49
MS
3858value_literal_complex (struct value *arg1,
3859 struct value *arg2,
3860 struct type *type)
c906108c 3861{
f23631e4 3862 struct value *val;
c906108c
SS
3863 struct type *real_type = TYPE_TARGET_TYPE (type);
3864
3865 val = allocate_value (type);
3866 arg1 = value_cast (real_type, arg1);
3867 arg2 = value_cast (real_type, arg2);
3868
990a07ab 3869 memcpy (value_contents_raw (val),
0fd88904 3870 value_contents (arg1), TYPE_LENGTH (real_type));
990a07ab 3871 memcpy (value_contents_raw (val) + TYPE_LENGTH (real_type),
0fd88904 3872 value_contents (arg2), TYPE_LENGTH (real_type));
c906108c
SS
3873 return val;
3874}
3875
ac3eeb49 3876/* Cast a value into the appropriate complex data type. */
c906108c 3877
f23631e4
AC
3878static struct value *
3879cast_into_complex (struct type *type, struct value *val)
c906108c
SS
3880{
3881 struct type *real_type = TYPE_TARGET_TYPE (type);
ac3eeb49 3882
df407dfe 3883 if (TYPE_CODE (value_type (val)) == TYPE_CODE_COMPLEX)
c906108c 3884 {
df407dfe 3885 struct type *val_real_type = TYPE_TARGET_TYPE (value_type (val));
f23631e4
AC
3886 struct value *re_val = allocate_value (val_real_type);
3887 struct value *im_val = allocate_value (val_real_type);
c906108c 3888
990a07ab 3889 memcpy (value_contents_raw (re_val),
0fd88904 3890 value_contents (val), TYPE_LENGTH (val_real_type));
990a07ab 3891 memcpy (value_contents_raw (im_val),
0fd88904 3892 value_contents (val) + TYPE_LENGTH (val_real_type),
c5aa993b 3893 TYPE_LENGTH (val_real_type));
c906108c
SS
3894
3895 return value_literal_complex (re_val, im_val, type);
3896 }
df407dfe
AC
3897 else if (TYPE_CODE (value_type (val)) == TYPE_CODE_FLT
3898 || TYPE_CODE (value_type (val)) == TYPE_CODE_INT)
ac3eeb49
MS
3899 return value_literal_complex (val,
3900 value_zero (real_type, not_lval),
3901 type);
c906108c 3902 else
8a3fe4f8 3903 error (_("cannot cast non-number to complex"));
c906108c
SS
3904}
3905
3906void
fba45db2 3907_initialize_valops (void)
c906108c 3908{
5bf193a2
AC
3909 add_setshow_boolean_cmd ("overload-resolution", class_support,
3910 &overload_resolution, _("\
3911Set overload resolution in evaluating C++ functions."), _("\
ac3eeb49
MS
3912Show overload resolution in evaluating C++ functions."),
3913 NULL, NULL,
920d2a44 3914 show_overload_resolution,
5bf193a2 3915 &setlist, &showlist);
c906108c 3916 overload_resolution = 1;
c906108c 3917}
This page took 4.143535 seconds and 4 git commands to generate.