objcopy add-symbol uninitialised struct
[deliverable/binutils-gdb.git] / gdb / valops.c
CommitLineData
c906108c 1/* Perform non-arithmetic operations on values, for GDB.
990a07ab 2
618f726f 3 Copyright (C) 1986-2016 Free Software Foundation, Inc.
c906108c 4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
c5aa993b 10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b 17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
19
20#include "defs.h"
21#include "symtab.h"
22#include "gdbtypes.h"
23#include "value.h"
24#include "frame.h"
25#include "inferior.h"
26#include "gdbcore.h"
27#include "target.h"
28#include "demangle.h"
29#include "language.h"
30#include "gdbcmd.h"
4e052eda 31#include "regcache.h"
015a42b4 32#include "cp-abi.h"
fe898f56 33#include "block.h"
04714b91 34#include "infcall.h"
de4f826b 35#include "dictionary.h"
b6429628 36#include "cp-support.h"
4ef30785 37#include "dfp.h"
e6ca34fc 38#include "tracepoint.h"
f4c5303c 39#include "observer.h"
3e3b026f 40#include "objfiles.h"
233e8b28 41#include "extension.h"
c906108c 42
ccce17b0 43extern unsigned int overload_debug;
c906108c
SS
44/* Local functions. */
45
ad2f7632
DJ
46static int typecmp (int staticp, int varargs, int nargs,
47 struct field t1[], struct value *t2[]);
c906108c 48
714f19d5 49static struct value *search_struct_field (const char *, struct value *,
8a13d42d 50 struct type *, int);
c906108c 51
714f19d5
TT
52static struct value *search_struct_method (const char *, struct value **,
53 struct value **,
54 int, int *, struct type *);
c906108c 55
da096638 56static int find_oload_champ_namespace (struct value **, int,
ac3eeb49
MS
57 const char *, const char *,
58 struct symbol ***,
7322dca9
SW
59 struct badness_vector **,
60 const int no_adl);
8d577d32
DC
61
62static
da096638 63int find_oload_champ_namespace_loop (struct value **, int,
ac3eeb49
MS
64 const char *, const char *,
65 int, struct symbol ***,
7322dca9
SW
66 struct badness_vector **, int *,
67 const int no_adl);
ac3eeb49 68
9cf95373 69static int find_oload_champ (struct value **, int, int,
233e8b28
SC
70 struct fn_field *, VEC (xmethod_worker_ptr) *,
71 struct symbol **, struct badness_vector **);
ac3eeb49 72
2bca57ba 73static int oload_method_static_p (struct fn_field *, int);
8d577d32
DC
74
75enum oload_classification { STANDARD, NON_STANDARD, INCOMPATIBLE };
76
77static enum
ac3eeb49
MS
78oload_classification classify_oload_match (struct badness_vector *,
79 int, int);
8d577d32 80
ac3eeb49
MS
81static struct value *value_struct_elt_for_reference (struct type *,
82 int, struct type *,
c848d642 83 const char *,
ac3eeb49
MS
84 struct type *,
85 int, enum noside);
79c2c32d 86
ac3eeb49 87static struct value *value_namespace_elt (const struct type *,
c848d642 88 const char *, int , enum noside);
79c2c32d 89
ac3eeb49 90static struct value *value_maybe_namespace_elt (const struct type *,
c848d642 91 const char *, int,
ac3eeb49 92 enum noside);
63d06c5c 93
a14ed312 94static CORE_ADDR allocate_space_in_inferior (int);
c906108c 95
f23631e4 96static struct value *cast_into_complex (struct type *, struct value *);
c906108c 97
233e8b28
SC
98static void find_method_list (struct value **, const char *,
99 int, struct type *, struct fn_field **, int *,
100 VEC (xmethod_worker_ptr) **,
101 struct type **, int *);
7a292a7a 102
a14ed312 103void _initialize_valops (void);
c906108c 104
c906108c 105#if 0
ac3eeb49
MS
106/* Flag for whether we want to abandon failed expression evals by
107 default. */
108
c906108c
SS
109static int auto_abandon = 0;
110#endif
111
112int overload_resolution = 0;
920d2a44
AC
113static void
114show_overload_resolution (struct ui_file *file, int from_tty,
ac3eeb49
MS
115 struct cmd_list_element *c,
116 const char *value)
920d2a44 117{
3e43a32a
MS
118 fprintf_filtered (file, _("Overload resolution in evaluating "
119 "C++ functions is %s.\n"),
920d2a44
AC
120 value);
121}
242bfc55 122
3e3b026f
UW
123/* Find the address of function name NAME in the inferior. If OBJF_P
124 is non-NULL, *OBJF_P will be set to the OBJFILE where the function
125 is defined. */
c906108c 126
f23631e4 127struct value *
3e3b026f 128find_function_in_inferior (const char *name, struct objfile **objf_p)
c906108c 129{
d12307c1 130 struct block_symbol sym;
a109c7c1 131
2570f2b7 132 sym = lookup_symbol (name, 0, VAR_DOMAIN, 0);
d12307c1 133 if (sym.symbol != NULL)
c906108c 134 {
d12307c1 135 if (SYMBOL_CLASS (sym.symbol) != LOC_BLOCK)
c906108c 136 {
8a3fe4f8 137 error (_("\"%s\" exists in this program but is not a function."),
c906108c
SS
138 name);
139 }
3e3b026f
UW
140
141 if (objf_p)
d12307c1 142 *objf_p = symbol_objfile (sym.symbol);
3e3b026f 143
d12307c1 144 return value_of_variable (sym.symbol, sym.block);
c906108c
SS
145 }
146 else
147 {
7c7b6655
TT
148 struct bound_minimal_symbol msymbol =
149 lookup_bound_minimal_symbol (name);
a109c7c1 150
7c7b6655 151 if (msymbol.minsym != NULL)
c906108c 152 {
7c7b6655 153 struct objfile *objfile = msymbol.objfile;
3e3b026f
UW
154 struct gdbarch *gdbarch = get_objfile_arch (objfile);
155
c906108c 156 struct type *type;
4478b372 157 CORE_ADDR maddr;
3e3b026f 158 type = lookup_pointer_type (builtin_type (gdbarch)->builtin_char);
c906108c
SS
159 type = lookup_function_type (type);
160 type = lookup_pointer_type (type);
77e371c0 161 maddr = BMSYMBOL_VALUE_ADDRESS (msymbol);
3e3b026f
UW
162
163 if (objf_p)
164 *objf_p = objfile;
165
4478b372 166 return value_from_pointer (type, maddr);
c906108c
SS
167 }
168 else
169 {
c5aa993b 170 if (!target_has_execution)
3e43a32a
MS
171 error (_("evaluation of this expression "
172 "requires the target program to be active"));
c5aa993b 173 else
3e43a32a
MS
174 error (_("evaluation of this expression requires the "
175 "program to have a function \"%s\"."),
176 name);
c906108c
SS
177 }
178 }
179}
180
ac3eeb49
MS
181/* Allocate NBYTES of space in the inferior using the inferior's
182 malloc and return a value that is a pointer to the allocated
183 space. */
c906108c 184
f23631e4 185struct value *
fba45db2 186value_allocate_space_in_inferior (int len)
c906108c 187{
3e3b026f
UW
188 struct objfile *objf;
189 struct value *val = find_function_in_inferior ("malloc", &objf);
190 struct gdbarch *gdbarch = get_objfile_arch (objf);
f23631e4 191 struct value *blocklen;
c906108c 192
3e3b026f 193 blocklen = value_from_longest (builtin_type (gdbarch)->builtin_int, len);
c906108c
SS
194 val = call_function_by_hand (val, 1, &blocklen);
195 if (value_logical_not (val))
196 {
197 if (!target_has_execution)
3e43a32a
MS
198 error (_("No memory available to program now: "
199 "you need to start the target first"));
c5aa993b 200 else
8a3fe4f8 201 error (_("No memory available to program: call to malloc failed"));
c906108c
SS
202 }
203 return val;
204}
205
206static CORE_ADDR
fba45db2 207allocate_space_in_inferior (int len)
c906108c
SS
208{
209 return value_as_long (value_allocate_space_in_inferior (len));
210}
211
6af87b03
AR
212/* Cast struct value VAL to type TYPE and return as a value.
213 Both type and val must be of TYPE_CODE_STRUCT or TYPE_CODE_UNION
694182d2
DJ
214 for this to work. Typedef to one of the codes is permitted.
215 Returns NULL if the cast is neither an upcast nor a downcast. */
6af87b03
AR
216
217static struct value *
218value_cast_structs (struct type *type, struct value *v2)
219{
220 struct type *t1;
221 struct type *t2;
222 struct value *v;
223
224 gdb_assert (type != NULL && v2 != NULL);
225
226 t1 = check_typedef (type);
227 t2 = check_typedef (value_type (v2));
228
229 /* Check preconditions. */
230 gdb_assert ((TYPE_CODE (t1) == TYPE_CODE_STRUCT
231 || TYPE_CODE (t1) == TYPE_CODE_UNION)
232 && !!"Precondition is that type is of STRUCT or UNION kind.");
233 gdb_assert ((TYPE_CODE (t2) == TYPE_CODE_STRUCT
234 || TYPE_CODE (t2) == TYPE_CODE_UNION)
235 && !!"Precondition is that value is of STRUCT or UNION kind");
236
191ca0a1
CM
237 if (TYPE_NAME (t1) != NULL
238 && TYPE_NAME (t2) != NULL
239 && !strcmp (TYPE_NAME (t1), TYPE_NAME (t2)))
240 return NULL;
241
6af87b03
AR
242 /* Upcasting: look in the type of the source to see if it contains the
243 type of the target as a superclass. If so, we'll need to
244 offset the pointer rather than just change its type. */
245 if (TYPE_NAME (t1) != NULL)
246 {
247 v = search_struct_field (type_name_no_tag (t1),
8a13d42d 248 v2, t2, 1);
6af87b03
AR
249 if (v)
250 return v;
251 }
252
253 /* Downcasting: look in the type of the target to see if it contains the
254 type of the source as a superclass. If so, we'll need to
9c3c02fd 255 offset the pointer rather than just change its type. */
6af87b03
AR
256 if (TYPE_NAME (t2) != NULL)
257 {
9c3c02fd
TT
258 /* Try downcasting using the run-time type of the value. */
259 int full, top, using_enc;
260 struct type *real_type;
261
262 real_type = value_rtti_type (v2, &full, &top, &using_enc);
263 if (real_type)
264 {
265 v = value_full_object (v2, real_type, full, top, using_enc);
266 v = value_at_lazy (real_type, value_address (v));
9f1f738a 267 real_type = value_type (v);
9c3c02fd
TT
268
269 /* We might be trying to cast to the outermost enclosing
270 type, in which case search_struct_field won't work. */
271 if (TYPE_NAME (real_type) != NULL
272 && !strcmp (TYPE_NAME (real_type), TYPE_NAME (t1)))
273 return v;
274
8a13d42d 275 v = search_struct_field (type_name_no_tag (t2), v, real_type, 1);
9c3c02fd
TT
276 if (v)
277 return v;
278 }
279
280 /* Try downcasting using information from the destination type
281 T2. This wouldn't work properly for classes with virtual
282 bases, but those were handled above. */
6af87b03 283 v = search_struct_field (type_name_no_tag (t2),
8a13d42d 284 value_zero (t1, not_lval), t1, 1);
6af87b03
AR
285 if (v)
286 {
287 /* Downcasting is possible (t1 is superclass of v2). */
42ae5230 288 CORE_ADDR addr2 = value_address (v2);
a109c7c1 289
42ae5230 290 addr2 -= value_address (v) + value_embedded_offset (v);
6af87b03
AR
291 return value_at (type, addr2);
292 }
293 }
694182d2
DJ
294
295 return NULL;
6af87b03
AR
296}
297
fb933624
DJ
298/* Cast one pointer or reference type to another. Both TYPE and
299 the type of ARG2 should be pointer types, or else both should be
b1af9e97
TT
300 reference types. If SUBCLASS_CHECK is non-zero, this will force a
301 check to see whether TYPE is a superclass of ARG2's type. If
302 SUBCLASS_CHECK is zero, then the subclass check is done only when
303 ARG2 is itself non-zero. Returns the new pointer or reference. */
fb933624
DJ
304
305struct value *
b1af9e97
TT
306value_cast_pointers (struct type *type, struct value *arg2,
307 int subclass_check)
fb933624 308{
d160942f 309 struct type *type1 = check_typedef (type);
fb933624 310 struct type *type2 = check_typedef (value_type (arg2));
d160942f 311 struct type *t1 = check_typedef (TYPE_TARGET_TYPE (type1));
fb933624
DJ
312 struct type *t2 = check_typedef (TYPE_TARGET_TYPE (type2));
313
314 if (TYPE_CODE (t1) == TYPE_CODE_STRUCT
315 && TYPE_CODE (t2) == TYPE_CODE_STRUCT
b1af9e97 316 && (subclass_check || !value_logical_not (arg2)))
fb933624 317 {
6af87b03 318 struct value *v2;
fb933624 319
6af87b03
AR
320 if (TYPE_CODE (type2) == TYPE_CODE_REF)
321 v2 = coerce_ref (arg2);
322 else
323 v2 = value_ind (arg2);
3e43a32a
MS
324 gdb_assert (TYPE_CODE (check_typedef (value_type (v2)))
325 == TYPE_CODE_STRUCT && !!"Why did coercion fail?");
6af87b03
AR
326 v2 = value_cast_structs (t1, v2);
327 /* At this point we have what we can have, un-dereference if needed. */
328 if (v2)
fb933624 329 {
6af87b03 330 struct value *v = value_addr (v2);
a109c7c1 331
6af87b03
AR
332 deprecated_set_value_type (v, type);
333 return v;
fb933624 334 }
8301c89e 335 }
fb933624
DJ
336
337 /* No superclass found, just change the pointer type. */
0d5de010 338 arg2 = value_copy (arg2);
fb933624 339 deprecated_set_value_type (arg2, type);
4dfea560 340 set_value_enclosing_type (arg2, type);
fb933624
DJ
341 set_value_pointed_to_offset (arg2, 0); /* pai: chk_val */
342 return arg2;
343}
344
c906108c
SS
345/* Cast value ARG2 to type TYPE and return as a value.
346 More general than a C cast: accepts any two types of the same length,
347 and if ARG2 is an lvalue it can be cast into anything at all. */
348/* In C++, casts may change pointer or object representations. */
349
f23631e4
AC
350struct value *
351value_cast (struct type *type, struct value *arg2)
c906108c 352{
52f0bd74
AC
353 enum type_code code1;
354 enum type_code code2;
355 int scalar;
c906108c
SS
356 struct type *type2;
357
358 int convert_to_boolean = 0;
c5aa993b 359
df407dfe 360 if (value_type (arg2) == type)
c906108c
SS
361 return arg2;
362
6af87b03
AR
363 code1 = TYPE_CODE (check_typedef (type));
364
365 /* Check if we are casting struct reference to struct reference. */
366 if (code1 == TYPE_CODE_REF)
367 {
368 /* We dereference type; then we recurse and finally
581e13c1 369 we generate value of the given reference. Nothing wrong with
6af87b03
AR
370 that. */
371 struct type *t1 = check_typedef (type);
372 struct type *dereftype = check_typedef (TYPE_TARGET_TYPE (t1));
373 struct value *val = value_cast (dereftype, arg2);
a109c7c1 374
6af87b03
AR
375 return value_ref (val);
376 }
377
378 code2 = TYPE_CODE (check_typedef (value_type (arg2)));
379
380 if (code2 == TYPE_CODE_REF)
381 /* We deref the value and then do the cast. */
382 return value_cast (type, coerce_ref (arg2));
383
f168693b 384 type = check_typedef (type);
c906108c 385 code1 = TYPE_CODE (type);
994b9211 386 arg2 = coerce_ref (arg2);
df407dfe 387 type2 = check_typedef (value_type (arg2));
c906108c 388
fb933624
DJ
389 /* You can't cast to a reference type. See value_cast_pointers
390 instead. */
391 gdb_assert (code1 != TYPE_CODE_REF);
392
ac3eeb49
MS
393 /* A cast to an undetermined-length array_type, such as
394 (TYPE [])OBJECT, is treated like a cast to (TYPE [N])OBJECT,
395 where N is sizeof(OBJECT)/sizeof(TYPE). */
c906108c
SS
396 if (code1 == TYPE_CODE_ARRAY)
397 {
398 struct type *element_type = TYPE_TARGET_TYPE (type);
399 unsigned element_length = TYPE_LENGTH (check_typedef (element_type));
a109c7c1 400
d78df370 401 if (element_length > 0 && TYPE_ARRAY_UPPER_BOUND_IS_UNDEFINED (type))
c906108c
SS
402 {
403 struct type *range_type = TYPE_INDEX_TYPE (type);
404 int val_length = TYPE_LENGTH (type2);
405 LONGEST low_bound, high_bound, new_length;
a109c7c1 406
c906108c
SS
407 if (get_discrete_bounds (range_type, &low_bound, &high_bound) < 0)
408 low_bound = 0, high_bound = 0;
409 new_length = val_length / element_length;
410 if (val_length % element_length != 0)
3e43a32a
MS
411 warning (_("array element type size does not "
412 "divide object size in cast"));
ac3eeb49
MS
413 /* FIXME-type-allocation: need a way to free this type when
414 we are done with it. */
0c9c3474
SA
415 range_type = create_static_range_type ((struct type *) NULL,
416 TYPE_TARGET_TYPE (range_type),
417 low_bound,
418 new_length + low_bound - 1);
ac3eeb49
MS
419 deprecated_set_value_type (arg2,
420 create_array_type ((struct type *) NULL,
421 element_type,
422 range_type));
c906108c
SS
423 return arg2;
424 }
425 }
426
427 if (current_language->c_style_arrays
3bdf2bbd
KW
428 && TYPE_CODE (type2) == TYPE_CODE_ARRAY
429 && !TYPE_VECTOR (type2))
c906108c
SS
430 arg2 = value_coerce_array (arg2);
431
432 if (TYPE_CODE (type2) == TYPE_CODE_FUNC)
433 arg2 = value_coerce_function (arg2);
434
df407dfe 435 type2 = check_typedef (value_type (arg2));
c906108c
SS
436 code2 = TYPE_CODE (type2);
437
438 if (code1 == TYPE_CODE_COMPLEX)
439 return cast_into_complex (type, arg2);
440 if (code1 == TYPE_CODE_BOOL)
441 {
442 code1 = TYPE_CODE_INT;
443 convert_to_boolean = 1;
444 }
445 if (code1 == TYPE_CODE_CHAR)
446 code1 = TYPE_CODE_INT;
447 if (code2 == TYPE_CODE_BOOL || code2 == TYPE_CODE_CHAR)
448 code2 = TYPE_CODE_INT;
449
450 scalar = (code2 == TYPE_CODE_INT || code2 == TYPE_CODE_FLT
4ef30785
TJB
451 || code2 == TYPE_CODE_DECFLOAT || code2 == TYPE_CODE_ENUM
452 || code2 == TYPE_CODE_RANGE);
c906108c 453
6af87b03
AR
454 if ((code1 == TYPE_CODE_STRUCT || code1 == TYPE_CODE_UNION)
455 && (code2 == TYPE_CODE_STRUCT || code2 == TYPE_CODE_UNION)
c906108c 456 && TYPE_NAME (type) != 0)
694182d2
DJ
457 {
458 struct value *v = value_cast_structs (type, arg2);
a109c7c1 459
694182d2
DJ
460 if (v)
461 return v;
462 }
463
c906108c
SS
464 if (code1 == TYPE_CODE_FLT && scalar)
465 return value_from_double (type, value_as_double (arg2));
4ef30785
TJB
466 else if (code1 == TYPE_CODE_DECFLOAT && scalar)
467 {
e17a4113 468 enum bfd_endian byte_order = gdbarch_byte_order (get_type_arch (type));
4ef30785
TJB
469 int dec_len = TYPE_LENGTH (type);
470 gdb_byte dec[16];
471
472 if (code2 == TYPE_CODE_FLT)
e17a4113 473 decimal_from_floating (arg2, dec, dec_len, byte_order);
4ef30785
TJB
474 else if (code2 == TYPE_CODE_DECFLOAT)
475 decimal_convert (value_contents (arg2), TYPE_LENGTH (type2),
e17a4113 476 byte_order, dec, dec_len, byte_order);
4ef30785
TJB
477 else
478 /* The only option left is an integral type. */
e17a4113 479 decimal_from_integral (arg2, dec, dec_len, byte_order);
4ef30785
TJB
480
481 return value_from_decfloat (type, dec);
482 }
c906108c
SS
483 else if ((code1 == TYPE_CODE_INT || code1 == TYPE_CODE_ENUM
484 || code1 == TYPE_CODE_RANGE)
0d5de010
DJ
485 && (scalar || code2 == TYPE_CODE_PTR
486 || code2 == TYPE_CODE_MEMBERPTR))
c906108c
SS
487 {
488 LONGEST longest;
c5aa993b 489
2bf1f4a1 490 /* When we cast pointers to integers, we mustn't use
76e71323 491 gdbarch_pointer_to_address to find the address the pointer
2bf1f4a1
JB
492 represents, as value_as_long would. GDB should evaluate
493 expressions just as the compiler would --- and the compiler
494 sees a cast as a simple reinterpretation of the pointer's
495 bits. */
496 if (code2 == TYPE_CODE_PTR)
e17a4113
UW
497 longest = extract_unsigned_integer
498 (value_contents (arg2), TYPE_LENGTH (type2),
499 gdbarch_byte_order (get_type_arch (type2)));
2bf1f4a1
JB
500 else
501 longest = value_as_long (arg2);
802db21b 502 return value_from_longest (type, convert_to_boolean ?
716c501e 503 (LONGEST) (longest ? 1 : 0) : longest);
c906108c 504 }
ac3eeb49
MS
505 else if (code1 == TYPE_CODE_PTR && (code2 == TYPE_CODE_INT
506 || code2 == TYPE_CODE_ENUM
507 || code2 == TYPE_CODE_RANGE))
634acd5f 508 {
4603e466
DT
509 /* TYPE_LENGTH (type) is the length of a pointer, but we really
510 want the length of an address! -- we are really dealing with
511 addresses (i.e., gdb representations) not pointers (i.e.,
512 target representations) here.
513
514 This allows things like "print *(int *)0x01000234" to work
515 without printing a misleading message -- which would
516 otherwise occur when dealing with a target having two byte
517 pointers and four byte addresses. */
518
50810684 519 int addr_bit = gdbarch_addr_bit (get_type_arch (type2));
634acd5f 520 LONGEST longest = value_as_long (arg2);
a109c7c1 521
4603e466 522 if (addr_bit < sizeof (LONGEST) * HOST_CHAR_BIT)
634acd5f 523 {
4603e466
DT
524 if (longest >= ((LONGEST) 1 << addr_bit)
525 || longest <= -((LONGEST) 1 << addr_bit))
8a3fe4f8 526 warning (_("value truncated"));
634acd5f
AC
527 }
528 return value_from_longest (type, longest);
529 }
0d5de010
DJ
530 else if (code1 == TYPE_CODE_METHODPTR && code2 == TYPE_CODE_INT
531 && value_as_long (arg2) == 0)
532 {
533 struct value *result = allocate_value (type);
a109c7c1 534
ad4820ab 535 cplus_make_method_ptr (type, value_contents_writeable (result), 0, 0);
0d5de010
DJ
536 return result;
537 }
538 else if (code1 == TYPE_CODE_MEMBERPTR && code2 == TYPE_CODE_INT
539 && value_as_long (arg2) == 0)
540 {
541 /* The Itanium C++ ABI represents NULL pointers to members as
542 minus one, instead of biasing the normal case. */
543 return value_from_longest (type, -1);
544 }
8954db33
AB
545 else if (code1 == TYPE_CODE_ARRAY && TYPE_VECTOR (type)
546 && code2 == TYPE_CODE_ARRAY && TYPE_VECTOR (type2)
547 && TYPE_LENGTH (type) != TYPE_LENGTH (type2))
548 error (_("Cannot convert between vector values of different sizes"));
549 else if (code1 == TYPE_CODE_ARRAY && TYPE_VECTOR (type) && scalar
550 && TYPE_LENGTH (type) != TYPE_LENGTH (type2))
551 error (_("can only cast scalar to vector of same size"));
0ba2eb0f
TT
552 else if (code1 == TYPE_CODE_VOID)
553 {
554 return value_zero (type, not_lval);
555 }
c906108c
SS
556 else if (TYPE_LENGTH (type) == TYPE_LENGTH (type2))
557 {
558 if (code1 == TYPE_CODE_PTR && code2 == TYPE_CODE_PTR)
b1af9e97 559 return value_cast_pointers (type, arg2, 0);
fb933624 560
0d5de010 561 arg2 = value_copy (arg2);
04624583 562 deprecated_set_value_type (arg2, type);
4dfea560 563 set_value_enclosing_type (arg2, type);
b44d461b 564 set_value_pointed_to_offset (arg2, 0); /* pai: chk_val */
c906108c
SS
565 return arg2;
566 }
c906108c 567 else if (VALUE_LVAL (arg2) == lval_memory)
42ae5230 568 return value_at_lazy (type, value_address (arg2));
c906108c
SS
569 else
570 {
8a3fe4f8 571 error (_("Invalid cast."));
c906108c
SS
572 return 0;
573 }
574}
575
4e8f195d
TT
576/* The C++ reinterpret_cast operator. */
577
578struct value *
579value_reinterpret_cast (struct type *type, struct value *arg)
580{
581 struct value *result;
582 struct type *real_type = check_typedef (type);
583 struct type *arg_type, *dest_type;
584 int is_ref = 0;
585 enum type_code dest_code, arg_code;
586
587 /* Do reference, function, and array conversion. */
588 arg = coerce_array (arg);
589
590 /* Attempt to preserve the type the user asked for. */
591 dest_type = type;
592
593 /* If we are casting to a reference type, transform
594 reinterpret_cast<T&>(V) to *reinterpret_cast<T*>(&V). */
595 if (TYPE_CODE (real_type) == TYPE_CODE_REF)
596 {
597 is_ref = 1;
598 arg = value_addr (arg);
599 dest_type = lookup_pointer_type (TYPE_TARGET_TYPE (dest_type));
600 real_type = lookup_pointer_type (real_type);
601 }
602
603 arg_type = value_type (arg);
604
605 dest_code = TYPE_CODE (real_type);
606 arg_code = TYPE_CODE (arg_type);
607
608 /* We can convert pointer types, or any pointer type to int, or int
609 type to pointer. */
610 if ((dest_code == TYPE_CODE_PTR && arg_code == TYPE_CODE_INT)
611 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_PTR)
612 || (dest_code == TYPE_CODE_METHODPTR && arg_code == TYPE_CODE_INT)
613 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_METHODPTR)
614 || (dest_code == TYPE_CODE_MEMBERPTR && arg_code == TYPE_CODE_INT)
615 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_MEMBERPTR)
616 || (dest_code == arg_code
617 && (dest_code == TYPE_CODE_PTR
618 || dest_code == TYPE_CODE_METHODPTR
619 || dest_code == TYPE_CODE_MEMBERPTR)))
620 result = value_cast (dest_type, arg);
621 else
622 error (_("Invalid reinterpret_cast"));
623
624 if (is_ref)
625 result = value_cast (type, value_ref (value_ind (result)));
626
627 return result;
628}
629
630/* A helper for value_dynamic_cast. This implements the first of two
631 runtime checks: we iterate over all the base classes of the value's
632 class which are equal to the desired class; if only one of these
633 holds the value, then it is the answer. */
634
635static int
636dynamic_cast_check_1 (struct type *desired_type,
8af8e3bc
PA
637 const gdb_byte *valaddr,
638 int embedded_offset,
4e8f195d 639 CORE_ADDR address,
8af8e3bc 640 struct value *val,
4e8f195d
TT
641 struct type *search_type,
642 CORE_ADDR arg_addr,
643 struct type *arg_type,
644 struct value **result)
645{
646 int i, result_count = 0;
647
648 for (i = 0; i < TYPE_N_BASECLASSES (search_type) && result_count < 2; ++i)
649 {
8af8e3bc
PA
650 int offset = baseclass_offset (search_type, i, valaddr, embedded_offset,
651 address, val);
a109c7c1 652
4e8f195d
TT
653 if (class_types_same_p (desired_type, TYPE_BASECLASS (search_type, i)))
654 {
8af8e3bc
PA
655 if (address + embedded_offset + offset >= arg_addr
656 && address + embedded_offset + offset < arg_addr + TYPE_LENGTH (arg_type))
4e8f195d
TT
657 {
658 ++result_count;
659 if (!*result)
660 *result = value_at_lazy (TYPE_BASECLASS (search_type, i),
8af8e3bc 661 address + embedded_offset + offset);
4e8f195d
TT
662 }
663 }
664 else
665 result_count += dynamic_cast_check_1 (desired_type,
8af8e3bc
PA
666 valaddr,
667 embedded_offset + offset,
668 address, val,
4e8f195d
TT
669 TYPE_BASECLASS (search_type, i),
670 arg_addr,
671 arg_type,
672 result);
673 }
674
675 return result_count;
676}
677
678/* A helper for value_dynamic_cast. This implements the second of two
679 runtime checks: we look for a unique public sibling class of the
680 argument's declared class. */
681
682static int
683dynamic_cast_check_2 (struct type *desired_type,
8af8e3bc
PA
684 const gdb_byte *valaddr,
685 int embedded_offset,
4e8f195d 686 CORE_ADDR address,
8af8e3bc 687 struct value *val,
4e8f195d
TT
688 struct type *search_type,
689 struct value **result)
690{
691 int i, result_count = 0;
692
693 for (i = 0; i < TYPE_N_BASECLASSES (search_type) && result_count < 2; ++i)
694 {
695 int offset;
696
697 if (! BASETYPE_VIA_PUBLIC (search_type, i))
698 continue;
699
8af8e3bc
PA
700 offset = baseclass_offset (search_type, i, valaddr, embedded_offset,
701 address, val);
4e8f195d
TT
702 if (class_types_same_p (desired_type, TYPE_BASECLASS (search_type, i)))
703 {
704 ++result_count;
705 if (*result == NULL)
706 *result = value_at_lazy (TYPE_BASECLASS (search_type, i),
8af8e3bc 707 address + embedded_offset + offset);
4e8f195d
TT
708 }
709 else
710 result_count += dynamic_cast_check_2 (desired_type,
8af8e3bc
PA
711 valaddr,
712 embedded_offset + offset,
713 address, val,
4e8f195d
TT
714 TYPE_BASECLASS (search_type, i),
715 result);
716 }
717
718 return result_count;
719}
720
721/* The C++ dynamic_cast operator. */
722
723struct value *
724value_dynamic_cast (struct type *type, struct value *arg)
725{
8f78b329 726 int full, top, using_enc;
4e8f195d
TT
727 struct type *resolved_type = check_typedef (type);
728 struct type *arg_type = check_typedef (value_type (arg));
729 struct type *class_type, *rtti_type;
730 struct value *result, *tem, *original_arg = arg;
731 CORE_ADDR addr;
732 int is_ref = TYPE_CODE (resolved_type) == TYPE_CODE_REF;
733
734 if (TYPE_CODE (resolved_type) != TYPE_CODE_PTR
735 && TYPE_CODE (resolved_type) != TYPE_CODE_REF)
736 error (_("Argument to dynamic_cast must be a pointer or reference type"));
737 if (TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) != TYPE_CODE_VOID
4753d33b 738 && TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) != TYPE_CODE_STRUCT)
4e8f195d
TT
739 error (_("Argument to dynamic_cast must be pointer to class or `void *'"));
740
741 class_type = check_typedef (TYPE_TARGET_TYPE (resolved_type));
742 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR)
743 {
744 if (TYPE_CODE (arg_type) != TYPE_CODE_PTR
745 && ! (TYPE_CODE (arg_type) == TYPE_CODE_INT
746 && value_as_long (arg) == 0))
747 error (_("Argument to dynamic_cast does not have pointer type"));
748 if (TYPE_CODE (arg_type) == TYPE_CODE_PTR)
749 {
750 arg_type = check_typedef (TYPE_TARGET_TYPE (arg_type));
4753d33b 751 if (TYPE_CODE (arg_type) != TYPE_CODE_STRUCT)
3e43a32a
MS
752 error (_("Argument to dynamic_cast does "
753 "not have pointer to class type"));
4e8f195d
TT
754 }
755
756 /* Handle NULL pointers. */
757 if (value_as_long (arg) == 0)
758 return value_zero (type, not_lval);
759
760 arg = value_ind (arg);
761 }
762 else
763 {
4753d33b 764 if (TYPE_CODE (arg_type) != TYPE_CODE_STRUCT)
4e8f195d
TT
765 error (_("Argument to dynamic_cast does not have class type"));
766 }
767
768 /* If the classes are the same, just return the argument. */
769 if (class_types_same_p (class_type, arg_type))
770 return value_cast (type, arg);
771
772 /* If the target type is a unique base class of the argument's
773 declared type, just cast it. */
774 if (is_ancestor (class_type, arg_type))
775 {
776 if (is_unique_ancestor (class_type, arg))
777 return value_cast (type, original_arg);
778 error (_("Ambiguous dynamic_cast"));
779 }
780
781 rtti_type = value_rtti_type (arg, &full, &top, &using_enc);
782 if (! rtti_type)
783 error (_("Couldn't determine value's most derived type for dynamic_cast"));
784
785 /* Compute the most derived object's address. */
786 addr = value_address (arg);
787 if (full)
788 {
789 /* Done. */
790 }
791 else if (using_enc)
792 addr += top;
793 else
794 addr += top + value_embedded_offset (arg);
795
796 /* dynamic_cast<void *> means to return a pointer to the
797 most-derived object. */
798 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR
799 && TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) == TYPE_CODE_VOID)
800 return value_at_lazy (type, addr);
801
802 tem = value_at (type, addr);
9f1f738a 803 type = value_type (tem);
4e8f195d
TT
804
805 /* The first dynamic check specified in 5.2.7. */
806 if (is_public_ancestor (arg_type, TYPE_TARGET_TYPE (resolved_type)))
807 {
808 if (class_types_same_p (rtti_type, TYPE_TARGET_TYPE (resolved_type)))
809 return tem;
810 result = NULL;
811 if (dynamic_cast_check_1 (TYPE_TARGET_TYPE (resolved_type),
8af8e3bc
PA
812 value_contents_for_printing (tem),
813 value_embedded_offset (tem),
814 value_address (tem), tem,
4e8f195d
TT
815 rtti_type, addr,
816 arg_type,
817 &result) == 1)
818 return value_cast (type,
819 is_ref ? value_ref (result) : value_addr (result));
820 }
821
822 /* The second dynamic check specified in 5.2.7. */
823 result = NULL;
824 if (is_public_ancestor (arg_type, rtti_type)
825 && dynamic_cast_check_2 (TYPE_TARGET_TYPE (resolved_type),
8af8e3bc
PA
826 value_contents_for_printing (tem),
827 value_embedded_offset (tem),
828 value_address (tem), tem,
4e8f195d
TT
829 rtti_type, &result) == 1)
830 return value_cast (type,
831 is_ref ? value_ref (result) : value_addr (result));
832
833 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR)
834 return value_zero (type, not_lval);
835
836 error (_("dynamic_cast failed"));
837}
838
c906108c
SS
839/* Create a value of type TYPE that is zero, and return it. */
840
f23631e4 841struct value *
fba45db2 842value_zero (struct type *type, enum lval_type lv)
c906108c 843{
f23631e4 844 struct value *val = allocate_value (type);
c906108c 845
bb7da2bf 846 VALUE_LVAL (val) = (lv == lval_computed ? not_lval : lv);
c906108c
SS
847 return val;
848}
849
18a46dbe 850/* Create a not_lval value of numeric type TYPE that is one, and return it. */
301f0ecf
DE
851
852struct value *
18a46dbe 853value_one (struct type *type)
301f0ecf
DE
854{
855 struct type *type1 = check_typedef (type);
4e608b4f 856 struct value *val;
301f0ecf
DE
857
858 if (TYPE_CODE (type1) == TYPE_CODE_DECFLOAT)
859 {
e17a4113 860 enum bfd_endian byte_order = gdbarch_byte_order (get_type_arch (type));
301f0ecf 861 gdb_byte v[16];
a109c7c1 862
e17a4113 863 decimal_from_string (v, TYPE_LENGTH (type), byte_order, "1");
301f0ecf
DE
864 val = value_from_decfloat (type, v);
865 }
866 else if (TYPE_CODE (type1) == TYPE_CODE_FLT)
867 {
868 val = value_from_double (type, (DOUBLEST) 1);
869 }
870 else if (is_integral_type (type1))
871 {
872 val = value_from_longest (type, (LONGEST) 1);
873 }
120bd360
KW
874 else if (TYPE_CODE (type1) == TYPE_CODE_ARRAY && TYPE_VECTOR (type1))
875 {
876 struct type *eltype = check_typedef (TYPE_TARGET_TYPE (type1));
cfa6f054
KW
877 int i;
878 LONGEST low_bound, high_bound;
120bd360
KW
879 struct value *tmp;
880
cfa6f054
KW
881 if (!get_array_bounds (type1, &low_bound, &high_bound))
882 error (_("Could not determine the vector bounds"));
883
120bd360 884 val = allocate_value (type);
cfa6f054 885 for (i = 0; i < high_bound - low_bound + 1; i++)
120bd360 886 {
18a46dbe 887 tmp = value_one (eltype);
120bd360
KW
888 memcpy (value_contents_writeable (val) + i * TYPE_LENGTH (eltype),
889 value_contents_all (tmp), TYPE_LENGTH (eltype));
890 }
891 }
301f0ecf
DE
892 else
893 {
894 error (_("Not a numeric type."));
895 }
896
18a46dbe
JK
897 /* value_one result is never used for assignments to. */
898 gdb_assert (VALUE_LVAL (val) == not_lval);
899
301f0ecf
DE
900 return val;
901}
902
80180f79
SA
903/* Helper function for value_at, value_at_lazy, and value_at_lazy_stack.
904 The type of the created value may differ from the passed type TYPE.
905 Make sure to retrieve the returned values's new type after this call
906 e.g. in case the type is a variable length array. */
4e5d721f
DE
907
908static struct value *
909get_value_at (struct type *type, CORE_ADDR addr, int lazy)
910{
911 struct value *val;
912
913 if (TYPE_CODE (check_typedef (type)) == TYPE_CODE_VOID)
914 error (_("Attempt to dereference a generic pointer."));
915
a3d34bf4 916 val = value_from_contents_and_address (type, NULL, addr);
4e5d721f 917
a3d34bf4
PA
918 if (!lazy)
919 value_fetch_lazy (val);
4e5d721f
DE
920
921 return val;
922}
923
070ad9f0 924/* Return a value with type TYPE located at ADDR.
c906108c
SS
925
926 Call value_at only if the data needs to be fetched immediately;
927 if we can be 'lazy' and defer the fetch, perhaps indefinately, call
928 value_at_lazy instead. value_at_lazy simply records the address of
070ad9f0 929 the data and sets the lazy-evaluation-required flag. The lazy flag
0fd88904 930 is tested in the value_contents macro, which is used if and when
80180f79
SA
931 the contents are actually required. The type of the created value
932 may differ from the passed type TYPE. Make sure to retrieve the
933 returned values's new type after this call e.g. in case the type
934 is a variable length array.
c906108c
SS
935
936 Note: value_at does *NOT* handle embedded offsets; perform such
ac3eeb49 937 adjustments before or after calling it. */
c906108c 938
f23631e4 939struct value *
00a4c844 940value_at (struct type *type, CORE_ADDR addr)
c906108c 941{
4e5d721f 942 return get_value_at (type, addr, 0);
c906108c
SS
943}
944
80180f79
SA
945/* Return a lazy value with type TYPE located at ADDR (cf. value_at).
946 The type of the created value may differ from the passed type TYPE.
947 Make sure to retrieve the returned values's new type after this call
948 e.g. in case the type is a variable length array. */
c906108c 949
f23631e4 950struct value *
00a4c844 951value_at_lazy (struct type *type, CORE_ADDR addr)
c906108c 952{
4e5d721f 953 return get_value_at (type, addr, 1);
c906108c
SS
954}
955
e6ca34fc
PA
956void
957read_value_memory (struct value *val, int embedded_offset,
958 int stack, CORE_ADDR memaddr,
959 gdb_byte *buffer, size_t length)
960{
3ae385af
SM
961 ULONGEST xfered_total = 0;
962 struct gdbarch *arch = get_value_arch (val);
963 int unit_size = gdbarch_addressable_memory_unit_size (arch);
6d7e9d3b
YQ
964 enum target_object object;
965
966 object = stack ? TARGET_OBJECT_STACK_MEMORY : TARGET_OBJECT_MEMORY;
5a2eb0ef 967
3ae385af 968 while (xfered_total < length)
5a2eb0ef
YQ
969 {
970 enum target_xfer_status status;
3ae385af 971 ULONGEST xfered_partial;
5a2eb0ef
YQ
972
973 status = target_xfer_partial (current_target.beneath,
6d7e9d3b 974 object, NULL,
3ae385af
SM
975 buffer + xfered_total * unit_size, NULL,
976 memaddr + xfered_total,
977 length - xfered_total,
978 &xfered_partial);
5a2eb0ef
YQ
979
980 if (status == TARGET_XFER_OK)
981 /* nothing */;
bc113b4e 982 else if (status == TARGET_XFER_UNAVAILABLE)
3ae385af
SM
983 mark_value_bytes_unavailable (val, embedded_offset + xfered_total,
984 xfered_partial);
5a2eb0ef 985 else if (status == TARGET_XFER_EOF)
3ae385af 986 memory_error (TARGET_XFER_E_IO, memaddr + xfered_total);
e6ca34fc 987 else
3ae385af 988 memory_error (status, memaddr + xfered_total);
e6ca34fc 989
3ae385af 990 xfered_total += xfered_partial;
5a2eb0ef 991 QUIT;
e6ca34fc
PA
992 }
993}
c906108c
SS
994
995/* Store the contents of FROMVAL into the location of TOVAL.
996 Return a new value with the location of TOVAL and contents of FROMVAL. */
997
f23631e4
AC
998struct value *
999value_assign (struct value *toval, struct value *fromval)
c906108c 1000{
52f0bd74 1001 struct type *type;
f23631e4 1002 struct value *val;
cb741690 1003 struct frame_id old_frame;
c906108c 1004
88e3b34b 1005 if (!deprecated_value_modifiable (toval))
8a3fe4f8 1006 error (_("Left operand of assignment is not a modifiable lvalue."));
c906108c 1007
994b9211 1008 toval = coerce_ref (toval);
c906108c 1009
df407dfe 1010 type = value_type (toval);
c906108c 1011 if (VALUE_LVAL (toval) != lval_internalvar)
3cbaedff 1012 fromval = value_cast (type, fromval);
c906108c 1013 else
63092375
DJ
1014 {
1015 /* Coerce arrays and functions to pointers, except for arrays
1016 which only live in GDB's storage. */
1017 if (!value_must_coerce_to_target (fromval))
1018 fromval = coerce_array (fromval);
1019 }
1020
f168693b 1021 type = check_typedef (type);
c906108c 1022
ac3eeb49
MS
1023 /* Since modifying a register can trash the frame chain, and
1024 modifying memory can trash the frame cache, we save the old frame
1025 and then restore the new frame afterwards. */
206415a3 1026 old_frame = get_frame_id (deprecated_safe_get_selected_frame ());
cb741690 1027
c906108c
SS
1028 switch (VALUE_LVAL (toval))
1029 {
1030 case lval_internalvar:
1031 set_internalvar (VALUE_INTERNALVAR (toval), fromval);
4aac0db7
UW
1032 return value_of_internalvar (get_type_arch (type),
1033 VALUE_INTERNALVAR (toval));
c906108c
SS
1034
1035 case lval_internalvar_component:
d9e98382
SDJ
1036 {
1037 int offset = value_offset (toval);
1038
1039 /* Are we dealing with a bitfield?
1040
1041 It is important to mention that `value_parent (toval)' is
1042 non-NULL iff `value_bitsize (toval)' is non-zero. */
1043 if (value_bitsize (toval))
1044 {
1045 /* VALUE_INTERNALVAR below refers to the parent value, while
1046 the offset is relative to this parent value. */
1047 gdb_assert (value_parent (value_parent (toval)) == NULL);
1048 offset += value_offset (value_parent (toval));
1049 }
1050
1051 set_internalvar_component (VALUE_INTERNALVAR (toval),
1052 offset,
1053 value_bitpos (toval),
1054 value_bitsize (toval),
1055 fromval);
1056 }
c906108c
SS
1057 break;
1058
1059 case lval_memory:
1060 {
fc1a4b47 1061 const gdb_byte *dest_buffer;
c5aa993b
JM
1062 CORE_ADDR changed_addr;
1063 int changed_len;
10c42a71 1064 gdb_byte buffer[sizeof (LONGEST)];
c906108c 1065
df407dfe 1066 if (value_bitsize (toval))
c5aa993b 1067 {
2d88202a 1068 struct value *parent = value_parent (toval);
2d88202a 1069
a109c7c1 1070 changed_addr = value_address (parent) + value_offset (toval);
df407dfe
AC
1071 changed_len = (value_bitpos (toval)
1072 + value_bitsize (toval)
c5aa993b
JM
1073 + HOST_CHAR_BIT - 1)
1074 / HOST_CHAR_BIT;
c906108c 1075
4ea48cc1
DJ
1076 /* If we can read-modify-write exactly the size of the
1077 containing type (e.g. short or int) then do so. This
1078 is safer for volatile bitfields mapped to hardware
1079 registers. */
1080 if (changed_len < TYPE_LENGTH (type)
1081 && TYPE_LENGTH (type) <= (int) sizeof (LONGEST)
2d88202a 1082 && ((LONGEST) changed_addr % TYPE_LENGTH (type)) == 0)
4ea48cc1
DJ
1083 changed_len = TYPE_LENGTH (type);
1084
c906108c 1085 if (changed_len > (int) sizeof (LONGEST))
3e43a32a
MS
1086 error (_("Can't handle bitfields which "
1087 "don't fit in a %d bit word."),
baa6f10b 1088 (int) sizeof (LONGEST) * HOST_CHAR_BIT);
c906108c 1089
2d88202a 1090 read_memory (changed_addr, buffer, changed_len);
50810684 1091 modify_field (type, buffer, value_as_long (fromval),
df407dfe 1092 value_bitpos (toval), value_bitsize (toval));
c906108c
SS
1093 dest_buffer = buffer;
1094 }
c906108c
SS
1095 else
1096 {
42ae5230 1097 changed_addr = value_address (toval);
3ae385af 1098 changed_len = type_length_units (type);
0fd88904 1099 dest_buffer = value_contents (fromval);
c906108c
SS
1100 }
1101
972daa01 1102 write_memory_with_notification (changed_addr, dest_buffer, changed_len);
c906108c
SS
1103 }
1104 break;
1105
492254e9 1106 case lval_register:
c906108c 1107 {
c906108c 1108 struct frame_info *frame;
d80b854b 1109 struct gdbarch *gdbarch;
ff2e87ac 1110 int value_reg;
c906108c
SS
1111
1112 /* Figure out which frame this is in currently. */
0c16dd26
AC
1113 frame = frame_find_by_id (VALUE_FRAME_ID (toval));
1114 value_reg = VALUE_REGNUM (toval);
c906108c
SS
1115
1116 if (!frame)
8a3fe4f8 1117 error (_("Value being assigned to is no longer active."));
d80b854b
UW
1118
1119 gdbarch = get_frame_arch (frame);
3e871532
LM
1120
1121 if (value_bitsize (toval))
492254e9 1122 {
3e871532
LM
1123 struct value *parent = value_parent (toval);
1124 int offset = value_offset (parent) + value_offset (toval);
1125 int changed_len;
1126 gdb_byte buffer[sizeof (LONGEST)];
1127 int optim, unavail;
1128
1129 changed_len = (value_bitpos (toval)
1130 + value_bitsize (toval)
1131 + HOST_CHAR_BIT - 1)
1132 / HOST_CHAR_BIT;
1133
1134 if (changed_len > (int) sizeof (LONGEST))
1135 error (_("Can't handle bitfields which "
1136 "don't fit in a %d bit word."),
1137 (int) sizeof (LONGEST) * HOST_CHAR_BIT);
1138
1139 if (!get_frame_register_bytes (frame, value_reg, offset,
1140 changed_len, buffer,
1141 &optim, &unavail))
1142 {
1143 if (optim)
1144 throw_error (OPTIMIZED_OUT_ERROR,
1145 _("value has been optimized out"));
1146 if (unavail)
1147 throw_error (NOT_AVAILABLE_ERROR,
1148 _("value is not available"));
1149 }
1150
1151 modify_field (type, buffer, value_as_long (fromval),
1152 value_bitpos (toval), value_bitsize (toval));
1153
1154 put_frame_register_bytes (frame, value_reg, offset,
1155 changed_len, buffer);
492254e9 1156 }
c906108c 1157 else
492254e9 1158 {
3e871532
LM
1159 if (gdbarch_convert_register_p (gdbarch, VALUE_REGNUM (toval),
1160 type))
00fa51f6 1161 {
3e871532
LM
1162 /* If TOVAL is a special machine register requiring
1163 conversion of program values to a special raw
1164 format. */
1165 gdbarch_value_to_register (gdbarch, frame,
1166 VALUE_REGNUM (toval), type,
1167 value_contents (fromval));
00fa51f6 1168 }
c906108c 1169 else
00fa51f6
UW
1170 {
1171 put_frame_register_bytes (frame, value_reg,
1172 value_offset (toval),
1173 TYPE_LENGTH (type),
1174 value_contents (fromval));
1175 }
ff2e87ac 1176 }
00fa51f6 1177
162078c8 1178 observer_notify_register_changed (frame, value_reg);
ff2e87ac 1179 break;
c906108c 1180 }
5f5233d4
PA
1181
1182 case lval_computed:
1183 {
c8f2448a 1184 const struct lval_funcs *funcs = value_computed_funcs (toval);
5f5233d4 1185
ac71a68c
JK
1186 if (funcs->write != NULL)
1187 {
1188 funcs->write (toval, fromval);
1189 break;
1190 }
5f5233d4 1191 }
ac71a68c 1192 /* Fall through. */
5f5233d4 1193
c906108c 1194 default:
8a3fe4f8 1195 error (_("Left operand of assignment is not an lvalue."));
c906108c
SS
1196 }
1197
cb741690
DJ
1198 /* Assigning to the stack pointer, frame pointer, and other
1199 (architecture and calling convention specific) registers may
d649a38e 1200 cause the frame cache and regcache to be out of date. Assigning to memory
cb741690
DJ
1201 also can. We just do this on all assignments to registers or
1202 memory, for simplicity's sake; I doubt the slowdown matters. */
1203 switch (VALUE_LVAL (toval))
1204 {
1205 case lval_memory:
1206 case lval_register:
0e03807e 1207 case lval_computed:
cb741690 1208
d649a38e 1209 observer_notify_target_changed (&current_target);
cb741690 1210
ac3eeb49
MS
1211 /* Having destroyed the frame cache, restore the selected
1212 frame. */
cb741690
DJ
1213
1214 /* FIXME: cagney/2002-11-02: There has to be a better way of
1215 doing this. Instead of constantly saving/restoring the
1216 frame. Why not create a get_selected_frame() function that,
1217 having saved the selected frame's ID can automatically
1218 re-find the previously selected frame automatically. */
1219
1220 {
1221 struct frame_info *fi = frame_find_by_id (old_frame);
a109c7c1 1222
cb741690
DJ
1223 if (fi != NULL)
1224 select_frame (fi);
1225 }
1226
1227 break;
1228 default:
1229 break;
1230 }
1231
ac3eeb49
MS
1232 /* If the field does not entirely fill a LONGEST, then zero the sign
1233 bits. If the field is signed, and is negative, then sign
1234 extend. */
df407dfe
AC
1235 if ((value_bitsize (toval) > 0)
1236 && (value_bitsize (toval) < 8 * (int) sizeof (LONGEST)))
c906108c
SS
1237 {
1238 LONGEST fieldval = value_as_long (fromval);
df407dfe 1239 LONGEST valmask = (((ULONGEST) 1) << value_bitsize (toval)) - 1;
c906108c
SS
1240
1241 fieldval &= valmask;
ac3eeb49
MS
1242 if (!TYPE_UNSIGNED (type)
1243 && (fieldval & (valmask ^ (valmask >> 1))))
c906108c
SS
1244 fieldval |= ~valmask;
1245
1246 fromval = value_from_longest (type, fieldval);
1247 }
1248
4aac0db7
UW
1249 /* The return value is a copy of TOVAL so it shares its location
1250 information, but its contents are updated from FROMVAL. This
1251 implies the returned value is not lazy, even if TOVAL was. */
c906108c 1252 val = value_copy (toval);
4aac0db7 1253 set_value_lazy (val, 0);
0fd88904 1254 memcpy (value_contents_raw (val), value_contents (fromval),
c906108c 1255 TYPE_LENGTH (type));
4aac0db7
UW
1256
1257 /* We copy over the enclosing type and pointed-to offset from FROMVAL
1258 in the case of pointer types. For object types, the enclosing type
1259 and embedded offset must *not* be copied: the target object refered
1260 to by TOVAL retains its original dynamic type after assignment. */
1261 if (TYPE_CODE (type) == TYPE_CODE_PTR)
1262 {
1263 set_value_enclosing_type (val, value_enclosing_type (fromval));
1264 set_value_pointed_to_offset (val, value_pointed_to_offset (fromval));
1265 }
c5aa993b 1266
c906108c
SS
1267 return val;
1268}
1269
1270/* Extend a value VAL to COUNT repetitions of its type. */
1271
f23631e4
AC
1272struct value *
1273value_repeat (struct value *arg1, int count)
c906108c 1274{
f23631e4 1275 struct value *val;
c906108c
SS
1276
1277 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1278 error (_("Only values in memory can be extended with '@'."));
c906108c 1279 if (count < 1)
8a3fe4f8 1280 error (_("Invalid number %d of repetitions."), count);
c906108c 1281
4754a64e 1282 val = allocate_repeat_value (value_enclosing_type (arg1), count);
c906108c 1283
c906108c 1284 VALUE_LVAL (val) = lval_memory;
42ae5230 1285 set_value_address (val, value_address (arg1));
c906108c 1286
24e6bcee
PA
1287 read_value_memory (val, 0, value_stack (val), value_address (val),
1288 value_contents_all_raw (val),
3ae385af 1289 type_length_units (value_enclosing_type (val)));
24e6bcee 1290
c906108c
SS
1291 return val;
1292}
1293
f23631e4 1294struct value *
9df2fbc4 1295value_of_variable (struct symbol *var, const struct block *b)
c906108c 1296{
63e43d3a 1297 struct frame_info *frame = NULL;
c906108c 1298
63e43d3a 1299 if (symbol_read_needs_frame (var))
61212c0f 1300 frame = get_selected_frame (_("No frame selected."));
c906108c 1301
63e43d3a 1302 return read_var_value (var, b, frame);
c906108c
SS
1303}
1304
61212c0f 1305struct value *
270140bd 1306address_of_variable (struct symbol *var, const struct block *b)
61212c0f
UW
1307{
1308 struct type *type = SYMBOL_TYPE (var);
1309 struct value *val;
1310
1311 /* Evaluate it first; if the result is a memory address, we're fine.
581e13c1 1312 Lazy evaluation pays off here. */
61212c0f
UW
1313
1314 val = value_of_variable (var, b);
9f1f738a 1315 type = value_type (val);
61212c0f
UW
1316
1317 if ((VALUE_LVAL (val) == lval_memory && value_lazy (val))
1318 || TYPE_CODE (type) == TYPE_CODE_FUNC)
1319 {
42ae5230 1320 CORE_ADDR addr = value_address (val);
a109c7c1 1321
61212c0f
UW
1322 return value_from_pointer (lookup_pointer_type (type), addr);
1323 }
1324
1325 /* Not a memory address; check what the problem was. */
1326 switch (VALUE_LVAL (val))
1327 {
1328 case lval_register:
1329 {
1330 struct frame_info *frame;
1331 const char *regname;
1332
1333 frame = frame_find_by_id (VALUE_FRAME_ID (val));
1334 gdb_assert (frame);
1335
1336 regname = gdbarch_register_name (get_frame_arch (frame),
1337 VALUE_REGNUM (val));
1338 gdb_assert (regname && *regname);
1339
1340 error (_("Address requested for identifier "
1341 "\"%s\" which is in register $%s"),
1342 SYMBOL_PRINT_NAME (var), regname);
1343 break;
1344 }
1345
1346 default:
1347 error (_("Can't take address of \"%s\" which isn't an lvalue."),
1348 SYMBOL_PRINT_NAME (var));
1349 break;
1350 }
1351
1352 return val;
1353}
1354
63092375
DJ
1355/* Return one if VAL does not live in target memory, but should in order
1356 to operate on it. Otherwise return zero. */
1357
1358int
1359value_must_coerce_to_target (struct value *val)
1360{
1361 struct type *valtype;
1362
1363 /* The only lval kinds which do not live in target memory. */
1364 if (VALUE_LVAL (val) != not_lval
e81e7f5e
SC
1365 && VALUE_LVAL (val) != lval_internalvar
1366 && VALUE_LVAL (val) != lval_xcallable)
63092375
DJ
1367 return 0;
1368
1369 valtype = check_typedef (value_type (val));
1370
1371 switch (TYPE_CODE (valtype))
1372 {
1373 case TYPE_CODE_ARRAY:
3cbaedff 1374 return TYPE_VECTOR (valtype) ? 0 : 1;
63092375
DJ
1375 case TYPE_CODE_STRING:
1376 return 1;
1377 default:
1378 return 0;
1379 }
1380}
1381
3e43a32a
MS
1382/* Make sure that VAL lives in target memory if it's supposed to. For
1383 instance, strings are constructed as character arrays in GDB's
1384 storage, and this function copies them to the target. */
63092375
DJ
1385
1386struct value *
1387value_coerce_to_target (struct value *val)
1388{
1389 LONGEST length;
1390 CORE_ADDR addr;
1391
1392 if (!value_must_coerce_to_target (val))
1393 return val;
1394
1395 length = TYPE_LENGTH (check_typedef (value_type (val)));
1396 addr = allocate_space_in_inferior (length);
1397 write_memory (addr, value_contents (val), length);
1398 return value_at_lazy (value_type (val), addr);
1399}
1400
ac3eeb49
MS
1401/* Given a value which is an array, return a value which is a pointer
1402 to its first element, regardless of whether or not the array has a
1403 nonzero lower bound.
c906108c 1404
ac3eeb49
MS
1405 FIXME: A previous comment here indicated that this routine should
1406 be substracting the array's lower bound. It's not clear to me that
1407 this is correct. Given an array subscripting operation, it would
1408 certainly work to do the adjustment here, essentially computing:
c906108c
SS
1409
1410 (&array[0] - (lowerbound * sizeof array[0])) + (index * sizeof array[0])
1411
ac3eeb49
MS
1412 However I believe a more appropriate and logical place to account
1413 for the lower bound is to do so in value_subscript, essentially
1414 computing:
c906108c
SS
1415
1416 (&array[0] + ((index - lowerbound) * sizeof array[0]))
1417
ac3eeb49
MS
1418 As further evidence consider what would happen with operations
1419 other than array subscripting, where the caller would get back a
1420 value that had an address somewhere before the actual first element
1421 of the array, and the information about the lower bound would be
581e13c1 1422 lost because of the coercion to pointer type. */
c906108c 1423
f23631e4
AC
1424struct value *
1425value_coerce_array (struct value *arg1)
c906108c 1426{
df407dfe 1427 struct type *type = check_typedef (value_type (arg1));
c906108c 1428
63092375
DJ
1429 /* If the user tries to do something requiring a pointer with an
1430 array that has not yet been pushed to the target, then this would
1431 be a good time to do so. */
1432 arg1 = value_coerce_to_target (arg1);
1433
c906108c 1434 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1435 error (_("Attempt to take address of value not located in memory."));
c906108c 1436
4478b372 1437 return value_from_pointer (lookup_pointer_type (TYPE_TARGET_TYPE (type)),
42ae5230 1438 value_address (arg1));
c906108c
SS
1439}
1440
1441/* Given a value which is a function, return a value which is a pointer
1442 to it. */
1443
f23631e4
AC
1444struct value *
1445value_coerce_function (struct value *arg1)
c906108c 1446{
f23631e4 1447 struct value *retval;
c906108c
SS
1448
1449 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1450 error (_("Attempt to take address of value not located in memory."));
c906108c 1451
df407dfe 1452 retval = value_from_pointer (lookup_pointer_type (value_type (arg1)),
42ae5230 1453 value_address (arg1));
c906108c 1454 return retval;
c5aa993b 1455}
c906108c 1456
ac3eeb49
MS
1457/* Return a pointer value for the object for which ARG1 is the
1458 contents. */
c906108c 1459
f23631e4
AC
1460struct value *
1461value_addr (struct value *arg1)
c906108c 1462{
f23631e4 1463 struct value *arg2;
df407dfe 1464 struct type *type = check_typedef (value_type (arg1));
a109c7c1 1465
c906108c
SS
1466 if (TYPE_CODE (type) == TYPE_CODE_REF)
1467 {
ac3eeb49 1468 /* Copy the value, but change the type from (T&) to (T*). We
a22df60a
MG
1469 keep the same location information, which is efficient, and
1470 allows &(&X) to get the location containing the reference.
1471 Do the same to its enclosing type for consistency. */
1472 struct type *type_ptr
1473 = lookup_pointer_type (TYPE_TARGET_TYPE (type));
1474 struct type *enclosing_type
1475 = check_typedef (value_enclosing_type (arg1));
1476 struct type *enclosing_type_ptr
1477 = lookup_pointer_type (TYPE_TARGET_TYPE (enclosing_type));
1478
c906108c 1479 arg2 = value_copy (arg1);
a22df60a
MG
1480 deprecated_set_value_type (arg2, type_ptr);
1481 set_value_enclosing_type (arg2, enclosing_type_ptr);
1482
c906108c
SS
1483 return arg2;
1484 }
1485 if (TYPE_CODE (type) == TYPE_CODE_FUNC)
1486 return value_coerce_function (arg1);
1487
63092375
DJ
1488 /* If this is an array that has not yet been pushed to the target,
1489 then this would be a good time to force it to memory. */
1490 arg1 = value_coerce_to_target (arg1);
1491
c906108c 1492 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1493 error (_("Attempt to take address of value not located in memory."));
c906108c 1494
581e13c1 1495 /* Get target memory address. */
df407dfe 1496 arg2 = value_from_pointer (lookup_pointer_type (value_type (arg1)),
42ae5230 1497 (value_address (arg1)
13c3b5f5 1498 + value_embedded_offset (arg1)));
c906108c
SS
1499
1500 /* This may be a pointer to a base subobject; so remember the
ac3eeb49 1501 full derived object's type ... */
4dfea560
DE
1502 set_value_enclosing_type (arg2,
1503 lookup_pointer_type (value_enclosing_type (arg1)));
ac3eeb49
MS
1504 /* ... and also the relative position of the subobject in the full
1505 object. */
b44d461b 1506 set_value_pointed_to_offset (arg2, value_embedded_offset (arg1));
c906108c
SS
1507 return arg2;
1508}
1509
ac3eeb49
MS
1510/* Return a reference value for the object for which ARG1 is the
1511 contents. */
fb933624
DJ
1512
1513struct value *
1514value_ref (struct value *arg1)
1515{
1516 struct value *arg2;
fb933624 1517 struct type *type = check_typedef (value_type (arg1));
a109c7c1 1518
fb933624
DJ
1519 if (TYPE_CODE (type) == TYPE_CODE_REF)
1520 return arg1;
1521
1522 arg2 = value_addr (arg1);
1523 deprecated_set_value_type (arg2, lookup_reference_type (type));
1524 return arg2;
1525}
1526
ac3eeb49
MS
1527/* Given a value of a pointer type, apply the C unary * operator to
1528 it. */
c906108c 1529
f23631e4
AC
1530struct value *
1531value_ind (struct value *arg1)
c906108c
SS
1532{
1533 struct type *base_type;
f23631e4 1534 struct value *arg2;
c906108c 1535
994b9211 1536 arg1 = coerce_array (arg1);
c906108c 1537
df407dfe 1538 base_type = check_typedef (value_type (arg1));
c906108c 1539
8cf6f0b1
TT
1540 if (VALUE_LVAL (arg1) == lval_computed)
1541 {
c8f2448a 1542 const struct lval_funcs *funcs = value_computed_funcs (arg1);
8cf6f0b1
TT
1543
1544 if (funcs->indirect)
1545 {
1546 struct value *result = funcs->indirect (arg1);
1547
1548 if (result)
1549 return result;
1550 }
1551 }
1552
22fe0fbb 1553 if (TYPE_CODE (base_type) == TYPE_CODE_PTR)
c906108c
SS
1554 {
1555 struct type *enc_type;
a109c7c1 1556
ac3eeb49
MS
1557 /* We may be pointing to something embedded in a larger object.
1558 Get the real type of the enclosing object. */
4754a64e 1559 enc_type = check_typedef (value_enclosing_type (arg1));
c906108c 1560 enc_type = TYPE_TARGET_TYPE (enc_type);
0d5de010
DJ
1561
1562 if (TYPE_CODE (check_typedef (enc_type)) == TYPE_CODE_FUNC
1563 || TYPE_CODE (check_typedef (enc_type)) == TYPE_CODE_METHOD)
1564 /* For functions, go through find_function_addr, which knows
1565 how to handle function descriptors. */
ac3eeb49
MS
1566 arg2 = value_at_lazy (enc_type,
1567 find_function_addr (arg1, NULL));
0d5de010 1568 else
581e13c1 1569 /* Retrieve the enclosing object pointed to. */
ac3eeb49
MS
1570 arg2 = value_at_lazy (enc_type,
1571 (value_as_address (arg1)
1572 - value_pointed_to_offset (arg1)));
0d5de010 1573
9f1f738a 1574 enc_type = value_type (arg2);
dfcee124 1575 return readjust_indirect_value_type (arg2, enc_type, base_type, arg1);
c906108c
SS
1576 }
1577
8a3fe4f8 1578 error (_("Attempt to take contents of a non-pointer value."));
ac3eeb49 1579 return 0; /* For lint -- never reached. */
c906108c
SS
1580}
1581\f
39d37385
PA
1582/* Create a value for an array by allocating space in GDB, copying the
1583 data into that space, and then setting up an array value.
c906108c 1584
ac3eeb49
MS
1585 The array bounds are set from LOWBOUND and HIGHBOUND, and the array
1586 is populated from the values passed in ELEMVEC.
c906108c
SS
1587
1588 The element type of the array is inherited from the type of the
1589 first element, and all elements must have the same size (though we
ac3eeb49 1590 don't currently enforce any restriction on their types). */
c906108c 1591
f23631e4
AC
1592struct value *
1593value_array (int lowbound, int highbound, struct value **elemvec)
c906108c
SS
1594{
1595 int nelem;
1596 int idx;
1597 unsigned int typelength;
f23631e4 1598 struct value *val;
c906108c 1599 struct type *arraytype;
c906108c 1600
ac3eeb49
MS
1601 /* Validate that the bounds are reasonable and that each of the
1602 elements have the same size. */
c906108c
SS
1603
1604 nelem = highbound - lowbound + 1;
1605 if (nelem <= 0)
1606 {
8a3fe4f8 1607 error (_("bad array bounds (%d, %d)"), lowbound, highbound);
c906108c 1608 }
3ae385af 1609 typelength = type_length_units (value_enclosing_type (elemvec[0]));
c906108c
SS
1610 for (idx = 1; idx < nelem; idx++)
1611 {
3ae385af
SM
1612 if (type_length_units (value_enclosing_type (elemvec[idx]))
1613 != typelength)
c906108c 1614 {
8a3fe4f8 1615 error (_("array elements must all be the same size"));
c906108c
SS
1616 }
1617 }
1618
e3506a9f
UW
1619 arraytype = lookup_array_range_type (value_enclosing_type (elemvec[0]),
1620 lowbound, highbound);
c906108c
SS
1621
1622 if (!current_language->c_style_arrays)
1623 {
1624 val = allocate_value (arraytype);
1625 for (idx = 0; idx < nelem; idx++)
39d37385
PA
1626 value_contents_copy (val, idx * typelength, elemvec[idx], 0,
1627 typelength);
c906108c
SS
1628 return val;
1629 }
1630
63092375
DJ
1631 /* Allocate space to store the array, and then initialize it by
1632 copying in each element. */
c906108c 1633
63092375 1634 val = allocate_value (arraytype);
c906108c 1635 for (idx = 0; idx < nelem; idx++)
39d37385 1636 value_contents_copy (val, idx * typelength, elemvec[idx], 0, typelength);
63092375 1637 return val;
c906108c
SS
1638}
1639
6c7a06a3 1640struct value *
e3a3797e 1641value_cstring (const char *ptr, ssize_t len, struct type *char_type)
6c7a06a3
TT
1642{
1643 struct value *val;
1644 int lowbound = current_language->string_lower_bound;
63375b74 1645 ssize_t highbound = len / TYPE_LENGTH (char_type);
6c7a06a3 1646 struct type *stringtype
e3506a9f 1647 = lookup_array_range_type (char_type, lowbound, highbound + lowbound - 1);
6c7a06a3
TT
1648
1649 val = allocate_value (stringtype);
1650 memcpy (value_contents_raw (val), ptr, len);
1651 return val;
1652}
1653
ac3eeb49
MS
1654/* Create a value for a string constant by allocating space in the
1655 inferior, copying the data into that space, and returning the
1656 address with type TYPE_CODE_STRING. PTR points to the string
1657 constant data; LEN is number of characters.
1658
1659 Note that string types are like array of char types with a lower
1660 bound of zero and an upper bound of LEN - 1. Also note that the
1661 string may contain embedded null bytes. */
c906108c 1662
f23631e4 1663struct value *
7cc3f8e2 1664value_string (const char *ptr, ssize_t len, struct type *char_type)
c906108c 1665{
f23631e4 1666 struct value *val;
c906108c 1667 int lowbound = current_language->string_lower_bound;
63375b74 1668 ssize_t highbound = len / TYPE_LENGTH (char_type);
c906108c 1669 struct type *stringtype
e3506a9f 1670 = lookup_string_range_type (char_type, lowbound, highbound + lowbound - 1);
c906108c 1671
3b7538c0
UW
1672 val = allocate_value (stringtype);
1673 memcpy (value_contents_raw (val), ptr, len);
1674 return val;
c906108c
SS
1675}
1676
c906108c 1677\f
ac3eeb49
MS
1678/* See if we can pass arguments in T2 to a function which takes
1679 arguments of types T1. T1 is a list of NARGS arguments, and T2 is
1680 a NULL-terminated vector. If some arguments need coercion of some
1681 sort, then the coerced values are written into T2. Return value is
1682 0 if the arguments could be matched, or the position at which they
1683 differ if not.
c906108c 1684
ac3eeb49
MS
1685 STATICP is nonzero if the T1 argument list came from a static
1686 member function. T2 will still include the ``this'' pointer, but
1687 it will be skipped.
c906108c
SS
1688
1689 For non-static member functions, we ignore the first argument,
ac3eeb49
MS
1690 which is the type of the instance variable. This is because we
1691 want to handle calls with objects from derived classes. This is
1692 not entirely correct: we should actually check to make sure that a
c906108c
SS
1693 requested operation is type secure, shouldn't we? FIXME. */
1694
1695static int
ad2f7632
DJ
1696typecmp (int staticp, int varargs, int nargs,
1697 struct field t1[], struct value *t2[])
c906108c
SS
1698{
1699 int i;
1700
1701 if (t2 == 0)
ac3eeb49
MS
1702 internal_error (__FILE__, __LINE__,
1703 _("typecmp: no argument list"));
ad2f7632 1704
ac3eeb49
MS
1705 /* Skip ``this'' argument if applicable. T2 will always include
1706 THIS. */
4a1970e4 1707 if (staticp)
ad2f7632
DJ
1708 t2 ++;
1709
1710 for (i = 0;
1711 (i < nargs) && TYPE_CODE (t1[i].type) != TYPE_CODE_VOID;
1712 i++)
c906108c 1713 {
c5aa993b 1714 struct type *tt1, *tt2;
ad2f7632 1715
c5aa993b
JM
1716 if (!t2[i])
1717 return i + 1;
ad2f7632
DJ
1718
1719 tt1 = check_typedef (t1[i].type);
df407dfe 1720 tt2 = check_typedef (value_type (t2[i]));
ad2f7632 1721
c906108c 1722 if (TYPE_CODE (tt1) == TYPE_CODE_REF
8301c89e 1723 /* We should be doing hairy argument matching, as below. */
3e43a32a
MS
1724 && (TYPE_CODE (check_typedef (TYPE_TARGET_TYPE (tt1)))
1725 == TYPE_CODE (tt2)))
c906108c
SS
1726 {
1727 if (TYPE_CODE (tt2) == TYPE_CODE_ARRAY)
1728 t2[i] = value_coerce_array (t2[i]);
1729 else
fb933624 1730 t2[i] = value_ref (t2[i]);
c906108c
SS
1731 continue;
1732 }
1733
802db21b
DB
1734 /* djb - 20000715 - Until the new type structure is in the
1735 place, and we can attempt things like implicit conversions,
1736 we need to do this so you can take something like a map<const
1737 char *>, and properly access map["hello"], because the
1738 argument to [] will be a reference to a pointer to a char,
ac3eeb49
MS
1739 and the argument will be a pointer to a char. */
1740 while (TYPE_CODE(tt1) == TYPE_CODE_REF
1741 || TYPE_CODE (tt1) == TYPE_CODE_PTR)
802db21b
DB
1742 {
1743 tt1 = check_typedef( TYPE_TARGET_TYPE(tt1) );
1744 }
ac3eeb49
MS
1745 while (TYPE_CODE(tt2) == TYPE_CODE_ARRAY
1746 || TYPE_CODE(tt2) == TYPE_CODE_PTR
1747 || TYPE_CODE(tt2) == TYPE_CODE_REF)
c906108c 1748 {
ac3eeb49 1749 tt2 = check_typedef (TYPE_TARGET_TYPE(tt2));
c906108c 1750 }
c5aa993b
JM
1751 if (TYPE_CODE (tt1) == TYPE_CODE (tt2))
1752 continue;
ac3eeb49
MS
1753 /* Array to pointer is a `trivial conversion' according to the
1754 ARM. */
c906108c 1755
ac3eeb49
MS
1756 /* We should be doing much hairier argument matching (see
1757 section 13.2 of the ARM), but as a quick kludge, just check
1758 for the same type code. */
df407dfe 1759 if (TYPE_CODE (t1[i].type) != TYPE_CODE (value_type (t2[i])))
c5aa993b 1760 return i + 1;
c906108c 1761 }
ad2f7632 1762 if (varargs || t2[i] == NULL)
c5aa993b 1763 return 0;
ad2f7632 1764 return i + 1;
c906108c
SS
1765}
1766
b1af9e97
TT
1767/* Helper class for do_search_struct_field that updates *RESULT_PTR
1768 and *LAST_BOFFSET, and possibly throws an exception if the field
1769 search has yielded ambiguous results. */
c906108c 1770
b1af9e97
TT
1771static void
1772update_search_result (struct value **result_ptr, struct value *v,
1773 int *last_boffset, int boffset,
1774 const char *name, struct type *type)
1775{
1776 if (v != NULL)
1777 {
1778 if (*result_ptr != NULL
1779 /* The result is not ambiguous if all the classes that are
1780 found occupy the same space. */
1781 && *last_boffset != boffset)
1782 error (_("base class '%s' is ambiguous in type '%s'"),
1783 name, TYPE_SAFE_NAME (type));
1784 *result_ptr = v;
1785 *last_boffset = boffset;
1786 }
1787}
c906108c 1788
b1af9e97
TT
1789/* A helper for search_struct_field. This does all the work; most
1790 arguments are as passed to search_struct_field. The result is
1791 stored in *RESULT_PTR, which must be initialized to NULL.
1792 OUTERMOST_TYPE is the type of the initial type passed to
1793 search_struct_field; this is used for error reporting when the
1794 lookup is ambiguous. */
1795
1796static void
1797do_search_struct_field (const char *name, struct value *arg1, int offset,
1798 struct type *type, int looking_for_baseclass,
1799 struct value **result_ptr,
1800 int *last_boffset,
1801 struct type *outermost_type)
c906108c
SS
1802{
1803 int i;
edf3d5f3 1804 int nbases;
c906108c 1805
f168693b 1806 type = check_typedef (type);
edf3d5f3 1807 nbases = TYPE_N_BASECLASSES (type);
c906108c 1808
c5aa993b 1809 if (!looking_for_baseclass)
c906108c
SS
1810 for (i = TYPE_NFIELDS (type) - 1; i >= nbases; i--)
1811 {
0d5cff50 1812 const char *t_field_name = TYPE_FIELD_NAME (type, i);
c906108c 1813
db577aea 1814 if (t_field_name && (strcmp_iw (t_field_name, name) == 0))
c906108c 1815 {
f23631e4 1816 struct value *v;
a109c7c1 1817
d6a843b5 1818 if (field_is_static (&TYPE_FIELD (type, i)))
686d4def 1819 v = value_static_field (type, i);
c906108c 1820 else
b1af9e97
TT
1821 v = value_primitive_field (arg1, offset, i, type);
1822 *result_ptr = v;
1823 return;
c906108c
SS
1824 }
1825
1826 if (t_field_name
47c6ee49 1827 && t_field_name[0] == '\0')
c906108c
SS
1828 {
1829 struct type *field_type = TYPE_FIELD_TYPE (type, i);
a109c7c1 1830
c906108c
SS
1831 if (TYPE_CODE (field_type) == TYPE_CODE_UNION
1832 || TYPE_CODE (field_type) == TYPE_CODE_STRUCT)
1833 {
ac3eeb49
MS
1834 /* Look for a match through the fields of an anonymous
1835 union, or anonymous struct. C++ provides anonymous
1836 unions.
c906108c 1837
1b831c93
AC
1838 In the GNU Chill (now deleted from GDB)
1839 implementation of variant record types, each
1840 <alternative field> has an (anonymous) union type,
1841 each member of the union represents a <variant
1842 alternative>. Each <variant alternative> is
1843 represented as a struct, with a member for each
1844 <variant field>. */
c5aa993b 1845
b1af9e97 1846 struct value *v = NULL;
c906108c
SS
1847 int new_offset = offset;
1848
db034ac5
AC
1849 /* This is pretty gross. In G++, the offset in an
1850 anonymous union is relative to the beginning of the
1b831c93
AC
1851 enclosing struct. In the GNU Chill (now deleted
1852 from GDB) implementation of variant records, the
1853 bitpos is zero in an anonymous union field, so we
ac3eeb49 1854 have to add the offset of the union here. */
c906108c
SS
1855 if (TYPE_CODE (field_type) == TYPE_CODE_STRUCT
1856 || (TYPE_NFIELDS (field_type) > 0
1857 && TYPE_FIELD_BITPOS (field_type, 0) == 0))
1858 new_offset += TYPE_FIELD_BITPOS (type, i) / 8;
1859
b1af9e97
TT
1860 do_search_struct_field (name, arg1, new_offset,
1861 field_type,
1862 looking_for_baseclass, &v,
1863 last_boffset,
1864 outermost_type);
c906108c 1865 if (v)
b1af9e97
TT
1866 {
1867 *result_ptr = v;
1868 return;
1869 }
c906108c
SS
1870 }
1871 }
1872 }
1873
c5aa993b 1874 for (i = 0; i < nbases; i++)
c906108c 1875 {
b1af9e97 1876 struct value *v = NULL;
c906108c 1877 struct type *basetype = check_typedef (TYPE_BASECLASS (type, i));
ac3eeb49
MS
1878 /* If we are looking for baseclasses, this is what we get when
1879 we hit them. But it could happen that the base part's member
1880 name is not yet filled in. */
c906108c
SS
1881 int found_baseclass = (looking_for_baseclass
1882 && TYPE_BASECLASS_NAME (type, i) != NULL
ac3eeb49
MS
1883 && (strcmp_iw (name,
1884 TYPE_BASECLASS_NAME (type,
1885 i)) == 0));
b1af9e97 1886 int boffset = value_embedded_offset (arg1) + offset;
c906108c
SS
1887
1888 if (BASETYPE_VIA_VIRTUAL (type, i))
1889 {
3e3d7139 1890 struct value *v2;
c906108c
SS
1891
1892 boffset = baseclass_offset (type, i,
8af8e3bc
PA
1893 value_contents_for_printing (arg1),
1894 value_embedded_offset (arg1) + offset,
1895 value_address (arg1),
1896 arg1);
c906108c 1897
ac3eeb49 1898 /* The virtual base class pointer might have been clobbered
581e13c1 1899 by the user program. Make sure that it still points to a
ac3eeb49 1900 valid memory location. */
c906108c 1901
1a334831
TT
1902 boffset += value_embedded_offset (arg1) + offset;
1903 if (boffset < 0
1904 || boffset >= TYPE_LENGTH (value_enclosing_type (arg1)))
c906108c
SS
1905 {
1906 CORE_ADDR base_addr;
c5aa993b 1907
42ae5230 1908 base_addr = value_address (arg1) + boffset;
08039c9e 1909 v2 = value_at_lazy (basetype, base_addr);
ac3eeb49
MS
1910 if (target_read_memory (base_addr,
1911 value_contents_raw (v2),
acc900c2 1912 TYPE_LENGTH (value_type (v2))) != 0)
8a3fe4f8 1913 error (_("virtual baseclass botch"));
c906108c
SS
1914 }
1915 else
1916 {
1a334831
TT
1917 v2 = value_copy (arg1);
1918 deprecated_set_value_type (v2, basetype);
1919 set_value_embedded_offset (v2, boffset);
c906108c
SS
1920 }
1921
1922 if (found_baseclass)
b1af9e97
TT
1923 v = v2;
1924 else
1925 {
1926 do_search_struct_field (name, v2, 0,
1927 TYPE_BASECLASS (type, i),
1928 looking_for_baseclass,
1929 result_ptr, last_boffset,
1930 outermost_type);
1931 }
c906108c
SS
1932 }
1933 else if (found_baseclass)
1934 v = value_primitive_field (arg1, offset, i, type);
1935 else
b1af9e97
TT
1936 {
1937 do_search_struct_field (name, arg1,
1938 offset + TYPE_BASECLASS_BITPOS (type,
1939 i) / 8,
1940 basetype, looking_for_baseclass,
1941 result_ptr, last_boffset,
1942 outermost_type);
1943 }
1944
1945 update_search_result (result_ptr, v, last_boffset,
1946 boffset, name, outermost_type);
c906108c 1947 }
b1af9e97
TT
1948}
1949
1950/* Helper function used by value_struct_elt to recurse through
8a13d42d
SM
1951 baseclasses. Look for a field NAME in ARG1. Search in it assuming
1952 it has (class) type TYPE. If found, return value, else return NULL.
b1af9e97
TT
1953
1954 If LOOKING_FOR_BASECLASS, then instead of looking for struct
1955 fields, look for a baseclass named NAME. */
1956
1957static struct value *
8a13d42d 1958search_struct_field (const char *name, struct value *arg1,
b1af9e97
TT
1959 struct type *type, int looking_for_baseclass)
1960{
1961 struct value *result = NULL;
1962 int boffset = 0;
1963
8a13d42d 1964 do_search_struct_field (name, arg1, 0, type, looking_for_baseclass,
b1af9e97
TT
1965 &result, &boffset, type);
1966 return result;
c906108c
SS
1967}
1968
ac3eeb49 1969/* Helper function used by value_struct_elt to recurse through
581e13c1 1970 baseclasses. Look for a field NAME in ARG1. Adjust the address of
ac3eeb49
MS
1971 ARG1 by OFFSET bytes, and search in it assuming it has (class) type
1972 TYPE.
1973
1974 If found, return value, else if name matched and args not return
1975 (value) -1, else return NULL. */
c906108c 1976
f23631e4 1977static struct value *
714f19d5 1978search_struct_method (const char *name, struct value **arg1p,
f23631e4 1979 struct value **args, int offset,
aa1ee363 1980 int *static_memfuncp, struct type *type)
c906108c
SS
1981{
1982 int i;
f23631e4 1983 struct value *v;
c906108c
SS
1984 int name_matched = 0;
1985 char dem_opname[64];
1986
f168693b 1987 type = check_typedef (type);
c906108c
SS
1988 for (i = TYPE_NFN_FIELDS (type) - 1; i >= 0; i--)
1989 {
0d5cff50 1990 const char *t_field_name = TYPE_FN_FIELDLIST_NAME (type, i);
a109c7c1 1991
581e13c1 1992 /* FIXME! May need to check for ARM demangling here. */
61012eef
GB
1993 if (startswith (t_field_name, "__") ||
1994 startswith (t_field_name, "op") ||
1995 startswith (t_field_name, "type"))
c906108c 1996 {
c5aa993b
JM
1997 if (cplus_demangle_opname (t_field_name, dem_opname, DMGL_ANSI))
1998 t_field_name = dem_opname;
1999 else if (cplus_demangle_opname (t_field_name, dem_opname, 0))
c906108c 2000 t_field_name = dem_opname;
c906108c 2001 }
db577aea 2002 if (t_field_name && (strcmp_iw (t_field_name, name) == 0))
c906108c
SS
2003 {
2004 int j = TYPE_FN_FIELDLIST_LENGTH (type, i) - 1;
2005 struct fn_field *f = TYPE_FN_FIELDLIST1 (type, i);
c906108c 2006
a109c7c1 2007 name_matched = 1;
de17c821 2008 check_stub_method_group (type, i);
c906108c 2009 if (j > 0 && args == 0)
3e43a32a
MS
2010 error (_("cannot resolve overloaded method "
2011 "`%s': no arguments supplied"), name);
acf5ed49 2012 else if (j == 0 && args == 0)
c906108c 2013 {
acf5ed49
DJ
2014 v = value_fn_field (arg1p, f, j, type, offset);
2015 if (v != NULL)
2016 return v;
c906108c 2017 }
acf5ed49
DJ
2018 else
2019 while (j >= 0)
2020 {
acf5ed49 2021 if (!typecmp (TYPE_FN_FIELD_STATIC_P (f, j),
ad2f7632
DJ
2022 TYPE_VARARGS (TYPE_FN_FIELD_TYPE (f, j)),
2023 TYPE_NFIELDS (TYPE_FN_FIELD_TYPE (f, j)),
acf5ed49
DJ
2024 TYPE_FN_FIELD_ARGS (f, j), args))
2025 {
2026 if (TYPE_FN_FIELD_VIRTUAL_P (f, j))
ac3eeb49
MS
2027 return value_virtual_fn_field (arg1p, f, j,
2028 type, offset);
2029 if (TYPE_FN_FIELD_STATIC_P (f, j)
2030 && static_memfuncp)
acf5ed49
DJ
2031 *static_memfuncp = 1;
2032 v = value_fn_field (arg1p, f, j, type, offset);
2033 if (v != NULL)
2034 return v;
2035 }
2036 j--;
2037 }
c906108c
SS
2038 }
2039 }
2040
2041 for (i = TYPE_N_BASECLASSES (type) - 1; i >= 0; i--)
2042 {
2043 int base_offset;
8af8e3bc 2044 int this_offset;
c906108c
SS
2045
2046 if (BASETYPE_VIA_VIRTUAL (type, i))
2047 {
086280be 2048 struct type *baseclass = check_typedef (TYPE_BASECLASS (type, i));
8af8e3bc 2049 struct value *base_val;
086280be
UW
2050 const gdb_byte *base_valaddr;
2051
2052 /* The virtual base class pointer might have been
581e13c1 2053 clobbered by the user program. Make sure that it
8301c89e 2054 still points to a valid memory location. */
086280be
UW
2055
2056 if (offset < 0 || offset >= TYPE_LENGTH (type))
c5aa993b 2057 {
6c18f3e0
SP
2058 gdb_byte *tmp;
2059 struct cleanup *back_to;
2060 CORE_ADDR address;
2061
224c3ddb 2062 tmp = (gdb_byte *) xmalloc (TYPE_LENGTH (baseclass));
6c18f3e0
SP
2063 back_to = make_cleanup (xfree, tmp);
2064 address = value_address (*arg1p);
a109c7c1 2065
8af8e3bc 2066 if (target_read_memory (address + offset,
086280be
UW
2067 tmp, TYPE_LENGTH (baseclass)) != 0)
2068 error (_("virtual baseclass botch"));
8af8e3bc
PA
2069
2070 base_val = value_from_contents_and_address (baseclass,
2071 tmp,
2072 address + offset);
2073 base_valaddr = value_contents_for_printing (base_val);
2074 this_offset = 0;
6c18f3e0 2075 do_cleanups (back_to);
c5aa993b
JM
2076 }
2077 else
8af8e3bc
PA
2078 {
2079 base_val = *arg1p;
2080 base_valaddr = value_contents_for_printing (*arg1p);
2081 this_offset = offset;
2082 }
c5aa993b 2083
086280be 2084 base_offset = baseclass_offset (type, i, base_valaddr,
8af8e3bc
PA
2085 this_offset, value_address (base_val),
2086 base_val);
c5aa993b 2087 }
c906108c
SS
2088 else
2089 {
2090 base_offset = TYPE_BASECLASS_BITPOS (type, i) / 8;
c5aa993b 2091 }
c906108c
SS
2092 v = search_struct_method (name, arg1p, args, base_offset + offset,
2093 static_memfuncp, TYPE_BASECLASS (type, i));
f23631e4 2094 if (v == (struct value *) - 1)
c906108c
SS
2095 {
2096 name_matched = 1;
2097 }
2098 else if (v)
2099 {
ac3eeb49
MS
2100 /* FIXME-bothner: Why is this commented out? Why is it here? */
2101 /* *arg1p = arg1_tmp; */
c906108c 2102 return v;
c5aa993b 2103 }
c906108c 2104 }
c5aa993b 2105 if (name_matched)
f23631e4 2106 return (struct value *) - 1;
c5aa993b
JM
2107 else
2108 return NULL;
c906108c
SS
2109}
2110
2111/* Given *ARGP, a value of type (pointer to a)* structure/union,
ac3eeb49
MS
2112 extract the component named NAME from the ultimate target
2113 structure/union and return it as a value with its appropriate type.
c906108c
SS
2114 ERR is used in the error message if *ARGP's type is wrong.
2115
2116 C++: ARGS is a list of argument types to aid in the selection of
581e13c1 2117 an appropriate method. Also, handle derived types.
c906108c
SS
2118
2119 STATIC_MEMFUNCP, if non-NULL, points to a caller-supplied location
2120 where the truthvalue of whether the function that was resolved was
2121 a static member function or not is stored.
2122
ac3eeb49
MS
2123 ERR is an error message to be printed in case the field is not
2124 found. */
c906108c 2125
f23631e4
AC
2126struct value *
2127value_struct_elt (struct value **argp, struct value **args,
714f19d5 2128 const char *name, int *static_memfuncp, const char *err)
c906108c 2129{
52f0bd74 2130 struct type *t;
f23631e4 2131 struct value *v;
c906108c 2132
994b9211 2133 *argp = coerce_array (*argp);
c906108c 2134
df407dfe 2135 t = check_typedef (value_type (*argp));
c906108c
SS
2136
2137 /* Follow pointers until we get to a non-pointer. */
2138
2139 while (TYPE_CODE (t) == TYPE_CODE_PTR || TYPE_CODE (t) == TYPE_CODE_REF)
2140 {
2141 *argp = value_ind (*argp);
2142 /* Don't coerce fn pointer to fn and then back again! */
b846d303 2143 if (TYPE_CODE (check_typedef (value_type (*argp))) != TYPE_CODE_FUNC)
994b9211 2144 *argp = coerce_array (*argp);
df407dfe 2145 t = check_typedef (value_type (*argp));
c906108c
SS
2146 }
2147
c5aa993b 2148 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
c906108c 2149 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
2150 error (_("Attempt to extract a component of a value that is not a %s."),
2151 err);
c906108c
SS
2152
2153 /* Assume it's not, unless we see that it is. */
2154 if (static_memfuncp)
c5aa993b 2155 *static_memfuncp = 0;
c906108c
SS
2156
2157 if (!args)
2158 {
2159 /* if there are no arguments ...do this... */
2160
ac3eeb49
MS
2161 /* Try as a field first, because if we succeed, there is less
2162 work to be done. */
8a13d42d 2163 v = search_struct_field (name, *argp, t, 0);
c906108c
SS
2164 if (v)
2165 return v;
2166
2167 /* C++: If it was not found as a data field, then try to
7b83ea04 2168 return it as a pointer to a method. */
ac3eeb49
MS
2169 v = search_struct_method (name, argp, args, 0,
2170 static_memfuncp, t);
c906108c 2171
f23631e4 2172 if (v == (struct value *) - 1)
55b39184 2173 error (_("Cannot take address of method %s."), name);
c906108c
SS
2174 else if (v == 0)
2175 {
2176 if (TYPE_NFN_FIELDS (t))
8a3fe4f8 2177 error (_("There is no member or method named %s."), name);
c906108c 2178 else
8a3fe4f8 2179 error (_("There is no member named %s."), name);
c906108c
SS
2180 }
2181 return v;
2182 }
2183
8301c89e
DE
2184 v = search_struct_method (name, argp, args, 0,
2185 static_memfuncp, t);
7168a814 2186
f23631e4 2187 if (v == (struct value *) - 1)
c906108c 2188 {
3e43a32a
MS
2189 error (_("One of the arguments you tried to pass to %s could not "
2190 "be converted to what the function wants."), name);
c906108c
SS
2191 }
2192 else if (v == 0)
2193 {
ac3eeb49
MS
2194 /* See if user tried to invoke data as function. If so, hand it
2195 back. If it's not callable (i.e., a pointer to function),
7b83ea04 2196 gdb should give an error. */
8a13d42d 2197 v = search_struct_field (name, *argp, t, 0);
fa8de41e
TT
2198 /* If we found an ordinary field, then it is not a method call.
2199 So, treat it as if it were a static member function. */
2200 if (v && static_memfuncp)
2201 *static_memfuncp = 1;
c906108c
SS
2202 }
2203
2204 if (!v)
79afc5ef
SW
2205 throw_error (NOT_FOUND_ERROR,
2206 _("Structure has no component named %s."), name);
c906108c
SS
2207 return v;
2208}
2209
b5b08fb4
SC
2210/* Given *ARGP, a value of type structure or union, or a pointer/reference
2211 to a structure or union, extract and return its component (field) of
2212 type FTYPE at the specified BITPOS.
2213 Throw an exception on error. */
2214
2215struct value *
2216value_struct_elt_bitpos (struct value **argp, int bitpos, struct type *ftype,
2217 const char *err)
2218{
2219 struct type *t;
b5b08fb4 2220 int i;
b5b08fb4
SC
2221
2222 *argp = coerce_array (*argp);
2223
2224 t = check_typedef (value_type (*argp));
2225
2226 while (TYPE_CODE (t) == TYPE_CODE_PTR || TYPE_CODE (t) == TYPE_CODE_REF)
2227 {
2228 *argp = value_ind (*argp);
2229 if (TYPE_CODE (check_typedef (value_type (*argp))) != TYPE_CODE_FUNC)
2230 *argp = coerce_array (*argp);
2231 t = check_typedef (value_type (*argp));
2232 }
2233
2234 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
2235 && TYPE_CODE (t) != TYPE_CODE_UNION)
2236 error (_("Attempt to extract a component of a value that is not a %s."),
2237 err);
2238
2239 for (i = TYPE_N_BASECLASSES (t); i < TYPE_NFIELDS (t); i++)
2240 {
2241 if (!field_is_static (&TYPE_FIELD (t, i))
2242 && bitpos == TYPE_FIELD_BITPOS (t, i)
2243 && types_equal (ftype, TYPE_FIELD_TYPE (t, i)))
2244 return value_primitive_field (*argp, 0, i, t);
2245 }
2246
2247 error (_("No field with matching bitpos and type."));
2248
2249 /* Never hit. */
2250 return NULL;
2251}
2252
ac3eeb49 2253/* Search through the methods of an object (and its bases) to find a
233e8b28
SC
2254 specified method. Return the pointer to the fn_field list FN_LIST of
2255 overloaded instances defined in the source language. If available
2256 and matching, a vector of matching xmethods defined in extension
2257 languages are also returned in XM_WORKER_VEC
ac3eeb49
MS
2258
2259 Helper function for value_find_oload_list.
2260 ARGP is a pointer to a pointer to a value (the object).
2261 METHOD is a string containing the method name.
2262 OFFSET is the offset within the value.
2263 TYPE is the assumed type of the object.
233e8b28
SC
2264 FN_LIST is the pointer to matching overloaded instances defined in
2265 source language. Since this is a recursive function, *FN_LIST
2266 should be set to NULL when calling this function.
2267 NUM_FNS is the number of overloaded instances. *NUM_FNS should be set to
2268 0 when calling this function.
2269 XM_WORKER_VEC is the vector of matching xmethod workers. *XM_WORKER_VEC
2270 should also be set to NULL when calling this function.
ac3eeb49
MS
2271 BASETYPE is set to the actual type of the subobject where the
2272 method is found.
581e13c1 2273 BOFFSET is the offset of the base subobject where the method is found. */
c906108c 2274
233e8b28 2275static void
714f19d5 2276find_method_list (struct value **argp, const char *method,
233e8b28
SC
2277 int offset, struct type *type,
2278 struct fn_field **fn_list, int *num_fns,
2279 VEC (xmethod_worker_ptr) **xm_worker_vec,
fba45db2 2280 struct type **basetype, int *boffset)
c906108c
SS
2281{
2282 int i;
233e8b28
SC
2283 struct fn_field *f = NULL;
2284 VEC (xmethod_worker_ptr) *worker_vec = NULL, *new_vec = NULL;
c906108c 2285
233e8b28 2286 gdb_assert (fn_list != NULL && xm_worker_vec != NULL);
f168693b 2287 type = check_typedef (type);
c906108c 2288
233e8b28
SC
2289 /* First check in object itself.
2290 This function is called recursively to search through base classes.
2291 If there is a source method match found at some stage, then we need not
2292 look for source methods in consequent recursive calls. */
2293 if ((*fn_list) == NULL)
c906108c 2294 {
233e8b28 2295 for (i = TYPE_NFN_FIELDS (type) - 1; i >= 0; i--)
c5aa993b 2296 {
233e8b28
SC
2297 /* pai: FIXME What about operators and type conversions? */
2298 const char *fn_field_name = TYPE_FN_FIELDLIST_NAME (type, i);
2299
2300 if (fn_field_name && (strcmp_iw (fn_field_name, method) == 0))
2301 {
2302 int len = TYPE_FN_FIELDLIST_LENGTH (type, i);
2303 f = TYPE_FN_FIELDLIST1 (type, i);
2304 *fn_list = f;
4a1970e4 2305
233e8b28
SC
2306 *num_fns = len;
2307 *basetype = type;
2308 *boffset = offset;
4a1970e4 2309
233e8b28
SC
2310 /* Resolve any stub methods. */
2311 check_stub_method_group (type, i);
4a1970e4 2312
233e8b28
SC
2313 break;
2314 }
c5aa993b
JM
2315 }
2316 }
2317
233e8b28
SC
2318 /* Unlike source methods, xmethods can be accumulated over successive
2319 recursive calls. In other words, an xmethod named 'm' in a class
2320 will not hide an xmethod named 'm' in its base class(es). We want
2321 it to be this way because xmethods are after all convenience functions
2322 and hence there is no point restricting them with something like method
2323 hiding. Moreover, if hiding is done for xmethods as well, then we will
2324 have to provide a mechanism to un-hide (like the 'using' construct). */
2325 worker_vec = get_matching_xmethod_workers (type, method);
2326 new_vec = VEC_merge (xmethod_worker_ptr, *xm_worker_vec, worker_vec);
2327
2328 VEC_free (xmethod_worker_ptr, *xm_worker_vec);
2329 VEC_free (xmethod_worker_ptr, worker_vec);
2330 *xm_worker_vec = new_vec;
2331
2332 /* If source methods are not found in current class, look for them in the
2333 base classes. We also have to go through the base classes to gather
2334 extension methods. */
c906108c
SS
2335 for (i = TYPE_N_BASECLASSES (type) - 1; i >= 0; i--)
2336 {
2337 int base_offset;
a109c7c1 2338
c906108c
SS
2339 if (BASETYPE_VIA_VIRTUAL (type, i))
2340 {
086280be 2341 base_offset = baseclass_offset (type, i,
8af8e3bc
PA
2342 value_contents_for_printing (*argp),
2343 value_offset (*argp) + offset,
2344 value_address (*argp), *argp);
c5aa993b 2345 }
ac3eeb49
MS
2346 else /* Non-virtual base, simply use bit position from debug
2347 info. */
c906108c
SS
2348 {
2349 base_offset = TYPE_BASECLASS_BITPOS (type, i) / 8;
c5aa993b 2350 }
233e8b28
SC
2351
2352 find_method_list (argp, method, base_offset + offset,
2353 TYPE_BASECLASS (type, i), fn_list, num_fns,
2354 xm_worker_vec, basetype, boffset);
c906108c 2355 }
c906108c
SS
2356}
2357
233e8b28
SC
2358/* Return the list of overloaded methods of a specified name. The methods
2359 could be those GDB finds in the binary, or xmethod. Methods found in
2360 the binary are returned in FN_LIST, and xmethods are returned in
2361 XM_WORKER_VEC.
ac3eeb49
MS
2362
2363 ARGP is a pointer to a pointer to a value (the object).
2364 METHOD is the method name.
2365 OFFSET is the offset within the value contents.
233e8b28
SC
2366 FN_LIST is the pointer to matching overloaded instances defined in
2367 source language.
ac3eeb49 2368 NUM_FNS is the number of overloaded instances.
233e8b28
SC
2369 XM_WORKER_VEC is the vector of matching xmethod workers defined in
2370 extension languages.
ac3eeb49
MS
2371 BASETYPE is set to the type of the base subobject that defines the
2372 method.
581e13c1 2373 BOFFSET is the offset of the base subobject which defines the method. */
c906108c 2374
233e8b28 2375static void
714f19d5 2376value_find_oload_method_list (struct value **argp, const char *method,
233e8b28
SC
2377 int offset, struct fn_field **fn_list,
2378 int *num_fns,
2379 VEC (xmethod_worker_ptr) **xm_worker_vec,
ac3eeb49 2380 struct type **basetype, int *boffset)
c906108c 2381{
c5aa993b 2382 struct type *t;
c906108c 2383
df407dfe 2384 t = check_typedef (value_type (*argp));
c906108c 2385
ac3eeb49 2386 /* Code snarfed from value_struct_elt. */
c906108c
SS
2387 while (TYPE_CODE (t) == TYPE_CODE_PTR || TYPE_CODE (t) == TYPE_CODE_REF)
2388 {
2389 *argp = value_ind (*argp);
2390 /* Don't coerce fn pointer to fn and then back again! */
b846d303 2391 if (TYPE_CODE (check_typedef (value_type (*argp))) != TYPE_CODE_FUNC)
994b9211 2392 *argp = coerce_array (*argp);
df407dfe 2393 t = check_typedef (value_type (*argp));
c906108c 2394 }
c5aa993b 2395
c5aa993b
JM
2396 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
2397 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
2398 error (_("Attempt to extract a component of a "
2399 "value that is not a struct or union"));
c5aa993b 2400
233e8b28
SC
2401 gdb_assert (fn_list != NULL && xm_worker_vec != NULL);
2402
2403 /* Clear the lists. */
2404 *fn_list = NULL;
2405 *num_fns = 0;
2406 *xm_worker_vec = NULL;
2407
2408 find_method_list (argp, method, 0, t, fn_list, num_fns, xm_worker_vec,
2409 basetype, boffset);
c906108c
SS
2410}
2411
da096638 2412/* Given an array of arguments (ARGS) (which includes an
c906108c 2413 entry for "this" in the case of C++ methods), the number of
28c64fc2
SCR
2414 arguments NARGS, the NAME of a function, and whether it's a method or
2415 not (METHOD), find the best function that matches on the argument types
2416 according to the overload resolution rules.
c906108c 2417
4c3376c8
SW
2418 METHOD can be one of three values:
2419 NON_METHOD for non-member functions.
2420 METHOD: for member functions.
2421 BOTH: used for overload resolution of operators where the
2422 candidates are expected to be either member or non member
581e13c1 2423 functions. In this case the first argument ARGTYPES
4c3376c8
SW
2424 (representing 'this') is expected to be a reference to the
2425 target object, and will be dereferenced when attempting the
2426 non-member search.
2427
c906108c
SS
2428 In the case of class methods, the parameter OBJ is an object value
2429 in which to search for overloaded methods.
2430
2431 In the case of non-method functions, the parameter FSYM is a symbol
2432 corresponding to one of the overloaded functions.
2433
2434 Return value is an integer: 0 -> good match, 10 -> debugger applied
2435 non-standard coercions, 100 -> incompatible.
2436
2437 If a method is being searched for, VALP will hold the value.
ac3eeb49
MS
2438 If a non-method is being searched for, SYMP will hold the symbol
2439 for it.
c906108c
SS
2440
2441 If a method is being searched for, and it is a static method,
2442 then STATICP will point to a non-zero value.
2443
7322dca9
SW
2444 If NO_ADL argument dependent lookup is disabled. This is used to prevent
2445 ADL overload candidates when performing overload resolution for a fully
2446 qualified name.
2447
e66d4446
SC
2448 If NOSIDE is EVAL_AVOID_SIDE_EFFECTS, then OBJP's memory cannot be
2449 read while picking the best overload match (it may be all zeroes and thus
2450 not have a vtable pointer), in which case skip virtual function lookup.
2451 This is ok as typically EVAL_AVOID_SIDE_EFFECTS is only used to determine
2452 the result type.
2453
c906108c
SS
2454 Note: This function does *not* check the value of
2455 overload_resolution. Caller must check it to see whether overload
581e13c1 2456 resolution is permitted. */
c906108c
SS
2457
2458int
da096638 2459find_overload_match (struct value **args, int nargs,
4c3376c8 2460 const char *name, enum oload_search_type method,
28c64fc2 2461 struct value **objp, struct symbol *fsym,
ac3eeb49 2462 struct value **valp, struct symbol **symp,
e66d4446
SC
2463 int *staticp, const int no_adl,
2464 const enum noside noside)
c906108c 2465{
7f8c9282 2466 struct value *obj = (objp ? *objp : NULL);
da096638 2467 struct type *obj_type = obj ? value_type (obj) : NULL;
ac3eeb49 2468 /* Index of best overloaded function. */
4c3376c8
SW
2469 int func_oload_champ = -1;
2470 int method_oload_champ = -1;
233e8b28
SC
2471 int src_method_oload_champ = -1;
2472 int ext_method_oload_champ = -1;
4c3376c8 2473
ac3eeb49 2474 /* The measure for the current best match. */
4c3376c8
SW
2475 struct badness_vector *method_badness = NULL;
2476 struct badness_vector *func_badness = NULL;
233e8b28
SC
2477 struct badness_vector *ext_method_badness = NULL;
2478 struct badness_vector *src_method_badness = NULL;
4c3376c8 2479
f23631e4 2480 struct value *temp = obj;
ac3eeb49
MS
2481 /* For methods, the list of overloaded methods. */
2482 struct fn_field *fns_ptr = NULL;
2483 /* For non-methods, the list of overloaded function symbols. */
2484 struct symbol **oload_syms = NULL;
233e8b28
SC
2485 /* For xmethods, the VEC of xmethod workers. */
2486 VEC (xmethod_worker_ptr) *xm_worker_vec = NULL;
ac3eeb49
MS
2487 /* Number of overloaded instances being considered. */
2488 int num_fns = 0;
c5aa993b 2489 struct type *basetype = NULL;
c906108c 2490 int boffset;
7322dca9
SW
2491
2492 struct cleanup *all_cleanups = make_cleanup (null_cleanup, NULL);
c906108c 2493
8d577d32 2494 const char *obj_type_name = NULL;
7322dca9 2495 const char *func_name = NULL;
8d577d32 2496 enum oload_classification match_quality;
4c3376c8 2497 enum oload_classification method_match_quality = INCOMPATIBLE;
233e8b28
SC
2498 enum oload_classification src_method_match_quality = INCOMPATIBLE;
2499 enum oload_classification ext_method_match_quality = INCOMPATIBLE;
4c3376c8 2500 enum oload_classification func_match_quality = INCOMPATIBLE;
c906108c 2501
ac3eeb49 2502 /* Get the list of overloaded methods or functions. */
4c3376c8 2503 if (method == METHOD || method == BOTH)
c906108c 2504 {
a2ca50ae 2505 gdb_assert (obj);
94af9270
KS
2506
2507 /* OBJ may be a pointer value rather than the object itself. */
2508 obj = coerce_ref (obj);
2509 while (TYPE_CODE (check_typedef (value_type (obj))) == TYPE_CODE_PTR)
2510 obj = coerce_ref (value_ind (obj));
df407dfe 2511 obj_type_name = TYPE_NAME (value_type (obj));
94af9270
KS
2512
2513 /* First check whether this is a data member, e.g. a pointer to
2514 a function. */
2515 if (TYPE_CODE (check_typedef (value_type (obj))) == TYPE_CODE_STRUCT)
2516 {
8a13d42d 2517 *valp = search_struct_field (name, obj,
94af9270
KS
2518 check_typedef (value_type (obj)), 0);
2519 if (*valp)
2520 {
2521 *staticp = 1;
f748fb40 2522 do_cleanups (all_cleanups);
94af9270
KS
2523 return 0;
2524 }
2525 }
c906108c 2526
4c3376c8 2527 /* Retrieve the list of methods with the name NAME. */
233e8b28
SC
2528 value_find_oload_method_list (&temp, name, 0, &fns_ptr, &num_fns,
2529 &xm_worker_vec, &basetype, &boffset);
4c3376c8
SW
2530 /* If this is a method only search, and no methods were found
2531 the search has faild. */
233e8b28 2532 if (method == METHOD && (!fns_ptr || !num_fns) && !xm_worker_vec)
8a3fe4f8 2533 error (_("Couldn't find method %s%s%s"),
c5aa993b
JM
2534 obj_type_name,
2535 (obj_type_name && *obj_type_name) ? "::" : "",
2536 name);
4a1970e4 2537 /* If we are dealing with stub method types, they should have
ac3eeb49
MS
2538 been resolved by find_method_list via
2539 value_find_oload_method_list above. */
4c3376c8
SW
2540 if (fns_ptr)
2541 {
4bfb94b8 2542 gdb_assert (TYPE_SELF_TYPE (fns_ptr[0].type) != NULL);
4c3376c8 2543
233e8b28
SC
2544 src_method_oload_champ = find_oload_champ (args, nargs,
2545 num_fns, fns_ptr, NULL,
2546 NULL, &src_method_badness);
2547
2548 src_method_match_quality = classify_oload_match
2549 (src_method_badness, nargs,
2550 oload_method_static_p (fns_ptr, src_method_oload_champ));
2551
2552 make_cleanup (xfree, src_method_badness);
2553 }
4c3376c8 2554
233e8b28
SC
2555 if (VEC_length (xmethod_worker_ptr, xm_worker_vec) > 0)
2556 {
2557 ext_method_oload_champ = find_oload_champ (args, nargs,
2558 0, NULL, xm_worker_vec,
2559 NULL, &ext_method_badness);
2560 ext_method_match_quality = classify_oload_match (ext_method_badness,
2561 nargs, 0);
2562 make_cleanup (xfree, ext_method_badness);
2563 make_cleanup (free_xmethod_worker_vec, xm_worker_vec);
4c3376c8
SW
2564 }
2565
233e8b28
SC
2566 if (src_method_oload_champ >= 0 && ext_method_oload_champ >= 0)
2567 {
2568 switch (compare_badness (ext_method_badness, src_method_badness))
2569 {
2570 case 0: /* Src method and xmethod are equally good. */
233e8b28
SC
2571 /* If src method and xmethod are equally good, then
2572 xmethod should be the winner. Hence, fall through to the
2573 case where a xmethod is better than the source
2574 method, except when the xmethod match quality is
2575 non-standard. */
2576 /* FALLTHROUGH */
2577 case 1: /* Src method and ext method are incompatible. */
2578 /* If ext method match is not standard, then let source method
2579 win. Otherwise, fallthrough to let xmethod win. */
2580 if (ext_method_match_quality != STANDARD)
2581 {
2582 method_oload_champ = src_method_oload_champ;
2583 method_badness = src_method_badness;
2584 ext_method_oload_champ = -1;
2585 method_match_quality = src_method_match_quality;
2586 break;
2587 }
2588 /* FALLTHROUGH */
2589 case 2: /* Ext method is champion. */
2590 method_oload_champ = ext_method_oload_champ;
2591 method_badness = ext_method_badness;
2592 src_method_oload_champ = -1;
2593 method_match_quality = ext_method_match_quality;
2594 break;
2595 case 3: /* Src method is champion. */
2596 method_oload_champ = src_method_oload_champ;
2597 method_badness = src_method_badness;
2598 ext_method_oload_champ = -1;
2599 method_match_quality = src_method_match_quality;
2600 break;
2601 default:
2602 gdb_assert_not_reached ("Unexpected overload comparison "
2603 "result");
2604 break;
2605 }
2606 }
2607 else if (src_method_oload_champ >= 0)
2608 {
2609 method_oload_champ = src_method_oload_champ;
2610 method_badness = src_method_badness;
2611 method_match_quality = src_method_match_quality;
2612 }
2613 else if (ext_method_oload_champ >= 0)
2614 {
2615 method_oload_champ = ext_method_oload_champ;
2616 method_badness = ext_method_badness;
2617 method_match_quality = ext_method_match_quality;
2618 }
c906108c 2619 }
4c3376c8
SW
2620
2621 if (method == NON_METHOD || method == BOTH)
c906108c 2622 {
7322dca9 2623 const char *qualified_name = NULL;
c906108c 2624
b021a221
MS
2625 /* If the overload match is being search for both as a method
2626 and non member function, the first argument must now be
2627 dereferenced. */
4c3376c8 2628 if (method == BOTH)
2b214ea6 2629 args[0] = value_ind (args[0]);
4c3376c8 2630
7322dca9
SW
2631 if (fsym)
2632 {
2633 qualified_name = SYMBOL_NATURAL_NAME (fsym);
2634
2635 /* If we have a function with a C++ name, try to extract just
2636 the function part. Do not try this for non-functions (e.g.
2637 function pointers). */
2638 if (qualified_name
3e43a32a
MS
2639 && TYPE_CODE (check_typedef (SYMBOL_TYPE (fsym)))
2640 == TYPE_CODE_FUNC)
7322dca9
SW
2641 {
2642 char *temp;
2643
2644 temp = cp_func_name (qualified_name);
2645
2646 /* If cp_func_name did not remove anything, the name of the
2647 symbol did not include scope or argument types - it was
2648 probably a C-style function. */
2649 if (temp)
2650 {
2651 make_cleanup (xfree, temp);
2652 if (strcmp (temp, qualified_name) == 0)
2653 func_name = NULL;
2654 else
2655 func_name = temp;
2656 }
2657 }
2658 }
2659 else
94af9270 2660 {
7322dca9
SW
2661 func_name = name;
2662 qualified_name = name;
94af9270 2663 }
d9639e13 2664
94af9270
KS
2665 /* If there was no C++ name, this must be a C-style function or
2666 not a function at all. Just return the same symbol. Do the
2667 same if cp_func_name fails for some reason. */
8d577d32 2668 if (func_name == NULL)
7b83ea04 2669 {
917317f4 2670 *symp = fsym;
5fe41fbf 2671 do_cleanups (all_cleanups);
7b83ea04
AC
2672 return 0;
2673 }
917317f4 2674
da096638 2675 func_oload_champ = find_oload_champ_namespace (args, nargs,
4c3376c8
SW
2676 func_name,
2677 qualified_name,
2678 &oload_syms,
2679 &func_badness,
2680 no_adl);
8d577d32 2681
4c3376c8
SW
2682 if (func_oload_champ >= 0)
2683 func_match_quality = classify_oload_match (func_badness, nargs, 0);
2684
2685 make_cleanup (xfree, oload_syms);
2686 make_cleanup (xfree, func_badness);
8d577d32
DC
2687 }
2688
7322dca9 2689 /* Did we find a match ? */
4c3376c8 2690 if (method_oload_champ == -1 && func_oload_champ == -1)
79afc5ef
SW
2691 throw_error (NOT_FOUND_ERROR,
2692 _("No symbol \"%s\" in current context."),
2693 name);
8d577d32 2694
4c3376c8
SW
2695 /* If we have found both a method match and a function
2696 match, find out which one is better, and calculate match
2697 quality. */
2698 if (method_oload_champ >= 0 && func_oload_champ >= 0)
2699 {
2700 switch (compare_badness (func_badness, method_badness))
2701 {
2702 case 0: /* Top two contenders are equally good. */
b021a221
MS
2703 /* FIXME: GDB does not support the general ambiguous case.
2704 All candidates should be collected and presented the
2705 user. */
4c3376c8
SW
2706 error (_("Ambiguous overload resolution"));
2707 break;
2708 case 1: /* Incomparable top contenders. */
2709 /* This is an error incompatible candidates
2710 should not have been proposed. */
3e43a32a
MS
2711 error (_("Internal error: incompatible "
2712 "overload candidates proposed"));
4c3376c8
SW
2713 break;
2714 case 2: /* Function champion. */
2715 method_oload_champ = -1;
2716 match_quality = func_match_quality;
2717 break;
2718 case 3: /* Method champion. */
2719 func_oload_champ = -1;
2720 match_quality = method_match_quality;
2721 break;
2722 default:
2723 error (_("Internal error: unexpected overload comparison result"));
2724 break;
2725 }
2726 }
2727 else
2728 {
2729 /* We have either a method match or a function match. */
2730 if (method_oload_champ >= 0)
2731 match_quality = method_match_quality;
2732 else
2733 match_quality = func_match_quality;
2734 }
8d577d32
DC
2735
2736 if (match_quality == INCOMPATIBLE)
2737 {
4c3376c8 2738 if (method == METHOD)
8a3fe4f8 2739 error (_("Cannot resolve method %s%s%s to any overloaded instance"),
8d577d32
DC
2740 obj_type_name,
2741 (obj_type_name && *obj_type_name) ? "::" : "",
2742 name);
2743 else
8a3fe4f8 2744 error (_("Cannot resolve function %s to any overloaded instance"),
8d577d32
DC
2745 func_name);
2746 }
2747 else if (match_quality == NON_STANDARD)
2748 {
4c3376c8 2749 if (method == METHOD)
3e43a32a
MS
2750 warning (_("Using non-standard conversion to match "
2751 "method %s%s%s to supplied arguments"),
8d577d32
DC
2752 obj_type_name,
2753 (obj_type_name && *obj_type_name) ? "::" : "",
2754 name);
2755 else
3e43a32a
MS
2756 warning (_("Using non-standard conversion to match "
2757 "function %s to supplied arguments"),
8d577d32
DC
2758 func_name);
2759 }
2760
4c3376c8 2761 if (staticp != NULL)
2bca57ba 2762 *staticp = oload_method_static_p (fns_ptr, method_oload_champ);
4c3376c8
SW
2763
2764 if (method_oload_champ >= 0)
8d577d32 2765 {
233e8b28
SC
2766 if (src_method_oload_champ >= 0)
2767 {
e66d4446
SC
2768 if (TYPE_FN_FIELD_VIRTUAL_P (fns_ptr, method_oload_champ)
2769 && noside != EVAL_AVOID_SIDE_EFFECTS)
2770 {
2771 *valp = value_virtual_fn_field (&temp, fns_ptr,
2772 method_oload_champ, basetype,
2773 boffset);
2774 }
233e8b28
SC
2775 else
2776 *valp = value_fn_field (&temp, fns_ptr, method_oload_champ,
2777 basetype, boffset);
2778 }
8d577d32 2779 else
233e8b28
SC
2780 {
2781 *valp = value_of_xmethod (clone_xmethod_worker
2782 (VEC_index (xmethod_worker_ptr, xm_worker_vec,
2783 ext_method_oload_champ)));
2784 }
8d577d32
DC
2785 }
2786 else
4c3376c8 2787 *symp = oload_syms[func_oload_champ];
8d577d32
DC
2788
2789 if (objp)
2790 {
a4295225 2791 struct type *temp_type = check_typedef (value_type (temp));
da096638 2792 struct type *objtype = check_typedef (obj_type);
a109c7c1 2793
a4295225 2794 if (TYPE_CODE (temp_type) != TYPE_CODE_PTR
da096638
KS
2795 && (TYPE_CODE (objtype) == TYPE_CODE_PTR
2796 || TYPE_CODE (objtype) == TYPE_CODE_REF))
8d577d32
DC
2797 {
2798 temp = value_addr (temp);
2799 }
2800 *objp = temp;
2801 }
7322dca9
SW
2802
2803 do_cleanups (all_cleanups);
8d577d32
DC
2804
2805 switch (match_quality)
2806 {
2807 case INCOMPATIBLE:
2808 return 100;
2809 case NON_STANDARD:
2810 return 10;
2811 default: /* STANDARD */
2812 return 0;
2813 }
2814}
2815
2816/* Find the best overload match, searching for FUNC_NAME in namespaces
2817 contained in QUALIFIED_NAME until it either finds a good match or
2818 runs out of namespaces. It stores the overloaded functions in
2819 *OLOAD_SYMS, and the badness vector in *OLOAD_CHAMP_BV. The
2820 calling function is responsible for freeing *OLOAD_SYMS and
7322dca9
SW
2821 *OLOAD_CHAMP_BV. If NO_ADL, argument dependent lookup is not
2822 performned. */
8d577d32
DC
2823
2824static int
da096638 2825find_oload_champ_namespace (struct value **args, int nargs,
8d577d32
DC
2826 const char *func_name,
2827 const char *qualified_name,
2828 struct symbol ***oload_syms,
7322dca9
SW
2829 struct badness_vector **oload_champ_bv,
2830 const int no_adl)
8d577d32
DC
2831{
2832 int oload_champ;
2833
da096638 2834 find_oload_champ_namespace_loop (args, nargs,
8d577d32
DC
2835 func_name,
2836 qualified_name, 0,
2837 oload_syms, oload_champ_bv,
7322dca9
SW
2838 &oload_champ,
2839 no_adl);
8d577d32
DC
2840
2841 return oload_champ;
2842}
2843
2844/* Helper function for find_oload_champ_namespace; NAMESPACE_LEN is
2845 how deep we've looked for namespaces, and the champ is stored in
2846 OLOAD_CHAMP. The return value is 1 if the champ is a good one, 0
7322dca9
SW
2847 if it isn't. Other arguments are the same as in
2848 find_oload_champ_namespace
8d577d32
DC
2849
2850 It is the caller's responsibility to free *OLOAD_SYMS and
2851 *OLOAD_CHAMP_BV. */
2852
2853static int
da096638 2854find_oload_champ_namespace_loop (struct value **args, int nargs,
8d577d32
DC
2855 const char *func_name,
2856 const char *qualified_name,
2857 int namespace_len,
2858 struct symbol ***oload_syms,
2859 struct badness_vector **oload_champ_bv,
7322dca9
SW
2860 int *oload_champ,
2861 const int no_adl)
8d577d32
DC
2862{
2863 int next_namespace_len = namespace_len;
2864 int searched_deeper = 0;
2865 int num_fns = 0;
2866 struct cleanup *old_cleanups;
2867 int new_oload_champ;
2868 struct symbol **new_oload_syms;
2869 struct badness_vector *new_oload_champ_bv;
2870 char *new_namespace;
2871
2872 if (next_namespace_len != 0)
2873 {
2874 gdb_assert (qualified_name[next_namespace_len] == ':');
2875 next_namespace_len += 2;
c906108c 2876 }
ac3eeb49
MS
2877 next_namespace_len +=
2878 cp_find_first_component (qualified_name + next_namespace_len);
8d577d32
DC
2879
2880 /* Initialize these to values that can safely be xfree'd. */
2881 *oload_syms = NULL;
2882 *oload_champ_bv = NULL;
c5aa993b 2883
581e13c1 2884 /* First, see if we have a deeper namespace we can search in.
ac3eeb49 2885 If we get a good match there, use it. */
8d577d32
DC
2886
2887 if (qualified_name[next_namespace_len] == ':')
2888 {
2889 searched_deeper = 1;
2890
da096638 2891 if (find_oload_champ_namespace_loop (args, nargs,
8d577d32
DC
2892 func_name, qualified_name,
2893 next_namespace_len,
2894 oload_syms, oload_champ_bv,
7322dca9 2895 oload_champ, no_adl))
8d577d32
DC
2896 {
2897 return 1;
2898 }
2899 };
2900
2901 /* If we reach here, either we're in the deepest namespace or we
2902 didn't find a good match in a deeper namespace. But, in the
2903 latter case, we still have a bad match in a deeper namespace;
2904 note that we might not find any match at all in the current
2905 namespace. (There's always a match in the deepest namespace,
2906 because this overload mechanism only gets called if there's a
2907 function symbol to start off with.) */
2908
2909 old_cleanups = make_cleanup (xfree, *oload_syms);
ec322823 2910 make_cleanup (xfree, *oload_champ_bv);
224c3ddb 2911 new_namespace = (char *) alloca (namespace_len + 1);
8d577d32
DC
2912 strncpy (new_namespace, qualified_name, namespace_len);
2913 new_namespace[namespace_len] = '\0';
2914 new_oload_syms = make_symbol_overload_list (func_name,
2915 new_namespace);
7322dca9
SW
2916
2917 /* If we have reached the deepest level perform argument
2918 determined lookup. */
2919 if (!searched_deeper && !no_adl)
da096638
KS
2920 {
2921 int ix;
2922 struct type **arg_types;
2923
2924 /* Prepare list of argument types for overload resolution. */
2925 arg_types = (struct type **)
2926 alloca (nargs * (sizeof (struct type *)));
2927 for (ix = 0; ix < nargs; ix++)
2928 arg_types[ix] = value_type (args[ix]);
2929 make_symbol_overload_list_adl (arg_types, nargs, func_name);
2930 }
7322dca9 2931
8d577d32
DC
2932 while (new_oload_syms[num_fns])
2933 ++num_fns;
2934
9cf95373 2935 new_oload_champ = find_oload_champ (args, nargs, num_fns,
233e8b28 2936 NULL, NULL, new_oload_syms,
8d577d32
DC
2937 &new_oload_champ_bv);
2938
2939 /* Case 1: We found a good match. Free earlier matches (if any),
2940 and return it. Case 2: We didn't find a good match, but we're
2941 not the deepest function. Then go with the bad match that the
2942 deeper function found. Case 3: We found a bad match, and we're
2943 the deepest function. Then return what we found, even though
2944 it's a bad match. */
2945
2946 if (new_oload_champ != -1
2947 && classify_oload_match (new_oload_champ_bv, nargs, 0) == STANDARD)
2948 {
2949 *oload_syms = new_oload_syms;
2950 *oload_champ = new_oload_champ;
2951 *oload_champ_bv = new_oload_champ_bv;
2952 do_cleanups (old_cleanups);
2953 return 1;
2954 }
2955 else if (searched_deeper)
2956 {
2957 xfree (new_oload_syms);
2958 xfree (new_oload_champ_bv);
2959 discard_cleanups (old_cleanups);
2960 return 0;
2961 }
2962 else
2963 {
8d577d32
DC
2964 *oload_syms = new_oload_syms;
2965 *oload_champ = new_oload_champ;
2966 *oload_champ_bv = new_oload_champ_bv;
2a7d6a25 2967 do_cleanups (old_cleanups);
8d577d32
DC
2968 return 0;
2969 }
2970}
2971
da096638 2972/* Look for a function to take NARGS args of ARGS. Find
8d577d32 2973 the best match from among the overloaded methods or functions
233e8b28
SC
2974 given by FNS_PTR or OLOAD_SYMS or XM_WORKER_VEC, respectively.
2975 One, and only one of FNS_PTR, OLOAD_SYMS and XM_WORKER_VEC can be
2976 non-NULL.
2977
2978 If XM_WORKER_VEC is NULL, then the length of the arrays FNS_PTR
2979 or OLOAD_SYMS (whichever is non-NULL) is specified in NUM_FNS.
2980
8d577d32
DC
2981 Return the index of the best match; store an indication of the
2982 quality of the match in OLOAD_CHAMP_BV.
2983
2984 It is the caller's responsibility to free *OLOAD_CHAMP_BV. */
2985
2986static int
9cf95373 2987find_oload_champ (struct value **args, int nargs,
8d577d32 2988 int num_fns, struct fn_field *fns_ptr,
233e8b28 2989 VEC (xmethod_worker_ptr) *xm_worker_vec,
8d577d32
DC
2990 struct symbol **oload_syms,
2991 struct badness_vector **oload_champ_bv)
2992{
2993 int ix;
233e8b28 2994 int fn_count;
ac3eeb49
MS
2995 /* A measure of how good an overloaded instance is. */
2996 struct badness_vector *bv;
2997 /* Index of best overloaded function. */
2998 int oload_champ = -1;
2999 /* Current ambiguity state for overload resolution. */
3000 int oload_ambiguous = 0;
3001 /* 0 => no ambiguity, 1 => two good funcs, 2 => incomparable funcs. */
8d577d32 3002
9cf95373 3003 /* A champion can be found among methods alone, or among functions
233e8b28
SC
3004 alone, or in xmethods alone, but not in more than one of these
3005 groups. */
3006 gdb_assert ((fns_ptr != NULL) + (oload_syms != NULL) + (xm_worker_vec != NULL)
3007 == 1);
9cf95373 3008
8d577d32 3009 *oload_champ_bv = NULL;
c906108c 3010
233e8b28
SC
3011 fn_count = (xm_worker_vec != NULL
3012 ? VEC_length (xmethod_worker_ptr, xm_worker_vec)
3013 : num_fns);
ac3eeb49 3014 /* Consider each candidate in turn. */
233e8b28 3015 for (ix = 0; ix < fn_count; ix++)
c906108c 3016 {
8d577d32 3017 int jj;
233e8b28 3018 int static_offset = 0;
8d577d32
DC
3019 int nparms;
3020 struct type **parm_types;
233e8b28 3021 struct xmethod_worker *worker = NULL;
8d577d32 3022
233e8b28 3023 if (xm_worker_vec != NULL)
db577aea 3024 {
233e8b28
SC
3025 worker = VEC_index (xmethod_worker_ptr, xm_worker_vec, ix);
3026 parm_types = get_xmethod_arg_types (worker, &nparms);
db577aea
AC
3027 }
3028 else
3029 {
233e8b28
SC
3030 if (fns_ptr != NULL)
3031 {
3032 nparms = TYPE_NFIELDS (TYPE_FN_FIELD_TYPE (fns_ptr, ix));
3033 static_offset = oload_method_static_p (fns_ptr, ix);
3034 }
3035 else
3036 nparms = TYPE_NFIELDS (SYMBOL_TYPE (oload_syms[ix]));
3037
8d749320 3038 parm_types = XNEWVEC (struct type *, nparms);
233e8b28
SC
3039 for (jj = 0; jj < nparms; jj++)
3040 parm_types[jj] = (fns_ptr != NULL
3041 ? (TYPE_FN_FIELD_ARGS (fns_ptr, ix)[jj].type)
3042 : TYPE_FIELD_TYPE (SYMBOL_TYPE (oload_syms[ix]),
8301c89e 3043 jj));
db577aea 3044 }
c906108c 3045
ac3eeb49
MS
3046 /* Compare parameter types to supplied argument types. Skip
3047 THIS for static methods. */
3048 bv = rank_function (parm_types, nparms,
da096638 3049 args + static_offset,
4a1970e4 3050 nargs - static_offset);
c5aa993b 3051
8d577d32 3052 if (!*oload_champ_bv)
c5aa993b 3053 {
8d577d32 3054 *oload_champ_bv = bv;
c5aa993b 3055 oload_champ = 0;
c5aa993b 3056 }
ac3eeb49
MS
3057 else /* See whether current candidate is better or worse than
3058 previous best. */
8d577d32 3059 switch (compare_badness (bv, *oload_champ_bv))
c5aa993b 3060 {
ac3eeb49
MS
3061 case 0: /* Top two contenders are equally good. */
3062 oload_ambiguous = 1;
c5aa993b 3063 break;
ac3eeb49
MS
3064 case 1: /* Incomparable top contenders. */
3065 oload_ambiguous = 2;
c5aa993b 3066 break;
ac3eeb49
MS
3067 case 2: /* New champion, record details. */
3068 *oload_champ_bv = bv;
c5aa993b
JM
3069 oload_ambiguous = 0;
3070 oload_champ = ix;
c5aa993b
JM
3071 break;
3072 case 3:
3073 default:
3074 break;
3075 }
b8c9b27d 3076 xfree (parm_types);
6b1ba9a0
ND
3077 if (overload_debug)
3078 {
233e8b28 3079 if (fns_ptr != NULL)
ac3eeb49 3080 fprintf_filtered (gdb_stderr,
3e43a32a 3081 "Overloaded method instance %s, # of parms %d\n",
ac3eeb49 3082 fns_ptr[ix].physname, nparms);
233e8b28
SC
3083 else if (xm_worker_vec != NULL)
3084 fprintf_filtered (gdb_stderr,
3085 "Xmethod worker, # of parms %d\n",
3086 nparms);
6b1ba9a0 3087 else
ac3eeb49 3088 fprintf_filtered (gdb_stderr,
3e43a32a
MS
3089 "Overloaded function instance "
3090 "%s # of parms %d\n",
ac3eeb49
MS
3091 SYMBOL_DEMANGLED_NAME (oload_syms[ix]),
3092 nparms);
4a1970e4 3093 for (jj = 0; jj < nargs - static_offset; jj++)
ac3eeb49
MS
3094 fprintf_filtered (gdb_stderr,
3095 "...Badness @ %d : %d\n",
6403aeea 3096 jj, bv->rank[jj].rank);
3e43a32a
MS
3097 fprintf_filtered (gdb_stderr, "Overload resolution "
3098 "champion is %d, ambiguous? %d\n",
ac3eeb49 3099 oload_champ, oload_ambiguous);
6b1ba9a0 3100 }
c906108c
SS
3101 }
3102
8d577d32
DC
3103 return oload_champ;
3104}
6b1ba9a0 3105
8d577d32
DC
3106/* Return 1 if we're looking at a static method, 0 if we're looking at
3107 a non-static method or a function that isn't a method. */
c906108c 3108
8d577d32 3109static int
2bca57ba 3110oload_method_static_p (struct fn_field *fns_ptr, int index)
8d577d32 3111{
2bca57ba 3112 if (fns_ptr && index >= 0 && TYPE_FN_FIELD_STATIC_P (fns_ptr, index))
8d577d32 3113 return 1;
c906108c 3114 else
8d577d32
DC
3115 return 0;
3116}
c906108c 3117
8d577d32
DC
3118/* Check how good an overload match OLOAD_CHAMP_BV represents. */
3119
3120static enum oload_classification
3121classify_oload_match (struct badness_vector *oload_champ_bv,
3122 int nargs,
3123 int static_offset)
3124{
3125 int ix;
da096638 3126 enum oload_classification worst = STANDARD;
8d577d32
DC
3127
3128 for (ix = 1; ix <= nargs - static_offset; ix++)
7f8c9282 3129 {
6403aeea
SW
3130 /* If this conversion is as bad as INCOMPATIBLE_TYPE_BADNESS
3131 or worse return INCOMPATIBLE. */
3132 if (compare_ranks (oload_champ_bv->rank[ix],
3133 INCOMPATIBLE_TYPE_BADNESS) <= 0)
ac3eeb49 3134 return INCOMPATIBLE; /* Truly mismatched types. */
6403aeea
SW
3135 /* Otherwise If this conversion is as bad as
3136 NS_POINTER_CONVERSION_BADNESS or worse return NON_STANDARD. */
3137 else if (compare_ranks (oload_champ_bv->rank[ix],
3138 NS_POINTER_CONVERSION_BADNESS) <= 0)
da096638 3139 worst = NON_STANDARD; /* Non-standard type conversions
ac3eeb49 3140 needed. */
7f8c9282 3141 }
02f0d45d 3142
da096638
KS
3143 /* If no INCOMPATIBLE classification was found, return the worst one
3144 that was found (if any). */
3145 return worst;
c906108c
SS
3146}
3147
ac3eeb49
MS
3148/* C++: return 1 is NAME is a legitimate name for the destructor of
3149 type TYPE. If TYPE does not have a destructor, or if NAME is
d8228535
JK
3150 inappropriate for TYPE, an error is signaled. Parameter TYPE should not yet
3151 have CHECK_TYPEDEF applied, this function will apply it itself. */
3152
c906108c 3153int
d8228535 3154destructor_name_p (const char *name, struct type *type)
c906108c 3155{
c906108c
SS
3156 if (name[0] == '~')
3157 {
d8228535
JK
3158 const char *dname = type_name_no_tag_or_error (type);
3159 const char *cp = strchr (dname, '<');
c906108c
SS
3160 unsigned int len;
3161
3162 /* Do not compare the template part for template classes. */
3163 if (cp == NULL)
3164 len = strlen (dname);
3165 else
3166 len = cp - dname;
bf896cb0 3167 if (strlen (name + 1) != len || strncmp (dname, name + 1, len) != 0)
8a3fe4f8 3168 error (_("name of destructor must equal name of class"));
c906108c
SS
3169 else
3170 return 1;
3171 }
3172 return 0;
3173}
3174
3d567982
TT
3175/* Find an enum constant named NAME in TYPE. TYPE must be an "enum
3176 class". If the name is found, return a value representing it;
3177 otherwise throw an exception. */
3178
3179static struct value *
3180enum_constant_from_type (struct type *type, const char *name)
3181{
3182 int i;
3183 int name_len = strlen (name);
3184
3185 gdb_assert (TYPE_CODE (type) == TYPE_CODE_ENUM
3186 && TYPE_DECLARED_CLASS (type));
3187
3188 for (i = TYPE_N_BASECLASSES (type); i < TYPE_NFIELDS (type); ++i)
3189 {
3190 const char *fname = TYPE_FIELD_NAME (type, i);
3191 int len;
3192
3193 if (TYPE_FIELD_LOC_KIND (type, i) != FIELD_LOC_KIND_ENUMVAL
3194 || fname == NULL)
3195 continue;
3196
3197 /* Look for the trailing "::NAME", since enum class constant
3198 names are qualified here. */
3199 len = strlen (fname);
3200 if (len + 2 >= name_len
3201 && fname[len - name_len - 2] == ':'
3202 && fname[len - name_len - 1] == ':'
3203 && strcmp (&fname[len - name_len], name) == 0)
3204 return value_from_longest (type, TYPE_FIELD_ENUMVAL (type, i));
3205 }
3206
3207 error (_("no constant named \"%s\" in enum \"%s\""),
3208 name, TYPE_TAG_NAME (type));
3209}
3210
79c2c32d 3211/* C++: Given an aggregate type CURTYPE, and a member name NAME,
0d5de010
DJ
3212 return the appropriate member (or the address of the member, if
3213 WANT_ADDRESS). This function is used to resolve user expressions
3214 of the form "DOMAIN::NAME". For more details on what happens, see
3215 the comment before value_struct_elt_for_reference. */
79c2c32d
DC
3216
3217struct value *
c848d642 3218value_aggregate_elt (struct type *curtype, const char *name,
072bba3b 3219 struct type *expect_type, int want_address,
79c2c32d
DC
3220 enum noside noside)
3221{
3222 switch (TYPE_CODE (curtype))
3223 {
3224 case TYPE_CODE_STRUCT:
3225 case TYPE_CODE_UNION:
ac3eeb49 3226 return value_struct_elt_for_reference (curtype, 0, curtype,
072bba3b 3227 name, expect_type,
0d5de010 3228 want_address, noside);
79c2c32d 3229 case TYPE_CODE_NAMESPACE:
ac3eeb49
MS
3230 return value_namespace_elt (curtype, name,
3231 want_address, noside);
3d567982
TT
3232
3233 case TYPE_CODE_ENUM:
3234 return enum_constant_from_type (curtype, name);
3235
79c2c32d
DC
3236 default:
3237 internal_error (__FILE__, __LINE__,
e2e0b3e5 3238 _("non-aggregate type in value_aggregate_elt"));
79c2c32d
DC
3239 }
3240}
3241
072bba3b 3242/* Compares the two method/function types T1 and T2 for "equality"
b021a221 3243 with respect to the methods' parameters. If the types of the
072bba3b
KS
3244 two parameter lists are the same, returns 1; 0 otherwise. This
3245 comparison may ignore any artificial parameters in T1 if
3246 SKIP_ARTIFICIAL is non-zero. This function will ALWAYS skip
3247 the first artificial parameter in T1, assumed to be a 'this' pointer.
3248
3249 The type T2 is expected to have come from make_params (in eval.c). */
3250
3251static int
3252compare_parameters (struct type *t1, struct type *t2, int skip_artificial)
3253{
3254 int start = 0;
3255
80b23b6a 3256 if (TYPE_NFIELDS (t1) > 0 && TYPE_FIELD_ARTIFICIAL (t1, 0))
072bba3b
KS
3257 ++start;
3258
3259 /* If skipping artificial fields, find the first real field
581e13c1 3260 in T1. */
072bba3b
KS
3261 if (skip_artificial)
3262 {
3263 while (start < TYPE_NFIELDS (t1)
3264 && TYPE_FIELD_ARTIFICIAL (t1, start))
3265 ++start;
3266 }
3267
581e13c1 3268 /* Now compare parameters. */
072bba3b
KS
3269
3270 /* Special case: a method taking void. T1 will contain no
3271 non-artificial fields, and T2 will contain TYPE_CODE_VOID. */
3272 if ((TYPE_NFIELDS (t1) - start) == 0 && TYPE_NFIELDS (t2) == 1
3273 && TYPE_CODE (TYPE_FIELD_TYPE (t2, 0)) == TYPE_CODE_VOID)
3274 return 1;
3275
3276 if ((TYPE_NFIELDS (t1) - start) == TYPE_NFIELDS (t2))
3277 {
3278 int i;
a109c7c1 3279
072bba3b
KS
3280 for (i = 0; i < TYPE_NFIELDS (t2); ++i)
3281 {
6403aeea 3282 if (compare_ranks (rank_one_type (TYPE_FIELD_TYPE (t1, start + i),
da096638 3283 TYPE_FIELD_TYPE (t2, i), NULL),
6403aeea 3284 EXACT_MATCH_BADNESS) != 0)
072bba3b
KS
3285 return 0;
3286 }
3287
3288 return 1;
3289 }
3290
3291 return 0;
3292}
3293
c906108c 3294/* C++: Given an aggregate type CURTYPE, and a member name NAME,
ac3eeb49
MS
3295 return the address of this member as a "pointer to member" type.
3296 If INTYPE is non-null, then it will be the type of the member we
3297 are looking for. This will help us resolve "pointers to member
3298 functions". This function is used to resolve user expressions of
3299 the form "DOMAIN::NAME". */
c906108c 3300
63d06c5c 3301static struct value *
fba45db2 3302value_struct_elt_for_reference (struct type *domain, int offset,
c848d642 3303 struct type *curtype, const char *name,
ac3eeb49
MS
3304 struct type *intype,
3305 int want_address,
63d06c5c 3306 enum noside noside)
c906108c 3307{
52f0bd74
AC
3308 struct type *t = curtype;
3309 int i;
0d5de010 3310 struct value *v, *result;
c906108c 3311
c5aa993b 3312 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
c906108c 3313 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
3314 error (_("Internal error: non-aggregate type "
3315 "to value_struct_elt_for_reference"));
c906108c
SS
3316
3317 for (i = TYPE_NFIELDS (t) - 1; i >= TYPE_N_BASECLASSES (t); i--)
3318 {
0d5cff50 3319 const char *t_field_name = TYPE_FIELD_NAME (t, i);
c5aa993b 3320
6314a349 3321 if (t_field_name && strcmp (t_field_name, name) == 0)
c906108c 3322 {
d6a843b5 3323 if (field_is_static (&TYPE_FIELD (t, i)))
c906108c
SS
3324 {
3325 v = value_static_field (t, i);
0d5de010
DJ
3326 if (want_address)
3327 v = value_addr (v);
c906108c
SS
3328 return v;
3329 }
3330 if (TYPE_FIELD_PACKED (t, i))
8a3fe4f8 3331 error (_("pointers to bitfield members not allowed"));
c5aa993b 3332
0d5de010
DJ
3333 if (want_address)
3334 return value_from_longest
3335 (lookup_memberptr_type (TYPE_FIELD_TYPE (t, i), domain),
3336 offset + (LONGEST) (TYPE_FIELD_BITPOS (t, i) >> 3));
f7e3ecae 3337 else if (noside != EVAL_NORMAL)
0d5de010
DJ
3338 return allocate_value (TYPE_FIELD_TYPE (t, i));
3339 else
f7e3ecae
KS
3340 {
3341 /* Try to evaluate NAME as a qualified name with implicit
3342 this pointer. In this case, attempt to return the
3343 equivalent to `this->*(&TYPE::NAME)'. */
3344 v = value_of_this_silent (current_language);
3345 if (v != NULL)
3346 {
3347 struct value *ptr;
3348 long mem_offset;
3349 struct type *type, *tmp;
3350
3351 ptr = value_aggregate_elt (domain, name, NULL, 1, noside);
3352 type = check_typedef (value_type (ptr));
3353 gdb_assert (type != NULL
3354 && TYPE_CODE (type) == TYPE_CODE_MEMBERPTR);
4bfb94b8 3355 tmp = lookup_pointer_type (TYPE_SELF_TYPE (type));
f7e3ecae
KS
3356 v = value_cast_pointers (tmp, v, 1);
3357 mem_offset = value_as_long (ptr);
3358 tmp = lookup_pointer_type (TYPE_TARGET_TYPE (type));
3359 result = value_from_pointer (tmp,
3360 value_as_long (v) + mem_offset);
3361 return value_ind (result);
3362 }
3363
3364 error (_("Cannot reference non-static field \"%s\""), name);
3365 }
c906108c
SS
3366 }
3367 }
3368
ac3eeb49
MS
3369 /* C++: If it was not found as a data field, then try to return it
3370 as a pointer to a method. */
c906108c 3371
c906108c
SS
3372 /* Perform all necessary dereferencing. */
3373 while (intype && TYPE_CODE (intype) == TYPE_CODE_PTR)
3374 intype = TYPE_TARGET_TYPE (intype);
3375
3376 for (i = TYPE_NFN_FIELDS (t) - 1; i >= 0; --i)
3377 {
0d5cff50 3378 const char *t_field_name = TYPE_FN_FIELDLIST_NAME (t, i);
c906108c
SS
3379 char dem_opname[64];
3380
61012eef
GB
3381 if (startswith (t_field_name, "__")
3382 || startswith (t_field_name, "op")
3383 || startswith (t_field_name, "type"))
c906108c 3384 {
ac3eeb49
MS
3385 if (cplus_demangle_opname (t_field_name,
3386 dem_opname, DMGL_ANSI))
c5aa993b 3387 t_field_name = dem_opname;
ac3eeb49
MS
3388 else if (cplus_demangle_opname (t_field_name,
3389 dem_opname, 0))
c906108c 3390 t_field_name = dem_opname;
c906108c 3391 }
6314a349 3392 if (t_field_name && strcmp (t_field_name, name) == 0)
c906108c 3393 {
072bba3b
KS
3394 int j;
3395 int len = TYPE_FN_FIELDLIST_LENGTH (t, i);
c906108c 3396 struct fn_field *f = TYPE_FN_FIELDLIST1 (t, i);
c5aa993b 3397
de17c821
DJ
3398 check_stub_method_group (t, i);
3399
c906108c
SS
3400 if (intype)
3401 {
072bba3b
KS
3402 for (j = 0; j < len; ++j)
3403 {
3404 if (compare_parameters (TYPE_FN_FIELD_TYPE (f, j), intype, 0)
3e43a32a
MS
3405 || compare_parameters (TYPE_FN_FIELD_TYPE (f, j),
3406 intype, 1))
072bba3b
KS
3407 break;
3408 }
3409
3410 if (j == len)
3e43a32a
MS
3411 error (_("no member function matches "
3412 "that type instantiation"));
7f79b1c5 3413 }
c906108c 3414 else
072bba3b
KS
3415 {
3416 int ii;
7f79b1c5
DJ
3417
3418 j = -1;
53832f31 3419 for (ii = 0; ii < len; ++ii)
072bba3b 3420 {
7f79b1c5
DJ
3421 /* Skip artificial methods. This is necessary if,
3422 for example, the user wants to "print
3423 subclass::subclass" with only one user-defined
53832f31
TT
3424 constructor. There is no ambiguity in this case.
3425 We are careful here to allow artificial methods
3426 if they are the unique result. */
072bba3b 3427 if (TYPE_FN_FIELD_ARTIFICIAL (f, ii))
53832f31
TT
3428 {
3429 if (j == -1)
3430 j = ii;
3431 continue;
3432 }
072bba3b 3433
7f79b1c5
DJ
3434 /* Desired method is ambiguous if more than one
3435 method is defined. */
53832f31 3436 if (j != -1 && !TYPE_FN_FIELD_ARTIFICIAL (f, j))
3e43a32a
MS
3437 error (_("non-unique member `%s' requires "
3438 "type instantiation"), name);
072bba3b 3439
7f79b1c5
DJ
3440 j = ii;
3441 }
53832f31
TT
3442
3443 if (j == -1)
3444 error (_("no matching member function"));
072bba3b 3445 }
c5aa993b 3446
0d5de010
DJ
3447 if (TYPE_FN_FIELD_STATIC_P (f, j))
3448 {
ac3eeb49
MS
3449 struct symbol *s =
3450 lookup_symbol (TYPE_FN_FIELD_PHYSNAME (f, j),
d12307c1 3451 0, VAR_DOMAIN, 0).symbol;
a109c7c1 3452
0d5de010
DJ
3453 if (s == NULL)
3454 return NULL;
3455
3456 if (want_address)
63e43d3a 3457 return value_addr (read_var_value (s, 0, 0));
0d5de010 3458 else
63e43d3a 3459 return read_var_value (s, 0, 0);
0d5de010
DJ
3460 }
3461
c906108c
SS
3462 if (TYPE_FN_FIELD_VIRTUAL_P (f, j))
3463 {
0d5de010
DJ
3464 if (want_address)
3465 {
3466 result = allocate_value
3467 (lookup_methodptr_type (TYPE_FN_FIELD_TYPE (f, j)));
ad4820ab
UW
3468 cplus_make_method_ptr (value_type (result),
3469 value_contents_writeable (result),
0d5de010
DJ
3470 TYPE_FN_FIELD_VOFFSET (f, j), 1);
3471 }
3472 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
3473 return allocate_value (TYPE_FN_FIELD_TYPE (f, j));
3474 else
3475 error (_("Cannot reference virtual member function \"%s\""),
3476 name);
c906108c
SS
3477 }
3478 else
3479 {
ac3eeb49
MS
3480 struct symbol *s =
3481 lookup_symbol (TYPE_FN_FIELD_PHYSNAME (f, j),
d12307c1 3482 0, VAR_DOMAIN, 0).symbol;
a109c7c1 3483
c906108c 3484 if (s == NULL)
0d5de010
DJ
3485 return NULL;
3486
63e43d3a 3487 v = read_var_value (s, 0, 0);
0d5de010
DJ
3488 if (!want_address)
3489 result = v;
c906108c
SS
3490 else
3491 {
0d5de010 3492 result = allocate_value (lookup_methodptr_type (TYPE_FN_FIELD_TYPE (f, j)));
ad4820ab
UW
3493 cplus_make_method_ptr (value_type (result),
3494 value_contents_writeable (result),
42ae5230 3495 value_address (v), 0);
c906108c 3496 }
c906108c 3497 }
0d5de010 3498 return result;
c906108c
SS
3499 }
3500 }
3501 for (i = TYPE_N_BASECLASSES (t) - 1; i >= 0; i--)
3502 {
f23631e4 3503 struct value *v;
c906108c
SS
3504 int base_offset;
3505
3506 if (BASETYPE_VIA_VIRTUAL (t, i))
3507 base_offset = 0;
3508 else
3509 base_offset = TYPE_BASECLASS_BITPOS (t, i) / 8;
3510 v = value_struct_elt_for_reference (domain,
3511 offset + base_offset,
3512 TYPE_BASECLASS (t, i),
ac3eeb49
MS
3513 name, intype,
3514 want_address, noside);
c906108c
SS
3515 if (v)
3516 return v;
3517 }
63d06c5c
DC
3518
3519 /* As a last chance, pretend that CURTYPE is a namespace, and look
3520 it up that way; this (frequently) works for types nested inside
3521 classes. */
3522
ac3eeb49
MS
3523 return value_maybe_namespace_elt (curtype, name,
3524 want_address, noside);
c906108c
SS
3525}
3526
79c2c32d
DC
3527/* C++: Return the member NAME of the namespace given by the type
3528 CURTYPE. */
3529
3530static struct value *
3531value_namespace_elt (const struct type *curtype,
c848d642 3532 const char *name, int want_address,
79c2c32d 3533 enum noside noside)
63d06c5c
DC
3534{
3535 struct value *retval = value_maybe_namespace_elt (curtype, name,
ac3eeb49
MS
3536 want_address,
3537 noside);
63d06c5c
DC
3538
3539 if (retval == NULL)
ac3eeb49
MS
3540 error (_("No symbol \"%s\" in namespace \"%s\"."),
3541 name, TYPE_TAG_NAME (curtype));
63d06c5c
DC
3542
3543 return retval;
3544}
3545
3546/* A helper function used by value_namespace_elt and
3547 value_struct_elt_for_reference. It looks up NAME inside the
3548 context CURTYPE; this works if CURTYPE is a namespace or if CURTYPE
3549 is a class and NAME refers to a type in CURTYPE itself (as opposed
3550 to, say, some base class of CURTYPE). */
3551
3552static struct value *
3553value_maybe_namespace_elt (const struct type *curtype,
c848d642 3554 const char *name, int want_address,
63d06c5c 3555 enum noside noside)
79c2c32d
DC
3556{
3557 const char *namespace_name = TYPE_TAG_NAME (curtype);
d12307c1 3558 struct block_symbol sym;
0d5de010 3559 struct value *result;
79c2c32d 3560
13387711 3561 sym = cp_lookup_symbol_namespace (namespace_name, name,
41f62f39
JK
3562 get_selected_block (0), VAR_DOMAIN);
3563
d12307c1 3564 if (sym.symbol == NULL)
63d06c5c 3565 return NULL;
79c2c32d 3566 else if ((noside == EVAL_AVOID_SIDE_EFFECTS)
d12307c1
PMR
3567 && (SYMBOL_CLASS (sym.symbol) == LOC_TYPEDEF))
3568 result = allocate_value (SYMBOL_TYPE (sym.symbol));
79c2c32d 3569 else
d12307c1 3570 result = value_of_variable (sym.symbol, sym.block);
0d5de010 3571
ae6a105d 3572 if (want_address)
0d5de010
DJ
3573 result = value_addr (result);
3574
3575 return result;
79c2c32d
DC
3576}
3577
dfcee124 3578/* Given a pointer or a reference value V, find its real (RTTI) type.
ac3eeb49 3579
c906108c 3580 Other parameters FULL, TOP, USING_ENC as with value_rtti_type()
ac3eeb49 3581 and refer to the values computed for the object pointed to. */
c906108c
SS
3582
3583struct type *
dfcee124
AG
3584value_rtti_indirect_type (struct value *v, int *full,
3585 int *top, int *using_enc)
c906108c 3586{
f7e5394d 3587 struct value *target = NULL;
dfcee124
AG
3588 struct type *type, *real_type, *target_type;
3589
3590 type = value_type (v);
3591 type = check_typedef (type);
3592 if (TYPE_CODE (type) == TYPE_CODE_REF)
3593 target = coerce_ref (v);
3594 else if (TYPE_CODE (type) == TYPE_CODE_PTR)
f7e5394d 3595 {
f7e5394d 3596
492d29ea 3597 TRY
f7e5394d
SM
3598 {
3599 target = value_ind (v);
3600 }
492d29ea 3601 CATCH (except, RETURN_MASK_ERROR)
f7e5394d
SM
3602 {
3603 if (except.error == MEMORY_ERROR)
3604 {
3605 /* value_ind threw a memory error. The pointer is NULL or
3606 contains an uninitialized value: we can't determine any
3607 type. */
3608 return NULL;
3609 }
3610 throw_exception (except);
3611 }
492d29ea 3612 END_CATCH
f7e5394d 3613 }
dfcee124
AG
3614 else
3615 return NULL;
c906108c 3616
dfcee124
AG
3617 real_type = value_rtti_type (target, full, top, using_enc);
3618
3619 if (real_type)
3620 {
3621 /* Copy qualifiers to the referenced object. */
3622 target_type = value_type (target);
3623 real_type = make_cv_type (TYPE_CONST (target_type),
3624 TYPE_VOLATILE (target_type), real_type, NULL);
3625 if (TYPE_CODE (type) == TYPE_CODE_REF)
3626 real_type = lookup_reference_type (real_type);
3627 else if (TYPE_CODE (type) == TYPE_CODE_PTR)
3628 real_type = lookup_pointer_type (real_type);
3629 else
3630 internal_error (__FILE__, __LINE__, _("Unexpected value type."));
3631
3632 /* Copy qualifiers to the pointer/reference. */
3633 real_type = make_cv_type (TYPE_CONST (type), TYPE_VOLATILE (type),
3634 real_type, NULL);
3635 }
c906108c 3636
dfcee124 3637 return real_type;
c906108c
SS
3638}
3639
3640/* Given a value pointed to by ARGP, check its real run-time type, and
3641 if that is different from the enclosing type, create a new value
3642 using the real run-time type as the enclosing type (and of the same
3643 type as ARGP) and return it, with the embedded offset adjusted to
ac3eeb49
MS
3644 be the correct offset to the enclosed object. RTYPE is the type,
3645 and XFULL, XTOP, and XUSING_ENC are the other parameters, computed
3646 by value_rtti_type(). If these are available, they can be supplied
3647 and a second call to value_rtti_type() is avoided. (Pass RTYPE ==
3648 NULL if they're not available. */
c906108c 3649
f23631e4 3650struct value *
ac3eeb49
MS
3651value_full_object (struct value *argp,
3652 struct type *rtype,
3653 int xfull, int xtop,
fba45db2 3654 int xusing_enc)
c906108c 3655{
c5aa993b 3656 struct type *real_type;
c906108c
SS
3657 int full = 0;
3658 int top = -1;
3659 int using_enc = 0;
f23631e4 3660 struct value *new_val;
c906108c
SS
3661
3662 if (rtype)
3663 {
3664 real_type = rtype;
3665 full = xfull;
3666 top = xtop;
3667 using_enc = xusing_enc;
3668 }
3669 else
3670 real_type = value_rtti_type (argp, &full, &top, &using_enc);
3671
ac3eeb49 3672 /* If no RTTI data, or if object is already complete, do nothing. */
4754a64e 3673 if (!real_type || real_type == value_enclosing_type (argp))
c906108c
SS
3674 return argp;
3675
a7860e76
TT
3676 /* In a destructor we might see a real type that is a superclass of
3677 the object's type. In this case it is better to leave the object
3678 as-is. */
3679 if (full
3680 && TYPE_LENGTH (real_type) < TYPE_LENGTH (value_enclosing_type (argp)))
3681 return argp;
3682
c906108c 3683 /* If we have the full object, but for some reason the enclosing
ac3eeb49
MS
3684 type is wrong, set it. */
3685 /* pai: FIXME -- sounds iffy */
c906108c
SS
3686 if (full)
3687 {
4dfea560
DE
3688 argp = value_copy (argp);
3689 set_value_enclosing_type (argp, real_type);
c906108c
SS
3690 return argp;
3691 }
3692
581e13c1 3693 /* Check if object is in memory. */
c906108c
SS
3694 if (VALUE_LVAL (argp) != lval_memory)
3695 {
3e43a32a
MS
3696 warning (_("Couldn't retrieve complete object of RTTI "
3697 "type %s; object may be in register(s)."),
ac3eeb49 3698 TYPE_NAME (real_type));
c5aa993b 3699
c906108c
SS
3700 return argp;
3701 }
c5aa993b 3702
ac3eeb49
MS
3703 /* All other cases -- retrieve the complete object. */
3704 /* Go back by the computed top_offset from the beginning of the
3705 object, adjusting for the embedded offset of argp if that's what
3706 value_rtti_type used for its computation. */
42ae5230 3707 new_val = value_at_lazy (real_type, value_address (argp) - top +
13c3b5f5 3708 (using_enc ? 0 : value_embedded_offset (argp)));
04624583 3709 deprecated_set_value_type (new_val, value_type (argp));
13c3b5f5
AC
3710 set_value_embedded_offset (new_val, (using_enc
3711 ? top + value_embedded_offset (argp)
3712 : top));
c906108c
SS
3713 return new_val;
3714}
3715
389e51db 3716
85bc8cb7
JK
3717/* Return the value of the local variable, if one exists. Throw error
3718 otherwise, such as if the request is made in an inappropriate context. */
c906108c 3719
f23631e4 3720struct value *
85bc8cb7 3721value_of_this (const struct language_defn *lang)
c906108c 3722{
63e43d3a 3723 struct block_symbol sym;
3977b71f 3724 const struct block *b;
206415a3 3725 struct frame_info *frame;
c906108c 3726
66a17cb6 3727 if (!lang->la_name_of_this)
85bc8cb7 3728 error (_("no `this' in current language"));
aee28ec6 3729
85bc8cb7 3730 frame = get_selected_frame (_("no frame selected"));
c906108c 3731
66a17cb6 3732 b = get_frame_block (frame, NULL);
c906108c 3733
63e43d3a
PMR
3734 sym = lookup_language_this (lang, b);
3735 if (sym.symbol == NULL)
85bc8cb7
JK
3736 error (_("current stack frame does not contain a variable named `%s'"),
3737 lang->la_name_of_this);
3738
63e43d3a 3739 return read_var_value (sym.symbol, sym.block, frame);
85bc8cb7
JK
3740}
3741
3742/* Return the value of the local variable, if one exists. Return NULL
3743 otherwise. Never throw error. */
3744
3745struct value *
3746value_of_this_silent (const struct language_defn *lang)
3747{
3748 struct value *ret = NULL;
85bc8cb7 3749
492d29ea 3750 TRY
c906108c 3751 {
85bc8cb7 3752 ret = value_of_this (lang);
c906108c 3753 }
492d29ea
PA
3754 CATCH (except, RETURN_MASK_ERROR)
3755 {
3756 }
3757 END_CATCH
c906108c 3758
d069f99d
AF
3759 return ret;
3760}
3761
ac3eeb49
MS
3762/* Create a slice (sub-string, sub-array) of ARRAY, that is LENGTH
3763 elements long, starting at LOWBOUND. The result has the same lower
3764 bound as the original ARRAY. */
c906108c 3765
f23631e4
AC
3766struct value *
3767value_slice (struct value *array, int lowbound, int length)
c906108c
SS
3768{
3769 struct type *slice_range_type, *slice_type, *range_type;
7a67d0fe 3770 LONGEST lowerbound, upperbound;
f23631e4 3771 struct value *slice;
c906108c 3772 struct type *array_type;
ac3eeb49 3773
df407dfe 3774 array_type = check_typedef (value_type (array));
c906108c 3775 if (TYPE_CODE (array_type) != TYPE_CODE_ARRAY
6b1755ce 3776 && TYPE_CODE (array_type) != TYPE_CODE_STRING)
8a3fe4f8 3777 error (_("cannot take slice of non-array"));
ac3eeb49 3778
c906108c
SS
3779 range_type = TYPE_INDEX_TYPE (array_type);
3780 if (get_discrete_bounds (range_type, &lowerbound, &upperbound) < 0)
8a3fe4f8 3781 error (_("slice from bad array or bitstring"));
ac3eeb49 3782
c906108c 3783 if (lowbound < lowerbound || length < 0
db034ac5 3784 || lowbound + length - 1 > upperbound)
8a3fe4f8 3785 error (_("slice out of range"));
ac3eeb49 3786
c906108c
SS
3787 /* FIXME-type-allocation: need a way to free this type when we are
3788 done with it. */
0c9c3474
SA
3789 slice_range_type = create_static_range_type ((struct type *) NULL,
3790 TYPE_TARGET_TYPE (range_type),
3791 lowbound,
3792 lowbound + length - 1);
ac3eeb49 3793
a7c88acd
JB
3794 {
3795 struct type *element_type = TYPE_TARGET_TYPE (array_type);
3796 LONGEST offset
3797 = (lowbound - lowerbound) * TYPE_LENGTH (check_typedef (element_type));
ac3eeb49 3798
a7c88acd
JB
3799 slice_type = create_array_type ((struct type *) NULL,
3800 element_type,
3801 slice_range_type);
3802 TYPE_CODE (slice_type) = TYPE_CODE (array_type);
ac3eeb49 3803
a7c88acd
JB
3804 if (VALUE_LVAL (array) == lval_memory && value_lazy (array))
3805 slice = allocate_value_lazy (slice_type);
3806 else
3807 {
3808 slice = allocate_value (slice_type);
3809 value_contents_copy (slice, 0, array, offset,
3ae385af 3810 type_length_units (slice_type));
a7c88acd
JB
3811 }
3812
3813 set_value_component_location (slice, array);
3814 VALUE_FRAME_ID (slice) = VALUE_FRAME_ID (array);
3815 set_value_offset (slice, value_offset (array) + offset);
3816 }
ac3eeb49 3817
c906108c
SS
3818 return slice;
3819}
3820
ac3eeb49
MS
3821/* Create a value for a FORTRAN complex number. Currently most of the
3822 time values are coerced to COMPLEX*16 (i.e. a complex number
070ad9f0
DB
3823 composed of 2 doubles. This really should be a smarter routine
3824 that figures out precision inteligently as opposed to assuming
ac3eeb49 3825 doubles. FIXME: fmb */
c906108c 3826
f23631e4 3827struct value *
ac3eeb49
MS
3828value_literal_complex (struct value *arg1,
3829 struct value *arg2,
3830 struct type *type)
c906108c 3831{
f23631e4 3832 struct value *val;
c906108c
SS
3833 struct type *real_type = TYPE_TARGET_TYPE (type);
3834
3835 val = allocate_value (type);
3836 arg1 = value_cast (real_type, arg1);
3837 arg2 = value_cast (real_type, arg2);
3838
990a07ab 3839 memcpy (value_contents_raw (val),
0fd88904 3840 value_contents (arg1), TYPE_LENGTH (real_type));
990a07ab 3841 memcpy (value_contents_raw (val) + TYPE_LENGTH (real_type),
0fd88904 3842 value_contents (arg2), TYPE_LENGTH (real_type));
c906108c
SS
3843 return val;
3844}
3845
ac3eeb49 3846/* Cast a value into the appropriate complex data type. */
c906108c 3847
f23631e4
AC
3848static struct value *
3849cast_into_complex (struct type *type, struct value *val)
c906108c
SS
3850{
3851 struct type *real_type = TYPE_TARGET_TYPE (type);
ac3eeb49 3852
df407dfe 3853 if (TYPE_CODE (value_type (val)) == TYPE_CODE_COMPLEX)
c906108c 3854 {
df407dfe 3855 struct type *val_real_type = TYPE_TARGET_TYPE (value_type (val));
f23631e4
AC
3856 struct value *re_val = allocate_value (val_real_type);
3857 struct value *im_val = allocate_value (val_real_type);
c906108c 3858
990a07ab 3859 memcpy (value_contents_raw (re_val),
0fd88904 3860 value_contents (val), TYPE_LENGTH (val_real_type));
990a07ab 3861 memcpy (value_contents_raw (im_val),
0fd88904 3862 value_contents (val) + TYPE_LENGTH (val_real_type),
c5aa993b 3863 TYPE_LENGTH (val_real_type));
c906108c
SS
3864
3865 return value_literal_complex (re_val, im_val, type);
3866 }
df407dfe
AC
3867 else if (TYPE_CODE (value_type (val)) == TYPE_CODE_FLT
3868 || TYPE_CODE (value_type (val)) == TYPE_CODE_INT)
ac3eeb49
MS
3869 return value_literal_complex (val,
3870 value_zero (real_type, not_lval),
3871 type);
c906108c 3872 else
8a3fe4f8 3873 error (_("cannot cast non-number to complex"));
c906108c
SS
3874}
3875
3876void
fba45db2 3877_initialize_valops (void)
c906108c 3878{
5bf193a2
AC
3879 add_setshow_boolean_cmd ("overload-resolution", class_support,
3880 &overload_resolution, _("\
3881Set overload resolution in evaluating C++ functions."), _("\
ac3eeb49
MS
3882Show overload resolution in evaluating C++ functions."),
3883 NULL, NULL,
920d2a44 3884 show_overload_resolution,
5bf193a2 3885 &setlist, &showlist);
c906108c 3886 overload_resolution = 1;
c906108c 3887}
This page took 3.235382 seconds and 4 git commands to generate.